summaryrefslogtreecommitdiff
path: root/vendor/golang.org/x/crypto/curve25519
diff options
context:
space:
mode:
authorLokesh Mandvekar <lsm5@fedoraproject.org>2022-04-12 09:29:36 -0400
committerLokesh Mandvekar <lsm5@fedoraproject.org>2022-04-12 10:24:32 -0400
commit5e680d54e9e8b849b90047d2d87bc7664edaaa1d (patch)
tree4f9b314d7211bd04d030f6aa6563ddd8628a60b8 /vendor/golang.org/x/crypto/curve25519
parent9822c46981226c3296b5ad7833d8937cfc3ece49 (diff)
downloadpodman-5e680d54e9e8b849b90047d2d87bc7664edaaa1d.tar.gz
podman-5e680d54e9e8b849b90047d2d87bc7664edaaa1d.tar.bz2
podman-5e680d54e9e8b849b90047d2d87bc7664edaaa1d.zip
Bump golang.org/x/crypto to 7b82a4e
Resolves: GHSA-8c26-wmh5-6g9v - CVE-2022-27191 Podman doesn't seem to be directly affected as the logic in question is not called. golang.org/x/crypto@1baeb1ce contains the actual CVE fix. Using the latest upstream commit to also include support for SHA-2. Signed-off-by: Lokesh Mandvekar <lsm5@fedoraproject.org>
Diffstat (limited to 'vendor/golang.org/x/crypto/curve25519')
-rw-r--r--vendor/golang.org/x/crypto/curve25519/internal/field/fe_amd64.go3
1 files changed, 3 insertions, 0 deletions
diff --git a/vendor/golang.org/x/crypto/curve25519/internal/field/fe_amd64.go b/vendor/golang.org/x/crypto/curve25519/internal/field/fe_amd64.go
index 44dc8e8ca..edcf163c4 100644
--- a/vendor/golang.org/x/crypto/curve25519/internal/field/fe_amd64.go
+++ b/vendor/golang.org/x/crypto/curve25519/internal/field/fe_amd64.go
@@ -1,13 +1,16 @@
// Code generated by command: go run fe_amd64_asm.go -out ../fe_amd64.s -stubs ../fe_amd64.go -pkg field. DO NOT EDIT.
+//go:build amd64 && gc && !purego
// +build amd64,gc,!purego
package field
// feMul sets out = a * b. It works like feMulGeneric.
+//
//go:noescape
func feMul(out *Element, a *Element, b *Element)
// feSquare sets out = a * a. It works like feSquareGeneric.
+//
//go:noescape
func feSquare(out *Element, a *Element)