]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - crypto/proc.c
Introduce "hcall" pointer to indicate pending hypercall.
[mirror_ubuntu-artful-kernel.git] / crypto / proc.c
CommitLineData
1da177e4
LT
1/*
2 * Scatterlist Cryptographic API.
3 *
4 * Procfs information.
5 *
6 * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
5cb1454b 7 * Copyright (c) 2005 Herbert Xu <herbert@gondor.apana.org.au>
1da177e4
LT
8 *
9 * This program is free software; you can redistribute it and/or modify it
10 * under the terms of the GNU General Public License as published by the Free
11 * Software Foundation; either version 2 of the License, or (at your option)
12 * any later version.
13 *
14 */
6521f302
HX
15
16#include <asm/atomic.h>
1da177e4
LT
17#include <linux/init.h>
18#include <linux/crypto.h>
19#include <linux/rwsem.h>
20#include <linux/proc_fs.h>
21#include <linux/seq_file.h>
22#include "internal.h"
23
1da177e4
LT
24static void *c_start(struct seq_file *m, loff_t *pos)
25{
1da177e4 26 down_read(&crypto_alg_sem);
13d31894 27 return seq_list_start(&crypto_alg_list, *pos);
1da177e4
LT
28}
29
30static void *c_next(struct seq_file *m, void *p, loff_t *pos)
31{
13d31894 32 return seq_list_next(p, &crypto_alg_list, pos);
1da177e4
LT
33}
34
35static void c_stop(struct seq_file *m, void *p)
36{
37 up_read(&crypto_alg_sem);
38}
39
40static int c_show(struct seq_file *m, void *p)
41{
13d31894 42 struct crypto_alg *alg = list_entry(p, struct crypto_alg, cra_list);
1da177e4
LT
43
44 seq_printf(m, "name : %s\n", alg->cra_name);
5cb1454b 45 seq_printf(m, "driver : %s\n", alg->cra_driver_name);
1da177e4 46 seq_printf(m, "module : %s\n", module_name(alg->cra_module));
5cb1454b 47 seq_printf(m, "priority : %d\n", alg->cra_priority);
6521f302 48 seq_printf(m, "refcnt : %d\n", atomic_read(&alg->cra_refcnt));
1da177e4
LT
49
50 switch (alg->cra_flags & CRYPTO_ALG_TYPE_MASK) {
51 case CRYPTO_ALG_TYPE_CIPHER:
52 seq_printf(m, "type : cipher\n");
53 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize);
54 seq_printf(m, "min keysize : %u\n",
55 alg->cra_cipher.cia_min_keysize);
56 seq_printf(m, "max keysize : %u\n",
57 alg->cra_cipher.cia_max_keysize);
58 break;
59
60 case CRYPTO_ALG_TYPE_DIGEST:
61 seq_printf(m, "type : digest\n");
62 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize);
63 seq_printf(m, "digestsize : %u\n",
64 alg->cra_digest.dia_digestsize);
65 break;
66 case CRYPTO_ALG_TYPE_COMPRESS:
67 seq_printf(m, "type : compression\n");
68 break;
69 default:
e853c3cf
HX
70 if (alg->cra_type && alg->cra_type->show)
71 alg->cra_type->show(m, alg);
72 else
73 seq_printf(m, "type : unknown\n");
1da177e4
LT
74 break;
75 }
76
77 seq_putc(m, '\n');
78 return 0;
79}
80
81static struct seq_operations crypto_seq_ops = {
82 .start = c_start,
83 .next = c_next,
84 .stop = c_stop,
85 .show = c_show
86};
87
88static int crypto_info_open(struct inode *inode, struct file *file)
89{
90 return seq_open(file, &crypto_seq_ops);
91}
92
2b8693c0 93static const struct file_operations proc_crypto_ops = {
1da177e4
LT
94 .open = crypto_info_open,
95 .read = seq_read,
96 .llseek = seq_lseek,
97 .release = seq_release
98};
99
100void __init crypto_init_proc(void)
101{
102 struct proc_dir_entry *proc;
103
104 proc = create_proc_entry("crypto", 0, NULL);
105 if (proc)
106 proc->proc_fops = &proc_crypto_ops;
107}
cce9e06d
HX
108
109void __exit crypto_exit_proc(void)
110{
111 remove_proc_entry("crypto", NULL);
112}