On Sat, Nov 14, 2015 at 07:32:33AM +0000, Peter Waltenberg wrote:

>    I also can't see any point expunging old algorithms from the sources,
>    making them not build by default should be enough.

It is difficult enough to maintain code that is typically built,
dead code is even harder to keep correct.  And what are distributions
of the library to do?  Break a lot of customer code by shipping
with the algorithms disabled?  Or re-enable compilation?

>    The only thing I would suggest is dropping assembler support for
>    anything that's been retired, just to cut the maintenance effort / risk
>    of breakage. If it's legacy only, performance shouldn't be an issue.

That probably makes more sense.  Drop associated SSL/TLS ciphersuite
codepoints and drop assembly support (if any).  Leave the C
implementation in libcrypto to support legacy "data at rest"
applications.

The proposed list was:

    CAST
    IDEA
    MDC2
    MD2 [ already disabled by default ]
    RC5 [ already disabled by default ]
    RIPEMD
    SEED
    WHIRLPOOL
    ALL BINARY ELLIPTIC CURVES

If I were to guess, it would be that the base crypto implementations
of IDEA, SEED and binary elliptic curves need to stay.  We could
perhaps get away with removing CAST and RIPEMD.  No idea about the
rest.

-- 
        Viktor.
_______________________________________________
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Reply via email to