<feed xmlns='http://www.w3.org/2005/Atom'>
<title>custodia.git/examples, branch master</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/custodia.git/'/>
<entry>
<title>Add simple Keys-in-Header based authentication</title>
<updated>2015-10-19T16:18:03+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2015-10-01T13:58:40+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/custodia.git/commit/?id=58d434e0fea2b2f9544e7ef1fba07bf50e07b7c0'/>
<id>58d434e0fea2b2f9544e7ef1fba07bf50e07b7c0</id>
<content type='text'>
Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
Reviewed-by: Christian Heimes &lt;cheimes@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
Reviewed-by: Christian Heimes &lt;cheimes@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Do not use the same key for encryption and signing</title>
<updated>2015-06-03T15:16:04+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2015-06-03T15:13:03+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/custodia.git/commit/?id=7e7450a7a20b29d141bc9e189c6fc563a03bb6b9'/>
<id>7e7450a7a20b29d141bc9e189c6fc563a03bb6b9</id>
<content type='text'>
using the same key for signing and encryption is generally a frown
upon approach in the scirty community as it may lead to some attacks.

Change the code to use key pairs, where the first key is the signing
key and the second one is the encryption key.

Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
using the same key for signing and encryption is generally a frown
upon approach in the scirty community as it may lead to some attacks.

Change the code to use key pairs, where the first key is the signing
key and the second one is the encryption key.

Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Add support for signed/encrypted messages</title>
<updated>2015-04-27T19:06:26+00:00</updated>
<author>
<name>Simo Sorce</name>
<email>simo@redhat.com</email>
</author>
<published>2015-04-20T20:08:28+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/simo/public_git/custodia.git/commit/?id=a2ed51acfdff399a6ad6cd486eb22da9acf59280'/>
<id>a2ed51acfdff399a6ad6cd486eb22da9acf59280</id>
<content type='text'>
The new 'kem' type allows the backend to authorize access to keys based on
a signed request where the key mus be whitelisted in advance in a kemkeys
database.
The reply is encrypted with the client public key.

Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The new 'kem' type allows the backend to authorize access to keys based on
a signed request where the key mus be whitelisted in advance in a kemkeys
database.
The reply is encrypted with the client public key.

Signed-off-by: Simo Sorce &lt;simo@redhat.com&gt;
</pre>
</div>
</content>
</entry>
</feed>
