Fix openssl_fix_for_x32.patch to apply to new upstream version
Kurt Roeckx
9 years ago
3 | 3 |
- Fixes CVE-2014-3513
|
4 | 4 |
- Fixes CVE-2014-3567
|
5 | 5 |
- Add Fallback SCSV support to mitigate CVE-2014-3566
|
6 | |
- Disables SSLv3 because of CVE-2014-3566
|
7 | 6 |
- Fixes CVE-2014-3568
|
8 | |
- Update dgst_hmac.patch to apply to new upstream version
|
9 | |
- Drop rehash_pod.patch, applied upstream.
|
|
7 |
* Disables SSLv3 because of CVE-2014-3566
|
|
8 |
* Update dgst_hmac.patch to apply to new upstream version
|
|
9 |
* Drop rehash_pod.patch, applied upstream
|
|
10 |
* Fix openssl_fix_for_x32.patch to apply to new upstream version
|
10 | 11 |
|
11 | 12 |
-- Kurt Roeckx <kurt@roeckx.be> Wed, 15 Oct 2014 19:06:38 +0200
|
12 | 13 |
|
0 | |
Index: openssl-1.0.1c/crypto/bn/asm/x86_64-gcc.c
|
|
0 |
Index: openssl-1.0.1j/crypto/bn/asm/x86_64-gcc.c
|
1 | 1 |
===================================================================
|
2 | |
--- openssl-1.0.1c.orig/crypto/bn/asm/x86_64-gcc.c 2010-02-28 05:38:16.000000000 -0800
|
3 | |
+++ openssl-1.0.1c/crypto/bn/asm/x86_64-gcc.c 2013-01-17 20:16:12.000000000 -0800
|
|
2 |
--- openssl-1.0.1j.orig/crypto/bn/asm/x86_64-gcc.c
|
|
3 |
+++ openssl-1.0.1j/crypto/bn/asm/x86_64-gcc.c
|
4 | 4 |
@@ -55,7 +55,7 @@
|
5 | 5 |
* machine.
|
6 | 6 |
*/
|
|
10 | 10 |
#define BN_ULONG unsigned long long
|
11 | 11 |
#else
|
12 | 12 |
#define BN_ULONG unsigned long
|
13 | |
@@ -192,9 +192,9 @@
|
14 | |
asm (
|
|
13 |
@@ -192,9 +192,9 @@ BN_ULONG bn_add_words (BN_ULONG *rp, con
|
|
14 |
asm volatile (
|
15 | 15 |
" subq %2,%2 \n"
|
16 | 16 |
".p2align 4 \n"
|
17 | 17 |
- "1: movq (%4,%2,8),%0 \n"
|
|
23 | 23 |
" leaq 1(%2),%2 \n"
|
24 | 24 |
" loop 1b \n"
|
25 | 25 |
" sbbq %0,%0 \n"
|
26 | |
@@ -215,9 +215,9 @@
|
27 | |
asm (
|
|
26 |
@@ -215,9 +215,9 @@ BN_ULONG bn_sub_words (BN_ULONG *rp, con
|
|
27 |
asm volatile (
|
28 | 28 |
" subq %2,%2 \n"
|
29 | 29 |
".p2align 4 \n"
|
30 | 30 |
- "1: movq (%4,%2,8),%0 \n"
|