/* * New driver for /dev/crypto device (aka CryptoDev) * Copyright (c) 2010 Katholieke Universiteit Leuven * Portions Copyright (c) 2010 Phil Sutter * * Author: Nikos Mavrogiannopoulos * * This file is part of linux cryptodev. * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License * as published by the Free Software Foundation; either version 2 * of the License, or (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. */ #include #include #include "ncr.h" #include "ncr-int.h" #include #include #include static int _ncr_session_update_key(struct ncr_lists *lists, ncr_session_t ses, struct nlattr *tb[]); static void _ncr_session_remove(struct ncr_lists *lst, ncr_session_t desc); static int session_list_deinit_fn(int id, void *item, void *unused) { (void)unused; _ncr_sessions_item_put(item); return 0; } void ncr_sessions_list_deinit(struct ncr_lists *lst) { /* The mutex is not necessary, but doesn't hurt and makes it easier to verify locking correctness. */ mutex_lock(&lst->session_idr_mutex); idr_for_each(&lst->session_idr, session_list_deinit_fn, NULL); idr_remove_all(&lst->session_idr); idr_destroy(&lst->session_idr); mutex_unlock(&lst->session_idr_mutex); } /* returns the data item corresponding to desc */ struct session_item_st* ncr_sessions_item_get(struct ncr_lists *lst, ncr_session_t desc) { struct session_item_st* item; mutex_lock(&lst->session_idr_mutex); item = idr_find(&lst->session_idr, desc); if (item != NULL) { atomic_inc(&item->refcnt); mutex_unlock(&lst->session_idr_mutex); return item; } mutex_unlock(&lst->session_idr_mutex); err(); return NULL; } void _ncr_sessions_item_put( struct session_item_st* item) { if (atomic_dec_and_test(&item->refcnt)) { cryptodev_cipher_deinit(&item->cipher); ncr_pk_cipher_deinit(&item->pk); cryptodev_hash_deinit(&item->hash); if (item->key) _ncr_key_item_put(item->key); kfree(item->sg); kfree(item->pages); kfree(item); } } struct session_item_st* ncr_session_new(struct ncr_lists *lst) { struct session_item_st* sess; sess = kzalloc(sizeof(*sess), GFP_KERNEL); if (sess == NULL) { err(); return NULL; } sess->array_size = DEFAULT_PREALLOC_PAGES; sess->pages = kzalloc(sess->array_size * sizeof(struct page *), GFP_KERNEL); sess->sg = kzalloc(sess->array_size * sizeof(struct scatterlist), GFP_KERNEL); if (sess->sg == NULL || sess->pages == NULL) { err(); goto err_sess; } mutex_init(&sess->mem_mutex); atomic_set(&sess->refcnt, 2); /* One for lst->list, one for "sess" */ mutex_lock(&lst->session_idr_mutex); /* idr_pre_get() should preallocate enough, and, due to session_idr_mutex, nobody else can use the preallocated data. Therefore the loop recommended in idr_get_new() documentation is not necessary. */ if (idr_pre_get(&lst->session_idr, GFP_KERNEL) == 0 || idr_get_new(&lst->session_idr, sess, &sess->desc) != 0) { mutex_unlock(&lst->session_idr_mutex); goto err_sess; } mutex_unlock(&lst->session_idr_mutex); return sess; err_sess: kfree(sess->sg); kfree(sess->pages); kfree(sess); return NULL; } static const struct algo_properties_st algo_properties[] = { { .algo = NCR_ALG_NULL, .kstr = "ecb(cipher_null)", .needs_iv = 0, .is_symmetric=1, .can_encrypt=1, .key_type = NCR_KEY_TYPE_INVALID }, { .algo = NCR_ALG_3DES_CBC, .kstr = "cbc(des3_ede)", .needs_iv = 1, .is_symmetric=1, .can_encrypt=1, .key_type = NCR_KEY_TYPE_SECRET }, { .algo = NCR_ALG_AES_CBC, .kstr = "cbc(aes)", .needs_iv = 1, .is_symmetric=1, .can_encrypt=1, .key_type = NCR_KEY_TYPE_SECRET }, { .algo = NCR_ALG_CAMELLIA_CBC, .kstr = "cbc(camelia)", .needs_iv = 1, .is_symmetric=1, .can_encrypt=1, .key_type = NCR_KEY_TYPE_SECRET }, { .algo = NCR_ALG_AES_CTR, .kstr = "ctr(aes)", .needs_iv = 1, .is_symmetric=1, .can_encrypt=1, .key_type = NCR_KEY_TYPE_SECRET }, { .algo = NCR_ALG_CAMELLIA_CTR, .kstr = "ctr(camelia)", .needs_iv = 1, .is_symmetric=1, .can_encrypt=1, .key_type = NCR_KEY_TYPE_SECRET }, { .algo = NCR_ALG_ARCFOUR, .kstr = NULL, .needs_iv = 0, .is_symmetric=1, .can_encrypt=1, .key_type = NCR_KEY_TYPE_SECRET }, { .algo = NCR_ALG_AES_ECB, .kstr = "ecb(aes)", .needs_iv = 0, .is_symmetric=1, .can_encrypt=1, .key_type = NCR_KEY_TYPE_SECRET }, { .algo = NCR_ALG_CAMELLIA_ECB, .kstr = "ecb(camelia)", .needs_iv = 0, .is_symmetric=1, .can_encrypt=1, .key_type = NCR_KEY_TYPE_SECRET }, { .algo = NCR_ALG_SHA1, .kstr = "sha1", .digest_size = 20, .can_digest=1, .key_type = NCR_KEY_TYPE_INVALID }, { .algo = NCR_ALG_MD5, .kstr = "md5", .digest_size = 16, .can_digest=1, .key_type = NCR_KEY_TYPE_INVALID }, { .algo = NCR_ALG_SHA2_224, .kstr = "sha224", .digest_size = 28, .can_digest=1, .key_type = NCR_KEY_TYPE_INVALID }, { .algo = NCR_ALG_SHA2_256, .kstr = "sha256", .digest_size = 32, .can_digest=1, .key_type = NCR_KEY_TYPE_INVALID }, { .algo = NCR_ALG_SHA2_384, .kstr = "sha384", .digest_size = 48, .can_digest=1, .key_type = NCR_KEY_TYPE_INVALID }, { .algo = NCR_ALG_SHA2_512, .kstr = "sha512", .digest_size = 64, .can_digest=1, .key_type = NCR_KEY_TYPE_INVALID }, { .algo = NCR_ALG_HMAC_SHA1, .is_hmac = 1, .kstr = "hmac(sha1)", .digest_size = 20, .can_sign=1, .key_type = NCR_KEY_TYPE_SECRET }, { .algo = NCR_ALG_HMAC_MD5, .is_hmac = 1, .kstr = "hmac(md5)", .digest_size = 16, .can_sign=1, .key_type = NCR_KEY_TYPE_SECRET }, { .algo = NCR_ALG_HMAC_SHA2_224, .is_hmac = 1, .kstr = "hmac(sha224)", .digest_size = 28, .can_sign=1, .key_type = NCR_KEY_TYPE_SECRET }, { .algo = NCR_ALG_HMAC_SHA2_256, .is_hmac = 1, .kstr = "hmac(sha256)", .digest_size = 32, .can_sign=1, .key_type = NCR_KEY_TYPE_SECRET }, { .algo = NCR_ALG_HMAC_SHA2_384, .is_hmac = 1, .kstr = "hmac(sha384)", .digest_size = 48, .can_sign=1, .key_type = NCR_KEY_TYPE_SECRET }, { .algo = NCR_ALG_HMAC_SHA2_512, .is_hmac = 1, .kstr = "hmac(sha512)", .digest_size = 64, .can_sign=1, .key_type = NCR_KEY_TYPE_SECRET }, { .algo = NCR_ALG_RSA, .kstr = NULL, .is_pk = 1, .can_encrypt=1, .can_sign=1, .key_type = NCR_KEY_TYPE_PUBLIC }, { .algo = NCR_ALG_DSA, .kstr = NULL, .is_pk = 1, .can_sign=1, .key_type = NCR_KEY_TYPE_PUBLIC }, { .algo = NCR_ALG_DH, .kstr = NULL, .is_pk = 1, .can_kx=1, .key_type = NCR_KEY_TYPE_PUBLIC }, { .algo = NCR_ALG_NONE } }; const struct algo_properties_st *_ncr_algo_to_properties(ncr_algorithm_t