forked from mirrors/linux
		
	 6b34562f0c
			
		
	
	
		6b34562f0c
		
	
	
	
	
		
			
			A sig_alg backend has just been introduced and all asymmetric
sign/verify algorithms have been migrated to it.
The sign/verify operations can thus be dropped from akcipher_alg.
It is now purely for asymmetric encrypt/decrypt.
Move struct crypto_akcipher_sync_data from internal.h to akcipher.c and
unexport crypto_akcipher_sync_{prep,post}():  They're no longer used by
sig.c but only locally in akcipher.c.
In crypto_akcipher_sync_{prep,post}(), drop various NULL pointer checks
for data->dst as they were only necessary for the verify operation.
In the crypto_sig_*() API calls, remove the forks that were necessary
while algorithms were converted from crypto_akcipher to crypto_sig
one by one.
In struct akcipher_testvec, remove the "params", "param_len" and "algo"
elements as they were only needed for the ecrdsa verify operation.
Remove corresponding dead code from test_akcipher_one() as well.
Signed-off-by: Lukas Wunner <lukas@wunner.de>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
		
	
			
		
			
				
	
	
		
			203 lines
		
	
	
	
		
			5.2 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			203 lines
		
	
	
	
		
			5.2 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /* SPDX-License-Identifier: GPL-2.0-or-later */
 | |
| /*
 | |
|  * Cryptographic API.
 | |
|  *
 | |
|  * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
 | |
|  * Copyright (c) 2005 Herbert Xu <herbert@gondor.apana.org.au>
 | |
|  */
 | |
| #ifndef _CRYPTO_INTERNAL_H
 | |
| #define _CRYPTO_INTERNAL_H
 | |
| 
 | |
| #include <crypto/algapi.h>
 | |
| #include <linux/completion.h>
 | |
| #include <linux/err.h>
 | |
| #include <linux/jump_label.h>
 | |
| #include <linux/list.h>
 | |
| #include <linux/module.h>
 | |
| #include <linux/notifier.h>
 | |
| #include <linux/numa.h>
 | |
| #include <linux/refcount.h>
 | |
| #include <linux/rwsem.h>
 | |
| #include <linux/scatterlist.h>
 | |
| #include <linux/sched.h>
 | |
| #include <linux/types.h>
 | |
| 
 | |
| struct crypto_instance;
 | |
| struct crypto_template;
 | |
| 
 | |
| struct crypto_larval {
 | |
| 	struct crypto_alg alg;
 | |
| 	struct crypto_alg *adult;
 | |
| 	struct completion completion;
 | |
| 	u32 mask;
 | |
| 	bool test_started;
 | |
| };
 | |
| 
 | |
| enum {
 | |
| 	CRYPTOA_UNSPEC,
 | |
| 	CRYPTOA_ALG,
 | |
| 	CRYPTOA_TYPE,
 | |
| 	__CRYPTOA_MAX,
 | |
| };
 | |
| 
 | |
| #define CRYPTOA_MAX (__CRYPTOA_MAX - 1)
 | |
| 
 | |
| /* Maximum number of (rtattr) parameters for each template. */
 | |
| #define CRYPTO_MAX_ATTRS 32
 | |
| 
 | |
| extern struct list_head crypto_alg_list;
 | |
| extern struct rw_semaphore crypto_alg_sem;
 | |
| extern struct blocking_notifier_head crypto_chain;
 | |
| 
 | |
| int alg_test(const char *driver, const char *alg, u32 type, u32 mask);
 | |
| 
 | |
| #if !IS_BUILTIN(CONFIG_CRYPTO_ALGAPI) || \
 | |
|     IS_ENABLED(CONFIG_CRYPTO_MANAGER_DISABLE_TESTS)
 | |
| static inline bool crypto_boot_test_finished(void)
 | |
| {
 | |
| 	return true;
 | |
| }
 | |
| static inline void set_crypto_boot_test_finished(void)
 | |
| {
 | |
| }
 | |
| #else
 | |
| DECLARE_STATIC_KEY_FALSE(__crypto_boot_test_finished);
 | |
| static inline bool crypto_boot_test_finished(void)
 | |
| {
 | |
| 	return static_branch_likely(&__crypto_boot_test_finished);
 | |
| }
 | |
| static inline void set_crypto_boot_test_finished(void)
 | |
| {
 | |
| 	static_branch_enable(&__crypto_boot_test_finished);
 | |
| }
 | |
| #endif /* !IS_BUILTIN(CONFIG_CRYPTO_ALGAPI) ||
 | |
| 	* IS_ENABLED(CONFIG_CRYPTO_MANAGER_DISABLE_TESTS)
 | |
| 	*/
 | |
| 
 | |
| #ifdef CONFIG_PROC_FS
 | |
| void __init crypto_init_proc(void);
 | |
| void __exit crypto_exit_proc(void);
 | |
| #else
 | |
| static inline void crypto_init_proc(void)
 | |
| { }
 | |
| static inline void crypto_exit_proc(void)
 | |
| { }
 | |
| #endif
 | |
| 
 | |
| static inline unsigned int crypto_cipher_ctxsize(struct crypto_alg *alg)
 | |
| {
 | |
| 	return alg->cra_ctxsize;
 | |
| }
 | |
| 
 | |
| static inline unsigned int crypto_compress_ctxsize(struct crypto_alg *alg)
 | |
| {
 | |
| 	return alg->cra_ctxsize;
 | |
| }
 | |
| 
 | |
| struct crypto_alg *crypto_mod_get(struct crypto_alg *alg);
 | |
| struct crypto_alg *crypto_alg_mod_lookup(const char *name, u32 type, u32 mask);
 | |
| 
 | |
| struct crypto_larval *crypto_larval_alloc(const char *name, u32 type, u32 mask);
 | |
| void crypto_schedule_test(struct crypto_larval *larval);
 | |
| void crypto_alg_tested(const char *name, int err);
 | |
| 
 | |
| void crypto_remove_spawns(struct crypto_alg *alg, struct list_head *list,
 | |
| 			  struct crypto_alg *nalg);
 | |
| void crypto_remove_final(struct list_head *list);
 | |
| void crypto_shoot_alg(struct crypto_alg *alg);
 | |
| struct crypto_tfm *__crypto_alloc_tfmgfp(struct crypto_alg *alg, u32 type,
 | |
| 					 u32 mask, gfp_t gfp);
 | |
| struct crypto_tfm *__crypto_alloc_tfm(struct crypto_alg *alg, u32 type,
 | |
| 				      u32 mask);
 | |
| void *crypto_create_tfm_node(struct crypto_alg *alg,
 | |
| 			const struct crypto_type *frontend, int node);
 | |
| void *crypto_clone_tfm(const struct crypto_type *frontend,
 | |
| 		       struct crypto_tfm *otfm);
 | |
| 
 | |
| static inline void *crypto_create_tfm(struct crypto_alg *alg,
 | |
| 			const struct crypto_type *frontend)
 | |
| {
 | |
| 	return crypto_create_tfm_node(alg, frontend, NUMA_NO_NODE);
 | |
| }
 | |
| 
 | |
| struct crypto_alg *crypto_find_alg(const char *alg_name,
 | |
| 				   const struct crypto_type *frontend,
 | |
| 				   u32 type, u32 mask);
 | |
| 
 | |
| void *crypto_alloc_tfm_node(const char *alg_name,
 | |
| 		       const struct crypto_type *frontend, u32 type, u32 mask,
 | |
| 		       int node);
 | |
| 
 | |
| static inline void *crypto_alloc_tfm(const char *alg_name,
 | |
| 		       const struct crypto_type *frontend, u32 type, u32 mask)
 | |
| {
 | |
| 	return crypto_alloc_tfm_node(alg_name, frontend, type, mask, NUMA_NO_NODE);
 | |
| }
 | |
| 
 | |
| int crypto_probing_notify(unsigned long val, void *v);
 | |
| 
 | |
| unsigned int crypto_alg_extsize(struct crypto_alg *alg);
 | |
| 
 | |
| int crypto_type_has_alg(const char *name, const struct crypto_type *frontend,
 | |
| 			u32 type, u32 mask);
 | |
| 
 | |
| static inline struct crypto_alg *crypto_alg_get(struct crypto_alg *alg)
 | |
| {
 | |
| 	refcount_inc(&alg->cra_refcnt);
 | |
| 	return alg;
 | |
| }
 | |
| 
 | |
| static inline void crypto_alg_put(struct crypto_alg *alg)
 | |
| {
 | |
| 	if (refcount_dec_and_test(&alg->cra_refcnt) && alg->cra_destroy)
 | |
| 		alg->cra_destroy(alg);
 | |
| }
 | |
| 
 | |
| static inline int crypto_tmpl_get(struct crypto_template *tmpl)
 | |
| {
 | |
| 	return try_module_get(tmpl->module);
 | |
| }
 | |
| 
 | |
| static inline void crypto_tmpl_put(struct crypto_template *tmpl)
 | |
| {
 | |
| 	module_put(tmpl->module);
 | |
| }
 | |
| 
 | |
| static inline int crypto_is_larval(struct crypto_alg *alg)
 | |
| {
 | |
| 	return alg->cra_flags & CRYPTO_ALG_LARVAL;
 | |
| }
 | |
| 
 | |
| static inline int crypto_is_dead(struct crypto_alg *alg)
 | |
| {
 | |
| 	return alg->cra_flags & CRYPTO_ALG_DEAD;
 | |
| }
 | |
| 
 | |
| static inline int crypto_is_moribund(struct crypto_alg *alg)
 | |
| {
 | |
| 	return alg->cra_flags & (CRYPTO_ALG_DEAD | CRYPTO_ALG_DYING);
 | |
| }
 | |
| 
 | |
| static inline void crypto_notify(unsigned long val, void *v)
 | |
| {
 | |
| 	blocking_notifier_call_chain(&crypto_chain, val, v);
 | |
| }
 | |
| 
 | |
| static inline void crypto_yield(u32 flags)
 | |
| {
 | |
| 	if (flags & CRYPTO_TFM_REQ_MAY_SLEEP)
 | |
| 		cond_resched();
 | |
| }
 | |
| 
 | |
| static inline int crypto_is_test_larval(struct crypto_larval *larval)
 | |
| {
 | |
| 	return larval->alg.cra_driver_name[0];
 | |
| }
 | |
| 
 | |
| static inline struct crypto_tfm *crypto_tfm_get(struct crypto_tfm *tfm)
 | |
| {
 | |
| 	return refcount_inc_not_zero(&tfm->refcnt) ? tfm : ERR_PTR(-EOVERFLOW);
 | |
| }
 | |
| 
 | |
| #endif	/* _CRYPTO_INTERNAL_H */
 | |
| 
 |