diff options
Diffstat (limited to 'crypto')
-rw-r--r-- | crypto/Kconfig | 3 | ||||
-rw-r--r-- | crypto/Makefile | 1 | ||||
-rw-r--r-- | crypto/af_alg.c | 482 |
3 files changed, 486 insertions, 0 deletions
diff --git a/crypto/Kconfig b/crypto/Kconfig index e4bac29a32e7..357e3caf4cbe 100644 --- a/crypto/Kconfig +++ b/crypto/Kconfig | |||
@@ -841,6 +841,9 @@ config CRYPTO_ANSI_CPRNG | |||
841 | ANSI X9.31 A.2.4. Note that this option must be enabled if | 841 | ANSI X9.31 A.2.4. Note that this option must be enabled if |
842 | CRYPTO_FIPS is selected | 842 | CRYPTO_FIPS is selected |
843 | 843 | ||
844 | config CRYPTO_USER_API | ||
845 | tristate | ||
846 | |||
844 | source "drivers/crypto/Kconfig" | 847 | source "drivers/crypto/Kconfig" |
845 | 848 | ||
846 | endif # if CRYPTO | 849 | endif # if CRYPTO |
diff --git a/crypto/Makefile b/crypto/Makefile index 423b7de61f93..0b1319734bc0 100644 --- a/crypto/Makefile +++ b/crypto/Makefile | |||
@@ -85,6 +85,7 @@ obj-$(CONFIG_CRYPTO_RNG2) += krng.o | |||
85 | obj-$(CONFIG_CRYPTO_ANSI_CPRNG) += ansi_cprng.o | 85 | obj-$(CONFIG_CRYPTO_ANSI_CPRNG) += ansi_cprng.o |
86 | obj-$(CONFIG_CRYPTO_TEST) += tcrypt.o | 86 | obj-$(CONFIG_CRYPTO_TEST) += tcrypt.o |
87 | obj-$(CONFIG_CRYPTO_GHASH) += ghash-generic.o | 87 | obj-$(CONFIG_CRYPTO_GHASH) += ghash-generic.o |
88 | obj-$(CONFIG_CRYPTO_USER_API) += af_alg.o | ||
88 | 89 | ||
89 | # | 90 | # |
90 | # generic algorithms and the async_tx api | 91 | # generic algorithms and the async_tx api |
diff --git a/crypto/af_alg.c b/crypto/af_alg.c new file mode 100644 index 000000000000..cabed0e9c9d8 --- /dev/null +++ b/crypto/af_alg.c | |||
@@ -0,0 +1,482 @@ | |||
1 | /* | ||
2 | * af_alg: User-space algorithm interface | ||
3 | * | ||
4 | * This file provides the user-space API for algorithms. | ||
5 | * | ||
6 | * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au> | ||
7 | * | ||
8 | * This program is free software; you can redistribute it and/or modify it | ||
9 | * under the terms of the GNU General Public License as published by the Free | ||
10 | * Software Foundation; either version 2 of the License, or (at your option) | ||
11 | * any later version. | ||
12 | * | ||
13 | */ | ||
14 | |||
15 | #include <asm/atomic.h> | ||
16 | #include <crypto/if_alg.h> | ||
17 | #include <linux/crypto.h> | ||
18 | #include <linux/init.h> | ||
19 | #include <linux/kernel.h> | ||
20 | #include <linux/list.h> | ||
21 | #include <linux/module.h> | ||
22 | #include <linux/net.h> | ||
23 | #include <linux/rwsem.h> | ||
24 | |||
25 | struct alg_type_list { | ||
26 | const struct af_alg_type *type; | ||
27 | struct list_head list; | ||
28 | }; | ||
29 | |||
30 | static atomic_t alg_memory_allocated; | ||
31 | |||
32 | static struct proto alg_proto = { | ||
33 | .name = "ALG", | ||
34 | .owner = THIS_MODULE, | ||
35 | .memory_allocated = &alg_memory_allocated, | ||
36 | .obj_size = sizeof(struct alg_sock), | ||
37 | }; | ||
38 | |||
39 | static LIST_HEAD(alg_types); | ||
40 | static DECLARE_RWSEM(alg_types_sem); | ||
41 | |||
42 | static const struct af_alg_type *alg_get_type(const char *name) | ||
43 | { | ||
