123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642 |
- /*
- * QEMU Cryptodev backend for QEMU cipher APIs
- *
- * Copyright (c) 2022 Bytedance.Inc
- *
- * Authors:
- * lei he <helei.sig11@bytedance.com>
- *
- * This library is free software; you can redistribute it and/or
- * modify it under the terms of the GNU Lesser General Public
- * License as published by the Free Software Foundation; either
- * version 2.1 of the License, or (at your option) any later version.
- *
- * This library is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * Lesser General Public License for more details.
- *
- * You should have received a copy of the GNU Lesser General Public
- * License along with this library; if not, see <http://www.gnu.org/licenses/>.
- *
- */
- #include "qemu/osdep.h"
- #include "crypto/cipher.h"
- #include "crypto/akcipher.h"
- #include "qapi/error.h"
- #include "qemu/main-loop.h"
- #include "qemu/thread.h"
- #include "qemu/error-report.h"
- #include "qemu/queue.h"
- #include "qom/object.h"
- #include "sysemu/cryptodev.h"
- #include "standard-headers/linux/virtio_crypto.h"
- #include <keyutils.h>
- #include <sys/eventfd.h>
- /**
- * @TYPE_CRYPTODEV_BACKEND_LKCF:
- * name of backend that uses linux kernel crypto framework
- */
- #define TYPE_CRYPTODEV_BACKEND_LKCF "cryptodev-backend-lkcf"
- OBJECT_DECLARE_SIMPLE_TYPE(CryptoDevBackendLKCF, CRYPTODEV_BACKEND_LKCF)
- #define INVALID_KEY_ID -1
- #define MAX_SESSIONS 256
- #define NR_WORKER_THREAD 64
- #define KCTL_KEY_TYPE_PKEY "asymmetric"
- /**
- * Here the key is uploaded to the thread-keyring of worker thread, at least
- * util linux-6.0:
- * 1. process keyring seems to behave unexpectedly if main-thread does not
- * create the keyring before creating any other thread.
- * 2. at present, the guest kernel never perform multiple operations on a
- * session.
- * 3. it can reduce the load of the main-loop because the key passed by the
- * guest kernel has been already checked.
- */
- #define KCTL_KEY_RING KEY_SPEC_THREAD_KEYRING
- typedef struct CryptoDevBackendLKCFSession {
- uint8_t *key;
- size_t keylen;
- QCryptoAkCipherKeyType keytype;
- QCryptoAkCipherOptions akcipher_opts;
- } CryptoDevBackendLKCFSession;
- typedef struct CryptoDevBackendLKCF CryptoDevBackendLKCF;
- typedef struct CryptoDevLKCFTask CryptoDevLKCFTask;
- struct CryptoDevLKCFTask {
- CryptoDevBackendLKCFSession *sess;
- CryptoDevBackendOpInfo *op_info;
- CryptoDevCompletionFunc cb;
- void *opaque;
- int status;
- CryptoDevBackendLKCF *lkcf;
- QSIMPLEQ_ENTRY(CryptoDevLKCFTask) queue;
- };
- typedef struct CryptoDevBackendLKCF {
- CryptoDevBackend parent_obj;
- CryptoDevBackendLKCFSession *sess[MAX_SESSIONS];
- QSIMPLEQ_HEAD(, CryptoDevLKCFTask) requests;
- QSIMPLEQ_HEAD(, CryptoDevLKCFTask) responses;
- QemuMutex mutex;
- QemuCond cond;
- QemuMutex rsp_mutex;
- /**
- * There is no async interface for asymmetric keys like AF_ALG sockets,
- * we don't seem to have better way than create a lots of thread.
- */
- QemuThread worker_threads[NR_WORKER_THREAD];
- bool running;
- int eventfd;
- } CryptoDevBackendLKCF;
- static void *cryptodev_lkcf_worker(void *arg);
- static int cryptodev_lkcf_close_session(CryptoDevBackend *backend,
- uint64_t session_id,
- uint32_t queue_index,
- CryptoDevCompletionFunc cb,
- void *opaque);
- static void cryptodev_lkcf_handle_response(void *opaque)
- {
- CryptoDevBackendLKCF *lkcf = (CryptoDevBackendLKCF *)opaque;
- QSIMPLEQ_HEAD(, CryptoDevLKCFTask) responses;
- CryptoDevLKCFTask *task, *next;
- eventfd_t nevent;
- QSIMPLEQ_INIT(&responses);
- eventfd_read(lkcf->eventfd, &nevent);
- qemu_mutex_lock(&lkcf->rsp_mutex);
- QSIMPLEQ_PREPEND(&responses, &lkcf->responses);
- qemu_mutex_unlock(&lkcf->rsp_mutex);
- QSIMPLEQ_FOREACH_SAFE(task, &responses, queue, next) {
- if (task->cb) {
- task->cb(task->opaque, task->status);
- }
- g_free(task);
- }
- }
- static int cryptodev_lkcf_set_op_desc(QCryptoAkCipherOptions *opts,
- char *key_desc,
- size_t desc_len,
- Error **errp)
- {
- QCryptoAkCipherOptionsRSA *rsa_opt;
- if (opts->alg != QCRYPTO_AKCIPHER_ALG_RSA) {
- error_setg(errp, "Unsupported alg: %u", opts->alg);
- return -1;
- }
- rsa_opt = &opts->u.rsa;
- if (rsa_opt->padding_alg == QCRYPTO_RSA_PADDING_ALG_PKCS1) {
- snprintf(key_desc, desc_len, "enc=%s hash=%s",
- QCryptoRSAPaddingAlgorithm_str(rsa_opt->padding_alg),
- QCryptoHashAlgorithm_str(rsa_opt->hash_alg));
- } else {
- snprintf(key_desc, desc_len, "enc=%s",
- QCryptoRSAPaddingAlgorithm_str(rsa_opt->padding_alg));
- }
- return 0;
- }
- static int cryptodev_lkcf_set_rsa_opt(int virtio_padding_alg,
- int virtio_hash_alg,
- QCryptoAkCipherOptionsRSA *opt,
- Error **errp)
- {
- if (virtio_padding_alg == VIRTIO_CRYPTO_RSA_PKCS1_PADDING) {
- opt->padding_alg = QCRYPTO_RSA_PADDING_ALG_PKCS1;
- switch (virtio_hash_alg) {
- case VIRTIO_CRYPTO_RSA_MD5:
- opt->hash_alg = QCRYPTO_HASH_ALG_MD5;
- break;
- case VIRTIO_CRYPTO_RSA_SHA1:
- opt->hash_alg = QCRYPTO_HASH_ALG_SHA1;
- break;
- case VIRTIO_CRYPTO_RSA_SHA256:
- opt->hash_alg = QCRYPTO_HASH_ALG_SHA256;
- break;
- case VIRTIO_CRYPTO_RSA_SHA512:
- opt->hash_alg = QCRYPTO_HASH_ALG_SHA512;
- break;
- default:
- error_setg(errp, "Unsupported rsa hash algo: %d", virtio_hash_alg);
- return -1;
- }
- return 0;
- }
- if (virtio_padding_alg == VIRTIO_CRYPTO_RSA_RAW_PADDING) {
- opt->padding_alg = QCRYPTO_RSA_PADDING_ALG_RAW;
- return 0;
- }
- error_setg(errp, "Unsupported rsa padding algo: %u", virtio_padding_alg);
- return -1;
- }
- static int cryptodev_lkcf_get_unused_session_index(CryptoDevBackendLKCF *lkcf)
- {
- size_t i;
- for (i = 0; i < MAX_SESSIONS; i++) {
- if (lkcf->sess[i] == NULL) {
- return i;
- }
- }
- return -1;
- }
- static void cryptodev_lkcf_init(CryptoDevBackend *backend, Error **errp)
- {
- /* Only support one queue */
- int queues = backend->conf.peers.queues, i;
- CryptoDevBackendClient *cc;
- CryptoDevBackendLKCF *lkcf =
- CRYPTODEV_BACKEND_LKCF(backend);
- if (queues != 1) {
- error_setg(errp,
- "Only support one queue in cryptodev-builtin backend");
- return;
- }
- lkcf->eventfd = eventfd(0, 0);
- if (lkcf->eventfd < 0) {
- error_setg(errp, "Failed to create eventfd: %d", errno);
- return;
- }
- cc = cryptodev_backend_new_client();
- cc->info_str = g_strdup_printf("cryptodev-lkcf0");
- cc->queue_index = 0;
- cc->type = QCRYPTODEV_BACKEND_TYPE_LKCF;
- backend->conf.peers.ccs[0] = cc;
- backend->conf.crypto_services =
- 1u << QCRYPTODEV_BACKEND_SERVICE_AKCIPHER;
- backend->conf.akcipher_algo = 1u << VIRTIO_CRYPTO_AKCIPHER_RSA;
- lkcf->running = true;
- QSIMPLEQ_INIT(&lkcf->requests);
- QSIMPLEQ_INIT(&lkcf->responses);
- qemu_mutex_init(&lkcf->mutex);
- qemu_mutex_init(&lkcf->rsp_mutex);
- qemu_cond_init(&lkcf->cond);
- for (i = 0; i < NR_WORKER_THREAD; i++) {
- qemu_thread_create(&lkcf->worker_threads[i], "lkcf-worker",
- cryptodev_lkcf_worker, lkcf, 0);
- }
- qemu_set_fd_handler(
- lkcf->eventfd, cryptodev_lkcf_handle_response, NULL, lkcf);
- cryptodev_backend_set_ready(backend, true);
- }
- static void cryptodev_lkcf_cleanup(CryptoDevBackend *backend, Error **errp)
- {
- CryptoDevBackendLKCF *lkcf = CRYPTODEV_BACKEND_LKCF(backend);
- size_t i;
- int queues = backend->conf.peers.queues;
- CryptoDevBackendClient *cc;
- CryptoDevLKCFTask *task, *next;
- qemu_mutex_lock(&lkcf->mutex);
- lkcf->running = false;
- qemu_mutex_unlock(&lkcf->mutex);
- qemu_cond_broadcast(&lkcf->cond);
- close(lkcf->eventfd);
- for (i = 0; i < NR_WORKER_THREAD; i++) {
- qemu_thread_join(&lkcf->worker_threads[i]);
- }
- QSIMPLEQ_FOREACH_SAFE(task, &lkcf->requests, queue, next) {
- if (task->cb) {
- task->cb(task->opaque, task->status);
- }
- g_free(task);
- }
- QSIMPLEQ_FOREACH_SAFE(task, &lkcf->responses, queue, next) {
- if (task->cb) {
- task->cb(task->opaque, task->status);
- }
- g_free(task);
- }
- qemu_mutex_destroy(&lkcf->mutex);
- qemu_cond_destroy(&lkcf->cond);
- qemu_mutex_destroy(&lkcf->rsp_mutex);
- for (i = 0; i < MAX_SESSIONS; i++) {
- if (lkcf->sess[i] != NULL) {
- cryptodev_lkcf_close_session(backend, i, 0, NULL, NULL);
- }
- }
- for (i = 0; i < queues; i++) {
- cc = backend->conf.peers.ccs[i];
- if (cc) {
- cryptodev_backend_free_client(cc);
- backend->conf.peers.ccs[i] = NULL;
- }
- }
- cryptodev_backend_set_ready(backend, false);
- }
- static void cryptodev_lkcf_execute_task(CryptoDevLKCFTask *task)
- {
- CryptoDevBackendLKCFSession *session = task->sess;
- CryptoDevBackendAsymOpInfo *asym_op_info;
- bool kick = false;
- int ret, status, op_code = task->op_info->op_code;
- size_t p8info_len;
- g_autofree uint8_t *p8info = NULL;
- Error *local_error = NULL;
- key_serial_t key_id = INVALID_KEY_ID;
- char op_desc[64];
- g_autoptr(QCryptoAkCipher) akcipher = NULL;
- /**
- * We only offload private key session:
- * 1. currently, the Linux kernel can only accept public key wrapped
- * with X.509 certificates, but unfortunately the cost of making a
- * ceritificate with public key is too expensive.
- * 2. generally, public key related compution is fast, just compute it with
- * thread-pool.
- */
- if (session->keytype == QCRYPTO_AKCIPHER_KEY_TYPE_PRIVATE) {
- if (qcrypto_akcipher_export_p8info(&session->akcipher_opts,
- session->key, session->keylen,
- &p8info, &p8info_len,
- &local_error) != 0 ||
- cryptodev_lkcf_set_op_desc(&session->akcipher_opts, op_desc,
- sizeof(op_desc), &local_error) != 0) {
- error_report_err(local_error);
- } else {
- key_id = add_key(KCTL_KEY_TYPE_PKEY, "lkcf-backend-priv-key",
- p8info, p8info_len, KCTL_KEY_RING);
- }
- }
- if (key_id < 0) {
- if (!qcrypto_akcipher_supports(&session->akcipher_opts)) {
- status = -VIRTIO_CRYPTO_NOTSUPP;
- goto out;
- }
- akcipher = qcrypto_akcipher_new(&session->akcipher_opts,
- session->keytype,
- session->key, session->keylen,
- &local_error);
- if (!akcipher) {
- status = -VIRTIO_CRYPTO_ERR;
- goto out;
- }
- }
- asym_op_info = task->op_info->u.asym_op_info;
- switch (op_code) {
- case VIRTIO_CRYPTO_AKCIPHER_ENCRYPT:
- if (key_id >= 0) {
- ret = keyctl_pkey_encrypt(key_id, op_desc,
- asym_op_info->src, asym_op_info->src_len,
- asym_op_info->dst, asym_op_info->dst_len);
- } else {
- ret = qcrypto_akcipher_encrypt(akcipher,
- asym_op_info->src, asym_op_info->src_len,
- asym_op_info->dst, asym_op_info->dst_len, &local_error);
- }
- break;
- case VIRTIO_CRYPTO_AKCIPHER_DECRYPT:
- if (key_id >= 0) {
- ret = keyctl_pkey_decrypt(key_id, op_desc,
- asym_op_info->src, asym_op_info->src_len,
- asym_op_info->dst, asym_op_info->dst_len);
- } else {
- ret = qcrypto_akcipher_decrypt(akcipher,
- asym_op_info->src, asym_op_info->src_len,
- asym_op_info->dst, asym_op_info->dst_len, &local_error);
- }
- break;
- case VIRTIO_CRYPTO_AKCIPHER_SIGN:
- if (key_id >= 0) {
- ret = keyctl_pkey_sign(key_id, op_desc,
- asym_op_info->src, asym_op_info->src_len,
- asym_op_info->dst, asym_op_info->dst_len);
- } else {
- ret = qcrypto_akcipher_sign(akcipher,
- asym_op_info->src, asym_op_info->src_len,
- asym_op_info->dst, asym_op_info->dst_len, &local_error);
- }
- break;
- case VIRTIO_CRYPTO_AKCIPHER_VERIFY:
- if (key_id >= 0) {
- ret = keyctl_pkey_verify(key_id, op_desc,
- asym_op_info->src, asym_op_info->src_len,
- asym_op_info->dst, asym_op_info->dst_len);
- } else {
- ret = qcrypto_akcipher_verify(akcipher,
- asym_op_info->src, asym_op_info->src_len,
- asym_op_info->dst, asym_op_info->dst_len, &local_error);
- }
- break;
- default:
- error_setg(&local_error, "Unknown opcode: %u", op_code);
- status = -VIRTIO_CRYPTO_ERR;
- goto out;
- }
- if (ret < 0) {
- if (!local_error) {
- if (errno != EKEYREJECTED) {
- error_report("Failed do operation with keyctl: %d", errno);
- }
- } else {
- error_report_err(local_error);
- }
- status = op_code == VIRTIO_CRYPTO_AKCIPHER_VERIFY ?
- -VIRTIO_CRYPTO_KEY_REJECTED : -VIRTIO_CRYPTO_ERR;
- } else {
- status = VIRTIO_CRYPTO_OK;
- asym_op_info->dst_len = ret;
- }
- out:
- if (key_id >= 0) {
- keyctl_unlink(key_id, KCTL_KEY_RING);
- }
- task->status = status;
- qemu_mutex_lock(&task->lkcf->rsp_mutex);
- if (QSIMPLEQ_EMPTY(&task->lkcf->responses)) {
- kick = true;
- }
- QSIMPLEQ_INSERT_TAIL(&task->lkcf->responses, task, queue);
- qemu_mutex_unlock(&task->lkcf->rsp_mutex);
- if (kick) {
- eventfd_write(task->lkcf->eventfd, 1);
- }
- }
- static void *cryptodev_lkcf_worker(void *arg)
- {
- CryptoDevBackendLKCF *backend = (CryptoDevBackendLKCF *)arg;
- CryptoDevLKCFTask *task;
- for (;;) {
- task = NULL;
- qemu_mutex_lock(&backend->mutex);
- while (backend->running && QSIMPLEQ_EMPTY(&backend->requests)) {
- qemu_cond_wait(&backend->cond, &backend->mutex);
- }
- if (backend->running) {
- task = QSIMPLEQ_FIRST(&backend->requests);
- QSIMPLEQ_REMOVE_HEAD(&backend->requests, queue);
- }
- qemu_mutex_unlock(&backend->mutex);
- /* stopped */
- if (!task) {
- break;
- }
- cryptodev_lkcf_execute_task(task);
- }
- return NULL;
- }
- static int cryptodev_lkcf_operation(
- CryptoDevBackend *backend,
- CryptoDevBackendOpInfo *op_info)
- {
- CryptoDevBackendLKCF *lkcf =
- CRYPTODEV_BACKEND_LKCF(backend);
- CryptoDevBackendLKCFSession *sess;
- QCryptodevBackendAlgType algtype = op_info->algtype;
- CryptoDevLKCFTask *task;
- if (op_info->session_id >= MAX_SESSIONS ||
- lkcf->sess[op_info->session_id] == NULL) {
- error_report("Cannot find a valid session id: %" PRIu64 "",
- op_info->session_id);
- return -VIRTIO_CRYPTO_INVSESS;
- }
- sess = lkcf->sess[op_info->session_id];
- if (algtype != QCRYPTODEV_BACKEND_ALG_ASYM) {
- error_report("algtype not supported: %u", algtype);
- return -VIRTIO_CRYPTO_NOTSUPP;
- }
- task = g_new0(CryptoDevLKCFTask, 1);
- task->op_info = op_info;
- task->cb = op_info->cb;
- task->opaque = op_info->opaque;
- task->sess = sess;
- task->lkcf = lkcf;
- task->status = -VIRTIO_CRYPTO_ERR;
- qemu_mutex_lock(&lkcf->mutex);
- QSIMPLEQ_INSERT_TAIL(&lkcf->requests, task, queue);
- qemu_mutex_unlock(&lkcf->mutex);
- qemu_cond_signal(&lkcf->cond);
- return VIRTIO_CRYPTO_OK;
- }
- static int cryptodev_lkcf_create_asym_session(
- CryptoDevBackendLKCF *lkcf,
- CryptoDevBackendAsymSessionInfo *sess_info,
- uint64_t *session_id)
- {
- Error *local_error = NULL;
- int index;
- g_autofree CryptoDevBackendLKCFSession *sess =
- g_new0(CryptoDevBackendLKCFSession, 1);
- switch (sess_info->algo) {
- case VIRTIO_CRYPTO_AKCIPHER_RSA:
- sess->akcipher_opts.alg = QCRYPTO_AKCIPHER_ALG_RSA;
- if (cryptodev_lkcf_set_rsa_opt(
- sess_info->u.rsa.padding_algo, sess_info->u.rsa.hash_algo,
- &sess->akcipher_opts.u.rsa, &local_error) != 0) {
- error_report_err(local_error);
- return -VIRTIO_CRYPTO_ERR;
- }
- break;
- default:
- error_report("Unsupported asym alg %u", sess_info->algo);
- return -VIRTIO_CRYPTO_NOTSUPP;
- }
- switch (sess_info->keytype) {
- case VIRTIO_CRYPTO_AKCIPHER_KEY_TYPE_PUBLIC:
- sess->keytype = QCRYPTO_AKCIPHER_KEY_TYPE_PUBLIC;
- break;
- case VIRTIO_CRYPTO_AKCIPHER_KEY_TYPE_PRIVATE:
- sess->keytype = QCRYPTO_AKCIPHER_KEY_TYPE_PRIVATE;
- break;
- default:
- error_report("Unknown akcipher keytype: %u", sess_info->keytype);
- return -VIRTIO_CRYPTO_ERR;
- }
- index = cryptodev_lkcf_get_unused_session_index(lkcf);
- if (index < 0) {
- error_report("Total number of sessions created exceeds %u",
- MAX_SESSIONS);
- return -VIRTIO_CRYPTO_ERR;
- }
- sess->keylen = sess_info->keylen;
- sess->key = g_malloc(sess_info->keylen);
- memcpy(sess->key, sess_info->key, sess_info->keylen);
- lkcf->sess[index] = g_steal_pointer(&sess);
- *session_id = index;
- return VIRTIO_CRYPTO_OK;
- }
- static int cryptodev_lkcf_create_session(
- CryptoDevBackend *backend,
- CryptoDevBackendSessionInfo *sess_info,
- uint32_t queue_index,
- CryptoDevCompletionFunc cb,
- void *opaque)
- {
- CryptoDevBackendAsymSessionInfo *asym_sess_info;
- CryptoDevBackendLKCF *lkcf =
- CRYPTODEV_BACKEND_LKCF(backend);
- int ret;
- switch (sess_info->op_code) {
- case VIRTIO_CRYPTO_AKCIPHER_CREATE_SESSION:
- asym_sess_info = &sess_info->u.asym_sess_info;
- ret = cryptodev_lkcf_create_asym_session(
- lkcf, asym_sess_info, &sess_info->session_id);
- break;
- default:
- ret = -VIRTIO_CRYPTO_NOTSUPP;
- error_report("Unsupported opcode: %" PRIu32 "",
- sess_info->op_code);
- break;
- }
- if (cb) {
- cb(opaque, ret);
- }
- return 0;
- }
- static int cryptodev_lkcf_close_session(CryptoDevBackend *backend,
- uint64_t session_id,
- uint32_t queue_index,
- CryptoDevCompletionFunc cb,
- void *opaque)
- {
- CryptoDevBackendLKCF *lkcf = CRYPTODEV_BACKEND_LKCF(backend);
- CryptoDevBackendLKCFSession *session;
- assert(session_id < MAX_SESSIONS && lkcf->sess[session_id]);
- session = lkcf->sess[session_id];
- lkcf->sess[session_id] = NULL;
- g_free(session->key);
- g_free(session);
- if (cb) {
- cb(opaque, VIRTIO_CRYPTO_OK);
- }
- return 0;
- }
- static void cryptodev_lkcf_class_init(ObjectClass *oc, void *data)
- {
- CryptoDevBackendClass *bc = CRYPTODEV_BACKEND_CLASS(oc);
- bc->init = cryptodev_lkcf_init;
- bc->cleanup = cryptodev_lkcf_cleanup;
- bc->create_session = cryptodev_lkcf_create_session;
- bc->close_session = cryptodev_lkcf_close_session;
- bc->do_op = cryptodev_lkcf_operation;
- }
- static const TypeInfo cryptodev_builtin_info = {
- .name = TYPE_CRYPTODEV_BACKEND_LKCF,
- .parent = TYPE_CRYPTODEV_BACKEND,
- .class_init = cryptodev_lkcf_class_init,
- .instance_size = sizeof(CryptoDevBackendLKCF),
- };
- static void cryptodev_lkcf_register_types(void)
- {
- type_register_static(&cryptodev_builtin_info);
- }
- type_init(cryptodev_lkcf_register_types);
|