2 * QEMU Crypto cipher built-in algorithms
4 * Copyright (c) 2015 Red Hat, Inc.
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, see <http://www.gnu.org/licenses/>.
21 #include "qemu/osdep.h"
22 #include "crypto/aes.h"
23 #include "crypto/desrfb.h"
24 #include "crypto/xts.h"
26 typedef struct QCryptoCipherBuiltinAESContext QCryptoCipherBuiltinAESContext
;
27 struct QCryptoCipherBuiltinAESContext
{
31 typedef struct QCryptoCipherBuiltinAES QCryptoCipherBuiltinAES
;
32 struct QCryptoCipherBuiltinAES
{
33 QCryptoCipherBuiltinAESContext key
;
34 QCryptoCipherBuiltinAESContext key_tweak
;
35 uint8_t iv
[AES_BLOCK_SIZE
];
37 typedef struct QCryptoCipherBuiltinDESRFB QCryptoCipherBuiltinDESRFB
;
38 struct QCryptoCipherBuiltinDESRFB
{
43 typedef struct QCryptoCipherBuiltin QCryptoCipherBuiltin
;
44 struct QCryptoCipherBuiltin
{
46 QCryptoCipherBuiltinAES aes
;
47 QCryptoCipherBuiltinDESRFB desrfb
;
50 void (*free
)(QCryptoCipher
*cipher
);
51 int (*setiv
)(QCryptoCipher
*cipher
,
52 const uint8_t *iv
, size_t niv
,
54 int (*encrypt
)(QCryptoCipher
*cipher
,
59 int (*decrypt
)(QCryptoCipher
*cipher
,
67 static void qcrypto_cipher_free_aes(QCryptoCipher
*cipher
)
69 QCryptoCipherBuiltin
*ctxt
= cipher
->opaque
;
72 cipher
->opaque
= NULL
;
76 static void qcrypto_cipher_aes_ecb_encrypt(AES_KEY
*key
,
81 const uint8_t *inptr
= in
;
82 uint8_t *outptr
= out
;
84 if (len
> AES_BLOCK_SIZE
) {
85 AES_encrypt(inptr
, outptr
, key
);
86 inptr
+= AES_BLOCK_SIZE
;
87 outptr
+= AES_BLOCK_SIZE
;
88 len
-= AES_BLOCK_SIZE
;
90 uint8_t tmp1
[AES_BLOCK_SIZE
], tmp2
[AES_BLOCK_SIZE
];
91 memcpy(tmp1
, inptr
, len
);
92 /* Fill with 0 to avoid valgrind uninitialized reads */
93 memset(tmp1
+ len
, 0, sizeof(tmp1
) - len
);
94 AES_encrypt(tmp1
, tmp2
, key
);
95 memcpy(outptr
, tmp2
, len
);
102 static void qcrypto_cipher_aes_ecb_decrypt(AES_KEY
*key
,
107 const uint8_t *inptr
= in
;
108 uint8_t *outptr
= out
;
110 if (len
> AES_BLOCK_SIZE
) {
111 AES_decrypt(inptr
, outptr
, key
);
112 inptr
+= AES_BLOCK_SIZE
;
113 outptr
+= AES_BLOCK_SIZE
;
114 len
-= AES_BLOCK_SIZE
;
116 uint8_t tmp1
[AES_BLOCK_SIZE
], tmp2
[AES_BLOCK_SIZE
];
117 memcpy(tmp1
, inptr
, len
);
118 /* Fill with 0 to avoid valgrind uninitialized reads */
119 memset(tmp1
+ len
, 0, sizeof(tmp1
) - len
);
120 AES_decrypt(tmp1
, tmp2
, key
);
121 memcpy(outptr
, tmp2
, len
);
128 static void qcrypto_cipher_aes_xts_encrypt(const void *ctx
,
133 const QCryptoCipherBuiltinAESContext
*aesctx
= ctx
;
135 qcrypto_cipher_aes_ecb_encrypt((AES_KEY
*)&aesctx
->enc
,
140 static void qcrypto_cipher_aes_xts_decrypt(const void *ctx
,
145 const QCryptoCipherBuiltinAESContext
*aesctx
= ctx
;
147 qcrypto_cipher_aes_ecb_decrypt((AES_KEY
*)&aesctx
->dec
,
152 static int qcrypto_cipher_encrypt_aes(QCryptoCipher
*cipher
,
158 QCryptoCipherBuiltin
*ctxt
= cipher
->opaque
;
160 switch (cipher
->mode
) {
161 case QCRYPTO_CIPHER_MODE_ECB
:
162 qcrypto_cipher_aes_ecb_encrypt(&ctxt
->state
.aes
.key
.enc
,
165 case QCRYPTO_CIPHER_MODE_CBC
:
166 AES_cbc_encrypt(in
, out
, len
,
167 &ctxt
->state
.aes
.key
.enc
,
168 ctxt
->state
.aes
.iv
, 1);
170 case QCRYPTO_CIPHER_MODE_XTS
:
171 xts_encrypt(&ctxt
->state
.aes
.key
,
172 &ctxt
->state
.aes
.key_tweak
,
173 qcrypto_cipher_aes_xts_encrypt
,
174 qcrypto_cipher_aes_xts_decrypt
,
179 g_assert_not_reached();
186 static int qcrypto_cipher_decrypt_aes(QCryptoCipher
*cipher
,
192 QCryptoCipherBuiltin
*ctxt
= cipher
->opaque
;
194 switch (cipher
->mode
) {
195 case QCRYPTO_CIPHER_MODE_ECB
:
196 qcrypto_cipher_aes_ecb_decrypt(&ctxt
->state
.aes
.key
.dec
,
199 case QCRYPTO_CIPHER_MODE_CBC
:
200 AES_cbc_encrypt(in
, out
, len
,
201 &ctxt
->state
.aes
.key
.dec
,
202 ctxt
->state
.aes
.iv
, 0);
204 case QCRYPTO_CIPHER_MODE_XTS
:
205 xts_decrypt(&ctxt
->state
.aes
.key
,
206 &ctxt
->state
.aes
.key_tweak
,
207 qcrypto_cipher_aes_xts_encrypt
,
208 qcrypto_cipher_aes_xts_decrypt
,
213 g_assert_not_reached();
219 static int qcrypto_cipher_setiv_aes(QCryptoCipher
*cipher
,
220 const uint8_t *iv
, size_t niv
,
223 QCryptoCipherBuiltin
*ctxt
= cipher
->opaque
;
224 if (niv
!= AES_BLOCK_SIZE
) {
225 error_setg(errp
, "IV must be %d bytes not %zu",
226 AES_BLOCK_SIZE
, niv
);
230 memcpy(ctxt
->state
.aes
.iv
, iv
, AES_BLOCK_SIZE
);
238 static int qcrypto_cipher_init_aes(QCryptoCipher
*cipher
,
239 const uint8_t *key
, size_t nkey
,
242 QCryptoCipherBuiltin
*ctxt
;
244 if (cipher
->mode
!= QCRYPTO_CIPHER_MODE_CBC
&&
245 cipher
->mode
!= QCRYPTO_CIPHER_MODE_ECB
&&
246 cipher
->mode
!= QCRYPTO_CIPHER_MODE_XTS
) {
247 error_setg(errp
, "Unsupported cipher mode %d", cipher
->mode
);
251 ctxt
= g_new0(QCryptoCipherBuiltin
, 1);
253 if (cipher
->mode
== QCRYPTO_CIPHER_MODE_XTS
) {
254 if (AES_set_encrypt_key(key
, nkey
* 4, &ctxt
->state
.aes
.key
.enc
) != 0) {
255 error_setg(errp
, "Failed to set encryption key");
259 if (AES_set_decrypt_key(key
, nkey
* 4, &ctxt
->state
.aes
.key
.dec
) != 0) {
260 error_setg(errp
, "Failed to set decryption key");
264 if (AES_set_encrypt_key(key
+ (nkey
/ 2), nkey
* 4,
265 &ctxt
->state
.aes
.key_tweak
.enc
) != 0) {
266 error_setg(errp
, "Failed to set encryption key");
270 if (AES_set_decrypt_key(key
+ (nkey
/ 2), nkey
* 4,
271 &ctxt
->state
.aes
.key_tweak
.dec
) != 0) {
272 error_setg(errp
, "Failed to set decryption key");
276 if (AES_set_encrypt_key(key
, nkey
* 8, &ctxt
->state
.aes
.key
.enc
) != 0) {
277 error_setg(errp
, "Failed to set encryption key");
281 if (AES_set_decrypt_key(key
, nkey
* 8, &ctxt
->state
.aes
.key
.dec
) != 0) {
282 error_setg(errp
, "Failed to set decryption key");
287 ctxt
->blocksize
= AES_BLOCK_SIZE
;
288 ctxt
->free
= qcrypto_cipher_free_aes
;
289 ctxt
->setiv
= qcrypto_cipher_setiv_aes
;
290 ctxt
->encrypt
= qcrypto_cipher_encrypt_aes
;
291 ctxt
->decrypt
= qcrypto_cipher_decrypt_aes
;
293 cipher
->opaque
= ctxt
;
303 static void qcrypto_cipher_free_des_rfb(QCryptoCipher
*cipher
)
305 QCryptoCipherBuiltin
*ctxt
= cipher
->opaque
;
307 g_free(ctxt
->state
.desrfb
.key
);
309 cipher
->opaque
= NULL
;
313 static int qcrypto_cipher_encrypt_des_rfb(QCryptoCipher
*cipher
,
319 QCryptoCipherBuiltin
*ctxt
= cipher
->opaque
;
323 error_setg(errp
, "Buffer size must be multiple of 8 not %zu",
328 deskey(ctxt
->state
.desrfb
.key
, EN0
);
330 for (i
= 0; i
< len
; i
+= 8) {
331 des((void *)in
+ i
, out
+ i
);
338 static int qcrypto_cipher_decrypt_des_rfb(QCryptoCipher
*cipher
,
344 QCryptoCipherBuiltin
*ctxt
= cipher
->opaque
;
348 error_setg(errp
, "Buffer size must be multiple of 8 not %zu",
353 deskey(ctxt
->state
.desrfb
.key
, DE1
);
355 for (i
= 0; i
< len
; i
+= 8) {
356 des((void *)in
+ i
, out
+ i
);
363 static int qcrypto_cipher_setiv_des_rfb(QCryptoCipher
*cipher
,
364 const uint8_t *iv
, size_t niv
,
367 error_setg(errp
, "Setting IV is not supported");
372 static int qcrypto_cipher_init_des_rfb(QCryptoCipher
*cipher
,
373 const uint8_t *key
, size_t nkey
,
376 QCryptoCipherBuiltin
*ctxt
;
378 if (cipher
->mode
!= QCRYPTO_CIPHER_MODE_ECB
) {
379 error_setg(errp
, "Unsupported cipher mode %d", cipher
->mode
);
383 ctxt
= g_new0(QCryptoCipherBuiltin
, 1);
385 ctxt
->state
.desrfb
.key
= g_new0(uint8_t, nkey
);
386 memcpy(ctxt
->state
.desrfb
.key
, key
, nkey
);
387 ctxt
->state
.desrfb
.nkey
= nkey
;
390 ctxt
->free
= qcrypto_cipher_free_des_rfb
;
391 ctxt
->setiv
= qcrypto_cipher_setiv_des_rfb
;
392 ctxt
->encrypt
= qcrypto_cipher_encrypt_des_rfb
;
393 ctxt
->decrypt
= qcrypto_cipher_decrypt_des_rfb
;
395 cipher
->opaque
= ctxt
;
401 bool qcrypto_cipher_supports(QCryptoCipherAlgorithm alg
)
404 case QCRYPTO_CIPHER_ALG_DES_RFB
:
405 case QCRYPTO_CIPHER_ALG_AES_128
:
406 case QCRYPTO_CIPHER_ALG_AES_192
:
407 case QCRYPTO_CIPHER_ALG_AES_256
:
415 QCryptoCipher
*qcrypto_cipher_new(QCryptoCipherAlgorithm alg
,
416 QCryptoCipherMode mode
,
417 const uint8_t *key
, size_t nkey
,
420 QCryptoCipher
*cipher
;
422 cipher
= g_new0(QCryptoCipher
, 1);
426 if (!qcrypto_cipher_validate_key_length(alg
, mode
, nkey
, errp
)) {
430 switch (cipher
->alg
) {
431 case QCRYPTO_CIPHER_ALG_DES_RFB
:
432 if (qcrypto_cipher_init_des_rfb(cipher
, key
, nkey
, errp
) < 0) {
436 case QCRYPTO_CIPHER_ALG_AES_128
:
437 case QCRYPTO_CIPHER_ALG_AES_192
:
438 case QCRYPTO_CIPHER_ALG_AES_256
:
439 if (qcrypto_cipher_init_aes(cipher
, key
, nkey
, errp
) < 0) {
445 "Unsupported cipher algorithm %d", cipher
->alg
);
456 void qcrypto_cipher_free(QCryptoCipher
*cipher
)
458 QCryptoCipherBuiltin
*ctxt
;
464 ctxt
= cipher
->opaque
;
470 int qcrypto_cipher_encrypt(QCryptoCipher
*cipher
,
476 QCryptoCipherBuiltin
*ctxt
= cipher
->opaque
;
478 if (len
% ctxt
->blocksize
) {
479 error_setg(errp
, "Length %zu must be a multiple of block size %zu",
480 len
, ctxt
->blocksize
);
484 return ctxt
->encrypt(cipher
, in
, out
, len
, errp
);
488 int qcrypto_cipher_decrypt(QCryptoCipher
*cipher
,
494 QCryptoCipherBuiltin
*ctxt
= cipher
->opaque
;
496 if (len
% ctxt
->blocksize
) {
497 error_setg(errp
, "Length %zu must be a multiple of block size %zu",
498 len
, ctxt
->blocksize
);
502 return ctxt
->decrypt(cipher
, in
, out
, len
, errp
);
506 int qcrypto_cipher_setiv(QCryptoCipher
*cipher
,
507 const uint8_t *iv
, size_t niv
,
510 QCryptoCipherBuiltin
*ctxt
= cipher
->opaque
;
512 return ctxt
->setiv(cipher
, iv
, niv
, errp
);