diff options
author | jsing <> | 2017-01-05 13:25:52 +0000 |
---|---|---|
committer | jsing <> | 2017-01-05 13:25:52 +0000 |
commit | 24bd0c62d7cee5a02429b55d731cc85fb5d5e33d (patch) | |
tree | 40146ee9aa4cb2d6bc8f6f1870125a0e4e35277e /src/lib/libcrypto/ecdsa/ecs_err.c | |
parent | 39d13fc94e77e5dae2801aac096a56762070f87c (diff) | |
download | openbsd-24bd0c62d7cee5a02429b55d731cc85fb5d5e33d.tar.gz openbsd-24bd0c62d7cee5a02429b55d731cc85fb5d5e33d.tar.bz2 openbsd-24bd0c62d7cee5a02429b55d731cc85fb5d5e33d.zip |
Avoid a side-channel cache-timing attack that can leak the ECDSA private
keys when signing. This is due to BN_mod_inverse() being used without the
constant time flag being set.
This issue was reported by Cesar Pereida Garcia and Billy Brumley
(Tampere University of Technology). The fix was developed by Cesar Pereida
Garcia.
Diffstat (limited to 'src/lib/libcrypto/ecdsa/ecs_err.c')
0 files changed, 0 insertions, 0 deletions