void drbd_send_ack_dp(struct drbd_conf *mdev, enum drbd_packet cmd,
struct p_data *dp, int data_size)
{
- data_size -= (mdev->tconn->agreed_pro_version >= 87 && mdev->tconn->peer_integrity_tfm) ?
- crypto_hash_digestsize(mdev->tconn->peer_integrity_tfm) : 0;
+ if (mdev->tconn->peer_integrity_tfm)
+ data_size -= crypto_hash_digestsize(mdev->tconn->peer_integrity_tfm);
_drbd_send_ack(mdev, cmd, dp->sector, cpu_to_be32(data_size),
dp->block_id);
}
struct crypto_hash *csums_tfm;
struct crypto_hash *cram_hmac_tfm;
struct crypto_hash *integrity_tfm;
- struct crypto_hash *peer_integrity_tfm;
void *int_dig_in;
void *int_dig_vv;
};
ERR_INTEGRITY_ALG);
if (rv != NO_ERROR)
return rv;
- rv = alloc_hash(&crypto->peer_integrity_tfm, new_conf->integrity_alg,
- ERR_INTEGRITY_ALG);
- if (rv != NO_ERROR)
- return rv;
if (new_conf->cram_hmac_alg[0] != 0) {
snprintf(hmac_name, CRYPTO_MAX_ALG_NAME, "hmac(%s)",
new_conf->cram_hmac_alg);
kfree(crypto->int_dig_vv);
crypto_free_hash(crypto->cram_hmac_tfm);
crypto_free_hash(crypto->integrity_tfm);
- crypto_free_hash(crypto->peer_integrity_tfm);
crypto_free_hash(crypto->csums_tfm);
crypto_free_hash(crypto->verify_tfm);
}
int ovr; /* online verify running */
int rsr; /* re-sync running */
struct crypto crypto = { };
+ bool change_integrity_alg;
retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_CONN);
if (!adm_ctx.reply_skb)
conn_reconfig_start(tconn);
+ mutex_lock(&tconn->data.mutex);
mutex_lock(&tconn->net_conf_update);
old_conf = tconn->net_conf;
goto fail;
}
+ change_integrity_alg = strcmp(old_conf->integrity_alg,
+ new_conf->integrity_alg);
+
retcode = alloc_crypto(&crypto, new_conf);
if (retcode != NO_ERROR)
goto fail;
crypto.verify_tfm = NULL;
}
- /* FIXME can not assign these so bluntly while we have ongoing IO */
kfree(tconn->int_dig_in);
tconn->int_dig_in = crypto.int_dig_in;
kfree(tconn->int_dig_vv);
tconn->int_dig_vv = crypto.int_dig_vv;
crypto_free_hash(tconn->integrity_tfm);
tconn->integrity_tfm = crypto.integrity_tfm;
- crypto_free_hash(tconn->peer_integrity_tfm);
- tconn->peer_integrity_tfm = crypto.peer_integrity_tfm;
+ if (change_integrity_alg) {
+ /* Do this without trying to take tconn->data.mutex again. */
+ if (__drbd_send_protocol(tconn))
+ goto fail;
+ }
/* FIXME Changing cram_hmac while the connection is established is useless */
crypto_free_hash(tconn->cram_hmac_tfm);
tconn->cram_hmac_tfm = crypto.cram_hmac_tfm;
mutex_unlock(&tconn->net_conf_update);
+ mutex_unlock(&tconn->data.mutex);
synchronize_rcu();
kfree(old_conf);
fail:
mutex_unlock(&tconn->net_conf_update);
+ mutex_unlock(&tconn->data.mutex);
free_crypto(&crypto);
kfree(new_conf);
done:
tconn->int_dig_vv = crypto.int_dig_vv;
tconn->cram_hmac_tfm = crypto.cram_hmac_tfm;
tconn->integrity_tfm = crypto.integrity_tfm;
- tconn->peer_integrity_tfm = crypto.peer_integrity_tfm;
tconn->csums_tfm = crypto.csums_tfm;
tconn->verify_tfm = crypto.verify_tfm;
void *dig_vv = mdev->tconn->int_dig_vv;
unsigned long *data;
- dgs = (mdev->tconn->agreed_pro_version >= 87 && mdev->tconn->peer_integrity_tfm) ?
- crypto_hash_digestsize(mdev->tconn->peer_integrity_tfm) : 0;
-
- if (dgs) {
+ dgs = 0;
+ if (mdev->tconn->peer_integrity_tfm) {
+ dgs = crypto_hash_digestsize(mdev->tconn->peer_integrity_tfm);
/*
* FIXME: Receive the incoming digest into the receive buffer
* here, together with its struct p_data?
err = drbd_recv_all_warn(mdev->tconn, dig_in, dgs);
if (err)
return NULL;
+ data_size -= dgs;
}
- data_size -= dgs;
-
if (!expect(data_size != 0))
return NULL;
if (!expect(IS_ALIGNED(data_size, 512)))
void *dig_in = mdev->tconn->int_dig_in;
void *dig_vv = mdev->tconn->int_dig_vv;
- dgs = (mdev->tconn->agreed_pro_version >= 87 && mdev->tconn->peer_integrity_tfm) ?
- crypto_hash_digestsize(mdev->tconn->peer_integrity_tfm) : 0;
-
- if (dgs) {
+ dgs = 0;
+ if (mdev->tconn->peer_integrity_tfm) {
+ dgs = crypto_hash_digestsize(mdev->tconn->peer_integrity_tfm);
err = drbd_recv_all_warn(mdev->tconn, dig_in, dgs);
if (err)
return err;
+ data_size -= dgs;
}
- data_size -= dgs;
-
/* optimistically update recv_cnt. if receiving fails below,
* we disconnect anyways, and counters will be reset. */
mdev->recv_cnt += data_size>>9;
struct p_protocol *p = pi->data;
int p_proto, p_after_sb_0p, p_after_sb_1p, p_after_sb_2p;
int p_want_lose, p_two_primaries, cf;
- char p_integrity_alg[SHARED_SECRET_MAX] = "";
struct net_conf *nc;
p_proto = be32_to_cpu(p->protocol);
p_want_lose = cf & CF_WANT_LOSE;
if (tconn->agreed_pro_version >= 87) {
+ char integrity_alg[SHARED_SECRET_MAX];
+ struct crypto_hash *tfm = NULL;
int err;
- if (pi->size > sizeof(p_integrity_alg))
+ if (pi->size > sizeof(integrity_alg))
return -EIO;
- err = drbd_recv_all(tconn, p_integrity_alg, pi->size);
+ err = drbd_recv_all(tconn, integrity_alg, pi->size);
if (err)
return err;
+ integrity_alg[SHARED_SECRET_MAX-1] = 0;
- p_integrity_alg[SHARED_SECRET_MAX-1] = 0;
+ if (integrity_alg[0]) {
+ tfm = crypto_alloc_hash(integrity_alg, 0, CRYPTO_ALG_ASYNC);
+ if (!tfm) {
+ conn_err(tconn, "peer data-integrity-alg %s not supported\n",
+ integrity_alg);
+ goto disconnect;
+ }
+ conn_info(tconn, "peer data-integrity-alg: %s\n", integrity_alg);
+ }
+
+ if (tconn->peer_integrity_tfm)
+ crypto_free_hash(tconn->peer_integrity_tfm);
+ tconn->peer_integrity_tfm = tfm;
}
clear_bit(CONN_DRY_RUN, &tconn->flags);
goto disconnect_rcu_unlock;
}
- if (tconn->agreed_pro_version >= 87) {
- if (strcmp(p_integrity_alg, nc->integrity_alg)) {
- conn_err(tconn, "incompatible setting of the data-integrity-alg\n");
- goto disconnect;
- }
- }
-
rcu_read_unlock();
- if (tconn->agreed_pro_version >= 87) {
- conn_info(tconn, "data-integrity-alg: %s\n",
- nc->integrity_alg[0] ? nc->integrity_alg : (unsigned char *)"<not-used>");
- }
-
return 0;
disconnect_rcu_unlock: