Skip to content
Commit 48081cf9 authored by Andy Polyakov's avatar Andy Polyakov
Browse files

Fix timing leak in BN_from_montgomery_word.

BN_from_montgomery_word doesn't have a constant memory access pattern.
Replace the pointer trick with a constant-time select. There is, of
course, still the bn_correct_top leak pervasive in BIGNUM itself.

See also https://boringssl-review.googlesource.com/22904 from BoringSSL.

(backport from f345b1f3

 signed off by
David Benjamin <davidben@google.com>)

Reviewed-by: default avatarKurt Roeckx <kurt@roeckx.be>
parent 4981e6fc
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment