Bluetooth: use constant time memory comparison for secret values
This file is filled with complex cryptography. Thus, the comparisons of MACs and secret keys and curve points and so forth should not add timing attacks, which could either result in a direct forgery, or, given the complexity, some other type of attack. Signed-off-by: NJason A. Donenfeld <Jason@zx2c4.com> Signed-off-by: NMarcel Holtmann <marcel@holtmann.org> Cc: stable@vger.kernel.org
Showing
想要评论请 注册 或 登录