44 | const struct af_alg_type *type = ERR_PTR(-ENOENT); | ||
45 | struct alg_type_list *node; | ||
46 | |||
47 | down_read(&alg_types_sem); | ||
48 | list_for_each_entry(node, &alg_types, list) { | ||
49 | if (strcmp(node->type->name, name)) | ||
50 | continue; | ||
51 | |||
52 | if (try_module_get(node->type->owner)) | ||
53 | type = node->type; | ||
54 | break; | ||
55 | } | ||
56 | up_read(&alg_types_sem); | ||
57 | |||
58 | return type; | ||
59 | } | ||
60 | |||
61 | int af_alg_register_type(const struct af_alg_type *type) | ||
62 | { | ||
63 | struct alg_type_list *node; | ||
64 | int err = -EEXIST; | ||
65 | |||
66 | down_write(&alg_types_sem); | ||
67 | list_for_each_entry(node, &alg_types, list) { | ||
68 | if (!strcmp(node->type->name, type->name)) | ||
69 | goto unlock; | ||
70 | } | ||
71 | |||
72 | node = kmalloc(sizeof(*node), GFP_KERNEL); | ||
73 | err = -ENOMEM; | ||
74 | if (!node) | ||
75 | goto unlock; | ||
76 | |||
77 | type->ops->owner = THIS_MODULE; | ||
78 | node->type = type; | ||
79 | list_add(&node->list, &alg_types); | ||
80 | err = 0; | ||
81 | |||
82 | unlock: | ||
83 | up_write(&alg_types_sem); | ||
84 | |||
85 | return err; | ||
86 | } | ||
87 | EXPORT_SYMBOL_GPL(af_alg_register_type); | ||
88 | |||
89 | int af_alg_unregister_type(const struct af_alg_type *type) | ||
90 | { | ||
91 | struct alg_type_list *node; | ||
92 | int err = -ENOENT; | ||
93 | |||
94 | down_write(&alg_types_sem); | ||
95 | list_for_each_entry(node, &alg_types, list) { | ||
96 | if (strcmp(node->type->name, type->name)) | ||
97 | continue; | ||
98 | |||
99 | list_del(&node->list); | ||
100 | kfree(node); | ||
101 | err = 0; | ||
102 | break; | ||
103 | } | ||
104 | up_write(&alg_types_sem); | ||
105 | |||
106 | return err; | ||
107 | } | ||
108 | EXPORT_SYMBOL_GPL(af_alg_unregister_type); | ||
109 | |||
110 | static void alg_do_release(const struct af_alg_type *type, void *private) | ||
111 | { | ||
112 | if (!type) | ||
113 | return; | ||
114 | |||
115 | type->release(private); | ||
116 | module_put(type->owner); | ||
117 | } | ||
118 | |||
119 | int af_alg_release(struct socket *sock) | ||
120 | { | ||
121 | if (sock->sk) | ||
122 | sock_put(sock->sk); | ||
123 | return 0; | ||
124 | } | ||
125 | EXPORT_SYMBOL_GPL(af_alg_release); | ||
126 | |||
127 | static int alg_bind(struct socket *sock, struct sockaddr *uaddr, int addr_len) | ||
128 | { | ||
129 | struct sock *sk = sock->sk; | ||
130 | struct alg_sock *ask = alg_sk(sk); | ||
131 | struct sockaddr_alg *sa = (void *)uaddr; | ||
132 | const struct af_alg_type *type; | ||
133 | void *private; | ||
134 | |||
135 | if (sock->state == SS_CONNECTED) | ||
136 | return -EINVAL; | ||
137 | |||
138 | if (addr_len != sizeof(*sa)) | ||
139 | return -EINVAL; | ||
140 | |||
141 | sa->salg_type[sizeof(sa->salg_type) - 1] = 0; | ||
142 | sa->salg_name[sizeof(sa->salg_name) - 1] = 0; | ||
143 | |||
144 | type = alg_get_type(sa->salg_type); | ||
145 | if (IS_ERR(type) && PTR_ERR(type) == -ENOENT) { | ||
146 | request_module("algif-%s", sa->salg_type); | ||
147 | type = alg_get_type(sa->salg_type); | ||
148 | } | ||
149 | |||
150 | if (IS_ERR(type)) | ||
