<feed xmlns='http://www.w3.org/2005/Atom'>
<title>bwlp/qemu.git/crypto/Makefile.objs, branch spice_video_codecs</title>
<subtitle>Experimental fork of QEMU with video encoding patches</subtitle>
<id>https://git.openslx.org/bwlp/qemu.git/atom/crypto/Makefile.objs?h=spice_video_codecs</id>
<link rel='self' href='https://git.openslx.org/bwlp/qemu.git/atom/crypto/Makefile.objs?h=spice_video_codecs'/>
<link rel='alternate' type='text/html' href='https://git.openslx.org/bwlp/qemu.git/'/>
<updated>2020-08-21T10:30:16+00:00</updated>
<entry>
<title>meson: convert crypto directory to Meson</title>
<updated>2020-08-21T10:30:16+00:00</updated>
<author>
<name>Marc-André Lureau</name>
</author>
<published>2019-07-16T15:28:54+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/bwlp/qemu.git/commit/?id=5582c58f82b2a356cac721af2e973a6fc6880fc1'/>
<id>urn:sha1:5582c58f82b2a356cac721af2e973a6fc6880fc1</id>
<content type='text'>
Signed-off-by: Marc-André Lureau &lt;marcandre.lureau@redhat.com&gt;
Signed-off-by: Paolo Bonzini &lt;pbonzini@redhat.com&gt;
</content>
</entry>
<entry>
<title>libqemuutil, qapi, trace: convert to meson</title>
<updated>2020-08-21T10:30:08+00:00</updated>
<author>
<name>Paolo Bonzini</name>
</author>
<published>2020-08-19T12:44:56+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/bwlp/qemu.git/commit/?id=a81df1b68b656f2487f556240baf2af83e60ec6c'/>
<id>urn:sha1:a81df1b68b656f2487f556240baf2af83e60ec6c</id>
<content type='text'>
This shows how to do some "computations" in meson.build using its array
and dictionary data structures, and also a basic usage of the sourceset
module for conditional compilation.

Notice the new "if have_system" part of util/meson.build, which fixes
a bug in the old build system was buggy: util/dbus.c was built even for
non-softmmu builds, but the dependency on -lgio was lost when the linking
was done through libqemuutil.a.  Because all of its users required gio
otherwise, the bug was hidden.  Meson instead propagates libqemuutil's
dependencies down to its users, and shows the problem.

Signed-off-by: Paolo Bonzini &lt;pbonzini@redhat.com&gt;
</content>
</entry>
<entry>
<title>crypto: Add tls-cipher-suites object</title>
<updated>2020-07-03T16:16:01+00:00</updated>
<author>
<name>Philippe Mathieu-Daudé</name>
</author>
<published>2018-10-11T18:21:11+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/bwlp/qemu.git/commit/?id=993aec27aa39aa90f89f227d8f82cc1f8062386e'/>
<id>urn:sha1:993aec27aa39aa90f89f227d8f82cc1f8062386e</id>
<content type='text'>
On the host OS, various aspects of TLS operation are configurable.
In particular it is possible for the sysadmin to control the TLS
cipher/protocol algorithms that applications are permitted to use.

* Any given crypto library has a built-in default priority list
  defined by the distro maintainer of the library package (or by
  upstream).

* The "crypto-policies" RPM (or equivalent host OS package)
  provides a config file such as "/etc/crypto-policies/config",
  where the sysadmin can set a high level (library-independent)
  policy.

  The "update-crypto-policies --set" command (or equivalent) is
  used to translate the global policy to individual library
  representations, producing files such as
  "/etc/crypto-policies/back-ends/*.config". The generated files,
  if present, are loaded by the various crypto libraries to
  override their own built-in defaults.

  For example, the GNUTLS library may read
  "/etc/crypto-policies/back-ends/gnutls.config".

* A management application (or the QEMU user) may overide the
  system-wide crypto-policies config via their own config, if
  they need to diverge from the former.

Thus the priority order is "QEMU user config" &gt; "crypto-policies
system config" &gt; "library built-in config".

