162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later 262306a36Sopenharmony_ci/* XTS: as defined in IEEE1619/D16 362306a36Sopenharmony_ci * http://grouper.ieee.org/groups/1619/email/pdf00086.pdf 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * Copyright (c) 2007 Rik Snel <rsnel@cube.dyndns.org> 662306a36Sopenharmony_ci * 762306a36Sopenharmony_ci * Based on ecb.c 862306a36Sopenharmony_ci * Copyright (c) 2006 Herbert Xu <herbert@gondor.apana.org.au> 962306a36Sopenharmony_ci */ 1062306a36Sopenharmony_ci#include <crypto/internal/cipher.h> 1162306a36Sopenharmony_ci#include <crypto/internal/skcipher.h> 1262306a36Sopenharmony_ci#include <crypto/scatterwalk.h> 1362306a36Sopenharmony_ci#include <linux/err.h> 1462306a36Sopenharmony_ci#include <linux/init.h> 1562306a36Sopenharmony_ci#include <linux/kernel.h> 1662306a36Sopenharmony_ci#include <linux/module.h> 1762306a36Sopenharmony_ci#include <linux/scatterlist.h> 1862306a36Sopenharmony_ci#include <linux/slab.h> 1962306a36Sopenharmony_ci 2062306a36Sopenharmony_ci#include <crypto/xts.h> 2162306a36Sopenharmony_ci#include <crypto/b128ops.h> 2262306a36Sopenharmony_ci#include <crypto/gf128mul.h> 2362306a36Sopenharmony_ci 2462306a36Sopenharmony_cistruct xts_tfm_ctx { 2562306a36Sopenharmony_ci struct crypto_skcipher *child; 2662306a36Sopenharmony_ci struct crypto_cipher *tweak; 2762306a36Sopenharmony_ci}; 2862306a36Sopenharmony_ci 2962306a36Sopenharmony_cistruct xts_instance_ctx { 3062306a36Sopenharmony_ci struct crypto_skcipher_spawn spawn; 3162306a36Sopenharmony_ci struct crypto_cipher_spawn tweak_spawn; 3262306a36Sopenharmony_ci}; 3362306a36Sopenharmony_ci 3462306a36Sopenharmony_cistruct xts_request_ctx { 3562306a36Sopenharmony_ci le128 t; 3662306a36Sopenharmony_ci struct scatterlist *tail; 3762306a36Sopenharmony_ci struct scatterlist sg[2]; 3862306a36Sopenharmony_ci struct skcipher_request subreq; 3962306a36Sopenharmony_ci}; 4062306a36Sopenharmony_ci 4162306a36Sopenharmony_cistatic int xts_setkey(struct crypto_skcipher *parent, const u8 *key, 4262306a36Sopenharmony_ci unsigned int keylen) 4362306a36Sopenharmony_ci{ 4462306a36Sopenharmony_ci struct xts_tfm_ctx *ctx = crypto_skcipher_ctx(parent); 4562306a36Sopenharmony_ci struct crypto_skcipher *child; 4662306a36Sopenharmony_ci struct crypto_cipher *tweak; 4762306a36Sopenharmony_ci int err; 4862306a36Sopenharmony_ci 4962306a36Sopenharmony_ci err = xts_verify_key(parent, key, keylen); 5062306a36Sopenharmony_ci if (err) 5162306a36Sopenharmony_ci return err; 5262306a36Sopenharmony_ci 5362306a36Sopenharmony_ci keylen /= 2; 5462306a36Sopenharmony_ci 5562306a36Sopenharmony_ci /* we need two cipher instances: one to compute the initial 'tweak' 5662306a36Sopenharmony_ci * by encrypting the IV (usually the 'plain' iv) and the other 5762306a36Sopenharmony_ci * one to encrypt and decrypt the data */ 5862306a36Sopenharmony_ci 5962306a36Sopenharmony_ci /* tweak cipher, uses Key2 i.e. the second half of *key */ 6062306a36Sopenharmony_ci tweak = ctx->tweak; 6162306a36Sopenharmony_ci crypto_cipher_clear_flags(tweak, CRYPTO_TFM_REQ_MASK); 6262306a36Sopenharmony_ci crypto_cipher_set_flags(tweak, crypto_skcipher_get_flags(parent) & 6362306a36Sopenharmony_ci CRYPTO_TFM_REQ_MASK); 6462306a36Sopenharmony_ci err = crypto_cipher_setkey(tweak, key + keylen, keylen); 6562306a36Sopenharmony_ci if (err) 6662306a36Sopenharmony_ci return err; 6762306a36Sopenharmony_ci 6862306a36Sopenharmony_ci /* data cipher, uses Key1 i.e. the first half of *key */ 6962306a36Sopenharmony_ci child = ctx->child; 7062306a36Sopenharmony_ci crypto_skcipher_clear_flags(child, CRYPTO_TFM_REQ_MASK); 7162306a36Sopenharmony_ci crypto_skcipher_set_flags(child, crypto_skcipher_get_flags(parent) & 7262306a36Sopenharmony_ci CRYPTO_TFM_REQ_MASK); 7362306a36Sopenharmony_ci return crypto_skcipher_setkey(child, key, keylen); 7462306a36Sopenharmony_ci} 7562306a36Sopenharmony_ci 7662306a36Sopenharmony_ci/* 7762306a36Sopenharmony_ci * We compute the tweak masks twice (both before and after the ECB encryption or 7862306a36Sopenharmony_ci * decryption) to avoid having to allocate a temporary buffer and/or make 7962306a36Sopenharmony_ci * mutliple calls to the 'ecb(..)' instance, which usually would be slower than 8062306a36Sopenharmony_ci * just doing the gf128mul_x_ble() calls again. 8162306a36Sopenharmony_ci */ 8262306a36Sopenharmony_cistatic int xts_xor_tweak(struct skcipher_request *req, bool second_pass, 8362306a36Sopenharmony_ci bool enc) 8462306a36Sopenharmony_ci{ 8562306a36Sopenharmony_ci struct xts_request_ctx *rctx = skcipher_request_ctx(req); 8662306a36Sopenharmony_ci struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); 8762306a36Sopenharmony_ci const bool cts = (req->cryptlen % XTS_BLOCK_SIZE); 8862306a36Sopenharmony_ci const int bs = XTS_BLOCK_SIZE; 8962306a36Sopenharmony_ci struct skcipher_walk w; 9062306a36Sopenharmony_ci le128 t = rctx->t; 9162306a36Sopenharmony_ci int err; 9262306a36Sopenharmony_ci 9362306a36Sopenharmony_ci if (second_pass) { 9462306a36Sopenharmony_ci req = &rctx->subreq; 9562306a36Sopenharmony_ci /* set to our TFM to enforce correct alignment: */ 9662306a36Sopenharmony_ci skcipher_request_set_tfm(req, tfm); 9762306a36Sopenharmony_ci } 9862306a36Sopenharmony_ci err = skcipher_walk_virt(&w, req, false); 9962306a36Sopenharmony_ci 10062306a36Sopenharmony_ci while (w.nbytes) { 10162306a36Sopenharmony_ci unsigned int avail = w.nbytes; 10262306a36Sopenharmony_ci le128 *wsrc; 10362306a36Sopenharmony_ci le128 *wdst; 10462306a36Sopenharmony_ci 10562306a36Sopenharmony_ci wsrc = w.src.virt.addr; 10662306a36Sopenharmony_ci wdst = w.dst.virt.addr; 10762306a36Sopenharmony_ci 10862306a36Sopenharmony_ci do { 10962306a36Sopenharmony_ci if (unlikely(cts) && 11062306a36Sopenharmony_ci w.total - w.nbytes + avail < 2 * XTS_BLOCK_SIZE) { 11162306a36Sopenharmony_ci if (!enc) { 11262306a36Sopenharmony_ci if (second_pass) 11362306a36Sopenharmony_ci rctx->t = t; 11462306a36Sopenharmony_ci gf128mul_x_ble(&t, &t); 11562306a36Sopenharmony_ci } 11662306a36Sopenharmony_ci le128_xor(wdst, &t, wsrc); 11762306a36Sopenharmony_ci if (enc && second_pass) 11862306a36Sopenharmony_ci gf128mul_x_ble(&rctx->t, &t); 11962306a36Sopenharmony_ci skcipher_walk_done(&w, avail - bs); 12062306a36Sopenharmony_ci return 0; 12162306a36Sopenharmony_ci } 12262306a36Sopenharmony_ci 12362306a36Sopenharmony_ci le128_xor(wdst++, &t, wsrc++); 12462306a36Sopenharmony_ci gf128mul_x_ble(&t, &t); 12562306a36Sopenharmony_ci } while ((avail -= bs) >= bs); 12662306a36Sopenharmony_ci 12762306a36Sopenharmony_ci err = skcipher_walk_done(&w, avail); 12862306a36Sopenharmony_ci } 12962306a36Sopenharmony_ci 13062306a36Sopenharmony_ci return err; 13162306a36Sopenharmony_ci} 13262306a36Sopenharmony_ci 13362306a36Sopenharmony_cistatic int xts_xor_tweak_pre(struct skcipher_request *req, bool enc) 13462306a36Sopenharmony_ci{ 13562306a36Sopenharmony_ci return xts_xor_tweak(req, false, enc); 13662306a36Sopenharmony_ci} 13762306a36Sopenharmony_ci 13862306a36Sopenharmony_cistatic int xts_xor_tweak_post(struct skcipher_request *req, bool enc) 13962306a36Sopenharmony_ci{ 14062306a36Sopenharmony_ci return xts_xor_tweak(req, true, enc); 14162306a36Sopenharmony_ci} 14262306a36Sopenharmony_ci 14362306a36Sopenharmony_cistatic void xts_cts_done(void *data, int err) 14462306a36Sopenharmony_ci{ 14562306a36Sopenharmony_ci struct skcipher_request *req = data; 14662306a36Sopenharmony_ci le128 b; 14762306a36Sopenharmony_ci 14862306a36Sopenharmony_ci if (!err) { 14962306a36Sopenharmony_ci struct xts_request_ctx *rctx = skcipher_request_ctx(req); 15062306a36Sopenharmony_ci 15162306a36Sopenharmony_ci scatterwalk_map_and_copy(&b, rctx->tail, 0, XTS_BLOCK_SIZE, 0); 15262306a36Sopenharmony_ci le128_xor(&b, &rctx->t, &b); 15362306a36Sopenharmony_ci scatterwalk_map_and_copy(&b, rctx->tail, 0, XTS_BLOCK_SIZE, 1); 15462306a36Sopenharmony_ci } 15562306a36Sopenharmony_ci 15662306a36Sopenharmony_ci skcipher_request_complete(req, err); 15762306a36Sopenharmony_ci} 15862306a36Sopenharmony_ci 15962306a36Sopenharmony_cistatic int xts_cts_final(struct skcipher_request *req, 16062306a36Sopenharmony_ci int (*crypt)(struct skcipher_request *req)) 16162306a36Sopenharmony_ci{ 16262306a36Sopenharmony_ci const struct xts_tfm_ctx *ctx = 16362306a36Sopenharmony_ci crypto_skcipher_ctx(crypto_skcipher_reqtfm(req)); 16462306a36Sopenharmony_ci int offset = req->cryptlen & ~(XTS_BLOCK_SIZE - 1); 16562306a36Sopenharmony_ci struct xts_request_ctx *rctx = skcipher_request_ctx(req); 16662306a36Sopenharmony_ci struct skcipher_request *subreq = &rctx->subreq; 16762306a36Sopenharmony_ci int tail = req->cryptlen % XTS_BLOCK_SIZE; 16862306a36Sopenharmony_ci le128 b[2]; 16962306a36Sopenharmony_ci int err; 17062306a36Sopenharmony_ci 17162306a36Sopenharmony_ci rctx->tail = scatterwalk_ffwd(rctx->sg, req->dst, 17262306a36Sopenharmony_ci offset - XTS_BLOCK_SIZE); 17362306a36Sopenharmony_ci 17462306a36Sopenharmony_ci scatterwalk_map_and_copy(b, rctx->tail, 0, XTS_BLOCK_SIZE, 0); 17562306a36Sopenharmony_ci b[1] = b[0]; 17662306a36Sopenharmony_ci scatterwalk_map_and_copy(b, req->src, offset, tail, 0); 17762306a36Sopenharmony_ci 17862306a36Sopenharmony_ci le128_xor(b, &rctx->t, b); 17962306a36Sopenharmony_ci 18062306a36Sopenharmony_ci scatterwalk_map_and_copy(b, rctx->tail, 0, XTS_BLOCK_SIZE + tail, 1); 18162306a36Sopenharmony_ci 18262306a36Sopenharmony_ci skcipher_request_set_tfm(subreq, ctx->child); 18362306a36Sopenharmony_ci skcipher_request_set_callback(subreq, req->base.flags, xts_cts_done, 18462306a36Sopenharmony_ci req); 18562306a36Sopenharmony_ci skcipher_request_set_crypt(subreq, rctx->tail, rctx->tail, 18662306a36Sopenharmony_ci XTS_BLOCK_SIZE, NULL); 18762306a36Sopenharmony_ci 18862306a36Sopenharmony_ci err = crypt(subreq); 18962306a36Sopenharmony_ci if (err) 19062306a36Sopenharmony_ci return err; 19162306a36Sopenharmony_ci 19262306a36Sopenharmony_ci scatterwalk_map_and_copy(b, rctx->tail, 0, XTS_BLOCK_SIZE, 0); 19362306a36Sopenharmony_ci le128_xor(b, &rctx->t, b); 19462306a36Sopenharmony_ci scatterwalk_map_and_copy(b, rctx->tail, 0, XTS_BLOCK_SIZE, 1); 19562306a36Sopenharmony_ci 19662306a36Sopenharmony_ci return 0; 19762306a36Sopenharmony_ci} 19862306a36Sopenharmony_ci 19962306a36Sopenharmony_cistatic void xts_encrypt_done(void *data, int err) 20062306a36Sopenharmony_ci{ 20162306a36Sopenharmony_ci struct skcipher_request *req = data; 20262306a36Sopenharmony_ci 20362306a36Sopenharmony_ci if (!err) { 20462306a36Sopenharmony_ci struct xts_request_ctx *rctx = skcipher_request_ctx(req); 20562306a36Sopenharmony_ci 20662306a36Sopenharmony_ci rctx->subreq.base.flags &= CRYPTO_TFM_REQ_MAY_BACKLOG; 20762306a36Sopenharmony_ci err = xts_xor_tweak_post(req, true); 20862306a36Sopenharmony_ci 20962306a36Sopenharmony_ci if (!err && unlikely(req->cryptlen % XTS_BLOCK_SIZE)) { 21062306a36Sopenharmony_ci err = xts_cts_final(req, crypto_skcipher_encrypt); 21162306a36Sopenharmony_ci if (err == -EINPROGRESS || err == -EBUSY) 21262306a36Sopenharmony_ci return; 21362306a36Sopenharmony_ci } 21462306a36Sopenharmony_ci } 21562306a36Sopenharmony_ci 21662306a36Sopenharmony_ci skcipher_request_complete(req, err); 21762306a36Sopenharmony_ci} 21862306a36Sopenharmony_ci 21962306a36Sopenharmony_cistatic void xts_decrypt_done(void *data, int err) 22062306a36Sopenharmony_ci{ 22162306a36Sopenharmony_ci struct skcipher_request *req = data; 22262306a36Sopenharmony_ci 22362306a36Sopenharmony_ci if (!err) { 22462306a36Sopenharmony_ci struct xts_request_ctx *rctx = skcipher_request_ctx(req); 22562306a36Sopenharmony_ci 22662306a36Sopenharmony_ci rctx->subreq.base.flags &= CRYPTO_TFM_REQ_MAY_BACKLOG; 22762306a36Sopenharmony_ci err = xts_xor_tweak_post(req, false); 22862306a36Sopenharmony_ci 22962306a36Sopenharmony_ci if (!err && unlikely(req->cryptlen % XTS_BLOCK_SIZE)) { 23062306a36Sopenharmony_ci err = xts_cts_final(req, crypto_skcipher_decrypt); 23162306a36Sopenharmony_ci if (err == -EINPROGRESS || err == -EBUSY) 23262306a36Sopenharmony_ci return; 23362306a36Sopenharmony_ci } 23462306a36Sopenharmony_ci } 23562306a36Sopenharmony_ci 23662306a36Sopenharmony_ci skcipher_request_complete(req, err); 23762306a36Sopenharmony_ci} 23862306a36Sopenharmony_ci 23962306a36Sopenharmony_cistatic int xts_init_crypt(struct skcipher_request *req, 24062306a36Sopenharmony_ci crypto_completion_t compl) 24162306a36Sopenharmony_ci{ 24262306a36Sopenharmony_ci const struct xts_tfm_ctx *ctx = 24362306a36Sopenharmony_ci crypto_skcipher_ctx(crypto_skcipher_reqtfm(req)); 24462306a36Sopenharmony_ci struct xts_request_ctx *rctx = skcipher_request_ctx(req); 24562306a36Sopenharmony_ci struct skcipher_request *subreq = &rctx->subreq; 24662306a36Sopenharmony_ci 24762306a36Sopenharmony_ci if (req->cryptlen < XTS_BLOCK_SIZE) 24862306a36Sopenharmony_ci return -EINVAL; 24962306a36Sopenharmony_ci 25062306a36Sopenharmony_ci skcipher_request_set_tfm(subreq, ctx->child); 25162306a36Sopenharmony_ci skcipher_request_set_callback(subreq, req->base.flags, compl, req); 25262306a36Sopenharmony_ci skcipher_request_set_crypt(subreq, req->dst, req->dst, 25362306a36Sopenharmony_ci req->cryptlen & ~(XTS_BLOCK_SIZE - 1), NULL); 25462306a36Sopenharmony_ci 25562306a36Sopenharmony_ci /* calculate first value of T */ 25662306a36Sopenharmony_ci crypto_cipher_encrypt_one(ctx->tweak, (u8 *)&rctx->t, req->iv); 25762306a36Sopenharmony_ci 25862306a36Sopenharmony_ci return 0; 25962306a36Sopenharmony_ci} 26062306a36Sopenharmony_ci 26162306a36Sopenharmony_cistatic int xts_encrypt(struct skcipher_request *req) 26262306a36Sopenharmony_ci{ 26362306a36Sopenharmony_ci struct xts_request_ctx *rctx = skcipher_request_ctx(req); 26462306a36Sopenharmony_ci struct skcipher_request *subreq = &rctx->subreq; 26562306a36Sopenharmony_ci int err; 26662306a36Sopenharmony_ci 26762306a36Sopenharmony_ci err = xts_init_crypt(req, xts_encrypt_done) ?: 26862306a36Sopenharmony_ci xts_xor_tweak_pre(req, true) ?: 26962306a36Sopenharmony_ci crypto_skcipher_encrypt(subreq) ?: 27062306a36Sopenharmony_ci xts_xor_tweak_post(req, true); 27162306a36Sopenharmony_ci 27262306a36Sopenharmony_ci if (err || likely((req->cryptlen % XTS_BLOCK_SIZE) == 0)) 27362306a36Sopenharmony_ci return err; 27462306a36Sopenharmony_ci 27562306a36Sopenharmony_ci return xts_cts_final(req, crypto_skcipher_encrypt); 27662306a36Sopenharmony_ci} 27762306a36Sopenharmony_ci 27862306a36Sopenharmony_cistatic int xts_decrypt(struct skcipher_request *req) 27962306a36Sopenharmony_ci{ 28062306a36Sopenharmony_ci struct xts_request_ctx *rctx = skcipher_request_ctx(req); 28162306a36Sopenharmony_ci struct skcipher_request *subreq = &rctx->subreq; 28262306a36Sopenharmony_ci int err; 28362306a36Sopenharmony_ci 28462306a36Sopenharmony_ci err = xts_init_crypt(req, xts_decrypt_done) ?: 28562306a36Sopenharmony_ci xts_xor_tweak_pre(req, false) ?: 28662306a36Sopenharmony_ci crypto_skcipher_decrypt(subreq) ?: 28762306a36Sopenharmony_ci xts_xor_tweak_post(req, false); 28862306a36Sopenharmony_ci 28962306a36Sopenharmony_ci if (err || likely((req->cryptlen % XTS_BLOCK_SIZE) == 0)) 29062306a36Sopenharmony_ci return err; 29162306a36Sopenharmony_ci 29262306a36Sopenharmony_ci return xts_cts_final(req, crypto_skcipher_decrypt); 29362306a36Sopenharmony_ci} 29462306a36Sopenharmony_ci 29562306a36Sopenharmony_cistatic int xts_init_tfm(struct crypto_skcipher *tfm) 29662306a36Sopenharmony_ci{ 29762306a36Sopenharmony_ci struct skcipher_instance *inst = skcipher_alg_instance(tfm); 29862306a36Sopenharmony_ci struct xts_instance_ctx *ictx = skcipher_instance_ctx(inst); 29962306a36Sopenharmony_ci struct xts_tfm_ctx *ctx = crypto_skcipher_ctx(tfm); 30062306a36Sopenharmony_ci struct crypto_skcipher *child; 30162306a36Sopenharmony_ci struct crypto_cipher *tweak; 30262306a36Sopenharmony_ci 30362306a36Sopenharmony_ci child = crypto_spawn_skcipher(&ictx->spawn); 30462306a36Sopenharmony_ci if (IS_ERR(child)) 30562306a36Sopenharmony_ci return PTR_ERR(child); 30662306a36Sopenharmony_ci 30762306a36Sopenharmony_ci ctx->child = child; 30862306a36Sopenharmony_ci 30962306a36Sopenharmony_ci tweak = crypto_spawn_cipher(&ictx->tweak_spawn); 31062306a36Sopenharmony_ci if (IS_ERR(tweak)) { 31162306a36Sopenharmony_ci crypto_free_skcipher(ctx->child); 31262306a36Sopenharmony_ci return PTR_ERR(tweak); 31362306a36Sopenharmony_ci } 31462306a36Sopenharmony_ci 31562306a36Sopenharmony_ci ctx->tweak = tweak; 31662306a36Sopenharmony_ci 31762306a36Sopenharmony_ci crypto_skcipher_set_reqsize(tfm, crypto_skcipher_reqsize(child) + 31862306a36Sopenharmony_ci sizeof(struct xts_request_ctx)); 31962306a36Sopenharmony_ci 32062306a36Sopenharmony_ci return 0; 32162306a36Sopenharmony_ci} 32262306a36Sopenharmony_ci 32362306a36Sopenharmony_cistatic void xts_exit_tfm(struct crypto_skcipher *tfm) 32462306a36Sopenharmony_ci{ 32562306a36Sopenharmony_ci struct xts_tfm_ctx *ctx = crypto_skcipher_ctx(tfm); 32662306a36Sopenharmony_ci 32762306a36Sopenharmony_ci crypto_free_skcipher(ctx->child); 32862306a36Sopenharmony_ci crypto_free_cipher(ctx->tweak); 32962306a36Sopenharmony_ci} 33062306a36Sopenharmony_ci 33162306a36Sopenharmony_cistatic void xts_free_instance(struct skcipher_instance *inst) 33262306a36Sopenharmony_ci{ 33362306a36Sopenharmony_ci struct xts_instance_ctx *ictx = skcipher_instance_ctx(inst); 33462306a36Sopenharmony_ci 33562306a36Sopenharmony_ci crypto_drop_skcipher(&ictx->spawn); 33662306a36Sopenharmony_ci crypto_drop_cipher(&ictx->tweak_spawn); 33762306a36Sopenharmony_ci kfree(inst); 33862306a36Sopenharmony_ci} 33962306a36Sopenharmony_ci 34062306a36Sopenharmony_cistatic int xts_create(struct crypto_template *tmpl, struct rtattr **tb) 34162306a36Sopenharmony_ci{ 34262306a36Sopenharmony_ci char name[CRYPTO_MAX_ALG_NAME]; 34362306a36Sopenharmony_ci struct skcipher_instance *inst; 34462306a36Sopenharmony_ci struct xts_instance_ctx *ctx; 34562306a36Sopenharmony_ci struct skcipher_alg *alg; 34662306a36Sopenharmony_ci const char *cipher_name; 34762306a36Sopenharmony_ci u32 mask; 34862306a36Sopenharmony_ci int err; 34962306a36Sopenharmony_ci 35062306a36Sopenharmony_ci err = crypto_check_attr_type(tb, CRYPTO_ALG_TYPE_SKCIPHER, &mask); 35162306a36Sopenharmony_ci if (err) 35262306a36Sopenharmony_ci return err; 