Bugzilla – Bug 141526
OpenSSL PadLock support needs update
Last modified: 2006-02-27 11:54:24 UTC
Hi, I have run into severe problems with VIA PadLock-enabled OpenSSL from OpenSUSE 10.0 on my DualCPU VIA board. After some investigation I have found that you're still shipping OpenSSL with a too old PadLock patch. Could you please update the package to the latest ones found on http://www.logix.cz/michal/devel/padlock After I rebuilt the OpenSSL with these patches everything works fine for me. Thanks!
Michal, would the newer padlock version fix the problem reported in bug 141526? Is that the same issue as you encountered?
Err ... _this_ is bug 141526 ;-)
Sorry.. I meant bug 114671 :-)
Quite likely. The old patch is known to fail in some circumstances, e.g. when the same EVP_CIPHER_CTX is reused for both encryption and decryption. These problems are very hard to debug as they are bound to timing and context switches - attach a debugger or recompile w/o -O2 and they're gone. I strongly recommend updating the PadLock patch in 10.0 openssl and release it as an online update. The patch is 100% backward compatible (except for the bugs :) and won't change anything for non-epia users.
Back to ASSIGNED
Harald, given the positive feedback in bug 114671 I want to update openssl in 10.0. Can you approve the fix? It has zero effect on boards without the VIA crypto hardware, therefore it is not risky.
Peter, you have to ask me! Ok, approved: Maintenance-Tracker-3657
Harald, technically this update is only needed on 10.0-i386, neither on ppc nor x86_64. Is it okay with the patchinfo process to restrict DISTRIBUTION like that? (I guess so, but asking to make sure)
Harald says that 10.0-i386 is sufficient.
*** Bug 114671 has been marked as a duplicate of this bug. ***
released