From: Paolo Abeni <pabeni@redhat.com>
To: lucien.xin@gmail.com
Cc: hepengtao@xiaomi.com, kuba@kernel.org, jlayton@kernel.org,
metze@samba.org, davem@davemloft.net,
kernel-tls-handshake@lists.linux.dev, horms@kernel.org,
hare@suse.de, aahringo@redhat.com, tfanelli@redhat.com,
mail@johnericson.me, andrew.gospodarek@broadcom.com,
linkinjeon@kernel.org, dhowells@redhat.com, matttbe@kernel.org,
xiyou.wangcong@gmail.com, dreibh@simula.no, jbaron@akamai.com,
quic@lists.linux.dev, pc@manguebit.com, marc@fiuczynski.com,
edumazet@google.com, pabeni@redhat.com,
alibuda@linux.alibaba.com, steved@redhat.com,
illiliti@protonmail.com, tom@talpey.com,
marcelo.leitner@gmail.com, sd@queasysnail.net,
linux-cifs@vger.kernel.org, netdev@vger.kernel.org,
mbuhl@openbsd.org, smfrench@gmail.com, chuck.lever@oracle.com,
daniel@haxx.se
Subject: Re: [net-next,v10,11/15] quic: add crypto key derivation and installation
Date: Tue, 3 Mar 2026 09:32:33 +0100 [thread overview]
Message-ID: <20260303083233.34650-1-pabeni@redhat.com> (raw)
In-Reply-To: <323138c6deed2652a09aa38dfbe322642b6ad150.1771986861.git.lucien.xin@gmail.com>
This is an AI-generated review of your patch. The human sending this
email has considered the AI review valid, or at least plausible.
For local reproduction steps see https://netdev-ai.bots.linux.dev/ai-local.html
---
quic: add crypto key derivation and installation
This patch introduces 'quic_crypto', a component responsible for QUIC
encryption key derivation and installation across the various key
levels: Initial, Handshake, 0-RTT (Early), and 1-RTT (Application).
It provides helpers to derive and install initial secrets, set traffic
secrets and install the corresponding keys, and perform key updates to
enable forward secrecy.
> diff --git a/net/quic/Makefile b/net/quic/Makefile
> index 9d8e18297911..58bb18f7926d 100644
> --- a/net/quic/Makefile
> +++ b/net/quic/Makefile
> @@ -6,4 +6,4 @@
> obj-$(CONFIG_IP_QUIC) += quic.o
>
> quic-y := common.o family.o protocol.o socket.o stream.o connid.o path.o \
> - cong.o pnspace.o
> + cong.o pnspace.o crypto.o
> diff --git a/net/quic/crypto.c b/net/quic/crypto.c
> new file mode 100644
> index 000000000000..a9de418e604e
> --- /dev/null
> +++ b/net/quic/crypto.c
[ ... ]
> +/* Initial Secrets. */
> +int quic_crypto_initial_keys_install(struct quic_crypto *crypto, struct quic_conn_id *conn_id,
> + u32 version, bool is_serv)
> +{
> + u8 secret[TLS_CIPHER_AES_GCM_128_SECRET_SIZE];
> + struct quic_data salt, s, k, l, dcid, z = {};
> + struct quic_crypto_secret srt = {};
> + char *tl, *rl, *sal;
> + int err;
> +
> + if (is_serv) {
> + rl = "client in";
> + tl = "server in";
> + } else {
> + tl = "client in";
> + rl = "server in";
> + }
> + sal = QUIC_INITIAL_SALT_V1;
> + if (version == QUIC_VERSION_V2)
> + sal = QUIC_INITIAL_SALT_V2;
> + quic_data(&salt, sal, QUIC_INITIAL_SALT_LEN);
> + quic_data(&dcid, conn_id->data, conn_id->len);
> + quic_data(&s, secret, TLS_CIPHER_AES_GCM_128_SECRET_SIZE);
> + err = quic_crypto_hkdf_extract(crypto->secret_tfm, &salt, &dcid, &s);
Is crypto->secret_tfm guaranteed to be initialized at this point?
