162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * Copyright (C) 2019 Samsung Electronics Co., Ltd. 462306a36Sopenharmony_ci */ 562306a36Sopenharmony_ci 662306a36Sopenharmony_ci#include <linux/kernel.h> 762306a36Sopenharmony_ci#include <linux/string.h> 862306a36Sopenharmony_ci#include <linux/err.h> 962306a36Sopenharmony_ci#include <linux/slab.h> 1062306a36Sopenharmony_ci#include <linux/wait.h> 1162306a36Sopenharmony_ci#include <linux/sched.h> 1262306a36Sopenharmony_ci 1362306a36Sopenharmony_ci#include "glob.h" 1462306a36Sopenharmony_ci#include "crypto_ctx.h" 1562306a36Sopenharmony_ci 1662306a36Sopenharmony_cistruct crypto_ctx_list { 1762306a36Sopenharmony_ci spinlock_t ctx_lock; 1862306a36Sopenharmony_ci int avail_ctx; 1962306a36Sopenharmony_ci struct list_head idle_ctx; 2062306a36Sopenharmony_ci wait_queue_head_t ctx_wait; 2162306a36Sopenharmony_ci}; 2262306a36Sopenharmony_ci 2362306a36Sopenharmony_cistatic struct crypto_ctx_list ctx_list; 2462306a36Sopenharmony_ci 2562306a36Sopenharmony_cistatic inline void free_aead(struct crypto_aead *aead) 2662306a36Sopenharmony_ci{ 2762306a36Sopenharmony_ci if (aead) 2862306a36Sopenharmony_ci crypto_free_aead(aead); 2962306a36Sopenharmony_ci} 3062306a36Sopenharmony_ci 3162306a36Sopenharmony_cistatic void free_shash(struct shash_desc *shash) 3262306a36Sopenharmony_ci{ 3362306a36Sopenharmony_ci if (shash) { 3462306a36Sopenharmony_ci crypto_free_shash(shash->tfm); 3562306a36Sopenharmony_ci kfree(shash); 3662306a36Sopenharmony_ci } 3762306a36Sopenharmony_ci} 3862306a36Sopenharmony_ci 3962306a36Sopenharmony_cistatic struct crypto_aead *alloc_aead(int id) 4062306a36Sopenharmony_ci{ 4162306a36Sopenharmony_ci struct crypto_aead *tfm = NULL; 4262306a36Sopenharmony_ci 4362306a36Sopenharmony_ci switch (id) { 4462306a36Sopenharmony_ci case CRYPTO_AEAD_AES_GCM: 4562306a36Sopenharmony_ci tfm = crypto_alloc_aead("gcm(aes)", 0, 0); 4662306a36Sopenharmony_ci break; 4762306a36Sopenharmony_ci case CRYPTO_AEAD_AES_CCM: 4862306a36Sopenharmony_ci tfm = crypto_alloc_aead("ccm(aes)", 0, 0); 4962306a36Sopenharmony_ci break; 5062306a36Sopenharmony_ci default: 5162306a36Sopenharmony_ci pr_err("Does not support encrypt ahead(id : %d)\n", id); 5262306a36Sopenharmony_ci return NULL; 5362306a36Sopenharmony_ci } 5462306a36Sopenharmony_ci 5562306a36Sopenharmony_ci if (IS_ERR(tfm)) { 5662306a36Sopenharmony_ci pr_err("Failed to alloc encrypt aead : %ld\n", PTR_ERR(tfm)); 5762306a36Sopenharmony_ci return NULL; 5862306a36Sopenharmony_ci } 5962306a36Sopenharmony_ci 6062306a36Sopenharmony_ci return tfm; 6162306a36Sopenharmony_ci} 6262306a36Sopenharmony_ci 6362306a36Sopenharmony_cistatic struct shash_desc *alloc_shash_desc(int id) 6462306a36Sopenharmony_ci{ 6562306a36Sopenharmony_ci struct crypto_shash *tfm = NULL; 6662306a36Sopenharmony_ci struct shash_desc *shash; 6762306a36Sopenharmony_ci 6862306a36Sopenharmony_ci switch (id) { 6962306a36Sopenharmony_ci case CRYPTO_SHASH_HMACMD5: 7062306a36Sopenharmony_ci tfm = crypto_alloc_shash("hmac(md5)", 0, 0); 7162306a36Sopenharmony_ci break; 7262306a36Sopenharmony_ci case CRYPTO_SHASH_HMACSHA256: 7362306a36Sopenharmony_ci tfm = crypto_alloc_shash("hmac(sha256)", 0, 0); 7462306a36Sopenharmony_ci break; 7562306a36Sopenharmony_ci case CRYPTO_SHASH_CMACAES: 7662306a36Sopenharmony_ci tfm = crypto_alloc_shash("cmac(aes)", 0, 0); 7762306a36Sopenharmony_ci break; 7862306a36Sopenharmony_ci case CRYPTO_SHASH_SHA256: 7962306a36Sopenharmony_ci tfm = crypto_alloc_shash("sha256", 0, 0); 8062306a36Sopenharmony_ci break; 8162306a36Sopenharmony_ci case CRYPTO_SHASH_SHA512: 8262306a36Sopenharmony_ci tfm = crypto_alloc_shash("sha512", 0, 0); 8362306a36Sopenharmony_ci break; 8462306a36Sopenharmony_ci default: 8562306a36Sopenharmony_ci return NULL; 8662306a36Sopenharmony_ci } 8762306a36Sopenharmony_ci 8862306a36Sopenharmony_ci if (IS_ERR(tfm)) 8962306a36Sopenharmony_ci return NULL; 9062306a36Sopenharmony_ci 9162306a36Sopenharmony_ci shash = kzalloc(sizeof(*shash) + crypto_shash_descsize(tfm), 9262306a36Sopenharmony_ci GFP_KERNEL); 9362306a36Sopenharmony_ci if (!shash) 9462306a36Sopenharmony_ci crypto_free_shash(tfm); 9562306a36Sopenharmony_ci else 9662306a36Sopenharmony_ci shash->tfm = tfm; 9762306a36Sopenharmony_ci return shash; 9862306a36Sopenharmony_ci} 9962306a36Sopenharmony_ci 10062306a36Sopenharmony_cistatic void ctx_free(struct ksmbd_crypto_ctx *ctx) 10162306a36Sopenharmony_ci{ 10262306a36Sopenharmony_ci int i; 10362306a36Sopenharmony_ci 10462306a36Sopenharmony_ci for (i = 0; i < CRYPTO_SHASH_MAX; i++) 10562306a36Sopenharmony_ci free_shash(ctx->desc[i]); 10662306a36Sopenharmony_ci for (i = 0; i < CRYPTO_AEAD_MAX; i++) 10762306a36Sopenharmony_ci free_aead(ctx->ccmaes[i]); 10862306a36Sopenharmony_ci kfree(ctx); 10962306a36Sopenharmony_ci} 11062306a36Sopenharmony_ci 11162306a36Sopenharmony_cistatic struct ksmbd_crypto_ctx *ksmbd_find_crypto_ctx(void) 11262306a36Sopenharmony_ci{ 11362306a36Sopenharmony_ci struct ksmbd_crypto_ctx *ctx; 11462306a36Sopenharmony_ci 11562306a36Sopenharmony_ci while (1) { 11662306a36Sopenharmony_ci spin_lock(&ctx_list.ctx_lock); 11762306a36Sopenharmony_ci if (!list_empty(&ctx_list.idle_ctx)) { 11862306a36Sopenharmony_ci ctx = list_entry(ctx_list.idle_ctx.next, 11962306a36Sopenharmony_ci struct ksmbd_crypto_ctx, 12062306a36Sopenharmony_ci list); 12162306a36Sopenharmony_ci list_del(&ctx->list); 12262306a36Sopenharmony_ci spin_unlock(&ctx_list.ctx_lock); 12362306a36Sopenharmony_ci return ctx; 12462306a36Sopenharmony_ci } 12562306a36Sopenharmony_ci 12662306a36Sopenharmony_ci if (ctx_list.avail_ctx > num_online_cpus()) { 12762306a36Sopenharmony_ci spin_unlock(&ctx_list.ctx_lock); 12862306a36Sopenharmony_ci wait_event(ctx_list.ctx_wait, 12962306a36Sopenharmony_ci !list_empty(&ctx_list.idle_ctx)); 13062306a36Sopenharmony_ci continue; 13162306a36Sopenharmony_ci } 13262306a36Sopenharmony_ci 13362306a36Sopenharmony_ci ctx_list.avail_ctx++; 13462306a36Sopenharmony_ci spin_unlock(&ctx_list.ctx_lock); 13562306a36Sopenharmony_ci 13662306a36Sopenharmony_ci ctx = kzalloc(sizeof(struct ksmbd_crypto_ctx), GFP_KERNEL); 13762306a36Sopenharmony_ci if (!ctx) { 13862306a36Sopenharmony_ci spin_lock(&ctx_list.ctx_lock); 13962306a36Sopenharmony_ci ctx_list.avail_ctx--; 14062306a36Sopenharmony_ci spin_unlock(&ctx_list.ctx_lock); 14162306a36Sopenharmony_ci wait_event(ctx_list.ctx_wait, 14262306a36Sopenharmony_ci !list_empty(&ctx_list.idle_ctx)); 14362306a36Sopenharmony_ci continue; 14462306a36Sopenharmony_ci } 14562306a36Sopenharmony_ci break; 14662306a36Sopenharmony_ci } 14762306a36Sopenharmony_ci return ctx; 14862306a36Sopenharmony_ci} 14962306a36Sopenharmony_ci 15062306a36Sopenharmony_civoid ksmbd_release_crypto_ctx(struct ksmbd_crypto_ctx *ctx) 15162306a36Sopenharmony_ci{ 15262306a36Sopenharmony_ci if (!ctx) 15362306a36Sopenharmony_ci return; 15462306a36Sopenharmony_ci 15562306a36Sopenharmony_ci spin_lock(&ctx_list.ctx_lock); 15662306a36Sopenharmony_ci if (ctx_list.avail_ctx <= num_online_cpus()) { 15762306a36Sopenharmony_ci list_add(&ctx->list, &ctx_list.idle_ctx); 15862306a36Sopenharmony_ci spin_unlock(&ctx_list.ctx_lock); 15962306a36Sopenharmony_ci wake_up(&ctx_list.ctx_wait); 16062306a36Sopenharmony_ci return; 16162306a36Sopenharmony_ci } 16262306a36Sopenharmony_ci 16362306a36Sopenharmony_ci ctx_list.avail_ctx--; 16462306a36Sopenharmony_ci spin_unlock(&ctx_list.ctx_lock); 16562306a36Sopenharmony_ci ctx_free(ctx); 16662306a36Sopenharmony_ci} 16762306a36Sopenharmony_ci 16862306a36Sopenharmony_cistatic struct ksmbd_crypto_ctx *____crypto_shash_ctx_find(int id) 16962306a36Sopenharmony_ci{ 17062306a36Sopenharmony_ci struct ksmbd_crypto_ctx *ctx; 17162306a36Sopenharmony_ci 17262306a36Sopenharmony_ci if (id >= CRYPTO_SHASH_MAX) 17362306a36Sopenharmony_ci return NULL; 17462306a36Sopenharmony_ci 17562306a36Sopenharmony_ci ctx = ksmbd_find_crypto_ctx(); 17662306a36Sopenharmony_ci if (ctx->desc[id]) 17762306a36Sopenharmony_ci return ctx; 17862306a36Sopenharmony_ci 17962306a36Sopenharmony_ci ctx->desc[id] = alloc_shash_desc(id); 18062306a36Sopenharmony_ci if (ctx->desc[id]) 18162306a36Sopenharmony_ci return ctx; 18262306a36Sopenharmony_ci ksmbd_release_crypto_ctx(ctx); 18362306a36Sopenharmony_ci return NULL; 18462306a36Sopenharmony_ci} 18562306a36Sopenharmony_ci 18662306a36Sopenharmony_cistruct ksmbd_crypto_ctx *ksmbd_crypto_ctx_find_hmacmd5(void) 18762306a36Sopenharmony_ci{ 18862306a36Sopenharmony_ci return ____crypto_shash_ctx_find(CRYPTO_SHASH_HMACMD5); 18962306a36Sopenharmony_ci} 19062306a36Sopenharmony_ci 19162306a36Sopenharmony_cistruct ksmbd_crypto_ctx *ksmbd_crypto_ctx_find_hmacsha256(void) 19262306a36Sopenharmony_ci{ 19362306a36Sopenharmony_ci return ____crypto_shash_ctx_find(CRYPTO_SHASH_HMACSHA256); 19462306a36Sopenharmony_ci} 19562306a36Sopenharmony_ci 19662306a36Sopenharmony_cistruct ksmbd_crypto_ctx *ksmbd_crypto_ctx_find_cmacaes(void) 19762306a36Sopenharmony_ci{ 19862306a36Sopenharmony_ci return ____crypto_shash_ctx_find(CRYPTO_SHASH_CMACAES); 19962306a36Sopenharmony_ci} 20062306a36Sopenharmony_ci 20162306a36Sopenharmony_cistruct ksmbd_crypto_ctx *ksmbd_crypto_ctx_find_sha256(void) 20262306a36Sopenharmony_ci{ 20362306a36Sopenharmony_ci return ____crypto_shash_ctx_find(CRYPTO_SHASH_SHA256); 20462306a36Sopenharmony_ci} 20562306a36Sopenharmony_ci 20662306a36Sopenharmony_cistruct ksmbd_crypto_ctx *ksmbd_crypto_ctx_find_sha512(void) 20762306a36Sopenharmony_ci{ 20862306a36Sopenharmony_ci return ____crypto_shash_ctx_find(CRYPTO_SHASH_SHA512); 20962306a36Sopenharmony_ci} 21062306a36Sopenharmony_ci 21162306a36Sopenharmony_cistatic struct ksmbd_crypto_ctx *____crypto_aead_ctx_find(int id) 21262306a36Sopenharmony_ci{ 21362306a36Sopenharmony_ci struct ksmbd_crypto_ctx *ctx; 21462306a36Sopenharmony_ci 21562306a36Sopenharmony_ci if (id >= CRYPTO_AEAD_MAX) 21662306a36Sopenharmony_ci return NULL; 21762306a36Sopenharmony_ci 21862306a36Sopenharmony_ci ctx = ksmbd_find_crypto_ctx(); 21962306a36Sopenharmony_ci if (ctx->ccmaes[id]) 22062306a36Sopenharmony_ci return ctx; 22162306a36Sopenharmony_ci 22262306a36Sopenharmony_ci ctx->ccmaes[id] = alloc_aead(id); 22362306a36Sopenharmony_ci if (ctx->ccmaes[id]) 22462306a36Sopenharmony_ci return ctx; 22562306a36Sopenharmony_ci ksmbd_release_crypto_ctx(ctx); 22662306a36Sopenharmony_ci return NULL; 22762306a36Sopenharmony_ci} 22862306a36Sopenharmony_ci 22962306a36Sopenharmony_cistruct ksmbd_crypto_ctx *ksmbd_crypto_ctx_find_gcm(void) 23062306a36Sopenharmony_ci{ 23162306a36Sopenharmony_ci return ____crypto_aead_ctx_find(CRYPTO_AEAD_AES_GCM); 23262306a36Sopenharmony_ci} 23362306a36Sopenharmony_ci 23462306a36Sopenharmony_cistruct ksmbd_crypto_ctx *ksmbd_crypto_ctx_find_ccm(void) 23562306a36Sopenharmony_ci{ 23662306a36Sopenharmony_ci return ____crypto_aead_ctx_find(CRYPTO_AEAD_AES_CCM); 23762306a36Sopenharmony_ci} 23862306a36Sopenharmony_ci 23962306a36Sopenharmony_civoid ksmbd_crypto_destroy(void) 24062306a36Sopenharmony_ci{ 24162306a36Sopenharmony_ci struct ksmbd_crypto_ctx *ctx; 24262306a36Sopenharmony_ci 24362306a36Sopenharmony_ci while (!list_empty(&ctx_list.idle_ctx)) { 24462306a36Sopenharmony_ci ctx = list_entry(ctx_list.idle_ctx.next, 24562306a36Sopenharmony_ci struct ksmbd_crypto_ctx, 24662306a36Sopenharmony_ci list); 24762306a36Sopenharmony_ci list_del(&ctx->list); 24862306a36Sopenharmony_ci ctx_free(ctx); 24962306a36Sopenharmony_ci } 25062306a36Sopenharmony_ci} 25162306a36Sopenharmony_ci 25262306a36Sopenharmony_ciint ksmbd_crypto_create(void) 25362306a36Sopenharmony_ci{ 25462306a36Sopenharmony_ci struct ksmbd_crypto_ctx *ctx; 25562306a36Sopenharmony_ci 25662306a36Sopenharmony_ci spin_lock_init(&ctx_list.ctx_lock); 25762306a36Sopenharmony_ci INIT_LIST_HEAD(&ctx_list.idle_ctx); 25862306a36Sopenharmony_ci init_waitqueue_head(&ctx_list.ctx_wait); 25962306a36Sopenharmony_ci ctx_list.avail_ctx = 1; 26062306a36Sopenharmony_ci 26162306a36Sopenharmony_ci ctx = kzalloc(sizeof(struct ksmbd_crypto_ctx), GFP_KERNEL); 26262306a36Sopenharmony_ci if (!ctx) 26362306a36Sopenharmony_ci return -ENOMEM; 26462306a36Sopenharmony_ci list_add(&ctx->list, &ctx_list.idle_ctx); 26562306a36Sopenharmony_ci return 0; 26662306a36Sopenharmony_ci} 267