blob: 6e13a4a29ecb0b9f158ece39b8a4eddbd615ad96 [file] [log] [blame]
David Brazdil0f672f62019-12-10 10:32:29 +00001// SPDX-License-Identifier: GPL-2.0-or-later
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002/*
3 * Cryptographic API.
4 *
5 * DES & Triple DES EDE Cipher Algorithms.
6 *
7 * Copyright (c) 2005 Dag Arne Osvik <da@osvik.no>
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00008 */
9
10#include <asm/byteorder.h>
11#include <linux/bitops.h>
12#include <linux/init.h>
13#include <linux/module.h>
14#include <linux/errno.h>
15#include <linux/crypto.h>
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000016
David Brazdil0f672f62019-12-10 10:32:29 +000017#include <crypto/internal/des.h>
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000018
19static int des_setkey(struct crypto_tfm *tfm, const u8 *key,
20 unsigned int keylen)
21{
22 struct des_ctx *dctx = crypto_tfm_ctx(tfm);
David Brazdil0f672f62019-12-10 10:32:29 +000023 int err;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000024
David Brazdil0f672f62019-12-10 10:32:29 +000025 err = des_expand_key(dctx, key, keylen);
26 if (err == -ENOKEY) {
27 if (crypto_tfm_get_flags(tfm) & CRYPTO_TFM_REQ_FORBID_WEAK_KEYS)
28 err = -EINVAL;
29 else
30 err = 0;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000031 }
32
David Brazdil0f672f62019-12-10 10:32:29 +000033 if (err) {
34 memset(dctx, 0, sizeof(*dctx));
35 crypto_tfm_set_flags(tfm, CRYPTO_TFM_RES_WEAK_KEY);
36 }
37 return err;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000038}
39
David Brazdil0f672f62019-12-10 10:32:29 +000040static void crypto_des_encrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000041{
David Brazdil0f672f62019-12-10 10:32:29 +000042 const struct des_ctx *dctx = crypto_tfm_ctx(tfm);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000043
David Brazdil0f672f62019-12-10 10:32:29 +000044 des_encrypt(dctx, dst, src);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000045}
46
David Brazdil0f672f62019-12-10 10:32:29 +000047static void crypto_des_decrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000048{
David Brazdil0f672f62019-12-10 10:32:29 +000049 const struct des_ctx *dctx = crypto_tfm_ctx(tfm);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000050
David Brazdil0f672f62019-12-10 10:32:29 +000051 des_decrypt(dctx, dst, src);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000052}
53
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000054static int des3_ede_setkey(struct crypto_tfm *tfm, const u8 *key,
55 unsigned int keylen)
56{
57 struct des3_ede_ctx *dctx = crypto_tfm_ctx(tfm);
David Brazdil0f672f62019-12-10 10:32:29 +000058 int err;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000059
David Brazdil0f672f62019-12-10 10:32:29 +000060 err = des3_ede_expand_key(dctx, key, keylen);
61 if (err == -ENOKEY) {
62 if (crypto_tfm_get_flags(tfm) & CRYPTO_TFM_REQ_FORBID_WEAK_KEYS)
63 err = -EINVAL;
64 else
65 err = 0;
66 }
67
68 if (err) {
69 memset(dctx, 0, sizeof(*dctx));
70 crypto_tfm_set_flags(tfm, CRYPTO_TFM_RES_WEAK_KEY);
71 }
72 return err;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000073}
74
David Brazdil0f672f62019-12-10 10:32:29 +000075static void crypto_des3_ede_encrypt(struct crypto_tfm *tfm, u8 *dst,
76 const u8 *src)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000077{
David Brazdil0f672f62019-12-10 10:32:29 +000078 const struct des3_ede_ctx *dctx = crypto_tfm_ctx(tfm);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000079
David Brazdil0f672f62019-12-10 10:32:29 +000080 des3_ede_encrypt(dctx, dst, src);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000081}
82
David Brazdil0f672f62019-12-10 10:32:29 +000083static void crypto_des3_ede_decrypt(struct crypto_tfm *tfm, u8 *dst,
84 const u8 *src)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000085{
David Brazdil0f672f62019-12-10 10:32:29 +000086 const struct des3_ede_ctx *dctx = crypto_tfm_ctx(tfm);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000087
David Brazdil0f672f62019-12-10 10:32:29 +000088 des3_ede_decrypt(dctx, dst, src);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000089}
90
91static struct crypto_alg des_algs[2] = { {
92 .cra_name = "des",
93 .cra_driver_name = "des-generic",
94 .cra_priority = 100,
95 .cra_flags = CRYPTO_ALG_TYPE_CIPHER,
96 .cra_blocksize = DES_BLOCK_SIZE,
97 .cra_ctxsize = sizeof(struct des_ctx),
98 .cra_module = THIS_MODULE,
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000099 .cra_u = { .cipher = {
100 .cia_min_keysize = DES_KEY_SIZE,
101 .cia_max_keysize = DES_KEY_SIZE,
102 .cia_setkey = des_setkey,
David Brazdil0f672f62019-12-10 10:32:29 +0000103 .cia_encrypt = crypto_des_encrypt,
104 .cia_decrypt = crypto_des_decrypt } }
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000105}, {
106 .cra_name = "des3_ede",
107 .cra_driver_name = "des3_ede-generic",
108 .cra_priority = 100,
109 .cra_flags = CRYPTO_ALG_TYPE_CIPHER,
110 .cra_blocksize = DES3_EDE_BLOCK_SIZE,
111 .cra_ctxsize = sizeof(struct des3_ede_ctx),
112 .cra_module = THIS_MODULE,
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000113 .cra_u = { .cipher = {
114 .cia_min_keysize = DES3_EDE_KEY_SIZE,
115 .cia_max_keysize = DES3_EDE_KEY_SIZE,
116 .cia_setkey = des3_ede_setkey,
David Brazdil0f672f62019-12-10 10:32:29 +0000117 .cia_encrypt = crypto_des3_ede_encrypt,
118 .cia_decrypt = crypto_des3_ede_decrypt } }
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000119} };
120
121static int __init des_generic_mod_init(void)
122{
123 return crypto_register_algs(des_algs, ARRAY_SIZE(des_algs));
124}
125
126static void __exit des_generic_mod_fini(void)
127{
128 crypto_unregister_algs(des_algs, ARRAY_SIZE(des_algs));
129}
130
David Brazdil0f672f62019-12-10 10:32:29 +0000131subsys_initcall(des_generic_mod_init);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000132module_exit(des_generic_mod_fini);
133
134MODULE_LICENSE("GPL");
135MODULE_DESCRIPTION("DES & Triple DES EDE Cipher Algorithms");
136MODULE_AUTHOR("Dag Arne Osvik <da@osvik.no>");
137MODULE_ALIAS_CRYPTO("des");
138MODULE_ALIAS_CRYPTO("des-generic");
139MODULE_ALIAS_CRYPTO("des3_ede");
140MODULE_ALIAS_CRYPTO("des3_ede-generic");