2 * Scatterlist Cryptographic API.
6 * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
7 * Copyright (c) 2005 Herbert Xu <herbert@gondor.apana.org.au>
9 * This program is free software; you can redistribute it and/or modify it
10 * under the terms of the GNU General Public License as published by the Free
11 * Software Foundation; either version 2 of the License, or (at your option)
16 #include <asm/atomic.h>
17 #include <linux/init.h>
18 #include <linux/crypto.h>
19 #include <linux/rwsem.h>
20 #include <linux/proc_fs.h>
21 #include <linux/seq_file.h>
22 #include <linux/sysctl.h>
25 #ifdef CONFIG_CRYPTO_FIPS
26 static struct ctl_table crypto_sysctl_table[] = {
28 .ctl_name = CTL_UNNUMBERED,
29 .procname = "fips_enabled",
30 .data = &fips_enabled,
31 .maxlen = sizeof(int),
33 .proc_handler = &proc_dointvec
40 static struct ctl_table crypto_dir_table[] = {
42 .ctl_name = CTL_UNNUMBERED,
45 .child = crypto_sysctl_table
52 static struct ctl_table_header *crypto_sysctls;
54 static void crypto_proc_fips_init(void)
56 crypto_sysctls = register_sysctl_table(crypto_dir_table);
59 static void crypto_proc_fips_exit(void)
62 unregister_sysctl_table(crypto_sysctls);
65 #define crypto_proc_fips_init()
66 #define crypto_proc_fips_exit()
69 static void *c_start(struct seq_file *m, loff_t *pos)
71 down_read(&crypto_alg_sem);
72 return seq_list_start(&crypto_alg_list, *pos);
75 static void *c_next(struct seq_file *m, void *p, loff_t *pos)
77 return seq_list_next(p, &crypto_alg_list, pos);
80 static void c_stop(struct seq_file *m, void *p)
82 up_read(&crypto_alg_sem);
85 static int c_show(struct seq_file *m, void *p)
87 struct crypto_alg *alg = list_entry(p, struct crypto_alg, cra_list);
89 seq_printf(m, "name : %s\n", alg->cra_name);
90 seq_printf(m, "driver : %s\n", alg->cra_driver_name);
91 seq_printf(m, "module : %s\n", module_name(alg->cra_module));
92 seq_printf(m, "priority : %d\n", alg->cra_priority);
93 seq_printf(m, "refcnt : %d\n", atomic_read(&alg->cra_refcnt));
94 seq_printf(m, "selftest : %s\n",
95 (alg->cra_flags & CRYPTO_ALG_TESTED) ?
96 "passed" : "unknown");
98 switch (alg->cra_flags & (CRYPTO_ALG_TYPE_MASK | CRYPTO_ALG_LARVAL)) {
99 case CRYPTO_ALG_TYPE_CIPHER:
100 seq_printf(m, "type : cipher\n");
101 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize);
102 seq_printf(m, "min keysize : %u\n",
103 alg->cra_cipher.cia_min_keysize);
104 seq_printf(m, "max keysize : %u\n",
105 alg->cra_cipher.cia_max_keysize);
108 case CRYPTO_ALG_TYPE_DIGEST:
109 seq_printf(m, "type : digest\n");
110 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize);
111 seq_printf(m, "digestsize : %u\n",
112 alg->cra_digest.dia_digestsize);
114 case CRYPTO_ALG_TYPE_COMPRESS:
115 seq_printf(m, "type : compression\n");
118 if (alg->cra_flags & CRYPTO_ALG_LARVAL) {
119 seq_printf(m, "type : larval\n");
120 seq_printf(m, "flags : 0x%x\n", alg->cra_flags);
121 } else if (alg->cra_type && alg->cra_type->show)
122 alg->cra_type->show(m, alg);
124 seq_printf(m, "type : unknown\n");
132 static const struct seq_operations crypto_seq_ops = {
139 static int crypto_info_open(struct inode *inode, struct file *file)
141 return seq_open(file, &crypto_seq_ops);
144 static const struct file_operations proc_crypto_ops = {
145 .open = crypto_info_open,
148 .release = seq_release
151 void __init crypto_init_proc(void)
153 proc_create("crypto", 0, NULL, &proc_crypto_ops);
154 crypto_proc_fips_init();
157 void __exit crypto_exit_proc(void)
159 crypto_proc_fips_exit();
160 remove_proc_entry("crypto", NULL);