1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0-or-later
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun * Cryptographic API.
4*4882a593Smuzhiyun *
5*4882a593Smuzhiyun * Null algorithms, aka Much Ado About Nothing.
6*4882a593Smuzhiyun *
7*4882a593Smuzhiyun * These are needed for IPsec, and may be useful in general for
8*4882a593Smuzhiyun * testing & debugging.
9*4882a593Smuzhiyun *
10*4882a593Smuzhiyun * The null cipher is compliant with RFC2410.
11*4882a593Smuzhiyun *
12*4882a593Smuzhiyun * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
13*4882a593Smuzhiyun */
14*4882a593Smuzhiyun
15*4882a593Smuzhiyun #include <crypto/null.h>
16*4882a593Smuzhiyun #include <crypto/internal/hash.h>
17*4882a593Smuzhiyun #include <crypto/internal/skcipher.h>
18*4882a593Smuzhiyun #include <linux/init.h>
19*4882a593Smuzhiyun #include <linux/module.h>
20*4882a593Smuzhiyun #include <linux/mm.h>
21*4882a593Smuzhiyun #include <linux/string.h>
22*4882a593Smuzhiyun
23*4882a593Smuzhiyun static DEFINE_MUTEX(crypto_default_null_skcipher_lock);
24*4882a593Smuzhiyun static struct crypto_sync_skcipher *crypto_default_null_skcipher;
25*4882a593Smuzhiyun static int crypto_default_null_skcipher_refcnt;
26*4882a593Smuzhiyun
null_compress(struct crypto_tfm * tfm,const u8 * src,unsigned int slen,u8 * dst,unsigned int * dlen)27*4882a593Smuzhiyun static int null_compress(struct crypto_tfm *tfm, const u8 *src,
28*4882a593Smuzhiyun unsigned int slen, u8 *dst, unsigned int *dlen)
29*4882a593Smuzhiyun {
30*4882a593Smuzhiyun if (slen > *dlen)
31*4882a593Smuzhiyun return -EINVAL;
32*4882a593Smuzhiyun memcpy(dst, src, slen);
33*4882a593Smuzhiyun *dlen = slen;
34*4882a593Smuzhiyun return 0;
35*4882a593Smuzhiyun }
36*4882a593Smuzhiyun
null_init(struct shash_desc * desc)37*4882a593Smuzhiyun static int null_init(struct shash_desc *desc)
38*4882a593Smuzhiyun {
39*4882a593Smuzhiyun return 0;
40*4882a593Smuzhiyun }
41*4882a593Smuzhiyun
null_update(struct shash_desc * desc,const u8 * data,unsigned int len)42*4882a593Smuzhiyun static int null_update(struct shash_desc *desc, const u8 *data,
43*4882a593Smuzhiyun unsigned int len)
44*4882a593Smuzhiyun {
45*4882a593Smuzhiyun return 0;
46*4882a593Smuzhiyun }
47*4882a593Smuzhiyun
null_final(struct shash_desc * desc,u8 * out)48*4882a593Smuzhiyun static int null_final(struct shash_desc *desc, u8 *out)
49*4882a593Smuzhiyun {
50*4882a593Smuzhiyun return 0;
51*4882a593Smuzhiyun }
52*4882a593Smuzhiyun
null_digest(struct shash_desc * desc,const u8 * data,unsigned int len,u8 * out)53*4882a593Smuzhiyun static int null_digest(struct shash_desc *desc, const u8 *data,
54*4882a593Smuzhiyun unsigned int len, u8 *out)
55*4882a593Smuzhiyun {
56*4882a593Smuzhiyun return 0;
57*4882a593Smuzhiyun }
58*4882a593Smuzhiyun
null_hash_setkey(struct crypto_shash * tfm,const u8 * key,unsigned int keylen)59*4882a593Smuzhiyun static int null_hash_setkey(struct crypto_shash *tfm, const u8 *key,
60*4882a593Smuzhiyun unsigned int keylen)
61*4882a593Smuzhiyun { return 0; }
62*4882a593Smuzhiyun
null_skcipher_setkey(struct crypto_skcipher * tfm,const u8 * key,unsigned int keylen)63*4882a593Smuzhiyun static int null_skcipher_setkey(struct crypto_skcipher *tfm, const u8 *key,
64*4882a593Smuzhiyun unsigned int keylen)
65*4882a593Smuzhiyun { return 0; }
66*4882a593Smuzhiyun
null_setkey(struct crypto_tfm * tfm,const u8 * key,unsigned int keylen)67*4882a593Smuzhiyun static int null_setkey(struct crypto_tfm *tfm, const u8 *key,
68*4882a593Smuzhiyun unsigned int keylen)
69*4882a593Smuzhiyun { return 0; }
70*4882a593Smuzhiyun
null_crypt(struct crypto_tfm * tfm,u8 * dst,const u8 * src)71*4882a593Smuzhiyun static void null_crypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src)
72*4882a593Smuzhiyun {
73*4882a593Smuzhiyun memcpy(dst, src, NULL_BLOCK_SIZE);
74*4882a593Smuzhiyun }
75*4882a593Smuzhiyun
null_skcipher_crypt(struct skcipher_request * req)76*4882a593Smuzhiyun static int null_skcipher_crypt(struct skcipher_request *req)
77*4882a593Smuzhiyun {
78*4882a593Smuzhiyun struct skcipher_walk walk;
79*4882a593Smuzhiyun int err;
80*4882a593Smuzhiyun
81*4882a593Smuzhiyun err = skcipher_walk_virt(&walk, req, false);
82*4882a593Smuzhiyun
83*4882a593Smuzhiyun while (walk.nbytes) {
84*4882a593Smuzhiyun if (walk.src.virt.addr != walk.dst.virt.addr)
85*4882a593Smuzhiyun memcpy(walk.dst.virt.addr, walk.src.virt.addr,
86*4882a593Smuzhiyun walk.nbytes);
87*4882a593Smuzhiyun err = skcipher_walk_done(&walk, 0);
88*4882a593Smuzhiyun }
89*4882a593Smuzhiyun
90*4882a593Smuzhiyun return err;
91*4882a593Smuzhiyun }
92*4882a593Smuzhiyun
93*4882a593Smuzhiyun static struct shash_alg digest_null = {
94*4882a593Smuzhiyun .digestsize = NULL_DIGEST_SIZE,
95*4882a593Smuzhiyun .setkey = null_hash_setkey,
96*4882a593Smuzhiyun .init = null_init,
97*4882a593Smuzhiyun .update = null_update,
98*4882a593Smuzhiyun .finup = null_digest,
99*4882a593Smuzhiyun .digest = null_digest,
100*4882a593Smuzhiyun .final = null_final,
101*4882a593Smuzhiyun .base = {
102*4882a593Smuzhiyun .cra_name = "digest_null",
103*4882a593Smuzhiyun .cra_driver_name = "digest_null-generic",
104*4882a593Smuzhiyun .cra_blocksize = NULL_BLOCK_SIZE,
105*4882a593Smuzhiyun .cra_module = THIS_MODULE,
106*4882a593Smuzhiyun }
107*4882a593Smuzhiyun };
108*4882a593Smuzhiyun
109*4882a593Smuzhiyun static struct skcipher_alg skcipher_null = {
110*4882a593Smuzhiyun .base.cra_name = "ecb(cipher_null)",
111*4882a593Smuzhiyun .base.cra_driver_name = "ecb-cipher_null",
112*4882a593Smuzhiyun .base.cra_priority = 100,
113*4882a593Smuzhiyun .base.cra_blocksize = NULL_BLOCK_SIZE,
114*4882a593Smuzhiyun .base.cra_ctxsize = 0,
115*4882a593Smuzhiyun .base.cra_module = THIS_MODULE,
116*4882a593Smuzhiyun .min_keysize = NULL_KEY_SIZE,
117*4882a593Smuzhiyun .max_keysize = NULL_KEY_SIZE,
118*4882a593Smuzhiyun .ivsize = NULL_IV_SIZE,
119*4882a593Smuzhiyun .setkey = null_skcipher_setkey,
120*4882a593Smuzhiyun .encrypt = null_skcipher_crypt,
121*4882a593Smuzhiyun .decrypt = null_skcipher_crypt,
122*4882a593Smuzhiyun };
123*4882a593Smuzhiyun
124*4882a593Smuzhiyun static struct crypto_alg null_algs[] = { {
125*4882a593Smuzhiyun .cra_name = "cipher_null",
126*4882a593Smuzhiyun .cra_driver_name = "cipher_null-generic",
127*4882a593Smuzhiyun .cra_flags = CRYPTO_ALG_TYPE_CIPHER,
128*4882a593Smuzhiyun .cra_blocksize = NULL_BLOCK_SIZE,
129*4882a593Smuzhiyun .cra_ctxsize = 0,
130*4882a593Smuzhiyun .cra_module = THIS_MODULE,
131*4882a593Smuzhiyun .cra_u = { .cipher = {
132*4882a593Smuzhiyun .cia_min_keysize = NULL_KEY_SIZE,
133*4882a593Smuzhiyun .cia_max_keysize = NULL_KEY_SIZE,
134*4882a593Smuzhiyun .cia_setkey = null_setkey,
135*4882a593Smuzhiyun .cia_encrypt = null_crypt,
136*4882a593Smuzhiyun .cia_decrypt = null_crypt } }
137*4882a593Smuzhiyun }, {
138*4882a593Smuzhiyun .cra_name = "compress_null",
139*4882a593Smuzhiyun .cra_driver_name = "compress_null-generic",
140*4882a593Smuzhiyun .cra_flags = CRYPTO_ALG_TYPE_COMPRESS,
141*4882a593Smuzhiyun .cra_blocksize = NULL_BLOCK_SIZE,
142*4882a593Smuzhiyun .cra_ctxsize = 0,
143*4882a593Smuzhiyun .cra_module = THIS_MODULE,
144*4882a593Smuzhiyun .cra_u = { .compress = {
145*4882a593Smuzhiyun .coa_compress = null_compress,
146*4882a593Smuzhiyun .coa_decompress = null_compress } }
147*4882a593Smuzhiyun } };
148*4882a593Smuzhiyun
