From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by mx.groups.io with SMTP id smtpd.web11.97329.1680602084744828981 for ; Tue, 04 Apr 2023 02:54:47 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=f3h2YY4J; spf=pass (domain: intel.com, ip: 192.55.52.93, mailfrom: yi1.li@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1680602087; x=1712138087; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=oglzP4uYKxKeWuaoipqckGzv0Ba6SdK0gRcm2IKvqBE=; b=f3h2YY4J2nbhbwGmsTalaFQ1h8yJgLqTy89ToJAn2pkdH1Jr27qI9YOW 8yMzXbGvjCloiJDW1PWXcn11bUiHu47EipTZ45sOQtVypKkw/1wWGArIR 6JvRY5wGO4wgPpcvx5DXXDBZL6sR7UJc+86jswmnVCJgQlg+VuJ6aXIrl bX3OpNHc9pmimpeMTCoXQn/g5NSlBfkTG84P6Vaqa3z89c00s8zcOYiEM gY17w1StKmHcCh9AhsM2tttnNKLSV65aiHyWLdHNE95U/A6x6YmI+pz1D J6YQr0Ck5BEsetAdQjMKCFw21yilBYKvqb0s+m16FYWm2jBrOka4JQTpq A==; X-IronPort-AV: E=McAfee;i="6600,9927,10669"; a="339626668" X-IronPort-AV: E=Sophos;i="5.98,317,1673942400"; d="scan'208";a="339626668" Received: from fmsmga007.fm.intel.com ([10.253.24.52]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 Apr 2023 02:54:46 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10669"; a="688830723" X-IronPort-AV: E=Sophos;i="5.98,317,1673942400"; d="scan'208";a="688830723" Received: from liyi4-desktop.ccr.corp.intel.com ([10.239.153.82]) by fmsmga007-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 Apr 2023 02:54:45 -0700 From: "Li, Yi" To: devel@edk2.groups.io Cc: Yi Li Subject: [edk2-staging/OpenSSL11_EOL][PATCH 4/4] Readme: update POC result and next step Date: Tue, 4 Apr 2023 17:54:33 +0800 Message-Id: <6c3b90518493fe6591cf100cda66e4e16dd09b0e.1680601312.git.yi1.li@intel.com> X-Mailer: git-send-email 2.31.1.windows.1 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Signed-off-by: Yi Li --- CryptoPkg/Readme-OpenSSL3.0.md | 16 ++++++++++++++-- 1 file changed, 14 insertions(+), 2 deletions(-) diff --git a/CryptoPkg/Readme-OpenSSL3.0.md b/CryptoPkg/Readme-OpenSSL3.0.md index 1c77628b75..5b660959e7 100644 --- a/CryptoPkg/Readme-OpenSSL3.0.md +++ b/CryptoPkg/Readme-OpenSSL3.0.md @@ -16,7 +16,18 @@ This branch is for investigating how to reduce the size increase. The branch owner: Li Yi ## Latest update -Will update latest result here (Build based on Intel platform). +The goal of POC has been reached, next step: +1. Optimize code quality +2. Upstream OpenSsl code change +3. Fully validation + +Risk: +1. Upstream the openssl code is a long process. if all goes well, it can be completed before the next openssl stable release (July 2023). + If missed, the next stable release will be in September 2023. +2. If bugs are found during validation, some size optimization work will have to be discarded. + This will result in that size increase greater than the current result. + +## POC result Binaries mode (use crypto drivers) | Driver | 1.1.1 | 3.0 | percent | |-----------------|------------|------------|------------| @@ -35,7 +46,8 @@ Binaries mode (use crypto drivers) Library mode (use crypto library) | Driver | 1.1.1 | 3.0 | delta | |--------------------|------------|------------|------------| -| FV | 2377 | 2639 | 262 | +| FV | 2377 | 2636 | 262 | +| FV (LZMA) | 459 | 539 | 80 | |SecurityStubDxe.efi | 562 | 605 | 43 | ## Limitation -- 2.31.1.windows.1