[openssl-commits] [openssl] OpenSSL_1_1_1-stable update
Richard Levitte
levitte at openssl.org
Tue Oct 30 03:52:34 UTC 2018
The branch OpenSSL_1_1_1-stable has been updated
via 189b56b206e9d588560b609a3738fabceb76bcc3 (commit)
from d308458ef138dfbe925203b5cb01a015f0aa93ac (commit)
- Log -----------------------------------------------------------------
commit 189b56b206e9d588560b609a3738fabceb76bcc3
Author: Chocobo1 <Chocobo1 at users.noreply.github.com>
Date: Fri Oct 19 22:05:49 2018 +0800
Fix MSVC warning C4819
CLA: trivial
Reviewed-by: Tim Hudson <tjh at openssl.org>
Reviewed-by: Richard Levitte <levitte at openssl.org>
(Merged from https://github.com/openssl/openssl/pull/7444)
(cherry picked from commit cf4eea12046445fc418507d2d5e14956b4353495)
-----------------------------------------------------------------------
Summary of changes:
crypto/bn/bn_exp.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/crypto/bn/bn_exp.c b/crypto/bn/bn_exp.c
index 2c92d7e..c026ffc 100644
--- a/crypto/bn/bn_exp.c
+++ b/crypto/bn/bn_exp.c
@@ -1077,7 +1077,7 @@ int BN_mod_exp_mont_consttime(BIGNUM *rr, const BIGNUM *a, const BIGNUM *p,
* is not only slower but also makes each bit vulnerable to
* EM (and likely other) side-channel attacks like One&Done
* (for details see "One&Done: A Single-Decryption EM-Based
- * Attack on OpenSSL’s Constant-Time Blinded RSA" by M. Alam,
+ * Attack on OpenSSL's Constant-Time Blinded RSA" by M. Alam,
* H. Khan, M. Dey, N. Sinha, R. Callan, A. Zajic, and
* M. Prvulovic, in USENIX Security'18)
*/
More information about the openssl-commits
mailing list