Looking at the function flow, this line uses crypto->secret_tfm before
quic_crypto_set_secret() below gets a chance to initialize the cipher:
quic_crypto_initial_keys_install() {
err = quic_crypto_hkdf_extract(crypto->secret_tfm, ...); /* line 490 */
...
err = quic_crypto_set_secret(crypto, &srt, version, 0); /* line 497 */
}
If quic_crypto_set_cipher() hasn't been called on this struct quic_crypto
yet, crypto->secret_tfm is NULL.
This contrasts with quic_crypto_set_secret(), which has lazy initialization:
quic_crypto_set_secret() {
if (!crypto->cipher) {
err = quic_crypto_set_cipher(crypto, srt->type, flag);
if (err)
return err;
}
...
}
Without this initialization, quic_crypto_hkdf_extract() flows through
hkdf_extract() -> crypto_shash_setkey(NULL, ...), causing a NULL pointer
dereference.
Would it make sense to call quic_crypto_set_cipher() before using
secret_tfm, or to reorder the function so quic_crypto_set_secret() is
called first?
> + if (err)
> + goto out;
> +
> + quic_data(&l, tl, strlen(tl));
> + quic_data(&k, srt.secret, TLS_CIPHER_AES_GCM_128_SECRET_SIZE);
> + srt.type = TLS_CIPHER_AES_GCM_128;
> + srt.send = 1;
> + err = quic_crypto_hkdf_expand(crypto->secret_tfm, &s, &l, &z, &k);
> + if (err)
> + goto out;
> + err = quic_crypto_set_secret(crypto, &srt, version, 0);
> + if (err)
> + goto out;
> +
> + quic_data(&l, rl, strlen(rl));
> + quic_data(&k, srt.secret, TLS_CIPHER_AES_GCM_128_SECRET_SIZE);
> + srt.type = TLS_CIPHER_AES_GCM_128;
> + srt.send = 0;
> + err = quic_crypto_hkdf_expand(crypto->secret_tfm, &s, &l, &z, &k);
> + if (err)
> + goto out;
> + err = quic_crypto_set_secret(crypto, &srt, version, 0);
> +out:
> + memzero_explicit(secret, sizeof(secret));
> + memzero_explicit(&srt, sizeof(srt));
> + return err;
> +}
[ ... ]
> +/* Derive and install transmission (TX) packet protection keys for the current key phase.
> + * This involves generating AEAD encryption key, IV, and optionally header protection key.
> + */
> +static int quic_crypto_tx_keys_derive_and_install(struct quic_crypto *crypto)
> +{
> + struct quic_data srt = {}, k, iv, hp_k = {}, *hp = NULL;
> + u8 tx_key[QUIC_KEY_LEN], tx_hp_key[QUIC_KEY_LEN] = {};
> + int err, phase = crypto->key_phase;
> + u32 keylen, ivlen = QUIC_IV_LEN;
> +
> + keylen = crypto->cipher->keylen;
> + quic_data(&srt, crypto->tx_secret, crypto->cipher->secretlen);
> + quic_data(&k, tx_key, keylen);
> + quic_data(&iv, crypto->tx_iv[phase], ivlen);
> + /* Only derive header protection key when not in key update. */
> + if (!crypto->key_pending)
> + hp = quic_data(&hp_k, tx_hp_key, keylen);
> + err = quic_crypto_keys_derive(crypto->secret_tfm, &srt, &k, &iv, hp, crypto->version);
> + if (err)
> + goto out;
> + err = crypto_aead_setauthsize(crypto->tx_tfm[phase], QUIC_TAG_LEN);
> + if (err)
> + goto out;
> + err = crypto_aead_setkey(crypto->tx_tfm[phase], tx_key, keylen);
> + if (err)
> + goto out;
> + if (hp) {
> + err = crypto_skcipher_setkey(crypto->tx_hp_tfm, tx_hp_key, keylen);
> + if (err)
> + goto out;
> + }
> + pr_debug("%s: k: %16phN, iv: %12phN, hp_k:%16phN\n", __func__, k.data, iv.data, tx_hp_key);
> +out:
> + memzero_explicit(tx_key, sizeof(tx_key));
> + memzero_explicit(tx_hp_key, sizeof(tx_hp_key));
> + return err;
> +}
> +
> +/* Derive and install reception (RX) packet protection keys for the current key phase.
