Index: apps/req.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/apps/req.c,v retrieving revision 1.1.1.15 retrieving revision 1.4 diff -p -p -u -r1.1.1.15 -r1.4 --- apps/req.c 22 Mar 2020 00:49:03 -0000 1.1.1.15 +++ apps/req.c 22 Mar 2020 00:53:02 -0000 1.4 @@ -180,7 +180,7 @@ static int duplicated(LHASH_OF(OPENSSL_S /* Check syntax. */ /* Skip leading whitespace, make a copy. */ - while (*kv && isspace(*kv)) + while (*kv && isspace((unsigned char)*kv)) if (*++kv == '\0') return 1; if ((p = strchr(kv, '=')) == NULL) @@ -191,7 +191,7 @@ static int duplicated(LHASH_OF(OPENSSL_S /* Skip trailing space before the equal sign. */ for (p = kv + off; p > kv; --p) - if (!isspace(p[-1])) + if (!isspace((unsigned char)p[-1])) break; if (p == kv) { OPENSSL_free(kv); Index: apps/s_client.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/apps/s_client.c,v retrieving revision 1.1.1.23 retrieving revision 1.25 diff -p -p -u -r1.1.1.23 -r1.25 --- apps/s_client.c 15 Mar 2022 20:47:09 -0000 1.1.1.23 +++ apps/s_client.c 15 Mar 2022 20:51:12 -0000 1.25 @@ -2283,7 +2283,7 @@ int s_client_main(int argc, char **argv) do { mbuf_len = BIO_gets(fbio, mbuf, BUFSIZZ); } - while (mbuf_len > 3 && (!isdigit(mbuf[0]) || !isdigit(mbuf[1]) || !isdigit(mbuf[2]) || mbuf[3] != ' ')); + while (mbuf_len > 3 && (!isdigit((unsigned char)mbuf[0]) || !isdigit((unsigned char)mbuf[1]) || !isdigit((unsigned char)mbuf[2]) || mbuf[3] != ' ')); (void)BIO_flush(fbio); BIO_pop(fbio); BIO_free(fbio); @@ -2770,6 +2770,16 @@ int s_client_main(int argc, char **argv) for (;;) { FD_ZERO(&readfds); FD_ZERO(&writefds); + int fdin = fileno_stdin(); + if (fdin < 0) { + BIO_printf(bio_err,"bad fileno for stdin\n"); + goto shut; + } + int fdout = fileno_stdout(); + if (fdout < 0) { + BIO_printf(bio_err,"bad fileno for stdout\n"); + goto shut; + } if (SSL_is_dtls(con) && DTLSv1_get_timeout(con, &timeout)) timeoutp = &timeout; @@ -2824,10 +2834,10 @@ int s_client_main(int argc, char **argv) * set the flag so we exit. */ if (read_tty && !at_eof) - openssl_fdset(fileno_stdin(), &readfds); + openssl_fdset(fdin, &readfds); #if !defined(OPENSSL_SYS_VMS) if (write_tty) - openssl_fdset(fileno_stdout(), &writefds); + openssl_fdset(fdout, &writefds); #endif } if (read_ssl) @@ -2955,7 +2965,7 @@ int s_client_main(int argc, char **argv) /* Assume Windows/DOS/BeOS can always write */ else if (!ssl_pending && write_tty) #else - else if (!ssl_pending && FD_ISSET(fileno_stdout(), &writefds)) + else if (!ssl_pending && FD_ISSET(fdout, &writefds)) #endif { #ifdef CHARSET_EBCDIC @@ -3042,7 +3052,7 @@ int s_client_main(int argc, char **argv) #if defined(OPENSSL_SYS_MSDOS) else if (has_stdin_waiting()) #else - else if (FD_ISSET(fileno_stdin(), &readfds)) + else if (FD_ISSET(fdin, &readfds)) #endif { if (crlf) { Index: apps/s_server.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/apps/s_server.c,v retrieving revision 1.1.1.25 retrieving revision 1.25 diff -p -p -u -r1.1.1.25 -r1.25 --- apps/s_server.c 7 Feb 2023 22:18:00 -0000 1.1.1.25 +++ apps/s_server.c 7 Feb 2023 22:25:29 -0000 1.25 @@ -2265,7 +2265,7 @@ static int sv_body(int s, int stype, int char *buf = NULL; fd_set readfds; int ret = 1, width; - int k, i; + int k, i, fdin; unsigned long l; SSL *con = NULL; BIO *sbio; @@ -2449,9 +2449,14 @@ static int sv_body(int s, int stype, int || (async && SSL_waiting_for_async(con)); if (!read_from_sslcon) { + fdin = fileno_stdin(); + if (fdin < 0) { + BIO_printf(bio_err,"Bad fileno for stdin\n"); + goto err; + } FD_ZERO(&readfds); #if !defined(OPENSSL_SYS_WINDOWS) && !defined(OPENSSL_SYS_MSDOS) - openssl_fdset(fileno_stdin(), &readfds); + openssl_fdset(fdin, &readfds); #endif openssl_fdset(s, &readfds); /* @@ -2488,7 +2493,7 @@ static int sv_body(int s, int stype, int if (i <= 0) continue; - if (FD_ISSET(fileno_stdin(), &readfds)) + if (FD_ISSET(fdin, &readfds)) read_from_terminal = 1; #endif if (FD_ISSET(s, &readfds)) Index: crypto/arm_arch.h =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/arm_arch.h,v retrieving revision 1.1.1.7 retrieving revision 1.8 diff -p -p -u -r1.1.1.7 -r1.8 --- crypto/arm_arch.h 22 Mar 2020 00:49:03 -0000 1.1.1.7 +++ crypto/arm_arch.h 22 Mar 2020 00:53:02 -0000 1.8 @@ -18,7 +18,7 @@ # else # define __ARMEL__ # endif -# elif defined(__GNUC__) +# elif defined(__GNUC__) || defined(__lint__) # if defined(__aarch64__) # define __ARM_ARCH__ 8 # if __BYTE_ORDER__==__ORDER_BIG_ENDIAN__ Index: crypto/mem_clr.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/mem_clr.c,v retrieving revision 1.1.1.6 retrieving revision 1.7 diff -p -p -u -r1.1.1.6 -r1.7 --- crypto/mem_clr.c 8 Feb 2018 20:56:48 -0000 1.1.1.6 +++ crypto/mem_clr.c 8 Feb 2018 21:51:24 -0000 1.7 @@ -9,6 +9,7 @@ #include #include +#include /* * Pointer to memset is volatile so that compiler must de-reference Index: crypto/ppccap.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/ppccap.c,v retrieving revision 1.1.1.11 retrieving revision 1.20 diff -p -p -u -r1.1.1.11 -r1.20 --- crypto/ppccap.c 7 Jan 2022 15:46:03 -0000 1.1.1.11 +++ crypto/ppccap.c 7 Jan 2022 15:50:10 -0000 1.20 @@ -26,6 +26,10 @@ # include # include #endif +#if defined(__NetBSD__) +# include +# include +#endif #include #include #include @@ -65,6 +69,7 @@ int bn_mul_mont(BN_ULONG *rp, const BN_U } #endif +#ifdef DONT_USE_SHA256_FROM_LIBC void sha256_block_p8(void *ctx, const void *inp, size_t len); void sha256_block_ppc(void *ctx, const void *inp, size_t len); void sha256_block_data_order(void *ctx, const void *inp, size_t len); @@ -73,7 +78,9 @@ void sha256_block_data_order(void *ctx, OPENSSL_ppccap_P & PPC_CRYPTO207 ? sha256_block_p8(ctx, inp, len) : sha256_block_ppc(ctx, inp, len); } +#endif +#ifdef DONT_USE_SHA512_FROM_LIBC void sha512_block_p8(void *ctx, const void *inp, size_t len); void sha512_block_ppc(void *ctx, const void *inp, size_t len); void sha512_block_data_order(void *ctx, const void *inp, size_t len); @@ -82,6 +89,7 @@ void sha512_block_data_order(void *ctx, OPENSSL_ppccap_P & PPC_CRYPTO207 ? sha512_block_p8(ctx, inp, len) : sha512_block_ppc(ctx, inp, len); } +#endif #ifndef OPENSSL_NO_CHACHA void ChaCha20_ctr32_int(unsigned char *out, const unsigned char *inp, @@ -385,6 +393,20 @@ void OPENSSL_cpuid_setup(void) sigaction(SIGILL, &ill_act, &ill_oact); #ifndef OSSL_IMPLEMENT_GETAUXVAL +# ifdef __NetBSD__ + int error, val; + size_t len = sizeof(val); + + /* + * If machdep.fpu_present == 0, FPU is absent and emulated by + * software. In that case, using FPU instructions hurts rather + * than helps performance, and the software is unlikely to run in + * constant time so it would expose us to timing side channel + * attacks. So don't do it! + */ + error = sysctlbyname("machdep.fpu_present", &val, &len, NULL, 0); + if (error != 0 || (error == 0 && val != 0)) +# endif if (sigsetjmp(ill_jmp,1) == 0) { OPENSSL_fpu_probe(); OPENSSL_ppccap_P |= PPC_FPU; Index: crypto/threads_pthread.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/threads_pthread.c,v retrieving revision 1.1.1.3 retrieving revision 1.4 diff -p -p -u -r1.1.1.3 -r1.4 --- crypto/threads_pthread.c 23 Jan 2020 02:47:59 -0000 1.1.1.3 +++ crypto/threads_pthread.c 23 Jan 2020 02:54:53 -0000 1.4 @@ -162,12 +162,15 @@ int CRYPTO_THREAD_compare_id(CRYPTO_THRE int CRYPTO_atomic_add(int *val, int amount, int *ret, CRYPTO_RWLOCK *lock) { +#ifdef notyet +// We don't provide yet __atomic_is_lock_free # if defined(__GNUC__) && defined(__ATOMIC_ACQ_REL) if (__atomic_is_lock_free(sizeof(*val), val)) { *ret = __atomic_add_fetch(val, amount, __ATOMIC_ACQ_REL); return 1; } # endif +#endif if (!CRYPTO_THREAD_write_lock(lock)) return 0; Index: crypto/uid.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/uid.c,v retrieving revision 1.1.1.7 retrieving revision 1.8 diff -p -p -u -r1.1.1.7 -r1.8 --- crypto/uid.c 7 Jan 2022 15:46:03 -0000 1.1.1.7 +++ crypto/uid.c 7 Jan 2022 15:50:10 -0000 1.8 @@ -17,7 +17,7 @@ int OPENSSL_issetugid(void) return 0; } -#elif defined(__OpenBSD__) || (defined(__FreeBSD__) && __FreeBSD__ > 2) || defined(__DragonFly__) || (defined(__GLIBC__) && defined(__FreeBSD_kernel__)) +#elif defined(__OpenBSD__) || (defined(__FreeBSD__) && __FreeBSD__ > 2) || defined(__DragonFly__) || (defined(__GLIBC__) && defined(__FreeBSD_kernel__)) || defined(__NetBSD__) # include OPENSSL_UNISTD Index: crypto/bio/bss_log.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/bio/bss_log.c,v retrieving revision 1.1.1.10 retrieving revision 1.12 diff -p -p -u -r1.1.1.10 -r1.12 --- crypto/bio/bss_log.c 22 Mar 2020 00:49:05 -0000 1.1.1.10 +++ crypto/bio/bss_log.c 22 Mar 2020 20:07:05 -0000 1.12 @@ -280,7 +280,7 @@ static void xsyslog(BIO *bp, int priorit break; } - sprintf(pidbuf, "[%lu] ", GetCurrentProcessId()); + snprintf(pidbuf, sizeof(pidbuf), "[%u] ", GetCurrentProcessId()); lpszStrings[0] = pidbuf; lpszStrings[1] = string; Index: crypto/bn/bn_exp.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/bn/bn_exp.c,v retrieving revision 1.1.1.18 retrieving revision 1.21 diff -p -p -u -r1.1.1.18 -r1.21 --- crypto/bn/bn_exp.c 7 Feb 2023 22:18:02 -0000 1.1.1.18 +++ crypto/bn/bn_exp.c 7 Feb 2023 22:25:30 -0000 1.21 @@ -18,8 +18,12 @@ # define alloca _alloca # endif #elif defined(__GNUC__) -# ifndef alloca -# define alloca(s) __builtin_alloca((s)) +# ifndef __SSP__ +# ifndef alloca +# define alloca(s) __builtin_alloca((s)) +# endif +# else +# undef alloca # endif #elif defined(__sun) # include Index: crypto/bn/asm/mips.pl =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/bn/asm/mips.pl,v retrieving revision 1.1.1.12 retrieving revision 1.9 diff -p -p -u -r1.1.1.12 -r1.9 --- crypto/bn/asm/mips.pl 7 Jan 2022 15:46:05 -0000 1.1.1.12 +++ crypto/bn/asm/mips.pl 7 Jan 2022 15:50:10 -0000 1.9 @@ -817,7 +817,7 @@ bn_div_3_words: $LD $a0,($a3) move $ta2,$a1 bne $a0,$a2,bn_div_3_words_internal - $LD $a1,-$BNSZ($a3) + $LD $a1,-$BNSZ($a3) li $v0,-1 jr $ra move $a0,$v0 Index: crypto/bn/asm/x86_64-gcc.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/bn/asm/x86_64-gcc.c,v retrieving revision 1.1.1.11 retrieving revision 1.11 diff -p -p -u -r1.1.1.11 -r1.11 --- crypto/bn/asm/x86_64-gcc.c 22 Mar 2020 00:49:06 -0000 1.1.1.11 +++ crypto/bn/asm/x86_64-gcc.c 22 Mar 2020 00:53:03 -0000 1.11 @@ -219,10 +219,9 @@ BN_ULONG bn_add_words(BN_ULONG *rp, cons " adcq (%5,%2,8),%0 \n" " movq %0,(%3,%2,8) \n" " lea 1(%2),%2 \n" - " dec %1 \n" - " jnz 1b \n" - " sbbq %0,%0 \n" - :"=&r" (ret), "+c"(n), "+r"(i) + " loop 1b \n" + " sbbq %0,%0 \n":"=&r" (ret), "+c"(n), + "+r"(i) :"r"(rp), "r"(ap), "r"(bp) :"cc", "memory"); @@ -246,10 +245,9 @@ BN_ULONG bn_sub_words(BN_ULONG *rp, cons " sbbq (%5,%2,8),%0 \n" " movq %0,(%3,%2,8) \n" " lea 1(%2),%2 \n" - " dec %1 \n" - " jnz 1b \n" - " sbbq %0,%0 \n" - :"=&r" (ret), "+c"(n), "+r"(i) + " loop 1b \n" + " sbbq %0,%0 \n":"=&r" (ret), "+c"(n), + "+r"(i) :"r"(rp), "r"(ap), "r"(bp) :"cc", "memory"); Index: crypto/des/rand_key.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/des/rand_key.c,v retrieving revision 1.1.1.4 retrieving revision 1.5 diff -p -p -u -r1.1.1.4 -r1.5 --- crypto/des/rand_key.c 23 Sep 2018 13:17:42 -0000 1.1.1.4 +++ crypto/des/rand_key.c 23 Sep 2018 13:32:56 -0000 1.5 @@ -7,6 +7,7 @@ * https://www.openssl.org/source/license.html */ +#include #include #include Index: crypto/dso/dso_dlfcn.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/dso/dso_dlfcn.c,v retrieving revision 1.1.1.15 retrieving revision 1.16 diff -p -p -u -r1.1.1.15 -r1.16 --- crypto/dso/dso_dlfcn.c 22 Mar 2020 00:49:07 -0000 1.1.1.15 +++ crypto/dso/dso_dlfcn.c 22 Mar 2020 00:53:05 -0000 1.16 @@ -271,9 +271,9 @@ static char *dlfcn_name_converter(DSO *d } if (transform) { if ((DSO_flags(dso) & DSO_FLAG_NAME_TRANSLATION_EXT_ONLY) == 0) - sprintf(translated, "lib%s" DSO_EXTENSION, filename); + snprintf(translated, rsize, "lib%s" DSO_EXTENSION, filename); else - sprintf(translated, "%s" DSO_EXTENSION, filename); + snprintf(translated, rsize, "%s" DSO_EXTENSION, filename); } else sprintf(translated, "%s", filename); return translated; Index: crypto/engine/eng_devcrypto.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/engine/eng_devcrypto.c,v retrieving revision 1.1.1.6 retrieving revision 1.9 diff -p -p -u -r1.1.1.6 -r1.9 --- crypto/engine/eng_devcrypto.c 25 Mar 2021 18:27:08 -0000 1.1.1.6 +++ crypto/engine/eng_devcrypto.c 25 Mar 2021 18:51:19 -0000 1.9 @@ -762,7 +762,7 @@ void engine_load_devcrypto_int() if ((fd = open("/dev/crypto", O_RDWR, 0)) < 0) { #ifndef ENGINE_DEVCRYPTO_DEBUG - if (errno != ENOENT) + if (errno != ENOENT && errno != ENXIO) #endif fprintf(stderr, "Could not open /dev/crypto: %s\n", strerror(errno)); return; Index: crypto/evp/e_aes.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/evp/e_aes.c,v retrieving revision 1.1.1.22 retrieving revision 1.25 diff -p -p -u -r1.1.1.22 -r1.25 --- crypto/evp/e_aes.c 7 Jan 2022 15:46:08 -0000 1.1.1.22 +++ crypto/evp/e_aes.c 7 Jan 2022 15:50:10 -0000 1.25 @@ -2543,7 +2543,7 @@ const EVP_CIPHER *EVP_aes_##keylen##_##m #endif -#if defined(OPENSSL_CPUID_OBJ) && (defined(__arm__) || defined(__arm) || defined(__aarch64__)) +#if defined(OPENSSL_CPUID_OBJ) && defined(AES_ASM) && (defined(__arm__) || defined(__arm) || defined(__aarch64__)) # include "arm_arch.h" # if __ARM_MAX_ARCH__>=7 # if defined(BSAES_ASM) @@ -2552,6 +2552,8 @@ const EVP_CIPHER *EVP_aes_##keylen##_##m # if defined(VPAES_ASM) # define VPAES_CAPABLE (OPENSSL_armcap_P & ARMV7_NEON) # endif +# endif +# if __ARM_MAX_ARCH__>=8 # define HWAES_CAPABLE (OPENSSL_armcap_P & ARMV8_AES) # define HWAES_set_encrypt_key aes_v8_set_encrypt_key # define HWAES_set_decrypt_key aes_v8_set_decrypt_key Index: crypto/evp/m_sha1.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/evp/m_sha1.c,v retrieving revision 1.1.1.9 retrieving revision 1.12 diff -p -p -u -r1.1.1.9 -r1.12 --- crypto/evp/m_sha1.c 22 Mar 2020 00:49:09 -0000 1.1.1.9 +++ crypto/evp/m_sha1.c 22 Mar 2020 00:53:05 -0000 1.12 @@ -116,21 +116,16 @@ static int init224(EVP_MD_CTX *ctx) return SHA224_Init(EVP_MD_CTX_md_data(ctx)); } -static int update224(EVP_MD_CTX *ctx, const void *data, size_t count) -{ - return SHA224_Update(EVP_MD_CTX_md_data(ctx), data, count); -} - -static int final224(EVP_MD_CTX *ctx, unsigned char *md) -{ - return SHA224_Final(md, EVP_MD_CTX_md_data(ctx)); -} - static int init256(EVP_MD_CTX *ctx) { return SHA256_Init(EVP_MD_CTX_md_data(ctx)); } +/* + * Even though there're separate SHA224_[Update|Final], we call + * SHA256 functions even in SHA224 context. This is what happens + * there anyway, so we can spare few CPU cycles:-) + */ static int update256(EVP_MD_CTX *ctx, const void *data, size_t count) { return SHA256_Update(EVP_MD_CTX_md_data(ctx), data, count); @@ -147,8 +142,8 @@ static const EVP_MD sha224_md = { SHA224_DIGEST_LENGTH, EVP_MD_FLAG_DIGALGID_ABSENT, init224, - update224, - final224, + update256, + final256, NULL, NULL, SHA256_CBLOCK, Index: crypto/idea/i_cbc.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/idea/i_cbc.c,v retrieving revision 1.1.1.4 retrieving revision 1.5 diff -p -p -u -r1.1.1.4 -r1.5 --- crypto/idea/i_cbc.c 22 Mar 2020 00:49:09 -0000 1.1.1.4 +++ crypto/idea/i_cbc.c 22 Mar 2020 00:53:06 -0000 1.5 @@ -14,10 +14,10 @@ void IDEA_cbc_encrypt(const unsigned cha long length, IDEA_KEY_SCHEDULE *ks, unsigned char *iv, int encrypt) { - register unsigned long tin0, tin1; - register unsigned long tout0, tout1, xor0, xor1; + register IDEA_INT tin0, tin1; + register IDEA_INT tout0, tout1, xor0, xor1; register long l = length; - unsigned long tin[2]; + IDEA_INT tin[2]; if (encrypt) { n2l(iv, tout0); @@ -86,10 +86,10 @@ void IDEA_cbc_encrypt(const unsigned cha tin[0] = tin[1] = 0; } -void IDEA_encrypt(unsigned long *d, IDEA_KEY_SCHEDULE *key) +void IDEA_encrypt(unsigned int *d, IDEA_KEY_SCHEDULE *key) { register IDEA_INT *p; - register unsigned long x1, x2, x3, x4, t0, t1, ul; + register IDEA_INT x1, x2, x3, x4, t0, t1, ul; x2 = d[0]; x1 = (x2 >> 16); Index: crypto/idea/i_cfb64.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/idea/i_cfb64.c,v retrieving revision 1.1.1.4 retrieving revision 1.5 diff -p -p -u -r1.1.1.4 -r1.5 --- crypto/idea/i_cfb64.c 22 Mar 2020 00:49:09 -0000 1.1.1.4 +++ crypto/idea/i_cfb64.c 22 Mar 2020 00:53:06 -0000 1.5 @@ -20,10 +20,10 @@ void IDEA_cfb64_encrypt(const unsigned c long length, IDEA_KEY_SCHEDULE *schedule, unsigned char *ivec, int *num, int encrypt) { - register unsigned long v0, v1, t; + register IDEA_INT v0, v1, t; register int n = *num; register long l = length; - unsigned long ti[2]; + IDEA_INT ti[2]; unsigned char *iv, c, cc; iv = (unsigned char *)ivec; @@ -34,7 +34,7 @@ void IDEA_cfb64_encrypt(const unsigned c ti[0] = v0; n2l(iv, v1); ti[1] = v1; - IDEA_encrypt((unsigned long *)ti, schedule); + IDEA_encrypt(ti, schedule); iv = (unsigned char *)ivec; t = ti[0]; l2n(t, iv); @@ -54,7 +54,7 @@ void IDEA_cfb64_encrypt(const unsigned c ti[0] = v0; n2l(iv, v1); ti[1] = v1; - IDEA_encrypt((unsigned long *)ti, schedule); + IDEA_encrypt(ti, schedule); iv = (unsigned char *)ivec; t = ti[0]; l2n(t, iv); Index: crypto/idea/i_ecb.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/idea/i_ecb.c,v retrieving revision 1.1.1.5 retrieving revision 1.6 diff -p -p -u -r1.1.1.5 -r1.6 --- crypto/idea/i_ecb.c 22 Mar 2020 00:49:09 -0000 1.1.1.5 +++ crypto/idea/i_ecb.c 22 Mar 2020 00:53:06 -0000 1.6 @@ -19,7 +19,7 @@ const char *IDEA_options(void) void IDEA_ecb_encrypt(const unsigned char *in, unsigned char *out, IDEA_KEY_SCHEDULE *ks) { - unsigned long l0, l1, d[2]; + IDEA_INT l0, l1, d[2]; n2l(in, l0); d[0] = l0; Index: crypto/idea/i_ofb64.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/idea/i_ofb64.c,v retrieving revision 1.1.1.4 retrieving revision 1.5 diff -p -p -u -r1.1.1.4 -r1.5 --- crypto/idea/i_ofb64.c 22 Mar 2020 00:49:09 -0000 1.1.1.4 +++ crypto/idea/i_ofb64.c 22 Mar 2020 00:53:06 -0000 1.5 @@ -19,12 +19,12 @@ void IDEA_ofb64_encrypt(const unsigned c long length, IDEA_KEY_SCHEDULE *schedule, unsigned char *ivec, int *num) { - register unsigned long v0, v1, t; + register IDEA_INT v0, v1, t; register int n = *num; register long l = length; unsigned char d[8]; register char *dp; - unsigned long ti[2]; + IDEA_INT ti[2]; unsigned char *iv; int save = 0; @@ -38,7 +38,7 @@ void IDEA_ofb64_encrypt(const unsigned c l2n(v1, dp); while (l--) { if (n == 0) { - IDEA_encrypt((unsigned long *)ti, schedule); + IDEA_encrypt(ti, schedule); dp = (char *)d; t = ti[0]; l2n(t, dp); Index: crypto/idea/i_skey.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/idea/i_skey.c,v retrieving revision 1.1.1.6 retrieving revision 1.8 diff -p -p -u -r1.1.1.6 -r1.8 --- crypto/idea/i_skey.c 22 Mar 2020 00:49:09 -0000 1.1.1.6 +++ crypto/idea/i_skey.c 22 Mar 2020 00:53:06 -0000 1.8 @@ -7,6 +7,7 @@ * https://www.openssl.org/source/license.html */ +#include #include #include "idea_local.h" @@ -83,7 +84,7 @@ void IDEA_set_decrypt_key(IDEA_KEY_SCHED /* taken directly from the 'paper' I'll have a look at it later */ static IDEA_INT inverse(unsigned int xin) { - long n1, n2, q, r, b1, b2, t; + int32_t n1, n2, q, r, b1, b2, t; if (xin == 0) b2 = 0; Index: crypto/md5/md5_dgst.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/md5/md5_dgst.c,v retrieving revision 1.1.1.5 retrieving revision 1.7 diff -p -p -u -r1.1.1.5 -r1.7 --- crypto/md5/md5_dgst.c 22 Mar 2020 00:49:09 -0000 1.1.1.5 +++ crypto/md5/md5_dgst.c 22 Mar 2020 20:13:15 -0000 1.7 @@ -15,10 +15,10 @@ * Implemented from RFC1321 The MD5 Message-Digest Algorithm */ -#define INIT_DATA_A (unsigned long)0x67452301L -#define INIT_DATA_B (unsigned long)0xefcdab89L -#define INIT_DATA_C (unsigned long)0x98badcfeL -#define INIT_DATA_D (unsigned long)0x10325476L +#define INIT_DATA_A (MD5_LONG)0x67452301L +#define INIT_DATA_B (MD5_LONG)0xefcdab89L +#define INIT_DATA_C (MD5_LONG)0x98badcfeL +#define INIT_DATA_D (MD5_LONG)0x10325476L int MD5_Init(MD5_CTX *c) { Index: crypto/modes/gcm128.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/modes/gcm128.c,v retrieving revision 1.1.1.12 retrieving revision 1.12 diff -p -p -u -r1.1.1.12 -r1.12 --- crypto/modes/gcm128.c 25 Mar 2021 18:27:08 -0000 1.1.1.12 +++ crypto/modes/gcm128.c 8 Apr 2021 12:31:49 -0000 1.12 @@ -669,7 +669,7 @@ void gcm_gmult_4bit_x86(u64 Xi[2], const void gcm_ghash_4bit_x86(u64 Xi[2], const u128 Htable[16], const u8 *inp, size_t len); # endif -# elif defined(__arm__) || defined(__arm) || defined(__aarch64__) +# elif (defined(__arm__) || defined(__arm) || defined(__aarch64__)) && defined(GHASH_ASM) # include "arm_arch.h" # if __ARM_MAX_ARCH__>=7 # define GHASH_ASM_ARM @@ -689,13 +689,15 @@ void gcm_ghash_v8(u64 Xi[2], const u128 # endif # elif defined(__sparc__) || defined(__sparc) # include "sparc_arch.h" -# define GHASH_ASM_SPARC -# define GCM_FUNCREF_4BIT +# if defined(__arch64__) +# define GHASH_ASM_SPARC +# define GCM_FUNCREF_4BIT extern unsigned int OPENSSL_sparcv9cap_P[]; void gcm_init_vis3(u128 Htable[16], const u64 Xi[2]); void gcm_gmult_vis3(u64 Xi[2], const u128 Htable[16]); void gcm_ghash_vis3(u64 Xi[2], const u128 Htable[16], const u8 *inp, size_t len); +# endif /* __arch64__ */ # elif defined(OPENSSL_CPUID_OBJ) && (defined(__powerpc__) || defined(__ppc__) || defined(_ARCH_PPC)) # include "ppc_arch.h" # define GHASH_ASM_PPC Index: crypto/pkcs12/p12_decr.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/pkcs12/p12_decr.c,v retrieving revision 1.1.1.5 retrieving revision 1.6 diff -p -p -u -r1.1.1.5 -r1.6 --- crypto/pkcs12/p12_decr.c 8 Feb 2018 20:56:50 -0000 1.1.1.5 +++ crypto/pkcs12/p12_decr.c 8 Feb 2018 21:51:30 -0000 1.6 @@ -101,7 +101,7 @@ void *PKCS12_item_decrypt_d2i(const X509 char fname[30]; static int fnm = 1; - sprintf(fname, "DER%d", fnm++); + snprintf(fname, sizeof(fname), "DER%d", fnm++); op = fopen(fname, "wb"); fwrite(p, 1, outlen, op); fclose(op); Index: crypto/rand/rand_unix.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/rand/rand_unix.c,v retrieving revision 1.1.1.14 retrieving revision 1.18 diff -p -p -u -r1.1.1.14 -r1.18 --- crypto/rand/rand_unix.c 7 Jan 2022 15:46:10 -0000 1.1.1.14 +++ crypto/rand/rand_unix.c 7 Jan 2022 15:50:11 -0000 1.18 @@ -270,6 +270,7 @@ static ssize_t sysctl_random(char *buf, mib[1] = KERN_ARND; do { + /* On NetBSD, KERN_ARND fails if more than 256 bytes are requested */ len = buflen > 256 ? 256 : buflen; if (sysctl(mib, 2, buf, &len, NULL, 0) == -1) return done > 0 ? done : -1; Index: crypto/rc2/rc2_cbc.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/rc2/rc2_cbc.c,v retrieving revision 1.1.1.4 retrieving revision 1.5 diff -p -p -u -r1.1.1.4 -r1.5 --- crypto/rc2/rc2_cbc.c 22 Mar 2020 00:49:10 -0000 1.1.1.4 +++ crypto/rc2/rc2_cbc.c 22 Mar 2020 00:53:08 -0000 1.5 @@ -13,10 +13,10 @@ void RC2_cbc_encrypt(const unsigned char *in, unsigned char *out, long length, RC2_KEY *ks, unsigned char *iv, int encrypt) { - register unsigned long tin0, tin1; - register unsigned long tout0, tout1, xor0, xor1; + register uint32_t tin0, tin1; + register uint32_t tout0, tout1, xor0, xor1; register long l = length; - unsigned long tin[2]; + uint32_t tin[2]; if (encrypt) { c2l(iv, tout0); @@ -85,12 +85,12 @@ void RC2_cbc_encrypt(const unsigned char tin[0] = tin[1] = 0; } -void RC2_encrypt(unsigned long *d, RC2_KEY *key) +void RC2_encrypt(uint32_t *d, RC2_KEY *key) { int i, n; register RC2_INT *p0, *p1; register RC2_INT x0, x1, x2, x3, t; - unsigned long l; + uint32_t l; l = d[0]; x0 = (RC2_INT) l & 0xffff; @@ -126,17 +126,17 @@ void RC2_encrypt(unsigned long *d, RC2_K } d[0] = - (unsigned long)(x0 & 0xffff) | ((unsigned long)(x1 & 0xffff) << 16L); + (uint32_t)(x0 & 0xffff) | ((uint32_t)(x1 & 0xffff) << 16L); d[1] = - (unsigned long)(x2 & 0xffff) | ((unsigned long)(x3 & 0xffff) << 16L); + (uint32_t)(x2 & 0xffff) | ((uint32_t)(x3 & 0xffff) << 16L); } -void RC2_decrypt(unsigned long *d, RC2_KEY *key) +void RC2_decrypt(uint32_t *d, RC2_KEY *key) { int i, n; register RC2_INT *p0, *p1; register RC2_INT x0, x1, x2, x3, t; - unsigned long l; + uint32_t l; l = d[0]; x0 = (RC2_INT) l & 0xffff; @@ -173,7 +173,7 @@ void RC2_decrypt(unsigned long *d, RC2_K } d[0] = - (unsigned long)(x0 & 0xffff) | ((unsigned long)(x1 & 0xffff) << 16L); + (uint32_t)(x0 & 0xffff) | ((uint32_t)(x1 & 0xffff) << 16L); d[1] = - (unsigned long)(x2 & 0xffff) | ((unsigned long)(x3 & 0xffff) << 16L); + (uint32_t)(x2 & 0xffff) | ((uint32_t)(x3 & 0xffff) << 16L); } Index: crypto/rc2/rc2_ecb.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/rc2/rc2_ecb.c,v retrieving revision 1.1.1.5 retrieving revision 1.6 diff -p -p -u -r1.1.1.5 -r1.6 --- crypto/rc2/rc2_ecb.c 22 Mar 2020 00:49:10 -0000 1.1.1.5 +++ crypto/rc2/rc2_ecb.c 22 Mar 2020 00:53:08 -0000 1.6 @@ -22,7 +22,7 @@ void RC2_ecb_encrypt(const unsigned char *in, unsigned char *out, RC2_KEY *ks, int encrypt) { - unsigned long l, d[2]; + uint32_t l, d[2]; c2l(in, l); d[0] = l; Index: crypto/rc2/rc2_local.h =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/rc2/rc2_local.h,v retrieving revision 1.1.1.1 retrieving revision 1.2 diff -p -p -u -r1.1.1.1 -r1.2 --- crypto/rc2/rc2_local.h 22 Mar 2020 00:49:10 -0000 1.1.1.1 +++ crypto/rc2/rc2_local.h 22 Mar 2020 00:53:08 -0000 1.2 @@ -7,6 +7,8 @@ * https://www.openssl.org/source/license.html */ +#include + #undef c2l #define c2l(c,l) (l =((unsigned long)(*((c)++))) , \ l|=((unsigned long)(*((c)++)))<< 8L, \ Index: crypto/rc2/rc2cfb64.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/rc2/rc2cfb64.c,v retrieving revision 1.1.1.4 retrieving revision 1.5 diff -p -p -u -r1.1.1.4 -r1.5 --- crypto/rc2/rc2cfb64.c 22 Mar 2020 00:49:11 -0000 1.1.1.4 +++ crypto/rc2/rc2cfb64.c 22 Mar 2020 00:53:08 -0000 1.5 @@ -20,10 +20,10 @@ void RC2_cfb64_encrypt(const unsigned ch long length, RC2_KEY *schedule, unsigned char *ivec, int *num, int encrypt) { - register unsigned long v0, v1, t; + register uint32_t v0, v1, t; register int n = *num; register long l = length; - unsigned long ti[2]; + uint32_t ti[2]; unsigned char *iv, c, cc; iv = (unsigned char *)ivec; @@ -34,7 +34,7 @@ void RC2_cfb64_encrypt(const unsigned ch ti[0] = v0; c2l(iv, v1); ti[1] = v1; - RC2_encrypt((unsigned long *)ti, schedule); + RC2_encrypt(ti, schedule); iv = (unsigned char *)ivec; t = ti[0]; l2c(t, iv); @@ -54,7 +54,7 @@ void RC2_cfb64_encrypt(const unsigned ch ti[0] = v0; c2l(iv, v1); ti[1] = v1; - RC2_encrypt((unsigned long *)ti, schedule); + RC2_encrypt(ti, schedule); iv = (unsigned char *)ivec; t = ti[0]; l2c(t, iv); Index: crypto/rc2/rc2ofb64.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/rc2/rc2ofb64.c,v retrieving revision 1.1.1.4 retrieving revision 1.5 diff -p -p -u -r1.1.1.4 -r1.5 --- crypto/rc2/rc2ofb64.c 22 Mar 2020 00:49:11 -0000 1.1.1.4 +++ crypto/rc2/rc2ofb64.c 22 Mar 2020 00:53:08 -0000 1.5 @@ -19,12 +19,12 @@ void RC2_ofb64_encrypt(const unsigned ch long length, RC2_KEY *schedule, unsigned char *ivec, int *num) { - register unsigned long v0, v1, t; + register uint32_t v0, v1, t; register int n = *num; register long l = length; unsigned char d[8]; register char *dp; - unsigned long ti[2]; + uint32_t ti[2]; unsigned char *iv; int save = 0; @@ -38,7 +38,7 @@ void RC2_ofb64_encrypt(const unsigned ch l2c(v1, dp); while (l--) { if (n == 0) { - RC2_encrypt((unsigned long *)ti, schedule); + RC2_encrypt(ti, schedule); dp = (char *)d; t = ti[0]; l2c(t, dp); Index: crypto/rc5/rc5_ecb.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/rc5/rc5_ecb.c,v retrieving revision 1.1.1.4 retrieving revision 1.5 diff -p -p -u -r1.1.1.4 -r1.5 --- crypto/rc5/rc5_ecb.c 22 Mar 2020 00:49:11 -0000 1.1.1.4 +++ crypto/rc5/rc5_ecb.c 22 Mar 2020 00:53:08 -0000 1.5 @@ -14,7 +14,7 @@ void RC5_32_ecb_encrypt(const unsigned char *in, unsigned char *out, RC5_32_KEY *ks, int encrypt) { - unsigned long l, d[2]; + RC5_32_INT l, d[2]; c2l(in, l); d[0] = l; Index: crypto/rc5/rc5_enc.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/rc5/rc5_enc.c,v retrieving revision 1.1.1.4 retrieving revision 1.5 diff -p -p -u -r1.1.1.4 -r1.5 --- crypto/rc5/rc5_enc.c 22 Mar 2020 00:49:11 -0000 1.1.1.4 +++ crypto/rc5/rc5_enc.c 22 Mar 2020 00:53:08 -0000 1.5 @@ -15,10 +15,10 @@ void RC5_32_cbc_encrypt(const unsigned c long length, RC5_32_KEY *ks, unsigned char *iv, int encrypt) { - register unsigned long tin0, tin1; - register unsigned long tout0, tout1, xor0, xor1; + register RC5_32_INT tin0, tin1; + register RC5_32_INT tout0, tout1, xor0, xor1; register long l = length; - unsigned long tin[2]; + RC5_32_INT tin[2]; if (encrypt) { c2l(iv, tout0); @@ -87,7 +87,7 @@ void RC5_32_cbc_encrypt(const unsigned c tin[0] = tin[1] = 0; } -void RC5_32_encrypt(unsigned long *d, RC5_32_KEY *key) +void RC5_32_encrypt(RC5_32_INT *d, RC5_32_KEY *key) { RC5_32_INT a, b, *s; @@ -123,7 +123,7 @@ void RC5_32_encrypt(unsigned long *d, RC d[1] = b; } -void RC5_32_decrypt(unsigned long *d, RC5_32_KEY *key) +void RC5_32_decrypt(RC5_32_INT *d, RC5_32_KEY *key) { RC5_32_INT a, b, *s; Index: crypto/rc5/rc5cfb64.