mirror of
				https://github.com/qemu/qemu.git
				synced 2025-10-30 10:30:10 +00:00 
			
		
		
		
	 0e660a6f90
			
		
	
	
		0e660a6f90
		
	
	
	
	
		
			
			There are two parts in this patch: 1, support akcipher service by cryptodev-builtin driver 2, virtio-crypto driver supports akcipher service In principle, we should separate this into two patches, to avoid compiling error, merge them into one. Then virtio-crypto gets request from guest side, and forwards the request to builtin driver to handle it. Test with a guest linux: 1, The self-test framework of crypto layer works fine in guest kernel 2, Test with Linux guest(with asym support), the following script test(note that pkey_XXX is supported only in a newer version of keyutils): - both public key & private key - create/close session - encrypt/decrypt/sign/verify basic driver operation - also test with kernel crypto layer(pkey add/query) All the cases work fine. Run script in guest: rm -rf *.der *.pem *.pfx modprobe pkcs8_key_parser # if CONFIG_PKCS8_PRIVATE_KEY_PARSER=m rm -rf /tmp/data dd if=/dev/random of=/tmp/data count=1 bs=20 openssl req -nodes -x509 -newkey rsa:2048 -keyout key.pem -out cert.pem -subj "/C=CN/ST=BJ/L=HD/O=qemu/OU=dev/CN=qemu/emailAddress=qemu@qemu.org" openssl pkcs8 -in key.pem -topk8 -nocrypt -outform DER -out key.der openssl x509 -in cert.pem -inform PEM -outform DER -out cert.der PRIV_KEY_ID=`cat key.der | keyctl padd asymmetric test_priv_key @s` echo "priv key id = "$PRIV_KEY_ID PUB_KEY_ID=`cat cert.der | keyctl padd asymmetric test_pub_key @s` echo "pub key id = "$PUB_KEY_ID keyctl pkey_query $PRIV_KEY_ID 0 keyctl pkey_query $PUB_KEY_ID 0 echo "Enc with priv key..." keyctl pkey_encrypt $PRIV_KEY_ID 0 /tmp/data enc=pkcs1 >/tmp/enc.priv echo "Dec with pub key..." keyctl pkey_decrypt $PRIV_KEY_ID 0 /tmp/enc.priv enc=pkcs1 >/tmp/dec cmp /tmp/data /tmp/dec echo "Sign with priv key..." keyctl pkey_sign $PRIV_KEY_ID 0 /tmp/data enc=pkcs1 hash=sha1 > /tmp/sig echo "Verify with pub key..." keyctl pkey_verify $PRIV_KEY_ID 0 /tmp/data /tmp/sig enc=pkcs1 hash=sha1 echo "Enc with pub key..." keyctl pkey_encrypt $PUB_KEY_ID 0 /tmp/data enc=pkcs1 >/tmp/enc.pub echo "Dec with priv key..." keyctl pkey_decrypt $PRIV_KEY_ID 0 /tmp/enc.pub enc=pkcs1 >/tmp/dec cmp /tmp/data /tmp/dec echo "Verify with pub key..." keyctl pkey_verify $PUB_KEY_ID 0 /tmp/data /tmp/sig enc=pkcs1 hash=sha1 Reviewed-by: Gonglei <arei.gonglei@huawei.com> Signed-off-by: lei he <helei.sig11@bytedance.com Signed-off-by: zhenwei pi <pizhenwei@bytedance.com> Message-Id: <20220611064243.24535-2-pizhenwei@bytedance.com> Reviewed-by: Michael S. Tsirkin <mst@redhat.com> Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
		
			
				
	
	
		
			254 lines
		
	
	
		
			6.6 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			254 lines
		
	
	
