mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git
synced 2025-01-16 13:34:30 +00:00
crypto: cipher - remove crt_u.cipher (struct cipher_tfm)
Of the three fields in crt_u.cipher (struct cipher_tfm), ->cit_setkey() is pointless because it always points to setkey() in crypto/cipher.c. ->cit_decrypt_one() and ->cit_encrypt_one() are slightly less pointless, since if the algorithm doesn't have an alignmask, they are set directly to ->cia_encrypt() and ->cia_decrypt(). However, this "optimization" isn't worthwhile because: - The "cipher" algorithm type is the only algorithm still using crt_u, so it's bloating every struct crypto_tfm for every algorithm type. - If the algorithm has an alignmask, this "optimization" actually makes things slower, as it causes 2 indirect calls per block rather than 1. - It adds extra code complexity. - Some templates already call ->cia_encrypt()/->cia_decrypt() directly instead of going through ->cit_encrypt_one()/->cit_decrypt_one(). - The "cipher" algorithm type never gives optimal performance anyway. For that, a higher-level type such as skcipher needs to be used. Therefore, just remove the extra indirection, and make crypto_cipher_setkey(), crypto_cipher_encrypt_one(), and crypto_cipher_decrypt_one() be direct calls into crypto/cipher.c. Also remove the unused function crypto_cipher_cast(). Signed-off-by: Eric Biggers <ebiggers@google.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
This commit is contained in:
parent
c441a909c6
commit
e8cfed5e4e
15
crypto/api.c
15
crypto/api.c
@ -295,20 +295,7 @@ static int crypto_init_ops(struct crypto_tfm *tfm, u32 type, u32 mask)
|
|||||||
|
|
||||||
if (type_obj)
|
if (type_obj)
|
||||||
return type_obj->init(tfm, type, mask);
|
return type_obj->init(tfm, type, mask);
|
||||||
|
return 0;
|
||||||
switch (crypto_tfm_alg_type(tfm)) {
|
|
||||||
case CRYPTO_ALG_TYPE_CIPHER:
|
|
||||||
return crypto_init_cipher_ops(tfm);
|
|
||||||
|
|
||||||
case CRYPTO_ALG_TYPE_COMPRESS:
|
|
||||||
return 0;
|
|
||||||
|
|
||||||
default:
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
|
|
||||||
BUG();
|
|
||||||
return -EINVAL;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
static void crypto_exit_ops(struct crypto_tfm *tfm)
|
static void crypto_exit_ops(struct crypto_tfm *tfm)
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
/*
|
/*
|
||||||
* Cryptographic API.
|
* Cryptographic API.
|
||||||
*
|
*
|
||||||
* Cipher operations.
|
* Single-block cipher operations.
|
||||||
*
|
*
|
||||||
* Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
|
* Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
|
||||||
* Copyright (c) 2005 Herbert Xu <herbert@gondor.apana.org.au>
|
* Copyright (c) 2005 Herbert Xu <herbert@gondor.apana.org.au>
|
||||||
@ -16,11 +16,11 @@
|
|||||||
#include <linux/string.h>
|
#include <linux/string.h>
|
||||||
#include "internal.h"
|
#include "internal.h"
|
||||||
|
|
||||||
static int setkey_unaligned(struct crypto_tfm *tfm, const u8 *key,
|
static int setkey_unaligned(struct crypto_cipher *tfm, const u8 *key,
|
||||||
unsigned int keylen)
|
unsigned int keylen)
|
||||||
{
|
{
|
||||||
struct cipher_alg *cia = &tfm->__crt_alg->cra_cipher;
|
struct cipher_alg *cia = crypto_cipher_alg(tfm);
|
||||||
unsigned long alignmask = crypto_tfm_alg_alignmask(tfm);
|
unsigned long alignmask = crypto_cipher_alignmask(tfm);
|
||||||
int ret;
|
int ret;
|
||||||
u8 *buffer, *alignbuffer;
|
u8 *buffer, *alignbuffer;
|
||||||
unsigned long absize;
|
unsigned long absize;
|
||||||
@ -32,83 +32,63 @@ static int setkey_unaligned(struct crypto_tfm *tfm, const u8 *key,
|
|||||||
|
|
||||||
alignbuffer = (u8 *)ALIGN((unsigned long)buffer, alignmask + 1);
|
alignbuffer = (u8 *)ALIGN((unsigned long)buffer, alignmask + 1);
|
||||||
memcpy(alignbuffer, key, keylen);
|
memcpy(alignbuffer, key, keylen);
|
||||||
ret = cia->cia_setkey(tfm, alignbuffer, keylen);
|
ret = cia->cia_setkey(crypto_cipher_tfm(tfm), alignbuffer, keylen);
|
||||||
memset(alignbuffer, 0, keylen);
|
memset(alignbuffer, 0, keylen);
|
||||||
kfree(buffer);
|
kfree(buffer);
|
||||||
return ret;
|
return ret;
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
static int setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen)
|
int crypto_cipher_setkey(struct crypto_cipher *tfm,
|
||||||
|
const u8 *key, unsigned int keylen)
|
||||||
{
|
{
|
||||||
struct cipher_alg *cia = &tfm->__crt_alg->cra_cipher;
|
struct cipher_alg *cia = crypto_cipher_alg(tfm);
|
||||||
unsigned long alignmask = crypto_tfm_alg_alignmask(tfm);
|
unsigned long alignmask = crypto_cipher_alignmask(tfm);
|
||||||
|
|
||||||
tfm->crt_flags &= ~CRYPTO_TFM_RES_MASK;
|
crypto_cipher_clear_flags(tfm, CRYPTO_TFM_RES_MASK);
|
||||||
if (keylen < cia->cia_min_keysize || keylen > cia->cia_max_keysize) {
|
if (keylen < cia->cia_min_keysize || keylen > cia->cia_max_keysize) {
|
||||||
tfm->crt_flags |= CRYPTO_TFM_RES_BAD_KEY_LEN;
|
crypto_cipher_set_flags(tfm, CRYPTO_TFM_RES_BAD_KEY_LEN);
|
||||||
return -EINVAL;
|
return -EINVAL;
|
||||||
}
|
}
|
||||||
|
|
||||||
if ((unsigned long)key & alignmask)
|
if ((unsigned long)key & alignmask)
|
||||||
return setkey_unaligned(tfm, key, keylen);
|
return setkey_unaligned(tfm, key, keylen);
|
||||||
|
|
||||||
return cia->cia_setkey(tfm, key, keylen);
|
return cia->cia_setkey(crypto_cipher_tfm(tfm), key, keylen);
|
||||||
}
|
}
|
||||||
|
EXPORT_SYMBOL_GPL(crypto_cipher_setkey);
|
||||||
|
|
||||||
static void cipher_crypt_unaligned(void (*fn)(struct crypto_tfm *, u8 *,
|
static inline void cipher_crypt_one(struct crypto_cipher *tfm,
|
||||||
const u8 *),
|
u8 *dst, const u8 *src, bool enc)
|
||||||
struct crypto_tfm *tfm,
|
|
||||||
u8 *dst, const u8 *src)
|
|
||||||
{
|
{
|
||||||
unsigned long alignmask = crypto_tfm_alg_alignmask(tfm);
|
unsigned long alignmask = crypto_cipher_alignmask(tfm);
|
||||||
unsigned int size = crypto_tfm_alg_blocksize(tfm);
|
struct cipher_alg *cia = crypto_cipher_alg(tfm);
|
||||||
u8 buffer[MAX_CIPHER_BLOCKSIZE + MAX_CIPHER_ALIGNMASK];
|
void (*fn)(struct crypto_tfm *, u8 *, const u8 *) =
|
||||||
u8 *tmp = (u8 *)ALIGN((unsigned long)buffer, alignmask + 1);
|
enc ? cia->cia_encrypt : cia->cia_decrypt;
|
||||||
|
|
||||||
memcpy(tmp, src, size);
|
|
||||||
fn(tfm, tmp, tmp);
|
|
||||||
memcpy(dst, tmp, size);
|
|
||||||
}
|
|
||||||
|
|
||||||
static void cipher_encrypt_unaligned(struct crypto_tfm *tfm,
|
|
||||||
u8 *dst, const u8 *src)
|
|
||||||
{
|
|
||||||
unsigned long alignmask = crypto_tfm_alg_alignmask(tfm);
|
|
||||||
struct cipher_alg *cipher = &tfm->__crt_alg->cra_cipher;
|
|
||||||
|
|
||||||
if (unlikely(((unsigned long)dst | (unsigned long)src) & alignmask)) {
|
if (unlikely(((unsigned long)dst | (unsigned long)src) & alignmask)) {
|
||||||
cipher_crypt_unaligned(cipher->cia_encrypt, tfm, dst, src);
|
unsigned int bs = crypto_cipher_blocksize(tfm);
|
||||||
return;
|
u8 buffer[MAX_CIPHER_BLOCKSIZE + MAX_CIPHER_ALIGNMASK];
|
||||||
|
u8 *tmp = (u8 *)ALIGN((unsigned long)buffer, alignmask + 1);
|
||||||
|
|
||||||
|
memcpy(tmp, src, bs);
|
||||||
|
fn(crypto_cipher_tfm(tfm), tmp, tmp);
|
||||||
|
memcpy(dst, tmp, bs);
|
||||||
|
} else {
|
||||||
|
fn(crypto_cipher_tfm(tfm), dst, src);
|
||||||
}
|
}
|
||||||
|
|
||||||
cipher->cia_encrypt(tfm, dst, src);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
static void cipher_decrypt_unaligned(struct crypto_tfm *tfm,
|
void crypto_cipher_encrypt_one(struct crypto_cipher *tfm,
|
||||||
u8 *dst, const u8 *src)
|
u8 *dst, const u8 *src)
|
||||||
{
|
{
|
||||||
unsigned long alignmask = crypto_tfm_alg_alignmask(tfm);
|
cipher_crypt_one(tfm, dst, src, true);
|
||||||
struct cipher_alg *cipher = &tfm->__crt_alg->cra_cipher;
|
|
||||||
|
|
||||||
if (unlikely(((unsigned long)dst | (unsigned long)src) & alignmask)) {
|
|
||||||
cipher_crypt_unaligned(cipher->cia_decrypt, tfm, dst, src);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
cipher->cia_decrypt(tfm, dst, src);
|
|
||||||
}
|
}
|
||||||
|
EXPORT_SYMBOL_GPL(crypto_cipher_encrypt_one);
|
||||||
|
|
||||||
int crypto_init_cipher_ops(struct crypto_tfm *tfm)
|
void crypto_cipher_decrypt_one(struct crypto_cipher *tfm,
|
||||||
|
u8 *dst, const u8 *src)
|
||||||
{
|
{
|
||||||
struct cipher_tfm *ops = &tfm->crt_cipher;
|
cipher_crypt_one(tfm, dst, src, false);
|
||||||
struct cipher_alg *cipher = &tfm->__crt_alg->cra_cipher;
|
|
||||||
|
|
||||||
ops->cit_setkey = setkey;
|
|
||||||
ops->cit_encrypt_one = crypto_tfm_alg_alignmask(tfm) ?
|
|
||||||
cipher_encrypt_unaligned : cipher->cia_encrypt;
|
|
||||||
ops->cit_decrypt_one = crypto_tfm_alg_alignmask(tfm) ?
|
|
||||||
cipher_decrypt_unaligned : cipher->cia_decrypt;
|
|
||||||
|
|
||||||
return 0;
|
|
||||||
}
|
}
|
||||||
|
EXPORT_SYMBOL_GPL(crypto_cipher_decrypt_one);
|
||||||
|
@ -58,8 +58,6 @@ static inline unsigned int crypto_compress_ctxsize(struct crypto_alg *alg)
|
|||||||
struct crypto_alg *crypto_mod_get(struct crypto_alg *alg);
|
struct crypto_alg *crypto_mod_get(struct crypto_alg *alg);
|
||||||
struct crypto_alg *crypto_alg_mod_lookup(const char *name, u32 type, u32 mask);
|
struct crypto_alg *crypto_alg_mod_lookup(const char *name, u32 type, u32 mask);
|
||||||
|
|
||||||
int crypto_init_cipher_ops(struct crypto_tfm *tfm);
|
|
||||||
|
|
||||||
struct crypto_larval *crypto_larval_alloc(const char *name, u32 type, u32 mask);
|
struct crypto_larval *crypto_larval_alloc(const char *name, u32 type, u32 mask);
|
||||||
void crypto_larval_kill(struct crypto_alg *alg);
|
void crypto_larval_kill(struct crypto_alg *alg);
|
||||||
void crypto_alg_tested(const char *name, int err);
|
void crypto_alg_tested(const char *name, int err);
|
||||||
|
@ -599,23 +599,10 @@ int crypto_has_alg(const char *name, u32 type, u32 mask);
|
|||||||
* crypto_free_*(), as well as the various helpers below.
|
* crypto_free_*(), as well as the various helpers below.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
struct cipher_tfm {
|
|
||||||
int (*cit_setkey)(struct crypto_tfm *tfm,
|
|
||||||
const u8 *key, unsigned int keylen);
|
|
||||||
void (*cit_encrypt_one)(struct crypto_tfm *tfm, u8 *dst, const u8 *src);
|
|
||||||
void (*cit_decrypt_one)(struct crypto_tfm *tfm, u8 *dst, const u8 *src);
|
|
||||||
};
|
|
||||||
|
|
||||||
#define crt_cipher crt_u.cipher
|
|
||||||
|
|
||||||
struct crypto_tfm {
|
struct crypto_tfm {
|
||||||
|
|
||||||
u32 crt_flags;
|
u32 crt_flags;
|
||||||
|
|
||||||
union {
|
|
||||||
struct cipher_tfm cipher;
|
|
||||||
} crt_u;
|
|
||||||
|
|
||||||
void (*exit)(struct crypto_tfm *tfm);
|
void (*exit)(struct crypto_tfm *tfm);
|
||||||
|
|
||||||
struct crypto_alg *__crt_alg;
|
struct crypto_alg *__crt_alg;
|
||||||
@ -752,12 +739,6 @@ static inline struct crypto_cipher *__crypto_cipher_cast(struct crypto_tfm *tfm)
|
|||||||
return (struct crypto_cipher *)tfm;
|
return (struct crypto_cipher *)tfm;
|
||||||
}
|
}
|
||||||
|
|
||||||
static inline struct crypto_cipher *crypto_cipher_cast(struct crypto_tfm *tfm)
|
|
||||||
{
|
|
||||||
BUG_ON(crypto_tfm_alg_type(tfm) != CRYPTO_ALG_TYPE_CIPHER);
|
|
||||||
return __crypto_cipher_cast(tfm);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* crypto_alloc_cipher() - allocate single block cipher handle
|
* crypto_alloc_cipher() - allocate single block cipher handle
|
||||||
* @alg_name: is the cra_name / name or cra_driver_name / driver name of the
|
* @alg_name: is the cra_name / name or cra_driver_name / driver name of the
|
||||||
@ -815,11 +796,6 @@ static inline int crypto_has_cipher(const char *alg_name, u32 type, u32 mask)
|
|||||||
return crypto_has_alg(alg_name, type, mask);
|
return crypto_has_alg(alg_name, type, mask);
|
||||||
}
|
}
|
||||||
|
|
||||||
static inline struct cipher_tfm *crypto_cipher_crt(struct crypto_cipher *tfm)
|
|
||||||
{
|
|
||||||
return &crypto_cipher_tfm(tfm)->crt_cipher;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* crypto_cipher_blocksize() - obtain block size for cipher
|
* crypto_cipher_blocksize() - obtain block size for cipher
|
||||||
* @tfm: cipher handle
|
* @tfm: cipher handle
|
||||||
@ -873,12 +849,8 @@ static inline void crypto_cipher_clear_flags(struct crypto_cipher *tfm,
|
|||||||
*
|
*
|
||||||
* Return: 0 if the setting of the key was successful; < 0 if an error occurred
|
* Return: 0 if the setting of the key was successful; < 0 if an error occurred
|
||||||
*/
|
*/
|
||||||
static inline int crypto_cipher_setkey(struct crypto_cipher *tfm,
|
int crypto_cipher_setkey(struct crypto_cipher *tfm,
|
||||||
const u8 *key, unsigned int keylen)
|
const u8 *key, unsigned int keylen);
|
||||||
{
|
|
||||||
return crypto_cipher_crt(tfm)->cit_setkey(crypto_cipher_tfm(tfm),
|
|
||||||
key, keylen);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* crypto_cipher_encrypt_one() - encrypt one block of plaintext
|
* crypto_cipher_encrypt_one() - encrypt one block of plaintext
|
||||||
@ -889,12 +861,8 @@ static inline int crypto_cipher_setkey(struct crypto_cipher *tfm,
|
|||||||
* Invoke the encryption operation of one block. The caller must ensure that
|
* Invoke the encryption operation of one block. The caller must ensure that
|
||||||
* the plaintext and ciphertext buffers are at least one block in size.
|
* the plaintext and ciphertext buffers are at least one block in size.
|
||||||
*/
|
*/
|
||||||
static inline void crypto_cipher_encrypt_one(struct crypto_cipher *tfm,
|
void crypto_cipher_encrypt_one(struct crypto_cipher *tfm,
|
||||||
u8 *dst, const u8 *src)
|
u8 *dst, const u8 *src);
|
||||||
{
|
|
||||||
crypto_cipher_crt(tfm)->cit_encrypt_one(crypto_cipher_tfm(tfm),
|
|
||||||
dst, src);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* crypto_cipher_decrypt_one() - decrypt one block of ciphertext
|
* crypto_cipher_decrypt_one() - decrypt one block of ciphertext
|
||||||
@ -905,12 +873,8 @@ static inline void crypto_cipher_encrypt_one(struct crypto_cipher *tfm,
|
|||||||
* Invoke the decryption operation of one block. The caller must ensure that
|
* Invoke the decryption operation of one block. The caller must ensure that
|
||||||
* the plaintext and ciphertext buffers are at least one block in size.
|
* the plaintext and ciphertext buffers are at least one block in size.
|
||||||
*/
|
*/
|
||||||
static inline void crypto_cipher_decrypt_one(struct crypto_cipher *tfm,
|
void crypto_cipher_decrypt_one(struct crypto_cipher *tfm,
|
||||||
u8 *dst, const u8 *src)
|
u8 *dst, const u8 *src);
|
||||||
{
|
|
||||||
crypto_cipher_crt(tfm)->cit_decrypt_one(crypto_cipher_tfm(tfm),
|
|
||||||
dst, src);
|
|
||||||
}
|
|
||||||
|
|
||||||
static inline struct crypto_comp *__crypto_comp_cast(struct crypto_tfm *tfm)
|
static inline struct crypto_comp *__crypto_comp_cast(struct crypto_tfm *tfm)
|
||||||
{
|
{
|
||||||
|
Loading…
x
Reference in New Issue
Block a user