1 /*
2 * Copyright 2017-2023 The OpenSSL Project Authors. All Rights Reserved.
3 *
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8 */
9
10 /* We need to use some deprecated APIs */
11 #define OPENSSL_SUPPRESS_DEPRECATED
12
13 #include "internal/e_os.h"
14 #include <string.h>
15 #include <sys/types.h>
16 #include <sys/stat.h>
17 #include <fcntl.h>
18 #include <sys/ioctl.h>
19 #include <unistd.h>
20 #include <assert.h>
21
22 #include <openssl/conf.h>
23 #include <openssl/evp.h>
24 #include <openssl/err.h>
25 #include <openssl/engine.h>
26 #include <openssl/objects.h>
27 #include "crypto/cryptodev.h"
28 #include "internal/nelem.h"
29
30 /* #define ENGINE_DEVCRYPTO_DEBUG */
31
32 #if CRYPTO_ALGORITHM_MIN < CRYPTO_ALGORITHM_MAX
33 # define CHECK_BSD_STYLE_MACROS
34 #endif
35
36 #define engine_devcrypto_id "devcrypto"
37
38 /*
39 * Use session2_op on FreeBSD which permits requesting specific
40 * drivers or classes of drivers at session creation time.
41 */
42 #ifdef CIOCGSESSION2
43 typedef struct session2_op session_op_t;
44 #else
45 typedef struct session_op session_op_t;
46 #endif
47
48 /*
49 * ONE global file descriptor for all sessions. This allows operations
50 * such as digest session data copying (see digest_copy()), but is also
51 * saner... why re-open /dev/crypto for every session?
52 */
53 static int cfd = -1;
54 #define DEVCRYPTO_REQUIRE_ACCELERATED 0 /* require confirmation of acceleration */
55 #define DEVCRYPTO_USE_SOFTWARE 1 /* allow software drivers */
56 #define DEVCRYPTO_REJECT_SOFTWARE 2 /* only disallow confirmed software drivers */
57
58 #define DEVCRYPTO_DEFAULT_USE_SOFTDRIVERS DEVCRYPTO_REJECT_SOFTWARE
59 static int use_softdrivers = DEVCRYPTO_DEFAULT_USE_SOFTDRIVERS;
60
61 /*
62 * cipher/digest status & acceleration definitions
63 * Make sure the defaults are set to 0
64 */
65 struct driver_info_st {
66 enum devcrypto_status_t {
67 DEVCRYPTO_STATUS_FAILURE = -3, /* unusable for other reason */
68 DEVCRYPTO_STATUS_NO_CIOCCPHASH = -2, /* hash state copy not supported */
69 DEVCRYPTO_STATUS_NO_CIOCGSESSION = -1, /* session open failed */
70 DEVCRYPTO_STATUS_UNKNOWN = 0, /* not tested yet */
71 DEVCRYPTO_STATUS_USABLE = 1 /* algo can be used */
72 } status;
73
74 enum devcrypto_accelerated_t {
75 DEVCRYPTO_NOT_ACCELERATED = -1, /* software implemented */
76 DEVCRYPTO_ACCELERATION_UNKNOWN = 0, /* acceleration support unknown */
77 DEVCRYPTO_ACCELERATED = 1 /* hardware accelerated */
78 } accelerated;
79
80 char *driver_name;
81 };
82
83 #ifdef OPENSSL_NO_DYNAMIC_ENGINE
84 void engine_load_devcrypto_int(void);
85 #endif
86
clean_devcrypto_session(session_op_t * sess)87 static int clean_devcrypto_session(session_op_t *sess) {
88 if (ioctl(cfd, CIOCFSESSION, &sess->ses) < 0) {
89 ERR_raise_data(ERR_LIB_SYS, errno, "calling ioctl()");
90 return 0;
91 }
92 memset(sess, 0, sizeof(*sess));
93 return 1;
94 }
95
96 /******************************************************************************
97 *
98 * Ciphers
99 *
100 * Because they all do the same basic operation, we have only one set of
101 * method functions for them all to share, and a mapping table between
102 * NIDs and cryptodev IDs, with all the necessary size data.
103 *
104 *****/
105
106 struct cipher_ctx {
107 session_op_t sess;
108 int op; /* COP_ENCRYPT or COP_DECRYPT */
109 unsigned long mode; /* EVP_CIPH_*_MODE */
110
111 /* to handle ctr mode being a stream cipher */
112 unsigned char partial[EVP_MAX_BLOCK_LENGTH];
113 unsigned int blocksize, num;
114 };
115
116 static const struct cipher_data_st {
117 int nid;
118 int blocksize;
119 int keylen;
120 int ivlen;
121 int flags;
122 int devcryptoid;
123 } cipher_data[] = {
124 #ifndef OPENSSL_NO_DES
125 { NID_des_cbc, 8, 8, 8, EVP_CIPH_CBC_MODE, CRYPTO_DES_CBC },
126 { NID_des_ede3_cbc, 8, 24, 8, EVP_CIPH_CBC_MODE, CRYPTO_3DES_CBC },
127 #endif
128 #ifndef OPENSSL_NO_BF
129 { NID_bf_cbc, 8, 16, 8, EVP_CIPH_CBC_MODE, CRYPTO_BLF_CBC },
130 #endif
131 #ifndef OPENSSL_NO_CAST
132 { NID_cast5_cbc, 8, 16, 8, EVP_CIPH_CBC_MODE, CRYPTO_CAST_CBC },
133 #endif
134 { NID_aes_128_cbc, 16, 128 / 8, 16, EVP_CIPH_CBC_MODE, CRYPTO_AES_CBC },
135 { NID_aes_192_cbc, 16, 192 / 8, 16, EVP_CIPH_CBC_MODE, CRYPTO_AES_CBC },
136 { NID_aes_256_cbc, 16, 256 / 8, 16, EVP_CIPH_CBC_MODE, CRYPTO_AES_CBC },
137 #ifndef OPENSSL_NO_RC4
138 { NID_rc4, 1, 16, 0, EVP_CIPH_STREAM_CIPHER, CRYPTO_ARC4 },
139 #endif
140 #if !defined(CHECK_BSD_STYLE_MACROS) || defined(CRYPTO_AES_CTR)
141 { NID_aes_128_ctr, 16, 128 / 8, 16, EVP_CIPH_CTR_MODE, CRYPTO_AES_CTR },
142 { NID_aes_192_ctr, 16, 192 / 8, 16, EVP_CIPH_CTR_MODE, CRYPTO_AES_CTR },
143 { NID_aes_256_ctr, 16, 256 / 8, 16, EVP_CIPH_CTR_MODE, CRYPTO_AES_CTR },
144 #endif
145 #if 0 /* Not yet supported */
146 { NID_aes_128_xts, 16, 128 / 8 * 2, 16, EVP_CIPH_XTS_MODE, CRYPTO_AES_XTS },
147 { NID_aes_256_xts, 16, 256 / 8 * 2, 16, EVP_CIPH_XTS_MODE, CRYPTO_AES_XTS },
148 #endif
149 #if !defined(CHECK_BSD_STYLE_MACROS) || defined(CRYPTO_AES_ECB)
150 { NID_aes_128_ecb, 16, 128 / 8, 0, EVP_CIPH_ECB_MODE, CRYPTO_AES_ECB },
151 { NID_aes_192_ecb, 16, 192 / 8, 0, EVP_CIPH_ECB_MODE, CRYPTO_AES_ECB },
152 { NID_aes_256_ecb, 16, 256 / 8, 0, EVP_CIPH_ECB_MODE, CRYPTO_AES_ECB },
153 #endif
154 #if 0 /* Not yet supported */
155 { NID_aes_128_gcm, 16, 128 / 8, 16, EVP_CIPH_GCM_MODE, CRYPTO_AES_GCM },
156 { NID_aes_192_gcm, 16, 192 / 8, 16, EVP_CIPH_GCM_MODE, CRYPTO_AES_GCM },
157 { NID_aes_256_gcm, 16, 256 / 8, 16, EVP_CIPH_GCM_MODE, CRYPTO_AES_GCM },
158 #endif
159 #ifndef OPENSSL_NO_CAMELLIA
160 { NID_camellia_128_cbc, 16, 128 / 8, 16, EVP_CIPH_CBC_MODE,
161 CRYPTO_CAMELLIA_CBC },
162 { NID_camellia_192_cbc, 16, 192 / 8, 16, EVP_CIPH_CBC_MODE,
163 CRYPTO_CAMELLIA_CBC },
164 { NID_camellia_256_cbc, 16, 256 / 8, 16, EVP_CIPH_CBC_MODE,
165 CRYPTO_CAMELLIA_CBC },
166 #endif
167 };
168
find_cipher_data_index(int nid)169 static size_t find_cipher_data_index(int nid)
170 {
171 size_t i;
172
173 for (i = 0; i < OSSL_NELEM(cipher_data); i++)
174 if (nid == cipher_data[i].nid)
175 return i;
176 return (size_t)-1;
177 }
178
get_cipher_data_index(int nid)179 static size_t get_cipher_data_index(int nid)
180 {
181 size_t i = find_cipher_data_index(nid);
182
183 if (i != (size_t)-1)
184 return i;
185
186 /*
187 * Code further down must make sure that only NIDs in the table above
188 * are used. If any other NID reaches this function, there's a grave
189 * coding error further down.
190 */
191 assert("Code that never should be reached" == NULL);
192 return -1;
193 }
194
get_cipher_data(int nid)195 static const struct cipher_data_st *get_cipher_data(int nid)
196 {
197 return &cipher_data[get_cipher_data_index(nid)];
198 }
199
200 /*
201 * Following are the three necessary functions to map OpenSSL functionality
202 * with cryptodev.
203 */
204
cipher_init(EVP_CIPHER_CTX * ctx,const unsigned char * key,const unsigned char * iv,int enc)205 static int cipher_init(EVP_CIPHER_CTX *ctx, const unsigned char *key,
206 const unsigned char *iv, int enc)
207 {
208 struct cipher_ctx *cipher_ctx =
209 (struct cipher_ctx *)EVP_CIPHER_CTX_get_cipher_data(ctx);
210 const struct cipher_data_st *cipher_d =
211 get_cipher_data(EVP_CIPHER_CTX_get_nid(ctx));
212 int ret;
213
214 /* cleanup a previous session */
215 if (cipher_ctx->sess.ses != 0 &&
216 clean_devcrypto_session(&cipher_ctx->sess) == 0)
217 return 0;
218
219 cipher_ctx->sess.cipher = cipher_d->devcryptoid;
220 cipher_ctx->sess.keylen = cipher_d->keylen;
221 cipher_ctx->sess.key = (void *)key;
222 cipher_ctx->op = enc ? COP_ENCRYPT : COP_DECRYPT;
223 cipher_ctx->mode = cipher_d->flags & EVP_CIPH_MODE;
224 cipher_ctx->blocksize = cipher_d->blocksize;
225 #ifdef CIOCGSESSION2
226 cipher_ctx->sess.crid = (use_softdrivers == DEVCRYPTO_USE_SOFTWARE) ?
227 CRYPTO_FLAG_SOFTWARE | CRYPTO_FLAG_HARDWARE :
228 CRYPTO_FLAG_HARDWARE;
229 ret = ioctl(cfd, CIOCGSESSION2, &cipher_ctx->sess);
230 #else
231 ret = ioctl(cfd, CIOCGSESSION, &cipher_ctx->sess);
232 #endif
233 if (ret < 0) {
234 ERR_raise_data(ERR_LIB_SYS, errno, "calling ioctl()");
235 return 0;
236 }
237
238 return 1;
239 }
240
cipher_do_cipher(EVP_CIPHER_CTX * ctx,unsigned char * out,const unsigned char * in,size_t inl)241 static int cipher_do_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
242 const unsigned char *in, size_t inl)
243 {
244 struct cipher_ctx *cipher_ctx =
245 (struct cipher_ctx *)EVP_CIPHER_CTX_get_cipher_data(ctx);
246 struct crypt_op cryp;
247 unsigned char *iv = EVP_CIPHER_CTX_iv_noconst(ctx);
248 #if !defined(COP_FLAG_WRITE_IV)
249 unsigned char saved_iv[EVP_MAX_IV_LENGTH];
250 const unsigned char *ivptr;
251 size_t nblocks, ivlen;
252 #endif
253
254 memset(&cryp, 0, sizeof(cryp));
255 cryp.ses = cipher_ctx->sess.ses;
256 cryp.len = inl;
257 cryp.src = (void *)in;
258 cryp.dst = (void *)out;
259 cryp.iv = (void *)iv;
260 cryp.op = cipher_ctx->op;
261 #if !defined(COP_FLAG_WRITE_IV)
262 cryp.flags = 0;
263
264 ivlen = EVP_CIPHER_CTX_get_iv_length(ctx);
265 if (ivlen > 0)
266 switch (cipher_ctx->mode) {
267 case EVP_CIPH_CBC_MODE:
268 assert(inl >= ivlen);
269 if (!EVP_CIPHER_CTX_is_encrypting(ctx)) {
270 ivptr = in + inl - ivlen;
271 memcpy(saved_iv, ivptr, ivlen);
272 }
273 break;
274
275 case EVP_CIPH_CTR_MODE:
276 break;
277
278 default: /* should not happen */
279 return 0;
280 }
281 #else
282 cryp.flags = COP_FLAG_WRITE_IV;
283 #endif
284
285 if (ioctl(cfd, CIOCCRYPT, &cryp) < 0) {
286 ERR_raise_data(ERR_LIB_SYS, errno, "calling ioctl()");
287 return 0;
288 }
289
290 #if !defined(COP_FLAG_WRITE_IV)
291 if (ivlen > 0)
292 switch (cipher_ctx->mode) {
293 case EVP_CIPH_CBC_MODE:
294 assert(inl >= ivlen);
295 if (EVP_CIPHER_CTX_is_encrypting(ctx))
296 ivptr = out + inl - ivlen;
297 else
298 ivptr = saved_iv;
299
300 memcpy(iv, ivptr, ivlen);
301 break;
302
303 case EVP_CIPH_CTR_MODE:
304 nblocks = (inl + cipher_ctx->blocksize - 1)
305 / cipher_ctx->blocksize;
306 do {
307 ivlen--;
308 nblocks += iv[ivlen];
309 iv[ivlen] = (uint8_t) nblocks;
310 nblocks >>= 8;
311 } while (ivlen);
312 break;
313
314 default: /* should not happen */
315 return 0;
316 }
317 #endif
318
319 return 1;
320 }
321
ctr_do_cipher(EVP_CIPHER_CTX * ctx,unsigned char * out,const unsigned char * in,size_t inl)322 static int ctr_do_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
323 const unsigned char *in, size_t inl)
324 {
325 struct cipher_ctx *cipher_ctx =
326 (struct cipher_ctx *)EVP_CIPHER_CTX_get_cipher_data(ctx);
327 size_t nblocks, len;
328
329 /* initial partial block */
330 while (cipher_ctx->num && inl) {
331 (*out++) = *(in++) ^ cipher_ctx->partial[cipher_ctx->num];
332 --inl;
333 cipher_ctx->num = (cipher_ctx->num + 1) % cipher_ctx->blocksize;
334 }
335
336 /* full blocks */
337 if (inl > cipher_ctx->blocksize) {
338 nblocks = inl/cipher_ctx->blocksize;
339 len = nblocks * cipher_ctx->blocksize;
340 if (cipher_do_cipher(ctx, out, in, len) < 1)
341 return 0;
342 inl -= len;
343 out += len;
344 in += len;
345 }
346
347 /* final partial block */
348 if (inl) {
349 memset(cipher_ctx->partial, 0, cipher_ctx->blocksize);
350 if (cipher_do_cipher(ctx, cipher_ctx->partial, cipher_ctx->partial,
351 cipher_ctx->blocksize) < 1)
