I assume you're talking about the |return_size| indirection here. I think you will see much more of them as soon as the asymmetric algorithms start to show up, as they should naturally contain get_params functionality for the numbers of the key objects. For the moment being, we aren't seeing much of that kind of functionality.
Cheers, Richard On Wed, 05 Jun 2019 02:50:07 +0200, Dr Paul Dale wrote: > > > I thought the references were to allow const arrays of OSSL_PARAM to be > viable. > > A quick check through the code reveals these in test and doc only. There are > two instances of > OSSL_PARAM arrays being declared in evp, both add the pointed to variable > after creation, both > only have two elements (the integer and the terminator) and both are stack > allocated. I.e. there > is currently is no example of the use case for which the indirection is > present :( > > Pauli > -- > Dr Paul Dale | Cryptographer | Network Security & Encryption > Phone +61 7 3031 7217 > Oracle Australia > > On 5 Jun 2019, at 10:31 am, SHANE LONTIS <shane.lon...@oracle.com> wrote: > > I presume the reference approach was used to solve the issue of who > actually owns/free's the > data. > > On 5 Jun 2019, at 9:18 am, Dr Paul Dale <paul.d...@oracle.com> wrote: > > Shane’s major complaints are about the indirection the OSSL_PARAM > structure forces ― for > integers and return lengths and the necessity of allocating > additional memory in parallel > with the OSSL_PARAM. > > The extra indirection was intended to support const arrays of > OSSL_PARAM, which turn out > to be a rarity because they aren’t thread safe. With most OSSL_PARAM > structure being > dynamically created, the need for the indirection seems redundant. > E.g. could the return > length be moved into OSSL_PARAM? I think so. > > Moving integral values into the structure is more difficult because > BIGNUMs will always > need to be references. Allocating additional memory will still be > required. I’ve got > three obvious solutions: > > 1. include a void * in the OSSL_PARAM structure that needs to be > freed when the structure > is destroyed or > 2. have a block of data in the OSSL_PARAM structure that can be used > for native types > (OSSL_UNION_ALIGN works perfectly for this) or > 3. add a flag field to the OSSL_PARAM to indicate that the referenced > value needs to be > freed. > > The memory allocation comes to the for when reading e.g. a file and > extracting data ― > either the reader needs a lot of local variables to hold everything > or it has to allocated > for each. The file’s data is transient in memory. > > For the most part, the receiver side APIs seem reasonable. It is the > owning side that has > the complications. > > I think I might be able come up with some owner side routines that > assist here but > allowing changes to the params structure would be far easier. > > I kind of like using the OSSL_PARAM arrays as a replacement for > string ctrl functions if > not ctrl as well (subject to backward compatibility concerns). > > Pauli > -- > Dr Paul Dale | Cryptographer | Network Security & Encryption > Phone +61 7 3031 7217 > Oracle Australia > > On 4 Jun 2019, at 11:26 pm, Richard Levitte <levi...@openssl.org> > wrote: > > On Tue, 04 Jun 2019 14:57:00 +0200, > Salz, Rich wrote: > > Part of the idea was that this would be a means of > communication > > between application and provider, just like controls are > with > libcrypto sub-systems. > > I can probably find the email thread (or maybe it was a GitHub > comment on my proposal for params), where you said, quite > definitively, that this was *not* a general-purpose mechanism > but > rather a way to expose the necessary internals for opaque > objects > like RSA keys. > > Either I misunderstood what you said at the time, or you > misunderstood > what I said... there's definitely a disconnect here somewhere. > > What I wonder is why it should be exclusively only one of those > options? > > Either way, the OSSL_PARAM is defined publically and openly (i.e. > non-opaque), and we currently have the following functions in the > public API: > > EVP_MD_CTX_set_params > EVP_MD_CTX_get_params > OSSL_PROVIDER_get_params > > I fully expect that more will come. I have a branch where I've > EVP_MAC_CTX_set_params, for example, and I wouldn't be surprised > if > EVP_CIPHER_CTX_set_params and EVP_CIPHER_CTX_get_params appear > before > long (I'm actually rather surprised they haven't already), and I'm > absolutely sure we will see similar functions for asymmetric > algorithms. > > What changed your mind? > > Perhaps not surprisingly, I agree with Shane's assessment and > am > strongly opposed to the project foisting this on everyone at > this > time. @DavidBen, your thoughts? > > Maybe we're reading differently, I didn't see Shane being opposed > to > parameter passing in this way per se, just the exact form of the > OSSL_PARAM structure, which is different. > > Cheers, > Richard > > -- > Richard Levitte levi...@openssl.org > OpenSSL Project http://www.openssl.org/~levitte/ > > -- Richard Levitte levi...@openssl.org OpenSSL Project http://www.openssl.org/~levitte/