diff options
author | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2018-02-05 20:25:23 +0100 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2018-02-05 20:33:52 +0100 |
commit | f0babce286023dfef54b94b44d879064f5e534c1 (patch) | |
tree | 601039319ea98964cc9c8d06e6a47b1b2955c79b | |
parent | b5710bbb22bcf429bff070eb14ea82de838e5987 (diff) | |
download | gnutls-f0babce286023dfef54b94b44d879064f5e534c1.tar.gz |
accelerated: fix use of aesni_ecb_encrypt()
Previously we assumed that the nettle GCM internal functions
will use the provided ECB function for single block encryption.
Newer versions no longer operate that way. Ensure that we
are compatible with them.
Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
-rw-r--r-- | lib/accelerated/x86/aes-gcm-x86-aesni.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/lib/accelerated/x86/aes-gcm-x86-aesni.c b/lib/accelerated/x86/aes-gcm-x86-aesni.c index 0d943307eb..2a89f46a8b 100644 --- a/lib/accelerated/x86/aes-gcm-x86-aesni.c +++ b/lib/accelerated/x86/aes-gcm-x86-aesni.c @@ -55,7 +55,7 @@ static void x86_aes_encrypt(void *_ctx, { AES_KEY *ctx = _ctx; - aesni_ecb_encrypt(src, dst, 16, ctx, 1); + aesni_ecb_encrypt(src, dst, length, ctx, 1); } #ifdef USE_NETTLE3 |