Commit e13d8f7b authored by Andy Polyakov's avatar Andy Polyakov
Browse files

bn/asm/sparcv9-mont.pl: iron another glitch in squaring code path.



This module is used only with odd input lengths, i.e. not used in normal
PKI cases, on contemporary processors. The problem was "illuminated" by
fuzzing tests.

Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/6440)

(cherry picked from commit f55ef97b)
parent 776ad43f
Loading
Loading
Loading
Loading
+3 −0
Original line number Diff line number Diff line
@@ -493,6 +493,9 @@ $code.=<<___;
	mulx	$npj,$mul1,$acc1
	add	$tpj,$car1,$car1
	ld	[$np+$j],$npj			! np[j]
	srlx	$car1,32,$tmp0
	and	$car1,$mask,$car1
	add	$tmp0,$sbit,$sbit
	add	$acc0,$car1,$car1
	ld	[$tp+8],$tpj			! tp[j]
	add	$acc1,$car1,$car1