2 * QEMU Crypto block device encryption
4 * Copyright (c) 2015-2016 Red Hat, Inc.
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, see <http://www.gnu.org/licenses/>.
21 #include "qemu/osdep.h"
22 #include "qapi/error.h"
23 #include "blockpriv.h"
24 #include "block-qcow.h"
25 #include "block-luks.h"
27 static const QCryptoBlockDriver
*qcrypto_block_drivers
[] = {
28 [Q_CRYPTO_BLOCK_FORMAT_QCOW
] = &qcrypto_block_driver_qcow
,
29 [Q_CRYPTO_BLOCK_FORMAT_LUKS
] = &qcrypto_block_driver_luks
,
33 bool qcrypto_block_has_format(QCryptoBlockFormat format
,
37 const QCryptoBlockDriver
*driver
;
39 if (format
>= G_N_ELEMENTS(qcrypto_block_drivers
) ||
40 !qcrypto_block_drivers
[format
]) {
44 driver
= qcrypto_block_drivers
[format
];
46 return driver
->has_format(buf
, len
);
50 QCryptoBlock
*qcrypto_block_open(QCryptoBlockOpenOptions
*options
,
51 const char *optprefix
,
52 QCryptoBlockReadFunc readfunc
,
58 QCryptoBlock
*block
= g_new0(QCryptoBlock
, 1);
60 block
->format
= options
->format
;
62 if (options
->format
>= G_N_ELEMENTS(qcrypto_block_drivers
) ||
63 !qcrypto_block_drivers
[options
->format
]) {
64 error_setg(errp
, "Unsupported block driver %s",
65 QCryptoBlockFormat_str(options
->format
));
70 block
->driver
= qcrypto_block_drivers
[options
->format
];
72 if (block
->driver
->open(block
, options
, optprefix
,
73 readfunc
, opaque
, flags
, n_threads
, errp
) < 0)
79 qemu_mutex_init(&block
->mutex
);
85 QCryptoBlock
*qcrypto_block_create(QCryptoBlockCreateOptions
*options
,
86 const char *optprefix
,
87 QCryptoBlockInitFunc initfunc
,
88 QCryptoBlockWriteFunc writefunc
,
93 QCryptoBlock
*block
= g_new0(QCryptoBlock
, 1);
95 block
->format
= options
->format
;
97 if (options
->format
>= G_N_ELEMENTS(qcrypto_block_drivers
) ||
98 !qcrypto_block_drivers
[options
->format
]) {
99 error_setg(errp
, "Unsupported block driver %s",
100 QCryptoBlockFormat_str(options
->format
));
105 block
->driver
= qcrypto_block_drivers
[options
->format
];
106 block
->detached_header
= flags
& QCRYPTO_BLOCK_CREATE_DETACHED
;
108 if (block
->driver
->create(block
, options
, optprefix
, initfunc
,
109 writefunc
, opaque
, errp
) < 0) {
114 qemu_mutex_init(&block
->mutex
);
120 static int qcrypto_block_headerlen_hdr_init_func(QCryptoBlock
*block
,
121 size_t headerlen
, void *opaque
, Error
**errp
)
123 size_t *headerlenp
= opaque
;
125 /* Stash away the payload size */
126 *headerlenp
= headerlen
;
131 static int qcrypto_block_headerlen_hdr_write_func(QCryptoBlock
*block
,
132 size_t offset
, const uint8_t *buf
, size_t buflen
,
133 void *opaque
, Error
**errp
)
135 /* Discard the bytes, we're not actually writing to an image */
141 qcrypto_block_calculate_payload_offset(QCryptoBlockCreateOptions
*create_opts
,
142 const char *optprefix
,
146 /* Fake LUKS creation in order to determine the payload size */
147 g_autoptr(QCryptoBlock
) crypto
=
148 qcrypto_block_create(create_opts
, optprefix
,
149 qcrypto_block_headerlen_hdr_init_func
,
150 qcrypto_block_headerlen_hdr_write_func
,
152 return crypto
!= NULL
;
155 int qcrypto_block_amend_options(QCryptoBlock
*block
,
156 QCryptoBlockReadFunc readfunc
,
157 QCryptoBlockWriteFunc writefunc
,
159 QCryptoBlockAmendOptions
*options
,
163 if (options
->format
!= block
->format
) {
165 "Cannot amend encryption format");
169 if (!block
->driver
->amend
) {
171 "Crypto format %s doesn't support format options amendment",
172 QCryptoBlockFormat_str(block
->format
));
176 return block
->driver
->amend(block
,
185 QCryptoBlockInfo
*qcrypto_block_get_info(QCryptoBlock
*block
,
188 QCryptoBlockInfo
*info
= g_new0(QCryptoBlockInfo
, 1);
190 info
->format
= block
->format
;
192 if (block
->driver
->get_info
&&
193 block
->driver
->get_info(block
, info
, errp
) < 0) {
202 int qcrypto_block_decrypt(QCryptoBlock
*block
,
208 return block
->driver
->decrypt(block
, offset
, buf
, len
, errp
);
212 int qcrypto_block_encrypt(QCryptoBlock
*block
,
218 return block
->driver
->encrypt(block
, offset
, buf
, len
, errp
);
222 QCryptoCipher
*qcrypto_block_get_cipher(QCryptoBlock
*block
)
224 /* Ciphers should be accessed through pop/push method to be thread-safe.
