From: John Snow <jsnow@redhat.com> To: Maxim Levitsky <mlevitsk@redhat.com>, qemu-devel@nongnu.org Cc: "Kevin Wolf" <kwolf@redhat.com>, "Fam Zheng" <fam@euphon.net>, "Daniel P. Berrangé" <berrange@redhat.com>, qemu-block@nongnu.org, "Markus Armbruster" <armbru@redhat.com>, "Max Reitz" <mreitz@redhat.com>, "Stefan Hajnoczi" <stefanha@redhat.com> Subject: Re: [Qemu-devel] [Qemu-block] [PATCH 02/13] qcrypto-luks: misc refactoring Date: Thu, 15 Aug 2019 17:40:11 -0400 Message-ID: <6b9b4bf7-5765-400b-7452-e37ec797eed1@redhat.com> (raw) In-Reply-To: <20190814202219.1870-3-mlevitsk@redhat.com> On 8/14/19 4:22 PM, Maxim Levitsky wrote: > This is also a preparation for key read/write/erase functions > This is a matter of taste and I am not usually reviewing LUKS patches (So don't take me too seriously), but I would prefer not to have "misc" patches and instead split things out by individual changes along with a nice commit message for each change. > * use master key len from the header This touches enough lines that you could make it its own patch, I think. > * prefer to use crypto params in the QCryptoBlockLUKS > over passing them as function arguments I think the same is true here, and highlighting which variables you are sticking into state instead of leaving as functional parameters would be nice to see without all the other changes. > * define QCRYPTO_BLOCK_LUKS_DEFAULT_ITER_TIME This can likely be squashed with whichever patch of yours first needs to use it, because it's so short. > * Add comments to various crypto parameters in the QCryptoBlockLUKS > Can probably be squashed with item #2. > Signed-off-by: Maxim Levitsky <mlevitsk@redhat.com> > --- > crypto/block-luks.c | 213 ++++++++++++++++++++++---------------------- > 1 file changed, 105 insertions(+), 108 deletions(-) > > diff --git a/crypto/block-luks.c b/crypto/block-luks.c > index 409ab50f20..48213abde7 100644 > --- a/crypto/block-luks.c > +++ b/crypto/block-luks.c > @@ -70,6 +70,8 @@ typedef struct QCryptoBlockLUKSKeySlot QCryptoBlockLUKSKeySlot; > > #define QCRYPTO_BLOCK_LUKS_SECTOR_SIZE 512LL > > +#define QCRYPTO_BLOCK_LUKS_DEFAULT_ITER_TIME 2000 > + > static const char qcrypto_block_luks_magic[QCRYPTO_BLOCK_LUKS_MAGIC_LEN] = { > 'L', 'U', 'K', 'S', 0xBA, 0xBE > }; > @@ -199,13 +201,25 @@ QEMU_BUILD_BUG_ON(sizeof(struct QCryptoBlockLUKSHeader) != 592); > struct QCryptoBlockLUKS { > QCryptoBlockLUKSHeader header; > > - /* Cache parsed versions of what's in header fields, > - * as we can't rely on QCryptoBlock.cipher being > - * non-NULL */ > + /* Main encryption algorithm used for encryption*/ > QCryptoCipherAlgorithm cipher_alg; > + > + /* Mode of encryption for the selected encryption algorithm */ > QCryptoCipherMode cipher_mode; > + > + /* Initialization vector generation algorithm */ > QCryptoIVGenAlgorithm ivgen_alg; > + > + /* Hash algorithm used for IV generation*/ > QCryptoHashAlgorithm ivgen_hash_alg; > + > + /* > + * Encryption algorithm used for IV generation. > + * Usually