diff options
author | Jonathan Herman <hermanjl@cs.unc.edu> | 2013-01-22 10:38:37 -0500 |
---|---|---|
committer | Jonathan Herman <hermanjl@cs.unc.edu> | 2013-01-22 10:38:37 -0500 |
commit | fcc9d2e5a6c89d22b8b773a64fb4ad21ac318446 (patch) | |
tree | a57612d1888735a2ec7972891b68c1ac5ec8faea /drivers/staging/rtl8192u | |
parent | 8dea78da5cee153b8af9c07a2745f6c55057fe12 (diff) |
Diffstat (limited to 'drivers/staging/rtl8192u')
-rw-r--r-- | drivers/staging/rtl8192u/ieee80211/api.c | 244 | ||||
-rw-r--r-- | drivers/staging/rtl8192u/ieee80211/kmap_types.h | 20 |
2 files changed, 264 insertions, 0 deletions
diff --git a/drivers/staging/rtl8192u/ieee80211/api.c b/drivers/staging/rtl8192u/ieee80211/api.c new file mode 100644 index 00000000000..5f46e50e586 --- /dev/null +++ b/drivers/staging/rtl8192u/ieee80211/api.c | |||
@@ -0,0 +1,244 @@ | |||
1 | /* | ||
2 | * Scatterlist Cryptographic API. | ||
3 | * | ||
4 | * Copyright (c) 2002 James Morris <jmorris@intercode.com.au> | ||
5 | * Copyright (c) 2002 David S. Miller (davem@redhat.com) | ||
6 | * | ||
7 | * Portions derived from Cryptoapi, by Alexander Kjeldaas <astor@fast.no> | ||
8 | * and Nettle, by Niels Mé°ˆler. | ||
9 | * | ||
10 | * This program is free software; you can redistribute it and/or modify it | ||
11 | * under the terms of the GNU General Public License as published by the Free | ||
12 | * Software Foundation; either version 2 of the License, or (at your option) | ||
13 | * any later version. | ||
14 | * | ||
15 | */ | ||
16 | #include "kmap_types.h" | ||
17 | |||
18 | #include <linux/init.h> | ||
19 | #include <linux/module.h> | ||
20 | //#include <linux/crypto.h> | ||
21 | #include "rtl_crypto.h" | ||
22 | #include <linux/errno.h> | ||
23 | #include <linux/rwsem.h> | ||
24 | #include <linux/slab.h> | ||
25 | #include "internal.h" | ||
26 | |||
27 | LIST_HEAD(crypto_alg_list); | ||
28 | DECLARE_RWSEM(crypto_alg_sem); | ||
29 | |||
30 | static inline int crypto_alg_get(struct crypto_alg *alg) | ||
31 | { | ||
32 | return try_inc_mod_count(alg->cra_module); | ||
33 | } | ||
34 | |||
35 | static inline void crypto_alg_put(struct crypto_alg *alg) | ||
36 | { | ||
37 | if (alg->cra_module) | ||
38 | __MOD_DEC_USE_COUNT(alg->cra_module); | ||
39 | } | ||
40 | |||
41 | struct crypto_alg *crypto_alg_lookup(const char *name) | ||
42 | { | ||
43 | struct crypto_alg *q, *alg = NULL; | ||
44 | |||
45 | if (!name) | ||
46 | return NULL; | ||
47 | |||
48 | down_read(&crypto_alg_sem); | ||
49 | |||
50 | list_for_each_entry(q, &crypto_alg_list, cra_list) { | ||
51 | if (!(strcmp(q->cra_name, name))) { | ||
52 | if (crypto_alg_get(q)) | ||
53 | alg = q; | ||
54 | break; | ||
55 | } | ||
56 | } | ||
57 | |||
58 | up_read(&crypto_alg_sem); | ||
59 | return alg; | ||
60 | } | ||
61 | |||
62 | static int crypto_init_flags(struct crypto_tfm *tfm, u32 flags) | ||
63 | { | ||
64 | tfm->crt_flags = 0; | ||
65 | |||
66 | switch (crypto_tfm_alg_type(tfm)) { | ||
67 | case CRYPTO_ALG_TYPE_CIPHER: | ||
68 | return crypto_init_cipher_flags(tfm, flags); | ||
69 | |||
70 | case CRYPTO_ALG_TYPE_DIGEST: | ||
71 | return crypto_init_digest_flags(tfm, flags); | ||
72 | |||
73 | case CRYPTO_ALG_TYPE_COMPRESS: | ||
74 | return crypto_init_compress_flags(tfm, flags); | ||
75 | |||
76 | default: | ||
77 | break; | ||
78 | } | ||
79 | |||
80 | BUG(); | ||
81 | return -EINVAL; | ||
82 | } | ||
83 | |||
84 | static int crypto_init_ops(struct crypto_tfm *tfm) | ||
85 | { | ||
86 | switch (crypto_tfm_alg_type(tfm)) { | ||
87 | case CRYPTO_ALG_TYPE_CIPHER: | ||
88 | return crypto_init_cipher_ops(tfm); | ||
89 | |||
90 | case CRYPTO_ALG_TYPE_DIGEST: | ||
91 | return crypto_init_digest_ops(tfm); | ||
92 | |||
93 | case CRYPTO_ALG_TYPE_COMPRESS: | ||
94 | return crypto_init_compress_ops(tfm); | ||
95 | |||
96 | default: | ||
97 | break; | ||
98 | } | ||
99 | |||
100 | BUG(); | ||
101 | return -EINVAL; | ||
102 | } | ||
103 | |||
104 | static void crypto_exit_ops(struct crypto_tfm *tfm) | ||
105 | { | ||
106 | switch (crypto_tfm_alg_type(tfm)) { | ||
107 | case CRYPTO_ALG_TYPE_CIPHER: | ||
108 | crypto_exit_cipher_ops(tfm); | ||
109 | break; | ||
110 | |||
111 | case CRYPTO_ALG_TYPE_DIGEST: | ||
112 | crypto_exit_digest_ops(tfm); | ||
113 | break; | ||
114 | |||
115 | case CRYPTO_ALG_TYPE_COMPRESS: | ||
116 | crypto_exit_compress_ops(tfm); | ||
117 | break; | ||
118 | |||
119 | default: | ||
120 | BUG(); | ||
121 | |||
122 | } | ||
123 | } | ||
124 | |||
125 | struct crypto_tfm *crypto_alloc_tfm(const char *name, u32 flags) | ||
126 | { | ||
127 | struct crypto_tfm *tfm = NULL; | ||
128 | struct crypto_alg *alg; | ||
129 | |||
130 | alg = crypto_alg_mod_lookup(name); | ||
131 | if (alg == NULL) | ||
132 | goto out; | ||
133 | |||
134 | tfm = kzalloc(sizeof(*tfm) + alg->cra_ctxsize, GFP_KERNEL); | ||
135 | if (tfm == NULL) | ||
136 | goto out_put; | ||
137 | |||
138 | tfm->__crt_alg = alg; | ||
139 | |||
140 | if (crypto_init_flags(tfm, flags)) | ||
141 | goto out_free_tfm; | ||
142 | |||
143 | if (crypto_init_ops(tfm)) { | ||
144 | crypto_exit_ops(tfm); | ||
145 | goto out_free_tfm; | ||
146 | } | ||
147 | |||
148 | goto out; | ||
149 | |||
150 | out_free_tfm: | ||
151 | kfree(tfm); | ||
152 | tfm = NULL; | ||
153 | out_put: | ||
154 | crypto_alg_put(alg); | ||
155 | out: | ||
156 | return tfm; | ||
157 | } | ||
158 | |||
159 | void crypto_free_tfm(struct crypto_tfm *tfm) | ||
160 | { | ||
161 | struct crypto_alg *alg = tfm->__crt_alg; | ||
162 | int size = sizeof(*tfm) + alg->cra_ctxsize; | ||
163 | |||
164 | crypto_exit_ops(tfm); | ||
165 | crypto_alg_put(alg); | ||
166 | memset(tfm, 0, size); | ||
167 | kfree(tfm); | ||
168 | } | ||
169 | |||
