]> git.proxmox.com Git - mirror_qemu.git/blame - crypto/cipher-nettle.c
crypto: fix building complaint
[mirror_qemu.git] / crypto / cipher-nettle.c
CommitLineData
ed754746
DB
1/*
2 * QEMU Crypto cipher nettle algorithms
3 *
4 * Copyright (c) 2015 Red Hat, Inc.
5 *
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2 of the License, or (at your option) any later version.
10 *
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
15 *
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, see <http://www.gnu.org/licenses/>.
18 *
19 */
20
42f7a448 21#include "qemu/osdep.h"
eaec903c
DB
22#include "crypto/xts.h"
23
ed754746
DB
24#include <nettle/nettle-types.h>
25#include <nettle/aes.h>
26#include <nettle/des.h>
27#include <nettle/cbc.h>
084a85ee 28#include <nettle/cast128.h>
94318522 29#include <nettle/serpent.h>
50f6753e 30#include <nettle/twofish.h>
ed754746 31
f7ac78cf
DB
32typedef void (*QCryptoCipherNettleFuncWrapper)(const void *ctx,
33 size_t length,
34 uint8_t *dst,
35 const uint8_t *src);
d3462e37 36
f7ac78cf
DB
37#if CONFIG_NETTLE_VERSION_MAJOR < 3
38typedef nettle_crypt_func * QCryptoCipherNettleFuncNative;
d3462e37
RK
39typedef void * cipher_ctx_t;
40typedef unsigned cipher_length_t;
621e6ae6
DB
41
42#define cast5_set_key cast128_set_key
d3462e37 43#else
f7ac78cf 44typedef nettle_cipher_func * QCryptoCipherNettleFuncNative;
d3462e37
RK
45typedef const void * cipher_ctx_t;
46typedef size_t cipher_length_t;
becaeb72
RK
47#endif
48
e3ba0b67
DB
49typedef struct QCryptoNettleAES {
50 struct aes_ctx enc;
51 struct aes_ctx dec;
52} QCryptoNettleAES;
53
f7ac78cf
DB
54static void aes_encrypt_native(cipher_ctx_t ctx, cipher_length_t length,
55 uint8_t *dst, const uint8_t *src)
56{
57 const QCryptoNettleAES *aesctx = ctx;
58 aes_encrypt(&aesctx->enc, length, dst, src);
59}
60
61static void aes_decrypt_native(cipher_ctx_t ctx, cipher_length_t length,
62 uint8_t *dst, const uint8_t *src)
63{
64 const QCryptoNettleAES *aesctx = ctx;
65 aes_decrypt(&aesctx->dec, length, dst, src);
66}
67
68static void des_encrypt_native(cipher_ctx_t ctx, cipher_length_t length,
69 uint8_t *dst, const uint8_t *src)
70{
71 des_encrypt(ctx, length, dst, src);
72}
73
74static void des_decrypt_native(cipher_ctx_t ctx, cipher_length_t length,
75 uint8_t *dst, const uint8_t *src)
76{
77 des_decrypt(ctx, length, dst, src);
78}
79
80static void cast128_encrypt_native(cipher_ctx_t ctx, cipher_length_t length,
81 uint8_t *dst, const uint8_t *src)
82{
83 cast128_encrypt(ctx, length, dst, src);
84}
85
86static void cast128_decrypt_native(cipher_ctx_t ctx, cipher_length_t length,
87 uint8_t *dst, const uint8_t *src)
88{
89 cast128_decrypt(ctx, length, dst, src);
90}
91
92static void serpent_encrypt_native(cipher_ctx_t ctx, cipher_length_t length,
93 uint8_t *dst, const uint8_t *src)
94{
95 serpent_encrypt(ctx, length, dst, src);
96}
97
98static void serpent_decrypt_native(cipher_ctx_t ctx, cipher_length_t length,
99 uint8_t *dst, const uint8_t *src)
100{
101 serpent_decrypt(ctx, length, dst, src);
102}
103
104static void twofish_encrypt_native(cipher_ctx_t ctx, cipher_length_t length,
105 uint8_t *dst, const uint8_t *src)
106{
107 twofish_encrypt(ctx, length, dst, src);
108}
109
110static void twofish_decrypt_native(cipher_ctx_t ctx, cipher_length_t length,
111 uint8_t *dst, const uint8_t *src)
112{
113 twofish_decrypt(ctx, length, dst, src);
114}
115
116static void aes_encrypt_wrapper(const void *ctx, size_t length,
d3462e37
RK
117 uint8_t *dst, const uint8_t *src)
118{
e3ba0b67
DB
119 const QCryptoNettleAES *aesctx = ctx;
120 aes_encrypt(&aesctx->enc, length, dst, src);
d3462e37
RK
121}
122
f7ac78cf 123static void aes_decrypt_wrapper(const void *ctx, size_t length,
d3462e37
RK
124 uint8_t *dst, const uint8_t *src)
125{
e3ba0b67
DB
126 const QCryptoNettleAES *aesctx = ctx;
127 aes_decrypt(&aesctx->dec, length, dst, src);
d3462e37
RK
128}
129
f7ac78cf 130static void des_encrypt_wrapper(const void *ctx, size_t length,
d3462e37
RK
131 uint8_t *dst, const uint8_t *src)
132{
133 des_encrypt(ctx, length, dst, src);
134}
135
f7ac78cf 136static void des_decrypt_wrapper(const void *ctx, size_t length,
d3462e37
RK
137 uint8_t *dst, const uint8_t *src)
138{
139 des_decrypt(ctx, length, dst, src);
140}
141
f7ac78cf 142static void cast128_encrypt_wrapper(const void *ctx, size_t length,
084a85ee
DB
143 uint8_t *dst, const uint8_t *src)
144{
145 cast128_encrypt(ctx, length, dst, src);
146}
147
f7ac78cf 148static void cast128_decrypt_wrapper(const void *ctx, size_t length,
084a85ee
DB
149 uint8_t *dst, const uint8_t *src)
150{
151 cast128_decrypt(ctx, length, dst, src);
152}
153
f7ac78cf 154static void serpent_encrypt_wrapper(const void *ctx, size_t length,
94318522
DB
155 uint8_t *dst, const uint8_t *src)
156{
157 serpent_encrypt(ctx, length, dst, src);
158}
159
f7ac78cf 160static void serpent_decrypt_wrapper(const void *ctx, size_t length,
94318522
DB
161 uint8_t *dst, const uint8_t *src)
162{
163 serpent_decrypt(ctx, length, dst, src);
164}
165
f7ac78cf 166static void twofish_encrypt_wrapper(const void *ctx, size_t length,
50f6753e
DB
167 uint8_t *dst, const uint8_t *src)
168{
169 twofish_encrypt(ctx, length, dst, src);
170}
171
f7ac78cf 172static void twofish_decrypt_wrapper(const void *ctx, size_t length,
50f6753e
DB
173 uint8_t *dst, const uint8_t *src)
174{
175 twofish_decrypt(ctx, length, dst, src);
176}
177
ed754746
DB
178typedef struct QCryptoCipherNettle QCryptoCipherNettle;
179struct QCryptoCipherNettle {
eaec903c 180 /* Primary cipher context for all modes */
e3ba0b67 181 void *ctx;
eaec903c
DB
182 /* Second cipher context for XTS mode only */
183 void *ctx_tweak;
184 /* Cipher callbacks for both contexts */
f7ac78cf
DB
185 QCryptoCipherNettleFuncNative alg_encrypt_native;
186 QCryptoCipherNettleFuncNative alg_decrypt_native;
187 QCryptoCipherNettleFuncWrapper alg_encrypt_wrapper;
188 QCryptoCipherNettleFuncWrapper alg_decrypt_wrapper;
