1 // SPDX-License-Identifier: GPL-2.0-or-later
3 * AEAD: Authenticated Encryption with Associated Data
5 * This file provides API support for AEAD algorithms.
7 * Copyright (c) 2007-2015 Herbert Xu <herbert@gondor.apana.org.au>
10 #include <crypto/internal/geniv.h>
11 #include <crypto/internal/rng.h>
12 #include <crypto/null.h>
13 #include <crypto/scatterwalk.h>
14 #include <linux/err.h>
15 #include <linux/init.h>
16 #include <linux/kernel.h>
17 #include <linux/module.h>
18 #include <linux/rtnetlink.h>
19 #include <linux/slab.h>
20 #include <linux/seq_file.h>
21 #include <linux/cryptouser.h>
22 #include <linux/compiler.h>
23 #include <net/netlink.h>
27 static int setkey_unaligned(struct crypto_aead
*tfm
, const u8
*key
,
30 unsigned long alignmask
= crypto_aead_alignmask(tfm
);
32 u8
*buffer
, *alignbuffer
;
35 absize
= keylen
+ alignmask
;
36 buffer
= kmalloc(absize
, GFP_ATOMIC
);
40 alignbuffer
= (u8
*)ALIGN((unsigned long)buffer
, alignmask
+ 1);
41 memcpy(alignbuffer
, key
, keylen
);
42 ret
= crypto_aead_alg(tfm
)->setkey(tfm
, alignbuffer
, keylen
);
43 memset(alignbuffer
, 0, keylen
);
48 int crypto_aead_setkey(struct crypto_aead
*tfm
,
49 const u8
*key
, unsigned int keylen
)
51 unsigned long alignmask
= crypto_aead_alignmask(tfm
);
54 if ((unsigned long)key
& alignmask
)
55 err
= setkey_unaligned(tfm
, key
, keylen
);
57 err
= crypto_aead_alg(tfm
)->setkey(tfm
, key
, keylen
);
60 crypto_aead_set_flags(tfm
, CRYPTO_TFM_NEED_KEY
);
64 crypto_aead_clear_flags(tfm
, CRYPTO_TFM_NEED_KEY
);
67 EXPORT_SYMBOL_GPL(crypto_aead_setkey
);
69 int crypto_aead_setauthsize(struct crypto_aead
*tfm
, unsigned int authsize
)
73 if ((!authsize
&& crypto_aead_maxauthsize(tfm
)) ||
74 authsize
> crypto_aead_maxauthsize(tfm
))
77 if (crypto_aead_alg(tfm
)->setauthsize
) {
78 err
= crypto_aead_alg(tfm
)->setauthsize(tfm
, authsize
);
83 tfm
->authsize
= authsize
;
86 EXPORT_SYMBOL_GPL(crypto_aead_setauthsize
);
88 int crypto_aead_encrypt(struct aead_request
*req
)
90 struct crypto_aead
*aead
= crypto_aead_reqtfm(req
);
91 struct crypto_alg
*alg
= aead
->base
.__crt_alg
;
92 unsigned int cryptlen
= req
->cryptlen
;
95 crypto_stats_get(alg
);
96 if (crypto_aead_get_flags(aead
) & CRYPTO_TFM_NEED_KEY
)
99 ret
= crypto_aead_alg(aead
)->encrypt(req
);
100 crypto_stats_aead_encrypt(cryptlen
, alg
, ret
);
103 EXPORT_SYMBOL_GPL(crypto_aead_encrypt
);
105 int crypto_aead_decrypt(struct aead_request
*req
)
107 struct crypto_aead
*aead
= crypto_aead_reqtfm(req
);
108 struct crypto_alg
*alg
= aead
->base
.__crt_alg
;
109 unsigned int cryptlen
= req
->cryptlen
;
112 crypto_stats_get(alg
);
113 if (crypto_aead_get_flags(aead
) & CRYPTO_TFM_NEED_KEY
)
115 else if (req
->cryptlen
< crypto_aead_authsize(aead
))
118 ret
= crypto_aead_alg(aead
)->decrypt(req
);
119 crypto_stats_aead_decrypt(cryptlen
, alg
, ret
);
122 EXPORT_SYMBOL_GPL(crypto_aead_decrypt
);
124 static void crypto_aead_exit_tfm(struct crypto_tfm
*tfm
)
126 struct crypto_aead
*aead
= __crypto_aead_cast(tfm
);
127 struct aead_alg
*alg
= crypto_aead_alg(aead
);
132 static int crypto_aead_init_tfm(struct crypto_tfm
*tfm
)
134 struct crypto_aead
*aead
= __crypto_aead_cast(tfm
);
135 struct aead_alg
*alg
= crypto_aead_alg(aead
);
137 crypto_aead_set_flags(aead
, CRYPTO_TFM_NEED_KEY
);
139 aead
->authsize
= alg
->maxauthsize
;
142 aead
->base
.exit
= crypto_aead_exit_tfm
;
145 return alg
->init(aead
);
151 static int crypto_aead_report(struct sk_buff
*skb
, struct crypto_alg
*alg
)
153 struct crypto_report_aead raead
;
154 struct aead_alg
*aead
= container_of(alg
, struct aead_alg
, base
);
156 memset(&raead
, 0, sizeof(raead
));
158 strscpy(raead
.type
, "aead", sizeof(raead
.type
));
159 strscpy(raead
.geniv
, "<none>", sizeof(raead
.geniv
));
161 raead
.blocksize
= alg
->cra_blocksize
;
162 raead
.maxauthsize
= aead
->maxauthsize
;
163 raead
.ivsize
= aead
->ivsize
;
165 return nla_put(skb
, CRYPTOCFGA_REPORT_AEAD
, sizeof(raead
), &raead
);
168 static int crypto_aead_report(struct sk_buff
*skb
, struct crypto_alg
*alg
)
174 static void crypto_aead_show(struct seq_file
*m
, struct crypto_alg
*alg
)
176 static void crypto_aead_show(struct seq_file
*m
, struct crypto_alg
*alg
)
178 struct aead_alg
*aead
= container_of(alg
, struct aead_alg
, base
);
180 seq_printf(m
, "type : aead\n");
181 seq_printf(m
, "async : %s\n", alg
->cra_flags
& CRYPTO_ALG_ASYNC
?
183 seq_printf(m
, "blocksize : %u\n", alg
->cra_blocksize
);
184 seq_printf(m
, "ivsize : %u\n", aead
->ivsize
);
185 seq_printf(m
, "maxauthsize : %u\n", aead
->maxauthsize
);
186 seq_printf(m
, "geniv : <none>\n");
189 static void crypto_aead_free_instance(struct crypto_instance
*inst
)
191 struct aead_instance
*aead
= aead_instance(inst
);
194 inst
->tmpl
->free(inst
);
201 static const struct crypto_type crypto_aead_type
= {
202 .extsize
= crypto_alg_extsize
,
203 .init_tfm
= crypto_aead_init_tfm
,
204 .free
= crypto_aead_free_instance
,
205 #ifdef CONFIG_PROC_FS
206 .show
= crypto_aead_show
,
208 .report
= crypto_aead_report
,
209 .maskclear
= ~CRYPTO_ALG_TYPE_MASK
,
210 .maskset
= CRYPTO_ALG_TYPE_MASK
,
211 .type
= CRYPTO_ALG_TYPE_AEAD
,
212 .tfmsize
= offsetof(struct crypto_aead
, base
),
215 static int aead_geniv_setkey(struct crypto_aead
*tfm
,
216 const u8
*key
, unsigned int keylen
)
218 struct aead_geniv_ctx
*ctx
= crypto_aead_ctx(tfm
);
220 return crypto_aead_setkey(ctx
->child
, key
, keylen
);
223 static int aead_geniv_setauthsize(struct crypto_aead
*tfm
,
224 unsigned int authsize
)
226 struct aead_geniv_ctx
*ctx
= crypto_aead_ctx(tfm
);
228 return crypto_aead_setauthsize(ctx
->child
, authsize
);
231 struct aead_instance
*aead_geniv_alloc(struct crypto_template
*tmpl
,
232 struct rtattr
**tb
, u32 type
, u32 mask
)
235 struct crypto_aead_spawn
*spawn
;
236 struct crypto_attr_type
*algt
;
237 struct aead_instance
*inst
;
238 struct aead_alg
*alg
;
240 unsigned int maxauthsize
;
243 algt
= crypto_get_attr_type(tb
);
245 return ERR_CAST(algt
);
247 if ((algt
->type
^ CRYPTO_ALG_TYPE_AEAD
) & algt
->mask
)
248 return ERR_PTR(-EINVAL
);
250 name
= crypto_attr_alg_name(tb
[1]);
252 return ERR_CAST(name
);
254 inst
= kzalloc(sizeof(*inst
) + sizeof(*spawn
), GFP_KERNEL
);
256 return ERR_PTR(-ENOMEM
);
258 spawn
= aead_instance_ctx(inst
);
260 /* Ignore async algorithms if necessary. */
261 mask
|= crypto_requires_sync(algt
->type
, algt
->mask
);
263 crypto_set_aead_spawn(spawn
, aead_crypto_instance(inst
));
264 err
= crypto_grab_aead(spawn
, name
, type
, mask
);
268 alg
= crypto_spawn_aead_alg(spawn
);
270 ivsize
= crypto_aead_alg_ivsize(alg
);
271 maxauthsize
= crypto_aead_alg_maxauthsize(alg
);
274 if (ivsize
< sizeof(u64
))
278 if (snprintf(inst
->alg
.base
.cra_name
, CRYPTO_MAX_ALG_NAME
,
279 "%s(%s)", tmpl
->name
, alg
->base
.cra_name
) >=
282 if (snprintf(inst
->alg
.base
.cra_driver_name
, CRYPTO_MAX_ALG_NAME
,
283 "%s(%s)", tmpl
->name
, alg
->base
.cra_driver_name
) >=
287 inst
->alg
.base
.cra_flags
= alg
->base
.cra_flags
& CRYPTO_ALG_ASYNC
;
288 inst
->alg
.base
.cra_priority
= alg
->base
.cra_priority
;
289 inst
->alg
.base
.cra_blocksize
= alg
->base
.cra_blocksize
;
290 inst
->alg
.base
.cra_alignmask
= alg
->base
.cra_alignmask
;
291 inst
->alg
.base
.cra_ctxsize
= sizeof(struct aead_geniv_ctx
);
293 inst
->alg
.setkey
= aead_geniv_setkey
;
294 inst
->alg
.setauthsize
= aead_geniv_setauthsize
;
296 inst
->alg
.ivsize
= ivsize
;
297 inst
->alg
.maxauthsize
= maxauthsize
;
303 crypto_drop_aead(spawn
);
309 EXPORT_SYMBOL_GPL(aead_geniv_alloc
);
311 void aead_geniv_free(struct aead_instance
*inst
)
313 crypto_drop_aead(aead_instance_ctx(inst
));
316 EXPORT_SYMBOL_GPL(aead_geniv_free
);
318 int aead_init_geniv(struct crypto_aead
*aead
)
320 struct aead_geniv_ctx
*ctx
= crypto_aead_ctx(aead
);
321 struct aead_instance
*inst
= aead_alg_instance(aead
);
322 struct crypto_aead
*child
;
325 spin_lock_init(&ctx
->lock
);
327 err
= crypto_get_default_rng();
331 err
= crypto_rng_get_bytes(crypto_default_rng
, ctx
->salt
,
332 crypto_aead_ivsize(aead
));
333 crypto_put_default_rng();
337 ctx
->sknull
= crypto_get_default_null_skcipher();
338 err
= PTR_ERR(ctx
->sknull
);
339 if (IS_ERR(ctx
->sknull
))
342 child
= crypto_spawn_aead(aead_instance_ctx(inst
));
343 err
= PTR_ERR(child
);
348 crypto_aead_set_reqsize(aead
, crypto_aead_reqsize(child
) +
349 sizeof(struct aead_request
));
357 crypto_put_default_null_skcipher();
360 EXPORT_SYMBOL_GPL(aead_init_geniv
);
362 void aead_exit_geniv(struct crypto_aead
*tfm
)
364 struct aead_geniv_ctx
*ctx
= crypto_aead_ctx(tfm
);
366 crypto_free_aead(ctx
->child
);
367 crypto_put_default_null_skcipher();
369 EXPORT_SYMBOL_GPL(aead_exit_geniv
);
371 int crypto_grab_aead(struct crypto_aead_spawn
*spawn
, const char *name
,
374 spawn
->base
.frontend
= &crypto_aead_type
;
375 return crypto_grab_spawn(&spawn
->base
, name
, type
, mask
);
377 EXPORT_SYMBOL_GPL(crypto_grab_aead
);
379 struct crypto_aead
*crypto_alloc_aead(const char *alg_name
, u32 type
, u32 mask
)
381 return crypto_alloc_tfm(alg_name
, &crypto_aead_type
, type
, mask
);
383 EXPORT_SYMBOL_GPL(crypto_alloc_aead
);
385 static int aead_prepare_alg(struct aead_alg
*alg
)
387 struct crypto_alg
*base
= &alg
->base
;
389 if (max3(alg
->maxauthsize
, alg
->ivsize
, alg
->chunksize
) >
394 alg
->chunksize
= base
->cra_blocksize
;
396 base
->cra_type
= &crypto_aead_type
;
397 base
->cra_flags
&= ~CRYPTO_ALG_TYPE_MASK
;
398 base
->cra_flags
|= CRYPTO_ALG_TYPE_AEAD
;
403 int crypto_register_aead(struct aead_alg
*alg
)
405 struct crypto_alg
*base
= &alg
->base
;
408 err
= aead_prepare_alg(alg
);
412 return crypto_register_alg(base
);
414 EXPORT_SYMBOL_GPL(crypto_register_aead
);
416 void crypto_unregister_aead(struct aead_alg
*alg
)
418 crypto_unregister_alg(&alg
->base
);
420 EXPORT_SYMBOL_GPL(crypto_unregister_aead
);
422 int crypto_register_aeads(struct aead_alg
*algs
, int count
)
426 for (i
= 0; i
< count
; i
++) {
427 ret
= crypto_register_aead(&algs
[i
]);
435 for (--i
; i
>= 0; --i
)
436 crypto_unregister_aead(&algs
[i
]);
440 EXPORT_SYMBOL_GPL(crypto_register_aeads
);
442 void crypto_unregister_aeads(struct aead_alg
*algs
, int count
)
446 for (i
= count
- 1; i
>= 0; --i
)
447 crypto_unregister_aead(&algs
[i
]);
449 EXPORT_SYMBOL_GPL(crypto_unregister_aeads
);
451 int aead_register_instance(struct crypto_template
*tmpl
,
452 struct aead_instance
*inst
)
456 err
= aead_prepare_alg(&inst
->alg
);
460 return crypto_register_instance(tmpl
, aead_crypto_instance(inst
));
462 EXPORT_SYMBOL_GPL(aead_register_instance
);
464 MODULE_LICENSE("GPL");
465 MODULE_DESCRIPTION("Authenticated Encryption with Associated Data (AEAD)");