xref: /openbmc/linux/crypto/algboss.c (revision 275876e2)
1 /*
2  * Create default crypto algorithm instances.
3  *
4  * Copyright (c) 2006 Herbert Xu <herbert@gondor.apana.org.au>
5  *
6  * This program is free software; you can redistribute it and/or modify it
7  * under the terms of the GNU General Public License as published by the Free
8  * Software Foundation; either version 2 of the License, or (at your option)
9  * any later version.
10  *
11  */
12 
13 #include <crypto/internal/aead.h>
14 #include <linux/completion.h>
15 #include <linux/ctype.h>
16 #include <linux/err.h>
17 #include <linux/init.h>
18 #include <linux/kthread.h>
19 #include <linux/module.h>
20 #include <linux/notifier.h>
21 #include <linux/rtnetlink.h>
22 #include <linux/sched.h>
23 #include <linux/slab.h>
24 #include <linux/string.h>
25 
26 #include "internal.h"
27 
28 struct cryptomgr_param {
29 	struct rtattr *tb[CRYPTO_MAX_ATTRS + 2];
30 
31 	struct {
32 		struct rtattr attr;
33 		struct crypto_attr_type data;
34 	} type;
35 
36 	union {
37 		struct rtattr attr;
38 		struct {
39 			struct rtattr attr;
40 			struct crypto_attr_alg data;
41 		} alg;
42 		struct {
43 			struct rtattr attr;
44 			struct crypto_attr_u32 data;
45 		} nu32;
46 	} attrs[CRYPTO_MAX_ATTRS];
47 
48 	char template[CRYPTO_MAX_ALG_NAME];
49 
50 	struct crypto_larval *larval;
51 
52 	u32 otype;
53 	u32 omask;
54 };
55 
56 struct crypto_test_param {
57 	char driver[CRYPTO_MAX_ALG_NAME];
58 	char alg[CRYPTO_MAX_ALG_NAME];
59 	u32 type;
60 };
61 
62 static int cryptomgr_probe(void *data)
63 {
64 	struct cryptomgr_param *param = data;
65 	struct crypto_template *tmpl;
66 	struct crypto_instance *inst;
67 	int err;
68 
69 	tmpl = crypto_lookup_template(param->template);
70 	if (!tmpl)
71 		goto out;
72 
73 	do {
74 		if (tmpl->create) {
75 			err = tmpl->create(tmpl, param->tb);
76 			continue;
77 		}
78 
79 		inst = tmpl->alloc(param->tb);
80 		if (IS_ERR(inst))
81 			err = PTR_ERR(inst);
82 		else if ((err = crypto_register_instance(tmpl, inst)))
83 			tmpl->free(inst);
84 	} while (err == -EAGAIN && !signal_pending(current));
85 
86 	crypto_tmpl_put(tmpl);
87 
88 out:
89 	complete_all(&param->larval->completion);
90 	crypto_alg_put(&param->larval->alg);
91 	kfree(param);
92 	module_put_and_exit(0);
93 }
94 
95 static int cryptomgr_schedule_probe(struct crypto_larval *larval)
96 {
97 	struct task_struct *thread;
98 	struct cryptomgr_param *param;
99 	const char *name = larval->alg.cra_name;
100 	const char *p;
101 	unsigned int len;
102 	int i;
103 
104 	if (!try_module_get(THIS_MODULE))
105 		goto err;
106 
107 	param = kzalloc(sizeof(*param), GFP_KERNEL);
108 	if (!param)
109 		goto err_put_module;
110 
111 	for (p = name; isalnum(*p) || *p == '-' || *p == '_'; p++)
112 		;
113 
114 	len = p - name;
115 	if (!len || *p != '(')
116 		goto err_free_param;
117 
118 	memcpy(param->template, name, len);
119 
120 	i = 0;
121 	for (;;) {
122 		int notnum = 0;
123 
124 		name = ++p;
125 		len = 0;
126 
127 		for (; isalnum(*p) || *p == '-' || *p == '_'; p++)
128 			notnum |= !isdigit(*p);
129 
130 		if (*p == '(') {
131 			int recursion = 0;
132 
133 			for (;;) {
134 				if (!*++p)
135 					goto err_free_param;
136 				if (*p == '(')
137 					recursion++;
138 				else if (*p == ')' && !recursion--)
139 					break;
140 			}
141 
142 			notnum = 1;
143 			p++;
144 		}
145 
146 		len = p - name;
147 		if (!len)
148 			goto err_free_param;
149 
150 		if (notnum) {
151 			param->attrs[i].alg.attr.rta_len =
152 				sizeof(param->attrs[i].alg);
153 			param->attrs[i].alg.attr.rta_type = CRYPTOA_ALG;
154 			memcpy(param->attrs[i].alg.data.name, name, len);
155 		} else {
156 			param->attrs[i].nu32.attr.rta_len =
157 				sizeof(param->attrs[i].nu32);
158 			param->attrs[i].nu32.attr.rta_type = CRYPTOA_U32;
159 			param->attrs[i].nu32.data.num =
160 				simple_strtol(name, NULL, 0);
