openssl/crypto/rsa
Cesar Pereida Garcia 2f18596c32 [crypto/asn1] Fix multiple SCA vulnerabilities during RSA key validation.
This commit addresses multiple side-channel vulnerabilities present
during RSA key validation.
Private key parameters are re-computed using variable-time functions.

This issue was discovered and reported by the NISEC group at TAU Finland.

Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/9779)
2019-09-06 16:15:55 +01:00
..
build.info
rsa_ameth.c Ensure RSA PSS correctly returns the right default digest 2019-08-09 13:24:14 +01:00
rsa_asn1.c
rsa_chk.c rsa/rsa_gen.c: harmonize keygen's ability with RSA_security_bits. 2017-11-28 20:05:48 +01:00
rsa_crpt.c
rsa_depr.c
rsa_err.c make RSA and DSA operations throw MISSING_PRIVATE_KEY if needed, adapt ECDSA 2019-07-31 17:07:44 +03:00
rsa_gen.c Fix Typos 2019-07-31 19:48:30 +02:00
rsa_lib.c [crypto/asn1] Fix multiple SCA vulnerabilities during RSA key validation. 2019-09-06 16:15:55 +01:00
rsa_locl.h Minor cleanup of the rsa mp limits code 2017-12-13 17:29:01 +01:00
rsa_meth.c Use 'i' as parameter name not 'I'. 2018-09-17 09:53:15 +10:00
rsa_mp.c Set error code on alloc failures 2018-04-03 11:31:16 -04:00
rsa_none.c
rsa_oaep.c Modify the RSA_private_decrypt functions to check the padding in 2019-03-22 14:48:09 +01:00
rsa_ossl.c make RSA and DSA operations throw MISSING_PRIVATE_KEY if needed, adapt ECDSA 2019-07-31 17:07:44 +03:00
rsa_pk1.c Modify the RSA_private_decrypt functions to check the padding in 2019-03-22 14:48:09 +01:00
rsa_pmeth.c Change default RSA, DSA and DH size to 2048 bit 2019-05-21 16:47:13 +02:00
rsa_prn.c
rsa_pss.c crypto/rsa/rsa_pss.c: silence coverity warning 2018-09-10 11:03:50 +01:00
rsa_saos.c
rsa_sign.c
rsa_ssl.c Modify the RSA_private_decrypt functions to check the padding in 2019-03-22 14:48:09 +01:00
rsa_x931.c
rsa_x931g.c Update copyright year 2019-05-28 14:49:38 +02:00