Searched refs:side (Results 1 – 9 of 9) sorted by relevance
447 mbedtls_ecdh_side side ) in ecdh_get_params_internal() argument452 if( side == MBEDTLS_ECDH_THEIRS ) in ecdh_get_params_internal()456 if( side != MBEDTLS_ECDH_OURS ) in ecdh_get_params_internal()471 mbedtls_ecdh_side side ) in mbedtls_ecdh_get_params() argument476 ECDH_VALIDATE_RET( side == MBEDTLS_ECDH_OURS || in mbedtls_ecdh_get_params()477 side == MBEDTLS_ECDH_THEIRS ); in mbedtls_ecdh_get_params()496 return( ecdh_get_params_internal( ctx, key, side ) ); in mbedtls_ecdh_get_params()503 mbedtls_everest_ecdh_side s = side == MBEDTLS_ECDH_OURS ? in mbedtls_ecdh_get_params()512 key, side ) ); in mbedtls_ecdh_get_params()
2 This git contains source code for the secure side implementation of OP-TEE
648 * crypto: fix RSA key leakage after side channel attack1453 * Add cryptographic abstraction layer in on secure side to ease the use of
336 mbedtls_ecdh_side side );
120 the affected side to wrongly reject valid messages. Fixes #4118.630 * Fix side channel in mbedtls_ecp_check_pub_priv() and924 side of the key exchange had a similar bug.1349 implemented client-side, for ECDHE-ECDSA ciphersuites in TLS 1.2,1414 * Close a test gap in (D)TLS between the client side and the server side:1416 in the same way as on the server side.2212 against side-channel attacks like the cache attack described in3059 * Add server-side enforcement of sent renegotiation requests3337 * Server-side initiated renegotiations send HelloRequest3760 * Added ServerName extension parsing (SNI) at server side[all …]
Completed in 19 milliseconds