arm64: dts: allwinner: pinebook: Remove unused AXP803 regulators
[linux/fpc-iii.git] / include / crypto / des.h
blob7812b4331ae4a4116a314c3ec3211181ae8612b2
1 /* SPDX-License-Identifier: GPL-2.0 */
2 /*
3 * DES & Triple DES EDE Cipher Algorithms.
4 */
6 #ifndef __CRYPTO_DES_H
7 #define __CRYPTO_DES_H
9 #include <linux/types.h>
11 #define DES_KEY_SIZE 8
12 #define DES_EXPKEY_WORDS 32
13 #define DES_BLOCK_SIZE 8
15 #define DES3_EDE_KEY_SIZE (3 * DES_KEY_SIZE)
16 #define DES3_EDE_EXPKEY_WORDS (3 * DES_EXPKEY_WORDS)
17 #define DES3_EDE_BLOCK_SIZE DES_BLOCK_SIZE
19 struct des_ctx {
20 u32 expkey[DES_EXPKEY_WORDS];
23 struct des3_ede_ctx {
24 u32 expkey[DES3_EDE_EXPKEY_WORDS];
27 void des_encrypt(const struct des_ctx *ctx, u8 *dst, const u8 *src);
28 void des_decrypt(const struct des_ctx *ctx, u8 *dst, const u8 *src);
30 void des3_ede_encrypt(const struct des3_ede_ctx *dctx, u8 *dst, const u8 *src);
31 void des3_ede_decrypt(const struct des3_ede_ctx *dctx, u8 *dst, const u8 *src);
33 /**
34 * des_expand_key - Expand a DES input key into a key schedule
35 * @ctx: the key schedule
36 * @key: buffer containing the input key
37 * @len: size of the buffer contents
39 * Returns 0 on success, -EINVAL if the input key is rejected and -ENOKEY if
40 * the key is accepted but has been found to be weak.
42 int des_expand_key(struct des_ctx *ctx, const u8 *key, unsigned int keylen);
44 /**
45 * des3_ede_expand_key - Expand a triple DES input key into a key schedule
46 * @ctx: the key schedule
47 * @key: buffer containing the input key
48 * @len: size of the buffer contents
50 * Returns 0 on success, -EINVAL if the input key is rejected and -ENOKEY if
51 * the key is accepted but has been found to be weak. Note that weak keys will
52 * be rejected (and -EINVAL will be returned) when running in FIPS mode.
54 int des3_ede_expand_key(struct des3_ede_ctx *ctx, const u8 *key,
55 unsigned int keylen);
57 #endif /* __CRYPTO_DES_H */