blob: e54328364a85d8114269b7b9c8927d8228c98bc2 [file] [log] [blame]
Herbert Xu7b5a080b2008-08-31 15:47:27 +10001/*
2 * Synchronous Cryptographic Hash operations.
3 *
4 * Copyright (c) 2008 Herbert Xu <herbert@gondor.apana.org.au>
5 *
6 * This program is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the Free
8 * Software Foundation; either version 2 of the License, or (at your option)
9 * any later version.
10 *
11 */
12
Herbert Xu3b2f6df2008-08-31 18:52:18 +100013#include <crypto/scatterwalk.h>
Herbert Xu7b5a080b2008-08-31 15:47:27 +100014#include <crypto/internal/hash.h>
15#include <linux/err.h>
16#include <linux/kernel.h>
17#include <linux/module.h>
18#include <linux/slab.h>
19#include <linux/seq_file.h>
20
Herbert Xu3b2f6df2008-08-31 18:52:18 +100021#include "internal.h"
22
Herbert Xu3f683d62009-02-18 16:56:59 +080023static const struct crypto_type crypto_shash_type;
24
Herbert Xu57cfe442009-07-11 22:17:39 +080025static int shash_no_setkey(struct crypto_shash *tfm, const u8 *key,
26 unsigned int keylen)
27{
28 return -ENOSYS;
29}
30
Herbert Xu7b5a080b2008-08-31 15:47:27 +100031static int shash_setkey_unaligned(struct crypto_shash *tfm, const u8 *key,
32 unsigned int keylen)
33{
34 struct shash_alg *shash = crypto_shash_alg(tfm);
35 unsigned long alignmask = crypto_shash_alignmask(tfm);
36 unsigned long absize;
37 u8 *buffer, *alignbuffer;
38 int err;
39
40 absize = keylen + (alignmask & ~(CRYPTO_MINALIGN - 1));
41 buffer = kmalloc(absize, GFP_KERNEL);
42 if (!buffer)
43 return -ENOMEM;
44
45 alignbuffer = (u8 *)ALIGN((unsigned long)buffer, alignmask + 1);
46 memcpy(alignbuffer, key, keylen);
47 err = shash->setkey(tfm, alignbuffer, keylen);
Herbert Xu8c32c512009-07-14 21:35:36 +080048 kzfree(buffer);
Herbert Xu7b5a080b2008-08-31 15:47:27 +100049 return err;
50}
51
52int crypto_shash_setkey(struct crypto_shash *tfm, const u8 *key,
53 unsigned int keylen)
54{
55 struct shash_alg *shash = crypto_shash_alg(tfm);
56 unsigned long alignmask = crypto_shash_alignmask(tfm);
57
58 if ((unsigned long)key & alignmask)
59 return shash_setkey_unaligned(tfm, key, keylen);
60
61 return shash->setkey(tfm, key, keylen);
62}
63EXPORT_SYMBOL_GPL(crypto_shash_setkey);
64
65static inline unsigned int shash_align_buffer_size(unsigned len,
66 unsigned long mask)
67{
68 return len + (mask & ~(__alignof__(u8 __attribute__ ((aligned))) - 1));
69}
70
71static int shash_update_unaligned(struct shash_desc *desc, const u8 *data,
72 unsigned int len)
73{
74 struct crypto_shash *tfm = desc->tfm;
75 struct shash_alg *shash = crypto_shash_alg(tfm);
76 unsigned long alignmask = crypto_shash_alignmask(tfm);
77 unsigned int unaligned_len = alignmask + 1 -
78 ((unsigned long)data & alignmask);
79 u8 buf[shash_align_buffer_size(unaligned_len, alignmask)]
80 __attribute__ ((aligned));
Herbert Xu8c32c512009-07-14 21:35:36 +080081 int err;
Herbert Xu7b5a080b2008-08-31 15:47:27 +100082
Yehuda Sadehf4f68992009-03-27 13:03:51 +080083 if (unaligned_len > len)
84 unaligned_len = len;
85
Herbert Xu7b5a080b2008-08-31 15:47:27 +100086 memcpy(buf, data, unaligned_len);
Herbert Xu8c32c512009-07-14 21:35:36 +080087 err = shash->update(desc, buf, unaligned_len);
88 memset(buf, 0, unaligned_len);
Herbert Xu7b5a080b2008-08-31 15:47:27 +100089
Herbert Xu8c32c512009-07-14 21:35:36 +080090 return err ?:
Herbert Xu7b5a080b2008-08-31 15:47:27 +100091 shash->update(desc, data + unaligned_len, len - unaligned_len);
92}
93
94int crypto_shash_update(struct shash_desc *desc, const u8 *data,
95 unsigned int len)
96{
97 struct crypto_shash *tfm = desc->tfm;
98 struct shash_alg *shash = crypto_shash_alg(tfm);
99 unsigned long alignmask = crypto_shash_alignmask(tfm);
100
101 if ((unsigned long)data & alignmask)
102 return shash_update_unaligned(desc, data, len);
103
104 return shash->update(desc, data, len);
105}
106EXPORT_SYMBOL_GPL(crypto_shash_update);
107
108static int shash_final_unaligned(struct shash_desc *desc, u8 *out)
109{
110 struct crypto_shash *tfm = desc->tfm;
111 unsigned long alignmask = crypto_shash_alignmask(tfm);
112 struct shash_alg *shash = crypto_shash_alg(tfm);
113 unsigned int ds = crypto_shash_digestsize(tfm);
114 u8 buf[shash_align_buffer_size(ds, alignmask)]
115 __attribute__ ((aligned));
116 int err;
117
118 err = shash->final(desc, buf);
Herbert Xu8c32c512009-07-14 21:35:36 +0800119 if (err)
120 goto out;
121
Herbert Xu7b5a080b2008-08-31 15:47:27 +1000122 memcpy(out, buf, ds);
Herbert Xu8c32c512009-07-14 21:35:36 +0800123
124out:
125 memset(buf, 0, ds);
Herbert Xu7b5a080b2008-08-31 15:47:27 +1000126 return err;
127}
128
129int crypto_shash_final(struct shash_desc *desc, u8 *out)
130{
131 struct crypto_shash *tfm = desc->tfm;
132 struct shash_alg *shash = crypto_shash_alg(tfm);
133 unsigned long alignmask = crypto_shash_alignmask(tfm);
134
135 if ((unsigned long)out & alignmask)
136 return shash_final_unaligned(desc, out);
137
138 return shash->final(desc, out);
139}
140EXPORT_SYMBOL_GPL(crypto_shash_final);
141
142static int shash_finup_unaligned(struct shash_desc *desc, const u8 *data,
143 unsigned int len, u8 *out)
144{
145 return crypto_shash_update(desc, data, len) ?:
146 crypto_shash_final(desc, out);
147}
148
149int crypto_shash_finup(struct shash_desc *desc, const u8 *data,
150 unsigned int len, u8 *out)
151{
152 struct crypto_shash *tfm = desc->tfm;
153 struct shash_alg *shash = crypto_shash_alg(tfm);
154 unsigned long alignmask = crypto_shash_alignmask(tfm);
155
Herbert Xu8267ada2009-07-09 20:36:44 +0800156 if (((unsigned long)data | (unsigned long)out) & alignmask)
Herbert Xu7b5a080b2008-08-31 15:47:27 +1000157 return shash_finup_unaligned(desc, data, len, out);
158
159 return shash->finup(desc, data, len, out);
160}
161EXPORT_SYMBOL_GPL(crypto_shash_finup);
162
163static int shash_digest_unaligned(struct shash_desc *desc, const u8 *data,
164 unsigned int len, u8 *out)
165{
166 return crypto_shash_init(desc) ?:
Herbert Xuf88ad8d2009-07-08 23:32:08 +0800167 crypto_shash_finup(desc, data, len, out);
Herbert Xu7b5a080b2008-08-31 15:47:27 +1000168}
169
170int crypto_shash_digest(struct shash_desc *desc, const u8 *data,
171 unsigned int len, u8 *out)
172{
173 struct crypto_shash *tfm = desc->tfm;
174 struct shash_alg *shash = crypto_shash_alg(tfm);
175 unsigned long alignmask = crypto_shash_alignmask(tfm);
176
Herbert Xu8267ada2009-07-09 20:36:44 +0800177 if (((unsigned long)data | (unsigned long)out) & alignmask)
Herbert Xu7b5a080b2008-08-31 15:47:27 +1000178 return shash_digest_unaligned(desc, data, len, out);
179
180 return shash->digest(desc, data, len, out);
181}
182EXPORT_SYMBOL_GPL(crypto_shash_digest);
183
Herbert Xu99d27e12009-07-09 20:30:57 +0800184static int shash_no_export(struct shash_desc *desc, void *out)
Herbert Xudec8b782008-11-02 21:38:11 +0800185{
Herbert Xu99d27e12009-07-09 20:30:57 +0800186 return -ENOSYS;
Herbert Xudec8b782008-11-02 21:38:11 +0800187}
Herbert Xu99d27e12009-07-09 20:30:57 +0800188
189static int shash_no_import(struct shash_desc *desc, const void *in)
190{
191 return -ENOSYS;
192}
Herbert Xudec8b782008-11-02 21:38:11 +0800193
Herbert Xu3b2f6df2008-08-31 18:52:18 +1000194static int shash_async_setkey(struct crypto_ahash *tfm, const u8 *key,
195 unsigned int keylen)
196{
197 struct crypto_shash **ctx = crypto_ahash_ctx(tfm);
198
199 return crypto_shash_setkey(*ctx, key, keylen);
200}
201
202static int shash_async_init(struct ahash_request *req)
203{
204 struct crypto_shash **ctx = crypto_ahash_ctx(crypto_ahash_reqtfm(req));
205 struct shash_desc *desc = ahash_request_ctx(req);
206
207 desc->tfm = *ctx;
208 desc->flags = req->base.flags;
209
210 return crypto_shash_init(desc);
211}
212
Herbert Xu7eddf952009-07-12 21:25:20 +0800213int shash_ahash_update(struct ahash_request *req, struct shash_desc *desc)
Herbert Xu3b2f6df2008-08-31 18:52:18 +1000214{
Herbert Xu3b2f6df2008-08-31 18:52:18 +1000215 struct crypto_hash_walk walk;
216 int nbytes;
217
218 for (nbytes = crypto_hash_walk_first(req, &walk); nbytes > 0;
219 nbytes = crypto_hash_walk_done(&walk, nbytes))
220 nbytes = crypto_shash_update(desc, walk.data, nbytes);
221
222 return nbytes;
223}
Herbert Xu7eddf952009-07-12 21:25:20 +0800224EXPORT_SYMBOL_GPL(shash_ahash_update);
225
226static int shash_async_update(struct ahash_request *req)
227{
228 return shash_ahash_update(req, ahash_request_ctx(req));
229}
Herbert Xu3b2f6df2008-08-31 18:52:18 +1000230
231static int shash_async_final(struct ahash_request *req)
232{
233 return crypto_shash_final(ahash_request_ctx(req), req->result);
234}
235
Herbert Xu7eddf952009-07-12 21:25:20 +0800236int shash_ahash_digest(struct ahash_request *req, struct shash_desc *desc)
Herbert Xu3b2f6df2008-08-31 18:52:18 +1000237{
238 struct scatterlist *sg = req->src;
239 unsigned int offset = sg->offset;
240 unsigned int nbytes = req->nbytes;
241 int err;
242
243 if (nbytes < min(sg->length, ((unsigned int)(PAGE_SIZE)) - offset)) {
Herbert Xu3b2f6df2008-08-31 18:52:18 +1000244 void *data;
245
Herbert Xu3b2f6df2008-08-31 18:52:18 +1000246 data = crypto_kmap(sg_page(sg), 0);
247 err = crypto_shash_digest(desc, data + offset, nbytes,
248 req->result);
249 crypto_kunmap(data, 0);
250 crypto_yield(desc->flags);
Herbert Xu7eddf952009-07-12 21:25:20 +0800251 } else
252 err = crypto_shash_init(desc) ?:
253 shash_ahash_update(req, desc) ?:
254 crypto_shash_final(desc, req->result);
Herbert Xu3b2f6df2008-08-31 18:52:18 +1000255
Herbert Xu3b2f6df2008-08-31 18:52:18 +1000256 return err;
257}
Herbert Xu7eddf952009-07-12 21:25:20 +0800258EXPORT_SYMBOL_GPL(shash_ahash_digest);
259
260static int shash_async_digest(struct ahash_request *req)
261{
262 struct crypto_shash **ctx = crypto_ahash_ctx(crypto_ahash_reqtfm(req));
263 struct shash_desc *desc = ahash_request_ctx(req);
264
265 desc->tfm = *ctx;
266 desc->flags = req->base.flags;
267
268 return shash_ahash_digest(req, desc);
269}
Herbert Xu3b2f6df2008-08-31 18:52:18 +1000270
271static void crypto_exit_shash_ops_async(struct crypto_tfm *tfm)
272{
273 struct crypto_shash **ctx = crypto_tfm_ctx(tfm);
274
275 crypto_free_shash(*ctx);
276}
277
Herbert Xu88056ec2009-07-14 12:28:26 +0800278int crypto_init_shash_ops_async(struct crypto_tfm *tfm)
Herbert Xu3b2f6df2008-08-31 18:52:18 +1000279{
280 struct crypto_alg *calg = tfm->__crt_alg;
Herbert Xu88056ec2009-07-14 12:28:26 +0800281 struct crypto_ahash *crt = __crypto_ahash_cast(tfm);
Herbert Xu3b2f6df2008-08-31 18:52:18 +1000282 struct crypto_shash **ctx = crypto_tfm_ctx(tfm);
283 struct crypto_shash *shash;
284
285 if (!crypto_mod_get(calg))
286 return -EAGAIN;
287
Herbert Xu3f683d62009-02-18 16:56:59 +0800288 shash = crypto_create_tfm(calg, &crypto_shash_type);
Herbert Xu3b2f6df2008-08-31 18:52:18 +1000289 if (IS_ERR(shash)) {
290 crypto_mod_put(calg);
291 return PTR_ERR(shash);
292 }
293
294 *ctx = shash;
295 tfm->exit = crypto_exit_shash_ops_async;
296
297 crt->init = shash_async_init;
298 crt->update = shash_async_update;
299 crt->final = shash_async_final;
300 crt->digest = shash_async_digest;
301 crt->setkey = shash_async_setkey;
302
Herbert Xu3b2f6df2008-08-31 18:52:18 +1000303 crt->reqsize = sizeof(struct shash_desc) + crypto_shash_descsize(shash);
304
305 return 0;
306}
307
Herbert Xu5f7082e2008-08-31 22:21:09 +1000308static int shash_compat_setkey(struct crypto_hash *tfm, const u8 *key,
309 unsigned int keylen)
310{
Herbert Xu113adef2009-07-14 12:50:12 +0800311 struct shash_desc **descp = crypto_hash_ctx(tfm);
312 struct shash_desc *desc = *descp;
Herbert Xu5f7082e2008-08-31 22:21:09 +1000313
314 return crypto_shash_setkey(desc->tfm, key, keylen);
315}
316
317static int shash_compat_init(struct hash_desc *hdesc)
318{
Herbert Xu113adef2009-07-14 12:50:12 +0800319 struct shash_desc **descp = crypto_hash_ctx(hdesc->tfm);
320 struct shash_desc *desc = *descp;
Herbert Xu5f7082e2008-08-31 22:21:09 +1000321
322 desc->flags = hdesc->flags;
323
324 return crypto_shash_init(desc);
325}
326
327static int shash_compat_update(struct hash_desc *hdesc, struct scatterlist *sg,
328 unsigned int len)
329{
Herbert Xu113adef2009-07-14 12:50:12 +0800330 struct shash_desc **descp = crypto_hash_ctx(hdesc->tfm);
331 struct shash_desc *desc = *descp;
Herbert Xu5f7082e2008-08-31 22:21:09 +1000332 struct crypto_hash_walk walk;
333 int nbytes;
334
335 for (nbytes = crypto_hash_walk_first_compat(hdesc, &walk, sg, len);
336 nbytes > 0; nbytes = crypto_hash_walk_done(&walk, nbytes))
337 nbytes = crypto_shash_update(desc, walk.data, nbytes);
338
339 return nbytes;
340}
341
342static int shash_compat_final(struct hash_desc *hdesc, u8 *out)
343{
Herbert Xu113adef2009-07-14 12:50:12 +0800344 struct shash_desc **descp = crypto_hash_ctx(hdesc->tfm);
345
346 return crypto_shash_final(*descp, out);
Herbert Xu5f7082e2008-08-31 22:21:09 +1000347}
348
349static int shash_compat_digest(struct hash_desc *hdesc, struct scatterlist *sg,
350 unsigned int nbytes, u8 *out)
351{
352 unsigned int offset = sg->offset;
353 int err;
354
355 if (nbytes < min(sg->length, ((unsigned int)(PAGE_SIZE)) - offset)) {
Herbert Xu113adef2009-07-14 12:50:12 +0800356 struct shash_desc **descp = crypto_hash_ctx(hdesc->tfm);
357 struct shash_desc *desc = *descp;
Herbert Xu5f7082e2008-08-31 22:21:09 +1000358 void *data;
359
360 desc->flags = hdesc->flags;
361
362 data = crypto_kmap(sg_page(sg), 0);
363 err = crypto_shash_digest(desc, data + offset, nbytes, out);
364 crypto_kunmap(data, 0);
365 crypto_yield(desc->flags);
366 goto out;
367 }
368
369 err = shash_compat_init(hdesc);
370 if (err)
371 goto out;
372
373 err = shash_compat_update(hdesc, sg, nbytes);
374 if (err)
375 goto out;
376
377 err = shash_compat_final(hdesc, out);
378
379out:
380 return err;
381}
382
383static void crypto_exit_shash_ops_compat(struct crypto_tfm *tfm)
384{
Herbert Xu113adef2009-07-14 12:50:12 +0800385 struct shash_desc **descp = crypto_tfm_ctx(tfm);
386 struct shash_desc *desc = *descp;
Herbert Xu5f7082e2008-08-31 22:21:09 +1000387
388 crypto_free_shash(desc->tfm);
Herbert Xu113adef2009-07-14 12:50:12 +0800389 kzfree(desc);
Herbert Xu5f7082e2008-08-31 22:21:09 +1000390}
391
392static int crypto_init_shash_ops_compat(struct crypto_tfm *tfm)
393{
394 struct hash_tfm *crt = &tfm->crt_hash;
395 struct crypto_alg *calg = tfm->__crt_alg;
396 struct shash_alg *alg = __crypto_shash_alg(calg);
Herbert Xu113adef2009-07-14 12:50:12 +0800397 struct shash_desc **descp = crypto_tfm_ctx(tfm);
Herbert Xu5f7082e2008-08-31 22:21:09 +1000398 struct crypto_shash *shash;
Herbert Xu113adef2009-07-14 12:50:12 +0800399 struct shash_desc *desc;
Herbert Xu5f7082e2008-08-31 22:21:09 +1000400
Adrian-Ken Rueegsegger4abfd732009-02-05 16:19:31 +1100401 if (!crypto_mod_get(calg))
402 return -EAGAIN;
403
Herbert Xu3f683d62009-02-18 16:56:59 +0800404 shash = crypto_create_tfm(calg, &crypto_shash_type);
Adrian-Ken Rueegsegger4abfd732009-02-05 16:19:31 +1100405 if (IS_ERR(shash)) {
406 crypto_mod_put(calg);
Herbert Xu5f7082e2008-08-31 22:21:09 +1000407 return PTR_ERR(shash);
Adrian-Ken Rueegsegger4abfd732009-02-05 16:19:31 +1100408 }
Herbert Xu5f7082e2008-08-31 22:21:09 +1000409
Herbert Xu113adef2009-07-14 12:50:12 +0800410 desc = kmalloc(sizeof(*desc) + crypto_shash_descsize(shash),
411 GFP_KERNEL);
412 if (!desc) {
413 crypto_free_shash(shash);
414 return -ENOMEM;
415 }
416
417 *descp = desc;
Herbert Xu5f7082e2008-08-31 22:21:09 +1000418 desc->tfm = shash;
419 tfm->exit = crypto_exit_shash_ops_compat;
420
421 crt->init = shash_compat_init;
422 crt->update = shash_compat_update;
423 crt->final = shash_compat_final;
424 crt->digest = shash_compat_digest;
425 crt->setkey = shash_compat_setkey;
426
427 crt->digestsize = alg->digestsize;
428
429 return 0;
430}
431
Herbert Xu3b2f6df2008-08-31 18:52:18 +1000432static int crypto_init_shash_ops(struct crypto_tfm *tfm, u32 type, u32 mask)
433{
434 switch (mask & CRYPTO_ALG_TYPE_MASK) {
Herbert Xu5f7082e2008-08-31 22:21:09 +1000435 case CRYPTO_ALG_TYPE_HASH_MASK:
436 return crypto_init_shash_ops_compat(tfm);
Herbert Xu3b2f6df2008-08-31 18:52:18 +1000437 }
438
439 return -EINVAL;
440}
441
442static unsigned int crypto_shash_ctxsize(struct crypto_alg *alg, u32 type,
443 u32 mask)
444{
445 switch (mask & CRYPTO_ALG_TYPE_MASK) {
Herbert Xu5f7082e2008-08-31 22:21:09 +1000446 case CRYPTO_ALG_TYPE_HASH_MASK:
Herbert Xu113adef2009-07-14 12:50:12 +0800447 return sizeof(struct shash_desc *);
Herbert Xu3b2f6df2008-08-31 18:52:18 +1000448 }
449
450 return 0;
451}
452
Herbert Xu2ca33da2009-07-13 20:46:25 +0800453static int crypto_shash_init_tfm(struct crypto_tfm *tfm)
Herbert Xu7b5a080b2008-08-31 15:47:27 +1000454{
Herbert Xu113adef2009-07-14 12:50:12 +0800455 struct crypto_shash *hash = __crypto_shash_cast(tfm);
456
457 hash->descsize = crypto_shash_alg(hash)->descsize;
Herbert Xu7b5a080b2008-08-31 15:47:27 +1000458 return 0;
459}
460
Herbert Xu2ca33da2009-07-13 20:46:25 +0800461static unsigned int crypto_shash_extsize(struct crypto_alg *alg)
Herbert Xu7b5a080b2008-08-31 15:47:27 +1000462{
463 return alg->cra_ctxsize;
464}
465
466static void crypto_shash_show(struct seq_file *m, struct crypto_alg *alg)
467 __attribute__ ((unused));
468static void crypto_shash_show(struct seq_file *m, struct crypto_alg *alg)
469{
470 struct shash_alg *salg = __crypto_shash_alg(alg);
471
472 seq_printf(m, "type : shash\n");
473 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize);
474 seq_printf(m, "digestsize : %u\n", salg->digestsize);
Herbert Xu7b5a080b2008-08-31 15:47:27 +1000475}
476
477static const struct crypto_type crypto_shash_type = {
Herbert Xu3b2f6df2008-08-31 18:52:18 +1000478 .ctxsize = crypto_shash_ctxsize,
Herbert Xu7b5a080b2008-08-31 15:47:27 +1000479 .extsize = crypto_shash_extsize,
Herbert Xu3b2f6df2008-08-31 18:52:18 +1000480 .init = crypto_init_shash_ops,
Herbert Xu7b5a080b2008-08-31 15:47:27 +1000481 .init_tfm = crypto_shash_init_tfm,
482#ifdef CONFIG_PROC_FS
483 .show = crypto_shash_show,
484#endif
485 .maskclear = ~CRYPTO_ALG_TYPE_MASK,
486 .maskset = CRYPTO_ALG_TYPE_MASK,
487 .type = CRYPTO_ALG_TYPE_SHASH,
488 .tfmsize = offsetof(struct crypto_shash, base),
489};
490
491struct crypto_shash *crypto_alloc_shash(const char *alg_name, u32 type,
492 u32 mask)
493{
Herbert Xu3f683d62009-02-18 16:56:59 +0800494 return crypto_alloc_tfm(alg_name, &crypto_shash_type, type, mask);
Herbert Xu7b5a080b2008-08-31 15:47:27 +1000495}
496EXPORT_SYMBOL_GPL(crypto_alloc_shash);
497
Herbert Xu619a6eb2009-07-08 18:46:23 +0800498static int shash_prepare_alg(struct shash_alg *alg)
Herbert Xu7b5a080b2008-08-31 15:47:27 +1000499{
500 struct crypto_alg *base = &alg->base;
501
502 if (alg->digestsize > PAGE_SIZE / 8 ||
Herbert Xu99d27e12009-07-09 20:30:57 +0800503 alg->descsize > PAGE_SIZE / 8 ||
504 alg->statesize > PAGE_SIZE / 8)
Herbert Xu7b5a080b2008-08-31 15:47:27 +1000505 return -EINVAL;
506
507 base->cra_type = &crypto_shash_type;
508 base->cra_flags &= ~CRYPTO_ALG_TYPE_MASK;
509 base->cra_flags |= CRYPTO_ALG_TYPE_SHASH;
Herbert Xu99d27e12009-07-09 20:30:57 +0800510
Herbert Xu8267ada2009-07-09 20:36:44 +0800511 if (!alg->finup)
512 alg->finup = shash_finup_unaligned;
513 if (!alg->digest)
514 alg->digest = shash_digest_unaligned;
Herbert Xu99d27e12009-07-09 20:30:57 +0800515 if (!alg->import)
516 alg->import = shash_no_import;
517 if (!alg->export)
518 alg->export = shash_no_export;
Herbert Xu57cfe442009-07-11 22:17:39 +0800519 if (!alg->setkey)
520 alg->setkey = shash_no_setkey;
Herbert Xu99d27e12009-07-09 20:30:57 +0800521
Herbert Xu619a6eb2009-07-08 18:46:23 +0800522 return 0;
523}
524
525int crypto_register_shash(struct shash_alg *alg)
526{
527 struct crypto_alg *base = &alg->base;
528 int err;
529
530 err = shash_prepare_alg(alg);
531 if (err)
532 return err;
Herbert Xu7b5a080b2008-08-31 15:47:27 +1000533
534 return crypto_register_alg(base);
535}
536EXPORT_SYMBOL_GPL(crypto_register_shash);
537
538int crypto_unregister_shash(struct shash_alg *alg)
539{
540 return crypto_unregister_alg(&alg->base);
541}
542EXPORT_SYMBOL_GPL(crypto_unregister_shash);
543
Herbert Xu619a6eb2009-07-08 18:46:23 +0800544int shash_register_instance(struct crypto_template *tmpl,
545 struct shash_instance *inst)
546{
547 int err;
548
549 err = shash_prepare_alg(&inst->alg);
550 if (err)
551 return err;
552
553 return crypto_register_instance(tmpl, shash_crypto_instance(inst));
554}
555EXPORT_SYMBOL_GPL(shash_register_instance);
556
Herbert Xu2e4fddd2009-07-07 15:17:12 +0800557void shash_free_instance(struct crypto_instance *inst)
558{
559 crypto_drop_spawn(crypto_instance_ctx(inst));
560 kfree(shash_instance(inst));
561}
562EXPORT_SYMBOL_GPL(shash_free_instance);
563
Herbert Xu94296992009-07-08 17:21:37 +0800564int crypto_init_shash_spawn(struct crypto_shash_spawn *spawn,
565 struct shash_alg *alg,
566 struct crypto_instance *inst)
567{
568 return crypto_init_spawn2(&spawn->base, &alg->base, inst,
569 &crypto_shash_type);
570}
571EXPORT_SYMBOL_GPL(crypto_init_shash_spawn);
572
Herbert Xu7d6f5642009-07-08 17:56:28 +0800573struct shash_alg *shash_attr_alg(struct rtattr *rta, u32 type, u32 mask)
574{
575 struct crypto_alg *alg;
576
577 alg = crypto_attr_alg2(rta, &crypto_shash_type, type, mask);
578 return IS_ERR(alg) ? ERR_CAST(alg) :
579 container_of(alg, struct shash_alg, base);
580}
581EXPORT_SYMBOL_GPL(shash_attr_alg);
582
Herbert Xu7b5a080b2008-08-31 15:47:27 +1000583MODULE_LICENSE("GPL");
584MODULE_DESCRIPTION("Synchronous cryptographic hash type");