Skip to content

Conversation

@sam1013
Copy link
Contributor

@sam1013 sam1013 commented Jan 26, 2018

Replaced variable-time GCD with consttime inversion to avoid side-channel attacks on RSA key generation

@mattcaswell
Copy link
Member

For reference this is the 1.1.0 version of #5161. I'm going to delay reviewing this one until #5161 is done.

@mattcaswell mattcaswell added branch: 1.0.2 Applies to OpenSSL_1_0_2-stable branch (EOL) 1.1.0 labels Jan 26, 2018
@mattcaswell mattcaswell added this to the 1.1.0 milestone Jan 26, 2018
@mattcaswell mattcaswell added the approval: review pending This pull request needs review by a committer label Jan 31, 2018
@FdaSilvaYY
Copy link
Contributor

Ready ? or this PR needs more than two approvals ;)

@mattcaswell mattcaswell added approval: done This pull request has the required number of approvals and removed approval: review pending This pull request needs review by a committer labels Jan 31, 2018
goto err;
if (BN_is_one(r1))
ERR_set_mark();
if (BN_mod_inverse(r1, r2, rsa->e, ctx) != NULL) {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

#5161 calls BN_set_flags(r2, BN_FLG_CONSTTIME).

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

So does this - before the "for"

@mattcaswell
Copy link
Member

@kroeckx - are you ok for us to push this one too (I just pushed the master version)?

@kroeckx
Copy link
Member

kroeckx commented Feb 25, 2018

@mattcaswell: Will you merge this?

levitte pushed a commit that referenced this pull request Mar 21, 2018
…nnel attacks on RSA key generation

Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Kurt Roeckx <kurt@roeckx.be>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from #5170)
levitte pushed a commit that referenced this pull request Mar 21, 2018
Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Kurt Roeckx <kurt@roeckx.be>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from #5170)
levitte pushed a commit that referenced this pull request Mar 21, 2018
Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Kurt Roeckx <kurt@roeckx.be>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from #5170)
levitte pushed a commit that referenced this pull request Mar 21, 2018
…nnel attacks on RSA key generation

Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Kurt Roeckx <kurt@roeckx.be>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from #5170)

(cherry picked from commit 9db724c)
levitte pushed a commit that referenced this pull request Mar 21, 2018
Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Kurt Roeckx <kurt@roeckx.be>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from #5170)

(cherry picked from commit 011f82e)
levitte pushed a commit that referenced this pull request Mar 21, 2018
Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Kurt Roeckx <kurt@roeckx.be>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from #5170)

(cherry picked from commit 7150a47)
@mattcaswell
Copy link
Member

Pushed to 1.1.0 and 1.0.2.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approval: done This pull request has the required number of approvals branch: 1.0.2 Applies to OpenSSL_1_0_2-stable branch (EOL)

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants