Blame view

crypto/chacha20poly1305.c 18.7 KB
2874c5fd2   Thomas Gleixner   treewide: Replace...
1
  // SPDX-License-Identifier: GPL-2.0-or-later
71ebc4d1b   Martin Willi   crypto: chacha20p...
2
3
4
5
  /*
   * ChaCha20-Poly1305 AEAD, RFC7539
   *
   * Copyright (C) 2015 Martin Willi
71ebc4d1b   Martin Willi   crypto: chacha20p...
6
7
8
9
10
11
   */
  
  #include <crypto/internal/aead.h>
  #include <crypto/internal/hash.h>
  #include <crypto/internal/skcipher.h>
  #include <crypto/scatterwalk.h>
1ca1b9179   Eric Biggers   crypto: chacha20-...
12
  #include <crypto/chacha.h>
2546f811e   Martin Willi   crypto: poly1305 ...
13
  #include <crypto/poly1305.h>
71ebc4d1b   Martin Willi   crypto: chacha20p...
14
15
16
17
18
19
  #include <linux/err.h>
  #include <linux/init.h>
  #include <linux/kernel.h>
  #include <linux/module.h>
  
  #include "internal.h"
71ebc4d1b   Martin Willi   crypto: chacha20p...
20
21
22
23
24
25
26
  struct chachapoly_instance_ctx {
  	struct crypto_skcipher_spawn chacha;
  	struct crypto_ahash_spawn poly;
  	unsigned int saltlen;
  };
  
  struct chachapoly_ctx {
1e1f00611   Herbert Xu   crypto: chacha20p...
27
  	struct crypto_skcipher *chacha;
71ebc4d1b   Martin Willi   crypto: chacha20p...
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
  	struct crypto_ahash *poly;
  	/* key bytes we use for the ChaCha20 IV */
  	unsigned int saltlen;
  	u8 salt[];
  };
  
  struct poly_req {
  	/* zero byte padding for AD/ciphertext, as needed */
  	u8 pad[POLY1305_BLOCK_SIZE];
  	/* tail data with AD/ciphertext lengths */
  	struct {
  		__le64 assoclen;
  		__le64 cryptlen;
  	} tail;
  	struct scatterlist src[1];
  	struct ahash_request req; /* must be last member */
  };
  
  struct chacha_req {
1ca1b9179   Eric Biggers   crypto: chacha20-...
47
  	u8 iv[CHACHA_IV_SIZE];
71ebc4d1b   Martin Willi   crypto: chacha20p...
48
  	struct scatterlist src[1];
1e1f00611   Herbert Xu   crypto: chacha20p...
49
  	struct skcipher_request req; /* must be last member */
71ebc4d1b   Martin Willi   crypto: chacha20p...
50
51
52
  };
  
  struct chachapoly_req_ctx {
747909223   Herbert Xu   crypto: chacha20p...
53
54
  	struct scatterlist src[2];
  	struct scatterlist dst[2];
c2b7b20ae   Martin Willi   crypto: poly1305 ...
55
56
  	/* the key we generate for Poly1305 using Chacha20 */
  	u8 key[POLY1305_KEY_SIZE];
71ebc4d1b   Martin Willi   crypto: chacha20p...
57
58
59
60
  	/* calculated Poly1305 tag */
  	u8 tag[POLY1305_DIGEST_SIZE];
  	/* length of data to en/decrypt, without ICV */
  	unsigned int cryptlen;
747909223   Herbert Xu   crypto: chacha20p...
61
62
  	/* Actual AD, excluding IV */
  	unsigned int assoclen;
7545b6c20   Eric Biggers   crypto: chacha20p...
63
64
  	/* request flags, with MAY_SLEEP cleared if needed */
  	u32 flags;
71ebc4d1b   Martin Willi   crypto: chacha20p...
65
66
67
68
69
70
71
72
73
  	union {
  		struct poly_req poly;
  		struct chacha_req chacha;
  	} u;
  };
  
  static inline void async_done_continue(struct aead_request *req, int err,
  				       int (*cont)(struct aead_request *))
  {
7545b6c20   Eric Biggers   crypto: chacha20p...
74
75
76
77
  	if (!err) {
  		struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
  
  		rctx->flags &= ~CRYPTO_TFM_REQ_MAY_SLEEP;
71ebc4d1b   Martin Willi   crypto: chacha20p...
78
  		err = cont(req);
7545b6c20   Eric Biggers   crypto: chacha20p...
79
  	}
71ebc4d1b   Martin Willi   crypto: chacha20p...
80
81
82
83
84
85
86
87
88
89
90
91
92
  
  	if (err != -EINPROGRESS && err != -EBUSY)
  		aead_request_complete(req, err);
  }
  
  static void chacha_iv(u8 *iv, struct aead_request *req, u32 icb)
  {
  	struct chachapoly_ctx *ctx = crypto_aead_ctx(crypto_aead_reqtfm(req));
  	__le32 leicb = cpu_to_le32(icb);
  
  	memcpy(iv, &leicb, sizeof(leicb));
  	memcpy(iv + sizeof(leicb), ctx->salt, ctx->saltlen);
  	memcpy(iv + sizeof(leicb) + ctx->saltlen, req->iv,
1ca1b9179   Eric Biggers   crypto: chacha20-...
93
  	       CHACHA_IV_SIZE - sizeof(leicb) - ctx->saltlen);
71ebc4d1b   Martin Willi   crypto: chacha20p...
94
95
96
97
98
99
  }
  
  static int poly_verify_tag(struct aead_request *req)
  {
  	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
  	u8 tag[sizeof(rctx->tag)];
747909223   Herbert Xu   crypto: chacha20p...
100
101
102
  	scatterwalk_map_and_copy(tag, req->src,
  				 req->assoclen + rctx->cryptlen,
  				 sizeof(tag), 0);
71ebc4d1b   Martin Willi   crypto: chacha20p...
103
104
105
106
107
108
109
110
  	if (crypto_memneq(tag, rctx->tag, sizeof(tag)))
  		return -EBADMSG;
  	return 0;
  }
  
  static int poly_copy_tag(struct aead_request *req)
  {
  	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
747909223   Herbert Xu   crypto: chacha20p...
111
112
  	scatterwalk_map_and_copy(rctx->tag, req->dst,
  				 req->assoclen + rctx->cryptlen,
71ebc4d1b   Martin Willi   crypto: chacha20p...
113
114
115
116
117
118
119
120
121
122
123
124
125
126
  				 sizeof(rctx->tag), 1);
  	return 0;
  }
  
  static void chacha_decrypt_done(struct crypto_async_request *areq, int err)
  {
  	async_done_continue(areq->data, err, poly_verify_tag);
  }
  
  static int chacha_decrypt(struct aead_request *req)
  {
  	struct chachapoly_ctx *ctx = crypto_aead_ctx(crypto_aead_reqtfm(req));
  	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
  	struct chacha_req *creq = &rctx->u.chacha;
747909223   Herbert Xu   crypto: chacha20p...
127
  	struct scatterlist *src, *dst;
71ebc4d1b   Martin Willi   crypto: chacha20p...
128
  	int err;
161151d79   Jason A. Donenfeld   crypto: chacha20p...
129
130
  	if (rctx->cryptlen == 0)
  		goto skip;
71ebc4d1b   Martin Willi   crypto: chacha20p...
131
  	chacha_iv(creq->iv, req, 1);
747909223   Herbert Xu   crypto: chacha20p...
132
133
  	src = scatterwalk_ffwd(rctx->src, req->src, req->assoclen);
  	dst = src;
76cadf224   Eric Biggers   crypto: chacha20p...
134
  	if (req->src != req->dst)
747909223   Herbert Xu   crypto: chacha20p...
135
  		dst = scatterwalk_ffwd(rctx->dst, req->dst, req->assoclen);
747909223   Herbert Xu   crypto: chacha20p...
136

7545b6c20   Eric Biggers   crypto: chacha20p...
137
  	skcipher_request_set_callback(&creq->req, rctx->flags,
1e1f00611   Herbert Xu   crypto: chacha20p...
138
139
140
141
142
  				      chacha_decrypt_done, req);
  	skcipher_request_set_tfm(&creq->req, ctx->chacha);
  	skcipher_request_set_crypt(&creq->req, src, dst,
  				   rctx->cryptlen, creq->iv);
  	err = crypto_skcipher_decrypt(&creq->req);
71ebc4d1b   Martin Willi   crypto: chacha20p...
143
144
  	if (err)
  		return err;
161151d79   Jason A. Donenfeld   crypto: chacha20p...
145
  skip:
71ebc4d1b   Martin Willi   crypto: chacha20p...
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
  	return poly_verify_tag(req);
  }
  
  static int poly_tail_continue(struct aead_request *req)
  {
  	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
  
  	if (rctx->cryptlen == req->cryptlen) /* encrypting */
  		return poly_copy_tag(req);
  
  	return chacha_decrypt(req);
  }
  
  static void poly_tail_done(struct crypto_async_request *areq, int err)
  {
  	async_done_continue(areq->data, err, poly_tail_continue);
  }
  
  static int poly_tail(struct aead_request *req)
  {
747909223   Herbert Xu   crypto: chacha20p...
166
167
  	struct crypto_aead *tfm = crypto_aead_reqtfm(req);
  	struct chachapoly_ctx *ctx = crypto_aead_ctx(tfm);
71ebc4d1b   Martin Willi   crypto: chacha20p...
168
169
  	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
  	struct poly_req *preq = &rctx->u.poly;
71ebc4d1b   Martin Willi   crypto: chacha20p...
170
  	int err;
76cadf224   Eric Biggers   crypto: chacha20p...
171
172
173
  	preq->tail.assoclen = cpu_to_le64(rctx->assoclen);
  	preq->tail.cryptlen = cpu_to_le64(rctx->cryptlen);
  	sg_init_one(preq->src, &preq->tail, sizeof(preq->tail));
71ebc4d1b   Martin Willi   crypto: chacha20p...
174

7545b6c20   Eric Biggers   crypto: chacha20p...
175
  	ahash_request_set_callback(&preq->req, rctx->flags,
71ebc4d1b   Martin Willi   crypto: chacha20p...
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
  				   poly_tail_done, req);
  	ahash_request_set_tfm(&preq->req, ctx->poly);
  	ahash_request_set_crypt(&preq->req, preq->src,
  				rctx->tag, sizeof(preq->tail));
  
  	err = crypto_ahash_finup(&preq->req);
  	if (err)
  		return err;
  
  	return poly_tail_continue(req);
  }
  
  static void poly_cipherpad_done(struct crypto_async_request *areq, int err)
  {
  	async_done_continue(areq->data, err, poly_tail);
  }
  
  static int poly_cipherpad(struct aead_request *req)
  {
  	struct chachapoly_ctx *ctx = crypto_aead_ctx(crypto_aead_reqtfm(req));
  	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
  	struct poly_req *preq = &rctx->u.poly;
76cadf224   Eric Biggers   crypto: chacha20p...
198
  	unsigned int padlen;
71ebc4d1b   Martin Willi   crypto: chacha20p...
199
  	int err;
76cadf224   Eric Biggers   crypto: chacha20p...
200
  	padlen = -rctx->cryptlen % POLY1305_BLOCK_SIZE;
71ebc4d1b   Martin Willi   crypto: chacha20p...
201
  	memset(preq->pad, 0, sizeof(preq->pad));
76cadf224   Eric Biggers   crypto: chacha20p...
202
  	sg_init_one(preq->src, preq->pad, padlen);
71ebc4d1b   Martin Willi   crypto: chacha20p...
203

7545b6c20   Eric Biggers   crypto: chacha20p...
204
  	ahash_request_set_callback(&preq->req, rctx->flags,
71ebc4d1b   Martin Willi   crypto: chacha20p...
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
  				   poly_cipherpad_done, req);
  	ahash_request_set_tfm(&preq->req, ctx->poly);
  	ahash_request_set_crypt(&preq->req, preq->src, NULL, padlen);
  
  	err = crypto_ahash_update(&preq->req);
  	if (err)
  		return err;
  
  	return poly_tail(req);
  }
  
  static void poly_cipher_done(struct crypto_async_request *areq, int err)
  {
  	async_done_continue(areq->data, err, poly_cipherpad);
  }
  
  static int poly_cipher(struct aead_request *req)
  {
  	struct chachapoly_ctx *ctx = crypto_aead_ctx(crypto_aead_reqtfm(req));
  	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
  	struct poly_req *preq = &rctx->u.poly;
  	struct scatterlist *crypt = req->src;
  	int err;
  
  	if (rctx->cryptlen == req->cryptlen) /* encrypting */
  		crypt = req->dst;
747909223   Herbert Xu   crypto: chacha20p...
231
  	crypt = scatterwalk_ffwd(rctx->src, crypt, req->assoclen);
7545b6c20   Eric Biggers   crypto: chacha20p...
232
  	ahash_request_set_callback(&preq->req, rctx->flags,
71ebc4d1b   Martin Willi   crypto: chacha20p...
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
  				   poly_cipher_done, req);
  	ahash_request_set_tfm(&preq->req, ctx->poly);
  	ahash_request_set_crypt(&preq->req, crypt, NULL, rctx->cryptlen);
  
  	err = crypto_ahash_update(&preq->req);
  	if (err)
  		return err;
  
  	return poly_cipherpad(req);
  }
  
  static void poly_adpad_done(struct crypto_async_request *areq, int err)
  {
  	async_done_continue(areq->data, err, poly_cipher);
  }
  
  static int poly_adpad(struct aead_request *req)
  {
  	struct chachapoly_ctx *ctx = crypto_aead_ctx(crypto_aead_reqtfm(req));
  	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
  	struct poly_req *preq = &rctx->u.poly;
76cadf224   Eric Biggers   crypto: chacha20p...
254
  	unsigned int padlen;
71ebc4d1b   Martin Willi   crypto: chacha20p...
255
  	int err;
76cadf224   Eric Biggers   crypto: chacha20p...
256
  	padlen = -rctx->assoclen % POLY1305_BLOCK_SIZE;
71ebc4d1b   Martin Willi   crypto: chacha20p...
257
  	memset(preq->pad, 0, sizeof(preq->pad));
76cadf224   Eric Biggers   crypto: chacha20p...
258
  	sg_init_one(preq->src, preq->pad, padlen);
71ebc4d1b   Martin Willi   crypto: chacha20p...
259

7545b6c20   Eric Biggers   crypto: chacha20p...
260
  	ahash_request_set_callback(&preq->req, rctx->flags,
71ebc4d1b   Martin Willi   crypto: chacha20p...
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
  				   poly_adpad_done, req);
  	ahash_request_set_tfm(&preq->req, ctx->poly);
  	ahash_request_set_crypt(&preq->req, preq->src, NULL, padlen);
  
  	err = crypto_ahash_update(&preq->req);
  	if (err)
  		return err;
  
  	return poly_cipher(req);
  }
  
  static void poly_ad_done(struct crypto_async_request *areq, int err)
  {
  	async_done_continue(areq->data, err, poly_adpad);
  }
  
  static int poly_ad(struct aead_request *req)
  {
  	struct chachapoly_ctx *ctx = crypto_aead_ctx(crypto_aead_reqtfm(req));
  	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
  	struct poly_req *preq = &rctx->u.poly;
  	int err;
7545b6c20   Eric Biggers   crypto: chacha20p...
283
  	ahash_request_set_callback(&preq->req, rctx->flags,
71ebc4d1b   Martin Willi   crypto: chacha20p...
284
285
  				   poly_ad_done, req);
  	ahash_request_set_tfm(&preq->req, ctx->poly);
747909223   Herbert Xu   crypto: chacha20p...
286
  	ahash_request_set_crypt(&preq->req, req->src, NULL, rctx->assoclen);
71ebc4d1b   Martin Willi   crypto: chacha20p...
287
288
289
290
291
292
293
  
  	err = crypto_ahash_update(&preq->req);
  	if (err)
  		return err;
  
  	return poly_adpad(req);
  }
c2b7b20ae   Martin Willi   crypto: poly1305 ...
294
  static void poly_setkey_done(struct crypto_async_request *areq, int err)
71ebc4d1b   Martin Willi   crypto: chacha20p...
295
296
297
  {
  	async_done_continue(areq->data, err, poly_ad);
  }
c2b7b20ae   Martin Willi   crypto: poly1305 ...
298
  static int poly_setkey(struct aead_request *req)
71ebc4d1b   Martin Willi   crypto: chacha20p...
299
300
301
302
303
  {
  	struct chachapoly_ctx *ctx = crypto_aead_ctx(crypto_aead_reqtfm(req));
  	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
  	struct poly_req *preq = &rctx->u.poly;
  	int err;
76cadf224   Eric Biggers   crypto: chacha20p...
304
  	sg_init_one(preq->src, rctx->key, sizeof(rctx->key));
c2b7b20ae   Martin Willi   crypto: poly1305 ...
305

7545b6c20   Eric Biggers   crypto: chacha20p...
306
  	ahash_request_set_callback(&preq->req, rctx->flags,
c2b7b20ae   Martin Willi   crypto: poly1305 ...
307
  				   poly_setkey_done, req);
71ebc4d1b   Martin Willi   crypto: chacha20p...
308
  	ahash_request_set_tfm(&preq->req, ctx->poly);
c2b7b20ae   Martin Willi   crypto: poly1305 ...
309
  	ahash_request_set_crypt(&preq->req, preq->src, NULL, sizeof(rctx->key));
71ebc4d1b   Martin Willi   crypto: chacha20p...
310

c2b7b20ae   Martin Willi   crypto: poly1305 ...
311
  	err = crypto_ahash_update(&preq->req);
71ebc4d1b   Martin Willi   crypto: chacha20p...
312
313
314
315
316
  	if (err)
  		return err;
  
  	return poly_ad(req);
  }
c2b7b20ae   Martin Willi   crypto: poly1305 ...
317
  static void poly_init_done(struct crypto_async_request *areq, int err)
71ebc4d1b   Martin Willi   crypto: chacha20p...
318
  {
c2b7b20ae   Martin Willi   crypto: poly1305 ...
319
320
321
322
323
324
  	async_done_continue(areq->data, err, poly_setkey);
  }
  
  static int poly_init(struct aead_request *req)
  {
  	struct chachapoly_ctx *ctx = crypto_aead_ctx(crypto_aead_reqtfm(req));
71ebc4d1b   Martin Willi   crypto: chacha20p...
325
  	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
c2b7b20ae   Martin Willi   crypto: poly1305 ...
326
  	struct poly_req *preq = &rctx->u.poly;
71ebc4d1b   Martin Willi   crypto: chacha20p...
327
  	int err;
7545b6c20   Eric Biggers   crypto: chacha20p...
328
  	ahash_request_set_callback(&preq->req, rctx->flags,
c2b7b20ae   Martin Willi   crypto: poly1305 ...
329
330
  				   poly_init_done, req);
  	ahash_request_set_tfm(&preq->req, ctx->poly);
71ebc4d1b   Martin Willi   crypto: chacha20p...
331

c2b7b20ae   Martin Willi   crypto: poly1305 ...
332
  	err = crypto_ahash_init(&preq->req);
71ebc4d1b   Martin Willi   crypto: chacha20p...
333
334
  	if (err)
  		return err;
c2b7b20ae   Martin Willi   crypto: poly1305 ...
335
  	return poly_setkey(req);
71ebc4d1b   Martin Willi   crypto: chacha20p...
336
337
338
339
  }
  
  static void poly_genkey_done(struct crypto_async_request *areq, int err)
  {
c2b7b20ae   Martin Willi   crypto: poly1305 ...
340
  	async_done_continue(areq->data, err, poly_init);
71ebc4d1b   Martin Willi   crypto: chacha20p...
341
342
343
344
  }
  
  static int poly_genkey(struct aead_request *req)
  {
747909223   Herbert Xu   crypto: chacha20p...
345
346
  	struct crypto_aead *tfm = crypto_aead_reqtfm(req);
  	struct chachapoly_ctx *ctx = crypto_aead_ctx(tfm);
71ebc4d1b   Martin Willi   crypto: chacha20p...
347
348
349
  	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
  	struct chacha_req *creq = &rctx->u.chacha;
  	int err;
747909223   Herbert Xu   crypto: chacha20p...
350
351
352
353
354
355
356
  	rctx->assoclen = req->assoclen;
  
  	if (crypto_aead_ivsize(tfm) == 8) {
  		if (rctx->assoclen < 8)
  			return -EINVAL;
  		rctx->assoclen -= 8;
  	}
c2b7b20ae   Martin Willi   crypto: poly1305 ...
357
  	memset(rctx->key, 0, sizeof(rctx->key));
76cadf224   Eric Biggers   crypto: chacha20p...
358
  	sg_init_one(creq->src, rctx->key, sizeof(rctx->key));
71ebc4d1b   Martin Willi   crypto: chacha20p...
359
360
  
  	chacha_iv(creq->iv, req, 0);
7545b6c20   Eric Biggers   crypto: chacha20p...
361
  	skcipher_request_set_callback(&creq->req, rctx->flags,
1e1f00611   Herbert Xu   crypto: chacha20p...
362
363
364
365
  				      poly_genkey_done, req);
  	skcipher_request_set_tfm(&creq->req, ctx->chacha);
  	skcipher_request_set_crypt(&creq->req, creq->src, creq->src,
  				   POLY1305_KEY_SIZE, creq->iv);
71ebc4d1b   Martin Willi   crypto: chacha20p...
366

1e1f00611   Herbert Xu   crypto: chacha20p...
367
  	err = crypto_skcipher_decrypt(&creq->req);
71ebc4d1b   Martin Willi   crypto: chacha20p...
368
369
  	if (err)
  		return err;
c2b7b20ae   Martin Willi   crypto: poly1305 ...
370
  	return poly_init(req);
71ebc4d1b   Martin Willi   crypto: chacha20p...
371
372
373
374
375
376
377
378
379
380
381
382
  }
  
  static void chacha_encrypt_done(struct crypto_async_request *areq, int err)
  {
  	async_done_continue(areq->data, err, poly_genkey);
  }
  
  static int chacha_encrypt(struct aead_request *req)
  {
  	struct chachapoly_ctx *ctx = crypto_aead_ctx(crypto_aead_reqtfm(req));
  	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
  	struct chacha_req *creq = &rctx->u.chacha;
747909223   Herbert Xu   crypto: chacha20p...
383
  	struct scatterlist *src, *dst;
71ebc4d1b   Martin Willi   crypto: chacha20p...
384
  	int err;
161151d79   Jason A. Donenfeld   crypto: chacha20p...
385
386
  	if (req->cryptlen == 0)
  		goto skip;
71ebc4d1b   Martin Willi   crypto: chacha20p...
387
  	chacha_iv(creq->iv, req, 1);
747909223   Herbert Xu   crypto: chacha20p...
388
389
  	src = scatterwalk_ffwd(rctx->src, req->src, req->assoclen);
  	dst = src;
76cadf224   Eric Biggers   crypto: chacha20p...
390
  	if (req->src != req->dst)
747909223   Herbert Xu   crypto: chacha20p...
391
  		dst = scatterwalk_ffwd(rctx->dst, req->dst, req->assoclen);
747909223   Herbert Xu   crypto: chacha20p...
392

7545b6c20   Eric Biggers   crypto: chacha20p...
393
  	skcipher_request_set_callback(&creq->req, rctx->flags,
1e1f00611   Herbert Xu   crypto: chacha20p...
394
395
396
397
398
  				      chacha_encrypt_done, req);
  	skcipher_request_set_tfm(&creq->req, ctx->chacha);
  	skcipher_request_set_crypt(&creq->req, src, dst,
  				   req->cryptlen, creq->iv);
  	err = crypto_skcipher_encrypt(&creq->req);
71ebc4d1b   Martin Willi   crypto: chacha20p...
399
400
  	if (err)
  		return err;
161151d79   Jason A. Donenfeld   crypto: chacha20p...
401
  skip:
71ebc4d1b   Martin Willi   crypto: chacha20p...
402
403
404
405
406
407
408
409
  	return poly_genkey(req);
  }
  
  static int chachapoly_encrypt(struct aead_request *req)
  {
  	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
  
  	rctx->cryptlen = req->cryptlen;
7545b6c20   Eric Biggers   crypto: chacha20p...
410
  	rctx->flags = aead_request_flags(req);
71ebc4d1b   Martin Willi   crypto: chacha20p...
411
412
413
  
  	/* encrypt call chain:
  	 * - chacha_encrypt/done()
c2b7b20ae   Martin Willi   crypto: poly1305 ...
414
  	 * - poly_genkey/done()
71ebc4d1b   Martin Willi   crypto: chacha20p...
415
  	 * - poly_init/done()
c2b7b20ae   Martin Willi   crypto: poly1305 ...
416
  	 * - poly_setkey/done()
71ebc4d1b   Martin Willi   crypto: chacha20p...
417
418
419
420
421
422
423
424
425
426
427
428
429
  	 * - poly_ad/done()
  	 * - poly_adpad/done()
  	 * - poly_cipher/done()
  	 * - poly_cipherpad/done()
  	 * - poly_tail/done/continue()
  	 * - poly_copy_tag()
  	 */
  	return chacha_encrypt(req);
  }
  
  static int chachapoly_decrypt(struct aead_request *req)
  {
  	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
71ebc4d1b   Martin Willi   crypto: chacha20p...
430
  	rctx->cryptlen = req->cryptlen - POLY1305_DIGEST_SIZE;
7545b6c20   Eric Biggers   crypto: chacha20p...
431
  	rctx->flags = aead_request_flags(req);
71ebc4d1b   Martin Willi   crypto: chacha20p...
432
433
  
  	/* decrypt call chain:
c2b7b20ae   Martin Willi   crypto: poly1305 ...
434
  	 * - poly_genkey/done()
71ebc4d1b   Martin Willi   crypto: chacha20p...
435
  	 * - poly_init/done()
c2b7b20ae   Martin Willi   crypto: poly1305 ...
436
  	 * - poly_setkey/done()
71ebc4d1b   Martin Willi   crypto: chacha20p...
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
  	 * - poly_ad/done()
  	 * - poly_adpad/done()
  	 * - poly_cipher/done()
  	 * - poly_cipherpad/done()
  	 * - poly_tail/done/continue()
  	 * - chacha_decrypt/done()
  	 * - poly_verify_tag()
  	 */
  	return poly_genkey(req);
  }
  
  static int chachapoly_setkey(struct crypto_aead *aead, const u8 *key,
  			     unsigned int keylen)
  {
  	struct chachapoly_ctx *ctx = crypto_aead_ctx(aead);
  	int err;
1ca1b9179   Eric Biggers   crypto: chacha20-...
453
  	if (keylen != ctx->saltlen + CHACHA_KEY_SIZE)
71ebc4d1b   Martin Willi   crypto: chacha20p...
454
455
456
457
  		return -EINVAL;
  
  	keylen -= ctx->saltlen;
  	memcpy(ctx->salt, key + keylen, ctx->saltlen);
1e1f00611   Herbert Xu   crypto: chacha20p...
458
459
460
  	crypto_skcipher_clear_flags(ctx->chacha, CRYPTO_TFM_REQ_MASK);
  	crypto_skcipher_set_flags(ctx->chacha, crypto_aead_get_flags(aead) &
  					       CRYPTO_TFM_REQ_MASK);
71ebc4d1b   Martin Willi   crypto: chacha20p...
461

1e1f00611   Herbert Xu   crypto: chacha20p...
462
463
464
  	err = crypto_skcipher_setkey(ctx->chacha, key, keylen);
  	crypto_aead_set_flags(aead, crypto_skcipher_get_flags(ctx->chacha) &
  				    CRYPTO_TFM_RES_MASK);
71ebc4d1b   Martin Willi   crypto: chacha20p...
465
466
467
468
469
470
471
472
473
474
475
  	return err;
  }
  
  static int chachapoly_setauthsize(struct crypto_aead *tfm,
  				  unsigned int authsize)
  {
  	if (authsize != POLY1305_DIGEST_SIZE)
  		return -EINVAL;
  
  	return 0;
  }
747909223   Herbert Xu   crypto: chacha20p...
476
  static int chachapoly_init(struct crypto_aead *tfm)
71ebc4d1b   Martin Willi   crypto: chacha20p...
477
  {
747909223   Herbert Xu   crypto: chacha20p...
478
479
480
  	struct aead_instance *inst = aead_alg_instance(tfm);
  	struct chachapoly_instance_ctx *ictx = aead_instance_ctx(inst);
  	struct chachapoly_ctx *ctx = crypto_aead_ctx(tfm);
1e1f00611   Herbert Xu   crypto: chacha20p...
481
  	struct crypto_skcipher *chacha;
71ebc4d1b   Martin Willi   crypto: chacha20p...
482
483
484
485
486
487
  	struct crypto_ahash *poly;
  	unsigned long align;
  
  	poly = crypto_spawn_ahash(&ictx->poly);
  	if (IS_ERR(poly))
  		return PTR_ERR(poly);
60425a8ba   Eric Biggers   crypto: skcipher ...
488
  	chacha = crypto_spawn_skcipher(&ictx->chacha);
71ebc4d1b   Martin Willi   crypto: chacha20p...
489
490
491
492
493
494
495
496
  	if (IS_ERR(chacha)) {
  		crypto_free_ahash(poly);
  		return PTR_ERR(chacha);
  	}
  
  	ctx->chacha = chacha;
  	ctx->poly = poly;
  	ctx->saltlen = ictx->saltlen;
747909223   Herbert Xu   crypto: chacha20p...
497
  	align = crypto_aead_alignmask(tfm);
71ebc4d1b   Martin Willi   crypto: chacha20p...
498
  	align &= ~(crypto_tfm_ctx_alignment() - 1);
747909223   Herbert Xu   crypto: chacha20p...
499
500
501
502
  	crypto_aead_set_reqsize(
  		tfm,
  		align + offsetof(struct chachapoly_req_ctx, u) +
  		max(offsetof(struct chacha_req, req) +
1e1f00611   Herbert Xu   crypto: chacha20p...
503
504
  		    sizeof(struct skcipher_request) +
  		    crypto_skcipher_reqsize(chacha),
747909223   Herbert Xu   crypto: chacha20p...
505
506
507
  		    offsetof(struct poly_req, req) +
  		    sizeof(struct ahash_request) +
  		    crypto_ahash_reqsize(poly)));
71ebc4d1b   Martin Willi   crypto: chacha20p...
508
509
510
  
  	return 0;
  }
747909223   Herbert Xu   crypto: chacha20p...
511
  static void chachapoly_exit(struct crypto_aead *tfm)
71ebc4d1b   Martin Willi   crypto: chacha20p...
512
  {
747909223   Herbert Xu   crypto: chacha20p...
513
  	struct chachapoly_ctx *ctx = crypto_aead_ctx(tfm);
71ebc4d1b   Martin Willi   crypto: chacha20p...
514
515
  
  	crypto_free_ahash(ctx->poly);
1e1f00611   Herbert Xu   crypto: chacha20p...
516
  	crypto_free_skcipher(ctx->chacha);
71ebc4d1b   Martin Willi   crypto: chacha20p...
517
  }
747909223   Herbert Xu   crypto: chacha20p...
518
519
520
521
522
523
524
525
526
527
528
  static void chachapoly_free(struct aead_instance *inst)
  {
  	struct chachapoly_instance_ctx *ctx = aead_instance_ctx(inst);
  
  	crypto_drop_skcipher(&ctx->chacha);
  	crypto_drop_ahash(&ctx->poly);
  	kfree(inst);
  }
  
  static int chachapoly_create(struct crypto_template *tmpl, struct rtattr **tb,
  			     const char *name, unsigned int ivsize)
71ebc4d1b   Martin Willi   crypto: chacha20p...
529
530
  {
  	struct crypto_attr_type *algt;
747909223   Herbert Xu   crypto: chacha20p...
531
  	struct aead_instance *inst;
1e1f00611   Herbert Xu   crypto: chacha20p...
532
  	struct skcipher_alg *chacha;
71ebc4d1b   Martin Willi   crypto: chacha20p...
533
  	struct crypto_alg *poly;
747909223   Herbert Xu   crypto: chacha20p...
534
  	struct hash_alg_common *poly_hash;
71ebc4d1b   Martin Willi   crypto: chacha20p...
535
536
537
538
539
  	struct chachapoly_instance_ctx *ctx;
  	const char *chacha_name, *poly_name;
  	int err;
  
  	if (ivsize > CHACHAPOLY_IV_SIZE)
747909223   Herbert Xu   crypto: chacha20p...
540
  		return -EINVAL;
71ebc4d1b   Martin Willi   crypto: chacha20p...
541
542
543
  
  	algt = crypto_get_attr_type(tb);
  	if (IS_ERR(algt))
747909223   Herbert Xu   crypto: chacha20p...
544
  		return PTR_ERR(algt);
71ebc4d1b   Martin Willi   crypto: chacha20p...
545

5e4b8c1fc   Herbert Xu   crypto: aead - Re...
546
  	if ((algt->type ^ CRYPTO_ALG_TYPE_AEAD) & algt->mask)
747909223   Herbert Xu   crypto: chacha20p...
547
  		return -EINVAL;
71ebc4d1b   Martin Willi   crypto: chacha20p...
548
549
550
  
  	chacha_name = crypto_attr_alg_name(tb[1]);
  	if (IS_ERR(chacha_name))
747909223   Herbert Xu   crypto: chacha20p...
551
  		return PTR_ERR(chacha_name);
71ebc4d1b   Martin Willi   crypto: chacha20p...
552
553
  	poly_name = crypto_attr_alg_name(tb[2]);
  	if (IS_ERR(poly_name))
747909223   Herbert Xu   crypto: chacha20p...
554
  		return PTR_ERR(poly_name);
71ebc4d1b   Martin Willi   crypto: chacha20p...
555
556
557
  
  	poly = crypto_find_alg(poly_name, &crypto_ahash_type,
  			       CRYPTO_ALG_TYPE_HASH,
1e1f00611   Herbert Xu   crypto: chacha20p...
558
559
560
  			       CRYPTO_ALG_TYPE_AHASH_MASK |
  			       crypto_requires_sync(algt->type,
  						    algt->mask));
71ebc4d1b   Martin Willi   crypto: chacha20p...
561
  	if (IS_ERR(poly))
747909223   Herbert Xu   crypto: chacha20p...
562
  		return PTR_ERR(poly);
e57121d08   Eric Biggers   crypto: chacha20p...
563
564
565
566
567
  	poly_hash = __crypto_hash_alg_common(poly);
  
  	err = -EINVAL;
  	if (poly_hash->digestsize != POLY1305_DIGEST_SIZE)
  		goto out_put_poly;
71ebc4d1b   Martin Willi   crypto: chacha20p...
568
569
570
571
572
  
  	err = -ENOMEM;
  	inst = kzalloc(sizeof(*inst) + sizeof(*ctx), GFP_KERNEL);
  	if (!inst)
  		goto out_put_poly;
747909223   Herbert Xu   crypto: chacha20p...
573
  	ctx = aead_instance_ctx(inst);
71ebc4d1b   Martin Willi   crypto: chacha20p...
574
  	ctx->saltlen = CHACHAPOLY_IV_SIZE - ivsize;
747909223   Herbert Xu   crypto: chacha20p...
575
576
  	err = crypto_init_ahash_spawn(&ctx->poly, poly_hash,
  				      aead_crypto_instance(inst));
71ebc4d1b   Martin Willi   crypto: chacha20p...
577
578
  	if (err)
  		goto err_free_inst;
747909223   Herbert Xu   crypto: chacha20p...
579
  	crypto_set_skcipher_spawn(&ctx->chacha, aead_crypto_instance(inst));
a35528eca   Eric Biggers   crypto: skcipher ...
580
581
582
  	err = crypto_grab_skcipher(&ctx->chacha, chacha_name, 0,
  				   crypto_requires_sync(algt->type,
  							algt->mask));
71ebc4d1b   Martin Willi   crypto: chacha20p...
583
584
  	if (err)
  		goto err_drop_poly;
1e1f00611   Herbert Xu   crypto: chacha20p...
585
  	chacha = crypto_spawn_skcipher_alg(&ctx->chacha);
71ebc4d1b   Martin Willi   crypto: chacha20p...
586
587
588
  
  	err = -EINVAL;
  	/* Need 16-byte IV size, including Initial Block Counter value */
1ca1b9179   Eric Biggers   crypto: chacha20-...
589
  	if (crypto_skcipher_alg_ivsize(chacha) != CHACHA_IV_SIZE)
71ebc4d1b   Martin Willi   crypto: chacha20p...
590
591
  		goto out_drop_chacha;
  	/* Not a stream cipher? */
1e1f00611   Herbert Xu   crypto: chacha20p...
592
  	if (chacha->base.cra_blocksize != 1)
71ebc4d1b   Martin Willi   crypto: chacha20p...
593
594
595
  		goto out_drop_chacha;
  
  	err = -ENAMETOOLONG;
747909223   Herbert Xu   crypto: chacha20p...
596
  	if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME,
5e27f38f1   Eric Biggers   crypto: chacha20p...
597
598
  		     "%s(%s,%s)", name, chacha->base.cra_name,
  		     poly->cra_name) >= CRYPTO_MAX_ALG_NAME)
71ebc4d1b   Martin Willi   crypto: chacha20p...
599
  		goto out_drop_chacha;
747909223   Herbert Xu   crypto: chacha20p...
600
  	if (snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME,
1e1f00611   Herbert Xu   crypto: chacha20p...
601
  		     "%s(%s,%s)", name, chacha->base.cra_driver_name,
71ebc4d1b   Martin Willi   crypto: chacha20p...
602
603
  		     poly->cra_driver_name) >= CRYPTO_MAX_ALG_NAME)
  		goto out_drop_chacha;
1e1f00611   Herbert Xu   crypto: chacha20p...
604
  	inst->alg.base.cra_flags = (chacha->base.cra_flags | poly->cra_flags) &
747909223   Herbert Xu   crypto: chacha20p...
605
  				   CRYPTO_ALG_ASYNC;
1e1f00611   Herbert Xu   crypto: chacha20p...
606
  	inst->alg.base.cra_priority = (chacha->base.cra_priority +
747909223   Herbert Xu   crypto: chacha20p...
607
608
  				       poly->cra_priority) / 2;
  	inst->alg.base.cra_blocksize = 1;
1e1f00611   Herbert Xu   crypto: chacha20p...
609
  	inst->alg.base.cra_alignmask = chacha->base.cra_alignmask |
747909223   Herbert Xu   crypto: chacha20p...
610
611
612
613
  				       poly->cra_alignmask;
  	inst->alg.base.cra_ctxsize = sizeof(struct chachapoly_ctx) +
  				     ctx->saltlen;
  	inst->alg.ivsize = ivsize;
1e1f00611   Herbert Xu   crypto: chacha20p...
614
  	inst->alg.chunksize = crypto_skcipher_alg_chunksize(chacha);
747909223   Herbert Xu   crypto: chacha20p...
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
  	inst->alg.maxauthsize = POLY1305_DIGEST_SIZE;
  	inst->alg.init = chachapoly_init;
  	inst->alg.exit = chachapoly_exit;
  	inst->alg.encrypt = chachapoly_encrypt;
  	inst->alg.decrypt = chachapoly_decrypt;
  	inst->alg.setkey = chachapoly_setkey;
  	inst->alg.setauthsize = chachapoly_setauthsize;
  
  	inst->free = chachapoly_free;
  
  	err = aead_register_instance(tmpl, inst);
  	if (err)
  		goto out_drop_chacha;
  
  out_put_poly:
71ebc4d1b   Martin Willi   crypto: chacha20p...
630
  	crypto_mod_put(poly);
747909223   Herbert Xu   crypto: chacha20p...
631
  	return err;
71ebc4d1b   Martin Willi   crypto: chacha20p...
632
633
634
635
636
637
638
  
  out_drop_chacha:
  	crypto_drop_skcipher(&ctx->chacha);
  err_drop_poly:
  	crypto_drop_ahash(&ctx->poly);
  err_free_inst:
  	kfree(inst);
747909223   Herbert Xu   crypto: chacha20p...
639
  	goto out_put_poly;
71ebc4d1b   Martin Willi   crypto: chacha20p...
640
  }
747909223   Herbert Xu   crypto: chacha20p...
641
  static int rfc7539_create(struct crypto_template *tmpl, struct rtattr **tb)
4db4ad260   Martin Willi   crypto: chacha20p...
642
  {
747909223   Herbert Xu   crypto: chacha20p...
643
  	return chachapoly_create(tmpl, tb, "rfc7539", 12);
4db4ad260   Martin Willi   crypto: chacha20p...
644
  }
747909223   Herbert Xu   crypto: chacha20p...
645
  static int rfc7539esp_create(struct crypto_template *tmpl, struct rtattr **tb)
71ebc4d1b   Martin Willi   crypto: chacha20p...
646
  {
747909223   Herbert Xu   crypto: chacha20p...
647
  	return chachapoly_create(tmpl, tb, "rfc7539esp", 8);
71ebc4d1b   Martin Willi   crypto: chacha20p...
648
  }
1a5e02b68   Xiongfeng Wang   crypto: chacha20p...
649
650
651
652
653
654
655
656
657
658
  static struct crypto_template rfc7539_tmpls[] = {
  	{
  		.name = "rfc7539",
  		.create = rfc7539_create,
  		.module = THIS_MODULE,
  	}, {
  		.name = "rfc7539esp",
  		.create = rfc7539esp_create,
  		.module = THIS_MODULE,
  	},
4db4ad260   Martin Willi   crypto: chacha20p...
659
  };
71ebc4d1b   Martin Willi   crypto: chacha20p...
660
661
  static int __init chacha20poly1305_module_init(void)
  {
1a5e02b68   Xiongfeng Wang   crypto: chacha20p...
662
663
  	return crypto_register_templates(rfc7539_tmpls,
  					 ARRAY_SIZE(rfc7539_tmpls));
71ebc4d1b   Martin Willi   crypto: chacha20p...
664
665
666
667
  }
  
  static void __exit chacha20poly1305_module_exit(void)
  {
1a5e02b68   Xiongfeng Wang   crypto: chacha20p...
668
669
  	crypto_unregister_templates(rfc7539_tmpls,
  				    ARRAY_SIZE(rfc7539_tmpls));
71ebc4d1b   Martin Willi   crypto: chacha20p...
670
  }
c4741b230   Eric Biggers   crypto: run initc...
671
  subsys_initcall(chacha20poly1305_module_init);
71ebc4d1b   Martin Willi   crypto: chacha20p...
672
673
674
675
676
  module_exit(chacha20poly1305_module_exit);
  
  MODULE_LICENSE("GPL");
  MODULE_AUTHOR("Martin Willi <martin@strongswan.org>");
  MODULE_DESCRIPTION("ChaCha20-Poly1305 AEAD");
71ebc4d1b   Martin Willi   crypto: chacha20p...
677
  MODULE_ALIAS_CRYPTO("rfc7539");
4db4ad260   Martin Willi   crypto: chacha20p...
678
  MODULE_ALIAS_CRYPTO("rfc7539esp");