2 * Symmetric key cipher operations.
4 * Generic encrypt/decrypt wrapper for ciphers, handles operations across
5 * multiple page boundaries by using temporary blocks. In user context,
6 * the kernel is given a chance to schedule us once per page.
8 * Copyright (c) 2015 Herbert Xu <herbert@gondor.apana.org.au>
10 * This program is free software; you can redistribute it and/or modify it
11 * under the terms of the GNU General Public License as published by the Free
12 * Software Foundation; either version 2 of the License, or (at your option)
17 #include <crypto/internal/aead.h>
18 #include <crypto/internal/skcipher.h>
19 #include <crypto/scatterwalk.h>
20 #include <linux/bug.h>
21 #include <linux/cryptouser.h>
22 #include <linux/compiler.h>
23 #include <linux/list.h>
24 #include <linux/module.h>
25 #include <linux/rtnetlink.h>
26 #include <linux/seq_file.h>
27 #include <net/netlink.h>
32 SKCIPHER_WALK_PHYS
= 1 << 0,
33 SKCIPHER_WALK_SLOW
= 1 << 1,
34 SKCIPHER_WALK_COPY
= 1 << 2,
35 SKCIPHER_WALK_DIFF
= 1 << 3,
36 SKCIPHER_WALK_SLEEP
= 1 << 4,
39 struct skcipher_walk_buffer
{
40 struct list_head entry
;
41 struct scatter_walk dst
;
47 static int skcipher_walk_next(struct skcipher_walk
*walk
);
49 static inline void skcipher_unmap(struct scatter_walk
*walk
, void *vaddr
)
51 if (PageHighMem(scatterwalk_page(walk
)))
55 static inline void *skcipher_map(struct scatter_walk
*walk
)
57 struct page
*page
= scatterwalk_page(walk
);
59 return (PageHighMem(page
) ? kmap_atomic(page
) : page_address(page
)) +
60 offset_in_page(walk
->offset
);
63 static inline void skcipher_map_src(struct skcipher_walk
*walk
)
65 walk
->src
.virt
.addr
= skcipher_map(&walk
->in
);
68 static inline void skcipher_map_dst(struct skcipher_walk
*walk
)
70 walk
->dst
.virt
.addr
= skcipher_map(&walk
->out
);
73 static inline void skcipher_unmap_src(struct skcipher_walk
*walk
)
75 skcipher_unmap(&walk
->in
, walk
->src
.virt
.addr
);
78 static inline void skcipher_unmap_dst(struct skcipher_walk
*walk
)
80 skcipher_unmap(&walk
->out
, walk
->dst
.virt
.addr
);
83 static inline gfp_t
skcipher_walk_gfp(struct skcipher_walk
*walk
)
85 return walk
->flags
& SKCIPHER_WALK_SLEEP
? GFP_KERNEL
: GFP_ATOMIC
;
88 /* Get a spot of the specified length that does not straddle a page.
89 * The caller needs to ensure that there is enough space for this operation.
91 static inline u8
*skcipher_get_spot(u8
*start
, unsigned int len
)
93 u8
*end_page
= (u8
*)(((unsigned long)(start
+ len
- 1)) & PAGE_MASK
);
95 return max(start
, end_page
);
98 static int skcipher_done_slow(struct skcipher_walk
*walk
, unsigned int bsize
)
102 addr
= (u8
*)ALIGN((unsigned long)walk
->buffer
, walk
->alignmask
+ 1);
103 addr
= skcipher_get_spot(addr
, bsize
);
104 scatterwalk_copychunks(addr
, &walk
->out
, bsize
,
105 (walk
->flags
& SKCIPHER_WALK_PHYS
) ? 2 : 1);
109 int skcipher_walk_done(struct skcipher_walk
*walk
, int err
)
111 unsigned int n
= walk
->nbytes
- err
;
114 nbytes
= walk
->total
- n
;
116 if (unlikely(err
< 0)) {
119 } else if (likely(!(walk
->flags
& (SKCIPHER_WALK_PHYS
|
122 SKCIPHER_WALK_DIFF
)))) {
124 skcipher_unmap_src(walk
);
125 } else if (walk
->flags
& SKCIPHER_WALK_DIFF
) {
126 skcipher_unmap_dst(walk
);
128 } else if (walk
->flags
& SKCIPHER_WALK_COPY
) {
129 skcipher_map_dst(walk
);
130 memcpy(walk
->dst
.virt
.addr
, walk
->page
, n
);
131 skcipher_unmap_dst(walk
);
132 } else if (unlikely(walk
->flags
& SKCIPHER_WALK_SLOW
)) {
137 n
= skcipher_done_slow(walk
, n
);
143 walk
->total
= nbytes
;
144 walk
->nbytes
= nbytes
;
146 scatterwalk_advance(&walk
->in
, n
);
147 scatterwalk_advance(&walk
->out
, n
);
148 scatterwalk_done(&walk
->in
, 0, nbytes
);
149 scatterwalk_done(&walk
->out
, 1, nbytes
);
152 crypto_yield(walk
->flags
& SKCIPHER_WALK_SLEEP
?
