2 * QEMU Crypto block device encryption
4 * Copyright (c) 2015-2016 Red Hat, Inc.
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, see <http://www.gnu.org/licenses/>.
21 #include "qemu/osdep.h"
22 #include "qapi/error.h"
23 #include "blockpriv.h"
24 #include "block-qcow.h"
25 #include "block-luks.h"
27 static const QCryptoBlockDriver
*qcrypto_block_drivers
[] = {
28 [Q_CRYPTO_BLOCK_FORMAT_QCOW
] = &qcrypto_block_driver_qcow
,
29 [Q_CRYPTO_BLOCK_FORMAT_LUKS
] = &qcrypto_block_driver_luks
,
33 bool qcrypto_block_has_format(QCryptoBlockFormat format
,
37 const QCryptoBlockDriver
*driver
;
39 if (format
>= G_N_ELEMENTS(qcrypto_block_drivers
) ||
40 !qcrypto_block_drivers
[format
]) {
44 driver
= qcrypto_block_drivers
[format
];
46 return driver
->has_format(buf
, len
);
50 QCryptoBlock
*qcrypto_block_open(QCryptoBlockOpenOptions
*options
,
51 const char *optprefix
,
52 QCryptoBlockReadFunc readfunc
,
58 QCryptoBlock
*block
= g_new0(QCryptoBlock
, 1);
60 block
->format
= options
->format
;
62 if (options
->format
>= G_N_ELEMENTS(qcrypto_block_drivers
) ||
63 !qcrypto_block_drivers
[options
->format
]) {
64 error_setg(errp
, "Unsupported block driver %s",
65 QCryptoBlockFormat_str(options
->format
));
70 block
->driver
= qcrypto_block_drivers
[options
->format
];
72 if (block
->driver
->open(block
, options
, optprefix
,
73 readfunc
, opaque
, flags
, n_threads
, errp
) < 0)
79 qemu_mutex_init(&block
->mutex
);
85 QCryptoBlock
*qcrypto_block_create(QCryptoBlockCreateOptions
*options
,
86 const char *optprefix
,
87 QCryptoBlockInitFunc initfunc
,
88 QCryptoBlockWriteFunc writefunc
,
92 QCryptoBlock
*block
= g_new0(QCryptoBlock
, 1);
94 block
->format
= options
->format
;
96 if (options
->format
>= G_N_ELEMENTS(qcrypto_block_drivers
) ||
97 !qcrypto_block_drivers
[options
->format
]) {
98 error_setg(errp
, "Unsupported block driver %s",
99 QCryptoBlockFormat_str(options
->format
));
104 block
->driver
= qcrypto_block_drivers
[options
->format
];
106 if (block
->driver
->create(block
, options
, optprefix
, initfunc
,
107 writefunc
, opaque
, errp
) < 0) {
112 qemu_mutex_init(&block
->mutex
);
118 static ssize_t
qcrypto_block_headerlen_hdr_init_func(QCryptoBlock
*block
,
119 size_t headerlen
, void *opaque
, Error
**errp
)
121 size_t *headerlenp
= opaque
;
123 /* Stash away the payload size */
124 *headerlenp
= headerlen
;
129 static ssize_t
qcrypto_block_headerlen_hdr_write_func(QCryptoBlock
*block
,
130 size_t offset
, const uint8_t *buf
, size_t buflen
,
131 void *opaque
, Error
**errp
)
133 /* Discard the bytes, we're not actually writing to an image */
139 qcrypto_block_calculate_payload_offset(QCryptoBlockCreateOptions
*create_opts
,
140 const char *optprefix
,
144 /* Fake LUKS creation in order to determine the payload size */
145 g_autoptr(QCryptoBlock
) crypto
=
146 qcrypto_block_create(create_opts
, optprefix
,
147 qcrypto_block_headerlen_hdr_init_func
,
148 qcrypto_block_headerlen_hdr_write_func
,
150 return crypto
!= NULL
;
153 int qcrypto_block_amend_options(QCryptoBlock
*block
,
154 QCryptoBlockReadFunc readfunc
,
155 QCryptoBlockWriteFunc writefunc
,
157 QCryptoBlockAmendOptions
*options
,
161 if (options
->format
!= block
->format
) {
163 "Cannot amend encryption format");
167 if (!block
->driver
->amend
) {
169 "Crypto format %s doesn't support format options amendment",
170 QCryptoBlockFormat_str(block
->format
));
174 return block
->driver
->amend(block
,
183 QCryptoBlockInfo
*qcrypto_block_get_info(QCryptoBlock
*block
,
186 QCryptoBlockInfo
*info
= g_new0(QCryptoBlockInfo
, 1);
188 info
->format
= block
->format
;
190 if (block
->driver
->get_info
&&
191 block
->driver
->get_info(block
, info
, errp
) < 0) {
200 int qcrypto_block_decrypt(QCryptoBlock
*block
,
206 return block
->driver
->decrypt(block
, offset
, buf
, len
, errp
);
210 int qcrypto_block_encrypt(QCryptoBlock
*block
,
216 return block
->driver
->encrypt(block
, offset
, buf
, len
, errp
);
220 QCryptoCipher
*qcrypto_block_get_cipher(QCryptoBlock
*block
)
222 /* Ciphers should be accessed through pop/push method to be thread-safe.
223 * Better, they should not be accessed externally at all (note, that
224 * pop/push are static functions)
225 * This function is used only in test with one thread (it's safe to skip
226 * pop/push interface), so it's enough to assert it here:
228 assert(block
->n_ciphers
<= 1);
229 return block
->ciphers
? block
->ciphers
[0] : NULL
;
233 static QCryptoCipher
*qcrypto_block_pop_cipher(QCryptoBlock
*block
)
235 QCryptoCipher
*cipher
;
237 qemu_mutex_lock(&block
->mutex
);
239 assert(block
->n_free_ciphers
> 0);
240 block
->n_free_ciphers
--;
241 cipher
= block
->ciphers
[block
->n_free_ciphers
];
243 qemu_mutex_unlock(&block
->mutex
);
249 static void qcrypto_block_push_cipher(QCryptoBlock
*block
,
250 QCryptoCipher
*cipher
)
252 qemu_mutex_lock(&block
->mutex
);
254 assert(block
->n_free_ciphers
< block
->n_ciphers
);
255 block
->ciphers
[block
->n_free_ciphers
] = cipher
;
256 block
->n_free_ciphers
++;
258 qemu_mutex_unlock(&block
->mutex
);
262 int qcrypto_block_init_cipher(QCryptoBlock
*block
,
263 QCryptoCipherAlgorithm alg
,
264 QCryptoCipherMode mode
,
265 const uint8_t *key
, size_t nkey
,
266 size_t n_threads
, Error
**errp
)
270 assert(!block
->ciphers
&& !block
->n_ciphers
&& !block
->n_free_ciphers
);
272 block
->ciphers
= g_new0(QCryptoCipher
*, n_threads
);
274 for (i
= 0; i
< n_threads
; i
++) {
275 block
->ciphers
[i
] = qcrypto_cipher_new(alg
, mode
, key
, nkey
, errp
);
276 if (!block
->ciphers
[i
]) {
277 qcrypto_block_free_cipher(block
);
281 block
->n_free_ciphers
++;
288 void qcrypto_block_free_cipher(QCryptoBlock
*block
)
292 if (!block
->ciphers
) {
296 assert(block
->n_ciphers
== block
->n_free_ciphers
);
298 for (i
= 0; i
< block
->n_ciphers
; i
++) {
299 qcrypto_cipher_free(block
->ciphers
[i
]);
302 g_free(block
->ciphers
);
303 block
->ciphers
= NULL
;
304 block
->n_ciphers
= block
->n_free_ciphers
= 0;
307 QCryptoIVGen
*qcrypto_block_get_ivgen(QCryptoBlock
*block
)
309 /* ivgen should be accessed under mutex. However, this function is used only
310 * in test with one thread, so it's enough to assert it here:
312 assert(block
->n_ciphers
<= 1);
317 QCryptoHashAlgorithm
qcrypto_block_get_kdf_hash(QCryptoBlock
*block
)
319 return block
->kdfhash
;
323 uint64_t qcrypto_block_get_payload_offset(QCryptoBlock
*block
)
325 return block
->payload_offset
;
329 uint64_t qcrypto_block_get_sector_size(QCryptoBlock
*block
)
331 return block
->sector_size
;
335 void qcrypto_block_free(QCryptoBlock
*block
)
341 block
->driver
->cleanup(block
);
343 qcrypto_block_free_cipher(block
);
344 qcrypto_ivgen_free(block
->ivgen
);
345 qemu_mutex_destroy(&block
->mutex
);
350 typedef int (*QCryptoCipherEncDecFunc
)(QCryptoCipher
*cipher
,
356 static int do_qcrypto_block_cipher_encdec(QCryptoCipher
*cipher
,
359 QemuMutex
*ivgen_mutex
,
364 QCryptoCipherEncDecFunc func
,
367 g_autofree
uint8_t *iv
= niv
? g_new0(uint8_t, niv
) : NULL
;
369 uint64_t startsector
= offset
/ sectorsize
;
371 assert(QEMU_IS_ALIGNED(offset
, sectorsize
));
372 assert(QEMU_IS_ALIGNED(len
, sectorsize
));
378 qemu_mutex_lock(ivgen_mutex
);
380 ret
= qcrypto_ivgen_calculate(ivgen
, startsector
, iv
, niv
, errp
);
382 qemu_mutex_unlock(ivgen_mutex
);
389 if (qcrypto_cipher_setiv(cipher
,
396 nbytes
= len
> sectorsize
? sectorsize
: len
;
397 if (func(cipher
, buf
, buf
, nbytes
, errp
) < 0) {
410 int qcrypto_block_cipher_decrypt_helper(QCryptoCipher
*cipher
,
419 return do_qcrypto_block_cipher_encdec(cipher
, niv
, ivgen
, NULL
, sectorsize
,
421 qcrypto_cipher_decrypt
, errp
);
425 int qcrypto_block_cipher_encrypt_helper(QCryptoCipher
*cipher
,
434 return do_qcrypto_block_cipher_encdec(cipher
, niv
, ivgen
, NULL
, sectorsize
,
436 qcrypto_cipher_encrypt
, errp
);
439 int qcrypto_block_decrypt_helper(QCryptoBlock
*block
,
447 QCryptoCipher
*cipher
= qcrypto_block_pop_cipher(block
);
449 ret
= do_qcrypto_block_cipher_encdec(cipher
, block
->niv
, block
->ivgen
,
450 &block
->mutex
, sectorsize
, offset
, buf
,
451 len
, qcrypto_cipher_decrypt
, errp
);
453 qcrypto_block_push_cipher(block
, cipher
);
458 int qcrypto_block_encrypt_helper(QCryptoBlock
*block
,
466 QCryptoCipher
*cipher
= qcrypto_block_pop_cipher(block
);
468 ret
= do_qcrypto_block_cipher_encdec(cipher
, block
->niv
, block
->ivgen
,
469 &block
->mutex
, sectorsize
, offset
, buf
,
470 len
, qcrypto_cipher_encrypt
, errp
);
472 qcrypto_block_push_cipher(block
, cipher
);