the same as main encryption algorithm > + */ > + QCryptoCipherAlgorithm ivgen_cipher_alg; > + > + /* Hash algorithm used in pbkdf2 function */ > QCryptoHashAlgorithm hash_alg; > }; > > @@ -397,6 +411,12 @@ qcrypto_block_luks_essiv_cipher(QCryptoCipherAlgorithm cipher, > } > } > > +static int masterkeylen(QCryptoBlockLUKS *luks) > +{ > + return luks->header.key_bytes; > +} > + > + generally QEMU uses snake_case_names; please spell as "master_key_len". > /* > * Given a key slot, and user password, this will attempt to unlock > * the master encryption key from the key slot. > @@ -410,21 +430,15 @@ qcrypto_block_luks_essiv_cipher(QCryptoCipherAlgorithm cipher, > */ > static int > qcrypto_block_luks_load_key(QCryptoBlock *block, > - QCryptoBlockLUKSKeySlot *slot, > + uint slot_idx, > const char *password, > - QCryptoCipherAlgorithm cipheralg, > - QCryptoCipherMode ciphermode, > - QCryptoHashAlgorithm hash, > - QCryptoIVGenAlgorithm ivalg, > - QCryptoCipherAlgorithm ivcipheralg, > - QCryptoHashAlgorithm ivhash, > uint8_t *masterkey, > - size_t masterkeylen, > QCryptoBlockReadFunc readfunc, > void *opaque, > Error **errp) > { > QCryptoBlockLUKS *luks = block->opaque; > + QCryptoBlockLUKSKeySlot *slot = &luks->header.key_slots[slot_idx]; > uint8_t *splitkey; > size_t splitkeylen; > uint8_t *possiblekey; > @@ -439,9 +453,9 @@ qcrypto_block_luks_load_key(QCryptoBlock *block, > return 0; > } > > - splitkeylen = masterkeylen * slot->stripes; > + splitkeylen = masterkeylen(luks) * slot->stripes; > splitkey = g_new0(uint8_t, splitkeylen); > - possiblekey = g_new0(uint8_t, masterkeylen); > + possiblekey = g_new0(uint8_t, masterkeylen(luks)); > > /* > * The user password is used to generate a (possible) > @@ -450,11 +464,11 @@ qcrypto_block_luks_load_key(QCryptoBlock *block, > * the key is correct and validate the results of > * decryption later. > */ > - if (qcrypto_pbkdf2(hash, > + if (qcrypto_pbkdf2(luks->hash_alg, > (const uint8_t *)password, strlen(password), > slot->salt, QCRYPTO_BLOCK_LUKS_SALT_LEN, > slot->iterations, > - possiblekey, masterkeylen, > + possiblekey, masterkeylen(luks), > errp) < 0) { > goto cleanup; > } > @@ -478,19 +492,19 @@ qcrypto_block_luks_load_key(QCryptoBlock *block, > > /* Setup the cipher/ivgen that we'll use to try to decrypt > * the split master key material */ > - cipher = qcrypto_cipher_new(cipheralg, ciphermode, > - possiblekey, masterkeylen, > + cipher = qcrypto_cipher_new(luks->cipher_alg, luks->cipher_mode, > + possiblekey, masterkeylen(luks), > errp); > if (!cipher) { > goto cleanup; > } > > - niv = qcrypto_cipher_get_iv_len(cipheralg, > - ciphermode); > - ivgen = qcrypto_ivgen_new(ivalg, > - ivcipheralg, > - ivhash, > - possiblekey, masterkeylen, > + niv = qcrypto_cipher_get_iv_len(luks->cipher_alg, > + luks->cipher_mode); > + ivgen = qcrypto_ivgen_new(luks->ivgen_alg, > + luks->ivgen_cipher_alg, > + luks->ivgen_hash_alg, > + possiblekey, masterkeylen(luks), > errp); > if (!ivgen) { > goto cleanup; > @@ -519,8 +533,8 @@ qcrypto_block_luks_load_key(QCryptoBlock *block, > * Now we've decrypted the split master key, join > * it back together to get the actual master key. > */ > - if (qcrypto_afsplit_decode(hash, > - masterkeylen, > + if (qcrypto_afsplit_decode(luks->hash_alg, > + masterkeylen(luks), > slot->stripes, > splitkey, > masterkey, > @@ -537,8 +551,8 @@ qcrypto_block_luks_load_key(QCryptoBlock *block, > * then comparing that to the hash stored in the key slot > * header > */ > - if (qcrypto_pbkdf2(hash, > - masterkey, masterkeylen, > + if (qcrypto_pbkdf2(luks->hash_alg, > + masterkey, masterkeylen(luks), > luks->header.master_key_salt, > QCRYPTO_BLOCK_LUKS_SALT_LEN, > luks->header.master_key_iterations, > @@ -577,37 +591,19 @@ qcrypto_block_luks_load_key(QCryptoBlock *block, > static int > qcrypto_block_luks_find_key(QCryptoBlock *block, > const char *password, > - QCryptoCipherAlgorithm cipheralg, > - QCryptoCipherMode ciphermode, > - QCryptoHashAlgorithm hash, > - QCryptoIVGenAlgorithm ivalg, > - QCryptoCipherAlgorithm ivcipheralg, > - QCryptoHashAlgorithm ivhash, > - uint8_t **masterkey, > - size_t *masterkeylen, > + uint8_t *masterkey, > QCryptoBlockReadFunc readfunc, > void *opaque, > Error **errp) > { > - QCryptoBlockLUKS *luks = block->opaque; > size_t i; > int rv; > > - *masterkey = g_new0(uint8_t, luks->header.key_bytes); > - *masterkeylen = luks->header.key_bytes; > - > for (i = 0; i < QCRYPTO_BLOCK_LUKS_NUM_KEY_SLOTS; i++) { > rv = qcrypto_block_luks_load_key(block, > - &luks->header.key_slots[i], > + i, > password, > - cipheralg, > - ciphermode, > - hash, > - ivalg, > - ivcipheralg, > - ivhash, > - *masterkey, > - *masterkeylen, > + masterkey, > readfunc, > opaque, > errp); > @@ -620,11 +616,7 @@ qcrypto_block_luks_find_key(QCryptoBlock *block, > } > > error_setg(errp, "Invalid password, cannot unlock any keyslot"); > - > error: > - g_free(*masterkey); > - *masterkey = NULL; > - *masterkeylen = 0; > return -1; > } > > @@ -639,21 +631,15 @@ qcrypto_block_luks_open(QCryptoBlock *block, > size_t n_threads, > Error **errp) > { > - QCryptoBlockLUKS *luks; > + QCryptoBlockLUKS *luks = NULL; > Error *local_err = NULL; > int ret = 0; > size_t i; > ssize_t rv; > uint8_t *masterkey = NULL; > - size_t masterkeylen; > char *ivgen_name, *ivhash_name; > - QCryptoCipherMode ciphermode; > - QCryptoCipherAlgorithm cipheralg; > - QCryptoIVGenAlgorithm ivalg; > - QCryptoCipherAlgorithm ivcipheralg; > - QCryptoHashAlgorithm hash; > - QCryptoHashAlgorithm ivhash; > char *password = NULL; > + char *cipher_mode = NULL; > > if (!