2019-05-27 09:55:01 +03:00
// SPDX-License-Identifier: GPL-2.0-or-later
2005-04-17 02:20:36 +04:00
/*
* Cryptographic API .
*
2005-09-02 04:42:46 +04:00
* TEA , XTEA , and XETA crypto alogrithms
2005-04-17 02:20:36 +04:00
*
* The TEA and Xtended TEA algorithms were developed by David Wheeler
* and Roger Needham at the Computer Laboratory of Cambridge University .
*
2005-09-02 04:42:46 +04:00
* Due to the order of evaluation in XTEA many people have incorrectly
* implemented it . XETA ( XTEA in the wrong order ) , exists for
* compatibility with these implementations .
*
2005-04-17 02:20:36 +04:00
* Copyright ( c ) 2004 Aaron Grothe ajgrothe @ yahoo . com
*/
2022-11-25 07:36:28 +03:00
# include <crypto/algapi.h>
2005-04-17 02:20:36 +04:00
# include <linux/init.h>
# include <linux/module.h>
# include <linux/mm.h>
2005-10-30 13:25:15 +03:00
# include <asm/byteorder.h>
# include <linux/types.h>
2005-04-17 02:20:36 +04:00
# define TEA_KEY_SIZE 16
# define TEA_BLOCK_SIZE 8
# define TEA_ROUNDS 32
# define TEA_DELTA 0x9e3779b9
# define XTEA_KEY_SIZE 16
# define XTEA_BLOCK_SIZE 8
# define XTEA_ROUNDS 32
# define XTEA_DELTA 0x9e3779b9
struct tea_ctx {
u32 KEY [ 4 ] ;
} ;
struct xtea_ctx {
u32 KEY [ 4 ] ;
} ;
2006-05-16 16:09:29 +04:00
static int tea_setkey ( struct crypto_tfm * tfm , const u8 * in_key ,
2006-08-13 08:16:39 +04:00
unsigned int key_len )
2006-05-16 16:09:29 +04:00
{
struct tea_ctx * ctx = crypto_tfm_ctx ( tfm ) ;
2005-10-30 13:25:15 +03:00
const __le32 * key = ( const __le32 * ) in_key ;
2005-04-17 02:20:36 +04:00
2005-10-30 13:25:15 +03:00
ctx - > KEY [ 0 ] = le32_to_cpu ( key [ 0 ] ) ;
ctx - > KEY [ 1 ] = le32_to_cpu ( key [ 1 ] ) ;
ctx - > KEY [ 2 ] = le32_to_cpu ( key [ 2 ] ) ;
ctx - > KEY [ 3 ] = le32_to_cpu ( key [ 3 ] ) ;
2005-04-17 02:20:36 +04:00
return 0 ;
}
2006-05-16 16:09:29 +04:00
static void tea_encrypt ( struct crypto_tfm * tfm , u8 * dst , const u8 * src )
{
2005-04-17 02:20:36 +04:00
u32 y , z , n , sum = 0 ;
u32 k0 , k1 , k2 , k3 ;
2006-05-16 16:09:29 +04:00
struct tea_ctx * ctx = crypto_tfm_ctx ( tfm ) ;
2005-10-30 13:25:15 +03:00
const __le32 * in = ( const __le32 * ) src ;
__le32 * out = ( __le32 * ) dst ;
2005-04-17 02:20:36 +04:00
2005-10-30 13:25:15 +03:00
y = le32_to_cpu ( in [ 0 ] ) ;
z = le32_to_cpu ( in [ 1 ] ) ;
2005-04-17 02:20:36 +04:00
k0 = ctx - > KEY [ 0 ] ;
k1 = ctx - > KEY [ 1 ] ;
k2 = ctx - > KEY [ 2 ] ;
k3 = ctx - > KEY [ 3 ] ;
n = TEA_ROUNDS ;
while ( n - - > 0 ) {
sum + = TEA_DELTA ;
y + = ( ( z < < 4 ) + k0 ) ^ ( z + sum ) ^ ( ( z > > 5 ) + k1 ) ;
z + = ( ( y < < 4 ) + k2 ) ^ ( y + sum ) ^ ( ( y > > 5 ) + k3 ) ;
}
2005-10-30 13:25:15 +03:00
out [ 0 ] = cpu_to_le32 ( y ) ;
out [ 1 ] = cpu_to_le32 ( z ) ;
2005-04-17 02:20:36 +04:00
}
2006-05-16 16:09:29 +04:00
static void tea_decrypt ( struct crypto_tfm * tfm , u8 * dst , const u8 * src )
{
2005-04-17 02:20:36 +04:00
u32 y , z , n , sum ;
u32 k0 , k1 , k2 , k3 ;
2006-05-16 16:09:29 +04:00
struct tea_ctx * ctx = crypto_tfm_ctx ( tfm ) ;
2005-10-30 13:25:15 +03:00
const __le32 * in = ( const __le32 * ) src ;
__le32 * out = ( __le32 * ) dst ;
2005-04-17 02:20:36 +04:00
2005-10-30 13:25:15 +03:00
y = le32_to_cpu ( in [ 0 ] ) ;
z = le32_to_cpu ( in [ 1 ] ) ;
2005-04-17 02:20:36 +04:00
k0 = ctx - > KEY [ 0 ] ;
k1 = ctx - > KEY [ 1 ] ;
k2 = ctx - > KEY [ 2 ] ;
k3 = ctx - > KEY [ 3 ] ;
sum = TEA_DELTA < < 5 ;
n = TEA_ROUNDS ;
while ( n - - > 0 ) {
z - = ( ( y < < 4 ) + k2 ) ^ ( y + sum ) ^ ( ( y > > 5 ) + k3 ) ;
y - = ( ( z < < 4 ) + k0 ) ^ ( z + sum ) ^ ( ( z > > 5 ) + k1 ) ;
sum - = TEA_DELTA ;
}
2005-10-30 13:25:15 +03:00
out [ 0 ] = cpu_to_le32 ( y ) ;
out [ 1 ] = cpu_to_le32 ( z ) ;
2005-04-17 02:20:36 +04:00
}
2006-05-16 16:09:29 +04:00
static int xtea_setkey ( struct crypto_tfm * tfm , const u8 * in_key ,
2006-08-13 08:16:39 +04:00
unsigned int key_len )
2006-05-16 16:09:29 +04:00
{
struct xtea_ctx * ctx = crypto_tfm_ctx ( tfm ) ;
2005-10-30 13:25:15 +03:00
const __le32 * key = ( const __le32 * ) in_key ;
2005-04-17 02:20:36 +04:00
2005-10-30 13:25:15 +03:00
ctx - > KEY [ 0 ] = le32_to_cpu ( key [ 0 ] ) ;
ctx - > KEY [ 1 ] = le32_to_cpu ( key [ 1 ] ) ;
ctx - > KEY [ 2 ] = le32_to_cpu ( key [ 2 ] ) ;
ctx - > KEY [ 3 ] = le32_to_cpu ( key [ 3 ] ) ;
2005-04-17 02:20:36 +04:00
return 0 ;
}
2006-05-16 16:09:29 +04:00
static void xtea_encrypt ( struct crypto_tfm * tfm , u8 * dst , const u8 * src )
{
2005-04-17 02:20:36 +04:00
u32 y , z , sum = 0 ;
u32 limit = XTEA_DELTA * XTEA_ROUNDS ;
2006-05-16 16:09:29 +04:00
struct xtea_ctx * ctx = crypto_tfm_ctx ( tfm ) ;
2005-10-30 13:25:15 +03:00
const __le32 * in = ( const __le32 * ) src ;
__le32 * out = ( __le32 * ) dst ;
2005-04-17 02:20:36 +04:00
2005-10-30 13:25:15 +03:00
y = le32_to_cpu ( in [ 0 ] ) ;
z = le32_to_cpu ( in [ 1 ] ) ;
2005-04-17 02:20:36 +04:00
while ( sum ! = limit ) {
2005-09-02 04:42:46 +04:00
y + = ( ( z < < 4 ^ z > > 5 ) + z ) ^ ( sum + ctx - > KEY [ sum & 3 ] ) ;
2005-04-17 02:20:36 +04:00
sum + = XTEA_DELTA ;
2005-09-02 04:42:46 +04:00
z + = ( ( y < < 4 ^ y > > 5 ) + y ) ^ ( sum + ctx - > KEY [ sum > > 11 & 3 ] ) ;
2005-04-17 02:20:36 +04:00
}
2005-10-30 13:25:15 +03:00
out [ 0 ] = cpu_to_le32 ( y ) ;
out [ 1 ] = cpu_to_le32 ( z ) ;
2005-04-17 02:20:36 +04:00
}
2006-05-16 16:09:29 +04:00
static void xtea_decrypt ( struct crypto_tfm * tfm , u8 * dst , const u8 * src )
{
2005-04-17 02:20:36 +04:00
u32 y , z , sum ;
2006-05-16 16:09:29 +04:00
struct tea_ctx * ctx = crypto_tfm_ctx ( tfm ) ;
2005-10-30 13:25:15 +03:00
const __le32 * in = ( const __le32 * ) src ;
__le32 * out = ( __le32 * ) dst ;
2005-04-17 02:20:36 +04:00
2005-10-30 13:25:15 +03:00
y = le32_to_cpu ( in [ 0 ] ) ;
z = le32_to_cpu ( in [ 1 ] ) ;
2005-04-17 02:20:36 +04:00
sum = XTEA_DELTA * XTEA_ROUNDS ;
2005-09-02 04:42:46 +04:00
while ( sum ) {
z - = ( ( y < < 4 ^ y > > 5 ) + y ) ^ ( sum + ctx - > KEY [ sum > > 11 & 3 ] ) ;
sum - = XTEA_DELTA ;
y - = ( ( z < < 4 ^ z > > 5 ) + z ) ^ ( sum + ctx - > KEY [ sum & 3 ] ) ;
}
2005-10-30 13:25:15 +03:00
out [ 0 ] = cpu_to_le32 ( y ) ;
out [ 1 ] = cpu_to_le32 ( z ) ;
2005-09-02 04:42:46 +04:00
}
2006-05-16 16:09:29 +04:00
static void xeta_encrypt ( struct crypto_tfm * tfm , u8 * dst , const u8 * src )
{
2005-09-02 04:42:46 +04:00
u32 y , z , sum = 0 ;
u32 limit = XTEA_DELTA * XTEA_ROUNDS ;
2006-05-16 16:09:29 +04:00
struct xtea_ctx * ctx = crypto_tfm_ctx ( tfm ) ;
2005-10-30 13:25:15 +03:00
const __le32 * in = ( const __le32 * ) src ;
__le32 * out = ( __le32 * ) dst ;
2005-09-02 04:42:46 +04:00
2005-10-30 13:25:15 +03:00
y = le32_to_cpu ( in [ 0 ] ) ;
z = le32_to_cpu ( in [ 1 ] ) ;
2005-09-02 04:42:46 +04:00
while ( sum ! = limit ) {
y + = ( z < < 4 ^ z > > 5 ) + ( z ^ sum ) + ctx - > KEY [ sum & 3 ] ;
sum + = XTEA_DELTA ;
z + = ( y < < 4 ^ y > > 5 ) + ( y ^ sum ) + ctx - > KEY [ sum > > 11 & 3 ] ;
}
2005-10-30 13:25:15 +03:00
out [ 0 ] = cpu_to_le32 ( y ) ;
out [ 1 ] = cpu_to_le32 ( z ) ;
2005-09-02 04:42:46 +04:00
}
2006-05-16 16:09:29 +04:00
static void xeta_decrypt ( struct crypto_tfm * tfm , u8 * dst , const u8 * src )
{
2005-09-02 04:42:46 +04:00
u32 y , z , sum ;
2006-05-16 16:09:29 +04:00
struct tea_ctx * ctx = crypto_tfm_ctx ( tfm ) ;
2005-10-30 13:25:15 +03:00
const __le32 * in = ( const __le32 * ) src ;
__le32 * out = ( __le32 * ) dst ;
2005-09-02 04:42:46 +04:00
2005-10-30 13:25:15 +03:00
y = le32_to_cpu ( in [ 0 ] ) ;
z = le32_to_cpu ( in [ 1 ] ) ;
2005-09-02 04:42:46 +04:00
sum = XTEA_DELTA * XTEA_ROUNDS ;
2005-04-17 02:20:36 +04:00
while ( sum ) {
z - = ( y < < 4 ^ y > > 5 ) + ( y ^ sum ) + ctx - > KEY [ sum > > 11 & 3 ] ;
sum - = XTEA_DELTA ;
y - = ( z < < 4 ^ z > > 5 ) + ( z ^ sum ) + ctx - > KEY [ sum & 3 ] ;
}
2005-10-30 13:25:15 +03:00
out [ 0 ] = cpu_to_le32 ( y ) ;
out [ 1 ] = cpu_to_le32 ( z ) ;
2005-04-17 02:20:36 +04:00
}
2012-07-11 15:19:55 +04:00
static struct crypto_alg tea_algs [ 3 ] = { {
2005-04-17 02:20:36 +04:00
. cra_name = " tea " ,
2019-06-03 08:40:57 +03:00
. cra_driver_name = " tea-generic " ,
2005-04-17 02:20:36 +04:00
. cra_flags = CRYPTO_ALG_TYPE_CIPHER ,
. cra_blocksize = TEA_BLOCK_SIZE ,
. cra_ctxsize = sizeof ( struct tea_ctx ) ,
2006-01-07 08:38:15 +03:00
. cra_alignmask = 3 ,
2005-04-17 02:20:36 +04:00
. cra_module = THIS_MODULE ,
. cra_u = { . cipher = {
. cia_min_keysize = TEA_KEY_SIZE ,
. cia_max_keysize = TEA_KEY_SIZE ,
. cia_setkey = tea_setkey ,
. cia_encrypt = tea_encrypt ,
. cia_decrypt = tea_decrypt } }
2012-07-11 15:19:55 +04:00
} , {
2005-04-17 02:20:36 +04:00
. cra_name = " xtea " ,
2019-06-03 08:40:57 +03:00
. cra_driver_name = " xtea-generic " ,
2005-04-17 02:20:36 +04:00
. cra_flags = CRYPTO_ALG_TYPE_CIPHER ,
. cra_blocksize = XTEA_BLOCK_SIZE ,
. cra_ctxsize = sizeof ( struct xtea_ctx ) ,
2006-01-07 08:38:15 +03:00
. cra_alignmask = 3 ,
2005-04-17 02:20:36 +04:00
. cra_module = THIS_MODULE ,
. cra_u = { . cipher = {
. cia_min_keysize = XTEA_KEY_SIZE ,
. cia_max_keysize = XTEA_KEY_SIZE ,
. cia_setkey = xtea_setkey ,
. cia_encrypt = xtea_encrypt ,
. cia_decrypt = xtea_decrypt } }
2012-07-11 15:19:55 +04:00
} , {
2005-09-02 04:42:46 +04:00
. cra_name = " xeta " ,
2019-06-03 08:40:57 +03:00
. cra_driver_name = " xeta-generic " ,
2005-09-02 04:42:46 +04:00
. cra_flags = CRYPTO_ALG_TYPE_CIPHER ,
. cra_blocksize = XTEA_BLOCK_SIZE ,
. cra_ctxsize = sizeof ( struct xtea_ctx ) ,
2006-01-07 08:38:15 +03:00
. cra_alignmask = 3 ,
2005-09-02 04:42:46 +04:00
. cra_module = THIS_MODULE ,
. cra_u = { . cipher = {
. cia_min_keysize = XTEA_KEY_SIZE ,
. cia_max_keysize = XTEA_KEY_SIZE ,
. cia_setkey = xtea_setkey ,
. cia_encrypt = xeta_encrypt ,
. cia_decrypt = xeta_decrypt } }
2012-07-11 15:19:55 +04:00
} } ;
2005-09-02 04:42:46 +04:00
2008-04-05 17:00:57 +04:00
static int __init tea_mod_init ( void )
2005-04-17 02:20:36 +04:00
{
2012-07-11 15:19:55 +04:00
return crypto_register_algs ( tea_algs , ARRAY_SIZE ( tea_algs ) ) ;
2005-04-17 02:20:36 +04:00
}
2008-04-05 17:00:57 +04:00
static void __exit tea_mod_fini ( void )
2005-04-17 02:20:36 +04:00
{
2012-07-11 15:19:55 +04:00
crypto_unregister_algs ( tea_algs , ARRAY_SIZE ( tea_algs ) ) ;
2005-04-17 02:20:36 +04:00
}
2015-01-11 20:17:42 +03:00
MODULE_ALIAS_CRYPTO ( " tea " ) ;
2014-11-21 04:05:53 +03:00
MODULE_ALIAS_CRYPTO ( " xtea " ) ;
MODULE_ALIAS_CRYPTO ( " xeta " ) ;
2005-04-17 02:20:36 +04:00
2019-04-12 07:57:42 +03:00
subsys_initcall ( tea_mod_init ) ;
2008-04-05 17:00:57 +04:00
module_exit ( tea_mod_fini ) ;
2005-04-17 02:20:36 +04:00
MODULE_LICENSE ( " GPL " ) ;
2005-09-02 04:42:46 +04:00
MODULE_DESCRIPTION ( " TEA, XTEA & XETA Cryptographic Algorithms " ) ;