[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: NSA, ITAR, NCSA and plug-in hooks.



At 03:13 PM 11/16/95 -0600, Scott Brickner wrote:
>The problem is that the non-encryption program must use the same
>interface as the encryption program.  Text compression is often cited
....
>You'd need a program which not only *accepted* the additional parameter,
>but also *needed* the second parameter.  I confess I have some difficulty
>thinking of one.

If you support user-specified program/module interface which take
arbitrary string-valued arguments (e.g. Unix-style stuff or objects),
and you've got negotiation methods that can accept args,
then you've got a very general system which they shouldn't
be able to argue with - so the drop-in authors can hand the keys around
as 0xHEX-strings rather than bignums without the program needing to know.
Sorting and backup systems often want lots of options.

If you decide for reliability reasons to insist on registered module names,
to prevent problems like six different sorting modules with different
argument orders, or backup modules with different ideas of "original" and "copy"
(switching those two can be _Very_ annoying!), then there's even a mechanism
which the crafty foreigner to distribute modules and documentation!

>> An abstract set of open/modify/close
>> routines (where open returned a pointer to opaque state, say a session
>> key :) would be fine.

#--
#				Thanks;  Bill
# Bill Stewart, Freelance Information Architect, [email protected]
# Phone +1-510-247-0663 Pager/Voicemail 1-408-787-1281