xref: /openbmc/linux/crypto/tea.c (revision 14386d47)
12874c5fdSThomas Gleixner // SPDX-License-Identifier: GPL-2.0-or-later
21da177e4SLinus Torvalds /*
31da177e4SLinus Torvalds  * Cryptographic API.
41da177e4SLinus Torvalds  *
5fb4f10edSAaron Grothe  * TEA, XTEA, and XETA crypto alogrithms
61da177e4SLinus Torvalds  *
71da177e4SLinus Torvalds  * The TEA and Xtended TEA algorithms were developed by David Wheeler
81da177e4SLinus Torvalds  * and Roger Needham at the Computer Laboratory of Cambridge University.
91da177e4SLinus Torvalds  *
10fb4f10edSAaron Grothe  * Due to the order of evaluation in XTEA many people have incorrectly
11fb4f10edSAaron Grothe  * implemented it.  XETA (XTEA in the wrong order), exists for
12fb4f10edSAaron Grothe  * compatibility with these implementations.
13fb4f10edSAaron Grothe  *
141da177e4SLinus Torvalds  * Copyright (c) 2004 Aaron Grothe ajgrothe@yahoo.com
151da177e4SLinus Torvalds  */
161da177e4SLinus Torvalds 
17*14386d47SHerbert Xu #include <crypto/algapi.h>
181da177e4SLinus Torvalds #include <linux/init.h>
191da177e4SLinus Torvalds #include <linux/module.h>
201da177e4SLinus Torvalds #include <linux/mm.h>
2106ace7a9SHerbert Xu #include <asm/byteorder.h>
2206ace7a9SHerbert Xu #include <linux/types.h>
231da177e4SLinus Torvalds 
241da177e4SLinus Torvalds #define TEA_KEY_SIZE		16
251da177e4SLinus Torvalds #define TEA_BLOCK_SIZE		8
261da177e4SLinus Torvalds #define TEA_ROUNDS		32
271da177e4SLinus Torvalds #define TEA_DELTA		0x9e3779b9
281da177e4SLinus Torvalds 
291da177e4SLinus Torvalds #define XTEA_KEY_SIZE		16
301da177e4SLinus Torvalds #define XTEA_BLOCK_SIZE		8
311da177e4SLinus Torvalds #define XTEA_ROUNDS		32
321da177e4SLinus Torvalds #define XTEA_DELTA		0x9e3779b9
331da177e4SLinus Torvalds 
341da177e4SLinus Torvalds struct tea_ctx {
351da177e4SLinus Torvalds 	u32 KEY[4];
361da177e4SLinus Torvalds };
371da177e4SLinus Torvalds 
381da177e4SLinus Torvalds struct xtea_ctx {
391da177e4SLinus Torvalds 	u32 KEY[4];
401da177e4SLinus Torvalds };
411da177e4SLinus Torvalds 
tea_setkey(struct crypto_tfm * tfm,const u8 * in_key,unsigned int key_len)426c2bb98bSHerbert Xu static int tea_setkey(struct crypto_tfm *tfm, const u8 *in_key,
43560c06aeSHerbert Xu 		      unsigned int key_len)
441da177e4SLinus Torvalds {
456c2bb98bSHerbert Xu 	struct tea_ctx *ctx = crypto_tfm_ctx(tfm);
4606ace7a9SHerbert Xu 	const __le32 *key = (const __le32 *)in_key;
471da177e4SLinus Torvalds 
4806ace7a9SHerbert Xu 	ctx->KEY[0] = le32_to_cpu(key[0]);
4906ace7a9SHerbert Xu 	ctx->KEY[1] = le32_to_cpu(key[1]);
5006ace7a9SHerbert Xu 	ctx->KEY[2] = le32_to_cpu(key[2]);
5106ace7a9SHerbert Xu 	ctx->KEY[3] = le32_to_cpu(key[3]);
521da177e4SLinus Torvalds 
531da177e4SLinus Torvalds 	return 0;
541da177e4SLinus Torvalds 
551da177e4SLinus Torvalds }
561da177e4SLinus Torvalds 
tea_encrypt(struct crypto_tfm * tfm,u8 * dst,const u8 * src)576c2bb98bSHerbert Xu static void tea_encrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src)
581da177e4SLinus Torvalds {
591da177e4SLinus Torvalds 	u32 y, z, n, sum = 0;
601da177e4SLinus Torvalds 	u32 k0, k1, k2, k3;
616c2bb98bSHerbert Xu 	struct tea_ctx *ctx = crypto_tfm_ctx(tfm);
6206ace7a9SHerbert Xu 	const __le32 *in = (const __le32 *)src;
6306ace7a9SHerbert Xu 	__le32 *out = (__le32 *)dst;
641da177e4SLinus Torvalds 
6506ace7a9SHerbert Xu 	y = le32_to_cpu(in[0]);
6606ace7a9SHerbert Xu 	z = le32_to_cpu(in[1]);
671da177e4SLinus Torvalds 
681da177e4SLinus Torvalds 	k0 = ctx->KEY[0];
691da177e4SLinus Torvalds 	k1 = ctx->KEY[1];
701da177e4SLinus Torvalds 	k2 = ctx->KEY[2];
711da177e4SLinus Torvalds 	k3 = ctx->KEY[3];
721da177e4SLinus Torvalds 
731da177e4SLinus Torvalds 	n = TEA_ROUNDS;
741da177e4SLinus Torvalds 
751da177e4SLinus Torvalds 	while (n-- > 0) {
761da177e4SLinus Torvalds 		sum += TEA_DELTA;
771da177e4SLinus Torvalds 		y += ((z << 4) + k0) ^ (z + sum) ^ ((z >> 5) + k1);
781da177e4SLinus Torvalds 		z += ((y << 4) + k2) ^ (y + sum) ^ ((y >> 5) + k3);
791da177e4SLinus Torvalds 	}
801da177e4SLinus Torvalds 
8106ace7a9SHerbert Xu 	out[0] = cpu_to_le32(y);
8206ace7a9SHerbert Xu 	out[1] = cpu_to_le32(z);
831da177e4SLinus Torvalds }
841da177e4SLinus Torvalds 
tea_decrypt(struct crypto_tfm * tfm,u8 * dst,const u8 * src)856c2bb98bSHerbert Xu static void tea_decrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src)
861da177e4SLinus Torvalds {
871da177e4SLinus Torvalds 	u32 y, z, n, sum;
881da177e4SLinus Torvalds 	u32 k0, k1, k2, k3;
896c2bb98bSHerbert Xu 	struct tea_ctx *ctx = crypto_tfm_ctx(tfm);
9006ace7a9SHerbert Xu 	const __le32 *in = (const __le32 *)src;
9106ace7a9SHerbert Xu 	__le32 *out = (__le32 *)dst;
921da177e4SLinus Torvalds 
9306ace7a9SHerbert Xu 	y = le32_to_cpu(in[0]);
9406ace7a9SHerbert Xu 	z = le32_to_cpu(in[1]);
951da177e4SLinus Torvalds 
961da177e4SLinus Torvalds 	k0 = ctx->KEY[0];
971da177e4SLinus Torvalds 	k1 = ctx->KEY[1];
981da177e4SLinus Torvalds 	k2 = ctx->KEY[2];
991da177e4SLinus Torvalds 	k3 = ctx->KEY[3];
1001da177e4SLinus Torvalds 
1011da177e4SLinus Torvalds 	sum = TEA_DELTA << 5;
1021da177e4SLinus Torvalds 
1031da177e4SLinus Torvalds 	n = TEA_ROUNDS;
1041da177e4SLinus Torvalds 
1051da177e4SLinus Torvalds 	while (n-- > 0) {
1061da177e4SLinus Torvalds 		z -= ((y << 4) + k2) ^ (y + sum) ^ ((y >> 5) + k3);
1071da177e4SLinus Torvalds 		y -= ((z << 4) + k0) ^ (z + sum) ^ ((z >> 5) + k1);
1081da177e4SLinus Torvalds 		sum -= TEA_DELTA;
1091da177e4SLinus Torvalds 	}
1101da177e4SLinus Torvalds 
11106ace7a9SHerbert Xu 	out[0] = cpu_to_le32(y);
11206ace7a9SHerbert Xu 	out[1] = cpu_to_le32(z);
1131da177e4SLinus Torvalds }
1141da177e4SLinus Torvalds 
xtea_setkey(struct crypto_tfm * tfm,const u8 * in_key,unsigned int key_len)1156c2bb98bSHerbert Xu static int xtea_setkey(struct crypto_tfm *tfm, const u8 *in_key,