(flags & QCRYPTO_BLOCK_OPEN_NO_IO)) { > if (!options->u.luks.key_secret) { > @@ -710,6 +696,8 @@ qcrypto_block_luks_open(QCryptoBlock *block, > goto fail; > } > > + cipher_mode = g_strdup(luks->header.cipher_mode); > + > /* > * The cipher_mode header contains a string that we have > * to further parse, of the format > @@ -718,7 +706,7 @@ qcrypto_block_luks_open(QCryptoBlock *block, > * > * eg cbc-essiv:sha256, cbc-plain64 > */ > - ivgen_name = strchr(luks->header.cipher_mode, '-'); > + ivgen_name = strchr(cipher_mode, '-'); > if (!ivgen_name) { > ret = -EINVAL; > error_setg(errp, "Unexpected cipher mode string format %s", > @@ -730,13 +718,13 @@ qcrypto_block_luks_open(QCryptoBlock *block, > > ivhash_name = strchr(ivgen_name, ':'); > if (!ivhash_name) { > - ivhash = 0; > + luks->ivgen_hash_alg = 0; > } else { > *ivhash_name = '\0'; > ivhash_name++; > > - ivhash = qcrypto_block_luks_hash_name_lookup(ivhash_name, > - &local_err); > + luks->ivgen_hash_alg = qcrypto_block_luks_hash_name_lookup(ivhash_name, > + &local_err); > if (local_err) { > ret = -ENOTSUP; > error_propagate(errp, local_err); > @@ -744,25 +732,27 @@ qcrypto_block_luks_open(QCryptoBlock *block, > } > } > > - ciphermode = qcrypto_block_luks_cipher_mode_lookup(luks->header.cipher_mode, > - &local_err); > + luks->cipher_mode = qcrypto_block_luks_cipher_mode_lookup(cipher_mode, > + &local_err); > if (local_err) { > ret = -ENOTSUP; > error_propagate(errp, local_err); > goto fail; > } > > - cipheralg = qcrypto_block_luks_cipher_name_lookup(luks->header.cipher_name, > - ciphermode, > - luks->header.key_bytes, > - &local_err); > + luks->cipher_alg = > + qcrypto_block_luks_cipher_name_lookup(luks->header.cipher_name, > + luks->cipher_mode, > + luks->header.key_bytes, > + &local_err); > if (local_err) { > ret = -ENOTSUP; > error_propagate(errp, local_err); > goto fail; > } > > - hash = qcrypto_block_luks_hash_name_lookup(luks->header.hash_spec, > + luks->hash_alg = > + qcrypto_block_luks_hash_name_lookup(luks->header.hash_spec, > &local_err); > if (local_err) { > ret = -ENOTSUP; > @@ -770,23 +760,24 @@ qcrypto_block_luks_open(QCryptoBlock *block, > goto fail; > } > > - ivalg = qcrypto_block_luks_ivgen_name_lookup(ivgen_name, > - &local_err); > + luks->ivgen_alg = qcrypto_block_luks_ivgen_name_lookup(ivgen_name, > + &local_err); > if (local_err) { > ret = -ENOTSUP; > error_propagate(errp, local_err); > goto fail; > } > > - if (ivalg == QCRYPTO_IVGEN_ALG_ESSIV) { > + if (luks->ivgen_alg == QCRYPTO_IVGEN_ALG_ESSIV) { > if (!ivhash_name) { > ret = -EINVAL; > error_setg(errp, "Missing IV generator hash specification"); > goto fail; > } > - ivcipheralg = qcrypto_block_luks_essiv_cipher(cipheralg, > - ivhash, > - &local_err); > + luks->ivgen_cipher_alg = > + qcrypto_block_luks_essiv_cipher(luks->cipher_alg, > + luks->ivgen_hash_alg, > + &local_err); > if (local_err) { > ret = -ENOTSUP; > error_propagate(errp, local_err); > @@ -800,21 +791,25 @@ qcrypto_block_luks_open(QCryptoBlock *block, > * ignore hash names with these ivgens rather than report > * an error about the invalid usage > */ > - ivcipheralg = cipheralg; > + luks->ivgen_cipher_alg = luks->cipher_alg; > } > > + > + g_free(cipher_mode); > + cipher_mode = NULL; > + ivgen_name = NULL; > + ivhash_name = NULL; > + > if (!(flags & QCRYPTO_BLOCK_OPEN_NO_IO)) { > /* Try to find which key slot our password is valid for > * and unlock the master key from that slot. > */ > + > + masterkey = g_new0(uint8_t, masterkeylen(luks)); > + > if (qcrypto_block_luks_find_key(block, > password, > - cipheralg, ciphermode, > - hash, > - ivalg, > - ivcipheralg, > - ivhash, > - &masterkey, &masterkeylen, > + masterkey, > readfunc, opaque, > errp) < 0) { > ret = -EACCES; > @@ -824,21 +819,24 @@ qcrypto_block_luks_open(QCryptoBlock *block, > /* We have a valid master key now, so can setup the > * block device payload decryption objects > */ > - block->kdfhash = hash; > - block->niv = qcrypto_cipher_get_iv_len(cipheralg, > - ciphermode); > - block->ivgen = qcrypto_ivgen_new(ivalg, > - ivcipheralg, > - ivhash, > - masterkey, masterkeylen, > + block->kdfhash = luks->hash_alg; > + block->niv = qcrypto_cipher_get_iv_len(luks->cipher_alg, > + luks->cipher_mode); > + > + block->ivgen = qcrypto_ivgen_new(luks->ivgen_alg, > + luks->ivgen_cipher_alg, > + luks->ivgen_hash_alg, > + masterkey, masterkeylen(luks), > errp); > if (!block->ivgen) { > ret = -ENOTSUP; > goto fail; > } > > - ret = qcrypto_block_init_cipher(block, cipheralg, ciphermode, > - masterkey, masterkeylen, n_threads, > + ret = qcrypto_block_init_cipher(block, luks->cipher_alg, > + luks->cipher_mode, > + masterkey, masterkeylen(luks), > + n_threads, > errp); > if (ret < 0) { > ret = -ENOTSUP; > @@ -850,12 +848,6 @@ qcrypto_block_luks_open(QCryptoBlock *block, > block->payload_offset = luks->header.payload_offset * > block->sector_size; > > - luks->cipher_alg = cipheralg; > - luks->cipher_mode = ciphermode; > - luks->ivgen_alg = ivalg; > - luks->ivgen_hash_alg = ivhash; > - luks->hash_alg = hash; > - > g_free(masterkey); > g_free(password); > > @@ -910,7 +902,7 @@ qcrypto_block_luks_create(QCryptoBlock *block, > > memcpy(&luks_opts, &options->u.luks, sizeof(luks_opts)); > if (!luks_opts.has_iter_time) { > - luks_opts.iter_time = 2000; > + luks_opts.iter_time = QCRYPTO_BLOCK_LUKS_DEFAULT_ITER_TIME; > } > if (!luks_opts.has_cipher_alg) { > luks_opts.cipher_alg = QCRYPTO_CIPHER_ALG_AES_256; > @@ -930,6 +922,17 @@ qcrypto_block_luks_create(QCryptoBlock *block, > luks_opts.has_ivgen_hash_alg = true; > } > } > + > + luks = g_new0(QCryptoBlockLUKS, 1); > + block->opaque = luks; > + > + luks->cipher_alg = luks_opts.cipher_alg; > + luks->cipher_mode = luks_opts.cipher_mode; > + luks->ivgen_alg = luks_opts.ivgen_alg; > + luks->ivgen_hash_alg = luks_opts.ivgen_hash_alg; > + luks->hash_alg = luks_opts.hash_alg; > + > + > /* Note we're allowing ivgen_hash_alg to be set even for > * non-essiv iv generators that don't need a hash. It will > * be silently ignored, for compatibility with dm-crypt */ > @@ -944,8 +947,6 @@ qcrypto_block_luks_create(QCryptoBlock *block, > return -1; > } > > - luks = g_new0(QCryptoBlockLUKS, 1); > - block->opaque = luks; > > memcpy(luks->header.magic, qcrypto_block_luks_magic, > QCRYPTO_BLOCK_LUKS_MAGIC_LEN); > @@ -1003,6 +1004,8 @@ qcrypto_block_luks_create(QCryptoBlock *block, > ivcipheralg = luks_opts.cipher_alg; > } > > + luks->ivgen_cipher_alg = ivcipheralg; > + > strcpy(luks->header.cipher_name, cipher_alg); > strcpy(luks->header.cipher_mode, cipher_mode_spec); > strcpy(luks->header.hash_spec, hash_alg); > @@ -1304,12 +1307,6 @@ qcrypto_block_luks_create(QCryptoBlock *block, > goto error; > } > > - luks->cipher_alg = luks_opts.cipher_alg; > - luks->cipher_mode = luks_opts.cipher_mode; > - luks->ivgen_alg = luks_opts.ivgen_alg; > - luks->ivgen_hash_alg = luks_opts.ivgen_hash_alg; > - luks->hash_alg = luks_opts.hash_alg; > - > memset(masterkey, 0, luks->header.key_bytes); > g_free(masterkey); > memset(slotkey, 0, luks->header.key_bytes); >
next prev parent reply index Thread overview: 87+ messages / expand[flat|nested] mbox.gz Atom feed top 2019-08-14 20:22 [Qemu-devel] [PATCH 00/13] RFC: luks/encrypted qcow2 key management Maxim Levitsky 2019-08-14 20:22 ` [Qemu-devel] [PATCH 01/13] block-crypto: misc refactoring Maxim Levitsky 2019-08-20 16:38 ` Max Reitz 2019-08-22 0:05 ` Maxim Levitsky 2019-08-22 14:34 ` Max Reitz 2019-08-22 15:04 ` Maxim Levitsky 2019-08-21 15:39 ` Daniel P. Berrangé 2019-08-22 0:08 ` Maxim Levitsky 2019-08-14 20:22 ` [Qemu-devel] [PATCH 02/13] qcrypto-luks: " Maxim Levitsky 2019-08-15 21:40 ` John Snow [this message] 2019-08-19 14:21 ` [Qemu-devel] [Qemu-block] " Maxim Levitsky 2019-08-22 10:29 ` Daniel P. Berrangé 2019-08-22 11:04 ` Maxim Levitsky 2019-08-22 11:10 ` Daniel P. Berrangé 2019-08-22 11:13 ` Maxim Levitsky 2019-08-20 17:36 ` [Qemu-devel] " Max Reitz 2019-08-21 23:59 ` Maxim Levitsky 2019-08-22 14:32 ` Max Reitz 2019-08-25 10:46 ` Maxim Levitsky 2019-08-14 20:22 ` [Qemu-devel] [PATCH 03/13] qcrypto-luks: refactoring: extract load/store/check/parse header functions Maxim Levitsky 2019-08-20 18:01 ` Max Reitz 2019-08-21 22:43 ` Maxim Levitsky 2019-08-22 10:32 ` Daniel P. Berrangé 2019-08-22 10:57 ` Maxim Levitsky 2019-08-22 10:34 ` Daniel P. Berrangé 2019-08-25 14:11 ` Maxim Levitsky 2019-08-22 10:38 ` Daniel P. Berrangé 2019-08-25 14:09 ` Maxim Levitsky 2019-08-14 20:22 ` [Qemu-devel] [PATCH 04/13] qcrypto-luks: refactoring: simplify the math used for keyslot locations Maxim Levitsky 2019-08-22 10:47 ` Daniel P. Berrangé 2019-08-25 14:30 ` Maxim Levitsky 2019-08-14 20:22 ` [Qemu-devel] [PATCH 05/13] qcrypto-luks: clear the masterkey and password before freeing them always Maxim Levitsky 2019-08-20 18:12 ` Max Reitz 2019-08-21 22:40 ` Maxim Levitsky 2019-08-22 10:49 ` Daniel P. Berrangé 2019-08-22 10:56 ` Maxim Levitsky 2019-08-25 15:31 ` Maxim Levitsky 2019-08-25 17:15 ` Maxim Levitsky 2019-08-27 8:55 ` Daniel P. Berrangé 2019-08-21 23:01 ` [Qemu-devel] [Qemu-block] " Nir Soffer 2019-08-21 23:11 ` Maxim Levitsky 2019-08-14 20:22 ` [Qemu-devel] [PATCH 06/13] qcrypto-luks: implement more rigorous header checking Maxim Levitsky 2019-08-22 11:04 ` Daniel P. Berrangé 2019-08-25 15:40 ` Maxim Levitsky 2019-08-25 16:08 ` Maxim Levitsky 2019-08-26 13:31 ` Eric Blake 2019-08-26 13:39 ` Maxim Levitsky 2019-08-27 8:56 ` Daniel P. Berrangé 2019-08-14 20:22 ` [Qemu-devel] [PATCH 07/13] block: add manage-encryption command (qmp and blockdev) Maxim Levitsky 2019-08-20 18:27 ` Max Reitz 2019-08-21 22:32 ` Maxim Levitsky 2019-08-22 11:14 ` Daniel P. Berrangé 2019-08-21 11:47 ` Markus Armbruster 2019-08-21 22:24 ` Maxim Levitsky 2019-08-22 14:07 ` Markus Armbruster 2019-08-25 16:42 ` Maxim Levitsky 2019-08-14 20:22 ` [Qemu-devel] [PATCH 08/13] qcrypto: add the plumbing for encryption management Maxim Levitsky 2019-08-22 11:16 ` Daniel P. Berrangé 2019-08-22 11:47 ` Maxim Levitsky 2019-08-22 11:49 ` Daniel P. Berrangé 2019-08-14 20:22 ` [Qemu-devel] [PATCH 09/13] qcrypto-luks: implement the encryption key management Maxim Levitsky 2019-08-22 11:27 ` Daniel P. Berrangé 2019-08-25 17:01 ` Maxim Levitsky 2019-08-14 20:22 ` [Qemu-devel] [PATCH 10/13] block/crypto: " Maxim Levitsky 2019-08-22 11:29 ` Daniel P. Berrangé 2019-08-22 11:36 ` Maxim Levitsky 2019-08-14 20:22 ` [Qemu-devel] [PATCH 11/13] block/qcow2: implement the encryption key managment Maxim Levitsky 2019-08-14 20:22 ` [Qemu-devel] [PATCH 12/13] qemu-img: implement key management Maxim Levitsky 2019-08-20 18:29 ` Max Reitz 2019-08-21 22:33 ` Maxim Levitsky 2019-08-22 11:32 ` Daniel P. Berrangé 2019-08-22 14:42 ` Max Reitz 2019-08-25 17:04 ` Maxim Levitsky 2019-08-14 20:22 ` [Qemu-devel] [PATCH 13/13] iotests : add tests for encryption " Maxim Levitsky 2019-08-14 21:08 ` [Qemu-devel] [PATCH 00/13] RFC: luks/encrypted qcow2 " Eric Blake 2019-08-15 8:49 ` Maxim Levitsky 2019-08-15 9:10 ` Kevin Wolf 2019-08-15 14:18 ` Markus Armbruster 2019-08-15 14:44 ` Maxim Levitsky 2019-08-15 15:00 ` Eric Blake 2019-08-19 12:35 ` Maxim Levitsky 2019-08-21 11:31 ` Markus Armbruster 2019-08-21 13:22 ` Maxim Levitsky 2019-08-20 17:59 ` Max Reitz 2019-08-21 22:00 ` Maxim Levitsky 2019-08-22 11:35 ` Daniel P. Berrangé 2019-08-25 17:10 ` Maxim Levitsky
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=6b9b4bf7-5765-400b-7452-e37ec797eed1@redhat.com \ --to=jsnow@redhat.com \ --cc=armbru@redhat.com \ --cc=berrange@redhat.com \ --cc=fam@euphon.net \ --cc=kwolf@redhat.com \ --cc=mlevitsk@redhat.com \ --cc=mreitz@redhat.com \ --cc=qemu-block@nongnu.org \ --cc=qemu-devel@nongnu.org \ --cc=stefanha@redhat.com \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: link
QEMU-Devel Archive on lore.kernel.org Archives are clonable: git clone --mirror https://lore.kernel.org/qemu-devel/0 qemu-devel/git/0.git git clone --mirror https://lore.kernel.org/qemu-devel/1 qemu-devel/git/1.git git clone --mirror https://lore.kernel.org/qemu-devel/2 qemu-devel/git/2.git # If you have public-inbox 1.1+ installed, you may # initialize and index your mirror using the following commands: public-inbox-init -V2 qemu-devel qemu-devel/ https://lore.kernel.org/qemu-devel \ qemu-devel@nongnu.org public-inbox-index qemu-devel Example config snippet for mirrors Newsgroup available over NNTP: nntp://nntp.lore.kernel.org/org.nongnu.qemu-devel AGPL code for this site: git clone https://public-inbox.org/public-inbox.git