diff options
-rw-r--r-- | CHANGES | 3 | ||||
-rw-r--r-- | include/openssl/dsa.h | 8 |
2 files changed, 8 insertions, 3 deletions
@@ -9,6 +9,9 @@ Changes between 1.1.0h and 1.1.0i [xx XXX xxxx] + *) Increase the number of Miller-Rabin rounds for DSA key generating to 64. + [Kurt Roeckx] + *) Add blinding to ECDSA and DSA signatures to protect against side channel attacks discovered by Keegan Ryan (NCC Group). [Matt Caswell] diff --git a/include/openssl/dsa.h b/include/openssl/dsa.h index e75c839e89..3bd5f1709a 100644 --- a/include/openssl/dsa.h +++ b/include/openssl/dsa.h @@ -146,10 +146,12 @@ int DSAparams_print_fp(FILE *fp, const DSA *x); int DSA_print_fp(FILE *bp, const DSA *x, int off); # endif -# define DSS_prime_checks 50 +# define DSS_prime_checks 64 /* - * Primality test according to FIPS PUB 186[-1], Appendix 2.1: 50 rounds of - * Rabin-Miller + * Primality test according to FIPS PUB 186-4, Appendix C.3. Since we only + * have one value here we set the number of checks to 64 which is the 128 bit + * security level that is the highest level and valid for creating a 3072 bit + * DSA key. */ # define DSA_is_prime(n, callback, cb_arg) \ BN_is_prime(n, DSS_prime_checks, callback, NULL, cb_arg) |