Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp3070389rdg; Tue, 17 Oct 2023 03:53:22 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHPTC2zoGgYXRP0OqZ1LtbDY9xXtpw/eqMHu0ImN7vXk0hz3mcXvaRDpJDe6WjszH9Okwnb X-Received: by 2002:a05:6a20:da87:b0:167:af7d:9e8c with SMTP id iy7-20020a056a20da8700b00167af7d9e8cmr1814377pzb.56.1697540001942; Tue, 17 Oct 2023 03:53:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697540001; cv=none; d=google.com; s=arc-20160816; b=ixsgnp9WxKQtbmIdUXskOvF74Qm6OwQQKPH1KAmuvfCNfN+pdjipimwyGRfLtaSdzt 3nCDEqvpy6dEk0XJIGMQilR78TDUAuK6KHKoCQ9fLfLPupfpc8i4ECnkki57oPg4y7R9 /rz80r8a5nM///FKnpEonFrew+ntpZZdeeGHGIIT5sHFk7w0d8Kz925xvq5p9cI3PpvR OBwQWxH6QB9XJl59Ez0Qc7B9OQisk+MDtIE/S7zm7Zw7Jeg1fDy7wNrpvlaL0JplCbst HM71afV4o2tNGmoOehVRMAZx6S+XjjbennOa+SCQ/D6NbTs6rR3SXG4IB6E7sVYGK1hf 70GA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=oHPRNRXaBXnP0hKN6x717ORPsdbjv/XJtSjT888Zphg=; fh=nK/B2gIzvYPsKU0sJgdKEVdz5eoE00hHt727sEimwsQ=; b=QRsnWCaH12DXbKPUVSXa6MVzHU/5diKguwv5nOGNOntuEk7prZwC/9H+j2rwYISoq4 nfq1l5nnN1XtBdCPvf74Aj2EhF0/t+WNp/hIAR3PQHaC1PKmClt3odr/mQlPAddz/8fa rXyh196JIEa9gyJT+Cb/v3F/ObxrxKROOx8cHZnu5Ipp6kCM1CeYDXpKVSXjK4pWfict QueyBqvlvlAI4mBZj5UuGTp6FiGuq72XbMZpTXU9y/4yVkLJDKxQvSN0iU9awftpBy95 DBVMkskr+0/3uj0x4lyQCqmz9VzqtIZiGQA/vNnQDCn4JAThCQnagZN5ZQDGXbk4YZ2N ReBQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@posteo.net header.s=2017 header.b=eV44l1Vx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=posteo.net Return-Path: Received: from fry.vger.email (fry.vger.email. [2620:137:e000::3:8]) by mx.google.com with ESMTPS id e23-20020a17090a9a9700b0026b7f68f386si8204701pjp.73.2023.10.17.03.53.21 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 17 Oct 2023 03:53:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) client-ip=2620:137:e000::3:8; Authentication-Results: mx.google.com; dkim=pass header.i=@posteo.net header.s=2017 header.b=eV44l1Vx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=posteo.net Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by fry.vger.email (Postfix) with ESMTP id 3230C8022B69; Tue, 17 Oct 2023 03:53:19 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at fry.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1343489AbjJQKxM (ORCPT + 99 others); Tue, 17 Oct 2023 06:53:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49020 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234627AbjJQKxL (ORCPT ); Tue, 17 Oct 2023 06:53:11 -0400 Received: from mout01.posteo.de (mout01.posteo.de [185.67.36.65]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 53312A2 for ; Tue, 17 Oct 2023 03:53:09 -0700 (PDT) Received: from submission (posteo.de [185.67.36.169]) by mout01.posteo.de (Postfix) with ESMTPS id 90771240029 for ; Tue, 17 Oct 2023 12:53:07 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=posteo.net; s=2017; t=1697539987; bh=MLzZUl/+BHQHydxEN9HgZzS0VH6NylU05183B2OuUXA=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version: Content-Transfer-Encoding:From; b=eV44l1Vxi5z6Z7TNlLCHy0v74F8mtYkWDKBQm0hXL8vbaH6kQHGsB2ILpTU4GHIRu OsAAHLuzKAnJcW/YsjnuxmwLrJqBeZn0HruXVTKYXrNq4S15Mpza6bxkH+sSIANjmW PeKpDCWemL53SUCWZQWmZpwDF2kDy+/uo9IQ3tJheqdR1nuDWfCpVtz7SK7a74U+/U YGyL5NURq8y3xxzRqjgGBqtY4dbni/vLzF+7+nqlFu1S0fA6tJoY1OL8BA7w3Stp1K SUfW2vQwBBhwbXyUd5YcEpu1Sv+Il0OqNUEP9YP2hwK+GpuMqWOai5iJ7kbBHnVzhk dCPjJKfiq9bMA== Received: from customer (localhost [127.0.0.1]) by submission (posteo.de) with ESMTPSA id 4S8rRh5V1hz6tv5; Tue, 17 Oct 2023 12:53:04 +0200 (CEST) From: Mark O'Donovan To: linux-kernel@vger.kernel.org Cc: linux-nvme@lists.infradead.org, sagi@grimberg.me, hch@lst.de, axboe@kernel.dk, kbusch@kernel.org, hare@suse.de, Mark O'Donovan Subject: [PATCH v4 0/3] Remove secret-size restrictions for hashes Date: Tue, 17 Oct 2023 10:52:48 +0000 Message-Id: <20231017105251.3274652-1-shiftee@posteo.net> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-0.8 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on fry.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (fry.vger.email [0.0.0.0]); Tue, 17 Oct 2023 03:53:19 -0700 (PDT) This relates to the hash functions used to transform the secret. The kernel currently restricts us to using secrets equal in size to the transformation hash function they use. e.g. 32 byte secrets with the SHA-256(32 byte) hash function. This restriction is not required by the spec and means incompatibility with more permissive implementations. With these patches the example secret from the spec should now be permitted with any of the following: DHHC-1:00:ia6zGodOr4SEG0Zzaw398rpY0wqipUWj4jWjUh4HWUz6aQ2n: DHHC-1:01:ia6zGodOr4SEG0Zzaw398rpY0wqipUWj4jWjUh4HWUz6aQ2n: DHHC-1:02:ia6zGodOr4SEG0Zzaw398rpY0wqipUWj4jWjUh4HWUz6aQ2n: DHHC-1:03:ia6zGodOr4SEG0Zzaw398rpY0wqipUWj4jWjUh4HWUz6aQ2n: Note: Secrets are still restricted to 32,48 or 64 bits. v1: - Initial submission v2: - Added transformed_len as member of struct nvme_dhchap_key v3: - Return a struct nvme_dhchap_key from nvme_auth_transform_key() v4: - added helper to caclulate key struct size using struct_size() - Break up lines which were too long - Replace ternary operator with if - Add missing ERR_CAST() Mark O'Donovan (3): nvme-auth: alloc nvme_dhchap_key as single buffer nvme-auth: use transformed key size to create resp nvme-auth: allow mixing of secret and hash lengths drivers/nvme/common/auth.c | 66 ++++++++++++++++++++++---------------- drivers/nvme/host/auth.c | 30 ++++++++--------- drivers/nvme/target/auth.c | 31 ++++++++++-------- include/linux/nvme-auth.h | 7 ++-- 4 files changed, 75 insertions(+), 59 deletions(-) -- 2.39.2