613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross/*
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * CDDL HEADER START
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross *
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * The contents of this file are subject to the terms of the
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * Common Development and Distribution License (the "License").
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * You may not use this file except in compliance with the License.
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross *
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * or http://www.opensolaris.org/os/licensing.
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * See the License for the specific language governing permissions
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * and limitations under the License.
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross *
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * When distributing Covered Code, include this CDDL HEADER in each
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * If applicable, add the following below this CDDL HEADER, with the
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * fields enclosed by brackets "[]" replaced with your own identifying
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * information: Portions Copyright [yyyy] [name of copyright owner]
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross *
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * CDDL HEADER END
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross */
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross/*
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * Copyright 2009 Sun Microsystems, Inc. All rights reserved.
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * Use is subject to license terms.
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross * Copyright 2013 Nexenta Systems, Inc. All rights reserved.
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross */
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross/*
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * Crypto support, using libpkcs11
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross *
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * Some code copied from the server: libsmb smb_crypt.c
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * with minor changes, i.e. errno.h return values.
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross * XXX: Later, make the server use these.
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross */
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross#include <sys/types.h>
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross#include <sys/md4.h>
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross#include <errno.h>
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross#include <fcntl.h>
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross#include <string.h>
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross#include <security/cryptoki.h>
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross#include <security/pkcs11.h>
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross#include <cryptoutil.h>
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross#include "smb_crypt.h"
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Rossstatic void
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Rosssmb_initlmkey(uchar_t *keyout, const uchar_t *keyin);
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross/*
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * Like libsmb smb_auth_DES,
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * but use uchar_t, return errno.
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross */
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Rossint
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Rosssmb_encrypt_DES(uchar_t *Result, int ResultLen,
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross const uchar_t *Key, int KeyLen,
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross const uchar_t *Data, int DataLen)
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross{
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross CK_RV rv;
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross CK_MECHANISM mechanism;
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross CK_OBJECT_HANDLE hKey;
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross CK_SESSION_HANDLE hSession;
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross CK_ULONG ciphertext_len;
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross uchar_t des_key[8];
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross int error = 0;
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross int K, D;
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross int k, d;
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross /*
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross * Calculate proper number of iterations.
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross * Known call cases include:
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross * ResultLen=16, KeyLen=14, DataLen=8
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross * ResultLen=24, KeyLen=21, DataLen=8
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross * ResultLen=16, KeyLen=14, DataLen=16
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross */
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross K = KeyLen / 7;
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross D = DataLen / 8;
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross if ((KeyLen % 7) || (DataLen % 8))
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross return (EINVAL);
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross if (K == 0 || D == 0)
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross return (EINVAL);
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross if (ResultLen < (K * 8))
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross return (EINVAL);
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross /*
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * Use SUNW convenience function to initialize the cryptoki
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * library, and open a session with a slot that supports
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * the mechanism we plan on using.
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross */
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross mechanism.mechanism = CKM_DES_ECB;
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross mechanism.pParameter = NULL;
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross mechanism.ulParameterLen = 0;
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross rv = SUNW_C_GetMechSession(mechanism.mechanism, &hSession);
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross if (rv != CKR_OK) {
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross return (ENOTSUP);
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross }
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross for (d = k = 0; k < K; k++, d++) {
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross /* Cycle the input again, as necessary. */
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross if (d == D)
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross d = 0;
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross smb_initlmkey(des_key, &Key[k * 7]);
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross rv = SUNW_C_KeyToObject(hSession, mechanism.mechanism,
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross des_key, 8, &hKey);
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross if (rv != CKR_OK) {
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross error = EIO;
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross goto exit_session;
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross }
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross /* Initialize the encryption operation in the session */
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross rv = C_EncryptInit(hSession, &mechanism, hKey);
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross if (rv != CKR_OK) {
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross error = EIO;
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross goto exit_encrypt;
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross }
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross ciphertext_len = 8;
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross /* Read in the data and encrypt this portion */
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross rv = C_EncryptUpdate(hSession,
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross (CK_BYTE_PTR)Data + (d * 8), 8,
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross (CK_BYTE_PTR)Result + (k * 8),
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross &ciphertext_len);
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross if (rv != CKR_OK) {
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross error = EIO;
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross goto exit_encrypt;
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross }
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross (void) C_DestroyObject(hSession, hKey);
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross }
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross goto exit_session;
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Rossexit_encrypt:
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross (void) C_DestroyObject(hSession, hKey);
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Rossexit_session:
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross (void) C_CloseSession(hSession);
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross return (error);
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross}
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross/*
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * See "Netlogon Credential Computation" section of MS-NRPC document.
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * Same as in libsmb, but output arg first.
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross */
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Rossstatic void
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Rosssmb_initlmkey(uchar_t *keyout, const uchar_t *keyin)
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross{
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross int i;
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross keyout[0] = keyin[0] >> 0x01;
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross keyout[1] = ((keyin[0] & 0x01) << 6) | (keyin[1] >> 2);
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross keyout[2] = ((keyin[1] & 0x03) << 5) | (keyin[2] >> 3);
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross keyout[3] = ((keyin[2] & 0x07) << 4) | (keyin[3] >> 4);
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross keyout[4] = ((keyin[3] & 0x0f) << 3) | (keyin[4] >> 5);
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross keyout[5] = ((keyin[4] & 0x1f) << 2) | (keyin[5] >> 6);
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross keyout[6] = ((keyin[5] & 0x3f) << 1) | (keyin[6] >> 7);
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross keyout[7] = keyin[6] & 0x7f;
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross for (i = 0; i < 8; i++)
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross keyout[i] = (keyout[i] << 1) & 0xfe;
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross}
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross/*
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross * CKM_RC4
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross */
85e6b6747d07050e01ec91acef2453655821f9abGordon Rossint
85e6b6747d07050e01ec91acef2453655821f9abGordon Rosssmb_encrypt_RC4(uchar_t *Result, int ResultLen,
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross const uchar_t *Key, int KeyLen,
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross const uchar_t *Data, int DataLen)
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross{
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross CK_RV rv;
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross CK_MECHANISM mechanism;
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross CK_OBJECT_HANDLE hKey;
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross CK_SESSION_HANDLE hSession;
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross CK_ULONG ciphertext_len;
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross int error = EIO;
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross /*
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross * Use SUNW convenience function to initialize the cryptoki
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross * library, and open a session with a slot that supports
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross * the mechanism we plan on using.
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross */
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross mechanism.mechanism = CKM_RC4;
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross mechanism.pParameter = NULL;
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross mechanism.ulParameterLen = 0;
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross rv = SUNW_C_GetMechSession(mechanism.mechanism, &hSession);
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross if (rv != CKR_OK) {
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross return (ENOTSUP);
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross }
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross rv = SUNW_C_KeyToObject(hSession, mechanism.mechanism,
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross Key, KeyLen, &hKey);
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross if (rv != CKR_OK)
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross goto exit_session;
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross /* Initialize the encryption operation in the session */
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross rv = C_EncryptInit(hSession, &mechanism, hKey);
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross if (rv != CKR_OK)
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross goto exit_encrypt;
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross ciphertext_len = ResultLen;
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross rv = C_EncryptUpdate(hSession,
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross (CK_BYTE_PTR)Data, DataLen,
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross (CK_BYTE_PTR)Result, &ciphertext_len);
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross if (rv == CKR_OK)
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross error = 0;
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross
85e6b6747d07050e01ec91acef2453655821f9abGordon Rossexit_encrypt:
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross (void) C_DestroyObject(hSession, hKey);
85e6b6747d07050e01ec91acef2453655821f9abGordon Rossexit_session:
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross (void) C_CloseSession(hSession);
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross return (error);
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross}
85e6b6747d07050e01ec91acef2453655821f9abGordon Ross
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross/*
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * Get some random bytes from /dev/urandom
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross *
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * There may be a preferred way to call this via libpkcs11
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * XXX: (see: C_GenerateRandom, etc. -- later...)
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross * Just read from /dev/urandom for now.
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross */
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Rossint
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Rosssmb_get_urandom(void *data, size_t dlen)
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross{
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross int fd, rlen;
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross fd = open("/dev/urandom", O_RDONLY);
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross if (fd < 0)
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross return (errno);
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross rlen = read(fd, data, dlen);
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross close(fd);
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross if (rlen < 0)
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross return (errno);
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross if (rlen < dlen)
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross return (EIO);
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross return (0);
613a2f6ba31e891e3d947a356daf5e563d43c1ceGordon Ross}