18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later
28c2ecf20Sopenharmony_ci/*
38c2ecf20Sopenharmony_ci * algif_hash: User-space interface for hash algorithms
48c2ecf20Sopenharmony_ci *
58c2ecf20Sopenharmony_ci * This file provides the user-space API for hash algorithms.
68c2ecf20Sopenharmony_ci *
78c2ecf20Sopenharmony_ci * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au>
88c2ecf20Sopenharmony_ci */
98c2ecf20Sopenharmony_ci
108c2ecf20Sopenharmony_ci#include <crypto/hash.h>
118c2ecf20Sopenharmony_ci#include <crypto/if_alg.h>
128c2ecf20Sopenharmony_ci#include <linux/init.h>
138c2ecf20Sopenharmony_ci#include <linux/kernel.h>
148c2ecf20Sopenharmony_ci#include <linux/mm.h>
158c2ecf20Sopenharmony_ci#include <linux/module.h>
168c2ecf20Sopenharmony_ci#include <linux/net.h>
178c2ecf20Sopenharmony_ci#include <net/sock.h>
188c2ecf20Sopenharmony_ci
198c2ecf20Sopenharmony_cistruct hash_ctx {
208c2ecf20Sopenharmony_ci	struct af_alg_sgl sgl;
218c2ecf20Sopenharmony_ci
228c2ecf20Sopenharmony_ci	u8 *result;
238c2ecf20Sopenharmony_ci
248c2ecf20Sopenharmony_ci	struct crypto_wait wait;
258c2ecf20Sopenharmony_ci
268c2ecf20Sopenharmony_ci	unsigned int len;
278c2ecf20Sopenharmony_ci	bool more;
288c2ecf20Sopenharmony_ci
298c2ecf20Sopenharmony_ci	struct ahash_request req;
308c2ecf20Sopenharmony_ci};
318c2ecf20Sopenharmony_ci
328c2ecf20Sopenharmony_cistatic int hash_alloc_result(struct sock *sk, struct hash_ctx *ctx)
338c2ecf20Sopenharmony_ci{
348c2ecf20Sopenharmony_ci	unsigned ds;
358c2ecf20Sopenharmony_ci
368c2ecf20Sopenharmony_ci	if (ctx->result)
378c2ecf20Sopenharmony_ci		return 0;
388c2ecf20Sopenharmony_ci
398c2ecf20Sopenharmony_ci	ds = crypto_ahash_digestsize(crypto_ahash_reqtfm(&ctx->req));
408c2ecf20Sopenharmony_ci
418c2ecf20Sopenharmony_ci	ctx->result = sock_kmalloc(sk, ds, GFP_KERNEL);
428c2ecf20Sopenharmony_ci	if (!ctx->result)
438c2ecf20Sopenharmony_ci		return -ENOMEM;
448c2ecf20Sopenharmony_ci
458c2ecf20Sopenharmony_ci	memset(ctx->result, 0, ds);
468c2ecf20Sopenharmony_ci
478c2ecf20Sopenharmony_ci	return 0;
488c2ecf20Sopenharmony_ci}
498c2ecf20Sopenharmony_ci
508c2ecf20Sopenharmony_cistatic void hash_free_result(struct sock *sk, struct hash_ctx *ctx)
518c2ecf20Sopenharmony_ci{
528c2ecf20Sopenharmony_ci	unsigned ds;
538c2ecf20Sopenharmony_ci
548c2ecf20Sopenharmony_ci	if (!ctx->result)
558c2ecf20Sopenharmony_ci		return;
568c2ecf20Sopenharmony_ci
578c2ecf20Sopenharmony_ci	ds = crypto_ahash_digestsize(crypto_ahash_reqtfm(&ctx->req));
588c2ecf20Sopenharmony_ci
598c2ecf20Sopenharmony_ci	sock_kzfree_s(sk, ctx->result, ds);
608c2ecf20Sopenharmony_ci	ctx->result = NULL;
618c2ecf20Sopenharmony_ci}
628c2ecf20Sopenharmony_ci
638c2ecf20Sopenharmony_cistatic int hash_sendmsg(struct socket *sock, struct msghdr *msg,
648c2ecf20Sopenharmony_ci			size_t ignored)
658c2ecf20Sopenharmony_ci{
668c2ecf20Sopenharmony_ci	int limit = ALG_MAX_PAGES * PAGE_SIZE;
678c2ecf20Sopenharmony_ci	struct sock *sk = sock->sk;
688c2ecf20Sopenharmony_ci	struct alg_sock *ask = alg_sk(sk);
698c2ecf20Sopenharmony_ci	struct hash_ctx *ctx = ask->private;
708c2ecf20Sopenharmony_ci	long copied = 0;
718c2ecf20Sopenharmony_ci	int err;
728c2ecf20Sopenharmony_ci
738c2ecf20Sopenharmony_ci	if (limit > sk->sk_sndbuf)
748c2ecf20Sopenharmony_ci		limit = sk->sk_sndbuf;
758c2ecf20Sopenharmony_ci
768c2ecf20Sopenharmony_ci	lock_sock(sk);
778c2ecf20Sopenharmony_ci	if (!ctx->more) {
788c2ecf20Sopenharmony_ci		if ((msg->msg_flags & MSG_MORE))
798c2ecf20Sopenharmony_ci			hash_free_result(sk, ctx);
808c2ecf20Sopenharmony_ci
818c2ecf20Sopenharmony_ci		err = crypto_wait_req(crypto_ahash_init(&ctx->req), &ctx->wait);
828c2ecf20Sopenharmony_ci		if (err)
838c2ecf20Sopenharmony_ci			goto unlock;
848c2ecf20Sopenharmony_ci	}
858c2ecf20Sopenharmony_ci
868c2ecf20Sopenharmony_ci	ctx->more = false;
878c2ecf20Sopenharmony_ci
888c2ecf20Sopenharmony_ci	while (msg_data_left(msg)) {
898c2ecf20Sopenharmony_ci		int len = msg_data_left(msg);
908c2ecf20Sopenharmony_ci
918c2ecf20Sopenharmony_ci		if (len > limit)
928c2ecf20Sopenharmony_ci			len = limit;
938c2ecf20Sopenharmony_ci
948c2ecf20Sopenharmony_ci		len = af_alg_make_sg(&ctx->sgl, &msg->msg_iter, len);
958c2ecf20Sopenharmony_ci		if (len < 0) {
968c2ecf20Sopenharmony_ci			err = copied ? 0 : len;
978c2ecf20Sopenharmony_ci			goto unlock;
988c2ecf20Sopenharmony_ci		}
998c2ecf20Sopenharmony_ci
1008c2ecf20Sopenharmony_ci		ahash_request_set_crypt(&ctx->req, ctx->sgl.sg, NULL, len);
1018c2ecf20Sopenharmony_ci
1028c2ecf20Sopenharmony_ci		err = crypto_wait_req(crypto_ahash_update(&ctx->req),
1038c2ecf20Sopenharmony_ci				      &ctx->wait);
1048c2ecf20Sopenharmony_ci		af_alg_free_sg(&ctx->sgl);
1058c2ecf20Sopenharmony_ci		if (err)
1068c2ecf20Sopenharmony_ci			goto unlock;
1078c2ecf20Sopenharmony_ci
1088c2ecf20Sopenharmony_ci		copied += len;
1098c2ecf20Sopenharmony_ci		iov_iter_advance(&msg->msg_iter, len);
1108c2ecf20Sopenharmony_ci	}
1118c2ecf20Sopenharmony_ci
1128c2ecf20Sopenharmony_ci	err = 0;
1138c2ecf20Sopenharmony_ci
1148c2ecf20Sopenharmony_ci	ctx->more = msg->msg_flags & MSG_MORE;
1158c2ecf20Sopenharmony_ci	if (!ctx->more) {
1168c2ecf20Sopenharmony_ci		err = hash_alloc_result(sk, ctx);
1178c2ecf20Sopenharmony_ci		if (err)
1188c2ecf20Sopenharmony_ci			goto unlock;
1198c2ecf20Sopenharmony_ci
1208c2ecf20Sopenharmony_ci		ahash_request_set_crypt(&ctx->req, NULL, ctx->result, 0);
1218c2ecf20Sopenharmony_ci		err = crypto_wait_req(crypto_ahash_final(&ctx->req),
1228c2ecf20Sopenharmony_ci				      &ctx->wait);
1238c2ecf20Sopenharmony_ci	}
1248c2ecf20Sopenharmony_ci
1258c2ecf20Sopenharmony_ciunlock:
1268c2ecf20Sopenharmony_ci	release_sock(sk);
1278c2ecf20Sopenharmony_ci
1288c2ecf20Sopenharmony_ci	return err ?: copied;
1298c2ecf20Sopenharmony_ci}
1308c2ecf20Sopenharmony_ci
1318c2ecf20Sopenharmony_cistatic ssize_t hash_sendpage(struct socket *sock, struct page *page,
1328c2ecf20Sopenharmony_ci			     int offset, size_t size, int flags)
1338c2ecf20Sopenharmony_ci{
1348c2ecf20Sopenharmony_ci	struct sock *sk = sock->sk;
1358c2ecf20Sopenharmony_ci	struct alg_sock *ask = alg_sk(sk);
1368c2ecf20Sopenharmony_ci	struct hash_ctx *ctx = ask->private;
1378c2ecf20Sopenharmony_ci	int err;
1388c2ecf20Sopenharmony_ci
1398c2ecf20Sopenharmony_ci	if (flags & MSG_SENDPAGE_NOTLAST)
1408c2ecf20Sopenharmony_ci		flags |= MSG_MORE;
1418c2ecf20Sopenharmony_ci
1428c2ecf20Sopenharmony_ci	lock_sock(sk);
1438c2ecf20Sopenharmony_ci	sg_init_table(ctx->sgl.sg, 1);
1448c2ecf20Sopenharmony_ci	sg_set_page(ctx->sgl.sg, page, size, offset);
1458c2ecf20Sopenharmony_ci
1468c2ecf20Sopenharmony_ci	if (!(flags & MSG_MORE)) {
1478c2ecf20Sopenharmony_ci		err = hash_alloc_result(sk, ctx);
1488c2ecf20Sopenharmony_ci		if (err)
1498c2ecf20Sopenharmony_ci			goto unlock;
1508c2ecf20Sopenharmony_ci	} else if (!ctx->more)
1518c2ecf20Sopenharmony_ci		hash_free_result(sk, ctx);
1528c2ecf20Sopenharmony_ci
1538c2ecf20Sopenharmony_ci	ahash_request_set_crypt(&ctx->req, ctx->sgl.sg, ctx->result, size);
1548c2ecf20Sopenharmony_ci
1558c2ecf20Sopenharmony_ci	if (!(flags & MSG_MORE)) {
1568c2ecf20Sopenharmony_ci		if (ctx->more)
1578c2ecf20Sopenharmony_ci			err = crypto_ahash_finup(&ctx->req);
1588c2ecf20Sopenharmony_ci		else
1598c2ecf20Sopenharmony_ci			err = crypto_ahash_digest(&ctx->req);
1608c2ecf20Sopenharmony_ci	} else {
1618c2ecf20Sopenharmony_ci		if (!ctx->more) {
1628c2ecf20Sopenharmony_ci			err = crypto_ahash_init(&ctx->req);
1638c2ecf20Sopenharmony_ci			err = crypto_wait_req(err, &ctx->wait);
1648c2ecf20Sopenharmony_ci			if (err)
1658c2ecf20Sopenharmony_ci				goto unlock;
1668c2ecf20Sopenharmony_ci		}
1678c2ecf20Sopenharmony_ci
1688c2ecf20Sopenharmony_ci		err = crypto_ahash_update(&ctx->req);
1698c2ecf20Sopenharmony_ci	}
1708c2ecf20Sopenharmony_ci
1718c2ecf20Sopenharmony_ci	err = crypto_wait_req(err, &ctx->wait);
1728c2ecf20Sopenharmony_ci	if (err)
1738c2ecf20Sopenharmony_ci		goto unlock;
1748c2ecf20Sopenharmony_ci
1758c2ecf20Sopenharmony_ci	ctx->more = flags & MSG_MORE;
1768c2ecf20Sopenharmony_ci
1778c2ecf20Sopenharmony_ciunlock:
1788c2ecf20Sopenharmony_ci	release_sock(sk);
1798c2ecf20Sopenharmony_ci
1808c2ecf20Sopenharmony_ci	return err ?: size;
1818c2ecf20Sopenharmony_ci}
1828c2ecf20Sopenharmony_ci
1838c2ecf20Sopenharmony_cistatic int hash_recvmsg(struct socket *sock, struct msghdr *msg, size_t len,
1848c2ecf20Sopenharmony_ci			int flags)
1858c2ecf20Sopenharmony_ci{
1868c2ecf20Sopenharmony_ci	struct sock *sk = sock->sk;
1878c2ecf20Sopenharmony_ci	struct alg_sock *ask = alg_sk(sk);
1888c2ecf20Sopenharmony_ci	struct hash_ctx *ctx = ask->private;
1898c2ecf20Sopenharmony_ci	unsigned ds = crypto_ahash_digestsize(crypto_ahash_reqtfm(&ctx->req));
1908c2ecf20Sopenharmony_ci	bool result;
1918c2ecf20Sopenharmony_ci	int err;
1928c2ecf20Sopenharmony_ci
1938c2ecf20Sopenharmony_ci	if (len > ds)
1948c2ecf20Sopenharmony_ci		len = ds;
1958c2ecf20Sopenharmony_ci	else if (len < ds)
1968c2ecf20Sopenharmony_ci		msg->msg_flags |= MSG_TRUNC;
1978c2ecf20Sopenharmony_ci
1988c2ecf20Sopenharmony_ci	lock_sock(sk);
1998c2ecf20Sopenharmony_ci	result = ctx->result;
2008c2ecf20Sopenharmony_ci	err = hash_alloc_result(sk, ctx);
2018c2ecf20Sopenharmony_ci	if (err)
2028c2ecf20Sopenharmony_ci		goto unlock;
2038c2ecf20Sopenharmony_ci
2048c2ecf20Sopenharmony_ci	ahash_request_set_crypt(&ctx->req, NULL, ctx->result, 0);
2058c2ecf20Sopenharmony_ci
2068c2ecf20Sopenharmony_ci	if (!result && !ctx->more) {
2078c2ecf20Sopenharmony_ci		err = crypto_wait_req(crypto_ahash_init(&ctx->req),
2088c2ecf20Sopenharmony_ci				      &ctx->wait);
2098c2ecf20Sopenharmony_ci		if (err)
2108c2ecf20Sopenharmony_ci			goto unlock;
2118c2ecf20Sopenharmony_ci	}
2128c2ecf20Sopenharmony_ci
2138c2ecf20Sopenharmony_ci	if (!result || ctx->more) {
2148c2ecf20Sopenharmony_ci		ctx->more = false;
2158c2ecf20Sopenharmony_ci		err = crypto_wait_req(crypto_ahash_final(&ctx->req),
2168c2ecf20Sopenharmony_ci				      &ctx->wait);
2178c2ecf20Sopenharmony_ci		if (err)
2188c2ecf20Sopenharmony_ci			goto unlock;
2198c2ecf20Sopenharmony_ci	}
2208c2ecf20Sopenharmony_ci
2218c2ecf20Sopenharmony_ci	err = memcpy_to_msg(msg, ctx->result, len);
2228c2ecf20Sopenharmony_ci
2238c2ecf20Sopenharmony_ciunlock:
2248c2ecf20Sopenharmony_ci	hash_free_result(sk, ctx);
2258c2ecf20Sopenharmony_ci	release_sock(sk);
2268c2ecf20Sopenharmony_ci
2278c2ecf20Sopenharmony_ci	return err ?: len;
2288c2ecf20Sopenharmony_ci}
2298c2ecf20Sopenharmony_ci
2308c2ecf20Sopenharmony_cistatic int hash_accept(struct socket *sock, struct socket *newsock, int flags,
2318c2ecf20Sopenharmony_ci		       bool kern)
2328c2ecf20Sopenharmony_ci{
2338c2ecf20Sopenharmony_ci	struct sock *sk = sock->sk;
2348c2ecf20Sopenharmony_ci	struct alg_sock *ask = alg_sk(sk);
2358c2ecf20Sopenharmony_ci	struct hash_ctx *ctx = ask->private;
2368c2ecf20Sopenharmony_ci	struct ahash_request *req = &ctx->req;
2378c2ecf20Sopenharmony_ci	char state[HASH_MAX_STATESIZE];
2388c2ecf20Sopenharmony_ci	struct sock *sk2;
2398c2ecf20Sopenharmony_ci	struct alg_sock *ask2;
2408c2ecf20Sopenharmony_ci	struct hash_ctx *ctx2;
2418c2ecf20Sopenharmony_ci	bool more;
2428c2ecf20Sopenharmony_ci	int err;
2438c2ecf20Sopenharmony_ci
2448c2ecf20Sopenharmony_ci	lock_sock(sk);
2458c2ecf20Sopenharmony_ci	more = ctx->more;
2468c2ecf20Sopenharmony_ci	err = more ? crypto_ahash_export(req, state) : 0;
2478c2ecf20Sopenharmony_ci	release_sock(sk);
2488c2ecf20Sopenharmony_ci
2498c2ecf20Sopenharmony_ci	if (err)
2508c2ecf20Sopenharmony_ci		return err;
2518c2ecf20Sopenharmony_ci
2528c2ecf20Sopenharmony_ci	err = af_alg_accept(ask->parent, newsock, kern);
2538c2ecf20Sopenharmony_ci	if (err)
2548c2ecf20Sopenharmony_ci		return err;
2558c2ecf20Sopenharmony_ci
2568c2ecf20Sopenharmony_ci	sk2 = newsock->sk;
2578c2ecf20Sopenharmony_ci	ask2 = alg_sk(sk2);
2588c2ecf20Sopenharmony_ci	ctx2 = ask2->private;
2598c2ecf20Sopenharmony_ci	ctx2->more = more;
2608c2ecf20Sopenharmony_ci
2618c2ecf20Sopenharmony_ci	if (!more)
2628c2ecf20Sopenharmony_ci		return err;
2638c2ecf20Sopenharmony_ci
2648c2ecf20Sopenharmony_ci	err = crypto_ahash_import(&ctx2->req, state);
2658c2ecf20Sopenharmony_ci	if (err) {
2668c2ecf20Sopenharmony_ci		sock_orphan(sk2);
2678c2ecf20Sopenharmony_ci		sock_put(sk2);
2688c2ecf20Sopenharmony_ci	}
2698c2ecf20Sopenharmony_ci
2708c2ecf20Sopenharmony_ci	return err;
2718c2ecf20Sopenharmony_ci}
2728c2ecf20Sopenharmony_ci
2738c2ecf20Sopenharmony_cistatic struct proto_ops algif_hash_ops = {
2748c2ecf20Sopenharmony_ci	.family		=	PF_ALG,
2758c2ecf20Sopenharmony_ci
2768c2ecf20Sopenharmony_ci	.connect	=	sock_no_connect,
2778c2ecf20Sopenharmony_ci	.socketpair	=	sock_no_socketpair,
2788c2ecf20Sopenharmony_ci	.getname	=	sock_no_getname,
2798c2ecf20Sopenharmony_ci	.ioctl		=	sock_no_ioctl,
2808c2ecf20Sopenharmony_ci	.listen		=	sock_no_listen,
2818c2ecf20Sopenharmony_ci	.shutdown	=	sock_no_shutdown,
2828c2ecf20Sopenharmony_ci	.mmap		=	sock_no_mmap,
2838c2ecf20Sopenharmony_ci	.bind		=	sock_no_bind,
2848c2ecf20Sopenharmony_ci
2858c2ecf20Sopenharmony_ci	.release	=	af_alg_release,
2868c2ecf20Sopenharmony_ci	.sendmsg	=	hash_sendmsg,
2878c2ecf20Sopenharmony_ci	.sendpage	=	hash_sendpage,
2888c2ecf20Sopenharmony_ci	.recvmsg	=	hash_recvmsg,
2898c2ecf20Sopenharmony_ci	.accept		=	hash_accept,
2908c2ecf20Sopenharmony_ci};
2918c2ecf20Sopenharmony_ci
2928c2ecf20Sopenharmony_cistatic int hash_check_key(struct socket *sock)
2938c2ecf20Sopenharmony_ci{
2948c2ecf20Sopenharmony_ci	int err = 0;
2958c2ecf20Sopenharmony_ci	struct sock *psk;
2968c2ecf20Sopenharmony_ci	struct alg_sock *pask;
2978c2ecf20Sopenharmony_ci	struct crypto_ahash *tfm;
2988c2ecf20Sopenharmony_ci	struct sock *sk = sock->sk;
2998c2ecf20Sopenharmony_ci	struct alg_sock *ask = alg_sk(sk);
3008c2ecf20Sopenharmony_ci
3018c2ecf20Sopenharmony_ci	lock_sock(sk);
3028c2ecf20Sopenharmony_ci	if (!atomic_read(&ask->nokey_refcnt))
3038c2ecf20Sopenharmony_ci		goto unlock_child;
3048c2ecf20Sopenharmony_ci
3058c2ecf20Sopenharmony_ci	psk = ask->parent;
3068c2ecf20Sopenharmony_ci	pask = alg_sk(ask->parent);
3078c2ecf20Sopenharmony_ci	tfm = pask->private;
3088c2ecf20Sopenharmony_ci
3098c2ecf20Sopenharmony_ci	err = -ENOKEY;
3108c2ecf20Sopenharmony_ci	lock_sock_nested(psk, SINGLE_DEPTH_NESTING);
3118c2ecf20Sopenharmony_ci	if (crypto_ahash_get_flags(tfm) & CRYPTO_TFM_NEED_KEY)
3128c2ecf20Sopenharmony_ci		goto unlock;
3138c2ecf20Sopenharmony_ci
3148c2ecf20Sopenharmony_ci	atomic_dec(&pask->nokey_refcnt);
3158c2ecf20Sopenharmony_ci	atomic_set(&ask->nokey_refcnt, 0);
3168c2ecf20Sopenharmony_ci
3178c2ecf20Sopenharmony_ci	err = 0;
3188c2ecf20Sopenharmony_ci
3198c2ecf20Sopenharmony_ciunlock:
3208c2ecf20Sopenharmony_ci	release_sock(psk);
3218c2ecf20Sopenharmony_ciunlock_child:
3228c2ecf20Sopenharmony_ci	release_sock(sk);
3238c2ecf20Sopenharmony_ci
3248c2ecf20Sopenharmony_ci	return err;
3258c2ecf20Sopenharmony_ci}
3268c2ecf20Sopenharmony_ci
3278c2ecf20Sopenharmony_cistatic int hash_sendmsg_nokey(struct socket *sock, struct msghdr *msg,
3288c2ecf20Sopenharmony_ci			      size_t size)
3298c2ecf20Sopenharmony_ci{
3308c2ecf20Sopenharmony_ci	int err;
3318c2ecf20Sopenharmony_ci
3328c2ecf20Sopenharmony_ci	err = hash_check_key(sock);
3338c2ecf20Sopenharmony_ci	if (err)
3348c2ecf20Sopenharmony_ci		return err;
3358c2ecf20Sopenharmony_ci
3368c2ecf20Sopenharmony_ci	return hash_sendmsg(sock, msg, size);
3378c2ecf20Sopenharmony_ci}
3388c2ecf20Sopenharmony_ci
3398c2ecf20Sopenharmony_cistatic ssize_t hash_sendpage_nokey(struct socket *sock, struct page *page,
3408c2ecf20Sopenharmony_ci				   int offset, size_t size, int flags)
3418c2ecf20Sopenharmony_ci{
3428c2ecf20Sopenharmony_ci	int err;
3438c2ecf20Sopenharmony_ci
3448c2ecf20Sopenharmony_ci	err = hash_check_key(sock);
3458c2ecf20Sopenharmony_ci	if (err)
3468c2ecf20Sopenharmony_ci		return err;
3478c2ecf20Sopenharmony_ci
3488c2ecf20Sopenharmony_ci	return hash_sendpage(sock, page, offset, size, flags);
3498c2ecf20Sopenharmony_ci}
3508c2ecf20Sopenharmony_ci
3518c2ecf20Sopenharmony_cistatic int hash_recvmsg_nokey(struct socket *sock, struct msghdr *msg,
3528c2ecf20Sopenharmony_ci			      size_t ignored, int flags)
3538c2ecf20Sopenharmony_ci{
3548c2ecf20Sopenharmony_ci	int err;
3558c2ecf20Sopenharmony_ci
3568c2ecf20Sopenharmony_ci	err = hash_check_key(sock);
3578c2ecf20Sopenharmony_ci	if (err)
3588c2ecf20Sopenharmony_ci		return err;
3598c2ecf20Sopenharmony_ci
3608c2ecf20Sopenharmony_ci	return hash_recvmsg(sock, msg, ignored, flags);
3618c2ecf20Sopenharmony_ci}
3628c2ecf20Sopenharmony_ci
3638c2ecf20Sopenharmony_cistatic int hash_accept_nokey(struct socket *sock, struct socket *newsock,
3648c2ecf20Sopenharmony_ci			     int flags, bool kern)
3658c2ecf20Sopenharmony_ci{
3668c2ecf20Sopenharmony_ci	int err;
3678c2ecf20Sopenharmony_ci
3688c2ecf20Sopenharmony_ci	err = hash_check_key(sock);
3698c2ecf20Sopenharmony_ci	if (err)
3708c2ecf20Sopenharmony_ci		return err;
3718c2ecf20Sopenharmony_ci
3728c2ecf20Sopenharmony_ci	return hash_accept(sock, newsock, flags, kern);
3738c2ecf20Sopenharmony_ci}
3748c2ecf20Sopenharmony_ci
3758c2ecf20Sopenharmony_cistatic struct proto_ops algif_hash_ops_nokey = {
3768c2ecf20Sopenharmony_ci	.family		=	PF_ALG,
3778c2ecf20Sopenharmony_ci
3788c2ecf20Sopenharmony_ci	.connect	=	sock_no_connect,
3798c2ecf20Sopenharmony_ci	.socketpair	=	sock_no_socketpair,
3808c2ecf20Sopenharmony_ci	.getname	=	sock_no_getname,
3818c2ecf20Sopenharmony_ci	.ioctl		=	sock_no_ioctl,
3828c2ecf20Sopenharmony_ci	.listen		=	sock_no_listen,
3838c2ecf20Sopenharmony_ci	.shutdown	=	sock_no_shutdown,
3848c2ecf20Sopenharmony_ci	.mmap		=	sock_no_mmap,
3858c2ecf20Sopenharmony_ci	.bind		=	sock_no_bind,
3868c2ecf20Sopenharmony_ci
3878c2ecf20Sopenharmony_ci	.release	=	af_alg_release,
3888c2ecf20Sopenharmony_ci	.sendmsg	=	hash_sendmsg_nokey,
3898c2ecf20Sopenharmony_ci	.sendpage	=	hash_sendpage_nokey,
3908c2ecf20Sopenharmony_ci	.recvmsg	=	hash_recvmsg_nokey,
3918c2ecf20Sopenharmony_ci	.accept		=	hash_accept_nokey,
3928c2ecf20Sopenharmony_ci};
3938c2ecf20Sopenharmony_ci
3948c2ecf20Sopenharmony_cistatic void *hash_bind(const char *name, u32 type, u32 mask)
3958c2ecf20Sopenharmony_ci{
3968c2ecf20Sopenharmony_ci	return crypto_alloc_ahash(name, type, mask);
3978c2ecf20Sopenharmony_ci}
3988c2ecf20Sopenharmony_ci
3998c2ecf20Sopenharmony_cistatic void hash_release(void *private)
4008c2ecf20Sopenharmony_ci{
4018c2ecf20Sopenharmony_ci	crypto_free_ahash(private);
4028c2ecf20Sopenharmony_ci}
4038c2ecf20Sopenharmony_ci
4048c2ecf20Sopenharmony_cistatic int hash_setkey(void *private, const u8 *key, unsigned int keylen)
4058c2ecf20Sopenharmony_ci{
4068c2ecf20Sopenharmony_ci	return crypto_ahash_setkey(private, key, keylen);
4078c2ecf20Sopenharmony_ci}
4088c2ecf20Sopenharmony_ci
4098c2ecf20Sopenharmony_cistatic void hash_sock_destruct(struct sock *sk)
4108c2ecf20Sopenharmony_ci{
4118c2ecf20Sopenharmony_ci	struct alg_sock *ask = alg_sk(sk);
4128c2ecf20Sopenharmony_ci	struct hash_ctx *ctx = ask->private;
4138c2ecf20Sopenharmony_ci
4148c2ecf20Sopenharmony_ci	hash_free_result(sk, ctx);
4158c2ecf20Sopenharmony_ci	sock_kfree_s(sk, ctx, ctx->len);
4168c2ecf20Sopenharmony_ci	af_alg_release_parent(sk);
4178c2ecf20Sopenharmony_ci}
4188c2ecf20Sopenharmony_ci
4198c2ecf20Sopenharmony_cistatic int hash_accept_parent_nokey(void *private, struct sock *sk)
4208c2ecf20Sopenharmony_ci{
4218c2ecf20Sopenharmony_ci	struct crypto_ahash *tfm = private;
4228c2ecf20Sopenharmony_ci	struct alg_sock *ask = alg_sk(sk);
4238c2ecf20Sopenharmony_ci	struct hash_ctx *ctx;
4248c2ecf20Sopenharmony_ci	unsigned int len = sizeof(*ctx) + crypto_ahash_reqsize(tfm);
4258c2ecf20Sopenharmony_ci
4268c2ecf20Sopenharmony_ci	ctx = sock_kmalloc(sk, len, GFP_KERNEL);
4278c2ecf20Sopenharmony_ci	if (!ctx)
4288c2ecf20Sopenharmony_ci		return -ENOMEM;
4298c2ecf20Sopenharmony_ci
4308c2ecf20Sopenharmony_ci	ctx->result = NULL;
4318c2ecf20Sopenharmony_ci	ctx->len = len;
4328c2ecf20Sopenharmony_ci	ctx->more = false;
4338c2ecf20Sopenharmony_ci	crypto_init_wait(&ctx->wait);
4348c2ecf20Sopenharmony_ci
4358c2ecf20Sopenharmony_ci	ask->private = ctx;
4368c2ecf20Sopenharmony_ci
4378c2ecf20Sopenharmony_ci	ahash_request_set_tfm(&ctx->req, tfm);
4388c2ecf20Sopenharmony_ci	ahash_request_set_callback(&ctx->req, CRYPTO_TFM_REQ_MAY_BACKLOG,
4398c2ecf20Sopenharmony_ci				   crypto_req_done, &ctx->wait);
4408c2ecf20Sopenharmony_ci
4418c2ecf20Sopenharmony_ci	sk->sk_destruct = hash_sock_destruct;
4428c2ecf20Sopenharmony_ci
4438c2ecf20Sopenharmony_ci	return 0;
4448c2ecf20Sopenharmony_ci}
4458c2ecf20Sopenharmony_ci
4468c2ecf20Sopenharmony_cistatic int hash_accept_parent(void *private, struct sock *sk)
4478c2ecf20Sopenharmony_ci{
4488c2ecf20Sopenharmony_ci	struct crypto_ahash *tfm = private;
4498c2ecf20Sopenharmony_ci
4508c2ecf20Sopenharmony_ci	if (crypto_ahash_get_flags(tfm) & CRYPTO_TFM_NEED_KEY)
4518c2ecf20Sopenharmony_ci		return -ENOKEY;
4528c2ecf20Sopenharmony_ci
4538c2ecf20Sopenharmony_ci	return hash_accept_parent_nokey(private, sk);
4548c2ecf20Sopenharmony_ci}
4558c2ecf20Sopenharmony_ci
4568c2ecf20Sopenharmony_cistatic const struct af_alg_type algif_type_hash = {
4578c2ecf20Sopenharmony_ci	.bind		=	hash_bind,
4588c2ecf20Sopenharmony_ci	.release	=	hash_release,
4598c2ecf20Sopenharmony_ci	.setkey		=	hash_setkey,
4608c2ecf20Sopenharmony_ci	.accept		=	hash_accept_parent,
4618c2ecf20Sopenharmony_ci	.accept_nokey	=	hash_accept_parent_nokey,
4628c2ecf20Sopenharmony_ci	.ops		=	&algif_hash_ops,
4638c2ecf20Sopenharmony_ci	.ops_nokey	=	&algif_hash_ops_nokey,
4648c2ecf20Sopenharmony_ci	.name		=	"hash",
4658c2ecf20Sopenharmony_ci	.owner		=	THIS_MODULE
4668c2ecf20Sopenharmony_ci};
4678c2ecf20Sopenharmony_ci
4688c2ecf20Sopenharmony_cistatic int __init algif_hash_init(void)
4698c2ecf20Sopenharmony_ci{
4708c2ecf20Sopenharmony_ci	return af_alg_register_type(&algif_type_hash);
4718c2ecf20Sopenharmony_ci}
4728c2ecf20Sopenharmony_ci
4738c2ecf20Sopenharmony_cistatic void __exit algif_hash_exit(void)
4748c2ecf20Sopenharmony_ci{
4758c2ecf20Sopenharmony_ci	int err = af_alg_unregister_type(&algif_type_hash);
4768c2ecf20Sopenharmony_ci	BUG_ON(err);
4778c2ecf20Sopenharmony_ci}
4788c2ecf20Sopenharmony_ci
4798c2ecf20Sopenharmony_cimodule_init(algif_hash_init);
4808c2ecf20Sopenharmony_cimodule_exit(algif_hash_exit);
4818c2ecf20Sopenharmony_ciMODULE_LICENSE("GPL");
482