Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id B8F56C4332F for ; Mon, 13 Dec 2021 10:04:22 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238830AbhLMKER (ORCPT ); Mon, 13 Dec 2021 05:04:17 -0500 Received: from smtp-out2.suse.de ([195.135.220.29]:49478 "EHLO smtp-out2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238363AbhLMKAT (ORCPT ); Mon, 13 Dec 2021 05:00:19 -0500 Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out2.suse.de (Postfix) with ESMTPS id 4E8431F3BA; Mon, 13 Dec 2021 10:00:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1639389618; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=FxzV9PKwviMLXMH55XLwUJlJEuImXmwoCYjQjCiK71c=; b=mhJ+JpiidkAmrb2TAlMZkSYCXjk+kJOWNrMitD1c1WB4wdGUuic25eoApUOz1t/sXc2ojL O1sHVuL+SJq3EKSJd+AtICurNInJReUqXoqKR+2GwTcaNcwuki75r/zr2k5ddWklpjv+GX RvqbeR5fZ+Nes2C9q6+s/oaAXIAZu9g= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1639389618; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=FxzV9PKwviMLXMH55XLwUJlJEuImXmwoCYjQjCiK71c=; b=kEtONiSZw7LrzYWdnuwz0jEqThrrfYKuXkVgKE2uhQFpCg/JZWrwfDAGKts3ornQz7sCrH ElMPP2pCw7NhliCw== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 41B5213BB2; Mon, 13 Dec 2021 10:00:18 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id SJvID7IZt2FzMgAAMHmgww (envelope-from ); Mon, 13 Dec 2021 10:00:18 +0000 To: Sagi Grimberg , Christoph Hellwig Cc: Keith Busch , linux-nvme@lists.infradead.org, linux-crypto@vger.kernel.org References: <20211202152358.60116-1-hare@suse.de> <20211213080853.GA21223@lst.de> <9853d36a-036c-7f2b-5fb4-b3fb4bae473f@suse.de> <4328e4f0-9674-9362-4ed5-89ec7edba4a2@grimberg.me> From: Hannes Reinecke Subject: Re: [PATCHv8 00/12] nvme: In-band authentication support Message-ID: <56f1ce1c-2272-bed2-fd6b-642854b612bb@suse.de> Date: Mon, 13 Dec 2021 11:00:17 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.12.0 MIME-Version: 1.0 In-Reply-To: <4328e4f0-9674-9362-4ed5-89ec7edba4a2@grimberg.me> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On 12/13/21 10:31 AM, Sagi Grimberg wrote: > >>> So if we want to make progress on this we need the first 3 patches >>> rewviewed by the crypto maintainers.  In fact I'd prefer to get them >>> merged through the crypto tree as well, and would make sure we have >>> a branch that pulls them in for the nvme changes.  I'll try to find >>> some time to review the nvme bits as well. >>> >> That is _actually_ being addressed already. >> Nicolai Stange send a patchset for ephemeral keys, FFDHE support, and >> FIPS-related thingies for the in-kernel DH crypto implementation >> (https://lore.kernel.org/linux-crypto/20211209090358.28231-1-nstange@suse.de/). >> >> This obsoletes my preliminary patches, and I have ported my patchset >> to run on top of those. >> >> Question is how to continue from here; I can easily rebase my patchset >> and send it relative to Nicolais patches. But then we'll be bound to >> the acceptance of those patches, so I'm not quite sure if that's the >> best way to proceed. > > Don't know if we have a choice here... What is the alternative you are > proposing? That's the thing, I don't really have a good alternative, either. It's just that I have so no idea about the crypto subsystem, and consequently wouldn't know how long we need to wait... But yeah, Nicolais patchset is far superior to my attempts, so I'd be happy to ditch my preliminary attempts there. Cheers, Hannes -- Dr. Hannes Reinecke Kernel Storage Architect hare@suse.de +49 911 74053 688 SUSE Software Solutions Germany GmbH, Maxfeldstr. 5, 90409 Nürnberg HRB 36809 (AG Nürnberg), GF: Felix Imendörffer