1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /*
3 * Create default crypto algorithm instances.
4 *
5 * Copyright (c) 2006 Herbert Xu <herbert@gondor.apana.org.au>
6 */
7
8 #include <crypto/internal/aead.h>
9 #include <linux/completion.h>
10 #include <linux/ctype.h>
11 #include <linux/err.h>
12 #include <linux/init.h>
13 #include <linux/kthread.h>
14 #include <linux/module.h>
15 #include <linux/notifier.h>
16 #include <linux/rtnetlink.h>
17 #include <linux/sched/signal.h>
18 #include <linux/slab.h>
19 #include <linux/string.h>
20
21 #include "internal.h"
22
23 struct cryptomgr_param {
24 struct rtattr *tb[CRYPTO_MAX_ATTRS + 2];
25
26 struct {
27 struct rtattr attr;
28 struct crypto_attr_type data;
29 } type;
30
31 union {
32 struct rtattr attr;
33 struct {
34 struct rtattr attr;
35 struct crypto_attr_alg data;
36 } alg;
37 struct {
38 struct rtattr attr;
39 struct crypto_attr_u32 data;
40 } nu32;
41 } attrs[CRYPTO_MAX_ATTRS];
42
43 char template[CRYPTO_MAX_ALG_NAME];
44
45 struct crypto_larval *larval;
46
47 u32 otype;
48 u32 omask;
49 };
50
51 struct crypto_test_param {
52 char driver[CRYPTO_MAX_ALG_NAME];
53 char alg[CRYPTO_MAX_ALG_NAME];
54 u32 type;
55 };
56
cryptomgr_probe(void * data)57 static int cryptomgr_probe(void *data)
58 {
59 struct cryptomgr_param *param = data;
60 struct crypto_template *tmpl;
61 int err;
62
63 tmpl = crypto_lookup_template(param->template);
64 if (!tmpl)
65 goto out;
66
67 do {
68 err = tmpl->create(tmpl, param->tb);
69 } while (err == -EAGAIN && !signal_pending(current));
70
71 crypto_tmpl_put(tmpl);
72
73 out:
74 complete_all(¶m->larval->completion);
75 crypto_alg_put(¶m->larval->alg);
76 kfree(param);
77 module_put_and_exit(0);
78 }
79
cryptomgr_schedule_probe(struct crypto_larval * larval)80 static int cryptomgr_schedule_probe(struct crypto_larval *larval)
81 {
82 struct task_struct *thread;
83 struct cryptomgr_param *param;
84 const char *name = larval->alg.cra_name;
85 const char *p;
86 unsigned int len;
87 int i;
88
89 if (!try_module_get(THIS_MODULE))
90 goto err;
91
92 param = kzalloc(sizeof(*param), GFP_KERNEL);
93 if (!param)
94 goto err_put_module;
95
96 for (p = name; isalnum(*p) || *p == '-' || *p == '_'; p++)
97 ;
98
99 len = p - name;
100 if (!len || *p != '(')
101 goto err_free_param;
102
103 memcpy(param->template, name, len);
104
105 i = 0;
106 for (;;) {
107 int notnum = 0;
108
109 name = ++p;
110
111 for (; isalnum(*p) || *p == '-' || *p == '_'; p++)
112 notnum |= !isdigit(*p);
113
114 if (*p == '(') {
115 int recursion = 0;
116
117 for (;;) {
118 if (!*++p)
119 goto err_free_param;
120 if (*p == '(')
121 recursion++;
122 else if (*p == ')' && !recursion--)
123 break;
124 }
125
126 notnum = 1;
127 p++;
128 }
129
130 len = p - name;
131 if (!len)
132 goto err_free_param;
133
134 if (notnum) {
135 param->attrs[i].alg.attr.rta_len =
136 sizeof(param->attrs[i].alg);
137 param->attrs[i].alg.attr.rta_type = CRYPTOA_ALG;
138 memcpy(param->attrs[i].alg.data.name, name, len);
139 } else {
140 param->attrs[i].nu32.attr.rta_len =
141 sizeof(param->attrs[i].nu32);
142 param->attrs[i].nu32.attr.rta_type = CRYPTOA_U32;
143 param->attrs[i].nu32.data.num =
144 simple_strtol(name, NULL, 0);
145 }
146
147 param->tb[i + 1] = ¶m->attrs[i].attr;
148 i++;
149
150 if (i >= CRYPTO_MAX_ATTRS)
151 goto err_free_param;
152
153 if (*p == ')')
154 break;
155
156 if (*p != ',')
157 goto err_free_param;
158 }
159
160 if (!i)
161 goto err_free_param;
162
163 param->tb[i + 1] = NULL;
164
165 param->type.attr.rta_len = sizeof(param->type);
166 param->type.attr.rta_type = CRYPTOA_TYPE;
167 param->type.data.type = larval->alg.cra_flags & ~CRYPTO_ALG_TESTED;
168 param->type.data.mask = larval->mask & ~CRYPTO_ALG_TESTED;
169 param->tb[0] = ¶m->type.attr;
170
171 param->otype = larval->alg.cra_flags;
172 param->omask = larval->mask;
173
174 crypto_alg_get(&larval->alg);
175 param->larval = larval;
176
177 thread = kthread_run(cryptomgr_probe, param, "cryptomgr_probe");
178 if (IS_ERR(thread))
179 goto err_put_larval;
180
181 return NOTIFY_STOP;
182
183 err_put_larval:
184 crypto_alg_put(&larval->alg);
185 err_free_param:
186 kfree(param);
187 err_put_module:
188 module_put(THIS_MODULE);
189 err:
190 return NOTIFY_OK;
191 }
192
cryptomgr_test(void * data)193 static int cryptomgr_test(void *data)
194 {
195 struct crypto_test_param *param = data;
196 u32 type = param->type;
197 int err = 0;
198
199 #ifdef CONFIG_CRYPTO_MANAGER_DISABLE_TESTS
200 goto skiptest;
201 #endif
202
203 if (type & CRYPTO_ALG_TESTED)
204 goto skiptest;
205
206 err = alg_test(param->driver, param->alg, type, CRYPTO_ALG_TESTED);
207
208 skiptest:
209 crypto_alg_tested(param->driver, err);
210
211 kfree(param);
212 module_put_and_exit(0);
213 }
214
cryptomgr_schedule_test(struct crypto_alg * alg)215 static int cryptomgr_schedule_test(struct crypto_alg *alg)
216 {
217 struct task_struct *thread;
218 struct crypto_test_param *param;
219 u32 type;
220
221 if (!try_module_get(THIS_MODULE))
222 goto err;
223
224 param = kzalloc(sizeof(*param), GFP_KERNEL);
225 if (!param)
226 goto err_put_module;
227
228 memcpy(param->driver, alg->cra_driver_name, sizeof(param->driver));
229 memcpy(param->alg, alg->cra_name, sizeof(param->alg));
230 type = alg->cra_flags;
231
232 /* Do not test internal algorithms. */
233 if (type & CRYPTO_ALG_INTERNAL)
234 type |= CRYPTO_ALG_TESTED;
235
236 param->type = type;
237
238 thread = kthread_run(cryptomgr_test, param, "cryptomgr_test");
239 if (IS_ERR(thread))
240 goto err_free_param;
241
242 return NOTIFY_STOP;
243
244 err_free_param:
245 kfree(param);
246 err_put_module:
247 module_put(THIS_MODULE);
248 err:
249 return NOTIFY_OK;
250 }
251
cryptomgr_notify(struct notifier_block * this,unsigned long msg,void * data)252 static int cryptomgr_notify(struct notifier_block *this, unsigned long msg,
253 void *data)
254 {
255 switch (msg) {
256 case CRYPTO_MSG_ALG_REQUEST:
257 return cryptomgr_schedule_probe(data);
258 case CRYPTO_MSG_ALG_REGISTER:
259 return cryptomgr_schedule_test(data);
260 case CRYPTO_MSG_ALG_LOADED:
261 break;
262 }
263
264 return NOTIFY_DONE;
265 }
266
267 static struct notifier_block cryptomgr_notifier = {
268 .notifier_call = cryptomgr_notify,
269 };
270
cryptomgr_init(void)271 static int __init cryptomgr_init(void)
272 {
273 return crypto_register_notifier(&cryptomgr_notifier);
274 }
275
cryptomgr_exit(void)276 static void __exit cryptomgr_exit(void)
277 {
278 int err = crypto_unregister_notifier(&cryptomgr_notifier);
279 BUG_ON(err);
280 }
281
282 /*
283 * This is arch_initcall() so that the crypto self-tests are run on algorithms
284 * registered early by subsys_initcall(). subsys_initcall() is needed for
285 * generic implementations so that they're available for comparison tests when
286 * other implementations are registered later by module_init().
287 */
288 arch_initcall(cryptomgr_init);
289 module_exit(cryptomgr_exit);
290
291 MODULE_LICENSE("GPL");
292 MODULE_DESCRIPTION("Crypto Algorithm Manager");
293