MINIFICPP-2328 Upgrade OpenSSL to version 3.3.0

Closes #1758

Signed-off-by: Marton Szasz <szaszm@apache.org>
diff --git a/cmake/BundledOpenSSL.cmake b/cmake/BundledOpenSSL.cmake
index 5b71a72..7a429a9 100644
--- a/cmake/BundledOpenSSL.cmake
+++ b/cmake/BundledOpenSSL.cmake
@@ -59,11 +59,6 @@
         install(FILES ${OPENSSL_LIBRARIES_LIST} DESTINATION bin COMPONENT bin)
     endif()
 
-    # Define patch step
-    set(PATCH_FILE "${SOURCE_DIR}/thirdparty/openssl/Tidy-up-aarch64-feature-detection-code-in-armcap.c.patch")
-    set(PC ${Bash_EXECUTABLE} -c "set -x && \
-            (\"${Patch_EXECUTABLE}\" -p1 -R -s -f --dry-run -i \"${PATCH_FILE}\" || \"${Patch_EXECUTABLE}\" -p1 -N -i \"${PATCH_FILE}\")")
-
     # Set build options
     set(OPENSSL_CMAKE_ARGS ${PASSTHROUGH_CMAKE_ARGS}
             "-DCMAKE_INSTALL_PREFIX=${OPENSSL_BIN_DIR}"
@@ -78,13 +73,12 @@
     if (WIN32)
         ExternalProject_Add(
                 openssl-external
-                URL https://github.com/openssl/openssl/releases/download/openssl-3.1.1/openssl-3.1.1.tar.gz
-                URL_HASH "SHA256=b3aa61334233b852b63ddb048df181177c2c659eb9d4376008118f9c08d07674"
+                URL https://github.com/openssl/openssl/releases/download/openssl-3.3.0/openssl-3.3.0.tar.gz
+                URL_HASH "SHA256=53e66b043322a606abf0087e7699a0e033a37fa13feb9742df35c3a33b18fb02"
                 SOURCE_DIR "${BINARY_DIR}/thirdparty/openssl-src"
                 BUILD_IN_SOURCE true
                 CONFIGURE_COMMAND perl Configure "CFLAGS=${PASSTHROUGH_CMAKE_C_FLAGS}" "CXXFLAGS=${PASSTHROUGH_CMAKE_CXX_FLAGS}" ${OPENSSL_SHARED_FLAG} no-tests "--prefix=${OPENSSL_BIN_DIR}" "--openssldir=${OPENSSL_BIN_DIR}"
                 BUILD_BYPRODUCTS ${OPENSSL_LIBRARIES_LIST}
-                PATCH_COMMAND ${PC}
                 EXCLUDE_FROM_ALL TRUE
                 BUILD_COMMAND nmake
                 INSTALL_COMMAND nmake install
@@ -92,13 +86,12 @@
     else()
         ExternalProject_Add(
                 openssl-external
-                URL https://github.com/openssl/openssl/releases/download/openssl-3.1.1/openssl-3.1.1.tar.gz
-                URL_HASH "SHA256=b3aa61334233b852b63ddb048df181177c2c659eb9d4376008118f9c08d07674"
+                URL https://github.com/openssl/openssl/releases/download/openssl-3.3.0/openssl-3.3.0.tar.gz
+                URL_HASH "SHA256=53e66b043322a606abf0087e7699a0e033a37fa13feb9742df35c3a33b18fb02"
                 SOURCE_DIR "${BINARY_DIR}/thirdparty/openssl-src"
                 BUILD_IN_SOURCE true
                 CONFIGURE_COMMAND ./Configure "CFLAGS=${PASSTHROUGH_CMAKE_C_FLAGS} -fPIC" "CXXFLAGS=${PASSTHROUGH_CMAKE_CXX_FLAGS} -fPIC" ${OPENSSL_SHARED_FLAG} no-tests "--prefix=${OPENSSL_BIN_DIR}" "--openssldir=${OPENSSL_BIN_DIR}"
                 BUILD_BYPRODUCTS ${OPENSSL_LIBRARIES_LIST}
-                PATCH_COMMAND ${PC}
                 EXCLUDE_FROM_ALL TRUE
         )
     endif()
diff --git a/thirdparty/openssl/Tidy-up-aarch64-feature-detection-code-in-armcap.c.patch b/thirdparty/openssl/Tidy-up-aarch64-feature-detection-code-in-armcap.c.patch
deleted file mode 100644
index 55a5301..0000000
--- a/thirdparty/openssl/Tidy-up-aarch64-feature-detection-code-in-armcap.c.patch
+++ /dev/null
@@ -1,560 +0,0 @@
-From ea5f76e8dd33f65bf87bcdd39b9d6d5418bcb1f9 Mon Sep 17 00:00:00 2001
-From: Tom Cosgrove <tom.cosgrove@arm.com>
-Date: Sun, 12 Feb 2023 20:26:23 +0000
-Subject: [PATCH] Tidy up aarch64 feature detection code in armcap.c
-
-Make the SIGILL-based code easier to read, and don't use it on Apple Silicon.
-
-Also fix "error: 'HWCAP(2)_*' macro redefined" warnings on FreeBSD.
-
-Fixes #20188
-
-Change-Id: I5618bbe9444cc40cb5705c6ccbdc331c16bab794
-
-Reviewed-by: Tomas Mraz <tomas@openssl.org>
-Reviewed-by: Paul Dale <pauli@openssl.org>
-(Merged from https://github.com/openssl/openssl/pull/20305)
----
- crypto/armcap.c | 402 +++++++++++++++++++++++++-----------------------
- 1 file changed, 209 insertions(+), 193 deletions(-)
-
-diff --git a/crypto/armcap.c b/crypto/armcap.c
-index 71296786c3..38f6c961a4 100644
---- a/crypto/armcap.c
-+++ b/crypto/armcap.c
-@@ -1,5 +1,5 @@
- /*
-- * Copyright 2011-2022 The OpenSSL Project Authors. All Rights Reserved.
-+ * Copyright 2011-2023 The OpenSSL Project Authors. All Rights Reserved.
-  *
-  * Licensed under the Apache License 2.0 (the "License").  You may not use
-  * this file except in compliance with the License.  You can obtain a copy
-@@ -10,17 +10,18 @@
- #include <stdio.h>
- #include <stdlib.h>
- #include <string.h>
--#include <setjmp.h>
--#include <signal.h>
- #include <openssl/crypto.h>
- #ifdef __APPLE__
- #include <sys/sysctl.h>
-+#else
-+#include <setjmp.h>
-+#include <signal.h>
- #endif
- #include "internal/cryptlib.h"
--#ifndef _WIN32
--#include <unistd.h>
--#else
-+#ifdef _WIN32
- #include <windows.h>
-+#else
-+#include <unistd.h>
- #endif
- #include "arm_arch.h"
- 
-@@ -46,7 +47,7 @@ uint32_t OPENSSL_rdtsc(void)
- {
-     return 0;
- }
--#elif __ARM_MAX_ARCH__<7
-+#elif __ARM_MAX_ARCH__ < 7
- void OPENSSL_cpuid_setup(void)
- {
- }
-@@ -55,73 +56,11 @@ uint32_t OPENSSL_rdtsc(void)
- {
-     return 0;
- }
--#else
--static sigset_t all_masked;
--
--static sigjmp_buf ill_jmp;
--static void ill_handler(int sig)
--{
--    siglongjmp(ill_jmp, sig);
--}
--
--/*
-- * Following subroutines could have been inlined, but it's not all
-- * ARM compilers support inline assembler...
-- */
--void _armv7_neon_probe(void);
--void _armv8_aes_probe(void);
--void _armv8_sha1_probe(void);
--void _armv8_sha256_probe(void);
--void _armv8_pmull_probe(void);
--# ifdef __aarch64__
--void _armv8_sm3_probe(void);
--void _armv8_sm4_probe(void);
--void _armv8_eor3_probe(void);
--void _armv8_sha512_probe(void);
--unsigned int _armv8_cpuid_probe(void);
--void _armv8_sve_probe(void);
--void _armv8_sve2_probe(void);
--void _armv8_rng_probe(void);
--
--size_t OPENSSL_rndr_asm(unsigned char *buf, size_t len);
--size_t OPENSSL_rndrrs_asm(unsigned char *buf, size_t len);
--
--size_t OPENSSL_rndr_bytes(unsigned char *buf, size_t len);
--size_t OPENSSL_rndrrs_bytes(unsigned char *buf, size_t len);
--
--static size_t OPENSSL_rndr_wrapper(size_t (*func)(unsigned char *, size_t), unsigned char *buf, size_t len)
--{
--    size_t buffer_size = 0;
--    int i;
--
--    for (i = 0; i < 8; i++) {
--        buffer_size = func(buf, len);
--        if (buffer_size == len)
--            break;
--        usleep(5000);  /* 5000 microseconds (5 milliseconds) */
--    }
--    return buffer_size;
--}
-+#else /* !_WIN32 && __ARM_MAX_ARCH__ >= 7 */
- 
--size_t OPENSSL_rndr_bytes(unsigned char *buf, size_t len)
--{
--    return OPENSSL_rndr_wrapper(OPENSSL_rndr_asm, buf, len);
--}
-+ /* 3 ways of handling things here: __APPLE__,  getauxval() or SIGILL detect */
- 
--size_t OPENSSL_rndrrs_bytes(unsigned char *buf, size_t len)
--{
--    return OPENSSL_rndr_wrapper(OPENSSL_rndrrs_asm, buf, len);
--}
--# endif
--uint32_t _armv7_tick(void);
--
--uint32_t OPENSSL_rdtsc(void)
--{
--    if (OPENSSL_armcap_P & ARMV7_TICK)
--        return _armv7_tick();
--    else
--        return 0;
--}
-+ /* First determine if getauxval() is available (OSSL_IMPLEMENT_GETAUXVAL) */
- 
- # if defined(__GNUC__) && __GNUC__>=2
- void OPENSSL_cpuid_setup(void) __attribute__ ((constructor));
-@@ -161,10 +100,10 @@ static unsigned long getauxval(unsigned long key)
-  * Android: according to https://developer.android.com/ndk/guides/cpu-features,
-  * getauxval is supported starting with API level 18
-  */
--#  if defined(__ANDROID__) && defined(__ANDROID_API__) && __ANDROID_API__ >= 18
--#   include <sys/auxv.h>
--#   define OSSL_IMPLEMENT_GETAUXVAL
--#  endif
-+# if defined(__ANDROID__) && defined(__ANDROID_API__) && __ANDROID_API__ >= 18
-+#  include <sys/auxv.h>
-+#  define OSSL_IMPLEMENT_GETAUXVAL
-+# endif
- 
- /*
-  * ARM puts the feature bits for Crypto Extensions in AT_HWCAP2, whereas
-@@ -177,40 +116,144 @@ static unsigned long getauxval(unsigned long key)
- #  define AT_HWCAP2              26
- # endif
- # if defined(__arm__) || defined (__arm)
--#  define HWCAP                  AT_HWCAP
--#  define HWCAP_NEON             (1 << 12)
--
--#  define HWCAP_CE               AT_HWCAP2
--#  define HWCAP_CE_AES           (1 << 0)
--#  define HWCAP_CE_PMULL         (1 << 1)
--#  define HWCAP_CE_SHA1          (1 << 2)
--#  define HWCAP_CE_SHA256        (1 << 3)
-+#  define OSSL_HWCAP                  AT_HWCAP
-+#  define OSSL_HWCAP_NEON             (1 << 12)
-+
-+#  define OSSL_HWCAP_CE               AT_HWCAP2
-+#  define OSSL_HWCAP_CE_AES           (1 << 0)
-+#  define OSSL_HWCAP_CE_PMULL         (1 << 1)
-+#  define OSSL_HWCAP_CE_SHA1          (1 << 2)
