18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only
28c2ecf20Sopenharmony_ci/*
38c2ecf20Sopenharmony_ci * Copyright (C) 2010 IBM Corporation
48c2ecf20Sopenharmony_ci * Copyright (C) 2010 Politecnico di Torino, Italy
58c2ecf20Sopenharmony_ci *                    TORSEC group -- https://security.polito.it
68c2ecf20Sopenharmony_ci *
78c2ecf20Sopenharmony_ci * Authors:
88c2ecf20Sopenharmony_ci * Mimi Zohar <zohar@us.ibm.com>
98c2ecf20Sopenharmony_ci * Roberto Sassu <roberto.sassu@polito.it>
108c2ecf20Sopenharmony_ci *
118c2ecf20Sopenharmony_ci * See Documentation/security/keys/trusted-encrypted.rst
128c2ecf20Sopenharmony_ci */
138c2ecf20Sopenharmony_ci
148c2ecf20Sopenharmony_ci#include <linux/uaccess.h>
158c2ecf20Sopenharmony_ci#include <linux/module.h>
168c2ecf20Sopenharmony_ci#include <linux/init.h>
178c2ecf20Sopenharmony_ci#include <linux/slab.h>
188c2ecf20Sopenharmony_ci#include <linux/parser.h>
198c2ecf20Sopenharmony_ci#include <linux/string.h>
208c2ecf20Sopenharmony_ci#include <linux/err.h>
218c2ecf20Sopenharmony_ci#include <keys/user-type.h>
228c2ecf20Sopenharmony_ci#include <keys/trusted-type.h>
238c2ecf20Sopenharmony_ci#include <keys/encrypted-type.h>
248c2ecf20Sopenharmony_ci#include <linux/key-type.h>
258c2ecf20Sopenharmony_ci#include <linux/random.h>
268c2ecf20Sopenharmony_ci#include <linux/rcupdate.h>
278c2ecf20Sopenharmony_ci#include <linux/scatterlist.h>
288c2ecf20Sopenharmony_ci#include <linux/ctype.h>
298c2ecf20Sopenharmony_ci#include <crypto/aes.h>
308c2ecf20Sopenharmony_ci#include <crypto/algapi.h>
318c2ecf20Sopenharmony_ci#include <crypto/hash.h>
328c2ecf20Sopenharmony_ci#include <crypto/sha.h>
338c2ecf20Sopenharmony_ci#include <crypto/skcipher.h>
348c2ecf20Sopenharmony_ci
358c2ecf20Sopenharmony_ci#include "encrypted.h"
368c2ecf20Sopenharmony_ci#include "ecryptfs_format.h"
378c2ecf20Sopenharmony_ci
388c2ecf20Sopenharmony_cistatic const char KEY_TRUSTED_PREFIX[] = "trusted:";
398c2ecf20Sopenharmony_cistatic const char KEY_USER_PREFIX[] = "user:";
408c2ecf20Sopenharmony_cistatic const char hash_alg[] = "sha256";
418c2ecf20Sopenharmony_cistatic const char hmac_alg[] = "hmac(sha256)";
428c2ecf20Sopenharmony_cistatic const char blkcipher_alg[] = "cbc(aes)";
438c2ecf20Sopenharmony_cistatic const char key_format_default[] = "default";
448c2ecf20Sopenharmony_cistatic const char key_format_ecryptfs[] = "ecryptfs";
458c2ecf20Sopenharmony_cistatic const char key_format_enc32[] = "enc32";
468c2ecf20Sopenharmony_cistatic unsigned int ivsize;
478c2ecf20Sopenharmony_cistatic int blksize;
488c2ecf20Sopenharmony_ci
498c2ecf20Sopenharmony_ci#define KEY_TRUSTED_PREFIX_LEN (sizeof (KEY_TRUSTED_PREFIX) - 1)
508c2ecf20Sopenharmony_ci#define KEY_USER_PREFIX_LEN (sizeof (KEY_USER_PREFIX) - 1)
518c2ecf20Sopenharmony_ci#define KEY_ECRYPTFS_DESC_LEN 16
528c2ecf20Sopenharmony_ci#define HASH_SIZE SHA256_DIGEST_SIZE
538c2ecf20Sopenharmony_ci#define MAX_DATA_SIZE 4096
548c2ecf20Sopenharmony_ci#define MIN_DATA_SIZE  20
558c2ecf20Sopenharmony_ci#define KEY_ENC32_PAYLOAD_LEN 32
568c2ecf20Sopenharmony_ci
578c2ecf20Sopenharmony_cistatic struct crypto_shash *hash_tfm;
588c2ecf20Sopenharmony_ci
598c2ecf20Sopenharmony_cienum {
608c2ecf20Sopenharmony_ci	Opt_new, Opt_load, Opt_update, Opt_err
618c2ecf20Sopenharmony_ci};
628c2ecf20Sopenharmony_ci
638c2ecf20Sopenharmony_cienum {
648c2ecf20Sopenharmony_ci	Opt_default, Opt_ecryptfs, Opt_enc32, Opt_error
658c2ecf20Sopenharmony_ci};
668c2ecf20Sopenharmony_ci
678c2ecf20Sopenharmony_cistatic const match_table_t key_format_tokens = {
688c2ecf20Sopenharmony_ci	{Opt_default, "default"},
698c2ecf20Sopenharmony_ci	{Opt_ecryptfs, "ecryptfs"},
708c2ecf20Sopenharmony_ci	{Opt_enc32, "enc32"},
718c2ecf20Sopenharmony_ci	{Opt_error, NULL}
728c2ecf20Sopenharmony_ci};
738c2ecf20Sopenharmony_ci
748c2ecf20Sopenharmony_cistatic const match_table_t key_tokens = {
758c2ecf20Sopenharmony_ci	{Opt_new, "new"},
768c2ecf20Sopenharmony_ci	{Opt_load, "load"},
778c2ecf20Sopenharmony_ci	{Opt_update, "update"},
788c2ecf20Sopenharmony_ci	{Opt_err, NULL}
798c2ecf20Sopenharmony_ci};
808c2ecf20Sopenharmony_ci
818c2ecf20Sopenharmony_cistatic int aes_get_sizes(void)
828c2ecf20Sopenharmony_ci{
838c2ecf20Sopenharmony_ci	struct crypto_skcipher *tfm;
848c2ecf20Sopenharmony_ci
858c2ecf20Sopenharmony_ci	tfm = crypto_alloc_skcipher(blkcipher_alg, 0, CRYPTO_ALG_ASYNC);
868c2ecf20Sopenharmony_ci	if (IS_ERR(tfm)) {
878c2ecf20Sopenharmony_ci		pr_err("encrypted_key: failed to alloc_cipher (%ld)\n",
888c2ecf20Sopenharmony_ci		       PTR_ERR(tfm));
898c2ecf20Sopenharmony_ci		return PTR_ERR(tfm);
908c2ecf20Sopenharmony_ci	}
918c2ecf20Sopenharmony_ci	ivsize = crypto_skcipher_ivsize(tfm);
928c2ecf20Sopenharmony_ci	blksize = crypto_skcipher_blocksize(tfm);
938c2ecf20Sopenharmony_ci	crypto_free_skcipher(tfm);
948c2ecf20Sopenharmony_ci	return 0;
958c2ecf20Sopenharmony_ci}
968c2ecf20Sopenharmony_ci
978c2ecf20Sopenharmony_ci/*
988c2ecf20Sopenharmony_ci * valid_ecryptfs_desc - verify the description of a new/loaded encrypted key
998c2ecf20Sopenharmony_ci *
1008c2ecf20Sopenharmony_ci * The description of a encrypted key with format 'ecryptfs' must contain
1018c2ecf20Sopenharmony_ci * exactly 16 hexadecimal characters.
1028c2ecf20Sopenharmony_ci *
1038c2ecf20Sopenharmony_ci */
1048c2ecf20Sopenharmony_cistatic int valid_ecryptfs_desc(const char *ecryptfs_desc)
1058c2ecf20Sopenharmony_ci{
1068c2ecf20Sopenharmony_ci	int i;
1078c2ecf20Sopenharmony_ci
1088c2ecf20Sopenharmony_ci	if (strlen(ecryptfs_desc) != KEY_ECRYPTFS_DESC_LEN) {
1098c2ecf20Sopenharmony_ci		pr_err("encrypted_key: key description must be %d hexadecimal "
1108c2ecf20Sopenharmony_ci		       "characters long\n", KEY_ECRYPTFS_DESC_LEN);
1118c2ecf20Sopenharmony_ci		return -EINVAL;
1128c2ecf20Sopenharmony_ci	}
1138c2ecf20Sopenharmony_ci
1148c2ecf20Sopenharmony_ci	for (i = 0; i < KEY_ECRYPTFS_DESC_LEN; i++) {
1158c2ecf20Sopenharmony_ci		if (!isxdigit(ecryptfs_desc[i])) {
1168c2ecf20Sopenharmony_ci			pr_err("encrypted_key: key description must contain "
1178c2ecf20Sopenharmony_ci			       "only hexadecimal characters\n");
1188c2ecf20Sopenharmony_ci			return -EINVAL;
1198c2ecf20Sopenharmony_ci		}
1208c2ecf20Sopenharmony_ci	}
1218c2ecf20Sopenharmony_ci
1228c2ecf20Sopenharmony_ci	return 0;
1238c2ecf20Sopenharmony_ci}
1248c2ecf20Sopenharmony_ci
1258c2ecf20Sopenharmony_ci/*
1268c2ecf20Sopenharmony_ci * valid_master_desc - verify the 'key-type:desc' of a new/updated master-key
1278c2ecf20Sopenharmony_ci *
1288c2ecf20Sopenharmony_ci * key-type:= "trusted:" | "user:"
1298c2ecf20Sopenharmony_ci * desc:= master-key description
1308c2ecf20Sopenharmony_ci *
1318c2ecf20Sopenharmony_ci * Verify that 'key-type' is valid and that 'desc' exists. On key update,
1328c2ecf20Sopenharmony_ci * only the master key description is permitted to change, not the key-type.
