NetBSD-Bugs archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: port-sparc64/57472: OpenSSL broken, affects ecdsa keys in OpenSSH
The following reply was made to PR port-sparc64/57472; it has been noted by GNATS.
From: Martin Husemann <martin%duskware.de@localhost>
To: gnats-bugs%netbsd.org@localhost
Cc:
Subject: Re: port-sparc64/57472: OpenSSL broken, affects ecdsa keys in OpenSSH
Date: Sun, 18 Jun 2023 12:08:00 +0200
I verified that the test works against a native openssl build (their
main branch at commit 6c0ecc2bce64cc86948a51f80f832b5e48a9ebea).
This build uses
-DAES_ASM -DECP_NISTZ256_ASM -DGHASH_ASM -DOPENSSL_CPUID_OBJ
-DSHA1_ASM -DSHA256_ASM -DSHA512_ASM
This means: ECP_NISTZ256_ASM is working (in the upstream build, also
hasn't changed in years) and our in-tree build is missing SHA256_ASM
and SHA512_ASM.
Looking for the exact differences now..
Martin
Home |
Main Index |
Thread Index |
Old Index