xref: /OK3568_Linux_fs/kernel/crypto/crypto_null.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0-or-later
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun  * Cryptographic API.
4*4882a593Smuzhiyun  *
5*4882a593Smuzhiyun  * Null algorithms, aka Much Ado About Nothing.
6*4882a593Smuzhiyun  *
7*4882a593Smuzhiyun  * These are needed for IPsec, and may be useful in general for
8*4882a593Smuzhiyun  * testing & debugging.
9*4882a593Smuzhiyun  *
10*4882a593Smuzhiyun  * The null cipher is compliant with RFC2410.
11*4882a593Smuzhiyun  *
12*4882a593Smuzhiyun  * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
13*4882a593Smuzhiyun  */
14*4882a593Smuzhiyun 
15*4882a593Smuzhiyun #include <crypto/null.h>
16*4882a593Smuzhiyun #include <crypto/internal/hash.h>
17*4882a593Smuzhiyun #include <crypto/internal/skcipher.h>
18*4882a593Smuzhiyun #include <linux/init.h>
19*4882a593Smuzhiyun #include <linux/module.h>
20*4882a593Smuzhiyun #include <linux/mm.h>
21*4882a593Smuzhiyun #include <linux/string.h>
22*4882a593Smuzhiyun 
23*4882a593Smuzhiyun static DEFINE_MUTEX(crypto_default_null_skcipher_lock);
24*4882a593Smuzhiyun static struct crypto_sync_skcipher *crypto_default_null_skcipher;
25*4882a593Smuzhiyun static int crypto_default_null_skcipher_refcnt;
26*4882a593Smuzhiyun 
null_compress(struct crypto_tfm * tfm,const u8 * src,unsigned int slen,u8 * dst,unsigned int * dlen)27*4882a593Smuzhiyun static int null_compress(struct crypto_tfm *tfm, const u8 *src,
28*4882a593Smuzhiyun 			 unsigned int slen, u8 *dst, unsigned int *dlen)
29*4882a593Smuzhiyun {
30*4882a593Smuzhiyun 	if (slen > *dlen)
31*4882a593Smuzhiyun 		return -EINVAL;
32*4882a593Smuzhiyun 	memcpy(dst, src, slen);
33*4882a593Smuzhiyun 	*dlen = slen;
34*4882a593Smuzhiyun 	return 0;
35*4882a593Smuzhiyun }
36*4882a593Smuzhiyun 
null_init(struct shash_desc * desc)37*4882a593Smuzhiyun static int null_init(struct shash_desc *desc)
38*4882a593Smuzhiyun {
39*4882a593Smuzhiyun 	return 0;
40*4882a593Smuzhiyun }
41*4882a593Smuzhiyun 
null_update(struct shash_desc * desc,const u8 * data,unsigned int len)42*4882a593Smuzhiyun static int null_update(struct shash_desc *desc, const u8 *data,
43*4882a593Smuzhiyun 		       unsigned int len)
44*4882a593Smuzhiyun {
45*4882a593Smuzhiyun 	return 0;
46*4882a593Smuzhiyun }
47*4882a593Smuzhiyun 
null_final(struct shash_desc * desc,u8 * out)48*4882a593Smuzhiyun static int null_final(struct shash_desc *desc, u8 *out)
49*4882a593Smuzhiyun {
50*4882a593Smuzhiyun 	return 0;
51*4882a593Smuzhiyun }
52*4882a593Smuzhiyun 
null_digest(struct shash_desc * desc,const u8 * data,unsigned int len,u8 * out)53*4882a593Smuzhiyun static int null_digest(struct shash_desc *desc, const u8 *data,
54*4882a593Smuzhiyun 		       unsigned int len, u8 *out)
55*4882a593Smuzhiyun {
56*4882a593Smuzhiyun 	return 0;
57*4882a593Smuzhiyun }
58*4882a593Smuzhiyun 
null_hash_setkey(struct crypto_shash * tfm,const u8 * key,unsigned int keylen)59*4882a593Smuzhiyun static int null_hash_setkey(struct crypto_shash *tfm, const u8 *key,
60*4882a593Smuzhiyun 			    unsigned int keylen)
61*4882a593Smuzhiyun { return 0; }
62*4882a593Smuzhiyun 
null_skcipher_setkey(struct crypto_skcipher * tfm,const u8 * key,unsigned int keylen)63*4882a593Smuzhiyun static int null_skcipher_setkey(struct crypto_skcipher *tfm, const u8 *key,
64*4882a593Smuzhiyun 				unsigned int keylen)
65*4882a593Smuzhiyun { return 0; }
66*4882a593Smuzhiyun 
null_setkey(struct crypto_tfm * tfm,const u8 * key,unsigned int keylen)67*4882a593Smuzhiyun static int null_setkey(struct crypto_tfm *tfm, const u8 *key,
68*4882a593Smuzhiyun 		       unsigned int keylen)
69*4882a593Smuzhiyun { return 0; }
70*4882a593Smuzhiyun 
null_crypt(struct crypto_tfm * tfm,u8 * dst,const u8 * src)71*4882a593Smuzhiyun static void null_crypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src)
72*4882a593Smuzhiyun {
73*4882a593Smuzhiyun 	memcpy(dst, src, NULL_BLOCK_SIZE);
74*4882a593Smuzhiyun }
75*4882a593Smuzhiyun 
null_skcipher_crypt(struct skcipher_request * req)76*4882a593Smuzhiyun static int null_skcipher_crypt(struct skcipher_request *req)
77*4882a593Smuzhiyun {
78*4882a593Smuzhiyun 	struct skcipher_walk walk;
79*4882a593Smuzhiyun 	int err;
80*4882a593Smuzhiyun 
81*4882a593Smuzhiyun 	err = skcipher_walk_virt(&walk, req, false);
82*4882a593Smuzhiyun 
83*4882a593Smuzhiyun 	while (walk.nbytes) {
84*4882a593Smuzhiyun 		if (walk.src.virt.addr != walk.dst.virt.addr)
85*4882a593Smuzhiyun 			memcpy(walk.dst.virt.addr, walk.src.virt.addr,
86*4882a593Smuzhiyun 			       walk.nbytes);
87*4882a593Smuzhiyun 		err = skcipher_walk_done(&walk, 0);
88*4882a593Smuzhiyun 	}
89*4882a593Smuzhiyun 
90*4882a593Smuzhiyun 	return err;
91*4882a593Smuzhiyun }
92*4882a593Smuzhiyun 
93*4882a593Smuzhiyun static struct shash_alg digest_null = {
94*4882a593Smuzhiyun 	.digestsize		=	NULL_DIGEST_SIZE,
95*4882a593Smuzhiyun 	.setkey   		=	null_hash_setkey,
96*4882a593Smuzhiyun 	.init   		=	null_init,
97*4882a593Smuzhiyun 	.update 		=	null_update,
98*4882a593Smuzhiyun 	.finup 			=	null_digest,
99*4882a593Smuzhiyun 	.digest 		=	null_digest,
100*4882a593Smuzhiyun 	.final  		=	null_final,
101*4882a593Smuzhiyun 	.base			=	{
102*4882a593Smuzhiyun 		.cra_name		=	"digest_null",
103*4882a593Smuzhiyun 		.cra_driver_name	=	"digest_null-generic",
104*4882a593Smuzhiyun 		.cra_blocksize		=	NULL_BLOCK_SIZE,
105*4882a593Smuzhiyun 		.cra_module		=	THIS_MODULE,
106*4882a593Smuzhiyun 	}
107*4882a593Smuzhiyun };
108*4882a593Smuzhiyun 
109*4882a593Smuzhiyun static struct skcipher_alg skcipher_null = {
110*4882a593Smuzhiyun 	.base.cra_name		=	"ecb(cipher_null)",
111*4882a593Smuzhiyun 	.base.cra_driver_name	=	"ecb-cipher_null",
112*4882a593Smuzhiyun 	.base.cra_priority	=	100,
113*4882a593Smuzhiyun 	.base.cra_blocksize	=	NULL_BLOCK_SIZE,
114*4882a593Smuzhiyun 	.base.cra_ctxsize	=	0,
115*4882a593Smuzhiyun 	.base.cra_module	=	THIS_MODULE,
116*4882a593Smuzhiyun 	.min_keysize		=	NULL_KEY_SIZE,
117*4882a593Smuzhiyun 	.max_keysize		=	NULL_KEY_SIZE,
118*4882a593Smuzhiyun 	.ivsize			=	NULL_IV_SIZE,
119*4882a593Smuzhiyun 	.setkey			=	null_skcipher_setkey,
120*4882a593Smuzhiyun 	.encrypt		=	null_skcipher_crypt,
121*4882a593Smuzhiyun 	.decrypt		=	null_skcipher_crypt,
122*4882a593Smuzhiyun };
123*4882a593Smuzhiyun 
124*4882a593Smuzhiyun static struct crypto_alg null_algs[] = { {
125*4882a593Smuzhiyun 	.cra_name		=	"cipher_null",
126*4882a593Smuzhiyun 	.cra_driver_name	=	"cipher_null-generic",
127*4882a593Smuzhiyun 	.cra_flags		=	CRYPTO_ALG_TYPE_CIPHER,
128*4882a593Smuzhiyun 	.cra_blocksize		=	NULL_BLOCK_SIZE,
129*4882a593Smuzhiyun 	.cra_ctxsize		=	0,
130*4882a593Smuzhiyun 	.cra_module		=	THIS_MODULE,
131*4882a593Smuzhiyun 	.cra_u			=	{ .cipher = {
132*4882a593Smuzhiyun 	.cia_min_keysize	=	NULL_KEY_SIZE,
133*4882a593Smuzhiyun 	.cia_max_keysize	=	NULL_KEY_SIZE,
134*4882a593Smuzhiyun 	.cia_setkey		= 	null_setkey,
135*4882a593Smuzhiyun 	.cia_encrypt		=	null_crypt,
136*4882a593Smuzhiyun 	.cia_decrypt		=	null_crypt } }
137*4882a593Smuzhiyun }, {
138*4882a593Smuzhiyun 	.cra_name		=	"compress_null",
139*4882a593Smuzhiyun 	.cra_driver_name	=	"compress_null-generic",
140*4882a593Smuzhiyun 	.cra_flags		=	CRYPTO_ALG_TYPE_COMPRESS,
141*4882a593Smuzhiyun 	.cra_blocksize		=	NULL_BLOCK_SIZE,
142*4882a593Smuzhiyun 	.cra_ctxsize		=	0,
143*4882a593Smuzhiyun 	.cra_module		=	THIS_MODULE,
144*4882a593Smuzhiyun 	.cra_u			=	{ .compress = {
145*4882a593Smuzhiyun 	.coa_compress		=	null_compress,
146*4882a593Smuzhiyun 	.coa_decompress		=	null_compress } }
147*4882a593Smuzhiyun } };
148*4882a593Smuzhiyun 
149*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("compress_null");
150*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("digest_null");
151*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("cipher_null");
152*4882a593Smuzhiyun 
crypto_get_default_null_skcipher(void)153*4882a593Smuzhiyun struct crypto_sync_skcipher *crypto_get_default_null_skcipher(void)
154*4882a593Smuzhiyun {
155*4882a593Smuzhiyun 	struct crypto_sync_skcipher *tfm;
156*4882a593Smuzhiyun 
157*4882a593Smuzhiyun 	mutex_lock(&crypto_default_null_skcipher_lock);
158*4882a593Smuzhiyun 	tfm = crypto_default_null_skcipher;
159*4882a593Smuzhiyun 
160*4882a593Smuzhiyun 	if (!tfm) {
161*4882a593Smuzhiyun 		tfm = crypto_alloc_sync_skcipher("ecb(cipher_null)", 0, 0);
162*4882a593Smuzhiyun 		if (IS_ERR(tfm))
163*4882a593Smuzhiyun 			goto unlock;
164*4882a593Smuzhiyun 
165*4882a593Smuzhiyun 		crypto_default_null_skcipher = tfm;
