1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
|
/*
* New driver for /dev/crypto device (aka CryptoDev)
* Copyright (c) 2010 Nikos Mavrogiannopoulos <nmav@gnutls.org>
*
* This file is part of linux cryptodev.
*
* cryptodev is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* cryptodev is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include <linux/mm.h>
#include "cryptodev.h"
#include <asm/uaccess.h>
#include <asm/ioctl.h>
#include <linux/scatterlist.h>
#include "ncr.h"
#include "ncr_int.h"
#include "cryptodev_int.h"
struct packed_key {
uint8_t type;
uint32_t flags;
uint16_t algorithm; /* valid for public/private keys */
uint8_t key_id[MAX_KEY_ID_SIZE];
uint8_t key_id_size;
uint8_t raw[KEY_DATA_MAX_SIZE];
uint32_t raw_size;
} __attribute__((__packed__));
int key_to_storage_data( uint8_t** sdata, size_t * sdata_size, const struct key_item_st *key)
{
struct packed_key * pkey;
int ret;
pkey = kmalloc(sizeof(*pkey), GFP_KERNEL);
if (pkey == NULL) {
err();
return -ENOMEM;
}
pkey->type = key->type;
pkey->flags = key->flags;
pkey->algorithm = key->algorithm->algo;
pkey->key_id_size = key->key_id_size;
memcpy(pkey->key_id, key->key_id, key->key_id_size);
if (key->type == NCR_KEY_TYPE_SECRET) {
pkey->raw_size = key->key.secret.size;
memcpy(pkey->raw, key->key.secret.data, pkey->raw_size);
} else if (key->type == NCR_KEY_TYPE_PRIVATE || key->type == NCR_KEY_TYPE_PUBLIC) {
pkey->raw_size = sizeof(pkey->raw);
ret = ncr_pk_pack( key, pkey->raw, &pkey->raw_size);
if (ret < 0) {
err();
goto fail;
}
} else {
err();
ret = -EINVAL;
goto fail;
}
*sdata = (void*)pkey;
*sdata_size = sizeof(*pkey);
return 0;
fail:
kfree(pkey);
return ret;
}
int key_from_storage_data(struct key_item_st* key, const void* data, size_t data_size)
{
const struct packed_key * pkey = data;
int ret;
if (data_size != sizeof(*pkey) || pkey->key_id_size > MAX_KEY_ID_SIZE) {
err();
return -EINVAL;
}
key->type = pkey->type;
key->flags = pkey->flags;
key->algorithm = _ncr_algo_to_properties(pkey->algorithm);
if (key->algorithm == NULL) {
err();
return -EINVAL;
}
key->key_id_size = pkey->key_id_size;
memcpy(key->key_id, pkey->key_id, pkey->key_id_size);
if (key->type == NCR_KEY_TYPE_SECRET) {
if (pkey->raw_size > NCR_CIPHER_MAX_KEY_LEN) {
err();
return -EINVAL;
}
key->key.secret.size = pkey->raw_size;
memcpy(key->key.secret.data, pkey->raw, pkey->raw_size);
} else if (key->type == NCR_KEY_TYPE_PUBLIC
|| key->type == NCR_KEY_TYPE_PRIVATE) {
ret = ncr_pk_unpack( key, pkey->raw, pkey->raw_size);
if (ret < 0) {
err();
return ret;
}
} else {
err();
return -EINVAL;
}
return 0;
}
|