diff options
| author | Chunrong Guo <chunrong.guo@nxp.com> | 2018-09-29 16:59:47 +0800 |
|---|---|---|
| committer | Otavio Salvador <otavio@ossystems.com.br> | 2018-10-01 13:51:02 -0300 |
| commit | 948d257eee170bf1d6dc40a01d9bf17a3c3549b9 (patch) | |
| tree | 2602d7d34fe85807f1b45c97821c9bb5ae4e9db0 /recipes-connectivity/openssl/openssl-qoriq/openssl-1.0.2a-x32-asm.patch | |
| parent | 6c2aabd5a2f5e81c1f1b18df20523cd12d6a344e (diff) | |
| download | meta-freescale-948d257eee170bf1d6dc40a01d9bf17a3c3549b9.tar.gz | |
openssl-qoriq: update to 1.1.0
*update to lsdk 1809 tag
include the following changes:
c2300d1 - eng_cryptodev: add support for TLS algorithms offload
b2758a2 - Prepare for 1.1.0g release
6190960 - Update CHANGES and NEWS for new release
4443cf7 - bn/asm/x86_64-mont5.pl: fix carry bug in bn_sqrx8x_internal.
b701fa8 - Fix small but important regression
ab91952 - Address a timing side channel whereby it is possible to determine some
7184480 - Address a timing side channel whereby it is possible to determine some
bb0c588 - Travis: Add a docs checking job
df45d1a - docs: assign section 7 where appropriate
847685c - doc/crypto/OPENSSL_secure_malloc: add missing names
4401e28 - docs: fixup OpenSSL version style
41d74a5 - Adapt util/find-doc-nits back to 1.1.0
7fb4278 - Fix EVP_PKEY_ASN1_METHOD manual
0d9fece - afalg: Fix kernel version check
a0c2626 - afalg: Use eventfd2 syscall instead of eventfd
605fa68 - EVP_PKEY_asn1_add0(): Check that this method isn't already registered
6088fb7 - Document EVP_PKEY_ASN1_METHOD and associated functions
5a3d24a - Only reset the ctx when a cipher is given
257a03c - Add missing paren.
*update to 1.1.1
Signed-off-by: Chunrong Guo <chunrong.guo@nxp.com>
Signed-off-by: Otavio Salvador <otavio@ossystems.com.br>
Diffstat (limited to 'recipes-connectivity/openssl/openssl-qoriq/openssl-1.0.2a-x32-asm.patch')
| -rw-r--r-- | recipes-connectivity/openssl/openssl-qoriq/openssl-1.0.2a-x32-asm.patch | 46 |
1 files changed, 0 insertions, 46 deletions
diff --git a/recipes-connectivity/openssl/openssl-qoriq/openssl-1.0.2a-x32-asm.patch b/recipes-connectivity/openssl/openssl-qoriq/openssl-1.0.2a-x32-asm.patch deleted file mode 100644 index 1e5bfa17d..000000000 --- a/recipes-connectivity/openssl/openssl-qoriq/openssl-1.0.2a-x32-asm.patch +++ /dev/null | |||
| @@ -1,46 +0,0 @@ | |||
| 1 | https://rt.openssl.org/Ticket/Display.html?id=3759&user=guest&pass=guest | ||
| 2 | |||
| 3 | From 6257d59b3a68d2feb9d64317a1c556dc3813ee61 Mon Sep 17 00:00:00 2001 | ||
| 4 | From: Mike Frysinger <vapier@gentoo.org> | ||
| 5 | Date: Sat, 21 Mar 2015 06:01:25 -0400 | ||
| 6 | Subject: [PATCH] crypto: use bigint in x86-64 perl | ||
| 7 | |||
| 8 | Upstream-Status: Pending | ||
| 9 | Signed-off-by: Cristian Iorga <cristian.iorga@intel.com> | ||
| 10 | |||
| 11 | When building on x32 systems where the default type is 32bit, make sure | ||
| 12 | we can transparently represent 64bit integers. Otherwise we end up with | ||
| 13 | build errors like: | ||
| 14 | /usr/bin/perl asm/ghash-x86_64.pl elf > ghash-x86_64.s | ||
| 15 | Integer overflow in hexadecimal number at asm/../../perlasm/x86_64-xlate.pl line 201, <> line 890. | ||
| 16 | ... | ||
| 17 | ghash-x86_64.s: Assembler messages: | ||
| 18 | ghash-x86_64.s:890: Error: junk '.15473355479995e+19' after expression | ||
| 19 | |||
| 20 | We don't enable this globally as there are some cases where we'd get | ||
| 21 | 32bit values interpreted as unsigned when we need them as signed. | ||
| 22 | |||
| 23 | Reported-by: Bertrand Jacquin <bertrand@jacquin.bzh> | ||
| 24 | URL: https://bugs.gentoo.org/542618 | ||
| 25 | --- | ||
| 26 | crypto/perlasm/x86_64-xlate.pl | 4 ++++ | ||
| 27 | 1 file changed, 4 insertions(+) | ||
| 28 | |||
| 29 | diff --git a/crypto/perlasm/x86_64-xlate.pl b/crypto/perlasm/x86_64-xlate.pl | ||
| 30 | index aae8288..0bf9774 100755 | ||
| 31 | --- a/crypto/perlasm/x86_64-xlate.pl | ||
| 32 | +++ b/crypto/perlasm/x86_64-xlate.pl | ||
| 33 | @@ -195,6 +195,10 @@ my %globals; | ||
| 34 | sub out { | ||
| 35 | my $self = shift; | ||
| 36 | |||
| 37 | + # When building on x32 ABIs, the expanded hex value might be too | ||
| 38 | + # big to fit into 32bits. Enable transparent 64bit support here | ||
| 39 | + # so we can safely print it out. | ||
| 40 | + use bigint; | ||
| 41 | if ($gas) { | ||
| 42 | # Solaris /usr/ccs/bin/as can't handle multiplications | ||
| 43 | # in $self->{value} | ||
| 44 | -- | ||
| 45 | 2.3.3 | ||
| 46 | |||
