https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1743750
is [18.04 FEAT] Add support for CPACF enhancements to openssl
also known as ltc-163655 and is only present in bionic.

In xenial:
we have src:openssl, 1.0.2 which does not have CPACF backport, and therefore 
the attached patch does not apply at all, and also there are no issues to fix 
there either. Unless, you mean openssl-ibmca is also affected in xenial? in 
that case do you have a patch for openssl-ibmca?

In bionic:
we have src:openssl, 1.1.0 which is not affected as you say, as the default 
openssl version.
we also have src:openssl1.0 which does have CPACF backport and the attached 
patch applies to. Please note, that openssl1.0 is only used by a small amount 
of packages in bionic. We are preparing the update for that package.


** Description changed:

- This is a fix for this feature's backport to openssl 1.0.2 ( 1.1.0 and
- upstream code are not affected ).
+ [Impact]
  
- Original LP ticket : 
+  * Fix hw accelerated performance impact on s390x with non-default
+ openssl1.0.
+ 
+ [Test Case]
+ 
+  * Test that performance of hw accelerated crypto is improved / i.e. ssl
+ speed test
+ 
+  * Test that openssh still works, just in case.
+ 
+ [Regression Potential]
+ 
+  * This only changes accelerated codepath on s390x, for specific algos when 
CPACF is enabled on the system cpu, which is usually on.
+  * Same fix is already in use by 1.1.0 default openssl package, and well 
excercised on bionic and up.
+ 
+ [Other Info]
+  
+  * original bug report.
+ 
+ 
+ This is a fix for this feature's backport to openssl 1.0.2 ( 1.1.0 and 
upstream code are not affected ).
+ 
+ Original LP ticket :
  https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1743750

** Also affects: openssl1.0 (Ubuntu)
   Importance: Undecided
       Status: New

** Also affects: openssl (Ubuntu Bionic)
   Importance: Undecided
       Status: New

** Also affects: openssl1.0 (Ubuntu Bionic)
   Importance: Undecided
       Status: New

** Also affects: openssl (Ubuntu Xenial)
   Importance: Undecided
       Status: New

** Also affects: openssl1.0 (Ubuntu Xenial)
   Importance: Undecided
       Status: New

** Changed in: openssl (Ubuntu)
       Status: New => Incomplete

** Changed in: openssl (Ubuntu)
       Status: Incomplete => Fix Released

** Changed in: openssl (Ubuntu Xenial)
       Status: New => Invalid

** Changed in: openssl (Ubuntu Bionic)
       Status: New => Fix Released

** Also affects: openssl (Ubuntu Cosmic)
   Importance: Undecided
       Status: New

** Also affects: openssl1.0 (Ubuntu Cosmic)
   Importance: Undecided
       Status: New

** Changed in: openssl (Ubuntu Cosmic)
       Status: New => Fix Released

** Changed in: openssl1.0 (Ubuntu)
       Status: New => Confirmed

** Changed in: openssl1.0 (Ubuntu Xenial)
       Status: New => Invalid

** Changed in: openssl1.0 (Ubuntu Bionic)
       Status: New => Confirmed

** Changed in: openssl1.0 (Ubuntu Cosmic)
       Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1775018

Title:
  Fix for openssl 1.0.2 backport

Status in Ubuntu on IBM z Systems:
  Triaged
Status in openssl package in Ubuntu:
  Fix Released
Status in openssl1.0 package in Ubuntu:
  Confirmed
Status in openssl source package in Xenial:
  Invalid
Status in openssl1.0 source package in Xenial:
  Invalid
Status in openssl source package in Bionic:
  Fix Released
Status in openssl1.0 source package in Bionic:
  Confirmed
Status in openssl source package in Cosmic:
  Fix Released
Status in openssl1.0 source package in Cosmic:
  Confirmed

Bug description:
  [Impact]

   * Fix hw accelerated performance impact on s390x with non-default
  openssl1.0.

  [Test Case]

   * Test that performance of hw accelerated crypto is improved / i.e.
  ssl speed test

   * Test that openssh still works, just in case.

  [Regression Potential]

   * This only changes accelerated codepath on s390x, for specific algos when 
CPACF is enabled on the system cpu, which is usually on.
   * Same fix is already in use by 1.1.0 default openssl package, and well 
excercised on bionic and up.

  [Other Info]
   
   * original bug report.

  
  This is a fix for this feature's backport to openssl 1.0.2 ( 1.1.0 and 
upstream code are not affected ).

  Original LP ticket :
  https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1743750

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1775018/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to