xref: /freebsd/sys/contrib/openzfs/module/icp/core/kcf_prov_lib.c (revision 61145dc2b94f12f6a47344fb9aac702321880e43)
1 // SPDX-License-Identifier: CDDL-1.0
2 /*
3  * CDDL HEADER START
4  *
5  * The contents of this file are subject to the terms of the
6  * Common Development and Distribution License (the "License").
7  * You may not use this file except in compliance with the License.
8  *
9  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10  * or https://opensource.org/licenses/CDDL-1.0.
11  * See the License for the specific language governing permissions
12  * and limitations under the License.
13  *
14  * When distributing Covered Code, include this CDDL HEADER in each
15  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16  * If applicable, add the following below this CDDL HEADER, with the
17  * fields enclosed by brackets "[]" replaced with your own identifying
18  * information: Portions Copyright [yyyy] [name of copyright owner]
19  *
20  * CDDL HEADER END
21  */
22 /*
23  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
24  * Use is subject to license terms.
25  */
26 
27 #include <sys/zfs_context.h>
28 #include <modes/modes.h>
29 #include <sys/crypto/common.h>
30 #include <sys/crypto/impl.h>
31 
32 /*
33  * Utility routine to copy a buffer to a crypto_data structure.
34  */
35 
36 /*
37  * Utility routine to apply the command COPY_TO_DATA to the
38  * data in the uio structure.
39  */
40 static int
crypto_uio_copy_to_data(crypto_data_t * data,uchar_t * buf,int len)41 crypto_uio_copy_to_data(crypto_data_t *data, uchar_t *buf, int len)
42 {
43 	zfs_uio_t *uiop = data->cd_uio;
44 	off_t offset = data->cd_offset;
45 	size_t length = len;
46 	uint_t vec_idx;
47 	size_t cur_len;
48 	uchar_t *datap;
49 
50 	ASSERT(data->cd_format == CRYPTO_DATA_UIO);
51 	if (zfs_uio_segflg(uiop) != UIO_SYSSPACE) {
52 		return (CRYPTO_ARGUMENTS_BAD);
53 	}
54 
55 	/*
56 	 * Jump to the first iovec containing data to be
57 	 * processed.
58 	 */
59 	offset = zfs_uio_index_at_offset(uiop, offset, &vec_idx);
60 
61 	if (vec_idx == zfs_uio_iovcnt(uiop) && length > 0) {
62 		/*
63 		 * The caller specified an offset that is larger than
64 		 * the total size of the buffers it provided.
65 		 */
66 		return (CRYPTO_DATA_LEN_RANGE);
67 	}
68 
69 	while (vec_idx < zfs_uio_iovcnt(uiop) && length > 0) {
70 		cur_len = MIN(zfs_uio_iovlen(uiop, vec_idx) -
71 		    offset, length);
72 
73 		datap = (uchar_t *)(zfs_uio_iovbase(uiop, vec_idx) + offset);
74 		memcpy(datap, buf, cur_len);
75 		buf += cur_len;
76 
77 		length -= cur_len;
78 		vec_idx++;
79 		offset = 0;
80 	}
81 
82 	if (vec_idx == zfs_uio_iovcnt(uiop) && length > 0) {
83 		/*
84 		 * The end of the specified iovecs was reached but
85 		 * the length requested could not be processed.
86 		 */
87 		data->cd_length = len;
88 		return (CRYPTO_BUFFER_TOO_SMALL);
89 	}
90 
91 	return (CRYPTO_SUCCESS);
92 }
93 
94 int
crypto_put_output_data(uchar_t * buf,crypto_data_t * output,int len)95 crypto_put_output_data(uchar_t *buf, crypto_data_t *output, int len)
96 {
97 	switch (output->cd_format) {
98 	case CRYPTO_DATA_RAW:
99 		if (output->cd_raw.iov_len < len) {
100 			output->cd_length = len;
101 			return (CRYPTO_BUFFER_TOO_SMALL);
102 		}
103 		memcpy((uchar_t *)(output->cd_raw.iov_base +
104 		    output->cd_offset), buf, len);
105 		break;
106 
107 	case CRYPTO_DATA_UIO:
108 		return (crypto_uio_copy_to_data(output, buf, len));
109 	default:
110 		return (CRYPTO_ARGUMENTS_BAD);
111 	}
112 
113 	return (CRYPTO_SUCCESS);
114 }
115 
116 int
crypto_update_iov(void * ctx,crypto_data_t * input,crypto_data_t * output,int (* cipher)(void *,caddr_t,size_t,crypto_data_t *))117 crypto_update_iov(void *ctx, crypto_data_t *input, crypto_data_t *output,
118     int (*cipher)(void *, caddr_t, size_t, crypto_data_t *))
119 {
120 	ASSERT(input != output);
121 
122 	if (input->cd_raw.iov_len < input->cd_length)
123 		return (CRYPTO_ARGUMENTS_BAD);
124 
125 	return ((cipher)(ctx, input->cd_raw.iov_base + input->cd_offset,
126 	    input->cd_length, output));
127 }
128 
129 int
crypto_update_uio(void * ctx,crypto_data_t * input,crypto_data_t * output,int (* cipher)(void *,caddr_t,size_t,crypto_data_t *))130 crypto_update_uio(void *ctx, crypto_data_t *input, crypto_data_t *output,
131     int (*cipher)(void *, caddr_t, size_t, crypto_data_t *))
132 {
133 	zfs_uio_t *uiop = input->cd_uio;
134 	off_t offset = input->cd_offset;
135 	size_t length = input->cd_length;
136 	uint_t vec_idx;
137 	size_t cur_len;
138 
139 	ASSERT(input != output);
140 
141 	if (zfs_uio_segflg(input->cd_uio) != UIO_SYSSPACE) {
142 		return (CRYPTO_ARGUMENTS_BAD);
143 	}
144 
145 	/*
146 	 * Jump to the first iovec containing data to be
147 	 * processed.
148 	 */
149 	offset = zfs_uio_index_at_offset(uiop, offset, &vec_idx);
150 	if (vec_idx == zfs_uio_iovcnt(uiop) && length > 0) {
151 		/*
152 		 * The caller specified an offset that is larger than the
153 		 * total size of the buffers it provided.
154 		 */
155 		return (CRYPTO_DATA_LEN_RANGE);
156 	}
157 
158 	/*
159 	 * Now process the iovecs.
160 	 */
161 	while (vec_idx < zfs_uio_iovcnt(uiop) && length > 0) {
162 		cur_len = MIN(zfs_uio_iovlen(uiop, vec_idx) -
163 		    offset, length);
164 
165 		int rv = (cipher)(ctx, zfs_uio_iovbase(uiop, vec_idx) + offset,
166 		    cur_len, output);
167 
168 		if (rv != CRYPTO_SUCCESS) {
169 			return (rv);
170 		}
171 		length -= cur_len;
172 		vec_idx++;
173 		offset = 0;
174 	}
175 
176 	if (vec_idx == zfs_uio_iovcnt(uiop) && length > 0) {
177 		/*
178 		 * The end of the specified iovec's was reached but
179 		 * the length requested could not be processed, i.e.
180 		 * The caller requested to digest more data than it provided.
181 		 */
182 
183 		return (CRYPTO_DATA_LEN_RANGE);
184 	}
185 
186 	return (CRYPTO_SUCCESS);
187 }
188