mirror of
https://github.com/ruby/ruby.git
synced 2022-11-09 12:17:21 -05:00
![]() Also, OpenSSL::BN::CONSTTIME is added. OpenSSL itself had a feature that was vulnerable against a side-channel attack. The OpenSSL authors determined that it was not a security issue, and they have already fixed the issue by using BN_set_flags. https://github.com/openssl/openssl/pull/13888 If a Ruby OpenSSL user was faced with a similar issue, they couldn't prevent the issue because Ruby OpenSSL lacks a wrapper to BN_set_flags. For the case, this change introduces the wrapper. https://github.com/ruby/openssl/commit/1e565eba89 |
||
---|---|---|
.. | ||
fixtures/pkey | ||
test_asn1.rb | ||
test_bn.rb | ||
test_buffering.rb | ||
test_cipher.rb | ||
test_config.rb | ||
test_digest.rb | ||
test_engine.rb | ||
test_fips.rb | ||
test_hmac.rb | ||
test_kdf.rb | ||
test_ns_spki.rb | ||
test_ocsp.rb | ||
test_ossl.rb | ||
test_pair.rb | ||
test_pkcs7.rb | ||
test_pkcs12.rb | ||
test_pkey.rb | ||
test_pkey_dh.rb | ||
test_pkey_dsa.rb | ||
test_pkey_ec.rb | ||
test_pkey_rsa.rb | ||
test_random.rb | ||
test_ssl.rb | ||
test_ssl_session.rb | ||
test_ts.rb | ||
test_x509attr.rb | ||
test_x509cert.rb | ||
test_x509crl.rb | ||
test_x509ext.rb | ||
test_x509name.rb | ||
test_x509req.rb | ||
test_x509store.rb | ||
ut_eof.rb | ||
utils.rb |