<feed xmlns='http://www.w3.org/2005/Atom'>
<title>bwlp/qemu.git/crypto, branch master</title>
<subtitle>Experimental fork of QEMU with video encoding patches</subtitle>
<id>https://git.openslx.org/bwlp/qemu.git/atom/crypto?h=master</id>
<link rel='self' href='https://git.openslx.org/bwlp/qemu.git/atom/crypto?h=master'/>
<link rel='alternate' type='text/html' href='https://git.openslx.org/bwlp/qemu.git/'/>
<updated>2022-11-02T10:56:32+00:00</updated>
<entry>
<title>crypto: Support export akcipher to pkcs8</title>
<updated>2022-11-02T10:56:32+00:00</updated>
<author>
<name>Lei He</name>
</author>
<published>2022-10-08T08:50:29+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/bwlp/qemu.git/commit/?id=58660863ba5ca4f74fa70671da2899b264dc5f34'/>
<id>urn:sha1:58660863ba5ca4f74fa70671da2899b264dc5f34</id>
<content type='text'>
crypto: support export RSA private keys with PKCS#8 standard.
So that users can upload this private key to linux kernel.

Signed-off-by: lei he &lt;helei.sig11@bytedance.com&gt;
Message-Id: &lt;20221008085030.70212-4-helei.sig11@bytedance.com&gt;
Reviewed-by: Michael S. Tsirkin &lt;mst@redhat.com&gt;
Signed-off-by: Michael S. Tsirkin &lt;mst@redhat.com&gt;
Reviewed-by: Daniel P. Berrangé &lt;berrange@redhat.com&gt;
</content>
</entry>
<entry>
<title>crypto: Support DER encodings</title>
<updated>2022-11-02T10:56:32+00:00</updated>
<author>
<name>Lei He</name>
</author>
<published>2022-10-08T08:50:28+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/bwlp/qemu.git/commit/?id=3b34ccad6695f3fd3e48555d895d450f750c00e6'/>
<id>urn:sha1:3b34ccad6695f3fd3e48555d895d450f750c00e6</id>
<content type='text'>
Add encoding interfaces for DER encoding:
1. support decoding of 'bit string', 'octet string', 'object id'
and 'context specific tag' for DER encoder.
2. implemented a simple DER encoder.
3. add more testsuits for DER encoder.

Signed-off-by: lei he &lt;helei.sig11@bytedance.com&gt;
Message-Id: &lt;20221008085030.70212-3-helei.sig11@bytedance.com&gt;
Reviewed-by: Michael S. Tsirkin &lt;mst@redhat.com&gt;
Signed-off-by: Michael S. Tsirkin &lt;mst@redhat.com&gt;
Reviewed-by: Daniel P. Berrangé &lt;berrange@redhat.com&gt;
</content>
</entry>
<entry>
<title>crypto: quote algorithm names in error messages</title>
<updated>2022-10-27T11:55:27+00:00</updated>
<author>
<name>Daniel P. Berrangé</name>
</author>
<published>2022-09-05T11:08:21+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/bwlp/qemu.git/commit/?id=6c1989321eb95d5d2e29d3537484836bf0f21744'/>
<id>urn:sha1:6c1989321eb95d5d2e29d3537484836bf0f21744</id>
<content type='text'>
If given a malformed LUKS header, it is possible that the algorithm
names end up being an empty string. This leads to confusing error
messages unless quoting is used to highlight where the empty string
is subsituted in the error message.

Reviewed-by: Richard W.M. Jones &lt;rjones@redhat.com&gt;
Signed-off-by: Daniel P. Berrangé &lt;berrange@redhat.com&gt;
</content>
</entry>
<entry>
<title>crypto: split off helpers for converting LUKS header endianess</title>
<updated>2022-10-27T11:55:27+00:00</updated>
<author>
<name>Daniel P. Berrangé</name>
</author>
<published>2022-05-10T14:40:55+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/bwlp/qemu.git/commit/?id=98c72dfb714385b03da03abb45f931a14af6138e'/>
<id>urn:sha1:98c72dfb714385b03da03abb45f931a14af6138e</id>
<content type='text'>
The unit test suite is shortly going to want to convert header
endianness separately from the main I/O functions.

Reviewed-by: Richard W.M. Jones &lt;rjones@redhat.com&gt;
Signed-off-by: Daniel P. Berrangé &lt;berrange@redhat.com&gt;
</content>
</entry>
<entry>
<title>crypto: split LUKS header definitions off into file</title>
<updated>2022-10-27T11:55:27+00:00</updated>
<author>
<name>Daniel P. Berrangé</name>
</author>
<published>2022-05-10T14:19:58+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/bwlp/qemu.git/commit/?id=36445acebdd100237551b47b4fd77f0c5403a10f'/>
<id>urn:sha1:36445acebdd100237551b47b4fd77f0c5403a10f</id>
<content type='text'>
This will allow unit testing code to use the structs.