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/rc5/rc5cfb64.c,v retrieving revision 1.1.1.4 retrieving revision 1.5 diff -p -p -u -r1.1.1.4 -r1.5 --- crypto/rc5/rc5cfb64.c 22 Mar 2020 00:49:11 -0000 1.1.1.4 +++ crypto/rc5/rc5cfb64.c 22 Mar 2020 00:53:08 -0000 1.5 @@ -20,10 +20,10 @@ void RC5_32_cfb64_encrypt(const unsigned long length, RC5_32_KEY *schedule, unsigned char *ivec, int *num, int encrypt) { - register unsigned long v0, v1, t; + register RC5_32_INT v0, v1, t; register int n = *num; register long l = length; - unsigned long ti[2]; + RC5_32_INT ti[2]; unsigned char *iv, c, cc; iv = (unsigned char *)ivec; @@ -34,7 +34,7 @@ void RC5_32_cfb64_encrypt(const unsigned ti[0] = v0; c2l(iv, v1); ti[1] = v1; - RC5_32_encrypt((unsigned long *)ti, schedule); + RC5_32_encrypt(ti, schedule); iv = (unsigned char *)ivec; t = ti[0]; l2c(t, iv); @@ -54,7 +54,7 @@ void RC5_32_cfb64_encrypt(const unsigned ti[0] = v0; c2l(iv, v1); ti[1] = v1; - RC5_32_encrypt((unsigned long *)ti, schedule); + RC5_32_encrypt(ti, schedule); iv = (unsigned char *)ivec; t = ti[0]; l2c(t, iv); Index: crypto/rc5/rc5ofb64.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/crypto/rc5/rc5ofb64.c,v retrieving revision 1.1.1.4 retrieving revision 1.5 diff -p -p -u -r1.1.1.4 -r1.5 --- crypto/rc5/rc5ofb64.c 22 Mar 2020 00:49:11 -0000 1.1.1.4 +++ crypto/rc5/rc5ofb64.c 22 Mar 2020 00:53:08 -0000 1.5 @@ -19,12 +19,12 @@ void RC5_32_ofb64_encrypt(const unsigned long length, RC5_32_KEY *schedule, unsigned char *ivec, int *num) { - register unsigned long v0, v1, t; + register RC5_32_INT v0, v1, t; register int n = *num; register long l = length; unsigned char d[8]; register char *dp; - unsigned long ti[2]; + RC5_32_INT ti[2]; unsigned char *iv; int save = 0; @@ -38,7 +38,7 @@ void RC5_32_ofb64_encrypt(const unsigned l2c(v1, dp); while (l--) { if (n == 0) { - RC5_32_encrypt((unsigned long *)ti, schedule); + RC5_32_encrypt(ti, schedule); dp = (char *)d; t = ti[0]; l2c(t, dp); Index: include/internal/refcount.h =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/include/internal/refcount.h,v retrieving revision 1.1.1.4 retrieving revision 1.5 diff -p -p -u -r1.1.1.4 -r1.5 --- include/internal/refcount.h 22 Mar 2020 00:49:14 -0000 1.1.1.4 +++ include/internal/refcount.h 22 Mar 2020 00:53:10 -0000 1.5 @@ -17,7 +17,7 @@ # endif # if defined(__STDC_VERSION__) && __STDC_VERSION__ >= 201112L \ - && !defined(__STDC_NO_ATOMICS__) + && !defined(__STDC_NO_ATOMICS__) && !defined(__lint__) # include # define HAVE_C11_ATOMICS # endif Index: include/internal/tsan_assist.h =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/include/internal/tsan_assist.h,v retrieving revision 1.1.1.5 retrieving revision 1.6 diff -p -p -u -r1.1.1.5 -r1.6 --- include/internal/tsan_assist.h 23 Jan 2020 02:48:05 -0000 1.1.1.5 +++ include/internal/tsan_assist.h 23 Jan 2020 02:54:56 -0000 1.6 @@ -48,7 +48,7 @@ */ #if defined(__STDC_VERSION__) && __STDC_VERSION__ >= 201112L \ - && !defined(__STDC_NO_ATOMICS__) + && !defined(__STDC_NO_ATOMICS__) && !defined(__lint__) # include # if defined(ATOMIC_POINTER_LOCK_FREE) \ Index: include/openssl/idea.h =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/include/openssl/idea.h,v retrieving revision 1.1.1.1 retrieving revision 1.2 diff -p -p -u -r1.1.1.1 -r1.2 --- include/openssl/idea.h 8 Feb 2018 20:56:58 -0000 1.1.1.1 +++ include/openssl/idea.h 8 Feb 2018 21:51:36 -0000 1.2 @@ -43,7 +43,7 @@ void IDEA_cfb64_encrypt(const unsigned c void IDEA_ofb64_encrypt(const unsigned char *in, unsigned char *out, long length, IDEA_KEY_SCHEDULE *ks, unsigned char *iv, int *num); -void IDEA_encrypt(unsigned long *in, IDEA_KEY_SCHEDULE *ks); +void IDEA_encrypt(unsigned int *in, IDEA_KEY_SCHEDULE *ks); # if OPENSSL_API_COMPAT < 0x10100000L # define idea_options IDEA_options Index: include/openssl/rc2.h =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/include/openssl/rc2.h,v retrieving revision 1.1.1.1 retrieving revision 1.2 diff -p -p -u -r1.1.1.1 -r1.2 --- include/openssl/rc2.h 8 Feb 2018 20:56:58 -0000 1.1.1.1 +++ include/openssl/rc2.h 8 Feb 2018 21:51:36 -0000 1.2 @@ -32,8 +32,8 @@ typedef struct rc2_key_st { void RC2_set_key(RC2_KEY *key, int len, const unsigned char *data, int bits); void RC2_ecb_encrypt(const unsigned char *in, unsigned char *out, RC2_KEY *key, int enc); -void RC2_encrypt(unsigned long *data, RC2_KEY *key); -void RC2_decrypt(unsigned long *data, RC2_KEY *key); +void RC2_encrypt(unsigned int *data, RC2_KEY *key); +void RC2_decrypt(unsigned int *data, RC2_KEY *key); void RC2_cbc_encrypt(const unsigned char *in, unsigned char *out, long length, RC2_KEY *ks, unsigned char *iv, int enc); void RC2_cfb64_encrypt(const unsigned char *in, unsigned char *out, Index: include/openssl/safestack.h =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/include/openssl/safestack.h,v retrieving revision 1.1.1.3 retrieving revision 1.6 diff -p -p -u -r1.1.1.3 -r1.6 --- include/openssl/safestack.h 12 Mar 2019 16:44:11 -0000 1.1.1.3 +++ include/openssl/safestack.h 22 Mar 2020 02:30:15 -0000 1.6 @@ -26,104 +26,104 @@ extern "C" { typedef t3 * (*sk_##t1##_copyfunc)(const t3 *a); \ static ossl_unused ossl_inline int sk_##t1##_num(const STACK_OF(t1) *sk) \ { \ - return OPENSSL_sk_num((const OPENSSL_STACK *)sk); \ + return OPENSSL_sk_num((const OPENSSL_STACK *)(const void *)sk); \ } \ - static ossl_unused ossl_inline t2 *sk_##t1##_value(const STACK_OF(t1) *sk, int idx) \ + static ossl_unused ossl_inline t2 *sk_##t1##_value(const STACK_OF(t1)*sk, int idx) \ { \ - return (t2 *)OPENSSL_sk_value((const OPENSSL_STACK *)sk, idx); \ + return (t2 *)(void *)OPENSSL_sk_value((const OPENSSL_STACK *)(const void *)sk, idx); \ } \ static ossl_unused ossl_inline STACK_OF(t1) *sk_##t1##_new(sk_##t1##_compfunc compare) \ { \ - return (STACK_OF(t1) *)OPENSSL_sk_new((OPENSSL_sk_compfunc)compare); \ + return (STACK_OF(t1) *)(void *)OPENSSL_sk_new((OPENSSL_sk_compfunc)compare); \ } \ static ossl_unused ossl_inline STACK_OF(t1) *sk_##t1##_new_null(void) \ { \ - return (STACK_OF(t1) *)OPENSSL_sk_new_null(); \ + return (STACK_OF(t1) *)(void *)OPENSSL_sk_new_null(); \ } \ static ossl_unused ossl_inline STACK_OF(t1) *sk_##t1##_new_reserve(sk_##t1##_compfunc compare, int n) \ { \ - return (STACK_OF(t1) *)OPENSSL_sk_new_reserve((OPENSSL_sk_compfunc)compare, n); \ + return (STACK_OF(t1) *)(void *)OPENSSL_sk_new_reserve((OPENSSL_sk_compfunc)compare, n); \ } \ static ossl_unused ossl_inline int sk_##t1##_reserve(STACK_OF(t1) *sk, int n) \ { \ - return OPENSSL_sk_reserve((OPENSSL_STACK *)sk, n); \ + return OPENSSL_sk_reserve((OPENSSL_STACK *)(void *)sk, n); \ } \ static ossl_unused ossl_inline void sk_##t1##_free(STACK_OF(t1) *sk) \ { \ - OPENSSL_sk_free((OPENSSL_STACK *)sk); \ + OPENSSL_sk_free((OPENSSL_STACK *)(void *)sk); \ } \ static ossl_unused ossl_inline void sk_##t1##_zero(STACK_OF(t1) *sk) \ { \ - OPENSSL_sk_zero((OPENSSL_STACK *)sk); \ + OPENSSL_sk_zero((OPENSSL_STACK *)(void *)sk); \ } \ static ossl_unused ossl_inline t2 *sk_##t1##_delete(STACK_OF(t1) *sk, int i) \ { \ - return (t2 *)OPENSSL_sk_delete((OPENSSL_STACK *)sk, i); \ + return (t2 *)(void *)OPENSSL_sk_delete((OPENSSL_STACK *)(void *)sk, i); \ } \ static ossl_unused ossl_inline t2 *sk_##t1##_delete_ptr(STACK_OF(t1) *sk, t2 *ptr) \ { \ - return (t2 *)OPENSSL_sk_delete_ptr((OPENSSL_STACK *)sk, \ + return (t2 *)(void *)OPENSSL_sk_delete_ptr((OPENSSL_STACK *)(void *)sk, \ (const void *)ptr); \ } \ static ossl_unused ossl_inline int sk_##t1##_push(STACK_OF(t1) *sk, t2 *ptr) \ { \ - return OPENSSL_sk_push((OPENSSL_STACK *)sk, (const void *)ptr); \ + return OPENSSL_sk_push((OPENSSL_STACK *)(void *)sk, (const void *)ptr); \ } \ static ossl_unused ossl_inline int sk_##t1##_unshift(STACK_OF(t1) *sk, t2 *ptr) \ { \ - return OPENSSL_sk_unshift((OPENSSL_STACK *)sk, (const void *)ptr); \ + return OPENSSL_sk_unshift((OPENSSL_STACK *)(void *)sk, (const void *)ptr); \ } \ static ossl_unused ossl_inline t2 *sk_##t1##_pop(STACK_OF(t1) *sk) \ { \ - return (t2 *)OPENSSL_sk_pop((OPENSSL_STACK *)sk); \ + return (t2 *)(void *)OPENSSL_sk_pop((OPENSSL_STACK *)(void *)sk); \ } \ static ossl_unused ossl_inline t2 *sk_##t1##_shift(STACK_OF(t1) *sk) \ { \ - return (t2 *)OPENSSL_sk_shift((OPENSSL_STACK *)sk); \ + return (t2 *)(void *)OPENSSL_sk_shift((OPENSSL_STACK *)(void *)sk); \ } \ static ossl_unused ossl_inline void sk_##t1##_pop_free(STACK_OF(t1) *sk, sk_##t1##_freefunc freefunc) \ { \ - OPENSSL_sk_pop_free((OPENSSL_STACK *)sk, (OPENSSL_sk_freefunc)freefunc); \ + OPENSSL_sk_pop_free((OPENSSL_STACK *)(void *)sk, (OPENSSL_sk_freefunc)freefunc); \ } \ static ossl_unused ossl_inline int sk_##t1##_insert(STACK_OF(t1) *sk, t2 *ptr, int idx) \ { \ - return OPENSSL_sk_insert((OPENSSL_STACK *)sk, (const void *)ptr, idx); \ + return OPENSSL_sk_insert((OPENSSL_STACK *)(void *)sk, (const void *)ptr, idx); \ } \ static ossl_unused ossl_inline t2 *sk_##t1##_set(STACK_OF(t1) *sk, int idx, t2 *ptr) \ { \ - return (t2 *)OPENSSL_sk_set((OPENSSL_STACK *)sk, idx, (const void *)ptr); \ + return (t2 *)(void *)OPENSSL_sk_set((OPENSSL_STACK *)(void *)sk, idx, (const void *)ptr); \ } \ static ossl_unused ossl_inline int sk_##t1##_find(STACK_OF(t1) *sk, t2 *ptr) \ { \ - return OPENSSL_sk_find((OPENSSL_STACK *)sk, (const void *)ptr); \ + return OPENSSL_sk_find((OPENSSL_STACK *)(void *)sk, (const void *)ptr); \ } \ static ossl_unused ossl_inline int sk_##t1##_find_ex(STACK_OF(t1) *sk, t2 *ptr) \ { \ - return OPENSSL_sk_find_ex((OPENSSL_STACK *)sk, (const void *)ptr); \ + return OPENSSL_sk_find_ex((OPENSSL_STACK *)(void *)sk, (const void *)ptr); \ } \ static ossl_unused ossl_inline void sk_##t1##_sort(STACK_OF(t1) *sk) \ { \ - OPENSSL_sk_sort((OPENSSL_STACK *)sk); \ + OPENSSL_sk_sort((OPENSSL_STACK *)(void *)sk); \ } \ static ossl_unused ossl_inline int sk_##t1##_is_sorted(const STACK_OF(t1) *sk) \ { \ - return OPENSSL_sk_is_sorted((const OPENSSL_STACK *)sk); \ + return OPENSSL_sk_is_sorted((const OPENSSL_STACK *)(const void *)sk); \ } \ static ossl_unused ossl_inline STACK_OF(t1) * sk_##t1##_dup(const STACK_OF(t1) *sk) \ { \ - return (STACK_OF(t1) *)OPENSSL_sk_dup((const OPENSSL_STACK *)sk); \ + return (STACK_OF(t1) *)(void *)OPENSSL_sk_dup((const OPENSSL_STACK *)(const void *)sk); \ } \ static ossl_unused ossl_inline STACK_OF(t1) *sk_##t1##_deep_copy(const STACK_OF(t1) *sk, \ sk_##t1##_copyfunc copyfunc, \ sk_##t1##_freefunc freefunc) \ { \ - return (STACK_OF(t1) *)OPENSSL_sk_deep_copy((const OPENSSL_STACK *)sk, \ + return (STACK_OF(t1) *)(void *)OPENSSL_sk_deep_copy((const OPENSSL_STACK *)(const void *)sk, \ (OPENSSL_sk_copyfunc)copyfunc, \ (OPENSSL_sk_freefunc)freefunc); \ } \ static ossl_unused ossl_inline sk_##t1##_compfunc sk_##t1##_set_cmp_func(STACK_OF(t1) *sk, sk_##t1##_compfunc compare) \ { \ - return (sk_##t1##_compfunc)OPENSSL_sk_set_cmp_func((OPENSSL_STACK *)sk, (OPENSSL_sk_compfunc)compare); \ + return (sk_##t1##_compfunc)OPENSSL_sk_set_cmp_func((OPENSSL_STACK *)(void *)sk, (OPENSSL_sk_compfunc)compare); \ } # define DEFINE_SPECIAL_STACK_OF(t1, t2) SKM_DEFINE_STACK_OF(t1, t2, t2) Index: include/openssl/sha.h =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/include/openssl/sha.h,v retrieving revision 1.1.1.1 retrieving revision 1.2 diff -p -p -u -r1.1.1.1 -r1.2 --- include/openssl/sha.h 8 Feb 2018 20:56:57 -0000 1.1.1.1 +++ include/openssl/sha.h 13 Feb 2018 22:32:10 -0000 1.2 @@ -10,6 +10,10 @@ #ifndef HEADER_SHA_H # define HEADER_SHA_H +#ifdef USE_LIBC_SHA2 +# include +#endif + # include # include @@ -44,6 +48,7 @@ int SHA1_Final(unsigned char *md, SHA_CT unsigned char *SHA1(const unsigned char *d, size_t n, unsigned char *md); void SHA1_Transform(SHA_CTX *c, const unsigned char *data); +#ifndef USE_LIBC_SHA2 # define SHA256_CBLOCK (SHA_LBLOCK*4)/* SHA-256 treats input data as a * contiguous array of 32 bit wide * big-endian values. */ @@ -112,6 +117,14 @@ int SHA512_Final(unsigned char *md, SHA5 unsigned char *SHA512(const unsigned char *d, size_t n, unsigned char *md); void SHA512_Transform(SHA512_CTX *c, const unsigned char *data); +#else +#define SHA256_CBLOCK 64 +#define SHA512_CBLOCK 128 +unsigned char *SHA256(const unsigned char *d, size_t n, unsigned char *md); +unsigned char *SHA384(const unsigned char *d, size_t n, unsigned char *md); +unsigned char *SHA512(const unsigned char *d, size_t n, unsigned char *md); +#endif + #ifdef __cplusplus } #endif Index: test/destest.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/test/destest.c,v retrieving revision 1.1.1.2 retrieving revision 1.3 diff -p -p -u -r1.1.1.2 -r1.3 --- test/destest.c 23 Sep 2018 13:17:29 -0000 1.1.1.2 +++ test/destest.c 23 Sep 2018 13:33:03 -0000 1.3 @@ -287,7 +287,7 @@ static char *pt(const unsigned char *p, { char *ret; int i; - static char *f = "0123456789ABCDEF"; + static const char *f = "0123456789ABCDEF"; ret = &(buf[0]); for (i = 0; i < 8; i++) { Index: test/enginetest.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/test/enginetest.c,v retrieving revision 1.1.1.3 retrieving revision 1.4 diff -p -p -u -r1.1.1.3 -r1.4 --- test/enginetest.c 23 Jan 2020 02:48:09 -0000 1.1.1.3 +++ test/enginetest.c 23 Jan 2020 02:54:56 -0000 1.4 @@ -166,8 +166,8 @@ static int test_engines(void) ENGINE_free(ptr); } for (loop = 0; loop < NUMTOADD; loop++) { - OPENSSL_free((void *)ENGINE_get_id(block[loop])); - OPENSSL_free((void *)ENGINE_get_name(block[loop])); + OPENSSL_free((void *)(intptr_t)ENGINE_get_id(block[loop])); + OPENSSL_free((void *)(intptr_t)ENGINE_get_name(block[loop])); } to_return = 1; Index: test/hmactest.