a63d0ad40d
If the caller asked for the base to be treated as secret, we should provide that. Allowing unbounded inputs is not compatible with being constant-time. Additionally, this aligns with the guidance here: https://github.com/HACS-workshop/spectre-mitigations/blob/master/crypto_guidelines.md#1-do-not-conditionally-choose-between-constant-and-non-constant-time Update-Note: BN_mod_exp_mont_consttime and BN_mod_exp_mont now require inputs be fully reduced. I believe current callers tolerate this. Additionally, due to a quirk of how certain operations were ordered, using (publicly) zero exponent tolerated a NULL BN_CTX while other exponents required non-NULL BN_CTX. Non-NULL BN_CTX is now required uniformly. This is unlikely to cause problems. Any call site where the exponent is always zero should just be replaced with BN_value_one(). Change-Id: I7c941953ea05f36dc2754facb9f4cf83a6789c61 Reviewed-on: https://boringssl-review.googlesource.com/27665 Commit-Queue: David Benjamin <davidben@google.com> CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org> Reviewed-by: Steven Valdez <svaldez@google.com> |
||
---|---|---|
.. | ||
bn_div_corpus | ||
bn_mod_exp_corpus | ||
cert_corpus | ||
client_corpus | ||
client_corpus_no_fuzzer_mode | ||
dtls_client_corpus | ||
dtls_server_corpus | ||
pkcs8_corpus | ||
privkey_corpus | ||
read_pem_corpus | ||
server_corpus | ||
server_corpus_no_fuzzer_mode | ||
session_corpus | ||
spki_corpus | ||
ssl_ctx_api_corpus | ||
bn_div.cc | ||
bn_mod_exp.cc | ||
cert.cc | ||
client.cc | ||
CMakeLists.txt | ||
dtls_client.cc | ||
dtls_server.cc | ||
minimise_corpuses.sh | ||
pkcs8.cc | ||
privkey.cc | ||
read_pem.cc | ||
refresh_ssl_corpora.sh | ||
server.cc | ||
session.cc | ||
spki.cc | ||
ssl_ctx_api.cc |