1. 06 2月, 2013 2 次提交
    • A
      e_aes_cbc_hmac_sha1.c: address the CBC decrypt timing issues. · 9970308c
      Andy Polyakov 提交于
      Address CBC decrypt timing issues and reenable the AESNI+SHA1 stitch.
      (cherry picked from commit 125093b59f3c2a2d33785b5563d929d0472f1721)
      9970308c
    • B
      Make CBC decoding constant time. · 2acc020b
      Ben Laurie 提交于
      This patch makes the decoding of SSLv3 and TLS CBC records constant
      time. Without this, a timing side-channel can be used to build a padding
      oracle and mount Vaudenay's attack.
      
      This patch also disables the stitched AESNI+SHA mode pending a similar
      fix to that code.
      
      In order to be easy to backport, this change is implemented in ssl/,
      rather than as a generic AEAD mode. In the future this should be changed
      around so that HMAC isn't in ssl/, but crypto/ as FIPS expects.
      (cherry picked from commit e130841bccfc0bb9da254dc84e23bc6a1c78a64e)
      2acc020b
  2. 10 10月, 2011 1 次提交
  3. 24 8月, 2011 1 次提交
  4. 07 4月, 2010 1 次提交
  5. 20 1月, 2010 1 次提交
  6. 08 7月, 2009 1 次提交
  7. 24 4月, 2007 1 次提交
  8. 09 6月, 2006 1 次提交
  9. 22 8月, 2005 1 次提交
  10. 06 10月, 2003 1 次提交
  11. 09 8月, 2002 1 次提交
    • B
      ECC ciphersuite support · ea262260
      Bodo Möller 提交于
      Submitted by: Douglas Stebila <douglas.stebila@sun.com>
      (Authors: Vipul Gupta and Sumit Gupta, Sun Microsystems Laboratories)
      ea262260
  12. 20 2月, 2001 1 次提交
  13. 08 2月, 2001 1 次提交
    • D
      · deb2c1a1
      Dr. Stephen Henson 提交于
      Fix AES code.
      
      Update Rijndael source to v3.0
      
      Add AES OIDs.
      
      Change most references of Rijndael to AES.
      
      Add new draft AES ciphersuites.
      deb2c1a1
  14. 06 2月, 2001 1 次提交
  15. 23 1月, 2001 1 次提交
  16. 08 6月, 1999 1 次提交
  17. 27 4月, 1999 1 次提交
  18. 24 4月, 1999 1 次提交
  19. 20 4月, 1999 1 次提交
  20. 16 2月, 1999 1 次提交
    • M
      Updates to the new SSL compression code · 413c4f45
      Mark J. Cox 提交于
           [Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)]
      
      Fix so that the version number in the master secret, when passed
           via RSA, checks that if TLS was proposed, but we roll back to SSLv3
           (because the server will not accept higher), that the version number
           is 0x03,0x01, not 0x03,0x00
           [Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)]
      
      Submitted by:
      Reviewed by:
      PR:
      413c4f45
  21. 21 12月, 1998 3 次提交