crypto: Implement TLS Pre-Shared Keys (PSK).
commite1a6dc91ddb55ef77a705b62b6e62634631fd57d
authorRichard W.M. Jones <rjones@redhat.com>
Tue, 3 Jul 2018 08:03:03 +0000 (3 09:03 +0100)
committerDaniel P. Berrangé <berrange@redhat.com>
Tue, 3 Jul 2018 12:04:38 +0000 (3 13:04 +0100)
treed5f8bd5ceacbe81dce54056209efa0fffe3a52c7
parent9b75dcb15f562577a937ae01f324946513586e59
crypto: Implement TLS Pre-Shared Keys (PSK).

Pre-Shared Keys (PSK) is a simpler mechanism for enabling TLS
connections than using certificates.  It requires only a simple secret
key:

  $ mkdir -m 0700 /tmp/keys
  $ psktool -u rjones -p /tmp/keys/keys.psk
  $ cat /tmp/keys/keys.psk
  rjones:d543770c15ad93d76443fb56f501a31969235f47e999720ae8d2336f6a13fcbc

The key can be secretly shared between clients and servers.  Clients
must specify the directory containing the "keys.psk" file and a
username (defaults to "qemu").  Servers must specify only the
directory.

Example NBD client:

  $ qemu-img info \
    --object tls-creds-psk,id=tls0,dir=/tmp/keys,username=rjones,endpoint=client \
    --image-opts \
    file.driver=nbd,file.host=localhost,file.port=10809,file.tls-creds=tls0,file.export=/

Example NBD server using qemu-nbd:

  $ qemu-nbd -t -x / \
    --object tls-creds-psk,id=tls0,endpoint=server,dir=/tmp/keys \
    --tls-creds tls0 \
    image.qcow2

Example NBD server using nbdkit:

  $ nbdkit -n -e / -fv \
    --tls=on --tls-psk=/tmp/keys/keys.psk \
    file file=disk.img

Signed-off-by: Richard W.M. Jones <rjones@redhat.com>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
crypto/Makefile.objs
crypto/tlscredspsk.c [new file with mode: 0644]
crypto/tlssession.c
crypto/trace-events
include/crypto/tlscredspsk.h [new file with mode: 0644]
qemu-doc.texi
qemu-options.hx
tests/Makefile.include
tests/crypto-tls-psk-helpers.c [new file with mode: 0644]
tests/crypto-tls-psk-helpers.h [new file with mode: 0644]
tests/test-crypto-tlssession.c