Backport Intel's AVX512 patches on openssl 3.0
Bug #2030784 reported by
Simon Chopin
This bug affects 2 people
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
openssl (Ubuntu) |
Fix Released
|
Wishlist
|
Unassigned |
Bug Description
https:/
https:/
These should provide a nice performance bonus on recent CPUs, and the patches are fairly self-contained.
Related branches
~adrien/ubuntu/+source/openssl:fips-avx512-and-lto
Merged
into
ubuntu/+source/openssl:ubuntu/devel
at
revision eb649aba51aad5f5a86e4ee9df407fa7d7b661f9
- Simon Chopin (community): Approve
-
Diff: 1037 lines (+971/-4)9 files modifieddebian/changelog (+24/-0)
debian/patches/fips/apps-pass-propquery-arg-to-the-libctx-DRBG-fetches.patch (+38/-0)
debian/patches/fips/apps-speed-Omit-unavailable-algorithms-in-FIPS-mode.patch (+130/-0)
debian/patches/fips/crypto-Add-kernel-FIPS-mode-detection.patch (+154/-0)
debian/patches/fips/crypto-Automatically-use-the-FIPS-provider-when-the-kerne.patch (+495/-0)
debian/patches/fips/test-Ensure-encoding-runs-with-the-correct-context-during.patch (+57/-0)
debian/patches/intel/002-vaes_gcm_avx512_fix.patch (+63/-0)
debian/patches/series (+9/-3)
debian/rules (+1/-1)
tags: | added: block-proposed |
Changed in openssl (Ubuntu): | |
importance: | Medium → Wishlist |
Changed in openssl (Ubuntu): | |
status: | Triaged → Fix Committed |
To post a comment you must log in.
Maybe worth holding back until there is a fix for https:/ /downfall. page/