		
			6.6 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * QEMU Crypto Device Implementation
 | |
|  *
 | |
|  * Copyright (c) 2016 HUAWEI TECHNOLOGIES CO., LTD.
 | |
|  *
 | |
|  * Authors:
 | |
|  *    Gonglei <arei.gonglei@huawei.com>
 | |
|  *
 | |
|  * This library is free software; you can redistribute it and/or
 | |
|  * modify it under the terms of the GNU Lesser General Public
 | |
|  * License as published by the Free Software Foundation; either
 | |
|  * version 2.1 of the License, or (at your option) any later version.
 | |
|  *
 | |
|  * This library is distributed in the hope that it will be useful,
 | |
|  * but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
|  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 | |
|  * Lesser General Public License for more details.
 | |
|  *
 | |
|  * You should have received a copy of the GNU Lesser General Public
 | |
|  * License along with this library; if not, see <http://www.gnu.org/licenses/>.
 | |
|  *
 | |
|  */
 | |
| 
 | |
| #include "qemu/osdep.h"
 | |
| #include "sysemu/cryptodev.h"
 | |
| #include "qapi/error.h"
 | |
| #include "qapi/visitor.h"
 | |
| #include "qemu/config-file.h"
 | |
| #include "qom/object_interfaces.h"
 | |
| #include "hw/virtio/virtio-crypto.h"
 | |
| 
 | |
| 
 | |
| static QTAILQ_HEAD(, CryptoDevBackendClient) crypto_clients;
 | |
| 
 | |
| 
 | |
| CryptoDevBackendClient *
 | |
| cryptodev_backend_new_client(const char *model,
 | |
|                                     const char *name)
 | |
| {
 | |
|     CryptoDevBackendClient *cc;
 | |
| 
 | |
|     cc = g_new0(CryptoDevBackendClient, 1);
 | |
|     cc->model = g_strdup(model);
 | |
|     if (name) {
 | |
|         cc->name = g_strdup(name);
 | |
|     }
 | |
| 
 | |
|     QTAILQ_INSERT_TAIL(&crypto_clients, cc, next);
 | |
| 
 | |
|     return cc;
 | |
| }
 | |
| 
 | |
| void cryptodev_backend_free_client(
 | |
|                   CryptoDevBackendClient *cc)
 | |
| {
 | |
|     QTAILQ_REMOVE(&crypto_clients, cc, next);
 | |
|     g_free(cc->name);
 | |
|     g_free(cc->model);
 | |
|     g_free(cc->info_str);
 | |
|     g_free(cc);
 | |
| }
 | |
| 
 | |
| void cryptodev_backend_cleanup(
 | |
|              CryptoDevBackend *backend,
 | |
|              Error **errp)
 | |
| {
 | |
|     CryptoDevBackendClass *bc =
 | |
|                   CRYPTODEV_BACKEND_GET_CLASS(backend);
 | |
| 
 | |
|     if (bc->cleanup) {
 | |
|         bc->cleanup(backend, errp);
 | |
|     }
 | |
| }
 | |
| 
 | |
| int64_t cryptodev_backend_create_session(
 | |
|            CryptoDevBackend *backend,
 | |
|            CryptoDevBackendSessionInfo *sess_info,
 | |
|            uint32_t queue_index, Error **errp)
 | |
| {
 | |
|     CryptoDevBackendClass *bc =
 | |
|                       CRYPTODEV_BACKEND_GET_CLASS(backend);
 | |
| 
 | |
|     if (bc->create_session) {
 | |
|         return bc->create_session(backend, sess_info, queue_index, errp);
 | |
|     }
 | |
| 
 | |
|     return -1;
 | |
| }
 | |
| 
 | |
| int cryptodev_backend_close_session(
 | |
|            CryptoDevBackend *backend,
 | |
|            uint64_t session_id,
 | |
|            uint32_t queue_index, Error **errp)
 | |
| {
 | |
|     CryptoDevBackendClass *bc =
 | |
|                       CRYPTODEV_BACKEND_GET_CLASS(backend);
 | |
| 
 | |
|     if (bc->close_session) {
 | |
|         return bc->close_session(backend, session_id, queue_index, errp);
 | |
|     }
 | |
| 
 | |
|     return -1;
 | |
| }
 | |
| 
 | |
| static int cryptodev_backend_operation(
 | |
|                  CryptoDevBackend *backend,
 | |
|                  CryptoDevBackendOpInfo *op_info,
 | |
|                  uint32_t queue_index, Error **errp)
 | |
| {
 | |
|     CryptoDevBackendClass *bc =
 | |
|                       CRYPTODEV_BACKEND_GET_CLASS(backend);
 | |
| 
 | |
|     if (bc->do_op) {
 | |
|         return bc->do_op(backend, op_info, queue_index, errp);
 | |
|     }
 | |
| 
 | |
|     return -VIRTIO_CRYPTO_ERR;
 | |
| }
 | |
| 
 | |
| int cryptodev_backend_crypto_operation(
 | |
|                  CryptoDevBackend *backend,
 | |
|                  void *opaque,
 | |
|                  uint32_t queue_index, Error **errp)
 | |
| {
 | |
|     VirtIOCryptoReq *req = opaque;
 | |
|     CryptoDevBackendOpInfo *op_info = &req->op_info;
 | |
|     enum CryptoDevBackendAlgType algtype = req->flags;
 | |
| 
 | |
|     if ((algtype != CRYPTODEV_BACKEND_ALG_SYM)
 | |
|         && (algtype != CRYPTODEV_BACKEND_ALG_ASYM)) {
 | |
|         error_setg(errp, "Unsupported cryptodev alg type: %" PRIu32 "",
 | |
|                    algtype);
 | |
| 
 | |
|         return -VIRTIO_CRYPTO_NOTSUPP;
 | |
|     }
 | |
| 
 | |
|     return cryptodev_backend_operation(backend, op_info, queue_index, errp);
 | |
| }
 | |
| 
 | |
| static void
 | |
| cryptodev_backend_get_queues(Object *obj, Visitor *v, const char *name,
 | |
|                              void *opaque, Error **errp)
 | |
| {
 | |
|     CryptoDevBackend *backend = CRYPTODEV_BACKEND(obj);
 | |
|     uint32_t value = backend->conf.peers.queues;
 | |
| 
 | |
|     visit_type_uint32(v, name, &value, errp);
 | |
| }
 | |
| 
 | |
| static void
 | |
| cryptodev_backend_set_queues(Object *obj, Visitor *v, const char *name,
 | |
|                              void *opaque, Error **errp)
 | |
| {
 | |
|     CryptoDevBackend *backend = CRYPTODEV_BACKEND(obj);
 | |
|     uint32_t value;
 | |
| 
 | |
|     if (!visit_type_uint32(v, name, &value, errp)) {
 | |
|         return;
 | |
|     }
 | |
|     if (!value) {
 | |
|         error_setg(errp, "Property '%s.%s' doesn't take value '%" PRIu32 "'",
 | |
|                    object_get_typename(obj), name, value);
 | |
|         return;
 | |
|     }
 | |
|     backend->conf.peers.queues = value;
 | |
| }
 | |
| 
 | |
| static void
 | |
| cryptodev_backend_complete(UserCreatable *uc, Error **errp)
 | |
| {
 | |
|     CryptoDevBackend *backend = CRYPTODEV_BACKEND(uc);
 | |
|     CryptoDevBackendClass *bc = CRYPTODEV_BACKEND_GET_CLASS(uc);
 | |
| 
 | |
|     if (bc->init) {
 | |
|         bc->init(backend, errp);
 | |
|     }
 | |
| }
 | |
| 
 | |
| void cryptodev_backend_set_used(CryptoDevBackend *backend, bool used)
 | |
| {
 | |
|     backend->is_used = used;
 | |
| }
 | |
| 
 | |
| bool cryptodev_backend_is_used(CryptoDevBackend *backend)
 | |
| {
 | |
|     return backend->is_used;
 | |
| }
 | |
| 
 | |
| void cryptodev_backend_set_ready(CryptoDevBackend *backend, bool ready)
 | |
| {
 | |
|     backend->ready = ready;
 | |
| }
 | |
| 
 | |
| bool cryptodev_backend_is_ready(CryptoDevBackend *backend)
 | |
| {
 | |
|     return backend->ready;
 | |
| }
 | |
| 
 | |
| static bool
 | |
| cryptodev_backend_can_be_deleted(UserCreatable *uc)
 | |
| {
 | |
|     return !cryptodev_backend_is_used(CRYPTODEV_BACKEND(uc));
 | |
| }
 | |
| 
 | |
| static void cryptodev_backend_instance_init(Object *obj)
 | |
| {
 | |
|     /* Initialize devices' queues property to 1 */
 | |
|     object_property_set_int(obj, "queues", 1, NULL);
 | |
| }
 | |
| 
 | |
| static void cryptodev_backend_finalize(Object *obj)
 | |
| {
 | |
|     CryptoDevBackend *backend = CRYPTODEV_BACKEND(obj);
 | |
| 
 | |
|     cryptodev_backend_cleanup(backend, NULL);
 | |
| }
 | |
| 
 | |
| static void
 | |
| cryptodev_backend_class_init(ObjectClass *oc, void *data)
 | |
| {
 | |
|     UserCreatableClass *ucc = USER_CREATABLE_CLASS(oc);
 | |
| 
 | |
|     ucc->complete = cryptodev_backend_complete;
 | |
|     ucc->can_be_deleted = cryptodev_backend_can_be_deleted;
 | |
| 
 | |
|     QTAILQ_INIT(&crypto_clients);
 | |
|     object_class_property_add(oc, "queues", "uint32",
 | |
|                               cryptodev_backend_get_queues,
 | |
|                               cryptodev_backend_set_queues,
 | |
|                               NULL, NULL);
 | |
| }
 | |
| 
 | |
| static const TypeInfo cryptodev_backend_info = {
 | |
|     .name = TYPE_CRYPTODEV_BACKEND,
 | |
|     .parent = TYPE_OBJECT,
 | |
|     .instance_size = sizeof(CryptoDevBackend),
 | |
|     .instance_init = cryptodev_backend_instance_init,
 | |
|     .instance_finalize = cryptodev_backend_finalize,
 | |
|     .class_size = sizeof(CryptoDevBackendClass),
 | |
|     .class_init = cryptodev_backend_class_init,
 | |
|     .interfaces = (InterfaceInfo[]) {
 | |
|         { TYPE_USER_CREATABLE },
 | |
|         { }
 | |
|     }
 | |
| };
 | |
| 
 | |
| static void
 | |
| cryptodev_backend_register_types(void)
 | |
| {
 | |
|     type_register_static(&cryptodev_backend_info);
 | |
| }
 | |
| 
 | |
| type_init(cryptodev_backend_register_types);
 |