
* Update to QEMU v9.0.0 --------- Signed-off-by: Peter Maydell <peter.maydell@linaro.org> Signed-off-by: Fabiano Rosas <farosas@suse.de> Signed-off-by: Peter Xu <peterx@redhat.com> Signed-off-by: Thomas Huth <thuth@redhat.com> Signed-off-by: Cédric Le Goater <clg@redhat.com> Signed-off-by: Zheyu Ma <zheyuma97@gmail.com> Signed-off-by: Ido Plat <ido.plat@ibm.com> Signed-off-by: Ilya Leoshkevich <iii@linux.ibm.com> Signed-off-by: Markus Armbruster <armbru@redhat.com> Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com> Signed-off-by: Vladimir Sementsov-Ogievskiy <vsementsov@yandex-team.ru> Signed-off-by: David Hildenbrand <david@redhat.com> Signed-off-by: Kevin Wolf <kwolf@redhat.com> Signed-off-by: Thomas Lamprecht <t.lamprecht@proxmox.com> Signed-off-by: Fiona Ebner <f.ebner@proxmox.com> Signed-off-by: Gregory Price <gregory.price@memverge.com> Signed-off-by: Jonathan Cameron <Jonathan.Cameron@huawei.com> Signed-off-by: Philippe Mathieu-Daudé <philmd@linaro.org> Signed-off-by: Lorenz Brun <lorenz@brun.one> Signed-off-by: Yao Xingtao <yaoxt.fnst@fujitsu.com> Signed-off-by: Arnaud Minier <arnaud.minier@telecom-paris.fr> Signed-off-by: Inès Varhol <ines.varhol@telecom-paris.fr> Signed-off-by: BALATON Zoltan <balaton@eik.bme.hu> Signed-off-by: Igor Mammedov <imammedo@redhat.com> Signed-off-by: Akihiko Odaki <akihiko.odaki@daynix.com> Signed-off-by: Richard Henderson <richard.henderson@linaro.org> Signed-off-by: Sven Schnelle <svens@stackframe.org> Signed-off-by: Daniel Henrique Barboza <dbarboza@ventanamicro.com> Signed-off-by: Christian Schoenebeck <qemu_oss@crudebyte.com> Signed-off-by: Jason Wang <jasowang@redhat.com> Signed-off-by: Helge Deller <deller@gmx.de> Signed-off-by: Nicholas Piggin <npiggin@gmail.com> Signed-off-by: Benjamin Gray <bgray@linux.ibm.com> Signed-off-by: Avihai Horon <avihaih@nvidia.com> Signed-off-by: Michael Tokarev <mjt@tls.msk.ru> Signed-off-by: Joonas Kankaala <joonas.a.kankaala@gmail.com> Signed-off-by: Marcin Juszkiewicz <marcin.juszkiewicz@linaro.org> Signed-off-by: Stefan Weil <sw@weilnetz.de> Signed-off-by: Zhao Liu <zhao1.liu@intel.com> Signed-off-by: Glenn Miles <milesg@linux.ibm.com> Signed-off-by: Oleg Sviridov <oleg.sviridov@red-soft.ru> Signed-off-by: Artem Chernyshev <artem.chernyshev@red-soft.ru> Signed-off-by: Yajun Wu <yajunw@nvidia.com> Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com> Signed-off-by: Mark Cave-Ayland <mark.cave-ayland@ilande.co.uk> Signed-off-by: Pierre-Clément Tosi <ptosi@google.com> Signed-off-by: Lei Wang <lei4.wang@intel.com> Signed-off-by: Wei Wang <wei.w.wang@intel.com> Signed-off-by: Martin Hundebøll <martin@geanix.com> Signed-off-by: Michael S. Tsirkin <mst@redhat.com> Signed-off-by: Manos Pitsidianakis <manos.pitsidianakis@linaro.org> Signed-off-by: Wafer <wafer@jaguarmicro.com> Signed-off-by: Yuxue Liu <yuxue.liu@jaguarmicro.com> Signed-off-by: Gerd Hoffmann <kraxel@redhat.com> Signed-off-by: Nguyen Dinh Phi <phind.uet@gmail.com> Signed-off-by: Zack Buhman <zack@buhman.org> Signed-off-by: Keith Packard <keithp@keithp.com> Signed-off-by: Yuquan Wang wangyuquan1236@phytium.com.cn Signed-off-by: Matheus Tavares Bernardino <quic_mathbern@quicinc.com> Signed-off-by: Cindy Lu <lulu@redhat.com> Co-authored-by: Peter Maydell <peter.maydell@linaro.org> Co-authored-by: Fabiano Rosas <farosas@suse.de> Co-authored-by: Peter Xu <peterx@redhat.com> Co-authored-by: Thomas Huth <thuth@redhat.com> Co-authored-by: Cédric Le Goater <clg@redhat.com> Co-authored-by: Zheyu Ma <zheyuma97@gmail.com> Co-authored-by: Ido Plat <ido.plat@ibm.com> Co-authored-by: Ilya Leoshkevich <iii@linux.ibm.com> Co-authored-by: Markus Armbruster <armbru@redhat.com> Co-authored-by: Marc-André Lureau <marcandre.lureau@redhat.com> Co-authored-by: Paolo Bonzini <pbonzini@redhat.com> Co-authored-by: Vladimir Sementsov-Ogievskiy <vsementsov@yandex-team.ru> Co-authored-by: David Hildenbrand <david@redhat.com> Co-authored-by: Kevin Wolf <kwolf@redhat.com> Co-authored-by: Stefan Reiter <s.reiter@proxmox.com> Co-authored-by: Fiona Ebner <f.ebner@proxmox.com> Co-authored-by: Gregory Price <gregory.price@memverge.com> Co-authored-by: Lorenz Brun <lorenz@brun.one> Co-authored-by: Yao Xingtao <yaoxt.fnst@fujitsu.com> Co-authored-by: Philippe Mathieu-Daudé <philmd@linaro.org> Co-authored-by: Arnaud Minier <arnaud.minier@telecom-paris.fr> Co-authored-by: BALATON Zoltan <balaton@eik.bme.hu> Co-authored-by: Igor Mammedov <imammedo@redhat.com> Co-authored-by: Akihiko Odaki <akihiko.odaki@daynix.com> Co-authored-by: Richard Henderson <richard.henderson@linaro.org> Co-authored-by: Sven Schnelle <svens@stackframe.org> Co-authored-by: Daniel Henrique Barboza <dbarboza@ventanamicro.com> Co-authored-by: Helge Deller <deller@kernel.org> Co-authored-by: Harsh Prateek Bora <harshpb@linux.ibm.com> Co-authored-by: Benjamin Gray <bgray@linux.ibm.com> Co-authored-by: Nicholas Piggin <npiggin@gmail.com> Co-authored-by: Avihai Horon <avihaih@nvidia.com> Co-authored-by: Michael Tokarev <mjt@tls.msk.ru> Co-authored-by: Joonas Kankaala <joonas.a.kankaala@gmail.com> Co-authored-by: Marcin Juszkiewicz <marcin.juszkiewicz@linaro.org> Co-authored-by: Stefan Weil <sw@weilnetz.de> Co-authored-by: Dayu Liu <liu.dayu@zte.com.cn> Co-authored-by: Zhao Liu <zhao1.liu@intel.com> Co-authored-by: Glenn Miles <milesg@linux.vnet.ibm.com> Co-authored-by: Artem Chernyshev <artem.chernyshev@red-soft.ru> Co-authored-by: Yajun Wu <yajunw@nvidia.com> Co-authored-by: Mark Cave-Ayland <mark.cave-ayland@ilande.co.uk> Co-authored-by: Pierre-Clément Tosi <ptosi@google.com> Co-authored-by: Wei Wang <wei.w.wang@intel.com> Co-authored-by: Martin Hundebøll <martin@geanix.com> Co-authored-by: Michael S. Tsirkin <mst@redhat.com> Co-authored-by: Manos Pitsidianakis <manos.pitsidianakis@linaro.org> Co-authored-by: Wafer <wafer@jaguarmicro.com> Co-authored-by: lyx634449800 <yuxue.liu@jaguarmicro.com> Co-authored-by: Gerd Hoffmann <kraxel@redhat.com> Co-authored-by: Nguyen Dinh Phi <phind.uet@gmail.com> Co-authored-by: Zack Buhman <zack@buhman.org> Co-authored-by: Keith Packard <keithp@keithp.com> Co-authored-by: Yuquan Wang <wangyuquan1236@phytium.com.cn> Co-authored-by: Matheus Tavares Bernardino <quic_mathbern@quicinc.com> Co-authored-by: Cindy Lu <lulu@redhat.com>
332 lines
11 KiB
C
332 lines
11 KiB
C
/*
|
|
* QEMU Crypto block device encryption
|
|
*
|
|
* Copyright (c) 2015-2016 Red Hat, Inc.
