xref: /openbmc/linux/crypto/chacha20poly1305.c (revision 255e48eb)
12874c5fdSThomas Gleixner // SPDX-License-Identifier: GPL-2.0-or-later
271ebc4d1SMartin Willi /*
371ebc4d1SMartin Willi  * ChaCha20-Poly1305 AEAD, RFC7539
471ebc4d1SMartin Willi  *
571ebc4d1SMartin Willi  * Copyright (C) 2015 Martin Willi
671ebc4d1SMartin Willi  */
771ebc4d1SMartin Willi 
871ebc4d1SMartin Willi #include <crypto/internal/aead.h>
971ebc4d1SMartin Willi #include <crypto/internal/hash.h>
1071ebc4d1SMartin Willi #include <crypto/internal/skcipher.h>
1171ebc4d1SMartin Willi #include <crypto/scatterwalk.h>
121ca1b917SEric Biggers #include <crypto/chacha.h>
132546f811SMartin Willi #include <crypto/poly1305.h>
1471ebc4d1SMartin Willi #include <linux/err.h>
1571ebc4d1SMartin Willi #include <linux/init.h>
1671ebc4d1SMartin Willi #include <linux/kernel.h>
1771ebc4d1SMartin Willi #include <linux/module.h>
1871ebc4d1SMartin Willi 
1971ebc4d1SMartin Willi struct chachapoly_instance_ctx {
2071ebc4d1SMartin Willi 	struct crypto_skcipher_spawn chacha;
2171ebc4d1SMartin Willi 	struct crypto_ahash_spawn poly;
2271ebc4d1SMartin Willi 	unsigned int saltlen;
2371ebc4d1SMartin Willi };
2471ebc4d1SMartin Willi 
2571ebc4d1SMartin Willi struct chachapoly_ctx {
261e1f0061SHerbert Xu 	struct crypto_skcipher *chacha;
2771ebc4d1SMartin Willi 	struct crypto_ahash *poly;
2871ebc4d1SMartin Willi 	/* key bytes we use for the ChaCha20 IV */
2971ebc4d1SMartin Willi 	unsigned int saltlen;
3071ebc4d1SMartin Willi 	u8 salt[];
3171ebc4d1SMartin Willi };
3271ebc4d1SMartin Willi 
3371ebc4d1SMartin Willi struct poly_req {
3471ebc4d1SMartin Willi 	/* zero byte padding for AD/ciphertext, as needed */
3571ebc4d1SMartin Willi 	u8 pad[POLY1305_BLOCK_SIZE];
3671ebc4d1SMartin Willi 	/* tail data with AD/ciphertext lengths */
3771ebc4d1SMartin Willi 	struct {
3871ebc4d1SMartin Willi 		__le64 assoclen;
3971ebc4d1SMartin Willi 		__le64 cryptlen;
4071ebc4d1SMartin Willi 	} tail;
4171ebc4d1SMartin Willi 	struct scatterlist src[1];
4271ebc4d1SMartin Willi 	struct ahash_request req; /* must be last member */
4371ebc4d1SMartin Willi };
4471ebc4d1SMartin Willi 
4571ebc4d1SMartin Willi struct chacha_req {
461ca1b917SEric Biggers 	u8 iv[CHACHA_IV_SIZE];
4771ebc4d1SMartin Willi 	struct scatterlist src[1];
481e1f0061SHerbert Xu 	struct skcipher_request req; /* must be last member */
4971ebc4d1SMartin Willi };
5071ebc4d1SMartin Willi 
5171ebc4d1SMartin Willi struct chachapoly_req_ctx {
5274790922SHerbert Xu 	struct scatterlist src[2];
5374790922SHerbert Xu 	struct scatterlist dst[2];
54c2b7b20aSMartin Willi 	/* the key we generate for Poly1305 using Chacha20 */
55c2b7b20aSMartin Willi 	u8 key[POLY1305_KEY_SIZE];
5671ebc4d1SMartin Willi 	/* calculated Poly1305 tag */
5771ebc4d1SMartin Willi 	u8 tag[POLY1305_DIGEST_SIZE];
5871ebc4d1SMartin Willi 	/* length of data to en/decrypt, without ICV */
5971ebc4d1SMartin Willi 	unsigned int cryptlen;
6074790922SHerbert Xu 	/* Actual AD, excluding IV */
6174790922SHerbert Xu 	unsigned int assoclen;
627545b6c2SEric Biggers 	/* request flags, with MAY_SLEEP cleared if needed */
637545b6c2SEric Biggers 	u32 flags;
6471ebc4d1SMartin Willi 	union {
6571ebc4d1SMartin Willi 		struct poly_req poly;
6671ebc4d1SMartin Willi 		struct chacha_req chacha;
6771ebc4d1SMartin Willi 	} u;
6871ebc4d1SMartin Willi };
6971ebc4d1SMartin Willi 
async_done_continue(struct aead_request * req,int err,int (* cont)(struct aead_request *))7071ebc4d1SMartin Willi static inline void async_done_continue(struct aead_request *req, int err,
7171ebc4d1SMartin Willi 				       int (*cont)(struct aead_request *))
7271ebc4d1SMartin Willi {
737545b6c2SEric Biggers 	if (!err) {
747545b6c2SEric Biggers 		struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
757545b6c2SEric Biggers 
767545b6c2SEric Biggers 		rctx->flags &= ~CRYPTO_TFM_REQ_MAY_SLEEP;
7771ebc4d1SMartin Willi 		err = cont(req);
787545b6c2SEric Biggers 	}
7971ebc4d1SMartin Willi 
8071ebc4d1SMartin Willi 	if (err != -EINPROGRESS && err != -EBUSY)
8171ebc4d1SMartin Willi 		aead_request_complete(req, err);
8271ebc4d1SMartin Willi }
8371ebc4d1SMartin Willi 
chacha_iv(u8 * iv,struct aead_request * req,u32 icb)8471ebc4d1SMartin Willi static void chacha_iv(u8 *iv, struct aead_request *req, u32 icb)
8571ebc4d1SMartin Willi {
8671ebc4d1SMartin Willi 	struct chachapoly_ctx *ctx = crypto_aead_ctx(crypto_aead_reqtfm(req));
8771ebc4d1SMartin Willi 	__le32 leicb = cpu_to_le32(icb);
8871ebc4d1SMartin Willi 
8971ebc4d1SMartin Willi 	memcpy(iv, &leicb, sizeof(leicb));
