162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later
262306a36Sopenharmony_ci/*
362306a36Sopenharmony_ci *   Copyright (C) 2019 Samsung Electronics Co., Ltd.
462306a36Sopenharmony_ci */
562306a36Sopenharmony_ci
662306a36Sopenharmony_ci#include <linux/kernel.h>
762306a36Sopenharmony_ci#include <linux/string.h>
862306a36Sopenharmony_ci#include <linux/err.h>
962306a36Sopenharmony_ci#include <linux/slab.h>
1062306a36Sopenharmony_ci#include <linux/wait.h>
1162306a36Sopenharmony_ci#include <linux/sched.h>
1262306a36Sopenharmony_ci
1362306a36Sopenharmony_ci#include "glob.h"
1462306a36Sopenharmony_ci#include "crypto_ctx.h"
1562306a36Sopenharmony_ci
1662306a36Sopenharmony_cistruct crypto_ctx_list {
1762306a36Sopenharmony_ci	spinlock_t		ctx_lock;
1862306a36Sopenharmony_ci	int			avail_ctx;
1962306a36Sopenharmony_ci	struct list_head	idle_ctx;
2062306a36Sopenharmony_ci	wait_queue_head_t	ctx_wait;
2162306a36Sopenharmony_ci};
2262306a36Sopenharmony_ci
2362306a36Sopenharmony_cistatic struct crypto_ctx_list ctx_list;
2462306a36Sopenharmony_ci
2562306a36Sopenharmony_cistatic inline void free_aead(struct crypto_aead *aead)
2662306a36Sopenharmony_ci{
2762306a36Sopenharmony_ci	if (aead)
2862306a36Sopenharmony_ci		crypto_free_aead(aead);
2962306a36Sopenharmony_ci}
3062306a36Sopenharmony_ci
3162306a36Sopenharmony_cistatic void free_shash(struct shash_desc *shash)
3262306a36Sopenharmony_ci{
3362306a36Sopenharmony_ci	if (shash) {
3462306a36Sopenharmony_ci		crypto_free_shash(shash->tfm);
3562306a36Sopenharmony_ci		kfree(shash);
3662306a36Sopenharmony_ci	}
3762306a36Sopenharmony_ci}
3862306a36Sopenharmony_ci
3962306a36Sopenharmony_cistatic struct crypto_aead *alloc_aead(int id)
4062306a36Sopenharmony_ci{
4162306a36Sopenharmony_ci	struct crypto_aead *tfm = NULL;
4262306a36Sopenharmony_ci
4362306a36Sopenharmony_ci	switch (id) {
4462306a36Sopenharmony_ci	case CRYPTO_AEAD_AES_GCM:
4562306a36Sopenharmony_ci		tfm = crypto_alloc_aead("gcm(aes)", 0, 0);
4662306a36Sopenharmony_ci		break;
4762306a36Sopenharmony_ci	case CRYPTO_AEAD_AES_CCM:
4862306a36Sopenharmony_ci		tfm = crypto_alloc_aead("ccm(aes)", 0, 0);
4962306a36Sopenharmony_ci		break;
5062306a36Sopenharmony_ci	default:
5162306a36Sopenharmony_ci		pr_err("Does not support encrypt ahead(id : %d)\n", id);
5262306a36Sopenharmony_ci		return NULL;
5362306a36Sopenharmony_ci	}
5462306a36Sopenharmony_ci
5562306a36Sopenharmony_ci	if (IS_ERR(tfm)) {
5662306a36Sopenharmony_ci		pr_err("Failed to alloc encrypt aead : %ld\n", PTR_ERR(tfm));
5762306a36Sopenharmony_ci		return NULL;
5862306a36Sopenharmony_ci	}
5962306a36Sopenharmony_ci
6062306a36Sopenharmony_ci	return tfm;
6162306a36Sopenharmony_ci}
6262306a36Sopenharmony_ci
6362306a36Sopenharmony_cistatic struct shash_desc *alloc_shash_desc(int id)
6462306a36Sopenharmony_ci{
6562306a36Sopenharmony_ci	struct crypto_shash *tfm = NULL;
6662306a36Sopenharmony_ci	struct shash_desc *shash;
6762306a36Sopenharmony_ci
6862306a36Sopenharmony_ci	switch (id) {
6962306a36Sopenharmony_ci	case CRYPTO_SHASH_HMACMD5:
7062306a36Sopenharmony_ci		tfm = crypto_alloc_shash("hmac(md5)", 0, 0);
7162306a36Sopenharmony_ci		break;
7262306a36Sopenharmony_ci	case CRYPTO_SHASH_HMACSHA256:
7362306a36Sopenharmony_ci		tfm = crypto_alloc_shash("hmac(sha256)", 0, 0);
7462306a36Sopenharmony_ci		break;
7562306a36Sopenharmony_ci	case CRYPTO_SHASH_CMACAES:
7662306a36Sopenharmony_ci		tfm = crypto_alloc_shash("cmac(aes)", 0, 0);
7762306a36Sopenharmony_ci		break;
7862306a36Sopenharmony_ci	case CRYPTO_SHASH_SHA256:
7962306a36Sopenharmony_ci		tfm = crypto_alloc_shash("sha256", 0, 0);
8062306a36Sopenharmony_ci		break;
8162306a36Sopenharmony_ci	case CRYPTO_SHASH_SHA512:
8262306a36Sopenharmony_ci		tfm = crypto_alloc_shash("sha512", 0, 0);
8362306a36Sopenharmony_ci		break;
8462306a36Sopenharmony_ci	default:
8562306a36Sopenharmony_ci		return NULL;
8662306a36Sopenharmony_ci	}
8762306a36Sopenharmony_ci
8862306a36Sopenharmony_ci	if (IS_ERR(tfm))
8962306a36Sopenharmony_ci		return NULL;
9062306a36Sopenharmony_ci
9162306a36Sopenharmony_ci	shash = kzalloc(sizeof(*shash) + crypto_shash_descsize(tfm),
9262306a36Sopenharmony_ci			GFP_KERNEL);
9362306a36Sopenharmony_ci	if (!shash)
9462306a36Sopenharmony_ci		crypto_free_shash(tfm);
9562306a36Sopenharmony_ci	else
9662306a36Sopenharmony_ci		shash->tfm = tfm;
9762306a36Sopenharmony_ci	return shash;
9862306a36Sopenharmony_ci}
9962306a36Sopenharmony_ci
10062306a36Sopenharmony_cistatic void ctx_free(struct ksmbd_crypto_ctx *ctx)
10162306a36Sopenharmony_ci{
10262306a36Sopenharmony_ci	int i;
10362306a36Sopenharmony_ci
10462306a36Sopenharmony_ci	for (i = 0; i < CRYPTO_SHASH_MAX; i++)
10562306a36Sopenharmony_ci		free_shash(ctx->desc[i]);
10662306a36Sopenharmony_ci	for (i = 0; i < CRYPTO_AEAD_MAX; i++)
10762306a36Sopenharmony_ci		free_aead(ctx->ccmaes[i]);
10862306a36Sopenharmony_ci	kfree(ctx);
10962306a36Sopenharmony_ci}
11062306a36Sopenharmony_ci
11162306a36Sopenharmony_cistatic struct ksmbd_crypto_ctx *ksmbd_find_crypto_ctx(void)
11262306a36Sopenharmony_ci{
11362306a36Sopenharmony_ci	struct ksmbd_crypto_ctx *ctx;
11462306a36Sopenharmony_ci
11562306a36Sopenharmony_ci	while (1) {
11662306a36Sopenharmony_ci		spin_lock(&ctx_list.ctx_lock);
11762306a36Sopenharmony_ci		if (!list_empty(&ctx_list.idle_ctx)) {
11862306a36Sopenharmony_ci			ctx = list_entry(ctx_list.idle_ctx.next,
11962306a36Sopenharmony_ci					 struct ksmbd_crypto_ctx,
12062306a36Sopenharmony_ci					 list);
12162306a36Sopenharmony_ci			list_del(&ctx->list);
12262306a36Sopenharmony_ci			spin_unlock(&ctx_list.ctx_lock);
12362306a36Sopenharmony_ci			return ctx;
12462306a36Sopenharmony_ci		}
12562306a36Sopenharmony_ci
12662306a36Sopenharmony_ci		if (ctx_list.avail_ctx > num_online_cpus()) {
12762306a36Sopenharmony_ci			spin_unlock(&ctx_list.ctx_lock);
12862306a36Sopenharmony_ci			wait_event(ctx_list.ctx_wait,
12962306a36Sopenharmony_ci				   !list_empty(&ctx_list.idle_ctx));
13062306a36Sopenharmony_ci			continue;
13162306a36Sopenharmony_ci		}
13262306a36Sopenharmony_ci
13362306a36Sopenharmony_ci		ctx_list.avail_ctx++;
13462306a36Sopenharmony_ci		spin_unlock(&ctx_list.ctx_lock);
13562306a36Sopenharmony_ci
