diff options
| author | Ilya Dryomov <idryomov@gmail.com> | 2025-07-12 18:11:55 +0300 |
|---|---|---|
| committer | Ilya Dryomov <idryomov@gmail.com> | 2026-02-09 14:29:22 +0300 |
| commit | 8356b4b1103b8c970648c94bab724aa30e42d869 (patch) | |
| tree | 317cf39cee9bfb5505f48ec325b8776a30e19030 /tools/perf/tests/shell/script_python.sh | |
| parent | b7cc142dbafeaf6c053284ca9121b9f70b6d6d06 (diff) | |
| download | linux-8356b4b1103b8c970648c94bab724aa30e42d869.tar.xz | |
libceph: adapt ceph_x_challenge_blob hashing and msgr1 message signing
The existing approach where ceph_x_challenge_blob is encrypted with the
client's secret key and then the digest derived from the ciphertext is
used for the test doesn't work with CEPH_CRYPTO_AES256KRB5 because the
confounder randomizes the ciphertext: the client and the server get two
different ciphertexts and therefore two different digests.
msgr1 signatures are affected the same way: a digest derived from the
ciphertext for the message's "sigblock" is what becomes a signature and
the two sides disagree on the expected value.
For CEPH_CRYPTO_AES256KRB5 (and potential future encryption schemes),
switch to HMAC-SHA256 function keyed in the same way as the existing
encryption. For CEPH_CRYPTO_AES, everything is preserved as is.
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
Diffstat (limited to 'tools/perf/tests/shell/script_python.sh')
0 files changed, 0 insertions, 0 deletions
