crypto: inside-secure - Added support for the rfc4309(ccm(aes)) AEAD
This patch adds support for rfc4309(ccm(aes)) for use with IPsec ESP Signed-off-by: Pascal van Leeuwen <pvanleeuwen@verimatrix.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
This commit is contained in:
parent
92c60cefa4
commit
a9a89624f0
|
@ -1222,6 +1222,7 @@ static struct safexcel_alg_template *safexcel_algs[] = {
|
||||||
&safexcel_alg_authenc_hmac_sha384_cbc_des,
|
&safexcel_alg_authenc_hmac_sha384_cbc_des,
|
||||||
&safexcel_alg_rfc4106_gcm,
|
&safexcel_alg_rfc4106_gcm,
|
||||||
&safexcel_alg_rfc4543_gcm,
|
&safexcel_alg_rfc4543_gcm,
|
||||||
|
&safexcel_alg_rfc4309_ccm,
|
||||||
};
|
};
|
||||||
|
|
||||||
static int safexcel_register_algorithms(struct safexcel_crypto_priv *priv)
|
static int safexcel_register_algorithms(struct safexcel_crypto_priv *priv)
|
||||||
|
|
|
@ -28,7 +28,7 @@
|
||||||
|
|
||||||
/* Static configuration */
|
/* Static configuration */
|
||||||
#define EIP197_DEFAULT_RING_SIZE 400
|
#define EIP197_DEFAULT_RING_SIZE 400
|
||||||
#define EIP197_MAX_TOKENS 18
|
#define EIP197_MAX_TOKENS 19
|
||||||
#define EIP197_MAX_RINGS 4
|
#define EIP197_MAX_RINGS 4
|
||||||
#define EIP197_FETCH_DEPTH 2
|
#define EIP197_FETCH_DEPTH 2
|
||||||
#define EIP197_MAX_BATCH_SZ 64
|
#define EIP197_MAX_BATCH_SZ 64
|
||||||
|
@ -410,6 +410,8 @@ struct safexcel_context_record {
|
||||||
#define EIP197_AEAD_TYPE_IPSEC_ESP_GMAC 3
|
#define EIP197_AEAD_TYPE_IPSEC_ESP_GMAC 3
|
||||||
#define EIP197_AEAD_IPSEC_IV_SIZE 8
|
#define EIP197_AEAD_IPSEC_IV_SIZE 8
|
||||||
#define EIP197_AEAD_IPSEC_NONCE_SIZE 4
|
#define EIP197_AEAD_IPSEC_NONCE_SIZE 4
|
||||||
|
#define EIP197_AEAD_IPSEC_COUNTER_SIZE 4
|
||||||
|
#define EIP197_AEAD_IPSEC_CCM_NONCE_SIZE 3
|
||||||
|
|
||||||
/* The hash counter given to the engine in the context has a granularity of
|
/* The hash counter given to the engine in the context has a granularity of
|
||||||
* 64 bits.
|
* 64 bits.
|
||||||
|
@ -915,5 +917,6 @@ extern struct safexcel_alg_template safexcel_alg_authenc_hmac_sha512_cbc_des;
|
||||||
extern struct safexcel_alg_template safexcel_alg_authenc_hmac_sha384_cbc_des;
|
extern struct safexcel_alg_template safexcel_alg_authenc_hmac_sha384_cbc_des;
|
||||||
extern struct safexcel_alg_template safexcel_alg_rfc4106_gcm;
|
extern struct safexcel_alg_template safexcel_alg_rfc4106_gcm;
|
||||||
extern struct safexcel_alg_template safexcel_alg_rfc4543_gcm;
|
extern struct safexcel_alg_template safexcel_alg_rfc4543_gcm;
|
||||||
|
extern struct safexcel_alg_template safexcel_alg_rfc4309_ccm;
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|
|
@ -86,7 +86,8 @@ static void safexcel_cipher_token(struct safexcel_cipher_ctx *ctx, u8 *iv,
|
||||||
/* 64 bit IV part */
|
/* 64 bit IV part */
|
||||||
memcpy(&cdesc->control_data.token[1], iv, 8);
|
memcpy(&cdesc->control_data.token[1], iv, 8);
|
||||||
|
|
||||||
if (ctx->alg == SAFEXCEL_CHACHA20) {
|
if (ctx->alg == SAFEXCEL_CHACHA20 ||
|
||||||
|
ctx->xcm == EIP197_XCM_MODE_CCM) {
|
||||||
/* 32 bit counter, starting at 0 */
|
/* 32 bit counter, starting at 0 */
|
||||||
cdesc->control_data.token[3] = 0;
|
cdesc->control_data.token[3] = 0;
|
||||||
} else {
|
} else {
|
||||||
|
@ -189,39 +190,39 @@ static void safexcel_aead_token(struct safexcel_cipher_ctx *ctx, u8 *iv,
|
||||||
if (direction == SAFEXCEL_ENCRYPT) {
|
if (direction == SAFEXCEL_ENCRYPT) {
|
||||||
/* align end of instruction sequence to end of token */
|
/* align end of instruction sequence to end of token */
|
||||||
token = (struct safexcel_token *)(cdesc->control_data.token +
|
token = (struct safexcel_token *)(cdesc->control_data.token +
|
||||||
EIP197_MAX_TOKENS - 13);
|
EIP197_MAX_TOKENS - 14);
|
||||||
|
|
||||||
token[12].opcode = EIP197_TOKEN_OPCODE_INSERT;
|
token[13].opcode = EIP197_TOKEN_OPCODE_INSERT;
|
||||||
token[12].packet_length = digestsize;
|
token[13].packet_length = digestsize;
|
||||||
token[12].stat = EIP197_TOKEN_STAT_LAST_HASH |
|
token[13].stat = EIP197_TOKEN_STAT_LAST_HASH |
|
||||||
EIP197_TOKEN_STAT_LAST_PACKET;
|
EIP197_TOKEN_STAT_LAST_PACKET;
|
||||||
token[12].instructions = EIP197_TOKEN_INS_TYPE_OUTPUT |
|
token[13].instructions = EIP197_TOKEN_INS_TYPE_OUTPUT |
|
||||||
EIP197_TOKEN_INS_INSERT_HASH_DIGEST;
|
EIP197_TOKEN_INS_INSERT_HASH_DIGEST;
|
||||||
} else {
|
} else {
|
||||||
cryptlen -= digestsize;
|
cryptlen -= digestsize;
|
||||||
|
|
||||||
/* align end of instruction sequence to end of token */
|
/* align end of instruction sequence to end of token */
|
||||||
token = (struct safexcel_token *)(cdesc->control_data.token +
|
token = (struct safexcel_token *)(cdesc->control_data.token +
|
||||||
EIP197_MAX_TOKENS - 14);
|
EIP197_MAX_TOKENS - 15);
|
||||||
|
|
||||||
token[12].opcode = EIP197_TOKEN_OPCODE_RETRIEVE;
|
token[13].opcode = EIP197_TOKEN_OPCODE_RETRIEVE;
|
||||||
token[12].packet_length = digestsize;
|
token[13].packet_length = digestsize;
|
||||||
token[12].stat = EIP197_TOKEN_STAT_LAST_HASH |
|
|
||||||
EIP197_TOKEN_STAT_LAST_PACKET;
|
|
||||||
token[12].instructions = EIP197_TOKEN_INS_INSERT_HASH_DIGEST;
|
|
||||||
|
|
||||||
token[13].opcode = EIP197_TOKEN_OPCODE_VERIFY;
|
|
||||||
token[13].packet_length = digestsize |
|
|
||||||
EIP197_TOKEN_HASH_RESULT_VERIFY;
|
|
||||||
token[13].stat = EIP197_TOKEN_STAT_LAST_HASH |
|
token[13].stat = EIP197_TOKEN_STAT_LAST_HASH |
|
||||||
EIP197_TOKEN_STAT_LAST_PACKET;
|
EIP197_TOKEN_STAT_LAST_PACKET;
|
||||||
token[13].instructions = EIP197_TOKEN_INS_TYPE_OUTPUT;
|
token[13].instructions = EIP197_TOKEN_INS_INSERT_HASH_DIGEST;
|
||||||
|
|
||||||
|
token[14].opcode = EIP197_TOKEN_OPCODE_VERIFY;
|
||||||
|
token[14].packet_length = digestsize |
|
||||||
|
EIP197_TOKEN_HASH_RESULT_VERIFY;
|
||||||
|
token[14].stat = EIP197_TOKEN_STAT_LAST_HASH |
|
||||||
|
EIP197_TOKEN_STAT_LAST_PACKET;
|
||||||
|
token[14].instructions = EIP197_TOKEN_INS_TYPE_OUTPUT;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (ctx->aead == EIP197_AEAD_TYPE_IPSEC_ESP) {
|
if (ctx->aead == EIP197_AEAD_TYPE_IPSEC_ESP) {
|
||||||
/* For ESP mode (and not GMAC), skip over the IV */
|
/* For ESP mode (and not GMAC), skip over the IV */
|
||||||
token[7].opcode = EIP197_TOKEN_OPCODE_DIRECTION;
|
token[8].opcode = EIP197_TOKEN_OPCODE_DIRECTION;
|
||||||
token[7].packet_length = EIP197_AEAD_IPSEC_IV_SIZE;
|
token[8].packet_length = EIP197_AEAD_IPSEC_IV_SIZE;
|
||||||
|
|
||||||
assoclen -= EIP197_AEAD_IPSEC_IV_SIZE;
|
assoclen -= EIP197_AEAD_IPSEC_IV_SIZE;
|
||||||
}
|
}
|
||||||
|
@ -232,17 +233,17 @@ static void safexcel_aead_token(struct safexcel_cipher_ctx *ctx, u8 *iv,
|
||||||
EIP197_TOKEN_INS_TYPE_HASH;
|
EIP197_TOKEN_INS_TYPE_HASH;
|
||||||
|
|
||||||
if (likely(cryptlen || ctx->alg == SAFEXCEL_CHACHA20)) {
|
if (likely(cryptlen || ctx->alg == SAFEXCEL_CHACHA20)) {
|
||||||
token[10].opcode = EIP197_TOKEN_OPCODE_DIRECTION;
|
token[11].opcode = EIP197_TOKEN_OPCODE_DIRECTION;
|
||||||
token[10].packet_length = cryptlen;
|
token[11].packet_length = cryptlen;
|
||||||
token[10].stat = EIP197_TOKEN_STAT_LAST_HASH;
|
token[11].stat = EIP197_TOKEN_STAT_LAST_HASH;
|
||||||
if (unlikely(ctx->aead == EIP197_AEAD_TYPE_IPSEC_ESP_GMAC)) {
|
if (unlikely(ctx->aead == EIP197_AEAD_TYPE_IPSEC_ESP_GMAC)) {
|
||||||
token[6].instructions = EIP197_TOKEN_INS_TYPE_HASH;
|
token[6].instructions = EIP197_TOKEN_INS_TYPE_HASH;
|
||||||
/* Do not send to crypt engine in case of GMAC */
|
/* Do not send to crypt engine in case of GMAC */
|
||||||
token[10].instructions = EIP197_TOKEN_INS_LAST |
|
token[11].instructions = EIP197_TOKEN_INS_LAST |
|
||||||
EIP197_TOKEN_INS_TYPE_HASH |
|
EIP197_TOKEN_INS_TYPE_HASH |
|
||||||
EIP197_TOKEN_INS_TYPE_OUTPUT;
|
EIP197_TOKEN_INS_TYPE_OUTPUT;
|
||||||
} else {
|
} else {
|
||||||
token[10].instructions = EIP197_TOKEN_INS_LAST |
|
token[11].instructions = EIP197_TOKEN_INS_LAST |
|
||||||
EIP197_TOKEN_INS_TYPE_CRYPTO |
|
EIP197_TOKEN_INS_TYPE_CRYPTO |
|
||||||
EIP197_TOKEN_INS_TYPE_HASH |
|
EIP197_TOKEN_INS_TYPE_HASH |
|
||||||
EIP197_TOKEN_INS_TYPE_OUTPUT;
|
EIP197_TOKEN_INS_TYPE_OUTPUT;
|
||||||
|
@ -254,16 +255,17 @@ static void safexcel_aead_token(struct safexcel_cipher_ctx *ctx, u8 *iv,
|
||||||
if (!ctx->xcm)
|
if (!ctx->xcm)
|
||||||
return;
|
return;
|
||||||
|
|
||||||
token[8].opcode = EIP197_TOKEN_OPCODE_INSERT_REMRES;
|
token[9].opcode = EIP197_TOKEN_OPCODE_INSERT_REMRES;
|
||||||
token[8].packet_length = 0;
|
token[9].packet_length = 0;
|
||||||
token[8].instructions = AES_BLOCK_SIZE;
|
token[9].instructions = AES_BLOCK_SIZE;
|
||||||
|
|
||||||
token[9].opcode = EIP197_TOKEN_OPCODE_INSERT;
|
token[10].opcode = EIP197_TOKEN_OPCODE_INSERT;
|
||||||
token[9].packet_length = AES_BLOCK_SIZE;
|
token[10].packet_length = AES_BLOCK_SIZE;
|
||||||
token[9].instructions = EIP197_TOKEN_INS_TYPE_OUTPUT |
|
token[10].instructions = EIP197_TOKEN_INS_TYPE_OUTPUT |
|
||||||
EIP197_TOKEN_INS_TYPE_CRYPTO;
|
EIP197_TOKEN_INS_TYPE_CRYPTO;
|
||||||
|
|
||||||
if (ctx->xcm != EIP197_XCM_MODE_GCM) {
|
if (ctx->xcm != EIP197_XCM_MODE_GCM) {
|
||||||
|
u8 *final_iv = (u8 *)cdesc->control_data.token;
|
||||||
u8 *cbcmaciv = (u8 *)&token[1];
|
u8 *cbcmaciv = (u8 *)&token[1];
|
||||||
u32 *aadlen = (u32 *)&token[5];
|
u32 *aadlen = (u32 *)&token[5];
|
||||||
|
|
||||||
|
@ -274,11 +276,11 @@ static void safexcel_aead_token(struct safexcel_cipher_ctx *ctx, u8 *iv,
|
||||||
token[0].instructions = EIP197_TOKEN_INS_ORIGIN_TOKEN |
|
token[0].instructions = EIP197_TOKEN_INS_ORIGIN_TOKEN |
|
||||||
EIP197_TOKEN_INS_TYPE_HASH;
|
EIP197_TOKEN_INS_TYPE_HASH;
|
||||||
/* Variable length IV part */
|
/* Variable length IV part */
|
||||||
memcpy(cbcmaciv, iv, 15 - iv[0]);
|
memcpy(cbcmaciv, final_iv, 15 - final_iv[0]);
|
||||||
/* fixup flags byte */
|
/* fixup flags byte */
|
||||||
cbcmaciv[0] |= ((assoclen > 0) << 6) | ((digestsize - 2) << 2);
|
cbcmaciv[0] |= ((assoclen > 0) << 6) | ((digestsize - 2) << 2);
|
||||||
/* Clear upper bytes of variable message length to 0 */
|
/* Clear upper bytes of variable message length to 0 */
|
||||||
memset(cbcmaciv + 15 - iv[0], 0, iv[0] - 1);
|
memset(cbcmaciv + 15 - final_iv[0], 0, final_iv[0] - 1);
|
||||||
/* insert lower 2 bytes of message length */
|
/* insert lower 2 bytes of message length */
|
||||||
cbcmaciv[14] = cryptlen >> 8;
|
cbcmaciv[14] = cryptlen >> 8;
|
||||||
cbcmaciv[15] = cryptlen & 255;
|
cbcmaciv[15] = cryptlen & 255;
|
||||||
|
@ -299,13 +301,13 @@ static void safexcel_aead_token(struct safexcel_cipher_ctx *ctx, u8 *iv,
|
||||||
token[7].instructions = EIP197_TOKEN_INS_TYPE_HASH;
|
token[7].instructions = EIP197_TOKEN_INS_TYPE_HASH;
|
||||||
|
|
||||||
/* Align crypto data towards hash engine */
|
/* Align crypto data towards hash engine */
|
||||||
token[10].stat = 0;
|
token[11].stat = 0;
|
||||||
|
|
||||||
token[11].opcode = EIP197_TOKEN_OPCODE_INSERT;
|
token[12].opcode = EIP197_TOKEN_OPCODE_INSERT;
|
||||||
cryptlen &= 15;
|
cryptlen &= 15;
|
||||||
token[11].packet_length = cryptlen ? 16 - cryptlen : 0;
|
token[12].packet_length = cryptlen ? 16 - cryptlen : 0;
|
||||||
token[11].stat = EIP197_TOKEN_STAT_LAST_HASH;
|
token[12].stat = EIP197_TOKEN_STAT_LAST_HASH;
|
||||||
token[11].instructions = EIP197_TOKEN_INS_TYPE_HASH;
|
token[12].instructions = EIP197_TOKEN_INS_TYPE_HASH;
|
||||||
} else {
|
} else {
|
||||||
token[7].stat = EIP197_TOKEN_STAT_LAST_HASH;
|
token[7].stat = EIP197_TOKEN_STAT_LAST_HASH;
|
||||||
token[7].instructions = EIP197_TOKEN_INS_LAST |
|
token[7].instructions = EIP197_TOKEN_INS_LAST |
|
||||||
|
@ -3551,3 +3553,94 @@ struct safexcel_alg_template safexcel_alg_rfc4543_gcm = {
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
};
|
};
|
||||||
|
|
||||||
|
static int safexcel_rfc4309_ccm_setkey(struct crypto_aead *ctfm, const u8 *key,
|
||||||
|
unsigned int len)
|
||||||
|
{
|
||||||
|
struct crypto_tfm *tfm = crypto_aead_tfm(ctfm);
|
||||||
|
struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
|
||||||
|
|
||||||
|
/* First byte of the nonce = L = always 3 for RFC4309 (4 byte ctr) */
|
||||||
|
*(u8 *)&ctx->nonce = EIP197_AEAD_IPSEC_COUNTER_SIZE - 1;
|
||||||
|
/* last 3 bytes of key are the nonce! */
|
||||||
|
memcpy((u8 *)&ctx->nonce + 1, key + len -
|
||||||
|
EIP197_AEAD_IPSEC_CCM_NONCE_SIZE,
|
||||||
|
EIP197_AEAD_IPSEC_CCM_NONCE_SIZE);
|
||||||
|
|
||||||
|
len -= EIP197_AEAD_IPSEC_CCM_NONCE_SIZE;
|
||||||
|
return safexcel_aead_ccm_setkey(ctfm, key, len);
|
||||||
|
}
|
||||||
|
|
||||||
|
static int safexcel_rfc4309_ccm_setauthsize(struct crypto_aead *tfm,
|
||||||
|
unsigned int authsize)
|
||||||
|
{
|
||||||
|
/* Borrowed from crypto/ccm.c */
|
||||||
|
switch (authsize) {
|
||||||
|
case 8:
|
||||||
|
case 12:
|
||||||
|
case 16:
|
||||||
|
break;
|
||||||
|
default:
|
||||||
|
return -EINVAL;
|
||||||
|
}
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int safexcel_rfc4309_ccm_encrypt(struct aead_request *req)
|
||||||
|
{
|
||||||
|
struct safexcel_cipher_req *creq = aead_request_ctx(req);
|
||||||
|
|
||||||
|
/* Borrowed from crypto/ccm.c */
|
||||||
|
if (req->assoclen != 16 && req->assoclen != 20)
|
||||||
|
return -EINVAL;
|
||||||
|
|
||||||
|
return safexcel_queue_req(&req->base, creq, SAFEXCEL_ENCRYPT);
|
||||||
|
}
|
||||||
|
|
||||||
|
static int safexcel_rfc4309_ccm_decrypt(struct aead_request *req)
|
||||||
|
{
|
||||||
|
struct safexcel_cipher_req *creq = aead_request_ctx(req);
|
||||||
|
|
||||||
|
/* Borrowed from crypto/ccm.c */
|
||||||
|
if (req->assoclen != 16 && req->assoclen != 20)
|
||||||
|
return -EINVAL;
|
||||||
|
|
||||||
|
return safexcel_queue_req(&req->base, creq, SAFEXCEL_DECRYPT);
|
||||||
|
}
|
||||||
|
|
||||||
|
static int safexcel_rfc4309_ccm_cra_init(struct crypto_tfm *tfm)
|
||||||
|
{
|
||||||
|
struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
|
||||||
|
int ret;
|
||||||
|
|
||||||
|
ret = safexcel_aead_ccm_cra_init(tfm);
|
||||||
|
ctx->aead = EIP197_AEAD_TYPE_IPSEC_ESP;
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
struct safexcel_alg_template safexcel_alg_rfc4309_ccm = {
|
||||||
|
.type = SAFEXCEL_ALG_TYPE_AEAD,
|
||||||
|
.algo_mask = SAFEXCEL_ALG_AES | SAFEXCEL_ALG_CBC_MAC_ALL,
|
||||||
|
.alg.aead = {
|
||||||
|
.setkey = safexcel_rfc4309_ccm_setkey,
|
||||||
|
.setauthsize = safexcel_rfc4309_ccm_setauthsize,
|
||||||
|
.encrypt = safexcel_rfc4309_ccm_encrypt,
|
||||||
|
.decrypt = safexcel_rfc4309_ccm_decrypt,
|
||||||
|
.ivsize = EIP197_AEAD_IPSEC_IV_SIZE,
|
||||||
|
.maxauthsize = AES_BLOCK_SIZE,
|
||||||
|
.base = {
|
||||||
|
.cra_name = "rfc4309(ccm(aes))",
|
||||||
|
.cra_driver_name = "safexcel-rfc4309-ccm-aes",
|
||||||
|
.cra_priority = SAFEXCEL_CRA_PRIORITY,
|
||||||
|
.cra_flags = CRYPTO_ALG_ASYNC |
|
||||||
|
CRYPTO_ALG_KERN_DRIVER_ONLY,
|
||||||
|
.cra_blocksize = 1,
|
||||||
|
.cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
|
||||||
|
.cra_alignmask = 0,
|
||||||
|
.cra_init = safexcel_rfc4309_ccm_cra_init,
|
||||||
|
.cra_exit = safexcel_aead_cra_exit,
|
||||||
|
.cra_module = THIS_MODULE,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
};
|
||||||
|
|
Loading…
Reference in New Issue