162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later
262306a36Sopenharmony_ci/*
362306a36Sopenharmony_ci * Cryptographic API.
462306a36Sopenharmony_ci *
562306a36Sopenharmony_ci * TEA, XTEA, and XETA crypto alogrithms
662306a36Sopenharmony_ci *
762306a36Sopenharmony_ci * The TEA and Xtended TEA algorithms were developed by David Wheeler
862306a36Sopenharmony_ci * and Roger Needham at the Computer Laboratory of Cambridge University.
962306a36Sopenharmony_ci *
1062306a36Sopenharmony_ci * Due to the order of evaluation in XTEA many people have incorrectly
1162306a36Sopenharmony_ci * implemented it.  XETA (XTEA in the wrong order), exists for
1262306a36Sopenharmony_ci * compatibility with these implementations.
1362306a36Sopenharmony_ci *
1462306a36Sopenharmony_ci * Copyright (c) 2004 Aaron Grothe ajgrothe@yahoo.com
1562306a36Sopenharmony_ci */
1662306a36Sopenharmony_ci
1762306a36Sopenharmony_ci#include <crypto/algapi.h>
1862306a36Sopenharmony_ci#include <linux/init.h>
1962306a36Sopenharmony_ci#include <linux/module.h>
2062306a36Sopenharmony_ci#include <linux/mm.h>
2162306a36Sopenharmony_ci#include <asm/byteorder.h>
2262306a36Sopenharmony_ci#include <linux/types.h>
2362306a36Sopenharmony_ci
2462306a36Sopenharmony_ci#define TEA_KEY_SIZE		16
2562306a36Sopenharmony_ci#define TEA_BLOCK_SIZE		8
2662306a36Sopenharmony_ci#define TEA_ROUNDS		32
2762306a36Sopenharmony_ci#define TEA_DELTA		0x9e3779b9
2862306a36Sopenharmony_ci
2962306a36Sopenharmony_ci#define XTEA_KEY_SIZE		16
3062306a36Sopenharmony_ci#define XTEA_BLOCK_SIZE		8
3162306a36Sopenharmony_ci#define XTEA_ROUNDS		32
3262306a36Sopenharmony_ci#define XTEA_DELTA		0x9e3779b9
3362306a36Sopenharmony_ci
3462306a36Sopenharmony_cistruct tea_ctx {
3562306a36Sopenharmony_ci	u32 KEY[4];
3662306a36Sopenharmony_ci};
3762306a36Sopenharmony_ci
3862306a36Sopenharmony_cistruct xtea_ctx {
3962306a36Sopenharmony_ci	u32 KEY[4];
4062306a36Sopenharmony_ci};
4162306a36Sopenharmony_ci
4262306a36Sopenharmony_cistatic int tea_setkey(struct crypto_tfm *tfm, const u8 *in_key,
4362306a36Sopenharmony_ci		      unsigned int key_len)
4462306a36Sopenharmony_ci{
4562306a36Sopenharmony_ci	struct tea_ctx *ctx = crypto_tfm_ctx(tfm);
4662306a36Sopenharmony_ci	const __le32 *key = (const __le32 *)in_key;
4762306a36Sopenharmony_ci
4862306a36Sopenharmony_ci	ctx->KEY[0] = le32_to_cpu(key[0]);
4962306a36Sopenharmony_ci	ctx->KEY[1] = le32_to_cpu(key[1]);
5062306a36Sopenharmony_ci	ctx->KEY[2] = le32_to_cpu(key[2]);
5162306a36Sopenharmony_ci	ctx->KEY[3] = le32_to_cpu(key[3]);
5262306a36Sopenharmony_ci
5362306a36Sopenharmony_ci	return 0;
5462306a36Sopenharmony_ci
5562306a36Sopenharmony_ci}
5662306a36Sopenharmony_ci
5762306a36Sopenharmony_cistatic void tea_encrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src)
5862306a36Sopenharmony_ci{
5962306a36Sopenharmony_ci	u32 y, z, n, sum = 0;
6062306a36Sopenharmony_ci	u32 k0, k1, k2, k3;
6162306a36Sopenharmony_ci	struct tea_ctx *ctx = crypto_tfm_ctx(tfm);
6262306a36Sopenharmony_ci	const __le32 *in = (const __le32 *)src;
6362306a36Sopenharmony_ci	__le32 *out = (__le32 *)dst;
6462306a36Sopenharmony_ci
6562306a36Sopenharmony_ci	y = le32_to_cpu(in[0]);
6662306a36Sopenharmony_ci	z = le32_to_cpu(in[1]);
6762306a36Sopenharmony_ci
6862306a36Sopenharmony_ci	k0 = ctx->KEY[0];
6962306a36Sopenharmony_ci	k1 = ctx->KEY[1];
7062306a36Sopenharmony_ci	k2 = ctx->KEY[2];
7162306a36Sopenharmony_ci	k3 = ctx->KEY[3];
7262306a36Sopenharmony_ci
7362306a36Sopenharmony_ci	n = TEA_ROUNDS;
7462306a36Sopenharmony_ci
7562306a36Sopenharmony_ci	while (n-- > 0) {
7662306a36Sopenharmony_ci		sum += TEA_DELTA;
7762306a36Sopenharmony_ci		y += ((z << 4) + k0) ^ (z + sum) ^ ((z >> 5) + k1);
7862306a36Sopenharmony_ci		z += ((y << 4) + k2) ^ (y + sum) ^ ((y >> 5) + k3);
7962306a36Sopenharmony_ci	}
8062306a36Sopenharmony_ci
8162306a36Sopenharmony_ci	out[0] = cpu_to_le32(y);
8262306a36Sopenharmony_ci	out[1] = cpu_to_le32(z);
8362306a36Sopenharmony_ci}
8462306a36Sopenharmony_ci
8562306a36Sopenharmony_cistatic void tea_decrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src)
8662306a36Sopenharmony_ci{
8762306a36Sopenharmony_ci	u32 y, z, n, sum;
8862306a36Sopenharmony_ci	u32 k0, k1, k2, k3;
8962306a36Sopenharmony_ci	struct tea_ctx *ctx = crypto_tfm_ctx(tfm);
9062306a36Sopenharmony_ci	const __le32 *in = (const __le32 *)src;
9162306a36Sopenharmony_ci	__le32 *out = (__le32 *)dst;
9262306a36Sopenharmony_ci
9362306a36Sopenharmony_ci	y = le32_to_cpu(in[0]);
9462306a36Sopenharmony_ci	z = le32_to_cpu(in[1]);
9562306a36Sopenharmony_ci
9662306a36Sopenharmony_ci	k0 = ctx->KEY[0];
9762306a36Sopenharmony_ci	k1 = ctx->KEY[1];
9862306a36Sopenharmony_ci	k2 = ctx->KEY[2];
9962306a36Sopenharmony_ci	k3 = ctx->KEY[3];
10062306a36Sopenharmony_ci
10162306a36Sopenharmony_ci	sum = TEA_DELTA << 5;
10262306a36Sopenharmony_ci
10362306a36Sopenharmony_ci	n = TEA_ROUNDS;
10462306a36Sopenharmony_ci
10562306a36Sopenharmony_ci	while (n-- > 0) {
10662306a36Sopenharmony_ci		z -= ((y << 4) + k2) ^ (y + sum) ^ ((y >> 5) + k3);
10762306a36Sopenharmony_ci		y -= ((z << 4) + k0) ^ (z + sum) ^ ((z >> 5) + k1);
10862306a36Sopenharmony_ci		sum -= TEA_DELTA;
10962306a36Sopenharmony_ci	}
11062306a36Sopenharmony_ci
11162306a36Sopenharmony_ci	out[0] = cpu_to_le32(y);
11262306a36Sopenharmony_ci	out[1] = cpu_to_le32(z);
11362306a36Sopenharmony_ci}
11462306a36Sopenharmony_ci
11562306a36Sopenharmony_cistatic int xtea_setkey(struct crypto_tfm *tfm, const u8 *in_key,
11662306a36Sopenharmony_ci		       unsigned int key_len)
11762306a36Sopenharmony_ci{
11862306a36Sopenharmony_ci	struct xtea_ctx *ctx = crypto_tfm_ctx(tfm);
11962306a36Sopenharmony_ci	const __le32 *key = (const __le32 *)in_key;
12062306a36Sopenharmony_ci
12162306a36Sopenharmony_ci	ctx->KEY[0] = le32_to_cpu(key[0]);
12262306a36Sopenharmony_ci	ctx->KEY[1] = le32_to_cpu(key[1]);
12362306a36Sopenharmony_ci	ctx->KEY[2] = le32_to_cpu(key[2]);
12462306a36Sopenharmony_ci	ctx->KEY[3] = le32_to_cpu(key[3]);
12562306a36Sopenharmony_ci
12662306a36Sopenharmony_ci	return 0;
12762306a36Sopenharmony_ci
12862306a36Sopenharmony_ci}
12962306a36Sopenharmony_ci
13062306a36Sopenharmony_cistatic void xtea_encrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src)
13162306a36Sopenharmony_ci{
13262306a36Sopenharmony_ci	u32 y, z, sum = 0;
13362306a36Sopenharmony_ci	u32 limit = XTEA_DELTA * XTEA_ROUNDS;
13462306a36Sopenharmony_ci	struct xtea_ctx *ctx = crypto_tfm_ctx(tfm);
13562306a36Sopenharmony_ci	const __le32 *in = (const __le32 *)src;
13662306a36Sopenharmony_ci	__le32 *out = (__le32 *)dst;
13762306a36Sopenharmony_ci
13862306a36Sopenharmony_ci	y = le32_to_cpu(in[0]);
13962306a36Sopenharmony_ci	z = le32_to_cpu(in[1]);
14062306a36Sopenharmony_ci
14162306a36Sopenharmony_ci	while (sum != limit) {
14262306a36Sopenharmony_ci		y += ((z << 4 ^ z >> 5) + z) ^ (sum + ctx->KEY[sum&3]);
14362306a36Sopenharmony_ci		sum += XTEA_DELTA;
14462306a36Sopenharmony_ci		z += ((y << 4 ^ y >> 5) + y) ^ (sum + ctx->KEY[sum>>11 &3]);
14562306a36Sopenharmony_ci	}
14662306a36Sopenharmony_ci
14762306a36Sopenharmony_ci	out[0] = cpu_to_le32(y);
14862306a36Sopenharmony_ci	out[1] = cpu_to_le32(z);
14962306a36Sopenharmony_ci}
15062306a36Sopenharmony_ci
15162306a36Sopenharmony_cistatic void xtea_decrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src)
15262306a36Sopenharmony_ci{
15362306a36Sopenharmony_ci	u32 y, z, sum;
15462306a36Sopenharmony_ci	struct tea_ctx *ctx = crypto_tfm_ctx(tfm);
15562306a36Sopenharmony_ci	const __le32 *in = (const __le32 *)src;
15662306a36Sopenharmony_ci	__le32 *out = (__le32 *)dst;
15762306a36Sopenharmony_ci
15862306a36Sopenharmony_ci	y = le32_to_cpu(in[0]);
15962306a36Sopenharmony_ci	z = le32_to_cpu(in[1]);
16062306a36Sopenharmony_ci
16162306a36Sopenharmony_ci	sum = XTEA_DELTA * XTEA_ROUNDS;
16262306a36Sopenharmony_ci
16362306a36Sopenharmony_ci	while (sum) {
16462306a36Sopenharmony_ci		z -= ((y << 4 ^ y >> 5) + y) ^ (sum + ctx->KEY[sum>>11 & 3]);
16562306a36Sopenharmony_ci		sum -= XTEA_DELTA;
16662306a36Sopenharmony_ci		y -= ((z << 4 ^ z >> 5) + z) ^ (sum + ctx->KEY[sum & 3]);
16762306a36Sopenharmony_ci	}
16862306a36Sopenharmony_ci
16962306a36Sopenharmony_ci	out[0] = cpu_to_le32(y);
17062306a36Sopenharmony_ci	out[1] = cpu_to_le32(z);
17162306a36Sopenharmony_ci}
17262306a36Sopenharmony_ci
17362306a36Sopenharmony_ci
17462306a36Sopenharmony_cistatic void xeta_encrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src)
17562306a36Sopenharmony_ci{
17662306a36Sopenharmony_ci	u32 y, z, sum = 0;
17762306a36Sopenharmony_ci	u32 limit = XTEA_DELTA * XTEA_ROUNDS;
17862306a36Sopenharmony_ci	struct xtea_ctx *ctx = crypto_tfm_ctx(tfm);
17962306a36Sopenharmony_ci	const __le32 *in = (const __le32 *)src;
18062306a36Sopenharmony_ci	__le32 *out = (__le32 *)dst;
18162306a36Sopenharmony_ci
18262306a36Sopenharmony_ci	y = le32_to_cpu(in[0]);
18362306a36Sopenharmony_ci	z = le32_to_cpu(in[1]);
18462306a36Sopenharmony_ci
18562306a36Sopenharmony_ci	while (sum != limit) {
18662306a36Sopenharmony_ci		y += (z << 4 ^ z >> 5) + (z ^ sum) + ctx->KEY[sum&3];
18762306a36Sopenharmony_ci		sum += XTEA_DELTA;
18862306a36Sopenharmony_ci		z += (y << 4 ^ y >> 5) + (y ^ sum) + ctx->KEY[sum>>11 &3];
18962306a36Sopenharmony_ci	}
19062306a36Sopenharmony_ci
19162306a36Sopenharmony_ci	out[0] = cpu_to_le32(y);
19262306a36Sopenharmony_ci	out[1] = cpu_to_le32(z);
19362306a36Sopenharmony_ci}
19462306a36Sopenharmony_ci
19562306a36Sopenharmony_cistatic void xeta_decrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src)
19662306a36Sopenharmony_ci{
19762306a36Sopenharmony_ci	u32 y, z, sum;
19862306a36Sopenharmony_ci	struct tea_ctx *ctx = crypto_tfm_ctx(tfm);
19962306a36Sopenharmony_ci	const __le32 *in = (const __le32 *)src;
20062306a36Sopenharmony_ci	__le32 *out = (__le32 *)dst;
20162306a36Sopenharmony_ci
20262306a36Sopenharmony_ci	y = le32_to_cpu(in[0]);
20362306a36Sopenharmony_ci	z = le32_to_cpu(in[1]);
20462306a36Sopenharmony_ci
20562306a36Sopenharmony_ci	sum = XTEA_DELTA * XTEA_ROUNDS;
20662306a36Sopenharmony_ci
20762306a36Sopenharmony_ci	while (sum) {
20862306a36Sopenharmony_ci		z -= (y << 4 ^ y >> 5) + (y ^ sum) + ctx->KEY[sum>>11 & 3];
20962306a36Sopenharmony_ci		sum -= XTEA_DELTA;
21062306a36Sopenharmony_ci		y -= (z << 4 ^ z >> 5) + (z ^ sum) + ctx->KEY[sum & 3];
21162306a36Sopenharmony_ci	}
21262306a36Sopenharmony_ci
21362306a36Sopenharmony_ci	out[0] = cpu_to_le32(y);
21462306a36Sopenharmony_ci	out[1] = cpu_to_le32(z);
21562306a36Sopenharmony_ci}
21662306a36Sopenharmony_ci
21762306a36Sopenharmony_cistatic struct crypto_alg tea_algs[3] = { {
21862306a36Sopenharmony_ci	.cra_name		=	"tea",
21962306a36Sopenharmony_ci	.cra_driver_name	=	"tea-generic",
22062306a36Sopenharmony_ci	.cra_flags		=	CRYPTO_ALG_TYPE_CIPHER,
22162306a36Sopenharmony_ci	.cra_blocksize		=	TEA_BLOCK_SIZE,
22262306a36Sopenharmony_ci	.cra_ctxsize		=	sizeof (struct tea_ctx),
22362306a36Sopenharmony_ci	.cra_alignmask		=	3,
22462306a36Sopenharmony_ci	.cra_module		=	THIS_MODULE,
22562306a36Sopenharmony_ci	.cra_u			=	{ .cipher = {
22662306a36Sopenharmony_ci	.cia_min_keysize	=	TEA_KEY_SIZE,
22762306a36Sopenharmony_ci	.cia_max_keysize	=	TEA_KEY_SIZE,
22862306a36Sopenharmony_ci	.cia_setkey		= 	tea_setkey,
22962306a36Sopenharmony_ci	.cia_encrypt		=	tea_encrypt,
23062306a36Sopenharmony_ci	.cia_decrypt		=	tea_decrypt } }
23162306a36Sopenharmony_ci}, {
23262306a36Sopenharmony_ci	.cra_name		=	"xtea",
23362306a36Sopenharmony_ci	.cra_driver_name	=	"xtea-generic",
23462306a36Sopenharmony_ci	.cra_flags		=	CRYPTO_ALG_TYPE_CIPHER,
23562306a36Sopenharmony_ci	.cra_blocksize		=	XTEA_BLOCK_SIZE,
23662306a36Sopenharmony_ci	.cra_ctxsize		=	sizeof (struct xtea_ctx),
23762306a36Sopenharmony_ci	.cra_alignmask		=	3,
23862306a36Sopenharmony_ci	.cra_module		=	THIS_MODULE,
23962306a36Sopenharmony_ci	.cra_u			=	{ .cipher = {
24062306a36Sopenharmony_ci	.cia_min_keysize	=	XTEA_KEY_SIZE,
24162306a36Sopenharmony_ci	.cia_max_keysize	=	XTEA_KEY_SIZE,
24262306a36Sopenharmony_ci	.cia_setkey		= 	xtea_setkey,
24362306a36Sopenharmony_ci	.cia_encrypt		=	xtea_encrypt,
24462306a36Sopenharmony_ci	.cia_decrypt		=	xtea_decrypt } }
24562306a36Sopenharmony_ci}, {
24662306a36Sopenharmony_ci	.cra_name		=	"xeta",
24762306a36Sopenharmony_ci	.cra_driver_name	=	"xeta-generic",
24862306a36Sopenharmony_ci	.cra_flags		=	CRYPTO_ALG_TYPE_CIPHER,
24962306a36Sopenharmony_ci	.cra_blocksize		=	XTEA_BLOCK_SIZE,
25062306a36Sopenharmony_ci	.cra_ctxsize		=	sizeof (struct xtea_ctx),
25162306a36Sopenharmony_ci	.cra_alignmask		=	3,
25262306a36Sopenharmony_ci	.cra_module		=	THIS_MODULE,
25362306a36Sopenharmony_ci	.cra_u			=	{ .cipher = {
25462306a36Sopenharmony_ci	.cia_min_keysize	=	XTEA_KEY_SIZE,
25562306a36Sopenharmony_ci	.cia_max_keysize	=	XTEA_KEY_SIZE,
25662306a36Sopenharmony_ci	.cia_setkey		= 	xtea_setkey,
25762306a36Sopenharmony_ci	.cia_encrypt		=	xeta_encrypt,
25862306a36Sopenharmony_ci	.cia_decrypt		=	xeta_decrypt } }
25962306a36Sopenharmony_ci} };
26062306a36Sopenharmony_ci
26162306a36Sopenharmony_cistatic int __init tea_mod_init(void)
26262306a36Sopenharmony_ci{
26362306a36Sopenharmony_ci	return crypto_register_algs(tea_algs, ARRAY_SIZE(tea_algs));
26462306a36Sopenharmony_ci}
26562306a36Sopenharmony_ci
26662306a36Sopenharmony_cistatic void __exit tea_mod_fini(void)
26762306a36Sopenharmony_ci{
26862306a36Sopenharmony_ci	crypto_unregister_algs(tea_algs, ARRAY_SIZE(tea_algs));
26962306a36Sopenharmony_ci}
27062306a36Sopenharmony_ci
27162306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("tea");
27262306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("xtea");
27362306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("xeta");
27462306a36Sopenharmony_ci
27562306a36Sopenharmony_cisubsys_initcall(tea_mod_init);
27662306a36Sopenharmony_cimodule_exit(tea_mod_fini);
27762306a36Sopenharmony_ci
27862306a36Sopenharmony_ciMODULE_LICENSE("GPL");
27962306a36Sopenharmony_ciMODULE_DESCRIPTION("TEA, XTEA & XETA Cryptographic Algorithms");
280