-+#  define OSSL_HWCAP_CE_SHA256        (1 << 3)
- # elif defined(__aarch64__)
--#  define HWCAP                  AT_HWCAP
--#  define HWCAP_NEON             (1 << 1)
--
--#  define HWCAP_CE               HWCAP
--#  define HWCAP_CE_AES           (1 << 3)
--#  define HWCAP_CE_PMULL         (1 << 4)
--#  define HWCAP_CE_SHA1          (1 << 5)
--#  define HWCAP_CE_SHA256        (1 << 6)
--#  define HWCAP_CPUID            (1 << 11)
--#  define HWCAP_SHA3             (1 << 17)
--#  define HWCAP_CE_SM3           (1 << 18)
--#  define HWCAP_CE_SM4           (1 << 19)
--#  define HWCAP_CE_SHA512        (1 << 21)
--#  define HWCAP_SVE              (1 << 22)
--                                  /* AT_HWCAP2 */
--#  define HWCAP2                 26
--#  define HWCAP2_SVE2            (1 << 1)
--#  define HWCAP2_RNG             (1 << 16)
-+#  define OSSL_HWCAP                  AT_HWCAP
-+#  define OSSL_HWCAP_NEON             (1 << 1)
-+
-+#  define OSSL_HWCAP_CE               AT_HWCAP
-+#  define OSSL_HWCAP_CE_AES           (1 << 3)
-+#  define OSSL_HWCAP_CE_PMULL         (1 << 4)
-+#  define OSSL_HWCAP_CE_SHA1          (1 << 5)
-+#  define OSSL_HWCAP_CE_SHA256        (1 << 6)
-+#  define OSSL_HWCAP_CPUID            (1 << 11)
-+#  define OSSL_HWCAP_SHA3             (1 << 17)
-+#  define OSSL_HWCAP_CE_SM3           (1 << 18)
-+#  define OSSL_HWCAP_CE_SM4           (1 << 19)
-+#  define OSSL_HWCAP_CE_SHA512        (1 << 21)
-+#  define OSSL_HWCAP_SVE              (1 << 22)
-+                                      /* AT_HWCAP2 */
-+#  define OSSL_HWCAP2                 26
-+#  define OSSL_HWCAP2_SVE2            (1 << 1)
-+#  define OSSL_HWCAP2_RNG             (1 << 16)
-+# endif
-+
-+uint32_t _armv7_tick(void);
-+
-+uint32_t OPENSSL_rdtsc(void)
-+{
-+    if (OPENSSL_armcap_P & ARMV7_TICK)
-+        return _armv7_tick();
-+    else
-+        return 0;
-+}
-+
-+# ifdef __aarch64__
-+size_t OPENSSL_rndr_asm(unsigned char *buf, size_t len);
-+size_t OPENSSL_rndrrs_asm(unsigned char *buf, size_t len);
-+
-+size_t OPENSSL_rndr_bytes(unsigned char *buf, size_t len);
-+size_t OPENSSL_rndrrs_bytes(unsigned char *buf, size_t len);
-+
-+static size_t OPENSSL_rndr_wrapper(size_t (*func)(unsigned char *, size_t), unsigned char *buf, size_t len)
-+{
-+    size_t buffer_size = 0;
-+    int i;
-+
-+    for (i = 0; i < 8; i++) {
-+        buffer_size = func(buf, len);
-+        if (buffer_size == len)
-+            break;
-+        usleep(5000);  /* 5000 microseconds (5 milliseconds) */
-+    }
-+    return buffer_size;
-+}
-+
-+size_t OPENSSL_rndr_bytes(unsigned char *buf, size_t len)
-+{
-+    return OPENSSL_rndr_wrapper(OPENSSL_rndr_asm, buf, len);
-+}
-+
-+size_t OPENSSL_rndrrs_bytes(unsigned char *buf, size_t len)
-+{
-+    return OPENSSL_rndr_wrapper(OPENSSL_rndrrs_asm, buf, len);
-+}
-+# endif
-+
-+# if !defined(__APPLE__) && !defined(OSSL_IMPLEMENT_GETAUXVAL)
-+static sigset_t all_masked;
-+
-+static sigjmp_buf ill_jmp;
-+static void ill_handler(int sig)
-+{
-+    siglongjmp(ill_jmp, sig);
-+}
-+
-+/*
-+ * Following subroutines could have been inlined, but not all
-+ * ARM compilers support inline assembler, and we'd then have to
-+ * worry about the compiler optimising out the detection code...
