2 * QEMU Cryptodev backend for QEMU cipher APIs
4 * Copyright (c) 2016 HUAWEI TECHNOLOGIES CO., LTD.
9 * This library is free software; you can redistribute it and/or
10 * modify it under the terms of the GNU Lesser General Public
11 * License as published by the Free Software Foundation; either
12 * version 2 of the License, or (at your option) any later version.
14 * This library is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 * Lesser General Public License for more details.
19 * You should have received a copy of the GNU Lesser General Public
20 * License along with this library; if not, see <http://www.gnu.org/licenses/>.
24 #include "qemu/osdep.h"
25 #include "sysemu/cryptodev.h"
26 #include "hw/boards.h"
27 #include "qapi/error.h"
28 #include "standard-headers/linux/virtio_crypto.h"
29 #include "crypto/cipher.h"
33 * @TYPE_CRYPTODEV_BACKEND_BUILTIN:
34 * name of backend that uses QEMU cipher API
36 #define TYPE_CRYPTODEV_BACKEND_BUILTIN "cryptodev-backend-builtin"
38 #define CRYPTODEV_BACKEND_BUILTIN(obj) \
39 OBJECT_CHECK(CryptoDevBackendBuiltin, \
40 (obj), TYPE_CRYPTODEV_BACKEND_BUILTIN)
42 typedef struct CryptoDevBackendBuiltin
43 CryptoDevBackendBuiltin;
45 typedef struct CryptoDevBackendBuiltinSession {
46 QCryptoCipher *cipher;
47 uint8_t direction; /* encryption or decryption */
48 uint8_t type; /* cipher? hash? aead? */
49 QTAILQ_ENTRY(CryptoDevBackendBuiltinSession) next;
50 } CryptoDevBackendBuiltinSession;
52 /* Max number of symmetric sessions */
53 #define MAX_NUM_SESSIONS 256
55 #define CRYPTODEV_BUITLIN_MAX_AUTH_KEY_LEN 512
56 #define CRYPTODEV_BUITLIN_MAX_CIPHER_KEY_LEN 64
58 struct CryptoDevBackendBuiltin {
59 CryptoDevBackend parent_obj;
61 CryptoDevBackendBuiltinSession *sessions[MAX_NUM_SESSIONS];
64 static void cryptodev_builtin_init(
65 CryptoDevBackend *backend, Error **errp)
67 /* Only support one queue */
68 int queues = backend->conf.peers.queues;
69 CryptoDevBackendClient *cc;
73 "Only support one queue in cryptdov-builtin backend");
77 cc = cryptodev_backend_new_client(
78 "cryptodev-builtin", NULL);
79 cc->info_str = g_strdup_printf("cryptodev-builtin0");
81 backend->conf.peers.ccs[0] = cc;
83 backend->conf.crypto_services =
84 1u << VIRTIO_CRYPTO_SERVICE_CIPHER |
85 1u << VIRTIO_CRYPTO_SERVICE_HASH |
86 1u << VIRTIO_CRYPTO_SERVICE_MAC;
87 backend->conf.cipher_algo_l = 1u << VIRTIO_CRYPTO_CIPHER_AES_CBC;
88 backend->conf.hash_algo = 1u << VIRTIO_CRYPTO_HASH_SHA1;
90 * Set the Maximum length of crypto request.
91 * Why this value? Just avoid to overflow when
92 * memory allocation for each crypto request.