151 | return PTR_ERR(type); | ||
152 | |||
153 | private = type->bind(sa->salg_name, sa->salg_feat, sa->salg_mask); | ||
154 | if (IS_ERR(private)) { | ||
155 | module_put(type->owner); | ||
156 | return PTR_ERR(private); | ||
157 | } | ||
158 | |||
159 | lock_sock(sk); | ||
160 | |||
161 | swap(ask->type, type); | ||
162 | swap(ask->private, private); | ||
163 | |||
164 | release_sock(sk); | ||
165 | |||
166 | alg_do_release(type, private); | ||
167 | |||
168 | return 0; | ||
169 | } | ||
170 | |||
171 | static int alg_setkey(struct sock *sk, char __user *ukey, | ||
172 | unsigned int keylen) | ||
173 | { | ||
174 | struct alg_sock *ask = alg_sk(sk); | ||
175 | const struct af_alg_type *type = ask->type; | ||
176 | u8 *key; | ||
177 | int err; | ||
178 | |||
179 | key = sock_kmalloc(sk, keylen, GFP_KERNEL); | ||
180 | if (!key) | ||
181 | return -ENOMEM; | ||
182 | |||
183 | err = -EFAULT; | ||
184 | if (copy_from_user(key, ukey, keylen)) | ||
185 | goto out; | ||
186 | |||
187 | err = type->setkey(ask->private, key, keylen); | ||
188 | |||
189 | out: | ||
190 | sock_kfree_s(sk, key, keylen); | ||
191 | |||
192 | return err; | ||
193 | } | ||
194 | |||
195 | static int alg_setsockopt(struct socket *sock, int level, int optname, | ||
196 | char __user *optval, unsigned int optlen) | ||
197 | { | ||
198 | struct sock *sk = sock->sk; | ||
199 | struct alg_sock *ask = alg_sk(sk); | ||
200 | const struct af_alg_type *type; | ||
201 | int err = -ENOPROTOOPT; | ||
202 | |||
203 | lock_sock(sk); | ||
204 | type = ask->type; | ||
205 | |||
206 | if (level != SOL_ALG || !type) | ||
207 | goto unlock; | ||
208 | |||
209 | switch (optname) { | ||
210 | case ALG_SET_KEY: | ||
211 | if (sock->state == SS_CONNECTED) | ||
212 | goto unlock; | ||
213 | if (!type->setkey) | ||
214 | goto unlock; | ||
215 | |||
216 | err = alg_setkey(sk, optval, optlen); | ||
217 | } | ||
218 | |||
219 | unlock: | ||
220 | release_sock(sk); | ||
221 | |||
222 | return err; | ||
223 | } | ||
224 | |||
225 | int af_alg_accept(struct sock *sk, struct socket *newsock) | ||
226 | { | ||
227 | struct alg_sock *ask = alg_sk(sk); | ||
228 | const struct af_alg_type *type; | ||
229 | struct sock *sk2; | ||
230 | int err; | ||
231 | |||
232 | lock_sock(sk); | ||
233 | type = ask->type; | ||
234 | |||
235 | err = -EINVAL; | ||
236 | if (!type) | ||
237 | goto unlock; | ||
238 | |||
239 | sk2 = sk_alloc(sock_net(sk), PF_ALG, GFP_KERNEL, &alg_proto); | ||
240 | err = -ENOMEM; | ||
241 | if (!sk2) | ||
242 | goto unlock; | ||
243 | |||
244 | sock_init_data(newsock, sk2); | ||
245 | |||
246 | err = type->accept(ask->private, sk2); | ||
247 | if (err) { | ||
248 | sk_free(sk2); | ||
249 | goto unlock; | ||
250 | } | ||
251 | |||
252 | sk2->sk_family = PF_ALG; | ||
253 | |||
254 | sock_hold(sk); | ||
255 | alg_sk(sk2)->parent = sk; | ||
256 | alg_sk(sk2)->type = type; | ||
257 | |||
258 | newsock->ops = type->ops; | ||
259 | newsock->state = SS_CONNECTED; | ||
260 | |||
261 | err = 0; | ||
262 | |||
263 | unlock: | ||
264 | release_sock(sk); | ||
265 | |||
266 | return err; | ||
267 | } | ||
268 | EXPORT_SYMBOL_GPL(af_alg_accept); | ||
269 | |||
270 | static int alg_accept(struct socket *sock, struct socket *newsock, int flags) | ||
271 | { | ||
272 | return af_alg_accept(sock->sk, newsock); | ||
273 | } | ||
274 | |||
275 | static const struct proto_ops alg_proto_ops = { | ||
276 | .family = PF_ALG, | ||
277 | .owner = THIS_MODULE, | ||
278 | |||
279 | .connect = sock_no_connect, | ||
280 | .socketpair = sock_no_socketpair, | ||
281 | .getname = sock_no_getname, | ||
282 | .ioctl = sock_no_ioctl, | ||
283 | .listen = sock_no_listen, | ||
284 | .shutdown = sock_no_shutdown, | ||
285 | .getsockopt = sock_no_getsockopt, | ||
286 | .mmap = sock_no_mmap, | ||
287 | .sendpage = sock_no_sendpage, | ||
288 | .sendmsg = sock_no_sendmsg, | ||
289 | .recvmsg = sock_no_recvmsg, | ||
290 | .poll = sock_no_poll, | ||
291 | |||
292 | .bind = alg_bind, | ||
293 | .release = af_alg_release, | ||
294 | .setsockopt = alg_setsockopt, | ||
295 | .accept = alg_accept, | ||
296 | }; | ||
297 | |||
298 | static void alg_sock_destruct(struct sock *sk) | ||
299 | { | ||
300 | struct alg_sock *ask = alg_sk(sk); | ||
301 | |||
302 | alg_do_release(ask->type, ask->private); | ||
303 | } | ||
304 | |||
305 | static int alg_create(struct net *net, struct socket *sock, int protocol, | ||
306 | int kern) | ||
307 | { | ||
308 | struct sock *sk; | ||
309 | int err; | ||
310 | |||
311 | if (sock->type != SOCK_SEQPACKET) | ||
312 | return -ESOCKTNOSUPPORT; | ||
313 | if (protocol != 0) | ||
314 | return -EPROTONOSUPPORT; | ||
315 | |||
316 | err = -ENOMEM; | ||
317 | sk = sk_alloc(net, PF_ALG, GFP_KERNEL, &alg_proto); | ||
318 | if (!sk) | ||
319 | goto out; | ||
320 | |||
321 | sock->ops = &alg_proto_ops; | ||
322 | sock_init_data(sock, sk); | ||
323 | |||
324 | sk->sk_family = PF_ALG; | ||
325 | sk->sk_destruct = alg_sock_destruct; | ||
326 | |||
327 | return 0; | ||
328 | out: | ||
329 | return err; | ||
330 | } | ||
331 | |||
332 | static const struct net_proto_family alg_family = { | ||
333 | .family = PF_ALG, | ||
334 | .create = alg_create, | ||
335 | .owner = THIS_MODULE, | ||
336 | }; | ||
337 | |||
338 | int af_alg_make_sg(struct af_alg_sgl *sgl, void __user *addr, int len, | ||
339 | int write) | ||
340 | { | ||
341 | unsigned long from = (unsigned long)addr; | ||
342 | unsigned long npages; | ||
343 | unsigned off; | ||
344 | int err; | ||
345 | int i; | ||
346 | |||
347 | err = -EFAULT; | ||
348 | if (!access_ok(write ? VERIFY_READ : VERIFY_WRITE, addr, len)) | ||
349 | goto out; | ||
350 | |||
351 | off = from & ~PAGE_MASK; | ||
352 | npages = (off + len + PAGE_SIZE - 1) >> PAGE_SHIFT; | ||
353 | if (npages > ALG_MAX_PAGES) | ||
354 | npages = ALG_MAX_PAGES; | ||
355 | |||
356 | err = get_user_pages_fast(from, npages, write, sgl->pages); | ||
357 | if (err < 0) | ||
358 | goto out; | ||
359 | |||
360 | npages = err; | ||
361 | err = -EINVAL; | ||
362 | if (WARN_ON(npages == 0)) | ||
363 | goto out; | ||
364 | |||
365 | err = 0; | ||
366 | |||
367 | sg_init_table(sgl->sg, npages); | ||
368 | |||
369 | for (i = 0; i < npages; i++) { | ||
370 | int plen = min_t(int, len, PAGE_SIZE - off); | ||
371 | |||
