bn_gf2m.c (194206) | bn_gf2m.c (205128) |
---|---|
1/* crypto/bn/bn_gf2m.c */ 2/* ==================================================================== 3 * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. 4 * 5 * The Elliptic Curve Public-Key Crypto Library (ECC Code) included 6 * herein is developed by SUN MICROSYSTEMS, INC., and is contributed 7 * to the OpenSSL project. 8 * --- 280 unchanged lines hidden (view full) --- 289 const BIGNUM *at, *bt; 290 291 bn_check_top(a); 292 bn_check_top(b); 293 294 if (a->top < b->top) { at = b; bt = a; } 295 else { at = a; bt = b; } 296 | 1/* crypto/bn/bn_gf2m.c */ 2/* ==================================================================== 3 * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. 4 * 5 * The Elliptic Curve Public-Key Crypto Library (ECC Code) included 6 * herein is developed by SUN MICROSYSTEMS, INC., and is contributed 7 * to the OpenSSL project. 8 * --- 280 unchanged lines hidden (view full) --- 289 const BIGNUM *at, *bt; 290 291 bn_check_top(a); 292 bn_check_top(b); 293 294 if (a->top < b->top) { at = b; bt = a; } 295 else { at = a; bt = b; } 296 |
297 bn_wexpand(r, at->top); | 297 if(bn_wexpand(r, at->top) == NULL) 298 return 0; |
298 299 for (i = 0; i < bt->top; i++) 300 { 301 r->d[i] = at->d[i] ^ bt->d[i]; 302 } 303 for (; i < at->top; i++) 304 { 305 r->d[i] = at->d[i]; --- 790 unchanged lines hidden --- | 299 300 for (i = 0; i < bt->top; i++) 301 { 302 r->d[i] = at->d[i] ^ bt->d[i]; 303 } 304 for (; i < at->top; i++) 305 { 306 r->d[i] = at->d[i]; --- 790 unchanged lines hidden --- |