mirror of https://github.com/openssl/openssl.git
Avoid a timing attack that leaks information via a side channel that triggers when a BN is resized. Increasing the size of the BNs prior to doing anything with them suppresses the attack. Thanks due to Samuel Weiser for finding and locating this. Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de> (Merged from https://github.com/openssl/openssl/pull/7486) |
||
|---|---|---|
| .. | ||
| build.info | ||
| dsa_ameth.c | ||
| dsa_asn1.c | ||
| dsa_depr.c | ||
| dsa_err.c | ||
| dsa_gen.c | ||
| dsa_key.c | ||
| dsa_lib.c | ||
| dsa_locl.h | ||
| dsa_meth.c | ||
| dsa_ossl.c | ||
| dsa_pmeth.c | ||
| dsa_prn.c | ||
| dsa_sign.c | ||
| dsa_vrf.c | ||