1338c2ecf20Sopenharmony_ci * The key-type remains constant.
1348c2ecf20Sopenharmony_ci *
1358c2ecf20Sopenharmony_ci * On success returns 0, otherwise -EINVAL.
1368c2ecf20Sopenharmony_ci */
1378c2ecf20Sopenharmony_cistatic int valid_master_desc(const char *new_desc, const char *orig_desc)
1388c2ecf20Sopenharmony_ci{
1398c2ecf20Sopenharmony_ci	int prefix_len;
1408c2ecf20Sopenharmony_ci
1418c2ecf20Sopenharmony_ci	if (!strncmp(new_desc, KEY_TRUSTED_PREFIX, KEY_TRUSTED_PREFIX_LEN))
1428c2ecf20Sopenharmony_ci		prefix_len = KEY_TRUSTED_PREFIX_LEN;
1438c2ecf20Sopenharmony_ci	else if (!strncmp(new_desc, KEY_USER_PREFIX, KEY_USER_PREFIX_LEN))
1448c2ecf20Sopenharmony_ci		prefix_len = KEY_USER_PREFIX_LEN;
1458c2ecf20Sopenharmony_ci	else
1468c2ecf20Sopenharmony_ci		return -EINVAL;
1478c2ecf20Sopenharmony_ci
1488c2ecf20Sopenharmony_ci	if (!new_desc[prefix_len])
1498c2ecf20Sopenharmony_ci		return -EINVAL;
1508c2ecf20Sopenharmony_ci
1518c2ecf20Sopenharmony_ci	if (orig_desc && strncmp(new_desc, orig_desc, prefix_len))
1528c2ecf20Sopenharmony_ci		return -EINVAL;
1538c2ecf20Sopenharmony_ci
1548c2ecf20Sopenharmony_ci	return 0;
1558c2ecf20Sopenharmony_ci}
1568c2ecf20Sopenharmony_ci
1578c2ecf20Sopenharmony_ci/*
1588c2ecf20Sopenharmony_ci * datablob_parse - parse the keyctl data
1598c2ecf20Sopenharmony_ci *
1608c2ecf20Sopenharmony_ci * datablob format:
1618c2ecf20Sopenharmony_ci * new [<format>] <master-key name> <decrypted data length>
1628c2ecf20Sopenharmony_ci * load [<format>] <master-key name> <decrypted data length>
1638c2ecf20Sopenharmony_ci *     <encrypted iv + data>
1648c2ecf20Sopenharmony_ci * update <new-master-key name>
1658c2ecf20Sopenharmony_ci *
1668c2ecf20Sopenharmony_ci * Tokenizes a copy of the keyctl data, returning a pointer to each token,
1678c2ecf20Sopenharmony_ci * which is null terminated.
1688c2ecf20Sopenharmony_ci *
1698c2ecf20Sopenharmony_ci * On success returns 0, otherwise -EINVAL.
1708c2ecf20Sopenharmony_ci */
1718c2ecf20Sopenharmony_cistatic int datablob_parse(char *datablob, const char **format,
1728c2ecf20Sopenharmony_ci			  char **master_desc, char **decrypted_datalen,
1738c2ecf20Sopenharmony_ci			  char **hex_encoded_iv)
1748c2ecf20Sopenharmony_ci{
1758c2ecf20Sopenharmony_ci	substring_t args[MAX_OPT_ARGS];
1768c2ecf20Sopenharmony_ci	int ret = -EINVAL;
1778c2ecf20Sopenharmony_ci	int key_cmd;
1788c2ecf20Sopenharmony_ci	int key_format;
1798c2ecf20Sopenharmony_ci	char *p, *keyword;
1808c2ecf20Sopenharmony_ci
1818c2ecf20Sopenharmony_ci	keyword = strsep(&datablob, " \t");
1828c2ecf20Sopenharmony_ci	if (!keyword) {
1838c2ecf20Sopenharmony_ci		pr_info("encrypted_key: insufficient parameters specified\n");
1848c2ecf20Sopenharmony_ci		return ret;
1858c2ecf20Sopenharmony_ci	}
1868c2ecf20Sopenharmony_ci	key_cmd = match_token(keyword, key_tokens, args);
1878c2ecf20Sopenharmony_ci
1888c2ecf20Sopenharmony_ci	/* Get optional format: default | ecryptfs */
1898c2ecf20Sopenharmony_ci	p = strsep(&datablob, " \t");
1908c2ecf20Sopenharmony_ci	if (!p) {
1918c2ecf20Sopenharmony_ci		pr_err("encrypted_key: insufficient parameters specified\n");
1928c2ecf20Sopenharmony_ci		return ret;
1938c2ecf20Sopenharmony_ci	}
1948c2ecf20Sopenharmony_ci
1958c2ecf20Sopenharmony_ci	key_format = match_token(p, key_format_tokens, args);
1968c2ecf20Sopenharmony_ci	switch (key_format) {
1978c2ecf20Sopenharmony_ci	case Opt_ecryptfs:
1988c2ecf20Sopenharmony_ci	case Opt_enc32:
1998c2ecf20Sopenharmony_ci	case Opt_default:
2008c2ecf20Sopenharmony_ci		*format = p;
2018c2ecf20Sopenharmony_ci		*master_desc = strsep(&datablob, " \t");
2028c2ecf20Sopenharmony_ci		break;
2038c2ecf20Sopenharmony_ci	case Opt_error:
2048c2ecf20Sopenharmony_ci		*master_desc = p;
2058c2ecf20Sopenharmony_ci		break;
2068c2ecf20Sopenharmony_ci	}
2078c2ecf20Sopenharmony_ci
2088c2ecf20Sopenharmony_ci	if (!*master_desc) {
2098c2ecf20Sopenharmony_ci		pr_info("encrypted_key: master key parameter is missing\n");
2108c2ecf20Sopenharmony_ci		goto out;
2118c2ecf20Sopenharmony_ci	}
2128c2ecf20Sopenharmony_ci
2138c2ecf20Sopenharmony_ci	if (valid_master_desc(*master_desc, NULL) < 0) {
2148c2ecf20Sopenharmony_ci		pr_info("encrypted_key: master key parameter \'%s\' "
2158c2ecf20Sopenharmony_ci			"is invalid\n", *master_desc);
2168c2ecf20Sopenharmony_ci		goto out;
2178c2ecf20Sopenharmony_ci	}
2188c2ecf20Sopenharmony_ci
2198c2ecf20Sopenharmony_ci	if (decrypted_datalen) {
2208c2ecf20Sopenharmony_ci		*decrypted_datalen = strsep(&datablob, " \t");
2218c2ecf20Sopenharmony_ci		if (!*decrypted_datalen) {
2228c2ecf20Sopenharmony_ci			pr_info("encrypted_key: keylen parameter is missing\n");
2238c2ecf20Sopenharmony_ci			goto out;
2248c2ecf20Sopenharmony_ci		}
2258c2ecf20Sopenharmony_ci	}
2268c2ecf20Sopenharmony_ci
2278c2ecf20Sopenharmony_ci	switch (key_cmd) {
2288c2ecf20Sopenharmony_ci	case Opt_new:
2298c2ecf20Sopenharmony_ci		if (!decrypted_datalen) {
2308c2ecf20Sopenharmony_ci			pr_info("encrypted_key: keyword \'%s\' not allowed "
2318c2ecf20Sopenharmony_ci				"when called from .update method\n", keyword);
2328c2ecf20Sopenharmony_ci			break;
2338c2ecf20Sopenharmony_ci		}
2348c2ecf20Sopenharmony_ci		ret = 0;
2358c2ecf20Sopenharmony_ci		break;
2368c2ecf20Sopenharmony_ci	case Opt_load:
2378c2ecf20Sopenharmony_ci		if (!decrypted_datalen) {
2388c2ecf20Sopenharmony_ci			pr_info("encrypted_key: keyword \'%s\' not allowed "
2398c2ecf20Sopenharmony_ci				"when called from .update method\n", keyword);
2408c2ecf20Sopenharmony_ci			break;
2418c2ecf20Sopenharmony_ci		}
2428c2ecf20Sopenharmony_ci		*hex_encoded_iv = strsep(&datablob, " \t");
2438c2ecf20Sopenharmony_ci		if (!*hex_encoded_iv) {
2448c2ecf20Sopenharmony_ci			pr_info("encrypted_key: hex blob is missing\n");
2458c2ecf20Sopenharmony_ci			break;
2468c2ecf20Sopenharmony_ci		}
2478c2ecf20Sopenharmony_ci		ret = 0;
2488c2ecf20Sopenharmony_ci		break;
2498c2ecf20Sopenharmony_ci	case Opt_update:
2508c2ecf20Sopenharmony_ci		if (decrypted_datalen) {
2518c2ecf20Sopenharmony_ci			pr_info("encrypted_key: keyword \'%s\' not allowed "
2528c2ecf20Sopenharmony_ci				"when called from .instantiate method\n",
2538c2ecf20Sopenharmony_ci				keyword);
2548c2ecf20Sopenharmony_ci			break;
2558c2ecf20Sopenharmony_ci		}
2568c2ecf20Sopenharmony_ci		ret = 0;
2578c2ecf20Sopenharmony_ci		break;
2588c2ecf20Sopenharmony_ci	case Opt_err:
2598c2ecf20Sopenharmony_ci		pr_info("encrypted_key: keyword \'%s\' not recognized\n",
2608c2ecf20Sopenharmony_ci			keyword);
2618c2ecf20Sopenharmony_ci		break;
2628c2ecf20Sopenharmony_ci	}
2638c2ecf20Sopenharmony_ciout:
2648c2ecf20Sopenharmony_ci	return ret;
2658c2ecf20Sopenharmony_ci}
2668c2ecf20Sopenharmony_ci
2678c2ecf20Sopenharmony_ci/*
2688c2ecf20Sopenharmony_ci * datablob_format - format as an ascii string, before copying to userspace
2698c2ecf20Sopenharmony_ci */
2708c2ecf20Sopenharmony_cistatic char *datablob_format(struct encrypted_key_payload *epayload,
2718c2ecf20Sopenharmony_ci			     size_t asciiblob_len)
2728c2ecf20Sopenharmony_ci{
2738c2ecf20Sopenharmony_ci	char *ascii_buf, *bufp;
2748c2ecf20Sopenharmony_ci	u8 *iv = epayload->iv;
2758c2ecf20Sopenharmony_ci	int len;
2768c2ecf20Sopenharmony_ci	int i;
2778c2ecf20Sopenharmony_ci
2788c2ecf20Sopenharmony_ci	ascii_buf = kmalloc(asciiblob_len + 1, GFP_KERNEL);
2798c2ecf20Sopenharmony_ci	if (!ascii_buf)
2808c2ecf20Sopenharmony_ci		goto out;
2818c2ecf20Sopenharmony_ci
2828c2ecf20Sopenharmony_ci	ascii_buf[asciiblob_len] = '\0';
2838c2ecf20Sopenharmony_ci
2848c2ecf20Sopenharmony_ci	/* copy datablob master_desc and datalen strings */
2858c2ecf20Sopenharmony_ci	len = sprintf(ascii_buf, "%s %s %s ", epayload->format,
2868c2ecf20Sopenharmony_ci		      epayload->master_desc, epayload->datalen);
2878c2ecf20Sopenharmony_ci
2888c2ecf20Sopenharmony_ci	/* convert the hex encoded iv, encrypted-data and HMAC to ascii */
2898c2ecf20Sopenharmony_ci	bufp = &ascii_buf[len];
2908c2ecf20Sopenharmony_ci	for (i = 0; i < (asciiblob_len - len) / 2; i++)
2918c2ecf20Sopenharmony_ci		bufp = hex_byte_pack(bufp, iv[i]);
2928c2ecf20Sopenharmony_ciout:
2938c2ecf20Sopenharmony_ci	return ascii_buf;
2948c2ecf20Sopenharmony_ci}
2958c2ecf20Sopenharmony_ci
2968c2ecf20Sopenharmony_ci/*
2978c2ecf20Sopenharmony_ci * request_user_key - request the user key
2988c2ecf20Sopenharmony_ci *
2998c2ecf20Sopenharmony_ci * Use a user provided key to encrypt/decrypt an encrypted-key.
3008c2ecf20Sopenharmony_ci */
3018c2ecf20Sopenharmony_cistatic struct key *request_user_key(const char *master_desc, const u8 **master_key,
3028c2ecf20Sopenharmony_ci				    size_t *master_keylen)
3038c2ecf20Sopenharmony_ci{
3048c2ecf20Sopenharmony_ci	const struct user_key_payload *upayload;
3058c2ecf20Sopenharmony_ci	struct key *ukey;
3068c2ecf20Sopenharmony_ci
3078c2ecf20Sopenharmony_ci	ukey = request_key(&key_type_user, master_desc, NULL);
3088c2ecf20Sopenharmony_ci	if (IS_ERR(ukey))
3098c2ecf20Sopenharmony_ci		goto error;
3108c2ecf20Sopenharmony_ci
3118c2ecf20Sopenharmony_ci	down_read(&ukey->sem);
3128c2ecf20Sopenharmony_ci	upayload = user_key_payload_locked(ukey);
3138c2ecf20Sopenharmony_ci	if (!upayload) {
3148c2ecf20Sopenharmony_ci		/* key was revoked before we acquired its semaphore */
3158c2ecf20Sopenharmony_ci		up_read(&ukey->sem);
3168c2ecf20Sopenharmony_ci		key_put(ukey);
3178c2ecf20Sopenharmony_ci		ukey = ERR_PTR(-EKEYREVOKED);
3188c2ecf20Sopenharmony_ci		goto error;
3198c2ecf20Sopenharmony_ci	}
3208c2ecf20Sopenharmony_ci	*master_key = upayload->data;
3218c2ecf20Sopenharmony_ci	*master_keylen = upayload->datalen;
3228c2ecf20Sopenharmony_cierror:
3238c2ecf20Sopenharmony_ci	return ukey;
3248c2ecf20Sopenharmony_ci}
3258c2ecf20Sopenharmony_ci
3268c2ecf20Sopenharmony_cistatic int calc_hmac(u8 *digest, const u8 *key, unsigned int keylen,
3278c2ecf20Sopenharmony_ci		     const u8 *buf, unsigned int buflen)
3288c2ecf20Sopenharmony_ci{
3298c2ecf20Sopenharmony_ci	struct crypto_shash *tfm;
3308c2ecf20Sopenharmony_ci	int err;
3318c2ecf20Sopenharmony_ci
3328c2ecf20Sopenharmony_ci	tfm = crypto_alloc_shash(hmac_alg, 0, 0);
3338c2ecf20Sopenharmony_ci	if (IS_ERR(tfm)) {
3348c2ecf20Sopenharmony_ci		pr_err("encrypted_key: can't alloc %s transform: %ld\n",
3358c2ecf20Sopenharmony_ci		       hmac_alg, PTR_ERR(tfm));
3368c2ecf20Sopenharmony_ci		return PTR_ERR(tfm);
3378c2ecf20Sopenharmony_ci	}
3388c2ecf20Sopenharmony_ci
3398c2ecf20Sopenharmony_ci	err = crypto_shash_setkey(tfm, key, keylen);
3408c2ecf20Sopenharmony_ci	if (!err)
3418c2ecf20Sopenharmony_ci		err = crypto_shash_tfm_digest(tfm, buf, buflen, digest);
3428c2ecf20Sopenharmony_ci	crypto_free_shash(tfm);
3438c2ecf20Sopenharmony_ci	return err;
3448c2ecf20Sopenharmony_ci}
3458c2ecf20Sopenharmony_ci
3468c2ecf20Sopenharmony_cienum derived_key_type { ENC_KEY, AUTH_KEY };
3478c2ecf20Sopenharmony_ci
3488c2ecf20Sopenharmony_ci/* Derive authentication/encryption key from trusted key */
3498c2ecf20Sopenharmony_cistatic int get_derived_key(u8 *derived_key, enum derived_key_type key_type,
3508c2ecf20Sopenharmony_ci			   const u8 *master_key, size_t master_keylen)
3518c2ecf20Sopenharmony_ci{
3528c2ecf20Sopenharmony_ci	u8 *derived_buf;
3538c2ecf20Sopenharmony_ci	unsigned int derived_buf_len;
3548c2ecf20Sopenharmony_ci	int ret;
3558c2ecf20Sopenharmony_ci
3568c2ecf20Sopenharmony_ci	derived_buf_len = strlen("AUTH_KEY") + 1 + master_keylen;
3578c2ecf20Sopenharmony_ci	if (derived_buf_len < HASH_SIZE)
3588c2ecf20Sopenharmony_ci		derived_buf_len = HASH_SIZE;
3598c2ecf20Sopenharmony_ci
3608c2ecf20Sopenharmony_ci	derived_buf = kzalloc(derived_buf_len, GFP_KERNEL);
3618c2ecf20Sopenharmony_ci	if (!derived_buf)
3628c2ecf20Sopenharmony_ci		return -ENOMEM;
3638c2ecf20Sopenharmony_ci
3648c2ecf20Sopenharmony_ci	if (key_type)
3658c2ecf20Sopenharmony_ci		strcpy(derived_buf, "AUTH_KEY");
3668c2ecf20Sopenharmony_ci	else
3678c2ecf20Sopenharmony_ci		strcpy(derived_buf, "ENC_KEY");
3688c2ecf20Sopenharmony_ci
3698c2ecf20Sopenharmony_ci	memcpy(derived_buf + strlen(derived_buf) + 1, master_key,
3708c2ecf20Sopenharmony_ci	       master_keylen);
3718c2ecf20Sopenharmony_ci	ret = crypto_shash_tfm_digest(hash_tfm, derived_buf, derived_buf_len,
3728c2ecf20Sopenharmony_ci				      derived_key);
3738c2ecf20Sopenharmony_ci	kfree_sensitive(derived_buf);
3748c2ecf20Sopenharmony_ci	return ret;
3758c2ecf20Sopenharmony_ci}
3768c2ecf20Sopenharmony_ci
3778c2ecf20Sopenharmony_cistatic struct skcipher_request *init_skcipher_req(const u8 *key,
3788c2ecf20Sopenharmony_ci						  unsigned int key_len)
3798c2ecf20Sopenharmony_ci{
3808c2ecf20Sopenharmony_ci	struct skcipher_request *req;
3818c2ecf20Sopenharmony_ci	struct crypto_skcipher *tfm;
3828c2ecf20Sopenharmony_ci	int ret;
3838c2ecf20Sopenharmony_ci
3848c2ecf20Sopenharmony_ci	tfm = crypto_alloc_skcipher(blkcipher_alg, 0, CRYPTO_ALG_ASYNC);
3858c2ecf20Sopenharmony_ci	if (IS_ERR(tfm)) {
3868c2ecf20Sopenharmony_ci		pr_err("encrypted_key: failed to load %s transform (%ld)\n",
3878c2ecf20Sopenharmony_ci		       blkcipher_alg, PTR_ERR(tfm));
3888c2ecf20Sopenharmony_ci		return ERR_CAST(tfm);
3898c2ecf20Sopenharmony_ci	}
3908c2ecf20Sopenharmony_ci
3918c2ecf20Sopenharmony_ci	ret = crypto_skcipher_setkey(tfm, key, key_len);
3928c2ecf20Sopenharmony_ci	if (ret < 0) {
3938c2ecf20Sopenharmony_ci		pr_err("encrypted_key: failed to setkey (%d)\n", ret);
3948c2ecf20Sopenharmony_ci		crypto_free_skcipher(tfm);
3958c2ecf20Sopenharmony_ci		return ERR_PTR(ret);
3968c2ecf20Sopenharmony_ci	}
3978c2ecf20Sopenharmony_ci
3988c2ecf20Sopenharmony_ci	req = skcipher_request_alloc(tfm, GFP_KERNEL);
3998c2ecf20Sopenharmony_ci	if (!req) {
4008c2ecf20Sopenharmony_ci		pr_err("encrypted_key: failed to allocate request for %s\n",
4018c2ecf20Sopenharmony_ci		       blkcipher_alg);
4028c2ecf20Sopenharmony_ci		crypto_free_skcipher(tfm);
4038c2ecf20Sopenharmony_ci		return ERR_PTR(-ENOMEM);
4048c2ecf20Sopenharmony_ci	}
4058c2ecf20Sopenharmony_ci
4068c2ecf20Sopenharmony_ci	skcipher_request_set_callback(req, 0, NULL, NULL);
4078c2ecf20Sopenharmony_ci	return req;
4088c2ecf20Sopenharmony_ci}
4098c2ecf20Sopenharmony_ci
4108c2ecf20Sopenharmony_cistatic struct key *request_master_key(struct encrypted_key_payload *epayload,
4118c2ecf20Sopenharmony_ci				      const u8 **master_key, size_t *master_keylen)
4128c2ecf20Sopenharmony_ci{
4138c2ecf20Sopenharmony_ci	struct key *mkey = ERR_PTR(-EINVAL);
4148c2ecf20Sopenharmony_ci
4158c2ecf20Sopenharmony_ci	if (!strncmp(epayload->master_desc, KEY_TRUSTED_PREFIX,
4168c2ecf20Sopenharmony_ci		     KEY_TRUSTED_PREFIX_LEN)) {
4178c2ecf20Sopenharmony_ci		mkey = request_trusted_key(epayload->master_desc +
4188c2ecf20Sopenharmony_ci					   KEY_TRUSTED_PREFIX_LEN,
4198c2ecf20Sopenharmony_ci					   master_key, master_keylen);
4208c2ecf20Sopenharmony_ci	} else if (!strncmp(epayload->master_desc, KEY_USER_PREFIX,
4218c2ecf20Sopenharmony_ci			    KEY_USER_PREFIX_LEN)) {
4228c2ecf20Sopenharmony_ci		mkey = request_user_key(epayload->master_desc +
4238c2ecf20Sopenharmony_ci					KEY_USER_PREFIX_LEN,
4248c2ecf20Sopenharmony_ci					master_key, master_keylen);
4258c2ecf20Sopenharmony_ci	} else
4268c2ecf20Sopenharmony_ci		goto out;
4278c2ecf20Sopenharmony_ci
4288c2ecf20Sopenharmony_ci	if (IS_ERR(mkey)) {
4298c2ecf20Sopenharmony_ci		int ret = PTR_ERR(mkey);
4308c2ecf20Sopenharmony_ci
4318c2ecf20Sopenharmony_ci		if (ret == -ENOTSUPP)
4328c2ecf20Sopenharmony_ci			pr_info("encrypted_key: key %s not supported",
4338c2ecf20Sopenharmony_ci				epayload->master_desc);
4348c2ecf20Sopenharmony_ci		else
4358c2ecf20Sopenharmony_ci			pr_info("encrypted_key: key %s not found",
4368c2ecf20Sopenharmony_ci				epayload->master_desc);
4378c2ecf20Sopenharmony_ci		goto out;
4388c2ecf20Sopenharmony_ci	}
4398c2ecf20Sopenharmony_ci
4408c2ecf20Sopenharmony_ci	dump_master_key(*master_key, *master_keylen);
4418c2ecf20Sopenharmony_ciout:
4428c2ecf20Sopenharmony_ci	return mkey;
4438c2ecf20Sopenharmony_ci}
4448c2ecf20Sopenharmony_ci
4458c2ecf20Sopenharmony_ci/* Before returning data to userspace, encrypt decrypted data. */
4468c2ecf20Sopenharmony_cistatic int derived_key_encrypt(struct encrypted_key_payload *epayload,
4478c2ecf20Sopenharmony_ci			       const u8 *derived_key,
4488c2ecf20Sopenharmony_ci			       unsigned int derived_keylen)
4498c2ecf20Sopenharmony_ci{
4508c2ecf20Sopenharmony_ci	struct scatterlist sg_in[2];
4518c2ecf20Sopenharmony_ci	struct scatterlist sg_out[1];
4528c2ecf20Sopenharmony_ci	struct crypto_skcipher *tfm;
4538c2ecf20Sopenharmony_ci	struct skcipher_request *req;
4548c2ecf20Sopenharmony_ci	unsigned int encrypted_datalen;
4558c2ecf20Sopenharmony_ci	u8 iv[AES_BLOCK_SIZE];
4568c2ecf20Sopenharmony_ci	int ret;
4578c2ecf20Sopenharmony_ci
4588c2ecf20Sopenharmony_ci	encrypted_datalen = roundup(epayload->decrypted_datalen, blksize);
4598c2ecf20Sopenharmony_ci
4608c2ecf20Sopenharmony_ci	req = init_skcipher_req(derived_key, derived_keylen);
4618c2ecf20Sopenharmony_ci	ret = PTR_ERR(req);
4628c2ecf20Sopenharmony_ci	if (IS_ERR(req))
4638c2ecf20Sopenharmony_ci		goto out;
4648c2ecf20Sopenharmony_ci	dump_decrypted_data(epayload);
4658c2ecf20Sopenharmony_ci
4668c2ecf20Sopenharmony_ci	sg_init_table(sg_in, 2);
4678c2ecf20Sopenharmony_ci	sg_set_buf(&sg_in[0], epayload->decrypted_data,
4688c2ecf20Sopenharmony_ci		   epayload->decrypted_datalen);
4698c2ecf20Sopenharmony_ci	sg_set_page(&sg_in[1], ZERO_PAGE(0), AES_BLOCK_SIZE, 0);
4708c2ecf20Sopenharmony_ci
4718c2ecf20Sopenharmony_ci	sg_init_table(sg_out, 1);
4728c2ecf20Sopenharmony_ci	sg_set_buf(sg_out, epayload->encrypted_data, encrypted_datalen);
4738c2ecf20Sopenharmony_ci
4748c2ecf20Sopenharmony_ci	memcpy(iv, epayload->iv, sizeof(iv));
4758c2ecf20Sopenharmony_ci	skcipher_request_set_crypt(req, sg_in, sg_out, encrypted_datalen, iv);
4768c2ecf20Sopenharmony_ci	ret = crypto_skcipher_encrypt(req);
4778c2ecf20Sopenharmony_ci	tfm = crypto_skcipher_reqtfm(req);
4788c2ecf20Sopenharmony_ci	skcipher_request_free(req);
4798c2ecf20Sopenharmony_ci	crypto_free_skcipher(tfm);
4808c2ecf20Sopenharmony_ci	if (ret < 0)
4818c2ecf20Sopenharmony_ci		pr_err("encrypted_key: failed to encrypt (%d)\n", ret);
4828c2ecf20Sopenharmony_ci	else
4838c2ecf20Sopenharmony_ci		dump_encrypted_data(epayload, encrypted_datalen);
4848c2ecf20Sopenharmony_ciout:
4858c2ecf20Sopenharmony_ci	return ret;
4868c2ecf20Sopenharmony_ci}
4878c2ecf20Sopenharmony_ci
4888c2ecf20Sopenharmony_cistatic int datablob_hmac_append(struct encrypted_key_payload *epayload,
4898c2ecf20Sopenharmony_ci				const u8 *master_key, size_t master_keylen)
4908c2ecf20Sopenharmony_ci{
4918c2ecf20Sopenharmony_ci	u8 derived_key[HASH_SIZE];
4928c2ecf20Sopenharmony_ci	u8 *digest;
4938c2ecf20Sopenharmony_ci	int ret;
4948c2ecf20Sopenharmony_ci
4958c2ecf20Sopenharmony_ci	ret = get_derived_key(derived_key, AUTH_KEY, master_key, master_keylen);
4968c2ecf20Sopenharmony_ci	if (ret < 0)
4978c2ecf20Sopenharmony_ci		goto out;
4988c2ecf20Sopenharmony_ci
4998c2ecf20Sopenharmony_ci	digest = epayload->format + epayload->datablob_len;
5008c2ecf20Sopenharmony_ci	ret = calc_hmac(digest, derived_key, sizeof derived_key,
5018c2ecf20Sopenharmony_ci			epayload->format, epayload->datablob_len);
5028c2ecf20Sopenharmony_ci	if (!ret)
5038c2ecf20Sopenharmony_ci		dump_hmac(NULL, digest, HASH_SIZE);
5048c2ecf20Sopenharmony_ciout:
5058c2ecf20Sopenharmony_ci	memzero_explicit(derived_key, sizeof(derived_key));
5068c2ecf20Sopenharmony_ci	return ret;
5078c2ecf20Sopenharmony_ci}
5088c2ecf20Sopenharmony_ci
5098c2ecf20Sopenharmony_ci/* verify HMAC before decrypting encrypted key */
5108c2ecf20Sopenharmony_cistatic int datablob_hmac_verify(struct encrypted_key_payload *epayload,
5118c2ecf20Sopenharmony_ci				const u8 *format, const u8 *master_key,
5128c2ecf20Sopenharmony_ci				size_t master_keylen)
5138c2ecf20Sopenharmony_ci{
5148c2ecf20Sopenharmony_ci	u8 derived_key[HASH_SIZE];
5158c2ecf20Sopenharmony_ci	u8 digest[HASH_SIZE];
5168c2ecf20Sopenharmony_ci	int ret;
5178c2ecf20Sopenharmony_ci	char *p;
5188c2ecf20Sopenharmony_ci	unsigned short len;
5198c2ecf20Sopenharmony_ci
5208c2ecf20Sopenharmony_ci	ret = get_derived_key(derived_key, AUTH_KEY, master_key, master_keylen);
5218c2ecf20Sopenharmony_ci	if (ret < 0)
5228c2ecf20Sopenharmony_ci		goto out;
5238c2ecf20Sopenharmony_ci
5248c2ecf20Sopenharmony_ci	len = epayload->datablob_len;
5258c2ecf20Sopenharmony_ci	if (!format) {
5268c2ecf20Sopenharmony_ci		p = epayload->master_desc;
5278c2ecf20Sopenharmony_ci		len -= strlen(epayload->format) + 1;
5288c2ecf20Sopenharmony_ci	} else
5298c2ecf20Sopenharmony_ci		p = epayload->format;
5308c2ecf20Sopenharmony_ci
5318c2ecf20Sopenharmony_ci	ret = calc_hmac(digest, derived_key, sizeof derived_key, p, len);
5328c2ecf20Sopenharmony_ci	if (ret < 0)
5338c2ecf20Sopenharmony_ci		goto out;
5348c2ecf20Sopenharmony_ci	ret = crypto_memneq(digest, epayload->format + epayload->datablob_len,
5358c2ecf20Sopenharmony_ci			    sizeof(digest));
5368c2ecf20Sopenharmony_ci	if (ret) {
5378c2ecf20Sopenharmony_ci		ret = -EINVAL;
5388c2ecf20Sopenharmony_ci		dump_hmac("datablob",
5398c2ecf20Sopenharmony_ci			  epayload->format + epayload->datablob_len,
5408c2ecf20Sopenharmony_ci			  HASH_SIZE);
5418c2ecf20Sopenharmony_ci		dump_hmac("calc", digest, HASH_SIZE);
5428c2ecf20Sopenharmony_ci	}
5438c2ecf20Sopenharmony_ciout:
5448c2ecf20Sopenharmony_ci	memzero_explicit(derived_key, sizeof(derived_key));
5458c2ecf20Sopenharmony_ci	return ret;
5468c2ecf20Sopenharmony_ci}
5478c2ecf20Sopenharmony_ci
5488c2ecf20Sopenharmony_cistatic int derived_key_decrypt(struct encrypted_key_payload *epayload,
5498c2ecf20Sopenharmony_ci			       const u8 *derived_key,
5508c2ecf20Sopenharmony_ci			       unsigned int derived_keylen)
5518c2ecf20Sopenharmony_ci{
5528c2ecf20Sopenharmony_ci	struct scatterlist sg_in[1];
5538c2ecf20Sopenharmony_ci	struct scatterlist sg_out[2];
5548c2ecf20Sopenharmony_ci	struct crypto_skcipher *tfm;
5558c2ecf20Sopenharmony_ci	struct skcipher_request *req;
5568c2ecf20Sopenharmony_ci	unsigned int encrypted_datalen;
5578c2ecf20Sopenharmony_ci	u8 iv[AES_BLOCK_SIZE];
5588c2ecf20Sopenharmony_ci	u8 *pad;
5598c2ecf20Sopenharmony_ci	int ret;
5608c2ecf20Sopenharmony_ci
5618c2ecf20Sopenharmony_ci	/* Throwaway buffer to hold the unused zero padding at the end */
5628c2ecf20Sopenharmony_ci	pad = kmalloc(AES_BLOCK_SIZE, GFP_KERNEL);
5638c2ecf20Sopenharmony_ci	if (!pad)
5648c2ecf20Sopenharmony_ci		return -ENOMEM;
5658c2ecf20Sopenharmony_ci
5668c2ecf20Sopenharmony_ci	encrypted_datalen = roundup(epayload->decrypted_datalen, blksize);
5678c2ecf20Sopenharmony_ci	req = init_skcipher_req(derived_key, derived_keylen);
5688c2ecf20Sopenharmony_ci	ret = PTR_ERR(req);
5698c2ecf20Sopenharmony_ci	if (IS_ERR(req))
5708c2ecf20Sopenharmony_ci		goto out;
5718c2ecf20Sopenharmony_ci	dump_encrypted_data(epayload, encrypted_datalen);
5728c2ecf20Sopenharmony_ci
5738c2ecf20Sopenharmony_ci	sg_init_table(sg_in, 1);
5748c2ecf20Sopenharmony_ci	sg_init_table(sg_out, 2);
5758c2ecf20Sopenharmony_ci	sg_set_buf(sg_in, epayload->encrypted_data, encrypted_datalen);
5768c2ecf20Sopenharmony_ci	sg_set_buf(&sg_out[0], epayload->decrypted_data,
5778c2ecf20Sopenharmony_ci		   epayload->decrypted_datalen);
5788c2ecf20Sopenharmony_ci	sg_set_buf(&sg_out[1], pad, AES_BLOCK_SIZE);
5798c2ecf20Sopenharmony_ci
5808c2ecf20Sopenharmony_ci	memcpy(iv, epayload->iv, sizeof(iv));
5818c2ecf20Sopenharmony_ci	skcipher_request_set_crypt(req, sg_in, sg_out, encrypted_datalen, iv);
5828c2ecf20Sopenharmony_ci	ret = crypto_skcipher_decrypt(req);
5838c2ecf20Sopenharmony_ci	tfm = crypto_skcipher_reqtfm(req);
5848c2ecf20Sopenharmony_ci	skcipher_request_free(req);
5858c2ecf20Sopenharmony_ci	crypto_free_skcipher(tfm);
5868c2ecf20Sopenharmony_ci	if (ret < 0)
5878c2ecf20Sopenharmony_ci		goto out;
5888c2ecf20Sopenharmony_ci	dump_decrypted_data(epayload);
5898c2ecf20Sopenharmony_ciout:
5908c2ecf20Sopenharmony_ci	kfree(pad);
5918c2ecf20Sopenharmony_ci	return ret;
5928c2ecf20Sopenharmony_ci}
5938c2ecf20Sopenharmony_ci
5948c2ecf20Sopenharmony_ci/* Allocate memory for decrypted key and datablob. */
5958c2ecf20Sopenharmony_cistatic struct encrypted_key_payload *encrypted_key_alloc(struct key *key,
5968c2ecf20Sopenharmony_ci							 const char *format,
5978c2ecf20Sopenharmony_ci							 const char *master_desc,
5988c2ecf20Sopenharmony_ci							 const char *datalen)
5998c2ecf20Sopenharmony_ci{
6008c2ecf20Sopenharmony_ci	struct encrypted_key_payload *epayload = NULL;
6018c2ecf20Sopenharmony_ci	unsigned short datablob_len;
6028c2ecf20Sopenharmony_ci	unsigned short decrypted_datalen;
6038c2ecf20Sopenharmony_ci	unsigned short payload_datalen;
6048c2ecf20Sopenharmony_ci	unsigned int encrypted_datalen;
6058c2ecf20Sopenharmony_ci	unsigned int format_len;
6068c2ecf20Sopenharmony_ci	long dlen;
6078c2ecf20Sopenharmony_ci	int ret;
6088c2ecf20Sopenharmony_ci
6098c2ecf20Sopenharmony_ci	ret = kstrtol(datalen, 10, &dlen);
6108c2ecf20Sopenharmony_ci	if (ret < 0 || dlen < MIN_DATA_SIZE || dlen > MAX_DATA_SIZE)
6118c2ecf20Sopenharmony_ci		return ERR_PTR(-EINVAL);
6128c2ecf20Sopenharmony_ci
6138c2ecf20Sopenharmony_ci	format_len = (!format) ? strlen(key_format_default) : strlen(format);
6148c2ecf20Sopenharmony_ci	decrypted_datalen = dlen;
6158c2ecf20Sopenharmony_ci	payload_datalen = decrypted_datalen;
6168c2ecf20Sopenharmony_ci	if (format) {
6178c2ecf20Sopenharmony_ci		if (!strcmp(format, key_format_ecryptfs)) {
6188c2ecf20Sopenharmony_ci			if (dlen != ECRYPTFS_MAX_KEY_BYTES) {
6198c2ecf20Sopenharmony_ci				pr_err("encrypted_key: keylen for the ecryptfs format must be equal to %d bytes\n",
6208c2ecf20Sopenharmony_ci					ECRYPTFS_MAX_KEY_BYTES);
6218c2ecf20Sopenharmony_ci				return ERR_PTR(-EINVAL);
6228c2ecf20Sopenharmony_ci			}
6238c2ecf20Sopenharmony_ci			decrypted_datalen = ECRYPTFS_MAX_KEY_BYTES;
6248c2ecf20Sopenharmony_ci			payload_datalen = sizeof(struct ecryptfs_auth_tok);
6258c2ecf20Sopenharmony_ci		} else if (!strcmp(format, key_format_enc32)) {
6268c2ecf20Sopenharmony_ci			if (decrypted_datalen != KEY_ENC32_PAYLOAD_LEN) {
6278c2ecf20Sopenharmony_ci				pr_err("encrypted_key: enc32 key payload incorrect length: %d\n",
6288c2ecf20Sopenharmony_ci						decrypted_datalen);
6298c2ecf20Sopenharmony_ci				return ERR_PTR(-EINVAL);
6308c2ecf20Sopenharmony_ci			}
6318c2ecf20Sopenharmony_ci		}
6328c2ecf20Sopenharmony_ci	}
6338c2ecf20Sopenharmony_ci
6348c2ecf20Sopenharmony_ci	encrypted_datalen = roundup(decrypted_datalen, blksize);
6358c2ecf20Sopenharmony_ci
6368c2ecf20Sopenharmony_ci	datablob_len = format_len + 1 + strlen(master_desc) + 1
6378c2ecf20Sopenharmony_ci	    + strlen(datalen) + 1 + ivsize + 1 + encrypted_datalen;
6388c2ecf20Sopenharmony_ci
6398c2ecf20Sopenharmony_ci	ret = key_payload_reserve(key, payload_datalen + datablob_len
6408c2ecf20Sopenharmony_ci				  + HASH_SIZE + 1);
6418c2ecf20Sopenharmony_ci	if (ret < 0)
6428c2ecf20Sopenharmony_ci		return ERR_PTR(ret);
6438c2ecf20Sopenharmony_ci
6448c2ecf20Sopenharmony_ci	epayload = kzalloc(sizeof(*epayload) + payload_datalen +
6458c2ecf20Sopenharmony_ci			   datablob_len + HASH_SIZE + 1, GFP_KERNEL);
6468c2ecf20Sopenharmony_ci	if (!epayload)
6478c2ecf20Sopenharmony_ci		return ERR_PTR(-ENOMEM);
6488c2ecf20Sopenharmony_ci
6498c2ecf20Sopenharmony_ci	epayload->payload_datalen = payload_datalen;
6508c2ecf20Sopenharmony_ci	epayload->decrypted_datalen = decrypted_datalen;
6518c2ecf20Sopenharmony_ci	epayload->datablob_len = datablob_len;
6528c2ecf20Sopenharmony_ci	return epayload;
6538c2ecf20Sopenharmony_ci}
6548c2ecf20Sopenharmony_ci
6558c2ecf20Sopenharmony_cistatic int encrypted_key_decrypt(struct encrypted_key_payload *epayload,
6568c2ecf20Sopenharmony_ci				 const char *format, const char *hex_encoded_iv)
6578c2ecf20Sopenharmony_ci{
6588c2ecf20Sopenharmony_ci	struct key *mkey;
6598c2ecf20Sopenharmony_ci	u8 derived_key[HASH_SIZE];
6608c2ecf20Sopenharmony_ci	const u8 *master_key;
6618c2ecf20Sopenharmony_ci	u8 *hmac;
6628c2ecf20Sopenharmony_ci	const char *hex_encoded_data;
6638c2ecf20Sopenharmony_ci	unsigned int encrypted_datalen;
6648c2ecf20Sopenharmony_ci	size_t master_keylen;
6658c2ecf20Sopenharmony_ci	size_t asciilen;
6668c2ecf20Sopenharmony_ci	int ret;
6678c2ecf20Sopenharmony_ci
6688c2ecf20Sopenharmony_ci	encrypted_datalen = roundup(epayload->decrypted_datalen, blksize);
6698c2ecf20Sopenharmony_ci	asciilen = (ivsize + 1 + encrypted_datalen + HASH_SIZE) * 2;
6708c2ecf20Sopenharmony_ci	if (strlen(hex_encoded_iv) != asciilen)
6718c2ecf20Sopenharmony_ci		return -EINVAL;
6728c2ecf20Sopenharmony_ci
6738c2ecf20Sopenharmony_ci	hex_encoded_data = hex_encoded_iv + (2 * ivsize) + 2;
6748c2ecf20Sopenharmony_ci	ret = hex2bin(epayload->iv, hex_encoded_iv, ivsize);
6758c2ecf20Sopenharmony_ci	if (ret < 0)
6768c2ecf20Sopenharmony_ci		return -EINVAL;
6778c2ecf20Sopenharmony_ci	ret = hex2bin(epayload->encrypted_data, hex_encoded_data,
6788c2ecf20Sopenharmony_ci		      encrypted_datalen);
6798c2ecf20Sopenharmony_ci	if (ret < 0)
6808c2ecf20Sopenharmony_ci		return -EINVAL;
6818c2ecf20Sopenharmony_ci
6828c2ecf20Sopenharmony_ci	hmac = epayload->format + epayload->datablob_len;
6838c2ecf20Sopenharmony_ci	ret = hex2bin(hmac, hex_encoded_data + (encrypted_datalen * 2),
6848c2ecf20Sopenharmony_ci		      HASH_SIZE);
6858c2ecf20Sopenharmony_ci	if (ret < 0)
6868c2ecf20Sopenharmony_ci		return -EINVAL;
6878c2ecf20Sopenharmony_ci
6888c2ecf20Sopenharmony_ci	mkey = request_master_key(epayload, &master_key, &master_keylen);
6898c2ecf20Sopenharmony_ci	if (IS_ERR(mkey))
6908c2ecf20Sopenharmony_ci		return PTR_ERR(mkey);
6918c2ecf20Sopenharmony_ci
6928c2ecf20Sopenharmony_ci	ret = datablob_hmac_verify(epayload, format, master_key, master_keylen);
6938c2ecf20Sopenharmony_ci	if (ret < 0) {
6948c2ecf20Sopenharmony_ci		pr_err("encrypted_key: bad hmac (%d)\n", ret);
6958c2ecf20Sopenharmony_ci		goto out;
6968c2ecf20Sopenharmony_ci	}
6978c2ecf20Sopenharmony_ci
6988c2ecf20Sopenharmony_ci	ret = get_derived_key(derived_key, ENC_KEY, master_key, master_keylen);
6998c2ecf20Sopenharmony_ci	if (ret < 0)
7008c2ecf20Sopenharmony_ci		goto out;
7018c2ecf20Sopenharmony_ci
7028c2ecf20Sopenharmony_ci	ret = derived_key_decrypt(epayload, derived_key, sizeof derived_key);
7038c2ecf20Sopenharmony_ci	if (ret < 0)
7048c2ecf20Sopenharmony_ci		pr_err("encrypted_key: failed to decrypt key (%d)\n", ret);
7058c2ecf20Sopenharmony_ciout:
7068c2ecf20Sopenharmony_ci	up_read(&mkey->sem);
7078c2ecf20Sopenharmony_ci	key_put(mkey);
7088c2ecf20Sopenharmony_ci	memzero_explicit(derived_key, sizeof(derived_key));
7098c2ecf20Sopenharmony_ci	return ret;
7108c2ecf20Sopenharmony_ci}
7118c2ecf20Sopenharmony_ci
7128c2ecf20Sopenharmony_cistatic void __ekey_init(struct encrypted_key_payload *epayload,
7138c2ecf20Sopenharmony_ci			const char *format, const char *master_desc,
7148c2ecf20Sopenharmony_ci			const char *datalen)
7158c2ecf20Sopenharmony_ci{
7168c2ecf20Sopenharmony_ci	unsigned int format_len;
7178c2ecf20Sopenharmony_ci
7188c2ecf20Sopenharmony_ci	format_len = (!format) ? strlen(key_format_default) : strlen(format);
7198c2ecf20Sopenharmony_ci	epayload->format = epayload->payload_data + epayload->payload_datalen;
7208c2ecf20Sopenharmony_ci	epayload->master_desc = epayload->format + format_len + 1;
7218c2ecf20Sopenharmony_ci	epayload->datalen = epayload->master_desc + strlen(master_desc) + 1;
7228c2ecf20Sopenharmony_ci	epayload->iv = epayload->datalen + strlen(datalen) + 1;
7238c2ecf20Sopenharmony_ci	epayload->encrypted_data = epayload->iv + ivsize + 1;
7248c2ecf20Sopenharmony_ci	epayload->decrypted_data = epayload->payload_data;
7258c2ecf20Sopenharmony_ci
7268c2ecf20Sopenharmony_ci	if (!format)
7278c2ecf20Sopenharmony_ci		memcpy(epayload->format, key_format_default, format_len);
7288c2ecf20Sopenharmony_ci	else {
7298c2ecf20Sopenharmony_ci		if (!strcmp(format, key_format_ecryptfs))
7308c2ecf20Sopenharmony_ci			epayload->decrypted_data =
7318c2ecf20Sopenharmony_ci				ecryptfs_get_auth_tok_key((struct ecryptfs_auth_tok *)epayload->payload_data);
7328c2ecf20Sopenharmony_ci
7338c2ecf20Sopenharmony_ci		memcpy(epayload->format, format, format_len);
7348c2ecf20Sopenharmony_ci	}
7358c2ecf20Sopenharmony_ci
7368c2ecf20Sopenharmony_ci	memcpy(epayload->master_desc, master_desc, strlen(master_desc));
7378c2ecf20Sopenharmony_ci	memcpy(epayload->datalen, datalen, strlen(datalen));
7388c2ecf20Sopenharmony_ci}
7398c2ecf20Sopenharmony_ci
7408c2ecf20Sopenharmony_ci/*
7418c2ecf20Sopenharmony_ci * encrypted_init - initialize an encrypted key
7428c2ecf20Sopenharmony_ci *
7438c2ecf20Sopenharmony_ci * For a new key, use a random number for both the iv and data
7448c2ecf20Sopenharmony_ci * itself.  For an old key, decrypt the hex encoded data.
