Ejemplo n.º 1
0
/*
 * This is the main function responsible for cryptography (ie. communication
 * with crypto(9) subsystem).
 *
 * BIO_READ:
 *	g_eli_start -> g_eli_crypto_read -> g_io_request -> g_eli_read_done -> G_ELI_CRYPTO_RUN -> g_eli_crypto_read_done -> g_io_deliver
 * BIO_WRITE:
 *	g_eli_start -> G_ELI_CRYPTO_RUN -> g_eli_crypto_write_done -> g_io_request -> g_eli_write_done -> g_io_deliver
 */
void
g_eli_crypto_run(struct g_eli_worker *wr, struct bio *bp)
{
	struct g_eli_softc *sc;
	struct cryptop *crp;
	struct cryptodesc *crd;
	u_int i, nsec, secsize;
	int err, error;
	off_t dstoff;
	size_t size;
	u_char *p, *data;

	G_ELI_LOGREQ(3, bp, "%s", __func__);

	bp->bio_pflags = wr->w_number;
	sc = wr->w_softc;
	secsize = LIST_FIRST(&sc->sc_geom->provider)->sectorsize;
	nsec = bp->bio_length / secsize;

	/*
	 * Calculate how much memory do we need.
	 * We need separate crypto operation for every single sector.
	 * It is much faster to calculate total amount of needed memory here and
	 * do the allocation once instead of allocating memory in pieces (many,
	 * many pieces).
	 */
	size = sizeof(*crp) * nsec;
	size += sizeof(*crd) * nsec;
	/*
	 * If we write the data we cannot destroy current bio_data content,
	 * so we need to allocate more memory for encrypted data.
	 */
	if (bp->bio_cmd == BIO_WRITE)
		size += bp->bio_length;
	p = malloc(size, M_ELI, M_WAITOK);

	bp->bio_inbed = 0;
	bp->bio_children = nsec;
	bp->bio_driver2 = p;

	if (bp->bio_cmd == BIO_READ)
		data = bp->bio_data;
	else {
		data = p;
		p += bp->bio_length;
		bcopy(bp->bio_data, data, bp->bio_length);
	}

	error = 0;
	for (i = 0, dstoff = bp->bio_offset; i < nsec; i++, dstoff += secsize) {
		crp = (struct cryptop *)p;	p += sizeof(*crp);
		crd = (struct cryptodesc *)p;	p += sizeof(*crd);

		crp->crp_sid = wr->w_sid;
		crp->crp_ilen = secsize;
		crp->crp_olen = secsize;
		crp->crp_opaque = (void *)bp;
		crp->crp_buf = (void *)data;
		data += secsize;
		if (bp->bio_cmd == BIO_WRITE)
			crp->crp_callback = g_eli_crypto_write_done;
		else /* if (bp->bio_cmd == BIO_READ) */
			crp->crp_callback = g_eli_crypto_read_done;
		crp->crp_flags = CRYPTO_F_CBIFSYNC;
		if (g_eli_batch)
			crp->crp_flags |= CRYPTO_F_BATCH;
		crp->crp_desc = crd;

		crd->crd_skip = 0;
		crd->crd_len = secsize;
		crd->crd_flags = CRD_F_IV_EXPLICIT | CRD_F_IV_PRESENT;
		if ((sc->sc_flags & G_ELI_FLAG_SINGLE_KEY) == 0)
			crd->crd_flags |= CRD_F_KEY_EXPLICIT;
		if (bp->bio_cmd == BIO_WRITE)
			crd->crd_flags |= CRD_F_ENCRYPT;
		crd->crd_alg = sc->sc_ealgo;
		crd->crd_key = g_eli_key_hold(sc, dstoff, secsize);
		crd->crd_klen = sc->sc_ekeylen;
		if (sc->sc_ealgo == CRYPTO_AES_XTS)
			crd->crd_klen <<= 1;
		g_eli_crypto_ivgen(sc, dstoff, crd->crd_iv,
		    sizeof(crd->crd_iv));
		crd->crd_next = NULL;

		crp->crp_etype = 0;
		err = crypto_dispatch(crp);
		if (error == 0)
			error = err;
	}
	if (bp->bio_error == 0)
		bp->bio_error = error;
}
Ejemplo n.º 2
0
/*
 * This is the main function responsible for cryptography (ie. communication
 * with crypto(9) subsystem).
 *
 * BIO_READ:
 *	g_eli_start -> g_eli_auth_read -> g_io_request -> g_eli_read_done -> G_ELI_AUTH_RUN -> g_eli_auth_read_done -> g_io_deliver
 * BIO_WRITE:
 *	g_eli_start -> G_ELI_AUTH_RUN -> g_eli_auth_write_done -> g_io_request -> g_eli_write_done -> g_io_deliver
 */
void
g_eli_auth_run(struct g_eli_worker *wr, struct bio *bp)
{
	struct g_eli_softc *sc;
	struct cryptop *crp;
	struct cryptodesc *crde, *crda;
	struct uio *uio;
	struct iovec *iov;
	u_int i, lsec, nsec, data_secsize, decr_secsize, encr_secsize;
	off_t dstoff;
	int err, error;
	u_char *p, *data, *auth, *authkey, *plaindata;

	G_ELI_LOGREQ(3, bp, "%s", __func__);

	bp->bio_pflags = wr->w_number;
	sc = wr->w_softc;
	/* Sectorsize of decrypted provider eg. 4096. */
	decr_secsize = bp->bio_to->sectorsize;
	/* The real sectorsize of encrypted provider, eg. 512. */
	encr_secsize = LIST_FIRST(&sc->sc_geom->consumer)->provider->sectorsize;
	/* Number of data bytes in one encrypted sector, eg. 480. */
	data_secsize = sc->sc_data_per_sector;
	/* Number of sectors from decrypted provider, eg. 2. */
	nsec = bp->bio_length / decr_secsize;
	/* Number of sectors from encrypted provider, eg. 18. */
	nsec = (nsec * sc->sc_bytes_per_sector) / encr_secsize;
	/* Last sector number in every big sector, eg. 9. */
	lsec = sc->sc_bytes_per_sector / encr_secsize;
	/* Destination offset, used for IV generation. */
	dstoff = (bp->bio_offset / bp->bio_to->sectorsize) * sc->sc_bytes_per_sector;

	auth = NULL;	/* Silence compiler warning. */
	plaindata = bp->bio_data;
	if (bp->bio_cmd == BIO_READ) {
		data = bp->bio_driver2;
		auth = data + encr_secsize * nsec;
		p = auth + sc->sc_alen * nsec;
	} else {
		size_t size;

		size = encr_secsize * nsec;
		size += sizeof(*crp) * nsec;
		size += sizeof(*crde) * nsec;
		size += sizeof(*crda) * nsec;
		size += G_ELI_AUTH_SECKEYLEN * nsec;
		size += sizeof(*uio) * nsec;
		size += sizeof(*iov) * nsec;
		data = malloc(size, M_ELI, M_WAITOK);
		bp->bio_driver2 = data;
		p = data + encr_secsize * nsec;
	}
	bp->bio_inbed = 0;
	bp->bio_children = nsec;

	error = 0;
	for (i = 1; i <= nsec; i++, dstoff += encr_secsize) {
		crp = (struct cryptop *)p;	p += sizeof(*crp);
		crde = (struct cryptodesc *)p;	p += sizeof(*crde);
		crda = (struct cryptodesc *)p;	p += sizeof(*crda);
		authkey = (u_char *)p;		p += G_ELI_AUTH_SECKEYLEN;
		uio = (struct uio *)p;		p += sizeof(*uio);
		iov = (struct iovec *)p;	p += sizeof(*iov);

		data_secsize = sc->sc_data_per_sector;
		if ((i % lsec) == 0)
			data_secsize = decr_secsize % data_secsize;

		if (bp->bio_cmd == BIO_READ) {
			/* Remember read HMAC. */
			bcopy(data, auth, sc->sc_alen);
			auth += sc->sc_alen;
			/* TODO: bzero(9) can be commented out later. */
			bzero(data, sc->sc_alen);
		} else {
			bcopy(plaindata, data + sc->sc_alen, data_secsize);
			plaindata += data_secsize;
		}

		iov->iov_len = sc->sc_alen + data_secsize;
		iov->iov_base = data;
		data += encr_secsize;

		uio->uio_iov = iov;
		uio->uio_iovcnt = 1;
		uio->uio_segflg = UIO_SYSSPACE;
		uio->uio_resid = iov->iov_len;

		crp->crp_sid = wr->w_sid;
		crp->crp_ilen = uio->uio_resid;
		crp->crp_olen = data_secsize;
		crp->crp_opaque = (void *)bp;
		crp->crp_buf = (void *)uio;
		crp->crp_flags = CRYPTO_F_IOV | CRYPTO_F_CBIFSYNC | CRYPTO_F_REL;
		if (g_eli_batch)
			crp->crp_flags |= CRYPTO_F_BATCH;
		if (bp->bio_cmd == BIO_WRITE) {
			crp->crp_callback = g_eli_auth_write_done;
			crp->crp_desc = crde;
			crde->crd_next = crda;
			crda->crd_next = NULL;
		} else {
			crp->crp_callback = g_eli_auth_read_done;
			crp->crp_desc = crda;
			crda->crd_next = crde;
			crde->crd_next = NULL;
		}

		crde->crd_skip = sc->sc_alen;
		crde->crd_len = data_secsize;
		crde->crd_flags = CRD_F_IV_EXPLICIT | CRD_F_IV_PRESENT;
		if ((sc->sc_flags & G_ELI_FLAG_FIRST_KEY) == 0)
			crde->crd_flags |= CRD_F_KEY_EXPLICIT;
		if (bp->bio_cmd == BIO_WRITE)
			crde->crd_flags |= CRD_F_ENCRYPT;
		crde->crd_alg = sc->sc_ealgo;
		crde->crd_key = g_eli_key_hold(sc, dstoff, encr_secsize);
		crde->crd_klen = sc->sc_ekeylen;
		if (sc->sc_ealgo == CRYPTO_AES_XTS)
			crde->crd_klen <<= 1;
		g_eli_crypto_ivgen(sc, dstoff, crde->crd_iv,
		    sizeof(crde->crd_iv));

		crda->crd_skip = sc->sc_alen;
		crda->crd_len = data_secsize;
		crda->crd_inject = 0;
		crda->crd_flags = CRD_F_KEY_EXPLICIT;
		crda->crd_alg = sc->sc_aalgo;
		g_eli_auth_keygen(sc, dstoff, authkey);
		crda->crd_key = authkey;
		crda->crd_klen = G_ELI_AUTH_SECKEYLEN * 8;

		crp->crp_etype = 0;
		err = crypto_dispatch(crp);
		if (err != 0 && error == 0)
			error = err;
	}
	if (bp->bio_error == 0)
		bp->bio_error = error;
}