Introduce the "tls-cipher-suites" object for exposing the ordered
list of permitted TLS cipher suites from the host side to the
guest firmware, via fw_cfg. The list is represented as an array
of bytes.

The priority at which the host-side policy is retrieved is given
by the "priority" property of the new object type. For example,
"priority=@SYSTEM" may be used to refer to
"/etc/crypto-policies/back-ends/gnutls.config" (given that QEMU
uses GNUTLS).

The firmware uses the IANA_TLS_CIPHER array for configuring
guest-side TLS, for example in UEFI HTTPS Boot.

[Description from Daniel P. Berrangé, edited by Laszlo Ersek.]

Signed-off-by: Philippe Mathieu-Daudé &lt;philmd@redhat.com&gt;
Reviewed-by: Daniel P. Berrangé &lt;berrange@redhat.com&gt;
Acked-by: Laszlo Ersek &lt;lersek@redhat.com&gt;
Message-Id: &lt;20200623172726.21040-2-philmd@redhat.com&gt;
</content>
</entry>
<entry>
<title>crypto/linux_keyring: add 'secret_keyring' secret object.</title>
<updated>2020-06-15T10:33:51+00:00</updated>
<author>
<name>Alexey Krasikov</name>
</author>
<published>2020-05-25T11:19:12+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/bwlp/qemu.git/commit/?id=54e7aac0562452e4fcab65ca5001d030eef2de15'/>
<id>urn:sha1:54e7aac0562452e4fcab65ca5001d030eef2de15</id>
<content type='text'>
Add the ability for the secret object to obtain secret data from the
Linux in-kernel key managment and retention facility, as an extra option
to the existing ones: reading from a file or passing directly as a
string.

The secret is identified by the key serial number. The upper layers
need to instantiate the key and make sure the QEMU process has access
permissions to read it.

Signed-off-by: Alexey Krasikov &lt;alex-krasikov@yandex-team.ru&gt;

 - Fixed up detection logic default behaviour in configure

Signed-off-by: Daniel P. Berrangé &lt;berrange@redhat.com&gt;
</content>
</entry>
<entry>
<title>crypto/secret: move main logic from 'secret' to 'secret_common'.</title>
<updated>2020-06-15T10:33:51+00:00</updated>
<author>
<name>Alexey Krasikov</name>
</author>
<published>2020-05-25T11:16:53+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/bwlp/qemu.git/commit/?id=4862bd3cd2052f1b48e4d08b1820e70a255c4859'/>
<id>urn:sha1:4862bd3cd2052f1b48e4d08b1820e70a255c4859</id>
<content type='text'>
Create base class 'common secret'. Move common data and logic from
'secret' to 'common_secret' class. This allowed adding abstraction layer
for easier adding new 'secret' objects in future.
Convert 'secret' class to child from basic 'secret_common' with 'data'
and 'file' properties.

Signed-off-by: Alexey Krasikov &lt;alex-krasikov@yandex-team.ru&gt;
Signed-off-by: Daniel P. Berrangé &lt;berrange@redhat.com&gt;
</content>
</entry>
<entry>
<title>crypto: add "none" random provider</title>
<updated>2020-06-15T10:33:50+00:00</updated>
<author>
<name>Marek Marczykowski-Górecki</name>
</author>
<published>2020-05-20T13:20:23+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/bwlp/qemu.git/commit/?id=b767d2578da4a46ff5e353f14da6364b97df1020'/>
<id>urn:sha1:b767d2578da4a46ff5e353f14da6364b97df1020</id>
<content type='text'>
In case of not using random-number needing feature, it makes sense to
skip RNG init too. This is especially helpful when QEMU is sandboxed in
Stubdomain under Xen, where there is very little entropy so initial
getrandom() call delays the startup several seconds. In that setup, no
random bytes are needed at all.

