gcm.c 32.9 KB
Newer Older
M
Mikko Herranen 已提交
1 2 3 4 5 6 7 8 9 10 11
/*
 * GCM: Galois/Counter Mode.
 *
 * Copyright (c) 2007 Nokia Siemens Networks - Mikko Herranen <mh1@iki.fi>
 *
 * This program is free software; you can redistribute it and/or modify it
 * under the terms of the GNU General Public License version 2 as published
 * by the Free Software Foundation.
 */

#include <crypto/gf128mul.h>
H
Herbert Xu 已提交
12
#include <crypto/internal/aead.h>
13
#include <crypto/internal/skcipher.h>
14
#include <crypto/internal/hash.h>
15
#include <crypto/null.h>
16
#include <crypto/scatterwalk.h>
17 18
#include <crypto/hash.h>
#include "internal.h"
19
#include <linux/completion.h>
M
Mikko Herranen 已提交
20 21 22 23 24 25 26
#include <linux/err.h>
#include <linux/init.h>
#include <linux/kernel.h>
#include <linux/module.h>
#include <linux/slab.h>

struct gcm_instance_ctx {
27
	struct crypto_skcipher_spawn ctr;
28
	struct crypto_ahash_spawn ghash;
M
Mikko Herranen 已提交
29 30 31 32
};

struct crypto_gcm_ctx {
	struct crypto_ablkcipher *ctr;
33
	struct crypto_ahash *ghash;
M
Mikko Herranen 已提交
34 35
};

H
Herbert Xu 已提交
36 37 38 39 40
struct crypto_rfc4106_ctx {
	struct crypto_aead *child;
	u8 nonce[4];
};

H
Herbert Xu 已提交
41 42 43 44 45 46
struct crypto_rfc4106_req_ctx {
	struct scatterlist src[3];
	struct scatterlist dst[3];
	struct aead_request subreq;
};

47 48 49 50
struct crypto_rfc4543_instance_ctx {
	struct crypto_aead_spawn aead;
};

51 52
struct crypto_rfc4543_ctx {
	struct crypto_aead *child;
53
	struct crypto_blkcipher *null;
54 55 56 57 58 59 60
	u8 nonce[4];
};

struct crypto_rfc4543_req_ctx {
	struct aead_request subreq;
};

M
Mikko Herranen 已提交
61
struct crypto_gcm_ghash_ctx {
62 63
	unsigned int cryptlen;
	struct scatterlist *src;
64
	int (*complete)(struct aead_request *req, u32 flags);
M
Mikko Herranen 已提交
65 66 67
};

struct crypto_gcm_req_priv_ctx {
68
	u8 iv[16];
M
Mikko Herranen 已提交
69
	u8 auth_tag[16];
H
Herbert Xu 已提交
70
	u8 iauth_tag[16];
71 72 73
	struct scatterlist src[3];
	struct scatterlist dst[3];
	struct scatterlist sg;
74 75 76 77 78
	struct crypto_gcm_ghash_ctx ghash_ctx;
	union {
		struct ahash_request ahreq;
		struct ablkcipher_request abreq;
	} u;
M
Mikko Herranen 已提交
79 80
};

81 82 83 84 85
struct crypto_gcm_setkey_result {
	int err;
	struct completion completion;
};

86 87 88 89 90 91
static struct {
	u8 buf[16];
	struct scatterlist sg;
} *gcm_zeroes;

static int crypto_rfc4543_copy_src_to_dst(struct aead_request *req, bool enc);
92

93 94 95 96 97 98 99 100
static inline struct crypto_gcm_req_priv_ctx *crypto_gcm_reqctx(
	struct aead_request *req)
{
	unsigned long align = crypto_aead_alignmask(crypto_aead_reqtfm(req));

	return (void *)PTR_ALIGN((u8 *)aead_request_ctx(req), align + 1);
}

101
static void crypto_gcm_setkey_done(struct crypto_async_request *req, int err)
M
Mikko Herranen 已提交
102
{
103
	struct crypto_gcm_setkey_result *result = req->data;
M
Mikko Herranen 已提交
104

105 106 107 108 109
	if (err == -EINPROGRESS)
		return;

	result->err = err;
	complete(&result->completion);
M
Mikko Herranen 已提交
110 111 112 113 114 115
}

static int crypto_gcm_setkey(struct crypto_aead *aead, const u8 *key,
			     unsigned int keylen)
{
	struct crypto_gcm_ctx *ctx = crypto_aead_ctx(aead);
116
	struct crypto_ahash *ghash = ctx->ghash;
M
Mikko Herranen 已提交
117
	struct crypto_ablkcipher *ctr = ctx->ctr;
118 119 120 121 122 123 124 125 126 127
	struct {
		be128 hash;
		u8 iv[8];

		struct crypto_gcm_setkey_result result;

		struct scatterlist sg[1];
		struct ablkcipher_request req;
	} *data;
	int err;
M
Mikko Herranen 已提交
128 129 130

	crypto_ablkcipher_clear_flags(ctr, CRYPTO_TFM_REQ_MASK);
	crypto_ablkcipher_set_flags(ctr, crypto_aead_get_flags(aead) &
131
					 CRYPTO_TFM_REQ_MASK);
M
Mikko Herranen 已提交
132
	err = crypto_ablkcipher_setkey(ctr, key, keylen);
133 134
	crypto_aead_set_flags(aead, crypto_ablkcipher_get_flags(ctr) &
				    CRYPTO_TFM_RES_MASK);
M
Mikko Herranen 已提交
135
	if (err)
136
		return err;
M
Mikko Herranen 已提交
137

138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160
	data = kzalloc(sizeof(*data) + crypto_ablkcipher_reqsize(ctr),
		       GFP_KERNEL);
	if (!data)
		return -ENOMEM;

	init_completion(&data->result.completion);
	sg_init_one(data->sg, &data->hash, sizeof(data->hash));
	ablkcipher_request_set_tfm(&data->req, ctr);
	ablkcipher_request_set_callback(&data->req, CRYPTO_TFM_REQ_MAY_SLEEP |
						    CRYPTO_TFM_REQ_MAY_BACKLOG,
					crypto_gcm_setkey_done,
					&data->result);
	ablkcipher_request_set_crypt(&data->req, data->sg, data->sg,
				     sizeof(data->hash), data->iv);

	err = crypto_ablkcipher_encrypt(&data->req);
	if (err == -EINPROGRESS || err == -EBUSY) {
		err = wait_for_completion_interruptible(
			&data->result.completion);
		if (!err)
			err = data->result.err;
	}

M
Mikko Herranen 已提交
161 162 163
	if (err)
		goto out;

164 165 166 167 168 169
	crypto_ahash_clear_flags(ghash, CRYPTO_TFM_REQ_MASK);
	crypto_ahash_set_flags(ghash, crypto_aead_get_flags(aead) &
			       CRYPTO_TFM_REQ_MASK);
	err = crypto_ahash_setkey(ghash, (u8 *)&data->hash, sizeof(be128));
	crypto_aead_set_flags(aead, crypto_ahash_get_flags(ghash) &
			      CRYPTO_TFM_RES_MASK);
M
Mikko Herranen 已提交
170

171
out:
172
	kzfree(data);
M
Mikko Herranen 已提交
173 174 175
	return err;
}

H
Herbert Xu 已提交
176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194
static int crypto_gcm_setauthsize(struct crypto_aead *tfm,
				  unsigned int authsize)
{
	switch (authsize) {
	case 4:
	case 8:
	case 12:
	case 13:
	case 14:
	case 15:
	case 16:
		break;
	default:
		return -EINVAL;
	}

	return 0;
}

195
static void crypto_gcm_init_common(struct aead_request *req)
M
Mikko Herranen 已提交
196
{
197
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
198
	__be32 counter = cpu_to_be32(1);
199
	struct scatterlist *sg;
200 201

	memset(pctx->auth_tag, 0, sizeof(pctx->auth_tag));
202 203
	memcpy(pctx->iv, req->iv, 12);
	memcpy(pctx->iv + 12, &counter, 4);
204

205
	sg_init_table(pctx->src, 3);
206
	sg_set_buf(pctx->src, pctx->auth_tag, sizeof(pctx->auth_tag));
207 208 209
	sg = scatterwalk_ffwd(pctx->src + 1, req->src, req->assoclen);
	if (sg != pctx->src + 1)
		scatterwalk_sg_chain(pctx->src, 2, sg);
210 211

	if (req->src != req->dst) {
212
		sg_init_table(pctx->dst, 3);
213
		sg_set_buf(pctx->dst, pctx->auth_tag, sizeof(pctx->auth_tag));
214 215 216
		sg = scatterwalk_ffwd(pctx->dst + 1, req->dst, req->assoclen);
		if (sg != pctx->dst + 1)
			scatterwalk_sg_chain(pctx->dst, 2, sg);
217
	}
218 219 220 221 222 223 224 225 226 227 228 229
}

static void crypto_gcm_init_crypt(struct aead_request *req,
				  unsigned int cryptlen)
{
	struct crypto_aead *aead = crypto_aead_reqtfm(req);
	struct crypto_gcm_ctx *ctx = crypto_aead_ctx(aead);
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
	struct ablkcipher_request *ablk_req = &pctx->u.abreq;
	struct scatterlist *dst;

	dst = req->src == req->dst ? pctx->src : pctx->dst;
M
Mikko Herranen 已提交
230 231

	ablkcipher_request_set_tfm(ablk_req, ctx->ctr);
232 233
	ablkcipher_request_set_crypt(ablk_req, pctx->src, dst,
				     cryptlen + sizeof(pctx->auth_tag),
234
				     pctx->iv);
235 236 237 238 239 240 241 242 243
}

static inline unsigned int gcm_remain(unsigned int len)
{
	len &= 0xfU;
	return len ? 16 - len : 0;
}

static void gcm_hash_len_done(struct crypto_async_request *areq, int err);
M
Mikko Herranen 已提交
244

245
static int gcm_hash_update(struct aead_request *req,
M
Mark Rustad 已提交
246
			   crypto_completion_t compl,
247
			   struct scatterlist *src,
248
			   unsigned int len, u32 flags)
249
{
250
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
251
	struct ahash_request *ahreq = &pctx->u.ahreq;
M
Mikko Herranen 已提交
252

253
	ahash_request_set_callback(ahreq, flags, compl, req);
254 255 256
	ahash_request_set_crypt(ahreq, src, NULL, len);

	return crypto_ahash_update(ahreq);
M
Mikko Herranen 已提交
257 258
}

259 260
static int gcm_hash_remain(struct aead_request *req,
			   unsigned int remain,
261
			   crypto_completion_t compl, u32 flags)
M
Mikko Herranen 已提交
262
{
263
	return gcm_hash_update(req, compl, &gcm_zeroes->sg, remain, flags);
264 265
}

266
static int gcm_hash_len(struct aead_request *req, u32 flags)
267
{
268
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
269 270 271 272 273 274 275
	struct ahash_request *ahreq = &pctx->u.ahreq;
	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;
	u128 lengths;

	lengths.a = cpu_to_be64(req->assoclen * 8);
	lengths.b = cpu_to_be64(gctx->cryptlen * 8);
	memcpy(pctx->iauth_tag, &lengths, 16);
276 277 278 279
	sg_init_one(&pctx->sg, pctx->iauth_tag, 16);
	ahash_request_set_callback(ahreq, flags, gcm_hash_len_done, req);
	ahash_request_set_crypt(ahreq, &pctx->sg,
				pctx->iauth_tag, sizeof(lengths));
280

281
	return crypto_ahash_finup(ahreq);
282 283
}

284
static int gcm_hash_len_continue(struct aead_request *req, u32 flags)
285
{
286
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
287 288
	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;

289
	return gctx->complete(req, flags);
290 291
}

292
static void gcm_hash_len_done(struct crypto_async_request *areq, int err)
293 294
{
	struct aead_request *req = areq->data;
295

296 297
	if (err)
		goto out;
298

299 300 301
	err = gcm_hash_len_continue(req, 0);
	if (err == -EINPROGRESS)
		return;
302

303 304
out:
	aead_request_complete(req, err);
305 306
}

307
static int gcm_hash_crypt_remain_continue(struct aead_request *req, u32 flags)
308
{
309 310
	return gcm_hash_len(req, flags) ?:
	       gcm_hash_len_continue(req, flags);
311 312
}

313 314
static void gcm_hash_crypt_remain_done(struct crypto_async_request *areq,
				       int err)
315 316
{
	struct aead_request *req = areq->data;
317

318 319 320 321 322 323 324 325 326
	if (err)
		goto out;

	err = gcm_hash_crypt_remain_continue(req, 0);
	if (err == -EINPROGRESS)
		return;

out:
	aead_request_complete(req, err);
327 328
}

329
static int gcm_hash_crypt_continue(struct aead_request *req, u32 flags)
330
{
331 332 333 334
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;
	unsigned int remain;

335 336 337 338 339
	remain = gcm_remain(gctx->cryptlen);
	if (remain)
		return gcm_hash_remain(req, remain,
				       gcm_hash_crypt_remain_done, flags) ?:
		       gcm_hash_crypt_remain_continue(req, flags);
340

341
	return gcm_hash_crypt_remain_continue(req, flags);
342 343
}

344
static void gcm_hash_crypt_done(struct crypto_async_request *areq, int err)
345 346
{
	struct aead_request *req = areq->data;
347

348 349 350 351 352 353 354 355 356
	if (err)
		goto out;

	err = gcm_hash_crypt_continue(req, 0);
	if (err == -EINPROGRESS)
		return;

out:
	aead_request_complete(req, err);
357 358
}

359
static int gcm_hash_assoc_remain_continue(struct aead_request *req, u32 flags)
360
{
361 362 363
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;

364 365 366 367 368 369
	if (gctx->cryptlen)
		return gcm_hash_update(req, gcm_hash_crypt_done,
				       gctx->src, gctx->cryptlen, flags) ?:
		       gcm_hash_crypt_continue(req, flags);

	return gcm_hash_crypt_remain_continue(req, flags);
370 371
}

372 373
static void gcm_hash_assoc_remain_done(struct crypto_async_request *areq,
				       int err)
374 375
{
	struct aead_request *req = areq->data;
376

377 378 379 380 381 382 383 384 385
	if (err)
		goto out;

	err = gcm_hash_assoc_remain_continue(req, 0);
	if (err == -EINPROGRESS)
		return;

out:
	aead_request_complete(req, err);
386 387
}

388
static int gcm_hash_assoc_continue(struct aead_request *req, u32 flags)
389
{
390 391
	unsigned int remain;

392 393 394 395 396
	remain = gcm_remain(req->assoclen);
	if (remain)
		return gcm_hash_remain(req, remain,
				       gcm_hash_assoc_remain_done, flags) ?:
		       gcm_hash_assoc_remain_continue(req, flags);
397

398
	return gcm_hash_assoc_remain_continue(req, flags);
399 400
}

401
static void gcm_hash_assoc_done(struct crypto_async_request *areq, int err)
402 403
{
	struct aead_request *req = areq->data;
404

405 406 407 408 409 410 411 412 413
	if (err)
		goto out;

	err = gcm_hash_assoc_continue(req, 0);
	if (err == -EINPROGRESS)
		return;

out:
	aead_request_complete(req, err);
414 415
}

416
static int gcm_hash_init_continue(struct aead_request *req, u32 flags)
417
{
418 419 420 421
	if (req->assoclen)
		return gcm_hash_update(req, gcm_hash_assoc_done,
				       req->src, req->assoclen, flags) ?:
		       gcm_hash_assoc_continue(req, flags);
422

423
	return gcm_hash_assoc_remain_continue(req, flags);
424 425 426 427 428 429
}

static void gcm_hash_init_done(struct crypto_async_request *areq, int err)
{
	struct aead_request *req = areq->data;

430 431 432 433 434 435 436 437 438
	if (err)
		goto out;

	err = gcm_hash_init_continue(req, 0);
	if (err == -EINPROGRESS)
		return;

out:
	aead_request_complete(req, err);
439 440
}

441
static int gcm_hash(struct aead_request *req, u32 flags)
442
{
443
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
444
	struct ahash_request *ahreq = &pctx->u.ahreq;
445
	struct crypto_gcm_ctx *ctx = crypto_aead_ctx(crypto_aead_reqtfm(req));
446 447 448

	ahash_request_set_tfm(ahreq, ctx->ghash);

449 450 451
	ahash_request_set_callback(ahreq, flags, gcm_hash_init_done, req);
	return crypto_ahash_init(ahreq) ?:
	       gcm_hash_init_continue(req, flags);
452 453
}

454
static int gcm_enc_copy_hash(struct aead_request *req, u32 flags)
455
{
456
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
457 458
	struct crypto_aead *aead = crypto_aead_reqtfm(req);
	u8 *auth_tag = pctx->auth_tag;
M
Mikko Herranen 已提交
459

460 461 462
	crypto_xor(auth_tag, pctx->iauth_tag, 16);
	scatterwalk_map_and_copy(auth_tag, req->dst,
				 req->assoclen + req->cryptlen,
H
Herbert Xu 已提交
463
				 crypto_aead_authsize(aead), 1);
464
	return 0;
H
Herbert Xu 已提交
465 466
}

467
static int gcm_encrypt_continue(struct aead_request *req, u32 flags)
H
Herbert Xu 已提交
468
{
469
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
470
	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;
H
Herbert Xu 已提交
471

472 473 474
	gctx->src = sg_next(req->src == req->dst ? pctx->src : pctx->dst);
	gctx->cryptlen = req->cryptlen;
	gctx->complete = gcm_enc_copy_hash;
H
Herbert Xu 已提交
475

476
	return gcm_hash(req, flags);
M
Mikko Herranen 已提交
477 478
}

479
static void gcm_encrypt_done(struct crypto_async_request *areq, int err)
480 481 482
{
	struct aead_request *req = areq->data;

483 484 485 486 487 488
	if (err)
		goto out;

	err = gcm_encrypt_continue(req, 0);
	if (err == -EINPROGRESS)
		return;
489

490
out:
491
	aead_request_complete(req, err);
492 493
}

M
Mikko Herranen 已提交
494 495
static int crypto_gcm_encrypt(struct aead_request *req)
{
496
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
497
	struct ablkcipher_request *abreq = &pctx->u.abreq;
498
	u32 flags = aead_request_flags(req);
499

500 501 502
	crypto_gcm_init_common(req);
	crypto_gcm_init_crypt(req, req->cryptlen);
	ablkcipher_request_set_callback(abreq, flags, gcm_encrypt_done, req);
503

504 505
	return crypto_ablkcipher_encrypt(abreq) ?:
	       gcm_encrypt_continue(req, flags);
M
Mikko Herranen 已提交
506 507
}

508
static int crypto_gcm_verify(struct aead_request *req)
509
{
510
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
511 512 513 514 515 516
	struct crypto_aead *aead = crypto_aead_reqtfm(req);
	u8 *auth_tag = pctx->auth_tag;
	u8 *iauth_tag = pctx->iauth_tag;
	unsigned int authsize = crypto_aead_authsize(aead);
	unsigned int cryptlen = req->cryptlen - authsize;

517
	crypto_xor(auth_tag, iauth_tag, 16);
518 519
	scatterwalk_map_and_copy(iauth_tag, req->src,
				 req->assoclen + cryptlen, authsize, 0);
520
	return crypto_memneq(iauth_tag, auth_tag, authsize) ? -EBADMSG : 0;
521 522
}

523
static void gcm_decrypt_done(struct crypto_async_request *areq, int err)
M
Mikko Herranen 已提交
524
{
525 526 527
	struct aead_request *req = areq->data;

	if (!err)
528
		err = crypto_gcm_verify(req);
529 530

	aead_request_complete(req, err);
M
Mikko Herranen 已提交
531 532
}

533
static int gcm_dec_hash_continue(struct aead_request *req, u32 flags)
534 535 536 537 538
{
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
	struct ablkcipher_request *abreq = &pctx->u.abreq;
	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;

539 540 541
	crypto_gcm_init_crypt(req, gctx->cryptlen);
	ablkcipher_request_set_callback(abreq, flags, gcm_decrypt_done, req);
	return crypto_ablkcipher_decrypt(abreq) ?: crypto_gcm_verify(req);
542 543
}

M
Mikko Herranen 已提交
544 545
static int crypto_gcm_decrypt(struct aead_request *req)
{
H
Herbert Xu 已提交
546
	struct crypto_aead *aead = crypto_aead_reqtfm(req);
547
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
548
	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;
H
Herbert Xu 已提交
549
	unsigned int authsize = crypto_aead_authsize(aead);
550
	unsigned int cryptlen = req->cryptlen;
551
	u32 flags = aead_request_flags(req);
M
Mikko Herranen 已提交
552

H
Herbert Xu 已提交
553
	cryptlen -= authsize;
M
Mikko Herranen 已提交
554

555
	crypto_gcm_init_common(req);
M
Mikko Herranen 已提交
556

557 558 559
	gctx->src = sg_next(pctx->src);
	gctx->cryptlen = cryptlen;
	gctx->complete = gcm_dec_hash_continue;
M
Mikko Herranen 已提交
560

561
	return gcm_hash(req, flags);
M
Mikko Herranen 已提交
562 563
}

564
static int crypto_gcm_init_tfm(struct crypto_aead *tfm)
M
Mikko Herranen 已提交
565
{
566 567 568
	struct aead_instance *inst = aead_alg_instance(tfm);
	struct gcm_instance_ctx *ictx = aead_instance_ctx(inst);
	struct crypto_gcm_ctx *ctx = crypto_aead_ctx(tfm);
M
Mikko Herranen 已提交
569
	struct crypto_ablkcipher *ctr;
570
	struct crypto_ahash *ghash;
M
Mikko Herranen 已提交
571 572 573
	unsigned long align;
	int err;

574 575 576 577
	ghash = crypto_spawn_ahash(&ictx->ghash);
	if (IS_ERR(ghash))
		return PTR_ERR(ghash);

578
	ctr = crypto_spawn_skcipher(&ictx->ctr);
M
Mikko Herranen 已提交
579 580
	err = PTR_ERR(ctr);
	if (IS_ERR(ctr))
581
		goto err_free_hash;
M
Mikko Herranen 已提交
582 583

	ctx->ctr = ctr;
584
	ctx->ghash = ghash;
M
Mikko Herranen 已提交
585

586
	align = crypto_aead_alignmask(tfm);
M
Mikko Herranen 已提交
587
	align &= ~(crypto_tfm_ctx_alignment() - 1);
588
	crypto_aead_set_reqsize(tfm,
589
		align + offsetof(struct crypto_gcm_req_priv_ctx, u) +
590 591 592
		max(sizeof(struct ablkcipher_request) +
		    crypto_ablkcipher_reqsize(ctr),
		    sizeof(struct ahash_request) +
593
		    crypto_ahash_reqsize(ghash)));
M
Mikko Herranen 已提交
594 595

	return 0;
596 597 598 599

err_free_hash:
	crypto_free_ahash(ghash);
	return err;
M
Mikko Herranen 已提交
600 601
}

602
static void crypto_gcm_exit_tfm(struct crypto_aead *tfm)
M
Mikko Herranen 已提交
603
{
604
	struct crypto_gcm_ctx *ctx = crypto_aead_ctx(tfm);
M
Mikko Herranen 已提交
605

606
	crypto_free_ahash(ctx->ghash);
M
Mikko Herranen 已提交
607 608 609
	crypto_free_ablkcipher(ctx->ctr);
}

H
Herbert Xu 已提交
610 611 612 613 614 615 616 617 618
static void crypto_gcm_free(struct aead_instance *inst)
{
	struct gcm_instance_ctx *ctx = aead_instance_ctx(inst);

	crypto_drop_skcipher(&ctx->ctr);
	crypto_drop_ahash(&ctx->ghash);
	kfree(inst);
}

619 620 621 622 623
static int crypto_gcm_create_common(struct crypto_template *tmpl,
				    struct rtattr **tb,
				    const char *full_name,
				    const char *ctr_name,
				    const char *ghash_name)
M
Mikko Herranen 已提交
624
{
625
	struct crypto_attr_type *algt;
626
	struct aead_instance *inst;
M
Mikko Herranen 已提交
627
	struct crypto_alg *ctr;
628
	struct crypto_alg *ghash_alg;
629
	struct hash_alg_common *ghash;
M
Mikko Herranen 已提交
630 631 632
	struct gcm_instance_ctx *ctx;
	int err;

633 634
	algt = crypto_get_attr_type(tb);
	if (IS_ERR(algt))
635
		return PTR_ERR(algt);
M
Mikko Herranen 已提交
636

637
	if ((algt->type ^ CRYPTO_ALG_TYPE_AEAD) & algt->mask)
638
		return -EINVAL;
M
Mikko Herranen 已提交
639

640 641 642 643
	ghash_alg = crypto_find_alg(ghash_name, &crypto_ahash_type,
				    CRYPTO_ALG_TYPE_HASH,
				    CRYPTO_ALG_TYPE_AHASH_MASK);
	if (IS_ERR(ghash_alg))
644 645 646
		return PTR_ERR(ghash_alg);

	ghash = __crypto_hash_alg_common(ghash_alg);
647 648

	err = -ENOMEM;
649 650
	inst = kzalloc(sizeof(*inst) + sizeof(*ctx), GFP_KERNEL);
	if (!inst)
651
		goto out_put_ghash;
M
Mikko Herranen 已提交
652

653 654 655
	ctx = aead_instance_ctx(inst);
	err = crypto_init_ahash_spawn(&ctx->ghash, ghash,
				      aead_crypto_instance(inst));
656 657 658
	if (err)
		goto err_free_inst;

659 660 661 662 663
	err = -EINVAL;
	if (ghash->digestsize != 16)
		goto err_drop_ghash;

	crypto_set_skcipher_spawn(&ctx->ctr, aead_crypto_instance(inst));
664 665 666 667
	err = crypto_grab_skcipher(&ctx->ctr, ctr_name, 0,
				   crypto_requires_sync(algt->type,
							algt->mask));
	if (err)
668
		goto err_drop_ghash;
669 670

	ctr = crypto_skcipher_spawn_alg(&ctx->ctr);
M
Mikko Herranen 已提交
671

672
	/* We only support 16-byte blocks. */
673
	if (ctr->cra_ablkcipher.ivsize != 16)
674 675 676 677 678
		goto out_put_ctr;

	/* Not a stream cipher? */
	err = -EINVAL;
	if (ctr->cra_blocksize != 1)
M
Mikko Herranen 已提交
679 680 681
		goto out_put_ctr;

	err = -ENAMETOOLONG;
682
	if (snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME,
683 684
		     "gcm_base(%s,%s)", ctr->cra_driver_name,
		     ghash_alg->cra_driver_name) >=
685
	    CRYPTO_MAX_ALG_NAME)
686
		goto out_put_ctr;
M
Mikko Herranen 已提交
687