352 return 0;
353 while (inl--) {
354 out[cipher_ctx->num] = in[cipher_ctx->num]
355 ^ cipher_ctx->partial[cipher_ctx->num];
356 cipher_ctx->num++;
357 }
358 }
359
360 return 1;
361 }
362
cipher_ctrl(EVP_CIPHER_CTX * ctx,int type,int p1,void * p2)363 static int cipher_ctrl(EVP_CIPHER_CTX *ctx, int type, int p1, void* p2)
364 {
365 struct cipher_ctx *cipher_ctx =
366 (struct cipher_ctx *)EVP_CIPHER_CTX_get_cipher_data(ctx);
367 EVP_CIPHER_CTX *to_ctx = (EVP_CIPHER_CTX *)p2;
368 struct cipher_ctx *to_cipher_ctx;
369
370 switch (type) {
371
372 case EVP_CTRL_COPY:
373 if (cipher_ctx == NULL)
374 return 1;
375 /* when copying the context, a new session needs to be initialized */
376 to_cipher_ctx =
377 (struct cipher_ctx *)EVP_CIPHER_CTX_get_cipher_data(to_ctx);
378 memset(&to_cipher_ctx->sess, 0, sizeof(to_cipher_ctx->sess));
379 return cipher_init(to_ctx, (void *)cipher_ctx->sess.key, EVP_CIPHER_CTX_iv(ctx),
380 (cipher_ctx->op == COP_ENCRYPT));
381
382 case EVP_CTRL_INIT:
383 memset(&cipher_ctx->sess, 0, sizeof(cipher_ctx->sess));
384 return 1;
385
386 default:
387 break;
388 }
389
390 return -1;
391 }
392
cipher_cleanup(EVP_CIPHER_CTX * ctx)393 static int cipher_cleanup(EVP_CIPHER_CTX *ctx)
394 {
395 struct cipher_ctx *cipher_ctx =
396 (struct cipher_ctx *)EVP_CIPHER_CTX_get_cipher_data(ctx);
397
398 return clean_devcrypto_session(&cipher_ctx->sess);
399 }
400
401 /*
402 * Keep tables of known nids, associated methods, selected ciphers, and driver
403 * info.
404 * Note that known_cipher_nids[] isn't necessarily indexed the same way as
405 * cipher_data[] above, which the other tables are.
406 */
407 static int known_cipher_nids[OSSL_NELEM(cipher_data)];
408 static int known_cipher_nids_amount = -1; /* -1 indicates not yet initialised */
409 static EVP_CIPHER *known_cipher_methods[OSSL_NELEM(cipher_data)] = { NULL, };
410 static int selected_ciphers[OSSL_NELEM(cipher_data)];
411 static struct driver_info_st cipher_driver_info[OSSL_NELEM(cipher_data)];
412
413
devcrypto_test_cipher(size_t cipher_data_index)414 static int devcrypto_test_cipher(size_t cipher_data_index)
415 {
416 return (cipher_driver_info[cipher_data_index].status == DEVCRYPTO_STATUS_USABLE
417 && selected_ciphers[cipher_data_index] == 1
418 && (cipher_driver_info[cipher_data_index].accelerated
419 == DEVCRYPTO_ACCELERATED
420 || use_softdrivers == DEVCRYPTO_USE_SOFTWARE
421 || (cipher_driver_info[cipher_data_index].accelerated
422 != DEVCRYPTO_NOT_ACCELERATED
423 && use_softdrivers == DEVCRYPTO_REJECT_SOFTWARE)));
424 }
425
prepare_cipher_methods(void)426 static void prepare_cipher_methods(void)
427 {
428 size_t i;
429 session_op_t sess;
430 unsigned long cipher_mode;
431 #ifdef CIOCGSESSION2
432 struct crypt_find_op fop;
433 enum devcrypto_accelerated_t accelerated;
434 #elif defined(CIOCGSESSINFO)
435 struct session_info_op siop;
436 #endif
437
438 memset(&cipher_driver_info, 0, sizeof(cipher_driver_info));
439
440 memset(&sess, 0, sizeof(sess));
441 sess.key = (void *)"01234567890123456789012345678901234567890123456789";
442
443 for (i = 0, known_cipher_nids_amount = 0;
444 i < OSSL_NELEM(cipher_data); i++) {
445
446 selected_ciphers[i] = 1;
447 /*
448 * Check that the cipher is usable
449 */
450 sess.cipher = cipher_data[i].devcryptoid;
451 sess.keylen = cipher_data[i].keylen;
452 #ifdef CIOCGSESSION2
453 /*
454 * When using CIOCGSESSION2, first try to allocate a hardware
455 * ("accelerated") session. If that fails, fall back to
456 * allocating a software session.
457 */
458 sess.crid = CRYPTO_FLAG_HARDWARE;
459 if (ioctl(cfd, CIOCGSESSION2, &sess) == 0) {
460 accelerated = DEVCRYPTO_ACCELERATED;
461 } else {
462 sess.crid = CRYPTO_FLAG_SOFTWARE;
463 if (ioctl(cfd, CIOCGSESSION2, &sess) < 0) {
464 cipher_driver_info[i].status = DEVCRYPTO_STATUS_NO_CIOCGSESSION;
465 continue;
466 }
467 accelerated = DEVCRYPTO_NOT_ACCELERATED;
468 }
469 #else
470 if (ioctl(cfd, CIOCGSESSION, &sess) < 0) {
471 cipher_driver_info[i].status = DEVCRYPTO_STATUS_NO_CIOCGSESSION;
472 continue;
473 }
474 #endif
475
476 cipher_mode = cipher_data[i].flags & EVP_CIPH_MODE;
477
478 if ((known_cipher_methods[i] =
479 EVP_CIPHER_meth_new(cipher_data[i].nid,
480 cipher_mode == EVP_CIPH_CTR_MODE ? 1 :
481 cipher_data[i].blocksize,
482 cipher_data[i].keylen)) == NULL
483 || !EVP_CIPHER_meth_set_iv_length(known_cipher_methods[i],
484 cipher_data[i].ivlen)
485 || !EVP_CIPHER_meth_set_flags(known_cipher_methods[i],
486 cipher_data[i].flags
487 | EVP_CIPH_CUSTOM_COPY
488 | EVP_CIPH_CTRL_INIT
489 | EVP_CIPH_FLAG_DEFAULT_ASN1)
490 || !EVP_CIPHER_meth_set_init(known_cipher_methods[i], cipher_init)
491 || !EVP_CIPHER_meth_set_do_cipher(known_cipher_methods[i],
492 cipher_mode == EVP_CIPH_CTR_MODE ?
493 ctr_do_cipher :
494 cipher_do_cipher)
495 || !EVP_CIPHER_meth_set_ctrl(known_cipher_methods[i], cipher_ctrl)
496 || !EVP_CIPHER_meth_set_cleanup(known_cipher_methods[i],
497 cipher_cleanup)
498 || !EVP_CIPHER_meth_set_impl_ctx_size(known_cipher_methods[i],
499 sizeof(struct cipher_ctx))) {
500 cipher_driver_info[i].status = DEVCRYPTO_STATUS_FAILURE;
501 EVP_CIPHER_meth_free(known_cipher_methods[i]);
502 known_cipher_methods[i] = NULL;
503 } else {
504 cipher_driver_info[i].status = DEVCRYPTO_STATUS_USABLE;
505 #ifdef CIOCGSESSION2
506 cipher_driver_info[i].accelerated = accelerated;
507 fop.crid = sess.crid;
508 if (ioctl(cfd, CIOCFINDDEV, &fop) == 0) {
509 cipher_driver_info[i].driver_name =
510 OPENSSL_strndup(fop.name, sizeof(fop.name));
511 }
512 #elif defined(CIOCGSESSINFO)
513 siop.ses = sess.ses;
514 if (ioctl(cfd, CIOCGSESSINFO, &siop) < 0) {
515 cipher_driver_info[i].accelerated = DEVCRYPTO_ACCELERATION_UNKNOWN;
516 } else {
517 cipher_driver_info[i].driver_name =
518 OPENSSL_strndup(siop.cipher_info.cra_driver_name,
519 CRYPTODEV_MAX_ALG_NAME);
520 if (!(siop.flags & SIOP_FLAG_KERNEL_DRIVER_ONLY))
521 cipher_driver_info[i].accelerated = DEVCRYPTO_NOT_ACCELERATED;
522 else
523 cipher_driver_info[i].accelerated = DEVCRYPTO_ACCELERATED;
524 }
525 #endif /* CIOCGSESSINFO */
526 }
527 ioctl(cfd, CIOCFSESSION, &sess.ses);
528 if (devcrypto_test_cipher(i)) {
529 known_cipher_nids[known_cipher_nids_amount++] =
530 cipher_data[i].nid;
531 }
532 }
533 }
534
rebuild_known_cipher_nids(ENGINE * e)535 static void rebuild_known_cipher_nids(ENGINE *e)
536 {
537 size_t i;
538
539 for (i = 0, known_cipher_nids_amount = 0; i < OSSL_NELEM(cipher_data); i++) {
540 if (devcrypto_test_cipher(i))
541 known_cipher_nids[known_cipher_nids_amount++] = cipher_data[i].nid;
542 }
543 ENGINE_unregister_ciphers(e);
544 ENGINE_register_ciphers(e);
545 }
546
get_cipher_method(int nid)547 static const EVP_CIPHER *get_cipher_method(int nid)
548 {
549 size_t i = get_cipher_data_index(nid);
550
551 if (i == (size_t)-1)
552 return NULL;
553 return known_cipher_methods[i];
554 }
555
get_cipher_nids(const int ** nids)556 static int get_cipher_nids(const int **nids)
557 {
558 *nids = known_cipher_nids;
559 return known_cipher_nids_amount;
560 }
561
destroy_cipher_method(int nid)562 static void destroy_cipher_method(int nid)
563 {
564 size_t i = get_cipher_data_index(nid);
565
566 EVP_CIPHER_meth_free(known_cipher_methods[i]);
567 known_cipher_methods[i] = NULL;
568 }
569
destroy_all_cipher_methods(void)570 static void destroy_all_cipher_methods(void)
571 {
572 size_t i;
573
574 for (i = 0; i < OSSL_NELEM(cipher_data); i++) {
575 destroy_cipher_method(cipher_data[i].nid);
576 OPENSSL_free(cipher_driver_info[i].driver_name);
577 cipher_driver_info[i].driver_name = NULL;
578 }
579 }
580
devcrypto_ciphers(ENGINE * e,const EVP_CIPHER ** cipher,const int ** nids,int nid)581 static int devcrypto_ciphers(ENGINE *e, const EVP_CIPHER **cipher,
582 const int **nids, int nid)
583 {
584 if (cipher == NULL)
585 return get_cipher_nids(nids);
586
587 *cipher = get_cipher_method(nid);
588
589 return *cipher != NULL;
590 }
591
devcrypto_select_all_ciphers(int * cipher_list)592 static void devcrypto_select_all_ciphers(int *cipher_list)
593 {
594 size_t i;
595
596 for (i = 0; i < OSSL_NELEM(cipher_data); i++)
597 cipher_list[i] = 1;
598 }
599
cryptodev_select_cipher_cb(const char * str,int len,void * usr)600 static int cryptodev_select_cipher_cb(const char *str, int len, void *usr)
601 {
602 int *cipher_list = (int *)usr;
603 char *name;
604 const EVP_CIPHER *EVP;
605 size_t i;
606
607 if (len == 0)
608 return 1;
609 if (usr == NULL || (name = OPENSSL_strndup(str, len)) == NULL)
610 return 0;
611 EVP = EVP_get_cipherbyname(name);
612 if (EVP == NULL)
613 fprintf(stderr, "devcrypto: unknown cipher %s\n", name);
614 else if ((i = find_cipher_data_index(EVP_CIPHER_get_nid(EVP))) != (size_t)-1)
615 cipher_list[i] = 1;
616 else
617 fprintf(stderr, "devcrypto: cipher %s not available\n", name);
618 OPENSSL_free(name);
619 return 1;
620 }
621
dump_cipher_info(void)622 static void dump_cipher_info(void)
623 {
624 size_t i;
625 const char *name;
626
627 fprintf (stderr, "Information about ciphers supported by the /dev/crypto"
628 " engine:\n");
629 #ifndef CIOCGSESSINFO
630 fprintf(stderr, "CIOCGSESSINFO (session info call) unavailable\n");
631 #endif
632 for (i = 0; i < OSSL_NELEM(cipher_data); i++) {
633 name = OBJ_nid2sn(cipher_data[i].nid);
634 fprintf (stderr, "Cipher %s, NID=%d, /dev/crypto info: id=%d, ",
635 name ? name : "unknown", cipher_data[i].nid,
636 cipher_data[i].devcryptoid);
637 if (cipher_driver_info[i].status == DEVCRYPTO_STATUS_NO_CIOCGSESSION) {
638 fprintf (stderr, "CIOCGSESSION (session open call) failed\n");
639 continue;
640 }
641 fprintf (stderr, "driver=%s ", cipher_driver_info[i].driver_name ?
642 cipher_driver_info[i].driver_name : "unknown");
643 if (cipher_driver_info[i].accelerated == DEVCRYPTO_ACCELERATED)
644 fprintf(stderr, "(hw accelerated)");
645 else if (cipher_driver_info[i].accelerated == DEVCRYPTO_NOT_ACCELERATED)
646 fprintf(stderr, "(software)");
647 else
648 fprintf(stderr, "(acceleration status unknown)");
649 if (cipher_driver_info[i].status == DEVCRYPTO_STATUS_FAILURE)
650 fprintf (stderr, ". Cipher setup failed");
651 fprintf(stderr, "\n");
652 }
653 fprintf(stderr, "\n");
654 }
655
656 /*
657 * We only support digests if the cryptodev implementation supports multiple
658 * data updates and session copying. Otherwise, we would be forced to maintain
659 * a cache, which is perilous if there's a lot of data coming in (if someone
660 * wants to checksum an OpenSSL tarball, for example).
661 */
662 #if defined(CIOCCPHASH) && defined(COP_FLAG_UPDATE) && defined(COP_FLAG_FINAL)
663 #define IMPLEMENT_DIGEST
664
665 /******************************************************************************
666 *
667 * Digests
668 *
669 * Because they all do the same basic operation, we have only one set of
670 * method functions for them all to share, and a mapping table between
671 * NIDs and cryptodev IDs, with all the necessary size data.
672 *
673 *****/
674
675 struct digest_ctx {
676 session_op_t sess;
677 /* This signals that the init function was called, not that it succeeded. */
678 int init_called;
679 unsigned char digest_res[HASH_MAX_LEN];
680 };
681
682 static const struct digest_data_st {
683 int nid;
684 int blocksize;
685 int digestlen;
686 int devcryptoid;
687 } digest_data[] = {
688 #ifndef OPENSSL_NO_MD5
689 { NID_md5, /* MD5_CBLOCK */ 64, 16, CRYPTO_MD5 },
690 #endif
691 { NID_sha1, SHA_CBLOCK, 20, CRYPTO_SHA1 },
692 #ifndef OPENSSL_NO_RMD160
693 # if !defined(CHECK_BSD_STYLE_MACROS) || defined(CRYPTO_RIPEMD160)
694 { NID_ripemd160, /* RIPEMD160_CBLOCK */ 64, 20, CRYPTO_RIPEMD160 },
695 # endif
696 #endif
697 #if !defined(CHECK_BSD_STYLE_MACROS) || defined(CRYPTO_SHA2_224)
698 { NID_sha224, SHA256_CBLOCK, 224 / 8, CRYPTO_SHA2_224 },
699 #endif
700 #if !defined(CHECK_BSD_STYLE_MACROS) || defined(CRYPTO_SHA2_256)
701 { NID_sha256, SHA256_CBLOCK, 256 / 8, CRYPTO_SHA2_256 },
702 #endif
703 #if !defined(CHECK_BSD_STYLE_MACROS) || defined(CRYPTO_SHA2_384)
704 { NID_sha384, SHA512_CBLOCK, 384 / 8, CRYPTO_SHA2_384 },
705 #endif
706 #if !defined(CHECK_BSD_STYLE_MACROS) || defined(CRYPTO_SHA2_512)
707 { NID_sha512, SHA512_CBLOCK, 512 / 8, CRYPTO_SHA2_512 },
708 #endif
709 };
710
find_digest_data_index(int nid)711 static size_t find_digest_data_index(int nid)
712 {
713 size_t i;
714
715 for (i = 0; i < OSSL_NELEM(digest_data); i++)
716 if (nid == digest_data[i].nid)
717 return i;
718 return (size_t)-1;
719 }
720
get_digest_data_index(int nid)721 static size_t get_digest_data_index(int nid)
722 {
723 size_t i = find_digest_data_index(nid);
724
725 if (i != (size_t)-1)
726 return i;
727
728 /*
729 * Code further down must make sure that only NIDs in the table above
730 * are used. If any other NID reaches this function, there's a grave
731 * coding error further down.
732 */
733 assert("Code that never should be reached" == NULL);
734 return -1;
735 }
736
get_digest_data(int nid)737 static const struct digest_data_st *get_digest_data(int nid)
738 {
739 return &digest_data[get_digest_data_index(nid)];
740 }
741
742 /*
743 * Following are the five necessary functions to map OpenSSL functionality
744 * with cryptodev: init, update, final, cleanup, and copy.
745 */
746
digest_init(EVP_MD_CTX * ctx)747 static int digest_init(EVP_MD_CTX *ctx)
748 {
749 struct digest_ctx *digest_ctx =
750 (struct digest_ctx *)EVP_MD_CTX_get0_md_data(ctx);
751 const struct digest_data_st *digest_d =
752 get_digest_data(EVP_MD_CTX_get_type(ctx));
753
754 digest_ctx->init_called = 1;
755
756 memset(&digest_ctx->sess, 0, sizeof(digest_ctx->sess));
757 digest_ctx->sess.mac = digest_d->devcryptoid;
758 if (ioctl(cfd, CIOCGSESSION, &digest_ctx->sess) < 0) {
759 ERR_raise_data(ERR_LIB_SYS, errno, "calling ioctl()");
760 return 0;
761 }
762 return 1;
763 }
764
digest_op(struct digest_ctx * ctx,const void * src,size_t srclen,void * res,unsigned int flags)765 static int digest_op(struct digest_ctx *ctx, const void *src, size_t srclen,
766 void *res, unsigned int flags)
767 {
768 struct crypt_op cryp;
769
770 memset(&cryp, 0, sizeof(cryp));
771 cryp.ses = ctx->sess.ses;
772 cryp.len = srclen;
773 cryp.src = (void *)src;
774 cryp.dst = NULL;
775 cryp.mac = res;
776 cryp.flags = flags;
777 return ioctl(cfd, CIOCCRYPT, &cryp);
778 }
779
digest_update(EVP_MD_CTX * ctx,const void * data,size_t count)780 static int digest_update(EVP_MD_CTX *ctx, const void *data, size_t count)
781 {
782 struct digest_ctx *digest_ctx =
783 (struct digest_ctx *)EVP_MD_CTX_get0_md_data(ctx);
784
785 if (count == 0)
786 return 1;
787
788 if (digest_ctx == NULL)
789 return 0;
790
791 if (EVP_MD_CTX_test_flags(ctx, EVP_MD_CTX_FLAG_ONESHOT)) {
792 if (digest_op(digest_ctx, data, count, digest_ctx->digest_res, 0) >= 0)
793 return 1;
794 } else if (digest_op(digest_ctx, data, count, NULL, COP_FLAG_UPDATE) >= 0) {
795 return 1;
796 }
797
798 ERR_raise_data(ERR_LIB_SYS, errno, "calling ioctl()");
799 return 0;
800 }
801
digest_final(EVP_MD_CTX * ctx,unsigned char * md)802 static int digest_final(EVP_MD_CTX *ctx, unsigned char *md)
803 {
804 struct digest_ctx *digest_ctx =
805 (struct digest_ctx *)EVP_MD_CTX_get0_md_data(ctx);
806
807 if (md == NULL || digest_ctx == NULL)
808 return 0;
809
810 if (EVP_MD_CTX_test_flags(ctx, EVP_MD_CTX_FLAG_ONESHOT)) {
811 memcpy(md, digest_ctx->digest_res, EVP_MD_CTX_get_size(ctx));
812 } else if (digest_op(digest_ctx, NULL, 0, md, COP_FLAG_FINAL) < 0) {
813 ERR_raise_data(ERR_LIB_SYS, errno, "calling ioctl()");
814 return 0;
815 }
816
817 return 1;
818 }
819
digest_copy(EVP_MD_CTX * to,const EVP_MD_CTX * from)820 static int digest_copy(EVP_MD_CTX *to, const EVP_MD_CTX *from)
821 {
822 struct digest_ctx *digest_from =
823 (struct digest_ctx *)EVP_MD_CTX_get0_md_data(from);
824 struct digest_ctx *digest_to =
825 (struct digest_ctx *)EVP_MD_CTX_get0_md_data(to);
826 struct cphash_op cphash;
827
828 if (digest_from == NULL || digest_from->init_called != 1)
829 return 1;
830
831 if (!digest_init(to)) {
832 ERR_raise_data(ERR_LIB_SYS, errno, "calling ioctl()");
833 return 0;
834 }
835
836 cphash.src_ses = digest_from->sess.ses;
837 cphash.dst_ses = digest_to->sess.ses;
838 if (ioctl(cfd, CIOCCPHASH, &cphash) < 0) {
839 ERR_raise_data(ERR_LIB_SYS, errno, "calling ioctl()");
840 return 0;
841 }
842 return 1;
843 }
844
digest_cleanup(EVP_MD_CTX * ctx)845 static int digest_cleanup(EVP_MD_CTX *ctx)
846 {
847 struct digest_ctx *digest_ctx =
848 (struct digest_ctx *)EVP_MD_CTX_get0_md_data(ctx);
849
850 if (digest_ctx == NULL)
851 return 1;
852
853 return clean_devcrypto_session(&digest_ctx->sess);
854 }
855
856 /*
857 * Keep tables of known nids, associated methods, selected digests, and
858 * driver info.
859 * Note that known_digest_nids[] isn't necessarily indexed the same way as
860 * digest_data[] above, which the other tables are.
861 */
862 static int known_digest_nids[OSSL_NELEM(digest_data)];
863 static int known_digest_nids_amount = -1; /* -1 indicates not yet initialised */
864 static EVP_MD *known_digest_methods[OSSL_NELEM(digest_data)] = { NULL, };
865 static int selected_digests[OSSL_NELEM(digest_data)];
866 static struct driver_info_st digest_driver_info[OSSL_NELEM(digest_data)];
867
devcrypto_test_digest(size_t digest_data_index)868 static int devcrypto_test_digest(size_t digest_data_index)
869 {
870 return (digest_driver_info[digest_data_index].status == DEVCRYPTO_STATUS_USABLE
871 && selected_digests[digest_data_index] == 1
872 && (digest_driver_info[digest_data_index].accelerated
873 == DEVCRYPTO_ACCELERATED
874 || use_softdrivers == DEVCRYPTO_USE_SOFTWARE
875 || (digest_driver_info[digest_data_index].accelerated
876 != DEVCRYPTO_NOT_ACCELERATED
877 && use_softdrivers == DEVCRYPTO_REJECT_SOFTWARE)));
878 }
879
rebuild_known_digest_nids(ENGINE * e)880 static void rebuild_known_digest_nids(ENGINE *e)
881 {
882 size_t i;
883
884 for (i = 0, known_digest_nids_amount = 0; i < OSSL_NELEM(digest_data); i++) {
885 if (devcrypto_test_digest(i))
886 known_digest_nids[known_digest_nids_amount++] = digest_data[i].nid;
887 }
888 ENGINE_unregister_digests(e);
889 ENGINE_register_digests(e);
890 }
891
prepare_digest_methods(void)892 static void prepare_digest_methods(void)
893 {
894 size_t i;
895 session_op_t sess1, sess2;
896 #ifdef CIOCGSESSINFO
897 struct session_info_op siop;
898 #endif
899 struct cphash_op cphash;
900
901 memset(&digest_driver_info, 0, sizeof(digest_driver_info));
902
903 memset(&sess1, 0, sizeof(sess1));
904 memset(&sess2, 0, sizeof(sess2));
905
906 for (i = 0, known_digest_nids_amount = 0; i < OSSL_NELEM(digest_data);
907 i++) {
908
909 selected_digests[i] = 1;
910
911 /*
912 * Check that the digest is usable
913 */
914 sess1.mac = digest_data[i].devcryptoid;
915 sess2.ses = 0;
916 if (ioctl(cfd, CIOCGSESSION, &sess1) < 0) {
917 digest_driver_info[i].status = DEVCRYPTO_STATUS_NO_CIOCGSESSION;
918 goto finish;
919 }
920
921 #ifdef CIOCGSESSINFO
922 /* gather hardware acceleration info from the driver */
923 siop.ses = sess1.ses;
924 if (ioctl(cfd, CIOCGSESSINFO, &siop) < 0) {
925 digest_driver_info[i].accelerated = DEVCRYPTO_ACCELERATION_UNKNOWN;
926 } else {
927 digest_driver_info[i].driver_name =
928 OPENSSL_strndup(siop.hash_info.cra_driver_name,
929 CRYPTODEV_MAX_ALG_NAME);
930 if (siop.flags & SIOP_FLAG_KERNEL_DRIVER_ONLY)
931 digest_driver_info[i].accelerated = DEVCRYPTO_ACCELERATED;
932 else
933 digest_driver_info[i].accelerated = DEVCRYPTO_NOT_ACCELERATED;
934 }
935 #endif
936
937 /* digest must be capable of hash state copy */
938 sess2.mac = sess1.mac;
939 if (ioctl(cfd, CIOCGSESSION, &sess2) < 0) {
940 digest_driver_info[i].status = DEVCRYPTO_STATUS_FAILURE;
941 goto finish;
942 }
943 cphash.src_ses = sess1.ses;
944 cphash.dst_ses = sess2.ses;
945 if (ioctl(cfd, CIOCCPHASH, &cphash) < 0) {
946 digest_driver_info[i].status = DEVCRYPTO_STATUS_NO_CIOCCPHASH;
947 goto finish;
948 }
949 if ((known_digest_methods[i] = EVP_MD_meth_new(digest_data[i].nid,
950 NID_undef)) == NULL
951 || !EVP_MD_meth_set_input_blocksize(known_digest_methods[i],
952 digest_data[i].blocksize)
953 || !EVP_MD_meth_set_result_size(known_digest_methods[i],
954 digest_data[i].digestlen)
955 || !EVP_MD_meth_set_init(known_digest_methods[i], digest_init)
956 || !EVP_MD_meth_set_update(known_digest_methods[i], digest_update)
957 || !EVP_MD_meth_set_final(known_digest_methods[i], digest_final)
958 || !EVP_MD_meth_set_copy(known_digest_methods[i], digest_copy)
959 || !EVP_MD_meth_set_cleanup(known_digest_methods[i], digest_cleanup)
960 || !EVP_MD_meth_set_app_datasize(known_digest_methods[i],
961 sizeof(struct digest_ctx))) {
962 digest_driver_info[i].status = DEVCRYPTO_STATUS_FAILURE;
963 EVP_MD_meth_free(known_digest_methods[i]);
964 known_digest_methods[i] = NULL;
965 goto finish;
966 }
967 digest_driver_info[i].status = DEVCRYPTO_STATUS_USABLE;
968 finish:
969 ioctl(cfd, CIOCFSESSION, &sess1.ses);
970 if (sess2.ses != 0)
971 ioctl(cfd, CIOCFSESSION, &sess2.ses);
972 if (devcrypto_test_digest(i))
973 known_digest_nids[known_digest_nids_amount++] = digest_data[i].nid;
974 }
975 }
976
get_digest_method(int nid)977 static const EVP_MD *get_digest_method(int nid)
978 {
979 size_t i = get_digest_data_index(nid);
980
981 if (i == (size_t)-1)
982 return NULL;
983 return known_digest_methods[i];
984 }
985
get_digest_nids(const int ** nids)986 static int get_digest_nids(const int **nids)
987 {
988 *nids = known_digest_nids;
989 return known_digest_nids_amount;
990 }
991
destroy_digest_method(int nid)992 static void destroy_digest_method(int nid)
993 {
994 size_t i = get_digest_data_index(nid);
995
996 EVP_MD_meth_free(known_digest_methods[i]);
997 known_digest_methods[i] = NULL;
998 }
999
destroy_all_digest_methods(void)1000 static void destroy_all_digest_methods(void)
1001 {
1002 size_t i;
1003
1004 for (i = 0; i < OSSL_NELEM(digest_data); i++) {
1005 destroy_digest_method(digest_data[i].nid);
1006 OPENSSL_free(digest_driver_info[i].driver_name);
1007 digest_driver_info[i].driver_name = NULL;
1008 }
1009 }
1010
devcrypto_digests(ENGINE * e,const EVP_MD ** digest,const int ** nids,int nid)1011 static int devcrypto_digests(ENGINE *e, const EVP_MD **digest,
1012 const int **nids, int nid)
1013 {
1014 if (digest == NULL)
1015 return get_digest_nids(nids);
1016
1017 *digest = get_digest_method(nid);
1018
1019 return *digest != NULL;
1020 }
1021
devcrypto_select_all_digests(int * digest_list)1022 static void devcrypto_select_all_digests(int *digest_list)
1023 {
1024 size_t i;
1025
1026 for (i = 0; i < OSSL_NELEM(digest_data); i++)
1027 digest_list[i] = 1;
1028 }
1029
cryptodev_select_digest_cb(const char * str,int len,void * usr)1030 static int cryptodev_select_digest_cb(const char *str, int len, void *usr)
1031 {
1032 int *digest_list = (int *)usr;
1033 char *name;
1034 const EVP_MD *EVP;
1035 size_t i;
1036
1037 if (len == 0)
1038 return 1;
1039 if (usr == NULL || (name = OPENSSL_strndup(str, len)) == NULL)
1040 return 0;
1041 EVP = EVP_get_digestbyname(name);
1042 if (EVP == NULL)
1043 fprintf(stderr, "devcrypto: unknown digest %s\n", name);
1044 else if ((i = find_digest_data_index(EVP_MD_get_type(EVP))) != (size_t)-1)
1045 digest_list[i] = 1;
1046 else
1047 fprintf(stderr, "devcrypto: digest %s not available\n", name);
1048 OPENSSL_free(name);
1049 return 1;
1050 }
1051
dump_digest_info(void)1052 static void dump_digest_info(void)
1053 {
1054 size_t i;
1055 const char *name;
1056
1057 fprintf (stderr, "Information about digests supported by the /dev/crypto"
1058 " engine:\n");
1059 #ifndef CIOCGSESSINFO
1060 fprintf(stderr, "CIOCGSESSINFO (session info call) unavailable\n");
1061 #endif
1062
1063 for (i = 0; i < OSSL_NELEM(digest_data); i++) {
1064 name = OBJ_nid2sn(digest_data[i].nid);
1065 fprintf (stderr, "Digest %s, NID=%d, /dev/crypto info: id=%d, driver=%s",
1066 name ? name : "unknown", digest_data[i].nid,
1067 digest_data[i].devcryptoid,
1068 digest_driver_info[i].driver_name ? digest_driver_info[i].driver_name : "unknown");
1069 if (digest_driver_info[i].status == DEVCRYPTO_STATUS_NO_CIOCGSESSION) {
1070 fprintf (stderr, ". CIOCGSESSION (session open) failed\n");
1071 continue;
1072 }
1073 if (digest_driver_info[i].accelerated == DEVCRYPTO_ACCELERATED)
1074 fprintf(stderr, " (hw accelerated)");
1075 else if (digest_driver_info[i].accelerated == DEVCRYPTO_NOT_ACCELERATED)
1076 fprintf(stderr, " (software)");
1077 else
1078 fprintf(stderr, " (acceleration status unknown)");
1079 if (cipher_driver_info[i].status == DEVCRYPTO_STATUS_FAILURE)
1080 fprintf (stderr, ". Cipher setup failed\n");
1081 else if (digest_driver_info[i].status == DEVCRYPTO_STATUS_NO_CIOCCPHASH)
1082 fprintf(stderr, ", CIOCCPHASH failed\n");
1083 else
1084 fprintf(stderr, ", CIOCCPHASH capable\n");
1085 }
1086 fprintf(stderr, "\n");
1087 }
1088
1089 #endif
1090
1091 /******************************************************************************
1092 *
1093 * CONTROL COMMANDS
1094 *
1095 *****/
1096
1097 #define DEVCRYPTO_CMD_USE_SOFTDRIVERS ENGINE_CMD_BASE
1098 #define DEVCRYPTO_CMD_CIPHERS (ENGINE_CMD_BASE + 1)
1099 #define DEVCRYPTO_CMD_DIGESTS (ENGINE_CMD_BASE + 2)
1100 #define DEVCRYPTO_CMD_DUMP_INFO (ENGINE_CMD_BASE + 3)
1101
1102 static const ENGINE_CMD_DEFN devcrypto_cmds[] = {
1103 #if defined(CIOCGSESSINFO) || defined(CIOCGSESSION2)
1104 {DEVCRYPTO_CMD_USE_SOFTDRIVERS,
1105 "USE_SOFTDRIVERS",
1106 "specifies whether to use software (not accelerated) drivers ("
1107 OPENSSL_MSTR(DEVCRYPTO_REQUIRE_ACCELERATED) "=use only accelerated drivers, "
1108 OPENSSL_MSTR(DEVCRYPTO_USE_SOFTWARE) "=allow all drivers, "
1109 OPENSSL_MSTR(DEVCRYPTO_REJECT_SOFTWARE)
1110 "=use if acceleration can't be determined) [default="
1111 OPENSSL_MSTR(DEVCRYPTO_DEFAULT_USE_SOFTDRIVERS) "]",
1112 ENGINE_CMD_FLAG_NUMERIC},
1113 #endif
1114
1115 {DEVCRYPTO_CMD_CIPHERS,
1116 "CIPHERS",
1117 "either ALL, NONE, or a comma-separated list of ciphers to enable [default=ALL]",
1118 ENGINE_CMD_FLAG_STRING},
1119
1120 #ifdef IMPLEMENT_DIGEST
1121 {DEVCRYPTO_CMD_DIGESTS,
1122 "DIGESTS",
1123 "either ALL, NONE, or a comma-separated list of digests to enable [default=ALL]",
1124 ENGINE_CMD_FLAG_STRING},
1125 #endif
1126
1127 {DEVCRYPTO_CMD_DUMP_INFO,
1128 "DUMP_INFO",
1129 "dump info about each algorithm to stderr; use 'openssl engine -pre DUMP_INFO devcrypto'",
1130 ENGINE_CMD_FLAG_NO_INPUT},
1131
1132 {0, NULL, NULL, 0}
1133 };
1134
devcrypto_ctrl(ENGINE * e,int cmd,long i,void * p,void (* f)(void))1135 static int devcrypto_ctrl(ENGINE *e, int cmd, long i, void *p, void (*f) (void))
1136 {
1137 int *new_list;
1138 switch (cmd) {
1139 #if defined(CIOCGSESSINFO) || defined(CIOCGSESSION2)
1140 case DEVCRYPTO_CMD_USE_SOFTDRIVERS:
1141 switch (i) {
1142 case DEVCRYPTO_REQUIRE_ACCELERATED:
1143 case DEVCRYPTO_USE_SOFTWARE:
1144 case DEVCRYPTO_REJECT_SOFTWARE:
1145 break;
1146 default:
1147 fprintf(stderr, "devcrypto: invalid value (%ld) for USE_SOFTDRIVERS\n", i);
1148 return 0;
1149 }
1150 if (use_softdrivers == i)
1151 return 1;
1152 use_softdrivers = i;
1153 #ifdef IMPLEMENT_DIGEST
1154 rebuild_known_digest_nids(e);
1155 #endif
1156 rebuild_known_cipher_nids(e);
1157 return 1;
1158 #endif /* CIOCGSESSINFO || CIOCGSESSION2 */
1159
1160 case DEVCRYPTO_CMD_CIPHERS:
1161 if (p == NULL)
1162 return 1;
1163 if (OPENSSL_strcasecmp((const char *)p, "ALL") == 0) {
1164 devcrypto_select_all_ciphers(selected_ciphers);
1165 } else if (OPENSSL_strcasecmp((const char*)p, "NONE") == 0) {
1166 memset(selected_ciphers, 0, sizeof(selected_ciphers));
1167 } else {
1168 new_list=OPENSSL_zalloc(sizeof(selected_ciphers));
1169 if (!CONF_parse_list(p, ',', 1, cryptodev_select_cipher_cb, new_list)) {
1170 OPENSSL_free(new_list);
1171 return 0;
1172 }
1173 memcpy(selected_ciphers, new_list, sizeof(selected_ciphers));
1174 OPENSSL_free(new_list);
1175 }
1176 rebuild_known_cipher_nids(e);
1177 return 1;
1178
1179 #ifdef IMPLEMENT_DIGEST
1180 case DEVCRYPTO_CMD_DIGESTS:
1181 if (p == NULL)
1182 return 1;
1183 if (OPENSSL_strcasecmp((const char *)p, "ALL") == 0) {
1184 devcrypto_select_all_digests(selected_digests);
1185 } else if (OPENSSL_strcasecmp((const char*)p, "NONE") == 0) {
1186 memset(selected_digests, 0, sizeof(selected_digests));
1187 } else {
1188 new_list=OPENSSL_zalloc(sizeof(selected_digests));
1189 if (!CONF_parse_list(p, ',', 1, cryptodev_select_digest_cb, new_list)) {
1190 OPENSSL_free(new_list);
1191 return 0;
1192 }
1193 memcpy(selected_digests, new_list, sizeof(selected_digests));
1194 OPENSSL_free(new_list);
1195 }
1196 rebuild_known_digest_nids(e);
1197 return 1;
1198 #endif /* IMPLEMENT_DIGEST */
1199
1200 case DEVCRYPTO_CMD_DUMP_INFO:
1201 dump_cipher_info();
1202 #ifdef IMPLEMENT_DIGEST
1203 dump_digest_info();
1204 #endif
1205 return 1;
1206
1207 default:
1208 break;
1209 }
1210 return 0;
1211 }
1212
1213 /******************************************************************************
1214 *
1215 * LOAD / UNLOAD
1216 *
1217 *****/
1218
1219 /*
1220 * Opens /dev/crypto
1221 */
open_devcrypto(void)1222 static int open_devcrypto(void)
1223 {
1224 int fd;
1225
1226 if (cfd >= 0)
1227 return 1;
1228
1229 if ((fd = open("/dev/crypto", O_RDWR, 0)) < 0) {
1230 #ifndef ENGINE_DEVCRYPTO_DEBUG
1231 if (errno != ENOENT && errno != ENXIO)
1232 #endif
1233 fprintf(stderr, "Could not open /dev/crypto: %s\n", strerror(errno));
1234 return 0;
1235 }
1236
1237 #ifdef CRIOGET
1238 if (ioctl(fd, CRIOGET, &cfd) < 0) {
1239 fprintf(stderr, "Could not create crypto fd: %s\n", strerror(errno));
1240 close(fd);
1241 cfd = -1;
1242 return 0;
1243 }
1244 close(fd);
1245 #else
1246 cfd = fd;
1247 #endif
1248
1249 return 1;
1250 }
1251
close_devcrypto(void)1252 static int close_devcrypto(void)
1253 {
1254 int ret;
1255
1256 if (cfd < 0)
1257 return 1;
1258 ret = close(cfd);
1259 cfd = -1;
1260 if (ret != 0) {
1261 fprintf(stderr, "Error closing /dev/crypto: %s\n", strerror(errno));
1262 return 0;
1263 }
1264 return 1;
1265 }
1266
devcrypto_unload(ENGINE * e)1267 static int devcrypto_unload(ENGINE *e)
1268 {
1269 destroy_all_cipher_methods();
1270 #ifdef IMPLEMENT_DIGEST
1271 destroy_all_digest_methods();
1272 #endif
1273
1274 close_devcrypto();
1275
1276 return 1;
1277 }
1278
bind_devcrypto(ENGINE * e)1279 static int bind_devcrypto(ENGINE *e) {
1280
1281 if (!ENGINE_set_id(e, engine_devcrypto_id)
1282 || !ENGINE_set_name(e, "/dev/crypto engine")
1283 || !ENGINE_set_destroy_function(e, devcrypto_unload)
1284 || !ENGINE_set_cmd_defns(e, devcrypto_cmds)
1285 || !ENGINE_set_ctrl_function(e, devcrypto_ctrl))
1286 return 0;
1287
1288 prepare_cipher_methods();
1289 #ifdef IMPLEMENT_DIGEST
1290 prepare_digest_methods();
1291 #endif
1292
1293 return (ENGINE_set_ciphers(e, devcrypto_ciphers)
1294 #ifdef IMPLEMENT_DIGEST
1295 && ENGINE_set_digests(e, devcrypto_digests)
1296 #endif
1297 /*
1298 * Asymmetric ciphers aren't well supported with /dev/crypto. Among the BSD
1299 * implementations, it seems to only exist in FreeBSD, and regarding the
1300 * parameters in its crypt_kop, the manual crypto(4) has this to say:
1301 *
1302 * The semantics of these arguments are currently undocumented.
1303 *
1304 * Reading through the FreeBSD source code doesn't give much more than
1305 * their CRK_MOD_EXP implementation for ubsec.
1306 *
1307 * It doesn't look much better with cryptodev-linux. They have the crypt_kop
1308 * structure as well as the command (CRK_*) in cryptodev.h, but no support
1309 * seems to be implemented at all for the moment.
1310 *
1311 * At the time of writing, it seems impossible to write proper support for
1312 * FreeBSD's asym features without some very deep knowledge and access to
1313 * specific kernel modules.
1314 *
1315 * /Richard Levitte, 2017-05-11
1316 */
1317 #if 0
1318 && ENGINE_set_RSA(e, devcrypto_rsa)
1319 # ifndef OPENSSL_NO_DSA
1320 && ENGINE_set_DSA(e, devcrypto_dsa)
1321 # endif
1322 # ifndef OPENSSL_NO_DH
1323 && ENGINE_set_DH(e, devcrypto_dh)
1324 # endif
1325 # ifndef OPENSSL_NO_EC
1326 && ENGINE_set_EC(e, devcrypto_ec)
1327 # endif
1328 #endif
1329 );
1330 }
1331
1332 #ifdef OPENSSL_NO_DYNAMIC_ENGINE
1333 /*
1334 * In case this engine is built into libcrypto, then it doesn't offer any
1335 * ability to be dynamically loadable.
1336 */
engine_load_devcrypto_int(void)1337 void engine_load_devcrypto_int(void)
1338 {
1339 ENGINE *e = NULL;
1340
1341 if (!open_devcrypto())
1342 return;
1343
1344 if ((e = ENGINE_new()) == NULL
1345 || !bind_devcrypto(e)) {
1346 close_devcrypto();
1347 ENGINE_free(e);
1348 return;
1349 }
1350
1351 ERR_set_mark();
1352 ENGINE_add(e);
1353 /*
1354 * If the "add" worked, it gets a structural reference. So either way, we
1355 * release our just-created reference.
1356 */
1357 ENGINE_free(e); /* Loose our local reference */
1358 /*
1359 * If the "add" didn't work, it was probably a conflict because it was
1360 * already added (eg. someone calling ENGINE_load_blah then calling
1361 * ENGINE_load_builtin_engines() perhaps).
1362 */
1363 ERR_pop_to_mark();
1364 }
1365
1366 #else
1367
bind_helper(ENGINE * e,const char * id)1368 static int bind_helper(ENGINE *e, const char *id)
1369 {
1370 if ((id && (strcmp(id, engine_devcrypto_id) != 0))
1371 || !open_devcrypto())
1372 return 0;
1373 if (!bind_devcrypto(e)) {
1374 close_devcrypto();
1375 return 0;
1376 }
1377 return 1;
1378 }
1379
1380 IMPLEMENT_DYNAMIC_CHECK_FN()
1381 IMPLEMENT_DYNAMIC_BIND_FN(bind_helper)
1382
1383 #endif
1384