mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-05 21:46:40 +07:00
94072cb20e
There is currently a large ifdef FIPS code section in proc.c. Ostensibly it's there because the fips_enabled sysctl sits under /proc/sys/crypto. However, no other crypto sysctls exist. In fact, the whole ethos of the crypto API is against such user interfaces so this patch moves all the FIPS sysctl code over to fips.c. Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
118 lines
3.0 KiB
C
118 lines
3.0 KiB
C
/*
|
|
* Scatterlist Cryptographic API.
|
|
*
|
|
* Procfs information.
|
|
*
|
|
* Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
|
|
* Copyright (c) 2005 Herbert Xu <herbert@gondor.apana.org.au>
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
* under the terms of the GNU General Public License as published by the Free
|
|
* Software Foundation; either version 2 of the License, or (at your option)
|
|
* any later version.
|
|
*
|
|
*/
|
|
|
|
#include <linux/atomic.h>
|
|
#include <linux/init.h>
|
|
#include <linux/crypto.h>
|
|
#include <linux/module.h> /* for module_name() */
|
|
#include <linux/rwsem.h>
|
|
#include <linux/proc_fs.h>
|
|
#include <linux/seq_file.h>
|
|
#include "internal.h"
|
|
|
|
static void *c_start(struct seq_file *m, loff_t *pos)
|
|
{
|
|
down_read(&crypto_alg_sem);
|
|
return seq_list_start(&crypto_alg_list, *pos);
|
|
}
|
|
|
|
static void *c_next(struct seq_file *m, void *p, loff_t *pos)
|
|
{
|
|
return seq_list_next(p, &crypto_alg_list, pos);
|
|
}
|
|
|
|
static void c_stop(struct seq_file *m, void *p)
|
|
{
|
|
up_read(&crypto_alg_sem);
|
|
}
|
|
|
|
static int c_show(struct seq_file *m, void *p)
|
|
{
|
|
struct crypto_alg *alg = list_entry(p, struct crypto_alg, cra_list);
|
|
|
|
seq_printf(m, "name : %s\n", alg->cra_name);
|
|
seq_printf(m, "driver : %s\n", alg->cra_driver_name);
|
|
seq_printf(m, "module : %s\n", module_name(alg->cra_module));
|
|
seq_printf(m, "priority : %d\n", alg->cra_priority);
|
|
seq_printf(m, "refcnt : %d\n", atomic_read(&alg->cra_refcnt));
|
|
seq_printf(m, "selftest : %s\n",
|
|
(alg->cra_flags & CRYPTO_ALG_TESTED) ?
|
|
"passed" : "unknown");
|
|
seq_printf(m, "internal : %s\n",
|
|
(alg->cra_flags & CRYPTO_ALG_INTERNAL) ?
|
|
"yes" : "no");
|
|
|
|
if (alg->cra_flags & CRYPTO_ALG_LARVAL) {
|
|
seq_printf(m, "type : larval\n");
|
|
seq_printf(m, "flags : 0x%x\n", alg->cra_flags);
|
|
goto out;
|
|
}
|
|
|
|
if (alg->cra_type && alg->cra_type->show) {
|
|
alg->cra_type->show(m, alg);
|
|
goto out;
|
|
}
|
|
|
|
switch (alg->cra_flags & (CRYPTO_ALG_TYPE_MASK | CRYPTO_ALG_LARVAL)) {
|
|
case CRYPTO_ALG_TYPE_CIPHER:
|
|
seq_printf(m, "type : cipher\n");
|
|
seq_printf(m, "blocksize : %u\n", alg->cra_blocksize);
|
|
seq_printf(m, "min keysize : %u\n",
|
|
alg->cra_cipher.cia_min_keysize);
|
|
seq_printf(m, "max keysize : %u\n",
|
|
alg->cra_cipher.cia_max_keysize);
|
|
break;
|
|
case CRYPTO_ALG_TYPE_COMPRESS:
|
|
seq_printf(m, "type : compression\n");
|
|
break;
|
|
default:
|
|
seq_printf(m, "type : unknown\n");
|
|
break;
|
|
}
|
|
|
|
out:
|
|
seq_putc(m, '\n');
|
|
return 0;
|
|
}
|
|
|
|
static const struct seq_operations crypto_seq_ops = {
|
|
.start = c_start,
|
|
.next = c_next,
|
|
.stop = c_stop,
|
|
.show = c_show
|
|
};
|
|
|
|
static int crypto_info_open(struct inode *inode, struct file *file)
|
|
{
|
|
return seq_open(file, &crypto_seq_ops);
|
|
}
|
|
|
|
static const struct file_operations proc_crypto_ops = {
|
|
.open = crypto_info_open,
|
|
.read = seq_read,
|
|
.llseek = seq_lseek,
|
|
.release = seq_release
|
|
};
|
|
|
|
void __init crypto_init_proc(void)
|
|
{
|
|
proc_create("crypto", 0, NULL, &proc_crypto_ops);
|
|
}
|
|
|
|
void __exit crypto_exit_proc(void)
|
|
{
|
|
remove_proc_entry("crypto", NULL);
|
|
}
|