OSDN Git Service

ARCv2: Enable unaligned access in early ASM code
[uclinux-h8/linux.git] / crypto / crypto_user_base.c
index e41f6cc..f25d3f3 100644 (file)
@@ -84,87 +84,38 @@ static int crypto_report_cipher(struct sk_buff *skb, struct crypto_alg *alg)
 {
        struct crypto_report_cipher rcipher;
 
-       strlcpy(rcipher.type, "cipher", sizeof(rcipher.type));
+       memset(&rcipher, 0, sizeof(rcipher));
+
+       strscpy(rcipher.type, "cipher", sizeof(rcipher.type));
 
        rcipher.blocksize = alg->cra_blocksize;
        rcipher.min_keysize = alg->cra_cipher.cia_min_keysize;
        rcipher.max_keysize = alg->cra_cipher.cia_max_keysize;
 
-       if (nla_put(skb, CRYPTOCFGA_REPORT_CIPHER,
-                   sizeof(struct crypto_report_cipher), &rcipher))
-               goto nla_put_failure;
-       return 0;
-
-nla_put_failure:
-       return -EMSGSIZE;
+       return nla_put(skb, CRYPTOCFGA_REPORT_CIPHER,
+                      sizeof(rcipher), &rcipher);
 }
 
 static int crypto_report_comp(struct sk_buff *skb, struct crypto_alg *alg)
 {
        struct crypto_report_comp rcomp;
 
-       strlcpy(rcomp.type, "compression", sizeof(rcomp.type));
-       if (nla_put(skb, CRYPTOCFGA_REPORT_COMPRESS,
-                   sizeof(struct crypto_report_comp), &rcomp))
-               goto nla_put_failure;
-       return 0;
-
-nla_put_failure:
-       return -EMSGSIZE;
-}
-
-static int crypto_report_acomp(struct sk_buff *skb, struct crypto_alg *alg)
-{
-       struct crypto_report_acomp racomp;
+       memset(&rcomp, 0, sizeof(rcomp));
 
-       strlcpy(racomp.type, "acomp", sizeof(racomp.type));
+       strscpy(rcomp.type, "compression", sizeof(rcomp.type));
 
-       if (nla_put(skb, CRYPTOCFGA_REPORT_ACOMP,
-                   sizeof(struct crypto_report_acomp), &racomp))
-               goto nla_put_failure;
-       return 0;
-
-nla_put_failure:
-       return -EMSGSIZE;
-}
-
-static int crypto_report_akcipher(struct sk_buff *skb, struct crypto_alg *alg)
-{
-       struct crypto_report_akcipher rakcipher;
-
-       strlcpy(rakcipher.type, "akcipher", sizeof(rakcipher.type));
-
-       if (nla_put(skb, CRYPTOCFGA_REPORT_AKCIPHER,
-                   sizeof(struct crypto_report_akcipher), &rakcipher))
-               goto nla_put_failure;
-       return 0;
-
-nla_put_failure:
-       return -EMSGSIZE;
-}
-
-static int crypto_report_kpp(struct sk_buff *skb, struct crypto_alg *alg)
-{
-       struct crypto_report_kpp rkpp;
-
-       strlcpy(rkpp.type, "kpp", sizeof(rkpp.type));
-
-       if (nla_put(skb, CRYPTOCFGA_REPORT_KPP,
-                   sizeof(struct crypto_report_kpp), &rkpp))
-               goto nla_put_failure;
-       return 0;
-
-nla_put_failure:
-       return -EMSGSIZE;
+       return nla_put(skb, CRYPTOCFGA_REPORT_COMPRESS, sizeof(rcomp), &rcomp);
 }
 
 static int crypto_report_one(struct crypto_alg *alg,
                             struct crypto_user_alg *ualg, struct sk_buff *skb)
 {
-       strlcpy(ualg->cru_name, alg->cra_name, sizeof(ualg->cru_name));
-       strlcpy(ualg->cru_driver_name, alg->cra_driver_name,
+       memset(ualg, 0, sizeof(*ualg));
+
+       strscpy(ualg->cru_name, alg->cra_name, sizeof(ualg->cru_name));
+       strscpy(ualg->cru_driver_name, alg->cra_driver_name,
                sizeof(ualg->cru_driver_name));
-       strlcpy(ualg->cru_module_name, module_name(alg->cra_module),
+       strscpy(ualg->cru_module_name, module_name(alg->cra_module),
                sizeof(ualg->cru_module_name));
 
        ualg->cru_type = 0;
@@ -177,9 +128,9 @@ static int crypto_report_one(struct crypto_alg *alg,
        if (alg->cra_flags & CRYPTO_ALG_LARVAL) {
                struct crypto_report_larval rl;
 
