Merge master.kernel.org:/pub/scm/linux/kernel/git/dtor/input
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / crypto / api.c
1 /*
2 * Scatterlist Cryptographic API.
3 *
4 * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
5 * Copyright (c) 2002 David S. Miller (davem@redhat.com)
6 * Copyright (c) 2005 Herbert Xu <herbert@gondor.apana.org.au>
7 *
8 * Portions derived from Cryptoapi, by Alexander Kjeldaas <astor@fast.no>
9 * and Nettle, by Niels Möller.
10 *
11 * This program is free software; you can redistribute it and/or modify it
12 * under the terms of the GNU General Public License as published by the Free
13 * Software Foundation; either version 2 of the License, or (at your option)
14 * any later version.
15 *
16 */
17
18 #include <linux/compiler.h>
19 #include <linux/init.h>
20 #include <linux/crypto.h>
21 #include <linux/errno.h>
22 #include <linux/kernel.h>
23 #include <linux/kmod.h>
24 #include <linux/rwsem.h>
25 #include <linux/slab.h>
26 #include <linux/string.h>
27 #include "internal.h"
28
29 LIST_HEAD(crypto_alg_list);
30 DECLARE_RWSEM(crypto_alg_sem);
31
32 static inline int crypto_alg_get(struct crypto_alg *alg)
33 {
34 return try_module_get(alg->cra_module);
35 }
36
37 static inline void crypto_alg_put(struct crypto_alg *alg)
38 {
39 module_put(alg->cra_module);
40 }
41
42 static struct crypto_alg *crypto_alg_lookup(const char *name)
43 {
44 struct crypto_alg *q, *alg = NULL;
45 int best = -1;
46
47 if (!name)
48 return NULL;
49
50 down_read(&crypto_alg_sem);
51
52 list_for_each_entry(q, &crypto_alg_list, cra_list) {
53 int exact, fuzzy;
54
55 exact = !strcmp(q->cra_driver_name, name);
56 fuzzy = !strcmp(q->cra_name, name);
57 if (!exact && !(fuzzy && q->cra_priority > best))
58 continue;
59
60 if (unlikely(!crypto_alg_get(q)))
61 continue;
62
63 best = q->cra_priority;
64 if (alg)
65 crypto_alg_put(alg);
66 alg = q;
67
68 if (exact)
69 break;
70 }
71
72 up_read(&crypto_alg_sem);
73 return alg;
74 }
75
76 /* A far more intelligent version of this is planned. For now, just
77 * try an exact match on the name of the algorithm. */
78 static inline struct crypto_alg *crypto_alg_mod_lookup(const char *name)
79 {
80 return try_then_request_module(crypto_alg_lookup(name), name);
81 }
82
83 static int crypto_init_flags(struct crypto_tfm *tfm, u32 flags)
84 {
85 tfm->crt_flags = flags & CRYPTO_TFM_REQ_MASK;
86 flags &= ~CRYPTO_TFM_REQ_MASK;
87
88 switch (crypto_tfm_alg_type(tfm)) {
89 case CRYPTO_ALG_TYPE_CIPHER:
90 return crypto_init_cipher_flags(tfm, flags);
91
92 case CRYPTO_ALG_TYPE_DIGEST:
93 return crypto_init_digest_flags(tfm, flags);
94
95 case CRYPTO_ALG_TYPE_COMPRESS:
96 return crypto_init_compress_flags(tfm, flags);
97
98 default:
99 break;
100 }
101
102 BUG();
103 return -EINVAL;
104 }
105
106 static int crypto_init_ops(struct crypto_tfm *tfm)
107 {
108 switch (crypto_tfm_alg_type(tfm)) {
109 case CRYPTO_ALG_TYPE_CIPHER:
110 return crypto_init_cipher_ops(tfm);
111
112 case CRYPTO_ALG_TYPE_DIGEST:
113 return crypto_init_digest_ops(tfm);
114
115 case CRYPTO_ALG_TYPE_COMPRESS:
116 return crypto_init_compress_ops(tfm);
117
118 default:
119 break;
120 }
121
122 BUG();
123 return -EINVAL;
124 }
125
126 static void crypto_exit_ops(struct crypto_tfm *tfm)
127 {
128 switch (crypto_tfm_alg_type(tfm)) {
129 case CRYPTO_ALG_TYPE_CIPHER:
130 crypto_exit_cipher_ops(tfm);
131 break;
132
133 case CRYPTO_ALG_TYPE_DIGEST:
134 crypto_exit_digest_ops(tfm);
135 break;
136
137 case CRYPTO_ALG_TYPE_COMPRESS:
138 crypto_exit_compress_ops(tfm);
139 break;
140
141 default:
142 BUG();
143
144 }
145 }
146
147 static unsigned int crypto_ctxsize(struct crypto_alg *alg, int flags)
148 {
149 unsigned int len;
150
151 switch (alg->cra_flags & CRYPTO_ALG_TYPE_MASK) {
152 default:
153 BUG();
154
155 case CRYPTO_ALG_TYPE_CIPHER:
156 len = crypto_cipher_ctxsize(alg, flags);
157 break;
158
159 case CRYPTO_ALG_TYPE_DIGEST:
160 len = crypto_digest_ctxsize(alg, flags);
161 break;
162
163 case CRYPTO_ALG_TYPE_COMPRESS:
164 len = crypto_compress_ctxsize(alg, flags);
165 break;
166 }
167
168 return len + alg->cra_alignmask;
169 }
170
171 struct crypto_tfm *crypto_alloc_tfm(const char *name, u32 flags)
172 {
173 struct crypto_tfm *tfm = NULL;
174 struct crypto_alg *alg;
175 unsigned int tfm_size;
176
177 alg = crypto_alg_mod_lookup(name);
178 if (alg == NULL)
179 goto out;
180
181 tfm_size = sizeof(*tfm) + crypto_ctxsize(alg, flags);
182 tfm = kmalloc(tfm_size, GFP_KERNEL);
183 if (tfm == NULL)
184 goto out_put;
185
186 memset(tfm, 0, tfm_size);
187
188 tfm->__crt_alg = alg;
189
190 if (crypto_init_flags(tfm, flags))
191 goto out_free_tfm;
192
193 if (crypto_init_ops(tfm)) {
194 crypto_exit_ops(tfm);
195 goto out_free_tfm;
196 }
197
198 goto out;
199
200 out_free_tfm:
201 kfree(tfm);
202 tfm = NULL;
203 out_put:
204 crypto_alg_put(alg);
205 out:
206 return tfm;
207 }
208
209 void crypto_free_tfm(struct crypto_tfm *tfm)
210 {
211 struct crypto_alg *alg;
212 int size;
213
214 if (unlikely(!tfm))
215 return;
216
217 alg = tfm->__crt_alg;
218 size = sizeof(*tfm) + alg->cra_ctxsize;
219
220 crypto_exit_ops(tfm);
221 crypto_alg_put(alg);
222 memset(tfm, 0, size);
223 kfree(tfm);
224 }
225
226 static inline int crypto_set_driver_name(struct crypto_alg *alg)
227 {
228 static const char suffix[] = "-generic";
229 char *driver_name = (char *)alg->cra_driver_name;
230 int len;
231
232 if (*driver_name)
233 return 0;
234
235 len = strlcpy(driver_name, alg->cra_name, CRYPTO_MAX_ALG_NAME);
236 if (len + sizeof(suffix) > CRYPTO_MAX_ALG_NAME)
237 return -ENAMETOOLONG;
238
239 memcpy(driver_name + len, suffix, sizeof(suffix));
240 return 0;
241 }
242
243 int crypto_register_alg(struct crypto_alg *alg)
244 {
245 int ret;
246 struct crypto_alg *q;
247
248 if (alg->cra_alignmask & (alg->cra_alignmask + 1))
249 return -EINVAL;
250
251 if (alg->cra_alignmask & alg->cra_blocksize)
252 return -EINVAL;
253
254 if (alg->cra_blocksize > PAGE_SIZE / 8)
255 return -EINVAL;
256
257 if (alg->cra_priority < 0)
258 return -EINVAL;
259
260 ret = crypto_set_driver_name(alg);
261 if (unlikely(ret))
262 return ret;
263
264 down_write(&crypto_alg_sem);
265
266 list_for_each_entry(q, &crypto_alg_list, cra_list) {
267 if (!strcmp(q->cra_driver_name, alg->cra_driver_name)) {
268 ret = -EEXIST;
269 goto out;
270 }
271 }
272
273 list_add_tail(&alg->cra_list, &crypto_alg_list);
274 out:
275 up_write(&crypto_alg_sem);
276 return ret;
277 }
278
279 int crypto_unregister_alg(struct crypto_alg *alg)
280 {
281 int ret = -ENOENT;
282 struct crypto_alg *q;
283
284 BUG_ON(!alg->cra_module);
285
286 down_write(&crypto_alg_sem);
287 list_for_each_entry(q, &crypto_alg_list, cra_list) {
288 if (alg == q) {
289 list_del(&alg->cra_list);
290 ret = 0;
291 goto out;
292 }
293 }
294 out:
295 up_write(&crypto_alg_sem);
296 return ret;
297 }
298
299 int crypto_alg_available(const char *name, u32 flags)
300 {
301 int ret = 0;
302 struct crypto_alg *alg = crypto_alg_mod_lookup(name);
303
304 if (alg) {
305 crypto_alg_put(alg);
306 ret = 1;
307 }
308
309 return ret;
310 }
311
312 static int __init init_crypto(void)
313 {
314 printk(KERN_INFO "Initializing Cryptographic API\n");
315 crypto_init_proc();
316 return 0;
317 }
318
319 __initcall(init_crypto);
320
321 EXPORT_SYMBOL_GPL(crypto_register_alg);
322 EXPORT_SYMBOL_GPL(crypto_unregister_alg);
323 EXPORT_SYMBOL_GPL(crypto_alloc_tfm);
324 EXPORT_SYMBOL_GPL(crypto_free_tfm);
325 EXPORT_SYMBOL_GPL(crypto_alg_available);