[openssl-commits] [openssl] OpenSSL_1_1_1-stable update

Richard Levitte levitte at openssl.org
Tue Oct 30 03:52:34 UTC 2018


The branch OpenSSL_1_1_1-stable has been updated
       via  189b56b206e9d588560b609a3738fabceb76bcc3 (commit)
      from  d308458ef138dfbe925203b5cb01a015f0aa93ac (commit)


- Log -----------------------------------------------------------------
commit 189b56b206e9d588560b609a3738fabceb76bcc3
Author: Chocobo1 <Chocobo1 at users.noreply.github.com>
Date:   Fri Oct 19 22:05:49 2018 +0800

    Fix MSVC warning C4819
    
    CLA: trivial
    
    Reviewed-by: Tim Hudson <tjh at openssl.org>
    Reviewed-by: Richard Levitte <levitte at openssl.org>
    (Merged from https://github.com/openssl/openssl/pull/7444)
    
    (cherry picked from commit cf4eea12046445fc418507d2d5e14956b4353495)

-----------------------------------------------------------------------

Summary of changes:
 crypto/bn/bn_exp.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/crypto/bn/bn_exp.c b/crypto/bn/bn_exp.c
index 2c92d7e..c026ffc 100644
--- a/crypto/bn/bn_exp.c
+++ b/crypto/bn/bn_exp.c
@@ -1077,7 +1077,7 @@ int BN_mod_exp_mont_consttime(BIGNUM *rr, const BIGNUM *a, const BIGNUM *p,
              * is not only slower but also makes each bit vulnerable to
              * EM (and likely other) side-channel attacks like One&Done
              * (for details see "One&Done: A Single-Decryption EM-Based
-             *  Attack on OpenSSL’s Constant-Time Blinded RSA" by M. Alam,
+             *  Attack on OpenSSL's Constant-Time Blinded RSA" by M. Alam,
              *  H. Khan, M. Dey, N. Sinha, R. Callan, A. Zajic, and
              *  M. Prvulovic, in USENIX Security'18)
              */


More information about the openssl-commits mailing list