summaryrefslogtreecommitdiffstats
path: root/ssl/t1_lib.c
diff options
context:
space:
mode:
authorCesar Pereida Garcia <cesar.pereidagarcia@tut.fi>2019-08-14 10:17:06 +0300
committerMatt Caswell <matt@openssl.org>2019-08-27 09:07:30 +0100
commit724339ff44235149c4e8ddae614e1dda6863e23e (patch)
treec066fbe8fe14ba7b1e94a453b16a2aba0173c8e6 /ssl/t1_lib.c
parent485d336137f2afa62e378bc39dcfa37dcfb222da (diff)
Fix SCA vulnerability when using PVK and MSBLOB key formats
This commit addresses a side-channel vulnerability present when PVK and MSBLOB key formats are loaded into OpenSSL. The public key was not computed using a constant-time exponentiation function. This issue was discovered and reported by the NISEC group at TAU Finland. Reviewed-by: Nicola Tuveri <nic.tuv@gmail.com> Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de> Reviewed-by: Paul Dale <paul.dale@oracle.com> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/9587)
Diffstat (limited to 'ssl/t1_lib.c')
0 files changed, 0 insertions, 0 deletions