-+ */
-+void _armv7_neon_probe(void);
-+void _armv8_aes_probe(void);
-+void _armv8_sha1_probe(void);
-+void _armv8_sha256_probe(void);
-+void _armv8_pmull_probe(void);
-+#  ifdef __aarch64__
-+void _armv8_sm3_probe(void);
-+void _armv8_sm4_probe(void);
-+void _armv8_sha512_probe(void);
-+void _armv8_eor3_probe(void);
-+void _armv8_sve_probe(void);
-+void _armv8_sve2_probe(void);
-+void _armv8_rng_probe(void);
-+#  endif
-+# endif /* !__APPLE__ && !OSSL_IMPLEMENT_GETAUXVAL */
-+
-+/* We only call _armv8_cpuid_probe() if (OPENSSL_armcap_P & ARMV8_CPUID) != 0 */
-+unsigned int _armv8_cpuid_probe(void);
-+
-+# if defined(__APPLE__)
-+/*
-+ * Checks the specified integer sysctl, returning `value` if it's 1, otherwise returning 0.
-+ */
-+static unsigned int sysctl_query(const char *name, unsigned int value)
-+{
-+    unsigned int sys_value = 0;
-+    size_t len = sizeof(sys_value);
-+
-+    return (sysctlbyname(name, &sys_value, &len, NULL, 0) == 0 && sys_value == 1) ? value : 0;
-+}
-+# elif !defined(OSSL_IMPLEMENT_GETAUXVAL)
-+/*
-+ * Calls a provided probe function, which may SIGILL. If it doesn't, return `value`, otherwise return 0.
-+ */
-+static unsigned int arm_probe_for(void (*probe)(void), volatile unsigned int value)
-+{
-+    if (sigsetjmp(ill_jmp, 1) == 0) {
-+        probe();
-+        return value;
-+    } else {
-+        /* The probe function gave us SIGILL */
-+        return 0;
-+    }
-+}
- # endif
- 
- void OPENSSL_cpuid_setup(void)
- {
-     const char *e;
-+# if !defined(__APPLE__) && !defined(OSSL_IMPLEMENT_GETAUXVAL)
-     struct sigaction ill_oact, ill_act;
-     sigset_t oset;
-+# endif
-     static int trigger = 0;
- 
-     if (trigger)
-@@ -225,7 +268,7 @@ void OPENSSL_cpuid_setup(void)
-     }
- 
- # if defined(__APPLE__)
--#   if !defined(__aarch64__)
-+#  if !defined(__aarch64__)
-     /*
-      * Capability probing by catching SIGILL appears to be problematic
-      * on iOS. But since Apple universe is "monocultural", it's actually
-@@ -235,77 +278,82 @@ void OPENSSL_cpuid_setup(void)
-         OPENSSL_armcap_P = ARMV7_NEON;
-         return;
-     }
--    /*
--     * One could do same even for __aarch64__ iOS builds. It's not done
--     * exclusively for reasons of keeping code unified across platforms.
