|  | /* | 
|  | * QEMU Cryptodev backend for QEMU cipher APIs | 
|  | * | 
|  | * Copyright (c) 2022 Bytedance.Inc | 
|  | * | 
|  | * Authors: | 
|  | *    lei he <helei.sig11@bytedance.com> | 
|  | * | 
|  | * This library is free software; you can redistribute it and/or | 
|  | * modify it under the terms of the GNU Lesser General Public | 
|  | * License as published by the Free Software Foundation; either | 
|  | * version 2.1 of the License, or (at your option) any later version. | 
|  | * | 
|  | * This library is distributed in the hope that it will be useful, | 
|  | * but WITHOUT ANY WARRANTY; without even the implied warranty of | 
|  | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU | 
|  | * Lesser General Public License for more details. | 
|  | * | 
|  | * You should have received a copy of the GNU Lesser General Public | 
|  | * License along with this library; if not, see <http://www.gnu.org/licenses/>. | 
|  | * | 
|  | */ | 
|  |  | 
|  | #include "qemu/osdep.h" | 
|  | #include "crypto/cipher.h" | 
|  | #include "crypto/akcipher.h" | 
|  | #include "qapi/error.h" | 
|  | #include "qemu/main-loop.h" | 
|  | #include "qemu/thread.h" | 
|  | #include "qemu/error-report.h" | 
|  | #include "qemu/queue.h" | 
|  | #include "qom/object.h" | 
|  | #include "system/cryptodev.h" | 
|  | #include "standard-headers/linux/virtio_crypto.h" | 
|  |  | 
|  | #include <keyutils.h> | 
|  | #include <sys/eventfd.h> | 
|  |  | 
|  | /** | 
|  | * @TYPE_CRYPTODEV_BACKEND_LKCF: | 
|  | * name of backend that uses linux kernel crypto framework | 
|  | */ | 
|  | #define TYPE_CRYPTODEV_BACKEND_LKCF "cryptodev-backend-lkcf" | 
|  |  | 
|  | OBJECT_DECLARE_SIMPLE_TYPE(CryptoDevBackendLKCF, CRYPTODEV_BACKEND_LKCF) | 
|  |  | 
|  | #define INVALID_KEY_ID -1 | 
|  | #define MAX_SESSIONS 256 | 
|  | #define NR_WORKER_THREAD 64 | 
|  |  | 
|  | #define KCTL_KEY_TYPE_PKEY "asymmetric" | 
|  | /** | 
|  | * Here the key is uploaded to the thread-keyring of worker thread, at least | 
|  | * util linux-6.0: | 
|  | * 1. process keyring seems to behave unexpectedly if main-thread does not | 
|  | * create the keyring before creating any other thread. | 
|  | * 2. at present, the guest kernel never perform multiple operations on a | 
|  | * session. | 
|  | * 3. it can reduce the load of the main-loop because the key passed by the | 
|  | * guest kernel has been already checked. | 
|  | */ | 
|  | #define KCTL_KEY_RING KEY_SPEC_THREAD_KEYRING | 
|  |  | 
|  | typedef struct CryptoDevBackendLKCFSession { | 
|  | uint8_t *key; | 
|  | size_t keylen; | 
|  | QCryptoAkCipherKeyType keytype; | 
|  | QCryptoAkCipherOptions akcipher_opts; | 
|  | } CryptoDevBackendLKCFSession; | 
|  |  | 
|  | typedef struct CryptoDevBackendLKCF CryptoDevBackendLKCF; | 
|  | typedef struct CryptoDevLKCFTask CryptoDevLKCFTask; | 
|  | struct CryptoDevLKCFTask { | 
|  | CryptoDevBackendLKCFSession *sess; | 
|  | CryptoDevBackendOpInfo *op_info; | 
|  | CryptoDevCompletionFunc cb; | 
|  | void *opaque; | 
|  | int status; | 
|  | CryptoDevBackendLKCF *lkcf; | 
|  | QSIMPLEQ_ENTRY(CryptoDevLKCFTask) queue; | 
|  | }; | 
|  |  | 
|  | typedef struct CryptoDevBackendLKCF { | 
|  | CryptoDevBackend parent_obj; | 
|  | CryptoDevBackendLKCFSession *sess[MAX_SESSIONS]; | 
|  | QSIMPLEQ_HEAD(, CryptoDevLKCFTask) requests; | 
|  | QSIMPLEQ_HEAD(, CryptoDevLKCFTask) responses; | 
|  | QemuMutex mutex; | 
|  | QemuCond cond; | 
|  | QemuMutex rsp_mutex; | 
|  |  | 
|  | /** | 
|  | * There is no async interface for asymmetric keys like AF_ALG sockets, | 
|  | * we don't seem to have better way than create a lots of thread. | 
|  | */ | 
|  | QemuThread worker_threads[NR_WORKER_THREAD]; | 
|  | bool running; | 
|  | int eventfd; | 
|  | } CryptoDevBackendLKCF; | 
|  |  | 
|  | static void *cryptodev_lkcf_worker(void *arg); | 
|  | static int cryptodev_lkcf_close_session(CryptoDevBackend *backend, | 
|  | uint64_t session_id, | 
|  | uint32_t queue_index, | 
|  | CryptoDevCompletionFunc cb, | 
|  | void *opaque); | 
|  |  | 
|  | static void cryptodev_lkcf_handle_response(void *opaque) | 
|  | { | 
|  | CryptoDevBackendLKCF *lkcf = (CryptoDevBackendLKCF *)opaque; | 
|  | QSIMPLEQ_HEAD(, CryptoDevLKCFTask) responses; | 
|  | CryptoDevLKCFTask *task, *next; | 
|  | eventfd_t nevent; | 
|  |  | 
|  | QSIMPLEQ_INIT(&responses); | 
|  | eventfd_read(lkcf->eventfd, &nevent); | 
|  |  | 
|  | qemu_mutex_lock(&lkcf->rsp_mutex); | 
|  | QSIMPLEQ_PREPEND(&responses, &lkcf->responses); | 
|  | qemu_mutex_unlock(&lkcf->rsp_mutex); | 
|  |  | 
|  | QSIMPLEQ_FOREACH_SAFE(task, &responses, queue, next) { | 
|  | if (task->cb) { | 
|  | task->cb(task->opaque, task->status); | 
|  | } | 
|  | g_free(task); | 
|  | } | 
|  | } | 
|  |  | 
|  | static int cryptodev_lkcf_set_op_desc(QCryptoAkCipherOptions *opts, | 
|  | char *key_desc, | 
|  | size_t desc_len, | 
|  | Error **errp) | 
|  | { | 
|  | QCryptoAkCipherOptionsRSA *rsa_opt; | 
|  | if (opts->alg != QCRYPTO_AK_CIPHER_ALGO_RSA) { | 
|  | error_setg(errp, "Unsupported alg: %u", opts->alg); | 
|  | return -1; | 
|  | } | 
|  |  | 
|  | rsa_opt = &opts->u.rsa; | 
|  | if (rsa_opt->padding_alg == QCRYPTO_RSA_PADDING_ALGO_PKCS1) { | 
|  | snprintf(key_desc, desc_len, "enc=%s hash=%s", | 
|  | QCryptoRSAPaddingAlgo_str(rsa_opt->padding_alg), | 
|  | QCryptoHashAlgo_str(rsa_opt->hash_alg)); | 
|  |  | 
|  | } else { | 
|  | snprintf(key_desc, desc_len, "enc=%s", | 
|  | QCryptoRSAPaddingAlgo_str(rsa_opt->padding_alg)); | 
|  | } | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static int cryptodev_lkcf_set_rsa_opt(int virtio_padding_alg, | 
|  | int virtio_hash_alg, | 
|  | QCryptoAkCipherOptionsRSA *opt, | 
|  | Error **errp) | 
|  | { | 
|  | if (virtio_padding_alg == VIRTIO_CRYPTO_RSA_PKCS1_PADDING) { | 
|  | opt->padding_alg = QCRYPTO_RSA_PADDING_ALGO_PKCS1; | 
|  |  | 
|  | switch (virtio_hash_alg) { | 
|  | case VIRTIO_CRYPTO_RSA_MD5: | 
|  | opt->hash_alg = QCRYPTO_HASH_ALGO_MD5; | 
|  | break; | 
|  |  | 
|  | case VIRTIO_CRYPTO_RSA_SHA1: | 
|  | opt->hash_alg = QCRYPTO_HASH_ALGO_SHA1; | 
|  | break; | 
|  |  | 
|  | case VIRTIO_CRYPTO_RSA_SHA256: | 
|  | opt->hash_alg = QCRYPTO_HASH_ALGO_SHA256; | 
|  | break; | 
|  |  | 
|  | case VIRTIO_CRYPTO_RSA_SHA512: | 
|  | opt->hash_alg = QCRYPTO_HASH_ALGO_SHA512; | 
|  | break; | 
|  |  | 
|  | default: | 
|  | error_setg(errp, "Unsupported rsa hash algo: %d", virtio_hash_alg); | 
|  | return -1; | 
|  | } | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | if (virtio_padding_alg == VIRTIO_CRYPTO_RSA_RAW_PADDING) { | 
|  | opt->padding_alg = QCRYPTO_RSA_PADDING_ALGO_RAW; | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | error_setg(errp, "Unsupported rsa padding algo: %u", virtio_padding_alg); | 
|  | return -1; | 
|  | } | 
|  |  | 
|  | static int cryptodev_lkcf_get_unused_session_index(CryptoDevBackendLKCF *lkcf) | 
|  | { | 
|  | size_t i; | 
|  |  | 
|  | for (i = 0; i < MAX_SESSIONS; i++) { | 
|  | if (lkcf->sess[i] == NULL) { | 
|  | return i; | 
|  | } | 
|  | } | 
|  | return -1; | 
|  | } | 
|  |  | 
|  | static void cryptodev_lkcf_init(CryptoDevBackend *backend, Error **errp) | 
|  | { | 
|  | /* Only support one queue */ | 
|  | int queues = backend->conf.peers.queues, i; | 
|  | CryptoDevBackendClient *cc; | 
|  | CryptoDevBackendLKCF *lkcf = | 
|  | CRYPTODEV_BACKEND_LKCF(backend); | 
|  |  | 
|  | if (queues != 1) { | 
|  | error_setg(errp, | 
|  | "Only support one queue in cryptodev-builtin backend"); | 
|  | return; | 
|  | } | 
|  | lkcf->eventfd = eventfd(0, 0); | 
|  | if (lkcf->eventfd < 0) { | 
|  | error_setg(errp, "Failed to create eventfd: %d", errno); | 
|  | return; | 
|  | } | 
|  |  | 
|  | cc = cryptodev_backend_new_client(); | 
|  | cc->info_str = g_strdup_printf("cryptodev-lkcf0"); | 
|  | cc->queue_index = 0; | 
|  | cc->type = QCRYPTODEV_BACKEND_TYPE_LKCF; | 
|  | backend->conf.peers.ccs[0] = cc; | 
|  |  | 
|  | backend->conf.crypto_services = | 
|  | 1u << QCRYPTODEV_BACKEND_SERVICE_TYPE_AKCIPHER; | 
|  | backend->conf.akcipher_algo = 1u << VIRTIO_CRYPTO_AKCIPHER_RSA; | 
|  | lkcf->running = true; | 
|  |  | 
|  | QSIMPLEQ_INIT(&lkcf->requests); | 
|  | QSIMPLEQ_INIT(&lkcf->responses); | 
|  | qemu_mutex_init(&lkcf->mutex); | 
|  | qemu_mutex_init(&lkcf->rsp_mutex); | 
|  | qemu_cond_init(&lkcf->cond); | 
|  | for (i = 0; i < NR_WORKER_THREAD; i++) { | 
|  | qemu_thread_create(&lkcf->worker_threads[i], "lkcf-worker", | 
|  | cryptodev_lkcf_worker, lkcf, 0); | 
|  | } | 
|  | qemu_set_fd_handler( | 
|  | lkcf->eventfd, cryptodev_lkcf_handle_response, NULL, lkcf); | 
|  | cryptodev_backend_set_ready(backend, true); | 
|  | } | 
|  |  | 
|  | static void cryptodev_lkcf_cleanup(CryptoDevBackend *backend, Error **errp) | 
|  | { | 
|  | CryptoDevBackendLKCF *lkcf = CRYPTODEV_BACKEND_LKCF(backend); | 
|  | size_t i; | 
|  | int queues = backend->conf.peers.queues; | 
|  | CryptoDevBackendClient *cc; | 
|  | CryptoDevLKCFTask *task, *next; | 
|  |  | 
|  | qemu_mutex_lock(&lkcf->mutex); | 
|  | lkcf->running = false; | 
|  | qemu_mutex_unlock(&lkcf->mutex); | 
|  | qemu_cond_broadcast(&lkcf->cond); | 
|  |  | 
|  | close(lkcf->eventfd); | 
|  | for (i = 0; i < NR_WORKER_THREAD; i++) { | 
|  | qemu_thread_join(&lkcf->worker_threads[i]); | 
|  | } | 
|  |  | 
|  | QSIMPLEQ_FOREACH_SAFE(task, &lkcf->requests, queue, next) { | 
|  | if (task->cb) { | 
|  | task->cb(task->opaque, task->status); | 
|  | } | 
|  | g_free(task); | 
|  | } | 
|  |  | 
|  | QSIMPLEQ_FOREACH_SAFE(task, &lkcf->responses, queue, next) { | 
|  | if (task->cb) { | 
|  | task->cb(task->opaque, task->status); | 
|  | } | 
|  | g_free(task); | 
|  | } | 
|  |  | 
|  | qemu_mutex_destroy(&lkcf->mutex); | 
|  | qemu_cond_destroy(&lkcf->cond); | 
|  | qemu_mutex_destroy(&lkcf->rsp_mutex); | 
|  |  | 
|  | for (i = 0; i < MAX_SESSIONS; i++) { | 
|  | if (lkcf->sess[i] != NULL) { | 
|  | cryptodev_lkcf_close_session(backend, i, 0, NULL, NULL); | 
|  | } | 
|  | } | 
|  |  | 
|  | for (i = 0; i < queues; i++) { | 
|  | cc = backend->conf.peers.ccs[i]; | 
|  | if (cc) { | 
|  | cryptodev_backend_free_client(cc); | 
|  | backend->conf.peers.ccs[i] = NULL; | 
|  | } | 
|  | } | 
|  |  | 
|  | cryptodev_backend_set_ready(backend, false); | 
|  | } | 
|  |  | 
|  | static void cryptodev_lkcf_execute_task(CryptoDevLKCFTask *task) | 
|  | { | 
|  | CryptoDevBackendLKCFSession *session = task->sess; | 
|  | CryptoDevBackendAsymOpInfo *asym_op_info; | 
|  | bool kick = false; | 
|  | int ret, status, op_code = task->op_info->op_code; | 
|  | size_t p8info_len; | 
|  | g_autofree uint8_t *p8info = NULL; | 
|  | Error *local_error = NULL; | 
|  | key_serial_t key_id = INVALID_KEY_ID; | 
|  | char op_desc[64]; | 
|  | g_autoptr(QCryptoAkCipher) akcipher = NULL; | 
|  |  | 
|  | /** | 
|  | * We only offload private key session: | 
|  | * 1. currently, the Linux kernel can only accept public key wrapped | 
|  | * with X.509 certificates, but unfortunately the cost of making a | 
|  | * ceritificate with public key is too expensive. | 
|  | * 2. generally, public key related compution is fast, just compute it with | 
|  | * thread-pool. | 
|  | */ | 
|  | if (session->keytype == QCRYPTO_AK_CIPHER_KEY_TYPE_PRIVATE) { | 
|  | if (qcrypto_akcipher_export_p8info(&session->akcipher_opts, | 
|  | session->key, session->keylen, | 
|  | &p8info, &p8info_len, | 
|  | &local_error) != 0 || | 
|  | cryptodev_lkcf_set_op_desc(&session->akcipher_opts, op_desc, | 
|  | sizeof(op_desc), &local_error) != 0) { | 
|  | error_report_err(local_error); | 
|  | status = -VIRTIO_CRYPTO_ERR; | 
|  | goto out; | 
|  | } else { | 
|  | key_id = add_key(KCTL_KEY_TYPE_PKEY, "lkcf-backend-priv-key", | 
|  | p8info, p8info_len, KCTL_KEY_RING); | 
|  | } | 
|  | } | 
|  |  | 
|  | if (key_id < 0) { | 
|  | if (!qcrypto_akcipher_supports(&session->akcipher_opts)) { | 
|  | status = -VIRTIO_CRYPTO_NOTSUPP; | 
|  | goto out; | 
|  | } | 
|  | akcipher = qcrypto_akcipher_new(&session->akcipher_opts, | 
|  | session->keytype, | 
|  | session->key, session->keylen, | 
|  | &local_error); | 
|  | if (!akcipher) { | 
|  | error_report_err(local_error); | 
|  | status = -VIRTIO_CRYPTO_ERR; | 
|  | goto out; | 
|  | } | 
|  | } | 
|  |  | 
|  | asym_op_info = task->op_info->u.asym_op_info; | 
|  | switch (op_code) { | 
|  | case VIRTIO_CRYPTO_AKCIPHER_ENCRYPT: | 
|  | if (key_id >= 0) { | 
|  | ret = keyctl_pkey_encrypt(key_id, op_desc, | 
|  | asym_op_info->src, asym_op_info->src_len, | 
|  | asym_op_info->dst, asym_op_info->dst_len); | 
|  | } else { | 
|  | ret = qcrypto_akcipher_encrypt(akcipher, | 
|  | asym_op_info->src, asym_op_info->src_len, | 
|  | asym_op_info->dst, asym_op_info->dst_len, &local_error); | 
|  | } | 
|  | break; | 
|  |  | 
|  | case VIRTIO_CRYPTO_AKCIPHER_DECRYPT: | 
|  | if (key_id >= 0) { | 
|  | ret = keyctl_pkey_decrypt(key_id, op_desc, | 
|  | asym_op_info->src, asym_op_info->src_len, | 
|  | asym_op_info->dst, asym_op_info->dst_len); | 
|  | } else { | 
|  | ret = qcrypto_akcipher_decrypt(akcipher, | 
|  | asym_op_info->src, asym_op_info->src_len, | 
|  | asym_op_info->dst, asym_op_info->dst_len, &local_error); | 
|  | } | 
|  | break; | 
|  |  | 
|  | case VIRTIO_CRYPTO_AKCIPHER_SIGN: | 
|  | if (key_id >= 0) { | 
|  | ret = keyctl_pkey_sign(key_id, op_desc, | 
|  | asym_op_info->src, asym_op_info->src_len, | 
|  | asym_op_info->dst, asym_op_info->dst_len); | 
|  | } else { | 
|  | ret = qcrypto_akcipher_sign(akcipher, | 
|  | asym_op_info->src, asym_op_info->src_len, | 
|  | asym_op_info->dst, asym_op_info->dst_len, &local_error); | 
|  | } | 
|  | break; | 
|  |  | 
|  | case VIRTIO_CRYPTO_AKCIPHER_VERIFY: | 
|  | if (key_id >= 0) { | 
|  | ret = keyctl_pkey_verify(key_id, op_desc, | 
|  | asym_op_info->src, asym_op_info->src_len, | 
|  | asym_op_info->dst, asym_op_info->dst_len); | 
|  | } else { | 
|  | ret = qcrypto_akcipher_verify(akcipher, | 
|  | asym_op_info->src, asym_op_info->src_len, | 
|  | asym_op_info->dst, asym_op_info->dst_len, &local_error); | 
|  | } | 
|  | break; | 
|  |  | 
|  | default: | 
|  | error_setg(&local_error, "Unknown opcode: %u", op_code); | 
|  | status = -VIRTIO_CRYPTO_ERR; | 
|  | goto out; | 
|  | } | 
|  |  | 
|  | if (ret < 0) { | 
|  | if (!local_error) { | 
|  | if (errno != EKEYREJECTED) { | 
|  | error_report("Failed do operation with keyctl: %d", errno); | 
|  | } | 
|  | } else { | 
|  | error_report_err(local_error); | 
|  | } | 
|  | status = op_code == VIRTIO_CRYPTO_AKCIPHER_VERIFY ? | 
|  | -VIRTIO_CRYPTO_KEY_REJECTED : -VIRTIO_CRYPTO_ERR; | 
|  | } else { | 
|  | status = VIRTIO_CRYPTO_OK; | 
|  | asym_op_info->dst_len = ret; | 
|  | } | 
|  |  | 
|  | out: | 
|  | if (key_id >= 0) { | 
|  | keyctl_unlink(key_id, KCTL_KEY_RING); | 
|  | } | 
|  | task->status = status; | 
|  |  | 
|  | qemu_mutex_lock(&task->lkcf->rsp_mutex); | 
|  | if (QSIMPLEQ_EMPTY(&task->lkcf->responses)) { | 
|  | kick = true; | 
|  | } | 
|  | QSIMPLEQ_INSERT_TAIL(&task->lkcf->responses, task, queue); | 
|  | qemu_mutex_unlock(&task->lkcf->rsp_mutex); | 
|  |  | 
|  | if (kick) { | 
|  | eventfd_write(task->lkcf->eventfd, 1); | 
|  | } | 
|  | } | 
|  |  | 
|  | static void *cryptodev_lkcf_worker(void *arg) | 
|  | { | 
|  | CryptoDevBackendLKCF *backend = (CryptoDevBackendLKCF *)arg; | 
|  | CryptoDevLKCFTask *task; | 
|  |  | 
|  | for (;;) { | 
|  | task = NULL; | 
|  | qemu_mutex_lock(&backend->mutex); | 
|  | while (backend->running && QSIMPLEQ_EMPTY(&backend->requests)) { | 
|  | qemu_cond_wait(&backend->cond, &backend->mutex); | 
|  | } | 
|  | if (backend->running) { | 
|  | task = QSIMPLEQ_FIRST(&backend->requests); | 
|  | QSIMPLEQ_REMOVE_HEAD(&backend->requests, queue); | 
|  | } | 
|  | qemu_mutex_unlock(&backend->mutex); | 
|  |  | 
|  | /* stopped */ | 
|  | if (!task) { | 
|  | break; | 
|  | } | 
|  | cryptodev_lkcf_execute_task(task); | 
|  | } | 
|  |  | 
|  | return NULL; | 
|  | } | 
|  |  | 
|  | static int cryptodev_lkcf_operation( | 
|  | CryptoDevBackend *backend, | 
|  | CryptoDevBackendOpInfo *op_info) | 
|  | { | 
|  | CryptoDevBackendLKCF *lkcf = | 
|  | CRYPTODEV_BACKEND_LKCF(backend); | 
|  | CryptoDevBackendLKCFSession *sess; | 
|  | QCryptodevBackendAlgoType algtype = op_info->algtype; | 
