libsrtp icon indicating copy to clipboard operation
libsrtp copied to clipboard

Consider setting openssl as default crypto backend

Open pabuhler opened this issue 3 years ago • 2 comments

This is a follow on from PR #574 where @traud suggested better documentation on what is the default.

What about adding a statement that either crypto library is used but none is leveraged on default. Some downstream maintainers like those on Debian, for example, did no enable OpenSSL for years. And now offer just NSS.

My take on this is that it would be better to enabled openssl by default and let NSS and internal be alternatives.

pabuhler avatar Oct 27 '21 07:10 pabuhler

enable openssl by default

The pro would be that more people benefit from AES-NI (and the library comes with the AES-GCM symbols then). The con would be that the user has to change its build system because a crypto engine gets a new, additionally requirement. The alternative for the con would be that the script configure detects/enables one of the crypto engines automatically. However, that would lower the pro, because still some people would miss that they would benefit from a crypto engine.

What about: The script ./configure picks one crypto engine and bails when none is installed. The user then is told and forced to explicitly override with a ./configure --disable-external-crypto-engine for example.

By the way, what about the recent addition of mbed TLS. Was that added to ./configure?

traud avatar Oct 27 '21 12:10 traud

By the way, what about the recent addition of mbed TLS. Was that added to ./configure?

that was not added by the mbed TLS contributor and we have not prioritized adding it to configure. I would hope if some one needs it they will make a PR.

pabuhler avatar Oct 27 '21 19:10 pabuhler