mirror of
https://github.com/Motorhead1991/qemu.git
synced 2025-08-04 16:23:55 -06:00
qapi/crypto: Rename QCryptoCipherAlgorithm to *Algo, and drop prefix
QAPI's 'prefix' feature can make the connection between enumeration type and its constants less than obvious. It's best used with restraint. QCryptoCipherAlgorithm has a 'prefix' that overrides the generated enumeration constants' prefix to QCRYPTO_CIPHER_ALG. We could simply drop 'prefix', but then the prefix becomes QCRYPTO_CIPHER_ALGORITHM, which is rather long. We could additionally rename the type to QCryptoCipherAlg, but I think the abbreviation "alg" is less than clear. Rename the type to QCryptoCipherAlgo instead. The prefix becomes QCRYPTO_CIPHER_ALGO. Signed-off-by: Markus Armbruster <armbru@redhat.com> Acked-by: Daniel P. Berrangé <berrange@redhat.com> Message-ID: <20240904111836.3273842-13-armbru@redhat.com>
This commit is contained in:
parent
ef834aa2b2
commit
a092c513db
26 changed files with 277 additions and 278 deletions
|
@ -68,38 +68,38 @@ struct QCryptoBlockLUKSCipherNameMap {
|
|||
|
||||
static const QCryptoBlockLUKSCipherSizeMap
|
||||
qcrypto_block_luks_cipher_size_map_aes[] = {
|
||||
{ 16, QCRYPTO_CIPHER_ALG_AES_128 },
|
||||
{ 24, QCRYPTO_CIPHER_ALG_AES_192 },
|
||||
{ 32, QCRYPTO_CIPHER_ALG_AES_256 },
|
||||
{ 16, QCRYPTO_CIPHER_ALGO_AES_128 },
|
||||
{ 24, QCRYPTO_CIPHER_ALGO_AES_192 },
|
||||
{ 32, QCRYPTO_CIPHER_ALGO_AES_256 },
|
||||
{ 0, 0 },
|
||||
};
|
||||
|
||||
static const QCryptoBlockLUKSCipherSizeMap
|
||||
qcrypto_block_luks_cipher_size_map_cast5[] = {
|
||||
{ 16, QCRYPTO_CIPHER_ALG_CAST5_128 },
|
||||
{ 16, QCRYPTO_CIPHER_ALGO_CAST5_128 },
|
||||
{ 0, 0 },
|
||||
};
|
||||
|
||||
static const QCryptoBlockLUKSCipherSizeMap
|
||||
qcrypto_block_luks_cipher_size_map_serpent[] = {
|
||||
{ 16, QCRYPTO_CIPHER_ALG_SERPENT_128 },
|
||||
{ 24, QCRYPTO_CIPHER_ALG_SERPENT_192 },
|
||||
{ 32, QCRYPTO_CIPHER_ALG_SERPENT_256 },
|
||||
{ 16, QCRYPTO_CIPHER_ALGO_SERPENT_128 },
|
||||
{ 24, QCRYPTO_CIPHER_ALGO_SERPENT_192 },
|
||||
{ 32, QCRYPTO_CIPHER_ALGO_SERPENT_256 },
|
||||
{ 0, 0 },
|
||||
};
|
||||
|
||||
static const QCryptoBlockLUKSCipherSizeMap
|
||||
qcrypto_block_luks_cipher_size_map_twofish[] = {
|
||||
{ 16, QCRYPTO_CIPHER_ALG_TWOFISH_128 },
|
||||
{ 24, QCRYPTO_CIPHER_ALG_TWOFISH_192 },
|
||||
{ 32, QCRYPTO_CIPHER_ALG_TWOFISH_256 },
|
||||
{ 16, QCRYPTO_CIPHER_ALGO_TWOFISH_128 },
|
||||
{ 24, QCRYPTO_CIPHER_ALGO_TWOFISH_192 },
|
||||
{ 32, QCRYPTO_CIPHER_ALGO_TWOFISH_256 },
|
||||
{ 0, 0 },
|
||||
};
|
||||
|
||||
#ifdef CONFIG_CRYPTO_SM4
|
||||
static const QCryptoBlockLUKSCipherSizeMap
|
||||
qcrypto_block_luks_cipher_size_map_sm4[] = {
|
||||
{ 16, QCRYPTO_CIPHER_ALG_SM4},
|
||||
{ 16, QCRYPTO_CIPHER_ALGO_SM4},
|
||||
{ 0, 0 },
|
||||
};
|
||||
#endif
|
||||
|
@ -123,7 +123,7 @@ struct QCryptoBlockLUKS {
|
|||
QCryptoBlockLUKSHeader header;
|
||||
|
||||
/* Main encryption algorithm used for encryption*/
|
||||
QCryptoCipherAlgorithm cipher_alg;
|
||||
QCryptoCipherAlgo cipher_alg;
|
||||
|
||||
/* Mode of encryption for the selected encryption algorithm */
|
||||
QCryptoCipherMode cipher_mode;
|
||||
|
@ -138,7 +138,7 @@ struct QCryptoBlockLUKS {
|
|||
* Encryption algorithm used for IV generation.
|
||||
* Usually the same as main encryption algorithm
|
||||
*/
|
||||
QCryptoCipherAlgorithm ivgen_cipher_alg;
|
||||
QCryptoCipherAlgo ivgen_cipher_alg;
|
||||
|
||||
/* Hash algorithm used in pbkdf2 function */
|
||||
QCryptoHashAlgo hash_alg;
|
||||
|
@ -179,7 +179,7 @@ static int qcrypto_block_luks_cipher_name_lookup(const char *name,
|
|||
}
|
||||
|
||||
static const char *
|
||||
qcrypto_block_luks_cipher_alg_lookup(QCryptoCipherAlgorithm alg,
|
||||
qcrypto_block_luks_cipher_alg_lookup(QCryptoCipherAlgo alg,
|
||||
Error **errp)
|
||||
{
|
||||
const QCryptoBlockLUKSCipherNameMap *map =
|
||||
|
@ -195,7 +195,7 @@ qcrypto_block_luks_cipher_alg_lookup(QCryptoCipherAlgorithm alg,
|
|||
}
|
||||
|
||||
error_setg(errp, "Algorithm '%s' not supported",
|
||||
QCryptoCipherAlgorithm_str(alg));
|
||||
QCryptoCipherAlgo_str(alg));
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
@ -262,8 +262,8 @@ qcrypto_block_luks_has_format(const uint8_t *buf,
|
|||
* the cipher since that gets a key length matching the digest
|
||||
* size, not AES 128 with truncated digest as might be imagined
|
||||
*/
|
||||
static QCryptoCipherAlgorithm
|
||||
qcrypto_block_luks_essiv_cipher(QCryptoCipherAlgorithm cipher,
|
||||
static QCryptoCipherAlgo
|
||||
qcrypto_block_luks_essiv_cipher(QCryptoCipherAlgo cipher,
|
||||
QCryptoHashAlgo hash,
|
||||
Error **errp)
|
||||
{
|
||||
|
@ -274,54 +274,54 @@ qcrypto_block_luks_essiv_cipher(QCryptoCipherAlgorithm cipher,
|
|||
}
|
||||
|
||||
switch (cipher) {
|
||||
case QCRYPTO_CIPHER_ALG_AES_128:
|
||||
case QCRYPTO_CIPHER_ALG_AES_192:
|
||||
case QCRYPTO_CIPHER_ALG_AES_256:
|
||||
case QCRYPTO_CIPHER_ALGO_AES_128:
|
||||
case QCRYPTO_CIPHER_ALGO_AES_192:
|
||||
case QCRYPTO_CIPHER_ALGO_AES_256:
|
||||
if (digestlen == qcrypto_cipher_get_key_len(
|
||||
QCRYPTO_CIPHER_ALG_AES_128)) {
|
||||
return QCRYPTO_CIPHER_ALG_AES_128;
|
||||
QCRYPTO_CIPHER_ALGO_AES_128)) {
|
||||
return QCRYPTO_CIPHER_ALGO_AES_128;
|
||||
} else if (digestlen == qcrypto_cipher_get_key_len(
|
||||
QCRYPTO_CIPHER_ALG_AES_192)) {
|
||||
return QCRYPTO_CIPHER_ALG_AES_192;
|
||||
QCRYPTO_CIPHER_ALGO_AES_192)) {
|
||||
return QCRYPTO_CIPHER_ALGO_AES_192;
|
||||
} else if (digestlen == qcrypto_cipher_get_key_len(
|
||||
QCRYPTO_CIPHER_ALG_AES_256)) {
|
||||
return QCRYPTO_CIPHER_ALG_AES_256;
|
||||
QCRYPTO_CIPHER_ALGO_AES_256)) {
|
||||
return QCRYPTO_CIPHER_ALGO_AES_256;
|
||||
} else {
|
||||
error_setg(errp, "No AES cipher with key size %zu available",
|
||||
digestlen);
|
||||
return 0;
|
||||
}
|
||||
break;
|
||||
case QCRYPTO_CIPHER_ALG_SERPENT_128:
|
||||
case QCRYPTO_CIPHER_ALG_SERPENT_192:
|
||||
case QCRYPTO_CIPHER_ALG_SERPENT_256:
|
||||
case QCRYPTO_CIPHER_ALGO_SERPENT_128:
|
||||
case QCRYPTO_CIPHER_ALGO_SERPENT_192:
|
||||
case QCRYPTO_CIPHER_ALGO_SERPENT_256:
|
||||
if (digestlen == qcrypto_cipher_get_key_len(
|
||||
QCRYPTO_CIPHER_ALG_SERPENT_128)) {
|
||||
return QCRYPTO_CIPHER_ALG_SERPENT_128;
|
||||
QCRYPTO_CIPHER_ALGO_SERPENT_128)) {
|
||||
return QCRYPTO_CIPHER_ALGO_SERPENT_128;
|
||||
} else if (digestlen == qcrypto_cipher_get_key_len(
|
||||
QCRYPTO_CIPHER_ALG_SERPENT_192)) {
|
||||
return QCRYPTO_CIPHER_ALG_SERPENT_192;
|
||||
QCRYPTO_CIPHER_ALGO_SERPENT_192)) {
|
||||
return QCRYPTO_CIPHER_ALGO_SERPENT_192;
|
||||
} else if (digestlen == qcrypto_cipher_get_key_len(
|
||||
QCRYPTO_CIPHER_ALG_SERPENT_256)) {
|
||||
return QCRYPTO_CIPHER_ALG_SERPENT_256;
|
||||
QCRYPTO_CIPHER_ALGO_SERPENT_256)) {
|
||||
return QCRYPTO_CIPHER_ALGO_SERPENT_256;
|
||||
} else {
|
||||
error_setg(errp, "No Serpent cipher with key size %zu available",
|
||||
digestlen);
|
||||
return 0;
|
||||
}
|
||||
break;
|
||||
case QCRYPTO_CIPHER_ALG_TWOFISH_128:
|
||||
case QCRYPTO_CIPHER_ALG_TWOFISH_192:
|
||||
case QCRYPTO_CIPHER_ALG_TWOFISH_256:
|
||||
case QCRYPTO_CIPHER_ALGO_TWOFISH_128:
|
||||
case QCRYPTO_CIPHER_ALGO_TWOFISH_192:
|
||||
case QCRYPTO_CIPHER_ALGO_TWOFISH_256:
|
||||
if (digestlen == qcrypto_cipher_get_key_len(
|
||||
QCRYPTO_CIPHER_ALG_TWOFISH_128)) {
|
||||
return QCRYPTO_CIPHER_ALG_TWOFISH_128;
|
||||
QCRYPTO_CIPHER_ALGO_TWOFISH_128)) {
|
||||
return QCRYPTO_CIPHER_ALGO_TWOFISH_128;
|
||||
} else if (digestlen == qcrypto_cipher_get_key_len(
|
||||
QCRYPTO_CIPHER_ALG_TWOFISH_192)) {
|
||||
return QCRYPTO_CIPHER_ALG_TWOFISH_192;
|
||||
QCRYPTO_CIPHER_ALGO_TWOFISH_192)) {
|
||||
return QCRYPTO_CIPHER_ALGO_TWOFISH_192;
|
||||
} else if (digestlen == qcrypto_cipher_get_key_len(
|
||||
QCRYPTO_CIPHER_ALG_TWOFISH_256)) {
|
||||
return QCRYPTO_CIPHER_ALG_TWOFISH_256;
|
||||
QCRYPTO_CIPHER_ALGO_TWOFISH_256)) {
|
||||
return QCRYPTO_CIPHER_ALGO_TWOFISH_256;
|
||||
} else {
|
||||
error_setg(errp, "No Twofish cipher with key size %zu available",
|
||||
digestlen);
|
||||
|
@ -330,7 +330,7 @@ qcrypto_block_luks_essiv_cipher(QCryptoCipherAlgorithm cipher,
|
|||
break;
|
||||
default:
|
||||
error_setg(errp, "Cipher %s not supported with essiv",
|
||||
QCryptoCipherAlgorithm_str(cipher));
|
||||
QCryptoCipherAlgo_str(cipher));
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
@ -1322,7 +1322,7 @@ qcrypto_block_luks_create(QCryptoBlock *block,
|
|||
luks_opts.iter_time = QCRYPTO_BLOCK_LUKS_DEFAULT_ITER_TIME_MS;
|
||||
}
|
||||
if (!luks_opts.has_cipher_alg) {
|
||||
luks_opts.cipher_alg = QCRYPTO_CIPHER_ALG_AES_256;
|
||||
luks_opts.cipher_alg = QCRYPTO_CIPHER_ALGO_AES_256;
|
||||
}
|
||||
if (!luks_opts.has_cipher_mode) {
|
||||
luks_opts.cipher_mode = QCRYPTO_CIPHER_MODE_XTS;
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue