- Feb 05, 2013
-
-
Andy Polyakov authored
(cherry picked from commit 134c0065)
-
Dr. Stephen Henson authored
-
Andy Polyakov authored
(cherry picked from commit d5371324)
-
Andy Polyakov authored
RISCs are picky and alignment granted by compiler for md_state can be insufficient for SHA512. (cherry picked from commit 36260233)
-
Andy Polyakov authored
Break dependency on uint64_t. It's possible to declare bits as unsigned int, because TLS packets are limited in size and 32-bit value can't overflow. (cherry picked from commit cab13fc8)
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
branches it needs to be in a "gap".
-
Dr. Stephen Henson authored
We have to use EVP in FIPS mode so we can only partially mitigate timing differences. Make an extra call to HMAC_Update to hash additonal blocks to cover any timing differences caused by removal of padding.
-
Dr. Stephen Henson authored
is in the fips module for fips capable builds.
-
Dr. Stephen Henson authored
-
Ben Laurie authored
This change updates the DTLS code to match the constant-time CBC behaviour in the TLS. (cherry picked from commit 9f27de17) (cherry picked from commit 5e4ca556e970edb8a7f364fcb6ee6818a965a60b) Conflicts: ssl/d1_enc.c ssl/d1_pkt.c ssl/s3_pkt.c
-
Ben Laurie authored
The previous CBC patch was bugged in that there was a path through enc() in s3_pkt.c/d1_pkt.c which didn't set orig_len. orig_len would be left at the previous value which could suggest that the packet was a sufficient length when it wasn't. (cherry picked from commit 6cb19b76) (cherry picked from commit 2c948c1bb218f4ae126e14fd3453d42c62b93235) Conflicts: ssl/s3_enc.c
-
Ben Laurie authored
-
Ben Laurie authored
(cherry picked from commit 014265eb) (cherry picked from commit 7721c53e5e9fe4c90be420d7613559935a96a4fb)
-
Ben Laurie authored
This patch makes the decoding of SSLv3 and TLS CBC records constant time. Without this, a timing side-channel can be used to build a padding oracle and mount Vaudenay's attack. This patch also disables the stitched AESNI+SHA mode pending a similar fix to that code. In order to be easy to backport, this change is implemented in ssl/, rather than as a generic AEAD mode. In the future this should be changed around so that HMAC isn't in ssl/, but crypto/ as FIPS expects. (cherry picked from commit e130841b) Conflicts: crypto/evp/c_allc.c ssl/ssl_algs.c ssl/ssl_locl.h ssl/t1_enc.c (cherry picked from commit 3622239826698a0e534dcf0473204c724bb9b4b4) Conflicts: ssl/d1_enc.c ssl/s3_enc.c ssl/s3_pkt.c ssl/ssl3.h ssl/ssl_algs.c ssl/t1_enc.c
-
Andy Polyakov authored
-
Ben Laurie authored
This change adds CRYPTO_memcmp, which compares two vectors of bytes in an amount of time that's independent of their contents. It also changes several MAC compares in the code to use this over the standard memcmp, which may leak information about the size of a matching prefix. (cherry picked from commit 2ee79888) Conflicts: crypto/crypto.h ssl/t1_lib.c (cherry picked from commit dc406b59f3169fe191e58906df08dce97edb727c) Conflicts: crypto/crypto.h ssl/d1_pkt.c ssl/s3_pkt.c
-
Ben Laurie authored
-
Dr. Stephen Henson authored
Add additional check to catch this in ASN1_item_verify too.
-
- Jan 23, 2013
-
-
Dr. Stephen Henson authored
-
- Jan 20, 2013
-
-
Dr. Stephen Henson authored
-
- Jan 11, 2013
-
-
Dr. Stephen Henson authored
-
- Dec 10, 2012
-
-
Dr. Stephen Henson authored
Reported by: Daniel Black <daniel.black@openquery.com> Support renewing session tickets (backport from HEAD).
-
- Dec 04, 2012
-
-
Dr. Stephen Henson authored
-
- Dec 03, 2012
-
-
Dr. Stephen Henson authored
-
- Nov 29, 2012
-
-
Dr. Stephen Henson authored
Submitted by: jean-etienne.schwartz@bull.net In OCSP_basic_varify return an error if X509_STORE_CTX_init fails.
-
- Nov 21, 2012
-
-
Dr. Stephen Henson authored
Submitted by: Dmitry Belyavsky <beldmit@gmail.com> Fix DH double free if parameter generation fails.
-
- Nov 19, 2012
-
-
Dr. Stephen Henson authored
-
- Nov 18, 2012
-
-
Dr. Stephen Henson authored
Submitted by: "Florian Rüchel" <florian.ruechel@ruhr-uni-bochum.de> Correctly handle local machine keys in the capi ENGINE.
-
- Oct 16, 2012
-
-
Andy Polyakov authored
PR: 2896
-
- Oct 05, 2012
-
-
Bodo Möller authored
Submitted by: Adam Langley
-
Dr. Stephen Henson authored
-
Ben Laurie authored
-
Ben Laurie authored
-
- Sep 24, 2012
-
-
Bodo Möller authored
Submitted by: Adam Langley
-
Richard Levitte authored
-
- Sep 21, 2012
-
-
Richard Levitte authored
debugging code that's seldom used.
-
- Sep 11, 2012
-
-
Dr. Stephen Henson authored
-
- Jul 05, 2012
-
-
Richard Levitte authored
Have the new names start in column 48, that makes it easy to see when the 31 character limit is reached (on a 80 column display, do the math)
-
- May 11, 2012
-
-
Dr. Stephen Henson authored
Reported by: Constantine Sapuntzakis <csapuntz@gmail.com> Fix possible deadlock when decoding public keys.
-