blob: 940104ee55222337b577ee23944a63c3c25d46bf [file] [log] [blame]
Gonglei1653a5f2016-10-28 16:33:23 +08001/*
2 * QEMU Cryptodev backend for QEMU cipher APIs
3 *
4 * Copyright (c) 2016 HUAWEI TECHNOLOGIES CO., LTD.
5 *
6 * Authors:
7 * Gonglei <arei.gonglei@huawei.com>
8 *
9 * This library is free software; you can redistribute it and/or
10 * modify it under the terms of the GNU Lesser General Public
11 * License as published by the Free Software Foundation; either
Chetan Pant0dda0012020-10-14 13:37:22 +000012 * version 2.1 of the License, or (at your option) any later version.
Gonglei1653a5f2016-10-28 16:33:23 +080013 *
14 * This library is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 * Lesser General Public License for more details.
18 *
19 * You should have received a copy of the GNU Lesser General Public
20 * License along with this library; if not, see <http://www.gnu.org/licenses/>.
21 *
22 */
23
24#include "qemu/osdep.h"
25#include "sysemu/cryptodev.h"
Li Zhijian06479db2024-04-22 16:53:12 +080026#include "qemu/error-report.h"
Gonglei1653a5f2016-10-28 16:33:23 +080027#include "qapi/error.h"
28#include "standard-headers/linux/virtio_crypto.h"
29#include "crypto/cipher.h"
zhenwei pi0e660a62022-06-11 14:42:43 +080030#include "crypto/akcipher.h"
Eduardo Habkostdb1015e2020-09-03 16:43:22 -040031#include "qom/object.h"
Gonglei1653a5f2016-10-28 16:33:23 +080032
33
34/**
35 * @TYPE_CRYPTODEV_BACKEND_BUILTIN:
36 * name of backend that uses QEMU cipher API
37 */
38#define TYPE_CRYPTODEV_BACKEND_BUILTIN "cryptodev-backend-builtin"
39
Eduardo Habkost80633962020-09-16 14:25:19 -040040OBJECT_DECLARE_SIMPLE_TYPE(CryptoDevBackendBuiltin, CRYPTODEV_BACKEND_BUILTIN)
Gonglei1653a5f2016-10-28 16:33:23 +080041
Gonglei1653a5f2016-10-28 16:33:23 +080042
43typedef struct CryptoDevBackendBuiltinSession {
44 QCryptoCipher *cipher;
45 uint8_t direction; /* encryption or decryption */
46 uint8_t type; /* cipher? hash? aead? */
zhenwei pi0e660a62022-06-11 14:42:43 +080047 QCryptoAkCipher *akcipher;
Gonglei1653a5f2016-10-28 16:33:23 +080048 QTAILQ_ENTRY(CryptoDevBackendBuiltinSession) next;
49} CryptoDevBackendBuiltinSession;
50
zhenwei pi0e660a62022-06-11 14:42:43 +080051/* Max number of symmetric/asymmetric sessions */
Gonglei1653a5f2016-10-28 16:33:23 +080052#define MAX_NUM_SESSIONS 256
53
54#define CRYPTODEV_BUITLIN_MAX_AUTH_KEY_LEN 512
55#define CRYPTODEV_BUITLIN_MAX_CIPHER_KEY_LEN 64
56
57struct CryptoDevBackendBuiltin {
58 CryptoDevBackend parent_obj;
59
60 CryptoDevBackendBuiltinSession *sessions[MAX_NUM_SESSIONS];
61};
62
zhenwei piabca0fc2023-03-01 18:58:41 +080063static void cryptodev_builtin_init_akcipher(CryptoDevBackend *backend)
64{
65 QCryptoAkCipherOptions opts;
66
67 opts.alg = QCRYPTO_AKCIPHER_ALG_RSA;
68 opts.u.rsa.padding_alg = QCRYPTO_RSA_PADDING_ALG_RAW;
69 if (qcrypto_akcipher_supports(&opts)) {
70 backend->conf.crypto_services |=
71 (1u << QCRYPTODEV_BACKEND_SERVICE_AKCIPHER);
72 backend->conf.akcipher_algo = 1u << VIRTIO_CRYPTO_AKCIPHER_RSA;
73 }
74}
75
Gonglei1653a5f2016-10-28 16:33:23 +080076static void cryptodev_builtin_init(
77 CryptoDevBackend *backend, Error **errp)
78{
79 /* Only support one queue */
80 int queues = backend->conf.peers.queues;
81 CryptoDevBackendClient *cc;
82
83 if (queues != 1) {
84 error_setg(errp,
85 "Only support one queue in cryptdov-builtin backend");
86 return;
87 }
88
zhenwei pi3f478372023-03-01 18:58:37 +080089 cc = cryptodev_backend_new_client();
Gonglei1653a5f2016-10-28 16:33:23 +080090 cc->info_str = g_strdup_printf("cryptodev-builtin0");
91 cc->queue_index = 0;
zhenwei pi14c9fd12023-03-01 18:58:36 +080092 cc->type = QCRYPTODEV_BACKEND_TYPE_BUILTIN;
Gonglei1653a5f2016-10-28 16:33:23 +080093 backend->conf.peers.ccs[0] = cc;
94
95 backend->conf.crypto_services =
zhenwei pibc304a62023-03-01 18:58:39 +080096 1u << QCRYPTODEV_BACKEND_SERVICE_CIPHER |
97 1u << QCRYPTODEV_BACKEND_SERVICE_HASH |
zhenwei piabca0fc2023-03-01 18:58:41 +080098 1u << QCRYPTODEV_BACKEND_SERVICE_MAC;
Gonglei1653a5f2016-10-28 16:33:23 +080099 backend->conf.cipher_algo_l = 1u << VIRTIO_CRYPTO_CIPHER_AES_CBC;
100 backend->conf.hash_algo = 1u << VIRTIO_CRYPTO_HASH_SHA1;
101 /*
102 * Set the Maximum length of crypto request.
103 * Why this value? Just avoid to overflow when
104 * memory allocation for each crypto request.
105 */
zhenwei pi0e660a62022-06-11 14:42:43 +0800106 backend->conf.max_size = LONG_MAX - sizeof(CryptoDevBackendOpInfo);
Gonglei1653a5f2016-10-28 16:33:23 +0800107 backend->conf.max_cipher_key_len = CRYPTODEV_BUITLIN_MAX_CIPHER_KEY_LEN;
108 backend->conf.max_auth_key_len = CRYPTODEV_BUITLIN_MAX_AUTH_KEY_LEN;
zhenwei piabca0fc2023-03-01 18:58:41 +0800109 cryptodev_builtin_init_akcipher(backend);
Gonglei6138dbd2016-12-22 11:12:39 +0800110
111 cryptodev_backend_set_ready(backend, true);
Gonglei1653a5f2016-10-28 16:33:23 +0800112}
113
114static int
115cryptodev_builtin_get_unused_session_index(
116 CryptoDevBackendBuiltin *builtin)
117{
118 size_t i;
119
120 for (i = 0; i < MAX_NUM_SESSIONS; i++) {
121 if (builtin->sessions[i] == NULL) {
122 return i;
123 }
124 }
125
126 return -1;
127}
128
Longpeng(Mike)465f2fe2016-12-05 19:39:08 +0800129#define AES_KEYSIZE_128 16
130#define AES_KEYSIZE_192 24
131#define AES_KEYSIZE_256 32
132#define AES_KEYSIZE_128_XTS AES_KEYSIZE_256
133#define AES_KEYSIZE_256_XTS 64
134
Gonglei1653a5f2016-10-28 16:33:23 +0800135static int
Longpeng(Mike)465f2fe2016-12-05 19:39:08 +0800136cryptodev_builtin_get_aes_algo(uint32_t key_len, int mode, Error **errp)
Gonglei1653a5f2016-10-28 16:33:23 +0800137{
138 int algo;
139
Longpeng(Mike)465f2fe2016-12-05 19:39:08 +0800140 if (key_len == AES_KEYSIZE_128) {
Gonglei1653a5f2016-10-28 16:33:23 +0800141 algo = QCRYPTO_CIPHER_ALG_AES_128;
