X-Git-Url: https://git.openssl.org/?p=openssl.git;a=blobdiff_plain;f=crypto%2Frsa%2Frsa_pk1.c;h=efb16a02e6edbc4dcbee54c1d25b2b074292c559;hp=bac7c26a17385692fb8982931e3fcdb8b1cfae15;hb=02e112a88579ff2592f34015f73dc85f4ed76ad5;hpb=0517ffc47c79136ba09fb34400e9e26c539615d1 diff --git a/crypto/rsa/rsa_pk1.c b/crypto/rsa/rsa_pk1.c index bac7c26a17..efb16a02e6 100644 --- a/crypto/rsa/rsa_pk1.c +++ b/crypto/rsa/rsa_pk1.c @@ -183,7 +183,7 @@ int RSA_padding_check_PKCS1_type_2(unsigned char *to, int tlen, /* * Always do this zero-padding copy (even when num == flen) to avoid * leaking that information. The copy still leaks some side-channel - * information, but it's impossible to have a fixed memory access + * information, but it's impossible to have a fixed memory access * pattern since we can't read out of the bounds of |from|. * * TODO(emilia): Consider porting BN_bn2bin_padded from BoringSSL.