| .. | .. |
|---|
| 1 | +// SPDX-License-Identifier: GPL-2.0-or-later |
|---|
| 1 | 2 | /* |
|---|
| 2 | 3 | * AEAD: Authenticated Encryption with Associated Data |
|---|
| 3 | 4 | * |
|---|
| 4 | 5 | * This file provides API support for AEAD algorithms. |
|---|
| 5 | 6 | * |
|---|
| 6 | 7 | * Copyright (c) 2007-2015 Herbert Xu <herbert@gondor.apana.org.au> |
|---|
| 7 | | - * |
|---|
| 8 | | - * This program is free software; you can redistribute it and/or modify it |
|---|
| 9 | | - * under the terms of the GNU General Public License as published by the Free |
|---|
| 10 | | - * Software Foundation; either version 2 of the License, or (at your option) |
|---|
| 11 | | - * any later version. |
|---|
| 12 | | - * |
|---|
| 13 | 8 | */ |
|---|
| 14 | 9 | |
|---|
| 15 | | -#include <crypto/internal/geniv.h> |
|---|
| 16 | | -#include <crypto/internal/rng.h> |
|---|
| 17 | | -#include <crypto/null.h> |
|---|
| 18 | | -#include <crypto/scatterwalk.h> |
|---|
| 19 | | -#include <linux/err.h> |
|---|
| 10 | +#include <crypto/internal/aead.h> |
|---|
| 11 | +#include <linux/errno.h> |
|---|
| 20 | 12 | #include <linux/init.h> |
|---|
| 21 | 13 | #include <linux/kernel.h> |
|---|
| 22 | 14 | #include <linux/module.h> |
|---|
| 23 | | -#include <linux/rtnetlink.h> |
|---|
| 24 | 15 | #include <linux/slab.h> |
|---|
| 25 | 16 | #include <linux/seq_file.h> |
|---|
| 26 | 17 | #include <linux/cryptouser.h> |
|---|
| 27 | | -#include <linux/compiler.h> |
|---|
| 28 | 18 | #include <net/netlink.h> |
|---|
| 29 | 19 | |
|---|
| 30 | 20 | #include "internal.h" |
|---|
| .. | .. |
|---|
| 75 | 65 | { |
|---|
| 76 | 66 | int err; |
|---|
| 77 | 67 | |
|---|
| 78 | | - if (authsize > crypto_aead_maxauthsize(tfm)) |
|---|
| 68 | + if ((!authsize && crypto_aead_maxauthsize(tfm)) || |
|---|
| 69 | + authsize > crypto_aead_maxauthsize(tfm)) |
|---|
| 79 | 70 | return -EINVAL; |
|---|
| 80 | 71 | |
|---|
| 81 | 72 | if (crypto_aead_alg(tfm)->setauthsize) { |
|---|
| .. | .. |
|---|
| 88 | 79 | return 0; |
|---|
| 89 | 80 | } |
|---|
| 90 | 81 | EXPORT_SYMBOL_GPL(crypto_aead_setauthsize); |
|---|
| 82 | + |
|---|
| 83 | +int crypto_aead_encrypt(struct aead_request *req) |
|---|
| 84 | +{ |
|---|
| 85 | + struct crypto_aead *aead = crypto_aead_reqtfm(req); |
|---|
| 86 | + struct crypto_alg *alg = aead->base.__crt_alg; |
|---|
| 87 | + unsigned int cryptlen = req->cryptlen; |
|---|
| 88 | + int ret; |
|---|
| 89 | + |
|---|
| 90 | + crypto_stats_get(alg); |
|---|
| 91 | + if (crypto_aead_get_flags(aead) & CRYPTO_TFM_NEED_KEY) |
|---|
| 92 | + ret = -ENOKEY; |
|---|
| 93 | + else |
|---|
| 94 | + ret = crypto_aead_alg(aead)->encrypt(req); |
|---|
| 95 | + crypto_stats_aead_encrypt(cryptlen, alg, ret); |
|---|
| 96 | + return ret; |
|---|
| 97 | +} |
|---|
| 98 | +EXPORT_SYMBOL_GPL(crypto_aead_encrypt); |
|---|
| 99 | + |
|---|
| 100 | +int crypto_aead_decrypt(struct aead_request *req) |
|---|
| 101 | +{ |
|---|
| 102 | + struct crypto_aead *aead = crypto_aead_reqtfm(req); |
|---|
| 103 | + struct crypto_alg *alg = aead->base.__crt_alg; |
|---|
| 104 | + unsigned int cryptlen = req->cryptlen; |
|---|
| 105 | + int ret; |
|---|
| 106 | + |
|---|
| 107 | + crypto_stats_get(alg); |
|---|
| 108 | + if (crypto_aead_get_flags(aead) & CRYPTO_TFM_NEED_KEY) |
|---|
| 109 | + ret = -ENOKEY; |
|---|
| 110 | + else if (req->cryptlen < crypto_aead_authsize(aead)) |
|---|
| 111 | + ret = -EINVAL; |
|---|
| 112 | + else |
|---|
| 113 | + ret = crypto_aead_alg(aead)->decrypt(req); |
|---|
| 114 | + crypto_stats_aead_decrypt(cryptlen, alg, ret); |
|---|
| 115 | + return ret; |
|---|
| 116 | +} |
|---|
| 117 | +EXPORT_SYMBOL_GPL(crypto_aead_decrypt); |
|---|
| 91 | 118 | |
|---|
| 92 | 119 | static void crypto_aead_exit_tfm(struct crypto_tfm *tfm) |
|---|
| 93 | 120 | { |
|---|
| .. | .. |
|---|
| 121 | 148 | struct crypto_report_aead raead; |
|---|
| 122 | 149 | struct aead_alg *aead = container_of(alg, struct aead_alg, base); |
|---|
| 123 | 150 | |
|---|
| 124 | | - strncpy(raead.type, "aead", sizeof(raead.type)); |
|---|
| 125 | | - strncpy(raead.geniv, "<none>", sizeof(raead.geniv)); |
|---|
| 151 | + memset(&raead, 0, sizeof(raead)); |
|---|
| 152 | + |
|---|
| 153 | + strscpy(raead.type, "aead", sizeof(raead.type)); |
|---|
| 154 | + strscpy(raead.geniv, "<none>", sizeof(raead.geniv)); |
|---|
| 126 | 155 | |
|---|
| 127 | 156 | raead.blocksize = alg->cra_blocksize; |
|---|
| 128 | 157 | raead.maxauthsize = aead->maxauthsize; |
|---|
| 129 | 158 | raead.ivsize = aead->ivsize; |
|---|
| 130 | 159 | |
|---|
| 131 | | - if (nla_put(skb, CRYPTOCFGA_REPORT_AEAD, |
|---|
| 132 | | - sizeof(struct crypto_report_aead), &raead)) |
|---|
| 133 | | - goto nla_put_failure; |
|---|
| 134 | | - return 0; |
|---|
| 135 | | - |
|---|
| 136 | | -nla_put_failure: |
|---|
| 137 | | - return -EMSGSIZE; |
|---|
| 160 | + return nla_put(skb, CRYPTOCFGA_REPORT_AEAD, sizeof(raead), &raead); |
|---|
| 138 | 161 | } |
|---|
| 139 | 162 | #else |
|---|
| 140 | 163 | static int crypto_aead_report(struct sk_buff *skb, struct crypto_alg *alg) |
|---|
| .. | .. |
|---|
| 162 | 185 | { |
|---|
| 163 | 186 | struct aead_instance *aead = aead_instance(inst); |
|---|
| 164 | 187 | |
|---|
| 165 | | - if (!aead->free) { |
|---|
| 166 | | - inst->tmpl->free(inst); |
|---|
| 167 | | - return; |
|---|
| 168 | | - } |
|---|
| 169 | | - |
|---|
| 170 | 188 | aead->free(aead); |
|---|
| 171 | 189 | } |
|---|
| 172 | 190 | |
|---|
| .. | .. |
|---|
| 184 | 202 | .tfmsize = offsetof(struct crypto_aead, base), |
|---|
| 185 | 203 | }; |
|---|
| 186 | 204 | |
|---|
| 187 | | -static int aead_geniv_setkey(struct crypto_aead *tfm, |
|---|
| 188 | | - const u8 *key, unsigned int keylen) |
|---|
| 189 | | -{ |
|---|
| 190 | | - struct aead_geniv_ctx *ctx = crypto_aead_ctx(tfm); |
|---|
| 191 | | - |
|---|
| 192 | | - return crypto_aead_setkey(ctx->child, key, keylen); |
|---|
| 193 | | -} |
|---|
| 194 | | - |
|---|
| 195 | | -static int aead_geniv_setauthsize(struct crypto_aead *tfm, |
|---|
| 196 | | - unsigned int authsize) |
|---|
| 197 | | -{ |
|---|
| 198 | | - struct aead_geniv_ctx *ctx = crypto_aead_ctx(tfm); |
|---|
| 199 | | - |
|---|
| 200 | | - return crypto_aead_setauthsize(ctx->child, authsize); |
|---|
| 201 | | -} |
|---|
| 202 | | - |
|---|
| 203 | | -struct aead_instance *aead_geniv_alloc(struct crypto_template *tmpl, |
|---|
| 204 | | - struct rtattr **tb, u32 type, u32 mask) |
|---|
| 205 | | -{ |
|---|
| 206 | | - const char *name; |
|---|
| 207 | | - struct crypto_aead_spawn *spawn; |
|---|
| 208 | | - struct crypto_attr_type *algt; |
|---|
| 209 | | - struct aead_instance *inst; |
|---|
| 210 | | - struct aead_alg *alg; |
|---|
| 211 | | - unsigned int ivsize; |
|---|
| 212 | | - unsigned int maxauthsize; |
|---|
| 213 | | - int err; |
|---|
| 214 | | - |
|---|
| 215 | | - algt = crypto_get_attr_type(tb); |
|---|
| 216 | | - if (IS_ERR(algt)) |
|---|
| 217 | | - return ERR_CAST(algt); |
|---|
| 218 | | - |
|---|
| 219 | | - if ((algt->type ^ CRYPTO_ALG_TYPE_AEAD) & algt->mask) |
|---|
| 220 | | - return ERR_PTR(-EINVAL); |
|---|
| 221 | | - |
|---|
| 222 | | - name = crypto_attr_alg_name(tb[1]); |
|---|
| 223 | | - if (IS_ERR(name)) |
|---|
| 224 | | - return ERR_CAST(name); |
|---|
| 225 | | - |
|---|
| 226 | | - inst = kzalloc(sizeof(*inst) + sizeof(*spawn), GFP_KERNEL); |
|---|
| 227 | | - if (!inst) |
|---|
| 228 | | - return ERR_PTR(-ENOMEM); |
|---|
| 229 | | - |
|---|
| 230 | | - spawn = aead_instance_ctx(inst); |
|---|
| 231 | | - |
|---|
| 232 | | - /* Ignore async algorithms if necessary. */ |
|---|
| 233 | | - mask |= crypto_requires_sync(algt->type, algt->mask); |
|---|
| 234 | | - |
|---|
| 235 | | - crypto_set_aead_spawn(spawn, aead_crypto_instance(inst)); |
|---|
| 236 | | - err = crypto_grab_aead(spawn, name, type, mask); |
|---|
| 237 | | - if (err) |
|---|
| 238 | | - goto err_free_inst; |
|---|
| 239 | | - |
|---|
| 240 | | - alg = crypto_spawn_aead_alg(spawn); |
|---|
| 241 | | - |
|---|
| 242 | | - ivsize = crypto_aead_alg_ivsize(alg); |
|---|
| 243 | | - maxauthsize = crypto_aead_alg_maxauthsize(alg); |
|---|
| 244 | | - |
|---|
| 245 | | - err = -EINVAL; |
|---|
| 246 | | - if (ivsize < sizeof(u64)) |
|---|
| 247 | | - goto err_drop_alg; |
|---|
| 248 | | - |
|---|
| 249 | | - err = -ENAMETOOLONG; |
|---|
| 250 | | - if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME, |
|---|
| 251 | | - "%s(%s)", tmpl->name, alg->base.cra_name) >= |
|---|
| 252 | | - CRYPTO_MAX_ALG_NAME) |
|---|
| 253 | | - goto err_drop_alg; |
|---|
| 254 | | - if (snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME, |
|---|
| 255 | | - "%s(%s)", tmpl->name, alg->base.cra_driver_name) >= |
|---|
| 256 | | - CRYPTO_MAX_ALG_NAME) |
|---|
| 257 | | - goto err_drop_alg; |
|---|
| 258 | | - |
|---|
| 259 | | - inst->alg.base.cra_flags = alg->base.cra_flags & CRYPTO_ALG_ASYNC; |
|---|
| 260 | | - inst->alg.base.cra_priority = alg->base.cra_priority; |
|---|
| 261 | | - inst->alg.base.cra_blocksize = alg->base.cra_blocksize; |
|---|
| 262 | | - inst->alg.base.cra_alignmask = alg->base.cra_alignmask; |
|---|
| 263 | | - inst->alg.base.cra_ctxsize = sizeof(struct aead_geniv_ctx); |
|---|
| 264 | | - |
|---|
| 265 | | - inst->alg.setkey = aead_geniv_setkey; |
|---|
| 266 | | - inst->alg.setauthsize = aead_geniv_setauthsize; |
|---|
| 267 | | - |
|---|
| 268 | | - inst->alg.ivsize = ivsize; |
|---|
| 269 | | - inst->alg.maxauthsize = maxauthsize; |
|---|
| 270 | | - |
|---|
| 271 | | -out: |
|---|
| 272 | | - return inst; |
|---|
| 273 | | - |
|---|
| 274 | | -err_drop_alg: |
|---|
| 275 | | - crypto_drop_aead(spawn); |
|---|
| 276 | | -err_free_inst: |
|---|
| 277 | | - kfree(inst); |
|---|
| 278 | | - inst = ERR_PTR(err); |
|---|
| 279 | | - goto out; |
|---|
| 280 | | -} |
|---|
| 281 | | -EXPORT_SYMBOL_GPL(aead_geniv_alloc); |
|---|
| 282 | | - |
|---|
| 283 | | -void aead_geniv_free(struct aead_instance *inst) |
|---|
| 284 | | -{ |
|---|
| 285 | | - crypto_drop_aead(aead_instance_ctx(inst)); |
|---|
| 286 | | - kfree(inst); |
|---|
| 287 | | -} |
|---|
| 288 | | -EXPORT_SYMBOL_GPL(aead_geniv_free); |
|---|
| 289 | | - |
|---|
| 290 | | -int aead_init_geniv(struct crypto_aead *aead) |
|---|
| 291 | | -{ |
|---|
| 292 | | - struct aead_geniv_ctx *ctx = crypto_aead_ctx(aead); |
|---|
| 293 | | - struct aead_instance *inst = aead_alg_instance(aead); |
|---|
| 294 | | - struct crypto_aead *child; |
|---|
| 295 | | - int err; |
|---|
| 296 | | - |
|---|
| 297 | | - spin_lock_init(&ctx->lock); |
|---|
| 298 | | - |
|---|
| 299 | | - err = crypto_get_default_rng(); |
|---|
| 300 | | - if (err) |
|---|
| 301 | | - goto out; |
|---|
| 302 | | - |
|---|
| 303 | | - err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt, |
|---|
| 304 | | - crypto_aead_ivsize(aead)); |
|---|
| 305 | | - crypto_put_default_rng(); |
|---|
| 306 | | - if (err) |
|---|
| 307 | | - goto out; |
|---|
| 308 | | - |
|---|
| 309 | | - ctx->sknull = crypto_get_default_null_skcipher(); |
|---|
| 310 | | - err = PTR_ERR(ctx->sknull); |
|---|
| 311 | | - if (IS_ERR(ctx->sknull)) |
|---|
| 312 | | - goto out; |
|---|
| 313 | | - |
|---|
| 314 | | - child = crypto_spawn_aead(aead_instance_ctx(inst)); |
|---|
| 315 | | - err = PTR_ERR(child); |
|---|
| 316 | | - if (IS_ERR(child)) |
|---|
| 317 | | - goto drop_null; |
|---|
| 318 | | - |
|---|
| 319 | | - ctx->child = child; |
|---|
| 320 | | - crypto_aead_set_reqsize(aead, crypto_aead_reqsize(child) + |
|---|
| 321 | | - sizeof(struct aead_request)); |
|---|
| 322 | | - |
|---|
| 323 | | - err = 0; |
|---|
| 324 | | - |
|---|
| 325 | | -out: |
|---|
| 326 | | - return err; |
|---|
| 327 | | - |
|---|
| 328 | | -drop_null: |
|---|
| 329 | | - crypto_put_default_null_skcipher(); |
|---|
| 330 | | - goto out; |
|---|
| 331 | | -} |
|---|
| 332 | | -EXPORT_SYMBOL_GPL(aead_init_geniv); |
|---|
| 333 | | - |
|---|
| 334 | | -void aead_exit_geniv(struct crypto_aead *tfm) |
|---|
| 335 | | -{ |
|---|
| 336 | | - struct aead_geniv_ctx *ctx = crypto_aead_ctx(tfm); |
|---|
| 337 | | - |
|---|
| 338 | | - crypto_free_aead(ctx->child); |
|---|
| 339 | | - crypto_put_default_null_skcipher(); |
|---|
| 340 | | -} |
|---|
| 341 | | -EXPORT_SYMBOL_GPL(aead_exit_geniv); |
|---|
| 342 | | - |
|---|
| 343 | | -int crypto_grab_aead(struct crypto_aead_spawn *spawn, const char *name, |
|---|
| 344 | | - u32 type, u32 mask) |
|---|
| 205 | +int crypto_grab_aead(struct crypto_aead_spawn *spawn, |
|---|
| 206 | + struct crypto_instance *inst, |
|---|
| 207 | + const char *name, u32 type, u32 mask) |
|---|
| 345 | 208 | { |
|---|
| 346 | 209 | spawn->base.frontend = &crypto_aead_type; |
|---|
| 347 | | - return crypto_grab_spawn(&spawn->base, name, type, mask); |
|---|
| 210 | + return crypto_grab_spawn(&spawn->base, inst, name, type, mask); |
|---|
| 348 | 211 | } |
|---|
| 349 | 212 | EXPORT_SYMBOL_GPL(crypto_grab_aead); |
|---|
| 350 | 213 | |
|---|
| .. | .. |
|---|
| 425 | 288 | { |
|---|
| 426 | 289 | int err; |
|---|
| 427 | 290 | |
|---|
| 291 | + if (WARN_ON(!inst->free)) |
|---|
| 292 | + return -EINVAL; |
|---|
| 293 | + |
|---|
| 428 | 294 | err = aead_prepare_alg(&inst->alg); |
|---|
| 429 | 295 | if (err) |
|---|
| 430 | 296 | return err; |
|---|