cipher-nettle.c 14.8 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
/*
 * QEMU Crypto cipher nettle algorithms
 *
 * Copyright (c) 2015 Red Hat, Inc.
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
 * License along with this library; if not, see <http://www.gnu.org/licenses/>.
 *
 */

P
Peter Maydell 已提交
21
#include "qemu/osdep.h"
22 23
#include "crypto/xts.h"

24 25 26 27
#include <nettle/nettle-types.h>
#include <nettle/aes.h>
#include <nettle/des.h>
#include <nettle/cbc.h>
28
#include <nettle/cast128.h>
29
#include <nettle/serpent.h>
30
#include <nettle/twofish.h>
31

32 33 34 35
typedef void (*QCryptoCipherNettleFuncWrapper)(const void *ctx,
                                               size_t length,
                                               uint8_t *dst,
                                               const uint8_t *src);
36

37 38
#if CONFIG_NETTLE_VERSION_MAJOR < 3
typedef nettle_crypt_func * QCryptoCipherNettleFuncNative;
39 40
typedef void *       cipher_ctx_t;
typedef unsigned     cipher_length_t;
41 42

#define cast5_set_key cast128_set_key
43
#else
44
typedef nettle_cipher_func * QCryptoCipherNettleFuncNative;
45 46
typedef const void * cipher_ctx_t;
typedef size_t       cipher_length_t;
47 48
#endif

49 50 51 52 53
typedef struct QCryptoNettleAES {
    struct aes_ctx enc;
    struct aes_ctx dec;
} QCryptoNettleAES;

54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116
static void aes_encrypt_native(cipher_ctx_t ctx, cipher_length_t length,
                               uint8_t *dst, const uint8_t *src)
{
    const QCryptoNettleAES *aesctx = ctx;
    aes_encrypt(&aesctx->enc, length, dst, src);
}

static void aes_decrypt_native(cipher_ctx_t ctx, cipher_length_t length,
                               uint8_t *dst, const uint8_t *src)
{
    const QCryptoNettleAES *aesctx = ctx;
    aes_decrypt(&aesctx->dec, length, dst, src);
}

static void des_encrypt_native(cipher_ctx_t ctx, cipher_length_t length,
                               uint8_t *dst, const uint8_t *src)
{
    des_encrypt(ctx, length, dst, src);
}

static void des_decrypt_native(cipher_ctx_t ctx, cipher_length_t length,
                               uint8_t *dst, const uint8_t *src)
{
    des_decrypt(ctx, length, dst, src);
}

static void cast128_encrypt_native(cipher_ctx_t ctx, cipher_length_t length,
                                   uint8_t *dst, const uint8_t *src)
{
    cast128_encrypt(ctx, length, dst, src);
}

static void cast128_decrypt_native(cipher_ctx_t ctx, cipher_length_t length,
                                   uint8_t *dst, const uint8_t *src)
{
    cast128_decrypt(ctx, length, dst, src);
}

static void serpent_encrypt_native(cipher_ctx_t ctx, cipher_length_t length,
                                   uint8_t *dst, const uint8_t *src)
{
    serpent_encrypt(ctx, length, dst, src);
}

static void serpent_decrypt_native(cipher_ctx_t ctx, cipher_length_t length,
                                   uint8_t *dst, const uint8_t *src)
{
    serpent_decrypt(ctx, length, dst, src);
}

static void twofish_encrypt_native(cipher_ctx_t ctx, cipher_length_t length,
                                   uint8_t *dst, const uint8_t *src)
{
    twofish_encrypt(ctx, length, dst, src);
}

static void twofish_decrypt_native(cipher_ctx_t ctx, cipher_length_t length,
                                   uint8_t *dst, const uint8_t *src)
{
    twofish_decrypt(ctx, length, dst, src);
}

static void aes_encrypt_wrapper(const void *ctx, size_t length,
117 118
                                uint8_t *dst, const uint8_t *src)
{
119 120
    const QCryptoNettleAES *aesctx = ctx;
    aes_encrypt(&aesctx->enc, length, dst, src);
121 122
}

123
static void aes_decrypt_wrapper(const void *ctx, size_t length,
124 125
                                uint8_t *dst, const uint8_t *src)
{
126 127
    const QCryptoNettleAES *aesctx = ctx;
    aes_decrypt(&aesctx->dec, length, dst, src);
128 129
}

130
static void des_encrypt_wrapper(const void *ctx, size_t length,
131 132 133 134 135
                                uint8_t *dst, const uint8_t *src)
{
    des_encrypt(ctx, length, dst, src);
}

136
static void des_decrypt_wrapper(const void *ctx, size_t length,
137 138 139 140 141
                                uint8_t *dst, const uint8_t *src)
{
    des_decrypt(ctx, length, dst, src);
}

142
static void cast128_encrypt_wrapper(const void *ctx, size_t length,
143 144 145 146 147
                                    uint8_t *dst, const uint8_t *src)
{
    cast128_encrypt(ctx, length, dst, src);
}

148
static void cast128_decrypt_wrapper(const void *ctx, size_t length,
149 150 151 152 153
                                    uint8_t *dst, const uint8_t *src)
{
    cast128_decrypt(ctx, length, dst, src);
}

154
static void serpent_encrypt_wrapper(const void *ctx, size_t length,
155 156 157 158 159
                                    uint8_t *dst, const uint8_t *src)
{
    serpent_encrypt(ctx, length, dst, src);
}

160
static void serpent_decrypt_wrapper(const void *ctx, size_t length,
161 162 163 164 165
                                    uint8_t *dst, const uint8_t *src)
{
    serpent_decrypt(ctx, length, dst, src);
}

166
static void twofish_encrypt_wrapper(const void *ctx, size_t length,
167 168 169 170 171
                                    uint8_t *dst, const uint8_t *src)
{
    twofish_encrypt(ctx, length, dst, src);
}

172
static void twofish_decrypt_wrapper(const void *ctx, size_t length,
173 174 175 176 177
                                    uint8_t *dst, const uint8_t *src)
{
    twofish_decrypt(ctx, length, dst, src);
}

178 179
typedef struct QCryptoCipherNettle QCryptoCipherNettle;
struct QCryptoCipherNettle {
180
    /* Primary cipher context for all modes */
181
    void *ctx;
182 183 184
    /* Second cipher context for XTS mode only */
    void *ctx_tweak;
    /* Cipher callbacks for both contexts */
185 186 187 188
    QCryptoCipherNettleFuncNative alg_encrypt_native;
    QCryptoCipherNettleFuncNative alg_decrypt_native;
    QCryptoCipherNettleFuncWrapper alg_encrypt_wrapper;
    QCryptoCipherNettleFuncWrapper alg_decrypt_wrapper;
189

190
    uint8_t *iv;
191
    size_t blocksize;
192 193 194 195 196 197 198 199 200
};

bool qcrypto_cipher_supports(QCryptoCipherAlgorithm alg)
{
    switch (alg) {
    case QCRYPTO_CIPHER_ALG_DES_RFB:
    case QCRYPTO_CIPHER_ALG_AES_128:
    case QCRYPTO_CIPHER_ALG_AES_192:
    case QCRYPTO_CIPHER_ALG_AES_256:
201
    case QCRYPTO_CIPHER_ALG_CAST5_128:
202 203 204
    case QCRYPTO_CIPHER_ALG_SERPENT_128:
    case QCRYPTO_CIPHER_ALG_SERPENT_192:
    case QCRYPTO_CIPHER_ALG_SERPENT_256:
205 206 207
    case QCRYPTO_CIPHER_ALG_TWOFISH_128:
    case QCRYPTO_CIPHER_ALG_TWOFISH_192:
    case QCRYPTO_CIPHER_ALG_TWOFISH_256:
208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226
        return true;
    default:
        return false;
    }
}


QCryptoCipher *qcrypto_cipher_new(QCryptoCipherAlgorithm alg,
                                  QCryptoCipherMode mode,
                                  const uint8_t *key, size_t nkey,
                                  Error **errp)
{
    QCryptoCipher *cipher;
    QCryptoCipherNettle *ctx;
    uint8_t *rfbkey;

    switch (mode) {
    case QCRYPTO_CIPHER_MODE_ECB:
    case QCRYPTO_CIPHER_MODE_CBC:
227
    case QCRYPTO_CIPHER_MODE_XTS:
228 229
        break;
    default:
230 231
        error_setg(errp, "Unsupported cipher mode %s",
                   QCryptoCipherMode_lookup[mode]);
232 233 234
        return NULL;
    }

235
    if (!qcrypto_cipher_validate_key_length(alg, mode, nkey, errp)) {
236 237 238 239 240 241 242 243 244 245 246
        return NULL;
    }

    cipher = g_new0(QCryptoCipher, 1);
    cipher->alg = alg;
    cipher->mode = mode;

    ctx = g_new0(QCryptoCipherNettle, 1);

    switch (alg) {
    case QCRYPTO_CIPHER_ALG_DES_RFB:
247
        ctx->ctx = g_new0(struct des_ctx, 1);
248
        rfbkey = qcrypto_cipher_munge_des_rfb_key(key, nkey);
249
        des_set_key(ctx->ctx, rfbkey);
250 251
        g_free(rfbkey);

252 253 254 255
        ctx->alg_encrypt_native = des_encrypt_native;
        ctx->alg_decrypt_native = des_decrypt_native;
        ctx->alg_encrypt_wrapper = des_encrypt_wrapper;
        ctx->alg_decrypt_wrapper = des_decrypt_wrapper;
256

257
        ctx->blocksize = DES_BLOCK_SIZE;
258 259 260 261 262
        break;

    case QCRYPTO_CIPHER_ALG_AES_128:
    case QCRYPTO_CIPHER_ALG_AES_192:
    case QCRYPTO_CIPHER_ALG_AES_256:
263
        ctx->ctx = g_new0(QCryptoNettleAES, 1);
264

265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283
        if (mode == QCRYPTO_CIPHER_MODE_XTS) {
            ctx->ctx_tweak = g_new0(QCryptoNettleAES, 1);

            nkey /= 2;
            aes_set_encrypt_key(&((QCryptoNettleAES *)ctx->ctx)->enc,
                                nkey, key);
            aes_set_decrypt_key(&((QCryptoNettleAES *)ctx->ctx)->dec,
                                nkey, key);

            aes_set_encrypt_key(&((QCryptoNettleAES *)ctx->ctx_tweak)->enc,
                                nkey, key + nkey);
            aes_set_decrypt_key(&((QCryptoNettleAES *)ctx->ctx_tweak)->dec,
                                nkey, key + nkey);
        } else {
            aes_set_encrypt_key(&((QCryptoNettleAES *)ctx->ctx)->enc,
                                nkey, key);
            aes_set_decrypt_key(&((QCryptoNettleAES *)ctx->ctx)->dec,
                                nkey, key);
        }
284

285 286 287 288
        ctx->alg_encrypt_native = aes_encrypt_native;
        ctx->alg_decrypt_native = aes_decrypt_native;
        ctx->alg_encrypt_wrapper = aes_encrypt_wrapper;
        ctx->alg_decrypt_wrapper = aes_decrypt_wrapper;
289

290
        ctx->blocksize = AES_BLOCK_SIZE;
291
        break;
292 293

    case QCRYPTO_CIPHER_ALG_CAST5_128:
294
        ctx->ctx = g_new0(struct cast128_ctx, 1);
295

296 297 298 299 300 301 302 303 304
        if (mode == QCRYPTO_CIPHER_MODE_XTS) {
            ctx->ctx_tweak = g_new0(struct cast128_ctx, 1);

            nkey /= 2;
            cast5_set_key(ctx->ctx, nkey, key);
            cast5_set_key(ctx->ctx_tweak, nkey, key + nkey);
        } else {
            cast5_set_key(ctx->ctx, nkey, key);
        }
305

306 307 308 309
        ctx->alg_encrypt_native = cast128_encrypt_native;
        ctx->alg_decrypt_native = cast128_decrypt_native;
        ctx->alg_encrypt_wrapper = cast128_encrypt_wrapper;
        ctx->alg_decrypt_wrapper = cast128_decrypt_wrapper;
310 311 312

        ctx->blocksize = CAST128_BLOCK_SIZE;
        break;
313 314 315 316

    case QCRYPTO_CIPHER_ALG_SERPENT_128:
    case QCRYPTO_CIPHER_ALG_SERPENT_192:
    case QCRYPTO_CIPHER_ALG_SERPENT_256:
317
        ctx->ctx = g_new0(struct serpent_ctx, 1);
318

319 320 321 322 323 324 325 326 327
        if (mode == QCRYPTO_CIPHER_MODE_XTS) {
            ctx->ctx_tweak = g_new0(struct serpent_ctx, 1);

            nkey /= 2;
            serpent_set_key(ctx->ctx, nkey, key);
            serpent_set_key(ctx->ctx_tweak, nkey, key + nkey);
        } else {
            serpent_set_key(ctx->ctx, nkey, key);
        }
328

329 330 331 332
        ctx->alg_encrypt_native = serpent_encrypt_native;
        ctx->alg_decrypt_native = serpent_decrypt_native;
        ctx->alg_encrypt_wrapper = serpent_encrypt_wrapper;
        ctx->alg_decrypt_wrapper = serpent_decrypt_wrapper;
333 334 335 336

        ctx->blocksize = SERPENT_BLOCK_SIZE;
        break;

337 338 339
    case QCRYPTO_CIPHER_ALG_TWOFISH_128:
    case QCRYPTO_CIPHER_ALG_TWOFISH_192:
    case QCRYPTO_CIPHER_ALG_TWOFISH_256:
340
        ctx->ctx = g_new0(struct twofish_ctx, 1);
341

342 343 344 345 346 347 348 349 350
        if (mode == QCRYPTO_CIPHER_MODE_XTS) {
            ctx->ctx_tweak = g_new0(struct twofish_ctx, 1);

            nkey /= 2;
            twofish_set_key(ctx->ctx, nkey, key);
            twofish_set_key(ctx->ctx_tweak, nkey, key + nkey);
        } else {
            twofish_set_key(ctx->ctx, nkey, key);
        }
351

352 353 354 355
        ctx->alg_encrypt_native = twofish_encrypt_native;
        ctx->alg_decrypt_native = twofish_decrypt_native;
        ctx->alg_encrypt_wrapper = twofish_encrypt_wrapper;
        ctx->alg_decrypt_wrapper = twofish_decrypt_wrapper;
356 357 358 359

        ctx->blocksize = TWOFISH_BLOCK_SIZE;
        break;

360
    default:
361 362
        error_setg(errp, "Unsupported cipher algorithm %s",
                   QCryptoCipherAlgorithm_lookup[alg]);
363 364 365
        goto error;
    }

366 367 368 369 370 371 372
    if (mode == QCRYPTO_CIPHER_MODE_XTS &&
        ctx->blocksize != XTS_BLOCK_SIZE) {
        error_setg(errp, "Cipher block size %zu must equal XTS block size %d",
                   ctx->blocksize, XTS_BLOCK_SIZE);
        goto error;
    }

373
    ctx->iv = g_new0(uint8_t, ctx->blocksize);
374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394
    cipher->opaque = ctx;

    return cipher;

 error:
    g_free(cipher);
    g_free(ctx);
    return NULL;
}


void qcrypto_cipher_free(QCryptoCipher *cipher)
{
    QCryptoCipherNettle *ctx;

    if (!cipher) {
        return;
    }

    ctx = cipher->opaque;
    g_free(ctx->iv);
395
    g_free(ctx->ctx);
396
    g_free(ctx->ctx_tweak);
397 398 399 400 401 402 403 404 405 406 407 408 409
    g_free(ctx);
    g_free(cipher);
}


int qcrypto_cipher_encrypt(QCryptoCipher *cipher,
                           const void *in,
                           void *out,
                           size_t len,
                           Error **errp)
{
    QCryptoCipherNettle *ctx = cipher->opaque;

410 411 412 413 414 415
    if (len % ctx->blocksize) {
        error_setg(errp, "Length %zu must be a multiple of block size %zu",
                   len, ctx->blocksize);
        return -1;
    }

416 417
    switch (cipher->mode) {
    case QCRYPTO_CIPHER_MODE_ECB:
418
        ctx->alg_encrypt_wrapper(ctx->ctx, len, out, in);
419 420 421
        break;

    case QCRYPTO_CIPHER_MODE_CBC:
422
        cbc_encrypt(ctx->ctx, ctx->alg_encrypt_native,
423
                    ctx->blocksize, ctx->iv,
424 425
                    len, out, in);
        break;
426

427 428
    case QCRYPTO_CIPHER_MODE_XTS:
        xts_encrypt(ctx->ctx, ctx->ctx_tweak,
429
                    ctx->alg_encrypt_wrapper, ctx->alg_encrypt_wrapper,
430 431 432
                    ctx->iv, len, out, in);
        break;

433
    default:
434 435
        error_setg(errp, "Unsupported cipher mode %s",
                   QCryptoCipherMode_lookup[cipher->mode]);
436 437 438 439 440 441 442 443 444 445 446 447 448 449
        return -1;
    }
    return 0;
}


int qcrypto_cipher_decrypt(QCryptoCipher *cipher,
                           const void *in,
                           void *out,
                           size_t len,
                           Error **errp)
{
    QCryptoCipherNettle *ctx = cipher->opaque;

450 451 452 453 454 455
    if (len % ctx->blocksize) {
        error_setg(errp, "Length %zu must be a multiple of block size %zu",
                   len, ctx->blocksize);
        return -1;
    }

456 457
    switch (cipher->mode) {
    case QCRYPTO_CIPHER_MODE_ECB:
458
        ctx->alg_decrypt_wrapper(ctx->ctx, len, out, in);
459 460 461
        break;

    case QCRYPTO_CIPHER_MODE_CBC:
462
        cbc_decrypt(ctx->ctx, ctx->alg_decrypt_native,
463
                    ctx->blocksize, ctx->iv,
464 465
                    len, out, in);
        break;
466

467 468
    case QCRYPTO_CIPHER_MODE_XTS:
        xts_decrypt(ctx->ctx, ctx->ctx_tweak,
469
                    ctx->alg_encrypt_wrapper, ctx->alg_decrypt_wrapper,
470 471 472
                    ctx->iv, len, out, in);
        break;

473
    default:
474 475
        error_setg(errp, "Unsupported cipher mode %s",
                   QCryptoCipherMode_lookup[cipher->mode]);
476 477 478 479 480 481 482 483 484 485
        return -1;
    }
    return 0;
}

int qcrypto_cipher_setiv(QCryptoCipher *cipher,
                         const uint8_t *iv, size_t niv,
                         Error **errp)
{
    QCryptoCipherNettle *ctx = cipher->opaque;
486
    if (niv != ctx->blocksize) {
487
        error_setg(errp, "Expected IV size %zu not %zu",
488
                   ctx->blocksize, niv);
489 490 491 492 493
        return -1;
    }
    memcpy(ctx->iv, iv, niv);
    return 0;
}