> + * This installs AEAD decryption key, IV, and optionally header protection key.
> + */
> +static int quic_crypto_rx_keys_derive_and_install(struct quic_crypto *crypto)
> +{
> + struct quic_data srt = {}, k, iv, hp_k = {}, *hp = NULL;
> + u8 rx_key[QUIC_KEY_LEN], rx_hp_key[QUIC_KEY_LEN] = {};
> + int err, phase = crypto->key_phase;
> + u32 keylen, ivlen = QUIC_IV_LEN;
> +
> + keylen = crypto->cipher->keylen;
> + quic_data(&srt, crypto->rx_secret, crypto->cipher->secretlen);
> + quic_data(&k, rx_key, keylen);
> + quic_data(&iv, crypto->rx_iv[phase], ivlen);
> + /* Only derive header protection key when not in key update. */
> + if (!crypto->key_pending)
> + hp = quic_data(&hp_k, rx_hp_key, keylen);
> + err = quic_crypto_keys_derive(crypto->secret_tfm, &srt, &k, &iv, hp, crypto->version);
> + if (err)
> + goto out;
> + err = crypto_aead_setauthsize(crypto->rx_tfm[phase], QUIC_TAG_LEN);
> + if (err)
> + goto out;
> + err = crypto_aead_setkey(crypto->rx_tfm[phase], rx_key, keylen);
> + if (err)
> + goto out;
> + if (hp) {
> + err = crypto_skcipher_setkey(crypto->rx_hp_tfm, rx_hp_key, keylen);
> + if (err)
> + goto out;
> + }
> + pr_debug("%s: k: %16phN, iv: %12phN, hp_k:%16phN\n", __func__, k.data, iv.data, rx_hp_key);
> +out:
> + memzero_explicit(rx_key, sizeof(rx_key));
> + memzero_explicit(rx_hp_key, sizeof(rx_hp_key));
> + return err;
> +}
This isn't a bug, but these two functions are nearly identical.
quic_crypto_tx_keys_derive_and_install() and
quic_crypto_rx_keys_derive_and_install() share the same structure: derive
keys via quic_crypto_keys_derive(), set AEAD auth size and key,
conditionally set the HP skcipher key, pr_debug, and memzero_explicit the
temporaries.
The only differences are the member names accessed (tx_secret vs
rx_secret, tx_iv vs rx_iv, tx_tfm vs rx_tfm, tx_hp_tfm vs rx_hp_tfm).
Could these be unified into a single static helper that takes
direction-specific pointers as parameters?
This would eliminate the duplication and reduce the risk of the two
copies diverging in future maintenance.
