On Wed, Oct 1, 2014 at 9:40 AM, Andy Polyakov via RT <r...@openssl.org> wrote:
> If you can present
> coherent argument and consensus is reached, then it would have to be
> implemented universally, not only in aesni-x86_64 module.

So, hopefully my cross-posted message convinced you. To summarize the
argument briefly:

- Library users may be performing a mix of private cryptographic
operations and operations controlled by untrusted code.
- A large "API" may be exposed to the untrusted code.
- It's easier to sanitize secrets from memory and registers when we
know they contain secrets than it is to ensure that *no* other
functions may leak register contents to untrusted code.
- The cost is negligible. (And it's lower for us than library clients:
They have no way of knowing what registers have been used, so they
would need to do the equivalent of OPENSSL_wipe_cpu.)

The reasons for targeting AES-NI first: I was working on another patch
(not yet submitted) to that file.

The reason for doing this one-file-at-a-time: A single huge patch
would likely see little meaningful review (reviewing assembler is
fairly tiring even at the scope of a single file).


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to