170 | int crypto_register_alg(struct crypto_alg *alg) | ||
171 | { | ||
172 | int ret = 0; | ||
173 | struct crypto_alg *q; | ||
174 | |||
175 | down_write(&crypto_alg_sem); | ||
176 | |||
177 | list_for_each_entry(q, &crypto_alg_list, cra_list) { | ||
178 | if (!(strcmp(q->cra_name, alg->cra_name))) { | ||
179 | ret = -EEXIST; | ||
180 | goto out; | ||
181 | } | ||
182 | } | ||
183 | |||
184 | list_add_tail(&alg->cra_list, &crypto_alg_list); | ||
185 | out: | ||
186 | up_write(&crypto_alg_sem); | ||
187 | return ret; | ||
188 | } | ||
189 | |||
190 | int crypto_unregister_alg(struct crypto_alg *alg) | ||
191 | { | ||
192 | int ret = -ENOENT; | ||
193 | struct crypto_alg *q; | ||
194 | |||
195 | BUG_ON(!alg->cra_module); | ||
196 | |||
197 | down_write(&crypto_alg_sem); | ||
198 | list_for_each_entry(q, &crypto_alg_list, cra_list) { | ||
199 | if (alg == q) { | ||
200 | list_del(&alg->cra_list); | ||
201 | ret = 0; | ||
202 | goto out; | ||
203 | } | ||
204 | } | ||
205 | out: | ||
206 | up_write(&crypto_alg_sem); | ||
207 | return ret; | ||
208 | } | ||
209 | |||
210 | int crypto_alg_available(const char *name, u32 flags) | ||
211 | { | ||
212 | int ret = 0; | ||
213 | struct crypto_alg *alg = crypto_alg_mod_lookup(name); | ||
214 | |||
215 | if (alg) { | ||
216 | crypto_alg_put(alg); | ||
217 | ret = 1; | ||
218 | } | ||
219 | |||
220 | return ret; | ||
221 | } | ||
222 | |||
223 | static int __init init_crypto(void) | ||
224 | { | ||
225 | printk(KERN_INFO "Initializing Cryptographic API\n"); | ||
226 | crypto_init_proc(); | ||
227 | return 0; | ||
228 | } | ||
229 | |||
230 | __initcall(init_crypto); | ||
231 | |||
232 | /* | ||
233 | EXPORT_SYMBOL_GPL(crypto_register_alg); | ||
234 | EXPORT_SYMBOL_GPL(crypto_unregister_alg); | ||
235 | EXPORT_SYMBOL_GPL(crypto_alloc_tfm); | ||
236 | EXPORT_SYMBOL_GPL(crypto_free_tfm); | ||
237 | EXPORT_SYMBOL_GPL(crypto_alg_available); | ||
238 | */ | ||
239 | |||
240 | EXPORT_SYMBOL_NOVERS(crypto_register_alg); | ||
241 | EXPORT_SYMBOL_NOVERS(crypto_unregister_alg); | ||
242 | EXPORT_SYMBOL_NOVERS(crypto_alloc_tfm); | ||
243 | EXPORT_SYMBOL_NOVERS(crypto_free_tfm); | ||
244 | EXPORT_SYMBOL_NOVERS(crypto_alg_available); | ||
diff --git a/drivers/staging/rtl8192u/ieee80211/kmap_types.h b/drivers/staging/rtl8192u/ieee80211/kmap_types.h new file mode 100644 index 00000000000..de67bb01b5f --- /dev/null +++ b/drivers/staging/rtl8192u/ieee80211/kmap_types.h | |||
@@ -0,0 +1,20 @@ | |||
1 | #ifndef __KMAP_TYPES_H | ||
2 | |||
3 | #define __KMAP_TYPES_H | ||
4 | |||
5 | |||
6 | enum km_type { | ||
7 | KM_BOUNCE_READ, | ||
8 | KM_SKB_SUNRPC_DATA, | ||
9 | KM_SKB_DATA_SOFTIRQ, | ||
10 | KM_USER0, | ||
11 | KM_USER1, | ||
12 | KM_BH_IRQ, | ||
13 | KM_SOFTIRQ0, | ||
14 | KM_SOFTIRQ1, | ||
15 | KM_TYPE_NR | ||
16 | }; | ||
17 | |||
18 | #define _ASM_KMAP_TYPES_H | ||
19 | |||
20 | #endif | ||