116560c06aeSHerbert Xu 		       unsigned int key_len)
1171da177e4SLinus Torvalds {
1186c2bb98bSHerbert Xu 	struct xtea_ctx *ctx = crypto_tfm_ctx(tfm);
11906ace7a9SHerbert Xu 	const __le32 *key = (const __le32 *)in_key;
1201da177e4SLinus Torvalds 
12106ace7a9SHerbert Xu 	ctx->KEY[0] = le32_to_cpu(key[0]);
12206ace7a9SHerbert Xu 	ctx->KEY[1] = le32_to_cpu(key[1]);
12306ace7a9SHerbert Xu 	ctx->KEY[2] = le32_to_cpu(key[2]);
12406ace7a9SHerbert Xu 	ctx->KEY[3] = le32_to_cpu(key[3]);
1251da177e4SLinus Torvalds 
1261da177e4SLinus Torvalds 	return 0;
1271da177e4SLinus Torvalds 
1281da177e4SLinus Torvalds }
1291da177e4SLinus Torvalds 
xtea_encrypt(struct crypto_tfm * tfm,u8 * dst,const u8 * src)1306c2bb98bSHerbert Xu static void xtea_encrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src)
1311da177e4SLinus Torvalds {
1321da177e4SLinus Torvalds 	u32 y, z, sum = 0;
1331da177e4SLinus Torvalds 	u32 limit = XTEA_DELTA * XTEA_ROUNDS;
1346c2bb98bSHerbert Xu 	struct xtea_ctx *ctx = crypto_tfm_ctx(tfm);
13506ace7a9SHerbert Xu 	const __le32 *in = (const __le32 *)src;
13606ace7a9SHerbert Xu 	__le32 *out = (__le32 *)dst;
1371da177e4SLinus Torvalds 
13806ace7a9SHerbert Xu 	y = le32_to_cpu(in[0]);
13906ace7a9SHerbert Xu 	z = le32_to_cpu(in[1]);
1401da177e4SLinus Torvalds 
1411da177e4SLinus Torvalds 	while (sum != limit) {
142fb4f10edSAaron Grothe 		y += ((z << 4 ^ z >> 5) + z) ^ (sum + ctx->KEY[sum&3]);
143fb4f10edSAaron Grothe 		sum += XTEA_DELTA;
144fb4f10edSAaron Grothe 		z += ((y << 4 ^ y >> 5) + y) ^ (sum + ctx->KEY[sum>>11 &3]);
145fb4f10edSAaron Grothe 	}
146fb4f10edSAaron Grothe 
14706ace7a9SHerbert Xu 	out[0] = cpu_to_le32(y);
14806ace7a9SHerbert Xu 	out[1] = cpu_to_le32(z);
149fb4f10edSAaron Grothe }
150fb4f10edSAaron Grothe 
xtea_decrypt(struct crypto_tfm * tfm,u8 * dst,const u8 * src)1516c2bb98bSHerbert Xu static void xtea_decrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src)
152fb4f10edSAaron Grothe {
153fb4f10edSAaron Grothe 	u32 y, z, sum;
1546c2bb98bSHerbert Xu 	struct tea_ctx *ctx = crypto_tfm_ctx(tfm);
15506ace7a9SHerbert Xu 	const __le32 *in = (const __le32 *)src;
15606ace7a9SHerbert Xu 	__le32 *out = (__le32 *)dst;
157fb4f10edSAaron Grothe 
15806ace7a9SHerbert Xu 	y = le32_to_cpu(in[0]);
15906ace7a9SHerbert Xu 	z = le32_to_cpu(in[1]);
160fb4f10edSAaron Grothe 
161fb4f10edSAaron Grothe 	sum = XTEA_DELTA * XTEA_ROUNDS;
162fb4f10edSAaron Grothe 
163fb4f10edSAaron Grothe 	while (sum) {
164fb4f10edSAaron Grothe 		z -= ((y << 4 ^ y >> 5) + y) ^ (sum + ctx->KEY[sum>>11 & 3]);
165fb4f10edSAaron Grothe 		sum -= XTEA_DELTA;
166fb4f10edSAaron Grothe 		y -= ((z << 4 ^ z >> 5) + z) ^ (sum + ctx->KEY[sum & 3]);
167fb4f10edSAaron Grothe 	}
168fb4f10edSAaron Grothe 
16906ace7a9SHerbert Xu 	out[0] = cpu_to_le32(y);
17006ace7a9SHerbert Xu 	out[1] = cpu_to_le32(z);
171fb4f10edSAaron Grothe }
