Build Update for openssl/openssl ------------------------------------- Build: #16036 Status: Errored
Duration: 19 minutes and 18 seconds Commit: db91094 (OpenSSL_1_1_0-stable) Author: David Benjamin Message: Fix timing leak in BN_from_montgomery_word. BN_from_montgomery_word doesn't have a constant memory access pattern. Replace the pointer trick with a constant-time select. There is, of course, still the bn_correct_top leak pervasive in BIGNUM itself. See also https://boringssl-review.googlesource.com/22904 from BoringSSL. Reviewed-by: Andy Polyakov <[email protected]> Reviewed-by: Kurt Roeckx <[email protected]> (Merged from https://github.com/openssl/openssl/pull/5228) (cherry picked from commit f345b1f39d9b4e4c9ef07e7522e9b2a870c9ca09) View the changeset: https://github.com/openssl/openssl/compare/723183b5640e...db91094a49b3 View the full build log and details: https://travis-ci.org/openssl/openssl/builds/336285391?utm_source=email&utm_medium=notification -- You can configure recipients for build notifications in your .travis.yml file. See https://docs.travis-ci.com/user/notifications
_____ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
