Discussion:
[openssl-dev] [openssl.org #4590] accessors without const return arguments
(too old to reply)
Roumen Petrov via RT
2016-06-25 22:09:59 UTC
Permalink
Hello,

Recently declaration of a number of get0 methods was changed to return
constant values (BIGNUM).

Lets me quote description of an allocator "/ECDSA_SIG_new()/ allocates a
new *ECDSA_SIG* structure (note: this function also allocates the
BIGNUMs) and initialize it."

Now lets try to write deserialization of a ECDSA signature. With set
method allocated and never user ECDSA members r and s has to be freed
and replaced by new one. As result extra allocation of big numbers
impact performance and increase memory usage.

Above is reason the request to remove const from return argument of get0
methods.

The issue is not only for ECDSA but also for DSA_SIG and RSA, DSA, DH
keys where situation is similar.


Regards,
Roumen Petrov
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4590
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Stephen Henson via RT
2016-07-22 14:09:12 UTC
Permalink
Post by Roumen Petrov via RT
Above is reason the request to remove const from return argument of get0
methods.
We had a discussion about this and the preference was to have get methods
retain const for various reasons.

Instead the DSA_SIG/ECDSA_SIG structures now no longer pre-allocate r/s so they
aren't immediately freed when you set them.
Post by Roumen Petrov via RT
The issue is not only for ECDSA but also for DSA_SIG and RSA, DSA, DH
keys where situation is similar.
Do you have some examples of how this affects other structures? For RSA/DSA/DH
keys the fields are NULL initially unless I've missed something.

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4590
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Stephen Henson via RT
2016-08-01 17:31:36 UTC
Permalink
This has addressed the original issue. If there are any cases for DH/DSA/RSA
you feel need addressing please give details in a new ticket.

Steve.;
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4590
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Roumen Petrov via RT
2016-08-03 21:13:08 UTC
Permalink
This post might be inappropriate. Click to display it.
Loading...