diff options
author | David Benjamin <davidben@google.com> | 2016-06-16 14:58:36 -0400 |
---|---|---|
committer | Andreas Blaesius <skate4life@gmx.de> | 2017-07-17 23:33:15 +0200 |
commit | 4588ecdba231bdf779296e3597c9180dee15a98b (patch) | |
tree | 3bcb23465b50a7101d0e6465a6c1a3a0dfbd1605 /src/crypto/sha/asm/sha256-586.pl | |
parent | ce75465cb83e2077de3ba1b7fa9d35c4b4974249 (diff) | |
download | external_boringssl-4588ecdba231bdf779296e3597c9180dee15a98b.tar.gz external_boringssl-4588ecdba231bdf779296e3597c9180dee15a98b.tar.bz2 external_boringssl-4588ecdba231bdf779296e3597c9180dee15a98b.zip |
DO NOT MERGE
Always use Fermat's Little Theorem in ecdsa_sign_setup.
The case where ec_group_get_mont_data is NULL is only for arbitrary groups
which we now require to be prime order. BN_mod_exp_mont is fine with a NULL
BN_MONT_CTX. It will just compute it. Saves a bit of special-casing.
Also don't mark p-2 as BN_FLG_CONSTTIME as the exponent is public anyway.
(cherry picked from commit 8cf79af7d1497c07bd684764b96c9659e7b32ae1)
Bug: 33752052
Change-Id: Ia57cf8b68415742233b5c70e9da901b0f2954e7a
(cherry picked from commit c5f118738a61b533d90b01841664e6480e0692fe)
Diffstat (limited to 'src/crypto/sha/asm/sha256-586.pl')
0 files changed, 0 insertions, 0 deletions