| Herbert Xu | 8ff5909 | 2010-10-19 21:31:55 +0800 | [diff] [blame] | 1 | /* | 
|  | 2 | * algif_skcipher: User-space interface for skcipher algorithms | 
|  | 3 | * | 
|  | 4 | * This file provides the user-space API for symmetric key ciphers. | 
|  | 5 | * | 
|  | 6 | * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au> | 
|  | 7 | * | 
|  | 8 | * This program is free software; you can redistribute it and/or modify it | 
|  | 9 | * under the terms of the GNU General Public License as published by the Free | 
|  | 10 | * Software Foundation; either version 2 of the License, or (at your option) | 
|  | 11 | * any later version. | 
|  | 12 | * | 
|  | 13 | */ | 
|  | 14 |  | 
|  | 15 | #include <crypto/scatterwalk.h> | 
|  | 16 | #include <crypto/skcipher.h> | 
|  | 17 | #include <crypto/if_alg.h> | 
|  | 18 | #include <linux/init.h> | 
|  | 19 | #include <linux/list.h> | 
|  | 20 | #include <linux/kernel.h> | 
|  | 21 | #include <linux/mm.h> | 
|  | 22 | #include <linux/module.h> | 
|  | 23 | #include <linux/net.h> | 
|  | 24 | #include <net/sock.h> | 
|  | 25 |  | 
|  | 26 | struct skcipher_sg_list { | 
|  | 27 | struct list_head list; | 
|  | 28 |  | 
|  | 29 | int cur; | 
|  | 30 |  | 
|  | 31 | struct scatterlist sg[0]; | 
|  | 32 | }; | 
|  | 33 |  | 
|  | 34 | struct skcipher_ctx { | 
|  | 35 | struct list_head tsgl; | 
|  | 36 | struct af_alg_sgl rsgl; | 
|  | 37 |  | 
|  | 38 | void *iv; | 
|  | 39 |  | 
|  | 40 | struct af_alg_completion completion; | 
|  | 41 |  | 
|  | 42 | unsigned used; | 
|  | 43 |  | 
|  | 44 | unsigned int len; | 
|  | 45 | bool more; | 
|  | 46 | bool merge; | 
|  | 47 | bool enc; | 
|  | 48 |  | 
|  | 49 | struct ablkcipher_request req; | 
|  | 50 | }; | 
|  | 51 |  | 
|  | 52 | #define MAX_SGL_ENTS ((PAGE_SIZE - sizeof(struct skcipher_sg_list)) / \ | 
|  | 53 | sizeof(struct scatterlist) - 1) | 
|  | 54 |  | 
| Herbert Xu | 0f6bb83 | 2010-11-30 16:49:02 +0800 | [diff] [blame] | 55 | static inline int skcipher_sndbuf(struct sock *sk) | 
| Herbert Xu | 8ff5909 | 2010-10-19 21:31:55 +0800 | [diff] [blame] | 56 | { | 
|  | 57 | struct alg_sock *ask = alg_sk(sk); | 
|  | 58 | struct skcipher_ctx *ctx = ask->private; | 
|  | 59 |  | 
| Herbert Xu | 0f6bb83 | 2010-11-30 16:49:02 +0800 | [diff] [blame] | 60 | return max_t(int, max_t(int, sk->sk_sndbuf & PAGE_MASK, PAGE_SIZE) - | 
|  | 61 | ctx->used, 0); | 
|  | 62 | } | 
|  | 63 |  | 
|  | 64 | static inline bool skcipher_writable(struct sock *sk) | 
|  | 65 | { | 
|  | 66 | return PAGE_SIZE <= skcipher_sndbuf(sk); | 
| Herbert Xu | 8ff5909 | 2010-10-19 21:31:55 +0800 | [diff] [blame] | 67 | } | 
|  | 68 |  | 
|  | 69 | static int skcipher_alloc_sgl(struct sock *sk) | 
|  | 70 | { | 
|  | 71 | struct alg_sock *ask = alg_sk(sk); | 
|  | 72 | struct skcipher_ctx *ctx = ask->private; | 
|  | 73 | struct skcipher_sg_list *sgl; | 
|  | 74 | struct scatterlist *sg = NULL; | 
|  | 75 |  | 
|  | 76 | sgl = list_entry(ctx->tsgl.prev, struct skcipher_sg_list, list); | 
|  | 77 | if (!list_empty(&ctx->tsgl)) | 
|  | 78 | sg = sgl->sg; | 
|  | 79 |  | 
|  | 80 | if (!sg || sgl->cur >= MAX_SGL_ENTS) { | 
|  | 81 | sgl = sock_kmalloc(sk, sizeof(*sgl) + | 
|  | 82 | sizeof(sgl->sg[0]) * (MAX_SGL_ENTS + 1), | 
|  | 83 | GFP_KERNEL); | 
|  | 84 | if (!sgl) | 
|  | 85 | return -ENOMEM; | 
|  | 86 |  | 
|  | 87 | sg_init_table(sgl->sg, MAX_SGL_ENTS + 1); | 
|  | 88 | sgl->cur = 0; | 
|  | 89 |  | 
|  | 90 | if (sg) | 
|  | 91 | scatterwalk_sg_chain(sg, MAX_SGL_ENTS + 1, sgl->sg); | 
|  | 92 |  | 
|  | 93 | list_add_tail(&sgl->list, &ctx->tsgl); | 
|  | 94 | } | 
|  | 95 |  | 
|  | 96 | return 0; | 
|  | 97 | } | 
|  | 98 |  | 
|  | 99 | static void skcipher_pull_sgl(struct sock *sk, int used) | 
|  | 100 | { | 
|  | 101 | struct alg_sock *ask = alg_sk(sk); | 
|  | 102 | struct skcipher_ctx *ctx = ask->private; | 
|  | 103 | struct skcipher_sg_list *sgl; | 
|  | 104 | struct scatterlist *sg; | 
|  | 105 | int i; | 
|  | 106 |  | 
|  | 107 | while (!list_empty(&ctx->tsgl)) { | 
|  | 108 | sgl = list_first_entry(&ctx->tsgl, struct skcipher_sg_list, | 
|  | 109 | list); | 
|  | 110 | sg = sgl->sg; | 
|  | 111 |  | 
|  | 112 | for (i = 0; i < sgl->cur; i++) { | 
|  | 113 | int plen = min_t(int, used, sg[i].length); | 
|  | 114 |  | 
|  | 115 | if (!sg_page(sg + i)) | 
|  | 116 | continue; | 
|  | 117 |  | 
|  | 118 | sg[i].length -= plen; | 
|  | 119 | sg[i].offset += plen; | 
|  | 120 |  | 
|  | 121 | used -= plen; | 
|  | 122 | ctx->used -= plen; | 
|  | 123 |  | 
|  | 124 | if (sg[i].length) | 
|  | 125 | return; | 
|  | 126 |  | 
|  | 127 | put_page(sg_page(sg + i)); | 
|  | 128 | sg_assign_page(sg + i, NULL); | 
|  | 129 | } | 
|  | 130 |  | 
|  | 131 | list_del(&sgl->list); | 
|  | 132 | sock_kfree_s(sk, sgl, | 
|  | 133 | sizeof(*sgl) + sizeof(sgl->sg[0]) * | 
|  | 134 | (MAX_SGL_ENTS + 1)); | 
|  | 135 | } | 
|  | 136 |  | 
|  | 137 | if (!ctx->used) | 
|  | 138 | ctx->merge = 0; | 
|  | 139 | } | 
|  | 140 |  | 
|  | 141 | static void skcipher_free_sgl(struct sock *sk) | 
|  | 142 | { | 
|  | 143 | struct alg_sock *ask = alg_sk(sk); | 
|  | 144 | struct skcipher_ctx *ctx = ask->private; | 
|  | 145 |  | 
|  | 146 | skcipher_pull_sgl(sk, ctx->used); | 
|  | 147 | } | 
|  | 148 |  | 
|  | 149 | static int skcipher_wait_for_wmem(struct sock *sk, unsigned flags) | 
|  | 150 | { | 
|  | 151 | long timeout; | 
|  | 152 | DEFINE_WAIT(wait); | 
|  | 153 | int err = -ERESTARTSYS; | 
|  | 154 |  | 
|  | 155 | if (flags & MSG_DONTWAIT) | 
|  | 156 | return -EAGAIN; | 
|  | 157 |  | 
|  | 158 | set_bit(SOCK_ASYNC_NOSPACE, &sk->sk_socket->flags); | 
|  | 159 |  | 
|  | 160 | for (;;) { | 
|  | 161 | if (signal_pending(current)) | 
|  | 162 | break; | 
|  | 163 | prepare_to_wait(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE); | 
|  | 164 | timeout = MAX_SCHEDULE_TIMEOUT; | 
|  | 165 | if (sk_wait_event(sk, &timeout, skcipher_writable(sk))) { | 
|  | 166 | err = 0; | 
|  | 167 | break; | 
|  | 168 | } | 
|  | 169 | } | 
|  | 170 | finish_wait(sk_sleep(sk), &wait); | 
|  | 171 |  | 
|  | 172 | return err; | 
|  | 173 | } | 
|  | 174 |  | 
|  | 175 | static void skcipher_wmem_wakeup(struct sock *sk) | 
|  | 176 | { | 
|  | 177 | struct socket_wq *wq; | 
|  | 178 |  | 
|  | 179 | if (!skcipher_writable(sk)) | 
|  | 180 | return; | 
|  | 181 |  | 
|  | 182 | rcu_read_lock(); | 
|  | 183 | wq = rcu_dereference(sk->sk_wq); | 
|  | 184 | if (wq_has_sleeper(wq)) | 
|  | 185 | wake_up_interruptible_sync_poll(&wq->wait, POLLIN | | 
|  | 186 | POLLRDNORM | | 
|  | 187 | POLLRDBAND); | 
|  | 188 | sk_wake_async(sk, SOCK_WAKE_WAITD, POLL_IN); | 
|  | 189 | rcu_read_unlock(); | 
|  | 190 | } | 
|  | 191 |  | 
|  | 192 | static int skcipher_wait_for_data(struct sock *sk, unsigned flags) | 
|  | 193 | { | 
|  | 194 | struct alg_sock *ask = alg_sk(sk); | 
|  | 195 | struct skcipher_ctx *ctx = ask->private; | 
|  | 196 | long timeout; | 
|  | 197 | DEFINE_WAIT(wait); | 
|  | 198 | int err = -ERESTARTSYS; | 
|  | 199 |  | 
|  | 200 | if (flags & MSG_DONTWAIT) { | 
|  | 201 | return -EAGAIN; | 
|  | 202 | } | 
|  | 203 |  | 
|  | 204 | set_bit(SOCK_ASYNC_WAITDATA, &sk->sk_socket->flags); | 
|  | 205 |  | 
|  | 206 | for (;;) { | 
|  | 207 | if (signal_pending(current)) | 
|  | 208 | break; | 
|  | 209 | prepare_to_wait(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE); | 
|  | 210 | timeout = MAX_SCHEDULE_TIMEOUT; | 
|  | 211 | if (sk_wait_event(sk, &timeout, ctx->used)) { | 
|  | 212 | err = 0; | 
|  | 213 | break; | 
|  | 214 | } | 
|  | 215 | } | 
|  | 216 | finish_wait(sk_sleep(sk), &wait); | 
|  | 217 |  | 
|  | 218 | clear_bit(SOCK_ASYNC_WAITDATA, &sk->sk_socket->flags); | 
|  | 219 |  | 
|  | 220 | return err; | 
|  | 221 | } | 
|  | 222 |  | 
|  | 223 | static void skcipher_data_wakeup(struct sock *sk) | 
|  | 224 | { | 
|  | 225 | struct alg_sock *ask = alg_sk(sk); | 
|  | 226 | struct skcipher_ctx *ctx = ask->private; | 
|  | 227 | struct socket_wq *wq; | 
|  | 228 |  | 
|  | 229 | if (!ctx->used) | 
|  | 230 | return; | 
|  | 231 |  | 
|  | 232 | rcu_read_lock(); | 
|  | 233 | wq = rcu_dereference(sk->sk_wq); | 
|  | 234 | if (wq_has_sleeper(wq)) | 
|  | 235 | wake_up_interruptible_sync_poll(&wq->wait, POLLOUT | | 
|  | 236 | POLLRDNORM | | 
|  | 237 | POLLRDBAND); | 
|  | 238 | sk_wake_async(sk, SOCK_WAKE_SPACE, POLL_OUT); | 
|  | 239 | rcu_read_unlock(); | 
|  | 240 | } | 
|  | 241 |  | 
|  | 242 | static int skcipher_sendmsg(struct kiocb *unused, struct socket *sock, | 
|  | 243 | struct msghdr *msg, size_t size) | 
|  | 244 | { | 
|  | 245 | struct sock *sk = sock->sk; | 
|  | 246 | struct alg_sock *ask = alg_sk(sk); | 
|  | 247 | struct skcipher_ctx *ctx = ask->private; | 
|  | 248 | struct crypto_ablkcipher *tfm = crypto_ablkcipher_reqtfm(&ctx->req); | 
|  | 249 | unsigned ivsize = crypto_ablkcipher_ivsize(tfm); | 
|  | 250 | struct skcipher_sg_list *sgl; | 
|  | 251 | struct af_alg_control con = {}; | 
|  | 252 | long copied = 0; | 
|  | 253 | bool enc = 0; | 
| Herbert Xu | 8ff5909 | 2010-10-19 21:31:55 +0800 | [diff] [blame] | 254 | int err; | 
|  | 255 | int i; | 
|  | 256 |  | 
|  | 257 | if (msg->msg_controllen) { | 
|  | 258 | err = af_alg_cmsg_send(msg, &con); | 
|  | 259 | if (err) | 
|  | 260 | return err; | 
|  | 261 |  | 
|  | 262 | switch (con.op) { | 
|  | 263 | case ALG_OP_ENCRYPT: | 
|  | 264 | enc = 1; | 
|  | 265 | break; | 
|  | 266 | case ALG_OP_DECRYPT: | 
|  | 267 | enc = 0; | 
|  | 268 | break; | 
|  | 269 | default: | 
|  | 270 | return -EINVAL; | 
|  | 271 | } | 
|  | 272 |  | 
|  | 273 | if (con.iv && con.iv->ivlen != ivsize) | 
|  | 274 | return -EINVAL; | 
|  | 275 | } | 
|  | 276 |  | 
|  | 277 | err = -EINVAL; | 
|  | 278 |  | 
|  | 279 | lock_sock(sk); | 
|  | 280 | if (!ctx->more && ctx->used) | 
|  | 281 | goto unlock; | 
|  | 282 |  | 
|  | 283 | if (!ctx->used) { | 
|  | 284 | ctx->enc = enc; | 
|  | 285 | if (con.iv) | 
|  | 286 | memcpy(ctx->iv, con.iv->iv, ivsize); | 
|  | 287 | } | 
|  | 288 |  | 
| Herbert Xu | 8ff5909 | 2010-10-19 21:31:55 +0800 | [diff] [blame] | 289 | while (size) { | 
|  | 290 | struct scatterlist *sg; | 
|  | 291 | unsigned long len = size; | 
|  | 292 | int plen; | 
|  | 293 |  | 
|  | 294 | if (ctx->merge) { | 
|  | 295 | sgl = list_entry(ctx->tsgl.prev, | 
|  | 296 | struct skcipher_sg_list, list); | 
|  | 297 | sg = sgl->sg + sgl->cur - 1; | 
|  | 298 | len = min_t(unsigned long, len, | 
|  | 299 | PAGE_SIZE - sg->offset - sg->length); | 
|  | 300 |  | 
|  | 301 | err = memcpy_fromiovec(page_address(sg_page(sg)) + | 
|  | 302 | sg->offset + sg->length, | 
|  | 303 | msg->msg_iov, len); | 
|  | 304 | if (err) | 
|  | 305 | goto unlock; | 
|  | 306 |  | 
|  | 307 | sg->length += len; | 
|  | 308 | ctx->merge = (sg->offset + sg->length) & | 
|  | 309 | (PAGE_SIZE - 1); | 
|  | 310 |  | 
|  | 311 | ctx->used += len; | 
|  | 312 | copied += len; | 
|  | 313 | size -= len; | 
| Herbert Xu | 8ff5909 | 2010-10-19 21:31:55 +0800 | [diff] [blame] | 314 | continue; | 
|  | 315 | } | 
|  | 316 |  | 
| Herbert Xu | 0f6bb83 | 2010-11-30 16:49:02 +0800 | [diff] [blame] | 317 | if (!skcipher_writable(sk)) { | 
| Herbert Xu | 8ff5909 | 2010-10-19 21:31:55 +0800 | [diff] [blame] | 318 | err = skcipher_wait_for_wmem(sk, msg->msg_flags); | 
|  | 319 | if (err) | 
|  | 320 | goto unlock; | 
| Herbert Xu | 8ff5909 | 2010-10-19 21:31:55 +0800 | [diff] [blame] | 321 | } | 
|  | 322 |  | 
