162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * Cryptographic API. 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * RNG operations. 662306a36Sopenharmony_ci * 762306a36Sopenharmony_ci * Copyright (c) 2008 Neil Horman <nhorman@tuxdriver.com> 862306a36Sopenharmony_ci * Copyright (c) 2015 Herbert Xu <herbert@gondor.apana.org.au> 962306a36Sopenharmony_ci */ 1062306a36Sopenharmony_ci 1162306a36Sopenharmony_ci#include <crypto/internal/rng.h> 1262306a36Sopenharmony_ci#include <linux/atomic.h> 1362306a36Sopenharmony_ci#include <linux/cryptouser.h> 1462306a36Sopenharmony_ci#include <linux/err.h> 1562306a36Sopenharmony_ci#include <linux/kernel.h> 1662306a36Sopenharmony_ci#include <linux/module.h> 1762306a36Sopenharmony_ci#include <linux/mutex.h> 1862306a36Sopenharmony_ci#include <linux/random.h> 1962306a36Sopenharmony_ci#include <linux/seq_file.h> 2062306a36Sopenharmony_ci#include <linux/slab.h> 2162306a36Sopenharmony_ci#include <linux/string.h> 2262306a36Sopenharmony_ci#include <net/netlink.h> 2362306a36Sopenharmony_ci 2462306a36Sopenharmony_ci#include "internal.h" 2562306a36Sopenharmony_ci 2662306a36Sopenharmony_cistatic DEFINE_MUTEX(crypto_default_rng_lock); 2762306a36Sopenharmony_cistruct crypto_rng *crypto_default_rng; 2862306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(crypto_default_rng); 2962306a36Sopenharmony_cistatic int crypto_default_rng_refcnt; 3062306a36Sopenharmony_ci 3162306a36Sopenharmony_ciint crypto_rng_reset(struct crypto_rng *tfm, const u8 *seed, unsigned int slen) 3262306a36Sopenharmony_ci{ 3362306a36Sopenharmony_ci struct rng_alg *alg = crypto_rng_alg(tfm); 3462306a36Sopenharmony_ci u8 *buf = NULL; 3562306a36Sopenharmony_ci int err; 3662306a36Sopenharmony_ci 3762306a36Sopenharmony_ci if (IS_ENABLED(CONFIG_CRYPTO_STATS)) 3862306a36Sopenharmony_ci atomic64_inc(&rng_get_stat(alg)->seed_cnt); 3962306a36Sopenharmony_ci 4062306a36Sopenharmony_ci if (!seed && slen) { 4162306a36Sopenharmony_ci buf = kmalloc(slen, GFP_KERNEL); 4262306a36Sopenharmony_ci err = -ENOMEM; 4362306a36Sopenharmony_ci if (!buf) 4462306a36Sopenharmony_ci goto out; 4562306a36Sopenharmony_ci 4662306a36Sopenharmony_ci err = get_random_bytes_wait(buf, slen); 4762306a36Sopenharmony_ci if (err) 4862306a36Sopenharmony_ci goto free_buf; 4962306a36Sopenharmony_ci seed = buf; 5062306a36Sopenharmony_ci } 5162306a36Sopenharmony_ci 5262306a36Sopenharmony_ci err = alg->seed(tfm, seed, slen); 5362306a36Sopenharmony_cifree_buf: 5462306a36Sopenharmony_ci kfree_sensitive(buf); 5562306a36Sopenharmony_ciout: 5662306a36Sopenharmony_ci return crypto_rng_errstat(alg, err); 5762306a36Sopenharmony_ci} 5862306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(crypto_rng_reset); 5962306a36Sopenharmony_ci 6062306a36Sopenharmony_cistatic int crypto_rng_init_tfm(struct crypto_tfm *tfm) 6162306a36Sopenharmony_ci{ 6262306a36Sopenharmony_ci return 0; 6362306a36Sopenharmony_ci} 6462306a36Sopenharmony_ci 6562306a36Sopenharmony_cistatic unsigned int seedsize(struct crypto_alg *alg) 6662306a36Sopenharmony_ci{ 6762306a36Sopenharmony_ci struct rng_alg *ralg = container_of(alg, struct rng_alg, base); 6862306a36Sopenharmony_ci 6962306a36Sopenharmony_ci return ralg->seedsize; 7062306a36Sopenharmony_ci} 7162306a36Sopenharmony_ci 7262306a36Sopenharmony_cistatic int __maybe_unused crypto_rng_report( 7362306a36Sopenharmony_ci struct sk_buff *skb, struct crypto_alg *alg) 7462306a36Sopenharmony_ci{ 7562306a36Sopenharmony_ci struct crypto_report_rng rrng; 7662306a36Sopenharmony_ci 7762306a36Sopenharmony_ci memset(&rrng, 0, sizeof(rrng)); 7862306a36Sopenharmony_ci 7962306a36Sopenharmony_ci strscpy(rrng.type, "rng", sizeof(rrng.type)); 8062306a36Sopenharmony_ci 8162306a36Sopenharmony_ci rrng.seedsize = seedsize(alg); 8262306a36Sopenharmony_ci 8362306a36Sopenharmony_ci return nla_put(skb, CRYPTOCFGA_REPORT_RNG, sizeof(rrng), &rrng); 8462306a36Sopenharmony_ci} 8562306a36Sopenharmony_ci 8662306a36Sopenharmony_cistatic void crypto_rng_show(struct seq_file *m, struct crypto_alg *alg) 8762306a36Sopenharmony_ci __maybe_unused; 8862306a36Sopenharmony_cistatic void crypto_rng_show(struct seq_file *m, struct crypto_alg *alg) 8962306a36Sopenharmony_ci{ 9062306a36Sopenharmony_ci seq_printf(m, "type : rng\n"); 9162306a36Sopenharmony_ci seq_printf(m, "seedsize : %u\n", seedsize(alg)); 9262306a36Sopenharmony_ci} 9362306a36Sopenharmony_ci 9462306a36Sopenharmony_cistatic int __maybe_unused crypto_rng_report_stat( 9562306a36Sopenharmony_ci struct sk_buff *skb, struct crypto_alg *alg) 9662306a36Sopenharmony_ci{ 9762306a36Sopenharmony_ci struct rng_alg *rng = __crypto_rng_alg(alg); 9862306a36Sopenharmony_ci struct crypto_istat_rng *istat; 9962306a36Sopenharmony_ci struct crypto_stat_rng rrng; 10062306a36Sopenharmony_ci 10162306a36Sopenharmony_ci istat = rng_get_stat(rng); 10262306a36Sopenharmony_ci 10362306a36Sopenharmony_ci memset(&rrng, 0, sizeof(rrng)); 10462306a36Sopenharmony_ci 10562306a36Sopenharmony_ci strscpy(rrng.type, "rng", sizeof(rrng.type)); 10662306a36Sopenharmony_ci 10762306a36Sopenharmony_ci rrng.stat_generate_cnt = atomic64_read(&istat->generate_cnt); 10862306a36Sopenharmony_ci rrng.stat_generate_tlen = atomic64_read(&istat->generate_tlen); 10962306a36Sopenharmony_ci rrng.stat_seed_cnt = atomic64_read(&istat->seed_cnt); 11062306a36Sopenharmony_ci rrng.stat_err_cnt = atomic64_read(&istat->err_cnt); 11162306a36Sopenharmony_ci 11262306a36Sopenharmony_ci return nla_put(skb, CRYPTOCFGA_STAT_RNG, sizeof(rrng), &rrng); 11362306a36Sopenharmony_ci} 11462306a36Sopenharmony_ci 11562306a36Sopenharmony_cistatic const struct crypto_type crypto_rng_type = { 11662306a36Sopenharmony_ci .extsize = crypto_alg_extsize, 11762306a36Sopenharmony_ci .init_tfm = crypto_rng_init_tfm, 11862306a36Sopenharmony_ci#ifdef CONFIG_PROC_FS 11962306a36Sopenharmony_ci .show = crypto_rng_show, 12062306a36Sopenharmony_ci#endif 12162306a36Sopenharmony_ci#if IS_ENABLED(CONFIG_CRYPTO_USER) 12262306a36Sopenharmony_ci .report = crypto_rng_report, 12362306a36Sopenharmony_ci#endif 12462306a36Sopenharmony_ci#ifdef CONFIG_CRYPTO_STATS 12562306a36Sopenharmony_ci .report_stat = crypto_rng_report_stat, 12662306a36Sopenharmony_ci#endif 12762306a36Sopenharmony_ci .maskclear = ~CRYPTO_ALG_TYPE_MASK, 12862306a36Sopenharmony_ci .maskset = CRYPTO_ALG_TYPE_MASK, 12962306a36Sopenharmony_ci .type = CRYPTO_ALG_TYPE_RNG, 13062306a36Sopenharmony_ci .tfmsize = offsetof(struct crypto_rng, base), 13162306a36Sopenharmony_ci}; 13262306a36Sopenharmony_ci 13362306a36Sopenharmony_cistruct crypto_rng *crypto_alloc_rng(const char *alg_name, u32 type, u32 mask) 13462306a36Sopenharmony_ci{ 13562306a36Sopenharmony_ci return crypto_alloc_tfm(alg_name, &crypto_rng_type, type, mask); 13662306a36Sopenharmony_ci} 13762306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(crypto_alloc_rng); 13862306a36Sopenharmony_ci 13962306a36Sopenharmony_ciint crypto_get_default_rng(void) 14062306a36Sopenharmony_ci{ 14162306a36Sopenharmony_ci struct crypto_rng *rng; 14262306a36Sopenharmony_ci int err; 14362306a36Sopenharmony_ci 14462306a36Sopenharmony_ci mutex_lock(&crypto_default_rng_lock); 14562306a36Sopenharmony_ci if (!crypto_default_rng) { 14662306a36Sopenharmony_ci rng = crypto_alloc_rng("stdrng", 0, 0); 14762306a36Sopenharmony_ci err = PTR_ERR(rng); 14862306a36Sopenharmony_ci if (IS_ERR(rng)) 14962306a36Sopenharmony_ci goto unlock; 15062306a36Sopenharmony_ci 15162306a36Sopenharmony_ci err = crypto_rng_reset(rng, NULL, crypto_rng_seedsize(rng)); 15262306a36Sopenharmony_ci if (err) { 15362306a36Sopenharmony_ci crypto_free_rng(rng); 15462306a36Sopenharmony_ci goto unlock; 15562306a36Sopenharmony_ci } 15662306a36Sopenharmony_ci 15762306a36Sopenharmony_ci crypto_default_rng = rng; 15862306a36Sopenharmony_ci } 15962306a36Sopenharmony_ci 16062306a36Sopenharmony_ci crypto_default_rng_refcnt++; 16162306a36Sopenharmony_ci err = 0; 16262306a36Sopenharmony_ci 16362306a36Sopenharmony_ciunlock: 16462306a36Sopenharmony_ci mutex_unlock(&crypto_default_rng_lock); 16562306a36Sopenharmony_ci 16662306a36Sopenharmony_ci return err; 16762306a36Sopenharmony_ci} 16862306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(crypto_get_default_rng); 16962306a36Sopenharmony_ci 17062306a36Sopenharmony_civoid crypto_put_default_rng(void) 17162306a36Sopenharmony_ci{ 17262306a36Sopenharmony_ci mutex_lock(&crypto_default_rng_lock); 17362306a36Sopenharmony_ci crypto_default_rng_refcnt--; 17462306a36Sopenharmony_ci mutex_unlock(&crypto_default_rng_lock); 17562306a36Sopenharmony_ci} 17662306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(crypto_put_default_rng); 17762306a36Sopenharmony_ci 17862306a36Sopenharmony_ci#if defined(CONFIG_CRYPTO_RNG) || defined(CONFIG_CRYPTO_RNG_MODULE) 17962306a36Sopenharmony_ciint crypto_del_default_rng(void) 18062306a36Sopenharmony_ci{ 18162306a36Sopenharmony_ci int err = -EBUSY; 18262306a36Sopenharmony_ci 18362306a36Sopenharmony_ci mutex_lock(&crypto_default_rng_lock); 18462306a36Sopenharmony_ci if (crypto_default_rng_refcnt) 18562306a36Sopenharmony_ci goto out; 18662306a36Sopenharmony_ci 18762306a36Sopenharmony_ci crypto_free_rng(crypto_default_rng); 18862306a36Sopenharmony_ci crypto_default_rng = NULL; 18962306a36Sopenharmony_ci 19062306a36Sopenharmony_ci err = 0; 19162306a36Sopenharmony_ci 19262306a36Sopenharmony_ciout: 19362306a36Sopenharmony_ci mutex_unlock(&crypto_default_rng_lock); 19462306a36Sopenharmony_ci 19562306a36Sopenharmony_ci return err; 19662306a36Sopenharmony_ci} 19762306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(crypto_del_default_rng); 19862306a36Sopenharmony_ci#endif 19962306a36Sopenharmony_ci 20062306a36Sopenharmony_ciint crypto_register_rng(struct rng_alg *alg) 20162306a36Sopenharmony_ci{ 20262306a36Sopenharmony_ci struct crypto_istat_rng *istat = rng_get_stat(alg); 20362306a36Sopenharmony_ci struct crypto_alg *base = &alg->base; 20462306a36Sopenharmony_ci 20562306a36Sopenharmony_ci if (alg->seedsize > PAGE_SIZE / 8) 20662306a36Sopenharmony_ci return -EINVAL; 20762306a36Sopenharmony_ci 20862306a36Sopenharmony_ci base->cra_type = &crypto_rng_type; 20962306a36Sopenharmony_ci base->cra_flags &= ~CRYPTO_ALG_TYPE_MASK; 21062306a36Sopenharmony_ci base->cra_flags |= CRYPTO_ALG_TYPE_RNG; 21162306a36Sopenharmony_ci 21262306a36Sopenharmony_ci if (IS_ENABLED(CONFIG_CRYPTO_STATS)) 21362306a36Sopenharmony_ci memset(istat, 0, sizeof(*istat)); 21462306a36Sopenharmony_ci 21562306a36Sopenharmony_ci return crypto_register_alg(base); 21662306a36Sopenharmony_ci} 21762306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(crypto_register_rng); 21862306a36Sopenharmony_ci 21962306a36Sopenharmony_civoid crypto_unregister_rng(struct rng_alg *alg) 22062306a36Sopenharmony_ci{ 22162306a36Sopenharmony_ci crypto_unregister_alg(&alg->base); 22262306a36Sopenharmony_ci} 22362306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(crypto_unregister_rng); 22462306a36Sopenharmony_ci 22562306a36Sopenharmony_ciint crypto_register_rngs(struct rng_alg *algs, int count) 22662306a36Sopenharmony_ci{ 22762306a36Sopenharmony_ci int i, ret; 22862306a36Sopenharmony_ci 22962306a36Sopenharmony_ci for (i = 0; i < count; i++) { 23062306a36Sopenharmony_ci ret = crypto_register_rng(algs + i); 23162306a36Sopenharmony_ci if (ret) 23262306a36Sopenharmony_ci goto err; 23362306a36Sopenharmony_ci } 23462306a36Sopenharmony_ci 23562306a36Sopenharmony_ci return 0; 23662306a36Sopenharmony_ci 23762306a36Sopenharmony_cierr: 23862306a36Sopenharmony_ci for (--i; i >= 0; --i) 23962306a36Sopenharmony_ci crypto_unregister_rng(algs + i); 24062306a36Sopenharmony_ci 24162306a36Sopenharmony_ci return ret; 24262306a36Sopenharmony_ci} 24362306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(crypto_register_rngs); 24462306a36Sopenharmony_ci 24562306a36Sopenharmony_civoid crypto_unregister_rngs(struct rng_alg *algs, int count) 24662306a36Sopenharmony_ci{ 24762306a36Sopenharmony_ci int i; 24862306a36Sopenharmony_ci 24962306a36Sopenharmony_ci for (i = count - 1; i >= 0; --i) 25062306a36Sopenharmony_ci crypto_unregister_rng(algs + i); 25162306a36Sopenharmony_ci} 25262306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(crypto_unregister_rngs); 25362306a36Sopenharmony_ci 25462306a36Sopenharmony_ciMODULE_LICENSE("GPL"); 25562306a36Sopenharmony_ciMODULE_DESCRIPTION("Random Number Generator"); 256