166*4882a593Smuzhiyun 	}
167*4882a593Smuzhiyun 
168*4882a593Smuzhiyun 	crypto_default_null_skcipher_refcnt++;
169*4882a593Smuzhiyun 
170*4882a593Smuzhiyun unlock:
171*4882a593Smuzhiyun 	mutex_unlock(&crypto_default_null_skcipher_lock);
172*4882a593Smuzhiyun 
173*4882a593Smuzhiyun 	return tfm;
174*4882a593Smuzhiyun }
175*4882a593Smuzhiyun EXPORT_SYMBOL_GPL(crypto_get_default_null_skcipher);
176*4882a593Smuzhiyun 
crypto_put_default_null_skcipher(void)177*4882a593Smuzhiyun void crypto_put_default_null_skcipher(void)
178*4882a593Smuzhiyun {
179*4882a593Smuzhiyun 	mutex_lock(&crypto_default_null_skcipher_lock);
180*4882a593Smuzhiyun 	if (!--crypto_default_null_skcipher_refcnt) {
181*4882a593Smuzhiyun 		crypto_free_sync_skcipher(crypto_default_null_skcipher);
182*4882a593Smuzhiyun 		crypto_default_null_skcipher = NULL;
183*4882a593Smuzhiyun 	}
184*4882a593Smuzhiyun 	mutex_unlock(&crypto_default_null_skcipher_lock);
185*4882a593Smuzhiyun }
186*4882a593Smuzhiyun EXPORT_SYMBOL_GPL(crypto_put_default_null_skcipher);
187*4882a593Smuzhiyun 
crypto_null_mod_init(void)188*4882a593Smuzhiyun static int __init crypto_null_mod_init(void)
189*4882a593Smuzhiyun {
190*4882a593Smuzhiyun 	int ret = 0;
191*4882a593Smuzhiyun 
192*4882a593Smuzhiyun 	ret = crypto_register_algs(null_algs, ARRAY_SIZE(null_algs));
193*4882a593Smuzhiyun 	if (ret < 0)
194*4882a593Smuzhiyun 		goto out;
195*4882a593Smuzhiyun 
196*4882a593Smuzhiyun 	ret = crypto_register_shash(&digest_null);
197*4882a593Smuzhiyun 	if (ret < 0)
198*4882a593Smuzhiyun 		goto out_unregister_algs;
199*4882a593Smuzhiyun 
200*4882a593Smuzhiyun 	ret = crypto_register_skcipher(&skcipher_null);
201*4882a593Smuzhiyun 	if (ret < 0)
202*4882a593Smuzhiyun 		goto out_unregister_shash;
203*4882a593Smuzhiyun 
204*4882a593Smuzhiyun 	return 0;
205*4882a593Smuzhiyun 
206*4882a593Smuzhiyun out_unregister_shash:
207*4882a593Smuzhiyun 	crypto_unregister_shash(&digest_null);
208*4882a593Smuzhiyun out_unregister_algs:
209*4882a593Smuzhiyun 	crypto_unregister_algs(null_algs, ARRAY_SIZE(null_algs));
210*4882a593Smuzhiyun out:
211*4882a593Smuzhiyun 	return ret;
212*4882a593Smuzhiyun }
213*4882a593Smuzhiyun 
crypto_null_mod_fini(void)214*4882a593Smuzhiyun static void __exit crypto_null_mod_fini(void)
215*4882a593Smuzhiyun {
216*4882a593Smuzhiyun 	crypto_unregister_algs(null_algs, ARRAY_SIZE(null_algs));
217*4882a593Smuzhiyun 	crypto_unregister_shash(&digest_null);
218*4882a593Smuzhiyun 	crypto_unregister_skcipher(&skcipher_null);
219*4882a593Smuzhiyun }
220*4882a593Smuzhiyun 
221*4882a593Smuzhiyun subsys_initcall(crypto_null_mod_init);
222*4882a593Smuzhiyun module_exit(crypto_null_mod_fini);
223*4882a593Smuzhiyun 
224*4882a593Smuzhiyun MODULE_LICENSE("GPL");
225*4882a593Smuzhiyun MODULE_DESCRIPTION("Null Cryptographic Algorithms");
226