| Herbert Xu | 0f6bb83 | 2010-11-30 16:49:02 +0800 | [diff] [blame] | 323 | len = min_t(unsigned long, len, skcipher_sndbuf(sk)); | 
| Herbert Xu | 8ff5909 | 2010-10-19 21:31:55 +0800 | [diff] [blame] | 324 |  | 
|  | 325 | err = skcipher_alloc_sgl(sk); | 
|  | 326 | if (err) | 
|  | 327 | goto unlock; | 
|  | 328 |  | 
|  | 329 | sgl = list_entry(ctx->tsgl.prev, struct skcipher_sg_list, list); | 
|  | 330 | sg = sgl->sg; | 
|  | 331 | do { | 
|  | 332 | i = sgl->cur; | 
|  | 333 | plen = min_t(int, len, PAGE_SIZE); | 
|  | 334 |  | 
|  | 335 | sg_assign_page(sg + i, alloc_page(GFP_KERNEL)); | 
|  | 336 | err = -ENOMEM; | 
|  | 337 | if (!sg_page(sg + i)) | 
|  | 338 | goto unlock; | 
|  | 339 |  | 
|  | 340 | err = memcpy_fromiovec(page_address(sg_page(sg + i)), | 
|  | 341 | msg->msg_iov, plen); | 
|  | 342 | if (err) { | 
|  | 343 | __free_page(sg_page(sg + i)); | 
|  | 344 | sg_assign_page(sg + i, NULL); | 
|  | 345 | goto unlock; | 
|  | 346 | } | 
|  | 347 |  | 
|  | 348 | sg[i].length = plen; | 
|  | 349 | len -= plen; | 
|  | 350 | ctx->used += plen; | 
|  | 351 | copied += plen; | 
|  | 352 | size -= plen; | 
| Herbert Xu | 8ff5909 | 2010-10-19 21:31:55 +0800 | [diff] [blame] | 353 | sgl->cur++; | 
|  | 354 | } while (len && sgl->cur < MAX_SGL_ENTS); | 
|  | 355 |  | 
|  | 356 | ctx->merge = plen & (PAGE_SIZE - 1); | 
|  | 357 | } | 
|  | 358 |  | 
|  | 359 | err = 0; | 
|  | 360 |  | 
|  | 361 | ctx->more = msg->msg_flags & MSG_MORE; | 
|  | 362 | if (!ctx->more && !list_empty(&ctx->tsgl)) | 
|  | 363 | sgl = list_entry(ctx->tsgl.prev, struct skcipher_sg_list, list); | 
|  | 364 |  | 
|  | 365 | unlock: | 
|  | 366 | skcipher_data_wakeup(sk); | 
|  | 367 | release_sock(sk); | 
|  | 368 |  | 
|  | 369 | return copied ?: err; | 
|  | 370 | } | 
|  | 371 |  | 
|  | 372 | static ssize_t skcipher_sendpage(struct socket *sock, struct page *page, | 
|  | 373 | int offset, size_t size, int flags) | 
|  | 374 | { | 
|  | 375 | struct sock *sk = sock->sk; | 
|  | 376 | struct alg_sock *ask = alg_sk(sk); | 
|  | 377 | struct skcipher_ctx *ctx = ask->private; | 
|  | 378 | struct skcipher_sg_list *sgl; | 
|  | 379 | int err = -EINVAL; | 
| Herbert Xu | 8ff5909 | 2010-10-19 21:31:55 +0800 | [diff] [blame] | 380 |  | 
|  | 381 | lock_sock(sk); | 
|  | 382 | if (!ctx->more && ctx->used) | 
|  | 383 | goto unlock; | 
|  | 384 |  | 
|  | 385 | if (!size) | 
|  | 386 | goto done; | 
|  | 387 |  | 
| Herbert Xu | 0f6bb83 | 2010-11-30 16:49:02 +0800 | [diff] [blame] | 388 | if (!skcipher_writable(sk)) { | 
| Herbert Xu | 8ff5909 | 2010-10-19 21:31:55 +0800 | [diff] [blame] | 389 | err = skcipher_wait_for_wmem(sk, flags); | 
|  | 390 | if (err) | 
|  | 391 | goto unlock; | 
| Herbert Xu | 8ff5909 | 2010-10-19 21:31:55 +0800 | [diff] [blame] | 392 | } | 
|  | 393 |  | 
|  | 394 | err = skcipher_alloc_sgl(sk); | 
|  | 395 | if (err) | 
|  | 396 | goto unlock; | 
|  | 397 |  | 
|  | 398 | ctx->merge = 0; | 
|  | 399 | sgl = list_entry(ctx->tsgl.prev, struct skcipher_sg_list, list); | 
|  | 400 |  | 
|  | 401 | get_page(page); | 
|  | 402 | sg_set_page(sgl->sg + sgl->cur, page, size, offset); | 
|  | 403 | sgl->cur++; | 
|  | 404 | ctx->used += size; | 
|  | 405 |  | 
|  | 406 | done: | 
|  | 407 | ctx->more = flags & MSG_MORE; | 
|  | 408 | if (!ctx->more && !list_empty(&ctx->tsgl)) | 
|  | 409 | sgl = list_entry(ctx->tsgl.prev, struct skcipher_sg_list, list); | 
|  | 410 |  | 
|  | 411 | unlock: | 
|  | 412 | skcipher_data_wakeup(sk); | 
|  | 413 | release_sock(sk); | 
|  | 414 |  | 
|  | 415 | return err ?: size; | 
|  | 416 | } | 
|  | 417 |  | 
|  | 418 | static int skcipher_recvmsg(struct kiocb *unused, struct socket *sock, | 
|  | 419 | struct msghdr *msg, size_t ignored, int flags) | 
|  | 420 | { | 
|  | 421 | struct sock *sk = sock->sk; | 
|  | 422 | struct alg_sock *ask = alg_sk(sk); | 
|  | 423 | struct skcipher_ctx *ctx = ask->private; | 
|  | 424 | unsigned bs = crypto_ablkcipher_blocksize(crypto_ablkcipher_reqtfm( | 
|  | 425 | &ctx->req)); | 
|  | 426 | struct skcipher_sg_list *sgl; | 
|  | 427 | struct scatterlist *sg; | 
|  | 428 | unsigned long iovlen; | 
|  | 429 | struct iovec *iov; | 
|  | 430 | int err = -EAGAIN; | 
|  | 431 | int used; | 
|  | 432 | long copied = 0; | 
|  | 433 |  | 
|  | 434 | lock_sock(sk); | 
|  | 435 | for (iov = msg->msg_iov, iovlen = msg->msg_iovlen; iovlen > 0; | 
|  | 436 | iovlen--, iov++) { | 
|  | 437 | unsigned long seglen = iov->iov_len; | 
|  | 438 | char __user *from = iov->iov_base; | 
|  | 439 |  | 
|  | 440 | while (seglen) { | 
|  | 441 | sgl = list_first_entry(&ctx->tsgl, | 
|  | 442 | struct skcipher_sg_list, list); | 
|  | 443 | sg = sgl->sg; | 
|  | 444 |  | 
|  | 445 | while (!sg->length) | 
|  | 446 | sg++; | 
|  | 447 |  | 
|  | 448 | used = ctx->used; | 
|  | 449 | if (!used) { | 
|  | 450 | err = skcipher_wait_for_data(sk, flags); | 
|  | 451 | if (err) | 
|  | 452 | goto unlock; | 
|  | 453 | } | 
|  | 454 |  | 
|  | 455 | used = min_t(unsigned long, used, seglen); | 
|  | 456 |  | 
| Herbert Xu | bc97e57 | 2010-11-30 17:04:31 +0800 | [diff] [blame] | 457 | used = af_alg_make_sg(&ctx->rsgl, from, used, 1); | 
|  | 458 | err = used; | 
|  | 459 | if (err < 0) | 
|  | 460 | goto unlock; | 
|  | 461 |  | 
| Herbert Xu | 8ff5909 | 2010-10-19 21:31:55 +0800 | [diff] [blame] | 462 | if (ctx->more || used < ctx->used) | 
|  | 463 | used -= used % bs; | 
|  | 464 |  | 
|  | 465 | err = -EINVAL; | 
|  | 466 | if (!used) | 
| Herbert Xu | bc97e57 | 2010-11-30 17:04:31 +0800 | [diff] [blame] | 467 | goto free; | 
| Herbert Xu | 8ff5909 | 2010-10-19 21:31:55 +0800 | [diff] [blame] | 468 |  | 
|  | 469 | ablkcipher_request_set_crypt(&ctx->req, sg, | 
|  | 470 | ctx->rsgl.sg, used, | 
|  | 471 | ctx->iv); | 
|  | 472 |  | 
|  | 473 | err = af_alg_wait_for_completion( | 
|  | 474 | ctx->enc ? | 
|  | 475 | crypto_ablkcipher_encrypt(&ctx->req) : | 
|  | 476 | crypto_ablkcipher_decrypt(&ctx->req), | 
|  | 477 | &ctx->completion); | 
|  | 478 |  | 
| Herbert Xu | bc97e57 | 2010-11-30 17:04:31 +0800 | [diff] [blame] | 479 | free: | 
| Herbert Xu | 8ff5909 | 2010-10-19 21:31:55 +0800 | [diff] [blame] | 480 | af_alg_free_sg(&ctx->rsgl); | 
|  | 481 |  | 
|  | 482 | if (err) | 
|  | 483 | goto unlock; | 
|  | 484 |  | 
|  | 485 | copied += used; | 
|  | 486 | from += used; | 
|  | 487 | seglen -= used; | 
|  | 488 | skcipher_pull_sgl(sk, used); | 
|  | 489 | } | 
|  | 490 | } | 
|  | 491 |  | 
|  | 492 | err = 0; | 
|  | 493 |  | 
|  | 494 | unlock: | 
|  | 495 | skcipher_wmem_wakeup(sk); | 
|  | 496 | release_sock(sk); | 
|  | 497 |  | 
|  | 498 | return copied ?: err; | 
|  | 499 | } | 
|  | 500 |  | 
|  | 501 |  | 
|  | 502 | static unsigned int skcipher_poll(struct file *file, struct socket *sock, | 
|  | 503 | poll_table *wait) | 
|  | 504 | { | 
|  | 505 | struct sock *sk = sock->sk; | 
|  | 506 | struct alg_sock *ask = alg_sk(sk); | 
|  | 507 | struct skcipher_ctx *ctx = ask->private; | 
|  | 508 | unsigned int mask; | 
|  | 509 |  | 
|  | 510 | sock_poll_wait(file, sk_sleep(sk), wait); | 
|  | 511 | mask = 0; | 
|  | 512 |  | 
|  | 513 | if (ctx->used) | 
|  | 514 | mask |= POLLIN | POLLRDNORM; | 
|  | 515 |  | 
|  | 516 | if (skcipher_writable(sk)) | 
|  | 517 | mask |= POLLOUT | POLLWRNORM | POLLWRBAND; | 
|  | 518 |  | 
|  | 519 | return mask; | 
|  | 520 | } | 
|  | 521 |  | 
|  | 522 | static struct proto_ops algif_skcipher_ops = { | 
|  | 523 | .family		=	PF_ALG, | 
|  | 524 |  | 
|  | 525 | .connect	=	sock_no_connect, | 
|  | 526 | .socketpair	=	sock_no_socketpair, | 
|  | 527 | .getname	=	sock_no_getname, | 
|  | 528 | .ioctl		=	sock_no_ioctl, | 
|  | 529 | .listen		=	sock_no_listen, | 
|  | 530 | .shutdown	=	sock_no_shutdown, | 
|  | 531 | .getsockopt	=	sock_no_getsockopt, | 
|  | 532 | .mmap		=	sock_no_mmap, | 
|  | 533 | .bind		=	sock_no_bind, | 
|  | 534 | .accept		=	sock_no_accept, | 
|  | 535 | .setsockopt	=	sock_no_setsockopt, | 
|  | 536 |  | 
|  | 537 | .release	=	af_alg_release, | 
|  | 538 | .sendmsg	=	skcipher_sendmsg, | 
|  | 539 | .sendpage	=	skcipher_sendpage, | 
|  | 540 | .recvmsg	=	skcipher_recvmsg, | 
|  | 541 | .poll		=	skcipher_poll, | 
|  | 542 | }; | 
|  | 543 |  | 
|  | 544 | static void *skcipher_bind(const char *name, u32 type, u32 mask) | 
|  | 545 | { | 
|  | 546 | return crypto_alloc_ablkcipher(name, type, mask); | 
|  | 547 | } | 
|  | 548 |  | 
|  | 549 | static void skcipher_release(void *private) | 
|  | 550 | { | 
|  | 551 | crypto_free_ablkcipher(private); | 
|  | 552 | } | 
|  | 553 |  | 
|  | 554 | static int skcipher_setkey(void *private, const u8 *key, unsigned int keylen) | 
|  | 555 | { | 
