1. 29 May, 2018 1 commit
  2. 23 May, 2018 1 commit
  3. 21 May, 2018 1 commit
  4. 18 May, 2018 1 commit
  5. 17 May, 2018 1 commit
    • Matt Caswell's avatar
      Make BN_GF2m_mod_arr more constant time · 7e5292ba
      Matt Caswell authored
      
      
      Experiments have shown that the lookup table used by BN_GF2m_mod_arr
      introduces sufficient timing signal to recover the private key for an
      attacker with access to cache timing information on the victim's host.
      This only affects binary curves (which are less frequently used).
      
      No CVE is considered necessary for this issue.
      
      The fix is to replace the lookup table with an on-the-fly calculation of
      the value from the table instead, which can be performed in constant time.
      
      Thanks to Youngjoo Shin for reporting this issue.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/6270)
      
      (cherry picked from commit b336ce57)
      7e5292ba
  6. 14 May, 2018 2 commits
  7. 12 May, 2018 3 commits
  8. 11 May, 2018 1 commit
  9. 05 May, 2018 1 commit
  10. 04 May, 2018 2 commits
  11. 03 May, 2018 2 commits
  12. 02 May, 2018 4 commits
  13. 01 May, 2018 2 commits
  14. 27 Apr, 2018 6 commits
  15. 26 Apr, 2018 3 commits
  16. 25 Apr, 2018 1 commit
  17. 24 Apr, 2018 1 commit
  18. 20 Apr, 2018 1 commit
  19. 19 Apr, 2018 5 commits
  20. 17 Apr, 2018 1 commit
    • John Eichenberger's avatar
      Correct the check of RSA_FLAG_SIGN_VER · 82d8cec0
      John Eichenberger authored
      
      
      The wrong flags were being tested. It is the rsa->meth flags not the rsa
      flags that should be tested.
      
      wpa_supplicant has a bit of code that
      1. Allocates and defines a RSA_METHOD structure.
      2. calls RSA_new();
      3. calls RSA_set_method().
      
      In current versions of that code the rsa_sign and rsa_verify members of
      the RSA_METHOD structure are not defined, thus making it compatible
      with the really old versions of OpenSSL.
      
      But should one change it use the rsa_sign method one must set the
      RSA_FLAG_SIGN_VER bit of the RSA_METHOD structure to indicate that
      one or both of those new methods are required.  In doing so, OpenSSL
      will not call the new methods, not without this change.
      
      CLA: trivial
      
      Change-Id: I6e65a80f21399f25e966466ff676e3b21f85f360
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/5971)
      82d8cec0