- Notifications
You must be signed in to change notification settings - Fork5.1k
Remove use of POH for cryptographic primitives#99168
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.
Already on GitHub?Sign in to your account
Uh oh!
There was an error while loading.Please reload this page.
Conversation
ghost commentedMar 1, 2024
Tagging subscribers to this area: @dotnet/area-system-security,@bartonjs,@vcsjones Issue DetailsIn some cryptographic primitives, we used the POH to pin arrays so that the underlying key material would not get moved around by the GC, which would allow for more effective zeroing of key material. Based on feedback in#97447, this pattern turned out to be undesirable. This replaces the uses of the POH with native memory.
|
In some cryptographic primitives, we used the POH to pin arrays so that the underlying key material would not get moved around by the GC, which would allow for more effective zeroing of key material.
Based on feedback in#97447, this pattern turned out to be undesirable. This replaces the uses of the POH with native memory.