Blame view
crypto/ctr.c
10.8 KB
23e353c8a [CRYPTO] ctr: Add... |
1 2 3 4 5 6 7 8 9 10 11 12 13 |
/* * CTR: Counter mode * * (C) Copyright IBM Corp. 2007 - Joy Latten <latten@us.ibm.com> * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the Free * Software Foundation; either version 2 of the License, or (at your option) * any later version. * */ #include <crypto/algapi.h> |
5311f248b [CRYPTO] ctr: Ref... |
14 |
#include <crypto/ctr.h> |
23e353c8a [CRYPTO] ctr: Add... |
15 16 17 18 19 20 21 |
#include <linux/err.h> #include <linux/init.h> #include <linux/kernel.h> #include <linux/module.h> #include <linux/random.h> #include <linux/scatterlist.h> #include <linux/slab.h> |
23e353c8a [CRYPTO] ctr: Add... |
22 23 |
struct crypto_ctr_ctx { struct crypto_cipher *child; |
5311f248b [CRYPTO] ctr: Ref... |
24 25 26 27 28 |
}; struct crypto_rfc3686_ctx { struct crypto_blkcipher *child; u8 nonce[CTR_RFC3686_NONCE_SIZE]; |
23e353c8a [CRYPTO] ctr: Add... |
29 |
}; |
23e353c8a [CRYPTO] ctr: Add... |
30 31 32 33 34 |
static int crypto_ctr_setkey(struct crypto_tfm *parent, const u8 *key, unsigned int keylen) { struct crypto_ctr_ctx *ctx = crypto_tfm_ctx(parent); struct crypto_cipher *child = ctx->child; |
5311f248b [CRYPTO] ctr: Ref... |
35 |
int err; |
23e353c8a [CRYPTO] ctr: Add... |
36 37 38 39 40 41 42 43 44 45 |
crypto_cipher_clear_flags(child, CRYPTO_TFM_REQ_MASK); crypto_cipher_set_flags(child, crypto_tfm_get_flags(parent) & CRYPTO_TFM_REQ_MASK); err = crypto_cipher_setkey(child, key, keylen); crypto_tfm_set_flags(parent, crypto_cipher_get_flags(child) & CRYPTO_TFM_RES_MASK); return err; } |
0971eb0de [CRYPTO] ctr: Fix... |
46 |
static void crypto_ctr_crypt_final(struct blkcipher_walk *walk, |
5311f248b [CRYPTO] ctr: Ref... |
47 |
struct crypto_cipher *tfm) |
0971eb0de [CRYPTO] ctr: Fix... |
48 49 |
{ unsigned int bsize = crypto_cipher_blocksize(tfm); |
5311f248b [CRYPTO] ctr: Ref... |
50 51 52 53 |
unsigned long alignmask = crypto_cipher_alignmask(tfm); u8 *ctrblk = walk->iv; u8 tmp[bsize + alignmask]; u8 *keystream = PTR_ALIGN(tmp + 0, alignmask + 1); |
0971eb0de [CRYPTO] ctr: Fix... |
54 55 56 57 58 59 60 |
u8 *src = walk->src.virt.addr; u8 *dst = walk->dst.virt.addr; unsigned int nbytes = walk->nbytes; crypto_cipher_encrypt_one(tfm, keystream, ctrblk); crypto_xor(keystream, src, nbytes); memcpy(dst, keystream, nbytes); |
5311f248b [CRYPTO] ctr: Ref... |
61 62 |
crypto_inc(ctrblk, bsize); |
0971eb0de [CRYPTO] ctr: Fix... |
63 |
} |
23e353c8a [CRYPTO] ctr: Add... |
64 |
static int crypto_ctr_crypt_segment(struct blkcipher_walk *walk, |
5311f248b [CRYPTO] ctr: Ref... |
65 |
struct crypto_cipher *tfm) |
23e353c8a [CRYPTO] ctr: Add... |
66 67 68 69 |
{ void (*fn)(struct crypto_tfm *, u8 *, const u8 *) = crypto_cipher_alg(tfm)->cia_encrypt; unsigned int bsize = crypto_cipher_blocksize(tfm); |
5311f248b [CRYPTO] ctr: Ref... |
70 |
u8 *ctrblk = walk->iv; |
23e353c8a [CRYPTO] ctr: Add... |
71 72 73 74 75 76 |
u8 *src = walk->src.virt.addr; u8 *dst = walk->dst.virt.addr; unsigned int nbytes = walk->nbytes; do { /* create keystream */ |
0971eb0de [CRYPTO] ctr: Fix... |
77 78 |
fn(crypto_cipher_tfm(tfm), dst, ctrblk); crypto_xor(dst, src, bsize); |
23e353c8a [CRYPTO] ctr: Add... |
79 80 |
/* increment counter in counterblock */ |
5311f248b [CRYPTO] ctr: Ref... |
81 |
crypto_inc(ctrblk, bsize); |
23e353c8a [CRYPTO] ctr: Add... |
82 |
|
23e353c8a [CRYPTO] ctr: Add... |
83 84 |
src += bsize; dst += bsize; |
0971eb0de [CRYPTO] ctr: Fix... |
85 |
} while ((nbytes -= bsize) >= bsize); |
23e353c8a [CRYPTO] ctr: Add... |
86 |
|
0971eb0de [CRYPTO] ctr: Fix... |
87 |
return nbytes; |
23e353c8a [CRYPTO] ctr: Add... |
88 89 90 |
} static int crypto_ctr_crypt_inplace(struct blkcipher_walk *walk, |
5311f248b [CRYPTO] ctr: Ref... |
91 |
struct crypto_cipher *tfm) |
23e353c8a [CRYPTO] ctr: Add... |
92 93 94 95 |
{ void (*fn)(struct crypto_tfm *, u8 *, const u8 *) = crypto_cipher_alg(tfm)->cia_encrypt; unsigned int bsize = crypto_cipher_blocksize(tfm); |
5311f248b [CRYPTO] ctr: Ref... |
96 |
unsigned long alignmask = crypto_cipher_alignmask(tfm); |
23e353c8a [CRYPTO] ctr: Add... |
97 |
unsigned int nbytes = walk->nbytes; |
5311f248b [CRYPTO] ctr: Ref... |
98 |
u8 *ctrblk = walk->iv; |
23e353c8a [CRYPTO] ctr: Add... |
99 |
u8 *src = walk->src.virt.addr; |
5311f248b [CRYPTO] ctr: Ref... |
100 101 |
u8 tmp[bsize + alignmask]; u8 *keystream = PTR_ALIGN(tmp + 0, alignmask + 1); |
23e353c8a [CRYPTO] ctr: Add... |
102 103 104 105 |
do { /* create keystream */ fn(crypto_cipher_tfm(tfm), keystream, ctrblk); |
0971eb0de [CRYPTO] ctr: Fix... |
106 |
crypto_xor(src, keystream, bsize); |
23e353c8a [CRYPTO] ctr: Add... |
107 108 |
/* increment counter in counterblock */ |
5311f248b [CRYPTO] ctr: Ref... |
109 |
crypto_inc(ctrblk, bsize); |
23e353c8a [CRYPTO] ctr: Add... |
110 |
|
23e353c8a [CRYPTO] ctr: Add... |
111 |
src += bsize; |
0971eb0de [CRYPTO] ctr: Fix... |
112 |
} while ((nbytes -= bsize) >= bsize); |
23e353c8a [CRYPTO] ctr: Add... |
113 |
|
0971eb0de [CRYPTO] ctr: Fix... |
114 |
return nbytes; |
23e353c8a [CRYPTO] ctr: Add... |
115 116 117 118 119 120 121 122 123 124 125 |
} static int crypto_ctr_crypt(struct blkcipher_desc *desc, struct scatterlist *dst, struct scatterlist *src, unsigned int nbytes) { struct blkcipher_walk walk; struct crypto_blkcipher *tfm = desc->tfm; struct crypto_ctr_ctx *ctx = crypto_blkcipher_ctx(tfm); struct crypto_cipher *child = ctx->child; unsigned int bsize = crypto_cipher_blocksize(child); |
23e353c8a [CRYPTO] ctr: Add... |
126 127 128 129 |
int err; blkcipher_walk_init(&walk, dst, src, nbytes); err = blkcipher_walk_virt_block(desc, &walk, bsize); |
0971eb0de [CRYPTO] ctr: Fix... |
130 |
while (walk.nbytes >= bsize) { |
23e353c8a [CRYPTO] ctr: Add... |
131 |
if (walk.src.virt.addr == walk.dst.virt.addr) |
5311f248b [CRYPTO] ctr: Ref... |
132 |
nbytes = crypto_ctr_crypt_inplace(&walk, child); |
23e353c8a [CRYPTO] ctr: Add... |
133 |
else |
5311f248b [CRYPTO] ctr: Ref... |
134 |
nbytes = crypto_ctr_crypt_segment(&walk, child); |
23e353c8a [CRYPTO] ctr: Add... |
135 136 137 |
err = blkcipher_walk_done(desc, &walk, nbytes); } |
0971eb0de [CRYPTO] ctr: Fix... |
138 139 |
if (walk.nbytes) { |
5311f248b [CRYPTO] ctr: Ref... |
140 |
crypto_ctr_crypt_final(&walk, child); |
0971eb0de [CRYPTO] ctr: Fix... |
141 142 |
err = blkcipher_walk_done(desc, &walk, 0); } |
23e353c8a [CRYPTO] ctr: Add... |
143 144 145 146 147 148 |
return err; } static int crypto_ctr_init_tfm(struct crypto_tfm *tfm) { struct crypto_instance *inst = (void *)tfm->__crt_alg; |
5311f248b [CRYPTO] ctr: Ref... |
149 |
struct crypto_spawn *spawn = crypto_instance_ctx(inst); |
23e353c8a [CRYPTO] ctr: Add... |
150 151 |
struct crypto_ctr_ctx *ctx = crypto_tfm_ctx(tfm); struct crypto_cipher *cipher; |
5311f248b [CRYPTO] ctr: Ref... |
152 |
cipher = crypto_spawn_cipher(spawn); |
23e353c8a [CRYPTO] ctr: Add... |
153 154 155 156 157 158 159 160 161 162 163 |
if (IS_ERR(cipher)) return PTR_ERR(cipher); ctx->child = cipher; return 0; } static void crypto_ctr_exit_tfm(struct crypto_tfm *tfm) { struct crypto_ctr_ctx *ctx = crypto_tfm_ctx(tfm); |
23e353c8a [CRYPTO] ctr: Add... |
164 165 166 167 168 169 170 |
crypto_free_cipher(ctx->child); } static struct crypto_instance *crypto_ctr_alloc(struct rtattr **tb) { struct crypto_instance *inst; struct crypto_alg *alg; |
23e353c8a [CRYPTO] ctr: Add... |
171 172 173 174 175 176 177 178 179 180 |
int err; err = crypto_check_attr_type(tb, CRYPTO_ALG_TYPE_BLKCIPHER); if (err) return ERR_PTR(err); alg = crypto_attr_alg(tb[1], CRYPTO_ALG_TYPE_CIPHER, CRYPTO_ALG_TYPE_MASK); if (IS_ERR(alg)) return ERR_PTR(PTR_ERR(alg)); |
5311f248b [CRYPTO] ctr: Ref... |
181 |
/* Block size must be >= 4 bytes. */ |
23e353c8a [CRYPTO] ctr: Add... |
182 |
err = -EINVAL; |
5311f248b [CRYPTO] ctr: Ref... |
183 |
if (alg->cra_blocksize < 4) |
23e353c8a [CRYPTO] ctr: Add... |
184 |
goto out_put_alg; |
3f8214ea3 [CRYPTO] ctr: Use... |
185 |
/* If this is false we'd fail the alignment of crypto_inc. */ |
5311f248b [CRYPTO] ctr: Ref... |
186 |
if (alg->cra_blocksize % 4) |
3f8214ea3 [CRYPTO] ctr: Use... |
187 |
goto out_put_alg; |
5311f248b [CRYPTO] ctr: Ref... |
188 189 190 |
inst = crypto_alloc_instance("ctr", alg); if (IS_ERR(inst)) goto out; |
23e353c8a [CRYPTO] ctr: Add... |
191 |
|
23e353c8a [CRYPTO] ctr: Add... |
192 193 194 |
inst->alg.cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER; inst->alg.cra_priority = alg->cra_priority; inst->alg.cra_blocksize = 1; |
0971eb0de [CRYPTO] ctr: Fix... |
195 |
inst->alg.cra_alignmask = alg->cra_alignmask | (__alignof__(u32) - 1); |
23e353c8a [CRYPTO] ctr: Add... |
196 |
inst->alg.cra_type = &crypto_blkcipher_type; |
5311f248b [CRYPTO] ctr: Ref... |
197 198 199 |
inst->alg.cra_blkcipher.ivsize = alg->cra_blocksize; inst->alg.cra_blkcipher.min_keysize = alg->cra_cipher.cia_min_keysize; inst->alg.cra_blkcipher.max_keysize = alg->cra_cipher.cia_max_keysize; |
23e353c8a [CRYPTO] ctr: Add... |
200 201 202 203 204 205 206 207 208 |
