Commit fa6999e3 authored by Harald Freudenberger's avatar Harald Freudenberger Committed by Vasily Gorbik

s390/pkey: support CCA and EP11 secure ECC private keys

This patch extends the pkey kernel module to support CCA
and EP11 secure ECC (private) keys as source for deriving
ECC protected (private) keys.

There is yet another new ioctl to support this: PKEY_KBLOB2PROTK3
can handle all the old keys plus CCA and EP11 secure ECC keys.
For details see ioctl description in pkey.h.

The CPACF unit currently only supports a subset of 5
different ECC curves (P-256, P-384, P-521, ED25519, ED448) and
so only keys of this curve type can be transformed into
protected keys. However, the pkey and the cca/ep11 low level
functions do not check this but simple pass-through the key
blob to the firmware onto the crypto cards. So most likely
the failure will be a response carrying an error code
resulting in user space errno value EIO instead of EINVAL.

Deriving a protected key from an EP11 ECC secure key
requires a CEX7 in EP11 mode. Deriving a protected key from
an CCA ECC secure key requires a CEX7 in CCA mode.

Together with this new ioctl the ioctls for querying lists
of apqns (PKEY_APQNS4K and PKEY_APQNS4KT) have been extended
to support EP11 and CCA ECC secure key type and key blobs.

Together with this ioctl there comes a new struct ep11kblob_header
which is to be prepended onto the EP11 key blob. See details
in pkey.h for the fields in there. The older EP11 AES key blob
with some info stored in the (unused) session field is also
supported with this new ioctl.
Signed-off-by: default avatarHarald Freudenberger <freude@linux.ibm.com>
Reviewed-by: default avatarIngo Franzki <ifranzki@linux.ibm.com>
Signed-off-by: default avatarVasily Gorbik <gor@linux.ibm.com>
parent 32ca04bb
...@@ -35,12 +35,16 @@ ...@@ -35,12 +35,16 @@
#define PKEY_KEYTYPE_AES_128 1 #define PKEY_KEYTYPE_AES_128 1
#define PKEY_KEYTYPE_AES_192 2 #define PKEY_KEYTYPE_AES_192 2
#define PKEY_KEYTYPE_AES_256 3 #define PKEY_KEYTYPE_AES_256 3
#define PKEY_KEYTYPE_ECC 4
/* the newer ioctls use a pkey_key_type enum for type information */ /* the newer ioctls use a pkey_key_type enum for type information */
enum pkey_key_type { enum pkey_key_type {
PKEY_TYPE_CCA_DATA = (__u32) 1, PKEY_TYPE_CCA_DATA = (__u32) 1,
PKEY_TYPE_CCA_CIPHER = (__u32) 2, PKEY_TYPE_CCA_CIPHER = (__u32) 2,
PKEY_TYPE_EP11 = (__u32) 3, PKEY_TYPE_EP11 = (__u32) 3,
PKEY_TYPE_CCA_ECC = (__u32) 0x1f,
PKEY_TYPE_EP11_AES = (__u32) 6,
PKEY_TYPE_EP11_ECC = (__u32) 7,
}; };
/* the newer ioctls use a pkey_key_size enum for key size information */ /* the newer ioctls use a pkey_key_size enum for key size information */
...@@ -88,6 +92,20 @@ struct pkey_clrkey { ...@@ -88,6 +92,20 @@ struct pkey_clrkey {
__u8 clrkey[MAXCLRKEYSIZE]; /* 16, 24, or 32 byte clear key value */ __u8 clrkey[MAXCLRKEYSIZE]; /* 16, 24, or 32 byte clear key value */
}; };
/*
* EP11 key blobs of type PKEY_TYPE_EP11_AES and PKEY_TYPE_EP11_ECC
* are ep11 blobs prepended by this header:
*/
struct ep11kblob_header {
__u8 type; /* always 0x00 */
__u8 hver; /* header version, currently needs to be 0x00 */
__u16 len; /* total length in bytes (including this header) */
__u8 version; /* PKEY_TYPE_EP11_AES or PKEY_TYPE_EP11_ECC */
__u8 res0; /* unused */
__u16 bitlen; /* clear key bit len, 0 for unknown */
__u8 res1[8]; /* unused */
} __packed;
/* /*
* Generate CCA AES secure key. * Generate CCA AES secure key.
*/ */
...@@ -304,7 +322,7 @@ struct pkey_verifykey2 { ...@@ -304,7 +322,7 @@ struct pkey_verifykey2 {
#define PKEY_VERIFYKEY2 _IOWR(PKEY_IOCTL_MAGIC, 0x17, struct pkey_verifykey2) #define PKEY_VERIFYKEY2 _IOWR(PKEY_IOCTL_MAGIC, 0x17, struct pkey_verifykey2)
/* /*
* Transform a key blob (of any type) into a protected key, version 2. * Transform a key blob into a protected key, version 2.
* There needs to be a list of apqns given with at least one entry in there. * There needs to be a list of apqns given with at least one entry in there.
* All apqns in the list need to be exact apqns, 0xFFFF as ANY card or domain * All apqns in the list need to be exact apqns, 0xFFFF as ANY card or domain
* is not supported. The implementation walks through the list of apqns and * is not supported. The implementation walks through the list of apqns and
...@@ -313,6 +331,8 @@ struct pkey_verifykey2 { ...@@ -313,6 +331,8 @@ struct pkey_verifykey2 {
* list is tried until success (return 0) or the end of the list is reached * list is tried until success (return 0) or the end of the list is reached
* (return -1 with errno ENODEV). You may use the PKEY_APQNS4K ioctl to * (return -1 with errno ENODEV). You may use the PKEY_APQNS4K ioctl to
* generate a list of apqns based on the key. * generate a list of apqns based on the key.
* Deriving ECC protected keys from ECC secure keys is not supported with
* this ioctl, use PKEY_KBLOB2PROTK3 for this purpose.
*/ */
struct pkey_kblob2pkey2 { struct pkey_kblob2pkey2 {
__u8 __user *key; /* in: pointer to key blob */ __u8 __user *key; /* in: pointer to key blob */
...@@ -326,17 +346,17 @@ struct pkey_kblob2pkey2 { ...@@ -326,17 +346,17 @@ struct pkey_kblob2pkey2 {
/* /*
* Build a list of APQNs based on a key blob given. * Build a list of APQNs based on a key blob given.
* Is able to find out which type of secure key is given (CCA AES secure * Is able to find out which type of secure key is given (CCA AES secure
* key, CCA AES cipher key or EP11 AES key) and tries to find all matching * key, CCA AES cipher key, CCA ECC private key, EP11 AES key, EP11 ECC private
* crypto cards based on the MKVP and maybe other criterias (like CCA AES * key) and tries to find all matching crypto cards based on the MKVP and maybe
* cipher keys need a CEX5C or higher, EP11 keys with BLOB_PKEY_EXTRACTABLE * other criterias (like CCA AES cipher keys need a CEX5C or higher, EP11 keys
* need a CEX7 and EP11 api version 4). The list of APQNs is further filtered * with BLOB_PKEY_EXTRACTABLE need a CEX7 and EP11 api version 4). The list of
* by the key's mkvp which needs to match to either the current mkvp (CCA and * APQNs is further filtered by the key's mkvp which needs to match to either
* EP11) or the alternate mkvp (old mkvp, CCA adapters only) of the apqns. The * the current mkvp (CCA and EP11) or the alternate mkvp (old mkvp, CCA adapters
* flags argument may be used to limit the matching apqns. If the * only) of the apqns. The flags argument may be used to limit the matching
* PKEY_FLAGS_MATCH_CUR_MKVP is given, only the current mkvp of each apqn is * apqns. If the PKEY_FLAGS_MATCH_CUR_MKVP is given, only the current mkvp of
* compared. Likewise with the PKEY_FLAGS_MATCH_ALT_MKVP. If both are given, it * each apqn is compared. Likewise with the PKEY_FLAGS_MATCH_ALT_MKVP. If both
* is assumed to return apqns where either the current or the alternate mkvp * are given, it is assumed to return apqns where either the current or the
* matches. At least one of the matching flags needs to be given. * alternate mkvp matches. At least one of the matching flags needs to be given.
