mirror of
https://github.com/torvalds/linux.git
synced 2024-11-22 04:38:03 +00:00
6b34562f0c
A sig_alg backend has just been introduced and all asymmetric sign/verify algorithms have been migrated to it. The sign/verify operations can thus be dropped from akcipher_alg. It is now purely for asymmetric encrypt/decrypt. Move struct crypto_akcipher_sync_data from internal.h to akcipher.c and unexport crypto_akcipher_sync_{prep,post}(): They're no longer used by sig.c but only locally in akcipher.c. In crypto_akcipher_sync_{prep,post}(), drop various NULL pointer checks for data->dst as they were only necessary for the verify operation. In the crypto_sig_*() API calls, remove the forks that were necessary while algorithms were converted from crypto_akcipher to crypto_sig one by one. In struct akcipher_testvec, remove the "params", "param_len" and "algo" elements as they were only needed for the ecrdsa verify operation. Remove corresponding dead code from test_akcipher_one() as well. Signed-off-by: Lukas Wunner <lukas@wunner.de> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
204 lines
5.2 KiB
C
204 lines
5.2 KiB
C
/* SPDX-License-Identifier: GPL-2.0-or-later */
|
|
/*
|
|
* Cryptographic API.
|
|
*
|
|
* Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
|
|
* Copyright (c) 2005 Herbert Xu <herbert@gondor.apana.org.au>
|
|
*/
|
|
#ifndef _CRYPTO_INTERNAL_H
|
|
#define _CRYPTO_INTERNAL_H
|
|
|
|
#include <crypto/algapi.h>
|
|
#include <linux/completion.h>
|
|
#include <linux/err.h>
|
|
#include <linux/jump_label.h>
|
|
#include <linux/list.h>
|
|
#include <linux/module.h>
|
|
#include <linux/notifier.h>
|
|
#include <linux/numa.h>
|
|
#include <linux/refcount.h>
|
|
#include <linux/rwsem.h>
|
|
#include <linux/scatterlist.h>
|
|
#include <linux/sched.h>
|
|
#include <linux/types.h>
|
|
|
|
struct crypto_instance;
|
|
struct crypto_template;
|
|
|
|
struct crypto_larval {
|
|
struct crypto_alg alg;
|
|
struct crypto_alg *adult;
|
|
struct completion completion;
|
|
u32 mask;
|
|
bool test_started;
|
|
};
|
|
|
|
enum {
|
|
CRYPTOA_UNSPEC,
|
|
CRYPTOA_ALG,
|
|
CRYPTOA_TYPE,
|
|
__CRYPTOA_MAX,
|
|
};
|
|
|
|
#define CRYPTOA_MAX (__CRYPTOA_MAX - 1)
|
|
|
|
/* Maximum number of (rtattr) parameters for each template. */
|
|
#define CRYPTO_MAX_ATTRS 32
|
|
|
|
extern struct list_head crypto_alg_list;
|
|
extern struct rw_semaphore crypto_alg_sem;
|
|
extern struct blocking_notifier_head crypto_chain;
|
|
|
|
int alg_test(const char *driver, const char *alg, u32 type, u32 mask);
|
|
|
|
#if !IS_BUILTIN(CONFIG_CRYPTO_ALGAPI) || \
|
|
IS_ENABLED(CONFIG_CRYPTO_MANAGER_DISABLE_TESTS)
|
|
static inline bool crypto_boot_test_finished(void)
|
|
{
|
|
return true;
|
|
}
|
|
static inline void set_crypto_boot_test_finished(void)
|
|
{
|
|
}
|
|
#else
|
|
DECLARE_STATIC_KEY_FALSE(__crypto_boot_test_finished);
|
|
static inline bool crypto_boot_test_finished(void)
|
|
{
|
|
return static_branch_likely(&__crypto_boot_test_finished);
|
|
}
|
|
static inline void set_crypto_boot_test_finished(void)
|
|
{
|
|
static_branch_enable(&__crypto_boot_test_finished);
|
|
}
|
|
#endif /* !IS_BUILTIN(CONFIG_CRYPTO_ALGAPI) ||
|
|
* IS_ENABLED(CONFIG_CRYPTO_MANAGER_DISABLE_TESTS)
|
|
*/
|
|
|
|
#ifdef CONFIG_PROC_FS
|
|
void __init crypto_init_proc(void);
|
|
void __exit crypto_exit_proc(void);
|
|
#else
|
|
static inline void crypto_init_proc(void)
|
|
{ }
|
|
static inline void crypto_exit_proc(void)
|
|
{ }
|
|
#endif
|
|
|
|
static inline unsigned int crypto_cipher_ctxsize(struct crypto_alg *alg)
|
|
{
|
|
return alg->cra_ctxsize;
|
|
}
|
|
|
|
static inline unsigned int crypto_compress_ctxsize(struct crypto_alg *alg)
|
|
{
|
|
return alg->cra_ctxsize;
|
|
}
|
|
|
|
struct crypto_alg *crypto_mod_get(struct crypto_alg *alg);
|
|
struct crypto_alg *crypto_alg_mod_lookup(const char *name, u32 type, u32 mask);
|
|
|
|
struct crypto_larval *crypto_larval_alloc(const char *name, u32 type, u32 mask);
|
|
void crypto_schedule_test(struct crypto_larval *larval);
|
|
void crypto_alg_tested(const char *name, int err);
|
|
|
|
void crypto_remove_spawns(struct crypto_alg *alg, struct list_head *list,
|
|
struct crypto_alg *nalg);
|
|
void crypto_remove_final(struct list_head *list);
|
|
void crypto_shoot_alg(struct crypto_alg *alg);
|
|
struct crypto_tfm *__crypto_alloc_tfmgfp(struct crypto_alg *alg, u32 type,
|
|
u32 mask, gfp_t gfp);
|
|
struct crypto_tfm *__crypto_alloc_tfm(struct crypto_alg *alg, u32 type,
|
|
u32 mask);
|
|
void *crypto_create_tfm_node(struct crypto_alg *alg,
|
|
const struct crypto_type *frontend, int node);
|
|
void *crypto_clone_tfm(const struct crypto_type *frontend,
|
|
struct crypto_tfm *otfm);
|
|
|
|
static inline void *crypto_create_tfm(struct crypto_alg *alg,
|
|
const struct crypto_type *frontend)
|
|
{
|
|
return crypto_create_tfm_node(alg, frontend, NUMA_NO_NODE);
|
|
}
|
|
|
|
struct crypto_alg *crypto_find_alg(const char *alg_name,
|
|
const struct crypto_type *frontend,
|
|
u32 type, u32 mask);
|
|
|
|
void *crypto_alloc_tfm_node(const char *alg_name,
|
|
const struct crypto_type *frontend, u32 type, u32 mask,
|
|
int node);
|
|
|
|
static inline void *crypto_alloc_tfm(const char *alg_name,
|
|
const struct crypto_type *frontend, u32 type, u32 mask)
|
|
{
|
|
return crypto_alloc_tfm_node(alg_name, frontend, type, mask, NUMA_NO_NODE);
|
|
}
|
|
|
|
int crypto_probing_notify(unsigned long val, void *v);
|
|
|
|
unsigned int crypto_alg_extsize(struct crypto_alg *alg);
|
|
|
|
int crypto_type_has_alg(const char *name, const struct crypto_type *frontend,
|
|
u32 type, u32 mask);
|
|
|
|
static inline struct crypto_alg *crypto_alg_get(struct crypto_alg *alg)
|
|
{
|
|
refcount_inc(&alg->cra_refcnt);
|
|
return alg;
|
|
}
|
|
|
|
static inline void crypto_alg_put(struct crypto_alg *alg)
|
|
{
|
|
if (refcount_dec_and_test(&alg->cra_refcnt) && alg->cra_destroy)
|
|
alg->cra_destroy(alg);
|
|
}
|
|
|
|
static inline int crypto_tmpl_get(struct crypto_template *tmpl)
|
|
{
|
|
return try_module_get(tmpl->module);
|
|
}
|
|
|
|
static inline void crypto_tmpl_put(struct crypto_template *tmpl)
|
|
{
|
|
module_put(tmpl->module);
|
|
}
|
|
|
|
static inline int crypto_is_larval(struct crypto_alg *alg)
|
|
{
|
|
return alg->cra_flags & CRYPTO_ALG_LARVAL;
|
|
}
|
|
|
|
static inline int crypto_is_dead(struct crypto_alg *alg)
|
|
{
|
|
return alg->cra_flags & CRYPTO_ALG_DEAD;
|
|
}
|
|
|
|
static inline int crypto_is_moribund(struct crypto_alg *alg)
|
|
{
|
|
return alg->cra_flags & (CRYPTO_ALG_DEAD | CRYPTO_ALG_DYING);
|
|
}
|
|
|
|
static inline void crypto_notify(unsigned long val, void *v)
|
|
{
|
|
blocking_notifier_call_chain(&crypto_chain, val, v);
|
|
}
|
|
|
|
static inline void crypto_yield(u32 flags)
|
|
{
|
|
if (flags & CRYPTO_TFM_REQ_MAY_SLEEP)
|
|
cond_resched();
|
|
}
|
|
|
|
static inline int crypto_is_test_larval(struct crypto_larval *larval)
|
|
{
|
|
return larval->alg.cra_driver_name[0];
|
|
}
|
|
|
|
static inline struct crypto_tfm *crypto_tfm_get(struct crypto_tfm *tfm)
|
|
{
|
|
return refcount_inc_not_zero(&tfm->refcnt) ? tfm : ERR_PTR(-EOVERFLOW);
|
|
}
|
|
|
|
#endif /* _CRYPTO_INTERNAL_H */
|
|
|