gcm.c 14.1 KB
Newer Older
M
Mikko Herranen 已提交
1 2 3 4 5 6 7 8 9 10 11
/*
 * GCM: Galois/Counter Mode.
 *
 * Copyright (c) 2007 Nokia Siemens Networks - Mikko Herranen <mh1@iki.fi>
 *
 * This program is free software; you can redistribute it and/or modify it
 * under the terms of the GNU General Public License version 2 as published
 * by the Free Software Foundation.
 */

#include <crypto/gf128mul.h>
12
#include <crypto/internal/skcipher.h>
13
#include <crypto/scatterwalk.h>
14
#include <linux/completion.h>
M
Mikko Herranen 已提交
15 16 17 18 19 20 21
#include <linux/err.h>
#include <linux/init.h>
#include <linux/kernel.h>
#include <linux/module.h>
#include <linux/slab.h>

struct gcm_instance_ctx {
22
	struct crypto_skcipher_spawn ctr;
M
Mikko Herranen 已提交
23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38
};

struct crypto_gcm_ctx {
	struct crypto_ablkcipher *ctr;
	struct gf128mul_4k *gf128;
};

struct crypto_gcm_ghash_ctx {
	u32 bytes;
	u32 flags;
	struct gf128mul_4k *gf128;
	u8 buffer[16];
};

struct crypto_gcm_req_priv_ctx {
	u8 auth_tag[16];
H
Herbert Xu 已提交
39
	u8 iauth_tag[16];
40 41
	struct scatterlist src[2];
	struct scatterlist dst[2];
M
Mikko Herranen 已提交
42
	struct crypto_gcm_ghash_ctx ghash;
43
	struct ablkcipher_request abreq;
M
Mikko Herranen 已提交
44 45
};

46 47 48 49 50
struct crypto_gcm_setkey_result {
	int err;
	struct completion completion;
};

51 52 53 54 55 56 57 58
static inline struct crypto_gcm_req_priv_ctx *crypto_gcm_reqctx(
	struct aead_request *req)
{
	unsigned long align = crypto_aead_alignmask(crypto_aead_reqtfm(req));

	return (void *)PTR_ALIGN((u8 *)aead_request_ctx(req), align + 1);
}

M
Mikko Herranen 已提交
59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107
static void crypto_gcm_ghash_init(struct crypto_gcm_ghash_ctx *ctx, u32 flags,
				  struct gf128mul_4k *gf128)
{
	ctx->bytes = 0;
	ctx->flags = flags;
	ctx->gf128 = gf128;
	memset(ctx->buffer, 0, 16);
}

static void crypto_gcm_ghash_update(struct crypto_gcm_ghash_ctx *ctx,
				    const u8 *src, unsigned int srclen)
{
	u8 *dst = ctx->buffer;

	if (ctx->bytes) {
		int n = min(srclen, ctx->bytes);
		u8 *pos = dst + (16 - ctx->bytes);

		ctx->bytes -= n;
		srclen -= n;

		while (n--)
			*pos++ ^= *src++;

		if (!ctx->bytes)
			gf128mul_4k_lle((be128 *)dst, ctx->gf128);
	}

	while (srclen >= 16) {
		crypto_xor(dst, src, 16);
		gf128mul_4k_lle((be128 *)dst, ctx->gf128);
		src += 16;
		srclen -= 16;
	}

	if (srclen) {
		ctx->bytes = 16 - srclen;
		while (srclen--)
			*dst++ ^= *src++;
	}
}

static void crypto_gcm_ghash_update_sg(struct crypto_gcm_ghash_ctx *ctx,
				       struct scatterlist *sg, int len)
{
	struct scatter_walk walk;
	u8 *src;
	int n;

H
Herbert Xu 已提交
108 109 110
	if (!len)
		return;

M
Mikko Herranen 已提交
111 112 113 114 115 116
	scatterwalk_start(&walk, sg);

	while (len) {
		n = scatterwalk_clamp(&walk, len);

		if (!n) {
117
			scatterwalk_start(&walk, scatterwalk_sg_next(walk.sg));
M
Mikko Herranen 已提交
118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165
			n = scatterwalk_clamp(&walk, len);
		}

		src = scatterwalk_map(&walk, 0);

		crypto_gcm_ghash_update(ctx, src, n);
		len -= n;

		scatterwalk_unmap(src, 0);
		scatterwalk_advance(&walk, n);
		scatterwalk_done(&walk, 0, len);
		if (len)
			crypto_yield(ctx->flags);
	}
}

static void crypto_gcm_ghash_flush(struct crypto_gcm_ghash_ctx *ctx)
{
	u8 *dst = ctx->buffer;

	if (ctx->bytes) {
		u8 *tmp = dst + (16 - ctx->bytes);

		while (ctx->bytes--)
			*tmp++ ^= 0;

		gf128mul_4k_lle((be128 *)dst, ctx->gf128);
	}

	ctx->bytes = 0;
}

static void crypto_gcm_ghash_final_xor(struct crypto_gcm_ghash_ctx *ctx,
				       unsigned int authlen,
				       unsigned int cryptlen, u8 *dst)
{
	u8 *buf = ctx->buffer;
	u128 lengths;

	lengths.a = cpu_to_be64(authlen * 8);
	lengths.b = cpu_to_be64(cryptlen * 8);

	crypto_gcm_ghash_flush(ctx);
	crypto_xor(buf, (u8 *)&lengths, 16);
	gf128mul_4k_lle((be128 *)buf, ctx->gf128);
	crypto_xor(dst, buf, 16);
}

166
static void crypto_gcm_setkey_done(struct crypto_async_request *req, int err)
M
Mikko Herranen 已提交
167
{
168
	struct crypto_gcm_setkey_result *result = req->data;
M
Mikko Herranen 已提交
169

170 171 172 173 174
	if (err == -EINPROGRESS)
		return;

	result->err = err;
	complete(&result->completion);
M
Mikko Herranen 已提交
175 176 177 178 179 180 181
}

static int crypto_gcm_setkey(struct crypto_aead *aead, const u8 *key,
			     unsigned int keylen)
{
	struct crypto_gcm_ctx *ctx = crypto_aead_ctx(aead);
	struct crypto_ablkcipher *ctr = ctx->ctr;
182 183 184 185 186 187 188 189 190 191
	struct {
		be128 hash;
		u8 iv[8];

		struct crypto_gcm_setkey_result result;

		struct scatterlist sg[1];
		struct ablkcipher_request req;
	} *data;
	int err;
M
Mikko Herranen 已提交
192 193 194 195 196 197 198

	crypto_ablkcipher_clear_flags(ctr, CRYPTO_TFM_REQ_MASK);
	crypto_ablkcipher_set_flags(ctr, crypto_aead_get_flags(aead) &
				   CRYPTO_TFM_REQ_MASK);

	err = crypto_ablkcipher_setkey(ctr, key, keylen);
	if (err)
199
		return err;
M
Mikko Herranen 已提交
200 201 202 203

	crypto_aead_set_flags(aead, crypto_ablkcipher_get_flags(ctr) &
				       CRYPTO_TFM_RES_MASK);

204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226
	data = kzalloc(sizeof(*data) + crypto_ablkcipher_reqsize(ctr),
		       GFP_KERNEL);
	if (!data)
		return -ENOMEM;

	init_completion(&data->result.completion);
	sg_init_one(data->sg, &data->hash, sizeof(data->hash));
	ablkcipher_request_set_tfm(&data->req, ctr);
	ablkcipher_request_set_callback(&data->req, CRYPTO_TFM_REQ_MAY_SLEEP |
						    CRYPTO_TFM_REQ_MAY_BACKLOG,
					crypto_gcm_setkey_done,
					&data->result);
	ablkcipher_request_set_crypt(&data->req, data->sg, data->sg,
				     sizeof(data->hash), data->iv);

	err = crypto_ablkcipher_encrypt(&data->req);
	if (err == -EINPROGRESS || err == -EBUSY) {
		err = wait_for_completion_interruptible(
			&data->result.completion);
		if (!err)
			err = data->result.err;
	}

M
Mikko Herranen 已提交
227 228 229 230 231 232
	if (err)
		goto out;

	if (ctx->gf128 != NULL)
		gf128mul_free_4k(ctx->gf128);

233
	ctx->gf128 = gf128mul_init_4k_lle(&data->hash);
M
Mikko Herranen 已提交
234 235 236 237

	if (ctx->gf128 == NULL)
		err = -ENOMEM;

238 239
out:
	kfree(data);
M
Mikko Herranen 已提交
240 241 242
	return err;
}

243 244 245
static void crypto_gcm_init_crypt(struct ablkcipher_request *ablk_req,
				  struct aead_request *req,
				  unsigned int cryptlen)
M
Mikko Herranen 已提交
246 247 248
{
	struct crypto_aead *aead = crypto_aead_reqtfm(req);
	struct crypto_gcm_ctx *ctx = crypto_aead_ctx(aead);
249
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
M
Mikko Herranen 已提交
250 251
	u32 flags = req->base.tfm->crt_flags;
	struct crypto_gcm_ghash_ctx *ghash = &pctx->ghash;
252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268
	struct scatterlist *dst;
	__be32 counter = cpu_to_be32(1);

	memset(pctx->auth_tag, 0, sizeof(pctx->auth_tag));
	memcpy(req->iv + 12, &counter, 4);

	sg_init_table(pctx->src, 2);
	sg_set_buf(pctx->src, pctx->auth_tag, sizeof(pctx->auth_tag));
	scatterwalk_sg_chain(pctx->src, 2, req->src);

	dst = pctx->src;
	if (req->src != req->dst) {
		sg_init_table(pctx->dst, 2);
		sg_set_buf(pctx->dst, pctx->auth_tag, sizeof(pctx->auth_tag));
		scatterwalk_sg_chain(pctx->dst, 2, req->dst);
		dst = pctx->dst;
	}
M
Mikko Herranen 已提交
269 270

	ablkcipher_request_set_tfm(ablk_req, ctx->ctr);
271 272 273
	ablkcipher_request_set_crypt(ablk_req, pctx->src, dst,
				     cryptlen + sizeof(pctx->auth_tag),
				     req->iv);
M
Mikko Herranen 已提交
274 275 276

	crypto_gcm_ghash_init(ghash, flags, ctx->gf128);

H
Herbert Xu 已提交
277 278
	crypto_gcm_ghash_update_sg(ghash, req->assoc, req->assoclen);
	crypto_gcm_ghash_flush(ghash);
M
Mikko Herranen 已提交
279 280
}

H
Herbert Xu 已提交
281
static int crypto_gcm_hash(struct aead_request *req)
M
Mikko Herranen 已提交
282
{
H
Herbert Xu 已提交
283
	struct crypto_aead *aead = crypto_aead_reqtfm(req);
284
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
M
Mikko Herranen 已提交
285 286 287 288 289 290 291
	u8 *auth_tag = pctx->auth_tag;
	struct crypto_gcm_ghash_ctx *ghash = &pctx->ghash;

	crypto_gcm_ghash_update_sg(ghash, req->dst, req->cryptlen);
	crypto_gcm_ghash_final_xor(ghash, req->assoclen, req->cryptlen,
				   auth_tag);

H
Herbert Xu 已提交
292 293 294 295 296 297 298 299 300 301 302 303
	scatterwalk_map_and_copy(auth_tag, req->dst, req->cryptlen,
				 crypto_aead_authsize(aead), 1);
	return 0;
}

static void crypto_gcm_encrypt_done(struct crypto_async_request *areq, int err)
{
	struct aead_request *req = areq->data;

	if (!err)
		err = crypto_gcm_hash(req);

M
Mikko Herranen 已提交
304 305 306 307 308
	aead_request_complete(req, err);
}

static int crypto_gcm_encrypt(struct aead_request *req)
{
309
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
310
	struct ablkcipher_request *abreq = &pctx->abreq;
311 312 313 314 315
	int err;

	crypto_gcm_init_crypt(abreq, req, req->cryptlen);
	ablkcipher_request_set_callback(abreq, aead_request_flags(req),
					crypto_gcm_encrypt_done, req);
M
Mikko Herranen 已提交
316

