|  | /* | 
|  | * Cryptographic API. | 
|  | * | 
|  | * Digest operations. | 
|  | * | 
|  | * Copyright (c) 2002 James Morris <jmorris@intercode.com.au> | 
|  | * | 
|  | * This program is free software; you can redistribute it and/or modify it | 
|  | * under the terms of the GNU General Public License as published by the Free | 
|  | * Software Foundation; either version 2 of the License, or (at your option) | 
|  | * any later version. | 
|  | * | 
|  | */ | 
|  |  | 
|  | #include <crypto/internal/hash.h> | 
|  | #include <crypto/scatterwalk.h> | 
|  | #include <linux/mm.h> | 
|  | #include <linux/errno.h> | 
|  | #include <linux/hardirq.h> | 
|  | #include <linux/highmem.h> | 
|  | #include <linux/kernel.h> | 
|  | #include <linux/module.h> | 
|  | #include <linux/scatterlist.h> | 
|  |  | 
|  | #include "internal.h" | 
|  |  | 
|  | static int init(struct hash_desc *desc) | 
|  | { | 
|  | struct crypto_tfm *tfm = crypto_hash_tfm(desc->tfm); | 
|  |  | 
|  | tfm->__crt_alg->cra_digest.dia_init(tfm); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static int update2(struct hash_desc *desc, | 
|  | struct scatterlist *sg, unsigned int nbytes) | 
|  | { | 
|  | struct crypto_tfm *tfm = crypto_hash_tfm(desc->tfm); | 
|  | unsigned int alignmask = crypto_tfm_alg_alignmask(tfm); | 
|  |  | 
|  | if (!nbytes) | 
|  | return 0; | 
|  |  | 
|  | for (;;) { | 
|  | struct page *pg = sg_page(sg); | 
|  | unsigned int offset = sg->offset; | 
|  | unsigned int l = sg->length; | 
|  |  | 
|  | if (unlikely(l > nbytes)) | 
|  | l = nbytes; | 
|  | nbytes -= l; | 
|  |  | 
|  | do { | 
|  | unsigned int bytes_from_page = min(l, ((unsigned int) | 
|  | (PAGE_SIZE)) - | 
|  | offset); | 
|  | char *src = crypto_kmap(pg, 0); | 
|  | char *p = src + offset; | 
|  |  | 
|  | if (unlikely(offset & alignmask)) { | 
|  | unsigned int bytes = | 
|  | alignmask + 1 - (offset & alignmask); | 
|  | bytes = min(bytes, bytes_from_page); | 
|  | tfm->__crt_alg->cra_digest.dia_update(tfm, p, | 
|  | bytes); | 
|  | p += bytes; | 
|  | bytes_from_page -= bytes; | 
|  | l -= bytes; | 
|  | } | 
|  | tfm->__crt_alg->cra_digest.dia_update(tfm, p, | 
|  | bytes_from_page); | 
|  | crypto_kunmap(src, 0); | 
|  | crypto_yield(desc->flags); | 
|  | offset = 0; | 
|  | pg++; | 
|  | l -= bytes_from_page; | 
|  | } while (l > 0); | 
|  |  | 
|  | if (!nbytes) | 
|  | break; | 
|  | sg = scatterwalk_sg_next(sg); | 
|  | } | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static int update(struct hash_desc *desc, | 
|  | struct scatterlist *sg, unsigned int nbytes) | 
|  | { | 
|  | if (WARN_ON_ONCE(in_irq())) | 
|  | return -EDEADLK; | 
|  | return update2(desc, sg, nbytes); | 
|  | } | 
|  |  | 
|  | static int final(struct hash_desc *desc, u8 *out) | 
|  | { | 
|  | struct crypto_tfm *tfm = crypto_hash_tfm(desc->tfm); | 
|  | unsigned long alignmask = crypto_tfm_alg_alignmask(tfm); | 
|  | struct digest_alg *digest = &tfm->__crt_alg->cra_digest; | 
|  |  | 
|  | if (unlikely((unsigned long)out & alignmask)) { | 
|  | unsigned long align = alignmask + 1; | 
|  | unsigned long addr = (unsigned long)crypto_tfm_ctx(tfm); | 
|  | u8 *dst = (u8 *)ALIGN(addr, align) + | 
|  | ALIGN(tfm->__crt_alg->cra_ctxsize, align); | 
|  |  | 
|  | digest->dia_final(tfm, dst); | 
|  | memcpy(out, dst, digest->dia_digestsize); | 
|  | } else | 
|  | digest->dia_final(tfm, out); | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static int nosetkey(struct crypto_hash *tfm, const u8 *key, unsigned int keylen) | 
|  | { | 
|  | crypto_hash_clear_flags(tfm, CRYPTO_TFM_RES_MASK); | 
|  | return -ENOSYS; | 
|  | } | 
|  |  | 
|  | static int setkey(struct crypto_hash *hash, const u8 *key, unsigned int keylen) | 
|  | { | 
|  | struct crypto_tfm *tfm = crypto_hash_tfm(hash); | 
|  |  | 
|  | crypto_hash_clear_flags(hash, CRYPTO_TFM_RES_MASK); | 
|  | return tfm->__crt_alg->cra_digest.dia_setkey(tfm, key, keylen); | 
|  | } | 
|  |  | 
|  | static int digest(struct hash_desc *desc, | 
|  | struct scatterlist *sg, unsigned int nbytes, u8 *out) | 
|  | { | 
|  | if (WARN_ON_ONCE(in_irq())) | 
|  | return -EDEADLK; | 
|  |  | 
|  | init(desc); | 
|  | update2(desc, sg, nbytes); | 
|  | return final(desc, out); | 
|  | } | 
|  |  | 
|  | int crypto_init_digest_ops(struct crypto_tfm *tfm) | 
|  | { | 
|  | struct hash_tfm *ops = &tfm->crt_hash; | 
|  | struct digest_alg *dalg = &tfm->__crt_alg->cra_digest; | 
|  |  | 
|  | if (dalg->dia_digestsize > PAGE_SIZE / 8) | 
|  | return -EINVAL; | 
|  |  | 
|  | ops->init	= init; | 
|  | ops->update	= update; | 
|  | ops->final	= final; | 
|  | ops->digest	= digest; | 
|  | ops->setkey	= dalg->dia_setkey ? setkey : nosetkey; | 
|  | ops->digestsize	= dalg->dia_digestsize; | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | void crypto_exit_digest_ops(struct crypto_tfm *tfm) | 
|  | { | 
|  | } | 
|  |  | 
|  | static int digest_async_nosetkey(struct crypto_ahash *tfm_async, const u8 *key, | 
|  | unsigned int keylen) | 
|  | { | 
|  | crypto_ahash_clear_flags(tfm_async, CRYPTO_TFM_RES_MASK); | 
|  | return -ENOSYS; | 
|  | } | 
|  |  | 
|  | static int digest_async_setkey(struct crypto_ahash *tfm_async, const u8 *key, | 
|  | unsigned int keylen) | 
|  | { | 
|  | struct crypto_tfm    *tfm        = crypto_ahash_tfm(tfm_async); | 
|  | struct digest_alg    *dalg       = &tfm->__crt_alg->cra_digest; | 
|  |  | 
|  | crypto_ahash_clear_flags(tfm_async, CRYPTO_TFM_RES_MASK); | 
|  | return dalg->dia_setkey(tfm, key, keylen); | 
|  | } | 
|  |  | 
|  | static int digest_async_init(struct ahash_request *req) | 
|  | { | 
|  | struct crypto_tfm *tfm  = req->base.tfm; | 
|  | struct digest_alg *dalg = &tfm->__crt_alg->cra_digest; | 
|  |  | 
|  | dalg->dia_init(tfm); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static int digest_async_update(struct ahash_request *req) | 
|  | { | 
|  | struct crypto_tfm *tfm = req->base.tfm; | 
|  | struct hash_desc  desc = { | 
|  | .tfm   = __crypto_hash_cast(tfm), | 
|  | .flags = req->base.flags, | 
|  | }; | 
|  |  | 
|  | update(&desc, req->src, req->nbytes); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static int digest_async_final(struct ahash_request *req) | 
|  | { | 
|  | struct crypto_tfm *tfm  = req->base.tfm; | 
|  | struct hash_desc  desc = { | 
|  | .tfm   = __crypto_hash_cast(tfm), | 
|  | .flags = req->base.flags, | 
|  | }; | 
|  |  | 
|  | final(&desc, req->result); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static int digest_async_digest(struct ahash_request *req) | 
|  | { | 
|  | struct crypto_tfm *tfm  = req->base.tfm; | 
|  | struct hash_desc  desc = { | 
|  | .tfm   = __crypto_hash_cast(tfm), | 
|  | .flags = req->base.flags, | 
|  | }; | 
|  |  | 
|  | return digest(&desc, req->src, req->nbytes, req->result); | 
|  | } | 
|  |  | 
|  | int crypto_init_digest_ops_async(struct crypto_tfm *tfm) | 
|  | { | 
|  | struct ahash_tfm  *crt  = &tfm->crt_ahash; | 
|  | struct digest_alg *dalg = &tfm->__crt_alg->cra_digest; | 
|  |  | 
|  | if (dalg->dia_digestsize > PAGE_SIZE / 8) | 
|  | return -EINVAL; | 
|  |  | 
|  | crt->init       = digest_async_init; | 
|  | crt->update     = digest_async_update; | 
|  | crt->final      = digest_async_final; | 
|  | crt->digest     = digest_async_digest; | 
|  | crt->setkey     = dalg->dia_setkey ? digest_async_setkey : | 
|  | digest_async_nosetkey; | 
|  | crt->digestsize = dalg->dia_digestsize; | 
|  |  | 
|  | return 0; | 
|  | } |