crypto.h revision c5ec7f57ead87efa365800228aa0b09a12d9e6c4
18d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/*
28d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * WPA Supplicant / wrapper functions for crypto libraries
38d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Copyright (c) 2004-2009, Jouni Malinen <j@w1.fi>
48d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
5c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt * This software may be distributed under the terms of the BSD license.
6c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt * See README for more details.
78d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
88d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This file defines the cryptographic functions that need to be implemented
98d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * for wpa_supplicant and hostapd. When TLS is not used, internal
108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * implementation of MD5, SHA1, and AES is used and no external libraries are
118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * required. When TLS is enabled (e.g., by enabling EAP-TLS or EAP-PEAP), the
128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto library used by the TLS implementation is expected to be used for
138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * non-TLS needs, too, in order to save space by not implementing these
148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * functions twice.
158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Wrapper code for using each crypto library is in its own file (crypto*.c)
178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * and one of these files is build and linked in to provide the functions
188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * defined here.
198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifndef CRYPTO_H
228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#define CRYPTO_H
238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * md4_vector - MD4 hash for data vector
268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @num_elem: Number of elements in the data vector
278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @addr: Pointers to the data areas
288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Lengths of the data blocks
298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @mac: Buffer for the hash
308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure
318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac);
338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * md5_vector - MD5 hash for data vector
368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @num_elem: Number of elements in the data vector
378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @addr: Pointers to the data areas
388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Lengths of the data blocks
398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @mac: Buffer for the hash
408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure
418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac);
438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_FIPS
458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * md5_vector_non_fips_allow - MD5 hash for data vector (non-FIPS use allowed)
478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @num_elem: Number of elements in the data vector
488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @addr: Pointers to the data areas
498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Lengths of the data blocks
508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @mac: Buffer for the hash
518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure
528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint md5_vector_non_fips_allow(size_t num_elem, const u8 *addr[],
548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			      const size_t *len, u8 *mac);
558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#else /* CONFIG_FIPS */
568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#define md5_vector_non_fips_allow md5_vector
578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_FIPS */
588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * sha1_vector - SHA-1 hash for data vector
628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @num_elem: Number of elements in the data vector
638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @addr: Pointers to the data areas
648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Lengths of the data blocks
658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @mac: Buffer for the hash
668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure
678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len,
698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		u8 *mac);
708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * fips186_2-prf - NIST FIPS Publication 186-2 change notice 1 PRF
738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @seed: Seed/key for the PRF
748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @seed_len: Seed length in bytes
758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @x: Buffer for PRF output
768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @xlen: Output length in bytes
778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure
788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function implements random number generation specified in NIST FIPS
808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Publication 186-2 for EAP-SIM. This PRF uses a function that is similar to
818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * SHA-1, but has different message padding.
828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint __must_check fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x,
848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       size_t xlen);
858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * sha256_vector - SHA256 hash for data vector
888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @num_elem: Number of elements in the data vector
898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @addr: Pointers to the data areas
908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Lengths of the data blocks
918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @mac: Buffer for the hash
928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure
938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint sha256_vector(size_t num_elem, const u8 *addr[], const size_t *len,
958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		  u8 *mac);
968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * des_encrypt - Encrypt one block with DES
998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @clear: 8 octets (in)
1008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: 7 octets (in) (no parity bits included)
1018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @cypher: 8 octets (out)
1028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
1038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid des_encrypt(const u8 *clear, const u8 *key, u8 *cypher);
1048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
1068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * aes_encrypt_init - Initialize AES for encryption
1078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Encryption key
1088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Key length in bytes (usually 16, i.e., 128 bits)
1098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: Pointer to context data or %NULL on failure
1108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
1118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid * aes_encrypt_init(const u8 *key, size_t len);
1128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
1148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * aes_encrypt - Encrypt one AES block
1158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @ctx: Context pointer from aes_encrypt_init()
1168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @plain: Plaintext data to be encrypted (16 bytes)
1178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @crypt: Buffer for the encrypted data (16 bytes)
1188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
1198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid aes_encrypt(void *ctx, const u8 *plain, u8 *crypt);
1208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
1228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * aes_encrypt_deinit - Deinitialize AES encryption
