Lines Matching refs:side
360 * When negotiating TLS version on server side, do not fall back to the
461 * Fix a timing side channel in private key RSA operations. This side channel
511 the capabilities of the PSA side for either key.
547 * Add support for server-side TLS version negotiation. If both TLS 1.2 and
875 * Fix a potential heap buffer overread in TLS 1.3 client-side when
878 Arm, so that these systems are no longer vulnerable to timing side-channel
884 timing side-channel attacks. There is now an intrinsics-based AES-NI
895 calculation on the client side. It prevents a server with more accurate
1287 * Add support for client-side TLS version negotiation. If both TLS 1.2 and
1313 and hmac_demo.c, which use PSA and the md/cipher interfaces side
1314 by side in order to illustrate how the operation is performed in PSA.
1327 * Fix a potential heap buffer overread in TLS 1.2 server-side when
1639 containing various functions meant to resist timing side channel attacks.
1953 * Fix a potential side channel vulnerability in ECDSA ephemeral key generation.
2024 the affected side to wrongly reject valid messages. Fixes #4118.
2187 * Guard against strong local side channel attack against base64 tables by
2447 * Fix side channel in RSA private key operations and static (finite-field)
2536 * Fix a side channel vulnerability in modular exponentiation that could
2541 * Fix side channel in mbedtls_ecp_check_pub_priv() and
2618 `MBEDTLS_CTR_DRBG_C` or `MBEDTLS_HMAC_DRBG_C` for some side-channel
2619 coutermeasures. If side channels are not a concern, this dependency can
2644 * Fix side channel in ECC code that allowed an adversary with access to
2691 * To avoid a side channel vulnerability when parsing an RSA private key,
2748 * Fix side channel vulnerability in ECDSA. Our bignum implementation is not
2749 constant time/constant trace, so side channel attacks can retrieve the
2753 * Fix side channel vulnerability in ECDSA key generation. Obtaining precise
2835 side of the key exchange had a similar bug.
2844 countermeasure and leaked information about the private key through side
3260 implemented client-side, for ECDHE-ECDSA ciphersuites in TLS 1.2,
3325 * Close a test gap in (D)TLS between the client side and the server side:
3326 test the handling of large packets and small packets on the client side
3327 in the same way as on the server side.
3598 * Fix a client-side bug in the validation of the server's ciphersuite choice
3795 code execution. The issue could be triggered remotely from either side in
3829 (server-side). Could result in application crash, but only if an ALPN
3998 triggered remotely from either side. (With authmode set to 'required'
4071 The issue could only happen client-side with renegotiation enabled.
4123 against side-channel attacks like the cache attack described in
4483 * Fix possible client-side NULL pointer dereference (read) when the client
4562 * New server-side implementation of session tickets that rotate keys to
4702 * Default DHM parameters server-side upgraded from 1024 to 2048 bits.
4901 * It is now possible to disable negotiation of truncated HMAC server-side
4970 * Add server-side enforcement of sent renegotiation requests
5248 * Server-side initiated renegotiations send HelloRequest
5671 * Added ServerName extension parsing (SNI) at server side
6173 * Added support on the client side for the TLS "hostname" extension
6277 * Added server-side SSLv3 and TLSv1.0 support