372 | sg_set_page(sgl->sg + i, sgl->pages[i], plen, off); | ||
373 | |||
374 | off = 0; | ||
375 | len -= plen; | ||
376 | err += plen; | ||
377 | } | ||
378 | |||
379 | out: | ||
380 | return err; | ||
381 | } | ||
382 | EXPORT_SYMBOL_GPL(af_alg_make_sg); | ||
383 | |||
384 | void af_alg_free_sg(struct af_alg_sgl *sgl) | ||
385 | { | ||
386 | int i; | ||
387 | |||
388 | i = 0; | ||
389 | do { | ||
390 | put_page(sgl->pages[i]); | ||
391 | } while (!sg_is_last(sgl->sg + (i++))); | ||
392 | } | ||
393 | EXPORT_SYMBOL_GPL(af_alg_free_sg); | ||
394 | |||
395 | int af_alg_cmsg_send(struct msghdr *msg, struct af_alg_control *con) | ||
396 | { | ||
397 | struct cmsghdr *cmsg; | ||
398 | |||
399 | for (cmsg = CMSG_FIRSTHDR(msg); cmsg; cmsg = CMSG_NXTHDR(msg, cmsg)) { | ||
400 | if (!CMSG_OK(msg, cmsg)) | ||
401 | return -EINVAL; | ||
402 | if (cmsg->cmsg_level != SOL_ALG) | ||
403 | continue; | ||
404 | |||
405 | switch(cmsg->cmsg_type) { | ||
406 | case ALG_SET_IV: | ||
407 | if (cmsg->cmsg_len < CMSG_LEN(sizeof(*con->iv))) | ||
408 | return -EINVAL; | ||
409 | con->iv = (void *)CMSG_DATA(cmsg); | ||
410 | if (cmsg->cmsg_len < CMSG_LEN(con->iv->ivlen + | ||
411 | sizeof(*con->iv))) | ||
412 | return -EINVAL; | ||
413 | break; | ||
414 | |||
415 | case ALG_SET_OP: | ||
416 | if (cmsg->cmsg_len < CMSG_LEN(sizeof(u32))) | ||
417 | return -EINVAL; | ||
418 | con->op = *(u32 *)CMSG_DATA(cmsg); | ||
419 | break; | ||
420 | |||
421 | default: | ||
422 | return -EINVAL; | ||
423 | } | ||
424 | } | ||
425 | |||
426 | return 0; | ||
427 | } | ||
428 | EXPORT_SYMBOL_GPL(af_alg_cmsg_send); | ||
429 | |||
430 | int af_alg_wait_for_completion(int err, struct af_alg_completion *completion) | ||
431 | { | ||
432 | switch (err) { | ||
433 | case -EINPROGRESS: | ||
434 | case -EBUSY: | ||
435 | wait_for_completion(&completion->completion); | ||
436 | INIT_COMPLETION(completion->completion); | ||
437 | err = completion->err; | ||
438 | break; | ||
439 | }; | ||
440 | |||
441 | return err; | ||
442 | } | ||
443 | EXPORT_SYMBOL_GPL(af_alg_wait_for_completion); | ||
444 | |||
445 | void af_alg_complete(struct crypto_async_request *req, int err) | ||
446 | { | ||
447 | struct af_alg_completion *completion = req->data; | ||
448 | |||
449 | completion->err = err; | ||
450 | complete(&completion->completion); | ||
451 | } | ||
452 | EXPORT_SYMBOL_GPL(af_alg_complete); | ||
453 | |||
454 | static int __init af_alg_init(void) | ||
455 | { | ||
456 | int err = proto_register(&alg_proto, 0); | ||
457 | |||
458 | if (err) | ||
459 | goto out; | ||
460 | |||
461 | err = sock_register(&alg_family); | ||
462 | if (err != 0) | ||
463 | goto out_unregister_proto; | ||
464 | |||
465 | out: | ||
466 | return err; | ||
467 | |||
468 | out_unregister_proto: | ||
469 | proto_unregister(&alg_proto); | ||
470 | goto out; | ||
471 | } | ||
472 | |||
473 | static void __exit af_alg_exit(void) | ||
474 | { | ||
475 | sock_unregister(PF_ALG); | ||
476 | proto_unregister(&alg_proto); | ||
477 | } | ||
478 | |||
479 | module_init(af_alg_init); | ||
480 | module_exit(af_alg_exit); | ||
481 | MODULE_LICENSE("GPL"); | ||
482 | MODULE_ALIAS_NETPROTO(AF_ALG); | ||