--     * Unified code works because it never triggers SIGILL on Apple
--     * devices...
--     */
--#   else
-+#  else
-     {
--        unsigned int feature;
--        size_t len = sizeof(feature);
--        char uarch[64];
--
--        if (sysctlbyname("hw.optional.armv8_2_sha512", &feature, &len, NULL, 0) == 0 && feature == 1)
--            OPENSSL_armcap_P |= ARMV8_SHA512;
--        feature = 0;
--        if (sysctlbyname("hw.optional.armv8_2_sha3", &feature, &len, NULL, 0) == 0 && feature == 1) {
--            OPENSSL_armcap_P |= ARMV8_SHA3;
--            len = sizeof(uarch);
-+        /*
-+         * From
-+         * https://github.com/llvm/llvm-project/blob/412237dcd07e5a2afbb1767858262a5f037149a3/llvm/lib/Target/AArch64/AArch64.td#L719
-+         * all of these have been available on 64-bit Apple Silicon from the
-+         * beginning (the A7).
-+         */
-+        OPENSSL_armcap_P |= ARMV7_NEON | ARMV8_PMULL | ARMV8_AES | ARMV8_SHA1 | ARMV8_SHA256;
-+
-+        /* More recent extensions are indicated by sysctls */
-+        OPENSSL_armcap_P |= sysctl_query("hw.optional.armv8_2_sha512", ARMV8_SHA512);
-+        OPENSSL_armcap_P |= sysctl_query("hw.optional.armv8_2_sha3", ARMV8_SHA3);
-+
-+        if (OPENSSL_armcap_P & ARMV8_SHA3) {
-+            char uarch[64];
-+
-+            size_t len = sizeof(uarch);
-             if ((sysctlbyname("machdep.cpu.brand_string", uarch, &len, NULL, 0) == 0) &&
--                (strncmp(uarch, "Apple M1", 8) == 0))
-+               ((strncmp(uarch, "Apple M1", 8) == 0) ||
-+                (strncmp(uarch, "Apple M2", 8) == 0))) {
-                 OPENSSL_armcap_P |= ARMV8_UNROLL8_EOR3;
-+            }
-         }
-     }
--#   endif
--# endif
-+#  endif       /* __aarch64__ */
-+
-+# elif defined(OSSL_IMPLEMENT_GETAUXVAL)
- 
--# ifdef OSSL_IMPLEMENT_GETAUXVAL
--    if (getauxval(HWCAP) & HWCAP_NEON) {
--        unsigned long hwcap = getauxval(HWCAP_CE);
-+    if (getauxval(OSSL_HWCAP) & OSSL_HWCAP_NEON) {
-+        unsigned long hwcap = getauxval(OSSL_HWCAP_CE);
- 
-         OPENSSL_armcap_P |= ARMV7_NEON;
- 
--        if (hwcap & HWCAP_CE_AES)
-+        if (hwcap & OSSL_HWCAP_CE_AES)
-             OPENSSL_armcap_P |= ARMV8_AES;
- 
--        if (hwcap & HWCAP_CE_PMULL)
-+        if (hwcap & OSSL_HWCAP_CE_PMULL)
-             OPENSSL_armcap_P |= ARMV8_PMULL;
- 
--        if (hwcap & HWCAP_CE_SHA1)
-+        if (hwcap & OSSL_HWCAP_CE_SHA1)
-             OPENSSL_armcap_P |= ARMV8_SHA1;
- 
--        if (hwcap & HWCAP_CE_SHA256)
-+        if (hwcap & OSSL_HWCAP_CE_SHA256)
-             OPENSSL_armcap_P |= ARMV8_SHA256;
- 
- #  ifdef __aarch64__
--        if (hwcap & HWCAP_CE_SM4)
-+        if (hwcap & OSSL_HWCAP_CE_SM4)
-             OPENSSL_armcap_P |= ARMV8_SM4;
- 
--        if (hwcap & HWCAP_CE_SHA512)
-+        if (hwcap & OSSL_HWCAP_CE_SHA512)
-             OPENSSL_armcap_P |= ARMV8_SHA512;
- 
--        if (hwcap & HWCAP_CPUID)
-+        if (hwcap & OSSL_HWCAP_CPUID)
-             OPENSSL_armcap_P |= ARMV8_CPUID;
- 
--        if (hwcap & HWCAP_CE_SM3)
-+        if (hwcap & OSSL_HWCAP_CE_SM3)
-             OPENSSL_armcap_P |= ARMV8_SM3;
--        if (hwcap & HWCAP_SHA3)
-+        if (hwcap & OSSL_HWCAP_SHA3)
-             OPENSSL_armcap_P |= ARMV8_SHA3;
- #  endif
-     }
- #  ifdef __aarch64__
--        if (getauxval(HWCAP) & HWCAP_SVE)
-+        if (getauxval(OSSL_HWCAP) & OSSL_HWCAP_SVE)
-             OPENSSL_armcap_P |= ARMV8_SVE;
- 
--        if (getauxval(HWCAP2) & HWCAP2_SVE2)
-+        if (getauxval(OSSL_HWCAP2) & OSSL_HWCAP2_SVE2)
-             OPENSSL_armcap_P |= ARMV8_SVE2;
- 
--        if (getauxval(HWCAP2) & HWCAP2_RNG)
-+        if (getauxval(OSSL_HWCAP2) & OSSL_HWCAP2_RNG)
-             OPENSSL_armcap_P |= ARMV8_RNG;
- #  endif
--# endif
-+
-+# else /* !__APPLE__ && !OSSL_IMPLEMENT_GETAUXVAL */
-+
-+    /* If all else fails, do brute force SIGILL-based feature detection */
- 
-     sigfillset(&all_masked);
-     sigdelset(&all_masked, SIGILL);
-@@ -321,74 +369,42 @@ void OPENSSL_cpuid_setup(void)
-     sigprocmask(SIG_SETMASK, &ill_act.sa_mask, &oset);
-     sigaction(SIGILL, &ill_act, &ill_oact);
- 
--    /* If we used getauxval, we already have all the values */
--# ifndef OSSL_IMPLEMENT_GETAUXVAL
--    if (sigsetjmp(ill_jmp, 1) == 0) {
--        _armv7_neon_probe();
--        OPENSSL_armcap_P |= ARMV7_NEON;
--        if (sigsetjmp(ill_jmp, 1) == 0) {
--            _armv8_pmull_probe();
--            OPENSSL_armcap_P |= ARMV8_PMULL | ARMV8_AES;
--        } else if (sigsetjmp(ill_jmp, 1) == 0) {
--            _armv8_aes_probe();
--            OPENSSL_armcap_P |= ARMV8_AES;
--        }
--        if (sigsetjmp(ill_jmp, 1) == 0) {
--            _armv8_sha1_probe();
--            OPENSSL_armcap_P |= ARMV8_SHA1;
--        }
--        if (sigsetjmp(ill_jmp, 1) == 0) {
--            _armv8_sha256_probe();
--            OPENSSL_armcap_P |= ARMV8_SHA256;
--        }
--#  if defined(__aarch64__) && !defined(__APPLE__)
--        if (sigsetjmp(ill_jmp, 1) == 0) {
--            _armv8_sm4_probe();
--            OPENSSL_armcap_P |= ARMV8_SM4;
--        }
-+    OPENSSL_armcap_P |= arm_probe_for(_armv7_neon_probe, ARMV7_NEON);
- 
