提交 46309d89 编写于 作者: H Herbert Xu

crypto: cryptd - Use shash algorithms

This patch changes cryptd to use shash algorithms instead of the
legacy hash interface.
Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
上级 7eddf95e
...@@ -39,6 +39,11 @@ struct cryptd_instance_ctx { ...@@ -39,6 +39,11 @@ struct cryptd_instance_ctx {
struct cryptd_queue *queue; struct cryptd_queue *queue;
}; };
struct hashd_instance_ctx {
struct crypto_shash_spawn spawn;
struct cryptd_queue *queue;
};
struct cryptd_blkcipher_ctx { struct cryptd_blkcipher_ctx {
struct crypto_blkcipher *child; struct crypto_blkcipher *child;
}; };
...@@ -48,11 +53,12 @@ struct cryptd_blkcipher_request_ctx { ...@@ -48,11 +53,12 @@ struct cryptd_blkcipher_request_ctx {
}; };
struct cryptd_hash_ctx { struct cryptd_hash_ctx {
struct crypto_hash *child; struct crypto_shash *child;
}; };
struct cryptd_hash_request_ctx { struct cryptd_hash_request_ctx {
crypto_completion_t complete; crypto_completion_t complete;
struct shash_desc desc;
}; };
static void cryptd_queue_worker(struct work_struct *work); static void cryptd_queue_worker(struct work_struct *work);
...@@ -250,13 +256,12 @@ static void cryptd_blkcipher_exit_tfm(struct crypto_tfm *tfm) ...@@ -250,13 +256,12 @@ static void cryptd_blkcipher_exit_tfm(struct crypto_tfm *tfm)
} }
static struct crypto_instance *cryptd_alloc_instance(struct crypto_alg *alg, static struct crypto_instance *cryptd_alloc_instance(struct crypto_alg *alg,
struct cryptd_queue *queue) unsigned int tail)
{ {
struct crypto_instance *inst; struct crypto_instance *inst;
struct cryptd_instance_ctx *ctx;
int err; int err;
inst = kzalloc(sizeof(*inst) + sizeof(*ctx), GFP_KERNEL); inst = kzalloc(sizeof(*inst) + tail, GFP_KERNEL);
if (!inst) { if (!inst) {
inst = ERR_PTR(-ENOMEM); inst = ERR_PTR(-ENOMEM);
goto out; goto out;
...@@ -267,14 +272,6 @@ static struct crypto_instance *cryptd_alloc_instance(struct crypto_alg *alg, ...@@ -267,14 +272,6 @@ static struct crypto_instance *cryptd_alloc_instance(struct crypto_alg *alg,
"cryptd(%s)", alg->cra_driver_name) >= CRYPTO_MAX_ALG_NAME) "cryptd(%s)", alg->cra_driver_name) >= CRYPTO_MAX_ALG_NAME)
goto out_free_inst; goto out_free_inst;
ctx = crypto_instance_ctx(inst);
err = crypto_init_spawn(&ctx->spawn, alg, inst,
CRYPTO_ALG_TYPE_MASK | CRYPTO_ALG_ASYNC);
if (err)
goto out_free_inst;
ctx->queue = queue;
memcpy(inst->alg.cra_name, alg->cra_name, CRYPTO_MAX_ALG_NAME); memcpy(inst->alg.cra_name, alg->cra_name, CRYPTO_MAX_ALG_NAME);
inst->alg.cra_priority = alg->cra_priority + 50; inst->alg.cra_priority = alg->cra_priority + 50;
...@@ -293,18 +290,28 @@ static struct crypto_instance *cryptd_alloc_instance(struct crypto_alg *alg, ...@@ -293,18 +290,28 @@ static struct crypto_instance *cryptd_alloc_instance(struct crypto_alg *alg,
static struct crypto_instance *cryptd_alloc_blkcipher( static struct crypto_instance *cryptd_alloc_blkcipher(
struct rtattr **tb, struct cryptd_queue *queue) struct rtattr **tb, struct cryptd_queue *queue)
{ {
struct cryptd_instance_ctx *ctx;
struct crypto_instance *inst; struct crypto_instance *inst;
struct crypto_alg *alg; struct crypto_alg *alg;
int err;
alg = crypto_get_attr_alg(tb, CRYPTO_ALG_TYPE_BLKCIPHER, alg = crypto_get_attr_alg(tb, CRYPTO_ALG_TYPE_BLKCIPHER,
CRYPTO_ALG_TYPE_MASK); CRYPTO_ALG_TYPE_MASK);
if (IS_ERR(alg)) if (IS_ERR(alg))
return ERR_CAST(alg); return ERR_CAST(alg);
inst = cryptd_alloc_instance(alg, queue); inst = cryptd_alloc_instance(alg, sizeof(*ctx));
if (IS_ERR(inst)) if (IS_ERR(inst))
goto out_put_alg; goto out_put_alg;
ctx = crypto_instance_ctx(inst);
ctx->queue = queue;
err = crypto_init_spawn(&ctx->spawn, alg, inst,
CRYPTO_ALG_TYPE_MASK | CRYPTO_ALG_ASYNC);
if (err)
goto out_free_inst;
inst->alg.cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC; inst->alg.cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC;
inst->alg.cra_type = &crypto_ablkcipher_type; inst->alg.cra_type = &crypto_ablkcipher_type;
...@@ -326,23 +333,28 @@ static struct crypto_instance *cryptd_alloc_blkcipher( ...@@ -326,23 +333,28 @@ static struct crypto_instance *cryptd_alloc_blkcipher(
out_put_alg: out_put_alg:
crypto_mod_put(alg); crypto_mod_put(alg);
return inst; return inst;
out_free_inst:
kfree(inst);
inst = ERR_PTR(err);
goto out_put_alg;
} }
static int cryptd_hash_init_tfm(struct crypto_tfm *tfm) static int cryptd_hash_init_tfm(struct crypto_tfm *tfm)
{ {
struct crypto_instance *inst = crypto_tfm_alg_instance(tfm); struct crypto_instance *inst = crypto_tfm_alg_instance(tfm);
struct cryptd_instance_ctx *ictx = crypto_instance_ctx(inst); struct hashd_instance_ctx *ictx = crypto_instance_ctx(inst);
struct crypto_spawn *spawn = &ictx->spawn; struct crypto_shash_spawn *spawn = &ictx->spawn;
struct cryptd_hash_ctx *ctx = crypto_tfm_ctx(tfm); struct cryptd_hash_ctx *ctx = crypto_tfm_ctx(tfm);
struct crypto_hash *cipher; struct crypto_shash *hash;
cipher = crypto_spawn_hash(spawn); hash = crypto_spawn_shash(spawn);
if (IS_ERR(cipher)) if (IS_ERR(hash))
return PTR_ERR(cipher); return PTR_ERR(hash);
ctx->child = cipher; ctx->child = hash;
tfm->crt_ahash.reqsize = tfm->crt_ahash.reqsize = sizeof(struct cryptd_hash_request_ctx) +
sizeof(struct cryptd_hash_request_ctx); crypto_shash_descsize(hash);
return 0; return 0;
} }
...@@ -350,22 +362,22 @@ static void cryptd_hash_exit_tfm(struct crypto_tfm *tfm) ...@@ -350,22 +362,22 @@ static void cryptd_hash_exit_tfm(struct crypto_tfm *tfm)
{ {
struct cryptd_hash_ctx *ctx = crypto_tfm_ctx(tfm); struct cryptd_hash_ctx *ctx = crypto_tfm_ctx(tfm);
crypto_free_hash(ctx->child); crypto_free_shash(ctx->child);
} }
static int cryptd_hash_setkey(struct crypto_ahash *parent, static int cryptd_hash_setkey(struct crypto_ahash *parent,
const u8 *key, unsigned int keylen) const u8 *key, unsigned int keylen)
{ {
struct cryptd_hash_ctx *ctx = crypto_ahash_ctx(parent); struct cryptd_hash_ctx *ctx = crypto_ahash_ctx(parent);
struct crypto_hash *child = ctx->child; struct crypto_shash *child = ctx->child;
int err; int err;
crypto_hash_clear_flags(child, CRYPTO_TFM_REQ_MASK); crypto_shash_clear_flags(child, CRYPTO_TFM_REQ_MASK);
crypto_hash_set_flags(child, crypto_ahash_get_flags(parent) & crypto_shash_set_flags(child, crypto_ahash_get_flags(parent) &
CRYPTO_TFM_REQ_MASK); CRYPTO_TFM_REQ_MASK);
err = crypto_hash_setkey(child, key, keylen); err = crypto_shash_setkey(child, key, keylen);
crypto_ahash_set_flags(parent, crypto_hash_get_flags(child) & crypto_ahash_set_flags(parent, crypto_shash_get_flags(child) &
CRYPTO_TFM_RES_MASK); CRYPTO_TFM_RES_MASK);
return err; return err;
} }
...@@ -385,21 +397,19 @@ static int cryptd_hash_enqueue(struct ahash_request *req, ...@@ -385,21 +397,19 @@ static int cryptd_hash_enqueue(struct ahash_request *req,
static void cryptd_hash_init(struct crypto_async_request *req_async, int err) static void cryptd_hash_init(struct crypto_async_request *req_async, int err)
{ {
struct cryptd_hash_ctx *ctx = crypto_tfm_ctx(req_async->tfm); struct cryptd_hash_ctx *ctx = crypto_tfm_ctx(req_async->tfm);
struct crypto_hash *child = ctx->child; struct crypto_shash *child = ctx->child;
struct ahash_request *req = ahash_request_cast(req_async); struct ahash_request *req = ahash_request_cast(req_async);
struct cryptd_hash_request_ctx *rctx; struct cryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
struct hash_desc desc; struct shash_desc *desc = &rctx->desc;
rctx = ahash_request_ctx(req);
if (unlikely(err == -EINPROGRESS)) if (unlikely(err == -EINPROGRESS))
goto out; goto out;
desc.tfm = child; desc->tfm = child;
desc.flags = CRYPTO_TFM_REQ_MAY_SLEEP; desc->flags = CRYPTO_TFM_REQ_MAY_SLEEP;
err = crypto_hash_crt(child)->init(&desc); err = crypto_shash_init(desc);
req->base.complete = rctx->complete; req->base.complete = rctx->complete;
...@@ -416,23 +426,15 @@ static int cryptd_hash_init_enqueue(struct ahash_request *req) ...@@ -416,23 +426,15 @@ static int cryptd_hash_init_enqueue(struct ahash_request *req)
static void cryptd_hash_update(struct crypto_async_request *req_async, int err) static void cryptd_hash_update(struct crypto_async_request *req_async, int err)
{ {
struct cryptd_hash_ctx *ctx = crypto_tfm_ctx(req_async->tfm); struct ahash_request *req = ahash_request_cast(req_async);
struct crypto_hash *child = ctx->child;
struct ahash_request *req = ahash_request_cast(req_async);
struct cryptd_hash_request_ctx *rctx; struct cryptd_hash_request_ctx *rctx;
struct hash_desc desc;
rctx = ahash_request_ctx(req); rctx = ahash_request_ctx(req);
if (unlikely(err == -EINPROGRESS)) if (unlikely(err == -EINPROGRESS))
goto out; goto out;
desc.tfm = child; err = shash_ahash_update(req, &rctx->desc);
desc.flags = CRYPTO_TFM_REQ_MAY_SLEEP;
err = crypto_hash_crt(child)->update(&desc,
req->src,
req->nbytes);
req->base.complete = rctx->complete; req->base.complete = rctx->complete;
...@@ -449,21 +451,13 @@ static int cryptd_hash_update_enqueue(struct ahash_request *req) ...@@ -449,21 +451,13 @@ static int cryptd_hash_update_enqueue(struct ahash_request *req)
static void cryptd_hash_final(struct crypto_async_request *req_async, int err) static void cryptd_hash_final(struct crypto_async_request *req_async, int err)
{ {
struct cryptd_hash_ctx *ctx = crypto_tfm_ctx(req_async->tfm); struct ahash_request *req = ahash_request_cast(req_async);
struct crypto_hash *child = ctx->child; struct cryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
struct ahash_request *req = ahash_request_cast(req_async);
struct cryptd_hash_request_ctx *rctx;
struct hash_desc desc;
rctx = ahash_request_ctx(req);
if (unlikely(err == -EINPROGRESS)) if (unlikely(err == -EINPROGRESS))
goto out; goto out;
desc.tfm = child; err = crypto_shash_final(&rctx->desc, req->result);
desc.flags = CRYPTO_TFM_REQ_MAY_SLEEP;
err = crypto_hash_crt(child)->final(&desc, req->result);
req->base.complete = rctx->complete; req->base.complete = rctx->complete;
...@@ -480,24 +474,19 @@ static int cryptd_hash_final_enqueue(struct ahash_request *req) ...@@ -480,24 +474,19 @@ static int cryptd_hash_final_enqueue(struct ahash_request *req)
static void cryptd_hash_digest(struct crypto_async_request *req_async, int err) static void cryptd_hash_digest(struct crypto_async_request *req_async, int err)
{ {
struct cryptd_hash_ctx *ctx = crypto_tfm_ctx(req_async->tfm); struct cryptd_hash_ctx *ctx = crypto_tfm_ctx(req_async->tfm);
struct crypto_hash *child = ctx->child; struct crypto_shash *child = ctx->child;
struct ahash_request *req = ahash_request_cast(req_async); struct ahash_request *req = ahash_request_cast(req_async);
struct cryptd_hash_request_ctx *rctx; struct cryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
struct hash_desc desc; struct shash_desc *desc = &rctx->desc;
rctx = ahash_request_ctx(req);
if (unlikely(err == -EINPROGRESS)) if (unlikely(err == -EINPROGRESS))
goto out; goto out;
desc.tfm = child; desc->tfm = child;
desc.flags = CRYPTO_TFM_REQ_MAY_SLEEP; desc->flags = CRYPTO_TFM_REQ_MAY_SLEEP;
err = crypto_hash_crt(child)->digest(&desc, err = shash_ahash_digest(req, desc);
req->src,
req->nbytes,
req->result);
req->base.complete = rctx->complete; req->base.complete = rctx->complete;
...@@ -515,22 +504,32 @@ static int cryptd_hash_digest_enqueue(struct ahash_request *req) ...@@ -515,22 +504,32 @@ static int cryptd_hash_digest_enqueue(struct ahash_request *req)
static struct crypto_instance *cryptd_alloc_hash( static struct crypto_instance *cryptd_alloc_hash(
struct rtattr **tb, struct cryptd_queue *queue) struct rtattr **tb, struct cryptd_queue *queue)
{ {
struct hashd_instance_ctx *ctx;
struct crypto_instance *inst; struct crypto_instance *inst;
struct shash_alg *salg;
struct crypto_alg *alg; struct crypto_alg *alg;
int err;
alg = crypto_get_attr_alg(tb, CRYPTO_ALG_TYPE_HASH, salg = shash_attr_alg(tb[1], 0, 0);
CRYPTO_ALG_TYPE_HASH_MASK); if (IS_ERR(salg))
if (IS_ERR(alg)) return ERR_CAST(salg);
return ERR_PTR(PTR_ERR(alg));
inst = cryptd_alloc_instance(alg, queue); alg = &salg->base;
inst = cryptd_alloc_instance(alg, sizeof(*ctx));
if (IS_ERR(inst)) if (IS_ERR(inst))
goto out_put_alg; goto out_put_alg;
ctx = crypto_instance_ctx(inst);
ctx->queue = queue;
err = crypto_init_shash_spawn(&ctx->spawn, salg, inst);
if (err)
goto out_free_inst;
inst->alg.cra_flags = CRYPTO_ALG_TYPE_AHASH | CRYPTO_ALG_ASYNC; inst->alg.cra_flags = CRYPTO_ALG_TYPE_AHASH | CRYPTO_ALG_ASYNC;
inst->alg.cra_type = &crypto_ahash_type; inst->alg.cra_type = &crypto_ahash_type;
inst->alg.cra_ahash.digestsize = alg->cra_hash.digestsize; inst->alg.cra_ahash.digestsize = salg->digestsize;
inst->alg.cra_ctxsize = sizeof(struct cryptd_hash_ctx); inst->alg.cra_ctxsize = sizeof(struct cryptd_hash_ctx);
inst->alg.cra_init = cryptd_hash_init_tfm; inst->alg.cra_init = cryptd_hash_init_tfm;
...@@ -545,6 +544,11 @@ static struct crypto_instance *cryptd_alloc_hash( ...@@ -545,6 +544,11 @@ static struct crypto_instance *cryptd_alloc_hash(
out_put_alg: out_put_alg:
crypto_mod_put(alg); crypto_mod_put(alg);
return inst; return inst;
out_free_inst:
kfree(inst);
inst = ERR_PTR(err);
goto out_put_alg;
} }
static struct cryptd_queue queue; static struct cryptd_queue queue;
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册