1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright 2006 Sun Microsystems, Inc. All rights reserved. 23 * Use is subject to license terms. 24 */ 25 26 #pragma ident "%Z%%M% %I% %E% SMI" 27 28 /* 29 * This file is part of the core Kernel Cryptographic Framework. 30 * It implements the SPI functions exported to cryptographic 31 * providers. 32 */ 33 34 #include <sys/ksynch.h> 35 #include <sys/cmn_err.h> 36 #include <sys/ddi.h> 37 #include <sys/sunddi.h> 38 #include <sys/modctl.h> 39 #include <sys/crypto/common.h> 40 #include <sys/crypto/impl.h> 41 #include <sys/crypto/sched_impl.h> 42 #include <sys/crypto/spi.h> 43 #include <sys/taskq.h> 44 #include <sys/disp.h> 45 #include <sys/kstat.h> 46 #include <sys/policy.h> 47 48 /* 49 * minalloc and maxalloc values to be used for taskq_create(). 50 */ 51 int crypto_taskq_minalloc = CYRPTO_TASKQ_MIN; 52 int crypto_taskq_maxalloc = CRYPTO_TASKQ_MAX; 53 54 static void free_provider_list(kcf_provider_list_t *); 55 static void remove_provider(kcf_provider_desc_t *); 56 static void process_logical_providers(crypto_provider_info_t *, 57 kcf_provider_desc_t *); 58 static void copy_ops_vector_v1(crypto_ops_t *, crypto_ops_t *); 59 static void copy_ops_vector_v2(crypto_ops_t *, crypto_ops_t *); 60 static int init_prov_mechs(crypto_provider_info_t *, kcf_provider_desc_t *); 61 static int kcf_prov_kstat_update(kstat_t *, int); 62 63 static kcf_prov_stats_t kcf_stats_ks_data_template = { 64 { "kcf_ops_total", KSTAT_DATA_UINT64 }, 65 { "kcf_ops_passed", KSTAT_DATA_UINT64 }, 66 { "kcf_ops_failed", KSTAT_DATA_UINT64 }, 67 { "kcf_ops_returned_busy", KSTAT_DATA_UINT64 } 68 }; 69 70 #define KCF_SPI_COPY_OPS(src, dst, ops) if ((src)->ops != NULL) \ 71 *((dst)->ops) = *((src)->ops); 72 73 /* 74 * This routine is used to add cryptographic providers to the KEF framework. 75 * Providers pass a crypto_provider_info structure to crypto_register_provider() 76 * and get back a handle. The crypto_provider_info structure contains a 77 * list of mechanisms supported by the provider and an ops vector containing 78 * provider entry points. Hardware providers call this routine in their attach 79 * routines. Software providers call this routine in their _init() routine. 80 */ 81 int 82 crypto_register_provider(crypto_provider_info_t *info, 83 crypto_kcf_provider_handle_t *handle) 84 { 85 int i; 86 int vstatus = 0; 87 struct modctl *mcp; 88 char *name; 89 char ks_name[KSTAT_STRLEN]; 90 crypto_notify_event_change_t ec; 91 92 kcf_provider_desc_t *prov_desc = NULL; 93 int ret = CRYPTO_ARGUMENTS_BAD; 94 95 if (info->pi_interface_version > CRYPTO_SPI_VERSION_2) 96 return (CRYPTO_VERSION_MISMATCH); 97 98 /* 99 * Check provider type, must be software, hardware, or logical. 100 */ 101 if (info->pi_provider_type != CRYPTO_HW_PROVIDER && 102 info->pi_provider_type != CRYPTO_SW_PROVIDER && 103 info->pi_provider_type != CRYPTO_LOGICAL_PROVIDER) 104 return (CRYPTO_ARGUMENTS_BAD); 105 106 /* 107 * Allocate and initialize a new provider descriptor. We also 108 * hold it and release it when done. 109 */ 110 prov_desc = kcf_alloc_provider_desc(info); 111 KCF_PROV_REFHOLD(prov_desc); 112 113 prov_desc->pd_prov_type = info->pi_provider_type; 114 115 /* provider-private handle, opaque to KCF */ 116 prov_desc->pd_prov_handle = info->pi_provider_handle; 117 118 /* copy provider description string */ 119 if (info->pi_provider_description != NULL) { 120 /* 121 * pi_provider_descriptor is a string that can contain 122 * up to CRYPTO_PROVIDER_DESCR_MAX_LEN + 1 characters 123 * INCLUDING the terminating null character. A bcopy() 124 * is necessary here as pd_description should not have 125 * a null character. See comments in kcf_alloc_provider_desc() 126 * for details on pd_description field. 127 */ 128 bcopy(info->pi_provider_description, prov_desc->pd_description, 129 min(strlen(info->pi_provider_description), 130 CRYPTO_PROVIDER_DESCR_MAX_LEN)); 131 } 132 133 if (info->pi_provider_type != CRYPTO_LOGICAL_PROVIDER) { 134 if (info->pi_ops_vector == NULL) { 135 return (CRYPTO_ARGUMENTS_BAD); 136 } 137 copy_ops_vector_v1(info->pi_ops_vector, 138 prov_desc->pd_ops_vector); 139 if (info->pi_interface_version == CRYPTO_SPI_VERSION_2) { 140 copy_ops_vector_v2(info->pi_ops_vector, 141 prov_desc->pd_ops_vector); 142 prov_desc->pd_flags = info->pi_flags; 143 } 144 } 145 146 /* 147 * For software providers, copy the module name and module ID. 148 * For hardware providers, copy the driver name and instance. 149 */ 150 switch (info->pi_provider_type) { 151 case CRYPTO_SW_PROVIDER: 152 if (info->pi_provider_dev.pd_sw == NULL) 153 goto bail; 154 155 if ((mcp = mod_getctl(info->pi_provider_dev.pd_sw)) == NULL) 156 goto bail; 157 158 prov_desc->pd_module_id = mcp->mod_id; 159 name = mcp->mod_modname; 160 break; 161 162 case CRYPTO_HW_PROVIDER: 163 case CRYPTO_LOGICAL_PROVIDER: 164 if (info->pi_provider_dev.pd_hw == NULL) 165 goto bail; 166 167 prov_desc->pd_instance = 168 ddi_get_instance(info->pi_provider_dev.pd_hw); 169 name = (char *)ddi_driver_name(info->pi_provider_dev.pd_hw); 170 break; 171 } 172 if (name == NULL) 173 goto bail; 174 175 prov_desc->pd_name = kmem_alloc(strlen(name) + 1, KM_SLEEP); 176 (void) strcpy(prov_desc->pd_name, name); 177 178 if ((prov_desc->pd_mctlp = kcf_get_modctl(info)) == NULL) 179 goto bail; 180 181 /* process the mechanisms supported by the provider */ 182 if ((ret = init_prov_mechs(info, prov_desc)) != CRYPTO_SUCCESS) 183 goto bail; 184 185 /* 186 * Add provider to providers tables, also sets the descriptor 187 * pd_prov_id field. 188 */ 189 if ((ret = kcf_prov_tab_add_provider(prov_desc)) != CRYPTO_SUCCESS) { 190 undo_register_provider(prov_desc, B_FALSE); 191 goto bail; 192 } 193 194 if (info->pi_provider_type != CRYPTO_LOGICAL_PROVIDER) { 195 if ((vstatus = kcf_verify_signature(prov_desc)) == 196 CRYPTO_MODVERIFICATION_FAILED) { 197 undo_register_provider(prov_desc, B_TRUE); 198 ret = CRYPTO_MODVERIFICATION_FAILED; 199 goto bail; 200 } 201 } 202 203 /* 204 * We create a taskq only for a hardware provider. The global 205 * software queue is used for software providers. The taskq 206 * is limited to one thread since tasks are guaranteed to be 207 * executed in the order they are scheduled, if nthreads == 1. We 208 * pass TASKQ_PREPOPULATE flag to keep some entries cached to 209 * improve performance. 210 */ 211 if (prov_desc->pd_prov_type == CRYPTO_HW_PROVIDER) 212 prov_desc->pd_sched_info.ks_taskq = taskq_create("kcf_taskq", 213 1, minclsyspri, crypto_taskq_minalloc, 214 crypto_taskq_maxalloc, TASKQ_PREPOPULATE); 215 else 216 prov_desc->pd_sched_info.ks_taskq = NULL; 217 218 /* no kernel session to logical providers */ 219 if (prov_desc->pd_prov_type != CRYPTO_LOGICAL_PROVIDER) { 220 /* 221 * Open a session for session-oriented providers. This session 222 * is used for all kernel consumers. This is fine as a provider 223 * is required to support multiple thread access to a session. 224 * We can do this only after the taskq has been created as we 225 * do a kcf_submit_request() to open the session. 226 */ 227 if (KCF_PROV_SESSION_OPS(prov_desc) != NULL) { 228 kcf_req_params_t params; 229 230 KCF_WRAP_SESSION_OPS_PARAMS(¶ms, 231 KCF_OP_SESSION_OPEN, &prov_desc->pd_sid, 0, 232 CRYPTO_USER, NULL, 0, prov_desc); 233 ret = kcf_submit_request(prov_desc, NULL, NULL, ¶ms, 234 B_FALSE); 235 236 if (ret != CRYPTO_SUCCESS) { 237 undo_register_provider(prov_desc, B_TRUE); 238 ret = CRYPTO_FAILED; 239 goto bail; 240 } 241 } 242 } 243 244 if (prov_desc->pd_prov_type != CRYPTO_LOGICAL_PROVIDER) { 245 /* 246 * Create the kstat for this provider. There is a kstat 247 * installed for each successfully registered provider. 