Longpeng(Mike)465f2fe2016-12-05 19:39:08 +0800142 } else if (key_len == AES_KEYSIZE_192) {
Gonglei1653a5f2016-10-28 16:33:23 +0800143 algo = QCRYPTO_CIPHER_ALG_AES_192;
Longpeng(Mike)465f2fe2016-12-05 19:39:08 +0800144 } else if (key_len == AES_KEYSIZE_256) { /* equals AES_KEYSIZE_128_XTS */
145 if (mode == QCRYPTO_CIPHER_MODE_XTS) {
146 algo = QCRYPTO_CIPHER_ALG_AES_128;
147 } else {
148 algo = QCRYPTO_CIPHER_ALG_AES_256;
149 }
150 } else if (key_len == AES_KEYSIZE_256_XTS) {
151 if (mode == QCRYPTO_CIPHER_MODE_XTS) {
152 algo = QCRYPTO_CIPHER_ALG_AES_256;
153 } else {
154 goto err;
155 }
Gonglei1653a5f2016-10-28 16:33:23 +0800156 } else {
Longpeng(Mike)465f2fe2016-12-05 19:39:08 +0800157 goto err;
Gonglei1653a5f2016-10-28 16:33:23 +0800158 }
159
160 return algo;
Longpeng(Mike)465f2fe2016-12-05 19:39:08 +0800161
162err:
163 error_setg(errp, "Unsupported key length :%u", key_len);
164 return -1;
Gonglei1653a5f2016-10-28 16:33:23 +0800165}
166
zhenwei pi0e660a62022-06-11 14:42:43 +0800167static int cryptodev_builtin_get_rsa_hash_algo(
168 int virtio_rsa_hash, Error **errp)
169{
170 switch (virtio_rsa_hash) {
171 case VIRTIO_CRYPTO_RSA_MD5:
172 return QCRYPTO_HASH_ALG_MD5;
173
174 case VIRTIO_CRYPTO_RSA_SHA1:
175 return QCRYPTO_HASH_ALG_SHA1;
176
177 case VIRTIO_CRYPTO_RSA_SHA256:
178 return QCRYPTO_HASH_ALG_SHA256;
179
180 case VIRTIO_CRYPTO_RSA_SHA512:
181 return QCRYPTO_HASH_ALG_SHA512;
182
183 default:
184 error_setg(errp, "Unsupported rsa hash algo: %d", virtio_rsa_hash);
185 return -1;
186 }
187}
188
189static int cryptodev_builtin_set_rsa_options(
190 int virtio_padding_algo,
191 int virtio_hash_algo,
192 QCryptoAkCipherOptionsRSA *opt,
193 Error **errp)
194{
195 if (virtio_padding_algo == VIRTIO_CRYPTO_RSA_PKCS1_PADDING) {
196 int hash_alg;
197
198 hash_alg = cryptodev_builtin_get_rsa_hash_algo(virtio_hash_algo, errp);
199 if (hash_alg < 0) {
200 return -1;
201 }
202 opt->hash_alg = hash_alg;
203 opt->padding_alg = QCRYPTO_RSA_PADDING_ALG_PKCS1;
204 return 0;
205 }
206
207 if (virtio_padding_algo == VIRTIO_CRYPTO_RSA_RAW_PADDING) {
208 opt->padding_alg = QCRYPTO_RSA_PADDING_ALG_RAW;
209 return 0;
210 }
211
212 error_setg(errp, "Unsupported rsa padding algo: %d", virtio_padding_algo);
213 return -1;
214}
215
Gonglei1653a5f2016-10-28 16:33:23 +0800216static int cryptodev_builtin_create_cipher_session(
217 CryptoDevBackendBuiltin *builtin,
218 CryptoDevBackendSymSessionInfo *sess_info,
219 Error **errp)
220{
221 int algo;
222 int mode;
223 QCryptoCipher *cipher;
224 int index;
225 CryptoDevBackendBuiltinSession *sess;
226
227 if (sess_info->op_type != VIRTIO_CRYPTO_SYM_OP_CIPHER) {
228 error_setg(errp, "Unsupported optype :%u", sess_info->op_type);
229 return -1;
230 }
231
232 index = cryptodev_builtin_get_unused_session_index(builtin);
233 if (index < 0) {
234 error_setg(errp, "Total number of sessions created exceeds %u",
235 MAX_NUM_SESSIONS);
236 return -1;
237 }
238
239 switch (sess_info->cipher_alg) {
240 case VIRTIO_CRYPTO_CIPHER_AES_ECB:
Longpeng(Mike)465f2fe2016-12-05 19:39:08 +0800241 mode = QCRYPTO_CIPHER_MODE_ECB;
Gonglei1653a5f2016-10-28 16:33:23 +0800242 algo = cryptodev_builtin_get_aes_algo(sess_info->key_len,
Longpeng(Mike)465f2fe2016-12-05 19:39:08 +0800243 mode, errp);
Gonglei1653a5f2016-10-28 16:33:23 +0800244 if (algo < 0) {
245 return -1;
246 }
Gonglei1653a5f2016-10-28 16:33:23 +0800247 break;
248 case VIRTIO_CRYPTO_CIPHER_AES_CBC:
Longpeng(Mike)465f2fe2016-12-05 19:39:08 +0800249 mode = QCRYPTO_CIPHER_MODE_CBC;
Gonglei1653a5f2016-10-28 16:33:23 +0800250 algo = cryptodev_builtin_get_aes_algo(sess_info->key_len,
Longpeng(Mike)465f2fe2016-12-05 19:39:08 +0800251 mode, errp);
Gonglei1653a5f2016-10-28 16:33:23 +0800252 if (algo < 0) {
253 return -1;
254 }
Gonglei1653a5f2016-10-28 16:33:23 +0800255 break;
256 case VIRTIO_CRYPTO_CIPHER_AES_CTR:
Longpeng(Mike)465f2fe2016-12-05 19:39:08 +0800257 mode = QCRYPTO_CIPHER_MODE_CTR;
Gonglei1653a5f2016-10-28 16:33:23 +0800258 algo = cryptodev_builtin_get_aes_algo(sess_info->key_len,
Longpeng(Mike)465f2fe2016-12-05 19:39:08 +0800259 mode, errp);
Gonglei1653a5f2016-10-28 16:33:23 +0800260 if (algo < 0) {
261 return -1;
262 }
Gonglei1653a5f2016-10-28 16:33:23 +0800263 break;
Longpeng(Mike)eaa57402016-12-05 19:39:09 +0800264 case VIRTIO_CRYPTO_CIPHER_AES_XTS:
265 mode = QCRYPTO_CIPHER_MODE_XTS;
266 algo = cryptodev_builtin_get_aes_algo(sess_info->key_len,
267 mode, errp);
268 if (algo < 0) {
269 return -1;
270 }
271 break;
Longpeng(Mike)48ae36c2016-12-08 10:44:02 +0800272 case VIRTIO_CRYPTO_CIPHER_3DES_ECB:
273 mode = QCRYPTO_CIPHER_MODE_ECB;
274 algo = QCRYPTO_CIPHER_ALG_3DES;
275 break;
276 case VIRTIO_CRYPTO_CIPHER_3DES_CBC:
277 mode = QCRYPTO_CIPHER_MODE_CBC;
278 algo = QCRYPTO_CIPHER_ALG_3DES;
279 break;
280 case VIRTIO_CRYPTO_CIPHER_3DES_CTR:
281 mode = QCRYPTO_CIPHER_MODE_CTR;
282 algo = QCRYPTO_CIPHER_ALG_3DES;
283 break;
Gonglei1653a5f2016-10-28 16:33:23 +0800284 default:
285 error_setg(errp, "Unsupported cipher alg :%u",
286 sess_info->cipher_alg);
287 return -1;
288 }
289
290 cipher = qcrypto_cipher_new(algo, mode,
291 sess_info->cipher_key,
292 sess_info->key_len,
293 errp);
294 if (!cipher) {
295 return -1;
296 }
297
298 sess = g_new0(CryptoDevBackendBuiltinSession, 1);
299 sess->cipher = cipher;
300 sess->direction = sess_info->direction;
301 sess->type = sess_info->op_type;
302
303 builtin->sessions[index] = sess;
304
305 return index;
306}
307
zhenwei pi0e660a62022-06-11 14:42:43 +0800308static int cryptodev_builtin_create_akcipher_session(
309 CryptoDevBackendBuiltin *builtin,
310 CryptoDevBackendAsymSessionInfo *sess_info,
311 Error **errp)
312{
313 CryptoDevBackendBuiltinSession *sess;
314 QCryptoAkCipher *akcipher;
315 int index;
316 QCryptoAkCipherKeyType type;
317 QCryptoAkCipherOptions opts;
318
319 switch (sess_info->algo) {
320 case VIRTIO_CRYPTO_AKCIPHER_RSA:
321 opts.alg = QCRYPTO_AKCIPHER_ALG_RSA;
322 if (cryptodev_builtin_set_rsa_options(sess_info->u.rsa.padding_algo,
323 sess_info->u.rsa.hash_algo, &opts.u.rsa, errp) != 0) {
324 return -1;
325 }
326 break;
327
328 /* TODO support DSA&ECDSA until qemu crypto framework support these */
329
330 default:
331 error_setg(errp, "Unsupported akcipher alg %u", sess_info->algo);
332 return -1;
333 }
334
335 switch (sess_info->keytype) {
336 case VIRTIO_CRYPTO_AKCIPHER_KEY_TYPE_PUBLIC:
337 type = QCRYPTO_AKCIPHER_KEY_TYPE_PUBLIC;
338 break;
339
340 case VIRTIO_CRYPTO_AKCIPHER_KEY_TYPE_PRIVATE:
341 type = QCRYPTO_AKCIPHER_KEY_TYPE_PRIVATE;
342 break;
343
344 default:
345 error_setg(errp, "Unsupported akcipher keytype %u", sess_info->keytype);
346 return -1;
347 }
348
349 index = cryptodev_builtin_get_unused_session_index(builtin);
350 if (index < 0) {
351 error_setg(errp, "Total number of sessions created exceeds %u",
352 MAX_NUM_SESSIONS);
353 return -1;
354 }
355
356 akcipher = qcrypto_akcipher_new(&opts, type, sess_info->key,
357 sess_info->keylen, errp);
358 if (!akcipher) {
359 return -1;
360 }
361
362 sess = g_new0(CryptoDevBackendBuiltinSession, 1);
363 sess->akcipher = akcipher;
364
365 builtin->sessions[index] = sess;
366
367 return index;
368}
369
Lei He2fda1012022-10-08 16:50:27 +0800370static int cryptodev_builtin_create_session(
Gonglei1653a5f2016-10-28 16:33:23 +0800371 CryptoDevBackend *backend,
zhenwei pi0e660a62022-06-11 14:42:43 +0800372 CryptoDevBackendSessionInfo *sess_info,
Lei He2fda1012022-10-08 16:50:27 +0800373 uint32_t queue_index,
374 CryptoDevCompletionFunc cb,
375 void *opaque)
Gonglei1653a5f2016-10-28 16:33:23 +0800376{
377 CryptoDevBackendBuiltin *builtin =
378 CRYPTODEV_BACKEND_BUILTIN(backend);
zhenwei pi0e660a62022-06-11 14:42:43 +0800379 CryptoDevBackendSymSessionInfo *sym_sess_info;
380 CryptoDevBackendAsymSessionInfo *asym_sess_info;
Lei He2fda1012022-10-08 16:50:27 +0800381 int ret, status;
382 Error *local_error = NULL;
Gonglei1653a5f2016-10-28 16:33:23 +0800383
384 switch (sess_info->op_code) {
385 case VIRTIO_CRYPTO_CIPHER_CREATE_SESSION:
zhenwei pi0e660a62022-06-11 14:42:43 +0800386 sym_sess_info = &sess_info->u.sym_sess_info;
Lei He2fda1012022-10-08 16:50:27 +0800387 ret = cryptodev_builtin_create_cipher_session(
388 builtin, sym_sess_info, &local_error);
389 break;
zhenwei pi0e660a62022-06-11 14:42:43 +0800390
391 case VIRTIO_CRYPTO_AKCIPHER_CREATE_SESSION:
392 asym_sess_info = &sess_info->u.asym_sess_info;
Lei He2fda1012022-10-08 16:50:27 +0800393 ret = cryptodev_builtin_create_akcipher_session(
394 builtin, asym_sess_info, &local_error);
395 break;
zhenwei pi0e660a62022-06-11 14:42:43 +0800396
Gonglei1653a5f2016-10-28 16:33:23 +0800397 case VIRTIO_CRYPTO_HASH_CREATE_SESSION:
