From: Yauheni Kaliuta <yauheni.kaliuta@redhat.com>
To: "Michal Suchánek" <msuchanek@suse.de>
Cc: Lucas De Marchi <lucas.de.marchi@gmail.com>,
linux-modules <linux-modules@vger.kernel.org>,
Ferry van Steen <Ferry.van.Steen@citrus.nl>,
David Howells <dhowells@redhat.com>
Subject: Re: [PATCH RFC PKCS7 asn1c 0/2] asn1c version of PKCS#7 parser
Date: Fri, 25 Jan 2019 15:40:22 +0200 [thread overview]
Message-ID: <xunyr2d097p5.fsf@redhat.com> (raw)
In-Reply-To: <20190122230703.1635f8ca@naga> ("Michal \=\?utf-8\?Q\?Such\=C3\=A1n\?\= \=\?utf-8\?Q\?ek\=22's\?\= message of "Tue, 22 Jan 2019 23:07:03 +0100")
Hi, Michal!
>>>>> On Tue, 22 Jan 2019 23:07:03 +0100, Michal Suchánek wrote:
> On Tue, 22 Jan 2019 12:43:45 -0800
> Lucas De Marchi <lucas.de.marchi@gmail.com> wrote:
>> On Tue, Jan 22, 2019 at 12:03 PM Michal Suchánek <msuchanek@suse.de>
>> wrote:
>> >
>> > On Tue, 22 Jan 2019 22:01:04 +0200
>> > Yauheni Kaliuta <yauheni.kaliuta@redhat.com> wrote:
>> >
>> > > Hi!
>> > >
>> > > Looks like OpenSUSE took the RFC patch.
>> > >
>> > > The diverging doesn't sound nice, frankly speaking.
>> >
>> > Is there an upstream solution?
>> >
>> > The diverging is caused by lack of support upstream.
>>
>> Mea culpa for not deciding with which implementation to go for the
>> next release. We actually have 3 possible implementations: one with
>> openssl, one with gnutls and
>> this one lifting the implementation from the kernel to be used in
>> userspace.
> This is not really about lifting the kernel implementation. It is more
> about using a parser generator to generate code that parses the
> signature. asn1c is specialized on asn1 encoded data such as the PKCS#7
> signature.
>>
>> It would be good to know from downstream their preference to weigh in
>> the decision.
> I think with the size of initrd currently in openSUSE nobody will
> notice a crypto library or two added. For other distributions 0.5M size
> increase in ramdisk may be more noticeable.
> 15M /boot/initrd-4.19.4-1-default
> 1.7M /usr/lib64/libgnutls.so.30.22.0
> 437K /usr/lib64/libssl.so.1.1
> Between gnutls and openssl my impression is that openssl is
> more likely to be included with other tools anyway in more
> featureful ramdisks (ie. kdump over ssh or live system over
> https will need SSL). openssl is is also smaller of the two.
Fine. I've resent the openssl version. If you know anybody,
security related, for review, I would appriciate for it.
--
WBR,
Yauheni Kaliuta
next prev parent reply other threads:[~2019-01-25 13:40 UTC|newest]
Thread overview: 21+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-03-08 13:58 [PATCH RFC PKCS7 asn1c 0/2] asn1c version of PKCS#7 parser Yauheni Kaliuta
2018-03-08 13:58 ` [PATCH RFC PKCS7 asn1c 1/2] libkmod-signature: implement pkcs7 parsing with asn1c compiler Yauheni Kaliuta
2018-03-08 18:14 ` [PATCH] libkmod-signature: Fix crash when module signature is not present Michal Suchanek
2018-03-12 20:41 ` Yauheni Kaliuta
2018-03-13 9:57 ` Michal Suchánek
2018-03-13 10:03 ` Yauheni Kaliuta
2018-06-08 17:10 ` [PATCH] libkmod-signature: pkcs#7: fix crash when signer info " Michal Suchanek
2018-06-11 17:12 ` Lucas De Marchi
2018-06-11 17:42 ` Michal Suchánek
2018-03-08 13:58 ` [PATCH RFC PKCS7 asn1c 2/2] libkmod, pkcs7: commit asn1c autogenerated files Yauheni Kaliuta
2018-03-12 15:45 ` Michal Suchánek
2018-03-12 15:42 ` [PATCH RFC PKCS7 asn1c 0/2] asn1c version of PKCS#7 parser Michal Suchánek
2018-03-12 20:40 ` Yauheni Kaliuta
2018-03-13 9:54 ` Michal Suchánek
2019-01-22 20:01 ` Yauheni Kaliuta
2019-01-22 20:03 ` Michal Suchánek
2019-01-22 20:34 ` Yauheni Kaliuta
2019-01-22 20:43 ` Lucas De Marchi
2019-01-22 22:07 ` Michal Suchánek
2019-01-25 13:40 ` Yauheni Kaliuta [this message]
2019-01-23 8:41 ` Yauheni Kaliuta
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=xunyr2d097p5.fsf@redhat.com \
--to=yauheni.kaliuta@redhat.com \
--cc=Ferry.van.Steen@citrus.nl \
--cc=dhowells@redhat.com \
--cc=linux-modules@vger.kernel.org \
--cc=lucas.de.marchi@gmail.com \
--cc=msuchanek@suse.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).