1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /*
3 * Copyright (C) 2006
4 * NTT (Nippon Telegraph and Telephone Corporation).
5 */
6
7 /*
8 * Algorithm Specification
9 * https://info.isl.ntt.co.jp/crypt/eng/camellia/specifications.html
10 */
11
12 #include <crypto/algapi.h>
13 #include <linux/errno.h>
14 #include <linux/init.h>
15 #include <linux/kernel.h>
16 #include <linux/module.h>
17 #include <linux/bitops.h>
18 #include <linux/unaligned.h>
19
20 static const u32 camellia_sp1110[256] = {
21 0x70707000, 0x82828200, 0x2c2c2c00, 0xececec00,
22 0xb3b3b300, 0x27272700, 0xc0c0c000, 0xe5e5e500,
23 0xe4e4e400, 0x85858500, 0x57575700, 0x35353500,
24 0xeaeaea00, 0x0c0c0c00, 0xaeaeae00, 0x41414100,
25 0x23232300, 0xefefef00, 0x6b6b6b00, 0x93939300,
26 0x45454500, 0x19191900, 0xa5a5a500, 0x21212100,
27 0xededed00, 0x0e0e0e00, 0x4f4f4f00, 0x4e4e4e00,
28 0x1d1d1d00, 0x65656500, 0x92929200, 0xbdbdbd00,
29 0x86868600, 0xb8b8b800, 0xafafaf00, 0x8f8f8f00,
30 0x7c7c7c00, 0xebebeb00, 0x1f1f1f00, 0xcecece00,
31 0x3e3e3e00, 0x30303000, 0xdcdcdc00, 0x5f5f5f00,
32 0x5e5e5e00, 0xc5c5c500, 0x0b0b0b00, 0x1a1a1a00,
33 0xa6a6a600, 0xe1e1e100, 0x39393900, 0xcacaca00,
34 0xd5d5d500, 0x47474700, 0x5d5d5d00, 0x3d3d3d00,
35 0xd9d9d900, 0x01010100, 0x5a5a5a00, 0xd6d6d600,
36 0x51515100, 0x56565600, 0x6c6c6c00, 0x4d4d4d00,
37 0x8b8b8b00, 0x0d0d0d00, 0x9a9a9a00, 0x66666600,
38 0xfbfbfb00, 0xcccccc00, 0xb0b0b000, 0x2d2d2d00,
39 0x74747400, 0x12121200, 0x2b2b2b00, 0x20202000,
40 0xf0f0f000, 0xb1b1b100, 0x84848400, 0x99999900,
41 0xdfdfdf00, 0x4c4c4c00, 0xcbcbcb00, 0xc2c2c200,
42 0x34343400, 0x7e7e7e00, 0x76767600, 0x05050500,
43 0x6d6d6d00, 0xb7b7b700, 0xa9a9a900, 0x31313100,
44 0xd1d1d100, 0x17171700, 0x04040400, 0xd7d7d700,
45 0x14141400, 0x58585800, 0x3a3a3a00, 0x61616100,
46 0xdedede00, 0x1b1b1b00, 0x11111100, 0x1c1c1c00,
47 0x32323200, 0x0f0f0f00, 0x9c9c9c00, 0x16161600,
48 0x53535300, 0x18181800, 0xf2f2f200, 0x22222200,
49 0xfefefe00, 0x44444400, 0xcfcfcf00, 0xb2b2b200,
50 0xc3c3c300, 0xb5b5b500, 0x7a7a7a00, 0x91919100,
51 0x24242400, 0x08080800, 0xe8e8e800, 0xa8a8a800,
52 0x60606000, 0xfcfcfc00, 0x69696900, 0x50505000,
53 0xaaaaaa00, 0xd0d0d000, 0xa0a0a000, 0x7d7d7d00,
54 0xa1a1a100, 0x89898900, 0x62626200, 0x97979700,
55 0x54545400, 0x5b5b5b00, 0x1e1e1e00, 0x95959500,
56 0xe0e0e000, 0xffffff00, 0x64646400, 0xd2d2d200,
57 0x10101000, 0xc4c4c400, 0x00000000, 0x48484800,
58 0xa3a3a300, 0xf7f7f700, 0x75757500, 0xdbdbdb00,
59 0x8a8a8a00, 0x03030300, 0xe6e6e600, 0xdadada00,
60 0x09090900, 0x3f3f3f00, 0xdddddd00, 0x94949400,
61 0x87878700, 0x5c5c5c00, 0x83838300, 0x02020200,
62 0xcdcdcd00, 0x4a4a4a00, 0x90909000, 0x33333300,
63 0x73737300, 0x67676700, 0xf6f6f600, 0xf3f3f300,
64 0x9d9d9d00, 0x7f7f7f00, 0xbfbfbf00, 0xe2e2e200,
65 0x52525200, 0x9b9b9b00, 0xd8d8d800, 0x26262600,
66 0xc8c8c800, 0x37373700, 0xc6c6c600, 0x3b3b3b00,
67 0x81818100, 0x96969600, 0x6f6f6f00, 0x4b4b4b00,
68 0x13131300, 0xbebebe00, 0x63636300, 0x2e2e2e00,
69 0xe9e9e900, 0x79797900, 0xa7a7a700, 0x8c8c8c00,
70 0x9f9f9f00, 0x6e6e6e00, 0xbcbcbc00, 0x8e8e8e00,
71 0x29292900, 0xf5f5f500, 0xf9f9f900, 0xb6b6b600,
72 0x2f2f2f00, 0xfdfdfd00, 0xb4b4b400, 0x59595900,
73 0x78787800, 0x98989800, 0x06060600, 0x6a6a6a00,
74 0xe7e7e700, 0x46464600, 0x71717100, 0xbababa00,
75 0xd4d4d400, 0x25252500, 0xababab00, 0x42424200,
76 0x88888800, 0xa2a2a200, 0x8d8d8d00, 0xfafafa00,
77 0x72727200, 0x07070700, 0xb9b9b900, 0x55555500,
78 0xf8f8f800, 0xeeeeee00, 0xacacac00, 0x0a0a0a00,
79 0x36363600, 0x49494900, 0x2a2a2a00, 0x68686800,
80 0x3c3c3c00, 0x38383800, 0xf1f1f100, 0xa4a4a400,
81 0x40404000, 0x28282800, 0xd3d3d300, 0x7b7b7b00,
82 0xbbbbbb00, 0xc9c9c900, 0x43434300, 0xc1c1c100,
83 0x15151500, 0xe3e3e300, 0xadadad00, 0xf4f4f400,
84 0x77777700, 0xc7c7c700, 0x80808000, 0x9e9e9e00,
85 };
86
87 static const u32 camellia_sp0222[256] = {
88 0x00e0e0e0, 0x00050505, 0x00585858, 0x00d9d9d9,
89 0x00676767, 0x004e4e4e, 0x00818181, 0x00cbcbcb,
90 0x00c9c9c9, 0x000b0b0b, 0x00aeaeae, 0x006a6a6a,
91 0x00d5d5d5, 0x00181818, 0x005d5d5d, 0x00828282,
92 0x00464646, 0x00dfdfdf, 0x00d6d6d6, 0x00272727,
93 0x008a8a8a, 0x00323232, 0x004b4b4b, 0x00424242,
94 0x00dbdbdb, 0x001c1c1c, 0x009e9e9e, 0x009c9c9c,
95 0x003a3a3a, 0x00cacaca, 0x00252525, 0x007b7b7b,
96 0x000d0d0d, 0x00717171, 0x005f5f5f, 0x001f1f1f,
97 0x00f8f8f8, 0x00d7d7d7, 0x003e3e3e, 0x009d9d9d,
98 0x007c7c7c, 0x00606060, 0x00b9b9b9, 0x00bebebe,
99 0x00bcbcbc, 0x008b8b8b, 0x00161616, 0x00343434,
100 0x004d4d4d, 0x00c3c3c3, 0x00727272, 0x00959595,
101 0x00ababab, 0x008e8e8e, 0x00bababa, 0x007a7a7a,
102 0x00b3b3b3, 0x00020202, 0x00b4b4b4, 0x00adadad,
103 0x00a2a2a2, 0x00acacac, 0x00d8d8d8, 0x009a9a9a,
104 0x00171717, 0x001a1a1a, 0x00353535, 0x00cccccc,
105 0x00f7f7f7, 0x00999999, 0x00616161, 0x005a5a5a,
106 0x00e8e8e8, 0x00242424, 0x00565656, 0x00404040,
107 0x00e1e1e1, 0x00636363, 0x00090909, 0x00333333,
108 0x00bfbfbf, 0x00989898, 0x00979797, 0x00858585,
109 0x00686868, 0x00fcfcfc, 0x00ececec, 0x000a0a0a,
110 0x00dadada, 0x006f6f6f, 0x00535353, 0x00626262,
111 0x00a3a3a3, 0x002e2e2e, 0x00080808, 0x00afafaf,
112 0x00282828, 0x00b0b0b0, 0x00747474, 0x00c2c2c2,
113 0x00bdbdbd, 0x00363636, 0x00222222, 0x00383838,
114 0x00646464, 0x001e1e1e, 0x00393939, 0x002c2c2c,
115 0x00a6a6a6, 0x00303030, 0x00e5e5e5, 0x00444444,
116 0x00fdfdfd, 0x00888888, 0x009f9f9f, 0x00656565,
117 0x00878787, 0x006b6b6b, 0x00f4f4f4, 0x00232323,
118 0x00484848, 0x00101010, 0x00d1d1d1, 0x00515151,
119 0x00c0c0c0, 0x00f9f9f9, 0x00d2d2d2, 0x00a0a0a0,
120 0x00555555, 0x00a1a1a1, 0x00414141, 0x00fafafa,
121 0x00434343, 0x00131313, 0x00c4c4c4, 0x002f2f2f,
122 0x00a8a8a8, 0x00b6b6b6, 0x003c3c3c, 0x002b2b2b,
123 0x00c1c1c1, 0x00ffffff, 0x00c8c8c8, 0x00a5a5a5,
124 0x00202020, 0x00898989, 0x00000000, 0x00909090,
125 0x00474747, 0x00efefef, 0x00eaeaea, 0x00b7b7b7,
126 0x00151515, 0x00060606, 0x00cdcdcd, 0x00b5b5b5,
127 0x00121212, 0x007e7e7e, 0x00bbbbbb, 0x00292929,
128 0x000f0f0f, 0x00b8b8b8, 0x00070707, 0x00040404,
129 0x009b9b9b, 0x00949494, 0x00212121, 0x00666666,
130 0x00e6e6e6, 0x00cecece, 0x00ededed, 0x00e7e7e7,
131 0x003b3b3b, 0x00fefefe, 0x007f7f7f, 0x00c5c5c5,
132 0x00a4a4a4, 0x00373737, 0x00b1b1b1, 0x004c4c4c,
133 0x00919191, 0x006e6e6e, 0x008d8d8d, 0x00767676,
134 0x00030303, 0x002d2d2d, 0x00dedede, 0x00969696,
135 0x00262626, 0x007d7d7d, 0x00c6c6c6, 0x005c5c5c,
136 0x00d3d3d3, 0x00f2f2f2, 0x004f4f4f, 0x00191919,
137 0x003f3f3f, 0x00dcdcdc, 0x00797979, 0x001d1d1d,
138 0x00525252, 0x00ebebeb, 0x00f3f3f3, 0x006d6d6d,
139 0x005e5e5e, 0x00fbfbfb, 0x00696969, 0x00b2b2b2,
140 0x00f0f0f0, 0x00313131, 0x000c0c0c, 0x00d4d4d4,
141 0x00cfcfcf, 0x008c8c8c, 0x00e2e2e2, 0x00757575,
142 0x00a9a9a9, 0x004a4a4a, 0x00575757, 0x00848484,
143 0x00111111, 0x00454545, 0x001b1b1b, 0x00f5f5f5,
144 0x00e4e4e4, 0x000e0e0e, 0x00737373, 0x00aaaaaa,
145 0x00f1f1f1, 0x00dddddd, 0x00595959, 0x00141414,
146 0x006c6c6c, 0x00929292, 0x00545454, 0x00d0d0d0,
147 0x00787878, 0x00707070, 0x00e3e3e3, 0x00494949,
148 0x00808080, 0x00505050, 0x00a7a7a7, 0x00f6f6f6,
149 0x00777777, 0x00939393, 0x00868686, 0x00838383,
150 0x002a2a2a, 0x00c7c7c7, 0x005b5b5b, 0x00e9e9e9,
151 0x00eeeeee, 0x008f8f8f, 0x00010101, 0x003d3d3d,
152 };
153
154 static const u32 camellia_sp3033[256] = {
155 0x38003838, 0x41004141, 0x16001616, 0x76007676,
156 0xd900d9d9, 0x93009393, 0x60006060, 0xf200f2f2,
157 0x72007272, 0xc200c2c2, 0xab00abab, 0x9a009a9a,
158 0x75007575, 0x06000606, 0x57005757, 0xa000a0a0,
159 0x91009191, 0xf700f7f7, 0xb500b5b5, 0xc900c9c9,
160 0xa200a2a2, 0x8c008c8c, 0xd200d2d2, 0x90009090,
161 0xf600f6f6, 0x07000707, 0xa700a7a7, 0x27002727,
162 0x8e008e8e, 0xb200b2b2, 0x49004949, 0xde00dede,
163 0x43004343, 0x5c005c5c, 0xd700d7d7, 0xc700c7c7,
164 0x3e003e3e, 0xf500f5f5, 0x8f008f8f, 0x67006767,
165 0x1f001f1f, 0x18001818, 0x6e006e6e, 0xaf00afaf,
166 0x2f002f2f, 0xe200e2e2, 0x85008585, 0x0d000d0d,
167 0x53005353, 0xf000f0f0, 0x9c009c9c, 0x65006565,
168 0xea00eaea, 0xa300a3a3, 0xae00aeae, 0x9e009e9e,
169 0xec00ecec, 0x80008080, 0x2d002d2d, 0x6b006b6b,
170 0xa800a8a8, 0x2b002b2b, 0x36003636, 0xa600a6a6,
171 0xc500c5c5, 0x86008686, 0x4d004d4d, 0x33003333,
172 0xfd00fdfd, 0x66006666, 0x58005858, 0x96009696,
173 0x3a003a3a, 0x09000909, 0x95009595, 0x10001010,
174 0x78007878, 0xd800d8d8, 0x42004242, 0xcc00cccc,
175 0xef00efef, 0x26002626, 0xe500e5e5, 0x61006161,
176 0x1a001a1a, 0x3f003f3f, 0x3b003b3b, 0x82008282,
177 0xb600b6b6, 0xdb00dbdb, 0xd400d4d4, 0x98009898,
178 0xe800e8e8, 0x8b008b8b, 0x02000202, 0xeb00ebeb,
179 0x0a000a0a, 0x2c002c2c, 0x1d001d1d, 0xb000b0b0,
180 0x6f006f6f, 0x8d008d8d, 0x88008888, 0x0e000e0e,
181 0x19001919, 0x87008787, 0x4e004e4e, 0x0b000b0b,
182 0xa900a9a9, 0x0c000c0c, 0x79007979, 0x11001111,
183 0x7f007f7f, 0x22002222, 0xe700e7e7, 0x59005959,
184 0xe100e1e1, 0xda00dada, 0x3d003d3d, 0xc800c8c8,
185 0x12001212, 0x04000404, 0x74007474, 0x54005454,
186 0x30003030, 0x7e007e7e, 0xb400b4b4, 0x28002828,
187 0x55005555, 0x68006868, 0x50005050, 0xbe00bebe,
188 0xd000d0d0, 0xc400c4c4, 0x31003131, 0xcb00cbcb,
189 0x2a002a2a, 0xad00adad, 0x0f000f0f, 0xca00caca,
190 0x70007070, 0xff00ffff, 0x32003232, 0x69006969,
191 0x08000808, 0x62006262, 0x00000000, 0x24002424,
192 0xd100d1d1, 0xfb00fbfb, 0xba00baba, 0xed00eded,
193 0x45004545, 0x81008181, 0x73007373, 0x6d006d6d,
194 0x84008484, 0x9f009f9f, 0xee00eeee, 0x4a004a4a,
195 0xc300c3c3, 0x2e002e2e, 0xc100c1c1, 0x01000101,
196 0xe600e6e6, 0x25002525, 0x48004848, 0x99009999,
197 0xb900b9b9, 0xb300b3b3, 0x7b007b7b, 0xf900f9f9,
198 0xce00cece, 0xbf00bfbf, 0xdf00dfdf, 0x71007171,
199 0x29002929, 0xcd00cdcd, 0x6c006c6c, 0x13001313,
200 0x64006464, 0x9b009b9b, 0x63006363, 0x9d009d9d,
201 0xc000c0c0, 0x4b004b4b, 0xb700b7b7, 0xa500a5a5,
202 0x89008989, 0x5f005f5f, 0xb100b1b1, 0x17001717,
203 0xf400f4f4, 0xbc00bcbc, 0xd300d3d3, 0x46004646,
204 0xcf00cfcf, 0x37003737, 0x5e005e5e, 0x47004747,
205 0x94009494, 0xfa00fafa, 0xfc00fcfc, 0x5b005b5b,
206 0x97009797, 0xfe00fefe, 0x5a005a5a, 0xac00acac,
207 0x3c003c3c, 0x4c004c4c, 0x03000303, 0x35003535,
208 0xf300f3f3, 0x23002323, 0xb800b8b8, 0x5d005d5d,
209 0x6a006a6a, 0x92009292, 0xd500d5d5, 0x21002121,
210 0x44004444, 0x51005151, 0xc600c6c6, 0x7d007d7d,
211 0x39003939, 0x83008383, 0xdc00dcdc, 0xaa00aaaa,
212 0x7c007c7c, 0x77007777, 0x56005656, 0x05000505,
213 0x1b001b1b, 0xa400a4a4, 0x15001515, 0x34003434,
214 0x1e001e1e, 0x1c001c1c, 0xf800f8f8, 0x52005252,
215 0x20002020, 0x14001414, 0xe900e9e9, 0xbd00bdbd,
216 0xdd00dddd, 0xe400e4e4, 0xa100a1a1, 0xe000e0e0,
217 0x8a008a8a, 0xf100f1f1, 0xd600d6d6, 0x7a007a7a,
218 0xbb00bbbb, 0xe300e3e3, 0x40004040, 0x4f004f4f,
219 };
220
221 static const u32 camellia_sp4404[256] = {
222 0x70700070, 0x2c2c002c, 0xb3b300b3, 0xc0c000c0,
223 0xe4e400e4, 0x57570057, 0xeaea00ea, 0xaeae00ae,
224 0x23230023, 0x6b6b006b, 0x45450045, 0xa5a500a5,
225 0xeded00ed, 0x4f4f004f, 0x1d1d001d, 0x92920092,
226 0x86860086, 0xafaf00af, 0x7c7c007c, 0x1f1f001f,
227 0x3e3e003e, 0xdcdc00dc, 0x5e5e005e, 0x0b0b000b,
228 0xa6a600a6, 0x39390039, 0xd5d500d5, 0x5d5d005d,
229 0xd9d900d9, 0x5a5a005a, 0x51510051, 0x6c6c006c,
230 0x8b8b008b, 0x9a9a009a, 0xfbfb00fb, 0xb0b000b0,
231 0x74740074, 0x2b2b002b, 0xf0f000f0, 0x84840084,
232 0xdfdf00df, 0xcbcb00cb, 0x34340034, 0x76760076,
233 0x6d6d006d, 0xa9a900a9, 0xd1d100d1, 0x04040004,
234 0x14140014, 0x3a3a003a, 0xdede00de, 0x11110011,
235 0x32320032, 0x9c9c009c, 0x53530053, 0xf2f200f2,
236 0xfefe00fe, 0xcfcf00cf, 0xc3c300c3, 0x7a7a007a,
237 0x24240024, 0xe8e800e8, 0x60600060, 0x69690069,
238 0xaaaa00aa, 0xa0a000a0, 0xa1a100a1, 0x62620062,
239 0x54540054, 0x1e1e001e, 0xe0e000e0, 0x64640064,
240 0x10100010, 0x00000000, 0xa3a300a3, 0x75750075,
241 0x8a8a008a, 0xe6e600e6, 0x09090009, 0xdddd00dd,
242 0x87870087, 0x83830083, 0xcdcd00cd, 0x90900090,
243 0x73730073, 0xf6f600f6, 0x9d9d009d, 0xbfbf00bf,
244 0x52520052, 0xd8d800d8, 0xc8c800c8, 0xc6c600c6,
245 0x81810081, 0x6f6f006f, 0x13130013, 0x63630063,
246 0xe9e900e9, 0xa7a700a7, 0x9f9f009f, 0xbcbc00bc,
247 0x29290029, 0xf9f900f9, 0x2f2f002f, 0xb4b400b4,
248 0x78780078, 0x06060006, 0xe7e700e7, 0x71710071,
249 0xd4d400d4, 0xabab00ab, 0x88880088, 0x8d8d008d,
250 0x72720072, 0xb9b900b9, 0xf8f800f8, 0xacac00ac,
251 0x36360036, 0x2a2a002a, 0x3c3c003c, 0xf1f100f1,
252 0x40400040, 0xd3d300d3, 0xbbbb00bb, 0x43430043,
253 0x15150015, 0xadad00ad, 0x77770077, 0x80800080,
254 0x82820082, 0xecec00ec, 0x27270027, 0xe5e500e5,
255 0x85850085, 0x35350035, 0x0c0c000c, 0x41410041,
256 0xefef00ef, 0x93930093, 0x19190019, 0x21210021,
257 0x0e0e000e, 0x4e4e004e, 0x65650065, 0xbdbd00bd,
258 0xb8b800b8, 0x8f8f008f, 0xebeb00eb, 0xcece00ce,
259 0x30300030, 0x5f5f005f, 0xc5c500c5, 0x1a1a001a,
260 0xe1e100e1, 0xcaca00ca, 0x47470047, 0x3d3d003d,
261 0x01010001, 0xd6d600d6, 0x56560056, 0x4d4d004d,
262 0x0d0d000d, 0x66660066, 0xcccc00cc, 0x2d2d002d,
263 0x12120012, 0x20200020, 0xb1b100b1, 0x99990099,
264 0x4c4c004c, 0xc2c200c2, 0x7e7e007e, 0x05050005,
265 0xb7b700b7, 0x31310031, 0x17170017, 0xd7d700d7,
266 0x58580058, 0x61610061, 0x1b1b001b, 0x1c1c001c,
267 0x0f0f000f, 0x16160016, 0x18180018, 0x22220022,
268 0x44440044, 0xb2b200b2, 0xb5b500b5, 0x91910091,
269 0x08080008, 0xa8a800a8, 0xfcfc00fc, 0x50500050,
270 0xd0d000d0, 0x7d7d007d, 0x89890089, 0x97970097,
271 0x5b5b005b, 0x95950095, 0xffff00ff, 0xd2d200d2,
272 0xc4c400c4, 0x48480048, 0xf7f700f7, 0xdbdb00db,
273 0x03030003, 0xdada00da, 0x3f3f003f, 0x94940094,
274 0x5c5c005c, 0x02020002, 0x4a4a004a, 0x33330033,
275 0x67670067, 0xf3f300f3, 0x7f7f007f, 0xe2e200e2,
276 0x9b9b009b, 0x26260026, 0x37370037, 0x3b3b003b,
277 0x96960096, 0x4b4b004b, 0xbebe00be, 0x2e2e002e,
278 0x79790079, 0x8c8c008c, 0x6e6e006e, 0x8e8e008e,
279 0xf5f500f5, 0xb6b600b6, 0xfdfd00fd, 0x59590059,
280 0x98980098, 0x6a6a006a, 0x46460046, 0xbaba00ba,
281 0x25250025, 0x42420042, 0xa2a200a2, 0xfafa00fa,
282 0x07070007, 0x55550055, 0xeeee00ee, 0x0a0a000a,
283 0x49490049, 0x68680068, 0x38380038, 0xa4a400a4,
284 0x28280028, 0x7b7b007b, 0xc9c900c9, 0xc1c100c1,
285 0xe3e300e3, 0xf4f400f4, 0xc7c700c7, 0x9e9e009e,
286 };
287
288
289 #define CAMELLIA_MIN_KEY_SIZE 16
290 #define CAMELLIA_MAX_KEY_SIZE 32
291 #define CAMELLIA_BLOCK_SIZE 16
292 #define CAMELLIA_TABLE_BYTE_LEN 272
293
294 /*
295 * NB: L and R below stand for 'left' and 'right' as in written numbers.
296 * That is, in (xxxL,xxxR) pair xxxL holds most significant digits,
297 * _not_ least significant ones!
298 */
299
300
301 /* key constants */
302
303 #define CAMELLIA_SIGMA1L (0xA09E667FL)
304 #define CAMELLIA_SIGMA1R (0x3BCC908BL)
305 #define CAMELLIA_SIGMA2L (0xB67AE858L)
306 #define CAMELLIA_SIGMA2R (0x4CAA73B2L)
307 #define CAMELLIA_SIGMA3L (0xC6EF372FL)
308 #define CAMELLIA_SIGMA3R (0xE94F82BEL)
309 #define CAMELLIA_SIGMA4L (0x54FF53A5L)
310 #define CAMELLIA_SIGMA4R (0xF1D36F1CL)
311 #define CAMELLIA_SIGMA5L (0x10E527FAL)
312 #define CAMELLIA_SIGMA5R (0xDE682D1DL)
313 #define CAMELLIA_SIGMA6L (0xB05688C2L)
314 #define CAMELLIA_SIGMA6R (0xB3E6C1FDL)
315
316 /*
317 * macros
318 */
319 #define ROLDQ(ll, lr, rl, rr, w0, w1, bits) ({ \
320 w0 = ll; \
321 ll = (ll << bits) + (lr >> (32 - bits)); \
322 lr = (lr << bits) + (rl >> (32 - bits)); \
323 rl = (rl << bits) + (rr >> (32 - bits)); \
324 rr = (rr << bits) + (w0 >> (32 - bits)); \
325 })
326
327 #define ROLDQo32(ll, lr, rl, rr, w0, w1, bits) ({ \
328 w0 = ll; \
329 w1 = lr; \
330 ll = (lr << (bits - 32)) + (rl >> (64 - bits)); \
331 lr = (rl << (bits - 32)) + (rr >> (64 - bits)); \
332 rl = (rr << (bits - 32)) + (w0 >> (64 - bits)); \
333 rr = (w0 << (bits - 32)) + (w1 >> (64 - bits)); \
334 })
335
336 #define CAMELLIA_F(xl, xr, kl, kr, yl, yr, il, ir, t0, t1) ({ \
337 il = xl ^ kl; \
338 ir = xr ^ kr; \
339 t0 = il >> 16; \
340 t1 = ir >> 16; \
341 yl = camellia_sp1110[(u8)(ir)] \
342 ^ camellia_sp0222[(u8)(t1 >> 8)] \
343 ^ camellia_sp3033[(u8)(t1)] \
344 ^ camellia_sp4404[(u8)(ir >> 8)]; \
345 yr = camellia_sp1110[(u8)(t0 >> 8)] \
346 ^ camellia_sp0222[(u8)(t0)] \
347 ^ camellia_sp3033[(u8)(il >> 8)] \
348 ^ camellia_sp4404[(u8)(il)]; \
349 yl ^= yr; \
350 yr = ror32(yr, 8); \
351 yr ^= yl; \
352 })
353
354 #define SUBKEY_L(INDEX) (subkey[(INDEX)*2])
355 #define SUBKEY_R(INDEX) (subkey[(INDEX)*2 + 1])
356
camellia_setup_tail(u32 * subkey,u32 * subL,u32 * subR,int max)357 static void camellia_setup_tail(u32 *subkey, u32 *subL, u32 *subR, int max)
358 {
359 u32 dw, tl, tr;
360 u32 kw4l, kw4r;
361
362 /* absorb kw2 to other subkeys */
363 /* round 2 */
364 subL[3] ^= subL[1]; subR[3] ^= subR[1];
365 /* round 4 */
366 subL[5] ^= subL[1]; subR[5] ^= subR[1];
367 /* round 6 */
368 subL[7] ^= subL[1]; subR[7] ^= subR[1];
369 subL[1] ^= subR[1] & ~subR[9];
370 dw = subL[1] & subL[9];
371 subR[1] ^= rol32(dw, 1); /* modified for FLinv(kl2) */
372 /* round 8 */
373 subL[11] ^= subL[1]; subR[11] ^= subR[1];
374 /* round 10 */
375 subL[13] ^= subL[1]; subR[13] ^= subR[1];
376 /* round 12 */
377 subL[15] ^= subL[1]; subR[15] ^= subR[1];
378 subL[1] ^= subR[1] & ~subR[17];
379 dw = subL[1] & subL[17];
380 subR[1] ^= rol32(dw, 1); /* modified for FLinv(kl4) */
381 /* round 14 */
382 subL[19] ^= subL[1]; subR[19] ^= subR[1];
383 /* round 16 */
384 subL[21] ^= subL[1]; subR[21] ^= subR[1];
385 /* round 18 */
386 subL[23] ^= subL[1]; subR[23] ^= subR[1];
387 if (max == 24) {
388 /* kw3 */
389 subL[24] ^= subL[1]; subR[24] ^= subR[1];
390
391 /* absorb kw4 to other subkeys */
392 kw4l = subL[25]; kw4r = subR[25];
393 } else {
394 subL[1] ^= subR[1] & ~subR[25];
395 dw = subL[1] & subL[25];
396 subR[1] ^= rol32(dw, 1); /* modified for FLinv(kl6) */
397 /* round 20 */
398 subL[27] ^= subL[1]; subR[27] ^= subR[1];
399 /* round 22 */
400 subL[29] ^= subL[1]; subR[29] ^= subR[1];
401 /* round 24 */
402 subL[31] ^= subL[1]; subR[31] ^= subR[1];
403 /* kw3 */
404 subL[32] ^= subL[1]; subR[32] ^= subR[1];
405
406 /* absorb kw4 to other subkeys */
407 kw4l = subL[33]; kw4r = subR[33];
408 /* round 23 */
409 subL[30] ^= kw4l; subR[30] ^= kw4r;
410 /* round 21 */
411 subL[28] ^= kw4l; subR[28] ^= kw4r;
412 /* round 19 */
413 subL[26] ^= kw4l; subR[26] ^= kw4r;
414 kw4l ^= kw4r & ~subR[24];
415 dw = kw4l & subL[24];
416 kw4r ^= rol32(dw, 1); /* modified for FL(kl5) */
417 }
418 /* round 17 */
419 subL[22] ^= kw4l; subR[22] ^= kw4r;
420 /* round 15 */
421 subL[20] ^= kw4l; subR[20] ^= kw4r;
422 /* round 13 */
423 subL[18] ^= kw4l; subR[18] ^= kw4r;
424 kw4l ^= kw4r & ~subR[16];
425 dw = kw4l & subL[16];
426 kw4r ^= rol32(dw, 1); /* modified for FL(kl3) */
427 /* round 11 */
428 subL[14] ^= kw4l; subR[14] ^= kw4r;
429 /* round 9 */
430 subL[12] ^= kw4l; subR[12] ^= kw4r;
431 /* round 7 */
432 subL[10] ^= kw4l; subR[10] ^= kw4r;
433 kw4l ^= kw4r & ~subR[8];
434 dw = kw4l & subL[8];
435 kw4r ^= rol32(dw, 1); /* modified for FL(kl1) */
436 /* round 5 */
437 subL[6] ^= kw4l; subR[6] ^= kw4r;
438 /* round 3 */
439 subL[4] ^= kw4l; subR[4] ^= kw4r;
440 /* round 1 */
441 subL[2] ^= kw4l; subR[2] ^= kw4r;
442 /* kw1 */
443 subL[0] ^= kw4l; subR[0] ^= kw4r;
444
445 /* key XOR is end of F-function */
446 SUBKEY_L(0) = subL[0] ^ subL[2];/* kw1 */
447 SUBKEY_R(0) = subR[0] ^ subR[2];
448 SUBKEY_L(2) = subL[3]; /* round 1 */
449 SUBKEY_R(2) = subR[3];
450 SUBKEY_L(3) = subL[2] ^ subL[4]; /* round 2 */
451 SUBKEY_R(3) = subR[2] ^ subR[4];
452 SUBKEY_L(4) = subL[3] ^ subL[5]; /* round 3 */
453 SUBKEY_R(4) = subR[3] ^ subR[5];
454 SUBKEY_L(5) = subL[4] ^ subL[6]; /* round 4 */
455 SUBKEY_R(5) = subR[4] ^ subR[6];
456 SUBKEY_L(6) = subL[5] ^ subL[7]; /* round 5 */
457 SUBKEY_R(6) = subR[5] ^ subR[7];
458 tl = subL[10] ^ (subR[10] & ~subR[8]);
459 dw = tl & subL[8]; /* FL(kl1) */
460 tr = subR[10] ^ rol32(dw, 1);
461 SUBKEY_L(7) = subL[6] ^ tl; /* round 6 */
462 SUBKEY_R(7) = subR[6] ^ tr;
463 SUBKEY_L(8) = subL[8]; /* FL(kl1) */
464 SUBKEY_R(8) = subR[8];
465 SUBKEY_L(9) = subL[9]; /* FLinv(kl2) */
466 SUBKEY_R(9) = subR[9];
467 tl = subL[7] ^ (subR[7] & ~subR[9]);
468 dw = tl & subL[9]; /* FLinv(kl2) */
469 tr = subR[7] ^ rol32(dw, 1);
470 SUBKEY_L(10) = tl ^ subL[11]; /* round 7 */
471 SUBKEY_R(10) = tr ^ subR[11];
472 SUBKEY_L(11) = subL[10] ^ subL[12]; /* round 8 */
473 SUBKEY_R(11) = subR[10] ^ subR[12];
474 SUBKEY_L(12) = subL[11] ^ subL[13]; /* round 9 */
475 SUBKEY_R(12) = subR[11] ^ subR[13];
476 SUBKEY_L(13) = subL[12] ^ subL[14]; /* round 10 */
477 SUBKEY_R(13) = subR[12] ^ subR[14];
478 SUBKEY_L(14) = subL[13] ^ subL[15]; /* round 11 */
479 SUBKEY_R(14) = subR[13] ^ subR[15];
480 tl = subL[18] ^ (subR[18] & ~subR[16]);
481 dw = tl & subL[16]; /* FL(kl3) */
482 tr = subR[18] ^ rol32(dw, 1);
483 SUBKEY_L(15) = subL[14] ^ tl; /* round 12 */
484 SUBKEY_R(15) = subR[14] ^ tr;
485 SUBKEY_L(16) = subL[16]; /* FL(kl3) */
486 SUBKEY_R(16) = subR[16];
487 SUBKEY_L(17) = subL[17]; /* FLinv(kl4) */
488 SUBKEY_R(17) = subR[17];
489 tl = subL[15] ^ (subR[15] & ~subR[17]);
490 dw = tl & subL[17]; /* FLinv(kl4) */
491 tr = subR[15] ^ rol32(dw, 1);
492 SUBKEY_L(18) = tl ^ subL[19]; /* round 13 */
493 SUBKEY_R(18) = tr ^ subR[19];
494 SUBKEY_L(19) = subL[18] ^ subL[20]; /* round 14 */
495 SUBKEY_R(19) = subR[18] ^ subR[20];
496 SUBKEY_L(20) = subL[19] ^ subL[21]; /* round 15 */
497 SUBKEY_R(20) = subR[19] ^ subR[21];
498 SUBKEY_L(21) = subL[20] ^ subL[22]; /* round 16 */
499 SUBKEY_R(21) = subR[20] ^ subR[22];
500 SUBKEY_L(22) = subL[21] ^ subL[23]; /* round 17 */
501 SUBKEY_R(22) = subR[21] ^ subR[23];
502 if (max == 24) {
503 SUBKEY_L(23) = subL[22]; /* round 18 */
504 SUBKEY_R(23) = subR[22];
505 SUBKEY_L(24) = subL[24] ^ subL[23]; /* kw3 */
506 SUBKEY_R(24) = subR[24] ^ subR[23];
507 } else {
508 tl = subL[26] ^ (subR[26] & ~subR[24]);
509 dw = tl & subL[24]; /* FL(kl5) */
510 tr = subR[26] ^ rol32(dw, 1);
511 SUBKEY_L(23) = subL[22] ^ tl; /* round 18 */
512 SUBKEY_R(23) = subR[22] ^ tr;
513 SUBKEY_L(24) = subL[24]; /* FL(kl5) */
514 SUBKEY_R(24) = subR[24];
515 SUBKEY_L(25) = subL[25]; /* FLinv(kl6) */
516 SUBKEY_R(25) = subR[25];
517 tl = subL[23] ^ (subR[23] & ~subR[25]);
518 dw = tl & subL[25]; /* FLinv(kl6) */
519 tr = subR[23] ^ rol32(dw, 1);
520 SUBKEY_L(26) = tl ^ subL[27]; /* round 19 */
521 SUBKEY_R(26) = tr ^ subR[27];
522 SUBKEY_L(27) = subL[26] ^ subL[28]; /* round 20 */
523 SUBKEY_R(27) = subR[26] ^ subR[28];
524 SUBKEY_L(28) = subL[27] ^ subL[29]; /* round 21 */
525 SUBKEY_R(28) = subR[27] ^ subR[29];
526 SUBKEY_L(29) = subL[28] ^ subL[30]; /* round 22 */
527 SUBKEY_R(29) = subR[28] ^ subR[30];
528 SUBKEY_L(30) = subL[29] ^ subL[31]; /* round 23 */
529 SUBKEY_R(30) = subR[29] ^ subR[31];
530 SUBKEY_L(31) = subL[30]; /* round 24 */
531 SUBKEY_R(31) = subR[30];
532 SUBKEY_L(32) = subL[32] ^ subL[31]; /* kw3 */
533 SUBKEY_R(32) = subR[32] ^ subR[31];
534 }
535 }
536
camellia_setup128(const unsigned char * key,u32 * subkey)537 static void camellia_setup128(const unsigned char *key, u32 *subkey)
538 {
539 u32 kll, klr, krl, krr;
540 u32 il, ir, t0, t1, w0, w1;
541 u32 subL[26];
542 u32 subR[26];
543
544 /**
545 * k == kll || klr || krl || krr (|| is concatenation)
546 */
547 kll = get_unaligned_be32(key);
548 klr = get_unaligned_be32(key + 4);
549 krl = get_unaligned_be32(key + 8);
550 krr = get_unaligned_be32(key + 12);
551
552 /* generate KL dependent subkeys */
553 /* kw1 */
554 subL[0] = kll; subR[0] = klr;
555 /* kw2 */
556 subL[1] = krl; subR[1] = krr;
557 /* rotation left shift 15bit */
558 ROLDQ(kll, klr, krl, krr, w0, w1, 15);
559 /* k3 */
560 subL[4] = kll; subR[4] = klr;
561 /* k4 */
562 subL[5] = krl; subR[5] = krr;
563 /* rotation left shift 15+30bit */
564 ROLDQ(kll, klr, krl, krr, w0, w1, 30);
565 /* k7 */
566 subL[10] = kll; subR[10] = klr;
567 /* k8 */
568 subL[11] = krl; subR[11] = krr;
569 /* rotation left shift 15+30+15bit */
570 ROLDQ(kll, klr, krl, krr, w0, w1, 15);
571 /* k10 */
572 subL[13] = krl; subR[13] = krr;
573 /* rotation left shift 15+30+15+17 bit */
574 ROLDQ(kll, klr, krl, krr, w0, w1, 17);
575 /* kl3 */
576 subL[16] = kll; subR[16] = klr;
577 /* kl4 */
578 subL[17] = krl; subR[17] = krr;
579 /* rotation left shift 15+30+15+17+17 bit */
580 ROLDQ(kll, klr, krl, krr, w0, w1, 17);
581 /* k13 */
582 subL[18] = kll; subR[18] = klr;
583 /* k14 */
584 subL[19] = krl; subR[19] = krr;
585 /* rotation left shift 15+30+15+17+17+17 bit */
586 ROLDQ(kll, klr, krl, krr, w0, w1, 17);
587 /* k17 */
588 subL[22] = kll; subR[22] = klr;
589 /* k18 */
590 subL[23] = krl; subR[23] = krr;
591
592 /* generate KA */
593 kll = subL[0]; klr = subR[0];
594 krl = subL[1]; krr = subR[1];
595 CAMELLIA_F(kll, klr,
596 CAMELLIA_SIGMA1L, CAMELLIA_SIGMA1R,
597 w0, w1, il, ir, t0, t1);
598 krl ^= w0; krr ^= w1;
599 CAMELLIA_F(krl, krr,
600 CAMELLIA_SIGMA2L, CAMELLIA_SIGMA2R,
601 kll, klr, il, ir, t0, t1);
602 /* current status == (kll, klr, w0, w1) */
603 CAMELLIA_F(kll, klr,
604 CAMELLIA_SIGMA3L, CAMELLIA_SIGMA3R,
605 krl, krr, il, ir, t0, t1);
606 krl ^= w0; krr ^= w1;
607 CAMELLIA_F(krl, krr,
608 CAMELLIA_SIGMA4L, CAMELLIA_SIGMA4R,
609 w0, w1, il, ir, t0, t1);
610 kll ^= w0; klr ^= w1;
611
612 /* generate KA dependent subkeys */
613 /* k1, k2 */
614 subL[2] = kll; subR[2] = klr;
615 subL[3] = krl; subR[3] = krr;
616 ROLDQ(kll, klr, krl, krr, w0, w1, 15);
617 /* k5,k6 */
618 subL[6] = kll; subR[6] = klr;
619 subL[7] = krl; subR[7] = krr;
620 ROLDQ(kll, klr, krl, krr, w0, w1, 15);
621 /* kl1, kl2 */
622 subL[8] = kll; subR[8] = klr;
623 subL[9] = krl; subR[9] = krr;
624 ROLDQ(kll, klr, krl, krr, w0, w1, 15);
625 /* k9 */
626 subL[12] = kll; subR[12] = klr;
627 ROLDQ(kll, klr, krl, krr, w0, w1, 15);
628 /* k11, k12 */
629 subL[14] = kll; subR[14] = klr;
630 subL[15] = krl; subR[15] = krr;
631 ROLDQo32(kll, klr, krl, krr, w0, w1, 34);
632 /* k15, k16 */
633 subL[20] = kll; subR[20] = klr;
634 subL[21] = krl; subR[21] = krr;
635 ROLDQ(kll, klr, krl, krr, w0, w1, 17);
636 /* kw3, kw4 */
637 subL[24] = kll; subR[24] = klr;
638 subL[25] = krl; subR[25] = krr;
639
640 camellia_setup_tail(subkey, subL, subR, 24);
641 }
642
camellia_setup256(const unsigned char * key,u32 * subkey)643 static void camellia_setup256(const unsigned char *key, u32 *subkey)
644 {
645 u32 kll, klr, krl, krr; /* left half of key */
646 u32 krll, krlr, krrl, krrr; /* right half of key */
647 u32 il, ir, t0, t1, w0, w1; /* temporary variables */
648 u32 subL[34];
649 u32 subR[34];
650
651 /**
652 * key = (kll || klr || krl || krr || krll || krlr || krrl || krrr)
653 * (|| is concatenation)
654 */
655 kll = get_unaligned_be32(key);
656 klr = get_unaligned_be32(key + 4);
657 krl = get_unaligned_be32(key + 8);
658 krr = get_unaligned_be32(key + 12);
659 krll = get_unaligned_be32(key + 16);
660 krlr = get_unaligned_be32(key + 20);
661 krrl = get_unaligned_be32(key + 24);
662 krrr = get_unaligned_be32(key + 28);
663
664 /* generate KL dependent subkeys */
665 /* kw1 */
666 subL[0] = kll; subR[0] = klr;
667 /* kw2 */
668 subL[1] = krl; subR[1] = krr;
669 ROLDQo32(kll, klr, krl, krr, w0, w1, 45);
670 /* k9 */
671 subL[12] = kll; subR[12] = klr;
672 /* k10 */
673 subL[13] = krl; subR[13] = krr;
674 ROLDQ(kll, klr, krl, krr, w0, w1, 15);
675 /* kl3 */
676 subL[16] = kll; subR[16] = klr;
677 /* kl4 */
678 subL[17] = krl; subR[17] = krr;
679 ROLDQ(kll, klr, krl, krr, w0, w1, 17);
680 /* k17 */
681 subL[22] = kll; subR[22] = klr;
682 /* k18 */
683 subL[23] = krl; subR[23] = krr;
684 ROLDQo32(kll, klr, krl, krr, w0, w1, 34);
685 /* k23 */
686 subL[30] = kll; subR[30] = klr;
687 /* k24 */
688 subL[31] = krl; subR[31] = krr;
689
690 /* generate KR dependent subkeys */
691 ROLDQ(krll, krlr, krrl, krrr, w0, w1, 15);
692 /* k3 */
693 subL[4] = krll; subR[4] = krlr;
694 /* k4 */
695 subL[5] = krrl; subR[5] = krrr;
696 ROLDQ(krll, krlr, krrl, krrr, w0, w1, 15);
697 /* kl1 */
698 subL[8] = krll; subR[8] = krlr;
699 /* kl2 */
700 subL[9] = krrl; subR[9] = krrr;
701 ROLDQ(krll, krlr, krrl, krrr, w0, w1, 30);
702 /* k13 */
703 subL[18] = krll; subR[18] = krlr;
704 /* k14 */
705 subL[19] = krrl; subR[19] = krrr;
706 ROLDQo32(krll, krlr, krrl, krrr, w0, w1, 34);
707 /* k19 */
708 subL[26] = krll; subR[26] = krlr;
709 /* k20 */
710 subL[27] = krrl; subR[27] = krrr;
711 ROLDQo32(krll, krlr, krrl, krrr, w0, w1, 34);
712
713 /* generate KA */
714 kll = subL[0] ^ krll; klr = subR[0] ^ krlr;
715 krl = subL[1] ^ krrl; krr = subR[1] ^ krrr;
716 CAMELLIA_F(kll, klr,
717 CAMELLIA_SIGMA1L, CAMELLIA_SIGMA1R,
718 w0, w1, il, ir, t0, t1);
719 krl ^= w0; krr ^= w1;
720 CAMELLIA_F(krl, krr,
721 CAMELLIA_SIGMA2L, CAMELLIA_SIGMA2R,
722 kll, klr, il, ir, t0, t1);
723 kll ^= krll; klr ^= krlr;
724 CAMELLIA_F(kll, klr,
725 CAMELLIA_SIGMA3L, CAMELLIA_SIGMA3R,
726 krl, krr, il, ir, t0, t1);
727 krl ^= w0 ^ krrl; krr ^= w1 ^ krrr;
728 CAMELLIA_F(krl, krr,
729 CAMELLIA_SIGMA4L, CAMELLIA_SIGMA4R,
730 w0, w1, il, ir, t0, t1);
731 kll ^= w0; klr ^= w1;
732
733 /* generate KB */
734 krll ^= kll; krlr ^= klr;
735 krrl ^= krl; krrr ^= krr;
736 CAMELLIA_F(krll, krlr,
737 CAMELLIA_SIGMA5L, CAMELLIA_SIGMA5R,
738 w0, w1, il, ir, t0, t1);
739 krrl ^= w0; krrr ^= w1;
740 CAMELLIA_F(krrl, krrr,
741 CAMELLIA_SIGMA6L, CAMELLIA_SIGMA6R,
742 w0, w1, il, ir, t0, t1);
743 krll ^= w0; krlr ^= w1;
744
745 /* generate KA dependent subkeys */
746 ROLDQ(kll, klr, krl, krr, w0, w1, 15);
747 /* k5 */
748 subL[6] = kll; subR[6] = klr;
749 /* k6 */
750 subL[7] = krl; subR[7] = krr;
751 ROLDQ(kll, klr, krl, krr, w0, w1, 30);
752 /* k11 */
753 subL[14] = kll; subR[14] = klr;
754 /* k12 */
755 subL[15] = krl; subR[15] = krr;
756 /* rotation left shift 32bit */
757 /* kl5 */
758 subL[24] = klr; subR[24] = krl;
759 /* kl6 */
760 subL[25] = krr; subR[25] = kll;
761 /* rotation left shift 49 from k11,k12 -> k21,k22 */
762 ROLDQo32(kll, klr, krl, krr, w0, w1, 49);
763 /* k21 */
764 subL[28] = kll; subR[28] = klr;
765 /* k22 */
766 subL[29] = krl; subR[29] = krr;
767
768 /* generate KB dependent subkeys */
769 /* k1 */
770 subL[2] = krll; subR[2] = krlr;
771 /* k2 */
772 subL[3] = krrl; subR[3] = krrr;
773 ROLDQ(krll, krlr, krrl, krrr, w0, w1, 30);
774 /* k7 */
775 subL[10] = krll; subR[10] = krlr;
776 /* k8 */
777 subL[11] = krrl; subR[11] = krrr;
778 ROLDQ(krll, krlr, krrl, krrr, w0, w1, 30);
779 /* k15 */
780 subL[20] = krll; subR[20] = krlr;
781 /* k16 */
782 subL[21] = krrl; subR[21] = krrr;
783 ROLDQo32(krll, krlr, krrl, krrr, w0, w1, 51);
784 /* kw3 */
785 subL[32] = krll; subR[32] = krlr;
786 /* kw4 */
787 subL[33] = krrl; subR[33] = krrr;
788
789 camellia_setup_tail(subkey, subL, subR, 32);
790 }
791
camellia_setup192(const unsigned char * key,u32 * subkey)792 static void camellia_setup192(const unsigned char *key, u32 *subkey)
793 {
794 unsigned char kk[32];
795 u32 krll, krlr, krrl, krrr;
796
797 memcpy(kk, key, 24);
798 memcpy((unsigned char *)&krll, key+16, 4);
799 memcpy((unsigned char *)&krlr, key+20, 4);
800 krrl = ~krll;
801 krrr = ~krlr;
802 memcpy(kk+24, (unsigned char *)&krrl, 4);
803 memcpy(kk+28, (unsigned char *)&krrr, 4);
804 camellia_setup256(kk, subkey);
805 }
806
807
808 /*
809 * Encrypt/decrypt
810 */
811 #define CAMELLIA_FLS(ll, lr, rl, rr, kll, klr, krl, krr, t0, t1, t2, t3) ({ \
812 t0 = kll; \
813 t2 = krr; \
814 t0 &= ll; \
815 t2 |= rr; \
816 rl ^= t2; \
817 lr ^= rol32(t0, 1); \
818 t3 = krl; \
819 t1 = klr; \
820 t3 &= rl; \
821 t1 |= lr; \
822 ll ^= t1; \
823 rr ^= rol32(t3, 1); \
824 })
825
826 #define CAMELLIA_ROUNDSM(xl, xr, kl, kr, yl, yr, il, ir) ({ \
827 yl ^= kl; \
828 yr ^= kr; \
829 ir = camellia_sp1110[(u8)xr]; \
830 il = camellia_sp1110[(u8)(xl >> 24)]; \
831 ir ^= camellia_sp0222[(u8)(xr >> 24)]; \
832 il ^= camellia_sp0222[(u8)(xl >> 16)]; \
833 ir ^= camellia_sp3033[(u8)(xr >> 16)]; \
834 il ^= camellia_sp3033[(u8)(xl >> 8)]; \
835 ir ^= camellia_sp4404[(u8)(xr >> 8)]; \
836 il ^= camellia_sp4404[(u8)xl]; \
837 ir ^= il; \
838 yl ^= ir; \
839 yr ^= ror32(il, 8) ^ ir; \
840 })
841
842 /* max = 24: 128bit encrypt, max = 32: 256bit encrypt */
camellia_do_encrypt(const u32 * subkey,u32 * io,unsigned max)843 static void camellia_do_encrypt(const u32 *subkey, u32 *io, unsigned max)
844 {
845 u32 il, ir, t0, t1; /* temporary variables */
846
847 /* pre whitening but absorb kw2 */
848 io[0] ^= SUBKEY_L(0);
849 io[1] ^= SUBKEY_R(0);
850
851 /* main iteration */
852 #define ROUNDS(i) ({ \
853 CAMELLIA_ROUNDSM(io[0], io[1], \
854 SUBKEY_L(i + 2), SUBKEY_R(i + 2), \
855 io[2], io[3], il, ir); \
856 CAMELLIA_ROUNDSM(io[2], io[3], \
857 SUBKEY_L(i + 3), SUBKEY_R(i + 3), \
858 io[0], io[1], il, ir); \
859 CAMELLIA_ROUNDSM(io[0], io[1], \
860 SUBKEY_L(i + 4), SUBKEY_R(i + 4), \
861 io[2], io[3], il, ir); \
862 CAMELLIA_ROUNDSM(io[2], io[3], \
863 SUBKEY_L(i + 5), SUBKEY_R(i + 5), \
864 io[0], io[1], il, ir); \
865 CAMELLIA_ROUNDSM(io[0], io[1], \
866 SUBKEY_L(i + 6), SUBKEY_R(i + 6), \
867 io[2], io[3], il, ir); \
868 CAMELLIA_ROUNDSM(io[2], io[3], \
869 SUBKEY_L(i + 7), SUBKEY_R(i + 7), \
870 io[0], io[1], il, ir); \
871 })
872 #define FLS(i) ({ \
873 CAMELLIA_FLS(io[0], io[1], io[2], io[3], \
874 SUBKEY_L(i + 0), SUBKEY_R(i + 0), \
875 SUBKEY_L(i + 1), SUBKEY_R(i + 1), \
876 t0, t1, il, ir); \
877 })
878
879 ROUNDS(0);
880 FLS(8);
881 ROUNDS(8);
882 FLS(16);
883 ROUNDS(16);
884 if (max == 32) {
885 FLS(24);
886 ROUNDS(24);
887 }
888
889 #undef ROUNDS
890 #undef FLS
891
892 /* post whitening but kw4 */
893 io[2] ^= SUBKEY_L(max);
894 io[3] ^= SUBKEY_R(max);
895 /* NB: io[0],[1] should be swapped with [2],[3] by caller! */
896 }
897
camellia_do_decrypt(const u32 * subkey,u32 * io,unsigned i)898 static void camellia_do_decrypt(const u32 *subkey, u32 *io, unsigned i)
899 {
900 u32 il, ir, t0, t1; /* temporary variables */
901
902 /* pre whitening but absorb kw2 */
903 io[0] ^= SUBKEY_L(i);
904 io[1] ^= SUBKEY_R(i);
905
906 /* main iteration */
907 #define ROUNDS(i) ({ \
908 CAMELLIA_ROUNDSM(io[0], io[1], \
909 SUBKEY_L(i + 7), SUBKEY_R(i + 7), \
910 io[2], io[3], il, ir); \
911 CAMELLIA_ROUNDSM(io[2], io[3], \
912 SUBKEY_L(i + 6), SUBKEY_R(i + 6), \
913 io[0], io[1], il, ir); \
914 CAMELLIA_ROUNDSM(io[0], io[1], \
915 SUBKEY_L(i + 5), SUBKEY_R(i + 5), \
916 io[2], io[3], il, ir); \
917 CAMELLIA_ROUNDSM(io[2], io[3], \
918 SUBKEY_L(i + 4), SUBKEY_R(i + 4), \
919 io[0], io[1], il, ir); \
920 CAMELLIA_ROUNDSM(io[0], io[1], \
921 SUBKEY_L(i + 3), SUBKEY_R(i + 3), \
922 io[2], io[3], il, ir); \
923 CAMELLIA_ROUNDSM(io[2], io[3], \
924 SUBKEY_L(i + 2), SUBKEY_R(i + 2), \
925 io[0], io[1], il, ir); \
926 })
927 #define FLS(i) ({ \
928 CAMELLIA_FLS(io[0], io[1], io[2], io[3], \
929 SUBKEY_L(i + 1), SUBKEY_R(i + 1), \
930 SUBKEY_L(i + 0), SUBKEY_R(i + 0), \
931 t0, t1, il, ir); \
932 })
933
934 if (i == 32) {
935 ROUNDS(24);
936 FLS(24);
937 }
938 ROUNDS(16);
939 FLS(16);
940 ROUNDS(8);
941 FLS(8);
942 ROUNDS(0);
943
944 #undef ROUNDS
945 #undef FLS
946
947 /* post whitening but kw4 */
948 io[2] ^= SUBKEY_L(0);
949 io[3] ^= SUBKEY_R(0);
950 /* NB: 0,1 should be swapped with 2,3 by caller! */
951 }
952
953
954 struct camellia_ctx {
955 int key_length;
956 u32 key_table[CAMELLIA_TABLE_BYTE_LEN / sizeof(u32)];
957 };
958
959 static int
camellia_set_key(struct crypto_tfm * tfm,const u8 * in_key,unsigned int key_len)960 camellia_set_key(struct crypto_tfm *tfm, const u8 *in_key,
961 unsigned int key_len)
962 {
963 struct camellia_ctx *cctx = crypto_tfm_ctx(tfm);
964 const unsigned char *key = (const unsigned char *)in_key;
965
966 if (key_len != 16 && key_len != 24 && key_len != 32)
967 return -EINVAL;
968
969 cctx->key_length = key_len;
970
971 switch (key_len) {
972 case 16:
973 camellia_setup128(key, cctx->key_table);
974 break;
975 case 24:
976 camellia_setup192(key, cctx->key_table);
977 break;
978 case 32:
979 camellia_setup256(key, cctx->key_table);
980 break;
981 }
982
983 return 0;
984 }
985
camellia_encrypt(struct crypto_tfm * tfm,u8 * out,const u8 * in)986 static void camellia_encrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in)
987 {
988 const struct camellia_ctx *cctx = crypto_tfm_ctx(tfm);
989 unsigned int max;
990
991 u32 tmp[4];
992
993 tmp[0] = get_unaligned_be32(in);
994 tmp[1] = get_unaligned_be32(in + 4);
995 tmp[2] = get_unaligned_be32(in + 8);
996 tmp[3] = get_unaligned_be32(in + 12);
997
998 if (cctx->key_length == 16)
999 max = 24;
1000 else
1001 max = 32; /* for key lengths of 24 and 32 */
1002
1003 camellia_do_encrypt(cctx->key_table, tmp, max);
1004
1005 /* do_encrypt returns 0,1 swapped with 2,3 */
1006 put_unaligned_be32(tmp[2], out);
1007 put_unaligned_be32(tmp[3], out + 4);
1008 put_unaligned_be32(tmp[0], out + 8);
1009 put_unaligned_be32(tmp[1], out + 12);
1010 }
1011
camellia_decrypt(struct crypto_tfm * tfm,u8 * out,const u8 * in)1012 static void camellia_decrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in)
1013 {
1014 const struct camellia_ctx *cctx = crypto_tfm_ctx(tfm);
1015 unsigned int max;
1016
1017 u32 tmp[4];
1018
1019 tmp[0] = get_unaligned_be32(in);
1020 tmp[1] = get_unaligned_be32(in + 4);
1021 tmp[2] = get_unaligned_be32(in + 8);
1022 tmp[3] = get_unaligned_be32(in + 12);
1023
1024 if (cctx->key_length == 16)
1025 max = 24;
1026 else
1027 max = 32; /* for key lengths of 24 and 32 */
1028
1029 camellia_do_decrypt(cctx->key_table, tmp, max);
1030
1031 /* do_decrypt returns 0,1 swapped with 2,3 */
1032 put_unaligned_be32(tmp[2], out);
1033 put_unaligned_be32(tmp[3], out + 4);
1034 put_unaligned_be32(tmp[0], out + 8);
1035 put_unaligned_be32(tmp[1], out + 12);
1036 }
1037
1038 static struct crypto_alg camellia_alg = {
1039 .cra_name = "camellia",
1040 .cra_driver_name = "camellia-generic",
1041 .cra_priority = 100,
1042 .cra_flags = CRYPTO_ALG_TYPE_CIPHER,
1043 .cra_blocksize = CAMELLIA_BLOCK_SIZE,
1044 .cra_ctxsize = sizeof(struct camellia_ctx),
1045 .cra_module = THIS_MODULE,
1046 .cra_u = {
1047 .cipher = {
1048 .cia_min_keysize = CAMELLIA_MIN_KEY_SIZE,
1049 .cia_max_keysize = CAMELLIA_MAX_KEY_SIZE,
1050 .cia_setkey = camellia_set_key,
1051 .cia_encrypt = camellia_encrypt,
1052 .cia_decrypt = camellia_decrypt
1053 }
1054 }
1055 };
1056
camellia_init(void)1057 static int __init camellia_init(void)
1058 {
1059 return crypto_register_alg(&camellia_alg);
1060 }
1061
camellia_fini(void)1062 static void __exit camellia_fini(void)
1063 {
1064 crypto_unregister_alg(&camellia_alg);
1065 }
1066
1067 subsys_initcall(camellia_init);
1068 module_exit(camellia_fini);
1069
1070 MODULE_DESCRIPTION("Camellia Cipher Algorithm");
1071 MODULE_LICENSE("GPL");
1072 MODULE_ALIAS_CRYPTO("camellia");
1073 MODULE_ALIAS_CRYPTO("camellia-generic");
1074