[CRYPTO] blkcipher: Remove alignment restriction on block size
[deliverable/linux.git] / crypto / algapi.c
1 /*
2 * Cryptographic API for algorithms (i.e., low-level API).
3 *
4 * Copyright (c) 2006 Herbert Xu <herbert@gondor.apana.org.au>
5 *
6 * This program is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the Free
8 * Software Foundation; either version 2 of the License, or (at your option)
9 * any later version.
10 *
11 */
12
13 #include <linux/err.h>
14 #include <linux/errno.h>
15 #include <linux/init.h>
16 #include <linux/kernel.h>
17 #include <linux/list.h>
18 #include <linux/module.h>
19 #include <linux/rtnetlink.h>
20 #include <linux/string.h>
21
22 #include "internal.h"
23
24 static LIST_HEAD(crypto_template_list);
25
26 void crypto_larval_error(const char *name, u32 type, u32 mask)
27 {
28 struct crypto_alg *alg;
29
30 down_read(&crypto_alg_sem);
31 alg = __crypto_alg_lookup(name, type, mask);
32 up_read(&crypto_alg_sem);
33
34 if (alg) {
35 if (crypto_is_larval(alg)) {
36 struct crypto_larval *larval = (void *)alg;
37 complete_all(&larval->completion);
38 }
39 crypto_mod_put(alg);
40 }
41 }
42 EXPORT_SYMBOL_GPL(crypto_larval_error);
43
44 static inline int crypto_set_driver_name(struct crypto_alg *alg)
45 {
46 static const char suffix[] = "-generic";
47 char *driver_name = alg->cra_driver_name;
48 int len;
49
50 if (*driver_name)
51 return 0;
52
53 len = strlcpy(driver_name, alg->cra_name, CRYPTO_MAX_ALG_NAME);
54 if (len + sizeof(suffix) > CRYPTO_MAX_ALG_NAME)
55 return -ENAMETOOLONG;
56
57 memcpy(driver_name + len, suffix, sizeof(suffix));
58 return 0;
59 }
60
61 static int crypto_check_alg(struct crypto_alg *alg)
62 {
63 if (alg->cra_alignmask & (alg->cra_alignmask + 1))
64 return -EINVAL;
65
66 if (alg->cra_blocksize > PAGE_SIZE / 8)
67 return -EINVAL;
68
69 if (alg->cra_priority < 0)
70 return -EINVAL;
71
72 return crypto_set_driver_name(alg);
73 }
74
75 static void crypto_destroy_instance(struct crypto_alg *alg)
76 {
77 struct crypto_instance *inst = (void *)alg;
78 struct crypto_template *tmpl = inst->tmpl;
79
80 tmpl->free(inst);
81 crypto_tmpl_put(tmpl);
82 }
83
84 static void crypto_remove_spawn(struct crypto_spawn *spawn,
85 struct list_head *list,
86 struct list_head *secondary_spawns)
87 {
88 struct crypto_instance *inst = spawn->inst;
89 struct crypto_template *tmpl = inst->tmpl;
90
91 list_del_init(&spawn->list);
92 spawn->alg = NULL;
93
94 if (crypto_is_dead(&inst->alg))
95 return;
96
97 inst->alg.cra_flags |= CRYPTO_ALG_DEAD;
98 if (!tmpl || !crypto_tmpl_get(tmpl))
99 return;
100
101 crypto_notify(CRYPTO_MSG_ALG_UNREGISTER, &inst->alg);
102 list_move(&inst->alg.cra_list, list);
103 hlist_del(&inst->list);
104 inst->alg.cra_destroy = crypto_destroy_instance;
105
106 list_splice(&inst->alg.cra_users, secondary_spawns);
107 }
108
109 static void crypto_remove_spawns(struct list_head *spawns,
110 struct list_head *list, u32 new_type)
111 {
112 struct crypto_spawn *spawn, *n;
113 LIST_HEAD(secondary_spawns);
114
115 list_for_each_entry_safe(spawn, n, spawns, list) {
116 if ((spawn->alg->cra_flags ^ new_type) & spawn->mask)
117 continue;
118
119 crypto_remove_spawn(spawn, list, &secondary_spawns);
120 }
121
122 while (!list_empty(&secondary_spawns)) {
123 list_for_each_entry_safe(spawn, n, &secondary_spawns, list)
124 crypto_remove_spawn(spawn, list, &secondary_spawns);
125 }
126 }
127
128 static int __crypto_register_alg(struct crypto_alg *alg,
129 struct list_head *list)
130 {
131 struct crypto_alg *q;
132 int ret = -EAGAIN;
133
134 if (crypto_is_dead(alg))
135 goto out;
136
137 INIT_LIST_HEAD(&alg->cra_users);
138
139 ret = -EEXIST;
140
141 atomic_set(&alg->cra_refcnt, 1);
142 list_for_each_entry(q, &crypto_alg_list, cra_list) {
143 if (q == alg)
144 goto out;
145
146 if (crypto_is_moribund(q))
147 continue;
148
149 if (crypto_is_larval(q)) {
150 struct crypto_larval *larval = (void *)q;
151
152 if (strcmp(alg->cra_name, q->cra_name) &&
153 strcmp(alg->cra_driver_name, q->cra_name))
154 continue;
155
156 if (larval->adult)
157 continue;
158 if ((q->cra_flags ^ alg->cra_flags) & larval->mask)
159 continue;
160 if (!crypto_mod_get(alg))
161 continue;
162
163 larval->adult = alg;
164 complete_all(&larval->completion);
165 continue;
166 }
167
168 if (strcmp(alg->cra_name, q->cra_name))
169 continue;
170
171 if (strcmp(alg->cra_driver_name, q->cra_driver_name) &&
172 q->cra_priority > alg->cra_priority)
173 continue;
174
175 crypto_remove_spawns(&q->cra_users, list, alg->cra_flags);
176 }
177
178 list_add(&alg->cra_list, &crypto_alg_list);
179
180 crypto_notify(CRYPTO_MSG_ALG_REGISTER, alg);
181 ret = 0;
182
183 out:
184 return ret;
185 }
186
187 static void crypto_remove_final(struct list_head *list)
188 {
189 struct crypto_alg *alg;
190 struct crypto_alg *n;
191
192 list_for_each_entry_safe(alg, n, list, cra_list) {
193 list_del_init(&alg->cra_list);
194 crypto_alg_put(alg);
195 }
196 }
197
198 int crypto_register_alg(struct crypto_alg *alg)
199 {
200 LIST_HEAD(list);
201 int err;
202
203 err = crypto_check_alg(alg);
204 if (err)
205 return err;
206
207 down_write(&crypto_alg_sem);
208 err = __crypto_register_alg(alg, &list);
209 up_write(&crypto_alg_sem);
210
211 crypto_remove_final(&list);
212 return err;
213 }
214 EXPORT_SYMBOL_GPL(crypto_register_alg);
215
216 static int crypto_remove_alg(struct crypto_alg *alg, struct list_head *list)
217 {
218 if (unlikely(list_empty(&alg->cra_list)))
219 return -ENOENT;
220
221 alg->cra_flags |= CRYPTO_ALG_DEAD;
222
223 crypto_notify(CRYPTO_MSG_ALG_UNREGISTER, alg);
224 list_del_init(&alg->cra_list);
225 crypto_remove_spawns(&alg->cra_users, list, alg->cra_flags);
226
227 return 0;
228 }
229
230 int crypto_unregister_alg(struct crypto_alg *alg)
231 {
232 int ret;
233 LIST_HEAD(list);
234
235 down_write(&crypto_alg_sem);
236 ret = crypto_remove_alg(alg, &list);
237 up_write(&crypto_alg_sem);
238
239 if (ret)
240 return ret;
241
242 BUG_ON(atomic_read(&alg->cra_refcnt) != 1);
243 if (alg->cra_destroy)
244 alg->cra_destroy(alg);
245
246 crypto_remove_final(&list);
247 return 0;
248 }
249 EXPORT_SYMBOL_GPL(crypto_unregister_alg);
250
251 int crypto_register_template(struct crypto_template *tmpl)
252 {
253 struct crypto_template *q;
254 int err = -EEXIST;
255
256 down_write(&crypto_alg_sem);
257
258 list_for_each_entry(q, &crypto_template_list, list) {
259 if (q == tmpl)
260 goto out;
261 }
262
263 list_add(&tmpl->list, &crypto_template_list);
264 crypto_notify(CRYPTO_MSG_TMPL_REGISTER, tmpl);
265 err = 0;
266 out:
267 up_write(&crypto_alg_sem);
268 return err;
269 }
270 EXPORT_SYMBOL_GPL(crypto_register_template);
271
272 void crypto_unregister_template(struct crypto_template *tmpl)
273 {
274 struct crypto_instance *inst;
275 struct hlist_node *p, *n;
276 struct hlist_head *list;
277 LIST_HEAD(users);
278
279 down_write(&crypto_alg_sem);
280
281 BUG_ON(list_empty(&tmpl->list));
282 list_del_init(&tmpl->list);
283
284 list = &tmpl->instances;
285 hlist_for_each_entry(inst, p, list, list) {
286 int err = crypto_remove_alg(&inst->alg, &users);
287 BUG_ON(err);
288 }
289
290 crypto_notify(CRYPTO_MSG_TMPL_UNREGISTER, tmpl);
291
292 up_write(&crypto_alg_sem);
293
294 hlist_for_each_entry_safe(inst, p, n, list, list) {
295 BUG_ON(atomic_read(&inst->alg.cra_refcnt) != 1);
296 tmpl->free(inst);
297 }
298 crypto_remove_final(&users);
299 }
300 EXPORT_SYMBOL_GPL(crypto_unregister_template);
301
302 static struct crypto_template *__crypto_lookup_template(const char *name)
303 {
304 struct crypto_template *q, *tmpl = NULL;
305
306 down_read(&crypto_alg_sem);
307 list_for_each_entry(q, &crypto_template_list, list) {
308 if (strcmp(q->name, name))
309 continue;
310 if (unlikely(!crypto_tmpl_get(q)))
311 continue;
312
313 tmpl = q;
314 break;
315 }
316 up_read(&crypto_alg_sem);
317
318 return tmpl;
319 }
320
321 struct crypto_template *crypto_lookup_template(const char *name)
322 {
323 return try_then_request_module(__crypto_lookup_template(name), name);
324 }
325 EXPORT_SYMBOL_GPL(crypto_lookup_template);
326
327 int crypto_register_instance(struct crypto_template *tmpl,
328 struct crypto_instance *inst)
329 {
330 LIST_HEAD(list);
331 int err = -EINVAL;
332
333 if (inst->alg.cra_destroy)
334 goto err;
335
336 err = crypto_check_alg(&inst->alg);
337 if (err)
338 goto err;
339
340 inst->alg.cra_module = tmpl->module;
341
342 down_write(&crypto_alg_sem);
343
344 err = __crypto_register_alg(&inst->alg, &list);
345 if (err)
346 goto unlock;
347
348 hlist_add_head(&inst->list, &tmpl->instances);
349 inst->tmpl = tmpl;
350
351 unlock:
352 up_write(&crypto_alg_sem);
353
354 crypto_remove_final(&list);
355
356 err:
357 return err;
358 }
359 EXPORT_SYMBOL_GPL(crypto_register_instance);
360
361 int crypto_init_spawn(struct crypto_spawn *spawn, struct crypto_alg *alg,
362 struct crypto_instance *inst, u32 mask)
363 {
364 int err = -EAGAIN;
365
366 spawn->inst = inst;
367 spawn->mask = mask;
368
369 down_write(&crypto_alg_sem);
370 if (!crypto_is_moribund(alg)) {
371 list_add(&spawn->list, &alg->cra_users);
372 spawn->alg = alg;
373 err = 0;
374 }
375 up_write(&crypto_alg_sem);
376
377 return err;
378 }
379 EXPORT_SYMBOL_GPL(crypto_init_spawn);
380
381 void crypto_drop_spawn(struct crypto_spawn *spawn)
382 {
383 down_write(&crypto_alg_sem);
384 list_del(&spawn->list);
385 up_write(&crypto_alg_sem);
386 }
387 EXPORT_SYMBOL_GPL(crypto_drop_spawn);
388
389 struct crypto_tfm *crypto_spawn_tfm(struct crypto_spawn *spawn, u32 type,
390 u32 mask)
391 {
392 struct crypto_alg *alg;
393 struct crypto_alg *alg2;
394 struct crypto_tfm *tfm;
395
396 down_read(&crypto_alg_sem);
397 alg = spawn->alg;
398 alg2 = alg;
399 if (alg2)
400 alg2 = crypto_mod_get(alg2);
401 up_read(&crypto_alg_sem);
402
403 if (!alg2) {
404 if (alg)
405 crypto_shoot_alg(alg);
406 return ERR_PTR(-EAGAIN);
407 }
408
409 tfm = ERR_PTR(-EINVAL);
410 if (unlikely((alg->cra_flags ^ type) & mask))
411 goto out_put_alg;
412
413 tfm = __crypto_alloc_tfm(alg, type, mask);
414 if (IS_ERR(tfm))
415 goto out_put_alg;
416
417 return tfm;
418
419 out_put_alg:
420 crypto_mod_put(alg);
421 return tfm;
422 }
423 EXPORT_SYMBOL_GPL(crypto_spawn_tfm);
424
425 int crypto_register_notifier(struct notifier_block *nb)
426 {
427 return blocking_notifier_chain_register(&crypto_chain, nb);
428 }
429 EXPORT_SYMBOL_GPL(crypto_register_notifier);
430
431 int crypto_unregister_notifier(struct notifier_block *nb)
432 {
433 return blocking_notifier_chain_unregister(&crypto_chain, nb);
434 }
435 EXPORT_SYMBOL_GPL(crypto_unregister_notifier);
436
437 struct crypto_attr_type *crypto_get_attr_type(struct rtattr **tb)
438 {
439 struct rtattr *rta = tb[0];
440 struct crypto_attr_type *algt;
441
442 if (!rta)
443 return ERR_PTR(-ENOENT);
444 if (RTA_PAYLOAD(rta) < sizeof(*algt))
445 return ERR_PTR(-EINVAL);
446 if (rta->rta_type != CRYPTOA_TYPE)
447 return ERR_PTR(-EINVAL);
448
449 algt = RTA_DATA(rta);
450
451 return algt;
452 }
453 EXPORT_SYMBOL_GPL(crypto_get_attr_type);
454
455 int crypto_check_attr_type(struct rtattr **tb, u32 type)
456 {
457 struct crypto_attr_type *algt;
458
459 algt = crypto_get_attr_type(tb);
460 if (IS_ERR(algt))
461 return PTR_ERR(algt);
462
463 if ((algt->type ^ type) & algt->mask)
464 return -EINVAL;
465
466 return 0;
467 }
468 EXPORT_SYMBOL_GPL(crypto_check_attr_type);
469
470 struct crypto_alg *crypto_attr_alg(struct rtattr *rta, u32 type, u32 mask)
471 {
472 struct crypto_attr_alg *alga;
473
474 if (!rta)
475 return ERR_PTR(-ENOENT);
476 if (RTA_PAYLOAD(rta) < sizeof(*alga))
477 return ERR_PTR(-EINVAL);
478 if (rta->rta_type != CRYPTOA_ALG)
479 return ERR_PTR(-EINVAL);
480
481 alga = RTA_DATA(rta);
482 alga->name[CRYPTO_MAX_ALG_NAME - 1] = 0;
483
484 return crypto_alg_mod_lookup(alga->name, type, mask);
485 }
486 EXPORT_SYMBOL_GPL(crypto_attr_alg);
487
488 int crypto_attr_u32(struct rtattr *rta, u32 *num)
489 {
490 struct crypto_attr_u32 *nu32;
491
492 if (!rta)
493 return -ENOENT;
494 if (RTA_PAYLOAD(rta) < sizeof(*nu32))
495 return -EINVAL;
496 if (rta->rta_type != CRYPTOA_U32)
497 return -EINVAL;
498
499 nu32 = RTA_DATA(rta);
500 *num = nu32->num;
501
502 return 0;
503 }
504 EXPORT_SYMBOL_GPL(crypto_attr_u32);
505
506 struct crypto_instance *crypto_alloc_instance(const char *name,
507 struct crypto_alg *alg)
508 {
509 struct crypto_instance *inst;
510 struct crypto_spawn *spawn;
511 int err;
512
513 inst = kzalloc(sizeof(*inst) + sizeof(*spawn), GFP_KERNEL);
514 if (!inst)
515 return ERR_PTR(-ENOMEM);
516
517 err = -ENAMETOOLONG;
518 if (snprintf(inst->alg.cra_name, CRYPTO_MAX_ALG_NAME, "%s(%s)", name,
519 alg->cra_name) >= CRYPTO_MAX_ALG_NAME)
520 goto err_free_inst;
521
522 if (snprintf(inst->alg.cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s(%s)",
523 name, alg->cra_driver_name) >= CRYPTO_MAX_ALG_NAME)
524 goto err_free_inst;
525
526 spawn = crypto_instance_ctx(inst);
527 err = crypto_init_spawn(spawn, alg, inst,
528 CRYPTO_ALG_TYPE_MASK | CRYPTO_ALG_ASYNC);
529
530 if (err)
531 goto err_free_inst;
532
533 return inst;
534
535 err_free_inst:
536 kfree(inst);
537 return ERR_PTR(err);
538 }
539 EXPORT_SYMBOL_GPL(crypto_alloc_instance);
540
541 void crypto_init_queue(struct crypto_queue *queue, unsigned int max_qlen)
542 {
543 INIT_LIST_HEAD(&queue->list);
544 queue->backlog = &queue->list;
545 queue->qlen = 0;
546 queue->max_qlen = max_qlen;
547 }
548 EXPORT_SYMBOL_GPL(crypto_init_queue);
549
550 int crypto_enqueue_request(struct crypto_queue *queue,
551 struct crypto_async_request *request)
552 {
553 int err = -EINPROGRESS;
554
555 if (unlikely(queue->qlen >= queue->max_qlen)) {
556 err = -EBUSY;
557 if (!(request->flags & CRYPTO_TFM_REQ_MAY_BACKLOG))
558 goto out;
559 if (queue->backlog == &queue->list)
560 queue->backlog = &request->list;
561 }
562
563 queue->qlen++;
564 list_add_tail(&request->list, &queue->list);
565
566 out:
567 return err;
568 }
569 EXPORT_SYMBOL_GPL(crypto_enqueue_request);
570
571 struct crypto_async_request *crypto_dequeue_request(struct crypto_queue *queue)
572 {
573 struct list_head *request;
574
575 if (unlikely(!queue->qlen))
576 return NULL;
577
578 queue->qlen--;
579
580 if (queue->backlog != &queue->list)
581 queue->backlog = queue->backlog->next;
582
583 request = queue->list.next;
584 list_del(request);
585
586 return list_entry(request, struct crypto_async_request, list);
587 }
588 EXPORT_SYMBOL_GPL(crypto_dequeue_request);
589
590 int crypto_tfm_in_queue(struct crypto_queue *queue, struct crypto_tfm *tfm)
591 {
592 struct crypto_async_request *req;
593
594 list_for_each_entry(req, &queue->list, list) {
595 if (req->tfm == tfm)
596 return 1;
597 }
598
599 return 0;
600 }
601 EXPORT_SYMBOL_GPL(crypto_tfm_in_queue);
602
603 static int __init crypto_algapi_init(void)
604 {
605 crypto_init_proc();
606 return 0;
607 }
608
609 static void __exit crypto_algapi_exit(void)
610 {
611 crypto_exit_proc();
612 }
613
614 module_init(crypto_algapi_init);
615 module_exit(crypto_algapi_exit);
616
617 MODULE_LICENSE("GPL");
618 MODULE_DESCRIPTION("Cryptographic algorithms API");
This page took 0.05346 seconds and 6 git commands to generate.