Add a constant time flag to one of the bignums to avoid a timing leak.
authorPauli <paul.dale@oracle.com>
Wed, 31 Oct 2018 22:44:11 +0000 (08:44 +1000)
committerPauli <paul.dale@oracle.com>
Thu, 1 Nov 2018 22:15:37 +0000 (08:15 +1000)
Reviewed-by: Tim Hudson <tjh@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/7549)

(cherry picked from commit 00496b6423605391864fbbd1693f23631a1c5239)

crypto/dsa/dsa_ossl.c

index be58625db3b1629e52fbf196589818edf1d722a6..868283ac63a1f47dc597a740c65955c6f029c5a1 100644 (file)
@@ -225,6 +225,7 @@ static int dsa_sign_setup(DSA *dsa, BN_CTX *ctx_in,
     } while (BN_is_zero(k));
 
     BN_set_flags(k, BN_FLG_CONSTTIME);
+    BN_set_flags(l, BN_FLG_CONSTTIME);
 
     if (dsa->flags & DSA_FLAG_CACHE_MONT_P) {
         if (!BN_MONT_CTX_set_locked(&dsa->method_mont_p,