NetBSD-Bugs archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: port-sparc64/57472: OpenSSL broken, affects ecdsa keys in OpenSSH



The following reply was made to PR port-sparc64/57472; it has been noted by GNATS.

From: Martin Husemann <martin%duskware.de@localhost>
To: gnats-bugs%netbsd.org@localhost
Cc: 
Subject: Re: port-sparc64/57472: OpenSSL broken, affects ecdsa keys in OpenSSH
Date: Sun, 18 Jun 2023 12:08:00 +0200

 I verified that the test works against a native openssl build (their
 main branch at commit 6c0ecc2bce64cc86948a51f80f832b5e48a9ebea).
 
 This build uses
 
 	-DAES_ASM -DECP_NISTZ256_ASM -DGHASH_ASM -DOPENSSL_CPUID_OBJ 
 	-DSHA1_ASM -DSHA256_ASM -DSHA512_ASM
 
 This means: ECP_NISTZ256_ASM is working (in the upstream build, also
 hasn't changed in years) and our in-tree build is missing SHA256_ASM
 and SHA512_ASM.
 
 Looking for the exact differences now..
 
 Martin
 


Home | Main Index | Thread Index | Old Index