- Feb 06, 2013
-
-
Andy Polyakov authored
Break dependency on uint64_t. It's possible to declare bits as unsigned int, because TLS packets are limited in size and 32-bit value can't overflow. (cherry picked from commit cab13fc8473856a43556d41d8dac5605f4ba1f91)
-
Dr. Stephen Henson authored
(cherry picked from commit 34ab3c8c711ff79c2b768f0b17e4b2a78fd1df5d)
-
Dr. Stephen Henson authored
branches it needs to be in a "gap". (cherry picked from commit 81ce0e14e72e8e255ad1bd9c7cfaa47a6291919c)
-
Dr. Stephen Henson authored
We have to use EVP in FIPS mode so we can only partially mitigate timing differences. Make an extra call to EVP_DigestSignUpdate to hash additonal blocks to cover any timing differences caused by removal of padding. (cherry picked from commit b908e88ec15aa0a74805e3f2236fc4f83f2789c2)
-
Ben Laurie authored
(cherry picked from commit 014265eb02e26f35c8db58e2ccbf100b0b2f0072)
-
Ben Laurie authored
This change updates the DTLS code to match the constant-time CBC behaviour in the TLS. (cherry picked from commit 9f27de170d1b7bef3d46d41382dc4dafde8b3900)
-
Ben Laurie authored
The previous CBC patch was bugged in that there was a path through enc() in s3_pkt.c/d1_pkt.c which didn't set orig_len. orig_len would be left at the previous value which could suggest that the packet was a sufficient length when it wasn't. (cherry picked from commit 6cb19b7681f600b2f165e4adc57547b097b475fd)
-
Ben Laurie authored
This patch makes the decoding of SSLv3 and TLS CBC records constant time. Without this, a timing side-channel can be used to build a padding oracle and mount Vaudenay's attack. This patch also disables the stitched AESNI+SHA mode pending a similar fix to that code. In order to be easy to backport, this change is implemented in ssl/, rather than as a generic AEAD mode. In the future this should be changed around so that HMAC isn't in ssl/, but crypto/ as FIPS expects. (cherry picked from commit e130841bccfc0bb9da254dc84e23bc6a1c78a64e)
-
Ben Laurie authored
This change adds CRYPTO_memcmp, which compares two vectors of bytes in an amount of time that's independent of their contents. It also changes several MAC compares in the code to use this over the standard memcmp, which may leak information about the size of a matching prefix. (cherry picked from commit 2ee798880a246d648ecddadc5b91367bee4a5d98)
-
- Feb 04, 2013
-
-
Dr. Stephen Henson authored
encrypted premaster secret value.
-
- Feb 02, 2013
-
-
Andy Polyakov authored
PR: 2963 and a number of others
-
- Jan 24, 2013
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- Jan 23, 2013
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- Jan 22, 2013
-
-
Andy Polyakov authored
PR: 2963 and a number of others
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-
- Jan 21, 2013
-
-
Ben Laurie authored
-
- Jan 20, 2013
-
-
Dr. Stephen Henson authored
-
- Jan 19, 2013
-
-
Andy Polyakov authored
Submitted by: Pierre Delaage
-
Ben Laurie authored
-
Andy Polyakov authored
-
Ben Laurie authored
-
Ben Laurie authored
-
Ben Laurie authored
-
Andy Polyakov authored
Submitted by: Seguei Leontiev PR: 2821
-
Andy Polyakov authored
Submitted by: Serguei Leontiev PR: 2821
-
Andy Polyakov authored
-
Ben Laurie authored
-
Ben Laurie authored
-
Ben Laurie authored
-
Andy Polyakov authored
-
- Jan 17, 2013
-
-
Dr. Stephen Henson authored
-
- Jan 13, 2013
-
-
Ben Laurie authored
-
- Jan 12, 2013
-
-
Ben Laurie authored
-
- Jan 07, 2013
-
-
Dr. Stephen Henson authored
-