inst->alg.cra_ctxsize = sizeof(struct crypto_ctr_ctx); inst->alg.cra_init = crypto_ctr_init_tfm; inst->alg.cra_exit = crypto_ctr_exit_tfm; inst->alg.cra_blkcipher.setkey = crypto_ctr_setkey; inst->alg.cra_blkcipher.encrypt = crypto_ctr_crypt; inst->alg.cra_blkcipher.decrypt = crypto_ctr_crypt; |
5311f248b [CRYPTO] ctr: Ref... |
209 |
out: |
23e353c8a [CRYPTO] ctr: Add... |
210 |
crypto_mod_put(alg); |
23e353c8a [CRYPTO] ctr: Add... |
211 |
return inst; |
5311f248b [CRYPTO] ctr: Ref... |
212 213 214 215 |
out_put_alg: inst = ERR_PTR(err); goto out; |
23e353c8a [CRYPTO] ctr: Add... |
216 217 218 219 |
} static void crypto_ctr_free(struct crypto_instance *inst) { |
5311f248b [CRYPTO] ctr: Ref... |
220 |
crypto_drop_spawn(crypto_instance_ctx(inst)); |
23e353c8a [CRYPTO] ctr: Add... |
221 222 223 224 225 226 227 228 229 |
kfree(inst); } static struct crypto_template crypto_ctr_tmpl = { .name = "ctr", .alloc = crypto_ctr_alloc, .free = crypto_ctr_free, .module = THIS_MODULE, }; |
5311f248b [CRYPTO] ctr: Ref... |
230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 |
static int crypto_rfc3686_setkey(struct crypto_tfm *parent, const u8 *key, unsigned int keylen) { struct crypto_rfc3686_ctx *ctx = crypto_tfm_ctx(parent); struct crypto_blkcipher *child = ctx->child; int err; /* the nonce is stored in bytes at end of key */ if (keylen < CTR_RFC3686_NONCE_SIZE) return -EINVAL; memcpy(ctx->nonce, key + (keylen - CTR_RFC3686_NONCE_SIZE), CTR_RFC3686_NONCE_SIZE); keylen -= CTR_RFC3686_NONCE_SIZE; crypto_blkcipher_clear_flags(child, CRYPTO_TFM_REQ_MASK); crypto_blkcipher_set_flags(child, crypto_tfm_get_flags(parent) & CRYPTO_TFM_REQ_MASK); err = crypto_blkcipher_setkey(child, key, keylen); crypto_tfm_set_flags(parent, crypto_blkcipher_get_flags(child) & CRYPTO_TFM_RES_MASK); return err; } static int crypto_rfc3686_crypt(struct blkcipher_desc *desc, struct scatterlist *dst, struct scatterlist *src, unsigned int nbytes) { struct crypto_blkcipher *tfm = desc->tfm; struct crypto_rfc3686_ctx *ctx = crypto_blkcipher_ctx(tfm); struct crypto_blkcipher *child = ctx->child; unsigned long alignmask = crypto_blkcipher_alignmask(tfm); u8 ivblk[CTR_RFC3686_BLOCK_SIZE + alignmask]; u8 *iv = PTR_ALIGN(ivblk + 0, alignmask + 1); u8 *info = desc->info; int err; /* set up counter block */ memcpy(iv, ctx->nonce, CTR_RFC3686_NONCE_SIZE); memcpy(iv + CTR_RFC3686_NONCE_SIZE, info, CTR_RFC3686_IV_SIZE); /* initialize counter portion of counter block */ *(__be32 *)(iv + CTR_RFC3686_NONCE_SIZE + CTR_RFC3686_IV_SIZE) = cpu_to_be32(1); desc->tfm = child; desc->info = iv; err = crypto_blkcipher_encrypt_iv(desc, dst, src, nbytes); desc->tfm = tfm; desc->info = info; return err; } static int crypto_rfc3686_init_tfm(struct crypto_tfm *tfm) { struct crypto_instance *inst = (void *)tfm->__crt_alg; struct crypto_spawn *spawn = crypto_instance_ctx(inst); struct crypto_rfc3686_ctx *ctx = crypto_tfm_ctx(tfm); struct crypto_blkcipher *cipher; cipher = crypto_spawn_blkcipher(spawn); if (IS_ERR(cipher)) return PTR_ERR(cipher); ctx->child = cipher; return 0; } static void crypto_rfc3686_exit_tfm(struct crypto_tfm *tfm) { struct crypto_rfc3686_ctx *ctx = crypto_tfm_ctx(tfm); crypto_free_blkcipher(ctx->child); } static struct crypto_instance *crypto_rfc3686_alloc(struct rtattr **tb) { struct crypto_instance *inst; struct crypto_alg *alg; int err; err = crypto_check_attr_type(tb, CRYPTO_ALG_TYPE_BLKCIPHER); if (err) return ERR_PTR(err); alg = crypto_attr_alg(tb[1], CRYPTO_ALG_TYPE_BLKCIPHER, CRYPTO_ALG_TYPE_MASK); err = PTR_ERR(alg); if (IS_ERR(alg)) return ERR_PTR(err); /* We only support 16-byte blocks. */ err = -EINVAL; if (alg->cra_blkcipher.ivsize != CTR_RFC3686_BLOCK_SIZE) goto out_put_alg; /* Not a stream cipher? */ if (alg->cra_blocksize != 1) goto out_put_alg; inst = crypto_alloc_instance("rfc3686", alg); if (IS_ERR(inst)) goto out; inst->alg.cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER; inst->alg.cra_priority = alg->cra_priority; inst->alg.cra_blocksize = 1; inst->alg.cra_alignmask = alg->cra_alignmask; inst->alg.cra_type = &crypto_blkcipher_type; inst->alg.cra_blkcipher.ivsize = CTR_RFC3686_IV_SIZE; inst->alg.cra_blkcipher.min_keysize = alg->cra_blkcipher.min_keysize + CTR_RFC3686_NONCE_SIZE; inst->alg.cra_blkcipher.max_keysize = alg->cra_blkcipher.max_keysize + CTR_RFC3686_NONCE_SIZE; |
0a270321d [CRYPTO] seqiv: A... |
349 |
inst->alg.cra_blkcipher.geniv = "seqiv"; |
5311f248b [CRYPTO] ctr: Ref... |
350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 |
inst->alg.cra_ctxsize = sizeof(struct crypto_rfc3686_ctx); inst->alg.cra_init = crypto_rfc3686_init_tfm; inst->alg.cra_exit = crypto_rfc3686_exit_tfm; inst->alg.cra_blkcipher.setkey = crypto_rfc3686_setkey; inst->alg.cra_blkcipher.encrypt = crypto_rfc3686_crypt; inst->alg.cra_blkcipher.decrypt = crypto_rfc3686_crypt; out: crypto_mod_put(alg); return inst; out_put_alg: inst = ERR_PTR(err); goto out; } static struct crypto_template crypto_rfc3686_tmpl = { .name = "rfc3686", .alloc = crypto_rfc3686_alloc, .free = crypto_ctr_free, .module = THIS_MODULE, }; |
23e353c8a [CRYPTO] ctr: Add... |
374 375 |
static int __init crypto_ctr_module_init(void) { |
5311f248b [CRYPTO] ctr: Ref... |
376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 |
int err; err = crypto_register_template(&crypto_ctr_tmpl); if (err) goto out; err = crypto_register_template(&crypto_rfc3686_tmpl); if (err) goto out_drop_ctr; out: return err; out_drop_ctr: crypto_unregister_template(&crypto_ctr_tmpl); goto out; |
23e353c8a [CRYPTO] ctr: Add... |
392 393 394 395 |
} static void __exit crypto_ctr_module_exit(void) { |
5311f248b [CRYPTO] ctr: Ref... |
396 |
crypto_unregister_template(&crypto_rfc3686_tmpl); |
23e353c8a [CRYPTO] ctr: Add... |
397 398 399 400 401 402 403 404 |
crypto_unregister_template(&crypto_ctr_tmpl); } module_init(crypto_ctr_module_init); module_exit(crypto_ctr_module_exit); MODULE_LICENSE("GPL"); MODULE_DESCRIPTION("CTR Counter block mode"); |
5311f248b [CRYPTO] ctr: Ref... |
405 |
MODULE_ALIAS("rfc3686"); |