[ ... ]
next prev parent reply other threads:[~2026-03-03 8:33 UTC|newest]
Thread overview: 34+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-02-25 2:34 [PATCH net-next v10 00/15] net: introduce QUIC infrastructure and core subcomponents Xin Long
2026-02-25 2:34 ` [PATCH net-next v10 01/15] net: define IPPROTO_QUIC and SOL_QUIC constants Xin Long
2026-02-25 2:34 ` [PATCH net-next v10 02/15] net: build socket infrastructure for QUIC protocol Xin Long
2026-02-25 2:34 ` [PATCH net-next v10 03/15] quic: provide common utilities and data structures Xin Long
2026-02-25 2:34 ` [PATCH net-next v10 04/15] quic: provide family ops for address and protocol Xin Long
2026-02-25 2:34 ` [PATCH net-next v10 05/15] quic: provide quic.h header files for kernel and userspace Xin Long
2026-02-25 2:34 ` [PATCH net-next v10 06/15] quic: add stream management Xin Long
2026-02-25 2:34 ` [PATCH net-next v10 07/15] quic: add connection id management Xin Long
2026-02-25 2:34 ` [PATCH net-next v10 08/15] quic: add path management Xin Long
2026-03-03 8:22 ` Paolo Abeni
2026-03-04 21:25 ` Xin Long
2026-02-25 2:34 ` [PATCH net-next v10 09/15] quic: add congestion control Xin Long
2026-03-03 8:32 ` [net-next,v10,09/15] " Paolo Abeni
2026-03-04 21:41 ` Xin Long
2026-02-25 2:34 ` [PATCH net-next v10 10/15] quic: add packet number space Xin Long
2026-02-25 2:34 ` [PATCH net-next v10 11/15] quic: add crypto key derivation and installation Xin Long
2026-03-03 8:32 ` Paolo Abeni [this message]
2026-03-04 21:58 ` [net-next,v10,11/15] " Xin Long
2026-02-25 2:34 ` [PATCH net-next v10 12/15] quic: add crypto packet encryption and decryption Xin Long
2026-03-03 8:32 ` [net-next,v10,12/15] " Paolo Abeni
2026-03-04 22:31 ` Xin Long
2026-02-25 2:34 ` [PATCH net-next v10 13/15] quic: add timer management Xin Long
2026-03-03 8:33 ` [net-next,v10,13/15] " Paolo Abeni
2026-03-04 23:03 ` Xin Long
2026-02-25 2:34 ` [PATCH net-next v10 14/15] quic: add packet builder base Xin Long
2026-03-03 8:33 ` [net-next,v10,14/15] " Paolo Abeni
2026-03-04 23:13 ` Xin Long
2026-03-03 9:18 ` [PATCH net-next v10 14/15] " Paolo Abeni
2026-03-04 23:26 ` Xin Long
2026-02-25 2:34 ` [PATCH net-next v10 15/15] quic: add packet parser base Xin Long
2026-03-03 8:33 ` [net-next,v10,15/15] " Paolo Abeni
2026-03-04 23:37 ` Xin Long
2026-03-03 9:16 ` [PATCH net-next v10 15/15] " Paolo Abeni
2026-03-05 0:14 ` Xin Long
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260303083233.34650-1-pabeni@redhat.com \
--to=pabeni@redhat.com \
--cc=aahringo@redhat.com \
--cc=alibuda@linux.alibaba.com \
--cc=andrew.gospodarek@broadcom.com \
--cc=chuck.lever@oracle.com \
--cc=daniel@haxx.se \
--cc=davem@davemloft.net \
--cc=dhowells@redhat.com \
--cc=dreibh@simula.no \
--cc=edumazet@google.com \
--cc=hare@suse.de \
--cc=hepengtao@xiaomi.com \
--cc=horms@kernel.org \
--cc=illiliti@protonmail.com \
--cc=jbaron@akamai.com \
--cc=jlayton@kernel.org \
--cc=kernel-tls-handshake@lists.linux.dev \
--cc=kuba@kernel.org \
--cc=linkinjeon@kernel.org \
--cc=linux-cifs@vger.kernel.org \
--cc=lucien.xin@gmail.com \
--cc=mail@johnericson.me \
--cc=marc@fiuczynski.com \
--cc=marcelo.leitner@gmail.com \
--cc=matttbe@kernel.org \
--cc=mbuhl@openbsd.org \
--cc=metze@samba.org \
--cc=netdev@vger.kernel.org \
--cc=pc@manguebit.com \
--cc=quic@lists.linux.dev \
--cc=sd@queasysnail.net \
--cc=smfrench@gmail.com \
--cc=steved@redhat.com \
--cc=tfanelli@redhat.com \
--cc=tom@talpey.com \
--cc=xiyou.wangcong@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox