mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-12-15 23:14:31 +08:00
2874c5fd28
Based on 1 normalized pattern(s): this program is free software you can redistribute it and or modify it under the terms of the gnu general public license as published by the free software foundation either version 2 of the license or at your option any later version extracted by the scancode license scanner the SPDX license identifier GPL-2.0-or-later has been chosen to replace the boilerplate/reference in 3029 file(s). Signed-off-by: Thomas Gleixner <tglx@linutronix.de> Reviewed-by: Allison Randal <allison@lohutok.net> Cc: linux-spdx@vger.kernel.org Link: https://lkml.kernel.org/r/20190527070032.746973796@linutronix.de Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
168 lines
3.3 KiB
C
168 lines
3.3 KiB
C
// SPDX-License-Identifier: GPL-2.0-or-later
|
|
/*
|
|
* Cryptographic API
|
|
*
|
|
* ARC4 Cipher Algorithm
|
|
*
|
|
* Jon Oberheide <jon@oberheide.org>
|
|
*/
|
|
|
|
#include <crypto/algapi.h>
|
|
#include <crypto/arc4.h>
|
|
#include <crypto/internal/skcipher.h>
|
|
#include <linux/init.h>
|
|
#include <linux/module.h>
|
|
|
|
struct arc4_ctx {
|
|
u32 S[256];
|
|
u32 x, y;
|
|
};
|
|
|
|
static int arc4_set_key(struct crypto_tfm *tfm, const u8 *in_key,
|
|
unsigned int key_len)
|
|
{
|
|
struct arc4_ctx *ctx = crypto_tfm_ctx(tfm);
|
|
int i, j = 0, k = 0;
|
|
|
|
ctx->x = 1;
|
|
ctx->y = 0;
|
|
|
|
for (i = 0; i < 256; i++)
|
|
ctx->S[i] = i;
|
|
|
|
for (i = 0; i < 256; i++) {
|
|
u32 a = ctx->S[i];
|
|
j = (j + in_key[k] + a) & 0xff;
|
|
ctx->S[i] = ctx->S[j];
|
|
ctx->S[j] = a;
|
|
if (++k >= key_len)
|
|
k = 0;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int arc4_set_key_skcipher(struct crypto_skcipher *tfm, const u8 *in_key,
|
|
unsigned int key_len)
|
|
{
|
|
return arc4_set_key(&tfm->base, in_key, key_len);
|
|
}
|
|
|
|
static void arc4_crypt(struct arc4_ctx *ctx, u8 *out, const u8 *in,
|
|
unsigned int len)
|
|
{
|
|
u32 *const S = ctx->S;
|
|
u32 x, y, a, b;
|
|
u32 ty, ta, tb;
|
|
|
|
if (len == 0)
|
|
return;
|
|
|
|
x = ctx->x;
|
|
y = ctx->y;
|
|
|
|
a = S[x];
|
|
y = (y + a) & 0xff;
|
|
b = S[y];
|
|
|
|
do {
|
|
S[y] = a;
|
|
a = (a + b) & 0xff;
|
|
S[x] = b;
|
|
x = (x + 1) & 0xff;
|
|
ta = S[x];
|
|
ty = (y + ta) & 0xff;
|
|
tb = S[ty];
|
|
*out++ = *in++ ^ S[a];
|
|
if (--len == 0)
|
|
break;
|
|
y = ty;
|
|
a = ta;
|
|
b = tb;
|
|
} while (true);
|
|
|
|
ctx->x = x;
|
|
ctx->y = y;
|
|
}
|
|
|
|
static void arc4_crypt_one(struct crypto_tfm *tfm, u8 *out, const u8 *in)
|
|
{
|
|
arc4_crypt(crypto_tfm_ctx(tfm), out, in, 1);
|
|
}
|
|
|
|
static int ecb_arc4_crypt(struct skcipher_request *req)
|
|
{
|
|
struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
|
|
struct arc4_ctx *ctx = crypto_skcipher_ctx(tfm);
|
|
struct skcipher_walk walk;
|
|
int err;
|
|
|
|
err = skcipher_walk_virt(&walk, req, false);
|
|
|
|
while (walk.nbytes > 0) {
|
|
arc4_crypt(ctx, walk.dst.virt.addr, walk.src.virt.addr,
|
|
walk.nbytes);
|
|
err = skcipher_walk_done(&walk, 0);
|
|
}
|
|
|
|
return err;
|
|
}
|
|
|
|
static struct crypto_alg arc4_cipher = {
|
|
.cra_name = "arc4",
|
|
.cra_flags = CRYPTO_ALG_TYPE_CIPHER,
|
|
.cra_blocksize = ARC4_BLOCK_SIZE,
|
|
.cra_ctxsize = sizeof(struct arc4_ctx),
|
|
.cra_module = THIS_MODULE,
|
|
.cra_u = {
|
|
.cipher = {
|
|
.cia_min_keysize = ARC4_MIN_KEY_SIZE,
|
|
.cia_max_keysize = ARC4_MAX_KEY_SIZE,
|
|
.cia_setkey = arc4_set_key,
|
|
.cia_encrypt = arc4_crypt_one,
|
|
.cia_decrypt = arc4_crypt_one,
|
|
},
|
|
},
|
|
};
|
|
|
|
static struct skcipher_alg arc4_skcipher = {
|
|
.base.cra_name = "ecb(arc4)",
|
|
.base.cra_priority = 100,
|
|
.base.cra_blocksize = ARC4_BLOCK_SIZE,
|
|
.base.cra_ctxsize = sizeof(struct arc4_ctx),
|
|
.base.cra_module = THIS_MODULE,
|
|
.min_keysize = ARC4_MIN_KEY_SIZE,
|
|
.max_keysize = ARC4_MAX_KEY_SIZE,
|
|
.setkey = arc4_set_key_skcipher,
|
|
.encrypt = ecb_arc4_crypt,
|
|
.decrypt = ecb_arc4_crypt,
|
|
};
|
|
|
|
static int __init arc4_init(void)
|
|
{
|
|
int err;
|
|
|
|
err = crypto_register_alg(&arc4_cipher);
|
|
if (err)
|
|
return err;
|
|
|
|
err = crypto_register_skcipher(&arc4_skcipher);
|
|
if (err)
|
|
crypto_unregister_alg(&arc4_cipher);
|
|
return err;
|
|
}
|
|
|
|
static void __exit arc4_exit(void)
|
|
{
|
|
crypto_unregister_alg(&arc4_cipher);
|
|
crypto_unregister_skcipher(&arc4_skcipher);
|
|
}
|
|
|
|
subsys_initcall(arc4_init);
|
|
module_exit(arc4_exit);
|
|
|
|
MODULE_LICENSE("GPL");
|
|
MODULE_DESCRIPTION("ARC4 Cipher Algorithm");
|
|
MODULE_AUTHOR("Jon Oberheide <jon@oberheide.org>");
|
|
MODULE_ALIAS_CRYPTO("arc4");
|