summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/asn1/a_int.c
diff options
context:
space:
mode:
authormiod <>2015-03-18 05:26:10 +0000
committermiod <>2015-03-18 05:26:10 +0000
commit5018b21486fe3d91084c0d32a86d1240d832e25e (patch)
treee1d52e8097383e7013cf5ce2bd929fe8f0cfaa67 /src/lib/libcrypto/asn1/a_int.c
parent09abc5bf0229b90d3588a393613e09d669ec3581 (diff)
downloadopenbsd-5018b21486fe3d91084c0d32a86d1240d832e25e.tar.gz
openbsd-5018b21486fe3d91084c0d32a86d1240d832e25e.tar.bz2
openbsd-5018b21486fe3d91084c0d32a86d1240d832e25e.zip
In the neverending saga of enabling and disabling assembler code for sha
routines on hppa, the cause for sha512-parisc subtly misbehaving has been found: despite having fallback pa1.1 code when running on a 32-bit cpu, the shift constants used in the sigma computations in sha512 are >= 32 and are silently truncated to 5 bits by the assembler, so there is no chance of getting this code to work on a non-pa2.0 processor. However, the pa1.1 fallback code for sha256 is safe, as it never attempts to shift by more than 31, so reenable it again.
Diffstat (limited to 'src/lib/libcrypto/asn1/a_int.c')
0 files changed, 0 insertions, 0 deletions