All of lore.kernel.org
 help / color / mirror / Atom feed
From: Tadeusz Struk <tadeusz.struk@intel.com>
To: Marcel Holtmann <marcel@holtmann.org>
Cc: David Howells <dhowells@redhat.com>,
	Stephan Mueller <smueller@chronox.de>,
	linux-crypto@vger.kernel.org
Subject: Re: Limited usefulness of RSA set key function
Date: Mon, 03 Aug 2015 11:32:41 -0700	[thread overview]
Message-ID: <55BFB3C9.7060407@intel.com> (raw)
In-Reply-To: <C0C27417-4970-48AF-A115-0C83DC000EBE@holtmann.org>

On 08/03/2015 11:20 AM, Marcel Holtmann wrote:
> actually I think this reasoning needs to be revisited. When I look at this, this makes no sense whatsoever. The end result is that we have keys in multiple formats in the kernel and have to convert between them or parse them again.
> 
> If you do not want to use struct public_key, then lets go for struct key as I proposed in my other response. That should in the end be able to represent hardware keys as well. There is really no good reason to move things around and parse them again or create new formats out of it.
> 
> My take is that we want to store a key once in a single location and single location only. Storing the same key in different formats in different locations is just a plain bad idea. Keep it secure and locked in one place.
> 

The approach was not to use any of the existing public key stuff.
To be consistent with all the other crypto API tfm needs to "own" the key.
The existing struct key is not controlled by the tfm and the key can be gone without tfm knowing.
We can change this approach, but this is not my call, but Herbert's.
Herbert, any comments?

> I hope someone is looking at lib/digsig.c as well and gets this all cleaned up into a single implementation. However for this to happen, we really need to get this key stuff figured out. Right now this looks to me like the left hand does not know what the right hand is doing.

Yes, your are right, but crypto/public_key/rsa.c and lib/digsig.c have been added long before akcipher.
Now we are trying to get all this fixed, but we need to have stable API before any of it will be converted.
Thanks,
T
 

  reply	other threads:[~2015-08-03 18:33 UTC|newest]

Thread overview: 11+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-08-03  4:16 Limited usefulness of RSA set key function Marcel Holtmann
2015-08-03  6:45 ` Stephan Mueller
2015-08-03  7:14   ` Marcel Holtmann
2015-08-03  7:18     ` Stephan Mueller
2015-08-03  7:30       ` Marcel Holtmann
2015-08-03 17:11         ` Tadeusz Struk
2015-08-03 17:39           ` Marcel Holtmann
2015-08-03 17:52             ` Tadeusz Struk
2015-08-03 18:20               ` Marcel Holtmann
2015-08-03 18:32                 ` Tadeusz Struk [this message]
2015-08-03 18:11             ` Marcel Holtmann

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=55BFB3C9.7060407@intel.com \
    --to=tadeusz.struk@intel.com \
    --cc=dhowells@redhat.com \
    --cc=linux-crypto@vger.kernel.org \
    --cc=marcel@holtmann.org \
    --cc=smueller@chronox.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.