.. | .. |
---|
| 1 | +// SPDX-License-Identifier: GPL-2.0-or-later |
---|
1 | 2 | /* |
---|
2 | 3 | * CBC: Cipher Block Chaining mode |
---|
3 | 4 | * |
---|
4 | 5 | * Copyright (c) 2006-2016 Herbert Xu <herbert@gondor.apana.org.au> |
---|
5 | | - * |
---|
6 | | - * This program is free software; you can redistribute it and/or modify it |
---|
7 | | - * under the terms of the GNU General Public License as published by the Free |
---|
8 | | - * Software Foundation; either version 2 of the License, or (at your option) |
---|
9 | | - * any later version. |
---|
10 | | - * |
---|
11 | 6 | */ |
---|
12 | 7 | |
---|
13 | 8 | #include <crypto/algapi.h> |
---|
14 | | -#include <crypto/cbc.h> |
---|
| 9 | +#include <crypto/internal/cipher.h> |
---|
15 | 10 | #include <crypto/internal/skcipher.h> |
---|
16 | 11 | #include <linux/err.h> |
---|
17 | 12 | #include <linux/init.h> |
---|
18 | 13 | #include <linux/kernel.h> |
---|
19 | 14 | #include <linux/log2.h> |
---|
20 | 15 | #include <linux/module.h> |
---|
21 | | -#include <linux/slab.h> |
---|
22 | 16 | |
---|
23 | | -struct crypto_cbc_ctx { |
---|
24 | | - struct crypto_cipher *child; |
---|
25 | | -}; |
---|
26 | | - |
---|
27 | | -static int crypto_cbc_setkey(struct crypto_skcipher *parent, const u8 *key, |
---|
28 | | - unsigned int keylen) |
---|
| 17 | +static int crypto_cbc_encrypt_segment(struct skcipher_walk *walk, |
---|
| 18 | + struct crypto_skcipher *skcipher) |
---|
29 | 19 | { |
---|
30 | | - struct crypto_cbc_ctx *ctx = crypto_skcipher_ctx(parent); |
---|
31 | | - struct crypto_cipher *child = ctx->child; |
---|
32 | | - int err; |
---|
| 20 | + unsigned int bsize = crypto_skcipher_blocksize(skcipher); |
---|
| 21 | + void (*fn)(struct crypto_tfm *, u8 *, const u8 *); |
---|
| 22 | + unsigned int nbytes = walk->nbytes; |
---|
| 23 | + u8 *src = walk->src.virt.addr; |
---|
| 24 | + u8 *dst = walk->dst.virt.addr; |
---|
| 25 | + struct crypto_cipher *cipher; |
---|
| 26 | + struct crypto_tfm *tfm; |
---|
| 27 | + u8 *iv = walk->iv; |
---|
33 | 28 | |
---|
34 | | - crypto_cipher_clear_flags(child, CRYPTO_TFM_REQ_MASK); |
---|
35 | | - crypto_cipher_set_flags(child, crypto_skcipher_get_flags(parent) & |
---|
36 | | - CRYPTO_TFM_REQ_MASK); |
---|
37 | | - err = crypto_cipher_setkey(child, key, keylen); |
---|
38 | | - crypto_skcipher_set_flags(parent, crypto_cipher_get_flags(child) & |
---|
39 | | - CRYPTO_TFM_RES_MASK); |
---|
40 | | - return err; |
---|
| 29 | + cipher = skcipher_cipher_simple(skcipher); |
---|
| 30 | + tfm = crypto_cipher_tfm(cipher); |
---|
| 31 | + fn = crypto_cipher_alg(cipher)->cia_encrypt; |
---|
| 32 | + |
---|
| 33 | + do { |
---|
| 34 | + crypto_xor(iv, src, bsize); |
---|
| 35 | + fn(tfm, dst, iv); |
---|
| 36 | + memcpy(iv, dst, bsize); |
---|
| 37 | + |
---|
| 38 | + src += bsize; |
---|
| 39 | + dst += bsize; |
---|
| 40 | + } while ((nbytes -= bsize) >= bsize); |
---|
| 41 | + |
---|
| 42 | + return nbytes; |
---|
41 | 43 | } |
---|
42 | 44 | |
---|
43 | | -static inline void crypto_cbc_encrypt_one(struct crypto_skcipher *tfm, |
---|
44 | | - const u8 *src, u8 *dst) |
---|
| 45 | +static int crypto_cbc_encrypt_inplace(struct skcipher_walk *walk, |
---|
| 46 | + struct crypto_skcipher *skcipher) |
---|
45 | 47 | { |
---|
46 | | - struct crypto_cbc_ctx *ctx = crypto_skcipher_ctx(tfm); |
---|
| 48 | + unsigned int bsize = crypto_skcipher_blocksize(skcipher); |
---|
| 49 | + void (*fn)(struct crypto_tfm *, u8 *, const u8 *); |
---|
| 50 | + unsigned int nbytes = walk->nbytes; |
---|
| 51 | + u8 *src = walk->src.virt.addr; |
---|
| 52 | + struct crypto_cipher *cipher; |
---|
| 53 | + struct crypto_tfm *tfm; |
---|
| 54 | + u8 *iv = walk->iv; |
---|
47 | 55 | |
---|
48 | | - crypto_cipher_encrypt_one(ctx->child, dst, src); |
---|
| 56 | + cipher = skcipher_cipher_simple(skcipher); |
---|
| 57 | + tfm = crypto_cipher_tfm(cipher); |
---|
| 58 | + fn = crypto_cipher_alg(cipher)->cia_encrypt; |
---|
| 59 | + |
---|
| 60 | + do { |
---|
| 61 | + crypto_xor(src, iv, bsize); |
---|
| 62 | + fn(tfm, src, src); |
---|
| 63 | + iv = src; |
---|
| 64 | + |
---|
| 65 | + src += bsize; |
---|
| 66 | + } while ((nbytes -= bsize) >= bsize); |
---|
| 67 | + |
---|
| 68 | + memcpy(walk->iv, iv, bsize); |
---|
| 69 | + |
---|
| 70 | + return nbytes; |
---|
49 | 71 | } |
---|
50 | 72 | |
---|
51 | 73 | static int crypto_cbc_encrypt(struct skcipher_request *req) |
---|
52 | 74 | { |
---|
53 | | - return crypto_cbc_encrypt_walk(req, crypto_cbc_encrypt_one); |
---|
54 | | -} |
---|
55 | | - |
---|
56 | | -static inline void crypto_cbc_decrypt_one(struct crypto_skcipher *tfm, |
---|
57 | | - const u8 *src, u8 *dst) |
---|
58 | | -{ |
---|
59 | | - struct crypto_cbc_ctx *ctx = crypto_skcipher_ctx(tfm); |
---|
60 | | - |
---|
61 | | - crypto_cipher_decrypt_one(ctx->child, dst, src); |
---|
62 | | -} |
---|
63 | | - |
---|
64 | | -static int crypto_cbc_decrypt(struct skcipher_request *req) |
---|
65 | | -{ |
---|
66 | | - struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); |
---|
| 75 | + struct crypto_skcipher *skcipher = crypto_skcipher_reqtfm(req); |
---|
67 | 76 | struct skcipher_walk walk; |
---|
68 | 77 | int err; |
---|
69 | 78 | |
---|
70 | 79 | err = skcipher_walk_virt(&walk, req, false); |
---|
71 | 80 | |
---|
72 | 81 | while (walk.nbytes) { |
---|
73 | | - err = crypto_cbc_decrypt_blocks(&walk, tfm, |
---|
74 | | - crypto_cbc_decrypt_one); |
---|
| 82 | + if (walk.src.virt.addr == walk.dst.virt.addr) |
---|
| 83 | + err = crypto_cbc_encrypt_inplace(&walk, skcipher); |
---|
| 84 | + else |
---|
| 85 | + err = crypto_cbc_encrypt_segment(&walk, skcipher); |
---|
75 | 86 | err = skcipher_walk_done(&walk, err); |
---|
76 | 87 | } |
---|
77 | 88 | |
---|
78 | 89 | return err; |
---|
79 | 90 | } |
---|
80 | 91 | |
---|
81 | | -static int crypto_cbc_init_tfm(struct crypto_skcipher *tfm) |
---|
| 92 | +static int crypto_cbc_decrypt_segment(struct skcipher_walk *walk, |
---|
| 93 | + struct crypto_skcipher *skcipher) |
---|
82 | 94 | { |
---|
83 | | - struct skcipher_instance *inst = skcipher_alg_instance(tfm); |
---|
84 | | - struct crypto_spawn *spawn = skcipher_instance_ctx(inst); |
---|
85 | | - struct crypto_cbc_ctx *ctx = crypto_skcipher_ctx(tfm); |
---|
| 95 | + unsigned int bsize = crypto_skcipher_blocksize(skcipher); |
---|
| 96 | + void (*fn)(struct crypto_tfm *, u8 *, const u8 *); |
---|
| 97 | + unsigned int nbytes = walk->nbytes; |
---|
| 98 | + u8 *src = walk->src.virt.addr; |
---|
| 99 | + u8 *dst = walk->dst.virt.addr; |
---|
86 | 100 | struct crypto_cipher *cipher; |
---|
| 101 | + struct crypto_tfm *tfm; |
---|
| 102 | + u8 *iv = walk->iv; |
---|
87 | 103 | |
---|
88 | | - cipher = crypto_spawn_cipher(spawn); |
---|
89 | | - if (IS_ERR(cipher)) |
---|
90 | | - return PTR_ERR(cipher); |
---|
| 104 | + cipher = skcipher_cipher_simple(skcipher); |
---|
| 105 | + tfm = crypto_cipher_tfm(cipher); |
---|
| 106 | + fn = crypto_cipher_alg(cipher)->cia_decrypt; |
---|
91 | 107 | |
---|
92 | | - ctx->child = cipher; |
---|
93 | | - return 0; |
---|
| 108 | + do { |
---|
| 109 | + fn(tfm, dst, src); |
---|
| 110 | + crypto_xor(dst, iv, bsize); |
---|
| 111 | + iv = src; |
---|
| 112 | + |
---|
| 113 | + src += bsize; |
---|
| 114 | + dst += bsize; |
---|
| 115 | + } while ((nbytes -= bsize) >= bsize); |
---|
| 116 | + |
---|
| 117 | + memcpy(walk->iv, iv, bsize); |
---|
| 118 | + |
---|
| 119 | + return nbytes; |
---|
94 | 120 | } |
---|
95 | 121 | |
---|
96 | | -static void crypto_cbc_exit_tfm(struct crypto_skcipher *tfm) |
---|
| 122 | +static int crypto_cbc_decrypt_inplace(struct skcipher_walk *walk, |
---|
| 123 | + struct crypto_skcipher *skcipher) |
---|
97 | 124 | { |
---|
98 | | - struct crypto_cbc_ctx *ctx = crypto_skcipher_ctx(tfm); |
---|
| 125 | + unsigned int bsize = crypto_skcipher_blocksize(skcipher); |
---|
| 126 | + void (*fn)(struct crypto_tfm *, u8 *, const u8 *); |
---|
| 127 | + unsigned int nbytes = walk->nbytes; |
---|
| 128 | + u8 *src = walk->src.virt.addr; |
---|
| 129 | + u8 last_iv[MAX_CIPHER_BLOCKSIZE]; |
---|
| 130 | + struct crypto_cipher *cipher; |
---|
| 131 | + struct crypto_tfm *tfm; |
---|
99 | 132 | |
---|
100 | | - crypto_free_cipher(ctx->child); |
---|
| 133 | + cipher = skcipher_cipher_simple(skcipher); |
---|
| 134 | + tfm = crypto_cipher_tfm(cipher); |
---|
| 135 | + fn = crypto_cipher_alg(cipher)->cia_decrypt; |
---|
| 136 | + |
---|
| 137 | + /* Start of the last block. */ |
---|
| 138 | + src += nbytes - (nbytes & (bsize - 1)) - bsize; |
---|
| 139 | + memcpy(last_iv, src, bsize); |
---|
| 140 | + |
---|
| 141 | + for (;;) { |
---|
| 142 | + fn(tfm, src, src); |
---|
| 143 | + if ((nbytes -= bsize) < bsize) |
---|
| 144 | + break; |
---|
| 145 | + crypto_xor(src, src - bsize, bsize); |
---|
| 146 | + src -= bsize; |
---|
| 147 | + } |
---|
| 148 | + |
---|
| 149 | + crypto_xor(src, walk->iv, bsize); |
---|
| 150 | + memcpy(walk->iv, last_iv, bsize); |
---|
| 151 | + |
---|
| 152 | + return nbytes; |
---|
101 | 153 | } |
---|
102 | 154 | |
---|
103 | | -static void crypto_cbc_free(struct skcipher_instance *inst) |
---|
| 155 | +static int crypto_cbc_decrypt(struct skcipher_request *req) |
---|
104 | 156 | { |
---|
105 | | - crypto_drop_skcipher(skcipher_instance_ctx(inst)); |
---|
106 | | - kfree(inst); |
---|
| 157 | + struct crypto_skcipher *skcipher = crypto_skcipher_reqtfm(req); |
---|
| 158 | + struct skcipher_walk walk; |
---|
| 159 | + int err; |
---|
| 160 | + |
---|
| 161 | + err = skcipher_walk_virt(&walk, req, false); |
---|
| 162 | + |
---|
| 163 | + while (walk.nbytes) { |
---|
| 164 | + if (walk.src.virt.addr == walk.dst.virt.addr) |
---|
| 165 | + err = crypto_cbc_decrypt_inplace(&walk, skcipher); |
---|
| 166 | + else |
---|
| 167 | + err = crypto_cbc_decrypt_segment(&walk, skcipher); |
---|
| 168 | + err = skcipher_walk_done(&walk, err); |
---|
| 169 | + } |
---|
| 170 | + |
---|
| 171 | + return err; |
---|
107 | 172 | } |
---|
108 | 173 | |
---|
109 | 174 | static int crypto_cbc_create(struct crypto_template *tmpl, struct rtattr **tb) |
---|
110 | 175 | { |
---|
111 | 176 | struct skcipher_instance *inst; |
---|
112 | | - struct crypto_attr_type *algt; |
---|
113 | | - struct crypto_spawn *spawn; |
---|
114 | 177 | struct crypto_alg *alg; |
---|
115 | | - u32 mask; |
---|
116 | 178 | int err; |
---|
117 | 179 | |
---|
118 | | - err = crypto_check_attr_type(tb, CRYPTO_ALG_TYPE_SKCIPHER); |
---|
119 | | - if (err) |
---|
120 | | - return err; |
---|
| 180 | + inst = skcipher_alloc_instance_simple(tmpl, tb); |
---|
| 181 | + if (IS_ERR(inst)) |
---|
| 182 | + return PTR_ERR(inst); |
---|
121 | 183 | |
---|
122 | | - inst = kzalloc(sizeof(*inst) + sizeof(*spawn), GFP_KERNEL); |
---|
123 | | - if (!inst) |
---|
124 | | - return -ENOMEM; |
---|
125 | | - |
---|
126 | | - algt = crypto_get_attr_type(tb); |
---|
127 | | - err = PTR_ERR(algt); |
---|
128 | | - if (IS_ERR(algt)) |
---|
129 | | - goto err_free_inst; |
---|
130 | | - |
---|
131 | | - mask = CRYPTO_ALG_TYPE_MASK | |
---|
132 | | - crypto_requires_off(algt->type, algt->mask, |
---|
133 | | - CRYPTO_ALG_NEED_FALLBACK); |
---|
134 | | - |
---|
135 | | - alg = crypto_get_attr_alg(tb, CRYPTO_ALG_TYPE_CIPHER, mask); |
---|
136 | | - err = PTR_ERR(alg); |
---|
137 | | - if (IS_ERR(alg)) |
---|
138 | | - goto err_free_inst; |
---|
139 | | - |
---|
140 | | - spawn = skcipher_instance_ctx(inst); |
---|
141 | | - err = crypto_init_spawn(spawn, alg, skcipher_crypto_instance(inst), |
---|
142 | | - CRYPTO_ALG_TYPE_MASK); |
---|
143 | | - if (err) |
---|
144 | | - goto err_put_alg; |
---|
145 | | - |
---|
146 | | - err = crypto_inst_setname(skcipher_crypto_instance(inst), "cbc", alg); |
---|
147 | | - if (err) |
---|
148 | | - goto err_drop_spawn; |
---|
| 184 | + alg = skcipher_ialg_simple(inst); |
---|
149 | 185 | |
---|
150 | 186 | err = -EINVAL; |
---|
151 | 187 | if (!is_power_of_2(alg->cra_blocksize)) |
---|
152 | | - goto err_drop_spawn; |
---|
| 188 | + goto out_free_inst; |
---|
153 | 189 | |
---|
154 | | - inst->alg.base.cra_priority = alg->cra_priority; |
---|
155 | | - inst->alg.base.cra_blocksize = alg->cra_blocksize; |
---|
156 | | - inst->alg.base.cra_alignmask = alg->cra_alignmask; |
---|
157 | | - |
---|
158 | | - inst->alg.ivsize = alg->cra_blocksize; |
---|
159 | | - inst->alg.min_keysize = alg->cra_cipher.cia_min_keysize; |
---|
160 | | - inst->alg.max_keysize = alg->cra_cipher.cia_max_keysize; |
---|
161 | | - |
---|
162 | | - inst->alg.base.cra_ctxsize = sizeof(struct crypto_cbc_ctx); |
---|
163 | | - |
---|
164 | | - inst->alg.init = crypto_cbc_init_tfm; |
---|
165 | | - inst->alg.exit = crypto_cbc_exit_tfm; |
---|
166 | | - |
---|
167 | | - inst->alg.setkey = crypto_cbc_setkey; |
---|
168 | 190 | inst->alg.encrypt = crypto_cbc_encrypt; |
---|
169 | 191 | inst->alg.decrypt = crypto_cbc_decrypt; |
---|
170 | 192 | |
---|
171 | | - inst->free = crypto_cbc_free; |
---|
172 | | - |
---|
173 | 193 | err = skcipher_register_instance(tmpl, inst); |
---|
174 | | - if (err) |
---|
175 | | - goto err_drop_spawn; |
---|
176 | | - crypto_mod_put(alg); |
---|
| 194 | + if (err) { |
---|
| 195 | +out_free_inst: |
---|
| 196 | + inst->free(inst); |
---|
| 197 | + } |
---|
177 | 198 | |
---|
178 | | -out: |
---|
179 | 199 | return err; |
---|
180 | | - |
---|
181 | | -err_drop_spawn: |
---|
182 | | - crypto_drop_spawn(spawn); |
---|
183 | | -err_put_alg: |
---|
184 | | - crypto_mod_put(alg); |
---|
185 | | -err_free_inst: |
---|
186 | | - kfree(inst); |
---|
187 | | - goto out; |
---|
188 | 200 | } |
---|
189 | 201 | |
---|
190 | 202 | static struct crypto_template crypto_cbc_tmpl = { |
---|
.. | .. |
---|
203 | 215 | crypto_unregister_template(&crypto_cbc_tmpl); |
---|
204 | 216 | } |
---|
205 | 217 | |
---|
206 | | -module_init(crypto_cbc_module_init); |
---|
| 218 | +subsys_initcall(crypto_cbc_module_init); |
---|
207 | 219 | module_exit(crypto_cbc_module_exit); |
---|
208 | 220 | |
---|
209 | 221 | MODULE_LICENSE("GPL"); |
---|
210 | | -MODULE_DESCRIPTION("CBC block cipher algorithm"); |
---|
| 222 | +MODULE_DESCRIPTION("CBC block cipher mode of operation"); |
---|
211 | 223 | MODULE_ALIAS_CRYPTO("cbc"); |
---|