mirror of
				https://git.kernel.org/pub/scm/linux/kernel/git/chenhuacai/linux-loongson
				synced 2025-10-31 22:26:12 +00:00 
			
		
		
		
	 ccb778e184
			
		
	
	
		ccb778e184
		
	
	
	
	
		
			
			Add the ability to turn FIPS-compliant mode on or off at boot In order to be FIPS compliant, several check may need to be preformed that may be construed as unusefull in a non-compliant mode. This patch allows us to set a kernel flag incating that we are running in a fips-compliant mode from boot up. It also exports that mode information to user space via a sysctl (/proc/sys/crypto/fips_enabled). Tested successfully by me. Signed-off-by: Neil Horman <nhorman@tuxdriver.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
		
			
				
	
	
		
			162 lines
		
	
	
		
			4.0 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			162 lines
		
	
	
		
			4.0 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * Scatterlist Cryptographic API.
 | |
|  *
 | |
|  * Procfs information.
 | |
|  *
 | |
|  * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
 | |
|  * Copyright (c) 2005 Herbert Xu <herbert@gondor.apana.org.au>
 | |
|  *
 | |
|  * This program is free software; you can redistribute it and/or modify it
 | |
|  * under the terms of the GNU General Public License as published by the Free
 | |
|  * Software Foundation; either version 2 of the License, or (at your option) 
 | |
|  * any later version.
 | |
|  *
 | |
|  */
 | |
| 
 | |
| #include <asm/atomic.h>
 | |
| #include <linux/init.h>
 | |
| #include <linux/crypto.h>
 | |
| #include <linux/rwsem.h>
 | |
| #include <linux/proc_fs.h>
 | |
| #include <linux/seq_file.h>
 | |
| #include <linux/sysctl.h>
 | |
| #include "internal.h"
 | |
| 
 | |
| #ifdef CONFIG_CRYPTO_FIPS
 | |
| static struct ctl_table crypto_sysctl_table[] = {
 | |
| 	{
 | |
| 		.ctl_name       = CTL_UNNUMBERED,
 | |
| 		.procname       = "fips_enabled",
 | |
| 		.data           = &fips_enabled,
 | |
| 		.maxlen         = sizeof(int),
 | |
| 		.mode           = 0444,
 | |
| 		.proc_handler   = &proc_dointvec
 | |
| 	},
 | |
| 	{
 | |
| 		.ctl_name = 0,
 | |
| 	},
 | |
| };
 | |
| 
 | |
| static struct ctl_table crypto_dir_table[] = {
 | |
| 	{
 | |
| 		.ctl_name       = CTL_UNNUMBERED,
 | |
| 		.procname       = "crypto",
 | |
| 		.mode           = 0555,
 | |
| 		.child          = crypto_sysctl_table
 | |
| 	},
 | |
| 	{
 | |
| 		.ctl_name = 0,
 | |
| 	},
 | |
| };
 | |
| 
 | |
| static struct ctl_table_header *crypto_sysctls;
 | |
| 
 | |
| static void crypto_proc_fips_init(void)
 | |
| {
 | |
| 	crypto_sysctls = register_sysctl_table(crypto_dir_table);
 | |
| }
 | |
| 
 | |
| static void crypto_proc_fips_exit(void)
 | |
| {
 | |
| 	if (crypto_sysctls)
 | |
| 		unregister_sysctl_table(crypto_sysctls);
 | |
| }
 | |
| #else
 | |
| #define crypto_proc_fips_init()
 | |
| #define crypto_proc_fips_exit()
 | |
| #endif
 | |
| 
 | |
| static void *c_start(struct seq_file *m, loff_t *pos)
 | |
| {
 | |
| 	down_read(&crypto_alg_sem);
 | |
| 	return seq_list_start(&crypto_alg_list, *pos);
 | |
| }
 | |
| 
 | |
| static void *c_next(struct seq_file *m, void *p, loff_t *pos)
 | |
| {
 | |
| 	return seq_list_next(p, &crypto_alg_list, pos);
 | |
| }
 | |
| 
 | |
| static void c_stop(struct seq_file *m, void *p)
 | |
| {
 | |
| 	up_read(&crypto_alg_sem);
 | |
| }
 | |
| 
 | |
| static int c_show(struct seq_file *m, void *p)
 | |
| {
 | |
| 	struct crypto_alg *alg = list_entry(p, struct crypto_alg, cra_list);
 | |
| 	
 | |
| 	seq_printf(m, "name         : %s\n", alg->cra_name);
 | |
| 	seq_printf(m, "driver       : %s\n", alg->cra_driver_name);
 | |
| 	seq_printf(m, "module       : %s\n", module_name(alg->cra_module));
 | |
| 	seq_printf(m, "priority     : %d\n", alg->cra_priority);
 | |
| 	seq_printf(m, "refcnt       : %d\n", atomic_read(&alg->cra_refcnt));
 | |
| 	seq_printf(m, "selftest     : %s\n",
 | |
| 		   (alg->cra_flags & CRYPTO_ALG_TESTED) ?
 | |
| 		   "passed" : "unknown");
 | |
| 	
 | |
| 	switch (alg->cra_flags & (CRYPTO_ALG_TYPE_MASK | CRYPTO_ALG_LARVAL)) {
 | |
| 	case CRYPTO_ALG_TYPE_CIPHER:
 | |
| 		seq_printf(m, "type         : cipher\n");
 | |
| 		seq_printf(m, "blocksize    : %u\n", alg->cra_blocksize);
 | |
| 		seq_printf(m, "min keysize  : %u\n",
 | |
| 					alg->cra_cipher.cia_min_keysize);
 | |
| 		seq_printf(m, "max keysize  : %u\n",
 | |
| 					alg->cra_cipher.cia_max_keysize);
 | |
| 		break;
 | |
| 		
 | |
| 	case CRYPTO_ALG_TYPE_DIGEST:
 | |
| 		seq_printf(m, "type         : digest\n");
 | |
| 		seq_printf(m, "blocksize    : %u\n", alg->cra_blocksize);
 | |
| 		seq_printf(m, "digestsize   : %u\n",
 | |
| 		           alg->cra_digest.dia_digestsize);
 | |
| 		break;
 | |
| 	case CRYPTO_ALG_TYPE_COMPRESS:
 | |
| 		seq_printf(m, "type         : compression\n");
 | |
| 		break;
 | |
| 	default:
 | |
| 		if (alg->cra_flags & CRYPTO_ALG_LARVAL) {
 | |
| 			seq_printf(m, "type         : larval\n");
 | |
| 			seq_printf(m, "flags        : 0x%x\n", alg->cra_flags);
 | |
| 		} else if (alg->cra_type && alg->cra_type->show)
 | |
| 			alg->cra_type->show(m, alg);
 | |
| 		else
 | |
| 			seq_printf(m, "type         : unknown\n");
 | |
| 		break;
 | |
| 	}
 | |
| 
 | |
| 	seq_putc(m, '\n');
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static const struct seq_operations crypto_seq_ops = {
 | |
| 	.start		= c_start,
 | |
| 	.next		= c_next,
 | |
| 	.stop		= c_stop,
 | |
| 	.show		= c_show
 | |
| };
 | |
| 
 | |
| static int crypto_info_open(struct inode *inode, struct file *file)
 | |
| {
 | |
| 	return seq_open(file, &crypto_seq_ops);
 | |
| }
 | |
|         
 | |
| static const struct file_operations proc_crypto_ops = {
 | |
| 	.open		= crypto_info_open,
 | |
| 	.read		= seq_read,
 | |
| 	.llseek		= seq_lseek,
 | |
| 	.release	= seq_release
 | |
| };
 | |
| 
 | |
| void __init crypto_init_proc(void)
 | |
| {
 | |
| 	proc_create("crypto", 0, NULL, &proc_crypto_ops);
 | |
| 	crypto_proc_fips_init();
 | |
| }
 | |
| 
 | |
| void __exit crypto_exit_proc(void)
 | |
| {
 | |
| 	crypto_proc_fips_exit();
 | |
| 	remove_proc_entry("crypto", NULL);
 | |
| }
 |