commit | 329d82309824ff1082dc4a91a5bbed8c3bec1580 | [log] [tgz] |
---|---|---|
author | Jason A. Donenfeld <Jason@zx2c4.com> | Sat Jun 10 04:59:11 2017 +0200 |
committer | Marcel Holtmann <marcel@holtmann.org> | Sat Jun 10 15:45:40 2017 +0200 |
tree | 983c8b86fcb01a137dba822122ad3a082bf49de1 | |
parent | 4a59d433c98bcd9e1032009abbd43415405cd763 [diff] |
Bluetooth: use constant time memory comparison for secret values This file is filled with complex cryptography. Thus, the comparisons of MACs and secret keys and curve points and so forth should not add timing attacks, which could either result in a direct forgery, or, given the complexity, some other type of attack. Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com> Signed-off-by: Marcel Holtmann <marcel@holtmann.org> Cc: stable@vger.kernel.org