xref: /openbmc/linux/crypto/algboss.c (revision f9834f18)
1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /*
3  * Create default crypto algorithm instances.
4  *
5  * Copyright (c) 2006 Herbert Xu <herbert@gondor.apana.org.au>
6  */
7 
8 #include <crypto/internal/aead.h>
9 #include <linux/completion.h>
10 #include <linux/ctype.h>
11 #include <linux/err.h>
12 #include <linux/init.h>
13 #include <linux/kthread.h>
14 #include <linux/module.h>
15 #include <linux/notifier.h>
16 #include <linux/rtnetlink.h>
17 #include <linux/sched/signal.h>
18 #include <linux/slab.h>
19 #include <linux/string.h>
20 
21 #include "internal.h"
22 
23 struct cryptomgr_param {
24 	struct rtattr *tb[CRYPTO_MAX_ATTRS + 2];
25 
26 	struct {
27 		struct rtattr attr;
28 		struct crypto_attr_type data;
29 	} type;
30 
31 	union {
32 		struct rtattr attr;
33 		struct {
34 			struct rtattr attr;
35 			struct crypto_attr_alg data;
36 		} alg;
37 		struct {
38 			struct rtattr attr;
39 			struct crypto_attr_u32 data;
40 		} nu32;
41 	} attrs[CRYPTO_MAX_ATTRS];
42 
43 	char template[CRYPTO_MAX_ALG_NAME];
44 
45 	struct crypto_larval *larval;
46 
47 	u32 otype;
48 	u32 omask;
49 };
50 
51 struct crypto_test_param {
52 	char driver[CRYPTO_MAX_ALG_NAME];
53 	char alg[CRYPTO_MAX_ALG_NAME];
54 	u32 type;
55 };
56 
57 static int cryptomgr_probe(void *data)
58 {
59 	struct cryptomgr_param *param = data;
60 	struct crypto_template *tmpl;
61 	int err;
62 
63 	tmpl = crypto_lookup_template(param->template);
64 	if (!tmpl)
65 		goto out;
66 
67 	do {
68 		err = tmpl->create(tmpl, param->tb);
69 	} while (err == -EAGAIN && !signal_pending(current));
70 
71 	crypto_tmpl_put(tmpl);
72 
73 out:
74 	complete_all(&param->larval->completion);
75 	crypto_alg_put(&param->larval->alg);
76 	kfree(param);
77 	module_put_and_exit(0);
78 }
79 
80 static int cryptomgr_schedule_probe(struct crypto_larval *larval)
81 {
82 	struct task_struct *thread;
83 	struct cryptomgr_param *param;
84 	const char *name = larval->alg.cra_name;
85 	const char *p;
86 	unsigned int len;
87 	int i;
88 
89 	if (!try_module_get(THIS_MODULE))
90 		goto err;
91 
92 	param = kzalloc(sizeof(*param), GFP_KERNEL);
93 	if (!param)
94 		goto err_put_module;
95 
96 	for (p = name; isalnum(*p) || *p == '-' || *p == '_'; p++)
97 		;
98 
99 	len = p - name;
100 	if (!len || *p != '(')
101 		goto err_free_param;
102 
103 	memcpy(param->template, name, len);
104 
105 	i = 0;
106 	for (;;) {
107 		int notnum = 0;
108 
109 		name = ++p;
110 
111 		for (; isalnum(*p) || *p == '-' || *p == '_'; p++)
112 			notnum |= !isdigit(*p);
113 
114 		if (*p == '(') {
115 			int recursion = 0;
116 
117 			for (;;) {
118 				if (!*++p)
119 					goto err_free_param;
120 				if (*p == '(')
121 					recursion++;
122 				else if (*p == ')' && !recursion--)
123 					break;
124 			}
125 
126 			notnum = 1;
127 			p++;
128 		}
129 
130 		len = p - name;
131 		if (!len)
132 			goto err_free_param;
133 
134 		if (notnum) {
135 			param->attrs[i].alg.attr.rta_len =
136 				sizeof(param->attrs[i].alg);
137 			param->attrs[i].alg.attr.rta_type = CRYPTOA_ALG;
138 			memcpy(param->attrs[i].alg.data.name, name, len);
139 		} else {
140 			param->attrs[i].nu32.attr.rta_len =
141 				sizeof(param->attrs[i].nu32);
142 			param->attrs[i].nu32.attr.rta_type = CRYPTOA_U32;
143 			param->attrs[i].nu32.data.num =
144 				simple_strtol(name, NULL, 0);
145 		}
146 
147 		param->tb[i + 1] = &param->attrs[i].attr;
148 		i++;
149 
150 		if (i >= CRYPTO_MAX_ATTRS)
151 			goto err_free_param;
152 
153 		if (*p == ')')
154 			break;
155 
156 		if (*p != ',')
