Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Conversation

vcsjones
Copy link
Member

@vcsjones vcsjones commented Mar 1, 2024

In some cryptographic primitives, we used the POH to pin arrays so that the underlying key material would not get moved around by the GC, which would allow for more effective zeroing of key material.

Based on feedback in #97447, this pattern turned out to be undesirable. This replaces the uses of the POH with native memory.

@ghost ghost added the area-System.Security label Mar 1, 2024
@ghost ghost assigned vcsjones Mar 1, 2024
@ghost
Copy link

ghost commented Mar 1, 2024

Tagging subscribers to this area: @dotnet/area-system-security, @bartonjs, @vcsjones
See info in area-owners.md if you want to be subscribed.

Issue Details

In some cryptographic primitives, we used the POH to pin arrays so that the underlying key material would not get moved around by the GC, which would allow for more effective zeroing of key material.

Based on feedback in #97447, this pattern turned out to be undesirable. This replaces the uses of the POH with native memory.

Author: vcsjones
Assignees: vcsjones
Labels:

area-System.Security

Milestone: -

@vcsjones vcsjones merged commit 8688afa into dotnet:main Mar 5, 2024
@vcsjones vcsjones deleted the no-poh branch March 5, 2024 17:16
@vcsjones vcsjones added this to the 9.0.0 milestone Mar 7, 2024
@github-actions github-actions bot locked and limited conversation to collaborators Apr 7, 2024
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants