On 24 January 2016 at 13:08, Jakub Zelenka <bu...@php.net> wrote:

> Hi,
>
> On 23 Jan 2016 21:01, "Marco Pivetta" <ocram...@gmail.com> wrote:
> >
> > Just FYI, I'm voting against this proposal, as the number of parameters
> is simply growing out of control, which involves:
> >  - more BC breaks if default parameters change
>
> What bc breaks? There are no defaults except tag length and that will
> never change for the curent cipher algs.
>

The BC breaks may happen in future, given the number of added parameters.
You even designed your additional parameters to avoid BC breaks: what will
happen next time someone needs additional functionality?

> >  - more security issues if the defaults are unsafe (or become unsafe,
> for whatever reason)
>
> the current value (16) is effective maximum for the currently supported
> AEAD cipher algs and it cannot change.
>
"current" was used two times in this sentence: that's exactly my fear

> I'm not sure what your idea about AEAD function is
>
I actually have little to no knowledge on it: I'm voting purely on the
proposed interface changes, which are objectively a bad approach to adding
functionality to an existing API.

> but if you mean an adding of a new function with the proposed signature,
> then you would still have the same number of arguments
>
I am aware that AEAD applies (additionally) to all the previous parameters:
can't use it without them. Having a separate function that just provides
the AEAD functionality is still much better.

> and the same defaults. It would just be a new function that would work
> only for selected cipher algs. It wouldn't address any of your concerns and
> would just duplicate things.
>
It would reduce the extent of BC breaks, as you won't need to notify
everybody using `openssl_encrypt`, but just those that use
`openssl_encrypt_aead`. Also, you'd be able to make the parameters
mandatory, which makes the proposed signature addition [, string &$tag =
NULL [, string $aad = "" [, int $tag_length = 16 ]]]] much less confusing.
You may even just create a `new AEADFlags()` struct to make the hinting
more clear and flexible, so that optional params aren't a problem anymore,
but that would simply anger who still thinks procedural programming is a
maintainable solution.

> If you mean some fancy context related set of functions, then it would
> require some special handling and much more work. It would add to the
> maintenance effort as well. As I said before I have a crypto pecl extension
> that does exactly that. Personaly I think that such decision would probably
> mean that we won't have AEAD support in openssl ext for quite a long time
> as it won't be done anytime soon.
>
No, I just really mean following:

`openssl_encrypt_aead(string $data , string $method , string $password,
AEADFlags $flags, [, int $options = 0 [, string $iv = "" ]] )`

Much simpler:

 * the AEAD flags are required, less error prone (you can't pass in wrong
flags unless you subclassed)
 * the AEAD flags encapsulate the default values, which means that the BC
breaks are easier to document, and easier to "fix" in userland (simply
provide a custom AEADFlags instance, with the old params)
 * the API wasn't butchered just to keep BC with `openssl_encrypt`

> That being said I know that the current proposal is not the nicest but I
> think it fits to the current openssl ext API which is not the nicest either.
>
This is indeed an adapter: if OpenSSL sucks, then don't jump off the bridge
as well ;-)
Adapters are not nice code, but the consumer side should at least be nicer
than the provider side.

> I think that the main thing is that it adds the AEAD support and the users
> could finally use it with just openssl ext.
>
Again: this is really just about the proposed API, not about the
functionality itself. AEAD is very welcome, but the proposed API is just
not a good solution to adding functionality.

Cheers,

Marco Pivetta

http://twitter.com/Ocramius

http://ocramius.github.com/

Reply via email to