1. 18 May, 2018 1 commit
  2. 17 May, 2018 1 commit
    • Matt Caswell's avatar
      Make BN_GF2m_mod_arr more constant time · 7e5292ba
      Matt Caswell authored
      
      
      Experiments have shown that the lookup table used by BN_GF2m_mod_arr
      introduces sufficient timing signal to recover the private key for an
      attacker with access to cache timing information on the victim's host.
      This only affects binary curves (which are less frequently used).
      
      No CVE is considered necessary for this issue.
      
      The fix is to replace the lookup table with an on-the-fly calculation of
      the value from the table instead, which can be performed in constant time.
      
      Thanks to Youngjoo Shin for reporting this issue.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/6270)
      
      (cherry picked from commit b336ce57)
      7e5292ba
  3. 14 May, 2018 2 commits
  4. 12 May, 2018 3 commits
  5. 11 May, 2018 1 commit
  6. 05 May, 2018 1 commit
  7. 04 May, 2018 2 commits
  8. 03 May, 2018 2 commits
  9. 02 May, 2018 4 commits
  10. 01 May, 2018 2 commits
  11. 27 Apr, 2018 6 commits
  12. 26 Apr, 2018 3 commits
  13. 25 Apr, 2018 1 commit
  14. 24 Apr, 2018 1 commit
  15. 20 Apr, 2018 1 commit
  16. 19 Apr, 2018 5 commits
  17. 17 Apr, 2018 3 commits
  18. 16 Apr, 2018 1 commit