161 		}
162 
163 		param->tb[i + 1] = &param->attrs[i].attr;
164 		i++;
165 
166 		if (i >= CRYPTO_MAX_ATTRS)
167 			goto err_free_param;
168 
169 		if (*p == ')')
170 			break;
171 
172 		if (*p != ',')
173 			goto err_free_param;
174 	}
175 
176 	if (!i)
177 		goto err_free_param;
178 
179 	param->tb[i + 1] = NULL;
180 
181 	param->type.attr.rta_len = sizeof(param->type);
182 	param->type.attr.rta_type = CRYPTOA_TYPE;
183 	param->type.data.type = larval->alg.cra_flags & ~CRYPTO_ALG_TESTED;
184 	param->type.data.mask = larval->mask & ~CRYPTO_ALG_TESTED;
185 	param->tb[0] = &param->type.attr;
186 
187 	param->otype = larval->alg.cra_flags;
188 	param->omask = larval->mask;
189 
190 	crypto_alg_get(&larval->alg);
191 	param->larval = larval;
192 
193 	thread = kthread_run(cryptomgr_probe, param, "cryptomgr_probe");
194 	if (IS_ERR(thread))
195 		goto err_put_larval;
196 
197 	wait_for_completion_interruptible(&larval->completion);
198 
199 	return NOTIFY_STOP;
200 
201 err_put_larval:
202 	crypto_alg_put(&larval->alg);
203 err_free_param:
204 	kfree(param);
205 err_put_module:
206 	module_put(THIS_MODULE);
207 err:
208 	return NOTIFY_OK;
209 }
210 
211 static int cryptomgr_test(void *data)
212 {
213 	struct crypto_test_param *param = data;
214 	u32 type = param->type;
215 	int err = 0;
216 
217 #ifdef CONFIG_CRYPTO_MANAGER_DISABLE_TESTS
218 	goto skiptest;
219 #endif
220 
221 	if (type & CRYPTO_ALG_TESTED)
222 		goto skiptest;
223 
224 	err = alg_test(param->driver, param->alg, type, CRYPTO_ALG_TESTED);
225 
226 skiptest:
227 	crypto_alg_tested(param->driver, err);
228 
229 	kfree(param);
230 	module_put_and_exit(0);
231 }
232 
233 static int cryptomgr_schedule_test(struct crypto_alg *alg)
234 {
235 	struct task_struct *thread;
236 	struct crypto_test_param *param;
237 	u32 type;
238 
239 	if (!try_module_get(THIS_MODULE))
240 		goto err;
241 
242 	param = kzalloc(sizeof(*param), GFP_KERNEL);
243 	if (!param)
244 		goto err_put_module;
245 
246 	memcpy(param->driver, alg->cra_driver_name, sizeof(param->driver));
247 	memcpy(param->alg, alg->cra_name, sizeof(param->alg));
248 	type = alg->cra_flags;
249 
250 	/* This piece of crap needs to disappear into per-type test hooks. */
251 	if ((!((type ^ CRYPTO_ALG_TYPE_BLKCIPHER) &
252 	       CRYPTO_ALG_TYPE_BLKCIPHER_MASK) && !(type & CRYPTO_ALG_GENIV) &&
253 	     ((alg->cra_flags & CRYPTO_ALG_TYPE_MASK) ==
254 	      CRYPTO_ALG_TYPE_BLKCIPHER ? alg->cra_blkcipher.ivsize :
255 					  alg->cra_ablkcipher.ivsize)) ||
256 	    (!((type ^ CRYPTO_ALG_TYPE_AEAD) & CRYPTO_ALG_TYPE_MASK) &&
257 	     alg->cra_type == &crypto_nivaead_type && alg->cra_aead.ivsize))
258 		type |= CRYPTO_ALG_TESTED;
259 
260 	param->type = type;
261 
262 	thread = kthread_run(cryptomgr_test, param, "cryptomgr_test");
263 	if (IS_ERR(thread))
264 		goto err_free_param;
265 
266 	return NOTIFY_STOP;
267 
268 err_free_param:
269 	kfree(param);
270 err_put_module:
271 	module_put(THIS_MODULE);
272 err:
273 	return NOTIFY_OK;
274 }
275 
276 static int cryptomgr_notify(struct notifier_block *this, unsigned long msg,
277 			    void *data)
278 {
279 	switch (msg) {
280 	case CRYPTO_MSG_ALG_REQUEST:
281 		return cryptomgr_schedule_probe(data);
282 	case CRYPTO_MSG_ALG_REGISTER:
283 		return cryptomgr_schedule_test(data);
284 	}
285 
286 	return NOTIFY_DONE;
287 }
288 
289 static struct notifier_block cryptomgr_notifier = {
290 	.notifier_call = cryptomgr_notify,
291 };
292 
293 static int __init cryptomgr_init(void)
294 {
295 	return crypto_register_notifier(&cryptomgr_notifier);
296 }
297 
298 static void __exit cryptomgr_exit(void)
299 {
300 	int err = crypto_unregister_notifier(&cryptomgr_notifier);
301 	BUG_ON(err);
302 }
303 
304 subsys_initcall(cryptomgr_init);
305 module_exit(cryptomgr_exit);
306 
307 MODULE_LICENSE("GPL");
308 MODULE_DESCRIPTION("Crypto Algorithm Manager");
309