Hello, > Please verify http://cvs.openssl.org/chngview?cn=21811. Thanks for report. Thank you, version 1.13 works fine.
> Out of curiosity. The bug is in legacy integer-only code path, one that > isn't normally chosen on contemporary CPUs. How did you run into it? I > mean is it very old CPU? Embedded one without SSE2? Or do you > consciously omit SSE2 support? You are right, the processor is rather old. Excuse me please,I probably should have mentioned this before. --- Sincerely yours, Victor Timakov 09.12.2011 18:35, Andy Polyakov via RT ?????: >> It looks like a bug inopenssl-1.0.0e x86 (Windows, Linux, etc.): >> functions BN_mod_mul and BN_mod_mul_mongomery sometimes (very rarely) >> yield different results when squaring (multiplication at the same time >> works fine). >> Compile time options include -DOPENSSL_BN_ASM_MONT, ie the assembler >> code produced by crypto/bn/asm/x86-mont.pl is used. > Please verify http://cvs.openssl.org/chngview?cn=21811. Thanks for report. > > Out of curiosity. The bug is in legacy integer-only code path, one that > isn't normally chosen on contemporary CPUs. How did you run into it? I > mean is it very old CPU? Embedded one without SSE2? Or do you > consciously omit SSE2 support? > > > ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List [email protected] Automated List Manager [email protected]
