xref: /onnv-gate/usr/src/uts/common/crypto/io/crypto.c (revision 11304:3092d1e303d6)
10Sstevel@tonic-gate /*
20Sstevel@tonic-gate  * CDDL HEADER START
30Sstevel@tonic-gate  *
40Sstevel@tonic-gate  * The contents of this file are subject to the terms of the
51808Smcpowers  * Common Development and Distribution License (the "License").
61808Smcpowers  * You may not use this file except in compliance with the License.
70Sstevel@tonic-gate  *
80Sstevel@tonic-gate  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
90Sstevel@tonic-gate  * or http://www.opensolaris.org/os/licensing.
100Sstevel@tonic-gate  * See the License for the specific language governing permissions
110Sstevel@tonic-gate  * and limitations under the License.
120Sstevel@tonic-gate  *
130Sstevel@tonic-gate  * When distributing Covered Code, include this CDDL HEADER in each
140Sstevel@tonic-gate  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
150Sstevel@tonic-gate  * If applicable, add the following below this CDDL HEADER, with the
160Sstevel@tonic-gate  * fields enclosed by brackets "[]" replaced with your own identifying
170Sstevel@tonic-gate  * information: Portions Copyright [yyyy] [name of copyright owner]
180Sstevel@tonic-gate  *
190Sstevel@tonic-gate  * CDDL HEADER END
200Sstevel@tonic-gate  */
210Sstevel@tonic-gate /*
229505SBhargava.Yenduri@Sun.COM  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
230Sstevel@tonic-gate  * Use is subject to license terms.
240Sstevel@tonic-gate  */
250Sstevel@tonic-gate 
260Sstevel@tonic-gate 
270Sstevel@tonic-gate /*
280Sstevel@tonic-gate  * The ioctl interface for cryptographic commands.
290Sstevel@tonic-gate  */
300Sstevel@tonic-gate 
310Sstevel@tonic-gate #include <sys/types.h>
320Sstevel@tonic-gate #include <sys/modctl.h>
330Sstevel@tonic-gate #include <sys/conf.h>
340Sstevel@tonic-gate #include <sys/stat.h>
350Sstevel@tonic-gate #include <sys/ddi.h>
360Sstevel@tonic-gate #include <sys/sunddi.h>
370Sstevel@tonic-gate #include <sys/kmem.h>
380Sstevel@tonic-gate #include <sys/errno.h>
390Sstevel@tonic-gate #include <sys/ksynch.h>
400Sstevel@tonic-gate #include <sys/file.h>
410Sstevel@tonic-gate #include <sys/open.h>
420Sstevel@tonic-gate #include <sys/cred.h>
430Sstevel@tonic-gate #include <sys/proc.h>
440Sstevel@tonic-gate #include <sys/task.h>
450Sstevel@tonic-gate #include <sys/mkdev.h>
460Sstevel@tonic-gate #include <sys/model.h>
470Sstevel@tonic-gate #include <sys/sysmacros.h>
480Sstevel@tonic-gate #include <sys/crypto/common.h>
490Sstevel@tonic-gate #include <sys/crypto/api.h>
500Sstevel@tonic-gate #include <sys/crypto/impl.h>
510Sstevel@tonic-gate #include <sys/crypto/sched_impl.h>
520Sstevel@tonic-gate #include <sys/crypto/ioctl.h>
530Sstevel@tonic-gate 
544841Shaimay extern int kcf_des3_threshold;
554841Shaimay extern int kcf_aes_threshold;
564841Shaimay extern int kcf_rc4_threshold;
574841Shaimay extern int kcf_md5_threshold;
584841Shaimay extern int kcf_sha1_threshold;
594841Shaimay 
600Sstevel@tonic-gate /*
610Sstevel@tonic-gate  * Locking notes:
620Sstevel@tonic-gate  *
639505SBhargava.Yenduri@Sun.COM  * crypto_locks protects the global array of minor structures.
649505SBhargava.Yenduri@Sun.COM  * crypto_locks is an array of locks indexed by the cpuid. A reader needs
659505SBhargava.Yenduri@Sun.COM  * to hold a single lock while a writer needs to hold all locks.
669505SBhargava.Yenduri@Sun.COM  * krwlock_t is not an option here because the hold time
679505SBhargava.Yenduri@Sun.COM  * is very small for these locks.
680Sstevel@tonic-gate  *
699505SBhargava.Yenduri@Sun.COM  * The fields in the minor structure are protected by the cm_lock member
709505SBhargava.Yenduri@Sun.COM  * of the minor structure. The cm_cv is used to signal decrements
719505SBhargava.Yenduri@Sun.COM  * in the cm_refcnt, and is used with the cm_lock.
729505SBhargava.Yenduri@Sun.COM  *
739505SBhargava.Yenduri@Sun.COM  * The locking order is crypto_locks followed by cm_lock.
740Sstevel@tonic-gate  */
750Sstevel@tonic-gate 
760Sstevel@tonic-gate /*
770Sstevel@tonic-gate  * DDI entry points.
780Sstevel@tonic-gate  */
790Sstevel@tonic-gate static int crypto_attach(dev_info_t *, ddi_attach_cmd_t);
800Sstevel@tonic-gate static int crypto_detach(dev_info_t *, ddi_detach_cmd_t);
810Sstevel@tonic-gate static int crypto_getinfo(dev_info_t *, ddi_info_cmd_t, void *, void **);
820Sstevel@tonic-gate static int crypto_open(dev_t *, int, int, cred_t *);
830Sstevel@tonic-gate static int crypto_close(dev_t, int, int, cred_t *);
840Sstevel@tonic-gate static int crypto_ioctl(dev_t, int, intptr_t, int, cred_t *, int *);
850Sstevel@tonic-gate 
86904Smcpowers static int cipher_init(dev_t, caddr_t, int, int (*)(crypto_provider_t,
870Sstevel@tonic-gate     crypto_session_id_t, crypto_mechanism_t *, crypto_key_t *,
880Sstevel@tonic-gate     crypto_ctx_template_t, crypto_context_t *, crypto_call_req_t *));
890Sstevel@tonic-gate 
900Sstevel@tonic-gate static int common_digest(dev_t, caddr_t, int, int (*)(crypto_context_t,
910Sstevel@tonic-gate     crypto_data_t *, crypto_data_t *, crypto_call_req_t *));
920Sstevel@tonic-gate 
930Sstevel@tonic-gate static int cipher(dev_t, caddr_t, int, int (*)(crypto_context_t,
940Sstevel@tonic-gate     crypto_data_t *, crypto_data_t *, crypto_call_req_t *));
950Sstevel@tonic-gate 
960Sstevel@tonic-gate static int cipher_update(dev_t, caddr_t, int, int (*)(crypto_context_t,
970Sstevel@tonic-gate     crypto_data_t *, crypto_data_t *, crypto_call_req_t *));
980Sstevel@tonic-gate 
990Sstevel@tonic-gate static int common_final(dev_t, caddr_t, int, int (*)(crypto_context_t,
1000Sstevel@tonic-gate     crypto_data_t *, crypto_call_req_t *));
1010Sstevel@tonic-gate 
102904Smcpowers static int sign_verify_init(dev_t, caddr_t, int, int (*)(crypto_provider_t,
1030Sstevel@tonic-gate     crypto_session_id_t, crypto_mechanism_t *, crypto_key_t *,
1040Sstevel@tonic-gate     crypto_ctx_template_t, crypto_context_t *, crypto_call_req_t *));
1050Sstevel@tonic-gate 
1060Sstevel@tonic-gate static int sign_verify_update(dev_t dev, caddr_t arg, int mode,
1070Sstevel@tonic-gate     int (*)(crypto_context_t, crypto_data_t *, crypto_call_req_t *));
1080Sstevel@tonic-gate 
1090Sstevel@tonic-gate static void crypto_initialize_rctl(void);
1100Sstevel@tonic-gate static void crypto_release_provider_session(crypto_minor_t *,
1110Sstevel@tonic-gate     crypto_provider_session_t *);
1123916Skrishna static int crypto_buffer_check(size_t);
1130Sstevel@tonic-gate static int crypto_free_find_ctx(crypto_session_data_t *);
1140Sstevel@tonic-gate static int crypto_get_provider_list(crypto_minor_t *, uint_t *,
1150Sstevel@tonic-gate     crypto_provider_entry_t **, boolean_t);
1160Sstevel@tonic-gate 
1170Sstevel@tonic-gate /* number of minor numbers to allocate at a time */
1180Sstevel@tonic-gate #define	CRYPTO_MINOR_CHUNK	16
1190Sstevel@tonic-gate 
1200Sstevel@tonic-gate /*
1210Sstevel@tonic-gate  * There are two limits associated with kernel memory. The first,
1220Sstevel@tonic-gate  * CRYPTO_MAX_BUFFER_LEN, is the maximum number of bytes that can be
1230Sstevel@tonic-gate  * allocated for a single copyin/copyout buffer. The second limit is
1240Sstevel@tonic-gate  * the total number of bytes that can be allocated by a process
1250Sstevel@tonic-gate  * for copyin/copyout buffers. The latter is enforced by the
1260Sstevel@tonic-gate  * project.max-crypto-memory resource control.
1270Sstevel@tonic-gate  */
1280Sstevel@tonic-gate 
1290Sstevel@tonic-gate #define	CRYPTO_MAX_BUFFER_LEN	(2 * 1024 * 1024)
1300Sstevel@tonic-gate #define	CRYPTO_MAX_FIND_COUNT	512
1310Sstevel@tonic-gate 
1320Sstevel@tonic-gate /*
1336424Skrishna  * We preapprove some bytes for each session to avoid making the costly
1346424Skrishna  * crypto_buffer_check() calls. The preapproval is done when a new session
1356424Skrishna  * is created and that cost is amortized over later crypto calls.
1366424Skrishna  * Most applications create a session and then do a bunch of crypto calls
1376424Skrishna  * in that session. So, they benefit from this optimization.
1386424Skrishna  *
1396424Skrishna  * Note that we may hit the project.max-crypto-memory limit a bit sooner
1406424Skrishna  * because of this preapproval. But it is acceptable since the preapproved
1416424Skrishna  * amount is insignificant compared to the default max-crypto-memory limit
1426424Skrishna  * which is quarter of the machine's memory. The preapproved amount is
1436424Skrishna  * roughly 2 * 16K(maximum SSL record size).
1440Sstevel@tonic-gate  */
1456424Skrishna #define	CRYPTO_PRE_APPROVED_LIMIT	(32 * 1024)
1460Sstevel@tonic-gate 
1470Sstevel@tonic-gate /* The session table grows by CRYPTO_SESSION_CHUNK increments */
1480Sstevel@tonic-gate #define	CRYPTO_SESSION_CHUNK	100
1490Sstevel@tonic-gate 
1500Sstevel@tonic-gate size_t crypto_max_buffer_len = CRYPTO_MAX_BUFFER_LEN;
1516424Skrishna size_t crypto_pre_approved_limit = CRYPTO_PRE_APPROVED_LIMIT;
1520Sstevel@tonic-gate 
1530Sstevel@tonic-gate #define	INIT_RAW_CRYPTO_DATA(data, len)				\
1540Sstevel@tonic-gate 	(data).cd_format = CRYPTO_DATA_RAW;			\
1550Sstevel@tonic-gate 	(data).cd_raw.iov_base = kmem_alloc(len, KM_SLEEP);	\
1560Sstevel@tonic-gate 	(data).cd_raw.iov_len = len;				\
1570Sstevel@tonic-gate 	(data).cd_offset = 0;					\
1580Sstevel@tonic-gate 	(data).cd_length = len;
1590Sstevel@tonic-gate 
1600Sstevel@tonic-gate static struct kmem_cache *crypto_session_cache;
1610Sstevel@tonic-gate static crypto_minor_t **crypto_minors = NULL;
1620Sstevel@tonic-gate static dev_info_t *crypto_dip = NULL;
1630Sstevel@tonic-gate static minor_t crypto_minor_chunk = CRYPTO_MINOR_CHUNK;
1640Sstevel@tonic-gate static minor_t crypto_minors_table_count = 0;
1650Sstevel@tonic-gate 
1660Sstevel@tonic-gate /*
1670Sstevel@tonic-gate  * Minors are started from 1 because vmem_alloc()
1680Sstevel@tonic-gate  * returns 0 in case of failure.
1690Sstevel@tonic-gate  */
1700Sstevel@tonic-gate static vmem_t *crypto_arena = NULL;	/* Arena for device minors */
1710Sstevel@tonic-gate static minor_t crypto_minors_count = 0;
1729505SBhargava.Yenduri@Sun.COM static kcf_lock_withpad_t *crypto_locks;
1739505SBhargava.Yenduri@Sun.COM 
1749505SBhargava.Yenduri@Sun.COM #define	CRYPTO_ENTER_ALL_LOCKS()		\
1759505SBhargava.Yenduri@Sun.COM 	for (i = 0; i < max_ncpus; i++)		\
1769505SBhargava.Yenduri@Sun.COM 		mutex_enter(&crypto_locks[i].kl_lock);
1779505SBhargava.Yenduri@Sun.COM 
1789505SBhargava.Yenduri@Sun.COM #define	CRYPTO_EXIT_ALL_LOCKS()			\
1799505SBhargava.Yenduri@Sun.COM 	for (i = 0; i < max_ncpus; i++)		\
1809505SBhargava.Yenduri@Sun.COM 		mutex_exit(&crypto_locks[i].kl_lock);
1810Sstevel@tonic-gate 
1820Sstevel@tonic-gate #define	RETURN_LIST			B_TRUE
1830Sstevel@tonic-gate #define	DONT_RETURN_LIST		B_FALSE
1840Sstevel@tonic-gate 
185904Smcpowers #define	CRYPTO_OPS_OFFSET(f)		offsetof(crypto_ops_t, co_##f)
1860Sstevel@tonic-gate #define	CRYPTO_RANDOM_OFFSET(f)		offsetof(crypto_random_number_ops_t, f)
1870Sstevel@tonic-gate #define	CRYPTO_SESSION_OFFSET(f)	offsetof(crypto_session_ops_t, f)
1880Sstevel@tonic-gate #define	CRYPTO_OBJECT_OFFSET(f)		offsetof(crypto_object_ops_t, f)
1890Sstevel@tonic-gate #define	CRYPTO_PROVIDER_OFFSET(f)	\
1900Sstevel@tonic-gate 	offsetof(crypto_provider_management_ops_t, f)
1910Sstevel@tonic-gate 
1920Sstevel@tonic-gate #define	CRYPTO_CANCEL_CTX(spp) {	\
1930Sstevel@tonic-gate 	crypto_cancel_ctx(*(spp));	\
1940Sstevel@tonic-gate 	*(spp) = NULL;			\
1950Sstevel@tonic-gate }
1960Sstevel@tonic-gate 
1970Sstevel@tonic-gate #define	CRYPTO_CANCEL_ALL_CTX(sp) {				\
1980Sstevel@tonic-gate 	if ((sp)->sd_digest_ctx != NULL) {			\
1990Sstevel@tonic-gate 		crypto_cancel_ctx((sp)->sd_digest_ctx);		\
2000Sstevel@tonic-gate 		(sp)->sd_digest_ctx = NULL;			\
2010Sstevel@tonic-gate 	}							\
2020Sstevel@tonic-gate 	if ((sp)->sd_encr_ctx != NULL) {			\
2030Sstevel@tonic-gate 		crypto_cancel_ctx((sp)->sd_encr_ctx);		\
2040Sstevel@tonic-gate 		(sp)->sd_encr_ctx = NULL;			\
2050Sstevel@tonic-gate 	}							\
2060Sstevel@tonic-gate 	if ((sp)->sd_decr_ctx != NULL) {			\
2070Sstevel@tonic-gate 		crypto_cancel_ctx((sp)->sd_decr_ctx);		\
2080Sstevel@tonic-gate 		(sp)->sd_decr_ctx = NULL;			\
2090Sstevel@tonic-gate 	}							\
2100Sstevel@tonic-gate 	if ((sp)->sd_sign_ctx != NULL) {			\
2110Sstevel@tonic-gate 		crypto_cancel_ctx((sp)->sd_sign_ctx);		\
2120Sstevel@tonic-gate 		(sp)->sd_sign_ctx = NULL;			\
2130Sstevel@tonic-gate 	}							\
2140Sstevel@tonic-gate 	if ((sp)->sd_verify_ctx != NULL) {			\
2150Sstevel@tonic-gate 		crypto_cancel_ctx((sp)->sd_verify_ctx);		\
2160Sstevel@tonic-gate 		(sp)->sd_verify_ctx = NULL;			\
2170Sstevel@tonic-gate 	}							\
2180Sstevel@tonic-gate 	if ((sp)->sd_sign_recover_ctx != NULL) {		\
2190Sstevel@tonic-gate 		crypto_cancel_ctx((sp)->sd_sign_recover_ctx);	\
2200Sstevel@tonic-gate 		(sp)->sd_sign_recover_ctx = NULL;		\
2210Sstevel@tonic-gate 	}							\
2220Sstevel@tonic-gate 	if ((sp)->sd_verify_recover_ctx != NULL) {		\
2230Sstevel@tonic-gate 		crypto_cancel_ctx((sp)->sd_verify_recover_ctx);	\
2240Sstevel@tonic-gate 		(sp)->sd_verify_recover_ctx = NULL;		\
2250Sstevel@tonic-gate 	}							\
2260Sstevel@tonic-gate }
2270Sstevel@tonic-gate 
2286424Skrishna #define	CRYPTO_DECREMENT_RCTL(val)	if ((val) != 0) {	\
2293916Skrishna 	kproject_t *projp;					\
2303916Skrishna 	mutex_enter(&curproc->p_lock);				\
2313916Skrishna 	projp = curproc->p_task->tk_proj;			\
2323916Skrishna 	ASSERT(projp != NULL);					\
2333916Skrishna 	mutex_enter(&(projp->kpj_data.kpd_crypto_lock));	\
2343916Skrishna 	projp->kpj_data.kpd_crypto_mem -= (val);		\
2353916Skrishna 	mutex_exit(&(projp->kpj_data.kpd_crypto_lock));		\
2363916Skrishna 	curproc->p_crypto_mem -= (val);				\
2373916Skrishna 	mutex_exit(&curproc->p_lock);				\
2380Sstevel@tonic-gate }
2390Sstevel@tonic-gate 
2400Sstevel@tonic-gate /*
2416424Skrishna  * We do not need to hold sd_lock in the macros below
2426424Skrishna  * as they are called after doing a get_session_ptr() which
2436424Skrishna  * sets the CRYPTO_SESSION_IS_BUSY flag.
2446424Skrishna  */
2456424Skrishna #define	CRYPTO_DECREMENT_RCTL_SESSION(sp, val, rctl_chk) 	\
2466867Skrishna 	if (((val) != 0) && ((sp) != NULL)) {			\
2476424Skrishna 		ASSERT(((sp)->sd_flags & CRYPTO_SESSION_IS_BUSY) != 0);	\
2486424Skrishna 		if (rctl_chk) {				\
2496424Skrishna 			CRYPTO_DECREMENT_RCTL(val);		\
2506424Skrishna 		} else {					\
2516424Skrishna 			(sp)->sd_pre_approved_amount += (val);	\
2526424Skrishna 		}						\
2536424Skrishna 	}
2546424Skrishna 
2556424Skrishna #define	CRYPTO_BUFFER_CHECK(sp, need, rctl_chk)		\
2566424Skrishna 	((sp->sd_pre_approved_amount >= need) ?			\
2576424Skrishna 	(sp->sd_pre_approved_amount -= need,			\
2586424Skrishna 	    rctl_chk = B_FALSE, CRYPTO_SUCCESS) :		\
2596424Skrishna 	    (rctl_chk = B_TRUE, crypto_buffer_check(need)))
2606424Skrishna 
2616424Skrishna /*
2620Sstevel@tonic-gate  * Module linkage.
2630Sstevel@tonic-gate  */
2640Sstevel@tonic-gate static struct cb_ops cbops = {
2650Sstevel@tonic-gate 	crypto_open,		/* cb_open */
2660Sstevel@tonic-gate 	crypto_close,		/* cb_close */
2670Sstevel@tonic-gate 	nodev,			/* cb_strategy */
2680Sstevel@tonic-gate 	nodev,			/* cb_print */
2690Sstevel@tonic-gate 	nodev,			/* cb_dump */
2700Sstevel@tonic-gate 	nodev,			/* cb_read */
2710Sstevel@tonic-gate 	nodev,			/* cb_write */
2720Sstevel@tonic-gate 	crypto_ioctl,		/* cb_ioctl */
2730Sstevel@tonic-gate 	nodev,			/* cb_devmap */
2740Sstevel@tonic-gate 	nodev,			/* cb_mmap */
2750Sstevel@tonic-gate 	nodev,			/* cb_segmap */
2760Sstevel@tonic-gate 	nochpoll,		/* cb_chpoll */
2770Sstevel@tonic-gate 	ddi_prop_op,		/* cb_prop_op */
2780Sstevel@tonic-gate 	NULL,			/* cb_streamtab */
2790Sstevel@tonic-gate 	D_MP,			/* cb_flag */
2800Sstevel@tonic-gate 	CB_REV,			/* cb_rev */
2810Sstevel@tonic-gate 	nodev,			/* cb_aread */
2820Sstevel@tonic-gate 	nodev,			/* cb_awrite */
2830Sstevel@tonic-gate };
2840Sstevel@tonic-gate 
2850Sstevel@tonic-gate static struct dev_ops devops = {
2860Sstevel@tonic-gate 	DEVO_REV,		/* devo_rev */
2870Sstevel@tonic-gate 	0,			/* devo_refcnt */
2880Sstevel@tonic-gate 	crypto_getinfo,		/* devo_getinfo */
2890Sstevel@tonic-gate 	nulldev,		/* devo_identify */
2900Sstevel@tonic-gate 	nulldev,		/* devo_probe */
2910Sstevel@tonic-gate 	crypto_attach,		/* devo_attach */
2920Sstevel@tonic-gate 	crypto_detach,		/* devo_detach */
2930Sstevel@tonic-gate 	nodev,			/* devo_reset */
2940Sstevel@tonic-gate 	&cbops,			/* devo_cb_ops */
2950Sstevel@tonic-gate 	NULL,			/* devo_bus_ops */
2960Sstevel@tonic-gate 	NULL,			/* devo_power */
2977656SSherry.Moore@Sun.COM 	ddi_quiesce_not_needed,		/* devo_quiesce */
2980Sstevel@tonic-gate };
2990Sstevel@tonic-gate 
3000Sstevel@tonic-gate static struct modldrv modldrv = {
3010Sstevel@tonic-gate 	&mod_driverops,					/* drv_modops */
3025072Smcpowers 	"Cryptographic Library Interface",	/* drv_linkinfo */
3030Sstevel@tonic-gate 	&devops,
3040Sstevel@tonic-gate };
3050Sstevel@tonic-gate 
3060Sstevel@tonic-gate static struct modlinkage modlinkage = {
3070Sstevel@tonic-gate 	MODREV_1,		/* ml_rev */
3080Sstevel@tonic-gate 	&modldrv,		/* ml_linkage */
3090Sstevel@tonic-gate 	NULL
3100Sstevel@tonic-gate };
3110Sstevel@tonic-gate 
3120Sstevel@tonic-gate /*
3130Sstevel@tonic-gate  * DDI entry points.
3140Sstevel@tonic-gate  */
3150Sstevel@tonic-gate int
3160Sstevel@tonic-gate _init(void)
3170Sstevel@tonic-gate {
3180Sstevel@tonic-gate 	return (mod_install(&modlinkage));
3190Sstevel@tonic-gate }
3200Sstevel@tonic-gate 
3210Sstevel@tonic-gate int
3220Sstevel@tonic-gate _fini(void)
3230Sstevel@tonic-gate {
3240Sstevel@tonic-gate 	return (mod_remove(&modlinkage));
3250Sstevel@tonic-gate }
3260Sstevel@tonic-gate 
3270Sstevel@tonic-gate int
3280Sstevel@tonic-gate _info(struct modinfo *modinfop)
3290Sstevel@tonic-gate {
3300Sstevel@tonic-gate 	return (mod_info(&modlinkage, modinfop));
3310Sstevel@tonic-gate }
3320Sstevel@tonic-gate 
3330Sstevel@tonic-gate /* ARGSUSED */
3340Sstevel@tonic-gate static int
3350Sstevel@tonic-gate crypto_getinfo(dev_info_t *dip, ddi_info_cmd_t cmd, void *arg, void **result)
3360Sstevel@tonic-gate {
3370Sstevel@tonic-gate 	switch (cmd) {
3380Sstevel@tonic-gate 	case DDI_INFO_DEVT2DEVINFO:
3390Sstevel@tonic-gate 		*result = crypto_dip;
3400Sstevel@tonic-gate 		return (DDI_SUCCESS);
3410Sstevel@tonic-gate 
3420Sstevel@tonic-gate 	case DDI_INFO_DEVT2INSTANCE:
3430Sstevel@tonic-gate 		*result = (void *)0;
3440Sstevel@tonic-gate 		return (DDI_SUCCESS);
3450Sstevel@tonic-gate 	}
3460Sstevel@tonic-gate 	return (DDI_FAILURE);
3470Sstevel@tonic-gate }
3480Sstevel@tonic-gate 
3490Sstevel@tonic-gate static int
3500Sstevel@tonic-gate crypto_attach(dev_info_t *dip, ddi_attach_cmd_t cmd)
3510Sstevel@tonic-gate {
3529505SBhargava.Yenduri@Sun.COM 	int i;
3539505SBhargava.Yenduri@Sun.COM 
3540Sstevel@tonic-gate 	if (cmd != DDI_ATTACH) {
3550Sstevel@tonic-gate 		return (DDI_FAILURE);
3560Sstevel@tonic-gate 	}
3570Sstevel@tonic-gate 
3580Sstevel@tonic-gate 	if (ddi_get_instance(dip) != 0) {
3590Sstevel@tonic-gate 		/* we only allow instance 0 to attach */
3600Sstevel@tonic-gate 		return (DDI_FAILURE);
3610Sstevel@tonic-gate 	}
3620Sstevel@tonic-gate 
3630Sstevel@tonic-gate 	crypto_session_cache = kmem_cache_create("crypto_session_cache",
3640Sstevel@tonic-gate 	    sizeof (crypto_session_data_t), 0, NULL, NULL, NULL, NULL, NULL, 0);
3650Sstevel@tonic-gate 
3660Sstevel@tonic-gate 	if (crypto_session_cache == NULL)
3670Sstevel@tonic-gate 		return (DDI_FAILURE);
3680Sstevel@tonic-gate 
3690Sstevel@tonic-gate 	/* create the minor node */
3700Sstevel@tonic-gate 	if (ddi_create_minor_node(dip, "crypto", S_IFCHR, 0,
3710Sstevel@tonic-gate 	    DDI_PSEUDO, 0) != DDI_SUCCESS) {
3720Sstevel@tonic-gate 		kmem_cache_destroy(crypto_session_cache);
3730Sstevel@tonic-gate 		crypto_session_cache = NULL;
3740Sstevel@tonic-gate 		cmn_err(CE_WARN, "crypto_attach: failed creating minor node");
3750Sstevel@tonic-gate 		ddi_remove_minor_node(dip, NULL);
3760Sstevel@tonic-gate 		return (DDI_FAILURE);
3770Sstevel@tonic-gate 	}
3780Sstevel@tonic-gate 
3799505SBhargava.Yenduri@Sun.COM 	crypto_locks = kmem_zalloc(max_ncpus * sizeof (kcf_lock_withpad_t),
3809505SBhargava.Yenduri@Sun.COM 	    KM_SLEEP);
3819505SBhargava.Yenduri@Sun.COM 	for (i = 0; i < max_ncpus; i++)
3829505SBhargava.Yenduri@Sun.COM 		mutex_init(&crypto_locks[i].kl_lock, NULL, MUTEX_DRIVER, NULL);
3839505SBhargava.Yenduri@Sun.COM 
3840Sstevel@tonic-gate 	crypto_dip = dip;
3850Sstevel@tonic-gate 
3860Sstevel@tonic-gate 	/* allocate integer space for minor numbers */
3870Sstevel@tonic-gate 	crypto_arena = vmem_create("crypto", (void *)1,
3880Sstevel@tonic-gate 	    CRYPTO_MINOR_CHUNK, 1, NULL, NULL, NULL, 0,
3890Sstevel@tonic-gate 	    VM_SLEEP | VMC_IDENTIFIER);
3900Sstevel@tonic-gate 
3910Sstevel@tonic-gate 	return (DDI_SUCCESS);
3920Sstevel@tonic-gate }
3930Sstevel@tonic-gate 
3940Sstevel@tonic-gate static int
3950Sstevel@tonic-gate crypto_detach(dev_info_t *dip, ddi_detach_cmd_t cmd)
3960Sstevel@tonic-gate {
3970Sstevel@tonic-gate 	minor_t i;
3989505SBhargava.Yenduri@Sun.COM 	kcf_lock_withpad_t *mp;
3990Sstevel@tonic-gate 
4000Sstevel@tonic-gate 	if (cmd != DDI_DETACH)
4010Sstevel@tonic-gate 		return (DDI_FAILURE);
4020Sstevel@tonic-gate 
4039505SBhargava.Yenduri@Sun.COM 	mp = &crypto_locks[CPU_SEQID];
4049505SBhargava.Yenduri@Sun.COM 	mutex_enter(&mp->kl_lock);
4059505SBhargava.Yenduri@Sun.COM 
4060Sstevel@tonic-gate 	/* check if device is open */
4070Sstevel@tonic-gate 	for (i = 0; i < crypto_minors_table_count; i++) {
4080Sstevel@tonic-gate 		if (crypto_minors[i] != NULL) {
4099505SBhargava.Yenduri@Sun.COM 			mutex_exit(&mp->kl_lock);
4100Sstevel@tonic-gate 			return (DDI_FAILURE);
4110Sstevel@tonic-gate 		}
4120Sstevel@tonic-gate 	}
4139505SBhargava.Yenduri@Sun.COM 	mutex_exit(&mp->kl_lock);
4140Sstevel@tonic-gate 
4150Sstevel@tonic-gate 	crypto_dip = NULL;
4160Sstevel@tonic-gate 	ddi_remove_minor_node(dip, NULL);
4170Sstevel@tonic-gate 
4180Sstevel@tonic-gate 	kmem_cache_destroy(crypto_session_cache);
4190Sstevel@tonic-gate 	crypto_session_cache = NULL;
4200Sstevel@tonic-gate 
4210Sstevel@tonic-gate 	kmem_free(crypto_minors,
4220Sstevel@tonic-gate 	    sizeof (crypto_minor_t *) * crypto_minors_table_count);
4230Sstevel@tonic-gate 	crypto_minors = NULL;
4240Sstevel@tonic-gate 	crypto_minors_table_count = 0;
4259505SBhargava.Yenduri@Sun.COM 	for (i = 0; i < max_ncpus; i++)
4269505SBhargava.Yenduri@Sun.COM 		mutex_destroy(&crypto_locks[i].kl_lock);
4279662SBhargava.Yenduri@Sun.COM 	kmem_free(crypto_locks, max_ncpus * sizeof (kcf_lock_withpad_t));
4289662SBhargava.Yenduri@Sun.COM 	crypto_locks = NULL;
4299505SBhargava.Yenduri@Sun.COM 
4300Sstevel@tonic-gate 	vmem_destroy(crypto_arena);
4310Sstevel@tonic-gate 	crypto_arena = NULL;
4320Sstevel@tonic-gate 
4330Sstevel@tonic-gate 	return (DDI_SUCCESS);
4340Sstevel@tonic-gate }
4350Sstevel@tonic-gate 
4360Sstevel@tonic-gate /* ARGSUSED */
4370Sstevel@tonic-gate static int
4380Sstevel@tonic-gate crypto_open(dev_t *devp, int flag, int otyp, cred_t *credp)
4390Sstevel@tonic-gate {
4400Sstevel@tonic-gate 	crypto_minor_t *cm = NULL;
4410Sstevel@tonic-gate 	minor_t mn;
4429505SBhargava.Yenduri@Sun.COM 	kcf_lock_withpad_t *mp;
4439505SBhargava.Yenduri@Sun.COM 	int i;
4440Sstevel@tonic-gate 
4450Sstevel@tonic-gate 	if (otyp != OTYP_CHR)
4460Sstevel@tonic-gate 		return (ENXIO);
4470Sstevel@tonic-gate 
4480Sstevel@tonic-gate 	if (crypto_dip == NULL)
4490Sstevel@tonic-gate 		return (ENXIO);
4500Sstevel@tonic-gate 
4510Sstevel@tonic-gate 	/* exclusive opens are not supported */
4520Sstevel@tonic-gate 	if (flag & FEXCL)
4530Sstevel@tonic-gate 		return (ENOTSUP);
4540Sstevel@tonic-gate 
4550Sstevel@tonic-gate again:
4569505SBhargava.Yenduri@Sun.COM 	mp = &crypto_locks[CPU_SEQID];
4579505SBhargava.Yenduri@Sun.COM 	mutex_enter(&mp->kl_lock);
4589505SBhargava.Yenduri@Sun.COM 
4590Sstevel@tonic-gate 	/* grow the minors table if needed */
4600Sstevel@tonic-gate 	if (crypto_minors_count >= crypto_minors_table_count) {
4610Sstevel@tonic-gate 		crypto_minor_t **newtable;
4620Sstevel@tonic-gate 		minor_t chunk = crypto_minor_chunk;
4630Sstevel@tonic-gate 		minor_t saved_count;
4640Sstevel@tonic-gate 		size_t new_size;
4650Sstevel@tonic-gate 		ulong_t big_count;
4660Sstevel@tonic-gate 
4670Sstevel@tonic-gate 		big_count = crypto_minors_count + chunk;
4680Sstevel@tonic-gate 		if (big_count > MAXMIN) {
4699505SBhargava.Yenduri@Sun.COM 			mutex_exit(&mp->kl_lock);
4700Sstevel@tonic-gate 			return (ENOMEM);
4710Sstevel@tonic-gate 		}
4720Sstevel@tonic-gate 
4730Sstevel@tonic-gate 		saved_count = crypto_minors_table_count;
4740Sstevel@tonic-gate 		new_size = sizeof (crypto_minor_t *) *
4750Sstevel@tonic-gate 		    (crypto_minors_table_count + chunk);
4760Sstevel@tonic-gate 
4779505SBhargava.Yenduri@Sun.COM 		mutex_exit(&mp->kl_lock);
4789505SBhargava.Yenduri@Sun.COM 
4790Sstevel@tonic-gate 		newtable = kmem_zalloc(new_size, KM_SLEEP);
4809505SBhargava.Yenduri@Sun.COM 		CRYPTO_ENTER_ALL_LOCKS();
4810Sstevel@tonic-gate 		/*
4820Sstevel@tonic-gate 		 * Check if table grew while we were sleeping.
4830Sstevel@tonic-gate 		 * The minors table never shrinks.
4840Sstevel@tonic-gate 		 */
4850Sstevel@tonic-gate 		if (crypto_minors_table_count > saved_count) {
4869505SBhargava.Yenduri@Sun.COM 			CRYPTO_EXIT_ALL_LOCKS();
4870Sstevel@tonic-gate 			kmem_free(newtable, new_size);
4880Sstevel@tonic-gate 			goto again;
4890Sstevel@tonic-gate 		}
4900Sstevel@tonic-gate 
4910Sstevel@tonic-gate 		/* we assume that bcopy() will return if count is 0 */
4920Sstevel@tonic-gate 		bcopy(crypto_minors, newtable,
4930Sstevel@tonic-gate 		    sizeof (crypto_minor_t *) * crypto_minors_table_count);
4940Sstevel@tonic-gate 
4950Sstevel@tonic-gate 		kmem_free(crypto_minors,
4960Sstevel@tonic-gate 		    sizeof (crypto_minor_t *) * crypto_minors_table_count);
4970Sstevel@tonic-gate 
4980Sstevel@tonic-gate 		/* grow the minors number space */
4990Sstevel@tonic-gate 		if (crypto_minors_table_count != 0) {
5000Sstevel@tonic-gate 			(void) vmem_add(crypto_arena,
5010Sstevel@tonic-gate 			    (void *)(uintptr_t)(crypto_minors_table_count + 1),
5020Sstevel@tonic-gate 			    crypto_minor_chunk, VM_SLEEP);
5030Sstevel@tonic-gate 		}
5040Sstevel@tonic-gate 
5050Sstevel@tonic-gate 		crypto_minors = newtable;
5060Sstevel@tonic-gate 		crypto_minors_table_count += chunk;
5079505SBhargava.Yenduri@Sun.COM 		CRYPTO_EXIT_ALL_LOCKS();
5089505SBhargava.Yenduri@Sun.COM 	} else {
5099505SBhargava.Yenduri@Sun.COM 		mutex_exit(&mp->kl_lock);
5109505SBhargava.Yenduri@Sun.COM 	}
5110Sstevel@tonic-gate 
5120Sstevel@tonic-gate 	/* allocate a new minor number starting with 1 */
5130Sstevel@tonic-gate 	mn = (minor_t)(uintptr_t)vmem_alloc(crypto_arena, 1, VM_SLEEP);
5140Sstevel@tonic-gate 
5150Sstevel@tonic-gate 	cm = kmem_zalloc(sizeof (crypto_minor_t), KM_SLEEP);
5160Sstevel@tonic-gate 	mutex_init(&cm->cm_lock, NULL, MUTEX_DRIVER, NULL);
5170Sstevel@tonic-gate 	cv_init(&cm->cm_cv, NULL, CV_DRIVER, NULL);
5180Sstevel@tonic-gate 
5199505SBhargava.Yenduri@Sun.COM 	CRYPTO_ENTER_ALL_LOCKS();
5207882SBhargava.Yenduri@Sun.COM 	cm->cm_refcnt = 1;
5210Sstevel@tonic-gate 	crypto_minors[mn - 1] = cm;
5220Sstevel@tonic-gate 	crypto_minors_count++;
5239505SBhargava.Yenduri@Sun.COM 	CRYPTO_EXIT_ALL_LOCKS();
5240Sstevel@tonic-gate 
5250Sstevel@tonic-gate 	*devp = makedevice(getmajor(*devp), mn);
5260Sstevel@tonic-gate 
5270Sstevel@tonic-gate 	return (0);
5280Sstevel@tonic-gate }
5290Sstevel@tonic-gate 
5300Sstevel@tonic-gate /* ARGSUSED */
5310Sstevel@tonic-gate static int
5320Sstevel@tonic-gate crypto_close(dev_t dev, int flag, int otyp, cred_t *credp)
5330Sstevel@tonic-gate {
5340Sstevel@tonic-gate 	crypto_minor_t *cm = NULL;
5350Sstevel@tonic-gate 	crypto_session_data_t *sp;
5360Sstevel@tonic-gate 	minor_t mn = getminor(dev);
5370Sstevel@tonic-gate 	uint_t i;
5386424Skrishna 	size_t total = 0;
5399505SBhargava.Yenduri@Sun.COM 	kcf_lock_withpad_t *mp;
5409505SBhargava.Yenduri@Sun.COM 
5419505SBhargava.Yenduri@Sun.COM 	mp = &crypto_locks[CPU_SEQID];
5429505SBhargava.Yenduri@Sun.COM 	mutex_enter(&mp->kl_lock);
5439505SBhargava.Yenduri@Sun.COM 
5440Sstevel@tonic-gate 	if (mn > crypto_minors_table_count) {
5459505SBhargava.Yenduri@Sun.COM 		mutex_exit(&mp->kl_lock);
5460Sstevel@tonic-gate 		cmn_err(CE_WARN, "crypto_close: bad minor (too big) %d", mn);
5470Sstevel@tonic-gate 		return (ENODEV);
5480Sstevel@tonic-gate 	}
5490Sstevel@tonic-gate 
5507882SBhargava.Yenduri@Sun.COM 	cm = crypto_minors[mn - 1];
5510Sstevel@tonic-gate 	if (cm == NULL) {
5529505SBhargava.Yenduri@Sun.COM 		mutex_exit(&mp->kl_lock);
5530Sstevel@tonic-gate 		cmn_err(CE_WARN, "crypto_close: duplicate close of minor %d",
5540Sstevel@tonic-gate 		    getminor(dev));
5550Sstevel@tonic-gate 		return (ENODEV);
5560Sstevel@tonic-gate 	}
5570Sstevel@tonic-gate 
5589505SBhargava.Yenduri@Sun.COM 	mutex_exit(&mp->kl_lock);
5599505SBhargava.Yenduri@Sun.COM 
5609505SBhargava.Yenduri@Sun.COM 	CRYPTO_ENTER_ALL_LOCKS();
5619505SBhargava.Yenduri@Sun.COM 	/*
5629505SBhargava.Yenduri@Sun.COM 	 * We free the minor number, mn, from the crypto_arena
5639505SBhargava.Yenduri@Sun.COM 	 * only later. This ensures that we won't race with another
5649505SBhargava.Yenduri@Sun.COM 	 * thread in crypto_open with the same minor number.
5659505SBhargava.Yenduri@Sun.COM 	 */
5669505SBhargava.Yenduri@Sun.COM 	crypto_minors[mn - 1] = NULL;
5679505SBhargava.Yenduri@Sun.COM 	crypto_minors_count--;
5689505SBhargava.Yenduri@Sun.COM 	CRYPTO_EXIT_ALL_LOCKS();
5699505SBhargava.Yenduri@Sun.COM 
5709505SBhargava.Yenduri@Sun.COM 	mutex_enter(&cm->cm_lock);
5717882SBhargava.Yenduri@Sun.COM 	cm->cm_refcnt --;		/* decrement refcnt held in open */
5727882SBhargava.Yenduri@Sun.COM 	while (cm->cm_refcnt > 0) {
5739505SBhargava.Yenduri@Sun.COM 		cv_wait(&cm->cm_cv, &cm->cm_lock);
5749505SBhargava.Yenduri@Sun.COM 	}
5750Sstevel@tonic-gate 
5760Sstevel@tonic-gate 	vmem_free(crypto_arena, (void *)(uintptr_t)mn, 1);
5770Sstevel@tonic-gate 
5780Sstevel@tonic-gate 	/* free all session table entries starting with 1 */
5790Sstevel@tonic-gate 	for (i = 1; i < cm->cm_session_table_count; i++) {
5800Sstevel@tonic-gate 		if (cm->cm_session_table[i] == NULL)
5810Sstevel@tonic-gate 			continue;
5820Sstevel@tonic-gate 
5830Sstevel@tonic-gate 		sp = cm->cm_session_table[i];
5840Sstevel@tonic-gate 		ASSERT((sp->sd_flags & CRYPTO_SESSION_IS_BUSY) == 0);
5856424Skrishna 		ASSERT(sp->sd_pre_approved_amount == 0 ||
5866424Skrishna 		    sp->sd_pre_approved_amount == crypto_pre_approved_limit);
5876424Skrishna 		total += sp->sd_pre_approved_amount;
5880Sstevel@tonic-gate 		if (sp->sd_find_init_cookie != NULL) {
5890Sstevel@tonic-gate 			(void) crypto_free_find_ctx(sp);
5900Sstevel@tonic-gate 		}
5910Sstevel@tonic-gate 		crypto_release_provider_session(cm, sp->sd_provider_session);
5920Sstevel@tonic-gate 		KCF_PROV_REFRELE(sp->sd_provider);
5930Sstevel@tonic-gate 		CRYPTO_CANCEL_ALL_CTX(sp);
5940Sstevel@tonic-gate 		mutex_destroy(&sp->sd_lock);
5950Sstevel@tonic-gate 		cv_destroy(&sp->sd_cv);
5960Sstevel@tonic-gate 		kmem_cache_free(crypto_session_cache, sp);
5970Sstevel@tonic-gate 		cm->cm_session_table[i] = NULL;
5980Sstevel@tonic-gate 	}
5990Sstevel@tonic-gate 
6000Sstevel@tonic-gate 	/* free the session table */
6010Sstevel@tonic-gate 	if (cm->cm_session_table != NULL && cm->cm_session_table_count > 0)
6020Sstevel@tonic-gate 		kmem_free(cm->cm_session_table, cm->cm_session_table_count *
6030Sstevel@tonic-gate 		    sizeof (void *));
6040Sstevel@tonic-gate 
6056424Skrishna 	total += (cm->cm_session_table_count * sizeof (void *));
6066424Skrishna 	CRYPTO_DECREMENT_RCTL(total);
6070Sstevel@tonic-gate 
6080Sstevel@tonic-gate 	kcf_free_provider_tab(cm->cm_provider_count,
6090Sstevel@tonic-gate 	    cm->cm_provider_array);
6100Sstevel@tonic-gate 
6119505SBhargava.Yenduri@Sun.COM 	mutex_exit(&cm->cm_lock);
6120Sstevel@tonic-gate 	mutex_destroy(&cm->cm_lock);
6130Sstevel@tonic-gate 	cv_destroy(&cm->cm_cv);
6140Sstevel@tonic-gate 	kmem_free(cm, sizeof (crypto_minor_t));
6150Sstevel@tonic-gate 
6160Sstevel@tonic-gate 	return (0);
6170Sstevel@tonic-gate }
6180Sstevel@tonic-gate 
6190Sstevel@tonic-gate static crypto_minor_t *
6200Sstevel@tonic-gate crypto_hold_minor(minor_t minor)
6210Sstevel@tonic-gate {
6227882SBhargava.Yenduri@Sun.COM 	crypto_minor_t *cm;
6239505SBhargava.Yenduri@Sun.COM 	kcf_lock_withpad_t *mp;
6247882SBhargava.Yenduri@Sun.COM 
6257882SBhargava.Yenduri@Sun.COM 	if (minor > crypto_minors_table_count)
6267882SBhargava.Yenduri@Sun.COM 		return (NULL);
6270Sstevel@tonic-gate 
6289505SBhargava.Yenduri@Sun.COM 	mp = &crypto_locks[CPU_SEQID];
6299505SBhargava.Yenduri@Sun.COM 	mutex_enter(&mp->kl_lock);
6309505SBhargava.Yenduri@Sun.COM 
6317882SBhargava.Yenduri@Sun.COM 	if ((cm = crypto_minors[minor - 1]) != NULL) {
6329505SBhargava.Yenduri@Sun.COM 		atomic_add_32(&cm->cm_refcnt, 1);
6339505SBhargava.Yenduri@Sun.COM 	}
6349505SBhargava.Yenduri@Sun.COM 	mutex_exit(&mp->kl_lock);
6350Sstevel@tonic-gate 	return (cm);
6360Sstevel@tonic-gate }
6370Sstevel@tonic-gate 
6380Sstevel@tonic-gate static void
6390Sstevel@tonic-gate crypto_release_minor(crypto_minor_t *cm)
6400Sstevel@tonic-gate {
6419505SBhargava.Yenduri@Sun.COM 	if (atomic_add_32_nv(&cm->cm_refcnt, -1) == 0) {
6427882SBhargava.Yenduri@Sun.COM 		cv_signal(&cm->cm_cv);
6430Sstevel@tonic-gate 	}
6440Sstevel@tonic-gate }
6450Sstevel@tonic-gate 
6460Sstevel@tonic-gate /*
6474072Skrishna  * Build a list of functions and other information for the provider, pd.
6480Sstevel@tonic-gate  */
6490Sstevel@tonic-gate static void
6500Sstevel@tonic-gate crypto_build_function_list(crypto_function_list_t *fl, kcf_provider_desc_t *pd)
6510Sstevel@tonic-gate {
6520Sstevel@tonic-gate 	crypto_ops_t *ops;
6530Sstevel@tonic-gate 	crypto_digest_ops_t *digest_ops;
6540Sstevel@tonic-gate 	crypto_cipher_ops_t *cipher_ops;
6550Sstevel@tonic-gate 	crypto_mac_ops_t *mac_ops;
6560Sstevel@tonic-gate 	crypto_sign_ops_t *sign_ops;
6570Sstevel@tonic-gate 	crypto_verify_ops_t *verify_ops;
6580Sstevel@tonic-gate 	crypto_dual_ops_t *dual_ops;
6590Sstevel@tonic-gate 	crypto_random_number_ops_t *random_number_ops;
6600Sstevel@tonic-gate 	crypto_session_ops_t *session_ops;
6610Sstevel@tonic-gate 	crypto_object_ops_t *object_ops;
6620Sstevel@tonic-gate 	crypto_key_ops_t *key_ops;
6630Sstevel@tonic-gate 	crypto_provider_management_ops_t *provider_ops;
6640Sstevel@tonic-gate 
6650Sstevel@tonic-gate 	if ((ops = pd->pd_ops_vector) == NULL)
6660Sstevel@tonic-gate 		return;
6670Sstevel@tonic-gate 
668904Smcpowers 	if ((digest_ops = ops->co_digest_ops) != NULL) {
6690Sstevel@tonic-gate 		if (digest_ops->digest_init != NULL)
6700Sstevel@tonic-gate 			fl->fl_digest_init = B_TRUE;
6710Sstevel@tonic-gate 		if (digest_ops->digest != NULL)
6720Sstevel@tonic-gate 			fl->fl_digest = B_TRUE;
6730Sstevel@tonic-gate 		if (digest_ops->digest_update != NULL)
6740Sstevel@tonic-gate 			fl->fl_digest_update = B_TRUE;
6750Sstevel@tonic-gate 		if (digest_ops->digest_key != NULL)
6760Sstevel@tonic-gate 			fl->fl_digest_key = B_TRUE;
6770Sstevel@tonic-gate 		if (digest_ops->digest_final != NULL)
6780Sstevel@tonic-gate 			fl->fl_digest_final = B_TRUE;
6790Sstevel@tonic-gate 	}
680904Smcpowers 	if ((cipher_ops = ops->co_cipher_ops) != NULL) {
6810Sstevel@tonic-gate 		if (cipher_ops->encrypt_init != NULL)
6820Sstevel@tonic-gate 			fl->fl_encrypt_init = B_TRUE;
6830Sstevel@tonic-gate 		if (cipher_ops->encrypt != NULL)
6840Sstevel@tonic-gate 			fl->fl_encrypt = B_TRUE;
6850Sstevel@tonic-gate 		if (cipher_ops->encrypt_update != NULL)
6860Sstevel@tonic-gate 			fl->fl_encrypt_update = B_TRUE;
6870Sstevel@tonic-gate 		if (cipher_ops->encrypt_final != NULL)
6880Sstevel@tonic-gate 			fl->fl_encrypt_final = B_TRUE;
6890Sstevel@tonic-gate 		if (cipher_ops->decrypt_init != NULL)
6900Sstevel@tonic-gate 			fl->fl_decrypt_init = B_TRUE;
6910Sstevel@tonic-gate 		if (cipher_ops->decrypt != NULL)
6920Sstevel@tonic-gate 			fl->fl_decrypt = B_TRUE;
6930Sstevel@tonic-gate 		if (cipher_ops->decrypt_update != NULL)
6940Sstevel@tonic-gate 			fl->fl_decrypt_update = B_TRUE;
6950Sstevel@tonic-gate 		if (cipher_ops->decrypt_final != NULL)
6960Sstevel@tonic-gate 			fl->fl_decrypt_final = B_TRUE;
6970Sstevel@tonic-gate 	}
698904Smcpowers 	if ((mac_ops = ops->co_mac_ops) != NULL) {
6990Sstevel@tonic-gate 		if (mac_ops->mac_init != NULL)
7000Sstevel@tonic-gate 			fl->fl_mac_init = B_TRUE;
7010Sstevel@tonic-gate 		if (mac_ops->mac != NULL)
7020Sstevel@tonic-gate 			fl->fl_mac = B_TRUE;
7030Sstevel@tonic-gate 		if (mac_ops->mac_update != NULL)
7040Sstevel@tonic-gate 			fl->fl_mac_update = B_TRUE;
7050Sstevel@tonic-gate 		if (mac_ops->mac_final != NULL)
7060Sstevel@tonic-gate 			fl->fl_mac_final = B_TRUE;
7070Sstevel@tonic-gate 	}
708904Smcpowers 	if ((sign_ops = ops->co_sign_ops) != NULL) {
7090Sstevel@tonic-gate 		if (sign_ops->sign_init != NULL)
7100Sstevel@tonic-gate 			fl->fl_sign_init = B_TRUE;
7110Sstevel@tonic-gate 		if (sign_ops->sign != NULL)
7120Sstevel@tonic-gate 			fl->fl_sign = B_TRUE;
7130Sstevel@tonic-gate 		if (sign_ops->sign_update != NULL)
7140Sstevel@tonic-gate 			fl->fl_sign_update = B_TRUE;
7150Sstevel@tonic-gate 		if (sign_ops->sign_final != NULL)
7160Sstevel@tonic-gate 			fl->fl_sign_final = B_TRUE;
7170Sstevel@tonic-gate 		if (sign_ops->sign_recover_init != NULL)
7180Sstevel@tonic-gate 			fl->fl_sign_recover_init = B_TRUE;
7190Sstevel@tonic-gate 		if (sign_ops->sign_recover != NULL)
7200Sstevel@tonic-gate 			fl->fl_sign_recover = B_TRUE;
7210Sstevel@tonic-gate 	}
722904Smcpowers 	if ((verify_ops = ops->co_verify_ops) != NULL) {
7230Sstevel@tonic-gate 		if (verify_ops->verify_init != NULL)
7240Sstevel@tonic-gate 			fl->fl_verify_init = B_TRUE;
7250Sstevel@tonic-gate 		if (verify_ops->verify != NULL)
7260Sstevel@tonic-gate 			fl->fl_verify = B_TRUE;
7270Sstevel@tonic-gate 		if (verify_ops->verify_update != NULL)
7280Sstevel@tonic-gate 			fl->fl_verify_update = B_TRUE;
7290Sstevel@tonic-gate 		if (verify_ops->verify_final != NULL)
7300Sstevel@tonic-gate 			fl->fl_verify_final = B_TRUE;
7310Sstevel@tonic-gate 		if (verify_ops->verify_recover_init != NULL)
7320Sstevel@tonic-gate 			fl->fl_verify_recover_init = B_TRUE;
7330Sstevel@tonic-gate 		if (verify_ops->verify_recover != NULL)
7340Sstevel@tonic-gate 			fl->fl_verify_recover = B_TRUE;
7350Sstevel@tonic-gate 	}
736904Smcpowers 	if ((dual_ops = ops->co_dual_ops) != NULL) {
7370Sstevel@tonic-gate 		if (dual_ops->digest_encrypt_update != NULL)
7380Sstevel@tonic-gate 			fl->fl_digest_encrypt_update = B_TRUE;
7390Sstevel@tonic-gate 		if (dual_ops->decrypt_digest_update != NULL)
7400Sstevel@tonic-gate 			fl->fl_decrypt_digest_update = B_TRUE;
7410Sstevel@tonic-gate 		if (dual_ops->sign_encrypt_update != NULL)
7420Sstevel@tonic-gate 			fl->fl_sign_encrypt_update = B_TRUE;
7430Sstevel@tonic-gate 		if (dual_ops->decrypt_verify_update != NULL)
7440Sstevel@tonic-gate 			fl->fl_decrypt_verify_update = B_TRUE;
7450Sstevel@tonic-gate 	}
746904Smcpowers 	if ((random_number_ops = ops->co_random_ops) != NULL) {
7470Sstevel@tonic-gate 		if (random_number_ops->seed_random != NULL)
7480Sstevel@tonic-gate 			fl->fl_seed_random = B_TRUE;
7490Sstevel@tonic-gate 		if (random_number_ops->generate_random != NULL)
7500Sstevel@tonic-gate 			fl->fl_generate_random = B_TRUE;
7510Sstevel@tonic-gate 	}
752904Smcpowers 	if ((session_ops = ops->co_session_ops) != NULL) {
7530Sstevel@tonic-gate 		if (session_ops->session_open != NULL)
7540Sstevel@tonic-gate 			fl->fl_session_open = B_TRUE;
7550Sstevel@tonic-gate 		if (session_ops->session_close != NULL)
7560Sstevel@tonic-gate 			fl->fl_session_close = B_TRUE;
7570Sstevel@tonic-gate 		if (session_ops->session_login != NULL)
7580Sstevel@tonic-gate 			fl->fl_session_login = B_TRUE;
7590Sstevel@tonic-gate 		if (session_ops->session_logout != NULL)
7600Sstevel@tonic-gate 			fl->fl_session_logout = B_TRUE;
7610Sstevel@tonic-gate 	}
762904Smcpowers 	if ((object_ops = ops->co_object_ops) != NULL) {
7630Sstevel@tonic-gate 		if (object_ops->object_create != NULL)
7640Sstevel@tonic-gate 			fl->fl_object_create = B_TRUE;
7650Sstevel@tonic-gate 		if (object_ops->object_copy != NULL)
7660Sstevel@tonic-gate 			fl->fl_object_copy = B_TRUE;
7670Sstevel@tonic-gate 		if (object_ops->object_destroy != NULL)
7680Sstevel@tonic-gate 			fl->fl_object_destroy = B_TRUE;
7690Sstevel@tonic-gate 		if (object_ops->object_get_size != NULL)
7700Sstevel@tonic-gate 			fl->fl_object_get_size = B_TRUE;
7710Sstevel@tonic-gate 		if (object_ops->object_get_attribute_value != NULL)
7720Sstevel@tonic-gate 			fl->fl_object_get_attribute_value = B_TRUE;
7730Sstevel@tonic-gate 		if (object_ops->object_set_attribute_value != NULL)
7740Sstevel@tonic-gate 			fl->fl_object_set_attribute_value = B_TRUE;
7750Sstevel@tonic-gate 		if (object_ops->object_find_init != NULL)
7760Sstevel@tonic-gate 			fl->fl_object_find_init = B_TRUE;
7770Sstevel@tonic-gate 		if (object_ops->object_find != NULL)
7780Sstevel@tonic-gate 			fl->fl_object_find = B_TRUE;
7790Sstevel@tonic-gate 		if (object_ops->object_find_final != NULL)
7800Sstevel@tonic-gate 			fl->fl_object_find_final = B_TRUE;
7810Sstevel@tonic-gate 	}
782904Smcpowers 	if ((key_ops = ops->co_key_ops) != NULL) {
7830Sstevel@tonic-gate 		if (key_ops->key_generate != NULL)
7840Sstevel@tonic-gate 			fl->fl_key_generate = B_TRUE;
7850Sstevel@tonic-gate 		if (key_ops->key_generate_pair != NULL)
7860Sstevel@tonic-gate 			fl->fl_key_generate_pair = B_TRUE;
7870Sstevel@tonic-gate 		if (key_ops->key_wrap != NULL)
7880Sstevel@tonic-gate 			fl->fl_key_wrap = B_TRUE;
7890Sstevel@tonic-gate 		if (key_ops->key_unwrap != NULL)
7900Sstevel@tonic-gate 			fl->fl_key_unwrap = B_TRUE;
7910Sstevel@tonic-gate 		if (key_ops->key_derive != NULL)
7920Sstevel@tonic-gate 			fl->fl_key_derive = B_TRUE;
7930Sstevel@tonic-gate 	}
794904Smcpowers 	if ((provider_ops = ops->co_provider_ops) != NULL) {
7950Sstevel@tonic-gate 		if (provider_ops->init_token != NULL)
7960Sstevel@tonic-gate 			fl->fl_init_token = B_TRUE;
7970Sstevel@tonic-gate 		if (provider_ops->init_pin != NULL)
7980Sstevel@tonic-gate 			fl->fl_init_pin = B_TRUE;
7990Sstevel@tonic-gate 		if (provider_ops->set_pin != NULL)
8000Sstevel@tonic-gate 			fl->fl_set_pin = B_TRUE;
8010Sstevel@tonic-gate 	}
8024072Skrishna 
803*11304SJanie.Lu@Sun.COM 	fl->prov_is_hash_limited = pd->pd_flags & CRYPTO_HASH_NO_UPDATE;
804*11304SJanie.Lu@Sun.COM 	if (fl->prov_is_hash_limited) {
805*11304SJanie.Lu@Sun.COM 		fl->prov_hash_limit = min(pd->pd_hash_limit,
806*11304SJanie.Lu@Sun.COM 		    min(CRYPTO_MAX_BUFFER_LEN,
807*11304SJanie.Lu@Sun.COM 		    curproc->p_task->tk_proj->kpj_data.kpd_crypto_mem_ctl));
808*11304SJanie.Lu@Sun.COM 	}
809*11304SJanie.Lu@Sun.COM 
810*11304SJanie.Lu@Sun.COM 	fl->prov_is_hmac_limited = pd->pd_flags & CRYPTO_HMAC_NO_UPDATE;
811*11304SJanie.Lu@Sun.COM 	if (fl->prov_is_hmac_limited) {
812*11304SJanie.Lu@Sun.COM 		fl->prov_hmac_limit = min(pd->pd_hmac_limit,
813*11304SJanie.Lu@Sun.COM 		    min(CRYPTO_MAX_BUFFER_LEN,
814*11304SJanie.Lu@Sun.COM 		    curproc->p_task->tk_proj->kpj_data.kpd_crypto_mem_ctl));
815*11304SJanie.Lu@Sun.COM 	}
816*11304SJanie.Lu@Sun.COM 
817*11304SJanie.Lu@Sun.COM 	if (fl->prov_is_hash_limited || fl->prov_is_hmac_limited) {
8184072Skrishna 		/*
819*11304SJanie.Lu@Sun.COM 		 * XXX - The threshold should ideally be per hash/HMAC
8204072Skrishna 		 * mechanism. For now, we use the same value for all
821*11304SJanie.Lu@Sun.COM 		 * hash/HMAC mechanisms. Empirical evidence suggests this
8224072Skrishna 		 * is fine.
8234072Skrishna 		 */
8244072Skrishna 		fl->prov_hash_threshold = kcf_md5_threshold;
8254072Skrishna 	}
8264841Shaimay 
8274841Shaimay 	fl->total_threshold_count = MAX_NUM_THRESHOLD;
8284841Shaimay 	fl->fl_threshold[0].mech_type = CKM_DES3_CBC;
8294841Shaimay 	fl->fl_threshold[0].mech_threshold = kcf_des3_threshold;
8304841Shaimay 	fl->fl_threshold[1].mech_type = CKM_DES3_ECB;
8314841Shaimay 	fl->fl_threshold[1].mech_threshold = kcf_des3_threshold;
8324841Shaimay 	fl->fl_threshold[2].mech_type = CKM_AES_CBC;
8334841Shaimay 	fl->fl_threshold[2].mech_threshold = kcf_aes_threshold;
8344841Shaimay 	fl->fl_threshold[3].mech_type = CKM_AES_ECB;
8354841Shaimay 	fl->fl_threshold[3].mech_threshold = kcf_aes_threshold;
8364841Shaimay 	fl->fl_threshold[4].mech_type = CKM_RC4;
8374841Shaimay 	fl->fl_threshold[4].mech_threshold = kcf_rc4_threshold;
8384841Shaimay 	fl->fl_threshold[5].mech_type = CKM_MD5;
8394841Shaimay 	fl->fl_threshold[5].mech_threshold = kcf_md5_threshold;
8404841Shaimay 	fl->fl_threshold[6].mech_type = CKM_SHA_1;
8414841Shaimay 	fl->fl_threshold[6].mech_threshold = kcf_sha1_threshold;
8420Sstevel@tonic-gate }
8430Sstevel@tonic-gate 
8440Sstevel@tonic-gate /* ARGSUSED */
8450Sstevel@tonic-gate static int
8460Sstevel@tonic-gate get_function_list(dev_t dev, caddr_t arg, int mode, int *rval)
8470Sstevel@tonic-gate {
8480Sstevel@tonic-gate 	crypto_get_function_list_t get_function_list;
8490Sstevel@tonic-gate 	crypto_minor_t *cm;
8500Sstevel@tonic-gate 	crypto_provider_id_t provider_id;
8510Sstevel@tonic-gate 	crypto_function_list_t *fl;
8520Sstevel@tonic-gate 	kcf_provider_desc_t *provider;
8530Sstevel@tonic-gate 	int rv;
8540Sstevel@tonic-gate 
8550Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
8560Sstevel@tonic-gate 		cmn_err(CE_WARN, "get_function_list: failed holding minor");
8570Sstevel@tonic-gate 		return (ENXIO);
8580Sstevel@tonic-gate 	}
8590Sstevel@tonic-gate 
8600Sstevel@tonic-gate 	if (copyin(arg, &get_function_list, sizeof (get_function_list)) != 0) {
8610Sstevel@tonic-gate 		crypto_release_minor(cm);
8620Sstevel@tonic-gate 		return (EFAULT);
8630Sstevel@tonic-gate 	}
8640Sstevel@tonic-gate 
8650Sstevel@tonic-gate 	/* initialize provider_array */
8660Sstevel@tonic-gate 	if (cm->cm_provider_array == NULL) {
8670Sstevel@tonic-gate 		rv = crypto_get_provider_list(cm, NULL, NULL, DONT_RETURN_LIST);
8680Sstevel@tonic-gate 		if (rv != CRYPTO_SUCCESS) {
8690Sstevel@tonic-gate 			goto release_minor;
8700Sstevel@tonic-gate 		}
8710Sstevel@tonic-gate 	}
8720Sstevel@tonic-gate 
8730Sstevel@tonic-gate 	provider_id = get_function_list.fl_provider_id;
8740Sstevel@tonic-gate 	mutex_enter(&cm->cm_lock);
8750Sstevel@tonic-gate 	/* index must be less than count of providers */
8760Sstevel@tonic-gate 	if (provider_id >= cm->cm_provider_count) {
8770Sstevel@tonic-gate 		mutex_exit(&cm->cm_lock);
8780Sstevel@tonic-gate 		rv = CRYPTO_ARGUMENTS_BAD;
8790Sstevel@tonic-gate 		goto release_minor;
8800Sstevel@tonic-gate 	}
8810Sstevel@tonic-gate 
8820Sstevel@tonic-gate 	ASSERT(cm->cm_provider_array != NULL);
8830Sstevel@tonic-gate 	provider = cm->cm_provider_array[provider_id];
8840Sstevel@tonic-gate 	mutex_exit(&cm->cm_lock);
8850Sstevel@tonic-gate 
8860Sstevel@tonic-gate 	fl = &get_function_list.fl_list;
8870Sstevel@tonic-gate 	bzero(fl, sizeof (crypto_function_list_t));
8880Sstevel@tonic-gate 
8890Sstevel@tonic-gate 	if (provider->pd_prov_type != CRYPTO_LOGICAL_PROVIDER) {
8900Sstevel@tonic-gate 		crypto_build_function_list(fl, provider);
8910Sstevel@tonic-gate 	} else {
8920Sstevel@tonic-gate 		kcf_provider_desc_t *prev = NULL, *pd;
8930Sstevel@tonic-gate 
8940Sstevel@tonic-gate 		mutex_enter(&provider->pd_lock);
8950Sstevel@tonic-gate 		while (kcf_get_next_logical_provider_member(provider,
8960Sstevel@tonic-gate 		    prev, &pd)) {
8970Sstevel@tonic-gate 			prev = pd;
8980Sstevel@tonic-gate 			crypto_build_function_list(fl, pd);
8990Sstevel@tonic-gate 			KCF_PROV_REFRELE(pd);
9000Sstevel@tonic-gate 		}
9010Sstevel@tonic-gate 		mutex_exit(&provider->pd_lock);
9020Sstevel@tonic-gate 	}
9030Sstevel@tonic-gate 
9040Sstevel@tonic-gate 	rv = CRYPTO_SUCCESS;
9050Sstevel@tonic-gate 
9060Sstevel@tonic-gate release_minor:
9070Sstevel@tonic-gate 	crypto_release_minor(cm);
9080Sstevel@tonic-gate 
9090Sstevel@tonic-gate 	get_function_list.fl_return_value = rv;
9100Sstevel@tonic-gate 
9110Sstevel@tonic-gate 	if (copyout(&get_function_list, arg, sizeof (get_function_list)) != 0) {
9120Sstevel@tonic-gate 		return (EFAULT);
9130Sstevel@tonic-gate 	}
9140Sstevel@tonic-gate 	return (0);
9150Sstevel@tonic-gate }
9160Sstevel@tonic-gate 
9170Sstevel@tonic-gate /*
9180Sstevel@tonic-gate  * This ioctl maps a PKCS#11 mechanism string into an internal number
9190Sstevel@tonic-gate  * that is used by the kernel.  pn_internal_number is set to the
9200Sstevel@tonic-gate  * internal number.
9210Sstevel@tonic-gate  */
9220Sstevel@tonic-gate /* ARGSUSED */
9230Sstevel@tonic-gate static int
9240Sstevel@tonic-gate get_mechanism_number(dev_t dev, caddr_t arg, int mode, int *rval)
9250Sstevel@tonic-gate {
9260Sstevel@tonic-gate 	STRUCT_DECL(crypto_get_mechanism_number, get_number);
9270Sstevel@tonic-gate 	crypto_mech_type_t number;
9280Sstevel@tonic-gate 	size_t len;
9290Sstevel@tonic-gate 	char *mechanism_name;
9300Sstevel@tonic-gate 	int rv;
9310Sstevel@tonic-gate 
9320Sstevel@tonic-gate 	STRUCT_INIT(get_number, mode);
9330Sstevel@tonic-gate 
9340Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(get_number), STRUCT_SIZE(get_number)) != 0)
9350Sstevel@tonic-gate 		return (EFAULT);
9360Sstevel@tonic-gate 
9370Sstevel@tonic-gate 	len = STRUCT_FGET(get_number, pn_mechanism_len);
9380Sstevel@tonic-gate 	if (len == 0 || len > CRYPTO_MAX_MECH_NAME) {
9390Sstevel@tonic-gate 		rv = CRYPTO_ARGUMENTS_BAD;
9400Sstevel@tonic-gate 		goto out;
9410Sstevel@tonic-gate 	}
9420Sstevel@tonic-gate 	mechanism_name = kmem_alloc(len, KM_SLEEP);
9430Sstevel@tonic-gate 
9440Sstevel@tonic-gate 	if (copyin(STRUCT_FGETP(get_number, pn_mechanism_string),
9450Sstevel@tonic-gate 	    mechanism_name, len) != 0) {
9460Sstevel@tonic-gate 		kmem_free(mechanism_name, len);
9470Sstevel@tonic-gate 		return (EFAULT);
9480Sstevel@tonic-gate 	}
9490Sstevel@tonic-gate 
9502935Skrishna 	/*
9512935Skrishna 	 * Get mechanism number from kcf. We set the load_module
9522935Skrishna 	 * flag to false since we use only hardware providers.
9532935Skrishna 	 */
9542935Skrishna 	number = crypto_mech2id_common(mechanism_name, B_FALSE);
9550Sstevel@tonic-gate 	kmem_free(mechanism_name, len);
9560Sstevel@tonic-gate 	if (number == CRYPTO_MECH_INVALID) {
9570Sstevel@tonic-gate 		rv = CRYPTO_ARGUMENTS_BAD;
9580Sstevel@tonic-gate 		goto out;
9590Sstevel@tonic-gate 	}
9600Sstevel@tonic-gate 
9610Sstevel@tonic-gate 	bcopy((char *)&number, (char *)STRUCT_FADDR(get_number,
9620Sstevel@tonic-gate 	    pn_internal_number), sizeof (number));
9630Sstevel@tonic-gate 
9640Sstevel@tonic-gate 	rv = CRYPTO_SUCCESS;
9650Sstevel@tonic-gate out:
9660Sstevel@tonic-gate 	STRUCT_FSET(get_number, pn_return_value, rv);
9670Sstevel@tonic-gate 
9680Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(get_number), arg,
9690Sstevel@tonic-gate 	    STRUCT_SIZE(get_number)) != 0) {
9700Sstevel@tonic-gate 		return (EFAULT);
9710Sstevel@tonic-gate 	}
9720Sstevel@tonic-gate 	return (0);
9730Sstevel@tonic-gate }
9740Sstevel@tonic-gate 
9750Sstevel@tonic-gate /*
9768313SDina.Nimeh@Sun.Com  * This ioctl returns an array of crypto_mech_name_t entries.
9778313SDina.Nimeh@Sun.Com  * It lists all the PKCS#11 mechanisms available in the kernel.
9788313SDina.Nimeh@Sun.Com  */
9798313SDina.Nimeh@Sun.Com /* ARGSUSED */
9808313SDina.Nimeh@Sun.Com static int
9818313SDina.Nimeh@Sun.Com get_mechanism_list(dev_t dev, caddr_t arg, int mode, int *rval)
9828313SDina.Nimeh@Sun.Com {
9838313SDina.Nimeh@Sun.Com 	STRUCT_DECL(crypto_get_mechanism_list, get_list);
9848313SDina.Nimeh@Sun.Com 	crypto_mech_name_t *entries;
9858313SDina.Nimeh@Sun.Com 	size_t copyout_size;
9868313SDina.Nimeh@Sun.Com 	uint_t req_count;
9878313SDina.Nimeh@Sun.Com 	uint_t count;
9888313SDina.Nimeh@Sun.Com 	ulong_t offset;
9898313SDina.Nimeh@Sun.Com 	int error = 0;
9908313SDina.Nimeh@Sun.Com 
9918313SDina.Nimeh@Sun.Com 	STRUCT_INIT(get_list, mode);
9928313SDina.Nimeh@Sun.Com 
9938313SDina.Nimeh@Sun.Com 	if (copyin(arg, STRUCT_BUF(get_list), STRUCT_SIZE(get_list)) != 0) {
9948313SDina.Nimeh@Sun.Com 		return (EFAULT);
9958313SDina.Nimeh@Sun.Com 	}
9968313SDina.Nimeh@Sun.Com 
9978313SDina.Nimeh@Sun.Com 	entries = crypto_get_mech_list(&count, KM_SLEEP);
9988313SDina.Nimeh@Sun.Com 
9998313SDina.Nimeh@Sun.Com 	/* Number of entries caller thinks we have */
10008313SDina.Nimeh@Sun.Com 	req_count = STRUCT_FGET(get_list, ml_count);
10018313SDina.Nimeh@Sun.Com 
10028313SDina.Nimeh@Sun.Com 	STRUCT_FSET(get_list, ml_count, count);
10038313SDina.Nimeh@Sun.Com 	STRUCT_FSET(get_list, ml_return_value, CRYPTO_SUCCESS);
10048313SDina.Nimeh@Sun.Com 
10058313SDina.Nimeh@Sun.Com 	/* check if buffer is too small */
10068313SDina.Nimeh@Sun.Com 	if (count > req_count) {
10078313SDina.Nimeh@Sun.Com 		STRUCT_FSET(get_list, ml_return_value, CRYPTO_BUFFER_TOO_SMALL);
10088313SDina.Nimeh@Sun.Com 	}
10098313SDina.Nimeh@Sun.Com 
10108313SDina.Nimeh@Sun.Com 	/* copyout the first stuff */
10118313SDina.Nimeh@Sun.Com 	if (copyout(STRUCT_BUF(get_list), arg, STRUCT_SIZE(get_list)) != 0) {
10128313SDina.Nimeh@Sun.Com 		error = EFAULT;
10138313SDina.Nimeh@Sun.Com 	}
10148313SDina.Nimeh@Sun.Com 
10158313SDina.Nimeh@Sun.Com 	/*
10168313SDina.Nimeh@Sun.Com 	 * If only requesting number of entries or buffer too small or an
10178313SDina.Nimeh@Sun.Com 	 * error occurred, stop here
10188313SDina.Nimeh@Sun.Com 	 */
10198313SDina.Nimeh@Sun.Com 	if (req_count == 0 || count > req_count || error != 0) {
10208313SDina.Nimeh@Sun.Com 		goto out;
10218313SDina.Nimeh@Sun.Com 	}
10228313SDina.Nimeh@Sun.Com 
10238313SDina.Nimeh@Sun.Com 	copyout_size = count * sizeof (crypto_mech_name_t);
10248313SDina.Nimeh@Sun.Com 
10258313SDina.Nimeh@Sun.Com 	/* copyout entries */
10268313SDina.Nimeh@Sun.Com 	offset = (ulong_t)STRUCT_FADDR(get_list, ml_list);
10278313SDina.Nimeh@Sun.Com 	offset -= (ulong_t)STRUCT_BUF(get_list);
10288313SDina.Nimeh@Sun.Com 	if (copyout(entries, arg + offset, copyout_size) != 0) {
10298313SDina.Nimeh@Sun.Com 		error = EFAULT;
10308313SDina.Nimeh@Sun.Com 	}
10318313SDina.Nimeh@Sun.Com 
10328313SDina.Nimeh@Sun.Com out:
10338313SDina.Nimeh@Sun.Com 	crypto_free_mech_list(entries, count);
10348313SDina.Nimeh@Sun.Com 	return (error);
10358313SDina.Nimeh@Sun.Com }
10368313SDina.Nimeh@Sun.Com 
10378313SDina.Nimeh@Sun.Com /*
10388313SDina.Nimeh@Sun.Com  * Copyout kernel array of mech_infos to user space.
10398313SDina.Nimeh@Sun.Com  */
10408313SDina.Nimeh@Sun.Com /* ARGSUSED */
10418313SDina.Nimeh@Sun.Com static int
10428313SDina.Nimeh@Sun.Com copyout_mechinfos(int mode, caddr_t out, uint_t count,
10438313SDina.Nimeh@Sun.Com     crypto_mechanism_info_t *k_minfos, caddr_t u_minfos)
10448313SDina.Nimeh@Sun.Com {
10458313SDina.Nimeh@Sun.Com 	STRUCT_DECL(crypto_mechanism_info, mi);
10468313SDina.Nimeh@Sun.Com 	caddr_t p;
10478313SDina.Nimeh@Sun.Com 	size_t len;
10488313SDina.Nimeh@Sun.Com 	int i;
10498313SDina.Nimeh@Sun.Com 
10508313SDina.Nimeh@Sun.Com 	if (count == 0)
10518313SDina.Nimeh@Sun.Com 		return (0);
10528313SDina.Nimeh@Sun.Com 
10538313SDina.Nimeh@Sun.Com 	STRUCT_INIT(mi, mode);
10548313SDina.Nimeh@Sun.Com 
10558313SDina.Nimeh@Sun.Com 	len = count * STRUCT_SIZE(mi);
10568313SDina.Nimeh@Sun.Com 
10578313SDina.Nimeh@Sun.Com 	ASSERT(u_minfos != NULL);
10588313SDina.Nimeh@Sun.Com 	p = u_minfos;
10598313SDina.Nimeh@Sun.Com 	for (i = 0; i < count; i++) {
10608313SDina.Nimeh@Sun.Com 		STRUCT_FSET(mi, mi_min_key_size, k_minfos[i].mi_min_key_size);
10618313SDina.Nimeh@Sun.Com 		STRUCT_FSET(mi, mi_max_key_size, k_minfos[i].mi_max_key_size);
10628313SDina.Nimeh@Sun.Com 		STRUCT_FSET(mi, mi_keysize_unit, k_minfos[i].mi_keysize_unit);
10638313SDina.Nimeh@Sun.Com 		STRUCT_FSET(mi, mi_usage, k_minfos[i].mi_usage);
10648313SDina.Nimeh@Sun.Com 		bcopy(STRUCT_BUF(mi), p, STRUCT_SIZE(mi));
10658313SDina.Nimeh@Sun.Com 		p += STRUCT_SIZE(mi);
10668313SDina.Nimeh@Sun.Com 	}
10678313SDina.Nimeh@Sun.Com 
10688313SDina.Nimeh@Sun.Com 	if (copyout(u_minfos, out, len) != 0)
10698313SDina.Nimeh@Sun.Com 		return (EFAULT);
10708313SDina.Nimeh@Sun.Com 
10718313SDina.Nimeh@Sun.Com 	return (0);
10728313SDina.Nimeh@Sun.Com }
10738313SDina.Nimeh@Sun.Com 
10748313SDina.Nimeh@Sun.Com /*
10758313SDina.Nimeh@Sun.Com  * This ioctl returns information for the specified mechanism.
10768313SDina.Nimeh@Sun.Com  */
10778313SDina.Nimeh@Sun.Com /* ARGSUSED */
10788313SDina.Nimeh@Sun.Com static int
10798313SDina.Nimeh@Sun.Com get_all_mechanism_info(dev_t dev, caddr_t arg, int mode, int *rval)
10808313SDina.Nimeh@Sun.Com {
10818313SDina.Nimeh@Sun.Com 	STRUCT_DECL(crypto_get_all_mechanism_info, get_all_mech);
10828319SDina.Nimeh@Sun.Com 	/* LINTED E_FUNC_SET_NOT_USED */
10838313SDina.Nimeh@Sun.Com 	STRUCT_DECL(crypto_mechanism_info, mi);
10848313SDina.Nimeh@Sun.Com 	crypto_mech_name_t mech_name;
10858313SDina.Nimeh@Sun.Com 	crypto_mech_type_t mech_type;
10868313SDina.Nimeh@Sun.Com 	crypto_mechanism_info_t *mech_infos = NULL;
10878313SDina.Nimeh@Sun.Com 	uint_t num_mech_infos = 0;
10888313SDina.Nimeh@Sun.Com 	uint_t req_count;
10898313SDina.Nimeh@Sun.Com 	caddr_t u_minfos;
10908313SDina.Nimeh@Sun.Com 	ulong_t offset;
10918313SDina.Nimeh@Sun.Com 	int error = 0;
10928313SDina.Nimeh@Sun.Com 	int rv;
10938313SDina.Nimeh@Sun.Com 
10948313SDina.Nimeh@Sun.Com 	STRUCT_INIT(get_all_mech, mode);
10958313SDina.Nimeh@Sun.Com 	STRUCT_INIT(mi, mode);
10968313SDina.Nimeh@Sun.Com 
10978313SDina.Nimeh@Sun.Com 	if (copyin(arg, STRUCT_BUF(get_all_mech),
10988313SDina.Nimeh@Sun.Com 	    STRUCT_SIZE(get_all_mech)) != 0) {
10998313SDina.Nimeh@Sun.Com 		return (EFAULT);
11008313SDina.Nimeh@Sun.Com 	}
11018313SDina.Nimeh@Sun.Com 
11028313SDina.Nimeh@Sun.Com 	(void) strncpy(mech_name, STRUCT_FGET(get_all_mech, mi_mechanism_name),
11038313SDina.Nimeh@Sun.Com 	    CRYPTO_MAX_MECH_NAME);
11048313SDina.Nimeh@Sun.Com 	mech_type = crypto_mech2id(mech_name);
11058313SDina.Nimeh@Sun.Com 
11068313SDina.Nimeh@Sun.Com 	if (mech_type == CRYPTO_MECH_INVALID) {
11078313SDina.Nimeh@Sun.Com 		rv = CRYPTO_ARGUMENTS_BAD;
11088313SDina.Nimeh@Sun.Com 		goto out1;
11098313SDina.Nimeh@Sun.Com 	}
11108313SDina.Nimeh@Sun.Com 
11118313SDina.Nimeh@Sun.Com 	rv = crypto_get_all_mech_info(mech_type, &mech_infos, &num_mech_infos,
11128313SDina.Nimeh@Sun.Com 	    KM_SLEEP);
11138313SDina.Nimeh@Sun.Com 	if (rv != CRYPTO_SUCCESS) {
11148313SDina.Nimeh@Sun.Com 		goto out1;
11158313SDina.Nimeh@Sun.Com 	}
11168313SDina.Nimeh@Sun.Com 	/* rv is CRYPTO_SUCCESS at this point */
11178313SDina.Nimeh@Sun.Com 
11188313SDina.Nimeh@Sun.Com 	/* Number of entries caller thinks we have */
11198313SDina.Nimeh@Sun.Com 	req_count = STRUCT_FGET(get_all_mech, mi_count);
11208313SDina.Nimeh@Sun.Com 
11218313SDina.Nimeh@Sun.Com 	STRUCT_FSET(get_all_mech, mi_count, num_mech_infos);
11228313SDina.Nimeh@Sun.Com 
11238313SDina.Nimeh@Sun.Com 	/* check if buffer is too small */
11248313SDina.Nimeh@Sun.Com 	if (num_mech_infos > req_count) {
11258313SDina.Nimeh@Sun.Com 		rv = CRYPTO_BUFFER_TOO_SMALL;
11268313SDina.Nimeh@Sun.Com 	}
11278313SDina.Nimeh@Sun.Com 
11288313SDina.Nimeh@Sun.Com out1:
11298313SDina.Nimeh@Sun.Com 	STRUCT_FSET(get_all_mech, mi_return_value, rv);
11308313SDina.Nimeh@Sun.Com 
11318313SDina.Nimeh@Sun.Com 	/* copy the first part */
11328313SDina.Nimeh@Sun.Com 	if (copyout(STRUCT_BUF(get_all_mech), arg,
11338313SDina.Nimeh@Sun.Com 	    STRUCT_SIZE(get_all_mech)) != 0) {
11348313SDina.Nimeh@Sun.Com 		error = EFAULT;
11358313SDina.Nimeh@Sun.Com 	}
11368313SDina.Nimeh@Sun.Com 
11378313SDina.Nimeh@Sun.Com 	/*
11388313SDina.Nimeh@Sun.Com 	 * If only requesting number of entries, or there are no entries,
11398313SDina.Nimeh@Sun.Com 	 * or rv is not CRYPTO_SUCCESS due to buffer too small or some other
11408313SDina.Nimeh@Sun.Com 	 * crypto error, or an error occurred with copyout, stop here
11418313SDina.Nimeh@Sun.Com 	 */
11428313SDina.Nimeh@Sun.Com 	if (req_count == 0 || num_mech_infos == 0 || rv != CRYPTO_SUCCESS ||
11438313SDina.Nimeh@Sun.Com 	    error != 0) {
11448313SDina.Nimeh@Sun.Com 		goto out2;
11458313SDina.Nimeh@Sun.Com 	}
11468313SDina.Nimeh@Sun.Com 
11478313SDina.Nimeh@Sun.Com 	/* copyout mech_infos */
11488313SDina.Nimeh@Sun.Com 	offset = (ulong_t)STRUCT_FADDR(get_all_mech, mi_list);
11498313SDina.Nimeh@Sun.Com 	offset -= (ulong_t)STRUCT_BUF(get_all_mech);
11508313SDina.Nimeh@Sun.Com 
11518313SDina.Nimeh@Sun.Com 	u_minfos = kmem_alloc(num_mech_infos * STRUCT_SIZE(mi), KM_SLEEP);
11528313SDina.Nimeh@Sun.Com 	error = copyout_mechinfos(mode, arg + offset, num_mech_infos,
11538313SDina.Nimeh@Sun.Com 	    mech_infos, u_minfos);
11548313SDina.Nimeh@Sun.Com 	kmem_free(u_minfos, num_mech_infos * STRUCT_SIZE(mi));
11558313SDina.Nimeh@Sun.Com out2:
11568313SDina.Nimeh@Sun.Com 	if (mech_infos != NULL)
11578313SDina.Nimeh@Sun.Com 		crypto_free_all_mech_info(mech_infos, num_mech_infos);
11588313SDina.Nimeh@Sun.Com 	return (error);
11598313SDina.Nimeh@Sun.Com }
11608313SDina.Nimeh@Sun.Com 
11618313SDina.Nimeh@Sun.Com /*
11620Sstevel@tonic-gate  * Side-effects:
11630Sstevel@tonic-gate  *  1. This routine stores provider descriptor pointers in an array
11640Sstevel@tonic-gate  *     and increments each descriptor's reference count.  The array
11650Sstevel@tonic-gate  *     is stored in per-minor number storage.
11660Sstevel@tonic-gate  *  2. Destroys the old array and creates a new one every time
11670Sstevel@tonic-gate  *     this routine is called.
11680Sstevel@tonic-gate  */
11690Sstevel@tonic-gate int
11700Sstevel@tonic-gate crypto_get_provider_list(crypto_minor_t *cm, uint_t *count,
11710Sstevel@tonic-gate     crypto_provider_entry_t **array, boolean_t return_slot_list)
11720Sstevel@tonic-gate {
11730Sstevel@tonic-gate 	kcf_provider_desc_t **provider_array;
11740Sstevel@tonic-gate 	crypto_provider_entry_t *p = NULL;
11750Sstevel@tonic-gate 	uint_t provider_count;
11760Sstevel@tonic-gate 	int rval;
11770Sstevel@tonic-gate 	int i;
11780Sstevel@tonic-gate 
11790Sstevel@tonic-gate 	/*
11800Sstevel@tonic-gate 	 * Take snapshot of provider table returning only HW entries
11810Sstevel@tonic-gate 	 * that are in a usable state. Also returns logical provider entries.
11820Sstevel@tonic-gate 	 */
11830Sstevel@tonic-gate 	rval =  kcf_get_slot_list(&provider_count, &provider_array, B_FALSE);
11840Sstevel@tonic-gate 	if (rval != CRYPTO_SUCCESS)
11850Sstevel@tonic-gate 		return (rval);
11860Sstevel@tonic-gate 
11870Sstevel@tonic-gate 	/* allocate memory before taking cm->cm_lock */
11880Sstevel@tonic-gate 	if (return_slot_list) {
11890Sstevel@tonic-gate 		if (provider_count != 0) {
11900Sstevel@tonic-gate 			p = kmem_alloc(provider_count *
11910Sstevel@tonic-gate 			    sizeof (crypto_provider_entry_t), KM_SLEEP);
11920Sstevel@tonic-gate 			for (i = 0; i < provider_count; i++) {
11930Sstevel@tonic-gate 				p[i].pe_provider_id = i;
11940Sstevel@tonic-gate 				p[i].pe_mechanism_count =
11950Sstevel@tonic-gate 				    provider_array[i]->pd_mech_list_count;
11960Sstevel@tonic-gate 			}
11970Sstevel@tonic-gate 		}
11980Sstevel@tonic-gate 		*array = p;
11990Sstevel@tonic-gate 		*count = provider_count;
12000Sstevel@tonic-gate 	}
12010Sstevel@tonic-gate 
12020Sstevel@tonic-gate 	/*
12030Sstevel@tonic-gate 	 * Free existing array of providers and replace with new list.
12040Sstevel@tonic-gate 	 */
12050Sstevel@tonic-gate 	mutex_enter(&cm->cm_lock);
12060Sstevel@tonic-gate 	if (cm->cm_provider_array != NULL) {
12070Sstevel@tonic-gate 		ASSERT(cm->cm_provider_count > 0);
12080Sstevel@tonic-gate 		kcf_free_provider_tab(cm->cm_provider_count,
12090Sstevel@tonic-gate 		    cm->cm_provider_array);
12100Sstevel@tonic-gate 	}
12110Sstevel@tonic-gate 
12120Sstevel@tonic-gate 	cm->cm_provider_array = provider_array;
12130Sstevel@tonic-gate 	cm->cm_provider_count = provider_count;
12140Sstevel@tonic-gate 	mutex_exit(&cm->cm_lock);
12150Sstevel@tonic-gate 
12160Sstevel@tonic-gate 	return (CRYPTO_SUCCESS);
12170Sstevel@tonic-gate }
12180Sstevel@tonic-gate 
12190Sstevel@tonic-gate /*
12200Sstevel@tonic-gate  * This ioctl returns an array of crypto_provider_entry_t entries.
12210Sstevel@tonic-gate  * This is how consumers learn which hardware providers are available.
12220Sstevel@tonic-gate  */
12230Sstevel@tonic-gate /* ARGSUSED */
12240Sstevel@tonic-gate static int
12250Sstevel@tonic-gate get_provider_list(dev_t dev, caddr_t arg, int mode, int *rval)
12260Sstevel@tonic-gate {
12270Sstevel@tonic-gate 	STRUCT_DECL(crypto_get_provider_list, get_list);
12280Sstevel@tonic-gate 	crypto_provider_entry_t *entries;
12290Sstevel@tonic-gate 	crypto_minor_t *cm;
12300Sstevel@tonic-gate 	size_t copyout_size;
12310Sstevel@tonic-gate 	uint_t req_count;
12320Sstevel@tonic-gate 	uint_t count;
12330Sstevel@tonic-gate 	ulong_t offset;
12340Sstevel@tonic-gate 	int rv;
12350Sstevel@tonic-gate 
12360Sstevel@tonic-gate 	STRUCT_INIT(get_list, mode);
12370Sstevel@tonic-gate 
12380Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
12390Sstevel@tonic-gate 		cmn_err(CE_WARN, "get_provider_list: failed holding minor");
12400Sstevel@tonic-gate 		return (ENXIO);
12410Sstevel@tonic-gate 	}
12420Sstevel@tonic-gate 
12430Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(get_list), STRUCT_SIZE(get_list)) != 0) {
12440Sstevel@tonic-gate 		crypto_release_minor(cm);
12450Sstevel@tonic-gate 		return (EFAULT);
12460Sstevel@tonic-gate 	}
12470Sstevel@tonic-gate 
12480Sstevel@tonic-gate 	rv = crypto_get_provider_list(cm, &count, &entries, RETURN_LIST);
12490Sstevel@tonic-gate 	if (rv != CRYPTO_SUCCESS) {
12500Sstevel@tonic-gate 		crypto_release_minor(cm);
12510Sstevel@tonic-gate 		STRUCT_FSET(get_list, pl_return_value, rv);
12520Sstevel@tonic-gate 		if (copyout(STRUCT_BUF(get_list), arg,
12530Sstevel@tonic-gate 		    STRUCT_SIZE(get_list)) != 0) {
12540Sstevel@tonic-gate 			return (EFAULT);
12550Sstevel@tonic-gate 		}
12560Sstevel@tonic-gate 		return (0);
12570Sstevel@tonic-gate 	}
12580Sstevel@tonic-gate 	crypto_release_minor(cm);
12590Sstevel@tonic-gate 
12600Sstevel@tonic-gate 	/* Number of slots caller thinks we have */
12610Sstevel@tonic-gate 	req_count = STRUCT_FGET(get_list, pl_count);
12620Sstevel@tonic-gate 
12630Sstevel@tonic-gate 	/* Check if only requesting number of slots */
12640Sstevel@tonic-gate 	if (req_count == 0) {
12650Sstevel@tonic-gate 
12660Sstevel@tonic-gate 		STRUCT_FSET(get_list, pl_count, count);
12670Sstevel@tonic-gate 		STRUCT_FSET(get_list, pl_return_value, CRYPTO_SUCCESS);
12680Sstevel@tonic-gate 
12690Sstevel@tonic-gate 		crypto_free_provider_list(entries, count);
12700Sstevel@tonic-gate 		if (copyout(STRUCT_BUF(get_list), arg,
12714632Smcpowers 		    STRUCT_SIZE(get_list)) != 0) {
12720Sstevel@tonic-gate 			return (EFAULT);
12730Sstevel@tonic-gate 		}
12740Sstevel@tonic-gate 		return (0);
12750Sstevel@tonic-gate 	}
12760Sstevel@tonic-gate 
12770Sstevel@tonic-gate 	/* check if buffer is too small */
12780Sstevel@tonic-gate 	req_count = STRUCT_FGET(get_list, pl_count);
12790Sstevel@tonic-gate 	if (count > req_count) {
12800Sstevel@tonic-gate 		STRUCT_FSET(get_list, pl_count, count);
12810Sstevel@tonic-gate 		STRUCT_FSET(get_list, pl_return_value, CRYPTO_BUFFER_TOO_SMALL);
12820Sstevel@tonic-gate 		crypto_free_provider_list(entries, count);
12830Sstevel@tonic-gate 		if (copyout(STRUCT_BUF(get_list), arg,
12840Sstevel@tonic-gate 		    STRUCT_SIZE(get_list)) != 0) {
12850Sstevel@tonic-gate 			return (EFAULT);
12860Sstevel@tonic-gate 		}
12870Sstevel@tonic-gate 		return (0);
12880Sstevel@tonic-gate 	}
12890Sstevel@tonic-gate 
12900Sstevel@tonic-gate 	STRUCT_FSET(get_list, pl_count, count);
12910Sstevel@tonic-gate 	STRUCT_FSET(get_list, pl_return_value, CRYPTO_SUCCESS);
12920Sstevel@tonic-gate 
12930Sstevel@tonic-gate 	copyout_size = count * sizeof (crypto_provider_entry_t);
12940Sstevel@tonic-gate 
12950Sstevel@tonic-gate 	/* copyout the first stuff */
12960Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(get_list), arg, STRUCT_SIZE(get_list)) != 0) {
12970Sstevel@tonic-gate 		crypto_free_provider_list(entries, count);
12980Sstevel@tonic-gate 		return (EFAULT);
12990Sstevel@tonic-gate 	}
13000Sstevel@tonic-gate 
13010Sstevel@tonic-gate 	if (count == 0) {
13020Sstevel@tonic-gate 		crypto_free_provider_list(entries, count);
13030Sstevel@tonic-gate 		return (0);
13040Sstevel@tonic-gate 	}
13050Sstevel@tonic-gate 
13060Sstevel@tonic-gate 	/* copyout entries */
13070Sstevel@tonic-gate 	offset = (ulong_t)STRUCT_FADDR(get_list, pl_list);
13080Sstevel@tonic-gate 	offset -= (ulong_t)STRUCT_BUF(get_list);
13090Sstevel@tonic-gate 	if (copyout(entries, arg + offset, copyout_size) != 0) {
13100Sstevel@tonic-gate 		crypto_free_provider_list(entries, count);
13110Sstevel@tonic-gate 		return (EFAULT);
13120Sstevel@tonic-gate 	}
13130Sstevel@tonic-gate 
13140Sstevel@tonic-gate 	crypto_free_provider_list(entries, count);
13150Sstevel@tonic-gate 	return (0);
13160Sstevel@tonic-gate }
13170Sstevel@tonic-gate 
13180Sstevel@tonic-gate static void
13190Sstevel@tonic-gate ext_to_provider_data(int mode, kcf_provider_desc_t *provider,
13200Sstevel@tonic-gate     crypto_provider_ext_info_t *ei, void *out)
13210Sstevel@tonic-gate {
13220Sstevel@tonic-gate 	STRUCT_DECL(crypto_provider_data, pd);
13230Sstevel@tonic-gate 	STRUCT_DECL(crypto_version, version);
13240Sstevel@tonic-gate 
13250Sstevel@tonic-gate 	STRUCT_INIT(pd, mode);
13260Sstevel@tonic-gate 	STRUCT_INIT(version, mode);
13270Sstevel@tonic-gate 
13280Sstevel@tonic-gate 	bcopy(provider->pd_description, STRUCT_FGET(pd, pd_prov_desc),
13290Sstevel@tonic-gate 	    CRYPTO_PROVIDER_DESCR_MAX_LEN);
13300Sstevel@tonic-gate 
13310Sstevel@tonic-gate 	bcopy(ei->ei_label, STRUCT_FGET(pd, pd_label), CRYPTO_EXT_SIZE_LABEL);
13320Sstevel@tonic-gate 	bcopy(ei->ei_manufacturerID, STRUCT_FGET(pd, pd_manufacturerID),
13330Sstevel@tonic-gate 	    CRYPTO_EXT_SIZE_MANUF);
13340Sstevel@tonic-gate 	bcopy(ei->ei_model, STRUCT_FGET(pd, pd_model), CRYPTO_EXT_SIZE_MODEL);
13350Sstevel@tonic-gate 	bcopy(ei->ei_serial_number, STRUCT_FGET(pd, pd_serial_number),
13360Sstevel@tonic-gate 	    CRYPTO_EXT_SIZE_SERIAL);
13370Sstevel@tonic-gate 	/*
13380Sstevel@tonic-gate 	 * We do not support ioctls for dual-function crypto operations yet.
13390Sstevel@tonic-gate 	 * So, we clear this flag as it might have been set by a provider.
13400Sstevel@tonic-gate 	 */
13410Sstevel@tonic-gate 	ei->ei_flags &= ~CRYPTO_EXTF_DUAL_CRYPTO_OPERATIONS;
13420Sstevel@tonic-gate 
13430Sstevel@tonic-gate 	STRUCT_FSET(pd, pd_flags, ei->ei_flags);
13440Sstevel@tonic-gate 	STRUCT_FSET(pd, pd_max_session_count, ei->ei_max_session_count);
13450Sstevel@tonic-gate 	STRUCT_FSET(pd, pd_session_count, (int)CRYPTO_UNAVAILABLE_INFO);
13460Sstevel@tonic-gate 	STRUCT_FSET(pd, pd_max_rw_session_count, ei->ei_max_session_count);
13470Sstevel@tonic-gate 	STRUCT_FSET(pd, pd_rw_session_count, (int)CRYPTO_UNAVAILABLE_INFO);
13480Sstevel@tonic-gate 	STRUCT_FSET(pd, pd_max_pin_len, ei->ei_max_pin_len);
13490Sstevel@tonic-gate 	STRUCT_FSET(pd, pd_min_pin_len, ei->ei_min_pin_len);
13500Sstevel@tonic-gate 	STRUCT_FSET(pd, pd_total_public_memory, ei->ei_total_public_memory);
13510Sstevel@tonic-gate 	STRUCT_FSET(pd, pd_free_public_memory, ei->ei_free_public_memory);
13520Sstevel@tonic-gate 	STRUCT_FSET(pd, pd_total_private_memory, ei->ei_total_private_memory);
13530Sstevel@tonic-gate 	STRUCT_FSET(pd, pd_free_private_memory, ei->ei_free_private_memory);
13540Sstevel@tonic-gate 	STRUCT_FSET(version, cv_major, ei->ei_hardware_version.cv_major);
13550Sstevel@tonic-gate 	STRUCT_FSET(version, cv_minor, ei->ei_hardware_version.cv_minor);
13560Sstevel@tonic-gate 	bcopy(STRUCT_BUF(version), STRUCT_FADDR(pd, pd_hardware_version),
13570Sstevel@tonic-gate 	    STRUCT_SIZE(version));
135810028Swyllys.ingersoll@sun.com 	STRUCT_FSET(version, cv_major, ei->ei_firmware_version.cv_major);
135910028Swyllys.ingersoll@sun.com 	STRUCT_FSET(version, cv_minor, ei->ei_firmware_version.cv_minor);
13600Sstevel@tonic-gate 	bcopy(STRUCT_BUF(version), STRUCT_FADDR(pd, pd_firmware_version),
13610Sstevel@tonic-gate 	    STRUCT_SIZE(version));
13620Sstevel@tonic-gate 	bcopy(ei->ei_time, STRUCT_FGET(pd, pd_time), CRYPTO_EXT_SIZE_TIME);
13630Sstevel@tonic-gate 	bcopy(STRUCT_BUF(pd), out, STRUCT_SIZE(pd));
13640Sstevel@tonic-gate }
13650Sstevel@tonic-gate 
13660Sstevel@tonic-gate /*
13670Sstevel@tonic-gate  * Utility routine to construct a crypto_provider_ext_info structure. Some
13680Sstevel@tonic-gate  * of the fields are constructed from information in the provider structure.
13690Sstevel@tonic-gate  * The rest of the fields have default values. We need to do this for
13700Sstevel@tonic-gate  * providers which do not support crypto_provider_management_ops routines.
13710Sstevel@tonic-gate  */
13720Sstevel@tonic-gate static void
13730Sstevel@tonic-gate fabricate_ext_info(kcf_provider_desc_t *provider,
13740Sstevel@tonic-gate     crypto_provider_ext_info_t *ei)
13750Sstevel@tonic-gate {
13760Sstevel@tonic-gate 	/* empty label */
13770Sstevel@tonic-gate 	(void) memset(ei->ei_label, ' ', CRYPTO_EXT_SIZE_LABEL);
13780Sstevel@tonic-gate 
13790Sstevel@tonic-gate 	(void) memset(ei->ei_manufacturerID, ' ', CRYPTO_EXT_SIZE_MANUF);
13800Sstevel@tonic-gate 	(void) strncpy((char *)ei->ei_manufacturerID, "Unknown", 7);
13810Sstevel@tonic-gate 
13820Sstevel@tonic-gate 	(void) memset(ei->ei_model, ' ', CRYPTO_EXT_SIZE_MODEL);
13830Sstevel@tonic-gate 	(void) strncpy((char *)ei->ei_model, "Unknown", 7);
13840Sstevel@tonic-gate 
13850Sstevel@tonic-gate 	(void) memset(ei->ei_serial_number, ' ', CRYPTO_EXT_SIZE_SERIAL);
13860Sstevel@tonic-gate 	(void) strncpy((char *)ei->ei_serial_number, "Unknown", 7);
13870Sstevel@tonic-gate 
13880Sstevel@tonic-gate 	if (KCF_PROV_RANDOM_OPS(provider) != NULL)
13890Sstevel@tonic-gate 		ei->ei_flags |= CRYPTO_EXTF_RNG;
13900Sstevel@tonic-gate 	if (KCF_PROV_DUAL_OPS(provider) != NULL)
13910Sstevel@tonic-gate 		ei->ei_flags |= CRYPTO_EXTF_DUAL_CRYPTO_OPERATIONS;
13920Sstevel@tonic-gate 
13930Sstevel@tonic-gate 	ei->ei_max_session_count = CRYPTO_UNAVAILABLE_INFO;
13940Sstevel@tonic-gate 	ei->ei_max_pin_len = 0;
13950Sstevel@tonic-gate 	ei->ei_min_pin_len = 0;
13960Sstevel@tonic-gate 	ei->ei_total_public_memory = CRYPTO_UNAVAILABLE_INFO;
13970Sstevel@tonic-gate 	ei->ei_free_public_memory = CRYPTO_UNAVAILABLE_INFO;
13980Sstevel@tonic-gate 	ei->ei_total_private_memory = CRYPTO_UNAVAILABLE_INFO;
13990Sstevel@tonic-gate 	ei->ei_free_private_memory = CRYPTO_UNAVAILABLE_INFO;
14000Sstevel@tonic-gate 	ei->ei_hardware_version.cv_major = 1;
14010Sstevel@tonic-gate 	ei->ei_hardware_version.cv_minor = 0;
14020Sstevel@tonic-gate 	ei->ei_firmware_version.cv_major = 1;
14030Sstevel@tonic-gate 	ei->ei_firmware_version.cv_minor = 0;
14040Sstevel@tonic-gate }
14050Sstevel@tonic-gate 
14060Sstevel@tonic-gate /* ARGSUSED */
14070Sstevel@tonic-gate static int
14080Sstevel@tonic-gate get_provider_info(dev_t dev, caddr_t arg, int mode, int *rval)
14090Sstevel@tonic-gate {
14100Sstevel@tonic-gate 	STRUCT_DECL(crypto_get_provider_info, get_info);
14110Sstevel@tonic-gate 	crypto_minor_t *cm;
14120Sstevel@tonic-gate 	crypto_provider_id_t provider_id;
14130Sstevel@tonic-gate 	kcf_provider_desc_t *provider, *real_provider;
14140Sstevel@tonic-gate 	crypto_provider_ext_info_t *ext_info = NULL;
14150Sstevel@tonic-gate 	size_t need;
14160Sstevel@tonic-gate 	int error = 0;
14170Sstevel@tonic-gate 	int rv;
14180Sstevel@tonic-gate 	kcf_req_params_t params;
14190Sstevel@tonic-gate 
14200Sstevel@tonic-gate 	STRUCT_INIT(get_info, mode);
14210Sstevel@tonic-gate 
14220Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
14230Sstevel@tonic-gate 		cmn_err(CE_WARN, "get_provider_info: failed holding minor");
14240Sstevel@tonic-gate 		return (ENXIO);
14250Sstevel@tonic-gate 	}
14260Sstevel@tonic-gate 
14270Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(get_info), STRUCT_SIZE(get_info)) != 0) {
14280Sstevel@tonic-gate 		crypto_release_minor(cm);
14290Sstevel@tonic-gate 		return (EFAULT);
14300Sstevel@tonic-gate 	}
14310Sstevel@tonic-gate 
14320Sstevel@tonic-gate 	need = sizeof (crypto_provider_ext_info_t);
14333916Skrishna 	if ((rv = crypto_buffer_check(need)) != CRYPTO_SUCCESS) {
14340Sstevel@tonic-gate 		need = 0;
14350Sstevel@tonic-gate 		goto release_minor;
14360Sstevel@tonic-gate 	}
14370Sstevel@tonic-gate 
14380Sstevel@tonic-gate 	/* initialize provider_array */
14390Sstevel@tonic-gate 	if (cm->cm_provider_array == NULL) {
14400Sstevel@tonic-gate 		rv = crypto_get_provider_list(cm, NULL, NULL, DONT_RETURN_LIST);
14410Sstevel@tonic-gate 		if (rv != CRYPTO_SUCCESS) {
14420Sstevel@tonic-gate 			goto release_minor;
14430Sstevel@tonic-gate 		}
14440Sstevel@tonic-gate 	}
14450Sstevel@tonic-gate 
14460Sstevel@tonic-gate 	ext_info = kmem_zalloc(need, KM_SLEEP);
14470Sstevel@tonic-gate 
14480Sstevel@tonic-gate 	provider_id = STRUCT_FGET(get_info, gi_provider_id);
14490Sstevel@tonic-gate 	mutex_enter(&cm->cm_lock);
14500Sstevel@tonic-gate 	/* index must be less than count of providers */
14510Sstevel@tonic-gate 	if (provider_id >= cm->cm_provider_count) {
14520Sstevel@tonic-gate 		mutex_exit(&cm->cm_lock);
14530Sstevel@tonic-gate 		rv = CRYPTO_ARGUMENTS_BAD;
14540Sstevel@tonic-gate 		goto release_minor;
14550Sstevel@tonic-gate 	}
14560Sstevel@tonic-gate 
14570Sstevel@tonic-gate 	ASSERT(cm->cm_provider_array != NULL);
14580Sstevel@tonic-gate 	provider = cm->cm_provider_array[provider_id];
14590Sstevel@tonic-gate 	KCF_PROV_REFHOLD(provider);
14600Sstevel@tonic-gate 	mutex_exit(&cm->cm_lock);
14610Sstevel@tonic-gate 
14620Sstevel@tonic-gate 	(void) kcf_get_hardware_provider_nomech(
14630Sstevel@tonic-gate 	    CRYPTO_OPS_OFFSET(provider_ops), CRYPTO_PROVIDER_OFFSET(ext_info),
1464904Smcpowers 	    CHECK_RESTRICT_FALSE, provider, &real_provider);
14650Sstevel@tonic-gate 
14660Sstevel@tonic-gate 	if (real_provider != NULL) {
14670Sstevel@tonic-gate 		ASSERT(real_provider == provider ||
14680Sstevel@tonic-gate 		    provider->pd_prov_type == CRYPTO_LOGICAL_PROVIDER);
14690Sstevel@tonic-gate 		KCF_WRAP_PROVMGMT_OPS_PARAMS(&params, KCF_OP_MGMT_EXTINFO,
14700Sstevel@tonic-gate 		    0, NULL, 0, NULL, 0, NULL, ext_info, provider);
14710Sstevel@tonic-gate 		rv = kcf_submit_request(real_provider, NULL, NULL, &params,
14720Sstevel@tonic-gate 		    B_FALSE);
14730Sstevel@tonic-gate 		ASSERT(rv != CRYPTO_NOT_SUPPORTED);
1474904Smcpowers 		KCF_PROV_REFRELE(real_provider);
14750Sstevel@tonic-gate 	} else {
14760Sstevel@tonic-gate 		/* do the best we can */
14770Sstevel@tonic-gate 		fabricate_ext_info(provider, ext_info);
14780Sstevel@tonic-gate 		rv = CRYPTO_SUCCESS;
14790Sstevel@tonic-gate 	}
14800Sstevel@tonic-gate 	KCF_PROV_REFRELE(provider);
14810Sstevel@tonic-gate 
14820Sstevel@tonic-gate 	if (rv == CRYPTO_SUCCESS) {
14830Sstevel@tonic-gate 		ext_to_provider_data(mode, provider, ext_info,
14840Sstevel@tonic-gate 		    STRUCT_FADDR(get_info, gi_provider_data));
14850Sstevel@tonic-gate 	}
14860Sstevel@tonic-gate 
14870Sstevel@tonic-gate release_minor:
14886424Skrishna 	CRYPTO_DECREMENT_RCTL(need);
14890Sstevel@tonic-gate 	crypto_release_minor(cm);
14900Sstevel@tonic-gate 
14910Sstevel@tonic-gate 	if (ext_info != NULL)
14920Sstevel@tonic-gate 		kmem_free(ext_info, sizeof (crypto_provider_ext_info_t));
14930Sstevel@tonic-gate 
14940Sstevel@tonic-gate 	if (error != 0)
14950Sstevel@tonic-gate 		return (error);
14960Sstevel@tonic-gate 
14970Sstevel@tonic-gate 	STRUCT_FSET(get_info, gi_return_value, rv);
14980Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(get_info), arg, STRUCT_SIZE(get_info)) != 0) {
14990Sstevel@tonic-gate 		return (EFAULT);
15000Sstevel@tonic-gate 	}
15010Sstevel@tonic-gate 	return (0);
15020Sstevel@tonic-gate }
15030Sstevel@tonic-gate 
15040Sstevel@tonic-gate /*
15050Sstevel@tonic-gate  * This ioctl returns an array of crypto_mech_name_t entries.
15060Sstevel@tonic-gate  * This is how consumers learn which mechanisms are permitted
15070Sstevel@tonic-gate  * by a provider.
15080Sstevel@tonic-gate  */
15090Sstevel@tonic-gate /* ARGSUSED */
15100Sstevel@tonic-gate static int
15110Sstevel@tonic-gate get_provider_mechanisms(dev_t dev, caddr_t arg, int mode, int *rval)
15120Sstevel@tonic-gate {
15130Sstevel@tonic-gate 	STRUCT_DECL(crypto_get_provider_mechanisms, get_mechanisms);
15140Sstevel@tonic-gate 	crypto_mech_name_t *entries;
15150Sstevel@tonic-gate 	crypto_minor_t *cm;
15160Sstevel@tonic-gate 	size_t copyout_size;
15170Sstevel@tonic-gate 	uint_t req_count;
15180Sstevel@tonic-gate 	uint_t count;
15190Sstevel@tonic-gate 	ulong_t offset;
15200Sstevel@tonic-gate 	int err;
15210Sstevel@tonic-gate 
15220Sstevel@tonic-gate 	STRUCT_INIT(get_mechanisms, mode);
15230Sstevel@tonic-gate 
15240Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
15250Sstevel@tonic-gate 		cmn_err(CE_WARN,
15260Sstevel@tonic-gate 		    "get_provider_mechanisms: failed holding minor");
15270Sstevel@tonic-gate 		return (ENXIO);
15280Sstevel@tonic-gate 	}
15290Sstevel@tonic-gate 
15300Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(get_mechanisms),
15310Sstevel@tonic-gate 	    STRUCT_SIZE(get_mechanisms)) != 0) {
15320Sstevel@tonic-gate 		crypto_release_minor(cm);
15330Sstevel@tonic-gate 		return (EFAULT);
15340Sstevel@tonic-gate 	}
15350Sstevel@tonic-gate 
15360Sstevel@tonic-gate 	/* get array of mechanisms from the core module */
15370Sstevel@tonic-gate 	if ((err = crypto_get_provider_mechanisms(cm,
15380Sstevel@tonic-gate 	    STRUCT_FGET(get_mechanisms, pm_provider_id),
15390Sstevel@tonic-gate 	    &count, &entries)) != 0) {
15400Sstevel@tonic-gate 		crypto_release_minor(cm);
15410Sstevel@tonic-gate 		STRUCT_FSET(get_mechanisms, pm_return_value, err);
15420Sstevel@tonic-gate 		if (copyout(STRUCT_BUF(get_mechanisms), arg,
15430Sstevel@tonic-gate 		    STRUCT_SIZE(get_mechanisms)) != 0) {
15440Sstevel@tonic-gate 			return (EFAULT);
15450Sstevel@tonic-gate 		}
15460Sstevel@tonic-gate 		return (0);
15470Sstevel@tonic-gate 	}
15480Sstevel@tonic-gate 	crypto_release_minor(cm);
15490Sstevel@tonic-gate 	/* Number of mechs caller thinks we have */
15500Sstevel@tonic-gate 	req_count = STRUCT_FGET(get_mechanisms, pm_count);
15510Sstevel@tonic-gate 
15520Sstevel@tonic-gate 	/* Check if caller is just requesting a count of mechanisms */
15530Sstevel@tonic-gate 	if (req_count == 0) {
15540Sstevel@tonic-gate 		STRUCT_FSET(get_mechanisms, pm_count, count);
15550Sstevel@tonic-gate 		STRUCT_FSET(get_mechanisms, pm_return_value, CRYPTO_SUCCESS);
15560Sstevel@tonic-gate 
15570Sstevel@tonic-gate 		crypto_free_mech_list(entries, count);
15580Sstevel@tonic-gate 		if (copyout(STRUCT_BUF(get_mechanisms), arg,
15590Sstevel@tonic-gate 		    STRUCT_SIZE(get_mechanisms)) != 0) {
15600Sstevel@tonic-gate 			return (EFAULT);
15610Sstevel@tonic-gate 		}
15620Sstevel@tonic-gate 		return (0);
15630Sstevel@tonic-gate 	}
15640Sstevel@tonic-gate 
15650Sstevel@tonic-gate 	/* check if buffer is too small */
15660Sstevel@tonic-gate 	if (count > req_count) {
15670Sstevel@tonic-gate 		STRUCT_FSET(get_mechanisms, pm_count, count);
15680Sstevel@tonic-gate 		STRUCT_FSET(get_mechanisms, pm_return_value,
15690Sstevel@tonic-gate 		    CRYPTO_BUFFER_TOO_SMALL);
15700Sstevel@tonic-gate 		crypto_free_mech_list(entries, count);
15710Sstevel@tonic-gate 		if (copyout(STRUCT_BUF(get_mechanisms), arg,
15720Sstevel@tonic-gate 		    STRUCT_SIZE(get_mechanisms)) != 0) {
15730Sstevel@tonic-gate 			return (EFAULT);
15740Sstevel@tonic-gate 		}
15750Sstevel@tonic-gate 		return (0);
15760Sstevel@tonic-gate 	}
15770Sstevel@tonic-gate 
15780Sstevel@tonic-gate 	STRUCT_FSET(get_mechanisms, pm_count, count);
15790Sstevel@tonic-gate 	STRUCT_FSET(get_mechanisms, pm_return_value, CRYPTO_SUCCESS);
15800Sstevel@tonic-gate 
15810Sstevel@tonic-gate 	copyout_size = count * sizeof (crypto_mech_name_t);
15820Sstevel@tonic-gate 
15830Sstevel@tonic-gate 	/* copyout the first stuff */
15840Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(get_mechanisms), arg,
15850Sstevel@tonic-gate 	    STRUCT_SIZE(get_mechanisms)) != 0) {
15860Sstevel@tonic-gate 		crypto_free_mech_list(entries, count);
15870Sstevel@tonic-gate 		return (EFAULT);
15880Sstevel@tonic-gate 	}
15890Sstevel@tonic-gate 
15900Sstevel@tonic-gate 	if (count == 0) {
15910Sstevel@tonic-gate 		return (0);
15920Sstevel@tonic-gate 	}
15930Sstevel@tonic-gate 
15940Sstevel@tonic-gate 	/* copyout entries */
15950Sstevel@tonic-gate 	offset = (ulong_t)STRUCT_FADDR(get_mechanisms, pm_list);
15960Sstevel@tonic-gate 	offset -= (ulong_t)STRUCT_BUF(get_mechanisms);
15970Sstevel@tonic-gate 	if (copyout(entries, arg + offset, copyout_size) != 0) {
15980Sstevel@tonic-gate 		crypto_free_mech_list(entries, count);
15990Sstevel@tonic-gate 		return (EFAULT);
16000Sstevel@tonic-gate 	}
16010Sstevel@tonic-gate 
16020Sstevel@tonic-gate 	crypto_free_mech_list(entries, count);
16030Sstevel@tonic-gate 	return (0);
16040Sstevel@tonic-gate }
16050Sstevel@tonic-gate 
16060Sstevel@tonic-gate /*
16070Sstevel@tonic-gate  * This ioctl returns information about a provider's mechanism.
16080Sstevel@tonic-gate  */
16090Sstevel@tonic-gate /* ARGSUSED */
16100Sstevel@tonic-gate static int
16110Sstevel@tonic-gate get_provider_mechanism_info(dev_t dev, caddr_t arg, int mode, int *rval)
16120Sstevel@tonic-gate {
16130Sstevel@tonic-gate 	crypto_get_provider_mechanism_info_t mechanism_info;
16140Sstevel@tonic-gate 	crypto_minor_t *cm;
16150Sstevel@tonic-gate 	kcf_provider_desc_t *pd;
16160Sstevel@tonic-gate 	crypto_mech_info_t *mi = NULL;
16170Sstevel@tonic-gate 	int rv = CRYPTO_SUCCESS;
16180Sstevel@tonic-gate 	int i;
16190Sstevel@tonic-gate 
16200Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
16210Sstevel@tonic-gate 		cmn_err(CE_WARN,
16220Sstevel@tonic-gate 		    "get_provider_mechanism_info: failed holding minor");
16230Sstevel@tonic-gate 		return (ENXIO);
16240Sstevel@tonic-gate 	}
16250Sstevel@tonic-gate 
16260Sstevel@tonic-gate 	if (copyin(arg, &mechanism_info, sizeof (mechanism_info)) != 0) {
16270Sstevel@tonic-gate 		crypto_release_minor(cm);
16280Sstevel@tonic-gate 		return (EFAULT);
16290Sstevel@tonic-gate 	}
16300Sstevel@tonic-gate 
16310Sstevel@tonic-gate 	/* initialize provider table */
16320Sstevel@tonic-gate 	if (cm->cm_provider_array == NULL) {
16330Sstevel@tonic-gate 		rv = crypto_get_provider_list(cm, NULL, NULL, DONT_RETURN_LIST);
16340Sstevel@tonic-gate 		if (rv != CRYPTO_SUCCESS) {
16350Sstevel@tonic-gate 			mutex_enter(&cm->cm_lock);
16360Sstevel@tonic-gate 			goto fail;
16370Sstevel@tonic-gate 		}
16380Sstevel@tonic-gate 	}
16390Sstevel@tonic-gate 
16400Sstevel@tonic-gate 	/*
16410Sstevel@tonic-gate 	 * Provider ID must be less than the count of providers
16420Sstevel@tonic-gate 	 * obtained by calling get_provider_list().
16430Sstevel@tonic-gate 	 */
16440Sstevel@tonic-gate 	mutex_enter(&cm->cm_lock);
16450Sstevel@tonic-gate 	if (mechanism_info.mi_provider_id >= cm->cm_provider_count) {
16460Sstevel@tonic-gate 		rv = CRYPTO_ARGUMENTS_BAD;
16470Sstevel@tonic-gate 		goto fail;
16480Sstevel@tonic-gate 	}
16490Sstevel@tonic-gate 
16500Sstevel@tonic-gate 	pd = cm->cm_provider_array[mechanism_info.mi_provider_id];
16510Sstevel@tonic-gate 
16520Sstevel@tonic-gate 	for (i = 0; i < pd->pd_mech_list_count; i++) {
16530Sstevel@tonic-gate 		if (strncmp(pd->pd_mechanisms[i].cm_mech_name,
16540Sstevel@tonic-gate 		    mechanism_info.mi_mechanism_name,
16550Sstevel@tonic-gate 		    CRYPTO_MAX_MECH_NAME) == 0) {
16560Sstevel@tonic-gate 			mi = &pd->pd_mechanisms[i];
16570Sstevel@tonic-gate 		}
16580Sstevel@tonic-gate 	}
16590Sstevel@tonic-gate 
16600Sstevel@tonic-gate 	if (mi == NULL) {
16610Sstevel@tonic-gate 		rv = CRYPTO_ARGUMENTS_BAD;
16620Sstevel@tonic-gate 		goto fail;
16630Sstevel@tonic-gate 	}
16640Sstevel@tonic-gate 
16650Sstevel@tonic-gate 	mechanism_info.mi_min_key_size = mi->cm_min_key_length;
16660Sstevel@tonic-gate 	mechanism_info.mi_max_key_size = mi->cm_max_key_length;
16670Sstevel@tonic-gate 	mechanism_info.mi_flags = mi->cm_func_group_mask;
16680Sstevel@tonic-gate 
16690Sstevel@tonic-gate fail:
16700Sstevel@tonic-gate 	mutex_exit(&cm->cm_lock);
16710Sstevel@tonic-gate 	crypto_release_minor(cm);
16720Sstevel@tonic-gate 	mechanism_info.mi_return_value = rv;
16730Sstevel@tonic-gate 	if (copyout(&mechanism_info, arg, sizeof (mechanism_info)) != 0) {
16740Sstevel@tonic-gate 		return (EFAULT);
16750Sstevel@tonic-gate 	}
16760Sstevel@tonic-gate 
16770Sstevel@tonic-gate 	return (0);
16780Sstevel@tonic-gate }
16790Sstevel@tonic-gate 
16800Sstevel@tonic-gate /*
16810Sstevel@tonic-gate  * Every open of /dev/crypto multiplexes all PKCS#11 sessions across
16820Sstevel@tonic-gate  * a single session to each provider. Calls to open and close session
16830Sstevel@tonic-gate  * are not made to providers that do not support sessions. For these
16840Sstevel@tonic-gate  * providers, a session number of 0 is passed during subsequent operations,
16850Sstevel@tonic-gate  * and it is ignored by the provider.
16860Sstevel@tonic-gate  */
16870Sstevel@tonic-gate static int
16880Sstevel@tonic-gate crypto_get_provider_session(crypto_minor_t *cm,
16890Sstevel@tonic-gate     crypto_provider_id_t provider_index, crypto_provider_session_t **output_ps)
16900Sstevel@tonic-gate {
16910Sstevel@tonic-gate 	kcf_provider_desc_t *pd, *real_provider;
16920Sstevel@tonic-gate 	kcf_req_params_t params;
16930Sstevel@tonic-gate 	crypto_provider_session_t *ps, *new_ps;
16940Sstevel@tonic-gate 	crypto_session_id_t provider_session_id = 0;
16950Sstevel@tonic-gate 	int rv;
16960Sstevel@tonic-gate 
16970Sstevel@tonic-gate 	ASSERT(MUTEX_HELD(&cm->cm_lock));
16980Sstevel@tonic-gate 
16990Sstevel@tonic-gate 	/* pd may be a logical provider */
17000Sstevel@tonic-gate 	pd = cm->cm_provider_array[provider_index];
17010Sstevel@tonic-gate 
17020Sstevel@tonic-gate again:
17030Sstevel@tonic-gate 	/*
17040Sstevel@tonic-gate 	 * Check if there is already a session to the provider.
17050Sstevel@tonic-gate 	 * Sessions may be to a logical provider or a real provider.
17060Sstevel@tonic-gate 	 */
17070Sstevel@tonic-gate 	for (ps = cm->cm_provider_session; ps != NULL; ps = ps->ps_next) {
17080Sstevel@tonic-gate 		if (ps->ps_provider == pd)
17090Sstevel@tonic-gate 			break;
17100Sstevel@tonic-gate 	}
17110Sstevel@tonic-gate 
17120Sstevel@tonic-gate 	/* found existing session */
17130Sstevel@tonic-gate 	if (ps != NULL) {
17140Sstevel@tonic-gate 		ps->ps_refcnt++;
17150Sstevel@tonic-gate 		*output_ps = ps;
17160Sstevel@tonic-gate 		return (CRYPTO_SUCCESS);
17170Sstevel@tonic-gate 	}
17180Sstevel@tonic-gate 	mutex_exit(&cm->cm_lock);
17190Sstevel@tonic-gate 
17200Sstevel@tonic-gate 	/* find a hardware provider that supports session ops */
17210Sstevel@tonic-gate 	(void) kcf_get_hardware_provider_nomech(CRYPTO_OPS_OFFSET(session_ops),
1722904Smcpowers 	    CRYPTO_SESSION_OFFSET(session_open), CHECK_RESTRICT_FALSE,
1723904Smcpowers 	    pd, &real_provider);
17240Sstevel@tonic-gate 
17250Sstevel@tonic-gate 	if (real_provider != NULL) {
17260Sstevel@tonic-gate 		ASSERT(real_provider == pd ||
17270Sstevel@tonic-gate 		    pd->pd_prov_type == CRYPTO_LOGICAL_PROVIDER);
17280Sstevel@tonic-gate 		/* open session to provider */
17290Sstevel@tonic-gate 		KCF_WRAP_SESSION_OPS_PARAMS(&params, KCF_OP_SESSION_OPEN,
17300Sstevel@tonic-gate 		    &provider_session_id, 0, CRYPTO_USER, NULL, 0, pd);
17310Sstevel@tonic-gate 		rv = kcf_submit_request(real_provider, NULL, NULL, &params,
17320Sstevel@tonic-gate 		    B_FALSE);
17330Sstevel@tonic-gate 		if (rv != CRYPTO_SUCCESS) {
17340Sstevel@tonic-gate 			mutex_enter(&cm->cm_lock);
1735904Smcpowers 			KCF_PROV_REFRELE(real_provider);
17360Sstevel@tonic-gate 			return (rv);
17370Sstevel@tonic-gate 		}
17380Sstevel@tonic-gate 	}
17390Sstevel@tonic-gate 
17400Sstevel@tonic-gate 	/* allocate crypto_provider_session structure */
17410Sstevel@tonic-gate 	new_ps = kmem_zalloc(sizeof (crypto_provider_session_t), KM_SLEEP);
17420Sstevel@tonic-gate 
17430Sstevel@tonic-gate 	/*
17440Sstevel@tonic-gate 	 * Check if someone opened a session to the provider
17450Sstevel@tonic-gate 	 * while we dropped the lock.
17460Sstevel@tonic-gate 	 */
17470Sstevel@tonic-gate 	mutex_enter(&cm->cm_lock);
17480Sstevel@tonic-gate 	for (ps = cm->cm_provider_session; ps != NULL; ps = ps->ps_next) {
17490Sstevel@tonic-gate 		if (ps->ps_provider == pd) {
17500Sstevel@tonic-gate 			mutex_exit(&cm->cm_lock);
17510Sstevel@tonic-gate 			kmem_free(new_ps, sizeof (crypto_provider_session_t));
17520Sstevel@tonic-gate 			if (real_provider != NULL) {
17530Sstevel@tonic-gate 				KCF_WRAP_SESSION_OPS_PARAMS(&params,
17540Sstevel@tonic-gate 				    KCF_OP_SESSION_CLOSE, NULL,
17550Sstevel@tonic-gate 				    provider_session_id, CRYPTO_USER, NULL, 0,
17560Sstevel@tonic-gate 				    pd);
17570Sstevel@tonic-gate 				(void) kcf_submit_request(real_provider, NULL,
17580Sstevel@tonic-gate 				    NULL, &params, B_FALSE);
1759904Smcpowers 				KCF_PROV_REFRELE(real_provider);
17600Sstevel@tonic-gate 			}
17610Sstevel@tonic-gate 			mutex_enter(&cm->cm_lock);
17620Sstevel@tonic-gate 			goto again;
17630Sstevel@tonic-gate 
17640Sstevel@tonic-gate 		}
17650Sstevel@tonic-gate 	}
17660Sstevel@tonic-gate 
17670Sstevel@tonic-gate 	/* increment refcnt and attach to crypto_minor structure */
17680Sstevel@tonic-gate 	new_ps->ps_session = provider_session_id;
17690Sstevel@tonic-gate 	new_ps->ps_refcnt = 1;
17700Sstevel@tonic-gate 	KCF_PROV_REFHOLD(pd);
17710Sstevel@tonic-gate 	new_ps->ps_provider = pd;
17720Sstevel@tonic-gate 	if (real_provider != NULL) {
17730Sstevel@tonic-gate 		new_ps->ps_real_provider = real_provider;
17740Sstevel@tonic-gate 	}
17750Sstevel@tonic-gate 	new_ps->ps_next = cm->cm_provider_session;
17760Sstevel@tonic-gate 	cm->cm_provider_session = new_ps;
17770Sstevel@tonic-gate 
17780Sstevel@tonic-gate 	*output_ps = new_ps;
17790Sstevel@tonic-gate 	return (CRYPTO_SUCCESS);
17800Sstevel@tonic-gate }
17810Sstevel@tonic-gate 
17820Sstevel@tonic-gate /*
17830Sstevel@tonic-gate  * Release a provider session.
17840Sstevel@tonic-gate  * If the reference count goes to zero, then close the session
17850Sstevel@tonic-gate  * to the provider.
17860Sstevel@tonic-gate  */
17870Sstevel@tonic-gate static void
17880Sstevel@tonic-gate crypto_release_provider_session(crypto_minor_t *cm,
17890Sstevel@tonic-gate     crypto_provider_session_t *provider_session)
17900Sstevel@tonic-gate {
17910Sstevel@tonic-gate 	kcf_req_params_t params;
17920Sstevel@tonic-gate 	crypto_provider_session_t *ps = NULL, **prev;
17930Sstevel@tonic-gate 
17940Sstevel@tonic-gate 	ASSERT(MUTEX_HELD(&cm->cm_lock));
17950Sstevel@tonic-gate 
17960Sstevel@tonic-gate 	/* verify that provider_session is valid */
17970Sstevel@tonic-gate 	for (ps = cm->cm_provider_session, prev = &cm->cm_provider_session;
17980Sstevel@tonic-gate 	    ps != NULL; prev = &ps->ps_next, ps = ps->ps_next) {
17990Sstevel@tonic-gate 		if (ps == provider_session) {
18000Sstevel@tonic-gate 			break;
18010Sstevel@tonic-gate 		}
18020Sstevel@tonic-gate 	}
18030Sstevel@tonic-gate 
18040Sstevel@tonic-gate 	if (ps == NULL)
18050Sstevel@tonic-gate 		return;
18060Sstevel@tonic-gate 
18070Sstevel@tonic-gate 	ps->ps_refcnt--;
18080Sstevel@tonic-gate 
18090Sstevel@tonic-gate 	if (ps->ps_refcnt > 0)
18100Sstevel@tonic-gate 		return;
18110Sstevel@tonic-gate 
18120Sstevel@tonic-gate 	if (ps->ps_real_provider != NULL) {
18130Sstevel@tonic-gate 		/* close session with provider */
18140Sstevel@tonic-gate 		KCF_WRAP_SESSION_OPS_PARAMS(&params, KCF_OP_SESSION_CLOSE, NULL,
18150Sstevel@tonic-gate 		    ps->ps_session, CRYPTO_USER, NULL, 0, ps->ps_provider);
18160Sstevel@tonic-gate 		(void) kcf_submit_request(ps->ps_real_provider,
18170Sstevel@tonic-gate 		    NULL, NULL, &params, B_FALSE);
18180Sstevel@tonic-gate 		KCF_PROV_REFRELE(ps->ps_real_provider);
18190Sstevel@tonic-gate 	}
18200Sstevel@tonic-gate 	KCF_PROV_REFRELE(ps->ps_provider);
18210Sstevel@tonic-gate 	*prev = ps->ps_next;
18220Sstevel@tonic-gate 	kmem_free(ps, sizeof (*ps));
18230Sstevel@tonic-gate }
18240Sstevel@tonic-gate 
18250Sstevel@tonic-gate static int
18260Sstevel@tonic-gate grow_session_table(crypto_minor_t *cm)
18270Sstevel@tonic-gate {
18280Sstevel@tonic-gate 	crypto_session_data_t **session_table;
18290Sstevel@tonic-gate 	crypto_session_data_t **new;
18300Sstevel@tonic-gate 	uint_t session_table_count;
18310Sstevel@tonic-gate 	uint_t need;
18320Sstevel@tonic-gate 	size_t current_allocation;
18330Sstevel@tonic-gate 	size_t new_allocation;
18343916Skrishna 	int rv;
18350Sstevel@tonic-gate 
18360Sstevel@tonic-gate 	ASSERT(MUTEX_HELD(&cm->cm_lock));
18370Sstevel@tonic-gate 
18380Sstevel@tonic-gate 	session_table_count = cm->cm_session_table_count;
18390Sstevel@tonic-gate 	session_table = cm->cm_session_table;
18400Sstevel@tonic-gate 	need = session_table_count + CRYPTO_SESSION_CHUNK;
18410Sstevel@tonic-gate 
18420Sstevel@tonic-gate 	current_allocation = session_table_count * sizeof (void *);
18430Sstevel@tonic-gate 	new_allocation = need * sizeof (void *);
18440Sstevel@tonic-gate 
18450Sstevel@tonic-gate 	/*
18460Sstevel@tonic-gate 	 * Memory needed to grow the session table is checked
18470Sstevel@tonic-gate 	 * against the project.max-crypto-memory resource control.
18480Sstevel@tonic-gate 	 */
18493916Skrishna 	if ((rv = crypto_buffer_check(new_allocation - current_allocation)) !=
18503916Skrishna 	    CRYPTO_SUCCESS) {
18513916Skrishna 		return (rv);
18523916Skrishna 	}
18530Sstevel@tonic-gate 
18540Sstevel@tonic-gate 	/* drop lock while we allocate memory */
18550Sstevel@tonic-gate 	mutex_exit(&cm->cm_lock);
18560Sstevel@tonic-gate 	new = kmem_zalloc(new_allocation, KM_SLEEP);
18570Sstevel@tonic-gate 	mutex_enter(&cm->cm_lock);
18580Sstevel@tonic-gate 
18590Sstevel@tonic-gate 	/* check if another thread increased the table size */
18600Sstevel@tonic-gate 	if (session_table_count != cm->cm_session_table_count) {
18610Sstevel@tonic-gate 		kmem_free(new, new_allocation);
18620Sstevel@tonic-gate 		return (CRYPTO_SUCCESS);
18630Sstevel@tonic-gate 	}
18640Sstevel@tonic-gate 
18650Sstevel@tonic-gate 	bcopy(session_table, new, current_allocation);
18660Sstevel@tonic-gate 	kmem_free(session_table, current_allocation);
18670Sstevel@tonic-gate 	cm->cm_session_table = new;
18680Sstevel@tonic-gate 	cm->cm_session_table_count += CRYPTO_SESSION_CHUNK;
18690Sstevel@tonic-gate 
18700Sstevel@tonic-gate 	return (CRYPTO_SUCCESS);
18710Sstevel@tonic-gate }
18720Sstevel@tonic-gate 
18730Sstevel@tonic-gate /*
18740Sstevel@tonic-gate  * Find unused entry in session table and return it's index.
18750Sstevel@tonic-gate  * Initialize session table entry.
18760Sstevel@tonic-gate  */
18770Sstevel@tonic-gate /* ARGSUSED */
18780Sstevel@tonic-gate static int
18790Sstevel@tonic-gate crypto_open_session(dev_t dev, uint_t flags, crypto_session_id_t *session_index,
18800Sstevel@tonic-gate     crypto_provider_id_t provider_id)
18810Sstevel@tonic-gate {
18820Sstevel@tonic-gate 	crypto_session_data_t **session_table;
18830Sstevel@tonic-gate 	crypto_session_data_t *sp;
18840Sstevel@tonic-gate 	crypto_minor_t *cm;
18850Sstevel@tonic-gate 	uint_t session_table_count;
18860Sstevel@tonic-gate 	uint_t i;
18870Sstevel@tonic-gate 	int rv;
18880Sstevel@tonic-gate 	crypto_provider_session_t *ps;
18890Sstevel@tonic-gate 	kcf_provider_desc_t *provider;
18900Sstevel@tonic-gate 
18910Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
18920Sstevel@tonic-gate 		cmn_err(CE_WARN, "crypto_open_session: failed holding minor");
18930Sstevel@tonic-gate 		return (CRYPTO_FAILED);
18940Sstevel@tonic-gate 	}
18950Sstevel@tonic-gate 
18960Sstevel@tonic-gate 	/* initialize provider_array */
18970Sstevel@tonic-gate 	if (cm->cm_provider_array == NULL) {
18980Sstevel@tonic-gate 		rv = crypto_get_provider_list(cm, NULL, NULL, DONT_RETURN_LIST);
18990Sstevel@tonic-gate 		if (rv != 0) {
19000Sstevel@tonic-gate 			crypto_release_minor(cm);
19010Sstevel@tonic-gate 			return (rv);
19020Sstevel@tonic-gate 		}
19030Sstevel@tonic-gate 	}
19040Sstevel@tonic-gate 
19050Sstevel@tonic-gate 	mutex_enter(&cm->cm_lock);
19060Sstevel@tonic-gate 	/* index must be less than count of providers */
19070Sstevel@tonic-gate 	if (provider_id >= cm->cm_provider_count) {
19080Sstevel@tonic-gate 		mutex_exit(&cm->cm_lock);
19090Sstevel@tonic-gate 		crypto_release_minor(cm);
19100Sstevel@tonic-gate 		return (CRYPTO_INVALID_PROVIDER_ID);
19110Sstevel@tonic-gate 	}
19120Sstevel@tonic-gate 	ASSERT(cm->cm_provider_array != NULL);
19130Sstevel@tonic-gate 
19140Sstevel@tonic-gate 	rv = crypto_get_provider_session(cm, provider_id, &ps);
19150Sstevel@tonic-gate 	if (rv != CRYPTO_SUCCESS) {
19160Sstevel@tonic-gate 		mutex_exit(&cm->cm_lock);
19170Sstevel@tonic-gate 		crypto_release_minor(cm);
19180Sstevel@tonic-gate 		return (rv);
19190Sstevel@tonic-gate 	}
19200Sstevel@tonic-gate 	provider = cm->cm_provider_array[provider_id];
19210Sstevel@tonic-gate 
19220Sstevel@tonic-gate again:
19230Sstevel@tonic-gate 	session_table_count = cm->cm_session_table_count;
19240Sstevel@tonic-gate 	session_table = cm->cm_session_table;
19250Sstevel@tonic-gate 
19260Sstevel@tonic-gate 	/* session handles start with 1 */
19270Sstevel@tonic-gate 	for (i = 1; i < session_table_count; i++) {
19280Sstevel@tonic-gate 		if (session_table[i] == NULL)
19290Sstevel@tonic-gate 			break;
19300Sstevel@tonic-gate 	}
19310Sstevel@tonic-gate 
19320Sstevel@tonic-gate 	if (i == session_table_count || session_table_count == 0) {
19330Sstevel@tonic-gate 		if ((rv = grow_session_table(cm)) != CRYPTO_SUCCESS) {
19340Sstevel@tonic-gate 			crypto_release_provider_session(cm, ps);
19350Sstevel@tonic-gate 			mutex_exit(&cm->cm_lock);
19360Sstevel@tonic-gate 			crypto_release_minor(cm);
19370Sstevel@tonic-gate 			return (rv);
19380Sstevel@tonic-gate 		}
19390Sstevel@tonic-gate 		goto again;
19400Sstevel@tonic-gate 	}
19410Sstevel@tonic-gate 
19420Sstevel@tonic-gate 	sp = kmem_cache_alloc(crypto_session_cache, KM_SLEEP);
19430Sstevel@tonic-gate 	sp->sd_flags = 0;
19440Sstevel@tonic-gate 	sp->sd_find_init_cookie = NULL;
19450Sstevel@tonic-gate 	sp->sd_digest_ctx = NULL;
19460Sstevel@tonic-gate 	sp->sd_encr_ctx = NULL;
19470Sstevel@tonic-gate 	sp->sd_decr_ctx = NULL;
19480Sstevel@tonic-gate 	sp->sd_sign_ctx = NULL;
19490Sstevel@tonic-gate 	sp->sd_verify_ctx = NULL;
19500Sstevel@tonic-gate 	sp->sd_sign_recover_ctx = NULL;
19510Sstevel@tonic-gate 	sp->sd_verify_recover_ctx = NULL;
19520Sstevel@tonic-gate 	mutex_init(&sp->sd_lock, NULL, MUTEX_DRIVER, NULL);
19530Sstevel@tonic-gate 	cv_init(&sp->sd_cv, NULL, CV_DRIVER, NULL);
19540Sstevel@tonic-gate 	KCF_PROV_REFHOLD(provider);
19550Sstevel@tonic-gate 	sp->sd_provider = provider;
19560Sstevel@tonic-gate 	sp->sd_provider_session = ps;
19576424Skrishna 
19586424Skrishna 	/* See the comment for CRYPTO_PRE_APPROVED_LIMIT. */
19596424Skrishna 	if ((rv = crypto_buffer_check(crypto_pre_approved_limit)) !=
19606424Skrishna 	    CRYPTO_SUCCESS) {
19616424Skrishna 		sp->sd_pre_approved_amount = 0;
19626424Skrishna 	} else {
19636424Skrishna 		sp->sd_pre_approved_amount = crypto_pre_approved_limit;
19646424Skrishna 	}
19656424Skrishna 
19660Sstevel@tonic-gate 	cm->cm_session_table[i] = sp;
19670Sstevel@tonic-gate 	mutex_exit(&cm->cm_lock);
19680Sstevel@tonic-gate 	crypto_release_minor(cm);
19690Sstevel@tonic-gate 	*session_index = i;
19700Sstevel@tonic-gate 
19710Sstevel@tonic-gate 	return (CRYPTO_SUCCESS);
19720Sstevel@tonic-gate }
19730Sstevel@tonic-gate 
19740Sstevel@tonic-gate /*
19750Sstevel@tonic-gate  * Close a session.
19760Sstevel@tonic-gate  */
19770Sstevel@tonic-gate static int
19780Sstevel@tonic-gate crypto_close_session(dev_t dev, crypto_session_id_t session_index)
19790Sstevel@tonic-gate {
19800Sstevel@tonic-gate 	crypto_session_data_t **session_table;
19810Sstevel@tonic-gate 	crypto_session_data_t *sp;
19820Sstevel@tonic-gate 	crypto_minor_t *cm;
19830Sstevel@tonic-gate 
19840Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
19850Sstevel@tonic-gate 		cmn_err(CE_WARN, "crypto_close_session: failed holding minor");
19860Sstevel@tonic-gate 		return (CRYPTO_FAILED);
19870Sstevel@tonic-gate 	}
19880Sstevel@tonic-gate 
19890Sstevel@tonic-gate 	mutex_enter(&cm->cm_lock);
19900Sstevel@tonic-gate 	session_table = cm->cm_session_table;
19910Sstevel@tonic-gate 
19920Sstevel@tonic-gate 	if ((session_index) == 0 ||
19930Sstevel@tonic-gate 	    (session_index >= cm->cm_session_table_count)) {
19940Sstevel@tonic-gate 		mutex_exit(&cm->cm_lock);
19950Sstevel@tonic-gate 		crypto_release_minor(cm);
19960Sstevel@tonic-gate 		return (CRYPTO_SESSION_HANDLE_INVALID);
19970Sstevel@tonic-gate 	}
19980Sstevel@tonic-gate 
19990Sstevel@tonic-gate 	sp = session_table[session_index];
20000Sstevel@tonic-gate 	if (sp == NULL) {
20010Sstevel@tonic-gate 		mutex_exit(&cm->cm_lock);
20020Sstevel@tonic-gate 		crypto_release_minor(cm);
20030Sstevel@tonic-gate 		return (CRYPTO_SESSION_HANDLE_INVALID);
20040Sstevel@tonic-gate 	}
20050Sstevel@tonic-gate 	/*
20060Sstevel@tonic-gate 	 * If session is in use, free it when the thread
20070Sstevel@tonic-gate 	 * finishes with the session.
20080Sstevel@tonic-gate 	 */
20090Sstevel@tonic-gate 	mutex_enter(&sp->sd_lock);
20100Sstevel@tonic-gate 	if (sp->sd_flags & CRYPTO_SESSION_IS_BUSY) {
20110Sstevel@tonic-gate 		sp->sd_flags |= CRYPTO_SESSION_IS_CLOSED;
20120Sstevel@tonic-gate 		mutex_exit(&sp->sd_lock);
20130Sstevel@tonic-gate 	} else {
20146424Skrishna 		ASSERT(sp->sd_pre_approved_amount == 0 ||
20156424Skrishna 		    sp->sd_pre_approved_amount == crypto_pre_approved_limit);
20166424Skrishna 		CRYPTO_DECREMENT_RCTL(sp->sd_pre_approved_amount);
20176424Skrishna 
20180Sstevel@tonic-gate 		if (sp->sd_find_init_cookie != NULL) {
20190Sstevel@tonic-gate 			(void) crypto_free_find_ctx(sp);
20200Sstevel@tonic-gate 		}
20210Sstevel@tonic-gate 
20220Sstevel@tonic-gate 		crypto_release_provider_session(cm, sp->sd_provider_session);
20230Sstevel@tonic-gate 		KCF_PROV_REFRELE(sp->sd_provider);
20240Sstevel@tonic-gate 		CRYPTO_CANCEL_ALL_CTX(sp);
20250Sstevel@tonic-gate 		mutex_destroy(&sp->sd_lock);
20260Sstevel@tonic-gate 		cv_destroy(&sp->sd_cv);
20270Sstevel@tonic-gate 		kmem_cache_free(crypto_session_cache, sp);
20280Sstevel@tonic-gate 		session_table[session_index] = NULL;
20290Sstevel@tonic-gate 	}
20300Sstevel@tonic-gate 
20310Sstevel@tonic-gate 	mutex_exit(&cm->cm_lock);
20320Sstevel@tonic-gate 	crypto_release_minor(cm);
20330Sstevel@tonic-gate 
20340Sstevel@tonic-gate 	return (CRYPTO_SUCCESS);
20350Sstevel@tonic-gate }
20360Sstevel@tonic-gate 
20370Sstevel@tonic-gate /*
20380Sstevel@tonic-gate  * This ioctl opens a session and returns the session ID in os_session.
20390Sstevel@tonic-gate  */
20400Sstevel@tonic-gate /* ARGSUSED */
20410Sstevel@tonic-gate static int
20420Sstevel@tonic-gate open_session(dev_t dev, caddr_t arg, int mode, int *rval)
20430Sstevel@tonic-gate {
20440Sstevel@tonic-gate 	crypto_open_session_t open_session;
20450Sstevel@tonic-gate 	crypto_session_id_t session;
20460Sstevel@tonic-gate 	int rv;
20470Sstevel@tonic-gate 
20480Sstevel@tonic-gate 	if (copyin(arg, &open_session, sizeof (open_session)) != 0)
20490Sstevel@tonic-gate 		return (EFAULT);
20500Sstevel@tonic-gate 
20510Sstevel@tonic-gate 	rv = crypto_open_session(dev, open_session.os_flags,
20520Sstevel@tonic-gate 	    &session, open_session.os_provider_id);
20530Sstevel@tonic-gate 	if (rv != CRYPTO_SUCCESS) {
20540Sstevel@tonic-gate 		open_session.os_return_value = rv;
20550Sstevel@tonic-gate 		if (copyout(&open_session, arg, sizeof (open_session)) != 0) {
20560Sstevel@tonic-gate 			return (EFAULT);
20570Sstevel@tonic-gate 		}
20580Sstevel@tonic-gate 		return (0);
20590Sstevel@tonic-gate 	}
20600Sstevel@tonic-gate 
20610Sstevel@tonic-gate 	open_session.os_session = session;
20620Sstevel@tonic-gate 	open_session.os_return_value = CRYPTO_SUCCESS;
20630Sstevel@tonic-gate 
20640Sstevel@tonic-gate 	if (copyout(&open_session, arg, sizeof (open_session)) != 0) {
20650Sstevel@tonic-gate 		return (EFAULT);
20660Sstevel@tonic-gate 	}
20670Sstevel@tonic-gate 	return (0);
20680Sstevel@tonic-gate }
20690Sstevel@tonic-gate 
20700Sstevel@tonic-gate /*
20710Sstevel@tonic-gate  * This ioctl closes a session.
20720Sstevel@tonic-gate  */
20730Sstevel@tonic-gate /* ARGSUSED */
20740Sstevel@tonic-gate static int
20750Sstevel@tonic-gate close_session(dev_t dev, caddr_t arg, int mode, int *rval)
20760Sstevel@tonic-gate {
20770Sstevel@tonic-gate 	crypto_close_session_t close_session;
20780Sstevel@tonic-gate 	int rv;
20790Sstevel@tonic-gate 
20800Sstevel@tonic-gate 	if (copyin(arg, &close_session, sizeof (close_session)) != 0)
20810Sstevel@tonic-gate 		return (EFAULT);
20820Sstevel@tonic-gate 
20830Sstevel@tonic-gate 	rv = crypto_close_session(dev, close_session.cs_session);
2084904Smcpowers 	close_session.cs_return_value = rv;
20850Sstevel@tonic-gate 	if (copyout(&close_session, arg, sizeof (close_session)) != 0) {
20860Sstevel@tonic-gate 		return (EFAULT);
20870Sstevel@tonic-gate 	}
20880Sstevel@tonic-gate 	return (0);
20890Sstevel@tonic-gate }
20900Sstevel@tonic-gate 
20910Sstevel@tonic-gate /*
20920Sstevel@tonic-gate  * Copy data model dependent mechanism structure into a kernel mechanism
20930Sstevel@tonic-gate  * structure.  Allocate param storage if necessary.
20940Sstevel@tonic-gate  */
20950Sstevel@tonic-gate static boolean_t
20966424Skrishna copyin_mech(int mode, crypto_session_data_t *sp, crypto_mechanism_t *in_mech,
20976424Skrishna     crypto_mechanism_t *out_mech, size_t *out_rctl_bytes,
20986424Skrishna     boolean_t *out_rctl_chk, int *out_rv, int *out_error)
20990Sstevel@tonic-gate {
21000Sstevel@tonic-gate 	STRUCT_DECL(crypto_mechanism, mech);
21010Sstevel@tonic-gate 	caddr_t param;
21020Sstevel@tonic-gate 	size_t param_len;
21036424Skrishna 	size_t rctl_bytes = 0;
21040Sstevel@tonic-gate 	int error = 0;
21050Sstevel@tonic-gate 	int rv = 0;
21060Sstevel@tonic-gate 
21070Sstevel@tonic-gate 	STRUCT_INIT(mech, mode);
21080Sstevel@tonic-gate 	bcopy(in_mech, STRUCT_BUF(mech), STRUCT_SIZE(mech));
21090Sstevel@tonic-gate 	param = STRUCT_FGETP(mech, cm_param);
21100Sstevel@tonic-gate 	param_len = STRUCT_FGET(mech, cm_param_len);
21110Sstevel@tonic-gate 	out_mech->cm_type = STRUCT_FGET(mech, cm_type);
21120Sstevel@tonic-gate 	out_mech->cm_param = NULL;
21130Sstevel@tonic-gate 	out_mech->cm_param_len = 0;
21140Sstevel@tonic-gate 	if (param != NULL && param_len != 0) {
21150Sstevel@tonic-gate 		if (param_len > crypto_max_buffer_len) {
21160Sstevel@tonic-gate 			cmn_err(CE_NOTE, "copyin_mech: buffer greater than "
21170Sstevel@tonic-gate 			    "%ld bytes, pid = %d", crypto_max_buffer_len,
21180Sstevel@tonic-gate 			    curproc->p_pid);
21190Sstevel@tonic-gate 			rv = CRYPTO_ARGUMENTS_BAD;
21200Sstevel@tonic-gate 			goto out;
21210Sstevel@tonic-gate 		}
21220Sstevel@tonic-gate 
21236424Skrishna 		rv = CRYPTO_BUFFER_CHECK(sp, param_len, *out_rctl_chk);
21246424Skrishna 		if (rv != CRYPTO_SUCCESS) {
21256424Skrishna 			goto out;
21260Sstevel@tonic-gate 		}
21276424Skrishna 		rctl_bytes = param_len;
21286424Skrishna 
21290Sstevel@tonic-gate 		out_mech->cm_param = kmem_alloc(param_len, KM_SLEEP);
21300Sstevel@tonic-gate 		if (copyin((char *)param, out_mech->cm_param, param_len) != 0) {
21310Sstevel@tonic-gate 			kmem_free(out_mech->cm_param, param_len);
21320Sstevel@tonic-gate 			out_mech->cm_param = NULL;
21330Sstevel@tonic-gate 			error = EFAULT;
21340Sstevel@tonic-gate 			goto out;
21350Sstevel@tonic-gate 		}
21360Sstevel@tonic-gate 		out_mech->cm_param_len = param_len;
21370Sstevel@tonic-gate 	}
21380Sstevel@tonic-gate out:
21390Sstevel@tonic-gate 	*out_rctl_bytes = rctl_bytes;
21400Sstevel@tonic-gate 	*out_rv = rv;
21410Sstevel@tonic-gate 	*out_error = error;
21420Sstevel@tonic-gate 	return ((rv | error) ? B_FALSE : B_TRUE);
21430Sstevel@tonic-gate }
21440Sstevel@tonic-gate 
21450Sstevel@tonic-gate /*
21460Sstevel@tonic-gate  * Free key attributes when key type is CRYPTO_KEY_ATTR_LIST.
21470Sstevel@tonic-gate  * The crypto_key structure is not freed.
21480Sstevel@tonic-gate  */
21490Sstevel@tonic-gate static void
21500Sstevel@tonic-gate crypto_free_key_attributes(crypto_key_t *key)
21510Sstevel@tonic-gate {
21520Sstevel@tonic-gate 	crypto_object_attribute_t *attrs;
21530Sstevel@tonic-gate 	size_t len = 0;
21540Sstevel@tonic-gate 	int i;
21550Sstevel@tonic-gate 
21560Sstevel@tonic-gate 	ASSERT(key->ck_format == CRYPTO_KEY_ATTR_LIST);
21570Sstevel@tonic-gate 	if (key->ck_count == 0 || key->ck_attrs == NULL)
21580Sstevel@tonic-gate 		return;
21590Sstevel@tonic-gate 
21600Sstevel@tonic-gate 	/* compute the size of the container */
21610Sstevel@tonic-gate 	len = key->ck_count * sizeof (crypto_object_attribute_t);
21620Sstevel@tonic-gate 
21630Sstevel@tonic-gate 	/* total up the size of all attributes in the container */
21640Sstevel@tonic-gate 	for (i = 0; i < key->ck_count; i++) {
21650Sstevel@tonic-gate 		attrs = &key->ck_attrs[i];
21660Sstevel@tonic-gate 		if (attrs->oa_value_len != 0 &&
21670Sstevel@tonic-gate 		    attrs->oa_value != NULL) {
21680Sstevel@tonic-gate 			len += roundup(attrs->oa_value_len, sizeof (caddr_t));
21690Sstevel@tonic-gate 		}
21700Sstevel@tonic-gate 	}
21710Sstevel@tonic-gate 
21720Sstevel@tonic-gate 	bzero(key->ck_attrs, len);
21730Sstevel@tonic-gate 	kmem_free(key->ck_attrs, len);
21740Sstevel@tonic-gate }
21750Sstevel@tonic-gate 
21760Sstevel@tonic-gate /*
21770Sstevel@tonic-gate  * Frees allocated storage in the key structure, but doesn't free
21780Sstevel@tonic-gate  * the key structure.
21790Sstevel@tonic-gate  */
21800Sstevel@tonic-gate static void
21810Sstevel@tonic-gate free_crypto_key(crypto_key_t *key)
21820Sstevel@tonic-gate {
21830Sstevel@tonic-gate 	switch (key->ck_format) {
21840Sstevel@tonic-gate 	case CRYPTO_KEY_RAW: {
21850Sstevel@tonic-gate 		size_t len;
21860Sstevel@tonic-gate 
21870Sstevel@tonic-gate 		if (key->ck_length == 0 || key->ck_data == NULL)
21880Sstevel@tonic-gate 			break;
21890Sstevel@tonic-gate 
21900Sstevel@tonic-gate 		len = CRYPTO_BITS2BYTES(key->ck_length);
21910Sstevel@tonic-gate 		bzero(key->ck_data, len);
21920Sstevel@tonic-gate 		kmem_free(key->ck_data, len);
21930Sstevel@tonic-gate 		break;
21940Sstevel@tonic-gate 	}
21950Sstevel@tonic-gate 
21960Sstevel@tonic-gate 	case CRYPTO_KEY_ATTR_LIST:
21970Sstevel@tonic-gate 		crypto_free_key_attributes(key);
21980Sstevel@tonic-gate 		break;
21990Sstevel@tonic-gate 
22000Sstevel@tonic-gate 	default:
22010Sstevel@tonic-gate 		break;
22020Sstevel@tonic-gate 	}
22030Sstevel@tonic-gate }
22040Sstevel@tonic-gate 
22050Sstevel@tonic-gate /*
22060Sstevel@tonic-gate  * Copy in an array of crypto_object_attribute structures from user-space.
22070Sstevel@tonic-gate  * Kernel memory is allocated for the array and the value of each attribute
22080Sstevel@tonic-gate  * in the array.  Since unprivileged users can specify the size of attributes,
22090Sstevel@tonic-gate  * the amount of memory needed is charged against the
22100Sstevel@tonic-gate  * project.max-crypto-memory resource control.
22110Sstevel@tonic-gate  *
22120Sstevel@tonic-gate  * Attribute values are copied in from user-space if copyin_value is set to
22130Sstevel@tonic-gate  * B_TRUE.  This routine returns B_TRUE if the copyin was successful.
22140Sstevel@tonic-gate  */
22150Sstevel@tonic-gate static boolean_t
22166424Skrishna copyin_attributes(int mode, crypto_session_data_t *sp,
22176424Skrishna     uint_t count, caddr_t oc_attributes,
22180Sstevel@tonic-gate     crypto_object_attribute_t **k_attrs_out, size_t *k_attrs_size_out,
22190Sstevel@tonic-gate     caddr_t *u_attrs_out, int *out_rv, int *out_error, size_t *out_rctl_bytes,
22206424Skrishna     boolean_t *out_rctl_chk, boolean_t copyin_value)
22210Sstevel@tonic-gate {
22220Sstevel@tonic-gate 	STRUCT_DECL(crypto_object_attribute, oa);
22230Sstevel@tonic-gate 	crypto_object_attribute_t *k_attrs = NULL;
22240Sstevel@tonic-gate 	caddr_t attrs = NULL, ap, p, value;
22250Sstevel@tonic-gate 	caddr_t k_attrs_buf;
22260Sstevel@tonic-gate 	size_t k_attrs_len;
22270Sstevel@tonic-gate 	size_t k_attrs_buf_len = 0;
22280Sstevel@tonic-gate 	size_t k_attrs_total_len = 0;
22290Sstevel@tonic-gate 	size_t tmp_len;
22300Sstevel@tonic-gate 	size_t rctl_bytes = 0;
22310Sstevel@tonic-gate 	size_t len = 0;
22320Sstevel@tonic-gate 	size_t value_len;
22330Sstevel@tonic-gate 	int error = 0;
22340Sstevel@tonic-gate 	int rv = 0;
22350Sstevel@tonic-gate 	int i;
22360Sstevel@tonic-gate 
22370Sstevel@tonic-gate 	STRUCT_INIT(oa, mode);
22380Sstevel@tonic-gate 
22390Sstevel@tonic-gate 	if (count == 0) {
22400Sstevel@tonic-gate 		rv = CRYPTO_SUCCESS;
22410Sstevel@tonic-gate 		goto out;
22420Sstevel@tonic-gate 	}
22430Sstevel@tonic-gate 
22440Sstevel@tonic-gate 	if (count > CRYPTO_MAX_ATTRIBUTE_COUNT) {
22450Sstevel@tonic-gate 		rv = CRYPTO_ARGUMENTS_BAD;
22460Sstevel@tonic-gate 		goto out;
22470Sstevel@tonic-gate 	}
22480Sstevel@tonic-gate 
22490Sstevel@tonic-gate 	/* compute size of crypto_object_attribute array */
22500Sstevel@tonic-gate 	len = count * STRUCT_SIZE(oa);
22510Sstevel@tonic-gate 
22520Sstevel@tonic-gate 	/* this allocation is not charged against the user's resource limit */
22530Sstevel@tonic-gate 	attrs = kmem_alloc(len, KM_SLEEP);
22540Sstevel@tonic-gate 	if (copyin(oc_attributes, attrs, len) != 0) {
22550Sstevel@tonic-gate 		error = EFAULT;
22560Sstevel@tonic-gate 		goto out;
22570Sstevel@tonic-gate 	}
22580Sstevel@tonic-gate 
22590Sstevel@tonic-gate 	/* figure out how much memory to allocate for all of the attributes */
22600Sstevel@tonic-gate 	ap = attrs;
22610Sstevel@tonic-gate 	for (i = 0; i < count; i++) {
22620Sstevel@tonic-gate 		bcopy(ap, STRUCT_BUF(oa), STRUCT_SIZE(oa));
22630Sstevel@tonic-gate 		tmp_len = roundup(STRUCT_FGET(oa, oa_value_len),
22640Sstevel@tonic-gate 		    sizeof (caddr_t));
22650Sstevel@tonic-gate 		if (tmp_len > crypto_max_buffer_len) {
22660Sstevel@tonic-gate 			cmn_err(CE_NOTE, "copyin_attributes: buffer greater "
22670Sstevel@tonic-gate 			    "than %ld bytes, pid = %d", crypto_max_buffer_len,
22680Sstevel@tonic-gate 			    curproc->p_pid);
22690Sstevel@tonic-gate 			rv = CRYPTO_ARGUMENTS_BAD;
22700Sstevel@tonic-gate 			goto out;
22710Sstevel@tonic-gate 		}
22720Sstevel@tonic-gate 		if (STRUCT_FGETP(oa, oa_value) != NULL)
22730Sstevel@tonic-gate 			k_attrs_buf_len += tmp_len;
22740Sstevel@tonic-gate 		ap += STRUCT_SIZE(oa);
22750Sstevel@tonic-gate 	}
22760Sstevel@tonic-gate 
22770Sstevel@tonic-gate 	k_attrs_len = count * sizeof (crypto_object_attribute_t);
22780Sstevel@tonic-gate 	k_attrs_total_len = k_attrs_buf_len + k_attrs_len;
22796424Skrishna 
22806424Skrishna 	rv = CRYPTO_BUFFER_CHECK(sp, k_attrs_total_len, *out_rctl_chk);
22816424Skrishna 	if (rv != CRYPTO_SUCCESS) {
22826424Skrishna 		goto out;
22836424Skrishna 	}
22846424Skrishna 	rctl_bytes = k_attrs_total_len;
22850Sstevel@tonic-gate 
22860Sstevel@tonic-gate 	/* one big allocation for everything */
22870Sstevel@tonic-gate 	k_attrs = kmem_alloc(k_attrs_total_len, KM_SLEEP);
22880Sstevel@tonic-gate 	k_attrs_buf = (char *)k_attrs + k_attrs_len;
22890Sstevel@tonic-gate 
22900Sstevel@tonic-gate 	ap = attrs;
22910Sstevel@tonic-gate 	p = k_attrs_buf;
22920Sstevel@tonic-gate 	for (i = 0; i < count; i++) {
22930Sstevel@tonic-gate 		bcopy(ap, STRUCT_BUF(oa), STRUCT_SIZE(oa));
22940Sstevel@tonic-gate 		k_attrs[i].oa_type = STRUCT_FGET(oa, oa_type);
22950Sstevel@tonic-gate 		value = STRUCT_FGETP(oa, oa_value);
22960Sstevel@tonic-gate 		value_len = STRUCT_FGET(oa, oa_value_len);
22970Sstevel@tonic-gate 		if (value != NULL && value_len != 0 && copyin_value) {
22980Sstevel@tonic-gate 			if (copyin(value, p, value_len) != 0) {
22990Sstevel@tonic-gate 				kmem_free(k_attrs, k_attrs_total_len);
23000Sstevel@tonic-gate 				k_attrs = NULL;
23010Sstevel@tonic-gate 				error = EFAULT;
23020Sstevel@tonic-gate 				goto out;
23030Sstevel@tonic-gate 			}
23040Sstevel@tonic-gate 		}
23050Sstevel@tonic-gate 
2306292Smcpowers 		if (value != NULL) {
2307292Smcpowers 			k_attrs[i].oa_value = p;
2308292Smcpowers 			p += roundup(value_len, sizeof (caddr_t));
2309292Smcpowers 		} else {
2310292Smcpowers 			k_attrs[i].oa_value = NULL;
2311292Smcpowers 		}
23120Sstevel@tonic-gate 		k_attrs[i].oa_value_len = value_len;
23130Sstevel@tonic-gate 		ap += STRUCT_SIZE(oa);
23140Sstevel@tonic-gate 	}
23150Sstevel@tonic-gate out:
23160Sstevel@tonic-gate 	if (attrs != NULL) {
23170Sstevel@tonic-gate 		/*
23180Sstevel@tonic-gate 		 * Free the array if there is a failure or the caller
23190Sstevel@tonic-gate 		 * doesn't want the array to be returned.
23200Sstevel@tonic-gate 		 */
23210Sstevel@tonic-gate 		if (error != 0 || rv != CRYPTO_SUCCESS || u_attrs_out == NULL) {
23220Sstevel@tonic-gate 			kmem_free(attrs, len);
23230Sstevel@tonic-gate 			attrs = NULL;
23240Sstevel@tonic-gate 		}
23250Sstevel@tonic-gate 	}
23260Sstevel@tonic-gate 
23270Sstevel@tonic-gate 	if (u_attrs_out != NULL)
23280Sstevel@tonic-gate 		*u_attrs_out = attrs;
23290Sstevel@tonic-gate 	if (k_attrs_size_out != NULL)
23300Sstevel@tonic-gate 		*k_attrs_size_out = k_attrs_total_len;
23310Sstevel@tonic-gate 	*k_attrs_out = k_attrs;
23320Sstevel@tonic-gate 	*out_rctl_bytes = rctl_bytes;
23330Sstevel@tonic-gate 	*out_rv = rv;
23340Sstevel@tonic-gate 	*out_error = error;
23350Sstevel@tonic-gate 	return ((rv | error) ? B_FALSE : B_TRUE);
23360Sstevel@tonic-gate }
23370Sstevel@tonic-gate 
23380Sstevel@tonic-gate /*
23390Sstevel@tonic-gate  * Copy data model dependent raw key into a kernel key
23400Sstevel@tonic-gate  * structure.  Checks key length or attribute lengths against
23410Sstevel@tonic-gate  * resource controls before allocating memory.  Returns B_TRUE
23420Sstevel@tonic-gate  * if both error and rv are set to 0.
23430Sstevel@tonic-gate  */
23440Sstevel@tonic-gate static boolean_t
23456424Skrishna copyin_key(int mode, crypto_session_data_t *sp, crypto_key_t *in_key,
23466424Skrishna     crypto_key_t *out_key, size_t *out_rctl_bytes,
23476424Skrishna     boolean_t *out_rctl_chk, int *out_rv, int *out_error)
23480Sstevel@tonic-gate {
23490Sstevel@tonic-gate 	STRUCT_DECL(crypto_key, key);
23500Sstevel@tonic-gate 	crypto_object_attribute_t *k_attrs = NULL;
23510Sstevel@tonic-gate 	size_t key_bits;
23520Sstevel@tonic-gate 	size_t key_bytes = 0;
23530Sstevel@tonic-gate 	size_t rctl_bytes = 0;
23540Sstevel@tonic-gate 	int count;
23550Sstevel@tonic-gate 	int error = 0;
23560Sstevel@tonic-gate 	int rv = CRYPTO_SUCCESS;
23570Sstevel@tonic-gate 
23580Sstevel@tonic-gate 	STRUCT_INIT(key, mode);
23590Sstevel@tonic-gate 	bcopy(in_key, STRUCT_BUF(key), STRUCT_SIZE(key));
23600Sstevel@tonic-gate 	out_key->ck_format = STRUCT_FGET(key, ck_format);
23610Sstevel@tonic-gate 	switch (out_key->ck_format) {
23620Sstevel@tonic-gate 	case CRYPTO_KEY_RAW:
23630Sstevel@tonic-gate 		key_bits = STRUCT_FGET(key, ck_length);
23640Sstevel@tonic-gate 		if (key_bits != 0) {
23650Sstevel@tonic-gate 			key_bytes = CRYPTO_BITS2BYTES(key_bits);
23660Sstevel@tonic-gate 			if (key_bytes > crypto_max_buffer_len) {
23670Sstevel@tonic-gate 				cmn_err(CE_NOTE, "copyin_key: buffer greater "
23680Sstevel@tonic-gate 				    "than %ld bytes, pid = %d",
23690Sstevel@tonic-gate 				    crypto_max_buffer_len, curproc->p_pid);
23700Sstevel@tonic-gate 				rv = CRYPTO_ARGUMENTS_BAD;
23710Sstevel@tonic-gate 				goto out;
23720Sstevel@tonic-gate 			}
23730Sstevel@tonic-gate 
23746424Skrishna 			rv = CRYPTO_BUFFER_CHECK(sp, key_bytes,
23756424Skrishna 			    *out_rctl_chk);
23760Sstevel@tonic-gate 			if (rv != CRYPTO_SUCCESS) {
23770Sstevel@tonic-gate 				goto out;
23780Sstevel@tonic-gate 			}
23796424Skrishna 			rctl_bytes = key_bytes;
23800Sstevel@tonic-gate 
23810Sstevel@tonic-gate 			out_key->ck_data = kmem_alloc(key_bytes, KM_SLEEP);
23820Sstevel@tonic-gate 
23830Sstevel@tonic-gate 			if (copyin((char *)STRUCT_FGETP(key, ck_data),
23840Sstevel@tonic-gate 			    out_key->ck_data, key_bytes) != 0) {
23850Sstevel@tonic-gate 				kmem_free(out_key->ck_data, key_bytes);
23860Sstevel@tonic-gate 				out_key->ck_data = NULL;
23870Sstevel@tonic-gate 				out_key->ck_length = 0;
23880Sstevel@tonic-gate 				error = EFAULT;
23890Sstevel@tonic-gate 				goto out;
23900Sstevel@tonic-gate 			}
23910Sstevel@tonic-gate 		}
23920Sstevel@tonic-gate 		out_key->ck_length = key_bits;
23930Sstevel@tonic-gate 		break;
23940Sstevel@tonic-gate 
23950Sstevel@tonic-gate 	case CRYPTO_KEY_ATTR_LIST:
23960Sstevel@tonic-gate 		count = STRUCT_FGET(key, ck_count);
23970Sstevel@tonic-gate 
23986424Skrishna 		if (copyin_attributes(mode, sp, count,
23990Sstevel@tonic-gate 		    (caddr_t)STRUCT_FGETP(key, ck_attrs), &k_attrs, NULL, NULL,
24006424Skrishna 		    &rv, &error, &rctl_bytes, out_rctl_chk, B_TRUE)) {
24010Sstevel@tonic-gate 			out_key->ck_count = count;
24020Sstevel@tonic-gate 			out_key->ck_attrs = k_attrs;
24030Sstevel@tonic-gate 			k_attrs = NULL;
24040Sstevel@tonic-gate 		} else {
24050Sstevel@tonic-gate 			out_key->ck_count = 0;
24060Sstevel@tonic-gate 			out_key->ck_attrs = NULL;
24070Sstevel@tonic-gate 		}
24080Sstevel@tonic-gate 		break;
24090Sstevel@tonic-gate 
24100Sstevel@tonic-gate 	case CRYPTO_KEY_REFERENCE:
24110Sstevel@tonic-gate 		out_key->ck_obj_id = STRUCT_FGET(key, ck_obj_id);
24120Sstevel@tonic-gate 		break;
24130Sstevel@tonic-gate 
24140Sstevel@tonic-gate 	default:
24150Sstevel@tonic-gate 		rv = CRYPTO_ARGUMENTS_BAD;
24160Sstevel@tonic-gate 	}
24170Sstevel@tonic-gate 
24180Sstevel@tonic-gate out:
24190Sstevel@tonic-gate 	*out_rctl_bytes = rctl_bytes;
24200Sstevel@tonic-gate 	*out_rv = rv;
24210Sstevel@tonic-gate 	*out_error = error;
24220Sstevel@tonic-gate 	return ((rv | error) ? B_FALSE : B_TRUE);
24230Sstevel@tonic-gate }
24240Sstevel@tonic-gate 
24250Sstevel@tonic-gate /*
24260Sstevel@tonic-gate  * This routine does two things:
24270Sstevel@tonic-gate  * 1. Given a crypto_minor structure and a session ID, it returns
24280Sstevel@tonic-gate  *    a valid session pointer.
24290Sstevel@tonic-gate  * 2. It checks that the provider, to which the session has been opened,
24300Sstevel@tonic-gate  *    has not been removed.
24310Sstevel@tonic-gate  */
24320Sstevel@tonic-gate static boolean_t
24330Sstevel@tonic-gate get_session_ptr(crypto_session_id_t i, crypto_minor_t *cm,
24340Sstevel@tonic-gate     crypto_session_data_t **session_ptr, int *out_error, int *out_rv)
24350Sstevel@tonic-gate {
24360Sstevel@tonic-gate 	crypto_session_data_t *sp = NULL;
24370Sstevel@tonic-gate 	int rv = CRYPTO_SESSION_HANDLE_INVALID;
24380Sstevel@tonic-gate 	int error = 0;
24390Sstevel@tonic-gate 
24400Sstevel@tonic-gate 	mutex_enter(&cm->cm_lock);
24410Sstevel@tonic-gate 	if ((i < cm->cm_session_table_count) &&
24420Sstevel@tonic-gate 	    (cm->cm_session_table[i] != NULL)) {
24430Sstevel@tonic-gate 		sp = cm->cm_session_table[i];
24440Sstevel@tonic-gate 		mutex_enter(&sp->sd_lock);
24450Sstevel@tonic-gate 		mutex_exit(&cm->cm_lock);
24460Sstevel@tonic-gate 		while (sp->sd_flags & CRYPTO_SESSION_IS_BUSY) {
24470Sstevel@tonic-gate 			if (cv_wait_sig(&sp->sd_cv, &sp->sd_lock) == 0) {
24480Sstevel@tonic-gate 				mutex_exit(&sp->sd_lock);
24490Sstevel@tonic-gate 				sp = NULL;
24500Sstevel@tonic-gate 				error = EINTR;
24510Sstevel@tonic-gate 				goto out;
24520Sstevel@tonic-gate 			}
24530Sstevel@tonic-gate 		}
24540Sstevel@tonic-gate 
24550Sstevel@tonic-gate 		if (sp->sd_flags & CRYPTO_SESSION_IS_CLOSED) {
24560Sstevel@tonic-gate 			mutex_exit(&sp->sd_lock);
24570Sstevel@tonic-gate 			sp = NULL;
24580Sstevel@tonic-gate 			goto out;
24590Sstevel@tonic-gate 		}
24600Sstevel@tonic-gate 
24610Sstevel@tonic-gate 		if (KCF_IS_PROV_REMOVED(sp->sd_provider)) {
24620Sstevel@tonic-gate 			mutex_exit(&sp->sd_lock);
24630Sstevel@tonic-gate 			sp = NULL;
24640Sstevel@tonic-gate 			rv = CRYPTO_DEVICE_ERROR;
24650Sstevel@tonic-gate 			goto out;
24660Sstevel@tonic-gate 		}
24670Sstevel@tonic-gate 
24680Sstevel@tonic-gate 		rv = CRYPTO_SUCCESS;
24690Sstevel@tonic-gate 		sp->sd_flags |= CRYPTO_SESSION_IS_BUSY;
24700Sstevel@tonic-gate 		mutex_exit(&sp->sd_lock);
24710Sstevel@tonic-gate 	} else {
24720Sstevel@tonic-gate 		mutex_exit(&cm->cm_lock);
24730Sstevel@tonic-gate 	}
24740Sstevel@tonic-gate out:
24750Sstevel@tonic-gate 	*session_ptr = sp;
24760Sstevel@tonic-gate 	*out_error = error;
24770Sstevel@tonic-gate 	*out_rv = rv;
24780Sstevel@tonic-gate 	return ((rv == CRYPTO_SUCCESS && error == 0) ? B_TRUE : B_FALSE);
24790Sstevel@tonic-gate }
24800Sstevel@tonic-gate 
24816424Skrishna #define	CRYPTO_SESSION_RELE(s)	if ((s) != NULL) {	\
24820Sstevel@tonic-gate 	mutex_enter(&((s)->sd_lock));			\
24830Sstevel@tonic-gate 	(s)->sd_flags &= ~CRYPTO_SESSION_IS_BUSY;	\
24840Sstevel@tonic-gate 	cv_broadcast(&(s)->sd_cv);			\
24850Sstevel@tonic-gate 	mutex_exit(&((s)->sd_lock));			\
24860Sstevel@tonic-gate }
24870Sstevel@tonic-gate 
24880Sstevel@tonic-gate /* ARGSUSED */
24890Sstevel@tonic-gate static int
24900Sstevel@tonic-gate encrypt_init(dev_t dev, caddr_t arg, int mode, int *rval)
24910Sstevel@tonic-gate {
24920Sstevel@tonic-gate 	return (cipher_init(dev, arg, mode, crypto_encrypt_init_prov));
24930Sstevel@tonic-gate }
24940Sstevel@tonic-gate 
24950Sstevel@tonic-gate /* ARGSUSED */
24960Sstevel@tonic-gate static int
24970Sstevel@tonic-gate decrypt_init(dev_t dev, caddr_t arg, int mode, int *rval)
24980Sstevel@tonic-gate {
24990Sstevel@tonic-gate 	return (cipher_init(dev, arg, mode, crypto_decrypt_init_prov));
25000Sstevel@tonic-gate }
25010Sstevel@tonic-gate 
25020Sstevel@tonic-gate /*
2503904Smcpowers  * umech is a mechanism structure that has been copied from user address
2504904Smcpowers  * space into kernel address space. Only one copyin has been done.
2505904Smcpowers  * The mechanism parameter, if non-null, still points to user address space.
2506904Smcpowers  * If the mechanism parameter contains pointers, they are pointers into
2507904Smcpowers  * user address space.
2508904Smcpowers  *
2509904Smcpowers  * kmech is a umech with all pointers and structures in kernel address space.
2510904Smcpowers  *
2511904Smcpowers  * This routine calls the provider's entry point to copy a umech parameter
2512904Smcpowers  * into kernel address space. Kernel memory is allocated by the provider.
2513904Smcpowers  */
2514904Smcpowers static int
2515904Smcpowers crypto_provider_copyin_mech_param(kcf_provider_desc_t *pd,
2516904Smcpowers     crypto_mechanism_t *umech, crypto_mechanism_t *kmech, int mode, int *error)
2517904Smcpowers {
2518904Smcpowers 	crypto_mech_type_t provider_mech_type;
2519904Smcpowers 	int rv;
2520904Smcpowers 
2521904Smcpowers 	/* get the provider's mech number */
25223708Skrishna 	provider_mech_type = KCF_TO_PROV_MECHNUM(pd, umech->cm_type);
2523904Smcpowers 
2524904Smcpowers 	kmech->cm_param = NULL;
2525904Smcpowers 	kmech->cm_param_len = 0;
2526904Smcpowers 	kmech->cm_type = provider_mech_type;
2527904Smcpowers 	rv = KCF_PROV_COPYIN_MECH(pd, umech, kmech, error, mode);
2528904Smcpowers 	kmech->cm_type = umech->cm_type;
2529904Smcpowers 
2530904Smcpowers 	return (rv);
2531904Smcpowers }
2532904Smcpowers 
2533904Smcpowers /*
2534904Smcpowers  * umech is a mechanism structure that has been copied from user address
2535904Smcpowers  * space into kernel address space. Only one copyin has been done.
2536904Smcpowers  * The mechanism parameter, if non-null, still points to user address space.
2537904Smcpowers  * If the mechanism parameter contains pointers, they are pointers into
2538904Smcpowers  * user address space.
2539904Smcpowers  *
2540904Smcpowers  * kmech is a umech with all pointers and structures in kernel address space.
2541904Smcpowers  *
2542904Smcpowers  * This routine calls the provider's entry point to copy a kmech parameter
2543904Smcpowers  * into user address space using umech as a template containing
2544904Smcpowers  * user address pointers.
2545904Smcpowers  */
2546904Smcpowers static int
2547904Smcpowers crypto_provider_copyout_mech_param(kcf_provider_desc_t *pd,
2548904Smcpowers     crypto_mechanism_t *kmech, crypto_mechanism_t *umech, int mode, int *error)
2549904Smcpowers {
2550904Smcpowers 	crypto_mech_type_t provider_mech_type;
2551904Smcpowers 	int rv;
2552904Smcpowers 
2553904Smcpowers 	/* get the provider's mech number */
25543708Skrishna 	provider_mech_type = KCF_TO_PROV_MECHNUM(pd, umech->cm_type);
2555904Smcpowers 
2556904Smcpowers 	kmech->cm_type = provider_mech_type;
2557904Smcpowers 	rv = KCF_PROV_COPYOUT_MECH(pd, kmech, umech, error, mode);
2558904Smcpowers 	kmech->cm_type = umech->cm_type;
2559904Smcpowers 
2560904Smcpowers 	return (rv);
2561904Smcpowers }
2562904Smcpowers 
2563904Smcpowers /*
2564904Smcpowers  * Call the provider's entry point to free kernel memory that has been
2565904Smcpowers  * allocated for the mechanism's parameter.
2566904Smcpowers  */
2567904Smcpowers static void
2568904Smcpowers crypto_free_mech(kcf_provider_desc_t *pd, boolean_t allocated_by_crypto_module,
2569904Smcpowers     crypto_mechanism_t *mech)
2570904Smcpowers {
2571904Smcpowers 	crypto_mech_type_t provider_mech_type;
2572904Smcpowers 
2573904Smcpowers 	if (allocated_by_crypto_module) {
2574904Smcpowers 		if (mech->cm_param != NULL)
2575904Smcpowers 			kmem_free(mech->cm_param, mech->cm_param_len);
2576904Smcpowers 	} else {
2577904Smcpowers 		/* get the provider's mech number */
25783708Skrishna 		provider_mech_type = KCF_TO_PROV_MECHNUM(pd, mech->cm_type);
2579904Smcpowers 
2580904Smcpowers 		if (mech->cm_param != NULL && mech->cm_param_len != 0) {
2581904Smcpowers 			mech->cm_type = provider_mech_type;
2582904Smcpowers 			(void) KCF_PROV_FREE_MECH(pd, mech);
2583904Smcpowers 		}
2584904Smcpowers 	}
2585904Smcpowers }
2586904Smcpowers 
2587904Smcpowers /*
25880Sstevel@tonic-gate  * ASSUMPTION: crypto_encrypt_init and crypto_decrypt_init
25890Sstevel@tonic-gate  * structures are identical except for field names.
25900Sstevel@tonic-gate  */
25910Sstevel@tonic-gate static int
2592904Smcpowers cipher_init(dev_t dev, caddr_t arg, int mode, int (*init)(crypto_provider_t,
25930Sstevel@tonic-gate     crypto_session_id_t, crypto_mechanism_t *, crypto_key_t *,
25940Sstevel@tonic-gate     crypto_ctx_template_t, crypto_context_t *, crypto_call_req_t *))
25950Sstevel@tonic-gate {
25960Sstevel@tonic-gate 	STRUCT_DECL(crypto_encrypt_init, encrypt_init);
2597904Smcpowers 	kcf_provider_desc_t *real_provider = NULL;
25980Sstevel@tonic-gate 	crypto_session_id_t session_id;
25990Sstevel@tonic-gate 	crypto_mechanism_t mech;
26000Sstevel@tonic-gate 	crypto_key_t key;
26010Sstevel@tonic-gate 	crypto_minor_t *cm;
26026424Skrishna 	crypto_session_data_t *sp = NULL;
26030Sstevel@tonic-gate 	crypto_context_t cc;
26040Sstevel@tonic-gate 	crypto_ctx_t **ctxpp;
26050Sstevel@tonic-gate 	size_t mech_rctl_bytes = 0;
26066424Skrishna 	boolean_t mech_rctl_chk = B_FALSE;
26070Sstevel@tonic-gate 	size_t key_rctl_bytes = 0;
26086424Skrishna 	boolean_t key_rctl_chk = B_FALSE;
26090Sstevel@tonic-gate 	int error = 0;
26100Sstevel@tonic-gate 	int rv;
2611904Smcpowers 	boolean_t allocated_by_crypto_module = B_FALSE;
26121808Smcpowers 	crypto_func_group_t fg;
26130Sstevel@tonic-gate 
26140Sstevel@tonic-gate 	STRUCT_INIT(encrypt_init, mode);
26150Sstevel@tonic-gate 
26160Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
26170Sstevel@tonic-gate 		cmn_err(CE_WARN, "cipher_init: failed holding minor");
26180Sstevel@tonic-gate 		return (ENXIO);
26190Sstevel@tonic-gate 	}
26200Sstevel@tonic-gate 
26210Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(encrypt_init),
26220Sstevel@tonic-gate 	    STRUCT_SIZE(encrypt_init)) != 0) {
26230Sstevel@tonic-gate 		crypto_release_minor(cm);
26240Sstevel@tonic-gate 		return (EFAULT);
26250Sstevel@tonic-gate 	}
26260Sstevel@tonic-gate 
26270Sstevel@tonic-gate 	mech.cm_param = NULL;
26280Sstevel@tonic-gate 	bzero(&key, sizeof (crypto_key_t));
26290Sstevel@tonic-gate 
26300Sstevel@tonic-gate 	session_id = STRUCT_FGET(encrypt_init, ei_session);
26310Sstevel@tonic-gate 
26320Sstevel@tonic-gate 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv)) {
26336424Skrishna 		goto out;
26340Sstevel@tonic-gate 	}
26350Sstevel@tonic-gate 
2636904Smcpowers 	bcopy(STRUCT_FADDR(encrypt_init, ei_mech), &mech.cm_type,
2637904Smcpowers 	    sizeof (crypto_mech_type_t));
26380Sstevel@tonic-gate 
26391808Smcpowers 	if (init == crypto_encrypt_init_prov) {
26401808Smcpowers 		fg = CRYPTO_FG_ENCRYPT;
26411808Smcpowers 	} else {
26421808Smcpowers 		fg = CRYPTO_FG_DECRYPT;
26431808Smcpowers 	}
26440Sstevel@tonic-gate 
264510444SVladimir.Kotal@Sun.COM 	/* We need the key length for provider selection so copy it in now. */
264610444SVladimir.Kotal@Sun.COM 	if (!copyin_key(mode, sp, STRUCT_FADDR(encrypt_init, ei_key), &key,
264710444SVladimir.Kotal@Sun.COM 	    &key_rctl_bytes, &key_rctl_chk, &rv, &error)) {
264810444SVladimir.Kotal@Sun.COM 		goto out;
264910444SVladimir.Kotal@Sun.COM 	}
265010444SVladimir.Kotal@Sun.COM 
265110444SVladimir.Kotal@Sun.COM 	if ((rv = kcf_get_hardware_provider(mech.cm_type, &key,
265210444SVladimir.Kotal@Sun.COM 	    CRYPTO_MECH_INVALID, NULL, CHECK_RESTRICT_FALSE, sp->sd_provider,
265310444SVladimir.Kotal@Sun.COM 	    &real_provider, fg))
26541808Smcpowers 	    != CRYPTO_SUCCESS) {
26550Sstevel@tonic-gate 		goto out;
26560Sstevel@tonic-gate 	}
26570Sstevel@tonic-gate 
2658904Smcpowers 	rv = crypto_provider_copyin_mech_param(real_provider,
2659904Smcpowers 	    STRUCT_FADDR(encrypt_init, ei_mech), &mech, mode, &error);
2660904Smcpowers 
2661904Smcpowers 	if (rv == CRYPTO_NOT_SUPPORTED) {
2662904Smcpowers 		allocated_by_crypto_module = B_TRUE;
26636424Skrishna 		if (!copyin_mech(mode, sp, STRUCT_FADDR(encrypt_init, ei_mech),
26646424Skrishna 		    &mech, &mech_rctl_bytes, &mech_rctl_chk, &rv, &error)) {
2665904Smcpowers 			goto out;
2666904Smcpowers 		}
2667904Smcpowers 	} else {
2668904Smcpowers 		if (rv != CRYPTO_SUCCESS)
2669904Smcpowers 			goto out;
2670904Smcpowers 	}
2671904Smcpowers 
26720Sstevel@tonic-gate 	rv = (init)(real_provider, sp->sd_provider_session->ps_session,
26730Sstevel@tonic-gate 	    &mech, &key, NULL, &cc, NULL);
26740Sstevel@tonic-gate 
26750Sstevel@tonic-gate 	/*
26760Sstevel@tonic-gate 	 * Check if a context already exists. If so, it means it is being
26770Sstevel@tonic-gate 	 * abandoned. So, cancel it to avoid leaking it.
26780Sstevel@tonic-gate 	 */
26790Sstevel@tonic-gate 	ctxpp = (init == crypto_encrypt_init_prov) ?
26800Sstevel@tonic-gate 	    &sp->sd_encr_ctx : &sp->sd_decr_ctx;
26810Sstevel@tonic-gate 
26820Sstevel@tonic-gate 	if (*ctxpp != NULL)
26830Sstevel@tonic-gate 		CRYPTO_CANCEL_CTX(ctxpp);
26840Sstevel@tonic-gate 	*ctxpp = (rv == CRYPTO_SUCCESS) ? cc : NULL;
2685904Smcpowers 
26860Sstevel@tonic-gate out:
26876424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, mech_rctl_bytes, mech_rctl_chk);
26886424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, key_rctl_bytes, key_rctl_chk);
26890Sstevel@tonic-gate 	CRYPTO_SESSION_RELE(sp);
26900Sstevel@tonic-gate 	crypto_release_minor(cm);
26910Sstevel@tonic-gate 
2692904Smcpowers 	if (real_provider != NULL) {
2693904Smcpowers 		crypto_free_mech(real_provider,
2694904Smcpowers 		    allocated_by_crypto_module, &mech);
2695904Smcpowers 		KCF_PROV_REFRELE(real_provider);
2696904Smcpowers 	}
26970Sstevel@tonic-gate 
26980Sstevel@tonic-gate 	free_crypto_key(&key);
26990Sstevel@tonic-gate 
27000Sstevel@tonic-gate 	if (error != 0)
2701904Smcpowers 		/* XXX free context */
27020Sstevel@tonic-gate 		return (error);
27030Sstevel@tonic-gate 
27040Sstevel@tonic-gate 	STRUCT_FSET(encrypt_init, ei_return_value, rv);
27050Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(encrypt_init), arg,
27060Sstevel@tonic-gate 	    STRUCT_SIZE(encrypt_init)) != 0) {
2707904Smcpowers 		/* XXX free context */
27080Sstevel@tonic-gate 		return (EFAULT);
27090Sstevel@tonic-gate 	}
27100Sstevel@tonic-gate 	return (0);
27110Sstevel@tonic-gate }
27120Sstevel@tonic-gate 
27130Sstevel@tonic-gate /* ARGSUSED */
27140Sstevel@tonic-gate static int
27150Sstevel@tonic-gate encrypt(dev_t dev, caddr_t arg, int mode, int *rval)
27160Sstevel@tonic-gate {
27170Sstevel@tonic-gate 	return (cipher(dev, arg, mode, crypto_encrypt_single));
27180Sstevel@tonic-gate }
27190Sstevel@tonic-gate 
27200Sstevel@tonic-gate /* ARGSUSED */
27210Sstevel@tonic-gate static int
27220Sstevel@tonic-gate decrypt(dev_t dev, caddr_t arg, int mode, int *rval)
27230Sstevel@tonic-gate {
27240Sstevel@tonic-gate 	return (cipher(dev, arg, mode, crypto_decrypt_single));
27250Sstevel@tonic-gate }
27260Sstevel@tonic-gate 
27270Sstevel@tonic-gate /*
27280Sstevel@tonic-gate  * ASSUMPTION: crypto_encrypt and crypto_decrypt structures
27290Sstevel@tonic-gate  * are identical except for field names.
27300Sstevel@tonic-gate  */
27310Sstevel@tonic-gate static int
27320Sstevel@tonic-gate cipher(dev_t dev, caddr_t arg, int mode,
27330Sstevel@tonic-gate     int (*single)(crypto_context_t, crypto_data_t *, crypto_data_t *,
27340Sstevel@tonic-gate     crypto_call_req_t *))
27350Sstevel@tonic-gate {
27360Sstevel@tonic-gate 	STRUCT_DECL(crypto_encrypt, encrypt);
27370Sstevel@tonic-gate 	crypto_session_id_t session_id;
27380Sstevel@tonic-gate 	crypto_minor_t *cm;
27396424Skrishna 	crypto_session_data_t *sp = NULL;
27400Sstevel@tonic-gate 	crypto_ctx_t **ctxpp;
27410Sstevel@tonic-gate 	crypto_data_t data, encr;
27420Sstevel@tonic-gate 	size_t datalen, encrlen, need = 0;
27434632Smcpowers 	boolean_t do_inplace;
27440Sstevel@tonic-gate 	char *encrbuf;
27450Sstevel@tonic-gate 	int error = 0;
27460Sstevel@tonic-gate 	int rv;
27476424Skrishna 	boolean_t rctl_chk = B_FALSE;
27480Sstevel@tonic-gate 
27490Sstevel@tonic-gate 	STRUCT_INIT(encrypt, mode);
27500Sstevel@tonic-gate 
27510Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
27520Sstevel@tonic-gate 		cmn_err(CE_WARN, "cipher: failed holding minor");
27530Sstevel@tonic-gate 		return (ENXIO);
27540Sstevel@tonic-gate 	}
27550Sstevel@tonic-gate 
27560Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(encrypt), STRUCT_SIZE(encrypt)) != 0) {
27570Sstevel@tonic-gate 		crypto_release_minor(cm);
27580Sstevel@tonic-gate 		return (EFAULT);
27590Sstevel@tonic-gate 	}
27600Sstevel@tonic-gate 
27610Sstevel@tonic-gate 	data.cd_raw.iov_base = NULL;
27620Sstevel@tonic-gate 	encr.cd_raw.iov_base = NULL;
27630Sstevel@tonic-gate 
27640Sstevel@tonic-gate 	datalen = STRUCT_FGET(encrypt, ce_datalen);
27650Sstevel@tonic-gate 	encrlen = STRUCT_FGET(encrypt, ce_encrlen);
27660Sstevel@tonic-gate 
27670Sstevel@tonic-gate 	/*
27680Sstevel@tonic-gate 	 * Don't allocate output buffer unless both buffer pointer and
27690Sstevel@tonic-gate 	 * buffer length are not NULL or 0 (length).
27700Sstevel@tonic-gate 	 */
27710Sstevel@tonic-gate 	encrbuf = STRUCT_FGETP(encrypt, ce_encrbuf);
27720Sstevel@tonic-gate 	if (encrbuf == NULL || encrlen == 0) {
27730Sstevel@tonic-gate 		encrlen = 0;
27740Sstevel@tonic-gate 	}
27750Sstevel@tonic-gate 
27760Sstevel@tonic-gate 	if (datalen > crypto_max_buffer_len ||
27770Sstevel@tonic-gate 	    encrlen > crypto_max_buffer_len) {
27780Sstevel@tonic-gate 		cmn_err(CE_NOTE, "cipher: buffer greater than %ld bytes, "
27790Sstevel@tonic-gate 		    "pid = %d", crypto_max_buffer_len, curproc->p_pid);
27800Sstevel@tonic-gate 		rv = CRYPTO_ARGUMENTS_BAD;
27810Sstevel@tonic-gate 		goto release_minor;
27820Sstevel@tonic-gate 	}
27830Sstevel@tonic-gate 
27846424Skrishna 	session_id = STRUCT_FGET(encrypt, ce_session);
27856424Skrishna 
27866424Skrishna 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv))  {
27876424Skrishna 		goto release_minor;
27886424Skrishna 	}
27896867Skrishna 
27906867Skrishna 	do_inplace = (STRUCT_FGET(encrypt, ce_flags) &
27916867Skrishna 	    CRYPTO_INPLACE_OPERATION) != 0;
27926867Skrishna 	need = do_inplace ? datalen : datalen + encrlen;
27936867Skrishna 
27946424Skrishna 	if ((rv = CRYPTO_BUFFER_CHECK(sp, need, rctl_chk)) !=
27956424Skrishna 	    CRYPTO_SUCCESS) {
27960Sstevel@tonic-gate 		need = 0;
27970Sstevel@tonic-gate 		goto release_minor;
27980Sstevel@tonic-gate 	}
27990Sstevel@tonic-gate 
28000Sstevel@tonic-gate 	INIT_RAW_CRYPTO_DATA(data, datalen);
28010Sstevel@tonic-gate 	data.cd_miscdata = NULL;
28020Sstevel@tonic-gate 
28030Sstevel@tonic-gate 	if (datalen != 0 && copyin(STRUCT_FGETP(encrypt, ce_databuf),
28040Sstevel@tonic-gate 	    data.cd_raw.iov_base, datalen) != 0) {
28050Sstevel@tonic-gate 		error = EFAULT;
28060Sstevel@tonic-gate 		goto release_minor;
28070Sstevel@tonic-gate 	}
28080Sstevel@tonic-gate 
28094632Smcpowers 	if (do_inplace) {
28104632Smcpowers 		/* set out = in for in-place */
28114632Smcpowers 		encr = data;
28124632Smcpowers 	} else {
28134632Smcpowers 		INIT_RAW_CRYPTO_DATA(encr, encrlen);
28144632Smcpowers 	}
28150Sstevel@tonic-gate 
28160Sstevel@tonic-gate 	ctxpp = (single == crypto_encrypt_single) ?
28170Sstevel@tonic-gate 	    &sp->sd_encr_ctx : &sp->sd_decr_ctx;
28180Sstevel@tonic-gate 
28194632Smcpowers 	if (do_inplace)
282011030Sopensolaris@drydog.com 		/* specify in-place buffers with output = NULL */
28214632Smcpowers 		rv = (single)(*ctxpp, &encr, NULL, NULL);
28224632Smcpowers 	else
28234632Smcpowers 		rv = (single)(*ctxpp, &data, &encr, NULL);
282411030Sopensolaris@drydog.com 
28250Sstevel@tonic-gate 	if (KCF_CONTEXT_DONE(rv))
28260Sstevel@tonic-gate 		*ctxpp = NULL;
28270Sstevel@tonic-gate 
28280Sstevel@tonic-gate 	if (rv == CRYPTO_SUCCESS) {
28290Sstevel@tonic-gate 		ASSERT(encr.cd_length <= encrlen);
28300Sstevel@tonic-gate 		if (encr.cd_length != 0 && copyout(encr.cd_raw.iov_base,
28310Sstevel@tonic-gate 		    encrbuf, encr.cd_length) != 0) {
28320Sstevel@tonic-gate 			error = EFAULT;
28330Sstevel@tonic-gate 			goto release_minor;
28340Sstevel@tonic-gate 		}
28350Sstevel@tonic-gate 		STRUCT_FSET(encrypt, ce_encrlen, encr.cd_length);
28360Sstevel@tonic-gate 	}
28370Sstevel@tonic-gate 
28380Sstevel@tonic-gate 	if (rv == CRYPTO_BUFFER_TOO_SMALL) {
28390Sstevel@tonic-gate 		/*
28400Sstevel@tonic-gate 		 * The providers return CRYPTO_BUFFER_TOO_SMALL even for case 1
28410Sstevel@tonic-gate 		 * of section 11.2 of the pkcs11 spec. We catch it here and
28420Sstevel@tonic-gate 		 * provide the correct pkcs11 return value.
28430Sstevel@tonic-gate 		 */
28440Sstevel@tonic-gate 		if (STRUCT_FGETP(encrypt, ce_encrbuf) == NULL)
28450Sstevel@tonic-gate 			rv = CRYPTO_SUCCESS;
28460Sstevel@tonic-gate 		STRUCT_FSET(encrypt, ce_encrlen, encr.cd_length);
28470Sstevel@tonic-gate 	}
28480Sstevel@tonic-gate 
28490Sstevel@tonic-gate release_minor:
28506424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk);
28516424Skrishna 	CRYPTO_SESSION_RELE(sp);
28520Sstevel@tonic-gate 	crypto_release_minor(cm);
28530Sstevel@tonic-gate 
28540Sstevel@tonic-gate 	if (data.cd_raw.iov_base != NULL)
28550Sstevel@tonic-gate 		kmem_free(data.cd_raw.iov_base, datalen);
28560Sstevel@tonic-gate 
28574632Smcpowers 	if (!do_inplace && encr.cd_raw.iov_base != NULL)
28580Sstevel@tonic-gate 		kmem_free(encr.cd_raw.iov_base, encrlen);
28590Sstevel@tonic-gate 
28600Sstevel@tonic-gate 	if (error != 0)
28610Sstevel@tonic-gate 		return (error);
28620Sstevel@tonic-gate 
28630Sstevel@tonic-gate 	STRUCT_FSET(encrypt, ce_return_value, rv);
28640Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(encrypt), arg, STRUCT_SIZE(encrypt)) != 0) {
28650Sstevel@tonic-gate 		return (EFAULT);
28660Sstevel@tonic-gate 	}
28670Sstevel@tonic-gate 	return (0);
28680Sstevel@tonic-gate }
28690Sstevel@tonic-gate 
28700Sstevel@tonic-gate /* ARGSUSED */
28710Sstevel@tonic-gate static int
28720Sstevel@tonic-gate encrypt_update(dev_t dev, caddr_t arg, int mode, int *rval)
28730Sstevel@tonic-gate {
28740Sstevel@tonic-gate 	return (cipher_update(dev, arg, mode, crypto_encrypt_update));
28750Sstevel@tonic-gate }
28760Sstevel@tonic-gate 
28770Sstevel@tonic-gate /* ARGSUSED */
28780Sstevel@tonic-gate static int
28790Sstevel@tonic-gate decrypt_update(dev_t dev, caddr_t arg, int mode, int *rval)
28800Sstevel@tonic-gate {
28810Sstevel@tonic-gate 	return (cipher_update(dev, arg, mode, crypto_decrypt_update));
28820Sstevel@tonic-gate }
28830Sstevel@tonic-gate 
28840Sstevel@tonic-gate /*
28850Sstevel@tonic-gate  * ASSUMPTION: crypto_encrypt_update and crypto_decrypt_update
28860Sstevel@tonic-gate  * structures are identical except for field names.
28870Sstevel@tonic-gate  */
28880Sstevel@tonic-gate static int
28890Sstevel@tonic-gate cipher_update(dev_t dev, caddr_t arg, int mode,
28900Sstevel@tonic-gate     int (*update)(crypto_context_t, crypto_data_t *, crypto_data_t *,
28910Sstevel@tonic-gate     crypto_call_req_t *))
28920Sstevel@tonic-gate {
28930Sstevel@tonic-gate 	STRUCT_DECL(crypto_encrypt_update, encrypt_update);
28940Sstevel@tonic-gate 	crypto_session_id_t session_id;
28950Sstevel@tonic-gate 	crypto_minor_t *cm;
28966424Skrishna 	crypto_session_data_t *sp = NULL;
28970Sstevel@tonic-gate 	crypto_ctx_t **ctxpp;
28980Sstevel@tonic-gate 	crypto_data_t data, encr;
28990Sstevel@tonic-gate 	size_t datalen, encrlen, need = 0;
290011030Sopensolaris@drydog.com 	boolean_t do_inplace;
29010Sstevel@tonic-gate 	char *encrbuf;
29020Sstevel@tonic-gate 	int error = 0;
29030Sstevel@tonic-gate 	int rv;
29046424Skrishna 	boolean_t rctl_chk = B_FALSE;
29050Sstevel@tonic-gate 
29060Sstevel@tonic-gate 	STRUCT_INIT(encrypt_update, mode);
29070Sstevel@tonic-gate 
29080Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
29090Sstevel@tonic-gate 		cmn_err(CE_WARN, "cipher_update: failed holding minor");
29100Sstevel@tonic-gate 		return (ENXIO);
29110Sstevel@tonic-gate 	}
29120Sstevel@tonic-gate 
29130Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(encrypt_update),
29140Sstevel@tonic-gate 	    STRUCT_SIZE(encrypt_update)) != 0) {
29150Sstevel@tonic-gate 		crypto_release_minor(cm);
29160Sstevel@tonic-gate 		return (EFAULT);
29170Sstevel@tonic-gate 	}
29180Sstevel@tonic-gate 
29190Sstevel@tonic-gate 	data.cd_raw.iov_base = NULL;
29200Sstevel@tonic-gate 	encr.cd_raw.iov_base = NULL;
29210Sstevel@tonic-gate 
29220Sstevel@tonic-gate 	datalen = STRUCT_FGET(encrypt_update, eu_datalen);
29230Sstevel@tonic-gate 	encrlen = STRUCT_FGET(encrypt_update, eu_encrlen);
29240Sstevel@tonic-gate 
29250Sstevel@tonic-gate 	/*
29260Sstevel@tonic-gate 	 * Don't allocate output buffer unless both buffer pointer and
29270Sstevel@tonic-gate 	 * buffer length are not NULL or 0 (length).
29280Sstevel@tonic-gate 	 */
29290Sstevel@tonic-gate 	encrbuf = STRUCT_FGETP(encrypt_update, eu_encrbuf);
29300Sstevel@tonic-gate 	if (encrbuf == NULL || encrlen == 0) {
29310Sstevel@tonic-gate 		encrlen = 0;
29320Sstevel@tonic-gate 	}
29330Sstevel@tonic-gate 
29340Sstevel@tonic-gate 	if (datalen > crypto_max_buffer_len ||
29350Sstevel@tonic-gate 	    encrlen > crypto_max_buffer_len) {
29360Sstevel@tonic-gate 		cmn_err(CE_NOTE, "cipher_update: buffer greater than %ld "
29370Sstevel@tonic-gate 		    "bytes, pid = %d", crypto_max_buffer_len, curproc->p_pid);
29380Sstevel@tonic-gate 		rv = CRYPTO_ARGUMENTS_BAD;
29396424Skrishna 		goto out;
29406424Skrishna 	}
29416424Skrishna 
29426424Skrishna 	session_id = STRUCT_FGET(encrypt_update, eu_session);
29436424Skrishna 
29446424Skrishna 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv))  {
29456424Skrishna 		goto out;
29460Sstevel@tonic-gate 	}
29470Sstevel@tonic-gate 
294811030Sopensolaris@drydog.com 	do_inplace = (STRUCT_FGET(encrypt_update, eu_flags) &
294911030Sopensolaris@drydog.com 	    CRYPTO_INPLACE_OPERATION) != 0;
295011030Sopensolaris@drydog.com 	need = do_inplace ? datalen : datalen + encrlen;
29516424Skrishna 
29526424Skrishna 	if ((rv = CRYPTO_BUFFER_CHECK(sp, need, rctl_chk)) !=
29536424Skrishna 	    CRYPTO_SUCCESS) {
29540Sstevel@tonic-gate 		need = 0;
29556424Skrishna 		goto out;
29560Sstevel@tonic-gate 	}
29570Sstevel@tonic-gate 
29580Sstevel@tonic-gate 	INIT_RAW_CRYPTO_DATA(data, datalen);
29590Sstevel@tonic-gate 	data.cd_miscdata = NULL;
29600Sstevel@tonic-gate 
29610Sstevel@tonic-gate 	if (datalen != 0 && copyin(STRUCT_FGETP(encrypt_update, eu_databuf),
29620Sstevel@tonic-gate 	    data.cd_raw.iov_base, datalen) != 0) {
29630Sstevel@tonic-gate 		error = EFAULT;
29646424Skrishna 		goto out;
29650Sstevel@tonic-gate 	}
29660Sstevel@tonic-gate 
296711030Sopensolaris@drydog.com 	if (do_inplace) {
296811030Sopensolaris@drydog.com 		/* specify in-place buffers with output = input */
296911030Sopensolaris@drydog.com 		encr = data;
297011030Sopensolaris@drydog.com 	} else {
297111030Sopensolaris@drydog.com 		INIT_RAW_CRYPTO_DATA(encr, encrlen);
297211030Sopensolaris@drydog.com 	}
29730Sstevel@tonic-gate 
29740Sstevel@tonic-gate 	ctxpp = (update == crypto_encrypt_update) ?
29750Sstevel@tonic-gate 	    &sp->sd_encr_ctx : &sp->sd_decr_ctx;
29760Sstevel@tonic-gate 
297711030Sopensolaris@drydog.com 	if (do_inplace)
297811030Sopensolaris@drydog.com 		/* specify in-place buffers with output = NULL */
297911030Sopensolaris@drydog.com 		rv = (update)(*ctxpp, &encr, NULL, NULL);
298011030Sopensolaris@drydog.com 	else
298111030Sopensolaris@drydog.com 		rv = (update)(*ctxpp, &data, &encr, NULL);
29820Sstevel@tonic-gate 
29830Sstevel@tonic-gate 	if (rv == CRYPTO_SUCCESS || rv == CRYPTO_BUFFER_TOO_SMALL) {
29840Sstevel@tonic-gate 		if (rv == CRYPTO_SUCCESS) {
29850Sstevel@tonic-gate 			ASSERT(encr.cd_length <= encrlen);
29860Sstevel@tonic-gate 			if (encr.cd_length != 0 && copyout(encr.cd_raw.iov_base,
29870Sstevel@tonic-gate 			    encrbuf, encr.cd_length) != 0) {
29880Sstevel@tonic-gate 				error = EFAULT;
29890Sstevel@tonic-gate 				goto out;
29900Sstevel@tonic-gate 			}
29910Sstevel@tonic-gate 		} else {
29920Sstevel@tonic-gate 			/*
29930Sstevel@tonic-gate 			 * The providers return CRYPTO_BUFFER_TOO_SMALL even
29940Sstevel@tonic-gate 			 * for case 1 of section 11.2 of the pkcs11 spec.
29950Sstevel@tonic-gate 			 * We catch it here and provide the correct pkcs11
29960Sstevel@tonic-gate 			 * return value.
29970Sstevel@tonic-gate 			 */
29980Sstevel@tonic-gate 			if (STRUCT_FGETP(encrypt_update, eu_encrbuf) == NULL)
29990Sstevel@tonic-gate 				rv = CRYPTO_SUCCESS;
30000Sstevel@tonic-gate 		}
30010Sstevel@tonic-gate 		STRUCT_FSET(encrypt_update, eu_encrlen, encr.cd_length);
30020Sstevel@tonic-gate 	} else {
30030Sstevel@tonic-gate 		CRYPTO_CANCEL_CTX(ctxpp);
30040Sstevel@tonic-gate 	}
30050Sstevel@tonic-gate out:
30066424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk);
30070Sstevel@tonic-gate 	CRYPTO_SESSION_RELE(sp);
30080Sstevel@tonic-gate 	crypto_release_minor(cm);
30090Sstevel@tonic-gate 
30100Sstevel@tonic-gate 	if (data.cd_raw.iov_base != NULL)
30110Sstevel@tonic-gate 		kmem_free(data.cd_raw.iov_base, datalen);
30120Sstevel@tonic-gate 
301311030Sopensolaris@drydog.com 	if (!do_inplace && (encr.cd_raw.iov_base != NULL))
30140Sstevel@tonic-gate 		kmem_free(encr.cd_raw.iov_base, encrlen);
30150Sstevel@tonic-gate 
30160Sstevel@tonic-gate 	if (error != 0)
30170Sstevel@tonic-gate 		return (error);
30180Sstevel@tonic-gate 
30190Sstevel@tonic-gate 	STRUCT_FSET(encrypt_update, eu_return_value, rv);
30200Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(encrypt_update), arg,
30210Sstevel@tonic-gate 	    STRUCT_SIZE(encrypt_update)) != 0) {
30220Sstevel@tonic-gate 		return (EFAULT);
30230Sstevel@tonic-gate 	}
30240Sstevel@tonic-gate 	return (0);
30250Sstevel@tonic-gate }
30260Sstevel@tonic-gate 
30270Sstevel@tonic-gate /* ARGSUSED */
30280Sstevel@tonic-gate static int
30290Sstevel@tonic-gate encrypt_final(dev_t dev, caddr_t arg, int mode, int *rval)
30300Sstevel@tonic-gate {
30310Sstevel@tonic-gate 	return (common_final(dev, arg, mode, crypto_encrypt_final));
30320Sstevel@tonic-gate }
30330Sstevel@tonic-gate 
30340Sstevel@tonic-gate /* ARGSUSED */
30350Sstevel@tonic-gate static int
30360Sstevel@tonic-gate decrypt_final(dev_t dev, caddr_t arg, int mode, int *rval)
30370Sstevel@tonic-gate {
30380Sstevel@tonic-gate 	return (common_final(dev, arg, mode, crypto_decrypt_final));
30390Sstevel@tonic-gate }
30400Sstevel@tonic-gate 
30410Sstevel@tonic-gate /*
30420Sstevel@tonic-gate  * ASSUMPTION: crypto_encrypt_final, crypto_decrypt_final, crypto_sign_final,
30430Sstevel@tonic-gate  * and crypto_digest_final structures are identical except for field names.
30440Sstevel@tonic-gate  */
30450Sstevel@tonic-gate static int
30460Sstevel@tonic-gate common_final(dev_t dev, caddr_t arg, int mode,
30470Sstevel@tonic-gate     int (*final)(crypto_context_t, crypto_data_t *, crypto_call_req_t *))
30480Sstevel@tonic-gate {
30490Sstevel@tonic-gate 	STRUCT_DECL(crypto_encrypt_final, encrypt_final);
30500Sstevel@tonic-gate 	crypto_session_id_t session_id;
30510Sstevel@tonic-gate 	crypto_minor_t *cm;
30526424Skrishna 	crypto_session_data_t *sp = NULL;
30530Sstevel@tonic-gate 	crypto_ctx_t **ctxpp;
30540Sstevel@tonic-gate 	crypto_data_t encr;
30550Sstevel@tonic-gate 	size_t encrlen, need = 0;
30560Sstevel@tonic-gate 	char *encrbuf;
30570Sstevel@tonic-gate 	int error = 0;
30580Sstevel@tonic-gate 	int rv;
30596424Skrishna 	boolean_t rctl_chk = B_FALSE;
30600Sstevel@tonic-gate 
30610Sstevel@tonic-gate 	STRUCT_INIT(encrypt_final, mode);
30620Sstevel@tonic-gate 
30630Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
30640Sstevel@tonic-gate 		cmn_err(CE_WARN, "common_final: failed holding minor");
30650Sstevel@tonic-gate 		return (ENXIO);
30660Sstevel@tonic-gate 	}
30670Sstevel@tonic-gate 
30680Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(encrypt_final),
30690Sstevel@tonic-gate 	    STRUCT_SIZE(encrypt_final)) != 0) {
30700Sstevel@tonic-gate 		crypto_release_minor(cm);
30710Sstevel@tonic-gate 		return (EFAULT);
30720Sstevel@tonic-gate 	}
30730Sstevel@tonic-gate 
30740Sstevel@tonic-gate 	encr.cd_format = CRYPTO_DATA_RAW;
30750Sstevel@tonic-gate 	encr.cd_raw.iov_base = NULL;
30760Sstevel@tonic-gate 
30770Sstevel@tonic-gate 	encrlen = STRUCT_FGET(encrypt_final, ef_encrlen);
30780Sstevel@tonic-gate 
30790Sstevel@tonic-gate 	/*
30800Sstevel@tonic-gate 	 * Don't allocate output buffer unless both buffer pointer and
30810Sstevel@tonic-gate 	 * buffer length are not NULL or 0 (length).
30820Sstevel@tonic-gate 	 */
30830Sstevel@tonic-gate 	encrbuf = STRUCT_FGETP(encrypt_final, ef_encrbuf);
30840Sstevel@tonic-gate 	if (encrbuf == NULL || encrlen == 0) {
30850Sstevel@tonic-gate 		encrlen = 0;
30860Sstevel@tonic-gate 	}
30870Sstevel@tonic-gate 
30880Sstevel@tonic-gate 	if (encrlen > crypto_max_buffer_len) {
30890Sstevel@tonic-gate 		cmn_err(CE_NOTE, "common_final: buffer greater than %ld "
30900Sstevel@tonic-gate 		    "bytes, pid = %d", crypto_max_buffer_len, curproc->p_pid);
30910Sstevel@tonic-gate 		rv = CRYPTO_ARGUMENTS_BAD;
30920Sstevel@tonic-gate 		goto release_minor;
30930Sstevel@tonic-gate 	}
30940Sstevel@tonic-gate 
30956424Skrishna 	session_id = STRUCT_FGET(encrypt_final, ef_session);
30966424Skrishna 
30976424Skrishna 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv)) {
30986424Skrishna 		goto release_minor;
30996424Skrishna 	}
31006424Skrishna 
31016424Skrishna 	if ((rv = CRYPTO_BUFFER_CHECK(sp, encrlen, rctl_chk)) !=
31026424Skrishna 	    CRYPTO_SUCCESS) {
31030Sstevel@tonic-gate 		goto release_minor;
31040Sstevel@tonic-gate 	}
31050Sstevel@tonic-gate 	need = encrlen;
31060Sstevel@tonic-gate 	encr.cd_raw.iov_base = kmem_alloc(encrlen, KM_SLEEP);
31070Sstevel@tonic-gate 	encr.cd_raw.iov_len = encrlen;
31080Sstevel@tonic-gate 
31090Sstevel@tonic-gate 	encr.cd_offset = 0;
31100Sstevel@tonic-gate 	encr.cd_length = encrlen;
31110Sstevel@tonic-gate 
31120Sstevel@tonic-gate 	ASSERT(final == crypto_encrypt_final ||
31130Sstevel@tonic-gate 	    final == crypto_decrypt_final || final == crypto_sign_final ||
31140Sstevel@tonic-gate 	    final == crypto_digest_final);
31150Sstevel@tonic-gate 
31160Sstevel@tonic-gate 	if (final == crypto_encrypt_final) {
31170Sstevel@tonic-gate 		ctxpp = &sp->sd_encr_ctx;
31180Sstevel@tonic-gate 	} else if (final == crypto_decrypt_final) {
31190Sstevel@tonic-gate 		ctxpp = &sp->sd_decr_ctx;
31200Sstevel@tonic-gate 	} else if (final == crypto_sign_final) {
31210Sstevel@tonic-gate 		ctxpp = &sp->sd_sign_ctx;
31220Sstevel@tonic-gate 	} else {
31230Sstevel@tonic-gate 		ctxpp = &sp->sd_digest_ctx;
31240Sstevel@tonic-gate 	}
31250Sstevel@tonic-gate 
31260Sstevel@tonic-gate 	rv = (final)(*ctxpp, &encr, NULL);
31270Sstevel@tonic-gate 	if (KCF_CONTEXT_DONE(rv))
31280Sstevel@tonic-gate 		*ctxpp = NULL;
31290Sstevel@tonic-gate 
31300Sstevel@tonic-gate 	if (rv == CRYPTO_SUCCESS) {
31310Sstevel@tonic-gate 		ASSERT(encr.cd_length <= encrlen);
31320Sstevel@tonic-gate 		if (encr.cd_length != 0 && copyout(encr.cd_raw.iov_base,
31330Sstevel@tonic-gate 		    encrbuf, encr.cd_length) != 0) {
31340Sstevel@tonic-gate 			error = EFAULT;
31350Sstevel@tonic-gate 			goto release_minor;
31360Sstevel@tonic-gate 		}
31370Sstevel@tonic-gate 		STRUCT_FSET(encrypt_final, ef_encrlen, encr.cd_length);
31380Sstevel@tonic-gate 	}
31390Sstevel@tonic-gate 
31400Sstevel@tonic-gate 	if (rv == CRYPTO_BUFFER_TOO_SMALL) {
31410Sstevel@tonic-gate 		/*
31420Sstevel@tonic-gate 		 * The providers return CRYPTO_BUFFER_TOO_SMALL even for case 1
31430Sstevel@tonic-gate 		 * of section 11.2 of the pkcs11 spec. We catch it here and
31440Sstevel@tonic-gate 		 * provide the correct pkcs11 return value.
31450Sstevel@tonic-gate 		 */
31460Sstevel@tonic-gate 		if (STRUCT_FGETP(encrypt_final, ef_encrbuf) == NULL)
31470Sstevel@tonic-gate 			rv = CRYPTO_SUCCESS;
31480Sstevel@tonic-gate 		STRUCT_FSET(encrypt_final, ef_encrlen, encr.cd_length);
31490Sstevel@tonic-gate 	}
31500Sstevel@tonic-gate 
31510Sstevel@tonic-gate release_minor:
31526424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk);
31536424Skrishna 	CRYPTO_SESSION_RELE(sp);
31540Sstevel@tonic-gate 	crypto_release_minor(cm);
31550Sstevel@tonic-gate 
31560Sstevel@tonic-gate 	if (encr.cd_raw.iov_base != NULL)
31570Sstevel@tonic-gate 		kmem_free(encr.cd_raw.iov_base, encrlen);
31580Sstevel@tonic-gate 
31590Sstevel@tonic-gate 	if (error != 0)
31600Sstevel@tonic-gate 		return (error);
31610Sstevel@tonic-gate 
31620Sstevel@tonic-gate 	STRUCT_FSET(encrypt_final, ef_return_value, rv);
31630Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(encrypt_final), arg,
31640Sstevel@tonic-gate 	    STRUCT_SIZE(encrypt_final)) != 0) {
31650Sstevel@tonic-gate 		return (EFAULT);
31660Sstevel@tonic-gate 	}
31670Sstevel@tonic-gate 	return (0);
31680Sstevel@tonic-gate }
31690Sstevel@tonic-gate 
31700Sstevel@tonic-gate /* ARGSUSED */
31710Sstevel@tonic-gate static int
31720Sstevel@tonic-gate digest_init(dev_t dev, caddr_t arg, int mode, int *rval)
31730Sstevel@tonic-gate {
31740Sstevel@tonic-gate 	STRUCT_DECL(crypto_digest_init, digest_init);
3175904Smcpowers 	kcf_provider_desc_t *real_provider = NULL;
31760Sstevel@tonic-gate 	crypto_session_id_t session_id;
31770Sstevel@tonic-gate 	crypto_mechanism_t mech;
31780Sstevel@tonic-gate 	crypto_minor_t *cm;
31796424Skrishna 	crypto_session_data_t *sp = NULL;
31800Sstevel@tonic-gate 	crypto_context_t cc;
31810Sstevel@tonic-gate 	size_t rctl_bytes = 0;
31826424Skrishna 	boolean_t rctl_chk = B_FALSE;
31830Sstevel@tonic-gate 	int error = 0;
31840Sstevel@tonic-gate 	int rv;
31850Sstevel@tonic-gate 
31860Sstevel@tonic-gate 	STRUCT_INIT(digest_init, mode);
31870Sstevel@tonic-gate 
31880Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
31890Sstevel@tonic-gate 		cmn_err(CE_WARN, "digest_init: failed holding minor");
31900Sstevel@tonic-gate 		return (ENXIO);
31910Sstevel@tonic-gate 	}
31920Sstevel@tonic-gate 
31930Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(digest_init),
31940Sstevel@tonic-gate 	    STRUCT_SIZE(digest_init)) != 0) {
31950Sstevel@tonic-gate 		crypto_release_minor(cm);
31960Sstevel@tonic-gate 		return (EFAULT);
31970Sstevel@tonic-gate 	}
31980Sstevel@tonic-gate 
31990Sstevel@tonic-gate 	mech.cm_param = NULL;
32000Sstevel@tonic-gate 
32010Sstevel@tonic-gate 	session_id = STRUCT_FGET(digest_init, di_session);
32020Sstevel@tonic-gate 
32030Sstevel@tonic-gate 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv))  {
32046424Skrishna 		goto out;
32056424Skrishna 	}
32066424Skrishna 
32076424Skrishna 	if (!copyin_mech(mode, sp, STRUCT_FADDR(digest_init, di_mech), &mech,
32086424Skrishna 	    &rctl_bytes, &rctl_chk, &rv, &error)) {
32090Sstevel@tonic-gate 		goto out;
32100Sstevel@tonic-gate 	}
32110Sstevel@tonic-gate 
321210444SVladimir.Kotal@Sun.COM 	if ((rv = kcf_get_hardware_provider(mech.cm_type, NULL,
321310444SVladimir.Kotal@Sun.COM 	    CRYPTO_MECH_INVALID, NULL, CHECK_RESTRICT_FALSE, sp->sd_provider,
321410444SVladimir.Kotal@Sun.COM 	    &real_provider, CRYPTO_FG_DIGEST)) != CRYPTO_SUCCESS) {
32150Sstevel@tonic-gate 		goto out;
32160Sstevel@tonic-gate 	}
32170Sstevel@tonic-gate 
32180Sstevel@tonic-gate 	rv = crypto_digest_init_prov(real_provider,
32190Sstevel@tonic-gate 	    sp->sd_provider_session->ps_session, &mech, &cc, NULL);
32200Sstevel@tonic-gate 
32210Sstevel@tonic-gate 	/*
32220Sstevel@tonic-gate 	 * Check if a context already exists. If so, it means it is being
32230Sstevel@tonic-gate 	 * abandoned. So, cancel it to avoid leaking it.
