> It looks like a bug inopenssl-1.0.0e x86 (Windows, Linux, etc.):
> functions BN_mod_mul and BN_mod_mul_mongomery sometimes (very rarely) 
> yield different results when squaring (multiplication at the same time 
> works fine).
> Compile time options include -DOPENSSL_BN_ASM_MONT, ie the assembler 
> code produced by crypto/bn/asm/x86-mont.pl is used.

Please verify http://cvs.openssl.org/chngview?cn=21811. Thanks for report.

Out of curiosity. The bug is in legacy integer-only code path, one that
isn't normally chosen on contemporary CPUs. How did you run into it? I
mean is it very old CPU? Embedded one without SSE2? Or do you
consciously omit SSE2 support?


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [email protected]
Automated List Manager                           [email protected]

Reply via email to