<feed xmlns='http://www.w3.org/2005/Atom'>
<title>kernel/linux.git/net/ceph/auth_x.c, branch linux-4.13.y</title>
<subtitle>Linux kernel stable tree (mirror)</subtitle>
<id>https://git.radix-linux.su/kernel/linux.git/atom?h=linux-4.13.y</id>
<link rel='self' href='https://git.radix-linux.su/kernel/linux.git/atom?h=linux-4.13.y'/>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/'/>
<updated>2017-05-23T18:32:28+00:00</updated>
<entry>
<title>libceph: fix error handling in process_one_ticket()</title>
<updated>2017-05-23T18:32:28+00:00</updated>
<author>
<name>Ilya Dryomov</name>
<email>idryomov@gmail.com</email>
</author>
<published>2017-05-19T12:24:36+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=b51456a6096ebf9f4ceb2cc7e176b471d4b70af0'/>
<id>urn:sha1:b51456a6096ebf9f4ceb2cc7e176b471d4b70af0</id>
<content type='text'>
Don't leak key internals after new_session_key is populated.

Signed-off-by: Ilya Dryomov &lt;idryomov@gmail.com&gt;
Reviewed-by: Alex Elder &lt;elder@linaro.org&gt;
</content>
</entry>
<entry>
<title>libceph: validate blob_struct_v in process_one_ticket()</title>
<updated>2017-05-23T18:32:25+00:00</updated>
<author>
<name>Ilya Dryomov</name>
<email>idryomov@gmail.com</email>
</author>
<published>2017-05-19T10:21:56+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=d18a1247c4070390fc0c2d83d89a72afe921882e'/>
<id>urn:sha1:d18a1247c4070390fc0c2d83d89a72afe921882e</id>
<content type='text'>
None of these are validated in userspace, but since we do validate
reply_struct_v in ceph_x_proc_ticket_reply(), tkt_struct_v (first) and
CephXServiceTicket struct_v (second) in process_one_ticket(), validate
CephXTicketBlob struct_v as well.

Signed-off-by: Ilya Dryomov &lt;idryomov@gmail.com&gt;
Reviewed-by: Alex Elder &lt;elder@linaro.org&gt;
</content>
</entry>
<entry>
<title>libceph: drop len argument of *verify_authorizer_reply()</title>
<updated>2016-12-12T22:09:21+00:00</updated>
<author>
<name>Ilya Dryomov</name>
<email>idryomov@gmail.com</email>
</author>
<published>2016-12-02T15:35:09+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=0dde584882ade13dc9708d611fbf69b0ae8a9e48'/>
<id>urn:sha1:0dde584882ade13dc9708d611fbf69b0ae8a9e48</id>
<content type='text'>
The length of the reply is protocol-dependent - for cephx it's
ceph_x_authorize_reply.  Nothing sensible can be passed from the
messenger layer anyway.

Signed-off-by: Ilya Dryomov &lt;idryomov@gmail.com&gt;
Reviewed-by: Sage Weil &lt;sage@redhat.com&gt;
</content>
</entry>
<entry>
<title>libceph: switch ceph_x_decrypt() to ceph_crypt()</title>
<updated>2016-12-12T22:09:19+00:00</updated>
<author>
<name>Ilya Dryomov</name>
<email>idryomov@gmail.com</email>
</author>
<published>2016-12-02T15:35:08+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=e15fd0a11db00fc7f470a9fc804657ec3f6d04a5'/>
<id>urn:sha1:e15fd0a11db00fc7f470a9fc804657ec3f6d04a5</id>
<content type='text'>
Signed-off-by: Ilya Dryomov &lt;idryomov@gmail.com&gt;
Reviewed-by: Sage Weil &lt;sage@redhat.com&gt;
</content>
</entry>
<entry>
<title>libceph: switch ceph_x_encrypt() to ceph_crypt()</title>
<updated>2016-12-12T22:09:19+00:00</updated>
<author>
<name>Ilya Dryomov</name>
<email>idryomov@gmail.com</email>
</author>
<published>2016-12-02T15:35:07+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=d03857c63bb036edff0aa7a107276360173aca4e'/>
<id>urn:sha1:d03857c63bb036edff0aa7a107276360173aca4e</id>
<content type='text'>
Signed-off-by: Ilya Dryomov &lt;idryomov@gmail.com&gt;
Reviewed-by: Sage Weil &lt;sage@redhat.com&gt;
</content>
</entry>
<entry>
<title>libceph: tweak calcu_signature() a little</title>
<updated>2016-12-12T22:09:19+00:00</updated>
<author>
<name>Ilya Dryomov</name>
<email>idryomov@gmail.com</email>
</author>
<published>2016-12-02T15:35:07+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=4eb4517ce7c9c573b6c823de403aeccb40018cfc'/>
<id>urn:sha1:4eb4517ce7c9c573b6c823de403aeccb40018cfc</id>
<content type='text'>
- replace an ad-hoc array with a struct
- rename to calc_signature() for consistency

