hash-afalg.c 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214
  1. /*
  2. * QEMU Crypto af_alg-backend hash/hmac support
  3. *
  4. * Copyright (c) 2017 HUAWEI TECHNOLOGIES CO., LTD.
  5. *
  6. * Authors:
  7. * Longpeng(Mike) <longpeng2@huawei.com>
  8. *
  9. * This work is licensed under the terms of the GNU GPL, version 2 or
  10. * (at your option) any later version. See the COPYING file in the
  11. * top-level directory.
  12. */
  13. #include "qemu/osdep.h"
  14. #include "qemu/iov.h"
  15. #include "qemu/sockets.h"
  16. #include "qemu-common.h"
  17. #include "qapi/error.h"
  18. #include "crypto/hash.h"
  19. #include "crypto/hmac.h"
  20. #include "hashpriv.h"
  21. #include "hmacpriv.h"
  22. static char *
  23. qcrypto_afalg_hash_format_name(QCryptoHashAlgorithm alg,
  24. bool is_hmac,
  25. Error **errp)
  26. {
  27. char *name;
  28. const char *alg_name;
  29. switch (alg) {
  30. case QCRYPTO_HASH_ALG_MD5:
  31. alg_name = "md5";
  32. break;
  33. case QCRYPTO_HASH_ALG_SHA1:
  34. alg_name = "sha1";
  35. break;
  36. case QCRYPTO_HASH_ALG_SHA224:
  37. alg_name = "sha224";
  38. break;
  39. case QCRYPTO_HASH_ALG_SHA256:
  40. alg_name = "sha256";
  41. break;
  42. case QCRYPTO_HASH_ALG_SHA384:
  43. alg_name = "sha384";
  44. break;
  45. case QCRYPTO_HASH_ALG_SHA512:
  46. alg_name = "sha512";
  47. break;
  48. case QCRYPTO_HASH_ALG_RIPEMD160:
  49. alg_name = "rmd160";
  50. break;
  51. default:
  52. error_setg(errp, "Unsupported hash algorithm %d", alg);
  53. return NULL;
  54. }
  55. if (is_hmac) {
  56. name = g_strdup_printf("hmac(%s)", alg_name);
  57. } else {
  58. name = g_strdup_printf("%s", alg_name);
  59. }
  60. return name;
  61. }
  62. static QCryptoAFAlg *
  63. qcrypto_afalg_hash_hmac_ctx_new(QCryptoHashAlgorithm alg,
  64. const uint8_t *key, size_t nkey,
  65. bool is_hmac, Error **errp)
  66. {
  67. QCryptoAFAlg *afalg;
  68. char *name;
  69. name = qcrypto_afalg_hash_format_name(alg, is_hmac, errp);
  70. if (!name) {
  71. return NULL;
  72. }
  73. afalg = qcrypto_afalg_comm_alloc(AFALG_TYPE_HASH, name, errp);
  74. if (!afalg) {
  75. g_free(name);
  76. return NULL;
  77. }
  78. g_free(name);
  79. /* HMAC needs setkey */
  80. if (is_hmac) {
  81. if (qemu_setsockopt(afalg->tfmfd, SOL_ALG, ALG_SET_KEY,
  82. key, nkey) != 0) {
  83. error_setg_errno(errp, errno, "Set hmac key failed");
  84. qcrypto_afalg_comm_free(afalg);
  85. return NULL;
  86. }
  87. }
  88. return afalg;
  89. }
  90. static QCryptoAFAlg *
  91. qcrypto_afalg_hash_ctx_new(QCryptoHashAlgorithm alg,
  92. Error **errp)
  93. {
  94. return qcrypto_afalg_hash_hmac_ctx_new(alg, NULL, 0, false, errp);
  95. }
  96. QCryptoAFAlg *
  97. qcrypto_afalg_hmac_ctx_new(QCryptoHashAlgorithm alg,
  98. const uint8_t *key, size_t nkey,
  99. Error **errp)
  100. {
  101. return qcrypto_afalg_hash_hmac_ctx_new(alg, key, nkey, true, errp);
  102. }
  103. static int
  104. qcrypto_afalg_hash_hmac_bytesv(QCryptoAFAlg *hmac,
  105. QCryptoHashAlgorithm alg,
  106. const struct iovec *iov,
  107. size_t niov, uint8_t **result,
  108. size_t *resultlen,
  109. Error **errp)
  110. {
  111. QCryptoAFAlg *afalg;
  112. struct iovec outv;
  113. int ret = 0;
  114. bool is_hmac = (hmac != NULL) ? true : false;
  115. const int expect_len = qcrypto_hash_digest_len(alg);
  116. if (*resultlen == 0) {
  117. *resultlen = expect_len;
  118. *result = g_new0(uint8_t, *resultlen);
  119. } else if (*resultlen != expect_len) {
  120. error_setg(errp,
  121. "Result buffer size %zu is not match hash %d",
  122. *resultlen, expect_len);
  123. return -1;
  124. }
  125. if (is_hmac) {
  126. afalg = hmac;
  127. } else {
  128. afalg = qcrypto_afalg_hash_ctx_new(alg, errp);
  129. if (!afalg) {
  130. return -1;
  131. }
  132. }
  133. /* send data to kernel's crypto core */
  134. ret = iov_send_recv(afalg->opfd, iov, niov,
  135. 0, iov_size(iov, niov), true);
  136. if (ret < 0) {
  137. error_setg_errno(errp, errno, "Send data to afalg-core failed");
  138. goto out;
  139. }
  140. /* hash && get result */
  141. outv.iov_base = *result;
  142. outv.iov_len = *resultlen;
  143. ret = iov_send_recv(afalg->opfd, &outv, 1,
  144. 0, iov_size(&outv, 1), false);
  145. if (ret < 0) {
  146. error_setg_errno(errp, errno, "Recv result from afalg-core failed");
  147. } else {
  148. ret = 0;
  149. }
  150. out:
  151. if (!is_hmac) {
  152. qcrypto_afalg_comm_free(afalg);
  153. }
  154. return ret;
  155. }
  156. static int
  157. qcrypto_afalg_hash_bytesv(QCryptoHashAlgorithm alg,
  158. const struct iovec *iov,
  159. size_t niov, uint8_t **result,
  160. size_t *resultlen,
  161. Error **errp)
  162. {
  163. return qcrypto_afalg_hash_hmac_bytesv(NULL, alg, iov, niov, result,
  164. resultlen, errp);
  165. }
  166. static int
  167. qcrypto_afalg_hmac_bytesv(QCryptoHmac *hmac,
  168. const struct iovec *iov,
  169. size_t niov, uint8_t **result,
  170. size_t *resultlen,
  171. Error **errp)
  172. {
  173. return qcrypto_afalg_hash_hmac_bytesv(hmac->opaque, hmac->alg,
  174. iov, niov, result, resultlen,
  175. errp);
  176. }
  177. static void qcrypto_afalg_hmac_ctx_free(QCryptoHmac *hmac)
  178. {
  179. QCryptoAFAlg *afalg;
  180. afalg = hmac->opaque;
  181. qcrypto_afalg_comm_free(afalg);
  182. }
  183. QCryptoHashDriver qcrypto_hash_afalg_driver = {
  184. .hash_bytesv = qcrypto_afalg_hash_bytesv,
  185. };
  186. QCryptoHmacDriver qcrypto_hmac_afalg_driver = {
  187. .hmac_bytesv = qcrypto_afalg_hmac_bytesv,
  188. .hmac_free = qcrypto_afalg_hmac_ctx_free,
  189. };