ok?

Index: Makefile
===================================================================
RCS file: /cvs/ports/security/openssl/1.1/Makefile,v
retrieving revision 1.66
diff -u -p -r1.66 Makefile
--- Makefile    29 Nov 2023 11:47:57 -0000      1.66
+++ Makefile    18 Feb 2024 22:23:53 -0000
@@ -8,7 +8,7 @@ PORTROACH=      limit:^1\.1\.[0-9][a-z] skipb
 V=             1.1.1w
 PKGSPEC=       openssl->=1.1.0v0,<1.2v0
 EPOCH=         0
-REVISION=      0
+REVISION=      1
 
 SHLIBVER=      11.6
 SHARED_LIBS=   crypto ${SHLIBVER} \
Index: patches/patch-crypto_aes_asm_aesni-x86_64_pl
===================================================================
RCS file: 
/cvs/ports/security/openssl/1.1/patches/patch-crypto_aes_asm_aesni-x86_64_pl,v
retrieving revision 1.1
diff -u -p -r1.1 patch-crypto_aes_asm_aesni-x86_64_pl
--- patches/patch-crypto_aes_asm_aesni-x86_64_pl        20 Jan 2023 20:49:35 
-0000      1.1
+++ patches/patch-crypto_aes_asm_aesni-x86_64_pl        18 Feb 2024 22:23:53 
-0000
@@ -1,7 +1,95 @@
 Index: crypto/aes/asm/aesni-x86_64.pl
 --- crypto/aes/asm/aesni-x86_64.pl.orig
 +++ crypto/aes/asm/aesni-x86_64.pl
-@@ -4730,6 +4730,7 @@ ___
+@@ -275,6 +275,7 @@ $code.=<<___;
+ .align        16
+ ${PREFIX}_encrypt:
+ .cfi_startproc
++      endbranch
+       movups  ($inp),$inout0          # load input
+       mov     240($key),$rounds       # key->rounds
+ ___
+@@ -293,6 +294,7 @@ $code.=<<___;
+ .align        16
+ ${PREFIX}_decrypt:
+ .cfi_startproc
++      endbranch
+       movups  ($inp),$inout0          # load input
+       mov     240($key),$rounds       # key->rounds
+ ___
+@@ -613,6 +615,7 @@ $code.=<<___;
+ .align        16
+ aesni_ecb_encrypt:
+ .cfi_startproc
++      endbranch
+ ___
+ $code.=<<___ if ($win64);
+       lea     -0x58(%rsp),%rsp
+@@ -985,6 +988,7 @@ $code.=<<___;
+ .align        16
+ aesni_ccm64_encrypt_blocks:
+ .cfi_startproc
++      endbranch
+ ___
+ $code.=<<___ if ($win64);
+       lea     -0x58(%rsp),%rsp
+@@ -1077,6 +1081,7 @@ $code.=<<___;
+ .align        16
+ aesni_ccm64_decrypt_blocks:
+ .cfi_startproc
++      endbranch
+ ___
+ $code.=<<___ if ($win64);
+       lea     -0x58(%rsp),%rsp
+@@ -1203,6 +1208,7 @@ $code.=<<___;
+ .align        16
+ aesni_ctr32_encrypt_blocks:
+ .cfi_startproc
++      endbranch
+       cmp     \$1,$len
+       jne     .Lctr32_bulk
+ 
+@@ -1775,6 +1781,7 @@ $code.=<<___;
+ .align        16
+ aesni_xts_encrypt:
+ .cfi_startproc
++      endbranch
+       lea     (%rsp),%r11                     # frame pointer
+ .cfi_def_cfa_register %r11
+       push    %rbp
+@@ -2258,6 +2265,7 @@ $code.=<<___;
+ .align        16
+ aesni_xts_decrypt:
+ .cfi_startproc
++      endbranch
+       lea     (%rsp),%r11                     # frame pointer
+ .cfi_def_cfa_register %r11
+       push    %rbp
+@@ -2783,6 +2791,7 @@ $code.=<<___;
+ .align        32
+ aesni_ocb_encrypt:
+ .cfi_startproc
++      endbranch
+       lea     (%rsp),%rax
+       push    %rbx
+ .cfi_push     %rbx
+@@ -3249,6 +3258,7 @@ __ocb_encrypt1:
+ .align        32
+ aesni_ocb_decrypt:
+ .cfi_startproc
++      endbranch
+       lea     (%rsp),%rax
+       push    %rbx
+ .cfi_push     %rbx
+@@ -3737,6 +3747,7 @@ $code.=<<___;
+ .align        16
+ ${PREFIX}_cbc_encrypt:
+ .cfi_startproc
++      endbranch
+       test    $len,$len               # check length
+       jz      .Lcbc_ret
+ 
+@@ -4730,6 +4741,7 @@ ___
  }
  
  $code.=<<___;
@@ -9,7 +97,7 @@ Index: crypto/aes/asm/aesni-x86_64.pl
  .align        64
  .Lbswap_mask:
        .byte   15,14,13,12,11,10,9,8,7,6,5,4,3,2,1,0
-@@ -4752,6 +4753,7 @@ $code.=<<___;
+@@ -4752,6 +4764,7 @@ $code.=<<___;
  
  .asciz  "AES for Intel AES-NI, CRYPTOGAMS by <appro\@openssl.org>"
  .align        64
Index: patches/patch-crypto_aes_asm_vpaes-x86_64_pl
===================================================================
RCS file: 
/cvs/ports/security/openssl/1.1/patches/patch-crypto_aes_asm_vpaes-x86_64_pl,v
retrieving revision 1.1
diff -u -p -r1.1 patch-crypto_aes_asm_vpaes-x86_64_pl
--- patches/patch-crypto_aes_asm_vpaes-x86_64_pl        20 Jan 2023 20:49:35 
-0000      1.1
+++ patches/patch-crypto_aes_asm_vpaes-x86_64_pl        18 Feb 2024 22:23:53 
-0000
@@ -1,7 +1,47 @@
 Index: crypto/aes/asm/vpaes-x86_64.pl
 --- crypto/aes/asm/vpaes-x86_64.pl.orig
 +++ crypto/aes/asm/vpaes-x86_64.pl
-@@ -998,6 +998,7 @@ _vpaes_preheat:
+@@ -696,6 +696,7 @@ _vpaes_schedule_mangle:
+ .align        16
+ ${PREFIX}_set_encrypt_key:
+ .cfi_startproc
++      endbranch
+ ___
+ $code.=<<___ if ($win64);
+       lea     -0xb8(%rsp),%rsp
+@@ -746,6 +747,7 @@ $code.=<<___;
+ .align        16
+ ${PREFIX}_set_decrypt_key:
+ .cfi_startproc
++      endbranch
+ ___
+ $code.=<<___ if ($win64);
+       lea     -0xb8(%rsp),%rsp
+@@ -801,6 +803,7 @@ $code.=<<___;
+ .align        16
+ ${PREFIX}_encrypt:
+ .cfi_startproc
++      endbranch
+ ___
+ $code.=<<___ if ($win64);
+       lea     -0xb8(%rsp),%rsp
+@@ -846,6 +849,7 @@ $code.=<<___;
+ .align        16
+ ${PREFIX}_decrypt:
+ .cfi_startproc
++      endbranch
+ ___
+ $code.=<<___ if ($win64);
+       lea     -0xb8(%rsp),%rsp
+@@ -897,6 +901,7 @@ $code.=<<___;
+ .align        16
+ ${PREFIX}_cbc_encrypt:
+ .cfi_startproc
++      endbranch
+       xchg    $key,$len
+ ___
+ ($len,$key)=($key,$len);
+@@ -998,6 +1003,7 @@ _vpaes_preheat:
  ##                     Constants                      ##
  ##                                                    ##
  ########################################################
@@ -9,7 +49,7 @@ Index: crypto/aes/asm/vpaes-x86_64.pl
  .type _vpaes_consts,\@object
  .align        64
  _vpaes_consts:
-@@ -1097,6 +1098,7 @@ _vpaes_consts:
+@@ -1097,6 +1103,7 @@ _vpaes_consts:
  .asciz        "Vector Permutation AES for x86_64/SSSE3, Mike Hamburg 
(Stanford University)"
  .align        64
  .size _vpaes_consts,.-_vpaes_consts
Index: patches/patch-crypto_camellia_asm_cmll-x86_64_pl
===================================================================
RCS file: 
/cvs/ports/security/openssl/1.1/patches/patch-crypto_camellia_asm_cmll-x86_64_pl,v
retrieving revision 1.1
diff -u -p -r1.1 patch-crypto_camellia_asm_cmll-x86_64_pl
--- patches/patch-crypto_camellia_asm_cmll-x86_64_pl    20 Jan 2023 20:49:35 
-0000      1.1
+++ patches/patch-crypto_camellia_asm_cmll-x86_64_pl    18 Feb 2024 22:23:53 
-0000
@@ -9,7 +9,7 @@ Index: crypto/camellia/asm/cmll-x86_64.p
  .align        64
  .LCamellia_SIGMA:
  .long 0x3bcc908b, 0xa09e667f, 0x4caa73b2, 0xb67ae858
-@@ -680,6 +681,7 @@ $_ivp="40(%rsp)";
+@@ -680,11 +681,13 @@ $_ivp="40(%rsp)";
  $_rsp="48(%rsp)";
  
  $code.=<<___;
@@ -17,3 +17,9 @@ Index: crypto/camellia/asm/cmll-x86_64.p
  .globl        Camellia_cbc_encrypt
  .type Camellia_cbc_encrypt,\@function,6
  .align        16
+ Camellia_cbc_encrypt:
+ .cfi_startproc
++      endbranch
+       cmp     \$0,%rdx
+       je      .Lcbc_abort
+       push    %rbx
Index: patches/patch-crypto_modes_asm_ghash-x86_64_pl
===================================================================
RCS file: 
/cvs/ports/security/openssl/1.1/patches/patch-crypto_modes_asm_ghash-x86_64_pl,v
retrieving revision 1.1
diff -u -p -r1.1 patch-crypto_modes_asm_ghash-x86_64_pl
--- patches/patch-crypto_modes_asm_ghash-x86_64_pl      20 Jan 2023 20:49:35 
-0000      1.1
+++ patches/patch-crypto_modes_asm_ghash-x86_64_pl      18 Feb 2024 22:23:53 
-0000
@@ -1,7 +1,55 @@
 Index: crypto/modes/asm/ghash-x86_64.pl
 --- crypto/modes/asm/ghash-x86_64.pl.orig
 +++ crypto/modes/asm/ghash-x86_64.pl
-@@ -1601,6 +1601,7 @@ ___
+@@ -239,6 +239,7 @@ $code=<<___;
+ .align        16
+ gcm_gmult_4bit:
+ .cfi_startproc
++      endbranch
+       push    %rbx
+ .cfi_push     %rbx
+       push    %rbp            # %rbp and others are pushed exclusively in
+@@ -286,6 +287,7 @@ $code.=<<___;
+ .align        16
+ gcm_ghash_4bit:
+ .cfi_startproc
++      endbranch
+       push    %rbx
+ .cfi_push     %rbx
+       push    %rbp
+@@ -612,6 +614,7 @@ $code.=<<___;
+ .align        16
+ gcm_gmult_clmul:
+ .cfi_startproc
++      endbranch
+ .L_gmult_clmul:
+       movdqu          ($Xip),$Xi
+       movdqa          .Lbswap_mask(%rip),$T3
+@@ -663,6 +666,7 @@ $code.=<<___;
+ .align        32
+ gcm_ghash_clmul:
+ .cfi_startproc
++      endbranch
+ .L_ghash_clmul:
+ ___
+ $code.=<<___ if ($win64);
+@@ -1166,6 +1170,7 @@ $code.=<<___;
+ .align        32
+ gcm_gmult_avx:
+ .cfi_startproc
++      endbranch
+       jmp     .L_gmult_clmul
+ .cfi_endproc
+ .size gcm_gmult_avx,.-gcm_gmult_avx
+@@ -1177,6 +1182,7 @@ $code.=<<___;
+ .align        32
+ gcm_ghash_avx:
+ .cfi_startproc
++      endbranch
+ ___
+ if ($avx) {
+ my ($Xip,$Htbl,$inp,$len)=@_4args;
+@@ -1601,6 +1607,7 @@ ___
  }
  
  $code.=<<___;
@@ -9,7 +57,7 @@ Index: crypto/modes/asm/ghash-x86_64.pl
  .align        64
  .Lbswap_mask:
        .byte   15,14,13,12,11,10,9,8,7,6,5,4,3,2,1,0
-@@ -1654,6 +1655,7 @@ $code.=<<___;
+@@ -1654,6 +1661,7 @@ $code.=<<___;
  
  .asciz        "GHASH for x86_64, CRYPTOGAMS by <appro\@openssl.org>"
  .align        64
Index: patches/patch-crypto_poly1305_asm_poly1305-x86_64_pl
===================================================================
RCS file: 
/cvs/ports/security/openssl/1.1/patches/patch-crypto_poly1305_asm_poly1305-x86_64_pl,v
retrieving revision 1.1
diff -u -p -r1.1 patch-crypto_poly1305_asm_poly1305-x86_64_pl
--- patches/patch-crypto_poly1305_asm_poly1305-x86_64_pl        20 Jan 2023 
20:49:35 -0000      1.1
+++ patches/patch-crypto_poly1305_asm_poly1305-x86_64_pl        18 Feb 2024 
22:23:53 -0000
@@ -1,7 +1,71 @@
 Index: crypto/poly1305/asm/poly1305-x86_64.pl
 --- crypto/poly1305/asm/poly1305-x86_64.pl.orig
 +++ crypto/poly1305/asm/poly1305-x86_64.pl
-@@ -3774,6 +3774,7 @@ poly1305_emit_base2_44:
+@@ -227,6 +227,7 @@ $code.=<<___;
+ .align        32
+ poly1305_blocks:
+ .cfi_startproc
++      endbranch
+ .Lblocks:
+       shr     \$4,$len
+       jz      .Lno_data               # too short
+@@ -301,6 +302,7 @@ $code.=<<___;
+ .align        32
+ poly1305_emit:
+ .cfi_startproc
++      endbranch
+ .Lemit:
+       mov     0($ctx),%r8     # load hash value
+       mov     8($ctx),%r9
+@@ -522,6 +524,7 @@ __poly1305_init_avx:
+ .align        32
+ poly1305_blocks_avx:
+ .cfi_startproc
++      endbranch
+       mov     20($ctx),%r8d           # is_base2_26
+       cmp     \$128,$len
+       jae     .Lblocks_avx
+@@ -1382,6 +1385,7 @@ $code.=<<___;
+ .align        32
+ poly1305_emit_avx:
+ .cfi_startproc
++      endbranch
+       cmpl    \$0,20($ctx)    # is_base2_26?
