> It looks like a bug inopenssl-1.0.0e x86 (Windows, Linux, etc.): > functions BN_mod_mul and BN_mod_mul_mongomery sometimes (very rarely) > yield different results when squaring (multiplication at the same time > works fine). > Compile time options include -DOPENSSL_BN_ASM_MONT, ie the assembler > code produced by crypto/bn/asm/x86-mont.pl is used.
Please verify http://cvs.openssl.org/chngview?cn=21811. Thanks for report. Out of curiosity. The bug is in legacy integer-only code path, one that isn't normally chosen on contemporary CPUs. How did you run into it? I mean is it very old CPU? Embedded one without SSE2? Or do you consciously omit SSE2 support? ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List [email protected] Automated List Manager [email protected]
