Bug 183584 - [libcrypto] [patch] crypto/openssl: NIST P-* elliptic curves aren't optimized on amd64
Summary: [libcrypto] [patch] crypto/openssl: NIST P-* elliptic curves aren't optimized...
Status: Open
Alias: None
Product: Base System
Classification: Unclassified
Component: kern (show other bugs)
Version: 10.0-BETA2
Hardware: Any Any
: Normal Affects Only Me
Assignee: freebsd-bugs (Nobody)
Depends on:
Reported: 2013-11-02 06:30 UTC by Yasar Kanis
Modified: 2020-03-29 17:57 UTC (History)
1 user (show)

See Also:

ec_nistp_opt.patch (1.03 KB, patch)
2013-11-02 06:30 UTC, Yasar Kanis
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Yasar Kanis 2013-11-02 06:30:00 UTC
When running security/tor-devel the following message ends up in the
log file.

[notice] We were built to run on a 64-bit CPU, with OpenSSL 1.0.1 or later, but with a version of OpenSSL that apparently lacks accelerated support for the NIST P-224 and P-256 groups. Building openssl with such support (using the enable-ec_nistp_64_gcc_128 option when configuring it) would make ECDH much faster.

How-To-Repeat:  % nm -D /lib/libcrypto.so.7 | grep ec_GFp_nistp224_points_mul
Comment 1 John-Mark Gurney freebsd_committer 2014-01-24 21:55:02 UTC
Responsible Changed
From-To: freebsd-bugs->jmg

I'll look at pushing this through...
Comment 2 Eitan Adler freebsd_committer freebsd_triage 2017-12-31 07:59:09 UTC
For bugs matching the following criteria:

Status: In Progress Changed: (is less than) 2014-06-01

Reset to default assignee and clear in-progress tags.

Mail being skipped
Comment 3 Gleb Popov freebsd_committer 2020-03-29 17:57:00 UTC
Seems to be still relevant in 2020. Can this be commited?