提交 91b17fba 编写于 作者: B Bodo Möller

Change wording for BN_mod_exp_mont_consttime() entry

上级 ce92b6eb
...@@ -800,10 +800,10 @@ ...@@ -800,10 +800,10 @@
Changes between 0.9.7g and 0.9.7h [XX xxx XXXX] Changes between 0.9.7g and 0.9.7h [XX xxx XXXX]
*) Make a new fixed-window mod_exp implementation the default for *) Make a new fixed-window mod_exp implementation the default for
RSA, DSA, and DH private-key operations to mitigate the RSA, DSA, and DH private-key operations so that the sequence of
hyper-threading timing attacks pointed out by Colin Percival squares and multiplies and the memory access pattern are
(http://www.daemonology.net/hyperthreading-considered-harmful/), independent of the particular secret key. This will mitigate
and potential related attacks. cache-timing and potential related attacks.
BN_mod_exp_mont_consttime() is the new exponentiation implementation, BN_mod_exp_mont_consttime() is the new exponentiation implementation,
and this is automatically used by BN_mod_exp_mont() if the new flag and this is automatically used by BN_mod_exp_mont() if the new flag
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册