Use BN_mod_exp_mont_consttime in dsa_priv_decode.
The exponent is secret, so we should be using the consttime variant. See also upstream's f9cbf470180841966338db1f4c28d99ec4debec4. Change-Id: I233d4223ded5b80711d7c8f906e3579c36b24cd0 Reviewed-on: https://boringssl-review.googlesource.com/20924 Reviewed-by: Adam Langley <agl@google.com>
This commit is contained in:
parent
81f030b106
commit
575334657f
@ -151,8 +151,8 @@ static int dsa_priv_decode(EVP_PKEY *out, CBS *params, CBS *key) {
|
||||
// Calculate the public key.
|
||||
ctx = BN_CTX_new();
|
||||
if (ctx == NULL ||
|
||||
!BN_mod_exp_mont(dsa->pub_key, dsa->g, dsa->priv_key, dsa->p, ctx,
|
||||
NULL)) {
|
||||
!BN_mod_exp_mont_consttime(dsa->pub_key, dsa->g, dsa->priv_key, dsa->p,
|
||||
ctx, NULL)) {
|
||||
goto err;
|
||||
}
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user