32240Sstevel@tonic-gate 	 */
32250Sstevel@tonic-gate 	if (sp->sd_digest_ctx != NULL)
32260Sstevel@tonic-gate 		CRYPTO_CANCEL_CTX(&sp->sd_digest_ctx);
32270Sstevel@tonic-gate 	sp->sd_digest_ctx = (rv == CRYPTO_SUCCESS) ? cc : NULL;
32280Sstevel@tonic-gate out:
32296424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, rctl_bytes, rctl_chk);
32300Sstevel@tonic-gate 	CRYPTO_SESSION_RELE(sp);
32310Sstevel@tonic-gate 	crypto_release_minor(cm);
32320Sstevel@tonic-gate 
3233904Smcpowers 	if (real_provider != NULL)
3234904Smcpowers 		KCF_PROV_REFRELE(real_provider);
3235904Smcpowers 
32360Sstevel@tonic-gate 	if (mech.cm_param != NULL)
32370Sstevel@tonic-gate 		kmem_free(mech.cm_param, mech.cm_param_len);
32380Sstevel@tonic-gate 
32390Sstevel@tonic-gate 	if (error != 0)
32400Sstevel@tonic-gate 		return (error);
32410Sstevel@tonic-gate 
32420Sstevel@tonic-gate 	STRUCT_FSET(digest_init, di_return_value, rv);
32430Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(digest_init), arg,
32440Sstevel@tonic-gate 	    STRUCT_SIZE(digest_init)) != 0) {
32450Sstevel@tonic-gate 		return (EFAULT);
32460Sstevel@tonic-gate 	}
32470Sstevel@tonic-gate 	return (0);
32480Sstevel@tonic-gate }
32490Sstevel@tonic-gate 
32500Sstevel@tonic-gate /* ARGSUSED */
32510Sstevel@tonic-gate static int
32520Sstevel@tonic-gate digest_update(dev_t dev, caddr_t arg, int mode, int *rval)
32530Sstevel@tonic-gate {
32540Sstevel@tonic-gate 	STRUCT_DECL(crypto_digest_update, digest_update);
32550Sstevel@tonic-gate 	crypto_session_id_t session_id;
32560Sstevel@tonic-gate 	crypto_minor_t *cm;
32576424Skrishna 	crypto_session_data_t *sp = NULL;
32580Sstevel@tonic-gate 	crypto_data_t data;
32590Sstevel@tonic-gate 	size_t datalen, need = 0;
32600Sstevel@tonic-gate 	int error = 0;
32610Sstevel@tonic-gate 	int rv;
32626424Skrishna 	boolean_t rctl_chk = B_FALSE;
32630Sstevel@tonic-gate 
32640Sstevel@tonic-gate 	STRUCT_INIT(digest_update, mode);
32650Sstevel@tonic-gate 
32660Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
32670Sstevel@tonic-gate 		cmn_err(CE_WARN, "digest_update: failed holding minor");
32680Sstevel@tonic-gate 		return (ENXIO);
32690Sstevel@tonic-gate 	}
32700Sstevel@tonic-gate 
32710Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(digest_update),
32720Sstevel@tonic-gate 	    STRUCT_SIZE(digest_update)) != 0) {
32730Sstevel@tonic-gate 		crypto_release_minor(cm);
32740Sstevel@tonic-gate 		return (EFAULT);
32750Sstevel@tonic-gate 	}
32760Sstevel@tonic-gate 
32770Sstevel@tonic-gate 	data.cd_format = CRYPTO_DATA_RAW;
32780Sstevel@tonic-gate 	data.cd_raw.iov_base = NULL;
32790Sstevel@tonic-gate 
32800Sstevel@tonic-gate 	datalen = STRUCT_FGET(digest_update, du_datalen);
32810Sstevel@tonic-gate 	if (datalen > crypto_max_buffer_len) {
32820Sstevel@tonic-gate 		cmn_err(CE_NOTE, "digest_update: buffer greater than %ld "
32830Sstevel@tonic-gate 		    "bytes, pid = %d", crypto_max_buffer_len, curproc->p_pid);
32840Sstevel@tonic-gate 		rv = CRYPTO_ARGUMENTS_BAD;
32850Sstevel@tonic-gate 		goto release_minor;
32860Sstevel@tonic-gate 	}
32870Sstevel@tonic-gate 
32886424Skrishna 	session_id = STRUCT_FGET(digest_update, du_session);
32896424Skrishna 
32906424Skrishna 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv))  {
32910Sstevel@tonic-gate 		goto release_minor;
32920Sstevel@tonic-gate 	}
32936424Skrishna 
32946424Skrishna 	if ((rv = CRYPTO_BUFFER_CHECK(sp, datalen, rctl_chk)) !=
32956424Skrishna 	    CRYPTO_SUCCESS) {
32966424Skrishna 		goto release_minor;
32976424Skrishna 	}
32986424Skrishna 
32990Sstevel@tonic-gate 	need = datalen;
33000Sstevel@tonic-gate 	data.cd_raw.iov_base = kmem_alloc(datalen, KM_SLEEP);
33010Sstevel@tonic-gate 	data.cd_raw.iov_len = datalen;
33020Sstevel@tonic-gate 
33030Sstevel@tonic-gate 	if (datalen != 0 && copyin(STRUCT_FGETP(digest_update, du_databuf),
33040Sstevel@tonic-gate 	    data.cd_raw.iov_base, datalen) != 0) {
33050Sstevel@tonic-gate 		error = EFAULT;
33060Sstevel@tonic-gate 		goto release_minor;
33070Sstevel@tonic-gate 	}
33080Sstevel@tonic-gate 
33090Sstevel@tonic-gate 	data.cd_offset = 0;
33100Sstevel@tonic-gate 	data.cd_length = datalen;
33110Sstevel@tonic-gate 
33120Sstevel@tonic-gate 	rv = crypto_digest_update(sp->sd_digest_ctx, &data, NULL);
33130Sstevel@tonic-gate 	if (rv != CRYPTO_SUCCESS)
33140Sstevel@tonic-gate 		CRYPTO_CANCEL_CTX(&sp->sd_digest_ctx);
33150Sstevel@tonic-gate 
33160Sstevel@tonic-gate release_minor:
33176424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk);
33186424Skrishna 	CRYPTO_SESSION_RELE(sp);
33190Sstevel@tonic-gate 	crypto_release_minor(cm);
33200Sstevel@tonic-gate 
33210Sstevel@tonic-gate 	if (data.cd_raw.iov_base != NULL)
33220Sstevel@tonic-gate 		kmem_free(data.cd_raw.iov_base, datalen);
33230Sstevel@tonic-gate 
33240Sstevel@tonic-gate 	if (error != 0)
33250Sstevel@tonic-gate 		return (error);
33260Sstevel@tonic-gate 
33270Sstevel@tonic-gate 	STRUCT_FSET(digest_update, du_return_value, rv);
33280Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(digest_update), arg,
33290Sstevel@tonic-gate 	    STRUCT_SIZE(digest_update)) != 0) {
33300Sstevel@tonic-gate 		return (EFAULT);
33310Sstevel@tonic-gate 	}
33320Sstevel@tonic-gate 	return (0);
33330Sstevel@tonic-gate }
33340Sstevel@tonic-gate 
33350Sstevel@tonic-gate /* ARGSUSED */
33360Sstevel@tonic-gate static int
33370Sstevel@tonic-gate digest_key(dev_t dev, caddr_t arg, int mode, int *rval)
33380Sstevel@tonic-gate {
33390Sstevel@tonic-gate 	STRUCT_DECL(crypto_digest_key, digest_key);
33400Sstevel@tonic-gate 	crypto_session_id_t session_id;
33410Sstevel@tonic-gate 	crypto_key_t key;
33420Sstevel@tonic-gate 	crypto_minor_t *cm;
33436424Skrishna 	crypto_session_data_t *sp = NULL;
33440Sstevel@tonic-gate 	size_t rctl_bytes = 0;
33456424Skrishna 	boolean_t key_rctl_chk = B_FALSE;
33460Sstevel@tonic-gate 	int error = 0;
33470Sstevel@tonic-gate 	int rv;
33480Sstevel@tonic-gate 
33490Sstevel@tonic-gate 	STRUCT_INIT(digest_key, mode);
33500Sstevel@tonic-gate 
33510Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
33520Sstevel@tonic-gate 		cmn_err(CE_WARN, "digest_key: failed holding minor");
33530Sstevel@tonic-gate 		return (ENXIO);
33540Sstevel@tonic-gate 	}
33550Sstevel@tonic-gate 
33560Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(digest_key), STRUCT_SIZE(digest_key)) != 0) {
33570Sstevel@tonic-gate 		crypto_release_minor(cm);
33580Sstevel@tonic-gate 		return (EFAULT);
33590Sstevel@tonic-gate 	}
33600Sstevel@tonic-gate 
33610Sstevel@tonic-gate 	bzero(&key, sizeof (crypto_key_t));
33620Sstevel@tonic-gate 
33630Sstevel@tonic-gate 	session_id = STRUCT_FGET(digest_key, dk_session);
33640Sstevel@tonic-gate 
33650Sstevel@tonic-gate 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv))  {
33666424Skrishna 		goto out;
33676424Skrishna 	}
33686424Skrishna 
33696424Skrishna 	if (!copyin_key(mode, sp, STRUCT_FADDR(digest_key, dk_key), &key,
33706424Skrishna 	    &rctl_bytes, &key_rctl_chk, &rv, &error)) {
33710Sstevel@tonic-gate 		goto out;
33720Sstevel@tonic-gate 	}
33730Sstevel@tonic-gate 
33740Sstevel@tonic-gate 	rv = crypto_digest_key_prov(sp->sd_digest_ctx, &key, NULL);
33750Sstevel@tonic-gate 	if (rv != CRYPTO_SUCCESS)
33760Sstevel@tonic-gate 		CRYPTO_CANCEL_CTX(&sp->sd_digest_ctx);
33770Sstevel@tonic-gate out:
33786424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, rctl_bytes, key_rctl_chk);
33790Sstevel@tonic-gate 	CRYPTO_SESSION_RELE(sp);
33800Sstevel@tonic-gate 	crypto_release_minor(cm);
33810Sstevel@tonic-gate 
33820Sstevel@tonic-gate 	free_crypto_key(&key);
33830Sstevel@tonic-gate 
33840Sstevel@tonic-gate 	if (error != 0)
33850Sstevel@tonic-gate 		return (error);
33860Sstevel@tonic-gate 
33870Sstevel@tonic-gate 	STRUCT_FSET(digest_key, dk_return_value, rv);
33880Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(digest_key), arg,
33890Sstevel@tonic-gate 	    STRUCT_SIZE(digest_key)) != 0) {
33900Sstevel@tonic-gate 		return (EFAULT);
33910Sstevel@tonic-gate 	}
33920Sstevel@tonic-gate 	return (0);
33930Sstevel@tonic-gate }
33940Sstevel@tonic-gate 
33950Sstevel@tonic-gate /* ARGSUSED */
33960Sstevel@tonic-gate static int
33970Sstevel@tonic-gate digest_final(dev_t dev, caddr_t arg, int mode, int *rval)
33980Sstevel@tonic-gate {
33990Sstevel@tonic-gate 	return (common_final(dev, arg, mode, crypto_digest_final));
34000Sstevel@tonic-gate }
34010Sstevel@tonic-gate 
34020Sstevel@tonic-gate /* ARGSUSED */
34030Sstevel@tonic-gate static int
34040Sstevel@tonic-gate digest(dev_t dev, caddr_t arg, int mode, int *rval)
34050Sstevel@tonic-gate {
34060Sstevel@tonic-gate 	return (common_digest(dev, arg, mode, crypto_digest_single));
34070Sstevel@tonic-gate }
34080Sstevel@tonic-gate 
34090Sstevel@tonic-gate /*
34100Sstevel@tonic-gate  * ASSUMPTION: crypto_digest, crypto_sign, crypto_sign_recover,
34110Sstevel@tonic-gate  * and crypto_verify_recover are identical except for field names.
34120Sstevel@tonic-gate  */
34130Sstevel@tonic-gate static int
34140Sstevel@tonic-gate common_digest(dev_t dev, caddr_t arg, int mode,
34150Sstevel@tonic-gate     int (*single)(crypto_context_t, crypto_data_t *, crypto_data_t *,
34160Sstevel@tonic-gate     crypto_call_req_t *))
34170Sstevel@tonic-gate {
34180Sstevel@tonic-gate 	STRUCT_DECL(crypto_digest, crypto_digest);
34190Sstevel@tonic-gate 	crypto_session_id_t session_id;
34200Sstevel@tonic-gate 	crypto_minor_t *cm;
34216424Skrishna 	crypto_session_data_t *sp = NULL;
34220Sstevel@tonic-gate 	crypto_data_t data, digest;
34230Sstevel@tonic-gate 	crypto_ctx_t **ctxpp;
34240Sstevel@tonic-gate 	size_t datalen, digestlen, need = 0;
34250Sstevel@tonic-gate 	char *digestbuf;
34260Sstevel@tonic-gate 	int error = 0;
34270Sstevel@tonic-gate 	int rv;
34286424Skrishna 	boolean_t rctl_chk = B_FALSE;
34290Sstevel@tonic-gate 
34300Sstevel@tonic-gate 	STRUCT_INIT(crypto_digest, mode);
34310Sstevel@tonic-gate 
34320Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
34330Sstevel@tonic-gate 		cmn_err(CE_WARN, "common_digest: failed holding minor");
34340Sstevel@tonic-gate 		return (ENXIO);
34350Sstevel@tonic-gate 	}
34360Sstevel@tonic-gate 
34370Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(crypto_digest),
34380Sstevel@tonic-gate 	    STRUCT_SIZE(crypto_digest)) != 0) {
34390Sstevel@tonic-gate 		crypto_release_minor(cm);
34400Sstevel@tonic-gate 		return (EFAULT);
34410Sstevel@tonic-gate 	}
34420Sstevel@tonic-gate 
34430Sstevel@tonic-gate 	data.cd_raw.iov_base = NULL;
34440Sstevel@tonic-gate 	digest.cd_raw.iov_base = NULL;
34450Sstevel@tonic-gate 
34460Sstevel@tonic-gate 	datalen = STRUCT_FGET(crypto_digest, cd_datalen);
34470Sstevel@tonic-gate 	digestlen = STRUCT_FGET(crypto_digest, cd_digestlen);
34480Sstevel@tonic-gate 
34490Sstevel@tonic-gate 	/*
34500Sstevel@tonic-gate 	 * Don't allocate output buffer unless both buffer pointer and
34510Sstevel@tonic-gate 	 * buffer length are not NULL or 0 (length).
34520Sstevel@tonic-gate 	 */
34530Sstevel@tonic-gate 	digestbuf = STRUCT_FGETP(crypto_digest, cd_digestbuf);
34540Sstevel@tonic-gate 	if (digestbuf == NULL || digestlen == 0) {
34550Sstevel@tonic-gate 		digestlen = 0;
34560Sstevel@tonic-gate 	}
34570Sstevel@tonic-gate 
34580Sstevel@tonic-gate 	if (datalen > crypto_max_buffer_len ||
34590Sstevel@tonic-gate 	    digestlen > crypto_max_buffer_len) {
34600Sstevel@tonic-gate 		cmn_err(CE_NOTE, "common_digest: buffer greater than %ld "
34610Sstevel@tonic-gate 		    "bytes, pid = %d", crypto_max_buffer_len, curproc->p_pid);
34620Sstevel@tonic-gate 		rv = CRYPTO_ARGUMENTS_BAD;
34630Sstevel@tonic-gate 		goto release_minor;
34640Sstevel@tonic-gate 	}
34650Sstevel@tonic-gate 
34666424Skrishna 	session_id = STRUCT_FGET(crypto_digest, cd_session);
34676424Skrishna 
34686424Skrishna 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv))  {
34696424Skrishna 		goto release_minor;
34706424Skrishna 	}
34716424Skrishna 
34720Sstevel@tonic-gate 	need = datalen + digestlen;
34736424Skrishna 	if ((rv = CRYPTO_BUFFER_CHECK(sp, need, rctl_chk)) !=
34746424Skrishna 	    CRYPTO_SUCCESS) {
34750Sstevel@tonic-gate 		need = 0;
34760Sstevel@tonic-gate 		goto release_minor;
34770Sstevel@tonic-gate 	}
34780Sstevel@tonic-gate 
34790Sstevel@tonic-gate 	INIT_RAW_CRYPTO_DATA(data, datalen);
34800Sstevel@tonic-gate 
34810Sstevel@tonic-gate 	if (datalen != 0 && copyin(STRUCT_FGETP(crypto_digest, cd_databuf),
34820Sstevel@tonic-gate 	    data.cd_raw.iov_base, datalen) != 0) {
34830Sstevel@tonic-gate 		error = EFAULT;
34840Sstevel@tonic-gate 		goto release_minor;
34850Sstevel@tonic-gate 	}
34860Sstevel@tonic-gate 
34870Sstevel@tonic-gate 	INIT_RAW_CRYPTO_DATA(digest, digestlen);
34880Sstevel@tonic-gate 
34890Sstevel@tonic-gate 	ASSERT(single == crypto_digest_single ||
34900Sstevel@tonic-gate 	    single == crypto_sign_single ||
34910Sstevel@tonic-gate 	    single == crypto_verify_recover_single ||
34920Sstevel@tonic-gate 	    single == crypto_sign_recover_single);
34930Sstevel@tonic-gate 
34940Sstevel@tonic-gate 	if (single == crypto_digest_single) {
34950Sstevel@tonic-gate 		ctxpp = &sp->sd_digest_ctx;
34960Sstevel@tonic-gate 	} else if (single == crypto_sign_single) {
34970Sstevel@tonic-gate 		ctxpp = &sp->sd_sign_ctx;
34980Sstevel@tonic-gate 	} else if (single == crypto_verify_recover_single) {
34990Sstevel@tonic-gate 		ctxpp = &sp->sd_verify_recover_ctx;
35000Sstevel@tonic-gate 	} else {
35010Sstevel@tonic-gate 		ctxpp = &sp->sd_sign_recover_ctx;
35020Sstevel@tonic-gate 	}
35030Sstevel@tonic-gate 	rv = (single)(*ctxpp, &data, &digest, NULL);
35040Sstevel@tonic-gate 	if (KCF_CONTEXT_DONE(rv))
35050Sstevel@tonic-gate 		*ctxpp = NULL;
35060Sstevel@tonic-gate 
35070Sstevel@tonic-gate 	if (rv == CRYPTO_SUCCESS) {
35080Sstevel@tonic-gate 		ASSERT(digest.cd_length <= digestlen);
35090Sstevel@tonic-gate 		if (digest.cd_length != 0 && copyout(digest.cd_raw.iov_base,
35100Sstevel@tonic-gate 		    digestbuf, digest.cd_length) != 0) {
35110Sstevel@tonic-gate 			error = EFAULT;
35120Sstevel@tonic-gate 			goto release_minor;
35130Sstevel@tonic-gate 		}
35140Sstevel@tonic-gate 		STRUCT_FSET(crypto_digest, cd_digestlen, digest.cd_length);
35150Sstevel@tonic-gate 	}
35160Sstevel@tonic-gate 
35170Sstevel@tonic-gate 	if (rv == CRYPTO_BUFFER_TOO_SMALL) {
35180Sstevel@tonic-gate 		/*
35190Sstevel@tonic-gate 		 * The providers return CRYPTO_BUFFER_TOO_SMALL even for case 1
35200Sstevel@tonic-gate 		 * of section 11.2 of the pkcs11 spec. We catch it here and
35210Sstevel@tonic-gate 		 * provide the correct pkcs11 return value.
35220Sstevel@tonic-gate 		 */
35230Sstevel@tonic-gate 		if (STRUCT_FGETP(crypto_digest, cd_digestbuf) == NULL)
35240Sstevel@tonic-gate 			rv = CRYPTO_SUCCESS;
35250Sstevel@tonic-gate 		STRUCT_FSET(crypto_digest, cd_digestlen, digest.cd_length);
35260Sstevel@tonic-gate 	}
35270Sstevel@tonic-gate 
35280Sstevel@tonic-gate release_minor:
35296424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk);
35306424Skrishna 	CRYPTO_SESSION_RELE(sp);
35310Sstevel@tonic-gate 	crypto_release_minor(cm);
35320Sstevel@tonic-gate 
35330Sstevel@tonic-gate 	if (data.cd_raw.iov_base != NULL)
35340Sstevel@tonic-gate 		kmem_free(data.cd_raw.iov_base, datalen);
35350Sstevel@tonic-gate 
35360Sstevel@tonic-gate 	if (digest.cd_raw.iov_base != NULL)
35370Sstevel@tonic-gate 		kmem_free(digest.cd_raw.iov_base, digestlen);
35380Sstevel@tonic-gate 
35390Sstevel@tonic-gate 	if (error != 0)
35400Sstevel@tonic-gate 		return (error);
35410Sstevel@tonic-gate 
35420Sstevel@tonic-gate 	STRUCT_FSET(crypto_digest, cd_return_value, rv);
35430Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(crypto_digest), arg,
35440Sstevel@tonic-gate 	    STRUCT_SIZE(crypto_digest)) != 0) {
35450Sstevel@tonic-gate 		return (EFAULT);
35460Sstevel@tonic-gate 	}
35470Sstevel@tonic-gate 	return (0);
35480Sstevel@tonic-gate }
35490Sstevel@tonic-gate 
35500Sstevel@tonic-gate /*
35510Sstevel@tonic-gate  * A helper function that does what the name suggests.
35520Sstevel@tonic-gate  * Returns 0 on success and non-zero otherwise.
35530Sstevel@tonic-gate  * On failure, out_pin is set to 0.
35540Sstevel@tonic-gate  */
35550Sstevel@tonic-gate int
35560Sstevel@tonic-gate get_pin_and_session_ptr(char *in_pin, char **out_pin, size_t pin_len,
35570Sstevel@tonic-gate     crypto_minor_t *cm, crypto_session_id_t sid, crypto_session_data_t **sp,
35580Sstevel@tonic-gate     int *rv, int *error)
35590Sstevel@tonic-gate {
35600Sstevel@tonic-gate 	char *tmp_pin = NULL;
35610Sstevel@tonic-gate 	int tmp_error = 0, tmp_rv = 0;
35620Sstevel@tonic-gate 
35630Sstevel@tonic-gate 	if (pin_len > KCF_MAX_PIN_LEN) {
35640Sstevel@tonic-gate 		tmp_rv = CRYPTO_PIN_LEN_RANGE;
35650Sstevel@tonic-gate 		goto out;
35660Sstevel@tonic-gate 	}
35670Sstevel@tonic-gate 	tmp_pin = kmem_alloc(pin_len, KM_SLEEP);
35680Sstevel@tonic-gate 
35690Sstevel@tonic-gate 	if (pin_len != 0 && copyin(in_pin, tmp_pin, pin_len) != 0) {
35700Sstevel@tonic-gate 		tmp_error = EFAULT;
35710Sstevel@tonic-gate 		goto out;
35720Sstevel@tonic-gate 	}
35730Sstevel@tonic-gate 
35740Sstevel@tonic-gate 	(void) get_session_ptr(sid, cm, sp, &tmp_error, &tmp_rv);
35750Sstevel@tonic-gate out:
35760Sstevel@tonic-gate 	*out_pin = tmp_pin;
35770Sstevel@tonic-gate 	*rv = tmp_rv;
35780Sstevel@tonic-gate 	*error = tmp_error;
35790Sstevel@tonic-gate 	return (tmp_rv | tmp_error);
35800Sstevel@tonic-gate }
35810Sstevel@tonic-gate 
35820Sstevel@tonic-gate /* ARGSUSED */
35830Sstevel@tonic-gate static int
35840Sstevel@tonic-gate set_pin(dev_t dev, caddr_t arg, int mode, int *rval)
35850Sstevel@tonic-gate {
35860Sstevel@tonic-gate 	STRUCT_DECL(crypto_set_pin, set_pin);
35870Sstevel@tonic-gate 	kcf_provider_desc_t *real_provider;
35880Sstevel@tonic-gate 	kcf_req_params_t params;
35890Sstevel@tonic-gate 	crypto_minor_t *cm;
35900Sstevel@tonic-gate 	crypto_session_data_t *sp;
35910Sstevel@tonic-gate 	char *old_pin = NULL;
35920Sstevel@tonic-gate 	char *new_pin = NULL;
35930Sstevel@tonic-gate 	size_t old_pin_len;
35940Sstevel@tonic-gate 	size_t new_pin_len;
35950Sstevel@tonic-gate 	int error = 0;
35960Sstevel@tonic-gate 	int rv;
35970Sstevel@tonic-gate 
35980Sstevel@tonic-gate 	STRUCT_INIT(set_pin, mode);
35990Sstevel@tonic-gate 
36000Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
36010Sstevel@tonic-gate 		cmn_err(CE_WARN, "set_pin: failed holding minor");
36020Sstevel@tonic-gate 		return (ENXIO);
36030Sstevel@tonic-gate 	}
36040Sstevel@tonic-gate 
36050Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(set_pin),
36060Sstevel@tonic-gate 	    STRUCT_SIZE(set_pin)) != 0) {
36070Sstevel@tonic-gate 		crypto_release_minor(cm);
36080Sstevel@tonic-gate 		return (EFAULT);
36090Sstevel@tonic-gate 	}
36100Sstevel@tonic-gate 
36110Sstevel@tonic-gate 	old_pin_len = STRUCT_FGET(set_pin, sp_old_len);
36120Sstevel@tonic-gate 
36130Sstevel@tonic-gate 	if (get_pin_and_session_ptr(STRUCT_FGETP(set_pin, sp_old_pin),
36140Sstevel@tonic-gate 	    &old_pin, old_pin_len, cm, STRUCT_FGET(set_pin, sp_session),
36150Sstevel@tonic-gate 	    &sp, &rv, &error) != 0)
36160Sstevel@tonic-gate 		goto release_minor;
36170Sstevel@tonic-gate 
36180Sstevel@tonic-gate 	new_pin_len = STRUCT_FGET(set_pin, sp_new_len);
36190Sstevel@tonic-gate 	if (new_pin_len > KCF_MAX_PIN_LEN) {
36200Sstevel@tonic-gate 		rv = CRYPTO_PIN_LEN_RANGE;
36210Sstevel@tonic-gate 		goto out;
36220Sstevel@tonic-gate 	}
36230Sstevel@tonic-gate 	new_pin = kmem_alloc(new_pin_len, KM_SLEEP);
36240Sstevel@tonic-gate 
36250Sstevel@tonic-gate 	if (new_pin_len != 0 && copyin(STRUCT_FGETP(set_pin, sp_new_pin),
36260Sstevel@tonic-gate 	    new_pin, new_pin_len) != 0) {
36270Sstevel@tonic-gate 		error = EFAULT;
36280Sstevel@tonic-gate 		goto out;
36290Sstevel@tonic-gate 	}
36300Sstevel@tonic-gate 
36310Sstevel@tonic-gate 	if ((rv = kcf_get_hardware_provider_nomech(
36320Sstevel@tonic-gate 	    CRYPTO_OPS_OFFSET(provider_ops), CRYPTO_PROVIDER_OFFSET(set_pin),
3633904Smcpowers 	    CHECK_RESTRICT_FALSE, sp->sd_provider, &real_provider))
3634904Smcpowers 	    != CRYPTO_SUCCESS) {
36350Sstevel@tonic-gate 		goto out;
36360Sstevel@tonic-gate 	}
36370Sstevel@tonic-gate 
36380Sstevel@tonic-gate 	KCF_WRAP_PROVMGMT_OPS_PARAMS(&params, KCF_OP_MGMT_SETPIN,
36390Sstevel@tonic-gate 	    sp->sd_provider_session->ps_session, old_pin, old_pin_len,
36400Sstevel@tonic-gate 	    new_pin, new_pin_len, NULL, NULL, real_provider);
36410Sstevel@tonic-gate 
36420Sstevel@tonic-gate 	rv = kcf_submit_request(real_provider, NULL, NULL, &params, B_FALSE);
3643904Smcpowers 	KCF_PROV_REFRELE(real_provider);
36440Sstevel@tonic-gate 
36450Sstevel@tonic-gate out:
36460Sstevel@tonic-gate 	CRYPTO_SESSION_RELE(sp);
36470Sstevel@tonic-gate 
36480Sstevel@tonic-gate release_minor:
36490Sstevel@tonic-gate 	crypto_release_minor(cm);
36500Sstevel@tonic-gate 
36510Sstevel@tonic-gate 	if (old_pin != NULL) {
36520Sstevel@tonic-gate 		bzero(old_pin, old_pin_len);
36530Sstevel@tonic-gate 		kmem_free(old_pin, old_pin_len);
36540Sstevel@tonic-gate 	}
36550Sstevel@tonic-gate 
36560Sstevel@tonic-gate 	if (new_pin != NULL) {
36570Sstevel@tonic-gate 		bzero(new_pin, new_pin_len);
36580Sstevel@tonic-gate 		kmem_free(new_pin, new_pin_len);
36590Sstevel@tonic-gate 	}
36600Sstevel@tonic-gate 
36610Sstevel@tonic-gate 	if (error != 0)
36620Sstevel@tonic-gate 		return (error);
36630Sstevel@tonic-gate 
36640Sstevel@tonic-gate 	STRUCT_FSET(set_pin, sp_return_value, rv);
36650Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(set_pin), arg, STRUCT_SIZE(set_pin)) != 0) {
36660Sstevel@tonic-gate 		return (EFAULT);
36670Sstevel@tonic-gate 	}
36680Sstevel@tonic-gate 	return (0);
36690Sstevel@tonic-gate }
36700Sstevel@tonic-gate 
36710Sstevel@tonic-gate /* ARGSUSED */
36720Sstevel@tonic-gate static int
36730Sstevel@tonic-gate login(dev_t dev, caddr_t arg, int mode, int *rval)
36740Sstevel@tonic-gate {
36750Sstevel@tonic-gate 	STRUCT_DECL(crypto_login, login);
36760Sstevel@tonic-gate 	kcf_provider_desc_t *real_provider;
36770Sstevel@tonic-gate 	kcf_req_params_t params;
36780Sstevel@tonic-gate 	crypto_minor_t *cm;
36790Sstevel@tonic-gate 	crypto_session_data_t *sp;
36800Sstevel@tonic-gate 	size_t pin_len;
36810Sstevel@tonic-gate 	char *pin;
36820Sstevel@tonic-gate 	uint_t user_type;
36830Sstevel@tonic-gate 	int error = 0;
36840Sstevel@tonic-gate 	int rv;
36850Sstevel@tonic-gate 
36860Sstevel@tonic-gate 	STRUCT_INIT(login, mode);
36870Sstevel@tonic-gate 
36880Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
36890Sstevel@tonic-gate 		cmn_err(CE_WARN, "login: failed holding minor");
36900Sstevel@tonic-gate 		return (ENXIO);
36910Sstevel@tonic-gate 	}
36920Sstevel@tonic-gate 
36930Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(login), STRUCT_SIZE(login)) != 0) {
36940Sstevel@tonic-gate 		crypto_release_minor(cm);
36950Sstevel@tonic-gate 		return (EFAULT);
36960Sstevel@tonic-gate 	}
36970Sstevel@tonic-gate 
36980Sstevel@tonic-gate 	user_type = STRUCT_FGET(login, co_user_type);
36990Sstevel@tonic-gate 
37000Sstevel@tonic-gate 	pin_len = STRUCT_FGET(login, co_pin_len);
37010Sstevel@tonic-gate 
37020Sstevel@tonic-gate 	if (get_pin_and_session_ptr(STRUCT_FGETP(login, co_pin),
37030Sstevel@tonic-gate 	    &pin, pin_len, cm, STRUCT_FGET(login, co_session),
37040Sstevel@tonic-gate 	    &sp, &rv, &error) != 0) {
37050Sstevel@tonic-gate 		if (rv == CRYPTO_PIN_LEN_RANGE)
37060Sstevel@tonic-gate 			rv = CRYPTO_PIN_INCORRECT;
37070Sstevel@tonic-gate 		goto release_minor;
37080Sstevel@tonic-gate 	}
37090Sstevel@tonic-gate 
37100Sstevel@tonic-gate 	if ((rv = kcf_get_hardware_provider_nomech(
37110Sstevel@tonic-gate 	    CRYPTO_OPS_OFFSET(session_ops),
37120Sstevel@tonic-gate 	    CRYPTO_SESSION_OFFSET(session_login),
3713904Smcpowers 	    CHECK_RESTRICT_FALSE, sp->sd_provider, &real_provider))
3714904Smcpowers 	    != CRYPTO_SUCCESS) {
37150Sstevel@tonic-gate 		goto out;
37160Sstevel@tonic-gate 	}
37170Sstevel@tonic-gate 
37180Sstevel@tonic-gate 	KCF_WRAP_SESSION_OPS_PARAMS(&params, KCF_OP_SESSION_LOGIN, NULL,
37190Sstevel@tonic-gate 	    sp->sd_provider_session->ps_session, user_type, pin, pin_len,
37200Sstevel@tonic-gate 	    real_provider);
37210Sstevel@tonic-gate 
37220Sstevel@tonic-gate 	rv = kcf_submit_request(real_provider, NULL, NULL, &params, B_FALSE);
3723904Smcpowers 	KCF_PROV_REFRELE(real_provider);
37240Sstevel@tonic-gate 
37250Sstevel@tonic-gate out:
37260Sstevel@tonic-gate 	CRYPTO_SESSION_RELE(sp);
37270Sstevel@tonic-gate 
37280Sstevel@tonic-gate release_minor:
37290Sstevel@tonic-gate 	crypto_release_minor(cm);
37300Sstevel@tonic-gate 
37310Sstevel@tonic-gate 	if (pin != NULL) {
37320Sstevel@tonic-gate 		bzero(pin, pin_len);
37330Sstevel@tonic-gate 		kmem_free(pin, pin_len);
37340Sstevel@tonic-gate 	}
37350Sstevel@tonic-gate 
37360Sstevel@tonic-gate 	if (error != 0)
37370Sstevel@tonic-gate 		return (error);
37380Sstevel@tonic-gate 
37390Sstevel@tonic-gate 	STRUCT_FSET(login, co_return_value, rv);
37400Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(login), arg, STRUCT_SIZE(login)) != 0) {
37410Sstevel@tonic-gate 		return (EFAULT);
37420Sstevel@tonic-gate 	}
37430Sstevel@tonic-gate 	return (0);
37440Sstevel@tonic-gate }
37450Sstevel@tonic-gate 
37460Sstevel@tonic-gate /* ARGSUSED */
37470Sstevel@tonic-gate static int
37480Sstevel@tonic-gate logout(dev_t dev, caddr_t arg, int mode, int *rval)
37490Sstevel@tonic-gate {
37500Sstevel@tonic-gate 	crypto_logout_t logout;
37510Sstevel@tonic-gate 	kcf_provider_desc_t *real_provider;
37520Sstevel@tonic-gate 	kcf_req_params_t params;
37530Sstevel@tonic-gate 	crypto_minor_t *cm;
37540Sstevel@tonic-gate 	crypto_session_data_t *sp;
37550Sstevel@tonic-gate 	int error = 0;
37560Sstevel@tonic-gate 	int rv;
37570Sstevel@tonic-gate 
37580Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
37590Sstevel@tonic-gate 		cmn_err(CE_WARN, "logout: failed holding minor");
37600Sstevel@tonic-gate 		return (ENXIO);
37610Sstevel@tonic-gate 	}
37620Sstevel@tonic-gate 
37630Sstevel@tonic-gate 	if (copyin(arg, &logout, sizeof (logout)) != 0) {
37640Sstevel@tonic-gate 		crypto_release_minor(cm);
37650Sstevel@tonic-gate 		return (EFAULT);
37660Sstevel@tonic-gate 	}
37670Sstevel@tonic-gate 
37680Sstevel@tonic-gate 	if (!get_session_ptr(logout.cl_session, cm, &sp, &error, &rv))  {
37690Sstevel@tonic-gate 		goto release_minor;
37700Sstevel@tonic-gate 	}
37710Sstevel@tonic-gate 
37720Sstevel@tonic-gate 	if ((rv = kcf_get_hardware_provider_nomech(
37730Sstevel@tonic-gate 	    CRYPTO_OPS_OFFSET(session_ops),
3774904Smcpowers 	    CRYPTO_SESSION_OFFSET(session_logout), CHECK_RESTRICT_FALSE,
37750Sstevel@tonic-gate 	    sp->sd_provider, &real_provider)) != CRYPTO_SUCCESS) {
37760Sstevel@tonic-gate 		goto out;
37770Sstevel@tonic-gate 	}
37780Sstevel@tonic-gate 
37790Sstevel@tonic-gate 	KCF_WRAP_SESSION_OPS_PARAMS(&params, KCF_OP_SESSION_LOGOUT, NULL,
37800Sstevel@tonic-gate 	    sp->sd_provider_session->ps_session, 0, NULL, 0, real_provider);
37810Sstevel@tonic-gate 	rv = kcf_submit_request(real_provider, NULL, NULL, &params, B_FALSE);
3782904Smcpowers 	KCF_PROV_REFRELE(real_provider);
37830Sstevel@tonic-gate 
37840Sstevel@tonic-gate out:
37850Sstevel@tonic-gate 	CRYPTO_SESSION_RELE(sp);
37860Sstevel@tonic-gate 
37870Sstevel@tonic-gate release_minor:
37880Sstevel@tonic-gate 	crypto_release_minor(cm);
37890Sstevel@tonic-gate 
37900Sstevel@tonic-gate 	if (error != 0)
37910Sstevel@tonic-gate 		return (error);
37920Sstevel@tonic-gate 
37930Sstevel@tonic-gate 	logout.cl_return_value = rv;
37940Sstevel@tonic-gate 	if (copyout(&logout, arg, sizeof (logout)) != 0) {
37950Sstevel@tonic-gate 		return (EFAULT);
37960Sstevel@tonic-gate 	}
37970Sstevel@tonic-gate 	return (0);
37980Sstevel@tonic-gate }
37990Sstevel@tonic-gate 
38000Sstevel@tonic-gate /* ARGSUSED */
38010Sstevel@tonic-gate static int
38020Sstevel@tonic-gate sign_init(dev_t dev, caddr_t arg, int mode, int *rval)
38030Sstevel@tonic-gate {
38040Sstevel@tonic-gate 	return (sign_verify_init(dev, arg, mode, crypto_sign_init_prov));
38050Sstevel@tonic-gate }
38060Sstevel@tonic-gate 
38070Sstevel@tonic-gate /* ARGSUSED */
38080Sstevel@tonic-gate static int
38090Sstevel@tonic-gate sign_recover_init(dev_t dev, caddr_t arg, int mode, int *rval)
38100Sstevel@tonic-gate {
38110Sstevel@tonic-gate 	return (sign_verify_init(dev, arg, mode,
38120Sstevel@tonic-gate 	    crypto_sign_recover_init_prov));
38130Sstevel@tonic-gate }
38140Sstevel@tonic-gate 
38150Sstevel@tonic-gate /* ARGSUSED */
38160Sstevel@tonic-gate static int
38170Sstevel@tonic-gate verify_init(dev_t dev, caddr_t arg, int mode, int *rval)
38180Sstevel@tonic-gate {
38190Sstevel@tonic-gate 	return (sign_verify_init(dev, arg, mode, crypto_verify_init_prov));
38200Sstevel@tonic-gate }
38210Sstevel@tonic-gate 
38220Sstevel@tonic-gate /* ARGSUSED */
38230Sstevel@tonic-gate static int
38240Sstevel@tonic-gate verify_recover_init(dev_t dev, caddr_t arg, int mode, int *rval)
38250Sstevel@tonic-gate {
38260Sstevel@tonic-gate 	return (sign_verify_init(dev, arg, mode,
38270Sstevel@tonic-gate 	    crypto_verify_recover_init_prov));
38280Sstevel@tonic-gate }
38290Sstevel@tonic-gate 
38300Sstevel@tonic-gate /*
38310Sstevel@tonic-gate  * ASSUMPTION: crypto_sign_init, crypto_verify_init, crypto_sign_recover_init,
38320Sstevel@tonic-gate  * and crypto_verify_recover_init structures are identical
38330Sstevel@tonic-gate  * except for field names.
38340Sstevel@tonic-gate  */
38350Sstevel@tonic-gate static int
38360Sstevel@tonic-gate sign_verify_init(dev_t dev, caddr_t arg, int mode,
3837904Smcpowers     int (*init)(crypto_provider_t, crypto_session_id_t,
38380Sstevel@tonic-gate     crypto_mechanism_t *, crypto_key_t *, crypto_ctx_template_t,
38390Sstevel@tonic-gate     crypto_context_t *, crypto_call_req_t *))
38400Sstevel@tonic-gate {
38410Sstevel@tonic-gate 	STRUCT_DECL(crypto_sign_init, sign_init);
3842904Smcpowers 	kcf_provider_desc_t *real_provider = NULL;
38430Sstevel@tonic-gate 	crypto_session_id_t session_id;
38440Sstevel@tonic-gate 	crypto_mechanism_t mech;
38450Sstevel@tonic-gate 	crypto_key_t key;
38460Sstevel@tonic-gate 	crypto_minor_t *cm;
38476424Skrishna 	crypto_session_data_t *sp = NULL;
38480Sstevel@tonic-gate 	crypto_context_t cc;
38490Sstevel@tonic-gate 	crypto_ctx_t **ctxpp;
38500Sstevel@tonic-gate 	size_t mech_rctl_bytes = 0;
38516424Skrishna 	boolean_t mech_rctl_chk = B_FALSE;
38520Sstevel@tonic-gate 	size_t key_rctl_bytes = 0;
38536424Skrishna 	boolean_t key_rctl_chk = B_FALSE;
38540Sstevel@tonic-gate 	int error = 0;
38550Sstevel@tonic-gate 	int rv;
3856904Smcpowers 	boolean_t allocated_by_crypto_module = B_FALSE;
38571808Smcpowers 	crypto_func_group_t fg;
38580Sstevel@tonic-gate 
38590Sstevel@tonic-gate 	STRUCT_INIT(sign_init, mode);
38600Sstevel@tonic-gate 
38610Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
38620Sstevel@tonic-gate 		cmn_err(CE_WARN, "sign_verify_init: failed holding minor");
38630Sstevel@tonic-gate 		return (ENXIO);
38640Sstevel@tonic-gate 	}
38650Sstevel@tonic-gate 
38660Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(sign_init), STRUCT_SIZE(sign_init)) != 0) {
38670Sstevel@tonic-gate 		crypto_release_minor(cm);
38680Sstevel@tonic-gate 		return (EFAULT);
38690Sstevel@tonic-gate 	}
38700Sstevel@tonic-gate 
38710Sstevel@tonic-gate 	mech.cm_param = NULL;
38720Sstevel@tonic-gate 	bzero(&key, sizeof (key));
38730Sstevel@tonic-gate 
38740Sstevel@tonic-gate 	session_id = STRUCT_FGET(sign_init, si_session);
38750Sstevel@tonic-gate 
38760Sstevel@tonic-gate 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv)) {
38776424Skrishna 		goto out;
38780Sstevel@tonic-gate 	}
38790Sstevel@tonic-gate 
3880904Smcpowers 	bcopy(STRUCT_FADDR(sign_init, si_mech), &mech.cm_type,
3881904Smcpowers 	    sizeof (crypto_mech_type_t));
38820Sstevel@tonic-gate 
38830Sstevel@tonic-gate 	ASSERT(init == crypto_sign_init_prov ||
38840Sstevel@tonic-gate 	    init == crypto_verify_init_prov ||
38850Sstevel@tonic-gate 	    init == crypto_sign_recover_init_prov ||
38860Sstevel@tonic-gate 	    init == crypto_verify_recover_init_prov);
38870Sstevel@tonic-gate 
38880Sstevel@tonic-gate 	if (init == crypto_sign_init_prov) {
38891808Smcpowers 		fg =  CRYPTO_FG_SIGN;
38900Sstevel@tonic-gate 		ctxpp = &sp->sd_sign_ctx;
38910Sstevel@tonic-gate 	} else if (init == crypto_verify_init_prov) {
38921808Smcpowers 		fg =  CRYPTO_FG_VERIFY;
38930Sstevel@tonic-gate 		ctxpp = &sp->sd_verify_ctx;
38940Sstevel@tonic-gate 	} else if (init == crypto_sign_recover_init_prov) {
38951808Smcpowers 		fg =  CRYPTO_FG_SIGN_RECOVER;
38960Sstevel@tonic-gate 		ctxpp = &sp->sd_sign_recover_ctx;
38970Sstevel@tonic-gate 	} else {
38981808Smcpowers 		fg =  CRYPTO_FG_VERIFY_RECOVER;
38990Sstevel@tonic-gate 		ctxpp = &sp->sd_verify_recover_ctx;
39000Sstevel@tonic-gate 	}
39010Sstevel@tonic-gate 
390210444SVladimir.Kotal@Sun.COM 	/* We need the key length for provider selection so copy it in now. */
390310444SVladimir.Kotal@Sun.COM 	if (!copyin_key(mode, sp, STRUCT_FADDR(sign_init, si_key), &key,
390410444SVladimir.Kotal@Sun.COM 	    &key_rctl_bytes, &key_rctl_chk, &rv, &error)) {
390510444SVladimir.Kotal@Sun.COM 		goto out;
390610444SVladimir.Kotal@Sun.COM 	}
390710444SVladimir.Kotal@Sun.COM 
390810444SVladimir.Kotal@Sun.COM 	if ((rv = kcf_get_hardware_provider(mech.cm_type, &key,
390910444SVladimir.Kotal@Sun.COM 	    CRYPTO_MECH_INVALID, NULL, CHECK_RESTRICT_FALSE, sp->sd_provider,
391010444SVladimir.Kotal@Sun.COM 	    &real_provider, fg)) != CRYPTO_SUCCESS) {
39110Sstevel@tonic-gate 		goto out;
39120Sstevel@tonic-gate 	}
39130Sstevel@tonic-gate 
3914904Smcpowers 	rv = crypto_provider_copyin_mech_param(real_provider,
3915904Smcpowers 	    STRUCT_FADDR(sign_init, si_mech), &mech, mode, &error);
3916904Smcpowers 
3917904Smcpowers 	if (rv == CRYPTO_NOT_SUPPORTED) {
3918904Smcpowers 		allocated_by_crypto_module = B_TRUE;
39196424Skrishna 		if (!copyin_mech(mode, sp, STRUCT_FADDR(sign_init, si_mech),
39206424Skrishna 		    &mech, &mech_rctl_bytes, &mech_rctl_chk, &rv, &error)) {
3921904Smcpowers 			goto out;
3922904Smcpowers 		}
3923904Smcpowers 	} else {
3924904Smcpowers 		if (rv != CRYPTO_SUCCESS)
3925904Smcpowers 			goto out;
3926904Smcpowers 	}
3927904Smcpowers 
39280Sstevel@tonic-gate 	rv = (init)(real_provider, sp->sd_provider_session->ps_session,
39290Sstevel@tonic-gate 	    &mech, &key, NULL, &cc, NULL);
39300Sstevel@tonic-gate 
39310Sstevel@tonic-gate 	/*
39320Sstevel@tonic-gate 	 * Check if a context already exists. If so, it means it is being
39330Sstevel@tonic-gate 	 * abandoned. So, cancel it to avoid leaking it.
39340Sstevel@tonic-gate 	 */
39350Sstevel@tonic-gate 	if (*ctxpp != NULL)
39360Sstevel@tonic-gate 		CRYPTO_CANCEL_CTX(ctxpp);
39370Sstevel@tonic-gate 	*ctxpp = (rv == CRYPTO_SUCCESS) ? cc : NULL;
39380Sstevel@tonic-gate 
39390Sstevel@tonic-gate out:
39406424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, mech_rctl_bytes, mech_rctl_chk);
39416424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, key_rctl_bytes, key_rctl_chk);
39420Sstevel@tonic-gate 	CRYPTO_SESSION_RELE(sp);
39430Sstevel@tonic-gate 	crypto_release_minor(cm);
39440Sstevel@tonic-gate 
3945904Smcpowers 	if (real_provider != NULL) {
3946904Smcpowers 		crypto_free_mech(real_provider,
3947904Smcpowers 		    allocated_by_crypto_module, &mech);
3948904Smcpowers 		KCF_PROV_REFRELE(real_provider);
3949904Smcpowers 	}
39500Sstevel@tonic-gate 
39510Sstevel@tonic-gate 	free_crypto_key(&key);
39520Sstevel@tonic-gate 
39530Sstevel@tonic-gate 	if (error != 0)
39540Sstevel@tonic-gate 		return (error);
39550Sstevel@tonic-gate 
39560Sstevel@tonic-gate 	STRUCT_FSET(sign_init, si_return_value, rv);
39570Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(sign_init), arg, STRUCT_SIZE(sign_init)) != 0) {
39580Sstevel@tonic-gate 		return (EFAULT);
39590Sstevel@tonic-gate 	}
39600Sstevel@tonic-gate 	return (0);
39610Sstevel@tonic-gate }
39620Sstevel@tonic-gate 
39630Sstevel@tonic-gate /* ARGSUSED */
39640Sstevel@tonic-gate static int
39650Sstevel@tonic-gate sign(dev_t dev, caddr_t arg, int mode, int *rval)
39660Sstevel@tonic-gate {
39670Sstevel@tonic-gate 	return (common_digest(dev, arg, mode, crypto_sign_single));
39680Sstevel@tonic-gate }
39690Sstevel@tonic-gate 
39700Sstevel@tonic-gate /* ARGSUSED */
39710Sstevel@tonic-gate static int
39720Sstevel@tonic-gate sign_recover(dev_t dev, caddr_t arg, int mode, int *rval)
39730Sstevel@tonic-gate {
39740Sstevel@tonic-gate 	return (common_digest(dev, arg, mode, crypto_sign_recover_single));
39750Sstevel@tonic-gate }
39760Sstevel@tonic-gate 
39770Sstevel@tonic-gate /* ARGSUSED */
39780Sstevel@tonic-gate static int
39790Sstevel@tonic-gate verify(dev_t dev, caddr_t arg, int mode, int *rval)
39800Sstevel@tonic-gate {
39810Sstevel@tonic-gate 	STRUCT_DECL(crypto_verify, verify);
39820Sstevel@tonic-gate 	crypto_session_id_t session_id;
39830Sstevel@tonic-gate 	crypto_minor_t *cm;
39846424Skrishna 	crypto_session_data_t *sp = NULL;
39850Sstevel@tonic-gate 	crypto_data_t data, sign;
39860Sstevel@tonic-gate 	size_t datalen, signlen, need = 0;
39870Sstevel@tonic-gate 	int error = 0;
39880Sstevel@tonic-gate 	int rv;
39896424Skrishna 	boolean_t rctl_chk = B_FALSE;
39900Sstevel@tonic-gate 
39910Sstevel@tonic-gate 	STRUCT_INIT(verify, mode);
39920Sstevel@tonic-gate 
39930Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
39940Sstevel@tonic-gate 		cmn_err(CE_WARN, "verify: failed holding minor");
39950Sstevel@tonic-gate 		return (ENXIO);
39960Sstevel@tonic-gate 	}
39970Sstevel@tonic-gate 
39980Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(verify), STRUCT_SIZE(verify)) != 0) {
39990Sstevel@tonic-gate 		crypto_release_minor(cm);
40000Sstevel@tonic-gate 		return (EFAULT);
40010Sstevel@tonic-gate 	}
40020Sstevel@tonic-gate 
40030Sstevel@tonic-gate 	data.cd_raw.iov_base = NULL;
40040Sstevel@tonic-gate 	sign.cd_raw.iov_base = NULL;
40050Sstevel@tonic-gate 
40060Sstevel@tonic-gate 	datalen = STRUCT_FGET(verify, cv_datalen);
40070Sstevel@tonic-gate 	signlen = STRUCT_FGET(verify, cv_signlen);
40080Sstevel@tonic-gate 	if (datalen > crypto_max_buffer_len ||
40090Sstevel@tonic-gate 	    signlen > crypto_max_buffer_len) {
40100Sstevel@tonic-gate 		cmn_err(CE_NOTE, "verify: buffer greater than %ld bytes, "
40110Sstevel@tonic-gate 		"pid = %d", crypto_max_buffer_len, curproc->p_pid);
40120Sstevel@tonic-gate 		rv = CRYPTO_ARGUMENTS_BAD;
40130Sstevel@tonic-gate 		goto release_minor;
40140Sstevel@tonic-gate 	}
40150Sstevel@tonic-gate 
40166424Skrishna 	session_id = STRUCT_FGET(verify, cv_session);
40176424Skrishna 
40186424Skrishna 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv)) {
40196424Skrishna 		goto release_minor;
40206424Skrishna 	}
40216424Skrishna 
40220Sstevel@tonic-gate 	need = datalen + signlen;
40236424Skrishna 	if ((rv = CRYPTO_BUFFER_CHECK(sp, need, rctl_chk)) !=
40246424Skrishna 	    CRYPTO_SUCCESS) {
40250Sstevel@tonic-gate 		need = 0;
40260Sstevel@tonic-gate 		goto release_minor;
40270Sstevel@tonic-gate 	}
40280Sstevel@tonic-gate 
40290Sstevel@tonic-gate 	INIT_RAW_CRYPTO_DATA(data, datalen);
40300Sstevel@tonic-gate 	INIT_RAW_CRYPTO_DATA(sign, signlen);
40310Sstevel@tonic-gate 
40320Sstevel@tonic-gate 	if (datalen != 0 && copyin(STRUCT_FGETP(verify, cv_databuf),
40330Sstevel@tonic-gate 	    data.cd_raw.iov_base, datalen) != 0) {
40340Sstevel@tonic-gate 		error = EFAULT;
40350Sstevel@tonic-gate 		goto release_minor;
40360Sstevel@tonic-gate 	}
40370Sstevel@tonic-gate 
40380Sstevel@tonic-gate 	if (signlen != 0 && copyin(STRUCT_FGETP(verify, cv_signbuf),
40390Sstevel@tonic-gate 	    sign.cd_raw.iov_base, signlen) != 0) {
40400Sstevel@tonic-gate 		error = EFAULT;
40410Sstevel@tonic-gate 		goto release_minor;
40420Sstevel@tonic-gate 	}
40430Sstevel@tonic-gate 
40440Sstevel@tonic-gate 	rv = crypto_verify_single(sp->sd_verify_ctx, &data, &sign, NULL);
40450Sstevel@tonic-gate 	if (KCF_CONTEXT_DONE(rv))
40460Sstevel@tonic-gate 		sp->sd_verify_ctx = NULL;
40470Sstevel@tonic-gate 
40486424Skrishna release_minor:
40496424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk);
40500Sstevel@tonic-gate 	CRYPTO_SESSION_RELE(sp);
40510Sstevel@tonic-gate 	crypto_release_minor(cm);
40520Sstevel@tonic-gate 
40530Sstevel@tonic-gate 	if (data.cd_raw.iov_base != NULL)
40540Sstevel@tonic-gate 		kmem_free(data.cd_raw.iov_base, datalen);
40550Sstevel@tonic-gate 
40560Sstevel@tonic-gate 	if (sign.cd_raw.iov_base != NULL)
40570Sstevel@tonic-gate 		kmem_free(sign.cd_raw.iov_base, signlen);
40580Sstevel@tonic-gate 
40590Sstevel@tonic-gate 	if (error != 0)
40600Sstevel@tonic-gate 		return (error);
40610Sstevel@tonic-gate 
40620Sstevel@tonic-gate 	STRUCT_FSET(verify, cv_return_value, rv);
40630Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(verify), arg, STRUCT_SIZE(verify)) != 0) {
40640Sstevel@tonic-gate 		return (EFAULT);
40650Sstevel@tonic-gate 	}
40660Sstevel@tonic-gate 	return (0);
40670Sstevel@tonic-gate }
40680Sstevel@tonic-gate 
40690Sstevel@tonic-gate /* ARGSUSED */
40700Sstevel@tonic-gate static int
40710Sstevel@tonic-gate verify_recover(dev_t dev, caddr_t arg, int mode, int *rval)
40720Sstevel@tonic-gate {
40730Sstevel@tonic-gate 	return (common_digest(dev, arg, mode, crypto_verify_recover_single));
40740Sstevel@tonic-gate }
40750Sstevel@tonic-gate 
40760Sstevel@tonic-gate /* ARGSUSED */
40770Sstevel@tonic-gate static int
40780Sstevel@tonic-gate sign_update(dev_t dev, caddr_t arg, int mode, int *rval)
40790Sstevel@tonic-gate {
40800Sstevel@tonic-gate 	return (sign_verify_update(dev, arg, mode, crypto_sign_update));
40810Sstevel@tonic-gate }
40820Sstevel@tonic-gate 
40830Sstevel@tonic-gate /* ARGSUSED */
40840Sstevel@tonic-gate static int
40850Sstevel@tonic-gate verify_update(dev_t dev, caddr_t arg, int mode, int *rval)
40860Sstevel@tonic-gate {
40870Sstevel@tonic-gate 	return (sign_verify_update(dev, arg, mode, crypto_verify_update));
40880Sstevel@tonic-gate }
40890Sstevel@tonic-gate 
40900Sstevel@tonic-gate /*
40910Sstevel@tonic-gate  * ASSUMPTION: crypto_sign_update and crypto_verify_update structures
40920Sstevel@tonic-gate  * are identical except for field names.
40930Sstevel@tonic-gate  */
40940Sstevel@tonic-gate static int
40950Sstevel@tonic-gate sign_verify_update(dev_t dev, caddr_t arg, int mode,
40960Sstevel@tonic-gate     int (*update)(crypto_context_t, crypto_data_t *, crypto_call_req_t *))
40970Sstevel@tonic-gate {
40980Sstevel@tonic-gate 	STRUCT_DECL(crypto_sign_update, sign_update);
40990Sstevel@tonic-gate 	crypto_session_id_t session_id;
41000Sstevel@tonic-gate 	crypto_minor_t *cm;
41016424Skrishna 	crypto_session_data_t *sp = NULL;
41020Sstevel@tonic-gate 	crypto_ctx_t **ctxpp;
41030Sstevel@tonic-gate 	crypto_data_t data;
41040Sstevel@tonic-gate 	size_t datalen, need = 0;
41050Sstevel@tonic-gate 	int error = 0;
41060Sstevel@tonic-gate 	int rv;
41076424Skrishna 	boolean_t rctl_chk = B_FALSE;
41080Sstevel@tonic-gate 
41090Sstevel@tonic-gate 	STRUCT_INIT(sign_update, mode);
41100Sstevel@tonic-gate 
41110Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
41120Sstevel@tonic-gate 		cmn_err(CE_WARN, "sign_verify_update: failed holding minor");
41130Sstevel@tonic-gate 		return (ENXIO);
41140Sstevel@tonic-gate 	}
41150Sstevel@tonic-gate 
41160Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(sign_update),
41170Sstevel@tonic-gate 	    STRUCT_SIZE(sign_update)) != 0) {
41180Sstevel@tonic-gate 		crypto_release_minor(cm);
41190Sstevel@tonic-gate 		return (EFAULT);
41200Sstevel@tonic-gate 	}
41210Sstevel@tonic-gate 
41220Sstevel@tonic-gate 	data.cd_raw.iov_base = NULL;
41230Sstevel@tonic-gate 
41240Sstevel@tonic-gate 	datalen = STRUCT_FGET(sign_update, su_datalen);
41250Sstevel@tonic-gate 	if (datalen > crypto_max_buffer_len) {
41260Sstevel@tonic-gate 		cmn_err(CE_NOTE, "sign_verify_update: buffer greater than %ld "
41270Sstevel@tonic-gate 		    "bytes, pid = %d", crypto_max_buffer_len, curproc->p_pid);
41280Sstevel@tonic-gate 		rv = CRYPTO_ARGUMENTS_BAD;
41290Sstevel@tonic-gate 		goto release_minor;
41300Sstevel@tonic-gate 	}
41310Sstevel@tonic-gate 
41326424Skrishna 	session_id = STRUCT_FGET(sign_update, su_session);
41336424Skrishna 
41346424Skrishna 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv)) {
41356424Skrishna 		goto release_minor;
41366424Skrishna 	}
41376424Skrishna 
41386424Skrishna 	if ((rv = CRYPTO_BUFFER_CHECK(sp, datalen, rctl_chk)) !=
41396424Skrishna 	    CRYPTO_SUCCESS) {
41400Sstevel@tonic-gate 		goto release_minor;
41410Sstevel@tonic-gate 	}
41420Sstevel@tonic-gate 	need = datalen;
41430Sstevel@tonic-gate 
41440Sstevel@tonic-gate 	INIT_RAW_CRYPTO_DATA(data, datalen);
41450Sstevel@tonic-gate 
41460Sstevel@tonic-gate 	if (datalen != 0 && copyin(STRUCT_FGETP(sign_update, su_databuf),
41470Sstevel@tonic-gate 	    data.cd_raw.iov_base, datalen) != 0) {
41480Sstevel@tonic-gate 		error = EFAULT;
41490Sstevel@tonic-gate 		goto release_minor;
41500Sstevel@tonic-gate 	}
41510Sstevel@tonic-gate 
41520Sstevel@tonic-gate 	ctxpp = (update == crypto_sign_update) ?
41530Sstevel@tonic-gate 	    &sp->sd_sign_ctx : &sp->sd_verify_ctx;
41540Sstevel@tonic-gate 
41550Sstevel@tonic-gate 	rv = (update)(*ctxpp, &data, NULL);
41560Sstevel@tonic-gate 	if (rv != CRYPTO_SUCCESS)
41570Sstevel@tonic-gate 		CRYPTO_CANCEL_CTX(ctxpp);
41580Sstevel@tonic-gate 
41590Sstevel@tonic-gate release_minor:
41606424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk);
41616424Skrishna 	CRYPTO_SESSION_RELE(sp);
41620Sstevel@tonic-gate 	crypto_release_minor(cm);
41630Sstevel@tonic-gate 
41640Sstevel@tonic-gate 	if (data.cd_raw.iov_base != NULL)
41650Sstevel@tonic-gate 		kmem_free(data.cd_raw.iov_base, datalen);
41660Sstevel@tonic-gate 
41670Sstevel@tonic-gate 	if (error != 0)
41680Sstevel@tonic-gate 		return (error);
41690Sstevel@tonic-gate 
41700Sstevel@tonic-gate 	STRUCT_FSET(sign_update, su_return_value, rv);
41710Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(sign_update), arg,
41720Sstevel@tonic-gate 	    STRUCT_SIZE(sign_update)) != 0) {
41730Sstevel@tonic-gate 		return (EFAULT);
41740Sstevel@tonic-gate 	}
41750Sstevel@tonic-gate 	return (0);
41760Sstevel@tonic-gate }
41770Sstevel@tonic-gate 
41780Sstevel@tonic-gate /* ARGSUSED */
41790Sstevel@tonic-gate static int
41800Sstevel@tonic-gate sign_final(dev_t dev, caddr_t arg, int mode, int *rval)
41810Sstevel@tonic-gate {
41820Sstevel@tonic-gate 	return (common_final(dev, arg, mode, crypto_sign_final));
41830Sstevel@tonic-gate }
41840Sstevel@tonic-gate 
41850Sstevel@tonic-gate /*
41860Sstevel@tonic-gate  * Can't use the common final because it does a copyout of
41870Sstevel@tonic-gate  * the final part.
41880Sstevel@tonic-gate  */
41890Sstevel@tonic-gate /* ARGSUSED */
41900Sstevel@tonic-gate static int
41910Sstevel@tonic-gate verify_final(dev_t dev, caddr_t arg, int mode, int *rval)
41920Sstevel@tonic-gate {
41930Sstevel@tonic-gate 	STRUCT_DECL(crypto_verify_final, verify_final);
41940Sstevel@tonic-gate 	crypto_session_id_t session_id;
41950Sstevel@tonic-gate 	crypto_minor_t *cm;
41966424Skrishna 	crypto_session_data_t *sp = NULL;
41970Sstevel@tonic-gate 	crypto_data_t sign;
41980Sstevel@tonic-gate 	size_t signlen, need = 0;
41990Sstevel@tonic-gate 	int error = 0;
42000Sstevel@tonic-gate 	int rv;
42016424Skrishna 	boolean_t rctl_chk = B_FALSE;
42020Sstevel@tonic-gate 
42030Sstevel@tonic-gate 	STRUCT_INIT(verify_final, mode);
42040Sstevel@tonic-gate 
42050Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
42060Sstevel@tonic-gate 		cmn_err(CE_WARN, "verify_final: failed holding minor");
42070Sstevel@tonic-gate 		return (ENXIO);
42080Sstevel@tonic-gate 	}
42090Sstevel@tonic-gate 
42100Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(verify_final),
42110Sstevel@tonic-gate 	    STRUCT_SIZE(verify_final)) != 0) {
42120Sstevel@tonic-gate 		crypto_release_minor(cm);
42130Sstevel@tonic-gate 		return (EFAULT);
42140Sstevel@tonic-gate 	}
42150Sstevel@tonic-gate 
42160Sstevel@tonic-gate 	sign.cd_raw.iov_base = NULL;
42170Sstevel@tonic-gate 
42180Sstevel@tonic-gate 	signlen = STRUCT_FGET(verify_final, vf_signlen);
42190Sstevel@tonic-gate 	if (signlen > crypto_max_buffer_len) {
42200Sstevel@tonic-gate 		cmn_err(CE_NOTE, "verify_final: buffer greater than %ld "
42210Sstevel@tonic-gate 		    "bytes, pid = %d", crypto_max_buffer_len, curproc->p_pid);
42220Sstevel@tonic-gate 		rv = CRYPTO_ARGUMENTS_BAD;
42230Sstevel@tonic-gate 		goto release_minor;
42240Sstevel@tonic-gate 	}
42250Sstevel@tonic-gate 
42266424Skrishna 	session_id = STRUCT_FGET(verify_final, vf_session);
42276424Skrishna 
42286424Skrishna 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv)) {
42296424Skrishna 		goto release_minor;
42306424Skrishna 	}
42316424Skrishna 
42326424Skrishna 	if ((rv = CRYPTO_BUFFER_CHECK(sp, signlen, rctl_chk)) !=
42336424Skrishna 	    CRYPTO_SUCCESS) {
42340Sstevel@tonic-gate 		goto release_minor;
42350Sstevel@tonic-gate 	}
42360Sstevel@tonic-gate 	need = signlen;
42370Sstevel@tonic-gate 
42380Sstevel@tonic-gate 	INIT_RAW_CRYPTO_DATA(sign, signlen);
42390Sstevel@tonic-gate 
42400Sstevel@tonic-gate 	if (signlen != 0 && copyin(STRUCT_FGETP(verify_final, vf_signbuf),
42410Sstevel@tonic-gate 	    sign.cd_raw.iov_base, signlen) != 0) {
42420Sstevel@tonic-gate 		error = EFAULT;
42430Sstevel@tonic-gate 		goto release_minor;
42440Sstevel@tonic-gate 	}
42450Sstevel@tonic-gate 
42460Sstevel@tonic-gate 	rv = crypto_verify_final(sp->sd_verify_ctx, &sign, NULL);
42470Sstevel@tonic-gate 	if (KCF_CONTEXT_DONE(rv))
42480Sstevel@tonic-gate 		sp->sd_verify_ctx = NULL;
42490Sstevel@tonic-gate 
42506424Skrishna release_minor:
42516424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk);
42520Sstevel@tonic-gate 	CRYPTO_SESSION_RELE(sp);
42530Sstevel@tonic-gate 	crypto_release_minor(cm);
42540Sstevel@tonic-gate 
42550Sstevel@tonic-gate 	if (sign.cd_raw.iov_base != NULL)
42560Sstevel@tonic-gate 		kmem_free(sign.cd_raw.iov_base, signlen);
42570Sstevel@tonic-gate 
42580Sstevel@tonic-gate 	if (error != 0)
42590Sstevel@tonic-gate 		return (error);
42600Sstevel@tonic-gate 
42610Sstevel@tonic-gate 	STRUCT_FSET(verify_final, vf_return_value, rv);
42620Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(verify_final), arg,
42630Sstevel@tonic-gate 	    STRUCT_SIZE(verify_final)) != 0) {
42640Sstevel@tonic-gate 		return (EFAULT);
42650Sstevel@tonic-gate 	}
42660Sstevel@tonic-gate 	return (0);
42670Sstevel@tonic-gate }
42680Sstevel@tonic-gate 
42690Sstevel@tonic-gate /* ARGSUSED */
42700Sstevel@tonic-gate static int
42710Sstevel@tonic-gate seed_random(dev_t dev, caddr_t arg, int mode, int *rval)
42720Sstevel@tonic-gate {
42730Sstevel@tonic-gate 	STRUCT_DECL(crypto_seed_random, seed_random);
4274904Smcpowers 	kcf_provider_desc_t *real_provider = NULL;
42750Sstevel@tonic-gate 	kcf_req_params_t params;
42760Sstevel@tonic-gate 	crypto_session_id_t session_id;
42770Sstevel@tonic-gate 	crypto_minor_t *cm;
42786424Skrishna 	crypto_session_data_t *sp = NULL;
42790Sstevel@tonic-gate 	uchar_t *seed_buffer = NULL;
42800Sstevel@tonic-gate 	size_t seed_len;
42810Sstevel@tonic-gate 	size_t need = 0;
42820Sstevel@tonic-gate 	int error = 0;
42830Sstevel@tonic-gate 	int rv;
42846424Skrishna 	boolean_t rctl_chk = B_FALSE;
42850Sstevel@tonic-gate 
42860Sstevel@tonic-gate 	STRUCT_INIT(seed_random, mode);
42870Sstevel@tonic-gate 
42880Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
42890Sstevel@tonic-gate 		cmn_err(CE_WARN, "seed_random: failed holding minor");
42900Sstevel@tonic-gate 		return (ENXIO);
42910Sstevel@tonic-gate 	}
42920Sstevel@tonic-gate 
42930Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(seed_random),
42940Sstevel@tonic-gate 	    STRUCT_SIZE(seed_random)) != 0) {
42950Sstevel@tonic-gate 		crypto_release_minor(cm);
42960Sstevel@tonic-gate 		return (EFAULT);
42970Sstevel@tonic-gate 	}
42980Sstevel@tonic-gate 
42990Sstevel@tonic-gate 	seed_len = STRUCT_FGET(seed_random, sr_seedlen);
43000Sstevel@tonic-gate 	if (seed_len > crypto_max_buffer_len) {
43010Sstevel@tonic-gate 		cmn_err(CE_NOTE, "seed_random: buffer greater than %ld "
43020Sstevel@tonic-gate 		    "bytes, pid = %d", crypto_max_buffer_len, curproc->p_pid);
43030Sstevel@tonic-gate 		rv = CRYPTO_ARGUMENTS_BAD;
43040Sstevel@tonic-gate 		goto release_minor;
43050Sstevel@tonic-gate 	}
43060Sstevel@tonic-gate 
43076424Skrishna 	session_id = STRUCT_FGET(seed_random, sr_session);
43086424Skrishna 
43096424Skrishna 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv)) {
43106424Skrishna 		goto release_minor;
43116424Skrishna 	}
43126424Skrishna 
43136424Skrishna 	if ((rv = CRYPTO_BUFFER_CHECK(sp, seed_len, rctl_chk)) !=
43146424Skrishna 	    CRYPTO_SUCCESS) {
43150Sstevel@tonic-gate 		goto release_minor;
43160Sstevel@tonic-gate 	}
43170Sstevel@tonic-gate 	need = seed_len;
43180Sstevel@tonic-gate 	seed_buffer = kmem_alloc(seed_len, KM_SLEEP);
43190Sstevel@tonic-gate 
43200Sstevel@tonic-gate 	if (seed_len != 0 && copyin(STRUCT_FGETP(seed_random, sr_seedbuf),
43210Sstevel@tonic-gate 	    seed_buffer, seed_len) != 0) {
43220Sstevel@tonic-gate 		error = EFAULT;
43230Sstevel@tonic-gate 		goto release_minor;
43240Sstevel@tonic-gate 	}
43250Sstevel@tonic-gate 
43261808Smcpowers 	if ((rv = kcf_get_hardware_provider_nomech(
4327904Smcpowers 	    CRYPTO_OPS_OFFSET(random_ops), CRYPTO_RANDOM_OFFSET(seed_random),
4328904Smcpowers 	    CHECK_RESTRICT_FALSE, sp->sd_provider, &real_provider))
4329904Smcpowers 	    != CRYPTO_SUCCESS) {
43306424Skrishna 		goto release_minor;
43310Sstevel@tonic-gate 	}
43320Sstevel@tonic-gate 
43330Sstevel@tonic-gate 	KCF_WRAP_RANDOM_OPS_PARAMS(&params, KCF_OP_RANDOM_SEED,
43341920Smcpowers 	    sp->sd_provider_session->ps_session, seed_buffer, seed_len, 0,
43351920Smcpowers 	    CRYPTO_SEED_NOW);
43360Sstevel@tonic-gate 
43370Sstevel@tonic-gate 	rv = kcf_submit_request(real_provider, NULL, NULL, &params, B_FALSE);
43380Sstevel@tonic-gate 
43396424Skrishna release_minor:
43406424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk);
43410Sstevel@tonic-gate 	CRYPTO_SESSION_RELE(sp);
43420Sstevel@tonic-gate 	crypto_release_minor(cm);
43430Sstevel@tonic-gate 
4344904Smcpowers 	if (real_provider != NULL)
4345904Smcpowers 		KCF_PROV_REFRELE(real_provider);
4346904Smcpowers 
43470Sstevel@tonic-gate 	if (seed_buffer != NULL)
43480Sstevel@tonic-gate 		kmem_free(seed_buffer, seed_len);
43490Sstevel@tonic-gate 
43500Sstevel@tonic-gate 	if (error != 0)
43510Sstevel@tonic-gate 		return (error);
43520Sstevel@tonic-gate 
43530Sstevel@tonic-gate 	STRUCT_FSET(seed_random, sr_return_value, rv);
43540Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(seed_random), arg,
43550Sstevel@tonic-gate 	    STRUCT_SIZE(seed_random)) != 0) {
43560Sstevel@tonic-gate 		return (EFAULT);
43570Sstevel@tonic-gate 	}
43580Sstevel@tonic-gate 	return (0);
43590Sstevel@tonic-gate }
43600Sstevel@tonic-gate 
43610Sstevel@tonic-gate /* ARGSUSED */
43620Sstevel@tonic-gate static int
43630Sstevel@tonic-gate generate_random(dev_t dev, caddr_t arg, int mode, int *rval)
43640Sstevel@tonic-gate {
43650Sstevel@tonic-gate 	STRUCT_DECL(crypto_generate_random, generate_random);
4366904Smcpowers 	kcf_provider_desc_t *real_provider = NULL;
43670Sstevel@tonic-gate 	kcf_req_params_t params;
43680Sstevel@tonic-gate 	crypto_session_id_t session_id;
43690Sstevel@tonic-gate 	crypto_minor_t *cm;
43706424Skrishna 	crypto_session_data_t *sp = NULL;
43710Sstevel@tonic-gate 	uchar_t *buffer = NULL;
43720Sstevel@tonic-gate 	size_t len;
43730Sstevel@tonic-gate 	size_t need = 0;
43740Sstevel@tonic-gate 	int error = 0;
43750Sstevel@tonic-gate 	int rv;
43766424Skrishna 	boolean_t rctl_chk = B_FALSE;
43770Sstevel@tonic-gate 
43780Sstevel@tonic-gate 	STRUCT_INIT(generate_random, mode);
43790Sstevel@tonic-gate 
43800Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
43810Sstevel@tonic-gate 		cmn_err(CE_WARN, "generate_random: failed holding minor");
43820Sstevel@tonic-gate 		return (ENXIO);
43830Sstevel@tonic-gate 	}
43840Sstevel@tonic-gate 
43850Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(generate_random),
43860Sstevel@tonic-gate 	    STRUCT_SIZE(generate_random)) != 0) {
43870Sstevel@tonic-gate 		crypto_release_minor(cm);
43880Sstevel@tonic-gate 		return (EFAULT);
43890Sstevel@tonic-gate 	}
43900Sstevel@tonic-gate 
43910Sstevel@tonic-gate 	len = STRUCT_FGET(generate_random, gr_buflen);
43920Sstevel@tonic-gate 	if (len > crypto_max_buffer_len) {
43930Sstevel@tonic-gate 		cmn_err(CE_NOTE, "generate_random: buffer greater than %ld "
43940Sstevel@tonic-gate 		    "bytes, pid = %d", crypto_max_buffer_len, curproc->p_pid);
43950Sstevel@tonic-gate 		rv = CRYPTO_ARGUMENTS_BAD;
43960Sstevel@tonic-gate 		goto release_minor;
43970Sstevel@tonic-gate 	}
43980Sstevel@tonic-gate 
43996424Skrishna 	session_id = STRUCT_FGET(generate_random, gr_session);
44006424Skrishna 
44016424Skrishna 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv)) {
44026424Skrishna 		goto release_minor;
44036424Skrishna 	}
44046424Skrishna 
44056424Skrishna 	if ((rv = CRYPTO_BUFFER_CHECK(sp, len, rctl_chk)) !=
44066424Skrishna 	    CRYPTO_SUCCESS) {
44070Sstevel@tonic-gate 		goto release_minor;
44080Sstevel@tonic-gate 	}
44090Sstevel@tonic-gate 	need = len;
44100Sstevel@tonic-gate 	buffer = kmem_alloc(len, KM_SLEEP);
44110Sstevel@tonic-gate 
44121808Smcpowers 	if ((rv = kcf_get_hardware_provider_nomech(
44130Sstevel@tonic-gate 	    CRYPTO_OPS_OFFSET(random_ops),
4414904Smcpowers 	    CRYPTO_RANDOM_OFFSET(generate_random), CHECK_RESTRICT_FALSE,
44150Sstevel@tonic-gate 	    sp->sd_provider, &real_provider)) != CRYPTO_SUCCESS) {
44166424Skrishna 		goto release_minor;
44170Sstevel@tonic-gate 	}
44180Sstevel@tonic-gate 
44190Sstevel@tonic-gate 	KCF_WRAP_RANDOM_OPS_PARAMS(&params, KCF_OP_RANDOM_GENERATE,
44201920Smcpowers 	    sp->sd_provider_session->ps_session, buffer, len, 0, 0);
44210Sstevel@tonic-gate 
44220Sstevel@tonic-gate 	rv = kcf_submit_request(real_provider, NULL, NULL, &params, B_FALSE);
44230Sstevel@tonic-gate 
44240Sstevel@tonic-gate 	if (rv == CRYPTO_SUCCESS) {
44250Sstevel@tonic-gate 		if (len != 0 && copyout(buffer,
44260Sstevel@tonic-gate 		    STRUCT_FGETP(generate_random, gr_buf), len) != 0) {
44270Sstevel@tonic-gate 			error = EFAULT;
44280Sstevel@tonic-gate 		}
44290Sstevel@tonic-gate 	}
44300Sstevel@tonic-gate 
44310Sstevel@tonic-gate release_minor:
44326424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk);
44336424Skrishna 	CRYPTO_SESSION_RELE(sp);
44340Sstevel@tonic-gate 	crypto_release_minor(cm);
44350Sstevel@tonic-gate 
4436904Smcpowers 	if (real_provider != NULL)
4437904Smcpowers 		KCF_PROV_REFRELE(real_provider);
4438904Smcpowers 
44390Sstevel@tonic-gate 	if (buffer != NULL) {
44400Sstevel@tonic-gate 		/* random numbers are often used to create keys */
44410Sstevel@tonic-gate 		bzero(buffer, len);
44420Sstevel@tonic-gate 		kmem_free(buffer, len);
44430Sstevel@tonic-gate 	}
44440Sstevel@tonic-gate 
44450Sstevel@tonic-gate 	if (error != 0)
44460Sstevel@tonic-gate 		return (error);
44470Sstevel@tonic-gate 
44480Sstevel@tonic-gate 	STRUCT_FSET(generate_random, gr_return_value, rv);
44490Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(generate_random), arg,
44500Sstevel@tonic-gate 	    STRUCT_SIZE(generate_random)) != 0) {
44510Sstevel@tonic-gate 		return (EFAULT);
44520Sstevel@tonic-gate 	}
44530Sstevel@tonic-gate 	return (0);
44540Sstevel@tonic-gate }
44550Sstevel@tonic-gate 
44560Sstevel@tonic-gate /*
44570Sstevel@tonic-gate  * Copyout a kernel array of attributes to user space.
44580Sstevel@tonic-gate  * u_attrs is the corresponding user space array containing
44590Sstevel@tonic-gate  * user space pointers necessary for the copyout.
44600Sstevel@tonic-gate  */
44610Sstevel@tonic-gate /* ARGSUSED */
44620Sstevel@tonic-gate static int
44630Sstevel@tonic-gate copyout_attributes(int mode, caddr_t out, uint_t count,
44640Sstevel@tonic-gate     crypto_object_attribute_t *k_attrs, caddr_t u_attrs)
44650Sstevel@tonic-gate {
44660Sstevel@tonic-gate 	STRUCT_DECL(crypto_object_attribute, oa);
44670Sstevel@tonic-gate 	caddr_t p, valuep;
44680Sstevel@tonic-gate 	size_t value_len;
44690Sstevel@tonic-gate 	size_t len;
44700Sstevel@tonic-gate 	int i;
44710Sstevel@tonic-gate 	int error = 0;
44720Sstevel@tonic-gate 
44730Sstevel@tonic-gate 	if (count == 0)
44740Sstevel@tonic-gate 		return (0);
44750Sstevel@tonic-gate 
44760Sstevel@tonic-gate 	STRUCT_INIT(oa, mode);
44770Sstevel@tonic-gate 
44780Sstevel@tonic-gate 	len = count * STRUCT_SIZE(oa);
44790Sstevel@tonic-gate 
44800Sstevel@tonic-gate 	ASSERT(u_attrs != NULL);
44810Sstevel@tonic-gate 	p = u_attrs;
44820Sstevel@tonic-gate 	for (i = 0; i < count; i++) {
44830Sstevel@tonic-gate 		/* can this bcopy be eliminated? */
44840Sstevel@tonic-gate 		bcopy(p, STRUCT_BUF(oa), STRUCT_SIZE(oa));
44850Sstevel@tonic-gate 		value_len = k_attrs[i].oa_value_len;
44860Sstevel@tonic-gate 		STRUCT_FSET(oa, oa_type, k_attrs[i].oa_type);
44870Sstevel@tonic-gate 		STRUCT_FSET(oa, oa_value_len, value_len);
44880Sstevel@tonic-gate 		valuep = STRUCT_FGETP(oa, oa_value);
44890Sstevel@tonic-gate 		if (valuep != NULL && value_len != -1) {
44900Sstevel@tonic-gate 			if (copyout(k_attrs[i].oa_value,
44910Sstevel@tonic-gate 			    valuep, value_len) != 0) {
44920Sstevel@tonic-gate 				error = EFAULT;
44930Sstevel@tonic-gate 				goto out;
44940Sstevel@tonic-gate 			}
44950Sstevel@tonic-gate 		}
44960Sstevel@tonic-gate 		bcopy(STRUCT_BUF(oa), p, STRUCT_SIZE(oa));
44970Sstevel@tonic-gate 		p += STRUCT_SIZE(oa);
44980Sstevel@tonic-gate 	}
44990Sstevel@tonic-gate 	if (copyout(u_attrs, out, len)) {
45000Sstevel@tonic-gate 		error = EFAULT;
45010Sstevel@tonic-gate 	}
45020Sstevel@tonic-gate out:
45030Sstevel@tonic-gate 	return (error);
45040Sstevel@tonic-gate }
45050Sstevel@tonic-gate 
45060Sstevel@tonic-gate 
45070Sstevel@tonic-gate /* ARGSUSED */
45080Sstevel@tonic-gate static int
45090Sstevel@tonic-gate object_create(dev_t dev, caddr_t arg, int mode, int *rval)
45100Sstevel@tonic-gate {
45110Sstevel@tonic-gate 	STRUCT_DECL(crypto_object_create, object_create);
4512904Smcpowers 	kcf_provider_desc_t *real_provider = NULL;
45130Sstevel@tonic-gate 	kcf_req_params_t params;
45140Sstevel@tonic-gate 	crypto_object_attribute_t *k_attrs = NULL;
45150Sstevel@tonic-gate 	crypto_session_id_t session_id;
45160Sstevel@tonic-gate 	crypto_minor_t *cm;
45170Sstevel@tonic-gate 	crypto_session_data_t *sp = NULL;
45180Sstevel@tonic-gate 	crypto_object_id_t object_handle;
45190Sstevel@tonic-gate 	caddr_t oc_attributes;
45200Sstevel@tonic-gate 	size_t k_attrs_size;
45210Sstevel@tonic-gate 	size_t rctl_bytes = 0;
45226424Skrishna 	boolean_t rctl_chk = B_FALSE;
45230Sstevel@tonic-gate 	int error = 0;
45240Sstevel@tonic-gate 	int rv;
45250Sstevel@tonic-gate 	uint_t count;
45260Sstevel@tonic-gate 
45270Sstevel@tonic-gate 	STRUCT_INIT(object_create, mode);
45280Sstevel@tonic-gate 
45290Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
45300Sstevel@tonic-gate 		cmn_err(CE_WARN, "object_create: failed holding minor");
45310Sstevel@tonic-gate 		return (ENXIO);
45320Sstevel@tonic-gate 	}
45330Sstevel@tonic-gate 
45340Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(object_create),
45350Sstevel@tonic-gate 	    STRUCT_SIZE(object_create)) != 0) {
45360Sstevel@tonic-gate 		crypto_release_minor(cm);
45370Sstevel@tonic-gate 		return (EFAULT);
45380Sstevel@tonic-gate 	}
45390Sstevel@tonic-gate 
45400Sstevel@tonic-gate 	count = STRUCT_FGET(object_create, oc_count);
45410Sstevel@tonic-gate 	oc_attributes = STRUCT_FGETP(object_create, oc_attributes);
45420Sstevel@tonic-gate 
45430Sstevel@tonic-gate 	session_id = STRUCT_FGET(object_create, oc_session);
45440Sstevel@tonic-gate 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv)) {
45450Sstevel@tonic-gate 		goto release_minor;
45460Sstevel@tonic-gate 	}
45476424Skrishna 	if (!copyin_attributes(mode, sp, count, oc_attributes, &k_attrs,
45486424Skrishna 	    &k_attrs_size, NULL, &rv, &error, &rctl_bytes,
45496424Skrishna 	    &rctl_chk, B_TRUE)) {
45506424Skrishna 		goto release_minor;
45516424Skrishna 	}
45520Sstevel@tonic-gate 
45530Sstevel@tonic-gate 	if ((rv = kcf_get_hardware_provider_nomech(
45540Sstevel@tonic-gate 	    CRYPTO_OPS_OFFSET(object_ops),
45550Sstevel@tonic-gate 	    CRYPTO_OBJECT_OFFSET(object_create),
4556904Smcpowers 	    CHECK_RESTRICT_FALSE, sp->sd_provider, &real_provider))
4557904Smcpowers 	    != CRYPTO_SUCCESS) {
45580Sstevel@tonic-gate 		goto release_minor;
45590Sstevel@tonic-gate 	}
45600Sstevel@tonic-gate 
45610Sstevel@tonic-gate 	KCF_WRAP_OBJECT_OPS_PARAMS(&params, KCF_OP_OBJECT_CREATE,
45620Sstevel@tonic-gate 	    sp->sd_provider_session->ps_session, 0, k_attrs, count,
45630Sstevel@tonic-gate 	    &object_handle, 0, NULL, NULL, 0, NULL);
45640Sstevel@tonic-gate 
45650Sstevel@tonic-gate 	rv = kcf_submit_request(real_provider, NULL, NULL, &params, B_FALSE);
45660Sstevel@tonic-gate 
45670Sstevel@tonic-gate 	if (rv == CRYPTO_SUCCESS)
45680Sstevel@tonic-gate 		STRUCT_FSET(object_create, oc_handle, object_handle);
45690Sstevel@tonic-gate 
45700Sstevel@tonic-gate release_minor:
45716424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, rctl_bytes, rctl_chk);
45720Sstevel@tonic-gate 
45730Sstevel@tonic-gate 	if (k_attrs != NULL)
45740Sstevel@tonic-gate 		kmem_free(k_attrs, k_attrs_size);
45750Sstevel@tonic-gate 
45760Sstevel@tonic-gate 	if (error != 0)
45770Sstevel@tonic-gate 		goto out;
45780Sstevel@tonic-gate 
45790Sstevel@tonic-gate 	STRUCT_FSET(object_create, oc_return_value, rv);
45800Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(object_create), arg,
45810Sstevel@tonic-gate 	    STRUCT_SIZE(object_create)) != 0) {
45820Sstevel@tonic-gate 		if (rv == CRYPTO_SUCCESS) {
45830Sstevel@tonic-gate 			KCF_WRAP_OBJECT_OPS_PARAMS(&params,
45840Sstevel@tonic-gate 			    KCF_OP_OBJECT_DESTROY,
45850Sstevel@tonic-gate 			    sp->sd_provider_session->ps_session, object_handle,
45860Sstevel@tonic-gate 			    NULL, 0, NULL, 0, NULL, NULL, 0, NULL);
45870Sstevel@tonic-gate 
45880Sstevel@tonic-gate 			(void) kcf_submit_request(real_provider, NULL,
45890Sstevel@tonic-gate 			    NULL, &params, B_FALSE);
45900Sstevel@tonic-gate 
45910Sstevel@tonic-gate 			error = EFAULT;
45920Sstevel@tonic-gate 		}
45930Sstevel@tonic-gate 	}
45940Sstevel@tonic-gate out:
45956424Skrishna 	CRYPTO_SESSION_RELE(sp);
45960Sstevel@tonic-gate 	crypto_release_minor(cm);
4597904Smcpowers 	if (real_provider != NULL)
4598904Smcpowers 		KCF_PROV_REFRELE(real_provider);
45990Sstevel@tonic-gate 	return (error);
46000Sstevel@tonic-gate }
46010Sstevel@tonic-gate 
46020Sstevel@tonic-gate /* ARGSUSED */
46030Sstevel@tonic-gate static int
46040Sstevel@tonic-gate object_copy(dev_t dev, caddr_t arg, int mode, int *rval)
46050Sstevel@tonic-gate {
46060Sstevel@tonic-gate 	STRUCT_DECL(crypto_object_copy, object_copy);
4607904Smcpowers 	kcf_provider_desc_t *real_provider = NULL;
46080Sstevel@tonic-gate 	kcf_req_params_t params;
46090Sstevel@tonic-gate 	crypto_object_attribute_t *k_attrs = NULL;
46100Sstevel@tonic-gate 	crypto_session_id_t session_id;
46110Sstevel@tonic-gate 	crypto_minor_t *cm;
46120Sstevel@tonic-gate 	crypto_session_data_t *sp = NULL;
46130Sstevel@tonic-gate 	crypto_object_id_t handle, new_handle;
46140Sstevel@tonic-gate 	caddr_t oc_new_attributes;
46150Sstevel@tonic-gate 	size_t k_attrs_size;
46160Sstevel@tonic-gate 	size_t rctl_bytes = 0;
46176424Skrishna 	boolean_t rctl_chk = B_FALSE;
46180Sstevel@tonic-gate 	int error = 0;
46190Sstevel@tonic-gate 	int rv;
46200Sstevel@tonic-gate 	uint_t count;
46210Sstevel@tonic-gate 
46220Sstevel@tonic-gate 	STRUCT_INIT(object_copy, mode);
46230Sstevel@tonic-gate 
46240Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
46250Sstevel@tonic-gate 		cmn_err(CE_WARN, "object_copy: failed holding minor");
46260Sstevel@tonic-gate 		return (ENXIO);
46270Sstevel@tonic-gate 	}
46280Sstevel@tonic-gate 
46290Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(object_copy),
46300Sstevel@tonic-gate 	    STRUCT_SIZE(object_copy)) != 0) {
46310Sstevel@tonic-gate 		crypto_release_minor(cm);
46320Sstevel@tonic-gate 		return (EFAULT);
46330Sstevel@tonic-gate 	}
46340Sstevel@tonic-gate 
46350Sstevel@tonic-gate 	count = STRUCT_FGET(object_copy, oc_count);
46360Sstevel@tonic-gate 	oc_new_attributes = STRUCT_FGETP(object_copy, oc_new_attributes);
46370Sstevel@tonic-gate 
46380Sstevel@tonic-gate 	session_id = STRUCT_FGET(object_copy, oc_session);
46390Sstevel@tonic-gate 
46400Sstevel@tonic-gate 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv)) {
46410Sstevel@tonic-gate 		goto release_minor;
46420Sstevel@tonic-gate 	}
46436424Skrishna 	if (!copyin_attributes(mode, sp, count, oc_new_attributes, &k_attrs,
46446424Skrishna 	    &k_attrs_size, NULL, &rv, &error, &rctl_bytes,
46456424Skrishna 	    &rctl_chk, B_TRUE)) {
46466424Skrishna 		goto release_minor;
46476424Skrishna 	}
46480Sstevel@tonic-gate 
46490Sstevel@tonic-gate 	if ((rv = kcf_get_hardware_provider_nomech(
46500Sstevel@tonic-gate 	    CRYPTO_OPS_OFFSET(object_ops),
4651904Smcpowers 	    CRYPTO_OBJECT_OFFSET(object_copy), CHECK_RESTRICT_FALSE,
46520Sstevel@tonic-gate 	    sp->sd_provider, &real_provider)) != CRYPTO_SUCCESS) {
46530Sstevel@tonic-gate 		goto release_minor;
46540Sstevel@tonic-gate 	}
46550Sstevel@tonic-gate 
46560Sstevel@tonic-gate 	handle = STRUCT_FGET(object_copy, oc_handle);
46570Sstevel@tonic-gate 	KCF_WRAP_OBJECT_OPS_PARAMS(&params, KCF_OP_OBJECT_COPY,
46580Sstevel@tonic-gate 	    sp->sd_provider_session->ps_session, handle, k_attrs, count,
46590Sstevel@tonic-gate 	    &new_handle, 0, NULL, NULL, 0, NULL);
46600Sstevel@tonic-gate 
46610Sstevel@tonic-gate 	rv = kcf_submit_request(real_provider, NULL, NULL, &params, B_FALSE);
46620Sstevel@tonic-gate 
46630Sstevel@tonic-gate 	if (rv == CRYPTO_SUCCESS)
46640Sstevel@tonic-gate 		STRUCT_FSET(object_copy, oc_new_handle, new_handle);
46650Sstevel@tonic-gate 
46660Sstevel@tonic-gate release_minor:
46676424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, rctl_bytes, rctl_chk);
46680Sstevel@tonic-gate 
46690Sstevel@tonic-gate 	if (k_attrs != NULL)
46700Sstevel@tonic-gate 		kmem_free(k_attrs, k_attrs_size);
46710Sstevel@tonic-gate 
46720Sstevel@tonic-gate 	if (error != 0)
46730Sstevel@tonic-gate 		goto out;
46740Sstevel@tonic-gate 
46750Sstevel@tonic-gate 	STRUCT_FSET(object_copy, oc_return_value, rv);
46760Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(object_copy), arg,
46770Sstevel@tonic-gate 	    STRUCT_SIZE(object_copy)) != 0) {
46780Sstevel@tonic-gate 		if (rv == CRYPTO_SUCCESS) {
46790Sstevel@tonic-gate 			KCF_WRAP_OBJECT_OPS_PARAMS(&params,
46800Sstevel@tonic-gate 			    KCF_OP_OBJECT_DESTROY,
46810Sstevel@tonic-gate 			    sp->sd_provider_session->ps_session, new_handle,
46820Sstevel@tonic-gate 			    NULL, 0, NULL, 0, NULL, NULL, 0, NULL);
46830Sstevel@tonic-gate 
46840Sstevel@tonic-gate 			(void) kcf_submit_request(real_provider, NULL,
46850Sstevel@tonic-gate 			    NULL, &params, B_FALSE);
46860Sstevel@tonic-gate 
46870Sstevel@tonic-gate 			error = EFAULT;
46880Sstevel@tonic-gate 		}
46890Sstevel@tonic-gate 	}
46900Sstevel@tonic-gate out:
46916424Skrishna 	CRYPTO_SESSION_RELE(sp);
46920Sstevel@tonic-gate 	crypto_release_minor(cm);
4693904Smcpowers 	if (real_provider != NULL)
4694904Smcpowers 		KCF_PROV_REFRELE(real_provider);
46950Sstevel@tonic-gate 	return (error);
46960Sstevel@tonic-gate }
46970Sstevel@tonic-gate 
46980Sstevel@tonic-gate /* ARGSUSED */
46990Sstevel@tonic-gate static int
47000Sstevel@tonic-gate object_destroy(dev_t dev, caddr_t arg, int mode, int *rval)
47010Sstevel@tonic-gate {
47020Sstevel@tonic-gate 	STRUCT_DECL(crypto_object_destroy, object_destroy);
47030Sstevel@tonic-gate 	kcf_provider_desc_t *real_provider;
47040Sstevel@tonic-gate 	kcf_req_params_t params;
47050Sstevel@tonic-gate 	crypto_session_id_t session_id;
47060Sstevel@tonic-gate 	crypto_minor_t *cm;
47070Sstevel@tonic-gate 	crypto_session_data_t *sp;
47080Sstevel@tonic-gate 	crypto_object_id_t handle;
47090Sstevel@tonic-gate 	int error = 0;
47100Sstevel@tonic-gate 	int rv;
47110Sstevel@tonic-gate 
47120Sstevel@tonic-gate 	STRUCT_INIT(object_destroy, mode);
47130Sstevel@tonic-gate 
47140Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
47150Sstevel@tonic-gate 		cmn_err(CE_WARN, "object_destroy: failed holding minor");
47160Sstevel@tonic-gate 		return (ENXIO);
47170Sstevel@tonic-gate 	}
47180Sstevel@tonic-gate 
47190Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(object_destroy),
47200Sstevel@tonic-gate 	    STRUCT_SIZE(object_destroy)) != 0) {
47210Sstevel@tonic-gate 		crypto_release_minor(cm);
47220Sstevel@tonic-gate 		return (EFAULT);
47230Sstevel@tonic-gate 	}
47240Sstevel@tonic-gate 
47250Sstevel@tonic-gate 	session_id = STRUCT_FGET(object_destroy, od_session);
47260Sstevel@tonic-gate 
47270Sstevel@tonic-gate 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv)) {
47280Sstevel@tonic-gate 		goto release_minor;
47290Sstevel@tonic-gate 	}
47300Sstevel@tonic-gate 
47310Sstevel@tonic-gate 	if ((rv = kcf_get_hardware_provider_nomech(
47320Sstevel@tonic-gate 	    CRYPTO_OPS_OFFSET(object_ops),
4733904Smcpowers 	    CRYPTO_OBJECT_OFFSET(object_destroy), CHECK_RESTRICT_FALSE,
47340Sstevel@tonic-gate 	    sp->sd_provider, &real_provider)) != CRYPTO_SUCCESS) {
47350Sstevel@tonic-gate 		goto out;
47360Sstevel@tonic-gate 	}
47370Sstevel@tonic-gate 
47380Sstevel@tonic-gate 	handle = STRUCT_FGET(object_destroy, od_handle);
47390Sstevel@tonic-gate 	KCF_WRAP_OBJECT_OPS_PARAMS(&params, KCF_OP_OBJECT_DESTROY,
47400Sstevel@tonic-gate 	    sp->sd_provider_session->ps_session, handle, NULL, 0, NULL, 0,
47410Sstevel@tonic-gate 	    NULL, NULL, 0, NULL);
47420Sstevel@tonic-gate 
47430Sstevel@tonic-gate 	rv = kcf_submit_request(real_provider, NULL, NULL, &params, B_FALSE);
4744904Smcpowers 	KCF_PROV_REFRELE(real_provider);
47450Sstevel@tonic-gate 
47460Sstevel@tonic-gate out:
47470Sstevel@tonic-gate 	CRYPTO_SESSION_RELE(sp);
47480Sstevel@tonic-gate 
47490Sstevel@tonic-gate release_minor:
47500Sstevel@tonic-gate 	crypto_release_minor(cm);
47510Sstevel@tonic-gate 
47520Sstevel@tonic-gate 	if (error != 0)
47530Sstevel@tonic-gate 		return (error);
47540Sstevel@tonic-gate 
47550Sstevel@tonic-gate 	STRUCT_FSET(object_destroy, od_return_value, rv);
47560Sstevel@tonic-gate 
47570Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(object_destroy), arg,
47580Sstevel@tonic-gate 	    STRUCT_SIZE(object_destroy)) != 0) {
47590Sstevel@tonic-gate 		return (EFAULT);
47600Sstevel@tonic-gate 	}
47610Sstevel@tonic-gate 	return (0);
47620Sstevel@tonic-gate }
47630Sstevel@tonic-gate 
47640Sstevel@tonic-gate /* ARGSUSED */
47650Sstevel@tonic-gate static int
47660Sstevel@tonic-gate object_get_attribute_value(dev_t dev, caddr_t arg, int mode, int *rval)
47670Sstevel@tonic-gate {
47680Sstevel@tonic-gate 	STRUCT_DECL(crypto_object_get_attribute_value, get_attribute_value);
47690Sstevel@tonic-gate 	/* LINTED E_FUNC_SET_NOT_USED */
47700Sstevel@tonic-gate 	STRUCT_DECL(crypto_object_attribute, oa);
47710Sstevel@tonic-gate 	kcf_provider_desc_t *real_provider;
47720Sstevel@tonic-gate 	kcf_req_params_t params;
47730Sstevel@tonic-gate 	crypto_object_attribute_t *k_attrs = NULL;
47740Sstevel@tonic-gate 	crypto_session_id_t session_id;
47750Sstevel@tonic-gate 	crypto_minor_t *cm;
47766424Skrishna 	crypto_session_data_t *sp = NULL;
47770Sstevel@tonic-gate 	crypto_object_id_t handle;
47780Sstevel@tonic-gate 	caddr_t og_attributes;
47798043SMark.Powers@Sun.COM 	caddr_t u_attrs = NULL;
47800Sstevel@tonic-gate 	size_t k_attrs_size;
47810Sstevel@tonic-gate 	size_t rctl_bytes = 0;
47826424Skrishna 	boolean_t rctl_chk = B_FALSE;
47830Sstevel@tonic-gate 	int error = 0;
47840Sstevel@tonic-gate 	int rv;
47850Sstevel@tonic-gate 	uint_t count;
47860Sstevel@tonic-gate 
47870Sstevel@tonic-gate 	STRUCT_INIT(get_attribute_value, mode);
47880Sstevel@tonic-gate 	STRUCT_INIT(oa, mode);
47890Sstevel@tonic-gate 
47900Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
47910Sstevel@tonic-gate 		cmn_err(CE_WARN,
47920Sstevel@tonic-gate 		    "object_get_attribute_value: failed holding minor");
47930Sstevel@tonic-gate 		return (ENXIO);
47940Sstevel@tonic-gate 	}
47950Sstevel@tonic-gate 
47960Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(get_attribute_value),
47970Sstevel@tonic-gate 	    STRUCT_SIZE(get_attribute_value)) != 0) {
47980Sstevel@tonic-gate 		crypto_release_minor(cm);
47990Sstevel@tonic-gate 		return (EFAULT);
48000Sstevel@tonic-gate 	}
48010Sstevel@tonic-gate 
48020Sstevel@tonic-gate 	count = STRUCT_FGET(get_attribute_value, og_count);
48030Sstevel@tonic-gate 	og_attributes = STRUCT_FGETP(get_attribute_value, og_attributes);
48040Sstevel@tonic-gate 
48050Sstevel@tonic-gate 	session_id = STRUCT_FGET(get_attribute_value, og_session);
48060Sstevel@tonic-gate 
48070Sstevel@tonic-gate 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv)) {
48080Sstevel@tonic-gate 		goto release_minor;
48090Sstevel@tonic-gate 	}
48106424Skrishna 	if (!copyin_attributes(mode, sp, count, og_attributes, &k_attrs,
48116424Skrishna 	    &k_attrs_size, &u_attrs, &rv, &error, &rctl_bytes,
48126424Skrishna 	    &rctl_chk, B_FALSE)) {
48136424Skrishna 		goto release_minor;
48146424Skrishna 	}
48150Sstevel@tonic-gate 
48160Sstevel@tonic-gate 	if ((rv = kcf_get_hardware_provider_nomech(
48170Sstevel@tonic-gate 	    CRYPTO_OPS_OFFSET(object_ops),
48180Sstevel@tonic-gate 	    CRYPTO_OBJECT_OFFSET(object_get_attribute_value),
4819904Smcpowers 	    CHECK_RESTRICT_FALSE, sp->sd_provider, &real_provider))
4820904Smcpowers 	    != CRYPTO_SUCCESS) {
48210Sstevel@tonic-gate 		goto out;
48220Sstevel@tonic-gate 	}
48230Sstevel@tonic-gate 
48240Sstevel@tonic-gate 	handle = STRUCT_FGET(get_attribute_value, og_handle);
48250Sstevel@tonic-gate 	KCF_WRAP_OBJECT_OPS_PARAMS(&params, KCF_OP_OBJECT_GET_ATTRIBUTE_VALUE,
48260Sstevel@tonic-gate 	    sp->sd_provider_session->ps_session, handle, k_attrs, count, NULL,
48270Sstevel@tonic-gate 	    0, NULL, NULL, 0, NULL);
48280Sstevel@tonic-gate 
48290Sstevel@tonic-gate 	rv = kcf_submit_request(real_provider, NULL, NULL, &params, B_FALSE);
4830904Smcpowers 	KCF_PROV_REFRELE(real_provider);
48310Sstevel@tonic-gate 
48320Sstevel@tonic-gate out:
48330Sstevel@tonic-gate 	if (rv == CRYPTO_SUCCESS || rv == CRYPTO_ATTRIBUTE_SENSITIVE ||
48340Sstevel@tonic-gate 	    rv == CRYPTO_ATTRIBUTE_TYPE_INVALID ||
48350Sstevel@tonic-gate 	    rv == CRYPTO_BUFFER_TOO_SMALL) {
48360Sstevel@tonic-gate 		error = copyout_attributes(mode,
48370Sstevel@tonic-gate 		    STRUCT_FGETP(get_attribute_value, og_attributes),
48380Sstevel@tonic-gate 		    count, k_attrs, u_attrs);
48390Sstevel@tonic-gate 	}
48400Sstevel@tonic-gate 
48410Sstevel@tonic-gate release_minor:
48426424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, rctl_bytes, rctl_chk);
48436424Skrishna 	CRYPTO_SESSION_RELE(sp);
48440Sstevel@tonic-gate 	crypto_release_minor(cm);
48450Sstevel@tonic-gate 
48460Sstevel@tonic-gate 	if (k_attrs != NULL)
48470Sstevel@tonic-gate 		kmem_free(k_attrs, k_attrs_size);
48480Sstevel@tonic-gate 
48490Sstevel@tonic-gate 	if (u_attrs != NULL)
48500Sstevel@tonic-gate 		kmem_free(u_attrs, count * STRUCT_SIZE(oa));
48510Sstevel@tonic-gate 
48520Sstevel@tonic-gate 	if (error != 0)
48530Sstevel@tonic-gate 		return (error);
48540Sstevel@tonic-gate 
48550Sstevel@tonic-gate 	STRUCT_FSET(get_attribute_value, og_return_value, rv);
48560Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(get_attribute_value), arg,
48570Sstevel@tonic-gate 	    STRUCT_SIZE(get_attribute_value)) != 0) {
48580Sstevel@tonic-gate 		return (EFAULT);
48590Sstevel@tonic-gate 	}
48600Sstevel@tonic-gate 	return (0);
48610Sstevel@tonic-gate }
48620Sstevel@tonic-gate 
48630Sstevel@tonic-gate /* ARGSUSED */
48640Sstevel@tonic-gate static int
48650Sstevel@tonic-gate object_get_size(dev_t dev, caddr_t arg, int mode, int *rval)
48660Sstevel@tonic-gate {
48670Sstevel@tonic-gate 	STRUCT_DECL(crypto_object_get_size, object_get_size);
48680Sstevel@tonic-gate 	kcf_provider_desc_t *real_provider;
48690Sstevel@tonic-gate 	kcf_req_params_t params;
48700Sstevel@tonic-gate 	crypto_session_id_t session_id;
48710Sstevel@tonic-gate 	crypto_minor_t *cm;
48726424Skrishna 	crypto_session_data_t *sp = NULL;
48730Sstevel@tonic-gate 	crypto_object_id_t handle;
48740Sstevel@tonic-gate 	size_t size;
48750Sstevel@tonic-gate 	int error = 0;
48760Sstevel@tonic-gate 	int rv;
48770Sstevel@tonic-gate 
48780Sstevel@tonic-gate 	STRUCT_INIT(object_get_size, mode);
48790Sstevel@tonic-gate 
48800Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
48810Sstevel@tonic-gate 		cmn_err(CE_WARN, "object_get_size: failed holding minor");
48820Sstevel@tonic-gate 		return (ENXIO);
48830Sstevel@tonic-gate 	}
48840Sstevel@tonic-gate 
48850Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(object_get_size),
48860Sstevel@tonic-gate 	    STRUCT_SIZE(object_get_size)) != 0) {
48870Sstevel@tonic-gate 		crypto_release_minor(cm);
48880Sstevel@tonic-gate 		return (EFAULT);
48890Sstevel@tonic-gate 	}
48900Sstevel@tonic-gate 
48910Sstevel@tonic-gate 	session_id = STRUCT_FGET(object_get_size, gs_session);
48920Sstevel@tonic-gate 
48930Sstevel@tonic-gate 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv)) {
48940Sstevel@tonic-gate 		goto release_minor;
48950Sstevel@tonic-gate 	}
48960Sstevel@tonic-gate 
48970Sstevel@tonic-gate 	if ((rv = kcf_get_hardware_provider_nomech(
48980Sstevel@tonic-gate 	    CRYPTO_OPS_OFFSET(object_ops),
4899904Smcpowers 	    CRYPTO_OBJECT_OFFSET(object_get_size), CHECK_RESTRICT_FALSE,
49000Sstevel@tonic-gate 	    sp->sd_provider, &real_provider)) != CRYPTO_SUCCESS) {
49016424Skrishna 		goto release_minor;
49020Sstevel@tonic-gate 	}
49030Sstevel@tonic-gate 
49040Sstevel@tonic-gate 	handle = STRUCT_FGET(object_get_size, gs_handle);
49050Sstevel@tonic-gate 	KCF_WRAP_OBJECT_OPS_PARAMS(&params, KCF_OP_OBJECT_GET_SIZE,
49060Sstevel@tonic-gate 	    sp->sd_provider_session->ps_session, handle, NULL, 0, NULL, &size,
49070Sstevel@tonic-gate 	    NULL, NULL, 0, NULL);
49080Sstevel@tonic-gate 
49090Sstevel@tonic-gate 	rv = kcf_submit_request(real_provider, NULL, NULL, &params, B_FALSE);
4910904Smcpowers 	KCF_PROV_REFRELE(real_provider);
49110Sstevel@tonic-gate 
49120Sstevel@tonic-gate 	if (rv == CRYPTO_SUCCESS) {
49130Sstevel@tonic-gate 		STRUCT_FSET(object_get_size, gs_size, size);
49140Sstevel@tonic-gate 	}
49156424Skrishna 
49160Sstevel@tonic-gate release_minor:
49170Sstevel@tonic-gate 	crypto_release_minor(cm);
49186424Skrishna 	CRYPTO_SESSION_RELE(sp);
49190Sstevel@tonic-gate 
49200Sstevel@tonic-gate 	if (error != 0)
49210Sstevel@tonic-gate 		return (error);
49220Sstevel@tonic-gate 
49230Sstevel@tonic-gate 	STRUCT_FSET(object_get_size, gs_return_value, rv);
49240Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(object_get_size), arg,
49250Sstevel@tonic-gate 	    STRUCT_SIZE(object_get_size)) != 0) {
49260Sstevel@tonic-gate 		return (EFAULT);
49270Sstevel@tonic-gate 	}
49280Sstevel@tonic-gate 	return (0);
49290Sstevel@tonic-gate }
49300Sstevel@tonic-gate 
49310Sstevel@tonic-gate /* ARGSUSED */
49320Sstevel@tonic-gate static int
49330Sstevel@tonic-gate object_set_attribute_value(dev_t dev, caddr_t arg, int mode, int *rval)
49340Sstevel@tonic-gate {
49350Sstevel@tonic-gate 	STRUCT_DECL(crypto_object_set_attribute_value, set_attribute_value);
49360Sstevel@tonic-gate 	kcf_provider_desc_t *real_provider;
49370Sstevel@tonic-gate 	kcf_req_params_t params;
49380Sstevel@tonic-gate 	crypto_object_attribute_t *k_attrs = NULL;
49390Sstevel@tonic-gate 	crypto_session_id_t session_id;
49400Sstevel@tonic-gate 	crypto_minor_t *cm;
49416424Skrishna 	crypto_session_data_t *sp = NULL;
49420Sstevel@tonic-gate 	crypto_object_id_t object_handle;
49430Sstevel@tonic-gate 	caddr_t sa_attributes;
49440Sstevel@tonic-gate 	size_t k_attrs_size;
49450Sstevel@tonic-gate 	size_t rctl_bytes = 0;
49466424Skrishna 	boolean_t rctl_chk = B_FALSE;
49470Sstevel@tonic-gate 	int error = 0;
49480Sstevel@tonic-gate 	int rv;
49490Sstevel@tonic-gate 	uint_t count;
49500Sstevel@tonic-gate 
49510Sstevel@tonic-gate 	STRUCT_INIT(set_attribute_value, mode);
49520Sstevel@tonic-gate 
49530Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
49540Sstevel@tonic-gate 		cmn_err(CE_WARN,
49550Sstevel@tonic-gate 		    "object_set_attribute_value: failed holding minor");
49560Sstevel@tonic-gate 		return (ENXIO);
49570Sstevel@tonic-gate 	}
49580Sstevel@tonic-gate 
49590Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(set_attribute_value),
49600Sstevel@tonic-gate 	    STRUCT_SIZE(set_attribute_value)) != 0) {
49610Sstevel@tonic-gate 		crypto_release_minor(cm);
49620Sstevel@tonic-gate 		return (EFAULT);
49630Sstevel@tonic-gate 	}
49640Sstevel@tonic-gate 
49650Sstevel@tonic-gate 	count = STRUCT_FGET(set_attribute_value, sa_count);
49660Sstevel@tonic-gate 	sa_attributes = STRUCT_FGETP(set_attribute_value, sa_attributes);
49670Sstevel@tonic-gate 
49680Sstevel@tonic-gate 	session_id = STRUCT_FGET(set_attribute_value, sa_session);
49690Sstevel@tonic-gate 
49700Sstevel@tonic-gate 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv)) {
49710Sstevel@tonic-gate 		goto release_minor;
49720Sstevel@tonic-gate 	}
49736424Skrishna 	if (!copyin_attributes(mode, sp, count, sa_attributes, &k_attrs,
49746424Skrishna 	    &k_attrs_size, NULL, &rv, &error, &rctl_bytes,
49756424Skrishna 	    &rctl_chk, B_TRUE)) {
49766424Skrishna 		goto release_minor;
49776424Skrishna 	}
49780Sstevel@tonic-gate 
49790Sstevel@tonic-gate 	if ((rv = kcf_get_hardware_provider_nomech(
49800Sstevel@tonic-gate 	    CRYPTO_OPS_OFFSET(object_ops),
49810Sstevel@tonic-gate 	    CRYPTO_OBJECT_OFFSET(object_set_attribute_value),
4982904Smcpowers 	    CHECK_RESTRICT_FALSE, sp->sd_provider, &real_provider))
4983904Smcpowers 	    != CRYPTO_SUCCESS) {
49846424Skrishna 		goto release_minor;
49850Sstevel@tonic-gate 	}
49860Sstevel@tonic-gate 
49870Sstevel@tonic-gate 	object_handle = STRUCT_FGET(set_attribute_value, sa_handle);
49880Sstevel@tonic-gate 	KCF_WRAP_OBJECT_OPS_PARAMS(&params, KCF_OP_OBJECT_SET_ATTRIBUTE_VALUE,
49890Sstevel@tonic-gate 	    sp->sd_provider_session->ps_session, object_handle, k_attrs, count,
49900Sstevel@tonic-gate 	    NULL, 0, NULL, NULL, 0, NULL);
49910Sstevel@tonic-gate 
49920Sstevel@tonic-gate 	rv = kcf_submit_request(real_provider, NULL, NULL, &params, B_FALSE);
4993904Smcpowers 	KCF_PROV_REFRELE(real_provider);
49940Sstevel@tonic-gate 
49956424Skrishna release_minor:
49966424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, rctl_bytes, rctl_chk);
49970Sstevel@tonic-gate 	CRYPTO_SESSION_RELE(sp);
49980Sstevel@tonic-gate 	crypto_release_minor(cm);
49990Sstevel@tonic-gate 
50000Sstevel@tonic-gate 	if (k_attrs != NULL)
50010Sstevel@tonic-gate 		kmem_free(k_attrs, k_attrs_size);
50020Sstevel@tonic-gate 
50030Sstevel@tonic-gate 	if (error != 0)
50040Sstevel@tonic-gate 		return (error);
50050Sstevel@tonic-gate 
50060Sstevel@tonic-gate 	STRUCT_FSET(set_attribute_value, sa_return_value, rv);
50070Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(set_attribute_value), arg,
50080Sstevel@tonic-gate 	    STRUCT_SIZE(set_attribute_value)) != 0) {
50090Sstevel@tonic-gate 		return (EFAULT);
50100Sstevel@tonic-gate 	}
50110Sstevel@tonic-gate 	return (0);
50120Sstevel@tonic-gate }
50130Sstevel@tonic-gate 
50140Sstevel@tonic-gate /* ARGSUSED */
50150Sstevel@tonic-gate static int
50160Sstevel@tonic-gate object_find_init(dev_t dev, caddr_t arg, int mode, int *rval)
50170Sstevel@tonic-gate {
50180Sstevel@tonic-gate 	STRUCT_DECL(crypto_object_find_init, find_init);
5019904Smcpowers 	kcf_provider_desc_t *real_provider = NULL;
50200Sstevel@tonic-gate 	kcf_req_params_t params;
50210Sstevel@tonic-gate 	crypto_object_attribute_t *k_attrs = NULL;
50220Sstevel@tonic-gate 	crypto_session_id_t session_id;
50230Sstevel@tonic-gate 	crypto_minor_t *cm;
50246424Skrishna 	crypto_session_data_t *sp = NULL;
50250Sstevel@tonic-gate 	caddr_t attributes;
50260Sstevel@tonic-gate 	size_t k_attrs_size;
50270Sstevel@tonic-gate 	size_t rctl_bytes = 0;
50286424Skrishna 	boolean_t rctl_chk = B_FALSE;
50290Sstevel@tonic-gate 	int error = 0;
50300Sstevel@tonic-gate 	int rv;
50310Sstevel@tonic-gate 	uint_t count;
50320Sstevel@tonic-gate 	void *cookie;
50330Sstevel@tonic-gate 
50340Sstevel@tonic-gate 	STRUCT_INIT(find_init, mode);
50350Sstevel@tonic-gate 
50360Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
50370Sstevel@tonic-gate 		cmn_err(CE_WARN, "object_find_init: failed holding minor");
50380Sstevel@tonic-gate 		return (ENXIO);
50390Sstevel@tonic-gate 	}
50400Sstevel@tonic-gate 
50410Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(find_init), STRUCT_SIZE(find_init)) != 0) {
50420Sstevel@tonic-gate 		crypto_release_minor(cm);
50430Sstevel@tonic-gate 		return (EFAULT);
50440Sstevel@tonic-gate 	}
50450Sstevel@tonic-gate 
50460Sstevel@tonic-gate 	count = STRUCT_FGET(find_init, fi_count);
50470Sstevel@tonic-gate 	attributes = STRUCT_FGETP(find_init, fi_attributes);
50480Sstevel@tonic-gate 
50490Sstevel@tonic-gate 	session_id = STRUCT_FGET(find_init, fi_session);
50500Sstevel@tonic-gate 
50510Sstevel@tonic-gate 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv)) {
50520Sstevel@tonic-gate 		goto release_minor;
50530Sstevel@tonic-gate 	}
50546424Skrishna 	if (!copyin_attributes(mode, sp, count, attributes, &k_attrs,
50556424Skrishna 	    &k_attrs_size, NULL, &rv, &error, &rctl_bytes,
50566424Skrishna 	    &rctl_chk, B_TRUE)) {
50576424Skrishna 		goto release_minor;
50586424Skrishna 	}
50590Sstevel@tonic-gate 
50600Sstevel@tonic-gate 	if ((rv = kcf_get_hardware_provider_nomech(
50610Sstevel@tonic-gate 	    CRYPTO_OPS_OFFSET(object_ops),
5062904Smcpowers 	    CRYPTO_OBJECT_OFFSET(object_find_init), CHECK_RESTRICT_FALSE,
50630Sstevel@tonic-gate 	    sp->sd_provider, &real_provider)) != CRYPTO_SUCCESS) {
50646424Skrishna 		goto release_minor;
50650Sstevel@tonic-gate 	}
50660Sstevel@tonic-gate 
50670Sstevel@tonic-gate 	/* check for an active find */
50680Sstevel@tonic-gate 	if (sp->sd_find_init_cookie != NULL) {
50690Sstevel@tonic-gate 		rv = CRYPTO_OPERATION_IS_ACTIVE;
50700Sstevel@tonic-gate 		goto release_minor;
50710Sstevel@tonic-gate 	}
50720Sstevel@tonic-gate 
50730Sstevel@tonic-gate 	KCF_WRAP_OBJECT_OPS_PARAMS(&params, KCF_OP_OBJECT_FIND_INIT,
50740Sstevel@tonic-gate 	    sp->sd_provider_session->ps_session, 0, k_attrs, count, NULL, 0,
50750Sstevel@tonic-gate 	    &cookie, NULL, 0, NULL);
50760Sstevel@tonic-gate 
50770Sstevel@tonic-gate 	rv = kcf_submit_request(real_provider, NULL, NULL, &params, B_FALSE);
50780Sstevel@tonic-gate 
50790Sstevel@tonic-gate 	if (rv == CRYPTO_SUCCESS) {
50800Sstevel@tonic-gate 		/*
50810Sstevel@tonic-gate 		 * The cookie is allocated by a provider at the start of an
50820Sstevel@tonic-gate 		 * object search.  It is freed when the search is terminated
50830Sstevel@tonic-gate 		 * by a final operation, or when the session is closed.
