1 /*
2 * This file and its contents are supplied under the terms of the
3 * Common Development and Distribution License ("CDDL"), version 1.0.
4 * You may only use this file in accordance with the terms of version
5 * 1.0 of the CDDL.
6 *
7 * A full copy of the text of the CDDL should have accompanied this
8 * source. A copy of the CDDL is also available via the Internet at
9 * http://www.illumos.org/license/CDDL.
10 */
11
12 /*
13 * Copyright 2015 Nexenta Systems, Inc. All rights reserved.
14 */
15
16 /*
17 * Helper functions for SMB signing using the
18 * Kernel Cryptographic Framework (KCF)
19 *
20 * There are two implementations of these functions:
21 * This one (for kernel) and another for user space:
22 * See: lib/smbsrv/libfksmbsrv/common/fksmb_sign_pkcs.c
23 */
24
25 #include <sys/types.h>
26 #include <sys/kmem.h>
27 #include <sys/crypto/api.h>
28 #include <smbsrv/smb_kproto.h>
29 #include <smbsrv/smb_signing.h>
30
31 /*
32 * SMB1 signing helpers:
33 * (getmech, init, update, final)
34 */
35
36 int
smb_md5_getmech(smb_sign_mech_t * mech)37 smb_md5_getmech(smb_sign_mech_t *mech)
38 {
39 crypto_mech_type_t t;
40
41 t = crypto_mech2id(SUN_CKM_MD5);
42 if (t == CRYPTO_MECH_INVALID)
43 return (-1);
44 mech->cm_type = t;
45 return (0);
46 }
47
48 /*
49 * Start the KCF session, load the key
50 */
51 int
smb_md5_init(smb_sign_ctx_t * ctxp,smb_sign_mech_t * mech)52 smb_md5_init(smb_sign_ctx_t *ctxp, smb_sign_mech_t *mech)
53 {
54 int rv;
55
56 rv = crypto_digest_init(mech, ctxp, NULL);
57
58 return (rv == CRYPTO_SUCCESS ? 0 : -1);
59 }
60
61 /*
62 * Digest one segment
63 */
64 int
smb_md5_update(smb_sign_ctx_t ctx,void * buf,size_t len)65 smb_md5_update(smb_sign_ctx_t ctx, void *buf, size_t len)
66 {
67 crypto_data_t data;
68 int rv;
69
70 bzero(&data, sizeof (data));
71 data.cd_format = CRYPTO_DATA_RAW;
72 data.cd_length = len;
73 data.cd_raw.iov_base = buf;
74 data.cd_raw.iov_len = len;
75
76 rv = crypto_digest_update(ctx, &data, 0);
77
78 return (rv == CRYPTO_SUCCESS ? 0 : -1);
79 }
80
81 /*
82 * Get the final digest.
83 */
84 int
smb_md5_final(smb_sign_ctx_t ctx,uint8_t * digest16)85 smb_md5_final(smb_sign_ctx_t ctx, uint8_t *digest16)
86 {
87 crypto_data_t out;
88 int rv;
89
90 bzero(&out, sizeof (out));
91 out.cd_format = CRYPTO_DATA_RAW;
92 out.cd_length = MD5_DIGEST_LENGTH;
93 out.cd_raw.iov_len = MD5_DIGEST_LENGTH;
94 out.cd_raw.iov_base = (void *)digest16;
95
96 rv = crypto_digest_final(ctx, &out, 0);
97
98 return (rv == CRYPTO_SUCCESS ? 0 : -1);
99 }
100
101 /*
102 * SMB2 signing helpers:
103 * (getmech, init, update, final)
104 */
105
106 int
smb2_hmac_getmech(smb_sign_mech_t * mech)107 smb2_hmac_getmech(smb_sign_mech_t *mech)
108 {
109 crypto_mech_type_t t;
110
111 t = crypto_mech2id(SUN_CKM_SHA256_HMAC);
112 if (t == CRYPTO_MECH_INVALID)
113 return (-1);
114 mech->cm_type = t;
115 return (0);
116 }
117
118 /*
119 * Start the KCF session, load the key
120 */
121 int
smb2_hmac_init(smb_sign_ctx_t * ctxp,smb_sign_mech_t * mech,uint8_t * key,size_t key_len)122 smb2_hmac_init(smb_sign_ctx_t *ctxp, smb_sign_mech_t *mech,
123 uint8_t *key, size_t key_len)
124 {
125 crypto_key_t ckey;
126 int rv;
127
128 bzero(&ckey, sizeof (ckey));
129 ckey.ck_format = CRYPTO_KEY_RAW;
130 ckey.ck_data = key;
131 ckey.ck_length = key_len * 8; /* in bits */
132
133 rv = crypto_mac_init(mech, &ckey, NULL, ctxp, NULL);
134
135 return (rv == CRYPTO_SUCCESS ? 0 : -1);
136 }
137
138 /*
139 * Digest one segment
140 */
141 int
smb2_hmac_update(smb_sign_ctx_t ctx,uint8_t * in,size_t len)142 smb2_hmac_update(smb_sign_ctx_t ctx, uint8_t *in, size_t len)
143 {
144 crypto_data_t data;
145 int rv;
146
147 bzero(&data, sizeof (data));
148 data.cd_format = CRYPTO_DATA_RAW;
149 data.cd_length = len;
150 data.cd_raw.iov_base = (void *)in;
151 data.cd_raw.iov_len = len;
152
153 rv = crypto_mac_update(ctx, &data, 0);
154
155 return (rv == CRYPTO_SUCCESS ? 0 : -1);
156 }
157
158 /*
159 * Note, the SMB2 signature is the first 16 bytes of the
160 * 32-byte SHA256 HMAC digest.
161 */
162 int
smb2_hmac_final(smb_sign_ctx_t ctx,uint8_t * digest16)163 smb2_hmac_final(smb_sign_ctx_t ctx, uint8_t *digest16)
164 {
165 uint8_t full_digest[SHA256_DIGEST_LENGTH];
166 crypto_data_t out;
167 int rv;
168
169 bzero(&out, sizeof (out));
170 out.cd_format = CRYPTO_DATA_RAW;
171 out.cd_length = SHA256_DIGEST_LENGTH;
172 out.cd_raw.iov_len = SHA256_DIGEST_LENGTH;
173 out.cd_raw.iov_base = (void *)full_digest;
174
175 rv = crypto_mac_final(ctx, &out, 0);
176 if (rv == CRYPTO_SUCCESS)
177 bcopy(full_digest, digest16, 16);
178
179 return (rv == CRYPTO_SUCCESS ? 0 : -1);
180 }
181