summaryrefslogtreecommitdiff
path: root/src/lib/libc (unfollow)
Commit message (Collapse)AuthorFilesLines
2017-01-05MFC: Avoid a side-channel cache-timing attack that can leak the ECDSAjsing1-1/+3
private keys when signing. This is due to BN_mod_inverse() being used without the constant time flag being set. This issue was reported by Cesar Pereida Garcia and Billy Brumley (Tampere University of Technology). The fix was developed by Cesar Pereida Garcia.
2016-11-03MFC: In ssl3_read_bytes(), do not process more than three consecutive TLSlibressl-v2.3.9jsing1-4/+24
records, otherwise a peer can potentially cause us to loop indefinately. Return with an SSL_ERROR_WANT_READ instead, so that the caller can choose when they want to handle further processing for this connection. ok beck@ miod@
2016-10-02bump to 2.3.9bcook1-3/+3
2016-09-22MFC: Avoid falling back to a weak digest for (EC)DH when using SNI withlibressl-v2.3.8jsing1-3/+10
libssl.
2016-09-22MFC: Avoid unbounded memory growth in libssl, which can be triggered by ajsing1-9/+20
TLS client repeatedly renegotiating and sending OCSP Status Request TLS extensions.
2016-09-22bump version for 2.3.8bcook1-3/+3
2016-06-30bump for 2.3.7libressl-v2.3.7bcook1-3/+3
2016-06-25Fix several issues in the OCSP code that could result in the incorrectbeck2-9/+33
generation and parsing of OCSP requests. This remediates a lack of error checking on time parsing in these functions, and ensures that only GENERALIZEDTIME formats are accepted for OCSP, as per RFC 6960 Issues reported, and fixes provided by Kazuki Yamaguchi <k@rhe.jp> and Kinichiro Inoguchi <kinichiro.inoguchi@gmail.com>
2016-06-06Set BN_FLG_CONSTTIME on the correct variable. beck committed wrong fix.libressl-v2.3.6tedu1-2/+2
Mistake noted by Billy Brumley. Many thanks.
2016-06-06Correct a problem that prevents the DSA signing algorithm from runningbeck1-4/+6
in constant time even if the flag BN_FLG_CONSTTIME is set. This issue was reported by Cesar Pereida (Aalto University), Billy Brumley (Tampere University of Technology), and Yuval Yarom (The University of Adelaide and NICTA). The fix was developed by Cesar Pereida
2016-06-06LibreSSL 2.3.6bcook1-3/+3
2016-05-29bump to 2.3.5libressl-v2.3.5bcook1-3/+3
2016-05-29Fix a short-read bug in the previous version of asn1_d2i_read_biobcook1-26/+28
The outer while() loop is missing, so we only read up to chunk_max bytes. ok tedu
2016-05-04this chunk was NOT supposed to be committed. spotted by jsg.tedu1-2/+1
2016-05-03prefer limits.h over sys/limits.hlibressl-v2.3.4bcook1-2/+2
2016-05-03bump to 2.3.4bcook1-2/+2
2016-05-03backport patch from openssl for multiple issues:tedu8-31/+58
missing padding check in aesni functions overflow in evp encode functions use of invalid negative asn.1 types ok beck