162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * Cryptographic API. 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * TEA, XTEA, and XETA crypto alogrithms 662306a36Sopenharmony_ci * 762306a36Sopenharmony_ci * The TEA and Xtended TEA algorithms were developed by David Wheeler 862306a36Sopenharmony_ci * and Roger Needham at the Computer Laboratory of Cambridge University. 962306a36Sopenharmony_ci * 1062306a36Sopenharmony_ci * Due to the order of evaluation in XTEA many people have incorrectly 1162306a36Sopenharmony_ci * implemented it. XETA (XTEA in the wrong order), exists for 1262306a36Sopenharmony_ci * compatibility with these implementations. 1362306a36Sopenharmony_ci * 1462306a36Sopenharmony_ci * Copyright (c) 2004 Aaron Grothe ajgrothe@yahoo.com 1562306a36Sopenharmony_ci */ 1662306a36Sopenharmony_ci 1762306a36Sopenharmony_ci#include <crypto/algapi.h> 1862306a36Sopenharmony_ci#include <linux/init.h> 1962306a36Sopenharmony_ci#include <linux/module.h> 2062306a36Sopenharmony_ci#include <linux/mm.h> 2162306a36Sopenharmony_ci#include <asm/byteorder.h> 2262306a36Sopenharmony_ci#include <linux/types.h> 2362306a36Sopenharmony_ci 2462306a36Sopenharmony_ci#define TEA_KEY_SIZE 16 2562306a36Sopenharmony_ci#define TEA_BLOCK_SIZE 8 2662306a36Sopenharmony_ci#define TEA_ROUNDS 32 2762306a36Sopenharmony_ci#define TEA_DELTA 0x9e3779b9 2862306a36Sopenharmony_ci 2962306a36Sopenharmony_ci#define XTEA_KEY_SIZE 16 3062306a36Sopenharmony_ci#define XTEA_BLOCK_SIZE 8 3162306a36Sopenharmony_ci#define XTEA_ROUNDS 32 3262306a36Sopenharmony_ci#define XTEA_DELTA 0x9e3779b9 3362306a36Sopenharmony_ci 3462306a36Sopenharmony_cistruct tea_ctx { 3562306a36Sopenharmony_ci u32 KEY[4]; 3662306a36Sopenharmony_ci}; 3762306a36Sopenharmony_ci 3862306a36Sopenharmony_cistruct xtea_ctx { 3962306a36Sopenharmony_ci u32 KEY[4]; 4062306a36Sopenharmony_ci}; 4162306a36Sopenharmony_ci 4262306a36Sopenharmony_cistatic int tea_setkey(struct crypto_tfm *tfm, const u8 *in_key, 4362306a36Sopenharmony_ci unsigned int key_len) 4462306a36Sopenharmony_ci{ 4562306a36Sopenharmony_ci struct tea_ctx *ctx = crypto_tfm_ctx(tfm); 4662306a36Sopenharmony_ci const __le32 *key = (const __le32 *)in_key; 4762306a36Sopenharmony_ci 4862306a36Sopenharmony_ci ctx->KEY[0] = le32_to_cpu(key[0]); 4962306a36Sopenharmony_ci ctx->KEY[1] = le32_to_cpu(key[1]); 5062306a36Sopenharmony_ci ctx->KEY[2] = le32_to_cpu(key[2]); 5162306a36Sopenharmony_ci ctx->KEY[3] = le32_to_cpu(key[3]); 5262306a36Sopenharmony_ci 5362306a36Sopenharmony_ci return 0; 5462306a36Sopenharmony_ci 5562306a36Sopenharmony_ci} 5662306a36Sopenharmony_ci 5762306a36Sopenharmony_cistatic void tea_encrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src) 5862306a36Sopenharmony_ci{ 5962306a36Sopenharmony_ci u32 y, z, n, sum = 0; 6062306a36Sopenharmony_ci u32 k0, k1, k2, k3; 6162306a36Sopenharmony_ci struct tea_ctx *ctx = crypto_tfm_ctx(tfm); 6262306a36Sopenharmony_ci const __le32 *in = (const __le32 *)src; 6362306a36Sopenharmony_ci __le32 *out = (__le32 *)dst; 6462306a36Sopenharmony_ci 6562306a36Sopenharmony_ci y = le32_to_cpu(in[0]); 6662306a36Sopenharmony_ci z = le32_to_cpu(in[1]); 6762306a36Sopenharmony_ci 6862306a36Sopenharmony_ci k0 = ctx->KEY[0]; 6962306a36Sopenharmony_ci k1 = ctx->KEY[1]; 7062306a36Sopenharmony_ci k2 = ctx->KEY[2]; 7162306a36Sopenharmony_ci k3 = ctx->KEY[3]; 7262306a36Sopenharmony_ci 7362306a36Sopenharmony_ci n = TEA_ROUNDS; 7462306a36Sopenharmony_ci 7562306a36Sopenharmony_ci while (n-- > 0) { 7662306a36Sopenharmony_ci sum += TEA_DELTA; 7762306a36Sopenharmony_ci y += ((z << 4) + k0) ^ (z + sum) ^ ((z >> 5) + k1); 7862306a36Sopenharmony_ci z += ((y << 4) + k2) ^ (y + sum) ^ ((y >> 5) + k3); 7962306a36Sopenharmony_ci } 8062306a36Sopenharmony_ci 8162306a36Sopenharmony_ci out[0] = cpu_to_le32(y); 8262306a36Sopenharmony_ci out[1] = cpu_to_le32(z); 8362306a36Sopenharmony_ci} 8462306a36Sopenharmony_ci 8562306a36Sopenharmony_cistatic void tea_decrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src) 8662306a36Sopenharmony_ci{ 8762306a36Sopenharmony_ci u32 y, z, n, sum; 8862306a36Sopenharmony_ci u32 k0, k1, k2, k3; 8962306a36Sopenharmony_ci struct tea_ctx *ctx = crypto_tfm_ctx(tfm); 9062306a36Sopenharmony_ci const __le32 *in = (const __le32 *)src; 9162306a36Sopenharmony_ci __le32 *out = (__le32 *)dst; 9262306a36Sopenharmony_ci 9362306a36Sopenharmony_ci y = le32_to_cpu(in[0]); 9462306a36Sopenharmony_ci z = le32_to_cpu(in[1]); 9562306a36Sopenharmony_ci 9662306a36Sopenharmony_ci k0 = ctx->KEY[0]; 9762306a36Sopenharmony_ci k1 = ctx->KEY[1]; 9862306a36Sopenharmony_ci k2 = ctx->KEY[2]; 9962306a36Sopenharmony_ci k3 = ctx->KEY[3]; 10062306a36Sopenharmony_ci 10162306a36Sopenharmony_ci sum = TEA_DELTA << 5; 10262306a36Sopenharmony_ci 10362306a36Sopenharmony_ci n = TEA_ROUNDS; 10462306a36Sopenharmony_ci 10562306a36Sopenharmony_ci while (n-- > 0) { 10662306a36Sopenharmony_ci z -= ((y << 4) + k2) ^ (y + sum) ^ ((y >> 5) + k3); 10762306a36Sopenharmony_ci y -= ((z << 4) + k0) ^ (z + sum) ^ ((z >> 5) + k1); 10862306a36Sopenharmony_ci sum -= TEA_DELTA; 10962306a36Sopenharmony_ci } 11062306a36Sopenharmony_ci 11162306a36Sopenharmony_ci out[0] = cpu_to_le32(y); 11262306a36Sopenharmony_ci out[1] = cpu_to_le32(z); 11362306a36Sopenharmony_ci} 11462306a36Sopenharmony_ci 11562306a36Sopenharmony_cistatic int xtea_setkey(struct crypto_tfm *tfm, const u8 *in_key, 11662306a36Sopenharmony_ci unsigned int key_len) 11762306a36Sopenharmony_ci{ 11862306a36Sopenharmony_ci struct xtea_ctx *ctx = crypto_tfm_ctx(tfm); 11962306a36Sopenharmony_ci const __le32 *key = (const __le32 *)in_key; 12062306a36Sopenharmony_ci 12162306a36Sopenharmony_ci ctx->KEY[0] = le32_to_cpu(key[0]); 12262306a36Sopenharmony_ci ctx->KEY[1] = le32_to_cpu(key[1]); 12362306a36Sopenharmony_ci ctx->KEY[2] = le32_to_cpu(key[2]); 12462306a36Sopenharmony_ci ctx->KEY[3] = le32_to_cpu(key[3]); 12562306a36Sopenharmony_ci 12662306a36Sopenharmony_ci return 0; 12762306a36Sopenharmony_ci 12862306a36Sopenharmony_ci} 12962306a36Sopenharmony_ci 13062306a36Sopenharmony_cistatic void xtea_encrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src) 13162306a36Sopenharmony_ci{ 13262306a36Sopenharmony_ci u32 y, z, sum = 0; 13362306a36Sopenharmony_ci u32 limit = XTEA_DELTA * XTEA_ROUNDS; 13462306a36Sopenharmony_ci struct xtea_ctx *ctx = crypto_tfm_ctx(tfm); 13562306a36Sopenharmony_ci const __le32 *in = (const __le32 *)src; 13662306a36Sopenharmony_ci __le32 *out = (__le32 *)dst; 13762306a36Sopenharmony_ci 13862306a36Sopenharmony_ci y = le32_to_cpu(in[0]); 13962306a36Sopenharmony_ci z = le32_to_cpu(in[1]); 14062306a36Sopenharmony_ci 14162306a36Sopenharmony_ci while (sum != limit) { 14262306a36Sopenharmony_ci y += ((z << 4 ^ z >> 5) + z) ^ (sum + ctx->KEY[sum&3]); 14362306a36Sopenharmony_ci sum += XTEA_DELTA; 14462306a36Sopenharmony_ci z += ((y << 4 ^ y >> 5) + y) ^ (sum + ctx->KEY[sum>>11 &3]); 14562306a36Sopenharmony_ci } 14662306a36Sopenharmony_ci 14762306a36Sopenharmony_ci out[0] = cpu_to_le32(y); 14862306a36Sopenharmony_ci out[1] = cpu_to_le32(z); 14962306a36Sopenharmony_ci} 15062306a36Sopenharmony_ci 15162306a36Sopenharmony_cistatic void xtea_decrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src) 15262306a36Sopenharmony_ci{ 15362306a36Sopenharmony_ci u32 y, z, sum; 15462306a36Sopenharmony_ci struct tea_ctx *ctx = crypto_tfm_ctx(tfm); 15562306a36Sopenharmony_ci const __le32 *in = (const __le32 *)src; 15662306a36Sopenharmony_ci __le32 *out = (__le32 *)dst; 15762306a36Sopenharmony_ci 15862306a36Sopenharmony_ci y = le32_to_cpu(in[0]); 15962306a36Sopenharmony_ci z = le32_to_cpu(in[1]); 16062306a36Sopenharmony_ci 16162306a36Sopenharmony_ci sum = XTEA_DELTA * XTEA_ROUNDS; 16262306a36Sopenharmony_ci 16362306a36Sopenharmony_ci while (sum) { 16462306a36Sopenharmony_ci z -= ((y << 4 ^ y >> 5) + y) ^ (sum + ctx->KEY[sum>>11 & 3]); 16562306a36Sopenharmony_ci sum -= XTEA_DELTA; 16662306a36Sopenharmony_ci y -= ((z << 4 ^ z >> 5) + z) ^ (sum + ctx->KEY[sum & 3]); 16762306a36Sopenharmony_ci } 16862306a36Sopenharmony_ci 16962306a36Sopenharmony_ci out[0] = cpu_to_le32(y); 17062306a36Sopenharmony_ci out[1] = cpu_to_le32(z); 17162306a36Sopenharmony_ci} 17262306a36Sopenharmony_ci 17362306a36Sopenharmony_ci 17462306a36Sopenharmony_cistatic void xeta_encrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src) 17562306a36Sopenharmony_ci{ 17662306a36Sopenharmony_ci u32 y, z, sum = 0; 17762306a36Sopenharmony_ci u32 limit = XTEA_DELTA * XTEA_ROUNDS; 17862306a36Sopenharmony_ci struct xtea_ctx *ctx = crypto_tfm_ctx(tfm); 17962306a36Sopenharmony_ci const __le32 *in = (const __le32 *)src; 18062306a36Sopenharmony_ci __le32 *out = (__le32 *)dst; 18162306a36Sopenharmony_ci 18262306a36Sopenharmony_ci y = le32_to_cpu(in[0]); 18362306a36Sopenharmony_ci z = le32_to_cpu(in[1]); 18462306a36Sopenharmony_ci 18562306a36Sopenharmony_ci while (sum != limit) { 18662306a36Sopenharmony_ci y += (z << 4 ^ z >> 5) + (z ^ sum) + ctx->KEY[sum&3]; 18762306a36Sopenharmony_ci sum += XTEA_DELTA; 18862306a36Sopenharmony_ci z += (y << 4 ^ y >> 5) + (y ^ sum) + ctx->KEY[sum>>11 &3]; 18962306a36Sopenharmony_ci } 19062306a36Sopenharmony_ci 19162306a36Sopenharmony_ci out[0] = cpu_to_le32(y); 19262306a36Sopenharmony_ci out[1] = cpu_to_le32(z); 19362306a36Sopenharmony_ci} 19462306a36Sopenharmony_ci 19562306a36Sopenharmony_cistatic void xeta_decrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src) 19662306a36Sopenharmony_ci{ 19762306a36Sopenharmony_ci u32 y, z, sum; 19862306a36Sopenharmony_ci struct tea_ctx *ctx = crypto_tfm_ctx(tfm); 19962306a36Sopenharmony_ci const __le32 *in = (const __le32 *)src; 20062306a36Sopenharmony_ci __le32 *out = (__le32 *)dst; 20162306a36Sopenharmony_ci 20262306a36Sopenharmony_ci y = le32_to_cpu(in[0]); 20362306a36Sopenharmony_ci z = le32_to_cpu(in[1]); 20462306a36Sopenharmony_ci 20562306a36Sopenharmony_ci sum = XTEA_DELTA * XTEA_ROUNDS; 20662306a36Sopenharmony_ci 20762306a36Sopenharmony_ci while (sum) { 20862306a36Sopenharmony_ci z -= (y << 4 ^ y >> 5) + (y ^ sum) + ctx->KEY[sum>>11 & 3]; 20962306a36Sopenharmony_ci sum -= XTEA_DELTA; 21062306a36Sopenharmony_ci y -= (z << 4 ^ z >> 5) + (z ^ sum) + ctx->KEY[sum & 3]; 21162306a36Sopenharmony_ci } 21262306a36Sopenharmony_ci 21362306a36Sopenharmony_ci out[0] = cpu_to_le32(y); 21462306a36Sopenharmony_ci out[1] = cpu_to_le32(z); 21562306a36Sopenharmony_ci} 21662306a36Sopenharmony_ci 21762306a36Sopenharmony_cistatic struct crypto_alg tea_algs[3] = { { 21862306a36Sopenharmony_ci .cra_name = "tea", 21962306a36Sopenharmony_ci .cra_driver_name = "tea-generic", 22062306a36Sopenharmony_ci .cra_flags = CRYPTO_ALG_TYPE_CIPHER, 22162306a36Sopenharmony_ci .cra_blocksize = TEA_BLOCK_SIZE, 22262306a36Sopenharmony_ci .cra_ctxsize = sizeof (struct tea_ctx), 22362306a36Sopenharmony_ci .cra_alignmask = 3, 22462306a36Sopenharmony_ci .cra_module = THIS_MODULE, 22562306a36Sopenharmony_ci .cra_u = { .cipher = { 22662306a36Sopenharmony_ci .cia_min_keysize = TEA_KEY_SIZE, 22762306a36Sopenharmony_ci .cia_max_keysize = TEA_KEY_SIZE, 22862306a36Sopenharmony_ci .cia_setkey = tea_setkey, 22962306a36Sopenharmony_ci .cia_encrypt = tea_encrypt, 23062306a36Sopenharmony_ci .cia_decrypt = tea_decrypt } } 23162306a36Sopenharmony_ci}, { 23262306a36Sopenharmony_ci .cra_name = "xtea", 23362306a36Sopenharmony_ci .cra_driver_name = "xtea-generic", 23462306a36Sopenharmony_ci .cra_flags = CRYPTO_ALG_TYPE_CIPHER, 23562306a36Sopenharmony_ci .cra_blocksize = XTEA_BLOCK_SIZE, 23662306a36Sopenharmony_ci .cra_ctxsize = sizeof (struct xtea_ctx), 23762306a36Sopenharmony_ci .cra_alignmask = 3, 23862306a36Sopenharmony_ci .cra_module = THIS_MODULE, 23962306a36Sopenharmony_ci .cra_u = { .cipher = { 24062306a36Sopenharmony_ci .cia_min_keysize = XTEA_KEY_SIZE, 24162306a36Sopenharmony_ci .cia_max_keysize = XTEA_KEY_SIZE, 24262306a36Sopenharmony_ci .cia_setkey = xtea_setkey, 24362306a36Sopenharmony_ci .cia_encrypt = xtea_encrypt, 24462306a36Sopenharmony_ci .cia_decrypt = xtea_decrypt } } 24562306a36Sopenharmony_ci}, { 24662306a36Sopenharmony_ci .cra_name = "xeta", 24762306a36Sopenharmony_ci .cra_driver_name = "xeta-generic", 24862306a36Sopenharmony_ci .cra_flags = CRYPTO_ALG_TYPE_CIPHER, 24962306a36Sopenharmony_ci .cra_blocksize = XTEA_BLOCK_SIZE, 25062306a36Sopenharmony_ci .cra_ctxsize = sizeof (struct xtea_ctx), 25162306a36Sopenharmony_ci .cra_alignmask = 3, 25262306a36Sopenharmony_ci .cra_module = THIS_MODULE, 25362306a36Sopenharmony_ci .cra_u = { .cipher = { 25462306a36Sopenharmony_ci .cia_min_keysize = XTEA_KEY_SIZE, 25562306a36Sopenharmony_ci .cia_max_keysize = XTEA_KEY_SIZE, 25662306a36Sopenharmony_ci .cia_setkey = xtea_setkey, 25762306a36Sopenharmony_ci .cia_encrypt = xeta_encrypt, 25862306a36Sopenharmony_ci .cia_decrypt = xeta_decrypt } } 25962306a36Sopenharmony_ci} }; 26062306a36Sopenharmony_ci 26162306a36Sopenharmony_cistatic int __init tea_mod_init(void) 26262306a36Sopenharmony_ci{ 26362306a36Sopenharmony_ci return crypto_register_algs(tea_algs, ARRAY_SIZE(tea_algs)); 26462306a36Sopenharmony_ci} 26562306a36Sopenharmony_ci 26662306a36Sopenharmony_cistatic void __exit tea_mod_fini(void) 26762306a36Sopenharmony_ci{ 26862306a36Sopenharmony_ci crypto_unregister_algs(tea_algs, ARRAY_SIZE(tea_algs)); 26962306a36Sopenharmony_ci} 27062306a36Sopenharmony_ci 27162306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("tea"); 27262306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("xtea"); 27362306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("xeta"); 27462306a36Sopenharmony_ci 27562306a36Sopenharmony_cisubsys_initcall(tea_mod_init); 27662306a36Sopenharmony_cimodule_exit(tea_mod_fini); 27762306a36Sopenharmony_ci 27862306a36Sopenharmony_ciMODULE_LICENSE("GPL"); 27962306a36Sopenharmony_ciMODULE_DESCRIPTION("TEA, XTEA & XETA Cryptographic Algorithms"); 280