public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* Re: RSA [patch #1]
       [not found] <14892.1087920395@redhat.com>
@ 2004-06-22 16:43 ` James Morris
  2004-06-22 16:57   ` David Howells
  0 siblings, 1 reply; 4+ messages in thread
From: James Morris @ 2004-06-22 16:43 UTC (permalink / raw)
  To: David Howells; +Cc: Joy Latten, kartik_me, linux-kernel, serue, arjanv, jamesm

On Tue, 22 Jun 2004, David Howells wrote:

>  (3) A DSA signature checker.
> 
> In patch #3, ksign-publickey.c contains a keyring containing some public
> keys. These are listed during boot:
> 
> 	ksign: Installing public key data
> 	Loading keyring
> 	- Added public key 5B23D93E238D57CC
> 	- User ID: David W Howells (hello) <dhowells@redhat.com>
> 	- Added public key 8491D58C6C10A25E
> 	- User ID: David Howells (dwh's signature) <dhowells@redhat.com>

I think the way to manage keyrings is via a filesystem API, which 
different asymmetric crypto apps can register with.


- James
-- 
James Morris
<jmorris@redhat.com>





^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: RSA [patch #1]
  2004-06-22 16:43 ` RSA [patch #1] James Morris
@ 2004-06-22 16:57   ` David Howells
  2004-06-22 18:08     ` James Morris
  0 siblings, 1 reply; 4+ messages in thread
From: David Howells @ 2004-06-22 16:57 UTC (permalink / raw)
  To: James Morris; +Cc: Joy Latten, kartik_me, linux-kernel, serue, arjanv


> I think the way to manage keyrings is via a filesystem API, which 
> different asymmetric crypto apps can register with.

I'm not sure what you're thinking of exactly. Can you elaborate?

David

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: RSA [patch #1]
  2004-06-22 16:57   ` David Howells
@ 2004-06-22 18:08     ` James Morris
  2004-06-23 23:49       ` Kyle Moffett
  0 siblings, 1 reply; 4+ messages in thread
From: James Morris @ 2004-06-22 18:08 UTC (permalink / raw)
  To: David Howells; +Cc: Joy Latten, kartik_me, linux-kernel, serue, arjanv

On Tue, 22 Jun 2004, David Howells wrote:

> 
> > I think the way to manage keyrings is via a filesystem API, which 
> > different asymmetric crypto apps can register with.
> 
> I'm not sure what you're thinking of exactly. Can you elaborate?

Different kernel asymmetric crypto apps (e.g. module signature checker)  
will need to be able to manage independent keyrings, and a common
filesystem API would be useful for this.  e.g. during startup, some init 
script loads keyrings into the kernel via /proc/crypto/keyring/app/addkey


- James
-- 
James Morris
<jmorris@redhat.com>



^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: RSA [patch #1]
  2004-06-22 18:08     ` James Morris
@ 2004-06-23 23:49       ` Kyle Moffett
  0 siblings, 0 replies; 4+ messages in thread
From: Kyle Moffett @ 2004-06-23 23:49 UTC (permalink / raw)
  To: James Morris
  Cc: linux-kernel, serue, Joy Latten, kartik_me, David Howells, arjanv

On Jun 22, 2004, at 14:08, James Morris wrote:
> Different kernel asymmetric crypto apps (e.g. module signature checker)
> will need to be able to manage independent keyrings, and a common
> filesystem API would be useful for this.  e.g. during startup, some 
> init
> script loads keyrings into the kernel via 
> /proc/crypto/keyring/app/addkey

This is actually somewhat along the line that David Howells and I have
been working on; getting a key-ring system into the kernel.  We can
probably have a patch implementing the API we're working on in alpha
sometime in a couple weeks. This isn't really something that's useful to
the cryptoapi itself, but it could be used to debug new cryptoapi
functions.  In addition, cryptoapi will be very useful to the key-ring
system, if one is ever made.

Cheers,
Kyle Moffett



^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2004-06-23 23:49 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
     [not found] <14892.1087920395@redhat.com>
2004-06-22 16:43 ` RSA [patch #1] James Morris
2004-06-22 16:57   ` David Howells
2004-06-22 18:08     ` James Morris
2004-06-23 23:49       ` Kyle Moffett

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox