Blame view
crypto/rng.c
4.74 KB
2874c5fd2 treewide: Replace... |
1 |
// SPDX-License-Identifier: GPL-2.0-or-later |
17f0f4a47 crypto: rng - RNG... |
2 3 4 5 6 7 |
/* * Cryptographic API. * * RNG operations. * * Copyright (c) 2008 Neil Horman <nhorman@tuxdriver.com> |
94f1bb15b crypto: rng - Rem... |
8 |
* Copyright (c) 2015 Herbert Xu <herbert@gondor.apana.org.au> |
17f0f4a47 crypto: rng - RNG... |
9 |
*/ |
60063497a atomic: use <linu... |
10 |
#include <linux/atomic.h> |
17f0f4a47 crypto: rng - RNG... |
11 12 13 14 15 16 |
#include <crypto/internal/rng.h> #include <linux/err.h> #include <linux/module.h> #include <linux/mutex.h> #include <linux/random.h> #include <linux/seq_file.h> |
5a0e3ad6a include cleanup: ... |
17 |
#include <linux/slab.h> |
17f0f4a47 crypto: rng - RNG... |
18 |
#include <linux/string.h> |
792608e9c crypto: Add users... |
19 |
#include <linux/cryptouser.h> |
d8c34b949 crypto: Replaced ... |
20 |
#include <linux/compiler.h> |
792608e9c crypto: Add users... |
21 |
#include <net/netlink.h> |
17f0f4a47 crypto: rng - RNG... |
22 |
|
d0e83059a crypto: rng - Con... |
23 |
#include "internal.h" |
17f0f4a47 crypto: rng - RNG... |
24 25 26 27 |
static DEFINE_MUTEX(crypto_default_rng_lock); struct crypto_rng *crypto_default_rng; EXPORT_SYMBOL_GPL(crypto_default_rng); static int crypto_default_rng_refcnt; |
3c5d8fa9f crypto: rng - Mar... |
28 |
int crypto_rng_reset(struct crypto_rng *tfm, const u8 *seed, unsigned int slen) |
17f0f4a47 crypto: rng - RNG... |
29 |
{ |
f7d76e05d crypto: user - fi... |
30 |
struct crypto_alg *alg = tfm->base.__crt_alg; |
17f0f4a47 crypto: rng - RNG... |
31 32 33 34 35 |
u8 *buf = NULL; int err; if (!seed && slen) { buf = kmalloc(slen, GFP_KERNEL); |
30d0f6a95 crypto: rng - fix... |
36 |
if (!buf) |
17f0f4a47 crypto: rng - RNG... |
37 |
return -ENOMEM; |
c2176f009 crypto: rng - ens... |
38 |
err = get_random_bytes_wait(buf, slen); |
30d0f6a95 crypto: rng - fix... |
39 |
if (err) |
c2176f009 crypto: rng - ens... |
40 |
goto out; |
17f0f4a47 crypto: rng - RNG... |
41 42 |
seed = buf; } |
30d0f6a95 crypto: rng - fix... |
43 |
crypto_stats_get(alg); |
94f1bb15b crypto: rng - Rem... |
44 |
err = crypto_rng_alg(tfm)->seed(tfm, seed, slen); |
f7d76e05d crypto: user - fi... |
45 |
crypto_stats_rng_seed(alg, err); |
c2176f009 crypto: rng - ens... |
46 |
out: |
453431a54 mm, treewide: ren... |
47 |
kfree_sensitive(buf); |
17f0f4a47 crypto: rng - RNG... |
48 49 |
return err; } |
3c5d8fa9f crypto: rng - Mar... |
50 |
EXPORT_SYMBOL_GPL(crypto_rng_reset); |
17f0f4a47 crypto: rng - RNG... |
51 |
|
d0e83059a crypto: rng - Con... |
52 |
static int crypto_rng_init_tfm(struct crypto_tfm *tfm) |
17f0f4a47 crypto: rng - RNG... |
53 |
{ |
17f0f4a47 crypto: rng - RNG... |
54 55 |
return 0; } |
acec27ff3 crypto: rng - Con... |
56 57 58 |
static unsigned int seedsize(struct crypto_alg *alg) { struct rng_alg *ralg = container_of(alg, struct rng_alg, base); |
94f1bb15b crypto: rng - Rem... |
59 |
return ralg->seedsize; |
acec27ff3 crypto: rng - Con... |
60 |
} |
3acc84739 crypto: algapi - ... |
61 |
#ifdef CONFIG_NET |
792608e9c crypto: Add users... |
62 63 64 |
static int crypto_rng_report(struct sk_buff *skb, struct crypto_alg *alg) { struct crypto_report_rng rrng; |
37db69e0b crypto: user - cl... |
65 |
memset(&rrng, 0, sizeof(rrng)); |
792608e9c crypto: Add users... |
66 |
|
37db69e0b crypto: user - cl... |
67 |
strscpy(rrng.type, "rng", sizeof(rrng.type)); |
792608e9c crypto: Add users... |
68 |
|
37db69e0b crypto: user - cl... |
69 |
rrng.seedsize = seedsize(alg); |
792608e9c crypto: Add users... |
70 |
|
37db69e0b crypto: user - cl... |
71 |
return nla_put(skb, CRYPTOCFGA_REPORT_RNG, sizeof(rrng), &rrng); |
792608e9c crypto: Add users... |
72 |
} |
3acc84739 crypto: algapi - ... |
73 74 75 76 77 78 |
#else static int crypto_rng_report(struct sk_buff *skb, struct crypto_alg *alg) { return -ENOSYS; } #endif |
792608e9c crypto: Add users... |
79 |
|
17f0f4a47 crypto: rng - RNG... |
80 |
static void crypto_rng_show(struct seq_file *m, struct crypto_alg *alg) |
d8c34b949 crypto: Replaced ... |
81 |
__maybe_unused; |
17f0f4a47 crypto: rng - RNG... |
82 83 84 85 |
static void crypto_rng_show(struct seq_file *m, struct crypto_alg *alg) { seq_printf(m, "type : rng "); |
acec27ff3 crypto: rng - Con... |
86 87 |
seq_printf(m, "seedsize : %u ", seedsize(alg)); |
17f0f4a47 crypto: rng - RNG... |
88 |
} |
94f1bb15b crypto: rng - Rem... |
89 |
static const struct crypto_type crypto_rng_type = { |
d0e83059a crypto: rng - Con... |
90 91 |
.extsize = crypto_alg_extsize, .init_tfm = crypto_rng_init_tfm, |
17f0f4a47 crypto: rng - RNG... |
92 93 94 |
#ifdef CONFIG_PROC_FS .show = crypto_rng_show, #endif |
792608e9c crypto: Add users... |
95 |
.report = crypto_rng_report, |
d0e83059a crypto: rng - Con... |
96 97 98 99 |
.maskclear = ~CRYPTO_ALG_TYPE_MASK, .maskset = CRYPTO_ALG_TYPE_MASK, .type = CRYPTO_ALG_TYPE_RNG, .tfmsize = offsetof(struct crypto_rng, base), |
17f0f4a47 crypto: rng - RNG... |
100 |
}; |
17f0f4a47 crypto: rng - RNG... |
101 |
|
d0e83059a crypto: rng - Con... |
102 103 104 105 106 |
struct crypto_rng *crypto_alloc_rng(const char *alg_name, u32 type, u32 mask) { return crypto_alloc_tfm(alg_name, &crypto_rng_type, type, mask); } EXPORT_SYMBOL_GPL(crypto_alloc_rng); |
17f0f4a47 crypto: rng - RNG... |
107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 |
int crypto_get_default_rng(void) { struct crypto_rng *rng; int err; mutex_lock(&crypto_default_rng_lock); if (!crypto_default_rng) { rng = crypto_alloc_rng("stdrng", 0, 0); err = PTR_ERR(rng); if (IS_ERR(rng)) goto unlock; err = crypto_rng_reset(rng, NULL, crypto_rng_seedsize(rng)); if (err) { crypto_free_rng(rng); goto unlock; } crypto_default_rng = rng; } crypto_default_rng_refcnt++; err = 0; unlock: mutex_unlock(&crypto_default_rng_lock); return err; } EXPORT_SYMBOL_GPL(crypto_get_default_rng); void crypto_put_default_rng(void) { mutex_lock(&crypto_default_rng_lock); |
7cecadb7c crypto: rng - Do ... |
141 |
crypto_default_rng_refcnt--; |
17f0f4a47 crypto: rng - RNG... |
142 143 144 |
mutex_unlock(&crypto_default_rng_lock); } EXPORT_SYMBOL_GPL(crypto_put_default_rng); |
7cecadb7c crypto: rng - Do ... |
145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 |
#if defined(CONFIG_CRYPTO_RNG) || defined(CONFIG_CRYPTO_RNG_MODULE) int crypto_del_default_rng(void) { int err = -EBUSY; mutex_lock(&crypto_default_rng_lock); if (crypto_default_rng_refcnt) goto out; crypto_free_rng(crypto_default_rng); crypto_default_rng = NULL; err = 0; out: mutex_unlock(&crypto_default_rng_lock); return err; } EXPORT_SYMBOL_GPL(crypto_del_default_rng); #endif |
acec27ff3 crypto: rng - Con... |
166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 |
int crypto_register_rng(struct rng_alg *alg) { struct crypto_alg *base = &alg->base; if (alg->seedsize > PAGE_SIZE / 8) return -EINVAL; base->cra_type = &crypto_rng_type; base->cra_flags &= ~CRYPTO_ALG_TYPE_MASK; base->cra_flags |= CRYPTO_ALG_TYPE_RNG; return crypto_register_alg(base); } EXPORT_SYMBOL_GPL(crypto_register_rng); void crypto_unregister_rng(struct rng_alg *alg) { crypto_unregister_alg(&alg->base); } EXPORT_SYMBOL_GPL(crypto_unregister_rng); |
881cd6c57 crypto: rng - Add... |
186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 |
int crypto_register_rngs(struct rng_alg *algs, int count) { int i, ret; for (i = 0; i < count; i++) { ret = crypto_register_rng(algs + i); if (ret) goto err; } return 0; err: for (--i; i >= 0; --i) crypto_unregister_rng(algs + i); return ret; } EXPORT_SYMBOL_GPL(crypto_register_rngs); void crypto_unregister_rngs(struct rng_alg *algs, int count) { int i; for (i = count - 1; i >= 0; --i) crypto_unregister_rng(algs + i); } EXPORT_SYMBOL_GPL(crypto_unregister_rngs); |
17f0f4a47 crypto: rng - RNG... |
214 |
MODULE_LICENSE("GPL"); |
a8ccc393d crypto: rng - Fix... |
215 |
MODULE_DESCRIPTION("Random Number Generator"); |