Commit a9a89624 authored by Pascal van Leeuwen's avatar Pascal van Leeuwen Committed by Herbert Xu
Browse files

crypto: inside-secure - Added support for the rfc4309(ccm(aes)) AEAD



This patch adds support for rfc4309(ccm(aes)) for use with IPsec ESP

Signed-off-by: default avatarPascal van Leeuwen <pvanleeuwen@verimatrix.com>
Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
parent 92c60cef
Loading
Loading
Loading
Loading
+1 −0
Original line number Diff line number Diff line
@@ -1222,6 +1222,7 @@ static struct safexcel_alg_template *safexcel_algs[] = {
	&safexcel_alg_authenc_hmac_sha384_cbc_des,
	&safexcel_alg_rfc4106_gcm,
	&safexcel_alg_rfc4543_gcm,
	&safexcel_alg_rfc4309_ccm,
};

static int safexcel_register_algorithms(struct safexcel_crypto_priv *priv)
+4 −1
Original line number Diff line number Diff line
@@ -28,7 +28,7 @@

/* Static configuration */
#define EIP197_DEFAULT_RING_SIZE		400
#define EIP197_MAX_TOKENS			18
#define EIP197_MAX_TOKENS			19
#define EIP197_MAX_RINGS			4
#define EIP197_FETCH_DEPTH			2
#define EIP197_MAX_BATCH_SZ			64
@@ -410,6 +410,8 @@ struct safexcel_context_record {
#define EIP197_AEAD_TYPE_IPSEC_ESP_GMAC		3
#define EIP197_AEAD_IPSEC_IV_SIZE		8
#define EIP197_AEAD_IPSEC_NONCE_SIZE		4
#define EIP197_AEAD_IPSEC_COUNTER_SIZE		4
#define EIP197_AEAD_IPSEC_CCM_NONCE_SIZE	3

/* The hash counter given to the engine in the context has a granularity of
 * 64 bits.
@@ -915,5 +917,6 @@ extern struct safexcel_alg_template safexcel_alg_authenc_hmac_sha512_cbc_des;
extern struct safexcel_alg_template safexcel_alg_authenc_hmac_sha384_cbc_des;
extern struct safexcel_alg_template safexcel_alg_rfc4106_gcm;
extern struct safexcel_alg_template safexcel_alg_rfc4543_gcm;
extern struct safexcel_alg_template safexcel_alg_rfc4309_ccm;

#endif
+129 −36
Original line number Diff line number Diff line
@@ -86,7 +86,8 @@ static void safexcel_cipher_token(struct safexcel_cipher_ctx *ctx, u8 *iv,
		/* 64 bit IV part */
		memcpy(&cdesc->control_data.token[1], iv, 8);

		if (ctx->alg == SAFEXCEL_CHACHA20) {
		if (ctx->alg == SAFEXCEL_CHACHA20 ||
		    ctx->xcm == EIP197_XCM_MODE_CCM) {
			/* 32 bit counter, starting at 0 */
			cdesc->control_data.token[3] = 0;
		} else {
@@ -189,39 +190,39 @@ static void safexcel_aead_token(struct safexcel_cipher_ctx *ctx, u8 *iv,
	if (direction == SAFEXCEL_ENCRYPT) {
		/* align end of instruction sequence to end of token */
		token = (struct safexcel_token *)(cdesc->control_data.token +
			 EIP197_MAX_TOKENS - 13);
			 EIP197_MAX_TOKENS - 14);

		token[12].opcode = EIP197_TOKEN_OPCODE_INSERT;
		token[12].packet_length = digestsize;
		token[12].stat = EIP197_TOKEN_STAT_LAST_HASH |
		token[13].opcode = EIP197_TOKEN_OPCODE_INSERT;
		token[13].packet_length = digestsize;
		token[13].stat = EIP197_TOKEN_STAT_LAST_HASH |
				 EIP197_TOKEN_STAT_LAST_PACKET;
		token[12].instructions = EIP197_TOKEN_INS_TYPE_OUTPUT |
		token[13].instructions = EIP197_TOKEN_INS_TYPE_OUTPUT |
					 EIP197_TOKEN_INS_INSERT_HASH_DIGEST;
	} else {
		cryptlen -= digestsize;

		/* align end of instruction sequence to end of token */
		token = (struct safexcel_token *)(cdesc->control_data.token +
			 EIP197_MAX_TOKENS - 14);
			 EIP197_MAX_TOKENS - 15);

		token[12].opcode = EIP197_TOKEN_OPCODE_RETRIEVE;
		token[12].packet_length = digestsize;
		token[12].stat = EIP197_TOKEN_STAT_LAST_HASH |
		token[13].opcode = EIP197_TOKEN_OPCODE_RETRIEVE;
		token[13].packet_length = digestsize;
		token[13].stat = EIP197_TOKEN_STAT_LAST_HASH |
				 EIP197_TOKEN_STAT_LAST_PACKET;
		token[12].instructions = EIP197_TOKEN_INS_INSERT_HASH_DIGEST;
		token[13].instructions = EIP197_TOKEN_INS_INSERT_HASH_DIGEST;

		token[13].opcode = EIP197_TOKEN_OPCODE_VERIFY;
		token[13].packet_length = digestsize |
		token[14].opcode = EIP197_TOKEN_OPCODE_VERIFY;
		token[14].packet_length = digestsize |
					  EIP197_TOKEN_HASH_RESULT_VERIFY;
		token[13].stat = EIP197_TOKEN_STAT_LAST_HASH |
		token[14].stat = EIP197_TOKEN_STAT_LAST_HASH |
				 EIP197_TOKEN_STAT_LAST_PACKET;
		token[13].instructions = EIP197_TOKEN_INS_TYPE_OUTPUT;
		token[14].instructions = EIP197_TOKEN_INS_TYPE_OUTPUT;
	}

	if (ctx->aead == EIP197_AEAD_TYPE_IPSEC_ESP) {
		/* For ESP mode (and not GMAC), skip over the IV */
		token[7].opcode = EIP197_TOKEN_OPCODE_DIRECTION;
		token[7].packet_length = EIP197_AEAD_IPSEC_IV_SIZE;
		token[8].opcode = EIP197_TOKEN_OPCODE_DIRECTION;
		token[8].packet_length = EIP197_AEAD_IPSEC_IV_SIZE;

		assoclen -= EIP197_AEAD_IPSEC_IV_SIZE;
	}
@@ -232,17 +233,17 @@ static void safexcel_aead_token(struct safexcel_cipher_ctx *ctx, u8 *iv,
				EIP197_TOKEN_INS_TYPE_HASH;

	if (likely(cryptlen || ctx->alg == SAFEXCEL_CHACHA20)) {
		token[10].opcode = EIP197_TOKEN_OPCODE_DIRECTION;
		token[10].packet_length = cryptlen;
		token[10].stat = EIP197_TOKEN_STAT_LAST_HASH;
		token[11].opcode = EIP197_TOKEN_OPCODE_DIRECTION;
		token[11].packet_length = cryptlen;
		token[11].stat = EIP197_TOKEN_STAT_LAST_HASH;
		if (unlikely(ctx->aead == EIP197_AEAD_TYPE_IPSEC_ESP_GMAC)) {
			token[6].instructions = EIP197_TOKEN_INS_TYPE_HASH;
			/* Do not send to crypt engine in case of GMAC */
			token[10].instructions = EIP197_TOKEN_INS_LAST |
			token[11].instructions = EIP197_TOKEN_INS_LAST |
						 EIP197_TOKEN_INS_TYPE_HASH |
						 EIP197_TOKEN_INS_TYPE_OUTPUT;
		} else {
			token[10].instructions = EIP197_TOKEN_INS_LAST |
			token[11].instructions = EIP197_TOKEN_INS_LAST |
						 EIP197_TOKEN_INS_TYPE_CRYPTO |
						 EIP197_TOKEN_INS_TYPE_HASH |
						 EIP197_TOKEN_INS_TYPE_OUTPUT;
@@ -254,16 +255,17 @@ static void safexcel_aead_token(struct safexcel_cipher_ctx *ctx, u8 *iv,
	if (!ctx->xcm)
		return;

	token[8].opcode = EIP197_TOKEN_OPCODE_INSERT_REMRES;
	token[8].packet_length = 0;
	token[8].instructions = AES_BLOCK_SIZE;
	token[9].opcode = EIP197_TOKEN_OPCODE_INSERT_REMRES;
	token[9].packet_length = 0;
	token[9].instructions = AES_BLOCK_SIZE;

	token[9].opcode = EIP197_TOKEN_OPCODE_INSERT;
	token[9].packet_length = AES_BLOCK_SIZE;
	token[9].instructions = EIP197_TOKEN_INS_TYPE_OUTPUT |
	token[10].opcode = EIP197_TOKEN_OPCODE_INSERT;
	token[10].packet_length = AES_BLOCK_SIZE;
	token[10].instructions = EIP197_TOKEN_INS_TYPE_OUTPUT |
				 EIP197_TOKEN_INS_TYPE_CRYPTO;

	if (ctx->xcm != EIP197_XCM_MODE_GCM) {
		u8 *final_iv = (u8 *)cdesc->control_data.token;
		u8 *cbcmaciv = (u8 *)&token[1];
		u32 *aadlen = (u32 *)&token[5];

@@ -274,11 +276,11 @@ static void safexcel_aead_token(struct safexcel_cipher_ctx *ctx, u8 *iv,
		token[0].instructions = EIP197_TOKEN_INS_ORIGIN_TOKEN |
					EIP197_TOKEN_INS_TYPE_HASH;
		/* Variable length IV part */
		memcpy(cbcmaciv, iv, 15 - iv[0]);
		memcpy(cbcmaciv, final_iv, 15 - final_iv[0]);
		/* fixup flags byte */
		cbcmaciv[0] |= ((assoclen > 0) << 6) | ((digestsize - 2) << 2);
		/* Clear upper bytes of variable message length to 0 */
		memset(cbcmaciv + 15 - iv[0], 0, iv[0] - 1);
		memset(cbcmaciv + 15 - final_iv[0], 0, final_iv[0] - 1);
		/* insert lower 2 bytes of message length */
		cbcmaciv[14] = cryptlen >> 8;
		cbcmaciv[15] = cryptlen & 255;
@@ -299,13 +301,13 @@ static void safexcel_aead_token(struct safexcel_cipher_ctx *ctx, u8 *iv,
			token[7].instructions = EIP197_TOKEN_INS_TYPE_HASH;

			/* Align crypto data towards hash engine */
			token[10].stat = 0;
			token[11].stat = 0;

			token[11].opcode = EIP197_TOKEN_OPCODE_INSERT;
			token[12].opcode = EIP197_TOKEN_OPCODE_INSERT;
			cryptlen &= 15;
			token[11].packet_length = cryptlen ? 16 - cryptlen : 0;
			token[11].stat = EIP197_TOKEN_STAT_LAST_HASH;
			token[11].instructions = EIP197_TOKEN_INS_TYPE_HASH;
			token[12].packet_length = cryptlen ? 16 - cryptlen : 0;
			token[12].stat = EIP197_TOKEN_STAT_LAST_HASH;
			token[12].instructions = EIP197_TOKEN_INS_TYPE_HASH;
		} else {
			token[7].stat = EIP197_TOKEN_STAT_LAST_HASH;
			token[7].instructions = EIP197_TOKEN_INS_LAST |
@@ -3551,3 +3553,94 @@ struct safexcel_alg_template safexcel_alg_rfc4543_gcm = {
		},
	},
};

static int safexcel_rfc4309_ccm_setkey(struct crypto_aead *ctfm, const u8 *key,
				       unsigned int len)
{
	struct crypto_tfm *tfm = crypto_aead_tfm(ctfm);
	struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);

	/* First byte of the nonce = L = always 3 for RFC4309 (4 byte ctr) */
	*(u8 *)&ctx->nonce = EIP197_AEAD_IPSEC_COUNTER_SIZE - 1;
	/* last 3 bytes of key are the nonce! */
	memcpy((u8 *)&ctx->nonce + 1, key + len -
	       EIP197_AEAD_IPSEC_CCM_NONCE_SIZE,
	       EIP197_AEAD_IPSEC_CCM_NONCE_SIZE);

	len -= EIP197_AEAD_IPSEC_CCM_NONCE_SIZE;
	return safexcel_aead_ccm_setkey(ctfm, key, len);
}

static int safexcel_rfc4309_ccm_setauthsize(struct crypto_aead *tfm,
					    unsigned int authsize)
{
	/* Borrowed from crypto/ccm.c */
	switch (authsize) {
	case 8:
	case 12:
	case 16:
		break;
	default:
		return -EINVAL;
	}

	return 0;
}

static int safexcel_rfc4309_ccm_encrypt(struct aead_request *req)
{
	struct safexcel_cipher_req *creq = aead_request_ctx(req);

	/* Borrowed from crypto/ccm.c */
	if (req->assoclen != 16 && req->assoclen != 20)
		return -EINVAL;

	return safexcel_queue_req(&req->base, creq, SAFEXCEL_ENCRYPT);
}

static int safexcel_rfc4309_ccm_decrypt(struct aead_request *req)
{
	struct safexcel_cipher_req *creq = aead_request_ctx(req);

	/* Borrowed from crypto/ccm.c */
	if (req->assoclen != 16 && req->assoclen != 20)
		return -EINVAL;

	return safexcel_queue_req(&req->base, creq, SAFEXCEL_DECRYPT);
}

static int safexcel_rfc4309_ccm_cra_init(struct crypto_tfm *tfm)
{
	struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
	int ret;

	ret = safexcel_aead_ccm_cra_init(tfm);
	ctx->aead  = EIP197_AEAD_TYPE_IPSEC_ESP;
	return ret;
}

struct safexcel_alg_template safexcel_alg_rfc4309_ccm = {
	.type = SAFEXCEL_ALG_TYPE_AEAD,
	.algo_mask = SAFEXCEL_ALG_AES | SAFEXCEL_ALG_CBC_MAC_ALL,
	.alg.aead = {
		.setkey = safexcel_rfc4309_ccm_setkey,
		.setauthsize = safexcel_rfc4309_ccm_setauthsize,
		.encrypt = safexcel_rfc4309_ccm_encrypt,
		.decrypt = safexcel_rfc4309_ccm_decrypt,
		.ivsize = EIP197_AEAD_IPSEC_IV_SIZE,
		.maxauthsize = AES_BLOCK_SIZE,
		.base = {
			.cra_name = "rfc4309(ccm(aes))",
			.cra_driver_name = "safexcel-rfc4309-ccm-aes",
			.cra_priority = SAFEXCEL_CRA_PRIORITY,
			.cra_flags = CRYPTO_ALG_ASYNC |
				     CRYPTO_ALG_KERN_DRIVER_ONLY,
			.cra_blocksize = 1,
			.cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
			.cra_alignmask = 0,
			.cra_init = safexcel_rfc4309_ccm_cra_init,
			.cra_exit = safexcel_aead_cra_exit,
			.cra_module = THIS_MODULE,
		},
	},
};