bn_sqr bug fix as in main
authorUlf Möller <ulf@openssl.org>
Wed, 5 Sep 2001 04:45:45 +0000 (04:45 +0000)
committerUlf Möller <ulf@openssl.org>
Wed, 5 Sep 2001 04:45:45 +0000 (04:45 +0000)
CHANGES
crypto/bn/bn_sqr.c

diff --git a/CHANGES b/CHANGES
index 1fd2e2841a7ebc1dd5130d76ce52fada36bbb795..ddf9e6ea5e26939a6cd6ada41c13d150533051f4 100644 (file)
--- a/CHANGES
+++ b/CHANGES
@@ -4,6 +4,9 @@
 
  Changes between 0.9.6b and 0.9.6c  [XX xxx XXXX]
 
+  *) BN_sqr() bug fix.
+     [Ulf Möller, reported by Jim Ellis <jim.ellis@cavium.com>]
+
   *) Rabin-Miller test analyses assume uniformly distributed witnesses,
      so use BN_pseudo_rand_range() instead of using BN_pseudo_rand()
      followed by modular reduction.
index 75f4f38392dcb686f005800652c23de64ea76efd..09bd3377bf99f67256dbdb2c2f7e35dc393b78bc 100644 (file)
@@ -245,7 +245,7 @@ printf(" bn_sqr_recursive %d * %d\n",n2,n2);
        if (!zero)
                bn_sqr_recursive(&(t[n2]),t,n,p);
        else
-               memset(&(t[n2]),0,n*sizeof(BN_ULONG));
+               memset(&(t[n2]),0,n2*sizeof(BN_ULONG));
        bn_sqr_recursive(r,a,n,p);
        bn_sqr_recursive(&(r[n2]),&(a[n]),n,p);