aboutsummaryrefslogtreecommitdiffstats
path: root/net
diff options
context:
space:
mode:
authorHerbert Xu <herbert@gondor.apana.org.au>2015-05-27 04:03:50 -0400
committerHerbert Xu <herbert@gondor.apana.org.au>2015-05-27 23:23:20 -0400
commit957e0fe6292372460bdace9c2a67a857379ad1db (patch)
treed642a0afc2e2d7a117e6413f70c4079302d6ac9f /net
parent25528fdae4abb763c446b2e5081f80ba5a4b6f31 (diff)
mac80211: Switch to new AEAD interface
This patch makes use of the new AEAD interface which uses a single SG list instead of separate lists for the AD and plain text. Tested-by: Johannes Berg <johannes@sipsolutions.net> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'net')
-rw-r--r--net/mac80211/aes_ccm.c30
-rw-r--r--net/mac80211/aes_gcm.c30
-rw-r--r--net/mac80211/aes_gmac.c12
3 files changed, 33 insertions, 39 deletions
diff --git a/net/mac80211/aes_ccm.c b/net/mac80211/aes_ccm.c
index 70d53dab6508..7663c28ba353 100644
--- a/net/mac80211/aes_ccm.c
+++ b/net/mac80211/aes_ccm.c
@@ -22,7 +22,7 @@ void ieee80211_aes_ccm_encrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad,
22 u8 *data, size_t data_len, u8 *mic, 22 u8 *data, size_t data_len, u8 *mic,
23 size_t mic_len) 23 size_t mic_len)
24{ 24{
25 struct scatterlist assoc, pt, ct[2]; 25 struct scatterlist sg[3];
26 26
27 char aead_req_data[sizeof(struct aead_request) + 27 char aead_req_data[sizeof(struct aead_request) +
28 crypto_aead_reqsize(tfm)] 28 crypto_aead_reqsize(tfm)]
@@ -31,15 +31,14 @@ void ieee80211_aes_ccm_encrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad,
31 31
32 memset(aead_req, 0, sizeof(aead_req_data)); 32 memset(aead_req, 0, sizeof(aead_req_data));
33 33
34 sg_init_one(&pt, data, data_len); 34 sg_init_table(sg, 3);
35 sg_init_one(&assoc, &aad[2], be16_to_cpup((__be16 *)aad)); 35 sg_set_buf(&sg[0], &aad[2], be16_to_cpup((__be16 *)aad));
36 sg_init_table(ct, 2); 36 sg_set_buf(&sg[1], data, data_len);
37 sg_set_buf(&ct[0], data, data_len); 37 sg_set_buf(&sg[2], mic, mic_len);
38 sg_set_buf(&ct[1], mic, mic_len);
39 38
40 aead_request_set_tfm(aead_req, tfm); 39 aead_request_set_tfm(aead_req, tfm);
41 aead_request_set_assoc(aead_req, &assoc, assoc.length); 40 aead_request_set_crypt(aead_req, sg, sg, data_len, b_0);
42 aead_request_set_crypt(aead_req, &pt, ct, data_len, b_0); 41 aead_request_set_ad(aead_req, sg[0].length);
43 42
44 crypto_aead_encrypt(aead_req); 43 crypto_aead_encrypt(aead_req);
45} 44}
@@ -48,7 +47,7 @@ int ieee80211_aes_ccm_decrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad,
48 u8 *data, size_t data_len, u8 *mic, 47 u8 *data, size_t data_len, u8 *mic,
49 size_t mic_len) 48 size_t mic_len)
50{ 49{
51 struct scatterlist assoc, pt, ct[2]; 50 struct scatterlist sg[3];
52 char aead_req_data[sizeof(struct aead_request) + 51 char aead_req_data[sizeof(struct aead_request) +
53 crypto_aead_reqsize(tfm)] 52 crypto_aead_reqsize(tfm)]
54 __aligned(__alignof__(struct aead_request)); 53 __aligned(__alignof__(struct aead_request));
@@ -59,15 +58,14 @@ int ieee80211_aes_ccm_decrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad,
59 58
60 memset(aead_req, 0, sizeof(aead_req_data)); 59 memset(aead_req, 0, sizeof(aead_req_data));
61 60
62 sg_init_one(&pt, data, data_len); 61 sg_init_table(sg, 3);
63 sg_init_one(&assoc, &aad[2], be16_to_cpup((__be16 *)aad)); 62 sg_set_buf(&sg[0], &aad[2], be16_to_cpup((__be16 *)aad));
64 sg_init_table(ct, 2); 63 sg_set_buf(&sg[1], data, data_len);
65 sg_set_buf(&ct[0], data, data_len); 64 sg_set_buf(&sg[2], mic, mic_len);
66 sg_set_buf(&ct[1], mic, mic_len);
67 65
68 aead_request_set_tfm(aead_req, tfm); 66 aead_request_set_tfm(aead_req, tfm);
69 aead_request_set_assoc(aead_req, &assoc, assoc.length); 67 aead_request_set_crypt(aead_req, sg, sg, data_len + mic_len, b_0);
70 aead_request_set_crypt(aead_req, ct, &pt, data_len + mic_len, b_0); 68 aead_request_set_ad(aead_req, sg[0].length);
71 69
72 return crypto_aead_decrypt(aead_req); 70 return crypto_aead_decrypt(aead_req);
73} 71}
diff --git a/net/mac80211/aes_gcm.c b/net/mac80211/aes_gcm.c
index b91c9d7bf665..3afe361fd27c 100644
--- a/net/mac80211/aes_gcm.c
+++ b/net/mac80211/aes_gcm.c
@@ -18,7 +18,7 @@
18void ieee80211_aes_gcm_encrypt(struct crypto_aead *tfm, u8 *j_0, u8 *aad, 18void ieee80211_aes_gcm_encrypt(struct crypto_aead *tfm, u8 *j_0, u8 *aad,
19 u8 *data, size_t data_len, u8 *mic) 19 u8 *data, size_t data_len, u8 *mic)
20{ 20{
21 struct scatterlist assoc, pt, ct[2]; 21 struct scatterlist sg[3];
22 22
23 char aead_req_data[sizeof(struct aead_request) + 23 char aead_req_data[sizeof(struct aead_request) +
24 crypto_aead_reqsize(tfm)] 24 crypto_aead_reqsize(tfm)]
@@ -27,15 +27,14 @@ void ieee80211_aes_gcm_encrypt(struct crypto_aead *tfm, u8 *j_0, u8 *aad,
27 27
28 memset(aead_req, 0, sizeof(aead_req_data)); 28 memset(aead_req, 0, sizeof(aead_req_data));
29 29
30 sg_init_one(&pt, data, data_len); 30 sg_init_table(sg, 3);
31 sg_init_one(&assoc, &aad[2], be16_to_cpup((__be16 *)aad)); 31 sg_set_buf(&sg[0], &aad[2], be16_to_cpup((__be16 *)aad));
32 sg_init_table(ct, 2); 32 sg_set_buf(&sg[1], data, data_len);
33 sg_set_buf(&ct[0], data, data_len); 33 sg_set_buf(&sg[2], mic, IEEE80211_GCMP_MIC_LEN);
34 sg_set_buf(&ct[1], mic, IEEE80211_GCMP_MIC_LEN);
35 34
36 aead_request_set_tfm(aead_req, tfm); 35 aead_request_set_tfm(aead_req, tfm);
37 aead_request_set_assoc(aead_req, &assoc, assoc.length); 36 aead_request_set_crypt(aead_req, sg, sg, data_len, j_0);
38 aead_request_set_crypt(aead_req, &pt, ct, data_len, j_0); 37 aead_request_set_ad(aead_req, sg[0].length);
39 38
40 crypto_aead_encrypt(aead_req); 39 crypto_aead_encrypt(aead_req);
41} 40}
@@ -43,7 +42,7 @@ void ieee80211_aes_gcm_encrypt(struct crypto_aead *tfm, u8 *j_0, u8 *aad,
43int ieee80211_aes_gcm_decrypt(struct crypto_aead *tfm, u8 *j_0, u8 *aad, 42int ieee80211_aes_gcm_decrypt(struct crypto_aead *tfm, u8 *j_0, u8 *aad,
44 u8 *data, size_t data_len, u8 *mic) 43 u8 *data, size_t data_len, u8 *mic)
45{ 44{
46 struct scatterlist assoc, pt, ct[2]; 45 struct scatterlist sg[3];
47 char aead_req_data[sizeof(struct aead_request) + 46 char aead_req_data[sizeof(struct aead_request) +
48 crypto_aead_reqsize(tfm)] 47 crypto_aead_reqsize(tfm)]
49 __aligned(__alignof__(struct aead_request)); 48 __aligned(__alignof__(struct aead_request));
@@ -54,16 +53,15 @@ int ieee80211_aes_gcm_decrypt(struct crypto_aead *tfm, u8 *j_0, u8 *aad,
54 53
55 memset(aead_req, 0, sizeof(aead_req_data)); 54 memset(aead_req, 0, sizeof(aead_req_data));
56 55
57 sg_init_one(&pt, data, data_len); 56 sg_init_table(sg, 3);
58 sg_init_one(&assoc, &aad[2], be16_to_cpup((__be16 *)aad)); 57 sg_set_buf(&sg[0], &aad[2], be16_to_cpup((__be16 *)aad));
59 sg_init_table(ct, 2); 58 sg_set_buf(&sg[1], data, data_len);
60 sg_set_buf(&ct[0], data, data_len); 59 sg_set_buf(&sg[2], mic, IEEE80211_GCMP_MIC_LEN);
61 sg_set_buf(&ct[1], mic, IEEE80211_GCMP_MIC_LEN);
62 60
63 aead_request_set_tfm(aead_req, tfm); 61 aead_request_set_tfm(aead_req, tfm);
64 aead_request_set_assoc(aead_req, &assoc, assoc.length); 62 aead_request_set_crypt(aead_req, sg, sg,
65 aead_request_set_crypt(aead_req, ct, &pt,
66 data_len + IEEE80211_GCMP_MIC_LEN, j_0); 63 data_len + IEEE80211_GCMP_MIC_LEN, j_0);
64 aead_request_set_ad(aead_req, sg[0].length);
67 65
68 return crypto_aead_decrypt(aead_req); 66 return crypto_aead_decrypt(aead_req);
69} 67}
diff --git a/net/mac80211/aes_gmac.c b/net/mac80211/aes_gmac.c
index c34b06caf539..3ddd927aaf30 100644
--- a/net/mac80211/aes_gmac.c
+++ b/net/mac80211/aes_gmac.c
@@ -24,7 +24,7 @@
24int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce, 24int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce,
25 const u8 *data, size_t data_len, u8 *mic) 25 const u8 *data, size_t data_len, u8 *mic)
26{ 26{
27 struct scatterlist sg[3], ct[1]; 27 struct scatterlist sg[4];
28 char aead_req_data[sizeof(struct aead_request) + 28 char aead_req_data[sizeof(struct aead_request) +
29 crypto_aead_reqsize(tfm)] 29 crypto_aead_reqsize(tfm)]
30 __aligned(__alignof__(struct aead_request)); 30 __aligned(__alignof__(struct aead_request));
@@ -37,21 +37,19 @@ int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce,
37 memset(aead_req, 0, sizeof(aead_req_data)); 37 memset(aead_req, 0, sizeof(aead_req_data));
38 38
39 memset(zero, 0, GMAC_MIC_LEN); 39 memset(zero, 0, GMAC_MIC_LEN);
40 sg_init_table(sg, 3); 40 sg_init_table(sg, 4);
41 sg_set_buf(&sg[0], aad, AAD_LEN); 41 sg_set_buf(&sg[0], aad, AAD_LEN);
42 sg_set_buf(&sg[1], data, data_len - GMAC_MIC_LEN); 42 sg_set_buf(&sg[1], data, data_len - GMAC_MIC_LEN);
43 sg_set_buf(&sg[2], zero, GMAC_MIC_LEN); 43 sg_set_buf(&sg[2], zero, GMAC_MIC_LEN);
44 sg_set_buf(&sg[3], mic, GMAC_MIC_LEN);
44 45
45 memcpy(iv, nonce, GMAC_NONCE_LEN); 46 memcpy(iv, nonce, GMAC_NONCE_LEN);
46 memset(iv + GMAC_NONCE_LEN, 0, sizeof(iv) - GMAC_NONCE_LEN); 47 memset(iv + GMAC_NONCE_LEN, 0, sizeof(iv) - GMAC_NONCE_LEN);
47 iv[AES_BLOCK_SIZE - 1] = 0x01; 48 iv[AES_BLOCK_SIZE - 1] = 0x01;
48 49
49 sg_init_table(ct, 1);
50 sg_set_buf(&ct[0], mic, GMAC_MIC_LEN);
51
52 aead_request_set_tfm(aead_req, tfm); 50 aead_request_set_tfm(aead_req, tfm);
53 aead_request_set_assoc(aead_req, sg, AAD_LEN + data_len); 51 aead_request_set_crypt(aead_req, sg, sg, 0, iv);
54 aead_request_set_crypt(aead_req, NULL, ct, 0, iv); 52 aead_request_set_ad(aead_req, AAD_LEN + data_len);
55 53
56 crypto_aead_encrypt(aead_req); 54 crypto_aead_encrypt(aead_req);
57 55