regulator: Document binding for regulator suspend voltage
[cascardo/linux.git] / crypto / drbg.c
index a53ee09..54cfd48 100644 (file)
@@ -117,27 +117,18 @@ static const struct drbg_core drbg_cores[] = {
        {
                .flags = DRBG_CTR | DRBG_STRENGTH128,
                .statelen = 32, /* 256 bits as defined in 10.2.1 */
-               .max_addtllen = 35,
-               .max_bits = 19,
-               .max_req = 48,
                .blocklen_bytes = 16,
                .cra_name = "ctr_aes128",
                .backend_cra_name = "ecb(aes)",
        }, {
                .flags = DRBG_CTR | DRBG_STRENGTH192,
                .statelen = 40, /* 320 bits as defined in 10.2.1 */
-               .max_addtllen = 35,
-               .max_bits = 19,
-               .max_req = 48,
                .blocklen_bytes = 16,
                .cra_name = "ctr_aes192",
                .backend_cra_name = "ecb(aes)",
        }, {
                .flags = DRBG_CTR | DRBG_STRENGTH256,
                .statelen = 48, /* 384 bits as defined in 10.2.1 */
-               .max_addtllen = 35,
-               .max_bits = 19,
-               .max_req = 48,
                .blocklen_bytes = 16,
                .cra_name = "ctr_aes256",
                .backend_cra_name = "ecb(aes)",
@@ -147,36 +138,24 @@ static const struct drbg_core drbg_cores[] = {
        {
                .flags = DRBG_HASH | DRBG_STRENGTH128,
                .statelen = 55, /* 440 bits */
-               .max_addtllen = 35,
-               .max_bits = 19,
-               .max_req = 48,
                .blocklen_bytes = 20,
                .cra_name = "sha1",
                .backend_cra_name = "sha1",
        }, {
                .flags = DRBG_HASH | DRBG_STRENGTH256,
                .statelen = 111, /* 888 bits */
-               .max_addtllen = 35,
-               .max_bits = 19,
-               .max_req = 48,
                .blocklen_bytes = 48,
                .cra_name = "sha384",
                .backend_cra_name = "sha384",
        }, {
                .flags = DRBG_HASH | DRBG_STRENGTH256,
                .statelen = 111, /* 888 bits */
-               .max_addtllen = 35,
-               .max_bits = 19,
-               .max_req = 48,
                .blocklen_bytes = 64,
                .cra_name = "sha512",
                .backend_cra_name = "sha512",
        }, {
                .flags = DRBG_HASH | DRBG_STRENGTH256,
                .statelen = 55, /* 440 bits */
-               .max_addtllen = 35,
-               .max_bits = 19,
-               .max_req = 48,
                .blocklen_bytes = 32,
                .cra_name = "sha256",
                .backend_cra_name = "sha256",
@@ -186,36 +165,24 @@ static const struct drbg_core drbg_cores[] = {
        {
                .flags = DRBG_HMAC | DRBG_STRENGTH128,
                .statelen = 20, /* block length of cipher */
-               .max_addtllen = 35,
-               .max_bits = 19,
-               .max_req = 48,
                .blocklen_bytes = 20,
                .cra_name = "hmac_sha1",
                .backend_cra_name = "hmac(sha1)",
        }, {
                .flags = DRBG_HMAC | DRBG_STRENGTH256,
                .statelen = 48, /* block length of cipher */
-               .max_addtllen = 35,
-               .max_bits = 19,
-               .max_req = 48,
                .blocklen_bytes = 48,
                .cra_name = "hmac_sha384",
                .backend_cra_name = "hmac(sha384)",
        }, {
                .flags = DRBG_HMAC | DRBG_STRENGTH256,
                .statelen = 64, /* block length of cipher */
-               .max_addtllen = 35,
-               .max_bits = 19,
-               .max_req = 48,
                .blocklen_bytes = 64,
                .cra_name = "hmac_sha512",
                .backend_cra_name = "hmac(sha512)",
        }, {
                .flags = DRBG_HMAC | DRBG_STRENGTH256,
                .statelen = 32, /* block length of cipher */
-               .max_addtllen = 35,
-               .max_bits = 19,
-               .max_req = 48,
                .blocklen_bytes = 32,
                .cra_name = "hmac_sha256",
                .backend_cra_name = "hmac(sha256)",
@@ -302,20 +269,19 @@ static bool drbg_fips_continuous_test(struct drbg_state *drbg,
  * Convert an integer into a byte representation of this integer.
  * The byte representation is big-endian
  *
- * @buf buffer holding the converted integer
  * @val value to be converted
- * @buflen length of buffer
+ * @buf buffer holding the converted integer -- caller must ensure that
+ *      buffer size is at least 32 bit
  */
 #if (defined(CONFIG_CRYPTO_DRBG_HASH) || defined(CONFIG_CRYPTO_DRBG_CTR))
-static inline void drbg_int2byte(unsigned char *buf, uint64_t val,
-                                size_t buflen)
+static inline void drbg_cpu_to_be32(__u32 val, unsigned char *buf)
 {
-       unsigned char *byte;
-       uint64_t i;
+       struct s {
+               __be32 conv;
+       };
+       struct s *conversion = (struct s *) buf;
 
-       byte = buf + (buflen - 1);
-       for (i = 0; i < buflen; i++)
-               *(byte--) = val >> (i * 8) & 0xff;
+       conversion->conv = cpu_to_be32(val);
 }
 
 /*
@@ -483,10 +449,10 @@ static int drbg_ctr_df(struct drbg_state *drbg,
        /* 10.4.2 step 2 -- calculate the entire length of all input data */
        list_for_each_entry(seed, seedlist, list)
                inputlen += seed->len;
-       drbg_int2byte(&L_N[0], inputlen, 4);
+       drbg_cpu_to_be32(inputlen, &L_N[0]);
 
        /* 10.4.2 step 3 */
-       drbg_int2byte(&L_N[4], bytes_to_return, 4);
+       drbg_cpu_to_be32(bytes_to_return, &L_N[4]);
 
        /* 10.4.2 step 5: length is L_N, input_string, one byte, padding */
        padlen = (inputlen + sizeof(L_N) + 1) % (drbg_blocklen(drbg));
@@ -517,7 +483,7 @@ static int drbg_ctr_df(struct drbg_state *drbg,
                 * holds zeros after allocation -- even the increment of i
                 * is irrelevant as the increment remains within length of i
                 */
-               drbg_int2byte(iv, i, 4);
+               drbg_cpu_to_be32(i, iv);
                /* 10.4.2 step 9.2 -- BCC and concatenation with temp */
                ret = drbg_ctr_bcc(drbg, temp + templen, K, &bcc_list);
                if (ret)
@@ -729,11 +695,9 @@ static int drbg_hmac_update(struct drbg_state *drbg, struct list_head *seed,
        LIST_HEAD(seedlist);
        LIST_HEAD(vdatalist);
 
-       if (!reseed) {
-               /* 10.1.2.3 step 2 */
-               memset(drbg->C, 0, drbg_statelen(drbg));
+       if (!reseed)
+               /* 10.1.2.3 step 2 -- memset(0) of C is implicit with kzalloc */
                memset(drbg->V, 1, drbg_statelen(drbg));
-       }
 
        drbg_string_fill(&seed1, drbg->V, drbg_statelen(drbg));
        list_add_tail(&seed1.list, &seedlist);
@@ -862,7 +826,7 @@ static int drbg_hash_df(struct drbg_state *drbg,
 
        /* 10.4.1 step 3 */
        input[0] = 1;
-       drbg_int2byte(&input[1], (outlen * 8), 4);
+       drbg_cpu_to_be32((outlen * 8), &input[1]);
 
        /* 10.4.1 step 4.1 -- concatenation of data for input into hash */
        drbg_string_fill(&data, input, 5);
@@ -1023,7 +987,10 @@ static int drbg_hash_generate(struct drbg_state *drbg,
 {
        int len = 0;
        int ret = 0;
-       unsigned char req[8];
+       union {
+               unsigned char req[8];
+               __be64 req_int;
+       } u;
        unsigned char prefix = DRBG_PREFIX3;
        struct drbg_string data1, data2;
        LIST_HEAD(datalist);
@@ -1053,8 +1020,8 @@ static int drbg_hash_generate(struct drbg_state *drbg,
                     drbg->scratchpad, drbg_blocklen(drbg));
        drbg_add_buf(drbg->V, drbg_statelen(drbg),
                     drbg->C, drbg_statelen(drbg));
-       drbg_int2byte(req, drbg->reseed_ctr, sizeof(req));
-       drbg_add_buf(drbg->V, drbg_statelen(drbg), req, 8);
+       u.req_int = cpu_to_be64(drbg->reseed_ctr);
+       drbg_add_buf(drbg->V, drbg_statelen(drbg), u.req, 8);
 
 out:
        memset(drbg->scratchpad, 0, drbg_blocklen(drbg));
@@ -1142,6 +1109,11 @@ static int drbg_seed(struct drbg_state *drbg, struct drbg_string *pers,
                pr_devel("DRBG: using personalization string\n");
        }
 
+       if (!reseed) {
+               memset(drbg->V, 0, drbg_statelen(drbg));
+               memset(drbg->C, 0, drbg_statelen(drbg));
+       }
+
        ret = drbg->d_ops->update(drbg, &seedlist, reseed);
        if (ret)
                goto out;
@@ -1151,8 +1123,7 @@ static int drbg_seed(struct drbg_state *drbg, struct drbg_string *pers,
        drbg->reseed_ctr = 1;
 
 out:
-       if (entropy)
-               kzfree(entropy);
+       kzfree(entropy);
        return ret;
 }
 
@@ -1161,19 +1132,15 @@ static inline void drbg_dealloc_state(struct drbg_state *drbg)
 {
        if (!drbg)
                return;
-       if (drbg->V)
-               kzfree(drbg->V);
+       kzfree(drbg->V);
        drbg->V = NULL;
-       if (drbg->C)
-               kzfree(drbg->C);
+       kzfree(drbg->C);
        drbg->C = NULL;
-       if (drbg->scratchpad)
-               kzfree(drbg->scratchpad);
+       kzfree(drbg->scratchpad);
        drbg->scratchpad = NULL;
        drbg->reseed_ctr = 0;
 #ifdef CONFIG_CRYPTO_FIPS
-       if (drbg->prev)
-               kzfree(drbg->prev);
+       kzfree(drbg->prev);
        drbg->prev = NULL;
        drbg->fips_primed = false;
 #endif
@@ -1188,17 +1155,14 @@ static inline int drbg_alloc_state(struct drbg_state *drbg)
        int ret = -ENOMEM;
        unsigned int sb_size = 0;
 
-       if (!drbg)
-               return -EINVAL;
-
-       drbg->V = kzalloc(drbg_statelen(drbg), GFP_KERNEL);
+       drbg->V = kmalloc(drbg_statelen(drbg), GFP_KERNEL);
        if (!drbg->V)
                goto err;
-       drbg->C = kzalloc(drbg_statelen(drbg), GFP_KERNEL);
+       drbg->C = kmalloc(drbg_statelen(drbg), GFP_KERNEL);
        if (!drbg->C)
                goto err;
 #ifdef CONFIG_CRYPTO_FIPS
-       drbg->prev = kzalloc(drbg_blocklen(drbg), GFP_KERNEL);
+       drbg->prev = kmalloc(drbg_blocklen(drbg), GFP_KERNEL);
        if (!drbg->prev)
                goto err;
        drbg->fips_primed = false;
@@ -1263,15 +1227,6 @@ static int drbg_make_shadow(struct drbg_state *drbg, struct drbg_state **shadow)
        int ret = -ENOMEM;
        struct drbg_state *tmp = NULL;
 
-       if (!drbg || !drbg->core || !drbg->V || !drbg->C) {
-               pr_devel("DRBG: attempt to generate shadow copy for "
-                        "uninitialized DRBG state rejected\n");
-               return -EINVAL;
-       }
-       /* HMAC does not have a scratchpad */
-       if (!(drbg->core->flags & DRBG_HMAC) && NULL == drbg->scratchpad)
-               return -EINVAL;
-
        tmp = kzalloc(sizeof(struct drbg_state), GFP_KERNEL);
        if (!tmp)
                return -ENOMEM;
@@ -1293,8 +1248,7 @@ static int drbg_make_shadow(struct drbg_state *drbg, struct drbg_state **shadow)
        return 0;
 
 err:
-       if (tmp)
-               kzfree(tmp);
+       kzfree(tmp);
        return ret;
 }
 
@@ -1385,11 +1339,9 @@ static int drbg_generate(struct drbg_state *drbg,
                shadow->seeded = false;
 
        /* allocate cipher handle */
-       if (shadow->d_ops->crypto_init) {
-               len = shadow->d_ops->crypto_init(shadow);
-               if (len)
-                       goto err;
-       }
+       len = shadow->d_ops->crypto_init(shadow);
+       if (len)
+               goto err;
 
        if (shadow->pr || !shadow->seeded) {
                pr_devel("DRBG: reseeding before generation (prediction "
@@ -1471,8 +1423,7 @@ static int drbg_generate(struct drbg_state *drbg,
 #endif
 
 err:
-       if (shadow->d_ops->crypto_fini)
-               shadow->d_ops->crypto_fini(shadow);
+       shadow->d_ops->crypto_fini(shadow);
        drbg_restore_shadow(drbg, &shadow);
        return len;
 }
@@ -1566,11 +1517,10 @@ static int drbg_instantiate(struct drbg_state *drbg, struct drbg_string *pers,
                return ret;
 
        ret = -EFAULT;
-       if (drbg->d_ops->crypto_init && drbg->d_ops->crypto_init(drbg))
+       if (drbg->d_ops->crypto_init(drbg))
                goto err;
        ret = drbg_seed(drbg, pers, false);
-       if (drbg->d_ops->crypto_fini)
-               drbg->d_ops->crypto_fini(drbg);
+       drbg->d_ops->crypto_fini(drbg);
        if (ret)
                goto err;