<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html lang="en">
<head>
<meta content="text/html; charset=US-ASCII" http-equiv="Content-Type">
<title>
GitLab
</title>


<style>img {
max-width: 100%; height: auto;
}
</style>
</head>
<body>
<div class="content">

<p class="details" style="font-style: italic; color: #777;">
<a href="https://gitlab.com/xnox">Dimitri John Ledkov</a> created an issue <a href="https://gitlab.com/gnutls/gnutls/-/issues/1043">#1043</a>:
</p>
<div></div>
<p dir="auto">In January Intel CET patches landed in the crypto assembly .pl scripts.</p>
<p dir="auto">However GnuTLS is using openssl pinned on an older version, and thus generates asm code without CET support.</p>
<p dir="auto">Please update openssl library to at least 3.0.0-alpha1, or just master, or like the latest 3.0.0-alpha4.</p>
<p dir="auto">Unfortunately CET support is not backported to 1.1.1 branch yet.</p>
<p dir="auto">I have requested for the CET support to be merged back to 1.1.1 branch here <a href="https://github.com/openssl/openssl/pull/12272" rel="nofollow noreferrer noopener" target="_blank">https://github.com/openssl/openssl/pull/12272</a> , but I'm not sure if gnutls project can apply patches on top of the openssl submodule.</p>

</div>
<div class="footer" style="margin-top: 10px;">
<p style="font-size: small; color: #777;">

<br>
Reply to this email directly or <a href="https://gitlab.com/gnutls/gnutls/-/issues/1043">view it on GitLab</a>.
<br>
You're receiving this email because of your account on gitlab.com.
If you'd like to receive fewer emails, you can
<a href="https://gitlab.com/-/sent_notifications/eeae3fada0e0a15654abcd9afd49f4fd/unsubscribe">unsubscribe</a>
from this thread or
adjust your notification settings.
<script type="application/ld+json">{"@context":"http://schema.org","@type":"EmailMessage","action":{"@type":"ViewAction","name":"View Issue","url":"https://gitlab.com/gnutls/gnutls/-/issues/1043"}}</script>


</p>
</div>
</body>
</html>