2006-08-21 19:08:13 +08:00
|
|
|
/*
|
|
|
|
* Cryptographic API for algorithms (i.e., low-level API).
|
|
|
|
*
|
|
|
|
* Copyright (c) 2006 Herbert Xu <herbert@gondor.apana.org.au>
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
|
|
* under the terms of the GNU General Public License as published by the Free
|
|
|
|
* Software Foundation; either version 2 of the License, or (at your option)
|
|
|
|
* any later version.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
#ifndef _CRYPTO_ALGAPI_H
|
|
|
|
#define _CRYPTO_ALGAPI_H
|
|
|
|
|
|
|
|
#include <linux/crypto.h>
|
2007-04-16 18:48:54 +08:00
|
|
|
#include <linux/list.h>
|
|
|
|
#include <linux/kernel.h>
|
2006-08-21 19:08:13 +08:00
|
|
|
|
2006-08-06 19:16:34 +08:00
|
|
|
struct module;
|
2007-01-01 15:37:02 +08:00
|
|
|
struct rtattr;
|
2006-08-21 22:06:54 +08:00
|
|
|
struct seq_file;
|
|
|
|
|
|
|
|
struct crypto_type {
|
2007-01-24 17:50:26 +08:00
|
|
|
unsigned int (*ctxsize)(struct crypto_alg *alg, u32 type, u32 mask);
|
|
|
|
int (*init)(struct crypto_tfm *tfm, u32 type, u32 mask);
|
2006-08-21 22:06:54 +08:00
|
|
|
void (*exit)(struct crypto_tfm *tfm);
|
|
|
|
void (*show)(struct seq_file *m, struct crypto_alg *alg);
|
|
|
|
};
|
2006-08-06 19:16:34 +08:00
|
|
|
|
|
|
|
struct crypto_instance {
|
|
|
|
struct crypto_alg alg;
|
|
|
|
|
|
|
|
struct crypto_template *tmpl;
|
|
|
|
struct hlist_node list;
|
|
|
|
|
|
|
|
void *__ctx[] CRYPTO_MINALIGN_ATTR;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct crypto_template {
|
|
|
|
struct list_head list;
|
|
|
|
struct hlist_head instances;
|
|
|
|
struct module *module;
|
|
|
|
|
2007-01-01 15:37:02 +08:00
|
|
|
struct crypto_instance *(*alloc)(struct rtattr **tb);
|
2006-08-06 19:16:34 +08:00
|
|
|
void (*free)(struct crypto_instance *inst);
|
|
|
|
|
|
|
|
char name[CRYPTO_MAX_ALG_NAME];
|
|
|
|
};
|
|
|
|
|
2006-09-21 09:39:29 +08:00
|
|
|
struct crypto_spawn {
|
|
|
|
struct list_head list;
|
|
|
|
struct crypto_alg *alg;
|
|
|
|
struct crypto_instance *inst;
|
2007-04-08 19:31:36 +08:00
|
|
|
u32 mask;
|
2006-09-21 09:39:29 +08:00
|
|
|
};
|
|
|
|
|
2007-04-16 18:48:54 +08:00
|
|
|
struct crypto_queue {
|
|
|
|
struct list_head list;
|
|
|
|
struct list_head *backlog;
|
|
|
|
|
|
|
|
unsigned int qlen;
|
|
|
|
unsigned int max_qlen;
|
|
|
|
};
|
|
|
|
|
2006-08-12 19:56:17 +08:00
|
|
|
struct scatter_walk {
|
|
|
|
struct scatterlist *sg;
|
|
|
|
unsigned int offset;
|
|
|
|
};
|
|
|
|
|
2006-08-21 22:07:53 +08:00
|
|
|
struct blkcipher_walk {
|
|
|
|
union {
|
|
|
|
struct {
|
|
|
|
struct page *page;
|
|
|
|
unsigned long offset;
|
|
|
|
} phys;
|
|
|
|
|
|
|
|
struct {
|
|
|
|
u8 *page;
|
|
|
|
u8 *addr;
|
|
|
|
} virt;
|
|
|
|
} src, dst;
|
|
|
|
|
|
|
|
struct scatter_walk in;
|
|
|
|
unsigned int nbytes;
|
|
|
|
|
|
|
|
struct scatter_walk out;
|
|
|
|
unsigned int total;
|
|
|
|
|
|
|
|
void *page;
|
|
|
|
u8 *buffer;
|
|
|
|
u8 *iv;
|
|
|
|
|
|
|
|
int flags;
|
2007-10-04 15:24:05 +08:00
|
|
|
unsigned int blocksize;
|
2006-08-21 22:07:53 +08:00
|
|
|
};
|
|
|
|
|
2007-04-16 18:48:54 +08:00
|
|
|
extern const struct crypto_type crypto_ablkcipher_type;
|
2007-08-30 15:36:14 +08:00
|
|
|
extern const struct crypto_type crypto_aead_type;
|
2006-08-21 22:07:53 +08:00
|
|
|
extern const struct crypto_type crypto_blkcipher_type;
|
2006-08-19 20:24:23 +08:00
|
|
|
extern const struct crypto_type crypto_hash_type;
|
2006-08-21 22:07:53 +08:00
|
|
|
|
2006-09-21 09:44:08 +08:00
|
|
|
void crypto_mod_put(struct crypto_alg *alg);
|
|
|
|
|
2006-08-06 19:16:34 +08:00
|
|
|
int crypto_register_template(struct crypto_template *tmpl);
|
|
|
|
void crypto_unregister_template(struct crypto_template *tmpl);
|
|
|
|
struct crypto_template *crypto_lookup_template(const char *name);
|
|
|
|
|
2006-09-21 09:39:29 +08:00
|
|
|
int crypto_init_spawn(struct crypto_spawn *spawn, struct crypto_alg *alg,
|
2007-04-08 19:31:36 +08:00
|
|
|
struct crypto_instance *inst, u32 mask);
|
2006-09-21 09:39:29 +08:00
|
|
|
void crypto_drop_spawn(struct crypto_spawn *spawn);
|
2006-12-17 07:05:58 +08:00
|
|
|
struct crypto_tfm *crypto_spawn_tfm(struct crypto_spawn *spawn, u32 type,
|
|
|
|
u32 mask);
|
2006-09-21 09:39:29 +08:00
|
|
|
|
2007-12-17 20:07:31 +08:00
|
|
|
static inline void crypto_set_spawn(struct crypto_spawn *spawn,
|
|
|
|
struct crypto_instance *inst)
|
|
|
|
{
|
|
|
|
spawn->inst = inst;
|
|
|
|
}
|
|
|
|
|
2007-01-01 15:37:02 +08:00
|
|
|
struct crypto_attr_type *crypto_get_attr_type(struct rtattr **tb);
|
|
|
|
int crypto_check_attr_type(struct rtattr **tb, u32 type);
|
2007-12-07 20:18:17 +08:00
|
|
|
const char *crypto_attr_alg_name(struct rtattr *rta);
|
[CRYPTO] aead: Add authenc
This patch adds the authenc algorithm which constructs an AEAD algorithm
from an asynchronous block cipher and a hash. The construction is done
by concatenating the encrypted result from the cipher with the output
from the hash, as is used by the IPsec ESP protocol.
The authenc algorithm exists as a template with four parameters:
authenc(auth, authsize, enc, enckeylen).
The authentication algorithm, the authentication size (i.e., truncating
the output of the authentication algorithm), the encryption algorithm,
and the encryption key length. Both the size field and the key length
field are in bytes. For example, AES-128 with SHA1-HMAC would be
represented by
authenc(hmac(sha1), 12, cbc(aes), 16)
The key for the authenc algorithm is the concatenation of the keys for
the authentication algorithm with the encryption algorithm. For the
above example, if a key of length 36 bytes is given, then hmac(sha1)
would receive the first 20 bytes while the last 16 would be given to
cbc(aes).
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2007-08-30 16:24:15 +08:00
|
|
|
struct crypto_alg *crypto_attr_alg(struct rtattr *rta, u32 type, u32 mask);
|
|
|
|
int crypto_attr_u32(struct rtattr *rta, u32 *num);
|
2006-08-06 21:10:45 +08:00
|
|
|
struct crypto_instance *crypto_alloc_instance(const char *name,
|
|
|
|
struct crypto_alg *alg);
|
|
|
|
|
2007-04-16 18:48:54 +08:00
|
|
|
void crypto_init_queue(struct crypto_queue *queue, unsigned int max_qlen);
|
|
|
|
int crypto_enqueue_request(struct crypto_queue *queue,
|
|
|
|
struct crypto_async_request *request);
|
|
|
|
struct crypto_async_request *crypto_dequeue_request(struct crypto_queue *queue);
|
|
|
|
int crypto_tfm_in_queue(struct crypto_queue *queue, struct crypto_tfm *tfm);
|
|
|
|
|
2007-11-20 17:26:06 +08:00
|
|
|
/* These functions require the input/output to be aligned as u32. */
|
|
|
|
void crypto_inc(u8 *a, unsigned int size);
|
|
|
|
void crypto_xor(u8 *dst, const u8 *src, unsigned int size);
|
|
|
|
|
2006-08-21 22:07:53 +08:00
|
|
|
int blkcipher_walk_done(struct blkcipher_desc *desc,
|
|
|
|
struct blkcipher_walk *walk, int err);
|
|
|
|
int blkcipher_walk_virt(struct blkcipher_desc *desc,
|
|
|
|
struct blkcipher_walk *walk);
|
|
|
|
int blkcipher_walk_phys(struct blkcipher_desc *desc,
|
|
|
|
struct blkcipher_walk *walk);
|
2007-10-04 15:24:05 +08:00
|
|
|
int blkcipher_walk_virt_block(struct blkcipher_desc *desc,
|
|
|
|
struct blkcipher_walk *walk,
|
|
|
|
unsigned int blocksize);
|
2006-08-21 22:07:53 +08:00
|
|
|
|
|
|
|
static inline void *crypto_tfm_ctx_aligned(struct crypto_tfm *tfm)
|
|
|
|
{
|
|
|
|
unsigned long addr = (unsigned long)crypto_tfm_ctx(tfm);
|
|
|
|
unsigned long align = crypto_tfm_alg_alignmask(tfm);
|
|
|
|
|
|
|
|
if (align <= crypto_tfm_ctx_alignment())
|
|
|
|
align = 1;
|
|
|
|
return (void *)ALIGN(addr, align);
|
|
|
|
}
|
|
|
|
|
2007-04-16 18:49:20 +08:00
|
|
|
static inline struct crypto_instance *crypto_tfm_alg_instance(
|
|
|
|
struct crypto_tfm *tfm)
|
|
|
|
{
|
|
|
|
return container_of(tfm->__crt_alg, struct crypto_instance, alg);
|
|
|
|
}
|
|
|
|
|
2006-08-06 19:16:34 +08:00
|
|
|
static inline void *crypto_instance_ctx(struct crypto_instance *inst)
|
|
|
|
{
|
|
|
|
return inst->__ctx;
|
|
|
|
}
|
|
|
|
|
2007-04-16 18:48:54 +08:00
|
|
|
static inline struct ablkcipher_alg *crypto_ablkcipher_alg(
|
|
|
|
struct crypto_ablkcipher *tfm)
|
|
|
|
{
|
|
|
|
return &crypto_ablkcipher_tfm(tfm)->__crt_alg->cra_ablkcipher;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void *crypto_ablkcipher_ctx(struct crypto_ablkcipher *tfm)
|
|
|
|
{
|
|
|
|
return crypto_tfm_ctx(&tfm->base);
|
|
|
|
}
|
|
|
|
|
2007-08-02 20:41:53 +08:00
|
|
|
static inline void *crypto_ablkcipher_ctx_aligned(struct crypto_ablkcipher *tfm)
|
|
|
|
{
|
|
|
|
return crypto_tfm_ctx_aligned(&tfm->base);
|
|
|
|
}
|
|
|
|
|
2007-08-30 15:36:14 +08:00
|
|
|
static inline struct aead_alg *crypto_aead_alg(struct crypto_aead *tfm)
|
|
|
|
{
|
|
|
|
return &crypto_aead_tfm(tfm)->__crt_alg->cra_aead;
|
|
|
|
}
|
|
|
|
|
[CRYPTO] aead: Add authenc
This patch adds the authenc algorithm which constructs an AEAD algorithm
from an asynchronous block cipher and a hash. The construction is done
by concatenating the encrypted result from the cipher with the output
from the hash, as is used by the IPsec ESP protocol.
The authenc algorithm exists as a template with four parameters:
authenc(auth, authsize, enc, enckeylen).
The authentication algorithm, the authentication size (i.e., truncating
the output of the authentication algorithm), the encryption algorithm,
and the encryption key length. Both the size field and the key length
field are in bytes. For example, AES-128 with SHA1-HMAC would be
represented by
authenc(hmac(sha1), 12, cbc(aes), 16)
The key for the authenc algorithm is the concatenation of the keys for
the authentication algorithm with the encryption algorithm. For the
above example, if a key of length 36 bytes is given, then hmac(sha1)
would receive the first 20 bytes while the last 16 would be given to
cbc(aes).
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2007-08-30 16:24:15 +08:00
|
|
|
static inline void *crypto_aead_ctx(struct crypto_aead *tfm)
|
|
|
|
{
|
|
|
|
return crypto_tfm_ctx(&tfm->base);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline struct crypto_instance *crypto_aead_alg_instance(
|
|
|
|
struct crypto_aead *aead)
|
|
|
|
{
|
|
|
|
return crypto_tfm_alg_instance(&aead->base);
|
|
|
|
}
|
|
|
|
|
2007-04-16 18:49:20 +08:00
|
|
|
static inline struct crypto_blkcipher *crypto_spawn_blkcipher(
|
|
|
|
struct crypto_spawn *spawn)
|
|
|
|
{
|
|
|
|
u32 type = CRYPTO_ALG_TYPE_BLKCIPHER;
|
2007-11-15 22:36:07 +08:00
|
|
|
u32 mask = CRYPTO_ALG_TYPE_MASK;
|
2007-04-16 18:49:20 +08:00
|
|
|
|
|
|
|
return __crypto_blkcipher_cast(crypto_spawn_tfm(spawn, type, mask));
|
|
|
|
}
|
|
|
|
|
2006-08-21 22:07:53 +08:00
|
|
|
static inline void *crypto_blkcipher_ctx(struct crypto_blkcipher *tfm)
|
|
|
|
{
|
|
|
|
return crypto_tfm_ctx(&tfm->base);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void *crypto_blkcipher_ctx_aligned(struct crypto_blkcipher *tfm)
|
|
|
|
{
|
|
|
|
return crypto_tfm_ctx_aligned(&tfm->base);
|
|
|
|
}
|
|
|
|
|
2006-12-17 07:05:58 +08:00
|
|
|
static inline struct crypto_cipher *crypto_spawn_cipher(
|
|
|
|
struct crypto_spawn *spawn)
|
|
|
|
{
|
|
|
|
u32 type = CRYPTO_ALG_TYPE_CIPHER;
|
|
|
|
u32 mask = CRYPTO_ALG_TYPE_MASK;
|
|
|
|
|
|
|
|
return __crypto_cipher_cast(crypto_spawn_tfm(spawn, type, mask));
|
|
|
|
}
|
|
|
|
|
2006-08-13 18:58:18 +08:00
|
|
|
static inline struct cipher_alg *crypto_cipher_alg(struct crypto_cipher *tfm)
|
|
|
|
{
|
|
|
|
return &crypto_cipher_tfm(tfm)->__crt_alg->cra_cipher;
|
|
|
|
}
|
|
|
|
|
2006-12-17 07:05:58 +08:00
|
|
|
static inline struct crypto_hash *crypto_spawn_hash(struct crypto_spawn *spawn)
|
|
|
|
{
|
|
|
|
u32 type = CRYPTO_ALG_TYPE_HASH;
|
|
|
|
u32 mask = CRYPTO_ALG_TYPE_HASH_MASK;
|
|
|
|
|
|
|
|
return __crypto_hash_cast(crypto_spawn_tfm(spawn, type, mask));
|
|
|
|
}
|
|
|
|
|
2006-08-19 20:24:23 +08:00
|
|
|
static inline void *crypto_hash_ctx_aligned(struct crypto_hash *tfm)
|
|
|
|
{
|
|
|
|
return crypto_tfm_ctx_aligned(&tfm->base);
|
|
|
|
}
|
|
|
|
|
2006-08-21 22:07:53 +08:00
|
|
|
static inline void blkcipher_walk_init(struct blkcipher_walk *walk,
|
|
|
|
struct scatterlist *dst,
|
|
|
|
struct scatterlist *src,
|
|
|
|
unsigned int nbytes)
|
|
|
|
{
|
|
|
|
walk->in.sg = src;
|
|
|
|
walk->out.sg = dst;
|
|
|
|
walk->total = nbytes;
|
|
|
|
}
|
|
|
|
|
2007-04-16 18:48:54 +08:00
|
|
|
static inline struct crypto_async_request *crypto_get_backlog(
|
|
|
|
struct crypto_queue *queue)
|
|
|
|
{
|
|
|
|
return queue->backlog == &queue->list ? NULL :
|
|
|
|
container_of(queue->backlog, struct crypto_async_request, list);
|
|
|
|
}
|
|
|
|
|
2007-08-26 19:12:47 +08:00
|
|
|
static inline int ablkcipher_enqueue_request(struct crypto_queue *queue,
|
2007-04-16 18:48:54 +08:00
|
|
|
struct ablkcipher_request *request)
|
|
|
|
{
|
2007-08-26 19:12:47 +08:00
|
|
|
return crypto_enqueue_request(queue, &request->base);
|
2007-04-16 18:48:54 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline struct ablkcipher_request *ablkcipher_dequeue_request(
|
2007-08-26 19:12:47 +08:00
|
|
|
struct crypto_queue *queue)
|
2007-04-16 18:48:54 +08:00
|
|
|
{
|
2007-08-26 19:12:47 +08:00
|
|
|
return ablkcipher_request_cast(crypto_dequeue_request(queue));
|
2007-04-16 18:48:54 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline void *ablkcipher_request_ctx(struct ablkcipher_request *req)
|
|
|
|
{
|
|
|
|
return req->__ctx;
|
|
|
|
}
|
|
|
|
|
2007-08-26 19:12:47 +08:00
|
|
|
static inline int ablkcipher_tfm_in_queue(struct crypto_queue *queue,
|
|
|
|
struct crypto_ablkcipher *tfm)
|
2007-04-16 18:48:54 +08:00
|
|
|
{
|
2007-08-26 19:12:47 +08:00
|
|
|
return crypto_tfm_in_queue(queue, crypto_ablkcipher_tfm(tfm));
|
2007-04-16 18:48:54 +08:00
|
|
|
}
|
|
|
|
|
[CRYPTO] aead: Add authenc
This patch adds the authenc algorithm which constructs an AEAD algorithm
from an asynchronous block cipher and a hash. The construction is done
by concatenating the encrypted result from the cipher with the output
from the hash, as is used by the IPsec ESP protocol.
The authenc algorithm exists as a template with four parameters:
authenc(auth, authsize, enc, enckeylen).
The authentication algorithm, the authentication size (i.e., truncating
the output of the authentication algorithm), the encryption algorithm,
and the encryption key length. Both the size field and the key length
field are in bytes. For example, AES-128 with SHA1-HMAC would be
represented by
authenc(hmac(sha1), 12, cbc(aes), 16)
The key for the authenc algorithm is the concatenation of the keys for
the authentication algorithm with the encryption algorithm. For the
above example, if a key of length 36 bytes is given, then hmac(sha1)
would receive the first 20 bytes while the last 16 would be given to
cbc(aes).
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2007-08-30 16:24:15 +08:00
|
|
|
static inline void *aead_request_ctx(struct aead_request *req)
|
|
|
|
{
|
|
|
|
return req->__ctx;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void aead_request_complete(struct aead_request *req, int err)
|
|
|
|
{
|
|
|
|
req->base.complete(&req->base, err);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline u32 aead_request_flags(struct aead_request *req)
|
|
|
|
{
|
|
|
|
return req->base.flags;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline struct crypto_alg *crypto_get_attr_alg(struct rtattr **tb,
|
|
|
|
u32 type, u32 mask)
|
|
|
|
{
|
|
|
|
return crypto_attr_alg(tb[1], type, mask);
|
|
|
|
}
|
|
|
|
|
2007-12-17 20:07:31 +08:00
|
|
|
/*
|
|
|
|
* Returns CRYPTO_ALG_ASYNC if type/mask requires the use of sync algorithms.
|
|
|
|
* Otherwise returns zero.
|
|
|
|
*/
|
|
|
|
static inline int crypto_requires_sync(u32 type, u32 mask)
|
|
|
|
{
|
|
|
|
return (type ^ CRYPTO_ALG_ASYNC) & mask & CRYPTO_ALG_ASYNC;
|
|
|
|
}
|
|
|
|
|
2006-08-21 19:08:13 +08:00
|
|
|
#endif /* _CRYPTO_ALGAPI_H */
|
|
|
|
|