^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1) /* SPDX-License-Identifier: GPL-2.0 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3) * Common values for AES algorithms
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 4) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 5)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 6) #ifndef _CRYPTO_AES_H
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 7) #define _CRYPTO_AES_H
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 8)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 9) #include <linux/types.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 10) #include <linux/crypto.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 11)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 12) #define AES_MIN_KEY_SIZE 16
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 13) #define AES_MAX_KEY_SIZE 32
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 14) #define AES_KEYSIZE_128 16
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 15) #define AES_KEYSIZE_192 24
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 16) #define AES_KEYSIZE_256 32
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 17) #define AES_BLOCK_SIZE 16
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 18) #define AES_MAX_KEYLENGTH (15 * 16)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 19) #define AES_MAX_KEYLENGTH_U32 (AES_MAX_KEYLENGTH / sizeof(u32))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 20)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 21) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 22) * Please ensure that the first two fields are 16-byte aligned
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 23) * relative to the start of the structure, i.e., don't move them!
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 24) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 25) struct crypto_aes_ctx {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 26) u32 key_enc[AES_MAX_KEYLENGTH_U32];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 27) u32 key_dec[AES_MAX_KEYLENGTH_U32];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 28) u32 key_length;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 29) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 30)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 31) extern const u32 crypto_ft_tab[4][256] ____cacheline_aligned;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 32) extern const u32 crypto_it_tab[4][256] ____cacheline_aligned;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 33)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 34) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 35) * validate key length for AES algorithms
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 36) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 37) static inline int aes_check_keylen(unsigned int keylen)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 38) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 39) switch (keylen) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 40) case AES_KEYSIZE_128:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 41) case AES_KEYSIZE_192:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 42) case AES_KEYSIZE_256:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 43) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 44) default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 45) return -EINVAL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 46) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 47)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 48) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 49) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 50)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 51) int crypto_aes_set_key(struct crypto_tfm *tfm, const u8 *in_key,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 52) unsigned int key_len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 53)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 54) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 55) * aes_expandkey - Expands the AES key as described in FIPS-197
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 56) * @ctx: The location where the computed key will be stored.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 57) * @in_key: The supplied key.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 58) * @key_len: The length of the supplied key.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 59) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 60) * Returns 0 on success. The function fails only if an invalid key size (or
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 61) * pointer) is supplied.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 62) * The expanded key size is 240 bytes (max of 14 rounds with a unique 16 bytes
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 63) * key schedule plus a 16 bytes key which is used before the first round).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 64) * The decryption key is prepared for the "Equivalent Inverse Cipher" as
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 65) * described in FIPS-197. The first slot (16 bytes) of each key (enc or dec) is
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 66) * for the initial combination, the second slot for the first round and so on.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 67) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 68) int aes_expandkey(struct crypto_aes_ctx *ctx, const u8 *in_key,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 69) unsigned int key_len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 70)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 71) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 72) * aes_encrypt - Encrypt a single AES block
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 73) * @ctx: Context struct containing the key schedule
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 74) * @out: Buffer to store the ciphertext
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 75) * @in: Buffer containing the plaintext
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 76) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 77) void aes_encrypt(const struct crypto_aes_ctx *ctx, u8 *out, const u8 *in);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 78)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 79) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 80) * aes_decrypt - Decrypt a single AES block
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 81) * @ctx: Context struct containing the key schedule
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 82) * @out: Buffer to store the plaintext
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 83) * @in: Buffer containing the ciphertext
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 84) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 85) void aes_decrypt(const struct crypto_aes_ctx *ctx, u8 *out, const u8 *in);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 86)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 87) extern const u8 crypto_aes_sbox[];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 88) extern const u8 crypto_aes_inv_sbox[];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 89)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 90) #endif