1. 29 Jun, 2016 3 commits
  2. 27 Jun, 2016 1 commit
  3. 26 Jun, 2016 2 commits
  4. 25 Jun, 2016 1 commit
  5. 24 Jun, 2016 1 commit
  6. 23 Jun, 2016 1 commit
  7. 22 Jun, 2016 1 commit
  8. 21 Jun, 2016 1 commit
  9. 20 Jun, 2016 5 commits
  10. 16 Jun, 2016 3 commits
  11. 15 Jun, 2016 1 commit
  12. 14 Jun, 2016 6 commits
  13. 13 Jun, 2016 2 commits
  14. 12 Jun, 2016 5 commits
  15. 10 Jun, 2016 3 commits
  16. 07 Jun, 2016 3 commits
  17. 06 Jun, 2016 1 commit
    • Cesar Pereida's avatar
      Fix DSA, preserve BN_FLG_CONSTTIME · 621eaf49
      Cesar Pereida authored
      
      
      Operations in the DSA signing algorithm should run in constant time in
      order to avoid side channel attacks. A flaw in the OpenSSL DSA
      implementation means that a non-constant time codepath is followed for
      certain operations. This has been demonstrated through a cache-timing
      attack to be sufficient for an attacker to recover the private DSA key.
      
      CVE-2016-2178
      
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      Reviewed-by: default avatarMatt Caswell <matt@openssl.org>
      621eaf49