xref: /openbmc/linux/security/keys/big_key.c (revision 7df3e59c3d1df4f87fe874c7956ef7a3d2f4d5fb)
1ab3c3587SDavid Howells /* Large capacity key type
2ab3c3587SDavid Howells  *
3ab3c3587SDavid Howells  * Copyright (C) 2013 Red Hat, Inc. All Rights Reserved.
4ab3c3587SDavid Howells  * Written by David Howells (dhowells@redhat.com)
5ab3c3587SDavid Howells  *
6ab3c3587SDavid Howells  * This program is free software; you can redistribute it and/or
7ab3c3587SDavid Howells  * modify it under the terms of the GNU General Public Licence
8ab3c3587SDavid Howells  * as published by the Free Software Foundation; either version
9ab3c3587SDavid Howells  * 2 of the Licence, or (at your option) any later version.
10ab3c3587SDavid Howells  */
11ab3c3587SDavid Howells 
12*7df3e59cSDavid Howells #define pr_fmt(fmt) "big_key: "fmt
13ab3c3587SDavid Howells #include <linux/init.h>
14ab3c3587SDavid Howells #include <linux/seq_file.h>
15ab3c3587SDavid Howells #include <linux/file.h>
16ab3c3587SDavid Howells #include <linux/shmem_fs.h>
17ab3c3587SDavid Howells #include <linux/err.h>
1813100a72SKirill Marinushkin #include <linux/scatterlist.h>
19ab3c3587SDavid Howells #include <keys/user-type.h>
20ab3c3587SDavid Howells #include <keys/big_key-type.h>
2113100a72SKirill Marinushkin #include <crypto/rng.h>
22d56d72c6SHerbert Xu #include <crypto/skcipher.h>
23ab3c3587SDavid Howells 
24ab3c3587SDavid Howells /*
25146aa8b1SDavid Howells  * Layout of key payload words.
26146aa8b1SDavid Howells  */
27146aa8b1SDavid Howells enum {
28146aa8b1SDavid Howells 	big_key_data,
29146aa8b1SDavid Howells 	big_key_path,
30146aa8b1SDavid Howells 	big_key_path_2nd_part,
31146aa8b1SDavid Howells 	big_key_len,
32146aa8b1SDavid Howells };
33146aa8b1SDavid Howells 
34146aa8b1SDavid Howells /*
3513100a72SKirill Marinushkin  * Crypto operation with big_key data
3613100a72SKirill Marinushkin  */
3713100a72SKirill Marinushkin enum big_key_op {
3813100a72SKirill Marinushkin 	BIG_KEY_ENC,
3913100a72SKirill Marinushkin 	BIG_KEY_DEC,
4013100a72SKirill Marinushkin };
4113100a72SKirill Marinushkin 
4213100a72SKirill Marinushkin /*
43ab3c3587SDavid Howells  * If the data is under this limit, there's no point creating a shm file to
44ab3c3587SDavid Howells  * hold it as the permanently resident metadata for the shmem fs will be at
45ab3c3587SDavid Howells  * least as large as the data.
46ab3c3587SDavid Howells  */
47ab3c3587SDavid Howells #define BIG_KEY_FILE_THRESHOLD (sizeof(struct inode) + sizeof(struct dentry))
48ab3c3587SDavid Howells 
49ab3c3587SDavid Howells /*
5013100a72SKirill Marinushkin  * Key size for big_key data encryption
5113100a72SKirill Marinushkin  */
5213100a72SKirill Marinushkin #define ENC_KEY_SIZE	16
5313100a72SKirill Marinushkin 
5413100a72SKirill Marinushkin /*
55ab3c3587SDavid Howells  * big_key defined keys take an arbitrary string as the description and an
56ab3c3587SDavid Howells  * arbitrary blob of data as the payload
57ab3c3587SDavid Howells  */
58ab3c3587SDavid Howells struct key_type key_type_big_key = {
59ab3c3587SDavid Howells 	.name			= "big_key",
60002edaf7SDavid Howells 	.preparse		= big_key_preparse,
61002edaf7SDavid Howells 	.free_preparse		= big_key_free_preparse,
62002edaf7SDavid Howells 	.instantiate		= generic_key_instantiate,
63ab3c3587SDavid Howells 	.revoke			= big_key_revoke,
64ab3c3587SDavid Howells 	.destroy		= big_key_destroy,
65ab3c3587SDavid Howells 	.describe		= big_key_describe,
66ab3c3587SDavid Howells 	.read			= big_key_read,
67ab3c3587SDavid Howells };
68ab3c3587SDavid Howells 
69ab3c3587SDavid Howells /*
7013100a72SKirill Marinushkin  * Crypto names for big_key data encryption
7113100a72SKirill Marinushkin  */
7213100a72SKirill Marinushkin static const char big_key_rng_name[] = "stdrng";
7313100a72SKirill Marinushkin static const char big_key_alg_name[] = "ecb(aes)";
7413100a72SKirill Marinushkin 
7513100a72SKirill Marinushkin /*
7613100a72SKirill Marinushkin  * Crypto algorithms for big_key data encryption
7713100a72SKirill Marinushkin  */
7813100a72SKirill Marinushkin static struct crypto_rng *big_key_rng;
79d56d72c6SHerbert Xu static struct crypto_skcipher *big_key_skcipher;
8013100a72SKirill Marinushkin 
8113100a72SKirill Marinushkin /*
8213100a72SKirill Marinushkin  * Generate random key to encrypt big_key data
8313100a72SKirill Marinushkin  */
8413100a72SKirill Marinushkin static inline int big_key_gen_enckey(u8 *key)
8513100a72SKirill Marinushkin {
8613100a72SKirill Marinushkin 	return crypto_rng_get_bytes(big_key_rng, key, ENC_KEY_SIZE);
8713100a72SKirill Marinushkin }
8813100a72SKirill Marinushkin 
8913100a72SKirill Marinushkin /*
9013100a72SKirill Marinushkin  * Encrypt/decrypt big_key data
9113100a72SKirill Marinushkin  */
9213100a72SKirill Marinushkin static int big_key_crypt(enum big_key_op op, u8 *data, size_t datalen, u8 *key)
9313100a72SKirill Marinushkin {
9413100a72SKirill Marinushkin 	int ret = -EINVAL;
9513100a72SKirill Marinushkin 	struct scatterlist sgio;
96d56d72c6SHerbert Xu 	SKCIPHER_REQUEST_ON_STACK(req, big_key_skcipher);
9713100a72SKirill Marinushkin 
98d56d72c6SHerbert Xu 	if (crypto_skcipher_setkey(big_key_skcipher, key, ENC_KEY_SIZE)) {
9913100a72SKirill Marinushkin 		ret = -EAGAIN;
10013100a72SKirill Marinushkin 		goto error;
10113100a72SKirill Marinushkin 	}
10213100a72SKirill Marinushkin 
103d56d72c6SHerbert Xu 	skcipher_request_set_tfm(req, big_key_skcipher);
104d56d72c6SHerbert Xu 	skcipher_request_set_callback(req, CRYPTO_TFM_REQ_MAY_SLEEP,
105d56d72c6SHerbert Xu 				      NULL, NULL);
10613100a72SKirill Marinushkin 
10713100a72SKirill Marinushkin 	sg_init_one(&sgio, data, datalen);
108d56d72c6SHerbert Xu 	skcipher_request_set_crypt(req, &sgio, &sgio, datalen, NULL);
10913100a72SKirill Marinushkin 
11013100a72SKirill Marinushkin 	if (op == BIG_KEY_ENC)
111d56d72c6SHerbert Xu 		ret = crypto_skcipher_encrypt(req);
11213100a72SKirill Marinushkin 	else
113d56d72c6SHerbert Xu 		ret = crypto_skcipher_decrypt(req);
114d56d72c6SHerbert Xu 
115d56d72c6SHerbert Xu 	skcipher_request_zero(req);
11613100a72SKirill Marinushkin 
11713100a72SKirill Marinushkin error:
11813100a72SKirill Marinushkin 	return ret;
11913100a72SKirill Marinushkin }
12013100a72SKirill Marinushkin 
12113100a72SKirill Marinushkin /*
122002edaf7SDavid Howells  * Preparse a big key
123ab3c3587SDavid Howells  */
124002edaf7SDavid Howells int big_key_preparse(struct key_preparsed_payload *prep)
125ab3c3587SDavid Howells {
126146aa8b1SDavid Howells 	struct path *path = (struct path *)&prep->payload.data[big_key_path];
127ab3c3587SDavid Howells 	struct file *file;
12813100a72SKirill Marinushkin 	u8 *enckey;
12913100a72SKirill Marinushkin 	u8 *data = NULL;
130ab3c3587SDavid Howells 	ssize_t written;
131ab3c3587SDavid Howells 	size_t datalen = prep->datalen;
132ab3c3587SDavid Howells 	int ret;
133ab3c3587SDavid Howells 
134ab3c3587SDavid Howells 	ret = -EINVAL;
135ab3c3587SDavid Howells 	if (datalen <= 0 || datalen > 1024 * 1024 || !prep->data)
136ab3c3587SDavid Howells 		goto error;
137ab3c3587SDavid Howells 
138ab3c3587SDavid Howells 	/* Set an arbitrary quota */
139002edaf7SDavid Howells 	prep->quotalen = 16;
140ab3c3587SDavid Howells 
141146aa8b1SDavid Howells 	prep->payload.data[big_key_len] = (void *)(unsigned long)datalen;
142ab3c3587SDavid Howells 
143ab3c3587SDavid Howells 	if (datalen > BIG_KEY_FILE_THRESHOLD) {
144ab3c3587SDavid Howells 		/* Create a shmem file to store the data in.  This will permit the data
145ab3c3587SDavid Howells 		 * to be swapped out if needed.
146ab3c3587SDavid Howells 		 *
14713100a72SKirill Marinushkin 		 * File content is stored encrypted with randomly generated key.
148ab3c3587SDavid Howells 		 */
149d56d72c6SHerbert Xu 		size_t enclen = ALIGN(datalen, crypto_skcipher_blocksize(big_key_skcipher));
15013100a72SKirill Marinushkin 
15113100a72SKirill Marinushkin 		/* prepare aligned data to encrypt */
15213100a72SKirill Marinushkin 		data = kmalloc(enclen, GFP_KERNEL);
15313100a72SKirill Marinushkin 		if (!data)
15413100a72SKirill Marinushkin 			return -ENOMEM;
15513100a72SKirill Marinushkin 
15613100a72SKirill Marinushkin 		memcpy(data, prep->data, datalen);
15713100a72SKirill Marinushkin 		memset(data + datalen, 0x00, enclen - datalen);
15813100a72SKirill Marinushkin 
15913100a72SKirill Marinushkin 		/* generate random key */
16013100a72SKirill Marinushkin 		enckey = kmalloc(ENC_KEY_SIZE, GFP_KERNEL);
16113100a72SKirill Marinushkin 		if (!enckey) {
16213100a72SKirill Marinushkin 			ret = -ENOMEM;
163002edaf7SDavid Howells 			goto error;
164d2b86970SWei Yongjun 		}
165ab3c3587SDavid Howells 
16613100a72SKirill Marinushkin 		ret = big_key_gen_enckey(enckey);
16713100a72SKirill Marinushkin 		if (ret)
16813100a72SKirill Marinushkin 			goto err_enckey;
16913100a72SKirill Marinushkin 
17013100a72SKirill Marinushkin 		/* encrypt aligned data */
17113100a72SKirill Marinushkin 		ret = big_key_crypt(BIG_KEY_ENC, data, enclen, enckey);
17213100a72SKirill Marinushkin 		if (ret)
17313100a72SKirill Marinushkin 			goto err_enckey;
17413100a72SKirill Marinushkin 
17513100a72SKirill Marinushkin 		/* save aligned data to file */
17613100a72SKirill Marinushkin 		file = shmem_kernel_file_setup("", enclen, 0);
17713100a72SKirill Marinushkin 		if (IS_ERR(file)) {
17813100a72SKirill Marinushkin 			ret = PTR_ERR(file);
17913100a72SKirill Marinushkin 			goto err_enckey;
18013100a72SKirill Marinushkin 		}
18113100a72SKirill Marinushkin 
18213100a72SKirill Marinushkin 		written = kernel_write(file, data, enclen, 0);
18313100a72SKirill Marinushkin 		if (written != enclen) {
18497826c82SDavid Howells 			ret = written;
185ab3c3587SDavid Howells 			if (written >= 0)
186ab3c3587SDavid Howells 				ret = -ENOMEM;
187ab3c3587SDavid Howells 			goto err_fput;
188ab3c3587SDavid Howells 		}
189ab3c3587SDavid Howells 
190ab3c3587SDavid Howells 		/* Pin the mount and dentry to the key so that we can open it again
191ab3c3587SDavid Howells 		 * later
192ab3c3587SDavid Howells 		 */
19313100a72SKirill Marinushkin 		prep->payload.data[big_key_data] = enckey;
194ab3c3587SDavid Howells 		*path = file->f_path;
195ab3c3587SDavid Howells 		path_get(path);
196ab3c3587SDavid Howells 		fput(file);
19713100a72SKirill Marinushkin 		kfree(data);
198ab3c3587SDavid Howells 	} else {
199ab3c3587SDavid Howells 		/* Just store the data in a buffer */
200ab3c3587SDavid Howells 		void *data = kmalloc(datalen, GFP_KERNEL);
20113100a72SKirill Marinushkin 
202002edaf7SDavid Howells 		if (!data)
203002edaf7SDavid Howells 			return -ENOMEM;
204ab3c3587SDavid Howells 
205146aa8b1SDavid Howells 		prep->payload.data[big_key_data] = data;
206146aa8b1SDavid Howells 		memcpy(data, prep->data, prep->datalen);
207ab3c3587SDavid Howells 	}
208ab3c3587SDavid Howells 	return 0;
209ab3c3587SDavid Howells 
210ab3c3587SDavid Howells err_fput:
211ab3c3587SDavid Howells 	fput(file);
21213100a72SKirill Marinushkin err_enckey:
21313100a72SKirill Marinushkin 	kfree(enckey);
214ab3c3587SDavid Howells error:
21513100a72SKirill Marinushkin 	kfree(data);
216ab3c3587SDavid Howells 	return ret;
217ab3c3587SDavid Howells }
218ab3c3587SDavid Howells 
219ab3c3587SDavid Howells /*
220002edaf7SDavid Howells  * Clear preparsement.
221002edaf7SDavid Howells  */
222002edaf7SDavid Howells void big_key_free_preparse(struct key_preparsed_payload *prep)
223002edaf7SDavid Howells {
224002edaf7SDavid Howells 	if (prep->datalen > BIG_KEY_FILE_THRESHOLD) {
225146aa8b1SDavid Howells 		struct path *path = (struct path *)&prep->payload.data[big_key_path];
22613100a72SKirill Marinushkin 
227002edaf7SDavid Howells 		path_put(path);
228002edaf7SDavid Howells 	}
22913100a72SKirill Marinushkin 	kfree(prep->payload.data[big_key_data]);
230002edaf7SDavid Howells }
231002edaf7SDavid Howells 
232002edaf7SDavid Howells /*
233ab3c3587SDavid Howells  * dispose of the links from a revoked keyring
234ab3c3587SDavid Howells  * - called with the key sem write-locked
235ab3c3587SDavid Howells  */
236ab3c3587SDavid Howells void big_key_revoke(struct key *key)
237ab3c3587SDavid Howells {
238146aa8b1SDavid Howells 	struct path *path = (struct path *)&key->payload.data[big_key_path];
239ab3c3587SDavid Howells 
240ab3c3587SDavid Howells 	/* clear the quota */
241ab3c3587SDavid Howells 	key_payload_reserve(key, 0);
242146aa8b1SDavid Howells 	if (key_is_instantiated(key) &&
243146aa8b1SDavid Howells 	    (size_t)key->payload.data[big_key_len] > BIG_KEY_FILE_THRESHOLD)
244ab3c3587SDavid Howells 		vfs_truncate(path, 0);
245ab3c3587SDavid Howells }
246ab3c3587SDavid Howells 
247ab3c3587SDavid Howells /*
248ab3c3587SDavid Howells  * dispose of the data dangling from the corpse of a big_key key
249ab3c3587SDavid Howells  */
250ab3c3587SDavid Howells void big_key_destroy(struct key *key)
251ab3c3587SDavid Howells {
252146aa8b1SDavid Howells 	size_t datalen = (size_t)key->payload.data[big_key_len];
253146aa8b1SDavid Howells 
25413100a72SKirill Marinushkin 	if (datalen > BIG_KEY_FILE_THRESHOLD) {
255146aa8b1SDavid Howells 		struct path *path = (struct path *)&key->payload.data[big_key_path];
25613100a72SKirill Marinushkin 
257ab3c3587SDavid Howells 		path_put(path);
258ab3c3587SDavid Howells 		path->mnt = NULL;
259ab3c3587SDavid Howells 		path->dentry = NULL;
26013100a72SKirill Marinushkin 	}
261146aa8b1SDavid Howells 	kfree(key->payload.data[big_key_data]);
262146aa8b1SDavid Howells 	key->payload.data[big_key_data] = NULL;
263ab3c3587SDavid Howells }
264ab3c3587SDavid Howells 
265ab3c3587SDavid Howells /*
266ab3c3587SDavid Howells  * describe the big_key key
267ab3c3587SDavid Howells  */
268ab3c3587SDavid Howells void big_key_describe(const struct key *key, struct seq_file *m)
269ab3c3587SDavid Howells {
270146aa8b1SDavid Howells 	size_t datalen = (size_t)key->payload.data[big_key_len];
271ab3c3587SDavid Howells 
272ab3c3587SDavid Howells 	seq_puts(m, key->description);
273ab3c3587SDavid Howells 
274ab3c3587SDavid Howells 	if (key_is_instantiated(key))
275146aa8b1SDavid Howells 		seq_printf(m, ": %zu [%s]",
276ab3c3587SDavid Howells 			   datalen,
277ab3c3587SDavid Howells 			   datalen > BIG_KEY_FILE_THRESHOLD ? "file" : "buff");
278ab3c3587SDavid Howells }
279ab3c3587SDavid Howells 
280ab3c3587SDavid Howells /*
281ab3c3587SDavid Howells  * read the key data
282ab3c3587SDavid Howells  * - the key's semaphore is read-locked
283ab3c3587SDavid Howells  */
284ab3c3587SDavid Howells long big_key_read(const struct key *key, char __user *buffer, size_t buflen)
285ab3c3587SDavid Howells {
286146aa8b1SDavid Howells 	size_t datalen = (size_t)key->payload.data[big_key_len];
287ab3c3587SDavid Howells 	long ret;
288ab3c3587SDavid Howells 
289ab3c3587SDavid Howells 	if (!buffer || buflen < datalen)
290ab3c3587SDavid Howells 		return datalen;
291ab3c3587SDavid Howells 
292ab3c3587SDavid Howells 	if (datalen > BIG_KEY_FILE_THRESHOLD) {
293146aa8b1SDavid Howells 		struct path *path = (struct path *)&key->payload.data[big_key_path];
294ab3c3587SDavid Howells 		struct file *file;
29513100a72SKirill Marinushkin 		u8 *data;
29613100a72SKirill Marinushkin 		u8 *enckey = (u8 *)key->payload.data[big_key_data];
297d56d72c6SHerbert Xu 		size_t enclen = ALIGN(datalen, crypto_skcipher_blocksize(big_key_skcipher));
29813100a72SKirill Marinushkin 
29913100a72SKirill Marinushkin 		data = kmalloc(enclen, GFP_KERNEL);
30013100a72SKirill Marinushkin 		if (!data)
30113100a72SKirill Marinushkin 			return -ENOMEM;
302ab3c3587SDavid Howells 
303ab3c3587SDavid Howells 		file = dentry_open(path, O_RDONLY, current_cred());
30413100a72SKirill Marinushkin 		if (IS_ERR(file)) {
30513100a72SKirill Marinushkin 			ret = PTR_ERR(file);
30613100a72SKirill Marinushkin 			goto error;
30713100a72SKirill Marinushkin 		}
308ab3c3587SDavid Howells 
30913100a72SKirill Marinushkin 		/* read file to kernel and decrypt */
31013100a72SKirill Marinushkin 		ret = kernel_read(file, 0, data, enclen);
31113100a72SKirill Marinushkin 		if (ret >= 0 && ret != enclen) {
312ab3c3587SDavid Howells 			ret = -EIO;
31313100a72SKirill Marinushkin 			goto err_fput;
31413100a72SKirill Marinushkin 		}
31513100a72SKirill Marinushkin 
31613100a72SKirill Marinushkin 		ret = big_key_crypt(BIG_KEY_DEC, data, enclen, enckey);
31713100a72SKirill Marinushkin 		if (ret)
31813100a72SKirill Marinushkin 			goto err_fput;
31913100a72SKirill Marinushkin 
32013100a72SKirill Marinushkin 		ret = datalen;
32113100a72SKirill Marinushkin 
32213100a72SKirill Marinushkin 		/* copy decrypted data to user */
32313100a72SKirill Marinushkin 		if (copy_to_user(buffer, data, datalen) != 0)
32413100a72SKirill Marinushkin 			ret = -EFAULT;
32513100a72SKirill Marinushkin 
32613100a72SKirill Marinushkin err_fput:
32713100a72SKirill Marinushkin 		fput(file);
32813100a72SKirill Marinushkin error:
32913100a72SKirill Marinushkin 		kfree(data);
330ab3c3587SDavid Howells 	} else {
331ab3c3587SDavid Howells 		ret = datalen;
332146aa8b1SDavid Howells 		if (copy_to_user(buffer, key->payload.data[big_key_data],
333146aa8b1SDavid Howells 				 datalen) != 0)
334ab3c3587SDavid Howells 			ret = -EFAULT;
335ab3c3587SDavid Howells 	}
336ab3c3587SDavid Howells 
337ab3c3587SDavid Howells 	return ret;
338ab3c3587SDavid Howells }
339ab3c3587SDavid Howells 
34013100a72SKirill Marinushkin /*
34113100a72SKirill Marinushkin  * Register key type
34213100a72SKirill Marinushkin  */
343ab3c3587SDavid Howells static int __init big_key_init(void)
344ab3c3587SDavid Howells {
345*7df3e59cSDavid Howells 	struct crypto_skcipher *cipher;
346*7df3e59cSDavid Howells 	struct crypto_rng *rng;
347*7df3e59cSDavid Howells 	int ret;
348*7df3e59cSDavid Howells 
349*7df3e59cSDavid Howells 	rng = crypto_alloc_rng(big_key_rng_name, 0, 0);
350*7df3e59cSDavid Howells 	if (IS_ERR(rng)) {
351*7df3e59cSDavid Howells 		pr_err("Can't alloc rng: %ld\n", PTR_ERR(rng));
352*7df3e59cSDavid Howells 		return PTR_ERR(rng);
353ab3c3587SDavid Howells 	}
35413100a72SKirill Marinushkin 
355*7df3e59cSDavid Howells 	big_key_rng = rng;
35613100a72SKirill Marinushkin 
35713100a72SKirill Marinushkin 	/* seed RNG */
358*7df3e59cSDavid Howells 	ret = crypto_rng_reset(rng, NULL, crypto_rng_seedsize(rng));
359*7df3e59cSDavid Howells 	if (ret) {
360*7df3e59cSDavid Howells 		pr_err("Can't reset rng: %d\n", ret);
361*7df3e59cSDavid Howells 		goto error_rng;
362*7df3e59cSDavid Howells 	}
36313100a72SKirill Marinushkin 
36413100a72SKirill Marinushkin 	/* init block cipher */
365*7df3e59cSDavid Howells 	cipher = crypto_alloc_skcipher(big_key_alg_name, 0, CRYPTO_ALG_ASYNC);
366*7df3e59cSDavid Howells 	if (IS_ERR(cipher)) {
367*7df3e59cSDavid Howells 		ret = PTR_ERR(cipher);
368*7df3e59cSDavid Howells 		pr_err("Can't alloc crypto: %d\n", ret);
369*7df3e59cSDavid Howells 		goto error_rng;
370*7df3e59cSDavid Howells 	}
371*7df3e59cSDavid Howells 
372*7df3e59cSDavid Howells 	big_key_skcipher = cipher;
373*7df3e59cSDavid Howells 
374*7df3e59cSDavid Howells 	ret = register_key_type(&key_type_big_key);
375*7df3e59cSDavid Howells 	if (ret < 0) {
376*7df3e59cSDavid Howells 		pr_err("Can't register type: %d\n", ret);
377*7df3e59cSDavid Howells 		goto error_cipher;
37813100a72SKirill Marinushkin 	}
37913100a72SKirill Marinushkin 
38013100a72SKirill Marinushkin 	return 0;
38113100a72SKirill Marinushkin 
382*7df3e59cSDavid Howells error_cipher:
383*7df3e59cSDavid Howells 	crypto_free_skcipher(big_key_skcipher);
384*7df3e59cSDavid Howells error_rng:
38513100a72SKirill Marinushkin 	crypto_free_rng(big_key_rng);
38613100a72SKirill Marinushkin 	return ret;
38713100a72SKirill Marinushkin }
38813100a72SKirill Marinushkin 
389*7df3e59cSDavid Howells late_initcall(big_key_init);
390