9071ebc4d1SMartin Willi 	memcpy(iv + sizeof(leicb), ctx->salt, ctx->saltlen);
9171ebc4d1SMartin Willi 	memcpy(iv + sizeof(leicb) + ctx->saltlen, req->iv,
921ca1b917SEric Biggers 	       CHACHA_IV_SIZE - sizeof(leicb) - ctx->saltlen);
9371ebc4d1SMartin Willi }
9471ebc4d1SMartin Willi 
poly_verify_tag(struct aead_request * req)9571ebc4d1SMartin Willi static int poly_verify_tag(struct aead_request *req)
9671ebc4d1SMartin Willi {
9771ebc4d1SMartin Willi 	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
9871ebc4d1SMartin Willi 	u8 tag[sizeof(rctx->tag)];
9971ebc4d1SMartin Willi 
10074790922SHerbert Xu 	scatterwalk_map_and_copy(tag, req->src,
10174790922SHerbert Xu 				 req->assoclen + rctx->cryptlen,
10274790922SHerbert Xu 				 sizeof(tag), 0);
10371ebc4d1SMartin Willi 	if (crypto_memneq(tag, rctx->tag, sizeof(tag)))
10471ebc4d1SMartin Willi 		return -EBADMSG;
10571ebc4d1SMartin Willi 	return 0;
10671ebc4d1SMartin Willi }
10771ebc4d1SMartin Willi 
poly_copy_tag(struct aead_request * req)10871ebc4d1SMartin Willi static int poly_copy_tag(struct aead_request *req)
10971ebc4d1SMartin Willi {
11071ebc4d1SMartin Willi 	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
11171ebc4d1SMartin Willi 
11274790922SHerbert Xu 	scatterwalk_map_and_copy(rctx->tag, req->dst,
11374790922SHerbert Xu 				 req->assoclen + rctx->cryptlen,
11471ebc4d1SMartin Willi 				 sizeof(rctx->tag), 1);
11571ebc4d1SMartin Willi 	return 0;
11671ebc4d1SMartin Willi }
11771ebc4d1SMartin Willi 
chacha_decrypt_done(void * data,int err)118*255e48ebSHerbert Xu static void chacha_decrypt_done(void *data, int err)
11971ebc4d1SMartin Willi {
120*255e48ebSHerbert Xu 	async_done_continue(data, err, poly_verify_tag);
12171ebc4d1SMartin Willi }
12271ebc4d1SMartin Willi 
chacha_decrypt(struct aead_request * req)12371ebc4d1SMartin Willi static int chacha_decrypt(struct aead_request *req)
12471ebc4d1SMartin Willi {
12571ebc4d1SMartin Willi 	struct chachapoly_ctx *ctx = crypto_aead_ctx(crypto_aead_reqtfm(req));
12671ebc4d1SMartin Willi 	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
12771ebc4d1SMartin Willi 	struct chacha_req *creq = &rctx->u.chacha;
12874790922SHerbert Xu 	struct scatterlist *src, *dst;
12971ebc4d1SMartin Willi 	int err;
13071ebc4d1SMartin Willi 
131161151d7SJason A. Donenfeld 	if (rctx->cryptlen == 0)
132161151d7SJason A. Donenfeld 		goto skip;
133161151d7SJason A. Donenfeld 
13471ebc4d1SMartin Willi 	chacha_iv(creq->iv, req, 1);
13571ebc4d1SMartin Willi 
13674790922SHerbert Xu 	src = scatterwalk_ffwd(rctx->src, req->src, req->assoclen);
13774790922SHerbert Xu 	dst = src;
13876cadf22SEric Biggers 	if (req->src != req->dst)
13974790922SHerbert Xu 		dst = scatterwalk_ffwd(rctx->dst, req->dst, req->assoclen);
14074790922SHerbert Xu 
1417545b6c2SEric Biggers 	skcipher_request_set_callback(&creq->req, rctx->flags,
14271ebc4d1SMartin Willi 				      chacha_decrypt_done, req);
1431e1f0061SHerbert Xu 	skcipher_request_set_tfm(&creq->req, ctx->chacha);
1441e1f0061SHerbert Xu 	skcipher_request_set_crypt(&creq->req, src, dst,
14571ebc4d1SMartin Willi 				   rctx->cryptlen, creq->iv);
1461e1f0061SHerbert Xu 	err = crypto_skcipher_decrypt(&creq->req);
14771ebc4d1SMartin Willi 	if (err)
14871ebc4d1SMartin Willi 		return err;
14971ebc4d1SMartin Willi 
150161151d7SJason A. Donenfeld skip:
15171ebc4d1SMartin Willi 	return poly_verify_tag(req);
15271ebc4d1SMartin Willi }
15371ebc4d1SMartin Willi 
poly_tail_continue(struct aead_request * req)15471ebc4d1SMartin Willi static int poly_tail_continue(struct aead_request *req)
15571ebc4d1SMartin Willi {
15671ebc4d1SMartin Willi 	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
15771ebc4d1SMartin Willi 
15871ebc4d1SMartin Willi 	if (rctx->cryptlen == req->cryptlen) /* encrypting */
15971ebc4d1SMartin Willi 		return poly_copy_tag(req);
16071ebc4d1SMartin Willi 
16171ebc4d1SMartin Willi 	return chacha_decrypt(req);
16271ebc4d1SMartin Willi }
16371ebc4d1SMartin Willi 
poly_tail_done(void * data,int err)164*255e48ebSHerbert Xu static void poly_tail_done(void *data, int err)
16571ebc4d1SMartin Willi {
166*255e48ebSHerbert Xu 	async_done_continue(data, err, poly_tail_continue);
16771ebc4d1SMartin Willi }
16871ebc4d1SMartin Willi 
poly_tail(struct aead_request * req)16971ebc4d1SMartin Willi static int poly_tail(struct aead_request *req)
17071ebc4d1SMartin Willi {
17174790922SHerbert Xu 	struct crypto_aead *tfm = crypto_aead_reqtfm(req);
17274790922SHerbert Xu 	struct chachapoly_ctx *ctx = crypto_aead_ctx(tfm);
17371ebc4d1SMartin Willi 	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
17471ebc4d1SMartin Willi 	struct poly_req *preq = &rctx->u.poly;
17571ebc4d1SMartin Willi 	int err;
17671ebc4d1SMartin Willi 
17776cadf22SEric Biggers 	preq->tail.assoclen = cpu_to_le64(rctx->assoclen);
17876cadf22SEric Biggers 	preq->tail.cryptlen = cpu_to_le64(rctx->cryptlen);
17976cadf22SEric Biggers 	sg_init_one(preq->src, &preq->tail, sizeof(preq->tail));
18071ebc4d1SMartin Willi 
1817545b6c2SEric Biggers 	ahash_request_set_callback(&preq->req, rctx->flags,
18271ebc4d1SMartin Willi 				   poly_tail_done, req);
18371ebc4d1SMartin Willi 	ahash_request_set_tfm(&preq->req, ctx->poly);
18471ebc4d1SMartin Willi 	ahash_request_set_crypt(&preq->req, preq->src,
18571ebc4d1SMartin Willi 				rctx->tag, sizeof(preq->tail));
18671ebc4d1SMartin Willi 
18771ebc4d1SMartin Willi 	err = crypto_ahash_finup(&preq->req);
18871ebc4d1SMartin Willi 	if (err)
18971ebc4d1SMartin Willi 		return err;
19071ebc4d1SMartin Willi 
19171ebc4d1SMartin Willi 	return poly_tail_continue(req);
19271ebc4d1SMartin Willi }
19371ebc4d1SMartin Willi 
poly_cipherpad_done(void * data,int err)194*255e48ebSHerbert Xu static void poly_cipherpad_done(void *data, int err)
19571ebc4d1SMartin Willi {
196*255e48ebSHerbert Xu 	async_done_continue(data, err, poly_tail);
19771ebc4d1SMartin Willi }
19871ebc4d1SMartin Willi 
poly_cipherpad(struct aead_request * req)19971ebc4d1SMartin Willi static int poly_cipherpad(struct aead_request *req)
20071ebc4d1SMartin Willi {
20171ebc4d1SMartin Willi 	struct chachapoly_ctx *ctx = crypto_aead_ctx(crypto_aead_reqtfm(req));
20271ebc4d1SMartin Willi 	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
20371ebc4d1SMartin Willi 	struct poly_req *preq = &rctx->u.poly;
20476cadf22SEric Biggers 	unsigned int padlen;
20571ebc4d1SMartin Willi 	int err;
20671ebc4d1SMartin Willi 
20776cadf22SEric Biggers 	padlen = -rctx->cryptlen % POLY1305_BLOCK_SIZE;
20871ebc4d1SMartin Willi 	memset(preq->pad, 0, sizeof(preq->pad));
20976cadf22SEric Biggers 	sg_init_one(preq->src, preq->pad, padlen);
21071ebc4d1SMartin Willi 
2117545b6c2SEric Biggers 	ahash_request_set_callback(&preq->req, rctx->flags,
21271ebc4d1SMartin Willi 				   poly_cipherpad_done, req);
21371ebc4d1SMartin Willi 	ahash_request_set_tfm(&preq->req, ctx->poly);
21471ebc4d1SMartin Willi 	ahash_request_set_crypt(&preq->req, preq->src, NULL, padlen);
21571ebc4d1SMartin Willi 
21671ebc4d1SMartin Willi 	err = crypto_ahash_update(&preq->req);
21771ebc4d1SMartin Willi 	if (err)
21871ebc4d1SMartin Willi 		return err;
21971ebc4d1SMartin Willi 
22071ebc4d1SMartin Willi 	return poly_tail(req);
22171ebc4d1SMartin Willi }
22271ebc4d1SMartin Willi 
poly_cipher_done(void * data,int err)223*255e48ebSHerbert Xu static void poly_cipher_done(void *data, int err)
22471ebc4d1SMartin Willi {
225*255e48ebSHerbert Xu 	async_done_continue(data, err, poly_cipherpad);
22671ebc4d1SMartin Willi }
22771ebc4d1SMartin Willi 
poly_cipher(struct aead_request * req)22871ebc4d1SMartin Willi static int poly_cipher(struct aead_request *req)
22971ebc4d1SMartin Willi {
23071ebc4d1SMartin Willi 	struct chachapoly_ctx *ctx = crypto_aead_ctx(crypto_aead_reqtfm(req));
23171ebc4d1SMartin Willi 	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
23271ebc4d1SMartin Willi 	struct poly_req *preq = &rctx->u.poly;
23371ebc4d1SMartin Willi 	struct scatterlist *crypt = req->src;
23471ebc4d1SMartin Willi 	int err;
23571ebc4d1SMartin Willi 
23671ebc4d1SMartin Willi 	if (rctx->cryptlen == req->cryptlen) /* encrypting */
23771ebc4d1SMartin Willi 		crypt = req->dst;
23871ebc4d1SMartin Willi 
23974790922SHerbert Xu 	crypt = scatterwalk_ffwd(rctx->src, crypt, req->assoclen);
24074790922SHerbert Xu 
2417545b6c2SEric Biggers 	ahash_request_set_callback(&preq->req, rctx->flags,
24271ebc4d1SMartin Willi 				   poly_cipher_done, req);
24371ebc4d1SMartin Willi 	ahash_request_set_tfm(&preq->req, ctx->poly);
24471ebc4d1SMartin Willi 	ahash_request_set_crypt(&preq->req, crypt, NULL, rctx->cryptlen);
24571ebc4d1SMartin Willi 
24671ebc4d1SMartin Willi 	err = crypto_ahash_update(&preq->req);
24771ebc4d1SMartin Willi 	if (err)
24871ebc4d1SMartin Willi 		return err;
24971ebc4d1SMartin Willi 
25071ebc4d1SMartin Willi 	return poly_cipherpad(req);
25171ebc4d1SMartin Willi }
25271ebc4d1SMartin Willi 
poly_adpad_done(void * data,int err)253*255e48ebSHerbert Xu static void poly_adpad_done(void *data, int err)
25471ebc4d1SMartin Willi {
255*255e48ebSHerbert Xu 	async_done_continue(data, err, poly_cipher);
25671ebc4d1SMartin Willi }
25771ebc4d1SMartin Willi 
