mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-11-24 11:30:53 +07:00
cd900f0cac
Initializing a crypto_aead_spawn currently requires:
1. Set spawn->base.inst to point to the instance.
2. Call crypto_grab_aead().
But there's no reason for these steps to be separate, and in fact this
unneeded complication has caused at least one bug, the one fixed by
commit 6db4341017
("crypto: adiantum - initialize crypto_spawn::inst")
So just make crypto_grab_aead() take the instance as an argument.
To keep the function calls from getting too unwieldy due to this extra
argument, also introduce a 'mask' variable into the affected places
which weren't already using one.
Signed-off-by: Eric Biggers <ebiggers@google.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
177 lines
4.2 KiB
C
177 lines
4.2 KiB
C
// SPDX-License-Identifier: GPL-2.0-or-later
|
|
/*
|
|
* geniv: Shared IV generator code
|
|
*
|
|
* This file provides common code to IV generators such as seqiv.
|
|
*
|
|
* Copyright (c) 2007-2019 Herbert Xu <herbert@gondor.apana.org.au>
|
|
*/
|
|
|
|
#include <crypto/internal/geniv.h>
|
|
#include <crypto/internal/rng.h>
|
|
#include <crypto/null.h>
|
|
#include <linux/err.h>
|
|
#include <linux/kernel.h>
|
|
#include <linux/module.h>
|
|
#include <linux/rtnetlink.h>
|
|
#include <linux/slab.h>
|
|
|
|
static int aead_geniv_setkey(struct crypto_aead *tfm,
|
|
const u8 *key, unsigned int keylen)
|
|
{
|
|
struct aead_geniv_ctx *ctx = crypto_aead_ctx(tfm);
|
|
|
|
return crypto_aead_setkey(ctx->child, key, keylen);
|
|
}
|
|
|
|
static int aead_geniv_setauthsize(struct crypto_aead *tfm,
|
|
unsigned int authsize)
|
|
{
|
|
struct aead_geniv_ctx *ctx = crypto_aead_ctx(tfm);
|
|
|
|
return crypto_aead_setauthsize(ctx->child, authsize);
|
|
}
|
|
|
|
struct aead_instance *aead_geniv_alloc(struct crypto_template *tmpl,
|
|
struct rtattr **tb, u32 type, u32 mask)
|
|
{
|
|
const char *name;
|
|
struct crypto_aead_spawn *spawn;
|
|
struct crypto_attr_type *algt;
|
|
struct aead_instance *inst;
|
|
struct aead_alg *alg;
|
|
unsigned int ivsize;
|
|
unsigned int maxauthsize;
|
|
int err;
|
|
|
|
algt = crypto_get_attr_type(tb);
|
|
if (IS_ERR(algt))
|
|
return ERR_CAST(algt);
|
|
|
|
if ((algt->type ^ CRYPTO_ALG_TYPE_AEAD) & algt->mask)
|
|
return ERR_PTR(-EINVAL);
|
|
|
|
name = crypto_attr_alg_name(tb[1]);
|
|
if (IS_ERR(name))
|
|
return ERR_CAST(name);
|
|
|
|
inst = kzalloc(sizeof(*inst) + sizeof(*spawn), GFP_KERNEL);
|
|
if (!inst)
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
spawn = aead_instance_ctx(inst);
|
|
|
|
/* Ignore async algorithms if necessary. */
|
|
mask |= crypto_requires_sync(algt->type, algt->mask);
|
|
|
|
err = crypto_grab_aead(spawn, aead_crypto_instance(inst),
|
|
name, type, mask);
|
|
if (err)
|
|
goto err_free_inst;
|
|
|
|
alg = crypto_spawn_aead_alg(spawn);
|
|
|
|
ivsize = crypto_aead_alg_ivsize(alg);
|
|
maxauthsize = crypto_aead_alg_maxauthsize(alg);
|
|
|
|
err = -EINVAL;
|
|
if (ivsize < sizeof(u64))
|
|
goto err_drop_alg;
|
|
|
|
err = -ENAMETOOLONG;
|
|
if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME,
|
|
"%s(%s)", tmpl->name, alg->base.cra_name) >=
|
|
CRYPTO_MAX_ALG_NAME)
|
|
goto err_drop_alg;
|
|
if (snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME,
|
|
"%s(%s)", tmpl->name, alg->base.cra_driver_name) >=
|
|
CRYPTO_MAX_ALG_NAME)
|
|
goto err_drop_alg;
|
|
|
|
inst->alg.base.cra_flags = alg->base.cra_flags & CRYPTO_ALG_ASYNC;
|
|
inst->alg.base.cra_priority = alg->base.cra_priority;
|
|
inst->alg.base.cra_blocksize = alg->base.cra_blocksize;
|
|
inst->alg.base.cra_alignmask = alg->base.cra_alignmask;
|
|
inst->alg.base.cra_ctxsize = sizeof(struct aead_geniv_ctx);
|
|
|
|
inst->alg.setkey = aead_geniv_setkey;
|
|
inst->alg.setauthsize = aead_geniv_setauthsize;
|
|
|
|
inst->alg.ivsize = ivsize;
|
|
inst->alg.maxauthsize = maxauthsize;
|
|
|
|
out:
|
|
return inst;
|
|
|
|
err_drop_alg:
|
|
crypto_drop_aead(spawn);
|
|
err_free_inst:
|
|
kfree(inst);
|
|
inst = ERR_PTR(err);
|
|
goto out;
|
|
}
|
|
EXPORT_SYMBOL_GPL(aead_geniv_alloc);
|
|
|
|
void aead_geniv_free(struct aead_instance *inst)
|
|
{
|
|
crypto_drop_aead(aead_instance_ctx(inst));
|
|
kfree(inst);
|
|
}
|
|
EXPORT_SYMBOL_GPL(aead_geniv_free);
|
|
|
|
int aead_init_geniv(struct crypto_aead *aead)
|
|
{
|
|
struct aead_geniv_ctx *ctx = crypto_aead_ctx(aead);
|
|
struct aead_instance *inst = aead_alg_instance(aead);
|
|
struct crypto_aead *child;
|
|
int err;
|
|
|
|
spin_lock_init(&ctx->lock);
|
|
|
|
err = crypto_get_default_rng();
|
|
if (err)
|
|
goto out;
|
|
|
|
err = crypto_rng_get_bytes(crypto_default_rng, ctx->salt,
|
|
crypto_aead_ivsize(aead));
|
|
crypto_put_default_rng();
|
|
if (err)
|
|
goto out;
|
|
|
|
ctx->sknull = crypto_get_default_null_skcipher();
|
|
err = PTR_ERR(ctx->sknull);
|
|
if (IS_ERR(ctx->sknull))
|
|
goto out;
|
|
|
|
child = crypto_spawn_aead(aead_instance_ctx(inst));
|
|
err = PTR_ERR(child);
|
|
if (IS_ERR(child))
|
|
goto drop_null;
|
|
|
|
ctx->child = child;
|
|
crypto_aead_set_reqsize(aead, crypto_aead_reqsize(child) +
|
|
sizeof(struct aead_request));
|
|
|
|
err = 0;
|
|
|
|
out:
|
|
return err;
|
|
|
|
drop_null:
|
|
crypto_put_default_null_skcipher();
|
|
goto out;
|
|
}
|
|
EXPORT_SYMBOL_GPL(aead_init_geniv);
|
|
|
|
void aead_exit_geniv(struct crypto_aead *tfm)
|
|
{
|
|
struct aead_geniv_ctx *ctx = crypto_aead_ctx(tfm);
|
|
|
|
crypto_free_aead(ctx->child);
|
|
crypto_put_default_null_skcipher();
|
|
}
|
|
EXPORT_SYMBOL_GPL(aead_exit_geniv);
|
|
|
|
MODULE_LICENSE("GPL");
|
|
MODULE_DESCRIPTION("Shared IV generator code");
|