root/drivers/crypto/inside-secure/eip93/eip93-aead.c
// SPDX-License-Identifier: GPL-2.0
/*
 * Copyright (C) 2019 - 2021
 *
 * Richard van Schagen <vschagen@icloud.com>
 * Christian Marangi <ansuelsmth@gmail.com
 */

#include <crypto/aead.h>
#include <crypto/aes.h>
#include <crypto/authenc.h>
#include <crypto/ctr.h>
#include <crypto/hmac.h>
#include <crypto/internal/aead.h>
#include <crypto/md5.h>
#include <crypto/null.h>
#include <crypto/sha1.h>
#include <crypto/sha2.h>

#include <crypto/internal/des.h>

#include <linux/crypto.h>
#include <linux/dma-mapping.h>

#include "eip93-aead.h"
#include "eip93-cipher.h"
#include "eip93-common.h"
#include "eip93-regs.h"

void eip93_aead_handle_result(struct crypto_async_request *async, int err)
{
        struct eip93_crypto_ctx *ctx = crypto_tfm_ctx(async->tfm);
        struct eip93_device *eip93 = ctx->eip93;
        struct aead_request *req = aead_request_cast(async);
        struct eip93_cipher_reqctx *rctx = aead_request_ctx(req);

        eip93_unmap_dma(eip93, rctx, req->src, req->dst);
        eip93_handle_result(eip93, rctx, req->iv);

        aead_request_complete(req, err);
}

static int eip93_aead_send_req(struct crypto_async_request *async)
{
        struct aead_request *req = aead_request_cast(async);
        struct eip93_cipher_reqctx *rctx = aead_request_ctx(req);
        int err;

        err = check_valid_request(rctx);
        if (err) {
                aead_request_complete(req, err);
                return err;
        }

        return eip93_send_req(async, req->iv, rctx);
}

/* Crypto aead API functions */
static int eip93_aead_cra_init(struct crypto_tfm *tfm)
{
        struct eip93_crypto_ctx *ctx = crypto_tfm_ctx(tfm);
        struct eip93_alg_template *tmpl = container_of(tfm->__crt_alg,
                                struct eip93_alg_template, alg.aead.base);

        crypto_aead_set_reqsize(__crypto_aead_cast(tfm),
                                sizeof(struct eip93_cipher_reqctx));

        ctx->eip93 = tmpl->eip93;
        ctx->flags = tmpl->flags;
        ctx->type = tmpl->type;
        ctx->set_assoc = true;

        ctx->sa_record = kzalloc_obj(*ctx->sa_record);
        if (!ctx->sa_record)
                return -ENOMEM;

        return 0;
}

static void eip93_aead_cra_exit(struct crypto_tfm *tfm)
{
        struct eip93_crypto_ctx *ctx = crypto_tfm_ctx(tfm);

        dma_unmap_single(ctx->eip93->dev, ctx->sa_record_base,
                         sizeof(*ctx->sa_record), DMA_TO_DEVICE);
        kfree(ctx->sa_record);
}

static int eip93_aead_setkey(struct crypto_aead *ctfm, const u8 *key,
                             unsigned int len)
{
        struct crypto_tfm *tfm = crypto_aead_tfm(ctfm);
        struct eip93_crypto_ctx *ctx = crypto_tfm_ctx(tfm);
        struct crypto_authenc_keys keys;
        struct crypto_aes_ctx aes;
        struct sa_record *sa_record = ctx->sa_record;
        u32 nonce = 0;
        int ret;

        if (crypto_authenc_extractkeys(&keys, key, len))
                return -EINVAL;

        if (IS_RFC3686(ctx->flags)) {
                if (keys.enckeylen < CTR_RFC3686_NONCE_SIZE)
                        return -EINVAL;

                keys.enckeylen -= CTR_RFC3686_NONCE_SIZE;
                memcpy(&nonce, keys.enckey + keys.enckeylen,
                       CTR_RFC3686_NONCE_SIZE);
        }

        switch ((ctx->flags & EIP93_ALG_MASK)) {
        case EIP93_ALG_DES:
                ret = verify_aead_des_key(ctfm, keys.enckey, keys.enckeylen);
                if (ret)
                        return ret;

                break;
        case EIP93_ALG_3DES:
                if (keys.enckeylen != DES3_EDE_KEY_SIZE)
                        return -EINVAL;

                ret = verify_aead_des3_key(ctfm, keys.enckey, keys.enckeylen);
                if (ret)
                        return ret;

                break;
        case EIP93_ALG_AES:
                ret = aes_expandkey(&aes, keys.enckey, keys.enckeylen);
                if (ret)
                        return ret;

                break;
        }

        ctx->blksize = crypto_aead_blocksize(ctfm);
        /* Encryption key */
        eip93_set_sa_record(sa_record, keys.enckeylen, ctx->flags);
        sa_record->sa_cmd0_word &= ~EIP93_SA_CMD_OPCODE;
        sa_record->sa_cmd0_word |= FIELD_PREP(EIP93_SA_CMD_OPCODE,
                                              EIP93_SA_CMD_OPCODE_BASIC_OUT_ENC_HASH);
        sa_record->sa_cmd0_word &= ~EIP93_SA_CMD_DIGEST_LENGTH;
        sa_record->sa_cmd0_word |= FIELD_PREP(EIP93_SA_CMD_DIGEST_LENGTH,
                                              ctx->authsize / sizeof(u32));

        memcpy(sa_record->sa_key, keys.enckey, keys.enckeylen);
        ctx->sa_nonce = nonce;
        sa_record->sa_nonce = nonce;

        /* authentication key */
        ret = eip93_hmac_setkey(ctx->flags, keys.authkey, keys.authkeylen,
                                ctx->authsize, sa_record->sa_i_digest,
                                sa_record->sa_o_digest, false);

        ctx->set_assoc = true;

        return ret;
}

static int eip93_aead_setauthsize(struct crypto_aead *ctfm,
                                  unsigned int authsize)
{
        struct crypto_tfm *tfm = crypto_aead_tfm(ctfm);
        struct eip93_crypto_ctx *ctx = crypto_tfm_ctx(tfm);

        ctx->authsize = authsize;
        ctx->sa_record->sa_cmd0_word &= ~EIP93_SA_CMD_DIGEST_LENGTH;
        ctx->sa_record->sa_cmd0_word |= FIELD_PREP(EIP93_SA_CMD_DIGEST_LENGTH,
                                                   ctx->authsize / sizeof(u32));

        return 0;
}

static void eip93_aead_setassoc(struct eip93_crypto_ctx *ctx,
                                struct aead_request *req)
{
        struct sa_record *sa_record = ctx->sa_record;

        sa_record->sa_cmd1_word &= ~EIP93_SA_CMD_HASH_CRYPT_OFFSET;
        sa_record->sa_cmd1_word |= FIELD_PREP(EIP93_SA_CMD_HASH_CRYPT_OFFSET,
                                              req->assoclen / sizeof(u32));

        ctx->assoclen = req->assoclen;
}

static int eip93_aead_crypt(struct aead_request *req)
{
        struct eip93_cipher_reqctx *rctx = aead_request_ctx(req);
        struct crypto_async_request *async = &req->base;
        struct eip93_crypto_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
        struct crypto_aead *aead = crypto_aead_reqtfm(req);
        int ret;

        ctx->sa_record_base = dma_map_single(ctx->eip93->dev, ctx->sa_record,
                                             sizeof(*ctx->sa_record), DMA_TO_DEVICE);
        ret = dma_mapping_error(ctx->eip93->dev, ctx->sa_record_base);
        if (ret)
                return ret;

        rctx->textsize = req->cryptlen;
        rctx->blksize = ctx->blksize;
        rctx->assoclen = req->assoclen;
        rctx->authsize = ctx->authsize;
        rctx->sg_src = req->src;
        rctx->sg_dst = req->dst;
        rctx->ivsize = crypto_aead_ivsize(aead);
        rctx->desc_flags = EIP93_DESC_AEAD;
        rctx->sa_record_base = ctx->sa_record_base;

        if (IS_DECRYPT(rctx->flags))
                rctx->textsize -= rctx->authsize;

        return eip93_aead_send_req(async);
}

static int eip93_aead_encrypt(struct aead_request *req)
{
        struct eip93_crypto_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
        struct eip93_cipher_reqctx *rctx = aead_request_ctx(req);

        rctx->flags = ctx->flags;
        rctx->flags |= EIP93_ENCRYPT;
        if (ctx->set_assoc) {
                eip93_aead_setassoc(ctx, req);
                ctx->set_assoc = false;
        }

        if (req->assoclen != ctx->assoclen) {
                dev_err(ctx->eip93->dev, "Request AAD length error\n");
                return -EINVAL;
        }

        return eip93_aead_crypt(req);
}

static int eip93_aead_decrypt(struct aead_request *req)
{
        struct eip93_crypto_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
        struct eip93_cipher_reqctx *rctx = aead_request_ctx(req);

        ctx->sa_record->sa_cmd0_word |= EIP93_SA_CMD_DIRECTION_IN;
        ctx->sa_record->sa_cmd1_word &= ~(EIP93_SA_CMD_COPY_PAD |
                                          EIP93_SA_CMD_COPY_DIGEST);

        rctx->flags = ctx->flags;
        rctx->flags |= EIP93_DECRYPT;
        if (ctx->set_assoc) {
                eip93_aead_setassoc(ctx, req);
                ctx->set_assoc = false;
        }

        if (req->assoclen != ctx->assoclen) {
                dev_err(ctx->eip93->dev, "Request AAD length error\n");
                return -EINVAL;
        }

        return eip93_aead_crypt(req);
}

/* Available authenc algorithms in this module */
struct eip93_alg_template eip93_alg_authenc_hmac_md5_cbc_aes = {
        .type = EIP93_ALG_TYPE_AEAD,
        .flags = EIP93_HASH_HMAC | EIP93_HASH_MD5 | EIP93_MODE_CBC | EIP93_ALG_AES,
        .alg.aead = {
                .setkey = eip93_aead_setkey,
                .encrypt = eip93_aead_encrypt,
                .decrypt = eip93_aead_decrypt,
                .ivsize = AES_BLOCK_SIZE,
                .setauthsize = eip93_aead_setauthsize,
                .maxauthsize = MD5_DIGEST_SIZE,
                .base = {
                        .cra_name = "authenc(hmac(md5),cbc(aes))",
                        .cra_driver_name =
                                "authenc(hmac(md5-eip93), cbc(aes-eip93))",
                        .cra_priority = EIP93_CRA_PRIORITY,
                        .cra_flags = CRYPTO_ALG_ASYNC |
                                        CRYPTO_ALG_KERN_DRIVER_ONLY |
                                        CRYPTO_ALG_ALLOCATES_MEMORY,
                        .cra_blocksize = AES_BLOCK_SIZE,
                        .cra_ctxsize = sizeof(struct eip93_crypto_ctx),
                        .cra_alignmask = 0,
                        .cra_init = eip93_aead_cra_init,
                        .cra_exit = eip93_aead_cra_exit,
                        .cra_module = THIS_MODULE,
                },
        },
};

struct eip93_alg_template eip93_alg_authenc_hmac_sha1_cbc_aes = {
        .type = EIP93_ALG_TYPE_AEAD,
        .flags = EIP93_HASH_HMAC | EIP93_HASH_SHA1 | EIP93_MODE_CBC | EIP93_ALG_AES,
        .alg.aead = {
                .setkey = eip93_aead_setkey,
                .encrypt = eip93_aead_encrypt,
                .decrypt = eip93_aead_decrypt,
                .ivsize = AES_BLOCK_SIZE,
                .setauthsize = eip93_aead_setauthsize,
                .maxauthsize = SHA1_DIGEST_SIZE,
                .base = {
                        .cra_name = "authenc(hmac(sha1),cbc(aes))",
                        .cra_driver_name =
                                "authenc(hmac(sha1-eip93),cbc(aes-eip93))",
                        .cra_priority = EIP93_CRA_PRIORITY,
                        .cra_flags = CRYPTO_ALG_ASYNC |
                                        CRYPTO_ALG_KERN_DRIVER_ONLY |
                                        CRYPTO_ALG_ALLOCATES_MEMORY,
                        .cra_blocksize = AES_BLOCK_SIZE,
                        .cra_ctxsize = sizeof(struct eip93_crypto_ctx),
                        .cra_alignmask = 0,
                        .cra_init = eip93_aead_cra_init,
                        .cra_exit = eip93_aead_cra_exit,
                        .cra_module = THIS_MODULE,
                },
        },
};

struct eip93_alg_template eip93_alg_authenc_hmac_sha224_cbc_aes = {
        .type = EIP93_ALG_TYPE_AEAD,
        .flags = EIP93_HASH_HMAC | EIP93_HASH_SHA224 | EIP93_MODE_CBC | EIP93_ALG_AES,
        .alg.aead = {
                .setkey = eip93_aead_setkey,
                .encrypt = eip93_aead_encrypt,
                .decrypt = eip93_aead_decrypt,
                .ivsize = AES_BLOCK_SIZE,
                .setauthsize = eip93_aead_setauthsize,
                .maxauthsize = SHA224_DIGEST_SIZE,
                .base = {
                        .cra_name = "authenc(hmac(sha224),cbc(aes))",
                        .cra_driver_name =
                                "authenc(hmac(sha224-eip93),cbc(aes-eip93))",
                        .cra_priority = EIP93_CRA_PRIORITY,
                        .cra_flags = CRYPTO_ALG_ASYNC |
                                        CRYPTO_ALG_KERN_DRIVER_ONLY |
                                        CRYPTO_ALG_ALLOCATES_MEMORY,
                        .cra_blocksize = AES_BLOCK_SIZE,
                        .cra_ctxsize = sizeof(struct eip93_crypto_ctx),
                        .cra_alignmask = 0,
                        .cra_init = eip93_aead_cra_init,
                        .cra_exit = eip93_aead_cra_exit,
                        .cra_module = THIS_MODULE,
                },
        },
};

struct eip93_alg_template eip93_alg_authenc_hmac_sha256_cbc_aes = {
        .type = EIP93_ALG_TYPE_AEAD,
        .flags = EIP93_HASH_HMAC | EIP93_HASH_SHA256 | EIP93_MODE_CBC | EIP93_ALG_AES,
        .alg.aead = {
                .setkey = eip93_aead_setkey,
                .encrypt = eip93_aead_encrypt,
                .decrypt = eip93_aead_decrypt,
                .ivsize = AES_BLOCK_SIZE,
                .setauthsize = eip93_aead_setauthsize,
                .maxauthsize = SHA256_DIGEST_SIZE,
                .base = {
                        .cra_name = "authenc(hmac(sha256),cbc(aes))",
                        .cra_driver_name =
                                "authenc(hmac(sha256-eip93),cbc(aes-eip93))",
                        .cra_priority = EIP93_CRA_PRIORITY,
                        .cra_flags = CRYPTO_ALG_ASYNC |
                                        CRYPTO_ALG_KERN_DRIVER_ONLY |
                                        CRYPTO_ALG_ALLOCATES_MEMORY,
                        .cra_blocksize = AES_BLOCK_SIZE,
                        .cra_ctxsize = sizeof(struct eip93_crypto_ctx),
                        .cra_alignmask = 0,
                        .cra_init = eip93_aead_cra_init,
                        .cra_exit = eip93_aead_cra_exit,
                        .cra_module = THIS_MODULE,
                },
        },
};

struct eip93_alg_template eip93_alg_authenc_hmac_md5_rfc3686_aes = {
        .type = EIP93_ALG_TYPE_AEAD,
        .flags = EIP93_HASH_HMAC | EIP93_HASH_MD5 |
                        EIP93_MODE_CTR | EIP93_MODE_RFC3686 | EIP93_ALG_AES,
        .alg.aead = {
                .setkey = eip93_aead_setkey,
                .encrypt = eip93_aead_encrypt,
                .decrypt = eip93_aead_decrypt,
                .ivsize = CTR_RFC3686_IV_SIZE,
                .setauthsize = eip93_aead_setauthsize,
                .maxauthsize = MD5_DIGEST_SIZE,
                .base = {
                        .cra_name = "authenc(hmac(md5),rfc3686(ctr(aes)))",
                        .cra_driver_name =
                        "authenc(hmac(md5-eip93),rfc3686(ctr(aes-eip93)))",
                        .cra_priority = EIP93_CRA_PRIORITY,
                        .cra_flags = CRYPTO_ALG_ASYNC |
                                        CRYPTO_ALG_KERN_DRIVER_ONLY |
                                        CRYPTO_ALG_ALLOCATES_MEMORY,
                        .cra_blocksize = 1,
                        .cra_ctxsize = sizeof(struct eip93_crypto_ctx),
                        .cra_alignmask = 0,
                        .cra_init = eip93_aead_cra_init,
                        .cra_exit = eip93_aead_cra_exit,
                        .cra_module = THIS_MODULE,
                },
        },
};

struct eip93_alg_template eip93_alg_authenc_hmac_sha1_rfc3686_aes = {
        .type = EIP93_ALG_TYPE_AEAD,
        .flags = EIP93_HASH_HMAC | EIP93_HASH_SHA1 |
                        EIP93_MODE_CTR | EIP93_MODE_RFC3686 | EIP93_ALG_AES,
        .alg.aead = {
                .setkey = eip93_aead_setkey,
                .encrypt = eip93_aead_encrypt,
                .decrypt = eip93_aead_decrypt,
                .ivsize = CTR_RFC3686_IV_SIZE,
                .setauthsize = eip93_aead_setauthsize,
                .maxauthsize = SHA1_DIGEST_SIZE,
                .base = {
                        .cra_name = "authenc(hmac(sha1),rfc3686(ctr(aes)))",
                        .cra_driver_name =
                        "authenc(hmac(sha1-eip93),rfc3686(ctr(aes-eip93)))",
                        .cra_priority = EIP93_CRA_PRIORITY,
                        .cra_flags = CRYPTO_ALG_ASYNC |
                                        CRYPTO_ALG_KERN_DRIVER_ONLY |
                                        CRYPTO_ALG_ALLOCATES_MEMORY,
                        .cra_blocksize = 1,
                        .cra_ctxsize = sizeof(struct eip93_crypto_ctx),
                        .cra_alignmask = 0,
                        .cra_init = eip93_aead_cra_init,
                        .cra_exit = eip93_aead_cra_exit,
                        .cra_module = THIS_MODULE,
                },
        },
};

struct eip93_alg_template eip93_alg_authenc_hmac_sha224_rfc3686_aes = {
        .type = EIP93_ALG_TYPE_AEAD,
        .flags = EIP93_HASH_HMAC | EIP93_HASH_SHA224 |
                        EIP93_MODE_CTR | EIP93_MODE_RFC3686 | EIP93_ALG_AES,
        .alg.aead = {
                .setkey = eip93_aead_setkey,
                .encrypt = eip93_aead_encrypt,
                .decrypt = eip93_aead_decrypt,
                .ivsize = CTR_RFC3686_IV_SIZE,
                .setauthsize = eip93_aead_setauthsize,
                .maxauthsize = SHA224_DIGEST_SIZE,
                .base = {
                        .cra_name = "authenc(hmac(sha224),rfc3686(ctr(aes)))",
                        .cra_driver_name =
                        "authenc(hmac(sha224-eip93),rfc3686(ctr(aes-eip93)))",
                        .cra_priority = EIP93_CRA_PRIORITY,
                        .cra_flags = CRYPTO_ALG_ASYNC |
                                        CRYPTO_ALG_KERN_DRIVER_ONLY |
                                        CRYPTO_ALG_ALLOCATES_MEMORY,
                        .cra_blocksize = 1,
                        .cra_ctxsize = sizeof(struct eip93_crypto_ctx),
                        .cra_alignmask = 0,
                        .cra_init = eip93_aead_cra_init,
                        .cra_exit = eip93_aead_cra_exit,
                        .cra_module = THIS_MODULE,
                },
        },
};

struct eip93_alg_template eip93_alg_authenc_hmac_sha256_rfc3686_aes = {
        .type = EIP93_ALG_TYPE_AEAD,
        .flags = EIP93_HASH_HMAC | EIP93_HASH_SHA256 |
                        EIP93_MODE_CTR | EIP93_MODE_RFC3686 | EIP93_ALG_AES,
        .alg.aead = {
                .setkey = eip93_aead_setkey,
                .encrypt = eip93_aead_encrypt,
                .decrypt = eip93_aead_decrypt,
                .ivsize = CTR_RFC3686_IV_SIZE,
                .setauthsize = eip93_aead_setauthsize,
                .maxauthsize = SHA256_DIGEST_SIZE,
                .base = {
                        .cra_name = "authenc(hmac(sha256),rfc3686(ctr(aes)))",
                        .cra_driver_name =
                        "authenc(hmac(sha256-eip93),rfc3686(ctr(aes-eip93)))",
                        .cra_priority = EIP93_CRA_PRIORITY,
                        .cra_flags = CRYPTO_ALG_ASYNC |
                                        CRYPTO_ALG_KERN_DRIVER_ONLY |
                                        CRYPTO_ALG_ALLOCATES_MEMORY,
                        .cra_blocksize = 1,
                        .cra_ctxsize = sizeof(struct eip93_crypto_ctx),
                        .cra_alignmask = 0,
                        .cra_init = eip93_aead_cra_init,
                        .cra_exit = eip93_aead_cra_exit,
                        .cra_module = THIS_MODULE,
                },
        },
};