poly_adpad(struct aead_request * req)25871ebc4d1SMartin Willi static int poly_adpad(struct aead_request *req)
25971ebc4d1SMartin Willi {
26071ebc4d1SMartin Willi 	struct chachapoly_ctx *ctx = crypto_aead_ctx(crypto_aead_reqtfm(req));
26171ebc4d1SMartin Willi 	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
26271ebc4d1SMartin Willi 	struct poly_req *preq = &rctx->u.poly;
26376cadf22SEric Biggers 	unsigned int padlen;
26471ebc4d1SMartin Willi 	int err;
26571ebc4d1SMartin Willi 
26676cadf22SEric Biggers 	padlen = -rctx->assoclen % POLY1305_BLOCK_SIZE;
26771ebc4d1SMartin Willi 	memset(preq->pad, 0, sizeof(preq->pad));
26876cadf22SEric Biggers 	sg_init_one(preq->src, preq->pad, padlen);
26971ebc4d1SMartin Willi 
2707545b6c2SEric Biggers 	ahash_request_set_callback(&preq->req, rctx->flags,
27171ebc4d1SMartin Willi 				   poly_adpad_done, req);
27271ebc4d1SMartin Willi 	ahash_request_set_tfm(&preq->req, ctx->poly);
27371ebc4d1SMartin Willi 	ahash_request_set_crypt(&preq->req, preq->src, NULL, padlen);
27471ebc4d1SMartin Willi 
27571ebc4d1SMartin Willi 	err = crypto_ahash_update(&preq->req);
27671ebc4d1SMartin Willi 	if (err)
27771ebc4d1SMartin Willi 		return err;
27871ebc4d1SMartin Willi 
27971ebc4d1SMartin Willi 	return poly_cipher(req);
28071ebc4d1SMartin Willi }
28171ebc4d1SMartin Willi 
poly_ad_done(void * data,int err)282*255e48ebSHerbert Xu static void poly_ad_done(void *data, int err)
28371ebc4d1SMartin Willi {
284*255e48ebSHerbert Xu 	async_done_continue(data, err, poly_adpad);
28571ebc4d1SMartin Willi }
28671ebc4d1SMartin Willi 
poly_ad(struct aead_request * req)28771ebc4d1SMartin Willi static int poly_ad(struct aead_request *req)
28871ebc4d1SMartin Willi {
28971ebc4d1SMartin Willi 	struct chachapoly_ctx *ctx = crypto_aead_ctx(crypto_aead_reqtfm(req));
29071ebc4d1SMartin Willi 	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
29171ebc4d1SMartin Willi 	struct poly_req *preq = &rctx->u.poly;
29271ebc4d1SMartin Willi 	int err;
29371ebc4d1SMartin Willi 
2947545b6c2SEric Biggers 	ahash_request_set_callback(&preq->req, rctx->flags,
29571ebc4d1SMartin Willi 				   poly_ad_done, req);
29671ebc4d1SMartin Willi 	ahash_request_set_tfm(&preq->req, ctx->poly);
29774790922SHerbert Xu 	ahash_request_set_crypt(&preq->req, req->src, NULL, rctx->assoclen);
29871ebc4d1SMartin Willi 
29971ebc4d1SMartin Willi 	err = crypto_ahash_update(&preq->req);
30071ebc4d1SMartin Willi 	if (err)
30171ebc4d1SMartin Willi 		return err;
30271ebc4d1SMartin Willi 
30371ebc4d1SMartin Willi 	return poly_adpad(req);
30471ebc4d1SMartin Willi }
30571ebc4d1SMartin Willi 
poly_setkey_done(void * data,int err)306*255e48ebSHerbert Xu static void poly_setkey_done(void *data, int err)
30771ebc4d1SMartin Willi {
308*255e48ebSHerbert Xu 	async_done_continue(data, err, poly_ad);
30971ebc4d1SMartin Willi }
31071ebc4d1SMartin Willi 
poly_setkey(struct aead_request * req)311c2b7b20aSMartin Willi static int poly_setkey(struct aead_request *req)
312c2b7b20aSMartin Willi {
313c2b7b20aSMartin Willi 	struct chachapoly_ctx *ctx = crypto_aead_ctx(crypto_aead_reqtfm(req));
314c2b7b20aSMartin Willi 	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
315c2b7b20aSMartin Willi 	struct poly_req *preq = &rctx->u.poly;
316c2b7b20aSMartin Willi 	int err;
317c2b7b20aSMartin Willi 
31876cadf22SEric Biggers 	sg_init_one(preq->src, rctx->key, sizeof(rctx->key));
319c2b7b20aSMartin Willi 
3207545b6c2SEric Biggers 	ahash_request_set_callback(&preq->req, rctx->flags,
321c2b7b20aSMartin Willi 				   poly_setkey_done, req);
322c2b7b20aSMartin Willi 	ahash_request_set_tfm(&preq->req, ctx->poly);
323c2b7b20aSMartin Willi 	ahash_request_set_crypt(&preq->req, preq->src, NULL, sizeof(rctx->key));
324c2b7b20aSMartin Willi 
325c2b7b20aSMartin Willi 	err = crypto_ahash_update(&preq->req);
326c2b7b20aSMartin Willi 	if (err)
327c2b7b20aSMartin Willi 		return err;
328c2b7b20aSMartin Willi 
329c2b7b20aSMartin Willi 	return poly_ad(req);
330c2b7b20aSMartin Willi }
331c2b7b20aSMartin Willi 
poly_init_done(void * data,int err)332*255e48ebSHerbert Xu static void poly_init_done(void *data, int err)
333c2b7b20aSMartin Willi {
334*255e48ebSHerbert Xu 	async_done_continue(data, err, poly_setkey);
335c2b7b20aSMartin Willi }
336c2b7b20aSMartin Willi 
poly_init(struct aead_request * req)33771ebc4d1SMartin Willi static int poly_init(struct aead_request *req)
33871ebc4d1SMartin Willi {
33971ebc4d1SMartin Willi 	struct chachapoly_ctx *ctx = crypto_aead_ctx(crypto_aead_reqtfm(req));
34071ebc4d1SMartin Willi 	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
34171ebc4d1SMartin Willi 	struct poly_req *preq = &rctx->u.poly;
34271ebc4d1SMartin Willi 	int err;
34371ebc4d1SMartin Willi 
3447545b6c2SEric Biggers 	ahash_request_set_callback(&preq->req, rctx->flags,
34571ebc4d1SMartin Willi 				   poly_init_done, req);
34671ebc4d1SMartin Willi 	ahash_request_set_tfm(&preq->req, ctx->poly);
34771ebc4d1SMartin Willi 
34871ebc4d1SMartin Willi 	err = crypto_ahash_init(&preq->req);
34971ebc4d1SMartin Willi 	if (err)
35071ebc4d1SMartin Willi 		return err;
35171ebc4d1SMartin Willi 
352c2b7b20aSMartin Willi 	return poly_setkey(req);
35371ebc4d1SMartin Willi }
35471ebc4d1SMartin Willi 
poly_genkey_done(void * data,int err)355*255e48ebSHerbert Xu static void poly_genkey_done(void *data, int err)
35671ebc4d1SMartin Willi {
357*255e48ebSHerbert Xu 	async_done_continue(data, err, poly_init);
35871ebc4d1SMartin Willi }
35971ebc4d1SMartin Willi 
poly_genkey(struct aead_request * req)36071ebc4d1SMartin Willi static int poly_genkey(struct aead_request *req)
36171ebc4d1SMartin Willi {
36274790922SHerbert Xu 	struct crypto_aead *tfm = crypto_aead_reqtfm(req);
36374790922SHerbert Xu 	struct chachapoly_ctx *ctx = crypto_aead_ctx(tfm);
36471ebc4d1SMartin Willi 	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
36571ebc4d1SMartin Willi 	struct chacha_req *creq = &rctx->u.chacha;
36671ebc4d1SMartin Willi 	int err;
36771ebc4d1SMartin Willi 
36874790922SHerbert Xu 	rctx->assoclen = req->assoclen;
36974790922SHerbert Xu 
37074790922SHerbert Xu 	if (crypto_aead_ivsize(tfm) == 8) {
37174790922SHerbert Xu 		if (rctx->assoclen < 8)
37274790922SHerbert Xu 			return -EINVAL;
37374790922SHerbert Xu 		rctx->assoclen -= 8;
37474790922SHerbert Xu 	}
37574790922SHerbert Xu 
376c2b7b20aSMartin Willi 	memset(rctx->key, 0, sizeof(rctx->key));
37776cadf22SEric Biggers 	sg_init_one(creq->src, rctx->key, sizeof(rctx->key));
37871ebc4d1SMartin Willi 
37971ebc4d1SMartin Willi 	chacha_iv(creq->iv, req, 0);
38071ebc4d1SMartin Willi 
3817545b6c2SEric Biggers 	skcipher_request_set_callback(&creq->req, rctx->flags,
38271ebc4d1SMartin Willi 				      poly_genkey_done, req);
3831e1f0061SHerbert Xu 	skcipher_request_set_tfm(&creq->req, ctx->chacha);
3841e1f0061SHerbert Xu 	skcipher_request_set_crypt(&creq->req, creq->src, creq->src,
38571ebc4d1SMartin Willi 				   POLY1305_KEY_SIZE, creq->iv);
38671ebc4d1SMartin Willi 
3871e1f0061SHerbert Xu 	err = crypto_skcipher_decrypt(&creq->req);
38871ebc4d1SMartin Willi 	if (err)
38971ebc4d1SMartin Willi 		return err;
39071ebc4d1SMartin Willi 
391c2b7b20aSMartin Willi 	return poly_init(req);
39271ebc4d1SMartin Willi }
39371ebc4d1SMartin Willi 
chacha_encrypt_done(void * data,int err)394*255e48ebSHerbert Xu static void chacha_encrypt_done(void *data, int err)
39571ebc4d1SMartin Willi {
396*255e48ebSHerbert Xu 	async_done_continue(data, err, poly_genkey);
39771ebc4d1SMartin Willi }
39871ebc4d1SMartin Willi 
chacha_encrypt(struct aead_request * req)39971ebc4d1SMartin Willi static int chacha_encrypt(struct aead_request *req)
40071ebc4d1SMartin Willi {
40171ebc4d1SMartin Willi 	struct chachapoly_ctx *ctx = crypto_aead_ctx(crypto_aead_reqtfm(req));
40271ebc4d1SMartin Willi 	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
40371ebc4d1SMartin Willi 	struct chacha_req *creq = &rctx->u.chacha;
40474790922SHerbert Xu 	struct scatterlist *src, *dst;
40571ebc4d1SMartin Willi 	int err;
40671ebc4d1SMartin Willi 
407161151d7SJason A. Donenfeld 	if (req->cryptlen == 0)
408161151d7SJason A. Donenfeld 		goto skip;
409161151d7SJason A. Donenfeld 
41071ebc4d1SMartin Willi 	chacha_iv(creq->iv, req, 1);
41171ebc4d1SMartin Willi 
41274790922SHerbert Xu 	src = scatterwalk_ffwd(rctx->src, req->src, req->assoclen);
41374790922SHerbert Xu 	dst = src;
41476cadf22SEric Biggers 	if (req->src != req->dst)
41574790922SHerbert Xu 		dst = scatterwalk_ffwd(rctx->dst, req->dst, req->assoclen);
41674790922SHerbert Xu 
4177545b6c2SEric Biggers 	skcipher_request_set_callback(&creq->req, rctx->flags,
41871ebc4d1SMartin Willi 				      chacha_encrypt_done, req);
4191e1f0061SHerbert Xu 	skcipher_request_set_tfm(&creq->req, ctx->chacha);
4201e1f0061SHerbert Xu 	skcipher_request_set_crypt(&creq->req, src, dst,
42171ebc4d1SMartin Willi 				   req->cryptlen, creq->iv);
4221e1f0061SHerbert Xu 	err = crypto_skcipher_encrypt(&creq->req);
42371ebc4d1SMartin Willi 	if (err)
42471ebc4d1SMartin Willi 		return err;
42571ebc4d1SMartin Willi 
426161151d7SJason A. Donenfeld skip:
42771ebc4d1SMartin Willi 	return poly_genkey(req);