algo) { ncr_algorithm_t a; int i = 0; for (i = 0; (a = algo_properties[i].algo) != NCR_ALG_NONE; i++) { if (a == algo) return &algo_properties[i]; } return NULL; } const struct algo_properties_st *_ncr_nla_to_properties(const struct nlattr *nla) { if (nla == NULL) return NULL; return _ncr_algo_to_properties(nla_get_u32(nla)); } static int key_item_get_nla_read(struct key_item_st **st, struct ncr_lists *lists, const struct nlattr *nla) { int ret; if (nla == NULL) { err(); return -EINVAL; } ret = ncr_key_item_get_read(st, lists, nla_get_u32(nla)); if (ret < 0) { err(); return ret; } return ret; } static int _ncr_session_init(struct ncr_lists *lists, ncr_crypto_op_t op, struct nlattr *tb[]) { const struct nlattr *nla; struct session_item_st* ns = NULL; int ret; const struct algo_properties_st *sign_hash; ns = ncr_session_new(lists); if (ns == NULL) { err(); return -ENOMEM; } ns->op = op; ns->algorithm = _ncr_nla_to_properties(tb[NCR_ATTR_ALGORITHM]); if (ns->algorithm == NULL) { err(); ret = -EINVAL; goto fail; } switch(op) { case NCR_OP_ENCRYPT: case NCR_OP_DECRYPT: if (!ns->algorithm->can_encrypt) { err(); ret = -EINVAL; goto fail; } /* read key */ ret = key_item_get_nla_read(&ns->key, lists, tb[NCR_ATTR_KEY]); if (ret < 0) { err(); goto fail; } /* wrapping keys cannot be used for encryption or decryption */ if (ns->key->flags & NCR_KEY_FLAG_WRAPPING) { err(); ret = -EINVAL; goto fail; } if (ns->key->type == NCR_KEY_TYPE_SECRET) { int keysize = ns->key->key.secret.size; if (ns->algorithm->algo == NCR_ALG_NULL) keysize = 0; if (ns->algorithm->kstr == NULL) { err(); ret = -EINVAL; goto fail; } ret = cryptodev_cipher_init(&ns->cipher, ns->algorithm->kstr, ns->key->key.secret.data, keysize); if (ret < 0) { err(); goto fail; } if (ns->algorithm->needs_iv) { nla = tb[NCR_ATTR_IV]; if (nla == NULL) { err(); ret = -EINVAL; goto fail; } cryptodev_cipher_set_iv(&ns->cipher, nla_data(nla), nla_len(nla)); } } else if (ns->key->type == NCR_KEY_TYPE_PRIVATE || ns->key->type == NCR_KEY_TYPE_PUBLIC) { ret = ncr_pk_cipher_init(ns->algorithm, &ns->pk, tb, ns->key, NULL); if (ret < 0) { err(); goto fail; } } else { err(); ret = -EINVAL; goto fail; } break; case NCR_OP_SIGN: case NCR_OP_VERIFY: if (!ns->algorithm->can_sign && !ns->algorithm->can_digest) { err(); ret = -EINVAL; goto fail; } if (ns->algorithm->can_digest) { if (ns->algorithm->kstr == NULL) { err(); ret = -EINVAL; goto fail; } ret = cryptodev_hash_init(&ns->hash, ns->algorithm->kstr, 0, NULL, 0); if (ret < 0) { err(); goto fail; } } else { /* read key */ ret = key_item_get_nla_read(&ns->key, lists, tb[NCR_ATTR_KEY]); if (ret < 0) { err(); goto fail; } /* wrapping keys cannot be used for anything except wrapping. */ if (ns->key->flags & NCR_KEY_FLAG_WRAPPING) { err(); ret = -EINVAL; goto fail; } if (ns->algorithm->is_hmac && ns->key->type == NCR_KEY_TYPE_SECRET) { if (ns->algorithm->kstr == NULL) { err(); ret = -EINVAL; goto fail; } ret = cryptodev_hash_init(&ns->hash, ns->algorithm->kstr, 1, ns->key->key.secret.data, ns->key->key.secret.size); if (ret < 0) { err(); goto fail; } } else if (ns->algorithm->is_pk && (ns->key->type == NCR_KEY_TYPE_PRIVATE || ns->key->type == NCR_KEY_TYPE_PUBLIC)) { nla = tb[NCR_ATTR_SIGNATURE_HASH_ALGORITHM]; sign_hash = _ncr_nla_to_properties(nla); if (sign_hash == NULL) { err(); ret = -EINVAL; goto fail; } if (!sign_hash->can_digest) { err(); ret = -EINVAL; goto fail; } if (sign_hash->kstr == NULL) { err(); ret = -EINVAL; goto fail; } ret = ncr_pk_cipher_init(ns->algorithm, &ns->pk, tb, ns->key, sign_hash); if (ret < 0) { err(); goto fail; } ret = cryptodev_hash_init(&ns->hash, sign_hash->kstr, 0, NULL, 0); if (ret < 0) { err(); goto fail; } } else { err(); ret = -EINVAL; goto fail; } } break; default: err(); ret = -EINVAL; goto fail; } ret = ns->desc; fail: if (ret < 0) { _ncr_session_remove(lists, ns->desc); } _ncr_sessions_item_put(ns); return ret; } int ncr_session_init(struct ncr_lists *lists, const struct ncr_session_init *session, struct nlattr *tb[]) { return _ncr_session_init(lists, session->op, tb); } static int _ncr_session_encrypt(struct session_item_st* sess, const struct scatterlist* input, unsigned input_cnt, size_t input_size, void *output, unsigned output_cnt, size_t *output_size) { int ret; if (sess->algorithm->is_symmetric) { /* read key */ ret = cryptodev_cipher_encrypt(&sess->cipher, input, output, input_size); if (ret < 0) { err(); return ret; } /* FIXME: handle ciphers that do not require that */ *output_size = input_size; } else { /* public key */ ret = ncr_pk_cipher_encrypt(&sess->pk, input, input_cnt, input_size, output, output_cnt, output_size); if (ret < 0) { err(); return ret; } } return 0; } static int _ncr_session_decrypt(struct session_item_st* sess, const struct scatterlist* input, unsigned input_cnt, size_t input_size, struct scatterlist *output, unsigned output_cnt, size_t *output_size) { int ret; if (sess->algorithm->is_symmetric) { /* read key */ ret = cryptodev_cipher_decrypt(&sess->cipher, input, output, input_size); if (ret < 0) { err(); return ret; } /* FIXME: handle ciphers that do not require equality */ *output_size = input_size; } else { /* public key */ ret = ncr_pk_cipher_decrypt(&sess->pk, input, input_cnt, input_size, output, output_cnt, output_size); if (ret < 0) { err(); return ret; } } return 0; } static void _ncr_session_remove(struct ncr_lists *lst, ncr_session_t desc) { struct session_item_st * item; mutex_lock(&lst->session_idr_mutex); item = idr_find(&lst->session_idr, desc); if (item != NULL) idr_remove(&lst->session_idr, desc); /* Steal the reference */ mutex_unlock(&lst->session_idr_mutex); if (item != NULL) _ncr_sessions_item_put(item); } static int _ncr_session_grow_pages(struct session_item_st *ses, int pagecount) { struct scatterlist *sg; struct page **pages; int array_size; if (likely(pagecount < ses->array_size)) return 0; for (array_size = ses->array_size; array_size < pagecount; array_size *= 2) ; dprintk(2, KERN_DEBUG, "%s: reallocating to %d elements\n", __func__, array_size); pages = krealloc(ses->pages, array_size * sizeof(struct page *), GFP_KERNEL); if (unlikely(pages == NULL)) return -ENOMEM; ses->pages = pages; sg = krealloc(ses->sg, array_size * sizeof(struct scatterlist), GFP_KERNEL); if (unlikely(sg == NULL)) return -ENOMEM; ses->sg = sg; ses->array_size = array_size; return 0; } /* Make NCR_ATTR_UPDATE_INPUT_DATA and NCR_ATTR_UPDATE_OUTPUT_BUFFER available in scatterlists */ static int get_userbuf2(struct session_item_st *ses, struct nlattr *tb[], struct scatterlist **src_sg, unsigned *src_cnt, size_t *src_size, struct ncr_session_output_buffer *dst, struct scatterlist **dst_sg, unsigned *dst_cnt, int compat) { const struct nlattr *src_nla, *dst_nla; struct ncr_session_input_data src; int src_pagecount, dst_pagecount = 0, pagecount, write_src = 1, ret; size_t input_size; src_nla = tb[NCR_ATTR_UPDATE_INPUT_DATA]; dst_nla = tb[NCR_ATTR_UPDATE_OUTPUT_BUFFER]; ret = ncr_session_input_data_from_nla(&src, src_nla, compat); if (unlikely(ret != 0)) { err(); return ret; } *src_size = src.data_size; if (dst_nla != NULL) { ret = ncr_session_output_buffer_from_nla(dst, dst_nla, compat); if (unlikely(ret != 0)) { err(); return ret; } } input_size = src.data_size; src_pagecount = PAGECOUNT(src.data, input_size); if (dst_nla == NULL || src.data != dst->buffer) { /* non-in-situ transformation */ write_src = 0; if (dst_nla != NULL) { dst_pagecount = PAGECOUNT(dst->buffer, dst->buffer_size); } else { dst_pagecount = 0; } } else { src_pagecount = max((int)(PAGECOUNT(dst->buffer, dst->buffer_size)), src_pagecount); input_size = max(input_size, dst->buffer_size); } pagecount = src_pagecount + dst_pagecount; ret = _ncr_session_grow_pages(ses, pagecount); if (ret != 0) { err(); return ret; } if (__get_userbuf((void __user *)src.data, input_size, write_src, src_pagecount, ses->pages, ses->sg)) { err(); printk("write: %d\n", write_src); return -EINVAL; } (*src_sg) = ses->sg; *src_cnt = src_pagecount; if (dst_pagecount) { *dst_cnt = dst_pagecount; (*dst_sg) = ses->sg + src_pagecount; if (__get_userbuf(dst->buffer, dst->buffer_size, 1, dst_pagecount, ses->pages + src_pagecount, *dst_sg)) { err(); release_user_pages(ses->pages, src_pagecount); return -EINVAL; } } else { if (dst_nla != NULL) { *dst_cnt = src_pagecount; (*dst_sg) = (*src_sg); } else { *dst_cnt = 0; *dst_sg = NULL; } } ses->available_pages = pagecount; return 0; } /* Called when userspace buffers are used */ static int _ncr_session_update(struct ncr_lists *lists, ncr_session_t ses, struct nlattr *tb[], int compat) { int ret; struct session_item_st* sess; struct scatterlist *isg = NULL; struct scatterlist *osg = NULL; unsigned osg_cnt=0, isg_cnt=0; size_t isg_size = 0, osg_size; struct ncr_session_output_buffer out; sess = ncr_sessions_item_get(lists, ses); if (sess == NULL) { err(); return -EINVAL; } if (mutex_lock_interruptible(&sess->mem_mutex)) { err(); _ncr_sessions_item_put(sess); return -ERESTARTSYS; } ret = get_userbuf2(sess, tb, &isg, &isg_cnt, &isg_size, &out, &osg, &osg_cnt, compat); if (ret < 0) { err(); goto fail; } switch(sess->op) { case NCR_OP_ENCRYPT: if (osg == NULL) { err(); ret = -EINVAL; goto fail; } osg_size = out.buffer_size; if (osg_size < isg_size) { err(); ret = -EINVAL; goto fail; } ret = _ncr_session_encrypt(sess, isg, isg_cnt, isg_size, osg, osg_cnt, &osg_size); if (ret < 0) { err(); goto fail; } ret = ncr_session_output_buffer_set_size(&out, osg_size, compat); if (ret != 0) { err(); goto fail; } break; case NCR_OP_DECRYPT: if (osg == NULL) { err(); ret = -EINVAL; goto fail; } osg_size = out.buffer_size; if (osg_size < isg_size) { err(); ret = -EINVAL; goto fail; } ret = _ncr_session_decrypt(sess, isg, isg_cnt, isg_size, osg, osg_cnt, &osg_size); if (ret < 0) { err(); goto fail; } ret = ncr_session_output_buffer_set_size(&out, osg_size, compat); if (ret != 0) { err(); goto fail; } break; case NCR_OP_SIGN: case NCR_OP_VERIFY: ret = cryptodev_hash_update(&sess->hash, isg, isg_size); if (ret < 0) { err(); goto fail; } break; default: err(); ret = -EINVAL; goto fail; } ret = 0; fail: if (sess->available_pages) { release_user_pages(sess->pages, sess->available_pages); sess->available_pages = 0; } mutex_unlock(&sess->mem_mutex); _ncr_sessions_item_put(sess); return ret; } static int try_session_update(struct ncr_lists *lists, ncr_session_t ses, struct nlattr *tb[], int compat) { if (tb[NCR_ATTR_UPDATE_INPUT_KEY_AS_DATA] != NULL) return _ncr_session_update_key(lists, ses, tb); else if (tb[NCR_ATTR_UPDATE_INPUT_DATA] != NULL) return _ncr_session_update(lists, ses, tb, compat); return 0; } static int _ncr_session_final(struct ncr_lists *lists, ncr_session_t ses, struct nlattr *tb[], int compat) { const struct nlattr *nla; int ret; struct session_item_st* sess; int digest_size; uint8_t digest[NCR_HASH_MAX_OUTPUT_SIZE]; void *buffer = NULL; sess = ncr_sessions_item_get(lists, ses); if (sess == NULL) { err(); return -EINVAL; } ret = try_session_update(lists, ses, tb, compat); if (ret < 0) { err(); _ncr_sessions_item_put(sess); return ret; } if (mutex_lock_interruptible(&sess->mem_mutex)) { err(); _ncr_sessions_item_put(sess); return -ERESTARTSYS; } switch(sess->op) { case NCR_OP_ENCRYPT: case NCR_OP_DECRYPT: break; case NCR_OP_VERIFY: { struct ncr_session_input_data src; nla = tb[NCR_ATTR_FINAL_INPUT_DATA]; ret = ncr_session_input_data_from_nla(&src, nla, compat); if (unlikely(ret != 0)) { err(); goto fail; } buffer = kmalloc(src.data_size, GFP_KERNEL); if (buffer == NULL) { err(); ret = -ENOMEM; goto fail; } if (unlikely(copy_from_user(buffer, src.data, src.data_size))) { err(); ret = -EFAULT; goto fail; } digest_size = sess->hash.digestsize; if (digest_size == 0 || sizeof(digest) < digest_size) { err(); ret = -EINVAL; goto fail; } ret = cryptodev_hash_final(&sess->hash, digest); if (ret < 0) { err(); goto fail; } if (!sess->algorithm->is_pk) ret = (digest_size == src.data_size && memcmp(buffer, digest, digest_size) == 0); else { ret = ncr_pk_cipher_verify(&sess->pk, buffer, src.data_size, digest, digest_size); if (ret < 0) { err(); goto fail; } } break; } case NCR_OP_SIGN: { struct ncr_session_output_buffer dst; size_t output_size; nla = tb[NCR_ATTR_FINAL_OUTPUT_BUFFER]; ret = ncr_session_output_buffer_from_nla(&dst, nla, compat); if (unlikely(ret != 0)) { err(); goto fail; } digest_size = sess->hash.digestsize; if (digest_size == 0) { err(); ret = -EINVAL; goto fail; } ret = cryptodev_hash_final(&sess->hash, digest); if (ret < 0) { err(); goto fail; } cryptodev_hash_deinit(&sess->hash); if (!sess->algorithm->is_pk) { if (dst.buffer_size < digest_size) { err(); ret = -ERANGE; goto fail; } if (unlikely(copy_to_user(dst.buffer, digest, digest_size))) { err(); ret = -EFAULT; goto fail; } output_size = digest_size; } else { output_size = dst.buffer_size; buffer = kmalloc(output_size, GFP_KERNEL); if (buffer == NULL) { err(); ret = -ENOMEM; goto fail; } ret = ncr_pk_cipher_sign(&sess->pk, digest, digest_size, buffer, &output_size); if (ret < 0) { err(); goto fail; } if (unlikely(copy_to_user(dst.buffer, buffer, output_size))) { err(); ret = -EFAULT; goto fail; } } ret = ncr_session_output_buffer_set_size(&dst, output_size, compat); if (ret != 0) { err(); goto fail; } break; } default: err(); ret = -EINVAL; goto fail; } fail: mutex_unlock(&sess->mem_mutex); kfree(buffer); cryptodev_hash_deinit(&sess->hash); if (sess->algorithm->is_symmetric) { cryptodev_cipher_deinit(&sess->cipher); } else { ncr_pk_cipher_deinit(&sess->pk); } _ncr_sessions_item_put(sess); _ncr_session_remove(lists, ses); return ret; } /* Direct with key: Allows to hash a key */ static int _ncr_session_update_key(struct ncr_lists *lists, ncr_session_t ses, struct nlattr *tb[]) { int ret; struct session_item_st* sess; struct key_item_st* key = NULL; sess = ncr_sessions_item_get(lists, ses); if (sess == NULL) { err(); return -EINVAL; } /* read key */ ret = key_item_get_nla_read(&key, lists, tb[NCR_ATTR_UPDATE_INPUT_KEY_AS_DATA]); if (ret < 0) { err(); goto fail; } if (key->type != NCR_KEY_TYPE_SECRET) { err(); ret = -EINVAL; goto fail; } switch(sess->op) { case NCR_OP_ENCRYPT: case NCR_OP_DECRYPT: err(); ret = -EINVAL; goto fail; case NCR_OP_SIGN: case NCR_OP_VERIFY: ret = _cryptodev_hash_update(&sess->hash, key->key.secret.data, key->key.secret.size); if (ret < 0) { err(); goto fail; } break; default: err(); ret = -EINVAL; goto fail; } ret = 0; fail: if (key) _ncr_key_item_put(key); _ncr_sessions_item_put(sess); return ret; } int ncr_session_update(struct ncr_lists *lists, const struct ncr_session_update *op, struct nlattr *tb[], int compat) { int ret; if (tb[NCR_ATTR_UPDATE_INPUT_DATA] != NULL) ret = _ncr_session_update(lists, op->ses, tb, compat); else if (tb[NCR_ATTR_UPDATE_INPUT_KEY_AS_DATA] != NULL) ret = _ncr_session_update_key(lists, op->ses, tb); else ret = -EINVAL; if (unlikely(ret)) { err(); return ret; } return 0; } int ncr_session_final(struct ncr_lists *lists, const struct ncr_session_final *op, struct nlattr *tb[], int compat) { return _ncr_session_final(lists, op->ses, tb, compat); } int ncr_session_once(struct ncr_lists *lists, const struct ncr_session_once *once, struct nlattr *tb[], int compat) { int ret; ret = _ncr_session_init(lists, once->op, tb); if (ret < 0) { err(); return ret; } ret = _ncr_session_final(lists, ret, tb, compat); if (ret < 0) { err(); return ret; } return ret; }