Build Update for openssl/openssl
-------------------------------------

Build: #16036
Status: Errored

Duration: 19 minutes and 18 seconds
Commit: db91094 (OpenSSL_1_1_0-stable)
Author: David Benjamin
Message: Fix timing leak in BN_from_montgomery_word.

BN_from_montgomery_word doesn't have a constant memory access pattern.
Replace the pointer trick with a constant-time select. There is, of
course, still the bn_correct_top leak pervasive in BIGNUM itself.

See also https://boringssl-review.googlesource.com/22904 from BoringSSL.

Reviewed-by: Andy Polyakov <[email protected]>
Reviewed-by: Kurt Roeckx <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/5228)

(cherry picked from commit f345b1f39d9b4e4c9ef07e7522e9b2a870c9ca09)

View the changeset: 
https://github.com/openssl/openssl/compare/723183b5640e...db91094a49b3

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/336285391?utm_source=email&utm_medium=notification

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_____
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits

Reply via email to