35362306a36Sopenharmony_ci 35462306a36Sopenharmony_ci cipher_name = crypto_attr_alg_name(tb[1]); 35562306a36Sopenharmony_ci if (IS_ERR(cipher_name)) 35662306a36Sopenharmony_ci return PTR_ERR(cipher_name); 35762306a36Sopenharmony_ci 35862306a36Sopenharmony_ci inst = kzalloc(sizeof(*inst) + sizeof(*ctx), GFP_KERNEL); 35962306a36Sopenharmony_ci if (!inst) 36062306a36Sopenharmony_ci return -ENOMEM; 36162306a36Sopenharmony_ci 36262306a36Sopenharmony_ci ctx = skcipher_instance_ctx(inst); 36362306a36Sopenharmony_ci 36462306a36Sopenharmony_ci err = crypto_grab_skcipher(&ctx->spawn, skcipher_crypto_instance(inst), 36562306a36Sopenharmony_ci cipher_name, 0, mask); 36662306a36Sopenharmony_ci if (err == -ENOENT) { 36762306a36Sopenharmony_ci err = -ENAMETOOLONG; 36862306a36Sopenharmony_ci if (snprintf(name, CRYPTO_MAX_ALG_NAME, "ecb(%s)", 36962306a36Sopenharmony_ci cipher_name) >= CRYPTO_MAX_ALG_NAME) 37062306a36Sopenharmony_ci goto err_free_inst; 37162306a36Sopenharmony_ci 37262306a36Sopenharmony_ci err = crypto_grab_skcipher(&ctx->spawn, 37362306a36Sopenharmony_ci skcipher_crypto_instance(inst), 37462306a36Sopenharmony_ci name, 0, mask); 37562306a36Sopenharmony_ci } 37662306a36Sopenharmony_ci 37762306a36Sopenharmony_ci if (err) 37862306a36Sopenharmony_ci goto err_free_inst; 37962306a36Sopenharmony_ci 38062306a36Sopenharmony_ci alg = crypto_skcipher_spawn_alg(&ctx->spawn); 38162306a36Sopenharmony_ci 38262306a36Sopenharmony_ci err = -EINVAL; 38362306a36Sopenharmony_ci if (alg->base.cra_blocksize != XTS_BLOCK_SIZE) 38462306a36Sopenharmony_ci goto err_free_inst; 38562306a36Sopenharmony_ci 38662306a36Sopenharmony_ci if (crypto_skcipher_alg_ivsize(alg)) 38762306a36Sopenharmony_ci goto err_free_inst; 38862306a36Sopenharmony_ci 38962306a36Sopenharmony_ci err = crypto_inst_setname(skcipher_crypto_instance(inst), "xts", 39062306a36Sopenharmony_ci &alg->base); 39162306a36Sopenharmony_ci if (err) 39262306a36Sopenharmony_ci goto err_free_inst; 39362306a36Sopenharmony_ci 39462306a36Sopenharmony_ci err = -EINVAL; 39562306a36Sopenharmony_ci cipher_name = alg->base.cra_name; 39662306a36Sopenharmony_ci 39762306a36Sopenharmony_ci /* Alas we screwed up the naming so we have to mangle the 39862306a36Sopenharmony_ci * cipher name. 39962306a36Sopenharmony_ci */ 40062306a36Sopenharmony_ci if (!strncmp(cipher_name, "ecb(", 4)) { 40162306a36Sopenharmony_ci int len; 40262306a36Sopenharmony_ci 40362306a36Sopenharmony_ci len = strscpy(name, cipher_name + 4, sizeof(name)); 40462306a36Sopenharmony_ci if (len < 2) 40562306a36Sopenharmony_ci goto err_free_inst; 40662306a36Sopenharmony_ci 40762306a36Sopenharmony_ci if (name[len - 1] != ')') 40862306a36Sopenharmony_ci goto err_free_inst; 40962306a36Sopenharmony_ci 41062306a36Sopenharmony_ci name[len - 1] = 0; 41162306a36Sopenharmony_ci 41262306a36Sopenharmony_ci if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME, 41362306a36Sopenharmony_ci "xts(%s)", name) >= CRYPTO_MAX_ALG_NAME) { 41462306a36Sopenharmony_ci err = -ENAMETOOLONG; 41562306a36Sopenharmony_ci goto err_free_inst; 41662306a36Sopenharmony_ci } 41762306a36Sopenharmony_ci } else 41862306a36Sopenharmony_ci goto err_free_inst; 41962306a36Sopenharmony_ci 42062306a36Sopenharmony_ci err = crypto_grab_cipher(&ctx->tweak_spawn, 42162306a36Sopenharmony_ci skcipher_crypto_instance(inst), name, 0, mask); 42262306a36Sopenharmony_ci if (err) 42362306a36Sopenharmony_ci goto err_free_inst; 42462306a36Sopenharmony_ci 42562306a36Sopenharmony_ci inst->alg.base.cra_priority = alg->base.cra_priority; 42662306a36Sopenharmony_ci inst->alg.base.cra_blocksize = XTS_BLOCK_SIZE; 42762306a36Sopenharmony_ci inst->alg.base.cra_alignmask = alg->base.cra_alignmask | 42862306a36Sopenharmony_ci (__alignof__(u64) - 1); 42962306a36Sopenharmony_ci 43062306a36Sopenharmony_ci inst->alg.ivsize = XTS_BLOCK_SIZE; 43162306a36Sopenharmony_ci inst->alg.min_keysize = crypto_skcipher_alg_min_keysize(alg) * 2; 43262306a36Sopenharmony_ci inst->alg.max_keysize = crypto_skcipher_alg_max_keysize(alg) * 2; 43362306a36Sopenharmony_ci 43462306a36Sopenharmony_ci inst->alg.base.cra_ctxsize = sizeof(struct xts_tfm_ctx); 43562306a36Sopenharmony_ci 43662306a36Sopenharmony_ci inst->alg.init = xts_init_tfm; 43762306a36Sopenharmony_ci inst->alg.exit = xts_exit_tfm; 43862306a36Sopenharmony_ci 43962306a36Sopenharmony_ci inst->alg.setkey = xts_setkey; 44062306a36Sopenharmony_ci inst->alg.encrypt = xts_encrypt; 44162306a36Sopenharmony_ci inst->alg.decrypt = xts_decrypt; 44262306a36Sopenharmony_ci 44362306a36Sopenharmony_ci inst->free = xts_free_instance; 44462306a36Sopenharmony_ci 44562306a36Sopenharmony_ci err = skcipher_register_instance(tmpl, inst); 44662306a36Sopenharmony_ci if (err) { 44762306a36Sopenharmony_cierr_free_inst: 44862306a36Sopenharmony_ci xts_free_instance(inst); 44962306a36Sopenharmony_ci } 45062306a36Sopenharmony_ci return err; 45162306a36Sopenharmony_ci} 45262306a36Sopenharmony_ci 45362306a36Sopenharmony_cistatic struct crypto_template xts_tmpl = { 45462306a36Sopenharmony_ci .name = "xts", 45562306a36Sopenharmony_ci .create = xts_create, 45662306a36Sopenharmony_ci .module = THIS_MODULE, 45762306a36Sopenharmony_ci}; 45862306a36Sopenharmony_ci 45962306a36Sopenharmony_cistatic int __init xts_module_init(void) 46062306a36Sopenharmony_ci{ 46162306a36Sopenharmony_ci return crypto_register_template(&xts_tmpl); 46262306a36Sopenharmony_ci} 46362306a36Sopenharmony_ci 46462306a36Sopenharmony_cistatic void __exit xts_module_exit(void) 46562306a36Sopenharmony_ci{ 46662306a36Sopenharmony_ci crypto_unregister_template(&xts_tmpl); 46762306a36Sopenharmony_ci} 46862306a36Sopenharmony_ci 46962306a36Sopenharmony_cisubsys_initcall(xts_module_init); 47062306a36Sopenharmony_cimodule_exit(xts_module_exit); 47162306a36Sopenharmony_ci 47262306a36Sopenharmony_ciMODULE_LICENSE("GPL"); 47362306a36Sopenharmony_ciMODULE_DESCRIPTION("XTS block cipher mode"); 47462306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("xts"); 47562306a36Sopenharmony_ciMODULE_IMPORT_NS(CRYPTO_INTERNAL); 47662306a36Sopenharmony_ciMODULE_SOFTDEP("pre: ecb"); 477