Change wording for BN_mod_exp_mont_consttime() entry
This commit is contained in:
8
CHANGES
8
CHANGES
@@ -5,10 +5,10 @@
|
|||||||
Changes between 0.9.7g and 0.9.7h [XX xxx XXXX]
|
Changes between 0.9.7g and 0.9.7h [XX xxx XXXX]
|
||||||
|
|
||||||
*) Make a new fixed-window mod_exp implementation the default for
|
*) Make a new fixed-window mod_exp implementation the default for
|
||||||
RSA, DSA, and DH private-key operations to mitigate the
|
RSA, DSA, and DH private-key operations so that the sequence of
|
||||||
hyper-threading timing attacks pointed out by Colin Percival
|
squares and multiplies and the memory access pattern are
|
||||||
(http://www.daemonology.net/hyperthreading-considered-harmful/),
|
independent of the particular secret key. This will mitigate
|
||||||
and potential related attacks.
|
cache-timing and potential related attacks.
|
||||||
|
|
||||||
BN_mod_exp_mont_consttime() is the new exponentiation implementation,
|
BN_mod_exp_mont_consttime() is the new exponentiation implementation,
|
||||||
and this is automatically used by BN_mod_exp_mont() if the new flag
|
and this is automatically used by BN_mod_exp_mont() if the new flag
|
||||||
|
|||||||
Reference in New Issue
Block a user