aboutsummaryrefslogtreecommitdiffstats
path: root/crypto
diff options
context:
space:
mode:
Diffstat (limited to 'crypto')
-rw-r--r--crypto/Kconfig3
-rw-r--r--crypto/Makefile1
-rw-r--r--crypto/af_alg.c482
3 files changed, 486 insertions, 0 deletions
diff --git a/crypto/Kconfig b/crypto/Kconfig
index e4bac29a32e7..357e3caf4cbe 100644
--- a/crypto/Kconfig
+++ b/crypto/Kconfig
@@ -841,6 +841,9 @@ config CRYPTO_ANSI_CPRNG
841 ANSI X9.31 A.2.4. Note that this option must be enabled if 841 ANSI X9.31 A.2.4. Note that this option must be enabled if
842 CRYPTO_FIPS is selected 842 CRYPTO_FIPS is selected
843 843
844config CRYPTO_USER_API
845 tristate
846
844source "drivers/crypto/Kconfig" 847source "drivers/crypto/Kconfig"
845 848
846endif # if CRYPTO 849endif # if CRYPTO
diff --git a/crypto/Makefile b/crypto/Makefile
index 423b7de61f93..0b1319734bc0 100644
--- a/crypto/Makefile
+++ b/crypto/Makefile
@@ -85,6 +85,7 @@ obj-$(CONFIG_CRYPTO_RNG2) += krng.o
85obj-$(CONFIG_CRYPTO_ANSI_CPRNG) += ansi_cprng.o 85obj-$(CONFIG_CRYPTO_ANSI_CPRNG) += ansi_cprng.o
86obj-$(CONFIG_CRYPTO_TEST) += tcrypt.o 86obj-$(CONFIG_CRYPTO_TEST) += tcrypt.o
87obj-$(CONFIG_CRYPTO_GHASH) += ghash-generic.o 87obj-$(CONFIG_CRYPTO_GHASH) += ghash-generic.o
88obj-$(CONFIG_CRYPTO_USER_API) += af_alg.o
88 89
89# 90#
90# generic algorithms and the async_tx api 91# generic algorithms and the async_tx api
diff --git a/crypto/af_alg.c b/crypto/af_alg.c
new file mode 100644
index 000000000000..cabed0e9c9d8
--- /dev/null
+++ b/crypto/af_alg.c
@@ -0,0 +1,482 @@
1/*
2 * af_alg: User-space algorithm interface
3 *
4 * This file provides the user-space API for algorithms.
5 *
6 * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au>
7 *
8 * This program is free software; you can redistribute it and/or modify it
9 * under the terms of the GNU General Public License as published by the Free
10 * Software Foundation; either version 2 of the License, or (at your option)
11 * any later version.
12 *
13 */
14
15#include <asm/atomic.h>
16#include <crypto/if_alg.h>
17#include <linux/crypto.h>
18#include <linux/init.h>
19#include <linux/kernel.h>
20#include <linux/list.h>
21#include <linux/module.h>
22#include <linux/net.h>
23#include <linux/rwsem.h>
24
25struct alg_type_list {
26 const struct af_alg_type *type;
27 struct list_head list;
28};
29
30static atomic_t alg_memory_allocated;
31
32static struct proto alg_proto = {
33 .name = "ALG",
34 .owner = THIS_MODULE,
35 .memory_allocated = &alg_memory_allocated,
36 .obj_size = sizeof(struct alg_sock),
37};
38
39static LIST_HEAD(alg_types);
40static DECLARE_RWSEM(alg_types_sem);
41
42static const struct af_alg_type *alg_get_type(const char *name)
43{
44 const struct af_alg_type *type = ERR_PTR(-ENOENT);
45 struct alg_type_list *node;
46
47 down_read(&alg_types_sem);
48 list_for_each_entry(node, &alg_types, list) {
49 if (strcmp(node->type->name, name))
50 continue;
51
52 if (try_module_get(node->type->owner))
53 type = node->type;
54 break;
55 }
56 up_read(&alg_types_sem);
57
58 return type;
59}
60
61int af_alg_register_type(const struct af_alg_type *type)
62{
63 struct alg_type_list *node;
64 int err = -EEXIST;
65
66 down_write(&alg_types_sem);
67 list_for_each_entry(node, &alg_types, list) {
68 if (!strcmp(node->type->name, type->name))
69 goto unlock;
70 }
71
72 node = kmalloc(sizeof(*node), GFP_KERNEL);
73 err = -ENOMEM;
74 if (!node)
75 goto unlock;
76
77 type->ops->owner = THIS_MODULE;
78 node->type = type;
79 list_add(&node->list, &alg_types);
80 err = 0;
81
82unlock:
83 up_write(&alg_types_sem);
84
85 return err;
86}
87EXPORT_SYMBOL_GPL(af_alg_register_type);
88
89int af_alg_unregister_type(const struct af_alg_type *type)
90{
91 struct alg_type_list *node;
92 int err = -ENOENT;
93
94 down_write(&alg_types_sem);
95 list_for_each_entry(node, &alg_types, list) {
96 if (strcmp(node->type->name, type->name))
97 continue;
98
99 list_del(&node->list);
100 kfree(node);
101 err = 0;
102 break;
103 }
104 up_write(&alg_types_sem);
105
106 return err;
107}
108EXPORT_SYMBOL_GPL(af_alg_unregister_type);
109
110static void alg_do_release(const struct af_alg_type *type, void *private)
111{
112 if (!type)
113 return;
114
115 type->release(private);
116 module_put(type->owner);
117}
118
119int af_alg_release(struct socket *sock)
120{
121 if (sock->sk)
122 sock_put(sock->sk);
123 return 0;
124}
125EXPORT_SYMBOL_GPL(af_alg_release);
126
127static int alg_bind(struct socket *sock, struct sockaddr *uaddr, int addr_len)
128{
129 struct sock *sk = sock->sk;
130 struct alg_sock *ask = alg_sk(sk);
131 struct sockaddr_alg *sa = (void *)uaddr;
132 const struct af_alg_type *type;
133 void *private;
134
135 if (sock->state == SS_CONNECTED)
136 return -EINVAL;
137
138 if (addr_len != sizeof(*sa))
139 return -EINVAL;
140
141 sa->salg_type[sizeof(sa->salg_type) - 1] = 0;
142 sa->salg_name[sizeof(sa->salg_name) - 1] = 0;
143
144 type = alg_get_type(sa->salg_type);
145 if (IS_ERR(type) && PTR_ERR(type) == -ENOENT) {
146 request_module("algif-%s", sa->salg_type);
147 type = alg_get_type(sa->salg_type);
148 }
149
150 if (IS_ERR(type))
151 return PTR_ERR(type);
152
153 private = type->bind(sa->salg_name, sa->salg_feat, sa->salg_mask);
154 if (IS_ERR(private)) {
155 module_put(type->owner);
156 return PTR_ERR(private);
157 }
158
159 lock_sock(sk);
160
161 swap(ask->type, type);
162 swap(ask->private, private);
163
164 release_sock(sk);
165
166 alg_do_release(type, private);
167
168 return 0;
169}
170
171static int alg_setkey(struct sock *sk, char __user *ukey,
172 unsigned int keylen)
173{
174 struct alg_sock *ask = alg_sk(sk);
175 const struct af_alg_type *type = ask->type;
176 u8 *key;
177 int err;
178
179 key = sock_kmalloc(sk, keylen, GFP_KERNEL);
180 if (!key)
181 return -ENOMEM;
182
183 err = -EFAULT;
184 if (copy_from_user(key, ukey, keylen))
185 goto out;
186
187 err = type->setkey(ask->private, key, keylen);
188
189out:
190 sock_kfree_s(sk, key, keylen);
191
192 return err;
193}
194
195static int alg_setsockopt(struct socket *sock, int level, int optname,
196 char __user *optval, unsigned int optlen)
197{
198 struct sock *sk = sock->sk;
199 struct alg_sock *ask = alg_sk(sk);
200 const struct af_alg_type *type;
201 int err = -ENOPROTOOPT;
202
203 lock_sock(sk);
204 type = ask->type;
205
206 if (level != SOL_ALG || !type)
207 goto unlock;
208
209 switch (optname) {
210 case ALG_SET_KEY:
211 if (sock->state == SS_CONNECTED)
212 goto unlock;
213 if (!type->setkey)
214 goto unlock;
215
216 err = alg_setkey(sk, optval, optlen);
217 }
218
219unlock:
220 release_sock(sk);
221
222 return err;
223}
224
225int af_alg_accept(struct sock *sk, struct socket *newsock)
226{
227 struct alg_sock *ask = alg_sk(sk);
228 const struct af_alg_type *type;
229 struct sock *sk2;
230 int err;
231
232 lock_sock(sk);
233 type = ask->type;
234
235 err = -EINVAL;
236 if (!type)
237 goto unlock;
238
239 sk2 = sk_alloc(sock_net(sk), PF_ALG, GFP_KERNEL, &alg_proto);
240 err = -ENOMEM;
241 if (!sk2)
242 goto unlock;
243
244 sock_init_data(newsock, sk2);
245
246 err = type->accept(ask->private, sk2);
247 if (err) {
248 sk_free(sk2);
249 goto unlock;
250 }
251
252 sk2->sk_family = PF_ALG;
253
254 sock_hold(sk);
255 alg_sk(sk2)->parent = sk;
256 alg_sk(sk2)->type = type;
257
258 newsock->ops = type->ops;
259 newsock->state = SS_CONNECTED;
260
261 err = 0;
262
263unlock:
264 release_sock(sk);
265
266 return err;
267}
268EXPORT_SYMBOL_GPL(af_alg_accept);
269
270static int alg_accept(struct socket *sock, struct socket *newsock, int flags)
271{
272 return af_alg_accept(sock->sk, newsock);
273}
274
275static const struct proto_ops alg_proto_ops = {
276 .family = PF_ALG,
277 .owner = THIS_MODULE,
278
279 .connect = sock_no_connect,
280 .socketpair = sock_no_socketpair,
281 .getname = sock_no_getname,
282 .ioctl = sock_no_ioctl,
283 .listen = sock_no_listen,
284 .shutdown = sock_no_shutdown,
285 .getsockopt = sock_no_getsockopt,
286 .mmap = sock_no_mmap,
287 .sendpage = sock_no_sendpage,
288 .sendmsg = sock_no_sendmsg,
289 .recvmsg = sock_no_recvmsg,
290 .poll = sock_no_poll,
291
292 .bind = alg_bind,
293 .release = af_alg_release,
294 .setsockopt = alg_setsockopt,
295 .accept = alg_accept,
296};
297
298static void alg_sock_destruct(struct sock *sk)
299{
300 struct alg_sock *ask = alg_sk(sk);
301
302 alg_do_release(ask->type, ask->private);
303}
304
305static int alg_create(struct net *net, struct socket *sock, int protocol,
306 int kern)
307{
308 struct sock *sk;
309 int err;
310
311 if (sock->type != SOCK_SEQPACKET)
312 return -ESOCKTNOSUPPORT;
313 if (protocol != 0)
314 return -EPROTONOSUPPORT;
315
316 err = -ENOMEM;
317 sk = sk_alloc(net, PF_ALG, GFP_KERNEL, &alg_proto);
318 if (!sk)
319 goto out;
320
321 sock->ops = &alg_proto_ops;
322 sock_init_data(sock, sk);
323
324 sk->sk_family = PF_ALG;
325 sk->sk_destruct = alg_sock_destruct;
326
327 return 0;
328out:
329 return err;
330}
331
332static const struct net_proto_family alg_family = {
333 .family = PF_ALG,
334 .create = alg_create,
335 .owner = THIS_MODULE,
336};
337
338int af_alg_make_sg(struct af_alg_sgl *sgl, void __user *addr, int len,
339 int write)
340{
341 unsigned long from = (unsigned long)addr;
