icp_asym.c 43 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334
  1. /***************************************************************************
  2. *
  3. * This file is provided under a dual BSD/GPLv2 license. When using or
  4. * redistributing this file, you may do so under either license.
  5. *
  6. * GPL LICENSE SUMMARY
  7. *
  8. * Copyright(c) 2007,2008,2009 Intel Corporation. All rights reserved.
  9. *
  10. * This program is free software; you can redistribute it and/or modify
  11. * it under the terms of version 2 of the GNU General Public License as
  12. * published by the Free Software Foundation.
  13. *
  14. * This program is distributed in the hope that it will be useful, but
  15. * WITHOUT ANY WARRANTY; without even the implied warranty of
  16. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  17. * General Public License for more details.
  18. *
  19. * You should have received a copy of the GNU General Public License
  20. * along with this program; if not, write to the Free Software
  21. * Foundation, Inc., 51 Franklin St - Fifth Floor, Boston, MA 02110-1301 USA.
  22. * The full GNU General Public License is included in this distribution
  23. * in the file called LICENSE.GPL.
  24. *
  25. * Contact Information:
  26. * Intel Corporation
  27. *
  28. * BSD LICENSE
  29. *
  30. * Copyright(c) 2007,2008,2009 Intel Corporation. All rights reserved.
  31. * All rights reserved.
  32. *
  33. * Redistribution and use in source and binary forms, with or without
  34. * modification, are permitted provided that the following conditions
  35. * are met:
  36. *
  37. * * Redistributions of source code must retain the above copyright
  38. * notice, this list of conditions and the following disclaimer.
  39. * * Redistributions in binary form must reproduce the above copyright
  40. * notice, this list of conditions and the following disclaimer in
  41. * the documentation and/or other materials provided with the
  42. * distribution.
  43. * * Neither the name of Intel Corporation nor the names of its
  44. * contributors may be used to endorse or promote products derived
  45. * from this software without specific prior written permission.
  46. *
  47. * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
  48. * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
  49. * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
  50. * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
  51. * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  52. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
  53. * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
  54. * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
  55. * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
  56. * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
  57. * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  58. *
  59. *
  60. * version: Security.L.1.0.2-229
  61. *
  62. ***************************************************************************/
  63. #include "icp_ocf.h"
  64. /*The following define values (containing the word 'INDEX') are used to find
  65. the index of each input buffer of the crypto_kop struct (see OCF cryptodev.h).
  66. These values were found through analysis of the OCF OpenSSL patch. If the
  67. calling program uses different input buffer positions, these defines will have
  68. to be changed.*/
  69. /*DIFFIE HELLMAN buffer index values*/
  70. #define ICP_DH_KRP_PARAM_PRIME_INDEX (0)
  71. #define ICP_DH_KRP_PARAM_BASE_INDEX (1)
  72. #define ICP_DH_KRP_PARAM_PRIVATE_VALUE_INDEX (2)
  73. #define ICP_DH_KRP_PARAM_RESULT_INDEX (3)
  74. /*MOD EXP buffer index values*/
  75. #define ICP_MOD_EXP_KRP_PARAM_BASE_INDEX (0)
  76. #define ICP_MOD_EXP_KRP_PARAM_EXPONENT_INDEX (1)
  77. #define ICP_MOD_EXP_KRP_PARAM_MODULUS_INDEX (2)
  78. #define ICP_MOD_EXP_KRP_PARAM_RESULT_INDEX (3)
  79. /*MOD EXP CRT buffer index values*/
  80. #define ICP_MOD_EXP_CRT_KRP_PARAM_PRIME_P_INDEX (0)
  81. #define ICP_MOD_EXP_CRT_KRP_PARAM_PRIME_Q_INDEX (1)
  82. #define ICP_MOD_EXP_CRT_KRP_PARAM_I_INDEX (2)
  83. #define ICP_MOD_EXP_CRT_KRP_PARAM_EXPONENT_DP_INDEX (3)
  84. #define ICP_MOD_EXP_CRT_KRP_PARAM_EXPONENT_DQ_INDEX (4)
  85. #define ICP_MOD_EXP_CRT_KRP_PARAM_COEFF_QINV_INDEX (5)
  86. #define ICP_MOD_EXP_CRT_KRP_PARAM_RESULT_INDEX (6)
  87. /*DSA sign buffer index values*/
  88. #define ICP_DSA_SIGN_KRP_PARAM_DGST_INDEX (0)
  89. #define ICP_DSA_SIGN_KRP_PARAM_PRIME_P_INDEX (1)
  90. #define ICP_DSA_SIGN_KRP_PARAM_PRIME_Q_INDEX (2)
  91. #define ICP_DSA_SIGN_KRP_PARAM_G_INDEX (3)
  92. #define ICP_DSA_SIGN_KRP_PARAM_X_INDEX (4)
  93. #define ICP_DSA_SIGN_KRP_PARAM_R_RESULT_INDEX (5)
  94. #define ICP_DSA_SIGN_KRP_PARAM_S_RESULT_INDEX (6)
  95. /*DSA verify buffer index values*/
  96. #define ICP_DSA_VERIFY_KRP_PARAM_DGST_INDEX (0)
  97. #define ICP_DSA_VERIFY_KRP_PARAM_PRIME_P_INDEX (1)
  98. #define ICP_DSA_VERIFY_KRP_PARAM_PRIME_Q_INDEX (2)
  99. #define ICP_DSA_VERIFY_KRP_PARAM_G_INDEX (3)
  100. #define ICP_DSA_VERIFY_KRP_PARAM_PUBKEY_INDEX (4)
  101. #define ICP_DSA_VERIFY_KRP_PARAM_SIG_R_INDEX (5)
  102. #define ICP_DSA_VERIFY_KRP_PARAM_SIG_S_INDEX (6)
  103. /*DSA sign prime Q vs random number K size check values*/
  104. #define DONT_RUN_LESS_THAN_CHECK (0)
  105. #define FAIL_A_IS_GREATER_THAN_B (1)
  106. #define FAIL_A_IS_EQUAL_TO_B (1)
  107. #define SUCCESS_A_IS_LESS_THAN_B (0)
  108. #define DSA_SIGN_RAND_GEN_VAL_CHECK_MAX_ITERATIONS (500)
  109. /* We need to set a cryptokp success value just in case it is set or allocated
  110. and not set to zero outside of this module */
  111. #define CRYPTO_OP_SUCCESS (0)
  112. /*Function to compute Diffie Hellman (DH) phase 1 or phase 2 key values*/
  113. static int icp_ocfDrvDHComputeKey(struct cryptkop *krp);
  114. /*Function to compute a Modular Exponentiation (Mod Exp)*/
  115. static int icp_ocfDrvModExp(struct cryptkop *krp);
  116. /*Function to compute a Mod Exp using the Chinease Remainder Theorem*/
  117. static int icp_ocfDrvModExpCRT(struct cryptkop *krp);
  118. /*Helper function to compute whether the first big number argument is less than
  119. the second big number argument */
  120. static int
  121. icp_ocfDrvCheckALessThanB(CpaFlatBuffer * pK, CpaFlatBuffer * pQ, int *doCheck);
  122. /*Function to sign an input with DSA R and S keys*/
  123. static int icp_ocfDrvDsaSign(struct cryptkop *krp);
  124. /*Function to Verify a DSA buffer signature*/
  125. static int icp_ocfDrvDsaVerify(struct cryptkop *krp);
  126. /*Callback function for DH operation*/
  127. static void
  128. icp_ocfDrvDhP1CallBack(void *callbackTag,
  129. CpaStatus status,
  130. void *pOpData, CpaFlatBuffer * pLocalOctetStringPV);
  131. /*Callback function for ME operation*/
  132. static void
  133. icp_ocfDrvModExpCallBack(void *callbackTag,
  134. CpaStatus status,
  135. void *pOpData, CpaFlatBuffer * pResult);
  136. /*Callback function for ME CRT operation*/
  137. static void
  138. icp_ocfDrvModExpCRTCallBack(void *callbackTag,
  139. CpaStatus status,
  140. void *pOpData, CpaFlatBuffer * pOutputData);
  141. /*Callback function for DSA sign operation*/
  142. static void
  143. icp_ocfDrvDsaRSSignCallBack(void *callbackTag,
  144. CpaStatus status,
  145. void *pOpData,
  146. CpaBoolean protocolStatus,
  147. CpaFlatBuffer * pR, CpaFlatBuffer * pS);
  148. /*Callback function for DSA Verify operation*/
  149. static void
  150. icp_ocfDrvDsaVerifyCallBack(void *callbackTag,
  151. CpaStatus status,
  152. void *pOpData, CpaBoolean verifyStatus);
  153. /* Name : icp_ocfDrvPkeProcess
  154. *
  155. * Description : This function will choose which PKE process to follow
  156. * based on the input arguments
  157. */
  158. int icp_ocfDrvPkeProcess(icp_device_t dev, struct cryptkop *krp, int hint)
  159. {
  160. CpaStatus lacStatus = CPA_STATUS_SUCCESS;
  161. if (NULL == krp) {
  162. DPRINTK("%s(): Invalid input parameters, cryptkop = %p\n",
  163. __FUNCTION__, krp);
  164. return EINVAL;
  165. }
  166. if (CPA_TRUE == icp_atomic_read(&icp_ocfDrvIsExiting)) {
  167. krp->krp_status = ECANCELED;
  168. return ECANCELED;
  169. }
  170. switch (krp->krp_op) {
  171. case CRK_DH_COMPUTE_KEY:
  172. DPRINTK("%s() doing DH_COMPUTE_KEY\n", __FUNCTION__);
  173. lacStatus = icp_ocfDrvDHComputeKey(krp);
  174. if (CPA_STATUS_SUCCESS != lacStatus) {
  175. EPRINTK("%s(): icp_ocfDrvDHComputeKey failed "
  176. "(%d).\n", __FUNCTION__, lacStatus);
  177. krp->krp_status = ECANCELED;
  178. return ECANCELED;
  179. }
  180. break;
  181. case CRK_MOD_EXP:
  182. DPRINTK("%s() doing MOD_EXP \n", __FUNCTION__);
  183. lacStatus = icp_ocfDrvModExp(krp);
  184. if (CPA_STATUS_SUCCESS != lacStatus) {
  185. EPRINTK("%s(): icp_ocfDrvModExp failed (%d).\n",
  186. __FUNCTION__, lacStatus);
  187. krp->krp_status = ECANCELED;
  188. return ECANCELED;
  189. }
  190. break;
  191. case CRK_MOD_EXP_CRT:
  192. DPRINTK("%s() doing MOD_EXP_CRT \n", __FUNCTION__);
  193. lacStatus = icp_ocfDrvModExpCRT(krp);
  194. if (CPA_STATUS_SUCCESS != lacStatus) {
  195. EPRINTK("%s(): icp_ocfDrvModExpCRT "
  196. "failed (%d).\n", __FUNCTION__, lacStatus);
  197. krp->krp_status = ECANCELED;
  198. return ECANCELED;
  199. }
  200. break;
  201. case CRK_DSA_SIGN:
  202. DPRINTK("%s() doing DSA_SIGN \n", __FUNCTION__);
  203. lacStatus = icp_ocfDrvDsaSign(krp);
  204. if (CPA_STATUS_SUCCESS != lacStatus) {
  205. EPRINTK("%s(): icp_ocfDrvDsaSign "
  206. "failed (%d).\n", __FUNCTION__, lacStatus);
  207. krp->krp_status = ECANCELED;
  208. return ECANCELED;
  209. }
  210. break;
  211. case CRK_DSA_VERIFY:
  212. DPRINTK("%s() doing DSA_VERIFY \n", __FUNCTION__);
  213. lacStatus = icp_ocfDrvDsaVerify(krp);
  214. if (CPA_STATUS_SUCCESS != lacStatus) {
  215. EPRINTK("%s(): icp_ocfDrvDsaVerify "
  216. "failed (%d).\n", __FUNCTION__, lacStatus);
  217. krp->krp_status = ECANCELED;
  218. return ECANCELED;
  219. }
  220. break;
  221. default:
  222. EPRINTK("%s(): Asymettric function not "
  223. "supported (%d).\n", __FUNCTION__, krp->krp_op);
  224. krp->krp_status = EOPNOTSUPP;
  225. return EOPNOTSUPP;
  226. }
  227. return ICP_OCF_DRV_STATUS_SUCCESS;
  228. }
  229. /* Name : icp_ocfDrvSwapBytes
  230. *
  231. * Description : This function is used to swap the byte order of a buffer.
  232. * It has been seen that in general we are passed little endian byte order
  233. * buffers, but LAC only accepts big endian byte order buffers.
  234. */
  235. static void inline icp_ocfDrvSwapBytes(u_int8_t * num, u_int32_t buff_len_bytes)
  236. {
  237. int i;
  238. u_int8_t *end_ptr;
  239. u_int8_t hold_val;
  240. end_ptr = num + (buff_len_bytes - 1);
  241. buff_len_bytes = buff_len_bytes >> 1;
  242. for (i = 0; i < buff_len_bytes; i++) {
  243. hold_val = *num;
  244. *num = *end_ptr;
  245. num++;
  246. *end_ptr = hold_val;
  247. end_ptr--;
  248. }
  249. }
  250. /* Name : icp_ocfDrvDHComputeKey
  251. *
  252. * Description : This function will map Diffie Hellman calls from OCF
  253. * to the LAC API. OCF uses this function for Diffie Hellman Phase1 and
  254. * Phase2. LAC has a separate Diffie Hellman Phase2 call, however both phases
  255. * break down to a modular exponentiation.
  256. */
  257. static int icp_ocfDrvDHComputeKey(struct cryptkop *krp)
  258. {
  259. CpaStatus lacStatus = CPA_STATUS_SUCCESS;
  260. void *callbackTag = NULL;
  261. CpaCyDhPhase1KeyGenOpData *pPhase1OpData = NULL;
  262. CpaFlatBuffer *pLocalOctetStringPV = NULL;
  263. uint32_t dh_prime_len_bytes = 0, dh_prime_len_bits = 0;
  264. /* Input checks - check prime is a multiple of 8 bits to allow for
  265. allocation later */
  266. dh_prime_len_bits =
  267. (krp->krp_param[ICP_DH_KRP_PARAM_PRIME_INDEX].crp_nbits);
  268. /* LAC can reject prime lengths based on prime key sizes, we just
  269. need to make sure we can allocate space for the base and
  270. exponent buffers correctly */
  271. if ((dh_prime_len_bits % NUM_BITS_IN_BYTE) != 0) {
  272. APRINTK("%s(): Warning Prime number buffer size is not a "
  273. "multiple of 8 bits\n", __FUNCTION__);
  274. }
  275. /* Result storage space should be the same size as the prime as this
  276. value can take up the same amount of storage space */
  277. if (dh_prime_len_bits !=
  278. krp->krp_param[ICP_DH_KRP_PARAM_RESULT_INDEX].crp_nbits) {
  279. DPRINTK("%s(): Return Buffer must be the same size "
  280. "as the Prime buffer\n", __FUNCTION__);
  281. krp->krp_status = EINVAL;
  282. return EINVAL;
  283. }
  284. /* Switch to size in bytes */
  285. BITS_TO_BYTES(dh_prime_len_bytes, dh_prime_len_bits);
  286. callbackTag = krp;
  287. /*All allocations are set to ICP_M_NOWAIT due to the possibility of getting
  288. called in interrupt context*/
  289. pPhase1OpData = icp_kmem_cache_zalloc(drvDH_zone, ICP_M_NOWAIT);
  290. if (NULL == pPhase1OpData) {
  291. APRINTK("%s():Failed to get memory for key gen data\n",
  292. __FUNCTION__);
  293. krp->krp_status = ENOMEM;
  294. return ENOMEM;
  295. }
  296. pLocalOctetStringPV =
  297. icp_kmem_cache_zalloc(drvFlatBuffer_zone, ICP_M_NOWAIT);
  298. if (NULL == pLocalOctetStringPV) {
  299. APRINTK("%s():Failed to get memory for pLocalOctetStringPV\n",
  300. __FUNCTION__);
  301. ICP_CACHE_FREE(drvDH_zone, pPhase1OpData);
  302. krp->krp_status = ENOMEM;
  303. return ENOMEM;
  304. }
  305. /* Link parameters */
  306. pPhase1OpData->primeP.pData =
  307. krp->krp_param[ICP_DH_KRP_PARAM_PRIME_INDEX].crp_p;
  308. pPhase1OpData->primeP.dataLenInBytes = dh_prime_len_bytes;
  309. icp_ocfDrvSwapBytes(pPhase1OpData->primeP.pData, dh_prime_len_bytes);
  310. pPhase1OpData->baseG.pData =
  311. krp->krp_param[ICP_DH_KRP_PARAM_BASE_INDEX].crp_p;
  312. BITS_TO_BYTES(pPhase1OpData->baseG.dataLenInBytes,
  313. krp->krp_param[ICP_DH_KRP_PARAM_BASE_INDEX].crp_nbits);
  314. icp_ocfDrvSwapBytes(pPhase1OpData->baseG.pData,
  315. pPhase1OpData->baseG.dataLenInBytes);
  316. pPhase1OpData->privateValueX.pData =
  317. krp->krp_param[ICP_DH_KRP_PARAM_PRIVATE_VALUE_INDEX].crp_p;
  318. BITS_TO_BYTES(pPhase1OpData->privateValueX.dataLenInBytes,
  319. krp->krp_param[ICP_DH_KRP_PARAM_PRIVATE_VALUE_INDEX].
  320. crp_nbits);
  321. icp_ocfDrvSwapBytes(pPhase1OpData->privateValueX.pData,
  322. pPhase1OpData->privateValueX.dataLenInBytes);
  323. /* Output parameters */
  324. pLocalOctetStringPV->pData =
  325. krp->krp_param[ICP_DH_KRP_PARAM_RESULT_INDEX].crp_p;
  326. BITS_TO_BYTES(pLocalOctetStringPV->dataLenInBytes,
  327. krp->krp_param[ICP_DH_KRP_PARAM_RESULT_INDEX].crp_nbits);
  328. lacStatus = cpaCyDhKeyGenPhase1(CPA_INSTANCE_HANDLE_SINGLE,
  329. icp_ocfDrvDhP1CallBack,
  330. callbackTag, pPhase1OpData,
  331. pLocalOctetStringPV);
  332. if (CPA_STATUS_SUCCESS != lacStatus) {
  333. EPRINTK("%s(): DH Phase 1 Key Gen failed (%d).\n",
  334. __FUNCTION__, lacStatus);
  335. icp_ocfDrvFreeFlatBuffer(pLocalOctetStringPV);
  336. ICP_CACHE_FREE(drvDH_zone, pPhase1OpData);
  337. }
  338. return lacStatus;
  339. }
  340. /* Name : icp_ocfDrvModExp
  341. *
  342. * Description : This function will map ordinary Modular Exponentiation calls
  343. * from OCF to the LAC API.
  344. *
  345. */
  346. static int icp_ocfDrvModExp(struct cryptkop *krp)
  347. {
  348. CpaStatus lacStatus = CPA_STATUS_SUCCESS;
  349. void *callbackTag = NULL;
  350. CpaCyLnModExpOpData *pModExpOpData = NULL;
  351. CpaFlatBuffer *pResult = NULL;
  352. if ((krp->krp_param[ICP_MOD_EXP_KRP_PARAM_MODULUS_INDEX].crp_nbits %
  353. NUM_BITS_IN_BYTE) != 0) {
  354. DPRINTK("%s(): Warning - modulus buffer size (%d) is not a "
  355. "multiple of 8 bits\n", __FUNCTION__,
  356. krp->krp_param[ICP_MOD_EXP_KRP_PARAM_MODULUS_INDEX].
  357. crp_nbits);
  358. }
  359. /* Result storage space should be the same size as the prime as this
  360. value can take up the same amount of storage space */
  361. if (krp->krp_param[ICP_MOD_EXP_KRP_PARAM_MODULUS_INDEX].crp_nbits >
  362. krp->krp_param[ICP_MOD_EXP_KRP_PARAM_RESULT_INDEX].crp_nbits) {
  363. APRINTK("%s(): Return Buffer size must be the same or"
  364. " greater than the Modulus buffer\n", __FUNCTION__);
  365. krp->krp_status = EINVAL;
  366. return EINVAL;
  367. }
  368. callbackTag = krp;
  369. pModExpOpData = icp_kmem_cache_zalloc(drvLnModExp_zone, ICP_M_NOWAIT);
  370. if (NULL == pModExpOpData) {
  371. APRINTK("%s():Failed to get memory for key gen data\n",
  372. __FUNCTION__);
  373. krp->krp_status = ENOMEM;
  374. return ENOMEM;
  375. }
  376. pResult = icp_kmem_cache_zalloc(drvFlatBuffer_zone, ICP_M_NOWAIT);
  377. if (NULL == pResult) {
  378. APRINTK("%s():Failed to get memory for ModExp result\n",
  379. __FUNCTION__);
  380. ICP_CACHE_FREE(drvLnModExp_zone, pModExpOpData);
  381. krp->krp_status = ENOMEM;
  382. return ENOMEM;
  383. }
  384. /* Link parameters */
  385. pModExpOpData->modulus.pData =
  386. krp->krp_param[ICP_MOD_EXP_KRP_PARAM_MODULUS_INDEX].crp_p;
  387. BITS_TO_BYTES(pModExpOpData->modulus.dataLenInBytes,
  388. krp->krp_param[ICP_MOD_EXP_KRP_PARAM_MODULUS_INDEX].
  389. crp_nbits);
  390. icp_ocfDrvSwapBytes(pModExpOpData->modulus.pData,
  391. pModExpOpData->modulus.dataLenInBytes);
  392. DPRINTK("%s : base (%d)\n", __FUNCTION__, krp->
  393. krp_param[ICP_MOD_EXP_KRP_PARAM_BASE_INDEX].crp_nbits);
  394. pModExpOpData->base.pData =
  395. krp->krp_param[ICP_MOD_EXP_KRP_PARAM_BASE_INDEX].crp_p;
  396. BITS_TO_BYTES(pModExpOpData->base.dataLenInBytes,
  397. krp->krp_param[ICP_MOD_EXP_KRP_PARAM_BASE_INDEX].
  398. crp_nbits);
  399. icp_ocfDrvSwapBytes(pModExpOpData->base.pData,
  400. pModExpOpData->base.dataLenInBytes);
  401. pModExpOpData->exponent.pData =
  402. krp->krp_param[ICP_MOD_EXP_KRP_PARAM_EXPONENT_INDEX].crp_p;
  403. BITS_TO_BYTES(pModExpOpData->exponent.dataLenInBytes,
  404. krp->krp_param[ICP_MOD_EXP_KRP_PARAM_EXPONENT_INDEX].
  405. crp_nbits);
  406. icp_ocfDrvSwapBytes(pModExpOpData->exponent.pData,
  407. pModExpOpData->exponent.dataLenInBytes);
  408. /* Output parameters */
  409. pResult->pData =
  410. krp->krp_param[ICP_MOD_EXP_KRP_PARAM_RESULT_INDEX].crp_p,
  411. BITS_TO_BYTES(pResult->dataLenInBytes,
  412. krp->krp_param[ICP_MOD_EXP_KRP_PARAM_RESULT_INDEX].
  413. crp_nbits);
  414. lacStatus = cpaCyLnModExp(CPA_INSTANCE_HANDLE_SINGLE,
  415. icp_ocfDrvModExpCallBack,
  416. callbackTag, pModExpOpData, pResult);
  417. if (CPA_STATUS_SUCCESS != lacStatus) {
  418. EPRINTK("%s(): Mod Exp Operation failed (%d).\n",
  419. __FUNCTION__, lacStatus);
  420. krp->krp_status = ECANCELED;
  421. icp_ocfDrvFreeFlatBuffer(pResult);
  422. ICP_CACHE_FREE(drvLnModExp_zone, pModExpOpData);
  423. }
  424. return lacStatus;
  425. }
  426. /* Name : icp_ocfDrvModExpCRT
  427. *
  428. * Description : This function will map ordinary Modular Exponentiation Chinese
  429. * Remainder Theorem implementaion calls from OCF to the LAC API.
  430. *
  431. * Note : Mod Exp CRT for this driver is accelerated through LAC RSA type 2
  432. * decrypt operation. Therefore P and Q input values must always be prime
  433. * numbers. Although basic primality checks are done in LAC, it is up to the
  434. * user to do any correct prime number checking before passing the inputs.
