xref: /openbmc/linux/crypto/algboss.c (revision ecd25094)
1  // SPDX-License-Identifier: GPL-2.0-or-later
2  /*
3   * Create default crypto algorithm instances.
4   *
5   * Copyright (c) 2006 Herbert Xu <herbert@gondor.apana.org.au>
6   */
7  
8  #include <crypto/internal/aead.h>
9  #include <linux/completion.h>
10  #include <linux/ctype.h>
11  #include <linux/err.h>
12  #include <linux/init.h>
13  #include <linux/kthread.h>
14  #include <linux/module.h>
15  #include <linux/notifier.h>
16  #include <linux/rtnetlink.h>
17  #include <linux/sched/signal.h>
18  #include <linux/slab.h>
19  #include <linux/string.h>
20  
21  #include "internal.h"
22  
23  struct cryptomgr_param {
24  	struct rtattr *tb[CRYPTO_MAX_ATTRS + 2];
25  
26  	struct {
27  		struct rtattr attr;
28  		struct crypto_attr_type data;
29  	} type;
30  
31  	union {
32  		struct rtattr attr;
33  		struct {
34  			struct rtattr attr;
35  			struct crypto_attr_alg data;
36  		} alg;
37  		struct {
38  			struct rtattr attr;
39  			struct crypto_attr_u32 data;
40  		} nu32;
41  	} attrs[CRYPTO_MAX_ATTRS];
42  
43  	char template[CRYPTO_MAX_ALG_NAME];
44  
45  	struct crypto_larval *larval;
46  
47  	u32 otype;
48  	u32 omask;
49  };
50  
51  struct crypto_test_param {
52  	char driver[CRYPTO_MAX_ALG_NAME];
53  	char alg[CRYPTO_MAX_ALG_NAME];
54  	u32 type;
55  };
56  
57  static int cryptomgr_probe(void *data)
58  {
59  	struct cryptomgr_param *param = data;
60  	struct crypto_template *tmpl;
61  	struct crypto_instance *inst;
62  	int err;
63  
64  	tmpl = crypto_lookup_template(param->template);
65  	if (!tmpl)
66  		goto out;
67  
68  	do {
69  		if (tmpl->create) {
70  			err = tmpl->create(tmpl, param->tb);
71  			continue;
72  		}
73  
74  		inst = tmpl->alloc(param->tb);
75  		if (IS_ERR(inst))
76  			err = PTR_ERR(inst);
77  		else if ((err = crypto_register_instance(tmpl, inst)))
78  			tmpl->free(inst);
79  	} while (err == -EAGAIN && !signal_pending(current));
80  
81  	crypto_tmpl_put(tmpl);
82  
83  out:
84  	complete_all(&param->larval->completion);
85  	crypto_alg_put(&param->larval->alg);
86  	kfree(param);
87  	module_put_and_exit(0);
88  }
89  
90  static int cryptomgr_schedule_probe(struct crypto_larval *larval)
91  {
92  	struct task_struct *thread;
93  	struct cryptomgr_param *param;
94  	const char *name = larval->alg.cra_name;
95  	const char *p;
96  	unsigned int len;
97  	int i;
98  
99  	if (!try_module_get(THIS_MODULE))
100  		goto err;
101  
102  	param = kzalloc(sizeof(*param), GFP_KERNEL);
103  	if (!param)
104  		goto err_put_module;
105  
106  	for (p = name; isalnum(*p) || *p == '-' || *p == '_'; p++)
107  		;
108  
109  	len = p - name;
110  	if (!len || *p != '(')
111  		goto err_free_param;
112  
113  	memcpy(param->template, name, len);
114  
115  	i = 0;
116  	for (;;) {
117  		int notnum = 0;
118  
119  		name = ++p;
120  
121  		for (; isalnum(*p) || *p == '-' || *p == '_'; p++)
122  			notnum |= !isdigit(*p);
123  
124  		if (*p == '(') {
125  			int recursion = 0;
126  
127  			for (;;) {
128  				if (!*++p)
129  					goto err_free_param;
130  				if (*p == '(')
131  					recursion++;
132  				else if (*p == ')' && !recursion--)
133  					break;
134  			}
135  
136  			notnum = 1;
137  			p++;
138  		}
139  
140  		len = p - name;
141  		if (!len)
142  			goto err_free_param;
143  
144  		if (notnum) {
145  			param->attrs[i].alg.attr.rta_len =
146  				sizeof(param->attrs[i].alg);
147  			param->attrs[i].alg.attr.rta_type = CRYPTOA_ALG;
148  			memcpy(param->attrs[i].alg.data.name, name, len);
149  		} else {
150  			param->attrs[i].nu32.attr.rta_len =
151  				sizeof(param->attrs[i].nu32);
152  			param->attrs[i].nu32.attr.rta_type = CRYPTOA_U32;
153  			param->attrs[i].nu32.data.num =
154  				simple_strtol(name, NULL, 0);
155  		}
156  
157  		param->tb[i + 1] = &param->attrs[i].attr;
158  		i++;
159  
