Build Update for openssl/openssl
-------------------------------------

Build: #16035
Status: Still Failing

Duration: 34 minutes and 25 seconds
Commit: f345b1f (master)
Author: David Benjamin
Message: Fix timing leak in BN_from_montgomery_word.

BN_from_montgomery_word doesn't have a constant memory access pattern.
Replace the pointer trick with a constant-time select. There is, of
course, still the bn_correct_top leak pervasive in BIGNUM itself.

See also https://boringssl-review.googlesource.com/22904 from BoringSSL.

Reviewed-by: Andy Polyakov <ap...@openssl.org>
Reviewed-by: Kurt Roeckx <k...@roeckx.be>
(Merged from https://github.com/openssl/openssl/pull/5228)

View the changeset: 
https://github.com/openssl/openssl/compare/39eeb64f59ff...f345b1f39d9b

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/336285052?utm_source=email&utm_medium=notification

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_____
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits

Reply via email to