Blame view

crypto/gcm.c 36.6 KB
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
1
2
3
4
5
6
7
8
9
  /*
   * GCM: Galois/Counter Mode.
   *
   * Copyright (c) 2007 Nokia Siemens Networks - Mikko Herranen <mh1@iki.fi>
   *
   * This program is free software; you can redistribute it and/or modify it
   * under the terms of the GNU General Public License version 2 as published
   * by the Free Software Foundation.
   */
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
10
  #include <crypto/gf128mul.h>
dadbc53d0   Herbert Xu   [CRYPTO] gcm: Int...
11
  #include <crypto/internal/aead.h>
1472e5eba   Herbert Xu   [CRYPTO] gcm: Use...
12
  #include <crypto/internal/skcipher.h>
9382d97af   Huang Ying   crypto: gcm - Use...
13
  #include <crypto/internal/hash.h>
42c271c6c   Herbert Xu   [CRYPTO] scatterw...
14
  #include <crypto/scatterwalk.h>
9382d97af   Huang Ying   crypto: gcm - Use...
15
16
  #include <crypto/hash.h>
  #include "internal.h"
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
17
  #include <linux/completion.h>
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
18
19
20
21
22
  #include <linux/err.h>
  #include <linux/init.h>
  #include <linux/kernel.h>
  #include <linux/module.h>
  #include <linux/slab.h>
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
23
  struct gcm_instance_ctx {
1472e5eba   Herbert Xu   [CRYPTO] gcm: Use...
24
  	struct crypto_skcipher_spawn ctr;
9382d97af   Huang Ying   crypto: gcm - Use...
25
  	struct crypto_ahash_spawn ghash;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
26
27
28
29
  };
  
  struct crypto_gcm_ctx {
  	struct crypto_ablkcipher *ctr;
9382d97af   Huang Ying   crypto: gcm - Use...
30
  	struct crypto_ahash *ghash;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
31
  };
dadbc53d0   Herbert Xu   [CRYPTO] gcm: Int...
32
33
34
35
  struct crypto_rfc4106_ctx {
  	struct crypto_aead *child;
  	u8 nonce[4];
  };
9489667d3   Jussi Kivilinna   crypto: gcm - mak...
36
37
38
39
  struct crypto_rfc4543_instance_ctx {
  	struct crypto_aead_spawn aead;
  	struct crypto_skcipher_spawn null;
  };
73c89c15b   Tobias Brunner   crypto: gcm - Add...
40
41
  struct crypto_rfc4543_ctx {
  	struct crypto_aead *child;
9489667d3   Jussi Kivilinna   crypto: gcm - mak...
42
  	struct crypto_blkcipher *null;
73c89c15b   Tobias Brunner   crypto: gcm - Add...
43
44
45
46
47
  	u8 nonce[4];
  };
  
  struct crypto_rfc4543_req_ctx {
  	u8 auth_tag[16];
d3dde5220   Jussi Kivilinna   crypto: gcm - fix...
48
  	u8 assocbuf[32];
73c89c15b   Tobias Brunner   crypto: gcm - Add...
49
50
51
52
53
  	struct scatterlist cipher[1];
  	struct scatterlist payload[2];
  	struct scatterlist assoc[2];
  	struct aead_request subreq;
  };
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
54
  struct crypto_gcm_ghash_ctx {
9382d97af   Huang Ying   crypto: gcm - Use...
55
56
  	unsigned int cryptlen;
  	struct scatterlist *src;
62c5593ae   Huang Ying   crypto: gcm - fix...
57
  	void (*complete)(struct aead_request *req, int err);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
58
59
60
61
  };
  
  struct crypto_gcm_req_priv_ctx {
  	u8 auth_tag[16];
6160b2899   Herbert Xu   [CRYPTO] gcm: Fix...
62
  	u8 iauth_tag[16];
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
63
64
  	struct scatterlist src[2];
  	struct scatterlist dst[2];
9382d97af   Huang Ying   crypto: gcm - Use...
65
66
67
68
69
  	struct crypto_gcm_ghash_ctx ghash_ctx;
  	union {
  		struct ahash_request ahreq;
  		struct ablkcipher_request abreq;
  	} u;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
70
  };
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
71
72
73
74
  struct crypto_gcm_setkey_result {
  	int err;
  	struct completion completion;
  };
9382d97af   Huang Ying   crypto: gcm - Use...
75
  static void *gcm_zeroes;
2589469d7   Herbert Xu   [CRYPTO] gcm: Fix...
76
77
78
79
80
81
82
  static inline struct crypto_gcm_req_priv_ctx *crypto_gcm_reqctx(
  	struct aead_request *req)
  {
  	unsigned long align = crypto_aead_alignmask(crypto_aead_reqtfm(req));
  
  	return (void *)PTR_ALIGN((u8 *)aead_request_ctx(req), align + 1);
  }
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
83
  static void crypto_gcm_setkey_done(struct crypto_async_request *req, int err)
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
84
  {
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
85
  	struct crypto_gcm_setkey_result *result = req->data;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
86

84c911523   Herbert Xu   [CRYPTO] gcm: Add...
87
88
89
90
91
  	if (err == -EINPROGRESS)
  		return;
  
  	result->err = err;
  	complete(&result->completion);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
92
93
94
95
96
97
  }
  
  static int crypto_gcm_setkey(struct crypto_aead *aead, const u8 *key,
  			     unsigned int keylen)
  {
  	struct crypto_gcm_ctx *ctx = crypto_aead_ctx(aead);
9382d97af   Huang Ying   crypto: gcm - Use...
98
  	struct crypto_ahash *ghash = ctx->ghash;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
99
  	struct crypto_ablkcipher *ctr = ctx->ctr;
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
100
101
102
103
104
105
106
107
108
109
  	struct {
  		be128 hash;
  		u8 iv[8];
  
  		struct crypto_gcm_setkey_result result;
  
  		struct scatterlist sg[1];
  		struct ablkcipher_request req;
  	} *data;
  	int err;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
110
111
112
113
114
115
116
  
  	crypto_ablkcipher_clear_flags(ctr, CRYPTO_TFM_REQ_MASK);
  	crypto_ablkcipher_set_flags(ctr, crypto_aead_get_flags(aead) &
  				   CRYPTO_TFM_REQ_MASK);
  
  	err = crypto_ablkcipher_setkey(ctr, key, keylen);
  	if (err)
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
117
  		return err;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
118
119
120
  
  	crypto_aead_set_flags(aead, crypto_ablkcipher_get_flags(ctr) &
  				       CRYPTO_TFM_RES_MASK);
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
  	data = kzalloc(sizeof(*data) + crypto_ablkcipher_reqsize(ctr),
  		       GFP_KERNEL);
  	if (!data)
  		return -ENOMEM;
  
  	init_completion(&data->result.completion);
  	sg_init_one(data->sg, &data->hash, sizeof(data->hash));
  	ablkcipher_request_set_tfm(&data->req, ctr);
  	ablkcipher_request_set_callback(&data->req, CRYPTO_TFM_REQ_MAY_SLEEP |
  						    CRYPTO_TFM_REQ_MAY_BACKLOG,
  					crypto_gcm_setkey_done,
  					&data->result);
  	ablkcipher_request_set_crypt(&data->req, data->sg, data->sg,
  				     sizeof(data->hash), data->iv);
  
  	err = crypto_ablkcipher_encrypt(&data->req);
  	if (err == -EINPROGRESS || err == -EBUSY) {
  		err = wait_for_completion_interruptible(
  			&data->result.completion);
  		if (!err)
  			err = data->result.err;
  	}
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
143
144
  	if (err)
  		goto out;
9382d97af   Huang Ying   crypto: gcm - Use...
145
146
147
148
149
150
  	crypto_ahash_clear_flags(ghash, CRYPTO_TFM_REQ_MASK);
  	crypto_ahash_set_flags(ghash, crypto_aead_get_flags(aead) &
  			       CRYPTO_TFM_REQ_MASK);
  	err = crypto_ahash_setkey(ghash, (u8 *)&data->hash, sizeof(be128));
  	crypto_aead_set_flags(aead, crypto_ahash_get_flags(ghash) &
  			      CRYPTO_TFM_RES_MASK);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
151

84c911523   Herbert Xu   [CRYPTO] gcm: Add...
152
153
  out:
  	kfree(data);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
154
155
  	return err;
  }
dadbc53d0   Herbert Xu   [CRYPTO] gcm: Int...
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
  static int crypto_gcm_setauthsize(struct crypto_aead *tfm,
  				  unsigned int authsize)
  {
  	switch (authsize) {
  	case 4:
  	case 8:
  	case 12:
  	case 13:
  	case 14:
  	case 15:
  	case 16:
  		break;
  	default:
  		return -EINVAL;
  	}
  
  	return 0;
  }
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
174
175
176
  static void crypto_gcm_init_crypt(struct ablkcipher_request *ablk_req,
  				  struct aead_request *req,
  				  unsigned int cryptlen)
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
177
178
179
  {
  	struct crypto_aead *aead = crypto_aead_reqtfm(req);
  	struct crypto_gcm_ctx *ctx = crypto_aead_ctx(aead);
2589469d7   Herbert Xu   [CRYPTO] gcm: Fix...
180
  	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
  	struct scatterlist *dst;
  	__be32 counter = cpu_to_be32(1);
  
  	memset(pctx->auth_tag, 0, sizeof(pctx->auth_tag));
  	memcpy(req->iv + 12, &counter, 4);
  
  	sg_init_table(pctx->src, 2);
  	sg_set_buf(pctx->src, pctx->auth_tag, sizeof(pctx->auth_tag));
  	scatterwalk_sg_chain(pctx->src, 2, req->src);
  
  	dst = pctx->src;
  	if (req->src != req->dst) {
  		sg_init_table(pctx->dst, 2);
  		sg_set_buf(pctx->dst, pctx->auth_tag, sizeof(pctx->auth_tag));
  		scatterwalk_sg_chain(pctx->dst, 2, req->dst);
  		dst = pctx->dst;
  	}
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
198
199
  
  	ablkcipher_request_set_tfm(ablk_req, ctx->ctr);
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
200
201
202
  	ablkcipher_request_set_crypt(ablk_req, pctx->src, dst,
  				     cryptlen + sizeof(pctx->auth_tag),
  				     req->iv);
9382d97af   Huang Ying   crypto: gcm - Use...
203
204
205
206
207
208
209
210
211
212
  }
  
  static inline unsigned int gcm_remain(unsigned int len)
  {
  	len &= 0xfU;
  	return len ? 16 - len : 0;
  }
  
  static void gcm_hash_len_done(struct crypto_async_request *areq, int err);
  static void gcm_hash_final_done(struct crypto_async_request *areq, int err);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
213

9382d97af   Huang Ying   crypto: gcm - Use...
214
215
216
217
218
219
220
  static int gcm_hash_update(struct aead_request *req,
  			   struct crypto_gcm_req_priv_ctx *pctx,
  			   crypto_completion_t complete,
  			   struct scatterlist *src,
  			   unsigned int len)
  {
  	struct ahash_request *ahreq = &pctx->u.ahreq;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
221

9382d97af   Huang Ying   crypto: gcm - Use...
222
223
224
225
226
  	ahash_request_set_callback(ahreq, aead_request_flags(req),
  				   complete, req);
  	ahash_request_set_crypt(ahreq, src, NULL, len);
  
  	return crypto_ahash_update(ahreq);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
227
  }
9382d97af   Huang Ying   crypto: gcm - Use...
228
229
230
231
  static int gcm_hash_remain(struct aead_request *req,
  			   struct crypto_gcm_req_priv_ctx *pctx,
  			   unsigned int remain,
  			   crypto_completion_t complete)
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
232
  {
9382d97af   Huang Ying   crypto: gcm - Use...
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
  	struct ahash_request *ahreq = &pctx->u.ahreq;
  
  	ahash_request_set_callback(ahreq, aead_request_flags(req),
  				   complete, req);
  	sg_init_one(pctx->src, gcm_zeroes, remain);
  	ahash_request_set_crypt(ahreq, pctx->src, NULL, remain);
  
  	return crypto_ahash_update(ahreq);
  }
  
  static int gcm_hash_len(struct aead_request *req,
  			struct crypto_gcm_req_priv_ctx *pctx)
  {
  	struct ahash_request *ahreq = &pctx->u.ahreq;
  	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;
  	u128 lengths;
  
  	lengths.a = cpu_to_be64(req->assoclen * 8);
  	lengths.b = cpu_to_be64(gctx->cryptlen * 8);
  	memcpy(pctx->iauth_tag, &lengths, 16);
  	sg_init_one(pctx->src, pctx->iauth_tag, 16);
  	ahash_request_set_callback(ahreq, aead_request_flags(req),
  				   gcm_hash_len_done, req);
  	ahash_request_set_crypt(ahreq, pctx->src,
  				NULL, sizeof(lengths));
  
  	return crypto_ahash_update(ahreq);
  }
  
  static int gcm_hash_final(struct aead_request *req,
  			  struct crypto_gcm_req_priv_ctx *pctx)
  {
  	struct ahash_request *ahreq = &pctx->u.ahreq;
  
  	ahash_request_set_callback(ahreq, aead_request_flags(req),
  				   gcm_hash_final_done, req);
  	ahash_request_set_crypt(ahreq, NULL, pctx->iauth_tag, 0);
  
  	return crypto_ahash_final(ahreq);
  }
62c5593ae   Huang Ying   crypto: gcm - fix...
273
  static void __gcm_hash_final_done(struct aead_request *req, int err)
9382d97af   Huang Ying   crypto: gcm - Use...
274
  {
2589469d7   Herbert Xu   [CRYPTO] gcm: Fix...
275
  	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
9382d97af   Huang Ying   crypto: gcm - Use...
276
277
278
279
  	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;
  
  	if (!err)
  		crypto_xor(pctx->auth_tag, pctx->iauth_tag, 16);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
280

62c5593ae   Huang Ying   crypto: gcm - fix...
281
  	gctx->complete(req, err);
9382d97af   Huang Ying   crypto: gcm - Use...
282
  }
62c5593ae   Huang Ying   crypto: gcm - fix...
283
  static void gcm_hash_final_done(struct crypto_async_request *areq, int err)
9382d97af   Huang Ying   crypto: gcm - Use...
284
285
  {
  	struct aead_request *req = areq->data;
62c5593ae   Huang Ying   crypto: gcm - fix...
286
287
288
289
290
291
  
  	__gcm_hash_final_done(req, err);
  }
  
  static void __gcm_hash_len_done(struct aead_request *req, int err)
  {
9382d97af   Huang Ying   crypto: gcm - Use...
292
293
294
295
296
297
298
  	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
  
  	if (!err) {
  		err = gcm_hash_final(req, pctx);
  		if (err == -EINPROGRESS || err == -EBUSY)
  			return;
  	}
62c5593ae   Huang Ying   crypto: gcm - fix...
299
  	__gcm_hash_final_done(req, err);
9382d97af   Huang Ying   crypto: gcm - Use...
300
  }
62c5593ae   Huang Ying   crypto: gcm - fix...
301
  static void gcm_hash_len_done(struct crypto_async_request *areq, int err)
9382d97af   Huang Ying   crypto: gcm - Use...
302
303
  {
  	struct aead_request *req = areq->data;
62c5593ae   Huang Ying   crypto: gcm - fix...
304
305
306
307
308
309
  
  	__gcm_hash_len_done(req, err);
  }
  
  static void __gcm_hash_crypt_remain_done(struct aead_request *req, int err)
  {
9382d97af   Huang Ying   crypto: gcm - Use...
310
311
312
313
314
315
316
  	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
  
  	if (!err) {
  		err = gcm_hash_len(req, pctx);
  		if (err == -EINPROGRESS || err == -EBUSY)
  			return;
  	}
62c5593ae   Huang Ying   crypto: gcm - fix...
317
  	__gcm_hash_len_done(req, err);
9382d97af   Huang Ying   crypto: gcm - Use...
318
  }
62c5593ae   Huang Ying   crypto: gcm - fix...
319
320
  static void gcm_hash_crypt_remain_done(struct crypto_async_request *areq,
  				       int err)
9382d97af   Huang Ying   crypto: gcm - Use...
321
322
  {
  	struct aead_request *req = areq->data;
62c5593ae   Huang Ying   crypto: gcm - fix...
323
324
325
326
327
328
  
  	__gcm_hash_crypt_remain_done(req, err);
  }
  
  static void __gcm_hash_crypt_done(struct aead_request *req, int err)
  {
9382d97af   Huang Ying   crypto: gcm - Use...
329
330
331
332
333
334
335
336
337
338
339
340
  	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
  	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;
  	unsigned int remain;
  
  	if (!err) {
  		remain = gcm_remain(gctx->cryptlen);
  		BUG_ON(!remain);
  		err = gcm_hash_remain(req, pctx, remain,
  				      gcm_hash_crypt_remain_done);
  		if (err == -EINPROGRESS || err == -EBUSY)
  			return;
  	}
62c5593ae   Huang Ying   crypto: gcm - fix...
341
  	__gcm_hash_crypt_remain_done(req, err);
9382d97af   Huang Ying   crypto: gcm - Use...
342
  }
62c5593ae   Huang Ying   crypto: gcm - fix...
343
  static void gcm_hash_crypt_done(struct crypto_async_request *areq, int err)
9382d97af   Huang Ying   crypto: gcm - Use...
344
345
  {
  	struct aead_request *req = areq->data;
62c5593ae   Huang Ying   crypto: gcm - fix...
346
347
348
349
350
351
  
  	__gcm_hash_crypt_done(req, err);
  }
  
  static void __gcm_hash_assoc_remain_done(struct aead_request *req, int err)
  {
9382d97af   Huang Ying   crypto: gcm - Use...
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
  	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
  	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;
  	crypto_completion_t complete;
  	unsigned int remain = 0;
  
  	if (!err && gctx->cryptlen) {
  		remain = gcm_remain(gctx->cryptlen);
  		complete = remain ? gcm_hash_crypt_done :
  			gcm_hash_crypt_remain_done;
  		err = gcm_hash_update(req, pctx, complete,
  				      gctx->src, gctx->cryptlen);
  		if (err == -EINPROGRESS || err == -EBUSY)
  			return;
  	}
  
  	if (remain)
62c5593ae   Huang Ying   crypto: gcm - fix...
368
  		__gcm_hash_crypt_done(req, err);
9382d97af   Huang Ying   crypto: gcm - Use...
369
  	else
62c5593ae   Huang Ying   crypto: gcm - fix...
370
  		__gcm_hash_crypt_remain_done(req, err);
9382d97af   Huang Ying   crypto: gcm - Use...
371
  }
62c5593ae   Huang Ying   crypto: gcm - fix...
372
373
  static void gcm_hash_assoc_remain_done(struct crypto_async_request *areq,
  				       int err)
9382d97af   Huang Ying   crypto: gcm - Use...
374
375
  {
  	struct aead_request *req = areq->data;
62c5593ae   Huang Ying   crypto: gcm - fix...
376
377
378
379
380
381
  
  	__gcm_hash_assoc_remain_done(req, err);
  }
  
  static void __gcm_hash_assoc_done(struct aead_request *req, int err)
  {
9382d97af   Huang Ying   crypto: gcm - Use...
382
383
384
385
386
387
388
389
390
391
392
  	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
  	unsigned int remain;
  
  	if (!err) {
  		remain = gcm_remain(req->assoclen);
  		BUG_ON(!remain);
  		err = gcm_hash_remain(req, pctx, remain,
  				      gcm_hash_assoc_remain_done);
  		if (err == -EINPROGRESS || err == -EBUSY)
  			return;
  	}
62c5593ae   Huang Ying   crypto: gcm - fix...
393
  	__gcm_hash_assoc_remain_done(req, err);
9382d97af   Huang Ying   crypto: gcm - Use...
394
  }
62c5593ae   Huang Ying   crypto: gcm - fix...
395
  static void gcm_hash_assoc_done(struct crypto_async_request *areq, int err)
9382d97af   Huang Ying   crypto: gcm - Use...
396
397
  {
  	struct aead_request *req = areq->data;
62c5593ae   Huang Ying   crypto: gcm - fix...
398
399
400
401
402
403
  
  	__gcm_hash_assoc_done(req, err);
  }
  
  static void __gcm_hash_init_done(struct aead_request *req, int err)
  {
9382d97af   Huang Ying   crypto: gcm - Use...
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
  	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
  	crypto_completion_t complete;
  	unsigned int remain = 0;
  
  	if (!err && req->assoclen) {
  		remain = gcm_remain(req->assoclen);
  		complete = remain ? gcm_hash_assoc_done :
  			gcm_hash_assoc_remain_done;
  		err = gcm_hash_update(req, pctx, complete,
  				      req->assoc, req->assoclen);
  		if (err == -EINPROGRESS || err == -EBUSY)
  			return;
  	}
  
  	if (remain)
62c5593ae   Huang Ying   crypto: gcm - fix...
419
  		__gcm_hash_assoc_done(req, err);
9382d97af   Huang Ying   crypto: gcm - Use...
420
  	else
62c5593ae   Huang Ying   crypto: gcm - fix...
421
422
423
424
425
426
427
428
  		__gcm_hash_assoc_remain_done(req, err);
  }
  
  static void gcm_hash_init_done(struct crypto_async_request *areq, int err)
  {
  	struct aead_request *req = areq->data;
  
  	__gcm_hash_init_done(req, err);
9382d97af   Huang Ying   crypto: gcm - Use...
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
  }
  
  static int gcm_hash(struct aead_request *req,
  		    struct crypto_gcm_req_priv_ctx *pctx)
  {
  	struct ahash_request *ahreq = &pctx->u.ahreq;
  	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;
  	struct crypto_gcm_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
  	unsigned int remain;
  	crypto_completion_t complete;
  	int err;
  
  	ahash_request_set_tfm(ahreq, ctx->ghash);
  
  	ahash_request_set_callback(ahreq, aead_request_flags(req),
  				   gcm_hash_init_done, req);
  	err = crypto_ahash_init(ahreq);
  	if (err)
  		return err;
  	remain = gcm_remain(req->assoclen);
  	complete = remain ? gcm_hash_assoc_done : gcm_hash_assoc_remain_done;
  	err = gcm_hash_update(req, pctx, complete, req->assoc, req->assoclen);
  	if (err)
  		return err;
  	if (remain) {
  		err = gcm_hash_remain(req, pctx, remain,
  				      gcm_hash_assoc_remain_done);
  		if (err)
  			return err;
  	}
  	remain = gcm_remain(gctx->cryptlen);
  	complete = remain ? gcm_hash_crypt_done : gcm_hash_crypt_remain_done;
  	err = gcm_hash_update(req, pctx, complete, gctx->src, gctx->cryptlen);
  	if (err)
  		return err;
  	if (remain) {
  		err = gcm_hash_remain(req, pctx, remain,
  				      gcm_hash_crypt_remain_done);
  		if (err)
  			return err;
  	}
  	err = gcm_hash_len(req, pctx);
  	if (err)
  		return err;
  	err = gcm_hash_final(req, pctx);
  	if (err)
  		return err;
  
  	return 0;
  }
  
  static void gcm_enc_copy_hash(struct aead_request *req,
  			      struct crypto_gcm_req_priv_ctx *pctx)
  {
  	struct crypto_aead *aead = crypto_aead_reqtfm(req);
  	u8 *auth_tag = pctx->auth_tag;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
485

6160b2899   Herbert Xu   [CRYPTO] gcm: Fix...
486
487
  	scatterwalk_map_and_copy(auth_tag, req->dst, req->cryptlen,
  				 crypto_aead_authsize(aead), 1);
6160b2899   Herbert Xu   [CRYPTO] gcm: Fix...
488
  }
62c5593ae   Huang Ying   crypto: gcm - fix...
489
  static void gcm_enc_hash_done(struct aead_request *req, int err)
6160b2899   Herbert Xu   [CRYPTO] gcm: Fix...
490
  {
9382d97af   Huang Ying   crypto: gcm - Use...
491
  	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
6160b2899   Herbert Xu   [CRYPTO] gcm: Fix...
492
493
  
  	if (!err)
9382d97af   Huang Ying   crypto: gcm - Use...
494
  		gcm_enc_copy_hash(req, pctx);
6160b2899   Herbert Xu   [CRYPTO] gcm: Fix...
495

28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
496
497
  	aead_request_complete(req, err);
  }
62c5593ae   Huang Ying   crypto: gcm - fix...
498
  static void gcm_encrypt_done(struct crypto_async_request *areq, int err)
9382d97af   Huang Ying   crypto: gcm - Use...
499
500
501
502
503
504
505
506
  {
  	struct aead_request *req = areq->data;
  	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
  
  	if (!err) {
  		err = gcm_hash(req, pctx);
  		if (err == -EINPROGRESS || err == -EBUSY)
  			return;
62c5593ae   Huang Ying   crypto: gcm - fix...
507
508
509
510
  		else if (!err) {
  			crypto_xor(pctx->auth_tag, pctx->iauth_tag, 16);
  			gcm_enc_copy_hash(req, pctx);
  		}
9382d97af   Huang Ying   crypto: gcm - Use...
511
  	}
62c5593ae   Huang Ying   crypto: gcm - fix...
512
  	aead_request_complete(req, err);
9382d97af   Huang Ying   crypto: gcm - Use...
513
  }
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
514
515
  static int crypto_gcm_encrypt(struct aead_request *req)
  {
2589469d7   Herbert Xu   [CRYPTO] gcm: Fix...
516
  	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
9382d97af   Huang Ying   crypto: gcm - Use...
517
518
  	struct ablkcipher_request *abreq = &pctx->u.abreq;
  	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
519
520
521
522
  	int err;
  
  	crypto_gcm_init_crypt(abreq, req, req->cryptlen);
  	ablkcipher_request_set_callback(abreq, aead_request_flags(req),
9382d97af   Huang Ying   crypto: gcm - Use...
523
524
525
526
527
  					gcm_encrypt_done, req);
  
  	gctx->src = req->dst;
  	gctx->cryptlen = req->cryptlen;
  	gctx->complete = gcm_enc_hash_done;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
528

84c911523   Herbert Xu   [CRYPTO] gcm: Add...
529
  	err = crypto_ablkcipher_encrypt(abreq);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
530
531
  	if (err)
  		return err;
9382d97af   Huang Ying   crypto: gcm - Use...
532
533
534
535
536
537
538
539
  	err = gcm_hash(req, pctx);
  	if (err)
  		return err;
  
  	crypto_xor(pctx->auth_tag, pctx->iauth_tag, 16);
  	gcm_enc_copy_hash(req, pctx);
  
  	return 0;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
540
  }
9382d97af   Huang Ying   crypto: gcm - Use...
541
542
  static int crypto_gcm_verify(struct aead_request *req,
  			     struct crypto_gcm_req_priv_ctx *pctx)
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
543
544
  {
  	struct crypto_aead *aead = crypto_aead_reqtfm(req);
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
545
546
547
548
  	u8 *auth_tag = pctx->auth_tag;
  	u8 *iauth_tag = pctx->iauth_tag;
  	unsigned int authsize = crypto_aead_authsize(aead);
  	unsigned int cryptlen = req->cryptlen - authsize;
9382d97af   Huang Ying   crypto: gcm - Use...
549
  	crypto_xor(auth_tag, iauth_tag, 16);
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
550
  	scatterwalk_map_and_copy(iauth_tag, req->src, cryptlen, authsize, 0);
6bf37e5aa   James Yonan   crypto: crypto_me...
551
  	return crypto_memneq(iauth_tag, auth_tag, authsize) ? -EBADMSG : 0;
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
552
  }
9382d97af   Huang Ying   crypto: gcm - Use...
553
  static void gcm_decrypt_done(struct crypto_async_request *areq, int err)
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
554
  {
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
555
  	struct aead_request *req = areq->data;
9382d97af   Huang Ying   crypto: gcm - Use...
556
  	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
557
558
  
  	if (!err)
9382d97af   Huang Ying   crypto: gcm - Use...
559
  		err = crypto_gcm_verify(req, pctx);
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
560
561
  
  	aead_request_complete(req, err);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
562
  }
62c5593ae   Huang Ying   crypto: gcm - fix...
563
  static void gcm_dec_hash_done(struct aead_request *req, int err)
9382d97af   Huang Ying   crypto: gcm - Use...
564
  {
9382d97af   Huang Ying   crypto: gcm - Use...
565
566
567
568
569
570
571
572
573
574
575
  	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
  	struct ablkcipher_request *abreq = &pctx->u.abreq;
  	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;
  
  	if (!err) {
  		ablkcipher_request_set_callback(abreq, aead_request_flags(req),
  						gcm_decrypt_done, req);
  		crypto_gcm_init_crypt(abreq, req, gctx->cryptlen);
  		err = crypto_ablkcipher_decrypt(abreq);
  		if (err == -EINPROGRESS || err == -EBUSY)
  			return;
62c5593ae   Huang Ying   crypto: gcm - fix...
576
577
  		else if (!err)
  			err = crypto_gcm_verify(req, pctx);
9382d97af   Huang Ying   crypto: gcm - Use...
578
  	}
62c5593ae   Huang Ying   crypto: gcm - fix...
579
  	aead_request_complete(req, err);
9382d97af   Huang Ying   crypto: gcm - Use...
580
  }
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
581
582
  static int crypto_gcm_decrypt(struct aead_request *req)
  {
6160b2899   Herbert Xu   [CRYPTO] gcm: Fix...
583
  	struct crypto_aead *aead = crypto_aead_reqtfm(req);
2589469d7   Herbert Xu   [CRYPTO] gcm: Fix...
584
  	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
9382d97af   Huang Ying   crypto: gcm - Use...
585
586
  	struct ablkcipher_request *abreq = &pctx->u.abreq;
  	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;
6160b2899   Herbert Xu   [CRYPTO] gcm: Fix...
587
  	unsigned int authsize = crypto_aead_authsize(aead);
9382d97af   Huang Ying   crypto: gcm - Use...
588
  	unsigned int cryptlen = req->cryptlen;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
589
  	int err;
6160b2899   Herbert Xu   [CRYPTO] gcm: Fix...
590
  	if (cryptlen < authsize)
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
591
  		return -EINVAL;
6160b2899   Herbert Xu   [CRYPTO] gcm: Fix...
592
  	cryptlen -= authsize;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
593

9382d97af   Huang Ying   crypto: gcm - Use...
594
595
596
  	gctx->src = req->src;
  	gctx->cryptlen = cryptlen;
  	gctx->complete = gcm_dec_hash_done;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
597

9382d97af   Huang Ying   crypto: gcm - Use...
598
599
600
  	err = gcm_hash(req, pctx);
  	if (err)
  		return err;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
601

9382d97af   Huang Ying   crypto: gcm - Use...
602
603
604
  	ablkcipher_request_set_callback(abreq, aead_request_flags(req),
  					gcm_decrypt_done, req);
  	crypto_gcm_init_crypt(abreq, req, cryptlen);
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
605
606
607
  	err = crypto_ablkcipher_decrypt(abreq);
  	if (err)
  		return err;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
608

9382d97af   Huang Ying   crypto: gcm - Use...
609
  	return crypto_gcm_verify(req, pctx);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
610
611
612
613
614
615
616
617
  }
  
  static int crypto_gcm_init_tfm(struct crypto_tfm *tfm)
  {
  	struct crypto_instance *inst = (void *)tfm->__crt_alg;
  	struct gcm_instance_ctx *ictx = crypto_instance_ctx(inst);
  	struct crypto_gcm_ctx *ctx = crypto_tfm_ctx(tfm);
  	struct crypto_ablkcipher *ctr;
9382d97af   Huang Ying   crypto: gcm - Use...
618
  	struct crypto_ahash *ghash;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
619
620
  	unsigned long align;
  	int err;
9382d97af   Huang Ying   crypto: gcm - Use...
621
622
623
  	ghash = crypto_spawn_ahash(&ictx->ghash);
  	if (IS_ERR(ghash))
  		return PTR_ERR(ghash);
1472e5eba   Herbert Xu   [CRYPTO] gcm: Use...
624
  	ctr = crypto_spawn_skcipher(&ictx->ctr);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
625
626
  	err = PTR_ERR(ctr);
  	if (IS_ERR(ctr))
9382d97af   Huang Ying   crypto: gcm - Use...
627
  		goto err_free_hash;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
628
629
  
  	ctx->ctr = ctr;
9382d97af   Huang Ying   crypto: gcm - Use...
630
  	ctx->ghash = ghash;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
631

2589469d7   Herbert Xu   [CRYPTO] gcm: Fix...
632
  	align = crypto_tfm_alg_alignmask(tfm);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
633
  	align &= ~(crypto_tfm_ctx_alignment() - 1);
7f6813786   Herbert Xu   [CRYPTO] gcm: Put...
634
  	tfm->crt_aead.reqsize = align +
9382d97af   Huang Ying   crypto: gcm - Use...
635
636
637
638
639
  		offsetof(struct crypto_gcm_req_priv_ctx, u) +
  		max(sizeof(struct ablkcipher_request) +
  		    crypto_ablkcipher_reqsize(ctr),
  		    sizeof(struct ahash_request) +
  		    crypto_ahash_reqsize(ghash));
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
640
641
  
  	return 0;
9382d97af   Huang Ying   crypto: gcm - Use...
642
643
644
645
  
  err_free_hash:
  	crypto_free_ahash(ghash);
  	return err;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
646
647
648
649
650
  }
  
  static void crypto_gcm_exit_tfm(struct crypto_tfm *tfm)
  {
  	struct crypto_gcm_ctx *ctx = crypto_tfm_ctx(tfm);
9382d97af   Huang Ying   crypto: gcm - Use...
651
  	crypto_free_ahash(ctx->ghash);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
652
653
  	crypto_free_ablkcipher(ctx->ctr);
  }
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
654
655
  static struct crypto_instance *crypto_gcm_alloc_common(struct rtattr **tb,
  						       const char *full_name,
9382d97af   Huang Ying   crypto: gcm - Use...
656
657
  						       const char *ctr_name,
  						       const char *ghash_name)
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
658
  {
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
659
  	struct crypto_attr_type *algt;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
660
661
  	struct crypto_instance *inst;
  	struct crypto_alg *ctr;
9382d97af   Huang Ying   crypto: gcm - Use...
662
663
  	struct crypto_alg *ghash_alg;
  	struct ahash_alg *ghash_ahash_alg;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
664
665
  	struct gcm_instance_ctx *ctx;
  	int err;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
666

d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
667
  	algt = crypto_get_attr_type(tb);
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
668
  	if (IS_ERR(algt))
3e8afe35c   Julia Lawall   crypto: use ERR_CAST
669
  		return ERR_CAST(algt);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
670

d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
671
672
  	if ((algt->type ^ CRYPTO_ALG_TYPE_AEAD) & algt->mask)
  		return ERR_PTR(-EINVAL);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
673

9382d97af   Huang Ying   crypto: gcm - Use...
674
675
676
  	ghash_alg = crypto_find_alg(ghash_name, &crypto_ahash_type,
  				    CRYPTO_ALG_TYPE_HASH,
  				    CRYPTO_ALG_TYPE_AHASH_MASK);
9382d97af   Huang Ying   crypto: gcm - Use...
677
  	if (IS_ERR(ghash_alg))
3e8afe35c   Julia Lawall   crypto: use ERR_CAST
678
  		return ERR_CAST(ghash_alg);
9382d97af   Huang Ying   crypto: gcm - Use...
679
680
  
  	err = -ENOMEM;
1472e5eba   Herbert Xu   [CRYPTO] gcm: Use...
681
682
  	inst = kzalloc(sizeof(*inst) + sizeof(*ctx), GFP_KERNEL);
  	if (!inst)
9382d97af   Huang Ying   crypto: gcm - Use...
683
  		goto out_put_ghash;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
684

