Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp778008pxj; Thu, 27 May 2021 11:23:06 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyA9mPbPtAzr95t1zEG6LbfLMMrvOWYd4Tm+hiShhrty1OFUAiBimHHH0+Q6eN58IskNWqR X-Received: by 2002:a17:906:b58:: with SMTP id v24mr1971116ejg.121.1622139786559; Thu, 27 May 2021 11:23:06 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1622139786; cv=pass; d=google.com; s=arc-20160816; b=1Gl/HnoACg9nDO5xm7sgEv4Qp8QmoGqiAPpFsKqSVbEQ+zLFMqsW6QxRKbuWBFRZuU 2i6A9r25CwfdJBnsKG+/eCTCotEcKKF4EfwUH3MP12ahhD5SXTR2iHast4MmvCJoiLRC 6fopRrzw6ZceMDnLam7tNOaXL/i88mqPFCF5th3S1FzF+Uh0xNAJQ08/0XxDGUcCPAxB hMFHZX+bnLlbLZZpuT6EmFJMaXac9YSEqPjfDa6uQzcjaz1zI5fXxS92+vbT2d1uZM6W 8PNBobS6YbqCziOP5Q4+U6aMQ+6fZNvMJIZSmtfj/9gUhHjWguclnmygAxCa5EelH+Lr Xvgg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=RcaxA6eZG3KurO6Rof5Tq9Lnu3OP3jbxjQ24f70N/2k=; b=YW2e2XwEYnQ8sRSxC0Kt7KZd23c06GNxYdGKfc/c8uIELY2k/Sz3cyD8ugvaqqxaoR p9WAzY/Q1eqnaxuVQ8JpAjKMXlvwjPMaG6HVa/z1g4bJJOIu5P/E9AnxLZg72C2k10Yx 7COgQqcM7QNxk2PKYvuAWPCATaBqqmdzx6TdA5ScmtmWKQc0qkKhAhJKdPUwafMPe6oe DgfZqnyRu+DZs8zseFoXpPnAElsS8GkpSCw+1QQHNeKAgtRLXwbhutdtOeB5OXzKNEGL WcxJ+wrH42O9flHuzVkJ81QqLiEFUmT9ExLsybwhlnG5dDEdzz1aDjX8kblzi4tGBLtp ds5w== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@chronox.de header.s=strato-dkim-0002 header.b=XUcOU+fq; arc=pass (i=1); spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cr10si2782762ejc.403.2021.05.27.11.22.42; Thu, 27 May 2021 11:23:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@chronox.de header.s=strato-dkim-0002 header.b=XUcOU+fq; arc=pass (i=1); spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237184AbhE0QOc (ORCPT + 99 others); Thu, 27 May 2021 12:14:32 -0400 Received: from mo4-p04-ob.smtp.rzone.de ([81.169.146.177]:12373 "EHLO mo4-p04-ob.smtp.rzone.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237064AbhE0QOR (ORCPT ); Thu, 27 May 2021 12:14:17 -0400 ARC-Seal: i=1; a=rsa-sha256; t=1622131890; cv=none; d=strato.com; s=strato-dkim-0002; b=Ah9/NpAwonI/HJDWnMN/aQVcNZKNcc9biHr1CWONgKMXNBA2tdMm1k5w5H0jUTec8U Pf59+e9puNO2zNiTwQQaju43jRMD1J9xWPs4t6dNEFxkBGDOPIdp6RbZGAsSaxzePoIL HBoEUXxMBo0UeDBm9l84V5GpKWsyR5JySVAcDSffpMH0FRlKx/AXsZeQIZPRFJdkE2q4 tuLI5Eze8ol28DbrEXI4i8mDfROKlshC6hLaGzhbgklPKxJHm1hG+PRiuq8iNYCwNHg/ 0nrPiVvUlH3EYIy/SJcyx72dm/GDv3t3M8hyPGXRrehzd0BFjyAy/21+XRF9Zr8hOAo9 nJyg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; t=1622131890; s=strato-dkim-0002; d=strato.com; h=References:In-Reply-To:Message-ID:Date:Subject:Cc:To:From:Cc:Date: From:Subject:Sender; bh=RcaxA6eZG3KurO6Rof5Tq9Lnu3OP3jbxjQ24f70N/2k=; b=qqzb8rq4jPSc37ZqPWRaQcs+w3nwKiz7n06c/bdBTMMP/oymmr5FwP8fPN5hwlURmZ BJbAx7aojg1wnyZM5n4/zZlCl1r4nBq49cppNaP52K6TckNL3rf3tjZ9rBgbkGTWWCOg j6NQ7QNVN9BQPFqNXvEhNv4XyffdfwfDNFEfAAEz65Xul0T/PS9CbKZSFgxW8WS0hJEh ceLmIMxFAyLOK1ryXwx9xCVxywHmkCj65RMtQqjE+CqG+7UFdrRpqVWwoHLAeQeMciEe XGOpEzOrQ7FlocXCpxX+IkxICC4EnGxXHXl276W63/4odjY+YirRdlvwRZKM3wWyRK97 1jIA== ARC-Authentication-Results: i=1; strato.com; dkim=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1622131890; s=strato-dkim-0002; d=chronox.de; h=References:In-Reply-To:Message-ID:Date:Subject:Cc:To:From:Cc:Date: From:Subject:Sender; bh=RcaxA6eZG3KurO6Rof5Tq9Lnu3OP3jbxjQ24f70N/2k=; b=XUcOU+fqOF+RSaYcRaK6Oh7FIaIttNJeRF1CxoxWViQK4QwE2dZXI4ICSVs4WQdsWG U7TZJ2KIVmEYYzeihX1ibAq2T5krsYDCcUHbAqAdD8sfjZ7nHz2JlmZ20JbfwU9y7zLB KDaK3JwunRN57Ogt436G+UMkb2XGhhqaQQfw2/DZcIhTQJK+KeNIo+dreva+8EPJ1Did nbDM5MDHJWQV5apRwRI5kgVyqevzhBGuLgyKnjbI/4v09+5F06lAKyhdCMRl5+ZrwZT8 8neqQ/SVDFANbJAhWf6NYvf4bSXWJ78IYcB9sXnOv/lyOF2CSGlkD0xvCPAjgRwkLZdN yGkA== Authentication-Results: strato.com; dkim=none X-RZG-AUTH: ":P2ERcEykfu11Y98lp/T7+hdri+uKZK8TKWEqNyiHySGSa9k9xmwdNnzGHXPbJvSfFeK2" X-RZG-CLASS-ID: mo00 Received: from positron.chronox.de by smtp.strato.de (RZmta 47.26.3 DYNA|AUTH) with ESMTPSA id R0123ax4RGBT0Tp (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256 bits)) (Client did not present a certificate); Thu, 27 May 2021 18:11:29 +0200 (CEST) From: Stephan =?ISO-8859-1?Q?M=FCller?= To: Tso Ted , linux-crypto@vger.kernel.org Cc: Willy Tarreau , Nicolai Stange , LKML , Arnd Bergmann , Greg Kroah-Hartman , "Eric W. Biederman" , "Alexander E. Patrakov" , "Ahmed S. Darwish" , Matthew Garrett , Vito Caputo , Andreas Dilger , Jan Kara , Ray Strode , William Jon McCann , zhangjs , Andy Lutomirski , Florian Weimer , Lennart Poettering , Peter Matthias , Marcelo Henrique Cerri , Neil Horman , Randy Dunlap , Julia Lawall , Dan Carpenter , Andy Lavr , Eric Biggers , "Jason A. Donenfeld" , Petr Tesarik , John Haxby Subject: [PATCH v40 05/13] LRNG - add common generic hash support Date: Thu, 27 May 2021 17:58:50 +0200 Message-ID: <3815826.7XG7rTj8ko@positron.chronox.de> In-Reply-To: <18450229.rjpLZT9oXI@positron.chronox.de> References: <18450229.rjpLZT9oXI@positron.chronox.de> MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org The LRNG switchable DRNG support also allows the replacement of the hash implementation used as conditioning component. The common generic hash support code provides the required callbacks using the synchronous hash implementations of the kernel crypto API. All synchronous hash implementations supported by the kernel crypto API can be used as part of the LRNG with this generic support. The generic support is intended to be configured by separate switchable DRNG backends. CC: Torsten Duwe CC: "Eric W. Biederman" CC: "Alexander E. Patrakov" CC: "Ahmed S. Darwish" CC: "Theodore Y. Ts'o" CC: Willy Tarreau CC: Matthew Garrett CC: Vito Caputo CC: Andreas Dilger CC: Jan Kara CC: Ray Strode CC: William Jon McCann CC: zhangjs CC: Andy Lutomirski CC: Florian Weimer CC: Lennart Poettering CC: Nicolai Stange CC: "Peter, Matthias" CC: Marcelo Henrique Cerri CC: Neil Horman Signed-off-by: Stephan Mueller --- drivers/char/lrng/Kconfig | 8 +++ drivers/char/lrng/Makefile | 1 + drivers/char/lrng/lrng_kcapi_hash.c | 103 ++++++++++++++++++++++++++++ drivers/char/lrng/lrng_kcapi_hash.h | 20 ++++++ 4 files changed, 132 insertions(+) create mode 100644 drivers/char/lrng/lrng_kcapi_hash.c create mode 100644 drivers/char/lrng/lrng_kcapi_hash.h diff --git a/drivers/char/lrng/Kconfig b/drivers/char/lrng/Kconfig index 4e02542d7fcc..14ff26e42daa 100644 --- a/drivers/char/lrng/Kconfig +++ b/drivers/char/lrng/Kconfig @@ -165,4 +165,12 @@ menuconfig LRNG_DRNG_SWITCH accessible via the external interfaces. With this configuration option other DRNGs can be selected and loaded at runtime. +if LRNG_DRNG_SWITCH + +config LRNG_KCAPI_HASH + bool + select CRYPTO_HASH + +endif # LRNG_DRNG_SWITCH + endif # LRNG diff --git a/drivers/char/lrng/Makefile b/drivers/char/lrng/Makefile index 0eb4a6849c88..40f8826edeeb 100644 --- a/drivers/char/lrng/Makefile +++ b/drivers/char/lrng/Makefile @@ -11,3 +11,4 @@ obj-y += lrng_pool.o lrng_aux.o \ obj-$(CONFIG_NUMA) += lrng_numa.o obj-$(CONFIG_SYSCTL) += lrng_proc.o obj-$(CONFIG_LRNG_DRNG_SWITCH) += lrng_switch.o +obj-$(CONFIG_LRNG_KCAPI_HASH) += lrng_kcapi_hash.o diff --git a/drivers/char/lrng/lrng_kcapi_hash.c b/drivers/char/lrng/lrng_kcapi_hash.c new file mode 100644 index 000000000000..9647d980e468 --- /dev/null +++ b/drivers/char/lrng/lrng_kcapi_hash.c @@ -0,0 +1,103 @@ +// SPDX-License-Identifier: GPL-2.0 OR BSD-2-Clause +/* + * Backend for providing the hash primitive using the kernel crypto API. + * + * Copyright (C) 2021, Stephan Mueller + */ + +#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt + +#include + +#include "lrng_kcapi_hash.h" + +struct lrng_hash_info { + struct crypto_shash *tfm; +}; + +static inline void _lrng_kcapi_hash_free(struct lrng_hash_info *lrng_hash) +{ + struct crypto_shash *tfm = lrng_hash->tfm; + + crypto_free_shash(tfm); + kfree(lrng_hash); +} + +void *lrng_kcapi_hash_alloc(const char *name) +{ + struct lrng_hash_info *lrng_hash; + struct crypto_shash *tfm; + int ret; + + if (!name) { + pr_err("Hash name missing\n"); + return ERR_PTR(-EINVAL); + } + + tfm = crypto_alloc_shash(name, 0, 0); + if (IS_ERR(tfm)) { + pr_err("could not allocate hash %s\n", name); + return ERR_CAST(tfm); + } + + ret = sizeof(struct lrng_hash_info); + lrng_hash = kmalloc(ret, GFP_KERNEL); + if (!lrng_hash) { + crypto_free_shash(tfm); + return ERR_PTR(-ENOMEM); + } + + lrng_hash->tfm = tfm; + + pr_info("Hash %s allocated\n", name); + + return lrng_hash; +} +EXPORT_SYMBOL(lrng_kcapi_hash_alloc); + +u32 lrng_kcapi_hash_digestsize(void *hash) +{ + struct lrng_hash_info *lrng_hash = (struct lrng_hash_info *)hash; + struct crypto_shash *tfm = lrng_hash->tfm; + + return crypto_shash_digestsize(tfm); +} +EXPORT_SYMBOL(lrng_kcapi_hash_digestsize); + +void lrng_kcapi_hash_dealloc(void *hash) +{ + struct lrng_hash_info *lrng_hash = (struct lrng_hash_info *)hash; + + _lrng_kcapi_hash_free(lrng_hash); + pr_info("Hash deallocated\n"); +} +EXPORT_SYMBOL(lrng_kcapi_hash_dealloc); + +int lrng_kcapi_hash_init(struct shash_desc *shash, void *hash) +{ + struct lrng_hash_info *lrng_hash = (struct lrng_hash_info *)hash; + struct crypto_shash *tfm = lrng_hash->tfm; + + shash->tfm = tfm; + return crypto_shash_init(shash); +} +EXPORT_SYMBOL(lrng_kcapi_hash_init); + +int lrng_kcapi_hash_update(struct shash_desc *shash, const u8 *inbuf, + u32 inbuflen) +{ + return crypto_shash_update(shash, inbuf, inbuflen); +} +EXPORT_SYMBOL(lrng_kcapi_hash_update); + +int lrng_kcapi_hash_final(struct shash_desc *shash, u8 *digest) +{ + return crypto_shash_final(shash, digest); +} +EXPORT_SYMBOL(lrng_kcapi_hash_final); + +void lrng_kcapi_hash_zero(struct shash_desc *shash) +{ + shash_desc_zero(shash); +} +EXPORT_SYMBOL(lrng_kcapi_hash_zero); diff --git a/drivers/char/lrng/lrng_kcapi_hash.h b/drivers/char/lrng/lrng_kcapi_hash.h new file mode 100644 index 000000000000..2f94558d2dd6 --- /dev/null +++ b/drivers/char/lrng/lrng_kcapi_hash.h @@ -0,0 +1,20 @@ +/* SPDX-License-Identifier: GPL-2.0 OR BSD-2-Clause */ +/* + * Copyright (C) 2020 - 2021, Stephan Mueller + */ + +#ifndef _LRNG_KCAPI_HASH_H +#define _LRNG_KCAPI_HASH_H + +#include + +void *lrng_kcapi_hash_alloc(const char *name); +u32 lrng_kcapi_hash_digestsize(void *hash); +void lrng_kcapi_hash_dealloc(void *hash); +int lrng_kcapi_hash_init(struct shash_desc *shash, void *hash); +int lrng_kcapi_hash_update(struct shash_desc *shash, const u8 *inbuf, + u32 inbuflen); +int lrng_kcapi_hash_final(struct shash_desc *shash, u8 *digest); +void lrng_kcapi_hash_zero(struct shash_desc *shash); + +#endif /* _LRNG_KCAPI_HASH_H */ -- 2.31.1