Your message dated Sun, 25 Feb 2018 22:40:09 +0000
with message-id <[email protected]>
and subject line Bug#882007: fixed in openssl 1.1.1~~pre1-1
has caused the Debian Bug report #882007,
regarding openssl: add mips r6 support
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
882007: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882007
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: src:openssl
Version: 1.1.0g-2
X-Debbugs-Cc: [email protected]
Please add mips r6 support of openssl.
mips r6 is quite similar with current mips architectures,
while mips r6 drops and replace some insn,
so they are not compatible with previous version.
Here for openssl, we disable ASM, and -DBN_DIV3W.
--
YunQiang Su
diff --git a/debian/patches/debian-targets.patch
b/debian/patches/debian-targets.patch
index dbac728..3085112 100644
--- a/debian/patches/debian-targets.patch
+++ b/debian/patches/debian-targets.patch
@@ -4,7 +4,7 @@
--- /dev/null
+++ b/Configurations/20-debian.conf
-@@ -0,0 +1,140 @@
+@@ -0,0 +1,165 @@
+my $debian_cflags = `dpkg-buildflags --get CFLAGS` . `dpkg-buildflags --get
CPPFLAGS` . "-Wa,--noexecstack -Wall";
+$debian_cflags =~ s/\n/ /g;
+my $debian_ldflags = `dpkg-buildflags --get LDFLAGS`;
@@ -90,6 +90,31 @@
+ inherit_from => [ "linux64-mips64", "debian" ],
+ cflags => add("-DL_ENDIAN"),
+ },
++ "debian-mipsr6" => {
++ inherit_from => [ "linux-mips32r6", "debian" ],
++ cflags => add("-DB_ENDIAN"),
++ },
++ "debian-mipsr6el" => {
++ inherit_from => [ "linux-mips32r6", "debian" ],
++ cflags => add("-DL_ENDIAN"),
++ },
++ "debian-mipsn32r6" => {
++ inherit_from => [ "linux-mips64r6", "debian" ],
++ cflags => add("-DB_ENDIAN"),
++ },
++ "debian-mipsn32r6el" => {
++ inherit_from => [ "linux-mips64r6", "debian" ],
++ cflags => add("-DL_ENDIAN"),
++ },
++ "debian-mips64r6" => {
++ inherit_from => [ "linux64-mips64r6", "debian" ],
++ cflags => add("-DB_ENDIAN"),
++ },
++ "debian-mips64r6el" => {
++ inherit_from => [ "linux64-mips64r6", "debian" ],
++ cflags => add("-DL_ENDIAN"),
++ },
++
+ "debian-nios2" => {
+ inherit_from => [ "linux-generic32", "debian" ],
+ },
@@ -145,3 +170,37 @@
+ },
+);
+
+--- a/Configurations/10-main.conf
++++ b/Configurations/10-main.conf
+@@ -736,6 +736,31 @@ sub vms_info {
+ shared_ldflag => add("-mabi=64"),
+ multilib => "64",
+ },
++ "linux-mips32r6" => {
++ # Configure script adds minimally required -march for assembly
++ # support, if no -march was specified at command line.
++ inherit_from => [ "linux-generic32"],
++ cflags => add("-mabi=32"),
++ perlasm_scheme => "o32",
++ shared_ldflag => add("-mabi=32"),
++ },
++ # mips32 and mips64 below refer to contemporary MIPS Architecture
++ # specifications, MIPS32 and MIPS64, rather than to kernel bitness.
++ "linux-mips64r6" => {
++ inherit_from => [ "linux-generic32"],
++ cflags => add("-mabi=n32"),
++ bn_ops => "SIXTY_FOUR_BIT RC4_CHAR",
++ perlasm_scheme => "n32",
++ shared_ldflag => add("-mabi=n32"),
++ multilib => "32",
++ },
++ "linux64-mips64r6" => {
++ inherit_from => [ "linux-generic64"],
++ cflags => add("-mabi=64"),
++ perlasm_scheme => "64",
++ shared_ldflag => add("-mabi=64"),
++ multilib => "64",
++ },
+
+ #### IA-32 targets...
