]>
Commit | Line | Data |
---|---|---|
2874c5fd | 1 | // SPDX-License-Identifier: GPL-2.0-or-later |
e1d5dea1 | 2 | /* |
1da177e4 LT |
3 | * Cryptographic API. |
4 | * | |
5 | * DES & Triple DES EDE Cipher Algorithms. | |
6 | * | |
e1d5dea1 | 7 | * Copyright (c) 2005 Dag Arne Osvik <da@osvik.no> |
1da177e4 | 8 | */ |
e1d5dea1 | 9 | |
06ace7a9 | 10 | #include <asm/byteorder.h> |
e1d5dea1 | 11 | #include <linux/bitops.h> |
1da177e4 LT |
12 | #include <linux/init.h> |
13 | #include <linux/module.h> | |
1da177e4 | 14 | #include <linux/errno.h> |
1da177e4 LT |
15 | #include <linux/crypto.h> |
16 | ||
04007b0e | 17 | #include <crypto/internal/des.h> |
1da177e4 | 18 | |
6c2bb98b | 19 | static int des_setkey(struct crypto_tfm *tfm, const u8 *key, |
560c06ae | 20 | unsigned int keylen) |
1da177e4 | 21 | { |
6c2bb98b | 22 | struct des_ctx *dctx = crypto_tfm_ctx(tfm); |
04007b0e | 23 | int err; |
e1d5dea1 | 24 | |
04007b0e AB |
25 | err = des_expand_key(dctx, key, keylen); |
26 | if (err == -ENOKEY) { | |
27 | if (crypto_tfm_get_flags(tfm) & CRYPTO_TFM_REQ_FORBID_WEAK_KEYS) | |
28 | err = -EINVAL; | |
29 | else | |
30 | err = 0; | |
e1d5dea1 DAO |
31 | } |
32 | ||
04007b0e AB |
33 | if (err) { |
34 | memset(dctx, 0, sizeof(*dctx)); | |
35 | crypto_tfm_set_flags(tfm, CRYPTO_TFM_RES_WEAK_KEY); | |
36 | } | |
37 | return err; | |
1da177e4 LT |
38 | } |
39 | ||
04007b0e | 40 | static void crypto_des_encrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src) |
1da177e4 | 41 | { |
04007b0e | 42 | const struct des_ctx *dctx = crypto_tfm_ctx(tfm); |
e1d5dea1 | 43 | |
04007b0e | 44 | des_encrypt(dctx, dst, src); |
1da177e4 LT |
45 | } |
46 | ||
04007b0e | 47 | static void crypto_des_decrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src) |
1da177e4 | 48 | { |
04007b0e | 49 | const struct des_ctx *dctx = crypto_tfm_ctx(tfm); |
e1d5dea1 | 50 | |
04007b0e | 51 | des_decrypt(dctx, dst, src); |
1da177e4 LT |
52 | } |
53 | ||
6574e6c6 JK |
54 | static int des3_ede_setkey(struct crypto_tfm *tfm, const u8 *key, |
55 | unsigned int keylen) | |
56 | { | |
57 | struct des3_ede_ctx *dctx = crypto_tfm_ctx(tfm); | |
4fd4be05 AB |
58 | int err; |
59 | ||
04007b0e AB |
60 | err = des3_ede_expand_key(dctx, key, keylen); |
61 | if (err == -ENOKEY) { | |
62 | if (crypto_tfm_get_flags(tfm) & CRYPTO_TFM_REQ_FORBID_WEAK_KEYS) | |
63 | err = -EINVAL; | |
64 | else | |
65 | err = 0; | |
66 | } | |
6574e6c6 | 67 | |
04007b0e AB |
68 | if (err) { |
69 | memset(dctx, 0, sizeof(*dctx)); | |
70 | crypto_tfm_set_flags(tfm, CRYPTO_TFM_RES_WEAK_KEY); | |
71 | } | |
72 | return err; | |
6574e6c6 | 73 | } |
1da177e4 | 74 | |
04007b0e AB |
75 | static void crypto_des3_ede_encrypt(struct crypto_tfm *tfm, u8 *dst, |
76 | const u8 *src) | |
1da177e4 | 77 | { |
04007b0e | 78 | const struct des3_ede_ctx *dctx = crypto_tfm_ctx(tfm); |
e1d5dea1 | 79 | |
04007b0e | 80 | des3_ede_encrypt(dctx, dst, src); |
1da177e4 LT |
81 | } |
82 | ||
04007b0e AB |
83 | static void crypto_des3_ede_decrypt(struct crypto_tfm *tfm, u8 *dst, |
84 | const u8 *src) | |
1da177e4 | 85 | { |
04007b0e | 86 | const struct des3_ede_ctx *dctx = crypto_tfm_ctx(tfm); |
1da177e4 | 87 | |
04007b0e | 88 | des3_ede_decrypt(dctx, dst, src); |
1da177e4 LT |
89 | } |
90 | ||
9935e6d2 | 91 | static struct crypto_alg des_algs[2] = { { |
1da177e4 | 92 | .cra_name = "des", |
6574e6c6 JK |
93 | .cra_driver_name = "des-generic", |
94 | .cra_priority = 100, | |
1da177e4 LT |
95 | .cra_flags = CRYPTO_ALG_TYPE_CIPHER, |
96 | .cra_blocksize = DES_BLOCK_SIZE, | |
97 | .cra_ctxsize = sizeof(struct des_ctx), | |
98 | .cra_module = THIS_MODULE, | |
1da177e4 LT |
99 | .cra_u = { .cipher = { |
100 | .cia_min_keysize = DES_KEY_SIZE, | |
101 | .cia_max_keysize = DES_KEY_SIZE, | |
e1d5dea1 | 102 | .cia_setkey = des_setkey, |
04007b0e AB |
103 | .cia_encrypt = crypto_des_encrypt, |
104 | .cia_decrypt = crypto_des_decrypt } } | |
9935e6d2 | 105 | }, { |
1da177e4 | 106 | .cra_name = "des3_ede", |
6574e6c6 JK |
107 | .cra_driver_name = "des3_ede-generic", |
108 | .cra_priority = 100, | |
1da177e4 LT |
109 | .cra_flags = CRYPTO_ALG_TYPE_CIPHER, |
110 | .cra_blocksize = DES3_EDE_BLOCK_SIZE, | |
111 | .cra_ctxsize = sizeof(struct des3_ede_ctx), | |
112 | .cra_module = THIS_MODULE, | |
1da177e4 LT |
113 | .cra_u = { .cipher = { |
114 | .cia_min_keysize = DES3_EDE_KEY_SIZE, | |
115 | .cia_max_keysize = DES3_EDE_KEY_SIZE, | |
e1d5dea1 | 116 | .cia_setkey = des3_ede_setkey, |
04007b0e AB |
117 | .cia_encrypt = crypto_des3_ede_encrypt, |
118 | .cia_decrypt = crypto_des3_ede_decrypt } } | |
9935e6d2 | 119 | } }; |
1da177e4 | 120 | |
3af5b90b | 121 | static int __init des_generic_mod_init(void) |
1da177e4 | 122 | { |
9935e6d2 | 123 | return crypto_register_algs(des_algs, ARRAY_SIZE(des_algs)); |
1da177e4 LT |
124 | } |
125 | ||
3af5b90b | 126 | static void __exit des_generic_mod_fini(void) |
1da177e4 | 127 | { |
9935e6d2 | 128 | crypto_unregister_algs(des_algs, ARRAY_SIZE(des_algs)); |
1da177e4 LT |
129 | } |
130 | ||
c4741b23 | 131 | subsys_initcall(des_generic_mod_init); |
3af5b90b | 132 | module_exit(des_generic_mod_fini); |
1da177e4 LT |
133 | |
134 | MODULE_LICENSE("GPL"); | |
135 | MODULE_DESCRIPTION("DES & Triple DES EDE Cipher Algorithms"); | |
e1d5dea1 | 136 | MODULE_AUTHOR("Dag Arne Osvik <da@osvik.no>"); |
3e14dcf7 MK |
137 | MODULE_ALIAS_CRYPTO("des"); |
138 | MODULE_ALIAS_CRYPTO("des-generic"); | |
139 | MODULE_ALIAS_CRYPTO("des3_ede"); | |
140 | MODULE_ALIAS_CRYPTO("des3_ede-generic"); |