153 CRYPTO_TFM_REQ_MAY_SLEEP
: 0);
154 return skcipher_walk_next(walk
);
157 /* Short-circuit for the common/fast path. */
158 if (!((unsigned long)walk
->buffer
| (unsigned long)walk
->page
))
161 if (walk
->flags
& SKCIPHER_WALK_PHYS
)
164 if (walk
->iv
!= walk
->oiv
)
165 memcpy(walk
->oiv
, walk
->iv
, walk
->ivsize
);
166 if (walk
->buffer
!= walk
->page
)
169 free_page((unsigned long)walk
->page
);
174 EXPORT_SYMBOL_GPL(skcipher_walk_done
);
176 void skcipher_walk_complete(struct skcipher_walk
*walk
, int err
)
178 struct skcipher_walk_buffer
*p
, *tmp
;
180 list_for_each_entry_safe(p
, tmp
, &walk
->buffers
, entry
) {
188 data
= PTR_ALIGN(&p
->buffer
[0], walk
->alignmask
+ 1);
189 data
= skcipher_get_spot(data
, walk
->stride
);
192 scatterwalk_copychunks(data
, &p
->dst
, p
->len
, 1);
194 if (offset_in_page(p
->data
) + p
->len
+ walk
->stride
>
196 free_page((unsigned long)p
->data
);
203 if (!err
&& walk
->iv
!= walk
->oiv
)
204 memcpy(walk
->oiv
, walk
->iv
, walk
->ivsize
);
205 if (walk
->buffer
!= walk
->page
)
208 free_page((unsigned long)walk
->page
);
210 EXPORT_SYMBOL_GPL(skcipher_walk_complete
);
212 static void skcipher_queue_write(struct skcipher_walk
*walk
,
213 struct skcipher_walk_buffer
*p
)
216 list_add_tail(&p
->entry
, &walk
->buffers
);
219 static int skcipher_next_slow(struct skcipher_walk
*walk
, unsigned int bsize
)
221 bool phys
= walk
->flags
& SKCIPHER_WALK_PHYS
;
222 unsigned alignmask
= walk
->alignmask
;
223 struct skcipher_walk_buffer
*p
;
231 walk
->buffer
= walk
->page
;
232 buffer
= walk
->buffer
;
237 /* Start with the minimum alignment of kmalloc. */
238 a
= crypto_tfm_ctx_alignment() - 1;
242 /* Calculate the minimum alignment of p->buffer. */
243 a
&= (sizeof(*p
) ^ (sizeof(*p
) - 1)) >> 1;
247 /* Minimum size to align p->buffer by alignmask. */
250 /* Minimum size to ensure p->buffer does not straddle a page. */
251 n
+= (bsize
- 1) & ~(alignmask
| a
);
253 v
= kzalloc(n
, skcipher_walk_gfp(walk
));
255 return skcipher_walk_done(walk
, -ENOMEM
);
260 skcipher_queue_write(walk
, p
);
268 walk
->dst
.virt
.addr
= PTR_ALIGN(buffer
, alignmask
+ 1);
269 walk
->dst
.virt
.addr
= skcipher_get_spot(walk
->dst
.virt
.addr
, bsize
);
270 walk
->src
.virt
.addr
= walk
->dst
.virt
.addr
;
272 scatterwalk_copychunks(walk
->src
.virt
.addr
, &walk
->in
, bsize
, 0);
274 walk
->nbytes
= bsize
;
275 walk
->flags
|= SKCIPHER_WALK_SLOW
;
280 static int skcipher_next_copy(struct skcipher_walk
*walk
)
282 struct skcipher_walk_buffer
*p
;
283 u8
*tmp
= walk
->page
;
285 skcipher_map_src(walk
);
286 memcpy(tmp
, walk
->src
.virt
.addr
, walk
->nbytes
);
287 skcipher_unmap_src(walk
);
289 walk
->src
.virt
.addr
= tmp
;
290 walk
->dst
.virt
.addr
= tmp
;
292 if (!(walk
->flags
& SKCIPHER_WALK_PHYS
))
295 p
= kmalloc(sizeof(*p
), skcipher_walk_gfp(walk
));
299 p
->data
= walk
->page
;
300 p
->len
= walk
->nbytes
;
301 skcipher_queue_write(walk
, p
);
303 if (offset_in_page(walk
->page
) + walk
->nbytes
+ walk
->stride
>
307 walk
->page
+= walk
->nbytes
;
312 static int skcipher_next_fast(struct skcipher_walk
*walk
)
316 walk
->src
.phys
.page
= scatterwalk_page(&walk
->in
);
317 walk
->src
.phys
.offset
= offset_in_page(walk
->in
.offset
);
318 walk
->dst
.phys
.page
= scatterwalk_page(&walk
->out
);
319 walk
->dst
.phys
.offset
= offset_in_page(walk
->out
.offset
);
321 if (walk
->flags
& SKCIPHER_WALK_PHYS
)
324 diff
= walk
->src
.phys
.offset
- walk
->dst
.phys
.offset
;
325 diff
|= walk
->src
.virt
.page
- walk
->dst
.virt
.page
;
327 skcipher_map_src(walk
);
328 walk
->dst
.virt
.addr
= walk
->src
.virt
.addr
;
331 walk
->flags
|= SKCIPHER_WALK_DIFF
;
332 skcipher_map_dst(walk
);
338 static int skcipher_walk_next(struct skcipher_walk
*walk
)
344 walk
->flags
&= ~(SKCIPHER_WALK_SLOW
| SKCIPHER_WALK_COPY
|
348 bsize
= min(walk
->stride
, max(n
, walk
->blocksize
));
349 n
= scatterwalk_clamp(&walk
->in
, n
);
350 n
= scatterwalk_clamp(&walk
->out
, n
);
352 if (unlikely(n
< bsize
)) {
353 if (unlikely(walk
->total
< walk
->blocksize
))
354 return skcipher_walk_done(walk
, -EINVAL
);
357 err
= skcipher_next_slow(walk
, bsize
);
358 goto set_phys_lowmem
;
361 if (unlikely((walk
->in
.offset
| walk
->out
.offset
) & walk
->alignmask
)) {
363 gfp_t gfp
= skcipher_walk_gfp(walk
);
365 walk
->page
= (void *)__get_free_page(gfp
);
370 walk
->nbytes
= min_t(unsigned, n
,
371 PAGE_SIZE
- offset_in_page(walk
->page
));
372 walk
->flags
|= SKCIPHER_WALK_COPY
;
373 err
= skcipher_next_copy(walk
);
374 goto set_phys_lowmem
;
379 return skcipher_next_fast(walk
);
382 if (!err
&& (walk
->flags
& SKCIPHER_WALK_PHYS
)) {
383 walk
->src
.phys
.page
= virt_to_page(walk
->src
.virt
.addr
);
384 walk
->dst
.phys
.page
= virt_to_page(walk
->dst
.virt
.addr
);
385 walk
->src
.phys
.offset
&= PAGE_SIZE
- 1;
386 walk
->dst
.phys
.offset
&= PAGE_SIZE
- 1;
390 EXPORT_SYMBOL_GPL(skcipher_walk_next
);
392 static int skcipher_copy_iv(struct skcipher_walk
*walk
)
394 unsigned a
= crypto_tfm_ctx_alignment() - 1;
395 unsigned alignmask
= walk
->alignmask
;
396 unsigned ivsize
= walk
->ivsize
;
397 unsigned bs
= walk
->stride
;
402 aligned_bs
= ALIGN(bs
, alignmask
);
404 /* Minimum size to align buffer by alignmask. */
405 size
= alignmask
& ~a
;
407 if (walk
->flags
& SKCIPHER_WALK_PHYS
)
410 size
+= aligned_bs
+ ivsize
;
412 /* Minimum size to ensure buffer does not straddle a page. */
413 size
+= (bs
- 1) & ~(alignmask
| a
);
416 walk
->buffer
= kmalloc(size
, skcipher_walk_gfp(walk
));
420 iv
= PTR_ALIGN(walk
->buffer
, alignmask
+ 1);
421 iv
= skcipher_get_spot(iv
, bs
) + aligned_bs
;
423 walk
->iv
= memcpy(iv
, walk
->iv
, walk
->ivsize
);
427 static int skcipher_walk_first(struct skcipher_walk
*walk
)
429 if (WARN_ON_ONCE(in_irq()))
433 if (unlikely(((unsigned long)walk
->iv
& walk
->alignmask
))) {
434 int err
= skcipher_copy_iv(walk
);
440 walk
->nbytes
= walk
->total
;
442 return skcipher_walk_next(walk
);
445 static int skcipher_walk_skcipher(struct skcipher_walk
*walk
,
446 struct skcipher_request
*req
)
448 struct crypto_skcipher
*tfm
= crypto_skcipher_reqtfm(req
);
450 walk
->total
= req
->cryptlen
;
455 if (unlikely(!walk
->total
))
458 scatterwalk_start(&walk
->in
, req
->src
);
459 scatterwalk_start(&walk
->out
, req
->dst
);
461 walk
->flags
&= ~SKCIPHER_WALK_SLEEP
;
462 walk
->flags
|= req
->base
.flags
& CRYPTO_TFM_REQ_MAY_SLEEP
?