Signed-off-by: Ilya Dryomov &lt;idryomov@gmail.com&gt;
Reviewed-by: Sage Weil &lt;sage@redhat.com&gt;
</content>
</entry>
<entry>
<title>libceph: rename and align ceph_x_authorizer::reply_buf</title>
<updated>2016-12-12T22:09:19+00:00</updated>
<author>
<name>Ilya Dryomov</name>
<email>idryomov@gmail.com</email>
</author>
<published>2016-12-02T15:35:07+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=7882a26d2e2e520099e2961d5e2e870f8e4172dc'/>
<id>urn:sha1:7882a26d2e2e520099e2961d5e2e870f8e4172dc</id>
<content type='text'>
It's going to be used as a temporary buffer for in-place en/decryption
with ceph_crypt() instead of on-stack buffers, so rename to enc_buf.
Ensure alignment to avoid GFP_ATOMIC allocations in the crypto stack.

Signed-off-by: Ilya Dryomov &lt;idryomov@gmail.com&gt;
Reviewed-by: Sage Weil &lt;sage@redhat.com&gt;
</content>
</entry>
<entry>
<title>libceph: introduce ceph_x_encrypt_offset()</title>
<updated>2016-12-12T22:09:19+00:00</updated>
<author>
<name>Ilya Dryomov</name>
<email>idryomov@gmail.com</email>
</author>
<published>2016-12-02T15:35:07+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=55d9cc834f933698fc864f0d36f3cca533d30a8d'/>
<id>urn:sha1:55d9cc834f933698fc864f0d36f3cca533d30a8d</id>
<content type='text'>
Signed-off-by: Ilya Dryomov &lt;idryomov@gmail.com&gt;
Reviewed-by: Sage Weil &lt;sage@redhat.com&gt;
</content>
</entry>
<entry>
<title>libceph: old_key in process_one_ticket() is redundant</title>
<updated>2016-12-12T22:09:19+00:00</updated>
<author>
<name>Ilya Dryomov</name>
<email>idryomov@gmail.com</email>
</author>
<published>2016-12-02T15:35:06+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=462e650451c577d15eeb4d883d70fa9e4e529fad'/>
<id>urn:sha1:462e650451c577d15eeb4d883d70fa9e4e529fad</id>
<content type='text'>
Since commit 0a990e709356 ("ceph: clean up service ticket decoding"),
th-&gt;session_key isn't assigned until everything is decoded.

Signed-off-by: Ilya Dryomov &lt;idryomov@gmail.com&gt;
Reviewed-by: Sage Weil &lt;sage@redhat.com&gt;
</content>
</entry>
<entry>
<title>libceph: ceph_x_encrypt_buflen() takes in_len</title>
<updated>2016-12-12T22:09:19+00:00</updated>
<author>
<name>Ilya Dryomov</name>
<email>idryomov@gmail.com</email>
</author>
<published>2016-12-02T15:35:06+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=36721ece1e84a25130c4befb930509b3f96de020'/>
<id>urn:sha1:36721ece1e84a25130c4befb930509b3f96de020</id>
<content type='text'>
Pass what's going to be encrypted - that's msg_b, not ticket_blob.
ceph_x_encrypt_buflen() returns the upper bound, so this doesn't change
the maxlen calculation, but makes it a bit clearer.

Signed-off-by: Ilya Dryomov &lt;idryomov@gmail.com&gt;
Reviewed-by: Sage Weil &lt;sage@redhat.com&gt;
</content>
</entry>
</feed>
