1. 26 Jun, 2016 1 commit
  2. 25 Jun, 2016 1 commit
  3. 24 Jun, 2016 1 commit
  4. 23 Jun, 2016 1 commit
  5. 22 Jun, 2016 1 commit
  6. 21 Jun, 2016 1 commit
  7. 20 Jun, 2016 5 commits
  8. 16 Jun, 2016 3 commits
  9. 15 Jun, 2016 1 commit
  10. 14 Jun, 2016 6 commits
  11. 13 Jun, 2016 2 commits
  12. 12 Jun, 2016 5 commits
  13. 10 Jun, 2016 3 commits
  14. 07 Jun, 2016 3 commits
  15. 06 Jun, 2016 1 commit
    • Cesar Pereida's avatar
      Fix DSA, preserve BN_FLG_CONSTTIME · 621eaf49
      Cesar Pereida authored
      
      
      Operations in the DSA signing algorithm should run in constant time in
      order to avoid side channel attacks. A flaw in the OpenSSL DSA
      implementation means that a non-constant time codepath is followed for
      certain operations. This has been demonstrated through a cache-timing
      attack to be sufficient for an attacker to recover the private DSA key.
      
      CVE-2016-2178
      
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      Reviewed-by: default avatarMatt Caswell <matt@openssl.org>
      621eaf49
  16. 03 Jun, 2016 5 commits