2 * Software async crypto daemon.
4 * Copyright (c) 2006 Herbert Xu <herbert@gondor.apana.org.au>
6 * Added AEAD support to cryptd.
7 * Authors: Tadeusz Struk (tadeusz.struk@intel.com)
8 * Adrian Hoban <adrian.hoban@intel.com>
9 * Gabriele Paoloni <gabriele.paoloni@intel.com>
10 * Aidan O'Mahony (aidan.o.mahony@intel.com)
11 * Copyright (c) 2010, Intel Corporation.
13 * This program is free software; you can redistribute it and/or modify it
14 * under the terms of the GNU General Public License as published by the Free
15 * Software Foundation; either version 2 of the License, or (at your option)
20 #include <crypto/algapi.h>
21 #include <crypto/internal/hash.h>
22 #include <crypto/internal/aead.h>
23 #include <crypto/cryptd.h>
24 #include <crypto/crypto_wq.h>
25 #include <linux/err.h>
26 #include <linux/init.h>
27 #include <linux/kernel.h>
28 #include <linux/list.h>
29 #include <linux/module.h>
30 #include <linux/scatterlist.h>
31 #include <linux/sched.h>
32 #include <linux/slab.h>
34 #define CRYPTD_MAX_CPU_QLEN 100
36 struct cryptd_cpu_queue
{
37 struct crypto_queue queue
;
38 struct work_struct work
;
42 struct cryptd_cpu_queue __percpu
*cpu_queue
;
45 struct cryptd_instance_ctx
{
46 struct crypto_spawn spawn
;
47 struct cryptd_queue
*queue
;
50 struct hashd_instance_ctx
{
51 struct crypto_shash_spawn spawn
;
52 struct cryptd_queue
*queue
;
55 struct aead_instance_ctx
{
56 struct crypto_aead_spawn aead_spawn
;
57 struct cryptd_queue
*queue
;
60 struct cryptd_blkcipher_ctx
{
61 struct crypto_blkcipher
*child
;
64 struct cryptd_blkcipher_request_ctx
{
65 crypto_completion_t complete
;
68 struct cryptd_hash_ctx
{
69 struct crypto_shash
*child
;
72 struct cryptd_hash_request_ctx
{
73 crypto_completion_t complete
;
74 struct shash_desc desc
;
77 struct cryptd_aead_ctx
{
78 struct crypto_aead
*child
;
81 struct cryptd_aead_request_ctx
{
82 crypto_completion_t complete
;
85 static void cryptd_queue_worker(struct work_struct
*work
);
87 static int cryptd_init_queue(struct cryptd_queue
*queue
,
88 unsigned int max_cpu_qlen
)
91 struct cryptd_cpu_queue
*cpu_queue
;
93 queue
->cpu_queue
= alloc_percpu(struct cryptd_cpu_queue
);
94 if (!queue
->cpu_queue
)
96 for_each_possible_cpu(cpu
) {
97 cpu_queue
= per_cpu_ptr(queue
->cpu_queue
, cpu
);
98 crypto_init_queue(&cpu_queue
->queue
, max_cpu_qlen
);
99 INIT_WORK(&cpu_queue
->work
, cryptd_queue_worker
);
104 static void cryptd_fini_queue(struct cryptd_queue
*queue
)
107 struct cryptd_cpu_queue
*cpu_queue
;
109 for_each_possible_cpu(cpu
) {
110 cpu_queue
= per_cpu_ptr(queue
->cpu_queue
, cpu
);
111 BUG_ON(cpu_queue
->queue
.qlen
);
113 free_percpu(queue
->cpu_queue
);
116 static int cryptd_enqueue_request(struct cryptd_queue
*queue
,
117 struct crypto_async_request
*request
)
120 struct cryptd_cpu_queue
*cpu_queue
;
123 cpu_queue
= this_cpu_ptr(queue
->cpu_queue
);
124 err
= crypto_enqueue_request(&cpu_queue
->queue
, request
);
125 queue_work_on(cpu
, kcrypto_wq
, &cpu_queue
->work
);
131 /* Called in workqueue context, do one real cryption work (via
132 * req->complete) and reschedule itself if there are more work to
134 static void cryptd_queue_worker(struct work_struct
*work
)
136 struct cryptd_cpu_queue
*cpu_queue
;
137 struct crypto_async_request
*req
, *backlog
;
139 cpu_queue
= container_of(work
, struct cryptd_cpu_queue
, work
);
141 * Only handle one request at a time to avoid hogging crypto workqueue.
142 * preempt_disable/enable is used to prevent being preempted by
143 * cryptd_enqueue_request(). local_bh_disable/enable is used to prevent
144 * cryptd_enqueue_request() being accessed from software interrupts.
148 backlog
= crypto_get_backlog(&cpu_queue
->queue
);
149 req
= crypto_dequeue_request(&cpu_queue
->queue
);
157 backlog
->complete(backlog
, -EINPROGRESS
);
158 req
->complete(req
, 0);
160 if (cpu_queue
->queue
.qlen
)
161 queue_work(kcrypto_wq
, &cpu_queue
->work
);
164 static inline struct cryptd_queue
*cryptd_get_queue(struct crypto_tfm
*tfm
)
166 struct crypto_instance
*inst
= crypto_tfm_alg_instance(tfm
);
167 struct cryptd_instance_ctx
*ictx
= crypto_instance_ctx(inst
);
171 static inline void cryptd_check_internal(struct rtattr
**tb
, u32
*type
,
174 struct crypto_attr_type
*algt
;
176 algt
= crypto_get_attr_type(tb
);
179 if ((algt
->type
& CRYPTO_ALG_INTERNAL
))
180 *type
|= CRYPTO_ALG_INTERNAL
;
181 if ((algt
->mask
& CRYPTO_ALG_INTERNAL
))
182 *mask
|= CRYPTO_ALG_INTERNAL
;
185 static int cryptd_blkcipher_setkey(struct crypto_ablkcipher
*parent
,
186 const u8
*key
, unsigned int keylen
)
188 struct cryptd_blkcipher_ctx
*ctx
= crypto_ablkcipher_ctx(parent
);
189 struct crypto_blkcipher
*child
= ctx
->child
;
192 crypto_blkcipher_clear_flags(child
, CRYPTO_TFM_REQ_MASK
);
193 crypto_blkcipher_set_flags(child
, crypto_ablkcipher_get_flags(parent
) &
194 CRYPTO_TFM_REQ_MASK
);
195 err
= crypto_blkcipher_setkey(child
, key
, keylen
);
196 crypto_ablkcipher_set_flags(parent
, crypto_blkcipher_get_flags(child
) &
197 CRYPTO_TFM_RES_MASK
);
201 static void cryptd_blkcipher_crypt(struct ablkcipher_request
*req
,
202 struct crypto_blkcipher
*child
,
204 int (*crypt
)(struct blkcipher_desc
*desc
,
205 struct scatterlist
*dst
,
206 struct scatterlist
*src
,
209 struct cryptd_blkcipher_request_ctx
*rctx
;
210 struct blkcipher_desc desc
;
212 rctx
= ablkcipher_request_ctx(req
);
214 if (unlikely(err
== -EINPROGRESS
))
218 desc
.info
= req
->info
;
219 desc
.flags
= CRYPTO_TFM_REQ_MAY_SLEEP
;
221 err
= crypt(&desc
, req
->dst
, req
->src
, req
->nbytes
);
223 req
->base
.complete
= rctx
->complete
;
227 rctx
->complete(&req
->base
, err
);
231 static void cryptd_blkcipher_encrypt(struct crypto_async_request
*req
, int err
)
233 struct cryptd_blkcipher_ctx
*ctx
= crypto_tfm_ctx(req
->tfm
);
234 struct crypto_blkcipher
*child
= ctx
->child
;
236 cryptd_blkcipher_crypt(ablkcipher_request_cast(req
), child
, err
,
237 crypto_blkcipher_crt(child
)->encrypt
);
240 static void cryptd_blkcipher_decrypt(struct crypto_async_request
*req
, int err
)
242 struct cryptd_blkcipher_ctx
*ctx
= crypto_tfm_ctx(req
->tfm
);
243 struct crypto_blkcipher
*child
= ctx
->child
;
245 cryptd_blkcipher_crypt(ablkcipher_request_cast(req
), child
, err
,
246 crypto_blkcipher_crt(child
)->decrypt
);
249 static int cryptd_blkcipher_enqueue(struct ablkcipher_request
*req
,
250 crypto_completion_t
compl)
252 struct cryptd_blkcipher_request_ctx
*rctx
= ablkcipher_request_ctx(req
);
253 struct crypto_ablkcipher
*tfm
= crypto_ablkcipher_reqtfm(req
);
254 struct cryptd_queue
*queue
;
256 queue
= cryptd_get_queue(crypto_ablkcipher_tfm(tfm
));
257 rctx
->complete
= req
->base
.complete
;
258 req
->base
.complete
= compl;
260 return cryptd_enqueue_request(queue
, &req
->base
);
263 static int cryptd_blkcipher_encrypt_enqueue(struct ablkcipher_request
*req
)
265 return cryptd_blkcipher_enqueue(req
, cryptd_blkcipher_encrypt
);
268 static int cryptd_blkcipher_decrypt_enqueue(struct ablkcipher_request
*req
)
270 return cryptd_blkcipher_enqueue(req
, cryptd_blkcipher_decrypt
);
273 static int cryptd_blkcipher_init_tfm(struct crypto_tfm
*tfm
)
275 struct crypto_instance
*inst
= crypto_tfm_alg_instance(tfm
);
276 struct cryptd_instance_ctx
*ictx
= crypto_instance_ctx(inst
);
277 struct crypto_spawn
*spawn
= &ictx
->spawn
;
278 struct cryptd_blkcipher_ctx
*ctx
= crypto_tfm_ctx(tfm
);
279 struct crypto_blkcipher
*cipher
;
281 cipher
= crypto_spawn_blkcipher(spawn
);
283 return PTR_ERR(cipher
);
286 tfm
->crt_ablkcipher
.reqsize
=
287 sizeof(struct cryptd_blkcipher_request_ctx
);
291 static void cryptd_blkcipher_exit_tfm(struct crypto_tfm
*tfm
)
293 struct cryptd_blkcipher_ctx
*ctx
= crypto_tfm_ctx(tfm
);
295 crypto_free_blkcipher(ctx
->child
);
298 static int cryptd_init_instance(struct crypto_instance
*inst
,
299 struct crypto_alg
*alg
)
301 if (snprintf(inst
->alg
.cra_driver_name
, CRYPTO_MAX_ALG_NAME
,
303 alg
->cra_driver_name
) >= CRYPTO_MAX_ALG_NAME
)
304 return -ENAMETOOLONG
;
306 memcpy(inst
->alg
.cra_name
, alg
->cra_name
, CRYPTO_MAX_ALG_NAME
);
308 inst
->alg
.cra_priority
= alg
->cra_priority
+ 50;
309 inst
->alg
.cra_blocksize
= alg
->cra_blocksize
;
310 inst
->alg
.cra_alignmask
= alg
->cra_alignmask
;
315 static void *cryptd_alloc_instance(struct crypto_alg
*alg
, unsigned int head
,
319 struct crypto_instance
*inst
;
322 p
= kzalloc(head
+ sizeof(*inst
) + tail
, GFP_KERNEL
);
324 return ERR_PTR(-ENOMEM
);
326 inst
= (void *)(p
+ head
);
328 err
= cryptd_init_instance(inst
, alg
);
341 static int cryptd_create_blkcipher(struct crypto_template
*tmpl
,
343 struct cryptd_queue
*queue
)
345 struct cryptd_instance_ctx
*ctx
;
346 struct crypto_instance
*inst
;
347 struct crypto_alg
*alg
;
348 u32 type
= CRYPTO_ALG_TYPE_BLKCIPHER
;
349 u32 mask
= CRYPTO_ALG_TYPE_MASK
;
352 cryptd_check_internal(tb
, &type
, &mask
);
354 alg
= crypto_get_attr_alg(tb
, type
, mask
);
358 inst
= cryptd_alloc_instance(alg
, 0, sizeof(*ctx
));
363 ctx
= crypto_instance_ctx(inst
);
366 err
= crypto_init_spawn(&ctx
->spawn
, alg
, inst
,
367 CRYPTO_ALG_TYPE_MASK
| CRYPTO_ALG_ASYNC
);
371 type
= CRYPTO_ALG_TYPE_ABLKCIPHER
| CRYPTO_ALG_ASYNC
;
372 if (alg
->cra_flags
& CRYPTO_ALG_INTERNAL
)
373 type
|= CRYPTO_ALG_INTERNAL
;
374 inst
->alg
.cra_flags
= type
;
375 inst
->alg
.cra_type
= &crypto_ablkcipher_type
;
377 inst
->alg
.cra_ablkcipher
.ivsize
= alg
->cra_blkcipher
.ivsize
;
378 inst
->alg
.cra_ablkcipher
.min_keysize
= alg
->cra_blkcipher
.min_keysize
;
379 inst
->alg
.cra_ablkcipher
.max_keysize
= alg
->cra_blkcipher
.max_keysize
;
381 inst
->alg
.cra_ablkcipher
.geniv
= alg
->cra_blkcipher
.geniv
;
383 inst
->alg
.cra_ctxsize
= sizeof(struct cryptd_blkcipher_ctx
);
385 inst
->alg
.cra_init
= cryptd_blkcipher_init_tfm
;
386 inst
->alg
.cra_exit
= cryptd_blkcipher_exit_tfm
;
388 inst
->alg
.cra_ablkcipher
.setkey
= cryptd_blkcipher_setkey
;
389 inst
->alg
.cra_ablkcipher
.encrypt
= cryptd_blkcipher_encrypt_enqueue
;
390 inst
->alg
.cra_ablkcipher
.decrypt
= cryptd_blkcipher_decrypt_enqueue
;
392 err
= crypto_register_instance(tmpl
, inst
);
394 crypto_drop_spawn(&ctx
->spawn
);
404 static int cryptd_hash_init_tfm(struct crypto_tfm
*tfm
)
406 struct crypto_instance
*inst
= crypto_tfm_alg_instance(tfm
);
407 struct hashd_instance_ctx
*ictx
= crypto_instance_ctx(inst
);
408 struct crypto_shash_spawn
*spawn
= &ictx
->spawn
;
409 struct cryptd_hash_ctx
*ctx
= crypto_tfm_ctx(tfm
);
410 struct crypto_shash
*hash
;
412 hash
= crypto_spawn_shash(spawn
);
414 return PTR_ERR(hash
);
417 crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm
),
418 sizeof(struct cryptd_hash_request_ctx
) +
419 crypto_shash_descsize(hash
));
423 static void cryptd_hash_exit_tfm(struct crypto_tfm
*tfm
)
425 struct cryptd_hash_ctx
*ctx
= crypto_tfm_ctx(tfm
);
427 crypto_free_shash(ctx
->child
);
430 static int cryptd_hash_setkey(struct crypto_ahash
*parent
,
431 const u8
*key
, unsigned int keylen
)
433 struct cryptd_hash_ctx
*ctx
= crypto_ahash_ctx(parent
);
434 struct crypto_shash
*child
= ctx
->child
;
437 crypto_shash_clear_flags(child
, CRYPTO_TFM_REQ_MASK
);
438 crypto_shash_set_flags(child
, crypto_ahash_get_flags(parent
) &
439 CRYPTO_TFM_REQ_MASK
);
440 err
= crypto_shash_setkey(child
, key
, keylen
);
441 crypto_ahash_set_flags(parent
, crypto_shash_get_flags(child
) &
442 CRYPTO_TFM_RES_MASK
);
446 static int cryptd_hash_enqueue(struct ahash_request
*req
,
447 crypto_completion_t
compl)
449 struct cryptd_hash_request_ctx
*rctx
= ahash_request_ctx(req
);
450 struct crypto_ahash
*tfm
= crypto_ahash_reqtfm(req
);
451 struct cryptd_queue
*queue
=
452 cryptd_get_queue(crypto_ahash_tfm(tfm
));
454 rctx
->complete
= req
->base
.complete
;
455 req
->base
.complete
= compl;
457 return cryptd_enqueue_request(queue
, &req
->base
);
460 static void cryptd_hash_init(struct crypto_async_request
*req_async
, int err
)
462 struct cryptd_hash_ctx
*ctx
= crypto_tfm_ctx(req_async
->tfm
);
463 struct crypto_shash
*child
= ctx
->child
;
464 struct ahash_request
*req
= ahash_request_cast(req_async
);
465 struct cryptd_hash_request_ctx
*rctx
= ahash_request_ctx(req
);
466 struct shash_desc
*desc
= &rctx
->desc
;
468 if (unlikely(err
== -EINPROGRESS
))
472 desc
->flags
= CRYPTO_TFM_REQ_MAY_SLEEP
;
474 err
= crypto_shash_init(desc
);
476 req
->base
.complete
= rctx
->complete
;
480 rctx
->complete(&req
->base
, err
);
484 static int cryptd_hash_init_enqueue(struct ahash_request
*req
)
486 return cryptd_hash_enqueue(req
, cryptd_hash_init
);
489 static void cryptd_hash_update(struct crypto_async_request
*req_async
, int err
)
491 struct ahash_request
*req
= ahash_request_cast(req_async
);
492 struct cryptd_hash_request_ctx
*rctx
;
494 rctx
= ahash_request_ctx(req
);
496 if (unlikely(err
== -EINPROGRESS
))
499 err
= shash_ahash_update(req
, &rctx
->desc
);
501 req
->base
.complete
= rctx
->complete
;
505 rctx
->complete(&req
->base
, err
);
509 static int cryptd_hash_update_enqueue(struct ahash_request
*req
)
511 return cryptd_hash_enqueue(req
, cryptd_hash_update
);
514 static void cryptd_hash_final(struct crypto_async_request
*req_async
, int err
)
516 struct ahash_request
*req
= ahash_request_cast(req_async
);
517 struct cryptd_hash_request_ctx
*rctx
= ahash_request_ctx(req
);
519 if (unlikely(err
== -EINPROGRESS
))
522 err
= crypto_shash_final(&rctx
->desc
, req
->result
);
524 req
->base
.complete
= rctx
->complete
;
528 rctx
->complete(&req
->base
, err
);
532 static int cryptd_hash_final_enqueue(struct ahash_request
*req
)
534 return cryptd_hash_enqueue(req
, cryptd_hash_final
);
537 static void cryptd_hash_finup(struct crypto_async_request
*req_async
, int err
)
539 struct ahash_request
*req
= ahash_request_cast(req_async
);
540 struct cryptd_hash_request_ctx
*rctx
= ahash_request_ctx(req
);
542 if (unlikely(err
== -EINPROGRESS
))
545 err
= shash_ahash_finup(req
, &rctx
->desc
);
547 req
->base
.complete
= rctx
->complete
;
551 rctx
->complete(&req
->base
, err
);
555 static int cryptd_hash_finup_enqueue(struct ahash_request
*req
)
557 return cryptd_hash_enqueue(req
, cryptd_hash_finup
);
560 static void cryptd_hash_digest(struct crypto_async_request
*req_async
, int err
)
562 struct cryptd_hash_ctx
*ctx
= crypto_tfm_ctx(req_async
->tfm
);
563 struct crypto_shash
*child
= ctx
->child
;
564 struct ahash_request
*req
= ahash_request_cast(req_async
);
565 struct cryptd_hash_request_ctx
*rctx
= ahash_request_ctx(req
);
566 struct shash_desc
*desc
= &rctx
->desc
;
568 if (unlikely(err
== -EINPROGRESS
))
572 desc
->flags
= CRYPTO_TFM_REQ_MAY_SLEEP
;
574 err
= shash_ahash_digest(req
, desc
);
576 req
->base
.complete
= rctx
->complete
;
580 rctx
->complete(&req
->base
, err
);
584 static int cryptd_hash_digest_enqueue(struct ahash_request
*req
)
586 return cryptd_hash_enqueue(req
, cryptd_hash_digest
);
589 static int cryptd_hash_export(struct ahash_request
*req
, void *out
)
591 struct cryptd_hash_request_ctx
*rctx
= ahash_request_ctx(req
);
593 return crypto_shash_export(&rctx
->desc
, out
);
596 static int cryptd_hash_import(struct ahash_request
*req
, const void *in
)
598 struct cryptd_hash_request_ctx
*rctx
= ahash_request_ctx(req
);
600 return crypto_shash_import(&rctx
->desc
, in
);
603 static int cryptd_create_hash(struct crypto_template
*tmpl
, struct rtattr
**tb
,
604 struct cryptd_queue
*queue
)
606 struct hashd_instance_ctx
*ctx
;
607 struct ahash_instance
*inst
;
608 struct shash_alg
*salg
;
609 struct crypto_alg
*alg
;
614 cryptd_check_internal(tb
, &type
, &mask
);
616 salg
= shash_attr_alg(tb
[1], type
, mask
);
618 return PTR_ERR(salg
);
621 inst
= cryptd_alloc_instance(alg
, ahash_instance_headroom(),
627 ctx
= ahash_instance_ctx(inst
);
630 err
= crypto_init_shash_spawn(&ctx
->spawn
, salg
,
631 ahash_crypto_instance(inst
));
635 type
= CRYPTO_ALG_ASYNC
;
636 if (alg
->cra_flags
& CRYPTO_ALG_INTERNAL
)
637 type
|= CRYPTO_ALG_INTERNAL
;
638 inst
->alg
.halg
.base
.cra_flags
= type
;
640 inst
->alg
.halg
.digestsize
= salg
->digestsize
;
641 inst
->alg
.halg
.base
.cra_ctxsize
= sizeof(struct cryptd_hash_ctx
);
643 inst
->alg
.halg
.base
.cra_init
= cryptd_hash_init_tfm
;
644 inst
->alg
.halg
.base
.cra_exit
= cryptd_hash_exit_tfm
;
646 inst
->alg
.init
= cryptd_hash_init_enqueue
;
647 inst
->alg
.update
= cryptd_hash_update_enqueue
;
648 inst
->alg
.final
= cryptd_hash_final_enqueue
;
649 inst
->alg
.finup
= cryptd_hash_finup_enqueue
;
650 inst
->alg
.export
= cryptd_hash_export
;
651 inst
->alg
.import
= cryptd_hash_import
;
652 inst
->alg
.setkey
= cryptd_hash_setkey
;
653 inst
->alg
.digest
= cryptd_hash_digest_enqueue
;
655 err
= ahash_register_instance(tmpl
, inst
);
657 crypto_drop_shash(&ctx
->spawn
);
667 static int cryptd_aead_setkey(struct crypto_aead
*parent
,
668 const u8
*key
, unsigned int keylen
)
670 struct cryptd_aead_ctx
*ctx
= crypto_aead_ctx(parent
);
671 struct crypto_aead
*child
= ctx
->child
;
673 return crypto_aead_setkey(child
, key
, keylen
);
676 static int cryptd_aead_setauthsize(struct crypto_aead
*parent
,
677 unsigned int authsize
)
679 struct cryptd_aead_ctx
*ctx
= crypto_aead_ctx(parent
);
680 struct crypto_aead
*child
= ctx
->child
;
682 return crypto_aead_setauthsize(child
, authsize
);
685 static void cryptd_aead_crypt(struct aead_request
*req
,
686 struct crypto_aead
*child
,
688 int (*crypt
)(struct aead_request
*req
))
690 struct cryptd_aead_request_ctx
*rctx
;
691 rctx
= aead_request_ctx(req
);
693 if (unlikely(err
== -EINPROGRESS
))
695 aead_request_set_tfm(req
, child
);
697 req
->base
.complete
= rctx
->complete
;
700 rctx
->complete(&req
->base
, err
);
704 static void cryptd_aead_encrypt(struct crypto_async_request
*areq
, int err
)
706 struct cryptd_aead_ctx
*ctx
= crypto_tfm_ctx(areq
->tfm
);
707 struct crypto_aead
*child
= ctx
->child
;
708 struct aead_request
*req
;
710 req
= container_of(areq
, struct aead_request
, base
);
711 cryptd_aead_crypt(req
, child
, err
, crypto_aead_crt(child
)->encrypt
);
714 static void cryptd_aead_decrypt(struct crypto_async_request
*areq
, int err
)
716 struct cryptd_aead_ctx
*ctx
= crypto_tfm_ctx(areq
->tfm
);
717 struct crypto_aead
*child
= ctx
->child
;
718 struct aead_request
*req
;
720 req
= container_of(areq
, struct aead_request
, base
);
721 cryptd_aead_crypt(req
, child
, err
, crypto_aead_crt(child
)->decrypt
);
724 static int cryptd_aead_enqueue(struct aead_request
*req
,
725 crypto_completion_t
compl)
727 struct cryptd_aead_request_ctx
*rctx
= aead_request_ctx(req
);
728 struct crypto_aead
*tfm
= crypto_aead_reqtfm(req
);
729 struct cryptd_queue
*queue
= cryptd_get_queue(crypto_aead_tfm(tfm
));
731 rctx
->complete
= req
->base
.complete
;
732 req
->base
.complete
= compl;
733 return cryptd_enqueue_request(queue
, &req
->base
);
736 static int cryptd_aead_encrypt_enqueue(struct aead_request
*req
)
738 return cryptd_aead_enqueue(req
, cryptd_aead_encrypt
);
741 static int cryptd_aead_decrypt_enqueue(struct aead_request
*req
)
743 return cryptd_aead_enqueue(req
, cryptd_aead_decrypt
);
746 static int cryptd_aead_init_tfm(struct crypto_aead
*tfm
)
748 struct aead_instance
*inst
= aead_alg_instance(tfm
);
749 struct aead_instance_ctx
*ictx
= aead_instance_ctx(inst
);
750 struct crypto_aead_spawn
*spawn
= &ictx
->aead_spawn
;
751 struct cryptd_aead_ctx
*ctx
= crypto_aead_ctx(tfm
);
752 struct crypto_aead
*cipher
;
754 cipher
= crypto_spawn_aead(spawn
);
756 return PTR_ERR(cipher
);
759 crypto_aead_set_reqsize(tfm
, sizeof(struct cryptd_aead_request_ctx
));
763 static void cryptd_aead_exit_tfm(struct crypto_aead
*tfm
)
765 struct cryptd_aead_ctx
*ctx
= crypto_aead_ctx(tfm
);
766 crypto_free_aead(ctx
->child
);
769 static int cryptd_create_aead(struct crypto_template
*tmpl
,
771 struct cryptd_queue
*queue
)
773 struct aead_instance_ctx
*ctx
;
774 struct aead_instance
*inst
;
775 struct aead_alg
*alg
;
781 cryptd_check_internal(tb
, &type
, &mask
);
783 name
= crypto_attr_alg_name(tb
[1]);
785 return PTR_ERR(name
);
787 inst
= kzalloc(sizeof(*inst
) + sizeof(*ctx
), GFP_KERNEL
);
791 ctx
= aead_instance_ctx(inst
);
794 crypto_set_aead_spawn(&ctx
->aead_spawn
, aead_crypto_instance(inst
));
795 err
= crypto_grab_aead(&ctx
->aead_spawn
, name
, type
, mask
);
799 alg
= crypto_spawn_aead_alg(&ctx
->aead_spawn
);
800 err
= cryptd_init_instance(aead_crypto_instance(inst
), &alg
->base
);
804 inst
->alg
.base
.cra_flags
= CRYPTO_ALG_ASYNC
|
805 (alg
->base
.cra_flags
& CRYPTO_ALG_INTERNAL
);
806 inst
->alg
.base
.cra_ctxsize
= sizeof(struct cryptd_aead_ctx
);
808 inst
->alg
.ivsize
= crypto_aead_alg_ivsize(alg
);
809 inst
->alg
.maxauthsize
= crypto_aead_alg_maxauthsize(alg
);
811 inst
->alg
.init
= cryptd_aead_init_tfm
;
812 inst
->alg
.exit
= cryptd_aead_exit_tfm
;
813 inst
->alg
.setkey
= cryptd_aead_setkey
;
814 inst
->alg
.setauthsize
= cryptd_aead_setauthsize
;
815 inst
->alg
.encrypt
= cryptd_aead_encrypt_enqueue
;
816 inst
->alg
.decrypt
= cryptd_aead_decrypt_enqueue
;
818 err
= aead_register_instance(tmpl
, inst
);
821 crypto_drop_aead(&ctx
->aead_spawn
);
828 static struct cryptd_queue queue
;
830 static int cryptd_create(struct crypto_template
*tmpl
, struct rtattr
**tb
)
832 struct crypto_attr_type
*algt
;
834 algt
= crypto_get_attr_type(tb
);
836 return PTR_ERR(algt
);
838 switch (algt
->type
& algt
->mask
& CRYPTO_ALG_TYPE_MASK
) {
839 case CRYPTO_ALG_TYPE_BLKCIPHER
:
840 return cryptd_create_blkcipher(tmpl
, tb
, &queue
);
841 case CRYPTO_ALG_TYPE_DIGEST
:
842 return cryptd_create_hash(tmpl
, tb
, &queue
);
843 case CRYPTO_ALG_TYPE_AEAD
:
844 return cryptd_create_aead(tmpl
, tb
, &queue
);
850 static void cryptd_free(struct crypto_instance
*inst
)
852 struct cryptd_instance_ctx
*ctx
= crypto_instance_ctx(inst
);
853 struct hashd_instance_ctx
*hctx
= crypto_instance_ctx(inst
);
854 struct aead_instance_ctx
*aead_ctx
= crypto_instance_ctx(inst
);
856 switch (inst
->alg
.cra_flags
& CRYPTO_ALG_TYPE_MASK
) {
857 case CRYPTO_ALG_TYPE_AHASH
:
858 crypto_drop_shash(&hctx
->spawn
);
859 kfree(ahash_instance(inst
));
861 case CRYPTO_ALG_TYPE_AEAD
:
862 crypto_drop_aead(&aead_ctx
->aead_spawn
);
863 kfree(aead_instance(inst
));
866 crypto_drop_spawn(&ctx
->spawn
);
871 static struct crypto_template cryptd_tmpl
= {
873 .create
= cryptd_create
,
875 .module
= THIS_MODULE
,
878 struct cryptd_ablkcipher
*cryptd_alloc_ablkcipher(const char *alg_name
,
881 char cryptd_alg_name
[CRYPTO_MAX_ALG_NAME
];
882 struct crypto_tfm
*tfm
;
884 if (snprintf(cryptd_alg_name
, CRYPTO_MAX_ALG_NAME
,
885 "cryptd(%s)", alg_name
) >= CRYPTO_MAX_ALG_NAME
)
886 return ERR_PTR(-EINVAL
);
887 type
&= ~(CRYPTO_ALG_TYPE_MASK
| CRYPTO_ALG_GENIV
);
888 type
|= CRYPTO_ALG_TYPE_BLKCIPHER
;
889 mask
&= ~CRYPTO_ALG_TYPE_MASK
;
890 mask
|= (CRYPTO_ALG_GENIV
| CRYPTO_ALG_TYPE_BLKCIPHER_MASK
);
891 tfm
= crypto_alloc_base(cryptd_alg_name
, type
, mask
);
893 return ERR_CAST(tfm
);
894 if (tfm
->__crt_alg
->cra_module
!= THIS_MODULE
) {
895 crypto_free_tfm(tfm
);
896 return ERR_PTR(-EINVAL
);
899 return __cryptd_ablkcipher_cast(__crypto_ablkcipher_cast(tfm
));
901 EXPORT_SYMBOL_GPL(cryptd_alloc_ablkcipher
);
903 struct crypto_blkcipher
*cryptd_ablkcipher_child(struct cryptd_ablkcipher
*tfm
)
905 struct cryptd_blkcipher_ctx
*ctx
= crypto_ablkcipher_ctx(&tfm
->base
);
908 EXPORT_SYMBOL_GPL(cryptd_ablkcipher_child
);
910 void cryptd_free_ablkcipher(struct cryptd_ablkcipher
*tfm
)
912 crypto_free_ablkcipher(&tfm
->base
);
914 EXPORT_SYMBOL_GPL(cryptd_free_ablkcipher
);
916 struct cryptd_ahash
*cryptd_alloc_ahash(const char *alg_name
,
919 char cryptd_alg_name
[CRYPTO_MAX_ALG_NAME
];
920 struct crypto_ahash
*tfm
;
922 if (snprintf(cryptd_alg_name
, CRYPTO_MAX_ALG_NAME
,
923 "cryptd(%s)", alg_name
) >= CRYPTO_MAX_ALG_NAME
)
924 return ERR_PTR(-EINVAL
);
925 tfm
= crypto_alloc_ahash(cryptd_alg_name
, type
, mask
);
927 return ERR_CAST(tfm
);
928 if (tfm
->base
.__crt_alg
->cra_module
!= THIS_MODULE
) {
929 crypto_free_ahash(tfm
);
930 return ERR_PTR(-EINVAL
);
933 return __cryptd_ahash_cast(tfm
);
935 EXPORT_SYMBOL_GPL(cryptd_alloc_ahash
);
937 struct crypto_shash
*cryptd_ahash_child(struct cryptd_ahash
*tfm
)
939 struct cryptd_hash_ctx
*ctx
= crypto_ahash_ctx(&tfm
->base
);
943 EXPORT_SYMBOL_GPL(cryptd_ahash_child
);
945 struct shash_desc
*cryptd_shash_desc(struct ahash_request
*req
)
947 struct cryptd_hash_request_ctx
*rctx
= ahash_request_ctx(req
);
950 EXPORT_SYMBOL_GPL(cryptd_shash_desc
);
952 void cryptd_free_ahash(struct cryptd_ahash
*tfm
)
954 crypto_free_ahash(&tfm
->base
);
956 EXPORT_SYMBOL_GPL(cryptd_free_ahash
);
958 struct cryptd_aead
*cryptd_alloc_aead(const char *alg_name
,
961 char cryptd_alg_name
[CRYPTO_MAX_ALG_NAME
];
962 struct crypto_aead
*tfm
;
964 if (snprintf(cryptd_alg_name
, CRYPTO_MAX_ALG_NAME
,
965 "cryptd(%s)", alg_name
) >= CRYPTO_MAX_ALG_NAME
)
966 return ERR_PTR(-EINVAL
);
967 tfm
= crypto_alloc_aead(cryptd_alg_name
, type
, mask
);
969 return ERR_CAST(tfm
);
970 if (tfm
->base
.__crt_alg
->cra_module
!= THIS_MODULE
) {
971 crypto_free_aead(tfm
);
972 return ERR_PTR(-EINVAL
);
974 return __cryptd_aead_cast(tfm
);
976 EXPORT_SYMBOL_GPL(cryptd_alloc_aead
);
978 struct crypto_aead
*cryptd_aead_child(struct cryptd_aead
*tfm
)
980 struct cryptd_aead_ctx
*ctx
;
981 ctx
= crypto_aead_ctx(&tfm
->base
);
984 EXPORT_SYMBOL_GPL(cryptd_aead_child
);
986 void cryptd_free_aead(struct cryptd_aead
*tfm
)
988 crypto_free_aead(&tfm
->base
);
990 EXPORT_SYMBOL_GPL(cryptd_free_aead
);
992 static int __init
cryptd_init(void)
996 err
= cryptd_init_queue(&queue
, CRYPTD_MAX_CPU_QLEN
);
1000 err
= crypto_register_template(&cryptd_tmpl
);
1002 cryptd_fini_queue(&queue
);
1007 static void __exit
cryptd_exit(void)
1009 cryptd_fini_queue(&queue
);
1010 crypto_unregister_template(&cryptd_tmpl
);
1013 subsys_initcall(cryptd_init
);
1014 module_exit(cryptd_exit
);
1016 MODULE_LICENSE("GPL");
1017 MODULE_DESCRIPTION("Software async crypto daemon");
1018 MODULE_ALIAS_CRYPTO("cryptd");