instantiate the key and make sure the QEMU process has access
permissions to read it.
Signed-off-by: Alexey Krasikov
Reviewed-by: Daniel P. Berrangé
---
configure | 38
crypto/Makefile.objs| 1 +
crypto/secret_keyring.c | 148
skipped in this case.
Signed-off-by: Alexey Krasikov
---
configure | 24 ++
tests/Makefile.include | 4 +
tests/test-crypto-secret.c | 158 +
3 files changed, 186 insertions(+)
diff --git a/configure b/configure
index 3c83504c95
mmon' with 'data'
and 'file' properties.
Signed-off-by: Alexey Krasikov
---
crypto/Makefile.objs | 1 +
crypto/secret.c| 347 +---
crypto/secret_common.c | 403 +
include/crypt
output summary.
- removed the 'linux/keyctl.h' include from configure keyutils test;
- temporary added 'g_test_skip()' at start of the metod
'test_secret_keyring_bad_key_access_right()'.
Alexey Krasikov (3):
crypto/secret: move main logic from 'secret' t
mmon' with 'data'
and 'file' properties.
Signed-off-by: Alexey Krasikov
---
crypto/Makefile.objs | 1 +
crypto/secret.c| 351 +---
crypto/secret_common.c | 407 +
include/crypt
skipped in this case.
Signed-off-by: Alexey Krasikov
---
configure | 25 ++
tests/Makefile.include | 4 +
tests/test-crypto-secret.c | 154 +
3 files changed, 183 insertions(+)
diff --git a/configure b/configure
index 1bae5ec0a1
instantiate the key and make sure the QEMU process has access
permissions to read it.
Signed-off-by: Alexey Krasikov
---
configure | 38
crypto/Makefile.objs| 1 +
crypto/secret_keyring.c | 148
include/crypto
parameters
to provide this feature.
Example:
$QEMU -object secret_keyring,id=sec0,serial=0x15968230
Alexey Krasikov (3):
crypto/secret: move main logic from 'secret' to 'secret_common'.
crypto/linux_keyring: add 'secret_keyring' secret object.
test-crypto-s
* Remove individual option fields. Common field have been left.
Signed-off-by: Alexey Krasikov
---
crypto/Makefile.objs | 1 +
crypto/secret_interface.c | 156 ++
include/crypto/secret_interface.h | 119 ---
3 files changed
* Add child 'secret' class from basic 'secret_common'
with 'data' and 'file' properties.
Signed-off-by: Alexey Krasikov
---
crypto/secret.c | 167
include/crypto/secret.h | 133 +
need to instantiate the key and make sure the QEMU process has access
rights to read it.
Signed-off-by: Alexey Krasikov
---
crypto/Makefile.objs | 1 +
crypto/linux_keyring.c | 140 +
include/crypto/linux_keyring.h | 38 +
3 files
* Rename for future division into subclasses. Most part of the interface
will remain in basic common class.
Signed-off-by: Alexey Krasikov
---
crypto/{secret.c => secret_interface.c} | 0
include/crypto/{secret.h => secret_interface.h} | 0
2 files changed, 0 insertions
* test_secret_seckey_bad_key_access_right() is not working yet.
We don't know yet if this due a bag in the Linux kernel or
whether it's normal syscall behavior.
We've requested information from kernel maintainer.
Signed-off-by: Alexey Krasikov
---
tests/test-crypto
* change condition from QCRYPTO_SECRET_FORMAT_RAW
to QCRYPTO_SECRET_FORMAT_BASE64 in if-operator, because
this is potencial error if you add another format value.
Signed-off-by: Alexey Krasikov
---
crypto/secret.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/crypto
* Get function returned value of properties 'data' insteed of returning
value of raw data internal field. This error did not affect anyone,
because no one called the get function.
Signed-off-by: Alexey Krasikov
---
crypto/secret.c | 2 +-
1 file changed, 1 insertion(+), 1 deletio
instantiate the key and make sure the QEMU process has access
rights to read it.
Signed-off-by: Alexey Krasikov
---
crypto/secret.c | 88 +++--
include/crypto/secret.h | 3 ++
2 files changed, 88 insertions(+), 3 deletions(-)
diff --git a/crypto/secret.c
16 matches
Mail list logo