-               strlcpy(rl.type, "larval", sizeof(rl.type));
-               if (nla_put(skb, CRYPTOCFGA_REPORT_LARVAL,
-                           sizeof(struct crypto_report_larval), &rl))
+               memset(&rl, 0, sizeof(rl));
+               strscpy(rl.type, "larval", sizeof(rl.type));
+               if (nla_put(skb, CRYPTOCFGA_REPORT_LARVAL, sizeof(rl), &rl))
                        goto nla_put_failure;
                goto out;
        }
@@ -202,20 +153,6 @@ static int crypto_report_one(struct crypto_alg *alg,
                        goto nla_put_failure;
 
                break;
-       case CRYPTO_ALG_TYPE_ACOMPRESS:
-               if (crypto_report_acomp(skb, alg))
-                       goto nla_put_failure;
-
-               break;
-       case CRYPTO_ALG_TYPE_AKCIPHER:
-               if (crypto_report_akcipher(skb, alg))
-                       goto nla_put_failure;
-
-               break;
-       case CRYPTO_ALG_TYPE_KPP:
-               if (crypto_report_kpp(skb, alg))
-                       goto nla_put_failure;
-               break;
        }
 
 out:
@@ -294,30 +231,33 @@ drop_alg:
 
 static int crypto_dump_report(struct sk_buff *skb, struct netlink_callback *cb)
 {
-       struct crypto_alg *alg;
+       const size_t start_pos = cb->args[0];
+       size_t pos = 0;
        struct crypto_dump_info info;
-       int err;
-
-       if (cb->args[0])
-               goto out;
-
-       cb->args[0] = 1;
+       struct crypto_alg *alg;
+       int res;
 
        info.in_skb = cb->skb;
        info.out_skb = skb;
        info.nlmsg_seq = cb->nlh->nlmsg_seq;
        info.nlmsg_flags = NLM_F_MULTI;
 
+       down_read(&crypto_alg_sem);
        list_for_each_entry(alg, &crypto_alg_list, cra_list) {
-               err = crypto_report_alg(alg, &info);
-               if (err)
-                       goto out_err;
+               if (pos >= start_pos) {
+                       res = crypto_report_alg(alg, &info);
+                       if (res == -EMSGSIZE)
+                               break;
+                       if (res)
+                               goto out;
+               }
+               pos++;
        }
-
+       cb->args[0] = pos;
+       res = skb->len;
 out:
-       return skb->len;
-out_err:
-       return err;
+       up_read(&crypto_alg_sem);
+       return res;
 }
 
 static int crypto_dump_report_done(struct netlink_callback *cb)
@@ -483,9 +423,7 @@ static const struct crypto_link {
                                                       .dump = crypto_dump_report,
                                                       .done = crypto_dump_report_done},
        [CRYPTO_MSG_DELRNG      - CRYPTO_MSG_BASE] = { .doit = crypto_del_rng },
-       [CRYPTO_MSG_GETSTAT     - CRYPTO_MSG_BASE] = { .doit = crypto_reportstat,
-                                                      .dump = crypto_dump_reportstat,
-                                                      .done = crypto_dump_reportstat_done},
+       [CRYPTO_MSG_GETSTAT     - CRYPTO_MSG_BASE] = { .doit = crypto_reportstat},
 };
 
 static int crypto_user_rcv_msg(struct sk_buff *skb, struct nlmsghdr *nlh,
@@ -505,7 +443,7 @@ static int crypto_user_rcv_msg(struct sk_buff *skb, struct nlmsghdr *nlh,
        if ((type == (CRYPTO_MSG_GETALG - CRYPTO_MSG_BASE) &&
            (nlh->nlmsg_flags & NLM_F_DUMP))) {
                struct crypto_alg *alg;
-               u16 dump_alloc = 0;
+               unsigned long dump_alloc = 0;
 
                if (link->dump == NULL)
                        return -EINVAL;
@@ -513,16 +451,16 @@ static int crypto_user_rcv_msg(struct sk_buff *skb, struct nlmsghdr *nlh,
                down_read(&crypto_alg_sem);
                list_for_each_entry(alg, &crypto_alg_list, cra_list)
                        dump_alloc += CRYPTO_REPORT_MAXSIZE;
+               up_read(&crypto_alg_sem);
 
                {
                        struct netlink_dump_control c = {
                                .dump = link->dump,
                                .done = link->done,
-                               .min_dump_alloc = dump_alloc,
+                               .min_dump_alloc = min(dump_alloc, 65535UL),
                        };
                        err = netlink_dump_start(crypto_nlsk, skb, nlh, &c);
                }
-               up_read(&crypto_alg_sem);
 
                return err;
        }