Lines Matching refs:side
165 * When negotiating TLS version on server side, do not fall back to the
266 * Fix a timing side channel in private key RSA operations. This side channel
316 the capabilities of the PSA side for either key.
352 * Add support for server-side TLS version negotiation. If both TLS 1.2 and
680 * Fix a potential heap buffer overread in TLS 1.3 client-side when
683 Arm, so that these systems are no longer vulnerable to timing side-channel
689 timing side-channel attacks. There is now an intrinsics-based AES-NI
700 calculation on the client side. It prevents a server with more accurate
1092 * Add support for client-side TLS version negotiation. If both TLS 1.2 and
1118 and hmac_demo.c, which use PSA and the md/cipher interfaces side
1119 by side in order to illustrate how the operation is performed in PSA.
1132 * Fix a potential heap buffer overread in TLS 1.2 server-side when
1444 containing various functions meant to resist timing side channel attacks.
1758 * Fix a potential side channel vulnerability in ECDSA ephemeral key generation.
1829 the affected side to wrongly reject valid messages. Fixes #4118.
1992 * Guard against strong local side channel attack against base64 tables by
2252 * Fix side channel in RSA private key operations and static (finite-field)
2341 * Fix a side channel vulnerability in modular exponentiation that could
2346 * Fix side channel in mbedtls_ecp_check_pub_priv() and
2423 `MBEDTLS_CTR_DRBG_C` or `MBEDTLS_HMAC_DRBG_C` for some side-channel
2424 coutermeasures. If side channels are not a concern, this dependency can
2449 * Fix side channel in ECC code that allowed an adversary with access to
2496 * To avoid a side channel vulnerability when parsing an RSA private key,
2553 * Fix side channel vulnerability in ECDSA. Our bignum implementation is not
2554 constant time/constant trace, so side channel attacks can retrieve the
2558 * Fix side channel vulnerability in ECDSA key generation. Obtaining precise
2640 side of the key exchange had a similar bug.
2649 countermeasure and leaked information about the private key through side
3065 implemented client-side, for ECDHE-ECDSA ciphersuites in TLS 1.2,
3130 * Close a test gap in (D)TLS between the client side and the server side:
3131 test the handling of large packets and small packets on the client side
3132 in the same way as on the server side.
3403 * Fix a client-side bug in the validation of the server's ciphersuite choice
3600 code execution. The issue could be triggered remotely from either side in
3634 (server-side). Could result in application crash, but only if an ALPN
3803 triggered remotely from either side. (With authmode set to 'required'
3876 The issue could only happen client-side with renegotiation enabled.
3928 against side-channel attacks like the cache attack described in
4288 * Fix possible client-side NULL pointer dereference (read) when the client
4367 * New server-side implementation of session tickets that rotate keys to
4507 * Default DHM parameters server-side upgraded from 1024 to 2048 bits.
4706 * It is now possible to disable negotiation of truncated HMAC server-side
4775 * Add server-side enforcement of sent renegotiation requests
5053 * Server-side initiated renegotiations send HelloRequest
5476 * Added ServerName extension parsing (SNI) at server side
5978 * Added support on the client side for the TLS "hostname" extension
6082 * Added server-side SSLv3 and TLSv1.0 support