]>
Commit | Line | Data |
---|---|---|
2874c5fd | 1 | // SPDX-License-Identifier: GPL-2.0-or-later |
2b8c19db HX |
2 | /* |
3 | * Create default crypto algorithm instances. | |
4 | * | |
5 | * Copyright (c) 2006 Herbert Xu <[email protected]> | |
2b8c19db HX |
6 | */ |
7 | ||
6fe4a28d | 8 | #include <crypto/internal/aead.h> |
39871037 | 9 | #include <linux/completion.h> |
2b8c19db HX |
10 | #include <linux/ctype.h> |
11 | #include <linux/err.h> | |
12 | #include <linux/init.h> | |
cf02f5da | 13 | #include <linux/kthread.h> |
2b8c19db HX |
14 | #include <linux/module.h> |
15 | #include <linux/notifier.h> | |
16 | #include <linux/rtnetlink.h> | |
174cd4b1 | 17 | #include <linux/sched/signal.h> |
5a0e3ad6 | 18 | #include <linux/slab.h> |
2b8c19db | 19 | #include <linux/string.h> |
2b8c19db HX |
20 | |
21 | #include "internal.h" | |
22 | ||
23 | struct cryptomgr_param { | |
39e1ee01 | 24 | struct rtattr *tb[CRYPTO_MAX_ATTRS + 2]; |
ebc610e5 HX |
25 | |
26 | struct { | |
27 | struct rtattr attr; | |
28 | struct crypto_attr_type data; | |
29 | } type; | |
30 | ||
39e1ee01 | 31 | union { |
2b8c19db | 32 | struct rtattr attr; |
39e1ee01 HX |
33 | struct { |
34 | struct rtattr attr; | |
35 | struct crypto_attr_alg data; | |
36 | } alg; | |
37 | struct { | |
38 | struct rtattr attr; | |
39 | struct crypto_attr_u32 data; | |
40 | } nu32; | |
41 | } attrs[CRYPTO_MAX_ATTRS]; | |
42 | ||
2b8c19db | 43 | char template[CRYPTO_MAX_ALG_NAME]; |
73d3864a | 44 | |
939e1779 | 45 | struct crypto_larval *larval; |
39871037 | 46 | |
73d3864a HX |
47 | u32 otype; |
48 | u32 omask; | |
49 | }; | |
50 | ||
51 | struct crypto_test_param { | |
52 | char driver[CRYPTO_MAX_ALG_NAME]; | |
53 | char alg[CRYPTO_MAX_ALG_NAME]; | |
54 | u32 type; | |
2b8c19db HX |
55 | }; |
56 | ||
cf02f5da | 57 | static int cryptomgr_probe(void *data) |
2b8c19db | 58 | { |
cf02f5da | 59 | struct cryptomgr_param *param = data; |
2b8c19db | 60 | struct crypto_template *tmpl; |
6bfd4809 | 61 | int err; |
2b8c19db HX |
62 | |
63 | tmpl = crypto_lookup_template(param->template); | |
64 | if (!tmpl) | |
39871037 | 65 | goto out; |
2b8c19db | 66 | |
6bfd4809 | 67 | do { |
a24a1fd7 | 68 | err = tmpl->create(tmpl, param->tb); |
6bfd4809 | 69 | } while (err == -EAGAIN && !signal_pending(current)); |
2b8c19db HX |
70 | |
71 | crypto_tmpl_put(tmpl); | |
72 | ||
73 | out: | |
939e1779 HX |
74 | complete_all(¶m->larval->completion); |
75 | crypto_alg_put(¶m->larval->alg); | |
2b8c19db | 76 | kfree(param); |
cf02f5da | 77 | module_put_and_exit(0); |
2b8c19db HX |
78 | } |
79 | ||
80 | static int cryptomgr_schedule_probe(struct crypto_larval *larval) | |
81 | { | |
1605b847 | 82 | struct task_struct *thread; |
2b8c19db HX |
83 | struct cryptomgr_param *param; |
84 | const char *name = larval->alg.cra_name; | |
85 | const char *p; | |
86 | unsigned int len; | |
39e1ee01 | 87 | int i; |
2b8c19db | 88 | |
cf02f5da HX |
89 | if (!try_module_get(THIS_MODULE)) |
90 | goto err; | |
91 | ||
ebc610e5 | 92 | param = kzalloc(sizeof(*param), GFP_KERNEL); |
2b8c19db | 93 | if (!param) |
cf02f5da | 94 | goto err_put_module; |
2b8c19db HX |
95 | |
96 | for (p = name; isalnum(*p) || *p == '-' || *p == '_'; p++) | |
97 | ; | |
98 | ||
99 | len = p - name; | |
100 | if (!len || *p != '(') | |
101 | goto err_free_param; | |
102 | ||
103 | memcpy(param->template, name, len); | |
2b8c19db | 104 | |
39e1ee01 HX |
105 | i = 0; |
106 | for (;;) { | |
107 | int notnum = 0; | |
2b8c19db | 108 | |
39e1ee01 | 109 | name = ++p; |
39e1ee01 HX |
110 | |
111 | for (; isalnum(*p) || *p == '-' || *p == '_'; p++) | |
112 | notnum |= !isdigit(*p); | |
113 | ||
114 | if (*p == '(') { | |
115 | int recursion = 0; | |
116 | ||
117 | for (;;) { | |
118 | if (!*++p) | |
119 | goto err_free_param; | |
120 | if (*p == '(') | |
121 | recursion++; | |
122 | else if (*p == ')' && !recursion--) | |
123 | break; | |
124 | } | |
125 | ||
126 | notnum = 1; | |
720a650f | 127 | p++; |
39e1ee01 | 128 | } |
cf02f5da HX |
129 | |
130 | len = p - name; | |
39e1ee01 HX |
131 | if (!len) |
132 | goto err_free_param; | |
133 | ||
134 | if (notnum) { | |
135 | param->attrs[i].alg.attr.rta_len = | |
136 | sizeof(param->attrs[i].alg); | |
137 | param->attrs[i].alg.attr.rta_type = CRYPTOA_ALG; | |
138 | memcpy(param->attrs[i].alg.data.name, name, len); | |
139 | } else { | |
140 | param->attrs[i].nu32.attr.rta_len = | |
141 | sizeof(param->attrs[i].nu32); | |
142 | param->attrs[i].nu32.attr.rta_type = CRYPTOA_U32; | |
143 | param->attrs[i].nu32.data.num = | |
144 | simple_strtol(name, NULL, 0); | |
145 | } | |
146 | ||
147 | param->tb[i + 1] = ¶m->attrs[i].attr; | |
148 | i++; | |
149 | ||
720a650f | 150 | if (i >= CRYPTO_MAX_ATTRS) |
39e1ee01 HX |
151 | goto err_free_param; |
152 | ||
153 | if (*p == ')') | |
154 | break; | |
155 | ||
156 | if (*p != ',') | |
157 | goto err_free_param; | |
cf02f5da HX |
158 | } |
159 | ||
39e1ee01 | 160 | if (!i) |
2b8c19db HX |
161 | goto err_free_param; |
162 | ||
39e1ee01 HX |
163 | param->tb[i + 1] = NULL; |
164 | ||
ebc610e5 HX |
165 | param->type.attr.rta_len = sizeof(param->type); |
166 | param->type.attr.rta_type = CRYPTOA_TYPE; | |
73d3864a HX |
167 | param->type.data.type = larval->alg.cra_flags & ~CRYPTO_ALG_TESTED; |
168 | param->type.data.mask = larval->mask & ~CRYPTO_ALG_TESTED; | |
39e1ee01 | 169 | param->tb[0] = ¶m->type.attr; |
2b8c19db | 170 | |
73d3864a HX |
171 | param->otype = larval->alg.cra_flags; |
172 | param->omask = larval->mask; | |
173 | ||
939e1779 HX |
174 | crypto_alg_get(&larval->alg); |
175 | param->larval = larval; | |
39871037 | 176 | |
73d3864a HX |
177 | thread = kthread_run(cryptomgr_probe, param, "cryptomgr_probe"); |
178 | if (IS_ERR(thread)) | |
939e1779 | 179 | goto err_put_larval; |
73d3864a HX |
180 | |
181 | return NOTIFY_STOP; | |
182 | ||
939e1779 HX |
183 | err_put_larval: |
184 | crypto_alg_put(&larval->alg); | |
73d3864a HX |
185 | err_free_param: |
186 | kfree(param); | |
187 | err_put_module: | |
188 | module_put(THIS_MODULE); | |
189 | err: | |
190 | return NOTIFY_OK; | |
191 | } | |
192 | ||
193 | static int cryptomgr_test(void *data) | |
194 | { | |
195 | struct crypto_test_param *param = data; | |
196 | u32 type = param->type; | |
197 | int err = 0; | |
198 | ||
326a6346 HX |
199 | #ifdef CONFIG_CRYPTO_MANAGER_DISABLE_TESTS |
200 | goto skiptest; | |
201 | #endif | |
202 | ||
6fe4a28d | 203 | if (type & CRYPTO_ALG_TESTED) |
73d3864a HX |
204 | goto skiptest; |
205 | ||
1aa4ecd9 | 206 | err = alg_test(param->driver, param->alg, type, CRYPTO_ALG_TESTED); |
73d3864a HX |
207 | |
208 | skiptest: | |
209 | crypto_alg_tested(param->driver, err); | |
210 | ||
211 | kfree(param); | |
212 | module_put_and_exit(0); | |
213 | } | |
214 | ||
215 | static int cryptomgr_schedule_test(struct crypto_alg *alg) | |
216 | { | |
217 | struct task_struct *thread; | |
218 | struct crypto_test_param *param; | |
6fe4a28d | 219 | u32 type; |
73d3864a HX |
220 | |
221 | if (!try_module_get(THIS_MODULE)) | |
222 | goto err; | |
223 | ||
224 | param = kzalloc(sizeof(*param), GFP_KERNEL); | |
225 | if (!param) | |
226 | goto err_put_module; | |
227 | ||
228 | memcpy(param->driver, alg->cra_driver_name, sizeof(param->driver)); | |
229 | memcpy(param->alg, alg->cra_name, sizeof(param->alg)); | |
6fe4a28d HX |
230 | type = alg->cra_flags; |
231 | ||
eed93e0c HX |
232 | /* Do not test internal algorithms. */ |
233 | if (type & CRYPTO_ALG_INTERNAL) | |
6fe4a28d HX |
234 | type |= CRYPTO_ALG_TESTED; |
235 | ||
236 | param->type = type; | |
73d3864a HX |
237 | |
238 | thread = kthread_run(cryptomgr_test, param, "cryptomgr_test"); | |
1605b847 | 239 | if (IS_ERR(thread)) |
cf02f5da | 240 | goto err_free_param; |
2b8c19db HX |
241 | |
242 | return NOTIFY_STOP; | |
243 | ||
244 | err_free_param: | |
245 | kfree(param); | |
cf02f5da HX |
246 | err_put_module: |
247 | module_put(THIS_MODULE); | |
2b8c19db HX |
248 | err: |
249 | return NOTIFY_OK; | |
250 | } | |
251 | ||
252 | static int cryptomgr_notify(struct notifier_block *this, unsigned long msg, | |
253 | void *data) | |
254 | { | |
255 | switch (msg) { | |
256 | case CRYPTO_MSG_ALG_REQUEST: | |
257 | return cryptomgr_schedule_probe(data); | |
73d3864a HX |
258 | case CRYPTO_MSG_ALG_REGISTER: |
259 | return cryptomgr_schedule_test(data); | |
dd8b083f MP |
260 | case CRYPTO_MSG_ALG_LOADED: |
261 | break; | |
2b8c19db HX |
262 | } |
263 | ||
264 | return NOTIFY_DONE; | |
265 | } | |
266 | ||
267 | static struct notifier_block cryptomgr_notifier = { | |
268 | .notifier_call = cryptomgr_notify, | |
269 | }; | |
270 | ||
271 | static int __init cryptomgr_init(void) | |
272 | { | |
f8b0d4d0 | 273 | return crypto_register_notifier(&cryptomgr_notifier); |
2b8c19db HX |
274 | } |
275 | ||
276 | static void __exit cryptomgr_exit(void) | |
277 | { | |
278 | int err = crypto_unregister_notifier(&cryptomgr_notifier); | |
279 | BUG_ON(err); | |
280 | } | |
281 | ||
c4741b23 EB |
282 | /* |
283 | * This is arch_initcall() so that the crypto self-tests are run on algorithms | |
284 | * registered early by subsys_initcall(). subsys_initcall() is needed for | |
285 | * generic implementations so that they're available for comparison tests when | |
286 | * other implementations are registered later by module_init(). | |
287 | */ | |
288 | arch_initcall(cryptomgr_init); | |
2b8c19db HX |
289 | module_exit(cryptomgr_exit); |
290 | ||
291 | MODULE_LICENSE("GPL"); | |
292 | MODULE_DESCRIPTION("Crypto Algorithm Manager"); |