[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1885267.SGBklDhT9E@myon.chronox.de>
Date: Wed, 28 Oct 2015 00:47:53 +0100
From: Stephan Mueller <smueller@...onox.de>
To: David Woodhouse <dwmw2@...radead.org>
Cc: Marcel Holtmann <marcel@...tmann.org>,
Herbert Xu <herbert@...dor.apana.org.au>,
linux-crypto@...r.kernel.org,
linux-kernel <linux-kernel@...r.kernel.org>,
linux-api@...r.kernel.org, David Howells <dhowells@...hat.com>
Subject: Re: [PATCH v2 0/5] crypto: add algif_akcipher user space API
Am Mittwoch, 28. Oktober 2015, 08:43:16 schrieb David Woodhouse:
Hi David,
> > Albeit that all sounds like the crown jewel, how do you propose that shall
> > happen?
> >
> > Assume that you have a web server that has a pub and priv key in its
> > current configuration -- I guess that is the vast majority of configs.
> >
> > Can you please elaborate how the process for such a web server shall
> > really
> > work?
>
> 1. Create a kernel-side key.
> 2. Use it.
>
> That may require adding an API similar to the one you're proposing, but
> working with kernel keys instead of directly with akcipher. Or perhaps
> the key subsystem can already offer what you need in userspace. David?
Ohh, I see. So, you are saying that there should not be a setpub/privkey for
the akcipher AF_ALG interface?!
If somebody wants to use akcipher, he shall set the key via the keyring and
akcipher shall obtain it from the keyring?
However, for the actual data shoveling, AF_ALG should still be used?
--
Ciao
Stephan
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists