Skip to content
  1. Feb 07, 2013
    • Dr. Stephen Henson's avatar
      Fix IV check and padding removal. · 32cc2479
      Dr. Stephen Henson authored
      Fix the calculation that checks there is enough room in a record
      after removing padding and optional explicit IV. (by Steve)
      
      For AEAD remove the correct number of padding bytes (by Andy)
      32cc2479
  2. Feb 06, 2013
  3. Feb 04, 2013
  4. Feb 03, 2013
  5. Feb 02, 2013
  6. Feb 01, 2013
  7. Jan 31, 2013
  8. Jan 29, 2013
  9. Jan 28, 2013
    • Ben Laurie's avatar
      Oops. Add missing file. · 014265eb
      Ben Laurie authored
      014265eb
    • Ben Laurie's avatar
      Update DTLS code to match CBC decoding in TLS. · 9f27de17
      Ben Laurie authored
      This change updates the DTLS code to match the constant-time CBC
      behaviour in the TLS.
      9f27de17
    • Ben Laurie's avatar
      Don't crash when processing a zero-length, TLS >= 1.1 record. · 6cb19b76
      Ben Laurie authored
      The previous CBC patch was bugged in that there was a path through enc()
      in s3_pkt.c/d1_pkt.c which didn't set orig_len. orig_len would be left
      at the previous value which could suggest that the packet was a
      sufficient length when it wasn't.
      6cb19b76
    • Ben Laurie's avatar
      Make CBC decoding constant time. · e130841b
      Ben Laurie authored
      This patch makes the decoding of SSLv3 and TLS CBC records constant
      time. Without this, a timing side-channel can be used to build a padding
      oracle and mount Vaudenay's attack.
      
      This patch also disables the stitched AESNI+SHA mode pending a similar
      fix to that code.
      
      In order to be easy to backport, this change is implemented in ssl/,
      rather than as a generic AEAD mode. In the future this should be changed
      around so that HMAC isn't in ssl/, but crypto/ as FIPS expects.
      e130841b
    • Ben Laurie's avatar
      Add and use a constant-time memcmp. · 2ee79888
      Ben Laurie authored
      This change adds CRYPTO_memcmp, which compares two vectors of bytes in
      an amount of time that's independent of their contents. It also changes
      several MAC compares in the code to use this over the standard memcmp,
      which may leak information about the size of a matching prefix.
      2ee79888
  10. Jan 23, 2013
  11. Jan 22, 2013
  12. Jan 20, 2013
  13. Jan 19, 2013
  14. Jan 14, 2013