Blame view

crypto/gcm.c 34.5 KB
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
1
2
3
4
5
6
7
8
9
  /*
   * GCM: Galois/Counter Mode.
   *
   * Copyright (c) 2007 Nokia Siemens Networks - Mikko Herranen <mh1@iki.fi>
   *
   * This program is free software; you can redistribute it and/or modify it
   * under the terms of the GNU General Public License version 2 as published
   * by the Free Software Foundation.
   */
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
10
  #include <crypto/gf128mul.h>
dadbc53d0   Herbert Xu   [CRYPTO] gcm: Int...
11
  #include <crypto/internal/aead.h>
1472e5eba   Herbert Xu   [CRYPTO] gcm: Use...
12
  #include <crypto/internal/skcipher.h>
9382d97af   Huang Ying   crypto: gcm - Use...
13
  #include <crypto/internal/hash.h>
42c271c6c   Herbert Xu   [CRYPTO] scatterw...
14
  #include <crypto/scatterwalk.h>
9382d97af   Huang Ying   crypto: gcm - Use...
15
16
  #include <crypto/hash.h>
  #include "internal.h"
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
17
  #include <linux/completion.h>
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
18
19
20
21
22
  #include <linux/err.h>
  #include <linux/init.h>
  #include <linux/kernel.h>
  #include <linux/module.h>
  #include <linux/slab.h>
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
23
  struct gcm_instance_ctx {
1472e5eba   Herbert Xu   [CRYPTO] gcm: Use...
24
  	struct crypto_skcipher_spawn ctr;
9382d97af   Huang Ying   crypto: gcm - Use...
25
  	struct crypto_ahash_spawn ghash;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
26
27
28
29
  };
  
  struct crypto_gcm_ctx {
  	struct crypto_ablkcipher *ctr;
9382d97af   Huang Ying   crypto: gcm - Use...
30
  	struct crypto_ahash *ghash;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
31
  };
dadbc53d0   Herbert Xu   [CRYPTO] gcm: Int...
32
33
34
35
  struct crypto_rfc4106_ctx {
  	struct crypto_aead *child;
  	u8 nonce[4];
  };
73c89c15b   Tobias Brunner   crypto: gcm - Add...
36
37
38
39
40
41
42
43
44
45
46
47
  struct crypto_rfc4543_ctx {
  	struct crypto_aead *child;
  	u8 nonce[4];
  };
  
  struct crypto_rfc4543_req_ctx {
  	u8 auth_tag[16];
  	struct scatterlist cipher[1];
  	struct scatterlist payload[2];
  	struct scatterlist assoc[2];
  	struct aead_request subreq;
  };
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
48
  struct crypto_gcm_ghash_ctx {
9382d97af   Huang Ying   crypto: gcm - Use...
49
50
  	unsigned int cryptlen;
  	struct scatterlist *src;
62c5593ae   Huang Ying   crypto: gcm - fix...
51
  	void (*complete)(struct aead_request *req, int err);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
52
53
54
55
  };
  
  struct crypto_gcm_req_priv_ctx {
  	u8 auth_tag[16];
6160b2899   Herbert Xu   [CRYPTO] gcm: Fix...
56
  	u8 iauth_tag[16];
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
57
58
  	struct scatterlist src[2];
  	struct scatterlist dst[2];
9382d97af   Huang Ying   crypto: gcm - Use...
59
60
61
62
63
  	struct crypto_gcm_ghash_ctx ghash_ctx;
  	union {
  		struct ahash_request ahreq;
  		struct ablkcipher_request abreq;
  	} u;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
64
  };
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
65
66
67
68
  struct crypto_gcm_setkey_result {
  	int err;
  	struct completion completion;
  };
9382d97af   Huang Ying   crypto: gcm - Use...
69
  static void *gcm_zeroes;
2589469d7   Herbert Xu   [CRYPTO] gcm: Fix...
70
71
72
73
74
75
76
  static inline struct crypto_gcm_req_priv_ctx *crypto_gcm_reqctx(
  	struct aead_request *req)
  {
  	unsigned long align = crypto_aead_alignmask(crypto_aead_reqtfm(req));
  
  	return (void *)PTR_ALIGN((u8 *)aead_request_ctx(req), align + 1);
  }
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
77
  static void crypto_gcm_setkey_done(struct crypto_async_request *req, int err)
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
78
  {
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
79
  	struct crypto_gcm_setkey_result *result = req->data;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
80

84c911523   Herbert Xu   [CRYPTO] gcm: Add...
81
82
83
84
85
  	if (err == -EINPROGRESS)
  		return;
  
  	result->err = err;
  	complete(&result->completion);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
86
87
88
89
90
91
  }
  
  static int crypto_gcm_setkey(struct crypto_aead *aead, const u8 *key,
  			     unsigned int keylen)
  {
  	struct crypto_gcm_ctx *ctx = crypto_aead_ctx(aead);
9382d97af   Huang Ying   crypto: gcm - Use...
92
  	struct crypto_ahash *ghash = ctx->ghash;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
93
  	struct crypto_ablkcipher *ctr = ctx->ctr;
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
94
95
96
97
98
99
100
101
102
103
  	struct {
  		be128 hash;
  		u8 iv[8];
  
  		struct crypto_gcm_setkey_result result;
  
  		struct scatterlist sg[1];
  		struct ablkcipher_request req;
  	} *data;
  	int err;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
104
105
106
107
108
109
110
  
  	crypto_ablkcipher_clear_flags(ctr, CRYPTO_TFM_REQ_MASK);
  	crypto_ablkcipher_set_flags(ctr, crypto_aead_get_flags(aead) &
  				   CRYPTO_TFM_REQ_MASK);
  
  	err = crypto_ablkcipher_setkey(ctr, key, keylen);
  	if (err)
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
111
  		return err;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
112
113
114
  
  	crypto_aead_set_flags(aead, crypto_ablkcipher_get_flags(ctr) &
  				       CRYPTO_TFM_RES_MASK);
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
  	data = kzalloc(sizeof(*data) + crypto_ablkcipher_reqsize(ctr),
  		       GFP_KERNEL);
  	if (!data)
  		return -ENOMEM;
  
  	init_completion(&data->result.completion);
  	sg_init_one(data->sg, &data->hash, sizeof(data->hash));
  	ablkcipher_request_set_tfm(&data->req, ctr);
  	ablkcipher_request_set_callback(&data->req, CRYPTO_TFM_REQ_MAY_SLEEP |
  						    CRYPTO_TFM_REQ_MAY_BACKLOG,
  					crypto_gcm_setkey_done,
  					&data->result);
  	ablkcipher_request_set_crypt(&data->req, data->sg, data->sg,
  				     sizeof(data->hash), data->iv);
  
  	err = crypto_ablkcipher_encrypt(&data->req);
  	if (err == -EINPROGRESS || err == -EBUSY) {
  		err = wait_for_completion_interruptible(
  			&data->result.completion);
  		if (!err)
  			err = data->result.err;
  	}
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
137
138
  	if (err)
  		goto out;
9382d97af   Huang Ying   crypto: gcm - Use...
139
140
141
142
143
144
  	crypto_ahash_clear_flags(ghash, CRYPTO_TFM_REQ_MASK);
  	crypto_ahash_set_flags(ghash, crypto_aead_get_flags(aead) &
  			       CRYPTO_TFM_REQ_MASK);
  	err = crypto_ahash_setkey(ghash, (u8 *)&data->hash, sizeof(be128));
  	crypto_aead_set_flags(aead, crypto_ahash_get_flags(ghash) &
  			      CRYPTO_TFM_RES_MASK);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
145

84c911523   Herbert Xu   [CRYPTO] gcm: Add...
146
147
  out:
  	kfree(data);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
148
149
  	return err;
  }
dadbc53d0   Herbert Xu   [CRYPTO] gcm: Int...
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
  static int crypto_gcm_setauthsize(struct crypto_aead *tfm,
  				  unsigned int authsize)
  {
  	switch (authsize) {
  	case 4:
  	case 8:
  	case 12:
  	case 13:
  	case 14:
  	case 15:
  	case 16:
  		break;
  	default:
  		return -EINVAL;
  	}
  
  	return 0;
  }
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
168
169
170
  static void crypto_gcm_init_crypt(struct ablkcipher_request *ablk_req,
  				  struct aead_request *req,
  				  unsigned int cryptlen)
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
171
172
173
  {
  	struct crypto_aead *aead = crypto_aead_reqtfm(req);
  	struct crypto_gcm_ctx *ctx = crypto_aead_ctx(aead);
2589469d7   Herbert Xu   [CRYPTO] gcm: Fix...
174
  	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
  	struct scatterlist *dst;
  	__be32 counter = cpu_to_be32(1);
  
  	memset(pctx->auth_tag, 0, sizeof(pctx->auth_tag));
  	memcpy(req->iv + 12, &counter, 4);
  
  	sg_init_table(pctx->src, 2);
  	sg_set_buf(pctx->src, pctx->auth_tag, sizeof(pctx->auth_tag));
  	scatterwalk_sg_chain(pctx->src, 2, req->src);
  
  	dst = pctx->src;
  	if (req->src != req->dst) {
  		sg_init_table(pctx->dst, 2);
  		sg_set_buf(pctx->dst, pctx->auth_tag, sizeof(pctx->auth_tag));
  		scatterwalk_sg_chain(pctx->dst, 2, req->dst);
  		dst = pctx->dst;
  	}
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
192
193
  
  	ablkcipher_request_set_tfm(ablk_req, ctx->ctr);
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
194
195
196
  	ablkcipher_request_set_crypt(ablk_req, pctx->src, dst,
  				     cryptlen + sizeof(pctx->auth_tag),
  				     req->iv);
9382d97af   Huang Ying   crypto: gcm - Use...
197
198
199
200
201
202
203
204
205
206
  }
  
  static inline unsigned int gcm_remain(unsigned int len)
  {
  	len &= 0xfU;
  	return len ? 16 - len : 0;
  }
  
  static void gcm_hash_len_done(struct crypto_async_request *areq, int err);
  static void gcm_hash_final_done(struct crypto_async_request *areq, int err);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
207

9382d97af   Huang Ying   crypto: gcm - Use...
208
209
210
211
212
213
214
  static int gcm_hash_update(struct aead_request *req,
  			   struct crypto_gcm_req_priv_ctx *pctx,
  			   crypto_completion_t complete,
  			   struct scatterlist *src,
  			   unsigned int len)
  {
  	struct ahash_request *ahreq = &pctx->u.ahreq;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
215

9382d97af   Huang Ying   crypto: gcm - Use...
216
217
218
219
220
  	ahash_request_set_callback(ahreq, aead_request_flags(req),
  				   complete, req);
  	ahash_request_set_crypt(ahreq, src, NULL, len);
  
  	return crypto_ahash_update(ahreq);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
221
  }
9382d97af   Huang Ying   crypto: gcm - Use...
222
223
224
225
  static int gcm_hash_remain(struct aead_request *req,
  			   struct crypto_gcm_req_priv_ctx *pctx,
  			   unsigned int remain,
  			   crypto_completion_t complete)
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
226
  {
9382d97af   Huang Ying   crypto: gcm - Use...
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
  	struct ahash_request *ahreq = &pctx->u.ahreq;
  
  	ahash_request_set_callback(ahreq, aead_request_flags(req),
  				   complete, req);
  	sg_init_one(pctx->src, gcm_zeroes, remain);
  	ahash_request_set_crypt(ahreq, pctx->src, NULL, remain);
  
  	return crypto_ahash_update(ahreq);
  }
  
  static int gcm_hash_len(struct aead_request *req,
  			struct crypto_gcm_req_priv_ctx *pctx)
  {
  	struct ahash_request *ahreq = &pctx->u.ahreq;
  	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;
  	u128 lengths;
  
  	lengths.a = cpu_to_be64(req->assoclen * 8);
  	lengths.b = cpu_to_be64(gctx->cryptlen * 8);
  	memcpy(pctx->iauth_tag, &lengths, 16);
  	sg_init_one(pctx->src, pctx->iauth_tag, 16);
  	ahash_request_set_callback(ahreq, aead_request_flags(req),
  				   gcm_hash_len_done, req);
  	ahash_request_set_crypt(ahreq, pctx->src,
  				NULL, sizeof(lengths));
  
  	return crypto_ahash_update(ahreq);
  }
  
  static int gcm_hash_final(struct aead_request *req,
  			  struct crypto_gcm_req_priv_ctx *pctx)
  {
  	struct ahash_request *ahreq = &pctx->u.ahreq;
  
  	ahash_request_set_callback(ahreq, aead_request_flags(req),
  				   gcm_hash_final_done, req);
  	ahash_request_set_crypt(ahreq, NULL, pctx->iauth_tag, 0);
  
  	return crypto_ahash_final(ahreq);
  }
62c5593ae   Huang Ying   crypto: gcm - fix...
267
  static void __gcm_hash_final_done(struct aead_request *req, int err)
9382d97af   Huang Ying   crypto: gcm - Use...
268
  {
2589469d7   Herbert Xu   [CRYPTO] gcm: Fix...
269
  	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
9382d97af   Huang Ying   crypto: gcm - Use...
270
271
272
273
  	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;
  
  	if (!err)
  		crypto_xor(pctx->auth_tag, pctx->iauth_tag, 16);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
274

62c5593ae   Huang Ying   crypto: gcm - fix...
275
  	gctx->complete(req, err);
9382d97af   Huang Ying   crypto: gcm - Use...
276
  }
62c5593ae   Huang Ying   crypto: gcm - fix...
277
  static void gcm_hash_final_done(struct crypto_async_request *areq, int err)
9382d97af   Huang Ying   crypto: gcm - Use...
278
279
  {
  	struct aead_request *req = areq->data;
62c5593ae   Huang Ying   crypto: gcm - fix...
280
281
282
283
284
285
  
  	__gcm_hash_final_done(req, err);
  }
  
  static void __gcm_hash_len_done(struct aead_request *req, int err)
  {
9382d97af   Huang Ying   crypto: gcm - Use...
286
287
288
289
290
291
292
  	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
  
  	if (!err) {
  		err = gcm_hash_final(req, pctx);
  		if (err == -EINPROGRESS || err == -EBUSY)
  			return;
  	}
62c5593ae   Huang Ying   crypto: gcm - fix...
293
  	__gcm_hash_final_done(req, err);
9382d97af   Huang Ying   crypto: gcm - Use...
294
  }
62c5593ae   Huang Ying   crypto: gcm - fix...
295
  static void gcm_hash_len_done(struct crypto_async_request *areq, int err)
9382d97af   Huang Ying   crypto: gcm - Use...
296
297
  {
  	struct aead_request *req = areq->data;
62c5593ae   Huang Ying   crypto: gcm - fix...
298
299
300
301
302
303
  
  	__gcm_hash_len_done(req, err);
  }
  
  static void __gcm_hash_crypt_remain_done(struct aead_request *req, int err)
  {
9382d97af   Huang Ying   crypto: gcm - Use...
304
305
306
307
308
309
310
  	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
  
  	if (!err) {
  		err = gcm_hash_len(req, pctx);
  		if (err == -EINPROGRESS || err == -EBUSY)
  			return;
  	}
62c5593ae   Huang Ying   crypto: gcm - fix...
311
  	__gcm_hash_len_done(req, err);
9382d97af   Huang Ying   crypto: gcm - Use...
312
  }
62c5593ae   Huang Ying   crypto: gcm - fix...
313
314
  static void gcm_hash_crypt_remain_done(struct crypto_async_request *areq,
  				       int err)
9382d97af   Huang Ying   crypto: gcm - Use...
315
316
  {
  	struct aead_request *req = areq->data;
62c5593ae   Huang Ying   crypto: gcm - fix...
317
318
319
320
321
322
  
  	__gcm_hash_crypt_remain_done(req, err);
  }
  
  static void __gcm_hash_crypt_done(struct aead_request *req, int err)
  {
9382d97af   Huang Ying   crypto: gcm - Use...
323
324
325
326
327
328
329
330
331
332
333
334
  	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
  	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;
  	unsigned int remain;
  
  	if (!err) {
  		remain = gcm_remain(gctx->cryptlen);
  		BUG_ON(!remain);
  		err = gcm_hash_remain(req, pctx, remain,
  				      gcm_hash_crypt_remain_done);
  		if (err == -EINPROGRESS || err == -EBUSY)
  			return;
  	}
62c5593ae   Huang Ying   crypto: gcm - fix...
335
  	__gcm_hash_crypt_remain_done(req, err);
9382d97af   Huang Ying   crypto: gcm - Use...
336
  }
62c5593ae   Huang Ying   crypto: gcm - fix...
337
  static void gcm_hash_crypt_done(struct crypto_async_request *areq, int err)
9382d97af   Huang Ying   crypto: gcm - Use...
338
339
  {
  	struct aead_request *req = areq->data;
62c5593ae   Huang Ying   crypto: gcm - fix...
340
341
342
343
344
345
  
  	__gcm_hash_crypt_done(req, err);
  }
  
  static void __gcm_hash_assoc_remain_done(struct aead_request *req, int err)
  {
9382d97af   Huang Ying   crypto: gcm - Use...
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
  	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
  	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;
  	crypto_completion_t complete;
  	unsigned int remain = 0;
  
  	if (!err && gctx->cryptlen) {
  		remain = gcm_remain(gctx->cryptlen);
  		complete = remain ? gcm_hash_crypt_done :
  			gcm_hash_crypt_remain_done;
  		err = gcm_hash_update(req, pctx, complete,
  				      gctx->src, gctx->cryptlen);
  		if (err == -EINPROGRESS || err == -EBUSY)
  			return;
  	}
  
  	if (remain)
62c5593ae   Huang Ying   crypto: gcm - fix...
362
  		__gcm_hash_crypt_done(req, err);
9382d97af   Huang Ying   crypto: gcm - Use...
363
  	else
62c5593ae   Huang Ying   crypto: gcm - fix...
364
  		__gcm_hash_crypt_remain_done(req, err);
9382d97af   Huang Ying   crypto: gcm - Use...
365
  }
62c5593ae   Huang Ying   crypto: gcm - fix...
366
367
  static void gcm_hash_assoc_remain_done(struct crypto_async_request *areq,
  				       int err)
9382d97af   Huang Ying   crypto: gcm - Use...
368
369
  {
  	struct aead_request *req = areq->data;
62c5593ae   Huang Ying   crypto: gcm - fix...
370
371
372
373
374
375
  
  	__gcm_hash_assoc_remain_done(req, err);
  }
  
  static void __gcm_hash_assoc_done(struct aead_request *req, int err)
  {
9382d97af   Huang Ying   crypto: gcm - Use...
376
377
378
379
380
381
382
383
384
385
386
  	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
  	unsigned int remain;
  
  	if (!err) {
  		remain = gcm_remain(req->assoclen);
  		BUG_ON(!remain);
  		err = gcm_hash_remain(req, pctx, remain,
  				      gcm_hash_assoc_remain_done);
  		if (err == -EINPROGRESS || err == -EBUSY)
  			return;
  	}
62c5593ae   Huang Ying   crypto: gcm - fix...
387
  	__gcm_hash_assoc_remain_done(req, err);
9382d97af   Huang Ying   crypto: gcm - Use...
388
  }
62c5593ae   Huang Ying   crypto: gcm - fix...
389
  static void gcm_hash_assoc_done(struct crypto_async_request *areq, int err)
9382d97af   Huang Ying   crypto: gcm - Use...
390
391
  {
  	struct aead_request *req = areq->data;
62c5593ae   Huang Ying   crypto: gcm - fix...
392
393
394
395
396
397
  
  	__gcm_hash_assoc_done(req, err);
  }
  
  static void __gcm_hash_init_done(struct aead_request *req, int err)
  {
9382d97af   Huang Ying   crypto: gcm - Use...
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
  	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
  	crypto_completion_t complete;
  	unsigned int remain = 0;
  
  	if (!err && req->assoclen) {
  		remain = gcm_remain(req->assoclen);
  		complete = remain ? gcm_hash_assoc_done :
  			gcm_hash_assoc_remain_done;
  		err = gcm_hash_update(req, pctx, complete,
  				      req->assoc, req->assoclen);
  		if (err == -EINPROGRESS || err == -EBUSY)
  			return;
  	}
  
  	if (remain)
62c5593ae   Huang Ying   crypto: gcm - fix...
413
  		__gcm_hash_assoc_done(req, err);
9382d97af   Huang Ying   crypto: gcm - Use...
414
  	else
62c5593ae   Huang Ying   crypto: gcm - fix...
415
416
417
418
419
420
421
422
  		__gcm_hash_assoc_remain_done(req, err);
  }
  
  static void gcm_hash_init_done(struct crypto_async_request *areq, int err)
  {
  	struct aead_request *req = areq->data;
  
  	__gcm_hash_init_done(req, err);
9382d97af   Huang Ying   crypto: gcm - Use...
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
  }
  
  static int gcm_hash(struct aead_request *req,
  		    struct crypto_gcm_req_priv_ctx *pctx)
  {
  	struct ahash_request *ahreq = &pctx->u.ahreq;
  	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;
  	struct crypto_gcm_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
  	unsigned int remain;
  	crypto_completion_t complete;
  	int err;
  
  	ahash_request_set_tfm(ahreq, ctx->ghash);
  
  	ahash_request_set_callback(ahreq, aead_request_flags(req),
  				   gcm_hash_init_done, req);
  	err = crypto_ahash_init(ahreq);
  	if (err)
  		return err;
  	remain = gcm_remain(req->assoclen);
  	complete = remain ? gcm_hash_assoc_done : gcm_hash_assoc_remain_done;
  	err = gcm_hash_update(req, pctx, complete, req->assoc, req->assoclen);
  	if (err)
  		return err;
  	if (remain) {
  		err = gcm_hash_remain(req, pctx, remain,
  				      gcm_hash_assoc_remain_done);
  		if (err)
  			return err;
  	}
  	remain = gcm_remain(gctx->cryptlen);
  	complete = remain ? gcm_hash_crypt_done : gcm_hash_crypt_remain_done;
  	err = gcm_hash_update(req, pctx, complete, gctx->src, gctx->cryptlen);
  	if (err)
  		return err;
  	if (remain) {
  		err = gcm_hash_remain(req, pctx, remain,
  				      gcm_hash_crypt_remain_done);
  		if (err)
  			return err;
  	}
  	err = gcm_hash_len(req, pctx);
  	if (err)
  		return err;
  	err = gcm_hash_final(req, pctx);
  	if (err)
  		return err;
  
  	return 0;
  }
  
  static void gcm_enc_copy_hash(struct aead_request *req,
  			      struct crypto_gcm_req_priv_ctx *pctx)
  {
  	struct crypto_aead *aead = crypto_aead_reqtfm(req);
  	u8 *auth_tag = pctx->auth_tag;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
479

6160b2899   Herbert Xu   [CRYPTO] gcm: Fix...
480
481
  	scatterwalk_map_and_copy(auth_tag, req->dst, req->cryptlen,
  				 crypto_aead_authsize(aead), 1);
6160b2899   Herbert Xu   [CRYPTO] gcm: Fix...
482
  }
62c5593ae   Huang Ying   crypto: gcm - fix...
483
  static void gcm_enc_hash_done(struct aead_request *req, int err)
6160b2899   Herbert Xu   [CRYPTO] gcm: Fix...
484
  {
9382d97af   Huang Ying   crypto: gcm - Use...
485
  	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
6160b2899   Herbert Xu   [CRYPTO] gcm: Fix...
486
487
  
  	if (!err)
9382d97af   Huang Ying   crypto: gcm - Use...
488
  		gcm_enc_copy_hash(req, pctx);
6160b2899   Herbert Xu   [CRYPTO] gcm: Fix...
489

28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
490
491
  	aead_request_complete(req, err);
  }
62c5593ae   Huang Ying   crypto: gcm - fix...
492
  static void gcm_encrypt_done(struct crypto_async_request *areq, int err)
9382d97af   Huang Ying   crypto: gcm - Use...
493
494
495
496
497
498
499
500
  {
  	struct aead_request *req = areq->data;
  	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
  
  	if (!err) {
  		err = gcm_hash(req, pctx);
  		if (err == -EINPROGRESS || err == -EBUSY)
  			return;
62c5593ae   Huang Ying   crypto: gcm - fix...
501
502
503
504
  		else if (!err) {
  			crypto_xor(pctx->auth_tag, pctx->iauth_tag, 16);
  			gcm_enc_copy_hash(req, pctx);
  		}
9382d97af   Huang Ying   crypto: gcm - Use...
505
  	}
62c5593ae   Huang Ying   crypto: gcm - fix...
506
  	aead_request_complete(req, err);
9382d97af   Huang Ying   crypto: gcm - Use...
507
  }
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
508
509
  static int crypto_gcm_encrypt(struct aead_request *req)
  {
2589469d7   Herbert Xu   [CRYPTO] gcm: Fix...
510
  	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
9382d97af   Huang Ying   crypto: gcm - Use...
511
512
  	struct ablkcipher_request *abreq = &pctx->u.abreq;
  	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
513
514
515
516
  	int err;
  
  	crypto_gcm_init_crypt(abreq, req, req->cryptlen);
  	ablkcipher_request_set_callback(abreq, aead_request_flags(req),
9382d97af   Huang Ying   crypto: gcm - Use...
517
518
519
520
521
  					gcm_encrypt_done, req);
  
  	gctx->src = req->dst;
  	gctx->cryptlen = req->cryptlen;
  	gctx->complete = gcm_enc_hash_done;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
522

84c911523   Herbert Xu   [CRYPTO] gcm: Add...
523
  	err = crypto_ablkcipher_encrypt(abreq);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
524
525
  	if (err)
  		return err;
9382d97af   Huang Ying   crypto: gcm - Use...
526
527
528
529
530
531
532
533
  	err = gcm_hash(req, pctx);
  	if (err)
  		return err;
  
  	crypto_xor(pctx->auth_tag, pctx->iauth_tag, 16);
  	gcm_enc_copy_hash(req, pctx);
  
  	return 0;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
534
  }
9382d97af   Huang Ying   crypto: gcm - Use...
535
536
  static int crypto_gcm_verify(struct aead_request *req,
  			     struct crypto_gcm_req_priv_ctx *pctx)
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
537
538
  {
  	struct crypto_aead *aead = crypto_aead_reqtfm(req);
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
539
540
541
542
  	u8 *auth_tag = pctx->auth_tag;
  	u8 *iauth_tag = pctx->iauth_tag;
  	unsigned int authsize = crypto_aead_authsize(aead);
  	unsigned int cryptlen = req->cryptlen - authsize;
9382d97af   Huang Ying   crypto: gcm - Use...
543
  	crypto_xor(auth_tag, iauth_tag, 16);
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
544
545
546
  	scatterwalk_map_and_copy(iauth_tag, req->src, cryptlen, authsize, 0);
  	return memcmp(iauth_tag, auth_tag, authsize) ? -EBADMSG : 0;
  }
9382d97af   Huang Ying   crypto: gcm - Use...
547
  static void gcm_decrypt_done(struct crypto_async_request *areq, int err)
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
548
  {
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
549
  	struct aead_request *req = areq->data;
9382d97af   Huang Ying   crypto: gcm - Use...
550
  	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
551
552
  
  	if (!err)
9382d97af   Huang Ying   crypto: gcm - Use...
553
  		err = crypto_gcm_verify(req, pctx);
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
554
555
  
  	aead_request_complete(req, err);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
556
  }
62c5593ae   Huang Ying   crypto: gcm - fix...
557
  static void gcm_dec_hash_done(struct aead_request *req, int err)
9382d97af   Huang Ying   crypto: gcm - Use...
558
  {
9382d97af   Huang Ying   crypto: gcm - Use...
559
560
561
562
563
564
565
566
567
568
569
  	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
  	struct ablkcipher_request *abreq = &pctx->u.abreq;
  	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;
  
  	if (!err) {
  		ablkcipher_request_set_callback(abreq, aead_request_flags(req),
  						gcm_decrypt_done, req);
  		crypto_gcm_init_crypt(abreq, req, gctx->cryptlen);
  		err = crypto_ablkcipher_decrypt(abreq);
  		if (err == -EINPROGRESS || err == -EBUSY)
  			return;
62c5593ae   Huang Ying   crypto: gcm - fix...
570
571
  		else if (!err)
  			err = crypto_gcm_verify(req, pctx);
9382d97af   Huang Ying   crypto: gcm - Use...
572
  	}
62c5593ae   Huang Ying   crypto: gcm - fix...
573
  	aead_request_complete(req, err);
9382d97af   Huang Ying   crypto: gcm - Use...
574
  }
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
575
576
  static int crypto_gcm_decrypt(struct aead_request *req)
  {
6160b2899   Herbert Xu   [CRYPTO] gcm: Fix...
577
  	struct crypto_aead *aead = crypto_aead_reqtfm(req);
2589469d7   Herbert Xu   [CRYPTO] gcm: Fix...
578
  	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
9382d97af   Huang Ying   crypto: gcm - Use...
579
580
  	struct ablkcipher_request *abreq = &pctx->u.abreq;
  	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;
6160b2899   Herbert Xu   [CRYPTO] gcm: Fix...
581
  	unsigned int authsize = crypto_aead_authsize(aead);
9382d97af   Huang Ying   crypto: gcm - Use...
582
  	unsigned int cryptlen = req->cryptlen;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
583
  	int err;
6160b2899   Herbert Xu   [CRYPTO] gcm: Fix...
584
  	if (cryptlen < authsize)
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
585
  		return -EINVAL;
6160b2899   Herbert Xu   [CRYPTO] gcm: Fix...
586
  	cryptlen -= authsize;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
587

9382d97af   Huang Ying   crypto: gcm - Use...
588
589
590
  	gctx->src = req->src;
  	gctx->cryptlen = cryptlen;
  	gctx->complete = gcm_dec_hash_done;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
591

9382d97af   Huang Ying   crypto: gcm - Use...
592
593
594
  	err = gcm_hash(req, pctx);
  	if (err)
  		return err;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
595

9382d97af   Huang Ying   crypto: gcm - Use...
596
597
598
  	ablkcipher_request_set_callback(abreq, aead_request_flags(req),
  					gcm_decrypt_done, req);
  	crypto_gcm_init_crypt(abreq, req, cryptlen);
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
599
600
601
  	err = crypto_ablkcipher_decrypt(abreq);
  	if (err)
  		return err;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
602

9382d97af   Huang Ying   crypto: gcm - Use...
603
  	return crypto_gcm_verify(req, pctx);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
604
605
606
607
608
609
610
611
  }
  
  static int crypto_gcm_init_tfm(struct crypto_tfm *tfm)
  {
  	struct crypto_instance *inst = (void *)tfm->__crt_alg;
  	struct gcm_instance_ctx *ictx = crypto_instance_ctx(inst);
  	struct crypto_gcm_ctx *ctx = crypto_tfm_ctx(tfm);
  	struct crypto_ablkcipher *ctr;
9382d97af   Huang Ying   crypto: gcm - Use...
612
  	struct crypto_ahash *ghash;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
613
614
  	unsigned long align;
  	int err;
9382d97af   Huang Ying   crypto: gcm - Use...
615
616
617
  	ghash = crypto_spawn_ahash(&ictx->ghash);
  	if (IS_ERR(ghash))
  		return PTR_ERR(ghash);
1472e5eba   Herbert Xu   [CRYPTO] gcm: Use...
618
  	ctr = crypto_spawn_skcipher(&ictx->ctr);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
619
620
  	err = PTR_ERR(ctr);
  	if (IS_ERR(ctr))
9382d97af   Huang Ying   crypto: gcm - Use...
621
  		goto err_free_hash;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
622
623
  
  	ctx->ctr = ctr;
9382d97af   Huang Ying   crypto: gcm - Use...
624
  	ctx->ghash = ghash;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
625

2589469d7   Herbert Xu   [CRYPTO] gcm: Fix...
626
  	align = crypto_tfm_alg_alignmask(tfm);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
627
  	align &= ~(crypto_tfm_ctx_alignment() - 1);
7f6813786   Herbert Xu   [CRYPTO] gcm: Put...
628
  	tfm->crt_aead.reqsize = align +
9382d97af   Huang Ying   crypto: gcm - Use...
629
630
631
632
633
  		offsetof(struct crypto_gcm_req_priv_ctx, u) +
  		max(sizeof(struct ablkcipher_request) +
  		    crypto_ablkcipher_reqsize(ctr),
  		    sizeof(struct ahash_request) +
  		    crypto_ahash_reqsize(ghash));
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
634
635
  
  	return 0;
9382d97af   Huang Ying   crypto: gcm - Use...
636
637
638
639
  
  err_free_hash:
  	crypto_free_ahash(ghash);
  	return err;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
640
641
642
643
644
  }
  
  static void crypto_gcm_exit_tfm(struct crypto_tfm *tfm)
  {
  	struct crypto_gcm_ctx *ctx = crypto_tfm_ctx(tfm);
9382d97af   Huang Ying   crypto: gcm - Use...
645
  	crypto_free_ahash(ctx->ghash);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
646
647
  	crypto_free_ablkcipher(ctx->ctr);
  }
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
648
649
  static struct crypto_instance *crypto_gcm_alloc_common(struct rtattr **tb,
  						       const char *full_name,
9382d97af   Huang Ying   crypto: gcm - Use...
650
651
  						       const char *ctr_name,
  						       const char *ghash_name)
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
652
  {
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
653
  	struct crypto_attr_type *algt;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
654
655
  	struct crypto_instance *inst;
  	struct crypto_alg *ctr;
9382d97af   Huang Ying   crypto: gcm - Use...
656
657
  	struct crypto_alg *ghash_alg;
  	struct ahash_alg *ghash_ahash_alg;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
658
659
  	struct gcm_instance_ctx *ctx;
  	int err;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
660

d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
661
662
663
  	algt = crypto_get_attr_type(tb);
  	err = PTR_ERR(algt);
  	if (IS_ERR(algt))
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
664
  		return ERR_PTR(err);
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
665
666
  	if ((algt->type ^ CRYPTO_ALG_TYPE_AEAD) & algt->mask)
  		return ERR_PTR(-EINVAL);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
667

9382d97af   Huang Ying   crypto: gcm - Use...
668
669
670
671
672
673
674
675
  	ghash_alg = crypto_find_alg(ghash_name, &crypto_ahash_type,
  				    CRYPTO_ALG_TYPE_HASH,
  				    CRYPTO_ALG_TYPE_AHASH_MASK);
  	err = PTR_ERR(ghash_alg);
  	if (IS_ERR(ghash_alg))
  		return ERR_PTR(err);
  
  	err = -ENOMEM;
1472e5eba   Herbert Xu   [CRYPTO] gcm: Use...
676
677
  	inst = kzalloc(sizeof(*inst) + sizeof(*ctx), GFP_KERNEL);
  	if (!inst)
9382d97af   Huang Ying   crypto: gcm - Use...
678
  		goto out_put_ghash;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
679

1472e5eba   Herbert Xu   [CRYPTO] gcm: Use...
680
  	ctx = crypto_instance_ctx(inst);
9382d97af   Huang Ying   crypto: gcm - Use...
681
682
683
684
685
  	ghash_ahash_alg = container_of(ghash_alg, struct ahash_alg, halg.base);
  	err = crypto_init_ahash_spawn(&ctx->ghash, &ghash_ahash_alg->halg,
  				      inst);
  	if (err)
  		goto err_free_inst;
1472e5eba   Herbert Xu   [CRYPTO] gcm: Use...
686
687
688
689
690
  	crypto_set_skcipher_spawn(&ctx->ctr, inst);
  	err = crypto_grab_skcipher(&ctx->ctr, ctr_name, 0,
  				   crypto_requires_sync(algt->type,
  							algt->mask));
  	if (err)
9382d97af   Huang Ying   crypto: gcm - Use...
691
  		goto err_drop_ghash;
1472e5eba   Herbert Xu   [CRYPTO] gcm: Use...
692
693
  
  	ctr = crypto_skcipher_spawn_alg(&ctx->ctr);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
694

d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
695
  	/* We only support 16-byte blocks. */
1472e5eba   Herbert Xu   [CRYPTO] gcm: Use...
696
  	if (ctr->cra_ablkcipher.ivsize != 16)
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
697
698
699
700
701
  		goto out_put_ctr;
  
  	/* Not a stream cipher? */
  	err = -EINVAL;
  	if (ctr->cra_blocksize != 1)
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
702
  		goto out_put_ctr;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
703
  	err = -ENAMETOOLONG;
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
704
  	if (snprintf(inst->alg.cra_driver_name, CRYPTO_MAX_ALG_NAME,
9382d97af   Huang Ying   crypto: gcm - Use...
705
706
  		     "gcm_base(%s,%s)", ctr->cra_driver_name,
  		     ghash_alg->cra_driver_name) >=
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
707
  	    CRYPTO_MAX_ALG_NAME)
1472e5eba   Herbert Xu   [CRYPTO] gcm: Use...
708
  		goto out_put_ctr;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
709

d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
710
  	memcpy(inst->alg.cra_name, full_name, CRYPTO_MAX_ALG_NAME);
1472e5eba   Herbert Xu   [CRYPTO] gcm: Use...
711
712
  	inst->alg.cra_flags = CRYPTO_ALG_TYPE_AEAD;
  	inst->alg.cra_flags |= ctr->cra_flags & CRYPTO_ALG_ASYNC;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
713
  	inst->alg.cra_priority = ctr->cra_priority;
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
714
  	inst->alg.cra_blocksize = 1;
2589469d7   Herbert Xu   [CRYPTO] gcm: Fix...
715
  	inst->alg.cra_alignmask = ctr->cra_alignmask | (__alignof__(u64) - 1);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
716
  	inst->alg.cra_type = &crypto_aead_type;
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
717
  	inst->alg.cra_aead.ivsize = 16;
7ba683a6d   Herbert Xu   [CRYPTO] aead: Ma...
718
  	inst->alg.cra_aead.maxauthsize = 16;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
719
720
721
722
  	inst->alg.cra_ctxsize = sizeof(struct crypto_gcm_ctx);
  	inst->alg.cra_init = crypto_gcm_init_tfm;
  	inst->alg.cra_exit = crypto_gcm_exit_tfm;
  	inst->alg.cra_aead.setkey = crypto_gcm_setkey;
dadbc53d0   Herbert Xu   [CRYPTO] gcm: Int...
723
  	inst->alg.cra_aead.setauthsize = crypto_gcm_setauthsize;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
724
725
726
727
  	inst->alg.cra_aead.encrypt = crypto_gcm_encrypt;
  	inst->alg.cra_aead.decrypt = crypto_gcm_decrypt;
  
  out:
9382d97af   Huang Ying   crypto: gcm - Use...
728
  	crypto_mod_put(ghash_alg);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
729
  	return inst;
1472e5eba   Herbert Xu   [CRYPTO] gcm: Use...
730
731
732
  
  out_put_ctr:
  	crypto_drop_skcipher(&ctx->ctr);
9382d97af   Huang Ying   crypto: gcm - Use...
733
734
  err_drop_ghash:
  	crypto_drop_ahash(&ctx->ghash);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
735
736
  err_free_inst:
  	kfree(inst);
9382d97af   Huang Ying   crypto: gcm - Use...
737
  out_put_ghash:
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
738
739
740
  	inst = ERR_PTR(err);
  	goto out;
  }
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
  static struct crypto_instance *crypto_gcm_alloc(struct rtattr **tb)
  {
  	int err;
  	const char *cipher_name;
  	char ctr_name[CRYPTO_MAX_ALG_NAME];
  	char full_name[CRYPTO_MAX_ALG_NAME];
  
  	cipher_name = crypto_attr_alg_name(tb[1]);
  	err = PTR_ERR(cipher_name);
  	if (IS_ERR(cipher_name))
  		return ERR_PTR(err);
  
  	if (snprintf(ctr_name, CRYPTO_MAX_ALG_NAME, "ctr(%s)", cipher_name) >=
  	    CRYPTO_MAX_ALG_NAME)
  		return ERR_PTR(-ENAMETOOLONG);
  
  	if (snprintf(full_name, CRYPTO_MAX_ALG_NAME, "gcm(%s)", cipher_name) >=
  	    CRYPTO_MAX_ALG_NAME)
  		return ERR_PTR(-ENAMETOOLONG);
9382d97af   Huang Ying   crypto: gcm - Use...
760
  	return crypto_gcm_alloc_common(tb, full_name, ctr_name, "ghash");
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
761
  }
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
762
763
764
  static void crypto_gcm_free(struct crypto_instance *inst)
  {
  	struct gcm_instance_ctx *ctx = crypto_instance_ctx(inst);
1472e5eba   Herbert Xu   [CRYPTO] gcm: Use...
765
  	crypto_drop_skcipher(&ctx->ctr);
9382d97af   Huang Ying   crypto: gcm - Use...
766
  	crypto_drop_ahash(&ctx->ghash);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
767
768
769
770
771
772
773
774
775
  	kfree(inst);
  }
  
  static struct crypto_template crypto_gcm_tmpl = {
  	.name = "gcm",
  	.alloc = crypto_gcm_alloc,
  	.free = crypto_gcm_free,
  	.module = THIS_MODULE,
  };
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
776
777
778
779
  static struct crypto_instance *crypto_gcm_base_alloc(struct rtattr **tb)
  {
  	int err;
  	const char *ctr_name;
9382d97af   Huang Ying   crypto: gcm - Use...
780
  	const char *ghash_name;
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
781
782
783
784
785
786
  	char full_name[CRYPTO_MAX_ALG_NAME];
  
  	ctr_name = crypto_attr_alg_name(tb[1]);
  	err = PTR_ERR(ctr_name);
  	if (IS_ERR(ctr_name))
  		return ERR_PTR(err);
9382d97af   Huang Ying   crypto: gcm - Use...
787
788
789
790
791
792
793
  	ghash_name = crypto_attr_alg_name(tb[2]);
  	err = PTR_ERR(ghash_name);
  	if (IS_ERR(ghash_name))
  		return ERR_PTR(err);
  
  	if (snprintf(full_name, CRYPTO_MAX_ALG_NAME, "gcm_base(%s,%s)",
  		     ctr_name, ghash_name) >= CRYPTO_MAX_ALG_NAME)
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
794
  		return ERR_PTR(-ENAMETOOLONG);
9382d97af   Huang Ying   crypto: gcm - Use...
795
  	return crypto_gcm_alloc_common(tb, full_name, ctr_name, ghash_name);
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
796
797
798
799
800
801
802
803
  }
  
  static struct crypto_template crypto_gcm_base_tmpl = {
  	.name = "gcm_base",
  	.alloc = crypto_gcm_base_alloc,
  	.free = crypto_gcm_free,
  	.module = THIS_MODULE,
  };
dadbc53d0   Herbert Xu   [CRYPTO] gcm: Int...
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
  static int crypto_rfc4106_setkey(struct crypto_aead *parent, const u8 *key,
  				 unsigned int keylen)
  {
  	struct crypto_rfc4106_ctx *ctx = crypto_aead_ctx(parent);
  	struct crypto_aead *child = ctx->child;
  	int err;
  
  	if (keylen < 4)
  		return -EINVAL;
  
  	keylen -= 4;
  	memcpy(ctx->nonce, key + keylen, 4);
  
  	crypto_aead_clear_flags(child, CRYPTO_TFM_REQ_MASK);
  	crypto_aead_set_flags(child, crypto_aead_get_flags(parent) &
  				     CRYPTO_TFM_REQ_MASK);
  	err = crypto_aead_setkey(child, key, keylen);
  	crypto_aead_set_flags(parent, crypto_aead_get_flags(child) &
  				      CRYPTO_TFM_RES_MASK);
  
  	return err;
  }
  
  static int crypto_rfc4106_setauthsize(struct crypto_aead *parent,
  				      unsigned int authsize)
  {
  	struct crypto_rfc4106_ctx *ctx = crypto_aead_ctx(parent);
  
  	switch (authsize) {
  	case 8:
  	case 12:
  	case 16:
  		break;
  	default:
  		return -EINVAL;
  	}
  
  	return crypto_aead_setauthsize(ctx->child, authsize);
  }
  
  static struct aead_request *crypto_rfc4106_crypt(struct aead_request *req)
  {
  	struct aead_request *subreq = aead_request_ctx(req);
  	struct crypto_aead *aead = crypto_aead_reqtfm(req);
  	struct crypto_rfc4106_ctx *ctx = crypto_aead_ctx(aead);
  	struct crypto_aead *child = ctx->child;
  	u8 *iv = PTR_ALIGN((u8 *)(subreq + 1) + crypto_aead_reqsize(child),
  			   crypto_aead_alignmask(child) + 1);
  
  	memcpy(iv, ctx->nonce, 4);
  	memcpy(iv + 4, req->iv, 8);
  
  	aead_request_set_tfm(subreq, child);
  	aead_request_set_callback(subreq, req->base.flags, req->base.complete,
  				  req->base.data);
  	aead_request_set_crypt(subreq, req->src, req->dst, req->cryptlen, iv);
  	aead_request_set_assoc(subreq, req->assoc, req->assoclen);
  
  	return subreq;
  }
  
  static int crypto_rfc4106_encrypt(struct aead_request *req)
  {
  	req = crypto_rfc4106_crypt(req);
  
  	return crypto_aead_encrypt(req);
  }
  
  static int crypto_rfc4106_decrypt(struct aead_request *req)
  {
  	req = crypto_rfc4106_crypt(req);
  
  	return crypto_aead_decrypt(req);
  }
  
  static int crypto_rfc4106_init_tfm(struct crypto_tfm *tfm)
  {
  	struct crypto_instance *inst = (void *)tfm->__crt_alg;
  	struct crypto_aead_spawn *spawn = crypto_instance_ctx(inst);
  	struct crypto_rfc4106_ctx *ctx = crypto_tfm_ctx(tfm);
  	struct crypto_aead *aead;
  	unsigned long align;
  
  	aead = crypto_spawn_aead(spawn);
  	if (IS_ERR(aead))
  		return PTR_ERR(aead);
  
  	ctx->child = aead;
  
  	align = crypto_aead_alignmask(aead);
  	align &= ~(crypto_tfm_ctx_alignment() - 1);
  	tfm->crt_aead.reqsize = sizeof(struct aead_request) +
  				ALIGN(crypto_aead_reqsize(aead),
  				      crypto_tfm_ctx_alignment()) +
  				align + 16;
  
  	return 0;
  }
  
  static void crypto_rfc4106_exit_tfm(struct crypto_tfm *tfm)
  {
  	struct crypto_rfc4106_ctx *ctx = crypto_tfm_ctx(tfm);
  
  	crypto_free_aead(ctx->child);
  }
  
  static struct crypto_instance *crypto_rfc4106_alloc(struct rtattr **tb)
  {
  	struct crypto_attr_type *algt;
  	struct crypto_instance *inst;
  	struct crypto_aead_spawn *spawn;
  	struct crypto_alg *alg;
  	const char *ccm_name;
  	int err;
  
  	algt = crypto_get_attr_type(tb);
  	err = PTR_ERR(algt);
  	if (IS_ERR(algt))
  		return ERR_PTR(err);
  
  	if ((algt->type ^ CRYPTO_ALG_TYPE_AEAD) & algt->mask)
  		return ERR_PTR(-EINVAL);
  
  	ccm_name = crypto_attr_alg_name(tb[1]);
  	err = PTR_ERR(ccm_name);
  	if (IS_ERR(ccm_name))
  		return ERR_PTR(err);
  
  	inst = kzalloc(sizeof(*inst) + sizeof(*spawn), GFP_KERNEL);
  	if (!inst)
  		return ERR_PTR(-ENOMEM);
  
  	spawn = crypto_instance_ctx(inst);
  	crypto_set_aead_spawn(spawn, inst);
  	err = crypto_grab_aead(spawn, ccm_name, 0,
  			       crypto_requires_sync(algt->type, algt->mask));
  	if (err)
  		goto out_free_inst;
  
  	alg = crypto_aead_spawn_alg(spawn);
  
  	err = -EINVAL;
  
  	/* We only support 16-byte blocks. */
  	if (alg->cra_aead.ivsize != 16)
  		goto out_drop_alg;
  
  	/* Not a stream cipher? */
  	if (alg->cra_blocksize != 1)
  		goto out_drop_alg;
  
  	err = -ENAMETOOLONG;
  	if (snprintf(inst->alg.cra_name, CRYPTO_MAX_ALG_NAME,
  		     "rfc4106(%s)", alg->cra_name) >= CRYPTO_MAX_ALG_NAME ||
  	    snprintf(inst->alg.cra_driver_name, CRYPTO_MAX_ALG_NAME,
  		     "rfc4106(%s)", alg->cra_driver_name) >=
  	    CRYPTO_MAX_ALG_NAME)
  		goto out_drop_alg;
  
  	inst->alg.cra_flags = CRYPTO_ALG_TYPE_AEAD;
  	inst->alg.cra_flags |= alg->cra_flags & CRYPTO_ALG_ASYNC;
  	inst->alg.cra_priority = alg->cra_priority;
  	inst->alg.cra_blocksize = 1;
  	inst->alg.cra_alignmask = alg->cra_alignmask;
  	inst->alg.cra_type = &crypto_nivaead_type;
  
  	inst->alg.cra_aead.ivsize = 8;
  	inst->alg.cra_aead.maxauthsize = 16;
  
  	inst->alg.cra_ctxsize = sizeof(struct crypto_rfc4106_ctx);
  
  	inst->alg.cra_init = crypto_rfc4106_init_tfm;
  	inst->alg.cra_exit = crypto_rfc4106_exit_tfm;
  
  	inst->alg.cra_aead.setkey = crypto_rfc4106_setkey;
  	inst->alg.cra_aead.setauthsize = crypto_rfc4106_setauthsize;
  	inst->alg.cra_aead.encrypt = crypto_rfc4106_encrypt;
  	inst->alg.cra_aead.decrypt = crypto_rfc4106_decrypt;
  
  	inst->alg.cra_aead.geniv = "seqiv";
  
  out:
  	return inst;
  
  out_drop_alg:
  	crypto_drop_aead(spawn);
  out_free_inst:
  	kfree(inst);
  	inst = ERR_PTR(err);
  	goto out;
  }
  
  static void crypto_rfc4106_free(struct crypto_instance *inst)
  {
  	crypto_drop_spawn(crypto_instance_ctx(inst));
  	kfree(inst);
  }
  
  static struct crypto_template crypto_rfc4106_tmpl = {
  	.name = "rfc4106",
  	.alloc = crypto_rfc4106_alloc,
  	.free = crypto_rfc4106_free,
  	.module = THIS_MODULE,
  };
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
  static inline struct crypto_rfc4543_req_ctx *crypto_rfc4543_reqctx(
  	struct aead_request *req)
  {
  	unsigned long align = crypto_aead_alignmask(crypto_aead_reqtfm(req));
  
  	return (void *)PTR_ALIGN((u8 *)aead_request_ctx(req), align + 1);
  }
  
  static int crypto_rfc4543_setkey(struct crypto_aead *parent, const u8 *key,
  				 unsigned int keylen)
  {
  	struct crypto_rfc4543_ctx *ctx = crypto_aead_ctx(parent);
  	struct crypto_aead *child = ctx->child;
  	int err;
  
  	if (keylen < 4)
  		return -EINVAL;
  
  	keylen -= 4;
  	memcpy(ctx->nonce, key + keylen, 4);
  
  	crypto_aead_clear_flags(child, CRYPTO_TFM_REQ_MASK);
  	crypto_aead_set_flags(child, crypto_aead_get_flags(parent) &
  				     CRYPTO_TFM_REQ_MASK);
  	err = crypto_aead_setkey(child, key, keylen);
  	crypto_aead_set_flags(parent, crypto_aead_get_flags(child) &
  				      CRYPTO_TFM_RES_MASK);
  
  	return err;
  }
  
  static int crypto_rfc4543_setauthsize(struct crypto_aead *parent,
  				      unsigned int authsize)
  {
  	struct crypto_rfc4543_ctx *ctx = crypto_aead_ctx(parent);
  
  	if (authsize != 16)
  		return -EINVAL;
  
  	return crypto_aead_setauthsize(ctx->child, authsize);
  }
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
  static struct aead_request *crypto_rfc4543_crypt(struct aead_request *req,
  						 int enc)
  {
  	struct crypto_aead *aead = crypto_aead_reqtfm(req);
  	struct crypto_rfc4543_ctx *ctx = crypto_aead_ctx(aead);
  	struct crypto_rfc4543_req_ctx *rctx = crypto_rfc4543_reqctx(req);
  	struct aead_request *subreq = &rctx->subreq;
  	struct scatterlist *dst = req->dst;
  	struct scatterlist *cipher = rctx->cipher;
  	struct scatterlist *payload = rctx->payload;
  	struct scatterlist *assoc = rctx->assoc;
  	unsigned int authsize = crypto_aead_authsize(aead);
  	unsigned int assoclen = req->assoclen;
  	struct page *dstp;
  	u8 *vdst;
  	u8 *iv = PTR_ALIGN((u8 *)(rctx + 1) + crypto_aead_reqsize(ctx->child),
  			   crypto_aead_alignmask(ctx->child) + 1);
  
  	memcpy(iv, ctx->nonce, 4);
  	memcpy(iv + 4, req->iv, 8);
  
  	/* construct cipher/plaintext */
  	if (enc)
  		memset(rctx->auth_tag, 0, authsize);
  	else
  		scatterwalk_map_and_copy(rctx->auth_tag, dst,
  					 req->cryptlen - authsize,
  					 authsize, 0);
  
  	sg_init_one(cipher, rctx->auth_tag, authsize);
  
  	/* construct the aad */
  	dstp = sg_page(dst);
  	vdst = PageHighMem(dstp) ? NULL : page_address(dstp) + dst->offset;
  
  	sg_init_table(payload, 2);
  	sg_set_buf(payload, req->iv, 8);
c920fa605   Steffen Klassert   crypto: Use scatt...
1086
  	scatterwalk_crypto_chain(payload, dst, vdst == req->iv + 8, 2);
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1087
1088
1089
1090
1091
  	assoclen += 8 + req->cryptlen - (enc ? 0 : authsize);
  
  	sg_init_table(assoc, 2);
  	sg_set_page(assoc, sg_page(req->assoc), req->assoc->length,
  		    req->assoc->offset);
c920fa605   Steffen Klassert   crypto: Use scatt...
1092
  	scatterwalk_crypto_chain(assoc, payload, 0, 2);
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
  
  	aead_request_set_tfm(subreq, ctx->child);
  	aead_request_set_callback(subreq, req->base.flags, req->base.complete,
  				  req->base.data);
  	aead_request_set_crypt(subreq, cipher, cipher, enc ? 0 : authsize, iv);
  	aead_request_set_assoc(subreq, assoc, assoclen);
  
  	return subreq;
  }
  
  static int crypto_rfc4543_encrypt(struct aead_request *req)
  {
  	struct crypto_aead *aead = crypto_aead_reqtfm(req);
  	struct crypto_rfc4543_req_ctx *rctx = crypto_rfc4543_reqctx(req);
  	struct aead_request *subreq;
  	int err;
  
  	subreq = crypto_rfc4543_crypt(req, 1);
  	err = crypto_aead_encrypt(subreq);
  	if (err)
  		return err;
  
  	scatterwalk_map_and_copy(rctx->auth_tag, req->dst, req->cryptlen,
  				 crypto_aead_authsize(aead), 1);
  
  	return 0;
  }
  
  static int crypto_rfc4543_decrypt(struct aead_request *req)
  {
  	req = crypto_rfc4543_crypt(req, 0);
  
  	return crypto_aead_decrypt(req);
  }
  
  static int crypto_rfc4543_init_tfm(struct crypto_tfm *tfm)
  {
  	struct crypto_instance *inst = (void *)tfm->__crt_alg;
  	struct crypto_aead_spawn *spawn = crypto_instance_ctx(inst);
  	struct crypto_rfc4543_ctx *ctx = crypto_tfm_ctx(tfm);
  	struct crypto_aead *aead;
  	unsigned long align;
  
  	aead = crypto_spawn_aead(spawn);
  	if (IS_ERR(aead))
  		return PTR_ERR(aead);
  
  	ctx->child = aead;
  
  	align = crypto_aead_alignmask(aead);
  	align &= ~(crypto_tfm_ctx_alignment() - 1);
  	tfm->crt_aead.reqsize = sizeof(struct crypto_rfc4543_req_ctx) +
  				ALIGN(crypto_aead_reqsize(aead),
  				      crypto_tfm_ctx_alignment()) +
  				align + 16;
  
  	return 0;
  }
  
  static void crypto_rfc4543_exit_tfm(struct crypto_tfm *tfm)
  {
  	struct crypto_rfc4543_ctx *ctx = crypto_tfm_ctx(tfm);
  
  	crypto_free_aead(ctx->child);
  }
  
  static struct crypto_instance *crypto_rfc4543_alloc(struct rtattr **tb)
  {
  	struct crypto_attr_type *algt;
  	struct crypto_instance *inst;
  	struct crypto_aead_spawn *spawn;
  	struct crypto_alg *alg;
  	const char *ccm_name;
  	int err;
  
  	algt = crypto_get_attr_type(tb);
  	err = PTR_ERR(algt);
  	if (IS_ERR(algt))
  		return ERR_PTR(err);
  
  	if ((algt->type ^ CRYPTO_ALG_TYPE_AEAD) & algt->mask)
  		return ERR_PTR(-EINVAL);
  
  	ccm_name = crypto_attr_alg_name(tb[1]);
  	err = PTR_ERR(ccm_name);
  	if (IS_ERR(ccm_name))
  		return ERR_PTR(err);
  
  	inst = kzalloc(sizeof(*inst) + sizeof(*spawn), GFP_KERNEL);
  	if (!inst)
  		return ERR_PTR(-ENOMEM);
  
  	spawn = crypto_instance_ctx(inst);
  	crypto_set_aead_spawn(spawn, inst);
  	err = crypto_grab_aead(spawn, ccm_name, 0,
  			       crypto_requires_sync(algt->type, algt->mask));
  	if (err)
  		goto out_free_inst;
  
  	alg = crypto_aead_spawn_alg(spawn);
  
  	err = -EINVAL;
  
  	/* We only support 16-byte blocks. */
  	if (alg->cra_aead.ivsize != 16)
  		goto out_drop_alg;
  
  	/* Not a stream cipher? */
  	if (alg->cra_blocksize != 1)
  		goto out_drop_alg;
  
  	err = -ENAMETOOLONG;
  	if (snprintf(inst->alg.cra_name, CRYPTO_MAX_ALG_NAME,
  		     "rfc4543(%s)", alg->cra_name) >= CRYPTO_MAX_ALG_NAME ||
  	    snprintf(inst->alg.cra_driver_name, CRYPTO_MAX_ALG_NAME,
  		     "rfc4543(%s)", alg->cra_driver_name) >=
  	    CRYPTO_MAX_ALG_NAME)
  		goto out_drop_alg;
  
  	inst->alg.cra_flags = CRYPTO_ALG_TYPE_AEAD;
  	inst->alg.cra_flags |= alg->cra_flags & CRYPTO_ALG_ASYNC;
  	inst->alg.cra_priority = alg->cra_priority;
  	inst->alg.cra_blocksize = 1;
  	inst->alg.cra_alignmask = alg->cra_alignmask;
  	inst->alg.cra_type = &crypto_nivaead_type;
  
  	inst->alg.cra_aead.ivsize = 8;
  	inst->alg.cra_aead.maxauthsize = 16;
  
  	inst->alg.cra_ctxsize = sizeof(struct crypto_rfc4543_ctx);
  
  	inst->alg.cra_init = crypto_rfc4543_init_tfm;
  	inst->alg.cra_exit = crypto_rfc4543_exit_tfm;
  
  	inst->alg.cra_aead.setkey = crypto_rfc4543_setkey;
  	inst->alg.cra_aead.setauthsize = crypto_rfc4543_setauthsize;
  	inst->alg.cra_aead.encrypt = crypto_rfc4543_encrypt;
  	inst->alg.cra_aead.decrypt = crypto_rfc4543_decrypt;
  
  	inst->alg.cra_aead.geniv = "seqiv";
  
  out:
  	return inst;
  
  out_drop_alg:
  	crypto_drop_aead(spawn);
  out_free_inst:
  	kfree(inst);
  	inst = ERR_PTR(err);
  	goto out;
  }
  
  static void crypto_rfc4543_free(struct crypto_instance *inst)
  {
  	crypto_drop_spawn(crypto_instance_ctx(inst));
  	kfree(inst);
  }
  
  static struct crypto_template crypto_rfc4543_tmpl = {
  	.name = "rfc4543",
  	.alloc = crypto_rfc4543_alloc,
  	.free = crypto_rfc4543_free,
  	.module = THIS_MODULE,
  };
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
1257
1258
  static int __init crypto_gcm_module_init(void)
  {
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
1259
  	int err;
9382d97af   Huang Ying   crypto: gcm - Use...
1260
1261
1262
  	gcm_zeroes = kzalloc(16, GFP_KERNEL);
  	if (!gcm_zeroes)
  		return -ENOMEM;
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
1263
1264
1265
1266
1267
1268
1269
  	err = crypto_register_template(&crypto_gcm_base_tmpl);
  	if (err)
  		goto out;
  
  	err = crypto_register_template(&crypto_gcm_tmpl);
  	if (err)
  		goto out_undo_base;
dadbc53d0   Herbert Xu   [CRYPTO] gcm: Int...
1270
1271
1272
  	err = crypto_register_template(&crypto_rfc4106_tmpl);
  	if (err)
  		goto out_undo_gcm;
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1273
1274
1275
  	err = crypto_register_template(&crypto_rfc4543_tmpl);
  	if (err)
  		goto out_undo_rfc4106;
9382d97af   Huang Ying   crypto: gcm - Use...
1276
  	return 0;
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
1277

73c89c15b   Tobias Brunner   crypto: gcm - Add...
1278
1279
  out_undo_rfc4106:
  	crypto_unregister_template(&crypto_rfc4106_tmpl);
dadbc53d0   Herbert Xu   [CRYPTO] gcm: Int...
1280
1281
  out_undo_gcm:
  	crypto_unregister_template(&crypto_gcm_tmpl);
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
1282
1283
  out_undo_base:
  	crypto_unregister_template(&crypto_gcm_base_tmpl);
9382d97af   Huang Ying   crypto: gcm - Use...
1284
1285
1286
  out:
  	kfree(gcm_zeroes);
  	return err;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
1287
1288
1289
1290
  }
  
  static void __exit crypto_gcm_module_exit(void)
  {
9382d97af   Huang Ying   crypto: gcm - Use...
1291
  	kfree(gcm_zeroes);
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1292
  	crypto_unregister_template(&crypto_rfc4543_tmpl);
dadbc53d0   Herbert Xu   [CRYPTO] gcm: Int...
1293
  	crypto_unregister_template(&crypto_rfc4106_tmpl);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
1294
  	crypto_unregister_template(&crypto_gcm_tmpl);
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
1295
  	crypto_unregister_template(&crypto_gcm_base_tmpl);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
1296
1297
1298
1299
1300
1301
1302
1303
  }
  
  module_init(crypto_gcm_module_init);
  module_exit(crypto_gcm_module_exit);
  
  MODULE_LICENSE("GPL");
  MODULE_DESCRIPTION("Galois/Counter Mode");
  MODULE_AUTHOR("Mikko Herranen <mh1@iki.fi>");
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
1304
  MODULE_ALIAS("gcm_base");
dadbc53d0   Herbert Xu   [CRYPTO] gcm: Int...
1305
  MODULE_ALIAS("rfc4106");
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1306
  MODULE_ALIAS("rfc4543");