8322 nl: misleading-indentation
[unleashed/tickless.git] / usr / src / lib / smbsrv / libfksmbsrv / common / fksmb_sign_pkcs.c
blobebafd8cd5a33e43361ae270a5e194644378a105e
1 /*
2 * This file and its contents are supplied under the terms of the
3 * Common Development and Distribution License ("CDDL"), version 1.0.
4 * You may only use this file in accordance with the terms of version
5 * 1.0 of the CDDL.
7 * A full copy of the text of the CDDL should have accompanied this
8 * source. A copy of the CDDL is also available via the Internet at
9 * http://www.illumos.org/license/CDDL.
13 * Copyright 2015 Nexenta Systems, Inc. All rights reserved.
17 * Helper functions for SMB signing using PKCS#11
19 * There are two implementations of these functions:
20 * This one (for user space) and another for kernel.
21 * See: uts/common/fs/smbsrv/smb_sign_kcf.c
24 #include <stdlib.h>
25 #include <smbsrv/smb_kproto.h>
26 #include <smbsrv/smb_signing.h>
27 #include <security/cryptoki.h>
28 #include <security/pkcs11.h>
31 * SMB1 signing helpers:
32 * (getmech, init, update, final)
35 int
36 smb_md5_getmech(smb_sign_mech_t *mech)
38 mech->mechanism = CKM_MD5;
39 mech->pParameter = NULL;
40 mech->ulParameterLen = 0;
41 return (0);
45 * Start PKCS#11 session.
47 int
48 smb_md5_init(smb_sign_ctx_t *ctxp, smb_sign_mech_t *mech)
50 CK_RV rv;
52 rv = SUNW_C_GetMechSession(mech->mechanism, ctxp);
53 if (rv != CKR_OK)
54 return (-1);
56 rv = C_DigestInit(*ctxp, mech);
58 return (rv == CKR_OK ? 0 : -1);
62 * Digest one segment
64 int
65 smb_md5_update(smb_sign_ctx_t ctx, void *buf, size_t len)
67 CK_RV rv;
69 rv = C_DigestUpdate(ctx, buf, len);
70 if (rv != CKR_OK)
71 (void) C_CloseSession(ctx);
73 return (rv == CKR_OK ? 0 : -1);
77 * Get the final digest.
79 int
80 smb_md5_final(smb_sign_ctx_t ctx, uint8_t *digest16)
82 CK_ULONG len = MD5_DIGEST_LENGTH;
83 CK_RV rv;
85 rv = C_DigestFinal(ctx, digest16, &len);
86 (void) C_CloseSession(ctx);
88 return (rv == CKR_OK ? 0 : -1);
92 * SMB2 signing helpers:
93 * (getmech, init, update, final)
96 int
97 smb2_hmac_getmech(smb_sign_mech_t *mech)
99 mech->mechanism = CKM_SHA256_HMAC;
100 mech->pParameter = NULL;
101 mech->ulParameterLen = 0;
102 return (0);
106 * Start PKCS#11 session, load the key.
109 smb2_hmac_init(smb_sign_ctx_t *ctxp, smb_sign_mech_t *mech,
110 uint8_t *key, size_t key_len)
112 CK_OBJECT_HANDLE hkey = 0;
113 CK_RV rv;
115 rv = SUNW_C_GetMechSession(mech->mechanism, ctxp);
116 if (rv != CKR_OK)
117 return (-1);
119 rv = SUNW_C_KeyToObject(*ctxp, mech->mechanism,
120 key, key_len, &hkey);
121 if (rv != CKR_OK)
122 return (-1);
124 rv = C_SignInit(*ctxp, mech, hkey);
125 (void) C_DestroyObject(*ctxp, hkey);
127 return (rv == CKR_OK ? 0 : -1);
131 * Digest one segment
134 smb2_hmac_update(smb_sign_ctx_t ctx, uint8_t *in, size_t len)
136 CK_RV rv;
138 rv = C_SignUpdate(ctx, in, len);
139 if (rv != CKR_OK)
140 (void) C_CloseSession(ctx);
142 return (rv == CKR_OK ? 0 : -1);
146 * Note, the SMB2 signature is the first 16 bytes of the
147 * 32-byte SHA256 HMAC digest.
150 smb2_hmac_final(smb_sign_ctx_t ctx, uint8_t *digest16)
152 uint8_t full_digest[SHA256_DIGEST_LENGTH];
153 CK_ULONG len = SHA256_DIGEST_LENGTH;
154 CK_RV rv;
156 rv = C_SignFinal(ctx, full_digest, &len);
157 if (rv == CKR_OK)
158 bcopy(full_digest, digest16, 16);
160 (void) C_CloseSession(ctx);
162 return (rv == CKR_OK ? 0 : -1);