cachepc-linux

Fork of AMDESE/linux with modifications for CachePC side-channel attack
git clone https://git.sinitax.com/sinitax/cachepc-linux
Log | Files | Refs | README | LICENSE | sfeed.txt

des.h (3329B)


      1/* SPDX-License-Identifier: GPL-2.0 */
      2/*
      3 * DES & Triple DES EDE key verification helpers
      4 */
      5
      6#ifndef __CRYPTO_INTERNAL_DES_H
      7#define __CRYPTO_INTERNAL_DES_H
      8
      9#include <linux/crypto.h>
     10#include <linux/fips.h>
     11#include <crypto/des.h>
     12#include <crypto/aead.h>
     13#include <crypto/skcipher.h>
     14
     15/**
     16 * crypto_des_verify_key - Check whether a DES key is weak
     17 * @tfm: the crypto algo
     18 * @key: the key buffer
     19 *
     20 * Returns -EINVAL if the key is weak and the crypto TFM does not permit weak
     21 * keys. Otherwise, 0 is returned.
     22 *
     23 * It is the job of the caller to ensure that the size of the key equals
     24 * DES_KEY_SIZE.
     25 */
     26static inline int crypto_des_verify_key(struct crypto_tfm *tfm, const u8 *key)
     27{
     28	struct des_ctx tmp;
     29	int err;
     30
     31	err = des_expand_key(&tmp, key, DES_KEY_SIZE);
     32	if (err == -ENOKEY) {
     33		if (crypto_tfm_get_flags(tfm) & CRYPTO_TFM_REQ_FORBID_WEAK_KEYS)
     34			err = -EINVAL;
     35		else
     36			err = 0;
     37	}
     38	memzero_explicit(&tmp, sizeof(tmp));
     39	return err;
     40}
     41
     42/*
     43 * RFC2451:
     44 *
     45 *   For DES-EDE3, there is no known need to reject weak or
     46 *   complementation keys.  Any weakness is obviated by the use of
     47 *   multiple keys.
     48 *
     49 *   However, if the first two or last two independent 64-bit keys are
     50 *   equal (k1 == k2 or k2 == k3), then the DES3 operation is simply the
     51 *   same as DES.  Implementers MUST reject keys that exhibit this
     52 *   property.
     53 *
     54 */
     55static inline int des3_ede_verify_key(const u8 *key, unsigned int key_len,
     56				      bool check_weak)
     57{
     58	int ret = fips_enabled ? -EINVAL : -ENOKEY;
     59	u32 K[6];
     60
     61	memcpy(K, key, DES3_EDE_KEY_SIZE);
     62
     63	if ((!((K[0] ^ K[2]) | (K[1] ^ K[3])) ||
     64	     !((K[2] ^ K[4]) | (K[3] ^ K[5]))) &&
     65	    (fips_enabled || check_weak))
     66		goto bad;
     67
     68	if ((!((K[0] ^ K[4]) | (K[1] ^ K[5]))) && fips_enabled)
     69		goto bad;
     70
     71	ret = 0;
     72bad:
     73	memzero_explicit(K, DES3_EDE_KEY_SIZE);
     74
     75	return ret;
     76}
     77
     78/**
     79 * crypto_des3_ede_verify_key - Check whether a DES3-EDE key is weak
     80 * @tfm: the crypto algo
     81 * @key: the key buffer
     82 *
     83 * Returns -EINVAL if the key is weak and the crypto TFM does not permit weak
     84 * keys or when running in FIPS mode. Otherwise, 0 is returned. Note that some
     85 * keys are rejected in FIPS mode even if weak keys are permitted by the TFM
     86 * flags.
     87 *
     88 * It is the job of the caller to ensure that the size of the key equals
     89 * DES3_EDE_KEY_SIZE.
     90 */
     91static inline int crypto_des3_ede_verify_key(struct crypto_tfm *tfm,
     92					     const u8 *key)
     93{
     94	return des3_ede_verify_key(key, DES3_EDE_KEY_SIZE,
     95				   crypto_tfm_get_flags(tfm) &
     96				   CRYPTO_TFM_REQ_FORBID_WEAK_KEYS);
     97}
     98
     99static inline int verify_skcipher_des_key(struct crypto_skcipher *tfm,
    100					  const u8 *key)
    101{
    102	return crypto_des_verify_key(crypto_skcipher_tfm(tfm), key);
    103}
    104
    105static inline int verify_skcipher_des3_key(struct crypto_skcipher *tfm,
    106					   const u8 *key)
    107{
    108	return crypto_des3_ede_verify_key(crypto_skcipher_tfm(tfm), key);
    109}
    110
    111static inline int verify_aead_des_key(struct crypto_aead *tfm, const u8 *key,
    112				      int keylen)
    113{
    114	if (keylen != DES_KEY_SIZE)
    115		return -EINVAL;
    116	return crypto_des_verify_key(crypto_aead_tfm(tfm), key);
    117}
    118
    119static inline int verify_aead_des3_key(struct crypto_aead *tfm, const u8 *key,
    120				       int keylen)
    121{
    122	if (keylen != DES3_EDE_KEY_SIZE)
    123		return -EINVAL;
    124	return crypto_des3_ede_verify_key(crypto_aead_tfm(tfm), key);
    125}
    126
    127#endif /* __CRYPTO_INTERNAL_DES_H */