Root/
1 | /* |
2 | * Cryptographic API for algorithms (i.e., low-level API). |
3 | * |
4 | * Copyright (c) 2006 Herbert Xu <herbert@gondor.apana.org.au> |
5 | * |
6 | * This program is free software; you can redistribute it and/or modify it |
7 | * under the terms of the GNU General Public License as published by the Free |
8 | * Software Foundation; either version 2 of the License, or (at your option) |
9 | * any later version. |
10 | * |
11 | */ |
12 | |
13 | #include <linux/err.h> |
14 | #include <linux/errno.h> |
15 | #include <linux/init.h> |
16 | #include <linux/kernel.h> |
17 | #include <linux/list.h> |
18 | #include <linux/module.h> |
19 | #include <linux/rtnetlink.h> |
20 | #include <linux/slab.h> |
21 | #include <linux/string.h> |
22 | |
23 | #include "internal.h" |
24 | |
25 | static LIST_HEAD(crypto_template_list); |
26 | |
27 | void crypto_larval_error(const char *name, u32 type, u32 mask) |
28 | { |
29 | struct crypto_alg *alg; |
30 | |
31 | alg = crypto_alg_lookup(name, type, mask); |
32 | |
33 | if (alg) { |
34 | if (crypto_is_larval(alg)) { |
35 | struct crypto_larval *larval = (void *)alg; |
36 | complete_all(&larval->completion); |
37 | } |
38 | crypto_mod_put(alg); |
39 | } |
40 | } |
41 | EXPORT_SYMBOL_GPL(crypto_larval_error); |
42 | |
43 | static inline int crypto_set_driver_name(struct crypto_alg *alg) |
44 | { |
45 | static const char suffix[] = "-generic"; |
46 | char *driver_name = alg->cra_driver_name; |
47 | int len; |
48 | |
49 | if (*driver_name) |
50 | return 0; |
51 | |
52 | len = strlcpy(driver_name, alg->cra_name, CRYPTO_MAX_ALG_NAME); |
53 | if (len + sizeof(suffix) > CRYPTO_MAX_ALG_NAME) |
54 | return -ENAMETOOLONG; |
55 | |
56 | memcpy(driver_name + len, suffix, sizeof(suffix)); |
57 | return 0; |
58 | } |
59 | |
60 | static int crypto_check_alg(struct crypto_alg *alg) |
61 | { |
62 | if (alg->cra_alignmask & (alg->cra_alignmask + 1)) |
63 | return -EINVAL; |
64 | |
65 | if (alg->cra_blocksize > PAGE_SIZE / 8) |
66 | return -EINVAL; |
67 | |
68 | if (alg->cra_priority < 0) |
69 | return -EINVAL; |
70 | |
71 | return crypto_set_driver_name(alg); |
72 | } |
73 | |
74 | static void crypto_destroy_instance(struct crypto_alg *alg) |
75 | { |
76 | struct crypto_instance *inst = (void *)alg; |
77 | struct crypto_template *tmpl = inst->tmpl; |
78 | |
79 | tmpl->free(inst); |
80 | crypto_tmpl_put(tmpl); |
81 | } |
82 | |
83 | static struct list_head *crypto_more_spawns(struct crypto_alg *alg, |
84 | struct list_head *stack, |
85 | struct list_head *top, |
86 | struct list_head *secondary_spawns) |
87 | { |
88 | struct crypto_spawn *spawn, *n; |
89 | |
90 | if (list_empty(stack)) |
91 | return NULL; |
92 | |
93 | spawn = list_first_entry(stack, struct crypto_spawn, list); |
94 | n = list_entry(spawn->list.next, struct crypto_spawn, list); |
95 | |
96 | if (spawn->alg && &n->list != stack && !n->alg) |
97 | n->alg = (n->list.next == stack) ? alg : |
98 | &list_entry(n->list.next, struct crypto_spawn, |
99 | list)->inst->alg; |
100 | |
101 | list_move(&spawn->list, secondary_spawns); |
102 | |
103 | return &n->list == stack ? top : &n->inst->alg.cra_users; |
104 | } |
105 | |
106 | static void crypto_remove_spawn(struct crypto_spawn *spawn, |
107 | struct list_head *list) |
108 | { |
109 | struct crypto_instance *inst = spawn->inst; |
110 | struct crypto_template *tmpl = inst->tmpl; |
111 | |
112 | if (crypto_is_dead(&inst->alg)) |
113 | return; |
114 | |
115 | inst->alg.cra_flags |= CRYPTO_ALG_DEAD; |
116 | if (hlist_unhashed(&inst->list)) |
117 | return; |
118 | |
119 | if (!tmpl || !crypto_tmpl_get(tmpl)) |
120 | return; |
121 | |
122 | crypto_notify(CRYPTO_MSG_ALG_UNREGISTER, &inst->alg); |
123 | list_move(&inst->alg.cra_list, list); |
124 | hlist_del(&inst->list); |
125 | inst->alg.cra_destroy = crypto_destroy_instance; |
126 | |
127 | BUG_ON(!list_empty(&inst->alg.cra_users)); |
128 | } |
129 | |
130 | void crypto_remove_spawns(struct crypto_alg *alg, struct list_head *list, |
131 | struct crypto_alg *nalg) |
132 | { |
133 | u32 new_type = (nalg ?: alg)->cra_flags; |
134 | struct crypto_spawn *spawn, *n; |
135 | LIST_HEAD(secondary_spawns); |
136 | struct list_head *spawns; |
137 | LIST_HEAD(stack); |
138 | LIST_HEAD(top); |
139 | |
140 | spawns = &alg->cra_users; |
141 | list_for_each_entry_safe(spawn, n, spawns, list) { |
142 | if ((spawn->alg->cra_flags ^ new_type) & spawn->mask) |
143 | continue; |
144 | |
145 | list_move(&spawn->list, &top); |
146 | } |
147 | |
148 | spawns = ⊤ |
149 | do { |
150 | while (!list_empty(spawns)) { |
151 | struct crypto_instance *inst; |
152 | |
153 | spawn = list_first_entry(spawns, struct crypto_spawn, |
154 | list); |
155 | inst = spawn->inst; |
156 | |
157 | BUG_ON(&inst->alg == alg); |
158 | |
159 | list_move(&spawn->list, &stack); |
160 | |
161 | if (&inst->alg == nalg) |
162 | break; |
163 | |
164 | spawn->alg = NULL; |
165 | spawns = &inst->alg.cra_users; |
166 | } |
167 | } while ((spawns = crypto_more_spawns(alg, &stack, &top, |
168 | &secondary_spawns))); |
169 | |
170 | list_for_each_entry_safe(spawn, n, &secondary_spawns, list) { |
171 | if (spawn->alg) |
172 | list_move(&spawn->list, &spawn->alg->cra_users); |
173 | else |
174 | crypto_remove_spawn(spawn, list); |
175 | } |
176 | } |
177 | EXPORT_SYMBOL_GPL(crypto_remove_spawns); |
178 | |
179 | static struct crypto_larval *__crypto_register_alg(struct crypto_alg *alg) |
180 | { |
181 | struct crypto_alg *q; |
182 | struct crypto_larval *larval; |
183 | int ret = -EAGAIN; |
184 | |
185 | if (crypto_is_dead(alg)) |
186 | goto err; |
187 | |
188 | INIT_LIST_HEAD(&alg->cra_users); |
189 | |
190 | /* No cheating! */ |
191 | alg->cra_flags &= ~CRYPTO_ALG_TESTED; |
192 | |
193 | ret = -EEXIST; |
194 | |
195 | atomic_set(&alg->cra_refcnt, 1); |
196 | list_for_each_entry(q, &crypto_alg_list, cra_list) { |
197 | if (q == alg) |
198 | goto err; |
199 | |
200 | if (crypto_is_moribund(q)) |
201 | continue; |
202 | |
203 | if (crypto_is_larval(q)) { |
204 | if (!strcmp(alg->cra_driver_name, q->cra_driver_name)) |
205 | goto err; |
206 | continue; |
207 | } |
208 | |
209 | if (!strcmp(q->cra_driver_name, alg->cra_name) || |
210 | !strcmp(q->cra_name, alg->cra_driver_name)) |
211 | goto err; |
212 | } |
213 | |
214 | larval = crypto_larval_alloc(alg->cra_name, |
215 | alg->cra_flags | CRYPTO_ALG_TESTED, 0); |
216 | if (IS_ERR(larval)) |
217 | goto out; |
218 | |
219 | ret = -ENOENT; |
220 | larval->adult = crypto_mod_get(alg); |
221 | if (!larval->adult) |
222 | goto free_larval; |
223 | |
224 | atomic_set(&larval->alg.cra_refcnt, 1); |
225 | memcpy(larval->alg.cra_driver_name, alg->cra_driver_name, |
226 | CRYPTO_MAX_ALG_NAME); |
227 | larval->alg.cra_priority = alg->cra_priority; |
228 | |
229 | list_add(&alg->cra_list, &crypto_alg_list); |
230 | list_add(&larval->alg.cra_list, &crypto_alg_list); |
231 | |
232 | out: |
233 | return larval; |
234 | |
235 | free_larval: |
236 | kfree(larval); |
237 | err: |
238 | larval = ERR_PTR(ret); |
239 | goto out; |
240 | } |
241 | |
242 | void crypto_alg_tested(const char *name, int err) |
243 | { |
244 | struct crypto_larval *test; |
245 | struct crypto_alg *alg; |
246 | struct crypto_alg *q; |
247 | LIST_HEAD(list); |
248 | |
249 | down_write(&crypto_alg_sem); |
250 | list_for_each_entry(q, &crypto_alg_list, cra_list) { |
251 | if (crypto_is_moribund(q) || !crypto_is_larval(q)) |
252 | continue; |
253 | |
254 | test = (struct crypto_larval *)q; |
255 | |
256 | if (!strcmp(q->cra_driver_name, name)) |
257 | goto found; |
258 | } |
259 | |
260 | printk(KERN_ERR "alg: Unexpected test result for %s: %d\n", name, err); |
261 | goto unlock; |
262 | |
263 | found: |
264 | q->cra_flags |= CRYPTO_ALG_DEAD; |
265 | alg = test->adult; |
266 | if (err || list_empty(&alg->cra_list)) |
267 | goto complete; |
268 | |
269 | alg->cra_flags |= CRYPTO_ALG_TESTED; |
270 | |
271 | list_for_each_entry(q, &crypto_alg_list, cra_list) { |
272 | if (q == alg) |
273 | continue; |
274 | |
275 | if (crypto_is_moribund(q)) |
276 | continue; |
277 | |
278 | if (crypto_is_larval(q)) { |
279 | struct crypto_larval *larval = (void *)q; |
280 | |
281 | /* |
282 | * Check to see if either our generic name or |
283 | * specific name can satisfy the name requested |
284 | * by the larval entry q. |
285 | */ |
286 | if (strcmp(alg->cra_name, q->cra_name) && |
287 | strcmp(alg->cra_driver_name, q->cra_name)) |
288 | continue; |
289 | |
290 | if (larval->adult) |
291 | continue; |
292 | if ((q->cra_flags ^ alg->cra_flags) & larval->mask) |
293 | continue; |
294 | if (!crypto_mod_get(alg)) |
295 | continue; |
296 | |
297 | larval->adult = alg; |
298 | complete_all(&larval->completion); |
299 | continue; |
300 | } |
301 | |
302 | if (strcmp(alg->cra_name, q->cra_name)) |
303 | continue; |
304 | |
305 | if (strcmp(alg->cra_driver_name, q->cra_driver_name) && |
306 | q->cra_priority > alg->cra_priority) |
307 | continue; |
308 | |
309 | crypto_remove_spawns(q, &list, alg); |
310 | } |
311 | |
312 | complete: |
313 | complete_all(&test->completion); |
314 | |
315 | unlock: |
316 | up_write(&crypto_alg_sem); |
317 | |
318 | crypto_remove_final(&list); |
319 | } |
320 | EXPORT_SYMBOL_GPL(crypto_alg_tested); |
321 | |
322 | void crypto_remove_final(struct list_head *list) |
323 | { |
324 | struct crypto_alg *alg; |
325 | struct crypto_alg *n; |
326 | |
327 | list_for_each_entry_safe(alg, n, list, cra_list) { |
328 | list_del_init(&alg->cra_list); |
329 | crypto_alg_put(alg); |
330 | } |
331 | } |
332 | EXPORT_SYMBOL_GPL(crypto_remove_final); |
333 | |
334 | static void crypto_wait_for_test(struct crypto_larval *larval) |
335 | { |
336 | int err; |
337 | |
338 | err = crypto_probing_notify(CRYPTO_MSG_ALG_REGISTER, larval->adult); |
339 | if (err != NOTIFY_STOP) { |
340 | if (WARN_ON(err != NOTIFY_DONE)) |
341 | goto out; |
342 | crypto_alg_tested(larval->alg.cra_driver_name, 0); |
343 | } |
344 | |
345 | err = wait_for_completion_interruptible(&larval->completion); |
346 | WARN_ON(err); |
347 | |
348 | out: |
349 | crypto_larval_kill(&larval->alg); |
350 | } |
351 | |
352 | int crypto_register_alg(struct crypto_alg *alg) |
353 | { |
354 | struct crypto_larval *larval; |
355 | int err; |
356 | |
357 | err = crypto_check_alg(alg); |
358 | if (err) |
359 | return err; |
360 | |
361 | down_write(&crypto_alg_sem); |
362 | larval = __crypto_register_alg(alg); |
363 | up_write(&crypto_alg_sem); |
364 | |
365 | if (IS_ERR(larval)) |
366 | return PTR_ERR(larval); |
367 | |
368 | crypto_wait_for_test(larval); |
369 | return 0; |
370 | } |
371 | EXPORT_SYMBOL_GPL(crypto_register_alg); |
372 | |
373 | static int crypto_remove_alg(struct crypto_alg *alg, struct list_head *list) |
374 | { |
375 | if (unlikely(list_empty(&alg->cra_list))) |
376 | return -ENOENT; |
377 | |
378 | alg->cra_flags |= CRYPTO_ALG_DEAD; |
379 | |
380 | crypto_notify(CRYPTO_MSG_ALG_UNREGISTER, alg); |
381 | list_del_init(&alg->cra_list); |
382 | crypto_remove_spawns(alg, list, NULL); |
383 | |
384 | return 0; |
385 | } |
386 | |
387 | int crypto_unregister_alg(struct crypto_alg *alg) |
388 | { |
389 | int ret; |
390 | LIST_HEAD(list); |
391 | |
392 | down_write(&crypto_alg_sem); |
393 | ret = crypto_remove_alg(alg, &list); |
394 | up_write(&crypto_alg_sem); |
395 | |
396 | if (ret) |
397 | return ret; |
398 | |
399 | BUG_ON(atomic_read(&alg->cra_refcnt) != 1); |
400 | if (alg->cra_destroy) |
401 | alg->cra_destroy(alg); |
402 | |
403 | crypto_remove_final(&list); |
404 | return 0; |
405 | } |
406 | EXPORT_SYMBOL_GPL(crypto_unregister_alg); |
407 | |
408 | int crypto_register_algs(struct crypto_alg *algs, int count) |
409 | { |
410 | int i, ret; |
411 | |
412 | for (i = 0; i < count; i++) { |
413 | ret = crypto_register_alg(&algs[i]); |
414 | if (ret) |
415 | goto err; |
416 | } |
417 | |
418 | return 0; |
419 | |
420 | err: |
421 | for (--i; i >= 0; --i) |
422 | crypto_unregister_alg(&algs[i]); |
423 | |
424 | return ret; |
425 | } |
426 | EXPORT_SYMBOL_GPL(crypto_register_algs); |
427 | |
428 | int crypto_unregister_algs(struct crypto_alg *algs, int count) |
429 | { |
430 | int i, ret; |
431 | |
432 | for (i = 0; i < count; i++) { |
433 | ret = crypto_unregister_alg(&algs[i]); |
434 | if (ret) |
435 | pr_err("Failed to unregister %s %s: %d\n", |
436 | algs[i].cra_driver_name, algs[i].cra_name, ret); |
437 | } |
438 | |
439 | return 0; |
440 | } |
441 | EXPORT_SYMBOL_GPL(crypto_unregister_algs); |
442 | |
443 | int crypto_register_template(struct crypto_template *tmpl) |
444 | { |
445 | struct crypto_template *q; |
446 | int err = -EEXIST; |
447 | |
448 | down_write(&crypto_alg_sem); |
449 | |
450 | list_for_each_entry(q, &crypto_template_list, list) { |
451 | if (q == tmpl) |
452 | goto out; |
453 | } |
454 | |
455 | list_add(&tmpl->list, &crypto_template_list); |
456 | crypto_notify(CRYPTO_MSG_TMPL_REGISTER, tmpl); |
457 | err = 0; |
458 | out: |
459 | up_write(&crypto_alg_sem); |
460 | return err; |
461 | } |
462 | EXPORT_SYMBOL_GPL(crypto_register_template); |
463 | |
464 | void crypto_unregister_template(struct crypto_template *tmpl) |
465 | { |
466 | struct crypto_instance *inst; |
467 | struct hlist_node *p, *n; |
468 | struct hlist_head *list; |
469 | LIST_HEAD(users); |
470 | |
471 | down_write(&crypto_alg_sem); |
472 | |
473 | BUG_ON(list_empty(&tmpl->list)); |
474 | list_del_init(&tmpl->list); |
475 | |
476 | list = &tmpl->instances; |
477 | hlist_for_each_entry(inst, p, list, list) { |
478 | int err = crypto_remove_alg(&inst->alg, &users); |
479 | BUG_ON(err); |
480 | } |
481 | |
482 | crypto_notify(CRYPTO_MSG_TMPL_UNREGISTER, tmpl); |
483 | |
484 | up_write(&crypto_alg_sem); |
485 | |
486 | hlist_for_each_entry_safe(inst, p, n, list, list) { |
487 | BUG_ON(atomic_read(&inst->alg.cra_refcnt) != 1); |
488 | tmpl->free(inst); |
489 | } |
490 | crypto_remove_final(&users); |
491 | } |
492 | EXPORT_SYMBOL_GPL(crypto_unregister_template); |
493 | |
494 | static struct crypto_template *__crypto_lookup_template(const char *name) |
495 | { |
496 | struct crypto_template *q, *tmpl = NULL; |
497 | |
498 | down_read(&crypto_alg_sem); |
499 | list_for_each_entry(q, &crypto_template_list, list) { |
500 | if (strcmp(q->name, name)) |
501 | continue; |
502 | if (unlikely(!crypto_tmpl_get(q))) |
503 | continue; |
504 | |
505 | tmpl = q; |
506 | break; |
507 | } |
508 | up_read(&crypto_alg_sem); |
509 | |
510 | return tmpl; |
511 | } |
512 | |
513 | struct crypto_template *crypto_lookup_template(const char *name) |
514 | { |
515 | return try_then_request_module(__crypto_lookup_template(name), name); |
516 | } |
517 | EXPORT_SYMBOL_GPL(crypto_lookup_template); |
518 | |
519 | int crypto_register_instance(struct crypto_template *tmpl, |
520 | struct crypto_instance *inst) |
521 | { |
522 | struct crypto_larval *larval; |
523 | int err; |
524 | |
525 | err = crypto_check_alg(&inst->alg); |
526 | if (err) |
527 | goto err; |
528 | |
529 | inst->alg.cra_module = tmpl->module; |
530 | inst->alg.cra_flags |= CRYPTO_ALG_INSTANCE; |
531 | |
532 | down_write(&crypto_alg_sem); |
533 | |
534 | larval = __crypto_register_alg(&inst->alg); |
535 | if (IS_ERR(larval)) |
536 | goto unlock; |
537 | |
538 | hlist_add_head(&inst->list, &tmpl->instances); |
539 | inst->tmpl = tmpl; |
540 | |
541 | unlock: |
542 | up_write(&crypto_alg_sem); |
543 | |
544 | err = PTR_ERR(larval); |
545 | if (IS_ERR(larval)) |
546 | goto err; |
547 | |
548 | crypto_wait_for_test(larval); |
549 | err = 0; |
550 | |
551 | err: |
552 | return err; |
553 | } |
554 | EXPORT_SYMBOL_GPL(crypto_register_instance); |
555 | |
556 | int crypto_unregister_instance(struct crypto_alg *alg) |
557 | { |
558 | int err; |
559 | struct crypto_instance *inst = (void *)alg; |
560 | struct crypto_template *tmpl = inst->tmpl; |
561 | LIST_HEAD(users); |
562 | |
563 | if (!(alg->cra_flags & CRYPTO_ALG_INSTANCE)) |
564 | return -EINVAL; |
565 | |
566 | BUG_ON(atomic_read(&alg->cra_refcnt) != 1); |
567 | |
568 | down_write(&crypto_alg_sem); |
569 | |
570 | hlist_del_init(&inst->list); |
571 | err = crypto_remove_alg(alg, &users); |
572 | |
573 | up_write(&crypto_alg_sem); |
574 | |
575 | if (err) |
576 | return err; |
577 | |
578 | tmpl->free(inst); |
579 | crypto_remove_final(&users); |
580 | |
581 | return 0; |
582 | } |
583 | EXPORT_SYMBOL_GPL(crypto_unregister_instance); |
584 | |
585 | int crypto_init_spawn(struct crypto_spawn *spawn, struct crypto_alg *alg, |
586 | struct crypto_instance *inst, u32 mask) |
587 | { |
588 | int err = -EAGAIN; |
589 | |
590 | spawn->inst = inst; |
591 | spawn->mask = mask; |
592 | |
593 | down_write(&crypto_alg_sem); |
594 | if (!crypto_is_moribund(alg)) { |
595 | list_add(&spawn->list, &alg->cra_users); |
596 | spawn->alg = alg; |
597 | err = 0; |
598 | } |
599 | up_write(&crypto_alg_sem); |
600 | |
601 | return err; |
602 | } |
603 | EXPORT_SYMBOL_GPL(crypto_init_spawn); |
604 | |
605 | int crypto_init_spawn2(struct crypto_spawn *spawn, struct crypto_alg *alg, |
606 | struct crypto_instance *inst, |
607 | const struct crypto_type *frontend) |
608 | { |
609 | int err = -EINVAL; |
610 | |
611 | if ((alg->cra_flags ^ frontend->type) & frontend->maskset) |
612 | goto out; |
613 | |
614 | spawn->frontend = frontend; |
615 | err = crypto_init_spawn(spawn, alg, inst, frontend->maskset); |
616 | |
617 | out: |
618 | return err; |
619 | } |
620 | EXPORT_SYMBOL_GPL(crypto_init_spawn2); |
621 | |
622 | void crypto_drop_spawn(struct crypto_spawn *spawn) |
623 | { |
624 | if (!spawn->alg) |
625 | return; |
626 | |
627 | down_write(&crypto_alg_sem); |
628 | list_del(&spawn->list); |
629 | up_write(&crypto_alg_sem); |
630 | } |
631 | EXPORT_SYMBOL_GPL(crypto_drop_spawn); |
632 | |
633 | static struct crypto_alg *crypto_spawn_alg(struct crypto_spawn *spawn) |
634 | { |
635 | struct crypto_alg *alg; |
636 | struct crypto_alg *alg2; |
637 | |
638 | down_read(&crypto_alg_sem); |
639 | alg = spawn->alg; |
640 | alg2 = alg; |
641 | if (alg2) |
642 | alg2 = crypto_mod_get(alg2); |
643 | up_read(&crypto_alg_sem); |
644 | |
645 | if (!alg2) { |
646 | if (alg) |
647 | crypto_shoot_alg(alg); |
648 | return ERR_PTR(-EAGAIN); |
649 | } |
650 | |
651 | return alg; |
652 | } |
653 | |
654 | struct crypto_tfm *crypto_spawn_tfm(struct crypto_spawn *spawn, u32 type, |
655 | u32 mask) |
656 | { |
657 | struct crypto_alg *alg; |
658 | struct crypto_tfm *tfm; |
659 | |
660 | alg = crypto_spawn_alg(spawn); |
661 | if (IS_ERR(alg)) |
662 | return ERR_CAST(alg); |
663 | |
664 | tfm = ERR_PTR(-EINVAL); |
665 | if (unlikely((alg->cra_flags ^ type) & mask)) |
666 | goto out_put_alg; |
667 | |
668 | tfm = __crypto_alloc_tfm(alg, type, mask); |
669 | if (IS_ERR(tfm)) |
670 | goto out_put_alg; |
671 | |
672 | return tfm; |
673 | |
674 | out_put_alg: |
675 | crypto_mod_put(alg); |
676 | return tfm; |
677 | } |
678 | EXPORT_SYMBOL_GPL(crypto_spawn_tfm); |
679 | |
680 | void *crypto_spawn_tfm2(struct crypto_spawn *spawn) |
681 | { |
682 | struct crypto_alg *alg; |
683 | struct crypto_tfm *tfm; |
684 | |
685 | alg = crypto_spawn_alg(spawn); |
686 | if (IS_ERR(alg)) |
687 | return ERR_CAST(alg); |
688 | |
689 | tfm = crypto_create_tfm(alg, spawn->frontend); |
690 | if (IS_ERR(tfm)) |
691 | goto out_put_alg; |
692 | |
693 | return tfm; |
694 | |
695 | out_put_alg: |
696 | crypto_mod_put(alg); |
697 | return tfm; |
698 | } |
699 | EXPORT_SYMBOL_GPL(crypto_spawn_tfm2); |
700 | |
701 | int crypto_register_notifier(struct notifier_block *nb) |
702 | { |
703 | return blocking_notifier_chain_register(&crypto_chain, nb); |
704 | } |
705 | EXPORT_SYMBOL_GPL(crypto_register_notifier); |
706 | |
707 | int crypto_unregister_notifier(struct notifier_block *nb) |
708 | { |
709 | return blocking_notifier_chain_unregister(&crypto_chain, nb); |
710 | } |
711 | EXPORT_SYMBOL_GPL(crypto_unregister_notifier); |
712 | |
713 | struct crypto_attr_type *crypto_get_attr_type(struct rtattr **tb) |
714 | { |
715 | struct rtattr *rta = tb[0]; |
716 | struct crypto_attr_type *algt; |
717 | |
718 | if (!rta) |
719 | return ERR_PTR(-ENOENT); |
720 | if (RTA_PAYLOAD(rta) < sizeof(*algt)) |
721 | return ERR_PTR(-EINVAL); |
722 | if (rta->rta_type != CRYPTOA_TYPE) |
723 | return ERR_PTR(-EINVAL); |
724 | |
725 | algt = RTA_DATA(rta); |
726 | |
727 | return algt; |
728 | } |
729 | EXPORT_SYMBOL_GPL(crypto_get_attr_type); |
730 | |
731 | int crypto_check_attr_type(struct rtattr **tb, u32 type) |
732 | { |
733 | struct crypto_attr_type *algt; |
734 | |
735 | algt = crypto_get_attr_type(tb); |
736 | if (IS_ERR(algt)) |
737 | return PTR_ERR(algt); |
738 | |
739 | if ((algt->type ^ type) & algt->mask) |
740 | return -EINVAL; |
741 | |
742 | return 0; |
743 | } |
744 | EXPORT_SYMBOL_GPL(crypto_check_attr_type); |
745 | |
746 | const char *crypto_attr_alg_name(struct rtattr *rta) |
747 | { |
748 | struct crypto_attr_alg *alga; |
749 | |
750 | if (!rta) |
751 | return ERR_PTR(-ENOENT); |
752 | if (RTA_PAYLOAD(rta) < sizeof(*alga)) |
753 | return ERR_PTR(-EINVAL); |
754 | if (rta->rta_type != CRYPTOA_ALG) |
755 | return ERR_PTR(-EINVAL); |
756 | |
757 | alga = RTA_DATA(rta); |
758 | alga->name[CRYPTO_MAX_ALG_NAME - 1] = 0; |
759 | |
760 | return alga->name; |
761 | } |
762 | EXPORT_SYMBOL_GPL(crypto_attr_alg_name); |
763 | |
764 | struct crypto_alg *crypto_attr_alg2(struct rtattr *rta, |
765 | const struct crypto_type *frontend, |
766 | u32 type, u32 mask) |
767 | { |
768 | const char *name; |
769 | int err; |
770 | |
771 | name = crypto_attr_alg_name(rta); |
772 | err = PTR_ERR(name); |
773 | if (IS_ERR(name)) |
774 | return ERR_PTR(err); |
775 | |
776 | return crypto_find_alg(name, frontend, type, mask); |
777 | } |
778 | EXPORT_SYMBOL_GPL(crypto_attr_alg2); |
779 | |
780 | int crypto_attr_u32(struct rtattr *rta, u32 *num) |
781 | { |
782 | struct crypto_attr_u32 *nu32; |
783 | |
784 | if (!rta) |
785 | return -ENOENT; |
786 | if (RTA_PAYLOAD(rta) < sizeof(*nu32)) |
787 | return -EINVAL; |
788 | if (rta->rta_type != CRYPTOA_U32) |
789 | return -EINVAL; |
790 | |
791 | nu32 = RTA_DATA(rta); |
792 | *num = nu32->num; |
793 | |
794 | return 0; |
795 | } |
796 | EXPORT_SYMBOL_GPL(crypto_attr_u32); |
797 | |
798 | void *crypto_alloc_instance2(const char *name, struct crypto_alg *alg, |
799 | unsigned int head) |
800 | { |
801 | struct crypto_instance *inst; |
802 | char *p; |
803 | int err; |
804 | |
805 | p = kzalloc(head + sizeof(*inst) + sizeof(struct crypto_spawn), |
806 | GFP_KERNEL); |
807 | if (!p) |
808 | return ERR_PTR(-ENOMEM); |
809 | |
810 | inst = (void *)(p + head); |
811 | |
812 | err = -ENAMETOOLONG; |
813 | if (snprintf(inst->alg.cra_name, CRYPTO_MAX_ALG_NAME, "%s(%s)", name, |
814 | alg->cra_name) >= CRYPTO_MAX_ALG_NAME) |
815 | goto err_free_inst; |
816 | |
817 | if (snprintf(inst->alg.cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s(%s)", |
818 | name, alg->cra_driver_name) >= CRYPTO_MAX_ALG_NAME) |
819 | goto err_free_inst; |
820 | |
821 | return p; |
822 | |
823 | err_free_inst: |
824 | kfree(p); |
825 | return ERR_PTR(err); |
826 | } |
827 | EXPORT_SYMBOL_GPL(crypto_alloc_instance2); |
828 | |
829 | struct crypto_instance *crypto_alloc_instance(const char *name, |
830 | struct crypto_alg *alg) |
831 | { |
832 | struct crypto_instance *inst; |
833 | struct crypto_spawn *spawn; |
834 | int err; |
835 | |
836 | inst = crypto_alloc_instance2(name, alg, 0); |
837 | if (IS_ERR(inst)) |
838 | goto out; |
839 | |
840 | spawn = crypto_instance_ctx(inst); |
841 | err = crypto_init_spawn(spawn, alg, inst, |
842 | CRYPTO_ALG_TYPE_MASK | CRYPTO_ALG_ASYNC); |
843 | |
844 | if (err) |
845 | goto err_free_inst; |
846 | |
847 | return inst; |
848 | |
849 | err_free_inst: |
850 | kfree(inst); |
851 | inst = ERR_PTR(err); |
852 | |
853 | out: |
854 | return inst; |
855 | } |
856 | EXPORT_SYMBOL_GPL(crypto_alloc_instance); |
857 | |
858 | void crypto_init_queue(struct crypto_queue *queue, unsigned int max_qlen) |
859 | { |
860 | INIT_LIST_HEAD(&queue->list); |
861 | queue->backlog = &queue->list; |
862 | queue->qlen = 0; |
863 | queue->max_qlen = max_qlen; |
864 | } |
865 | EXPORT_SYMBOL_GPL(crypto_init_queue); |
866 | |
867 | int crypto_enqueue_request(struct crypto_queue *queue, |
868 | struct crypto_async_request *request) |
869 | { |
870 | int err = -EINPROGRESS; |
871 | |
872 | if (unlikely(queue->qlen >= queue->max_qlen)) { |