  435. */
  436. static int icp_ocfDrvModExpCRT(struct cryptkop *krp)
  437. {
  438. CpaStatus lacStatus = CPA_STATUS_SUCCESS;
  439. CpaCyRsaDecryptOpData *rsaDecryptOpData = NULL;
  440. void *callbackTag = NULL;
  441. CpaFlatBuffer *pOutputData = NULL;
  442. /*Parameter input checks are all done by LAC, no need to repeat
  443. them here. */
  444. callbackTag = krp;
  445. rsaDecryptOpData =
  446. icp_kmem_cache_zalloc(drvRSADecrypt_zone, ICP_M_NOWAIT);
  447. if (NULL == rsaDecryptOpData) {
  448. APRINTK("%s():Failed to get memory"
  449. " for MOD EXP CRT Op data struct\n", __FUNCTION__);
  450. krp->krp_status = ENOMEM;
  451. return ENOMEM;
  452. }
  453. rsaDecryptOpData->pRecipientPrivateKey
  454. = icp_kmem_cache_zalloc(drvRSAPrivateKey_zone, ICP_M_NOWAIT);
  455. if (NULL == rsaDecryptOpData->pRecipientPrivateKey) {
  456. APRINTK("%s():Failed to get memory for MOD EXP CRT"
  457. " private key values struct\n", __FUNCTION__);
  458. ICP_CACHE_FREE(drvRSADecrypt_zone, rsaDecryptOpData);
  459. krp->krp_status = ENOMEM;
  460. return ENOMEM;
  461. }
  462. rsaDecryptOpData->pRecipientPrivateKey->
  463. version = CPA_CY_RSA_VERSION_TWO_PRIME;
  464. rsaDecryptOpData->pRecipientPrivateKey->
  465. privateKeyRepType = CPA_CY_RSA_PRIVATE_KEY_REP_TYPE_2;
  466. pOutputData = icp_kmem_cache_zalloc(drvFlatBuffer_zone, ICP_M_NOWAIT);
  467. if (NULL == pOutputData) {
  468. APRINTK("%s():Failed to get memory"
  469. " for MOD EXP CRT output data\n", __FUNCTION__);
  470. ICP_CACHE_FREE(drvRSAPrivateKey_zone,
  471. rsaDecryptOpData->pRecipientPrivateKey);
  472. ICP_CACHE_FREE(drvRSADecrypt_zone, rsaDecryptOpData);
  473. krp->krp_status = ENOMEM;
  474. return ENOMEM;
  475. }
  476. rsaDecryptOpData->pRecipientPrivateKey->
  477. version = CPA_CY_RSA_VERSION_TWO_PRIME;
  478. rsaDecryptOpData->pRecipientPrivateKey->
  479. privateKeyRepType = CPA_CY_RSA_PRIVATE_KEY_REP_TYPE_2;
  480. /* Link parameters */
  481. rsaDecryptOpData->inputData.pData =
  482. krp->krp_param[ICP_MOD_EXP_CRT_KRP_PARAM_I_INDEX].crp_p;
  483. BITS_TO_BYTES(rsaDecryptOpData->inputData.dataLenInBytes,
  484. krp->krp_param[ICP_MOD_EXP_CRT_KRP_PARAM_I_INDEX].
  485. crp_nbits);
  486. icp_ocfDrvSwapBytes(rsaDecryptOpData->inputData.pData,
  487. rsaDecryptOpData->inputData.dataLenInBytes);
  488. rsaDecryptOpData->pRecipientPrivateKey->privateKeyRep2.prime1P.pData =
  489. krp->krp_param[ICP_MOD_EXP_CRT_KRP_PARAM_PRIME_P_INDEX].crp_p;
  490. BITS_TO_BYTES(rsaDecryptOpData->pRecipientPrivateKey->privateKeyRep2.
  491. prime1P.dataLenInBytes,
  492. krp->krp_param[ICP_MOD_EXP_CRT_KRP_PARAM_PRIME_P_INDEX].
  493. crp_nbits);
  494. icp_ocfDrvSwapBytes(rsaDecryptOpData->pRecipientPrivateKey->
  495. privateKeyRep2.prime1P.pData,
  496. rsaDecryptOpData->pRecipientPrivateKey->
  497. privateKeyRep2.prime1P.dataLenInBytes);
  498. rsaDecryptOpData->pRecipientPrivateKey->privateKeyRep2.prime2Q.pData =
  499. krp->krp_param[ICP_MOD_EXP_CRT_KRP_PARAM_PRIME_Q_INDEX].crp_p;
  500. BITS_TO_BYTES(rsaDecryptOpData->pRecipientPrivateKey->privateKeyRep2.
  501. prime2Q.dataLenInBytes,
  502. krp->krp_param[ICP_MOD_EXP_CRT_KRP_PARAM_PRIME_Q_INDEX].
  503. crp_nbits);
  504. icp_ocfDrvSwapBytes(rsaDecryptOpData->pRecipientPrivateKey->
  505. privateKeyRep2.prime2Q.pData,
  506. rsaDecryptOpData->pRecipientPrivateKey->
  507. privateKeyRep2.prime2Q.dataLenInBytes);
  508. rsaDecryptOpData->pRecipientPrivateKey->
  509. privateKeyRep2.exponent1Dp.pData =
  510. krp->krp_param[ICP_MOD_EXP_CRT_KRP_PARAM_EXPONENT_DP_INDEX].crp_p;
  511. BITS_TO_BYTES(rsaDecryptOpData->pRecipientPrivateKey->privateKeyRep2.
  512. exponent1Dp.dataLenInBytes,
  513. krp->
  514. krp_param[ICP_MOD_EXP_CRT_KRP_PARAM_EXPONENT_DP_INDEX].
  515. crp_nbits);
  516. icp_ocfDrvSwapBytes(rsaDecryptOpData->pRecipientPrivateKey->
  517. privateKeyRep2.exponent1Dp.pData,
  518. rsaDecryptOpData->pRecipientPrivateKey->
  519. privateKeyRep2.exponent1Dp.dataLenInBytes);
  520. rsaDecryptOpData->pRecipientPrivateKey->
  521. privateKeyRep2.exponent2Dq.pData =
  522. krp->krp_param[ICP_MOD_EXP_CRT_KRP_PARAM_EXPONENT_DQ_INDEX].crp_p;
  523. BITS_TO_BYTES(rsaDecryptOpData->pRecipientPrivateKey->
  524. privateKeyRep2.exponent2Dq.dataLenInBytes,
  525. krp->
  526. krp_param[ICP_MOD_EXP_CRT_KRP_PARAM_EXPONENT_DQ_INDEX].
  527. crp_nbits);
  528. icp_ocfDrvSwapBytes(rsaDecryptOpData->pRecipientPrivateKey->
  529. privateKeyRep2.exponent2Dq.pData,
  530. rsaDecryptOpData->pRecipientPrivateKey->
  531. privateKeyRep2.exponent2Dq.dataLenInBytes);
  532. rsaDecryptOpData->pRecipientPrivateKey->
  533. privateKeyRep2.coefficientQInv.pData =
  534. krp->krp_param[ICP_MOD_EXP_CRT_KRP_PARAM_COEFF_QINV_INDEX].crp_p;
  535. BITS_TO_BYTES(rsaDecryptOpData->pRecipientPrivateKey->
  536. privateKeyRep2.coefficientQInv.dataLenInBytes,
  537. krp->
  538. krp_param[ICP_MOD_EXP_CRT_KRP_PARAM_COEFF_QINV_INDEX].
  539. crp_nbits);
  540. icp_ocfDrvSwapBytes(rsaDecryptOpData->pRecipientPrivateKey->
  541. privateKeyRep2.coefficientQInv.pData,
  542. rsaDecryptOpData->pRecipientPrivateKey->
  543. privateKeyRep2.coefficientQInv.dataLenInBytes);
  544. /* Output Parameter */
  545. pOutputData->pData =
  546. krp->krp_param[ICP_MOD_EXP_CRT_KRP_PARAM_RESULT_INDEX].crp_p;
  547. BITS_TO_BYTES(pOutputData->dataLenInBytes,
  548. krp->krp_param[ICP_MOD_EXP_CRT_KRP_PARAM_RESULT_INDEX].
  549. crp_nbits);
  550. lacStatus = cpaCyRsaDecrypt(CPA_INSTANCE_HANDLE_SINGLE,
  551. icp_ocfDrvModExpCRTCallBack,
  552. callbackTag, rsaDecryptOpData, pOutputData);
  553. if (CPA_STATUS_SUCCESS != lacStatus) {
  554. EPRINTK("%s(): Mod Exp CRT Operation failed (%d).\n",
  555. __FUNCTION__, lacStatus);
  556. krp->krp_status = ECANCELED;
  557. icp_ocfDrvFreeFlatBuffer(pOutputData);
  558. ICP_CACHE_FREE(drvRSAPrivateKey_zone,
  559. rsaDecryptOpData->pRecipientPrivateKey);
  560. ICP_CACHE_FREE(drvRSADecrypt_zone, rsaDecryptOpData);
  561. }
  562. return lacStatus;
  563. }
  564. /* Name : icp_ocfDrvCheckALessThanB
  565. *
  566. * Description : This function will check whether the first argument is less
  567. * than the second. It is used to check whether the DSA RS sign Random K
  568. * value is less than the Prime Q value (as defined in the specification)
  569. *
  570. */
  571. static int
  572. icp_ocfDrvCheckALessThanB(CpaFlatBuffer * pK, CpaFlatBuffer * pQ, int *doCheck)
  573. {
  574. uint8_t *MSB_K = pK->pData;
  575. uint8_t *MSB_Q = pQ->pData;
  576. uint32_t buffer_lengths_in_bytes = pQ->dataLenInBytes;
  577. if (DONT_RUN_LESS_THAN_CHECK == *doCheck) {
  578. return FAIL_A_IS_GREATER_THAN_B;
  579. }
  580. /*Check MSBs
  581. if A == B, check next MSB
  582. if A > B, return A_IS_GREATER_THAN_B
  583. if A < B, return A_IS_LESS_THAN_B (success)
  584. */
  585. while (*MSB_K == *MSB_Q) {
  586. MSB_K++;
  587. MSB_Q++;
  588. buffer_lengths_in_bytes--;
  589. if (0 == buffer_lengths_in_bytes) {
  590. DPRINTK("%s() Buffers have equal value!!\n",
  591. __FUNCTION__);
  592. return FAIL_A_IS_EQUAL_TO_B;
  593. }
  594. }
  595. if (*MSB_K < *MSB_Q) {
  596. return SUCCESS_A_IS_LESS_THAN_B;
  597. } else {
  598. return FAIL_A_IS_GREATER_THAN_B;
  599. }
  600. }
  601. /* Name : icp_ocfDrvDsaSign
  602. *
  603. * Description : This function will map DSA RS Sign from OCF to the LAC API.
  604. *
  605. * NOTE: From looking at OCF patch to OpenSSL and even the number of input
  606. * parameters, OCF expects us to generate the random seed value. This value
  607. * is generated and passed to LAC, however the number is discared in the
  608. * callback and not returned to the user.
  609. */
  610. static int icp_ocfDrvDsaSign(struct cryptkop *krp)
  611. {
  612. CpaStatus lacStatus = CPA_STATUS_SUCCESS;
  613. CpaCyDsaRSSignOpData *dsaRsSignOpData = NULL;
  614. void *callbackTag = NULL;
  615. CpaCyRandGenOpData randGenOpData;
  616. int primeQSizeInBytes = 0;
  617. int doCheck = 0;
  618. CpaFlatBuffer randData;
  619. CpaBoolean protocolStatus = CPA_FALSE;
  620. CpaFlatBuffer *pR = NULL;
  621. CpaFlatBuffer *pS = NULL;
  622. callbackTag = krp;
  623. BITS_TO_BYTES(primeQSizeInBytes,
  624. krp->krp_param[ICP_DSA_SIGN_KRP_PARAM_PRIME_Q_INDEX].
  625. crp_nbits);
  626. if (DSA_RS_SIGN_PRIMEQ_SIZE_IN_BYTES != primeQSizeInBytes) {
  627. APRINTK("%s(): DSA PRIME Q size not equal to the "
  628. "FIPS defined 20bytes, = %d\n",
  629. __FUNCTION__, primeQSizeInBytes);
  630. krp->krp_status = EDOM;
  631. return EDOM;
  632. }
  633. dsaRsSignOpData =
  634. icp_kmem_cache_zalloc(drvDSARSSign_zone, ICP_M_NOWAIT);
  635. if (NULL == dsaRsSignOpData) {
  636. APRINTK("%s():Failed to get memory"
  637. " for DSA RS Sign Op data struct\n", __FUNCTION__);
  638. krp->krp_status = ENOMEM;
  639. return ENOMEM;
  640. }
  641. dsaRsSignOpData->K.pData =
  642. icp_kmem_cache_alloc(drvDSARSSignKValue_zone, ICP_M_NOWAIT);
  643. if (NULL == dsaRsSignOpData->K.pData) {
  644. APRINTK("%s():Failed to get memory"
  645. " for DSA RS Sign Op Random value\n", __FUNCTION__);
  646. ICP_CACHE_FREE(drvDSARSSign_zone, dsaRsSignOpData);
  647. krp->krp_status = ENOMEM;
  648. return ENOMEM;
  649. }
  650. pR = icp_kmem_cache_zalloc(drvFlatBuffer_zone, ICP_M_NOWAIT);
  651. if (NULL == pR) {
  652. APRINTK("%s():Failed to get memory"
  653. " for DSA signature R\n", __FUNCTION__);
  654. ICP_CACHE_FREE(drvDSARSSignKValue_zone,
  655. dsaRsSignOpData->K.pData);
  656. ICP_CACHE_FREE(drvDSARSSign_zone, dsaRsSignOpData);
  657. krp->krp_status = ENOMEM;
  658. return ENOMEM;
  659. }
  660. pS = icp_kmem_cache_zalloc(drvFlatBuffer_zone, ICP_M_NOWAIT);
  661. if (NULL == pS) {
  662. APRINTK("%s():Failed to get memory"
  663. " for DSA signature S\n", __FUNCTION__);
  664. icp_ocfDrvFreeFlatBuffer(pR);
  665. ICP_CACHE_FREE(drvDSARSSignKValue_zone,
  666. dsaRsSignOpData->K.pData);
  667. ICP_CACHE_FREE(drvDSARSSign_zone, dsaRsSignOpData);
  668. krp->krp_status = ENOMEM;
  669. return ENOMEM;
  670. }
  671. /*link prime number parameter for ease of processing */
  672. dsaRsSignOpData->P.pData =
  673. krp->krp_param[ICP_DSA_SIGN_KRP_PARAM_PRIME_P_INDEX].crp_p;
  674. BITS_TO_BYTES(dsaRsSignOpData->P.dataLenInBytes,
  675. krp->krp_param[ICP_DSA_SIGN_KRP_PARAM_PRIME_P_INDEX].
  676. crp_nbits);
  677. icp_ocfDrvSwapBytes(dsaRsSignOpData->P.pData,
  678. dsaRsSignOpData->P.dataLenInBytes);
  679. dsaRsSignOpData->Q.pData =
  680. krp->krp_param[ICP_DSA_SIGN_KRP_PARAM_PRIME_Q_INDEX].crp_p;
  681. BITS_TO_BYTES(dsaRsSignOpData->Q.dataLenInBytes,
  682. krp->krp_param[ICP_DSA_SIGN_KRP_PARAM_PRIME_Q_INDEX].
  683. crp_nbits);
  684. icp_ocfDrvSwapBytes(dsaRsSignOpData->Q.pData,
  685. dsaRsSignOpData->Q.dataLenInBytes);
  686. /*generate random number with equal buffer size to Prime value Q,
  687. but value less than Q */
  688. dsaRsSignOpData->K.dataLenInBytes = dsaRsSignOpData->Q.dataLenInBytes;
  689. randGenOpData.generateBits = CPA_TRUE;
  690. randGenOpData.lenInBytes = dsaRsSignOpData->K.dataLenInBytes;
  691. icp_ocfDrvPtrAndLenToFlatBuffer(dsaRsSignOpData->K.pData,
  692. dsaRsSignOpData->K.dataLenInBytes,
  693. &randData);
  694. doCheck = 0;
  695. while (icp_ocfDrvCheckALessThanB(&(dsaRsSignOpData->K),
  696. &(dsaRsSignOpData->Q), &doCheck)) {
  697. if (CPA_STATUS_SUCCESS
  698. != cpaCyRandGen(CPA_INSTANCE_HANDLE_SINGLE,
  699. NULL, NULL, &randGenOpData, &randData)) {
  700. APRINTK("%s(): ERROR - Failed to generate DSA RS Sign K"
  701. "value\n", __FUNCTION__);
  702. icp_ocfDrvFreeFlatBuffer(pS);
  703. icp_ocfDrvFreeFlatBuffer(pR);
  704. ICP_CACHE_FREE(drvDSARSSignKValue_zone,
  705. dsaRsSignOpData->K.pData);
  706. ICP_CACHE_FREE(drvDSARSSign_zone, dsaRsSignOpData);
  707. krp->krp_status = EAGAIN;
  708. return EAGAIN;
  709. }
  710. doCheck++;
  711. if (DSA_SIGN_RAND_GEN_VAL_CHECK_MAX_ITERATIONS == doCheck) {
  712. APRINTK("%s(): ERROR - Failed to find DSA RS Sign K "
  713. "value less than Q value\n", __FUNCTION__);
  714. icp_ocfDrvFreeFlatBuffer(pS);
  715. icp_ocfDrvFreeFlatBuffer(pR);
  716. ICP_CACHE_FREE(drvDSARSSignKValue_zone,
  717. dsaRsSignOpData->K.pData);
  718. ICP_CACHE_FREE(drvDSARSSign_zone, dsaRsSignOpData);
  719. krp->krp_status = EAGAIN;
  720. return EAGAIN;
  721. }
  722. }
  723. /*Rand Data - no need to swap bytes for pK */
  724. /* Link parameters */
  725. dsaRsSignOpData->G.pData =
  726. krp->krp_param[ICP_DSA_SIGN_KRP_PARAM_G_INDEX].crp_p;
  727. BITS_TO_BYTES(dsaRsSignOpData->G.dataLenInBytes,
  728. krp->krp_param[ICP_DSA_SIGN_KRP_PARAM_G_INDEX].crp_nbits);
  729. icp_ocfDrvSwapBytes(dsaRsSignOpData->G.pData,
  730. dsaRsSignOpData->G.dataLenInBytes);
  731. dsaRsSignOpData->X.pData =
  732. krp->krp_param[ICP_DSA_SIGN_KRP_PARAM_X_INDEX].crp_p;
  733. BITS_TO_BYTES(dsaRsSignOpData->X.dataLenInBytes,
  734. krp->krp_param[ICP_DSA_SIGN_KRP_PARAM_X_INDEX].crp_nbits);
  735. icp_ocfDrvSwapBytes(dsaRsSignOpData->X.pData,
  736. dsaRsSignOpData->X.dataLenInBytes);
  737. /*OpenSSL dgst parameter is left in big endian byte order,
  738. therefore no byte swap is required */
  739. dsaRsSignOpData->M.pData =
  740. krp->krp_param[ICP_DSA_SIGN_KRP_PARAM_DGST_INDEX].crp_p;
  741. BITS_TO_BYTES(dsaRsSignOpData->M.dataLenInBytes,
  742. krp->krp_param[ICP_DSA_SIGN_KRP_PARAM_DGST_INDEX].
  743. crp_nbits);
  744. /* Output Parameters */
  745. pS->pData = krp->krp_param[ICP_DSA_SIGN_KRP_PARAM_S_RESULT_INDEX].crp_p;
  746. BITS_TO_BYTES(pS->dataLenInBytes,
  747. krp->krp_param[ICP_DSA_SIGN_KRP_PARAM_S_RESULT_INDEX].
  748. crp_nbits);
  749. pR->pData = krp->krp_param[ICP_DSA_SIGN_KRP_PARAM_R_RESULT_INDEX].crp_p;
  750. BITS_TO_BYTES(pR->dataLenInBytes,
  751. krp->krp_param[ICP_DSA_SIGN_KRP_PARAM_R_RESULT_INDEX].
  752. crp_nbits);
  753. lacStatus = cpaCyDsaSignRS(CPA_INSTANCE_HANDLE_SINGLE,
  754. icp_ocfDrvDsaRSSignCallBack,
  755. callbackTag, dsaRsSignOpData,
  756. &protocolStatus, pR, pS);
  757. if (CPA_STATUS_SUCCESS != lacStatus) {
  758. EPRINTK("%s(): DSA RS Sign Operation failed (%d).\n",
  759. __FUNCTION__, lacStatus);
  760. krp->krp_status = ECANCELED;
  761. icp_ocfDrvFreeFlatBuffer(pS);
  762. icp_ocfDrvFreeFlatBuffer(pR);
  763. ICP_CACHE_FREE(drvDSARSSignKValue_zone,
  764. dsaRsSignOpData->K.pData);
  765. ICP_CACHE_FREE(drvDSARSSign_zone, dsaRsSignOpData);
  766. }
  767. return lacStatus;
  768. }
  769. /* Name : icp_ocfDrvDsaVerify
  770. *
  771. * Description : This function will map DSA RS Verify from OCF to the LAC API.
  772. *
  773. */
  774. static int icp_ocfDrvDsaVerify(struct cryptkop *krp)
  775. {
  776. CpaStatus lacStatus = CPA_STATUS_SUCCESS;
  777. CpaCyDsaVerifyOpData *dsaVerifyOpData = NULL;
  778. void *callbackTag = NULL;
  779. CpaBoolean verifyStatus = CPA_FALSE;
  780. callbackTag = krp;
  781. dsaVerifyOpData =
  782. icp_kmem_cache_zalloc(drvDSAVerify_zone, ICP_M_NOWAIT);
  783. if (NULL == dsaVerifyOpData) {
  784. APRINTK("%s():Failed to get memory"
  785. " for DSA Verify Op data struct\n", __FUNCTION__);
  786. krp->krp_status = ENOMEM;
  787. return ENOMEM;
  788. }
  789. /* Link parameters */
  790. dsaVerifyOpData->P.pData =
  791. krp->krp_param[ICP_DSA_VERIFY_KRP_PARAM_PRIME_P_INDEX].crp_p;
  792. BITS_TO_BYTES(dsaVerifyOpData->P.dataLenInBytes,
  793. krp->krp_param[ICP_DSA_VERIFY_KRP_PARAM_PRIME_P_INDEX].
  794. crp_nbits);
  795. icp_ocfDrvSwapBytes(dsaVerifyOpData->P.pData,
  796. dsaVerifyOpData->P.dataLenInBytes);
  797. dsaVerifyOpData->Q.pData =
  798. krp->krp_param[ICP_DSA_VERIFY_KRP_PARAM_PRIME_Q_INDEX].crp_p;
  799. BITS_TO_BYTES(dsaVerifyOpData->Q.dataLenInBytes,
  800. krp->krp_param[ICP_DSA_VERIFY_KRP_PARAM_PRIME_Q_INDEX].
  801. crp_nbits);
  802. icp_ocfDrvSwapBytes(dsaVerifyOpData->Q.pData,
  803. dsaVerifyOpData->Q.dataLenInBytes);
  804. dsaVerifyOpData->G.pData =
  805. krp->krp_param[ICP_DSA_VERIFY_KRP_PARAM_G_INDEX].crp_p;
  806. BITS_TO_BYTES(dsaVerifyOpData->G.dataLenInBytes,
  807. krp->krp_param[ICP_DSA_VERIFY_KRP_PARAM_G_INDEX].
  808. crp_nbits);
  809. icp_ocfDrvSwapBytes(dsaVerifyOpData->G.pData,
  810. dsaVerifyOpData->G.dataLenInBytes);
  811. dsaVerifyOpData->Y.pData =
  812. krp->krp_param[ICP_DSA_VERIFY_KRP_PARAM_PUBKEY_INDEX].crp_p;
  813. BITS_TO_BYTES(dsaVerifyOpData->Y.dataLenInBytes,
  814. krp->krp_param[ICP_DSA_VERIFY_KRP_PARAM_PUBKEY_INDEX].
  815. crp_nbits);
  816. icp_ocfDrvSwapBytes(dsaVerifyOpData->Y.pData,
  817. dsaVerifyOpData->Y.dataLenInBytes);
  818. /*OpenSSL dgst parameter is left in big endian byte order,
  819. therefore no byte swap is required */
  820. dsaVerifyOpData->M.pData =
  821. krp->krp_param[ICP_DSA_VERIFY_KRP_PARAM_DGST_INDEX].crp_p;
  822. BITS_TO_BYTES(dsaVerifyOpData->M.dataLenInBytes,
  823. krp->krp_param[ICP_DSA_VERIFY_KRP_PARAM_DGST_INDEX].