1472e5eba   Herbert Xu   [CRYPTO] gcm: Use...
685
  	ctx = crypto_instance_ctx(inst);
9382d97af   Huang Ying   crypto: gcm - Use...
686
687
688
689
690
  	ghash_ahash_alg = container_of(ghash_alg, struct ahash_alg, halg.base);
  	err = crypto_init_ahash_spawn(&ctx->ghash, &ghash_ahash_alg->halg,
  				      inst);
  	if (err)
  		goto err_free_inst;
1472e5eba   Herbert Xu   [CRYPTO] gcm: Use...
691
692
693
694
695
  	crypto_set_skcipher_spawn(&ctx->ctr, inst);
  	err = crypto_grab_skcipher(&ctx->ctr, ctr_name, 0,
  				   crypto_requires_sync(algt->type,
  							algt->mask));
  	if (err)
9382d97af   Huang Ying   crypto: gcm - Use...
696
  		goto err_drop_ghash;
1472e5eba   Herbert Xu   [CRYPTO] gcm: Use...
697
698
  
  	ctr = crypto_skcipher_spawn_alg(&ctx->ctr);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
699

d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
700
  	/* We only support 16-byte blocks. */
1472e5eba   Herbert Xu   [CRYPTO] gcm: Use...
701
  	if (ctr->cra_ablkcipher.ivsize != 16)
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
702
703
704
705
706
  		goto out_put_ctr;
  
  	/* Not a stream cipher? */
  	err = -EINVAL;
  	if (ctr->cra_blocksize != 1)
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
707
  		goto out_put_ctr;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
708
  	err = -ENAMETOOLONG;
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
709
  	if (snprintf(inst->alg.cra_driver_name, CRYPTO_MAX_ALG_NAME,
9382d97af   Huang Ying   crypto: gcm - Use...
710
711
  		     "gcm_base(%s,%s)", ctr->cra_driver_name,
  		     ghash_alg->cra_driver_name) >=
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
712
  	    CRYPTO_MAX_ALG_NAME)
1472e5eba   Herbert Xu   [CRYPTO] gcm: Use...
713
  		goto out_put_ctr;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
714

d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
715
  	memcpy(inst->alg.cra_name, full_name, CRYPTO_MAX_ALG_NAME);
1472e5eba   Herbert Xu   [CRYPTO] gcm: Use...
716
717
  	inst->alg.cra_flags = CRYPTO_ALG_TYPE_AEAD;
  	inst->alg.cra_flags |= ctr->cra_flags & CRYPTO_ALG_ASYNC;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
718
  	inst->alg.cra_priority = ctr->cra_priority;
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
719
  	inst->alg.cra_blocksize = 1;
2589469d7   Herbert Xu   [CRYPTO] gcm: Fix...
720
  	inst->alg.cra_alignmask = ctr->cra_alignmask | (__alignof__(u64) - 1);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
721
  	inst->alg.cra_type = &crypto_aead_type;
84c911523   Herbert Xu   [CRYPTO] gcm: Add...
722
  	inst->alg.cra_aead.ivsize = 16;
7ba683a6d   Herbert Xu   [CRYPTO] aead: Ma...
723
  	inst->alg.cra_aead.maxauthsize = 16;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
724
725
726
727
  	inst->alg.cra_ctxsize = sizeof(struct crypto_gcm_ctx);
  	inst->alg.cra_init = crypto_gcm_init_tfm;
  	inst->alg.cra_exit = crypto_gcm_exit_tfm;
  	inst->alg.cra_aead.setkey = crypto_gcm_setkey;
dadbc53d0   Herbert Xu   [CRYPTO] gcm: Int...
728
  	inst->alg.cra_aead.setauthsize = crypto_gcm_setauthsize;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
729
730
731
732
  	inst->alg.cra_aead.encrypt = crypto_gcm_encrypt;
  	inst->alg.cra_aead.decrypt = crypto_gcm_decrypt;
  
  out:
9382d97af   Huang Ying   crypto: gcm - Use...
733
  	crypto_mod_put(ghash_alg);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
734
  	return inst;
1472e5eba   Herbert Xu   [CRYPTO] gcm: Use...
735
736
737
  
  out_put_ctr:
  	crypto_drop_skcipher(&ctx->ctr);
9382d97af   Huang Ying   crypto: gcm - Use...
738
739
  err_drop_ghash:
  	crypto_drop_ahash(&ctx->ghash);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
740
741
  err_free_inst:
  	kfree(inst);
9382d97af   Huang Ying   crypto: gcm - Use...
742
  out_put_ghash:
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
743
744
745
  	inst = ERR_PTR(err);
  	goto out;
  }
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
746
747
  static struct crypto_instance *crypto_gcm_alloc(struct rtattr **tb)
  {
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
748
749
750
751
752
  	const char *cipher_name;
  	char ctr_name[CRYPTO_MAX_ALG_NAME];
  	char full_name[CRYPTO_MAX_ALG_NAME];
  
  	cipher_name = crypto_attr_alg_name(tb[1]);
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
753
  	if (IS_ERR(cipher_name))
3e8afe35c   Julia Lawall   crypto: use ERR_CAST
754
  		return ERR_CAST(cipher_name);
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
755
756
757
758
759
760
761
762
  
  	if (snprintf(ctr_name, CRYPTO_MAX_ALG_NAME, "ctr(%s)", cipher_name) >=
  	    CRYPTO_MAX_ALG_NAME)
  		return ERR_PTR(-ENAMETOOLONG);
  
  	if (snprintf(full_name, CRYPTO_MAX_ALG_NAME, "gcm(%s)", cipher_name) >=
  	    CRYPTO_MAX_ALG_NAME)
  		return ERR_PTR(-ENAMETOOLONG);
9382d97af   Huang Ying   crypto: gcm - Use...
763
  	return crypto_gcm_alloc_common(tb, full_name, ctr_name, "ghash");
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
764
  }
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
765
766
767
  static void crypto_gcm_free(struct crypto_instance *inst)
  {
  	struct gcm_instance_ctx *ctx = crypto_instance_ctx(inst);
1472e5eba   Herbert Xu   [CRYPTO] gcm: Use...
768
  	crypto_drop_skcipher(&ctx->ctr);
9382d97af   Huang Ying   crypto: gcm - Use...
769
  	crypto_drop_ahash(&ctx->ghash);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
770
771
772
773
774
775
776
777
778
  	kfree(inst);
  }
  
  static struct crypto_template crypto_gcm_tmpl = {
  	.name = "gcm",
  	.alloc = crypto_gcm_alloc,
  	.free = crypto_gcm_free,
  	.module = THIS_MODULE,
  };
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
779
780
  static struct crypto_instance *crypto_gcm_base_alloc(struct rtattr **tb)
  {
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
781
  	const char *ctr_name;
9382d97af   Huang Ying   crypto: gcm - Use...
782
  	const char *ghash_name;
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
783
784
785
  	char full_name[CRYPTO_MAX_ALG_NAME];
  
  	ctr_name = crypto_attr_alg_name(tb[1]);
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
786
  	if (IS_ERR(ctr_name))
3e8afe35c   Julia Lawall   crypto: use ERR_CAST
787
  		return ERR_CAST(ctr_name);
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
788

9382d97af   Huang Ying   crypto: gcm - Use...
789
  	ghash_name = crypto_attr_alg_name(tb[2]);
9382d97af   Huang Ying   crypto: gcm - Use...
790
  	if (IS_ERR(ghash_name))
3e8afe35c   Julia Lawall   crypto: use ERR_CAST
791
  		return ERR_CAST(ghash_name);
9382d97af   Huang Ying   crypto: gcm - Use...
792
793
794
  
  	if (snprintf(full_name, CRYPTO_MAX_ALG_NAME, "gcm_base(%s,%s)",
  		     ctr_name, ghash_name) >= CRYPTO_MAX_ALG_NAME)
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
795
  		return ERR_PTR(-ENAMETOOLONG);
9382d97af   Huang Ying   crypto: gcm - Use...
796
  	return crypto_gcm_alloc_common(tb, full_name, ctr_name, ghash_name);
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
797
798
799
800
801
802
803
804
  }
  
  static struct crypto_template crypto_gcm_base_tmpl = {
  	.name = "gcm_base",
  	.alloc = crypto_gcm_base_alloc,
  	.free = crypto_gcm_free,
  	.module = THIS_MODULE,
  };
dadbc53d0   Herbert Xu   [CRYPTO] gcm: Int...
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
  static int crypto_rfc4106_setkey(struct crypto_aead *parent, const u8 *key,
  				 unsigned int keylen)
  {
  	struct crypto_rfc4106_ctx *ctx = crypto_aead_ctx(parent);
  	struct crypto_aead *child = ctx->child;
  	int err;
  
  	if (keylen < 4)
  		return -EINVAL;
  
  	keylen -= 4;
  	memcpy(ctx->nonce, key + keylen, 4);
  
  	crypto_aead_clear_flags(child, CRYPTO_TFM_REQ_MASK);
  	crypto_aead_set_flags(child, crypto_aead_get_flags(parent) &
  				     CRYPTO_TFM_REQ_MASK);
  	err = crypto_aead_setkey(child, key, keylen);
  	crypto_aead_set_flags(parent, crypto_aead_get_flags(child) &
  				      CRYPTO_TFM_RES_MASK);
  
  	return err;
  }
  
  static int crypto_rfc4106_setauthsize(struct crypto_aead *parent,
  				      unsigned int authsize)
  {
  	struct crypto_rfc4106_ctx *ctx = crypto_aead_ctx(parent);
  
  	switch (authsize) {
  	case 8:
  	case 12:
  	case 16:
  		break;
  	default:
  		return -EINVAL;
  	}
  
  	return crypto_aead_setauthsize(ctx->child, authsize);
  }
  
  static struct aead_request *crypto_rfc4106_crypt(struct aead_request *req)
  {
  	struct aead_request *subreq = aead_request_ctx(req);
  	struct crypto_aead *aead = crypto_aead_reqtfm(req);
  	struct crypto_rfc4106_ctx *ctx = crypto_aead_ctx(aead);
  	struct crypto_aead *child = ctx->child;
  	u8 *iv = PTR_ALIGN((u8 *)(subreq + 1) + crypto_aead_reqsize(child),
  			   crypto_aead_alignmask(child) + 1);
  
  	memcpy(iv, ctx->nonce, 4);
  	memcpy(iv + 4, req->iv, 8);
  
  	aead_request_set_tfm(subreq, child);
  	aead_request_set_callback(subreq, req->base.flags, req->base.complete,
  				  req->base.data);
  	aead_request_set_crypt(subreq, req->src, req->dst, req->cryptlen, iv);
  	aead_request_set_assoc(subreq, req->assoc, req->assoclen);
  
  	return subreq;
  }
  
  static int crypto_rfc4106_encrypt(struct aead_request *req)
  {
  	req = crypto_rfc4106_crypt(req);
  
  	return crypto_aead_encrypt(req);
  }
  
  static int crypto_rfc4106_decrypt(struct aead_request *req)
  {
  	req = crypto_rfc4106_crypt(req);
  
  	return crypto_aead_decrypt(req);
  }
  
  static int crypto_rfc4106_init_tfm(struct crypto_tfm *tfm)
  {
  	struct crypto_instance *inst = (void *)tfm->__crt_alg;
  	struct crypto_aead_spawn *spawn = crypto_instance_ctx(inst);
  	struct crypto_rfc4106_ctx *ctx = crypto_tfm_ctx(tfm);
  	struct crypto_aead *aead;
  	unsigned long align;
  
  	aead = crypto_spawn_aead(spawn);
  	if (IS_ERR(aead))
  		return PTR_ERR(aead);
  
  	ctx->child = aead;
  
  	align = crypto_aead_alignmask(aead);
  	align &= ~(crypto_tfm_ctx_alignment() - 1);
  	tfm->crt_aead.reqsize = sizeof(struct aead_request) +
  				ALIGN(crypto_aead_reqsize(aead),
  				      crypto_tfm_ctx_alignment()) +
  				align + 16;
  
  	return 0;
  }
  
  static void crypto_rfc4106_exit_tfm(struct crypto_tfm *tfm)
  {
  	struct crypto_rfc4106_ctx *ctx = crypto_tfm_ctx(tfm);
  
  	crypto_free_aead(ctx->child);
  }
  
  static struct crypto_instance *crypto_rfc4106_alloc(struct rtattr **tb)
  {
  	struct crypto_attr_type *algt;
  	struct crypto_instance *inst;
  	struct crypto_aead_spawn *spawn;
  	struct crypto_alg *alg;
  	const char *ccm_name;
  	int err;
  
  	algt = crypto_get_attr_type(tb);
dadbc53d0   Herbert Xu   [CRYPTO] gcm: Int...
921
  	if (IS_ERR(algt))
3e8afe35c   Julia Lawall   crypto: use ERR_CAST
922
  		return ERR_CAST(algt);
dadbc53d0   Herbert Xu   [CRYPTO] gcm: Int...
923
924
925
926
927
  
  	if ((algt->type ^ CRYPTO_ALG_TYPE_AEAD) & algt->mask)
  		return ERR_PTR(-EINVAL);
  
  	ccm_name = crypto_attr_alg_name(tb[1]);
dadbc53d0   Herbert Xu   [CRYPTO] gcm: Int...
928
  	if (IS_ERR(ccm_name))
3e8afe35c   Julia Lawall   crypto: use ERR_CAST
929
  		return ERR_CAST(ccm_name);
dadbc53d0   Herbert Xu   [CRYPTO] gcm: Int...
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
  
  	inst = kzalloc(sizeof(*inst) + sizeof(*spawn), GFP_KERNEL);
  	if (!inst)
  		return ERR_PTR(-ENOMEM);
  
  	spawn = crypto_instance_ctx(inst);
  	crypto_set_aead_spawn(spawn, inst);
  	err = crypto_grab_aead(spawn, ccm_name, 0,
  			       crypto_requires_sync(algt->type, algt->mask));
  	if (err)
  		goto out_free_inst;
  
  	alg = crypto_aead_spawn_alg(spawn);
  
  	err = -EINVAL;
  
  	/* We only support 16-byte blocks. */
  	if (alg->cra_aead.ivsize != 16)
  		goto out_drop_alg;
  
  	/* Not a stream cipher? */
  	if (alg->cra_blocksize != 1)
  		goto out_drop_alg;
  
  	err = -ENAMETOOLONG;
  	if (snprintf(inst->alg.cra_name, CRYPTO_MAX_ALG_NAME,
  		     "rfc4106(%s)", alg->cra_name) >= CRYPTO_MAX_ALG_NAME ||
  	    snprintf(inst->alg.cra_driver_name, CRYPTO_MAX_ALG_NAME,
  		     "rfc4106(%s)", alg->cra_driver_name) >=
  	    CRYPTO_MAX_ALG_NAME)
  		goto out_drop_alg;
  
  	inst->alg.cra_flags = CRYPTO_ALG_TYPE_AEAD;
  	inst->alg.cra_flags |= alg->cra_flags & CRYPTO_ALG_ASYNC;
  	inst->alg.cra_priority = alg->cra_priority;
  	inst->alg.cra_blocksize = 1;
  	inst->alg.cra_alignmask = alg->cra_alignmask;
  	inst->alg.cra_type = &crypto_nivaead_type;
  
  	inst->alg.cra_aead.ivsize = 8;
  	inst->alg.cra_aead.maxauthsize = 16;
  
  	inst->alg.cra_ctxsize = sizeof(struct crypto_rfc4106_ctx);
  
  	inst->alg.cra_init = crypto_rfc4106_init_tfm;
  	inst->alg.cra_exit = crypto_rfc4106_exit_tfm;
  
  	inst->alg.cra_aead.setkey = crypto_rfc4106_setkey;
  	inst->alg.cra_aead.setauthsize = crypto_rfc4106_setauthsize;
  	inst->alg.cra_aead.encrypt = crypto_rfc4106_encrypt;
  	inst->alg.cra_aead.decrypt = crypto_rfc4106_decrypt;
  
  	inst->alg.cra_aead.geniv = "seqiv";
  
  out:
  	return inst;
  
  out_drop_alg:
  	crypto_drop_aead(spawn);
  out_free_inst:
  	kfree(inst);
  	inst = ERR_PTR(err);
  	goto out;
  }
  
  static void crypto_rfc4106_free(struct crypto_instance *inst)
  {
  	crypto_drop_spawn(crypto_instance_ctx(inst));
  	kfree(inst);
  }
  
  static struct crypto_template crypto_rfc4106_tmpl = {
  	.name = "rfc4106",
  	.alloc = crypto_rfc4106_alloc,
  	.free = crypto_rfc4106_free,
  	.module = THIS_MODULE,
  };
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
  static inline struct crypto_rfc4543_req_ctx *crypto_rfc4543_reqctx(
  	struct aead_request *req)
  {
  	unsigned long align = crypto_aead_alignmask(crypto_aead_reqtfm(req));
  
  	return (void *)PTR_ALIGN((u8 *)aead_request_ctx(req), align + 1);
  }
  
  static int crypto_rfc4543_setkey(struct crypto_aead *parent, const u8 *key,
  				 unsigned int keylen)
  {
  	struct crypto_rfc4543_ctx *ctx = crypto_aead_ctx(parent);
  	struct crypto_aead *child = ctx->child;
  	int err;
  
  	if (keylen < 4)
  		return -EINVAL;
  
  	keylen -= 4;
  	memcpy(ctx->nonce, key + keylen, 4);
  
  	crypto_aead_clear_flags(child, CRYPTO_TFM_REQ_MASK);
  	crypto_aead_set_flags(child, crypto_aead_get_flags(parent) &
  				     CRYPTO_TFM_REQ_MASK);
  	err = crypto_aead_setkey(child, key, keylen);
  	crypto_aead_set_flags(parent, crypto_aead_get_flags(child) &
  				      CRYPTO_TFM_RES_MASK);
  
  	return err;
  }
  
  static int crypto_rfc4543_setauthsize(struct crypto_aead *parent,
  				      unsigned int authsize)
  {
  	struct crypto_rfc4543_ctx *ctx = crypto_aead_ctx(parent);
  
  	if (authsize != 16)
  		return -EINVAL;
  
  	return crypto_aead_setauthsize(ctx->child, authsize);
  }
d733ac90f   Jussi Kivilinna   crypto: gcm - fix...
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
  static void crypto_rfc4543_done(struct crypto_async_request *areq, int err)
  {
  	struct aead_request *req = areq->data;
  	struct crypto_aead *aead = crypto_aead_reqtfm(req);
  	struct crypto_rfc4543_req_ctx *rctx = crypto_rfc4543_reqctx(req);
  
  	if (!err) {
  		scatterwalk_map_and_copy(rctx->auth_tag, req->dst,
  					 req->cryptlen,
  					 crypto_aead_authsize(aead), 1);
  	}
  
  	aead_request_complete(req, err);
  }
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1062
  static struct aead_request *crypto_rfc4543_crypt(struct aead_request *req,
9489667d3   Jussi Kivilinna   crypto: gcm - mak...
1063
  						 bool enc)
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1064
1065
1066
1067
1068
  {
  	struct crypto_aead *aead = crypto_aead_reqtfm(req);
  	struct crypto_rfc4543_ctx *ctx = crypto_aead_ctx(aead);
  	struct crypto_rfc4543_req_ctx *rctx = crypto_rfc4543_reqctx(req);
  	struct aead_request *subreq = &rctx->subreq;
9489667d3   Jussi Kivilinna   crypto: gcm - mak...
1069
  	struct scatterlist *src = req->src;
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1070
1071
1072
1073
1074
  	struct scatterlist *cipher = rctx->cipher;
  	struct scatterlist *payload = rctx->payload;
  	struct scatterlist *assoc = rctx->assoc;
  	unsigned int authsize = crypto_aead_authsize(aead);
  	unsigned int assoclen = req->assoclen;
9489667d3   Jussi Kivilinna   crypto: gcm - mak...
1075
1076
  	struct page *srcp;
  	u8 *vsrc;
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
  	u8 *iv = PTR_ALIGN((u8 *)(rctx + 1) + crypto_aead_reqsize(ctx->child),
  			   crypto_aead_alignmask(ctx->child) + 1);
  
  	memcpy(iv, ctx->nonce, 4);
  	memcpy(iv + 4, req->iv, 8);
  
  	/* construct cipher/plaintext */
  	if (enc)
  		memset(rctx->auth_tag, 0, authsize);
  	else
9489667d3   Jussi Kivilinna   crypto: gcm - mak...
1087
  		scatterwalk_map_and_copy(rctx->auth_tag, src,
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1088
1089
1090
1091
1092
1093
  					 req->cryptlen - authsize,
  					 authsize, 0);
  
  	sg_init_one(cipher, rctx->auth_tag, authsize);
  
  	/* construct the aad */
9489667d3   Jussi Kivilinna   crypto: gcm - mak...
1094
1095
  	srcp = sg_page(src);
  	vsrc = PageHighMem(srcp) ? NULL : page_address(srcp) + src->offset;
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1096
1097
1098
  
  	sg_init_table(payload, 2);
  	sg_set_buf(payload, req->iv, 8);
9489667d3   Jussi Kivilinna   crypto: gcm - mak...
1099
  	scatterwalk_crypto_chain(payload, src, vsrc == req->iv + 8, 2);
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1100
  	assoclen += 8 + req->cryptlen - (enc ? 0 : authsize);
d3dde5220   Jussi Kivilinna   crypto: gcm - fix...
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
  	if (req->assoc->length == req->assoclen) {
  		sg_init_table(assoc, 2);
  		sg_set_page(assoc, sg_page(req->assoc), req->assoc->length,
  			    req->assoc->offset);
  	} else {
  		BUG_ON(req->assoclen > sizeof(rctx->assocbuf));
  
  		scatterwalk_map_and_copy(rctx->assocbuf, req->assoc, 0,
  					 req->assoclen, 0);
  
  		sg_init_table(assoc, 2);
  		sg_set_buf(assoc, rctx->assocbuf, req->assoclen);
  	}
c920fa605   Steffen Klassert   crypto: Use scatt...
1114
  	scatterwalk_crypto_chain(assoc, payload, 0, 2);
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1115
1116
  
  	aead_request_set_tfm(subreq, ctx->child);
d733ac90f   Jussi Kivilinna   crypto: gcm - fix...
1117
1118
  	aead_request_set_callback(subreq, req->base.flags, crypto_rfc4543_done,
  				  req);
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1119
1120
1121
1122
1123
  	aead_request_set_crypt(subreq, cipher, cipher, enc ? 0 : authsize, iv);
  	aead_request_set_assoc(subreq, assoc, assoclen);
  
  	return subreq;
  }
9489667d3   Jussi Kivilinna   crypto: gcm - mak...
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
  static int crypto_rfc4543_copy_src_to_dst(struct aead_request *req, bool enc)
  {
  	struct crypto_aead *aead = crypto_aead_reqtfm(req);
  	struct crypto_rfc4543_ctx *ctx = crypto_aead_ctx(aead);
  	unsigned int authsize = crypto_aead_authsize(aead);
  	unsigned int nbytes = req->cryptlen - (enc ? 0 : authsize);
  	struct blkcipher_desc desc = {
  		.tfm = ctx->null,
  	};
  
  	return crypto_blkcipher_encrypt(&desc, req->dst, req->src, nbytes);
  }
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1136
1137
1138
1139
1140
1141
  static int crypto_rfc4543_encrypt(struct aead_request *req)
  {
  	struct crypto_aead *aead = crypto_aead_reqtfm(req);
  	struct crypto_rfc4543_req_ctx *rctx = crypto_rfc4543_reqctx(req);
  	struct aead_request *subreq;
  	int err;
9489667d3   Jussi Kivilinna   crypto: gcm - mak...
1142
1143
1144
1145
1146
1147
1148
  	if (req->src != req->dst) {
  		err = crypto_rfc4543_copy_src_to_dst(req, true);
  		if (err)
  			return err;
  	}
  
  	subreq = crypto_rfc4543_crypt(req, true);
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
  	err = crypto_aead_encrypt(subreq);
  	if (err)
  		return err;
  
  	scatterwalk_map_and_copy(rctx->auth_tag, req->dst, req->cryptlen,
  				 crypto_aead_authsize(aead), 1);
  
  	return 0;
  }
  
  static int crypto_rfc4543_decrypt(struct aead_request *req)
  {
9489667d3   Jussi Kivilinna   crypto: gcm - mak...
1161
1162
1163
1164
1165
1166
1167
1168
1169
  	int err;
  
  	if (req->src != req->dst) {
  		err = crypto_rfc4543_copy_src_to_dst(req, false);
  		if (err)
  			return err;
  	}
  
  	req = crypto_rfc4543_crypt(req, false);
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1170
1171
1172
1173
1174
1175
1176
  
  	return crypto_aead_decrypt(req);
  }
  
  static int crypto_rfc4543_init_tfm(struct crypto_tfm *tfm)
  {
  	struct crypto_instance *inst = (void *)tfm->__crt_alg;
9489667d3   Jussi Kivilinna   crypto: gcm - mak...
1177
1178
  	struct crypto_rfc4543_instance_ctx *ictx = crypto_instance_ctx(inst);
  	struct crypto_aead_spawn *spawn = &ictx->aead;
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1179
1180
  	struct crypto_rfc4543_ctx *ctx = crypto_tfm_ctx(tfm);
  	struct crypto_aead *aead;
9489667d3   Jussi Kivilinna   crypto: gcm - mak...
1181
  	struct crypto_blkcipher *null;
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1182
  	unsigned long align;
9489667d3   Jussi Kivilinna   crypto: gcm - mak...
1183
  	int err = 0;
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1184
1185
1186
1187
  
  	aead = crypto_spawn_aead(spawn);
  	if (IS_ERR(aead))
  		return PTR_ERR(aead);
9489667d3   Jussi Kivilinna   crypto: gcm - mak...
1188
1189
1190
1191
  	null = crypto_spawn_blkcipher(&ictx->null.base);
  	err = PTR_ERR(null);
  	if (IS_ERR(null))
  		goto err_free_aead;
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1192
  	ctx->child = aead;
9489667d3   Jussi Kivilinna   crypto: gcm - mak...
1193
  	ctx->null = null;
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1194
1195
1196
1197
1198
1199
1200
1201
1202
  
  	align = crypto_aead_alignmask(aead);
  	align &= ~(crypto_tfm_ctx_alignment() - 1);
  	tfm->crt_aead.reqsize = sizeof(struct crypto_rfc4543_req_ctx) +
  				ALIGN(crypto_aead_reqsize(aead),
  				      crypto_tfm_ctx_alignment()) +
  				align + 16;
  
  	return 0;
9489667d3   Jussi Kivilinna   crypto: gcm - mak...
1203
1204
1205
1206
  
  err_free_aead:
  	crypto_free_aead(aead);
  	return err;
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1207
1208
1209
1210
1211
1212
1213
  }
  
  static void crypto_rfc4543_exit_tfm(struct crypto_tfm *tfm)
  {
  	struct crypto_rfc4543_ctx *ctx = crypto_tfm_ctx(tfm);
  
  	crypto_free_aead(ctx->child);
9489667d3   Jussi Kivilinna   crypto: gcm - mak...
1214
  	crypto_free_blkcipher(ctx->null);
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1215
1216
1217
1218
1219
1220
1221
1222
  }
  
  static struct crypto_instance *crypto_rfc4543_alloc(struct rtattr **tb)
  {
  	struct crypto_attr_type *algt;
  	struct crypto_instance *inst;
  	struct crypto_aead_spawn *spawn;
  	struct crypto_alg *alg;
9489667d3   Jussi Kivilinna   crypto: gcm - mak...
1223
  	struct crypto_rfc4543_instance_ctx *ctx;
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1224
1225
1226
1227
  	const char *ccm_name;
  	int err;
  
  	algt = crypto_get_attr_type(tb);
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1228
  	if (IS_ERR(algt))
3e8afe35c   Julia Lawall   crypto: use ERR_CAST
1229
  		return ERR_CAST(algt);
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1230
1231
1232
1233
1234
  
  	if ((algt->type ^ CRYPTO_ALG_TYPE_AEAD) & algt->mask)
  		return ERR_PTR(-EINVAL);
  
  	ccm_name = crypto_attr_alg_name(tb[1]);
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1235
  	if (IS_ERR(ccm_name))
3e8afe35c   Julia Lawall   crypto: use ERR_CAST
1236
  		return ERR_CAST(ccm_name);
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1237

9489667d3   Jussi Kivilinna   crypto: gcm - mak...
1238
  	inst = kzalloc(sizeof(*inst) + sizeof(*ctx), GFP_KERNEL);
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1239
1240
  	if (!inst)
  		return ERR_PTR(-ENOMEM);
9489667d3   Jussi Kivilinna   crypto: gcm - mak...
1241
1242
  	ctx = crypto_instance_ctx(inst);
  	spawn = &ctx->aead;
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1243
1244
1245
1246
1247
1248
1249
  	crypto_set_aead_spawn(spawn, inst);
  	err = crypto_grab_aead(spawn, ccm_name, 0,
  			       crypto_requires_sync(algt->type, algt->mask));
  	if (err)
  		goto out_free_inst;
  
  	alg = crypto_aead_spawn_alg(spawn);
9489667d3   Jussi Kivilinna   crypto: gcm - mak...
1250
1251
1252
1253
1254
1255
1256
  	crypto_set_skcipher_spawn(&ctx->null, inst);
  	err = crypto_grab_skcipher(&ctx->null, "ecb(cipher_null)", 0,
  				   CRYPTO_ALG_ASYNC);
  	if (err)
  		goto out_drop_alg;
  
  	crypto_skcipher_spawn_alg(&ctx->null);
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1257
1258
1259
1260
  	err = -EINVAL;
  
  	/* We only support 16-byte blocks. */
  	if (alg->cra_aead.ivsize != 16)
9489667d3   Jussi Kivilinna   crypto: gcm - mak...
1261
  		goto out_drop_ecbnull;
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1262
1263
1264
  
  	/* Not a stream cipher? */
  	if (alg->cra_blocksize != 1)
9489667d3   Jussi Kivilinna   crypto: gcm - mak...
1265
  		goto out_drop_ecbnull;
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1266
1267
1268
1269
1270
1271
1272
  
  	err = -ENAMETOOLONG;
  	if (snprintf(inst->alg.cra_name, CRYPTO_MAX_ALG_NAME,
  		     "rfc4543(%s)", alg->cra_name) >= CRYPTO_MAX_ALG_NAME ||
  	    snprintf(inst->alg.cra_driver_name, CRYPTO_MAX_ALG_NAME,
  		     "rfc4543(%s)", alg->cra_driver_name) >=
  	    CRYPTO_MAX_ALG_NAME)
9489667d3   Jussi Kivilinna   crypto: gcm - mak...
1273
  		goto out_drop_ecbnull;
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
  
  	inst->alg.cra_flags = CRYPTO_ALG_TYPE_AEAD;
  	inst->alg.cra_flags |= alg->cra_flags & CRYPTO_ALG_ASYNC;
  	inst->alg.cra_priority = alg->cra_priority;
  	inst->alg.cra_blocksize = 1;
  	inst->alg.cra_alignmask = alg->cra_alignmask;
  	inst->alg.cra_type = &crypto_nivaead_type;
  
  	inst->alg.cra_aead.ivsize = 8;
  	inst->alg.cra_aead.maxauthsize = 16;
  
  	inst->alg.cra_ctxsize = sizeof(struct crypto_rfc4543_ctx);
  
  	inst->alg.cra_init = crypto_rfc4543_init_tfm;
  	inst->alg.cra_exit = crypto_rfc4543_exit_tfm;
  
  	inst->alg.cra_aead.setkey = crypto_rfc4543_setkey;
  	inst->alg.cra_aead.setauthsize = crypto_rfc4543_setauthsize;
  	inst->alg.cra_aead.encrypt = crypto_rfc4543_encrypt;
  	inst->alg.cra_aead.decrypt = crypto_rfc4543_decrypt;
  
  	inst->alg.cra_aead.geniv = "seqiv";
  
  out:
  	return inst;
9489667d3   Jussi Kivilinna   crypto: gcm - mak...
1299
1300
  out_drop_ecbnull:
  	crypto_drop_skcipher(&ctx->null);
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
  out_drop_alg:
  	crypto_drop_aead(spawn);
  out_free_inst:
  	kfree(inst);
  	inst = ERR_PTR(err);
  	goto out;
  }
  
  static void crypto_rfc4543_free(struct crypto_instance *inst)
  {
9489667d3   Jussi Kivilinna   crypto: gcm - mak...
1311
1312
1313
1314
  	struct crypto_rfc4543_instance_ctx *ctx = crypto_instance_ctx(inst);
  
  	crypto_drop_aead(&ctx->aead);
  	crypto_drop_skcipher(&ctx->null);
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1315
1316
1317
1318
1319
1320
1321
1322
1323
  	kfree(inst);
  }
  
  static struct crypto_template crypto_rfc4543_tmpl = {
  	.name = "rfc4543",
  	.alloc = crypto_rfc4543_alloc,
  	.free = crypto_rfc4543_free,
  	.module = THIS_MODULE,
  };
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
1324
1325
  static int __init crypto_gcm_module_init(void)
  {
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
1326
  	int err;
9382d97af   Huang Ying   crypto: gcm - Use...
1327
1328
1329
  	gcm_zeroes = kzalloc(16, GFP_KERNEL);
  	if (!gcm_zeroes)
  		return -ENOMEM;
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
1330
1331
1332
1333
1334
1335
1336
  	err = crypto_register_template(&crypto_gcm_base_tmpl);
  	if (err)
  		goto out;
  
  	err = crypto_register_template(&crypto_gcm_tmpl);
  	if (err)
  		goto out_undo_base;
dadbc53d0   Herbert Xu   [CRYPTO] gcm: Int...
1337
1338
1339
  	err = crypto_register_template(&crypto_rfc4106_tmpl);
  	if (err)
  		goto out_undo_gcm;
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1340
1341
1342
  	err = crypto_register_template(&crypto_rfc4543_tmpl);
  	if (err)
  		goto out_undo_rfc4106;
9382d97af   Huang Ying   crypto: gcm - Use...
1343
  	return 0;
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
1344

73c89c15b   Tobias Brunner   crypto: gcm - Add...
1345
1346
  out_undo_rfc4106:
  	crypto_unregister_template(&crypto_rfc4106_tmpl);
dadbc53d0   Herbert Xu   [CRYPTO] gcm: Int...
1347
1348
  out_undo_gcm:
  	crypto_unregister_template(&crypto_gcm_tmpl);
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
1349
1350
  out_undo_base:
  	crypto_unregister_template(&crypto_gcm_base_tmpl);
9382d97af   Huang Ying   crypto: gcm - Use...
1351
1352
1353
  out:
  	kfree(gcm_zeroes);
  	return err;
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
1354
1355
1356
1357
  }
  
  static void __exit crypto_gcm_module_exit(void)
  {
9382d97af   Huang Ying   crypto: gcm - Use...
1358
  	kfree(gcm_zeroes);
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1359
  	crypto_unregister_template(&crypto_rfc4543_tmpl);
dadbc53d0   Herbert Xu   [CRYPTO] gcm: Int...
1360
  	crypto_unregister_template(&crypto_rfc4106_tmpl);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
1361
  	crypto_unregister_template(&crypto_gcm_tmpl);
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
1362
  	crypto_unregister_template(&crypto_gcm_base_tmpl);
28db8e3e3   Mikko Herranen   [CRYPTO] gcm: New...
1363
1364
1365
1366
1367
1368
1369
1370
  }
  
  module_init(crypto_gcm_module_init);
  module_exit(crypto_gcm_module_exit);
  
  MODULE_LICENSE("GPL");
  MODULE_DESCRIPTION("Galois/Counter Mode");
  MODULE_AUTHOR("Mikko Herranen <mh1@iki.fi>");
d00aa19b5   Herbert Xu   [CRYPTO] gcm: All...
1371
  MODULE_ALIAS("gcm_base");
dadbc53d0   Herbert Xu   [CRYPTO] gcm: Int...
1372
  MODULE_ALIAS("rfc4106");
73c89c15b   Tobias Brunner   crypto: gcm - Add...
1373
  MODULE_ALIAS("rfc4543");