[PATCH]crypto/Kconfig update broken web addresses.

2010-09-06 Thread Justin P. Mattock
Below is a patch to update the broken web addresses, in crypto/* that I could locate. Some are just simple typos that needed to be fixed, and some had a change in location altogether.. let me know if any of them need to be changed and such. Signed-off-by: Justin P. Mattock --- crypto/Kconfig |

Re: [PATCH 01/19] User-space API definition

2010-09-06 Thread Kyle Moffett
On Mon, Sep 6, 2010 at 17:11, Nikos Mavrogiannopoulos wrote: > I suppose you mean the reference to the internal representation of the > key. This might be valid for few seconds until the required operation is > over. > > This is not really what I would call storage. The storage and retrieval > of

Re: crypto_xor

2010-09-06 Thread Herbert Xu
Nikos Mavrogiannopoulos wrote: > Hello, > I was checking the crypto_xor() function and it is for some reason > limited to 32 bit integers. Why not make it depend on the architecture > by replacing the u32 with unsigned long? That way 64bit machines should > perform xor with less instructions... W

Re: [PATCH 01/19] User-space API definition

2010-09-06 Thread Miloslav Trmac
- "Kyle Moffett" wrote: > On Mon, Sep 6, 2010 at 11:50, Miloslav Trmac wrote: > > - "Herbert Xu" wrote: > >> On Mon, Aug 23, 2010 at 11:37:40AM -0400, Miloslav Trmac wrote: > >> > I have seriously considered the keyring API, and this is what I > came > >> up with - but I'd love to be sho

Re: [PATCH 01/19] User-space API definition

2010-09-06 Thread Nikos Mavrogiannopoulos
On 09/06/2010 10:42 PM, Kyle Moffett wrote: >>> The problem with the approach you're proposing is that we then have >>> two entirely separate classes of keys. First we have the existing >>> keyring class, which can be securely and revokably passed between >>> different processes with limited righ

Re: [PATCH 01/19] User-space API definition

2010-09-06 Thread Kyle Moffett
On Mon, Sep 6, 2010 at 15:13, Nikos Mavrogiannopoulos wrote: > On 09/06/2010 08:00 PM, Kyle Moffett wrote: >>> The kernel keyring service is basically a system-wide data storage >>> service.  /dev/crypto needs a quick way to refer to short-lived, >>> usually process-local, kernel-space data struct

Re: [PATCH 01/19] User-space API definition

2010-09-06 Thread Nikos Mavrogiannopoulos
On 09/06/2010 08:00 PM, Kyle Moffett wrote: >> The kernel keyring service is basically a system-wide data storage >> service. /dev/crypto needs a quick way to refer to short-lived, >> usually process-local, kernel-space data structures from >> userspace. > The problem with the approach you're pro

Re: [PATCH 01/19] User-space API definition

2010-09-06 Thread Kyle Moffett
On Mon, Sep 6, 2010 at 11:50, Miloslav Trmac wrote: > - "Herbert Xu" wrote: >> On Mon, Aug 23, 2010 at 11:37:40AM -0400, Miloslav Trmac wrote: >> > I have seriously considered the keyring API, and this is what I came >> up with - but I'd love to be shown a better way. >> >> FWIW adding a seco

Re: [PATCH 01/19] User-space API definition

2010-09-06 Thread Miloslav Trmac
- "Herbert Xu" wrote: > On Mon, Aug 23, 2010 at 11:37:40AM -0400, Miloslav Trmac wrote: > > > > I can see almost no overlap between the two sets of requirements. > Probably the only common use case is handling session keys (e.g. keys > used in a kerberos ticket), which should be stored in the

[no subject]

2010-09-06 Thread Jan Chadima
help -- JFCh -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH 01/19] User-space API definition

2010-09-06 Thread Nikos Mavrogiannopoulos
On 09/06/2010 02:17 PM, Herbert Xu wrote: > On Mon, Aug 23, 2010 at 11:37:40AM -0400, Miloslav Trmac wrote: >> >> I can see almost no overlap between the two sets of requirements. Probably >> the only common use case is handling session keys (e.g. keys used in a >> kerberos ticket), which should

Re: [PATCH 01/19] User-space API definition

2010-09-06 Thread Herbert Xu
On Mon, Aug 23, 2010 at 11:37:40AM -0400, Miloslav Trmac wrote: > > I can see almost no overlap between the two sets of requirements. Probably > the only common use case is handling session keys (e.g. keys used in a > kerberos ticket), which should be stored in the kernel for the duration of >