-
Notifications
You must be signed in to change notification settings - Fork 108
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
openssl: update to 3.4.0 #2009
openssl: update to 3.4.0 #2009
Conversation
Size as really ballooned, example for the kindlepw2 release build:
|
Assuming luasec is happy with it, I'm all for it, thanks ;). (IIRC, OpenSSL 1.1 is very very EoL ;p) |
Should be: lunarmodules/luasec@c297c52 |
There are some obvious ones like |
4a6695f
to
1ac8170
Compare
Updated results, again with a kindlepw2 release build:
|
That differs less than I'd hoped, but hey, it's something. |
Yesterday, I tried to see if wolfSSL was an alternative, but could not get luasec to work. LibreSSL, however, looks to be viable. I tested the Android ARM build: calibre plugin, NEWS downloader. Code size comparison for the kindlepw2 release build:
|
thirdparty/openssl/CMakeLists.txt
Outdated
no-comp | ||
no-default-thread-pool | ||
no-hw | ||
no-legacy | ||
no-quic | ||
no-thread-pool | ||
no-ui-console | ||
no-uplink | ||
no-whirlpool |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I had commented on the commit, so replicating it here so I can actually find it again in the future.
I see, no-legacy
is about the provider only but not about the algorithms. From the name I incorrectly assumed it covered all of these:
- Moved all variations of the EVP ciphers CAST5, BF, IDEA, SEED, RC2,
RC4, RC5, and DES to the legacy provider.- Moved the EVP digests MD2, MD4, MDC2, WHIRLPOOL and RIPEMD-160 to the legacy
provider.
But presumably that does provide a (incomplete?) list of various others to disable.
I seem to recall reading it was a fair bit slower, which would be more relevant on ereaders. But I'm fine with anything that works. |
No issue with the LibreSSL build on my Kindle either. I also did an OTA update to check zsync2 was still working. |
5d32e22
to
bd68a14
Compare
|
There are only 3 remaining users:
I do like that the LibreSSL (default) build is 1MB lighter than OpenSSL 3.4.0, and uses CMake. The hardware related feature detection code is different than both OpenSSL version, so maybe we should check that the ARM issue is not present. @TheBolshe: are you available to test a LibreSSL build? |
Sure ^^ |
No need, here's the build. |
Seems to be working fine, no crashes on download. |
Great, thanks for testing! |
bd68a14
to
f88bea6
Compare
No real opinion. |
No preferences either, FWIW; the perf differences are likely irrelevant for our usecases and/or targets ;). (i.e., smaller sounds good, so, fine w/ libressl). |
Alright, I'll merge the other one when I get to a PC. (Or anybody else feel free to do so. ;-) |
https://github.com/openssl/openssl/blob/openssl-3.4.0/NEWS.md
This change is