157 			goto err_free_param;
158 	}
159 
160 	if (!i)
161 		goto err_free_param;
162 
163 	param->tb[i + 1] = NULL;
164 
165 	param->type.attr.rta_len = sizeof(param->type);
166 	param->type.attr.rta_type = CRYPTOA_TYPE;
167 	param->type.data.type = larval->alg.cra_flags & ~CRYPTO_ALG_TESTED;
168 	param->type.data.mask = larval->mask & ~CRYPTO_ALG_TESTED;
169 	param->tb[0] = &param->type.attr;
170 
171 	param->otype = larval->alg.cra_flags;
172 	param->omask = larval->mask;
173 
174 	crypto_alg_get(&larval->alg);
175 	param->larval = larval;
176 
177 	thread = kthread_run(cryptomgr_probe, param, "cryptomgr_probe");
178 	if (IS_ERR(thread))
179 		goto err_put_larval;
180 
181 	wait_for_completion_interruptible(&larval->completion);
182 
183 	return NOTIFY_STOP;
184 
185 err_put_larval:
186 	crypto_alg_put(&larval->alg);
187 err_free_param:
188 	kfree(param);
189 err_put_module:
190 	module_put(THIS_MODULE);
191 err:
192 	return NOTIFY_OK;
193 }
194 
195 static int cryptomgr_test(void *data)
196 {
197 	struct crypto_test_param *param = data;
198 	u32 type = param->type;
199 	int err = 0;
200 
201 #ifdef CONFIG_CRYPTO_MANAGER_DISABLE_TESTS
202 	goto skiptest;
203 #endif
204 
205 	if (type & CRYPTO_ALG_TESTED)
206 		goto skiptest;
207 
208 	err = alg_test(param->driver, param->alg, type, CRYPTO_ALG_TESTED);
209 
210 skiptest:
211 	crypto_alg_tested(param->driver, err);
212 
213 	kfree(param);
214 	module_put_and_exit(0);
215 }
216 
217 static int cryptomgr_schedule_test(struct crypto_alg *alg)
218 {
219 	struct task_struct *thread;
220 	struct crypto_test_param *param;
221 	u32 type;
222 
223 	if (!try_module_get(THIS_MODULE))
224 		goto err;
225 
226 	param = kzalloc(sizeof(*param), GFP_KERNEL);
227 	if (!param)
228 		goto err_put_module;
229 
230 	memcpy(param->driver, alg->cra_driver_name, sizeof(param->driver));
231 	memcpy(param->alg, alg->cra_name, sizeof(param->alg));
232 	type = alg->cra_flags;
233 
234 	/* Do not test internal algorithms. */
235 	if (type & CRYPTO_ALG_INTERNAL)
236 		type |= CRYPTO_ALG_TESTED;
237 
238 	param->type = type;
239 
240 	thread = kthread_run(cryptomgr_test, param, "cryptomgr_test");
241 	if (IS_ERR(thread))
242 		goto err_free_param;
243 
244 	return NOTIFY_STOP;
245 
246 err_free_param:
247 	kfree(param);
248 err_put_module:
249 	module_put(THIS_MODULE);
250 err:
251 	return NOTIFY_OK;
252 }
253 
254 static int cryptomgr_notify(struct notifier_block *this, unsigned long msg,
255 			    void *data)
256 {
257 	switch (msg) {
258 	case CRYPTO_MSG_ALG_REQUEST:
259 		return cryptomgr_schedule_probe(data);
260 	case CRYPTO_MSG_ALG_REGISTER:
261 		return cryptomgr_schedule_test(data);
262 	case CRYPTO_MSG_ALG_LOADED:
263 		break;
264 	}
265 
266 	return NOTIFY_DONE;
267 }
268 
269 static struct notifier_block cryptomgr_notifier = {
270 	.notifier_call = cryptomgr_notify,
271 };
272 
273 static int __init cryptomgr_init(void)
274 {
275 	return crypto_register_notifier(&cryptomgr_notifier);
276 }
277 
278 static void __exit cryptomgr_exit(void)
279 {
280 	int err = crypto_unregister_notifier(&cryptomgr_notifier);
281 	BUG_ON(err);
282 }
283 
284 /*
285  * This is arch_initcall() so that the crypto self-tests are run on algorithms
286  * registered early by subsys_initcall().  subsys_initcall() is needed for
287  * generic implementations so that they're available for comparison tests when
288  * other implementations are registered later by module_init().
289  */
290 arch_initcall(cryptomgr_init);
291 module_exit(cryptomgr_exit);
292 
293 MODULE_LICENSE("GPL");
294 MODULE_DESCRIPTION("Crypto Algorithm Manager");
295