crypto.h revision c5ec7f57ead87efa365800228aa0b09a12d9e6c4
18d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/* 28d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * WPA Supplicant / wrapper functions for crypto libraries 38d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Copyright (c) 2004-2009, Jouni Malinen <j@w1.fi> 48d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 5c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt * This software may be distributed under the terms of the BSD license. 6c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt * See README for more details. 78d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 88d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This file defines the cryptographic functions that need to be implemented 98d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * for wpa_supplicant and hostapd. When TLS is not used, internal 108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * implementation of MD5, SHA1, and AES is used and no external libraries are 118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * required. When TLS is enabled (e.g., by enabling EAP-TLS or EAP-PEAP), the 128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto library used by the TLS implementation is expected to be used for 138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * non-TLS needs, too, in order to save space by not implementing these 148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * functions twice. 158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Wrapper code for using each crypto library is in its own file (crypto*.c) 178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * and one of these files is build and linked in to provide the functions 188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * defined here. 198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifndef CRYPTO_H 228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#define CRYPTO_H 238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * md4_vector - MD4 hash for data vector 268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @num_elem: Number of elements in the data vector 278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @addr: Pointers to the data areas 288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Lengths of the data blocks 298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @mac: Buffer for the hash 308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure 318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac); 338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * md5_vector - MD5 hash for data vector 368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @num_elem: Number of elements in the data vector 378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @addr: Pointers to the data areas 388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Lengths of the data blocks 398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @mac: Buffer for the hash 408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure 418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac); 438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_FIPS 458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * md5_vector_non_fips_allow - MD5 hash for data vector (non-FIPS use allowed) 478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @num_elem: Number of elements in the data vector 488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @addr: Pointers to the data areas 498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Lengths of the data blocks 508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @mac: Buffer for the hash 518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure 528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint md5_vector_non_fips_allow(size_t num_elem, const u8 *addr[], 548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt const size_t *len, u8 *mac); 558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#else /* CONFIG_FIPS */ 568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#define md5_vector_non_fips_allow md5_vector 578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_FIPS */ 588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * sha1_vector - SHA-1 hash for data vector 628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @num_elem: Number of elements in the data vector 638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @addr: Pointers to the data areas 648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Lengths of the data blocks 658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @mac: Buffer for the hash 668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure 678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, 698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 *mac); 708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * fips186_2-prf - NIST FIPS Publication 186-2 change notice 1 PRF 738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @seed: Seed/key for the PRF 748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @seed_len: Seed length in bytes 758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @x: Buffer for PRF output 768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @xlen: Output length in bytes 778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure 788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function implements random number generation specified in NIST FIPS 808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Publication 186-2 for EAP-SIM. This PRF uses a function that is similar to 818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * SHA-1, but has different message padding. 828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint __must_check fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, 848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt size_t xlen); 858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * sha256_vector - SHA256 hash for data vector 888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @num_elem: Number of elements in the data vector 898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @addr: Pointers to the data areas 908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Lengths of the data blocks 918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @mac: Buffer for the hash 928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure 938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint sha256_vector(size_t num_elem, const u8 *addr[], const size_t *len, 958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 *mac); 968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * des_encrypt - Encrypt one block with DES 998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @clear: 8 octets (in) 1008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: 7 octets (in) (no parity bits included) 1018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @cypher: 8 octets (out) 1028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 1038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid des_encrypt(const u8 *clear, const u8 *key, u8 *cypher); 1048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 1068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * aes_encrypt_init - Initialize AES for encryption 1078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Encryption key 1088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Key length in bytes (usually 16, i.e., 128 bits) 1098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: Pointer to context data or %NULL on failure 1108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 1118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid * aes_encrypt_init(const u8 *key, size_t len); 1128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 1148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * aes_encrypt - Encrypt one AES block 1158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @ctx: Context pointer from aes_encrypt_init() 1168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @plain: Plaintext data to be encrypted (16 bytes) 1178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @crypt: Buffer for the encrypted data (16 bytes) 1188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 1198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid aes_encrypt(void *ctx, const u8 *plain, u8 *crypt); 1208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 1228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * aes_encrypt_deinit - Deinitialize AES encryption 1238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @ctx: Context pointer from aes_encrypt_init() 1248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 1258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid aes_encrypt_deinit(void *ctx); 1268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 1288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * aes_decrypt_init - Initialize AES for decryption 1298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Decryption key 1308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Key length in bytes (usually 16, i.e., 128 bits) 1318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: Pointer to context data or %NULL on failure 1328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 1338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid * aes_decrypt_init(const u8 *key, size_t len); 1348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 1368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * aes_decrypt - Decrypt one AES block 1378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @ctx: Context pointer from aes_encrypt_init() 1388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @crypt: Encrypted data (16 bytes) 1398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @plain: Buffer for the decrypted data (16 bytes) 1408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 1418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid aes_decrypt(void *ctx, const u8 *crypt, u8 *plain); 1428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 1448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * aes_decrypt_deinit - Deinitialize AES decryption 1458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @ctx: Context pointer from aes_encrypt_init() 1468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 1478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid aes_decrypt_deinit(void *ctx); 1488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtenum crypto_hash_alg { 1518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt CRYPTO_HASH_ALG_MD5, CRYPTO_HASH_ALG_SHA1, 1521f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt CRYPTO_HASH_ALG_HMAC_MD5, CRYPTO_HASH_ALG_HMAC_SHA1, 1531f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt CRYPTO_HASH_ALG_SHA256, CRYPTO_HASH_ALG_HMAC_SHA256 1548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}; 1558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct crypto_hash; 1578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 1598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_hash_init - Initialize hash/HMAC function 1608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @alg: Hash algorithm 1618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Key for keyed hash (e.g., HMAC) or %NULL if not needed 1628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key_len: Length of the key in bytes 1638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: Pointer to hash context to use with other hash functions or %NULL 1648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * on failure 1658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 1668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 1678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 1688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 1698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 1708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, 1718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt size_t key_len); 1728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 1748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_hash_update - Add data to hash calculation 1758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @ctx: Context pointer from crypto_hash_init() 1768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @data: Data buffer to add 1778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Length of the buffer 1788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 1798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 1808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 1818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 1828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 1838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid crypto_hash_update(struct crypto_hash *ctx, const u8 *data, size_t len); 1848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 1868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_hash_finish - Complete hash calculation 1878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @ctx: Context pointer from crypto_hash_init() 1888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @hash: Buffer for hash value or %NULL if caller is just freeing the hash 1898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * context 1908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Pointer to length of the buffer or %NULL if caller is just freeing the 1918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * hash context; on return, this is set to the actual length of the hash value 1928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 if buffer is too small (len set to needed length), 1938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * or -2 on other failures (including failed crypto_hash_update() operations) 1948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 1958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function calculates the hash value and frees the context buffer that 1968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * was used for hash calculation. 1978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 1988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 1998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 2008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 2018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 2028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint crypto_hash_finish(struct crypto_hash *ctx, u8 *hash, size_t *len); 2038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtenum crypto_cipher_alg { 2068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt CRYPTO_CIPHER_NULL = 0, CRYPTO_CIPHER_ALG_AES, CRYPTO_CIPHER_ALG_3DES, 2078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt CRYPTO_CIPHER_ALG_DES, CRYPTO_CIPHER_ALG_RC2, CRYPTO_CIPHER_ALG_RC4 2088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}; 2098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct crypto_cipher; 2118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 2138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_cipher_init - Initialize block/stream cipher function 2148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @alg: Cipher algorithm 2158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @iv: Initialization vector for block ciphers or %NULL for stream ciphers 2168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Cipher key 2178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key_len: Length of key in bytes 2188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: Pointer to cipher context to use with other cipher functions or 2198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * %NULL on failure 2208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 2218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 2228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 2238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 2248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 2258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, 2268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt const u8 *iv, const u8 *key, 2278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt size_t key_len); 2288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 2308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_cipher_encrypt - Cipher encrypt 2318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @ctx: Context pointer from crypto_cipher_init() 2328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @plain: Plaintext to cipher 2338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @crypt: Resulting ciphertext 2348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Length of the plaintext 2358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure 2368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 2378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 2388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 2398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 2408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 2418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint __must_check crypto_cipher_encrypt(struct crypto_cipher *ctx, 2428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt const u8 *plain, u8 *crypt, size_t len); 2438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 2458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_cipher_decrypt - Cipher decrypt 2468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @ctx: Context pointer from crypto_cipher_init() 2478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @crypt: Ciphertext to decrypt 2488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @plain: Resulting plaintext 2498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Length of the cipher text 2508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure 2518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 2528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 2538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 2548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 2558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 2568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint __must_check crypto_cipher_decrypt(struct crypto_cipher *ctx, 2578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt const u8 *crypt, u8 *plain, size_t len); 2588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 2608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_cipher_decrypt - Free cipher context 2618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @ctx: Context pointer from crypto_cipher_init() 2628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 2638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 2648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 2658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 2668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 2678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid crypto_cipher_deinit(struct crypto_cipher *ctx); 2688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct crypto_public_key; 2718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct crypto_private_key; 2728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 2748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_public_key_import - Import an RSA public key 2758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Key buffer (DER encoded RSA public key) 2768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Key buffer length in bytes 2778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: Pointer to the public key or %NULL on failure 2788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 2798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function can just return %NULL if the crypto library supports X.509 2808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * parsing. In that case, crypto_public_key_from_cert() is used to import the 2818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * public key from a certificate. 2828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 2838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 2848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 2858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 2868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 2878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct crypto_public_key * crypto_public_key_import(const u8 *key, size_t len); 2888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 2908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_private_key_import - Import an RSA private key 2918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Key buffer (DER encoded RSA private key) 2928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Key buffer length in bytes 2938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @passwd: Key encryption password or %NULL if key is not encrypted 2948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: Pointer to the private key or %NULL on failure 2958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 2968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 2978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 2988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 2998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 3008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct crypto_private_key * crypto_private_key_import(const u8 *key, 3018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt size_t len, 3028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt const char *passwd); 3038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 3058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_public_key_from_cert - Import an RSA public key from a certificate 3068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @buf: DER encoded X.509 certificate 3078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Certificate buffer length in bytes 3088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: Pointer to public key or %NULL on failure 3098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 3108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function can just return %NULL if the crypto library does not support 3118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * X.509 parsing. In that case, internal code will be used to parse the 3128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * certificate and public key is imported using crypto_public_key_import(). 3138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 3148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 3158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 3168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 3178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 3188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct crypto_public_key * crypto_public_key_from_cert(const u8 *buf, 3198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt size_t len); 3208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 3228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_public_key_encrypt_pkcs1_v15 - Public key encryption (PKCS #1 v1.5) 3238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Public key 3248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @in: Plaintext buffer 3258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @inlen: Length of plaintext buffer in bytes 3268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @out: Output buffer for encrypted data 3278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @outlen: Length of output buffer in bytes; set to used length on success 3288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure 3298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 3308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 3318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 3328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 3338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 3348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint __must_check crypto_public_key_encrypt_pkcs1_v15( 3358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct crypto_public_key *key, const u8 *in, size_t inlen, 3368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 *out, size_t *outlen); 3378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 3398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_private_key_decrypt_pkcs1_v15 - Private key decryption (PKCS #1 v1.5) 3408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Private key 3418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @in: Encrypted buffer 3428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @inlen: Length of encrypted buffer in bytes 3438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @out: Output buffer for encrypted data 3448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @outlen: Length of output buffer in bytes; set to used length on success 3458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure 3468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 3478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 3488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 3498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 3508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 3518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint __must_check crypto_private_key_decrypt_pkcs1_v15( 3528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct crypto_private_key *key, const u8 *in, size_t inlen, 3538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 *out, size_t *outlen); 3548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 