873 | err = -EBUSY; |
874 | if (!(request->flags & CRYPTO_TFM_REQ_MAY_BACKLOG)) |
875 | goto out; |
876 | if (queue->backlog == &queue->list) |
877 | queue->backlog = &request->list; |
878 | } |
879 | |
880 | queue->qlen++; |
881 | list_add_tail(&request->list, &queue->list); |
882 | |
883 | out: |
884 | return err; |
885 | } |
886 | EXPORT_SYMBOL_GPL(crypto_enqueue_request); |
887 | |
888 | void *__crypto_dequeue_request(struct crypto_queue *queue, unsigned int offset) |
889 | { |
890 | struct list_head *request; |
891 | |
892 | if (unlikely(!queue->qlen)) |
893 | return NULL; |
894 | |
895 | queue->qlen--; |
896 | |
897 | if (queue->backlog != &queue->list) |
898 | queue->backlog = queue->backlog->next; |
899 | |
900 | request = queue->list.next; |
901 | list_del(request); |
902 | |
903 | return (char *)list_entry(request, struct crypto_async_request, list) - |
904 | offset; |
905 | } |
906 | EXPORT_SYMBOL_GPL(__crypto_dequeue_request); |
907 | |
908 | struct crypto_async_request *crypto_dequeue_request(struct crypto_queue *queue) |
909 | { |
910 | return __crypto_dequeue_request(queue, 0); |
911 | } |
912 | EXPORT_SYMBOL_GPL(crypto_dequeue_request); |
913 | |
914 | int crypto_tfm_in_queue(struct crypto_queue *queue, struct crypto_tfm *tfm) |
915 | { |
916 | struct crypto_async_request *req; |
917 | |
918 | list_for_each_entry(req, &queue->list, list) { |
919 | if (req->tfm == tfm) |
920 | return 1; |
921 | } |
922 | |
923 | return 0; |
924 | } |
925 | EXPORT_SYMBOL_GPL(crypto_tfm_in_queue); |
926 | |
927 | static inline void crypto_inc_byte(u8 *a, unsigned int size) |
928 | { |
929 | u8 *b = (a + size); |
930 | u8 c; |
931 | |
932 | for (; size; size--) { |
933 | c = *--b + 1; |
934 | *b = c; |
935 | if (c) |
936 | break; |
937 | } |
938 | } |
939 | |
940 | void crypto_inc(u8 *a, unsigned int size) |
941 | { |
942 | __be32 *b = (__be32 *)(a + size); |
943 | u32 c; |
944 | |
945 | for (; size >= 4; size -= 4) { |
946 | c = be32_to_cpu(*--b) + 1; |
947 | *b = cpu_to_be32(c); |
948 | if (c) |
949 | return; |
950 | } |
951 | |
952 | crypto_inc_byte(a, size); |
953 | } |
954 | EXPORT_SYMBOL_GPL(crypto_inc); |
955 | |
956 | static inline void crypto_xor_byte(u8 *a, const u8 *b, unsigned int size) |
957 | { |
958 | for (; size; size--) |
959 | *a++ ^= *b++; |
960 | } |
961 | |
962 | void crypto_xor(u8 *dst, const u8 *src, unsigned int size) |
963 | { |
964 | u32 *a = (u32 *)dst; |
965 | u32 *b = (u32 *)src; |
966 | |
967 | for (; size >= 4; size -= 4) |
968 | *a++ ^= *b++; |
969 | |
970 | crypto_xor_byte((u8 *)a, (u8 *)b, size); |
971 | } |
972 | EXPORT_SYMBOL_GPL(crypto_xor); |
973 | |
974 | static int __init crypto_algapi_init(void) |
975 | { |
976 | crypto_init_proc(); |
977 | return 0; |
978 | } |
979 | |
980 | static void __exit crypto_algapi_exit(void) |
981 | { |
982 | crypto_exit_proc(); |
983 | } |
984 | |
985 | module_init(crypto_algapi_init); |
986 | module_exit(crypto_algapi_exit); |
987 | |
988 | MODULE_LICENSE("GPL"); |
989 | MODULE_DESCRIPTION("Cryptographic algorithms API"); |
990 |
Branches:
ben-wpan
ben-wpan-stefan
javiroman/ks7010
jz-2.6.34
jz-2.6.34-rc5
jz-2.6.34-rc6
jz-2.6.34-rc7
jz-2.6.35
jz-2.6.36
jz-2.6.37
jz-2.6.38
jz-2.6.39
jz-3.0
jz-3.1
jz-3.11
jz-3.12
jz-3.13
jz-3.15
jz-3.16
jz-3.18-dt
jz-3.2
jz-3.3
jz-3.4
jz-3.5
jz-3.6
jz-3.6-rc2-pwm
jz-3.9
jz-3.9-clk
jz-3.9-rc8
jz47xx
jz47xx-2.6.38
master
Tags:
od-2011-09-04
od-2011-09-18
v2.6.34-rc5
v2.6.34-rc6
v2.6.34-rc7
v3.9