mirror of
https://github.com/xemu-project/xemu.git
synced 2024-11-24 03:59:52 +00:00
69699f3055
Since our format is consumable by the fw_cfg device, we can implement the FW_CFG_DATA_GENERATOR interface. Example of use to dump the cipher suites (if tracing enabled): $ qemu-system-x86_64 -S \ -object tls-cipher-suites,id=mysuite1,priority=@SYSTEM \ -fw_cfg name=etc/path/to/ciphers,gen_id=mysuite1 \ -trace qcrypto\* 1590664444.197123:qcrypto_tls_cipher_suite_priority priority: @SYSTEM 1590664444.197219:qcrypto_tls_cipher_suite_info data=[0x13,0x02] version=TLS1.3 name=TLS_AES_256_GCM_SHA384 1590664444.197228:qcrypto_tls_cipher_suite_info data=[0x13,0x03] version=TLS1.3 name=TLS_CHACHA20_POLY1305_SHA256 1590664444.197233:qcrypto_tls_cipher_suite_info data=[0x13,0x01] version=TLS1.3 name=TLS_AES_128_GCM_SHA256 1590664444.197236:qcrypto_tls_cipher_suite_info data=[0x13,0x04] version=TLS1.3 name=TLS_AES_128_CCM_SHA256 1590664444.197240:qcrypto_tls_cipher_suite_info data=[0xc0,0x30] version=TLS1.2 name=TLS_ECDHE_RSA_AES_256_GCM_SHA384 1590664444.197245:qcrypto_tls_cipher_suite_info data=[0xcc,0xa8] version=TLS1.2 name=TLS_ECDHE_RSA_CHACHA20_POLY1305 1590664444.197250:qcrypto_tls_cipher_suite_info data=[0xc0,0x14] version=TLS1.0 name=TLS_ECDHE_RSA_AES_256_CBC_SHA1 1590664444.197254:qcrypto_tls_cipher_suite_info data=[0xc0,0x2f] version=TLS1.2 name=TLS_ECDHE_RSA_AES_128_GCM_SHA256 1590664444.197258:qcrypto_tls_cipher_suite_info data=[0xc0,0x13] version=TLS1.0 name=TLS_ECDHE_RSA_AES_128_CBC_SHA1 1590664444.197261:qcrypto_tls_cipher_suite_info data=[0xc0,0x2c] version=TLS1.2 name=TLS_ECDHE_ECDSA_AES_256_GCM_SHA384 1590664444.197266:qcrypto_tls_cipher_suite_info data=[0xcc,0xa9] version=TLS1.2 name=TLS_ECDHE_ECDSA_CHACHA20_POLY1305 1590664444.197270:qcrypto_tls_cipher_suite_info data=[0xc0,0xad] version=TLS1.2 name=TLS_ECDHE_ECDSA_AES_256_CCM 1590664444.197274:qcrypto_tls_cipher_suite_info data=[0xc0,0x0a] version=TLS1.0 name=TLS_ECDHE_ECDSA_AES_256_CBC_SHA1 1590664444.197278:qcrypto_tls_cipher_suite_info data=[0xc0,0x2b] version=TLS1.2 name=TLS_ECDHE_ECDSA_AES_128_GCM_SHA256 1590664444.197283:qcrypto_tls_cipher_suite_info data=[0xc0,0xac] version=TLS1.2 name=TLS_ECDHE_ECDSA_AES_128_CCM 1590664444.197287:qcrypto_tls_cipher_suite_info data=[0xc0,0x09] version=TLS1.0 name=TLS_ECDHE_ECDSA_AES_128_CBC_SHA1 1590664444.197291:qcrypto_tls_cipher_suite_info data=[0x00,0x9d] version=TLS1.2 name=TLS_RSA_AES_256_GCM_SHA384 1590664444.197296:qcrypto_tls_cipher_suite_info data=[0xc0,0x9d] version=TLS1.2 name=TLS_RSA_AES_256_CCM 1590664444.197300:qcrypto_tls_cipher_suite_info data=[0x00,0x35] version=TLS1.0 name=TLS_RSA_AES_256_CBC_SHA1 1590664444.197304:qcrypto_tls_cipher_suite_info data=[0x00,0x9c] version=TLS1.2 name=TLS_RSA_AES_128_GCM_SHA256 1590664444.197308:qcrypto_tls_cipher_suite_info data=[0xc0,0x9c] version=TLS1.2 name=TLS_RSA_AES_128_CCM 1590664444.197312:qcrypto_tls_cipher_suite_info data=[0x00,0x2f] version=TLS1.0 name=TLS_RSA_AES_128_CBC_SHA1 1590664444.197316:qcrypto_tls_cipher_suite_info data=[0x00,0x9f] version=TLS1.2 name=TLS_DHE_RSA_AES_256_GCM_SHA384 1590664444.197320:qcrypto_tls_cipher_suite_info data=[0xcc,0xaa] version=TLS1.2 name=TLS_DHE_RSA_CHACHA20_POLY1305 1590664444.197325:qcrypto_tls_cipher_suite_info data=[0xc0,0x9f] version=TLS1.2 name=TLS_DHE_RSA_AES_256_CCM 1590664444.197329:qcrypto_tls_cipher_suite_info data=[0x00,0x39] version=TLS1.0 name=TLS_DHE_RSA_AES_256_CBC_SHA1 1590664444.197333:qcrypto_tls_cipher_suite_info data=[0x00,0x9e] version=TLS1.2 name=TLS_DHE_RSA_AES_128_GCM_SHA256 1590664444.197337:qcrypto_tls_cipher_suite_info data=[0xc0,0x9e] version=TLS1.2 name=TLS_DHE_RSA_AES_128_CCM 1590664444.197341:qcrypto_tls_cipher_suite_info data=[0x00,0x33] version=TLS1.0 name=TLS_DHE_RSA_AES_128_CBC_SHA1 1590664444.197345:qcrypto_tls_cipher_suite_count count: 29 Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com> Reviewed-by: Daniel P. Berrangé <berrange@redhat.com> Acked-by: Laszlo Ersek <lersek@redhat.com> Message-Id: <20200623172726.21040-6-philmd@redhat.com>
127 lines
3.7 KiB
C
127 lines
3.7 KiB
C
/*
|
|
* QEMU TLS Cipher Suites
|
|
*
|
|
* Copyright (c) 2018-2020 Red Hat, Inc.
|
|
*
|
|
* Author: Philippe Mathieu-Daudé <philmd@redhat.com>
|
|
*
|
|
* SPDX-License-Identifier: GPL-2.0-or-later
|
|
*/
|
|
|
|
#include "qemu/osdep.h"
|
|
#include "qapi/error.h"
|
|
#include "qom/object_interfaces.h"
|
|
#include "crypto/tlscreds.h"
|
|
#include "crypto/tls-cipher-suites.h"
|
|
#include "hw/nvram/fw_cfg.h"
|
|
#include "trace.h"
|
|
|
|
/*
|
|
* IANA registered TLS ciphers:
|
|
* https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-4
|
|
*/
|
|
typedef struct {
|
|
uint8_t data[2];
|
|
} QEMU_PACKED IANA_TLS_CIPHER;
|
|
|
|
GByteArray *qcrypto_tls_cipher_suites_get_data(QCryptoTLSCipherSuites *obj,
|
|
Error **errp)
|
|
{
|
|
QCryptoTLSCreds *creds = QCRYPTO_TLS_CREDS(obj);
|
|
gnutls_priority_t pcache;
|
|
GByteArray *byte_array;
|
|
const char *err;
|
|
size_t i;
|
|
int ret;
|
|
|
|
trace_qcrypto_tls_cipher_suite_priority(creds->priority);
|
|
