|  | /* | 
|  | * Scatterlist Cryptographic API. | 
|  | * | 
|  | * Copyright (c) 2002 James Morris <jmorris@intercode.com.au> | 
|  | * Copyright (c) 2002 David S. Miller (davem@redhat.com) | 
|  | * Copyright (c) 2005 Herbert Xu <herbert@gondor.apana.org.au> | 
|  | * | 
|  | * Portions derived from Cryptoapi, by Alexander Kjeldaas <astor@fast.no> | 
|  | * and Nettle, by Niels Möller. | 
|  | * | 
|  | * This program is free software; you can redistribute it and/or modify it | 
|  | * under the terms of the GNU General Public License as published by the Free | 
|  | * Software Foundation; either version 2 of the License, or (at your option) | 
|  | * any later version. | 
|  | * | 
|  | */ | 
|  |  | 
|  | #include <linux/compiler.h> | 
|  | #include <linux/init.h> | 
|  | #include <linux/crypto.h> | 
|  | #include <linux/errno.h> | 
|  | #include <linux/kernel.h> | 
|  | #include <linux/kmod.h> | 
|  | #include <linux/rwsem.h> | 
|  | #include <linux/slab.h> | 
|  | #include <linux/string.h> | 
|  | #include "internal.h" | 
|  |  | 
|  | LIST_HEAD(crypto_alg_list); | 
|  | DECLARE_RWSEM(crypto_alg_sem); | 
|  |  | 
|  | static inline int crypto_alg_get(struct crypto_alg *alg) | 
|  | { | 
|  | return try_module_get(alg->cra_module); | 
|  | } | 
|  |  | 
|  | static inline void crypto_alg_put(struct crypto_alg *alg) | 
|  | { | 
|  | module_put(alg->cra_module); | 
|  | } | 
|  |  | 
|  | static struct crypto_alg *crypto_alg_lookup(const char *name) | 
|  | { | 
|  | struct crypto_alg *q, *alg = NULL; | 
|  | int best = -1; | 
|  |  | 
|  | if (!name) | 
|  | return NULL; | 
|  |  | 
|  | down_read(&crypto_alg_sem); | 
|  |  | 
|  | list_for_each_entry(q, &crypto_alg_list, cra_list) { | 
|  | int exact, fuzzy; | 
|  |  | 
|  | exact = !strcmp(q->cra_driver_name, name); | 
|  | fuzzy = !strcmp(q->cra_name, name); | 
|  | if (!exact && !(fuzzy && q->cra_priority > best)) | 
|  | continue; | 
|  |  | 
|  | if (unlikely(!crypto_alg_get(q))) | 
|  | continue; | 
|  |  | 
|  | best = q->cra_priority; | 
|  | if (alg) | 
|  | crypto_alg_put(alg); | 
|  | alg = q; | 
|  |  | 
|  | if (exact) | 
|  | break; | 
|  | } | 
|  |  | 
|  | up_read(&crypto_alg_sem); | 
|  | return alg; | 
|  | } | 
|  |  | 
|  | /* A far more intelligent version of this is planned.  For now, just | 
|  | * try an exact match on the name of the algorithm. */ | 
|  | static inline struct crypto_alg *crypto_alg_mod_lookup(const char *name) | 
|  | { | 
|  | return try_then_request_module(crypto_alg_lookup(name), name); | 
|  | } | 
|  |  | 
|  | static int crypto_init_flags(struct crypto_tfm *tfm, u32 flags) | 
|  | { | 
|  | tfm->crt_flags = flags & CRYPTO_TFM_REQ_MASK; | 
|  | flags &= ~CRYPTO_TFM_REQ_MASK; | 
|  |  | 
|  | switch (crypto_tfm_alg_type(tfm)) { | 
|  | case CRYPTO_ALG_TYPE_CIPHER: | 
|  | return crypto_init_cipher_flags(tfm, flags); | 
|  |  | 
|  | case CRYPTO_ALG_TYPE_DIGEST: | 
|  | return crypto_init_digest_flags(tfm, flags); | 
|  |  | 
|  | case CRYPTO_ALG_TYPE_COMPRESS: | 
|  | return crypto_init_compress_flags(tfm, flags); | 
|  |  | 
|  | default: | 
|  | break; | 
|  | } | 
|  |  | 
|  | BUG(); | 
|  | return -EINVAL; | 
|  | } | 
|  |  | 
|  | static int crypto_init_ops(struct crypto_tfm *tfm) | 
|  | { | 
|  | switch (crypto_tfm_alg_type(tfm)) { | 
|  | case CRYPTO_ALG_TYPE_CIPHER: | 
|  | return crypto_init_cipher_ops(tfm); | 
|  |  | 
|  | case CRYPTO_ALG_TYPE_DIGEST: | 
|  | return crypto_init_digest_ops(tfm); | 
|  |  | 
|  | case CRYPTO_ALG_TYPE_COMPRESS: | 
|  | return crypto_init_compress_ops(tfm); | 
|  |  | 
|  | default: | 
|  | break; | 
|  | } | 
|  |  | 
|  | BUG(); | 
|  | return -EINVAL; | 
|  | } | 
|  |  | 
|  | static void crypto_exit_ops(struct crypto_tfm *tfm) | 
|  | { | 
|  | switch (crypto_tfm_alg_type(tfm)) { | 
|  | case CRYPTO_ALG_TYPE_CIPHER: | 
|  | crypto_exit_cipher_ops(tfm); | 
|  | break; | 
|  |  | 
|  | case CRYPTO_ALG_TYPE_DIGEST: | 
|  | crypto_exit_digest_ops(tfm); | 
|  | break; | 
|  |  | 
|  | case CRYPTO_ALG_TYPE_COMPRESS: | 
|  | crypto_exit_compress_ops(tfm); | 
|  | break; | 
|  |  | 
|  | default: | 
|  | BUG(); | 
|  |  | 
|  | } | 
|  | } | 
|  |  | 
|  | static unsigned int crypto_ctxsize(struct crypto_alg *alg, int flags) | 
|  | { | 
|  | unsigned int len; | 
|  |  | 
|  | switch (alg->cra_flags & CRYPTO_ALG_TYPE_MASK) { | 
|  | default: | 
|  | BUG(); | 
|  |  | 
|  | case CRYPTO_ALG_TYPE_CIPHER: | 
|  | len = crypto_cipher_ctxsize(alg, flags); | 
|  | break; | 
|  |  | 
|  | case CRYPTO_ALG_TYPE_DIGEST: | 
|  | len = crypto_digest_ctxsize(alg, flags); | 
|  | break; | 
|  |  | 
|  | case CRYPTO_ALG_TYPE_COMPRESS: | 
|  | len = crypto_compress_ctxsize(alg, flags); | 
|  | break; | 
|  | } | 
|  |  | 
|  | return len + (alg->cra_alignmask & ~(crypto_tfm_ctx_alignment() - 1)); | 
|  | } | 
|  |  | 
|  | struct crypto_tfm *crypto_alloc_tfm(const char *name, u32 flags) | 
|  | { | 
|  | struct crypto_tfm *tfm = NULL; | 
|  | struct crypto_alg *alg; | 
|  | unsigned int tfm_size; | 
|  |  | 
|  | alg = crypto_alg_mod_lookup(name); | 
|  | if (alg == NULL) | 
|  | goto out; | 
|  |  | 
|  | tfm_size = sizeof(*tfm) + crypto_ctxsize(alg, flags); | 
|  | tfm = kzalloc(tfm_size, GFP_KERNEL); | 
|  | if (tfm == NULL) | 
|  | goto out_put; | 
|  |  | 
|  | tfm->__crt_alg = alg; | 
|  |  | 
|  | if (crypto_init_flags(tfm, flags)) | 
|  | goto out_free_tfm; | 
|  |  | 
|  | if (crypto_init_ops(tfm)) { | 
|  | crypto_exit_ops(tfm); | 
|  | goto out_free_tfm; | 
|  | } | 
|  |  | 
|  | goto out; | 
|  |  | 
|  | out_free_tfm: | 
|  | kfree(tfm); | 
|  | tfm = NULL; | 
|  | out_put: | 
|  | crypto_alg_put(alg); | 
|  | out: | 
|  | return tfm; | 
|  | } | 
|  |  | 
|  | void crypto_free_tfm(struct crypto_tfm *tfm) | 
|  | { | 
|  | struct crypto_alg *alg; | 
|  | int size; | 
|  |  | 
|  | if (unlikely(!tfm)) | 
|  | return; | 
|  |  | 
