Address a timing side channel whereby it is possible to determine some
authorPauli <paul.dale@oracle.com>
Tue, 31 Oct 2017 20:58:13 +0000 (06:58 +1000)
committerMatt Caswell <matt@openssl.org>
Wed, 1 Nov 2017 15:55:11 +0000 (15:55 +0000)
commit71844800d543162f709c6a223d993a50506028c2
treeb5c91928a759905c57707d01eff8b2bf389cb61b
parentbb0c588ab2c6dae55bb8adbcf72cab3bca390e0f
 Address a timing side channel whereby it is possible to determine some

information about the length of a value used in DSA operations from
a large number of signatures.

This doesn't rate as a CVE because:

* For the non-constant time code, there are easier ways to extract
  more information.

* For the constant time code, it requires a significant number of signatures
  to leak a small amount of information.

Thanks to Neals Fournaise, Eliane Jaulmes and Jean-Rene Reinhard for
reporting this issue.

Reviewed-by: Andy Polyakov <appro@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/4576)

(cherry picked from commit c0caa945f6ef30363e0d01d75155f20248403df4)
crypto/dsa/dsa_ossl.c