summaryrefslogtreecommitdiffstats
path: root/ncr-key-storage.c
blob: 90d3f744775c6c65495e9d90af5050a0e526d8f5 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
/*
 * New driver for /dev/crypto device (aka CryptoDev)

 * Copyright (c) 2010 Nikos Mavrogiannopoulos <nmav@gnutls.org>
 *
 * This file is part of linux cryptodev.
 *
 * cryptodev is free software: you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation, either version 3 of the License, or
 * (at your option) any later version.
 *
 * cryptodev is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program.  If not, see <http://www.gnu.org/licenses/>.
 */

#include <linux/mm.h>
#include "cryptodev.h"
#include <asm/uaccess.h>
#include <asm/ioctl.h>
#include <linux/scatterlist.h>
#include "ncr.h"
#include "ncr_int.h"
#include "cryptodev_int.h"

struct packed_key {
	uint8_t type;
	uint32_t flags;
	uint16_t algorithm; /* valid for public/private keys */
	uint8_t key_id[MAX_KEY_ID_SIZE];
	uint8_t key_id_size;

	uint8_t raw[KEY_DATA_MAX_SIZE];
	uint32_t raw_size;
} __attribute__((__packed__));

int key_to_storage_data( uint8_t** sdata, size_t * sdata_size, const struct key_item_st *key)
{
	struct packed_key * pkey;
	int ret;

	pkey = kmalloc(sizeof(*pkey), GFP_KERNEL);
	if (pkey == NULL) {
		err();
		return -ENOMEM;
	}

	pkey->type = key->type;
	pkey->flags = key->flags;
	pkey->algorithm = key->algorithm->algo;
	pkey->key_id_size = key->key_id_size;
	memcpy(pkey->key_id, key->key_id, key->key_id_size);

	if (key->type == NCR_KEY_TYPE_SECRET) {
		pkey->raw_size = key->key.secret.size;
		memcpy(pkey->raw, key->key.secret.data, pkey->raw_size);
	} else if (key->type == NCR_KEY_TYPE_PRIVATE || key->type == NCR_KEY_TYPE_PUBLIC) {
		pkey->raw_size = sizeof(pkey->raw);
		ret = ncr_pk_pack( key, pkey->raw, &pkey->raw_size);
		if (ret < 0) {
			err();
			goto fail;
		}
	} else {
		err();
		ret = -EINVAL;
		goto fail;
	}

	*sdata = (void*)pkey;
	*sdata_size = sizeof(*pkey);

	return 0;
fail:
	kfree(pkey);

	return ret;
}

int key_from_storage_data(struct key_item_st* key, const void* data, size_t data_size)
{
	const struct packed_key * pkey = data;
	int ret;

	if (data_size != sizeof(*pkey) || pkey->key_id_size > MAX_KEY_ID_SIZE) {
		err();
		return -EINVAL;
	}

	key->type = pkey->type;
	key->flags = pkey->flags;

	key->algorithm = _ncr_algo_to_properties(pkey->algorithm);
	if (key->algorithm == NULL) {
		err();
		return -EINVAL;
	}
	key->key_id_size = pkey->key_id_size;
	memcpy(key->key_id, pkey->key_id, pkey->key_id_size);

	if (key->type == NCR_KEY_TYPE_SECRET) {
		if (pkey->raw_size > NCR_CIPHER_MAX_KEY_LEN) {
			err();
			return -EINVAL;
		}
		key->key.secret.size = pkey->raw_size;
		memcpy(key->key.secret.data, pkey->raw, pkey->raw_size);
	} else if (key->type == NCR_KEY_TYPE_PUBLIC 
		|| key->type == NCR_KEY_TYPE_PRIVATE) {
		ret = ncr_pk_unpack( key, pkey->raw, pkey->raw_size);
		if (ret < 0) {
			err();
			return ret;
		}
	} else {
		err();
		return -EINVAL;
	}

	return 0;
}