42871ebc4d1SMartin Willi }
42971ebc4d1SMartin Willi 
chachapoly_encrypt(struct aead_request * req)43071ebc4d1SMartin Willi static int chachapoly_encrypt(struct aead_request *req)
43171ebc4d1SMartin Willi {
43271ebc4d1SMartin Willi 	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
43371ebc4d1SMartin Willi 
43471ebc4d1SMartin Willi 	rctx->cryptlen = req->cryptlen;
4357545b6c2SEric Biggers 	rctx->flags = aead_request_flags(req);
43671ebc4d1SMartin Willi 
43771ebc4d1SMartin Willi 	/* encrypt call chain:
43871ebc4d1SMartin Willi 	 * - chacha_encrypt/done()
439c2b7b20aSMartin Willi 	 * - poly_genkey/done()
44071ebc4d1SMartin Willi 	 * - poly_init/done()
441c2b7b20aSMartin Willi 	 * - poly_setkey/done()
44271ebc4d1SMartin Willi 	 * - poly_ad/done()
44371ebc4d1SMartin Willi 	 * - poly_adpad/done()
44471ebc4d1SMartin Willi 	 * - poly_cipher/done()
44571ebc4d1SMartin Willi 	 * - poly_cipherpad/done()
44671ebc4d1SMartin Willi 	 * - poly_tail/done/continue()
44771ebc4d1SMartin Willi 	 * - poly_copy_tag()
44871ebc4d1SMartin Willi 	 */
44971ebc4d1SMartin Willi 	return chacha_encrypt(req);
45071ebc4d1SMartin Willi }
45171ebc4d1SMartin Willi 
chachapoly_decrypt(struct aead_request * req)45271ebc4d1SMartin Willi static int chachapoly_decrypt(struct aead_request *req)
45371ebc4d1SMartin Willi {
45471ebc4d1SMartin Willi 	struct chachapoly_req_ctx *rctx = aead_request_ctx(req);
45571ebc4d1SMartin Willi 
45671ebc4d1SMartin Willi 	rctx->cryptlen = req->cryptlen - POLY1305_DIGEST_SIZE;
4577545b6c2SEric Biggers 	rctx->flags = aead_request_flags(req);
45871ebc4d1SMartin Willi 
45971ebc4d1SMartin Willi 	/* decrypt call chain:
460c2b7b20aSMartin Willi 	 * - poly_genkey/done()
46171ebc4d1SMartin Willi 	 * - poly_init/done()
462c2b7b20aSMartin Willi 	 * - poly_setkey/done()
46371ebc4d1SMartin Willi 	 * - poly_ad/done()
46471ebc4d1SMartin Willi 	 * - poly_adpad/done()
46571ebc4d1SMartin Willi 	 * - poly_cipher/done()
46671ebc4d1SMartin Willi 	 * - poly_cipherpad/done()
46771ebc4d1SMartin Willi 	 * - poly_tail/done/continue()
46871ebc4d1SMartin Willi 	 * - chacha_decrypt/done()
46971ebc4d1SMartin Willi 	 * - poly_verify_tag()
47071ebc4d1SMartin Willi 	 */
47171ebc4d1SMartin Willi 	return poly_genkey(req);
47271ebc4d1SMartin Willi }
47371ebc4d1SMartin Willi 
chachapoly_setkey(struct crypto_aead * aead,const u8 * key,unsigned int keylen)47471ebc4d1SMartin Willi static int chachapoly_setkey(struct crypto_aead *aead, const u8 *key,
47571ebc4d1SMartin Willi 			     unsigned int keylen)
47671ebc4d1SMartin Willi {
47771ebc4d1SMartin Willi 	struct chachapoly_ctx *ctx = crypto_aead_ctx(aead);
47871ebc4d1SMartin Willi 
4791ca1b917SEric Biggers 	if (keylen != ctx->saltlen + CHACHA_KEY_SIZE)
48071ebc4d1SMartin Willi 		return -EINVAL;
48171ebc4d1SMartin Willi 
48271ebc4d1SMartin Willi 	keylen -= ctx->saltlen;
48371ebc4d1SMartin Willi 	memcpy(ctx->salt, key + keylen, ctx->saltlen);
48471ebc4d1SMartin Willi 
4851e1f0061SHerbert Xu 	crypto_skcipher_clear_flags(ctx->chacha, CRYPTO_TFM_REQ_MASK);
4861e1f0061SHerbert Xu 	crypto_skcipher_set_flags(ctx->chacha, crypto_aead_get_flags(aead) &
48771ebc4d1SMartin Willi 					       CRYPTO_TFM_REQ_MASK);
488af5034e8SEric Biggers 	return crypto_skcipher_setkey(ctx->chacha, key, keylen);
48971ebc4d1SMartin Willi }
49071ebc4d1SMartin Willi 
chachapoly_setauthsize(struct crypto_aead * tfm,unsigned int authsize)49171ebc4d1SMartin Willi static int chachapoly_setauthsize(struct crypto_aead *tfm,
49271ebc4d1SMartin Willi 				  unsigned int authsize)
49371ebc4d1SMartin Willi {
49471ebc4d1SMartin Willi 	if (authsize != POLY1305_DIGEST_SIZE)
49571ebc4d1SMartin Willi 		return -EINVAL;
49671ebc4d1SMartin Willi 
49771ebc4d1SMartin Willi 	return 0;
49871ebc4d1SMartin Willi }
49971ebc4d1SMartin Willi 
chachapoly_init(struct crypto_aead * tfm)50074790922SHerbert Xu static int chachapoly_init(struct crypto_aead *tfm)
50171ebc4d1SMartin Willi {
50274790922SHerbert Xu 	struct aead_instance *inst = aead_alg_instance(tfm);
50374790922SHerbert Xu 	struct chachapoly_instance_ctx *ictx = aead_instance_ctx(inst);
50474790922SHerbert Xu 	struct chachapoly_ctx *ctx = crypto_aead_ctx(tfm);
5051e1f0061SHerbert Xu 	struct crypto_skcipher *chacha;
50671ebc4d1SMartin Willi 	struct crypto_ahash *poly;
50771ebc4d1SMartin Willi 	unsigned long align;
50871ebc4d1SMartin Willi 
50971ebc4d1SMartin Willi 	poly = crypto_spawn_ahash(&ictx->poly);
51071ebc4d1SMartin Willi 	if (IS_ERR(poly))
51171ebc4d1SMartin Willi 		return PTR_ERR(poly);
51271ebc4d1SMartin Willi 
