Loading...
1// SPDX-License-Identifier: GPL-2.0-or-later
2/*
3 * ECB: Electronic CodeBook mode
4 *
5 * Copyright (c) 2006 Herbert Xu <herbert@gondor.apana.org.au>
6 */
7
8#include <crypto/algapi.h>
9#include <crypto/internal/cipher.h>
10#include <crypto/internal/skcipher.h>
11#include <linux/err.h>
12#include <linux/init.h>
13#include <linux/kernel.h>
14#include <linux/module.h>
15
16static int crypto_ecb_crypt(struct skcipher_request *req,
17 struct crypto_cipher *cipher,
18 void (*fn)(struct crypto_tfm *, u8 *, const u8 *))
19{
20 const unsigned int bsize = crypto_cipher_blocksize(cipher);
21 struct skcipher_walk walk;
22 unsigned int nbytes;
23 int err;
24
25 err = skcipher_walk_virt(&walk, req, false);
26
27 while ((nbytes = walk.nbytes) != 0) {
28 const u8 *src = walk.src.virt.addr;
29 u8 *dst = walk.dst.virt.addr;
30
31 do {
32 fn(crypto_cipher_tfm(cipher), dst, src);
33
34 src += bsize;
35 dst += bsize;
36 } while ((nbytes -= bsize) >= bsize);
37
38 err = skcipher_walk_done(&walk, nbytes);
39 }
40
41 return err;
42}
43
44static int crypto_ecb_encrypt(struct skcipher_request *req)
45{
46 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
47 struct crypto_cipher *cipher = skcipher_cipher_simple(tfm);
48
49 return crypto_ecb_crypt(req, cipher,
50 crypto_cipher_alg(cipher)->cia_encrypt);
51}
52
53static int crypto_ecb_decrypt(struct skcipher_request *req)
54{
55 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
56 struct crypto_cipher *cipher = skcipher_cipher_simple(tfm);
57
58 return crypto_ecb_crypt(req, cipher,
59 crypto_cipher_alg(cipher)->cia_decrypt);
60}
61
62static int crypto_ecb_create(struct crypto_template *tmpl, struct rtattr **tb)
63{
64 struct skcipher_instance *inst;
65 int err;
66
67 inst = skcipher_alloc_instance_simple(tmpl, tb);
68 if (IS_ERR(inst))
69 return PTR_ERR(inst);
70
71 inst->alg.ivsize = 0; /* ECB mode doesn't take an IV */
72
73 inst->alg.encrypt = crypto_ecb_encrypt;
74 inst->alg.decrypt = crypto_ecb_decrypt;
75
76 err = skcipher_register_instance(tmpl, inst);
77 if (err)
78 inst->free(inst);
79
80 return err;
81}
82
83static struct crypto_template crypto_ecb_tmpl = {
84 .name = "ecb",
85 .create = crypto_ecb_create,
86 .module = THIS_MODULE,
87};
88
89static int __init crypto_ecb_module_init(void)
90{
91 return crypto_register_template(&crypto_ecb_tmpl);
92}
93
94static void __exit crypto_ecb_module_exit(void)
95{
96 crypto_unregister_template(&crypto_ecb_tmpl);
97}
98
99subsys_initcall(crypto_ecb_module_init);
100module_exit(crypto_ecb_module_exit);
101
102MODULE_LICENSE("GPL");
103MODULE_DESCRIPTION("ECB block cipher mode of operation");
104MODULE_ALIAS_CRYPTO("ecb");
1// SPDX-License-Identifier: GPL-2.0-or-later
2/*
3 * ECB: Electronic CodeBook mode
4 *
5 * Copyright (c) 2006 Herbert Xu <herbert@gondor.apana.org.au>
6 */
7
8#include <crypto/algapi.h>
9#include <crypto/internal/skcipher.h>
10#include <linux/err.h>
11#include <linux/init.h>
12#include <linux/kernel.h>
13#include <linux/module.h>
14
15static int crypto_ecb_crypt(struct skcipher_request *req,
16 struct crypto_cipher *cipher,
17 void (*fn)(struct crypto_tfm *, u8 *, const u8 *))
18{
19 const unsigned int bsize = crypto_cipher_blocksize(cipher);
20 struct skcipher_walk walk;
21 unsigned int nbytes;
22 int err;
23
24 err = skcipher_walk_virt(&walk, req, false);
25
26 while ((nbytes = walk.nbytes) != 0) {
27 const u8 *src = walk.src.virt.addr;
28 u8 *dst = walk.dst.virt.addr;
29
30 do {
31 fn(crypto_cipher_tfm(cipher), dst, src);
32
33 src += bsize;
34 dst += bsize;
35 } while ((nbytes -= bsize) >= bsize);
36
37 err = skcipher_walk_done(&walk, nbytes);
38 }
39
40 return err;
41}
42
43static int crypto_ecb_encrypt(struct skcipher_request *req)
44{
45 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
46 struct crypto_cipher *cipher = skcipher_cipher_simple(tfm);
47
48 return crypto_ecb_crypt(req, cipher,
49 crypto_cipher_alg(cipher)->cia_encrypt);
50}
51
52static int crypto_ecb_decrypt(struct skcipher_request *req)
53{
54 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
55 struct crypto_cipher *cipher = skcipher_cipher_simple(tfm);
56
57 return crypto_ecb_crypt(req, cipher,
58 crypto_cipher_alg(cipher)->cia_decrypt);
59}
60
61static int crypto_ecb_create(struct crypto_template *tmpl, struct rtattr **tb)
62{
63 struct skcipher_instance *inst;
64 struct crypto_alg *alg;
65 int err;
66
67 inst = skcipher_alloc_instance_simple(tmpl, tb, &alg);
68 if (IS_ERR(inst))
69 return PTR_ERR(inst);
70
71 inst->alg.ivsize = 0; /* ECB mode doesn't take an IV */
72
73 inst->alg.encrypt = crypto_ecb_encrypt;
74 inst->alg.decrypt = crypto_ecb_decrypt;
75
76 err = skcipher_register_instance(tmpl, inst);
77 if (err)
78 inst->free(inst);
79 crypto_mod_put(alg);
80 return err;
81}
82
83static struct crypto_template crypto_ecb_tmpl = {
84 .name = "ecb",
85 .create = crypto_ecb_create,
86 .module = THIS_MODULE,
87};
88
89static int __init crypto_ecb_module_init(void)
90{
91 return crypto_register_template(&crypto_ecb_tmpl);
92}
93
94static void __exit crypto_ecb_module_exit(void)
95{
96 crypto_unregister_template(&crypto_ecb_tmpl);
97}
98
99subsys_initcall(crypto_ecb_module_init);
100module_exit(crypto_ecb_module_exit);
101
102MODULE_LICENSE("GPL");
103MODULE_DESCRIPTION("ECB block cipher mode of operation");
104MODULE_ALIAS_CRYPTO("ecb");