50840Sstevel@tonic-gate 		 * It contains state information about which object handles
50850Sstevel@tonic-gate 		 * have been returned to the caller.
50860Sstevel@tonic-gate 		 */
50870Sstevel@tonic-gate 		sp->sd_find_init_cookie = cookie;
50880Sstevel@tonic-gate 	}
50890Sstevel@tonic-gate 
50906424Skrishna release_minor:
50916424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, rctl_bytes, rctl_chk);
50920Sstevel@tonic-gate 	CRYPTO_SESSION_RELE(sp);
50930Sstevel@tonic-gate 	crypto_release_minor(cm);
50940Sstevel@tonic-gate 
5095904Smcpowers 	if (real_provider != NULL)
5096904Smcpowers 		KCF_PROV_REFRELE(real_provider);
5097904Smcpowers 
50980Sstevel@tonic-gate 	if (k_attrs != NULL)
50990Sstevel@tonic-gate 		kmem_free(k_attrs, k_attrs_size);
51000Sstevel@tonic-gate 
51010Sstevel@tonic-gate 	if (error != 0)
51020Sstevel@tonic-gate 		return (error);
51030Sstevel@tonic-gate 
51040Sstevel@tonic-gate 	STRUCT_FSET(find_init, fi_return_value, rv);
51050Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(find_init), arg, STRUCT_SIZE(find_init)) != 0) {
51060Sstevel@tonic-gate 		return (EFAULT);
51070Sstevel@tonic-gate 	}
51080Sstevel@tonic-gate 	return (0);
51090Sstevel@tonic-gate }
51100Sstevel@tonic-gate 
51110Sstevel@tonic-gate /* ARGSUSED */
51120Sstevel@tonic-gate static int
51130Sstevel@tonic-gate object_find_update(dev_t dev, caddr_t arg, int mode, int *rval)
51140Sstevel@tonic-gate {
51150Sstevel@tonic-gate 	STRUCT_DECL(crypto_object_find_update, find_update);
51160Sstevel@tonic-gate 	kcf_provider_desc_t *real_provider;
51170Sstevel@tonic-gate 	kcf_req_params_t params;
51180Sstevel@tonic-gate 	crypto_minor_t *cm;
51196424Skrishna 	crypto_session_data_t *sp = NULL;
51200Sstevel@tonic-gate 	crypto_object_id_t *buffer = NULL;
51210Sstevel@tonic-gate 	crypto_session_id_t session_id;
51220Sstevel@tonic-gate 	size_t len, rctl_bytes = 0;
51230Sstevel@tonic-gate 	uint_t count, max_count;
51240Sstevel@tonic-gate 	int rv, error = 0;
51256424Skrishna 	boolean_t rctl_chk = B_FALSE;
51260Sstevel@tonic-gate 
51270Sstevel@tonic-gate 	STRUCT_INIT(find_update, mode);
51280Sstevel@tonic-gate 
51290Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
51300Sstevel@tonic-gate 		cmn_err(CE_WARN, "object_find_update: failed holding minor");
51310Sstevel@tonic-gate 		return (ENXIO);
51320Sstevel@tonic-gate 	}
51330Sstevel@tonic-gate 
51340Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(find_update),
51350Sstevel@tonic-gate 	    STRUCT_SIZE(find_update)) != 0) {
51360Sstevel@tonic-gate 		crypto_release_minor(cm);
51370Sstevel@tonic-gate 		return (EFAULT);
51380Sstevel@tonic-gate 	}
51390Sstevel@tonic-gate 
51400Sstevel@tonic-gate 	max_count = STRUCT_FGET(find_update, fu_max_count);
51410Sstevel@tonic-gate 	if (max_count > CRYPTO_MAX_FIND_COUNT) {
51420Sstevel@tonic-gate 		cmn_err(CE_NOTE, "object_find_update: count greater than %d, "
51430Sstevel@tonic-gate 		    "pid = %d", CRYPTO_MAX_FIND_COUNT, curproc->p_pid);
51440Sstevel@tonic-gate 		rv = CRYPTO_ARGUMENTS_BAD;
51450Sstevel@tonic-gate 		goto release_minor;
51460Sstevel@tonic-gate 	}
51470Sstevel@tonic-gate 	len = max_count * sizeof (crypto_object_id_t);
51486424Skrishna 	session_id = STRUCT_FGET(find_update, fu_session);
51496424Skrishna 
51506424Skrishna 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv)) {
51516424Skrishna 		goto release_minor;
51526424Skrishna 	}
51536424Skrishna 	if ((rv = CRYPTO_BUFFER_CHECK(sp, len, rctl_chk)) !=
51546424Skrishna 	    CRYPTO_SUCCESS) {
51550Sstevel@tonic-gate 		goto release_minor;
51560Sstevel@tonic-gate 	}
51570Sstevel@tonic-gate 	rctl_bytes = len;
51580Sstevel@tonic-gate 	buffer = kmem_alloc(len, KM_SLEEP);
51590Sstevel@tonic-gate 
51600Sstevel@tonic-gate 	if ((rv = kcf_get_hardware_provider_nomech(
51610Sstevel@tonic-gate 	    CRYPTO_OPS_OFFSET(object_ops),
5162904Smcpowers 	    CRYPTO_OBJECT_OFFSET(object_find), CHECK_RESTRICT_FALSE,
51630Sstevel@tonic-gate 	    sp->sd_provider, &real_provider)) != CRYPTO_SUCCESS) {
51646424Skrishna 		goto release_minor;
51650Sstevel@tonic-gate 	}
51660Sstevel@tonic-gate 
51670Sstevel@tonic-gate 	KCF_WRAP_OBJECT_OPS_PARAMS(&params, KCF_OP_OBJECT_FIND,
51680Sstevel@tonic-gate 	    sp->sd_provider_session->ps_session, 0, NULL, 0, buffer, 0,
51690Sstevel@tonic-gate 	    NULL, sp->sd_find_init_cookie, max_count, &count);
51700Sstevel@tonic-gate 
51710Sstevel@tonic-gate 	rv = kcf_submit_request(real_provider, NULL, NULL, &params, B_FALSE);
5172904Smcpowers 	KCF_PROV_REFRELE(real_provider);
51730Sstevel@tonic-gate 
51740Sstevel@tonic-gate 	if (rv == CRYPTO_SUCCESS) {
51750Sstevel@tonic-gate 		if (count > max_count) {
51760Sstevel@tonic-gate 			/* bad bad provider */
51770Sstevel@tonic-gate 			rv = CRYPTO_FAILED;
51780Sstevel@tonic-gate 			goto release_minor;
51790Sstevel@tonic-gate 		}
51800Sstevel@tonic-gate 		if (count != 0) {
51810Sstevel@tonic-gate 			/* copyout handles */
51820Sstevel@tonic-gate 			if (copyout(buffer,
51830Sstevel@tonic-gate 			    STRUCT_FGETP(find_update, fu_handles),
51840Sstevel@tonic-gate 			    count * sizeof (crypto_object_id_t)) != 0) {
51850Sstevel@tonic-gate 				error = EFAULT;
51860Sstevel@tonic-gate 			}
51870Sstevel@tonic-gate 		}
51880Sstevel@tonic-gate 		STRUCT_FSET(find_update, fu_count, count);
51890Sstevel@tonic-gate 	}
51900Sstevel@tonic-gate 
51910Sstevel@tonic-gate release_minor:
51926424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, rctl_bytes, rctl_chk);
51936424Skrishna 	CRYPTO_SESSION_RELE(sp);
51940Sstevel@tonic-gate 	crypto_release_minor(cm);
51950Sstevel@tonic-gate 
51960Sstevel@tonic-gate 	if (buffer != NULL)
51970Sstevel@tonic-gate 		kmem_free(buffer, len);
51980Sstevel@tonic-gate 
51990Sstevel@tonic-gate 	if (error != 0)
52000Sstevel@tonic-gate 		return (error);
52010Sstevel@tonic-gate 
52020Sstevel@tonic-gate 	STRUCT_FSET(find_update, fu_return_value, rv);
52030Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(find_update), arg,
52040Sstevel@tonic-gate 	    STRUCT_SIZE(find_update)) != 0) {
52050Sstevel@tonic-gate 		return (EFAULT);
52060Sstevel@tonic-gate 	}
52070Sstevel@tonic-gate 
52080Sstevel@tonic-gate 	return (0);
52090Sstevel@tonic-gate }
52100Sstevel@tonic-gate 
52110Sstevel@tonic-gate /*
52120Sstevel@tonic-gate  * Free provider-allocated storage used for find object searches.
52130Sstevel@tonic-gate  */
52140Sstevel@tonic-gate static int
52150Sstevel@tonic-gate crypto_free_find_ctx(crypto_session_data_t *sp)
52160Sstevel@tonic-gate {
52170Sstevel@tonic-gate 	kcf_provider_desc_t *real_provider;
52180Sstevel@tonic-gate 	kcf_req_params_t params;
52190Sstevel@tonic-gate 	int rv;
52200Sstevel@tonic-gate 
52210Sstevel@tonic-gate 	if ((rv = kcf_get_hardware_provider_nomech(
52220Sstevel@tonic-gate 	    CRYPTO_OPS_OFFSET(object_ops),
5223904Smcpowers 	    CRYPTO_OBJECT_OFFSET(object_find_final), CHECK_RESTRICT_FALSE,
52240Sstevel@tonic-gate 	    sp->sd_provider, &real_provider)) != CRYPTO_SUCCESS) {
52250Sstevel@tonic-gate 		return (rv);
52260Sstevel@tonic-gate 	}
52270Sstevel@tonic-gate 
52280Sstevel@tonic-gate 	KCF_WRAP_OBJECT_OPS_PARAMS(&params, KCF_OP_OBJECT_FIND_FINAL,
52290Sstevel@tonic-gate 	    sp->sd_provider_session->ps_session, 0, NULL, 0, NULL, 0,
52300Sstevel@tonic-gate 	    NULL, sp->sd_find_init_cookie, 0, NULL);
52310Sstevel@tonic-gate 
5232904Smcpowers 	rv = kcf_submit_request(real_provider, NULL, NULL, &params, B_FALSE);
5233904Smcpowers 	KCF_PROV_REFRELE(real_provider);
5234904Smcpowers 	return (rv);
52350Sstevel@tonic-gate }
52360Sstevel@tonic-gate 
52370Sstevel@tonic-gate /* ARGSUSED */
52380Sstevel@tonic-gate static int
52390Sstevel@tonic-gate object_find_final(dev_t dev, caddr_t arg, int mode, int *rval)
52400Sstevel@tonic-gate {
52410Sstevel@tonic-gate 	STRUCT_DECL(crypto_object_find_final, object_find_final);
52420Sstevel@tonic-gate 	crypto_session_id_t session_id;
52430Sstevel@tonic-gate 	crypto_minor_t *cm;
52440Sstevel@tonic-gate 	crypto_session_data_t *sp;
52450Sstevel@tonic-gate 	int error = 0;
52460Sstevel@tonic-gate 	int rv;
52470Sstevel@tonic-gate 
52480Sstevel@tonic-gate 	STRUCT_INIT(object_find_final, mode);
52490Sstevel@tonic-gate 
52500Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
52510Sstevel@tonic-gate 		cmn_err(CE_WARN, "object_find_final: failed holding minor");
52520Sstevel@tonic-gate 		return (ENXIO);
52530Sstevel@tonic-gate 	}
52540Sstevel@tonic-gate 
52550Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(object_find_final),
52560Sstevel@tonic-gate 	    STRUCT_SIZE(object_find_final)) != 0) {
52570Sstevel@tonic-gate 		crypto_release_minor(cm);
52580Sstevel@tonic-gate 		return (EFAULT);
52590Sstevel@tonic-gate 	}
52600Sstevel@tonic-gate 
52610Sstevel@tonic-gate 	session_id = STRUCT_FGET(object_find_final, ff_session);
52620Sstevel@tonic-gate 
52630Sstevel@tonic-gate 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv)) {
52640Sstevel@tonic-gate 		goto release_minor;
52650Sstevel@tonic-gate 	}
52660Sstevel@tonic-gate 
52670Sstevel@tonic-gate 	if ((rv = crypto_free_find_ctx(sp)) == CRYPTO_SUCCESS) {
52680Sstevel@tonic-gate 		sp->sd_find_init_cookie = NULL;
52690Sstevel@tonic-gate 	}
52700Sstevel@tonic-gate 
52710Sstevel@tonic-gate 	CRYPTO_SESSION_RELE(sp);
52720Sstevel@tonic-gate 
52730Sstevel@tonic-gate release_minor:
52740Sstevel@tonic-gate 	crypto_release_minor(cm);
52750Sstevel@tonic-gate 
52760Sstevel@tonic-gate 	if (error != 0)
52770Sstevel@tonic-gate 		return (error);
52780Sstevel@tonic-gate 
52790Sstevel@tonic-gate 	STRUCT_FSET(object_find_final, ff_return_value, rv);
52800Sstevel@tonic-gate 
52810Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(object_find_final), arg,
52820Sstevel@tonic-gate 	    STRUCT_SIZE(object_find_final)) != 0) {
52830Sstevel@tonic-gate 		return (EFAULT);
52840Sstevel@tonic-gate 	}
52850Sstevel@tonic-gate 	return (0);
52860Sstevel@tonic-gate }
52870Sstevel@tonic-gate 
52880Sstevel@tonic-gate /* ARGSUSED */
52890Sstevel@tonic-gate static int
52900Sstevel@tonic-gate object_generate_key(dev_t dev, caddr_t arg, int mode, int *rval)
52910Sstevel@tonic-gate {
52920Sstevel@tonic-gate 	STRUCT_DECL(crypto_object_generate_key, generate_key);
5293904Smcpowers 	kcf_provider_desc_t *real_provider = NULL;
52940Sstevel@tonic-gate 	kcf_req_params_t params;
52950Sstevel@tonic-gate 	crypto_mechanism_t mech;
52960Sstevel@tonic-gate 	crypto_object_attribute_t *k_attrs = NULL;
52970Sstevel@tonic-gate 	crypto_session_id_t session_id;
52980Sstevel@tonic-gate 	crypto_minor_t *cm;
52990Sstevel@tonic-gate 	crypto_session_data_t *sp = NULL;
53000Sstevel@tonic-gate 	crypto_object_id_t key_handle;
53010Sstevel@tonic-gate 	caddr_t attributes;
53020Sstevel@tonic-gate 	size_t k_attrs_size;
53030Sstevel@tonic-gate 	size_t mech_rctl_bytes = 0, key_rctl_bytes = 0;
53046424Skrishna 	boolean_t mech_rctl_chk = B_FALSE;
53056424Skrishna 	boolean_t key_rctl_chk = B_FALSE;
53060Sstevel@tonic-gate 	uint_t count;
53070Sstevel@tonic-gate 	int error = 0;
53080Sstevel@tonic-gate 	int rv;
5309904Smcpowers 	boolean_t allocated_by_crypto_module = B_FALSE;
53100Sstevel@tonic-gate 
53110Sstevel@tonic-gate 	STRUCT_INIT(generate_key, mode);
53120Sstevel@tonic-gate 
53130Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
53140Sstevel@tonic-gate 		cmn_err(CE_WARN, "object_generate_key: failed holding minor");
53150Sstevel@tonic-gate 		return (ENXIO);
53160Sstevel@tonic-gate 	}
53170Sstevel@tonic-gate 
53180Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(generate_key),
53190Sstevel@tonic-gate 	    STRUCT_SIZE(generate_key)) != 0) {
53200Sstevel@tonic-gate 		crypto_release_minor(cm);
53210Sstevel@tonic-gate 		return (EFAULT);
53220Sstevel@tonic-gate 	}
53230Sstevel@tonic-gate 
53240Sstevel@tonic-gate 	session_id = STRUCT_FGET(generate_key, gk_session);
53250Sstevel@tonic-gate 
53260Sstevel@tonic-gate 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv)) {
53270Sstevel@tonic-gate 		goto release_minor;
53280Sstevel@tonic-gate 	}
53290Sstevel@tonic-gate 
5330904Smcpowers 	bcopy(STRUCT_FADDR(generate_key, gk_mechanism), &mech.cm_type,
5331904Smcpowers 	    sizeof (crypto_mech_type_t));
5332904Smcpowers 
533310444SVladimir.Kotal@Sun.COM 	if ((rv = kcf_get_hardware_provider(mech.cm_type, NULL,
533410444SVladimir.Kotal@Sun.COM 	    CRYPTO_MECH_INVALID, NULL, CHECK_RESTRICT_FALSE, sp->sd_provider,
533510444SVladimir.Kotal@Sun.COM 	    &real_provider, CRYPTO_FG_GENERATE)) != CRYPTO_SUCCESS) {
53360Sstevel@tonic-gate 		goto release_minor;
53370Sstevel@tonic-gate 	}
53380Sstevel@tonic-gate 
5339904Smcpowers 	rv = crypto_provider_copyin_mech_param(real_provider,
5340904Smcpowers 	    STRUCT_FADDR(generate_key, gk_mechanism), &mech, mode, &error);
5341904Smcpowers 
5342904Smcpowers 	if (rv == CRYPTO_NOT_SUPPORTED) {
5343904Smcpowers 		allocated_by_crypto_module = B_TRUE;
53446424Skrishna 		if (!copyin_mech(mode, sp,
53456424Skrishna 		    STRUCT_FADDR(generate_key, gk_mechanism),
53466424Skrishna 		    &mech, &mech_rctl_bytes, &mech_rctl_chk, &rv, &error)) {
5347904Smcpowers 			goto release_minor;
5348904Smcpowers 		}
5349904Smcpowers 	} else {
5350904Smcpowers 		if (rv != CRYPTO_SUCCESS)
5351904Smcpowers 			goto release_minor;
53520Sstevel@tonic-gate 	}
53530Sstevel@tonic-gate 
53540Sstevel@tonic-gate 	count = STRUCT_FGET(generate_key, gk_count);
53550Sstevel@tonic-gate 	attributes = STRUCT_FGETP(generate_key, gk_attributes);
53566424Skrishna 	if (!copyin_attributes(mode, sp, count, attributes, &k_attrs,
53576424Skrishna 	    &k_attrs_size, NULL, &rv, &error, &key_rctl_bytes,
53586424Skrishna 	    &key_rctl_chk, B_TRUE)) {
53590Sstevel@tonic-gate 		goto release_minor;
53600Sstevel@tonic-gate 	}
53610Sstevel@tonic-gate 
53620Sstevel@tonic-gate 	KCF_WRAP_KEY_OPS_PARAMS(&params, KCF_OP_KEY_GENERATE,
53630Sstevel@tonic-gate 	    sp->sd_provider_session->ps_session, &mech, k_attrs, count,
53640Sstevel@tonic-gate 	    &key_handle, NULL, 0, NULL, NULL, NULL, 0);
53650Sstevel@tonic-gate 
53660Sstevel@tonic-gate 	rv = kcf_submit_request(real_provider, NULL, NULL, &params, B_FALSE);
53670Sstevel@tonic-gate 
53680Sstevel@tonic-gate 	if (rv == CRYPTO_SUCCESS)
53690Sstevel@tonic-gate 		STRUCT_FSET(generate_key, gk_handle, key_handle);
53700Sstevel@tonic-gate 
53710Sstevel@tonic-gate release_minor:
53726424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, mech_rctl_bytes, mech_rctl_chk);
53736424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, key_rctl_bytes, key_rctl_chk);
53740Sstevel@tonic-gate 
53750Sstevel@tonic-gate 	if (k_attrs != NULL)
53760Sstevel@tonic-gate 		kmem_free(k_attrs, k_attrs_size);
53770Sstevel@tonic-gate 
53780Sstevel@tonic-gate 	if (error != 0)
53790Sstevel@tonic-gate 		goto out;
53800Sstevel@tonic-gate 
53810Sstevel@tonic-gate 	STRUCT_FSET(generate_key, gk_return_value, rv);
53820Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(generate_key), arg,
53830Sstevel@tonic-gate 	    STRUCT_SIZE(generate_key)) != 0) {
53840Sstevel@tonic-gate 		if (rv == CRYPTO_SUCCESS) {
53850Sstevel@tonic-gate 			KCF_WRAP_OBJECT_OPS_PARAMS(&params,
53860Sstevel@tonic-gate 			    KCF_OP_OBJECT_DESTROY,
53870Sstevel@tonic-gate 			    sp->sd_provider_session->ps_session, key_handle,
53880Sstevel@tonic-gate 			    NULL, 0, NULL, 0, NULL, NULL, 0, NULL);
53890Sstevel@tonic-gate 
53900Sstevel@tonic-gate 			(void) kcf_submit_request(real_provider, NULL,
53910Sstevel@tonic-gate 			    NULL, &params, B_FALSE);
53920Sstevel@tonic-gate 
53930Sstevel@tonic-gate 			error = EFAULT;
53940Sstevel@tonic-gate 		}
53950Sstevel@tonic-gate 	}
53960Sstevel@tonic-gate out:
53976424Skrishna 	CRYPTO_SESSION_RELE(sp);
53980Sstevel@tonic-gate 	crypto_release_minor(cm);
5399904Smcpowers 
5400904Smcpowers 	if (real_provider != NULL) {
5401904Smcpowers 		crypto_free_mech(real_provider,
5402904Smcpowers 		    allocated_by_crypto_module, &mech);
5403904Smcpowers 		KCF_PROV_REFRELE(real_provider);
5404904Smcpowers 	}
54050Sstevel@tonic-gate 	return (error);
54060Sstevel@tonic-gate }
54070Sstevel@tonic-gate 
54080Sstevel@tonic-gate /* ARGSUSED */
54090Sstevel@tonic-gate static int
54104219Smcpowers nostore_generate_key(dev_t dev, caddr_t arg, int mode, int *rval)
54114219Smcpowers {
54124219Smcpowers 	STRUCT_DECL(crypto_nostore_generate_key, generate_key);
54134219Smcpowers 	/* LINTED E_FUNC_SET_NOT_USED */
54144219Smcpowers 	STRUCT_DECL(crypto_object_attribute, oa);
54154219Smcpowers 	kcf_provider_desc_t *real_provider = NULL;
54164219Smcpowers 	kcf_req_params_t params;
54174219Smcpowers 	crypto_mechanism_t mech;
54184219Smcpowers 	crypto_object_attribute_t *k_in_attrs = NULL;
54194219Smcpowers 	crypto_object_attribute_t *k_out_attrs = NULL;
54204219Smcpowers 	crypto_session_id_t session_id;
54214219Smcpowers 	crypto_minor_t *cm;
54224219Smcpowers 	crypto_session_data_t *sp = NULL;
54234219Smcpowers 	caddr_t in_attributes;
54244219Smcpowers 	caddr_t out_attributes;
54254219Smcpowers 	size_t k_in_attrs_size;
54264219Smcpowers 	size_t k_out_attrs_size;
54274219Smcpowers 	size_t mech_rctl_bytes = 0;
54286424Skrishna 	boolean_t mech_rctl_chk = B_FALSE;
54294219Smcpowers 	size_t in_key_rctl_bytes = 0, out_key_rctl_bytes = 0;
54306424Skrishna 	boolean_t in_key_rctl_chk = B_FALSE;
54316424Skrishna 	boolean_t out_key_rctl_chk = B_FALSE;
54324219Smcpowers 	uint_t in_count;
54334219Smcpowers 	uint_t out_count;
54344219Smcpowers 	int error = 0;
54354219Smcpowers 	int rv;
54364219Smcpowers 	boolean_t allocated_by_crypto_module = B_FALSE;
54374219Smcpowers 	caddr_t u_attrs = NULL;
54384219Smcpowers 
54394219Smcpowers 	STRUCT_INIT(generate_key, mode);
54404219Smcpowers 	STRUCT_INIT(oa, mode);
54414219Smcpowers 
54424219Smcpowers 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
54434219Smcpowers 		cmn_err(CE_WARN, "nostore_generate_key: failed holding minor");
54444219Smcpowers 		return (ENXIO);
54454219Smcpowers 	}
54464219Smcpowers 
54474219Smcpowers 	if (copyin(arg, STRUCT_BUF(generate_key),
54484219Smcpowers 	    STRUCT_SIZE(generate_key)) != 0) {
54494219Smcpowers 		crypto_release_minor(cm);
54504219Smcpowers 		return (EFAULT);
54514219Smcpowers 	}
54524219Smcpowers 
54534219Smcpowers 	session_id = STRUCT_FGET(generate_key, ngk_session);
54544219Smcpowers 
54554219Smcpowers 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv)) {
54564219Smcpowers 		goto release_minor;
54574219Smcpowers 	}
54584219Smcpowers 
54594219Smcpowers 	bcopy(STRUCT_FADDR(generate_key, ngk_mechanism), &mech.cm_type,
54604219Smcpowers 	    sizeof (crypto_mech_type_t));
54614219Smcpowers 
546210444SVladimir.Kotal@Sun.COM 	if ((rv = kcf_get_hardware_provider(mech.cm_type, NULL,
546310444SVladimir.Kotal@Sun.COM 	    CRYPTO_MECH_INVALID, NULL, CHECK_RESTRICT_FALSE, sp->sd_provider,
546410444SVladimir.Kotal@Sun.COM 	    &real_provider, CRYPTO_FG_GENERATE)) != CRYPTO_SUCCESS) {
54654219Smcpowers 		goto release_minor;
54664219Smcpowers 	}
54674219Smcpowers 
54684219Smcpowers 	rv = crypto_provider_copyin_mech_param(real_provider,
54694219Smcpowers 	    STRUCT_FADDR(generate_key, ngk_mechanism), &mech, mode, &error);
54704219Smcpowers 
54714219Smcpowers 	if (rv == CRYPTO_NOT_SUPPORTED) {
54724219Smcpowers 		allocated_by_crypto_module = B_TRUE;
54736424Skrishna 		if (!copyin_mech(mode, sp, STRUCT_FADDR(generate_key,
54746424Skrishna 		    ngk_mechanism), &mech, &mech_rctl_bytes,
54756424Skrishna 		    &mech_rctl_chk, &rv, &error)) {
54764219Smcpowers 			goto release_minor;
54774219Smcpowers 		}
54784219Smcpowers 	} else {
54794219Smcpowers 		if (rv != CRYPTO_SUCCESS)
54804219Smcpowers 			goto release_minor;
54814219Smcpowers 	}
54824219Smcpowers 
54834219Smcpowers 	in_count = STRUCT_FGET(generate_key, ngk_in_count);
54844219Smcpowers 	in_attributes = STRUCT_FGETP(generate_key, ngk_in_attributes);
54856424Skrishna 	if (!copyin_attributes(mode, sp, in_count, in_attributes, &k_in_attrs,
54864219Smcpowers 	    &k_in_attrs_size, NULL, &rv, &error, &in_key_rctl_bytes,
54876424Skrishna 	    &in_key_rctl_chk, B_TRUE)) {
54884219Smcpowers 		goto release_minor;
54894219Smcpowers 	}
54904219Smcpowers 
54914219Smcpowers 	out_count = STRUCT_FGET(generate_key, ngk_out_count);
54924219Smcpowers 	out_attributes = STRUCT_FGETP(generate_key, ngk_out_attributes);
54936424Skrishna 	if (!copyin_attributes(mode, sp, out_count, out_attributes,
54946424Skrishna 	    &k_out_attrs,
54954219Smcpowers 	    &k_out_attrs_size, &u_attrs, &rv, &error, &out_key_rctl_bytes,
54966424Skrishna 	    &out_key_rctl_chk, B_FALSE)) {
54974219Smcpowers 		goto release_minor;
54984219Smcpowers 	}
54994219Smcpowers 
55004219Smcpowers 	KCF_WRAP_NOSTORE_KEY_OPS_PARAMS(&params, KCF_OP_KEY_GENERATE,
55014219Smcpowers 	    sp->sd_provider_session->ps_session, &mech, k_in_attrs, in_count,
55024219Smcpowers 	    NULL, 0, NULL, k_out_attrs, out_count, NULL, 0);
55034219Smcpowers 
55044219Smcpowers 	rv = kcf_submit_request(real_provider, NULL, NULL, &params, B_FALSE);
55054219Smcpowers 
55064219Smcpowers 	if (rv == CRYPTO_SUCCESS) {
55074219Smcpowers 		error = copyout_attributes(mode, out_attributes,
55084219Smcpowers 		    out_count, k_out_attrs, u_attrs);
55094219Smcpowers 	}
55104219Smcpowers release_minor:
55116424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, mech_rctl_bytes, mech_rctl_chk);
55126424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, in_key_rctl_bytes, in_key_rctl_chk);
55136424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, out_key_rctl_bytes,
55146424Skrishna 	    out_key_rctl_chk);
55154219Smcpowers 
55164219Smcpowers 	if (k_in_attrs != NULL)
55174219Smcpowers 		kmem_free(k_in_attrs, k_in_attrs_size);
55184219Smcpowers 	if (k_out_attrs != NULL) {
55194219Smcpowers 		bzero(k_out_attrs, k_out_attrs_size);
55204219Smcpowers 		kmem_free(k_out_attrs, k_out_attrs_size);
55214219Smcpowers 	}
55224219Smcpowers 
55234219Smcpowers 	if (u_attrs != NULL)
55244219Smcpowers 		kmem_free(u_attrs, out_count * STRUCT_SIZE(oa));
55254219Smcpowers 
55264219Smcpowers 	if (error != 0)
55274219Smcpowers 		goto out;
55284219Smcpowers 
55294219Smcpowers 	STRUCT_FSET(generate_key, ngk_return_value, rv);
55304219Smcpowers 	if (copyout(STRUCT_BUF(generate_key), arg,
55314219Smcpowers 	    STRUCT_SIZE(generate_key)) != 0) {
55324219Smcpowers 		error = EFAULT;
55334219Smcpowers 	}
55344219Smcpowers out:
55356424Skrishna 	CRYPTO_SESSION_RELE(sp);
55364219Smcpowers 	crypto_release_minor(cm);
55374219Smcpowers 
55384219Smcpowers 	if (real_provider != NULL) {
55394219Smcpowers 		crypto_free_mech(real_provider,
55404219Smcpowers 		    allocated_by_crypto_module, &mech);
55414219Smcpowers 		KCF_PROV_REFRELE(real_provider);
55424219Smcpowers 	}
55434219Smcpowers 	return (error);
55444219Smcpowers }
55454219Smcpowers 
55464219Smcpowers /* ARGSUSED */
55474219Smcpowers static int
55480Sstevel@tonic-gate object_generate_key_pair(dev_t dev, caddr_t arg, int mode, int *rval)
55490Sstevel@tonic-gate {
55500Sstevel@tonic-gate 	STRUCT_DECL(crypto_object_generate_key_pair, generate_key_pair);
5551904Smcpowers 	kcf_provider_desc_t *real_provider = NULL;
55520Sstevel@tonic-gate 	kcf_req_params_t params;
55530Sstevel@tonic-gate 	crypto_mechanism_t mech;
55540Sstevel@tonic-gate 	crypto_object_attribute_t *k_pub_attrs = NULL;
55550Sstevel@tonic-gate 	crypto_object_attribute_t *k_pri_attrs = NULL;
55560Sstevel@tonic-gate 	crypto_session_id_t session_id;
55570Sstevel@tonic-gate 	crypto_minor_t *cm;
55580Sstevel@tonic-gate 	crypto_session_data_t *sp = NULL;
55590Sstevel@tonic-gate 	crypto_object_id_t pub_handle;
55600Sstevel@tonic-gate 	crypto_object_id_t pri_handle;
55610Sstevel@tonic-gate 	caddr_t pri_attributes;
55620Sstevel@tonic-gate 	caddr_t pub_attributes;
55630Sstevel@tonic-gate 	size_t k_pub_attrs_size, k_pri_attrs_size;
55640Sstevel@tonic-gate 	size_t mech_rctl_bytes = 0;
55656424Skrishna 	boolean_t mech_rctl_chk = B_FALSE;
55660Sstevel@tonic-gate 	size_t pub_rctl_bytes = 0;
55676424Skrishna 	boolean_t pub_rctl_chk = B_FALSE;
55680Sstevel@tonic-gate 	size_t pri_rctl_bytes = 0;
55696424Skrishna 	boolean_t pri_rctl_chk = B_FALSE;
55700Sstevel@tonic-gate 	uint_t pub_count;
55710Sstevel@tonic-gate 	uint_t pri_count;
55720Sstevel@tonic-gate 	int error = 0;
55730Sstevel@tonic-gate 	int rv;
5574904Smcpowers 	boolean_t allocated_by_crypto_module = B_FALSE;
55750Sstevel@tonic-gate 
55760Sstevel@tonic-gate 	STRUCT_INIT(generate_key_pair, mode);
55770Sstevel@tonic-gate 
55780Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
55790Sstevel@tonic-gate 		cmn_err(CE_WARN,
55800Sstevel@tonic-gate 		    "object_generate_key_pair: failed holding minor");
55810Sstevel@tonic-gate 		return (ENXIO);
55820Sstevel@tonic-gate 	}
55830Sstevel@tonic-gate 
55840Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(generate_key_pair),
55850Sstevel@tonic-gate 	    STRUCT_SIZE(generate_key_pair)) != 0) {
55860Sstevel@tonic-gate 		crypto_release_minor(cm);
55870Sstevel@tonic-gate 		return (EFAULT);
55880Sstevel@tonic-gate 	}
55890Sstevel@tonic-gate 
55900Sstevel@tonic-gate 	session_id = STRUCT_FGET(generate_key_pair, kp_session);
55910Sstevel@tonic-gate 
55920Sstevel@tonic-gate 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv)) {
55930Sstevel@tonic-gate 		goto release_minor;
55940Sstevel@tonic-gate 	}
55950Sstevel@tonic-gate 
5596904Smcpowers 	bcopy(STRUCT_FADDR(generate_key_pair, kp_mechanism), &mech.cm_type,
5597904Smcpowers 	    sizeof (crypto_mech_type_t));
5598904Smcpowers 
559910444SVladimir.Kotal@Sun.COM 	if ((rv = kcf_get_hardware_provider(mech.cm_type, NULL,
560010444SVladimir.Kotal@Sun.COM 	    CRYPTO_MECH_INVALID, NULL, CHECK_RESTRICT_FALSE, sp->sd_provider,
560110444SVladimir.Kotal@Sun.COM 	    &real_provider, CRYPTO_FG_GENERATE_KEY_PAIR)) != CRYPTO_SUCCESS) {
56020Sstevel@tonic-gate 		goto release_minor;
56030Sstevel@tonic-gate 	}
56040Sstevel@tonic-gate 
5605904Smcpowers 	rv = crypto_provider_copyin_mech_param(real_provider,
5606904Smcpowers 	    STRUCT_FADDR(generate_key_pair, kp_mechanism), &mech, mode, &error);
5607904Smcpowers 
5608904Smcpowers 	if (rv == CRYPTO_NOT_SUPPORTED) {
5609904Smcpowers 		allocated_by_crypto_module = B_TRUE;
56106424Skrishna 		if (!copyin_mech(mode, sp, STRUCT_FADDR(generate_key_pair,
56116424Skrishna 		    kp_mechanism), &mech, &mech_rctl_bytes,
56126424Skrishna 		    &mech_rctl_chk, &rv, &error)) {
5613904Smcpowers 			goto release_minor;
5614904Smcpowers 		}
5615904Smcpowers 	} else {
5616904Smcpowers 		if (rv != CRYPTO_SUCCESS)
5617904Smcpowers 			goto release_minor;
56180Sstevel@tonic-gate 	}
56190Sstevel@tonic-gate 
56200Sstevel@tonic-gate 	pub_count = STRUCT_FGET(generate_key_pair, kp_public_count);
56210Sstevel@tonic-gate 	pri_count = STRUCT_FGET(generate_key_pair, kp_private_count);
56220Sstevel@tonic-gate 
56230Sstevel@tonic-gate 	pub_attributes = STRUCT_FGETP(generate_key_pair, kp_public_attributes);
56246424Skrishna 	if (!copyin_attributes(mode, sp, pub_count, pub_attributes,
56256424Skrishna 	    &k_pub_attrs, &k_pub_attrs_size, NULL, &rv, &error, &pub_rctl_bytes,
56266424Skrishna 	    &pub_rctl_chk, B_TRUE)) {
56270Sstevel@tonic-gate 		goto release_minor;
56280Sstevel@tonic-gate 	}
56290Sstevel@tonic-gate 
56300Sstevel@tonic-gate 	pri_attributes = STRUCT_FGETP(generate_key_pair, kp_private_attributes);
56316424Skrishna 	if (!copyin_attributes(mode, sp, pri_count, pri_attributes,
56326424Skrishna 	    &k_pri_attrs, &k_pri_attrs_size, NULL, &rv, &error,
56336424Skrishna 	    &pri_rctl_bytes, &pri_rctl_chk, B_TRUE)) {
56340Sstevel@tonic-gate 		goto release_minor;
56350Sstevel@tonic-gate 	}
56360Sstevel@tonic-gate 
56370Sstevel@tonic-gate 	KCF_WRAP_KEY_OPS_PARAMS(&params, KCF_OP_KEY_GENERATE_PAIR,
56380Sstevel@tonic-gate 	    sp->sd_provider_session->ps_session, &mech, k_pub_attrs,
56390Sstevel@tonic-gate 	    pub_count, &pub_handle, k_pri_attrs, pri_count, &pri_handle,
56400Sstevel@tonic-gate 	    NULL, NULL, 0);
56410Sstevel@tonic-gate 
56420Sstevel@tonic-gate 	rv = kcf_submit_request(real_provider, NULL, NULL, &params, B_FALSE);
56430Sstevel@tonic-gate 
56440Sstevel@tonic-gate 	if (rv == CRYPTO_SUCCESS) {
56450Sstevel@tonic-gate 		STRUCT_FSET(generate_key_pair, kp_public_handle, pub_handle);
56460Sstevel@tonic-gate 		STRUCT_FSET(generate_key_pair, kp_private_handle, pri_handle);
56470Sstevel@tonic-gate 	}
56480Sstevel@tonic-gate 
56490Sstevel@tonic-gate release_minor:
56506424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, mech_rctl_bytes, mech_rctl_chk);
56516424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, pub_rctl_bytes, pub_rctl_chk);
56526424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, pri_rctl_bytes, pri_rctl_chk);
56530Sstevel@tonic-gate 
56540Sstevel@tonic-gate 	if (k_pub_attrs != NULL)
56550Sstevel@tonic-gate 		kmem_free(k_pub_attrs, k_pub_attrs_size);
56560Sstevel@tonic-gate 
56570Sstevel@tonic-gate 	if (k_pri_attrs != NULL)
56580Sstevel@tonic-gate 		kmem_free(k_pri_attrs, k_pri_attrs_size);
56590Sstevel@tonic-gate 
56600Sstevel@tonic-gate 	if (error != 0)
56610Sstevel@tonic-gate 		goto out;
56620Sstevel@tonic-gate 
56630Sstevel@tonic-gate 	STRUCT_FSET(generate_key_pair, kp_return_value, rv);
56640Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(generate_key_pair), arg,
56650Sstevel@tonic-gate 	    STRUCT_SIZE(generate_key_pair)) != 0) {
56660Sstevel@tonic-gate 		if (rv == CRYPTO_SUCCESS) {
56670Sstevel@tonic-gate 			KCF_WRAP_OBJECT_OPS_PARAMS(&params,
56680Sstevel@tonic-gate 			    KCF_OP_OBJECT_DESTROY,
56690Sstevel@tonic-gate 			    sp->sd_provider_session->ps_session, pub_handle,
56700Sstevel@tonic-gate 			    NULL, 0, NULL, 0, NULL, NULL, 0, NULL);
56710Sstevel@tonic-gate 
56720Sstevel@tonic-gate 			(void) kcf_submit_request(real_provider, NULL,
56730Sstevel@tonic-gate 			    NULL, &params, B_FALSE);
56740Sstevel@tonic-gate 
56750Sstevel@tonic-gate 			KCF_WRAP_OBJECT_OPS_PARAMS(&params,
56760Sstevel@tonic-gate 			    KCF_OP_OBJECT_DESTROY,
56770Sstevel@tonic-gate 			    sp->sd_provider_session->ps_session, pri_handle,
56780Sstevel@tonic-gate 			    NULL, 0, NULL, 0, NULL, NULL, 0, NULL);
56790Sstevel@tonic-gate 
56800Sstevel@tonic-gate 			(void) kcf_submit_request(real_provider, NULL,
56810Sstevel@tonic-gate 			    NULL, &params, B_FALSE);
56820Sstevel@tonic-gate 
56830Sstevel@tonic-gate 			error = EFAULT;
56840Sstevel@tonic-gate 		}
56850Sstevel@tonic-gate 	}
56860Sstevel@tonic-gate out:
56876424Skrishna 	CRYPTO_SESSION_RELE(sp);
56880Sstevel@tonic-gate 	crypto_release_minor(cm);
5689904Smcpowers 
5690904Smcpowers 	if (real_provider != NULL) {
5691904Smcpowers 		crypto_free_mech(real_provider,
5692904Smcpowers 		    allocated_by_crypto_module, &mech);
5693904Smcpowers 		KCF_PROV_REFRELE(real_provider);
5694904Smcpowers 	}
56950Sstevel@tonic-gate 	return (error);
56960Sstevel@tonic-gate }
56970Sstevel@tonic-gate 
56980Sstevel@tonic-gate /* ARGSUSED */
56990Sstevel@tonic-gate static int
57004219Smcpowers nostore_generate_key_pair(dev_t dev, caddr_t arg, int mode, int *rval)
57014219Smcpowers {
57024219Smcpowers 	STRUCT_DECL(crypto_nostore_generate_key_pair, generate_key_pair);
57034219Smcpowers 	/* LINTED E_FUNC_SET_NOT_USED */
57044219Smcpowers 	STRUCT_DECL(crypto_object_attribute, oa);
57054219Smcpowers 	kcf_provider_desc_t *real_provider = NULL;
57064219Smcpowers 	kcf_req_params_t params;
57074219Smcpowers 	crypto_mechanism_t mech;
57084219Smcpowers 	crypto_object_attribute_t *k_in_pub_attrs = NULL;
57094219Smcpowers 	crypto_object_attribute_t *k_in_pri_attrs = NULL;
57104219Smcpowers 	crypto_object_attribute_t *k_out_pub_attrs = NULL;
57114219Smcpowers 	crypto_object_attribute_t *k_out_pri_attrs = NULL;
57124219Smcpowers 	crypto_session_id_t session_id;
57134219Smcpowers 	crypto_minor_t *cm;
57144219Smcpowers 	crypto_session_data_t *sp = NULL;
57154219Smcpowers 	caddr_t in_pri_attributes;
57164219Smcpowers 	caddr_t in_pub_attributes;
57174219Smcpowers 	caddr_t out_pri_attributes;
57184219Smcpowers 	caddr_t out_pub_attributes;
57194219Smcpowers 	size_t k_in_pub_attrs_size, k_in_pri_attrs_size;
57204219Smcpowers 	size_t k_out_pub_attrs_size, k_out_pri_attrs_size;
57214219Smcpowers 	size_t mech_rctl_bytes = 0;
57226424Skrishna 	boolean_t mech_rctl_chk = B_FALSE;
57234219Smcpowers 	size_t in_pub_rctl_bytes = 0;
57246424Skrishna 	boolean_t in_pub_rctl_chk = B_FALSE;
57254219Smcpowers 	size_t in_pri_rctl_bytes = 0;
57266424Skrishna 	boolean_t in_pri_rctl_chk = B_FALSE;
57274219Smcpowers 	size_t out_pub_rctl_bytes = 0;
57286424Skrishna 	boolean_t out_pub_rctl_chk = B_FALSE;
57294219Smcpowers 	size_t out_pri_rctl_bytes = 0;
57306424Skrishna 	boolean_t out_pri_rctl_chk = B_FALSE;
57314219Smcpowers 	uint_t in_pub_count;
57324219Smcpowers 	uint_t in_pri_count;
57334219Smcpowers 	uint_t out_pub_count;
57344219Smcpowers 	uint_t out_pri_count;
57354219Smcpowers 	int error = 0;
57364219Smcpowers 	int rv;
57374219Smcpowers 	boolean_t allocated_by_crypto_module = B_FALSE;
57384219Smcpowers 	caddr_t u_pub_attrs = NULL;
57394219Smcpowers 	caddr_t u_pri_attrs = NULL;
57404219Smcpowers 
57414219Smcpowers 	STRUCT_INIT(generate_key_pair, mode);
57424219Smcpowers 	STRUCT_INIT(oa, mode);
57434219Smcpowers 
57444219Smcpowers 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
57454219Smcpowers 		cmn_err(CE_WARN,
57464219Smcpowers 		    "nostore_generate_key_pair: failed holding minor");
57474219Smcpowers 		return (ENXIO);
57484219Smcpowers 	}
57494219Smcpowers 
57504219Smcpowers 	if (copyin(arg, STRUCT_BUF(generate_key_pair),
57514219Smcpowers 	    STRUCT_SIZE(generate_key_pair)) != 0) {
57524219Smcpowers 		crypto_release_minor(cm);
57534219Smcpowers 		return (EFAULT);
57544219Smcpowers 	}
57554219Smcpowers 
57564219Smcpowers 	session_id = STRUCT_FGET(generate_key_pair, nkp_session);
57574219Smcpowers 
57584219Smcpowers 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv)) {
57594219Smcpowers 		goto release_minor;
57604219Smcpowers 	}
57614219Smcpowers 
57624219Smcpowers 	bcopy(STRUCT_FADDR(generate_key_pair, nkp_mechanism), &mech.cm_type,
57634219Smcpowers 	    sizeof (crypto_mech_type_t));
57644219Smcpowers 
576510444SVladimir.Kotal@Sun.COM 	if ((rv = kcf_get_hardware_provider(mech.cm_type, NULL,
576610444SVladimir.Kotal@Sun.COM 	    CRYPTO_MECH_INVALID, NULL, CHECK_RESTRICT_FALSE, sp->sd_provider,
576710444SVladimir.Kotal@Sun.COM 	    &real_provider, CRYPTO_FG_GENERATE_KEY_PAIR)) != CRYPTO_SUCCESS) {
57684219Smcpowers 		goto release_minor;
57694219Smcpowers 	}
57704219Smcpowers 
57714219Smcpowers 	rv = crypto_provider_copyin_mech_param(real_provider,
57724219Smcpowers 	    STRUCT_FADDR(generate_key_pair, nkp_mechanism), &mech, mode,
57734219Smcpowers 	    &error);
57744219Smcpowers 
57754219Smcpowers 	if (rv == CRYPTO_NOT_SUPPORTED) {
57764219Smcpowers 		allocated_by_crypto_module = B_TRUE;
57776424Skrishna 		if (!copyin_mech(mode, sp, STRUCT_FADDR(generate_key_pair,
57786424Skrishna 		    nkp_mechanism), &mech, &mech_rctl_bytes,
57796424Skrishna 		    &mech_rctl_chk, &rv, &error)) {
57804219Smcpowers 			goto release_minor;
57814219Smcpowers 		}
57824219Smcpowers 	} else {
57834219Smcpowers 		if (rv != CRYPTO_SUCCESS)
57844219Smcpowers 			goto release_minor;
57854219Smcpowers 	}
57864219Smcpowers 
57874219Smcpowers 	in_pub_count = STRUCT_FGET(generate_key_pair, nkp_in_public_count);
57884219Smcpowers 	in_pri_count = STRUCT_FGET(generate_key_pair, nkp_in_private_count);
57894219Smcpowers 
57904219Smcpowers 	in_pub_attributes = STRUCT_FGETP(generate_key_pair,
57914219Smcpowers 	    nkp_in_public_attributes);
57926424Skrishna 	if (!copyin_attributes(mode, sp, in_pub_count, in_pub_attributes,
57934219Smcpowers 	    &k_in_pub_attrs, &k_in_pub_attrs_size, NULL, &rv, &error,
57946424Skrishna 	    &in_pub_rctl_bytes, &in_pub_rctl_chk, B_TRUE)) {
57954219Smcpowers 		goto release_minor;
57964219Smcpowers 	}
57974219Smcpowers 
57984219Smcpowers 	in_pri_attributes = STRUCT_FGETP(generate_key_pair,
57994219Smcpowers 	    nkp_in_private_attributes);
58006424Skrishna 	if (!copyin_attributes(mode, sp, in_pri_count, in_pri_attributes,
58014219Smcpowers 	    &k_in_pri_attrs, &k_in_pri_attrs_size, NULL, &rv, &error,
58026424Skrishna 	    &in_pri_rctl_bytes, &in_pri_rctl_chk, B_TRUE)) {
58034219Smcpowers 		goto release_minor;
58044219Smcpowers 	}
58054219Smcpowers 
58064219Smcpowers 	out_pub_count = STRUCT_FGET(generate_key_pair, nkp_out_public_count);
58074219Smcpowers 	out_pri_count = STRUCT_FGET(generate_key_pair, nkp_out_private_count);
58084219Smcpowers 
58094219Smcpowers 	out_pub_attributes = STRUCT_FGETP(generate_key_pair,
58104219Smcpowers 	    nkp_out_public_attributes);
58116424Skrishna 	if (!copyin_attributes(mode, sp, out_pub_count, out_pub_attributes,
58124219Smcpowers 	    &k_out_pub_attrs, &k_out_pub_attrs_size, &u_pub_attrs, &rv, &error,
58136424Skrishna 	    &out_pub_rctl_bytes, &out_pub_rctl_chk, B_FALSE)) {
58144219Smcpowers 		goto release_minor;
58154219Smcpowers 	}
58164219Smcpowers 
58174219Smcpowers 	out_pri_attributes = STRUCT_FGETP(generate_key_pair,
58184219Smcpowers 	    nkp_out_private_attributes);
58196424Skrishna 	if (!copyin_attributes(mode, sp, out_pri_count, out_pri_attributes,
58204219Smcpowers 	    &k_out_pri_attrs, &k_out_pri_attrs_size, &u_pri_attrs, &rv, &error,
58216424Skrishna 	    &out_pri_rctl_bytes, &out_pri_rctl_chk, B_FALSE)) {
58224219Smcpowers 		goto release_minor;
58234219Smcpowers 	}
58244219Smcpowers 
58254219Smcpowers 	KCF_WRAP_NOSTORE_KEY_OPS_PARAMS(&params, KCF_OP_KEY_GENERATE_PAIR,
58264219Smcpowers 	    sp->sd_provider_session->ps_session, &mech, k_in_pub_attrs,
58274219Smcpowers 	    in_pub_count, k_in_pri_attrs, in_pri_count, NULL, k_out_pub_attrs,
58284219Smcpowers 	    out_pub_count, k_out_pri_attrs, out_pri_count);
58294219Smcpowers 
58304219Smcpowers 	rv = kcf_submit_request(real_provider, NULL, NULL, &params, B_FALSE);
58314219Smcpowers 
58324219Smcpowers 	if (rv == CRYPTO_SUCCESS) {
58334219Smcpowers 		error = copyout_attributes(mode, out_pub_attributes,
58344219Smcpowers 		    out_pub_count, k_out_pub_attrs, u_pub_attrs);
58354219Smcpowers 		if (error != CRYPTO_SUCCESS)
58364219Smcpowers 			goto release_minor;
58374219Smcpowers 		error = copyout_attributes(mode, out_pri_attributes,
58384219Smcpowers 		    out_pri_count, k_out_pri_attrs, u_pri_attrs);
58394219Smcpowers 	}
58404219Smcpowers 
58414219Smcpowers release_minor:
58426424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, mech_rctl_bytes, mech_rctl_chk);
58436424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, in_pub_rctl_bytes, in_pub_rctl_chk);
58446424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, in_pri_rctl_bytes, in_pri_rctl_chk);
58456424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, out_pub_rctl_bytes,
58466424Skrishna 	    out_pub_rctl_chk);
58476424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, out_pri_rctl_bytes,
58486424Skrishna 	    out_pri_rctl_chk);
58494219Smcpowers 
58504219Smcpowers 	if (k_in_pub_attrs != NULL)
58514219Smcpowers 		kmem_free(k_in_pub_attrs, k_in_pub_attrs_size);
58524219Smcpowers 
58534219Smcpowers 	if (k_in_pri_attrs != NULL)
58544219Smcpowers 		kmem_free(k_in_pri_attrs, k_in_pri_attrs_size);
58554219Smcpowers 
58564219Smcpowers 	if (k_out_pub_attrs != NULL)
58574219Smcpowers 		kmem_free(k_out_pub_attrs, k_out_pub_attrs_size);
58584219Smcpowers 
58594219Smcpowers 	if (k_out_pri_attrs != NULL) {
58604219Smcpowers 		bzero(k_out_pri_attrs, k_out_pri_attrs_size);
58614219Smcpowers 		kmem_free(k_out_pri_attrs, k_out_pri_attrs_size);
58624219Smcpowers 	}
58634219Smcpowers 
58644219Smcpowers 	if (u_pub_attrs != NULL)
58654219Smcpowers 		kmem_free(u_pub_attrs, out_pub_count * STRUCT_SIZE(oa));
58664219Smcpowers 
58674219Smcpowers 	if (u_pri_attrs != NULL)
58684219Smcpowers 		kmem_free(u_pri_attrs, out_pri_count * STRUCT_SIZE(oa));
58694219Smcpowers 
58704219Smcpowers 	if (error != 0)
58714219Smcpowers 		goto out;
58724219Smcpowers 
58734219Smcpowers 	STRUCT_FSET(generate_key_pair, nkp_return_value, rv);
58744219Smcpowers 	if (copyout(STRUCT_BUF(generate_key_pair), arg,
58754219Smcpowers 	    STRUCT_SIZE(generate_key_pair)) != 0) {
58764219Smcpowers 		error = EFAULT;
58774219Smcpowers 	}
58784219Smcpowers out:
58796424Skrishna 	CRYPTO_SESSION_RELE(sp);
58804219Smcpowers 	crypto_release_minor(cm);
58814219Smcpowers 
58824219Smcpowers 	if (real_provider != NULL) {
58834219Smcpowers 		crypto_free_mech(real_provider,
58844219Smcpowers 		    allocated_by_crypto_module, &mech);
58854219Smcpowers 		KCF_PROV_REFRELE(real_provider);
58864219Smcpowers 	}
58874219Smcpowers 	return (error);
58884219Smcpowers }
58894219Smcpowers 
58904219Smcpowers /* ARGSUSED */
58914219Smcpowers static int
58920Sstevel@tonic-gate object_wrap_key(dev_t dev, caddr_t arg, int mode, int *rval)
58930Sstevel@tonic-gate {
58940Sstevel@tonic-gate 	STRUCT_DECL(crypto_object_wrap_key, wrap_key);
5895904Smcpowers 	kcf_provider_desc_t *real_provider = NULL;
58960Sstevel@tonic-gate 	kcf_req_params_t params;
58970Sstevel@tonic-gate 	crypto_mechanism_t mech;
58980Sstevel@tonic-gate 	crypto_key_t key;
58990Sstevel@tonic-gate 	crypto_session_id_t session_id;
59000Sstevel@tonic-gate 	crypto_minor_t *cm;
59016424Skrishna 	crypto_session_data_t *sp = NULL;
59020Sstevel@tonic-gate 	crypto_object_id_t handle;
59030Sstevel@tonic-gate 	size_t mech_rctl_bytes = 0, key_rctl_bytes = 0;
59046424Skrishna 	boolean_t mech_rctl_chk = B_FALSE;
59056424Skrishna 	boolean_t key_rctl_chk = B_FALSE;
59060Sstevel@tonic-gate 	size_t wrapped_key_rctl_bytes = 0;
59076424Skrishna 	boolean_t wrapped_key_rctl_chk = B_FALSE;
59080Sstevel@tonic-gate 	size_t wrapped_key_len, new_wrapped_key_len;
59090Sstevel@tonic-gate 	uchar_t *wrapped_key = NULL;
59100Sstevel@tonic-gate 	char *wrapped_key_buffer;
59110Sstevel@tonic-gate 	int error = 0;
59120Sstevel@tonic-gate 	int rv;
5913904Smcpowers 	boolean_t allocated_by_crypto_module = B_FALSE;
59140Sstevel@tonic-gate 
59150Sstevel@tonic-gate 	STRUCT_INIT(wrap_key, mode);
59160Sstevel@tonic-gate 
59170Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
59180Sstevel@tonic-gate 		cmn_err(CE_WARN, "object_wrap_key: failed holding minor");
59190Sstevel@tonic-gate 		return (ENXIO);
59200Sstevel@tonic-gate 	}
59210Sstevel@tonic-gate 
59220Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(wrap_key), STRUCT_SIZE(wrap_key)) != 0) {
59230Sstevel@tonic-gate 		crypto_release_minor(cm);
59240Sstevel@tonic-gate 		return (EFAULT);
59250Sstevel@tonic-gate 	}
59260Sstevel@tonic-gate 
59270Sstevel@tonic-gate 	bzero(&key, sizeof (crypto_key_t));
59280Sstevel@tonic-gate 
59290Sstevel@tonic-gate 	session_id = STRUCT_FGET(wrap_key, wk_session);
59300Sstevel@tonic-gate 
59310Sstevel@tonic-gate 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv)) {
59326424Skrishna 		goto out;
59330Sstevel@tonic-gate 	}
59340Sstevel@tonic-gate 
5935904Smcpowers 	bcopy(STRUCT_FADDR(wrap_key, wk_mechanism), &mech.cm_type,
5936904Smcpowers 	    sizeof (crypto_mech_type_t));
5937904Smcpowers 
593810444SVladimir.Kotal@Sun.COM 	/* We need the key length for provider selection so copy it in now. */
593910444SVladimir.Kotal@Sun.COM 	if (!copyin_key(mode, sp, STRUCT_FADDR(wrap_key, wk_wrapping_key), &key,
594010444SVladimir.Kotal@Sun.COM 	    &key_rctl_bytes, &key_rctl_chk, &rv, &error)) {
594110444SVladimir.Kotal@Sun.COM 		goto out;
594210444SVladimir.Kotal@Sun.COM 	}
594310444SVladimir.Kotal@Sun.COM 
594410444SVladimir.Kotal@Sun.COM 	wrapped_key_len = STRUCT_FGET(wrap_key, wk_wrapped_key_len);
594510444SVladimir.Kotal@Sun.COM 
594610444SVladimir.Kotal@Sun.COM 	if ((rv = kcf_get_hardware_provider(mech.cm_type, &key,
594710444SVladimir.Kotal@Sun.COM 	    CRYPTO_MECH_INVALID, NULL, CHECK_RESTRICT_FALSE, sp->sd_provider,
594810444SVladimir.Kotal@Sun.COM 	    &real_provider, CRYPTO_FG_WRAP)) != CRYPTO_SUCCESS) {
59490Sstevel@tonic-gate 		goto out;
59500Sstevel@tonic-gate 	}
59510Sstevel@tonic-gate 
5952904Smcpowers 	rv = crypto_provider_copyin_mech_param(real_provider,
5953904Smcpowers 	    STRUCT_FADDR(wrap_key, wk_mechanism), &mech, mode, &error);
5954904Smcpowers 
5955904Smcpowers 	if (rv == CRYPTO_NOT_SUPPORTED) {
5956904Smcpowers 		allocated_by_crypto_module = B_TRUE;
59576424Skrishna 		if (!copyin_mech(mode, sp, STRUCT_FADDR(wrap_key, wk_mechanism),
59586424Skrishna 		    &mech, &mech_rctl_bytes, &mech_rctl_chk, &rv, &error)) {
5959904Smcpowers 			goto out;
5960904Smcpowers 		}
5961904Smcpowers 	} else {
5962904Smcpowers 		if (rv != CRYPTO_SUCCESS)
5963904Smcpowers 			goto out;
59640Sstevel@tonic-gate 	}
59650Sstevel@tonic-gate 
59660Sstevel@tonic-gate 	/*
59670Sstevel@tonic-gate 	 * Don't allocate output buffer unless both buffer pointer and
59680Sstevel@tonic-gate 	 * buffer length are not NULL or 0 (length).
59690Sstevel@tonic-gate 	 */
59700Sstevel@tonic-gate 	wrapped_key_buffer = STRUCT_FGETP(wrap_key, wk_wrapped_key);
59710Sstevel@tonic-gate 	if (wrapped_key_buffer == NULL || wrapped_key_len == 0) {
59720Sstevel@tonic-gate 		wrapped_key_len = 0;
59730Sstevel@tonic-gate 	}
59740Sstevel@tonic-gate 
59750Sstevel@tonic-gate 	if (wrapped_key_len > crypto_max_buffer_len) {
59760Sstevel@tonic-gate 		cmn_err(CE_NOTE, "object_wrap_key: buffer greater than %ld "
59770Sstevel@tonic-gate 		    "bytes, pid = %d", crypto_max_buffer_len, curproc->p_pid);
59780Sstevel@tonic-gate 		rv = CRYPTO_ARGUMENTS_BAD;
59790Sstevel@tonic-gate 		goto out;
59800Sstevel@tonic-gate 	}
59810Sstevel@tonic-gate 
59826424Skrishna 	if ((rv = CRYPTO_BUFFER_CHECK(sp, wrapped_key_len,
59836424Skrishna 	    wrapped_key_rctl_chk)) != CRYPTO_SUCCESS) {
59840Sstevel@tonic-gate 		goto out;
59850Sstevel@tonic-gate 	}
59860Sstevel@tonic-gate 
59870Sstevel@tonic-gate 	/* new_wrapped_key_len can be modified by the provider */
59880Sstevel@tonic-gate 	wrapped_key_rctl_bytes = new_wrapped_key_len = wrapped_key_len;
59890Sstevel@tonic-gate 	wrapped_key = kmem_alloc(wrapped_key_len, KM_SLEEP);
59900Sstevel@tonic-gate 
59910Sstevel@tonic-gate 	handle = STRUCT_FGET(wrap_key, wk_object_handle);
59920Sstevel@tonic-gate 	KCF_WRAP_KEY_OPS_PARAMS(&params, KCF_OP_KEY_WRAP,
59930Sstevel@tonic-gate 	    sp->sd_provider_session->ps_session, &mech, NULL, 0, &handle,
59940Sstevel@tonic-gate 	    NULL, 0, NULL, &key, wrapped_key, &new_wrapped_key_len);
59950Sstevel@tonic-gate 
59960Sstevel@tonic-gate 	rv = kcf_submit_request(real_provider, NULL, NULL, &params, B_FALSE);
59970Sstevel@tonic-gate 
59980Sstevel@tonic-gate 	if (rv == CRYPTO_SUCCESS) {
59990Sstevel@tonic-gate 		if (wrapped_key_len != 0 && copyout(wrapped_key,
60000Sstevel@tonic-gate 		    wrapped_key_buffer, new_wrapped_key_len) != 0) {
60010Sstevel@tonic-gate 			error = EFAULT;
60020Sstevel@tonic-gate 		}
60030Sstevel@tonic-gate 		STRUCT_FSET(wrap_key, wk_wrapped_key_len, new_wrapped_key_len);
60040Sstevel@tonic-gate 	}
60050Sstevel@tonic-gate 
60060Sstevel@tonic-gate 	if (rv == CRYPTO_BUFFER_TOO_SMALL) {
60070Sstevel@tonic-gate 		/*
60080Sstevel@tonic-gate 		 * The providers return CRYPTO_BUFFER_TOO_SMALL even for case 1
60090Sstevel@tonic-gate 		 * of section 11.2 of the pkcs11 spec. We catch it here and
60100Sstevel@tonic-gate 		 * provide the correct pkcs11 return value.
60110Sstevel@tonic-gate 		 */
60120Sstevel@tonic-gate 		if (STRUCT_FGETP(wrap_key, wk_wrapped_key) == NULL)
60130Sstevel@tonic-gate 			rv = CRYPTO_SUCCESS;
60140Sstevel@tonic-gate 		STRUCT_FSET(wrap_key, wk_wrapped_key_len, new_wrapped_key_len);
60150Sstevel@tonic-gate 	}
60166424Skrishna 
60170Sstevel@tonic-gate out:
60186424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, mech_rctl_bytes, mech_rctl_chk);
60196424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, key_rctl_bytes, key_rctl_chk);
60206424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, wrapped_key_rctl_bytes,
60216424Skrishna 	    wrapped_key_rctl_chk);
60220Sstevel@tonic-gate 	CRYPTO_SESSION_RELE(sp);
60230Sstevel@tonic-gate 
60240Sstevel@tonic-gate 	crypto_release_minor(cm);
60250Sstevel@tonic-gate 
6026904Smcpowers 	if (real_provider != NULL) {
6027904Smcpowers 		crypto_free_mech(real_provider,
6028904Smcpowers 		    allocated_by_crypto_module, &mech);
6029904Smcpowers 		KCF_PROV_REFRELE(real_provider);
6030904Smcpowers 	}
6031904Smcpowers 
60320Sstevel@tonic-gate 	if (wrapped_key != NULL)
60330Sstevel@tonic-gate 		kmem_free(wrapped_key, wrapped_key_len);
60340Sstevel@tonic-gate 
60350Sstevel@tonic-gate 	free_crypto_key(&key);
60360Sstevel@tonic-gate 
60370Sstevel@tonic-gate 	if (error != 0)
60380Sstevel@tonic-gate 		return (error);
60390Sstevel@tonic-gate 
60400Sstevel@tonic-gate 	STRUCT_FSET(wrap_key, wk_return_value, rv);
60410Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(wrap_key), arg, STRUCT_SIZE(wrap_key)) != 0) {
60420Sstevel@tonic-gate 		return (EFAULT);
60430Sstevel@tonic-gate 	}
60440Sstevel@tonic-gate 	return (0);
60450Sstevel@tonic-gate }
60460Sstevel@tonic-gate 
60470Sstevel@tonic-gate /* ARGSUSED */
60480Sstevel@tonic-gate static int
60490Sstevel@tonic-gate object_unwrap_key(dev_t dev, caddr_t arg, int mode, int *rval)
60500Sstevel@tonic-gate {
60510Sstevel@tonic-gate 	STRUCT_DECL(crypto_object_unwrap_key, unwrap_key);
6052904Smcpowers 	kcf_provider_desc_t *real_provider = NULL;
60530Sstevel@tonic-gate 	kcf_req_params_t params;
60540Sstevel@tonic-gate 	crypto_mechanism_t mech;
60550Sstevel@tonic-gate 	crypto_key_t unwrapping_key;
60560Sstevel@tonic-gate 	crypto_session_id_t session_id;
60570Sstevel@tonic-gate 	crypto_minor_t *cm;
60580Sstevel@tonic-gate 	crypto_session_data_t *sp = NULL;
60590Sstevel@tonic-gate 	crypto_object_id_t handle;
60600Sstevel@tonic-gate 	crypto_object_attribute_t *k_attrs = NULL;
60610Sstevel@tonic-gate 	size_t k_attrs_size;
60620Sstevel@tonic-gate 	size_t mech_rctl_bytes = 0, unwrapping_key_rctl_bytes = 0;
60636424Skrishna 	boolean_t mech_rctl_chk = B_FALSE;
60646424Skrishna 	boolean_t unwrapping_key_rctl_chk = B_FALSE;
60650Sstevel@tonic-gate 	size_t wrapped_key_rctl_bytes = 0, k_attrs_rctl_bytes = 0;
60666424Skrishna 	boolean_t wrapped_key_rctl_chk = B_FALSE;
60676424Skrishna 	boolean_t k_attrs_rctl_chk = B_FALSE;
60680Sstevel@tonic-gate 	size_t wrapped_key_len;
60690Sstevel@tonic-gate 	uchar_t *wrapped_key = NULL;
60700Sstevel@tonic-gate 	int error = 0;
60710Sstevel@tonic-gate 	int rv;
60720Sstevel@tonic-gate 	uint_t count;
60730Sstevel@tonic-gate 	caddr_t uk_attributes;
6074904Smcpowers 	boolean_t allocated_by_crypto_module = B_FALSE;
60750Sstevel@tonic-gate 
60760Sstevel@tonic-gate 	STRUCT_INIT(unwrap_key, mode);
60770Sstevel@tonic-gate 
60780Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
60790Sstevel@tonic-gate 		cmn_err(CE_WARN, "object_unwrap_key: failed holding minor");
60800Sstevel@tonic-gate 		return (ENXIO);
60810Sstevel@tonic-gate 	}
60820Sstevel@tonic-gate 
60830Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(unwrap_key), STRUCT_SIZE(unwrap_key)) != 0) {
60840Sstevel@tonic-gate 		crypto_release_minor(cm);
60850Sstevel@tonic-gate 		return (EFAULT);
60860Sstevel@tonic-gate 	}
60870Sstevel@tonic-gate 
60880Sstevel@tonic-gate 	bzero(&unwrapping_key, sizeof (unwrapping_key));
60890Sstevel@tonic-gate 
60900Sstevel@tonic-gate 	session_id = STRUCT_FGET(unwrap_key, uk_session);
60910Sstevel@tonic-gate 
60920Sstevel@tonic-gate 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv)) {
60930Sstevel@tonic-gate 		goto release_minor;
60940Sstevel@tonic-gate 	}
60950Sstevel@tonic-gate 
6096904Smcpowers 	bcopy(STRUCT_FADDR(unwrap_key, uk_mechanism), &mech.cm_type,
6097904Smcpowers 	    sizeof (crypto_mech_type_t));
6098904Smcpowers 
609910444SVladimir.Kotal@Sun.COM 	/* We need the key length for provider selection so copy it in now. */
610010444SVladimir.Kotal@Sun.COM 	if (!copyin_key(mode, sp, STRUCT_FADDR(unwrap_key, uk_unwrapping_key),
610110444SVladimir.Kotal@Sun.COM 	    &unwrapping_key, &unwrapping_key_rctl_bytes,
610210444SVladimir.Kotal@Sun.COM 	    &unwrapping_key_rctl_chk, &rv, &error)) {
610310444SVladimir.Kotal@Sun.COM 		goto release_minor;
610410444SVladimir.Kotal@Sun.COM 	}
610510444SVladimir.Kotal@Sun.COM 
610610444SVladimir.Kotal@Sun.COM 	if ((rv = kcf_get_hardware_provider(mech.cm_type, &unwrapping_key,
610710444SVladimir.Kotal@Sun.COM 	    CRYPTO_MECH_INVALID, NULL, CHECK_RESTRICT_FALSE, sp->sd_provider,
610810444SVladimir.Kotal@Sun.COM 	    &real_provider, CRYPTO_FG_UNWRAP)) != CRYPTO_SUCCESS) {
61090Sstevel@tonic-gate 		goto release_minor;
61100Sstevel@tonic-gate 	}
61110Sstevel@tonic-gate 
6112904Smcpowers 	rv = crypto_provider_copyin_mech_param(real_provider,
6113904Smcpowers 	    STRUCT_FADDR(unwrap_key, uk_mechanism), &mech, mode, &error);
6114904Smcpowers 
6115904Smcpowers 	if (rv == CRYPTO_NOT_SUPPORTED) {
6116904Smcpowers 		allocated_by_crypto_module = B_TRUE;
61176424Skrishna 		if (!copyin_mech(mode, sp,
61186424Skrishna 		    STRUCT_FADDR(unwrap_key, uk_mechanism),
61196424Skrishna 		    &mech, &mech_rctl_bytes, &mech_rctl_chk, &rv, &error)) {
6120904Smcpowers 			goto release_minor;
6121904Smcpowers 		}
6122904Smcpowers 	} else {
6123904Smcpowers 		if (rv != CRYPTO_SUCCESS)
6124904Smcpowers 			goto release_minor;
61250Sstevel@tonic-gate 	}
61260Sstevel@tonic-gate 
61270Sstevel@tonic-gate 	count = STRUCT_FGET(unwrap_key, uk_count);
61280Sstevel@tonic-gate 	uk_attributes = STRUCT_FGETP(unwrap_key, uk_attributes);
61296424Skrishna 	if (!copyin_attributes(mode, sp, count, uk_attributes, &k_attrs,
61306424Skrishna 	    &k_attrs_size, NULL, &rv, &error, &k_attrs_rctl_bytes,
61316424Skrishna 	    &k_attrs_rctl_chk, B_TRUE)) {
61320Sstevel@tonic-gate 		goto release_minor;
61330Sstevel@tonic-gate 	}
61340Sstevel@tonic-gate 
61350Sstevel@tonic-gate 	wrapped_key_len = STRUCT_FGET(unwrap_key, uk_wrapped_key_len);
61360Sstevel@tonic-gate 	if (wrapped_key_len > crypto_max_buffer_len) {
61370Sstevel@tonic-gate 		cmn_err(CE_NOTE, "object_unwrap_key: buffer greater than %ld "
61380Sstevel@tonic-gate 		    "bytes, pid = %d", crypto_max_buffer_len, curproc->p_pid);
61390Sstevel@tonic-gate 		rv = CRYPTO_ARGUMENTS_BAD;
61400Sstevel@tonic-gate 		goto release_minor;
61410Sstevel@tonic-gate 	}
61420Sstevel@tonic-gate 
61436424Skrishna 	if ((rv = CRYPTO_BUFFER_CHECK(sp, wrapped_key_len,
61446424Skrishna 	    wrapped_key_rctl_chk)) != CRYPTO_SUCCESS) {
61450Sstevel@tonic-gate 		goto release_minor;
61460Sstevel@tonic-gate 	}
61470Sstevel@tonic-gate 	wrapped_key_rctl_bytes = wrapped_key_len;
61480Sstevel@tonic-gate 	wrapped_key = kmem_alloc(wrapped_key_len, KM_SLEEP);
61490Sstevel@tonic-gate 
61500Sstevel@tonic-gate 	if (wrapped_key_len != 0 && copyin(STRUCT_FGETP(unwrap_key,
61510Sstevel@tonic-gate 	    uk_wrapped_key), wrapped_key, wrapped_key_len) != 0) {
61520Sstevel@tonic-gate 		error = EFAULT;
61530Sstevel@tonic-gate 		goto release_minor;
61540Sstevel@tonic-gate 	}
61550Sstevel@tonic-gate 
61560Sstevel@tonic-gate 	/* wrapped_key_len is not modified by the unwrap operation */
61570Sstevel@tonic-gate 	KCF_WRAP_KEY_OPS_PARAMS(&params, KCF_OP_KEY_UNWRAP,
61580Sstevel@tonic-gate 	    sp->sd_provider_session->ps_session, &mech, k_attrs, count, &handle,
61590Sstevel@tonic-gate 	    NULL, 0, NULL, &unwrapping_key, wrapped_key, &wrapped_key_len);
61600Sstevel@tonic-gate 
61610Sstevel@tonic-gate 	rv = kcf_submit_request(real_provider, NULL, NULL, &params, B_FALSE);
61620Sstevel@tonic-gate 
61630Sstevel@tonic-gate 	if (rv == CRYPTO_SUCCESS)
61640Sstevel@tonic-gate 		STRUCT_FSET(unwrap_key, uk_object_handle, handle);
61650Sstevel@tonic-gate 
61660Sstevel@tonic-gate release_minor:
61676424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, mech_rctl_bytes, mech_rctl_chk);
61686424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, unwrapping_key_rctl_bytes,
61696424Skrishna 	    unwrapping_key_rctl_chk);
61706424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, wrapped_key_rctl_bytes,
61716424Skrishna 	    wrapped_key_rctl_chk);
61726424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, k_attrs_rctl_bytes,
61736424Skrishna 	    k_attrs_rctl_chk);
61740Sstevel@tonic-gate 
61750Sstevel@tonic-gate 	if (k_attrs != NULL)
61760Sstevel@tonic-gate 		kmem_free(k_attrs, k_attrs_size);
61770Sstevel@tonic-gate 
61780Sstevel@tonic-gate 	if (wrapped_key != NULL)
61790Sstevel@tonic-gate 		kmem_free(wrapped_key, wrapped_key_len);
61800Sstevel@tonic-gate 
61810Sstevel@tonic-gate 	free_crypto_key(&unwrapping_key);
61820Sstevel@tonic-gate 
61830Sstevel@tonic-gate 	if (error != 0)
61840Sstevel@tonic-gate 		goto out;
61850Sstevel@tonic-gate 
61860Sstevel@tonic-gate 	STRUCT_FSET(unwrap_key, uk_return_value, rv);
61870Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(unwrap_key), arg,
61880Sstevel@tonic-gate 	    STRUCT_SIZE(unwrap_key)) != 0) {
61890Sstevel@tonic-gate 		if (rv == CRYPTO_SUCCESS) {
61900Sstevel@tonic-gate 			KCF_WRAP_OBJECT_OPS_PARAMS(&params,
61910Sstevel@tonic-gate 			    KCF_OP_OBJECT_DESTROY,
61920Sstevel@tonic-gate 			    sp->sd_provider_session->ps_session, handle,
61930Sstevel@tonic-gate 			    NULL, 0, NULL, 0, NULL, NULL, 0, NULL);
61940Sstevel@tonic-gate 
61950Sstevel@tonic-gate 			(void) kcf_submit_request(real_provider, NULL,
61960Sstevel@tonic-gate 			    NULL, &params, B_FALSE);
61970Sstevel@tonic-gate 
61980Sstevel@tonic-gate 			error = EFAULT;
61990Sstevel@tonic-gate 		}
62000Sstevel@tonic-gate 	}
62010Sstevel@tonic-gate out:
62026424Skrishna 	CRYPTO_SESSION_RELE(sp);
62030Sstevel@tonic-gate 	crypto_release_minor(cm);
6204904Smcpowers 
6205904Smcpowers 	if (real_provider != NULL) {
6206904Smcpowers 		crypto_free_mech(real_provider,
6207904Smcpowers 		    allocated_by_crypto_module, &mech);
6208904Smcpowers 		KCF_PROV_REFRELE(real_provider);
6209904Smcpowers 	}
6210904Smcpowers 
62110Sstevel@tonic-gate 	return (error);
62120Sstevel@tonic-gate }
62130Sstevel@tonic-gate 
62140Sstevel@tonic-gate /* ARGSUSED */
62150Sstevel@tonic-gate static int
62160Sstevel@tonic-gate object_derive_key(dev_t dev, caddr_t arg, int mode, int *rval)
62170Sstevel@tonic-gate {
62180Sstevel@tonic-gate 	STRUCT_DECL(crypto_derive_key, derive_key);
6219904Smcpowers 	kcf_provider_desc_t *real_provider = NULL;
62200Sstevel@tonic-gate 	kcf_req_params_t params;
62210Sstevel@tonic-gate 	crypto_object_attribute_t *k_attrs = NULL;
62220Sstevel@tonic-gate 	crypto_mechanism_t mech;
62230Sstevel@tonic-gate 	crypto_key_t base_key;
62240Sstevel@tonic-gate 	crypto_session_id_t session_id;
62250Sstevel@tonic-gate 	crypto_minor_t *cm;
62260Sstevel@tonic-gate 	crypto_session_data_t *sp = NULL;
62270Sstevel@tonic-gate 	crypto_object_id_t handle;
62280Sstevel@tonic-gate 	size_t k_attrs_size;
62290Sstevel@tonic-gate 	size_t key_rctl_bytes = 0, mech_rctl_bytes = 0;
62306424Skrishna 	boolean_t mech_rctl_chk = B_FALSE;
62316424Skrishna 	boolean_t key_rctl_chk = B_FALSE;
62320Sstevel@tonic-gate 	size_t attributes_rctl_bytes = 0;
62336424Skrishna 	boolean_t attributes_rctl_chk = B_FALSE;
62340Sstevel@tonic-gate 	caddr_t attributes;
62350Sstevel@tonic-gate 	uint_t count;
62360Sstevel@tonic-gate 	int error = 0;
62370Sstevel@tonic-gate 	int rv;
6238904Smcpowers 	boolean_t allocated_by_crypto_module = B_FALSE;
6239904Smcpowers 	boolean_t please_destroy_object = B_FALSE;
62400Sstevel@tonic-gate 
62410Sstevel@tonic-gate 	STRUCT_INIT(derive_key, mode);
62420Sstevel@tonic-gate 
62430Sstevel@tonic-gate 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
62440Sstevel@tonic-gate 		cmn_err(CE_WARN, "object_derive_key: failed holding minor");
62450Sstevel@tonic-gate 		return (ENXIO);
62460Sstevel@tonic-gate 	}
62470Sstevel@tonic-gate 
62480Sstevel@tonic-gate 	if (copyin(arg, STRUCT_BUF(derive_key), STRUCT_SIZE(derive_key)) != 0) {
62490Sstevel@tonic-gate 		crypto_release_minor(cm);
62500Sstevel@tonic-gate 		return (EFAULT);
62510Sstevel@tonic-gate 	}
62520Sstevel@tonic-gate 
62530Sstevel@tonic-gate 	bzero(&base_key, sizeof (base_key));
62540Sstevel@tonic-gate 
62550Sstevel@tonic-gate 	session_id = STRUCT_FGET(derive_key, dk_session);
62560Sstevel@tonic-gate 
62570Sstevel@tonic-gate 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv)) {
62580Sstevel@tonic-gate 		goto release_minor;
62590Sstevel@tonic-gate 	}
62600Sstevel@tonic-gate 
6261904Smcpowers 	bcopy(STRUCT_FADDR(derive_key, dk_mechanism), &mech.cm_type,
6262904Smcpowers 	    sizeof (crypto_mech_type_t));
6263904Smcpowers 
626410444SVladimir.Kotal@Sun.COM 	/* We need the key length for provider selection so copy it in now. */
626510444SVladimir.Kotal@Sun.COM 	if (!copyin_key(mode, sp, STRUCT_FADDR(derive_key, dk_base_key),
626610444SVladimir.Kotal@Sun.COM 	    &base_key, &key_rctl_bytes, &key_rctl_chk, &rv, &error)) {
626710444SVladimir.Kotal@Sun.COM 		goto release_minor;
626810444SVladimir.Kotal@Sun.COM 	}
626910444SVladimir.Kotal@Sun.COM 
627010444SVladimir.Kotal@Sun.COM 	if ((rv = kcf_get_hardware_provider(mech.cm_type, &base_key,
627110444SVladimir.Kotal@Sun.COM 	    CRYPTO_MECH_INVALID, NULL, CHECK_RESTRICT_FALSE, sp->sd_provider,
627210444SVladimir.Kotal@Sun.COM 	    &real_provider, CRYPTO_FG_DERIVE)) != CRYPTO_SUCCESS) {
62730Sstevel@tonic-gate 		goto release_minor;
62740Sstevel@tonic-gate 	}
62750Sstevel@tonic-gate 
6276904Smcpowers 	rv = crypto_provider_copyin_mech_param(real_provider,
6277904Smcpowers 	    STRUCT_FADDR(derive_key, dk_mechanism), &mech, mode, &error);
6278904Smcpowers 
6279904Smcpowers 	if (rv == CRYPTO_NOT_SUPPORTED) {
6280904Smcpowers 		allocated_by_crypto_module = B_TRUE;
62816424Skrishna 		if (!copyin_mech(mode, sp,
62826424Skrishna 		    STRUCT_FADDR(derive_key, dk_mechanism),
62836424Skrishna 		    &mech, &mech_rctl_bytes, &mech_rctl_chk, &rv, &error)) {
6284904Smcpowers 			goto release_minor;
6285904Smcpowers 		}
6286904Smcpowers 	} else {
6287904Smcpowers 		if (rv != CRYPTO_SUCCESS)
6288904Smcpowers 			goto release_minor;
62890Sstevel@tonic-gate 	}
62900Sstevel@tonic-gate 
62910Sstevel@tonic-gate 	count = STRUCT_FGET(derive_key, dk_count);
62920Sstevel@tonic-gate 
62930Sstevel@tonic-gate 	attributes = STRUCT_FGETP(derive_key, dk_attributes);
62946424Skrishna 	if (!copyin_attributes(mode, sp, count, attributes, &k_attrs,
62953916Skrishna 	    &k_attrs_size, NULL, &rv, &error,
62966424Skrishna 	    &attributes_rctl_bytes, &attributes_rctl_chk, B_TRUE)) {
62970Sstevel@tonic-gate 		goto release_minor;
62980Sstevel@tonic-gate 	}
62990Sstevel@tonic-gate 
63000Sstevel@tonic-gate 	KCF_WRAP_KEY_OPS_PARAMS(&params, KCF_OP_KEY_DERIVE,
63010Sstevel@tonic-gate 	    sp->sd_provider_session->ps_session, &mech, k_attrs, count,
63020Sstevel@tonic-gate 	    &handle, NULL, 0, NULL, &base_key, NULL, NULL);
63030Sstevel@tonic-gate 
63040Sstevel@tonic-gate 	rv = kcf_submit_request(real_provider, NULL, NULL, &params, B_FALSE);
63050Sstevel@tonic-gate 
6306904Smcpowers 	if (rv == CRYPTO_SUCCESS) {
63070Sstevel@tonic-gate 		STRUCT_FSET(derive_key, dk_object_handle, handle);
63080Sstevel@tonic-gate 
6309904Smcpowers 		rv = crypto_provider_copyout_mech_param(real_provider,
6310904Smcpowers 		    &mech, STRUCT_FADDR(derive_key, dk_mechanism),
6311904Smcpowers 		    mode, &error);
6312904Smcpowers 
6313904Smcpowers 		if (rv == CRYPTO_NOT_SUPPORTED) {
6314904Smcpowers 			rv = CRYPTO_SUCCESS;
6315904Smcpowers 			goto release_minor;
6316904Smcpowers 		}
6317904Smcpowers 
6318904Smcpowers 		if (rv != CRYPTO_SUCCESS)
6319904Smcpowers 			please_destroy_object = B_TRUE;
6320904Smcpowers 	}
6321904Smcpowers 
63220Sstevel@tonic-gate release_minor:
63236424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, mech_rctl_bytes, mech_rctl_chk);
63246424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, key_rctl_bytes, key_rctl_chk);
63256424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, attributes_rctl_bytes,
63266424Skrishna 	    attributes_rctl_chk);
63270Sstevel@tonic-gate 
63280Sstevel@tonic-gate 	if (k_attrs != NULL)
63290Sstevel@tonic-gate 		kmem_free(k_attrs, k_attrs_size);
63300Sstevel@tonic-gate 
63310Sstevel@tonic-gate 	free_crypto_key(&base_key);
63320Sstevel@tonic-gate 
63330Sstevel@tonic-gate 	if (error != 0)
63340Sstevel@tonic-gate 		goto out;
63350Sstevel@tonic-gate 
63360Sstevel@tonic-gate 	STRUCT_FSET(derive_key, dk_return_value, rv);
63370Sstevel@tonic-gate 	if (copyout(STRUCT_BUF(derive_key), arg,
63380Sstevel@tonic-gate 	    STRUCT_SIZE(derive_key)) != 0) {
63390Sstevel@tonic-gate 		if (rv == CRYPTO_SUCCESS) {
6340904Smcpowers 			please_destroy_object = B_TRUE;
63410Sstevel@tonic-gate 			error = EFAULT;
63420Sstevel@tonic-gate 		}
63430Sstevel@tonic-gate 	}
63440Sstevel@tonic-gate out:
6345904Smcpowers 	if (please_destroy_object) {
6346904Smcpowers 		KCF_WRAP_OBJECT_OPS_PARAMS(&params, KCF_OP_OBJECT_DESTROY,
6347904Smcpowers 		    sp->sd_provider_session->ps_session, handle,
6348904Smcpowers 		    NULL, 0, NULL, 0, NULL, NULL, 0, NULL);
6349904Smcpowers 
6350904Smcpowers 		(void) kcf_submit_request(real_provider, NULL,
6351904Smcpowers 		    NULL, &params, B_FALSE);
6352904Smcpowers 	}
6353904Smcpowers 
63546424Skrishna 	CRYPTO_SESSION_RELE(sp);
63550Sstevel@tonic-gate 	crypto_release_minor(cm);
6356904Smcpowers 
6357904Smcpowers 	if (real_provider != NULL) {
6358904Smcpowers 		crypto_free_mech(real_provider,
6359904Smcpowers 		    allocated_by_crypto_module, &mech);
6360904Smcpowers 		KCF_PROV_REFRELE(real_provider);
6361904Smcpowers 	}
63620Sstevel@tonic-gate 	return (error);
63630Sstevel@tonic-gate }
63640Sstevel@tonic-gate 
63650Sstevel@tonic-gate /* ARGSUSED */
63660Sstevel@tonic-gate static int
63674219Smcpowers nostore_derive_key(dev_t dev, caddr_t arg, int mode, int *rval)
63684219Smcpowers {
63694219Smcpowers 	STRUCT_DECL(crypto_nostore_derive_key, derive_key);
63704219Smcpowers 	/* LINTED E_FUNC_SET_NOT_USED */
63714219Smcpowers 	STRUCT_DECL(crypto_object_attribute, oa);
63724219Smcpowers 	kcf_provider_desc_t *real_provider = NULL;
63734219Smcpowers 	kcf_req_params_t params;
63744219Smcpowers 	crypto_object_attribute_t *k_in_attrs = NULL;
63754219Smcpowers 	crypto_object_attribute_t *k_out_attrs = NULL;
63764219Smcpowers 	crypto_mechanism_t mech;
63774219Smcpowers 	crypto_key_t base_key;
63784219Smcpowers 	crypto_session_id_t session_id;
63794219Smcpowers 	crypto_minor_t *cm;
63804219Smcpowers 	crypto_session_data_t *sp = NULL;
63814219Smcpowers 	size_t k_in_attrs_size, k_out_attrs_size;
63824219Smcpowers 	size_t key_rctl_bytes = 0, mech_rctl_bytes = 0;
63836424Skrishna 	boolean_t mech_rctl_chk = B_FALSE;
63846424Skrishna 	boolean_t key_rctl_chk = B_FALSE;
63854219Smcpowers 	size_t in_attributes_rctl_bytes = 0;
63864219Smcpowers 	size_t out_attributes_rctl_bytes = 0;
63876424Skrishna 	boolean_t in_attributes_rctl_chk = B_FALSE;
63886424Skrishna 	boolean_t out_attributes_rctl_chk = B_FALSE;
63894219Smcpowers 	caddr_t in_attributes, out_attributes;
63904219Smcpowers 	uint_t in_count, out_count;
63914219Smcpowers 	int error = 0;
63924219Smcpowers 	int rv;
63934219Smcpowers 	boolean_t allocated_by_crypto_module = B_FALSE;
63944219Smcpowers 	caddr_t u_attrs = NULL;
63954219Smcpowers 
63964219Smcpowers 	STRUCT_INIT(derive_key, mode);
63974219Smcpowers 	STRUCT_INIT(oa, mode);
63984219Smcpowers 
63994219Smcpowers 	if ((cm = crypto_hold_minor(getminor(dev))) == NULL) {
64004219Smcpowers 		cmn_err(CE_WARN, "nostore_derive_key: failed holding minor");
64014219Smcpowers 		return (ENXIO);
64024219Smcpowers 	}
64034219Smcpowers 
64044219Smcpowers 	if (copyin(arg, STRUCT_BUF(derive_key), STRUCT_SIZE(derive_key)) != 0) {
64054219Smcpowers 		crypto_release_minor(cm);
64064219Smcpowers 		return (EFAULT);
64074219Smcpowers 	}
64084219Smcpowers 
64094219Smcpowers 	bzero(&base_key, sizeof (base_key));
64104219Smcpowers 
64114219Smcpowers 	session_id = STRUCT_FGET(derive_key, ndk_session);
64124219Smcpowers 
64134219Smcpowers 	if (!get_session_ptr(session_id, cm, &sp, &error, &rv)) {
64144219Smcpowers 		goto release_minor;
64154219Smcpowers 	}
64164219Smcpowers 
64174219Smcpowers 	bcopy(STRUCT_FADDR(derive_key, ndk_mechanism), &mech.cm_type,
64184219Smcpowers 	    sizeof (crypto_mech_type_t));
64194219Smcpowers 
642010444SVladimir.Kotal@Sun.COM 	/* We need the key length for provider selection so copy it in now. */
642110444SVladimir.Kotal@Sun.COM 	if (!copyin_key(mode, sp, STRUCT_FADDR(derive_key, ndk_base_key),
642210444SVladimir.Kotal@Sun.COM 	    &base_key, &key_rctl_bytes, &key_rctl_chk, &rv, &error)) {
642310444SVladimir.Kotal@Sun.COM 		goto release_minor;
642410444SVladimir.Kotal@Sun.COM 	}
642510444SVladimir.Kotal@Sun.COM 
642610444SVladimir.Kotal@Sun.COM 	if ((rv = kcf_get_hardware_provider(mech.cm_type, &base_key,
642710444SVladimir.Kotal@Sun.COM 	    CRYPTO_MECH_INVALID, NULL, CHECK_RESTRICT_FALSE, sp->sd_provider,
642810444SVladimir.Kotal@Sun.COM 	    &real_provider, CRYPTO_FG_DERIVE)) != CRYPTO_SUCCESS) {
64294219Smcpowers 		goto release_minor;
64304219Smcpowers 	}
64314219Smcpowers 
64324219Smcpowers 	rv = crypto_provider_copyin_mech_param(real_provider,
64334219Smcpowers 	    STRUCT_FADDR(derive_key, ndk_mechanism), &mech, mode, &error);
64344219Smcpowers 
64354219Smcpowers 	if (rv == CRYPTO_NOT_SUPPORTED) {
64364219Smcpowers 		allocated_by_crypto_module = B_TRUE;
64376424Skrishna 		if (!copyin_mech(mode, sp,
64386424Skrishna 		    STRUCT_FADDR(derive_key, ndk_mechanism),
64396424Skrishna 		    &mech, &mech_rctl_bytes, &mech_rctl_chk, &rv, &error)) {
64404219Smcpowers 			goto release_minor;
64414219Smcpowers 		}
64424219Smcpowers 	} else {
64434219Smcpowers 		if (rv != CRYPTO_SUCCESS)
64444219Smcpowers 			goto release_minor;
64454219Smcpowers 	}
64464219Smcpowers 
64474219Smcpowers 	in_count = STRUCT_FGET(derive_key, ndk_in_count);
64484219Smcpowers 	out_count = STRUCT_FGET(derive_key, ndk_out_count);
64494219Smcpowers 
64504219Smcpowers 	in_attributes = STRUCT_FGETP(derive_key, ndk_in_attributes);
64516424Skrishna 	if (!copyin_attributes(mode, sp, in_count, in_attributes, &k_in_attrs,
64524219Smcpowers 	    &k_in_attrs_size, NULL, &rv, &error, &in_attributes_rctl_bytes,
64536424Skrishna 	    &in_attributes_rctl_chk, B_TRUE)) {
64544219Smcpowers 		goto release_minor;
64554219Smcpowers 	}
64564219Smcpowers 
64574219Smcpowers 	out_attributes = STRUCT_FGETP(derive_key, ndk_out_attributes);
64586424Skrishna 	if (!copyin_attributes(mode, sp, out_count, out_attributes,
64596424Skrishna 	    &k_out_attrs, &k_out_attrs_size, &u_attrs, &rv, &error,
64606424Skrishna 	    &out_attributes_rctl_bytes,
64616424Skrishna 	    &out_attributes_rctl_chk, B_FALSE)) {
64624219Smcpowers 		goto release_minor;
64634219Smcpowers 	}
64644219Smcpowers 
64654219Smcpowers 	KCF_WRAP_NOSTORE_KEY_OPS_PARAMS(&params, KCF_OP_KEY_DERIVE,
64664219Smcpowers 	    sp->sd_provider_session->ps_session, &mech, k_in_attrs, in_count,
64674219Smcpowers 	    NULL, 0, &base_key, k_out_attrs, out_count, NULL, 0);
64684219Smcpowers 
64694219Smcpowers 	rv = kcf_submit_request(real_provider, NULL, NULL, &params, B_FALSE);
64704219Smcpowers 
64714219Smcpowers 	if (rv == CRYPTO_SUCCESS) {
64724219Smcpowers 		rv = crypto_provider_copyout_mech_param(real_provider,
64734219Smcpowers 		    &mech, STRUCT_FADDR(derive_key, ndk_mechanism),
64744219Smcpowers 		    mode, &error);
64754219Smcpowers 
64764219Smcpowers 		if (rv == CRYPTO_NOT_SUPPORTED) {
64774219Smcpowers 			rv = CRYPTO_SUCCESS;
64784219Smcpowers 		}
64794219Smcpowers 		/* copyout the derived secret */
64804219Smcpowers 		if (copyout_attributes(mode, out_attributes, out_count,
64814219Smcpowers 		    k_out_attrs, u_attrs) != 0)
64824219Smcpowers 			error = EFAULT;
64834219Smcpowers 	}
64844219Smcpowers 
64854219Smcpowers release_minor:
64866424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, mech_rctl_bytes, mech_rctl_chk);
64876424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, key_rctl_bytes, key_rctl_chk);
64886424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, in_attributes_rctl_bytes,
64896424Skrishna 	    in_attributes_rctl_chk);
64906424Skrishna 	CRYPTO_DECREMENT_RCTL_SESSION(sp, out_attributes_rctl_bytes,
64916424Skrishna 	    out_attributes_rctl_chk);
64924219Smcpowers 
64934219Smcpowers 	if (k_in_attrs != NULL)
64944219Smcpowers 		kmem_free(k_in_attrs, k_in_attrs_size);
64954219Smcpowers 	if (k_out_attrs != NULL) {
64964219Smcpowers 		bzero(k_out_attrs, k_out_attrs_size);
64974219Smcpowers 		kmem_free(k_out_attrs, k_out_attrs_size);
64984219Smcpowers 	}
64994219Smcpowers 
65004219Smcpowers 	if (u_attrs != NULL)
65014219Smcpowers 		kmem_free(u_attrs, out_count * STRUCT_SIZE(oa));
65024219Smcpowers 
65034219Smcpowers 	free_crypto_key(&base_key);
65044219Smcpowers 
65054219Smcpowers 	if (error != 0)
65064219Smcpowers 		goto out;
65074219Smcpowers 
65084219Smcpowers 	STRUCT_FSET(derive_key, ndk_return_value, rv);
65094219Smcpowers 	if (copyout(STRUCT_BUF(derive_key), arg,
65104219Smcpowers 	    STRUCT_SIZE(derive_key)) != 0) {
65114219Smcpowers 		error = EFAULT;
65124219Smcpowers 	}
65134219Smcpowers out:
65146424Skrishna 	CRYPTO_SESSION_RELE(sp);
65154219Smcpowers 	crypto_release_minor(cm);
65164219Smcpowers 
65174219Smcpowers 	if (real_provider != NULL) {
65184219Smcpowers 		crypto_free_mech(real_provider,
65194219Smcpowers 		    allocated_by_crypto_module, &mech);
65204219Smcpowers 		KCF_PROV_REFRELE(real_provider);
65214219Smcpowers 	}
65224219Smcpowers 	return (error);
65234219Smcpowers }
65244219Smcpowers 
65254219Smcpowers /* ARGSUSED */
65264219Smcpowers static int
65270Sstevel@tonic-gate crypto_ioctl(dev_t dev, int cmd, intptr_t arg, int mode, cred_t *c,
65280Sstevel@tonic-gate     int *rval)
65290Sstevel@tonic-gate {
65300Sstevel@tonic-gate #define	ARG	((caddr_t)arg)
65310Sstevel@tonic-gate 
65320Sstevel@tonic-gate 	switch (cmd) {
65330Sstevel@tonic-gate 	case CRYPTO_GET_FUNCTION_LIST:
65340Sstevel@tonic-gate 		return (get_function_list(dev, ARG, mode, rval));
65350Sstevel@tonic-gate 
65360Sstevel@tonic-gate 	case CRYPTO_GET_MECHANISM_NUMBER:
65370Sstevel@tonic-gate 		return (get_mechanism_number(dev, ARG, mode, rval));
65380Sstevel@tonic-gate 
65398313SDina.Nimeh@Sun.Com 	case CRYPTO_GET_MECHANISM_LIST:
65408313SDina.Nimeh@Sun.Com 		return (get_mechanism_list(dev, ARG, mode, rval));
65418313SDina.Nimeh@Sun.Com 
65428313SDina.Nimeh@Sun.Com 	case CRYPTO_GET_ALL_MECHANISM_INFO:
65438313SDina.Nimeh@Sun.Com 		return (get_all_mechanism_info(dev, ARG, mode, rval));
65448313SDina.Nimeh@Sun.Com 
65450Sstevel@tonic-gate 	case CRYPTO_GET_PROVIDER_LIST:
65460Sstevel@tonic-gate 		return (get_provider_list(dev, ARG, mode, rval));
65470Sstevel@tonic-gate 
65480Sstevel@tonic-gate 	case CRYPTO_GET_PROVIDER_INFO:
65490Sstevel@tonic-gate 		return (get_provider_info(dev, ARG, mode, rval));
65500Sstevel@tonic-gate 
65510Sstevel@tonic-gate 	case CRYPTO_GET_PROVIDER_MECHANISMS:
65520Sstevel@tonic-gate 		return (get_provider_mechanisms(dev, ARG, mode, rval));
65530Sstevel@tonic-gate 
65540Sstevel@tonic-gate 	case CRYPTO_GET_PROVIDER_MECHANISM_INFO:
65550Sstevel@tonic-gate 		return (get_provider_mechanism_info(dev, ARG, mode, rval));
65560Sstevel@tonic-gate 
65570Sstevel@tonic-gate 	case CRYPTO_OPEN_SESSION:
65580Sstevel@tonic-gate 		return (open_session(dev, ARG, mode, rval));
65590Sstevel@tonic-gate 
65600Sstevel@tonic-gate 	case CRYPTO_CLOSE_SESSION:
65610Sstevel@tonic-gate 		return (close_session(dev, ARG, mode, rval));
65620Sstevel@tonic-gate 
65630Sstevel@tonic-gate 	case CRYPTO_ENCRYPT_INIT:
65640Sstevel@tonic-gate 		return (encrypt_init(dev, ARG, mode, rval));
65650Sstevel@tonic-gate 
65660Sstevel@tonic-gate 	case CRYPTO_DECRYPT_INIT:
65670Sstevel@tonic-gate 		return (decrypt_init(dev, ARG, mode, rval));
65680Sstevel@tonic-gate 
65690Sstevel@tonic-gate 	case CRYPTO_ENCRYPT:
65700Sstevel@tonic-gate 		return (encrypt(dev, ARG, mode, rval));
65710Sstevel@tonic-gate 
65720Sstevel@tonic-gate 	case CRYPTO_DECRYPT:
65730Sstevel@tonic-gate 		return (decrypt(dev, ARG, mode, rval));
65740Sstevel@tonic-gate 
65750Sstevel@tonic-gate 	case CRYPTO_ENCRYPT_UPDATE:
65760Sstevel@tonic-gate 		return (encrypt_update(dev, ARG, mode, rval));
65770Sstevel@tonic-gate 
65780Sstevel@tonic-gate 	case CRYPTO_DECRYPT_UPDATE:
65790Sstevel@tonic-gate 		return (decrypt_update(dev, ARG, mode, rval));
65800Sstevel@tonic-gate 
65810Sstevel@tonic-gate 	case CRYPTO_ENCRYPT_FINAL:
65820Sstevel@tonic-gate 		return (encrypt_final(dev, ARG, mode, rval));
65830Sstevel@tonic-gate 
65840Sstevel@tonic-gate 	case CRYPTO_DECRYPT_FINAL:
65850Sstevel@tonic-gate 		return (decrypt_final(dev, ARG, mode, rval));
65860Sstevel@tonic-gate 
65870Sstevel@tonic-gate 	case CRYPTO_DIGEST_INIT:
65880Sstevel@tonic-gate 		return (digest_init(dev, ARG, mode, rval));
65890Sstevel@tonic-gate 
65900Sstevel@tonic-gate 	case CRYPTO_DIGEST:
65910Sstevel@tonic-gate 		return (digest(dev, ARG, mode, rval));
65920Sstevel@tonic-gate 
65930Sstevel@tonic-gate 	case CRYPTO_DIGEST_UPDATE:
65940Sstevel@tonic-gate 		return (digest_update(dev, ARG, mode, rval));
65950Sstevel@tonic-gate 
65960Sstevel@tonic-gate 	case CRYPTO_DIGEST_KEY:
65970Sstevel@tonic-gate 		return (digest_key(dev, ARG, mode, rval));
65980Sstevel@tonic-gate 
65990Sstevel@tonic-gate 	case CRYPTO_DIGEST_FINAL:
66000Sstevel@tonic-gate 		return (digest_final(dev, ARG, mode, rval));
66010Sstevel@tonic-gate 
66020Sstevel@tonic-gate 	case CRYPTO_SIGN_INIT:
66030Sstevel@tonic-gate 		return (sign_init(dev, ARG, mode, rval));
66040Sstevel@tonic-gate 
66050Sstevel@tonic-gate 	case CRYPTO_SIGN:
66060Sstevel@tonic-gate 		return (sign(dev, ARG, mode, rval));
66070Sstevel@tonic-gate 
66080Sstevel@tonic-gate 	case CRYPTO_SIGN_UPDATE:
66090Sstevel@tonic-gate 		return (sign_update(dev, ARG, mode, rval));
66100Sstevel@tonic-gate 
66110Sstevel@tonic-gate 	case CRYPTO_SIGN_FINAL:
66120Sstevel@tonic-gate 		return (sign_final(dev, ARG, mode, rval));
66130Sstevel@tonic-gate 
66140Sstevel@tonic-gate 	case CRYPTO_SIGN_RECOVER_INIT:
66150Sstevel@tonic-gate 		return (sign_recover_init(dev, ARG, mode, rval));
66160Sstevel@tonic-gate 
66170Sstevel@tonic-gate 	case CRYPTO_SIGN_RECOVER:
66180Sstevel@tonic-gate 		return (sign_recover(dev, ARG, mode, rval));
66190Sstevel@tonic-gate 
66200Sstevel@tonic-gate 	case CRYPTO_VERIFY_INIT:
66210Sstevel@tonic-gate 		return (verify_init(dev, ARG, mode, rval));
66220Sstevel@tonic-gate 
66230Sstevel@tonic-gate 	case CRYPTO_VERIFY:
66240Sstevel@tonic-gate 		return (verify(dev, ARG, mode, rval));
66250Sstevel@tonic-gate 
66260Sstevel@tonic-gate 	case CRYPTO_VERIFY_UPDATE:
66270Sstevel@tonic-gate 		return (verify_update(dev, ARG, mode, rval));
66280Sstevel@tonic-gate 
66290Sstevel@tonic-gate 	case CRYPTO_VERIFY_FINAL:
66300Sstevel@tonic-gate 		return (verify_final(dev, ARG, mode, rval));
66310Sstevel@tonic-gate 
66320Sstevel@tonic-gate 	case CRYPTO_VERIFY_RECOVER_INIT:
66330Sstevel@tonic-gate 		return (verify_recover_init(dev, ARG, mode, rval));
66340Sstevel@tonic-gate 
66350Sstevel@tonic-gate 	case CRYPTO_VERIFY_RECOVER:
66360Sstevel@tonic-gate 		return (verify_recover(dev, ARG, mode, rval));
66370Sstevel@tonic-gate 
66380Sstevel@tonic-gate 	case CRYPTO_SET_PIN:
66390Sstevel@tonic-gate 		return (set_pin(dev, ARG, mode, rval));
66400Sstevel@tonic-gate 
66410Sstevel@tonic-gate 	case CRYPTO_LOGIN:
66420Sstevel@tonic-gate 		return (login(dev, ARG, mode, rval));
66430Sstevel@tonic-gate 
66440Sstevel@tonic-gate 	case CRYPTO_LOGOUT:
66450Sstevel@tonic-gate 		return (logout(dev, ARG, mode, rval));
66460Sstevel@tonic-gate 
66470Sstevel@tonic-gate 	case CRYPTO_SEED_RANDOM:
66480Sstevel@tonic-gate 		return (seed_random(dev, ARG, mode, rval));
66490Sstevel@tonic-gate 
66500Sstevel@tonic-gate 	case CRYPTO_GENERATE_RANDOM:
66510Sstevel@tonic-gate 		return (generate_random(dev, ARG, mode, rval));
66520Sstevel@tonic-gate 
66530Sstevel@tonic-gate 	case CRYPTO_OBJECT_CREATE:
66540Sstevel@tonic-gate 		return (object_create(dev, ARG, mode, rval));
66550Sstevel@tonic-gate 
66560Sstevel@tonic-gate 	case CRYPTO_OBJECT_COPY:
66570Sstevel@tonic-gate 		return (object_copy(dev, ARG, mode, rval));
66580Sstevel@tonic-gate 
66590Sstevel@tonic-gate 	case CRYPTO_OBJECT_DESTROY:
66600Sstevel@tonic-gate 		return (object_destroy(dev, ARG, mode, rval));
66610Sstevel@tonic-gate 
66620Sstevel@tonic-gate 	case CRYPTO_OBJECT_GET_ATTRIBUTE_VALUE:
66630Sstevel@tonic-gate 		return (object_get_attribute_value(dev, ARG, mode, rval));
66640Sstevel@tonic-gate 
66650Sstevel@tonic-gate 	case CRYPTO_OBJECT_GET_SIZE:
66660Sstevel@tonic-gate 		return (object_get_size(dev, ARG, mode, rval));
66670Sstevel@tonic-gate 
66680Sstevel@tonic-gate 	case CRYPTO_OBJECT_SET_ATTRIBUTE_VALUE:
66690Sstevel@tonic-gate 		return (object_set_attribute_value(dev, ARG, mode, rval));
66700Sstevel@tonic-gate 
66710Sstevel@tonic-gate 	case CRYPTO_OBJECT_FIND_INIT:
66720Sstevel@tonic-gate 		return (object_find_init(dev, ARG, mode, rval));
66730Sstevel@tonic-gate 
66740Sstevel@tonic-gate 	case CRYPTO_OBJECT_FIND_UPDATE:
66750Sstevel@tonic-gate 		return (object_find_update(dev, ARG, mode, rval));
66760Sstevel@tonic-gate 
66770Sstevel@tonic-gate 	case CRYPTO_OBJECT_FIND_FINAL:
66780Sstevel@tonic-gate 		return (object_find_final(dev, ARG, mode, rval));
66790Sstevel@tonic-gate 
66800Sstevel@tonic-gate 	case CRYPTO_GENERATE_KEY:
66810Sstevel@tonic-gate 		return (object_generate_key(dev, ARG, mode, rval));
66820Sstevel@tonic-gate 
66830Sstevel@tonic-gate 	case CRYPTO_GENERATE_KEY_PAIR:
66840Sstevel@tonic-gate 		return (object_generate_key_pair(dev, ARG, mode, rval));
66850Sstevel@tonic-gate 
66860Sstevel@tonic-gate 	case CRYPTO_WRAP_KEY:
66870Sstevel@tonic-gate 		return (object_wrap_key(dev, ARG, mode, rval));
66880Sstevel@tonic-gate 
66890Sstevel@tonic-gate 	case CRYPTO_UNWRAP_KEY:
66900Sstevel@tonic-gate 		return (object_unwrap_key(dev, ARG, mode, rval));
66910Sstevel@tonic-gate 
66920Sstevel@tonic-gate 	case CRYPTO_DERIVE_KEY:
66930Sstevel@tonic-gate 		return (object_derive_key(dev, ARG, mode, rval));
66944219Smcpowers 
66954219Smcpowers 	case CRYPTO_NOSTORE_GENERATE_KEY:
66964219Smcpowers 		return (nostore_generate_key(dev, ARG, mode, rval));
66974219Smcpowers 
66984219Smcpowers 	case CRYPTO_NOSTORE_GENERATE_KEY_PAIR:
66994219Smcpowers 		return (nostore_generate_key_pair(dev, ARG, mode, rval));
67004219Smcpowers 
67014219Smcpowers 	case CRYPTO_NOSTORE_DERIVE_KEY:
67024219Smcpowers 		return (nostore_derive_key(dev, ARG, mode, rval));
67030Sstevel@tonic-gate 	}
67040Sstevel@tonic-gate 	return (EINVAL);
67050Sstevel@tonic-gate }
67060Sstevel@tonic-gate 
67070Sstevel@tonic-gate /*
67080Sstevel@tonic-gate  * Check for the project.max-crypto-memory resource control.
67090Sstevel@tonic-gate  */
67100Sstevel@tonic-gate static int
67113916Skrishna crypto_buffer_check(size_t need)
67120Sstevel@tonic-gate {
67133620Skrishna 	kproject_t *kpj;
67140Sstevel@tonic-gate 
67150Sstevel@tonic-gate 	if (need == 0)
67160Sstevel@tonic-gate 		return (CRYPTO_SUCCESS);
67170Sstevel@tonic-gate 
67180Sstevel@tonic-gate 	mutex_enter(&curproc->p_lock);
67193620Skrishna 	kpj = curproc->p_task->tk_proj;
67203916Skrishna 	mutex_enter(&(kpj->kpj_data.kpd_crypto_lock));
67213620Skrishna 
67223620Skrishna 	if (kpj->kpj_data.kpd_crypto_mem + need >
67233620Skrishna 	    kpj->kpj_data.kpd_crypto_mem_ctl) {
67243620Skrishna 		if (rctl_test(rc_project_crypto_mem,
67253620Skrishna 		    kpj->kpj_rctls, curproc, need, 0) & RCT_DENY) {
67263916Skrishna 			mutex_exit(&(kpj->kpj_data.kpd_crypto_lock));
67273620Skrishna 			mutex_exit(&curproc->p_lock);
67283620Skrishna 			return (CRYPTO_HOST_MEMORY);
67293620Skrishna 		}
67303620Skrishna 	}
67313620Skrishna 
67323620Skrishna 	kpj->kpj_data.kpd_crypto_mem += need;
67333916Skrishna 	mutex_exit(&(kpj->kpj_data.kpd_crypto_lock));
67343916Skrishna 
67353916Skrishna 	curproc->p_crypto_mem += need;
67360Sstevel@tonic-gate 	mutex_exit(&curproc->p_lock);
67373620Skrishna 
67380Sstevel@tonic-gate 	return (CRYPTO_SUCCESS);
67390Sstevel@tonic-gate }
6740