1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /*
3 * Synchronous Cryptographic Hash operations.
4 *
5 * Copyright (c) 2008 Herbert Xu <herbert@gondor.apana.org.au>
6 */
7
8 #include <crypto/scatterwalk.h>
9 #include <linux/cryptouser.h>
10 #include <linux/err.h>
11 #include <linux/kernel.h>
12 #include <linux/module.h>
13 #include <linux/seq_file.h>
14 #include <linux/string.h>
15 #include <net/netlink.h>
16
17 #include "hash.h"
18
crypto_shash_block_only(struct crypto_shash * tfm)19 static inline bool crypto_shash_block_only(struct crypto_shash *tfm)
20 {
21 return crypto_shash_alg(tfm)->base.cra_flags &
22 CRYPTO_AHASH_ALG_BLOCK_ONLY;
23 }
24
crypto_shash_final_nonzero(struct crypto_shash * tfm)25 static inline bool crypto_shash_final_nonzero(struct crypto_shash *tfm)
26 {
27 return crypto_shash_alg(tfm)->base.cra_flags &
28 CRYPTO_AHASH_ALG_FINAL_NONZERO;
29 }
30
crypto_shash_finup_max(struct crypto_shash * tfm)31 static inline bool crypto_shash_finup_max(struct crypto_shash *tfm)
32 {
33 return crypto_shash_alg(tfm)->base.cra_flags &
34 CRYPTO_AHASH_ALG_FINUP_MAX;
35 }
36
shash_no_setkey(struct crypto_shash * tfm,const u8 * key,unsigned int keylen)37 int shash_no_setkey(struct crypto_shash *tfm, const u8 *key,
38 unsigned int keylen)
39 {
40 return -ENOSYS;
41 }
42 EXPORT_SYMBOL_GPL(shash_no_setkey);
43
shash_set_needkey(struct crypto_shash * tfm,struct shash_alg * alg)44 static void shash_set_needkey(struct crypto_shash *tfm, struct shash_alg *alg)
45 {
46 if (crypto_shash_alg_needs_key(alg))
47 crypto_shash_set_flags(tfm, CRYPTO_TFM_NEED_KEY);
48 }
49
crypto_shash_setkey(struct crypto_shash * tfm,const u8 * key,unsigned int keylen)50 int crypto_shash_setkey(struct crypto_shash *tfm, const u8 *key,
51 unsigned int keylen)
52 {
53 struct shash_alg *shash = crypto_shash_alg(tfm);
54 int err;
55
56 err = shash->setkey(tfm, key, keylen);
57 if (unlikely(err)) {
58 shash_set_needkey(tfm, shash);
59 return err;
60 }
61
62 crypto_shash_clear_flags(tfm, CRYPTO_TFM_NEED_KEY);
63 return 0;
64 }
65 EXPORT_SYMBOL_GPL(crypto_shash_setkey);
66
__crypto_shash_init(struct shash_desc * desc)67 static int __crypto_shash_init(struct shash_desc *desc)
68 {
69 struct crypto_shash *tfm = desc->tfm;
70
71 if (crypto_shash_block_only(tfm)) {
72 u8 *buf = shash_desc_ctx(desc);
73
74 buf += crypto_shash_descsize(tfm) - 1;
75 *buf = 0;
76 }
77
78 return crypto_shash_alg(tfm)->init(desc);
79 }
80
crypto_shash_init(struct shash_desc * desc)81 int crypto_shash_init(struct shash_desc *desc)
82 {
83 if (crypto_shash_get_flags(desc->tfm) & CRYPTO_TFM_NEED_KEY)
84 return -ENOKEY;
85 return __crypto_shash_init(desc);
86 }
87 EXPORT_SYMBOL_GPL(crypto_shash_init);
88
shash_default_finup(struct shash_desc * desc,const u8 * data,unsigned int len,u8 * out)89 static int shash_default_finup(struct shash_desc *desc, const u8 *data,
90 unsigned int len, u8 *out)
91 {
92 struct shash_alg *shash = crypto_shash_alg(desc->tfm);
93
94 return shash->update(desc, data, len) ?:
95 shash->final(desc, out);
96 }
97
crypto_shash_op_and_zero(int (* op)(struct shash_desc * desc,const u8 * data,unsigned int len,u8 * out),struct shash_desc * desc,const u8 * data,unsigned int len,u8 * out)98 static int crypto_shash_op_and_zero(
99 int (*op)(struct shash_desc *desc, const u8 *data,
100 unsigned int len, u8 *out),
101 struct shash_desc *desc, const u8 *data, unsigned int len, u8 *out)
102 {
103 int err;
104
105 err = op(desc, data, len, out);
106 memset(shash_desc_ctx(desc), 0, crypto_shash_descsize(desc->tfm));
107 return err;
108 }
109
crypto_shash_finup(struct shash_desc * restrict desc,const u8 * data,unsigned int len,u8 * restrict out)110 int crypto_shash_finup(struct shash_desc *restrict desc, const u8 *data,
111 unsigned int len, u8 *restrict out)
112 {
113 struct crypto_shash *tfm = desc->tfm;
114 u8 *blenp = shash_desc_ctx(desc);
115 bool finup_max, nonzero;
116 unsigned int bs;
117 int err;
118 u8 *buf;
119
120 if (!crypto_shash_block_only(tfm)) {
121 if (out)
122 goto finup;
123 return crypto_shash_alg(tfm)->update(desc, data, len);
124 }
125
126 finup_max = out && crypto_shash_finup_max(tfm);
127
128 /* Retain extra block for final nonzero algorithms. */
129 nonzero = crypto_shash_final_nonzero(tfm);
130
131 /*
132 * The partial block buffer follows the algorithm desc context.
133 * The byte following that contains the length.
134 */
135 blenp += crypto_shash_descsize(tfm) - 1;
136 bs = crypto_shash_blocksize(tfm);
137 buf = blenp - bs;
138
139 if (likely(!*blenp && finup_max))
140 goto finup;
141
142 while ((*blenp + len) >= bs + nonzero) {
143 unsigned int nbytes = len - nonzero;
144 const u8 *src = data;
145
146 if (*blenp) {
147 memcpy(buf + *blenp, data, bs - *blenp);
148 nbytes = bs;
149 src = buf;
150 }
151
152 err = crypto_shash_alg(tfm)->update(desc, src, nbytes);
153 if (err < 0)
154 return err;
155
156 data += nbytes - err - *blenp;
157 len -= nbytes - err - *blenp;
158 *blenp = 0;
159 }
160
161 if (*blenp || !out) {
162 memcpy(buf + *blenp, data, len);
163 *blenp += len;
164 if (!out)
165 return 0;
166 data = buf;
167 len = *blenp;
168 }
169
170 finup:
171 return crypto_shash_op_and_zero(crypto_shash_alg(tfm)->finup, desc,
172 data, len, out);
173 }
174 EXPORT_SYMBOL_GPL(crypto_shash_finup);
175
shash_default_digest(struct shash_desc * desc,const u8 * data,unsigned int len,u8 * out)176 static int shash_default_digest(struct shash_desc *desc, const u8 *data,
177 unsigned int len, u8 *out)
178 {
179 return __crypto_shash_init(desc) ?:
180 crypto_shash_finup(desc, data, len, out);
181 }
182
crypto_shash_digest(struct shash_desc * desc,const u8 * data,unsigned int len,u8 * out)183 int crypto_shash_digest(struct shash_desc *desc, const u8 *data,
184 unsigned int len, u8 *out)
185 {
186 struct crypto_shash *tfm = desc->tfm;
187
188 if (crypto_shash_get_flags(tfm) & CRYPTO_TFM_NEED_KEY)
189 return -ENOKEY;
190
191 return crypto_shash_op_and_zero(crypto_shash_alg(tfm)->digest, desc,
192 data, len, out);
193 }
194 EXPORT_SYMBOL_GPL(crypto_shash_digest);
195
crypto_shash_tfm_digest(struct crypto_shash * tfm,const u8 * data,unsigned int len,u8 * out)196 int crypto_shash_tfm_digest(struct crypto_shash *tfm, const u8 *data,
197 unsigned int len, u8 *out)
198 {
199 SHASH_DESC_ON_STACK(desc, tfm);
200
201 desc->tfm = tfm;
202 return crypto_shash_digest(desc, data, len, out);
203 }
204 EXPORT_SYMBOL_GPL(crypto_shash_tfm_digest);
205
__crypto_shash_export(struct shash_desc * desc,void * out,int (* export)(struct shash_desc * desc,void * out))206 static int __crypto_shash_export(struct shash_desc *desc, void *out,
207 int (*export)(struct shash_desc *desc,
208 void *out))
209 {
210 struct crypto_shash *tfm = desc->tfm;
211 u8 *buf = shash_desc_ctx(desc);
212 unsigned int plen, ss;
213
214 plen = crypto_shash_blocksize(tfm) + 1;
215 ss = crypto_shash_statesize(tfm);
216 if (crypto_shash_block_only(tfm))
217 ss -= plen;
218 if (!export) {
219 memcpy(out, buf, ss);
220 return 0;
221 }
222
223 return export(desc, out);
224 }
225
crypto_shash_export_core(struct shash_desc * desc,void * out)226 int crypto_shash_export_core(struct shash_desc *desc, void *out)
227 {
228 return __crypto_shash_export(desc, out,
229 crypto_shash_alg(desc->tfm)->export_core);
230 }
231 EXPORT_SYMBOL_GPL(crypto_shash_export_core);
232
crypto_shash_export(struct shash_desc * desc,void * out)233 int crypto_shash_export(struct shash_desc *desc, void *out)
234 {
235 struct crypto_shash *tfm = desc->tfm;
236
237 if (crypto_shash_block_only(tfm)) {
238 unsigned int plen = crypto_shash_blocksize(tfm) + 1;
239 unsigned int descsize = crypto_shash_descsize(tfm);
240 unsigned int ss = crypto_shash_statesize(tfm);
241 u8 *buf = shash_desc_ctx(desc);
242
243 memcpy(out + ss - plen, buf + descsize - plen, plen);
244 }
245 return __crypto_shash_export(desc, out, crypto_shash_alg(tfm)->export);
246 }
247 EXPORT_SYMBOL_GPL(crypto_shash_export);
248
__crypto_shash_import(struct shash_desc * desc,const void * in,int (* import)(struct shash_desc * desc,const void * in))249 static int __crypto_shash_import(struct shash_desc *desc, const void *in,
250 int (*import)(struct shash_desc *desc,
251 const void *in))
252 {
253 struct crypto_shash *tfm = desc->tfm;
254 unsigned int descsize, plen, ss;
255 u8 *buf = shash_desc_ctx(desc);
256
257 if (crypto_shash_get_flags(tfm) & CRYPTO_TFM_NEED_KEY)
258 return -ENOKEY;
259
260 ss = crypto_shash_statesize(tfm);
261 if (crypto_shash_block_only(tfm)) {
262 plen = crypto_shash_blocksize(tfm) + 1;
263 ss -= plen;
264 descsize = crypto_shash_descsize(tfm);
265 buf[descsize - 1] = 0;
266 }
267 if (!import) {
268 memcpy(buf, in, ss);
269 return 0;
270 }
271
272 return import(desc, in);
273 }
274
crypto_shash_import_core(struct shash_desc * desc,const void * in)275 int crypto_shash_import_core(struct shash_desc *desc, const void *in)
276 {
277 return __crypto_shash_import(desc, in,
278 crypto_shash_alg(desc->tfm)->import_core);
279 }
280 EXPORT_SYMBOL_GPL(crypto_shash_import_core);
281
crypto_shash_import(struct shash_desc * desc,const void * in)282 int crypto_shash_import(struct shash_desc *desc, const void *in)
283 {
284 struct crypto_shash *tfm = desc->tfm;
285 int err;
286
287 err = __crypto_shash_import(desc, in, crypto_shash_alg(tfm)->import);
288 if (crypto_shash_block_only(tfm)) {
289 unsigned int plen = crypto_shash_blocksize(tfm) + 1;
290 unsigned int descsize = crypto_shash_descsize(tfm);
291 unsigned int ss = crypto_shash_statesize(tfm);
292 u8 *buf = shash_desc_ctx(desc);
293
294 memcpy(buf + descsize - plen, in + ss - plen, plen);
295 if (buf[descsize - 1] >= plen)
296 err = -EOVERFLOW;
297 }
298 return err;
299 }
300 EXPORT_SYMBOL_GPL(crypto_shash_import);
301
crypto_shash_exit_tfm(struct crypto_tfm * tfm)302 static void crypto_shash_exit_tfm(struct crypto_tfm *tfm)
303 {
304 struct crypto_shash *hash = __crypto_shash_cast(tfm);
305 struct shash_alg *alg = crypto_shash_alg(hash);
306
307 alg->exit_tfm(hash);
308 }
309
crypto_shash_init_tfm(struct crypto_tfm * tfm)310 static int crypto_shash_init_tfm(struct crypto_tfm *tfm)
311 {
312 struct crypto_shash *hash = __crypto_shash_cast(tfm);
313 struct shash_alg *alg = crypto_shash_alg(hash);
314
315 shash_set_needkey(hash, alg);
316
317 if (alg->exit_tfm)
318 tfm->exit = crypto_shash_exit_tfm;
319
320 if (!alg->init_tfm)
321 return 0;
322
323 return alg->init_tfm(hash);
324 }
325
crypto_shash_free_instance(struct crypto_instance * inst)326 static void crypto_shash_free_instance(struct crypto_instance *inst)
327 {
328 struct shash_instance *shash = shash_instance(inst);
329
330 shash->free(shash);
331 }
332
crypto_shash_report(struct sk_buff * skb,struct crypto_alg * alg)333 static int __maybe_unused crypto_shash_report(
334 struct sk_buff *skb, struct crypto_alg *alg)
335 {
336 struct crypto_report_hash rhash;
337 struct shash_alg *salg = __crypto_shash_alg(alg);
338
339 memset(&rhash, 0, sizeof(rhash));
340
341 strscpy(rhash.type, "shash", sizeof(rhash.type));
342
343 rhash.blocksize = alg->cra_blocksize;
344 rhash.digestsize = salg->digestsize;
345
346 return nla_put(skb, CRYPTOCFGA_REPORT_HASH, sizeof(rhash), &rhash);
347 }
348
crypto_shash_show(struct seq_file * m,struct crypto_alg * alg)349 static void __maybe_unused crypto_shash_show(struct seq_file *m,
350 struct crypto_alg *alg)
351 {
352 struct shash_alg *salg = __crypto_shash_alg(alg);
353
354 seq_printf(m, "type : shash\n");
355 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize);
356 seq_printf(m, "digestsize : %u\n", salg->digestsize);
357 }
358
359 const struct crypto_type crypto_shash_type = {
360 .extsize = crypto_alg_extsize,
361 .init_tfm = crypto_shash_init_tfm,
362 .free = crypto_shash_free_instance,
363 #ifdef CONFIG_PROC_FS
364 .show = crypto_shash_show,
365 #endif
366 #if IS_ENABLED(CONFIG_CRYPTO_USER)
367 .report = crypto_shash_report,
368 #endif
369 .maskclear = ~CRYPTO_ALG_TYPE_MASK,
370 .maskset = CRYPTO_ALG_TYPE_MASK,
371 .type = CRYPTO_ALG_TYPE_SHASH,
372 .tfmsize = offsetof(struct crypto_shash, base),
373 .algsize = offsetof(struct shash_alg, base),
374 };
375
crypto_grab_shash(struct crypto_shash_spawn * spawn,struct crypto_instance * inst,const char * name,u32 type,u32 mask)376 int crypto_grab_shash(struct crypto_shash_spawn *spawn,
377 struct crypto_instance *inst,
378 const char *name, u32 type, u32 mask)
379 {
380 spawn->base.frontend = &crypto_shash_type;
381 return crypto_grab_spawn(&spawn->base, inst, name, type, mask);
382 }
383 EXPORT_SYMBOL_GPL(crypto_grab_shash);
384
crypto_alloc_shash(const char * alg_name,u32 type,u32 mask)385 struct crypto_shash *crypto_alloc_shash(const char *alg_name, u32 type,
386 u32 mask)
387 {
388 return crypto_alloc_tfm(alg_name, &crypto_shash_type, type, mask);
389 }
390 EXPORT_SYMBOL_GPL(crypto_alloc_shash);
391
crypto_has_shash(const char * alg_name,u32 type,u32 mask)392 int crypto_has_shash(const char *alg_name, u32 type, u32 mask)
393 {
394 return crypto_type_has_alg(alg_name, &crypto_shash_type, type, mask);
395 }
396 EXPORT_SYMBOL_GPL(crypto_has_shash);
397
crypto_clone_shash(struct crypto_shash * hash)398 struct crypto_shash *crypto_clone_shash(struct crypto_shash *hash)
399 {
400 struct crypto_tfm *tfm = crypto_shash_tfm(hash);
401 struct shash_alg *alg = crypto_shash_alg(hash);
402 struct crypto_shash *nhash;
403 int err;
404
405 if (!crypto_shash_alg_has_setkey(alg)) {
406 tfm = crypto_tfm_get(tfm);
407 if (IS_ERR(tfm))
408 return ERR_CAST(tfm);
409
410 return hash;
411 }
412
413 if (!alg->clone_tfm && (alg->init_tfm || alg->base.cra_init))
414 return ERR_PTR(-ENOSYS);
415
416 nhash = crypto_clone_tfm(&crypto_shash_type, tfm);
417 if (IS_ERR(nhash))
418 return nhash;
419
420 if (alg->clone_tfm) {
421 err = alg->clone_tfm(nhash, hash);
422 if (err) {
423 crypto_free_shash(nhash);
424 return ERR_PTR(err);
425 }
426 }
427
428 if (alg->exit_tfm)
429 crypto_shash_tfm(nhash)->exit = crypto_shash_exit_tfm;
430
431 return nhash;
432 }
433 EXPORT_SYMBOL_GPL(crypto_clone_shash);
434
hash_prepare_alg(struct hash_alg_common * alg)435 int hash_prepare_alg(struct hash_alg_common *alg)
436 {
437 struct crypto_alg *base = &alg->base;
438
439 if (alg->digestsize > HASH_MAX_DIGESTSIZE)
440 return -EINVAL;
441
442 /* alignmask is not useful for hashes, so it is not supported. */
443 if (base->cra_alignmask)
444 return -EINVAL;
445
446 base->cra_flags &= ~CRYPTO_ALG_TYPE_MASK;
447
448 return 0;
449 }
450
shash_default_export_core(struct shash_desc * desc,void * out)451 static int shash_default_export_core(struct shash_desc *desc, void *out)
452 {
453 return -ENOSYS;
454 }
455
shash_default_import_core(struct shash_desc * desc,const void * in)456 static int shash_default_import_core(struct shash_desc *desc, const void *in)
457 {
458 return -ENOSYS;
459 }
460
shash_prepare_alg(struct shash_alg * alg)461 static int shash_prepare_alg(struct shash_alg *alg)
462 {
463 struct crypto_alg *base = &alg->halg.base;
464 int err;
465
466 if ((alg->export && !alg->import) || (alg->import && !alg->export))
467 return -EINVAL;
468
469 err = hash_prepare_alg(&alg->halg);
470 if (err)
471 return err;
472
473 base->cra_type = &crypto_shash_type;
474 base->cra_flags |= CRYPTO_ALG_TYPE_SHASH;
475 base->cra_flags |= CRYPTO_ALG_REQ_VIRT;
476
477 /*
478 * Handle missing optional functions. For each one we can either
479 * install a default here, or we can leave the pointer as NULL and check
480 * the pointer for NULL in crypto_shash_*(), avoiding an indirect call
481 * when the default behavior is desired. For ->finup and ->digest we
482 * install defaults, since for optimal performance algorithms should
483 * implement these anyway. On the other hand, for ->import and
484 * ->export the common case and best performance comes from the simple
485 * memcpy of the shash_desc_ctx, so when those pointers are NULL we
486 * leave them NULL and provide the memcpy with no indirect call.
487 */
488 if (!alg->finup)
489 alg->finup = shash_default_finup;
490 if (!alg->digest)
491 alg->digest = shash_default_digest;
492 if (!alg->export && !alg->halg.statesize)
493 alg->halg.statesize = alg->descsize;
494 if (!alg->setkey)
495 alg->setkey = shash_no_setkey;
496
497 if (base->cra_flags & CRYPTO_AHASH_ALG_BLOCK_ONLY) {
498 BUILD_BUG_ON(MAX_ALGAPI_BLOCKSIZE >= 256);
499 alg->descsize += base->cra_blocksize + 1;
500 alg->statesize += base->cra_blocksize + 1;
501 alg->export_core = alg->export;
502 alg->import_core = alg->import;
503 } else if (!alg->export_core || !alg->import_core) {
504 alg->export_core = shash_default_export_core;
505 alg->import_core = shash_default_import_core;
506 base->cra_flags |= CRYPTO_AHASH_ALG_NO_EXPORT_CORE;
507 }
508
509 if (alg->descsize > HASH_MAX_DESCSIZE)
510 return -EINVAL;
511 if (alg->statesize > HASH_MAX_STATESIZE)
512 return -EINVAL;
513
514 base->cra_reqsize = sizeof(struct shash_desc) + alg->descsize;
515
516 return 0;
517 }
518
crypto_register_shash(struct shash_alg * alg)519 int crypto_register_shash(struct shash_alg *alg)
520 {
521 struct crypto_alg *base = &alg->base;
522 int err;
523
524 err = shash_prepare_alg(alg);
525 if (err)
526 return err;
527
528 return crypto_register_alg(base);
529 }
530 EXPORT_SYMBOL_GPL(crypto_register_shash);
531
crypto_unregister_shash(struct shash_alg * alg)532 void crypto_unregister_shash(struct shash_alg *alg)
533 {
534 crypto_unregister_alg(&alg->base);
535 }
536 EXPORT_SYMBOL_GPL(crypto_unregister_shash);
537
crypto_register_shashes(struct shash_alg * algs,int count)538 int crypto_register_shashes(struct shash_alg *algs, int count)
539 {
540 int i, ret;
541
542 for (i = 0; i < count; i++) {
543 ret = crypto_register_shash(&algs[i]);
544 if (ret) {
545 crypto_unregister_shashes(algs, i);
546 return ret;
547 }
548 }
549
550 return 0;
551 }
552 EXPORT_SYMBOL_GPL(crypto_register_shashes);
553
crypto_unregister_shashes(struct shash_alg * algs,int count)554 void crypto_unregister_shashes(struct shash_alg *algs, int count)
555 {
556 int i;
557
558 for (i = count - 1; i >= 0; --i)
559 crypto_unregister_shash(&algs[i]);
560 }
561 EXPORT_SYMBOL_GPL(crypto_unregister_shashes);
562
shash_register_instance(struct crypto_template * tmpl,struct shash_instance * inst)563 int shash_register_instance(struct crypto_template *tmpl,
564 struct shash_instance *inst)
565 {
566 int err;
567
568 if (WARN_ON(!inst->free))
569 return -EINVAL;
570
571 err = shash_prepare_alg(&inst->alg);
572 if (err)
573 return err;
574
575 return crypto_register_instance(tmpl, shash_crypto_instance(inst));
576 }
577 EXPORT_SYMBOL_GPL(shash_register_instance);
578
shash_free_singlespawn_instance(struct shash_instance * inst)579 void shash_free_singlespawn_instance(struct shash_instance *inst)
580 {
581 crypto_drop_spawn(shash_instance_ctx(inst));
582 kfree(inst);
583 }
584 EXPORT_SYMBOL_GPL(shash_free_singlespawn_instance);
585
586 MODULE_LICENSE("GPL");
587 MODULE_DESCRIPTION("Synchronous cryptographic hash type");
588