1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright 2009 Sun Microsystems, Inc. All rights reserved. 23 * Use is subject to license terms. 24 */ 25 26 #include <fcntl.h> 27 #include <stdio.h> 28 #include <stdlib.h> 29 #include <strings.h> 30 #include <unistd.h> 31 #include <locale.h> 32 #include <libgen.h> 33 #include <sys/types.h> 34 #include <sys/stat.h> 35 #include <sys/crypto/ioctladmin.h> 36 #include <signal.h> 37 #include <sys/crypto/elfsign.h> 38 #include "cryptoadm.h" 39 40 static int check_hardware_provider(char *, char *, int *, int *); 41 42 /* 43 * Display the mechanism list for a kernel software provider. 44 * This implements part of the "cryptoadm list -m" command. 45 * 46 * Parameters phardlist, psoftlist and pfipslist are supplied by 47 * get_soft_info(). 48 * If NULL, this function obtains it by calling getent_kef() and 49 * then get_kcfconf_info() via get_soft_info() internally. 50 */ 51 int 52 list_mechlist_for_soft(char *provname, 53 entrylist_t *phardlist, entrylist_t *psoftlist, 54 entrylist_t *pfipslist) 55 { 56 mechlist_t *pmechlist = NULL; 57 int rc; 58 59 if (provname == NULL) { 60 return (FAILURE); 61 } 62 63 rc = get_soft_info(provname, &pmechlist, phardlist, psoftlist, 64 pfipslist); 65 if (rc == SUCCESS) { 66 (void) filter_mechlist(&pmechlist, RANDOM); 67 print_mechlist(provname, pmechlist); 68 free_mechlist(pmechlist); 69 } else { 70 cryptoerror(LOG_STDERR, gettext( 71 "failed to retrieve the mechanism list for %s."), 72 provname); 73 } 74 75 return (rc); 76 } 77 78 /* 79 * Display the mechanism list for a kernel hardware provider. 80 * This implements part of the "cryptoadm list -m" command. 81 */ 82 int 83 list_mechlist_for_hard(char *provname) 84 { 85 mechlist_t *pmechlist = NULL; 86 char devname[MAXNAMELEN]; 87 int inst_num; 88 int count; 89 int rc = SUCCESS; 90 91 if (provname == NULL) { 92 return (FAILURE); 93 } 94 95 /* 96 * Check if the provider is valid. If it is valid, get the number of 97 * mechanisms also. 98 */ 99 if (check_hardware_provider(provname, devname, &inst_num, &count) == 100 FAILURE) { 101 return (FAILURE); 102 } 103 104 /* Get the mechanism list for the kernel hardware provider */ 105 if ((rc = get_dev_info(devname, inst_num, count, &pmechlist)) == 106 SUCCESS) { 107 (void) filter_mechlist(&pmechlist, RANDOM); 108 print_mechlist(provname, pmechlist); 109 free_mechlist(pmechlist); 110 } 111 112 return (rc); 113 } 114 115 116 /* 117 * Display the policy information for a kernel software provider. 118 * This implements part of the "cryptoadm list -p" command. 119 * 120 * Parameters phardlist, psoftlist and pfipslist are supplied by 121 * getent_kef(). 122 * If NULL, this function obtains it by calling get_kcfconf_info() 123 * via getent_kef() internally. 124 */ 125 int 126 list_policy_for_soft(char *provname, 127 entrylist_t *phardlist, entrylist_t *psoftlist, 128 entrylist_t *pfipslist) 129 { 130 int rc; 131 entry_t *pent = NULL; 132 mechlist_t *pmechlist = NULL; 133 boolean_t has_random = B_FALSE; 134 boolean_t has_mechs = B_FALSE; 135 boolean_t in_kernel = B_FALSE; 136 137 if (provname == NULL) { 138 return (FAILURE); 139 } 140 141 if (check_kernel_for_soft(provname, NULL, &in_kernel) == FAILURE) { 142 return (FAILURE); 143 } else if (in_kernel == B_FALSE) { 144 cryptoerror(LOG_STDERR, gettext("%s does not exist."), 145 provname); 146 return (FAILURE); 147 } 148 pent = getent_kef(provname, phardlist, psoftlist, 149 pfipslist); 150 151 rc = get_soft_info(provname, &pmechlist, phardlist, psoftlist, 152 pfipslist); 153 if (rc == SUCCESS) { 154 has_random = filter_mechlist(&pmechlist, RANDOM); 155 if (pmechlist != NULL) { 156 has_mechs = B_TRUE; 157 free_mechlist(pmechlist); 158 } 159 } else { 160 cryptoerror(LOG_STDERR, gettext( 161 "failed to retrieve the mechanism list for %s."), 162 provname); 163 return (rc); 164 } 165 166 print_kef_policy(provname, pent, has_random, has_mechs); 167 free_entry(pent); 168 return (SUCCESS); 169 } 170 171 172 173 /* 174 * Display the policy information for a kernel hardware provider. 175 * This implements part of the "cryptoadm list -p" command. 176 * 177 * Parameters phardlist, psoftlist and pfipslist are supplied by getent_kef(). 178 * If NULL, this function obtains it by calling get_kcfconf_info() via 179 * getent_kef() internally. 180 * Parameter pdevlist is supplied by check_kernel_for_hard(). 181 * If NULL, this function obtains it by calling get_dev_list() via 182 * check_kernel_for_hard() internally. 183 */ 184 int 185 list_policy_for_hard(char *provname, 186 entrylist_t *phardlist, entrylist_t *psoftlist, 187 entrylist_t *pfipslist, crypto_get_dev_list_t *pdevlist) 188 { 189 entry_t *pent = NULL; 190 boolean_t in_kernel; 191 mechlist_t *pmechlist = NULL; 192 char devname[MAXNAMELEN]; 193 int inst_num; 194 int count; 195 int rc = SUCCESS; 196 boolean_t has_random = B_FALSE; 197 boolean_t has_mechs = B_FALSE; 198 199 if (provname == NULL) { 200 return (FAILURE); 201 } 202 203 /* 204 * Check if the provider is valid. If it is valid, get the number of 205 * mechanisms also. 206 */ 207 if (check_hardware_provider(provname, devname, &inst_num, &count) == 208 FAILURE) { 209 return (FAILURE); 210 } 211 212 /* Get the mechanism list for the kernel hardware provider */ 213 if ((rc = get_dev_info(devname, inst_num, count, &pmechlist)) == 214 SUCCESS) { 215 has_random = filter_mechlist(&pmechlist, RANDOM); 216 217 if (pmechlist != NULL) { 218 has_mechs = B_TRUE; 219 free_mechlist(pmechlist); 220 } 221 } else { 222 cryptoerror(LOG_STDERR, gettext( 223 "failed to retrieve the mechanism list for %s."), 224 devname); 225 return (rc); 226 } 227 228 /* 229 * If the hardware provider has an entry in the kcf.conf file, 230 * some of its mechanisms must have been disabled. Print out 231 * the disabled list from the config file entry. Otherwise, 232 * if it is active, then all the mechanisms for it are enabled. 233 */ 234 if ((pent = getent_kef(provname, phardlist, psoftlist, 235 pfipslist)) != NULL) { 236 print_kef_policy(provname, pent, has_random, has_mechs); 237 free_entry(pent); 238 return (SUCCESS); 239 } else { 240 if (check_kernel_for_hard(provname, pdevlist, 241 &in_kernel) == FAILURE) { 242 return (FAILURE); 243 } else if (in_kernel == B_TRUE) { 244 (void) printf(gettext( 245 "%s: all mechanisms are enabled."), provname); 246 if (has_random) 247 /* 248 * TRANSLATION_NOTE 249 * "random" is a keyword and not to be 250 * translated. 251 */ 252 (void) printf(gettext(" %s is enabled.\n"), 253 "random"); 254 else 255 (void) printf("\n"); 256 return (SUCCESS); 257 } else { 258 cryptoerror(LOG_STDERR, 259 gettext("%s does not exist."), provname); 260 return (FAILURE); 261 } 262 } 263 } 264 265 266 /* 267 * Disable a kernel hardware provider. 268 * This implements the "cryptoadm disable" command for 269 * kernel hardware providers. 270 */ 271 int 272 disable_kef_hardware(char *provname, boolean_t rndflag, boolean_t allflag, 273 mechlist_t *dislist) 274 { 275 crypto_load_dev_disabled_t *pload_dev_dis = NULL; 276 mechlist_t *infolist = NULL; 277 entry_t *pent = NULL; 278 boolean_t new_dev_entry = B_FALSE; 279 char devname[MAXNAMELEN]; 280 int inst_num; 281 int count; 282 int fd = -1; 283 int rc = SUCCESS; 284 285 if (provname == NULL) { 286 return (FAILURE); 287 } 288 289 /* 290 * Check if the provider is valid. If it is valid, get the number of 291 * mechanisms also. 292 */ 293 if (check_hardware_provider(provname, devname, &inst_num, &count) 294 == FAILURE) { 295 return (FAILURE); 296 } 297 298 /* Get the mechanism list for the kernel hardware provider */ 299 if (get_dev_info(devname, inst_num, count, &infolist) == FAILURE) { 300 return (FAILURE); 301 } 302 303 /* 304 * Get the entry of this hardware provider from the config file. 305 * If there is no entry yet, create one for it. 306 */ 307 if ((pent = getent_kef(provname, NULL, NULL, NULL)) == NULL) { 308 if ((pent = create_entry(provname)) == NULL) { 309 cryptoerror(LOG_STDERR, gettext("out of memory.")); 310 free_mechlist(infolist); 311 return (FAILURE); 312 } 313 new_dev_entry = B_TRUE; 314 } 315 316 /* 317 * kCF treats random as an internal mechanism. So, we need to 318 * filter it from the mechanism list here, if we are NOT disabling 319 * or enabling the random feature. Note that we map random feature at 320 * cryptoadm(1M) level to the "random" mechanism in kCF. 321 */ 322 if (!rndflag) { 323 (void) filter_mechlist(&dislist, RANDOM); 324 } 325 326 /* Calculate the new disabled list */ 327 if (disable_mechs(&pent, infolist, allflag, dislist) == FAILURE) { 328 free_mechlist(infolist); 329 free_entry(pent); 330 return (FAILURE); 331 } 332 free_mechlist(infolist); 333 334 /* If no mechanisms are to be disabled, return */ 335 if (pent->dis_count == 0) { 336 free_entry(pent); 337 return (SUCCESS); 338 } 339 340 /* Update the config file with the new entry or the updated entry */ 341 if (new_dev_entry) { 342 rc = update_kcfconf(pent, ADD_MODE); 343 } else { 344 rc = update_kcfconf(pent, MODIFY_MODE); 345 } 346 347 if (rc == FAILURE) { 348 free_entry(pent); 349 return (FAILURE); 350 } 351 352 /* Inform kernel about the new disabled mechanism list */ 353 if ((pload_dev_dis = setup_dev_dis(pent)) == NULL) { 354 free_entry(pent); 355 return (FAILURE); 356 } 357 free_entry(pent); 358 359 if ((fd = open(ADMIN_IOCTL_DEVICE, O_RDWR)) == -1) { 360 cryptoerror(LOG_STDERR, gettext("failed to open %s: %s"), 361 ADMIN_IOCTL_DEVICE, strerror(errno)); 362 free(pload_dev_dis); 363 return (FAILURE); 364 } 365 366 if (ioctl(fd, CRYPTO_LOAD_DEV_DISABLED, pload_dev_dis) == -1) { 367 cryptodebug("CRYPTO_LOAD_DEV_DISABLED ioctl failed: %s", 368 strerror(errno)); 369 free(pload_dev_dis); 370 (void) close(fd); 371 return (FAILURE); 372 } 373 374 if (pload_dev_dis->dd_return_value != CRYPTO_SUCCESS) { 375 cryptodebug("CRYPTO_LOAD_DEV_DISABLED ioctl return_value = " 376 "%d", pload_dev_dis->dd_return_value); 377 free(pload_dev_dis); 378 (void) close(fd); 379 return (FAILURE); 380 } 381 382 free(pload_dev_dis); 383 (void) close(fd); 384 return (SUCCESS); 385 } 386 387 388 /* 389 * Disable a kernel software provider. 390 * This implements the "cryptoadm disable" command for 391 * kernel software providers. 392 */ 393 int 394 disable_kef_software(char *provname, boolean_t rndflag, boolean_t allflag, 395 mechlist_t *dislist) 396 { 397 crypto_load_soft_disabled_t *pload_soft_dis = NULL; 398 mechlist_t *infolist = NULL; 399 entry_t *pent = NULL; 400 entrylist_t *phardlist = NULL; 401 entrylist_t *psoftlist = NULL; 402 entrylist_t *pfipslist = NULL; 403 boolean_t in_kernel = B_FALSE; 404 int fd = -1; 405 int rc = SUCCESS; 406 407 if (provname == NULL) { 408 return (FAILURE); 409 } 410 411 /* 412 * Check if the kernel software provider is currently unloaded. 413 * If it is unloaded, return FAILURE, because the disable subcommand 414 * can not perform on inactive (unloaded) providers. 415 */ 416 if (check_kernel_for_soft(provname, NULL, &in_kernel) == 417 FAILURE) { 418 return (FAILURE); 419 } else if (in_kernel == B_FALSE) { 420 cryptoerror(LOG_STDERR, 421 gettext("%s is not loaded or does not exist."), 422 provname); 423 return (FAILURE); 424 } 425 426 if (get_kcfconf_info(&phardlist, &psoftlist, &pfipslist) == 427 FAILURE) { 428 cryptoerror(LOG_ERR, 429 "failed to retrieve the providers' " 430 "information from the configuration file - %s.", 431 _PATH_KCF_CONF); 432 return (FAILURE); 433 } 434 435 /* 436 * Get the entry of this provider from the kcf.conf file, if any. 437 * Otherwise, create a new kcf.conf entry for writing back to the file. 438 */ 439 pent = getent_kef(provname, phardlist, psoftlist, pfipslist); 440 if (pent == NULL) { /* create a new entry */ 441 pent = create_entry(provname); 442 if (pent == NULL) { 443 cryptodebug("out of memory."); 444 rc = FAILURE; 445 goto out; 446 } 447 } 448 449 /* Get the mechanism list for the software provider from the kernel */ 450 if (get_soft_info(provname, &infolist, phardlist, psoftlist, 451 pfipslist) == FAILURE) { 452 rc = FAILURE; 453 goto out; 454 } 455 456 if ((infolist != NULL) && (infolist->name[0] != '\0')) { 457 /* 458 * Replace the supportedlist from kcf.conf with possibly 459 * more-up-to-date list from the kernel. This is the case 460 * for default software providers that had more mechanisms 461 * added in the current version of the kernel. 462 */ 463 free_mechlist(pent->suplist); 464 pent->suplist = infolist; 465 } 466 467 /* 468 * kCF treats random as an internal mechanism. So, we need to 469 * filter it from the mechanism list here, if we are NOT disabling 470 * or enabling the random feature. Note that we map random feature at 471 * cryptoadm(1M) level to the "random" mechanism in kCF. 472 */ 473 if (!rndflag) { 474 (void) filter_mechlist(&infolist, RANDOM); 475 } 476 477 /* Calculate the new disabled list */ 478 if (disable_mechs(&pent, infolist, allflag, dislist) == FAILURE) { 479 rc = FAILURE; 480 goto out; 481 } 482 483 /* Update the kcf.conf file with the updated entry */ 484 if (update_kcfconf(pent, MODIFY_MODE) == FAILURE) { 485 rc = FAILURE; 486 goto out; 487 } 488 489 /* Setup argument to inform kernel about the new disabled list. */ 490 if ((pload_soft_dis = setup_soft_dis(pent)) == NULL) { 491 rc = FAILURE; 492 goto out; 493 } 494 495 if ((fd = open(ADMIN_IOCTL_DEVICE, O_RDWR)) == -1) { 496 cryptoerror(LOG_STDERR, 497 gettext("failed to open %s for RW: %s"), 498 ADMIN_IOCTL_DEVICE, strerror(errno)); 499 rc = FAILURE; 500 goto out; 501 } 502 503 /* Inform kernel about the new disabled list. */ 504 if (ioctl(fd, CRYPTO_LOAD_SOFT_DISABLED, pload_soft_dis) == -1) { 505 cryptodebug("CRYPTO_LOAD_SOFT_DISABLED ioctl failed: %s", 506 strerror(errno)); 507 rc = FAILURE; 508 goto out; 509 } 510 511 if (pload_soft_dis->sd_return_value != CRYPTO_SUCCESS) { 512 cryptodebug("CRYPTO_LOAD_SOFT_DISABLED ioctl return_value = " 513 "%d", pload_soft_dis->sd_return_value); 514 rc = FAILURE; 515 goto out; 516 } 517 518 out: 519 free_entrylist(phardlist); 520 free_entrylist(psoftlist); 521 free_mechlist(infolist); 522 free_entry(pent); 523 free(pload_soft_dis); 524 if (fd != -1) 525 (void) close(fd); 526 return (rc); 527 } 528 529 530 /* 531 * Enable a kernel software or hardware provider. 532 * This implements the "cryptoadm enable" command for kernel providers. 533 */ 534 int 535 enable_kef(char *provname, boolean_t rndflag, boolean_t allflag, 536 mechlist_t *mlist) 537 { 538 crypto_load_soft_disabled_t *pload_soft_dis = NULL; 539 crypto_load_dev_disabled_t *pload_dev_dis = NULL; 540 entry_t *pent = NULL; 541 boolean_t redo_flag = B_FALSE; 542 boolean_t in_kernel = B_FALSE; 543 int fd = -1; 544 int rc = SUCCESS; 545 546 547 /* Get the entry of this provider from the kcf.conf file, if any. */ 548 pent = getent_kef(provname, NULL, NULL, NULL); 549 550 if (is_device(provname)) { 551 if (pent == NULL) { 552 /* 553 * This device doesn't have an entry in the config 554 * file, therefore nothing is disabled. 555 */ 556 cryptoerror(LOG_STDERR, gettext( 557 "all mechanisms are enabled already for %s."), 558 provname); 559 free_entry(pent); 560 return (SUCCESS); 561 } 562 } else { /* a software module */ 563 if (check_kernel_for_soft(provname, NULL, &in_kernel) == 564 FAILURE) { 565 free_entry(pent); 566 return (FAILURE); 567 } else if (in_kernel == B_FALSE) { 568 cryptoerror(LOG_STDERR, gettext("%s does not exist."), 569 provname); 570 free_entry(pent); 571 return (FAILURE); 572 } else if ((pent == NULL) || (pent->dis_count == 0)) { 573 /* nothing to be enabled. */ 574 cryptoerror(LOG_STDERR, gettext( 575 "all mechanisms are enabled already for %s."), 576 provname); 577 free_entry(pent); 578 return (SUCCESS); 579 } 580 } 581 582 /* 583 * kCF treats random as an internal mechanism. So, we need to 584 * filter it from the mechanism list here, if we are NOT disabling 585 * or enabling the random feature. Note that we map random feature at 586 * cryptoadm(1M) level to the "random" mechanism in kCF. 587 */ 588 if (!rndflag) { 589 redo_flag = filter_mechlist(&pent->dislist, RANDOM); 590 if (redo_flag) 591 pent->dis_count--; 592 } 593 594 /* Update the entry by enabling mechanisms for this provider */ 595 if ((rc = enable_mechs(&pent, allflag, mlist)) != SUCCESS) { 596 free_entry(pent); 597 return (rc); 598 } 599 600 if (redo_flag) { 601 mechlist_t *tmp; 602 603 if ((tmp = create_mech(RANDOM)) == NULL) { 604 free_entry(pent); 605 return (FAILURE); 606 } 607 tmp->next = pent->dislist; 608 pent->dislist = tmp; 609 pent->dis_count++; 610 } 611 612 /* 613 * Update the kcf.conf file with the updated entry. 614 * For a hardware provider, if there is no more disabled mechanism, 615 * remove the entire kcf.conf entry. 616 */ 617 if (is_device(pent->name) && (pent->dis_count == 0)) { 618 rc = update_kcfconf(pent, DELETE_MODE); 619 } else { 620 rc = update_kcfconf(pent, MODIFY_MODE); 621 } 622 623 if (rc == FAILURE) { 624 free_entry(pent); 625 return (FAILURE); 626 } 627 628 629 /* Inform Kernel about the policy change */ 630 631 if ((fd = open(ADMIN_IOCTL_DEVICE, O_RDWR)) == -1) { 632 cryptoerror(LOG_STDERR, gettext("failed to open %s: %s"), 633 ADMIN_IOCTL_DEVICE, strerror(errno)); 634 free_entry(pent); 635 return (FAILURE); 636 } 637 638 if (is_device(provname)) { 639 /* LOAD_DEV_DISABLED */ 640 if ((pload_dev_dis = setup_dev_dis(pent)) == NULL) { 641 free_entry(pent); 642 return (FAILURE); 643 } 644 645 if (ioctl(fd, CRYPTO_LOAD_DEV_DISABLED, pload_dev_dis) == -1) { 646 cryptodebug("CRYPTO_LOAD_DEV_DISABLED ioctl failed: " 647 "%s", strerror(errno)); 648 free_entry(pent); 649 free(pload_dev_dis); 650 (void) close(fd); 651 return (FAILURE); 652 } 653 654 if (pload_dev_dis->dd_return_value != CRYPTO_SUCCESS) { 655 cryptodebug("CRYPTO_LOAD_DEV_DISABLED ioctl " 656 "return_value = %d", 657 pload_dev_dis->dd_return_value); 658 free_entry(pent); 659 free(pload_dev_dis); 660 (void) close(fd); 661 return (FAILURE); 662 } 663 664 } else { /* a software module */ 665 /* LOAD_SOFT_DISABLED */ 666 if ((pload_soft_dis = setup_soft_dis(pent)) == NULL) { 667 free_entry(pent); 668 return (FAILURE); 669 } 670 671 if (ioctl(fd, CRYPTO_LOAD_SOFT_DISABLED, pload_soft_dis) 672 == -1) { 673 cryptodebug("CRYPTO_LOAD_SOFT_DISABLED ioctl failed: " 674 "%s", strerror(errno)); 675 free_entry(pent); 676 free(pload_soft_dis); 677 (void) close(fd); 678 return (FAILURE); 679 } 680 681 if (pload_soft_dis->sd_return_value != CRYPTO_SUCCESS) { 682 cryptodebug("CRYPTO_LOAD_SOFT_DISABLED ioctl " 683 "return_value = %d", 684 pload_soft_dis->sd_return_value); 685 free_entry(pent); 686 free(pload_soft_dis); 687 (void) close(fd); 688 return (FAILURE); 689 } 690 } 691 692 free_entry(pent); 693 free(pload_soft_dis); 694 (void) close(fd); 695 return (SUCCESS); 696 } 697 698 699 /* 700 * Install a software module with the specified mechanism list into the system. 701 * This routine adds an entry into the config file for this software module 702 * first, then makes a CRYPTO_LOAD_SOFT_CONFIG ioctl call to inform kernel 703 * about the new addition. 704 */ 705 int 706 install_kef(char *provname, mechlist_t *mlist) 707 { 708 crypto_load_soft_config_t *pload_soft_conf = NULL; 709 boolean_t found; 710 entry_t *pent = NULL; 711 FILE *pfile = NULL; 712 FILE *pfile_tmp = NULL; 713 char tmpfile_name[MAXPATHLEN]; 714 char *ptr; 715 char *str; 716 char *name; 717 char buffer[BUFSIZ]; 718 char buffer2[BUFSIZ]; 719 int found_count; 720 int fd = -1; 721 int rc = SUCCESS; 722 int err; 723 724 if ((provname == NULL) || (mlist == NULL)) { 725 return (FAILURE); 726 } 727 728 /* Check if the provider already exists */ 729 if ((pent = getent_kef(provname, NULL, NULL, NULL)) != NULL) { 730 cryptoerror(LOG_STDERR, gettext("%s exists already."), 731 provname); 732 free_entry(pent); 733 return (FAILURE); 734 } 735 736 /* Create an entry with provname and mlist. */ 737 if ((pent = create_entry(provname)) == NULL) { 738 cryptoerror(LOG_STDERR, gettext("out of memory.")); 739 return (FAILURE); 740 } 741 pent->sup_count = get_mech_count(mlist); 742 pent->suplist = mlist; 743 744 /* Append an entry for this software module to the kcf.conf file. */ 745 if ((str = ent2str(pent)) == NULL) { 746 free_entry(pent); 747 return (FAILURE); 748 } 749 750 if ((pfile = fopen(_PATH_KCF_CONF, "r+")) == NULL) { 751 err = errno; 752 cryptoerror(LOG_STDERR, 753 gettext("failed to update the configuration - %s"), 754 strerror(err)); 755 cryptodebug("failed to open %s for write.", _PATH_KCF_CONF); 756 free_entry(pent); 757 return (FAILURE); 758 } 759 760 if (lockf(fileno(pfile), F_TLOCK, 0) == -1) { 761 err = errno; 762 cryptoerror(LOG_STDERR, 763 gettext("failed to lock the configuration - %s"), 764 strerror(err)); 765 free_entry(pent); 766 (void) fclose(pfile); 767 return (FAILURE); 768 } 769 770 /* 771 * Create a temporary file in the /etc/crypto directory. 772 */ 773 (void) strlcpy(tmpfile_name, TMPFILE_TEMPLATE, sizeof (tmpfile_name)); 774 if (mkstemp(tmpfile_name) == -1) { 775 err = errno; 776 cryptoerror(LOG_STDERR, 777 gettext("failed to create a temporary file - %s"), 778 strerror(err)); 779 free_entry(pent); 780 (void) fclose(pfile); 781 return (FAILURE); 782 } 783 784 if ((pfile_tmp = fopen(tmpfile_name, "w")) == NULL) { 785 err = errno; 786 cryptoerror(LOG_STDERR, gettext("failed to open %s - %s"), 787 tmpfile_name, strerror(err)); 788 free_entry(pent); 789 (void) fclose(pfile); 790 return (FAILURE); 791 } 792 793 794 /* 795 * Loop thru the config file. If the provider was reserved within a 796 * package bracket, just uncomment it. Otherwise, append it at 797 * the end. The resulting file will be saved in the temp file first. 798 */ 799 found_count = 0; 800 rc = SUCCESS; 801 while (fgets(buffer, BUFSIZ, pfile) != NULL) { 802 found = B_FALSE; 803 if (buffer[0] == '#') { 804 (void) strlcpy(buffer2, buffer, BUFSIZ); 805 ptr = buffer2; 806 ptr++; 807 if ((name = strtok(ptr, SEP_COLON)) == NULL) { 808 rc = FAILURE; 809 break; 810 } else if (strcmp(provname, name) == 0) { 811 found = B_TRUE; 812 found_count++; 813 } 814 } 815 816 if (found == B_FALSE) { 817 if (fputs(buffer, pfile_tmp) == EOF) { 818 rc = FAILURE; 819 } 820 } else { 821 if (found_count == 1) { 822 if (fputs(str, pfile_tmp) == EOF) { 823 rc = FAILURE; 824 } 825 } else { 826 /* 827 * Found a second entry with #libname. 828 * Should not happen. The kcf.conf file 829 * is corrupted. Give a warning and skip 830 * this entry. 831 */ 832 cryptoerror(LOG_STDERR, gettext( 833 "(Warning) Found an additional reserved " 834 "entry for %s."), provname); 835 } 836 } 837 838 if (rc == FAILURE) { 839 break; 840 } 841 } 842 (void) fclose(pfile); 843 844 if (rc == FAILURE) { 845 cryptoerror(LOG_STDERR, gettext("write error.")); 846 (void) fclose(pfile_tmp); 847 if (unlink(tmpfile_name) != 0) { 848 err = errno; 849 cryptoerror(LOG_STDERR, gettext( 850 "(Warning) failed to remove %s: %s"), tmpfile_name, 851 strerror(err)); 852 } 853 free_entry(pent); 854 return (FAILURE); 855 } 856 857 if (found_count == 0) { 858 /* 859 * This libname was not in package before, append it to the 860 * end of the temp file. 861 */ 862 if (fputs(str, pfile_tmp) == EOF) { 863 cryptoerror(LOG_STDERR, gettext( 864 "failed to write to %s: %s"), tmpfile_name, 865 strerror(errno)); 866 (void) fclose(pfile_tmp); 867 if (unlink(tmpfile_name) != 0) { 868 err = errno; 869 cryptoerror(LOG_STDERR, gettext( 870 "(Warning) failed to remove %s: %s"), 871 tmpfile_name, strerror(err)); 872 } 873 free_entry(pent); 874 return (FAILURE); 875 } 876 } 877 878 if (fclose(pfile_tmp) != 0) { 879 err = errno; 880 cryptoerror(LOG_STDERR, 881 gettext("failed to close %s: %s"), tmpfile_name, 882 strerror(err)); 883 free_entry(pent); 884 return (FAILURE); 885 } 886 887 if (rename(tmpfile_name, _PATH_KCF_CONF) == -1) { 888 err = errno; 889 cryptoerror(LOG_STDERR, 890 gettext("failed to update the configuration - %s"), 891 strerror(err)); 892 cryptodebug("failed to rename %s to %s: %s", tmpfile_name, 893 _PATH_KCF_CONF, strerror(err)); 894 rc = FAILURE; 895 } else if (chmod(_PATH_KCF_CONF, 896 S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH) == -1) { 897 err = errno; 898 cryptoerror(LOG_STDERR, 899 gettext("failed to update the configuration - %s"), 900 strerror(err)); 901 cryptodebug("failed to chmod to %s: %s", _PATH_KCF_CONF, 902 strerror(err)); 903 rc = FAILURE; 904 } else { 905 rc = SUCCESS; 906 } 907 908 if (rc == FAILURE) { 909 if (unlink(tmpfile_name) != 0) { 910 err = errno; 911 cryptoerror(LOG_STDERR, gettext( 912 "(Warning) failed to remove %s: %s"), 913 tmpfile_name, strerror(err)); 914 } 915 free_entry(pent); 916 return (FAILURE); 917 } 918 919 920 /* Inform kernel of this new software module. */ 921 922 if ((pload_soft_conf = setup_soft_conf(pent)) == NULL) { 923 free_entry(pent); 924 return (FAILURE); 925 } 926 927 if ((fd = open(ADMIN_IOCTL_DEVICE, O_RDWR)) == -1) { 928 cryptoerror(LOG_STDERR, gettext("failed to open %s: %s"), 929 ADMIN_IOCTL_DEVICE, strerror(errno)); 930 free_entry(pent); 931 free(pload_soft_conf); 932 return (FAILURE); 933 } 934 935 if (ioctl(fd, CRYPTO_LOAD_SOFT_CONFIG, pload_soft_conf) == -1) { 936 cryptodebug("CRYPTO_LOAD_SOFT_CONFIG ioctl failed: %s", 937 strerror(errno)); 938 free_entry(pent); 939 free(pload_soft_conf); 940 (void) close(fd); 941 return (FAILURE); 942 } 943 944 if (pload_soft_conf->sc_return_value != CRYPTO_SUCCESS) { 945 cryptodebug("CRYPTO_LOAD_SOFT_CONFIG ioctl failed, " 946 "return_value = %d", pload_soft_conf->sc_return_value); 947 free_entry(pent); 948 free(pload_soft_conf); 949 (void) close(fd); 950 return (FAILURE); 951 } 952 953 free_entry(pent); 954 free(pload_soft_conf); 955 (void) close(fd); 956 return (SUCCESS); 957 } 958 959 /* 960 * Uninstall the software module. This routine first unloads the software 961 * module with 3 ioctl calls, then deletes its entry from the config file. 962 * Removing an entry from the config file needs to be done last to ensure 963 * that there is still an entry if the earlier unload failed for any reason. 964 */ 965 int 966 uninstall_kef(char *provname) 967 { 968 entry_t *pent = NULL; 969 int rc = SUCCESS; 970 boolean_t in_kernel = B_FALSE; 971 boolean_t in_kcfconf = B_FALSE; 972 int fd = -1; 973 crypto_load_soft_config_t *pload_soft_conf = NULL; 974 975 /* Check to see if the provider exists first. */ 976 if (check_kernel_for_soft(provname, NULL, &in_kernel) == FAILURE) { 977 return (FAILURE); 978 } else if (in_kernel == B_FALSE) { 979 cryptoerror(LOG_STDERR, gettext("%s does not exist."), 980 provname); 981 return (FAILURE); 982 } 983 984 /* 985 * If it is loaded, unload it first. This does 2 ioctl calls: 986 * CRYPTO_UNLOAD_SOFT_MODULE and CRYPTO_LOAD_SOFT_DISABLED. 987 */ 988 if (unload_kef_soft(provname) == FAILURE) { 989 cryptoerror(LOG_STDERR, 990 gettext("failed to unload %s during uninstall.\n"), 991 provname); 992 return (FAILURE); 993 } 994 995 /* 996 * Inform kernel to remove the configuration of this software module. 997 */ 998 999 /* Setup ioctl() parameter */ 1000 pent = getent_kef(provname, NULL, NULL, NULL); 1001 if (pent != NULL) { /* in kcf.conf */ 1002 in_kcfconf = B_TRUE; 1003 free_mechlist(pent->suplist); 1004 pent->suplist = NULL; 1005 pent->sup_count = 0; 1006 } else if ((pent = create_entry(provname)) == NULL) { 1007 cryptoerror(LOG_STDERR, gettext("out of memory.")); 1008 return (FAILURE); 1009 } 1010 if ((pload_soft_conf = setup_soft_conf(pent)) == NULL) { 1011 free_entry(pent); 1012 return (FAILURE); 1013 } 1014 1015 /* Open the /dev/cryptoadm device */ 1016 if ((fd = open(ADMIN_IOCTL_DEVICE, O_RDWR)) == -1) { 1017 int err = errno; 1018 cryptoerror(LOG_STDERR, gettext("failed to open %s: %s"), 1019 ADMIN_IOCTL_DEVICE, strerror(err)); 1020 free_entry(pent); 1021 free(pload_soft_conf); 1022 return (FAILURE); 1023 } 1024 1025 if (ioctl(fd, CRYPTO_LOAD_SOFT_CONFIG, 1026 pload_soft_conf) == -1) { 1027 cryptodebug("CRYPTO_LOAD_SOFT_CONFIG ioctl failed: %s", 1028 strerror(errno)); 1029 free_entry(pent); 1030 free(pload_soft_conf); 1031 (void) close(fd); 1032 return (FAILURE); 1033 } 1034 1035 if (pload_soft_conf->sc_return_value != CRYPTO_SUCCESS) { 1036 cryptodebug("CRYPTO_LOAD_SOFT_CONFIG ioctl = return_value = %d", 1037 pload_soft_conf->sc_return_value); 1038 free_entry(pent); 1039 free(pload_soft_conf); 1040 (void) close(fd); 1041 return (FAILURE); 1042 } 1043 1044 /* ioctl cleanup */ 1045 free(pload_soft_conf); 1046 (void) close(fd); 1047 1048 1049 /* Finally, remove entry from kcf.conf, if present */ 1050 if (in_kcfconf && (pent != NULL)) { 1051 rc = update_kcfconf(pent, DELETE_MODE); 1052 } 1053 1054 free_entry(pent); 1055 return (rc); 1056 } 1057 1058 1059 /* 1060 * Implement the "cryptoadm refresh" command for global zones. 1061 * That is, send the current contents of kcf.conf to the kernel via ioctl(). 1062 */ 1063 int 1064 refresh(void) 1065 { 1066 crypto_load_soft_config_t *pload_soft_conf = NULL; 1067 crypto_load_soft_disabled_t *pload_soft_dis = NULL; 1068 crypto_load_dev_disabled_t *pload_dev_dis = NULL; 1069 entrylist_t *pdevlist = NULL; 1070 entrylist_t *psoftlist = NULL; 1071 entrylist_t *pfipslist = NULL; 1072 entrylist_t *ptr; 1073 int fd = -1; 1074 int rc = SUCCESS; 1075 int err; 1076 1077 if (get_kcfconf_info(&pdevlist, &psoftlist, &pfipslist) == 1078 FAILURE) { 1079 cryptoerror(LOG_ERR, "failed to retrieve the providers' " 1080 "information from the configuration file - %s.", 1081 _PATH_KCF_CONF); 1082 return (FAILURE); 1083 } 1084 1085 if ((fd = open(ADMIN_IOCTL_DEVICE, O_RDWR)) == -1) { 1086 err = errno; 1087 cryptoerror(LOG_STDERR, gettext("failed to open %s: %s"), 1088 ADMIN_IOCTL_DEVICE, strerror(err)); 1089 free(psoftlist); 1090 free(pdevlist); 1091 return (FAILURE); 1092 } 1093 1094 /* 1095 * For each software provider module, pass two sets of information to 1096 * the kernel: the supported list and the disabled list. 1097 */ 1098 for (ptr = psoftlist; ptr != NULL; ptr = ptr->next) { 1099 entry_t *pent = ptr->pent; 1100 1101 /* load the supported list */ 1102 if ((pload_soft_conf = setup_soft_conf(pent)) == NULL) { 1103 cryptodebug("setup_soft_conf() failed"); 1104 rc = FAILURE; 1105 break; 1106 } 1107 1108 if (!pent->load) { /* unloaded--mark as loaded */ 1109 pent->load = B_TRUE; 1110 rc = update_kcfconf(pent, MODIFY_MODE); 1111 if (rc != SUCCESS) { 1112 free(pload_soft_conf); 1113 break; 1114 } 1115 } 1116 1117 if (ioctl(fd, CRYPTO_LOAD_SOFT_CONFIG, pload_soft_conf) 1118 == -1) { 1119 cryptodebug("CRYPTO_LOAD_SOFT_CONFIG ioctl failed: %s", 1120 strerror(errno)); 1121 free(pload_soft_conf); 1122 rc = FAILURE; 1123 break; 1124 } 1125 1126 if (pload_soft_conf->sc_return_value != CRYPTO_SUCCESS) { 1127 cryptodebug("CRYPTO_LOAD_SOFT_CONFIG ioctl " 1128 "return_value = %d", 1129 pload_soft_conf->sc_return_value); 1130 free(pload_soft_conf); 1131 rc = FAILURE; 1132 break; 1133 } 1134 1135 free(pload_soft_conf); 1136 1137 /* load the disabled list */ 1138 if (ptr->pent->dis_count != 0) { 1139 pload_soft_dis = setup_soft_dis(ptr->pent); 1140 if (pload_soft_dis == NULL) { 1141 cryptodebug("setup_soft_dis() failed"); 1142 free(pload_soft_dis); 1143 rc = FAILURE; 1144 break; 1145 } 1146 1147 if (ioctl(fd, CRYPTO_LOAD_SOFT_DISABLED, 1148 pload_soft_dis) == -1) { 1149 cryptodebug("CRYPTO_LOAD_SOFT_DISABLED ioctl " 1150 "failed: %s", strerror(errno)); 1151 free(pload_soft_dis); 1152 rc = FAILURE; 1153 break; 1154 } 1155 1156 if (pload_soft_dis->sd_return_value != 1157 CRYPTO_SUCCESS) { 1158 cryptodebug("CRYPTO_LOAD_SOFT_DISABLED ioctl " 1159 "return_value = %d", 1160 pload_soft_dis->sd_return_value); 1161 free(pload_soft_dis); 1162 rc = FAILURE; 1163 break; 1164 } 1165 free(pload_soft_dis); 1166 } 1167 } 1168 1169 if (rc != SUCCESS) { 1170 (void) close(fd); 1171 return (rc); 1172 } 1173 1174 1175 /* 1176 * For each hardware provider module, pass the disabled list 1177 * information to the kernel. 1178 */ 1179 for (ptr = pdevlist; ptr != NULL; ptr = ptr->next) { 1180 /* load the disabled list */ 1181 if (ptr->pent->dis_count != 0) { 1182 pload_dev_dis = setup_dev_dis(ptr->pent); 1183 if (pload_dev_dis == NULL) { 1184 rc = FAILURE; 1185 break; 1186 } 1187 1188 if (ioctl(fd, CRYPTO_LOAD_DEV_DISABLED, pload_dev_dis) 1189 == -1) { 1190 cryptodebug("CRYPTO_LOAD_DEV_DISABLED ioctl " 1191 "failed: %s", strerror(errno)); 1192 free(pload_dev_dis); 1193 rc = FAILURE; 1194 break; 1195 } 1196 1197 if (pload_dev_dis->dd_return_value != CRYPTO_SUCCESS) { 1198 cryptodebug("CRYPTO_LOAD_DEV_DISABLED ioctl " 1199 "return_value = %d", 1200 pload_dev_dis->dd_return_value); 1201 free(pload_dev_dis); 1202 rc = FAILURE; 1203 break; 1204 } 1205 free(pload_dev_dis); 1206 } 1207 } 1208 1209 /* 1210 * handle fips_status=enabled|disabled 1211 */ 1212 ptr = pfipslist; 1213 if (ptr != NULL) { 1214 if (ptr->pent->flag_fips_enabled) { 1215 rc = do_fips_actions(FIPS140_ENABLE, REFRESH); 1216 } else { 1217 rc = do_fips_actions(FIPS140_DISABLE, REFRESH); 1218 } 1219 } 1220 1221 (void) close(fd); 1222 return (rc); 1223 } 1224 1225 /* 1226 * Unload the kernel software provider. Before calling this function, the 1227 * caller should check to see if the provider is in the kernel. 1228 * 1229 * This routine makes 2 ioctl calls to remove it completely from the kernel: 1230 * CRYPTO_UNLOAD_SOFT_MODULE - does a modunload of the KCF module 1231 * CRYPTO_LOAD_SOFT_DISABLED - updates kernel disabled mechanism list 1232 * 1233 * This implements part of "cryptoadm unload" and "cryptoadm uninstall". 1234 */ 1235 int 1236 unload_kef_soft(char *provname) 1237 { 1238 crypto_unload_soft_module_t *punload_soft = NULL; 1239 crypto_load_soft_disabled_t *pload_soft_dis = NULL; 1240 entry_t *pent = NULL; 1241 int fd = -1; 1242 int err; 1243 1244 if (provname == NULL) { 1245 cryptoerror(LOG_STDERR, gettext("internal error.")); 1246 return (FAILURE); 1247 } 1248 1249 pent = getent_kef(provname, NULL, NULL, NULL); 1250 if (pent == NULL) { /* not in kcf.conf */ 1251 /* Construct an entry using the provname */ 1252 pent = create_entry(provname); 1253 if (pent == NULL) { 1254 cryptoerror(LOG_STDERR, gettext("out of memory.")); 1255 return (FAILURE); 1256 } 1257 } 1258 1259 /* Open the admin_ioctl_device */ 1260 if ((fd = open(ADMIN_IOCTL_DEVICE, O_RDWR)) == -1) { 1261 err = errno; 1262 cryptoerror(LOG_STDERR, gettext("failed to open %s: %s"), 1263 ADMIN_IOCTL_DEVICE, strerror(err)); 1264 free_entry(pent); 1265 return (FAILURE); 1266 } 1267 1268 /* Inform kernel to unload this software module */ 1269 if ((punload_soft = setup_unload_soft(pent)) == NULL) { 1270 free_entry(pent); 1271 (void) close(fd); 1272 return (FAILURE); 1273 } 1274 1275 if (ioctl(fd, CRYPTO_UNLOAD_SOFT_MODULE, punload_soft) == -1) { 1276 cryptodebug("CRYPTO_UNLOAD_SOFT_MODULE ioctl failed: %s", 1277 strerror(errno)); 1278 free_entry(pent); 1279 free(punload_soft); 1280 (void) close(fd); 1281 return (FAILURE); 1282 } 1283 1284 if (punload_soft->sm_return_value != CRYPTO_SUCCESS) { 1285 cryptodebug("CRYPTO_UNLOAD_SOFT_MODULE ioctl return_value = " 1286 "%d", punload_soft->sm_return_value); 1287 /* 1288 * If the return value is CRYPTO_UNKNOWN_PROVIDER, it means 1289 * that the provider is not registered yet. Should just 1290 * continue. 1291 */ 1292 if (punload_soft->sm_return_value != CRYPTO_UNKNOWN_PROVIDER) { 1293 free_entry(pent); 1294 free(punload_soft); 1295 (void) close(fd); 1296 return (FAILURE); 1297 } 1298 } 1299 1300 free(punload_soft); 1301 1302 /* Inform kernel to remove the disabled entries if any */ 1303 if (pent->dis_count == 0) { 1304 free_entry(pent); 1305 (void) close(fd); 1306 return (SUCCESS); 1307 } else { 1308 free_mechlist(pent->dislist); 1309 pent->dislist = NULL; 1310 pent->dis_count = 0; 1311 } 1312 1313 if ((pload_soft_dis = setup_soft_dis(pent)) == NULL) { 1314 free_entry(pent); 1315 (void) close(fd); 1316 return (FAILURE); 1317 } 1318 1319 /* pent is no longer needed; free it */ 1320 free_entry(pent); 1321 1322 if (ioctl(fd, CRYPTO_LOAD_SOFT_DISABLED, pload_soft_dis) == -1) { 1323 cryptodebug("CRYPTO_LOAD_SOFT_DISABLED ioctl failed: %s", 1324 strerror(errno)); 1325 free(pload_soft_dis); 1326 (void) close(fd); 1327 return (FAILURE); 1328 } 1329 1330 if (pload_soft_dis->sd_return_value != CRYPTO_SUCCESS) { 1331 cryptodebug("CRYPTO_LOAD_SOFT_DISABLED ioctl return_value = " 1332 "%d", pload_soft_dis->sd_return_value); 1333 free(pload_soft_dis); 1334 (void) close(fd); 1335 return (FAILURE); 1336 } 1337 1338 free(pload_soft_dis); 1339 (void) close(fd); 1340 return (SUCCESS); 1341 } 1342 1343 1344 /* 1345 * Check if a hardware provider is valid. If it is valid, returns its device 1346 * name, instance number and the number of mechanisms it supports. 1347 */ 1348 static int 1349 check_hardware_provider(char *provname, char *pname, int *pnum, int *pcount) 1350 { 1351 crypto_get_dev_list_t *dev_list = NULL; 1352 int i; 1353 1354 if (provname == NULL) { 1355 return (FAILURE); 1356 } 1357 1358 /* First, get the device name and the instance number from provname */ 1359 if (split_hw_provname(provname, pname, pnum) == FAILURE) { 1360 return (FAILURE); 1361 } 1362 1363 /* 1364 * Get the complete device list from kernel and check if this provider 1365 * is in the list. 1366 */ 1367 if (get_dev_list(&dev_list) == FAILURE) { 1368 return (FAILURE); 1369 } 1370 1371 for (i = 0; i < dev_list->dl_dev_count; i++) { 1372 if ((strcmp(dev_list->dl_devs[i].le_dev_name, pname) == 0) && 1373 (dev_list->dl_devs[i].le_dev_instance == *pnum)) { 1374 break; 1375 } 1376 } 1377 1378 if (i == dev_list->dl_dev_count) { 1379 /* didn't find this provider in the kernel device list */ 1380 cryptoerror(LOG_STDERR, gettext("%s does not exist."), 1381 provname); 1382 free(dev_list); 1383 return (FAILURE); 1384 } 1385 1386 /* This provider is valid. Get its mechanism count */ 1387 *pcount = dev_list->dl_devs[i].le_mechanism_count; 1388 1389 free(dev_list); 1390 return (SUCCESS); 1391 } 1392 1393 int 1394 fips_update_kcfconf(int action) 1395 { 1396 1397 char *str; 1398 1399 if (action == FIPS140_ENABLE) 1400 str = "fips-140:fips_status=enabled\n"; 1401 else 1402 str = "fips-140:fips_status=disabled\n"; 1403 1404 if (update_conf(_PATH_KCF_CONF, str) != SUCCESS) 1405 return (FAILURE); 1406 1407 return (SUCCESS); 1408 } 1409 1410 void 1411 fips_status_kcfconf(int *status) 1412 { 1413 1414 entry_t *pent = NULL; 1415 1416 if ((pent = getent_kef(FIPS_KEYWORD, NULL, NULL, NULL)) == NULL) { 1417 /* 1418 * By default (no FIPS entry), we assume FIPS is disabled. 1419 */ 1420 *status = CRYPTO_FIPS_MODE_DISABLED; 1421 return; 1422 } 1423 1424 if (pent->flag_fips_enabled) 1425 *status = CRYPTO_FIPS_MODE_ENABLED; 1426 else 1427 *status = CRYPTO_FIPS_MODE_DISABLED; 1428 1429 return; 1430 1431 } 1432