Commit bd45a8d1 authored by Andy Polyakov's avatar Andy Polyakov
Browse files

bn/asm/sparcv9-mont.pl: iron another glitch in squaring code path.



This module is used only with odd input lengths, i.e. not used in normal
PKI cases, on contemporary processors. The problem was "illuminated" by
fuzzing tests.

Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/6440)

(cherry picked from commit f55ef97b)
parent 278f65ee
Loading
Loading
Loading
Loading
+3 −0
Original line number Diff line number Diff line
@@ -483,6 +483,9 @@ $code.=<<___;
	mulx	$npj,$mul1,$acc1
	add	$tpj,$car1,$car1
	ld	[$np+$j],$npj			! np[j]
	srlx	$car1,32,$tmp0
	and	$car1,$mask,$car1
	add	$tmp0,$sbit,$sbit
	add	$acc0,$car1,$car1
	ld	[$tp+8],$tpj			! tp[j]
	add	$acc1,$car1,$car1