--        if (sigsetjmp(ill_jmp, 1) == 0) {
--            _armv8_sha512_probe();
--            OPENSSL_armcap_P |= ARMV8_SHA512;
--        }
-+    if (OPENSSL_armcap_P & ARMV7_NEON) {
- 
--        if (sigsetjmp(ill_jmp, 1) == 0) {
--            _armv8_sm3_probe();
--            OPENSSL_armcap_P |= ARMV8_SM3;
-+        OPENSSL_armcap_P |= arm_probe_for(_armv8_pmull_probe, ARMV8_PMULL | ARMV8_AES);
-+        if (!(OPENSSL_armcap_P & ARMV8_AES)) {
-+            OPENSSL_armcap_P |= arm_probe_for(_armv8_aes_probe, ARMV8_AES);
-         }
--        if (sigsetjmp(ill_jmp, 1) == 0) {
--            _armv8_eor3_probe();
--            OPENSSL_armcap_P |= ARMV8_SHA3;
--        }
--#  endif
--    }
--#  ifdef __aarch64__
--    if (sigsetjmp(ill_jmp, 1) == 0) {
--        _armv8_sve_probe();
--        OPENSSL_armcap_P |= ARMV8_SVE;
--    }
- 
--    if (sigsetjmp(ill_jmp, 1) == 0) {
--        _armv8_sve2_probe();
--        OPENSSL_armcap_P |= ARMV8_SVE2;
--    }
-+        OPENSSL_armcap_P |= arm_probe_for(_armv8_sha1_probe, ARMV8_SHA1);
-+        OPENSSL_armcap_P |= arm_probe_for(_armv8_sha256_probe, ARMV8_SHA256);
- 
--    if (sigsetjmp(ill_jmp, 1) == 0) {
--        _armv8_rng_probe();
--        OPENSSL_armcap_P |= ARMV8_RNG;
-+#  if defined(__aarch64__)
-+        OPENSSL_armcap_P |= arm_probe_for(_armv8_sm3_probe, ARMV8_SM3);
-+        OPENSSL_armcap_P |= arm_probe_for(_armv8_sm4_probe, ARMV8_SM4);
-+        OPENSSL_armcap_P |= arm_probe_for(_armv8_sha512_probe, ARMV8_SHA512);
-+        OPENSSL_armcap_P |= arm_probe_for(_armv8_eor3_probe, ARMV8_SHA3);
-+#  endif
-     }
-+#  ifdef __aarch64__
-+    OPENSSL_armcap_P |= arm_probe_for(_armv8_sve_probe, ARMV8_SVE);
-+    OPENSSL_armcap_P |= arm_probe_for(_armv8_sve2_probe, ARMV8_SVE2);
-+    OPENSSL_armcap_P |= arm_probe_for(_armv8_rng_probe, ARMV8_RNG);
- #  endif
--# endif
- 
-     /*
-      * Probing for ARMV7_TICK is known to produce unreliable results,
--     * so we will only use the feature when the user explicitly enables
--     * it with OPENSSL_armcap.
-+     * so we only use the feature when the user explicitly enables it
-+     * with OPENSSL_armcap.
-      */
- 
-     sigaction(SIGILL, &ill_oact, NULL);
-     sigprocmask(SIG_SETMASK, &oset, NULL);
- 
-+# endif /* __APPLE__, OSSL_IMPLEMENT_GETAUXVAL */
-+
- # ifdef __aarch64__
-     if (OPENSSL_armcap_P & ARMV8_CPUID)
-         OPENSSL_arm_midr = _armv8_cpuid_probe();
-@@ -404,4 +420,4 @@ void OPENSSL_cpuid_setup(void)
-         OPENSSL_armcap_P |= ARMV8_UNROLL8_EOR3;
- # endif
- }
--#endif
-+#endif /* _WIN32, __ARM_MAX_ARCH__ >= 7 */
--- 
-2.39.2 (Apple Git-143)
-