|  | 556 | return crypto_ablkcipher_setkey(private, key, keylen); | 
|  | 557 | } | 
|  | 558 |  | 
|  | 559 | static void skcipher_sock_destruct(struct sock *sk) | 
|  | 560 | { | 
|  | 561 | struct alg_sock *ask = alg_sk(sk); | 
|  | 562 | struct skcipher_ctx *ctx = ask->private; | 
|  | 563 | struct crypto_ablkcipher *tfm = crypto_ablkcipher_reqtfm(&ctx->req); | 
|  | 564 |  | 
|  | 565 | skcipher_free_sgl(sk); | 
|  | 566 | sock_kfree_s(sk, ctx->iv, crypto_ablkcipher_ivsize(tfm)); | 
|  | 567 | sock_kfree_s(sk, ctx, ctx->len); | 
|  | 568 | af_alg_release_parent(sk); | 
|  | 569 | } | 
|  | 570 |  | 
|  | 571 | static int skcipher_accept_parent(void *private, struct sock *sk) | 
|  | 572 | { | 
|  | 573 | struct skcipher_ctx *ctx; | 
|  | 574 | struct alg_sock *ask = alg_sk(sk); | 
|  | 575 | unsigned int len = sizeof(*ctx) + crypto_ablkcipher_reqsize(private); | 
|  | 576 |  | 
|  | 577 | ctx = sock_kmalloc(sk, len, GFP_KERNEL); | 
|  | 578 | if (!ctx) | 
|  | 579 | return -ENOMEM; | 
|  | 580 |  | 
|  | 581 | ctx->iv = sock_kmalloc(sk, crypto_ablkcipher_ivsize(private), | 
|  | 582 | GFP_KERNEL); | 
|  | 583 | if (!ctx->iv) { | 
|  | 584 | sock_kfree_s(sk, ctx, len); | 
|  | 585 | return -ENOMEM; | 
|  | 586 | } | 
|  | 587 |  | 
|  | 588 | memset(ctx->iv, 0, crypto_ablkcipher_ivsize(private)); | 
|  | 589 |  | 
|  | 590 | INIT_LIST_HEAD(&ctx->tsgl); | 
|  | 591 | ctx->len = len; | 
|  | 592 | ctx->used = 0; | 
|  | 593 | ctx->more = 0; | 
|  | 594 | ctx->merge = 0; | 
|  | 595 | ctx->enc = 0; | 
|  | 596 | af_alg_init_completion(&ctx->completion); | 
|  | 597 |  | 
|  | 598 | ask->private = ctx; | 
|  | 599 |  | 
|  | 600 | ablkcipher_request_set_tfm(&ctx->req, private); | 
|  | 601 | ablkcipher_request_set_callback(&ctx->req, CRYPTO_TFM_REQ_MAY_BACKLOG, | 
|  | 602 | af_alg_complete, &ctx->completion); | 
|  | 603 |  | 
|  | 604 | sk->sk_destruct = skcipher_sock_destruct; | 
|  | 605 |  | 
|  | 606 | return 0; | 
|  | 607 | } | 
|  | 608 |  | 
|  | 609 | static const struct af_alg_type algif_type_skcipher = { | 
|  | 610 | .bind		=	skcipher_bind, | 
|  | 611 | .release	=	skcipher_release, | 
|  | 612 | .setkey		=	skcipher_setkey, | 
|  | 613 | .accept		=	skcipher_accept_parent, | 
|  | 614 | .ops		=	&algif_skcipher_ops, | 
|  | 615 | .name		=	"skcipher", | 
|  | 616 | .owner		=	THIS_MODULE | 
|  | 617 | }; | 
|  | 618 |  | 
|  | 619 | static int __init algif_skcipher_init(void) | 
|  | 620 | { | 
|  | 621 | return af_alg_register_type(&algif_type_skcipher); | 
|  | 622 | } | 
|  | 623 |  | 
|  | 624 | static void __exit algif_skcipher_exit(void) | 
|  | 625 | { | 
|  | 626 | int err = af_alg_unregister_type(&algif_type_skcipher); | 
|  | 627 | BUG_ON(err); | 
|  | 628 | } | 
|  | 629 |  | 
|  | 630 | module_init(algif_skcipher_init); | 
|  | 631 | module_exit(algif_skcipher_exit); | 
|  | 632 | MODULE_LICENSE("GPL"); |