0758b6837e
These functions already require their inputs to be reduced mod N (or, in some cases, bounded by R or N*R), so negative numbers are nonsense. The code still attempted to account for them by working on the absolute value and fiddling with the sign bit. (The output would be in range (-N, N) instead of [0, N).) This complicates relaxing bn_correct_top because bn_correct_top is also used to prevent storing a negative zero. Instead, just reject negative inputs. Upgrade-Note: These functions are public API, so some callers may notice. Code search suggests there is only one caller outside BoringSSL, and it looks fine. Bug: 232 Change-Id: Ieba3acbb36b0ff6b72b8ed2b14882ec9b88e4665 Reviewed-on: https://boringssl-review.googlesource.com/25249 Reviewed-by: Adam Langley <agl@google.com> |
||
---|---|---|
.. | ||
aes | ||
bn | ||
cipher | ||
des | ||
digest | ||
ec | ||
ecdsa | ||
hmac | ||
md4 | ||
md5 | ||
modes | ||
policydocs | ||
rand | ||
rsa | ||
self_check | ||
sha | ||
tls | ||
bcm.c | ||
CMakeLists.txt | ||
delocate.h | ||
FIPS.md | ||
intcheck1.png | ||
intcheck2.png | ||
intcheck3.png | ||
is_fips.c |