rng.c 4.9 KB
Newer Older
1 2 3 4 5 6
/*
 * Cryptographic API.
 *
 * RNG operations.
 *
 * Copyright (c) 2008 Neil Horman <nhorman@tuxdriver.com>
7
 * Copyright (c) 2015 Herbert Xu <herbert@gondor.apana.org.au>
8 9 10 11 12 13 14 15
 *
 * This program is free software; you can redistribute it and/or modify it
 * under the terms of the GNU General Public License as published by the Free
 * Software Foundation; either version 2 of the License, or (at your option)
 * any later version.
 *
 */

16
#include <linux/atomic.h>
17 18 19 20 21 22
#include <crypto/internal/rng.h>
#include <linux/err.h>
#include <linux/module.h>
#include <linux/mutex.h>
#include <linux/random.h>
#include <linux/seq_file.h>
23
#include <linux/slab.h>
24
#include <linux/string.h>
25
#include <linux/cryptouser.h>
26
#include <linux/compiler.h>
27
#include <net/netlink.h>
28

29 30
#include "internal.h"

31 32 33 34 35
static DEFINE_MUTEX(crypto_default_rng_lock);
struct crypto_rng *crypto_default_rng;
EXPORT_SYMBOL_GPL(crypto_default_rng);
static int crypto_default_rng_refcnt;

36
int crypto_rng_reset(struct crypto_rng *tfm, const u8 *seed, unsigned int slen)
37 38 39 40 41 42 43 44 45
{
	u8 *buf = NULL;
	int err;

	if (!seed && slen) {
		buf = kmalloc(slen, GFP_KERNEL);
		if (!buf)
			return -ENOMEM;

46 47 48
		err = get_random_bytes_wait(buf, slen);
		if (err)
			goto out;
49 50 51
		seed = buf;
	}

52
	err = crypto_rng_alg(tfm)->seed(tfm, seed, slen);
53
out:
54
	kzfree(buf);
55 56
	return err;
}
57
EXPORT_SYMBOL_GPL(crypto_rng_reset);
58

59
static int crypto_rng_init_tfm(struct crypto_tfm *tfm)
60 61 62 63
{
	return 0;
}

64 65 66 67
static unsigned int seedsize(struct crypto_alg *alg)
{
	struct rng_alg *ralg = container_of(alg, struct rng_alg, base);

68
	return ralg->seedsize;
69 70
}

71
#ifdef CONFIG_NET
72 73 74 75
static int crypto_rng_report(struct sk_buff *skb, struct crypto_alg *alg)
{
	struct crypto_report_rng rrng;

76
	strncpy(rrng.type, "rng", sizeof(rrng.type));
77

78
	rrng.seedsize = seedsize(alg);
79

80 81 82
	if (nla_put(skb, CRYPTOCFGA_REPORT_RNG,
		    sizeof(struct crypto_report_rng), &rrng))
		goto nla_put_failure;
83 84 85 86 87
	return 0;

nla_put_failure:
	return -EMSGSIZE;
}
88 89 90 91 92 93
#else
static int crypto_rng_report(struct sk_buff *skb, struct crypto_alg *alg)
{
	return -ENOSYS;
}
#endif
94

95
static void crypto_rng_show(struct seq_file *m, struct crypto_alg *alg)
96
	__maybe_unused;
97 98 99
static void crypto_rng_show(struct seq_file *m, struct crypto_alg *alg)
{
	seq_printf(m, "type         : rng\n");
100
	seq_printf(m, "seedsize     : %u\n", seedsize(alg));
101 102
}

103
static const struct crypto_type crypto_rng_type = {
104 105
	.extsize = crypto_alg_extsize,
	.init_tfm = crypto_rng_init_tfm,
106 107 108
#ifdef CONFIG_PROC_FS
	.show = crypto_rng_show,
#endif
109
	.report = crypto_rng_report,
110 111 112 113
	.maskclear = ~CRYPTO_ALG_TYPE_MASK,
	.maskset = CRYPTO_ALG_TYPE_MASK,
	.type = CRYPTO_ALG_TYPE_RNG,
	.tfmsize = offsetof(struct crypto_rng, base),
114 115
};

116 117 118 119 120 121
struct crypto_rng *crypto_alloc_rng(const char *alg_name, u32 type, u32 mask)
{
	return crypto_alloc_tfm(alg_name, &crypto_rng_type, type, mask);
}
EXPORT_SYMBOL_GPL(crypto_alloc_rng);

122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155
int crypto_get_default_rng(void)
{
	struct crypto_rng *rng;
	int err;

	mutex_lock(&crypto_default_rng_lock);
	if (!crypto_default_rng) {
		rng = crypto_alloc_rng("stdrng", 0, 0);
		err = PTR_ERR(rng);
		if (IS_ERR(rng))
			goto unlock;

		err = crypto_rng_reset(rng, NULL, crypto_rng_seedsize(rng));
		if (err) {
			crypto_free_rng(rng);
			goto unlock;
		}

		crypto_default_rng = rng;
	}

	crypto_default_rng_refcnt++;
	err = 0;

unlock:
	mutex_unlock(&crypto_default_rng_lock);

	return err;
}
EXPORT_SYMBOL_GPL(crypto_get_default_rng);

void crypto_put_default_rng(void)
{
	mutex_lock(&crypto_default_rng_lock);
156
	crypto_default_rng_refcnt--;
157 158 159 160
	mutex_unlock(&crypto_default_rng_lock);
}
EXPORT_SYMBOL_GPL(crypto_put_default_rng);

161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182
#if defined(CONFIG_CRYPTO_RNG) || defined(CONFIG_CRYPTO_RNG_MODULE)
int crypto_del_default_rng(void)
{
	int err = -EBUSY;

	mutex_lock(&crypto_default_rng_lock);
	if (crypto_default_rng_refcnt)
		goto out;

	crypto_free_rng(crypto_default_rng);
	crypto_default_rng = NULL;

	err = 0;

out:
	mutex_unlock(&crypto_default_rng_lock);

	return err;
}
EXPORT_SYMBOL_GPL(crypto_del_default_rng);
#endif

183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203
int crypto_register_rng(struct rng_alg *alg)
{
	struct crypto_alg *base = &alg->base;

	if (alg->seedsize > PAGE_SIZE / 8)
		return -EINVAL;

	base->cra_type = &crypto_rng_type;
	base->cra_flags &= ~CRYPTO_ALG_TYPE_MASK;
	base->cra_flags |= CRYPTO_ALG_TYPE_RNG;

	return crypto_register_alg(base);
}
EXPORT_SYMBOL_GPL(crypto_register_rng);

void crypto_unregister_rng(struct rng_alg *alg)
{
	crypto_unregister_alg(&alg->base);
}
EXPORT_SYMBOL_GPL(crypto_unregister_rng);

204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232
int crypto_register_rngs(struct rng_alg *algs, int count)
{
	int i, ret;

	for (i = 0; i < count; i++) {
		ret = crypto_register_rng(algs + i);
		if (ret)
			goto err;
	}

	return 0;

err:
	for (--i; i >= 0; --i)
		crypto_unregister_rng(algs + i);

	return ret;
}
EXPORT_SYMBOL_GPL(crypto_register_rngs);

void crypto_unregister_rngs(struct rng_alg *algs, int count)
{
	int i;

	for (i = count - 1; i >= 0; --i)
		crypto_unregister_rng(algs + i);
}
EXPORT_SYMBOL_GPL(crypto_unregister_rngs);

233
MODULE_LICENSE("GPL");
Christian Kujau's avatar
Christian Kujau committed
234
MODULE_DESCRIPTION("Random Number Generator");