172fb4f10edSAaron Grothe 
173fb4f10edSAaron Grothe 
xeta_encrypt(struct crypto_tfm * tfm,u8 * dst,const u8 * src)1746c2bb98bSHerbert Xu static void xeta_encrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src)
175fb4f10edSAaron Grothe {
176fb4f10edSAaron Grothe 	u32 y, z, sum = 0;
177fb4f10edSAaron Grothe 	u32 limit = XTEA_DELTA * XTEA_ROUNDS;
1786c2bb98bSHerbert Xu 	struct xtea_ctx *ctx = crypto_tfm_ctx(tfm);
17906ace7a9SHerbert Xu 	const __le32 *in = (const __le32 *)src;
18006ace7a9SHerbert Xu 	__le32 *out = (__le32 *)dst;
181fb4f10edSAaron Grothe 
18206ace7a9SHerbert Xu 	y = le32_to_cpu(in[0]);
18306ace7a9SHerbert Xu 	z = le32_to_cpu(in[1]);
184fb4f10edSAaron Grothe 
185fb4f10edSAaron Grothe 	while (sum != limit) {
1861da177e4SLinus Torvalds 		y += (z << 4 ^ z >> 5) + (z ^ sum) + ctx->KEY[sum&3];
1871da177e4SLinus Torvalds 		sum += XTEA_DELTA;
1881da177e4SLinus Torvalds 		z += (y << 4 ^ y >> 5) + (y ^ sum) + ctx->KEY[sum>>11 &3];
1891da177e4SLinus Torvalds 	}
1901da177e4SLinus Torvalds 
19106ace7a9SHerbert Xu 	out[0] = cpu_to_le32(y);
19206ace7a9SHerbert Xu 	out[1] = cpu_to_le32(z);
1931da177e4SLinus Torvalds }
1941da177e4SLinus Torvalds 
xeta_decrypt(struct crypto_tfm * tfm,u8 * dst,const u8 * src)1956c2bb98bSHerbert Xu static void xeta_decrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src)
1961da177e4SLinus Torvalds {
1971da177e4SLinus Torvalds 	u32 y, z, sum;
1986c2bb98bSHerbert Xu 	struct tea_ctx *ctx = crypto_tfm_ctx(tfm);
19906ace7a9SHerbert Xu 	const __le32 *in = (const __le32 *)src;
20006ace7a9SHerbert Xu 	__le32 *out = (__le32 *)dst;
2011da177e4SLinus Torvalds 
20206ace7a9SHerbert Xu 	y = le32_to_cpu(in[0]);
20306ace7a9SHerbert Xu 	z = le32_to_cpu(in[1]);
2041da177e4SLinus Torvalds 
2051da177e4SLinus Torvalds 	sum = XTEA_DELTA * XTEA_ROUNDS;
2061da177e4SLinus Torvalds 
2071da177e4SLinus Torvalds 	while (sum) {
2081da177e4SLinus Torvalds 		z -= (y << 4 ^ y >> 5) + (y ^ sum) + ctx->KEY[sum>>11 & 3];
2091da177e4SLinus Torvalds 		sum -= XTEA_DELTA;
2101da177e4SLinus Torvalds 		y -= (z << 4 ^ z >> 5) + (z ^ sum) + ctx->KEY[sum & 3];
2111da177e4SLinus Torvalds 	}
2121da177e4SLinus Torvalds 
21306ace7a9SHerbert Xu 	out[0] = cpu_to_le32(y);
21406ace7a9SHerbert Xu 	out[1] = cpu_to_le32(z);
2151da177e4SLinus Torvalds }
2161da177e4SLinus Torvalds 
217738206d3SJussi Kivilinna static struct crypto_alg tea_algs[3] = { {
2181da177e4SLinus Torvalds 	.cra_name		=	"tea",
219d6ebf528SEric Biggers 	.cra_driver_name	=	"tea-generic",
2201da177e4SLinus Torvalds 	.cra_flags		=	CRYPTO_ALG_TYPE_CIPHER,
2211da177e4SLinus Torvalds 	.cra_blocksize		=	TEA_BLOCK_SIZE,
2221da177e4SLinus Torvalds 	.cra_ctxsize		=	sizeof (struct tea_ctx),
223a429d260SHerbert Xu 	.cra_alignmask		=	3,
2241da177e4SLinus Torvalds 	.cra_module		=	THIS_MODULE,
2251da177e4SLinus Torvalds 	.cra_u			=	{ .cipher = {
2261da177e4SLinus Torvalds 	.cia_min_keysize	=	TEA_KEY_SIZE,