|  | CryptoDevLKCFTask *task; | 
|  |  | 
|  | if (op_info->session_id >= MAX_SESSIONS || | 
|  | lkcf->sess[op_info->session_id] == NULL) { | 
|  | error_report("Cannot find a valid session id: %" PRIu64 "", | 
|  | op_info->session_id); | 
|  | return -VIRTIO_CRYPTO_INVSESS; | 
|  | } | 
|  |  | 
|  | sess = lkcf->sess[op_info->session_id]; | 
|  | if (algtype != QCRYPTODEV_BACKEND_ALGO_TYPE_ASYM) { | 
|  | error_report("algtype not supported: %u", algtype); | 
|  | return -VIRTIO_CRYPTO_NOTSUPP; | 
|  | } | 
|  |  | 
|  | task = g_new0(CryptoDevLKCFTask, 1); | 
|  | task->op_info = op_info; | 
|  | task->cb = op_info->cb; | 
|  | task->opaque = op_info->opaque; | 
|  | task->sess = sess; | 
|  | task->lkcf = lkcf; | 
|  | task->status = -VIRTIO_CRYPTO_ERR; | 
|  |  | 
|  | qemu_mutex_lock(&lkcf->mutex); | 
|  | QSIMPLEQ_INSERT_TAIL(&lkcf->requests, task, queue); | 
|  | qemu_mutex_unlock(&lkcf->mutex); | 
|  | qemu_cond_signal(&lkcf->cond); | 
|  |  | 
|  | return VIRTIO_CRYPTO_OK; | 
|  | } | 
|  |  | 
|  | static int cryptodev_lkcf_create_asym_session( | 
|  | CryptoDevBackendLKCF *lkcf, | 
|  | CryptoDevBackendAsymSessionInfo *sess_info, | 
|  | uint64_t *session_id) | 
|  | { | 
|  | Error *local_error = NULL; | 
|  | int index; | 
|  | g_autofree CryptoDevBackendLKCFSession *sess = | 
|  | g_new0(CryptoDevBackendLKCFSession, 1); | 
|  |  | 
|  | switch (sess_info->algo) { | 
|  | case VIRTIO_CRYPTO_AKCIPHER_RSA: | 
|  | sess->akcipher_opts.alg = QCRYPTO_AK_CIPHER_ALGO_RSA; | 
|  | if (cryptodev_lkcf_set_rsa_opt( | 
|  | sess_info->u.rsa.padding_algo, sess_info->u.rsa.hash_algo, | 
|  | &sess->akcipher_opts.u.rsa, &local_error) != 0) { | 
|  | error_report_err(local_error); | 
|  | return -VIRTIO_CRYPTO_ERR; | 
|  | } | 
|  | break; | 
|  |  | 
|  | default: | 
|  | error_report("Unsupported asym alg %u", sess_info->algo); | 
|  | return -VIRTIO_CRYPTO_NOTSUPP; | 
|  | } | 
|  |  | 
|  | switch (sess_info->keytype) { | 
|  | case VIRTIO_CRYPTO_AKCIPHER_KEY_TYPE_PUBLIC: | 
|  | sess->keytype = QCRYPTO_AK_CIPHER_KEY_TYPE_PUBLIC; | 
|  | break; | 
|  |  | 
|  | case VIRTIO_CRYPTO_AKCIPHER_KEY_TYPE_PRIVATE: | 
|  | sess->keytype = QCRYPTO_AK_CIPHER_KEY_TYPE_PRIVATE; | 
|  | break; | 
|  |  | 
|  | default: | 
|  | error_report("Unknown akcipher keytype: %u", sess_info->keytype); | 
|  | return -VIRTIO_CRYPTO_ERR; | 
|  | } | 
|  |  | 
|  | index = cryptodev_lkcf_get_unused_session_index(lkcf); | 
|  | if (index < 0) { | 
|  | error_report("Total number of sessions created exceeds %u", | 
|  | MAX_SESSIONS); | 
|  | return -VIRTIO_CRYPTO_ERR; | 
|  | } | 
|  |  | 
|  | sess->keylen = sess_info->keylen; | 
|  | sess->key = g_malloc(sess_info->keylen); | 