688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706
	memcpy(inst->alg.base.cra_name, full_name, CRYPTO_MAX_ALG_NAME);

	inst->alg.base.cra_flags = (ghash->base.cra_flags | ctr->cra_flags) &
				   CRYPTO_ALG_ASYNC;
	inst->alg.base.cra_priority = (ghash->base.cra_priority +
				       ctr->cra_priority) / 2;
	inst->alg.base.cra_blocksize = 1;
	inst->alg.base.cra_alignmask = ghash->base.cra_alignmask |
				       ctr->cra_alignmask;
	inst->alg.base.cra_ctxsize = sizeof(struct crypto_gcm_ctx);
	inst->alg.ivsize = 12;
	inst->alg.maxauthsize = 16;
	inst->alg.init = crypto_gcm_init_tfm;
	inst->alg.exit = crypto_gcm_exit_tfm;
	inst->alg.setkey = crypto_gcm_setkey;
	inst->alg.setauthsize = crypto_gcm_setauthsize;
	inst->alg.encrypt = crypto_gcm_encrypt;
	inst->alg.decrypt = crypto_gcm_decrypt;

H
Herbert Xu 已提交
707 708
	inst->free = crypto_gcm_free;

709 710 711
	err = aead_register_instance(tmpl, inst);
	if (err)
		goto out_put_ctr;
M
Mikko Herranen 已提交
712

713
out_put_ghash:
714
	crypto_mod_put(ghash_alg);
715
	return err;
716 717 718

out_put_ctr:
	crypto_drop_skcipher(&ctx->ctr);
719 720
err_drop_ghash:
	crypto_drop_ahash(&ctx->ghash);
M
Mikko Herranen 已提交
721 722
err_free_inst:
	kfree(inst);
723
	goto out_put_ghash;
M
Mikko Herranen 已提交
724 725
}

726
static int crypto_gcm_create(struct crypto_template *tmpl, struct rtattr **tb)
727 728 729 730 731 732 733
{
	const char *cipher_name;
	char ctr_name[CRYPTO_MAX_ALG_NAME];
	char full_name[CRYPTO_MAX_ALG_NAME];

	cipher_name = crypto_attr_alg_name(tb[1]);
	if (IS_ERR(cipher_name))
734
		return PTR_ERR(cipher_name);
735 736 737

	if (snprintf(ctr_name, CRYPTO_MAX_ALG_NAME, "ctr(%s)", cipher_name) >=
	    CRYPTO_MAX_ALG_NAME)
738
		return -ENAMETOOLONG;
739 740 741

	if (snprintf(full_name, CRYPTO_MAX_ALG_NAME, "gcm(%s)", cipher_name) >=
	    CRYPTO_MAX_ALG_NAME)
742
		return -ENAMETOOLONG;
743

744 745
	return crypto_gcm_create_common(tmpl, tb, full_name,
					ctr_name, "ghash");
746 747
}

M
Mikko Herranen 已提交
748 749
static struct crypto_template crypto_gcm_tmpl = {
	.name = "gcm",
750
	.create = crypto_gcm_create,
M
Mikko Herranen 已提交
751 752 753
	.module = THIS_MODULE,
};

754 755
static int crypto_gcm_base_create(struct crypto_template *tmpl,
				  struct rtattr **tb)
756 757
{
	const char *ctr_name;
758
	const char *ghash_name;
759 760 761 762
	char full_name[CRYPTO_MAX_ALG_NAME];

	ctr_name = crypto_attr_alg_name(tb[1]);
	if (IS_ERR(ctr_name))
763
		return PTR_ERR(ctr_name);
764

765 766
	ghash_name = crypto_attr_alg_name(tb[2]);
	if (IS_ERR(ghash_name))
767
		return PTR_ERR(ghash_name);
768 769 770

	if (snprintf(full_name, CRYPTO_MAX_ALG_NAME, "gcm_base(%s,%s)",
		     ctr_name, ghash_name) >= CRYPTO_MAX_ALG_NAME)
771
		return -ENAMETOOLONG;
772

773 774
	return crypto_gcm_create_common(tmpl, tb, full_name,
					ctr_name, ghash_name);
775 776 777 778
}

static struct crypto_template crypto_gcm_base_tmpl = {
	.name = "gcm_base",
779
	.create = crypto_gcm_base_create,
780 781 782
	.module = THIS_MODULE,
};

H
Herbert Xu 已提交
783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824
static int crypto_rfc4106_setkey(struct crypto_aead *parent, const u8 *key,
				 unsigned int keylen)
{
	struct crypto_rfc4106_ctx *ctx = crypto_aead_ctx(parent);
	struct crypto_aead *child = ctx->child;
	int err;

	if (keylen < 4)
		return -EINVAL;

	keylen -= 4;
	memcpy(ctx->nonce, key + keylen, 4);

	crypto_aead_clear_flags(child, CRYPTO_TFM_REQ_MASK);
	crypto_aead_set_flags(child, crypto_aead_get_flags(parent) &
				     CRYPTO_TFM_REQ_MASK);
	err = crypto_aead_setkey(child, key, keylen);
	crypto_aead_set_flags(parent, crypto_aead_get_flags(child) &
				      CRYPTO_TFM_RES_MASK);

	return err;
}

static int crypto_rfc4106_setauthsize(struct crypto_aead *parent,
				      unsigned int authsize)
{
	struct crypto_rfc4106_ctx *ctx = crypto_aead_ctx(parent);

	switch (authsize) {
	case 8:
	case 12:
	case 16:
		break;
	default:
		return -EINVAL;
	}

	return crypto_aead_setauthsize(ctx->child, authsize);
}

static struct aead_request *crypto_rfc4106_crypt(struct aead_request *req)
{
H
Herbert Xu 已提交
825
	struct crypto_rfc4106_req_ctx *rctx = aead_request_ctx(req);
H
Herbert Xu 已提交
826 827
	struct crypto_aead *aead = crypto_aead_reqtfm(req);
	struct crypto_rfc4106_ctx *ctx = crypto_aead_ctx(aead);
H
Herbert Xu 已提交
828
	struct aead_request *subreq = &rctx->subreq;
H
Herbert Xu 已提交
829
	struct crypto_aead *child = ctx->child;
H
Herbert Xu 已提交
830
	struct scatterlist *sg;
H
Herbert Xu 已提交
831 832 833
	u8 *iv = PTR_ALIGN((u8 *)(subreq + 1) + crypto_aead_reqsize(child),
			   crypto_aead_alignmask(child) + 1);

H
Herbert Xu 已提交
834 835
	scatterwalk_map_and_copy(iv + 12, req->src, 0, req->assoclen - 8, 0);

H
Herbert Xu 已提交
836 837 838
	memcpy(iv, ctx->nonce, 4);
	memcpy(iv + 4, req->iv, 8);

H
Herbert Xu 已提交
839 840 841 842 843 844 845 846 847 848 849 850 851 852
	sg_init_table(rctx->src, 3);
	sg_set_buf(rctx->src, iv + 12, req->assoclen - 8);
	sg = scatterwalk_ffwd(rctx->src + 1, req->src, req->assoclen);
	if (sg != rctx->src + 1)
		sg_chain(rctx->src, 2, sg);

	if (req->src != req->dst) {
		sg_init_table(rctx->dst, 3);
		sg_set_buf(rctx->dst, iv + 12, req->assoclen - 8);
		sg = scatterwalk_ffwd(rctx->dst + 1, req->dst, req->assoclen);
		if (sg != rctx->dst + 1)
			sg_chain(rctx->dst, 2, sg);
	}

H
Herbert Xu 已提交
853 854 855
	aead_request_set_tfm(subreq, child);
	aead_request_set_callback(subreq, req->base.flags, req->base.complete,
				  req->base.data);
H
Herbert Xu 已提交
856 857 858 859
	aead_request_set_crypt(subreq, rctx->src,
			       req->src == req->dst ? rctx->src : rctx->dst,
			       req->cryptlen, iv);
	aead_request_set_ad(subreq, req->assoclen - 8);
H
Herbert Xu 已提交
860 861 862 863 864 865

	return subreq;
}

static int crypto_rfc4106_encrypt(struct aead_request *req)
{
H
Herbert Xu 已提交
866 867 868
	if (req->assoclen != 16 && req->assoclen != 20)
		return -EINVAL;

H
Herbert Xu 已提交
869 870 871 872 873 874 875
	req = crypto_rfc4106_crypt(req);

	return crypto_aead_encrypt(req);
}

static int crypto_rfc4106_decrypt(struct aead_request *req)
{
H
Herbert Xu 已提交
876 877 878
	if (req->assoclen != 16 && req->assoclen != 20)
		return -EINVAL;

H
Herbert Xu 已提交
879 880 881 882 883
	req = crypto_rfc4106_crypt(req);

	return crypto_aead_decrypt(req);
}

884
static int crypto_rfc4106_init_tfm(struct crypto_aead *tfm)
H
Herbert Xu 已提交
885
{
886 887 888
	struct aead_instance *inst = aead_alg_instance(tfm);
	struct crypto_aead_spawn *spawn = aead_instance_ctx(inst);
	struct crypto_rfc4106_ctx *ctx = crypto_aead_ctx(tfm);
H
Herbert Xu 已提交
889 890 891 892 893 894 895 896 897 898 899
	struct crypto_aead *aead;
	unsigned long align;

	aead = crypto_spawn_aead(spawn);
	if (IS_ERR(aead))
		return PTR_ERR(aead);

	ctx->child = aead;

	align = crypto_aead_alignmask(aead);
	align &= ~(crypto_tfm_ctx_alignment() - 1);
900 901
	crypto_aead_set_reqsize(
		tfm,
H
Herbert Xu 已提交
902
		sizeof(struct crypto_rfc4106_req_ctx) +
903
		ALIGN(crypto_aead_reqsize(aead), crypto_tfm_ctx_alignment()) +
H
Herbert Xu 已提交
904
		align + 24);
H
Herbert Xu 已提交
905 906 907 908

	return 0;
}

909
static void crypto_rfc4106_exit_tfm(struct crypto_aead *tfm)
H
Herbert Xu 已提交
910
{
911
	struct crypto_rfc4106_ctx *ctx = crypto_aead_ctx(tfm);
H
Herbert Xu 已提交
912 913 914 915

	crypto_free_aead(ctx->child);
}

H
Herbert Xu 已提交
916 917 918 919 920 921
static void crypto_rfc4106_free(struct aead_instance *inst)
{
	crypto_drop_aead(aead_instance_ctx(inst));
	kfree(inst);
}

922 923
static int crypto_rfc4106_create(struct crypto_template *tmpl,
				 struct rtattr **tb)
H
Herbert Xu 已提交
924 925
{
	struct crypto_attr_type *algt;
926
	struct aead_instance *inst;
H
Herbert Xu 已提交
927
	struct crypto_aead_spawn *spawn;
928
	struct aead_alg *alg;
H
Herbert Xu 已提交
929 930 931 932 933
	const char *ccm_name;
	int err;

	algt = crypto_get_attr_type(tb);
	if (IS_ERR(algt))
934
		return PTR_ERR(algt);
H
Herbert Xu 已提交
935

936
	if ((algt->type ^ CRYPTO_ALG_TYPE_AEAD) & algt->mask)
937
		return -EINVAL;
H
Herbert Xu 已提交
938 939 940

	ccm_name = crypto_attr_alg_name(tb[1]);
	if (IS_ERR(ccm_name))
941
		return PTR_ERR(ccm_name);
H
Herbert Xu 已提交
942 943 944

	inst = kzalloc(sizeof(*inst) + sizeof(*spawn), GFP_KERNEL);
	if (!inst)
945
		return -ENOMEM;
H
Herbert Xu 已提交
946

947 948
	spawn = aead_instance_ctx(inst);
	crypto_set_aead_spawn(spawn, aead_crypto_instance(inst));
H
Herbert Xu 已提交
949 950 951 952 953
	err = crypto_grab_aead(spawn, ccm_name, 0,
			       crypto_requires_sync(algt->type, algt->mask));
	if (err)
		goto out_free_inst;

954
	alg = crypto_spawn_aead_alg(spawn);
H
Herbert Xu 已提交
955 956 957

	err = -EINVAL;

958 959
	/* Underlying IV size must be 12. */
	if (crypto_aead_alg_ivsize(alg) != 12)
H
Herbert Xu 已提交
960 961 962
		goto out_drop_alg;

	/* Not a stream cipher? */
963
	if (alg->base.cra_blocksize != 1)
H
Herbert Xu 已提交
964 965 966
		goto out_drop_alg;

	err = -ENAMETOOLONG;
967 968 969 970 971
	if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME,
		     "rfc4106(%s)", alg->base.cra_name) >=
	    CRYPTO_MAX_ALG_NAME ||
	    snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME,
		     "rfc4106(%s)", alg->base.cra_driver_name) >=
H
Herbert Xu 已提交
972 973 974
	    CRYPTO_MAX_ALG_NAME)
		goto out_drop_alg;

H
Herbert Xu 已提交
975
	inst->alg.base.cra_flags = alg->base.cra_flags & CRYPTO_ALG_ASYNC;
976 977 978
	inst->alg.base.cra_priority = alg->base.cra_priority;
	inst->alg.base.cra_blocksize = 1;
	inst->alg.base.cra_alignmask = alg->base.cra_alignmask;
H
Herbert Xu 已提交
979

980
	inst->alg.base.cra_ctxsize = sizeof(struct crypto_rfc4106_ctx);
H
Herbert Xu 已提交
981

982 983
	inst->alg.ivsize = 8;
	inst->alg.maxauthsize = crypto_aead_alg_maxauthsize(alg);
H
Herbert Xu 已提交
984

985 986
	inst->alg.init = crypto_rfc4106_init_tfm;
	inst->alg.exit = crypto_rfc4106_exit_tfm;
H
Herbert Xu 已提交
987

