- Feb 08, 2013
-
-
Andy Polyakov authored
(cherry picked from commit e9baceab)
-
Andy Polyakov authored
With previous commit it also ensures that valgrind is happy.
-
Ben Laurie authored
-
Ben Laurie authored
-
- Feb 07, 2013
-
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Dr. Stephen Henson authored
Fix the calculation that checks there is enough room in a record after removing padding and optional explicit IV. (by Steve) For AEAD remove the correct number of padding bytes (by Andy)
-
- Feb 06, 2013
-
-
Adam Langley authored
MD5 should use little endian order. Fortunately the only ciphersuite affected is EXP-RC2-CBC-MD5 (TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5) which is a rarely used export grade ciphersuite.
-
Dr. Stephen Henson authored
-
- Feb 04, 2013
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- Feb 03, 2013
-
-
Andy Polyakov authored
-
- Feb 02, 2013
-
-
Andy Polyakov authored
(cherry picked from commit 134c0065)
-
Andy Polyakov authored
PR: 2963 and a number of others (cherry picked from commit 4568182a)
-
Andy Polyakov authored
Address CBC decrypt timing issues and reenable the AESNI+SHA1 stitch.
-
- Feb 01, 2013
-
-
Ben Laurie authored
-
Andy Polyakov authored
Kludge alert. This is arranged by passing padding length in unused bits of SSL3_RECORD->type, so that orig_len can be reconstructed.
-
Andy Polyakov authored
-
Dr. Stephen Henson authored
-
Andy Polyakov authored
-
Andy Polyakov authored
RISCs are picky and alignment granted by compiler for md_state can be insufficient for SHA512.
-
Andy Polyakov authored
Break dependency on uint64_t. It's possible to declare bits as unsigned int, because TLS packets are limited in size and 32-bit value can't overflow.
-
- Jan 31, 2013
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
branches it needs to be in a "gap".
-
Dr. Stephen Henson authored
We have to use EVP in FIPS mode so we can only partially mitigate timing differences. Make an extra call to EVP_DigestSignUpdate to hash additonal blocks to cover any timing differences caused by removal of padding.
-
- Jan 29, 2013
-
-
Dr. Stephen Henson authored
Add additional check to catch this in ASN1_item_verify too.
-
- Jan 28, 2013
-
-
Ben Laurie authored
-
Ben Laurie authored
This change updates the DTLS code to match the constant-time CBC behaviour in the TLS.
-
Ben Laurie authored
The previous CBC patch was bugged in that there was a path through enc() in s3_pkt.c/d1_pkt.c which didn't set orig_len. orig_len would be left at the previous value which could suggest that the packet was a sufficient length when it wasn't.
-
Ben Laurie authored
This patch makes the decoding of SSLv3 and TLS CBC records constant time. Without this, a timing side-channel can be used to build a padding oracle and mount Vaudenay's attack. This patch also disables the stitched AESNI+SHA mode pending a similar fix to that code. In order to be easy to backport, this change is implemented in ssl/, rather than as a generic AEAD mode. In the future this should be changed around so that HMAC isn't in ssl/, but crypto/ as FIPS expects.
-
Ben Laurie authored
This change adds CRYPTO_memcmp, which compares two vectors of bytes in an amount of time that's independent of their contents. It also changes several MAC compares in the code to use this over the standard memcmp, which may leak information about the size of a matching prefix.
-
- Jan 23, 2013
-
-
Dr. Stephen Henson authored
-