Fix the ECDSA timing attack mentioned in the paper at:
[oweals/openssl.git] / Configure
index 9397ca1c4a33dc7d0d1867bbc51ccebd20e1403b..a91ba80db64a5fa0ed8c33dc3571b19dc190dc4f 100755 (executable)
--- a/Configure
+++ b/Configure
@@ -667,6 +667,7 @@ my $perl;
 # All of the following is disabled by default (RC5 was enabled before 0.9.8):
 
 my %disabled = ( # "what"         => "comment" [or special keyword "experimental"]
+                "ec-nistp224-64-gcc-128" => "default",
                 "gmp"            => "default",
                  "jpake"          => "experimental",
                  "md2"            => "default",
@@ -1001,7 +1002,7 @@ foreach (sort (keys %disabled))
        else
                {
                my ($ALGO, $algo);
-               ($ALGO = $algo = $_) =~ tr/[a-z]/[A-Z]/;
+               ($ALGO = $algo = $_) =~ tr/[\-a-z]/[_A-Z]/;
 
                if (/^asm$/ || /^err$/ || /^hw$/ || /^hw-/)
                        {