Revision 133145686e054a28f78b94e8a996ef7ae13d30b7 authored by Adam Langley on 24 April 2013, 18:45:44 UTC, committed by Emilia Kasper on 24 September 2014, 13:46:26 UTC
that bad encryptions are treated like random session keys in constant time. (cherry picked from commit adb46dbc6dd7347750df2468c93e8c34bcb93a4b) Reviewed-by: Rich Salz <rsalz@openssl.org>
1 parent 0f04b00
File | Mode | Size |
---|---|---|
.cvsignore | -rw-r--r-- | 18 bytes |
Makefile | -rw-r--r-- | 14.3 KB |
ts.h | -rw-r--r-- | 30.3 KB |
ts_asn1.c | -rw-r--r-- | 10.1 KB |
ts_conf.c | -rw-r--r-- | 13.1 KB |
ts_err.c | -rw-r--r-- | 8.9 KB |
ts_lib.c | -rw-r--r-- | 4.6 KB |
ts_req_print.c | -rw-r--r-- | 3.6 KB |
ts_req_utils.c | -rw-r--r-- | 6.2 KB |
ts_rsp_print.c | -rw-r--r-- | 8.2 KB |
ts_rsp_sign.c | -rw-r--r-- | 28.7 KB |
ts_rsp_utils.c | -rw-r--r-- | 9.8 KB |
ts_rsp_verify.c | -rw-r--r-- | 21.2 KB |
ts_verify_ctx.c | -rw-r--r-- | 4.9 KB |

Computing file changes ...