463 SKCIPHER_WALK_SLEEP
: 0;
465 walk
->blocksize
= crypto_skcipher_blocksize(tfm
);
466 walk
->stride
= crypto_skcipher_walksize(tfm
);
467 walk
->ivsize
= crypto_skcipher_ivsize(tfm
);
468 walk
->alignmask
= crypto_skcipher_alignmask(tfm
);
470 return skcipher_walk_first(walk
);
473 int skcipher_walk_virt(struct skcipher_walk
*walk
,
474 struct skcipher_request
*req
, bool atomic
)
478 walk
->flags
&= ~SKCIPHER_WALK_PHYS
;
480 err
= skcipher_walk_skcipher(walk
, req
);
482 walk
->flags
&= atomic
? ~SKCIPHER_WALK_SLEEP
: ~0;
486 EXPORT_SYMBOL_GPL(skcipher_walk_virt
);
488 void skcipher_walk_atomise(struct skcipher_walk
*walk
)
490 walk
->flags
&= ~SKCIPHER_WALK_SLEEP
;
492 EXPORT_SYMBOL_GPL(skcipher_walk_atomise
);
494 int skcipher_walk_async(struct skcipher_walk
*walk
,
495 struct skcipher_request
*req
)
497 walk
->flags
|= SKCIPHER_WALK_PHYS
;
499 INIT_LIST_HEAD(&walk
->buffers
);
501 return skcipher_walk_skcipher(walk
, req
);
503 EXPORT_SYMBOL_GPL(skcipher_walk_async
);
505 static int skcipher_walk_aead_common(struct skcipher_walk
*walk
,
506 struct aead_request
*req
, bool atomic
)
508 struct crypto_aead
*tfm
= crypto_aead_reqtfm(req
);
515 if (unlikely(!walk
->total
))
518 walk
->flags
&= ~SKCIPHER_WALK_PHYS
;
520 scatterwalk_start(&walk
->in
, req
->src
);
521 scatterwalk_start(&walk
->out
, req
->dst
);
523 scatterwalk_copychunks(NULL
, &walk
->in
, req
->assoclen
, 2);
524 scatterwalk_copychunks(NULL
, &walk
->out
, req
->assoclen
, 2);
526 scatterwalk_done(&walk
->in
, 0, walk
->total
);
527 scatterwalk_done(&walk
->out
, 0, walk
->total
);
529 if (req
->base
.flags
& CRYPTO_TFM_REQ_MAY_SLEEP
)
530 walk
->flags
|= SKCIPHER_WALK_SLEEP
;
532 walk
->flags
&= ~SKCIPHER_WALK_SLEEP
;
534 walk
->blocksize
= crypto_aead_blocksize(tfm
);
535 walk
->stride
= crypto_aead_chunksize(tfm
);
536 walk
->ivsize
= crypto_aead_ivsize(tfm
);
537 walk
->alignmask
= crypto_aead_alignmask(tfm
);
539 err
= skcipher_walk_first(walk
);
542 walk
->flags
&= ~SKCIPHER_WALK_SLEEP
;
547 int skcipher_walk_aead(struct skcipher_walk
*walk
, struct aead_request
*req
,
550 walk
->total
= req
->cryptlen
;
552 return skcipher_walk_aead_common(walk
, req
, atomic
);
554 EXPORT_SYMBOL_GPL(skcipher_walk_aead
);
556 int skcipher_walk_aead_encrypt(struct skcipher_walk
*walk
,
557 struct aead_request
*req
, bool atomic
)
559 walk
->total
= req
->cryptlen
;
561 return skcipher_walk_aead_common(walk
, req
, atomic
);
563 EXPORT_SYMBOL_GPL(skcipher_walk_aead_encrypt
);
565 int skcipher_walk_aead_decrypt(struct skcipher_walk
*walk
,
566 struct aead_request
*req
, bool atomic
)
568 struct crypto_aead
*tfm
= crypto_aead_reqtfm(req
);
570 walk
->total
= req
->cryptlen
- crypto_aead_authsize(tfm
);
572 return skcipher_walk_aead_common(walk
, req
, atomic
);
574 EXPORT_SYMBOL_GPL(skcipher_walk_aead_decrypt
);
576 static unsigned int crypto_skcipher_extsize(struct crypto_alg
*alg
)
578 if (alg
->cra_type
== &crypto_blkcipher_type
)
579 return sizeof(struct crypto_blkcipher
*);
581 if (alg
->cra_type
== &crypto_ablkcipher_type
||
582 alg
->cra_type
== &crypto_givcipher_type
)
583 return sizeof(struct crypto_ablkcipher
*);
585 return crypto_alg_extsize(alg
);
588 static int skcipher_setkey_blkcipher(struct crypto_skcipher
*tfm
,
589 const u8
*key
, unsigned int keylen
)
591 struct crypto_blkcipher
**ctx
= crypto_skcipher_ctx(tfm
);
592 struct crypto_blkcipher
*blkcipher
= *ctx
;
595 crypto_blkcipher_clear_flags(blkcipher
, ~0);
596 crypto_blkcipher_set_flags(blkcipher
, crypto_skcipher_get_flags(tfm
) &
597 CRYPTO_TFM_REQ_MASK
);
598 err
= crypto_blkcipher_setkey(blkcipher
, key
, keylen
);
599 crypto_skcipher_set_flags(tfm
, crypto_blkcipher_get_flags(blkcipher
) &
600 CRYPTO_TFM_RES_MASK
);
604 crypto_skcipher_clear_flags(tfm
, CRYPTO_TFM_NEED_KEY
);
608 static int skcipher_crypt_blkcipher(struct skcipher_request
*req
,
609 int (*crypt
)(struct blkcipher_desc
*,
610 struct scatterlist
*,
611 struct scatterlist
*,
614 struct crypto_skcipher
*tfm
= crypto_skcipher_reqtfm(req
);
615 struct crypto_blkcipher
**ctx
= crypto_skcipher_ctx(tfm
);
616 struct blkcipher_desc desc
= {
619 .flags
= req
->base
.flags
,
623 return crypt(&desc
, req
->dst
, req
->src
, req
->cryptlen
);
626 static int skcipher_encrypt_blkcipher(struct skcipher_request
*req
)
628 struct crypto_skcipher
*skcipher
= crypto_skcipher_reqtfm(req
);
629 struct crypto_tfm
*tfm
= crypto_skcipher_tfm(skcipher
);
630 struct blkcipher_alg
*alg
= &tfm
->__crt_alg
->cra_blkcipher
;
632 return skcipher_crypt_blkcipher(req
, alg
->encrypt
);
635 static int skcipher_decrypt_blkcipher(struct skcipher_request
*req
)
637 struct crypto_skcipher
*skcipher
= crypto_skcipher_reqtfm(req
);
638 struct crypto_tfm
*tfm
= crypto_skcipher_tfm(skcipher
);
639 struct blkcipher_alg
*alg
= &tfm
->__crt_alg
->cra_blkcipher
;
641 return skcipher_crypt_blkcipher(req
, alg
->decrypt
);
644 static void crypto_exit_skcipher_ops_blkcipher(struct crypto_tfm
*tfm
)
646 struct crypto_blkcipher
**ctx
= crypto_tfm_ctx(tfm
);
648 crypto_free_blkcipher(*ctx
);
651 static int crypto_init_skcipher_ops_blkcipher(struct crypto_tfm
*tfm
)
653 struct crypto_alg
*calg
= tfm
->__crt_alg
;
654 struct crypto_skcipher
*skcipher
= __crypto_skcipher_cast(tfm
);
655 struct crypto_blkcipher
**ctx
= crypto_tfm_ctx(tfm
);
656 struct crypto_blkcipher
*blkcipher
;
657 struct crypto_tfm
*btfm
;
659 if (!crypto_mod_get(calg
))
662 btfm
= __crypto_alloc_tfm(calg
, CRYPTO_ALG_TYPE_BLKCIPHER
,
663 CRYPTO_ALG_TYPE_MASK
);
665 crypto_mod_put(calg
);
666 return PTR_ERR(btfm
);
669 blkcipher
= __crypto_blkcipher_cast(btfm
);
671 tfm
->exit
= crypto_exit_skcipher_ops_blkcipher
;
673 skcipher
->setkey
= skcipher_setkey_blkcipher
;
674 skcipher
->encrypt
= skcipher_encrypt_blkcipher
;
675 skcipher
->decrypt
= skcipher_decrypt_blkcipher
;
677 skcipher
->ivsize
= crypto_blkcipher_ivsize(blkcipher
);
678 skcipher
->keysize
= calg
->cra_blkcipher
.max_keysize
;
680 if (skcipher
->keysize
)
681 crypto_skcipher_set_flags(skcipher
, CRYPTO_TFM_NEED_KEY
);
686 static int skcipher_setkey_ablkcipher(struct crypto_skcipher
*tfm
,
687 const u8
*key
, unsigned int keylen
)
689 struct crypto_ablkcipher
**ctx
= crypto_skcipher_ctx(tfm
);
690 struct crypto_ablkcipher
*ablkcipher
= *ctx
;
693 crypto_ablkcipher_clear_flags(ablkcipher
, ~0);
694 crypto_ablkcipher_set_flags(ablkcipher
,
