]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blob - crypto/algboss.c
Merge branch 'v4l_for_linus' of git://git.kernel.org/pub/scm/linux/kernel/git/mchehab...
[mirror_ubuntu-zesty-kernel.git] / crypto / algboss.c
1 /*
2 * Create default crypto algorithm instances.
3 *
4 * Copyright (c) 2006 Herbert Xu <herbert@gondor.apana.org.au>
5 *
6 * This program is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the Free
8 * Software Foundation; either version 2 of the License, or (at your option)
9 * any later version.
10 *
11 */
12
13 #include <crypto/internal/aead.h>
14 #include <linux/completion.h>
15 #include <linux/ctype.h>
16 #include <linux/err.h>
17 #include <linux/init.h>
18 #include <linux/kthread.h>
19 #include <linux/module.h>
20 #include <linux/notifier.h>
21 #include <linux/rtnetlink.h>
22 #include <linux/sched.h>
23 #include <linux/slab.h>
24 #include <linux/string.h>
25
26 #include "internal.h"
27
28 struct cryptomgr_param {
29 struct rtattr *tb[CRYPTO_MAX_ATTRS + 2];
30
31 struct {
32 struct rtattr attr;
33 struct crypto_attr_type data;
34 } type;
35
36 union {
37 struct rtattr attr;
38 struct {
39 struct rtattr attr;
40 struct crypto_attr_alg data;
41 } alg;
42 struct {
43 struct rtattr attr;
44 struct crypto_attr_u32 data;
45 } nu32;
46 } attrs[CRYPTO_MAX_ATTRS];
47
48 char larval[CRYPTO_MAX_ALG_NAME];
49 char template[CRYPTO_MAX_ALG_NAME];
50
51 struct completion *completion;
52
53 u32 otype;
54 u32 omask;
55 };
56
57 struct crypto_test_param {
58 char driver[CRYPTO_MAX_ALG_NAME];
59 char alg[CRYPTO_MAX_ALG_NAME];
60 u32 type;
61 };
62
63 static int cryptomgr_probe(void *data)
64 {
65 struct cryptomgr_param *param = data;
66 struct crypto_template *tmpl;
67 struct crypto_instance *inst;
68 int err;
69
70 tmpl = crypto_lookup_template(param->template);
71 if (!tmpl)
72 goto out;
73
74 do {
75 if (tmpl->create) {
76 err = tmpl->create(tmpl, param->tb);
77 continue;
78 }
79
80 inst = tmpl->alloc(param->tb);
81 if (IS_ERR(inst))
82 err = PTR_ERR(inst);
83 else if ((err = crypto_register_instance(tmpl, inst)))
84 tmpl->free(inst);
85 } while (err == -EAGAIN && !signal_pending(current));
86
87 crypto_tmpl_put(tmpl);
88
89 out:
90 complete_all(param->completion);
91 kfree(param);
92 module_put_and_exit(0);
93 }
94
95 static int cryptomgr_schedule_probe(struct crypto_larval *larval)
96 {
97 struct task_struct *thread;
98 struct cryptomgr_param *param;
99 const char *name = larval->alg.cra_name;
100 const char *p;
101 unsigned int len;
102 int i;
103
104 if (!try_module_get(THIS_MODULE))
105 goto err;
106
107 param = kzalloc(sizeof(*param), GFP_KERNEL);
108 if (!param)
109 goto err_put_module;
110
111 for (p = name; isalnum(*p) || *p == '-' || *p == '_'; p++)
112 ;
113
114 len = p - name;
115 if (!len || *p != '(')
116 goto err_free_param;
117
118 memcpy(param->template, name, len);
119
120 i = 0;
121 for (;;) {
122 int notnum = 0;
123
124 name = ++p;
125 len = 0;
126
127 for (; isalnum(*p) || *p == '-' || *p == '_'; p++)
128 notnum |= !isdigit(*p);
129
130 if (*p == '(') {
131 int recursion = 0;
132
133 for (;;) {
134 if (!*++p)
135 goto err_free_param;
136 if (*p == '(')
137 recursion++;
138 else if (*p == ')' && !recursion--)
139 break;
140 }
141
142 notnum = 1;
143 p++;
144 }
145
146 len = p - name;
147 if (!len)
148 goto err_free_param;
149
150 if (notnum) {
151 param->attrs[i].alg.attr.rta_len =
152 sizeof(param->attrs[i].alg);
153 param->attrs[i].alg.attr.rta_type = CRYPTOA_ALG;
154 memcpy(param->attrs[i].alg.data.name, name, len);
155 } else {
156 param->attrs[i].nu32.attr.rta_len =
157 sizeof(param->attrs[i].nu32);
158 param->attrs[i].nu32.attr.rta_type = CRYPTOA_U32;
159 param->attrs[i].nu32.data.num =
160 simple_strtol(name, NULL, 0);
161 }
162
163 param->tb[i + 1] = &param->attrs[i].attr;
164 i++;
165
166 if (i >= CRYPTO_MAX_ATTRS)
167 goto err_free_param;
168
169 if (*p == ')')
170 break;
171
172 if (*p != ',')
173 goto err_free_param;
174 }
175
176 if (!i)
177 goto err_free_param;
178
179 param->tb[i + 1] = NULL;
180
181 param->type.attr.rta_len = sizeof(param->type);
182 param->type.attr.rta_type = CRYPTOA_TYPE;
183 param->type.data.type = larval->alg.cra_flags & ~CRYPTO_ALG_TESTED;
184 param->type.data.mask = larval->mask & ~CRYPTO_ALG_TESTED;
185 param->tb[0] = &param->type.attr;
186
187 param->otype = larval->alg.cra_flags;
188 param->omask = larval->mask;
189
190 memcpy(param->larval, larval->alg.cra_name, CRYPTO_MAX_ALG_NAME);
191
192 param->completion = &larval->completion;
193
194 thread = kthread_run(cryptomgr_probe, param, "cryptomgr_probe");
195 if (IS_ERR(thread))
196 goto err_free_param;
197
198 wait_for_completion_interruptible(&larval->completion);
199
200 return NOTIFY_STOP;
201
202 err_free_param:
203 kfree(param);
204 err_put_module:
205 module_put(THIS_MODULE);
206 err:
207 return NOTIFY_OK;
208 }
209
210 static int cryptomgr_test(void *data)
211 {
212 struct crypto_test_param *param = data;
213 u32 type = param->type;
214 int err = 0;
215
216 #ifdef CONFIG_CRYPTO_MANAGER_DISABLE_TESTS
217 goto skiptest;
218 #endif
219
220 if (type & CRYPTO_ALG_TESTED)
221 goto skiptest;
222
223 err = alg_test(param->driver, param->alg, type, CRYPTO_ALG_TESTED);
224
225 skiptest:
226 crypto_alg_tested(param->driver, err);
227
228 kfree(param);
229 module_put_and_exit(0);
230 }
231
232 static int cryptomgr_schedule_test(struct crypto_alg *alg)
233 {
234 struct task_struct *thread;
235 struct crypto_test_param *param;
236 u32 type;
237
238 if (!try_module_get(THIS_MODULE))
239 goto err;
240
241 param = kzalloc(sizeof(*param), GFP_KERNEL);
242 if (!param)
243 goto err_put_module;
244
245 memcpy(param->driver, alg->cra_driver_name, sizeof(param->driver));
246 memcpy(param->alg, alg->cra_name, sizeof(param->alg));
247 type = alg->cra_flags;
248
249 /* This piece of crap needs to disappear into per-type test hooks. */
250 if ((!((type ^ CRYPTO_ALG_TYPE_BLKCIPHER) &
251 CRYPTO_ALG_TYPE_BLKCIPHER_MASK) && !(type & CRYPTO_ALG_GENIV) &&
252 ((alg->cra_flags & CRYPTO_ALG_TYPE_MASK) ==
253 CRYPTO_ALG_TYPE_BLKCIPHER ? alg->cra_blkcipher.ivsize :
254 alg->cra_ablkcipher.ivsize)) ||
255 (!((type ^ CRYPTO_ALG_TYPE_AEAD) & CRYPTO_ALG_TYPE_MASK) &&
256 alg->cra_type == &crypto_nivaead_type && alg->cra_aead.ivsize))
257 type |= CRYPTO_ALG_TESTED;
258
259 param->type = type;
260
261 thread = kthread_run(cryptomgr_test, param, "cryptomgr_test");
262 if (IS_ERR(thread))
263 goto err_free_param;
264
265 return NOTIFY_STOP;
266
267 err_free_param:
268 kfree(param);
269 err_put_module:
270 module_put(THIS_MODULE);
271 err:
272 return NOTIFY_OK;
273 }
274
275 static int cryptomgr_notify(struct notifier_block *this, unsigned long msg,
276 void *data)
277 {
278 switch (msg) {
279 case CRYPTO_MSG_ALG_REQUEST:
280 return cryptomgr_schedule_probe(data);
281 case CRYPTO_MSG_ALG_REGISTER:
282 return cryptomgr_schedule_test(data);
283 }
284
285 return NOTIFY_DONE;
286 }
287
288 static struct notifier_block cryptomgr_notifier = {
289 .notifier_call = cryptomgr_notify,
290 };
291
292 static int __init cryptomgr_init(void)
293 {
294 return crypto_register_notifier(&cryptomgr_notifier);
295 }
296
297 static void __exit cryptomgr_exit(void)
298 {
299 int err = crypto_unregister_notifier(&cryptomgr_notifier);
300 BUG_ON(err);
301 }
302
303 subsys_initcall(cryptomgr_init);
304 module_exit(cryptomgr_exit);
305
306 MODULE_LICENSE("GPL");
307 MODULE_DESCRIPTION("Crypto Algorithm Manager");