  824. crp_nbits);
  825. dsaVerifyOpData->R.pData =
  826. krp->krp_param[ICP_DSA_VERIFY_KRP_PARAM_SIG_R_INDEX].crp_p;
  827. BITS_TO_BYTES(dsaVerifyOpData->R.dataLenInBytes,
  828. krp->krp_param[ICP_DSA_VERIFY_KRP_PARAM_SIG_R_INDEX].
  829. crp_nbits);
  830. icp_ocfDrvSwapBytes(dsaVerifyOpData->R.pData,
  831. dsaVerifyOpData->R.dataLenInBytes);
  832. dsaVerifyOpData->S.pData =
  833. krp->krp_param[ICP_DSA_VERIFY_KRP_PARAM_SIG_S_INDEX].crp_p;
  834. BITS_TO_BYTES(dsaVerifyOpData->S.dataLenInBytes,
  835. krp->krp_param[ICP_DSA_VERIFY_KRP_PARAM_SIG_S_INDEX].
  836. crp_nbits);
  837. icp_ocfDrvSwapBytes(dsaVerifyOpData->S.pData,
  838. dsaVerifyOpData->S.dataLenInBytes);
  839. lacStatus = cpaCyDsaVerify(CPA_INSTANCE_HANDLE_SINGLE,
  840. icp_ocfDrvDsaVerifyCallBack,
  841. callbackTag, dsaVerifyOpData, &verifyStatus);
  842. if (CPA_STATUS_SUCCESS != lacStatus) {
  843. EPRINTK("%s(): DSA Verify Operation failed (%d).\n",
  844. __FUNCTION__, lacStatus);
  845. ICP_CACHE_FREE(drvDSAVerify_zone, dsaVerifyOpData);
  846. krp->krp_status = ECANCELED;
  847. }
  848. return lacStatus;
  849. }
  850. /* Name : icp_ocfDrvDhP1Callback
  851. *
  852. * Description : When this function returns it signifies that the LAC
  853. * component has completed the DH operation.
  854. */
  855. static void
  856. icp_ocfDrvDhP1CallBack(void *callbackTag,
  857. CpaStatus status,
  858. void *pOpData, CpaFlatBuffer * pLocalOctetStringPV)
  859. {
  860. struct cryptkop *krp = NULL;
  861. CpaCyDhPhase1KeyGenOpData *pPhase1OpData = NULL;
  862. if (NULL == callbackTag) {
  863. DPRINTK("%s(): Invalid input parameters - "
  864. "callbackTag data is NULL\n", __FUNCTION__);
  865. return;
  866. }
  867. krp = (struct cryptkop *)callbackTag;
  868. if (NULL == pOpData) {
  869. DPRINTK("%s(): Invalid input parameters - "
  870. "Operation Data is NULL\n", __FUNCTION__);
  871. krp->krp_status = ECANCELED;
  872. crypto_kdone(krp);
  873. return;
  874. }
  875. pPhase1OpData = (CpaCyDhPhase1KeyGenOpData *) pOpData;
  876. if (NULL == pLocalOctetStringPV) {
  877. DPRINTK("%s(): Invalid input parameters - "
  878. "pLocalOctetStringPV Data is NULL\n", __FUNCTION__);
  879. memset(pPhase1OpData, 0, sizeof(CpaCyDhPhase1KeyGenOpData));
  880. ICP_CACHE_FREE(drvDH_zone, pPhase1OpData);
  881. krp->krp_status = ECANCELED;
  882. crypto_kdone(krp);
  883. return;
  884. }
  885. if (CPA_STATUS_SUCCESS == status) {
  886. krp->krp_status = CRYPTO_OP_SUCCESS;
  887. } else {
  888. APRINTK("%s(): Diffie Hellman Phase1 Key Gen failed - "
  889. "Operation Status = %d\n", __FUNCTION__, status);
  890. krp->krp_status = ECANCELED;
  891. }
  892. icp_ocfDrvSwapBytes(pLocalOctetStringPV->pData,
  893. pLocalOctetStringPV->dataLenInBytes);
  894. icp_ocfDrvFreeFlatBuffer(pLocalOctetStringPV);
  895. memset(pPhase1OpData, 0, sizeof(CpaCyDhPhase1KeyGenOpData));
  896. ICP_CACHE_FREE(drvDH_zone, pPhase1OpData);
  897. crypto_kdone(krp);
  898. return;
  899. }
  900. /* Name : icp_ocfDrvModExpCallBack
  901. *
  902. * Description : When this function returns it signifies that the LAC
  903. * component has completed the Mod Exp operation.
  904. */
  905. static void
  906. icp_ocfDrvModExpCallBack(void *callbackTag,
  907. CpaStatus status,
  908. void *pOpdata, CpaFlatBuffer * pResult)
  909. {
  910. struct cryptkop *krp = NULL;
  911. CpaCyLnModExpOpData *pLnModExpOpData = NULL;
  912. if (NULL == callbackTag) {
  913. DPRINTK("%s(): Invalid input parameters - "
  914. "callbackTag data is NULL\n", __FUNCTION__);
  915. return;
  916. }
  917. krp = (struct cryptkop *)callbackTag;
  918. if (NULL == pOpdata) {
  919. DPRINTK("%s(): Invalid Mod Exp input parameters - "
  920. "Operation Data is NULL\n", __FUNCTION__);
  921. krp->krp_status = ECANCELED;
  922. crypto_kdone(krp);
  923. return;
  924. }
  925. pLnModExpOpData = (CpaCyLnModExpOpData *) pOpdata;
  926. if (NULL == pResult) {
  927. DPRINTK("%s(): Invalid input parameters - "
  928. "pResult data is NULL\n", __FUNCTION__);
  929. krp->krp_status = ECANCELED;
  930. memset(pLnModExpOpData, 0, sizeof(CpaCyLnModExpOpData));
  931. ICP_CACHE_FREE(drvLnModExp_zone, pLnModExpOpData);
  932. crypto_kdone(krp);
  933. return;
  934. }
  935. if (CPA_STATUS_SUCCESS == status) {
  936. krp->krp_status = CRYPTO_OP_SUCCESS;
  937. } else {
  938. APRINTK("%s(): LAC Mod Exp Operation failed - "
  939. "Operation Status = %d\n", __FUNCTION__, status);
  940. krp->krp_status = ECANCELED;
  941. }
  942. icp_ocfDrvSwapBytes(pResult->pData, pResult->dataLenInBytes);
  943. /*switch base size value back to original */
  944. if (pLnModExpOpData->base.pData ==
  945. (uint8_t *) & (krp->
  946. krp_param[ICP_MOD_EXP_KRP_PARAM_BASE_INDEX].
  947. crp_nbits)) {
  948. *((uint32_t *) pLnModExpOpData->base.pData) =
  949. ntohl(*((uint32_t *) pLnModExpOpData->base.pData));
  950. }
  951. icp_ocfDrvFreeFlatBuffer(pResult);
  952. memset(pLnModExpOpData, 0, sizeof(CpaCyLnModExpOpData));
  953. ICP_CACHE_FREE(drvLnModExp_zone, pLnModExpOpData);
  954. crypto_kdone(krp);
  955. return;
  956. }
  957. /* Name : icp_ocfDrvModExpCRTCallBack
  958. *
  959. * Description : When this function returns it signifies that the LAC
  960. * component has completed the Mod Exp CRT operation.