317
	err = crypto_ablkcipher_encrypt(abreq);
M
Mikko Herranen 已提交
318 319 320
	if (err)
		return err;

H
Herbert Xu 已提交
321
	return crypto_gcm_hash(req);
M
Mikko Herranen 已提交
322 323
}

324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340
static int crypto_gcm_verify(struct aead_request *req)
{
	struct crypto_aead *aead = crypto_aead_reqtfm(req);
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
	struct crypto_gcm_ghash_ctx *ghash = &pctx->ghash;
	u8 *auth_tag = pctx->auth_tag;
	u8 *iauth_tag = pctx->iauth_tag;
	unsigned int authsize = crypto_aead_authsize(aead);
	unsigned int cryptlen = req->cryptlen - authsize;

	crypto_gcm_ghash_final_xor(ghash, req->assoclen, cryptlen, auth_tag);

	authsize = crypto_aead_authsize(aead);
	scatterwalk_map_and_copy(iauth_tag, req->src, cryptlen, authsize, 0);
	return memcmp(iauth_tag, auth_tag, authsize) ? -EBADMSG : 0;
}

M
Mikko Herranen 已提交
341 342
static void crypto_gcm_decrypt_done(struct crypto_async_request *areq, int err)
{
343 344 345 346 347 348
	struct aead_request *req = areq->data;

	if (!err)
		err = crypto_gcm_verify(req);

	aead_request_complete(req, err);
M
Mikko Herranen 已提交
349 350 351 352
}

static int crypto_gcm_decrypt(struct aead_request *req)
{
H
Herbert Xu 已提交
353
	struct crypto_aead *aead = crypto_aead_reqtfm(req);
354
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
355
	struct ablkcipher_request *abreq = &pctx->abreq;
M
Mikko Herranen 已提交
356
	struct crypto_gcm_ghash_ctx *ghash = &pctx->ghash;
H
Herbert Xu 已提交
357 358
	unsigned int cryptlen = req->cryptlen;
	unsigned int authsize = crypto_aead_authsize(aead);
M
Mikko Herranen 已提交
359 360
	int err;

H
Herbert Xu 已提交
361
	if (cryptlen < authsize)
M
Mikko Herranen 已提交
362
		return -EINVAL;
H
Herbert Xu 已提交
363
	cryptlen -= authsize;
M
Mikko Herranen 已提交
364

365 366 367
	crypto_gcm_init_crypt(abreq, req, cryptlen);
	ablkcipher_request_set_callback(abreq, aead_request_flags(req),
					crypto_gcm_decrypt_done, req);
M
Mikko Herranen 已提交
368

H
Herbert Xu 已提交
369
	crypto_gcm_ghash_update_sg(ghash, req->src, cryptlen);
M
Mikko Herranen 已提交
370

371 372 373
	err = crypto_ablkcipher_decrypt(abreq);
	if (err)
		return err;
M
Mikko Herranen 已提交
374

375
	return crypto_gcm_verify(req);
M
Mikko Herranen 已提交
376 377 378 379 380 381 382 383 384 385 386
}

static int crypto_gcm_init_tfm(struct crypto_tfm *tfm)
{
	struct crypto_instance *inst = (void *)tfm->__crt_alg;
	struct gcm_instance_ctx *ictx = crypto_instance_ctx(inst);
	struct crypto_gcm_ctx *ctx = crypto_tfm_ctx(tfm);
	struct crypto_ablkcipher *ctr;
	unsigned long align;
	int err;

387
	ctr = crypto_spawn_skcipher(&ictx->ctr);
M
Mikko Herranen 已提交
388 389 390 391 392 393 394
	err = PTR_ERR(ctr);
	if (IS_ERR(ctr))
		return err;

	ctx->ctr = ctr;
	ctx->gf128 = NULL;

395
	align = crypto_tfm_alg_alignmask(tfm);
M
Mikko Herranen 已提交
396
	align &= ~(crypto_tfm_ctx_alignment() - 1);
397 398 399
	tfm->crt_aead.reqsize = align +
				sizeof(struct crypto_gcm_req_priv_ctx) +
				crypto_ablkcipher_reqsize(ctr);
M
Mikko Herranen 已提交
400 401 402 403 404 405 406 407 408 409 410 411 412 413

	return 0;
}

static void crypto_gcm_exit_tfm(struct crypto_tfm *tfm)
{
	struct crypto_gcm_ctx *ctx = crypto_tfm_ctx(tfm);

	if (ctx->gf128 != NULL)
		gf128mul_free_4k(ctx->gf128);

	crypto_free_ablkcipher(ctx->ctr);
}

414 415 416
static struct crypto_instance *crypto_gcm_alloc_common(struct rtattr **tb,
						       const char *full_name,
						       const char *ctr_name)
M
Mikko Herranen 已提交
417
{
418
	struct crypto_attr_type *algt;
M
Mikko Herranen 已提交
419 420 421 422 423
	struct crypto_instance *inst;
	struct crypto_alg *ctr;
	struct gcm_instance_ctx *ctx;
	int err;

424 425 426
	algt = crypto_get_attr_type(tb);
	err = PTR_ERR(algt);
	if (IS_ERR(algt))
M
Mikko Herranen 已提交
427 428
		return ERR_PTR(err);

429 430
	if ((algt->type ^ CRYPTO_ALG_TYPE_AEAD) & algt->mask)
		return ERR_PTR(-EINVAL);
M
Mikko Herranen 已提交
431

432 433 434
	inst = kzalloc(sizeof(*inst) + sizeof(*ctx), GFP_KERNEL);
	if (!inst)
		return ERR_PTR(-ENOMEM);
M
Mikko Herranen 已提交
435

436 437 438 439 440 441 442 443 444
	ctx = crypto_instance_ctx(inst);
	crypto_set_skcipher_spawn(&ctx->ctr, inst);
	err = crypto_grab_skcipher(&ctx->ctr, ctr_name, 0,
				   crypto_requires_sync(algt->type,
							algt->mask));
	if (err)
		goto err_free_inst;

	ctr = crypto_skcipher_spawn_alg(&ctx->ctr);
M
Mikko Herranen 已提交
445

446
	/* We only support 16-byte blocks. */
447
	if (ctr->cra_ablkcipher.ivsize != 16)
448 449 450 451 452
		goto out_put_ctr;

	/* Not a stream cipher? */
	err = -EINVAL;
	if (ctr->cra_blocksize != 1)
M
Mikko Herranen 已提交
453 454 455
		goto out_put_ctr;

	err = -ENAMETOOLONG;
456 457 458
	if (snprintf(inst->alg.cra_driver_name, CRYPTO_MAX_ALG_NAME,
		     "gcm_base(%s)", ctr->cra_driver_name) >=
	    CRYPTO_MAX_ALG_NAME)
459
		goto out_put_ctr;
M
Mikko Herranen 已提交
460

461 462
	memcpy(inst->alg.cra_name, full_name, CRYPTO_MAX_ALG_NAME);

463 464
	inst->alg.cra_flags = CRYPTO_ALG_TYPE_AEAD;
	inst->alg.cra_flags |= ctr->cra_flags & CRYPTO_ALG_ASYNC;
M
Mikko Herranen 已提交
465
	inst->alg.cra_priority = ctr->cra_priority;
466
	inst->alg.cra_blocksize = 1;
467
	inst->alg.cra_alignmask = ctr->cra_alignmask | (__alignof__(u64) - 1);
M
Mikko Herranen 已提交
468
	inst->alg.cra_type = &crypto_aead_type;
469
	inst->alg.cra_aead.ivsize = 16;
470
	inst->alg.cra_aead.maxauthsize = 16;
M
Mikko Herranen 已提交
471 472 473 474 475 476 477 478 479
	inst->alg.cra_ctxsize = sizeof(struct crypto_gcm_ctx);
	inst->alg.cra_init = crypto_gcm_init_tfm;
	inst->alg.cra_exit = crypto_gcm_exit_tfm;
	inst->alg.cra_aead.setkey = crypto_gcm_setkey;
	inst->alg.cra_aead.encrypt = crypto_gcm_encrypt;
	inst->alg.cra_aead.decrypt = crypto_gcm_decrypt;

out:
	return inst;
480 481 482

out_put_ctr:
	crypto_drop_skcipher(&ctx->ctr);
M
Mikko Herranen 已提交
483 484 485 486 487 488
err_free_inst:
	kfree(inst);
	inst = ERR_PTR(err);
	goto out;
}

