mirror of
https://github.com/xemu-project/xemu.git
synced 2024-11-23 03:29:43 +00:00
58660863ba
crypto: support export RSA private keys with PKCS#8 standard. So that users can upload this private key to linux kernel. Signed-off-by: lei he <helei.sig11@bytedance.com> Message-Id: <20221008085030.70212-4-helei.sig11@bytedance.com> Reviewed-by: Michael S. Tsirkin <mst@redhat.com> Signed-off-by: Michael S. Tsirkin <mst@redhat.com> Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
127 lines
3.7 KiB
C
127 lines
3.7 KiB
C
/*
|
|
* QEMU Crypto akcipher algorithms
|
|
*
|
|
* Copyright (c) 2022 Bytedance
|
|
* Author: zhenwei pi <pizhenwei@bytedance.com>
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, see <http://www.gnu.org/licenses/>.
|
|
*
|
|
*/
|
|
|
|
#include "qemu/osdep.h"
|
|
#include "crypto/akcipher.h"
|
|
#include "akcipherpriv.h"
|
|
#include "der.h"
|
|
#include "rsakey.h"
|
|
|
|
#if defined(CONFIG_GCRYPT)
|
|
#include "akcipher-gcrypt.c.inc"
|
|
#elif defined(CONFIG_NETTLE) && defined(CONFIG_HOGWEED)
|
|
#include "akcipher-nettle.c.inc"
|
|
#else
|
|
QCryptoAkCipher *qcrypto_akcipher_new(const QCryptoAkCipherOptions *opts,
|
|
QCryptoAkCipherKeyType type,
|
|
const uint8_t *key, size_t keylen,
|
|
Error **errp)
|
|
{
|
|
QCryptoAkCipher *akcipher = NULL;
|
|
|
|
return akcipher;
|
|
}
|
|
|
|
bool qcrypto_akcipher_supports(QCryptoAkCipherOptions *opts)
|
|
{
|
|
return false;
|
|
}
|
|
#endif
|
|
|
|
int qcrypto_akcipher_encrypt(QCryptoAkCipher *akcipher,
|
|
const void *in, size_t in_len,
|
|
void *out, size_t out_len, Error **errp)
|
|
{
|
|
const QCryptoAkCipherDriver *drv = akcipher->driver;
|
|
|
|
return drv->encrypt(akcipher, in, in_len, out, out_len, errp);
|
|
}
|
|
|
|
int qcrypto_akcipher_decrypt(QCryptoAkCipher *akcipher,
|
|
const void *in, size_t in_len,
|
|
void *out, size_t out_len, Error **errp)
|
|
{
|
|
const QCryptoAkCipherDriver *drv = akcipher->driver;
|
|
|
|
return drv->decrypt(akcipher, in, in_len, out, out_len, errp);
|
|
}
|
|
|
|
int qcrypto_akcipher_sign(QCryptoAkCipher *akcipher,
|
|
const void *in, size_t in_len,
|
|
void *out, size_t out_len, Error **errp)
|
|
{
|
|
const QCryptoAkCipherDriver *drv = akcipher->driver;
|
|
|
|
return drv->sign(akcipher, in, in_len, out, out_len, errp);
|
|
}
|
|
|
|
int qcrypto_akcipher_verify(QCryptoAkCipher *akcipher,
|
|
const void *in, size_t in_len,
|
|
const void *in2, size_t in2_len, Error **errp)
|
|
{
|
|
const QCryptoAkCipherDriver *drv = akcipher->driver;
|
|
|
|
return drv->verify(akcipher, in, in_len, in2, in2_len, errp);
|
|
}
|
|
|
|
int qcrypto_akcipher_max_plaintext_len(QCryptoAkCipher *akcipher)
|
|
{
|
|
return akcipher->max_plaintext_len;
|
|
}
|
|
|
|
int qcrypto_akcipher_max_ciphertext_len(QCryptoAkCipher *akcipher)
|
|
{
|
|
return akcipher->max_ciphertext_len;
|
|
}
|
|
|
|
int qcrypto_akcipher_max_signature_len(QCryptoAkCipher *akcipher)
|
|
{
|
|
return akcipher->max_signature_len;
|
|
}
|
|
|
|
int qcrypto_akcipher_max_dgst_len(QCryptoAkCipher *akcipher)
|
|
{
|
|
return akcipher->max_dgst_len;
|
|
}
|
|
|
|
void qcrypto_akcipher_free(QCryptoAkCipher *akcipher)
|
|
{
|
|
const QCryptoAkCipherDriver *drv = akcipher->driver;
|
|
|
|
drv->free(akcipher);
|
|
}
|
|
|
|
int qcrypto_akcipher_export_p8info(const QCryptoAkCipherOptions *opts,
|
|
uint8_t *key, size_t keylen,
|
|
uint8_t **dst, size_t *dst_len,
|
|
Error **errp)
|
|
{
|
|
switch (opts->alg) {
|
|
case QCRYPTO_AKCIPHER_ALG_RSA:
|
|
qcrypto_akcipher_rsakey_export_p8info(key, keylen, dst, dst_len);
|
|
return 0;
|
|
|
|
default:
|
|
error_setg(errp, "Unsupported algorithm: %u", opts->alg);
|
|
return -1;
|
|
}
|
|
}
|