xref: /openbmc/linux/net/mac80211/aead_api.c (revision 58d25626)
1d2912cb1SThomas Gleixner // SPDX-License-Identifier: GPL-2.0-only
24133da73SXiang Gao /*
34133da73SXiang Gao  * Copyright 2003-2004, Instant802 Networks, Inc.
44133da73SXiang Gao  * Copyright 2005-2006, Devicescape Software, Inc.
54133da73SXiang Gao  * Copyright 2014-2015, Qualcomm Atheros, Inc.
64133da73SXiang Gao  *
74133da73SXiang Gao  * Rewrite: Copyright (C) 2013 Linaro Ltd <ard.biesheuvel@linaro.org>
84133da73SXiang Gao  */
94133da73SXiang Gao 
104133da73SXiang Gao #include <linux/kernel.h>
114133da73SXiang Gao #include <linux/types.h>
124133da73SXiang Gao #include <linux/err.h>
134133da73SXiang Gao #include <linux/scatterlist.h>
144133da73SXiang Gao #include <crypto/aead.h>
154133da73SXiang Gao 
164133da73SXiang Gao #include "aead_api.h"
174133da73SXiang Gao 
aead_encrypt(struct crypto_aead * tfm,u8 * b_0,u8 * aad,size_t aad_len,u8 * data,size_t data_len,u8 * mic)184133da73SXiang Gao int aead_encrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad, size_t aad_len,
194133da73SXiang Gao 		 u8 *data, size_t data_len, u8 *mic)
204133da73SXiang Gao {
219e97964dSJohannes Berg 	size_t mic_len = crypto_aead_authsize(tfm);
224133da73SXiang Gao 	struct scatterlist sg[3];
234133da73SXiang Gao 	struct aead_request *aead_req;
244133da73SXiang Gao 	int reqsize = sizeof(*aead_req) + crypto_aead_reqsize(tfm);
254133da73SXiang Gao 	u8 *__aad;
26*58d25626SDaniel Phan 	int ret;
274133da73SXiang Gao 
284133da73SXiang Gao 	aead_req = kzalloc(reqsize + aad_len, GFP_ATOMIC);
294133da73SXiang Gao 	if (!aead_req)
304133da73SXiang Gao 		return -ENOMEM;
314133da73SXiang Gao 
324133da73SXiang Gao 	__aad = (u8 *)aead_req + reqsize;
334133da73SXiang Gao 	memcpy(__aad, aad, aad_len);
344133da73SXiang Gao 
354133da73SXiang Gao 	sg_init_table(sg, 3);
364133da73SXiang Gao 	sg_set_buf(&sg[0], __aad, aad_len);
374133da73SXiang Gao 	sg_set_buf(&sg[1], data, data_len);
384133da73SXiang Gao 	sg_set_buf(&sg[2], mic, mic_len);
394133da73SXiang Gao 
404133da73SXiang Gao 	aead_request_set_tfm(aead_req, tfm);
414133da73SXiang Gao 	aead_request_set_crypt(aead_req, sg, sg, data_len, b_0);
424133da73SXiang Gao 	aead_request_set_ad(aead_req, sg[0].length);
434133da73SXiang Gao 
44*58d25626SDaniel Phan 	ret = crypto_aead_encrypt(aead_req);
45453431a5SWaiman Long 	kfree_sensitive(aead_req);
464133da73SXiang Gao 
47*58d25626SDaniel Phan 	return ret;
484133da73SXiang Gao }
494133da73SXiang Gao 
aead_decrypt(struct crypto_aead * tfm,u8 * b_0,u8 * aad,size_t aad_len,u8 * data,size_t data_len,u8 * mic)504133da73SXiang Gao int aead_decrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad, size_t aad_len,
514133da73SXiang Gao 		 u8 *data, size_t data_len, u8 *mic)
524133da73SXiang Gao {
539e97964dSJohannes Berg 	size_t mic_len = crypto_aead_authsize(tfm);
544133da73SXiang Gao 	struct scatterlist sg[3];
554133da73SXiang Gao 	struct aead_request *aead_req;
564133da73SXiang Gao 	int reqsize = sizeof(*aead_req) + crypto_aead_reqsize(tfm);
574133da73SXiang Gao 	u8 *__aad;
584133da73SXiang Gao 	int err;
594133da73SXiang Gao 
604133da73SXiang Gao 	if (data_len == 0)
614133da73SXiang Gao 		return -EINVAL;
624133da73SXiang Gao 
634133da73SXiang Gao 	aead_req = kzalloc(reqsize + aad_len, GFP_ATOMIC);
644133da73SXiang Gao 	if (!aead_req)
654133da73SXiang Gao 		return -ENOMEM;
664133da73SXiang Gao 
674133da73SXiang Gao 	__aad = (u8 *)aead_req + reqsize;
684133da73SXiang Gao 	memcpy(__aad, aad, aad_len);
694133da73SXiang Gao 
704133da73SXiang Gao 	sg_init_table(sg, 3);
714133da73SXiang Gao 	sg_set_buf(&sg[0], __aad, aad_len);
724133da73SXiang Gao 	sg_set_buf(&sg[1], data, data_len);
734133da73SXiang Gao 	sg_set_buf(&sg[2], mic, mic_len);
744133da73SXiang Gao 
754133da73SXiang Gao 	aead_request_set_tfm(aead_req, tfm);
764133da73SXiang Gao 	aead_request_set_crypt(aead_req, sg, sg, data_len + mic_len, b_0);
774133da73SXiang Gao 	aead_request_set_ad(aead_req, sg[0].length);
784133da73SXiang Gao 
794133da73SXiang Gao 	err = crypto_aead_decrypt(aead_req);
80453431a5SWaiman Long 	kfree_sensitive(aead_req);
814133da73SXiang Gao 
824133da73SXiang Gao 	return err;
834133da73SXiang Gao }
844133da73SXiang Gao 
854133da73SXiang Gao struct crypto_aead *
aead_key_setup_encrypt(const char * alg,const u8 key[],size_t key_len,size_t mic_len)864133da73SXiang Gao aead_key_setup_encrypt(const char *alg, const u8 key[],
874133da73SXiang Gao 		       size_t key_len, size_t mic_len)
884133da73SXiang Gao {
894133da73SXiang Gao 	struct crypto_aead *tfm;
904133da73SXiang Gao 	int err;
914133da73SXiang Gao 
924133da73SXiang Gao 	tfm = crypto_alloc_aead(alg, 0, CRYPTO_ALG_ASYNC);
934133da73SXiang Gao 	if (IS_ERR(tfm))
944133da73SXiang Gao 		return tfm;
954133da73SXiang Gao 
964133da73SXiang Gao 	err = crypto_aead_setkey(tfm, key, key_len);
974133da73SXiang Gao 	if (err)
984133da73SXiang Gao 		goto free_aead;
994133da73SXiang Gao 	err = crypto_aead_setauthsize(tfm, mic_len);
1004133da73SXiang Gao 	if (err)
1014133da73SXiang Gao 		goto free_aead;
1024133da73SXiang Gao 
1034133da73SXiang Gao 	return tfm;
1044133da73SXiang Gao 
1054133da73SXiang Gao free_aead:
1064133da73SXiang Gao 	crypto_free_aead(tfm);
1074133da73SXiang Gao 	return ERR_PTR(err);
1084133da73SXiang Gao }
1094133da73SXiang Gao 
aead_key_free(struct crypto_aead * tfm)1104133da73SXiang Gao void aead_key_free(struct crypto_aead *tfm)
1114133da73SXiang Gao {
1124133da73SXiang Gao 	crypto_free_aead(tfm);
1134133da73SXiang Gao }
114