From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by mx.groups.io with SMTP id smtpd.web11.3814.1678781781593554477 for ; Tue, 14 Mar 2023 01:16:21 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=LYZ0wkPJ; spf=pass (domain: redhat.com, ip: 170.10.129.124, mailfrom: kraxel@redhat.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1678781780; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=kJib4FolCThh9zk6RU6mWMX8Lj+pv/06ZlPMh6vHm6I=; b=LYZ0wkPJae/KJqPyQiEuxTJSwUmL0Z+j02Zn5XfHnmtjsme5ILqqH95LWwxlEHPaJ0p2qN QUrAbMcvshkEQafV328UrPaUUFKLGCi+QEul73dkDNlUTOe2cHL5q3yfqdz+GmvXmg8Fji bnQprUqyktSWWmtkG0bgOEMtHhhvuNk= Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-121-EkLXIpkUPV62hbWeNd7HBA-1; Tue, 14 Mar 2023 04:16:15 -0400 X-MC-Unique: EkLXIpkUPV62hbWeNd7HBA-1 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.rdu2.redhat.com [10.11.54.5]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id DCAAC3C16E81; Tue, 14 Mar 2023 08:16:14 +0000 (UTC) Received: from sirius.home.kraxel.org (unknown [10.39.192.142]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 69D8351FF; Tue, 14 Mar 2023 08:16:14 +0000 (UTC) Received: by sirius.home.kraxel.org (Postfix, from userid 1000) id D68711801E88; Tue, 14 Mar 2023 09:16:12 +0100 (CET) Date: Tue, 14 Mar 2023 09:16:12 +0100 From: "Gerd Hoffmann" To: devel@edk2.groups.io, yi1.li@intel.com Cc: "Wang, Jian J" , Pawel Polawski , "Lu, Xiaoyu1" , Ard Biesheuvel , "Jiang, Guomin" , "Yao, Jiewen" , Oliver Steffen , "Justen, Jordan L" Subject: Re: [edk2-devel] [PATCH 01/22] CryptoPkg/openssl: update submodule to openssl-3.0.8 Message-ID: <20230314081612.7dze46duc3dn6wrw@sirius.home.kraxel.org> References: <20230313083016.136448-1-kraxel@redhat.com> <20230313083016.136448-2-kraxel@redhat.com> MIME-Version: 1.0 In-Reply-To: X-Scanned-By: MIMEDefang 3.1 on 10.11.54.5 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset=us-ascii Content-Disposition: inline On Mon, Mar 13, 2023 at 03:13:28PM +0000, Li, Yi wrote: > Hi Gerd, > > I also have some work on Openssl3, mainly to research how to reduce the binary size increase after the upgrade: > > https://github.com/tianocore/edk2-staging/blob/OpenSSL11_EOL/CryptoPkg/Readme-OpenSSL3.0.md > > > > I really appreciate your work in this patch series, especially the clear py script. > > But it seems that part of our work is repeated, if you don't mind, can > I merge your work into openssl3.0 Edk2Staging branch? You can find it > here if you're interested: Sure, that is the point of sharing it ;) github branch (which hot some updates for aarch64 meanwhile) is at https://github.com/kraxel/edk2/commits/openssl3 aarch64 is not working, the cpu capability probing needs some work. openssl seems to just try instructions and catch SIGILL. edk2 needs something else of course. Easiest way out would be to just provide dummy functions, but that would also mean we wouldn't use aes instructions if available ... Any hints on that from the arm camp are welcome. take care, Gerd