* The flags argument for EP11 keys has no further action and is currently * The flags argument for EP11 keys has no further action and is currently
* ignored (but needs to be given as PKEY_FLAGS_MATCH_CUR_MKVP) as there is only * ignored (but needs to be given as PKEY_FLAGS_MATCH_CUR_MKVP) as there is only
* the wkvp from the key to match against the apqn's wkvp. * the wkvp from the key to match against the apqn's wkvp.
...@@ -365,9 +385,10 @@ struct pkey_apqns4key { ...@@ -365,9 +385,10 @@ struct pkey_apqns4key {
* restrict the list by given master key verification patterns. * restrict the list by given master key verification patterns.
* For different key types there may be different ways to match the * For different key types there may be different ways to match the
* master key verification patterns. For CCA keys (CCA data key and CCA * master key verification patterns. For CCA keys (CCA data key and CCA
* cipher key) the first 8 bytes of cur_mkvp refer to the current mkvp value * cipher key) the first 8 bytes of cur_mkvp refer to the current AES mkvp value
* of the apqn and the first 8 bytes of the alt_mkvp refer to the old mkvp. * of the apqn and the first 8 bytes of the alt_mkvp refer to the old AES mkvp.
* The flags argument controls if the apqns current and/or alternate mkvp * For CCA ECC keys it is similar but the match is against the APKA current/old
* mkvp. The flags argument controls if the apqns current and/or alternate mkvp
* should match. If the PKEY_FLAGS_MATCH_CUR_MKVP is given, only the current * should match. If the PKEY_FLAGS_MATCH_CUR_MKVP is given, only the current
* mkvp of each apqn is compared. Likewise with the PKEY_FLAGS_MATCH_ALT_MKVP. * mkvp of each apqn is compared. Likewise with the PKEY_FLAGS_MATCH_ALT_MKVP.
* If both are given, it is assumed to return apqns where either the * If both are given, it is assumed to return apqns where either the
...@@ -397,4 +418,30 @@ struct pkey_apqns4keytype { ...@@ -397,4 +418,30 @@ struct pkey_apqns4keytype {
}; };
#define PKEY_APQNS4KT _IOWR(PKEY_IOCTL_MAGIC, 0x1C, struct pkey_apqns4keytype) #define PKEY_APQNS4KT _IOWR(PKEY_IOCTL_MAGIC, 0x1C, struct pkey_apqns4keytype)
/*
* Transform a key blob into a protected key, version 3.
* The difference to version 2 of this ioctl is that the protected key
* buffer is now explicitly and not within a struct pkey_protkey any more.
* So this ioctl is also able to handle EP11 and CCA ECC secure keys and
* provide ECC protected keys.
* There needs to be a list of apqns given with at least one entry in there.
* All apqns in the list need to be exact apqns, 0xFFFF as ANY card or domain
* is not supported. The implementation walks through the list of apqns and
* tries to send the request to each apqn without any further checking (like
* card type or online state). If the apqn fails, simple the next one in the
* list is tried until success (return 0) or the end of the list is reached
* (return -1 with errno ENODEV). You may use the PKEY_APQNS4K ioctl to
* generate a list of apqns based on the key.
*/
struct pkey_kblob2pkey3 {
__u8 __user *key; /* in: pointer to key blob */
__u32 keylen; /* in: key blob size */
struct pkey_apqn __user *apqns; /* in: ptr to list of apqn targets */
__u32 apqn_entries; /* in: # of apqn target list entries */
__u32 pkeytype; /* out: prot key type (enum pkey_key_type) */
__u32 pkeylen; /* in/out: size of pkey buffer/actual len of pkey */
__u8 __user *pkey; /* in: pkey blob buffer space ptr */
};
#define PKEY_KBLOB2PROTK3 _IOWR(PKEY_IOCTL_MAGIC, 0x1D, struct pkey_kblob2pkey3)
#endif /* _UAPI_PKEY_H */ #endif /* _UAPI_PKEY_H */
...@@ -31,8 +31,9 @@ MODULE_LICENSE("GPL"); ...@@ -31,8 +31,9 @@ MODULE_LICENSE("GPL");
MODULE_AUTHOR("IBM Corporation"); MODULE_AUTHOR("IBM Corporation");
MODULE_DESCRIPTION("s390 protected key interface"); MODULE_DESCRIPTION("s390 protected key interface");
#define KEYBLOBBUFSIZE 8192 /* key buffer size used for internal processing */ #define KEYBLOBBUFSIZE 8192 /* key buffer size used for internal processing */
#define MAXAPQNSINLIST 64 /* max 64 apqns within a apqn list */ #define PROTKEYBLOBBUFSIZE 256 /* protected key buffer size used internal */
#define MAXAPQNSINLIST 64 /* max 64 apqns within a apqn list */
/* mask of available pckmo subfunctions, fetched once at module init */ /* mask of available pckmo subfunctions, fetched once at module init */
static cpacf_mask_t pckmo_functions; static cpacf_mask_t pckmo_functions;
...@@ -237,8 +238,9 @@ static int pkey_ep11key2pkey(const u8 *key, struct pkey_protkey *pkey) ...@@ -237,8 +238,9 @@ static int pkey_ep11key2pkey(const u8 *key, struct pkey_protkey *pkey)
for (rc = -ENODEV, i = 0; i < nr_apqns; i++) { for (rc = -ENODEV, i = 0; i < nr_apqns; i++) {
card = apqns[i] >> 16; card = apqns[i] >> 16;
dom = apqns[i] & 0xFFFF; dom = apqns[i] & 0xFFFF;
rc = ep11_key2protkey(card, dom, key, kb->head.len, pkey->len = sizeof(pkey->protkey);
pkey->protkey, &pkey->len, &pkey->type); rc = ep11_kblob2protkey(card, dom, key, kb->head.len,
pkey->protkey, &pkey->len, &pkey->type);
if (rc == 0) if (rc == 0)
break; break;
} }
...@@ -449,15 +451,21 @@ static int pkey_nonccatok2pkey(const u8 *key, u32 keylen, ...@@ -449,15 +451,21 @@ static int pkey_nonccatok2pkey(const u8 *key, u32 keylen,
break; break;
} }
case TOKVER_EP11_AES: { case TOKVER_EP11_AES: {
if (keylen < MINEP11AESKEYBLOBSIZE)
goto out;
/* check ep11 key for exportable as protected key */ /* check ep11 key for exportable as protected key */
rc = ep11_check_aeskeyblob(debug_info, 3, key, 0, 1); rc = ep11_check_aes_key(debug_info, 3, key, keylen, 1);
if (rc) if (rc)
goto out; goto out;
rc = pkey_ep11key2pkey(key, protkey); rc = pkey_ep11key2pkey(key, protkey);
break; break;
} }
case TOKVER_EP11_AES_WITH_HEADER:
/* check ep11 key with header for exportable as protected key */
rc = ep11_check_aes_key_with_hdr(debug_info, 3, key, keylen, 1);
if (rc)
goto out;
rc = pkey_ep11key2pkey(key + sizeof(struct ep11kblob_header),
protkey);
break;
default: default:
DEBUG_ERR("%s unknown/unsupported non-CCA token version %d\n", DEBUG_ERR("%s unknown/unsupported non-CCA token version %d\n",
__func__, hdr->version); __func__, hdr->version);
...@@ -719,7 +727,7 @@ static int pkey_verifykey2(const u8 *key, size_t keylen, ...@@ -719,7 +727,7 @@ static int pkey_verifykey2(const u8 *key, size_t keylen,
&& hdr->version == TOKVER_EP11_AES) { && hdr->version == TOKVER_EP11_AES) {
struct ep11keyblob *kb = (struct ep11keyblob *)key; struct ep11keyblob *kb = (struct ep11keyblob *)key;
rc = ep11_check_aeskeyblob(debug_info, 3, key, 0, 1); rc = ep11_check_aes_key(debug_info, 3, key, keylen, 1);
if (rc) if (rc)
goto out; goto out;
if (ktype) if (ktype)
...@@ -780,7 +788,7 @@ static int pkey_keyblob2pkey2(const struct pkey_apqn *apqns, size_t nr_apqns, ...@@ -780,7 +788,7 @@ static int pkey_keyblob2pkey2(const struct pkey_apqn *apqns, size_t nr_apqns,
if (hdr->version == TOKVER_EP11_AES) { if (hdr->version == TOKVER_EP11_AES) {
if (keylen < sizeof(struct ep11keyblob)) if (keylen < sizeof(struct ep11keyblob))
return -EINVAL; return -EINVAL;
if (ep11_check_aeskeyblob(debug_info, 3, key, 0, 1)) if (ep11_check_aes_key(debug_info, 3, key, keylen, 1))
return -EINVAL; return -EINVAL;
} else { } else {
return pkey_nonccatok2pkey(key, keylen, pkey); return pkey_nonccatok2pkey(key, keylen, pkey);
...@@ -806,9 +814,10 @@ static int pkey_keyblob2pkey2(const struct pkey_apqn *apqns, size_t nr_apqns, ...@@ -806,9 +814,10 @@ static int pkey_keyblob2pkey2(const struct pkey_apqn *apqns, size_t nr_apqns,
else { /* EP11 AES secure key blob */ else { /* EP11 AES secure key blob */
struct ep11keyblob *kb = (struct ep11keyblob *) key; struct ep11keyblob *kb = (struct ep11keyblob *) key;
rc = ep11_key2protkey(card, dom, key, kb->head.len, pkey->len = sizeof(pkey->protkey);
pkey->protkey, &pkey->len, rc = ep11_kblob2protkey(card, dom, key, kb->head.len,
&pkey->type); pkey->protkey, &pkey->len,
&pkey->type);
} }
if (rc == 0) if (rc == 0)
break; break;
...@@ -827,7 +836,27 @@ static int pkey_apqns4key(const u8 *key, size_t keylen, u32 flags, ...@@ -827,7 +836,27 @@ static int pkey_apqns4key(const u8 *key, size_t keylen, u32 flags,
if (keylen < sizeof(struct keytoken_header) || flags == 0) if (keylen < sizeof(struct keytoken_header) || flags == 0)
return -EINVAL; return -EINVAL;
if (hdr->type == TOKTYPE_NON_CCA && hdr->version == TOKVER_EP11_AES) { if (hdr->type == TOKTYPE_NON_CCA
&& (hdr->version == TOKVER_EP11_AES_WITH_HEADER
|| hdr->version == TOKVER_EP11_ECC_WITH_HEADER)
&& is_ep11_keyblob(key + sizeof(struct ep11kblob_header))) {
int minhwtype = 0, api = 0;
struct ep11keyblob *kb = (struct ep11keyblob *)
(key + sizeof(struct ep11kblob_header));
if (flags != PKEY_FLAGS_MATCH_CUR_MKVP)
return -EINVAL;
if (kb->attr & EP11_BLOB_PKEY_EXTRACTABLE) {
minhwtype = ZCRYPT_CEX7;
api = EP11_API_V;
}
rc = ep11_findcard2(&_apqns, &_nr_apqns, 0xFFFF, 0xFFFF,
minhwtype, api, kb->wkvp);
if (rc)
goto out;
} else if (hdr->type == TOKTYPE_NON_CCA
&& hdr->version == TOKVER_EP11_AES
&& is_ep11_keyblob(key)) {
int minhwtype = 0, api = 0; int minhwtype = 0, api = 0;
struct ep11keyblob *kb = (struct ep11keyblob *) key; struct ep11keyblob *kb = (struct ep11keyblob *) key;
...@@ -869,6 +898,24 @@ static int pkey_apqns4key(const u8 *key, size_t keylen, u32 flags, ...@@ -869,6 +898,24 @@ static int pkey_apqns4key(const u8 *key, size_t keylen, u32 flags,
cur_mkvp, old_mkvp, 1); cur_mkvp, old_mkvp, 1);
if (rc) if (rc)
goto out; goto out;
} else if (hdr->type == TOKTYPE_CCA_INTERNAL_PKA) {
u64 cur_mkvp = 0, old_mkvp = 0;
struct eccprivkeytoken *t = (struct eccprivkeytoken *)key;
if (t->secid == 0x20) {
if (flags & PKEY_FLAGS_MATCH_CUR_MKVP)
cur_mkvp = t->mkvp;
if (flags & PKEY_FLAGS_MATCH_ALT_MKVP)
old_mkvp = t->mkvp;
} else {
/* unknown cca internal 2 token type */
return -EINVAL;
}
rc = cca_findcard2(&_apqns, &_nr_apqns, 0xFFFF, 0xFFFF,
ZCRYPT_CEX7, APKA_MK_SET,
cur_mkvp, old_mkvp, 1);
if (rc)
goto out;
} else } else
return -EINVAL; return -EINVAL;
...@@ -907,7 +954,22 @@ static int pkey_apqns4keytype(enum pkey_key_type ktype, ...@@ -907,7 +954,22 @@ static int pkey_apqns4keytype(enum pkey_key_type ktype,
cur_mkvp, old_mkvp, 1); cur_mkvp, old_mkvp, 1);
if (rc) if (rc)
goto out; goto out;
} else if (ktype == PKEY_TYPE_EP11) { } else if (ktype == PKEY_TYPE_CCA_ECC) {
u64 cur_mkvp = 0, old_mkvp = 0;
if (flags & PKEY_FLAGS_MATCH_CUR_MKVP)
cur_mkvp = *((u64 *) cur_mkvp);
if (flags & PKEY_FLAGS_MATCH_ALT_MKVP)
old_mkvp = *((u64 *) alt_mkvp);
rc = cca_findcard2(&_apqns, &_nr_apqns, 0xFFFF, 0xFFFF,
ZCRYPT_CEX7, APKA_MK_SET,
cur_mkvp, old_mkvp, 1);
if (rc)
goto out;
} else if (ktype == PKEY_TYPE_EP11 ||
ktype == PKEY_TYPE_EP11_AES ||
ktype == PKEY_TYPE_EP11_ECC) {
u8 *wkvp = NULL; u8 *wkvp = NULL;
if (flags & PKEY_FLAGS_MATCH_CUR_MKVP) if (flags & PKEY_FLAGS_MATCH_CUR_MKVP)
...@@ -933,6 +995,111 @@ static int pkey_apqns4keytype(enum pkey_key_type ktype, ...@@ -933,6 +995,111 @@ static int pkey_apqns4keytype(enum pkey_key_type ktype,
return rc; return rc;
} }
static int pkey_keyblob2pkey3(const struct pkey_apqn *apqns, size_t nr_apqns,
const u8 *key, size_t keylen, u32 *protkeytype,
u8 *protkey, u32 *protkeylen)
{
int i, card, dom, rc;
struct keytoken_header *hdr = (struct keytoken_header *)key;
/* check for at least one apqn given */
if (!apqns || !nr_apqns)
return -EINVAL;
if (keylen < sizeof(struct keytoken_header))
return -EINVAL;
if (hdr->type == TOKTYPE_NON_CCA
&& hdr->version == TOKVER_EP11_AES_WITH_HEADER
&& is_ep11_keyblob(key + sizeof(struct ep11kblob_header))) {
/* EP11 AES key blob with header */
if (ep11_check_aes_key_with_hdr(debug_info, 3, key, keylen, 1))
return -EINVAL;
} else if (hdr->type == TOKTYPE_NON_CCA
&& hdr->version == TOKVER_EP11_ECC_WITH_HEADER
&& is_ep11_keyblob(key + sizeof(struct ep11kblob_header))) {
/* EP11 ECC key blob with header */
if (ep11_check_ecc_key_with_hdr(debug_info, 3, key, keylen, 1))
return -EINVAL;
} else if (hdr->type == TOKTYPE_NON_CCA
&& hdr->version == TOKVER_EP11_AES
&& is_ep11_keyblob(key)) {
/* EP11 AES key blob with header in session field */
if (ep11_check_aes_key(debug_info, 3, key, keylen, 1))
return -EINVAL;
} else if (hdr->type == TOKTYPE_CCA_INTERNAL) {
if (hdr->version == TOKVER_CCA_AES) {
/* CCA AES data key */
if (keylen != sizeof(struct secaeskeytoken))
return -EINVAL;
if (cca_check_secaeskeytoken(debug_info, 3, key, 0))
return -EINVAL;
} else if (hdr->version == TOKVER_CCA_VLSC) {
/* CCA AES cipher key */
if (keylen < hdr->len || keylen > MAXCCAVLSCTOKENSIZE)
return -EINVAL;
if (cca_check_secaescipherkey(debug_info, 3, key, 0, 1))
return -EINVAL;
} else {
DEBUG_ERR("%s unknown CCA internal token version %d\n",
__func__, hdr->version);
return -EINVAL;
}
} else if (hdr->type == TOKTYPE_CCA_INTERNAL_PKA) {
/* CCA ECC (private) key */
if (keylen < sizeof(struct eccprivkeytoken))
return -EINVAL;
if (cca_check_sececckeytoken(debug_info, 3, key, keylen, 1))
return -EINVAL;
} else if (hdr->type == TOKTYPE_NON_CCA) {
struct pkey_protkey pkey;
rc = pkey_nonccatok2pkey(key, keylen, &pkey);
if (rc)
return rc;
memcpy(protkey, pkey.protkey, pkey.len);
*protkeylen = pkey.len;
*protkeytype = pkey.type;
return 0;
} else {
DEBUG_ERR("%s unknown/unsupported blob type %d\n",
__func__, hdr->type);
return -EINVAL;
}
/* simple try all apqns from the list */
for (rc = -ENODEV, i = 0; rc && i < nr_apqns; i++) {
card = apqns[i].card;
dom = apqns[i].domain;
if (hdr->type == TOKTYPE_NON_CCA
&& (hdr->version == TOKVER_EP11_AES_WITH_HEADER
|| hdr->version == TOKVER_EP11_ECC_WITH_HEADER)
&& is_ep11_keyblob(key + sizeof(struct ep11kblob_header)))
rc = ep11_kblob2protkey(card, dom, key, hdr->len,
protkey, protkeylen, protkeytype);
else if (hdr->type == TOKTYPE_NON_CCA
&& hdr->version == TOKVER_EP11_AES
&& is_ep11_keyblob(key))
rc = ep11_kblob2protkey(card, dom, key, hdr->len,
protkey, protkeylen, protkeytype);
else if (hdr->type == TOKTYPE_CCA_INTERNAL &&
hdr->version == TOKVER_CCA_AES)
rc = cca_sec2protkey(card, dom, key, protkey,
protkeylen, protkeytype);
else if (hdr->type == TOKTYPE_CCA_INTERNAL &&
hdr->version == TOKVER_CCA_VLSC)
rc = cca_cipher2protkey(card, dom, key, protkey,
protkeylen, protkeytype);
else if (hdr->type == TOKTYPE_CCA_INTERNAL_PKA)
rc = cca_ecc2protkey(card, dom, key, protkey,
protkeylen, protkeytype);
else
return -EINVAL;
}
return rc;
}
/* /*
* File io functions * File io functions
*/ */
...@@ -1333,6 +1500,55 @@ static long pkey_unlocked_ioctl(struct file *filp, unsigned int cmd, ...@@ -1333,6 +1500,55 @@ static long pkey_unlocked_ioctl(struct file *filp, unsigned int cmd,
kfree(apqns); kfree(apqns);
break; break;
} }
case PKEY_KBLOB2PROTK3: {
struct pkey_kblob2pkey3 __user *utp = (void __user *) arg;
struct pkey_kblob2pkey3 ktp;
struct pkey_apqn *apqns = NULL;
u32 protkeylen = PROTKEYBLOBBUFSIZE;
u8 *kkey, *protkey;
if (copy_from_user(&ktp, utp, sizeof(ktp)))
return -EFAULT;
apqns = _copy_apqns_from_user(ktp.apqns, ktp.apqn_entries);
if (IS_ERR(apqns))
return PTR_ERR(apqns);
kkey = _copy_key_from_user(ktp.key, ktp.keylen);
if (IS_ERR(kkey)) {
kfree(apqns);
return PTR_ERR(kkey);
}
protkey = kmalloc(protkeylen, GFP_KERNEL);
if (!protkey) {
kfree(apqns);
kfree(kkey);
return -ENOMEM;
}
rc = pkey_keyblob2pkey3(apqns, ktp.apqn_entries, kkey,
ktp.keylen, &ktp.pkeytype,
protkey, &protkeylen);
DEBUG_DBG("%s pkey_keyblob2pkey3()=%d\n", __func__, rc);
kfree(apqns);
kfree(kkey);
if (rc) {
kfree(protkey);
break;
}
if (ktp.pkey && ktp.pkeylen) {
if (protkeylen > ktp.pkeylen) {
kfree(protkey);
return -EINVAL;
}
if (copy_to_user(ktp.pkey, protkey, protkeylen)) {
kfree(protkey);
return -EFAULT;
}
}
kfree(protkey);
ktp.pkeylen = protkeylen;
if (copy_to_user(utp, &ktp, sizeof(ktp)))
return -EFAULT;
break;
}
default: default:
/* unknown/unsupported ioctl cmd */ /* unknown/unsupported ioctl cmd */
return -ENOTTY; return -ENOTTY;
......
...@@ -172,6 +172,49 @@ int cca_check_secaescipherkey(debug_info_t *dbg, int dbflvl, ...@@ -172,6 +172,49 @@ int cca_check_secaescipherkey(debug_info_t *dbg, int dbflvl,
} }
EXPORT_SYMBOL(cca_check_secaescipherkey); EXPORT_SYMBOL(cca_check_secaescipherkey);
/*
* Simple check if the token is a valid CCA secure ECC private
* key token. Returns 0 on success or errno value on failure.
*/
int cca_check_sececckeytoken(debug_info_t *dbg, int dbflvl,
const u8 *token, size_t keysize,
int checkcpacfexport)
{
struct eccprivkeytoken *t = (struct eccprivkeytoken *) token;
#define DBF(...) debug_sprintf_event(dbg, dbflvl, ##__VA_ARGS__)
if (t->type != TOKTYPE_CCA_INTERNAL_PKA) {
if (dbg)
DBF("%s token check failed, type 0x%02x != 0x%02x\n",
__func__, (int) t->type, TOKTYPE_CCA_INTERNAL_PKA);
return -EINVAL;
}
if (t->len > keysize) {
if (dbg)
DBF("%s token check failed, len %d > keysize %zu\n",
__func__, (int) t->len, keysize);
return -EINVAL;
}
if (t->secid != 0x20) {
if (dbg)
DBF("%s token check failed, secid 0x%02x != 0x20\n",
__func__, (int) t->secid);
return -EINVAL;
}
if (checkcpacfexport && !(t->kutc & 0x01)) {
if (dbg)
DBF("%s token check failed, XPRTCPAC bit is 0\n",
__func__);
return -EINVAL;
}
#undef DBF
return 0;
}
EXPORT_SYMBOL(cca_check_sececckeytoken);
/* /*
* Allocate consecutive memory for request CPRB, request param * Allocate consecutive memory for request CPRB, request param
* block, reply CPRB and reply param block and fill in values * block, reply CPRB and reply param block and fill in values
...@@ -1297,6 +1340,156 @@ int cca_cipher2protkey(u16 cardnr, u16 domain, const u8 *ckey, ...@@ -1297,6 +1340,156 @@ int cca_cipher2protkey(u16 cardnr, u16 domain, const u8 *ckey,
} }
EXPORT_SYMBOL(cca_cipher2protkey); EXPORT_SYMBOL(cca_cipher2protkey);
/*
* Derive protected key from CCA ECC secure private key.
*/
int cca_ecc2protkey(u16 cardnr, u16 domain, const u8 *key,
u8 *protkey, u32 *protkeylen, u32 *protkeytype)
{
int rc;
u8 *mem, *ptr;
struct CPRBX *preqcblk, *prepcblk;
struct ica_xcRB xcrb;
struct aureqparm {
u8 subfunc_code[2];
u16 rule_array_len;
u8 rule_array[8];
struct {
u16 len;
u16 tk_blob_len;
u16 tk_blob_tag;
u8 tk_blob[66];
} vud;
struct {
u16 len;
u16 cca_key_token_len;
u16 cca_key_token_flags;
u8 cca_key_token[0];
} kb;
} __packed * preqparm;
struct aurepparm {
u8 subfunc_code[2];
u16 rule_array_len;
struct {
u16 len;
u16 sublen;
u16 tag;
struct cpacfkeyblock {
u8 version; /* version of this struct */
u8 flags[2];
u8 algo;
u8 form;
u8 pad1[3];
u16 keylen;
u8 key[0]; /* the key (keylen bytes) */
u16 keyattrlen;
u8 keyattr[32];
u8 pad2[1];
u8 vptype;
u8 vp[32]; /* verification pattern */
} ckb;
} vud;
struct {
u16 len;
} kb;
} __packed * prepparm;
int keylen = ((struct eccprivkeytoken *)key)->len;
/* get already prepared memory for 2 cprbs with param block each */
rc = alloc_and_prep_cprbmem(PARMBSIZE, &mem, &preqcblk, &prepcblk);
if (rc)
return rc;
/* fill request cprb struct */
preqcblk->domain = domain;
/* fill request cprb param block with AU request */
preqparm = (struct aureqparm __force *) preqcblk->req_parmb;
memcpy(preqparm->subfunc_code, "AU", 2);
preqparm->rule_array_len =
sizeof(preqparm->rule_array_len)
+ sizeof(preqparm->rule_array);
memcpy(preqparm->rule_array, "EXPT-SK ", 8);
/* vud, tk blob */
preqparm->vud.len = sizeof(preqparm->vud);
preqparm->vud.tk_blob_len = sizeof(preqparm->vud.tk_blob)
+ 2 * sizeof(uint16_t);
preqparm->vud.tk_blob_tag = 0x00C2;
/* kb, cca token */
preqparm->kb.len = keylen + 3 * sizeof(uint16_t);
preqparm->kb.cca_key_token_len = keylen + 2 * sizeof(uint16_t);
memcpy(preqparm->kb.cca_key_token, key, keylen);
/* now fill length of param block into cprb */
preqcblk->req_parml = sizeof(struct aureqparm) + keylen;
/* fill xcrb struct */
prep_xcrb(&xcrb, cardnr, preqcblk, prepcblk);
/* forward xcrb with request CPRB and reply CPRB to zcrypt dd */
rc = zcrypt_send_cprb(&xcrb);
if (rc) {
DEBUG_ERR(
"%s zcrypt_send_cprb (cardnr=%d domain=%d) failed, rc=%d\n",
__func__, (int) cardnr, (int) domain, rc);
goto out;
}
/* check response returncode and reasoncode */
if (prepcblk->ccp_rtcode != 0) {
DEBUG_ERR(
"%s unwrap secure key failure, card response %d/%d\n",
__func__,
(int) prepcblk->ccp_rtcode,
(int) prepcblk->ccp_rscode);
rc = -EIO;
goto out;
}
if (prepcblk->ccp_rscode != 0) {
DEBUG_WARN(
"%s unwrap secure key warning, card response %d/%d\n",
__func__,
(int) prepcblk->ccp_rtcode,
(int) prepcblk->ccp_rscode);
}
/* process response cprb param block */
ptr = ((u8 *) prepcblk) + sizeof(struct CPRBX);
prepcblk->rpl_parmb = (u8 __user *) ptr;
prepparm = (struct aurepparm *) ptr;
/* check the returned keyblock */
if (prepparm->vud.ckb.version != 0x02) {
DEBUG_ERR("%s reply param keyblock version mismatch 0x%02x != 0x02\n",
__func__, (int) prepparm->vud.ckb.version);
rc = -EIO;
goto out;
}
if (prepparm->vud.ckb.algo != 0x81) {
DEBUG_ERR(
"%s reply param keyblock algo mismatch 0x%02x != 0x81\n",
__func__, (int) prepparm->vud.ckb.algo);
rc = -EIO;
goto out;
}
/* copy the translated protected key */
if (prepparm->vud.ckb.keylen > *protkeylen) {
DEBUG_ERR("%s prot keylen mismatch %d > buffersize %u\n",
__func__, prepparm->vud.ckb.keylen, *protkeylen);
rc = -EIO;
goto out;
}
memcpy(protkey, prepparm->vud.ckb.key, prepparm->vud.ckb.keylen);
*protkeylen = prepparm->vud.ckb.keylen;
if (protkeytype)
*protkeytype = PKEY_KEYTYPE_ECC;
out:
free_cprbmem(mem, PARMBSIZE, 0);
return rc;
}
EXPORT_SYMBOL(cca_ecc2protkey);
/* /*
* query cryptographic facility from CCA adapter * query cryptographic facility from CCA adapter
*/ */
......
...@@ -14,8 +14,9 @@ ...@@ -14,8 +14,9 @@
#include <asm/pkey.h> #include <asm/pkey.h>
/* Key token types */ /* Key token types */
#define TOKTYPE_NON_CCA 0x00 /* Non-CCA key token */ #define TOKTYPE_NON_CCA 0x00 /* Non-CCA key token */
#define TOKTYPE_CCA_INTERNAL 0x01 /* CCA internal key token */ #define TOKTYPE_CCA_INTERNAL 0x01 /* CCA internal sym key token */
#define TOKTYPE_CCA_INTERNAL_PKA 0x1f /* CCA internal asym key token */
/* For TOKTYPE_NON_CCA: */ /* For TOKTYPE_NON_CCA: */
#define TOKVER_PROTECTED_KEY 0x01 /* Protected key token */ #define TOKVER_PROTECTED_KEY 0x01 /* Protected key token */
...@@ -93,6 +94,31 @@ struct cipherkeytoken { ...@@ -93,6 +94,31 @@ struct cipherkeytoken {
u8 vdata[]; /* variable part data follows */ u8 vdata[]; /* variable part data follows */
} __packed; } __packed;
/* inside view of an CCA secure ECC private key */
struct eccprivkeytoken {
u8 type; /* 0x1f for internal asym key token */
u8 version; /* should be 0x00 */
u16 len; /* total key token length in bytes */
u8 res1[4];
u8 secid; /* 0x20 for ECC priv key section marker */
u8 secver; /* section version */
u16 seclen; /* section length */
u8 wtype; /* wrapping method, 0x00 clear, 0x01 AES */
u8 htype; /* hash method, 0x02 for SHA-256 */
u8 res2[2];
u8 kutc; /* key usage and translation control */
u8 ctype; /* curve type */
u8 kfs; /* key format and security */
u8 ksrc; /* key source */
u16 pbitlen; /* length of prime p in bits */
u16 ibmadlen; /* IBM associated data length in bytes */
u64 mkvp; /* master key verification pattern */
u8 opk[48]; /* encrypted object protection key data */
u16 adatalen; /* associated data length in bytes */
u16 fseclen; /* formated section length in bytes */
u8 more_data[]; /* more data follows */
} __packed;
/* Some defines for the CCA AES cipherkeytoken kmf1 field */ /* Some defines for the CCA AES cipherkeytoken kmf1 field */
#define KMF1_XPRT_SYM 0x8000 #define KMF1_XPRT_SYM 0x8000
#define KMF1_XPRT_UASY 0x4000 #define KMF1_XPRT_UASY 0x4000
...@@ -122,6 +148,14 @@ int cca_check_secaescipherkey(debug_info_t *dbg, int dbflvl, ...@@ -122,6 +148,14 @@ int cca_check_secaescipherkey(debug_info_t *dbg, int dbflvl,
const u8 *token, int keybitsize, const u8 *token, int keybitsize,
int checkcpacfexport); int checkcpacfexport);
/*
* Simple check if the token is a valid CCA secure ECC private
* key token. Returns 0 on success or errno value on failure.
*/
int cca_check_sececckeytoken(debug_info_t *dbg, int dbflvl,
const u8 *token, size_t keysize,
int checkcpacfexport);
/* /*
* Generate (random) CCA AES DATA secure key. * Generate (random) CCA AES DATA secure key.
*/ */
...@@ -158,6 +192,12 @@ int cca_cipher2protkey(u16 cardnr, u16 domain, const u8 *ckey, ...@@ -158,6 +192,12 @@ int cca_cipher2protkey(u16 cardnr, u16 domain, const u8 *ckey,
int cca_clr2cipherkey(u16 cardnr, u16 domain, u32 keybitsize, u32 keygenflags, int cca_clr2cipherkey(u16 cardnr, u16 domain, u32 keybitsize, u32 keygenflags,
const u8 *clrkey, u8 *keybuf, size_t *keybufsize); const u8 *clrkey, u8 *keybuf, size_t *keybufsize);
/*
* Derive proteced key from CCA ECC secure private key.
*/
int cca_ecc2protkey(u16 cardnr, u16 domain, const u8 *key,
u8 *protkey, u32 *protkeylen, u32 *protkeytype);
/* /*
* Query cryptographic facility from CCA adapter * Query cryptographic facility from CCA adapter
*/ */
......
...@@ -15,6 +15,7 @@ ...@@ -15,6 +15,7 @@
#include <linux/random.h> #include <linux/random.h>
#include <asm/zcrypt.h> #include <asm/zcrypt.h>
#include <asm/pkey.h> #include <asm/pkey.h>
#include <crypto/aes.h>
#include "ap_bus.h" #include "ap_bus.h"
#include "zcrypt_api.h" #include "zcrypt_api.h"
...@@ -113,16 +114,156 @@ static void __exit card_cache_free(void) ...@@ -113,16 +114,156 @@ static void __exit card_cache_free(void)
} }
/* /*
* Simple check if the key blob is a valid EP11 secure AES key. * Simple check if the key blob is a valid EP11 AES key blob with header.
*/ */
int ep11_check_aeskeyblob(debug_info_t *dbg, int dbflvl, int ep11_check_aes_key_with_hdr(debug_info_t *dbg, int dbflvl,
const u8 *key, int keybitsize, const u8 *key, size_t keylen, int checkcpacfexp)
int checkcpacfexport) {
struct ep11kblob_header *hdr = (struct ep11kblob_header *) key;
struct ep11keyblob *kb = (struct ep11keyblob *) (key + sizeof(*hdr));
#define DBF(...) debug_sprintf_event(dbg, dbflvl, ##__VA_ARGS__)
if (keylen < sizeof(*hdr) + sizeof(*kb)) {
DBF("%s key check failed, keylen %zu < %zu\n",
__func__, keylen, sizeof(*hdr) + sizeof(*kb));
return -EINVAL;
}
if (hdr->type != TOKTYPE_NON_CCA) {
if (dbg)
DBF("%s key check failed, type 0x%02x != 0x%02x\n",
__func__, (int) hdr->type, TOKTYPE_NON_CCA);
return -EINVAL;
}
if (hdr->hver != 0x00) {
if (dbg)
DBF("%s key check failed, header version 0x%02x != 0x00\n",
__func__, (int) hdr->hver);
return -EINVAL;
}
if (hdr->version != TOKVER_EP11_AES_WITH_HEADER) {
if (dbg)
DBF("%s key check failed, version 0x%02x != 0x%02x\n",
__func__, (int) hdr->version, TOKVER_EP11_AES_WITH_HEADER);
return -EINVAL;
}
if (hdr->len > keylen) {
if (dbg)
DBF("%s key check failed, header len %d keylen %zu mismatch\n",
__func__, (int) hdr->len, keylen);
return -EINVAL;
}
if (hdr->len < sizeof(*hdr) + sizeof(*kb)) {
if (dbg)
DBF("%s key check failed, header len %d < %zu\n",
__func__, (int) hdr->len, sizeof(*hdr) + sizeof(*kb));
return -EINVAL;
}
if (kb->version != EP11_STRUCT_MAGIC) {
if (dbg)
DBF("%s key check failed, blob magic 0x%04x != 0x%04x\n",
__func__, (int) kb->version, EP11_STRUCT_MAGIC);
return -EINVAL;
}
if (checkcpacfexp && !(kb->attr & EP11_BLOB_PKEY_EXTRACTABLE)) {
if (dbg)
DBF("%s key check failed, PKEY_EXTRACTABLE is off\n",
__func__);
return -EINVAL;
}
#undef DBF
return 0;
}
EXPORT_SYMBOL(ep11_check_aes_key_with_hdr);
/*
* Simple check if the key blob is a valid EP11 ECC key blob with header.
*/
int ep11_check_ecc_key_with_hdr(debug_info_t *dbg, int dbflvl,
const u8 *key, size_t keylen, int checkcpacfexp)
{
struct ep11kblob_header *hdr = (struct ep11kblob_header *) key;
struct ep11keyblob *kb = (struct ep11keyblob *) (key + sizeof(*hdr));
#define DBF(...) debug_sprintf_event(dbg, dbflvl, ##__VA_ARGS__)
if (keylen < sizeof(*hdr) + sizeof(*kb)) {
DBF("%s key check failed, keylen %zu < %zu\n",
__func__, keylen, sizeof(*hdr) + sizeof(*kb));
return -EINVAL;
}
if (hdr->type != TOKTYPE_NON_CCA) {
if (dbg)
DBF("%s key check failed, type 0x%02x != 0x%02x\n",
__func__, (int) hdr->type, TOKTYPE_NON_CCA);
return -EINVAL;
}
if (hdr->hver != 0x00) {
if (dbg)
DBF("%s key check failed, header version 0x%02x != 0x00\n",
__func__, (int) hdr->hver);
return -EINVAL;
}
if (hdr->version != TOKVER_EP11_ECC_WITH_HEADER) {
if (dbg)
DBF("%s key check failed, version 0x%02x != 0x%02x\n",
__func__, (int) hdr->version, TOKVER_EP11_ECC_WITH_HEADER);
return -EINVAL;
}
if (hdr->len > keylen) {
if (dbg)
DBF("%s key check failed, header len %d keylen %zu mismatch\n",
__func__, (int) hdr->len, keylen);
return -EINVAL;
}
if (hdr->len < sizeof(*hdr) + sizeof(*kb)) {
if (dbg)
DBF("%s key check failed, header len %d < %zu\n",
__func__, (int) hdr->len, sizeof(*hdr) + sizeof(*kb));
return -EINVAL;
}
if (kb->version != EP11_STRUCT_MAGIC) {
if (dbg)
DBF("%s key check failed, blob magic 0x%04x != 0x%04x\n",
__func__, (int) kb->version, EP11_STRUCT_MAGIC);
return -EINVAL;
}
if (checkcpacfexp && !(kb->attr & EP11_BLOB_PKEY_EXTRACTABLE)) {
if (dbg)
DBF("%s key check failed, PKEY_EXTRACTABLE is off\n",
__func__);
return -EINVAL;
}
#undef DBF
return 0;
}
EXPORT_SYMBOL(ep11_check_ecc_key_with_hdr);
/*
* Simple check if the key blob is a valid EP11 AES key blob with
* the header in the session field (old style EP11 AES key).
*/
int ep11_check_aes_key(debug_info_t *dbg, int dbflvl,
const u8 *key, size_t keylen, int checkcpacfexp)
{ {
struct ep11keyblob *kb = (struct ep11keyblob *) key; struct ep11keyblob *kb = (struct ep11keyblob *) key;
#define DBF(...) debug_sprintf_event(dbg, dbflvl, ##__VA_ARGS__) #define DBF(...) debug_sprintf_event(dbg, dbflvl, ##__VA_ARGS__)
if (keylen < sizeof(*kb)) {
DBF("%s key check failed, keylen %zu < %zu\n",
__func__, keylen, sizeof(*kb));
return -EINVAL;
}
if (kb->head.type != TOKTYPE_NON_CCA) { if (kb->head.type != TOKTYPE_NON_CCA) {
if (dbg) if (dbg)
DBF("%s key check failed, type 0x%02x != 0x%02x\n", DBF("%s key check failed, type 0x%02x != 0x%02x\n",
...@@ -135,39 +276,37 @@ int ep11_check_aeskeyblob(debug_info_t *dbg, int dbflvl, ...@@ -135,39 +276,37 @@ int ep11_check_aeskeyblob(debug_info_t *dbg, int dbflvl,
__func__, (int) kb->head.version, TOKVER_EP11_AES); __func__, (int) kb->head.version, TOKVER_EP11_AES);
return -EINVAL; return -EINVAL;
} }
if (kb->version != EP11_STRUCT_MAGIC) { if (kb->head.len > keylen) {
if (dbg) if (dbg)
DBF("%s key check failed, magic 0x%04x != 0x%04x\n", DBF("%s key check failed, header len %d keylen %zu mismatch\n",
__func__, (int) kb->version, EP11_STRUCT_MAGIC); __func__, (int) kb->head.len, keylen);
return -EINVAL; return -EINVAL;
} }
switch (kb->head.keybitlen) { if (kb->head.len < sizeof(*kb)) {
case 128:
case 192:
case 256:
break;
default:
if (dbg) if (dbg)
DBF("%s key check failed, keybitlen %d invalid\n", DBF("%s key check failed, header len %d < %zu\n",
__func__, (int) kb->head.keybitlen); __func__, (int) kb->head.len, sizeof(*kb));
return -EINVAL; return -EINVAL;
} }
if (keybitsize > 0 && keybitsize != (int) kb->head.keybitlen) {
DBF("%s key check failed, keybitsize %d\n", if (kb->version != EP11_STRUCT_MAGIC) {
__func__, keybitsize); if (dbg)
DBF("%s key check failed, blob magic 0x%04x != 0x%04x\n",
__func__, (int) kb->version, EP11_STRUCT_MAGIC);
return -EINVAL; return -EINVAL;
} }
if (checkcpacfexport && !(kb->attr & EP11_BLOB_PKEY_EXTRACTABLE)) { if (checkcpacfexp && !(kb->attr & EP11_BLOB_PKEY_EXTRACTABLE)) {
if (dbg) if (dbg)
DBF("%s key check failed, PKEY_EXTRACTABLE is 0\n", DBF("%s key check failed, PKEY_EXTRACTABLE is off\n",
__func__); __func__);
return -EINVAL; return -EINVAL;
} }
#undef DBF #undef DBF
return 0; return 0;
} }
EXPORT_SYMBOL(ep11_check_aeskeyblob); EXPORT_SYMBOL(ep11_check_aes_key);
/* /*
* Allocate and prepare ep11 cprb plus additional payload. * Allocate and prepare ep11 cprb plus additional payload.
...@@ -954,7 +1093,7 @@ static int ep11_wrapkey(u16 card, u16 domain, ...@@ -954,7 +1093,7 @@ static int ep11_wrapkey(u16 card, u16 domain,
u8 data_tag; u8 data_tag;
u8 data_lenfmt; u8 data_lenfmt;
u16 data_len; u16 data_len;
u8 data[512]; u8 data[1024];
} __packed * rep_pl; } __packed * rep_pl;
struct ep11_cprb *req = NULL, *rep = NULL; struct ep11_cprb *req = NULL, *rep = NULL;
struct ep11_target_dev target; struct ep11_target_dev target;
...@@ -962,8 +1101,17 @@ static int ep11_wrapkey(u16 card, u16 domain, ...@@ -962,8 +1101,17 @@ static int ep11_wrapkey(u16 card, u16 domain,
struct ep11keyblob *kb; struct ep11keyblob *kb;
size_t req_pl_size; size_t req_pl_size;
int api, rc = -ENOMEM; int api, rc = -ENOMEM;
bool has_header = false;
u8 *p; u8 *p;
/* maybe the session field holds a header with key info */
kb = (struct ep11keyblob *) key;
if (kb->head.type == TOKTYPE_NON_CCA &&
kb->head.version == TOKVER_EP11_AES) {
has_header = true;
keysize = kb->head.len < keysize ? kb->head.len : keysize;
}
/* request cprb and payload */ /* request cprb and payload */
req_pl_size = sizeof(struct wk_req_pl) + (iv ? 16 : 0) req_pl_size = sizeof(struct wk_req_pl) + (iv ? 16 : 0)
+ ASN1TAGLEN(keysize) + 4; + ASN1TAGLEN(keysize) + 4;
...@@ -989,9 +1137,10 @@ static int ep11_wrapkey(u16 card, u16 domain, ...@@ -989,9 +1137,10 @@ static int ep11_wrapkey(u16 card, u16 domain,
/* key blob */ /* key blob */
p += asn1tag_write(p, 0x04, key, keysize); p += asn1tag_write(p, 0x04, key, keysize);
/* maybe the key argument needs the head data cleaned out */ /* maybe the key argument needs the head data cleaned out */
kb = (struct ep11keyblob *)(p - keysize); if (has_header) {
if (kb->head.version == TOKVER_EP11_AES) kb = (struct ep11keyblob *)(p - keysize);
memset(&kb->head, 0, sizeof(kb->head)); memset(&kb->head, 0, sizeof(kb->head));
}
/* empty kek tag */ /* empty kek tag */
*p++ = 0x04; *p++ = 0x04;
*p++ = 0; *p++ = 0;
...@@ -1114,12 +1263,12 @@ int ep11_clr2keyblob(u16 card, u16 domain, u32 keybitsize, u32 keygenflags, ...@@ -1114,12 +1263,12 @@ int ep11_clr2keyblob(u16 card, u16 domain, u32 keybitsize, u32 keygenflags,
} }
EXPORT_SYMBOL(ep11_clr2keyblob); EXPORT_SYMBOL(ep11_clr2keyblob);
int ep11_key2protkey(u16 card, u16 dom, const u8 *key, size_t keylen, int ep11_kblob2protkey(u16 card, u16 dom, const u8 *keyblob, size_t keybloblen,
u8 *protkey, u32 *protkeylen, u32 *protkeytype) u8 *protkey, u32 *protkeylen, u32 *protkeytype)
{ {
int rc = -EIO; int rc = -EIO;
u8 *wkbuf = NULL; u8 *wkbuf = NULL;
size_t wkbuflen = 256; size_t wkbuflen, keylen;
struct wk_info { struct wk_info {
u16 version; u16 version;
u8 res1[16]; u8 res1[16];
...@@ -1129,8 +1278,33 @@ int ep11_key2protkey(u16 card, u16 dom, const u8 *key, size_t keylen, ...@@ -1129,8 +1278,33 @@ int ep11_key2protkey(u16 card, u16 dom, const u8 *key, size_t keylen,
u8 res2[8]; u8 res2[8];
u8 pkey[0]; u8 pkey[0];
} __packed * wki; } __packed * wki;
const u8 *key;
struct ep11kblob_header *hdr;
/* key with or without header ? */
hdr = (struct ep11kblob_header *) keyblob;
if (hdr->type == TOKTYPE_NON_CCA
&& (hdr->version == TOKVER_EP11_AES_WITH_HEADER
|| hdr->version == TOKVER_EP11_ECC_WITH_HEADER)
&& is_ep11_keyblob(keyblob + sizeof(struct ep11kblob_header))) {
/* EP11 AES or ECC key with header */
key = keyblob + sizeof(struct ep11kblob_header);
keylen = hdr->len - sizeof(struct ep11kblob_header);
} else if (hdr->type == TOKTYPE_NON_CCA
&& hdr->version == TOKVER_EP11_AES
&& is_ep11_keyblob(keyblob)) {
/* EP11 AES key (old style) */
key = keyblob;
keylen = hdr->len;
} else if (is_ep11_keyblob(keyblob)) {
/* raw EP11 key blob */
key = keyblob;
keylen = keybloblen;
} else
return -EINVAL;
/* alloc temp working buffer */ /* alloc temp working buffer */
wkbuflen = (keylen + AES_BLOCK_SIZE) & (~(AES_BLOCK_SIZE - 1));
wkbuf = kmalloc(wkbuflen, GFP_ATOMIC); wkbuf = kmalloc(wkbuflen, GFP_ATOMIC);
if (!wkbuf) if (!wkbuf)
return -ENOMEM; return -ENOMEM;
...@@ -1147,46 +1321,68 @@ int ep11_key2protkey(u16 card, u16 dom, const u8 *key, size_t keylen, ...@@ -1147,46 +1321,68 @@ int ep11_key2protkey(u16 card, u16 dom, const u8 *key, size_t keylen,
wki = (struct wk_info *) wkbuf; wki = (struct wk_info *) wkbuf;
/* check struct version and pkey type */ /* check struct version and pkey type */
if (wki->version != 1 || wki->pkeytype != 1) { if (wki->version != 1 || wki->pkeytype < 1 || wki->pkeytype > 5) {
DEBUG_ERR("%s wk info version %d or pkeytype %d mismatch.\n", DEBUG_ERR("%s wk info version %d or pkeytype %d mismatch.\n",
__func__, (int) wki->version, (int) wki->pkeytype); __func__, (int) wki->version, (int) wki->pkeytype);
rc = -EIO; rc = -EIO;
goto out; goto out;
} }
/* copy the tanslated protected key */ /* check protected key type field */
switch (wki->pkeysize) { switch (wki->pkeytype) {
case 16+32: case 1: /* AES */
/* AES 128 protected key */ switch (wki->pkeysize) {
if (protkeytype) case 16+32:
*protkeytype = PKEY_KEYTYPE_AES_128; /* AES 128 protected key */
break; if (protkeytype)
case 24+32: *protkeytype = PKEY_KEYTYPE_AES_128;
/* AES 192 protected key */ break;
if (protkeytype) case 24+32:
*protkeytype = PKEY_KEYTYPE_AES_192; /* AES 192 protected key */
if (protkeytype)
*protkeytype = PKEY_KEYTYPE_AES_192;
break;
case 32+32:
/* AES 256 protected key */
if (protkeytype)
*protkeytype = PKEY_KEYTYPE_AES_256;
break;
default:
DEBUG_ERR("%s unknown/unsupported AES pkeysize %d\n",
__func__, (int) wki->pkeysize);
rc = -EIO;
goto out;
}
break; break;
case 32+32: case 3: /* EC-P */
/* AES 256 protected key */ case 4: /* EC-ED */
case 5: /* EC-BP */
if (protkeytype) if (protkeytype)
*protkeytype = PKEY_KEYTYPE_AES_256; *protkeytype = PKEY_KEYTYPE_ECC;
break; break;
case 2: /* TDES */
default: default:
DEBUG_ERR("%s unknown/unsupported pkeysize %d\n", DEBUG_ERR("%s unknown/unsupported key type %d\n",
__func__, (int) wki->pkeysize); __func__, (int) wki->pkeytype);
rc = -EIO; rc = -EIO;
goto out; goto out;
} }
/* copy the tanslated protected key */
if (wki->pkeysize > *protkeylen) {
DEBUG_ERR("%s wk info pkeysize %llu > protkeysize %u\n",
__func__, wki->pkeysize, *protkeylen);
rc = -EINVAL;
goto out;
}
memcpy(protkey, wki->pkey, wki->pkeysize); memcpy(protkey, wki->pkey, wki->pkeysize);
if (protkeylen) *protkeylen = wki->pkeysize;
*protkeylen = (u32) wki->pkeysize;
rc = 0;
out: out:
kfree(wkbuf); kfree(wkbuf);
return rc; return rc;
} }
EXPORT_SYMBOL(ep11_key2protkey); EXPORT_SYMBOL(ep11_kblob2protkey);
int ep11_findcard2(u32 **apqns, u32 *nr_apqns, u16 cardnr, u16 domain, int ep11_findcard2(u32 **apqns, u32 *nr_apqns, u16 cardnr, u16 domain,
int minhwtype, int minapi, const u8 *wkvp) int minhwtype, int minapi, const u8 *wkvp)
......
...@@ -12,22 +12,28 @@ ...@@ -12,22 +12,28 @@
#include <asm/zcrypt.h> #include <asm/zcrypt.h>
#include <asm/pkey.h> #include <asm/pkey.h>
#define TOKVER_EP11_AES 0x03 /* EP11 AES key blob */
#define EP11_API_V 4 /* highest known and supported EP11 API version */ #define EP11_API_V 4 /* highest known and supported EP11 API version */
#define EP11_STRUCT_MAGIC 0x1234 #define EP11_STRUCT_MAGIC 0x1234
#define EP11_BLOB_PKEY_EXTRACTABLE 0x200000 #define EP11_BLOB_PKEY_EXTRACTABLE 0x00200000
/*
* Internal used values for the version field of the key header.
* Should match to the enum pkey_key_type in pkey.h.
*/
#define TOKVER_EP11_AES 0x03 /* EP11 AES key blob (old style) */
#define TOKVER_EP11_AES_WITH_HEADER 0x06 /* EP11 AES key blob with header */
#define TOKVER_EP11_ECC_WITH_HEADER 0x07 /* EP11 ECC key blob with header */
/* inside view of an EP11 secure key blob */ /* inside view of an EP11 secure key blob */
struct ep11keyblob { struct ep11keyblob {
union { union {
u8 session[32]; u8 session[32];
/* only used for PKEY_TYPE_EP11: */
struct { struct {
u8 type; /* 0x00 (TOKTYPE_NON_CCA) */ u8 type; /* 0x00 (TOKTYPE_NON_CCA) */
u8 res0; /* unused */ u8 res0; /* unused */
u16 len; /* total length in bytes of this blob */ u16 len; /* total length in bytes of this blob */
u8 version; /* 0x06 (TOKVER_EP11_AES) */ u8 version; /* 0x03 (TOKVER_EP11_AES) */
u8 res1; /* unused */ u8 res1; /* unused */
u16 keybitlen; /* clear key bit len, 0 for unknown */ u16 keybitlen; /* clear key bit len, 0 for unknown */
} head; } head;
...@@ -41,16 +47,41 @@ struct ep11keyblob { ...@@ -41,16 +47,41 @@ struct ep11keyblob {
u8 mac[32]; u8 mac[32];
} __packed; } __packed;
/* check ep11 key magic to find out if this is an ep11 key blob */
static inline bool is_ep11_keyblob(const u8 *key)
{
struct ep11keyblob *kb = (struct ep11keyblob *) key;
return (kb->version == EP11_STRUCT_MAGIC);
}
/*
* Simple check if the key blob is a valid EP11 AES key blob with header.
* If checkcpacfexport is enabled, the key is also checked for the
* attributes needed to export this key for CPACF use.
* Returns 0 on success or errno value on failure.
*/
int ep11_check_aes_key_with_hdr(debug_info_t *dbg, int dbflvl,
const u8 *key, size_t keylen, int checkcpacfexp);
/* /*
* Simple check if the key blob is a valid EP11 secure AES key. * Simple check if the key blob is a valid EP11 ECC key blob with header.
* If keybitsize is given, the bitsize of the key is also checked.
* If checkcpacfexport is enabled, the key is also checked for the * If checkcpacfexport is enabled, the key is also checked for the
* attributes needed to export this key for CPACF use. * attributes needed to export this key for CPACF use.
* Returns 0 on success or errno value on failure. * Returns 0 on success or errno value on failure.
*/ */
int ep11_check_aeskeyblob(debug_info_t *dbg, int dbflvl, int ep11_check_ecc_key_with_hdr(debug_info_t *dbg, int dbflvl,
const u8 *key, int keybitsize, const u8 *key, size_t keylen, int checkcpacfexp);
int checkcpacfexport);
/*
* Simple check if the key blob is a valid EP11 AES key blob with
* the header in the session field (old style EP11 AES key).
* If checkcpacfexport is enabled, the key is also checked for the
* attributes needed to export this key for CPACF use.
* Returns 0 on success or errno value on failure.
*/
int ep11_check_aes_key(debug_info_t *dbg, int dbflvl,
const u8 *key, size_t keylen, int checkcpacfexp);
/* EP11 card info struct */ /* EP11 card info struct */
struct ep11_card_info { struct ep11_card_info {
...@@ -91,12 +122,6 @@ int ep11_genaeskey(u16 card, u16 domain, u32 keybitsize, u32 keygenflags, ...@@ -91,12 +122,6 @@ int ep11_genaeskey(u16 card, u16 domain, u32 keybitsize, u32 keygenflags,
int ep11_clr2keyblob(u16 cardnr, u16 domain, u32 keybitsize, u32 keygenflags, int ep11_clr2keyblob(u16 cardnr, u16 domain, u32 keybitsize, u32 keygenflags,
const u8 *clrkey, u8 *keybuf, size_t *keybufsize); const u8 *clrkey, u8 *keybuf, size_t *keybufsize);
/*
* Derive proteced key from EP11 AES secure key blob.
*/
int ep11_key2protkey(u16 cardnr, u16 domain, const u8 *key, size_t keylen,
u8 *protkey, u32 *protkeylen, u32 *protkeytype);
/* /*
* Build a list of ep11 apqns meeting the following constrains: * Build a list of ep11 apqns meeting the following constrains:
* - apqn is online and is in fact an EP11 apqn * - apqn is online and is in fact an EP11 apqn
...@@ -119,6 +144,12 @@ int ep11_key2protkey(u16 cardnr, u16 domain, const u8 *key, size_t keylen, ...@@ -119,6 +144,12 @@ int ep11_key2protkey(u16 cardnr, u16 domain, const u8 *key, size_t keylen,
int ep11_findcard2(u32 **apqns, u32 *nr_apqns, u16 cardnr, u16 domain, int ep11_findcard2(u32 **apqns, u32 *nr_apqns, u16 cardnr, u16 domain,
int minhwtype, int minapi, const u8 *wkvp); int minhwtype, int minapi, const u8 *wkvp);
/*
* Derive proteced key from EP11 key blob (AES and ECC keys).
*/
int ep11_kblob2protkey(u16 card, u16 dom, const u8 *key, size_t keylen,
u8 *protkey, u32 *protkeylen, u32 *protkeytype);
void zcrypt_ep11misc_exit(void); void zcrypt_ep11misc_exit(void);
#endif /* _ZCRYPT_EP11MISC_H_ */ #endif /* _ZCRYPT_EP11MISC_H_ */
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment