gcm.c 33.1 KB
Newer Older
M
Mikko Herranen 已提交
1 2 3 4 5 6 7 8 9 10 11
/*
 * GCM: Galois/Counter Mode.
 *
 * Copyright (c) 2007 Nokia Siemens Networks - Mikko Herranen <mh1@iki.fi>
 *
 * This program is free software; you can redistribute it and/or modify it
 * under the terms of the GNU General Public License version 2 as published
 * by the Free Software Foundation.
 */

#include <crypto/gf128mul.h>
H
Herbert Xu 已提交
12
#include <crypto/internal/aead.h>
13
#include <crypto/internal/skcipher.h>
14
#include <crypto/internal/hash.h>
15
#include <crypto/null.h>
16
#include <crypto/scatterwalk.h>
17 18
#include <crypto/hash.h>
#include "internal.h"
19
#include <linux/completion.h>
M
Mikko Herranen 已提交
20 21 22 23 24 25 26
#include <linux/err.h>
#include <linux/init.h>
#include <linux/kernel.h>
#include <linux/module.h>
#include <linux/slab.h>

struct gcm_instance_ctx {
27
	struct crypto_skcipher_spawn ctr;
28
	struct crypto_ahash_spawn ghash;
M
Mikko Herranen 已提交
29 30 31 32
};

struct crypto_gcm_ctx {
	struct crypto_ablkcipher *ctr;
33
	struct crypto_ahash *ghash;
M
Mikko Herranen 已提交
34 35
};

H
Herbert Xu 已提交
36 37 38 39 40
struct crypto_rfc4106_ctx {
	struct crypto_aead *child;
	u8 nonce[4];
};

H
Herbert Xu 已提交
41 42 43 44 45 46
struct crypto_rfc4106_req_ctx {
	struct scatterlist src[3];
	struct scatterlist dst[3];
	struct aead_request subreq;
};

47 48 49 50
struct crypto_rfc4543_instance_ctx {
	struct crypto_aead_spawn aead;
};

51 52
struct crypto_rfc4543_ctx {
	struct crypto_aead *child;
53
	struct crypto_blkcipher *null;
54 55 56 57 58 59 60
	u8 nonce[4];
};

struct crypto_rfc4543_req_ctx {
	struct aead_request subreq;
};

M
Mikko Herranen 已提交
61
struct crypto_gcm_ghash_ctx {
62 63
	unsigned int cryptlen;
	struct scatterlist *src;
64
	int (*complete)(struct aead_request *req, u32 flags);
M
Mikko Herranen 已提交
65 66 67
};

struct crypto_gcm_req_priv_ctx {
68
	u8 iv[16];
M
Mikko Herranen 已提交
69
	u8 auth_tag[16];
H
Herbert Xu 已提交
70
	u8 iauth_tag[16];
71 72 73
	struct scatterlist src[3];
	struct scatterlist dst[3];
	struct scatterlist sg;
74 75 76 77 78
	struct crypto_gcm_ghash_ctx ghash_ctx;
	union {
		struct ahash_request ahreq;
		struct ablkcipher_request abreq;
	} u;
M
Mikko Herranen 已提交
79 80
};

81 82 83 84 85
struct crypto_gcm_setkey_result {
	int err;
	struct completion completion;
};

86 87 88 89 90 91
static struct {
	u8 buf[16];
	struct scatterlist sg;
} *gcm_zeroes;

static int crypto_rfc4543_copy_src_to_dst(struct aead_request *req, bool enc);
92

93 94 95 96 97 98 99 100
static inline struct crypto_gcm_req_priv_ctx *crypto_gcm_reqctx(
	struct aead_request *req)
{
	unsigned long align = crypto_aead_alignmask(crypto_aead_reqtfm(req));

	return (void *)PTR_ALIGN((u8 *)aead_request_ctx(req), align + 1);
}

101
static void crypto_gcm_setkey_done(struct crypto_async_request *req, int err)
M
Mikko Herranen 已提交
102
{
103
	struct crypto_gcm_setkey_result *result = req->data;
M
Mikko Herranen 已提交
104

105 106 107 108 109
	if (err == -EINPROGRESS)
		return;

	result->err = err;
	complete(&result->completion);
M
Mikko Herranen 已提交
110 111 112 113 114 115
}

static int crypto_gcm_setkey(struct crypto_aead *aead, const u8 *key,
			     unsigned int keylen)
{
	struct crypto_gcm_ctx *ctx = crypto_aead_ctx(aead);
116
	struct crypto_ahash *ghash = ctx->ghash;
M
Mikko Herranen 已提交
117
	struct crypto_ablkcipher *ctr = ctx->ctr;
118 119 120 121 122 123 124 125 126 127
	struct {
		be128 hash;
		u8 iv[8];

		struct crypto_gcm_setkey_result result;

		struct scatterlist sg[1];
		struct ablkcipher_request req;
	} *data;
	int err;
M
Mikko Herranen 已提交
128 129 130

	crypto_ablkcipher_clear_flags(ctr, CRYPTO_TFM_REQ_MASK);
	crypto_ablkcipher_set_flags(ctr, crypto_aead_get_flags(aead) &
131
					 CRYPTO_TFM_REQ_MASK);
M
Mikko Herranen 已提交
132
	err = crypto_ablkcipher_setkey(ctr, key, keylen);
133 134
	crypto_aead_set_flags(aead, crypto_ablkcipher_get_flags(ctr) &
				    CRYPTO_TFM_RES_MASK);
M
Mikko Herranen 已提交
135
	if (err)
136
		return err;
M
Mikko Herranen 已提交
137

138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160
	data = kzalloc(sizeof(*data) + crypto_ablkcipher_reqsize(ctr),
		       GFP_KERNEL);
	if (!data)
		return -ENOMEM;

	init_completion(&data->result.completion);
	sg_init_one(data->sg, &data->hash, sizeof(data->hash));
	ablkcipher_request_set_tfm(&data->req, ctr);
	ablkcipher_request_set_callback(&data->req, CRYPTO_TFM_REQ_MAY_SLEEP |
						    CRYPTO_TFM_REQ_MAY_BACKLOG,
					crypto_gcm_setkey_done,
					&data->result);
	ablkcipher_request_set_crypt(&data->req, data->sg, data->sg,
				     sizeof(data->hash), data->iv);

	err = crypto_ablkcipher_encrypt(&data->req);
	if (err == -EINPROGRESS || err == -EBUSY) {
		err = wait_for_completion_interruptible(
			&data->result.completion);
		if (!err)
			err = data->result.err;
	}

M
Mikko Herranen 已提交
161 162 163
	if (err)
		goto out;

164 165 166 167 168 169
	crypto_ahash_clear_flags(ghash, CRYPTO_TFM_REQ_MASK);
	crypto_ahash_set_flags(ghash, crypto_aead_get_flags(aead) &
			       CRYPTO_TFM_REQ_MASK);
	err = crypto_ahash_setkey(ghash, (u8 *)&data->hash, sizeof(be128));
	crypto_aead_set_flags(aead, crypto_ahash_get_flags(ghash) &
			      CRYPTO_TFM_RES_MASK);
M
Mikko Herranen 已提交
170

171
out:
172
	kzfree(data);
M
Mikko Herranen 已提交
173 174 175
	return err;
}

H
Herbert Xu 已提交
176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194
static int crypto_gcm_setauthsize(struct crypto_aead *tfm,
				  unsigned int authsize)
{
	switch (authsize) {
	case 4:
	case 8:
	case 12:
	case 13:
	case 14:
	case 15:
	case 16:
		break;
	default:
		return -EINVAL;
	}

	return 0;
}

195
static void crypto_gcm_init_common(struct aead_request *req)
M
Mikko Herranen 已提交
196
{
197
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
198
	__be32 counter = cpu_to_be32(1);
199
	struct scatterlist *sg;
200 201

	memset(pctx->auth_tag, 0, sizeof(pctx->auth_tag));
202 203
	memcpy(pctx->iv, req->iv, 12);
	memcpy(pctx->iv + 12, &counter, 4);
204

205
	sg_init_table(pctx->src, 3);
206
	sg_set_buf(pctx->src, pctx->auth_tag, sizeof(pctx->auth_tag));
207 208 209
	sg = scatterwalk_ffwd(pctx->src + 1, req->src, req->assoclen);
	if (sg != pctx->src + 1)
		scatterwalk_sg_chain(pctx->src, 2, sg);
210 211

	if (req->src != req->dst) {
212
		sg_init_table(pctx->dst, 3);
213
		sg_set_buf(pctx->dst, pctx->auth_tag, sizeof(pctx->auth_tag));
214 215 216
		sg = scatterwalk_ffwd(pctx->dst + 1, req->dst, req->assoclen);
		if (sg != pctx->dst + 1)
			scatterwalk_sg_chain(pctx->dst, 2, sg);
217
	}
218 219 220 221 222 223 224 225 226 227 228 229
}

static void crypto_gcm_init_crypt(struct aead_request *req,
				  unsigned int cryptlen)
{
	struct crypto_aead *aead = crypto_aead_reqtfm(req);
	struct crypto_gcm_ctx *ctx = crypto_aead_ctx(aead);
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
	struct ablkcipher_request *ablk_req = &pctx->u.abreq;
	struct scatterlist *dst;

	dst = req->src == req->dst ? pctx->src : pctx->dst;
M
Mikko Herranen 已提交
230 231

	ablkcipher_request_set_tfm(ablk_req, ctx->ctr);
232 233
	ablkcipher_request_set_crypt(ablk_req, pctx->src, dst,
				     cryptlen + sizeof(pctx->auth_tag),
234
				     pctx->iv);
235 236 237 238 239 240 241 242 243
}

static inline unsigned int gcm_remain(unsigned int len)
{
	len &= 0xfU;
	return len ? 16 - len : 0;
}

static void gcm_hash_len_done(struct crypto_async_request *areq, int err);
M
Mikko Herranen 已提交
244

245
static int gcm_hash_update(struct aead_request *req,
M
Mark Rustad 已提交
246
			   crypto_completion_t compl,
247
			   struct scatterlist *src,
248
			   unsigned int len, u32 flags)
249
{
250
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
251
	struct ahash_request *ahreq = &pctx->u.ahreq;
M
Mikko Herranen 已提交
252

253
	ahash_request_set_callback(ahreq, flags, compl, req);
254 255 256
	ahash_request_set_crypt(ahreq, src, NULL, len);

	return crypto_ahash_update(ahreq);
M
Mikko Herranen 已提交
257 258
}

259 260
static int gcm_hash_remain(struct aead_request *req,
			   unsigned int remain,
261
			   crypto_completion_t compl, u32 flags)
M
Mikko Herranen 已提交
262
{
263
	return gcm_hash_update(req, compl, &gcm_zeroes->sg, remain, flags);
264 265
}

266
static int gcm_hash_len(struct aead_request *req, u32 flags)
267
{
268
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
269 270 271 272 273 274 275
	struct ahash_request *ahreq = &pctx->u.ahreq;
	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;
	u128 lengths;

	lengths.a = cpu_to_be64(req->assoclen * 8);
	lengths.b = cpu_to_be64(gctx->cryptlen * 8);
	memcpy(pctx->iauth_tag, &lengths, 16);
276 277 278 279
	sg_init_one(&pctx->sg, pctx->iauth_tag, 16);
	ahash_request_set_callback(ahreq, flags, gcm_hash_len_done, req);
	ahash_request_set_crypt(ahreq, &pctx->sg,
				pctx->iauth_tag, sizeof(lengths));
280

281
	return crypto_ahash_finup(ahreq);
282 283
}

284
static int gcm_hash_len_continue(struct aead_request *req, u32 flags)
285
{
286
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
287 288
	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;

289
	return gctx->complete(req, flags);
290 291
}

292
static void gcm_hash_len_done(struct crypto_async_request *areq, int err)
293 294
{
	struct aead_request *req = areq->data;
295

296 297
	if (err)
		goto out;
298

299 300 301
	err = gcm_hash_len_continue(req, 0);
	if (err == -EINPROGRESS)
		return;
302

303 304
out:
	aead_request_complete(req, err);
305 306
}

307
static int gcm_hash_crypt_remain_continue(struct aead_request *req, u32 flags)
308
{
309 310
	return gcm_hash_len(req, flags) ?:
	       gcm_hash_len_continue(req, flags);
311 312
}

313 314
static void gcm_hash_crypt_remain_done(struct crypto_async_request *areq,
				       int err)
315 316
{
	struct aead_request *req = areq->data;
317

318 319 320 321 322 323 324 325 326
	if (err)
		goto out;

	err = gcm_hash_crypt_remain_continue(req, 0);
	if (err == -EINPROGRESS)
		return;

out:
	aead_request_complete(req, err);
327 328
}

329
static int gcm_hash_crypt_continue(struct aead_request *req, u32 flags)
330
{
331 332 333 334
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;
	unsigned int remain;

335 336 337 338 339
	remain = gcm_remain(gctx->cryptlen);
	if (remain)
		return gcm_hash_remain(req, remain,
				       gcm_hash_crypt_remain_done, flags) ?:
		       gcm_hash_crypt_remain_continue(req, flags);
340

341
	return gcm_hash_crypt_remain_continue(req, flags);
342 343
}

344
static void gcm_hash_crypt_done(struct crypto_async_request *areq, int err)
345 346
{
	struct aead_request *req = areq->data;
347

348 349 350 351 352 353 354 355 356
	if (err)
		goto out;

	err = gcm_hash_crypt_continue(req, 0);
	if (err == -EINPROGRESS)
		return;

out:
	aead_request_complete(req, err);
357 358
}

359
static int gcm_hash_assoc_remain_continue(struct aead_request *req, u32 flags)
360
{
361 362 363
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;

364 365 366 367 368 369
	if (gctx->cryptlen)
		return gcm_hash_update(req, gcm_hash_crypt_done,
				       gctx->src, gctx->cryptlen, flags) ?:
		       gcm_hash_crypt_continue(req, flags);

	return gcm_hash_crypt_remain_continue(req, flags);
370 371
}

372 373
static void gcm_hash_assoc_remain_done(struct crypto_async_request *areq,
				       int err)
374 375
{
	struct aead_request *req = areq->data;
376

377 378 379 380 381 382 383 384 385
	if (err)
		goto out;

	err = gcm_hash_assoc_remain_continue(req, 0);
	if (err == -EINPROGRESS)
		return;

out:
	aead_request_complete(req, err);
386 387
}

388
static int gcm_hash_assoc_continue(struct aead_request *req, u32 flags)
389
{
390 391
	unsigned int remain;

392 393 394 395 396
	remain = gcm_remain(req->assoclen);
	if (remain)
		return gcm_hash_remain(req, remain,
				       gcm_hash_assoc_remain_done, flags) ?:
		       gcm_hash_assoc_remain_continue(req, flags);
397

398
	return gcm_hash_assoc_remain_continue(req, flags);
399 400
}

401
static void gcm_hash_assoc_done(struct crypto_async_request *areq, int err)
402 403
{
	struct aead_request *req = areq->data;
404

405 406 407 408 409 410 411 412 413
	if (err)
		goto out;

	err = gcm_hash_assoc_continue(req, 0);
	if (err == -EINPROGRESS)
		return;

out:
	aead_request_complete(req, err);
414 415
}

416
static int gcm_hash_init_continue(struct aead_request *req, u32 flags)
417
{
418 419 420 421
	if (req->assoclen)
		return gcm_hash_update(req, gcm_hash_assoc_done,
				       req->src, req->assoclen, flags) ?:
		       gcm_hash_assoc_continue(req, flags);
422

423
	return gcm_hash_assoc_remain_continue(req, flags);
424 425 426 427 428 429
}

static void gcm_hash_init_done(struct crypto_async_request *areq, int err)
{
	struct aead_request *req = areq->data;

430 431 432 433 434 435 436 437 438
	if (err)
		goto out;

	err = gcm_hash_init_continue(req, 0);
	if (err == -EINPROGRESS)
		return;

out:
	aead_request_complete(req, err);
439 440
}

441
static int gcm_hash(struct aead_request *req, u32 flags)
442
{
443
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
444
	struct ahash_request *ahreq = &pctx->u.ahreq;
445
	struct crypto_gcm_ctx *ctx = crypto_aead_ctx(crypto_aead_reqtfm(req));
446 447 448

	ahash_request_set_tfm(ahreq, ctx->ghash);

449 450 451
	ahash_request_set_callback(ahreq, flags, gcm_hash_init_done, req);
	return crypto_ahash_init(ahreq) ?:
	       gcm_hash_init_continue(req, flags);
452 453
}

454
static int gcm_enc_copy_hash(struct aead_request *req, u32 flags)
455
{
456
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
457 458
	struct crypto_aead *aead = crypto_aead_reqtfm(req);
	u8 *auth_tag = pctx->auth_tag;
M
Mikko Herranen 已提交
459

460 461 462
	crypto_xor(auth_tag, pctx->iauth_tag, 16);
	scatterwalk_map_and_copy(auth_tag, req->dst,
				 req->assoclen + req->cryptlen,
H
Herbert Xu 已提交
463
				 crypto_aead_authsize(aead), 1);
464
	return 0;
H
Herbert Xu 已提交
465 466
}

467
static int gcm_encrypt_continue(struct aead_request *req, u32 flags)
H
Herbert Xu 已提交
468
{
469
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
470
	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;
H
Herbert Xu 已提交
471

472 473 474
	gctx->src = sg_next(req->src == req->dst ? pctx->src : pctx->dst);
	gctx->cryptlen = req->cryptlen;
	gctx->complete = gcm_enc_copy_hash;
H
Herbert Xu 已提交
475

476
	return gcm_hash(req, flags);
M
Mikko Herranen 已提交
477 478
}

479
static void gcm_encrypt_done(struct crypto_async_request *areq, int err)
480 481 482
{
	struct aead_request *req = areq->data;

483 484 485 486 487 488
	if (err)
		goto out;

	err = gcm_encrypt_continue(req, 0);
	if (err == -EINPROGRESS)
		return;
489

490
out:
491
	aead_request_complete(req, err);
492 493
}

M
Mikko Herranen 已提交
494 495
static int crypto_gcm_encrypt(struct aead_request *req)
{
496
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
497
	struct ablkcipher_request *abreq = &pctx->u.abreq;
498
	u32 flags = aead_request_flags(req);
499

500 501 502
	crypto_gcm_init_common(req);
	crypto_gcm_init_crypt(req, req->cryptlen);
	ablkcipher_request_set_callback(abreq, flags, gcm_encrypt_done, req);
503

504 505
	return crypto_ablkcipher_encrypt(abreq) ?:
	       gcm_encrypt_continue(req, flags);
M
Mikko Herranen 已提交
506 507
}

508
static int crypto_gcm_verify(struct aead_request *req)
509
{
510
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
511 512 513 514 515 516
	struct crypto_aead *aead = crypto_aead_reqtfm(req);
	u8 *auth_tag = pctx->auth_tag;
	u8 *iauth_tag = pctx->iauth_tag;
	unsigned int authsize = crypto_aead_authsize(aead);
	unsigned int cryptlen = req->cryptlen - authsize;

517
	crypto_xor(auth_tag, iauth_tag, 16);
518 519
	scatterwalk_map_and_copy(iauth_tag, req->src,
				 req->assoclen + cryptlen, authsize, 0);
520
	return crypto_memneq(iauth_tag, auth_tag, authsize) ? -EBADMSG : 0;
521 522
}

523
static void gcm_decrypt_done(struct crypto_async_request *areq, int err)
M
Mikko Herranen 已提交
524
{
525 526 527
	struct aead_request *req = areq->data;

	if (!err)
528
		err = crypto_gcm_verify(req);
529 530

	aead_request_complete(req, err);
M
Mikko Herranen 已提交
531 532
}

533
static int gcm_dec_hash_continue(struct aead_request *req, u32 flags)
534 535 536 537 538
{
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
	struct ablkcipher_request *abreq = &pctx->u.abreq;
	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;

539 540 541
	crypto_gcm_init_crypt(req, gctx->cryptlen);
	ablkcipher_request_set_callback(abreq, flags, gcm_decrypt_done, req);
	return crypto_ablkcipher_decrypt(abreq) ?: crypto_gcm_verify(req);
542 543
}

M
Mikko Herranen 已提交
544 545
static int crypto_gcm_decrypt(struct aead_request *req)
{
H
Herbert Xu 已提交
546
	struct crypto_aead *aead = crypto_aead_reqtfm(req);
547
	struct crypto_gcm_req_priv_ctx *pctx = crypto_gcm_reqctx(req);
548
	struct crypto_gcm_ghash_ctx *gctx = &pctx->ghash_ctx;
H
Herbert Xu 已提交
549
	unsigned int authsize = crypto_aead_authsize(aead);
550
	unsigned int cryptlen = req->cryptlen;
551
	u32 flags = aead_request_flags(req);
M
Mikko Herranen 已提交
552

H
Herbert Xu 已提交
553
	cryptlen -= authsize;
M
Mikko Herranen 已提交
554

555
	crypto_gcm_init_common(req);
M
Mikko Herranen 已提交
556

557 558 559
	gctx->src = sg_next(pctx->src);
	gctx->cryptlen = cryptlen;
	gctx->complete = gcm_dec_hash_continue;
M
Mikko Herranen 已提交
560

561
	return gcm_hash(req, flags);
M
Mikko Herranen 已提交
562 563
}

564
static int crypto_gcm_init_tfm(struct crypto_aead *tfm)
M
Mikko Herranen 已提交
565
{
566 567 568
	struct aead_instance *inst = aead_alg_instance(tfm);
	struct gcm_instance_ctx *ictx = aead_instance_ctx(inst);
	struct crypto_gcm_ctx *ctx = crypto_aead_ctx(tfm);
M
Mikko Herranen 已提交
569
	struct crypto_ablkcipher *ctr;
570
	struct crypto_ahash *ghash;
M
Mikko Herranen 已提交
571 572 573
	unsigned long align;
	int err;

574 575 576 577
	ghash = crypto_spawn_ahash(&ictx->ghash);
	if (IS_ERR(ghash))
		return PTR_ERR(ghash);

578
	ctr = crypto_spawn_skcipher(&ictx->ctr);
M
Mikko Herranen 已提交
579 580
	err = PTR_ERR(ctr);
	if (IS_ERR(ctr))
581
		goto err_free_hash;
M
Mikko Herranen 已提交
582 583

	ctx->ctr = ctr;
584
	ctx->ghash = ghash;
M
Mikko Herranen 已提交
585

586
	align = crypto_aead_alignmask(tfm);
M
Mikko Herranen 已提交
587
	align &= ~(crypto_tfm_ctx_alignment() - 1);
588
	crypto_aead_set_reqsize(tfm,
589
		align + offsetof(struct crypto_gcm_req_priv_ctx, u) +
590 591 592
		max(sizeof(struct ablkcipher_request) +
		    crypto_ablkcipher_reqsize(ctr),
		    sizeof(struct ahash_request) +
593
		    crypto_ahash_reqsize(ghash)));
M
Mikko Herranen 已提交
594 595

	return 0;
596 597 598 599

err_free_hash:
	crypto_free_ahash(ghash);
	return err;
M
Mikko Herranen 已提交
600 601
}

602
static void crypto_gcm_exit_tfm(struct crypto_aead *tfm)
M
Mikko Herranen 已提交
603
{
604
	struct crypto_gcm_ctx *ctx = crypto_aead_ctx(tfm);
M
Mikko Herranen 已提交
605

606
	crypto_free_ahash(ctx->ghash);
M
Mikko Herranen 已提交
607 608 609
	crypto_free_ablkcipher(ctx->ctr);
}

H
Herbert Xu 已提交
610 611 612 613 614 615 616 617 618
static void crypto_gcm_free(struct aead_instance *inst)
{
	struct gcm_instance_ctx *ctx = aead_instance_ctx(inst);

	crypto_drop_skcipher(&ctx->ctr);
	crypto_drop_ahash(&ctx->ghash);
	kfree(inst);
}

619 620 621 622 623
static int crypto_gcm_create_common(struct crypto_template *tmpl,
				    struct rtattr **tb,
				    const char *full_name,
				    const char *ctr_name,
				    const char *ghash_name)
M
Mikko Herranen 已提交
624
{
625
	struct crypto_attr_type *algt;
626
	struct aead_instance *inst;
M
Mikko Herranen 已提交
627
	struct crypto_alg *ctr;
628
	struct crypto_alg *ghash_alg;
629
	struct hash_alg_common *ghash;
M
Mikko Herranen 已提交
630 631 632
	struct gcm_instance_ctx *ctx;
	int err;

633 634
	algt = crypto_get_attr_type(tb);
	if (IS_ERR(algt))
635
		return PTR_ERR(algt);
M
Mikko Herranen 已提交
636

H
Herbert Xu 已提交
637 638
	if ((algt->type ^ (CRYPTO_ALG_TYPE_AEAD | CRYPTO_ALG_AEAD_NEW)) &
	    algt->mask)
639
		return -EINVAL;
M
Mikko Herranen 已提交
640

641 642 643 644
	ghash_alg = crypto_find_alg(ghash_name, &crypto_ahash_type,
				    CRYPTO_ALG_TYPE_HASH,
				    CRYPTO_ALG_TYPE_AHASH_MASK);
	if (IS_ERR(ghash_alg))
645 646 647
		return PTR_ERR(ghash_alg);

	ghash = __crypto_hash_alg_common(ghash_alg);
648 649

	err = -ENOMEM;
650 651
	inst = kzalloc(sizeof(*inst) + sizeof(*ctx), GFP_KERNEL);
	if (!inst)
652
		goto out_put_ghash;
M
Mikko Herranen 已提交
653

654 655 656
	ctx = aead_instance_ctx(inst);
	err = crypto_init_ahash_spawn(&ctx->ghash, ghash,
				      aead_crypto_instance(inst));
657 658 659
	if (err)
		goto err_free_inst;

660 661 662 663 664
	err = -EINVAL;
	if (ghash->digestsize != 16)
		goto err_drop_ghash;

	crypto_set_skcipher_spawn(&ctx->ctr, aead_crypto_instance(inst));
665 666 667 668
	err = crypto_grab_skcipher(&ctx->ctr, ctr_name, 0,
				   crypto_requires_sync(algt->type,
							algt->mask));
	if (err)
669
		goto err_drop_ghash;
670 671

	ctr = crypto_skcipher_spawn_alg(&ctx->ctr);
M
Mikko Herranen 已提交
672

673
	/* We only support 16-byte blocks. */
674
	if (ctr->cra_ablkcipher.ivsize != 16)
675 676 677 678 679
		goto out_put_ctr;

	/* Not a stream cipher? */
	err = -EINVAL;
	if (ctr->cra_blocksize != 1)
M
Mikko Herranen 已提交
680 681 682
		goto out_put_ctr;

	err = -ENAMETOOLONG;
683
	if (snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME,
684 685
		     "gcm_base(%s,%s)", ctr->cra_driver_name,
		     ghash_alg->cra_driver_name) >=
686
	    CRYPTO_MAX_ALG_NAME)
687
		goto out_put_ctr;
M
Mikko Herranen 已提交
688

