2000-01-11 22:35:21 +00:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
|
|
|
RSA_blinding_on, RSA_blinding_off - Protect the RSA operation from timing attacks
|
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
#include <openssl/rsa.h>
|
|
|
|
|
|
|
|
int RSA_blinding_on(RSA *rsa, BN_CTX *ctx);
|
|
|
|
|
|
|
|
void RSA_blinding_off(RSA *rsa);
|
|
|
|
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
2000-01-12 13:59:20 +00:00
|
|
|
RSA is vulnerable to timing attacks. In a setup where attackers can
|
2000-01-11 22:35:21 +00:00
|
|
|
measure the time of RSA decryption or signature operations, blinding
|
|
|
|
must be used to protect the RSA operation from that attack.
|
|
|
|
|
|
|
|
RSA_blinding_on() turns blinding on for key B<rsa> and generates a
|
|
|
|
random blinding factor. B<ctx> is B<NULL> or a pre-allocated and
|
|
|
|
initialized B<BN_CTX>. The random number generator must be seeded
|
|
|
|
prior to calling RSA_blinding_on().
|
|
|
|
|
|
|
|
RSA_blinding_off() turns blinding off and frees the memory used for
|
|
|
|
the blinding factor.
|
|
|
|
|
|
|
|
=head1 RETURN VALUES
|
|
|
|
|
|
|
|
RSA_blinding_on() returns 1 on success, and 0 if an error occurred.
|
|
|
|
|
|
|
|
RSA_blinding_off() returns no value.
|
|
|
|
|
|
|
|
=head1 SEE ALSO
|
|
|
|
|
|
|
|
rsa(3), rand(3)
|
|
|
|
|
|
|
|
=head1 HISTORY
|
|
|
|
|
|
|
|
RSA_blinding_on() and RSA_blinding_off() appeared in SSLeay 0.9.0.
|
|
|
|
|
|
|
|
=cut
|