+ #### These two targets are a bit aged and are to be used on older Linux
--- End Message ---
--- Begin Message ---
Source: openssl
Source-Version: 1.1.1~~pre1-1
We believe that the bug you reported is fixed in the latest version of
openssl, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Sebastian Andrzej Siewior <[email protected]> (supplier of updated
openssl package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sun, 25 Feb 2018 21:03:52 +0100
Source: openssl
Binary: openssl libssl1.1 libcrypto1.1-udeb libssl1.1-udeb libssl-dev libssl-doc
Architecture: source
Version: 1.1.1~~pre1-1
Distribution: experimental
Urgency: medium
Maintainer: Debian OpenSSL Team <[email protected]>
Changed-By: Sebastian Andrzej Siewior <[email protected]>
Description:
libcrypto1.1-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure Sockets Layer toolkit - development documentation
libssl1.1 - Secure Sockets Layer toolkit - shared libraries
libssl1.1-udeb - ssl shared library - udeb (udeb)
openssl - Secure Sockets Layer toolkit - cryptographic utility
Closes: 882007 888305
Changes:
openssl (1.1.1~~pre1-1) experimental; urgency=medium
.
* Abort the build if symbols are discovered which are not part of the
symbols file.
* Add config support for MIPS R6, patch by YunQiang Su (Closes: #882007).
* Enable afalgeng on Linux targets (Closes: #888305)
* Update 1.1.1-pre1.
Checksums-Sha1:
0cc922aa4de5908f6fe1e4b416cab865e357c233 2617 openssl_1.1.1~~pre1-1.dsc
83fee0570c8aff4701700f88d193fcf785b595ae 6406872
openssl_1.1.1~~pre1.orig.tar.gz
51b81ff5f787625832496d5c403511f765f895cd 455
openssl_1.1.1~~pre1.orig.tar.gz.asc
e5e4ee99d3e72b6866ca6137df698bd0ecd363d1 55264
openssl_1.1.1~~pre1-1.debian.tar.xz
790f2ac9ff7f2a5c3aeea885f5ab79b802edc90a 5793
openssl_1.1.1~~pre1-1_source.buildinfo
Checksums-Sha256:
0b21e451b2dfd1fdf6c11bebd8fa83ba5cd743d04e953a303c3bf624c31e2166 2617
openssl_1.1.1~~pre1-1.dsc
dd291d0a81d77219d40b21b9caf4713daaf43416fe8d6eae0b96df39b8b17e6d 6406872
openssl_1.1.1~~pre1.orig.tar.gz
344d2ed7e1b3229dc2ae96d4ddee7f358c509dca915bec74b2176c5d43ca5119 455
openssl_1.1.1~~pre1.orig.tar.gz.asc
8cce69a4c59d1057bc4a9939119639c14f429c5a793d5c184210bb579f1f9ab1 55264
openssl_1.1.1~~pre1-1.debian.tar.xz
10ff0989d98faf5404304be86023156736cdc1351e0e0b693f3e5ebc35f9ba20 5793
openssl_1.1.1~~pre1-1_source.buildinfo
Files:
4c1e0d87a4b39f6c2fdc854dfe2fd49b 2617 utils optional openssl_1.1.1~~pre1-1.dsc
4ccfcaeeeb14730597aad0bc049a46b4 6406872 utils optional
openssl_1.1.1~~pre1.orig.tar.gz
77b9fab9ebeb64ae3bc51ee0f5c672ed 455 utils optional
openssl_1.1.1~~pre1.orig.tar.gz.asc
ab853ad2e6fd8d300a231e289fde79f4 55264 utils optional
openssl_1.1.1~~pre1-1.debian.tar.xz
41e3acc394b37b0e20ec6a66b1c918a2 5793 utils optional
openssl_1.1.1~~pre1-1_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=KhE6
-----END PGP SIGNATURE-----
--- End Message ---