689 690 691 692
	memcpy(inst->alg.base.cra_name, full_name, CRYPTO_MAX_ALG_NAME);

	inst->alg.base.cra_flags = (ghash->base.cra_flags | ctr->cra_flags) &
				   CRYPTO_ALG_ASYNC;
H
Herbert Xu 已提交
693
	inst->alg.base.cra_flags |= CRYPTO_ALG_AEAD_NEW;
694 695 696 697 698 699 700 701 702 703 704 705 706 707 708
	inst->alg.base.cra_priority = (ghash->base.cra_priority +
				       ctr->cra_priority) / 2;
	inst->alg.base.cra_blocksize = 1;
	inst->alg.base.cra_alignmask = ghash->base.cra_alignmask |
				       ctr->cra_alignmask;
	inst->alg.base.cra_ctxsize = sizeof(struct crypto_gcm_ctx);
	inst->alg.ivsize = 12;
	inst->alg.maxauthsize = 16;
	inst->alg.init = crypto_gcm_init_tfm;
	inst->alg.exit = crypto_gcm_exit_tfm;
	inst->alg.setkey = crypto_gcm_setkey;
	inst->alg.setauthsize = crypto_gcm_setauthsize;
	inst->alg.encrypt = crypto_gcm_encrypt;
	inst->alg.decrypt = crypto_gcm_decrypt;

H
Herbert Xu 已提交
709 710
	inst->free = crypto_gcm_free;

711 712 713
	err = aead_register_instance(tmpl, inst);
	if (err)
		goto out_put_ctr;
M
Mikko Herranen 已提交
714

715
out_put_ghash:
716
	crypto_mod_put(ghash_alg);
717
	return err;
718 719 720

out_put_ctr:
	crypto_drop_skcipher(&ctx->ctr);
721 722
err_drop_ghash:
	crypto_drop_ahash(&ctx->ghash);
M
Mikko Herranen 已提交
723 724
err_free_inst:
	kfree(inst);
725
	goto out_put_ghash;
M
Mikko Herranen 已提交
726 727
}

728
static int crypto_gcm_create(struct crypto_template *tmpl, struct rtattr **tb)
729 730 731 732 733 734 735
{
	const char *cipher_name;
	char ctr_name[CRYPTO_MAX_ALG_NAME];
	char full_name[CRYPTO_MAX_ALG_NAME];

	cipher_name = crypto_attr_alg_name(tb[1]);
	if (IS_ERR(cipher_name))
736
		return PTR_ERR(cipher_name);
737 738 739

	if (snprintf(ctr_name, CRYPTO_MAX_ALG_NAME, "ctr(%s)", cipher_name) >=
	    CRYPTO_MAX_ALG_NAME)
740
		return -ENAMETOOLONG;
741 742 743

	if (snprintf(full_name, CRYPTO_MAX_ALG_NAME, "gcm(%s)", cipher_name) >=
	    CRYPTO_MAX_ALG_NAME)
744
		return -ENAMETOOLONG;
745

746 747
	return crypto_gcm_create_common(tmpl, tb, full_name,
					ctr_name, "ghash");
748 749
}

M
Mikko Herranen 已提交
750 751
static struct crypto_template crypto_gcm_tmpl = {
	.name = "gcm",
752
	.create = crypto_gcm_create,
M
Mikko Herranen 已提交
753 754 755
	.module = THIS_MODULE,
};

756 757
static int crypto_gcm_base_create(struct crypto_template *tmpl,
				  struct rtattr **tb)
758 759
{
	const char *ctr_name;
760
	const char *ghash_name;
761 762 763 764
	char full_name[CRYPTO_MAX_ALG_NAME];

	ctr_name = crypto_attr_alg_name(tb[1]);
	if (IS_ERR(ctr_name))
765
		return PTR_ERR(ctr_name);
766

767 768
	ghash_name = crypto_attr_alg_name(tb[2]);
	if (IS_ERR(ghash_name))
769
		return PTR_ERR(ghash_name);
770 771 772

	if (snprintf(full_name, CRYPTO_MAX_ALG_NAME, "gcm_base(%s,%s)",
		     ctr_name, ghash_name) >= CRYPTO_MAX_ALG_NAME)
773
		return -ENAMETOOLONG;
774

775 776
	return crypto_gcm_create_common(tmpl, tb, full_name,
					ctr_name, ghash_name);
777 778 779 780
}

static struct crypto_template crypto_gcm_base_tmpl = {
	.name = "gcm_base",
781
	.create = crypto_gcm_base_create,
782 783 784
	.module = THIS_MODULE,
};

H
Herbert Xu 已提交
785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826
static int crypto_rfc4106_setkey(struct crypto_aead *parent, const u8 *key,
				 unsigned int keylen)
{
	struct crypto_rfc4106_ctx *ctx = crypto_aead_ctx(parent);
	struct crypto_aead *child = ctx->child;
	int err;

	if (keylen < 4)
		return -EINVAL;

	keylen -= 4;
	memcpy(ctx->nonce, key + keylen, 4);

	crypto_aead_clear_flags(child, CRYPTO_TFM_REQ_MASK);
	crypto_aead_set_flags(child, crypto_aead_get_flags(parent) &
				     CRYPTO_TFM_REQ_MASK);
	err = crypto_aead_setkey(child, key, keylen);
	crypto_aead_set_flags(parent, crypto_aead_get_flags(child) &
				      CRYPTO_TFM_RES_MASK);

	return err;
}

static int crypto_rfc4106_setauthsize(struct crypto_aead *parent,
				      unsigned int authsize)
{
	struct crypto_rfc4106_ctx *ctx = crypto_aead_ctx(parent);

	switch (authsize) {
	case 8:
	case 12:
	case 16:
		break;
	default:
		return -EINVAL;
	}

	return crypto_aead_setauthsize(ctx->child, authsize);
}

static struct aead_request *crypto_rfc4106_crypt(struct aead_request *req)
{
H
Herbert Xu 已提交
827
	struct crypto_rfc4106_req_ctx *rctx = aead_request_ctx(req);
H
Herbert Xu 已提交
828 829
	struct crypto_aead *aead = crypto_aead_reqtfm(req);
	struct crypto_rfc4106_ctx *ctx = crypto_aead_ctx(aead);
H
Herbert Xu 已提交
830
	struct aead_request *subreq = &rctx->subreq;
H
Herbert Xu 已提交
831
	struct crypto_aead *child = ctx->child;
H
Herbert Xu 已提交
832
	struct scatterlist *sg;
H
Herbert Xu 已提交
833 834 835
	u8 *iv = PTR_ALIGN((u8 *)(subreq + 1) + crypto_aead_reqsize(child),
			   crypto_aead_alignmask(child) + 1);

H
Herbert Xu 已提交
836 837
	scatterwalk_map_and_copy(iv + 12, req->src, 0, req->assoclen - 8, 0);

H
Herbert Xu 已提交
838 839 840
	memcpy(iv, ctx->nonce, 4);
	memcpy(iv + 4, req->iv, 8);

H
Herbert Xu 已提交
841 842 843 844 845 846 847 848 849 850 851 852 853 854
	sg_init_table(rctx->src, 3);
	sg_set_buf(rctx->src, iv + 12, req->assoclen - 8);
	sg = scatterwalk_ffwd(rctx->src + 1, req->src, req->assoclen);
	if (sg != rctx->src + 1)
		sg_chain(rctx->src, 2, sg);

	if (req->src != req->dst) {
		sg_init_table(rctx->dst, 3);
		sg_set_buf(rctx->dst, iv + 12, req->assoclen - 8);
		sg = scatterwalk_ffwd(rctx->dst + 1, req->dst, req->assoclen);
		if (sg != rctx->dst + 1)
			sg_chain(rctx->dst, 2, sg);
	}