2271da177e4SLinus Torvalds 	.cia_max_keysize	=	TEA_KEY_SIZE,
2281da177e4SLinus Torvalds 	.cia_setkey		= 	tea_setkey,
2291da177e4SLinus Torvalds 	.cia_encrypt		=	tea_encrypt,
2301da177e4SLinus Torvalds 	.cia_decrypt		=	tea_decrypt } }
231738206d3SJussi Kivilinna }, {
2321da177e4SLinus Torvalds 	.cra_name		=	"xtea",
233d6ebf528SEric Biggers 	.cra_driver_name	=	"xtea-generic",
2341da177e4SLinus Torvalds 	.cra_flags		=	CRYPTO_ALG_TYPE_CIPHER,
2351da177e4SLinus Torvalds 	.cra_blocksize		=	XTEA_BLOCK_SIZE,
2361da177e4SLinus Torvalds 	.cra_ctxsize		=	sizeof (struct xtea_ctx),
237a429d260SHerbert Xu 	.cra_alignmask		=	3,
2381da177e4SLinus Torvalds 	.cra_module		=	THIS_MODULE,
2391da177e4SLinus Torvalds 	.cra_u			=	{ .cipher = {
2401da177e4SLinus Torvalds 	.cia_min_keysize	=	XTEA_KEY_SIZE,
2411da177e4SLinus Torvalds 	.cia_max_keysize	=	XTEA_KEY_SIZE,
2421da177e4SLinus Torvalds 	.cia_setkey		= 	xtea_setkey,
2431da177e4SLinus Torvalds 	.cia_encrypt		=	xtea_encrypt,
2441da177e4SLinus Torvalds 	.cia_decrypt		=	xtea_decrypt } }
245738206d3SJussi Kivilinna }, {
246fb4f10edSAaron Grothe 	.cra_name		=	"xeta",
247d6ebf528SEric Biggers 	.cra_driver_name	=	"xeta-generic",
248fb4f10edSAaron Grothe 	.cra_flags		=	CRYPTO_ALG_TYPE_CIPHER,
249fb4f10edSAaron Grothe 	.cra_blocksize		=	XTEA_BLOCK_SIZE,
250fb4f10edSAaron Grothe 	.cra_ctxsize		=	sizeof (struct xtea_ctx),
251a429d260SHerbert Xu 	.cra_alignmask		=	3,
252fb4f10edSAaron Grothe 	.cra_module		=	THIS_MODULE,
253fb4f10edSAaron Grothe 	.cra_u			=	{ .cipher = {
254fb4f10edSAaron Grothe 	.cia_min_keysize	=	XTEA_KEY_SIZE,
255fb4f10edSAaron Grothe 	.cia_max_keysize	=	XTEA_KEY_SIZE,
256fb4f10edSAaron Grothe 	.cia_setkey		= 	xtea_setkey,
257fb4f10edSAaron Grothe 	.cia_encrypt		=	xeta_encrypt,
258fb4f10edSAaron Grothe 	.cia_decrypt		=	xeta_decrypt } }
259738206d3SJussi Kivilinna } };
260fb4f10edSAaron Grothe 
tea_mod_init(void)2613af5b90bSKamalesh Babulal static int __init tea_mod_init(void)
2621da177e4SLinus Torvalds {
263738206d3SJussi Kivilinna 	return crypto_register_algs(tea_algs, ARRAY_SIZE(tea_algs));
2641da177e4SLinus Torvalds }
2651da177e4SLinus Torvalds 
tea_mod_fini(void)2663af5b90bSKamalesh Babulal static void __exit tea_mod_fini(void)
2671da177e4SLinus Torvalds {
268738206d3SJussi Kivilinna 	crypto_unregister_algs(tea_algs, ARRAY_SIZE(tea_algs));
2691da177e4SLinus Torvalds }
2701da177e4SLinus Torvalds 
2713e14dcf7SMathias Krause MODULE_ALIAS_CRYPTO("tea");
2725d26a105SKees Cook MODULE_ALIAS_CRYPTO("xtea");
2735d26a105SKees Cook MODULE_ALIAS_CRYPTO("xeta");
2741da177e4SLinus Torvalds 
275c4741b23SEric Biggers subsys_initcall(tea_mod_init);
2763af5b90bSKamalesh Babulal module_exit(tea_mod_fini);
2771da177e4SLinus Torvalds 
2781da177e4SLinus Torvalds MODULE_LICENSE("GPL");
279fb4f10edSAaron Grothe MODULE_DESCRIPTION("TEA, XTEA & XETA Cryptographic Algorithms");
280