13662306a36Sopenharmony_ci		ctx = kzalloc(sizeof(struct ksmbd_crypto_ctx), GFP_KERNEL);
13762306a36Sopenharmony_ci		if (!ctx) {
13862306a36Sopenharmony_ci			spin_lock(&ctx_list.ctx_lock);
13962306a36Sopenharmony_ci			ctx_list.avail_ctx--;
14062306a36Sopenharmony_ci			spin_unlock(&ctx_list.ctx_lock);
14162306a36Sopenharmony_ci			wait_event(ctx_list.ctx_wait,
14262306a36Sopenharmony_ci				   !list_empty(&ctx_list.idle_ctx));
14362306a36Sopenharmony_ci			continue;
14462306a36Sopenharmony_ci		}
14562306a36Sopenharmony_ci		break;
14662306a36Sopenharmony_ci	}
14762306a36Sopenharmony_ci	return ctx;
14862306a36Sopenharmony_ci}
14962306a36Sopenharmony_ci
15062306a36Sopenharmony_civoid ksmbd_release_crypto_ctx(struct ksmbd_crypto_ctx *ctx)
15162306a36Sopenharmony_ci{
15262306a36Sopenharmony_ci	if (!ctx)
15362306a36Sopenharmony_ci		return;
15462306a36Sopenharmony_ci
15562306a36Sopenharmony_ci	spin_lock(&ctx_list.ctx_lock);
15662306a36Sopenharmony_ci	if (ctx_list.avail_ctx <= num_online_cpus()) {
15762306a36Sopenharmony_ci		list_add(&ctx->list, &ctx_list.idle_ctx);
15862306a36Sopenharmony_ci		spin_unlock(&ctx_list.ctx_lock);
15962306a36Sopenharmony_ci		wake_up(&ctx_list.ctx_wait);
16062306a36Sopenharmony_ci		return;
16162306a36Sopenharmony_ci	}
16262306a36Sopenharmony_ci
16362306a36Sopenharmony_ci	ctx_list.avail_ctx--;
16462306a36Sopenharmony_ci	spin_unlock(&ctx_list.ctx_lock);
16562306a36Sopenharmony_ci	ctx_free(ctx);
16662306a36Sopenharmony_ci}
16762306a36Sopenharmony_ci
16862306a36Sopenharmony_cistatic struct ksmbd_crypto_ctx *____crypto_shash_ctx_find(int id)
16962306a36Sopenharmony_ci{
17062306a36Sopenharmony_ci	struct ksmbd_crypto_ctx *ctx;
17162306a36Sopenharmony_ci
17262306a36Sopenharmony_ci	if (id >= CRYPTO_SHASH_MAX)
17362306a36Sopenharmony_ci		return NULL;
17462306a36Sopenharmony_ci
17562306a36Sopenharmony_ci	ctx = ksmbd_find_crypto_ctx();
17662306a36Sopenharmony_ci	if (ctx->desc[id])
17762306a36Sopenharmony_ci		return ctx;
17862306a36Sopenharmony_ci
17962306a36Sopenharmony_ci	ctx->desc[id] = alloc_shash_desc(id);
18062306a36Sopenharmony_ci	if (ctx->desc[id])
18162306a36Sopenharmony_ci		return ctx;
18262306a36Sopenharmony_ci	ksmbd_release_crypto_ctx(ctx);
18362306a36Sopenharmony_ci	return NULL;
18462306a36Sopenharmony_ci}
18562306a36Sopenharmony_ci
18662306a36Sopenharmony_cistruct ksmbd_crypto_ctx *ksmbd_crypto_ctx_find_hmacmd5(void)
18762306a36Sopenharmony_ci{
18862306a36Sopenharmony_ci	return ____crypto_shash_ctx_find(CRYPTO_SHASH_HMACMD5);
18962306a36Sopenharmony_ci}
19062306a36Sopenharmony_ci
19162306a36Sopenharmony_cistruct ksmbd_crypto_ctx *ksmbd_crypto_ctx_find_hmacsha256(void)
19262306a36Sopenharmony_ci{
19362306a36Sopenharmony_ci	return ____crypto_shash_ctx_find(CRYPTO_SHASH_HMACSHA256);
19462306a36Sopenharmony_ci}
19562306a36Sopenharmony_ci
19662306a36Sopenharmony_cistruct ksmbd_crypto_ctx *ksmbd_crypto_ctx_find_cmacaes(void)
19762306a36Sopenharmony_ci{
19862306a36Sopenharmony_ci	return ____crypto_shash_ctx_find(CRYPTO_SHASH_CMACAES);
19962306a36Sopenharmony_ci}
20062306a36Sopenharmony_ci
20162306a36Sopenharmony_cistruct ksmbd_crypto_ctx *ksmbd_crypto_ctx_find_sha256(void)
20262306a36Sopenharmony_ci{
20362306a36Sopenharmony_ci	return ____crypto_shash_ctx_find(CRYPTO_SHASH_SHA256);
20462306a36Sopenharmony_ci}
20562306a36Sopenharmony_ci
20662306a36Sopenharmony_cistruct ksmbd_crypto_ctx *ksmbd_crypto_ctx_find_sha512(void)
20762306a36Sopenharmony_ci{
20862306a36Sopenharmony_ci	return ____crypto_shash_ctx_find(CRYPTO_SHASH_SHA512);
20962306a36Sopenharmony_ci}
21062306a36Sopenharmony_ci
21162306a36Sopenharmony_cistatic struct ksmbd_crypto_ctx *____crypto_aead_ctx_find(int id)
21262306a36Sopenharmony_ci{
21362306a36Sopenharmony_ci	struct ksmbd_crypto_ctx *ctx;
21462306a36Sopenharmony_ci
21562306a36Sopenharmony_ci	if (id >= CRYPTO_AEAD_MAX)
21662306a36Sopenharmony_ci		return NULL;
21762306a36Sopenharmony_ci
21862306a36Sopenharmony_ci	ctx = ksmbd_find_crypto_ctx();
21962306a36Sopenharmony_ci	if (ctx->ccmaes[id])
22062306a36Sopenharmony_ci		return ctx;
22162306a36Sopenharmony_ci
22262306a36Sopenharmony_ci	ctx->ccmaes[id] = alloc_aead(id);
22362306a36Sopenharmony_ci	if (ctx->ccmaes[id])
22462306a36Sopenharmony_ci		return ctx;
22562306a36Sopenharmony_ci	ksmbd_release_crypto_ctx(ctx);
22662306a36Sopenharmony_ci	return NULL;
22762306a36Sopenharmony_ci}
22862306a36Sopenharmony_ci
22962306a36Sopenharmony_cistruct ksmbd_crypto_ctx *ksmbd_crypto_ctx_find_gcm(void)
23062306a36Sopenharmony_ci{
23162306a36Sopenharmony_ci	return ____crypto_aead_ctx_find(CRYPTO_AEAD_AES_GCM);
23262306a36Sopenharmony_ci}
23362306a36Sopenharmony_ci
23462306a36Sopenharmony_cistruct ksmbd_crypto_ctx *ksmbd_crypto_ctx_find_ccm(void)
23562306a36Sopenharmony_ci{
23662306a36Sopenharmony_ci	return ____crypto_aead_ctx_find(CRYPTO_AEAD_AES_CCM);
23762306a36Sopenharmony_ci}
23862306a36Sopenharmony_ci
23962306a36Sopenharmony_civoid ksmbd_crypto_destroy(void)
24062306a36Sopenharmony_ci{
24162306a36Sopenharmony_ci	struct ksmbd_crypto_ctx *ctx;
24262306a36Sopenharmony_ci
24362306a36Sopenharmony_ci	while (!list_empty(&ctx_list.idle_ctx)) {
24462306a36Sopenharmony_ci		ctx = list_entry(ctx_list.idle_ctx.next,
24562306a36Sopenharmony_ci				 struct ksmbd_crypto_ctx,
24662306a36Sopenharmony_ci				 list);
24762306a36Sopenharmony_ci		list_del(&ctx->list);
24862306a36Sopenharmony_ci		ctx_free(ctx);
24962306a36Sopenharmony_ci	}
25062306a36Sopenharmony_ci}
25162306a36Sopenharmony_ci
25262306a36Sopenharmony_ciint ksmbd_crypto_create(void)
25362306a36Sopenharmony_ci{
25462306a36Sopenharmony_ci	struct ksmbd_crypto_ctx *ctx;
25562306a36Sopenharmony_ci
25662306a36Sopenharmony_ci	spin_lock_init(&ctx_list.ctx_lock);
25762306a36Sopenharmony_ci	INIT_LIST_HEAD(&ctx_list.idle_ctx);
25862306a36Sopenharmony_ci	init_waitqueue_head(&ctx_list.ctx_wait);
25962306a36Sopenharmony_ci	ctx_list.avail_ctx = 1;
26062306a36Sopenharmony_ci
26162306a36Sopenharmony_ci	ctx = kzalloc(sizeof(struct ksmbd_crypto_ctx), GFP_KERNEL);
26262306a36Sopenharmony_ci	if (!ctx)
26362306a36Sopenharmony_ci		return -ENOMEM;
26462306a36Sopenharmony_ci	list_add(&ctx->list, &ctx_list.idle_ctx);
26562306a36Sopenharmony_ci	return 0;
26662306a36Sopenharmony_ci}
267