From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mailman by lists.gnu.org with tmda-scanned (Exim 4.43) id 1LVXww-0001mZ-KC for qemu-devel@nongnu.org; Fri, 06 Feb 2009 16:09:22 -0500 Received: from exim by lists.gnu.org with spam-scanned (Exim 4.43) id 1LVXws-0001hF-Ph for qemu-devel@nongnu.org; Fri, 06 Feb 2009 16:09:19 -0500 Received: from [199.232.76.173] (port=51587 helo=monty-python.gnu.org) by lists.gnu.org with esmtp (Exim 4.43) id 1LVXwr-0001gu-Nt for qemu-devel@nongnu.org; Fri, 06 Feb 2009 16:09:17 -0500 Received: from mx2.redhat.com ([66.187.237.31]:54573) by monty-python.gnu.org with esmtp (Exim 4.60) (envelope-from ) id 1LVXwq-0007ns-Ni for qemu-devel@nongnu.org; Fri, 06 Feb 2009 16:09:17 -0500 Received: from int-mx2.corp.redhat.com (int-mx2.corp.redhat.com [172.16.27.26]) by mx2.redhat.com (8.13.8/8.13.8) with ESMTP id n16L9DPw001148 for ; Fri, 6 Feb 2009 16:09:13 -0500 Received: from ns3.rdu.redhat.com (ns3.rdu.redhat.com [10.11.255.199]) by int-mx2.corp.redhat.com (8.13.1/8.13.1) with ESMTP id n16L9DOJ029470 for ; Fri, 6 Feb 2009 16:09:13 -0500 Received: from blackpad.localdomain (vpn-10-11.bos.redhat.com [10.16.10.11]) by ns3.rdu.redhat.com (8.13.8/8.13.8) with ESMTP id n16L9CF4014583 for ; Fri, 6 Feb 2009 16:09:13 -0500 From: Eduardo Habkost Date: Fri, 6 Feb 2009 19:08:51 -0200 Message-Id: <1233954540-4754-1-git-send-email-ehabkost@redhat.com> Subject: [Qemu-devel] [PATCH 0/9] encryption code changes Reply-To: qemu-devel@nongnu.org List-Id: qemu-devel.nongnu.org List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: qemu-devel@nongnu.org Hi, This patch series for qemu contain multiple changes on the way encryption and authentication code is handled. The first patch is a behaviour change to avoid silent security holes on the VNC server caused by user configuration errors. Patches 2 and 3 are bugfixes to some of the multiple problems I had with monitor_readline(), when testing the qcow encryption support. monitor_readline() is still not completely functional, but at least it allows the qcow password to be read when an qcow encrypted image is specified on the command-line, now. The remaining patches may be more controversial. The first half makes the use of aes.c and d3des.c optional at compile time. The rest remove aes.c and d3des.c from the source tree and replace them with calls to libgcrypt. -- Eduardo