diff --git a/openssl.spec b/openssl.spec index 56ab8a735fee9a76704db34ded1697a702e9364b..7c0b1a3bc56dac51fdf3c15b81ef3efa8d6ed529 100644 --- a/openssl.spec +++ b/openssl.spec @@ -1,3 +1,4 @@ +%define anolis_release .0.1 # For the curious: # 0.9.5a soversion = 0 # 0.9.6 soversion = 1 @@ -22,7 +23,7 @@ Summary: Utilities from the general purpose cryptography library with TLS implementation Name: openssl Version: 1.1.1k -Release: 5%{?dist} +Release: 5%{anolis_release}%{?dist} Epoch: 1 # We have to remove certain patented algorithms from the openssl source # tarball with the hobble-openssl script which is included below. @@ -263,6 +264,11 @@ sslflags=enable-ec_nistp_64_gcc_128 %ifarch riscv64 sslarch=linux-generic64 %endif +%ifarch loongarch64 +sslarch=linux-generic64 +sslflags="--libdir=%{_libdir}" +%endif + # Add -Wa,--noexecstack here so that libcrypto's assembler modules will be # marked as not requiring an executable stack. @@ -486,6 +492,9 @@ export LD_LIBRARY_PATH %postun libs -p /sbin/ldconfig %changelog +* Tue Jan 25 2022 Liwei Ge - 1:1.1.1k-5.0.1 +- Support loongarch64 + * Fri Nov 12 2021 Sahana Prasad - 1:1.1.1k-5 - CVE-2021-3712 openssl: Read buffer overruns processing ASN.1 strings - Resolves: rhbz#2005400