diff options
author | tb <> | 2025-05-20 18:21:34 +0000 |
---|---|---|
committer | tb <> | 2025-05-20 18:21:34 +0000 |
commit | 97c7a3936d826decb38407bb9eb559b20b21a5ef (patch) | |
tree | 3dfdda858887c10095a3e616ad76fcf78ec4bd30 /src/lib/libcrypto/mlkem/mlkem1024.c | |
parent | c83a8e02e51e7ea9d6fe6162492db7c1dca3725c (diff) | |
download | openbsd-97c7a3936d826decb38407bb9eb559b20b21a5ef.tar.gz openbsd-97c7a3936d826decb38407bb9eb559b20b21a5ef.tar.bz2 openbsd-97c7a3936d826decb38407bb9eb559b20b21a5ef.zip |
Unbreak GHASH on some architectures setting GHASH_ASM
The last #else branch in CRYPTO_gcm128_init() doesn't initialize the
function pointers for gmult/ghash, which results in a segfault when
using GCM on architectures taking this branch, notably sparc64.
found by and fix from jca
Diffstat (limited to 'src/lib/libcrypto/mlkem/mlkem1024.c')
0 files changed, 0 insertions, 0 deletions