Lines Matching +full:exact +full:- +full:len
1 // SPDX-License-Identifier: GPL-2.0-only
35 static struct crypto_alg *crypto_alg_match(struct crypto_user_alg *p, int exact)
47 if ((q->cra_flags ^ p->cru_type) & p->cru_mask)
50 if (strlen(p->cru_driver_name))
51 match = !strcmp(q->cra_driver_name,
52 p->cru_driver_name);
53 else if (!exact)
54 match = !strcmp(q->cra_name, p->cru_name);
79 rcipher.blocksize = alg->cra_blocksize;
80 rcipher.min_keysize = alg->cra_cipher.cia_min_keysize;
81 rcipher.max_keysize = alg->cra_cipher.cia_max_keysize;
92 strscpy(ualg->cru_name, alg->cra_name, sizeof(ualg->cru_name));
93 strscpy(ualg->cru_driver_name, alg->cra_driver_name,
94 sizeof(ualg->cru_driver_name));
95 strscpy(ualg->cru_module_name, module_name(alg->cra_module),
96 sizeof(ualg->cru_module_name));
98 ualg->cru_type = 0;
99 ualg->cru_mask = 0;
100 ualg->cru_flags = alg->cra_flags;
101 ualg->cru_refcnt = refcount_read(&alg->cra_refcnt);
103 if (nla_put_u32(skb, CRYPTOCFGA_PRIORITY_VAL, alg->cra_priority))
105 if (alg->cra_flags & CRYPTO_ALG_LARVAL) {
115 if (alg->cra_type && alg->cra_type->report) {
116 if (alg->cra_type->report(skb, alg))
122 switch (alg->cra_flags & (CRYPTO_ALG_TYPE_MASK | CRYPTO_ALG_LARVAL)) {
134 return -EMSGSIZE;
140 struct sk_buff *in_skb = info->in_skb;
141 struct sk_buff *skb = info->out_skb;
146 nlh = nlmsg_put(skb, NETLINK_CB(in_skb).portid, info->nlmsg_seq,
147 CRYPTO_MSG_GETALG, sizeof(*ualg), info->nlmsg_flags);
149 err = -EMSGSIZE;
170 struct net *net = sock_net(in_skb->sk);
177 if (!null_terminated(p->cru_name) || !null_terminated(p->cru_driver_name))
178 return -EINVAL;
182 return -ENOENT;
184 err = -ENOMEM;
191 info.nlmsg_seq = in_nlh->nlmsg_seq;
204 return nlmsg_unicast(net->crypto_nlsk, skb, NETLINK_CB(in_skb).portid);
209 const size_t start_pos = cb->args[0];
215 info.in_skb = cb->skb;
217 info.nlmsg_seq = cb->nlh->nlmsg_seq;
224 if (res == -EMSGSIZE)
231 cb->args[0] = pos;
232 res = skb->len;
252 return -EPERM;
254 if (!null_terminated(p->cru_name) || !null_terminated(p->cru_driver_name))
255 return -EINVAL;
257 if (priority && !strlen(p->cru_driver_name))
258 return -EINVAL;
262 return -ENOENT;
269 alg->cra_priority = nla_get_u32(priority);
287 return -EPERM;
289 if (!null_terminated(p->cru_name) || !null_terminated(p->cru_driver_name))
290 return -EINVAL;
294 return -ENOENT;
296 /* We can not unregister core algorithms such as aes-generic.
301 err = -EINVAL;
302 if (!(alg->cra_flags & CRYPTO_ALG_INSTANCE))
305 err = -EBUSY;
306 if (refcount_read(&alg->cra_refcnt) > 2)
320 int exact = 0;
327 return -EPERM;
329 if (!null_terminated(p->cru_name) || !null_terminated(p->cru_driver_name))
330 return -EINVAL;
332 if (strlen(p->cru_driver_name))
333 exact = 1;
335 if (priority && !exact)
336 return -EINVAL;
338 alg = crypto_alg_match(p, exact);
341 return -EEXIST;
344 if (strlen(p->cru_driver_name))
345 name = p->cru_driver_name;
347 name = p->cru_name;
349 alg = crypto_alg_mod_lookup(name, p->cru_type, p->cru_mask);
356 alg->cra_priority = nla_get_u32(priority);
369 return -EPERM;
377 return -ENOTSUPP;
383 [CRYPTO_MSG_NEWALG - CRYPTO_MSG_BASE] = MSGSIZE(crypto_user_alg),
384 [CRYPTO_MSG_DELALG - CRYPTO_MSG_BASE] = MSGSIZE(crypto_user_alg),
385 [CRYPTO_MSG_UPDATEALG - CRYPTO_MSG_BASE] = MSGSIZE(crypto_user_alg),
386 [CRYPTO_MSG_GETALG - CRYPTO_MSG_BASE] = MSGSIZE(crypto_user_alg),
387 [CRYPTO_MSG_DELRNG - CRYPTO_MSG_BASE] = 0,
388 [CRYPTO_MSG_GETSTAT - CRYPTO_MSG_BASE] = MSGSIZE(crypto_user_alg),
402 [CRYPTO_MSG_NEWALG - CRYPTO_MSG_BASE] = { .doit = crypto_add_alg},
403 [CRYPTO_MSG_DELALG - CRYPTO_MSG_BASE] = { .doit = crypto_del_alg},
404 [CRYPTO_MSG_UPDATEALG - CRYPTO_MSG_BASE] = { .doit = crypto_update_alg},
405 [CRYPTO_MSG_GETALG - CRYPTO_MSG_BASE] = { .doit = crypto_report,
408 [CRYPTO_MSG_DELRNG - CRYPTO_MSG_BASE] = { .doit = crypto_del_rng },
409 [CRYPTO_MSG_GETSTAT - CRYPTO_MSG_BASE] = { .doit = crypto_reportstat},
415 struct net *net = sock_net(skb->sk);
420 type = nlh->nlmsg_type;
422 return -EINVAL;
424 type -= CRYPTO_MSG_BASE;
427 if ((type == (CRYPTO_MSG_GETALG - CRYPTO_MSG_BASE) &&
428 (nlh->nlmsg_flags & NLM_F_DUMP))) {
432 if (link->dump == NULL)
433 return -EINVAL;
442 .dump = link->dump,
443 .done = link->done,
446 err = netlink_dump_start(net->crypto_nlsk, skb, nlh, &c);
457 if (link->doit == NULL)
458 return -EINVAL;
460 return link->doit(skb, nlh, attrs);
476 net->crypto_nlsk = netlink_kernel_create(net, NETLINK_CRYPTO, &cfg);
477 return net->crypto_nlsk == NULL ? -ENOMEM : 0;
482 netlink_kernel_release(net->crypto_nlsk);
483 net->crypto_nlsk = NULL;
506 MODULE_ALIAS("net-pf-16-proto-21");