The patch mentioned alone does not apply on 1.1.1f in Ubuntu, it seems
it also needs

9cc834d966ea5afc38fb829bfe498aed4c5d498d
0d011f540400b425aba1c3e59624ad9dbabe83cb
a1ec85c169a8e53e52ab35914ad47b5baea84070
53eb05bdf00d7237e3b12976c2ac38d68206eb13
e6a80cbad28ee748830815634917efe96948f2f3

Will try this set next.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1799928

Title:
  [20.10 FEAT] openssl: RNG support

Status in Ubuntu on IBM z Systems:
  In Progress
Status in openssl package in Ubuntu:
  In Progress

Bug description:
  Provide a CPACF based random number generator for openSSL using PRNO-
  SHA-512-DRNG to implement a NIST SP800-90A compliant SHA512 hash based
  deterministic random bit generator (DRBG) seeded true random numbers
  extracted using the PRNO-TRNG instruction.

  Planned with > openssl 1.1.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1799928/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to