695 crypto_skcipher_get_flags(tfm
) &
696 CRYPTO_TFM_REQ_MASK
);
697 err
= crypto_ablkcipher_setkey(ablkcipher
, key
, keylen
);
698 crypto_skcipher_set_flags(tfm
,
699 crypto_ablkcipher_get_flags(ablkcipher
) &
700 CRYPTO_TFM_RES_MASK
);
704 crypto_skcipher_clear_flags(tfm
, CRYPTO_TFM_NEED_KEY
);
708 static int skcipher_crypt_ablkcipher(struct skcipher_request
*req
,
709 int (*crypt
)(struct ablkcipher_request
*))
711 struct crypto_skcipher
*tfm
= crypto_skcipher_reqtfm(req
);
712 struct crypto_ablkcipher
**ctx
= crypto_skcipher_ctx(tfm
);
713 struct ablkcipher_request
*subreq
= skcipher_request_ctx(req
);
715 ablkcipher_request_set_tfm(subreq
, *ctx
);
716 ablkcipher_request_set_callback(subreq
, skcipher_request_flags(req
),
717 req
->base
.complete
, req
->base
.data
);
718 ablkcipher_request_set_crypt(subreq
, req
->src
, req
->dst
, req
->cryptlen
,
721 return crypt(subreq
);
724 static int skcipher_encrypt_ablkcipher(struct skcipher_request
*req
)
726 struct crypto_skcipher
*skcipher
= crypto_skcipher_reqtfm(req
);
727 struct crypto_tfm
*tfm
= crypto_skcipher_tfm(skcipher
);
728 struct ablkcipher_alg
*alg
= &tfm
->__crt_alg
->cra_ablkcipher
;
730 return skcipher_crypt_ablkcipher(req
, alg
->encrypt
);
733 static int skcipher_decrypt_ablkcipher(struct skcipher_request
*req
)
735 struct crypto_skcipher
*skcipher
= crypto_skcipher_reqtfm(req
);
736 struct crypto_tfm
*tfm
= crypto_skcipher_tfm(skcipher
);
737 struct ablkcipher_alg
*alg
= &tfm
->__crt_alg
->cra_ablkcipher
;
739 return skcipher_crypt_ablkcipher(req
, alg
->decrypt
);
742 static void crypto_exit_skcipher_ops_ablkcipher(struct crypto_tfm
*tfm
)
744 struct crypto_ablkcipher
**ctx
= crypto_tfm_ctx(tfm
);
746 crypto_free_ablkcipher(*ctx
);
749 static int crypto_init_skcipher_ops_ablkcipher(struct crypto_tfm
*tfm
)
751 struct crypto_alg
*calg
= tfm
->__crt_alg
;
752 struct crypto_skcipher
*skcipher
= __crypto_skcipher_cast(tfm
);
753 struct crypto_ablkcipher
**ctx
= crypto_tfm_ctx(tfm
);
754 struct crypto_ablkcipher
*ablkcipher
;
755 struct crypto_tfm
*abtfm
;
757 if (!crypto_mod_get(calg
))
760 abtfm
= __crypto_alloc_tfm(calg
, 0, 0);
762 crypto_mod_put(calg
);
763 return PTR_ERR(abtfm
);
766 ablkcipher
= __crypto_ablkcipher_cast(abtfm
);
768 tfm
->exit
= crypto_exit_skcipher_ops_ablkcipher
;
770 skcipher
->setkey
= skcipher_setkey_ablkcipher
;
771 skcipher
->encrypt
= skcipher_encrypt_ablkcipher
;
772 skcipher
->decrypt
= skcipher_decrypt_ablkcipher
;
774 skcipher
->ivsize
= crypto_ablkcipher_ivsize(ablkcipher
);
775 skcipher
->reqsize
= crypto_ablkcipher_reqsize(ablkcipher
) +
776 sizeof(struct ablkcipher_request
);
777 skcipher
->keysize
= calg
->cra_ablkcipher
.max_keysize
;
779 if (skcipher
->keysize
)
780 crypto_skcipher_set_flags(skcipher
, CRYPTO_TFM_NEED_KEY
);
785 static int skcipher_setkey_unaligned(struct crypto_skcipher
*tfm
,
786 const u8
*key
, unsigned int keylen
)
788 unsigned long alignmask
= crypto_skcipher_alignmask(tfm
);
789 struct skcipher_alg
*cipher
= crypto_skcipher_alg(tfm
);
790 u8
*buffer
, *alignbuffer
;
791 unsigned long absize
;
794 absize
= keylen
+ alignmask
;
795 buffer
= kmalloc(absize
, GFP_ATOMIC
);
799 alignbuffer
= (u8
*)ALIGN((unsigned long)buffer
, alignmask
+ 1);
800 memcpy(alignbuffer
, key
, keylen
);
801 ret
= cipher
->setkey(tfm
, alignbuffer
, keylen
);
806 static int skcipher_setkey(struct crypto_skcipher
*tfm
, const u8
*key
,
809 struct skcipher_alg
*cipher
= crypto_skcipher_alg(tfm
);
810 unsigned long alignmask
= crypto_skcipher_alignmask(tfm
);
813 if (keylen
< cipher
->min_keysize
|| keylen
> cipher
->max_keysize
) {
814 crypto_skcipher_set_flags(tfm
, CRYPTO_TFM_RES_BAD_KEY_LEN
);
818 if ((unsigned long)key
& alignmask
)
819 err
= skcipher_setkey_unaligned(tfm
, key
, keylen
);
821 err
= cipher
->setkey(tfm
, key
, keylen
);
826 crypto_skcipher_clear_flags(tfm
, CRYPTO_TFM_NEED_KEY
);
830 static void crypto_skcipher_exit_tfm(struct crypto_tfm
*tfm
)
832 struct crypto_skcipher
*skcipher
= __crypto_skcipher_cast(tfm
);
833 struct skcipher_alg
*alg
= crypto_skcipher_alg(skcipher
);
838 static int crypto_skcipher_init_tfm(struct crypto_tfm
*tfm
)
840 struct crypto_skcipher
*skcipher
= __crypto_skcipher_cast(tfm
);
841 struct skcipher_alg
*alg
= crypto_skcipher_alg(skcipher
);
843 if (tfm
->__crt_alg
->cra_type
== &crypto_blkcipher_type
)
844 return crypto_init_skcipher_ops_blkcipher(tfm
);
846 if (tfm
->__crt_alg
->cra_type
== &crypto_ablkcipher_type
||
847 tfm
->__crt_alg
->cra_type
== &crypto_givcipher_type
)
848 return crypto_init_skcipher_ops_ablkcipher(tfm
);
850 skcipher
->setkey
= skcipher_setkey
;
851 skcipher
->encrypt
= alg
->encrypt
;
852 skcipher
->decrypt
= alg
->decrypt
;
853 skcipher
->ivsize
= alg
->ivsize
;
854 skcipher
->keysize
= alg
->max_keysize
;
856 if (skcipher
->keysize
)
857 crypto_skcipher_set_flags(skcipher
, CRYPTO_TFM_NEED_KEY
);
860 skcipher
->base
.exit
= crypto_skcipher_exit_tfm
;
863 return alg
->init(skcipher
);
868 static void crypto_skcipher_free_instance(struct crypto_instance
*inst
)
870 struct skcipher_instance
*skcipher
=
871 container_of(inst
, struct skcipher_instance
, s
.base
);
873 skcipher
->free(skcipher
);
876 static void crypto_skcipher_show(struct seq_file
*m
, struct crypto_alg
*alg
)
878 static void crypto_skcipher_show(struct seq_file
*m
, struct crypto_alg
*alg
)
880 struct skcipher_alg
*skcipher
= container_of(alg
, struct skcipher_alg
,
883 seq_printf(m
, "type : skcipher\n");
884 seq_printf(m
, "async : %s\n",
885 alg
->cra_flags
& CRYPTO_ALG_ASYNC
? "yes" : "no");
886 seq_printf(m
, "blocksize : %u\n", alg
->cra_blocksize
);
887 seq_printf(m
, "min keysize : %u\n", skcipher
->min_keysize
);
888 seq_printf(m
, "max keysize : %u\n", skcipher
->max_keysize
);
889 seq_printf(m
, "ivsize : %u\n", skcipher
->ivsize
);
890 seq_printf(m
, "chunksize : %u\n", skcipher
->chunksize
);
891 seq_printf(m
, "walksize : %u\n", skcipher
->walksize
);
895 static int crypto_skcipher_report(struct sk_buff
*skb
, struct crypto_alg
*alg
)
897 struct crypto_report_blkcipher rblkcipher
;
898 struct skcipher_alg
*skcipher
= container_of(alg
, struct skcipher_alg
,
901 strncpy(rblkcipher
.type
, "skcipher", sizeof(rblkcipher
.type
));
902 strncpy(rblkcipher
.geniv
, "<none>", sizeof(rblkcipher
.geniv
));
904 rblkcipher
.blocksize
= alg
->cra_blocksize
;
905 rblkcipher
.min_keysize
= skcipher
