> The function BN_nist_mod_384 (in crypto/bn/bn_nist.c)

Other fast reduction functions are apparently affected too.

> gives wrong results 
> for some inputs. For example, on input:
> 0xffffffff00000000ffffffffffffffffffffffff000000000000000000000000fffffffffffffffffffffffffffffffe00000002ffffffffffffffffffffffff00000000ffffffffffffffffffffffff
> it yields
> 0x100000000ffffffffffffffff00000000
> but the correct result is
> 0x200000001fffffffffffffffe00000001.
> 
> As a consequence the function EC_POINT_add gives sometimes wrong results 
> for the NIST standard curve P-384. For example, if it computes the sum of 
> the points
> (0x56fce068ab4eacbcbdca2a8cf5608e74d89ad30925bedac917aee82799eab18cd22e09a64bdcc2e03fd6f51a7c23bce6,
>  
> 0x259b376c88fc35a48e25dc20da307cf2ca30cda69f14584020a75061b0a300f04c6acd9c8890a9653625bdaed2d2e4ce)
> and
> (0xa9031f9754b153444235d5730a9f718b27652cf6da412536e85117d866154e722dd1f658b4233d1fc0290ae683dc431a,
>  
> 0x9ac68504a9cb1565ea7b9ccf45d53bbbcc06c39cb102a3ef5d3b7f02111489e7dde3bb954e8a10bf4b9c6f852dd2c46a)
> which lie on that curve the result is a point which does not lie on the 
> curve. To see this compile the following code:

Please verify http://cvs.openssl.org/chngview?cn=16985. A.


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to