From: David Howells Subject: Re: [PATCH 0/6] MODSIGN: Kernel module signing Date: Wed, 14 Feb 2007 21:59:37 +0000 Message-ID: <9513.1171490377@redhat.com> References: <20070214213200.GA4852@us.ibm.com> <20070214190938.6438.15091.stgit@warthog.cambridge.redhat.com> <7291.1171482057@redhat.com> Cc: Linus Torvalds , akpm@linux-foundation.org, herbert.xu@redhat.com, linux-kernel@vger.kernel.org, davej@redhat.com, arjan@infradead.org, linux-crypto@vger.kernel.org To: Michael Halcrow Return-path: Received: from mx1.redhat.com ([66.187.233.31]:43434 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S964797AbXBNWF1 (ORCPT ); Wed, 14 Feb 2007 17:05:27 -0500 In-Reply-To: <20070214213200.GA4852@us.ibm.com> Sender: linux-crypto-owner@vger.kernel.org List-Id: linux-crypto.vger.kernel.org Michael Halcrow wrote: > Right now, eCryptfs just delegates its modular exponentiation > operations to a userspace daemon. If RSA ever finds its way into the > kernel, I might tweak eCryptfs to use that instead for some of the > public key operations. Am I right in thinking that RSA uses many of the same MPI lib bits as DSA? David