160  		if (i >= CRYPTO_MAX_ATTRS)
161  			goto err_free_param;
162  
163  		if (*p == ')')
164  			break;
165  
166  		if (*p != ',')
167  			goto err_free_param;
168  	}
169  
170  	if (!i)
171  		goto err_free_param;
172  
173  	param->tb[i + 1] = NULL;
174  
175  	param->type.attr.rta_len = sizeof(param->type);
176  	param->type.attr.rta_type = CRYPTOA_TYPE;
177  	param->type.data.type = larval->alg.cra_flags & ~CRYPTO_ALG_TESTED;
178  	param->type.data.mask = larval->mask & ~CRYPTO_ALG_TESTED;
179  	param->tb[0] = &param->type.attr;
180  
181  	param->otype = larval->alg.cra_flags;
182  	param->omask = larval->mask;
183  
184  	crypto_alg_get(&larval->alg);
185  	param->larval = larval;
186  
187  	thread = kthread_run(cryptomgr_probe, param, "cryptomgr_probe");
188  	if (IS_ERR(thread))
189  		goto err_put_larval;
190  
191  	wait_for_completion_interruptible(&larval->completion);
192  
193  	return NOTIFY_STOP;
194  
195  err_put_larval:
196  	crypto_alg_put(&larval->alg);
197  err_free_param:
198  	kfree(param);
199  err_put_module:
200  	module_put(THIS_MODULE);
201  err:
202  	return NOTIFY_OK;
203  }
204  
205  static int cryptomgr_test(void *data)
206  {
207  	struct crypto_test_param *param = data;
208  	u32 type = param->type;
209  	int err = 0;
210  
211  #ifdef CONFIG_CRYPTO_MANAGER_DISABLE_TESTS
212  	goto skiptest;
213  #endif
214  
215  	if (type & CRYPTO_ALG_TESTED)
216  		goto skiptest;
217  
218  	err = alg_test(param->driver, param->alg, type, CRYPTO_ALG_TESTED);
219  
220  skiptest:
221  	crypto_alg_tested(param->driver, err);
222  
223  	kfree(param);
224  	module_put_and_exit(0);
225  }
226  
227  static int cryptomgr_schedule_test(struct crypto_alg *alg)
228  {
229  	struct task_struct *thread;
230  	struct crypto_test_param *param;
231  	u32 type;
232  
233  	if (!try_module_get(THIS_MODULE))
234  		goto err;
235  
236  	param = kzalloc(sizeof(*param), GFP_KERNEL);
237  	if (!param)
238  		goto err_put_module;
239  
240  	memcpy(param->driver, alg->cra_driver_name, sizeof(param->driver));
241  	memcpy(param->alg, alg->cra_name, sizeof(param->alg));
242  	type = alg->cra_flags;
243  
244  	/* Do not test internal algorithms. */
245  	if (type & CRYPTO_ALG_INTERNAL)
246  		type |= CRYPTO_ALG_TESTED;
247  
248  	param->type = type;
249  
250  	thread = kthread_run(cryptomgr_test, param, "cryptomgr_test");
251  	if (IS_ERR(thread))
252  		goto err_free_param;
253  
254  	return NOTIFY_STOP;
255  
256  err_free_param:
257  	kfree(param);
258  err_put_module:
259  	module_put(THIS_MODULE);
260  err:
261  	return NOTIFY_OK;
262  }
263  
264  static int cryptomgr_notify(struct notifier_block *this, unsigned long msg,
265  			    void *data)
266  {
267  	switch (msg) {
268  	case CRYPTO_MSG_ALG_REQUEST:
269  		return cryptomgr_schedule_probe(data);
270  	case CRYPTO_MSG_ALG_REGISTER:
271  		return cryptomgr_schedule_test(data);
272  	case CRYPTO_MSG_ALG_LOADED:
273  		break;
274  	}
275  
276  	return NOTIFY_DONE;
277  }
278  
279  static struct notifier_block cryptomgr_notifier = {
280  	.notifier_call = cryptomgr_notify,
281  };
282  
283  static int __init cryptomgr_init(void)
284  {
285  	return crypto_register_notifier(&cryptomgr_notifier);
286  }
287  
288  static void __exit cryptomgr_exit(void)
289  {
290  	int err = crypto_unregister_notifier(&cryptomgr_notifier);
291  	BUG_ON(err);
292  }
293  
294  /*
295   * This is arch_initcall() so that the crypto self-tests are run on algorithms
296   * registered early by subsys_initcall().  subsys_initcall() is needed for
297   * generic implementations so that they're available for comparison tests when
298   * other implementations are registered later by module_init().
299   */
300  arch_initcall(cryptomgr_init);
301  module_exit(cryptomgr_exit);
302  
303  MODULE_LICENSE("GPL");
304  MODULE_DESCRIPTION("Crypto Algorithm Manager");
305