225 * Better, they should not be accessed externally at all (note, that
226 * pop/push are static functions)
227 * This function is used only in test with one thread (it's safe to skip
228 * pop/push interface), so it's enough to assert it here:
230 assert(block
->n_ciphers
<= 1);
231 return block
->ciphers
? block
->ciphers
[0] : NULL
;
235 static QCryptoCipher
*qcrypto_block_pop_cipher(QCryptoBlock
*block
)
237 QCryptoCipher
*cipher
;
239 qemu_mutex_lock(&block
->mutex
);
241 assert(block
->n_free_ciphers
> 0);
242 block
->n_free_ciphers
--;
243 cipher
= block
->ciphers
[block
->n_free_ciphers
];
245 qemu_mutex_unlock(&block
->mutex
);
251 static void qcrypto_block_push_cipher(QCryptoBlock
*block
,
252 QCryptoCipher
*cipher
)
254 qemu_mutex_lock(&block
->mutex
);
256 assert(block
->n_free_ciphers
< block
->n_ciphers
);
257 block
->ciphers
[block
->n_free_ciphers
] = cipher
;
258 block
->n_free_ciphers
++;
260 qemu_mutex_unlock(&block
->mutex
);
264 int qcrypto_block_init_cipher(QCryptoBlock
*block
,
265 QCryptoCipherAlgorithm alg
,
266 QCryptoCipherMode mode
,
267 const uint8_t *key
, size_t nkey
,
268 size_t n_threads
, Error
**errp
)
272 assert(!block
->ciphers
&& !block
->n_ciphers
&& !block
->n_free_ciphers
);
274 block
->ciphers
= g_new0(QCryptoCipher
*, n_threads
);
276 for (i
= 0; i
< n_threads
; i
++) {
277 block
->ciphers
[i
] = qcrypto_cipher_new(alg
, mode
, key
, nkey
, errp
);
278 if (!block
->ciphers
[i
]) {
279 qcrypto_block_free_cipher(block
);
283 block
->n_free_ciphers
++;
290 void qcrypto_block_free_cipher(QCryptoBlock
*block
)
294 if (!block
->ciphers
) {
298 assert(block
->n_ciphers
== block
->n_free_ciphers
);
300 for (i
= 0; i
< block
->n_ciphers
; i
++) {
301 qcrypto_cipher_free(block
->ciphers
[i
]);
304 g_free(block
->ciphers
);
305 block
->ciphers
= NULL
;
306 block
->n_ciphers
= block
->n_free_ciphers
= 0;
309 QCryptoIVGen
*qcrypto_block_get_ivgen(QCryptoBlock
*block
)
311 /* ivgen should be accessed under mutex. However, this function is used only
312 * in test with one thread, so it's enough to assert it here:
314 assert(block
->n_ciphers
<= 1);
319 QCryptoHashAlgorithm
qcrypto_block_get_kdf_hash(QCryptoBlock
*block
)
321 return block
->kdfhash
;
325 uint64_t qcrypto_block_get_payload_offset(QCryptoBlock
*block
)
327 return block
->payload_offset
;
331 uint64_t qcrypto_block_get_sector_size(QCryptoBlock
*block
)
333 return block
->sector_size
;
337 void qcrypto_block_free(QCryptoBlock
*block
)
343 block
->driver
->cleanup(block
);
345 qcrypto_block_free_cipher(block
);
346 qcrypto_ivgen_free(block
->ivgen
);
347 qemu_mutex_destroy(&block
->mutex
);
352 typedef int (*QCryptoCipherEncDecFunc
)(QCryptoCipher
*cipher
,
358 static int do_qcrypto_block_cipher_encdec(QCryptoCipher
*cipher
,
361 QemuMutex
*ivgen_mutex
,
366 QCryptoCipherEncDecFunc func
,
369 g_autofree
uint8_t *iv
= niv
? g_new0(uint8_t, niv
) : NULL
;
371 uint64_t startsector
= offset
/ sectorsize
;
373 assert(QEMU_IS_ALIGNED(offset
, sectorsize
));
374 assert(QEMU_IS_ALIGNED(len
, sectorsize
));
380 qemu_mutex_lock(ivgen_mutex
);
382 ret
= qcrypto_ivgen_calculate(ivgen
, startsector
, iv
, niv
, errp
);
384 qemu_mutex_unlock(ivgen_mutex
);
391 if (qcrypto_cipher_setiv(cipher
,
398 nbytes
= len
> sectorsize
? sectorsize
: len
;
399 if (func(cipher
, buf
, buf
, nbytes
, errp
) < 0) {
412 int qcrypto_block_cipher_decrypt_helper(QCryptoCipher
*cipher
,
421 return do_qcrypto_block_cipher_encdec(cipher
, niv
, ivgen
, NULL
, sectorsize
,
423 qcrypto_cipher_decrypt
, errp
);
427 int qcrypto_block_cipher_encrypt_helper(QCryptoCipher
*cipher
,
436 return do_qcrypto_block_cipher_encdec(cipher
, niv
, ivgen
, NULL
, sectorsize
,
438 qcrypto_cipher_encrypt
, errp
);
441 int qcrypto_block_decrypt_helper(QCryptoBlock
*block
,
449 QCryptoCipher
*cipher
= qcrypto_block_pop_cipher(block
);
451 ret
= do_qcrypto_block_cipher_encdec(cipher
, block
->niv
, block
->ivgen
,
452 &block
->mutex
, sectorsize
, offset
, buf
,
453 len
, qcrypto_cipher_decrypt
, errp
);
455 qcrypto_block_push_cipher(block
, cipher
);
460 int qcrypto_block_encrypt_helper(QCryptoBlock
*block
,
468 QCryptoCipher
*cipher
= qcrypto_block_pop_cipher(block
);
470 ret
= do_qcrypto_block_cipher_encdec(cipher
, block
->niv
, block
->ivgen
,
471 &block
->mutex
, sectorsize
, offset
, buf
,
472 len
, qcrypto_cipher_encrypt
, errp
);
474 qcrypto_block_push_cipher(block
, cipher
);