digest.c 3.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157
  1. /*
  2. * Cryptographic API.
  3. *
  4. * Digest operations.
  5. *
  6. * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
  7. *
  8. * This program is free software; you can redistribute it and/or modify it
  9. * under the terms of the GNU General Public License as published by the Free
  10. * Software Foundation; either version 2 of the License, or (at your option)
  11. * any later version.
  12. *
  13. */
  14. #include <crypto/scatterwalk.h>
  15. #include <linux/mm.h>
  16. #include <linux/errno.h>
  17. #include <linux/hardirq.h>
  18. #include <linux/highmem.h>
  19. #include <linux/kernel.h>
  20. #include <linux/module.h>
  21. #include <linux/scatterlist.h>
  22. static int init(struct hash_desc *desc)
  23. {
  24. struct crypto_tfm *tfm = crypto_hash_tfm(desc->tfm);
  25. tfm->__crt_alg->cra_digest.dia_init(tfm);
  26. return 0;
  27. }
  28. static int update2(struct hash_desc *desc,
  29. struct scatterlist *sg, unsigned int nbytes)
  30. {
  31. struct crypto_tfm *tfm = crypto_hash_tfm(desc->tfm);
  32. unsigned int alignmask = crypto_tfm_alg_alignmask(tfm);
  33. if (!nbytes)
  34. return 0;
  35. for (;;) {
  36. struct page *pg = sg_page(sg);
  37. unsigned int offset = sg->offset;
  38. unsigned int l = sg->length;
  39. if (unlikely(l > nbytes))
  40. l = nbytes;
  41. nbytes -= l;
  42. do {
  43. unsigned int bytes_from_page = min(l, ((unsigned int)
  44. (PAGE_SIZE)) -
  45. offset);
  46. char *src = crypto_kmap(pg, 0);
  47. char *p = src + offset;
  48. if (unlikely(offset & alignmask)) {
  49. unsigned int bytes =
  50. alignmask + 1 - (offset & alignmask);
  51. bytes = min(bytes, bytes_from_page);
  52. tfm->__crt_alg->cra_digest.dia_update(tfm, p,
  53. bytes);
  54. p += bytes;
  55. bytes_from_page -= bytes;
  56. l -= bytes;
  57. }
  58. tfm->__crt_alg->cra_digest.dia_update(tfm, p,
  59. bytes_from_page);
  60. crypto_kunmap(src, 0);
  61. crypto_yield(desc->flags);
  62. offset = 0;
  63. pg++;
  64. l -= bytes_from_page;
  65. } while (l > 0);
  66. if (!nbytes)
  67. break;
  68. sg = scatterwalk_sg_next(sg);
  69. }
  70. return 0;
  71. }
  72. static int update(struct hash_desc *desc,
  73. struct scatterlist *sg, unsigned int nbytes)
  74. {
  75. if (WARN_ON_ONCE(in_irq()))
  76. return -EDEADLK;
  77. return update2(desc, sg, nbytes);
  78. }
  79. static int final(struct hash_desc *desc, u8 *out)
  80. {
  81. struct crypto_tfm *tfm = crypto_hash_tfm(desc->tfm);
  82. unsigned long alignmask = crypto_tfm_alg_alignmask(tfm);
  83. struct digest_alg *digest = &tfm->__crt_alg->cra_digest;
  84. if (unlikely((unsigned long)out & alignmask)) {
  85. unsigned long align = alignmask + 1;
  86. unsigned long addr = (unsigned long)crypto_tfm_ctx(tfm);
  87. u8 *dst = (u8 *)ALIGN(addr, align) +
  88. ALIGN(tfm->__crt_alg->cra_ctxsize, align);
  89. digest->dia_final(tfm, dst);
  90. memcpy(out, dst, digest->dia_digestsize);
  91. } else
  92. digest->dia_final(tfm, out);
  93. return 0;
  94. }
  95. static int nosetkey(struct crypto_hash *tfm, const u8 *key, unsigned int keylen)
  96. {
  97. crypto_hash_clear_flags(tfm, CRYPTO_TFM_RES_MASK);
  98. return -ENOSYS;
  99. }
  100. static int setkey(struct crypto_hash *hash, const u8 *key, unsigned int keylen)
  101. {
  102. struct crypto_tfm *tfm = crypto_hash_tfm(hash);
  103. crypto_hash_clear_flags(hash, CRYPTO_TFM_RES_MASK);
  104. return tfm->__crt_alg->cra_digest.dia_setkey(tfm, key, keylen);
  105. }
  106. static int digest(struct hash_desc *desc,
  107. struct scatterlist *sg, unsigned int nbytes, u8 *out)
  108. {
  109. if (WARN_ON_ONCE(in_irq()))
  110. return -EDEADLK;
  111. init(desc);
  112. update2(desc, sg, nbytes);
  113. return final(desc, out);
  114. }
  115. int crypto_init_digest_ops(struct crypto_tfm *tfm)
  116. {
  117. struct hash_tfm *ops = &tfm->crt_hash;
  118. struct digest_alg *dalg = &tfm->__crt_alg->cra_digest;
  119. if (dalg->dia_digestsize > crypto_tfm_alg_blocksize(tfm))
  120. return -EINVAL;
  121. ops->init = init;
  122. ops->update = update;
  123. ops->final = final;
  124. ops->digest = digest;
  125. ops->setkey = dalg->dia_setkey ? setkey : nosetkey;
  126. ops->digestsize = dalg->dia_digestsize;
  127. return 0;
  128. }
  129. void crypto_exit_digest_ops(struct crypto_tfm *tfm)
  130. {
  131. }