@@ -6,7 +6,7 @@ package aes
6
6
7
7
import (
8
8
"crypto/cipher"
9
- subtleoverlap "crypto/internal/subtle "
9
+ "crypto/internal/alias "
10
10
"crypto/subtle"
11
11
"encoding/binary"
12
12
"errors"
@@ -211,7 +211,7 @@ func (g *gcmAsm) Seal(dst, nonce, plaintext, data []byte) []byte {
211
211
}
212
212
213
213
ret , out := sliceForAppend (dst , len (plaintext )+ g .tagSize )
214
- if subtleoverlap .InexactOverlap (out [:len (plaintext )], plaintext ) {
214
+ if alias .InexactOverlap (out [:len (plaintext )], plaintext ) {
215
215
panic ("crypto/cipher: invalid buffer overlap" )
216
216
}
217
217
@@ -260,7 +260,7 @@ func (g *gcmAsm) Open(dst, nonce, ciphertext, data []byte) ([]byte, error) {
260
260
g .auth (expectedTag [:], ciphertext , data , & tagMask )
261
261
262
262
ret , out := sliceForAppend (dst , len (ciphertext ))
263
- if subtleoverlap .InexactOverlap (out , ciphertext ) {
263
+ if alias .InexactOverlap (out , ciphertext ) {
264
264
panic ("crypto/cipher: invalid buffer overlap" )
265
265
}
266
266
@@ -312,7 +312,7 @@ func (g *gcmKMA) Seal(dst, nonce, plaintext, data []byte) []byte {
312
312
}
313
313
314
314
ret , out := sliceForAppend (dst , len (plaintext )+ g .tagSize )
315
- if subtleoverlap .InexactOverlap (out [:len (plaintext )], plaintext ) {
315
+ if alias .InexactOverlap (out [:len (plaintext )], plaintext ) {
316
316
panic ("crypto/cipher: invalid buffer overlap" )
317
317
}
318
318
@@ -342,7 +342,7 @@ func (g *gcmKMA) Open(dst, nonce, ciphertext, data []byte) ([]byte, error) {
342
342
tag := ciphertext [len (ciphertext )- g .tagSize :]
343
343
ciphertext = ciphertext [:len (ciphertext )- g .tagSize ]
344
344
ret , out := sliceForAppend (dst , len (ciphertext ))
345
- if subtleoverlap .InexactOverlap (out , ciphertext ) {
345
+ if alias .InexactOverlap (out , ciphertext ) {
346
346
panic ("crypto/cipher: invalid buffer overlap" )
347
347
}
348
348
0 commit comments