From: Juergen Christ Date: Wed, 13 Jul 2022 09:15:43 +0000 (+0200) Subject: Fix EC ASM flag passing X-Git-Tag: openssl-3.2.0-alpha1~2388 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=12186377cb987c4527d286e91e735e8261a45669;p=thirdparty%2Fopenssl.git Fix EC ASM flag passing Flags for ASM implementations of EC curves were only passed to the FIPS provider and not to the default or legacy provider. This left some potential for optimization. Pass the correct flags also to these providers. Signed-off-by: Juergen Christ Reviewed-by: Patrick Steuer Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/18791) --- diff --git a/crypto/ec/build.info b/crypto/ec/build.info index 70ec25079df..a511e887a9b 100644 --- a/crypto/ec/build.info +++ b/crypto/ec/build.info @@ -71,6 +71,14 @@ SOURCE[../../providers/libfips.a]=$COMMON # need to be applied to all affected libraries and modules. DEFINE[../../libcrypto]=$ECDEF DEFINE[../../providers/libfips.a]=$ECDEF +DEFINE[../../providers/libdefault.a]=$ECDEF +# We only need to include the ECDEF stuff in the legacy provider when +# it's a separate module and it's dynamically linked with libcrypto. +# Otherwise, it already gets everything that the static libcrypto.a +# has, and doesn't need it added again. +IF[{- !$disabled{module} && !$disabled{shared} -}] + DEFINE[../providers/liblegacy.a]=$ECDEF +ENDIF GENERATE[ecp_nistz256-x86.S]=asm/ecp_nistz256-x86.pl