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/test/hmactest.c,v retrieving revision 1.1.1.3 retrieving revision 1.5 diff -p -p -u -r1.1.1.3 -r1.5 --- test/hmactest.c 22 Mar 2020 00:49:24 -0000 1.1.1.3 +++ test/hmactest.c 22 Mar 2020 00:53:11 -0000 1.5 @@ -27,26 +27,26 @@ # ifndef OPENSSL_NO_MD5 static struct test_st { - unsigned char key[16]; + const char key[16]; int key_len; - unsigned char data[64]; + const char data[64]; int data_len; - unsigned char *digest; + const char *digest; } test[8] = { { "", 0, "More text test vectors to stuff up EBCDIC machines :-)", 54, - (unsigned char *)"e9139d1e6ee064ef8cf514fc7dc83e86", + "e9139d1e6ee064ef8cf514fc7dc83e86", }, { { 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, }, 16, "Hi There", 8, - (unsigned char *)"9294727a3638bb1c13f48ef8158bfc9d", + "9294727a3638bb1c13f48ef8158bfc9d", }, { "Jefe", 4, "what do ya want for nothing?", 28, - (unsigned char *)"750c783e6ab0b503eaa86e310a5db738", + "750c783e6ab0b503eaa86e310a5db738", }, { { @@ -58,29 +58,31 @@ static struct test_st { 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd - }, 50, (unsigned char *)"56be34521d144c88dbb8c733f0e8b3f6", + }, 50, "56be34521d144c88dbb8c733f0e8b3f6", }, { "", 0, "My test data", 12, - (unsigned char *)"61afdecb95429ef494d61fdee15990cabf0826fc" + "61afdecb95429ef494d61fdee15990cabf0826fc" }, { "", 0, "My test data", 12, - (unsigned char *)"2274b195d90ce8e03406f4b526a47e0787a88a65479938f1a5baa3ce0f079776" + "2274b195d90ce8e03406f4b526a47e0787a88a65479938f1a5baa3ce0f079776" }, { "123456", 6, "My test data", 12, - (unsigned char *)"bab53058ae861a7f191abe2d0145cbb123776a6369ee3f9d79ce455667e411dd" + "bab53058ae861a7f191abe2d0145cbb123776a6369ee3f9d79ce455667e411dd" }, { "12345", 5, "My test data again", 18, - (unsigned char *)"a12396ceddd2a85f4c656bc1e0aa50c78cffde3e" + "a12396ceddd2a85f4c656bc1e0aa50c78cffde3e" } }; # endif static char *pt(unsigned char *md, unsigned int len); +#define UC(a) ((const unsigned char *)(a)) + # ifndef OPENSSL_NO_MD5 static int test_hmac_md5(int idx) @@ -95,10 +97,10 @@ static int test_hmac_md5(int idx) p = pt(HMAC(EVP_md5(), test[idx].key, test[idx].key_len, - test[idx].data, test[idx].data_len, NULL, NULL), + UC(test[idx].data), test[idx].data_len, NULL, NULL), MD5_DIGEST_LENGTH); - if (!TEST_str_eq(p, (char *)test[idx].digest)) + if (!TEST_str_eq(p, test[idx].digest)) return 0; return 1; @@ -114,9 +116,9 @@ static int test_hmac_bad(void) if (!TEST_ptr(ctx) || !TEST_ptr_null(HMAC_CTX_get_md(ctx)) || !TEST_false(HMAC_Init_ex(ctx, NULL, 0, NULL, NULL)) - || !TEST_false(HMAC_Update(ctx, test[4].data, test[4].data_len)) + || !TEST_false(HMAC_Update(ctx, UC(test[4].data), test[4].data_len)) || !TEST_false(HMAC_Init_ex(ctx, NULL, 0, EVP_sha1(), NULL)) - || !TEST_false(HMAC_Update(ctx, test[4].data, test[4].data_len))) + || !TEST_false(HMAC_Update(ctx, UC(test[4].data), test[4].data_len))) goto err; ret = 1; @@ -139,17 +141,17 @@ static int test_hmac_run(void) if (!TEST_ptr(ctx) || !TEST_ptr_null(HMAC_CTX_get_md(ctx)) || !TEST_false(HMAC_Init_ex(ctx, NULL, 0, NULL, NULL)) - || !TEST_false(HMAC_Update(ctx, test[4].data, test[4].data_len)) + || !TEST_false(HMAC_Update(ctx, UC(test[4].data), test[4].data_len)) || !TEST_false(HMAC_Init_ex(ctx, test[4].key, -1, EVP_sha1(), NULL))) goto err; if (!TEST_true(HMAC_Init_ex(ctx, test[4].key, test[4].key_len, EVP_sha1(), NULL)) - || !TEST_true(HMAC_Update(ctx, test[4].data, test[4].data_len)) + || !TEST_true(HMAC_Update(ctx, UC(test[4].data), test[4].data_len)) || !TEST_true(HMAC_Final(ctx, buf, &len))) goto err; p = pt(buf, len); - if (!TEST_str_eq(p, (char *)test[4].digest)) + if (!TEST_str_eq(p, test[4].digest)) goto err; if (!TEST_false(HMAC_Init_ex(ctx, NULL, 0, EVP_sha256(), NULL))) @@ -157,29 +159,29 @@ static int test_hmac_run(void) if (!TEST_true(HMAC_Init_ex(ctx, test[5].key, test[5].key_len, EVP_sha256(), NULL)) || !TEST_ptr_eq(HMAC_CTX_get_md(ctx), EVP_sha256()) - || !TEST_true(HMAC_Update(ctx, test[5].data, test[5].data_len)) + || !TEST_true(HMAC_Update(ctx, UC(test[5].data), test[5].data_len)) || !TEST_true(HMAC_Final(ctx, buf, &len))) goto err; p = pt(buf, len); - if (!TEST_str_eq(p, (char *)test[5].digest)) + if (!TEST_str_eq(p, test[5].digest)) goto err; if (!TEST_true(HMAC_Init_ex(ctx, test[6].key, test[6].key_len, NULL, NULL)) - || !TEST_true(HMAC_Update(ctx, test[6].data, test[6].data_len)) + || !TEST_true(HMAC_Update(ctx, UC(test[6].data), test[6].data_len)) || !TEST_true(HMAC_Final(ctx, buf, &len))) goto err; p = pt(buf, len); - if (!TEST_str_eq(p, (char *)test[6].digest)) + if (!TEST_str_eq(p, test[6].digest)) goto err; /* Test reusing a key */ if (!TEST_true(HMAC_Init_ex(ctx, NULL, 0, NULL, NULL)) - || !TEST_true(HMAC_Update(ctx, test[6].data, test[6].data_len)) + || !TEST_true(HMAC_Update(ctx, UC(test[6].data), test[6].data_len)) || !TEST_true(HMAC_Final(ctx, buf, &len))) goto err; p = pt(buf, len); - if (!TEST_str_eq(p, (char *)test[6].digest)) + if (!TEST_str_eq(p, test[6].digest)) goto err; /* @@ -187,11 +189,11 @@ static int test_hmac_run(void) * last time */ if (!TEST_true(HMAC_Init_ex(ctx, NULL, 0, EVP_sha256(), NULL)) - || !TEST_true(HMAC_Update(ctx, test[6].data, test[6].data_len)) + || !TEST_true(HMAC_Update(ctx, UC(test[6].data), test[6].data_len)) || !TEST_true(HMAC_Final(ctx, buf, &len))) goto err; p = pt(buf, len); - if (!TEST_str_eq(p, (char *)test[6].digest)) + if (!TEST_str_eq(p, test[6].digest)) goto err; ret = 1; @@ -206,9 +208,9 @@ static int test_hmac_single_shot(void) char *p; /* Test single-shot with an empty key. */ - p = pt(HMAC(EVP_sha1(), NULL, 0, test[4].data, test[4].data_len, + p = pt(HMAC(EVP_sha1(), NULL, 0, UC(test[4].data), test[4].data_len, NULL, NULL), SHA_DIGEST_LENGTH); - if (!TEST_str_eq(p, (char *)test[4].digest)) + if (!TEST_str_eq(p, test[4].digest)) return 0; return 1; @@ -229,13 +231,13 @@ static int test_hmac_copy(void) goto err; if (!TEST_true(HMAC_Init_ex(ctx, test[7].key, test[7].key_len, EVP_sha1(), NULL)) - || !TEST_true(HMAC_Update(ctx, test[7].data, test[7].data_len)) + || !TEST_true(HMAC_Update(ctx, UC(test[7].data), test[7].data_len)) || !TEST_true(HMAC_CTX_copy(ctx2, ctx)) || !TEST_true(HMAC_Final(ctx2, buf, &len))) goto err; p = pt(buf, len); - if (!TEST_str_eq(p, (char *)test[7].digest)) + if (!TEST_str_eq(p, test[7].digest)) goto err; ret = 1; Index: test/ideatest.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/test/ideatest.c,v retrieving revision 1.1.1.2 retrieving revision 1.3 diff -p -p -u -r1.1.1.2 -r1.3 --- test/ideatest.c 23 Sep 2018 13:17:29 -0000 1.1.1.2 +++ test/ideatest.c 23 Sep 2018 13:33:03 -0000 1.3 @@ -74,7 +74,7 @@ static int test_idea_cbc(void) IDEA_set_encrypt_key(k, &key); IDEA_set_decrypt_key(&key, &dkey); memcpy(iv, k, sizeof(iv)); - IDEA_cbc_encrypt((unsigned char *)text, out, text_len, &key, iv, 1); + IDEA_cbc_encrypt((const unsigned char *)text, out, text_len, &key, iv, 1); memcpy(iv, k, sizeof(iv)); IDEA_cbc_encrypt(out, out, IDEA_BLOCK, &dkey, iv, 0); IDEA_cbc_encrypt(&out[8], &out[8], text_len - 8, &dkey, iv, 0); Index: test/recipes/30-test_evp_data/evpkdf.txt =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/test/recipes/30-test_evp_data/evpkdf.txt,v retrieving revision 1.1.1.3 retrieving revision 1.3 diff -p -p -u -r1.1.1.3 -r1.3 --- test/recipes/30-test_evp_data/evpkdf.txt 15 Mar 2022 20:47:36 -0000 1.1.1.3 +++ test/recipes/30-test_evp_data/evpkdf.txt 15 Mar 2022 20:51:13 -0000 1.3 @@ -295,11 +295,11 @@ Ctrl.p = p:1 Output = 7023bdcb3afd7348461c06cd81fd38ebfda8fbba904f8e3ea9b543f6545da1f2d5432955613f0fcf62d49705242a9af9e61e85dc0d651e40dfcf017b45575887 # Out of memory - request > 2 GB of memory -KDF = scrypt -Ctrl.pass = pass:pleaseletmein -Ctrl.salt = salt:SodiumChloride -Ctrl.N = N:2097152 -Ctrl.r = r:8 -Ctrl.p = p:1 -Result = KDF_DERIVE_ERROR - +# XXX: skip for now; on small machines we run out of swap +#KDF = scrypt +#Ctrl.pass = pass:pleaseletmein +#Ctrl.salt = salt:SodiumChloride +#Ctrl.N = N:2097152 +#Ctrl.r = r:8 +#Ctrl.p = p:1 +#Result = KDF_DERIVE_ERROR Index: test/testutil/format_output.