->min_keysize
;
906 rblkcipher
.max_keysize
= skcipher
->max_keysize
;
907 rblkcipher
.ivsize
= skcipher
->ivsize
;
909 if (nla_put(skb
, CRYPTOCFGA_REPORT_BLKCIPHER
,
910 sizeof(struct crypto_report_blkcipher
), &rblkcipher
))
911 goto nla_put_failure
;
918 static int crypto_skcipher_report(struct sk_buff
*skb
, struct crypto_alg
*alg
)
924 static const struct crypto_type crypto_skcipher_type2
= {
925 .extsize
= crypto_skcipher_extsize
,
926 .init_tfm
= crypto_skcipher_init_tfm
,
927 .free
= crypto_skcipher_free_instance
,
928 #ifdef CONFIG_PROC_FS
929 .show
= crypto_skcipher_show
,
931 .report
= crypto_skcipher_report
,
932 .maskclear
= ~CRYPTO_ALG_TYPE_MASK
,
933 .maskset
= CRYPTO_ALG_TYPE_BLKCIPHER_MASK
,
934 .type
= CRYPTO_ALG_TYPE_SKCIPHER
,
935 .tfmsize
= offsetof(struct crypto_skcipher
, base
),
938 int crypto_grab_skcipher(struct crypto_skcipher_spawn
*spawn
,
939 const char *name
, u32 type
, u32 mask
)
941 spawn
->base
.frontend
= &crypto_skcipher_type2
;
942 return crypto_grab_spawn(&spawn
->base
, name
, type
, mask
);
944 EXPORT_SYMBOL_GPL(crypto_grab_skcipher
);
946 struct crypto_skcipher
*crypto_alloc_skcipher(const char *alg_name
,
949 return crypto_alloc_tfm(alg_name
, &crypto_skcipher_type2
, type
, mask
);
951 EXPORT_SYMBOL_GPL(crypto_alloc_skcipher
);
953 int crypto_has_skcipher2(const char *alg_name
, u32 type
, u32 mask
)
955 return crypto_type_has_alg(alg_name
, &crypto_skcipher_type2
,
958 EXPORT_SYMBOL_GPL(crypto_has_skcipher2
);
960 static int skcipher_prepare_alg(struct skcipher_alg
*alg
)
962 struct crypto_alg
*base
= &alg
->base
;
964 if (alg
->ivsize
> PAGE_SIZE
/ 8 || alg
->chunksize
> PAGE_SIZE
/ 8 ||
965 alg
->walksize
> PAGE_SIZE
/ 8)
969 alg
->chunksize
= base
->cra_blocksize
;
971 alg
->walksize
= alg
->chunksize
;
973 base
->cra_type
= &crypto_skcipher_type2
;
974 base
->cra_flags
&= ~CRYPTO_ALG_TYPE_MASK
;
975 base
->cra_flags
|= CRYPTO_ALG_TYPE_SKCIPHER
;
980 int crypto_register_skcipher(struct skcipher_alg
*alg
)
982 struct crypto_alg
*base
= &alg
->base
;
985 err
= skcipher_prepare_alg(alg
);
989 return crypto_register_alg(base
);
991 EXPORT_SYMBOL_GPL(crypto_register_skcipher
);
993 void crypto_unregister_skcipher(struct skcipher_alg
*alg
)
995 crypto_unregister_alg(&alg
->base
);
997 EXPORT_SYMBOL_GPL(crypto_unregister_skcipher
);
999 int crypto_register_skciphers(struct skcipher_alg
*algs
, int count
)
1003 for (i
= 0; i
< count
; i
++) {
1004 ret
= crypto_register_skcipher(&algs
[i
]);
1012 for (--i
; i
>= 0; --i
)
1013 crypto_unregister_skcipher(&algs
[i
]);
1017 EXPORT_SYMBOL_GPL(crypto_register_skciphers
);
1019 void crypto_unregister_skciphers(struct skcipher_alg
*algs
, int count
)
1023 for (i
= count
- 1; i
>= 0; --i
)
1024 crypto_unregister_skcipher(&algs
[i
]);
1026 EXPORT_SYMBOL_GPL(crypto_unregister_skciphers
);
1028 int skcipher_register_instance(struct crypto_template
*tmpl
,
1029 struct skcipher_instance
*inst
)
1033 err
= skcipher_prepare_alg(&inst
->alg
);
1037 return crypto_register_instance(tmpl
, skcipher_crypto_instance(inst
));
1039 EXPORT_SYMBOL_GPL(skcipher_register_instance
);
1041 MODULE_LICENSE("GPL");
1042 MODULE_DESCRIPTION("Symmetric key cipher type");