12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741 |
- /* lkcapi_glue.c -- glue logic to register wolfCrypt implementations with
- * the Linux Kernel Cryptosystem
- *
- * Copyright (C) 2006-2024 wolfSSL Inc.
- *
- * This file is part of wolfSSL.
- *
- * wolfSSL is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * wolfSSL is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
- */
- /* included by linuxkm/module_hooks.c */
- #ifndef LINUXKM_LKCAPI_REGISTER
- #error lkcapi_glue.c included in non-LINUXKM_LKCAPI_REGISTER project.
- #endif
- #ifndef WOLFSSL_LINUXKM_LKCAPI_PRIORITY
- /* Larger number means higher priority. The highest in-tree priority is 4001,
- * in the Cavium driver.
- */
- #define WOLFSSL_LINUXKM_LKCAPI_PRIORITY 10000
- #endif
- #ifndef NO_AES
- /* note the FIPS code will be returned on failure even in non-FIPS builds. */
- #define LINUXKM_LKCAPI_AES_KAT_MISMATCH_E AES_KAT_FIPS_E
- #define LINUXKM_LKCAPI_AESGCM_KAT_MISMATCH_E AESGCM_KAT_FIPS_E
- #define WOLFKM_AESCBC_NAME "cbc(aes)"
- #define WOLFKM_AESCFB_NAME "cfb(aes)"
- #define WOLFKM_AESGCM_NAME "gcm(aes)"
- #define WOLFKM_AESXTS_NAME "xts(aes)"
- #ifdef WOLFSSL_AESNI
- #define WOLFKM_DRIVER_ISA_EXT "-aesni"
- #else
- #define WOLFKM_DRIVER_ISA_EXT ""
- #endif
- #ifdef HAVE_FIPS
- #ifndef HAVE_FIPS_VERSION
- #define WOLFKM_DRIVER_FIPS "-fips-140"
- #elif HAVE_FIPS_VERSION >= 5
- #define WOLFKM_DRIVER_FIPS "-fips-140-3"
- #elif HAVE_FIPS_VERSION == 2
- #define WOLFKM_DRIVER_FIPS "-fips-140-2"
- #else
- #define WOLFKM_DRIVER_FIPS "-fips-140"
- #endif
- #else
- #define WOLFKM_DRIVER_FIPS ""
- #endif
- #define WOLFKM_DRIVER_SUFFIX \
- WOLFKM_DRIVER_ISA_EXT WOLFKM_DRIVER_FIPS "-wolfcrypt"
- #define WOLFKM_AESCBC_DRIVER ("cbc-aes" WOLFKM_DRIVER_SUFFIX)
- #define WOLFKM_AESCFB_DRIVER ("cfb-aes" WOLFKM_DRIVER_SUFFIX)
- #define WOLFKM_AESGCM_DRIVER ("gcm-aes" WOLFKM_DRIVER_SUFFIX)
- #define WOLFKM_AESXTS_DRIVER ("xts-aes" WOLFKM_DRIVER_SUFFIX)
- #if defined(HAVE_AES_CBC) && \
- (defined(LINUXKM_LKCAPI_REGISTER_ALL) || \
- defined(LINUXKM_LKCAPI_REGISTER_AESCBC))
- static int linuxkm_test_aescbc(void);
- #endif
- #if defined(WOLFSSL_AES_CFB) && \
- (defined(LINUXKM_LKCAPI_REGISTER_ALL) || \
- defined(LINUXKM_LKCAPI_REGISTER_AESCFB))
- static int linuxkm_test_aescfb(void);
- #endif
- #if defined(HAVE_AESGCM) && \
- (defined(LINUXKM_LKCAPI_REGISTER_ALL) || \
- defined(LINUXKM_LKCAPI_REGISTER_AESGCM))
- static int linuxkm_test_aesgcm(void);
- #endif
- #if defined(WOLFSSL_AES_XTS) && \
- (defined(LINUXKM_LKCAPI_REGISTER_ALL) || \
- defined(LINUXKM_LKCAPI_REGISTER_AESXTS))
- static int linuxkm_test_aesxts(void);
- #endif
- /* km_AesX(): wrappers to wolfcrypt wc_AesX functions and
- * structures. */
- #include <wolfssl/wolfcrypt/aes.h>
- struct km_AesCtx {
- Aes *aes_encrypt; /* allocated in km_AesInitCommon() to assure
- * alignment, needed for AESNI.
- */
- Aes *aes_decrypt; /* same. */
- };
- #if defined(LINUXKM_LKCAPI_REGISTER_ALL) || \
- defined(LINUXKM_LKCAPI_REGISTER_AESCBC) || \
- defined(LINUXKM_LKCAPI_REGISTER_AESCFB) || \
- defined(LINUXKM_LKCAPI_REGISTER_AESGCM)
- static void km_AesExitCommon(struct km_AesCtx * ctx);
- static int km_AesInitCommon(
- struct km_AesCtx * ctx,
- const char * name,
- int need_decryption)
- {
- int err;
- ctx->aes_encrypt = (Aes *)malloc(sizeof(*ctx->aes_encrypt));
- if (! ctx->aes_encrypt) {
- pr_err("%s: allocation of %zu bytes for encryption key failed.\n",
- name, sizeof(*ctx->aes_encrypt));
- return MEMORY_E;
- }
- err = wc_AesInit(ctx->aes_encrypt, NULL, INVALID_DEVID);
- if (unlikely(err)) {
- pr_err("%s: wc_AesInit failed: %d\n", name, err);
- free(ctx->aes_encrypt);
- ctx->aes_encrypt = NULL;
- return -EINVAL;
- }
- if (! need_decryption) {
- ctx->aes_decrypt = NULL;
- return 0;
- }
- ctx->aes_decrypt = (Aes *)malloc(sizeof(*ctx->aes_decrypt));
- if (! ctx->aes_decrypt) {
- pr_err("%s: allocation of %zu bytes for decryption key failed.\n",
- name, sizeof(*ctx->aes_decrypt));
- km_AesExitCommon(ctx);
- return MEMORY_E;
- }
- err = wc_AesInit(ctx->aes_decrypt, NULL, INVALID_DEVID);
- if (unlikely(err)) {
- pr_err("%s: wc_AesInit failed: %d\n", name, err);
- free(ctx->aes_decrypt);
- ctx->aes_decrypt = NULL;
- km_AesExitCommon(ctx);
- return -EINVAL;
- }
- return 0;
- }
- static void km_AesExitCommon(struct km_AesCtx * ctx)
- {
- if (ctx->aes_encrypt) {
- wc_AesFree(ctx->aes_encrypt);
- free(ctx->aes_encrypt);
- ctx->aes_encrypt = NULL;
- }
- if (ctx->aes_decrypt) {
- wc_AesFree(ctx->aes_decrypt);
- free(ctx->aes_decrypt);
- ctx->aes_decrypt = NULL;
- }
- }
- #if defined(LINUXKM_LKCAPI_REGISTER_ALL) || \
- defined(LINUXKM_LKCAPI_REGISTER_AESCBC) || \
- defined(LINUXKM_LKCAPI_REGISTER_AESCFB)
- static int km_AesSetKeyCommon(struct km_AesCtx * ctx, const u8 *in_key,
- unsigned int key_len, const char * name)
- {
- int err;
- err = wc_AesSetKey(ctx->aes_encrypt, in_key, key_len, NULL, AES_ENCRYPTION);
- if (unlikely(err)) {
- pr_err("%s: wc_AesSetKey for encryption key failed: %d\n", name, err);
- return -ENOKEY;
- }
- if (ctx->aes_decrypt) {
- err = wc_AesSetKey(ctx->aes_decrypt, in_key, key_len, NULL,
- AES_DECRYPTION);
- if (unlikely(err)) {
- pr_err("%s: wc_AesSetKey for decryption key failed: %d\n",
- name, err);
- return -ENOKEY;
- }
- }
- return 0;
- }
- static void km_AesExit(struct crypto_skcipher *tfm)
- {
- struct km_AesCtx * ctx = crypto_skcipher_ctx(tfm);
- km_AesExitCommon(ctx);
- }
- #endif /* LINUXKM_LKCAPI_REGISTER_ALL ||
- * LINUXKM_LKCAPI_REGISTER_AESCBC ||
- * LINUXKM_LKCAPI_REGISTER_AESCFB
- */
- #endif /* LINUXKM_LKCAPI_REGISTER_ALL || LINUXKM_LKCAPI_REGISTER_AESCBC ||
- * LINUXKM_LKCAPI_REGISTER_AESCFB || LINUXKM_LKCAPI_REGISTER_AESGCM
- */
- #if defined(HAVE_AES_CBC) && \
- (defined(LINUXKM_LKCAPI_REGISTER_ALL) || \
- defined(LINUXKM_LKCAPI_REGISTER_AESCBC))
- static int km_AesCbcInit(struct crypto_skcipher *tfm)
- {
- struct km_AesCtx * ctx = crypto_skcipher_ctx(tfm);
- return km_AesInitCommon(ctx, WOLFKM_AESCBC_DRIVER, 1);
- }
- static int km_AesCbcSetKey(struct crypto_skcipher *tfm, const u8 *in_key,
- unsigned int key_len)
- {
- struct km_AesCtx * ctx = crypto_skcipher_ctx(tfm);
- return km_AesSetKeyCommon(ctx, in_key, key_len, WOLFKM_AESCBC_DRIVER);
- }
- static int km_AesCbcEncrypt(struct skcipher_request *req)
- {
- struct crypto_skcipher * tfm = NULL;
- struct km_AesCtx * ctx = NULL;
- struct skcipher_walk walk;
- unsigned int nbytes = 0;
- int err = 0;
- tfm = crypto_skcipher_reqtfm(req);
- ctx = crypto_skcipher_ctx(tfm);
- err = skcipher_walk_virt(&walk, req, false);
- if (unlikely(err)) {
- pr_err("%s: skcipher_walk_virt failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm)), err);
- return err;
- }
- while ((nbytes = walk.nbytes) != 0) {
- err = wc_AesSetIV(ctx->aes_encrypt, walk.iv);
- if (unlikely(err)) {
- pr_err("%s: wc_AesSetIV failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm)), err);
- return -EINVAL;
- }
- err = wc_AesCbcEncrypt(ctx->aes_encrypt, walk.dst.virt.addr,
- walk.src.virt.addr, nbytes);
- if (unlikely(err)) {
- pr_err("%s: wc_AesCbcEncrypt failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm)), err);
- return -EINVAL;
- }
- err = skcipher_walk_done(&walk, walk.nbytes - nbytes);
- if (unlikely(err)) {
- pr_err("%s: skcipher_walk_done failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm)), err);
- return err;
- }
- }
- return err;
- }
- static int km_AesCbcDecrypt(struct skcipher_request *req)
- {
- struct crypto_skcipher * tfm = NULL;
- struct km_AesCtx * ctx = NULL;
- struct skcipher_walk walk;
- unsigned int nbytes = 0;
- int err = 0;
- tfm = crypto_skcipher_reqtfm(req);
- ctx = crypto_skcipher_ctx(tfm);
- err = skcipher_walk_virt(&walk, req, false);
- if (unlikely(err)) {
- pr_err("%s: skcipher_walk_virt failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm)), err);
- return err;
- }
- while ((nbytes = walk.nbytes) != 0) {
- err = wc_AesSetIV(ctx->aes_decrypt, walk.iv);
- if (unlikely(err)) {
- pr_err("%s: wc_AesSetKey failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm)), err);
- return -EINVAL;
- }
- err = wc_AesCbcDecrypt(ctx->aes_decrypt, walk.dst.virt.addr,
- walk.src.virt.addr, nbytes);
- if (unlikely(err)) {
- pr_err("%s: wc_AesCbcDecrypt failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm)), err);
- return -EINVAL;
- }
- err = skcipher_walk_done(&walk, walk.nbytes - nbytes);
- if (unlikely(err)) {
- pr_err("%s: skcipher_walk_done failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm)), err);
- return err;
- }
- }
- return err;
- }
- static struct skcipher_alg cbcAesAlg = {
- .base.cra_name = WOLFKM_AESCBC_NAME,
- .base.cra_driver_name = WOLFKM_AESCBC_DRIVER,
- .base.cra_priority = WOLFSSL_LINUXKM_LKCAPI_PRIORITY,
- .base.cra_blocksize = AES_BLOCK_SIZE,
- .base.cra_ctxsize = sizeof(struct km_AesCtx),
- .base.cra_module = THIS_MODULE,
- .init = km_AesCbcInit,
- .exit = km_AesExit,
- .min_keysize = AES_128_KEY_SIZE,
- .max_keysize = AES_256_KEY_SIZE,
- .ivsize = AES_BLOCK_SIZE,
- .setkey = km_AesCbcSetKey,
- .encrypt = km_AesCbcEncrypt,
- .decrypt = km_AesCbcDecrypt,
- };
- static int cbcAesAlg_loaded = 0;
- #endif /* HAVE_AES_CBC &&
- * (LINUXKM_LKCAPI_REGISTER_ALL || LINUXKM_LKCAPI_REGISTER_AESCBC)
- */
- #if defined(WOLFSSL_AES_CFB) && \
- (defined(LINUXKM_LKCAPI_REGISTER_ALL) || \
- defined(LINUXKM_LKCAPI_REGISTER_AESCFB))
- static int km_AesCfbInit(struct crypto_skcipher *tfm)
- {
- struct km_AesCtx * ctx = crypto_skcipher_ctx(tfm);
- return km_AesInitCommon(ctx, WOLFKM_AESCFB_DRIVER, 0);
- }
- static int km_AesCfbSetKey(struct crypto_skcipher *tfm, const u8 *in_key,
- unsigned int key_len)
- {
- struct km_AesCtx * ctx = crypto_skcipher_ctx(tfm);
- return km_AesSetKeyCommon(ctx, in_key, key_len, WOLFKM_AESCFB_DRIVER);
- }
- static int km_AesCfbEncrypt(struct skcipher_request *req)
- {
- struct crypto_skcipher * tfm = NULL;
- struct km_AesCtx * ctx = NULL;
- struct skcipher_walk walk;
- unsigned int nbytes = 0;
- int err = 0;
- tfm = crypto_skcipher_reqtfm(req);
- ctx = crypto_skcipher_ctx(tfm);
- err = skcipher_walk_virt(&walk, req, false);
- if (unlikely(err)) {
- pr_err("%s: skcipher_walk_virt failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm)), err);
- return err;
- }
- while ((nbytes = walk.nbytes) != 0) {
- err = wc_AesSetIV(ctx->aes_encrypt, walk.iv);
- if (unlikely(err)) {
- pr_err("%s: wc_AesSetKey failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm)), err);
- return -EINVAL;
- }
- err = wc_AesCfbEncrypt(ctx->aes_encrypt, walk.dst.virt.addr,
- walk.src.virt.addr, nbytes);
- if (unlikely(err)) {
- pr_err("%s: wc_AesCfbEncrypt failed %d\n",
- crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm)), err);
- return -EINVAL;
- }
- err = skcipher_walk_done(&walk, walk.nbytes - nbytes);
- if (unlikely(err)) {
- pr_err("%s: skcipher_walk_done failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm)), err);
- return err;
- }
- }
- return err;
- }
- static int km_AesCfbDecrypt(struct skcipher_request *req)
- {
- struct crypto_skcipher * tfm = NULL;
- struct km_AesCtx * ctx = NULL;
- struct skcipher_walk walk;
- unsigned int nbytes = 0;
- int err = 0;
- tfm = crypto_skcipher_reqtfm(req);
- ctx = crypto_skcipher_ctx(tfm);
- err = skcipher_walk_virt(&walk, req, false);
- if (unlikely(err)) {
- pr_err("%s: skcipher_walk_virt failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm)), err);
- return err;
- }
- while ((nbytes = walk.nbytes) != 0) {
- err = wc_AesSetIV(ctx->aes_encrypt, walk.iv);
- if (unlikely(err)) {
- pr_err("%s: wc_AesSetKey failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm)), err);
- return -EINVAL;
- }
- err = wc_AesCfbDecrypt(ctx->aes_encrypt, walk.dst.virt.addr,
- walk.src.virt.addr, nbytes);
- if (unlikely(err)) {
- pr_err("%s: wc_AesCfbDecrypt failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm)), err);
- return -EINVAL;
- }
- err = skcipher_walk_done(&walk, walk.nbytes - nbytes);
- if (unlikely(err)) {
- pr_err("%s: skcipher_walk_done failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm)), err);
- return err;
- }
- }
- return err;
- }
- static struct skcipher_alg cfbAesAlg = {
- .base.cra_name = WOLFKM_AESCFB_NAME,
- .base.cra_driver_name = WOLFKM_AESCFB_DRIVER,
- .base.cra_priority = WOLFSSL_LINUXKM_LKCAPI_PRIORITY,
- .base.cra_blocksize = AES_BLOCK_SIZE,
- .base.cra_ctxsize = sizeof(struct km_AesCtx),
- .base.cra_module = THIS_MODULE,
- .init = km_AesCfbInit,
- .exit = km_AesExit,
- .min_keysize = AES_128_KEY_SIZE,
- .max_keysize = AES_256_KEY_SIZE,
- .ivsize = AES_BLOCK_SIZE,
- .setkey = km_AesCfbSetKey,
- .encrypt = km_AesCfbEncrypt,
- .decrypt = km_AesCfbDecrypt,
- };
- static int cfbAesAlg_loaded = 0;
- #endif /* WOLFSSL_AES_CFB &&
- * (LINUXKM_LKCAPI_REGISTER_ALL || LINUXKM_LKCAPI_REGISTER_AESCBC)
- */
- #if defined(HAVE_AESGCM) && \
- (defined(LINUXKM_LKCAPI_REGISTER_ALL) || \
- defined(LINUXKM_LKCAPI_REGISTER_AESGCM))
- #ifndef WOLFSSL_AESGCM_STREAM
- #error LKCAPI registration of AES-GCM requires WOLFSSL_AESGCM_STREAM (--enable-aesgcm-stream).
- #endif
- static int km_AesGcmInit(struct crypto_aead * tfm)
- {
- struct km_AesCtx * ctx = crypto_aead_ctx(tfm);
- return km_AesInitCommon(ctx, WOLFKM_AESGCM_DRIVER, 0);
- }
- static void km_AesGcmExit(struct crypto_aead * tfm)
- {
- struct km_AesCtx * ctx = crypto_aead_ctx(tfm);
- km_AesExitCommon(ctx);
- }
- static int km_AesGcmSetKey(struct crypto_aead *tfm, const u8 *in_key,
- unsigned int key_len)
- {
- int err;
- struct km_AesCtx * ctx = crypto_aead_ctx(tfm);
- err = wc_AesGcmSetKey(ctx->aes_encrypt, in_key, key_len);
- if (unlikely(err)) {
- pr_err("%s: wc_AesGcmSetKey failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_aead_tfm(tfm)), err);
- return -ENOKEY;
- }
- return 0;
- }
- static int km_AesGcmSetAuthsize(struct crypto_aead *tfm, unsigned int authsize)
- {
- (void)tfm;
- if (authsize > AES_BLOCK_SIZE ||
- authsize < WOLFSSL_MIN_AUTH_TAG_SZ) {
- pr_err("%s: invalid authsize: %d\n",
- crypto_tfm_alg_driver_name(crypto_aead_tfm(tfm)), authsize);
- return -EINVAL;
- }
- return 0;
- }
- /*
- * aead ciphers recieve data in scatterlists in following order:
- * encrypt
- * req->src: aad||plaintext
- * req->dst: aad||ciphertext||tag
- * decrypt
- * req->src: aad||ciphertext||tag
- * req->dst: aad||plaintext, return 0 or -EBADMSG
- */
- static int km_AesGcmEncrypt(struct aead_request *req)
- {
- struct crypto_aead * tfm = NULL;
- struct km_AesCtx * ctx = NULL;
- struct skcipher_walk walk;
- struct scatter_walk assocSgWalk;
- unsigned int nbytes = 0;
- u8 authTag[AES_BLOCK_SIZE];
- int err = 0;
- unsigned int assocLeft = 0;
- unsigned int cryptLeft = 0;
- u8 * assoc = NULL;
- tfm = crypto_aead_reqtfm(req);
- ctx = crypto_aead_ctx(tfm);
- assocLeft = req->assoclen;
- cryptLeft = req->cryptlen;
- scatterwalk_start(&assocSgWalk, req->src);
- err = skcipher_walk_aead_encrypt(&walk, req, false);
- if (unlikely(err)) {
- pr_err("%s: skcipher_walk_aead_encrypt failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_aead_tfm(tfm)), err);
- return -1;
- }
- err = wc_AesGcmInit(ctx->aes_encrypt, NULL /*key*/, 0 /*keylen*/, walk.iv,
- AES_BLOCK_SIZE);
- if (unlikely(err)) {
- pr_err("%s: wc_AesGcmInit failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_aead_tfm(tfm)), err);
- return -EINVAL;
- }
- assoc = scatterwalk_map(&assocSgWalk);
- if (unlikely(IS_ERR(assoc))) {
- pr_err("%s: scatterwalk_map failed: %ld\n",
- crypto_tfm_alg_driver_name(crypto_aead_tfm(tfm)),
- PTR_ERR(assoc));
- return err;
- }
- err = wc_AesGcmEncryptUpdate(ctx->aes_encrypt, NULL, NULL, 0,
- assoc, assocLeft);
- assocLeft -= assocLeft;
- scatterwalk_unmap(assoc);
- assoc = NULL;
- if (unlikely(err)) {
- pr_err("%s: wc_AesGcmEncryptUpdate failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_aead_tfm(tfm)), err);
- return -EINVAL;
- }
- while ((nbytes = walk.nbytes) != 0) {
- int n = nbytes;
- if (likely(cryptLeft && nbytes)) {
- n = cryptLeft < nbytes ? cryptLeft : nbytes;
- err = wc_AesGcmEncryptUpdate(
- ctx->aes_encrypt,
- walk.dst.virt.addr,
- walk.src.virt.addr,
- cryptLeft,
- NULL, 0);
- nbytes -= n;
- cryptLeft -= n;
- }
- if (unlikely(err)) {
- pr_err("%s: wc_AesGcmEncryptUpdate failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_aead_tfm(tfm)), err);
- return -EINVAL;
- }
- err = skcipher_walk_done(&walk, nbytes);
- if (unlikely(err)) {
- pr_err("%s: skcipher_walk_done failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_aead_tfm(tfm)), err);
- return err;
- }
- }
- err = wc_AesGcmEncryptFinal(ctx->aes_encrypt, authTag, tfm->authsize);
- if (unlikely(err)) {
- pr_err("%s: wc_AesGcmEncryptFinal failed with return code %d\n",
- crypto_tfm_alg_driver_name(crypto_aead_tfm(tfm)), err);
- return -EINVAL;
- }
- /* Now copy the auth tag into request scatterlist. */
- scatterwalk_map_and_copy(authTag, req->dst,
- req->assoclen + req->cryptlen,
- tfm->authsize, 1);
- return err;
- }
- static int km_AesGcmDecrypt(struct aead_request *req)
- {
- struct crypto_aead * tfm = NULL;
- struct km_AesCtx * ctx = NULL;
- struct skcipher_walk walk;
- struct scatter_walk assocSgWalk;
- unsigned int nbytes = 0;
- u8 origAuthTag[AES_BLOCK_SIZE];
- int err = 0;
- unsigned int assocLeft = 0;
- unsigned int cryptLeft = 0;
- u8 * assoc = NULL;
- tfm = crypto_aead_reqtfm(req);
- ctx = crypto_aead_ctx(tfm);
- assocLeft = req->assoclen;
- cryptLeft = req->cryptlen - tfm->authsize;
- /* Copy out original auth tag from req->src. */
- scatterwalk_map_and_copy(origAuthTag, req->src,
- req->assoclen + req->cryptlen - tfm->authsize,
- tfm->authsize, 0);
- scatterwalk_start(&assocSgWalk, req->src);
- err = skcipher_walk_aead_decrypt(&walk, req, false);
- if (unlikely(err)) {
- pr_err("%s: skcipher_walk_aead_decrypt failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_aead_tfm(tfm)), err);
- return err;
- }
- err = wc_AesGcmInit(ctx->aes_encrypt, NULL /*key*/, 0 /*keylen*/, walk.iv,
- AES_BLOCK_SIZE);
- if (unlikely(err)) {
- pr_err("%s: wc_AesGcmInit failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_aead_tfm(tfm)), err);
- return -EINVAL;
- }
- assoc = scatterwalk_map(&assocSgWalk);
- if (unlikely(IS_ERR(assoc))) {
- pr_err("%s: scatterwalk_map failed: %ld\n",
- crypto_tfm_alg_driver_name(crypto_aead_tfm(tfm)),
- PTR_ERR(assoc));
- return err;
- }
- err = wc_AesGcmDecryptUpdate(ctx->aes_encrypt, NULL, NULL, 0,
- assoc, assocLeft);
- assocLeft -= assocLeft;
- scatterwalk_unmap(assoc);
- assoc = NULL;
- if (unlikely(err)) {
- pr_err("%s: wc_AesGcmDecryptUpdate failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_aead_tfm(tfm)), err);
- return -EINVAL;
- }
- while ((nbytes = walk.nbytes) != 0) {
- int n = nbytes;
- if (likely(cryptLeft && nbytes)) {
- n = cryptLeft < nbytes ? cryptLeft : nbytes;
- err = wc_AesGcmDecryptUpdate(
- ctx->aes_encrypt,
- walk.dst.virt.addr,
- walk.src.virt.addr,
- cryptLeft,
- NULL, 0);
- nbytes -= n;
- cryptLeft -= n;
- }
- if (unlikely(err)) {
- pr_err("%s: wc_AesGcmDecryptUpdate failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_aead_tfm(tfm)), err);
- return -EINVAL;
- }
- err = skcipher_walk_done(&walk, nbytes);
- if (unlikely(err)) {
- pr_err("%s: skcipher_walk_done failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_aead_tfm(tfm)), err);
- return err;
- }
- }
- err = wc_AesGcmDecryptFinal(ctx->aes_encrypt, origAuthTag, tfm->authsize);
- if (unlikely(err)) {
- pr_err("%s: wc_AesGcmDecryptFinal failed with return code %d\n",
- crypto_tfm_alg_driver_name(crypto_aead_tfm(tfm)), err);
- if (err == AES_GCM_AUTH_E) {
- return -EBADMSG;
- }
- else {
- return -EINVAL;
- }
- }
- return err;
- }
- static struct aead_alg gcmAesAead = {
- .base.cra_name = WOLFKM_AESGCM_NAME,
- .base.cra_driver_name = WOLFKM_AESGCM_DRIVER,
- .base.cra_priority = WOLFSSL_LINUXKM_LKCAPI_PRIORITY,
- .base.cra_blocksize = 1,
- .base.cra_ctxsize = sizeof(struct km_AesCtx),
- .base.cra_module = THIS_MODULE,
- .init = km_AesGcmInit,
- .exit = km_AesGcmExit,
- .setkey = km_AesGcmSetKey,
- .setauthsize = km_AesGcmSetAuthsize,
- .encrypt = km_AesGcmEncrypt,
- .decrypt = km_AesGcmDecrypt,
- .ivsize = AES_BLOCK_SIZE,
- .maxauthsize = AES_BLOCK_SIZE,
- .chunksize = AES_BLOCK_SIZE,
- };
- static int gcmAesAead_loaded = 0;
- #endif /* HAVE_AESGCM &&
- * (LINUXKM_LKCAPI_REGISTER_ALL || LINUXKM_LKCAPI_REGISTER_AESGCM) &&
- */
- #if defined(WOLFSSL_AES_XTS) && \
- (defined(LINUXKM_LKCAPI_REGISTER_ALL) || \
- defined(LINUXKM_LKCAPI_REGISTER_AESXTS))
- struct km_AesXtsCtx {
- XtsAes *aesXts; /* allocated in km_AesXtsInitCommon() to assure alignment
- * for AESNI.
- */
- };
- static int km_AesXtsInitCommon(struct km_AesXtsCtx * ctx, const char * name)
- {
- int err;
- ctx->aesXts = (XtsAes *)malloc(sizeof(*ctx->aesXts));
- if (! ctx->aesXts)
- return -MEMORY_E;
- err = wc_AesXtsInit(ctx->aesXts, NULL, INVALID_DEVID);
- if (unlikely(err)) {
- pr_err("%s: km_AesXtsInitCommon failed: %d\n", name, err);
- return -EINVAL;
- }
- return 0;
- }
- static int km_AesXtsInit(struct crypto_skcipher *tfm)
- {
- struct km_AesXtsCtx * ctx = crypto_skcipher_ctx(tfm);
- return km_AesXtsInitCommon(ctx, WOLFKM_AESXTS_DRIVER);
- }
- static void km_AesXtsExit(struct crypto_skcipher *tfm)
- {
- struct km_AesXtsCtx * ctx = crypto_skcipher_ctx(tfm);
- wc_AesXtsFree(ctx->aesXts);
- free(ctx->aesXts);
- ctx->aesXts = NULL;
- }
- static int km_AesXtsSetKey(struct crypto_skcipher *tfm, const u8 *in_key,
- unsigned int key_len)
- {
- int err;
- struct km_AesXtsCtx * ctx = crypto_skcipher_ctx(tfm);
- err = wc_AesXtsSetKeyNoInit(ctx->aesXts, in_key, key_len,
- AES_ENCRYPTION_AND_DECRYPTION);
- if (unlikely(err)) {
- pr_err("%s: wc_AesXtsSetKeyNoInit failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm)), err);
- return -EINVAL;
- }
- return 0;
- }
- /* see /usr/src/linux/drivers/md/dm-crypt.c */
- static int km_AesXtsEncrypt(struct skcipher_request *req)
- {
- int err = 0;
- struct crypto_skcipher * tfm = NULL;
- struct km_AesXtsCtx * ctx = NULL;
- struct skcipher_walk walk;
- unsigned int nbytes = 0;
- tfm = crypto_skcipher_reqtfm(req);
- ctx = crypto_skcipher_ctx(tfm);
- err = skcipher_walk_virt(&walk, req, false);
- if (unlikely(err)) {
- pr_err("%s: skcipher_walk_virt failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm)), err);
- return err;
- }
- while ((nbytes = walk.nbytes) != 0) {
- err = wc_AesXtsEncrypt(ctx->aesXts, walk.dst.virt.addr,
- walk.src.virt.addr, nbytes,
- walk.iv, walk.ivsize);
- if (unlikely(err)) {
- pr_err("%s: wc_AesXtsEncrypt failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm)), err);
- return -EINVAL;
- }
- err = skcipher_walk_done(&walk, walk.nbytes - nbytes);
- if (unlikely(err)) {
- pr_err("%s: skcipher_walk_done failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm)), err);
- return err;
- }
- }
- return err;
- }
- static int km_AesXtsDecrypt(struct skcipher_request *req)
- {
- int err = 0;
- struct crypto_skcipher * tfm = NULL;
- struct km_AesXtsCtx * ctx = NULL;
- struct skcipher_walk walk;
- unsigned int nbytes = 0;
- tfm = crypto_skcipher_reqtfm(req);
- ctx = crypto_skcipher_ctx(tfm);
- err = skcipher_walk_virt(&walk, req, false);
- if (unlikely(err)) {
- pr_err("%s: skcipher_walk_virt failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm)), err);
- return err;
- }
- while ((nbytes = walk.nbytes) != 0) {
- err = wc_AesXtsDecrypt(ctx->aesXts, walk.dst.virt.addr,
- walk.src.virt.addr, nbytes,
- walk.iv, walk.ivsize);
- if (unlikely(err)) {
- pr_err("%s: wc_AesCbcDecrypt failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm)), err);
- return -EINVAL;
- }
- err = skcipher_walk_done(&walk, walk.nbytes - nbytes);
- if (unlikely(err)) {
- pr_err("%s: skcipher_walk_done failed: %d\n",
- crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm)), err);
- return err;
- }
- }
- return err;
- }
- static struct skcipher_alg xtsAesAlg = {
- .base.cra_name = WOLFKM_AESXTS_NAME,
- .base.cra_driver_name = WOLFKM_AESXTS_DRIVER,
- .base.cra_priority = WOLFSSL_LINUXKM_LKCAPI_PRIORITY,
- .base.cra_blocksize = AES_BLOCK_SIZE,
- .base.cra_ctxsize = sizeof(struct km_AesXtsCtx),
- .base.cra_module = THIS_MODULE,
- .min_keysize = 2 * AES_128_KEY_SIZE,
- .max_keysize = 2 * AES_256_KEY_SIZE,
- .ivsize = AES_BLOCK_SIZE,
- .walksize = 2 * AES_BLOCK_SIZE,
- .init = km_AesXtsInit,
- .exit = km_AesXtsExit,
- .setkey = km_AesXtsSetKey,
- .encrypt = km_AesXtsEncrypt,
- .decrypt = km_AesXtsDecrypt
- };
- static int xtsAesAlg_loaded = 0;
- #endif /* WOLFSSL_AES_XTS &&
- * (LINUXKM_LKCAPI_REGISTER_ALL || LINUXKM_LKCAPI_REGISTER_AESXTS)
- */
- /* cipher tests, cribbed from test.c, with supplementary LKCAPI tests: */
- #if defined(HAVE_AES_CBC) && \
- (defined(LINUXKM_LKCAPI_REGISTER_ALL) || \
- defined(LINUXKM_LKCAPI_REGISTER_AESCBC))
- static int linuxkm_test_aescbc(void)
- {
- int ret = 0;
- struct crypto_skcipher * tfm = NULL;
- struct skcipher_request * req = NULL;
- struct scatterlist src, dst;
- Aes *aes;
- int aes_inited = 0;
- static const byte key32[] =
- {
- 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
- 0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66,
- 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
- 0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66
- };
- static const byte p_vector[] =
- /* Now is the time for all good men w/o trailing 0 */
- {
- 0x4e,0x6f,0x77,0x20,0x69,0x73,0x20,0x74,
- 0x68,0x65,0x20,0x74,0x69,0x6d,0x65,0x20,
- 0x66,0x6f,0x72,0x20,0x61,0x6c,0x6c,0x20,
- 0x67,0x6f,0x6f,0x64,0x20,0x6d,0x65,0x6e
- };
- static const byte iv[] = "1234567890abcdef";
- static const byte c_vector[] =
- {
- 0xd7,0xd6,0x04,0x5b,0x4d,0xc4,0x90,0xdf,
- 0x4a,0x82,0xed,0x61,0x26,0x4e,0x23,0xb3,
- 0xe4,0xb5,0x85,0x30,0x29,0x4c,0x9d,0xcf,
- 0x73,0xc9,0x46,0xd1,0xaa,0xc8,0xcb,0x62
- };
- byte iv_copy[sizeof(iv)];
- byte enc[sizeof(p_vector)];
- byte dec[sizeof(p_vector)];
- u8 * enc2 = NULL;
- u8 * dec2 = NULL;
- aes = (Aes *)malloc(sizeof(*aes));
- if (aes == NULL)
- return -ENOMEM;
- XMEMSET(enc, 0, sizeof(enc));
- XMEMSET(dec, 0, sizeof(enc));
- ret = wc_AesInit(aes, NULL, INVALID_DEVID);
- if (ret) {
- pr_err("wolfcrypt wc_AesInit failed with return code %d.\n", ret);
- goto test_cbc_end;
- }
- aes_inited = 1;
- ret = wc_AesSetKey(aes, key32, AES_BLOCK_SIZE * 2, iv, AES_ENCRYPTION);
- if (ret) {
- pr_err("wolfcrypt wc_AesSetKey failed with return code %d\n", ret);
- goto test_cbc_end;
- }
- ret = wc_AesCbcEncrypt(aes, enc, p_vector, sizeof(p_vector));
- if (ret) {
- pr_err("wolfcrypt wc_AesCbcEncrypt failed with return code %d\n", ret);
- goto test_cbc_end;
- }
- if (XMEMCMP(enc, c_vector, sizeof(c_vector)) != 0) {
- pr_err("wolfcrypt wc_AesCbcEncrypt KAT mismatch\n");
- return LINUXKM_LKCAPI_AES_KAT_MISMATCH_E;
- }
- /* Re init for decrypt and set flag. */
- wc_AesFree(aes);
- aes_inited = 0;
- ret = wc_AesInit(aes, NULL, INVALID_DEVID);
- if (ret) {
- pr_err("wolfcrypt wc_AesInit failed with return code %d.\n", ret);
- goto test_cbc_end;
- }
- aes_inited = 1;
- ret = wc_AesSetKey(aes, key32, AES_BLOCK_SIZE * 2, iv, AES_DECRYPTION);
- if (ret) {
- pr_err("wolfcrypt wc_AesSetKey failed with return code %d.\n", ret);
- goto test_cbc_end;
- }
- ret = wc_AesCbcDecrypt(aes, dec, enc, sizeof(p_vector));
- if (ret) {
- pr_err("wolfcrypt wc_AesCbcDecrypt failed with return code %d\n", ret);
- goto test_cbc_end;
- }
- ret = XMEMCMP(p_vector, dec, sizeof(p_vector));
- if (ret) {
- pr_err("error: p_vector and dec do not match: %d\n", ret);
- goto test_cbc_end;
- }
- /* now the kernel crypto part */
- enc2 = malloc(sizeof(p_vector));
- if (!enc2) {
- pr_err("error: malloc failed\n");
- goto test_cbc_end;
- }
- dec2 = malloc(sizeof(p_vector));
- if (!dec2) {
- pr_err("error: malloc failed\n");
- goto test_cbc_end;
- }
- memcpy(dec2, p_vector, sizeof(p_vector));
- tfm = crypto_alloc_skcipher(WOLFKM_AESCBC_NAME, 0, 0);
- if (IS_ERR(tfm)) {
- pr_err("error: allocating AES skcipher algorithm %s failed: %ld\n",
- WOLFKM_AESCBC_DRIVER, PTR_ERR(tfm));
- goto test_cbc_end;
- }
- #ifndef LINUXKM_LKCAPI_PRIORITY_ALLOW_MASKING
- {
- const char *driver_name =
- crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm));
- if (strcmp(driver_name, WOLFKM_AESCBC_DRIVER)) {
- pr_err("error: unexpected implementation for %s: %s (expected %s)\n",
- WOLFKM_AESCBC_NAME, driver_name, WOLFKM_AESCBC_DRIVER);
- ret = -ENOENT;
- goto test_cbc_end;
- }
- }
- #endif
- ret = crypto_skcipher_setkey(tfm, key32, AES_BLOCK_SIZE * 2);
- if (ret) {
- pr_err("error: crypto_skcipher_setkey returned: %d\n", ret);
- goto test_cbc_end;
- }
- req = skcipher_request_alloc(tfm, GFP_KERNEL);
- if (IS_ERR(req)) {
- pr_err("error: allocating AES skcipher request %s failed\n",
- WOLFKM_AESCBC_DRIVER);
- goto test_cbc_end;
- }
- sg_init_one(&src, dec2, sizeof(p_vector));
- sg_init_one(&dst, enc2, sizeof(p_vector));
- XMEMCPY(iv_copy, iv, sizeof(iv));
- skcipher_request_set_crypt(req, &src, &dst, sizeof(p_vector), iv_copy);
- ret = crypto_skcipher_encrypt(req);
- if (ret) {
- pr_err("error: crypto_skcipher_encrypt returned: %d\n", ret);
- goto test_cbc_end;
- }
- ret = XMEMCMP(enc, enc2, sizeof(p_vector));
- if (ret) {
- pr_err("error: enc and enc2 do not match: %d\n", ret);
- goto test_cbc_end;
- }
- memset(dec2, 0, sizeof(p_vector));
- sg_init_one(&src, enc2, sizeof(p_vector));
- sg_init_one(&dst, dec2, sizeof(p_vector));
- XMEMCPY(iv_copy, iv, sizeof(iv));
- skcipher_request_set_crypt(req, &src, &dst, sizeof(p_vector), iv_copy);
- ret = crypto_skcipher_decrypt(req);
- if (ret) {
- pr_err("ERROR: crypto_skcipher_decrypt returned %d\n", ret);
- goto test_cbc_end;
- }
- ret = XMEMCMP(dec, dec2, sizeof(p_vector));
- if (ret) {
- pr_err("error: dec and dec2 do not match: %d\n", ret);
- goto test_cbc_end;
- }
- test_cbc_end:
- if (enc2) { free(enc2); }
- if (dec2) { free(dec2); }
- if (req) { skcipher_request_free(req); }
- if (tfm) { crypto_free_skcipher(tfm); }
- if (aes_inited)
- wc_AesFree(aes);
- free(aes);
- return ret;
- }
- #endif /* HAVE_AES_CBC &&
- * (LINUXKM_LKCAPI_REGISTER_ALL || LINUXKM_LKCAPI_REGISTER_AESCBC)
- */
- #if defined(WOLFSSL_AES_CFB) && \
- (defined(LINUXKM_LKCAPI_REGISTER_ALL) || \
- defined(LINUXKM_LKCAPI_REGISTER_AESCFB))
- static int linuxkm_test_aescfb(void)
- {
- int ret = 0;
- struct crypto_skcipher * tfm = NULL;
- struct skcipher_request * req = NULL;
- struct scatterlist src, dst;
- Aes *aes;
- int aes_inited = 0;
- static const byte key32[] =
- {
- 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
- 0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66,
- 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
- 0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66
- };
- static const byte p_vector[] =
- /* Now is the time for all good men w/o trailing 0 */
- {
- 0x4e,0x6f,0x77,0x20,0x69,0x73,0x20,0x74,
- 0x68,0x65,0x20,0x74,0x69,0x6d,0x65,0x20,
- 0x66,0x6f,0x72,0x20,0x61,0x6c,0x6c,0x20,
- 0x67,0x6f,0x6f,0x64,0x20,0x6d,0x65,0x6e
- };
- static const byte iv[] = "1234567890abcdef";
- static const byte c_vector[] =
- {
- 0x56,0x35,0x3f,0xdd,0xde,0xa6,0x15,0x87,
- 0x57,0xdc,0x34,0x62,0x9a,0x68,0x96,0x51,
- 0xc7,0x09,0xb9,0x4e,0x47,0x6b,0x24,0x72,
- 0x19,0x5a,0xdf,0x7e,0xba,0xa8,0x01,0xb6
- };
- byte iv_copy[sizeof(iv)];
- byte enc[sizeof(p_vector)];
- byte dec[sizeof(p_vector)];
- u8 * enc2 = NULL;
- u8 * dec2 = NULL;
- aes = (Aes *)malloc(sizeof(*aes));
- if (aes == NULL)
- return -ENOMEM;
- XMEMSET(enc, 0, sizeof(enc));
- XMEMSET(dec, 0, sizeof(enc));
- ret = wc_AesInit(aes, NULL, INVALID_DEVID);
- if (ret) {
- pr_err("wolfcrypt wc_AesInit failed with return code %d.\n", ret);
- goto test_cfb_end;
- }
- aes_inited = 1;
- ret = wc_AesSetKey(aes, key32, AES_BLOCK_SIZE * 2, iv, AES_ENCRYPTION);
- if (ret) {
- pr_err("wolfcrypt wc_AesSetKey failed with return code %d\n", ret);
- goto test_cfb_end;
- }
- ret = wc_AesCfbEncrypt(aes, enc, p_vector, sizeof(p_vector));
- if (ret) {
- pr_err("wolfcrypt wc_AesCfbEncrypt failed with return code %d\n", ret);
- goto test_cfb_end;
- }
- if (XMEMCMP(enc, c_vector, sizeof(c_vector)) != 0) {
- pr_err("wolfcrypt wc_AesCfbEncrypt KAT mismatch\n");
- return LINUXKM_LKCAPI_AES_KAT_MISMATCH_E;
- }
- /* Re init for decrypt and set flag. */
- wc_AesFree(aes);
- aes_inited = 0;
- ret = wc_AesInit(aes, NULL, INVALID_DEVID);
- if (ret) {
- pr_err("wolfcrypt wc_AesInit failed with return code %d.\n", ret);
- goto test_cfb_end;
- }
- aes_inited = 1;
- ret = wc_AesSetKey(aes, key32, AES_BLOCK_SIZE * 2, iv, AES_ENCRYPTION);
- if (ret) {
- pr_err("wolfcrypt wc_AesSetKey failed with return code %d.\n", ret);
- goto test_cfb_end;
- }
- ret = wc_AesCfbDecrypt(aes, dec, enc, sizeof(p_vector));
- if (ret) {
- pr_err("wolfcrypt wc_AesCfbDecrypt failed with return code %d\n", ret);
- goto test_cfb_end;
- }
- ret = XMEMCMP(p_vector, dec, sizeof(p_vector));
- if (ret) {
- pr_err("error: p_vector and dec do not match: %d\n", ret);
- goto test_cfb_end;
- }
- /* now the kernel crypto part */
- enc2 = malloc(sizeof(p_vector));
- if (!enc2) {
- pr_err("error: malloc failed\n");
- goto test_cfb_end;
- }
- dec2 = malloc(sizeof(p_vector));
- if (!dec2) {
- pr_err("error: malloc failed\n");
- goto test_cfb_end;
- }
- memcpy(dec2, p_vector, sizeof(p_vector));
- tfm = crypto_alloc_skcipher(WOLFKM_AESCFB_NAME, 0, 0);
- if (IS_ERR(tfm)) {
- pr_err("error: allocating AES skcipher algorithm %s failed: %ld\n",
- WOLFKM_AESCFB_DRIVER, PTR_ERR(tfm));
- goto test_cfb_end;
- }
- #ifndef LINUXKM_LKCAPI_PRIORITY_ALLOW_MASKING
- {
- const char *driver_name =
- crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm));
- if (strcmp(driver_name, WOLFKM_AESCFB_DRIVER)) {
- pr_err("error: unexpected implementation for %s: %s (expected %s)\n",
- WOLFKM_AESCFB_NAME, driver_name, WOLFKM_AESCFB_DRIVER);
- ret = -ENOENT;
- goto test_cfb_end;
- }
- }
- #endif
- ret = crypto_skcipher_setkey(tfm, key32, AES_BLOCK_SIZE * 2);
- if (ret) {
- pr_err("error: crypto_skcipher_setkey returned: %d\n", ret);
- goto test_cfb_end;
- }
- req = skcipher_request_alloc(tfm, GFP_KERNEL);
- if (IS_ERR(req)) {
- pr_err("error: allocating AES skcipher request %s failed\n",
- WOLFKM_AESCFB_DRIVER);
- goto test_cfb_end;
- }
- sg_init_one(&src, dec2, sizeof(p_vector));
- sg_init_one(&dst, enc2, sizeof(p_vector));
- XMEMCPY(iv_copy, iv, sizeof(iv));
- skcipher_request_set_crypt(req, &src, &dst, sizeof(p_vector), iv_copy);
- ret = crypto_skcipher_encrypt(req);
- if (ret) {
- pr_err("error: crypto_skcipher_encrypt returned: %d\n", ret);
- goto test_cfb_end;
- }
- ret = XMEMCMP(enc, enc2, sizeof(p_vector));
- if (ret) {
- pr_err("error: enc and enc2 do not match: %d\n", ret);
- goto test_cfb_end;
- }
- memset(dec2, 0, sizeof(p_vector));
- sg_init_one(&src, enc2, sizeof(p_vector));
- sg_init_one(&dst, dec2, sizeof(p_vector));
- XMEMCPY(iv_copy, iv, sizeof(iv));
- skcipher_request_set_crypt(req, &src, &dst, sizeof(p_vector), iv_copy);
- ret = crypto_skcipher_decrypt(req);
- if (ret) {
- pr_err("error: crypto_skcipher_decrypt returned: %d\n", ret);
- goto test_cfb_end;
- }
- ret = XMEMCMP(dec, dec2, sizeof(p_vector));
- if (ret) {
- pr_err("error: dec and dec2 do not match: %d\n", ret);
- goto test_cfb_end;
- }
- test_cfb_end:
- if (enc2) { free(enc2); }
- if (dec2) { free(dec2); }
- if (req) { skcipher_request_free(req); }
- if (tfm) { crypto_free_skcipher(tfm); }
- if (aes_inited)
- wc_AesFree(aes);
- free(aes);
- return ret;
- }
- #endif /* WOLFSSL_AES_CFB &&
- * (LINUXKM_LKCAPI_REGISTER_ALL || LINUXKM_LKCAPI_REGISTER_AESCFB)
- */
- #if defined(HAVE_AESGCM) && \
- (defined(LINUXKM_LKCAPI_REGISTER_ALL) || \
- defined(LINUXKM_LKCAPI_REGISTER_AESGCM))
- static int linuxkm_test_aesgcm(void)
- {
- int ret = 0;
- struct crypto_aead * tfm = NULL;
- struct aead_request * req = NULL;
- struct scatterlist * src = NULL;
- struct scatterlist * dst = NULL;
- Aes *aes;
- int aes_inited = 0;
- static const byte key32[] =
- {
- 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
- 0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66,
- 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
- 0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66
- };
- static const byte p_vector[] =
- /* Now is the time for all w/o trailing 0 */
- {
- 0x4e,0x6f,0x77,0x20,0x69,0x73,0x20,0x74,
- 0x68,0x65,0x20,0x74,0x69,0x6d,0x65,0x20,
- 0x66,0x6f,0x72,0x20,0x61,0x6c,0x6c,0x20
- };
- static const byte assoc[] =
- {
- 0xfe, 0xed, 0xfa, 0xce, 0xde, 0xad, 0xbe, 0xef,
- 0xfe, 0xed, 0xfa, 0xce, 0xde, 0xad, 0xbe, 0xef,
- 0xab, 0xad, 0xda, 0xd2
- };
- static const byte ivstr[] = "1234567890abcdef";
- static const byte c_vector[] =
- {
- 0x0c,0x97,0x05,0x3c,0xef,0x5c,0x63,0x6b,
- 0x15,0xe4,0x00,0x63,0xf8,0x8c,0xd0,0x95,
- 0x27,0x81,0x90,0x9c,0x9f,0xe6,0x98,0xe9
- };
- static const byte KAT_authTag[] =
- {
- 0xc9,0xd5,0x7a,0x77,0xac,0x28,0xc2,0xe7,
- 0xe4,0x28,0x90,0xaa,0x09,0xab,0xf9,0x7c
- };
- byte enc[sizeof(p_vector)];
- byte authTag[AES_BLOCK_SIZE];
- byte dec[sizeof(p_vector)];
- u8 * assoc2 = NULL;
- u8 * enc2 = NULL;
- u8 * dec2 = NULL;
- u8 * iv = NULL;
- size_t encryptLen = sizeof(p_vector);
- size_t decryptLen = sizeof(p_vector) + sizeof(authTag);
- /* Init stack variables. */
- XMEMSET(enc, 0, sizeof(p_vector));
- XMEMSET(dec, 0, sizeof(p_vector));
- XMEMSET(authTag, 0, AES_BLOCK_SIZE);
- aes = (Aes *)malloc(sizeof(*aes));
- if (aes == NULL)
- return -ENOMEM;
- ret = wc_AesInit(aes, NULL, INVALID_DEVID);
- if (ret) {
- pr_err("error: wc_AesInit failed with return code %d.\n", ret);
- goto test_gcm_end;
- }
- aes_inited = 1;
- ret = wc_AesGcmInit(aes, key32, sizeof(key32)/sizeof(byte), ivstr,
- AES_BLOCK_SIZE);
- if (ret) {
- pr_err("error: wc_AesGcmInit failed with return code %d.\n", ret);
- goto test_gcm_end;
- }
- ret = wc_AesGcmEncryptUpdate(aes, NULL, NULL, 0, assoc, sizeof(assoc));
- if (ret) {
- pr_err("error: wc_AesGcmEncryptUpdate failed with return code %d\n",
- ret);
- goto test_gcm_end;
- }
- ret = wc_AesGcmEncryptUpdate(aes, enc, p_vector, sizeof(p_vector), NULL, 0);
- if (ret) {
- pr_err("error: wc_AesGcmEncryptUpdate failed with return code %d\n",
- ret);
- goto test_gcm_end;
- }
- if (XMEMCMP(enc, c_vector, sizeof(c_vector)) != 0) {
- pr_err("wolfcrypt AES-GCM KAT mismatch on ciphertext\n");
- ret = LINUXKM_LKCAPI_AESGCM_KAT_MISMATCH_E;
- goto test_gcm_end;
- }
- ret = wc_AesGcmEncryptFinal(aes, authTag, AES_BLOCK_SIZE);
- if (ret) {
- pr_err("error: wc_AesGcmEncryptFinal failed with return code %d\n",
- ret);
- goto test_gcm_end;
- }
- if (XMEMCMP(authTag, KAT_authTag, sizeof(KAT_authTag)) != 0) {
- pr_err("wolfcrypt AES-GCM KAT mismatch on authTag\n");
- ret = LINUXKM_LKCAPI_AESGCM_KAT_MISMATCH_E;
- goto test_gcm_end;
- }
- ret = wc_AesGcmInit(aes, key32, sizeof(key32)/sizeof(byte), ivstr,
- AES_BLOCK_SIZE);
- if (ret) {
- pr_err("error: wc_AesGcmInit failed with return code %d.\n", ret);
- goto test_gcm_end;
- }
- ret = wc_AesGcmDecryptUpdate(aes, dec, enc, sizeof(p_vector),
- assoc, sizeof(assoc));
- if (ret) {
- pr_err("error: wc_AesGcmDecryptUpdate failed with return code %d\n",
- ret);
- goto test_gcm_end;
- }
- ret = wc_AesGcmDecryptFinal(aes, authTag, AES_BLOCK_SIZE);
- if (ret) {
- pr_err("error: wc_AesGcmEncryptFinal failed with return code %d\n",
- ret);
- goto test_gcm_end;
- }
- ret = XMEMCMP(p_vector, dec, sizeof(p_vector));
- if (ret) {
- pr_err("error: gcm: p_vector and dec do not match: %d\n", ret);
- goto test_gcm_end;
- }
- /* now the kernel crypto part */
- assoc2 = malloc(sizeof(assoc));
- if (IS_ERR(assoc2)) {
- pr_err("error: malloc failed\n");
- goto test_gcm_end;
- }
- memset(assoc2, 0, sizeof(assoc));
- memcpy(assoc2, assoc, sizeof(assoc));
- iv = malloc(AES_BLOCK_SIZE);
- if (IS_ERR(iv)) {
- pr_err("error: malloc failed\n");
- goto test_gcm_end;
- }
- memset(iv, 0, AES_BLOCK_SIZE);
- memcpy(iv, ivstr, AES_BLOCK_SIZE);
- enc2 = malloc(decryptLen);
- if (IS_ERR(enc2)) {
- pr_err("error: malloc failed\n");
- goto test_gcm_end;
- }
- dec2 = malloc(decryptLen);
- if (IS_ERR(dec2)) {
- pr_err("error: malloc failed\n");
- goto test_gcm_end;
- }
- memset(enc2, 0, decryptLen);
- memset(dec2, 0, decryptLen);
- memcpy(dec2, p_vector, sizeof(p_vector));
- tfm = crypto_alloc_aead(WOLFKM_AESGCM_NAME, 0, 0);
- if (IS_ERR(tfm)) {
- pr_err("error: allocating AES skcipher algorithm %s failed: %ld\n",
- WOLFKM_AESGCM_DRIVER, PTR_ERR(tfm));
- goto test_gcm_end;
- }
- #ifndef LINUXKM_LKCAPI_PRIORITY_ALLOW_MASKING
- {
- const char *driver_name = crypto_tfm_alg_driver_name(crypto_aead_tfm(tfm));
- if (strcmp(driver_name, WOLFKM_AESGCM_DRIVER)) {
- pr_err("error: unexpected implementation for %s: %s (expected %s)\n",
- WOLFKM_AESGCM_NAME, driver_name, WOLFKM_AESGCM_DRIVER);
- ret = -ENOENT;
- goto test_gcm_end;
- }
- }
- #endif
- ret = crypto_aead_setkey(tfm, key32, AES_BLOCK_SIZE * 2);
- if (ret) {
- pr_err("error: crypto_aead_setkey returned: %d\n", ret);
- goto test_gcm_end;
- }
- ret = crypto_aead_setauthsize(tfm, sizeof(authTag));
- if (ret) {
- pr_err("error: crypto_aead_setauthsize returned: %d\n", ret);
- goto test_gcm_end;
- }
- req = aead_request_alloc(tfm, GFP_KERNEL);
- if (IS_ERR(req)) {
- pr_err("error: allocating AES aead request %s failed: %ld\n",
- WOLFKM_AESCBC_DRIVER, PTR_ERR(req));
- goto test_gcm_end;
- }
- src = malloc(sizeof(struct scatterlist) * 2);
- dst = malloc(sizeof(struct scatterlist) * 2);
- if (IS_ERR(src) || IS_ERR(dst)) {
- pr_err("error: malloc src or dst failed: %ld, %ld\n",
- PTR_ERR(src), PTR_ERR(dst));
- goto test_gcm_end;
- }
- sg_init_table(src, 2);
- sg_set_buf(src, assoc2, sizeof(assoc));
- sg_set_buf(&src[1], dec2, sizeof(p_vector));
- sg_init_table(dst, 2);
- sg_set_buf(dst, assoc2, sizeof(assoc));
- sg_set_buf(&dst[1], enc2, decryptLen);
- aead_request_set_callback(req, 0, NULL, NULL);
- aead_request_set_ad(req, sizeof(assoc));
- aead_request_set_crypt(req, src, dst, sizeof(p_vector), iv);
- ret = crypto_aead_encrypt(req);
- if (ret) {
- pr_err("error: crypto_aead_encrypt returned: %d\n", ret);
- goto test_gcm_end;
- }
- ret = XMEMCMP(enc, enc2, sizeof(p_vector));
- if (ret) {
- pr_err("error: enc and enc2 do not match: %d\n", ret);
- goto test_gcm_end;
- }
- ret = XMEMCMP(authTag, enc2 + encryptLen, sizeof(authTag));
- if (ret) {
- pr_err("error: authTags do not match: %d\n", ret);
- goto test_gcm_end;
- }
- /* Now decrypt crypto request. Reverse src and dst. */
- memset(dec2, 0, decryptLen);
- aead_request_set_ad(req, sizeof(assoc));
- aead_request_set_crypt(req, dst, src, decryptLen, iv);
- ret = crypto_aead_decrypt(req);
- if (ret) {
- pr_err("error: crypto_aead_decrypt returned: %d\n", ret);
- goto test_gcm_end;
- }
- ret = XMEMCMP(dec, dec2, sizeof(p_vector));
- if (ret) {
- pr_err("error: dec and dec2 do not match: %d\n", ret);
- goto test_gcm_end;
- }
- test_gcm_end:
- if (req) { aead_request_free(req); req = NULL; }
- if (tfm) { crypto_free_aead(tfm); tfm = NULL; }
- if (src) { free(src); src = NULL; }
- if (dst) { free(dst); dst = NULL; }
- if (dec2) { free(dec2); dec2 = NULL; }
- if (enc2) { free(enc2); enc2 = NULL; }
- if (assoc2) { free(assoc2); assoc2 = NULL; }
- if (iv) { free(iv); iv = NULL; }
- if (aes_inited)
- wc_AesFree(aes);
- free(aes);
- return ret;
- }
- #endif /* HAVE_AESGCM &&
- * (LINUXKM_LKCAPI_REGISTER_ALL || LINUXKM_LKCAPI_REGISTER_AESGCM) &&
- */
- #if defined(WOLFSSL_AES_XTS) && \
- (defined(LINUXKM_LKCAPI_REGISTER_ALL) || \
- defined(LINUXKM_LKCAPI_REGISTER_AESXTS))
- /* test vectors from
- * http://csrc.nist.gov/groups/STM/cavp/block-cipher-modes.html
- */
- #ifdef WOLFSSL_AES_128
- static int aes_xts_128_test(void)
- {
- XtsAes *aes = NULL;
- int aes_inited = 0;
- int ret = 0;
- #define AES_XTS_128_TEST_BUF_SIZ (AES_BLOCK_SIZE * 2 + 8)
- unsigned char *buf = NULL;
- unsigned char *cipher = NULL;
- u8 * enc2 = NULL;
- u8 * dec2 = NULL;
- struct scatterlist * src = NULL;
- struct scatterlist * dst = NULL;
- struct crypto_skcipher *tfm = NULL;
- struct skcipher_request *req = NULL;
- u8 iv[AES_BLOCK_SIZE];
- byte* large_input = NULL;
- /* 128 key tests */
- static const unsigned char k1[] = {
- 0xa1, 0xb9, 0x0c, 0xba, 0x3f, 0x06, 0xac, 0x35,
- 0x3b, 0x2c, 0x34, 0x38, 0x76, 0x08, 0x17, 0x62,
- 0x09, 0x09, 0x23, 0x02, 0x6e, 0x91, 0x77, 0x18,
- 0x15, 0xf2, 0x9d, 0xab, 0x01, 0x93, 0x2f, 0x2f
- };
- static const unsigned char i1[] = {
- 0x4f, 0xae, 0xf7, 0x11, 0x7c, 0xda, 0x59, 0xc6,
- 0x6e, 0x4b, 0x92, 0x01, 0x3e, 0x76, 0x8a, 0xd5
- };
- static const unsigned char p1[] = {
- 0xeb, 0xab, 0xce, 0x95, 0xb1, 0x4d, 0x3c, 0x8d,
- 0x6f, 0xb3, 0x50, 0x39, 0x07, 0x90, 0x31, 0x1c
- };
- /* plain text test of partial block is not from NIST test vector list */
- static const unsigned char pp[] = {
- 0xeb, 0xab, 0xce, 0x95, 0xb1, 0x4d, 0x3c, 0x8d,
- 0x6f, 0xb3, 0x50, 0x39, 0x07, 0x90, 0x31, 0x1c,
- 0x6e, 0x4b, 0x92, 0x01, 0x3e, 0x76, 0x8a, 0xd5
- };
- static const unsigned char c1[] = {
- 0x77, 0x8a, 0xe8, 0xb4, 0x3c, 0xb9, 0x8d, 0x5a,
- 0x82, 0x50, 0x81, 0xd5, 0xbe, 0x47, 0x1c, 0x63
- };
- /* plain text test of partial block is not from NIST test vector list */
- static const unsigned char cp[] = {
- 0x2b, 0xf7, 0x2c, 0xf3, 0xeb, 0x85, 0xef, 0x7b,
- 0x0b, 0x76, 0xa0, 0xaa, 0xf3, 0x3f, 0x25, 0x8b,
- 0x77, 0x8a, 0xe8, 0xb4, 0x3c, 0xb9, 0x8d, 0x5a
- };
- static const unsigned char k2[] = {
- 0x39, 0x25, 0x79, 0x05, 0xdf, 0xcc, 0x77, 0x76,
- 0x6c, 0x87, 0x0a, 0x80, 0x6a, 0x60, 0xe3, 0xc0,
- 0x93, 0xd1, 0x2a, 0xcf, 0xcb, 0x51, 0x42, 0xfa,
- 0x09, 0x69, 0x89, 0x62, 0x5b, 0x60, 0xdb, 0x16
- };
- static const unsigned char i2[] = {
- 0x5c, 0xf7, 0x9d, 0xb6, 0xc5, 0xcd, 0x99, 0x1a,
- 0x1c, 0x78, 0x81, 0x42, 0x24, 0x95, 0x1e, 0x84
- };
- static const unsigned char p2[] = {
- 0xbd, 0xc5, 0x46, 0x8f, 0xbc, 0x8d, 0x50, 0xa1,
- 0x0d, 0x1c, 0x85, 0x7f, 0x79, 0x1c, 0x5c, 0xba,
- 0xb3, 0x81, 0x0d, 0x0d, 0x73, 0xcf, 0x8f, 0x20,
- 0x46, 0xb1, 0xd1, 0x9e, 0x7d, 0x5d, 0x8a, 0x56
- };
- static const unsigned char c2[] = {
- 0xd6, 0xbe, 0x04, 0x6d, 0x41, 0xf2, 0x3b, 0x5e,
- 0xd7, 0x0b, 0x6b, 0x3d, 0x5c, 0x8e, 0x66, 0x23,
- 0x2b, 0xe6, 0xb8, 0x07, 0xd4, 0xdc, 0xc6, 0x0e,
- 0xff, 0x8d, 0xbc, 0x1d, 0x9f, 0x7f, 0xc8, 0x22
- };
- #ifndef HAVE_FIPS /* FIPS requires different keys for main and tweak. */
- static const unsigned char k3[] = {
- 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20,
- 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20,
- 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20,
- 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20,
- };
- static const unsigned char i3[] = {
- 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20,
- 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20,
- };
- static const unsigned char p3[] = {
- 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20,
- 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20,
- 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20,
- 0x20, 0xff, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20,
- 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20
- };
- static const unsigned char c3[] = {
- 0xA2, 0x07, 0x47, 0x76, 0x3F, 0xEC, 0x0C, 0x23,
- 0x1B, 0xD0, 0xBD, 0x46, 0x9A, 0x27, 0x38, 0x12,
- 0x95, 0x02, 0x3D, 0x5D, 0xC6, 0x94, 0x51, 0x36,
- 0xA0, 0x85, 0xD2, 0x69, 0x6E, 0x87, 0x0A, 0xBF,
- 0xB5, 0x5A, 0xDD, 0xCB, 0x80, 0xE0, 0xFC, 0xCD
- };
- #endif /* HAVE_FIPS */
- if ((aes = (XtsAes *)XMALLOC(sizeof(*aes), NULL, DYNAMIC_TYPE_AES))
- == NULL)
- {
- ret = MEMORY_E;
- goto out;
- }
- if ((buf = (unsigned char *)XMALLOC(AES_XTS_128_TEST_BUF_SIZ, NULL,
- DYNAMIC_TYPE_AES)) == NULL)
- {
- ret = MEMORY_E;
- goto out;
- }
- if ((cipher = (unsigned char *)XMALLOC(AES_XTS_128_TEST_BUF_SIZ, NULL,
- DYNAMIC_TYPE_AES)) == NULL)
- {
- ret = MEMORY_E;
- goto out;
- }
- XMEMSET(buf, 0, AES_XTS_128_TEST_BUF_SIZ);
- ret = wc_AesXtsInit(aes, NULL, INVALID_DEVID);
- if (ret != 0)
- goto out;
- else
- aes_inited = 1;
- ret = wc_AesXtsSetKeyNoInit(aes, k2, sizeof(k2), AES_ENCRYPTION);
- if (ret != 0)
- goto out;
- ret = wc_AesXtsEncrypt(aes, buf, p2, sizeof(p2), i2, sizeof(i2));
- if (ret != 0)
- goto out;
- if (XMEMCMP(c2, buf, sizeof(c2))) {
- ret = LINUXKM_LKCAPI_AES_KAT_MISMATCH_E;
- goto out;
- }
- #if defined(DEBUG_VECTOR_REGISTER_ACCESS) && defined(WC_C_DYNAMIC_FALLBACK)
- WC_DEBUG_SET_VECTOR_REGISTERS_RETVAL(SYSLIB_FAILED_E);
- ret = wc_AesXtsEncrypt(aes, buf, p2, sizeof(p2), i2, sizeof(i2));
- WC_DEBUG_SET_VECTOR_REGISTERS_RETVAL(0);
- if (ret != 0)
- goto out;
- if (XMEMCMP(c2, buf, sizeof(c2))) {
- ret = LINUXKM_LKCAPI_AES_KAT_MISMATCH_E;
- goto out;
- }
- #endif
- XMEMSET(buf, 0, AES_XTS_128_TEST_BUF_SIZ);
- ret = wc_AesXtsSetKeyNoInit(aes, k1, sizeof(k1), AES_ENCRYPTION);
- if (ret != 0)
- goto out;
- ret = wc_AesXtsEncrypt(aes, buf, p1, sizeof(p1), i1, sizeof(i1));
- if (ret != 0)
- goto out;
- if (XMEMCMP(c1, buf, AES_BLOCK_SIZE)) {
- ret = LINUXKM_LKCAPI_AES_KAT_MISMATCH_E;
- goto out;
- }
- #if defined(DEBUG_VECTOR_REGISTER_ACCESS) && defined(WC_C_DYNAMIC_FALLBACK)
- WC_DEBUG_SET_VECTOR_REGISTERS_RETVAL(SYSLIB_FAILED_E);
- ret = wc_AesXtsEncrypt(aes, buf, p1, sizeof(p1), i1, sizeof(i1));
- WC_DEBUG_SET_VECTOR_REGISTERS_RETVAL(0);
- if (ret != 0)
- goto out;
- if (XMEMCMP(c1, buf, AES_BLOCK_SIZE)) {
- ret = LINUXKM_LKCAPI_AES_KAT_MISMATCH_E;
- goto out;
- }
- #endif
- /* partial block encryption test */
- XMEMSET(cipher, 0, AES_XTS_128_TEST_BUF_SIZ);
- ret = wc_AesXtsEncrypt(aes, cipher, pp, sizeof(pp), i1, sizeof(i1));
- if (ret != 0)
- goto out;
- if (XMEMCMP(cp, cipher, sizeof(cp))) {
- ret = LINUXKM_LKCAPI_AES_KAT_MISMATCH_E;
- goto out;
- }
- #if defined(DEBUG_VECTOR_REGISTER_ACCESS) && defined(WC_C_DYNAMIC_FALLBACK)
- WC_DEBUG_SET_VECTOR_REGISTERS_RETVAL(SYSLIB_FAILED_E);
- XMEMSET(cipher, 0, AES_XTS_128_TEST_BUF_SIZ);
- ret = wc_AesXtsEncrypt(aes, cipher, pp, sizeof(pp), i1, sizeof(i1));
- WC_DEBUG_SET_VECTOR_REGISTERS_RETVAL(0);
- if (ret != 0)
- goto out;
- if (XMEMCMP(cp, cipher, sizeof(cp))) {
- ret = LINUXKM_LKCAPI_AES_KAT_MISMATCH_E;
- goto out;
- }
- #endif
- /* partial block decrypt test */
- XMEMSET(buf, 0, AES_XTS_128_TEST_BUF_SIZ);
- ret = wc_AesXtsSetKeyNoInit(aes, k1, sizeof(k1), AES_DECRYPTION);
- if (ret != 0)
- goto out;
- ret = wc_AesXtsDecrypt(aes, buf, cipher, sizeof(pp), i1, sizeof(i1));
- if (ret != 0)
- goto out;
- if (XMEMCMP(pp, buf, sizeof(pp))) {
- ret = LINUXKM_LKCAPI_AES_KAT_MISMATCH_E;
- goto out;
- }
- #if defined(DEBUG_VECTOR_REGISTER_ACCESS) && defined(WC_C_DYNAMIC_FALLBACK)
- WC_DEBUG_SET_VECTOR_REGISTERS_RETVAL(SYSLIB_FAILED_E);
- XMEMSET(buf, 0, AES_XTS_128_TEST_BUF_SIZ);
- ret = wc_AesXtsDecrypt(aes, buf, cipher, sizeof(pp), i1, sizeof(i1));
- WC_DEBUG_SET_VECTOR_REGISTERS_RETVAL(0);
- if (ret != 0)
- goto out;
- if (XMEMCMP(pp, buf, sizeof(pp))) {
- ret = LINUXKM_LKCAPI_AES_KAT_MISMATCH_E;
- goto out;
- }
- #endif
- /* NIST decrypt test vector */
- XMEMSET(buf, 0, AES_XTS_128_TEST_BUF_SIZ);
- ret = wc_AesXtsDecrypt(aes, buf, c1, sizeof(c1), i1, sizeof(i1));
- if (ret != 0)
- goto out;
- if (XMEMCMP(p1, buf, AES_BLOCK_SIZE)) {
- ret = LINUXKM_LKCAPI_AES_KAT_MISMATCH_E;
- goto out;
- }
- #if defined(DEBUG_VECTOR_REGISTER_ACCESS) && defined(WC_C_DYNAMIC_FALLBACK)
- WC_DEBUG_SET_VECTOR_REGISTERS_RETVAL(SYSLIB_FAILED_E);
- XMEMSET(buf, 0, AES_XTS_128_TEST_BUF_SIZ);
- ret = wc_AesXtsDecrypt(aes, buf, c1, sizeof(c1), i1, sizeof(i1));
- WC_DEBUG_SET_VECTOR_REGISTERS_RETVAL(0);
- if (ret != 0)
- goto out;
- if (XMEMCMP(p1, buf, AES_BLOCK_SIZE)) {
- ret = LINUXKM_LKCAPI_AES_KAT_MISMATCH_E;
- goto out;
- }
- #endif
- /* fail case with decrypting using wrong key */
- XMEMSET(buf, 0, AES_XTS_128_TEST_BUF_SIZ);
- ret = wc_AesXtsDecrypt(aes, buf, c2, sizeof(c2), i2, sizeof(i2));
- if (ret != 0)
- goto out;
- if (XMEMCMP(p2, buf, sizeof(p2)) == 0) { /* fail case with wrong key */
- ret = LINUXKM_LKCAPI_AES_KAT_MISMATCH_E;
- goto out;
- }
- /* set correct key and retest */
- XMEMSET(buf, 0, AES_XTS_128_TEST_BUF_SIZ);
- ret = wc_AesXtsSetKeyNoInit(aes, k2, sizeof(k2), AES_DECRYPTION);
- if (ret != 0)
- goto out;
- ret = wc_AesXtsDecrypt(aes, buf, c2, sizeof(c2), i2, sizeof(i2));
- if (ret != 0)
- goto out;
- if (XMEMCMP(p2, buf, sizeof(p2))) {
- ret = LINUXKM_LKCAPI_AES_KAT_MISMATCH_E;
- goto out;
- }
- #ifndef HAVE_FIPS
- /* Test ciphertext stealing in-place. */
- XMEMCPY(buf, p3, sizeof(p3));
- ret = wc_AesXtsSetKeyNoInit(aes, k3, sizeof(k3), AES_ENCRYPTION);
- if (ret != 0)
- goto out;
- ret = wc_AesXtsEncrypt(aes, buf, buf, sizeof(p3), i3, sizeof(i3));
- if (ret != 0)
- goto out;
- if (XMEMCMP(c3, buf, sizeof(c3))) {
- ret = LINUXKM_LKCAPI_AES_KAT_MISMATCH_E;
- goto out;
- }
- ret = wc_AesXtsSetKeyNoInit(aes, k3, sizeof(k3), AES_DECRYPTION);
- if (ret != 0)
- goto out;
- ret = wc_AesXtsDecrypt(aes, buf, buf, sizeof(c3), i3, sizeof(i3));
- if (ret != 0)
- goto out;
- if (XMEMCMP(p3, buf, sizeof(p3))) {
- ret = LINUXKM_LKCAPI_AES_KAT_MISMATCH_E;
- goto out;
- }
- #endif /* HAVE_FIPS */
- {
- #define LARGE_XTS_SZ 1024
- int i;
- int j;
- large_input = (byte *)XMALLOC(LARGE_XTS_SZ, NULL,
- DYNAMIC_TYPE_TMP_BUFFER);
- if (large_input == NULL) {
- ret = MEMORY_E;
- goto out;
- }
- for (i = 0; i < (int)LARGE_XTS_SZ; i++)
- large_input[i] = (byte)i;
- for (j = 16; j < (int)LARGE_XTS_SZ; j++) {
- ret = wc_AesXtsSetKeyNoInit(aes, k1, sizeof(k1), AES_ENCRYPTION);
- if (ret != 0)
- goto out;
- ret = wc_AesXtsEncrypt(aes, large_input, large_input, j, i1,
- sizeof(i1));
- if (ret != 0)
- goto out;
- ret = wc_AesXtsSetKeyNoInit(aes, k1, sizeof(k1), AES_DECRYPTION);
- if (ret != 0)
- goto out;
- ret = wc_AesXtsDecrypt(aes, large_input, large_input, j, i1,
- sizeof(i1));
- if (ret != 0)
- goto out;
- for (i = 0; i < j; i++) {
- if (large_input[i] != (byte)i) {
- ret = LINUXKM_LKCAPI_AES_KAT_MISMATCH_E;
- goto out;
- }
- }
- }
- }
- /* now the kernel crypto part */
- enc2 = XMALLOC(sizeof(pp), NULL, DYNAMIC_TYPE_AES);
- if (!enc2) {
- pr_err("error: malloc failed\n");
- ret = -ENOMEM;
- goto test_xts_end;
- }
- dec2 = XMALLOC(sizeof(pp), NULL, DYNAMIC_TYPE_AES);
- if (!dec2) {
- pr_err("error: malloc failed\n");
- ret = -ENOMEM;
- goto test_xts_end;
- }
- src = XMALLOC(sizeof(*src) * 2, NULL, DYNAMIC_TYPE_AES);
- if (! src) {
- pr_err("error: malloc failed\n");
- ret = -ENOMEM;
- goto test_xts_end;
- }
- dst = XMALLOC(sizeof(*dst) * 2, NULL, DYNAMIC_TYPE_AES);
- if (! dst) {
- pr_err("error: malloc failed\n");
- ret = -ENOMEM;
- goto test_xts_end;
- }
- tfm = crypto_alloc_skcipher(WOLFKM_AESXTS_NAME, 0, 0);
- if (IS_ERR(tfm)) {
- ret = PTR_ERR(tfm);
- pr_err("error: allocating AES skcipher algorithm %s failed: %d\n",
- WOLFKM_AESXTS_DRIVER, ret);
- goto test_xts_end;
- }
- #ifndef LINUXKM_LKCAPI_PRIORITY_ALLOW_MASKING
- {
- const char *driver_name =
- crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm));
- if (strcmp(driver_name, WOLFKM_AESXTS_DRIVER)) {
- pr_err("error: unexpected implementation for %s: %s (expected %s)\n",
- WOLFKM_AESXTS_NAME, driver_name, WOLFKM_AESXTS_DRIVER);
- ret = -ENOENT;
- goto test_xts_end;
- }
- }
- #endif
- ret = crypto_skcipher_ivsize(tfm);
- if (ret != sizeof(iv)) {
- pr_err("error: AES skcipher algorithm %s crypto_skcipher_ivsize()"
- " returned %d but expected %d\n",
- WOLFKM_AESXTS_DRIVER, ret, (int)sizeof(iv));
- ret = -EINVAL;
- goto test_xts_end;
- }
- ret = crypto_skcipher_setkey(tfm, k1, sizeof(k1));
- if (ret) {
- pr_err("error: crypto_skcipher_setkey for %s returned: %d\n",
- WOLFKM_AESXTS_NAME, ret);
- goto test_xts_end;
- }
- req = skcipher_request_alloc(tfm, GFP_KERNEL);
- if (IS_ERR(req)) {
- ret = PTR_ERR(req);
- pr_err("error: allocating AES skcipher request %s failed: %d\n",
- WOLFKM_AESXTS_DRIVER, ret);
- goto test_xts_end;
- }
- memcpy(dec2, p1, sizeof(p1));
- memset(enc2, 0, sizeof(p1));
- sg_init_one(src, dec2, sizeof(p1));
- sg_init_one(dst, enc2, sizeof(p1));
- memcpy(iv, i1, sizeof(iv));
- skcipher_request_set_crypt(req, src, dst, sizeof(p1), iv);
- ret = crypto_skcipher_encrypt(req);
- if (ret) {
- pr_err("error: crypto_skcipher_encrypt returned: %d\n", ret);
- goto test_xts_end;
- }
- ret = XMEMCMP(c1, enc2, sizeof(c1));
- if (ret) {
- pr_err("error: c1 and enc2 do not match: %d\n", ret);
- ret = -EINVAL;
- goto test_xts_end;
- }
- memset(dec2, 0, sizeof(p1));
- sg_init_one(src, enc2, sizeof(p1));
- sg_init_one(dst, dec2, sizeof(p1));
- memcpy(iv, i1, sizeof(iv));
- skcipher_request_set_crypt(req, src, dst, sizeof(p1), iv);
- ret = crypto_skcipher_decrypt(req);
- if (ret) {
- pr_err("ERROR: crypto_skcipher_decrypt returned %d\n", ret);
- goto test_xts_end;
- }
- ret = XMEMCMP(p1, dec2, sizeof(p1));
- if (ret) {
- pr_err("error: p1 and dec2 do not match: %d\n", ret);
- ret = -EINVAL;
- goto test_xts_end;
- }
- memcpy(dec2, pp, sizeof(pp));
- memset(enc2, 0, sizeof(pp));
- sg_init_one(src, dec2, sizeof(pp));
- sg_init_one(dst, enc2, sizeof(pp));
- memcpy(iv, i1, sizeof(iv));
- skcipher_request_set_crypt(req, src, dst, sizeof(pp), iv);
- ret = crypto_skcipher_encrypt(req);
- if (ret) {
- pr_err("error: crypto_skcipher_encrypt returned: %d\n", ret);
- goto test_xts_end;
- }
- ret = XMEMCMP(cp, enc2, sizeof(cp));
- if (ret) {
- pr_err("error: cp and enc2 do not match: %d\n", ret);
- ret = -EINVAL;
- goto test_xts_end;
- }
- memset(dec2, 0, sizeof(pp));
- sg_init_one(src, enc2, sizeof(pp));
- sg_init_one(dst, dec2, sizeof(pp));
- memcpy(iv, i1, sizeof(iv));
- skcipher_request_set_crypt(req, src, dst, sizeof(pp), iv);
- ret = crypto_skcipher_decrypt(req);
- if (ret) {
- pr_err("ERROR: crypto_skcipher_decrypt returned %d\n", ret);
- goto test_xts_end;
- }
- ret = XMEMCMP(pp, dec2, sizeof(pp));
- if (ret) {
- pr_err("error: pp and dec2 do not match: %d\n", ret);
- ret = -EINVAL;
- goto test_xts_end;
- }
- test_xts_end:
- if (enc2)
- XFREE(enc2, NULL, DYNAMIC_TYPE_AES);
- if (dec2)
- XFREE(dec2, NULL, DYNAMIC_TYPE_AES);
- if (src)
- XFREE(src, NULL, DYNAMIC_TYPE_AES);
- if (dst)
- XFREE(dst, NULL, DYNAMIC_TYPE_AES);
- if (req)
- skcipher_request_free(req);
- if (tfm)
- crypto_free_skcipher(tfm);
- out:
- if (large_input)
- XFREE(large_input, NULL, DYNAMIC_TYPE_TMP_BUFFER);
- if (aes_inited)
- wc_AesXtsFree(aes);
- if (buf)
- XFREE(buf, NULL, DYNAMIC_TYPE_AES);
- if (cipher)
- XFREE(cipher, NULL, DYNAMIC_TYPE_AES);
- if (aes)
- XFREE(aes, NULL, DYNAMIC_TYPE_AES);
- #undef AES_XTS_128_TEST_BUF_SIZ
- return ret;
- }
- #endif /* WOLFSSL_AES_128 */
- #ifdef WOLFSSL_AES_256
- static int aes_xts_256_test(void)
- {
- XtsAes *aes = NULL;
- int aes_inited = 0;
- int ret = 0;
- #define AES_XTS_256_TEST_BUF_SIZ (AES_BLOCK_SIZE * 3)
- unsigned char *buf = NULL;
- unsigned char *cipher = NULL;
- u8 * enc2 = NULL;
- u8 * dec2 = NULL;
- struct scatterlist * src = NULL;
- struct scatterlist * dst = NULL;
- struct crypto_skcipher *tfm = NULL;
- struct skcipher_request *req = NULL;
- u8 iv[AES_BLOCK_SIZE];
- /* 256 key tests */
- static const unsigned char k1[] = {
- 0x1e, 0xa6, 0x61, 0xc5, 0x8d, 0x94, 0x3a, 0x0e,
- 0x48, 0x01, 0xe4, 0x2f, 0x4b, 0x09, 0x47, 0x14,
- 0x9e, 0x7f, 0x9f, 0x8e, 0x3e, 0x68, 0xd0, 0xc7,
- 0x50, 0x52, 0x10, 0xbd, 0x31, 0x1a, 0x0e, 0x7c,
- 0xd6, 0xe1, 0x3f, 0xfd, 0xf2, 0x41, 0x8d, 0x8d,
- 0x19, 0x11, 0xc0, 0x04, 0xcd, 0xa5, 0x8d, 0xa3,
- 0xd6, 0x19, 0xb7, 0xe2, 0xb9, 0x14, 0x1e, 0x58,
- 0x31, 0x8e, 0xea, 0x39, 0x2c, 0xf4, 0x1b, 0x08
- };
- static const unsigned char i1[] = {
- 0xad, 0xf8, 0xd9, 0x26, 0x27, 0x46, 0x4a, 0xd2,
- 0xf0, 0x42, 0x8e, 0x84, 0xa9, 0xf8, 0x75, 0x64
- };
- static const unsigned char p1[] = {
- 0x2e, 0xed, 0xea, 0x52, 0xcd, 0x82, 0x15, 0xe1,
- 0xac, 0xc6, 0x47, 0xe8, 0x10, 0xbb, 0xc3, 0x64,
- 0x2e, 0x87, 0x28, 0x7f, 0x8d, 0x2e, 0x57, 0xe3,
- 0x6c, 0x0a, 0x24, 0xfb, 0xc1, 0x2a, 0x20, 0x2e
- };
- static const unsigned char c1[] = {
- 0xcb, 0xaa, 0xd0, 0xe2, 0xf6, 0xce, 0xa3, 0xf5,
- 0x0b, 0x37, 0xf9, 0x34, 0xd4, 0x6a, 0x9b, 0x13,
- 0x0b, 0x9d, 0x54, 0xf0, 0x7e, 0x34, 0xf3, 0x6a,
- 0xf7, 0x93, 0xe8, 0x6f, 0x73, 0xc6, 0xd7, 0xdb
- };
- /* plain text test of partial block is not from NIST test vector list */
- static const unsigned char pp[] = {
- 0xeb, 0xab, 0xce, 0x95, 0xb1, 0x4d, 0x3c, 0x8d,
- 0x6f, 0xb3, 0x50, 0x39, 0x07, 0x90, 0x31, 0x1c,
- 0x6e, 0x4b, 0x92, 0x01, 0x3e, 0x76, 0x8a, 0xd5
- };
- static const unsigned char cp[] = {
- 0x65, 0x5e, 0x1d, 0x37, 0x4a, 0x91, 0xe7, 0x6c,
- 0x4f, 0x83, 0x92, 0xbc, 0x5a, 0x10, 0x55, 0x27,
- 0x61, 0x0e, 0x5a, 0xde, 0xca, 0xc5, 0x12, 0xd8
- };
- static const unsigned char k2[] = {
- 0xad, 0x50, 0x4b, 0x85, 0xd7, 0x51, 0xbf, 0xba,
- 0x69, 0x13, 0xb4, 0xcc, 0x79, 0xb6, 0x5a, 0x62,
- 0xf7, 0xf3, 0x9d, 0x36, 0x0f, 0x35, 0xb5, 0xec,
- 0x4a, 0x7e, 0x95, 0xbd, 0x9b, 0xa5, 0xf2, 0xec,
- 0xc1, 0xd7, 0x7e, 0xa3, 0xc3, 0x74, 0xbd, 0x4b,
- 0x13, 0x1b, 0x07, 0x83, 0x87, 0xdd, 0x55, 0x5a,
- 0xb5, 0xb0, 0xc7, 0xe5, 0x2d, 0xb5, 0x06, 0x12,
- 0xd2, 0xb5, 0x3a, 0xcb, 0x47, 0x8a, 0x53, 0xb4
- };
- static const unsigned char i2[] = {
- 0xe6, 0x42, 0x19, 0xed, 0xe0, 0xe1, 0xc2, 0xa0,
- 0x0e, 0xf5, 0x58, 0x6a, 0xc4, 0x9b, 0xeb, 0x6f
- };
- static const unsigned char p2[] = {
- 0x24, 0xcb, 0x76, 0x22, 0x55, 0xb5, 0xa8, 0x00,
- 0xf4, 0x6e, 0x80, 0x60, 0x56, 0x9e, 0x05, 0x53,
- 0xbc, 0xfe, 0x86, 0x55, 0x3b, 0xca, 0xd5, 0x89,
- 0xc7, 0x54, 0x1a, 0x73, 0xac, 0xc3, 0x9a, 0xbd,
- 0x53, 0xc4, 0x07, 0x76, 0xd8, 0xe8, 0x22, 0x61,
- 0x9e, 0xa9, 0xad, 0x77, 0xa0, 0x13, 0x4c, 0xfc
- };
- static const unsigned char c2[] = {
- 0xa3, 0xc6, 0xf3, 0xf3, 0x82, 0x79, 0x5b, 0x10,
- 0x87, 0xd7, 0x02, 0x50, 0xdb, 0x2c, 0xd3, 0xb1,
- 0xa1, 0x62, 0xa8, 0xb6, 0xdc, 0x12, 0x60, 0x61,
- 0xc1, 0x0a, 0x84, 0xa5, 0x85, 0x3f, 0x3a, 0x89,
- 0xe6, 0x6c, 0xdb, 0xb7, 0x9a, 0xb4, 0x28, 0x9b,
- 0xc3, 0xea, 0xd8, 0x10, 0xe9, 0xc0, 0xaf, 0x92
- };
- if ((aes = (XtsAes *)XMALLOC(sizeof(*aes), NULL, DYNAMIC_TYPE_AES))
- == NULL)
- {
- ret = MEMORY_E;
- goto out;
- }
- if ((buf = (unsigned char *)XMALLOC(AES_XTS_256_TEST_BUF_SIZ, NULL,
- DYNAMIC_TYPE_AES)) == NULL)
- {
- ret = MEMORY_E;
- goto out;
- }
- if ((cipher = (unsigned char *)XMALLOC(AES_XTS_256_TEST_BUF_SIZ, NULL,
- DYNAMIC_TYPE_AES)) == NULL)
- {
- ret = MEMORY_E;
- goto out;
- }
- ret = wc_AesXtsInit(aes, NULL, INVALID_DEVID);
- if (ret != 0)
- goto out;
- else
- aes_inited = 1;
- XMEMSET(buf, 0, AES_XTS_256_TEST_BUF_SIZ);
- ret = wc_AesXtsSetKeyNoInit(aes, k2, sizeof(k2), AES_ENCRYPTION);
- if (ret != 0)
- goto out;
- ret = wc_AesXtsEncrypt(aes, buf, p2, sizeof(p2), i2, sizeof(i2));
- if (ret != 0)
- goto out;
- if (XMEMCMP(c2, buf, sizeof(c2))) {
- ret = LINUXKM_LKCAPI_AES_KAT_MISMATCH_E;
- goto out;
- }
- XMEMSET(buf, 0, AES_XTS_256_TEST_BUF_SIZ);
- ret = wc_AesXtsSetKeyNoInit(aes, k1, sizeof(k1), AES_ENCRYPTION);
- if (ret != 0)
- goto out;
- ret = wc_AesXtsEncrypt(aes, buf, p1, sizeof(p1), i1, sizeof(i1));
- if (ret != 0)
- goto out;
- if (XMEMCMP(c1, buf, AES_BLOCK_SIZE)) {
- ret = LINUXKM_LKCAPI_AES_KAT_MISMATCH_E;
- goto out;
- }
- /* partial block encryption test */
- XMEMSET(cipher, 0, AES_XTS_256_TEST_BUF_SIZ);
- ret = wc_AesXtsEncrypt(aes, cipher, pp, sizeof(pp), i1, sizeof(i1));
- if (ret != 0)
- goto out;
- /* partial block decrypt test */
- XMEMSET(buf, 0, AES_XTS_256_TEST_BUF_SIZ);
- ret = wc_AesXtsSetKeyNoInit(aes, k1, sizeof(k1), AES_DECRYPTION);
- if (ret != 0)
- goto out;
- ret = wc_AesXtsDecrypt(aes, buf, cipher, sizeof(pp), i1, sizeof(i1));
- if (ret != 0)
- goto out;
- if (XMEMCMP(pp, buf, sizeof(pp))) {
- ret = LINUXKM_LKCAPI_AES_KAT_MISMATCH_E;
- goto out;
- }
- /* NIST decrypt test vector */
- XMEMSET(buf, 0, AES_XTS_256_TEST_BUF_SIZ);
- ret = wc_AesXtsDecrypt(aes, buf, c1, sizeof(c1), i1, sizeof(i1));
- if (ret != 0)
- goto out;
- if (XMEMCMP(p1, buf, AES_BLOCK_SIZE)) {
- ret = LINUXKM_LKCAPI_AES_KAT_MISMATCH_E;
- goto out;
- }
- XMEMSET(buf, 0, AES_XTS_256_TEST_BUF_SIZ);
- ret = wc_AesXtsSetKeyNoInit(aes, k2, sizeof(k2), AES_DECRYPTION);
- if (ret != 0)
- goto out;
- ret = wc_AesXtsDecrypt(aes, buf, c2, sizeof(c2), i2, sizeof(i2));
- if (ret != 0)
- goto out;
- if (XMEMCMP(p2, buf, sizeof(p2))) {
- ret = LINUXKM_LKCAPI_AES_KAT_MISMATCH_E;
- goto out;
- }
- /* now the kernel crypto part */
- enc2 = XMALLOC(sizeof(p1), NULL, DYNAMIC_TYPE_AES);
- if (!enc2) {
- pr_err("error: malloc failed\n");
- ret = -ENOMEM;
- goto test_xts_end;
- }
- dec2 = XMALLOC(sizeof(p1), NULL, DYNAMIC_TYPE_AES);
- if (!dec2) {
- pr_err("error: malloc failed\n");
- ret = -ENOMEM;
- goto test_xts_end;
- }
- src = XMALLOC(sizeof(*src) * 2, NULL, DYNAMIC_TYPE_AES);
- if (! src) {
- pr_err("error: malloc failed\n");
- ret = -ENOMEM;
- goto test_xts_end;
- }
- dst = XMALLOC(sizeof(*dst) * 2, NULL, DYNAMIC_TYPE_AES);
- if (! dst) {
- pr_err("error: malloc failed\n");
- ret = -ENOMEM;
- goto test_xts_end;
- }
- tfm = crypto_alloc_skcipher(WOLFKM_AESXTS_NAME, 0, 0);
- if (IS_ERR(tfm)) {
- ret = PTR_ERR(tfm);
- pr_err("error: allocating AES skcipher algorithm %s failed: %d\n",
- WOLFKM_AESXTS_DRIVER, ret);
- goto test_xts_end;
- }
- #ifndef LINUXKM_LKCAPI_PRIORITY_ALLOW_MASKING
- {
- const char *driver_name = crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm));
- if (strcmp(driver_name, WOLFKM_AESXTS_DRIVER)) {
- pr_err("error: unexpected implementation for %s: %s (expected %s)\n",
- WOLFKM_AESXTS_NAME, driver_name, WOLFKM_AESXTS_DRIVER);
- ret = -ENOENT;
- goto test_xts_end;
- }
- }
- #endif
- ret = crypto_skcipher_ivsize(tfm);
- if (ret != sizeof(iv)) {
- pr_err("error: AES skcipher algorithm %s crypto_skcipher_ivsize()"
- " returned %d but expected %d\n",
- WOLFKM_AESXTS_DRIVER, ret, (int)sizeof(iv));
- ret = -EINVAL;
- goto test_xts_end;
- }
- ret = crypto_skcipher_setkey(tfm, k1, sizeof(k1));
- if (ret) {
- pr_err("error: crypto_skcipher_setkey for %s returned: %d\n",
- WOLFKM_AESXTS_NAME, ret);
- goto test_xts_end;
- }
- req = skcipher_request_alloc(tfm, GFP_KERNEL);
- if (IS_ERR(req)) {
- ret = PTR_ERR(req);
- pr_err("error: allocating AES skcipher request %s failed: %d\n",
- WOLFKM_AESXTS_DRIVER, ret);
- goto test_xts_end;
- }
- memcpy(dec2, p1, sizeof(p1));
- memset(enc2, 0, sizeof(p1));
- sg_init_one(src, dec2, sizeof(p1));
- sg_init_one(dst, enc2, sizeof(p1));
- memcpy(iv, i1, sizeof(iv));
- skcipher_request_set_crypt(req, src, dst, sizeof(p1), iv);
- ret = crypto_skcipher_encrypt(req);
- if (ret) {
- pr_err("error: crypto_skcipher_encrypt returned: %d\n", ret);
- goto test_xts_end;
- }
- ret = XMEMCMP(c1, enc2, sizeof(c1));
- if (ret) {
- pr_err("error: c1 and enc2 do not match: %d\n", ret);
- ret = -EINVAL;
- goto test_xts_end;
- }
- memset(dec2, 0, sizeof(p1));
- sg_init_one(src, enc2, sizeof(p1));
- sg_init_one(dst, dec2, sizeof(p1));
- memcpy(iv, i1, sizeof(iv));
- skcipher_request_set_crypt(req, src, dst, sizeof(p1), iv);
- ret = crypto_skcipher_decrypt(req);
- if (ret) {
- pr_err("ERROR: crypto_skcipher_decrypt returned %d\n", ret);
- goto test_xts_end;
- }
- ret = XMEMCMP(p1, dec2, sizeof(p1));
- if (ret) {
- pr_err("error: p1 and dec2 do not match: %d\n", ret);
- ret = -EINVAL;
- goto test_xts_end;
- }
- memcpy(dec2, pp, sizeof(pp));
- memset(enc2, 0, sizeof(pp));
- sg_init_one(src, dec2, sizeof(pp));
- sg_init_one(dst, enc2, sizeof(pp));
- memcpy(iv, i1, sizeof(iv));
- skcipher_request_set_crypt(req, src, dst, sizeof(pp), iv);
- ret = crypto_skcipher_encrypt(req);
- if (ret) {
- pr_err("error: crypto_skcipher_encrypt returned: %d\n", ret);
- goto test_xts_end;
- }
- ret = XMEMCMP(cp, enc2, sizeof(cp));
- if (ret) {
- pr_err("error: cp and enc2 do not match: %d\n", ret);
- ret = -EINVAL;
- goto test_xts_end;
- }
- memset(dec2, 0, sizeof(pp));
- sg_init_one(src, enc2, sizeof(pp));
- sg_init_one(dst, dec2, sizeof(pp));
- memcpy(iv, i1, sizeof(iv));
- skcipher_request_set_crypt(req, src, dst, sizeof(pp), iv);
- ret = crypto_skcipher_decrypt(req);
- if (ret) {
- pr_err("ERROR: crypto_skcipher_decrypt returned %d\n", ret);
- goto test_xts_end;
- }
- ret = XMEMCMP(pp, dec2, sizeof(pp));
- if (ret) {
- pr_err("error: pp and dec2 do not match: %d\n", ret);
- ret = -EINVAL;
- goto test_xts_end;
- }
- test_xts_end:
- if (enc2)
- XFREE(enc2, NULL, DYNAMIC_TYPE_AES);
- if (dec2)
- XFREE(dec2, NULL, DYNAMIC_TYPE_AES);
- if (src)
- XFREE(src, NULL, DYNAMIC_TYPE_AES);
- if (dst)
- XFREE(dst, NULL, DYNAMIC_TYPE_AES);
- if (req)
- skcipher_request_free(req);
- if (tfm)
- crypto_free_skcipher(tfm);
- out:
- if (aes_inited)
- wc_AesXtsFree(aes);
- if (buf)
- XFREE(buf, NULL, DYNAMIC_TYPE_AES);
- if (cipher)
- XFREE(cipher, NULL, DYNAMIC_TYPE_AES);
- if (aes)
- XFREE(aes, NULL, DYNAMIC_TYPE_AES);
- #undef AES_XTS_256_TEST_BUF_SIZ
- return ret;
- }
- #endif /* WOLFSSL_AES_256 */
- static int linuxkm_test_aesxts(void) {
- int ret;
- #ifdef WOLFSSL_AES_128
- ret = aes_xts_128_test();
- if (ret != 0) {
- pr_err("aes_xts_128_test() failed with retval %d.\n", ret);
- goto out;
- }
- #endif
- #ifdef WOLFSSL_AES_256
- ret = aes_xts_256_test();
- if (ret != 0) {
- pr_err("aes_xts_256_test() failed with retval %d.\n", ret);
- goto out;
- }
- #endif
- out:
- return ret;
- }
- #endif /* WOLFSSL_AES_XTS &&
- * (LINUXKM_LKCAPI_REGISTER_ALL || LINUXKM_LKCAPI_REGISTER_AESXTS)
- */
- #endif /* !NO_AES */
- static int linuxkm_lkcapi_register(void)
- {
- int ret = 0;
- #define REGISTER_ALG(alg, installer, tester) do { \
- if (alg ## _loaded) { \
- pr_err("ERROR: %s is already registered.\n", \
- (alg).base.cra_driver_name); \
- return -EEXIST; \
- } \
- \
- ret = (installer)(&(alg)); \
- \
- if (ret) { \
- pr_err("ERROR: " #installer " for %s failed " \
- "with return code %d.\n", \
- (alg).base.cra_driver_name, ret); \
- return ret; \
- } \
- \
- alg ## _loaded = 1; \
- \
- ret = (tester()); \
- \
- if (ret) { \
- pr_err("ERROR: self-test for %s failed " \
- "with return code %d.\n", \
- (alg).base.cra_driver_name, ret); \
- return ret; \
- } \
- pr_info("%s self-test OK -- " \
- "registered for %s with priority %d.\n", \
- (alg).base.cra_driver_name, \
- (alg).base.cra_name, \
- (alg).base.cra_priority); \
- } while (0)
- #if defined(HAVE_AES_CBC) && \
- (defined(LINUXKM_LKCAPI_REGISTER_ALL) || \
- defined(LINUXKM_LKCAPI_REGISTER_AESCBC))
- REGISTER_ALG(cbcAesAlg, crypto_register_skcipher, linuxkm_test_aescbc);
- #endif
- #if defined(WOLFSSL_AES_CFB) && \
- (defined(LINUXKM_LKCAPI_REGISTER_ALL) || \
- defined(LINUXKM_LKCAPI_REGISTER_AESCFB))
- REGISTER_ALG(cfbAesAlg, crypto_register_skcipher, linuxkm_test_aescfb);
- #endif
- #if defined(HAVE_AESGCM) && \
- (defined(LINUXKM_LKCAPI_REGISTER_ALL) || \
- defined(LINUXKM_LKCAPI_REGISTER_AESGCM))
- REGISTER_ALG(gcmAesAead, crypto_register_aead, linuxkm_test_aesgcm);
- #endif
- #if defined(WOLFSSL_AES_XTS) && \
- (defined(LINUXKM_LKCAPI_REGISTER_ALL) || \
- defined(LINUXKM_LKCAPI_REGISTER_AESXTS))
- REGISTER_ALG(xtsAesAlg, crypto_register_skcipher, linuxkm_test_aesxts);
- #endif
- #undef REGISTER_ALG
- return 0;
- }
- static void linuxkm_lkcapi_unregister(void)
- {
- #define UNREGISTER_ALG(alg, uninstaller) do { \
- if (alg ## _loaded) { \
- (uninstaller)(&(alg)); \
- alg ## _loaded = 0; \
- } \
- } while (0)
- #if defined(HAVE_AES_CBC) && \
- (defined(LINUXKM_LKCAPI_REGISTER_ALL) || \
- defined(LINUXKM_LKCAPI_REGISTER_AESCBC))
- UNREGISTER_ALG(cbcAesAlg, crypto_unregister_skcipher);
- #endif
- #if defined(WOLFSSL_AES_CFB) && \
- (defined(LINUXKM_LKCAPI_REGISTER_ALL) || \
- defined(LINUXKM_LKCAPI_REGISTER_AESCFB))
- UNREGISTER_ALG(cfbAesAlg, crypto_unregister_skcipher);
- #endif
- #if defined(HAVE_AESGCM) && \
- (defined(LINUXKM_LKCAPI_REGISTER_ALL) || \
- defined(LINUXKM_LKCAPI_REGISTER_AESGCM))
- UNREGISTER_ALG(gcmAesAead, crypto_unregister_aead);
- #endif
- #if defined(WOLFSSL_AES_XTS) && \
- (defined(LINUXKM_LKCAPI_REGISTER_ALL) || \
- defined(LINUXKM_LKCAPI_REGISTER_AESXTS))
- UNREGISTER_ALG(xtsAesAlg, crypto_unregister_skcipher);
- #endif
- #undef UNREGISTER_ALG
- }
|