Hi Tadeusz,
>>> In this way we can define a generic user side of the key exchange interface,
and on the the driver side of the akcipher, the implementations would
overload
the existing akcipher encrypt(), decrypt(), set_pub_key(), set_priv_key()
methods
and do what shoul
Hi Marcel,
On 03/07/2016 02:29 PM, Marcel Holtmann wrote:
>> In this way we can define a generic user side of the key exchange interface,
>> > and on the the driver side of the akcipher, the implementations would
>> > overload
>> > the existing akcipher encrypt(), decrypt(), set_pub_key(), set_pri
Hi Tadeusz,
>> And I have the feeling that akcipher is not the best approach for adding a
>> key exchange method. I think we need a new method for doing exactly that. At
>> the base of it, the key exchange is fundamentally different.
>
> It is unfortunate that, unlike the symmetric ciphers, not
Hi Marcel,
On 03/02/2016 05:46 AM, Marcel Holtmann wrote:
> And I have the feeling that akcipher is not the best approach for adding a
> key exchange method. I think we need a new method for doing exactly that. At
> the base of it, the key exchange is fundamentally different.
It is unfortunate t
Am Mittwoch, 2. März 2016, 06:54:21 schrieb Marcel Holtmann:
Hi Marcel,
>
> and why is this not an userspace policy decision on what minimum it allows?
> Why are we discussing this in the context of the kernel in the first place?
> The kernel should just expose the support for it.
You are right
Hi Stephan,
>>> +static int dh_check_params_length(unsigned int p_len)
>>> +{
>>> + switch (p_len) {
>>> + case 768:
>>> + case 1024:
>>> + case 1536:
>>> + case 2048:
>>> + case 3072:
>>> + case 4096:
>>> +
Am Mittwoch, 2. März 2016, 08:03:44 schrieb Sandy Harris:
Hi Sandy,
> Salvatore Benedetto wrote:
> >> > > > +static int dh_check_params_length(unsigned int p_len)
> >> > > > +{
> >> > > > + switch (p_len) {
> >> > > > + case 768:
> >> > > > + case 1024:
> >> > > > + case
Hi Salvatore,
>>> Implement Diffie-Hellman primitives required by the scheme under the
>>> akcipher API. Here is how it works.
>>> 1) Call set_pub_key() by passing DH parameters (p,g) in PKCS3 format
>>> 2) Call set_priv_key() to set your own private key (xa) in raw format
>>
>> this combination
Salvatore Benedetto wrote:
>> > > > +static int dh_check_params_length(unsigned int p_len)
>> > > > +{
>> > > > + switch (p_len) {
>> > > > + case 768:
>> > > > + case 1024:
>> > > > + case 1536:
>> > > > + case 2048:
>> > > > + case 3072:
>> > > > + case
On Tue, Mar 01, 2016 at 12:17:15PM +0100, Stephan Mueller wrote:
Hi Stephan,
> Am Dienstag, 1. März 2016, 11:08:34 schrieb Salvatore Benedetto:
>
> Hi Salvatore,
>
> > > > +static int dh_check_params_length(unsigned int p_len)
> > > > +{
> > > > + switch (p_len) {
> > > > + case 768
On Tue, Mar 01, 2016 at 12:25:33PM -0800, Marcel Holtmann wrote:
Hi Marcel,
> Hi Salvatore,
>
> > Implement Diffie-Hellman primitives required by the scheme under the
> > akcipher API. Here is how it works.
> > 1) Call set_pub_key() by passing DH parameters (p,g) in PKCS3 format
> > 2) Call set_
Hi Salvatore,
> Implement Diffie-Hellman primitives required by the scheme under the
> akcipher API. Here is how it works.
> 1) Call set_pub_key() by passing DH parameters (p,g) in PKCS3 format
> 2) Call set_priv_key() to set your own private key (xa) in raw format
this combination seems odd sinc
Am Dienstag, 1. März 2016, 11:08:34 schrieb Salvatore Benedetto:
Hi Salvatore,
> > > +static int dh_check_params_length(unsigned int p_len)
> > > +{
> > > + switch (p_len) {
> > > + case 768:
> > > + case 1024:
> > > + case 1536:
> > > + case 2048:
> > > + case 3072:
> > > + case 4096:
> > > +
Hi Stephan,
thanks for reviewing.
On Mon, Feb 15, 2016 at 02:57:08PM +0100, Stephan Mueller wrote:
> Am Montag, 15. Februar 2016, 09:01:55 schrieb Salvatore Benedetto:
>
> Hi Salvatore, Herbert,
>
> > Implement Diffie-Hellman primitives required by the scheme under the
> > akcipher API. Here i
On 02/16/2016 12:19 PM, Herbert Xu wrote:
> On Mon, Feb 15, 2016 at 09:01:55AM +, Salvatore Benedetto wrote:
>> > Implement Diffie-Hellman primitives required by the scheme under the
>> > akcipher API. Here is how it works.
>> > 1) Call set_pub_key() by passing DH parameters (p,g) in PKCS3 form
On Mon, Feb 15, 2016 at 09:01:55AM +, Salvatore Benedetto wrote:
> Implement Diffie-Hellman primitives required by the scheme under the
> akcipher API. Here is how it works.
> 1) Call set_pub_key() by passing DH parameters (p,g) in PKCS3 format
> 2) Call set_priv_key() to set your own private k
Am Montag, 15. Februar 2016, 09:01:55 schrieb Salvatore Benedetto:
Hi Salvatore, Herbert,
> Implement Diffie-Hellman primitives required by the scheme under the
> akcipher API. Here is how it works.
> 1) Call set_pub_key() by passing DH parameters (p,g) in PKCS3 format
> 2) Call set_priv_key() to
Implement Diffie-Hellman primitives required by the scheme under the
akcipher API. Here is how it works.
1) Call set_pub_key() by passing DH parameters (p,g) in PKCS3 format
2) Call set_priv_key() to set your own private key (xa) in raw format
3) Call decrypt() without passing any data as input to
18 matches
Mail list logo