18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later 28c2ecf20Sopenharmony_ci/* 38c2ecf20Sopenharmony_ci * algif_hash: User-space interface for hash algorithms 48c2ecf20Sopenharmony_ci * 58c2ecf20Sopenharmony_ci * This file provides the user-space API for hash algorithms. 68c2ecf20Sopenharmony_ci * 78c2ecf20Sopenharmony_ci * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au> 88c2ecf20Sopenharmony_ci */ 98c2ecf20Sopenharmony_ci 108c2ecf20Sopenharmony_ci#include <crypto/hash.h> 118c2ecf20Sopenharmony_ci#include <crypto/if_alg.h> 128c2ecf20Sopenharmony_ci#include <linux/init.h> 138c2ecf20Sopenharmony_ci#include <linux/kernel.h> 148c2ecf20Sopenharmony_ci#include <linux/mm.h> 158c2ecf20Sopenharmony_ci#include <linux/module.h> 168c2ecf20Sopenharmony_ci#include <linux/net.h> 178c2ecf20Sopenharmony_ci#include <net/sock.h> 188c2ecf20Sopenharmony_ci 198c2ecf20Sopenharmony_cistruct hash_ctx { 208c2ecf20Sopenharmony_ci struct af_alg_sgl sgl; 218c2ecf20Sopenharmony_ci 228c2ecf20Sopenharmony_ci u8 *result; 238c2ecf20Sopenharmony_ci 248c2ecf20Sopenharmony_ci struct crypto_wait wait; 258c2ecf20Sopenharmony_ci 268c2ecf20Sopenharmony_ci unsigned int len; 278c2ecf20Sopenharmony_ci bool more; 288c2ecf20Sopenharmony_ci 298c2ecf20Sopenharmony_ci struct ahash_request req; 308c2ecf20Sopenharmony_ci}; 318c2ecf20Sopenharmony_ci 328c2ecf20Sopenharmony_cistatic int hash_alloc_result(struct sock *sk, struct hash_ctx *ctx) 338c2ecf20Sopenharmony_ci{ 348c2ecf20Sopenharmony_ci unsigned ds; 358c2ecf20Sopenharmony_ci 368c2ecf20Sopenharmony_ci if (ctx->result) 378c2ecf20Sopenharmony_ci return 0; 388c2ecf20Sopenharmony_ci 398c2ecf20Sopenharmony_ci ds = crypto_ahash_digestsize(crypto_ahash_reqtfm(&ctx->req)); 408c2ecf20Sopenharmony_ci 418c2ecf20Sopenharmony_ci ctx->result = sock_kmalloc(sk, ds, GFP_KERNEL); 428c2ecf20Sopenharmony_ci if (!ctx->result) 438c2ecf20Sopenharmony_ci return -ENOMEM; 448c2ecf20Sopenharmony_ci 458c2ecf20Sopenharmony_ci memset(ctx->result, 0, ds); 468c2ecf20Sopenharmony_ci 478c2ecf20Sopenharmony_ci return 0; 488c2ecf20Sopenharmony_ci} 498c2ecf20Sopenharmony_ci 508c2ecf20Sopenharmony_cistatic void hash_free_result(struct sock *sk, struct hash_ctx *ctx) 518c2ecf20Sopenharmony_ci{ 528c2ecf20Sopenharmony_ci unsigned ds; 538c2ecf20Sopenharmony_ci 548c2ecf20Sopenharmony_ci if (!ctx->result) 558c2ecf20Sopenharmony_ci return; 568c2ecf20Sopenharmony_ci 578c2ecf20Sopenharmony_ci ds = crypto_ahash_digestsize(crypto_ahash_reqtfm(&ctx->req)); 588c2ecf20Sopenharmony_ci 598c2ecf20Sopenharmony_ci sock_kzfree_s(sk, ctx->result, ds); 608c2ecf20Sopenharmony_ci ctx->result = NULL; 618c2ecf20Sopenharmony_ci} 628c2ecf20Sopenharmony_ci 638c2ecf20Sopenharmony_cistatic int hash_sendmsg(struct socket *sock, struct msghdr *msg, 648c2ecf20Sopenharmony_ci size_t ignored) 658c2ecf20Sopenharmony_ci{ 668c2ecf20Sopenharmony_ci int limit = ALG_MAX_PAGES * PAGE_SIZE; 678c2ecf20Sopenharmony_ci struct sock *sk = sock->sk; 688c2ecf20Sopenharmony_ci struct alg_sock *ask = alg_sk(sk); 698c2ecf20Sopenharmony_ci struct hash_ctx *ctx = ask->private; 708c2ecf20Sopenharmony_ci long copied = 0; 718c2ecf20Sopenharmony_ci int err; 728c2ecf20Sopenharmony_ci 738c2ecf20Sopenharmony_ci if (limit > sk->sk_sndbuf) 748c2ecf20Sopenharmony_ci limit = sk->sk_sndbuf; 758c2ecf20Sopenharmony_ci 768c2ecf20Sopenharmony_ci lock_sock(sk); 778c2ecf20Sopenharmony_ci if (!ctx->more) { 788c2ecf20Sopenharmony_ci if ((msg->msg_flags & MSG_MORE)) 798c2ecf20Sopenharmony_ci hash_free_result(sk, ctx); 808c2ecf20Sopenharmony_ci 818c2ecf20Sopenharmony_ci err = crypto_wait_req(crypto_ahash_init(&ctx->req), &ctx->wait); 828c2ecf20Sopenharmony_ci if (err) 838c2ecf20Sopenharmony_ci goto unlock; 848c2ecf20Sopenharmony_ci } 858c2ecf20Sopenharmony_ci 868c2ecf20Sopenharmony_ci ctx->more = false; 878c2ecf20Sopenharmony_ci 888c2ecf20Sopenharmony_ci while (msg_data_left(msg)) { 898c2ecf20Sopenharmony_ci int len = msg_data_left(msg); 908c2ecf20Sopenharmony_ci 918c2ecf20Sopenharmony_ci if (len > limit) 928c2ecf20Sopenharmony_ci len = limit; 938c2ecf20Sopenharmony_ci 948c2ecf20Sopenharmony_ci len = af_alg_make_sg(&ctx->sgl, &msg->msg_iter, len); 958c2ecf20Sopenharmony_ci if (len < 0) { 968c2ecf20Sopenharmony_ci err = copied ? 0 : len; 978c2ecf20Sopenharmony_ci goto unlock; 988c2ecf20Sopenharmony_ci } 998c2ecf20Sopenharmony_ci 1008c2ecf20Sopenharmony_ci ahash_request_set_crypt(&ctx->req, ctx->sgl.sg, NULL, len); 1018c2ecf20Sopenharmony_ci 1028c2ecf20Sopenharmony_ci err = crypto_wait_req(crypto_ahash_update(&ctx->req), 1038c2ecf20Sopenharmony_ci &ctx->wait); 1048c2ecf20Sopenharmony_ci af_alg_free_sg(&ctx->sgl); 1058c2ecf20Sopenharmony_ci if (err) 1068c2ecf20Sopenharmony_ci goto unlock; 1078c2ecf20Sopenharmony_ci 1088c2ecf20Sopenharmony_ci copied += len; 1098c2ecf20Sopenharmony_ci iov_iter_advance(&msg->msg_iter, len); 1108c2ecf20Sopenharmony_ci } 1118c2ecf20Sopenharmony_ci 1128c2ecf20Sopenharmony_ci err = 0; 1138c2ecf20Sopenharmony_ci 1148c2ecf20Sopenharmony_ci ctx->more = msg->msg_flags & MSG_MORE; 1158c2ecf20Sopenharmony_ci if (!ctx->more) { 1168c2ecf20Sopenharmony_ci err = hash_alloc_result(sk, ctx); 1178c2ecf20Sopenharmony_ci if (err) 1188c2ecf20Sopenharmony_ci goto unlock; 1198c2ecf20Sopenharmony_ci 1208c2ecf20Sopenharmony_ci ahash_request_set_crypt(&ctx->req, NULL, ctx->result, 0); 1218c2ecf20Sopenharmony_ci err = crypto_wait_req(crypto_ahash_final(&ctx->req), 1228c2ecf20Sopenharmony_ci &ctx->wait); 1238c2ecf20Sopenharmony_ci } 1248c2ecf20Sopenharmony_ci 1258c2ecf20Sopenharmony_ciunlock: 1268c2ecf20Sopenharmony_ci release_sock(sk); 1278c2ecf20Sopenharmony_ci 1288c2ecf20Sopenharmony_ci return err ?: copied; 1298c2ecf20Sopenharmony_ci} 1308c2ecf20Sopenharmony_ci 1318c2ecf20Sopenharmony_cistatic ssize_t hash_sendpage(struct socket *sock, struct page *page, 1328c2ecf20Sopenharmony_ci int offset, size_t size, int flags) 1338c2ecf20Sopenharmony_ci{ 1348c2ecf20Sopenharmony_ci struct sock *sk = sock->sk; 1358c2ecf20Sopenharmony_ci struct alg_sock *ask = alg_sk(sk); 1368c2ecf20Sopenharmony_ci struct hash_ctx *ctx = ask->private; 1378c2ecf20Sopenharmony_ci int err; 1388c2ecf20Sopenharmony_ci 1398c2ecf20Sopenharmony_ci if (flags & MSG_SENDPAGE_NOTLAST) 1408c2ecf20Sopenharmony_ci flags |= MSG_MORE; 1418c2ecf20Sopenharmony_ci 1428c2ecf20Sopenharmony_ci lock_sock(sk); 1438c2ecf20Sopenharmony_ci sg_init_table(ctx->sgl.sg, 1); 1448c2ecf20Sopenharmony_ci sg_set_page(ctx->sgl.sg, page, size, offset); 1458c2ecf20Sopenharmony_ci 1468c2ecf20Sopenharmony_ci if (!(flags & MSG_MORE)) { 1478c2ecf20Sopenharmony_ci err = hash_alloc_result(sk, ctx); 1488c2ecf20Sopenharmony_ci if (err) 1498c2ecf20Sopenharmony_ci goto unlock; 1508c2ecf20Sopenharmony_ci } else if (!ctx->more) 1518c2ecf20Sopenharmony_ci hash_free_result(sk, ctx); 1528c2ecf20Sopenharmony_ci 1538c2ecf20Sopenharmony_ci ahash_request_set_crypt(&ctx->req, ctx->sgl.sg, ctx->result, size); 1548c2ecf20Sopenharmony_ci 1558c2ecf20Sopenharmony_ci if (!(flags & MSG_MORE)) { 1568c2ecf20Sopenharmony_ci if (ctx->more) 1578c2ecf20Sopenharmony_ci err = crypto_ahash_finup(&ctx->req); 1588c2ecf20Sopenharmony_ci else 1598c2ecf20Sopenharmony_ci err = crypto_ahash_digest(&ctx->req); 1608c2ecf20Sopenharmony_ci } else { 1618c2ecf20Sopenharmony_ci if (!ctx->more) { 1628c2ecf20Sopenharmony_ci err = crypto_ahash_init(&ctx->req); 1638c2ecf20Sopenharmony_ci err = crypto_wait_req(err, &ctx->wait); 1648c2ecf20Sopenharmony_ci if (err) 1658c2ecf20Sopenharmony_ci goto unlock; 1668c2ecf20Sopenharmony_ci } 1678c2ecf20Sopenharmony_ci 1688c2ecf20Sopenharmony_ci err = crypto_ahash_update(&ctx->req); 1698c2ecf20Sopenharmony_ci } 1708c2ecf20Sopenharmony_ci 1718c2ecf20Sopenharmony_ci err = crypto_wait_req(err, &ctx->wait); 1728c2ecf20Sopenharmony_ci if (err) 1738c2ecf20Sopenharmony_ci goto unlock; 1748c2ecf20Sopenharmony_ci 1758c2ecf20Sopenharmony_ci ctx->more = flags & MSG_MORE; 1768c2ecf20Sopenharmony_ci 1778c2ecf20Sopenharmony_ciunlock: 1788c2ecf20Sopenharmony_ci release_sock(sk); 1798c2ecf20Sopenharmony_ci 1808c2ecf20Sopenharmony_ci return err ?: size; 1818c2ecf20Sopenharmony_ci} 1828c2ecf20Sopenharmony_ci 1838c2ecf20Sopenharmony_cistatic int hash_recvmsg(struct socket *sock, struct msghdr *msg, size_t len, 1848c2ecf20Sopenharmony_ci int flags) 1858c2ecf20Sopenharmony_ci{ 1868c2ecf20Sopenharmony_ci struct sock *sk = sock->sk; 1878c2ecf20Sopenharmony_ci struct alg_sock *ask = alg_sk(sk); 1888c2ecf20Sopenharmony_ci struct hash_ctx *ctx = ask->private; 1898c2ecf20Sopenharmony_ci unsigned ds = crypto_ahash_digestsize(crypto_ahash_reqtfm(&ctx->req)); 1908c2ecf20Sopenharmony_ci bool result; 1918c2ecf20Sopenharmony_ci int err; 1928c2ecf20Sopenharmony_ci 1938c2ecf20Sopenharmony_ci if (len > ds) 1948c2ecf20Sopenharmony_ci len = ds; 1958c2ecf20Sopenharmony_ci else if (len < ds) 1968c2ecf20Sopenharmony_ci msg->msg_flags |= MSG_TRUNC; 1978c2ecf20Sopenharmony_ci 1988c2ecf20Sopenharmony_ci lock_sock(sk); 1998c2ecf20Sopenharmony_ci result = ctx->result; 2008c2ecf20Sopenharmony_ci err = hash_alloc_result(sk, ctx); 2018c2ecf20Sopenharmony_ci if (err) 2028c2ecf20Sopenharmony_ci goto unlock; 2038c2ecf20Sopenharmony_ci 2048c2ecf20Sopenharmony_ci ahash_request_set_crypt(&ctx->req, NULL, ctx->result, 0); 2058c2ecf20Sopenharmony_ci 2068c2ecf20Sopenharmony_ci if (!result && !ctx->more) { 2078c2ecf20Sopenharmony_ci err = crypto_wait_req(crypto_ahash_init(&ctx->req), 2088c2ecf20Sopenharmony_ci &ctx->wait); 2098c2ecf20Sopenharmony_ci if (err) 2108c2ecf20Sopenharmony_ci goto unlock; 2118c2ecf20Sopenharmony_ci } 2128c2ecf20Sopenharmony_ci 2138c2ecf20Sopenharmony_ci if (!result || ctx->more) { 2148c2ecf20Sopenharmony_ci ctx->more = false; 2158c2ecf20Sopenharmony_ci err = crypto_wait_req(crypto_ahash_final(&ctx->req), 2168c2ecf20Sopenharmony_ci &ctx->wait); 2178c2ecf20Sopenharmony_ci if (err) 2188c2ecf20Sopenharmony_ci goto unlock; 2198c2ecf20Sopenharmony_ci } 2208c2ecf20Sopenharmony_ci 2218c2ecf20Sopenharmony_ci err = memcpy_to_msg(msg, ctx->result, len); 2228c2ecf20Sopenharmony_ci 2238c2ecf20Sopenharmony_ciunlock: 2248c2ecf20Sopenharmony_ci hash_free_result(sk, ctx); 2258c2ecf20Sopenharmony_ci release_sock(sk); 2268c2ecf20Sopenharmony_ci 2278c2ecf20Sopenharmony_ci return err ?: len; 2288c2ecf20Sopenharmony_ci} 2298c2ecf20Sopenharmony_ci 2308c2ecf20Sopenharmony_cistatic int hash_accept(struct socket *sock, struct socket *newsock, int flags, 2318c2ecf20Sopenharmony_ci bool kern) 2328c2ecf20Sopenharmony_ci{ 2338c2ecf20Sopenharmony_ci struct sock *sk = sock->sk; 2348c2ecf20Sopenharmony_ci struct alg_sock *ask = alg_sk(sk); 2358c2ecf20Sopenharmony_ci struct hash_ctx *ctx = ask->private; 2368c2ecf20Sopenharmony_ci struct ahash_request *req = &ctx->req; 2378c2ecf20Sopenharmony_ci char state[HASH_MAX_STATESIZE]; 2388c2ecf20Sopenharmony_ci struct sock *sk2; 2398c2ecf20Sopenharmony_ci struct alg_sock *ask2; 2408c2ecf20Sopenharmony_ci struct hash_ctx *ctx2; 2418c2ecf20Sopenharmony_ci bool more; 2428c2ecf20Sopenharmony_ci int err; 2438c2ecf20Sopenharmony_ci 2448c2ecf20Sopenharmony_ci lock_sock(sk); 2458c2ecf20Sopenharmony_ci more = ctx->more; 2468c2ecf20Sopenharmony_ci err = more ? crypto_ahash_export(req, state) : 0; 2478c2ecf20Sopenharmony_ci release_sock(sk); 2488c2ecf20Sopenharmony_ci 2498c2ecf20Sopenharmony_ci if (err) 2508c2ecf20Sopenharmony_ci return err; 2518c2ecf20Sopenharmony_ci 2528c2ecf20Sopenharmony_ci err = af_alg_accept(ask->parent, newsock, kern); 2538c2ecf20Sopenharmony_ci if (err) 2548c2ecf20Sopenharmony_ci return err; 2558c2ecf20Sopenharmony_ci 2568c2ecf20Sopenharmony_ci sk2 = newsock->sk; 2578c2ecf20Sopenharmony_ci ask2 = alg_sk(sk2); 2588c2ecf20Sopenharmony_ci ctx2 = ask2->private; 2598c2ecf20Sopenharmony_ci ctx2->more = more; 2608c2ecf20Sopenharmony_ci 2618c2ecf20Sopenharmony_ci if (!more) 2628c2ecf20Sopenharmony_ci return err; 2638c2ecf20Sopenharmony_ci 2648c2ecf20Sopenharmony_ci err = crypto_ahash_import(&ctx2->req, state); 2658c2ecf20Sopenharmony_ci if (err) { 2668c2ecf20Sopenharmony_ci sock_orphan(sk2); 2678c2ecf20Sopenharmony_ci sock_put(sk2); 2688c2ecf20Sopenharmony_ci } 2698c2ecf20Sopenharmony_ci 2708c2ecf20Sopenharmony_ci return err; 2718c2ecf20Sopenharmony_ci} 2728c2ecf20Sopenharmony_ci 2738c2ecf20Sopenharmony_cistatic struct proto_ops algif_hash_ops = { 2748c2ecf20Sopenharmony_ci .family = PF_ALG, 2758c2ecf20Sopenharmony_ci 2768c2ecf20Sopenharmony_ci .connect = sock_no_connect, 2778c2ecf20Sopenharmony_ci .socketpair = sock_no_socketpair, 2788c2ecf20Sopenharmony_ci .getname = sock_no_getname, 2798c2ecf20Sopenharmony_ci .ioctl = sock_no_ioctl, 2808c2ecf20Sopenharmony_ci .listen = sock_no_listen, 2818c2ecf20Sopenharmony_ci .shutdown = sock_no_shutdown, 2828c2ecf20Sopenharmony_ci .mmap = sock_no_mmap, 2838c2ecf20Sopenharmony_ci .bind = sock_no_bind, 2848c2ecf20Sopenharmony_ci 2858c2ecf20Sopenharmony_ci .release = af_alg_release, 2868c2ecf20Sopenharmony_ci .sendmsg = hash_sendmsg, 2878c2ecf20Sopenharmony_ci .sendpage = hash_sendpage, 2888c2ecf20Sopenharmony_ci .recvmsg = hash_recvmsg, 2898c2ecf20Sopenharmony_ci .accept = hash_accept, 2908c2ecf20Sopenharmony_ci}; 2918c2ecf20Sopenharmony_ci 2928c2ecf20Sopenharmony_cistatic int hash_check_key(struct socket *sock) 2938c2ecf20Sopenharmony_ci{ 2948c2ecf20Sopenharmony_ci int err = 0; 2958c2ecf20Sopenharmony_ci struct sock *psk; 2968c2ecf20Sopenharmony_ci struct alg_sock *pask; 2978c2ecf20Sopenharmony_ci struct crypto_ahash *tfm; 2988c2ecf20Sopenharmony_ci struct sock *sk = sock->sk; 2998c2ecf20Sopenharmony_ci struct alg_sock *ask = alg_sk(sk); 3008c2ecf20Sopenharmony_ci 3018c2ecf20Sopenharmony_ci lock_sock(sk); 3028c2ecf20Sopenharmony_ci if (!atomic_read(&ask->nokey_refcnt)) 3038c2ecf20Sopenharmony_ci goto unlock_child; 3048c2ecf20Sopenharmony_ci 3058c2ecf20Sopenharmony_ci psk = ask->parent; 3068c2ecf20Sopenharmony_ci pask = alg_sk(ask->parent); 3078c2ecf20Sopenharmony_ci tfm = pask->private; 3088c2ecf20Sopenharmony_ci 3098c2ecf20Sopenharmony_ci err = -ENOKEY; 3108c2ecf20Sopenharmony_ci lock_sock_nested(psk, SINGLE_DEPTH_NESTING); 3118c2ecf20Sopenharmony_ci if (crypto_ahash_get_flags(tfm) & CRYPTO_TFM_NEED_KEY) 3128c2ecf20Sopenharmony_ci goto unlock; 3138c2ecf20Sopenharmony_ci 3148c2ecf20Sopenharmony_ci atomic_dec(&pask->nokey_refcnt); 3158c2ecf20Sopenharmony_ci atomic_set(&ask->nokey_refcnt, 0); 3168c2ecf20Sopenharmony_ci 3178c2ecf20Sopenharmony_ci err = 0; 3188c2ecf20Sopenharmony_ci 3198c2ecf20Sopenharmony_ciunlock: 3208c2ecf20Sopenharmony_ci release_sock(psk); 3218c2ecf20Sopenharmony_ciunlock_child: 3228c2ecf20Sopenharmony_ci release_sock(sk); 3238c2ecf20Sopenharmony_ci 3248c2ecf20Sopenharmony_ci return err; 3258c2ecf20Sopenharmony_ci} 3268c2ecf20Sopenharmony_ci 3278c2ecf20Sopenharmony_cistatic int hash_sendmsg_nokey(struct socket *sock, struct msghdr *msg, 3288c2ecf20Sopenharmony_ci size_t size) 3298c2ecf20Sopenharmony_ci{ 3308c2ecf20Sopenharmony_ci int err; 3318c2ecf20Sopenharmony_ci 3328c2ecf20Sopenharmony_ci err = hash_check_key(sock); 3338c2ecf20Sopenharmony_ci if (err) 3348c2ecf20Sopenharmony_ci return err; 3358c2ecf20Sopenharmony_ci 3368c2ecf20Sopenharmony_ci return hash_sendmsg(sock, msg, size); 3378c2ecf20Sopenharmony_ci} 3388c2ecf20Sopenharmony_ci 3398c2ecf20Sopenharmony_cistatic ssize_t hash_sendpage_nokey(struct socket *sock, struct page *page, 3408c2ecf20Sopenharmony_ci int offset, size_t size, int flags) 3418c2ecf20Sopenharmony_ci{ 3428c2ecf20Sopenharmony_ci int err; 3438c2ecf20Sopenharmony_ci 3448c2ecf20Sopenharmony_ci err = hash_check_key(sock); 3458c2ecf20Sopenharmony_ci if (err) 3468c2ecf20Sopenharmony_ci return err; 3478c2ecf20Sopenharmony_ci 3488c2ecf20Sopenharmony_ci return hash_sendpage(sock, page, offset, size, flags); 3498c2ecf20Sopenharmony_ci} 3508c2ecf20Sopenharmony_ci 3518c2ecf20Sopenharmony_cistatic int hash_recvmsg_nokey(struct socket *sock, struct msghdr *msg, 3528c2ecf20Sopenharmony_ci size_t ignored, int flags) 3538c2ecf20Sopenharmony_ci{ 3548c2ecf20Sopenharmony_ci int err; 3558c2ecf20Sopenharmony_ci 3568c2ecf20Sopenharmony_ci err = hash_check_key(sock); 3578c2ecf20Sopenharmony_ci if (err) 3588c2ecf20Sopenharmony_ci return err; 3598c2ecf20Sopenharmony_ci 3608c2ecf20Sopenharmony_ci return hash_recvmsg(sock, msg, ignored, flags); 3618c2ecf20Sopenharmony_ci} 3628c2ecf20Sopenharmony_ci 3638c2ecf20Sopenharmony_cistatic int hash_accept_nokey(struct socket *sock, struct socket *newsock, 3648c2ecf20Sopenharmony_ci int flags, bool kern) 3658c2ecf20Sopenharmony_ci{ 3668c2ecf20Sopenharmony_ci int err; 3678c2ecf20Sopenharmony_ci 3688c2ecf20Sopenharmony_ci err = hash_check_key(sock); 3698c2ecf20Sopenharmony_ci if (err) 3708c2ecf20Sopenharmony_ci return err; 3718c2ecf20Sopenharmony_ci 3728c2ecf20Sopenharmony_ci return hash_accept(sock, newsock, flags, kern); 3738c2ecf20Sopenharmony_ci} 3748c2ecf20Sopenharmony_ci 3758c2ecf20Sopenharmony_cistatic struct proto_ops algif_hash_ops_nokey = { 3768c2ecf20Sopenharmony_ci .family = PF_ALG, 3778c2ecf20Sopenharmony_ci 3788c2ecf20Sopenharmony_ci .connect = sock_no_connect, 3798c2ecf20Sopenharmony_ci .socketpair = sock_no_socketpair, 3808c2ecf20Sopenharmony_ci .getname = sock_no_getname, 3818c2ecf20Sopenharmony_ci .ioctl = sock_no_ioctl, 3828c2ecf20Sopenharmony_ci .listen = sock_no_listen, 3838c2ecf20Sopenharmony_ci .shutdown = sock_no_shutdown, 3848c2ecf20Sopenharmony_ci .mmap = sock_no_mmap, 3858c2ecf20Sopenharmony_ci .bind = sock_no_bind, 3868c2ecf20Sopenharmony_ci 3878c2ecf20Sopenharmony_ci .release = af_alg_release, 3888c2ecf20Sopenharmony_ci .sendmsg = hash_sendmsg_nokey, 3898c2ecf20Sopenharmony_ci .sendpage = hash_sendpage_nokey, 3908c2ecf20Sopenharmony_ci .recvmsg = hash_recvmsg_nokey, 3918c2ecf20Sopenharmony_ci .accept = hash_accept_nokey, 3928c2ecf20Sopenharmony_ci}; 3938c2ecf20Sopenharmony_ci 3948c2ecf20Sopenharmony_cistatic void *hash_bind(const char *name, u32 type, u32 mask) 3958c2ecf20Sopenharmony_ci{ 3968c2ecf20Sopenharmony_ci return crypto_alloc_ahash(name, type, mask); 3978c2ecf20Sopenharmony_ci} 3988c2ecf20Sopenharmony_ci 3998c2ecf20Sopenharmony_cistatic void hash_release(void *private) 4008c2ecf20Sopenharmony_ci{ 4018c2ecf20Sopenharmony_ci crypto_free_ahash(private); 4028c2ecf20Sopenharmony_ci} 4038c2ecf20Sopenharmony_ci 4048c2ecf20Sopenharmony_cistatic int hash_setkey(void *private, const u8 *key, unsigned int keylen) 4058c2ecf20Sopenharmony_ci{ 4068c2ecf20Sopenharmony_ci return crypto_ahash_setkey(private, key, keylen); 4078c2ecf20Sopenharmony_ci} 4088c2ecf20Sopenharmony_ci 4098c2ecf20Sopenharmony_cistatic void hash_sock_destruct(struct sock *sk) 4108c2ecf20Sopenharmony_ci{ 4118c2ecf20Sopenharmony_ci struct alg_sock *ask = alg_sk(sk); 4128c2ecf20Sopenharmony_ci struct hash_ctx *ctx = ask->private; 4138c2ecf20Sopenharmony_ci 4148c2ecf20Sopenharmony_ci hash_free_result(sk, ctx); 4158c2ecf20Sopenharmony_ci sock_kfree_s(sk, ctx, ctx->len); 4168c2ecf20Sopenharmony_ci af_alg_release_parent(sk); 4178c2ecf20Sopenharmony_ci} 4188c2ecf20Sopenharmony_ci 4198c2ecf20Sopenharmony_cistatic int hash_accept_parent_nokey(void *private, struct sock *sk) 4208c2ecf20Sopenharmony_ci{ 4218c2ecf20Sopenharmony_ci struct crypto_ahash *tfm = private; 4228c2ecf20Sopenharmony_ci struct alg_sock *ask = alg_sk(sk); 4238c2ecf20Sopenharmony_ci struct hash_ctx *ctx; 4248c2ecf20Sopenharmony_ci unsigned int len = sizeof(*ctx) + crypto_ahash_reqsize(tfm); 4258c2ecf20Sopenharmony_ci 4268c2ecf20Sopenharmony_ci ctx = sock_kmalloc(sk, len, GFP_KERNEL); 4278c2ecf20Sopenharmony_ci if (!ctx) 4288c2ecf20Sopenharmony_ci return -ENOMEM; 4298c2ecf20Sopenharmony_ci 4308c2ecf20Sopenharmony_ci ctx->result = NULL; 4318c2ecf20Sopenharmony_ci ctx->len = len; 4328c2ecf20Sopenharmony_ci ctx->more = false; 4338c2ecf20Sopenharmony_ci crypto_init_wait(&ctx->wait); 4348c2ecf20Sopenharmony_ci 4358c2ecf20Sopenharmony_ci ask->private = ctx; 4368c2ecf20Sopenharmony_ci 4378c2ecf20Sopenharmony_ci ahash_request_set_tfm(&ctx->req, tfm); 4388c2ecf20Sopenharmony_ci ahash_request_set_callback(&ctx->req, CRYPTO_TFM_REQ_MAY_BACKLOG, 4398c2ecf20Sopenharmony_ci crypto_req_done, &ctx->wait); 4408c2ecf20Sopenharmony_ci 4418c2ecf20Sopenharmony_ci sk->sk_destruct = hash_sock_destruct; 4428c2ecf20Sopenharmony_ci 4438c2ecf20Sopenharmony_ci return 0; 4448c2ecf20Sopenharmony_ci} 4458c2ecf20Sopenharmony_ci 4468c2ecf20Sopenharmony_cistatic int hash_accept_parent(void *private, struct sock *sk) 4478c2ecf20Sopenharmony_ci{ 4488c2ecf20Sopenharmony_ci struct crypto_ahash *tfm = private; 4498c2ecf20Sopenharmony_ci 4508c2ecf20Sopenharmony_ci if (crypto_ahash_get_flags(tfm) & CRYPTO_TFM_NEED_KEY) 4518c2ecf20Sopenharmony_ci return -ENOKEY; 4528c2ecf20Sopenharmony_ci 4538c2ecf20Sopenharmony_ci return hash_accept_parent_nokey(private, sk); 4548c2ecf20Sopenharmony_ci} 4558c2ecf20Sopenharmony_ci 4568c2ecf20Sopenharmony_cistatic const struct af_alg_type algif_type_hash = { 4578c2ecf20Sopenharmony_ci .bind = hash_bind, 4588c2ecf20Sopenharmony_ci .release = hash_release, 4598c2ecf20Sopenharmony_ci .setkey = hash_setkey, 4608c2ecf20Sopenharmony_ci .accept = hash_accept_parent, 4618c2ecf20Sopenharmony_ci .accept_nokey = hash_accept_parent_nokey, 4628c2ecf20Sopenharmony_ci .ops = &algif_hash_ops, 4638c2ecf20Sopenharmony_ci .ops_nokey = &algif_hash_ops_nokey, 4648c2ecf20Sopenharmony_ci .name = "hash", 4658c2ecf20Sopenharmony_ci .owner = THIS_MODULE 4668c2ecf20Sopenharmony_ci}; 4678c2ecf20Sopenharmony_ci 4688c2ecf20Sopenharmony_cistatic int __init algif_hash_init(void) 4698c2ecf20Sopenharmony_ci{ 4708c2ecf20Sopenharmony_ci return af_alg_register_type(&algif_type_hash); 4718c2ecf20Sopenharmony_ci} 4728c2ecf20Sopenharmony_ci 4738c2ecf20Sopenharmony_cistatic void __exit algif_hash_exit(void) 4748c2ecf20Sopenharmony_ci{ 4758c2ecf20Sopenharmony_ci int err = af_alg_unregister_type(&algif_type_hash); 4768c2ecf20Sopenharmony_ci BUG_ON(err); 4778c2ecf20Sopenharmony_ci} 4788c2ecf20Sopenharmony_ci 4798c2ecf20Sopenharmony_cimodule_init(algif_hash_init); 4808c2ecf20Sopenharmony_cimodule_exit(algif_hash_exit); 4818c2ecf20Sopenharmony_ciMODULE_LICENSE("GPL"); 482