Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp3127537imj; Mon, 18 Feb 2019 20:39:04 -0800 (PST) X-Google-Smtp-Source: AHgI3Ia20b+jsbE3z1siuZJ7uLYEXXYVoUC8lulnte9s3v0KFipsnk+dqv+VHrTfcCRrZooZFPyH X-Received: by 2002:a63:fa10:: with SMTP id y16mr21402323pgh.88.1550551144359; Mon, 18 Feb 2019 20:39:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550551144; cv=none; d=google.com; s=arc-20160816; b=CZ+D+oN/mGuiE9FEMM+LGLb3UjDxpLk42WPkQmhln+J/7QJZshfaJd5YXSYMQIMh9v p+TjuOt7uyo+yCZKPAh0UxGSGoKFFovL2Mavhb4I7XqTBsfRtKx+2u/P/15zcACSPHSZ Nv52ujPNZWQ46c8Oh6HhDFi4hHuircglfX2LTBt6PGz0S/KO0iiT2VrQnsmeTRmx4YXL YOunKqnbbmyCx3kf9bKxd3TWBHfaUUktPyqoqPqdTMoqgnNuJwaeL1pvdx387Nj98aYP ciVeosfUYUiyLwmYuQpK5iRXCjWBhujRQ6Z189kU7IqEQsSbNdQyXuOLyRkIpqiJaVpm z5Ng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:to :from:date; bh=oDsyF6A45wYSlYapdAYV8mZMMZYxLBcUaTv1ZoK19qg=; b=wu0JlQxYJjELFbBdSccssV3qKqCvyGbwfI53pOzLA4dPcrsi+2/hPQWCQLpvixCbbi VXNzG8se2CvbJc/U0CRkOe06P66fTZx7lgORIqZH+IbUceJUHhoWDzzexSTUI1MU0/1y ScSchX7eYmZ0Urec+YJmSNScF1xhIixw3n1pxWsRPSOsIq+ll45wbUAgeTcK/tjiNBNm ceAtZFj/DGpbTguUtH/FNMDRfxadmj1lFNCoI8hwvqDJcMciI3ugDu97adKk0vG3WWIl LqbeYr75foLsUYl9WXmoGygELMbSb1f/uvtjJPBBSKvI5C2WBG1AOsF4IYpttTkfkB+S QVzw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n17si12317413pgv.485.2019.02.18.20.38.49; Mon, 18 Feb 2019 20:39:04 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726583AbfBSEhk (ORCPT + 99 others); Mon, 18 Feb 2019 23:37:40 -0500 Received: from orcrist.hmeau.com ([104.223.48.154]:35112 "EHLO deadmen.hmeau.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725805AbfBSEhk (ORCPT ); Mon, 18 Feb 2019 23:37:40 -0500 Received: from gondobar.mordor.me.apana.org.au ([192.168.128.4] helo=gondobar) by deadmen.hmeau.com with esmtps (Exim 4.89 #2 (Debian)) id 1gvx9y-0006od-WE; Tue, 19 Feb 2019 12:37:35 +0800 Received: from herbert by gondobar with local (Exim 4.89) (envelope-from ) id 1gvx9w-0007WS-TB; Tue, 19 Feb 2019 12:37:32 +0800 Date: Tue, 19 Feb 2019 12:37:32 +0800 From: Herbert Xu To: David Howells , Mimi Zohar , Dmitry Kasatkin , linux-integrity@vger.kernel.org, keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher Message-ID: <20190219043732.x3sbwzqlz4ikntxo@gondor.apana.org.au> References: <20190106133608.820-1-vt@altlinux.org> <20190106133608.820-2-vt@altlinux.org> <20190209214240.56gq7ivn3pw3bssf@altlinux.org> <20190210184628.yupsxgjlaicwbxg6@altlinux.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190210184628.yupsxgjlaicwbxg6@altlinux.org> User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Feb 10, 2019 at 09:46:28PM +0300, Vitaly Chikunov wrote: > > >From the other point of view, set_params may never be called or > implemented. So, making it called first and move memory zeroing > into set_params may create more complications than simplicity. > > Making both callbacks callable in any order also will not make > things simpler. (Need to be prepared to be called in different > order.) How about encoding these parameters together with the public/private keys so that they can be set through the existing setkey functions? You might want to have a look at how we handle this in crypto/dh.c. Cheers, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt