cachepc-linux

Fork of AMDESE/linux with modifications for CachePC side-channel attack
git clone https://git.sinitax.com/sinitax/cachepc-linux
Log | Files | Refs | README | LICENSE | sfeed.txt

des.h (1724B)


      1/* SPDX-License-Identifier: GPL-2.0 */
      2/* 
      3 * DES & Triple DES EDE Cipher Algorithms.
      4 */
      5
      6#ifndef __CRYPTO_DES_H
      7#define __CRYPTO_DES_H
      8
      9#include <linux/types.h>
     10
     11#define DES_KEY_SIZE		8
     12#define DES_EXPKEY_WORDS	32
     13#define DES_BLOCK_SIZE		8
     14
     15#define DES3_EDE_KEY_SIZE	(3 * DES_KEY_SIZE)
     16#define DES3_EDE_EXPKEY_WORDS	(3 * DES_EXPKEY_WORDS)
     17#define DES3_EDE_BLOCK_SIZE	DES_BLOCK_SIZE
     18
     19struct des_ctx {
     20	u32 expkey[DES_EXPKEY_WORDS];
     21};
     22
     23struct des3_ede_ctx {
     24	u32 expkey[DES3_EDE_EXPKEY_WORDS];
     25};
     26
     27void des_encrypt(const struct des_ctx *ctx, u8 *dst, const u8 *src);
     28void des_decrypt(const struct des_ctx *ctx, u8 *dst, const u8 *src);
     29
     30void des3_ede_encrypt(const struct des3_ede_ctx *dctx, u8 *dst, const u8 *src);
     31void des3_ede_decrypt(const struct des3_ede_ctx *dctx, u8 *dst, const u8 *src);
     32
     33/**
     34 * des_expand_key - Expand a DES input key into a key schedule
     35 * @ctx: the key schedule
     36 * @key: buffer containing the input key
     37 * @len: size of the buffer contents
     38 *
     39 * Returns 0 on success, -EINVAL if the input key is rejected and -ENOKEY if
     40 * the key is accepted but has been found to be weak.
     41 */
     42int des_expand_key(struct des_ctx *ctx, const u8 *key, unsigned int keylen);
     43
     44/**
     45 * des3_ede_expand_key - Expand a triple DES input key into a key schedule
     46 * @ctx: the key schedule
     47 * @key: buffer containing the input key
     48 * @len: size of the buffer contents
     49 *
     50 * Returns 0 on success, -EINVAL if the input key is rejected and -ENOKEY if
     51 * the key is accepted but has been found to be weak. Note that weak keys will
     52 * be rejected (and -EINVAL will be returned) when running in FIPS mode.
     53 */
     54int des3_ede_expand_key(struct des3_ede_ctx *ctx, const u8 *key,
     55			unsigned int keylen);
     56
     57#endif /* __CRYPTO_DES_H */