[Bug 119295] Re: OpenSSH should support VIA PadLock

2008-09-22 Thread flamacue
Addendum: I would be happy enough if it was Hardy backports, vs. the distro proper. -- OpenSSH should support VIA PadLock https://bugs.launchpad.net/bugs/119295 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openssh in ubuntu. --

[Bug 119295] Re: OpenSSH should support VIA PadLock

2008-09-21 Thread flamacue
Launchpad Janitor wrote on 2008-07-25: This bug was fixed in the package openssh - 1:5.1p1-1ubuntu1 Will this fix be put into Ubuntu 8.04 (Hardy)? I have a low power machine that I think I would like to keep running Hardy, since it's an LTS release, but I don't want to do without this feature.

[Bug 119295] Re: OpenSSH should support VIA PadLock

2008-07-25 Thread Launchpad Bug Tracker
This bug was fixed in the package openssh - 1:5.1p1-1ubuntu1 --- openssh (1:5.1p1-1ubuntu1) intrepid; urgency=low * Resynchronise with Debian. Remaining changes: - Add support for registering ConsoleKit sessions on login. - Drop openssh-blacklist and openssh-blacklist-extra

[Bug 119295] Re: OpenSSH should support VIA PadLock

2008-07-23 Thread Colin Watson
Fixed via OpenSSH 4.9p1. I'll be aiming to get 5.1p1 into Intrepid. ** Changed in: openssh (Ubuntu) Status: Confirmed = Fix Committed -- OpenSSH should support VIA PadLock https://bugs.launchpad.net/bugs/119295 You received this bug notification because you are a member of Ubuntu Server

[Bug 119295] Re: OpenSSH should support VIA PadLock

2008-06-11 Thread Craig Ringer
** Description changed: VIA PadLock is a hardware cryptography engine for AES and SHA1/256. - OpenSSH should support PadLock. Initial work on PadLock support has already been done: + OpenSSH should support PadLock. Upstream OpenSSH versions do support + padlock, and a working patch exists

[Bug 119295] Re: OpenSSH should support VIA PadLock

2008-06-04 Thread Craig Ringer
Confirmed: openssl is using x86 crypto even with -engine padlock, both in latest upstream and in the current hardy packages. If I interrupt a debug build of openssl while running openssl speed aes-128-cbc -engnie padlock on a C3 gdb generally reports that it's been interrupted in:

[Bug 119295] Re: OpenSSH should support VIA PadLock

2008-06-04 Thread Craig Ringer
** These bugs are fixed upstream in OpenSSH 4.9 and OpenSSL 0.9.8h ** You can apply the fix to OpenSSH 4.7 from Ubuntu just fine: https://bugzilla.mindrot.org/attachment.cgi?id=1458 . It applies cleanly except for two rejects at points where the changes have already been applied, so the rejects

[Bug 119295] Re: OpenSSH should support VIA PadLock

2008-06-04 Thread Craig Ringer
Quick instructions on rebuilding openssh and openssl to include the fix, for those not used to patching Debian packages: pre mkdir wrk cd wrk sudo apt-get install build-essential fakeroot wget sudo apt-get build-dep openssl openssh apt-get source openssl openssh cd openssl-0.9.8g wget --quiet -O

[Bug 119295] Re: OpenSSH should support VIA PadLock

2008-04-22 Thread Ian Lister
From the OpenSSL engine documentation at http://www.openssl.org/docs/crypto/engine.html : Automatically using builtin ENGINE implementations Here we'll assume we want to load and register all ENGINE implementations bundled with OpenSSL, such that for any cryptographic algorithm required by

[Bug 119295] Re: OpenSSH should support VIA PadLock

2008-04-22 Thread Ian Lister
At first glance it looks like the OpenSSL engine code has broken caching logic (in crypto/engine/eng_table.c) in all versions of 0.9.8, but is reversed and correct in all versions of 0.9.7. I haven't tested it, but I suspect the attached patch will fix the issue. ** Attachment added: Patch to

[Bug 119295] Re: OpenSSH should support VIA PadLock

2008-04-22 Thread Ian Lister
I've now tested the above patch and it seems to do the trick, so I've sent it in upstream to the OpenSSL RT system. -- OpenSSH should support VIA PadLock https://bugs.launchpad.net/bugs/119295 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed