Crates.io | sev |
lib.rs | sev |
version | 4.0.0 |
source | src |
created_at | 2021-02-02 14:47:04.968105 |
updated_at | 2024-08-08 16:57:37.013293 |
description | Library for AMD SEV |
homepage | https://github.com/virtee/sev |
repository | https://github.com/virtee/sev |
max_upload_size | |
id | 349772 |
size | 647,087 |
The sev
crate provides an implementation of the AMD Secure Encrypted
Virtualization (SEV) APIs and the SEV Secure Nested Paging
Firmware (SNP) ABIs.
The linux kernel exposes two technically distinct AMD SEV APIs:
This crate implements both of those APIs and offers them to client. code through a flexible and type-safe high-level interface.
Like SEV, the linux kernel exposes another two different AMD SEV-SNP ABIs:
These new ABIs work only for SEV-SNP enabled hosts and guests.
This crate implements APIs for both SEV and SEV-SNP management.
By default, both the SEV and SEV-SNP libraries are compiled.
Because many modules provide support to both legacy SEV and SEV-SNP, they have been split into individual sub-modules sev.rs
and snp.rs
, isolating generation specific behavior.
If desired, you may opt to exclude either of the sub-modules by disabling its feature in your project's Cargo.toml
For example, to include the SEV APIs only:
sev = { version = "1.2.1", default-features = false, features = ["sev"] }
To include the SEV-SNP APIs only:
sev = { version = "1.2.1", default-features = false, features = ["snp"] }
Refer to the firmware module for more information.
Refer to the launch module for more information.
To enable the cryptographic verification of certificate chains and
attestation reports, either the openssl
or crypto_nossl
feature
has to be enabled manually. With openssl
, OpenSSL is used for the
verification. With crypto_nossl
, OpenSSL is not used for the
verification and instead pure-Rust libraries (e.g., p384
, rsa
,
etc.) are used. openssl
and crypto_nossl
are mutually exclusive,
and enabling both at the same time leads to a compiler error.
Note that the linux kernel provides access to these APIs through a set
of ioctl
s that are meant to be called on device nodes (/dev/kvm
and
/dev/sev
, to be specific). As a result, these ioctl
s form the substrate
of the sev
crate. Binaries that result from consumers of this crate are
expected to run as a process with the necessary privileges to interact
with the device nodes.
Projects in C can take advantage of the C API for the SEV launch ioctls.
To install the C API, users can use cargo-c
with the features they would
like to produce and install a pkg-config
file, a static library, a dynamic
library, and a C header:
cargo cinstall --prefix=/usr --libdir=/usr/lib64