mirror of
https://github.com/xemu-project/xemu.git
synced 2024-11-30 23:10:38 +00:00
0e660a6f90
There are two parts in this patch: 1, support akcipher service by cryptodev-builtin driver 2, virtio-crypto driver supports akcipher service In principle, we should separate this into two patches, to avoid compiling error, merge them into one. Then virtio-crypto gets request from guest side, and forwards the request to builtin driver to handle it. Test with a guest linux: 1, The self-test framework of crypto layer works fine in guest kernel 2, Test with Linux guest(with asym support), the following script test(note that pkey_XXX is supported only in a newer version of keyutils): - both public key & private key - create/close session - encrypt/decrypt/sign/verify basic driver operation - also test with kernel crypto layer(pkey add/query) All the cases work fine. Run script in guest: rm -rf *.der *.pem *.pfx modprobe pkcs8_key_parser # if CONFIG_PKCS8_PRIVATE_KEY_PARSER=m rm -rf /tmp/data dd if=/dev/random of=/tmp/data count=1 bs=20 openssl req -nodes -x509 -newkey rsa:2048 -keyout key.pem -out cert.pem -subj "/C=CN/ST=BJ/L=HD/O=qemu/OU=dev/CN=qemu/emailAddress=qemu@qemu.org" openssl pkcs8 -in key.pem -topk8 -nocrypt -outform DER -out key.der openssl x509 -in cert.pem -inform PEM -outform DER -out cert.der PRIV_KEY_ID=`cat key.der | keyctl padd asymmetric test_priv_key @s` echo "priv key id = "$PRIV_KEY_ID PUB_KEY_ID=`cat cert.der | keyctl padd asymmetric test_pub_key @s` echo "pub key id = "$PUB_KEY_ID keyctl pkey_query $PRIV_KEY_ID 0 keyctl pkey_query $PUB_KEY_ID 0 echo "Enc with priv key..." keyctl pkey_encrypt $PRIV_KEY_ID 0 /tmp/data enc=pkcs1 >/tmp/enc.priv echo "Dec with pub key..." keyctl pkey_decrypt $PRIV_KEY_ID 0 /tmp/enc.priv enc=pkcs1 >/tmp/dec cmp /tmp/data /tmp/dec echo "Sign with priv key..." keyctl pkey_sign $PRIV_KEY_ID 0 /tmp/data enc=pkcs1 hash=sha1 > /tmp/sig echo "Verify with pub key..." keyctl pkey_verify $PRIV_KEY_ID 0 /tmp/data /tmp/sig enc=pkcs1 hash=sha1 echo "Enc with pub key..." keyctl pkey_encrypt $PUB_KEY_ID 0 /tmp/data enc=pkcs1 >/tmp/enc.pub echo "Dec with priv key..." keyctl pkey_decrypt $PRIV_KEY_ID 0 /tmp/enc.pub enc=pkcs1 >/tmp/dec cmp /tmp/data /tmp/dec echo "Verify with pub key..." keyctl pkey_verify $PUB_KEY_ID 0 /tmp/data /tmp/sig enc=pkcs1 hash=sha1 Reviewed-by: Gonglei <arei.gonglei@huawei.com> Signed-off-by: lei he <helei.sig11@bytedance.com Signed-off-by: zhenwei pi <pizhenwei@bytedance.com> Message-Id: <20220611064243.24535-2-pizhenwei@bytedance.com> Reviewed-by: Michael S. Tsirkin <mst@redhat.com> Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
254 lines
6.6 KiB
C
254 lines
6.6 KiB
C
/*
|
|
* QEMU Crypto Device Implementation
|
|
*
|
|
* Copyright (c) 2016 HUAWEI TECHNOLOGIES CO., LTD.
|
|
*
|
|
* Authors:
|
|
* Gonglei <arei.gonglei@huawei.com>
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, see <http://www.gnu.org/licenses/>.
