mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-11-24 10:34:57 +08:00
14386d4713
The helper crypto_tfm_ctx is only used by the Crypto API algorithm code and should really be in algapi.h. However, for historical reasons many files relied on it to be in crypto.h. This patch changes those files to use algapi.h instead in prepartion for a move. Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
93 lines
2.1 KiB
C
93 lines
2.1 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
|
|
/*
|
|
* SM4 Cipher Algorithm.
|
|
*
|
|
* Copyright (C) 2018 ARM Limited or its affiliates.
|
|
* All rights reserved.
|
|
*/
|
|
|
|
#include <crypto/algapi.h>
|
|
#include <crypto/sm4.h>
|
|
#include <linux/module.h>
|
|
#include <linux/init.h>
|
|
#include <linux/types.h>
|
|
#include <linux/errno.h>
|
|
#include <asm/byteorder.h>
|
|
#include <asm/unaligned.h>
|
|
|
|
/**
|
|
* sm4_setkey - Set the SM4 key.
|
|
* @tfm: The %crypto_tfm that is used in the context.
|
|
* @in_key: The input key.
|
|
* @key_len: The size of the key.
|
|
*
|
|
* This function uses sm4_expandkey() to expand the key.
|
|
* &sm4_ctx _must_ be the private data embedded in @tfm which is
|
|
* retrieved with crypto_tfm_ctx().
|
|
*
|
|
* Return: 0 on success; -EINVAL on failure (only happens for bad key lengths)
|
|
*/
|
|
static int sm4_setkey(struct crypto_tfm *tfm, const u8 *in_key,
|
|
unsigned int key_len)
|
|
{
|
|
struct sm4_ctx *ctx = crypto_tfm_ctx(tfm);
|
|
|
|
return sm4_expandkey(ctx, in_key, key_len);
|
|
}
|
|
|
|
/* encrypt a block of text */
|
|
|
|
static void sm4_encrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in)
|
|
{
|
|
const struct sm4_ctx *ctx = crypto_tfm_ctx(tfm);
|
|
|
|
sm4_crypt_block(ctx->rkey_enc, out, in);
|
|
}
|
|
|
|
/* decrypt a block of text */
|
|
|
|
static void sm4_decrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in)
|
|
{
|
|
const struct sm4_ctx *ctx = crypto_tfm_ctx(tfm);
|
|
|
|
sm4_crypt_block(ctx->rkey_dec, out, in);
|
|
}
|
|
|
|
static struct crypto_alg sm4_alg = {
|
|
.cra_name = "sm4",
|
|
.cra_driver_name = "sm4-generic",
|
|
.cra_priority = 100,
|
|
.cra_flags = CRYPTO_ALG_TYPE_CIPHER,
|
|
.cra_blocksize = SM4_BLOCK_SIZE,
|
|
.cra_ctxsize = sizeof(struct sm4_ctx),
|
|
.cra_module = THIS_MODULE,
|
|
.cra_u = {
|
|
.cipher = {
|
|
.cia_min_keysize = SM4_KEY_SIZE,
|
|
.cia_max_keysize = SM4_KEY_SIZE,
|
|
.cia_setkey = sm4_setkey,
|
|
.cia_encrypt = sm4_encrypt,
|
|
.cia_decrypt = sm4_decrypt
|
|
}
|
|
}
|
|
};
|
|
|
|
static int __init sm4_init(void)
|
|
{
|
|
return crypto_register_alg(&sm4_alg);
|
|
}
|
|
|
|
static void __exit sm4_fini(void)
|
|
{
|
|
crypto_unregister_alg(&sm4_alg);
|
|
}
|
|
|
|
subsys_initcall(sm4_init);
|
|
module_exit(sm4_fini);
|
|
|
|
MODULE_DESCRIPTION("SM4 Cipher Algorithm");
|
|
MODULE_LICENSE("GPL v2");
|
|
MODULE_ALIAS_CRYPTO("sm4");
|
|
MODULE_ALIAS_CRYPTO("sm4-generic");
|