1 // SPDX-License-Identifier: GPL-2.0-or-later
3 * Symmetric key cipher operations.
5 * Generic encrypt/decrypt wrapper for ciphers, handles operations across
6 * multiple page boundaries by using temporary blocks. In user context,
7 * the kernel is given a chance to schedule us once per page.
9 * Copyright (c) 2015 Herbert Xu <herbert@gondor.apana.org.au>
12 #include <crypto/internal/aead.h>
13 #include <crypto/internal/skcipher.h>
14 #include <crypto/scatterwalk.h>
15 #include <linux/bug.h>
16 #include <linux/cryptouser.h>
17 #include <linux/compiler.h>
18 #include <linux/list.h>
19 #include <linux/module.h>
20 #include <linux/rtnetlink.h>
21 #include <linux/seq_file.h>
22 #include <net/netlink.h>
27 SKCIPHER_WALK_PHYS
= 1 << 0,
28 SKCIPHER_WALK_SLOW
= 1 << 1,
29 SKCIPHER_WALK_COPY
= 1 << 2,
30 SKCIPHER_WALK_DIFF
= 1 << 3,
31 SKCIPHER_WALK_SLEEP
= 1 << 4,
34 struct skcipher_walk_buffer
{
35 struct list_head entry
;
36 struct scatter_walk dst
;
42 static int skcipher_walk_next(struct skcipher_walk
*walk
);
44 static inline void skcipher_unmap(struct scatter_walk
*walk
, void *vaddr
)
46 if (PageHighMem(scatterwalk_page(walk
)))
50 static inline void *skcipher_map(struct scatter_walk
*walk
)
52 struct page
*page
= scatterwalk_page(walk
);
54 return (PageHighMem(page
) ? kmap_atomic(page
) : page_address(page
)) +
55 offset_in_page(walk
->offset
);
58 static inline void skcipher_map_src(struct skcipher_walk
*walk
)
60 walk
->src
.virt
.addr
= skcipher_map(&walk
->in
);
63 static inline void skcipher_map_dst(struct skcipher_walk
*walk
)
65 walk
->dst
.virt
.addr
= skcipher_map(&walk
->out
);
68 static inline void skcipher_unmap_src(struct skcipher_walk
*walk
)
70 skcipher_unmap(&walk
->in
, walk
->src
.virt
.addr
);
73 static inline void skcipher_unmap_dst(struct skcipher_walk
*walk
)
75 skcipher_unmap(&walk
->out
, walk
->dst
.virt
.addr
);
78 static inline gfp_t
skcipher_walk_gfp(struct skcipher_walk
*walk
)
80 return walk
->flags
& SKCIPHER_WALK_SLEEP
? GFP_KERNEL
: GFP_ATOMIC
;
83 /* Get a spot of the specified length that does not straddle a page.
84 * The caller needs to ensure that there is enough space for this operation.
86 static inline u8
*skcipher_get_spot(u8
*start
, unsigned int len
)
88 u8
*end_page
= (u8
*)(((unsigned long)(start
+ len
- 1)) & PAGE_MASK
);
90 return max(start
, end_page
);
93 static int skcipher_done_slow(struct skcipher_walk
*walk
, unsigned int bsize
)
97 addr
= (u8
*)ALIGN((unsigned long)walk
->buffer
, walk
->alignmask
+ 1);
98 addr
= skcipher_get_spot(addr
, bsize
);
99 scatterwalk_copychunks(addr
, &walk
->out
, bsize
,
100 (walk
->flags
& SKCIPHER_WALK_PHYS
) ? 2 : 1);
104 int skcipher_walk_done(struct skcipher_walk
*walk
, int err
)
106 unsigned int n
= walk
->nbytes
;
107 unsigned int nbytes
= 0;
112 if (likely(err
>= 0)) {
114 nbytes
= walk
->total
- n
;
117 if (likely(!(walk
->flags
& (SKCIPHER_WALK_PHYS
|
120 SKCIPHER_WALK_DIFF
)))) {
122 skcipher_unmap_src(walk
);
123 } else if (walk
->flags
& SKCIPHER_WALK_DIFF
) {
124 skcipher_unmap_dst(walk
);
126 } else if (walk
->flags
& SKCIPHER_WALK_COPY
) {
127 skcipher_map_dst(walk
);
128 memcpy(walk
->dst
.virt
.addr
, walk
->page
, n
);
129 skcipher_unmap_dst(walk
);
130 } else if (unlikely(walk
->flags
& SKCIPHER_WALK_SLOW
)) {
133 * Didn't process all bytes. Either the algorithm is
134 * broken, or this was the last step and it turned out
135 * the message wasn't evenly divisible into blocks but
136 * the algorithm requires it.
141 n
= skcipher_done_slow(walk
, n
);
147 walk
->total
= nbytes
;
150 scatterwalk_advance(&walk
->in
, n
);
151 scatterwalk_advance(&walk
->out
, n
);
152 scatterwalk_done(&walk
->in
, 0, nbytes
);
153 scatterwalk_done(&walk
->out
, 1, nbytes
);
156 crypto_yield(walk
->flags
& SKCIPHER_WALK_SLEEP
?
157 CRYPTO_TFM_REQ_MAY_SLEEP
: 0);
158 return skcipher_walk_next(walk
);
162 /* Short-circuit for the common/fast path. */
163 if (!((unsigned long)walk
->buffer
| (unsigned long)walk
->page
))
166 if (walk
->flags
& SKCIPHER_WALK_PHYS
)
169 if (walk
->iv
!= walk
->oiv
)
170 memcpy(walk
->oiv
, walk
->iv
, walk
->ivsize
);
171 if (walk
->buffer
!= walk
->page
)
174 free_page((unsigned long)walk
->page
);
179 EXPORT_SYMBOL_GPL(skcipher_walk_done
);
181 void skcipher_walk_complete(struct skcipher_walk
*walk
, int err
)
183 struct skcipher_walk_buffer
*p
, *tmp
;
185 list_for_each_entry_safe(p
, tmp
, &walk
->buffers
, entry
) {
193 data
= PTR_ALIGN(&p
->buffer
[0], walk
->alignmask
+ 1);
194 data
= skcipher_get_spot(data
, walk
->stride
);
197 scatterwalk_copychunks(data
, &p
->dst
, p
->len
, 1);
199 if (offset_in_page(p
->data
) + p
->len
+ walk
->stride
>
201 free_page((unsigned long)p
->data
);
208 if (!err
&& walk
->iv
!= walk
->oiv
)
209 memcpy(walk
->oiv
, walk
->iv
, walk
->ivsize
);
210 if (walk
->buffer
!= walk
->page
)
213 free_page((unsigned long)walk
->page
);
215 EXPORT_SYMBOL_GPL(skcipher_walk_complete
);
217 static void skcipher_queue_write(struct skcipher_walk
*walk
,
218 struct skcipher_walk_buffer
*p
)
221 list_add_tail(&p
->entry
, &walk
->buffers
);
224 static int skcipher_next_slow(struct skcipher_walk
*walk
, unsigned int bsize
)
226 bool phys
= walk
->flags
& SKCIPHER_WALK_PHYS
;
227 unsigned alignmask
= walk
->alignmask
;
228 struct skcipher_walk_buffer
*p
;
236 walk
->buffer
= walk
->page
;
237 buffer
= walk
->buffer
;
242 /* Start with the minimum alignment of kmalloc. */
243 a
= crypto_tfm_ctx_alignment() - 1;
247 /* Calculate the minimum alignment of p->buffer. */
248 a
&= (sizeof(*p
) ^ (sizeof(*p
) - 1)) >> 1;
252 /* Minimum size to align p->buffer by alignmask. */
255 /* Minimum size to ensure p->buffer does not straddle a page. */
256 n
+= (bsize
- 1) & ~(alignmask
| a
);
258 v
= kzalloc(n
, skcipher_walk_gfp(walk
));
260 return skcipher_walk_done(walk
, -ENOMEM
);
265 skcipher_queue_write(walk
, p
);
273 walk
->dst
.virt
.addr
= PTR_ALIGN(buffer
, alignmask
+ 1);
274 walk
->dst
.virt
.addr
= skcipher_get_spot(walk
->dst
.virt
.addr
, bsize
);
275 walk
->src
.virt
.addr
= walk
->dst
.virt
.addr
;
277 scatterwalk_copychunks(walk
->src
.virt
.addr
, &walk
->in
, bsize
, 0);
279 walk
->nbytes
= bsize
;
280 walk
->flags
|= SKCIPHER_WALK_SLOW
;
285 static int skcipher_next_copy(struct skcipher_walk
*walk
)
287 struct skcipher_walk_buffer
*p
;
288 u8
*tmp
= walk
->page
;
290 skcipher_map_src(walk
);
291 memcpy(tmp
, walk
->src
.virt
.addr
, walk
->nbytes
);
292 skcipher_unmap_src(walk
);
294 walk
->src
.virt
.addr
= tmp
;
295 walk
->dst
.virt
.addr
= tmp
;
297 if (!(walk
->flags
& SKCIPHER_WALK_PHYS
))
300 p
= kmalloc(sizeof(*p
), skcipher_walk_gfp(walk
));
304 p
->data
= walk
->page
;
305 p
->len
= walk
->nbytes
;
306 skcipher_queue_write(walk
, p
);
308 if (offset_in_page(walk
->page
) + walk
->nbytes
+ walk
->stride
>
312 walk
->page
+= walk
->nbytes
;
317 static int skcipher_next_fast(struct skcipher_walk
*walk
)
321 walk
->src
.phys
.page
= scatterwalk_page(&walk
->in
);
322 walk
->src
.phys
.offset
= offset_in_page(walk
->in
.offset
);
323 walk
->dst
.phys
.page
= scatterwalk_page(&walk
->out
);
324 walk
->dst
.phys
.offset
= offset_in_page(walk
->out
.offset
);
326 if (walk
->flags
& SKCIPHER_WALK_PHYS
)
329 diff
= walk
->src
.phys
.offset
- walk
->dst
.phys
.offset
;
330 diff
|= walk
->src
.virt
.page
- walk
->dst
.virt
.page
;
332 skcipher_map_src(walk
);
333 walk
->dst
.virt
.addr
= walk
->src
.virt
.addr
;
336 walk
->flags
|= SKCIPHER_WALK_DIFF
;
337 skcipher_map_dst(walk
);
343 static int skcipher_walk_next(struct skcipher_walk
*walk
)
349 walk
->flags
&= ~(SKCIPHER_WALK_SLOW
| SKCIPHER_WALK_COPY
|
353 bsize
= min(walk
->stride
, max(n
, walk
->blocksize
));
354 n
= scatterwalk_clamp(&walk
->in
, n
);
355 n
= scatterwalk_clamp(&walk
->out
, n
);
357 if (unlikely(n
< bsize
)) {
358 if (unlikely(walk
->total
< walk
->blocksize
))
359 return skcipher_walk_done(walk
, -EINVAL
);
362 err
= skcipher_next_slow(walk
, bsize
);
363 goto set_phys_lowmem
;
366 if (unlikely((walk
->in
.offset
| walk
->out
.offset
) & walk
->alignmask
)) {
368 gfp_t gfp
= skcipher_walk_gfp(walk
);
370 walk
->page
= (void *)__get_free_page(gfp
);
375 walk
->nbytes
= min_t(unsigned, n
,
376 PAGE_SIZE
- offset_in_page(walk
->page
));
377 walk
->flags
|= SKCIPHER_WALK_COPY
;
378 err
= skcipher_next_copy(walk
);
379 goto set_phys_lowmem
;
384 return skcipher_next_fast(walk
);
387 if (!err
&& (walk
->flags
& SKCIPHER_WALK_PHYS
)) {
388 walk
->src
.phys
.page
= virt_to_page(walk
->src
.virt
.addr
);
389 walk
->dst
.phys
.page
= virt_to_page(walk
->dst
.virt
.addr
);
390 walk
->src
.phys
.offset
&= PAGE_SIZE
- 1;
391 walk
->dst
.phys
.offset
&= PAGE_SIZE
- 1;
396 static int skcipher_copy_iv(struct skcipher_walk
*walk
)
398 unsigned a
= crypto_tfm_ctx_alignment() - 1;
399 unsigned alignmask
= walk
->alignmask
;
400 unsigned ivsize
= walk
->ivsize
;
401 unsigned bs
= walk
->stride
;
406 aligned_bs
= ALIGN(bs
, alignmask
+ 1);
408 /* Minimum size to align buffer by alignmask. */
409 size
= alignmask
& ~a
;
411 if (walk
->flags
& SKCIPHER_WALK_PHYS
)
414 size
+= aligned_bs
+ ivsize
;
416 /* Minimum size to ensure buffer does not straddle a page. */
417 size
+= (bs
- 1) & ~(alignmask
| a
);
420 walk
->buffer
= kmalloc(size
, skcipher_walk_gfp(walk
));
424 iv
= PTR_ALIGN(walk
->buffer
, alignmask
+ 1);
425 iv
= skcipher_get_spot(iv
, bs
) + aligned_bs
;
427 walk
->iv
= memcpy(iv
, walk
->iv
, walk
->ivsize
);
431 static int skcipher_walk_first(struct skcipher_walk
*walk
)
433 if (WARN_ON_ONCE(in_irq()))
437 if (unlikely(((unsigned long)walk
->iv
& walk
->alignmask
))) {
438 int err
= skcipher_copy_iv(walk
);
445 return skcipher_walk_next(walk
);
448 static int skcipher_walk_skcipher(struct skcipher_walk
*walk
,
449 struct skcipher_request
*req
)
451 struct crypto_skcipher
*tfm
= crypto_skcipher_reqtfm(req
);
453 walk
->total
= req
->cryptlen
;
458 if (unlikely(!walk
->total
))
461 scatterwalk_start(&walk
->in
, req
->src
);
462 scatterwalk_start(&walk
->out
, req
->dst
);
464 walk
->flags
&= ~SKCIPHER_WALK_SLEEP
;
465 walk
->flags
|= req
->base
.flags
& CRYPTO_TFM_REQ_MAY_SLEEP
?
466 SKCIPHER_WALK_SLEEP
: 0;
468 walk
->blocksize
= crypto_skcipher_blocksize(tfm
);
469 walk
->stride
= crypto_skcipher_walksize(tfm
);
470 walk
->ivsize
= crypto_skcipher_ivsize(tfm
);
471 walk
->alignmask
= crypto_skcipher_alignmask(tfm
);
473 return skcipher_walk_first(walk
);
476 int skcipher_walk_virt(struct skcipher_walk
*walk
,
477 struct skcipher_request
*req
, bool atomic
)
481 might_sleep_if(req
->base
.flags
& CRYPTO_TFM_REQ_MAY_SLEEP
);
483 walk
->flags
&= ~SKCIPHER_WALK_PHYS
;
485 err
= skcipher_walk_skcipher(walk
, req
);
487 walk
->flags
&= atomic
? ~SKCIPHER_WALK_SLEEP
: ~0;
491 EXPORT_SYMBOL_GPL(skcipher_walk_virt
);
493 void skcipher_walk_atomise(struct skcipher_walk
*walk
)
495 walk
->flags
&= ~SKCIPHER_WALK_SLEEP
;
497 EXPORT_SYMBOL_GPL(skcipher_walk_atomise
);
499 int skcipher_walk_async(struct skcipher_walk
*walk
,
500 struct skcipher_request
*req
)
502 walk
->flags
|= SKCIPHER_WALK_PHYS
;
504 INIT_LIST_HEAD(&walk
->buffers
);
506 return skcipher_walk_skcipher(walk
, req
);
508 EXPORT_SYMBOL_GPL(skcipher_walk_async
);
510 static int skcipher_walk_aead_common(struct skcipher_walk
*walk
,
511 struct aead_request
*req
, bool atomic
)
513 struct crypto_aead
*tfm
= crypto_aead_reqtfm(req
);
520 if (unlikely(!walk
->total
))
523 walk
->flags
&= ~SKCIPHER_WALK_PHYS
;
525 scatterwalk_start(&walk
->in
, req
->src
);
526 scatterwalk_start(&walk
->out
, req
->dst
);
528 scatterwalk_copychunks(NULL
, &walk
->in
, req
->assoclen
, 2);
529 scatterwalk_copychunks(NULL
, &walk
->out
, req
->assoclen
, 2);
531 scatterwalk_done(&walk
->in
, 0, walk
->total
);
532 scatterwalk_done(&walk
->out
, 0, walk
->total
);
534 if (req
->base
.flags
& CRYPTO_TFM_REQ_MAY_SLEEP
)
535 walk
->flags
|= SKCIPHER_WALK_SLEEP
;
537 walk
->flags
&= ~SKCIPHER_WALK_SLEEP
;
539 walk
->blocksize
= crypto_aead_blocksize(tfm
);
540 walk
->stride
= crypto_aead_chunksize(tfm
);
541 walk
->ivsize
= crypto_aead_ivsize(tfm
);
542 walk
->alignmask
= crypto_aead_alignmask(tfm
);
544 err
= skcipher_walk_first(walk
);
547 walk
->flags
&= ~SKCIPHER_WALK_SLEEP
;
552 int skcipher_walk_aead(struct skcipher_walk
*walk
, struct aead_request
*req
,
555 walk
->total
= req
->cryptlen
;
557 return skcipher_walk_aead_common(walk
, req
, atomic
);
559 EXPORT_SYMBOL_GPL(skcipher_walk_aead
);
561 int skcipher_walk_aead_encrypt(struct skcipher_walk
*walk
,
562 struct aead_request
*req
, bool atomic
)
564 walk
->total
= req
->cryptlen
;
566 return skcipher_walk_aead_common(walk
, req
, atomic
);
568 EXPORT_SYMBOL_GPL(skcipher_walk_aead_encrypt
);
570 int skcipher_walk_aead_decrypt(struct skcipher_walk
*walk
,
571 struct aead_request
*req
, bool atomic
)
573 struct crypto_aead
*tfm
= crypto_aead_reqtfm(req
);
575 walk
->total
= req
->cryptlen
- crypto_aead_authsize(tfm
);
577 return skcipher_walk_aead_common(walk
, req
, atomic
);
579 EXPORT_SYMBOL_GPL(skcipher_walk_aead_decrypt
);
581 static unsigned int crypto_skcipher_extsize(struct crypto_alg
*alg
)
583 if (alg
->cra_type
== &crypto_blkcipher_type
)
584 return sizeof(struct crypto_blkcipher
*);
586 if (alg
->cra_type
== &crypto_ablkcipher_type
)
587 return sizeof(struct crypto_ablkcipher
*);
589 return crypto_alg_extsize(alg
);
592 static void skcipher_set_needkey(struct crypto_skcipher
*tfm
)
595 crypto_skcipher_set_flags(tfm
, CRYPTO_TFM_NEED_KEY
);
598 static int skcipher_setkey_blkcipher(struct crypto_skcipher
*tfm
,
599 const u8
*key
, unsigned int keylen
)
601 struct crypto_blkcipher
**ctx
= crypto_skcipher_ctx(tfm
);
602 struct crypto_blkcipher
*blkcipher
= *ctx
;
605 crypto_blkcipher_clear_flags(blkcipher
, ~0);
606 crypto_blkcipher_set_flags(blkcipher
, crypto_skcipher_get_flags(tfm
) &
607 CRYPTO_TFM_REQ_MASK
);
608 err
= crypto_blkcipher_setkey(blkcipher
, key
, keylen
);
609 crypto_skcipher_set_flags(tfm
, crypto_blkcipher_get_flags(blkcipher
) &
610 CRYPTO_TFM_RES_MASK
);
612 skcipher_set_needkey(tfm
);
616 crypto_skcipher_clear_flags(tfm
, CRYPTO_TFM_NEED_KEY
);
620 static int skcipher_crypt_blkcipher(struct skcipher_request
*req
,
621 int (*crypt
)(struct blkcipher_desc
*,
622 struct scatterlist
*,
623 struct scatterlist
*,
626 struct crypto_skcipher
*tfm
= crypto_skcipher_reqtfm(req
);
627 struct crypto_blkcipher
**ctx
= crypto_skcipher_ctx(tfm
);
628 struct blkcipher_desc desc
= {
631 .flags
= req
->base
.flags
,
635 return crypt(&desc
, req
->dst
, req
->src
, req
->cryptlen
);
638 static int skcipher_encrypt_blkcipher(struct skcipher_request
*req
)
640 struct crypto_skcipher
*skcipher
= crypto_skcipher_reqtfm(req
);
641 struct crypto_tfm
*tfm
= crypto_skcipher_tfm(skcipher
);
642 struct blkcipher_alg
*alg
= &tfm
->__crt_alg
->cra_blkcipher
;
644 return skcipher_crypt_blkcipher(req
, alg
->encrypt
);
647 static int skcipher_decrypt_blkcipher(struct skcipher_request
*req
)
649 struct crypto_skcipher
*skcipher
= crypto_skcipher_reqtfm(req
);
650 struct crypto_tfm
*tfm
= crypto_skcipher_tfm(skcipher
);
651 struct blkcipher_alg
*alg
= &tfm
->__crt_alg
->cra_blkcipher
;
653 return skcipher_crypt_blkcipher(req
, alg
->decrypt
);
656 static void crypto_exit_skcipher_ops_blkcipher(struct crypto_tfm
*tfm
)
658 struct crypto_blkcipher
**ctx
= crypto_tfm_ctx(tfm
);
660 crypto_free_blkcipher(*ctx
);
663 static int crypto_init_skcipher_ops_blkcipher(struct crypto_tfm
*tfm
)
665 struct crypto_alg
*calg
= tfm
->__crt_alg
;
666 struct crypto_skcipher
*skcipher
= __crypto_skcipher_cast(tfm
);
667 struct crypto_blkcipher
**ctx
= crypto_tfm_ctx(tfm
);
668 struct crypto_blkcipher
*blkcipher
;
669 struct crypto_tfm
*btfm
;
671 if (!crypto_mod_get(calg
))
674 btfm
= __crypto_alloc_tfm(calg
, CRYPTO_ALG_TYPE_BLKCIPHER
,
675 CRYPTO_ALG_TYPE_MASK
);
677 crypto_mod_put(calg
);
678 return PTR_ERR(btfm
);
681 blkcipher
= __crypto_blkcipher_cast(btfm
);
683 tfm
->exit
= crypto_exit_skcipher_ops_blkcipher
;
685 skcipher
->setkey
= skcipher_setkey_blkcipher
;
686 skcipher
->encrypt
= skcipher_encrypt_blkcipher
;
687 skcipher
->decrypt
= skcipher_decrypt_blkcipher
;
689 skcipher
->ivsize
= crypto_blkcipher_ivsize(blkcipher
);
690 skcipher
->keysize
= calg
->cra_blkcipher
.max_keysize
;
692 skcipher_set_needkey(skcipher
);
697 static int skcipher_setkey_ablkcipher(struct crypto_skcipher
*tfm
,
698 const u8
*key
, unsigned int keylen
)
700 struct crypto_ablkcipher
**ctx
= crypto_skcipher_ctx(tfm
);
701 struct crypto_ablkcipher
*ablkcipher
= *ctx
;
704 crypto_ablkcipher_clear_flags(ablkcipher
, ~0);
705 crypto_ablkcipher_set_flags(ablkcipher
,
706 crypto_skcipher_get_flags(tfm
) &
707 CRYPTO_TFM_REQ_MASK
);
708 err
= crypto_ablkcipher_setkey(ablkcipher
, key
, keylen
);
709 crypto_skcipher_set_flags(tfm
,
710 crypto_ablkcipher_get_flags(ablkcipher
) &
711 CRYPTO_TFM_RES_MASK
);
713 skcipher_set_needkey(tfm
);
717 crypto_skcipher_clear_flags(tfm
, CRYPTO_TFM_NEED_KEY
);
721 static int skcipher_crypt_ablkcipher(struct skcipher_request
*req
,
722 int (*crypt
)(struct ablkcipher_request
*))
724 struct crypto_skcipher
*tfm
= crypto_skcipher_reqtfm(req
);
725 struct crypto_ablkcipher
**ctx
= crypto_skcipher_ctx(tfm
);
726 struct ablkcipher_request
*subreq
= skcipher_request_ctx(req
);
728 ablkcipher_request_set_tfm(subreq
, *ctx
);
729 ablkcipher_request_set_callback(subreq
, skcipher_request_flags(req
),
730 req
->base
.complete
, req
->base
.data
);
731 ablkcipher_request_set_crypt(subreq
, req
->src
, req
->dst
, req
->cryptlen
,
734 return crypt(subreq
);
737 static int skcipher_encrypt_ablkcipher(struct skcipher_request
*req
)
739 struct crypto_skcipher
*skcipher
= crypto_skcipher_reqtfm(req
);
740 struct crypto_tfm
*tfm
= crypto_skcipher_tfm(skcipher
);
741 struct ablkcipher_alg
*alg
= &tfm
->__crt_alg
->cra_ablkcipher
;
743 return skcipher_crypt_ablkcipher(req
, alg
->encrypt
);
746 static int skcipher_decrypt_ablkcipher(struct skcipher_request
*req
)
748 struct crypto_skcipher
*skcipher
= crypto_skcipher_reqtfm(req
);
749 struct crypto_tfm
*tfm
= crypto_skcipher_tfm(skcipher
);
750 struct ablkcipher_alg
*alg
= &tfm
->__crt_alg
->cra_ablkcipher
;
752 return skcipher_crypt_ablkcipher(req
, alg
->decrypt
);
755 static void crypto_exit_skcipher_ops_ablkcipher(struct crypto_tfm
*tfm
)
757 struct crypto_ablkcipher
**ctx
= crypto_tfm_ctx(tfm
);
759 crypto_free_ablkcipher(*ctx
);
762 static int crypto_init_skcipher_ops_ablkcipher(struct crypto_tfm
*tfm
)
764 struct crypto_alg
*calg
= tfm
->__crt_alg
;
765 struct crypto_skcipher
*skcipher
= __crypto_skcipher_cast(tfm
);
766 struct crypto_ablkcipher
**ctx
= crypto_tfm_ctx(tfm
);
767 struct crypto_ablkcipher
*ablkcipher
;
768 struct crypto_tfm
*abtfm
;
770 if (!crypto_mod_get(calg
))
773 abtfm
= __crypto_alloc_tfm(calg
, 0, 0);
775 crypto_mod_put(calg
);
776 return PTR_ERR(abtfm
);
779 ablkcipher
= __crypto_ablkcipher_cast(abtfm
);
781 tfm
->exit
= crypto_exit_skcipher_ops_ablkcipher
;
783 skcipher
->setkey
= skcipher_setkey_ablkcipher
;
784 skcipher
->encrypt
= skcipher_encrypt_ablkcipher
;
785 skcipher
->decrypt
= skcipher_decrypt_ablkcipher
;
787 skcipher
->ivsize
= crypto_ablkcipher_ivsize(ablkcipher
);
788 skcipher
->reqsize
= crypto_ablkcipher_reqsize(ablkcipher
) +
789 sizeof(struct ablkcipher_request
);
790 skcipher
->keysize
= calg
->cra_ablkcipher
.max_keysize
;
792 skcipher_set_needkey(skcipher
);
797 static int skcipher_setkey_unaligned(struct crypto_skcipher
*tfm
,
798 const u8
*key
, unsigned int keylen
)
800 unsigned long alignmask
= crypto_skcipher_alignmask(tfm
);
801 struct skcipher_alg
*cipher
= crypto_skcipher_alg(tfm
);
802 u8
*buffer
, *alignbuffer
;
803 unsigned long absize
;
806 absize
= keylen
+ alignmask
;
807 buffer
= kmalloc(absize
, GFP_ATOMIC
);
811 alignbuffer
= (u8
*)ALIGN((unsigned long)buffer
, alignmask
+ 1);
812 memcpy(alignbuffer
, key
, keylen
);
813 ret
= cipher
->setkey(tfm
, alignbuffer
, keylen
);
818 static int skcipher_setkey(struct crypto_skcipher
*tfm
, const u8
*key
,
821 struct skcipher_alg
*cipher
= crypto_skcipher_alg(tfm
);
822 unsigned long alignmask
= crypto_skcipher_alignmask(tfm
);
825 if (keylen
< cipher
->min_keysize
|| keylen
> cipher
->max_keysize
) {
826 crypto_skcipher_set_flags(tfm
, CRYPTO_TFM_RES_BAD_KEY_LEN
);
830 if ((unsigned long)key
& alignmask
)
831 err
= skcipher_setkey_unaligned(tfm
, key
, keylen
);
833 err
= cipher
->setkey(tfm
, key
, keylen
);
836 skcipher_set_needkey(tfm
);
840 crypto_skcipher_clear_flags(tfm
, CRYPTO_TFM_NEED_KEY
);
844 int crypto_skcipher_encrypt(struct skcipher_request
*req
)
846 struct crypto_skcipher
*tfm
= crypto_skcipher_reqtfm(req
);
847 struct crypto_alg
*alg
= tfm
->base
.__crt_alg
;
848 unsigned int cryptlen
= req
->cryptlen
;
851 crypto_stats_get(alg
);
852 if (crypto_skcipher_get_flags(tfm
) & CRYPTO_TFM_NEED_KEY
)
855 ret
= tfm
->encrypt(req
);
856 crypto_stats_skcipher_encrypt(cryptlen
, ret
, alg
);
859 EXPORT_SYMBOL_GPL(crypto_skcipher_encrypt
);
861 int crypto_skcipher_decrypt(struct skcipher_request
*req
)
863 struct crypto_skcipher
*tfm
= crypto_skcipher_reqtfm(req
);
864 struct crypto_alg
*alg
= tfm
->base
.__crt_alg
;
865 unsigned int cryptlen
= req
->cryptlen
;
868 crypto_stats_get(alg
);
869 if (crypto_skcipher_get_flags(tfm
) & CRYPTO_TFM_NEED_KEY
)
872 ret
= tfm
->decrypt(req
);
873 crypto_stats_skcipher_decrypt(cryptlen
, ret
, alg
);
876 EXPORT_SYMBOL_GPL(crypto_skcipher_decrypt
);
878 static void crypto_skcipher_exit_tfm(struct crypto_tfm
*tfm
)
880 struct crypto_skcipher
*skcipher
= __crypto_skcipher_cast(tfm
);
881 struct skcipher_alg
*alg
= crypto_skcipher_alg(skcipher
);
886 static int crypto_skcipher_init_tfm(struct crypto_tfm
*tfm
)
888 struct crypto_skcipher
*skcipher
= __crypto_skcipher_cast(tfm
);
889 struct skcipher_alg
*alg
= crypto_skcipher_alg(skcipher
);
891 if (tfm
->__crt_alg
->cra_type
== &crypto_blkcipher_type
)
892 return crypto_init_skcipher_ops_blkcipher(tfm
);
894 if (tfm
->__crt_alg
->cra_type
== &crypto_ablkcipher_type
)
895 return crypto_init_skcipher_ops_ablkcipher(tfm
);
897 skcipher
->setkey
= skcipher_setkey
;
898 skcipher
->encrypt
= alg
->encrypt
;
899 skcipher
->decrypt
= alg
->decrypt
;
900 skcipher
->ivsize
= alg
->ivsize
;
901 skcipher
->keysize
= alg
->max_keysize
;
903 skcipher_set_needkey(skcipher
);
906 skcipher
->base
.exit
= crypto_skcipher_exit_tfm
;
909 return alg
->init(skcipher
);
914 static void crypto_skcipher_free_instance(struct crypto_instance
*inst
)
916 struct skcipher_instance
*skcipher
=
917 container_of(inst
, struct skcipher_instance
, s
.base
);
919 skcipher
->free(skcipher
);
922 static void crypto_skcipher_show(struct seq_file
*m
, struct crypto_alg
*alg
)
924 static void crypto_skcipher_show(struct seq_file
*m
, struct crypto_alg
*alg
)
926 struct skcipher_alg
*skcipher
= container_of(alg
, struct skcipher_alg
,
929 seq_printf(m
, "type : skcipher\n");
930 seq_printf(m
, "async : %s\n",
931 alg
->cra_flags
& CRYPTO_ALG_ASYNC
? "yes" : "no");
932 seq_printf(m
, "blocksize : %u\n", alg
->cra_blocksize
);
933 seq_printf(m
, "min keysize : %u\n", skcipher
->min_keysize
);
934 seq_printf(m
, "max keysize : %u\n", skcipher
->max_keysize
);
935 seq_printf(m
, "ivsize : %u\n", skcipher
->ivsize
);
936 seq_printf(m
, "chunksize : %u\n", skcipher
->chunksize
);
937 seq_printf(m
, "walksize : %u\n", skcipher
->walksize
);
941 static int crypto_skcipher_report(struct sk_buff
*skb
, struct crypto_alg
*alg
)
943 struct crypto_report_blkcipher rblkcipher
;
944 struct skcipher_alg
*skcipher
= container_of(alg
, struct skcipher_alg
,
947 memset(&rblkcipher
, 0, sizeof(rblkcipher
));
949 strscpy(rblkcipher
.type
, "skcipher", sizeof(rblkcipher
.type
));
950 strscpy(rblkcipher
.geniv
, "<none>", sizeof(rblkcipher
.geniv
));
952 rblkcipher
.blocksize
= alg
->cra_blocksize
;
953 rblkcipher
.min_keysize
= skcipher
->min_keysize
;
954 rblkcipher
.max_keysize
= skcipher
->max_keysize
;
955 rblkcipher
.ivsize
= skcipher
->ivsize
;
957 return nla_put(skb
, CRYPTOCFGA_REPORT_BLKCIPHER
,
958 sizeof(rblkcipher
), &rblkcipher
);
961 static int crypto_skcipher_report(struct sk_buff
*skb
, struct crypto_alg
*alg
)
967 static const struct crypto_type crypto_skcipher_type2
= {
968 .extsize
= crypto_skcipher_extsize
,
969 .init_tfm
= crypto_skcipher_init_tfm
,
970 .free
= crypto_skcipher_free_instance
,
971 #ifdef CONFIG_PROC_FS
972 .show
= crypto_skcipher_show
,
974 .report
= crypto_skcipher_report
,
975 .maskclear
= ~CRYPTO_ALG_TYPE_MASK
,
976 .maskset
= CRYPTO_ALG_TYPE_BLKCIPHER_MASK
,
977 .type
= CRYPTO_ALG_TYPE_SKCIPHER
,
978 .tfmsize
= offsetof(struct crypto_skcipher
, base
),
981 int crypto_grab_skcipher(struct crypto_skcipher_spawn
*spawn
,
982 const char *name
, u32 type
, u32 mask
)
984 spawn
->base
.frontend
= &crypto_skcipher_type2
;
985 return crypto_grab_spawn(&spawn
->base
, name
, type
, mask
);
987 EXPORT_SYMBOL_GPL(crypto_grab_skcipher
);
989 struct crypto_skcipher
*crypto_alloc_skcipher(const char *alg_name
,
992 return crypto_alloc_tfm(alg_name
, &crypto_skcipher_type2
, type
, mask
);
994 EXPORT_SYMBOL_GPL(crypto_alloc_skcipher
);
996 struct crypto_sync_skcipher
*crypto_alloc_sync_skcipher(
997 const char *alg_name
, u32 type
, u32 mask
)
999 struct crypto_skcipher
*tfm
;
1001 /* Only sync algorithms allowed. */
1002 mask
|= CRYPTO_ALG_ASYNC
;
1004 tfm
= crypto_alloc_tfm(alg_name
, &crypto_skcipher_type2
, type
, mask
);
1007 * Make sure we do not allocate something that might get used with
1008 * an on-stack request: check the request size.
1010 if (!IS_ERR(tfm
) && WARN_ON(crypto_skcipher_reqsize(tfm
) >
1011 MAX_SYNC_SKCIPHER_REQSIZE
)) {
1012 crypto_free_skcipher(tfm
);
1013 return ERR_PTR(-EINVAL
);
1016 return (struct crypto_sync_skcipher
*)tfm
;
1018 EXPORT_SYMBOL_GPL(crypto_alloc_sync_skcipher
);
1020 int crypto_has_skcipher2(const char *alg_name
, u32 type
, u32 mask
)
1022 return crypto_type_has_alg(alg_name
, &crypto_skcipher_type2
,
1025 EXPORT_SYMBOL_GPL(crypto_has_skcipher2
);
1027 static int skcipher_prepare_alg(struct skcipher_alg
*alg
)
1029 struct crypto_alg
*base
= &alg
->base
;
1031 if (alg
->ivsize
> PAGE_SIZE
/ 8 || alg
->chunksize
> PAGE_SIZE
/ 8 ||
1032 alg
->walksize
> PAGE_SIZE
/ 8)
1035 if (!alg
->chunksize
)
1036 alg
->chunksize
= base
->cra_blocksize
;
1038 alg
->walksize
= alg
->chunksize
;
1040 base
->cra_type
= &crypto_skcipher_type2
;
1041 base
->cra_flags
&= ~CRYPTO_ALG_TYPE_MASK
;
1042 base
->cra_flags
|= CRYPTO_ALG_TYPE_SKCIPHER
;
1047 int crypto_register_skcipher(struct skcipher_alg
*alg
)
1049 struct crypto_alg
*base
= &alg
->base
;
1052 err
= skcipher_prepare_alg(alg
);
1056 return crypto_register_alg(base
);
1058 EXPORT_SYMBOL_GPL(crypto_register_skcipher
);
1060 void crypto_unregister_skcipher(struct skcipher_alg
*alg
)
1062 crypto_unregister_alg(&alg
->base
);
1064 EXPORT_SYMBOL_GPL(crypto_unregister_skcipher
);
1066 int crypto_register_skciphers(struct skcipher_alg
*algs
, int count
)
1070 for (i
= 0; i
< count
; i
++) {
1071 ret
= crypto_register_skcipher(&algs
[i
]);
1079 for (--i
; i
>= 0; --i
)
1080 crypto_unregister_skcipher(&algs
[i
]);
1084 EXPORT_SYMBOL_GPL(crypto_register_skciphers
);
1086 void crypto_unregister_skciphers(struct skcipher_alg
*algs
, int count
)
1090 for (i
= count
- 1; i
>= 0; --i
)
1091 crypto_unregister_skcipher(&algs
[i
]);
1093 EXPORT_SYMBOL_GPL(crypto_unregister_skciphers
);
1095 int skcipher_register_instance(struct crypto_template
*tmpl
,
1096 struct skcipher_instance
*inst
)
1100 err
= skcipher_prepare_alg(&inst
->alg
);
1104 return crypto_register_instance(tmpl
, skcipher_crypto_instance(inst
));
1106 EXPORT_SYMBOL_GPL(skcipher_register_instance
);
1108 static int skcipher_setkey_simple(struct crypto_skcipher
*tfm
, const u8
*key
,
1109 unsigned int keylen
)
1111 struct crypto_cipher
*cipher
= skcipher_cipher_simple(tfm
);
1114 crypto_cipher_clear_flags(cipher
, CRYPTO_TFM_REQ_MASK
);
1115 crypto_cipher_set_flags(cipher
, crypto_skcipher_get_flags(tfm
) &
1116 CRYPTO_TFM_REQ_MASK
);
1117 err
= crypto_cipher_setkey(cipher
, key
, keylen
);
1118 crypto_skcipher_set_flags(tfm
, crypto_cipher_get_flags(cipher
) &
1119 CRYPTO_TFM_RES_MASK
);
1123 static int skcipher_init_tfm_simple(struct crypto_skcipher
*tfm
)
1125 struct skcipher_instance
*inst
= skcipher_alg_instance(tfm
);
1126 struct crypto_spawn
*spawn
= skcipher_instance_ctx(inst
);
1127 struct skcipher_ctx_simple
*ctx
= crypto_skcipher_ctx(tfm
);
1128 struct crypto_cipher
*cipher
;
1130 cipher
= crypto_spawn_cipher(spawn
);
1132 return PTR_ERR(cipher
);
1134 ctx
->cipher
= cipher
;
1138 static void skcipher_exit_tfm_simple(struct crypto_skcipher
*tfm
)
1140 struct skcipher_ctx_simple
*ctx
= crypto_skcipher_ctx(tfm
);
1142 crypto_free_cipher(ctx
->cipher
);
1145 static void skcipher_free_instance_simple(struct skcipher_instance
*inst
)
1147 crypto_drop_spawn(skcipher_instance_ctx(inst
));
1152 * skcipher_alloc_instance_simple - allocate instance of simple block cipher mode
1154 * Allocate an skcipher_instance for a simple block cipher mode of operation,
1155 * e.g. cbc or ecb. The instance context will have just a single crypto_spawn,
1156 * that for the underlying cipher. The {min,max}_keysize, ivsize, blocksize,
1157 * alignmask, and priority are set from the underlying cipher but can be
1158 * overridden if needed. The tfm context defaults to skcipher_ctx_simple, and
1159 * default ->setkey(), ->init(), and ->exit() methods are installed.
1161 * @tmpl: the template being instantiated
1162 * @tb: the template parameters
1163 * @cipher_alg_ret: on success, a pointer to the underlying cipher algorithm is
1164 * returned here. It must be dropped with crypto_mod_put().
1166 * Return: a pointer to the new instance, or an ERR_PTR(). The caller still
1167 * needs to register the instance.
1169 struct skcipher_instance
*
1170 skcipher_alloc_instance_simple(struct crypto_template
*tmpl
, struct rtattr
**tb
,
1171 struct crypto_alg
**cipher_alg_ret
)
1173 struct crypto_attr_type
*algt
;
1174 struct crypto_alg
*cipher_alg
;
1175 struct skcipher_instance
*inst
;
1176 struct crypto_spawn
*spawn
;
1180 algt
= crypto_get_attr_type(tb
);
1182 return ERR_CAST(algt
);
1184 if ((algt
->type
^ CRYPTO_ALG_TYPE_SKCIPHER
) & algt
->mask
)
1185 return ERR_PTR(-EINVAL
);
1187 mask
= CRYPTO_ALG_TYPE_MASK
|
1188 crypto_requires_off(algt
->type
, algt
->mask
,
1189 CRYPTO_ALG_NEED_FALLBACK
);
1191 cipher_alg
= crypto_get_attr_alg(tb
, CRYPTO_ALG_TYPE_CIPHER
, mask
);
1192 if (IS_ERR(cipher_alg
))
1193 return ERR_CAST(cipher_alg
);
1195 inst
= kzalloc(sizeof(*inst
) + sizeof(*spawn
), GFP_KERNEL
);
1198 goto err_put_cipher_alg
;
1200 spawn
= skcipher_instance_ctx(inst
);
1202 err
= crypto_inst_setname(skcipher_crypto_instance(inst
), tmpl
->name
,
1207 err
= crypto_init_spawn(spawn
, cipher_alg
,
1208 skcipher_crypto_instance(inst
),
1209 CRYPTO_ALG_TYPE_MASK
);
1212 inst
->free
= skcipher_free_instance_simple
;
1214 /* Default algorithm properties, can be overridden */
1215 inst
->alg
.base
.cra_blocksize
= cipher_alg
->cra_blocksize
;
1216 inst
->alg
.base
.cra_alignmask
= cipher_alg
->cra_alignmask
;
1217 inst
->alg
.base
.cra_priority
= cipher_alg
->cra_priority
;
1218 inst
->alg
.min_keysize
= cipher_alg
->cra_cipher
.cia_min_keysize
;
1219 inst
->alg
.max_keysize
= cipher_alg
->cra_cipher
.cia_max_keysize
;
1220 inst
->alg
.ivsize
= cipher_alg
->cra_blocksize
;
1222 /* Use skcipher_ctx_simple by default, can be overridden */
1223 inst
->alg
.base
.cra_ctxsize
= sizeof(struct skcipher_ctx_simple
);
1224 inst
->alg
.setkey
= skcipher_setkey_simple
;
1225 inst
->alg
.init
= skcipher_init_tfm_simple
;
1226 inst
->alg
.exit
= skcipher_exit_tfm_simple
;
1228 *cipher_alg_ret
= cipher_alg
;
1234 crypto_mod_put(cipher_alg
);
1235 return ERR_PTR(err
);
1237 EXPORT_SYMBOL_GPL(skcipher_alloc_instance_simple
);
1239 MODULE_LICENSE("GPL");
1240 MODULE_DESCRIPTION("Symmetric key cipher type");