[tor-bugs] #5406 [Tor Relay]: Use EVP_aes_128_ctr() on OpenSSL >= 1.0.1

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Fri Mar 16 15:50:42 UTC 2012


#5406: Use EVP_aes_128_ctr() on OpenSSL >= 1.0.1
-------------------------+--------------------------------------------------
 Reporter:  nickm        |          Owner:                    
     Type:  enhancement  |         Status:  new               
 Priority:  normal       |      Milestone:  Tor: 0.2.3.x-final
Component:  Tor Relay    |        Version:                    
 Keywords:               |         Parent:                    
   Points:               |   Actualpoints:                    
-------------------------+--------------------------------------------------
 Starting with OpenSSL 1.0.1, there is an EVP value to provide counter-mode
 AES. We definitely want to be using this one for our counter mode
 implementation in aes.c, since it appears to automatically use the best
 available AES implementation, including tricky ones that use
 AESNI/bitsliced/vectorized implementations.

 Bitsliced and vectorized implementations of counter mode are not only
 faster than the straightforward assembly versions, but also run in
 constant-time.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5406>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list