New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Modify the RSA_private_decrypt functions to check the padding in #8543
Modify the RSA_private_decrypt functions to check the padding in #8543
Conversation
constant time with a memory access pattern that does not depend on secret information. [extended tests]
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
An explanatory comment is approved too.
How about adding that to the comment above: The loop below combines conditional moves by 2^X bytes. Each move |
…in constant time with a memory access pattern that does not depend on secret information.
…in constant time with a memory access pattern that does not depend on secret information.
Sorry, messages crossed. |
yes, drop the "a". |
…in constant time with a memory access pattern that does not depend on secret information.
…in constant time with a memory access pattern that does not depend on secret information.
good point. Thanks. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
All good now.
constant time with a memory access pattern that does not depend on secret information. [extended tests] Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from #8543)
Merged to all active branches. Thanks! |
constant time with a memory access pattern that does not depend
on secret information.