Blame view

crypto/blkcipher.c 20 KB
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
  /*
   * Block chaining cipher operations.
   * 
   * Generic encrypt/decrypt wrapper for ciphers, handles operations across
   * multiple page boundaries by using temporary blocks.  In user context,
   * the kernel is given a chance to schedule us once per page.
   *
   * Copyright (c) 2006 Herbert Xu <herbert@gondor.apana.org.au>
   *
   * This program is free software; you can redistribute it and/or modify it
   * under the terms of the GNU General Public License as published by the Free
   * Software Foundation; either version 2 of the License, or (at your option) 
   * any later version.
   *
   */
d1a2fd500   Herbert Xu   crypto: blkcipher...
16
  #include <crypto/aead.h>
ecfc43292   Herbert Xu   [CRYPTO] skcipher...
17
  #include <crypto/internal/skcipher.h>
42c271c6c   Herbert Xu   [CRYPTO] scatterw...
18
  #include <crypto/scatterwalk.h>
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
19
  #include <linux/errno.h>
fb469840b   Herbert Xu   [CRYPTO] all: Che...
20
  #include <linux/hardirq.h>
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
21
  #include <linux/kernel.h>
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
22
23
24
25
26
  #include <linux/module.h>
  #include <linux/scatterlist.h>
  #include <linux/seq_file.h>
  #include <linux/slab.h>
  #include <linux/string.h>
50496a1fa   Steffen Klassert   crypto: Add users...
27
28
  #include <linux/cryptouser.h>
  #include <net/netlink.h>
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
29
30
  
  #include "internal.h"
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
  
  enum {
  	BLKCIPHER_WALK_PHYS = 1 << 0,
  	BLKCIPHER_WALK_SLOW = 1 << 1,
  	BLKCIPHER_WALK_COPY = 1 << 2,
  	BLKCIPHER_WALK_DIFF = 1 << 3,
  };
  
  static int blkcipher_walk_next(struct blkcipher_desc *desc,
  			       struct blkcipher_walk *walk);
  static int blkcipher_walk_first(struct blkcipher_desc *desc,
  				struct blkcipher_walk *walk);
  
  static inline void blkcipher_map_src(struct blkcipher_walk *walk)
  {
f0dfc0b0b   Cong Wang   crypto: remove th...
46
  	walk->src.virt.addr = scatterwalk_map(&walk->in);
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
47
48
49
50
  }
  
  static inline void blkcipher_map_dst(struct blkcipher_walk *walk)
  {
f0dfc0b0b   Cong Wang   crypto: remove th...
51
  	walk->dst.virt.addr = scatterwalk_map(&walk->out);
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
52
53
54
55
  }
  
  static inline void blkcipher_unmap_src(struct blkcipher_walk *walk)
  {
f0dfc0b0b   Cong Wang   crypto: remove th...
56
  	scatterwalk_unmap(walk->src.virt.addr);
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
57
58
59
60
  }
  
  static inline void blkcipher_unmap_dst(struct blkcipher_walk *walk)
  {
f0dfc0b0b   Cong Wang   crypto: remove th...
61
  	scatterwalk_unmap(walk->dst.virt.addr);
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
62
  }
e4630f9fd   Herbert Xu   [CRYPTO] blkciphe...
63
64
65
  /* Get a spot of the specified length that does not straddle a page.
   * The caller needs to ensure that there is enough space for this operation.
   */
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
66
67
  static inline u8 *blkcipher_get_spot(u8 *start, unsigned int len)
  {
e4630f9fd   Herbert Xu   [CRYPTO] blkciphe...
68
  	u8 *end_page = (u8 *)(((unsigned long)(start + len - 1)) & PAGE_MASK);
5aaff0c8f   Ingo Oeser   [CRYPTO] blkciphe...
69
  	return max(start, end_page);
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
70
  }
822be00fe   Ard Biesheuvel   crypto: remove di...
71
  static inline unsigned int blkcipher_done_slow(struct blkcipher_walk *walk,
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
72
73
74
  					       unsigned int bsize)
  {
  	u8 *addr;
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
75

822be00fe   Ard Biesheuvel   crypto: remove di...
76
  	addr = (u8 *)ALIGN((unsigned long)walk->buffer, walk->alignmask + 1);
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
77
78
79
80
81
82
83
84
  	addr = blkcipher_get_spot(addr, bsize);
  	scatterwalk_copychunks(addr, &walk->out, bsize, 1);
  	return bsize;
  }
  
  static inline unsigned int blkcipher_done_fast(struct blkcipher_walk *walk,
  					       unsigned int n)
  {
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
85
86
87
88
89
  	if (walk->flags & BLKCIPHER_WALK_COPY) {
  		blkcipher_map_dst(walk);
  		memcpy(walk->dst.virt.addr, walk->page, n);
  		blkcipher_unmap_dst(walk);
  	} else if (!(walk->flags & BLKCIPHER_WALK_PHYS)) {
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
90
91
  		if (walk->flags & BLKCIPHER_WALK_DIFF)
  			blkcipher_unmap_dst(walk);
61ecdb801   Peter Zijlstra   mm: strictly nest...
92
  		blkcipher_unmap_src(walk);
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
93
94
95
96
97
98
99
100
101
102
103
  	}
  
  	scatterwalk_advance(&walk->in, n);
  	scatterwalk_advance(&walk->out, n);
  
  	return n;
  }
  
  int blkcipher_walk_done(struct blkcipher_desc *desc,
  			struct blkcipher_walk *walk, int err)
  {
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
104
105
106
  	unsigned int nbytes = 0;
  
  	if (likely(err >= 0)) {
7607bd8ff   Herbert Xu   [CRYPTO] blkciphe...
107
  		unsigned int n = walk->nbytes - err;
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
108
109
  
  		if (likely(!(walk->flags & BLKCIPHER_WALK_SLOW)))
7607bd8ff   Herbert Xu   [CRYPTO] blkciphe...
110
111
112
113
114
  			n = blkcipher_done_fast(walk, n);
  		else if (WARN_ON(err)) {
  			err = -EINVAL;
  			goto err;
  		} else
822be00fe   Ard Biesheuvel   crypto: remove di...
115
  			n = blkcipher_done_slow(walk, n);
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
116
117
118
119
120
121
122
  
  		nbytes = walk->total - n;
  		err = 0;
  	}
  
  	scatterwalk_done(&walk->in, 0, nbytes);
  	scatterwalk_done(&walk->out, 1, nbytes);
bac1b5c46   Herbert Xu   crypto: blkcipher...
123
  err:
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
124
125
126
127
128
129
130
131
132
  	walk->total = nbytes;
  	walk->nbytes = nbytes;
  
  	if (nbytes) {
  		crypto_yield(desc->flags);
  		return blkcipher_walk_next(desc, walk);
  	}
  
  	if (walk->iv != desc->info)
822be00fe   Ard Biesheuvel   crypto: remove di...
133
  		memcpy(desc->info, walk->iv, walk->ivsize);
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
  	if (walk->buffer != walk->page)
  		kfree(walk->buffer);
  	if (walk->page)
  		free_page((unsigned long)walk->page);
  
  	return err;
  }
  EXPORT_SYMBOL_GPL(blkcipher_walk_done);
  
  static inline int blkcipher_next_slow(struct blkcipher_desc *desc,
  				      struct blkcipher_walk *walk,
  				      unsigned int bsize,
  				      unsigned int alignmask)
  {
  	unsigned int n;
70613783f   Herbert Xu   [CRYPTO] blkciphe...
149
  	unsigned aligned_bsize = ALIGN(bsize, alignmask + 1);
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
150
151
152
153
154
155
156
  
  	if (walk->buffer)
  		goto ok;
  
  	walk->buffer = walk->page;
  	if (walk->buffer)
  		goto ok;
2614de1b9   Herbert Xu   [CRYPTO] blkciphe...
157
  	n = aligned_bsize * 3 - (alignmask + 1) +
e4630f9fd   Herbert Xu   [CRYPTO] blkciphe...
158
  	    (alignmask & ~(crypto_tfm_ctx_alignment() - 1));
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
159
160
161
162
163
164
165
166
  	walk->buffer = kmalloc(n, GFP_ATOMIC);
  	if (!walk->buffer)
  		return blkcipher_walk_done(desc, walk, -ENOMEM);
  
  ok:
  	walk->dst.virt.addr = (u8 *)ALIGN((unsigned long)walk->buffer,
  					  alignmask + 1);
  	walk->dst.virt.addr = blkcipher_get_spot(walk->dst.virt.addr, bsize);
70613783f   Herbert Xu   [CRYPTO] blkciphe...
167
168
  	walk->src.virt.addr = blkcipher_get_spot(walk->dst.virt.addr +
  						 aligned_bsize, bsize);
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
  
  	scatterwalk_copychunks(walk->src.virt.addr, &walk->in, bsize, 0);
  
  	walk->nbytes = bsize;
  	walk->flags |= BLKCIPHER_WALK_SLOW;
  
  	return 0;
  }
  
  static inline int blkcipher_next_copy(struct blkcipher_walk *walk)
  {
  	u8 *tmp = walk->page;
  
  	blkcipher_map_src(walk);
  	memcpy(tmp, walk->src.virt.addr, walk->nbytes);
  	blkcipher_unmap_src(walk);
  
  	walk->src.virt.addr = tmp;
  	walk->dst.virt.addr = tmp;
  
  	return 0;
  }
  
  static inline int blkcipher_next_fast(struct blkcipher_desc *desc,
  				      struct blkcipher_walk *walk)
  {
  	unsigned long diff;
  
  	walk->src.phys.page = scatterwalk_page(&walk->in);
  	walk->src.phys.offset = offset_in_page(walk->in.offset);
  	walk->dst.phys.page = scatterwalk_page(&walk->out);
  	walk->dst.phys.offset = offset_in_page(walk->out.offset);
  
  	if (walk->flags & BLKCIPHER_WALK_PHYS)
  		return 0;
  
  	diff = walk->src.phys.offset - walk->dst.phys.offset;
  	diff |= walk->src.virt.page - walk->dst.virt.page;
  
  	blkcipher_map_src(walk);
  	walk->dst.virt.addr = walk->src.virt.addr;
  
  	if (diff) {
  		walk->flags |= BLKCIPHER_WALK_DIFF;
  		blkcipher_map_dst(walk);
  	}
  
  	return 0;
  }
  
  static int blkcipher_walk_next(struct blkcipher_desc *desc,
  			       struct blkcipher_walk *walk)
  {
7607bd8ff   Herbert Xu   [CRYPTO] blkciphe...
222
  	unsigned int bsize;
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
223
224
225
226
  	unsigned int n;
  	int err;
  
  	n = walk->total;
822be00fe   Ard Biesheuvel   crypto: remove di...
227
  	if (unlikely(n < walk->cipher_blocksize)) {
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
228
229
230
231
232
233
  		desc->flags |= CRYPTO_TFM_RES_BAD_BLOCK_LEN;
  		return blkcipher_walk_done(desc, walk, -EINVAL);
  	}
  
  	walk->flags &= ~(BLKCIPHER_WALK_SLOW | BLKCIPHER_WALK_COPY |
  			 BLKCIPHER_WALK_DIFF);
822be00fe   Ard Biesheuvel   crypto: remove di...
234
235
  	if (!scatterwalk_aligned(&walk->in, walk->alignmask) ||
  	    !scatterwalk_aligned(&walk->out, walk->alignmask)) {
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
236
237
238
239
240
241
242
  		walk->flags |= BLKCIPHER_WALK_COPY;
  		if (!walk->page) {
  			walk->page = (void *)__get_free_page(GFP_ATOMIC);
  			if (!walk->page)
  				n = 0;
  		}
  	}
822be00fe   Ard Biesheuvel   crypto: remove di...
243
  	bsize = min(walk->walk_blocksize, n);
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
244
245
246
247
  	n = scatterwalk_clamp(&walk->in, n);
  	n = scatterwalk_clamp(&walk->out, n);
  
  	if (unlikely(n < bsize)) {
822be00fe   Ard Biesheuvel   crypto: remove di...
248
  		err = blkcipher_next_slow(desc, walk, bsize, walk->alignmask);
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
  		goto set_phys_lowmem;
  	}
  
  	walk->nbytes = n;
  	if (walk->flags & BLKCIPHER_WALK_COPY) {
  		err = blkcipher_next_copy(walk);
  		goto set_phys_lowmem;
  	}
  
  	return blkcipher_next_fast(desc, walk);
  
  set_phys_lowmem:
  	if (walk->flags & BLKCIPHER_WALK_PHYS) {
  		walk->src.phys.page = virt_to_page(walk->src.virt.addr);
  		walk->dst.phys.page = virt_to_page(walk->dst.virt.addr);
  		walk->src.phys.offset &= PAGE_SIZE - 1;
  		walk->dst.phys.offset &= PAGE_SIZE - 1;
  	}
  	return err;
  }
822be00fe   Ard Biesheuvel   crypto: remove di...
269
  static inline int blkcipher_copy_iv(struct blkcipher_walk *walk)
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
270
  {
822be00fe   Ard Biesheuvel   crypto: remove di...
271
272
273
274
275
  	unsigned bs = walk->walk_blocksize;
  	unsigned aligned_bs = ALIGN(bs, walk->alignmask + 1);
  	unsigned int size = aligned_bs * 2 +
  			    walk->ivsize + max(aligned_bs, walk->ivsize) -
  			    (walk->alignmask + 1);
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
276
  	u8 *iv;
822be00fe   Ard Biesheuvel   crypto: remove di...
277
  	size += walk->alignmask & ~(crypto_tfm_ctx_alignment() - 1);
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
278
279
280
  	walk->buffer = kmalloc(size, GFP_ATOMIC);
  	if (!walk->buffer)
  		return -ENOMEM;
822be00fe   Ard Biesheuvel   crypto: remove di...
281
  	iv = (u8 *)ALIGN((unsigned long)walk->buffer, walk->alignmask + 1);
70613783f   Herbert Xu   [CRYPTO] blkciphe...
282
283
  	iv = blkcipher_get_spot(iv, bs) + aligned_bs;
  	iv = blkcipher_get_spot(iv, bs) + aligned_bs;
822be00fe   Ard Biesheuvel   crypto: remove di...
284
  	iv = blkcipher_get_spot(iv, walk->ivsize);
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
285

822be00fe   Ard Biesheuvel   crypto: remove di...
286
  	walk->iv = memcpy(iv, walk->iv, walk->ivsize);
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
287
288
289
290
291
292
293
  	return 0;
  }
  
  int blkcipher_walk_virt(struct blkcipher_desc *desc,
  			struct blkcipher_walk *walk)
  {
  	walk->flags &= ~BLKCIPHER_WALK_PHYS;
822be00fe   Ard Biesheuvel   crypto: remove di...
294
295
296
297
  	walk->walk_blocksize = crypto_blkcipher_blocksize(desc->tfm);
  	walk->cipher_blocksize = walk->walk_blocksize;
  	walk->ivsize = crypto_blkcipher_ivsize(desc->tfm);
  	walk->alignmask = crypto_blkcipher_alignmask(desc->tfm);
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
298
299
300
301
302
303
304
305
  	return blkcipher_walk_first(desc, walk);
  }
  EXPORT_SYMBOL_GPL(blkcipher_walk_virt);
  
  int blkcipher_walk_phys(struct blkcipher_desc *desc,
  			struct blkcipher_walk *walk)
  {
  	walk->flags |= BLKCIPHER_WALK_PHYS;
822be00fe   Ard Biesheuvel   crypto: remove di...
306
307
308
309
  	walk->walk_blocksize = crypto_blkcipher_blocksize(desc->tfm);
  	walk->cipher_blocksize = walk->walk_blocksize;
  	walk->ivsize = crypto_blkcipher_ivsize(desc->tfm);
  	walk->alignmask = crypto_blkcipher_alignmask(desc->tfm);
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
310
311
312
313
314
315
316
  	return blkcipher_walk_first(desc, walk);
  }
  EXPORT_SYMBOL_GPL(blkcipher_walk_phys);
  
  static int blkcipher_walk_first(struct blkcipher_desc *desc,
  				struct blkcipher_walk *walk)
  {
fb469840b   Herbert Xu   [CRYPTO] all: Che...
317
318
  	if (WARN_ON_ONCE(in_irq()))
  		return -EDEADLK;
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
319
320
321
322
323
324
  	walk->nbytes = walk->total;
  	if (unlikely(!walk->total))
  		return 0;
  
  	walk->buffer = NULL;
  	walk->iv = desc->info;
822be00fe   Ard Biesheuvel   crypto: remove di...
325
326
  	if (unlikely(((unsigned long)walk->iv & walk->alignmask))) {
  		int err = blkcipher_copy_iv(walk);
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
327
328
329
330
331
332
333
334
335
336
  		if (err)
  			return err;
  	}
  
  	scatterwalk_start(&walk->in, walk->in.sg);
  	scatterwalk_start(&walk->out, walk->out.sg);
  	walk->page = NULL;
  
  	return blkcipher_walk_next(desc, walk);
  }
7607bd8ff   Herbert Xu   [CRYPTO] blkciphe...
337
338
339
340
341
  int blkcipher_walk_virt_block(struct blkcipher_desc *desc,
  			      struct blkcipher_walk *walk,
  			      unsigned int blocksize)
  {
  	walk->flags &= ~BLKCIPHER_WALK_PHYS;
822be00fe   Ard Biesheuvel   crypto: remove di...
342
343
344
345
  	walk->walk_blocksize = blocksize;
  	walk->cipher_blocksize = crypto_blkcipher_blocksize(desc->tfm);
  	walk->ivsize = crypto_blkcipher_ivsize(desc->tfm);
  	walk->alignmask = crypto_blkcipher_alignmask(desc->tfm);
7607bd8ff   Herbert Xu   [CRYPTO] blkciphe...
346
347
348
  	return blkcipher_walk_first(desc, walk);
  }
  EXPORT_SYMBOL_GPL(blkcipher_walk_virt_block);
4f7f1d7cf   Ard Biesheuvel   crypto: allow blk...
349
350
351
352
353
354
355
356
357
358
359
360
361
  int blkcipher_aead_walk_virt_block(struct blkcipher_desc *desc,
  				   struct blkcipher_walk *walk,
  				   struct crypto_aead *tfm,
  				   unsigned int blocksize)
  {
  	walk->flags &= ~BLKCIPHER_WALK_PHYS;
  	walk->walk_blocksize = blocksize;
  	walk->cipher_blocksize = crypto_aead_blocksize(tfm);
  	walk->ivsize = crypto_aead_ivsize(tfm);
  	walk->alignmask = crypto_aead_alignmask(tfm);
  	return blkcipher_walk_first(desc, walk);
  }
  EXPORT_SYMBOL_GPL(blkcipher_aead_walk_virt_block);
791b4d5f7   Herbert Xu   [CRYPTO] api: Add...
362
363
  static int setkey_unaligned(struct crypto_tfm *tfm, const u8 *key,
  			    unsigned int keylen)
ca7c39385   Sebastian Siewior   [CRYPTO] api: Han...
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
  {
  	struct blkcipher_alg *cipher = &tfm->__crt_alg->cra_blkcipher;
  	unsigned long alignmask = crypto_tfm_alg_alignmask(tfm);
  	int ret;
  	u8 *buffer, *alignbuffer;
  	unsigned long absize;
  
  	absize = keylen + alignmask;
  	buffer = kmalloc(absize, GFP_ATOMIC);
  	if (!buffer)
  		return -ENOMEM;
  
  	alignbuffer = (u8 *)ALIGN((unsigned long)buffer, alignmask + 1);
  	memcpy(alignbuffer, key, keylen);
  	ret = cipher->setkey(tfm, alignbuffer, keylen);
068171767   Sebastian Siewior   [CRYPTO] api: fix...
379
  	memset(alignbuffer, 0, keylen);
ca7c39385   Sebastian Siewior   [CRYPTO] api: Han...
380
381
382
  	kfree(buffer);
  	return ret;
  }
791b4d5f7   Herbert Xu   [CRYPTO] api: Add...
383
  static int setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen)
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
384
385
  {
  	struct blkcipher_alg *cipher = &tfm->__crt_alg->cra_blkcipher;
ca7c39385   Sebastian Siewior   [CRYPTO] api: Han...
386
  	unsigned long alignmask = crypto_tfm_alg_alignmask(tfm);
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
387
388
389
390
391
  
  	if (keylen < cipher->min_keysize || keylen > cipher->max_keysize) {
  		tfm->crt_flags |= CRYPTO_TFM_RES_BAD_KEY_LEN;
  		return -EINVAL;
  	}
ca7c39385   Sebastian Siewior   [CRYPTO] api: Han...
392
393
  	if ((unsigned long)key & alignmask)
  		return setkey_unaligned(tfm, key, keylen);
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
394
395
  	return cipher->setkey(tfm, key, keylen);
  }
32e3983fe   Herbert Xu   [CRYPTO] api: Add...
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
  static int async_setkey(struct crypto_ablkcipher *tfm, const u8 *key,
  			unsigned int keylen)
  {
  	return setkey(crypto_ablkcipher_tfm(tfm), key, keylen);
  }
  
  static int async_encrypt(struct ablkcipher_request *req)
  {
  	struct crypto_tfm *tfm = req->base.tfm;
  	struct blkcipher_alg *alg = &tfm->__crt_alg->cra_blkcipher;
  	struct blkcipher_desc desc = {
  		.tfm = __crypto_blkcipher_cast(tfm),
  		.info = req->info,
  		.flags = req->base.flags,
  	};
  
  
  	return alg->encrypt(&desc, req->dst, req->src, req->nbytes);
  }
  
  static int async_decrypt(struct ablkcipher_request *req)
  {
  	struct crypto_tfm *tfm = req->base.tfm;
  	struct blkcipher_alg *alg = &tfm->__crt_alg->cra_blkcipher;
  	struct blkcipher_desc desc = {
  		.tfm = __crypto_blkcipher_cast(tfm),
  		.info = req->info,
  		.flags = req->base.flags,
  	};
  
  	return alg->decrypt(&desc, req->dst, req->src, req->nbytes);
  }
27d2a3300   Herbert Xu   [CRYPTO] api: All...
428
429
  static unsigned int crypto_blkcipher_ctxsize(struct crypto_alg *alg, u32 type,
  					     u32 mask)
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
430
431
432
  {
  	struct blkcipher_alg *cipher = &alg->cra_blkcipher;
  	unsigned int len = alg->cra_ctxsize;
332f8840f   Herbert Xu   [CRYPTO] ablkciph...
433
434
  	if ((mask & CRYPTO_ALG_TYPE_MASK) == CRYPTO_ALG_TYPE_MASK &&
  	    cipher->ivsize) {
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
435
436
437
438
439
440
  		len = ALIGN(len, (unsigned long)alg->cra_alignmask + 1);
  		len += cipher->ivsize;
  	}
  
  	return len;
  }
32e3983fe   Herbert Xu   [CRYPTO] api: Add...
441
442
443
444
445
446
447
448
  static int crypto_init_blkcipher_ops_async(struct crypto_tfm *tfm)
  {
  	struct ablkcipher_tfm *crt = &tfm->crt_ablkcipher;
  	struct blkcipher_alg *alg = &tfm->__crt_alg->cra_blkcipher;
  
  	crt->setkey = async_setkey;
  	crt->encrypt = async_encrypt;
  	crt->decrypt = async_decrypt;
b9c55aa47   Herbert Xu   [CRYPTO] skcipher...
449
450
451
452
  	if (!alg->ivsize) {
  		crt->givencrypt = skcipher_null_givencrypt;
  		crt->givdecrypt = skcipher_null_givdecrypt;
  	}
ecfc43292   Herbert Xu   [CRYPTO] skcipher...
453
  	crt->base = __crypto_ablkcipher_cast(tfm);
32e3983fe   Herbert Xu   [CRYPTO] api: Add...
454
455
456
457
458
459
  	crt->ivsize = alg->ivsize;
  
  	return 0;
  }
  
  static int crypto_init_blkcipher_ops_sync(struct crypto_tfm *tfm)
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
460
461
462
463
464
  {
  	struct blkcipher_tfm *crt = &tfm->crt_blkcipher;
  	struct blkcipher_alg *alg = &tfm->__crt_alg->cra_blkcipher;
  	unsigned long align = crypto_tfm_alg_alignmask(tfm) + 1;
  	unsigned long addr;
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
465
466
467
468
469
470
471
472
473
474
475
  	crt->setkey = setkey;
  	crt->encrypt = alg->encrypt;
  	crt->decrypt = alg->decrypt;
  
  	addr = (unsigned long)crypto_tfm_ctx(tfm);
  	addr = ALIGN(addr, align);
  	addr += ALIGN(tfm->__crt_alg->cra_ctxsize, align);
  	crt->iv = (void *)addr;
  
  	return 0;
  }
32e3983fe   Herbert Xu   [CRYPTO] api: Add...
476
477
478
479
480
481
  static int crypto_init_blkcipher_ops(struct crypto_tfm *tfm, u32 type, u32 mask)
  {
  	struct blkcipher_alg *alg = &tfm->__crt_alg->cra_blkcipher;
  
  	if (alg->ivsize > PAGE_SIZE / 8)
  		return -EINVAL;
332f8840f   Herbert Xu   [CRYPTO] ablkciph...
482
  	if ((mask & CRYPTO_ALG_TYPE_MASK) == CRYPTO_ALG_TYPE_MASK)
32e3983fe   Herbert Xu   [CRYPTO] api: Add...
483
484
485
486
  		return crypto_init_blkcipher_ops_sync(tfm);
  	else
  		return crypto_init_blkcipher_ops_async(tfm);
  }
3acc84739   Herbert Xu   crypto: algapi - ...
487
  #ifdef CONFIG_NET
50496a1fa   Steffen Klassert   crypto: Add users...
488
489
490
  static int crypto_blkcipher_report(struct sk_buff *skb, struct crypto_alg *alg)
  {
  	struct crypto_report_blkcipher rblkcipher;
9a5467bf7   Mathias Krause   crypto: user - fi...
491
492
493
  	strncpy(rblkcipher.type, "blkcipher", sizeof(rblkcipher.type));
  	strncpy(rblkcipher.geniv, alg->cra_blkcipher.geniv ?: "<default>",
  		sizeof(rblkcipher.geniv));
50496a1fa   Steffen Klassert   crypto: Add users...
494
495
496
497
498
  
  	rblkcipher.blocksize = alg->cra_blocksize;
  	rblkcipher.min_keysize = alg->cra_blkcipher.min_keysize;
  	rblkcipher.max_keysize = alg->cra_blkcipher.max_keysize;
  	rblkcipher.ivsize = alg->cra_blkcipher.ivsize;
6662df33f   David S. Miller   crypto: Stop usin...
499
500
501
  	if (nla_put(skb, CRYPTOCFGA_REPORT_BLKCIPHER,
  		    sizeof(struct crypto_report_blkcipher), &rblkcipher))
  		goto nla_put_failure;
50496a1fa   Steffen Klassert   crypto: Add users...
502
503
504
505
506
  	return 0;
  
  nla_put_failure:
  	return -EMSGSIZE;
  }
3acc84739   Herbert Xu   crypto: algapi - ...
507
508
509
510
511
512
  #else
  static int crypto_blkcipher_report(struct sk_buff *skb, struct crypto_alg *alg)
  {
  	return -ENOSYS;
  }
  #endif
50496a1fa   Steffen Klassert   crypto: Add users...
513

5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
514
  static void crypto_blkcipher_show(struct seq_file *m, struct crypto_alg *alg)
03f5d8ced   Herbert Xu   [CRYPTO] api: Pro...
515
  	__attribute__ ((unused));
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
516
517
518
519
520
521
522
523
524
525
526
527
  static void crypto_blkcipher_show(struct seq_file *m, struct crypto_alg *alg)
  {
  	seq_printf(m, "type         : blkcipher
  ");
  	seq_printf(m, "blocksize    : %u
  ", alg->cra_blocksize);
  	seq_printf(m, "min keysize  : %u
  ", alg->cra_blkcipher.min_keysize);
  	seq_printf(m, "max keysize  : %u
  ", alg->cra_blkcipher.max_keysize);
  	seq_printf(m, "ivsize       : %u
  ", alg->cra_blkcipher.ivsize);
23508e11a   Herbert Xu   [CRYPTO] skcipher...
528
529
530
  	seq_printf(m, "geniv        : %s
  ", alg->cra_blkcipher.geniv ?:
  					     "<default>");
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
531
532
533
534
535
536
537
538
  }
  
  const struct crypto_type crypto_blkcipher_type = {
  	.ctxsize = crypto_blkcipher_ctxsize,
  	.init = crypto_init_blkcipher_ops,
  #ifdef CONFIG_PROC_FS
  	.show = crypto_blkcipher_show,
  #endif
50496a1fa   Steffen Klassert   crypto: Add users...
539
  	.report = crypto_blkcipher_report,
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
540
541
  };
  EXPORT_SYMBOL_GPL(crypto_blkcipher_type);
ecfc43292   Herbert Xu   [CRYPTO] skcipher...
542
543
544
545
546
547
548
  static int crypto_grab_nivcipher(struct crypto_skcipher_spawn *spawn,
  				const char *name, u32 type, u32 mask)
  {
  	struct crypto_alg *alg;
  	int err;
  
  	type = crypto_skcipher_type(type);
b170a137f   Herbert Xu   crypto: skcipher ...
549
  	mask = crypto_skcipher_mask(mask)| CRYPTO_ALG_GENIV;
ecfc43292   Herbert Xu   [CRYPTO] skcipher...
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
  
  	alg = crypto_alg_mod_lookup(name, type, mask);
  	if (IS_ERR(alg))
  		return PTR_ERR(alg);
  
  	err = crypto_init_spawn(&spawn->base, alg, spawn->base.inst, mask);
  	crypto_mod_put(alg);
  	return err;
  }
  
  struct crypto_instance *skcipher_geniv_alloc(struct crypto_template *tmpl,
  					     struct rtattr **tb, u32 type,
  					     u32 mask)
  {
  	struct {
  		int (*setkey)(struct crypto_ablkcipher *tfm, const u8 *key,
  			      unsigned int keylen);
  		int (*encrypt)(struct ablkcipher_request *req);
  		int (*decrypt)(struct ablkcipher_request *req);
  
  		unsigned int min_keysize;
  		unsigned int max_keysize;
  		unsigned int ivsize;
  
  		const char *geniv;
  	} balg;
  	const char *name;
  	struct crypto_skcipher_spawn *spawn;
  	struct crypto_attr_type *algt;
  	struct crypto_instance *inst;
  	struct crypto_alg *alg;
  	int err;
  
  	algt = crypto_get_attr_type(tb);
ecfc43292   Herbert Xu   [CRYPTO] skcipher...
584
  	if (IS_ERR(algt))
3e8afe35c   Julia Lawall   crypto: use ERR_CAST
585
  		return ERR_CAST(algt);
ecfc43292   Herbert Xu   [CRYPTO] skcipher...
586
587
588
589
590
591
  
  	if ((algt->type ^ (CRYPTO_ALG_TYPE_GIVCIPHER | CRYPTO_ALG_GENIV)) &
  	    algt->mask)
  		return ERR_PTR(-EINVAL);
  
  	name = crypto_attr_alg_name(tb[1]);
ecfc43292   Herbert Xu   [CRYPTO] skcipher...
592
  	if (IS_ERR(name))
3e8afe35c   Julia Lawall   crypto: use ERR_CAST
593
  		return ERR_CAST(name);
ecfc43292   Herbert Xu   [CRYPTO] skcipher...
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
  
  	inst = kzalloc(sizeof(*inst) + sizeof(*spawn), GFP_KERNEL);
  	if (!inst)
  		return ERR_PTR(-ENOMEM);
  
  	spawn = crypto_instance_ctx(inst);
  
  	/* Ignore async algorithms if necessary. */
  	mask |= crypto_requires_sync(algt->type, algt->mask);
  
  	crypto_set_skcipher_spawn(spawn, inst);
  	err = crypto_grab_nivcipher(spawn, name, type, mask);
  	if (err)
  		goto err_free_inst;
  
  	alg = crypto_skcipher_spawn_alg(spawn);
  
  	if ((alg->cra_flags & CRYPTO_ALG_TYPE_MASK) ==
  	    CRYPTO_ALG_TYPE_BLKCIPHER) {
  		balg.ivsize = alg->cra_blkcipher.ivsize;
  		balg.min_keysize = alg->cra_blkcipher.min_keysize;
  		balg.max_keysize = alg->cra_blkcipher.max_keysize;
  
  		balg.setkey = async_setkey;
  		balg.encrypt = async_encrypt;
  		balg.decrypt = async_decrypt;
  
  		balg.geniv = alg->cra_blkcipher.geniv;
  	} else {
  		balg.ivsize = alg->cra_ablkcipher.ivsize;
  		balg.min_keysize = alg->cra_ablkcipher.min_keysize;
  		balg.max_keysize = alg->cra_ablkcipher.max_keysize;
  
  		balg.setkey = alg->cra_ablkcipher.setkey;
  		balg.encrypt = alg->cra_ablkcipher.encrypt;
  		balg.decrypt = alg->cra_ablkcipher.decrypt;
  
  		balg.geniv = alg->cra_ablkcipher.geniv;
  	}
  
  	err = -EINVAL;
  	if (!balg.ivsize)
  		goto err_drop_alg;
  
  	/*
  	 * This is only true if we're constructing an algorithm with its
  	 * default IV generator.  For the default generator we elide the
  	 * template name and double-check the IV generator.
  	 */
  	if (algt->mask & CRYPTO_ALG_GENIV) {
  		if (!balg.geniv)
  			balg.geniv = crypto_default_geniv(alg);
  		err = -EAGAIN;
  		if (strcmp(tmpl->name, balg.geniv))
  			goto err_drop_alg;
  
  		memcpy(inst->alg.cra_name, alg->cra_name, CRYPTO_MAX_ALG_NAME);
  		memcpy(inst->alg.cra_driver_name, alg->cra_driver_name,
  		       CRYPTO_MAX_ALG_NAME);
  	} else {
  		err = -ENAMETOOLONG;
  		if (snprintf(inst->alg.cra_name, CRYPTO_MAX_ALG_NAME,
  			     "%s(%s)", tmpl->name, alg->cra_name) >=
  		    CRYPTO_MAX_ALG_NAME)
  			goto err_drop_alg;
  		if (snprintf(inst->alg.cra_driver_name, CRYPTO_MAX_ALG_NAME,
  			     "%s(%s)", tmpl->name, alg->cra_driver_name) >=
  		    CRYPTO_MAX_ALG_NAME)
  			goto err_drop_alg;
  	}
  
  	inst->alg.cra_flags = CRYPTO_ALG_TYPE_GIVCIPHER | CRYPTO_ALG_GENIV;
  	inst->alg.cra_flags |= alg->cra_flags & CRYPTO_ALG_ASYNC;
  	inst->alg.cra_priority = alg->cra_priority;
  	inst->alg.cra_blocksize = alg->cra_blocksize;
  	inst->alg.cra_alignmask = alg->cra_alignmask;
  	inst->alg.cra_type = &crypto_givcipher_type;
  
  	inst->alg.cra_ablkcipher.ivsize = balg.ivsize;
  	inst->alg.cra_ablkcipher.min_keysize = balg.min_keysize;
  	inst->alg.cra_ablkcipher.max_keysize = balg.max_keysize;
  	inst->alg.cra_ablkcipher.geniv = balg.geniv;
  
  	inst->alg.cra_ablkcipher.setkey = balg.setkey;
  	inst->alg.cra_ablkcipher.encrypt = balg.encrypt;
  	inst->alg.cra_ablkcipher.decrypt = balg.decrypt;
  
  out:
  	return inst;
  
  err_drop_alg:
  	crypto_drop_skcipher(spawn);
  err_free_inst:
  	kfree(inst);
  	inst = ERR_PTR(err);
  	goto out;
  }
  EXPORT_SYMBOL_GPL(skcipher_geniv_alloc);
  
  void skcipher_geniv_free(struct crypto_instance *inst)
  {
  	crypto_drop_skcipher(crypto_instance_ctx(inst));
  	kfree(inst);
  }
  EXPORT_SYMBOL_GPL(skcipher_geniv_free);
  
  int skcipher_geniv_init(struct crypto_tfm *tfm)
  {
  	struct crypto_instance *inst = (void *)tfm->__crt_alg;
  	struct crypto_ablkcipher *cipher;
  
  	cipher = crypto_spawn_skcipher(crypto_instance_ctx(inst));
  	if (IS_ERR(cipher))
  		return PTR_ERR(cipher);
  
  	tfm->crt_ablkcipher.base = cipher;
  	tfm->crt_ablkcipher.reqsize += crypto_ablkcipher_reqsize(cipher);
  
  	return 0;
  }
  EXPORT_SYMBOL_GPL(skcipher_geniv_init);
  
  void skcipher_geniv_exit(struct crypto_tfm *tfm)
  {
  	crypto_free_ablkcipher(tfm->crt_ablkcipher.base);
  }
  EXPORT_SYMBOL_GPL(skcipher_geniv_exit);
5cde0af2a   Herbert Xu   [CRYPTO] cipher: ...
721
722
  MODULE_LICENSE("GPL");
  MODULE_DESCRIPTION("Generic block chaining cipher type");