1. 06 7月, 2016 2 次提交
  2. 05 7月, 2016 31 次提交
  3. 04 7月, 2016 7 次提交
    • P
      Merge remote-tracking branch 'remotes/berrange/tags/pull-qcrypto-2016-07-04-1' into staging · 0d7e96c9
      Peter Maydell 提交于
      Merge qcrypto 2016/07/04 v1
      
      # gpg: Signature made Mon 04 Jul 2016 15:54:26 BST
      # gpg:                using RSA key 0xBE86EBB415104FDF
      # gpg: Good signature from "Daniel P. Berrange <dan@berrange.com>"
      # gpg:                 aka "Daniel P. Berrange <berrange@redhat.com>"
      # Primary key fingerprint: DAF3 A6FD B26B 6291 2D0E  8E3F BE86 EBB4 1510 4FDF
      
      * remotes/berrange/tags/pull-qcrypto-2016-07-04-1:
        crypto: allow default TLS priority to be chosen at build time
        crypto: add support for TLS priority string override
        crypto: implement sha224, sha384, sha512 and ripemd160 hashes
        crypto: switch hash code to use nettle/gcrypt directly
        crypto: rename OUT to out in xts test to avoid clash on MinGW
        crypto: fix handling of iv generator hash defaults
      Signed-off-by: NPeter Maydell <peter.maydell@linaro.org>
      0d7e96c9
    • G
      Revert "bios: Add fast variant of SeaBIOS for use with -kernel on x86." · 3b1154ff
      Gerd Hoffmann 提交于
      This reverts commit 4e04ab6a.
      
      Also remove pc-bios/bios-fast.bin.
      
      Commit was merged by mistake.
      Signed-off-by: NGerd Hoffmann <kraxel@redhat.com>
      3b1154ff
    • D
      crypto: allow default TLS priority to be chosen at build time · a1c5e949
      Daniel P. Berrange 提交于
      Modern gnutls can use a global config file to control the
      crypto priority settings for TLS connections. For example
      the priority string "@SYSTEM" instructs gnutls to find the
      priority setting named "SYSTEM" in the global config file.
      
      Latest gnutls GIT codebase gained the ability to reference
      multiple priority strings in the config file, with the first
      one that is found to existing winning. This means it is now
      possible to configure QEMU out of the box with a default
      priority of "@QEMU,SYSTEM", which says to look for the
      settings "QEMU" first, and if not found, use the "SYSTEM"
      settings.
      
      To make use of this facility, we introduce the ability to
      set the QEMU default priority at build time via a new
      configure argument.  It is anticipated that distro vendors
      will set this when building QEMU to a suitable value for
      use with distro crypto policy setup. eg current Fedora
      would run
      
       ./configure --tls-priority=@SYSTEM
      
      while future Fedora would run
      
       ./configure --tls-priority=@QEMU,SYSTEM
      Signed-off-by: NDaniel P. Berrange <berrange@redhat.com>
      a1c5e949
    • D
      crypto: add support for TLS priority string override · 13f12430
      Daniel P. Berrange 提交于
      The gnutls default priority is either "NORMAL" (most historical
      versions of gnutls) which is a built-in label in gnutls code,
      or "@SYSTEM" (latest gnutls on Fedora at least) which refers
      to an admin customizable entry in a gnutls config file.
      
      Regardless of which default is used by a distro, they are both
      global defaults applying to all applications using gnutls. If
      a single application on the system needs to use a weaker set
      of crypto priorities, this potentially forces the weakness onto
      all applications. Or conversely if a single application wants a
      strong default than all others, it can't do this via the global
      config file.
      
      This adds an extra parameter to the tls credential object which
      allows the mgmt app / user to explicitly provide a priority
      string to QEMU when configuring TLS.
      
      For example, to use the "NORMAL" priority, but disable SSL 3.0
      one can now configure QEMU thus:
      
        $QEMU -object tls-creds-x509,id=tls0,dir=/home/berrange/qemutls,\
                      priority="NORMAL:-VERS-SSL3.0" \
              ..other args...
      
      If creating tls-creds-anon, whatever priority the user specifies
      will always have "+ANON-DH" appended to it, since that's mandatory
      to make the anonymous credentials work.
      Signed-off-by: NDaniel P. Berrange <berrange@redhat.com>
      13f12430
    • D
      crypto: implement sha224, sha384, sha512 and ripemd160 hashes · 9164b897
      Daniel P. Berrange 提交于
      Wire up the nettle and gcrypt hash backends so that they can
      support the sha224, sha384, sha512 and ripemd160 hash algorithms.
      Signed-off-by: NDaniel P. Berrange <berrange@redhat.com>
      9164b897
    • I
      tests: acpi: add CPU hotplug testcase · 6b9c1dd2
      Igor Mammedov 提交于
      Test with:
      
          -smp 2,cores=3,sockets=2,maxcpus=6
      
      to capture sparse APIC ID values that default
      AMD CPU has in above configuration.
      Signed-off-by: NIgor Mammedov <imammedo@redhat.com>
      Reviewed-by: NMarcel Apfelbaum <marcel@redhat.com>
      Reviewed-by: NMichael S. Tsirkin <mst@redhat.com>
      Signed-off-by: NMichael S. Tsirkin <mst@redhat.com>
      6b9c1dd2
    • M
      log: Permit -dfilter 0..0xffffffffffffffff · 58eeb83c
      Markus Armbruster 提交于
      Works fine since the previous commit fixed the underlying range data
      type.  Of course it filters out nothing, but so does
      0..1,2..0xffffffffffffffff, and we don't bother rejecting that either.
      Signed-off-by: NMarkus Armbruster <armbru@redhat.com>
      Reviewed-by: NEric Blake <eblake@redhat.com>
      Reviewed-by: NMichael S. Tsirkin <mst@redhat.com>
      Signed-off-by: NMichael S. Tsirkin <mst@redhat.com>
      58eeb83c