make timing attack protection unconditional
authorDr. Stephen Henson <steve@openssl.org>
Thu, 1 Sep 2011 14:23:41 +0000 (14:23 +0000)
committerDr. Stephen Henson <steve@openssl.org>
Thu, 1 Sep 2011 14:23:41 +0000 (14:23 +0000)
crypto/ecdsa/ecs_ossl.c

index bbb5588cbeadc39195fd8fc4e5e982608b7a70c2..1bbf328de54f54e2dcfd2775c33a4040eba5ae2b 100644 (file)
@@ -144,7 +144,6 @@ static int ecdsa_sign_setup(EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp,
                        }
                while (BN_is_zero(k));
 
-#ifdef ECDSA_POINT_MUL_NO_CONSTTIME
                /* We do not want timing information to leak the length of k,
                 * so we compute G*k using an equivalent scalar of fixed
                 * bit-length. */
@@ -152,7 +151,6 @@ static int ecdsa_sign_setup(EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp,
                if (!BN_add(k, k, order)) goto err;
                if (BN_num_bits(k) <= BN_num_bits(order))
                        if (!BN_add(k, k, order)) goto err;
-#endif /* def(ECDSA_POINT_MUL_NO_CONSTTIME) */
 
                /* compute r the x-coordinate of generator * k */
                if (!EC_POINT_mul(group, tmp_point, k, NULL, NULL, ctx))