398 case VIRTIO_CRYPTO_MAC_CREATE_SESSION:
399 default:
Li Zhijian06479db2024-04-22 16:53:12 +0800400 error_report("Unsupported opcode :%" PRIu32 "",
401 sess_info->op_code);
Lei He2fda1012022-10-08 16:50:27 +0800402 return -VIRTIO_CRYPTO_NOTSUPP;
Gonglei1653a5f2016-10-28 16:33:23 +0800403 }
404
Lei He2fda1012022-10-08 16:50:27 +0800405 if (local_error) {
406 error_report_err(local_error);
407 }
408 if (ret < 0) {
409 status = -VIRTIO_CRYPTO_ERR;
410 } else {
411 sess_info->session_id = ret;
412 status = VIRTIO_CRYPTO_OK;
413 }
414 if (cb) {
415 cb(opaque, status);
416 }
417 return 0;
Gonglei1653a5f2016-10-28 16:33:23 +0800418}
419
zhenwei pi0e660a62022-06-11 14:42:43 +0800420static int cryptodev_builtin_close_session(
Gonglei1653a5f2016-10-28 16:33:23 +0800421 CryptoDevBackend *backend,
422 uint64_t session_id,
Lei He2fda1012022-10-08 16:50:27 +0800423 uint32_t queue_index,
424 CryptoDevCompletionFunc cb,
425 void *opaque)
Gonglei1653a5f2016-10-28 16:33:23 +0800426{
427 CryptoDevBackendBuiltin *builtin =
428 CRYPTODEV_BACKEND_BUILTIN(backend);
zhenwei pi0e660a62022-06-11 14:42:43 +0800429 CryptoDevBackendBuiltinSession *session;
Gonglei1653a5f2016-10-28 16:33:23 +0800430
Philippe Mathieu-Daudéeaf2bd22024-04-08 17:40:23 +0200431 if (session_id >= MAX_NUM_SESSIONS || !builtin->sessions[session_id]) {
432 return -VIRTIO_CRYPTO_INVSESS;
433 }
Gonglei1653a5f2016-10-28 16:33:23 +0800434
zhenwei pi0e660a62022-06-11 14:42:43 +0800435 session = builtin->sessions[session_id];
436 if (session->cipher) {
437 qcrypto_cipher_free(session->cipher);
438 } else if (session->akcipher) {
439 qcrypto_akcipher_free(session->akcipher);
440 }
441
442 g_free(session);
Gonglei1653a5f2016-10-28 16:33:23 +0800443 builtin->sessions[session_id] = NULL;
Lei He2fda1012022-10-08 16:50:27 +0800444 if (cb) {
445 cb(opaque, VIRTIO_CRYPTO_OK);
446 }
Gonglei1653a5f2016-10-28 16:33:23 +0800447 return 0;
448}
449
450static int cryptodev_builtin_sym_operation(
zhenwei pi0e660a62022-06-11 14:42:43 +0800451 CryptoDevBackendBuiltinSession *sess,
452 CryptoDevBackendSymOpInfo *op_info, Error **errp)
Gonglei1653a5f2016-10-28 16:33:23 +0800453{
Gonglei1653a5f2016-10-28 16:33:23 +0800454 int ret;
455
Gonglei1653a5f2016-10-28 16:33:23 +0800456 if (op_info->op_type == VIRTIO_CRYPTO_SYM_OP_ALGORITHM_CHAINING) {
457 error_setg(errp,
458 "Algorithm chain is unsupported for cryptdoev-builtin");
459 return -VIRTIO_CRYPTO_NOTSUPP;
460 }
461
Longpeng(Mike)50d19cf2017-01-14 14:14:27 +0800462 if (op_info->iv_len > 0) {
463 ret = qcrypto_cipher_setiv(sess->cipher, op_info->iv,
464 op_info->iv_len, errp);
465 if (ret < 0) {
466 return -VIRTIO_CRYPTO_ERR;
467 }
Gonglei1653a5f2016-10-28 16:33:23 +0800468 }
469
470 if (sess->direction == VIRTIO_CRYPTO_OP_ENCRYPT) {
471 ret = qcrypto_cipher_encrypt(sess->cipher, op_info->src,
