On 4/15/07, Michael Halcrow <mike@xxxxxxxxxx> wrote:
On Sun, Apr 15, 2007 at 05:34:19AM +1000, Herbert Xu wrote: > > You would assign "aes-foo" a lower priority and then tell eCryptfs to > use "aes-foo" instead of "aes". Note that eCryptfs whitelists the cipher name (see fs/ecryptfs/crypto.c::ecryptfs_cipher_code_str_map[] and associated functions). This is because eCryptfs needs to pick a cipher code (RFC2440-ish) to identify the cipher in the encrypted file metadata. Shall I go ahead with a patch to add support for the '-' qualifier?
Whitelisting the possible ciphers (and associated parameters) would make sense if eCryptfs wants to support only a specific subset of the available ciphers (which is how it ends up, presently). This seems to be an unfortunate relic of the fact that eCryptfs is based too tightly on PGP and hence only supports those ciphers that were mentioned in RFC2440 (minus IDEA and SAFER-SK128, which do not exist in the kernel CryptoAPI as of now). The downside is that as and when new ciphers come into the CryptoAPI, you'll need to keep maintaining / adding on to that ecryptfs_cipher_code_str_map[] list (or not support them). The IPsec code (net/xfrm/xfrm_algo.c:{a,e}alg_list[]) does some similar whitelisting, but then they *have* to be conformant to the IPsec RFCs. I don't see why eCryptfs is limiting itself by restricting itself to the decade-old RFC2440. The absence of CAST6 and Twofish from that list is particularly sad. A better idea would be a patch that gets rid of whitelisting itself? - To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html