988 989 990 991
	inst->alg.setkey = crypto_rfc4106_setkey;
	inst->alg.setauthsize = crypto_rfc4106_setauthsize;
	inst->alg.encrypt = crypto_rfc4106_encrypt;
	inst->alg.decrypt = crypto_rfc4106_decrypt;
H
Herbert Xu 已提交
992

H
Herbert Xu 已提交
993 994
	inst->free = crypto_rfc4106_free;

995 996 997
	err = aead_register_instance(tmpl, inst);
	if (err)
		goto out_drop_alg;
H
Herbert Xu 已提交
998 999

out:
1000
	return err;
H
Herbert Xu 已提交
1001 1002 1003 1004 1005 1006 1007 1008 1009 1010

out_drop_alg:
	crypto_drop_aead(spawn);
out_free_inst:
	kfree(inst);
	goto out;
}

static struct crypto_template crypto_rfc4106_tmpl = {
	.name = "rfc4106",
1011
	.create = crypto_rfc4106_create,
H
Herbert Xu 已提交
1012 1013 1014
	.module = THIS_MODULE,
};

1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048
static int crypto_rfc4543_setkey(struct crypto_aead *parent, const u8 *key,
				 unsigned int keylen)
{
	struct crypto_rfc4543_ctx *ctx = crypto_aead_ctx(parent);
	struct crypto_aead *child = ctx->child;
	int err;

	if (keylen < 4)
		return -EINVAL;

	keylen -= 4;
	memcpy(ctx->nonce, key + keylen, 4);

	crypto_aead_clear_flags(child, CRYPTO_TFM_REQ_MASK);
	crypto_aead_set_flags(child, crypto_aead_get_flags(parent) &
				     CRYPTO_TFM_REQ_MASK);
	err = crypto_aead_setkey(child, key, keylen);
	crypto_aead_set_flags(parent, crypto_aead_get_flags(child) &
				      CRYPTO_TFM_RES_MASK);

	return err;
}

static int crypto_rfc4543_setauthsize(struct crypto_aead *parent,
				      unsigned int authsize)
{
	struct crypto_rfc4543_ctx *ctx = crypto_aead_ctx(parent);

	if (authsize != 16)
		return -EINVAL;

	return crypto_aead_setauthsize(ctx->child, authsize);
}

1049
static int crypto_rfc4543_crypt(struct aead_request *req, bool enc)
1050 1051 1052
{
	struct crypto_aead *aead = crypto_aead_reqtfm(req);
	struct crypto_rfc4543_ctx *ctx = crypto_aead_ctx(aead);
1053
	struct crypto_rfc4543_req_ctx *rctx = aead_request_ctx(req);
1054 1055 1056 1057
	struct aead_request *subreq = &rctx->subreq;
	unsigned int authsize = crypto_aead_authsize(aead);
	u8 *iv = PTR_ALIGN((u8 *)(rctx + 1) + crypto_aead_reqsize(ctx->child),
			   crypto_aead_alignmask(ctx->child) + 1);
1058 1059 1060 1061 1062 1063 1064
	int err;

	if (req->src != req->dst) {
		err = crypto_rfc4543_copy_src_to_dst(req, enc);
		if (err)
			return err;
	}
1065 1066 1067 1068 1069

	memcpy(iv, ctx->nonce, 4);
	memcpy(iv + 4, req->iv, 8);

	aead_request_set_tfm(subreq, ctx->child);
1070 1071 1072 1073 1074 1075 1076 1077
	aead_request_set_callback(subreq, req->base.flags,
				  req->base.complete, req->base.data);
	aead_request_set_crypt(subreq, req->src, req->dst,
			       enc ? 0 : authsize, iv);
	aead_request_set_ad(subreq, req->assoclen + req->cryptlen -
				    subreq->cryptlen);

	return enc ? crypto_aead_encrypt(subreq) : crypto_aead_decrypt(subreq);
1078 1079
}

1080 1081 1082 1083 1084
static int crypto_rfc4543_copy_src_to_dst(struct aead_request *req, bool enc)
{
	struct crypto_aead *aead = crypto_aead_reqtfm(req);
	struct crypto_rfc4543_ctx *ctx = crypto_aead_ctx(aead);
	unsigned int authsize = crypto_aead_authsize(aead);
1085 1086
	unsigned int nbytes = req->assoclen + req->cryptlen -
			      (enc ? 0 : authsize);
1087 1088 1089 1090 1091 1092 1093
	struct blkcipher_desc desc = {
		.tfm = ctx->null,
	};

	return crypto_blkcipher_encrypt(&desc, req->dst, req->src, nbytes);
}

1094 1095
static int crypto_rfc4543_encrypt(struct aead_request *req)
{
1096
	return crypto_rfc4543_crypt(req, true);
1097 1098 1099 1100
}

static int crypto_rfc4543_decrypt(struct aead_request *req)
{
1101
	return crypto_rfc4543_crypt(req, false);
1102 1103
}

1104
static int crypto_rfc4543_init_tfm(struct crypto_aead *tfm)
1105
{
1106 1107
	struct aead_instance *inst = aead_alg_instance(tfm);
	struct crypto_rfc4543_instance_ctx *ictx = aead_instance_ctx(inst);
1108
	struct crypto_aead_spawn *spawn = &ictx->aead;
1109
	struct crypto_rfc4543_ctx *ctx = crypto_aead_ctx(tfm);
1110
	struct crypto_aead *aead;
1111
	struct crypto_blkcipher *null;
1112
	unsigned long align;
1113
	int err = 0;
1114 1115 1116 1117 1118

	aead = crypto_spawn_aead(spawn);
	if (IS_ERR(aead))
		return PTR_ERR(aead);

1119
	null = crypto_get_default_null_skcipher();
1120 1121 1122 1123
	err = PTR_ERR(null);
	if (IS_ERR(null))
		goto err_free_aead;

1124
	ctx->child = aead;
1125
	ctx->null = null;
1126 1127 1128

	align = crypto_aead_alignmask(aead);
	align &= ~(crypto_tfm_ctx_alignment() - 1);
1129 1130
	crypto_aead_set_reqsize(
		tfm,
1131 1132
		sizeof(struct crypto_rfc4543_req_ctx) +
		ALIGN(crypto_aead_reqsize(aead), crypto_tfm_ctx_alignment()) +
1133
		align + 12);
1134 1135

	return 0;
1136 1137 1138 1139

err_free_aead:
	crypto_free_aead(aead);
	return err;
1140 1141
}

1142
static void crypto_rfc4543_exit_tfm(struct crypto_aead *tfm)
1143
{
1144
	struct crypto_rfc4543_ctx *ctx = crypto_aead_ctx(tfm);
1145 1146

	crypto_free_aead(ctx->child);
1147
	crypto_put_default_null_skcipher();
1148 1149
}

H
Herbert Xu 已提交
1150 1151 1152 1153 1154 1155 1156 1157 1158
static void crypto_rfc4543_free(struct aead_instance *inst)
{
	struct crypto_rfc4543_instance_ctx *ctx = aead_instance_ctx(inst);

	crypto_drop_aead(&ctx->aead);

	kfree(inst);
}

1159 1160
static int crypto_rfc4543_create(struct crypto_template *tmpl,
				struct rtattr **tb)
1161 1162
{
	struct crypto_attr_type *algt;
1163
	struct aead_instance *inst;
1164
	struct crypto_aead_spawn *spawn;
1165
	struct aead_alg *alg;
1166
	struct crypto_rfc4543_instance_ctx *ctx;
1167 1168 1169 1170 1171
	const char *ccm_name;
	int err;

	algt = crypto_get_attr_type(tb);
	if (IS_ERR(algt))
1172
		return PTR_ERR(algt);
1173

1174
	if ((algt->type ^ CRYPTO_ALG_TYPE_AEAD) & algt->mask)
1175
		return -EINVAL;
1176 1177 1178

	ccm_name = crypto_attr_alg_name(tb[1]);
	if (IS_ERR(ccm_name))
1179
		return PTR_ERR(ccm_name);
1180

1181
	inst = kzalloc(sizeof(*inst) + sizeof(*ctx), GFP_KERNEL);
1182
	if (!inst)
1183
		return -ENOMEM;
1184

1185
	ctx = aead_instance_ctx(inst);
1186
	spawn = &ctx->aead;
1187
	crypto_set_aead_spawn(spawn, aead_crypto_instance(inst));
1188 1189 1190 1191 1192
	err = crypto_grab_aead(spawn, ccm_name, 0,
			       crypto_requires_sync(algt->type, algt->mask));
	if (err)
		goto out_free_inst;

1193
	alg = crypto_spawn_aead_alg(spawn);
1194 1195 1196

	err = -EINVAL;

1197 1198
	/* Underlying IV size must be 12. */
	if (crypto_aead_alg_ivsize(alg) != 12)
1199
		goto out_drop_alg;
1200 1201

	/* Not a stream cipher? */
1202
	if (alg->base.cra_blocksize != 1)
1203
		goto out_drop_alg;
1204 1205

	err = -ENAMETOOLONG;
1206 1207 1208 1209 1210
	if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME,
		     "rfc4543(%s)", alg->base.cra_name) >=
	    CRYPTO_MAX_ALG_NAME ||
	    snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME,
		     "rfc4543(%s)", alg->base.cra_driver_name) >=
1211
	    CRYPTO_MAX_ALG_NAME)
1212
		goto out_drop_alg;
1213

1214 1215 1216 1217
	inst->alg.base.cra_flags = alg->base.cra_flags & CRYPTO_ALG_ASYNC;
	inst->alg.base.cra_priority = alg->base.cra_priority;
	inst->alg.base.cra_blocksize = 1;
	inst->alg.base.cra_alignmask = alg->base.cra_alignmask;
1218

1219
	inst->alg.base.cra_ctxsize = sizeof(struct crypto_rfc4543_ctx);
1220

1221 1222
	inst->alg.ivsize = 8;
	inst->alg.maxauthsize = crypto_aead_alg_maxauthsize(alg);
1223

1224 1225
	inst->alg.init = crypto_rfc4543_init_tfm;
	inst->alg.exit = crypto_rfc4543_exit_tfm;
1226

1227 1228 1229 1230
	inst->alg.setkey = crypto_rfc4543_setkey;
	inst->alg.setauthsize = crypto_rfc4543_setauthsize;
	inst->alg.encrypt = crypto_rfc4543_encrypt;
	inst->alg.decrypt = crypto_rfc4543_decrypt;
1231

H
Herbert Xu 已提交
1232 1233
	inst->free = crypto_rfc4543_free,

1234 1235 1236
	err = aead_register_instance(tmpl, inst);
	if (err)
		goto out_drop_alg;
1237 1238

out:
1239
	return err;
1240 1241 1242 1243 1244 1245 1246 1247 1248 1249

out_drop_alg:
	crypto_drop_aead(spawn);
out_free_inst:
	kfree(inst);
	goto out;
}

static struct crypto_template crypto_rfc4543_tmpl = {
	.name = "rfc4543",
1250
	.create = crypto_rfc4543_create,
1251 1252 1253
	.module = THIS_MODULE,
};

M
Mikko Herranen 已提交
1254 1255
static int __init crypto_gcm_module_init(void)
{
1256 1257
	int err;

1258
	gcm_zeroes = kzalloc(sizeof(*gcm_zeroes), GFP_KERNEL);
1259 1260 1261
	if (!gcm_zeroes)
		return -ENOMEM;

1262 1263
	sg_init_one(&gcm_zeroes->sg, gcm_zeroes->buf, sizeof(gcm_zeroes->buf));

1264 1265 1266 1267 1268 1269 1270 1271
	err = crypto_register_template(&crypto_gcm_base_tmpl);
	if (err)
		goto out;

	err = crypto_register_template(&crypto_gcm_tmpl);
	if (err)
		goto out_undo_base;

H
Herbert Xu 已提交
1272 1273 1274 1275
	err = crypto_register_template(&crypto_rfc4106_tmpl);
	if (err)
		goto out_undo_gcm;

1276 1277 1278 1279
	err = crypto_register_template(&crypto_rfc4543_tmpl);
	if (err)
		goto out_undo_rfc4106;

1280
	return 0;
1281

1282 1283
out_undo_rfc4106:
	crypto_unregister_template(&crypto_rfc4106_tmpl);
H
Herbert Xu 已提交
1284 1285
out_undo_gcm:
	crypto_unregister_template(&crypto_gcm_tmpl);
1286 1287
out_undo_base:
	crypto_unregister_template(&crypto_gcm_base_tmpl);
1288 1289 1290
out:
	kfree(gcm_zeroes);
	return err;
M
Mikko Herranen 已提交
1291 1292 1293 1294
}

static void __exit crypto_gcm_module_exit(void)
{
1295
	kfree(gcm_zeroes);
1296
	crypto_unregister_template(&crypto_rfc4543_tmpl);
H
Herbert Xu 已提交
1297
	crypto_unregister_template(&crypto_rfc4106_tmpl);
M
Mikko Herranen 已提交
1298
	crypto_unregister_template(&crypto_gcm_tmpl);
1299
	crypto_unregister_template(&crypto_gcm_base_tmpl);
M
Mikko Herranen 已提交
1300 1301 1302 1303 1304 1305 1306 1307
}

module_init(crypto_gcm_module_init);
module_exit(crypto_gcm_module_exit);

MODULE_LICENSE("GPL");
MODULE_DESCRIPTION("Galois/Counter Mode");
MODULE_AUTHOR("Mikko Herranen <mh1@iki.fi>");
1308 1309 1310
MODULE_ALIAS_CRYPTO("gcm_base");
MODULE_ALIAS_CRYPTO("rfc4106");
MODULE_ALIAS_CRYPTO("rfc4543");
1311
MODULE_ALIAS_CRYPTO("gcm");