On Sat, Nov 10, 2007 at 01:05:55AM +0200, Alon Bar-Lev wrote:
> I guess we are back on business?
> Can you please address these point?

Your suggestions make sense. I don't have a lot of time over the next
4 weeks to work on anything but critical bugfixes (kernel
oops/segfault type stuff). If someone wants to spend the time to make
these modifications and send patches along, I will review and merge
them.

> > 1. Introduce statefull mode.

So long as it is not a global state (i.e., it is referenced with a
handle that gets created by the key module and passed in on future
calls), I have no problem with that. I would like to keep the generic
calls into key module (i.e., ones that do not involve any sort of
session handle or what not) to remain reentrant.

> > 2. Allow the key module to report that a key is unusable.

Is the idea to prevent attempts to call encrypt/decrypt repeatedly? In
this case, we probably just need the proper return codes, along with
perhaps some annotation on the key in the user keyring for future calls.

> > 3. Key module context & parameters
>
> > Allow key module specific parameter that are not related to a specific
> > key, this will allow to specify some module wide options. It should be
> > read from some configuration file and forwarded to the key module
> > during initialization.

I am inclined to just let each key module handle its own configuration
file in this case rather than futher complicate the existing
configuration file parsing code.

> > 4. [Not directly related] Pluggable Random Generator

If you are talking about the per-file key generated in the kernel,
then this is more a kernel-level change than anything we should do in
userspace. The kernel already supports swapping out the random number
generator used for calls for random numbers via its own API (HW_RANDOM
build option).

Mike

Attachment: pgpozYedqTPBN.pgp
Description: PGP signature

-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
_______________________________________________
eCryptfs-devel mailing list
eCryptfs-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ecryptfs-devel

Reply via email to