eaec903c 189
ed754746 190 uint8_t *iv;
3a661f1e 191 size_t blocksize;
ed754746
DB
192};
193
194bool qcrypto_cipher_supports(QCryptoCipherAlgorithm alg)
195{
196 switch (alg) {
197 case QCRYPTO_CIPHER_ALG_DES_RFB:
198 case QCRYPTO_CIPHER_ALG_AES_128:
199 case QCRYPTO_CIPHER_ALG_AES_192:
200 case QCRYPTO_CIPHER_ALG_AES_256:
084a85ee 201 case QCRYPTO_CIPHER_ALG_CAST5_128:
94318522
DB
202 case QCRYPTO_CIPHER_ALG_SERPENT_128:
203 case QCRYPTO_CIPHER_ALG_SERPENT_192:
204 case QCRYPTO_CIPHER_ALG_SERPENT_256:
50f6753e
DB
205 case QCRYPTO_CIPHER_ALG_TWOFISH_128:
206 case QCRYPTO_CIPHER_ALG_TWOFISH_192:
207 case QCRYPTO_CIPHER_ALG_TWOFISH_256:
ed754746
DB
208 return true;
209 default:
210 return false;
211 }
212}
213
214
215QCryptoCipher *qcrypto_cipher_new(QCryptoCipherAlgorithm alg,
216 QCryptoCipherMode mode,
217 const uint8_t *key, size_t nkey,
218 Error **errp)
219{
220 QCryptoCipher *cipher;
221 QCryptoCipherNettle *ctx;
222 uint8_t *rfbkey;
223
224 switch (mode) {
225 case QCRYPTO_CIPHER_MODE_ECB:
226 case QCRYPTO_CIPHER_MODE_CBC:
eaec903c 227 case QCRYPTO_CIPHER_MODE_XTS:
ed754746
DB
228 break;
229 default:
230 error_setg(errp, "Unsupported cipher mode %d", mode);
231 return NULL;
232 }
233
eaec903c 234 if (!qcrypto_cipher_validate_key_length(alg, mode, nkey, errp)) {
ed754746
DB
235 return NULL;
236 }
237
238 cipher = g_new0(QCryptoCipher, 1);
239 cipher->alg = alg;
240 cipher->mode = mode;
241
242 ctx = g_new0(QCryptoCipherNettle, 1);
243
244 switch (alg) {
245 case QCRYPTO_CIPHER_ALG_DES_RFB:
e3ba0b67 246 ctx->ctx = g_new0(struct des_ctx, 1);
ed754746 247 rfbkey = qcrypto_cipher_munge_des_rfb_key(key, nkey);
e3ba0b67 248 des_set_key(ctx->ctx, rfbkey);
ed754746
DB
249 g_free(rfbkey);
250
f7ac78cf
DB
251 ctx->alg_encrypt_native = des_encrypt_native;
252 ctx->alg_decrypt_native = des_decrypt_native;
253 ctx->alg_encrypt_wrapper = des_encrypt_wrapper;
254 ctx->alg_decrypt_wrapper = des_decrypt_wrapper;
ed754746 255
3a661f1e 256 ctx->blocksize = DES_BLOCK_SIZE;
ed754746
DB
257 break;
258
259 case QCRYPTO_CIPHER_ALG_AES_128:
260 case QCRYPTO_CIPHER_ALG_AES_192:
261 case QCRYPTO_CIPHER_ALG_AES_256:
e3ba0b67 262 ctx->ctx = g_new0(QCryptoNettleAES, 1);
ed754746 263
eaec903c
DB
264 if (mode == QCRYPTO_CIPHER_MODE_XTS) {
265 ctx->ctx_tweak = g_new0(QCryptoNettleAES, 1);
266
267 nkey /= 2;
268 aes_set_encrypt_key(&((QCryptoNettleAES *)ctx->ctx)->enc,
269 nkey, key);
270 aes_set_decrypt_key(&((QCryptoNettleAES *)ctx->ctx)->dec,
271 nkey, key);
272
273 aes_set_encrypt_key(&((QCryptoNettleAES *)ctx->ctx_tweak)->enc,
274 nkey, key + nkey);
275 aes_set_decrypt_key(&((QCryptoNettleAES *)ctx->ctx_tweak)->dec,
276 nkey, key + nkey);
277 } else {
278 aes_set_encrypt_key(&((QCryptoNettleAES *)ctx->ctx)->enc,
279 nkey, key);
280 aes_set_decrypt_key(&((QCryptoNettleAES *)ctx->ctx)->dec,
281 nkey, key);
282 }
ed754746 283
f7ac78cf
DB
284 ctx->alg_encrypt_native = aes_encrypt_native;
285 ctx->alg_decrypt_native = aes_decrypt_native;
286 ctx->alg_encrypt_wrapper = aes_encrypt_wrapper;
287 ctx->alg_decrypt_wrapper = aes_decrypt_wrapper;
ed754746 288
3a661f1e 289 ctx->blocksize = AES_BLOCK_SIZE;
ed754746 290 break;
084a85ee
DB
291
292 case QCRYPTO_CIPHER_ALG_CAST5_128:
e3ba0b67 293 ctx->ctx = g_new0(struct cast128_ctx, 1);
084a85ee 294
eaec903c
DB
295 if (mode == QCRYPTO_CIPHER_MODE_XTS) {
296 ctx->ctx_tweak = g_new0(struct cast128_ctx, 1);
297
298 nkey /= 2;
299 cast5_set_key(ctx->ctx, nkey, key);
300 cast5_set_key(ctx->ctx_tweak, nkey, key + nkey);
301 } else {
302 cast5_set_key(ctx->ctx, nkey, key);
303 }
084a85ee 304
f7ac78cf
DB
305 ctx->alg_encrypt_native = cast128_encrypt_native;
306 ctx->alg_decrypt_native = cast128_decrypt_native;
307 ctx->alg_encrypt_wrapper = cast128_encrypt_wrapper;
308 ctx->alg_decrypt_wrapper = cast128_decrypt_wrapper;
084a85ee
DB
309
310 ctx->blocksize = CAST128_BLOCK_SIZE;
311 break;
94318522
DB
312
313 case QCRYPTO_CIPHER_ALG_SERPENT_128:
314 case QCRYPTO_CIPHER_ALG_SERPENT_192:
315 case QCRYPTO_CIPHER_ALG_SERPENT_256:
e3ba0b67 316 ctx->ctx = g_new0(struct serpent_ctx, 1);
94318522 317
eaec903c
DB
318 if (mode == QCRYPTO_CIPHER_MODE_XTS) {
319 ctx->ctx_tweak = g_new0(struct serpent_ctx, 1);
320
321 nkey /= 2;
322 serpent_set_key(ctx->ctx, nkey, key);
323 serpent_set_key(ctx->ctx_tweak, nkey, key + nkey);
324 } else {
325 serpent_set_key(ctx->ctx, nkey, key);
326 }
94318522 327
f7ac78cf
DB
328 ctx->alg_encrypt_native = serpent_encrypt_native;
329 ctx->alg_decrypt_native = serpent_decrypt_native;
330 ctx->alg_encrypt_wrapper = serpent_encrypt_wrapper;
331 ctx->alg_decrypt_wrapper = serpent_decrypt_wrapper;
94318522
DB
332
333 ctx->blocksize = SERPENT_BLOCK_SIZE;
334 break;
335
50f6753e
DB
336 case QCRYPTO_CIPHER_ALG_TWOFISH_128:
337 case QCRYPTO_CIPHER_ALG_TWOFISH_192:
338 case QCRYPTO_CIPHER_ALG_TWOFISH_256:
e3ba0b67 339 ctx->ctx = g_new0(struct twofish_ctx, 1);
50f6753e 340
eaec903c
DB
341 if (mode == QCRYPTO_CIPHER_MODE_XTS) {
342 ctx->ctx_tweak = g_new0(struct twofish_ctx, 1);
343
344 nkey /= 2;
345 twofish_set_key(ctx->ctx, nkey, key);
346 twofish_set_key(ctx->ctx_tweak, nkey, key + nkey);
347 } else {
348 twofish_set_key(ctx->ctx, nkey, key);
349 }
50f6753e 350
f7ac78cf
DB
351 ctx->alg_encrypt_native = twofish_encrypt_native;
352 ctx->alg_decrypt_native = twofish_decrypt_native;
353 ctx->alg_encrypt_wrapper = twofish_encrypt_wrapper;
354 ctx->alg_decrypt_wrapper = twofish_decrypt_wrapper;
50f6753e
DB
355
356 ctx->blocksize = TWOFISH_BLOCK_SIZE;
357 break;
358
ed754746
DB
359 default:
360 error_setg(errp, "Unsupported cipher algorithm %d", alg);
361 goto error;
362 }
363
a5d2f44d
DB
364 if (mode == QCRYPTO_CIPHER_MODE_XTS &&
365 ctx->blocksize != XTS_BLOCK_SIZE) {
366 error_setg(errp, "Cipher block size %zu must equal XTS block size %d",
367 ctx->blocksize, XTS_BLOCK_SIZE);
368 goto error;
369 }
370
3a661f1e 371 ctx->iv = g_new0(uint8_t, ctx->blocksize);
ed754746
DB
372 cipher->opaque = ctx;
373
374 return cipher;
375
376 error:
377 g_free(cipher);
378 g_free(ctx);
379 return NULL;
380}
381
382
383void qcrypto_cipher_free(QCryptoCipher *cipher)
384{
385 QCryptoCipherNettle *ctx;
386
387 if (!cipher) {
388 return;
389 }
390
391 ctx = cipher->opaque;
392 g_free(ctx->iv);
e3ba0b67 393 g_free(ctx->ctx);
eaec903c 394 g_free(ctx->ctx_tweak);
ed754746
DB
395 g_free(ctx);
396 g_free(cipher);
397}
398
399
400int qcrypto_cipher_encrypt(QCryptoCipher *cipher,
401 const void *in,
402 void *out,
403 size_t len,
404 Error **errp)
405{
406 QCryptoCipherNettle *ctx = cipher->opaque;
407
3a661f1e
DB
408 if (len % ctx->blocksize) {
409 error_setg(errp, "Length %zu must be a multiple of block size %zu",
410 len, ctx->blocksize);
411 return -1;
412 }
413
ed754746
DB
414 switch (cipher->mode) {
415 case QCRYPTO_CIPHER_MODE_ECB:
f7ac78cf 416 ctx->alg_encrypt_wrapper(ctx->ctx, len, out, in);
ed754746
DB
417 break;
418
419 case QCRYPTO_CIPHER_MODE_CBC:
f7ac78cf 420 cbc_encrypt(ctx->ctx, ctx->alg_encrypt_native,
3a661f1e 421 ctx->blocksize, ctx->iv,
ed754746
DB
422 len, out, in);
423 break;
e3ba0b67 424
eaec903c
DB
425 case QCRYPTO_CIPHER_MODE_XTS:
426 xts_encrypt(ctx->ctx, ctx->ctx_tweak,
f7ac78cf 427 ctx->alg_encrypt_wrapper, ctx->alg_encrypt_wrapper,
eaec903c
DB
428 ctx->iv, len, out, in);
429 break;
430
ed754746
DB
431 default:
432 error_setg(errp, "Unsupported cipher algorithm %d",
433 cipher->alg);
434 return -1;
435 }
436 return 0;
437}
438
439
440int qcrypto_cipher_decrypt(QCryptoCipher *cipher,
441 const void *in,
442 void *out,
443 size_t len,
444 Error **errp)
445{
446 QCryptoCipherNettle *ctx = cipher->opaque;
447
3a661f1e
DB
448 if (len % ctx->blocksize) {
449 error_setg(errp, "Length %zu must be a multiple of block size %zu",
450 len, ctx->blocksize);
451 return -1;
452 }
453
ed754746
DB
454 switch (cipher->mode) {
455 case QCRYPTO_CIPHER_MODE_ECB:
f7ac78cf 456 ctx->alg_decrypt_wrapper(ctx->ctx, len, out, in);
ed754746
DB
457 break;
458
459 case QCRYPTO_CIPHER_MODE_CBC:
f7ac78cf 460 cbc_decrypt(ctx->ctx, ctx->alg_decrypt_native,
e3ba0b67 461 ctx->blocksize, ctx->iv,
ed754746
DB
462 len, out, in);
463 break;
e3ba0b67 464
eaec903c 465 case QCRYPTO_CIPHER_MODE_XTS:
eaec903c 466 xts_decrypt(ctx->ctx, ctx->ctx_tweak,
f7ac78cf 467 ctx->alg_encrypt_wrapper, ctx->alg_decrypt_wrapper,
eaec903c
DB
468 ctx->iv, len, out, in);
469 break;
470
ed754746
DB
471 default:
472 error_setg(errp, "Unsupported cipher algorithm %d",
473 cipher->alg);
474 return -1;
475 }
476 return 0;
477}
478
479int qcrypto_cipher_setiv(QCryptoCipher *cipher,
480 const uint8_t *iv, size_t niv,
481 Error **errp)
482{
483 QCryptoCipherNettle *ctx = cipher->opaque;
3a661f1e 484 if (niv != ctx->blocksize) {
ed754746 485 error_setg(errp, "Expected IV size %zu not %zu",
3a661f1e 486 ctx->blocksize, niv);
ed754746
DB
487 return -1;
488 }
489 memcpy(ctx->iv, iv, niv);
490 return 0;
491}