diff options
author | Jesse Duffield <jessedduffield@gmail.com> | 2019-11-13 22:28:41 +1100 |
---|---|---|
committer | Jesse Duffield <jessedduffield@gmail.com> | 2019-11-14 09:41:56 +1100 |
commit | 30aed94aa8451911fc1c5ba1e52ff28b180a8d31 (patch) | |
tree | b8d68cfe129a94b42077aa2f912da519bfc95e8c /vendor/golang.org/x/crypto/poly1305/sum_s390x.go | |
parent | 3b1d705473494cca9894ec051d9d928c0c8926c7 (diff) |
update go gitv0.10.6
Diffstat (limited to 'vendor/golang.org/x/crypto/poly1305/sum_s390x.go')
-rw-r--r-- | vendor/golang.org/x/crypto/poly1305/sum_s390x.go | 5 |
1 files changed, 1 insertions, 4 deletions
diff --git a/vendor/golang.org/x/crypto/poly1305/sum_s390x.go b/vendor/golang.org/x/crypto/poly1305/sum_s390x.go index ec99e07e9..a8920ee9d 100644 --- a/vendor/golang.org/x/crypto/poly1305/sum_s390x.go +++ b/vendor/golang.org/x/crypto/poly1305/sum_s390x.go @@ -22,10 +22,7 @@ func poly1305vx(out *[16]byte, m *byte, mlen uint64, key *[32]byte) //go:noescape func poly1305vmsl(out *[16]byte, m *byte, mlen uint64, key *[32]byte) -// Sum generates an authenticator for m using a one-time key and puts the -// 16-byte result into out. Authenticating two different messages with the same -// key allows an attacker to forge messages at will. -func Sum(out *[16]byte, m []byte, key *[32]byte) { +func sum(out *[16]byte, m []byte, key *[32]byte) { if cpu.S390X.HasVX { var mPtr *byte if len(m) > 0 { |