Received: by 2002:ac0:8845:0:0:0:0:0 with SMTP id g63csp339004img; Wed, 27 Feb 2019 23:46:48 -0800 (PST) X-Google-Smtp-Source: AHgI3IZpTHrnCANB18TMfM1dtnoyDTiHlhprbi2wNK6qkN3dUpslJZZ1R2U4bFZsWRu2Iw2eGuhv X-Received: by 2002:a62:18d8:: with SMTP id 207mr6114176pfy.57.1551340008340; Wed, 27 Feb 2019 23:46:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1551340008; cv=none; d=google.com; s=arc-20160816; b=0eACXvNMkHkMbKCnu9fEQ8hnd+2/zECwRBJ+K1ovnQm9eB1QCctgLeCKD+cMukfse+ +ldk/giokzez0iWnckWalSr9tyuNlPIftNU45sbsoqc1vjFEaKK9JhLJEItfxLD8jfXo YgY9KkKYbs2emQqdij+GSiXxdKEZG8tIad18+sSj5m+L4/mtoCDwc19x+9Rgu7EwL9iU CINFjjbnbHTqOTdwb6hqhUqSvoF7Nk8iyi+XDJotBrJKCwLZe1fA1Z67PWU9MfjnxZHq ilImM9aAb0Cp2u0aGFyY7xZcWqeMikKwsWoK4PLo8Y3fyTq1VuTiEt66XrWeKp10Ykre bw2A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:mail-followup-to :message-id:subject:cc:to:from:date; bh=movywdPpVvbz7ZgTNbku9Uy2SEyaUkhcsd+rGD3hcOY=; b=uaAwC23/B95yhADVjhYt9H2XiEjfZxNRen9QZd4BMZFcFGnxqIRHJlpHEDsDXdfp5L MIV6Uf1XxkJN3sss1fUfXzoJzCt/W5Bkl1MKKf0I1z1EU6EZIFUfVN8KXaq+9BBvKLK4 u+G8Hz/avrzO8GplEOkmh0VgBuLs7jXOyHf+D6RysKIUxvBzGi0ScFlSIpdA5+IjLCmV VV46f59HWkdgM4lbd0ejOqP7rdKSjv19nU/bdutmsP3NNGRVD0PQfoauseZ63vjKuvRm IgVd0Le9mnXhhzkyQadY8PS5Z3sO+VufQg2TlqozpDLKYX9C2JkokRvp8hI9YgUFoZ33 lS3A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k63si16303426pge.464.2019.02.27.23.46.33; Wed, 27 Feb 2019 23:46:48 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731343AbfB1HEx (ORCPT + 99 others); Thu, 28 Feb 2019 02:04:53 -0500 Received: from vmicros1.altlinux.org ([194.107.17.57]:57830 "EHLO vmicros1.altlinux.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731129AbfB1HEx (ORCPT ); Thu, 28 Feb 2019 02:04:53 -0500 Received: from imap.altlinux.org (imap.altlinux.org [194.107.17.38]) by vmicros1.altlinux.org (Postfix) with ESMTP id 03DFC72CC53; Thu, 28 Feb 2019 10:04:50 +0300 (MSK) Received: from altlinux.org (sole.flsd.net [185.75.180.6]) by imap.altlinux.org (Postfix) with ESMTPSA id D94E64A4AE7; Thu, 28 Feb 2019 10:04:49 +0300 (MSK) Date: Thu, 28 Feb 2019 10:04:49 +0300 From: Vitaly Chikunov To: Herbert Xu Cc: David Howells , Mimi Zohar , Dmitry Kasatkin , linux-integrity@vger.kernel.org, keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher Message-ID: <20190228070449.gjwoq4c2b3x5grie@altlinux.org> Mail-Followup-To: Herbert Xu , David Howells , Mimi Zohar , Dmitry Kasatkin , linux-integrity@vger.kernel.org, keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org References: <20190106133608.820-1-vt@altlinux.org> <20190106133608.820-2-vt@altlinux.org> <20190209214240.56gq7ivn3pw3bssf@altlinux.org> <20190210184628.yupsxgjlaicwbxg6@altlinux.org> <20190219043732.x3sbwzqlz4ikntxo@gondor.apana.org.au> <20190224064840.hii4ccjksjdnewae@altlinux.org> <20190228061444.3escryzoit3idtwg@gondor.apana.org.au> MIME-Version: 1.0 Content-Type: text/plain; charset=koi8-r Content-Disposition: inline In-Reply-To: <20190228061444.3escryzoit3idtwg@gondor.apana.org.au> User-Agent: NeoMutt/20171215-106-ac61c7 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Herbert, On Thu, Feb 28, 2019 at 02:14:44PM +0800, Herbert Xu wrote: > On Sun, Feb 24, 2019 at 09:48:40AM +0300, Vitaly Chikunov wrote: > > > > If we pass SubjectPublicKeyInfo into set_pub_key itself (making > > set_params not needed) we will break ABI and compatibility with RSA > > drivers, because whole SubjectPublicKeyInfo is not expected by the > > This compatibility does not matter. We can always add translating > layers into the crypto API to deal with this. The only ABI that > matters is the one to user-space. It seems that you insist on set_params to be removed and both key and params to be passed into set_{pub,priv}_key. This means reworking all existing RSA drivers and callers, right? Can you please confirm that huge rework to avoid misunderstanding? I think to pass SubjectPublicKeyInfo into set_*_key would be overkill, because TPM drivers may not have it and we would need BER encoder just for that. So, probably, something simple like length, key data, length, params data will be enough? Thanks,