public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
* [PATCH] openssl: Update to version 1.1.1r
@ 2022-10-12 15:39 Adolf Belka
  2022-10-14 10:18 ` Michael Tremer
  0 siblings, 1 reply; 2+ messages in thread
From: Adolf Belka @ 2022-10-12 15:39 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 2112 bytes --]

- Update version from 1.1.1q to 1.1.1r
- Update of rootfile not required
- Changelog
	 Changes between 1.1.1q and 1.1.1r [11 Oct 2022]
	  *) Fixed the linux-mips64 Configure target which was missing the
	     SIXTY_FOUR_BIT bn_ops flag. This was causing heap corruption on that
	     platform.
	  *) Fixed a strict aliasing problem in bn_nist. Clang-14 optimisation was
	     causing incorrect results in some cases as a result.
	  *) Fixed SSL_pending() and SSL_has_pending() with DTLS which were failing to
	     report correct results in some cases
	  *) Fixed a regression introduced in 1.1.1o for re-signing certificates with
	     different key sizes
	  *) Added the loongarch64 target
	  *) Fixed a DRBG seed propagation thread safety issue
	  *) Fixed a memory leak in tls13_generate_secret
	  *) Fixed reported performance degradation on aarch64. Restored the
	     implementation prior to commit 2621751 ("aes/asm/aesv8-armx.pl: avoid
	     32-bit lane assignment in CTR mode") for 64bit targets only, since it is
	     reportedly 2-17% slower and the silicon errata only affects 32bit targets.
	     The new algorithm is still used for 32 bit targets.
	  *) Added a missing header for memcmp that caused compilation failure on some
	     platforms

Signed-off-by: Adolf Belka <adolf.belka(a)ipfire.org>
---
 lfs/openssl | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/lfs/openssl b/lfs/openssl
index 28a92a6b3..cb249b30c 100644
--- a/lfs/openssl
+++ b/lfs/openssl
@@ -24,7 +24,7 @@
 
 include Config
 
-VER        = 1.1.1q
+VER        = 1.1.1r
 
 THISAPP    = openssl-$(VER)
 DL_FILE    = $(THISAPP).tar.gz
@@ -74,7 +74,7 @@ objects = $(DL_FILE)
 
 $(DL_FILE) = $(DL_FROM)/$(DL_FILE)
 
-$(DL_FILE)_BLAKE2 = fc8fd6a62dc291d0bda328a051e253175fb04442cc4b8f45d67c3a5027748a0fc5fb372d0483bc9024ae0bff119c4fac8f1e982a182612427696d6d09f5935f5
+$(DL_FILE)_BLAKE2 = ae1f56718d6a9400e9670f1ad1db2bc15bfbefc4fb114c7920c95a193285984d46cb28fe8dfbfa732f7755fb7810b51412f6e23a592d5769af9925026aa912d9
 
 install : $(TARGET)
 
-- 
2.38.0


^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: [PATCH] openssl: Update to version 1.1.1r
  2022-10-12 15:39 [PATCH] openssl: Update to version 1.1.1r Adolf Belka
@ 2022-10-14 10:18 ` Michael Tremer
  0 siblings, 0 replies; 2+ messages in thread
From: Michael Tremer @ 2022-10-14 10:18 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 2589 bytes --]

Hello Adolf,

Thanks for this, but it looks like they took down the release, because it is introducing some new problems:

  https://mta.openssl.org/pipermail/openssl-announce/2022-October/000237.html

So, let’s keep the patch here and wait what happens next.

Sorry for this.

-Michael

> On 12 Oct 2022, at 16:39, Adolf Belka <adolf.belka(a)ipfire.org> wrote:
> 
> - Update version from 1.1.1q to 1.1.1r
> - Update of rootfile not required
> - Changelog
> 	 Changes between 1.1.1q and 1.1.1r [11 Oct 2022]
> 	  *) Fixed the linux-mips64 Configure target which was missing the
> 	     SIXTY_FOUR_BIT bn_ops flag. This was causing heap corruption on that
> 	     platform.
> 	  *) Fixed a strict aliasing problem in bn_nist. Clang-14 optimisation was
> 	     causing incorrect results in some cases as a result.
> 	  *) Fixed SSL_pending() and SSL_has_pending() with DTLS which were failing to
> 	     report correct results in some cases
> 	  *) Fixed a regression introduced in 1.1.1o for re-signing certificates with
> 	     different key sizes
> 	  *) Added the loongarch64 target
> 	  *) Fixed a DRBG seed propagation thread safety issue
> 	  *) Fixed a memory leak in tls13_generate_secret
> 	  *) Fixed reported performance degradation on aarch64. Restored the
> 	     implementation prior to commit 2621751 ("aes/asm/aesv8-armx.pl: avoid
> 	     32-bit lane assignment in CTR mode") for 64bit targets only, since it is
> 	     reportedly 2-17% slower and the silicon errata only affects 32bit targets.
> 	     The new algorithm is still used for 32 bit targets.
> 	  *) Added a missing header for memcmp that caused compilation failure on some
> 	     platforms
> 
> Signed-off-by: Adolf Belka <adolf.belka(a)ipfire.org>
> ---
> lfs/openssl | 4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)
> 
> diff --git a/lfs/openssl b/lfs/openssl
> index 28a92a6b3..cb249b30c 100644
> --- a/lfs/openssl
> +++ b/lfs/openssl
> @@ -24,7 +24,7 @@
> 
> include Config
> 
> -VER        = 1.1.1q
> +VER        = 1.1.1r
> 
> THISAPP    = openssl-$(VER)
> DL_FILE    = $(THISAPP).tar.gz
> @@ -74,7 +74,7 @@ objects = $(DL_FILE)
> 
> $(DL_FILE) = $(DL_FROM)/$(DL_FILE)
> 
> -$(DL_FILE)_BLAKE2 = fc8fd6a62dc291d0bda328a051e253175fb04442cc4b8f45d67c3a5027748a0fc5fb372d0483bc9024ae0bff119c4fac8f1e982a182612427696d6d09f5935f5
> +$(DL_FILE)_BLAKE2 = ae1f56718d6a9400e9670f1ad1db2bc15bfbefc4fb114c7920c95a193285984d46cb28fe8dfbfa732f7755fb7810b51412f6e23a592d5769af9925026aa912d9
> 
> install : $(TARGET)
> 
> -- 
> 2.38.0
> 


^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2022-10-14 10:18 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-10-12 15:39 [PATCH] openssl: Update to version 1.1.1r Adolf Belka
2022-10-14 10:18 ` Michael Tremer

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox