Commit db6b4e37 authored by Andy Polyakov's avatar Andy Polyakov
Browse files

Mention more GCC bugs in ./PROBLEMS.

parent 20a85e9f
Loading
Loading
Loading
Loading
+21 −7
Original line number Diff line number Diff line
@@ -48,9 +48,9 @@ will interfere with each other and lead to test failure.
The solution is simple for now: don't run parallell make when testing.


* Bugs in gcc 3.0 triggered
* Bugs in gcc triggered

According to a problem report, there are bugs in gcc 3.0 that are
- According to a problem report, there are bugs in gcc 3.0 that are
  triggered by some of the code in OpenSSL, more specifically in
  PEM_get_EVP_CIPHER_INFO().  The triggering code is the following:

@@ -63,6 +63,20 @@ you end up with an extra incrementation when *header != '4'.

  We recommend that you upgrade gcc to as high a 3.x version as you can.

- According to multiple problem reports, some of our message digest
  implementations trigger bug[s] in code optimizer in gcc 3.3 for sparc64
  and gcc 2.96 for ppc. Former fails to complete RIPEMD160 test, while
  latter - SHA one.

  The recomendation is to upgrade your compiler. This naturally applies to
  other similar cases.

- There is a subtle Solaris x86-specific gcc run-time environment bug, which
  "falls between" OpenSSL [0.9.8 and later], Solaris ld and GCC. The bug
  manifests itself as Segmentation Fault upon early application start-up.
  The problem can be worked around by patching the environment according to
  http://www.openssl.org/~appro/values.c.

* solaris64-sparcv9-cc SHA-1 performance with WorkShop 6 compiler.

As subject suggests SHA-1 might perform poorly (4 times slower)