linux-modules.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Yauheni Kaliuta <yauheni.kaliuta@redhat.com>
To: "Michal Suchánek" <msuchanek@suse.de>
Cc: Lucas De Marchi <lucas.de.marchi@gmail.com>,
	linux-modules <linux-modules@vger.kernel.org>,
	Ferry van Steen <Ferry.van.Steen@citrus.nl>,
	David Howells <dhowells@redhat.com>
Subject: Re: [PATCH RFC PKCS7 asn1c 0/2] asn1c version of PKCS#7 parser
Date: Fri, 25 Jan 2019 15:40:22 +0200	[thread overview]
Message-ID: <xunyr2d097p5.fsf@redhat.com> (raw)
In-Reply-To: <20190122230703.1635f8ca@naga> ("Michal \=\?utf-8\?Q\?Such\=C3\=A1n\?\= \=\?utf-8\?Q\?ek\=22's\?\= message of "Tue, 22 Jan 2019 23:07:03 +0100")

Hi, Michal!

>>>>> On Tue, 22 Jan 2019 23:07:03 +0100, Michal Suchánek  wrote:

 > On Tue, 22 Jan 2019 12:43:45 -0800
 > Lucas De Marchi <lucas.de.marchi@gmail.com> wrote:

 >> On Tue, Jan 22, 2019 at 12:03 PM Michal Suchánek <msuchanek@suse.de>
 >> wrote:
 >> >
 >> > On Tue, 22 Jan 2019 22:01:04 +0200
 >> > Yauheni Kaliuta <yauheni.kaliuta@redhat.com> wrote:
 >> >  
 >> > > Hi!
 >> > >
 >> > > Looks like OpenSUSE took the RFC patch.
 >> > >
 >> > > The diverging doesn't sound nice, frankly speaking.  
 >> >
 >> > Is there an upstream solution?
 >> >
 >> > The diverging is caused by lack of support upstream.  
 >> 
 >> Mea culpa for not deciding with which implementation to go for the
 >> next release. We actually have 3 possible implementations: one with
 >> openssl, one with gnutls and
 >> this one lifting the implementation from the kernel to be used in
 >> userspace.

 > This is not really about lifting the kernel implementation. It is more
 > about using a parser generator to generate code that parses the
 > signature. asn1c is specialized on asn1 encoded data such as the PKCS#7
 > signature.

 >> 
 >> It would be good to know from downstream their preference to weigh in
 >> the decision.

 > I think with the size of initrd currently in openSUSE nobody will
 > notice a crypto library or two added. For other distributions 0.5M size
 > increase in ramdisk may be more noticeable.

 >  15M /boot/initrd-4.19.4-1-default
 > 1.7M /usr/lib64/libgnutls.so.30.22.0
 > 437K /usr/lib64/libssl.so.1.1

 > Between gnutls and openssl my impression is that openssl is
 > more likely to be included with other tools anyway in more
 > featureful ramdisks (ie.  kdump over ssh or live system over
 > https will need SSL). openssl is is also smaller of the two.

Fine. I've resent the openssl version. If you know anybody,
security related, for review, I would appriciate for it.

-- 
WBR,
Yauheni Kaliuta

  reply	other threads:[~2019-01-25 13:40 UTC|newest]

Thread overview: 21+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-03-08 13:58 [PATCH RFC PKCS7 asn1c 0/2] asn1c version of PKCS#7 parser Yauheni Kaliuta
2018-03-08 13:58 ` [PATCH RFC PKCS7 asn1c 1/2] libkmod-signature: implement pkcs7 parsing with asn1c compiler Yauheni Kaliuta
2018-03-08 18:14   ` [PATCH] libkmod-signature: Fix crash when module signature is not present Michal Suchanek
2018-03-12 20:41     ` Yauheni Kaliuta
2018-03-13  9:57       ` Michal Suchánek
2018-03-13 10:03         ` Yauheni Kaliuta
2018-06-08 17:10           ` [PATCH] libkmod-signature: pkcs#7: fix crash when signer info " Michal Suchanek
2018-06-11 17:12             ` Lucas De Marchi
2018-06-11 17:42               ` Michal Suchánek
2018-03-08 13:58 ` [PATCH RFC PKCS7 asn1c 2/2] libkmod, pkcs7: commit asn1c autogenerated files Yauheni Kaliuta
2018-03-12 15:45   ` Michal Suchánek
2018-03-12 15:42 ` [PATCH RFC PKCS7 asn1c 0/2] asn1c version of PKCS#7 parser Michal Suchánek
2018-03-12 20:40   ` Yauheni Kaliuta
2018-03-13  9:54     ` Michal Suchánek
2019-01-22 20:01 ` Yauheni Kaliuta
2019-01-22 20:03   ` Michal Suchánek
2019-01-22 20:34     ` Yauheni Kaliuta
2019-01-22 20:43     ` Lucas De Marchi
2019-01-22 22:07       ` Michal Suchánek
2019-01-25 13:40         ` Yauheni Kaliuta [this message]
2019-01-23  8:41       ` Yauheni Kaliuta

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=xunyr2d097p5.fsf@redhat.com \
    --to=yauheni.kaliuta@redhat.com \
    --cc=Ferry.van.Steen@citrus.nl \
    --cc=dhowells@redhat.com \
    --cc=linux-modules@vger.kernel.org \
    --cc=lucas.de.marchi@gmail.com \
    --cc=msuchanek@suse.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).