Permalink
Browse files

deps: upgrade openssl sources to 1.0.2n

This replaces all sources of openssl-1.0.2n.tar.gz into
deps/openssl/openssl

PR-URL: #17526
Reviewed-By: Tobias Nießen <tniessen@tnie.de>
Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl>
Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
Reviewed-By: Myles Borins <myles.borins@gmail.com>
Reviewed-By: Michael Dawson <michael_dawson@ca.ibm.com>
Reviewed-By: Daniel Bevenius <daniel.bevenius@gmail.com>
  • Loading branch information...
shigeki authored and MylesBorins committed Dec 7, 2017
1 parent 157d4b1 commit 03651ad9d6f9748cd07592907a1b6d794b4d1bcd
Showing with 592 additions and 38,647 deletions.
  1. +45 −0 deps/openssl/openssl/CHANGES
  2. +2 −2 deps/openssl/openssl/Configure
  3. +1 −1 deps/openssl/openssl/Makefile
  4. +1 −1 deps/openssl/openssl/Makefile.bak
  5. +5 −0 deps/openssl/openssl/NEWS
  6. +1 −1 deps/openssl/openssl/README
  7. +1 −10 deps/openssl/openssl/apps/app_rand.c
  8. +6 −2 deps/openssl/openssl/apps/apps.c
  9. +3 −0 deps/openssl/openssl/apps/dsa.c
  10. +13 −27 deps/openssl/openssl/apps/s_client.c
  11. +2 −2 deps/openssl/openssl/apps/speed.c
  12. +3 −3 deps/openssl/openssl/crypto/aes/asm/aes-armv4.pl
  13. +3 −3 deps/openssl/openssl/crypto/aes/asm/bsaes-armv7.pl
  14. +3 −0 deps/openssl/openssl/crypto/asn1/a_i2d_fp.c
  15. +2 −2 deps/openssl/openssl/crypto/bio/b_print.c
  16. +7 −8 deps/openssl/openssl/crypto/bn/asm/rsaz-avx2.pl
  17. +4 −4 deps/openssl/openssl/crypto/bn/bn_exp.c
  18. +6 −2 deps/openssl/openssl/crypto/dsa/dsa_ameth.c
  19. +1 −0 deps/openssl/openssl/crypto/engine/eng_fat.c
  20. +1 −1 deps/openssl/openssl/crypto/lhash/lhash.c
  21. +265 −1 deps/openssl/openssl/crypto/opensslconf.h
  22. +3 −3 deps/openssl/openssl/crypto/opensslv.h
  23. +7 −7 deps/openssl/openssl/crypto/perlasm/x86masm.pl
  24. +11 −12 deps/openssl/openssl/crypto/rsa/rsa_gen.c
  25. +1 −1 deps/openssl/openssl/crypto/sha/asm/sha256-armv4.pl
  26. +2 −0 deps/openssl/openssl/crypto/symhacks.h
  27. +15 −7 deps/openssl/openssl/crypto/x509v3/v3_lib.c
  28. +1 −1 deps/openssl/openssl/crypto/x509v3/v3_scts.c
  29. +2 −2 deps/openssl/openssl/doc/crypto/EVP_EncryptInit.pod
  30. +0 −149 deps/openssl/openssl/include/openssl/aes.h
  31. +0 −1,419 deps/openssl/openssl/include/openssl/asn1.h
  32. +0 −579 deps/openssl/openssl/include/openssl/asn1_mac.h
  33. +0 −973 deps/openssl/openssl/include/openssl/asn1t.h
  34. +0 −883 deps/openssl/openssl/include/openssl/bio.h
  35. +0 −130 deps/openssl/openssl/include/openssl/blowfish.h
  36. +0 −951 deps/openssl/openssl/include/openssl/bn.h
  37. +0 −125 deps/openssl/openssl/include/openssl/buffer.h
  38. +0 −132 deps/openssl/openssl/include/openssl/camellia.h
  39. +0 −107 deps/openssl/openssl/include/openssl/cast.h
  40. +0 −82 deps/openssl/openssl/include/openssl/cmac.h
  41. +0 −555 deps/openssl/openssl/include/openssl/cms.h
  42. +0 −83 deps/openssl/openssl/include/openssl/comp.h
  43. +0 −268 deps/openssl/openssl/include/openssl/conf.h
  44. +0 −89 deps/openssl/openssl/include/openssl/conf_api.h
  45. +0 −661 deps/openssl/openssl/include/openssl/crypto.h
  46. +0 −257 deps/openssl/openssl/include/openssl/des.h
  47. +0 −497 deps/openssl/openssl/include/openssl/des_old.h
  48. +0 −412 deps/openssl/openssl/include/openssl/dh.h
  49. +0 −332 deps/openssl/openssl/include/openssl/dsa.h
  50. +0 −451 deps/openssl/openssl/include/openssl/dso.h
  51. +0 −272 deps/openssl/openssl/include/openssl/dtls1.h
  52. +0 −328 deps/openssl/openssl/include/openssl/e_os2.h
  53. +0 −26 deps/openssl/openssl/include/openssl/ebcdic.h
  54. +0 −1,282 deps/openssl/openssl/include/openssl/ec.h
  55. +0 −134 deps/openssl/openssl/include/openssl/ecdh.h
  56. +0 −335 deps/openssl/openssl/include/openssl/ecdsa.h
  57. +0 −960 deps/openssl/openssl/include/openssl/engine.h
  58. +0 −390 deps/openssl/openssl/include/openssl/err.h
  59. +0 −1,628 deps/openssl/openssl/include/openssl/evp.h
  60. +0 −109 deps/openssl/openssl/include/openssl/hmac.h
  61. +0 −105 deps/openssl/openssl/include/openssl/idea.h
  62. +0 −240 deps/openssl/openssl/include/openssl/krb5_asn.h
  63. +0 −197 deps/openssl/openssl/include/openssl/kssl.h
  64. +0 −240 deps/openssl/openssl/include/openssl/lhash.h
  65. +0 −119 deps/openssl/openssl/include/openssl/md4.h
  66. +0 −119 deps/openssl/openssl/include/openssl/md5.h
  67. +0 −94 deps/openssl/openssl/include/openssl/mdc2.h
  68. +0 −163 deps/openssl/openssl/include/openssl/modes.h
  69. +0 −4,194 deps/openssl/openssl/include/openssl/obj_mac.h
  70. +0 −1,143 deps/openssl/openssl/include/openssl/objects.h
  71. +0 −637 deps/openssl/openssl/include/openssl/ocsp.h
  72. +0 −1 deps/openssl/openssl/include/openssl/opensslconf.h
  73. +0 −97 deps/openssl/openssl/include/openssl/opensslv.h
  74. +0 −213 deps/openssl/openssl/include/openssl/ossl_typ.h
  75. +0 −617 deps/openssl/openssl/include/openssl/pem.h
  76. +0 −70 deps/openssl/openssl/include/openssl/pem2.h
  77. +0 −342 deps/openssl/openssl/include/openssl/pkcs12.h
  78. +0 −481 deps/openssl/openssl/include/openssl/pkcs7.h
  79. +0 −99 deps/openssl/openssl/include/openssl/pqueue.h
  80. +0 −150 deps/openssl/openssl/include/openssl/rand.h
  81. +0 −103 deps/openssl/openssl/include/openssl/rc2.h
  82. +0 −88 deps/openssl/openssl/include/openssl/rc4.h
  83. +0 −105 deps/openssl/openssl/include/openssl/ripemd.h
  84. +0 −664 deps/openssl/openssl/include/openssl/rsa.h
  85. +0 −2,672 deps/openssl/openssl/include/openssl/safestack.h
  86. +0 −149 deps/openssl/openssl/include/openssl/seed.h
  87. +0 −214 deps/openssl/openssl/include/openssl/sha.h
  88. +0 −179 deps/openssl/openssl/include/openssl/srp.h
  89. +0 −147 deps/openssl/openssl/include/openssl/srtp.h
  90. +0 −3,163 deps/openssl/openssl/include/openssl/ssl.h
  91. +0 −265 deps/openssl/openssl/include/openssl/ssl2.h
  92. +0 −84 deps/openssl/openssl/include/openssl/ssl23.h
  93. +0 −774 deps/openssl/openssl/include/openssl/ssl3.h
  94. +0 −107 deps/openssl/openssl/include/openssl/stack.h
  95. +0 −516 deps/openssl/openssl/include/openssl/symhacks.h
  96. +0 −810 deps/openssl/openssl/include/openssl/tls1.h
  97. +0 −865 deps/openssl/openssl/include/openssl/ts.h
  98. +0 −112 deps/openssl/openssl/include/openssl/txt_db.h
  99. +0 −415 deps/openssl/openssl/include/openssl/ui.h
  100. +0 −88 deps/openssl/openssl/include/openssl/ui_compat.h
  101. +0 −41 deps/openssl/openssl/include/openssl/whrlpool.h
  102. +0 −1,330 deps/openssl/openssl/include/openssl/x509.h
  103. +0 −652 deps/openssl/openssl/include/openssl/x509_vfy.h
  104. +0 −1,055 deps/openssl/openssl/include/openssl/x509v3.h
  105. +1 −1 deps/openssl/openssl/openssl.spec
  106. +2 −1 deps/openssl/openssl/ssl/Makefile
  107. +10 −10 deps/openssl/openssl/ssl/bad_dtls_test.c
  108. +109 −0 deps/openssl/openssl/ssl/fatalerrtest.c
  109. +2 −0 deps/openssl/openssl/ssl/s23_clnt.c
  110. +8 −2 deps/openssl/openssl/ssl/s3_pkt.c
  111. +1 −1 deps/openssl/openssl/ssl/ssl.h
  112. +3 −2 deps/openssl/openssl/ssl/ssltest.c
  113. +1 −1 deps/openssl/openssl/ssl/t1_lib.c
  114. +31 −4 deps/openssl/openssl/test/Makefile
  115. +2 −1 deps/openssl/openssl/util/copy-if-different.pl
  116. +2 −1 deps/openssl/openssl/util/copy.pl
  117. +2 −1 deps/openssl/openssl/util/libeay.num
  118. +1 −1 deps/openssl/openssl/util/mk1mf.pl
@@ -7,6 +7,51 @@
https://github.com/openssl/openssl/commits/ and pick the appropriate
release branch.
Changes between 1.0.2m and 1.0.2n [7 Dec 2017]
*) Read/write after SSL object in error state
OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state"
mechanism. The intent was that if a fatal error occurred during a handshake
then OpenSSL would move into the error state and would immediately fail if
you attempted to continue the handshake. This works as designed for the
explicit handshake functions (SSL_do_handshake(), SSL_accept() and
SSL_connect()), however due to a bug it does not work correctly if
SSL_read() or SSL_write() is called directly. In that scenario, if the
handshake fails then a fatal error will be returned in the initial function
call. If SSL_read()/SSL_write() is subsequently called by the application
for the same SSL object then it will succeed and the data is passed without
being decrypted/encrypted directly from the SSL/TLS record layer.
In order to exploit this issue an application bug would have to be present
that resulted in a call to SSL_read()/SSL_write() being issued after having
already received a fatal error.
This issue was reported to OpenSSL by David Benjamin (Google).
(CVE-2017-3737)
[Matt Caswell]
*) rsaz_1024_mul_avx2 overflow bug on x86_64
There is an overflow bug in the AVX2 Montgomery multiplication procedure
used in exponentiation with 1024-bit moduli. No EC algorithms are affected.
Analysis suggests that attacks against RSA and DSA as a result of this
defect would be very difficult to perform and are not believed likely.
Attacks against DH1024 are considered just feasible, because most of the
work necessary to deduce information about a private key may be performed
offline. The amount of resources required for such an attack would be
significant. However, for an attack on TLS to be meaningful, the server
would have to share the DH1024 private key among multiple clients, which is
no longer an option since CVE-2016-0701.
This only affects processors that support the AVX2 but not ADX extensions
like Intel Haswell (4th generation).
This issue was reported to OpenSSL by David Benjamin (Google). The issue
was originally found via the OSS-Fuzz project.
(CVE-2017-3738)
[Andy Polyakov]
Changes between 1.0.2l and 1.0.2m [2 Nov 2017]
*) bn_sqrx8x_internal carry bug on x86_64
@@ -592,9 +592,9 @@ my %table=(
"debug-VC-WIN64A","cl:-W3 -Gs0 -Gy -Zi -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DUNICODE -D_UNICODE -D_CRT_SECURE_NO_DEPRECATE:::WIN64A::SIXTY_FOUR_BIT RC4_CHUNK_LL DES_INT EXPORT_VAR_AS_FN:".eval{my $asm=$x86_64_asm;$asm=~s/x86_64-gcc\.o/bn_asm.o/;$asm}.":auto:win32",
# x86 Win32 target defaults to ANSI API, if you want UNICODE, complement
# 'perl Configure VC-WIN32' with '-DUNICODE -D_UNICODE'
"VC-WIN32","cl:-W3 -Gs0 -GF -Gy -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -D_CRT_SECURE_NO_DEPRECATE:::WIN32::BN_LLONG RC4_INDEX EXPORT_VAR_AS_FN ${x86_gcc_opts}:${x86_asm}:win32n:win32",
"VC-WIN32","cl:-W3 -WX -Gs0 -GF -Gy -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -D_CRT_SECURE_NO_DEPRECATE -D_WINSOCK_DEPRECATED_NO_WARNINGS:::WIN32::BN_LLONG RC4_INDEX EXPORT_VAR_AS_FN ${x86_gcc_opts}:${x86_asm}:win32n:win32",
# Unified CE target
"debug-VC-WIN32","cl:-W3 -Gs0 -GF -Gy -Zi -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -D_CRT_SECURE_NO_DEPRECATE:::WIN32::BN_LLONG RC4_INDEX EXPORT_VAR_AS_FN ${x86_gcc_opts}:${x86_asm}:win32n:win32",
"debug-VC-WIN32","cl:-W3 -WX -Gs0 -GF -Gy -Zi -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -D_CRT_SECURE_NO_DEPRECATE -D_WINSOCK_DEPRECATED_NO_WARNINGS:::WIN32::BN_LLONG RC4_INDEX EXPORT_VAR_AS_FN ${x86_gcc_opts}:${x86_asm}:win32n:win32",
"VC-CE","cl::::WINCE::BN_LLONG RC4_INDEX EXPORT_VAR_AS_FN ${x86_gcc_opts}:${no_asm}:win32",
# Borland C++ 4.5
@@ -4,7 +4,7 @@
## Makefile for OpenSSL
##
VERSION=1.0.2m
VERSION=1.0.2n
MAJOR=1
MINOR=0.2
SHLIB_VERSION_NUMBER=1.0.0
@@ -4,7 +4,7 @@
## Makefile for OpenSSL
##
VERSION=1.0.2m
VERSION=1.0.2n
MAJOR=1
MINOR=0.2
SHLIB_VERSION_NUMBER=1.0.0
@@ -5,6 +5,11 @@
This file gives a brief overview of the major changes between each OpenSSL
release. For more details please read the CHANGES file.
Major changes between OpenSSL 1.0.2m and OpenSSL 1.0.2n [7 Dec 2017]
o Read/write after SSL object in error state (CVE-2017-3737)
o rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738)
Major changes between OpenSSL 1.0.2l and OpenSSL 1.0.2m [2 Nov 2017]
o bn_sqrx8x_internal carry bug on x86_64 (CVE-2017-3736)
@@ -1,5 +1,5 @@
OpenSSL 1.0.2m 2 Nov 2017
OpenSSL 1.0.2n 7 Dec 2017
Copyright (c) 1998-2015 The OpenSSL Project
Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
@@ -124,16 +124,7 @@ int app_RAND_load_file(const char *file, BIO *bio_e, int dont_warn)
char buffer[200];
#ifdef OPENSSL_SYS_WINDOWS
/*
* allocate 2 to dont_warn not to use RAND_screen() via
* -no_rand_screen option in s_client
*/
if (dont_warn != 2) {
BIO_printf(bio_e, "Loading 'screen' into random state -");
BIO_flush(bio_e);
RAND_screen();
BIO_printf(bio_e, " done\n");
}
RAND_screen();
#endif
if (file == NULL)
@@ -148,6 +148,10 @@
#ifdef _WIN32
static int WIN32_rename(const char *from, const char *to);
# define rename(from,to) WIN32_rename((from),(to))
# ifdef fileno
# undef fileno
# endif
# define fileno(a) (int)_fileno(a)
#endif
typedef struct {
@@ -2788,13 +2792,13 @@ unsigned char *next_protos_parse(unsigned short *outlen, const char *in)
OPENSSL_free(out);
return NULL;
}
out[start] = i - start;
out[start] = (unsigned char)(i - start);
start = i + 1;
} else
out[i + 1] = in[i];
}
*outlen = len + 1;
*outlen = (unsigned char)(len + 1);
return out;
}
#endif /* ndef OPENSSL_NO_TLSEXT */
@@ -327,6 +327,9 @@ int MAIN(int argc, char **argv)
} else if (outformat == FORMAT_MSBLOB || outformat == FORMAT_PVK) {
EVP_PKEY *pk;
pk = EVP_PKEY_new();
if (pk == NULL)
goto end;
EVP_PKEY_set1_DSA(pk, dsa);
if (outformat == FORMAT_PVK)
i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout);
@@ -180,13 +180,6 @@ typedef unsigned int u_int;
# include <fcntl.h>
#endif
/* Use Windows API with STD_INPUT_HANDLE when checking for input?
Don't look at OPENSSL_SYS_MSDOS for this, since it is always defined if
OPENSSL_SYS_WINDOWS is defined */
#if defined(OPENSSL_SYS_WINDOWS) && !defined(OPENSSL_SYS_WINCE) && defined(STD_INPUT_HANDLE)
#define OPENSSL_USE_STD_INPUT_HANDLE
#endif
#undef PROG
#define PROG s_client_main
@@ -236,7 +229,6 @@ static BIO *bio_c_msg = NULL;
static int c_quiet = 0;
static int c_ign_eof = 0;
static int c_brief = 0;
static int c_no_rand_screen = 0;
#ifndef OPENSSL_NO_PSK
/* Default PSK identity and key */
@@ -452,10 +444,6 @@ static void sc_usage(void)
" -keymatexport label - Export keying material using label\n");
BIO_printf(bio_err,
" -keymatexportlen len - Export len bytes of keying material (default 20)\n");
#ifdef OPENSSL_SYS_WINDOWS
BIO_printf(bio_err,
" -no_rand_screen - Do not use RAND_screen() to initialize random state\n");
#endif
}
#ifndef OPENSSL_NO_TLSEXT
@@ -642,10 +630,11 @@ static int serverinfo_cli_parse_cb(SSL *s, unsigned int ext_type,
unsigned char ext_buf[4 + 65536];
/* Reconstruct the type/len fields prior to extension data */
ext_buf[0] = ext_type >> 8;
ext_buf[1] = ext_type & 0xFF;
ext_buf[2] = inlen >> 8;
ext_buf[3] = inlen & 0xFF;
inlen &= 0xffff; /* for formal memcpy correctness */
ext_buf[0] = (unsigned char)(ext_type >> 8);
ext_buf[1] = (unsigned char)(ext_type);
ext_buf[2] = (unsigned char)(inlen >> 8);
ext_buf[3] = (unsigned char)(inlen);
memcpy(ext_buf + 4, in, inlen);
BIO_snprintf(pem_name, sizeof(pem_name), "SERVERINFO FOR EXTENSION %d",
@@ -1148,10 +1137,6 @@ int MAIN(int argc, char **argv)
keymatexportlen = atoi(*(++argv));
if (keymatexportlen == 0)
goto bad;
#ifdef OPENSSL_SYS_WINDOWS
} else if (strcmp(*argv, "-no_rand_screen") == 0) {
c_no_rand_screen = 1;
#endif
} else {
BIO_printf(bio_err, "unknown option %s\n", *argv);
badop = 1;
@@ -1268,7 +1253,7 @@ int MAIN(int argc, char **argv)
if (!load_excert(&exc, bio_err))
goto end;
if (!app_RAND_load_file(NULL, bio_err, ++c_no_rand_screen) && inrand == NULL
if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL
&& !RAND_status()) {
BIO_printf(bio_err,
"warning, not much extra random data, consider using the -rand option\n");
@@ -1808,16 +1793,17 @@ int MAIN(int argc, char **argv)
tv.tv_usec = 0;
i = select(width, (void *)&readfds, (void *)&writefds,
NULL, &tv);
#if defined(OPENSSL_USE_STD_INPUT_HANDLE)
# if defined(OPENSSL_SYS_WINCE) || defined(OPENSSL_SYS_MSDOS)
if (!i && (!_kbhit() || !read_tty))
continue;
# else
if (!i && (!((_kbhit())
|| (WAIT_OBJECT_0 ==
WaitForSingleObject(GetStdHandle
(STD_INPUT_HANDLE),
0)))
|| !read_tty))
continue;
#else
if(!i && (!_kbhit() || !read_tty) ) continue;
# endif
} else
i = select(width, (void *)&readfds, (void *)&writefds,
@@ -2019,12 +2005,12 @@ int MAIN(int argc, char **argv)
}
}
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
#if defined(OPENSSL_USE_STD_INPUT_HANDLE)
# if defined(OPENSSL_SYS_WINCE) || defined(OPENSSL_SYS_MSDOS)
else if (_kbhit())
# else
else if ((_kbhit())
|| (WAIT_OBJECT_0 ==
WaitForSingleObject(GetStdHandle(STD_INPUT_HANDLE), 0)))
#else
else if (_kbhit())
# endif
#elif defined (OPENSSL_SYS_NETWARE)
else if (_kbhit())
@@ -2829,8 +2829,8 @@ static void multiblock_speed(const EVP_CIPHER *evp_cipher)
RAND_bytes(out, 16);
len += 16;
aad[11] = len >> 8;
aad[12] = len;
aad[11] = (unsigned char)(len >> 8);
aad[12] = (unsigned char)(len);
pad = EVP_CIPHER_CTX_ctrl(&ctx,
EVP_CTRL_AEAD_TLS1_AAD,
EVP_AEAD_TLS1_AAD_LEN, aad);
@@ -184,7 +184,7 @@
#if __ARM_ARCH__<7
sub r3,pc,#8 @ AES_encrypt
#else
adr r3,AES_encrypt
adr r3,.