Reviewed-by: Richard W.M. Jones &lt;rjones@redhat.com&gt;
Signed-off-by: Daniel P. Berrangé &lt;berrange@redhat.com&gt;
</content>
</entry>
<entry>
<title>crypto: check that LUKS PBKDF2 iterations count is non-zero</title>
<updated>2022-10-27T11:55:27+00:00</updated>
<author>
<name>Daniel P. Berrangé</name>
</author>
<published>2022-09-05T12:52:29+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/bwlp/qemu.git/commit/?id=b57151ac0366d3fb14318a55b0fc943134f7f80b'/>
<id>urn:sha1:b57151ac0366d3fb14318a55b0fc943134f7f80b</id>
<content type='text'>
Both the master key and key slot passphrases are run through the PBKDF2
algorithm. The iterations count is expected to be generally very large
(many 10's or 100's of 1000s). It is hard to define a low level cutoff,
but we can certainly say that iterations count should be non-zero. A
zero count likely indicates an initialization mistake so reject it.

Reviewed-by: Richard W.M. Jones &lt;rjones@redhat.com&gt;
Signed-off-by: Daniel P. Berrangé &lt;berrange@redhat.com&gt;
</content>
</entry>
<entry>
<title>crypto: strengthen the check for key slots overlapping with LUKS header</title>
<updated>2022-10-27T11:55:27+00:00</updated>
<author>
<name>Daniel P. Berrangé</name>
</author>
<published>2022-09-05T12:57:01+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/bwlp/qemu.git/commit/?id=c5f6962801b868b02fbaf01861f64783470d3d2a'/>
<id>urn:sha1:c5f6962801b868b02fbaf01861f64783470d3d2a</id>
<content type='text'>
The LUKS header data on disk is a fixed size, however, there's expected
to be a gap between the end of the header and the first key slot to get
alignment with the 2nd sector on 4k drives. This wasn't originally part
of the LUKS spec, but was always part of the reference implementation,
so it is worth validating this.

Reviewed-by: Richard W.M. Jones &lt;rjones@redhat.com&gt;
Signed-off-by: Daniel P. Berrangé &lt;berrange@redhat.com&gt;
</content>
</entry>
<entry>
<title>crypto: validate that LUKS payload doesn't overlap with header</title>
<updated>2022-10-27T11:55:27+00:00</updated>
<author>
<name>Daniel P. Berrangé</name>
</author>
<published>2022-09-05T12:50:03+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/bwlp/qemu.git/commit/?id=d233fbc327d3f1f03bc30e0486b9ade3aa23f9ec'/>
<id>urn:sha1:d233fbc327d3f1f03bc30e0486b9ade3aa23f9ec</id>
<content type='text'>
We already validate that LUKS keyslots don't overlap with the
header, or with each other. This closes the remaining hole in
validation of LUKS file regions.

Reviewed-by: Richard W.M. Jones &lt;rjones@redhat.com&gt;
Signed-off-by: Daniel P. Berrangé &lt;berrange@redhat.com&gt;
</content>
</entry>
<entry>
<title>crypto: enforce that key material doesn't overlap with LUKS header</title>
<updated>2022-10-27T11:55:27+00:00</updated>
<author>
<name>Daniel P. Berrangé</name>
</author>
<published>2022-05-10T13:35:57+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/bwlp/qemu.git/commit/?id=93569c373027c5c46e518e01c0c3e2d07fbb6890'/>
<id>urn:sha1:93569c373027c5c46e518e01c0c3e2d07fbb6890</id>
<content type='text'>
We already check that key material doesn't overlap between key slots,
and that it doesn't overlap with the payload. We didn't check for
overlap with the LUKS header.

Reviewed-by: Richard W.M. Jones &lt;rjones@redhat.com&gt;
Signed-off-by: Daniel P. Berrangé &lt;berrange@redhat.com&gt;
</content>
</entry>
<entry>
<title>crypto: enforce that LUKS stripes is always a fixed value</title>
<updated>2022-10-27T11:55:27+00:00</updated>
<author>
<name>Daniel P. Berrangé</name>
</author>
<published>2022-05-10T13:27:33+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/bwlp/qemu.git/commit/?id=f1195961f36b19ce9008dabf11ee8362803bcd92'/>
<id>urn:sha1:f1195961f36b19ce9008dabf11ee8362803bcd92</id>
<content type='text'>
Although the LUKS stripes are encoded in the keyslot header and so
potentially configurable, in pratice the cryptsetup impl mandates
this has the fixed value 4000. To avoid incompatibility apply the
same enforcement in QEMU too. This also caps the memory usage for
key material when QEMU tries to open a LUKS volume.

Reviewed-by: Richard W.M. Jones &lt;rjones@redhat.com&gt;
Signed-off-by: Daniel P. Berrangé &lt;berrange@redhat.com&gt;
</content>
</entry>
</feed>