342 unsigned long npages;
343 unsigned off;
344 int err;
345 int i;
346
347 err = -EFAULT;
348 if (!access_ok(write ? VERIFY_READ : VERIFY_WRITE, addr, len))
349 goto out;
350
351 off = from & ~PAGE_MASK;
352 npages = (off + len + PAGE_SIZE - 1) >> PAGE_SHIFT;
353 if (npages > ALG_MAX_PAGES)
354 npages = ALG_MAX_PAGES;
355
356 err = get_user_pages_fast(from, npages, write, sgl->pages);
357 if (err < 0)
358 goto out;
359
360 npages = err;
361 err = -EINVAL;
362 if (WARN_ON(npages == 0))
363 goto out;
364
365 err = 0;
366
367 sg_init_table(sgl->sg, npages);
368
369 for (i = 0; i < npages; i++) {
370 int plen = min_t(int, len, PAGE_SIZE - off);
371
372 sg_set_page(sgl->sg + i, sgl->pages[i], plen, off);
373
374 off = 0;
375 len -= plen;
376 err += plen;
377 }
378
379out:
380 return err;
381}
382EXPORT_SYMBOL_GPL(af_alg_make_sg);
383
384void af_alg_free_sg(struct af_alg_sgl *sgl)
385{
386 int i;
387
388 i = 0;
389 do {
390 put_page(sgl->pages[i]);
391 } while (!sg_is_last(sgl->sg + (i++)));
392}
393EXPORT_SYMBOL_GPL(af_alg_free_sg);
394
395int af_alg_cmsg_send(struct msghdr *msg, struct af_alg_control *con)
396{
397 struct cmsghdr *cmsg;
398
399 for (cmsg = CMSG_FIRSTHDR(msg); cmsg; cmsg = CMSG_NXTHDR(msg, cmsg)) {
400 if (!CMSG_OK(msg, cmsg))
401 return -EINVAL;
402 if (cmsg->cmsg_level != SOL_ALG)
403 continue;
404
405 switch(cmsg->cmsg_type) {
406 case ALG_SET_IV:
407 if (cmsg->cmsg_len < CMSG_LEN(sizeof(*con->iv)))
408 return -EINVAL;
409 con->iv = (void *)CMSG_DATA(cmsg);
410 if (cmsg->cmsg_len < CMSG_LEN(con->iv->ivlen +
411 sizeof(*con->iv)))
412 return -EINVAL;
413 break;
414
415 case ALG_SET_OP:
416 if (cmsg->cmsg_len < CMSG_LEN(sizeof(u32)))
417 return -EINVAL;
418 con->op = *(u32 *)CMSG_DATA(cmsg);
419 break;
420
421 default:
422 return -EINVAL;
423 }
424 }
425
426 return 0;
427}
428EXPORT_SYMBOL_GPL(af_alg_cmsg_send);
429
430int af_alg_wait_for_completion(int err, struct af_alg_completion *completion)
431{
432 switch (err) {
433 case -EINPROGRESS:
434 case -EBUSY:
435 wait_for_completion(&completion->completion);
436 INIT_COMPLETION(completion->completion);
437 err = completion->err;
438 break;
439 };
440
441 return err;
442}
443EXPORT_SYMBOL_GPL(af_alg_wait_for_completion);
444
445void af_alg_complete(struct crypto_async_request *req, int err)
446{
447 struct af_alg_completion *completion = req->data;
448
449 completion->err = err;
450 complete(&completion->completion);
451}
452EXPORT_SYMBOL_GPL(af_alg_complete);
453
454static int __init af_alg_init(void)
455{
456 int err = proto_register(&alg_proto, 0);
457
458 if (err)
459 goto out;
460
461 err = sock_register(&alg_family);
462 if (err != 0)
463 goto out_unregister_proto;
464
465out:
466 return err;
467
468out_unregister_proto:
469 proto_unregister(&alg_proto);
470 goto out;
471}
472
473static void __exit af_alg_exit(void)
474{
475 sock_unregister(PF_ALG);
476 proto_unregister(&alg_proto);
477}
478
479module_init(af_alg_init);
480module_exit(af_alg_exit);
481MODULE_LICENSE("GPL");
482MODULE_ALIAS_NETPROTO(AF_ALG);