|
@@ -185,6 +185,11 @@ static int safexcel_aead_aes_setkey(struct crypto_aead *ctfm, const u8 *key,
|
|
|
|
|
|
/* Auth key */
|
|
|
switch (ctx->alg) {
|
|
|
+ case CONTEXT_CONTROL_CRYPTO_ALG_SHA1:
|
|
|
+ if (safexcel_hmac_setkey("safexcel-sha1", keys.authkey,
|
|
|
+ keys.authkeylen, &istate, &ostate))
|
|
|
+ goto badkey;
|
|
|
+ break;
|
|
|
case CONTEXT_CONTROL_CRYPTO_ALG_SHA224:
|
|
|
if (safexcel_hmac_setkey("safexcel-sha224", keys.authkey,
|
|
|
keys.authkeylen, &istate, &ostate))
|
|
@@ -916,6 +921,40 @@ static int safexcel_aead_cra_init(struct crypto_tfm *tfm)
|
|
|
return 0;
|
|
|
}
|
|
|
|
|
|
+static int safexcel_aead_sha1_cra_init(struct crypto_tfm *tfm)
|
|
|
+{
|
|
|
+ struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
|
|
|
+
|
|
|
+ safexcel_aead_cra_init(tfm);
|
|
|
+ ctx->alg = CONTEXT_CONTROL_CRYPTO_ALG_SHA1;
|
|
|
+ ctx->state_sz = SHA1_DIGEST_SIZE;
|
|
|
+ return 0;
|
|
|
+}
|
|
|
+
|
|
|
+struct safexcel_alg_template safexcel_alg_authenc_hmac_sha1_cbc_aes = {
|
|
|
+ .type = SAFEXCEL_ALG_TYPE_AEAD,
|
|
|
+ .alg.aead = {
|
|
|
+ .setkey = safexcel_aead_aes_setkey,
|
|
|
+ .encrypt = safexcel_aead_encrypt,
|
|
|
+ .decrypt = safexcel_aead_decrypt,
|
|
|
+ .ivsize = AES_BLOCK_SIZE,
|
|
|
+ .maxauthsize = SHA1_DIGEST_SIZE,
|
|
|
+ .base = {
|
|
|
+ .cra_name = "authenc(hmac(sha1),cbc(aes))",
|
|
|
+ .cra_driver_name = "safexcel-authenc-hmac-sha1-cbc-aes",
|
|
|
+ .cra_priority = 300,
|
|
|
+ .cra_flags = CRYPTO_ALG_TYPE_AEAD | CRYPTO_ALG_ASYNC |
|
|
|
+ CRYPTO_ALG_KERN_DRIVER_ONLY,
|
|
|
+ .cra_blocksize = AES_BLOCK_SIZE,
|
|
|
+ .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
|
|
|
+ .cra_alignmask = 0,
|
|
|
+ .cra_init = safexcel_aead_sha1_cra_init,
|
|
|
+ .cra_exit = safexcel_aead_cra_exit,
|
|
|
+ .cra_module = THIS_MODULE,
|
|
|
+ },
|
|
|
+ },
|
|
|
+};
|
|
|
+
|
|
|
static int safexcel_aead_sha256_cra_init(struct crypto_tfm *tfm)
|
|
|
{
|
|
|
struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
|