[Touch-packages] [Bug 2030784] Re: Backport Intel's AVX512 patches on openssl 3.0

2024-03-10 Thread Bun K Tan
** Patch added: "001-vaes_gcm_avx512.patch" https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/2030784/+attachment/5754726/+files/001-vaes_gcm_avx512.patch -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to openssl in

[Touch-packages] [Bug 2030784] Re: Backport Intel's AVX512 patches on openssl 3.0

2024-03-10 Thread Bun K Tan
Hello @adrien-n, I had Dan Zimmerman take a look at this issue and found a solution. This is what he shared: Steps to reproduce: --- Get Source and apply patch: git clone https://git.launchpad.net/ubuntu/+source/openssl ubuntu_openssl cd ubuntu_openssl git checkout

[Touch-packages] [Bug 2030784] Re: Backport Intel's AVX512 patches on openssl 3.0

2023-10-11 Thread Bun K Tan
Hi @schopin, Recommended way to test the relevant code paths would be to use OpenSSL’s Capability Bits Environment variable. Notes below: Ubuntu - OpenSSL OPENSSL_ia32cap Environment Variable OpenSSL Environment variable processor feature bit disable combos for testing.