summaryrefslogtreecommitdiffstats
path: root/meta
diff options
context:
space:
mode:
Diffstat (limited to 'meta')
-rw-r--r--meta/recipes-connectivity/openssl/openssl/crypto_use_bigint_in_x86-64_perl.patch35
1 files changed, 0 insertions, 35 deletions
diff --git a/meta/recipes-connectivity/openssl/openssl/crypto_use_bigint_in_x86-64_perl.patch b/meta/recipes-connectivity/openssl/openssl/crypto_use_bigint_in_x86-64_perl.patch
deleted file mode 100644
index 4f81d85de1..0000000000
--- a/meta/recipes-connectivity/openssl/openssl/crypto_use_bigint_in_x86-64_perl.patch
+++ /dev/null
@@ -1,35 +0,0 @@
1Upstream-Status: Backport
2
3When building on x32 systems where the default type is 32bit, make sure
4we can transparently represent 64bit integers. Otherwise we end up with
5build errors like:
6/usr/bin/perl asm/ghash-x86_64.pl elf > ghash-x86_64.s
7Integer overflow in hexadecimal number at asm/../../perlasm/x86_64-xlate.pl line 201, <> line 890.
8...
9ghash-x86_64.s: Assembler messages:
10ghash-x86_64.s:890: Error: junk '.15473355479995e+19' after expression
11
12We don't enable this globally as there are some cases where we'd get
1332bit values interpreted as unsigned when we need them as signed.
14
15Reported-by: Bertrand Jacquin <bertrand@jacquin.bzh>
16URL: https://bugs.gentoo.org/542618
17
18Signed-off-by: Armin Kuster <akuster@mvista.com>
19
20Index: openssl-1.0.2a/crypto/perlasm/x86_64-xlate.pl
21===================================================================
22--- openssl-1.0.2a.orig/crypto/perlasm/x86_64-xlate.pl
23+++ openssl-1.0.2a/crypto/perlasm/x86_64-xlate.pl
24@@ -194,7 +194,10 @@ my %globals;
25 }
26 sub out {
27 my $self = shift;
28-
29+ # When building on x32 ABIs, the expanded hex value might be too
30+ # big to fit into 32bits. Enable transparent 64bit support here
31+ # so we can safely print it out.
32+ use bigint;
33 if ($gas) {
34 # Solaris /usr/ccs/bin/as can't handle multiplications
35 # in $self->{value}