diff options
author | miod <> | 2015-03-18 05:26:10 +0000 |
---|---|---|
committer | miod <> | 2015-03-18 05:26:10 +0000 |
commit | 5018b21486fe3d91084c0d32a86d1240d832e25e (patch) | |
tree | e1d52e8097383e7013cf5ce2bd929fe8f0cfaa67 /src/lib/libcrypto/asn1/a_set.c | |
parent | 09abc5bf0229b90d3588a393613e09d669ec3581 (diff) | |
download | openbsd-5018b21486fe3d91084c0d32a86d1240d832e25e.tar.gz openbsd-5018b21486fe3d91084c0d32a86d1240d832e25e.tar.bz2 openbsd-5018b21486fe3d91084c0d32a86d1240d832e25e.zip |
In the neverending saga of enabling and disabling assembler code for sha
routines on hppa, the cause for sha512-parisc subtly misbehaving has been
found: despite having fallback pa1.1 code when running on a 32-bit cpu, the
shift constants used in the sigma computations in sha512 are >= 32 and are
silently truncated to 5 bits by the assembler, so there is no chance of
getting this code to work on a non-pa2.0 processor.
However, the pa1.1 fallback code for sha256 is safe, as it never attempts to
shift by more than 31, so reenable it again.
Diffstat (limited to 'src/lib/libcrypto/asn1/a_set.c')
0 files changed, 0 insertions, 0 deletions