boringssl/crypto/bn/asm
David Benjamin 7f2ee3522d bn/asm/x86_64-mont.pl: fix for CVE-2016-7055 (not affected).
(Imported from upstream's 2a7dd548a6f5d6f7f84a89c98323b70a2822406e and
9ebcbbba81eba52282df9ad8902f047e2d501f51.)

This is only in the ADX assembly codepath which we do not enable. See
$addx = 0 at the top of the file. Nonetheless, import the test vector
and fix since we still have the code in there.

Upstream's test vector only compares a*b against b*a. The expected
answer was computed using Python.

Change-Id: I3a21093978c5946d83f2d6f4f8399f69d78202cf
Reviewed-on: https://boringssl-review.googlesource.com/12186
Commit-Queue: David Benjamin <davidben@google.com>
Reviewed-by: Adam Langley <agl@google.com>
2016-11-10 16:01:39 +00:00
..
armv4-mont.pl Switch perlasm calling convention. 2016-06-27 21:59:26 +00:00
armv8-mont.pl
bn-586.pl Switch perlasm calling convention. 2016-06-27 21:59:26 +00:00
co-586.pl Switch perlasm calling convention. 2016-06-27 21:59:26 +00:00
rsaz-avx2.pl Switch perlasm calling convention. 2016-06-27 21:59:26 +00:00
rsaz-x86_64.pl Switch perlasm calling convention. 2016-06-27 21:59:26 +00:00
x86_64-gcc.c Fix up macros. 2016-10-18 18:28:23 +00:00
x86_64-mont5.pl Switch perlasm calling convention. 2016-06-27 21:59:26 +00:00
x86_64-mont.pl bn/asm/x86_64-mont.pl: fix for CVE-2016-7055 (not affected). 2016-11-10 16:01:39 +00:00
x86-mont.pl Switch perlasm calling convention. 2016-06-27 21:59:26 +00:00