mirror of
https://github.com/xemu-project/xemu.git
synced 2024-11-30 15:00:34 +00:00
e7b3af8159
Per supported platforms doc[1], the various min glib on relevant distros is: RHEL-7: 2.50.3 Debian (Stretch): 2.50.3 Debian (Jessie): 2.42.1 OpenBSD (Ports): 2.54.3 FreeBSD (Ports): 2.50.3 OpenSUSE Leap 15: 2.54.3 SLE12-SP2: 2.48.2 Ubuntu (Xenial): 2.48.0 macOS (Homebrew): 2.56.0 This suggests that a minimum glib of 2.42 is a reasonable target. The GLibC compile farm, however, uses Ubuntu 14.04 (Trusty) which only has glib 2.40.0, and this is needed for testing during merge. Thus an exception is made to the documented platform support policy to allow for all three current LTS releases to be supported. Docker jobs that not longer satisfy this new min version are removed. [1] https://qemu.weilnetz.de/doc/qemu-doc.html#Supported-build-platforms Reviewed-by: Thomas Huth <thuth@redhat.com> Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
101 lines
2.7 KiB
C
101 lines
2.7 KiB
C
/*
|
|
* QEMU Crypto hash algorithms
|
|
*
|
|
* Copyright (c) 2016 Red Hat, Inc.
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, see <http://www.gnu.org/licenses/>.
|
|
*
|
|
*/
|
|
|
|
#include "qemu/osdep.h"
|
|
#include "qapi/error.h"
|
|
#include "crypto/hash.h"
|
|
#include "hashpriv.h"
|
|
|
|
|
|
static int qcrypto_hash_alg_map[QCRYPTO_HASH_ALG__MAX] = {
|
|
[QCRYPTO_HASH_ALG_MD5] = G_CHECKSUM_MD5,
|
|
[QCRYPTO_HASH_ALG_SHA1] = G_CHECKSUM_SHA1,
|
|
[QCRYPTO_HASH_ALG_SHA224] = -1,
|
|
[QCRYPTO_HASH_ALG_SHA256] = G_CHECKSUM_SHA256,
|
|
[QCRYPTO_HASH_ALG_SHA384] = -1,
|
|
[QCRYPTO_HASH_ALG_SHA512] = G_CHECKSUM_SHA512,
|
|
[QCRYPTO_HASH_ALG_RIPEMD160] = -1,
|
|
};
|
|
|
|
gboolean qcrypto_hash_supports(QCryptoHashAlgorithm alg)
|
|
{
|
|
if (alg < G_N_ELEMENTS(qcrypto_hash_alg_map) &&
|
|
qcrypto_hash_alg_map[alg] != -1) {
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
|
|
static int
|
|
qcrypto_glib_hash_bytesv(QCryptoHashAlgorithm alg,
|
|
const struct iovec *iov,
|
|
size_t niov,
|
|
uint8_t **result,
|
|
size_t *resultlen,
|
|
Error **errp)
|
|
{
|
|
int i, ret;
|
|
GChecksum *cs;
|
|
|
|
if (!qcrypto_hash_supports(alg)) {
|
|
error_setg(errp,
|
|
"Unknown hash algorithm %d",
|
|
alg);
|
|
return -1;
|
|
}
|
|
|
|
cs = g_checksum_new(qcrypto_hash_alg_map[alg]);
|
|
|
|
for (i = 0; i < niov; i++) {
|
|
g_checksum_update(cs, iov[i].iov_base, iov[i].iov_len);
|
|
}
|
|
|
|
ret = g_checksum_type_get_length(qcrypto_hash_alg_map[alg]);
|
|
if (ret < 0) {
|
|
error_setg(errp, "%s",
|
|
"Unable to get hash length");
|
|
goto error;
|
|
}
|
|
if (*resultlen == 0) {
|
|
*resultlen = ret;
|
|
*result = g_new0(uint8_t, *resultlen);
|
|
} else if (*resultlen != ret) {
|
|
error_setg(errp,
|
|
"Result buffer size %zu is smaller than hash %d",
|
|
*resultlen, ret);
|
|
goto error;
|
|
}
|
|
|
|
g_checksum_get_digest(cs, *result, resultlen);
|
|
|
|
g_checksum_free(cs);
|
|
return 0;
|
|
|
|
error:
|
|
g_checksum_free(cs);
|
|
return -1;
|
|
}
|
|
|
|
|
|
QCryptoHashDriver qcrypto_hash_lib_driver = {
|
|
.hash_bytesv = qcrypto_glib_hash_bytesv,
|
|
};
|