[XFRM]: fix incorrect xfrm_state_afinfo_lock use
[linux-2.6/btrfs-unstable.git] / net / xfrm / xfrm_algo.c
blob6ed3302312fb56f0ebb2784b9990df6dca740865
1 /*
2 * xfrm algorithm interface
4 * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
6 * This program is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the Free
8 * Software Foundation; either version 2 of the License, or (at your option)
9 * any later version.
12 #include <linux/config.h>
13 #include <linux/module.h>
14 #include <linux/kernel.h>
15 #include <linux/pfkeyv2.h>
16 #include <linux/crypto.h>
17 #include <net/xfrm.h>
18 #if defined(CONFIG_INET_AH) || defined(CONFIG_INET_AH_MODULE) || defined(CONFIG_INET6_AH) || defined(CONFIG_INET6_AH_MODULE)
19 #include <net/ah.h>
20 #endif
21 #if defined(CONFIG_INET_ESP) || defined(CONFIG_INET_ESP_MODULE) || defined(CONFIG_INET6_ESP) || defined(CONFIG_INET6_ESP_MODULE)
22 #include <net/esp.h>
23 #endif
24 #include <asm/scatterlist.h>
27 * Algorithms supported by IPsec. These entries contain properties which
28 * are used in key negotiation and xfrm processing, and are used to verify
29 * that instantiated crypto transforms have correct parameters for IPsec
30 * purposes.
32 static struct xfrm_algo_desc aalg_list[] = {
34 .name = "digest_null",
36 .uinfo = {
37 .auth = {
38 .icv_truncbits = 0,
39 .icv_fullbits = 0,
43 .desc = {
44 .sadb_alg_id = SADB_X_AALG_NULL,
45 .sadb_alg_ivlen = 0,
46 .sadb_alg_minbits = 0,
47 .sadb_alg_maxbits = 0
51 .name = "md5",
53 .uinfo = {
54 .auth = {
55 .icv_truncbits = 96,
56 .icv_fullbits = 128,
60 .desc = {
61 .sadb_alg_id = SADB_AALG_MD5HMAC,
62 .sadb_alg_ivlen = 0,
63 .sadb_alg_minbits = 128,
64 .sadb_alg_maxbits = 128
68 .name = "sha1",
70 .uinfo = {
71 .auth = {
72 .icv_truncbits = 96,
73 .icv_fullbits = 160,
77 .desc = {
78 .sadb_alg_id = SADB_AALG_SHA1HMAC,
79 .sadb_alg_ivlen = 0,
80 .sadb_alg_minbits = 160,
81 .sadb_alg_maxbits = 160
85 .name = "sha256",
87 .uinfo = {
88 .auth = {
89 .icv_truncbits = 96,
90 .icv_fullbits = 256,
94 .desc = {
95 .sadb_alg_id = SADB_X_AALG_SHA2_256HMAC,
96 .sadb_alg_ivlen = 0,
97 .sadb_alg_minbits = 256,
98 .sadb_alg_maxbits = 256
102 .name = "ripemd160",
104 .uinfo = {
105 .auth = {
106 .icv_truncbits = 96,
107 .icv_fullbits = 160,
111 .desc = {
112 .sadb_alg_id = SADB_X_AALG_RIPEMD160HMAC,
113 .sadb_alg_ivlen = 0,
114 .sadb_alg_minbits = 160,
115 .sadb_alg_maxbits = 160
120 static struct xfrm_algo_desc ealg_list[] = {
122 .name = "cipher_null",
124 .uinfo = {
125 .encr = {
126 .blockbits = 8,
127 .defkeybits = 0,
131 .desc = {
132 .sadb_alg_id = SADB_EALG_NULL,
133 .sadb_alg_ivlen = 0,
134 .sadb_alg_minbits = 0,
135 .sadb_alg_maxbits = 0
139 .name = "des",
141 .uinfo = {
142 .encr = {
143 .blockbits = 64,
144 .defkeybits = 64,
148 .desc = {
149 .sadb_alg_id = SADB_EALG_DESCBC,
150 .sadb_alg_ivlen = 8,
151 .sadb_alg_minbits = 64,
152 .sadb_alg_maxbits = 64
156 .name = "des3_ede",
158 .uinfo = {
159 .encr = {
160 .blockbits = 64,
161 .defkeybits = 192,
165 .desc = {
166 .sadb_alg_id = SADB_EALG_3DESCBC,
167 .sadb_alg_ivlen = 8,
168 .sadb_alg_minbits = 192,
169 .sadb_alg_maxbits = 192
173 .name = "cast128",
175 .uinfo = {
176 .encr = {
177 .blockbits = 64,
178 .defkeybits = 128,
182 .desc = {
183 .sadb_alg_id = SADB_X_EALG_CASTCBC,
184 .sadb_alg_ivlen = 8,
185 .sadb_alg_minbits = 40,
186 .sadb_alg_maxbits = 128
190 .name = "blowfish",
192 .uinfo = {
193 .encr = {
194 .blockbits = 64,
195 .defkeybits = 128,
199 .desc = {
200 .sadb_alg_id = SADB_X_EALG_BLOWFISHCBC,
201 .sadb_alg_ivlen = 8,
202 .sadb_alg_minbits = 40,
203 .sadb_alg_maxbits = 448
207 .name = "aes",
209 .uinfo = {
210 .encr = {
211 .blockbits = 128,
212 .defkeybits = 128,
216 .desc = {
217 .sadb_alg_id = SADB_X_EALG_AESCBC,
218 .sadb_alg_ivlen = 8,
219 .sadb_alg_minbits = 128,
220 .sadb_alg_maxbits = 256
224 .name = "serpent",
226 .uinfo = {
227 .encr = {
228 .blockbits = 128,
229 .defkeybits = 128,
233 .desc = {
234 .sadb_alg_id = SADB_X_EALG_SERPENTCBC,
235 .sadb_alg_ivlen = 8,
236 .sadb_alg_minbits = 128,
237 .sadb_alg_maxbits = 256,
241 .name = "twofish",
243 .uinfo = {
244 .encr = {
245 .blockbits = 128,
246 .defkeybits = 128,
250 .desc = {
251 .sadb_alg_id = SADB_X_EALG_TWOFISHCBC,
252 .sadb_alg_ivlen = 8,
253 .sadb_alg_minbits = 128,
254 .sadb_alg_maxbits = 256
259 static struct xfrm_algo_desc calg_list[] = {
261 .name = "deflate",
262 .uinfo = {
263 .comp = {
264 .threshold = 90,
267 .desc = { .sadb_alg_id = SADB_X_CALG_DEFLATE }
270 .name = "lzs",
271 .uinfo = {
272 .comp = {
273 .threshold = 90,
276 .desc = { .sadb_alg_id = SADB_X_CALG_LZS }
279 .name = "lzjh",
280 .uinfo = {
281 .comp = {
282 .threshold = 50,
285 .desc = { .sadb_alg_id = SADB_X_CALG_LZJH }
289 static inline int aalg_entries(void)
291 return ARRAY_SIZE(aalg_list);
294 static inline int ealg_entries(void)
296 return ARRAY_SIZE(ealg_list);
299 static inline int calg_entries(void)
301 return ARRAY_SIZE(calg_list);
304 /* Todo: generic iterators */
305 struct xfrm_algo_desc *xfrm_aalg_get_byid(int alg_id)
307 int i;
309 for (i = 0; i < aalg_entries(); i++) {
310 if (aalg_list[i].desc.sadb_alg_id == alg_id) {
311 if (aalg_list[i].available)
312 return &aalg_list[i];
313 else
314 break;
317 return NULL;
319 EXPORT_SYMBOL_GPL(xfrm_aalg_get_byid);
321 struct xfrm_algo_desc *xfrm_ealg_get_byid(int alg_id)
323 int i;
325 for (i = 0; i < ealg_entries(); i++) {
326 if (ealg_list[i].desc.sadb_alg_id == alg_id) {
327 if (ealg_list[i].available)
328 return &ealg_list[i];
329 else
330 break;
333 return NULL;
335 EXPORT_SYMBOL_GPL(xfrm_ealg_get_byid);
337 struct xfrm_algo_desc *xfrm_calg_get_byid(int alg_id)
339 int i;
341 for (i = 0; i < calg_entries(); i++) {
342 if (calg_list[i].desc.sadb_alg_id == alg_id) {
343 if (calg_list[i].available)
344 return &calg_list[i];
345 else
346 break;
349 return NULL;
351 EXPORT_SYMBOL_GPL(xfrm_calg_get_byid);
353 static struct xfrm_algo_desc *xfrm_get_byname(struct xfrm_algo_desc *list,
354 int entries, char *name,
355 int probe)
357 int i, status;
359 if (!name)
360 return NULL;
362 for (i = 0; i < entries; i++) {
363 if (strcmp(name, list[i].name))
364 continue;
366 if (list[i].available)
367 return &list[i];
369 if (!probe)
370 break;
372 status = crypto_alg_available(name, 0);
373 if (!status)
374 break;
376 list[i].available = status;
377 return &list[i];
379 return NULL;
382 struct xfrm_algo_desc *xfrm_aalg_get_byname(char *name, int probe)
384 return xfrm_get_byname(aalg_list, aalg_entries(), name, probe);
386 EXPORT_SYMBOL_GPL(xfrm_aalg_get_byname);
388 struct xfrm_algo_desc *xfrm_ealg_get_byname(char *name, int probe)
390 return xfrm_get_byname(ealg_list, ealg_entries(), name, probe);
392 EXPORT_SYMBOL_GPL(xfrm_ealg_get_byname);
394 struct xfrm_algo_desc *xfrm_calg_get_byname(char *name, int probe)
396 return xfrm_get_byname(calg_list, calg_entries(), name, probe);
398 EXPORT_SYMBOL_GPL(xfrm_calg_get_byname);
400 struct xfrm_algo_desc *xfrm_aalg_get_byidx(unsigned int idx)
402 if (idx >= aalg_entries())
403 return NULL;
405 return &aalg_list[idx];
407 EXPORT_SYMBOL_GPL(xfrm_aalg_get_byidx);
409 struct xfrm_algo_desc *xfrm_ealg_get_byidx(unsigned int idx)
411 if (idx >= ealg_entries())
412 return NULL;
414 return &ealg_list[idx];
416 EXPORT_SYMBOL_GPL(xfrm_ealg_get_byidx);
419 * Probe for the availability of crypto algorithms, and set the available
420 * flag for any algorithms found on the system. This is typically called by
421 * pfkey during userspace SA add, update or register.
423 void xfrm_probe_algs(void)
425 #ifdef CONFIG_CRYPTO
426 int i, status;
428 BUG_ON(in_softirq());
430 for (i = 0; i < aalg_entries(); i++) {
431 status = crypto_alg_available(aalg_list[i].name, 0);
432 if (aalg_list[i].available != status)
433 aalg_list[i].available = status;
436 for (i = 0; i < ealg_entries(); i++) {
437 status = crypto_alg_available(ealg_list[i].name, 0);
438 if (ealg_list[i].available != status)
439 ealg_list[i].available = status;
442 for (i = 0; i < calg_entries(); i++) {
443 status = crypto_alg_available(calg_list[i].name, 0);
444 if (calg_list[i].available != status)
445 calg_list[i].available = status;
447 #endif
449 EXPORT_SYMBOL_GPL(xfrm_probe_algs);
451 int xfrm_count_auth_supported(void)
453 int i, n;
455 for (i = 0, n = 0; i < aalg_entries(); i++)
456 if (aalg_list[i].available)
457 n++;
458 return n;
460 EXPORT_SYMBOL_GPL(xfrm_count_auth_supported);
462 int xfrm_count_enc_supported(void)
464 int i, n;
466 for (i = 0, n = 0; i < ealg_entries(); i++)
467 if (ealg_list[i].available)
468 n++;
469 return n;
471 EXPORT_SYMBOL_GPL(xfrm_count_enc_supported);
473 /* Move to common area: it is shared with AH. */
475 void skb_icv_walk(const struct sk_buff *skb, struct crypto_tfm *tfm,
476 int offset, int len, icv_update_fn_t icv_update)
478 int start = skb_headlen(skb);
479 int i, copy = start - offset;
480 struct scatterlist sg;
482 /* Checksum header. */
483 if (copy > 0) {
484 if (copy > len)
485 copy = len;
487 sg.page = virt_to_page(skb->data + offset);
488 sg.offset = (unsigned long)(skb->data + offset) % PAGE_SIZE;
489 sg.length = copy;
491 icv_update(tfm, &sg, 1);
493 if ((len -= copy) == 0)
494 return;
495 offset += copy;
498 for (i = 0; i < skb_shinfo(skb)->nr_frags; i++) {
499 int end;
501 BUG_TRAP(start <= offset + len);
503 end = start + skb_shinfo(skb)->frags[i].size;
504 if ((copy = end - offset) > 0) {
505 skb_frag_t *frag = &skb_shinfo(skb)->frags[i];
507 if (copy > len)
508 copy = len;
510 sg.page = frag->page;
511 sg.offset = frag->page_offset + offset-start;
512 sg.length = copy;
514 icv_update(tfm, &sg, 1);
516 if (!(len -= copy))
517 return;
518 offset += copy;
520 start = end;
523 if (skb_shinfo(skb)->frag_list) {
524 struct sk_buff *list = skb_shinfo(skb)->frag_list;
526 for (; list; list = list->next) {
527 int end;
529 BUG_TRAP(start <= offset + len);
531 end = start + list->len;
532 if ((copy = end - offset) > 0) {
533 if (copy > len)
534 copy = len;
535 skb_icv_walk(list, tfm, offset-start, copy, icv_update);
536 if ((len -= copy) == 0)
537 return;
538 offset += copy;
540 start = end;
543 BUG_ON(len);
545 EXPORT_SYMBOL_GPL(skb_icv_walk);
547 #if defined(CONFIG_INET_ESP) || defined(CONFIG_INET_ESP_MODULE) || defined(CONFIG_INET6_ESP) || defined(CONFIG_INET6_ESP_MODULE)
549 /* Looking generic it is not used in another places. */
552 skb_to_sgvec(struct sk_buff *skb, struct scatterlist *sg, int offset, int len)
554 int start = skb_headlen(skb);
555 int i, copy = start - offset;
556 int elt = 0;
558 if (copy > 0) {
559 if (copy > len)
560 copy = len;
561 sg[elt].page = virt_to_page(skb->data + offset);
562 sg[elt].offset = (unsigned long)(skb->data + offset) % PAGE_SIZE;
563 sg[elt].length = copy;
564 elt++;
565 if ((len -= copy) == 0)
566 return elt;
567 offset += copy;
570 for (i = 0; i < skb_shinfo(skb)->nr_frags; i++) {
571 int end;
573 BUG_TRAP(start <= offset + len);
575 end = start + skb_shinfo(skb)->frags[i].size;
576 if ((copy = end - offset) > 0) {
577 skb_frag_t *frag = &skb_shinfo(skb)->frags[i];
579 if (copy > len)
580 copy = len;
581 sg[elt].page = frag->page;
582 sg[elt].offset = frag->page_offset+offset-start;
583 sg[elt].length = copy;
584 elt++;
585 if (!(len -= copy))
586 return elt;
587 offset += copy;
589 start = end;
592 if (skb_shinfo(skb)->frag_list) {
593 struct sk_buff *list = skb_shinfo(skb)->frag_list;
595 for (; list; list = list->next) {
596 int end;
598 BUG_TRAP(start <= offset + len);
600 end = start + list->len;
601 if ((copy = end - offset) > 0) {
602 if (copy > len)
603 copy = len;
604 elt += skb_to_sgvec(list, sg+elt, offset - start, copy);
605 if ((len -= copy) == 0)
606 return elt;
607 offset += copy;
609 start = end;
612 BUG_ON(len);
613 return elt;
615 EXPORT_SYMBOL_GPL(skb_to_sgvec);
617 /* Check that skb data bits are writable. If they are not, copy data
618 * to newly created private area. If "tailbits" is given, make sure that
619 * tailbits bytes beyond current end of skb are writable.
621 * Returns amount of elements of scatterlist to load for subsequent
622 * transformations and pointer to writable trailer skb.
625 int skb_cow_data(struct sk_buff *skb, int tailbits, struct sk_buff **trailer)
627 int copyflag;
628 int elt;
629 struct sk_buff *skb1, **skb_p;
631 /* If skb is cloned or its head is paged, reallocate
632 * head pulling out all the pages (pages are considered not writable
633 * at the moment even if they are anonymous).
635 if ((skb_cloned(skb) || skb_shinfo(skb)->nr_frags) &&
636 __pskb_pull_tail(skb, skb_pagelen(skb)-skb_headlen(skb)) == NULL)
637 return -ENOMEM;
639 /* Easy case. Most of packets will go this way. */
640 if (!skb_shinfo(skb)->frag_list) {
641 /* A little of trouble, not enough of space for trailer.
642 * This should not happen, when stack is tuned to generate
643 * good frames. OK, on miss we reallocate and reserve even more
644 * space, 128 bytes is fair. */
646 if (skb_tailroom(skb) < tailbits &&
647 pskb_expand_head(skb, 0, tailbits-skb_tailroom(skb)+128, GFP_ATOMIC))
648 return -ENOMEM;
650 /* Voila! */
651 *trailer = skb;
652 return 1;
655 /* Misery. We are in troubles, going to mincer fragments... */
657 elt = 1;
658 skb_p = &skb_shinfo(skb)->frag_list;
659 copyflag = 0;
661 while ((skb1 = *skb_p) != NULL) {
662 int ntail = 0;
664 /* The fragment is partially pulled by someone,
665 * this can happen on input. Copy it and everything
666 * after it. */
668 if (skb_shared(skb1))
669 copyflag = 1;
671 /* If the skb is the last, worry about trailer. */
673 if (skb1->next == NULL && tailbits) {
674 if (skb_shinfo(skb1)->nr_frags ||
675 skb_shinfo(skb1)->frag_list ||
676 skb_tailroom(skb1) < tailbits)
677 ntail = tailbits + 128;
680 if (copyflag ||
681 skb_cloned(skb1) ||
682 ntail ||
683 skb_shinfo(skb1)->nr_frags ||
684 skb_shinfo(skb1)->frag_list) {
685 struct sk_buff *skb2;
687 /* Fuck, we are miserable poor guys... */
688 if (ntail == 0)
689 skb2 = skb_copy(skb1, GFP_ATOMIC);
690 else
691 skb2 = skb_copy_expand(skb1,
692 skb_headroom(skb1),
693 ntail,
694 GFP_ATOMIC);
695 if (unlikely(skb2 == NULL))
696 return -ENOMEM;
698 if (skb1->sk)
699 skb_set_owner_w(skb2, skb1->sk);
701 /* Looking around. Are we still alive?
702 * OK, link new skb, drop old one */
704 skb2->next = skb1->next;
705 *skb_p = skb2;
706 kfree_skb(skb1);
707 skb1 = skb2;
709 elt++;
710 *trailer = skb1;
711 skb_p = &skb1->next;
714 return elt;
716 EXPORT_SYMBOL_GPL(skb_cow_data);
718 void *pskb_put(struct sk_buff *skb, struct sk_buff *tail, int len)
720 if (tail != skb) {
721 skb->data_len += len;
722 skb->len += len;
724 return skb_put(tail, len);
726 EXPORT_SYMBOL_GPL(pskb_put);
727 #endif