#endif
stmdb sp!,{r1,r4-r12,lr}
mov $rounds,r0 @ inp
@@ -430,7 +430,7 @@
#if __ARM_ARCH__<7
sub r3,pc,#8 @ AES_set_encrypt_key
#else
adr r3,private_AES_set_encrypt_key
adr r3,.
#endif
teq r0,#0
#if __ARM_ARCH__>=7
@@ -952,7 +952,7 @@
#if __ARM_ARCH__<7
sub r3,pc,#8 @ AES_decrypt
#else
adr r3,AES_decrypt
adr r3,.
#endif
stmdb sp!,{r1,r4-r12,lr}
mov $rounds,r0 @ inp
@@ -724,7 +724,7 @@ sub bitslice {
.type _bsaes_decrypt8,%function
.align 4
_bsaes_decrypt8:
adr $const,_bsaes_decrypt8
adr $const,.
vldmia $key!, {@XMM[9]} @ round 0 key
add $const,$const,#.LM0ISR-_bsaes_decrypt8
@@ -819,7 +819,7 @@ sub bitslice {
.type _bsaes_encrypt8,%function
.align 4
_bsaes_encrypt8:
adr $const,_bsaes_encrypt8
adr $const,.
vldmia $key!, {@XMM[9]} @ round 0 key
sub $const,$const,#_bsaes_encrypt8-.LM0SR
@@ -923,7 +923,7 @@ sub bitslice_key {
.type _bsaes_key_convert,%function
.align 4
_bsaes_key_convert:
adr $const,_bsaes_key_convert
adr $const,.
vld1.8 {@XMM[7]}, [$inp]! @ load round 0 key
sub $const,$const,#_bsaes_key_convert-.LM0
vld1.8 {@XMM[15]}, [$inp]! @ load round 1 key
@@ -87,6 +87,9 @@ int ASN1_i2d_bio(i2d_of_void *i2d, BIO *out, unsigned char *x)
int i, j = 0, n, ret = 1;
n = i2d(x, NULL);
if (n <= 0)
return 0;
b = (char *)OPENSSL_malloc(n);
if (b == NULL) {
ASN1err(ASN1_F_ASN1_I2D_BIO, ERR_R_MALLOC_FAILURE);
@@ -385,7 +385,7 @@ _dopr(char **sbuffer,
if (cflags == DP_C_SHORT) {
short int *num;
num = va_arg(args, short int *);
*num = currlen;
*num = (short int)currlen;
} else if (cflags == DP_C_LONG) { /* XXX */
long int *num;
num = va_arg(args, long int *);
@@ -502,7 +502,7 @@ fmtint(char **sbuffer,
if (!(flags & DP_F_UNSIGNED)) {
if (value < 0) {
signvalue = '-';
uvalue = -(unsigned LLONG)value;
uvalue = 0 - (unsigned LLONG)value;
} else if (flags & DP_F_PLUS)
signvalue = '+';
else if (flags & DP_F_SPACE)
Oops, something went wrong.

0 comments on commit 03651ad

Please sign in to comment.