45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * CDDL HEADER START
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens *
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * The contents of this file are subject to the terms of the
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * Common Development and Distribution License (the "License").
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * You may not use this file except in compliance with the License.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens *
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * or http://opensource.org/licenses/CDDL-1.0.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * See the License for the specific language governing permissions
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * and limitations under the License.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens *
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * When distributing Covered Code, include this CDDL HEADER in each
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * If applicable, add the following below this CDDL HEADER, with the
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * fields enclosed by brackets "[]" replaced with your own identifying
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * information: Portions Copyright [yyyy] [name of copyright owner]
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens *
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * CDDL HEADER END
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * Copyright 2013 Saso Kiselkov. All rights reserved.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens#include <sys/modctl.h>
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens#include <sys/crypto/common.h>
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens#include <sys/crypto/spi.h>
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens#include <sys/strsun.h>
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens#include <sys/sysmacros.h>
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens#include <sys/systm.h>
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens#define SKEIN_MODULE_IMPL
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens#include <sys/skein.h>
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * Like the sha2 module, we create the skein module with two modlinkages:
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * - modlmisc to allow direct calls to Skein_* API functions.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * - modlcrypto to integrate well into the Kernel Crypto Framework (KCF).
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic struct modlmisc modlmisc = {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens &mod_miscops,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens "Skein Message-Digest Algorithm"
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens};
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic struct modlcrypto modlcrypto = {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens &mod_cryptoops,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens "Skein Kernel SW Provider"
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens};
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic struct modlinkage modlinkage = {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens MODREV_1, &modlmisc, &modlcrypto, NULL
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens};
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic crypto_mech_info_t skein_mech_info_tab[] = {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens {CKM_SKEIN_256, SKEIN_256_MECH_INFO_TYPE,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens CRYPTO_FG_DIGEST | CRYPTO_FG_DIGEST_ATOMIC,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens 0, 0, CRYPTO_KEYSIZE_UNIT_IN_BITS},
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens {CKM_SKEIN_256_MAC, SKEIN_256_MAC_MECH_INFO_TYPE,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens CRYPTO_FG_MAC | CRYPTO_FG_MAC_ATOMIC, 1, INT_MAX,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens CRYPTO_KEYSIZE_UNIT_IN_BYTES},
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens {CKM_SKEIN_512, SKEIN_512_MECH_INFO_TYPE,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens CRYPTO_FG_DIGEST | CRYPTO_FG_DIGEST_ATOMIC,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens 0, 0, CRYPTO_KEYSIZE_UNIT_IN_BITS},
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens {CKM_SKEIN_512_MAC, SKEIN_512_MAC_MECH_INFO_TYPE,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens CRYPTO_FG_MAC | CRYPTO_FG_MAC_ATOMIC, 1, INT_MAX,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens CRYPTO_KEYSIZE_UNIT_IN_BYTES},
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens {CKM_SKEIN1024, SKEIN1024_MECH_INFO_TYPE,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens CRYPTO_FG_DIGEST | CRYPTO_FG_DIGEST_ATOMIC,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens 0, 0, CRYPTO_KEYSIZE_UNIT_IN_BITS},
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens {CKM_SKEIN1024_MAC, SKEIN1024_MAC_MECH_INFO_TYPE,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens CRYPTO_FG_MAC | CRYPTO_FG_MAC_ATOMIC, 1, INT_MAX,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens CRYPTO_KEYSIZE_UNIT_IN_BYTES}
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens};
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic void skein_provider_status(crypto_provider_handle_t, uint_t *);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic crypto_control_ops_t skein_control_ops = {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens skein_provider_status
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens};
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic int skein_digest_init(crypto_ctx_t *, crypto_mechanism_t *,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens crypto_req_handle_t);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic int skein_digest(crypto_ctx_t *, crypto_data_t *, crypto_data_t *,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens crypto_req_handle_t);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic int skein_update(crypto_ctx_t *, crypto_data_t *, crypto_req_handle_t);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic int skein_final(crypto_ctx_t *, crypto_data_t *, crypto_req_handle_t);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic int skein_digest_atomic(crypto_provider_handle_t, crypto_session_id_t,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens crypto_mechanism_t *, crypto_data_t *, crypto_data_t *,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens crypto_req_handle_t);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic crypto_digest_ops_t skein_digest_ops = {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens skein_digest_init,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens skein_digest,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens skein_update,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens NULL,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens skein_final,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens skein_digest_atomic
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens};
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic int skein_mac_init(crypto_ctx_t *, crypto_mechanism_t *, crypto_key_t *,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens crypto_spi_ctx_template_t, crypto_req_handle_t);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic int skein_mac_atomic(crypto_provider_handle_t, crypto_session_id_t,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens crypto_mechanism_t *, crypto_key_t *, crypto_data_t *, crypto_data_t *,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens crypto_spi_ctx_template_t, crypto_req_handle_t);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic crypto_mac_ops_t skein_mac_ops = {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens skein_mac_init,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens NULL,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens skein_update, /* using regular digest update is OK here */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens skein_final, /* using regular digest final is OK here */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens skein_mac_atomic,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens NULL
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens};
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic int skein_create_ctx_template(crypto_provider_handle_t,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens crypto_mechanism_t *, crypto_key_t *, crypto_spi_ctx_template_t *,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens size_t *, crypto_req_handle_t);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic int skein_free_context(crypto_ctx_t *);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic crypto_ctx_ops_t skein_ctx_ops = {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens skein_create_ctx_template,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens skein_free_context
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens};
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic crypto_ops_t skein_crypto_ops = {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens &skein_control_ops,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens &skein_digest_ops,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens NULL,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens &skein_mac_ops,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens NULL,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens NULL,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens NULL,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens NULL,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens NULL,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens NULL,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens NULL,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens NULL,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens NULL,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens &skein_ctx_ops,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens NULL,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens NULL,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens NULL
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens};
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic crypto_provider_info_t skein_prov_info = {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens CRYPTO_SPI_VERSION_4,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens "Skein Software Provider",
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens CRYPTO_SW_PROVIDER,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens {&modlinkage},
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens NULL,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens &skein_crypto_ops,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens sizeof (skein_mech_info_tab) / sizeof (crypto_mech_info_t),
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens skein_mech_info_tab
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens};
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
0c3cd038dba1c3a4dcfa2ecc9d7da7c44b11730fMatthew Ahrensstatic crypto_kcf_provider_handle_t skein_prov_handle = 0;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrenstypedef struct skein_ctx {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens skein_mech_type_t sc_mech_type;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens size_t sc_digest_bitlen;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens union {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens Skein_256_Ctxt_t sc_256;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens Skein_512_Ctxt_t sc_512;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens Skein1024_Ctxt_t sc_1024;
be32284091554a41d4706e6653adeec1d9127a87Robert Mustacchi } sc_u;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens} skein_ctx_t;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens#define SKEIN_CTX(_ctx_) ((skein_ctx_t *)((_ctx_)->cc_provider_private))
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens#define SKEIN_CTX_LVALUE(_ctx_) (_ctx_)->cc_provider_private
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens#define SKEIN_OP(_skein_ctx, _op, ...) \
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens do { \
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens skein_ctx_t *sc = (_skein_ctx); \
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens switch (sc->sc_mech_type) { \
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens case SKEIN_256_MECH_INFO_TYPE: \
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens case SKEIN_256_MAC_MECH_INFO_TYPE: \
be32284091554a41d4706e6653adeec1d9127a87Robert Mustacchi (void) Skein_256_ ## _op(&sc->sc_u.sc_256, \
be32284091554a41d4706e6653adeec1d9127a87Robert Mustacchi __VA_ARGS__); \
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens break; \
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens case SKEIN_512_MECH_INFO_TYPE: \
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens case SKEIN_512_MAC_MECH_INFO_TYPE: \
be32284091554a41d4706e6653adeec1d9127a87Robert Mustacchi (void) Skein_512_ ## _op(&sc->sc_u.sc_512, \
be32284091554a41d4706e6653adeec1d9127a87Robert Mustacchi __VA_ARGS__); \
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens break; \
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens case SKEIN1024_MECH_INFO_TYPE: \
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens case SKEIN1024_MAC_MECH_INFO_TYPE: \
be32284091554a41d4706e6653adeec1d9127a87Robert Mustacchi (void) Skein1024_ ## _op(&sc->sc_u.sc_1024, \
be32284091554a41d4706e6653adeec1d9127a87Robert Mustacchi __VA_ARGS__); \
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens break; \
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens } \
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens _NOTE(CONSTCOND) \
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens } while (0)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic int
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensskein_get_digest_bitlen(const crypto_mechanism_t *mechanism, size_t *result)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens{
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (mechanism->cm_param != NULL) {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens /*LINTED(E_BAD_PTR_CAST_ALIGN)*/
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens skein_param_t *param = (skein_param_t *)mechanism->cm_param;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (mechanism->cm_param_len != sizeof (*param) ||
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens param->sp_digest_bitlen == 0) {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_MECHANISM_PARAM_INVALID);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens }
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens *result = param->sp_digest_bitlen;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens } else {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens switch (mechanism->cm_type) {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens case SKEIN_256_MECH_INFO_TYPE:
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens *result = 256;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens break;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens case SKEIN_512_MECH_INFO_TYPE:
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens *result = 512;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens break;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens case SKEIN1024_MECH_INFO_TYPE:
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens *result = 1024;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens break;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens default:
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_MECHANISM_INVALID);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens }
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens }
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_SUCCESS);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens}
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensint
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens_init(void)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens{
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens int error;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if ((error = mod_install(&modlinkage)) != 0)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (error);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens /*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * Try to register with KCF - failure shouldn't unload us, since we
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * still may want to continue providing misc/skein functionality.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens (void) crypto_register_provider(&skein_prov_info, &skein_prov_handle);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (0);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens}
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensint
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens_info(struct modinfo *modinfop)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens{
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (mod_info(&modlinkage, modinfop));
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens}
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * KCF software provider control entry points.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/* ARGSUSED */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic void
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensskein_provider_status(crypto_provider_handle_t provider, uint_t *status)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens{
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens *status = CRYPTO_PROVIDER_READY;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens}
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * General Skein hashing helper functions.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * Performs an Update on a context with uio input data.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic int
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensskein_digest_update_uio(skein_ctx_t *ctx, const crypto_data_t *data)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens{
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens off_t offset = data->cd_offset;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens size_t length = data->cd_length;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens uint_t vec_idx;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens size_t cur_len;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens const uio_t *uio = data->cd_uio;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens /* we support only kernel buffer */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (uio->uio_segflg != UIO_SYSSPACE)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_ARGUMENTS_BAD);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens /*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * Jump to the first iovec containing data to be
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * digested.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens for (vec_idx = 0; vec_idx < uio->uio_iovcnt &&
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens offset >= uio->uio_iov[vec_idx].iov_len;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens offset -= uio->uio_iov[vec_idx++].iov_len)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens ;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (vec_idx == uio->uio_iovcnt) {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens /*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * The caller specified an offset that is larger than the
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * total size of the buffers it provided.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_DATA_LEN_RANGE);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens }
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens /*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * Now do the digesting on the iovecs.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens while (vec_idx < uio->uio_iovcnt && length > 0) {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens cur_len = MIN(uio->uio_iov[vec_idx].iov_len - offset, length);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens SKEIN_OP(ctx, Update, (uint8_t *)uio->uio_iov[vec_idx].iov_base