7458c2ecf20Sopenharmony_ci */
7468c2ecf20Sopenharmony_cistatic int encrypted_init(struct encrypted_key_payload *epayload,
7478c2ecf20Sopenharmony_ci			  const char *key_desc, const char *format,
7488c2ecf20Sopenharmony_ci			  const char *master_desc, const char *datalen,
7498c2ecf20Sopenharmony_ci			  const char *hex_encoded_iv)
7508c2ecf20Sopenharmony_ci{
7518c2ecf20Sopenharmony_ci	int ret = 0;
7528c2ecf20Sopenharmony_ci
7538c2ecf20Sopenharmony_ci	if (format && !strcmp(format, key_format_ecryptfs)) {
7548c2ecf20Sopenharmony_ci		ret = valid_ecryptfs_desc(key_desc);
7558c2ecf20Sopenharmony_ci		if (ret < 0)
7568c2ecf20Sopenharmony_ci			return ret;
7578c2ecf20Sopenharmony_ci
7588c2ecf20Sopenharmony_ci		ecryptfs_fill_auth_tok((struct ecryptfs_auth_tok *)epayload->payload_data,
7598c2ecf20Sopenharmony_ci				       key_desc);
7608c2ecf20Sopenharmony_ci	}
7618c2ecf20Sopenharmony_ci
7628c2ecf20Sopenharmony_ci	__ekey_init(epayload, format, master_desc, datalen);
7638c2ecf20Sopenharmony_ci	if (!hex_encoded_iv) {
7648c2ecf20Sopenharmony_ci		get_random_bytes(epayload->iv, ivsize);
7658c2ecf20Sopenharmony_ci
7668c2ecf20Sopenharmony_ci		get_random_bytes(epayload->decrypted_data,
7678c2ecf20Sopenharmony_ci				 epayload->decrypted_datalen);
7688c2ecf20Sopenharmony_ci	} else
7698c2ecf20Sopenharmony_ci		ret = encrypted_key_decrypt(epayload, format, hex_encoded_iv);
7708c2ecf20Sopenharmony_ci	return ret;
7718c2ecf20Sopenharmony_ci}
7728c2ecf20Sopenharmony_ci
7738c2ecf20Sopenharmony_ci/*
7748c2ecf20Sopenharmony_ci * encrypted_instantiate - instantiate an encrypted key
7758c2ecf20Sopenharmony_ci *
7768c2ecf20Sopenharmony_ci * Decrypt an existing encrypted datablob or create a new encrypted key
7778c2ecf20Sopenharmony_ci * based on a kernel random number.
7788c2ecf20Sopenharmony_ci *
7798c2ecf20Sopenharmony_ci * On success, return 0. Otherwise return errno.
7808c2ecf20Sopenharmony_ci */
7818c2ecf20Sopenharmony_cistatic int encrypted_instantiate(struct key *key,
7828c2ecf20Sopenharmony_ci				 struct key_preparsed_payload *prep)
7838c2ecf20Sopenharmony_ci{
7848c2ecf20Sopenharmony_ci	struct encrypted_key_payload *epayload = NULL;
7858c2ecf20Sopenharmony_ci	char *datablob = NULL;
7868c2ecf20Sopenharmony_ci	const char *format = NULL;
7878c2ecf20Sopenharmony_ci	char *master_desc = NULL;
7888c2ecf20Sopenharmony_ci	char *decrypted_datalen = NULL;
7898c2ecf20Sopenharmony_ci	char *hex_encoded_iv = NULL;
7908c2ecf20Sopenharmony_ci	size_t datalen = prep->datalen;
7918c2ecf20Sopenharmony_ci	int ret;
7928c2ecf20Sopenharmony_ci
7938c2ecf20Sopenharmony_ci	if (datalen <= 0 || datalen > 32767 || !prep->data)
7948c2ecf20Sopenharmony_ci		return -EINVAL;
7958c2ecf20Sopenharmony_ci
7968c2ecf20Sopenharmony_ci	datablob = kmalloc(datalen + 1, GFP_KERNEL);
7978c2ecf20Sopenharmony_ci	if (!datablob)
7988c2ecf20Sopenharmony_ci		return -ENOMEM;
7998c2ecf20Sopenharmony_ci	datablob[datalen] = 0;
8008c2ecf20Sopenharmony_ci	memcpy(datablob, prep->data, datalen);
8018c2ecf20Sopenharmony_ci	ret = datablob_parse(datablob, &format, &master_desc,
8028c2ecf20Sopenharmony_ci			     &decrypted_datalen, &hex_encoded_iv);
8038c2ecf20Sopenharmony_ci	if (ret < 0)
8048c2ecf20Sopenharmony_ci		goto out;
8058c2ecf20Sopenharmony_ci
8068c2ecf20Sopenharmony_ci	epayload = encrypted_key_alloc(key, format, master_desc,
8078c2ecf20Sopenharmony_ci				       decrypted_datalen);
8088c2ecf20Sopenharmony_ci	if (IS_ERR(epayload)) {
8098c2ecf20Sopenharmony_ci		ret = PTR_ERR(epayload);
8108c2ecf20Sopenharmony_ci		goto out;
8118c2ecf20Sopenharmony_ci	}
8128c2ecf20Sopenharmony_ci	ret = encrypted_init(epayload, key->description, format, master_desc,
8138c2ecf20Sopenharmony_ci			     decrypted_datalen, hex_encoded_iv);
8148c2ecf20Sopenharmony_ci	if (ret < 0) {
8158c2ecf20Sopenharmony_ci		kfree_sensitive(epayload);
8168c2ecf20Sopenharmony_ci		goto out;
8178c2ecf20Sopenharmony_ci	}
8188c2ecf20Sopenharmony_ci
8198c2ecf20Sopenharmony_ci	rcu_assign_keypointer(key, epayload);
8208c2ecf20Sopenharmony_ciout:
8218c2ecf20Sopenharmony_ci	kfree_sensitive(datablob);
8228c2ecf20Sopenharmony_ci	return ret;
8238c2ecf20Sopenharmony_ci}
8248c2ecf20Sopenharmony_ci
8258c2ecf20Sopenharmony_cistatic void encrypted_rcu_free(struct rcu_head *rcu)
8268c2ecf20Sopenharmony_ci{
8278c2ecf20Sopenharmony_ci	struct encrypted_key_payload *epayload;
8288c2ecf20Sopenharmony_ci
8298c2ecf20Sopenharmony_ci	epayload = container_of(rcu, struct encrypted_key_payload, rcu);
8308c2ecf20Sopenharmony_ci	kfree_sensitive(epayload);
8318c2ecf20Sopenharmony_ci}
8328c2ecf20Sopenharmony_ci
8338c2ecf20Sopenharmony_ci/*
8348c2ecf20Sopenharmony_ci * encrypted_update - update the master key description
8358c2ecf20Sopenharmony_ci *
8368c2ecf20Sopenharmony_ci * Change the master key description for an existing encrypted key.
8378c2ecf20Sopenharmony_ci * The next read will return an encrypted datablob using the new
8388c2ecf20Sopenharmony_ci * master key description.
8398c2ecf20Sopenharmony_ci *
8408c2ecf20Sopenharmony_ci * On success, return 0. Otherwise return errno.
8418c2ecf20Sopenharmony_ci */
8428c2ecf20Sopenharmony_cistatic int encrypted_update(struct key *key, struct key_preparsed_payload *prep)
8438c2ecf20Sopenharmony_ci{
8448c2ecf20Sopenharmony_ci	struct encrypted_key_payload *epayload = key->payload.data[0];
8458c2ecf20Sopenharmony_ci	struct encrypted_key_payload *new_epayload;
8468c2ecf20Sopenharmony_ci	char *buf;
8478c2ecf20Sopenharmony_ci	char *new_master_desc = NULL;
8488c2ecf20Sopenharmony_ci	const char *format = NULL;
8498c2ecf20Sopenharmony_ci	size_t datalen = prep->datalen;
8508c2ecf20Sopenharmony_ci	int ret = 0;
8518c2ecf20Sopenharmony_ci
8528c2ecf20Sopenharmony_ci	if (key_is_negative(key))
8538c2ecf20Sopenharmony_ci		return -ENOKEY;
8548c2ecf20Sopenharmony_ci	if (datalen <= 0 || datalen > 32767 || !prep->data)
8558c2ecf20Sopenharmony_ci		return -EINVAL;
8568c2ecf20Sopenharmony_ci
8578c2ecf20Sopenharmony_ci	buf = kmalloc(datalen + 1, GFP_KERNEL);
8588c2ecf20Sopenharmony_ci	if (!buf)
8598c2ecf20Sopenharmony_ci		return -ENOMEM;
8608c2ecf20Sopenharmony_ci
8618c2ecf20Sopenharmony_ci	buf[datalen] = 0;
8628c2ecf20Sopenharmony_ci	memcpy(buf, prep->data, datalen);
8638c2ecf20Sopenharmony_ci	ret = datablob_parse(buf, &format, &new_master_desc, NULL, NULL);
8648c2ecf20Sopenharmony_ci	if (ret < 0)
8658c2ecf20Sopenharmony_ci		goto out;
8668c2ecf20Sopenharmony_ci
8678c2ecf20Sopenharmony_ci	ret = valid_master_desc(new_master_desc, epayload->master_desc);
8688c2ecf20Sopenharmony_ci	if (ret < 0)
8698c2ecf20Sopenharmony_ci		goto out;
8708c2ecf20Sopenharmony_ci
8718c2ecf20Sopenharmony_ci	new_epayload = encrypted_key_alloc(key, epayload->format,
8728c2ecf20Sopenharmony_ci					   new_master_desc, epayload->datalen);
8738c2ecf20Sopenharmony_ci	if (IS_ERR(new_epayload)) {
8748c2ecf20Sopenharmony_ci		ret = PTR_ERR(new_epayload);
8758c2ecf20Sopenharmony_ci		goto out;
8768c2ecf20Sopenharmony_ci	}
8778c2ecf20Sopenharmony_ci
8788c2ecf20Sopenharmony_ci	__ekey_init(new_epayload, epayload->format, new_master_desc,
8798c2ecf20Sopenharmony_ci		    epayload->datalen);
8808c2ecf20Sopenharmony_ci
8818c2ecf20Sopenharmony_ci	memcpy(new_epayload->iv, epayload->iv, ivsize);
8828c2ecf20Sopenharmony_ci	memcpy(new_epayload->payload_data, epayload->payload_data,
8838c2ecf20Sopenharmony_ci	       epayload->payload_datalen);
8848c2ecf20Sopenharmony_ci
8858c2ecf20Sopenharmony_ci	rcu_assign_keypointer(key, new_epayload);
8868c2ecf20Sopenharmony_ci	call_rcu(&epayload->rcu, encrypted_rcu_free);
8878c2ecf20Sopenharmony_ciout:
8888c2ecf20Sopenharmony_ci	kfree_sensitive(buf);
8898c2ecf20Sopenharmony_ci	return ret;
8908c2ecf20Sopenharmony_ci}
8918c2ecf20Sopenharmony_ci
8928c2ecf20Sopenharmony_ci/*
8938c2ecf20Sopenharmony_ci * encrypted_read - format and copy out the encrypted data
8948c2ecf20Sopenharmony_ci *
8958c2ecf20Sopenharmony_ci * The resulting datablob format is:
8968c2ecf20Sopenharmony_ci * <master-key name> <decrypted data length> <encrypted iv> <encrypted data>
8978c2ecf20Sopenharmony_ci *
8988c2ecf20Sopenharmony_ci * On success, return to userspace the encrypted key datablob size.
8998c2ecf20Sopenharmony_ci */
9008c2ecf20Sopenharmony_cistatic long encrypted_read(const struct key *key, char *buffer,
9018c2ecf20Sopenharmony_ci			   size_t buflen)
9028c2ecf20Sopenharmony_ci{
9038c2ecf20Sopenharmony_ci	struct encrypted_key_payload *epayload;
9048c2ecf20Sopenharmony_ci	struct key *mkey;
9058c2ecf20Sopenharmony_ci	const u8 *master_key;
9068c2ecf20Sopenharmony_ci	size_t master_keylen;
9078c2ecf20Sopenharmony_ci	char derived_key[HASH_SIZE];
9088c2ecf20Sopenharmony_ci	char *ascii_buf;
9098c2ecf20Sopenharmony_ci	size_t asciiblob_len;
9108c2ecf20Sopenharmony_ci	int ret;
9118c2ecf20Sopenharmony_ci
9128c2ecf20Sopenharmony_ci	epayload = dereference_key_locked(key);
9138c2ecf20Sopenharmony_ci
9148c2ecf20Sopenharmony_ci	/* returns the hex encoded iv, encrypted-data, and hmac as ascii */
9158c2ecf20Sopenharmony_ci	asciiblob_len = epayload->datablob_len + ivsize + 1
9168c2ecf20Sopenharmony_ci	    + roundup(epayload->decrypted_datalen, blksize)
9178c2ecf20Sopenharmony_ci	    + (HASH_SIZE * 2);
9188c2ecf20Sopenharmony_ci
9198c2ecf20Sopenharmony_ci	if (!buffer || buflen < asciiblob_len)
9208c2ecf20Sopenharmony_ci		return asciiblob_len;
9218c2ecf20Sopenharmony_ci
9228c2ecf20Sopenharmony_ci	mkey = request_master_key(epayload, &master_key, &master_keylen);
9238c2ecf20Sopenharmony_ci	if (IS_ERR(mkey))
9248c2ecf20Sopenharmony_ci		return PTR_ERR(mkey);
9258c2ecf20Sopenharmony_ci
9268c2ecf20Sopenharmony_ci	ret = get_derived_key(derived_key, ENC_KEY, master_key, master_keylen);
9278c2ecf20Sopenharmony_ci	if (ret < 0)
9288c2ecf20Sopenharmony_ci		goto out;
9298c2ecf20Sopenharmony_ci
9308c2ecf20Sopenharmony_ci	ret = derived_key_encrypt(epayload, derived_key, sizeof derived_key);
9318c2ecf20Sopenharmony_ci	if (ret < 0)
9328c2ecf20Sopenharmony_ci		goto out;
9338c2ecf20Sopenharmony_ci
9348c2ecf20Sopenharmony_ci	ret = datablob_hmac_append(epayload, master_key, master_keylen);
9358c2ecf20Sopenharmony_ci	if (ret < 0)
9368c2ecf20Sopenharmony_ci		goto out;
9378c2ecf20Sopenharmony_ci
9388c2ecf20Sopenharmony_ci	ascii_buf = datablob_format(epayload, asciiblob_len);
9398c2ecf20Sopenharmony_ci	if (!ascii_buf) {
9408c2ecf20Sopenharmony_ci		ret = -ENOMEM;
9418c2ecf20Sopenharmony_ci		goto out;
9428c2ecf20Sopenharmony_ci	}
9438c2ecf20Sopenharmony_ci
9448c2ecf20Sopenharmony_ci	up_read(&mkey->sem);
9458c2ecf20Sopenharmony_ci	key_put(mkey);
9468c2ecf20Sopenharmony_ci	memzero_explicit(derived_key, sizeof(derived_key));
9478c2ecf20Sopenharmony_ci
9488c2ecf20Sopenharmony_ci	memcpy(buffer, ascii_buf, asciiblob_len);
9498c2ecf20Sopenharmony_ci	kfree_sensitive(ascii_buf);
9508c2ecf20Sopenharmony_ci
9518c2ecf20Sopenharmony_ci	return asciiblob_len;
9528c2ecf20Sopenharmony_ciout:
9538c2ecf20Sopenharmony_ci	up_read(&mkey->sem);
9548c2ecf20Sopenharmony_ci	key_put(mkey);
9558c2ecf20Sopenharmony_ci	memzero_explicit(derived_key, sizeof(derived_key));
9568c2ecf20Sopenharmony_ci	return ret;
9578c2ecf20Sopenharmony_ci}
9588c2ecf20Sopenharmony_ci
9598c2ecf20Sopenharmony_ci/*
9608c2ecf20Sopenharmony_ci * encrypted_destroy - clear and free the key's payload
9618c2ecf20Sopenharmony_ci */
9628c2ecf20Sopenharmony_cistatic void encrypted_destroy(struct key *key)
9638c2ecf20Sopenharmony_ci{
9648c2ecf20Sopenharmony_ci	kfree_sensitive(key->payload.data[0]);
9658c2ecf20Sopenharmony_ci}
9668c2ecf20Sopenharmony_ci
9678c2ecf20Sopenharmony_cistruct key_type key_type_encrypted = {
9688c2ecf20Sopenharmony_ci	.name = "encrypted",
9698c2ecf20Sopenharmony_ci	.instantiate = encrypted_instantiate,
9708c2ecf20Sopenharmony_ci	.update = encrypted_update,
9718c2ecf20Sopenharmony_ci	.destroy = encrypted_destroy,
9728c2ecf20Sopenharmony_ci	.describe = user_describe,
9738c2ecf20Sopenharmony_ci	.read = encrypted_read,
9748c2ecf20Sopenharmony_ci};
9758c2ecf20Sopenharmony_ciEXPORT_SYMBOL_GPL(key_type_encrypted);
9768c2ecf20Sopenharmony_ci
9778c2ecf20Sopenharmony_cistatic int __init init_encrypted(void)
9788c2ecf20Sopenharmony_ci{
9798c2ecf20Sopenharmony_ci	int ret;
9808c2ecf20Sopenharmony_ci
9818c2ecf20Sopenharmony_ci	hash_tfm = crypto_alloc_shash(hash_alg, 0, 0);
9828c2ecf20Sopenharmony_ci	if (IS_ERR(hash_tfm)) {
9838c2ecf20Sopenharmony_ci		pr_err("encrypted_key: can't allocate %s transform: %ld\n",
9848c2ecf20Sopenharmony_ci		       hash_alg, PTR_ERR(hash_tfm));
9858c2ecf20Sopenharmony_ci		return PTR_ERR(hash_tfm);
9868c2ecf20Sopenharmony_ci	}
9878c2ecf20Sopenharmony_ci
9888c2ecf20Sopenharmony_ci	ret = aes_get_sizes();
9898c2ecf20Sopenharmony_ci	if (ret < 0)
9908c2ecf20Sopenharmony_ci		goto out;
9918c2ecf20Sopenharmony_ci	ret = register_key_type(&key_type_encrypted);
9928c2ecf20Sopenharmony_ci	if (ret < 0)
9938c2ecf20Sopenharmony_ci		goto out;
9948c2ecf20Sopenharmony_ci	return 0;
9958c2ecf20Sopenharmony_ciout:
9968c2ecf20Sopenharmony_ci	crypto_free_shash(hash_tfm);
9978c2ecf20Sopenharmony_ci	return ret;
9988c2ecf20Sopenharmony_ci
9998c2ecf20Sopenharmony_ci}
10008c2ecf20Sopenharmony_ci
10018c2ecf20Sopenharmony_cistatic void __exit cleanup_encrypted(void)
10028c2ecf20Sopenharmony_ci{
10038c2ecf20Sopenharmony_ci	crypto_free_shash(hash_tfm);
10048c2ecf20Sopenharmony_ci	unregister_key_type(&key_type_encrypted);
10058c2ecf20Sopenharmony_ci}
10068c2ecf20Sopenharmony_ci
10078c2ecf20Sopenharmony_cilate_initcall(init_encrypted);
10088c2ecf20Sopenharmony_cimodule_exit(cleanup_encrypted);
10098c2ecf20Sopenharmony_ci
10108c2ecf20Sopenharmony_ciMODULE_LICENSE("GPL");
1011