/* * QEMU crypto TLS Pre-Shared Keys (PSK) support * * Copyright (c) 2018 Red Hat, Inc. * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this library; if not, see . * */ #include "qemu/osdep.h" #include "crypto/tlscredspsk.h" #include "tlscredspriv.h" #include "qapi/error.h" #include "qemu/module.h" #include "qom/object_interfaces.h" #include "trace.h" #ifdef CONFIG_GNUTLS static int lookup_key(const char *pskfile, const char *username, gnutls_datum_t *key, Error **errp) { const size_t ulen = strlen(username); GError *gerr = NULL; char *content = NULL; char **lines = NULL; size_t clen = 0, i; int ret = -1; if (!g_file_get_contents(pskfile, &content, &clen, &gerr)) { error_setg(errp, "Cannot read PSK file %s: %s", pskfile, gerr->message); g_error_free(gerr); return -1; } lines = g_strsplit(content, "\n", -1); for (i = 0; lines[i] != NULL; ++i) { if (strncmp(lines[i], username, ulen) == 0 && lines[i][ulen] == ':') { key->data = (unsigned char *) g_strdup(&lines[i][ulen + 1]); key->size = strlen(lines[i]) - ulen - 1; ret = 0; goto out; } } error_setg(errp, "Username %s not found in PSK file %s", username, pskfile); out: free(content); g_strfreev(lines); return ret; } static int qcrypto_tls_creds_psk_load(QCryptoTLSCredsPSK *creds, Error **errp) { char *pskfile = NULL, *dhparams = NULL; const char *username; int ret; int rv = -1; gnutls_datum_t key = { .data = NULL }; trace_qcrypto_tls_creds_psk_load(creds, creds->parent_obj.dir ? creds->parent_obj.dir : ""); if (creds->parent_obj.endpoint == QCRYPTO_TLS_CREDS_ENDPOINT_SERVER) { if (creds->username) { error_setg(errp, "username should not be set when endpoint=server"); goto cleanup; } if (qcrypto_tls_creds_get_path(&creds->parent_obj, QCRYPTO_TLS_CREDS_DH_PARAMS, false, &dhparams, errp) < 0 || qcrypto_tls_creds_get_path(&creds->parent_obj, QCRYPTO_TLS_CREDS_PSKFILE, true, &pskfile, errp) < 0) { goto cleanup; } ret = gnutls_psk_allocate_server_credentials(&creds->data.server); if (ret < 0) { error_setg(errp, "Cannot allocate credentials: %s", gnutls_strerror(ret)); goto cleanup; } if (qcrypto_tls_creds_get_dh_params_file(&creds->parent_obj, dhparams, &creds->parent_obj.dh_params, errp) < 0) { goto cleanup; } gnutls_psk_set_server_credentials_file(creds->data.server, pskfile); gnutls_psk_set_server_dh_params(creds->data.server, creds->parent_obj.dh_params); } else { if (qcrypto_tls_creds_get_path(&creds->parent_obj, QCRYPTO_TLS_CREDS_PSKFILE, true, &pskfile, errp) < 0) { goto cleanup; } if (creds->username) { username = creds->username; } else { username = "qemu"; } if (lookup_key(pskfile, username, &key, errp) != 0) { goto cleanup; } ret = gnutls_psk_allocate_client_credentials(&creds->data.client); if (ret < 0) { error_setg(errp, "Cannot allocate credentials: %s", gnutls_strerror(ret)); goto cleanup; } gnutls_psk_set_client_credentials(creds->data.client, username, &key, GNUTLS_PSK_KEY_HEX); } rv = 0; cleanup: g_free(key.data); g_free(pskfile); g_free(dhparams); return rv; } static void qcrypto_tls_creds_psk_unload(QCryptoTLSCredsPSK *creds) { if (creds->parent_obj.endpoint == QCRYPTO_TLS_CREDS_ENDPOINT_CLIENT) { if (creds->data.client) { gnutls_psk_free_client_credentials(creds->data.client); creds->data.client = NULL; } } else { if (creds->data.server) { gnutls_psk_free_server_credentials(creds->data.server); creds->data.server = NULL; } } if (creds->parent_obj.dh_params) { gnutls_dh_params_deinit(creds->parent_obj.dh_params); creds->parent_obj.dh_params = NULL; } } #else /* ! CONFIG_GNUTLS */ static void qcrypto_tls_creds_psk_load(QCryptoTLSCredsPSK *creds G_GNUC_UNUSED, Error **errp) { error_setg(errp, "TLS credentials support requires GNUTLS"); } static void qcrypto_tls_creds_psk_unload(QCryptoTLSCredsPSK *creds G_GNUC_UNUSED) { /* nada */ } #endif /* ! CONFIG_GNUTLS */ static void qcrypto_tls_creds_psk_prop_set_loaded(Object *obj, bool value, Error **errp) { QCryptoTLSCredsPSK *creds = QCRYPTO_TLS_CREDS_PSK(obj); if (value) { qcrypto_tls_creds_psk_load(creds, errp); } else { qcrypto_tls_creds_psk_unload(creds); } } #ifdef CONFIG_GNUTLS static bool qcrypto_tls_creds_psk_prop_get_loaded(Object *obj, Error **errp G_GNUC_UNUSED) { QCryptoTLSCredsPSK *creds = QCRYPTO_TLS_CREDS_PSK(obj); if (creds->parent_obj.endpoint == QCRYPTO_TLS_CREDS_ENDPOINT_SERVER) { return creds->data.server != NULL; } else { return creds->data.client != NULL; } } #else /* ! CONFIG_GNUTLS */ static bool qcrypto_tls_creds_psk_prop_get_loaded(Object *obj G_GNUC_UNUSED, Error **errp G_GNUC_UNUSED) { return false; } #endif /* ! CONFIG_GNUTLS */ static void qcrypto_tls_creds_psk_complete(UserCreatable *uc, Error **errp) { object_property_set_bool(OBJECT(uc), true, "loaded", errp); } static void qcrypto_tls_creds_psk_finalize(Object *obj) { QCryptoTLSCredsPSK *creds = QCRYPTO_TLS_CREDS_PSK(obj); qcrypto_tls_creds_psk_unload(creds); } static void qcrypto_tls_creds_psk_prop_set_username(Object *obj, const char *value, Error **errp G_GNUC_UNUSED) { QCryptoTLSCredsPSK *creds = QCRYPTO_TLS_CREDS_PSK(obj); creds->username = g_strdup(value); } static char * qcrypto_tls_creds_psk_prop_get_username(Object *obj, Error **errp G_GNUC_UNUSED) { QCryptoTLSCredsPSK *creds = QCRYPTO_TLS_CREDS_PSK(obj); return g_strdup(creds->username); } static void qcrypto_tls_creds_psk_class_init(ObjectClass *oc, void *data) { UserCreatableClass *ucc = USER_CREATABLE_CLASS(oc); ucc->complete = qcrypto_tls_creds_psk_complete; object_class_property_add_bool(oc, "loaded", qcrypto_tls_creds_psk_prop_get_loaded, qcrypto_tls_creds_psk_prop_set_loaded, NULL); object_class_property_add_str(oc, "username", qcrypto_tls_creds_psk_prop_get_username, qcrypto_tls_creds_psk_prop_set_username, NULL); } static const TypeInfo qcrypto_tls_creds_psk_info = { .parent = TYPE_QCRYPTO_TLS_CREDS, .name = TYPE_QCRYPTO_TLS_CREDS_PSK, .instance_size = sizeof(QCryptoTLSCredsPSK), .instance_finalize = qcrypto_tls_creds_psk_finalize, .class_size = sizeof(QCryptoTLSCredsPSKClass), .class_init = qcrypto_tls_creds_psk_class_init, .interfaces = (InterfaceInfo[]) { { TYPE_USER_CREATABLE }, { } } }; static void qcrypto_tls_creds_psk_register_types(void) { type_register_static(&qcrypto_tls_creds_psk_info); } type_init(qcrypto_tls_creds_psk_register_types);