489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511
static struct crypto_instance *crypto_gcm_alloc(struct rtattr **tb)
{
	int err;
	const char *cipher_name;
	char ctr_name[CRYPTO_MAX_ALG_NAME];
	char full_name[CRYPTO_MAX_ALG_NAME];

	cipher_name = crypto_attr_alg_name(tb[1]);
	err = PTR_ERR(cipher_name);
	if (IS_ERR(cipher_name))
		return ERR_PTR(err);

	if (snprintf(ctr_name, CRYPTO_MAX_ALG_NAME, "ctr(%s)", cipher_name) >=
	    CRYPTO_MAX_ALG_NAME)
		return ERR_PTR(-ENAMETOOLONG);

	if (snprintf(full_name, CRYPTO_MAX_ALG_NAME, "gcm(%s)", cipher_name) >=
	    CRYPTO_MAX_ALG_NAME)
		return ERR_PTR(-ENAMETOOLONG);

	return crypto_gcm_alloc_common(tb, full_name, ctr_name);
}

M
Mikko Herranen 已提交
512 513 514 515
static void crypto_gcm_free(struct crypto_instance *inst)
{
	struct gcm_instance_ctx *ctx = crypto_instance_ctx(inst);

516
	crypto_drop_skcipher(&ctx->ctr);
M
Mikko Herranen 已提交
517 518 519 520 521 522 523 524 525 526
	kfree(inst);
}

static struct crypto_template crypto_gcm_tmpl = {
	.name = "gcm",
	.alloc = crypto_gcm_alloc,
	.free = crypto_gcm_free,
	.module = THIS_MODULE,
};

527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551
static struct crypto_instance *crypto_gcm_base_alloc(struct rtattr **tb)
{
	int err;
	const char *ctr_name;
	char full_name[CRYPTO_MAX_ALG_NAME];

	ctr_name = crypto_attr_alg_name(tb[1]);
	err = PTR_ERR(ctr_name);
	if (IS_ERR(ctr_name))
		return ERR_PTR(err);

	if (snprintf(full_name, CRYPTO_MAX_ALG_NAME, "gcm_base(%s)",
		     ctr_name) >= CRYPTO_MAX_ALG_NAME)
		return ERR_PTR(-ENAMETOOLONG);

	return crypto_gcm_alloc_common(tb, full_name, ctr_name);
}

static struct crypto_template crypto_gcm_base_tmpl = {
	.name = "gcm_base",
	.alloc = crypto_gcm_base_alloc,
	.free = crypto_gcm_free,
	.module = THIS_MODULE,
};

M
Mikko Herranen 已提交
552 553
static int __init crypto_gcm_module_init(void)
{
554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569
	int err;

	err = crypto_register_template(&crypto_gcm_base_tmpl);
	if (err)
		goto out;

	err = crypto_register_template(&crypto_gcm_tmpl);
	if (err)
		goto out_undo_base;

out:
	return err;

out_undo_base:
	crypto_unregister_template(&crypto_gcm_base_tmpl);
	goto out;
M
Mikko Herranen 已提交
570 571 572 573 574
}

static void __exit crypto_gcm_module_exit(void)
{
	crypto_unregister_template(&crypto_gcm_tmpl);
575
	crypto_unregister_template(&crypto_gcm_base_tmpl);
M
Mikko Herranen 已提交
576 577 578 579 580 581 582 583
}

module_init(crypto_gcm_module_init);
module_exit(crypto_gcm_module_exit);

MODULE_LICENSE("GPL");
MODULE_DESCRIPTION("Galois/Counter Mode");
MODULE_AUTHOR("Mikko Herranen <mh1@iki.fi>");
584
MODULE_ALIAS("gcm_base");