diff options
author | Cesar Pereida Garcia <cesar.pereidagarcia@tut.fi> | 2019-08-19 10:33:14 +0300 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2019-08-27 09:25:51 +0100 |
commit | 55611d549bcf65e0de04938adbf403ccf02f241b (patch) | |
tree | c9e7997b7b205a7480efbf95a0f2d116eb5417d8 /crypto/ec/ecp_nistp521.c | |
parent | 7fafaf27c2c2990fde2798424a38ce8443dae595 (diff) |
Fix SCA vulnerability when using PVK and MSBLOB key formats
This commit addresses a side-channel vulnerability present when
PVK and MSBLOB key formats are loaded into OpenSSL.
The public key was not computed using a constant-time exponentiation
function.
This issue was discovered and reported by the NISEC group at TAU Finland.
Reviewed-by: Nicola Tuveri <nic.tuv@gmail.com>
Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/9638)
Diffstat (limited to 'crypto/ec/ecp_nistp521.c')
0 files changed, 0 insertions, 0 deletions