149*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("compress_null");
150*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("digest_null");
151*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("cipher_null");
152*4882a593Smuzhiyun
crypto_get_default_null_skcipher(void)153*4882a593Smuzhiyun struct crypto_sync_skcipher *crypto_get_default_null_skcipher(void)
154*4882a593Smuzhiyun {
155*4882a593Smuzhiyun struct crypto_sync_skcipher *tfm;
156*4882a593Smuzhiyun
157*4882a593Smuzhiyun mutex_lock(&crypto_default_null_skcipher_lock);
158*4882a593Smuzhiyun tfm = crypto_default_null_skcipher;
159*4882a593Smuzhiyun
160*4882a593Smuzhiyun if (!tfm) {
161*4882a593Smuzhiyun tfm = crypto_alloc_sync_skcipher("ecb(cipher_null)", 0, 0);
162*4882a593Smuzhiyun if (IS_ERR(tfm))
163*4882a593Smuzhiyun goto unlock;
164*4882a593Smuzhiyun
165*4882a593Smuzhiyun crypto_default_null_skcipher = tfm;
166*4882a593Smuzhiyun }
167*4882a593Smuzhiyun
168*4882a593Smuzhiyun crypto_default_null_skcipher_refcnt++;
169*4882a593Smuzhiyun
170*4882a593Smuzhiyun unlock:
171*4882a593Smuzhiyun mutex_unlock(&crypto_default_null_skcipher_lock);
172*4882a593Smuzhiyun
173*4882a593Smuzhiyun return tfm;
174*4882a593Smuzhiyun }
175*4882a593Smuzhiyun EXPORT_SYMBOL_GPL(crypto_get_default_null_skcipher);
176*4882a593Smuzhiyun
crypto_put_default_null_skcipher(void)177*4882a593Smuzhiyun void crypto_put_default_null_skcipher(void)
178*4882a593Smuzhiyun {
179*4882a593Smuzhiyun mutex_lock(&crypto_default_null_skcipher_lock);
180*4882a593Smuzhiyun if (!--crypto_default_null_skcipher_refcnt) {
181*4882a593Smuzhiyun crypto_free_sync_skcipher(crypto_default_null_skcipher);
182*4882a593Smuzhiyun crypto_default_null_skcipher = NULL;
183*4882a593Smuzhiyun }
184*4882a593Smuzhiyun mutex_unlock(&crypto_default_null_skcipher_lock);
185*4882a593Smuzhiyun }
186*4882a593Smuzhiyun EXPORT_SYMBOL_GPL(crypto_put_default_null_skcipher);
187*4882a593Smuzhiyun
crypto_null_mod_init(void)188*4882a593Smuzhiyun static int __init crypto_null_mod_init(void)
189*4882a593Smuzhiyun {
190*4882a593Smuzhiyun int ret = 0;
191*4882a593Smuzhiyun
192*4882a593Smuzhiyun ret = crypto_register_algs(null_algs, ARRAY_SIZE(null_algs));
193*4882a593Smuzhiyun if (ret < 0)
194*4882a593Smuzhiyun goto out;
195*4882a593Smuzhiyun
196*4882a593Smuzhiyun ret = crypto_register_shash(&digest_null);
197*4882a593Smuzhiyun if (ret < 0)
198*4882a593Smuzhiyun goto out_unregister_algs;
199*4882a593Smuzhiyun
200*4882a593Smuzhiyun ret = crypto_register_skcipher(&skcipher_null);
201*4882a593Smuzhiyun if (ret < 0)
202*4882a593Smuzhiyun goto out_unregister_shash;
203*4882a593Smuzhiyun
204*4882a593Smuzhiyun return 0;
205*4882a593Smuzhiyun
206*4882a593Smuzhiyun out_unregister_shash:
207*4882a593Smuzhiyun crypto_unregister_shash(&digest_null);
208*4882a593Smuzhiyun out_unregister_algs:
209*4882a593Smuzhiyun crypto_unregister_algs(null_algs, ARRAY_SIZE(null_algs));
210*4882a593Smuzhiyun out:
211*4882a593Smuzhiyun return ret;
212*4882a593Smuzhiyun }
213*4882a593Smuzhiyun
crypto_null_mod_fini(void)214*4882a593Smuzhiyun static void __exit crypto_null_mod_fini(void)
215*4882a593Smuzhiyun {
216*4882a593Smuzhiyun crypto_unregister_algs(null_algs, ARRAY_SIZE(null_algs));
217*4882a593Smuzhiyun crypto_unregister_shash(&digest_null);
218*4882a593Smuzhiyun crypto_unregister_skcipher(&skcipher_null);
219*4882a593Smuzhiyun }
220*4882a593Smuzhiyun
221*4882a593Smuzhiyun subsys_initcall(crypto_null_mod_init);
222*4882a593Smuzhiyun module_exit(crypto_null_mod_fini);
223*4882a593Smuzhiyun
224*4882a593Smuzhiyun MODULE_LICENSE("GPL");
225*4882a593Smuzhiyun MODULE_DESCRIPTION("Null Cryptographic Algorithms");
226