BN_mod_exp(r,a,p,m,ctx) should not be called with r == p.
authorBodo Möller <bodo@openssl.org>
Thu, 30 Nov 2000 20:03:24 +0000 (20:03 +0000)
committerBodo Möller <bodo@openssl.org>
Thu, 30 Nov 2000 20:03:24 +0000 (20:03 +0000)
commit470fa98f8aa5ca37e7e6720be7ca1abda8f906f0
tree200e9d0a7e1945687469b76fa7dd20d9ac2fe349
parentde6e207db6e1e08a40f5a6fdc15725d2f656e328
BN_mod_exp(r,a,p,m,ctx) should not be called with r == p.
But even if this is avoided, there are still segmentation violations
(during one of the BN_free()s at the end of test_kron
in some cases, in other cases during BN_kronecker, or
later in BN_sqrt; choosing a different exponentiation
algorithm in bntest.c appears to influence when the SIGSEGV
takes place).
crypto/bn/bntest.c