[Bug 1018522] Re: Enable optimized 64bit elliptic curve code contributed by Google

Brian Murray brian at ubuntu.com
Mon Apr 15 15:23:53 UTC 2013


Hello cc, or anyone else affected,

Accepted openssl into precise-proposed. The package will build now and
be available at
http://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.9 in a few
hours, and then in the -proposed repository.

Please help us by testing this new package.  See
https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to
enable and use -proposed.  Your feedback will aid us getting this update
out to other Ubuntu users.

If this package fixes the bug for you, please add a comment to this bug,
mentioning the version of the package you tested, and change the tag
from verification-needed to verification-done. If it does not fix the
bug for you, please add a comment stating that, and change the tag to
verification-failed.  In either case, details of your testing will help
us make a better decision.

Further information regarding the verification process can be found at
https://wiki.ubuntu.com/QATeam/PerformingSRUVerification .  Thank you in
advance!

** Changed in: openssl (Ubuntu Precise)
       Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1018522

Title:
  Enable optimized 64bit elliptic curve code contributed by Google

Status in “openssl” package in Ubuntu:
  Fix Released
Status in “openssl” source package in Precise:
  Fix Committed
Status in “openssl” source package in Quantal:
  Fix Committed

Bug description:
  [Impact]

   * Optional optimisations that are available, were not enabled at
  build time, thus reducing openssl performance of ecdsa for 224, 256,
  521 bit.

   * This is an SRU as part of Hardware Enablement.

  [Test Case]

  * Compare `openssl speed` for ecdsa on amd64 platform. There should be noticeable improvement.
  (Here is a sample from my machine, note that the below benchmarks were whilst the machine was under variable load)
  Before:
  Doing 224 bit sign ecdsa's for 10s: 24059 224 bit ECDSA signs in 9.95s 
  Doing 224 bit verify ecdsa's for 10s: 6197 224 bit ECDSA verify in 9.97s
  Doing 256 bit sign ecdsa's for 10s: 20640 256 bit ECDSA signs in 9.94s 
  Doing 256 bit verify ecdsa's for 10s: 5222 256 bit ECDSA verify in 9.95s
  Doing 521 bit sign ecdsa's for 10s: 5683 521 bit ECDSA signs in 9.97s 
  Doing 521 bit verify ecdsa's for 10s: 1137 521 bit ECDSA verify in 9.94s

  After:
  Doing 224 bit sign ecdsa's for 10s: 32087 224 bit ECDSA signs in 9.92s 
  Doing 224 bit verify ecdsa's for 10s: 15929 224 bit ECDSA verify in 9.94s
  Doing 256 bit sign ecdsa's for 10s: 18875 256 bit ECDSA signs in 9.91s 
  Doing 256 bit verify ecdsa's for 10s: 7744 256 bit ECDSA verify in 9.94s
  Doing 521 bit sign ecdsa's for 10s: 6587 521 bit ECDSA signs in 9.90s 
  Doing 521 bit verify ecdsa's for 10s: 3028 521 bit ECDSA verify in 9.85s

  The almost threefold improvement in 224 & 521 verify is clearly
  visible.

  [Regression Potential]

  * This change affects only amd64 and only ecdsa.
  * The test-suite passes correctly.

  [Other Info]
   
  This is to turn on the code contributed by Google for optimized 64bit implementations of elliptic curves.

  From the OpenSSL changelog, http://www.openssl.org/news/changelog.html

  Specify "enable-ec_nistp_64_gcc_128" on the Configure (or config) command
       line to include this in your build of OpenSSL, and run "make depend" (or
       "make update"). This enables the following EC_METHODs:

  So it really is as simple as enabling an additional compile flag.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1018522/+subscriptions




More information about the foundations-bugs mailing list