+       je      .Lemit
+ 
+@@ -1446,6 +1450,7 @@ $code.=<<___;
+ .align        32
+ poly1305_blocks_avx2:
+ .cfi_startproc
++      endbranch
+       mov     20($ctx),%r8d           # is_base2_26
+       cmp     \$128,$len
+       jae     .Lblocks_avx2
+@@ -2142,6 +2147,7 @@ $code.=<<___;
+ .align        32
+ poly1305_blocks_avx512:
+ .cfi_startproc
++      endbranch
+ .Lblocks_avx512:
+       mov             \$15,%eax
+       kmovw           %eax,%k2
+@@ -2806,6 +2812,7 @@ $code.=<<___;
+ .align        32
+ poly1305_blocks_vpmadd52:
+ .cfi_startproc
++      endbranch
+       shr     \$4,$len
+       jz      .Lno_data_vpmadd52              # too short
+ 
+@@ -3739,6 +3746,7 @@ $code.=<<___;
+ .align        32
+ poly1305_emit_base2_44:
+ .cfi_startproc
++      endbranch
+       mov     0($ctx),%r8     # load hash value
+       mov     8($ctx),%r9
+       mov     16($ctx),%r10
+@@ -3774,6 +3782,7 @@ poly1305_emit_base2_44:
  ___
  }     }       }
  $code.=<<___;
@@ -9,7 +73,7 @@ Index: crypto/poly1305/asm/poly1305-x86_
  .align        64
  .Lconst:
  .Lmask24:
-@@ -3810,6 +3811,7 @@ ___
+@@ -3810,6 +3819,7 @@ ___
  $code.=<<___;
  .asciz        "Poly1305 for x86_64, CRYPTOGAMS by <appro\@openssl.org>"
  .align        16
Index: patches/patch-crypto_rc4_asm_rc4-x86_64_pl
===================================================================
RCS file: 
/cvs/ports/security/openssl/1.1/patches/patch-crypto_rc4_asm_rc4-x86_64_pl,v
retrieving revision 1.1
diff -u -p -r1.1 patch-crypto_rc4_asm_rc4-x86_64_pl
--- patches/patch-crypto_rc4_asm_rc4-x86_64_pl  22 Feb 2023 09:21:34 -0000      
1.1
+++ patches/patch-crypto_rc4_asm_rc4-x86_64_pl  18 Feb 2024 22:23:53 -0000
@@ -1,7 +1,31 @@
 Index: crypto/rc4/asm/rc4-x86_64.pl
 --- crypto/rc4/asm/rc4-x86_64.pl.orig
 +++ crypto/rc4/asm/rc4-x86_64.pl
-@@ -542,14 +542,16 @@ RC4_options:
+@@ -140,6 +140,7 @@ $code=<<___;
+ .align        16
+ RC4:
+ .cfi_startproc
++      endbranch
+       or      $len,$len
+       jne     .Lentry
+       ret
+@@ -455,6 +456,7 @@ $code.=<<___;
+ .align        16
+ RC4_set_key:
+ .cfi_startproc
++      endbranch
+       lea     8($dat),$dat
+       lea     ($inp,$len),$inp
+       neg     $len
+@@ -529,6 +531,7 @@ RC4_set_key:
+ .align        16
+ RC4_options:
+ .cfi_startproc
++      endbranch
+       lea     .Lopts(%rip),%rax
+       mov     OPENSSL_ia32cap_P(%rip),%edx
+       bt      \$20,%edx
+@@ -542,14 +545,16 @@ RC4_options:
  .Ldone:
        ret
  .cfi_endproc
Index: patches/patch-crypto_x86_64cpuid_pl
===================================================================
RCS file: patches/patch-crypto_x86_64cpuid_pl
diff -N patches/patch-crypto_x86_64cpuid_pl
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ patches/patch-crypto_x86_64cpuid_pl 18 Feb 2024 22:23:53 -0000
@@ -0,0 +1,19 @@
+Index: crypto/x86_64cpuid.pl
+--- crypto/x86_64cpuid.pl.orig
++++ crypto/x86_64cpuid.pl
+@@ -237,6 +237,7 @@ OPENSSL_ia32_cpuid:
+ .align  16
+ OPENSSL_cleanse:
+ .cfi_startproc
++      endbranch
+       xor     %rax,%rax
+       cmp     \$15,$arg2
+       jae     .Lot
+@@ -274,6 +275,7 @@ OPENSSL_cleanse:
+ .align  16
+ CRYPTO_memcmp:
+ .cfi_startproc
++      endbranch
+       xor     %rax,%rax
+       xor     %r10,%r10
+       cmp     \$0,$arg3

Reply via email to