  961. */
  962. static void
  963. icp_ocfDrvModExpCRTCallBack(void *callbackTag,
  964. CpaStatus status,
  965. void *pOpData, CpaFlatBuffer * pOutputData)
  966. {
  967. struct cryptkop *krp = NULL;
  968. CpaCyRsaDecryptOpData *pDecryptData = NULL;
  969. if (NULL == callbackTag) {
  970. DPRINTK("%s(): Invalid input parameters - "
  971. "callbackTag data is NULL\n", __FUNCTION__);
  972. return;
  973. }
  974. krp = (struct cryptkop *)callbackTag;
  975. if (NULL == pOpData) {
  976. DPRINTK("%s(): Invalid input parameters - "
  977. "Operation Data is NULL\n", __FUNCTION__);
  978. krp->krp_status = ECANCELED;
  979. crypto_kdone(krp);
  980. return;
  981. }
  982. pDecryptData = (CpaCyRsaDecryptOpData *) pOpData;
  983. if (NULL == pOutputData) {
  984. DPRINTK("%s(): Invalid input parameter - "
  985. "pOutputData is NULL\n", __FUNCTION__);
  986. memset(pDecryptData->pRecipientPrivateKey, 0,
  987. sizeof(CpaCyRsaPrivateKey));
  988. ICP_CACHE_FREE(drvRSAPrivateKey_zone,
  989. pDecryptData->pRecipientPrivateKey);
  990. memset(pDecryptData, 0, sizeof(CpaCyRsaDecryptOpData));
  991. ICP_CACHE_FREE(drvRSADecrypt_zone, pDecryptData);
  992. krp->krp_status = ECANCELED;
  993. crypto_kdone(krp);
  994. return;
  995. }
  996. if (CPA_STATUS_SUCCESS == status) {
  997. krp->krp_status = CRYPTO_OP_SUCCESS;
  998. } else {
  999. APRINTK("%s(): LAC Mod Exp CRT operation failed - "
  1000. "Operation Status = %d\n", __FUNCTION__, status);
  1001. krp->krp_status = ECANCELED;
  1002. }
  1003. icp_ocfDrvSwapBytes(pOutputData->pData, pOutputData->dataLenInBytes);
  1004. icp_ocfDrvFreeFlatBuffer(pOutputData);
  1005. memset(pDecryptData->pRecipientPrivateKey, 0,
  1006. sizeof(CpaCyRsaPrivateKey));
  1007. ICP_CACHE_FREE(drvRSAPrivateKey_zone,
  1008. pDecryptData->pRecipientPrivateKey);
  1009. memset(pDecryptData, 0, sizeof(CpaCyRsaDecryptOpData));
  1010. ICP_CACHE_FREE(drvRSADecrypt_zone, pDecryptData);
  1011. crypto_kdone(krp);
  1012. return;
  1013. }
  1014. /* Name : icp_ocfDrvDsaRSSignCallBack
  1015. *
  1016. * Description : When this function returns it signifies that the LAC
  1017. * component has completed the DSA RS sign operation.
  1018. */
  1019. static void
  1020. icp_ocfDrvDsaRSSignCallBack(void *callbackTag,
  1021. CpaStatus status,
  1022. void *pOpData,
  1023. CpaBoolean protocolStatus,
  1024. CpaFlatBuffer * pR, CpaFlatBuffer * pS)
  1025. {
  1026. struct cryptkop *krp = NULL;
  1027. CpaCyDsaRSSignOpData *pSignData = NULL;
  1028. if (NULL == callbackTag) {
  1029. DPRINTK("%s(): Invalid input parameters - "
  1030. "callbackTag data is NULL\n", __FUNCTION__);
  1031. return;
  1032. }
  1033. krp = (struct cryptkop *)callbackTag;
  1034. if (NULL == pOpData) {
  1035. DPRINTK("%s(): Invalid input parameters - "
  1036. "Operation Data is NULL\n", __FUNCTION__);
  1037. krp->krp_status = ECANCELED;
  1038. crypto_kdone(krp);
  1039. return;
  1040. }
  1041. pSignData = (CpaCyDsaRSSignOpData *) pOpData;
  1042. if (NULL == pR) {
  1043. DPRINTK("%s(): Invalid input parameter - "
  1044. "pR sign is NULL\n", __FUNCTION__);
  1045. icp_ocfDrvFreeFlatBuffer(pS);
  1046. ICP_CACHE_FREE(drvDSARSSign_zone, pSignData);
  1047. krp->krp_status = ECANCELED;
  1048. crypto_kdone(krp);
  1049. return;
  1050. }
  1051. if (NULL == pS) {
  1052. DPRINTK("%s(): Invalid input parameter - "
  1053. "pS sign is NULL\n", __FUNCTION__);
  1054. icp_ocfDrvFreeFlatBuffer(pR);
  1055. ICP_CACHE_FREE(drvDSARSSign_zone, pSignData);
  1056. krp->krp_status = ECANCELED;
  1057. crypto_kdone(krp);
  1058. return;
  1059. }
  1060. if (CPA_STATUS_SUCCESS != status) {
  1061. APRINTK("%s(): LAC DSA RS Sign operation failed - "
  1062. "Operation Status = %d\n", __FUNCTION__, status);
  1063. krp->krp_status = ECANCELED;
  1064. } else {
  1065. krp->krp_status = CRYPTO_OP_SUCCESS;
  1066. if (CPA_TRUE != protocolStatus) {
  1067. DPRINTK("%s(): LAC DSA RS Sign operation failed due "
  1068. "to protocol error\n", __FUNCTION__);
  1069. krp->krp_status = EIO;
  1070. }
  1071. }
  1072. /* Swap bytes only when the callback status is successful and
  1073. protocolStatus is set to true */
  1074. if (CPA_STATUS_SUCCESS == status && CPA_TRUE == protocolStatus) {
  1075. icp_ocfDrvSwapBytes(pR->pData, pR->dataLenInBytes);
  1076. icp_ocfDrvSwapBytes(pS->pData, pS->dataLenInBytes);
  1077. }
  1078. icp_ocfDrvFreeFlatBuffer(pR);
  1079. icp_ocfDrvFreeFlatBuffer(pS);
  1080. memset(pSignData->K.pData, 0, pSignData->K.dataLenInBytes);
  1081. ICP_CACHE_FREE(drvDSARSSignKValue_zone, pSignData->K.pData);
  1082. memset(pSignData, 0, sizeof(CpaCyDsaRSSignOpData));
  1083. ICP_CACHE_FREE(drvDSARSSign_zone, pSignData);
  1084. crypto_kdone(krp);
  1085. return;
  1086. }
  1087. /* Name : icp_ocfDrvDsaVerifyCallback
  1088. *
  1089. * Description : When this function returns it signifies that the LAC
  1090. * component has completed the DSA Verify operation.
  1091. */
  1092. static void
  1093. icp_ocfDrvDsaVerifyCallBack(void *callbackTag,
  1094. CpaStatus status,
  1095. void *pOpData, CpaBoolean verifyStatus)
  1096. {
  1097. struct cryptkop *krp = NULL;
  1098. CpaCyDsaVerifyOpData *pVerData = NULL;
  1099. if (NULL == callbackTag) {
  1100. DPRINTK("%s(): Invalid input parameters - "
  1101. "callbackTag data is NULL\n", __FUNCTION__);
  1102. return;
  1103. }
  1104. krp = (struct cryptkop *)callbackTag;
  1105. if (NULL == pOpData) {
  1106. DPRINTK("%s(): Invalid input parameters - "
  1107. "Operation Data is NULL\n", __FUNCTION__);
  1108. krp->krp_status = ECANCELED;
  1109. crypto_kdone(krp);
  1110. return;
  1111. }
  1112. pVerData = (CpaCyDsaVerifyOpData *) pOpData;
  1113. if (CPA_STATUS_SUCCESS != status) {
  1114. APRINTK("%s(): LAC DSA Verify operation failed - "
  1115. "Operation Status = %d\n", __FUNCTION__, status);
  1116. krp->krp_status = ECANCELED;
  1117. } else {
  1118. krp->krp_status = CRYPTO_OP_SUCCESS;
  1119. if (CPA_TRUE != verifyStatus) {
  1120. DPRINTK("%s(): DSA signature invalid\n", __FUNCTION__);
  1121. krp->krp_status = EIO;
  1122. }
  1123. }
  1124. /* Swap bytes only when the callback status is successful and
  1125. verifyStatus is set to true */
  1126. /*Just swapping back the key values for now. Possibly all
  1127. swapped buffers need to be reverted */
  1128. if (CPA_STATUS_SUCCESS == status && CPA_TRUE == verifyStatus) {
  1129. icp_ocfDrvSwapBytes(pVerData->R.pData,
  1130. pVerData->R.dataLenInBytes);
  1131. icp_ocfDrvSwapBytes(pVerData->S.pData,
  1132. pVerData->S.dataLenInBytes);
  1133. }
  1134. memset(pVerData, 0, sizeof(CpaCyDsaVerifyOpData));
  1135. ICP_CACHE_FREE(drvDSAVerify_zone, pVerData);
  1136. crypto_kdone(krp);
  1137. return;
  1138. }