openssl/crypto/dsa
Pauli a9cfb8c2aa Timing vulnerability in DSA signature generation (CVE-2018-0734).
Avoid a timing attack that leaks information via a side channel that
triggers when a BN is resized.  Increasing the size of the BNs
prior to doing anything with them suppresses the attack.

Thanks due to Samuel Weiser for finding and locating this.

Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de>
(Merged from https://github.com/openssl/openssl/pull/7486)
2018-10-29 07:46:20 +10:00
..
build.info
dsa_ameth.c
dsa_asn1.c
dsa_depr.c
dsa_err.c Pick a q size consistent with the digest for DSA param generation 2018-04-05 15:44:24 +01:00
dsa_gen.c Update copyright year 2018-04-17 15:18:40 +02:00
dsa_key.c
dsa_lib.c Harmonize the error handling codepath 2018-09-05 15:22:35 +03:00
dsa_locl.h
dsa_meth.c
dsa_ossl.c Timing vulnerability in DSA signature generation (CVE-2018-0734). 2018-10-29 07:46:20 +10:00
dsa_pmeth.c Remove DSA digest length checks when no digest is passed 2018-07-29 21:26:29 +02:00
dsa_prn.c
dsa_sign.c Update copyright year 2018-09-11 13:45:17 +01:00
dsa_vrf.c