3568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_private_key_sign_pkcs1 - Sign with private key (PKCS #1) 3578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Private key from crypto_private_key_import() 3588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @in: Plaintext buffer 3598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @inlen: Length of plaintext buffer in bytes 3608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @out: Output buffer for encrypted (signed) data 3618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @outlen: Length of output buffer in bytes; set to used length on success 3628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure 3638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 3648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 3658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 3668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 3678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 3688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint __must_check crypto_private_key_sign_pkcs1(struct crypto_private_key *key, 3698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt const u8 *in, size_t inlen, 3708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 *out, size_t *outlen); 3718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 3738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_public_key_free - Free public key 3748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Public key 3758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 3768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 3778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 3788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 3798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 3808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid crypto_public_key_free(struct crypto_public_key *key); 3818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 3838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_private_key_free - Free private key 3848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Private key from crypto_private_key_import() 3858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 3868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 3878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 3888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 3898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 3908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid crypto_private_key_free(struct crypto_private_key *key); 3918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 3938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_public_key_decrypt_pkcs1 - Decrypt PKCS #1 signature 3948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Public key 3958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @crypt: Encrypted signature data (using the private key) 3968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @crypt_len: Encrypted signature data length 3978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @plain: Buffer for plaintext (at least crypt_len bytes) 3988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @plain_len: Plaintext length (max buffer size on input, real len on output); 3998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure 4008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 4018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint __must_check crypto_public_key_decrypt_pkcs1( 4028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, 4038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 *plain, size_t *plain_len); 4048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 4058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 4068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_global_init - Initialize crypto wrapper 4078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 4088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 4098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 4108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 4118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 4128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint __must_check crypto_global_init(void); 4138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 4148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 4158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_global_deinit - Deinitialize crypto wrapper 4168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 4178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 4188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 4198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 4208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 4218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid crypto_global_deinit(void); 4228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 4238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 4248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_mod_exp - Modular exponentiation of large integers 4258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @base: Base integer (big endian byte array) 4268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @base_len: Length of base integer in bytes 4278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @power: Power integer (big endian byte array) 4288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @power_len: Length of power integer in bytes 4298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @modulus: Modulus integer (big endian byte array) 4308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @modulus_len: Length of modulus integer in bytes 4318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @result: Buffer for the result 4328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @result_len: Result length (max buffer size on input, real len on output) 4338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure 4348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 4358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function calculates result = base ^ power mod modulus. modules_len is 4368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * used as the maximum size of modulus buffer. It is set to the used size on 4378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * success. 4388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 4398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation 4408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need 4418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this. 4428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 4438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint __must_check crypto_mod_exp(const u8 *base, size_t base_len, 4448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt const u8 *power, size_t power_len, 4458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt const u8 *modulus, size_t modulus_len, 4468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 *result, size_t *result_len); 4478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 4488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/** 4498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * rc4_skip - XOR RC4 stream to given data with skip-stream-start 4508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: RC4 key 4518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @keylen: RC4 key length 4528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @skip: number of bytes to skip from the beginning of the RC4 stream 4538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @data: data to be XOR'ed with RC4 stream 4548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @data_len: buf length 4558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure 4568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 4578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Generate RC4 pseudo random stream for the given key, skip beginning of the 4588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * stream, and XOR the end result with the data buffer to perform RC4 4598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * encryption/decryption. 4608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 4618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint rc4_skip(const u8 *key, size_t keylen, size_t skip, 4628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 *data, size_t data_len); 4638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 4648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CRYPTO_H */ 465