From 37e4c86ba73993b88877b49f78604f7474d11b52 Mon Sep 17 00:00:00 2001 From: Liwei Ge Date: Fri, 27 Aug 2021 15:36:07 +0800 Subject: [PATCH] build: support loongarch64 Signed-off-by: Liwei Ge --- openssl.spec | 11 ++++++++++- 1 file changed, 10 insertions(+), 1 deletion(-) diff --git a/openssl.spec b/openssl.spec index 56ab8a7..7c0b1a3 100644 --- a/openssl.spec +++ b/openssl.spec @@ -1,3 +1,4 @@ +%define anolis_release .0.1 # For the curious: # 0.9.5a soversion = 0 # 0.9.6 soversion = 1 @@ -22,7 +23,7 @@ Summary: Utilities from the general purpose cryptography library with TLS implementation Name: openssl Version: 1.1.1k -Release: 5%{?dist} +Release: 5%{anolis_release}%{?dist} Epoch: 1 # We have to remove certain patented algorithms from the openssl source # tarball with the hobble-openssl script which is included below. @@ -263,6 +264,11 @@ sslflags=enable-ec_nistp_64_gcc_128 %ifarch riscv64 sslarch=linux-generic64 %endif +%ifarch loongarch64 +sslarch=linux-generic64 +sslflags="--libdir=%{_libdir}" +%endif + # Add -Wa,--noexecstack here so that libcrypto's assembler modules will be # marked as not requiring an executable stack. @@ -486,6 +492,9 @@ export LD_LIBRARY_PATH %postun libs -p /sbin/ldconfig %changelog +* Tue Jan 25 2022 Liwei Ge - 1:1.1.1k-5.0.1 +- Support loongarch64 + * Fri Nov 12 2021 Sahana Prasad - 1:1.1.1k-5 - CVE-2021-3712 openssl: Read buffer overruns processing ASN.1 strings - Resolves: rhbz#2005400 -- Gitee