94 backend->conf.max_size = LONG_MAX - sizeof(CryptoDevBackendSymOpInfo);
95 backend->conf.max_cipher_key_len = CRYPTODEV_BUITLIN_MAX_CIPHER_KEY_LEN;
96 backend->conf.max_auth_key_len = CRYPTODEV_BUITLIN_MAX_AUTH_KEY_LEN;
98 cryptodev_backend_set_ready(backend, true);
102 cryptodev_builtin_get_unused_session_index(
103 CryptoDevBackendBuiltin *builtin)
107 for (i = 0; i < MAX_NUM_SESSIONS; i++) {
108 if (builtin->sessions[i] == NULL) {
116 #define AES_KEYSIZE_128 16
117 #define AES_KEYSIZE_192 24
118 #define AES_KEYSIZE_256 32
119 #define AES_KEYSIZE_128_XTS AES_KEYSIZE_256
120 #define AES_KEYSIZE_256_XTS 64
123 cryptodev_builtin_get_aes_algo(uint32_t key_len, int mode, Error **errp)
127 if (key_len == AES_KEYSIZE_128) {
128 algo = QCRYPTO_CIPHER_ALG_AES_128;
129 } else if (key_len == AES_KEYSIZE_192) {
130 algo = QCRYPTO_CIPHER_ALG_AES_192;
131 } else if (key_len == AES_KEYSIZE_256) { /* equals AES_KEYSIZE_128_XTS */
132 if (mode == QCRYPTO_CIPHER_MODE_XTS) {
133 algo = QCRYPTO_CIPHER_ALG_AES_128;
135 algo = QCRYPTO_CIPHER_ALG_AES_256;
137 } else if (key_len == AES_KEYSIZE_256_XTS) {
138 if (mode == QCRYPTO_CIPHER_MODE_XTS) {
139 algo = QCRYPTO_CIPHER_ALG_AES_256;
150 error_setg(errp, "Unsupported key length :%u", key_len);
154 static int cryptodev_builtin_create_cipher_session(
155 CryptoDevBackendBuiltin *builtin,
156 CryptoDevBackendSymSessionInfo *sess_info,
161 QCryptoCipher *cipher;
163 CryptoDevBackendBuiltinSession *sess;
165 if (sess_info->op_type != VIRTIO_CRYPTO_SYM_OP_CIPHER) {
166 error_setg(errp, "Unsupported optype :%u", sess_info->op_type);
170 index = cryptodev_builtin_get_unused_session_index(builtin);
172 error_setg(errp, "Total number of sessions created exceeds %u",
177 switch (sess_info->cipher_alg) {
178 case VIRTIO_CRYPTO_CIPHER_AES_ECB:
179 mode = QCRYPTO_CIPHER_MODE_ECB;
180 algo = cryptodev_builtin_get_aes_algo(sess_info->key_len,
186 case VIRTIO_CRYPTO_CIPHER_AES_CBC:
187 mode = QCRYPTO_CIPHER_MODE_CBC;
188 algo = cryptodev_builtin_get_aes_algo(sess_info->key_len,
194 case VIRTIO_CRYPTO_CIPHER_AES_CTR:
195 mode = QCRYPTO_CIPHER_MODE_CTR;
196 algo = cryptodev_builtin_get_aes_algo(sess_info->key_len,
202 case VIRTIO_CRYPTO_CIPHER_AES_XTS:
203 mode = QCRYPTO_CIPHER_MODE_XTS;
204 algo = cryptodev_builtin_get_aes_algo(sess_info->key_len,
210 case VIRTIO_CRYPTO_CIPHER_3DES_ECB:
211 mode = QCRYPTO_CIPHER_MODE_ECB;
212 algo = QCRYPTO_CIPHER_ALG_3DES;
214 case VIRTIO_CRYPTO_CIPHER_3DES_CBC:
215 mode = QCRYPTO_CIPHER_MODE_CBC;
216 algo = QCRYPTO_CIPHER_ALG_3DES;
218 case VIRTIO_CRYPTO_CIPHER_3DES_CTR:
219 mode = QCRYPTO_CIPHER_MODE_CTR;
220 algo = QCRYPTO_CIPHER_ALG_3DES;
223 error_setg(errp, "Unsupported cipher alg :%u",
224 sess_info->cipher_alg);
228 cipher = qcrypto_cipher_new(algo, mode,
229 sess_info->cipher_key,
236 sess = g_new0(CryptoDevBackendBuiltinSession, 1);
237 sess->cipher = cipher;
238 sess->direction = sess_info->direction;
239 sess->type = sess_info->op_type;
241 builtin->sessions[index] = sess;
246 static int64_t cryptodev_builtin_sym_create_session(
247 CryptoDevBackend *backend,
248 CryptoDevBackendSymSessionInfo *sess_info,
249 uint32_t queue_index, Error **errp)
251 CryptoDevBackendBuiltin *builtin =
252 CRYPTODEV_BACKEND_BUILTIN(backend);
253 int64_t session_id = -1;
256 switch (sess_info->op_code) {
257 case VIRTIO_CRYPTO_CIPHER_CREATE_SESSION:
258 ret = cryptodev_builtin_create_cipher_session(
259 builtin, sess_info, errp);
266 case VIRTIO_CRYPTO_HASH_CREATE_SESSION:
267 case VIRTIO_CRYPTO_MAC_CREATE_SESSION:
269 error_setg(errp, "Unsupported opcode :%" PRIu32 "",
277 static int cryptodev_builtin_sym_close_session(
278 CryptoDevBackend *backend,
280 uint32_t queue_index, Error **errp)
282 CryptoDevBackendBuiltin *builtin =
283 CRYPTODEV_BACKEND_BUILTIN(backend);
285 if (session_id >= MAX_NUM_SESSIONS ||
286 builtin->sessions[session_id] == NULL) {
287 error_setg(errp, "Cannot find a valid session id: %" PRIu64 "",
292 qcrypto_cipher_free(builtin->sessions[session_id]->cipher);
293 g_free(builtin->sessions[session_id]);
294 builtin->sessions[session_id] = NULL;
298 static int cryptodev_builtin_sym_operation(
299 CryptoDevBackend *backend,
300 CryptoDevBackendSymOpInfo *op_info,
301 uint32_t queue_index, Error **errp)
303 CryptoDevBackendBuiltin *builtin =
304 CRYPTODEV_BACKEND_BUILTIN(backend);
305 CryptoDevBackendBuiltinSession *sess;
308 if (op_info->session_id >= MAX_NUM_SESSIONS ||
309 builtin->sessions[op_info->session_id] == NULL) {
310 error_setg(errp, "Cannot find a valid session id: %" PRIu64 "",
311 op_info->session_id);
312 return -VIRTIO_CRYPTO_INVSESS;
315 if (op_info->op_type == VIRTIO_CRYPTO_SYM_OP_ALGORITHM_CHAINING) {
317 "Algorithm chain is unsupported for cryptdoev-builtin");
318 return -VIRTIO_CRYPTO_NOTSUPP;
321 sess = builtin->sessions[op_info->session_id];
323 if (op_info->iv_len > 0) {
324 ret = qcrypto_cipher_setiv(sess->cipher, op_info->iv,
325 op_info->iv_len, errp);
327 return -VIRTIO_CRYPTO_ERR;
331 if (sess->direction == VIRTIO_CRYPTO_OP_ENCRYPT) {
332 ret = qcrypto_cipher_encrypt(sess->cipher, op_info->src,
333 op_info->dst, op_info->src_len, errp);
335 return -VIRTIO_CRYPTO_ERR;
338 ret = qcrypto_cipher_decrypt(sess->cipher, op_info->src,
339 op_info->dst, op_info->src_len, errp);
341 return -VIRTIO_CRYPTO_ERR;
344 return VIRTIO_CRYPTO_OK;
347 static void cryptodev_builtin_cleanup(
348 CryptoDevBackend *backend,
351 CryptoDevBackendBuiltin *builtin =
352 CRYPTODEV_BACKEND_BUILTIN(backend);
354 int queues = backend->conf.peers.queues;
355 CryptoDevBackendClient *cc;
357 for (i = 0; i < MAX_NUM_SESSIONS; i++) {
358 if (builtin->sessions[i] != NULL) {
359 cryptodev_builtin_sym_close_session(
360 backend, i, 0, errp);
364 for (i = 0; i < queues; i++) {
365 cc = backend->conf.peers.ccs[i];
367 cryptodev_backend_free_client(cc);
368 backend->conf.peers.ccs[i] = NULL;
372 cryptodev_backend_set_ready(backend, false);
376 cryptodev_builtin_class_init(ObjectClass *oc, void *data)
378 CryptoDevBackendClass *bc = CRYPTODEV_BACKEND_CLASS(oc);
380 bc->init = cryptodev_builtin_init;
381 bc->cleanup = cryptodev_builtin_cleanup;
382 bc->create_session = cryptodev_builtin_sym_create_session;
383 bc->close_session = cryptodev_builtin_sym_close_session;
384 bc->do_sym_op = cryptodev_builtin_sym_operation;
387 static const TypeInfo cryptodev_builtin_info = {
388 .name = TYPE_CRYPTODEV_BACKEND_BUILTIN,
389 .parent = TYPE_CRYPTODEV_BACKEND,
390 .class_init = cryptodev_builtin_class_init,
391 .instance_size = sizeof(CryptoDevBackendBuiltin),
395 cryptodev_builtin_register_types(void)
397 type_register_static(&cryptodev_builtin_info);
400 type_init(cryptodev_builtin_register_types);