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens + offset, cur_len);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens length -= cur_len;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens vec_idx++;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens offset = 0;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens }
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (vec_idx == uio->uio_iovcnt && length > 0) {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens /*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * The end of the specified iovec's was reached but
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * the length requested could not be processed, i.e.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * The caller requested to digest more data than it provided.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_DATA_LEN_RANGE);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens }
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_SUCCESS);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens}
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * Performs a Final on a context and writes to a uio digest output.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic int
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensskein_digest_final_uio(skein_ctx_t *ctx, crypto_data_t *digest,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens crypto_req_handle_t req)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens{
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens off_t offset = digest->cd_offset;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens uint_t vec_idx;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens uio_t *uio = digest->cd_uio;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens /* we support only kernel buffer */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (uio->uio_segflg != UIO_SYSSPACE)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_ARGUMENTS_BAD);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens /*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * Jump to the first iovec containing ptr to the digest to be returned.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens for (vec_idx = 0; offset >= uio->uio_iov[vec_idx].iov_len &&
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens vec_idx < uio->uio_iovcnt;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens offset -= uio->uio_iov[vec_idx++].iov_len)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens ;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (vec_idx == uio->uio_iovcnt) {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens /*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * The caller specified an offset that is larger than the
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * total size of the buffers it provided.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_DATA_LEN_RANGE);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens }
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (offset + CRYPTO_BITS2BYTES(ctx->sc_digest_bitlen) <=
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens uio->uio_iov[vec_idx].iov_len) {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens /* The computed digest will fit in the current iovec. */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens SKEIN_OP(ctx, Final,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens (uchar_t *)uio->uio_iov[vec_idx].iov_base + offset);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens } else {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens uint8_t *digest_tmp;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens off_t scratch_offset = 0;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens size_t length = CRYPTO_BITS2BYTES(ctx->sc_digest_bitlen);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens size_t cur_len;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens digest_tmp = kmem_alloc(CRYPTO_BITS2BYTES(
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens ctx->sc_digest_bitlen), crypto_kmflag(req));
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (digest_tmp == NULL)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_HOST_MEMORY);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens SKEIN_OP(ctx, Final, digest_tmp);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens while (vec_idx < uio->uio_iovcnt && length > 0) {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens cur_len = MIN(uio->uio_iov[vec_idx].iov_len - offset,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens length);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens bcopy(digest_tmp + scratch_offset,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens uio->uio_iov[vec_idx].iov_base + offset, cur_len);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens length -= cur_len;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens vec_idx++;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens scratch_offset += cur_len;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens offset = 0;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens }
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens kmem_free(digest_tmp, CRYPTO_BITS2BYTES(ctx->sc_digest_bitlen));
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (vec_idx == uio->uio_iovcnt && length > 0) {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens /*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * The end of the specified iovec's was reached but
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * the length requested could not be processed, i.e.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * The caller requested to digest more data than it
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * provided.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_DATA_LEN_RANGE);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens }
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens }
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_SUCCESS);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens}
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * Performs an Update on a context with mblk input data.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic int
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensskein_digest_update_mblk(skein_ctx_t *ctx, crypto_data_t *data)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens{
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens off_t offset = data->cd_offset;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens size_t length = data->cd_length;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens mblk_t *mp;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens size_t cur_len;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens /* Jump to the first mblk_t containing data to be digested. */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens for (mp = data->cd_mp; mp != NULL && offset >= MBLKL(mp);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens offset -= MBLKL(mp), mp = mp->b_cont)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens ;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (mp == NULL) {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens /*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * The caller specified an offset that is larger than the
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * total size of the buffers it provided.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_DATA_LEN_RANGE);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens }
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens /* Now do the digesting on the mblk chain. */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens while (mp != NULL && length > 0) {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens cur_len = MIN(MBLKL(mp) - offset, length);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens SKEIN_OP(ctx, Update, mp->b_rptr + offset, cur_len);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens length -= cur_len;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens offset = 0;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens mp = mp->b_cont;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens }
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (mp == NULL && length > 0) {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens /*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * The end of the mblk was reached but the length requested
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * could not be processed, i.e. The caller requested
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * to digest more data than it provided.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_DATA_LEN_RANGE);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens }
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_SUCCESS);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens}
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * Performs a Final on a context and writes to an mblk digest output.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic int
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensskein_digest_final_mblk(skein_ctx_t *ctx, crypto_data_t *digest,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens crypto_req_handle_t req)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens{
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens off_t offset = digest->cd_offset;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens mblk_t *mp;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens /* Jump to the first mblk_t that will be used to store the digest. */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens for (mp = digest->cd_mp; mp != NULL && offset >= MBLKL(mp);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens offset -= MBLKL(mp), mp = mp->b_cont)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens ;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (mp == NULL) {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens /* caller specified offset is too large */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_DATA_LEN_RANGE);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens }
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (offset + CRYPTO_BITS2BYTES(ctx->sc_digest_bitlen) <= MBLKL(mp)) {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens /* The digest will fit in the current mblk. */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens SKEIN_OP(ctx, Final, mp->b_rptr + offset);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens } else {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens /* Split the digest up between the individual buffers. */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens uint8_t *digest_tmp;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens off_t scratch_offset = 0;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens size_t length = CRYPTO_BITS2BYTES(ctx->sc_digest_bitlen);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens size_t cur_len;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens digest_tmp = kmem_alloc(CRYPTO_BITS2BYTES(
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens ctx->sc_digest_bitlen), crypto_kmflag(req));
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (digest_tmp == NULL)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_HOST_MEMORY);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens SKEIN_OP(ctx, Final, digest_tmp);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens while (mp != NULL && length > 0) {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens cur_len = MIN(MBLKL(mp) - offset, length);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens bcopy(digest_tmp + scratch_offset,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens mp->b_rptr + offset, cur_len);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens length -= cur_len;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens mp = mp->b_cont;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens scratch_offset += cur_len;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens offset = 0;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens }
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens kmem_free(digest_tmp, CRYPTO_BITS2BYTES(ctx->sc_digest_bitlen));
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (mp == NULL && length > 0) {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens /* digest too long to fit in the mblk buffers */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_DATA_LEN_RANGE);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens }
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens }
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_SUCCESS);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens}
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * KCF software provider digest entry points.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * Initializes a skein digest context to the configuration in `mechanism'.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * The mechanism cm_type must be one of SKEIN_*_MECH_INFO_TYPE. The cm_param
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * field may contain a skein_param_t structure indicating the length of the
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * digest the algorithm should produce. Otherwise the default output lengths
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * are applied (32 bytes for Skein-256, 64 bytes for Skein-512 and 128 bytes
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * for Skein-1024).
