diff options
author | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2010-06-16 14:33:56 +0200 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2010-06-17 20:49:05 +0200 |
commit | 5797051e8b1f3ac4d6cc5edf181a04536b496d3d (patch) | |
tree | 6fd074eebebf67a90d7fe134e11be2cb357db179 /ncr-key-storage.c | |
parent | fac33709478cfbd1657aa502ea6ea1acb12ecc2d (diff) | |
download | cryptodev-linux-5797051e8b1f3ac4d6cc5edf181a04536b496d3d.tar.gz cryptodev-linux-5797051e8b1f3ac4d6cc5edf181a04536b496d3d.tar.xz cryptodev-linux-5797051e8b1f3ac4d6cc5edf181a04536b496d3d.zip |
Added rfc5649 key wrapping (untested).
Diffstat (limited to 'ncr-key-storage.c')
-rw-r--r-- | ncr-key-storage.c | 104 |
1 files changed, 104 insertions, 0 deletions
diff --git a/ncr-key-storage.c b/ncr-key-storage.c new file mode 100644 index 0000000..5cdb9c6 --- /dev/null +++ b/ncr-key-storage.c @@ -0,0 +1,104 @@ +/* + * New driver for /dev/crypto device (aka CryptoDev) + + * Copyright (c) 2010 Nikos Mavrogiannopoulos <nmav@gnutls.org> + * + * This file is part of linux cryptodev. + * + * cryptodev is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * cryptodev is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program. If not, see <http://www.gnu.org/licenses/>. + */ + +#include <linux/mm.h> +#include "cryptodev.h" +#include <asm/uaccess.h> +#include <asm/ioctl.h> +#include <linux/scatterlist.h> +#include "ncr.h" +#include "ncr_int.h" +#include "cryptodev_int.h" + +#define KEY_DATA_MAX_SIZE 2048 + +struct packed_key { + uint8_t type; + uint32_t flags; + uint16_t algorithm; /* valid for public/private keys */ + uint8_t key_id[MAX_KEY_ID_SIZE]; + uint8_t key_id_size; + + uint8_t raw[KEY_DATA_MAX_SIZE]; + uint32_t raw_size; +} __attribute__((__packed__)); + +int key_to_storage_data( uint8_t** sdata, size_t * sdata_size, const struct key_item_st *key) +{ + struct packed_key * pkey; + int ret; + + pkey = kmalloc(sizeof(*pkey), GFP_KERNEL); + if (pkey == NULL) { + err(); + return -ENOMEM; + } + + pkey->type = key->type; + pkey->flags = key->flags; + pkey->algorithm = key->algorithm; + pkey->key_id_size = key->key_id_size; + memcpy(pkey->key_id, key->key_id, key->key_id_size); + + if (key->type == NCR_KEY_TYPE_SECRET) { + pkey->raw_size = key->key.secret.size; + memcpy(pkey->raw, key->key.secret.data, pkey->raw_size); + } else { + err(); + ret = -EINVAL; + goto fail; + } + + *sdata = (void*)pkey; + *sdata_size = sizeof(*pkey); + + return 0; +fail: + kfree(pkey); + + return ret; +} + +int key_from_storage_data(struct key_item_st* key, const void* data, size_t data_size) +{ + const struct packed_key * pkey = data; + + if (data_size != sizeof(*pkey)) { + err(); + return -EINVAL; + } + + key->type = pkey->type; + key->flags = pkey->flags; + key->algorithm = pkey->algorithm; + key->key_id_size = pkey->key_id_size; + memcpy(key->key_id, pkey->key_id, pkey->key_id_size); + + if (key->type == NCR_KEY_TYPE_SECRET) { + key->key.secret.size = pkey->raw_size; + memcpy(key->key.secret.data, pkey->raw, pkey->raw_size); + } else { + err(); + return -EINVAL; + } + + return 0; +} |