51360425a8bSEric Biggers 	chacha = crypto_spawn_skcipher(&ictx->chacha);
51471ebc4d1SMartin Willi 	if (IS_ERR(chacha)) {
51571ebc4d1SMartin Willi 		crypto_free_ahash(poly);
51671ebc4d1SMartin Willi 		return PTR_ERR(chacha);
51771ebc4d1SMartin Willi 	}
51871ebc4d1SMartin Willi 
51971ebc4d1SMartin Willi 	ctx->chacha = chacha;
52071ebc4d1SMartin Willi 	ctx->poly = poly;
52171ebc4d1SMartin Willi 	ctx->saltlen = ictx->saltlen;
52271ebc4d1SMartin Willi 
52374790922SHerbert Xu 	align = crypto_aead_alignmask(tfm);
52471ebc4d1SMartin Willi 	align &= ~(crypto_tfm_ctx_alignment() - 1);
52574790922SHerbert Xu 	crypto_aead_set_reqsize(
52674790922SHerbert Xu 		tfm,
52771ebc4d1SMartin Willi 		align + offsetof(struct chachapoly_req_ctx, u) +
52871ebc4d1SMartin Willi 		max(offsetof(struct chacha_req, req) +
5291e1f0061SHerbert Xu 		    sizeof(struct skcipher_request) +
5301e1f0061SHerbert Xu 		    crypto_skcipher_reqsize(chacha),
53171ebc4d1SMartin Willi 		    offsetof(struct poly_req, req) +
53271ebc4d1SMartin Willi 		    sizeof(struct ahash_request) +
53371ebc4d1SMartin Willi 		    crypto_ahash_reqsize(poly)));
53471ebc4d1SMartin Willi 
53571ebc4d1SMartin Willi 	return 0;
53671ebc4d1SMartin Willi }
53771ebc4d1SMartin Willi 
chachapoly_exit(struct crypto_aead * tfm)53874790922SHerbert Xu static void chachapoly_exit(struct crypto_aead *tfm)
53971ebc4d1SMartin Willi {
54074790922SHerbert Xu 	struct chachapoly_ctx *ctx = crypto_aead_ctx(tfm);
54171ebc4d1SMartin Willi 
54271ebc4d1SMartin Willi 	crypto_free_ahash(ctx->poly);
5431e1f0061SHerbert Xu 	crypto_free_skcipher(ctx->chacha);
54471ebc4d1SMartin Willi }
54571ebc4d1SMartin Willi 
chachapoly_free(struct aead_instance * inst)54674790922SHerbert Xu static void chachapoly_free(struct aead_instance *inst)
54774790922SHerbert Xu {
54874790922SHerbert Xu 	struct chachapoly_instance_ctx *ctx = aead_instance_ctx(inst);
54974790922SHerbert Xu 
55074790922SHerbert Xu 	crypto_drop_skcipher(&ctx->chacha);
55174790922SHerbert Xu 	crypto_drop_ahash(&ctx->poly);
55274790922SHerbert Xu 	kfree(inst);
55374790922SHerbert Xu }
55474790922SHerbert Xu 
chachapoly_create(struct crypto_template * tmpl,struct rtattr ** tb,const char * name,unsigned int ivsize)55574790922SHerbert Xu static int chachapoly_create(struct crypto_template *tmpl, struct rtattr **tb,
55674790922SHerbert Xu 			     const char *name, unsigned int ivsize)
55771ebc4d1SMartin Willi {
558b9f76dddSEric Biggers 	u32 mask;
55974790922SHerbert Xu 	struct aead_instance *inst;
56071ebc4d1SMartin Willi 	struct chachapoly_instance_ctx *ctx;
561c282586fSEric Biggers 	struct skcipher_alg *chacha;
562c282586fSEric Biggers 	struct hash_alg_common *poly;
56371ebc4d1SMartin Willi 	int err;
56471ebc4d1SMartin Willi 
56571ebc4d1SMartin Willi 	if (ivsize > CHACHAPOLY_IV_SIZE)
56674790922SHerbert Xu 		return -EINVAL;
56771ebc4d1SMartin Willi 
5687bcb2c99SEric Biggers 	err = crypto_check_attr_type(tb, CRYPTO_ALG_TYPE_AEAD, &mask);
5697bcb2c99SEric Biggers 	if (err)
5707bcb2c99SEric Biggers 		return err;
571b9f76dddSEric Biggers 
57271ebc4d1SMartin Willi 	inst = kzalloc(sizeof(*inst) + sizeof(*ctx), GFP_KERNEL);
57371ebc4d1SMartin Willi 	if (!inst)
574c282586fSEric Biggers 		return -ENOMEM;
57574790922SHerbert Xu 	ctx = aead_instance_ctx(inst);
57671ebc4d1SMartin Willi 	ctx->saltlen = CHACHAPOLY_IV_SIZE - ivsize;
57771ebc4d1SMartin Willi 
578b9f76dddSEric Biggers 	err = crypto_grab_skcipher(&ctx->chacha, aead_crypto_instance(inst),
579c282586fSEric Biggers 				   crypto_attr_alg_name(tb[1]), 0, mask);
58071ebc4d1SMartin Willi 	if (err)
581c282586fSEric Biggers 		goto err_free_inst;
5821e1f0061SHerbert Xu 	chacha = crypto_spawn_skcipher_alg(&ctx->chacha);
58371ebc4d1SMartin Willi 
584c282586fSEric Biggers 	err = crypto_grab_ahash(&ctx->poly, aead_crypto_instance(inst),
585c282586fSEric Biggers 				crypto_attr_alg_name(tb[2]), 0, mask);
586c282586fSEric Biggers 	if (err)
587c282586fSEric Biggers 		goto err_free_inst;
588c282586fSEric Biggers 	poly = crypto_spawn_ahash_alg(&ctx->poly);
589c282586fSEric Biggers 
59071ebc4d1SMartin Willi 	err = -EINVAL;
591c282586fSEric Biggers 	if (poly->digestsize != POLY1305_DIGEST_SIZE)
592c282586fSEric Biggers 		goto err_free_inst;
59371ebc4d1SMartin Willi 	/* Need 16-byte IV size, including Initial Block Counter value */
5941ca1b917SEric Biggers 	if (crypto_skcipher_alg_ivsize(chacha) != CHACHA_IV_SIZE)
595c282586fSEric Biggers 		goto err_free_inst;
59671ebc4d1SMartin Willi 	/* Not a stream cipher? */
5971e1f0061SHerbert Xu 	if (chacha->base.cra_blocksize != 1)
598c282586fSEric Biggers 		goto err_free_inst;
59971ebc4d1SMartin Willi 
60071ebc4d1SMartin Willi 	err = -ENAMETOOLONG;
60174790922SHerbert Xu 	if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME,
6025e27f38fSEric Biggers 		     "%s(%s,%s)", name, chacha->base.cra_name,
603c282586fSEric Biggers 		     poly->base.cra_name) >= CRYPTO_MAX_ALG_NAME)
604c282586fSEric Biggers 		goto err_free_inst;
60574790922SHerbert Xu 	if (snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME,
6061e1f0061SHerbert Xu 		     "%s(%s,%s)", name, chacha->base.cra_driver_name,
607c282586fSEric Biggers 		     poly->base.cra_driver_name) >= CRYPTO_MAX_ALG_NAME)
608c282586fSEric Biggers 		goto err_free_inst;
60971ebc4d1SMartin Willi 
6101e1f0061SHerbert Xu 	inst->alg.base.cra_priority = (chacha->base.cra_priority +
611c282586fSEric Biggers 				       poly->base.cra_priority) / 2;
61274790922SHerbert Xu 	inst->alg.base.cra_blocksize = 1;
6131e1f0061SHerbert Xu 	inst->alg.base.cra_alignmask = chacha->base.cra_alignmask |
614c282586fSEric Biggers 				       poly->base.cra_alignmask;
61574790922SHerbert Xu 	inst->alg.base.cra_ctxsize = sizeof(struct chachapoly_ctx) +
61674790922SHerbert Xu 				     ctx->saltlen;
61774790922SHerbert Xu 	inst->alg.ivsize = ivsize;
6181e1f0061SHerbert Xu 	inst->alg.chunksize = crypto_skcipher_alg_chunksize(chacha);
61974790922SHerbert Xu 	inst->alg.maxauthsize = POLY1305_DIGEST_SIZE;
62074790922SHerbert Xu 	inst->alg.init = chachapoly_init;
62174790922SHerbert Xu 	inst->alg.exit = chachapoly_exit;
62274790922SHerbert Xu 	inst->alg.encrypt = chachapoly_encrypt;
62374790922SHerbert Xu 	inst->alg.decrypt = chachapoly_decrypt;
62474790922SHerbert Xu 	inst->alg.setkey = chachapoly_setkey;
62574790922SHerbert Xu 	inst->alg.setauthsize = chachapoly_setauthsize;
62671ebc4d1SMartin Willi 
62774790922SHerbert Xu 	inst->free = chachapoly_free;
62874790922SHerbert Xu 
62974790922SHerbert Xu 	err = aead_register_instance(tmpl, inst);
630c282586fSEric Biggers 	if (err) {
63171ebc4d1SMartin Willi err_free_inst:
632c282586fSEric Biggers 		chachapoly_free(inst);
633c282586fSEric Biggers 	}
634c282586fSEric Biggers 	return err;
63571ebc4d1SMartin Willi }
63671ebc4d1SMartin Willi 
rfc7539_create(struct crypto_template * tmpl,struct rtattr ** tb)63774790922SHerbert Xu static int rfc7539_create(struct crypto_template *tmpl, struct rtattr **tb)
63871ebc4d1SMartin Willi {
63974790922SHerbert Xu 	return chachapoly_create(tmpl, tb, "rfc7539", 12);
64071ebc4d1SMartin Willi }
64171ebc4d1SMartin Willi 
rfc7539esp_create(struct crypto_template * tmpl,struct rtattr ** tb)64274790922SHerbert Xu static int rfc7539esp_create(struct crypto_template *tmpl, struct rtattr **tb)
6434db4ad26SMartin Willi {
64474790922SHerbert Xu 	return chachapoly_create(tmpl, tb, "rfc7539esp", 8);
64571ebc4d1SMartin Willi }
64671ebc4d1SMartin Willi 
6471a5e02b6SXiongfeng Wang static struct crypto_template rfc7539_tmpls[] = {
6481a5e02b6SXiongfeng Wang 	{
64971ebc4d1SMartin Willi 		.name = "rfc7539",
65074790922SHerbert Xu 		.create = rfc7539_create,
65171ebc4d1SMartin Willi 		.module = THIS_MODULE,
6521a5e02b6SXiongfeng Wang 	}, {
6534db4ad26SMartin Willi 		.name = "rfc7539esp",
65474790922SHerbert Xu 		.create = rfc7539esp_create,
6554db4ad26SMartin Willi 		.module = THIS_MODULE,
6561a5e02b6SXiongfeng Wang 	},
6574db4ad26SMartin Willi };
6584db4ad26SMartin Willi 
chacha20poly1305_module_init(void)65971ebc4d1SMartin Willi static int __init chacha20poly1305_module_init(void)
66071ebc4d1SMartin Willi {
6611a5e02b6SXiongfeng Wang 	return crypto_register_templates(rfc7539_tmpls,
6621a5e02b6SXiongfeng Wang 					 ARRAY_SIZE(rfc7539_tmpls));
66371ebc4d1SMartin Willi }
66471ebc4d1SMartin Willi 
chacha20poly1305_module_exit(void)66571ebc4d1SMartin Willi static void __exit chacha20poly1305_module_exit(void)
66671ebc4d1SMartin Willi {
6671a5e02b6SXiongfeng Wang 	crypto_unregister_templates(rfc7539_tmpls,
6681a5e02b6SXiongfeng Wang 				    ARRAY_SIZE(rfc7539_tmpls));
66971ebc4d1SMartin Willi }
67071ebc4d1SMartin Willi 
671c4741b23SEric Biggers subsys_initcall(chacha20poly1305_module_init);
67271ebc4d1SMartin Willi module_exit(chacha20poly1305_module_exit);
67371ebc4d1SMartin Willi 
67471ebc4d1SMartin Willi MODULE_LICENSE("GPL");
67571ebc4d1SMartin Willi MODULE_AUTHOR("Martin Willi <martin@strongswan.org>");
67671ebc4d1SMartin Willi MODULE_DESCRIPTION("ChaCha20-Poly1305 AEAD");
67771ebc4d1SMartin Willi MODULE_ALIAS_CRYPTO("rfc7539");
6784db4ad26SMartin Willi MODULE_ALIAS_CRYPTO("rfc7539esp");
679