H
Herbert Xu 已提交
855 856 857
	aead_request_set_tfm(subreq, child);
	aead_request_set_callback(subreq, req->base.flags, req->base.complete,
				  req->base.data);
H
Herbert Xu 已提交
858 859 860 861
	aead_request_set_crypt(subreq, rctx->src,
			       req->src == req->dst ? rctx->src : rctx->dst,
			       req->cryptlen, iv);
	aead_request_set_ad(subreq, req->assoclen - 8);
H
Herbert Xu 已提交
862 863 864 865 866 867

	return subreq;
}

static int crypto_rfc4106_encrypt(struct aead_request *req)
{
H
Herbert Xu 已提交
868 869 870
	if (req->assoclen != 16 && req->assoclen != 20)
		return -EINVAL;

H
Herbert Xu 已提交
871 872 873 874 875 876 877
	req = crypto_rfc4106_crypt(req);

	return crypto_aead_encrypt(req);
}

static int crypto_rfc4106_decrypt(struct aead_request *req)
{
H
Herbert Xu 已提交
878 879 880
	if (req->assoclen != 16 && req->assoclen != 20)
		return -EINVAL;

H
Herbert Xu 已提交
881 882 883 884 885
	req = crypto_rfc4106_crypt(req);

	return crypto_aead_decrypt(req);
}

886
static int crypto_rfc4106_init_tfm(struct crypto_aead *tfm)
H
Herbert Xu 已提交
887
{
888 889 890
	struct aead_instance *inst = aead_alg_instance(tfm);
	struct crypto_aead_spawn *spawn = aead_instance_ctx(inst);
	struct crypto_rfc4106_ctx *ctx = crypto_aead_ctx(tfm);
H
Herbert Xu 已提交
891 892 893 894 895 896 897 898 899 900 901
	struct crypto_aead *aead;
	unsigned long align;

	aead = crypto_spawn_aead(spawn);
	if (IS_ERR(aead))
		return PTR_ERR(aead);

	ctx->child = aead;

	align = crypto_aead_alignmask(aead);
	align &= ~(crypto_tfm_ctx_alignment() - 1);
902 903
	crypto_aead_set_reqsize(
		tfm,
H
Herbert Xu 已提交
904
		sizeof(struct crypto_rfc4106_req_ctx) +
905
		ALIGN(crypto_aead_reqsize(aead), crypto_tfm_ctx_alignment()) +
H
Herbert Xu 已提交
906
		align + 24);
H
Herbert Xu 已提交
907 908 909 910

	return 0;
}

911
static void crypto_rfc4106_exit_tfm(struct crypto_aead *tfm)
H
Herbert Xu 已提交
912
{
913
	struct crypto_rfc4106_ctx *ctx = crypto_aead_ctx(tfm);
H
Herbert Xu 已提交
914 915 916 917

	crypto_free_aead(ctx->child);
}

H
Herbert Xu 已提交
918 919 920 921 922 923
static void crypto_rfc4106_free(struct aead_instance *inst)
{
	crypto_drop_aead(aead_instance_ctx(inst));
	kfree(inst);
}

924 925
static int crypto_rfc4106_create(struct crypto_template *tmpl,
				 struct rtattr **tb)
H
Herbert Xu 已提交
926 927
{
	struct crypto_attr_type *algt;
928
	struct aead_instance *inst;
H
Herbert Xu 已提交
929
	struct crypto_aead_spawn *spawn;
930
	struct aead_alg *alg;
H
Herbert Xu 已提交
931 932 933 934 935
	const char *ccm_name;
	int err;

	algt = crypto_get_attr_type(tb);
	if (IS_ERR(algt))
936
		return PTR_ERR(algt);
H
Herbert Xu 已提交
937

H
Herbert Xu 已提交
938 939
	if ((algt->type ^ (CRYPTO_ALG_TYPE_AEAD | CRYPTO_ALG_AEAD_NEW)) &
	    algt->mask)
940
		return -EINVAL;
H
Herbert Xu 已提交
941 942 943

	ccm_name = crypto_attr_alg_name(tb[1]);
	if (IS_ERR(ccm_name))
944
		return PTR_ERR(ccm_name);
H
Herbert Xu 已提交
945 946 947

	inst = kzalloc(sizeof(*inst) + sizeof(*spawn), GFP_KERNEL);
	if (!inst)
948
		return -ENOMEM;
H
Herbert Xu 已提交
949

950 951
	spawn = aead_instance_ctx(inst);
	crypto_set_aead_spawn(spawn, aead_crypto_instance(inst));
H
Herbert Xu 已提交
952 953 954 955 956
	err = crypto_grab_aead(spawn, ccm_name, 0,
			       crypto_requires_sync(algt->type, algt->mask));
	if (err)
		goto out_free_inst;

957
	alg = crypto_spawn_aead_alg(spawn);
H
Herbert Xu 已提交
958 959 960

	err = -EINVAL;

961 962
	/* Underlying IV size must be 12. */
	if (crypto_aead_alg_ivsize(alg) != 12)
H
Herbert Xu 已提交
963 964 965
		goto out_drop_alg;

	/* Not a stream cipher? */
966
	if (alg->base.cra_blocksize != 1)
H
Herbert Xu 已提交
967 968 969
		goto out_drop_alg;

	err = -ENAMETOOLONG;
970 971 972 973 974
	if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME,
		     "rfc4106(%s)", alg->base.cra_name) >=
	    CRYPTO_MAX_ALG_NAME ||
	    snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME,
		     "rfc4106(%s)", alg->base.cra_driver_name) >=
H
Herbert Xu 已提交
975 976 977
	    CRYPTO_MAX_ALG_NAME)
		goto out_drop_alg;

H
Herbert Xu 已提交
978 979
	inst->alg.base.cra_flags = alg->base.cra_flags & CRYPTO_ALG_ASYNC;
	inst->alg.base.cra_flags |= CRYPTO_ALG_AEAD_NEW;
980 981 982
	inst->alg.base.cra_priority = alg->base.cra_priority;
	inst->alg.base.cra_blocksize = 1;
	inst->alg.base.cra_alignmask = alg->base.cra_alignmask;
H
Herbert Xu 已提交
983

984
	inst->alg.base.cra_ctxsize = sizeof(struct crypto_rfc4106_ctx);
H
Herbert Xu 已提交
985

986 987
	inst->alg.ivsize = 8;
	inst->alg.maxauthsize = crypto_aead_alg_maxauthsize(alg);
H
Herbert Xu 已提交
988

989 990
	inst->alg.init = crypto_rfc4106_init_tfm;
	inst->alg.exit = crypto_rfc4106_exit_tfm;
H
Herbert Xu 已提交
991

