Debian Bug report logs - #732348
openssl: Add basic support for arm64 architecture

version graph

Package: src:openssl; Maintainer for src:openssl is Debian OpenSSL Team <>;

Reported by: Wookey <>

Date: Tue, 17 Dec 2013 03:33:02 UTC

Severity: normal

Tags: patch

Found in version openssl/1.0.1e-4

Fixed in version openssl/1.0.1e-5

Done: Kurt Roeckx <>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox

Report forwarded to, Debian OpenSSL Team <>:
Bug#732348; Package src:openssl. (Tue, 17 Dec 2013 03:33:06 GMT) Full text and rfc822 format available.

Acknowledgement sent to Wookey <>:
New Bug report received and forwarded. Copy sent to Debian OpenSSL Team <>. (Tue, 17 Dec 2013 03:33:06 GMT) Full text and rfc822 format available.

Message #5 received at (full text, mbox):

From: Wookey <>
To: Debian Bug Tracking System <>
Subject: openssl: Add basic support for arm64 architecture
Date: Tue, 17 Dec 2013 03:28:40 +0000
[Message part 1 (text/plain, inline)]
Source: openssl
Version: 1.0.1e-4
Severity: normal
Tags: patch
Usertag: arm64

This package does not build for arm64.
The minimal fix in this patch adds the new architecture to the Configure file.

More complete support from upstream will include assembler optimisations in due course.

-- System Information:
Debian Release: 7.3
  APT prefers stable
  APT policy: (990, 'stable')
Architecture: i386 (i686)

Kernel: Linux 3.2.0-kvm-i386-20110111 (SMP w/1 CPU core)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
[openssl_1.0.1e-4-arm64-support.patch (text/x-diff, attachment)]

Reply sent to Kurt Roeckx <>:
You have taken responsibility. (Sun, 22 Dec 2013 19:51:14 GMT) Full text and rfc822 format available.

Notification sent to Wookey <>:
Bug acknowledged by developer. (Sun, 22 Dec 2013 19:51:14 GMT) Full text and rfc822 format available.

Message #10 received at (full text, mbox):

From: Kurt Roeckx <>
Subject: Bug#732348: fixed in openssl 1.0.1e-5
Date: Sun, 22 Dec 2013 19:49:00 +0000
Source: openssl
Source-Version: 1.0.1e-5

We believe that the bug you reported is fixed in the latest version of
openssl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
Kurt Roeckx <> (supplier of updated openssl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing

Hash: SHA512

Format: 1.8
Date: Sun, 22 Dec 2013 19:25:35 +0100
Source: openssl
Binary: openssl libssl1.0.0 libcrypto1.0.0-udeb libssl-dev libssl-doc libssl1.0.0-dbg
Architecture: source all amd64
Version: 1.0.1e-5
Distribution: unstable
Urgency: low
Maintainer: Debian OpenSSL Team <>
Changed-By: Kurt Roeckx <>
 libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
 libssl-dev - Secure Sockets Layer toolkit - development files
 libssl-doc - Secure Sockets Layer toolkit - development documentation
 libssl1.0.0 - Secure Sockets Layer toolkit - shared libraries
 libssl1.0.0-dbg - Secure Sockets Layer toolkit - debug information
 openssl    - Secure Sockets Layer toolkit - cryptographic utility
Closes: 694738 728055 732348 732710 732754
 openssl (1.0.1e-5) unstable; urgency=low
   * Change default digest to SHA256 instead of SHA1.  (Closes: #694738)
   * Drop support for multiple certificates in 1 file.  It never worked
     properly in the first place, and the only one shipping in
     ca-certificates has been split.
   * Fix libdoc-manpgs-pod-spell.patch to only fix spalling errors
   * Remove make-targets.patch.  It prevented the test dir from being cleaned.
   * Update to a git snapshot of the OpenSSL_1_0_1-stable branch.
     - Fixes CVE-2013-6449 (Closes: #732754)
     - Fixes CVE-2013-6450
     - Drop patches ssltest_no_sslv2.patch cpuid.patch aesni-mac.patch
       dtls_version.patch get_certificate.patch, since they where all
       already commited upstream.
     - adjust fix-pod-errors.patch for the reordering of items in the
       documentation they've done trying to fix those pod errors.
     - disable rdrand engine by default (Closes: #732710)
   * disable zlib support.  Fixes CVE-2012-4929 (Closes: #728055)
   * Add arm64 support (Closes: #732348)
   * Properly use the default number of bits in req when none are given
 1015bdeffc5f854fb184d573f94833a7eb4be187 2197 openssl_1.0.1e-5.dsc
 94694a8c6f571524b4340a5a187027fbe569bc0d 196978 openssl_1.0.1e-5.debian.tar.gz
 17bf4ad750294ef277103f25a9eccd9801e51721 1132258 libssl-doc_1.0.1e-5_all.deb
 c4b4b82514fa989834ddfd26693c3a360845a672 662002 openssl_1.0.1e-5_amd64.deb
 90ddd72866f6f410daebf1997471ec9a05a9331c 1003238 libssl1.0.0_1.0.1e-5_amd64.deb
 f33bfe2ec9891ac3a9a1d24ca1dd490bb803bd47 623904 libcrypto1.0.0-udeb_1.0.1e-5_amd64.udeb
 48aaa3fc63dfd07d6c55809d728116234ebc6452 1241958 libssl-dev_1.0.1e-5_amd64.deb
 bf57262021d4da0da70f5f6de491e31190da0c58 2826986 libssl1.0.0-dbg_1.0.1e-5_amd64.deb
 b7bedc00efe2870722adf58e9c1461cf6dbd73e74c9f74c34ac40a515817d137 2197 openssl_1.0.1e-5.dsc
 e2fa44b2ba4418840b3ce2fd144cd7a0fce29ce25d90551e492ef19c7c368ea1 196978 openssl_1.0.1e-5.debian.tar.gz
 e54f7e533bc33d51f3ee2b773bf4357558f9c74df4ba5ede62b08974c4e4b268 1132258 libssl-doc_1.0.1e-5_all.deb
 8923c9df7ab5c2bb8444c4a4e4288571d618fb929a5446d63cb1439038b56eeb 662002 openssl_1.0.1e-5_amd64.deb
 25d769b9235b290bedd5f020e87dc78ccaa67adda4997cddcdc1cb09f6d7f764 1003238 libssl1.0.0_1.0.1e-5_amd64.deb
 3bf27252bc51cdcf30f45ac690b39b9e5fff1bbc11ca37b544b7d194caf6f953 623904 libcrypto1.0.0-udeb_1.0.1e-5_amd64.udeb
 433ddb83f39322aefbbcb6cc36e217f19e2415510046aa274d0396561b5cd5ce 1241958 libssl-dev_1.0.1e-5_amd64.deb
 c103856c6ea28429eeb365575394ff5983449b697028569a16829b4f3eafd732 2826986 libssl1.0.0-dbg_1.0.1e-5_amd64.deb
 c73ef6bf0bbf7499c0fcd5e2783341ab 2197 utils optional openssl_1.0.1e-5.dsc
 1cea0119b9ed9ed76a7e8538f9ae4545 196978 utils optional openssl_1.0.1e-5.debian.tar.gz
 aec19eec4eec9adf861df8c36dc52079 1132258 doc optional libssl-doc_1.0.1e-5_all.deb
 9e9ea1c07dfa9480a0e89b0c7df4488b 662002 utils optional openssl_1.0.1e-5_amd64.deb
 7549079d3517842ddc4a588d04cc92af 1003238 libs important libssl1.0.0_1.0.1e-5_amd64.deb
 1f28be32a4c76f0c835b693cf9126726 623904 debian-installer optional libcrypto1.0.0-udeb_1.0.1e-5_amd64.udeb
 d569fe1cb27ec9d8c4b5450672b6dc9a 1241958 libdevel optional libssl-dev_1.0.1e-5_amd64.deb
 66871173845c2ce096c8141bb684275e 2826986 debug extra libssl1.0.0-dbg_1.0.1e-5_amd64.deb
Package-Type: udeb

Version: GnuPG v1.4.15 (GNU/Linux)


Bug archived. Request was from Debbugs Internal Request <> to (Thu, 06 Feb 2014 07:29:19 GMT) Full text and rfc822 format available.

Send a report that this bug log contains spam.

Debian bug tracking system administrator <>. Last modified: Wed Apr 23 21:30:54 2014; Machine Name:

Debian Bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson.