powerpc/mm/radix: Use the right page size for vmemmap mapping
[linux-2.6-block.git] / crypto / akcipher.c
CommitLineData
3c339ab8
TS
1/*
2 * Public Key Encryption
3 *
4 * Copyright (c) 2015, Intel Corporation
5 * Authors: Tadeusz Struk <tadeusz.struk@intel.com>
6 *
7 * This program is free software; you can redistribute it and/or modify it
8 * under the terms of the GNU General Public License as published by the Free
9 * Software Foundation; either version 2 of the License, or (at your option)
10 * any later version.
11 *
12 */
13#include <linux/errno.h>
14#include <linux/kernel.h>
15#include <linux/module.h>
16#include <linux/seq_file.h>
17#include <linux/slab.h>
18#include <linux/string.h>
19#include <linux/crypto.h>
d8c34b94 20#include <linux/compiler.h>
3c339ab8
TS
21#include <crypto/algapi.h>
22#include <linux/cryptouser.h>
23#include <net/netlink.h>
24#include <crypto/akcipher.h>
28a4618a 25#include <crypto/internal/akcipher.h>
3c339ab8
TS
26#include "internal.h"
27
28#ifdef CONFIG_NET
29static int crypto_akcipher_report(struct sk_buff *skb, struct crypto_alg *alg)
30{
31 struct crypto_report_akcipher rakcipher;
32
37db69e0 33 memset(&rakcipher, 0, sizeof(rakcipher));
3c339ab8 34
37db69e0 35 strscpy(rakcipher.type, "akcipher", sizeof(rakcipher.type));
3c339ab8 36
37db69e0
EB
37 return nla_put(skb, CRYPTOCFGA_REPORT_AKCIPHER,
38 sizeof(rakcipher), &rakcipher);
3c339ab8
TS
39}
40#else
41static int crypto_akcipher_report(struct sk_buff *skb, struct crypto_alg *alg)
42{
43 return -ENOSYS;
44}
45#endif
46
47static void crypto_akcipher_show(struct seq_file *m, struct crypto_alg *alg)
d8c34b94 48 __maybe_unused;
3c339ab8
TS
49
50static void crypto_akcipher_show(struct seq_file *m, struct crypto_alg *alg)
51{
52 seq_puts(m, "type : akcipher\n");
53}
54
55static void crypto_akcipher_exit_tfm(struct crypto_tfm *tfm)
56{
57 struct crypto_akcipher *akcipher = __crypto_akcipher_tfm(tfm);
58 struct akcipher_alg *alg = crypto_akcipher_alg(akcipher);
59
60 alg->exit(akcipher);
61}
62
63static int crypto_akcipher_init_tfm(struct crypto_tfm *tfm)
64{
65 struct crypto_akcipher *akcipher = __crypto_akcipher_tfm(tfm);
66 struct akcipher_alg *alg = crypto_akcipher_alg(akcipher);
67
68 if (alg->exit)
69 akcipher->base.exit = crypto_akcipher_exit_tfm;
70
71 if (alg->init)
72 return alg->init(akcipher);
73
74 return 0;
75}
76
28a4618a
AZ
77static void crypto_akcipher_free_instance(struct crypto_instance *inst)
78{
79 struct akcipher_instance *akcipher = akcipher_instance(inst);
80
81 akcipher->free(akcipher);
82}
83
3c339ab8
TS
84static const struct crypto_type crypto_akcipher_type = {
85 .extsize = crypto_alg_extsize,
86 .init_tfm = crypto_akcipher_init_tfm,
28a4618a 87 .free = crypto_akcipher_free_instance,
3c339ab8
TS
88#ifdef CONFIG_PROC_FS
89 .show = crypto_akcipher_show,
90#endif
91 .report = crypto_akcipher_report,
92 .maskclear = ~CRYPTO_ALG_TYPE_MASK,
93 .maskset = CRYPTO_ALG_TYPE_MASK,
94 .type = CRYPTO_ALG_TYPE_AKCIPHER,
95 .tfmsize = offsetof(struct crypto_akcipher, base),
96};
97
28a4618a
AZ
98int crypto_grab_akcipher(struct crypto_akcipher_spawn *spawn, const char *name,
99 u32 type, u32 mask)
100{
101 spawn->base.frontend = &crypto_akcipher_type;
102 return crypto_grab_spawn(&spawn->base, name, type, mask);
103}
104EXPORT_SYMBOL_GPL(crypto_grab_akcipher);
105
3c339ab8
TS
106struct crypto_akcipher *crypto_alloc_akcipher(const char *alg_name, u32 type,
107 u32 mask)
108{
109 return crypto_alloc_tfm(alg_name, &crypto_akcipher_type, type, mask);
110}
111EXPORT_SYMBOL_GPL(crypto_alloc_akcipher);
112
28a4618a 113static void akcipher_prepare_alg(struct akcipher_alg *alg)
3c339ab8
TS
114{
115 struct crypto_alg *base = &alg->base;
116
117 base->cra_type = &crypto_akcipher_type;
118 base->cra_flags &= ~CRYPTO_ALG_TYPE_MASK;
119 base->cra_flags |= CRYPTO_ALG_TYPE_AKCIPHER;
28a4618a
AZ
120}
121
78a0324f
VC
122static int akcipher_default_op(struct akcipher_request *req)
123{
124 return -ENOSYS;
125}
126
28a4618a
AZ
127int crypto_register_akcipher(struct akcipher_alg *alg)
128{
129 struct crypto_alg *base = &alg->base;
130
78a0324f
VC
131 if (!alg->sign)
132 alg->sign = akcipher_default_op;
133 if (!alg->verify)
134 alg->verify = akcipher_default_op;
135 if (!alg->encrypt)
136 alg->encrypt = akcipher_default_op;
137 if (!alg->decrypt)
138 alg->decrypt = akcipher_default_op;
139
28a4618a 140 akcipher_prepare_alg(alg);
3c339ab8
TS
141 return crypto_register_alg(base);
142}
143EXPORT_SYMBOL_GPL(crypto_register_akcipher);
144
145void crypto_unregister_akcipher(struct akcipher_alg *alg)
146{
147 crypto_unregister_alg(&alg->base);
148}
149EXPORT_SYMBOL_GPL(crypto_unregister_akcipher);
150
28a4618a
AZ
151int akcipher_register_instance(struct crypto_template *tmpl,
152 struct akcipher_instance *inst)
153{
154 akcipher_prepare_alg(&inst->alg);
155 return crypto_register_instance(tmpl, akcipher_crypto_instance(inst));
156}
157EXPORT_SYMBOL_GPL(akcipher_register_instance);
158
3c339ab8 159MODULE_LICENSE("GPL");
338a9de0 160MODULE_DESCRIPTION("Generic public key cipher type");