tty: USB can now use the shutdown method for kref based freeing of ports
[linux-2.6/verdex.git] / crypto / algboss.c
blob9908dd830c2631041c3a681b3efae8b4eb687e39
1 /*
2 * Create default crypto algorithm instances.
4 * Copyright (c) 2006 Herbert Xu <herbert@gondor.apana.org.au>
6 * This program is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the Free
8 * Software Foundation; either version 2 of the License, or (at your option)
9 * any later version.
13 #include <crypto/internal/aead.h>
14 #include <linux/ctype.h>
15 #include <linux/err.h>
16 #include <linux/init.h>
17 #include <linux/kthread.h>
18 #include <linux/module.h>
19 #include <linux/notifier.h>
20 #include <linux/rtnetlink.h>
21 #include <linux/sched.h>
22 #include <linux/string.h>
24 #include "internal.h"
26 struct cryptomgr_param {
27 struct rtattr *tb[CRYPTO_MAX_ATTRS + 2];
29 struct {
30 struct rtattr attr;
31 struct crypto_attr_type data;
32 } type;
34 union {
35 struct rtattr attr;
36 struct {
37 struct rtattr attr;
38 struct crypto_attr_alg data;
39 } alg;
40 struct {
41 struct rtattr attr;
42 struct crypto_attr_u32 data;
43 } nu32;
44 } attrs[CRYPTO_MAX_ATTRS];
46 char larval[CRYPTO_MAX_ALG_NAME];
47 char template[CRYPTO_MAX_ALG_NAME];
49 u32 otype;
50 u32 omask;
53 struct crypto_test_param {
54 char driver[CRYPTO_MAX_ALG_NAME];
55 char alg[CRYPTO_MAX_ALG_NAME];
56 u32 type;
59 static int cryptomgr_probe(void *data)
61 struct cryptomgr_param *param = data;
62 struct crypto_template *tmpl;
63 struct crypto_instance *inst;
64 int err;
66 tmpl = crypto_lookup_template(param->template);
67 if (!tmpl)
68 goto err;
70 do {
71 inst = tmpl->alloc(param->tb);
72 if (IS_ERR(inst))
73 err = PTR_ERR(inst);
74 else if ((err = crypto_register_instance(tmpl, inst)))
75 tmpl->free(inst);
76 } while (err == -EAGAIN && !signal_pending(current));
78 crypto_tmpl_put(tmpl);
80 if (err)
81 goto err;
83 out:
84 kfree(param);
85 module_put_and_exit(0);
87 err:
88 crypto_larval_error(param->larval, param->otype, param->omask);
89 goto out;
92 static int cryptomgr_schedule_probe(struct crypto_larval *larval)
94 struct task_struct *thread;
95 struct cryptomgr_param *param;
96 const char *name = larval->alg.cra_name;
97 const char *p;
98 unsigned int len;
99 int i;
101 if (!try_module_get(THIS_MODULE))
102 goto err;
104 param = kzalloc(sizeof(*param), GFP_KERNEL);
105 if (!param)
106 goto err_put_module;
108 for (p = name; isalnum(*p) || *p == '-' || *p == '_'; p++)
111 len = p - name;
112 if (!len || *p != '(')
113 goto err_free_param;
115 memcpy(param->template, name, len);
117 i = 0;
118 for (;;) {
119 int notnum = 0;
121 name = ++p;
122 len = 0;
124 for (; isalnum(*p) || *p == '-' || *p == '_'; p++)
125 notnum |= !isdigit(*p);
127 if (*p == '(') {
128 int recursion = 0;
130 for (;;) {
131 if (!*++p)
132 goto err_free_param;
133 if (*p == '(')
134 recursion++;
135 else if (*p == ')' && !recursion--)
136 break;
139 notnum = 1;
140 p++;
143 len = p - name;
144 if (!len)
145 goto err_free_param;
147 if (notnum) {
148 param->attrs[i].alg.attr.rta_len =
149 sizeof(param->attrs[i].alg);
150 param->attrs[i].alg.attr.rta_type = CRYPTOA_ALG;
151 memcpy(param->attrs[i].alg.data.name, name, len);
152 } else {
153 param->attrs[i].nu32.attr.rta_len =
154 sizeof(param->attrs[i].nu32);
155 param->attrs[i].nu32.attr.rta_type = CRYPTOA_U32;
156 param->attrs[i].nu32.data.num =
157 simple_strtol(name, NULL, 0);
160 param->tb[i + 1] = &param->attrs[i].attr;
161 i++;
163 if (i >= CRYPTO_MAX_ATTRS)
164 goto err_free_param;
166 if (*p == ')')
167 break;
169 if (*p != ',')
170 goto err_free_param;
173 if (!i)
174 goto err_free_param;
176 param->tb[i + 1] = NULL;
178 param->type.attr.rta_len = sizeof(param->type);
179 param->type.attr.rta_type = CRYPTOA_TYPE;
180 param->type.data.type = larval->alg.cra_flags & ~CRYPTO_ALG_TESTED;
181 param->type.data.mask = larval->mask & ~CRYPTO_ALG_TESTED;
182 param->tb[0] = &param->type.attr;
184 param->otype = larval->alg.cra_flags;
185 param->omask = larval->mask;
187 memcpy(param->larval, larval->alg.cra_name, CRYPTO_MAX_ALG_NAME);
189 thread = kthread_run(cryptomgr_probe, param, "cryptomgr_probe");
190 if (IS_ERR(thread))
191 goto err_free_param;
193 return NOTIFY_STOP;
195 err_free_param:
196 kfree(param);
197 err_put_module:
198 module_put(THIS_MODULE);
199 err:
200 return NOTIFY_OK;
203 static int cryptomgr_test(void *data)
205 struct crypto_test_param *param = data;
206 u32 type = param->type;
207 int err = 0;
209 if (type & CRYPTO_ALG_TESTED)
210 goto skiptest;
212 err = alg_test(param->driver, param->alg, type, CRYPTO_ALG_TESTED);
214 skiptest:
215 crypto_alg_tested(param->driver, err);
217 kfree(param);
218 module_put_and_exit(0);
221 static int cryptomgr_schedule_test(struct crypto_alg *alg)
223 struct task_struct *thread;
224 struct crypto_test_param *param;
225 u32 type;
227 if (!try_module_get(THIS_MODULE))
228 goto err;
230 param = kzalloc(sizeof(*param), GFP_KERNEL);
231 if (!param)
232 goto err_put_module;
234 memcpy(param->driver, alg->cra_driver_name, sizeof(param->driver));
235 memcpy(param->alg, alg->cra_name, sizeof(param->alg));
236 type = alg->cra_flags;
238 /* This piece of crap needs to disappear into per-type test hooks. */
239 if ((!((type ^ CRYPTO_ALG_TYPE_BLKCIPHER) &
240 CRYPTO_ALG_TYPE_BLKCIPHER_MASK) && !(type & CRYPTO_ALG_GENIV) &&
241 ((alg->cra_flags & CRYPTO_ALG_TYPE_MASK) ==
242 CRYPTO_ALG_TYPE_BLKCIPHER ? alg->cra_blkcipher.ivsize :
243 alg->cra_ablkcipher.ivsize)) ||
244 (!((type ^ CRYPTO_ALG_TYPE_AEAD) & CRYPTO_ALG_TYPE_MASK) &&
245 alg->cra_type == &crypto_nivaead_type && alg->cra_aead.ivsize))
246 type |= CRYPTO_ALG_TESTED;
248 param->type = type;
250 thread = kthread_run(cryptomgr_test, param, "cryptomgr_test");
251 if (IS_ERR(thread))
252 goto err_free_param;
254 return NOTIFY_STOP;
256 err_free_param:
257 kfree(param);
258 err_put_module:
259 module_put(THIS_MODULE);
260 err:
261 return NOTIFY_OK;
264 static int cryptomgr_notify(struct notifier_block *this, unsigned long msg,
265 void *data)
267 switch (msg) {
268 case CRYPTO_MSG_ALG_REQUEST:
269 return cryptomgr_schedule_probe(data);
270 case CRYPTO_MSG_ALG_REGISTER:
271 return cryptomgr_schedule_test(data);
274 return NOTIFY_DONE;
277 static struct notifier_block cryptomgr_notifier = {
278 .notifier_call = cryptomgr_notify,
281 static int __init cryptomgr_init(void)
283 return crypto_register_notifier(&cryptomgr_notifier);
286 static void __exit cryptomgr_exit(void)
288 int err = crypto_unregister_notifier(&cryptomgr_notifier);
289 BUG_ON(err);
292 subsys_initcall(cryptomgr_init);
293 module_exit(cryptomgr_exit);
295 MODULE_LICENSE("GPL");
296 MODULE_DESCRIPTION("Crypto Algorithm Manager");