248 * This kstat is deleted, when the provider unregisters. 249 */ 250 if (prov_desc->pd_prov_type == CRYPTO_SW_PROVIDER) { 251 (void) snprintf(ks_name, KSTAT_STRLEN, "%s_%s", 252 prov_desc->pd_name, "provider_stats"); 253 } else { 254 (void) snprintf(ks_name, KSTAT_STRLEN, "%s_%d_%u_%s", 255 prov_desc->pd_name, prov_desc->pd_instance, 256 prov_desc->pd_prov_id, "provider_stats"); 257 } 258 259 prov_desc->pd_kstat = kstat_create("kcf", 0, ks_name, "crypto", 260 KSTAT_TYPE_NAMED, sizeof (kcf_prov_stats_t) / 261 sizeof (kstat_named_t), KSTAT_FLAG_VIRTUAL); 262 263 if (prov_desc->pd_kstat != NULL) { 264 bcopy(&kcf_stats_ks_data_template, 265 &prov_desc->pd_ks_data, 266 sizeof (kcf_stats_ks_data_template)); 267 prov_desc->pd_kstat->ks_data = &prov_desc->pd_ks_data; 268 KCF_PROV_REFHOLD(prov_desc); 269 KCF_PROV_IREFHOLD(prov_desc); 270 prov_desc->pd_kstat->ks_private = prov_desc; 271 prov_desc->pd_kstat->ks_update = kcf_prov_kstat_update; 272 kstat_install(prov_desc->pd_kstat); 273 } 274 } 275 276 if (prov_desc->pd_prov_type == CRYPTO_HW_PROVIDER) 277 process_logical_providers(info, prov_desc); 278 279 /* 280 * Inform interested clients of the mechanisms becoming 281 * available. We skip this for logical providers as they 282 * do not affect mechanisms. 283 */ 284 if (prov_desc->pd_prov_type != CRYPTO_LOGICAL_PROVIDER) { 285 ec.ec_provider_type = prov_desc->pd_prov_type; 286 ec.ec_change = CRYPTO_MECH_ADDED; 287 for (i = 0; i < prov_desc->pd_mech_list_count; i++) { 288 /* Skip any mechanisms not allowed by the policy */ 289 if (is_mech_disabled(prov_desc, 290 prov_desc->pd_mechanisms[i].cm_mech_name)) 291 continue; 292 293 (void) strncpy(ec.ec_mech_name, 294 prov_desc->pd_mechanisms[i].cm_mech_name, 295 CRYPTO_MAX_MECH_NAME); 296 kcf_walk_ntfylist(CRYPTO_EVENT_MECHS_CHANGED, &ec); 297 } 298 299 } 300 301 /* 302 * Inform interested clients of the new provider. In case of a 303 * logical provider, we need to notify the event only 304 * for the logical provider and not for the underlying 305 * providers which are known by pi_logical_provider_count > 0. 306 */ 307 if (prov_desc->pd_prov_type == CRYPTO_LOGICAL_PROVIDER || 308 info->pi_logical_provider_count == 0) 309 kcf_walk_ntfylist(CRYPTO_EVENT_PROVIDER_REGISTERED, prov_desc); 310 311 mutex_enter(&prov_desc->pd_lock); 312 prov_desc->pd_state = (vstatus == 0) ? KCF_PROV_READY : 313 KCF_PROV_UNVERIFIED; 314 mutex_exit(&prov_desc->pd_lock); 315 316 *handle = prov_desc->pd_kcf_prov_handle; 317 KCF_PROV_REFRELE(prov_desc); 318 return (CRYPTO_SUCCESS); 319 320 bail: 321 KCF_PROV_REFRELE(prov_desc); 322 return (ret); 323 } 324 325 /* 326 * This routine is used to notify the framework when a provider is being 327 * removed. Hardware providers call this routine in their detach routines. 328 * Software providers call this routine in their _fini() routine. 329 */ 330 int 331 crypto_unregister_provider(crypto_kcf_provider_handle_t handle) 332 { 333 int i; 334 uint_t mech_idx; 335 kcf_provider_desc_t *desc; 336 crypto_notify_event_change_t ec; 337 kcf_prov_state_t saved_state; 338 339 /* lookup provider descriptor */ 340 if ((desc = kcf_prov_tab_lookup((crypto_provider_id_t)handle)) == NULL) 341 return (CRYPTO_UNKNOWN_PROVIDER); 342 343 mutex_enter(&desc->pd_lock); 344 /* 345 * Check if any other thread is disabling or removing 346 * this provider. We return if this is the case. 347 */ 348 if (desc->pd_state >= KCF_PROV_DISABLED) { 349 mutex_exit(&desc->pd_lock); 350 /* Release reference held by kcf_prov_tab_lookup(). */ 351 KCF_PROV_REFRELE(desc); 352 return (CRYPTO_BUSY); 353 } 354 355 saved_state = desc->pd_state; 356 desc->pd_state = KCF_PROV_REMOVED; 357 358 if (saved_state == KCF_PROV_BUSY) { 359 /* 360 * The per-provider taskq thread may be waiting. We 361 * signal it so that it can start failing requests. 362 * Note that we do not need a cv_broadcast() as we keep 363 * only a single thread per taskq. 364 */ 365 cv_signal(&desc->pd_resume_cv); 366 } 367 368 if (desc->pd_prov_type == CRYPTO_SW_PROVIDER) { 369 /* 370 * Check if this provider is currently being used. 371 * pd_irefcnt is the number of holds from the internal 372 * structures. We add one to account for the above lookup. 373 */ 374 if (desc->pd_refcnt > desc->pd_irefcnt + 1) { 375 desc->pd_state = saved_state; 376 mutex_exit(&desc->pd_lock); 377 /* Release reference held by kcf_prov_tab_lookup(). */ 378 KCF_PROV_REFRELE(desc); 379 /* 380 * The administrator presumably will stop the clients 381 * thus removing the holds, when they get the busy 382 * return value. Any retry will succeed then. 383 */ 384 return (CRYPTO_BUSY); 385 } 386 } 387 mutex_exit(&desc->pd_lock); 388 389 if (desc->pd_prov_type != CRYPTO_SW_PROVIDER) { 390 remove_provider(desc); 391 } 392 393 if (desc->pd_prov_type != CRYPTO_LOGICAL_PROVIDER) { 394 /* remove the provider from the mechanisms tables */ 395 for (mech_idx = 0; mech_idx < desc->pd_mech_list_count; 396 mech_idx++) { 397 kcf_remove_mech_provider( 398 desc->pd_mechanisms[mech_idx].cm_mech_name, desc); 399 } 400 } 401 402 /* remove provider from providers table */ 403 if (kcf_prov_tab_rem_provider((crypto_provider_id_t)handle) != 404 CRYPTO_SUCCESS) { 405 /* Release reference held by kcf_prov_tab_lookup(). */ 406 KCF_PROV_REFRELE(desc); 407 return (CRYPTO_UNKNOWN_PROVIDER); 408 } 409 410 /* destroy the kstat created for this provider */ 411 if (desc->pd_kstat != NULL) { 412 kcf_provider_desc_t *kspd = desc->pd_kstat->ks_private; 413 414 /* release reference held by desc->pd_kstat->ks_private */ 415 ASSERT(desc == kspd); 416 kstat_delete(kspd->pd_kstat); 417 KCF_PROV_REFRELE(kspd); 418 KCF_PROV_IREFRELE(kspd); 419 } 420 421 if (desc->pd_prov_type == CRYPTO_SW_PROVIDER) { 422 /* Release reference held by kcf_prov_tab_lookup(). */ 423 KCF_PROV_REFRELE(desc); 424 425 /* 426 * Wait till the existing requests complete. 427 */ 428 mutex_enter(&desc->pd_lock); 429 while (desc->pd_state != KCF_PROV_FREED) 430 cv_wait(&desc->pd_remove_cv, &desc->pd_lock); 431 mutex_exit(&desc->pd_lock); 432 } else { 433 /* 434 * Wait until requests that have been sent to the provider 435 * complete. 436 */ 437 mutex_enter(&desc->pd_lock); 438 while (desc->pd_irefcnt > 0) 439 cv_wait(&desc->pd_remove_cv, &desc->pd_lock); 440 mutex_exit(&desc->pd_lock); 441 } 442 443 /* 444 * Inform interested clients of the mechanisms becoming 445 * unavailable. We skip this for logical providers as they 446 * do not affect mechanisms. 447 */ 448 if (desc->pd_prov_type != CRYPTO_LOGICAL_PROVIDER) { 449 ec.ec_provider_type = desc->pd_prov_type; 450 ec.ec_change = CRYPTO_MECH_REMOVED; 451 for (i = 0; i < desc->pd_mech_list_count; i++) { 452 /* Skip any mechanisms not allowed by the policy */ 453 if (is_mech_disabled(desc, 454 desc->pd_mechanisms[i].cm_mech_name)) 455 continue; 456 457 (void) strncpy(ec.ec_mech_name, 458 desc->pd_mechanisms[i].cm_mech_name, 459 CRYPTO_MAX_MECH_NAME); 460 kcf_walk_ntfylist(CRYPTO_EVENT_MECHS_CHANGED, &ec); 461 } 462 463 } 464 465 /* 466 * Inform interested clients about the departing provider. 467 * In case of a logical provider, we need to notify the event only 468 * for the logical provider and not for the underlying 469 * providers which are known by the KCF_LPROV_MEMBER bit. 470 */ 471 if (desc->pd_prov_type == CRYPTO_LOGICAL_PROVIDER || 472 (desc->pd_flags & KCF_LPROV_MEMBER) == 0) 473 kcf_walk_ntfylist(CRYPTO_EVENT_PROVIDER_UNREGISTERED, desc); 474 475 if (desc->pd_prov_type == CRYPTO_SW_PROVIDER) { 476 /* 477 * This is the only place where kcf_free_provider_desc() 478 * is called directly. KCF_PROV_REFRELE() should free the 479 * structure in all other places. 480 */ 481 ASSERT(desc->pd_state == KCF_PROV_FREED && 482 desc->pd_refcnt == 0); 483 kcf_free_provider_desc(desc); 484 } else { 485 KCF_PROV_REFRELE(desc); 486 } 487 488 return (CRYPTO_SUCCESS); 489 } 490 491 /* 492 * This routine is used to notify the framework that the state of 493 * a cryptographic provider has changed. Valid state codes are: 494 * 495 * CRYPTO_PROVIDER_READY 496 * The provider indicates that it can process more requests. A provider 497 * will notify with this event if it previously has notified us with a 498 * CRYPTO_PROVIDER_BUSY. 499 * 500 * CRYPTO_PROVIDER_BUSY 501 * The provider can not take more requests. 502 * 503 * CRYPTO_PROVIDER_FAILED 504 * The provider encountered an internal error. The framework will not 505 * be sending any more requests to the provider. The provider may notify 506 * with a CRYPTO_PROVIDER_READY, if it is able to recover from the error. 507 * 508 * This routine can be called from user or interrupt context. 509 */ 510 void 511 crypto_provider_notification(crypto_kcf_provider_handle_t handle, uint_t state) 512 { 513 kcf_provider_desc_t *pd; 514 515 /* lookup the provider from the given handle */ 516 if ((pd = kcf_prov_tab_lookup((crypto_provider_id_t)handle)) == NULL) 517 return; 518 519 mutex_enter(&pd->pd_lock); 520 521 if (pd->pd_prov_type == CRYPTO_LOGICAL_PROVIDER) { 522 cmn_err(CE_WARN, "crypto_provider_notification: " 523 "logical provider (%x) ignored\n", handle); 524 goto out; 525 } 526 switch (state) { 527 case CRYPTO_PROVIDER_READY: 528 switch (pd->pd_state) { 529 case KCF_PROV_BUSY: 530 pd->pd_state = KCF_PROV_READY; 531 /* 532 * Signal the per-provider taskq thread that it 533 * can start submitting requests. Note that we do 534 * not need a cv_broadcast() as we keep only a 535 * single thread per taskq. 536 */ 537 cv_signal(&pd->pd_resume_cv); 538 break; 539 540 case KCF_PROV_FAILED: 541 /* 542 * The provider recovered from the error. Let us 543 * use it now. 544 */ 545 pd->pd_state = KCF_PROV_READY; 546 break; 547 } 548 break; 549 550 case CRYPTO_PROVIDER_BUSY: 551 switch (pd->pd_state) { 552 case KCF_PROV_READY: 553 pd->pd_state = KCF_PROV_BUSY; 554 break; 555 } 556 break; 557 558 case CRYPTO_PROVIDER_FAILED: 559 /* 560 * We note the failure and return. The per-provider taskq 561 * thread checks this flag and starts failing the 562 * requests, if it is set. See process_req_hwp() for details. 563 */ 564 switch (pd->pd_state) { 565 case KCF_PROV_READY: 566 pd->pd_state = KCF_PROV_FAILED; 567 break; 568 569 case KCF_PROV_BUSY: 570 pd->pd_state = KCF_PROV_FAILED; 571 /* 572 * The per-provider taskq thread may be waiting. We 573 * signal it so that it can start failing requests. 574 */ 575 cv_signal(&pd->pd_resume_cv); 576 break; 577 } 578 break; 579 } 580 out: 581 mutex_exit(&pd->pd_lock); 582 KCF_PROV_REFRELE(pd); 583 } 584 585 /* 586 * This routine is used to notify the framework the result of 587 * an asynchronous request handled by a provider. Valid error 588 * codes are the same as the CRYPTO_* errors defined in common.h. 589 * 590 * This routine can be called from user or interrupt context. 591 */ 592 void 593 crypto_op_notification(crypto_req_handle_t handle, int error) 594 { 595 kcf_call_type_t ctype; 596 597 if ((ctype = GET_REQ_TYPE(handle)) == CRYPTO_SYNCH) { 598 kcf_sreq_node_t *sreq = (kcf_sreq_node_t *)handle; 599 600 if (error != CRYPTO_SUCCESS) 601 sreq->sn_provider->pd_sched_info.ks_nfails++; 602 KCF_PROV_IREFRELE(sreq->sn_provider); 603 kcf_sop_done(sreq, error); 604 } else { 605 kcf_areq_node_t *areq = (kcf_areq_node_t *)handle; 606 607 ASSERT(ctype == CRYPTO_ASYNCH); 608 if (error != CRYPTO_SUCCESS) 609 areq->an_provider->pd_sched_info.ks_nfails++; 610 KCF_PROV_IREFRELE(areq->an_provider); 611 kcf_aop_done(areq, error); 612 } 613 } 614 615 /* 616 * This routine is used by software providers to determine 617 * whether to use KM_SLEEP or KM_NOSLEEP during memory allocation. 618 * Note that hardware providers can always use KM_SLEEP. So, 619 * they do not need to call this routine. 620 * 621 * This routine can be called from user or interrupt context. 622 */ 623 int 624 crypto_kmflag(crypto_req_handle_t handle) 625 { 626 return (REQHNDL2_KMFLAG(handle)); 627 } 628 629 630 /* 631 * Copy an ops vector from src to dst. Used during provider registration 632 * to copy the ops vector from the provider info structure to the 633 * provider descriptor maintained by KCF. 634 * Copying the ops vector specified by the provider is needed since the 635 * framework does not require the provider info structure to be 636 * persistent. 637 */ 638 static void 639 copy_ops_vector_v1(crypto_ops_t *src_ops, crypto_ops_t *dst_ops) 640 { 641 KCF_SPI_COPY_OPS(src_ops, dst_ops, co_control_ops); 642 KCF_SPI_COPY_OPS(src_ops, dst_ops, co_digest_ops); 643 KCF_SPI_COPY_OPS(src_ops, dst_ops, co_cipher_ops); 644 KCF_SPI_COPY_OPS(src_ops, dst_ops, co_mac_ops); 645 KCF_SPI_COPY_OPS(src_ops, dst_ops, co_sign_ops); 646 KCF_SPI_COPY_OPS(src_ops, dst_ops, co_verify_ops); 647 KCF_SPI_COPY_OPS(src_ops, dst_ops, co_dual_ops); 648 KCF_SPI_COPY_OPS(src_ops, dst_ops, co_dual_cipher_mac_ops); 649 KCF_SPI_COPY_OPS(src_ops, dst_ops, co_random_ops); 650 KCF_SPI_COPY_OPS(src_ops, dst_ops, co_session_ops); 651 KCF_SPI_COPY_OPS(src_ops, dst_ops, co_object_ops); 652 KCF_SPI_COPY_OPS(src_ops, dst_ops, co_key_ops); 653 KCF_SPI_COPY_OPS(src_ops, dst_ops, co_provider_ops); 654 KCF_SPI_COPY_OPS(src_ops, dst_ops, co_ctx_ops); 655 } 656 657 static void 658 copy_ops_vector_v2(crypto_ops_t *src_ops, crypto_ops_t *dst_ops) 659 { 660 KCF_SPI_COPY_OPS(src_ops, dst_ops, co_mech_ops); 661 } 662 663 /* 664 * Process the mechanism info structures specified by the provider 665 * during registration. A NULL crypto_provider_info_t indicates 666 * an already initialized provider descriptor. 667 * 668 * Mechanisms are not added to the kernel's mechanism table if the 669 * provider is a logical provider. 670 * 671 * Returns CRYPTO_SUCCESS on success, CRYPTO_ARGUMENTS if one 672 * of the specified mechanisms was malformed, or CRYPTO_HOST_MEMORY 673 * if the table of mechanisms is full. 674 */ 675 static int 676 init_prov_mechs(crypto_provider_info_t *info, kcf_provider_desc_t *desc) 677 { 678 uint_t mech_idx; 679 uint_t cleanup_idx; 680 int err = CRYPTO_SUCCESS; 681 kcf_prov_mech_desc_t *pmd; 682 int desc_use_count = 0; 683 int mcount = desc->pd_mech_list_count; 684 685 if (desc->pd_prov_type == CRYPTO_LOGICAL_PROVIDER) { 686 if (info != NULL) { 687 ASSERT(info->pi_mechanisms != NULL); 688 bcopy(info->pi_mechanisms, desc->pd_mechanisms, 689 sizeof (crypto_mech_info_t) * mcount); 690 } 691 return (CRYPTO_SUCCESS); 692 } 693 694 /* 695 * Copy the mechanism list from the provider info to the provider 696 * descriptor. desc->pd_mechanisms has an extra crypto_mech_info_t 697 * element if the provider has random_ops since we keep an internal 698 * mechanism, SUN_RANDOM, in this case. 699 */ 700 if (info != NULL) { 701 if (info->pi_ops_vector->co_random_ops != NULL) { 702 crypto_mech_info_t *rand_mi; 703 704 /* 705 * Need the following check as it is possible to have 706 * a provider that implements just random_ops and has 707 * pi_mechanisms == NULL. 708 */ 709 if (info->pi_mechanisms != NULL) { 710 bcopy(info->pi_mechanisms, desc->pd_mechanisms, 711 sizeof (crypto_mech_info_t) * (mcount - 1)); 712 } 713 rand_mi = &desc->pd_mechanisms[mcount - 1]; 714 715 bzero(rand_mi, sizeof (crypto_mech_info_t)); 716 (void) strncpy(rand_mi->cm_mech_name, SUN_RANDOM, 717 CRYPTO_MAX_MECH_NAME); 718 rand_mi->cm_func_group_mask = CRYPTO_FG_RANDOM; 719 /* 720 * What we really need here is a 721 * CRYPTO_KEYSIZE_NOT_APPLICABLE. We make do with the 722 * following for now. 723 */ 724 rand_mi->cm_keysize_unit = CRYPTO_KEYSIZE_UNIT_IN_BITS; 725 } else { 726 ASSERT(info->pi_mechanisms != NULL); 727 bcopy(info->pi_mechanisms, desc->pd_mechanisms, 728 sizeof (crypto_mech_info_t) * mcount); 729 } 730 } 731 732 /* 733 * For each mechanism support by the provider, add the provider 734 * to the corresponding KCF mechanism mech_entry chain. 735 */ 736 for (mech_idx = 0; mech_idx < desc->pd_mech_list_count; mech_idx++) { 737 crypto_mech_info_t *mi = &desc->pd_mechanisms[mech_idx]; 738 739 if (mi->cm_keysize_unit != CRYPTO_KEYSIZE_UNIT_IN_BITS && 740 mi->cm_keysize_unit != CRYPTO_KEYSIZE_UNIT_IN_BYTES) { 741 err = CRYPTO_ARGUMENTS_BAD; 742 break; 743 } 744 745 if (kcf_add_mech_provider(mi, desc, &pmd) != KCF_SUCCESS) 746 break; 747 748 if (pmd == NULL) 749 continue; 750 751 /* The provider will be used for this mechanism */ 752 desc_use_count++; 753 } 754 755 /* 756 * Don't allow multiple software providers with disabled mechanisms 757 * to register. Subsequent enabling of mechanisms will result in 758 * an unsupported configuration, i.e. multiple software providers 759 * per mechanism. 760 */ 761 if (desc_use_count == 0 && desc->pd_prov_type == CRYPTO_SW_PROVIDER) 762 return (CRYPTO_ARGUMENTS_BAD); 763 764 if (err == KCF_SUCCESS) 765 return (CRYPTO_SUCCESS); 766 767 /* 768 * An error occurred while adding the mechanism, cleanup 769 * and bail. 770 */ 771 for (cleanup_idx = 0; cleanup_idx < mech_idx; cleanup_idx++) { 772 kcf_remove_mech_provider( 773 desc->pd_mechanisms[cleanup_idx].cm_mech_name, desc); 774 } 775 776 if (err == KCF_MECH_TAB_FULL) 777 return (CRYPTO_HOST_MEMORY); 778 779 return (CRYPTO_ARGUMENTS_BAD); 780 } 781 782 /* 783 * Update routine for kstat. Only privileged users are allowed to 784 * access this information, since this information is sensitive. 785 * There are some cryptographic attacks (e.g. traffic analysis) 786 * which can use this information. 787 */ 788 static int 789 kcf_prov_kstat_update(kstat_t *ksp, int rw) 790 { 791 kcf_prov_stats_t *ks_data; 792 kcf_provider_desc_t *pd = (kcf_provider_desc_t *)ksp->ks_private; 793 794 if (rw == KSTAT_WRITE) 795 return (EACCES); 796 797 ks_data = ksp->ks_data; 798 799 if (secpolicy_sys_config(CRED(), B_TRUE) != 0) { 800 ks_data->ps_ops_total.value.ui64 = 0; 801 ks_data->ps_ops_passed.value.ui64 = 0; 802 ks_data->ps_ops_failed.value.ui64 = 0; 803 ks_data->ps_ops_busy_rval.value.ui64 = 0; 804 } else { 805 ks_data->ps_ops_total.value.ui64 = 806 pd->pd_sched_info.ks_ndispatches; 807 ks_data->ps_ops_failed.value.ui64 = 808 pd->pd_sched_info.ks_nfails; 809 ks_data->ps_ops_busy_rval.value.ui64 = 810 pd->pd_sched_info.ks_nbusy_rval; 811 ks_data->ps_ops_passed.value.ui64 = 812 pd->pd_sched_info.ks_ndispatches - 813 pd->pd_sched_info.ks_nfails - 814 pd->pd_sched_info.ks_nbusy_rval; 815 } 816 817 return (0); 818 } 819 820 821 /* 822 * Utility routine called from failure paths in crypto_register_provider() 823 * and from crypto_load_soft_disabled(). 824 */ 825 void 826 undo_register_provider(kcf_provider_desc_t *desc, boolean_t remove_prov) 827 { 828 uint_t mech_idx; 829 830 /* remove the provider from the mechanisms tables */ 831 for (mech_idx = 0; mech_idx < desc->pd_mech_list_count; 832 mech_idx++) { 833 kcf_remove_mech_provider( 834 desc->pd_mechanisms[mech_idx].cm_mech_name, desc); 835 } 836 837 /* remove provider from providers table */ 838 if (remove_prov) 839 (void) kcf_prov_tab_rem_provider(desc->pd_prov_id); 840 } 841 842 /* 843 * Utility routine called from crypto_load_soft_disabled(). Callers 844 * should have done a prior undo_register_provider(). 845 */ 846 void 847 redo_register_provider(kcf_provider_desc_t *pd) 848 { 849 /* process the mechanisms supported by the provider */ 850 (void) init_prov_mechs(NULL, pd); 851 852 /* 853 * Hold provider in providers table. We should not call 854 * kcf_prov_tab_add_provider() here as the provider descriptor 855 * is still valid which means it has an entry in the provider 856 * table. 857 */ 858 KCF_PROV_REFHOLD(pd); 859 KCF_PROV_IREFHOLD(pd); 860 } 861 862 /* 863 * Add provider (p1) to another provider's array of providers (p2). 864 * Hardware and logical providers use this array to cross-reference 865 * each other. 866 */ 867 static void 868 add_provider_to_array(kcf_provider_desc_t *p1, kcf_provider_desc_t *p2) 869 { 870 kcf_provider_list_t *new; 871 872 new = kmem_alloc(sizeof (kcf_provider_list_t), KM_SLEEP); 873 mutex_enter(&p2->pd_lock); 874 new->pl_next = p2->pd_provider_list; 875 p2->pd_provider_list = new; 876 KCF_PROV_IREFHOLD(p1); 877 new->pl_provider = p1; 878 mutex_exit(&p2->pd_lock); 879 } 880 881 /* 882 * Remove provider (p1) from another provider's array of providers (p2). 883 * Hardware and logical providers use this array to cross-reference 884 * each other. 885 */ 886 static void 887 remove_provider_from_array(kcf_provider_desc_t *p1, kcf_provider_desc_t *p2) 888 { 889 890 kcf_provider_list_t *pl = NULL, **prev; 891 892 mutex_enter(&p2->pd_lock); 893 for (pl = p2->pd_provider_list, prev = &p2->pd_provider_list; 894 pl != NULL; prev = &pl->pl_next, pl = pl->pl_next) { 895 if (pl->pl_provider == p1) { 896 break; 897 } 898 } 899 900 if (p1 == NULL) { 901 mutex_exit(&p2->pd_lock); 902 return; 903 } 904 905 /* detach and free kcf_provider_list structure */ 906 KCF_PROV_IREFRELE(p1); 907 *prev = pl->pl_next; 908 kmem_free(pl, sizeof (*pl)); 909 mutex_exit(&p2->pd_lock); 910 } 911 912 /* 913 * Convert an array of logical provider handles (crypto_provider_id) 914 * stored in a crypto_provider_info structure into an array of provider 915 * descriptors (kcf_provider_desc_t) attached to a logical provider. 916 */ 917 static void 918 process_logical_providers(crypto_provider_info_t *info, kcf_provider_desc_t *hp) 919 { 920 kcf_provider_desc_t *lp; 921 crypto_provider_id_t handle; 922 int count = info->pi_logical_provider_count; 923 int i; 924 925 /* add hardware provider to each logical provider */ 926 for (i = 0; i < count; i++) { 927 handle = info->pi_logical_providers[i]; 928 lp = kcf_prov_tab_lookup((crypto_provider_id_t)handle); 929 if (lp == NULL) { 930 continue; 931 } 932 add_provider_to_array(hp, lp); 933 hp->pd_flags |= KCF_LPROV_MEMBER; 934 935 /* 936 * A hardware provider has to have the provider descriptor of 937 * every logical provider it belongs to, so it can be removed 938 * from the logical provider if the hardware provider 939 * unregisters from the framework. 940 */ 941 add_provider_to_array(lp, hp); 942 KCF_PROV_REFRELE(lp); 943 } 944 } 945 946 /* 947 * This routine removes a provider from all of the logical or 948 * hardware providers it belongs to, and frees the provider's 949 * array of pointers to providers. 950 */ 951 static void 952 remove_provider(kcf_provider_desc_t *pp) 953 { 954 kcf_provider_desc_t *p; 955 kcf_provider_list_t *e, *next; 956 957 mutex_enter(&pp->pd_lock); 958 for (e = pp->pd_provider_list; e != NULL; e = next) { 959 p = e->pl_provider; 960 remove_provider_from_array(pp, p); 961 if (p->pd_prov_type == CRYPTO_HW_PROVIDER && 962 p->pd_provider_list == NULL) 963 p->pd_flags &= ~KCF_LPROV_MEMBER; 964 KCF_PROV_IREFRELE(p); 965 next = e->pl_next; 966 kmem_free(e, sizeof (*e)); 967 } 968 pp->pd_provider_list = NULL; 969 mutex_exit(&pp->pd_lock); 970 } 971