Scenario: OpenSSL in D language, pros/cons

JR via Digitalmars-d digitalmars-d at puremagic.com
Tue May 6 02:37:37 PDT 2014


On Monday, 5 May 2014 at 15:01:05 UTC, Andrei Alexandrescu wrote:
> On 5/5/14, 2:32 AM, JR wrote:
>> On Sunday, 4 May 2014 at 21:18:24 UTC, Daniele M. wrote:
>>> And then comes my next question: except for that malloc-hack, 
>>> would it
>>> have been possible to write it in @safe D? I guess that if 
>>> not,
>>> module(s) could have been made un- at safe. Not saying that a 
>>> similar
>>> separation of concerns was not possible in OpenSSL itself, 
>>> but that D
>>> could have made it less development-expensive in my opinion.
>>
>> TDPL SafeD visions notwithstanding, @safe is very very 
>> limiting.
>>
>> I/O is forbidden so simple Hello Worlds are right out, let 
>> alone
>> advanced socket libraries.
>
> Sounds like a library bug. Has it been submitted? -- Andrei

When mentioned in #d it was met with replies of "well 
*obviously*", so I chalked it up to an irreconcilability of 
@safe's. Perhaps I'm expecting too much of the subset.

My code certainly does no pointer arithmetic, but adding @safe: 
in select locations quickly shows that string operations like 
indexOf are unsafe, as is everything in concurrency (including 
thisTid), getopt, std.conv.to (to avoid casts), and all socket 
operations. All of those can throw, but I don't see how they can 
corrupt memory.

Apologies for the negativity. It's not that much of a deal, but 
your code will have to be very unreliant upon phobos to be 
completely @safe. I appreciate these threads gauging community 
reactions and I hope the mood will be lighter post-dconf, but at 
present there's still a sour taste left in my mouth after the 
final-by-default pivot.

(Manu and Thaut, please don't leave~ :<   )


More information about the Digitalmars-d mailing list