|  | memcpy(sess->key, sess_info->key, sess_info->keylen); | 
|  |  | 
|  | lkcf->sess[index] = g_steal_pointer(&sess); | 
|  | *session_id = index; | 
|  |  | 
|  | return VIRTIO_CRYPTO_OK; | 
|  | } | 
|  |  | 
|  | static int cryptodev_lkcf_create_session( | 
|  | CryptoDevBackend *backend, | 
|  | CryptoDevBackendSessionInfo *sess_info, | 
|  | uint32_t queue_index, | 
|  | CryptoDevCompletionFunc cb, | 
|  | void *opaque) | 
|  | { | 
|  | CryptoDevBackendAsymSessionInfo *asym_sess_info; | 
|  | CryptoDevBackendLKCF *lkcf = | 
|  | CRYPTODEV_BACKEND_LKCF(backend); | 
|  | int ret; | 
|  |  | 
|  | switch (sess_info->op_code) { | 
|  | case VIRTIO_CRYPTO_AKCIPHER_CREATE_SESSION: | 
|  | asym_sess_info = &sess_info->u.asym_sess_info; | 
|  | ret = cryptodev_lkcf_create_asym_session( | 
|  | lkcf, asym_sess_info, &sess_info->session_id); | 
|  | break; | 
|  |  | 
|  | default: | 
|  | ret = -VIRTIO_CRYPTO_NOTSUPP; | 
|  | error_report("Unsupported opcode: %" PRIu32 "", | 
|  | sess_info->op_code); | 
|  | break; | 
|  | } | 
|  | if (cb) { | 
|  | cb(opaque, ret); | 
|  | } | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static int cryptodev_lkcf_close_session(CryptoDevBackend *backend, | 
|  | uint64_t session_id, | 
|  | uint32_t queue_index, | 
|  | CryptoDevCompletionFunc cb, | 
|  | void *opaque) | 
|  | { | 
|  | CryptoDevBackendLKCF *lkcf = CRYPTODEV_BACKEND_LKCF(backend); | 
|  | CryptoDevBackendLKCFSession *session; | 
|  |  | 
|  | assert(session_id < MAX_SESSIONS && lkcf->sess[session_id]); | 
|  | session = lkcf->sess[session_id]; | 
|  | lkcf->sess[session_id] = NULL; | 
|  |  | 
|  | g_free(session->key); | 
|  | g_free(session); | 
|  |  | 
|  | if (cb) { | 
|  | cb(opaque, VIRTIO_CRYPTO_OK); | 
|  | } | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static void cryptodev_lkcf_class_init(ObjectClass *oc, const void *data) | 
|  | { | 
|  | CryptoDevBackendClass *bc = CRYPTODEV_BACKEND_CLASS(oc); | 
|  |  | 
|  | bc->init = cryptodev_lkcf_init; | 
|  | bc->cleanup = cryptodev_lkcf_cleanup; | 
|  | bc->create_session = cryptodev_lkcf_create_session; | 
|  | bc->close_session = cryptodev_lkcf_close_session; | 
|  | bc->do_op = cryptodev_lkcf_operation; | 
|  | } | 
|  |  | 
|  | static const TypeInfo cryptodev_builtin_info = { | 
|  | .name = TYPE_CRYPTODEV_BACKEND_LKCF, | 
|  | .parent = TYPE_CRYPTODEV_BACKEND, | 
|  | .class_init = cryptodev_lkcf_class_init, | 
|  | .instance_size = sizeof(CryptoDevBackendLKCF), | 
|  | }; | 
|  |  | 
|  | static void cryptodev_lkcf_register_types(void) | 
|  | { | 
|  | type_register_static(&cryptodev_builtin_info); | 
|  | } | 
|  |  | 
|  | type_init(cryptodev_lkcf_register_types); |