|  | alg = tfm->__crt_alg; | 
|  | size = sizeof(*tfm) + alg->cra_ctxsize; | 
|  |  | 
|  | crypto_exit_ops(tfm); | 
|  | crypto_alg_put(alg); | 
|  | memset(tfm, 0, size); | 
|  | kfree(tfm); | 
|  | } | 
|  |  | 
|  | static inline int crypto_set_driver_name(struct crypto_alg *alg) | 
|  | { | 
|  | static const char suffix[] = "-generic"; | 
|  | char *driver_name = (char *)alg->cra_driver_name; | 
|  | int len; | 
|  |  | 
|  | if (*driver_name) | 
|  | return 0; | 
|  |  | 
|  | len = strlcpy(driver_name, alg->cra_name, CRYPTO_MAX_ALG_NAME); | 
|  | if (len + sizeof(suffix) > CRYPTO_MAX_ALG_NAME) | 
|  | return -ENAMETOOLONG; | 
|  |  | 
|  | memcpy(driver_name + len, suffix, sizeof(suffix)); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int crypto_register_alg(struct crypto_alg *alg) | 
|  | { | 
|  | int ret; | 
|  | struct crypto_alg *q; | 
|  |  | 
|  | if (alg->cra_alignmask & (alg->cra_alignmask + 1)) | 
|  | return -EINVAL; | 
|  |  | 
|  | if (alg->cra_alignmask & alg->cra_blocksize) | 
|  | return -EINVAL; | 
|  |  | 
|  | if (alg->cra_blocksize > PAGE_SIZE / 8) | 
|  | return -EINVAL; | 
|  |  | 
|  | if (alg->cra_priority < 0) | 
|  | return -EINVAL; | 
|  |  | 
|  | ret = crypto_set_driver_name(alg); | 
|  | if (unlikely(ret)) | 
|  | return ret; | 
|  |  | 
|  | down_write(&crypto_alg_sem); | 
|  |  | 
|  | list_for_each_entry(q, &crypto_alg_list, cra_list) { | 
|  | if (!strcmp(q->cra_driver_name, alg->cra_driver_name)) { | 
|  | ret = -EEXIST; | 
|  | goto out; | 
|  | } | 
|  | } | 
|  |  | 
|  | list_add_tail(&alg->cra_list, &crypto_alg_list); | 
|  | out: | 
|  | up_write(&crypto_alg_sem); | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | int crypto_unregister_alg(struct crypto_alg *alg) | 
|  | { | 
|  | int ret = -ENOENT; | 
|  | struct crypto_alg *q; | 
|  |  | 
|  | BUG_ON(!alg->cra_module); | 
|  |  | 
|  | down_write(&crypto_alg_sem); | 
|  | list_for_each_entry(q, &crypto_alg_list, cra_list) { | 
|  | if (alg == q) { | 
|  | list_del(&alg->cra_list); | 
|  | ret = 0; | 
|  | goto out; | 
|  | } | 
|  | } | 
|  | out: | 
|  | up_write(&crypto_alg_sem); | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | int crypto_alg_available(const char *name, u32 flags) | 
|  | { | 
|  | int ret = 0; | 
|  | struct crypto_alg *alg = crypto_alg_mod_lookup(name); | 
|  |  | 
|  | if (alg) { | 
|  | crypto_alg_put(alg); | 
|  | ret = 1; | 
|  | } | 
|  |  | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | static int __init init_crypto(void) | 
|  | { | 
|  | printk(KERN_INFO "Initializing Cryptographic API\n"); | 
|  | crypto_init_proc(); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | __initcall(init_crypto); | 
|  |  | 
|  | EXPORT_SYMBOL_GPL(crypto_register_alg); | 
|  | EXPORT_SYMBOL_GPL(crypto_unregister_alg); | 
|  | EXPORT_SYMBOL_GPL(crypto_alloc_tfm); | 
|  | EXPORT_SYMBOL_GPL(crypto_free_tfm); | 
|  | EXPORT_SYMBOL_GPL(crypto_alg_available); |