Hello,

> Please verify http://cvs.openssl.org/chngview?cn=21811. Thanks for report.
Thank you, version 1.13 works fine.

> Out of curiosity. The bug is in legacy integer-only code path, one that
> isn't normally chosen on contemporary CPUs. How did you run into it? I
> mean is it very old CPU? Embedded one without SSE2? Or do you
> consciously omit SSE2 support?
You are right, the processor is rather old. Excuse me please,I probably 
should have mentioned this before.

---
Sincerely yours,
Victor Timakov

09.12.2011 18:35, Andy Polyakov via RT ?????:
>> It looks like a bug inopenssl-1.0.0e x86 (Windows, Linux, etc.):
>> functions BN_mod_mul and BN_mod_mul_mongomery sometimes (very rarely)
>> yield different results when squaring (multiplication at the same time
>> works fine).
>> Compile time options include -DOPENSSL_BN_ASM_MONT, ie the assembler
>> code produced by crypto/bn/asm/x86-mont.pl is used.
> Please verify http://cvs.openssl.org/chngview?cn=21811. Thanks for report.
>
> Out of curiosity. The bug is in legacy integer-only code path, one that
> isn't normally chosen on contemporary CPUs. How did you run into it? I
> mean is it very old CPU? Embedded one without SSE2? Or do you
> consciously omit SSE2 support?
>
>
>


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [email protected]
Automated List Manager                           [email protected]

Reply via email to