.. | .. |
---|
6 | 6 | #ifndef __CRYPTO_DES_H |
---|
7 | 7 | #define __CRYPTO_DES_H |
---|
8 | 8 | |
---|
| 9 | +#include <linux/types.h> |
---|
| 10 | + |
---|
9 | 11 | #define DES_KEY_SIZE 8 |
---|
10 | 12 | #define DES_EXPKEY_WORDS 32 |
---|
11 | 13 | #define DES_BLOCK_SIZE 8 |
---|
.. | .. |
---|
14 | 16 | #define DES3_EDE_EXPKEY_WORDS (3 * DES_EXPKEY_WORDS) |
---|
15 | 17 | #define DES3_EDE_BLOCK_SIZE DES_BLOCK_SIZE |
---|
16 | 18 | |
---|
| 19 | +struct des_ctx { |
---|
| 20 | + u32 expkey[DES_EXPKEY_WORDS]; |
---|
| 21 | +}; |
---|
17 | 22 | |
---|
18 | | -extern unsigned long des_ekey(u32 *pe, const u8 *k); |
---|
| 23 | +struct des3_ede_ctx { |
---|
| 24 | + u32 expkey[DES3_EDE_EXPKEY_WORDS]; |
---|
| 25 | +}; |
---|
19 | 26 | |
---|
20 | | -extern int __des3_ede_setkey(u32 *expkey, u32 *flags, const u8 *key, |
---|
21 | | - unsigned int keylen); |
---|
| 27 | +void des_encrypt(const struct des_ctx *ctx, u8 *dst, const u8 *src); |
---|
| 28 | +void des_decrypt(const struct des_ctx *ctx, u8 *dst, const u8 *src); |
---|
| 29 | + |
---|
| 30 | +void des3_ede_encrypt(const struct des3_ede_ctx *dctx, u8 *dst, const u8 *src); |
---|
| 31 | +void des3_ede_decrypt(const struct des3_ede_ctx *dctx, u8 *dst, const u8 *src); |
---|
| 32 | + |
---|
| 33 | +/** |
---|
| 34 | + * des_expand_key - Expand a DES input key into a key schedule |
---|
| 35 | + * @ctx: the key schedule |
---|
| 36 | + * @key: buffer containing the input key |
---|
| 37 | + * @len: size of the buffer contents |
---|
| 38 | + * |
---|
| 39 | + * Returns 0 on success, -EINVAL if the input key is rejected and -ENOKEY if |
---|
| 40 | + * the key is accepted but has been found to be weak. |
---|
| 41 | + */ |
---|
| 42 | +int des_expand_key(struct des_ctx *ctx, const u8 *key, unsigned int keylen); |
---|
| 43 | + |
---|
| 44 | +/** |
---|
| 45 | + * des3_ede_expand_key - Expand a triple DES input key into a key schedule |
---|
| 46 | + * @ctx: the key schedule |
---|
| 47 | + * @key: buffer containing the input key |
---|
| 48 | + * @len: size of the buffer contents |
---|
| 49 | + * |
---|
| 50 | + * Returns 0 on success, -EINVAL if the input key is rejected and -ENOKEY if |
---|
| 51 | + * the key is accepted but has been found to be weak. Note that weak keys will |
---|
| 52 | + * be rejected (and -EINVAL will be returned) when running in FIPS mode. |
---|
| 53 | + */ |
---|
| 54 | +int des3_ede_expand_key(struct des3_ede_ctx *ctx, const u8 *key, |
---|
| 55 | + unsigned int keylen); |
---|
22 | 56 | |
---|
23 | 57 | #endif /* __CRYPTO_DES_H */ |
---|