Signed-off-by: Marek Marczykowski-Górecki &lt;marmarek@invisiblethingslab.com&gt;
Signed-off-by: Daniel P. Berrangé &lt;berrange@redhat.com&gt;
</content>
</entry>
<entry>
<title>stubs: replace stubs with lnot if applicable</title>
<updated>2019-12-17T18:32:48+00:00</updated>
<author>
<name>Paolo Bonzini</name>
</author>
<published>2019-08-06T13:12:18+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/bwlp/qemu.git/commit/?id=44e9f2309fdb1315fc7d0a2f37eee3fecd471308'/>
<id>urn:sha1:44e9f2309fdb1315fc7d0a2f37eee3fecd471308</id>
<content type='text'>
The stubs mechanism relies on static libraries and compilation order,
which is a bit brittle and should be avoided unless necessary.
Replace it with Boolean operations on CONFIG_* symbols.

Signed-off-by: Paolo Bonzini &lt;pbonzini@redhat.com&gt;
</content>
</entry>
<entry>
<title>crypto: move common bits for all emulators to libqemuutil</title>
<updated>2019-12-17T18:32:48+00:00</updated>
<author>
<name>Paolo Bonzini</name>
</author>
<published>2019-07-29T13:55:47+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/bwlp/qemu.git/commit/?id=b8d89ba83bf42be1f7b1d7d45236eaf6960d1c4e'/>
<id>urn:sha1:b8d89ba83bf42be1f7b1d7d45236eaf6960d1c4e</id>
<content type='text'>
qcrypto_random_*, AES and qcrypto_init do not need to be linked as a whole
and are the only parts that are used by user-mode emulation.  Place them
in libqemuutil, so that whatever needs them will pick them up automatically.

Signed-off-by: Paolo Bonzini &lt;pbonzini@redhat.com&gt;
</content>
</entry>
<entry>
<title>crypto: add support for gcrypt's native XTS impl</title>
<updated>2019-10-28T15:20:28+00:00</updated>
<author>
<name>Daniel P. Berrangé</name>
</author>
<published>2019-10-14T16:28:27+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/bwlp/qemu.git/commit/?id=e0576942e005de0f9226913cb0750cf445a33565'/>
<id>urn:sha1:e0576942e005de0f9226913cb0750cf445a33565</id>
<content type='text'>
Libgcrypt 1.8.0 added support for the XTS mode. Use this because long
term we wish to delete QEMU's XTS impl to avoid carrying private crypto
algorithm impls.

As an added benefit, using this improves performance from 531 MB/sec to
670 MB/sec, since we are avoiding several layers of function call
indirection.

This is even more noticable with the gcrypt builds in Fedora or RHEL-8
which have a non-upstream patch for FIPS mode which does mutex locking.
This is catastrophic for encryption performance with small block sizes,
meaning this patch improves encryption from 240 MB/sec to 670 MB/sec.

Reviewed-by: Philippe Mathieu-Daudé &lt;philmd@redhat.com&gt;
Reviewed-by: Stefano Garzarella &lt;sgarzare@redhat.com&gt;
Signed-off-by: Daniel P. Berrangé &lt;berrange@redhat.com&gt;
</content>
</entry>
<entry>
<title>build: Link user-only with crypto random number objects</title>
<updated>2019-05-22T16:38:54+00:00</updated>
<author>
<name>Richard Henderson</name>
</author>
<published>2019-05-16T22:29:06+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/bwlp/qemu.git/commit/?id=243dc2cf95298383b657cf95896615197d8b35aa'/>
<id>urn:sha1:243dc2cf95298383b657cf95896615197d8b35aa</id>
<content type='text'>
For user-only, we require only the random number bits of the
crypto subsystem.  Rename crypto-aes-obj-y to crypto-user-obj-y,
and add the random number objects, plus init.o to handle any
extra stuff the crypto library requires.

Move the crypto libraries from libs_softmmu and libs_tools to
LIBS, so that they are universally used.

Reviewed-by: Daniel P. Berrangé &lt;berrange@redhat.com&gt;
Signed-off-by: Richard Henderson &lt;richard.henderson@linaro.org&gt;
</content>
</entry>
</feed>
