/* * New driver for /dev/crypto device (aka CryptoDev) * Copyright (c) 2010 Nikos Mavrogiannopoulos * * This file is part of linux cryptodev. * * cryptodev is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * cryptodev is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see . */ #include #include #include #include #include "cryptodev.h" #include #include #include #include #include #include "ncr.h" #include "ncr_int.h" #include /* This is the master wrapping key for storage of keys */ struct key_item_st master_key; void* ncr_init_lists(void) { struct ncr_lists *lst; lst = kmalloc(sizeof(*lst), GFP_KERNEL); if(!lst) { err(); return NULL; } memset(lst, 0, sizeof(*lst)); init_MUTEX(&lst->data.sem); INIT_LIST_HEAD(&lst->data.list); init_MUTEX(&lst->key.sem); INIT_LIST_HEAD(&lst->key.list); init_MUTEX(&lst->sessions.sem); INIT_LIST_HEAD(&lst->sessions.list); return lst; } void ncr_deinit_lists(struct ncr_lists *lst) { if(lst) { ncr_data_list_deinit(&lst->data); ncr_key_list_deinit(&lst->key); ncr_sessions_list_deinit(&lst->sessions); kfree(lst); } } void ncr_master_key_reset(void) { memset(&master_key, 0, sizeof(master_key)); } static int ncr_master_key_set(void __user *arg) { struct ncr_master_key_st st; if (current_euid() != 0 && !capable(CAP_SYS_ADMIN)) { err(); return -EPERM; } if (unlikely(copy_from_user(&st, arg, sizeof(st)))) { err(); return -EFAULT; } if (st.key_size > sizeof(master_key.key.secret.data)) { err(); return -EINVAL; } if (st.key_size != 16 && st.key_size != 24 && st.key_size != 32) { dprintk(0, KERN_DEBUG, "Master key size must be 16,24 or 32.\n"); return -EINVAL; } if (master_key.type != NCR_KEY_TYPE_INVALID) { dprintk(0, KERN_DEBUG, "Master key was previously initialized.\n"); } dprintk(0, KERN_INFO, "Intializing master key.\n"); master_key.type = NCR_KEY_TYPE_SECRET; memcpy(master_key.key.secret.data, st.key, st.key_size); master_key.key.secret.size = st.key_size; return 0; } int ncr_ioctl(struct ncr_lists* lst, struct file *filp, unsigned int cmd, unsigned long arg_) { void __user *arg = (void __user *)arg_; if (unlikely(!lst)) BUG(); switch (cmd) { case NCRIO_DATA_INIT: return ncr_data_init(&lst->data, arg); case NCRIO_DATA_GET: return ncr_data_get(&lst->data, arg); case NCRIO_DATA_SET: return ncr_data_set(&lst->data, arg); case NCRIO_DATA_DEINIT: return ncr_data_deinit(&lst->data, arg); case NCRIO_KEY_INIT: return ncr_key_init(&lst->key, arg); case NCRIO_KEY_DEINIT: return ncr_key_deinit(&lst->key, arg); case NCRIO_KEY_GENERATE: return ncr_key_generate(&lst->key, arg); case NCRIO_KEY_EXPORT: return ncr_key_export(&lst->data, &lst->key, arg); case NCRIO_KEY_IMPORT: return ncr_key_import(&lst->data, &lst->key, arg); case NCRIO_KEY_GET_INFO: return ncr_key_info(&lst->key, arg); case NCRIO_KEY_WRAP: return ncr_key_wrap(&lst->key, &lst->data, arg); case NCRIO_KEY_UNWRAP: return ncr_key_unwrap(&lst->key, &lst->data, arg); case NCRIO_KEY_STORAGE_WRAP: return ncr_key_storage_wrap(&lst->key, &lst->data, arg); case NCRIO_KEY_STORAGE_UNWRAP: return ncr_key_storage_unwrap(&lst->key, &lst->data, arg); case NCRIO_SESSION_INIT: return ncr_session_init(lst, arg); case NCRIO_SESSION_UPDATE: return ncr_session_update(lst, arg); case NCRIO_SESSION_FINAL: return ncr_session_final(lst, arg); case NCRIO_SESSION_ONCE: return ncr_session_once(lst, arg); case NCRIO_MASTER_KEY_SET: return ncr_master_key_set(arg); case NCRIO_KEY_GENERATE_PAIR: return ncr_key_generate_pair(&lst->key, arg); #if 0 case NCRIO_KEY_DERIVE: return ncr_key_derive(&lst->key, arg); #endif default: return -EINVAL; } } /* Returns NCR_KEY_TYPE_SECRET if a secret key algorithm or MAC is given, * and NCR_KEY_TYPE_PUBLIC if a public key algorithm is given. */ ncr_key_type_t ncr_algorithm_to_key_type(ncr_algorithm_t algo) { switch(algo) { case NCR_ALG_3DES_CBC: case NCR_ALG_AES_CBC: case NCR_ALG_CAMELLIA_CBC: case NCR_ALG_ARCFOUR: case NCR_ALG_HMAC_SHA1: case NCR_ALG_HMAC_MD5: case NCR_ALG_HMAC_SHA2_224: case NCR_ALG_HMAC_SHA2_256: case NCR_ALG_HMAC_SHA2_384: case NCR_ALG_HMAC_SHA2_512: return NCR_KEY_TYPE_SECRET; case NCR_ALG_RSA: case NCR_ALG_DSA: return NCR_KEY_TYPE_PUBLIC; default: return NCR_KEY_TYPE_INVALID; } }