992 993 994 995
	inst->alg.setkey = crypto_rfc4106_setkey;
	inst->alg.setauthsize = crypto_rfc4106_setauthsize;
	inst->alg.encrypt = crypto_rfc4106_encrypt;
	inst->alg.decrypt = crypto_rfc4106_decrypt;
H
Herbert Xu 已提交
996

H
Herbert Xu 已提交
997 998
	inst->free = crypto_rfc4106_free;

999 1000 1001
	err = aead_register_instance(tmpl, inst);
	if (err)
		goto out_drop_alg;
H
Herbert Xu 已提交
1002 1003

out:
1004
	return err;
H
Herbert Xu 已提交
1005 1006 1007 1008 1009 1010 1011 1012 1013 1014

out_drop_alg:
	crypto_drop_aead(spawn);
out_free_inst:
	kfree(inst);
	goto out;
}

static struct crypto_template crypto_rfc4106_tmpl = {
	.name = "rfc4106",
1015
	.create = crypto_rfc4106_create,
H
Herbert Xu 已提交
1016 1017 1018
	.module = THIS_MODULE,
};

1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052
static int crypto_rfc4543_setkey(struct crypto_aead *parent, const u8 *key,
				 unsigned int keylen)
{
	struct crypto_rfc4543_ctx *ctx = crypto_aead_ctx(parent);
	struct crypto_aead *child = ctx->child;
	int err;

	if (keylen < 4)
		return -EINVAL;

	keylen -= 4;
	memcpy(ctx->nonce, key + keylen, 4);

	crypto_aead_clear_flags(child, CRYPTO_TFM_REQ_MASK);
	crypto_aead_set_flags(child, crypto_aead_get_flags(parent) &
				     CRYPTO_TFM_REQ_MASK);
	err = crypto_aead_setkey(child, key, keylen);
	crypto_aead_set_flags(parent, crypto_aead_get_flags(child) &
				      CRYPTO_TFM_RES_MASK);

	return err;
}

static int crypto_rfc4543_setauthsize(struct crypto_aead *parent,
				      unsigned int authsize)
{
	struct crypto_rfc4543_ctx *ctx = crypto_aead_ctx(parent);

	if (authsize != 16)
		return -EINVAL;

	return crypto_aead_setauthsize(ctx->child, authsize);
}

1053
static int crypto_rfc4543_crypt(struct aead_request *req, bool enc)
1054 1055 1056
{
	struct crypto_aead *aead = crypto_aead_reqtfm(req);
	struct crypto_rfc4543_ctx *ctx = crypto_aead_ctx(aead);
1057
	struct crypto_rfc4543_req_ctx *rctx = aead_request_ctx(req);
1058 1059 1060 1061
	struct aead_request *subreq = &rctx->subreq;
	unsigned int authsize = crypto_aead_authsize(aead);
	u8 *iv = PTR_ALIGN((u8 *)(rctx + 1) + crypto_aead_reqsize(ctx->child),
			   crypto_aead_alignmask(ctx->child) + 1);
1062 1063 1064 1065 1066 1067 1068
	int err;

	if (req->src != req->dst) {
		err = crypto_rfc4543_copy_src_to_dst(req, enc);
		if (err)
			return err;
	}
1069 1070 1071 1072 1073

	memcpy(iv, ctx->nonce, 4);
	memcpy(iv + 4, req->iv, 8);

	aead_request_set_tfm(subreq, ctx->child);
1074 1075 1076 1077 1078 1079 1080 1081
	aead_request_set_callback(subreq, req->base.flags,
				  req->base.complete, req->base.data);
	aead_request_set_crypt(subreq, req->src, req->dst,
			       enc ? 0 : authsize, iv);
	aead_request_set_ad(subreq, req->assoclen + req->cryptlen -
				    subreq->cryptlen);

	return enc ? crypto_aead_encrypt(subreq) : crypto_aead_decrypt(subreq);
1082 1083
}

1084 1085 1086 1087 1088
static int crypto_rfc4543_copy_src_to_dst(struct aead_request *req, bool enc)
{
	struct crypto_aead *aead = crypto_aead_reqtfm(req);
	struct crypto_rfc4543_ctx *ctx = crypto_aead_ctx(aead);
	unsigned int authsize = crypto_aead_authsize(aead);
1089 1090
	unsigned int nbytes = req->assoclen + req->cryptlen -
			      (enc ? 0 : authsize);
1091 1092 1093 1094 1095 1096 1097
	struct blkcipher_desc desc = {
		.tfm = ctx->null,
	};

	return crypto_blkcipher_encrypt(&desc, req->dst, req->src, nbytes);
}

1098 1099
static int crypto_rfc4543_encrypt(struct aead_request *req)
{
1100
	return crypto_rfc4543_crypt(req, true);
1101 1102 1103 1104
}

static int crypto_rfc4543_decrypt(struct aead_request *req)
{
1105
	return crypto_rfc4543_crypt(req, false);
1106 1107
}

1108
static int crypto_rfc4543_init_tfm(struct crypto_aead *tfm)
1109
{
1110 1111
	struct aead_instance *inst = aead_alg_instance(tfm);
	struct crypto_rfc4543_instance_ctx *ictx = aead_instance_ctx(inst);
1112
	struct crypto_aead_spawn *spawn = &ictx->aead;
1113
	struct crypto_rfc4543_ctx *ctx = crypto_aead_ctx(tfm);
1114
	struct crypto_aead *aead;
1115
	struct crypto_blkcipher *null;
1116
	unsigned long align;
1117
	int err = 0;
1118 1119 1120 1121 1122

	aead = crypto_spawn_aead(spawn);
	if (IS_ERR(aead))
		return PTR_ERR(aead);

1123
	null = crypto_get_default_null_skcipher();
1124 1125 1126 1127
	err = PTR_ERR(null);
	if (IS_ERR(null))
		goto err_free_aead;

1128
	ctx->child = aead;
1129
	ctx->null = null;
1130 1131 1132

	align = crypto_aead_alignmask(aead);
	align &= ~(crypto_tfm_ctx_alignment() - 1);
1133 1134
	crypto_aead_set_reqsize(
		tfm,
1135 1136
		sizeof(struct crypto_rfc4543_req_ctx) +
		ALIGN(crypto_aead_reqsize(aead), crypto_tfm_ctx_alignment()) +
1137
		align + 12);
1138 1139

	return 0;
1140 1141 1142 1143

err_free_aead:
	crypto_free_aead(aead);
	return err;
1144 1145
}

1146
static void crypto_rfc4543_exit_tfm(struct crypto_aead *tfm)
1147
{
1148
	struct crypto_rfc4543_ctx *ctx = crypto_aead_ctx(tfm);
1149 1150

	crypto_free_aead(ctx->child);
1151
	crypto_put_default_null_skcipher();
1152 1153
}

