Jason Cooper | 449bb81 | 2014-03-24 01:48:58 +0000 | [diff] [blame] | 1 | |
| 2 | |
Jason Cooper | c2c7426 | 2014-03-24 02:32:49 +0000 | [diff] [blame] | 3 | #include <linux/string.h> |
Jason Cooper | 449bb81 | 2014-03-24 01:48:58 +0000 | [diff] [blame] | 4 | #include <threefishApi.h> |
Jason Cooper | 449bb81 | 2014-03-24 01:48:58 +0000 | [diff] [blame] | 5 | |
Anton Saraev | 95f1840a | 2014-05-19 12:09:55 +0400 | [diff] [blame^] | 6 | void threefish_set_key(struct threefish_key *key_ctx, |
| 7 | enum threefish_size state_size, |
| 8 | u64 *key_data, u64 *tweak) |
Jason Cooper | 449bb81 | 2014-03-24 01:48:58 +0000 | [diff] [blame] | 9 | { |
Anton Saraev | 95f1840a | 2014-05-19 12:09:55 +0400 | [diff] [blame^] | 10 | int key_words = state_size / 64; |
Jason Cooper | 39bd42b | 2014-03-24 01:49:09 +0000 | [diff] [blame] | 11 | int i; |
| 12 | u64 parity = KeyScheduleConst; |
Jason Cooper | 449bb81 | 2014-03-24 01:48:58 +0000 | [diff] [blame] | 13 | |
Anton Saraev | 95f1840a | 2014-05-19 12:09:55 +0400 | [diff] [blame^] | 14 | key_ctx->tweak[0] = tweak[0]; |
| 15 | key_ctx->tweak[1] = tweak[1]; |
| 16 | key_ctx->tweak[2] = tweak[0] ^ tweak[1]; |
Jason Cooper | 449bb81 | 2014-03-24 01:48:58 +0000 | [diff] [blame] | 17 | |
Anton Saraev | 95f1840a | 2014-05-19 12:09:55 +0400 | [diff] [blame^] | 18 | for (i = 0; i < key_words; i++) { |
| 19 | key_ctx->key[i] = key_data[i]; |
| 20 | parity ^= key_data[i]; |
Jason Cooper | 39bd42b | 2014-03-24 01:49:09 +0000 | [diff] [blame] | 21 | } |
Anton Saraev | 95f1840a | 2014-05-19 12:09:55 +0400 | [diff] [blame^] | 22 | key_ctx->key[i] = parity; |
| 23 | key_ctx->state_size = state_size; |
Jason Cooper | 449bb81 | 2014-03-24 01:48:58 +0000 | [diff] [blame] | 24 | } |
| 25 | |
Anton Saraev | 95f1840a | 2014-05-19 12:09:55 +0400 | [diff] [blame^] | 26 | void threefish_encrypt_block_bytes(struct threefish_key *key_ctx, u8 *in, |
Anton Saraev | 68ace62 | 2014-05-19 12:09:54 +0400 | [diff] [blame] | 27 | u8 *out) |
Jason Cooper | 449bb81 | 2014-03-24 01:48:58 +0000 | [diff] [blame] | 28 | { |
Jason Cooper | 39bd42b | 2014-03-24 01:49:09 +0000 | [diff] [blame] | 29 | u64 plain[SKEIN_MAX_STATE_WORDS]; /* max number of words*/ |
| 30 | u64 cipher[SKEIN_MAX_STATE_WORDS]; |
| 31 | |
Anton Saraev | 95f1840a | 2014-05-19 12:09:55 +0400 | [diff] [blame^] | 32 | Skein_Get64_LSB_First(plain, in, key_ctx->state_size / 64); |
| 33 | threefish_encrypt_block_words(key_ctx, plain, cipher); |
| 34 | Skein_Put64_LSB_First(out, cipher, key_ctx->state_size / 8); |
Jason Cooper | 449bb81 | 2014-03-24 01:48:58 +0000 | [diff] [blame] | 35 | } |
| 36 | |
Anton Saraev | 95f1840a | 2014-05-19 12:09:55 +0400 | [diff] [blame^] | 37 | void threefish_encrypt_block_words(struct threefish_key *key_ctx, u64 *in, |
Anton Saraev | 68ace62 | 2014-05-19 12:09:54 +0400 | [diff] [blame] | 38 | u64 *out) |
Jason Cooper | 449bb81 | 2014-03-24 01:48:58 +0000 | [diff] [blame] | 39 | { |
Anton Saraev | 95f1840a | 2014-05-19 12:09:55 +0400 | [diff] [blame^] | 40 | switch (key_ctx->state_size) { |
Jason Cooper | 39bd42b | 2014-03-24 01:49:09 +0000 | [diff] [blame] | 41 | case Threefish256: |
Anton Saraev | 95f1840a | 2014-05-19 12:09:55 +0400 | [diff] [blame^] | 42 | threefish_encrypt_256(key_ctx, in, out); |
Jason Cooper | 39bd42b | 2014-03-24 01:49:09 +0000 | [diff] [blame] | 43 | break; |
| 44 | case Threefish512: |
Anton Saraev | 95f1840a | 2014-05-19 12:09:55 +0400 | [diff] [blame^] | 45 | threefish_encrypt_512(key_ctx, in, out); |
Jason Cooper | 39bd42b | 2014-03-24 01:49:09 +0000 | [diff] [blame] | 46 | break; |
| 47 | case Threefish1024: |
Anton Saraev | 95f1840a | 2014-05-19 12:09:55 +0400 | [diff] [blame^] | 48 | threefish_encrypt_1024(key_ctx, in, out); |
Jason Cooper | 39bd42b | 2014-03-24 01:49:09 +0000 | [diff] [blame] | 49 | break; |
| 50 | } |
Jason Cooper | 449bb81 | 2014-03-24 01:48:58 +0000 | [diff] [blame] | 51 | } |
| 52 | |
Anton Saraev | 95f1840a | 2014-05-19 12:09:55 +0400 | [diff] [blame^] | 53 | void threefish_decrypt_block_bytes(struct threefish_key *key_ctx, u8 *in, |
Anton Saraev | 68ace62 | 2014-05-19 12:09:54 +0400 | [diff] [blame] | 54 | u8 *out) |
Jason Cooper | 449bb81 | 2014-03-24 01:48:58 +0000 | [diff] [blame] | 55 | { |
Jason Cooper | 39bd42b | 2014-03-24 01:49:09 +0000 | [diff] [blame] | 56 | u64 plain[SKEIN_MAX_STATE_WORDS]; /* max number of words*/ |
| 57 | u64 cipher[SKEIN_MAX_STATE_WORDS]; |
| 58 | |
Anton Saraev | 95f1840a | 2014-05-19 12:09:55 +0400 | [diff] [blame^] | 59 | Skein_Get64_LSB_First(cipher, in, key_ctx->state_size / 64); |
| 60 | threefish_decrypt_block_words(key_ctx, cipher, plain); |
| 61 | Skein_Put64_LSB_First(out, plain, key_ctx->state_size / 8); |
Jason Cooper | 449bb81 | 2014-03-24 01:48:58 +0000 | [diff] [blame] | 62 | } |
| 63 | |
Anton Saraev | 95f1840a | 2014-05-19 12:09:55 +0400 | [diff] [blame^] | 64 | void threefish_decrypt_block_words(struct threefish_key *key_ctx, u64 *in, |
Anton Saraev | 68ace62 | 2014-05-19 12:09:54 +0400 | [diff] [blame] | 65 | u64 *out) |
Jason Cooper | 449bb81 | 2014-03-24 01:48:58 +0000 | [diff] [blame] | 66 | { |
Anton Saraev | 95f1840a | 2014-05-19 12:09:55 +0400 | [diff] [blame^] | 67 | switch (key_ctx->state_size) { |
Jason Cooper | 39bd42b | 2014-03-24 01:49:09 +0000 | [diff] [blame] | 68 | case Threefish256: |
Anton Saraev | 95f1840a | 2014-05-19 12:09:55 +0400 | [diff] [blame^] | 69 | threefish_decrypt_256(key_ctx, in, out); |
Jason Cooper | 39bd42b | 2014-03-24 01:49:09 +0000 | [diff] [blame] | 70 | break; |
| 71 | case Threefish512: |
Anton Saraev | 95f1840a | 2014-05-19 12:09:55 +0400 | [diff] [blame^] | 72 | threefish_decrypt_512(key_ctx, in, out); |
Jason Cooper | 39bd42b | 2014-03-24 01:49:09 +0000 | [diff] [blame] | 73 | break; |
| 74 | case Threefish1024: |
Anton Saraev | 95f1840a | 2014-05-19 12:09:55 +0400 | [diff] [blame^] | 75 | threefish_decrypt_1024(key_ctx, in, out); |
Jason Cooper | 39bd42b | 2014-03-24 01:49:09 +0000 | [diff] [blame] | 76 | break; |
| 77 | } |
Jason Cooper | 449bb81 | 2014-03-24 01:48:58 +0000 | [diff] [blame] | 78 | } |
| 79 | |