ret = gnutls_priority_init(&pcache, creds->priority, &err);
|
|
if (ret < 0) {
|
|
error_setg(errp, "Syntax error using priority '%s': %s",
|
|
creds->priority, gnutls_strerror(ret));
|
|
return NULL;
|
|
}
|
|
|
|
byte_array = g_byte_array_new();
|
|
|
|
for (i = 0;; i++) {
|
|
int ret;
|
|
unsigned idx;
|
|
const char *name;
|
|
IANA_TLS_CIPHER cipher;
|
|
gnutls_protocol_t protocol;
|
|
const char *version;
|
|
|
|
ret = gnutls_priority_get_cipher_suite_index(pcache, i, &idx);
|
|
if (ret == GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE) {
|
|
break;
|
|
}
|
|
if (ret == GNUTLS_E_UNKNOWN_CIPHER_SUITE) {
|
|
continue;
|
|
}
|
|
|
|
name = gnutls_cipher_suite_info(idx, (unsigned char *)&cipher,
|
|
NULL, NULL, NULL, &protocol);
|
|
if (name == NULL) {
|
|
continue;
|
|
}
|
|
|
|
version = gnutls_protocol_get_name(protocol);
|
|
g_byte_array_append(byte_array, cipher.data, 2);
|
|
trace_qcrypto_tls_cipher_suite_info(cipher.data[0],
|
|
cipher.data[1],
|
|
version, name);
|
|
}
|
|
trace_qcrypto_tls_cipher_suite_count(byte_array->len);
|
|
gnutls_priority_deinit(pcache);
|
|
|
|
return byte_array;
|
|
}
|
|
|
|
static void qcrypto_tls_cipher_suites_complete(UserCreatable *uc,
|
|
Error **errp)
|
|
{
|
|
QCryptoTLSCreds *creds = QCRYPTO_TLS_CREDS(uc);
|
|
|
|
if (!creds->priority) {
|
|
error_setg(errp, "'priority' property is not set");
|
|
return;
|
|
}
|
|
}
|
|
|
|
static GByteArray *qcrypto_tls_cipher_suites_fw_cfg_gen_data(Object *obj,
|
|
Error **errp)
|
|
{
|
|
return qcrypto_tls_cipher_suites_get_data(QCRYPTO_TLS_CIPHER_SUITES(obj),
|
|
errp);
|
|
}
|
|
|
|
static void qcrypto_tls_cipher_suites_class_init(ObjectClass *oc, void *data)
|
|
{
|
|
UserCreatableClass *ucc = USER_CREATABLE_CLASS(oc);
|
|
FWCfgDataGeneratorClass *fwgc = FW_CFG_DATA_GENERATOR_CLASS(oc);
|
|
|
|
ucc->complete = qcrypto_tls_cipher_suites_complete;
|
|
fwgc->get_data = qcrypto_tls_cipher_suites_fw_cfg_gen_data;
|
|
}
|
|
|
|
static const TypeInfo qcrypto_tls_cipher_suites_info = {
|
|
.parent = TYPE_QCRYPTO_TLS_CREDS,
|
|
.name = TYPE_QCRYPTO_TLS_CIPHER_SUITES,
|
|
.instance_size = sizeof(QCryptoTLSCreds),
|
|
.class_size = sizeof(QCryptoTLSCredsClass),
|
|
.class_init = qcrypto_tls_cipher_suites_class_init,
|
|
.interfaces = (InterfaceInfo[]) {
|
|
{ TYPE_USER_CREATABLE },
|
|
{ TYPE_FW_CFG_DATA_GENERATOR_INTERFACE },
|
|
{ }
|
|
}
|
|
};
|
|
|
|
static void qcrypto_tls_cipher_suites_register_types(void)
|
|
{
|
|
type_register_static(&qcrypto_tls_cipher_suites_info);
|
|
}
|
|
|
|
type_init(qcrypto_tls_cipher_suites_register_types);
|