2 * QEMU Crypto cipher built-in algorithms
4 * Copyright (c) 2015 Red Hat, Inc.
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, see <http://www.gnu.org/licenses/>.
21 #include "qemu/osdep.h"
22 #include "crypto/aes.h"
23 #include "crypto/desrfb.h"
25 typedef struct QCryptoCipherBuiltinAES QCryptoCipherBuiltinAES
;
26 struct QCryptoCipherBuiltinAES
{
29 uint8_t iv
[AES_BLOCK_SIZE
];
31 typedef struct QCryptoCipherBuiltinDESRFB QCryptoCipherBuiltinDESRFB
;
32 struct QCryptoCipherBuiltinDESRFB
{
37 typedef struct QCryptoCipherBuiltin QCryptoCipherBuiltin
;
38 struct QCryptoCipherBuiltin
{
40 QCryptoCipherBuiltinAES aes
;
41 QCryptoCipherBuiltinDESRFB desrfb
;
44 void (*free
)(QCryptoCipher
*cipher
);
45 int (*setiv
)(QCryptoCipher
*cipher
,
46 const uint8_t *iv
, size_t niv
,
48 int (*encrypt
)(QCryptoCipher
*cipher
,
53 int (*decrypt
)(QCryptoCipher
*cipher
,
61 static void qcrypto_cipher_free_aes(QCryptoCipher
*cipher
)
63 QCryptoCipherBuiltin
*ctxt
= cipher
->opaque
;
66 cipher
->opaque
= NULL
;
70 static int qcrypto_cipher_encrypt_aes(QCryptoCipher
*cipher
,
76 QCryptoCipherBuiltin
*ctxt
= cipher
->opaque
;
78 if (cipher
->mode
== QCRYPTO_CIPHER_MODE_ECB
) {
79 const uint8_t *inptr
= in
;
80 uint8_t *outptr
= out
;
82 if (len
> AES_BLOCK_SIZE
) {
83 AES_encrypt(inptr
, outptr
, &ctxt
->state
.aes
.encrypt_key
);
84 inptr
+= AES_BLOCK_SIZE
;
85 outptr
+= AES_BLOCK_SIZE
;
86 len
-= AES_BLOCK_SIZE
;
88 uint8_t tmp1
[AES_BLOCK_SIZE
], tmp2
[AES_BLOCK_SIZE
];
89 memcpy(tmp1
, inptr
, len
);
90 /* Fill with 0 to avoid valgrind uninitialized reads */
91 memset(tmp1
+ len
, 0, sizeof(tmp1
) - len
);
92 AES_encrypt(tmp1
, tmp2
, &ctxt
->state
.aes
.encrypt_key
);
93 memcpy(outptr
, tmp2
, len
);
98 AES_cbc_encrypt(in
, out
, len
,
99 &ctxt
->state
.aes
.encrypt_key
,
100 ctxt
->state
.aes
.iv
, 1);
107 static int qcrypto_cipher_decrypt_aes(QCryptoCipher
*cipher
,
113 QCryptoCipherBuiltin
*ctxt
= cipher
->opaque
;
115 if (cipher
->mode
== QCRYPTO_CIPHER_MODE_ECB
) {
116 const uint8_t *inptr
= in
;
117 uint8_t *outptr
= out
;
119 if (len
> AES_BLOCK_SIZE
) {
120 AES_decrypt(inptr
, outptr
, &ctxt
->state
.aes
.decrypt_key
);
121 inptr
+= AES_BLOCK_SIZE
;
122 outptr
+= AES_BLOCK_SIZE
;
123 len
-= AES_BLOCK_SIZE
;
125 uint8_t tmp1
[AES_BLOCK_SIZE
], tmp2
[AES_BLOCK_SIZE
];
126 memcpy(tmp1
, inptr
, len
);
127 /* Fill with 0 to avoid valgrind uninitialized reads */
128 memset(tmp1
+ len
, 0, sizeof(tmp1
) - len
);
129 AES_decrypt(tmp1
, tmp2
, &ctxt
->state
.aes
.decrypt_key
);
130 memcpy(outptr
, tmp2
, len
);
135 AES_cbc_encrypt(in
, out
, len
,
136 &ctxt
->state
.aes
.decrypt_key
,
137 ctxt
->state
.aes
.iv
, 0);
143 static int qcrypto_cipher_setiv_aes(QCryptoCipher
*cipher
,
144 const uint8_t *iv
, size_t niv
,
147 QCryptoCipherBuiltin
*ctxt
= cipher
->opaque
;
148 if (niv
!= AES_BLOCK_SIZE
) {
149 error_setg(errp
, "IV must be %d bytes not %zu",
150 AES_BLOCK_SIZE
, niv
);
154 memcpy(ctxt
->state
.aes
.iv
, iv
, AES_BLOCK_SIZE
);
162 static int qcrypto_cipher_init_aes(QCryptoCipher
*cipher
,
163 const uint8_t *key
, size_t nkey
,
166 QCryptoCipherBuiltin
*ctxt
;
168 if (cipher
->mode
!= QCRYPTO_CIPHER_MODE_CBC
&&
169 cipher
->mode
!= QCRYPTO_CIPHER_MODE_ECB
) {
170 error_setg(errp
, "Unsupported cipher mode %d", cipher
->mode
);
174 ctxt
= g_new0(QCryptoCipherBuiltin
, 1);
176 if (AES_set_encrypt_key(key
, nkey
* 8, &ctxt
->state
.aes
.encrypt_key
) != 0) {
177 error_setg(errp
, "Failed to set encryption key");
181 if (AES_set_decrypt_key(key
, nkey
* 8, &ctxt
->state
.aes
.decrypt_key
) != 0) {
182 error_setg(errp
, "Failed to set decryption key");
186 ctxt
->blocksize
= AES_BLOCK_SIZE
;
187 ctxt
->free
= qcrypto_cipher_free_aes
;
188 ctxt
->setiv
= qcrypto_cipher_setiv_aes
;
189 ctxt
->encrypt
= qcrypto_cipher_encrypt_aes
;
190 ctxt
->decrypt
= qcrypto_cipher_decrypt_aes
;
192 cipher
->opaque
= ctxt
;
202 static void qcrypto_cipher_free_des_rfb(QCryptoCipher
*cipher
)
204 QCryptoCipherBuiltin
*ctxt
= cipher
->opaque
;
206 g_free(ctxt
->state
.desrfb
.key
);
208 cipher
->opaque
= NULL
;
212 static int qcrypto_cipher_encrypt_des_rfb(QCryptoCipher
*cipher
,
218 QCryptoCipherBuiltin
*ctxt
= cipher
->opaque
;
222 error_setg(errp
, "Buffer size must be multiple of 8 not %zu",
227 deskey(ctxt
->state
.desrfb
.key
, EN0
);
229 for (i
= 0; i
< len
; i
+= 8) {
230 des((void *)in
+ i
, out
+ i
);
237 static int qcrypto_cipher_decrypt_des_rfb(QCryptoCipher
*cipher
,
243 QCryptoCipherBuiltin
*ctxt
= cipher
->opaque
;
247 error_setg(errp
, "Buffer size must be multiple of 8 not %zu",
252 deskey(ctxt
->state
.desrfb
.key
, DE1
);
254 for (i
= 0; i
< len
; i
+= 8) {
255 des((void *)in
+ i
, out
+ i
);
262 static int qcrypto_cipher_setiv_des_rfb(QCryptoCipher
*cipher
,
263 const uint8_t *iv
, size_t niv
,
266 error_setg(errp
, "Setting IV is not supported");
271 static int qcrypto_cipher_init_des_rfb(QCryptoCipher
*cipher
,
272 const uint8_t *key
, size_t nkey
,
275 QCryptoCipherBuiltin
*ctxt
;
277 if (cipher
->mode
!= QCRYPTO_CIPHER_MODE_ECB
) {
278 error_setg(errp
, "Unsupported cipher mode %d", cipher
->mode
);
282 ctxt
= g_new0(QCryptoCipherBuiltin
, 1);
284 ctxt
->state
.desrfb
.key
= g_new0(uint8_t, nkey
);
285 memcpy(ctxt
->state
.desrfb
.key
, key
, nkey
);
286 ctxt
->state
.desrfb
.nkey
= nkey
;
289 ctxt
->free
= qcrypto_cipher_free_des_rfb
;
290 ctxt
->setiv
= qcrypto_cipher_setiv_des_rfb
;
291 ctxt
->encrypt
= qcrypto_cipher_encrypt_des_rfb
;
292 ctxt
->decrypt
= qcrypto_cipher_decrypt_des_rfb
;
294 cipher
->opaque
= ctxt
;
300 bool qcrypto_cipher_supports(QCryptoCipherAlgorithm alg
)
303 case QCRYPTO_CIPHER_ALG_DES_RFB
:
304 case QCRYPTO_CIPHER_ALG_AES_128
:
305 case QCRYPTO_CIPHER_ALG_AES_192
:
306 case QCRYPTO_CIPHER_ALG_AES_256
:
314 QCryptoCipher
*qcrypto_cipher_new(QCryptoCipherAlgorithm alg
,
315 QCryptoCipherMode mode
,
316 const uint8_t *key
, size_t nkey
,
319 QCryptoCipher
*cipher
;
321 cipher
= g_new0(QCryptoCipher
, 1);
325 if (!qcrypto_cipher_validate_key_length(alg
, nkey
, errp
)) {
329 switch (cipher
->alg
) {
330 case QCRYPTO_CIPHER_ALG_DES_RFB
:
331 if (qcrypto_cipher_init_des_rfb(cipher
, key
, nkey
, errp
) < 0) {
335 case QCRYPTO_CIPHER_ALG_AES_128
:
336 case QCRYPTO_CIPHER_ALG_AES_192
:
337 case QCRYPTO_CIPHER_ALG_AES_256
:
338 if (qcrypto_cipher_init_aes(cipher
, key
, nkey
, errp
) < 0) {
344 "Unsupported cipher algorithm %d", cipher
->alg
);
355 void qcrypto_cipher_free(QCryptoCipher
*cipher
)
357 QCryptoCipherBuiltin
*ctxt
;
363 ctxt
= cipher
->opaque
;
369 int qcrypto_cipher_encrypt(QCryptoCipher
*cipher
,
375 QCryptoCipherBuiltin
*ctxt
= cipher
->opaque
;
377 if (len
% ctxt
->blocksize
) {
378 error_setg(errp
, "Length %zu must be a multiple of block size %zu",
379 len
, ctxt
->blocksize
);
383 return ctxt
->encrypt(cipher
, in
, out
, len
, errp
);
387 int qcrypto_cipher_decrypt(QCryptoCipher
*cipher
,
393 QCryptoCipherBuiltin
*ctxt
= cipher
->opaque
;
395 if (len
% ctxt
->blocksize
) {
396 error_setg(errp
, "Length %zu must be a multiple of block size %zu",
397 len
, ctxt
->blocksize
);
401 return ctxt
->decrypt(cipher
, in
, out
, len
, errp
);
405 int qcrypto_cipher_setiv(QCryptoCipher
*cipher
,
406 const uint8_t *iv
, size_t niv
,
409 QCryptoCipherBuiltin
*ctxt
= cipher
->opaque
;
411 return ctxt
->setiv(cipher
, iv
, niv
, errp
);