Your message dated Thu, 22 Nov 2018 23:05:56 +0000
with message-id <[email protected]>
and subject line Bug#891799: fixed in openssl1.0 1.0.2q-1
has caused the Debian Bug report #891799,
regarding openssl1.0: Please add support for new architecture "riscv64" (RISC-V
64 bits little-endian)
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
891799: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891799
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: openssl1.0
Version: 1.0.2n-1
Severity: normal
Tags: patch
User: [email protected]
Usertags: riscv64
Hello,
We need support in this package for RISC-V, to bootstrap the riscv64
architecture.
I am attaching a patch that allowed me to cross-compile the package. I am not
completely sure if all of the options are the most correct or the best choice
(more optimised), for example I used DES_RISC2 because the MIPS family uses
those and it's probably the closest to RISC-V, so it's my best-guess. But if
you spot something fishy, please tell.
It would be great if you could include these changes and release a new version
for unstable.
If we can do something to speed-up this process, please let me/us know.
Thanks and cheers.
--
Manuel A. Fernandez Montecelo <[email protected]>
--- debian-targets.patch.orig 2018-02-28 22:46:26.476599340 +0100
+++ debian-targets.patch 2018-02-28 23:08:57.666768100 +0100
@@ -56,6 +56,7 @@
+"debian-powerpcspe","gcc:-DB_ENDIAN
${debian_cflags}::-D_REENTRANT::-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_RISC1
DES_UNROLL:${ppc32_asm}:linux32:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
+"debian-ppc64","gcc:-m64 -DB_ENDIAN
${debian_cflags}::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK
DES_RISC1
DES_UNROLL:${ppc64_asm}:linux64:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
+"debian-ppc64el","gcc:-m64 -DL_ENDIAN
${debian_cflags}::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK
DES_RISC1
DES_UNROLL:${ppc64_asm}:linux64le:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
++"debian-riscv64","gcc:-DL_ENDIAN
${debian_cflags}::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK
DES_RISC2
DES_UNROLL:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
+"debian-s390","gcc:-DB_ENDIAN ${debian_cflags}::-D_REENTRANT::-ldl:RC4_CHAR
RC4_CHUNK DES_INT
DES_UNROLL:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
+"debian-s390x","gcc:-DB_ENDIAN
${debian_cflags}::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK
DES_INT
DES_UNROLL:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
+"debian-sh3", "gcc:-DL_ENDIAN
${debian_cflags}::-D_REENTRANT::-ldl:BN_LLONG:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
--- End Message ---
--- Begin Message ---
Source: openssl1.0
Source-Version: 1.0.2q-1
We believe that the bug you reported is fixed in the latest version of
openssl1.0, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Sebastian Andrzej Siewior <[email protected]> (supplier of updated
openssl1.0 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Thu, 22 Nov 2018 22:06:24 +0100
Source: openssl1.0
Binary: libssl1.0.2 libssl1.0-dev libcrypto1.0.2-udeb libssl1.0.2-udeb
Architecture: source
Version: 1.0.2q-1
Distribution: unstable
Urgency: medium
Maintainer: Debian OpenSSL Team <[email protected]>
Changed-By: Sebastian Andrzej Siewior <[email protected]>
Description:
libcrypto1.0.2-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl1.0-dev - Secure Sockets Layer toolkit - development files
libssl1.0.2 - Secure Sockets Layer toolkit - shared libraries
libssl1.0.2-udeb - ssl shared library - udeb (udeb)
Closes: 891799 895845
Changes:
openssl1.0 (1.0.2q-1) unstable; urgency=medium
.
* Correct typo in the riscv64 target (Closes: #891799).
* Update to policy 4.1.4
- drop Priority: important.
- use signing-key.asc and a https links for downloads.
- point the VCS-* to salsa.
* Import upstream version 1.0.2q
- CVE-2018-5407 (Microarchitecture timing vulnerability in ECC scalar
multiplication)
- CVE-2018-0734 (Timing vulnerability in DSA signature generation)
- CVE-2018-0732 (Client DoS due to large DH parameter)
- CVE-2018-0737 (Cache timing vulnerability in RSA Key Generation)
(Closes: #895845)
Checksums-Sha1:
3e17e370152422f0d3d486dd525ef4e6dc349fbd 2514 openssl1.0_1.0.2q-1.dsc
692f5f2f1b114f8adaadaa3e7be8cce1907f38c5 5345604 openssl1.0_1.0.2q.orig.tar.gz
52c2f46fe1d9f4edd6421357e5d1d6212dabcef4 488 openssl1.0_1.0.2q.orig.tar.gz.asc
73eafa0d89c2d9680185732beb656635c65e026d 94732
openssl1.0_1.0.2q-1.debian.tar.xz
b7aedb62505eb2ef60305664d3cbabe47beffcfd 6119
openssl1.0_1.0.2q-1_source.buildinfo
Checksums-Sha256:
7e9cae7b49067f5ef6e26f81a1a3e202ca7e71f0ed1b257d0b452f11445968ca 2514
openssl1.0_1.0.2q-1.dsc
5744cfcbcec2b1b48629f7354203bc1e5e9b5466998bbccc5b5fcde3b18eb684 5345604
openssl1.0_1.0.2q.orig.tar.gz
d8a8e611cb1c46e167594a19aac7b9b56e070b7ec762659462ffa23183064cf0 488
openssl1.0_1.0.2q.orig.tar.gz.asc
25e874dfb163e6b974e7e8d460e49bc07aa64a227c3ab6c1cc4ed7f7ad3188b6 94732
openssl1.0_1.0.2q-1.debian.tar.xz
3b33789965d110c21122004dfa80abc07fc2948beb8adebcf32efdeb833c4c98 6119
openssl1.0_1.0.2q-1_source.buildinfo
Files:
f1dd5589ba803fdfaa122e720d114050 2514 utils optional openssl1.0_1.0.2q-1.dsc
7563e1ce046cb21948eeb6ba1a0eb71c 5345604 utils optional
openssl1.0_1.0.2q.orig.tar.gz
fe9271891371076e283ccd6bbd96f2f6 488 utils optional
openssl1.0_1.0.2q.orig.tar.gz.asc
7168a96f84a599b82518d2f83a22cedd 94732 utils optional
openssl1.0_1.0.2q-1.debian.tar.xz
c99ae6f0a736e73b5cdf68e1511098f0 6119 utils optional
openssl1.0_1.0.2q-1_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=Z6IZ
-----END PGP SIGNATURE-----
--- End Message ---