Note: This bug is displayed in read-only format because
the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
DescriptionNikos Mavrogiannopoulos
2019-12-03 07:49:24 UTC
Description of problem:
In an unrelated fedora commit 2b62e65299c881127f59855ac54eb999b55afc34 the --enable-fat flag which was enabling CPU optimized code was dropped, probably accidentally. That's has a significant impact on the performance of nettle and in turn gnutls.
In particular the RSA implementation of nettle as compared to openssl drops to (hogweed-benchmark tool):
name size sign/ms verify/ms
rsa 2048 0.8881 27.1422
rsa (openssl) 2048 1.4249 45.2295
While on a non-RHEL system where gmp is compiled with --enable-fat:
rsa 2048 0.2106 7.2703
rsa (openssl) 2048 0.2024 6.4992
Please compile gmp with --enable-fat
This dupes #1493218 which was a crash not just an optimization issue.
Comment 4RHEL Program Management
2021-06-03 07:30:33 UTC
After evaluating this issue, there are no plans to address it further or fix it in an upcoming release. Therefore, it is being closed. If plans change such that this issue will be fixed in an upcoming release, then the bug can be reopened.
Description of problem: In an unrelated fedora commit 2b62e65299c881127f59855ac54eb999b55afc34 the --enable-fat flag which was enabling CPU optimized code was dropped, probably accidentally. That's has a significant impact on the performance of nettle and in turn gnutls. In particular the RSA implementation of nettle as compared to openssl drops to (hogweed-benchmark tool): name size sign/ms verify/ms rsa 2048 0.8881 27.1422 rsa (openssl) 2048 1.4249 45.2295 While on a non-RHEL system where gmp is compiled with --enable-fat: rsa 2048 0.2106 7.2703 rsa (openssl) 2048 0.2024 6.4992 Please compile gmp with --enable-fat