|
|
*
|
|
*/
|
|
|
|
#include "qemu/osdep.h"
|
|
#include "sysemu/cryptodev.h"
|
|
#include "qapi/error.h"
|
|
#include "qapi/visitor.h"
|
|
#include "qemu/config-file.h"
|
|
#include "qom/object_interfaces.h"
|
|
#include "hw/virtio/virtio-crypto.h"
|
|
|
|
|
|
static QTAILQ_HEAD(, CryptoDevBackendClient) crypto_clients;
|
|
|
|
|
|
CryptoDevBackendClient *
|
|
cryptodev_backend_new_client(const char *model,
|
|
const char *name)
|
|
{
|
|
CryptoDevBackendClient *cc;
|
|
|
|
cc = g_new0(CryptoDevBackendClient, 1);
|
|
cc->model = g_strdup(model);
|
|
if (name) {
|
|
cc->name = g_strdup(name);
|
|
}
|
|
|
|
QTAILQ_INSERT_TAIL(&crypto_clients, cc, next);
|
|
|
|
return cc;
|
|
}
|
|
|
|
void cryptodev_backend_free_client(
|
|
CryptoDevBackendClient *cc)
|
|
{
|
|
QTAILQ_REMOVE(&crypto_clients, cc, next);
|
|
g_free(cc->name);
|
|
g_free(cc->model);
|
|
g_free(cc->info_str);
|
|
g_free(cc);
|
|
}
|
|
|
|
void cryptodev_backend_cleanup(
|
|
CryptoDevBackend *backend,
|
|
Error **errp)
|
|
{
|
|
CryptoDevBackendClass *bc =
|
|
CRYPTODEV_BACKEND_GET_CLASS(backend);
|
|
|
|
if (bc->cleanup) {
|
|
bc->cleanup(backend, errp);
|
|
}
|
|
}
|
|
|
|
int64_t cryptodev_backend_create_session(
|
|
CryptoDevBackend *backend,
|
|
CryptoDevBackendSessionInfo *sess_info,
|
|
uint32_t queue_index, Error **errp)
|
|
{
|
|
CryptoDevBackendClass *bc =
|
|
CRYPTODEV_BACKEND_GET_CLASS(backend);
|
|
|
|
if (bc->create_session) {
|
|
return bc->create_session(backend, sess_info, queue_index, errp);
|
|
}
|
|
|
|
return -1;
|
|
}
|
|
|
|
int cryptodev_backend_close_session(
|
|
CryptoDevBackend *backend,
|
|
uint64_t session_id,
|
|
uint32_t queue_index, Error **errp)
|
|
{
|
|
CryptoDevBackendClass *bc =
|
|
CRYPTODEV_BACKEND_GET_CLASS(backend);
|
|
|
|
if (bc->close_session) {
|
|
return bc->close_session(backend, session_id, queue_index, errp);
|
|
}
|
|
|
|
return -1;
|
|
}
|
|
|
|
static int cryptodev_backend_operation(
|
|
CryptoDevBackend *backend,
|
|
CryptoDevBackendOpInfo *op_info,
|
|
uint32_t queue_index, Error **errp)
|
|
{
|
|
CryptoDevBackendClass *bc =
|
|
CRYPTODEV_BACKEND_GET_CLASS(backend);
|
|
|
|
if (bc->do_op) {
|
|
return bc->do_op(backend, op_info, queue_index, errp);
|
|
}
|
|
|
|
return -VIRTIO_CRYPTO_ERR;
|
|
}
|
|
|
|
int cryptodev_backend_crypto_operation(
|
|
CryptoDevBackend *backend,
|
|
void *opaque,
|
|
uint32_t queue_index, Error **errp)
|
|
{
|
|
VirtIOCryptoReq *req = opaque;
|
|
CryptoDevBackendOpInfo *op_info = &req->op_info;
|
|
enum CryptoDevBackendAlgType algtype = req->flags;
|
|
|
|
if ((algtype != CRYPTODEV_BACKEND_ALG_SYM)
|
|
&& (algtype != CRYPTODEV_BACKEND_ALG_ASYM)) {
|
|
error_setg(errp, "Unsupported cryptodev alg type: %" PRIu32 "",
|
|
algtype);
|
|
|
|
return -VIRTIO_CRYPTO_NOTSUPP;
|
|
}
|
|
|
|
return cryptodev_backend_operation(backend, op_info, queue_index, errp);
|
|
}
|
|
|
|
static void
|
|
cryptodev_backend_get_queues(Object *obj, Visitor *v, const char *name,
|
|
void *opaque, Error **errp)
|
|
{
|
|
CryptoDevBackend *backend = CRYPTODEV_BACKEND(obj);
|
|
uint32_t value = backend->conf.peers.queues;
|
|
|
|
visit_type_uint32(v, name, &value, errp);
|
|
}
|
|
|
|
static void
|
|
cryptodev_backend_set_queues(Object *obj, Visitor *v, const char *name,
|
|
void *opaque, Error **errp)
|
|
{
|
|
CryptoDevBackend *backend = CRYPTODEV_BACKEND(obj);
|
|
uint32_t value;
|
|
|
|
if (!visit_type_uint32(v, name, &value, errp)) {
|
|
return;
|
|
}
|
|
if (!value) {
|
|
error_setg(errp, "Property '%s.%s' doesn't take value '%" PRIu32 "'",
|
|
object_get_typename(obj), name, value);
|
|
return;
|
|
}
|
|
backend->conf.peers.queues = value;
|
|
}
|
|
|
|
static void
|
|
cryptodev_backend_complete(UserCreatable *uc, Error **errp)
|
|
{
|
|
CryptoDevBackend *backend = CRYPTODEV_BACKEND(uc);
|
|
CryptoDevBackendClass *bc = CRYPTODEV_BACKEND_GET_CLASS(uc);
|
|
|
|
if (bc->init) {
|
|
bc->init(backend, errp);
|
|
}
|
|
}
|
|
|
|
void cryptodev_backend_set_used(CryptoDevBackend *backend, bool used)
|
|
{
|
|
backend->is_used = used;
|
|
}
|
|
|
|
bool cryptodev_backend_is_used(CryptoDevBackend *backend)
|
|
{
|
|
return backend->is_used;
|
|
}
|
|
|
|
void cryptodev_backend_set_ready(CryptoDevBackend *backend, bool ready)
|
|
{
|
|
backend->ready = ready;
|
|
}
|
|
|
|
bool cryptodev_backend_is_ready(CryptoDevBackend *backend)
|
|
{
|
|
return backend->ready;
|
|
}
|
|
|
|
static bool
|
|
cryptodev_backend_can_be_deleted(UserCreatable *uc)
|
|
{
|
|
return !cryptodev_backend_is_used(CRYPTODEV_BACKEND(uc));
|
|
}
|
|
|
|
static void cryptodev_backend_instance_init(Object *obj)
|
|
{
|
|
/* Initialize devices' queues property to 1 */
|
|
object_property_set_int(obj, "queues", 1, NULL);
|
|
}
|
|
|
|
static void cryptodev_backend_finalize(Object *obj)
|
|
{
|
|
CryptoDevBackend *backend = CRYPTODEV_BACKEND(obj);
|
|
|
|
cryptodev_backend_cleanup(backend, NULL);
|
|
}
|
|
|
|
static void
|
|
cryptodev_backend_class_init(ObjectClass *oc, void *data)
|
|
{
|
|
UserCreatableClass *ucc = USER_CREATABLE_CLASS(oc);
|
|
|
|
ucc->complete = cryptodev_backend_complete;
|
|
ucc->can_be_deleted = cryptodev_backend_can_be_deleted;
|
|
|
|
QTAILQ_INIT(&crypto_clients);
|
|
object_class_property_add(oc, "queues", "uint32",
|
|
cryptodev_backend_get_queues,
|
|
cryptodev_backend_set_queues,
|
|
NULL, NULL);
|
|
}
|
|
|
|
static const TypeInfo cryptodev_backend_info = {
|
|
.name = TYPE_CRYPTODEV_BACKEND,
|
|
.parent = TYPE_OBJECT,
|
|
.instance_size = sizeof(CryptoDevBackend),
|
|
.instance_init = cryptodev_backend_instance_init,
|
|
.instance_finalize = cryptodev_backend_finalize,
|
|
.class_size = sizeof(CryptoDevBackendClass),
|
|
.class_init = cryptodev_backend_class_init,
|
|
.interfaces = (InterfaceInfo[]) {
|
|
{ TYPE_USER_CREATABLE },
|
|
{ }
|
|
}
|
|
};
|
|
|
|
static void
|
|
cryptodev_backend_register_types(void)
|
|
{
|
|
type_register_static(&cryptodev_backend_info);
|
|
}
|
|
|
|
type_init(cryptodev_backend_register_types);
|