Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Roadmap for 1.0 release #205

Open
14 of 17 tasks
hannesm opened this issue Feb 26, 2024 · 4 comments
Open
14 of 17 tasks

Roadmap for 1.0 release #205

hannesm opened this issue Feb 26, 2024 · 4 comments
Labels
enhancement New feature or request performance (potential) performance improvements

Comments

@hannesm
Copy link
Member

hannesm commented Feb 26, 2024

The next release will break the API, and be a 1.0. Notably:

If you've further comments or are keen to retain the old API, please comment in this issue. The 0.x series will be unsupported at the point when 1.0 is released.

@hannesm hannesm added enhancement New feature or request performance (potential) performance improvements labels Feb 26, 2024
@hannesm
Copy link
Member Author

hannesm commented Feb 28, 2024

We may want to think and address the "storing secret keys in memory (with a GC around)", as raised in https://discuss.ocaml.org/t/ann-mirage-crypto-0-11-3-with-more-speed-for-elliptic-curves-and-the-future-roadmap-of-mirage-crypto/14200/7 (e.g. rust has https://github.com/cesarb/clear_on_drop)

@Firobe
Copy link
Member

Firobe commented Feb 29, 2024

Not a breaking change: I'd like to finish the work on NIST curves scalar multiplication for the non-base case, to improve performance a bit more for key generation in particular (which won't be pre-computed)

@Firobe
Copy link
Member

Firobe commented Feb 29, 2024

Also, would 1.0 be the right time to discuss if we keep maintaining 32-bit support? Not to drop it for 1.0, but at least begin surveying potential users and announcing deprecation if we decide so

@hannesm
Copy link
Member Author

hannesm commented Feb 29, 2024

I think the 32 bit support is to discuss for a 1.0, but I'm unsure whether it is worth dropping (esp. nowadays that we have CI machines (arm32, x86_32), and not too much trouble with 32 bit (or is there lots of trouble?)

In respect to mirage-crypto-ec, since cl.exe/dkml seem to use the 32 bit code paths (since 128bit integers aren't available), I assume removing 32 bit support wouldn't clean that up!?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request performance (potential) performance improvements
Projects
None yet
Development

No branches or pull requests

2 participants