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, see <http://www.gnu.org/licenses/>.
|
|
*
|
|
*/
|
|
|
|
#ifndef QCRYPTO_BLOCK_H
|
|
#define QCRYPTO_BLOCK_H
|
|
|
|
#include "crypto/cipher.h"
|
|
#include "crypto/ivgen.h"
|
|
|
|
typedef struct QCryptoBlock QCryptoBlock;
|
|
|
|
/* See also QCryptoBlockFormat, QCryptoBlockCreateOptions
|
|
* and QCryptoBlockOpenOptions in qapi/crypto.json */
|
|
|
|
typedef int (*QCryptoBlockReadFunc)(QCryptoBlock *block,
|
|
size_t offset,
|
|
uint8_t *buf,
|
|
size_t buflen,
|
|
void *opaque,
|
|
Error **errp);
|
|
|
|
typedef int (*QCryptoBlockInitFunc)(QCryptoBlock *block,
|
|
size_t headerlen,
|
|
void *opaque,
|
|
Error **errp);
|
|
|
|
typedef int (*QCryptoBlockWriteFunc)(QCryptoBlock *block,
|
|
size_t offset,
|
|
const uint8_t *buf,
|
|
size_t buflen,
|
|
void *opaque,
|
|
Error **errp);
|
|
|
|
/**
|
|
* qcrypto_block_has_format:
|
|
* @format: the encryption format
|
|
* @buf: the data from head of the volume
|
|
* @len: the length of @buf in bytes
|
|
*
|
|
* Given @len bytes of data from the head of a storage volume
|
|
* in @buf, probe to determine if the volume has the encryption
|
|
* format specified in @format.
|
|
*
|
|
* Returns: true if the data in @buf matches @format
|
|
*/
|
|
bool qcrypto_block_has_format(QCryptoBlockFormat format,
|
|
const uint8_t *buf,
|
|
size_t buflen);
|
|
|
|
typedef enum {
|
|
QCRYPTO_BLOCK_OPEN_NO_IO = (1 << 0),
|
|
QCRYPTO_BLOCK_OPEN_DETACHED = (1 << 1),
|
|
} QCryptoBlockOpenFlags;
|
|
|
|
/**
|
|
* qcrypto_block_open:
|
|
* @options: the encryption options
|
|
* @optprefix: name prefix for options
|
|
* @readfunc: callback for reading data from the volume
|
|
* @opaque: data to pass to @readfunc
|
|
* @flags: bitmask of QCryptoBlockOpenFlags values
|
|
* @n_threads: allow concurrent I/O from up to @n_threads threads
|
|
* @errp: pointer to a NULL-initialized error object
|
|
*
|
|
* Create a new block encryption object for an existing
|
|
* storage volume encrypted with format identified by
|
|
* the parameters in @options.
|
|
*
|
|
* This will use @readfunc to initialize the encryption
|
|
* context based on the volume header(s), extracting the
|
|
* master key(s) as required.
|
|
*
|
|
* If @flags contains QCRYPTO_BLOCK_OPEN_NO_IO then
|
|
* the open process will be optimized to skip any parts
|
|
* that are only required to perform I/O. In particular
|
|
* this would usually avoid the need to decrypt any
|
|
* master keys. The only thing that can be done with
|
|
* the resulting QCryptoBlock object would be to query
|
|
* metadata such as the payload offset. There will be
|
|
* no cipher or ivgen objects available.
|
|
*
|
|
* If @flags contains QCRYPTO_BLOCK_OPEN_DETACHED then
|
|
* the open process will be optimized to skip the LUKS
|
|
* payload overlap check.
|
|
*
|
|
* If any part of initializing the encryption context
|
|
* fails an error will be returned. This could be due
|
|
* to the volume being in the wrong format, a cipher
|
|
* or IV generator algorithm that is not supported,
|
|
* or incorrect passphrases.
|
|
*
|
|
* Returns: a block encryption format, or NULL on error
|
|
*/
|
|
QCryptoBlock *qcrypto_block_open(QCryptoBlockOpenOptions *options,
|
|
const char *optprefix,
|
|
QCryptoBlockReadFunc readfunc,
|
|
void *opaque,
|
|
unsigned int flags,
|
|
size_t n_threads,
|
|
Error **errp);
|
|
|
|
typedef enum {
|
|
QCRYPTO_BLOCK_CREATE_DETACHED = (1 << 0),
|
|
} QCryptoBlockCreateFlags;
|
|
|
|
/**
|
|
* qcrypto_block_create:
|
|
* @options: the encryption options
|
|
* @optprefix: name prefix for options
|
|
* @initfunc: callback for initializing volume header
|
|
* @writefunc: callback for writing data to the volume header
|
|
* @opaque: data to pass to @initfunc and @writefunc
|
|
* @flags: bitmask of QCryptoBlockCreateFlags values
|
|
* @errp: pointer to a NULL-initialized error object
|
|
*
|
|
* Create a new block encryption object for initializing
|
|
* a storage volume to be encrypted with format identified
|
|
* by the parameters in @options.
|
|
*
|
|
* This method will allocate space for a new volume header
|
|
* using @initfunc and then write header data using @writefunc,
|
|
* generating new master keys, etc as required. Any existing
|
|
* data present on the volume will be irrevocably destroyed.
|
|
*
|
|
* If @flags contains QCRYPTO_BLOCK_CREATE_DETACHED then
|
|
* the open process will set the payload_offset_sector to 0
|
|
* to specify the starting point for the read/write of a
|
|
* detached LUKS header image.
|
|
*
|
|
* If any part of initializing the encryption context
|
|
* fails an error will be returned. This could be due
|
|
* to the volume being in the wrong format, a cipher
|
|
* or IV generator algorithm that is not supported,
|
|
* or incorrect passphrases.
|
|
*
|
|
* Returns: a block encryption format, or NULL on error
|
|
*/
|
|
QCryptoBlock *qcrypto_block_create(QCryptoBlockCreateOptions *options,
|
|
const char *optprefix,
|
|
QCryptoBlockInitFunc initfunc,
|
|
QCryptoBlockWriteFunc writefunc,
|
|
void *opaque,
|
|
unsigned int flags,
|
|
Error **errp);
|
|
|
|
/**
|
|
* qcrypto_block_amend_options:
|
|
* @block: the block encryption object
|
|
*
|
|
* @readfunc: callback for reading data from the volume header
|
|
* @writefunc: callback for writing data to the volume header
|
|
* @opaque: data to pass to @readfunc and @writefunc
|
|
* @options: the new/amended encryption options
|
|
* @force: hint for the driver to allow unsafe operation
|
|
* @errp: error pointer
|
|
*
|
|
* Changes the crypto options of the encryption format
|
|
*
|
|
*/
|
|
int qcrypto_block_amend_options(QCryptoBlock *block,
|
|
QCryptoBlockReadFunc readfunc,
|
|
QCryptoBlockWriteFunc writefunc,
|
|
void *opaque,
|
|
QCryptoBlockAmendOptions *options,
|
|
bool force,
|
|
Error **errp);
|
|
|
|
|
|
/**
|
|
* qcrypto_block_calculate_payload_offset:
|
|
* @create_opts: the encryption options
|
|
* @optprefix: name prefix for options
|
|
* @len: output for number of header bytes before payload
|
|
* @errp: pointer to a NULL-initialized error object
|
|
*
|
|
* Calculate the number of header bytes before the payload in an encrypted
|
|
* storage volume. The header is an area before the payload that is reserved
|
|
* for encryption metadata.
|
|
*
|
|
* Returns: true on success, false on error
|
|
*/
|
|
bool
|
|
qcrypto_block_calculate_payload_offset(QCryptoBlockCreateOptions *create_opts,
|
|
const char *optprefix,
|
|
size_t *len,
|
|
Error **errp);
|
|
|
|
|
|
/**
|
|
* qcrypto_block_get_info:
|
|
* @block: the block encryption object
|
|
* @errp: pointer to a NULL-initialized error object
|
|
*
|
|
* Get information about the configuration options for the
|
|
* block encryption object. This includes details such as
|
|
* the cipher algorithms, modes, and initialization vector
|
|
* generators.
|
|
*
|
|
* Returns: a block encryption info object, or NULL on error
|
|
*/
|
|
QCryptoBlockInfo *qcrypto_block_get_info(QCryptoBlock *block,
|
|
Error **errp);
|
|
|
|
/**
|
|
* @qcrypto_block_decrypt:
|
|
* @block: the block encryption object
|
|
* @offset: the position at which @iov was read
|
|
* @buf: the buffer to decrypt
|
|
* @len: the length of @buf in bytes
|
|
* @errp: pointer to a NULL-initialized error object
|
|
*
|
|
* Decrypt @len bytes of cipher text in @buf, writing
|
|
* plain text back into @buf. @len and @offset must be
|
|
* a multiple of the encryption format sector size.
|
|
*
|
|
* Returns 0 on success, -1 on failure
|
|
*/
|
|
int qcrypto_block_decrypt(QCryptoBlock *block,
|
|
uint64_t offset,
|
|
uint8_t *buf,
|
|
size_t len,
|
|
Error **errp);
|
|
|
|
/**
|
|
* @qcrypto_block_encrypt:
|
|
* @block: the block encryption object
|
|
* @offset: the position at which @iov will be written
|
|
* @buf: the buffer to decrypt
|
|
* @len: the length of @buf in bytes
|
|
* @errp: pointer to a NULL-initialized error object
|
|
*
|
|
* Encrypt @len bytes of plain text in @buf, writing
|
|
* cipher text back into @buf. @len and @offset must be
|
|
* a multiple of the encryption format sector size.
|
|
*
|
|
* Returns 0 on success, -1 on failure
|
|
*/
|
|
int qcrypto_block_encrypt(QCryptoBlock *block,
|
|
uint64_t offset,
|
|
uint8_t *buf,
|
|
size_t len,
|
|
Error **errp);
|
|
|
|
/**
|
|
* qcrypto_block_get_cipher:
|
|
* @block: the block encryption object
|
|
*
|
|
* Get the cipher to use for payload encryption
|
|
*
|
|
* Returns: the cipher object
|
|
*/
|
|
QCryptoCipher *qcrypto_block_get_cipher(QCryptoBlock *block);
|
|
|
|
/**
|
|
* qcrypto_block_get_ivgen:
|
|
* @block: the block encryption object
|
|
*
|
|
* Get the initialization vector generator to use for
|
|
* payload encryption
|
|
*
|
|
* Returns: the IV generator object
|
|
*/
|
|
QCryptoIVGen *qcrypto_block_get_ivgen(QCryptoBlock *block);
|
|
|
|
|
|
/**
|
|
* qcrypto_block_get_kdf_hash:
|
|
* @block: the block encryption object
|
|
*
|
|
* Get the hash algorithm used with the key derivation
|
|
* function
|
|
*
|
|
* Returns: the hash algorithm
|
|
*/
|
|
QCryptoHashAlgorithm qcrypto_block_get_kdf_hash(QCryptoBlock *block);
|
|
|
|
/**
|
|
* qcrypto_block_get_payload_offset:
|
|
* @block: the block encryption object
|
|
*
|
|
* Get the offset to the payload indicated by the
|
|
* encryption header, in bytes.
|
|
*
|
|
* Returns: the payload offset in bytes
|
|
*/
|
|
uint64_t qcrypto_block_get_payload_offset(QCryptoBlock *block);
|
|
|
|
/**
|
|
* qcrypto_block_get_sector_size:
|
|
* @block: the block encryption object
|
|
*
|
|
* Get the size of sectors used for payload encryption. A new
|
|
* IV is used at the start of each sector. The encryption
|
|
* sector size is not required to match the sector size of the
|
|
* underlying storage. For example LUKS will always use a 512
|
|
* byte sector size, even if the volume is on a disk with 4k
|
|
* sectors.
|
|
*
|
|
* Returns: the sector in bytes
|
|
*/
|
|
uint64_t qcrypto_block_get_sector_size(QCryptoBlock *block);
|
|
|
|
/**
|
|
* qcrypto_block_free:
|
|
* @block: the block encryption object
|
|
*
|
|
* Release all resources associated with the encryption
|
|
* object
|
|
*/
|
|
void qcrypto_block_free(QCryptoBlock *block);
|
|
|
|
G_DEFINE_AUTOPTR_CLEANUP_FUNC(QCryptoBlock, qcrypto_block_free)
|
|
|
|
#endif /* QCRYPTO_BLOCK_H */
|