c0caa945f6
information about the length of a value used in DSA operations from a large number of signatures. This doesn't rate as a CVE because: * For the non-constant time code, there are easier ways to extract more information. * For the constant time code, it requires a significant number of signatures to leak a small amount of information. Thanks to Neals Fournaise, Eliane Jaulmes and Jean-Rene Reinhard for reporting this issue. Reviewed-by: Andy Polyakov <appro@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/4576) |
||
---|---|---|
.. | ||
build.info | ||
dsa_ameth.c | ||
dsa_asn1.c | ||
dsa_depr.c | ||
dsa_err.c | ||
dsa_gen.c | ||
dsa_key.c | ||
dsa_lib.c | ||
dsa_locl.h | ||
dsa_meth.c | ||
dsa_ossl.c | ||
dsa_pmeth.c | ||
dsa_prn.c | ||
dsa_sign.c | ||
dsa_vrf.c |