2 * Authenc: Simple AEAD wrapper for IPsec
4 * Copyright (c) 2007 Herbert Xu <herbert@gondor.apana.org.au>
6 * This program is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the Free
8 * Software Foundation; either version 2 of the License, or (at your option)
13 #include <crypto/aead.h>
14 #include <crypto/internal/hash.h>
15 #include <crypto/internal/skcipher.h>
16 #include <crypto/authenc.h>
17 #include <crypto/scatterwalk.h>
18 #include <linux/err.h>
19 #include <linux/init.h>
20 #include <linux/kernel.h>
21 #include <linux/module.h>
22 #include <linux/rtnetlink.h>
23 #include <linux/slab.h>
24 #include <linux/spinlock.h>
26 struct authenc_instance_ctx
{
27 struct crypto_spawn auth
;
28 struct crypto_skcipher_spawn enc
;
31 struct crypto_authenc_ctx
{
33 struct crypto_hash
*auth
;
34 struct crypto_ablkcipher
*enc
;
37 static int crypto_authenc_setkey(struct crypto_aead
*authenc
, const u8
*key
,
40 unsigned int authkeylen
;
41 unsigned int enckeylen
;
42 struct crypto_authenc_ctx
*ctx
= crypto_aead_ctx(authenc
);
43 struct crypto_hash
*auth
= ctx
->auth
;
44 struct crypto_ablkcipher
*enc
= ctx
->enc
;
45 struct rtattr
*rta
= (void *)key
;
46 struct crypto_authenc_key_param
*param
;
49 if (!RTA_OK(rta
, keylen
))
51 if (rta
->rta_type
!= CRYPTO_AUTHENC_KEYA_PARAM
)
53 if (RTA_PAYLOAD(rta
) < sizeof(*param
))
56 param
= RTA_DATA(rta
);
57 enckeylen
= be32_to_cpu(param
->enckeylen
);
59 key
+= RTA_ALIGN(rta
->rta_len
);
60 keylen
-= RTA_ALIGN(rta
->rta_len
);
62 if (keylen
< enckeylen
)
65 authkeylen
= keylen
- enckeylen
;
67 crypto_hash_clear_flags(auth
, CRYPTO_TFM_REQ_MASK
);
68 crypto_hash_set_flags(auth
, crypto_aead_get_flags(authenc
) &
70 err
= crypto_hash_setkey(auth
, key
, authkeylen
);
71 crypto_aead_set_flags(authenc
, crypto_hash_get_flags(auth
) &
77 crypto_ablkcipher_clear_flags(enc
, CRYPTO_TFM_REQ_MASK
);
78 crypto_ablkcipher_set_flags(enc
, crypto_aead_get_flags(authenc
) &
80 err
= crypto_ablkcipher_setkey(enc
, key
+ authkeylen
, enckeylen
);
81 crypto_aead_set_flags(authenc
, crypto_ablkcipher_get_flags(enc
) &
88 crypto_aead_set_flags(authenc
, CRYPTO_TFM_RES_BAD_KEY_LEN
);
92 static void authenc_chain(struct scatterlist
*head
, struct scatterlist
*sg
,
96 head
->length
+= sg
->length
;
97 sg
= scatterwalk_sg_next(sg
);
101 scatterwalk_sg_chain(head
, 2, sg
);
106 static u8
*crypto_authenc_hash(struct aead_request
*req
, unsigned int flags
,
107 struct scatterlist
*cipher
,
108 unsigned int cryptlen
)
110 struct crypto_aead
*authenc
= crypto_aead_reqtfm(req
);
111 struct crypto_authenc_ctx
*ctx
= crypto_aead_ctx(authenc
);
112 struct crypto_hash
*auth
= ctx
->auth
;
113 struct hash_desc desc
= {
115 .flags
= aead_request_flags(req
) & flags
,
117 u8
*hash
= aead_request_ctx(req
);
120 hash
= (u8
*)ALIGN((unsigned long)hash
+ crypto_hash_alignmask(auth
),
121 crypto_hash_alignmask(auth
) + 1);
123 spin_lock_bh(&ctx
->auth_lock
);
124 err
= crypto_hash_init(&desc
);
128 err
= crypto_hash_update(&desc
, req
->assoc
, req
->assoclen
);
132 err
= crypto_hash_update(&desc
, cipher
, cryptlen
);
136 err
= crypto_hash_final(&desc
, hash
);
138 spin_unlock_bh(&ctx
->auth_lock
);
146 static int crypto_authenc_genicv(struct aead_request
*req
, u8
*iv
,
149 struct crypto_aead
*authenc
= crypto_aead_reqtfm(req
);
150 struct scatterlist
*dst
= req
->dst
;
151 struct scatterlist cipher
[2];
153 unsigned int ivsize
= crypto_aead_ivsize(authenc
);
154 unsigned int cryptlen
;
159 vdst
= PageHighMem(dstp
) ? NULL
: page_address(dstp
) + dst
->offset
;
162 sg_init_table(cipher
, 2);
163 sg_set_buf(cipher
, iv
, ivsize
);
164 authenc_chain(cipher
, dst
, vdst
== iv
+ ivsize
);
168 cryptlen
= req
->cryptlen
+ ivsize
;
169 hash
= crypto_authenc_hash(req
, flags
, dst
, cryptlen
);
171 return PTR_ERR(hash
);
173 scatterwalk_map_and_copy(hash
, dst
, cryptlen
,
174 crypto_aead_authsize(authenc
), 1);
178 static void crypto_authenc_encrypt_done(struct crypto_async_request
*req
,
181 struct aead_request
*areq
= req
->data
;
184 struct crypto_aead
*authenc
= crypto_aead_reqtfm(areq
);
185 struct crypto_authenc_ctx
*ctx
= crypto_aead_ctx(authenc
);
186 struct ablkcipher_request
*abreq
= aead_request_ctx(areq
);
187 u8
*iv
= (u8
*)(abreq
+ 1) +
188 crypto_ablkcipher_reqsize(ctx
->enc
);
190 err
= crypto_authenc_genicv(areq
, iv
, 0);
193 aead_request_complete(areq
, err
);
196 static int crypto_authenc_encrypt(struct aead_request
*req
)
198 struct crypto_aead
*authenc
= crypto_aead_reqtfm(req
);
199 struct crypto_authenc_ctx
*ctx
= crypto_aead_ctx(authenc
);
200 struct ablkcipher_request
*abreq
= aead_request_ctx(req
);
201 struct crypto_ablkcipher
*enc
= ctx
->enc
;
202 struct scatterlist
*dst
= req
->dst
;
203 unsigned int cryptlen
= req
->cryptlen
;
204 u8
*iv
= (u8
*)(abreq
+ 1) + crypto_ablkcipher_reqsize(enc
);
207 ablkcipher_request_set_tfm(abreq
, enc
);
208 ablkcipher_request_set_callback(abreq
, aead_request_flags(req
),
209 crypto_authenc_encrypt_done
, req
);
210 ablkcipher_request_set_crypt(abreq
, req
->src
, dst
, cryptlen
, req
->iv
);
212 memcpy(iv
, req
->iv
, crypto_aead_ivsize(authenc
));
214 err
= crypto_ablkcipher_encrypt(abreq
);
218 return crypto_authenc_genicv(req
, iv
, CRYPTO_TFM_REQ_MAY_SLEEP
);
221 static void crypto_authenc_givencrypt_done(struct crypto_async_request
*req
,
224 struct aead_request
*areq
= req
->data
;
227 struct skcipher_givcrypt_request
*greq
= aead_request_ctx(areq
);
229 err
= crypto_authenc_genicv(areq
, greq
->giv
, 0);
232 aead_request_complete(areq
, err
);
235 static int crypto_authenc_givencrypt(struct aead_givcrypt_request
*req
)
237 struct crypto_aead
*authenc
= aead_givcrypt_reqtfm(req
);
238 struct crypto_authenc_ctx
*ctx
= crypto_aead_ctx(authenc
);
239 struct aead_request
*areq
= &req
->areq
;
240 struct skcipher_givcrypt_request
*greq
= aead_request_ctx(areq
);
244 skcipher_givcrypt_set_tfm(greq
, ctx
->enc
);
245 skcipher_givcrypt_set_callback(greq
, aead_request_flags(areq
),
246 crypto_authenc_givencrypt_done
, areq
);
247 skcipher_givcrypt_set_crypt(greq
, areq
->src
, areq
->dst
, areq
->cryptlen
,
249 skcipher_givcrypt_set_giv(greq
, iv
, req
->seq
);
251 err
= crypto_skcipher_givencrypt(greq
);
255 return crypto_authenc_genicv(areq
, iv
, CRYPTO_TFM_REQ_MAY_SLEEP
);
258 static int crypto_authenc_verify(struct aead_request
*req
,
259 struct scatterlist
*cipher
,
260 unsigned int cryptlen
)
262 struct crypto_aead
*authenc
= crypto_aead_reqtfm(req
);
265 unsigned int authsize
;
267 ohash
= crypto_authenc_hash(req
, CRYPTO_TFM_REQ_MAY_SLEEP
, cipher
,
270 return PTR_ERR(ohash
);
272 authsize
= crypto_aead_authsize(authenc
);
273 ihash
= ohash
+ authsize
;
274 scatterwalk_map_and_copy(ihash
, cipher
, cryptlen
, authsize
, 0);
275 return memcmp(ihash
, ohash
, authsize
) ? -EBADMSG
: 0;
278 static int crypto_authenc_iverify(struct aead_request
*req
, u8
*iv
,
279 unsigned int cryptlen
)
281 struct crypto_aead
*authenc
= crypto_aead_reqtfm(req
);
282 struct scatterlist
*src
= req
->src
;
283 struct scatterlist cipher
[2];
285 unsigned int ivsize
= crypto_aead_ivsize(authenc
);
289 vsrc
= PageHighMem(srcp
) ? NULL
: page_address(srcp
) + src
->offset
;
292 sg_init_table(cipher
, 2);
293 sg_set_buf(cipher
, iv
, ivsize
);
294 authenc_chain(cipher
, src
, vsrc
== iv
+ ivsize
);
298 return crypto_authenc_verify(req
, src
, cryptlen
+ ivsize
);
301 static int crypto_authenc_decrypt(struct aead_request
*req
)
303 struct crypto_aead
*authenc
= crypto_aead_reqtfm(req
);
304 struct crypto_authenc_ctx
*ctx
= crypto_aead_ctx(authenc
);
305 struct ablkcipher_request
*abreq
= aead_request_ctx(req
);
306 unsigned int cryptlen
= req
->cryptlen
;
307 unsigned int authsize
= crypto_aead_authsize(authenc
);
311 if (cryptlen
< authsize
)
313 cryptlen
-= authsize
;
315 err
= crypto_authenc_iverify(req
, iv
, cryptlen
);
319 ablkcipher_request_set_tfm(abreq
, ctx
->enc
);
320 ablkcipher_request_set_callback(abreq
, aead_request_flags(req
),
321 req
->base
.complete
, req
->base
.data
);
322 ablkcipher_request_set_crypt(abreq
, req
->src
, req
->dst
, cryptlen
, iv
);
324 return crypto_ablkcipher_decrypt(abreq
);
327 static int crypto_authenc_init_tfm(struct crypto_tfm
*tfm
)
329 struct crypto_instance
*inst
= (void *)tfm
->__crt_alg
;
330 struct authenc_instance_ctx
*ictx
= crypto_instance_ctx(inst
);
331 struct crypto_authenc_ctx
*ctx
= crypto_tfm_ctx(tfm
);
332 struct crypto_hash
*auth
;
333 struct crypto_ablkcipher
*enc
;
336 auth
= crypto_spawn_hash(&ictx
->auth
);
338 return PTR_ERR(auth
);
340 enc
= crypto_spawn_skcipher(&ictx
->enc
);
347 tfm
->crt_aead
.reqsize
= max_t(unsigned int,
348 (crypto_hash_alignmask(auth
) &
349 ~(crypto_tfm_ctx_alignment() - 1)) +
350 crypto_hash_digestsize(auth
) * 2,
351 sizeof(struct skcipher_givcrypt_request
) +
352 crypto_ablkcipher_reqsize(enc
) +
353 crypto_ablkcipher_ivsize(enc
));
355 spin_lock_init(&ctx
->auth_lock
);
360 crypto_free_hash(auth
);
364 static void crypto_authenc_exit_tfm(struct crypto_tfm
*tfm
)
366 struct crypto_authenc_ctx
*ctx
= crypto_tfm_ctx(tfm
);
368 crypto_free_hash(ctx
->auth
);
369 crypto_free_ablkcipher(ctx
->enc
);
372 static struct crypto_instance
*crypto_authenc_alloc(struct rtattr
**tb
)
374 struct crypto_attr_type
*algt
;
375 struct crypto_instance
*inst
;
376 struct crypto_alg
*auth
;
377 struct crypto_alg
*enc
;
378 struct authenc_instance_ctx
*ctx
;
379 const char *enc_name
;
382 algt
= crypto_get_attr_type(tb
);
387 if ((algt
->type
^ CRYPTO_ALG_TYPE_AEAD
) & algt
->mask
)
388 return ERR_PTR(-EINVAL
);
390 auth
= crypto_attr_alg(tb
[1], CRYPTO_ALG_TYPE_HASH
,
391 CRYPTO_ALG_TYPE_HASH_MASK
);
393 return ERR_PTR(PTR_ERR(auth
));
395 enc_name
= crypto_attr_alg_name(tb
[2]);
396 err
= PTR_ERR(enc_name
);
397 if (IS_ERR(enc_name
))
400 inst
= kzalloc(sizeof(*inst
) + sizeof(*ctx
), GFP_KERNEL
);
405 ctx
= crypto_instance_ctx(inst
);
407 err
= crypto_init_spawn(&ctx
->auth
, auth
, inst
, CRYPTO_ALG_TYPE_MASK
);
411 crypto_set_skcipher_spawn(&ctx
->enc
, inst
);
412 err
= crypto_grab_skcipher(&ctx
->enc
, enc_name
, 0,
413 crypto_requires_sync(algt
->type
,
418 enc
= crypto_skcipher_spawn_alg(&ctx
->enc
);
421 if (snprintf(inst
->alg
.cra_name
, CRYPTO_MAX_ALG_NAME
,
422 "authenc(%s,%s)", auth
->cra_name
, enc
->cra_name
) >=
426 if (snprintf(inst
->alg
.cra_driver_name
, CRYPTO_MAX_ALG_NAME
,
427 "authenc(%s,%s)", auth
->cra_driver_name
,
428 enc
->cra_driver_name
) >= CRYPTO_MAX_ALG_NAME
)
431 inst
->alg
.cra_flags
= CRYPTO_ALG_TYPE_AEAD
;
432 inst
->alg
.cra_flags
|= enc
->cra_flags
& CRYPTO_ALG_ASYNC
;
433 inst
->alg
.cra_priority
= enc
->cra_priority
* 10 + auth
->cra_priority
;
434 inst
->alg
.cra_blocksize
= enc
->cra_blocksize
;
435 inst
->alg
.cra_alignmask
= auth
->cra_alignmask
| enc
->cra_alignmask
;
436 inst
->alg
.cra_type
= &crypto_aead_type
;
438 inst
->alg
.cra_aead
.ivsize
= enc
->cra_ablkcipher
.ivsize
;
439 inst
->alg
.cra_aead
.maxauthsize
= auth
->cra_type
== &crypto_hash_type
?
440 auth
->cra_hash
.digestsize
:
442 __crypto_shash_alg(auth
)->digestsize
:
443 auth
->cra_digest
.dia_digestsize
;
445 inst
->alg
.cra_ctxsize
= sizeof(struct crypto_authenc_ctx
);
447 inst
->alg
.cra_init
= crypto_authenc_init_tfm
;
448 inst
->alg
.cra_exit
= crypto_authenc_exit_tfm
;
450 inst
->alg
.cra_aead
.setkey
= crypto_authenc_setkey
;
451 inst
->alg
.cra_aead
.encrypt
= crypto_authenc_encrypt
;
452 inst
->alg
.cra_aead
.decrypt
= crypto_authenc_decrypt
;
453 inst
->alg
.cra_aead
.givencrypt
= crypto_authenc_givencrypt
;
456 crypto_mod_put(auth
);
460 crypto_drop_skcipher(&ctx
->enc
);
462 crypto_drop_spawn(&ctx
->auth
);
470 static void crypto_authenc_free(struct crypto_instance
*inst
)
472 struct authenc_instance_ctx
*ctx
= crypto_instance_ctx(inst
);
474 crypto_drop_skcipher(&ctx
->enc
);
475 crypto_drop_spawn(&ctx
->auth
);
479 static struct crypto_template crypto_authenc_tmpl
= {
481 .alloc
= crypto_authenc_alloc
,
482 .free
= crypto_authenc_free
,
483 .module
= THIS_MODULE
,
486 static int __init
crypto_authenc_module_init(void)
488 return crypto_register_template(&crypto_authenc_tmpl
);
491 static void __exit
crypto_authenc_module_exit(void)
493 crypto_unregister_template(&crypto_authenc_tmpl
);
496 module_init(crypto_authenc_module_init
);
497 module_exit(crypto_authenc_module_exit
);
499 MODULE_LICENSE("GPL");
500 MODULE_DESCRIPTION("Simple AEAD wrapper for IPsec");