Fix SCA vulnerability when using PVK and MSBLOB key formats
authorCesar Pereida Garcia <cesar.pereidagarcia@tut.fi>
Wed, 14 Aug 2019 07:17:06 +0000 (10:17 +0300)
committerMatt Caswell <matt@openssl.org>
Tue, 27 Aug 2019 08:18:32 +0000 (09:18 +0100)
commit04882f77a8bb5df8bc9f3f9f82191f487d350be1
treeab665c2cff94ef527140fafe43d31b1863192d42
parentb14c6d9af475858c60f3d04abe7d87bd9f71d578
Fix SCA vulnerability when using PVK and MSBLOB key formats

This commit addresses a side-channel vulnerability present when
PVK and MSBLOB key formats are loaded into OpenSSL.
The public key was not computed using a constant-time exponentiation
function.

This issue was discovered and reported by the NISEC group at TAU Finland.

Reviewed-by: Nicola Tuveri <nic.tuv@gmail.com>
Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/9587)

(cherry picked from commit 724339ff44235149c4e8ddae614e1dda6863e23e)
crypto/pem/pvkfmt.c