|
17 | 17 | #include <fcntl.h> |
18 | 18 | #include <unistd.h> |
19 | 19 |
|
| 20 | +#ifdef CONFIG_OPENSSL |
| 21 | +#include <openssl/engine.h> |
| 22 | +#include <openssl/evp.h> |
| 23 | +#include <openssl/hmac.h> |
| 24 | + |
| 25 | +#ifdef CONFIG_OPENSSL_3 |
| 26 | +#include <openssl/core_names.h> |
| 27 | +#include <openssl/params.h> |
| 28 | +#endif |
| 29 | +#endif |
| 30 | + |
20 | 31 | #include <ccan/endian/endian.h> |
21 | 32 |
|
22 | 33 | #include "linux.h" |
@@ -386,3 +397,201 @@ char *nvme_get_path_attr(nvme_path_t p, const char *attr) |
386 | 397 | { |
387 | 398 | return nvme_get_attr(nvme_path_get_sysfs_dir(p), attr); |
388 | 399 | } |
| 400 | + |
| 401 | +#ifndef CONFIG_OPENSSL |
| 402 | +int nvme_gen_dhchap_key(char *hostnqn, enum nvme_hmac_alg hmac, |
| 403 | + unsigned int key_len, unsigned char *secret, |
| 404 | + unsigned char *key) |
| 405 | +{ |
| 406 | + if (hmac != NVME_HMAC_ALG_NONE) { |
| 407 | + nvme_msg(LOG_ERR, "HMAC transformation not supported; " \ |
| 408 | + "recompile with OpenSSL support.\n"); |
| 409 | + errno = -EINVAL; |
| 410 | + return -1; |
| 411 | + } |
| 412 | + |
| 413 | + memcpy(key, secret, key_len); |
| 414 | + return 0; |
| 415 | +} |
| 416 | +#endif /* !CONFIG_OPENSSL */ |
| 417 | + |
| 418 | +#ifdef CONFIG_OPENSSL_1 |
| 419 | +int nvme_gen_dhchap_key(char *hostnqn, enum nvme_hmac_alg hmac, |
| 420 | + unsigned int key_len, unsigned char *secret, |
| 421 | + unsigned char *key) |
| 422 | +{ |
| 423 | + const char hmac_seed[] = "NVMe-over-Fabrics"; |
| 424 | + HMAC_CTX *hmac_ctx; |
| 425 | + const EVP_MD *md; |
| 426 | + int err = -1; |
| 427 | + |
| 428 | + ENGINE_load_builtin_engines(); |
| 429 | + ENGINE_register_all_complete(); |
| 430 | + |
| 431 | + hmac_ctx = HMAC_CTX_new(); |
| 432 | + if (!hmac_ctx) { |
| 433 | + nvme_msg(LOG_ERR, "OpenSSL: could not create HMAC context\n"); |
| 434 | + errno = ENOENT; |
| 435 | + return err; |
| 436 | + } |
| 437 | + |
| 438 | + switch (hmac) { |
| 439 | + case NVME_HMAC_ALG_NONE: |
| 440 | + memcpy(key, secret, key_len); |
| 441 | + err = 0; |
| 442 | + goto out; |
| 443 | + case NVME_HMAC_ALG_SHA2_256: |
| 444 | + md = EVP_sha256(); |
| 445 | + break; |
| 446 | + case NVME_HMAC_ALG_SHA2_384: |
| 447 | + md = EVP_sha384(); |
| 448 | + break; |
| 449 | + case NVME_HMAC_ALG_SHA2_512: |
| 450 | + md = EVP_sha512(); |
| 451 | + break; |
| 452 | + default: |
| 453 | + errno = EINVAL; |
| 454 | + goto out; |
| 455 | + } |
| 456 | + |
| 457 | + if (!md) { |
| 458 | + nvme_msg(LOG_ERR, "OpenSSL: could not fetch hash function\n"); |
| 459 | + errno = ENOENT; |
| 460 | + goto out; |
| 461 | + } |
| 462 | + |
| 463 | + if (!HMAC_Init_ex(hmac_ctx, secret, key_len, md, NULL)) { |
| 464 | + nvme_msg(LOG_ERR, "OpenSSL: initializing HMAC context failed\n"); |
| 465 | + errno = ENOENT; |
| 466 | + goto out; |
| 467 | + } |
| 468 | + |
| 469 | + if (!HMAC_Update(hmac_ctx, (unsigned char *)hostnqn, |
| 470 | + strlen(hostnqn))) { |
| 471 | + nvme_msg(LOG_ERR, "OpenSSL: HMAC for hostnqn failed\n"); |
| 472 | + errno = ENOENT; |
| 473 | + goto out; |
| 474 | + } |
| 475 | + |
| 476 | + if (!HMAC_Update(hmac_ctx, (unsigned char *)hmac_seed, |
| 477 | + strlen(hmac_seed))) { |
| 478 | + nvme_msg(LOG_ERR, "OpenSSL: HMAC for seed failed\n"); |
| 479 | + errno = ENOENT; |
| 480 | + goto out; |
| 481 | + } |
| 482 | + |
| 483 | + if (!HMAC_Final(hmac_ctx, key, &key_len)) { |
| 484 | + nvme_msg(LOG_ERR, "OpenSSL: finializing MAC failed\n"); |
| 485 | + errno = ENOENT; |
| 486 | + goto out; |
| 487 | + } |
| 488 | + |
| 489 | + err = 0; |
| 490 | + |
| 491 | +out: |
| 492 | + HMAC_CTX_free(hmac_ctx); |
| 493 | + return err; |
| 494 | +} |
| 495 | +#endif /* !CONFIG_OPENSSL_1 */ |
| 496 | + |
| 497 | +#ifdef CONFIG_OPENSSL_3 |
| 498 | +int nvme_gen_dhchap_key(char *hostnqn, enum nvme_hmac_alg hmac, |
| 499 | + unsigned int key_len, unsigned char *secret, |
| 500 | + unsigned char *key) |
| 501 | +{ |
| 502 | + const char hmac_seed[] = "NVMe-over-Fabrics"; |
| 503 | + OSSL_PARAM params[2], *p = params; |
| 504 | + OSSL_LIB_CTX *lib_ctx; |
| 505 | + EVP_MAC_CTX *mac_ctx = NULL; |
| 506 | + EVP_MAC *mac = NULL; |
| 507 | + char *progq = NULL; |
| 508 | + char *digest; |
| 509 | + size_t len; |
| 510 | + int err = -1; |
| 511 | + |
| 512 | + lib_ctx = OSSL_LIB_CTX_new(); |
| 513 | + if (!lib_ctx) { |
| 514 | + nvme_msg(LOG_ERR, "OpenSSL: Library initializing failed\n"); |
| 515 | + errno = ENOENT; |
| 516 | + return err; |
| 517 | + } |
| 518 | + |
| 519 | + mac = EVP_MAC_fetch(lib_ctx, OSSL_MAC_NAME_HMAC, progq); |
| 520 | + if (!mac) { |
| 521 | + nvme_msg(LOG_ERR, "OpenSSL: could not fetch HMAC algorithm\n"); |
| 522 | + errno = EINVAL; |
| 523 | + goto out; |
| 524 | + } |
| 525 | + |
| 526 | + mac_ctx = EVP_MAC_CTX_new(mac); |
| 527 | + if (!mac_ctx) { |
| 528 | + nvme_msg(LOG_ERR, "OpenSSL: could not create HMAC context\n"); |
| 529 | + errno = ENOENT; |
| 530 | + goto out; |
| 531 | + } |
| 532 | + |
| 533 | + switch (hmac) { |
| 534 | + case NVME_HMAC_ALG_NONE: |
| 535 | + memcpy(key, secret, key_len); |
| 536 | + err = 0; |
| 537 | + goto out; |
| 538 | + case NVME_HMAC_ALG_SHA2_256: |
| 539 | + digest = OSSL_DIGEST_NAME_SHA2_256; |
| 540 | + break; |
| 541 | + case NVME_HMAC_ALG_SHA2_384: |
| 542 | + digest = OSSL_DIGEST_NAME_SHA2_384; |
| 543 | + break; |
| 544 | + case NVME_HMAC_ALG_SHA2_512: |
| 545 | + digest = OSSL_DIGEST_NAME_SHA2_512; |
| 546 | + break; |
| 547 | + default: |
| 548 | + errno = EINVAL; |
| 549 | + goto out; |
| 550 | + } |
| 551 | + *p++ = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_DIGEST, |
| 552 | + digest, |
| 553 | + 0); |
| 554 | + *p = OSSL_PARAM_construct_end(); |
| 555 | + |
| 556 | + if (!EVP_MAC_init(mac_ctx, secret, key_len, params)) { |
| 557 | + nvme_msg(LOG_ERR, "OpenSSL: could not initialize HMAC context\n"); |
| 558 | + errno = EINVAL; |
| 559 | + goto out; |
| 560 | + } |
| 561 | + |
| 562 | + if (!EVP_MAC_update(mac_ctx, (unsigned char *)hostnqn, |
| 563 | + strlen(hostnqn))) { |
| 564 | + nvme_msg(LOG_ERR, "OpenSSL: HMAC for hostnqn failed\n"); |
| 565 | + errno = ENOENT; |
| 566 | + goto out; |
| 567 | + } |
| 568 | + |
| 569 | + if (!EVP_MAC_update(mac_ctx, (unsigned char *)hmac_seed, |
| 570 | + strlen(hmac_seed))) { |
| 571 | + nvme_msg(LOG_ERR, "OpenSSL: HMAC for seed failed\n"); |
| 572 | + errno = ENOENT; |
| 573 | + goto out; |
| 574 | + } |
| 575 | + |
| 576 | + if (!EVP_MAC_final(mac_ctx, key, &len, key_len)) { |
| 577 | + nvme_msg(LOG_ERR, "OpenSSL: finializing MAC failed\n"); |
| 578 | + errno = ENOENT; |
| 579 | + goto out; |
| 580 | + } |
| 581 | + |
| 582 | + if (len != key_len) { |
| 583 | + nvme_msg(LOG_ERR, "OpenSSL: generated HMAC has an unexpected lenght\n"); |
| 584 | + errno = EINVAL; |
| 585 | + goto out; |
| 586 | + } |
| 587 | + |
| 588 | + err = 0; |
| 589 | + |
| 590 | +out: |
| 591 | + EVP_MAC_CTX_free(mac_ctx); |
| 592 | + EVP_MAC_free(mac); |
| 593 | + OSSL_LIB_CTX_free(lib_ctx); |
| 594 | + |
| 595 | + return err; |
| 596 | +} |
| 597 | +#endif /* !CONFIG_OPENSSL_3 */ |
0 commit comments