diff options
author | Herbert Xu <herbert@gondor.apana.org.au> | 2015-05-27 04:03:50 -0400 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2015-05-27 23:23:20 -0400 |
commit | 957e0fe6292372460bdace9c2a67a857379ad1db (patch) | |
tree | d642a0afc2e2d7a117e6413f70c4079302d6ac9f /net | |
parent | 25528fdae4abb763c446b2e5081f80ba5a4b6f31 (diff) |
mac80211: Switch to new AEAD interface
This patch makes use of the new AEAD interface which uses a single
SG list instead of separate lists for the AD and plain text.
Tested-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'net')
-rw-r--r-- | net/mac80211/aes_ccm.c | 30 | ||||
-rw-r--r-- | net/mac80211/aes_gcm.c | 30 | ||||
-rw-r--r-- | net/mac80211/aes_gmac.c | 12 |
3 files changed, 33 insertions, 39 deletions
diff --git a/net/mac80211/aes_ccm.c b/net/mac80211/aes_ccm.c index 70d53dab6508..7663c28ba353 100644 --- a/net/mac80211/aes_ccm.c +++ b/net/mac80211/aes_ccm.c | |||
@@ -22,7 +22,7 @@ void ieee80211_aes_ccm_encrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad, | |||
22 | u8 *data, size_t data_len, u8 *mic, | 22 | u8 *data, size_t data_len, u8 *mic, |
23 | size_t mic_len) | 23 | size_t mic_len) |
24 | { | 24 | { |
25 | struct scatterlist assoc, pt, ct[2]; | 25 | struct scatterlist sg[3]; |
26 | 26 | ||
27 | char aead_req_data[sizeof(struct aead_request) + | 27 | char aead_req_data[sizeof(struct aead_request) + |
28 | crypto_aead_reqsize(tfm)] | 28 | crypto_aead_reqsize(tfm)] |
@@ -31,15 +31,14 @@ void ieee80211_aes_ccm_encrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad, | |||
31 | 31 | ||
32 | memset(aead_req, 0, sizeof(aead_req_data)); | 32 | memset(aead_req, 0, sizeof(aead_req_data)); |
33 | 33 | ||
34 | sg_init_one(&pt, data, data_len); | 34 | sg_init_table(sg, 3); |
35 | sg_init_one(&assoc, &aad[2], be16_to_cpup((__be16 *)aad)); | 35 | sg_set_buf(&sg[0], &aad[2], be16_to_cpup((__be16 *)aad)); |
36 | sg_init_table(ct, 2); | 36 | sg_set_buf(&sg[1], data, data_len); |
37 | sg_set_buf(&ct[0], data, data_len); | 37 | sg_set_buf(&sg[2], mic, mic_len); |
38 | sg_set_buf(&ct[1], mic, mic_len); | ||
39 | 38 | ||
40 | aead_request_set_tfm(aead_req, tfm); | 39 | aead_request_set_tfm(aead_req, tfm); |
41 | aead_request_set_assoc(aead_req, &assoc, assoc.length); | 40 | aead_request_set_crypt(aead_req, sg, sg, data_len, b_0); |
42 | aead_request_set_crypt(aead_req, &pt, ct, data_len, b_0); | 41 | aead_request_set_ad(aead_req, sg[0].length); |
43 | 42 | ||
44 | crypto_aead_encrypt(aead_req); | 43 | crypto_aead_encrypt(aead_req); |
45 | } | 44 | } |
@@ -48,7 +47,7 @@ int ieee80211_aes_ccm_decrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad, | |||
48 | u8 *data, size_t data_len, u8 *mic, | 47 | u8 *data, size_t data_len, u8 *mic, |
49 | size_t mic_len) | 48 | size_t mic_len) |
50 | { | 49 | { |
51 | struct scatterlist assoc, pt, ct[2]; | 50 | struct scatterlist sg[3]; |
52 | char aead_req_data[sizeof(struct aead_request) + | 51 | char aead_req_data[sizeof(struct aead_request) + |
53 | crypto_aead_reqsize(tfm)] | 52 | crypto_aead_reqsize(tfm)] |
54 | __aligned(__alignof__(struct aead_request)); | 53 | __aligned(__alignof__(struct aead_request)); |
@@ -59,15 +58,14 @@ int ieee80211_aes_ccm_decrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad, | |||
59 | 58 | ||
60 | memset(aead_req, 0, sizeof(aead_req_data)); | 59 | memset(aead_req, 0, sizeof(aead_req_data)); |
61 | 60 | ||
62 | sg_init_one(&pt, data, data_len); | 61 | sg_init_table(sg, 3); |
63 | sg_init_one(&assoc, &aad[2], be16_to_cpup((__be16 *)aad)); | 62 | sg_set_buf(&sg[0], &aad[2], be16_to_cpup((__be16 *)aad)); |
64 | sg_init_table(ct, 2); | 63 | sg_set_buf(&sg[1], data, data_len); |
65 | sg_set_buf(&ct[0], data, data_len); | 64 | sg_set_buf(&sg[2], mic, mic_len); |
66 | sg_set_buf(&ct[1], mic, mic_len); | ||
67 | 65 | ||
68 | aead_request_set_tfm(aead_req, tfm); | 66 | aead_request_set_tfm(aead_req, tfm); |
69 | aead_request_set_assoc(aead_req, &assoc, assoc.length); | 67 | aead_request_set_crypt(aead_req, sg, sg, data_len + mic_len, b_0); |
70 | aead_request_set_crypt(aead_req, ct, &pt, data_len + mic_len, b_0); | 68 | aead_request_set_ad(aead_req, sg[0].length); |
71 | 69 | ||
72 | return crypto_aead_decrypt(aead_req); | 70 | return crypto_aead_decrypt(aead_req); |
73 | } | 71 | } |
diff --git a/net/mac80211/aes_gcm.c b/net/mac80211/aes_gcm.c index b91c9d7bf665..3afe361fd27c 100644 --- a/net/mac80211/aes_gcm.c +++ b/net/mac80211/aes_gcm.c | |||
@@ -18,7 +18,7 @@ | |||
18 | void ieee80211_aes_gcm_encrypt(struct crypto_aead *tfm, u8 *j_0, u8 *aad, | 18 | void ieee80211_aes_gcm_encrypt(struct crypto_aead *tfm, u8 *j_0, u8 *aad, |
19 | u8 *data, size_t data_len, u8 *mic) | 19 | u8 *data, size_t data_len, u8 *mic) |
20 | { | 20 | { |
21 | struct scatterlist assoc, pt, ct[2]; | 21 | struct scatterlist sg[3]; |
22 | 22 | ||
23 | char aead_req_data[sizeof(struct aead_request) + | 23 | char aead_req_data[sizeof(struct aead_request) + |
24 | crypto_aead_reqsize(tfm)] | 24 | crypto_aead_reqsize(tfm)] |
@@ -27,15 +27,14 @@ void ieee80211_aes_gcm_encrypt(struct crypto_aead *tfm, u8 *j_0, u8 *aad, | |||
27 | 27 | ||
28 | memset(aead_req, 0, sizeof(aead_req_data)); | 28 | memset(aead_req, 0, sizeof(aead_req_data)); |
29 | 29 | ||
30 | sg_init_one(&pt, data, data_len); | 30 | sg_init_table(sg, 3); |
31 | sg_init_one(&assoc, &aad[2], be16_to_cpup((__be16 *)aad)); | 31 | sg_set_buf(&sg[0], &aad[2], be16_to_cpup((__be16 *)aad)); |
32 | sg_init_table(ct, 2); | 32 | sg_set_buf(&sg[1], data, data_len); |
33 | sg_set_buf(&ct[0], data, data_len); | 33 | sg_set_buf(&sg[2], mic, IEEE80211_GCMP_MIC_LEN); |
34 | sg_set_buf(&ct[1], mic, IEEE80211_GCMP_MIC_LEN); | ||
35 | 34 | ||
36 | aead_request_set_tfm(aead_req, tfm); | 35 | aead_request_set_tfm(aead_req, tfm); |
37 | aead_request_set_assoc(aead_req, &assoc, assoc.length); | 36 | aead_request_set_crypt(aead_req, sg, sg, data_len, j_0); |
38 | aead_request_set_crypt(aead_req, &pt, ct, data_len, j_0); | 37 | aead_request_set_ad(aead_req, sg[0].length); |
39 | 38 | ||
40 | crypto_aead_encrypt(aead_req); | 39 | crypto_aead_encrypt(aead_req); |
41 | } | 40 | } |
@@ -43,7 +42,7 @@ void ieee80211_aes_gcm_encrypt(struct crypto_aead *tfm, u8 *j_0, u8 *aad, | |||
43 | int ieee80211_aes_gcm_decrypt(struct crypto_aead *tfm, u8 *j_0, u8 *aad, | 42 | int ieee80211_aes_gcm_decrypt(struct crypto_aead *tfm, u8 *j_0, u8 *aad, |
44 | u8 *data, size_t data_len, u8 *mic) | 43 | u8 *data, size_t data_len, u8 *mic) |
45 | { | 44 | { |
46 | struct scatterlist assoc, pt, ct[2]; | 45 | struct scatterlist sg[3]; |
47 | char aead_req_data[sizeof(struct aead_request) + | 46 | char aead_req_data[sizeof(struct aead_request) + |
48 | crypto_aead_reqsize(tfm)] | 47 | crypto_aead_reqsize(tfm)] |
49 | __aligned(__alignof__(struct aead_request)); | 48 | __aligned(__alignof__(struct aead_request)); |
@@ -54,16 +53,15 @@ int ieee80211_aes_gcm_decrypt(struct crypto_aead *tfm, u8 *j_0, u8 *aad, | |||
54 | 53 | ||
55 | memset(aead_req, 0, sizeof(aead_req_data)); | 54 | memset(aead_req, 0, sizeof(aead_req_data)); |
56 | 55 | ||
57 | sg_init_one(&pt, data, data_len); | 56 | sg_init_table(sg, 3); |
58 | sg_init_one(&assoc, &aad[2], be16_to_cpup((__be16 *)aad)); | 57 | sg_set_buf(&sg[0], &aad[2], be16_to_cpup((__be16 *)aad)); |
59 | sg_init_table(ct, 2); | 58 | sg_set_buf(&sg[1], data, data_len); |
60 | sg_set_buf(&ct[0], data, data_len); | 59 | sg_set_buf(&sg[2], mic, IEEE80211_GCMP_MIC_LEN); |
61 | sg_set_buf(&ct[1], mic, IEEE80211_GCMP_MIC_LEN); | ||
62 | 60 | ||
63 | aead_request_set_tfm(aead_req, tfm); | 61 | aead_request_set_tfm(aead_req, tfm); |
64 | aead_request_set_assoc(aead_req, &assoc, assoc.length); | 62 | aead_request_set_crypt(aead_req, sg, sg, |
65 | aead_request_set_crypt(aead_req, ct, &pt, | ||
66 | data_len + IEEE80211_GCMP_MIC_LEN, j_0); | 63 | data_len + IEEE80211_GCMP_MIC_LEN, j_0); |
64 | aead_request_set_ad(aead_req, sg[0].length); | ||
67 | 65 | ||
68 | return crypto_aead_decrypt(aead_req); | 66 | return crypto_aead_decrypt(aead_req); |
69 | } | 67 | } |
diff --git a/net/mac80211/aes_gmac.c b/net/mac80211/aes_gmac.c index c34b06caf539..3ddd927aaf30 100644 --- a/net/mac80211/aes_gmac.c +++ b/net/mac80211/aes_gmac.c | |||
@@ -24,7 +24,7 @@ | |||
24 | int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce, | 24 | int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce, |
25 | const u8 *data, size_t data_len, u8 *mic) | 25 | const u8 *data, size_t data_len, u8 *mic) |
26 | { | 26 | { |
27 | struct scatterlist sg[3], ct[1]; | 27 | struct scatterlist sg[4]; |
28 | char aead_req_data[sizeof(struct aead_request) + | 28 | char aead_req_data[sizeof(struct aead_request) + |
29 | crypto_aead_reqsize(tfm)] | 29 | crypto_aead_reqsize(tfm)] |
30 | __aligned(__alignof__(struct aead_request)); | 30 | __aligned(__alignof__(struct aead_request)); |
@@ -37,21 +37,19 @@ int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce, | |||
37 | memset(aead_req, 0, sizeof(aead_req_data)); | 37 | memset(aead_req, 0, sizeof(aead_req_data)); |
38 | 38 | ||
39 | memset(zero, 0, GMAC_MIC_LEN); | 39 | memset(zero, 0, GMAC_MIC_LEN); |
40 | sg_init_table(sg, 3); | 40 | sg_init_table(sg, 4); |
41 | sg_set_buf(&sg[0], aad, AAD_LEN); | 41 | sg_set_buf(&sg[0], aad, AAD_LEN); |
42 | sg_set_buf(&sg[1], data, data_len - GMAC_MIC_LEN); | 42 | sg_set_buf(&sg[1], data, data_len - GMAC_MIC_LEN); |
43 | sg_set_buf(&sg[2], zero, GMAC_MIC_LEN); | 43 | sg_set_buf(&sg[2], zero, GMAC_MIC_LEN); |
44 | sg_set_buf(&sg[3], mic, GMAC_MIC_LEN); | ||
44 | 45 | ||
45 | memcpy(iv, nonce, GMAC_NONCE_LEN); | 46 | memcpy(iv, nonce, GMAC_NONCE_LEN); |
46 | memset(iv + GMAC_NONCE_LEN, 0, sizeof(iv) - GMAC_NONCE_LEN); | 47 | memset(iv + GMAC_NONCE_LEN, 0, sizeof(iv) - GMAC_NONCE_LEN); |
47 | iv[AES_BLOCK_SIZE - 1] = 0x01; | 48 | iv[AES_BLOCK_SIZE - 1] = 0x01; |
48 | 49 | ||
49 | sg_init_table(ct, 1); | ||
50 | sg_set_buf(&ct[0], mic, GMAC_MIC_LEN); | ||
51 | |||
52 | aead_request_set_tfm(aead_req, tfm); | 50 | aead_request_set_tfm(aead_req, tfm); |
53 | aead_request_set_assoc(aead_req, sg, AAD_LEN + data_len); | 51 | aead_request_set_crypt(aead_req, sg, sg, 0, iv); |
54 | aead_request_set_crypt(aead_req, NULL, ct, 0, iv); | 52 | aead_request_set_ad(aead_req, AAD_LEN + data_len); |
55 | 53 | ||
56 | crypto_aead_encrypt(aead_req); | 54 | crypto_aead_encrypt(aead_req); |
57 | 55 | ||