472 op_info->dst, op_info->src_len, errp);
473 if (ret < 0) {
474 return -VIRTIO_CRYPTO_ERR;
475 }
476 } else {
477 ret = qcrypto_cipher_decrypt(sess->cipher, op_info->src,
478 op_info->dst, op_info->src_len, errp);
479 if (ret < 0) {
480 return -VIRTIO_CRYPTO_ERR;
481 }
482 }
zhenwei pi0e660a62022-06-11 14:42:43 +0800483
Gonglei1653a5f2016-10-28 16:33:23 +0800484 return VIRTIO_CRYPTO_OK;
485}
486
zhenwei pi0e660a62022-06-11 14:42:43 +0800487static int cryptodev_builtin_asym_operation(
488 CryptoDevBackendBuiltinSession *sess, uint32_t op_code,
489 CryptoDevBackendAsymOpInfo *op_info, Error **errp)
490{
491 int ret;
492
493 switch (op_code) {
494 case VIRTIO_CRYPTO_AKCIPHER_ENCRYPT:
495 ret = qcrypto_akcipher_encrypt(sess->akcipher,
496 op_info->src, op_info->src_len,
497 op_info->dst, op_info->dst_len, errp);
498 break;
499
500 case VIRTIO_CRYPTO_AKCIPHER_DECRYPT:
501 ret = qcrypto_akcipher_decrypt(sess->akcipher,
502 op_info->src, op_info->src_len,
503 op_info->dst, op_info->dst_len, errp);
504 break;
505
506 case VIRTIO_CRYPTO_AKCIPHER_SIGN:
507 ret = qcrypto_akcipher_sign(sess->akcipher,
508 op_info->src, op_info->src_len,
509 op_info->dst, op_info->dst_len, errp);
510 break;
511
512 case VIRTIO_CRYPTO_AKCIPHER_VERIFY:
513 ret = qcrypto_akcipher_verify(sess->akcipher,
514 op_info->src, op_info->src_len,
515 op_info->dst, op_info->dst_len, errp);
516 break;
517
518 default:
519 return -VIRTIO_CRYPTO_ERR;
520 }
521
522 if (ret < 0) {
523 if (op_code == VIRTIO_CRYPTO_AKCIPHER_VERIFY) {
524 return -VIRTIO_CRYPTO_KEY_REJECTED;
525 }
526 return -VIRTIO_CRYPTO_ERR;
527 }
528
529 /* Buffer is too short, typically the driver should handle this case */
530 if (unlikely(ret > op_info->dst_len)) {
531 if (errp && !*errp) {
532 error_setg(errp, "dst buffer too short");
533 }
534
535 return -VIRTIO_CRYPTO_ERR;
536 }
537
538 op_info->dst_len = ret;
539
540 return VIRTIO_CRYPTO_OK;
541}
542
543static int cryptodev_builtin_operation(
544 CryptoDevBackend *backend,
zhenwei pi2cb06922023-03-01 18:58:43 +0800545 CryptoDevBackendOpInfo *op_info)
zhenwei pi0e660a62022-06-11 14:42:43 +0800546{
547 CryptoDevBackendBuiltin *builtin =
548 CRYPTODEV_BACKEND_BUILTIN(backend);
549 CryptoDevBackendBuiltinSession *sess;
550 CryptoDevBackendSymOpInfo *sym_op_info;
551 CryptoDevBackendAsymOpInfo *asym_op_info;
zhenwei pi999c7892023-03-01 18:58:38 +0800552 QCryptodevBackendAlgType algtype = op_info->algtype;
Lei He2fda1012022-10-08 16:50:27 +0800553 int status = -VIRTIO_CRYPTO_ERR;
554 Error *local_error = NULL;
zhenwei pi0e660a62022-06-11 14:42:43 +0800555
556 if (op_info->session_id >= MAX_NUM_SESSIONS ||
557 builtin->sessions[op_info->session_id] == NULL) {
Li Zhijian06479db2024-04-22 16:53:12 +0800558 error_report("Cannot find a valid session id: %" PRIu64 "",
559 op_info->session_id);
zhenwei pi0e660a62022-06-11 14:42:43 +0800560 return -VIRTIO_CRYPTO_INVSESS;