H
Herbert Xu 已提交
1154 1155 1156 1157 1158 1159 1160 1161 1162
static void crypto_rfc4543_free(struct aead_instance *inst)
{
	struct crypto_rfc4543_instance_ctx *ctx = aead_instance_ctx(inst);

	crypto_drop_aead(&ctx->aead);

	kfree(inst);
}

1163 1164
static int crypto_rfc4543_create(struct crypto_template *tmpl,
				struct rtattr **tb)
1165 1166
{
	struct crypto_attr_type *algt;
1167
	struct aead_instance *inst;
1168
	struct crypto_aead_spawn *spawn;
1169
	struct aead_alg *alg;
1170
	struct crypto_rfc4543_instance_ctx *ctx;
1171 1172 1173 1174 1175
	const char *ccm_name;
	int err;

	algt = crypto_get_attr_type(tb);
	if (IS_ERR(algt))
1176
		return PTR_ERR(algt);
1177

H
Herbert Xu 已提交
1178 1179
	if ((algt->type ^ (CRYPTO_ALG_TYPE_AEAD | CRYPTO_ALG_AEAD_NEW)) &
	    algt->mask)
1180
		return -EINVAL;
1181 1182 1183

	ccm_name = crypto_attr_alg_name(tb[1]);
	if (IS_ERR(ccm_name))
1184
		return PTR_ERR(ccm_name);
1185

1186
	inst = kzalloc(sizeof(*inst) + sizeof(*ctx), GFP_KERNEL);
1187
	if (!inst)
1188
		return -ENOMEM;
1189

1190
	ctx = aead_instance_ctx(inst);
1191
	spawn = &ctx->aead;
1192
	crypto_set_aead_spawn(spawn, aead_crypto_instance(inst));
1193 1194 1195 1196 1197
	err = crypto_grab_aead(spawn, ccm_name, 0,
			       crypto_requires_sync(algt->type, algt->mask));
	if (err)
		goto out_free_inst;

1198
	alg = crypto_spawn_aead_alg(spawn);
1199 1200 1201

	err = -EINVAL;

1202 1203
	/* Underlying IV size must be 12. */
	if (crypto_aead_alg_ivsize(alg) != 12)
1204
		goto out_drop_alg;
1205 1206

	/* Not a stream cipher? */
1207
	if (alg->base.cra_blocksize != 1)
1208
		goto out_drop_alg;
1209 1210

	err = -ENAMETOOLONG;
1211 1212 1213 1214 1215
	if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME,
		     "rfc4543(%s)", alg->base.cra_name) >=
	    CRYPTO_MAX_ALG_NAME ||
	    snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME,
		     "rfc4543(%s)", alg->base.cra_driver_name) >=
1216
	    CRYPTO_MAX_ALG_NAME)
1217
		goto out_drop_alg;
1218

1219
	inst->alg.base.cra_flags = alg->base.cra_flags & CRYPTO_ALG_ASYNC;
H
Herbert Xu 已提交
1220
	inst->alg.base.cra_flags |= CRYPTO_ALG_AEAD_NEW;
1221 1222 1223
	inst->alg.base.cra_priority = alg->base.cra_priority;
	inst->alg.base.cra_blocksize = 1;
	inst->alg.base.cra_alignmask = alg->base.cra_alignmask;
1224

1225
	inst->alg.base.cra_ctxsize = sizeof(struct crypto_rfc4543_ctx);
1226

1227 1228
	inst->alg.ivsize = 8;
	inst->alg.maxauthsize = crypto_aead_alg_maxauthsize(alg);
1229

1230 1231
	inst->alg.init = crypto_rfc4543_init_tfm;
	inst->alg.exit = crypto_rfc4543_exit_tfm;
1232

1233 1234 1235 1236
	inst->alg.setkey = crypto_rfc4543_setkey;
	inst->alg.setauthsize = crypto_rfc4543_setauthsize;
	inst->alg.encrypt = crypto_rfc4543_encrypt;
	inst->alg.decrypt = crypto_rfc4543_decrypt;
1237

H
Herbert Xu 已提交
1238 1239
	inst->free = crypto_rfc4543_free,

1240 1241 1242
	err = aead_register_instance(tmpl, inst);
	if (err)
		goto out_drop_alg;
1243 1244

out:
1245
	return err;
1246 1247 1248 1249 1250 1251 1252 1253 1254 1255

out_drop_alg:
	crypto_drop_aead(spawn);
out_free_inst:
	kfree(inst);
	goto out;
}

static struct crypto_template crypto_rfc4543_tmpl = {
	.name = "rfc4543",
1256
	.create = crypto_rfc4543_create,
1257 1258 1259
	.module = THIS_MODULE,
};

M
Mikko Herranen 已提交
1260 1261
static int __init crypto_gcm_module_init(void)
{
1262 1263
	int err;

1264
	gcm_zeroes = kzalloc(sizeof(*gcm_zeroes), GFP_KERNEL);
1265 1266 1267
	if (!gcm_zeroes)
		return -ENOMEM;

1268 1269
	sg_init_one(&gcm_zeroes->sg, gcm_zeroes->buf, sizeof(gcm_zeroes->buf));

1270 1271 1272 1273 1274 1275 1276 1277
	err = crypto_register_template(&crypto_gcm_base_tmpl);
	if (err)
		goto out;

	err = crypto_register_template(&crypto_gcm_tmpl);
	if (err)
		goto out_undo_base;

H
Herbert Xu 已提交
1278 1279 1280 1281
	err = crypto_register_template(&crypto_rfc4106_tmpl);
	if (err)
		goto out_undo_gcm;

1282 1283 1284 1285
	err = crypto_register_template(&crypto_rfc4543_tmpl);
	if (err)
		goto out_undo_rfc4106;

1286
	return 0;
1287

1288 1289
out_undo_rfc4106:
	crypto_unregister_template(&crypto_rfc4106_tmpl);
H
Herbert Xu 已提交
1290 1291
out_undo_gcm:
	crypto_unregister_template(&crypto_gcm_tmpl);
1292 1293
out_undo_base:
	crypto_unregister_template(&crypto_gcm_base_tmpl);
1294 1295 1296
out:
	kfree(gcm_zeroes);
	return err;
M
Mikko Herranen 已提交
1297 1298 1299 1300
}

static void __exit crypto_gcm_module_exit(void)
{
1301
	kfree(gcm_zeroes);
1302
	crypto_unregister_template(&crypto_rfc4543_tmpl);
H
Herbert Xu 已提交
1303
	crypto_unregister_template(&crypto_rfc4106_tmpl);
M
Mikko Herranen 已提交
1304
	crypto_unregister_template(&crypto_gcm_tmpl);
1305
	crypto_unregister_template(&crypto_gcm_base_tmpl);
M
Mikko Herranen 已提交
1306 1307 1308 1309 1310 1311 1312 1313
}

module_init(crypto_gcm_module_init);
module_exit(crypto_gcm_module_exit);

MODULE_LICENSE("GPL");
MODULE_DESCRIPTION("Galois/Counter Mode");
MODULE_AUTHOR("Mikko Herranen <mh1@iki.fi>");
1314 1315 1316
MODULE_ALIAS_CRYPTO("gcm_base");
MODULE_ALIAS_CRYPTO("rfc4106");
MODULE_ALIAS_CRYPTO("rfc4543");
1317
MODULE_ALIAS_CRYPTO("gcm");