struct eip93_alg_template eip93_alg_authenc_hmac_md5_cbc_des = {
        .type = EIP93_ALG_TYPE_AEAD,
        .flags = EIP93_HASH_HMAC | EIP93_HASH_MD5 | EIP93_MODE_CBC | EIP93_ALG_DES,
        .alg.aead = {
                .setkey = eip93_aead_setkey,
                .encrypt = eip93_aead_encrypt,
                .decrypt = eip93_aead_decrypt,
                .ivsize = DES_BLOCK_SIZE,
                .setauthsize = eip93_aead_setauthsize,
                .maxauthsize = MD5_DIGEST_SIZE,
                .base = {
                        .cra_name = "authenc(hmac(md5),cbc(des))",
                        .cra_driver_name =
                                "authenc(hmac(md5-eip93),cbc(des-eip93))",
                        .cra_priority = EIP93_CRA_PRIORITY,
                        .cra_flags = CRYPTO_ALG_ASYNC |
                                        CRYPTO_ALG_KERN_DRIVER_ONLY |
                                        CRYPTO_ALG_ALLOCATES_MEMORY,
                        .cra_blocksize = DES_BLOCK_SIZE,
                        .cra_ctxsize = sizeof(struct eip93_crypto_ctx),
                        .cra_alignmask = 0,
                        .cra_init = eip93_aead_cra_init,
                        .cra_exit = eip93_aead_cra_exit,
                        .cra_module = THIS_MODULE,
                },
        },
};

struct eip93_alg_template eip93_alg_authenc_hmac_sha1_cbc_des = {
        .type = EIP93_ALG_TYPE_AEAD,
        .flags = EIP93_HASH_HMAC | EIP93_HASH_SHA1 | EIP93_MODE_CBC | EIP93_ALG_DES,
        .alg.aead = {
                .setkey = eip93_aead_setkey,
                .encrypt = eip93_aead_encrypt,
                .decrypt = eip93_aead_decrypt,
                .ivsize = DES_BLOCK_SIZE,
                .setauthsize = eip93_aead_setauthsize,
                .maxauthsize = SHA1_DIGEST_SIZE,
                .base = {
                        .cra_name = "authenc(hmac(sha1),cbc(des))",
                        .cra_driver_name =
                                "authenc(hmac(sha1-eip93),cbc(des-eip93))",
                        .cra_priority = EIP93_CRA_PRIORITY,
                        .cra_flags = CRYPTO_ALG_ASYNC |
                                        CRYPTO_ALG_KERN_DRIVER_ONLY |
                                        CRYPTO_ALG_ALLOCATES_MEMORY,
                        .cra_blocksize = DES_BLOCK_SIZE,
                        .cra_ctxsize = sizeof(struct eip93_crypto_ctx),
                        .cra_alignmask = 0,
                        .cra_init = eip93_aead_cra_init,
                        .cra_exit = eip93_aead_cra_exit,
                        .cra_module = THIS_MODULE,
                },
        },
};

struct eip93_alg_template eip93_alg_authenc_hmac_sha224_cbc_des = {
        .type = EIP93_ALG_TYPE_AEAD,
        .flags = EIP93_HASH_HMAC | EIP93_HASH_SHA224 | EIP93_MODE_CBC | EIP93_ALG_DES,
        .alg.aead = {
                .setkey = eip93_aead_setkey,
                .encrypt = eip93_aead_encrypt,
                .decrypt = eip93_aead_decrypt,
                .ivsize = DES_BLOCK_SIZE,
                .setauthsize = eip93_aead_setauthsize,
                .maxauthsize = SHA224_DIGEST_SIZE,
                .base = {
                        .cra_name = "authenc(hmac(sha224),cbc(des))",
                        .cra_driver_name =
                                "authenc(hmac(sha224-eip93),cbc(des-eip93))",
                        .cra_priority = EIP93_CRA_PRIORITY,
                        .cra_flags = CRYPTO_ALG_ASYNC |
                                        CRYPTO_ALG_KERN_DRIVER_ONLY |
                                        CRYPTO_ALG_ALLOCATES_MEMORY,
                        .cra_blocksize = DES_BLOCK_SIZE,
                        .cra_ctxsize = sizeof(struct eip93_crypto_ctx),
                        .cra_alignmask = 0,
                        .cra_init = eip93_aead_cra_init,
                        .cra_exit = eip93_aead_cra_exit,
                        .cra_module = THIS_MODULE,
                },
        },
};

struct eip93_alg_template eip93_alg_authenc_hmac_sha256_cbc_des = {
        .type = EIP93_ALG_TYPE_AEAD,
        .flags = EIP93_HASH_HMAC | EIP93_HASH_SHA256 | EIP93_MODE_CBC | EIP93_ALG_DES,
        .alg.aead = {
                .setkey = eip93_aead_setkey,
                .encrypt = eip93_aead_encrypt,
                .decrypt = eip93_aead_decrypt,
                .ivsize = DES_BLOCK_SIZE,
                .setauthsize = eip93_aead_setauthsize,
                .maxauthsize = SHA256_DIGEST_SIZE,
                .base = {
                        .cra_name = "authenc(hmac(sha256),cbc(des))",
                        .cra_driver_name =
                                "authenc(hmac(sha256-eip93),cbc(des-eip93))",
                        .cra_priority = EIP93_CRA_PRIORITY,
                        .cra_flags = CRYPTO_ALG_ASYNC |
                                        CRYPTO_ALG_KERN_DRIVER_ONLY |
                                        CRYPTO_ALG_ALLOCATES_MEMORY,
                        .cra_blocksize = DES_BLOCK_SIZE,
                        .cra_ctxsize = sizeof(struct eip93_crypto_ctx),
                        .cra_alignmask = 0,
                        .cra_init = eip93_aead_cra_init,
                        .cra_exit = eip93_aead_cra_exit,
                        .cra_module = THIS_MODULE,
                },
        },
};

struct eip93_alg_template eip93_alg_authenc_hmac_md5_cbc_des3_ede = {
        .type = EIP93_ALG_TYPE_AEAD,
        .flags = EIP93_HASH_HMAC | EIP93_HASH_MD5 | EIP93_MODE_CBC | EIP93_ALG_3DES,
        .alg.aead = {
                .setkey = eip93_aead_setkey,
                .encrypt = eip93_aead_encrypt,
                .decrypt = eip93_aead_decrypt,
                .ivsize = DES3_EDE_BLOCK_SIZE,
                .setauthsize = eip93_aead_setauthsize,
                .maxauthsize = MD5_DIGEST_SIZE,
                .base = {
                        .cra_name = "authenc(hmac(md5),cbc(des3_ede))",
                        .cra_driver_name =
                                "authenc(hmac(md5-eip93),cbc(des3_ede-eip93))",
                        .cra_priority = EIP93_CRA_PRIORITY,
                        .cra_flags = CRYPTO_ALG_ASYNC |
                                        CRYPTO_ALG_KERN_DRIVER_ONLY |
                                        CRYPTO_ALG_ALLOCATES_MEMORY,
                        .cra_blocksize = DES3_EDE_BLOCK_SIZE,
                        .cra_ctxsize = sizeof(struct eip93_crypto_ctx),
                        .cra_alignmask = 0x0,
                        .cra_init = eip93_aead_cra_init,
                        .cra_exit = eip93_aead_cra_exit,
                        .cra_module = THIS_MODULE,
                },
        },
};

struct eip93_alg_template eip93_alg_authenc_hmac_sha1_cbc_des3_ede = {
        .type = EIP93_ALG_TYPE_AEAD,
        .flags = EIP93_HASH_HMAC | EIP93_HASH_SHA1 | EIP93_MODE_CBC | EIP93_ALG_3DES,
        .alg.aead = {
                .setkey = eip93_aead_setkey,
                .encrypt = eip93_aead_encrypt,
                .decrypt = eip93_aead_decrypt,
                .ivsize = DES3_EDE_BLOCK_SIZE,
                .setauthsize = eip93_aead_setauthsize,
                .maxauthsize = SHA1_DIGEST_SIZE,
                .base = {
                        .cra_name = "authenc(hmac(sha1),cbc(des3_ede))",
                        .cra_driver_name =
                                "authenc(hmac(sha1-eip93),cbc(des3_ede-eip93))",
                        .cra_priority = EIP93_CRA_PRIORITY,
                        .cra_flags = CRYPTO_ALG_ASYNC |
                                        CRYPTO_ALG_KERN_DRIVER_ONLY |
                                        CRYPTO_ALG_ALLOCATES_MEMORY,
                        .cra_blocksize = DES3_EDE_BLOCK_SIZE,
                        .cra_ctxsize = sizeof(struct eip93_crypto_ctx),
                        .cra_alignmask = 0x0,
                        .cra_init = eip93_aead_cra_init,
                        .cra_exit = eip93_aead_cra_exit,
                        .cra_module = THIS_MODULE,
                },
        },
};

struct eip93_alg_template eip93_alg_authenc_hmac_sha224_cbc_des3_ede = {
        .type = EIP93_ALG_TYPE_AEAD,
        .flags = EIP93_HASH_HMAC | EIP93_HASH_SHA224 | EIP93_MODE_CBC | EIP93_ALG_3DES,
        .alg.aead = {
                .setkey = eip93_aead_setkey,
                .encrypt = eip93_aead_encrypt,
                .decrypt = eip93_aead_decrypt,
                .ivsize = DES3_EDE_BLOCK_SIZE,
                .setauthsize = eip93_aead_setauthsize,
                .maxauthsize = SHA224_DIGEST_SIZE,
                .base = {
                        .cra_name = "authenc(hmac(sha224),cbc(des3_ede))",
                        .cra_driver_name =
                        "authenc(hmac(sha224-eip93),cbc(des3_ede-eip93))",
                        .cra_priority = EIP93_CRA_PRIORITY,
                        .cra_flags = CRYPTO_ALG_ASYNC |
                                        CRYPTO_ALG_KERN_DRIVER_ONLY |
                                        CRYPTO_ALG_ALLOCATES_MEMORY,
                        .cra_blocksize = DES3_EDE_BLOCK_SIZE,
                        .cra_ctxsize = sizeof(struct eip93_crypto_ctx),
                        .cra_alignmask = 0x0,
                        .cra_init = eip93_aead_cra_init,
                        .cra_exit = eip93_aead_cra_exit,
                        .cra_module = THIS_MODULE,
                },
        },
};

struct eip93_alg_template eip93_alg_authenc_hmac_sha256_cbc_des3_ede = {
        .type = EIP93_ALG_TYPE_AEAD,
        .flags = EIP93_HASH_HMAC | EIP93_HASH_SHA256 | EIP93_MODE_CBC | EIP93_ALG_3DES,
        .alg.aead = {
                .setkey = eip93_aead_setkey,
                .encrypt = eip93_aead_encrypt,
                .decrypt = eip93_aead_decrypt,
                .ivsize = DES3_EDE_BLOCK_SIZE,
                .setauthsize = eip93_aead_setauthsize,
                .maxauthsize = SHA256_DIGEST_SIZE,
                .base = {
                        .cra_name = "authenc(hmac(sha256),cbc(des3_ede))",
                        .cra_driver_name =
                        "authenc(hmac(sha256-eip93),cbc(des3_ede-eip93))",
                        .cra_priority = EIP93_CRA_PRIORITY,
                        .cra_flags = CRYPTO_ALG_ASYNC |
                                        CRYPTO_ALG_KERN_DRIVER_ONLY |
                                        CRYPTO_ALG_ALLOCATES_MEMORY,
                        .cra_blocksize = DES3_EDE_BLOCK_SIZE,
                        .cra_ctxsize = sizeof(struct eip93_crypto_ctx),
                        .cra_alignmask = 0x0,
                        .cra_init = eip93_aead_cra_init,
                        .cra_exit = eip93_aead_cra_exit,
                        .cra_module = THIS_MODULE,
                },
        },
};