xref: /openbmc/qemu/crypto/block.c (revision 63dd7bcb)
1 /*
2  * QEMU Crypto block device encryption
3  *
4  * Copyright (c) 2015-2016 Red Hat, Inc.
5  *
6  * This library is free software; you can redistribute it and/or
7  * modify it under the terms of the GNU Lesser General Public
8  * License as published by the Free Software Foundation; either
9  * version 2.1 of the License, or (at your option) any later version.
10  *
11  * This library is distributed in the hope that it will be useful,
12  * but WITHOUT ANY WARRANTY; without even the implied warranty of
13  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
14  * Lesser General Public License for more details.
15  *
16  * You should have received a copy of the GNU Lesser General Public
17  * License along with this library; if not, see <http://www.gnu.org/licenses/>.
18  *
19  */
20 
21 #include "qemu/osdep.h"
22 #include "qapi/error.h"
23 #include "blockpriv.h"
24 #include "block-qcow.h"
25 #include "block-luks.h"
26 
27 static const QCryptoBlockDriver *qcrypto_block_drivers[] = {
28     [Q_CRYPTO_BLOCK_FORMAT_QCOW] = &qcrypto_block_driver_qcow,
29     [Q_CRYPTO_BLOCK_FORMAT_LUKS] = &qcrypto_block_driver_luks,
30 };
31 
32 
33 bool qcrypto_block_has_format(QCryptoBlockFormat format,
34                               const uint8_t *buf,
35                               size_t len)
36 {
37     const QCryptoBlockDriver *driver;
38 
39     if (format >= G_N_ELEMENTS(qcrypto_block_drivers) ||
40         !qcrypto_block_drivers[format]) {
41         return false;
42     }
43 
44     driver = qcrypto_block_drivers[format];
45 
46     return driver->has_format(buf, len);
47 }
48 
49 
50 QCryptoBlock *qcrypto_block_open(QCryptoBlockOpenOptions *options,
51                                  const char *optprefix,
52                                  QCryptoBlockReadFunc readfunc,
53                                  void *opaque,
54                                  unsigned int flags,
55                                  size_t n_threads,
56                                  Error **errp)
57 {
58     QCryptoBlock *block = g_new0(QCryptoBlock, 1);
59 
60     block->format = options->format;
61 
62     if (options->format >= G_N_ELEMENTS(qcrypto_block_drivers) ||
63         !qcrypto_block_drivers[options->format]) {
64         error_setg(errp, "Unsupported block driver %s",
65                    QCryptoBlockFormat_str(options->format));
66         g_free(block);
67         return NULL;
68     }
69 
70     block->driver = qcrypto_block_drivers[options->format];
71 
72     if (block->driver->open(block, options, optprefix,
73                             readfunc, opaque, flags, n_threads, errp) < 0)
74     {
75         g_free(block);
76         return NULL;
77     }
78 
79     qemu_mutex_init(&block->mutex);
80 
81     return block;
82 }
83 
84 
85 QCryptoBlock *qcrypto_block_create(QCryptoBlockCreateOptions *options,
86                                    const char *optprefix,
87                                    QCryptoBlockInitFunc initfunc,
88                                    QCryptoBlockWriteFunc writefunc,
89                                    void *opaque,
90                                    Error **errp)
91 {
92     QCryptoBlock *block = g_new0(QCryptoBlock, 1);
93 
94     block->format = options->format;
95 
96     if (options->format >= G_N_ELEMENTS(qcrypto_block_drivers) ||
97         !qcrypto_block_drivers[options->format]) {
98         error_setg(errp, "Unsupported block driver %s",
99                    QCryptoBlockFormat_str(options->format));
100         g_free(block);
101         return NULL;
102     }
103 
104     block->driver = qcrypto_block_drivers[options->format];
105 
106     if (block->driver->create(block, options, optprefix, initfunc,
107                               writefunc, opaque, errp) < 0) {
108         g_free(block);
109         return NULL;
110     }
111 
112     qemu_mutex_init(&block->mutex);
113 
114     return block;
115 }
116 
117 
118 static int qcrypto_block_headerlen_hdr_init_func(QCryptoBlock *block,
119         size_t headerlen, void *opaque, Error **errp)
120 {
121     size_t *headerlenp = opaque;
122 
123     /* Stash away the payload size */
124     *headerlenp = headerlen;
125     return 0;
126 }
127 
128 
129 static int qcrypto_block_headerlen_hdr_write_func(QCryptoBlock *block,
130         size_t offset, const uint8_t *buf, size_t buflen,
131         void *opaque, Error **errp)
132 {
133     /* Discard the bytes, we're not actually writing to an image */
134     return 0;
135 }
136 
137 
138 bool
139 qcrypto_block_calculate_payload_offset(QCryptoBlockCreateOptions *create_opts,
140                                        const char *optprefix,
141                                        size_t *len,
142                                        Error **errp)
143 {
144     /* Fake LUKS creation in order to determine the payload size */
145     g_autoptr(QCryptoBlock) crypto =
146         qcrypto_block_create(create_opts, optprefix,
147                              qcrypto_block_headerlen_hdr_init_func,
148                              qcrypto_block_headerlen_hdr_write_func,
149                              len, errp);
150     return crypto != NULL;
151 }
152 
153 int qcrypto_block_amend_options(QCryptoBlock *block,
154                                 QCryptoBlockReadFunc readfunc,
155                                 QCryptoBlockWriteFunc writefunc,
156                                 void *opaque,
157                                 QCryptoBlockAmendOptions *options,
158                                 bool force,
159                                 Error **errp)
160 {
161     if (options->format != block->format) {
162         error_setg(errp,
163                    "Cannot amend encryption format");
164         return -1;
165     }
166 
167     if (!block->driver->amend) {
168         error_setg(errp,
169                    "Crypto format %s doesn't support format options amendment",
170                    QCryptoBlockFormat_str(block->format));
171         return -1;
172     }
173 
174     return block->driver->amend(block,
175                                 readfunc,
176                                 writefunc,
177                                 opaque,
178                                 options,
179                                 force,
180                                 errp);
181 }
182 
183 QCryptoBlockInfo *qcrypto_block_get_info(QCryptoBlock *block,
184                                          Error **errp)
185 {
186     QCryptoBlockInfo *info = g_new0(QCryptoBlockInfo, 1);
187 
188     info->format = block->format;
189 
190     if (block->driver->get_info &&
191         block->driver->get_info(block, info, errp) < 0) {
192         g_free(info);
193         return NULL;
194     }
195 
196     return info;
197 }
198 
199 
200 int qcrypto_block_decrypt(QCryptoBlock *block,
201                           uint64_t offset,
202                           uint8_t *buf,
203                           size_t len,
204                           Error **errp)
205 {
206     return block->driver->decrypt(block, offset, buf, len, errp);
207 }
208 
209 
210 int qcrypto_block_encrypt(QCryptoBlock *block,
211                           uint64_t offset,
212                           uint8_t *buf,
213                           size_t len,
214                           Error **errp)
215 {
216     return block->driver->encrypt(block, offset, buf, len, errp);
217 }
218 
219 
220 QCryptoCipher *qcrypto_block_get_cipher(QCryptoBlock *block)
221 {
222     /* Ciphers should be accessed through pop/push method to be thread-safe.
223      * Better, they should not be accessed externally at all (note, that
224      * pop/push are static functions)
225      * This function is used only in test with one thread (it's safe to skip
226      * pop/push interface), so it's enough to assert it here:
227      */
228     assert(block->n_ciphers <= 1);
229     return block->ciphers ? block->ciphers[0] : NULL;
230 }
231 
232 
233 static QCryptoCipher *qcrypto_block_pop_cipher(QCryptoBlock *block)
234 {
235     QCryptoCipher *cipher;
236 
237     qemu_mutex_lock(&block->mutex);
238 
239     assert(block->n_free_ciphers > 0);
240     block->n_free_ciphers--;
241     cipher = block->ciphers[block->n_free_ciphers];
242 
243     qemu_mutex_unlock(&block->mutex);
244 
245     return cipher;
246 }
247 
248 
249 static void qcrypto_block_push_cipher(QCryptoBlock *block,
250                                       QCryptoCipher *cipher)
251 {
252     qemu_mutex_lock(&block->mutex);
253 
254     assert(block->n_free_ciphers < block->n_ciphers);
255     block->ciphers[block->n_free_ciphers] = cipher;
256     block->n_free_ciphers++;
257 
258     qemu_mutex_unlock(&block->mutex);
259 }
260 
261 
262 int qcrypto_block_init_cipher(QCryptoBlock *block,
263                               QCryptoCipherAlgorithm alg,
264                               QCryptoCipherMode mode,
265                               const uint8_t *key, size_t nkey,
266                               size_t n_threads, Error **errp)
267 {
268     size_t i;
269 
270     assert(!block->ciphers && !block->n_ciphers && !block->n_free_ciphers);
271 
272     block->ciphers = g_new0(QCryptoCipher *, n_threads);
273 
274     for (i = 0; i < n_threads; i++) {
275         block->ciphers[i] = qcrypto_cipher_new(alg, mode, key, nkey, errp);
276         if (!block->ciphers[i]) {
277             qcrypto_block_free_cipher(block);
278             return -1;
279         }
280         block->n_ciphers++;
281         block->n_free_ciphers++;
282     }
283 
284     return 0;
285 }
286 
287 
288 void qcrypto_block_free_cipher(QCryptoBlock *block)
289 {
290     size_t i;
291 
292     if (!block->ciphers) {
293         return;
294     }
295 
296     assert(block->n_ciphers == block->n_free_ciphers);
297 
298     for (i = 0; i < block->n_ciphers; i++) {
299         qcrypto_cipher_free(block->ciphers[i]);
300     }
301 
302     g_free(block->ciphers);
303     block->ciphers = NULL;
304     block->n_ciphers = block->n_free_ciphers = 0;
305 }
306 
307 QCryptoIVGen *qcrypto_block_get_ivgen(QCryptoBlock *block)
308 {
309     /* ivgen should be accessed under mutex. However, this function is used only
310      * in test with one thread, so it's enough to assert it here:
311      */
312     assert(block->n_ciphers <= 1);
313     return block->ivgen;
314 }
315 
316 
317 QCryptoHashAlgorithm qcrypto_block_get_kdf_hash(QCryptoBlock *block)
318 {
319     return block->kdfhash;
320 }
321 
322 
323 uint64_t qcrypto_block_get_payload_offset(QCryptoBlock *block)
324 {
325     return block->payload_offset;
326 }
327 
328 
329 uint64_t qcrypto_block_get_sector_size(QCryptoBlock *block)
330 {
331     return block->sector_size;
332 }
333 
334 
335 void qcrypto_block_free(QCryptoBlock *block)
336 {
337     if (!block) {
338         return;
339     }
340 
341     block->driver->cleanup(block);
342 
343     qcrypto_block_free_cipher(block);
344     qcrypto_ivgen_free(block->ivgen);
345     qemu_mutex_destroy(&block->mutex);
346     g_free(block);
347 }
348 
349 
350 typedef int (*QCryptoCipherEncDecFunc)(QCryptoCipher *cipher,
351                                         const void *in,
352                                         void *out,
353                                         size_t len,
354                                         Error **errp);
355 
356 static int do_qcrypto_block_cipher_encdec(QCryptoCipher *cipher,
357                                           size_t niv,
358                                           QCryptoIVGen *ivgen,
359                                           QemuMutex *ivgen_mutex,
360                                           int sectorsize,
361                                           uint64_t offset,
362                                           uint8_t *buf,
363                                           size_t len,
364                                           QCryptoCipherEncDecFunc func,
365                                           Error **errp)
366 {
367     g_autofree uint8_t *iv = niv ? g_new0(uint8_t, niv) : NULL;
368     int ret = -1;
369     uint64_t startsector = offset / sectorsize;
370 
371     assert(QEMU_IS_ALIGNED(offset, sectorsize));
372     assert(QEMU_IS_ALIGNED(len, sectorsize));
373 
374     while (len > 0) {
375         size_t nbytes;
376         if (niv) {
377             if (ivgen_mutex) {
378                 qemu_mutex_lock(ivgen_mutex);
379             }
380             ret = qcrypto_ivgen_calculate(ivgen, startsector, iv, niv, errp);
381             if (ivgen_mutex) {
382                 qemu_mutex_unlock(ivgen_mutex);
383             }
384 
385             if (ret < 0) {
386                 return -1;
387             }
388 
389             if (qcrypto_cipher_setiv(cipher,
390                                      iv, niv,
391                                      errp) < 0) {
392                 return -1;
393             }
394         }
395 
396         nbytes = len > sectorsize ? sectorsize : len;
397         if (func(cipher, buf, buf, nbytes, errp) < 0) {
398             return -1;
399         }
400 
401         startsector++;
402         buf += nbytes;
403         len -= nbytes;
404     }
405 
406     return 0;
407 }
408 
409 
410 int qcrypto_block_cipher_decrypt_helper(QCryptoCipher *cipher,
411                                         size_t niv,
412                                         QCryptoIVGen *ivgen,
413                                         int sectorsize,
414                                         uint64_t offset,
415                                         uint8_t *buf,
416                                         size_t len,
417                                         Error **errp)
418 {
419     return do_qcrypto_block_cipher_encdec(cipher, niv, ivgen, NULL, sectorsize,
420                                           offset, buf, len,
421                                           qcrypto_cipher_decrypt, errp);
422 }
423 
424 
425 int qcrypto_block_cipher_encrypt_helper(QCryptoCipher *cipher,
426                                         size_t niv,
427                                         QCryptoIVGen *ivgen,
428                                         int sectorsize,
429                                         uint64_t offset,
430                                         uint8_t *buf,
431                                         size_t len,
432                                         Error **errp)
433 {
434     return do_qcrypto_block_cipher_encdec(cipher, niv, ivgen, NULL, sectorsize,
435                                           offset, buf, len,
436                                           qcrypto_cipher_encrypt, errp);
437 }
438 
439 int qcrypto_block_decrypt_helper(QCryptoBlock *block,
440                                  int sectorsize,
441                                  uint64_t offset,
442                                  uint8_t *buf,
443                                  size_t len,
444                                  Error **errp)
445 {
446     int ret;
447     QCryptoCipher *cipher = qcrypto_block_pop_cipher(block);
448 
449     ret = do_qcrypto_block_cipher_encdec(cipher, block->niv, block->ivgen,
450                                          &block->mutex, sectorsize, offset, buf,
451                                          len, qcrypto_cipher_decrypt, errp);
452 
453     qcrypto_block_push_cipher(block, cipher);
454 
455     return ret;
456 }
457 
458 int qcrypto_block_encrypt_helper(QCryptoBlock *block,
459                                  int sectorsize,
460                                  uint64_t offset,
461                                  uint8_t *buf,
462                                  size_t len,
463                                  Error **errp)
464 {
465     int ret;
466     QCryptoCipher *cipher = qcrypto_block_pop_cipher(block);
467 
468     ret = do_qcrypto_block_cipher_encdec(cipher, block->niv, block->ivgen,
469                                          &block->mutex, sectorsize, offset, buf,
470                                          len, qcrypto_cipher_encrypt, errp);
471 
472     qcrypto_block_push_cipher(block, cipher);
473 
474     return ret;
475 }
476