 689309c4ac
			
		
	
	
		689309c4ac
		
	
	
	
	
		
			
			Add unit test and benchmark test for crypto akcipher. Signed-off-by: lei he <helei.sig11@bytedance.com> Signed-off-by: zhenwei pi <pizhenwei@bytedance.com> Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
		
			
				
	
	
		
			452 lines
		
	
	
		
			13 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			452 lines
		
	
	
		
			13 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| /*
 | |
|  * QEMU Crypto akcipher algorithms
 | |
|  *
 | |
|  * Copyright (c) 2022 Bytedance
 | |
|  * Author: lei he <helei.sig11@bytedance.com>
 | |
|  *
 | |
|  * This library is free software; you can redistribute it and/or
 | |
|  * modify it under the terms of the GNU Lesser General Public
 | |
|  * License as published by the Free Software Foundation; either
 | |
|  * version 2.1 of the License, or (at your option) any later version.
 | |
|  *
 | |
|  * This library is distributed in the hope that it will be useful,
 | |
|  * but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
|  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 | |
|  * Lesser General Public License for more details.
 | |
|  *
 | |
|  * You should have received a copy of the GNU Lesser General Public
 | |
|  * License along with this library; if not, see <http://www.gnu.org/licenses/>.
 | |
|  *
 | |
|  */
 | |
| 
 | |
| #include <nettle/rsa.h>
 | |
| 
 | |
| #include "qemu/osdep.h"
 | |
| #include "qemu/host-utils.h"
 | |
| #include "crypto/akcipher.h"
 | |
| #include "crypto/random.h"
 | |
| #include "qapi/error.h"
 | |
| #include "sysemu/cryptodev.h"
 | |
| #include "rsakey.h"
 | |
| 
 | |
| typedef struct QCryptoNettleRSA {
 | |
|     QCryptoAkCipher akcipher;
 | |
|     struct rsa_public_key pub;
 | |
|     struct rsa_private_key priv;
 | |
|     QCryptoRSAPaddingAlgorithm padding_alg;
 | |
|     QCryptoHashAlgorithm hash_alg;
 | |
| } QCryptoNettleRSA;
 | |
| 
 | |
| static void qcrypto_nettle_rsa_free(QCryptoAkCipher *akcipher)
 | |
| {
 | |
|     QCryptoNettleRSA *rsa = (QCryptoNettleRSA *)akcipher;
 | |
|     if (!rsa) {
 | |
|         return;
 | |
|     }
 | |
| 
 | |
|     rsa_public_key_clear(&rsa->pub);
 | |
|     rsa_private_key_clear(&rsa->priv);
 | |
|     g_free(rsa);
 | |
| }
 | |
| 
 | |
| static QCryptoAkCipher *qcrypto_nettle_rsa_new(
 | |
|     const QCryptoAkCipherOptionsRSA *opt,
 | |
|     QCryptoAkCipherKeyType type,
 | |
|     const uint8_t *key,  size_t keylen,
 | |
|     Error **errp);
 | |
| 
 | |
| QCryptoAkCipher *qcrypto_akcipher_new(const QCryptoAkCipherOptions *opts,
 | |
|                                       QCryptoAkCipherKeyType type,
 | |
|                                       const uint8_t *key, size_t keylen,
 | |
|                                       Error **errp)
 | |
| {
 | |
|     switch (opts->alg) {
 | |
|     case QCRYPTO_AKCIPHER_ALG_RSA:
 | |
|         return qcrypto_nettle_rsa_new(&opts->u.rsa, type, key, keylen, errp);
 | |
| 
 | |
|     default:
 | |
|         error_setg(errp, "Unsupported algorithm: %u", opts->alg);
 | |
|         return NULL;
 | |
|     }
 | |
| 
 | |
|     return NULL;
 | |
| }
 | |
| 
 | |
| static void qcrypto_nettle_rsa_set_akcipher_size(QCryptoAkCipher *akcipher,
 | |
|                                                  int key_size)
 | |
| {
 | |
|     akcipher->max_plaintext_len = key_size;
 | |
|     akcipher->max_ciphertext_len = key_size;
 | |
|     akcipher->max_signature_len = key_size;
 | |
|     akcipher->max_dgst_len = key_size;
 | |
| }
 | |
| 
 | |
| static int qcrypt_nettle_parse_rsa_private_key(QCryptoNettleRSA *rsa,
 | |
|                                                const uint8_t *key,
 | |
|                                                size_t keylen,
 | |
|                                                Error **errp)
 | |
| {
 | |
|     g_autoptr(QCryptoAkCipherRSAKey) rsa_key = qcrypto_akcipher_rsakey_parse(
 | |
|         QCRYPTO_AKCIPHER_KEY_TYPE_PRIVATE, key, keylen, errp);
 | |
| 
 | |
|     if (!rsa_key) {
 | |
|         return -1;
 | |
|     }
 | |
| 
 | |
|     nettle_mpz_init_set_str_256_u(rsa->pub.n, rsa_key->n.len, rsa_key->n.data);
 | |
|     nettle_mpz_init_set_str_256_u(rsa->pub.e, rsa_key->e.len, rsa_key->e.data);
 | |
|     nettle_mpz_init_set_str_256_u(rsa->priv.d, rsa_key->d.len, rsa_key->d.data);
 | |
|     nettle_mpz_init_set_str_256_u(rsa->priv.p, rsa_key->p.len, rsa_key->p.data);
 | |
|     nettle_mpz_init_set_str_256_u(rsa->priv.q, rsa_key->q.len, rsa_key->q.data);
 | |
|     nettle_mpz_init_set_str_256_u(rsa->priv.a, rsa_key->dp.len,
 | |
|                                   rsa_key->dp.data);
 | |
|     nettle_mpz_init_set_str_256_u(rsa->priv.b, rsa_key->dq.len,
 | |
|                                   rsa_key->dq.data);
 | |
|     nettle_mpz_init_set_str_256_u(rsa->priv.c, rsa_key->u.len, rsa_key->u.data);
 | |
| 
 | |
|     if (!rsa_public_key_prepare(&rsa->pub)) {
 | |
|         error_setg(errp, "Failed to check RSA key");
 | |
|         return -1;
 | |
|     }
 | |
| 
 | |
|     /**
 | |
|      * Since in the kernel's unit test, the p, q, a, b, c of some
 | |
|      * private keys is 0, only the simplest length check is done here
 | |
|      */
 | |
|     if (rsa_key->p.len > 1 &&
 | |
|         rsa_key->q.len > 1 &&
 | |
|         rsa_key->dp.len > 1 &&
 | |
|         rsa_key->dq.len > 1 &&
 | |
|         rsa_key->u.len > 1) {
 | |
|         if (!rsa_private_key_prepare(&rsa->priv)) {
 | |
|             error_setg(errp, "Failed to check RSA key");
 | |
|             return -1;
 | |
|         }
 | |
|     } else {
 | |
|         rsa->priv.size = rsa->pub.size;
 | |
|     }
 | |
|     qcrypto_nettle_rsa_set_akcipher_size(
 | |
|         (QCryptoAkCipher *)rsa, rsa->priv.size);
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static int qcrypt_nettle_parse_rsa_public_key(QCryptoNettleRSA *rsa,
 | |
|                                               const uint8_t *key,
 | |
|                                               size_t keylen,
 | |
|                                               Error **errp)
 | |
| {
 | |
|     g_autoptr(QCryptoAkCipherRSAKey) rsa_key = qcrypto_akcipher_rsakey_parse(
 | |
|         QCRYPTO_AKCIPHER_KEY_TYPE_PUBLIC, key, keylen, errp);
 | |
| 
 | |
|     if (!rsa_key) {
 | |
|         return -1;
 | |
|     }
 | |
|     nettle_mpz_init_set_str_256_u(rsa->pub.n, rsa_key->n.len, rsa_key->n.data);
 | |
|     nettle_mpz_init_set_str_256_u(rsa->pub.e, rsa_key->e.len, rsa_key->e.data);
 | |
| 
 | |
|     if (!rsa_public_key_prepare(&rsa->pub)) {
 | |
|         error_setg(errp, "Failed to check RSA key");
 | |
|         return -1;
 | |
|     }
 | |
|     qcrypto_nettle_rsa_set_akcipher_size(
 | |
|         (QCryptoAkCipher *)rsa, rsa->pub.size);
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static void wrap_nettle_random_func(void *ctx, size_t len, uint8_t *out)
 | |
| {
 | |
|     qcrypto_random_bytes(out, len, &error_abort);
 | |
| }
 | |
| 
 | |
| static int qcrypto_nettle_rsa_encrypt(QCryptoAkCipher *akcipher,
 | |
|                                       const void *data, size_t data_len,
 | |
|                                       void *enc, size_t enc_len,
 | |
|                                       Error **errp)
 | |
| {
 | |
| 
 | |
|     QCryptoNettleRSA *rsa = (QCryptoNettleRSA *)akcipher;
 | |
|     mpz_t c;
 | |
|     int ret = -1;
 | |
| 
 | |
|     if (data_len > rsa->pub.size) {
 | |
|         error_setg(errp, "Plaintext length %zu is greater than key size: %zu",
 | |
|                    data_len, rsa->pub.size);
 | |
|         return ret;
 | |
|     }
 | |
| 
 | |
|     if (enc_len < rsa->pub.size) {
 | |
|         error_setg(errp, "Ciphertext buffer length %zu is less than "
 | |
|                          "key size: %zu", enc_len, rsa->pub.size);
 | |
|         return ret;
 | |
|     }
 | |
| 
 | |
|     /* Nettle do not support RSA encryption without any padding */
 | |
|     switch (rsa->padding_alg) {
 | |
|     case QCRYPTO_RSA_PADDING_ALG_RAW:
 | |
|         error_setg(errp, "RSA with raw padding is not supported");
 | |
|         break;
 | |
| 
 | |
|     case QCRYPTO_RSA_PADDING_ALG_PKCS1:
 | |
|         mpz_init(c);
 | |
|         if (rsa_encrypt(&rsa->pub, NULL, wrap_nettle_random_func,
 | |
|                         data_len, (uint8_t *)data, c) != 1) {
 | |
|             error_setg(errp, "Failed to encrypt");
 | |
|         } else {
 | |
|             nettle_mpz_get_str_256(enc_len, (uint8_t *)enc, c);
 | |
|             ret = nettle_mpz_sizeinbase_256_u(c);
 | |
|         }
 | |
|         mpz_clear(c);
 | |
|         break;
 | |
| 
 | |
|     default:
 | |
|         error_setg(errp, "Unknown padding");
 | |
|     }
 | |
| 
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| static int qcrypto_nettle_rsa_decrypt(QCryptoAkCipher *akcipher,
 | |
|                                       const void *enc, size_t enc_len,
 | |
|                                       void *data, size_t data_len,
 | |
|                                       Error **errp)
 | |
| {
 | |
|     QCryptoNettleRSA *rsa = (QCryptoNettleRSA *)akcipher;
 | |
|     mpz_t c;
 | |
|     int ret = -1;
 | |
| 
 | |
|     if (enc_len > rsa->priv.size) {
 | |
|         error_setg(errp, "Ciphertext length %zu is greater than key size: %zu",
 | |
|                    enc_len, rsa->priv.size);
 | |
|         return ret;
 | |
|     }
 | |
| 
 | |
|     switch (rsa->padding_alg) {
 | |
|     case QCRYPTO_RSA_PADDING_ALG_RAW:
 | |
|         error_setg(errp, "RSA with raw padding is not supported");
 | |
|         break;
 | |
| 
 | |
|     case QCRYPTO_RSA_PADDING_ALG_PKCS1:
 | |
|         nettle_mpz_init_set_str_256_u(c, enc_len, enc);
 | |
|         if (!rsa_decrypt(&rsa->priv, &data_len, (uint8_t *)data, c)) {
 | |
|             error_setg(errp, "Failed to decrypt");
 | |
|         } else {
 | |
|             ret = data_len;
 | |
|         }
 | |
| 
 | |
|         mpz_clear(c);
 | |
|         break;
 | |
| 
 | |
|     default:
 | |
|         error_setg(errp, "Unknown padding algorithm: %d", rsa->padding_alg);
 | |
|     }
 | |
| 
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| static int qcrypto_nettle_rsa_sign(QCryptoAkCipher *akcipher,
 | |
|                                    const void *data, size_t data_len,
 | |
|                                    void *sig, size_t sig_len, Error **errp)
 | |
| {
 | |
|     QCryptoNettleRSA *rsa = (QCryptoNettleRSA *)akcipher;
 | |
|     int ret = -1, rv;
 | |
|     mpz_t s;
 | |
| 
 | |
|     /**
 | |
|      * The RSA algorithm cannot be used for signature/verification
 | |
|      * without padding.
 | |
|      */
 | |
|     if (rsa->padding_alg == QCRYPTO_RSA_PADDING_ALG_RAW) {
 | |
|         error_setg(errp, "Try to make signature without padding");
 | |
|         return ret;
 | |
|     }
 | |
| 
 | |
|     if (data_len > rsa->priv.size) {
 | |
|         error_setg(errp, "Data length %zu is greater than key size: %zu",
 | |
|                    data_len, rsa->priv.size);
 | |
|         return ret;
 | |
|     }
 | |
| 
 | |
|     if (sig_len < rsa->priv.size) {
 | |
|         error_setg(errp, "Signature buffer length %zu is less than "
 | |
|                          "key size: %zu", sig_len, rsa->priv.size);
 | |
|         return ret;
 | |
|     }
 | |
| 
 | |
|     mpz_init(s);
 | |
|     switch (rsa->hash_alg) {
 | |
|     case QCRYPTO_HASH_ALG_MD5:
 | |
|         rv = rsa_md5_sign_digest(&rsa->priv, data, s);
 | |
|         break;
 | |
| 
 | |
|     case QCRYPTO_HASH_ALG_SHA1:
 | |
|         rv = rsa_sha1_sign_digest(&rsa->priv, data, s);
 | |
|         break;
 | |
| 
 | |
|     case QCRYPTO_HASH_ALG_SHA256:
 | |
|         rv = rsa_sha256_sign_digest(&rsa->priv, data, s);
 | |
|         break;
 | |
| 
 | |
|     case QCRYPTO_HASH_ALG_SHA512:
 | |
|         rv = rsa_sha512_sign_digest(&rsa->priv, data, s);
 | |
|         break;
 | |
| 
 | |
|     default:
 | |
|         error_setg(errp, "Unknown hash algorithm: %d", rsa->hash_alg);
 | |
|         goto cleanup;
 | |
|     }
 | |
| 
 | |
|     if (rv != 1) {
 | |
|         error_setg(errp, "Failed to make signature");
 | |
|         goto cleanup;
 | |
|     }
 | |
|     nettle_mpz_get_str_256(sig_len, (uint8_t *)sig, s);
 | |
|     ret = nettle_mpz_sizeinbase_256_u(s);
 | |
| 
 | |
| cleanup:
 | |
|     mpz_clear(s);
 | |
| 
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| static int qcrypto_nettle_rsa_verify(QCryptoAkCipher *akcipher,
 | |
|                                      const void *sig, size_t sig_len,
 | |
|                                      const void *data, size_t data_len,
 | |
|                                      Error **errp)
 | |
| {
 | |
|     QCryptoNettleRSA *rsa = (QCryptoNettleRSA *)akcipher;
 | |
| 
 | |
|     int ret = -1, rv;
 | |
|     mpz_t s;
 | |
| 
 | |
|     /**
 | |
|      * The RSA algorithm cannot be used for signature/verification
 | |
|      * without padding.
 | |
|      */
 | |
|     if (rsa->padding_alg == QCRYPTO_RSA_PADDING_ALG_RAW) {
 | |
|         error_setg(errp, "Try to verify signature without padding");
 | |
|         return ret;
 | |
|     }
 | |
|     if (data_len > rsa->pub.size) {
 | |
|         error_setg(errp, "Data length %zu is greater than key size: %zu",
 | |
|                    data_len, rsa->pub.size);
 | |
|         return ret;
 | |
|     }
 | |
|     if (sig_len < rsa->pub.size) {
 | |
|         error_setg(errp, "Signature length %zu is greater than key size: %zu",
 | |
|                    sig_len, rsa->pub.size);
 | |
|         return ret;
 | |
|     }
 | |
| 
 | |
|     nettle_mpz_init_set_str_256_u(s, sig_len, sig);
 | |
|     switch (rsa->hash_alg) {
 | |
|     case QCRYPTO_HASH_ALG_MD5:
 | |
|         rv = rsa_md5_verify_digest(&rsa->pub, data, s);
 | |
|         break;
 | |
| 
 | |
|     case QCRYPTO_HASH_ALG_SHA1:
 | |
|         rv = rsa_sha1_verify_digest(&rsa->pub, data, s);
 | |
|         break;
 | |
| 
 | |
|     case QCRYPTO_HASH_ALG_SHA256:
 | |
|         rv = rsa_sha256_verify_digest(&rsa->pub, data, s);
 | |
|         break;
 | |
| 
 | |
|     case QCRYPTO_HASH_ALG_SHA512:
 | |
|         rv = rsa_sha512_verify_digest(&rsa->pub, data, s);
 | |
|         break;
 | |
| 
 | |
|     default:
 | |
|         error_setg(errp, "Unsupported hash algorithm: %d", rsa->hash_alg);
 | |
|         goto cleanup;
 | |
|     }
 | |
| 
 | |
|     if (rv != 1) {
 | |
|         error_setg(errp, "Failed to verify signature");
 | |
|         goto cleanup;
 | |
|     }
 | |
|     ret = 0;
 | |
| 
 | |
| cleanup:
 | |
|     mpz_clear(s);
 | |
| 
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| QCryptoAkCipherDriver nettle_rsa = {
 | |
|     .encrypt = qcrypto_nettle_rsa_encrypt,
 | |
|     .decrypt = qcrypto_nettle_rsa_decrypt,
 | |
|     .sign = qcrypto_nettle_rsa_sign,
 | |
|     .verify = qcrypto_nettle_rsa_verify,
 | |
|     .free = qcrypto_nettle_rsa_free,
 | |
| };
 | |
| 
 | |
| static QCryptoAkCipher *qcrypto_nettle_rsa_new(
 | |
|     const QCryptoAkCipherOptionsRSA *opt,
 | |
|     QCryptoAkCipherKeyType type,
 | |
|     const uint8_t *key, size_t keylen,
 | |
|     Error **errp)
 | |
| {
 | |
|     QCryptoNettleRSA *rsa = g_new0(QCryptoNettleRSA, 1);
 | |
| 
 | |
|     rsa->padding_alg = opt->padding_alg;
 | |
|     rsa->hash_alg = opt->hash_alg;
 | |
|     rsa->akcipher.driver = &nettle_rsa;
 | |
|     rsa_public_key_init(&rsa->pub);
 | |
|     rsa_private_key_init(&rsa->priv);
 | |
| 
 | |
|     switch (type) {
 | |
|     case QCRYPTO_AKCIPHER_KEY_TYPE_PRIVATE:
 | |
|         if (qcrypt_nettle_parse_rsa_private_key(rsa, key, keylen, errp) != 0) {
 | |
|             goto error;
 | |
|         }
 | |
|         break;
 | |
| 
 | |
|     case QCRYPTO_AKCIPHER_KEY_TYPE_PUBLIC:
 | |
|         if (qcrypt_nettle_parse_rsa_public_key(rsa, key, keylen, errp) != 0) {
 | |
|             goto error;
 | |
|         }
 | |
|         break;
 | |
| 
 | |
|     default:
 | |
|         error_setg(errp, "Unknown akcipher key type %d", type);
 | |
|         goto error;
 | |
|     }
 | |
| 
 | |
|     return (QCryptoAkCipher *)rsa;
 | |
| 
 | |
| error:
 | |
|     qcrypto_nettle_rsa_free((QCryptoAkCipher *)rsa);
 | |
|     return NULL;
 | |
| }
 | |
| 
 | |
| 
 | |
| bool qcrypto_akcipher_supports(QCryptoAkCipherOptions *opts)
 | |
| {
 | |
|     switch (opts->alg) {
 | |
|     case QCRYPTO_AKCIPHER_ALG_RSA:
 | |
|         switch (opts->u.rsa.padding_alg) {
 | |
|         case QCRYPTO_RSA_PADDING_ALG_PKCS1:
 | |
|             switch (opts->u.rsa.hash_alg) {
 | |
|             case QCRYPTO_HASH_ALG_MD5:
 | |
|             case QCRYPTO_HASH_ALG_SHA1:
 | |
|             case QCRYPTO_HASH_ALG_SHA256:
 | |
|             case QCRYPTO_HASH_ALG_SHA512:
 | |
|                 return true;
 | |
| 
 | |
|             default:
 | |
|                 return false;
 | |
|             }
 | |
| 
 | |
|         case QCRYPTO_RSA_PADDING_ALG_RAW:
 | |
|         default:
 | |
|             return false;
 | |
|         }
 | |
|         break;
 | |
| 
 | |
|     default:
 | |
|         return false;
 | |
|     }
 | |
| }
 |