xref: /linux/crypto/algboss.c (revision 2dbc0838bcf24ca59cabc3130cf3b1d6809cdcd4)
1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /*
3  * Create default crypto algorithm instances.
4  *
5  * Copyright (c) 2006 Herbert Xu <herbert@gondor.apana.org.au>
6  */
7 
8 #include <crypto/internal/aead.h>
9 #include <linux/completion.h>
10 #include <linux/ctype.h>
11 #include <linux/err.h>
12 #include <linux/init.h>
13 #include <linux/kthread.h>
14 #include <linux/module.h>
15 #include <linux/notifier.h>
16 #include <linux/rtnetlink.h>
17 #include <linux/sched/signal.h>
18 #include <linux/slab.h>
19 #include <linux/string.h>
20 
21 #include "internal.h"
22 
23 struct cryptomgr_param {
24 	struct rtattr *tb[CRYPTO_MAX_ATTRS + 2];
25 
26 	struct {
27 		struct rtattr attr;
28 		struct crypto_attr_type data;
29 	} type;
30 
31 	union {
32 		struct rtattr attr;
33 		struct {
34 			struct rtattr attr;
35 			struct crypto_attr_alg data;
36 		} alg;
37 		struct {
38 			struct rtattr attr;
39 			struct crypto_attr_u32 data;
40 		} nu32;
41 	} attrs[CRYPTO_MAX_ATTRS];
42 
43 	char template[CRYPTO_MAX_ALG_NAME];
44 
45 	struct crypto_larval *larval;
46 
47 	u32 otype;
48 	u32 omask;
49 };
50 
51 struct crypto_test_param {
52 	char driver[CRYPTO_MAX_ALG_NAME];
53 	char alg[CRYPTO_MAX_ALG_NAME];
54 	u32 type;
55 };
56 
57 static int cryptomgr_probe(void *data)
58 {
59 	struct cryptomgr_param *param = data;
60 	struct crypto_template *tmpl;
61 	struct crypto_instance *inst;
62 	int err;
63 
64 	tmpl = crypto_lookup_template(param->template);
65 	if (!tmpl)
66 		goto out;
67 
68 	do {
69 		if (tmpl->create) {
70 			err = tmpl->create(tmpl, param->tb);
71 			continue;
72 		}
73 
74 		inst = tmpl->alloc(param->tb);
75 		if (IS_ERR(inst))
76 			err = PTR_ERR(inst);
77 		else if ((err = crypto_register_instance(tmpl, inst)))
78 			tmpl->free(inst);
79 	} while (err == -EAGAIN && !signal_pending(current));
80 
81 	crypto_tmpl_put(tmpl);
82 
83 out:
84 	complete_all(&param->larval->completion);
85 	crypto_alg_put(&param->larval->alg);
86 	kfree(param);
87 	module_put_and_exit(0);
88 }
89 
90 static int cryptomgr_schedule_probe(struct crypto_larval *larval)
91 {
92 	struct task_struct *thread;
93 	struct cryptomgr_param *param;
94 	const char *name = larval->alg.cra_name;
95 	const char *p;
96 	unsigned int len;
97 	int i;
98 
99 	if (!try_module_get(THIS_MODULE))
100 		goto err;
101 
102 	param = kzalloc(sizeof(*param), GFP_KERNEL);
103 	if (!param)
104 		goto err_put_module;
105 
106 	for (p = name; isalnum(*p) || *p == '-' || *p == '_'; p++)
107 		;
108 
109 	len = p - name;
110 	if (!len || *p != '(')
111 		goto err_free_param;
112 
113 	memcpy(param->template, name, len);
114 
115 	i = 0;
116 	for (;;) {
117 		int notnum = 0;
118 
119 		name = ++p;
120 
121 		for (; isalnum(*p) || *p == '-' || *p == '_'; p++)
122 			notnum |= !isdigit(*p);
123 
124 		if (*p == '(') {
125 			int recursion = 0;
126 
127 			for (;;) {
128 				if (!*++p)
129 					goto err_free_param;
130 				if (*p == '(')
131 					recursion++;
132 				else if (*p == ')' && !recursion--)
133 					break;
134 			}
135 
136 			notnum = 1;
137 			p++;
138 		}
139 
140 		len = p - name;
141 		if (!len)
142 			goto err_free_param;
143 
144 		if (notnum) {
145 			param->attrs[i].alg.attr.rta_len =
146 				sizeof(param->attrs[i].alg);
147 			param->attrs[i].alg.attr.rta_type = CRYPTOA_ALG;
148 			memcpy(param->attrs[i].alg.data.name, name, len);
149 		} else {
150 			param->attrs[i].nu32.attr.rta_len =
151 				sizeof(param->attrs[i].nu32);
152 			param->attrs[i].nu32.attr.rta_type = CRYPTOA_U32;
153 			param->attrs[i].nu32.data.num =
154 				simple_strtol(name, NULL, 0);
155 		}
156 
157 		param->tb[i + 1] = &param->attrs[i].attr;
158 		i++;
159 
160 		if (i >= CRYPTO_MAX_ATTRS)
161 			goto err_free_param;
162 
163 		if (*p == ')')
164 			break;
165 
166 		if (*p != ',')
167 			goto err_free_param;
168 	}
169 
170 	if (!i)
171 		goto err_free_param;
172 
173 	param->tb[i + 1] = NULL;
174 
175 	param->type.attr.rta_len = sizeof(param->type);
176 	param->type.attr.rta_type = CRYPTOA_TYPE;
177 	param->type.data.type = larval->alg.cra_flags & ~CRYPTO_ALG_TESTED;
178 	param->type.data.mask = larval->mask & ~CRYPTO_ALG_TESTED;
179 	param->tb[0] = &param->type.attr;
180 
181 	param->otype = larval->alg.cra_flags;
182 	param->omask = larval->mask;
183 
184 	crypto_alg_get(&larval->alg);
185 	param->larval = larval;
186 
187 	thread = kthread_run(cryptomgr_probe, param, "cryptomgr_probe");
188 	if (IS_ERR(thread))
189 		goto err_put_larval;
190 
191 	wait_for_completion_interruptible(&larval->completion);
192 
193 	return NOTIFY_STOP;
194 
195 err_put_larval:
196 	crypto_alg_put(&larval->alg);
197 err_free_param:
198 	kfree(param);
199 err_put_module:
200 	module_put(THIS_MODULE);
201 err:
202 	return NOTIFY_OK;
203 }
204 
205 static int cryptomgr_test(void *data)
206 {
207 	struct crypto_test_param *param = data;
208 	u32 type = param->type;
209 	int err = 0;
210 
211 #ifdef CONFIG_CRYPTO_MANAGER_DISABLE_TESTS
212 	goto skiptest;
213 #endif
214 
215 	if (type & CRYPTO_ALG_TESTED)
216 		goto skiptest;
217 
218 	err = alg_test(param->driver, param->alg, type, CRYPTO_ALG_TESTED);
219 
220 skiptest:
221 	crypto_alg_tested(param->driver, err);
222 
223 	kfree(param);
224 	module_put_and_exit(0);
225 }
226 
227 static int cryptomgr_schedule_test(struct crypto_alg *alg)
228 {
229 	struct task_struct *thread;
230 	struct crypto_test_param *param;
231 	u32 type;
232 
233 	if (!try_module_get(THIS_MODULE))
234 		goto err;
235 
236 	param = kzalloc(sizeof(*param), GFP_KERNEL);
237 	if (!param)
238 		goto err_put_module;
239 
240 	memcpy(param->driver, alg->cra_driver_name, sizeof(param->driver));
241 	memcpy(param->alg, alg->cra_name, sizeof(param->alg));
242 	type = alg->cra_flags;
243 
244 	/* Do not test internal algorithms. */
245 	if (type & CRYPTO_ALG_INTERNAL)
246 		type |= CRYPTO_ALG_TESTED;
247 
248 	param->type = type;
249 
250 	thread = kthread_run(cryptomgr_test, param, "cryptomgr_test");
251 	if (IS_ERR(thread))
252 		goto err_free_param;
253 
254 	return NOTIFY_STOP;
255 
256 err_free_param:
257 	kfree(param);
258 err_put_module:
259 	module_put(THIS_MODULE);
260 err:
261 	return NOTIFY_OK;
262 }
263 
264 static int cryptomgr_notify(struct notifier_block *this, unsigned long msg,
265 			    void *data)
266 {
267 	switch (msg) {
268 	case CRYPTO_MSG_ALG_REQUEST:
269 		return cryptomgr_schedule_probe(data);
270 	case CRYPTO_MSG_ALG_REGISTER:
271 		return cryptomgr_schedule_test(data);
272 	case CRYPTO_MSG_ALG_LOADED:
273 		break;
274 	}
275 
276 	return NOTIFY_DONE;
277 }
278 
279 static struct notifier_block cryptomgr_notifier = {
280 	.notifier_call = cryptomgr_notify,
281 };
282 
283 static int __init cryptomgr_init(void)
284 {
285 	return crypto_register_notifier(&cryptomgr_notifier);
286 }
287 
288 static void __exit cryptomgr_exit(void)
289 {
290 	int err = crypto_unregister_notifier(&cryptomgr_notifier);
291 	BUG_ON(err);
292 }
293 
294 /*
295  * This is arch_initcall() so that the crypto self-tests are run on algorithms
296  * registered early by subsys_initcall().  subsys_initcall() is needed for
297  * generic implementations so that they're available for comparison tests when
298  * other implementations are registered later by module_init().
299  */
300 arch_initcall(cryptomgr_init);
301 module_exit(cryptomgr_exit);
302 
303 MODULE_LICENSE("GPL");
304 MODULE_DESCRIPTION("Crypto Algorithm Manager");
305