561 }
562
563 sess = builtin->sessions[op_info->session_id];
zhenwei pi999c7892023-03-01 18:58:38 +0800564 if (algtype == QCRYPTODEV_BACKEND_ALG_SYM) {
zhenwei pi0e660a62022-06-11 14:42:43 +0800565 sym_op_info = op_info->u.sym_op_info;
Lei He2fda1012022-10-08 16:50:27 +0800566 status = cryptodev_builtin_sym_operation(sess, sym_op_info,
567 &local_error);
zhenwei pi999c7892023-03-01 18:58:38 +0800568 } else if (algtype == QCRYPTODEV_BACKEND_ALG_ASYM) {
zhenwei pi0e660a62022-06-11 14:42:43 +0800569 asym_op_info = op_info->u.asym_op_info;
Lei He2fda1012022-10-08 16:50:27 +0800570 status = cryptodev_builtin_asym_operation(sess, op_info->op_code,
571 asym_op_info, &local_error);
zhenwei pi0e660a62022-06-11 14:42:43 +0800572 }
573
Lei He2fda1012022-10-08 16:50:27 +0800574 if (local_error) {
575 error_report_err(local_error);
576 }
zhenwei pi2cb06922023-03-01 18:58:43 +0800577 if (op_info->cb) {
578 op_info->cb(op_info->opaque, status);
Lei He2fda1012022-10-08 16:50:27 +0800579 }
580 return 0;
zhenwei pi0e660a62022-06-11 14:42:43 +0800581}
582
Gonglei1653a5f2016-10-28 16:33:23 +0800583static void cryptodev_builtin_cleanup(
584 CryptoDevBackend *backend,
585 Error **errp)
586{
587 CryptoDevBackendBuiltin *builtin =
588 CRYPTODEV_BACKEND_BUILTIN(backend);
589 size_t i;
590 int queues = backend->conf.peers.queues;
591 CryptoDevBackendClient *cc;
592
593 for (i = 0; i < MAX_NUM_SESSIONS; i++) {
594 if (builtin->sessions[i] != NULL) {
Lei He2fda1012022-10-08 16:50:27 +0800595 cryptodev_builtin_close_session(backend, i, 0, NULL, NULL);
Gonglei1653a5f2016-10-28 16:33:23 +0800596 }
597 }
598
Gonglei1653a5f2016-10-28 16:33:23 +0800599 for (i = 0; i < queues; i++) {
600 cc = backend->conf.peers.ccs[i];
601 if (cc) {
602 cryptodev_backend_free_client(cc);
603 backend->conf.peers.ccs[i] = NULL;
604 }
605 }
Gonglei6138dbd2016-12-22 11:12:39 +0800606
607 cryptodev_backend_set_ready(backend, false);
Gonglei1653a5f2016-10-28 16:33:23 +0800608}
609
610static void
611cryptodev_builtin_class_init(ObjectClass *oc, void *data)
612{
613 CryptoDevBackendClass *bc = CRYPTODEV_BACKEND_CLASS(oc);
614
615 bc->init = cryptodev_builtin_init;
616 bc->cleanup = cryptodev_builtin_cleanup;
zhenwei pi0e660a62022-06-11 14:42:43 +0800617 bc->create_session = cryptodev_builtin_create_session;
618 bc->close_session = cryptodev_builtin_close_session;
619 bc->do_op = cryptodev_builtin_operation;
Gonglei1653a5f2016-10-28 16:33:23 +0800620}
621
622static const TypeInfo cryptodev_builtin_info = {
623 .name = TYPE_CRYPTODEV_BACKEND_BUILTIN,
624 .parent = TYPE_CRYPTODEV_BACKEND,
625 .class_init = cryptodev_builtin_class_init,
626 .instance_size = sizeof(CryptoDevBackendBuiltin),
627};
628
629static void
630cryptodev_builtin_register_types(void)
631{
632 type_register_static(&cryptodev_builtin_info);
633}
634
635type_init(cryptodev_builtin_register_types);