Emilia Kasper a20db08e77 Harden SSLv2-supporting servers against Bleichenbacher's attack.
There is no indication that the timing differences are exploitable in
OpenSSL, and indeed there is some indication (Usenix '14) that they
are too small to be exploitable. Nevertheless, be careful and apply
the same countermeasures as in s3_srvr.c

Thanks to Nimrod Aviram, Sebastian Schinzel and Yuval Shavitt for
reporting this issue.

Reviewed-by: Richard Levitte <levitte@openssl.org>
(cherry picked from commit ae50d8270026edf5b3c7f8aaa0c6677462b33d97)
2015-04-08 16:42:28 +02:00
..
2015-03-25 12:45:17 +00:00
2015-02-27 20:32:49 +00:00
2015-01-22 09:38:39 +00:00
2014-09-24 15:52:41 +02:00
2015-03-25 12:45:17 +00:00
2015-03-11 10:49:22 +00:00
2015-03-05 09:30:35 +00:00
2015-02-27 15:25:05 +00:00
2015-01-22 09:38:39 +00:00
2015-01-22 09:38:39 +00:00
2015-01-22 09:38:39 +00:00
2015-01-22 09:38:39 +00:00
2015-02-27 08:57:44 +00:00
2015-03-08 22:42:23 +00:00
2015-02-06 10:10:49 +00:00
2015-03-17 13:49:32 +00:00
2015-03-25 12:45:17 +00:00
2015-01-22 09:38:39 +00:00
2015-03-25 12:45:17 +00:00