Updating src tree:
P src/crypto/external/bsd/openssl/dist/crypto/modes/gcm128.c
cvs update:
`src/crypto/external/bsd/openssl/lib/libcrypto/arch/sparc/modes.inc' is no
longer in the repository
P src/distrib/sets/lists/comp/mi
P src/distrib/sets/lists/tests/mi
P src/doc/3RDPARTY
P
On Thu, 8 Apr 2021, Martin Husemann wrote:
> This has now been fixed in -current and already been pulled up to netbsd-9.
I've now updated a test system with the latest netbsd-9/sparc and the
simplified test case works. It does still probe the several sparcv9
instructions, but after continuing
hello John. Just for completeness, and perhaps I'm mistaken, but it
looks like your new
setup isn't actually using tls in its smtp transactions at the moment, see
below. Since I'm not
familir with your setup, I could be completely mistaken, but I note it here in
case you want to
On Thu, 8 Apr 2021, Martin Husemann wrote:
> This has now been fixed in -current and already been pulled up to netbsd-9.
Looking at my rolled-back OpenSSL in my test netbsd-9 tree, the old
"crypto/external/bsd/openssl/lib/libcrypto/arch/sparc/modes.inc" file
conditionalized the assembly
On Thu, 8 Apr 2021, RVP wrote:
> As a workaround, until the offending opcode is found, try
> `#undef GHASH_ASM_SPARC' on line 692 in
> src/crypto/external/bsd/openssl/dist/crypto/modes/gcm128.c to force
> use of the C functions.
A diff of "gcm128c" between -current and netbsd-9 before the pullup
Well, the assembly block is enabled only if we have vis3 instructions:
# elif defined(GHASH_ASM_SPARC)
if (OPENSSL_sparcv9cap_P[0] & SPARCV9_VIS3) {
gcm_init_vis3(ctx->Htable, ctx->H.u);
ctx->gmult = gcm_gmult_vis3;
CTX__GHASH(gcm_ghash_vis3);
} else {
On Thu, Apr 08, 2021 at 02:36:07AM -0500, John D. Baker wrote:
> -# if defined(__arch64__)
> -# define GHASH_ASM_SPARC
> -# define GCM_FUNCREF_4BIT
> +# define GHASH_ASM_SPARC
> +# define GCM_FUNCREF_4BIT
> extern unsigned int OPENSSL_sparcv9cap_P[];
> void gcm_init_vis3(u128 Htable[16],
On Wed, 7 Apr 2021, John D. Baker wrote:
and one more
__sigaction_sigtramp(SIGILL...)
Then, at the end:
PSIG SIGILL SIG_DFL: code=ILL_ILLOPC, addr=0xedccbdf0, trap=2)
Program was terminated due to an illegal opcode being detected in
the gcm_ghash_4bit() assembly function:
Program
This is an automatically generated notice of a NetBSD-current/i386
build failure.
The failure occurred on babylon5.netbsd.org, a NetBSD/amd64 host,
using sources from CVS date 2021.04.08.08.10.30.
An extract from the build.sh output follows:
--- checkflist ---
cd
On Thu, Apr 08, 2021 at 02:36:07AM -0500, John D. Baker wrote:
> That is, before the pull-up of OpenSSL 1.1.1k, the "GHASH_ASM_SPARC"
> macro was conditionally defined iff "__arch64__" was also defined--
> likely an internal compiler definition.
>
> With -current and netbsd-9 after the pull up,
Trying this again since the first message seems to have disappeared.
On Wed, 7 Apr 2021, John D. Baker wrote:
> On Wed, 7 Apr 2021, John D. Baker wrote:
>
> > I'm updating my -current install and will try again from there and
> > see what happens.
>
> Same as netbsd-9 with OpenSSL 1.1.1k.
>
>
> >> and one more
> >>
> >> __sigaction_sigtramp(SIGILL...)
> >>
> >> Then, at the end:
> >>
> >> PSIG SIGILL SIG_DFL: code=ILL_ILLOPC, addr=0xedccbdf0, trap=2)
>
> Program was terminated due to an illegal opcode being detected in
> the gcm_ghash_4bit() assembly function:
yes. John, can
12 matches
Mail list logo