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic int
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensskein_digest_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens crypto_req_handle_t req)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens{
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens int error = CRYPTO_SUCCESS;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (!VALID_SKEIN_DIGEST_MECH(mechanism->cm_type))
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_MECHANISM_INVALID);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens SKEIN_CTX_LVALUE(ctx) = kmem_alloc(sizeof (*SKEIN_CTX(ctx)),
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens crypto_kmflag(req));
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (SKEIN_CTX(ctx) == NULL)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_HOST_MEMORY);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens SKEIN_CTX(ctx)->sc_mech_type = mechanism->cm_type;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens error = skein_get_digest_bitlen(mechanism,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens &SKEIN_CTX(ctx)->sc_digest_bitlen);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (error != CRYPTO_SUCCESS)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens goto errout;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens SKEIN_OP(SKEIN_CTX(ctx), Init, SKEIN_CTX(ctx)->sc_digest_bitlen);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_SUCCESS);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrenserrout:
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens bzero(SKEIN_CTX(ctx), sizeof (*SKEIN_CTX(ctx)));
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens kmem_free(SKEIN_CTX(ctx), sizeof (*SKEIN_CTX(ctx)));
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens SKEIN_CTX_LVALUE(ctx) = NULL;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (error);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens}
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * Executes a skein_update and skein_digest on a pre-initialized crypto
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * context in a single step. See the documentation to these functions to
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * see what to pass here.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic int
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensskein_digest(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *digest,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens crypto_req_handle_t req)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens{
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens int error = CRYPTO_SUCCESS;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens ASSERT(SKEIN_CTX(ctx) != NULL);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (digest->cd_length <
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens CRYPTO_BITS2BYTES(SKEIN_CTX(ctx)->sc_digest_bitlen)) {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens digest->cd_length =
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens CRYPTO_BITS2BYTES(SKEIN_CTX(ctx)->sc_digest_bitlen);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_BUFFER_TOO_SMALL);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens }
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens error = skein_update(ctx, data, req);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (error != CRYPTO_SUCCESS) {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens bzero(SKEIN_CTX(ctx), sizeof (*SKEIN_CTX(ctx)));
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens kmem_free(SKEIN_CTX(ctx), sizeof (*SKEIN_CTX(ctx)));
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens SKEIN_CTX_LVALUE(ctx) = NULL;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens digest->cd_length = 0;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (error);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens }
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens error = skein_final(ctx, digest, req);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (error);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens}
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * Performs a skein Update with the input message in `data' (successive calls
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * can push more data). This is used both for digest and MAC operation.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * Supported input data formats are raw, uio and mblk.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/*ARGSUSED*/
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic int
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensskein_update(crypto_ctx_t *ctx, crypto_data_t *data, crypto_req_handle_t req)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens{
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens int error = CRYPTO_SUCCESS;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens ASSERT(SKEIN_CTX(ctx) != NULL);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens switch (data->cd_format) {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens case CRYPTO_DATA_RAW:
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens SKEIN_OP(SKEIN_CTX(ctx), Update,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens (uint8_t *)data->cd_raw.iov_base + data->cd_offset,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens data->cd_length);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens break;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens case CRYPTO_DATA_UIO:
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens error = skein_digest_update_uio(SKEIN_CTX(ctx), data);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens break;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens case CRYPTO_DATA_MBLK:
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens error = skein_digest_update_mblk(SKEIN_CTX(ctx), data);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens break;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens default:
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens error = CRYPTO_ARGUMENTS_BAD;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens }
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (error);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens}
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * Performs a skein Final, writing the output to `digest'. This is used both
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * for digest and MAC operation.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * Supported output digest formats are raw, uio and mblk.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/*ARGSUSED*/
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic int
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensskein_final(crypto_ctx_t *ctx, crypto_data_t *digest, crypto_req_handle_t req)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens{
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens int error = CRYPTO_SUCCESS;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens ASSERT(SKEIN_CTX(ctx) != NULL);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (digest->cd_length <
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens CRYPTO_BITS2BYTES(SKEIN_CTX(ctx)->sc_digest_bitlen)) {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens digest->cd_length =
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens CRYPTO_BITS2BYTES(SKEIN_CTX(ctx)->sc_digest_bitlen);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_BUFFER_TOO_SMALL);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens }
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens switch (digest->cd_format) {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens case CRYPTO_DATA_RAW:
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens SKEIN_OP(SKEIN_CTX(ctx), Final,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens (uint8_t *)digest->cd_raw.iov_base + digest->cd_offset);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens break;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens case CRYPTO_DATA_UIO:
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens error = skein_digest_final_uio(SKEIN_CTX(ctx), digest, req);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens break;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens case CRYPTO_DATA_MBLK:
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens error = skein_digest_final_mblk(SKEIN_CTX(ctx), digest, req);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens break;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens default:
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens error = CRYPTO_ARGUMENTS_BAD;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens }
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (error == CRYPTO_SUCCESS)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens digest->cd_length =
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens CRYPTO_BITS2BYTES(SKEIN_CTX(ctx)->sc_digest_bitlen);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens else
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens digest->cd_length = 0;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens bzero(SKEIN_CTX(ctx), sizeof (*SKEIN_CTX(ctx)));
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens kmem_free(SKEIN_CTX(ctx), sizeof (*(SKEIN_CTX(ctx))));
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens SKEIN_CTX_LVALUE(ctx) = NULL;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (error);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens}
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * Performs a full skein digest computation in a single call, configuring the
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * algorithm according to `mechanism', reading the input to be digested from
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * `data' and writing the output to `digest'.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * Supported input/output formats are raw, uio and mblk.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/*ARGSUSED*/
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic int
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensskein_digest_atomic(crypto_provider_handle_t provider,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens crypto_session_id_t session_id, crypto_mechanism_t *mechanism,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens crypto_data_t *data, crypto_data_t *digest, crypto_req_handle_t req)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens{
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens int error;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens skein_ctx_t skein_ctx;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens crypto_ctx_t ctx;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens SKEIN_CTX_LVALUE(&ctx) = &skein_ctx;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens /* Init */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (!VALID_SKEIN_DIGEST_MECH(mechanism->cm_type))
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_MECHANISM_INVALID);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens skein_ctx.sc_mech_type = mechanism->cm_type;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens error = skein_get_digest_bitlen(mechanism, &skein_ctx.sc_digest_bitlen);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (error != CRYPTO_SUCCESS)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens goto out;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens SKEIN_OP(&skein_ctx, Init, skein_ctx.sc_digest_bitlen);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if ((error = skein_update(&ctx, data, digest)) != CRYPTO_SUCCESS)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens goto out;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if ((error = skein_final(&ctx, data, digest)) != CRYPTO_SUCCESS)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens goto out;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensout:
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (error == CRYPTO_SUCCESS)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens digest->cd_length =
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens CRYPTO_BITS2BYTES(skein_ctx.sc_digest_bitlen);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens else
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens digest->cd_length = 0;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens bzero(&skein_ctx, sizeof (skein_ctx));
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (error);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens}
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * Helper function that builds a Skein MAC context from the provided
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * mechanism and key.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic int
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensskein_mac_ctx_build(skein_ctx_t *ctx, crypto_mechanism_t *mechanism,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens crypto_key_t *key)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens{
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens int error;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (!VALID_SKEIN_MAC_MECH(mechanism->cm_type))
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_MECHANISM_INVALID);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (key->ck_format != CRYPTO_KEY_RAW)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_ARGUMENTS_BAD);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens ctx->sc_mech_type = mechanism->cm_type;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens error = skein_get_digest_bitlen(mechanism, &ctx->sc_digest_bitlen);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (error != CRYPTO_SUCCESS)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (error);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens SKEIN_OP(ctx, InitExt, ctx->sc_digest_bitlen, 0, key->ck_data,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens CRYPTO_BITS2BYTES(key->ck_length));
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_SUCCESS);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens}
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * KCF software provide mac entry points.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * Initializes a skein MAC context. You may pass a ctx_template, in which
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * case the template will be reused to make initialization more efficient.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * Otherwise a new context will be constructed. The mechanism cm_type must
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * be one of SKEIN_*_MAC_MECH_INFO_TYPE. Same as in skein_digest_init, you
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * may pass a skein_param_t in cm_param to configure the length of the
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * digest. The key must be in raw format.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic int
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensskein_mac_init(crypto_ctx_t *ctx, crypto_mechanism_t *mechanism,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens crypto_key_t *key, crypto_spi_ctx_template_t ctx_template,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens crypto_req_handle_t req)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens{
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens int error;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens SKEIN_CTX_LVALUE(ctx) = kmem_alloc(sizeof (*SKEIN_CTX(ctx)),
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens crypto_kmflag(req));
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (SKEIN_CTX(ctx) == NULL)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_HOST_MEMORY);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (ctx_template != NULL) {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens bcopy(ctx_template, SKEIN_CTX(ctx),
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens sizeof (*SKEIN_CTX(ctx)));
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens } else {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens error = skein_mac_ctx_build(SKEIN_CTX(ctx), mechanism, key);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (error != CRYPTO_SUCCESS)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens goto errout;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens }
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_SUCCESS);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrenserrout:
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens bzero(SKEIN_CTX(ctx), sizeof (*SKEIN_CTX(ctx)));
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens kmem_free(SKEIN_CTX(ctx), sizeof (*SKEIN_CTX(ctx)));
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (error);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens}
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * The MAC update and final calls are reused from the regular digest code.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/*ARGSUSED*/
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * Same as skein_digest_atomic, performs an atomic Skein MAC operation in
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * one step. All the same properties apply to the arguments of this
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * function as to those of the partial operations above.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic int
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensskein_mac_atomic(crypto_provider_handle_t provider,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens crypto_session_id_t session_id, crypto_mechanism_t *mechanism,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens crypto_key_t *key, crypto_data_t *data, crypto_data_t *mac,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens{
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens /* faux crypto context just for skein_digest_{update,final} */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens int error;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens crypto_ctx_t ctx;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens skein_ctx_t skein_ctx;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens SKEIN_CTX_LVALUE(&ctx) = &skein_ctx;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (ctx_template != NULL) {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens bcopy(ctx_template, &skein_ctx, sizeof (skein_ctx));
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens } else {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens error = skein_mac_ctx_build(&skein_ctx, mechanism, key);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (error != CRYPTO_SUCCESS)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens goto errout;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens }
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if ((error = skein_update(&ctx, data, req)) != CRYPTO_SUCCESS)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens goto errout;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if ((error = skein_final(&ctx, mac, req)) != CRYPTO_SUCCESS)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens goto errout;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_SUCCESS);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrenserrout:
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens bzero(&skein_ctx, sizeof (skein_ctx));
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (error);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens}
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * KCF software provider context management entry points.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * Constructs a context template for the Skein MAC algorithm. The same
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * properties apply to the arguments of this function as to those of
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * skein_mac_init.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/*ARGSUSED*/
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic int
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensskein_create_ctx_template(crypto_provider_handle_t provider,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens crypto_mechanism_t *mechanism, crypto_key_t *key,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens crypto_spi_ctx_template_t *ctx_template, size_t *ctx_template_size,
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens crypto_req_handle_t req)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens{
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens int error;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens skein_ctx_t *ctx_tmpl;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens ctx_tmpl = kmem_alloc(sizeof (*ctx_tmpl), crypto_kmflag(req));
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (ctx_tmpl == NULL)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_HOST_MEMORY);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens error = skein_mac_ctx_build(ctx_tmpl, mechanism, key);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (error != CRYPTO_SUCCESS)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens goto errout;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens *ctx_template = ctx_tmpl;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens *ctx_template_size = sizeof (*ctx_tmpl);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_SUCCESS);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrenserrout:
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens bzero(ctx_tmpl, sizeof (*ctx_tmpl));
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens kmem_free(ctx_tmpl, sizeof (*ctx_tmpl));
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (error);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens}
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens/*
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens * Frees a skein context in a parent crypto context.
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens */
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensstatic int
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrensskein_free_context(crypto_ctx_t *ctx)
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens{
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens if (SKEIN_CTX(ctx) != NULL) {
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens bzero(SKEIN_CTX(ctx), sizeof (*SKEIN_CTX(ctx)));
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens kmem_free(SKEIN_CTX(ctx), sizeof (*SKEIN_CTX(ctx)));
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens SKEIN_CTX_LVALUE(ctx) = NULL;
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens }
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens return (CRYPTO_SUCCESS);
45818ee124adeaaf947698996b4f4c722afc6d1fMatthew Ahrens}