crypto.h revision 1f69aa52ea2e0a73ac502565df8c666ee49cab6a
18d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/* 28d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * WPA Supplicant / wrapper functions for crypto libraries 38d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Copyright (c) 2004-2009, Jouni Malinen <j@w1.fi> 48d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 58d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This program is free software; you can redistribute it and/or modify 68d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * it under the terms of the GNU General Public License version 2 as 78d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * published by the Free Software Foundation. 88d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 98d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Alternatively, this software may be distributed under the terms of BSD 108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * license. 118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * See README and COPYING for more details. 138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This file defines the cryptographic functions that need to be implemented 158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * for wpa_supplicant and hostapd. When TLS is not used, internal 168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * implementation of MD5, SHA1, and AES is used and no external libraries are 178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * required. When TLS is enabled (e.g., by enabling EAP-TLS or EAP-PEAP), the 188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto library used by the TLS implementation is expected to be used for 198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * non-TLS needs, too, in order to save space by not implementing these 208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * functions twice. 218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Wrapper code for using each crypto library is in its own file (crypto*.c) 238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * and one of these files is build and linked in to provide the functions 248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * defined here. 258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifndef CRYPTO_H 288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#define CRYPTO_H 298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * md4_vector - MD4 hash for data vector 328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @num_elem: Number of elements in the data vector 338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @addr: Pointers to the data areas 348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Lengths of the data blocks 358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @mac: Buffer for the hash 368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure 378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac); 398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * md5_vector - MD5 hash for data vector 428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @num_elem: Number of elements in the data vector 438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @addr: Pointers to the data areas 448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Lengths of the data blocks 458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @mac: Buffer for the hash 468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure 478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac); 498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_FIPS 518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * md5_vector_non_fips_allow - MD5 hash for data vector (non-FIPS use allowed) 538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @num_elem: Number of elements in the data vector 548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @addr: Pointers to the data areas 558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Lengths of the data blocks 568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @mac: Buffer for the hash 578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure 588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint md5_vector_non_fips_allow(size_t num_elem, const u8 *addr[], 608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt const size_t *len, u8 *mac); 618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#else /* CONFIG_FIPS */ 628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#define md5_vector_non_fips_allow md5_vector 638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_FIPS */ 648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * sha1_vector - SHA-1 hash for data vector 688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @num_elem: Number of elements in the data vector 698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @addr: Pointers to the data areas 708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Lengths of the data blocks 718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @mac: Buffer for the hash 728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure 738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, 758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 *mac); 768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * fips186_2-prf - NIST FIPS Publication 186-2 change notice 1 PRF 798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @seed: Seed/key for the PRF 808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @seed_len: Seed length in bytes 818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @x: Buffer for PRF output 828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @xlen: Output length in bytes 838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure 848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function implements random number generation specified in NIST FIPS 868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Publication 186-2 for EAP-SIM. This PRF uses a function that is similar to 878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * SHA-1, but has different message padding. 888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint __must_check fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, 908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt size_t xlen); 918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * sha256_vector - SHA256 hash for data vector 948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @num_elem: Number of elements in the data vector 958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @addr: Pointers to the data areas 968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Lengths of the data blocks 978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @mac: Buffer for the hash 988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure 998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 1008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint sha256_vector(size_t num_elem, const u8 *addr[], const size_t *len, 1018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 *mac); 1028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 1048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * des_encrypt - Encrypt one block with DES 1058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @clear: 8 octets (in) 1068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: 7 octets (in) (no parity bits included) 1078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @cypher: 8 octets (out) 1088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 1098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid des_encrypt(const u8 *clear, const u8 *key, u8 *cypher); 1108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 1128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * aes_encrypt_init - Initialize AES for encryption 1138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Encryption key 1148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Key length in bytes (usually 16, i.e., 128 bits) 1158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: Pointer to context data or %NULL on failure 1168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 1178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid * aes_encrypt_init(const u8 *key, size_t len); 1188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 1208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * aes_encrypt - Encrypt one AES block 1218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @ctx: Context pointer from aes_encrypt_init() 1228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @plain: Plaintext data to be encrypted (16 bytes) 1238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @crypt: Buffer for the encrypted data (16 bytes) 1248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 1258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid aes_encrypt(void *ctx, const u8 *plain, u8 *crypt); 1268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 1288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * aes_encrypt_deinit - Deinitialize AES encryption 1298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @ctx: Context pointer from aes_encrypt_init() 1308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 1318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid aes_encrypt_deinit(void *ctx); 1328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 1348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * aes_decrypt_init - Initialize AES for decryption 1358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Decryption key 1368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Key length in bytes (usually 16, i.e., 128 bits) 1378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: Pointer to context data or %NULL on failure 1388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 1398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid * aes_decrypt_init(const u8 *key, size_t len); 1408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 1428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * aes_decrypt - Decrypt one AES block 1438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @ctx: Context pointer from aes_encrypt_init() 1448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @crypt: Encrypted data (16 bytes) 1458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @plain: Buffer for the decrypted data (16 bytes) 1468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 1478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid aes_decrypt(void *ctx, const u8 *crypt, u8 *plain); 1488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 1508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * aes_decrypt_deinit - Deinitialize AES decryption 1518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @ctx: Context pointer from aes_encrypt_init() 1528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 1538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid aes_decrypt_deinit(void *ctx); 1548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtenum crypto_hash_alg { 1578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt CRYPTO_HASH_ALG_MD5, CRYPTO_HASH_ALG_SHA1, 1581f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt CRYPTO_HASH_ALG_HMAC_MD5, CRYPTO_HASH_ALG_HMAC_SHA1, 1591f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt CRYPTO_HASH_ALG_SHA256, CRYPTO_HASH_ALG_HMAC_SHA256 1608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}; 1618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct crypto_hash; 1638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 1658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_hash_init - Initialize hash/HMAC function 1668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @alg: Hash algorithm 1678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Key for keyed hash (e.g., HMAC) or %NULL if not needed 1688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key_len: Length of the key in bytes 1698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: Pointer to hash context to use with other hash functions or %NULL 1708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * on failure 1718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 1728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 1738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 1748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 1758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 1768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, 1778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt size_t key_len); 1788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 1808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_hash_update - Add data to hash calculation 1818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @ctx: Context pointer from crypto_hash_init() 1828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @data: Data buffer to add 1838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Length of the buffer 1848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 1858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 1868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 1878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 1888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 1898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid crypto_hash_update(struct crypto_hash *ctx, const u8 *data, size_t len); 1908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 1928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_hash_finish - Complete hash calculation 1938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @ctx: Context pointer from crypto_hash_init() 1948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @hash: Buffer for hash value or %NULL if caller is just freeing the hash 1958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * context 1968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Pointer to length of the buffer or %NULL if caller is just freeing the 1978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * hash context; on return, this is set to the actual length of the hash value 1988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 if buffer is too small (len set to needed length), 1998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * or -2 on other failures (including failed crypto_hash_update() operations) 2008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 2018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function calculates the hash value and frees the context buffer that 2028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * was used for hash calculation. 2038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 2048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 2058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 2068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 2078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 2088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint crypto_hash_finish(struct crypto_hash *ctx, u8 *hash, size_t *len); 2098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtenum crypto_cipher_alg { 2128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt CRYPTO_CIPHER_NULL = 0, CRYPTO_CIPHER_ALG_AES, CRYPTO_CIPHER_ALG_3DES, 2138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt CRYPTO_CIPHER_ALG_DES, CRYPTO_CIPHER_ALG_RC2, CRYPTO_CIPHER_ALG_RC4 2148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}; 2158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct crypto_cipher; 2178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 2198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_cipher_init - Initialize block/stream cipher function 2208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @alg: Cipher algorithm 2218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @iv: Initialization vector for block ciphers or %NULL for stream ciphers 2228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Cipher key 2238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key_len: Length of key in bytes 2248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: Pointer to cipher context to use with other cipher functions or 2258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * %NULL on failure 2268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 2278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 2288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 2298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 2308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 2318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, 2328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt const u8 *iv, const u8 *key, 2338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt size_t key_len); 2348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 2368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_cipher_encrypt - Cipher encrypt 2378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @ctx: Context pointer from crypto_cipher_init() 2388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @plain: Plaintext to cipher 2398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @crypt: Resulting ciphertext 2408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Length of the plaintext 2418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure 2428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 2438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 2448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 2458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 2468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 2478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint __must_check crypto_cipher_encrypt(struct crypto_cipher *ctx, 2488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt const u8 *plain, u8 *crypt, size_t len); 2498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 2518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_cipher_decrypt - Cipher decrypt 2528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @ctx: Context pointer from crypto_cipher_init() 2538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @crypt: Ciphertext to decrypt 2548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @plain: Resulting plaintext 2558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Length of the cipher text 2568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure 2578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 2588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 2598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 2608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 2618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 2628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint __must_check crypto_cipher_decrypt(struct crypto_cipher *ctx, 2638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt const u8 *crypt, u8 *plain, size_t len); 2648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 2668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_cipher_decrypt - Free cipher context 2678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @ctx: Context pointer from crypto_cipher_init() 2688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 2698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 2708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 2718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 2728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 2738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid crypto_cipher_deinit(struct crypto_cipher *ctx); 2748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct crypto_public_key; 2778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct crypto_private_key; 2788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 2808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_public_key_import - Import an RSA public key 2818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Key buffer (DER encoded RSA public key) 2828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Key buffer length in bytes 2838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: Pointer to the public key or %NULL on failure 2848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 2858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function can just return %NULL if the crypto library supports X.509 2868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * parsing. In that case, crypto_public_key_from_cert() is used to import the 2878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * public key from a certificate. 2888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 2898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 2908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 2918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 2928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 2938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct crypto_public_key * crypto_public_key_import(const u8 *key, size_t len); 2948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 2968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_private_key_import - Import an RSA private key 2978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Key buffer (DER encoded RSA private key) 2988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Key buffer length in bytes 2998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @passwd: Key encryption password or %NULL if key is not encrypted 3008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: Pointer to the private key or %NULL on failure 3018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 3028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 3038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 3048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 3058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 3068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct crypto_private_key * crypto_private_key_import(const u8 *key, 3078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt size_t len, 3088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt const char *passwd); 3098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 3118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_public_key_from_cert - Import an RSA public key from a certificate 3128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @buf: DER encoded X.509 certificate 3138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Certificate buffer length in bytes 3148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: Pointer to public key or %NULL on failure 3158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 3168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function can just return %NULL if the crypto library does not support 3178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * X.509 parsing. In that case, internal code will be used to parse the 3188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * certificate and public key is imported using crypto_public_key_import(). 3198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 3208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 3218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 3228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 3238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 3248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct crypto_public_key * crypto_public_key_from_cert(const u8 *buf, 3258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt size_t len); 3268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 3288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_public_key_encrypt_pkcs1_v15 - Public key encryption (PKCS #1 v1.5) 3298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Public key 3308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @in: Plaintext buffer 3318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @inlen: Length of plaintext buffer in bytes 3328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @out: Output buffer for encrypted data 3338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @outlen: Length of output buffer in bytes; set to used length on success 3348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure 3358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 3368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 3378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 3388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 3398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 3408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint __must_check crypto_public_key_encrypt_pkcs1_v15( 3418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct crypto_public_key *key, const u8 *in, size_t inlen, 3428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 *out, size_t *outlen); 3438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 3458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_private_key_decrypt_pkcs1_v15 - Private key decryption (PKCS #1 v1.5) 3468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Private key 3478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @in: Encrypted buffer 3488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @inlen: Length of encrypted buffer in bytes 3498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @out: Output buffer for encrypted data 3508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @outlen: Length of output buffer in bytes; set to used length on success 3518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure 3528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 3538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 3548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 3558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 3568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 3578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint __must_check crypto_private_key_decrypt_pkcs1_v15( 3588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct crypto_private_key *key, const u8 *in, size_t inlen, 3598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 *out, size_t *outlen); 3608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 3628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_private_key_sign_pkcs1 - Sign with private key (PKCS #1) 3638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Private key from crypto_private_key_import() 3648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @in: Plaintext buffer 3658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @inlen: Length of plaintext buffer in bytes 3668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @out: Output buffer for encrypted (signed) data 3678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @outlen: Length of output buffer in bytes; set to used length on success 3688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure 3698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 3708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 3718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 3728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 3738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 3748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint __must_check crypto_private_key_sign_pkcs1(struct crypto_private_key *key, 3758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt const u8 *in, size_t inlen, 3768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 *out, size_t *outlen); 3778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 3798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_public_key_free - Free public key 3808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Public key 3818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 3828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 3838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 3848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 3858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 3868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid crypto_public_key_free(struct crypto_public_key *key); 3878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 3898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_private_key_free - Free private key 3908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Private key from crypto_private_key_import() 3918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 3928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 3938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 3948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 3958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 3968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid crypto_private_key_free(struct crypto_private_key *key); 3978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 3998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_public_key_decrypt_pkcs1 - Decrypt PKCS #1 signature 4008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Public key 4018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @crypt: Encrypted signature data (using the private key) 4028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @crypt_len: Encrypted signature data length 4038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @plain: Buffer for plaintext (at least crypt_len bytes) 4048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @plain_len: Plaintext length (max buffer size on input, real len on output); 4058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure 4068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 4078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint __must_check crypto_public_key_decrypt_pkcs1( 4088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, 4098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 *plain, size_t *plain_len); 4108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 4118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 4128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_global_init - Initialize crypto wrapper 4138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 4148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 4158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 4168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 4178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 4188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint __must_check crypto_global_init(void); 4198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 4208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 4218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_global_deinit - Deinitialize crypto wrapper 4228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 4238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 4248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 4258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 4268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 4278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid crypto_global_deinit(void); 4288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 4298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 4308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_mod_exp - Modular exponentiation of large integers 4318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @base: Base integer (big endian byte array) 4328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @base_len: Length of base integer in bytes 4338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @power: Power integer (big endian byte array) 4348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @power_len: Length of power integer in bytes 4358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @modulus: Modulus integer (big endian byte array) 4368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @modulus_len: Length of modulus integer in bytes 4378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @result: Buffer for the result 4388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @result_len: Result length (max buffer size on input, real len on output) 4398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure 4408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 4418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function calculates result = base ^ power mod modulus. modules_len is 4428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * used as the maximum size of modulus buffer. It is set to the used size on 4438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * success. 4448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 4458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 4468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 4478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 4488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 4498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint __must_check crypto_mod_exp(const u8 *base, size_t base_len, 4508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt const u8 *power, size_t power_len, 4518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt const u8 *modulus, size_t modulus_len, 4528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 *result, size_t *result_len); 4538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 4548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 4558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * rc4_skip - XOR RC4 stream to given data with skip-stream-start 4568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: RC4 key 4578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @keylen: RC4 key length 4588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @skip: number of bytes to skip from the beginning of the RC4 stream 4598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @data: data to be XOR'ed with RC4 stream 4608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @data_len: buf length 4618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure 4628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 4638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Generate RC4 pseudo random stream for the given key, skip beginning of the 4648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * stream, and XOR the end result with the data buffer to perform RC4 4658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * encryption/decryption. 4668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 4678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint rc4_skip(const u8 *key, size_t keylen, size_t skip, 4688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 *data, size_t data_len); 4698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 4708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CRYPTO_H */ 471