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/test/testutil/format_output.c,v retrieving revision 1.1.1.2 retrieving revision 1.6 diff -p -p -u -r1.1.1.2 -r1.6 --- test/testutil/format_output.c 7 Jan 2022 15:46:29 -0000 1.1.1.2 +++ test/testutil/format_output.c 7 Jan 2022 15:50:11 -0000 1.6 @@ -31,9 +31,9 @@ static void test_diff_header(const char static void test_string_null_empty(const char *m, char c) { if (m == NULL) - test_printf_stderr("% 4s %c NULL\n", "", c); + test_printf_stderr("%4s %c NULL\n", "", c); else - test_printf_stderr("% 4u:%c ''\n", 0u, c); + test_printf_stderr("%4u:%c ''\n", 0u, c); } static void test_fail_string_common(const char *prefix, const char *file, @@ -94,18 +94,18 @@ static void test_fail_string_common(cons bdiff[i] = '\0'; } if (n1 == n2 && !diff) { - test_printf_stderr("% 4u: '%s'\n", cnt, n2 > n1 ? b2 : b1); + test_printf_stderr("%4u: '%s'\n", cnt, n2 > n1 ? b2 : b1); } else { if (cnt == 0 && (m1 == NULL || *m1 == '\0')) test_string_null_empty(m1, '-'); else if (n1 > 0) - test_printf_stderr("% 4u:- '%s'\n", cnt, b1); + test_printf_stderr("%4u:- '%s'\n", cnt, b1); if (cnt == 0 && (m2 == NULL || *m2 == '\0')) test_string_null_empty(m2, '+'); else if (n2 > 0) - test_printf_stderr("% 4u:+ '%s'\n", cnt, b2); + test_printf_stderr("%4u:+ '%s'\n", cnt, b2); if (diff && i > 0) - test_printf_stderr("% 4s %s\n", "", bdiff); + test_printf_stderr("%4s %s\n", "", bdiff); } if (m1 != NULL) m1 += n1; @@ -208,6 +208,7 @@ static int convert_bn_memory(const unsig { int n = bytes * 2, i; char *p = out, *q = NULL; + const char *r; if (bn != NULL && !BN_is_zero(bn)) { hex_convert_memory(in, bytes, out, BN_OUTPUT_SIZE); @@ -250,10 +251,10 @@ static int convert_bn_memory(const unsig } *p = '\0'; if (bn == NULL) - q = "NULL"; + r = "NULL"; else - q = BN_is_negative(bn) ? "-0" : "0"; - strcpy(p - strlen(q), q); + r = BN_is_negative(bn) ? "-0" : "0"; + strcpy(p - strlen(r), r); return 0; } @@ -411,7 +412,7 @@ void test_output_bignum(const char *name static void test_memory_null_empty(const unsigned char *m, char c) { if (m == NULL) - test_printf_stderr("% 4s %c%s\n", "", c, "NULL"); + test_printf_stderr("%4s %c%s\n", "", c, "NULL"); else test_printf_stderr("%04x %c%s\n", 0u, c, "empty"); } @@ -495,7 +496,7 @@ static void test_fail_memory_common(cons else if (n2 > 0) test_printf_stderr("%04x:+%s\n", cnt, b2); if (diff && i > 0) - test_printf_stderr("% 4s %s\n", "", bdiff); + test_printf_stderr("%4s %s\n", "", bdiff); } if (m1 != NULL) m1 += n1; Index: test/testutil/main.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/test/testutil/main.c,v retrieving revision 1.1.1.2 retrieving revision 1.5 diff -p -p -u -r1.1.1.2 -r1.5 --- test/testutil/main.c 12 Mar 2019 16:44:18 -0000 1.1.1.2 +++ test/testutil/main.c 23 Mar 2020 22:21:34 -0000 1.5 @@ -25,7 +25,7 @@ static void check_arg_usage(void) for (i = 0; i < n; i++) if (!arg_used[i+1]) - test_printf_stderr("Warning ignored command-line argument %d: %s\n", + test_printf_stderr("Warning ignored command-line argument %zu: %s\n", i, args[i+1]); if (i < arg_count) test_printf_stderr("Warning arguments %zu and later unchecked\n", i); Index: test/testutil/output.h =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/test/testutil/output.h,v retrieving revision 1.1.1.2 retrieving revision 1.4 diff -p -p -u -r1.1.1.2 -r1.4 --- test/testutil/output.h 22 Mar 2020 00:49:29 -0000 1.1.1.2 +++ test/testutil/output.h 23 Mar 2020 22:21:34 -0000 1.4 @@ -11,6 +11,7 @@ # define OSSL_TESTUTIL_OUTPUT_H #include +#include "../testutil.h" /* * The basic I/O functions used internally by the test framework. These @@ -19,14 +20,14 @@ void test_open_streams(void); void test_close_streams(void); /* The following ALL return the number of characters written */ -int test_vprintf_stdout(const char *fmt, va_list ap); -int test_vprintf_stderr(const char *fmt, va_list ap); +int test_vprintf_stdout(const char *fmt, va_list ap) PRINTF_FORMAT(1, 0); +int test_vprintf_stderr(const char *fmt, va_list ap) PRINTF_FORMAT(1, 0); /* These return failure or success */ int test_flush_stdout(void); int test_flush_stderr(void); /* Commodity functions. There's no need to override these */ -int test_printf_stdout(const char *fmt, ...); -int test_printf_stderr(const char *fmt, ...); +int test_printf_stdout(const char *fmt, ...) PRINTF_FORMAT(1, 2); +int test_printf_stderr(const char *fmt, ...) PRINTF_FORMAT(1, 2); #endif /* OSSL_TESTUTIL_OUTPUT_H */ Index: test/testutil/stanza.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/test/testutil/stanza.c,v retrieving revision 1.1.1.1 retrieving revision 1.2 diff -p -p -u -r1.1.1.1 -r1.2 --- test/testutil/stanza.c 23 Sep 2018 13:17:35 -0000 1.1.1.1 +++ test/testutil/stanza.c 23 Sep 2018 13:33:03 -0000 1.2 @@ -86,7 +86,8 @@ static char *strip_spaces(char *p) int test_readstanza(STANZA *s) { PAIR *pp = s->pairs; - char *p, *equals, *key, *value; + char *p, *equals, *key; + const char *value; for (s->numpairs = 0; BIO_gets(s->fp, s->buff, sizeof(s->buff)); ) { s->curr++; Index: test/testutil/tap_bio.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/test/testutil/tap_bio.c,v retrieving revision 1.1.1.1 retrieving revision 1.3 diff -p -p -u -r1.1.1.1 -r1.3 --- test/testutil/tap_bio.c 23 Sep 2018 13:17:35 -0000 1.1.1.1 +++ test/testutil/tap_bio.c 22 Mar 2020 00:53:11 -0000 1.3 @@ -96,10 +96,11 @@ static int tap_write_ex(BIO *b, const ch BIO *next = BIO_next(b); size_t i; int j; + char EMPTY[] = ""; for (i = 0; i < size; i++) { if (BIO_get_data(b) == NULL) { - BIO_set_data(b, ""); + BIO_set_data(b, EMPTY); for (j = 0; j < subtest_level(); j++) if (!write_string(next, " ", 1)) goto err; Index: test/testutil/tests.c =================================================================== RCS file: /cvsroot/src/crypto/external/bsd/openssl/dist/test/testutil/tests.c,v retrieving revision 1.1.1.2 retrieving revision 1.6 diff -p -p -u -r1.1.1.2 -r1.6 --- test/testutil/tests.c 7 Jan 2022 15:46:29 -0000 1.1.1.2 +++ test/testutil/tests.c 7 Jan 2022 15:50:11 -0000 1.6 @@ -72,6 +72,7 @@ static void test_fail_message(const char const char *fmt, ...) PRINTF_FORMAT(8, 9); +PRINTF_FORMAT(8, 0) static void test_fail_message_va(const char *prefix, const char *file, int line, const char *type, const char *left, const char *right, @@ -420,7 +421,7 @@ int test_BN_abs_eq_word(const char *file static const char *print_time(const ASN1_TIME *t) { - return t == NULL ? "" : (char *)ASN1_STRING_get0_data(t); + return t == NULL ? "" : (const char *)ASN1_STRING_get0_data(t); } #define DEFINE_TIME_T_COMPARISON(opname, op) \