1238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @ctx: Context pointer from aes_encrypt_init()
1248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
1258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid aes_encrypt_deinit(void *ctx);
1268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
1288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * aes_decrypt_init - Initialize AES for decryption
1298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Decryption key
1308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Key length in bytes (usually 16, i.e., 128 bits)
1318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: Pointer to context data or %NULL on failure
1328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
1338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid * aes_decrypt_init(const u8 *key, size_t len);
1348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
1368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * aes_decrypt - Decrypt one AES block
1378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @ctx: Context pointer from aes_encrypt_init()
1388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @crypt: Encrypted data (16 bytes)
1398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @plain: Buffer for the decrypted data (16 bytes)
1408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
1418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid aes_decrypt(void *ctx, const u8 *crypt, u8 *plain);
1428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
1448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * aes_decrypt_deinit - Deinitialize AES decryption
1458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @ctx: Context pointer from aes_encrypt_init()
1468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
1478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid aes_decrypt_deinit(void *ctx);
1488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtenum crypto_hash_alg {
1518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	CRYPTO_HASH_ALG_MD5, CRYPTO_HASH_ALG_SHA1,
1521f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	CRYPTO_HASH_ALG_HMAC_MD5, CRYPTO_HASH_ALG_HMAC_SHA1,
1531f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	CRYPTO_HASH_ALG_SHA256, CRYPTO_HASH_ALG_HMAC_SHA256
1548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt};
1558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct crypto_hash;
1578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
1598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_hash_init - Initialize hash/HMAC function
1608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @alg: Hash algorithm
1618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Key for keyed hash (e.g., HMAC) or %NULL if not needed
1628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key_len: Length of the key in bytes
1638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: Pointer to hash context to use with other hash functions or %NULL
1648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * on failure
1658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
1668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation
1678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
1688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this.
1698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
1708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key,
1718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				      size_t key_len);
1728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
1748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_hash_update - Add data to hash calculation
1758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @ctx: Context pointer from crypto_hash_init()
1768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @data: Data buffer to add
1778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Length of the buffer
1788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
1798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation
1808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
1818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this.
1828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
1838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid crypto_hash_update(struct crypto_hash *ctx, const u8 *data, size_t len);
1848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
1868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_hash_finish - Complete hash calculation
1878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @ctx: Context pointer from crypto_hash_init()
1888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @hash: Buffer for hash value or %NULL if caller is just freeing the hash
1898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * context
1908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Pointer to length of the buffer or %NULL if caller is just freeing the
1918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * hash context; on return, this is set to the actual length of the hash value
1928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 if buffer is too small (len set to needed length),
1938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * or -2 on other failures (including failed crypto_hash_update() operations)
1948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
1958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function calculates the hash value and frees the context buffer that
1968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * was used for hash calculation.
1978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
1988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation
1998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
2008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this.
2018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
2028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint crypto_hash_finish(struct crypto_hash *ctx, u8 *hash, size_t *len);
2038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtenum crypto_cipher_alg {
2068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	CRYPTO_CIPHER_NULL = 0, CRYPTO_CIPHER_ALG_AES, CRYPTO_CIPHER_ALG_3DES,
2078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	CRYPTO_CIPHER_ALG_DES, CRYPTO_CIPHER_ALG_RC2, CRYPTO_CIPHER_ALG_RC4
2088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt};
2098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct crypto_cipher;
2118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
2138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_cipher_init - Initialize block/stream cipher function
2148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @alg: Cipher algorithm
2158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @iv: Initialization vector for block ciphers or %NULL for stream ciphers
2168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Cipher key
2178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key_len: Length of key in bytes
2188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: Pointer to cipher context to use with other cipher functions or
2198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * %NULL on failure
2208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
2218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation
2228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
2238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this.
2248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
2258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg,
2268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt					  const u8 *iv, const u8 *key,
2278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt					  size_t key_len);
2288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
2308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_cipher_encrypt - Cipher encrypt
2318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @ctx: Context pointer from crypto_cipher_init()
2328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @plain: Plaintext to cipher
2338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @crypt: Resulting ciphertext
2348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Length of the plaintext
2358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure
2368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
2378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation
2388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
2398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this.
2408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
2418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint __must_check crypto_cipher_encrypt(struct crypto_cipher *ctx,
2428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				       const u8 *plain, u8 *crypt, size_t len);
2438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
2458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_cipher_decrypt - Cipher decrypt
2468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @ctx: Context pointer from crypto_cipher_init()
2478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @crypt: Ciphertext to decrypt
2488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @plain: Resulting plaintext
2498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Length of the cipher text
2508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure
2518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
2528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation
2538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
2548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this.
2558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
2568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint __must_check crypto_cipher_decrypt(struct crypto_cipher *ctx,
2578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				       const u8 *crypt, u8 *plain, size_t len);
2588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
2608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_cipher_decrypt - Free cipher context
2618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @ctx: Context pointer from crypto_cipher_init()
2628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
2638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation
2648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
2658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this.
2668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
2678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid crypto_cipher_deinit(struct crypto_cipher *ctx);
2688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct crypto_public_key;
2718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct crypto_private_key;
2728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
2748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_public_key_import - Import an RSA public key
2758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Key buffer (DER encoded RSA public key)
2768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Key buffer length in bytes
2778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: Pointer to the public key or %NULL on failure
2788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
2798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function can just return %NULL if the crypto library supports X.509
2808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * parsing. In that case, crypto_public_key_from_cert() is used to import the
2818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * public key from a certificate.
2828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
2838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation
2848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
2858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this.
2868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
2878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct crypto_public_key * crypto_public_key_import(const u8 *key, size_t len);
2888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
2908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_private_key_import - Import an RSA private key
2918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Key buffer (DER encoded RSA private key)
2928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Key buffer length in bytes
2938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @passwd: Key encryption password or %NULL if key is not encrypted
2948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: Pointer to the private key or %NULL on failure
2958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
2968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation
2978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
2988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this.
2998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
3008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct crypto_private_key * crypto_private_key_import(const u8 *key,
3018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt						      size_t len,
3028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt						      const char *passwd);
3038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
3048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
3058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_public_key_from_cert - Import an RSA public key from a certificate
3068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @buf: DER encoded X.509 certificate
3078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @len: Certificate buffer length in bytes
3088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: Pointer to public key or %NULL on failure
3098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
3108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function can just return %NULL if the crypto library does not support
3118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * X.509 parsing. In that case, internal code will be used to parse the
3128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * certificate and public key is imported using crypto_public_key_import().
3138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
3148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation
3158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
3168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this.
3178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
3188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct crypto_public_key * crypto_public_key_from_cert(const u8 *buf,
3198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt						       size_t len);
3208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
3218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
3228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_public_key_encrypt_pkcs1_v15 - Public key encryption (PKCS #1 v1.5)
3238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Public key
3248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @in: Plaintext buffer
3258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @inlen: Length of plaintext buffer in bytes
3268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @out: Output buffer for encrypted data
3278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @outlen: Length of output buffer in bytes; set to used length on success
3288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure
3298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
3308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation
3318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
3328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this.
3338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
3348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint __must_check crypto_public_key_encrypt_pkcs1_v15(
3358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct crypto_public_key *key, const u8 *in, size_t inlen,
3368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	u8 *out, size_t *outlen);
3378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
3388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
3398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_private_key_decrypt_pkcs1_v15 - Private key decryption (PKCS #1 v1.5)
3408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Private key
3418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @in: Encrypted buffer
3428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @inlen: Length of encrypted buffer in bytes
3438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @out: Output buffer for encrypted data
3448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @outlen: Length of output buffer in bytes; set to used length on success
3458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure
3468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
3478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation
3488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
3498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this.
3508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
3518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint __must_check crypto_private_key_decrypt_pkcs1_v15(
3528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct crypto_private_key *key, const u8 *in, size_t inlen,
3538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	u8 *out, size_t *outlen);
3548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
3558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
3568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_private_key_sign_pkcs1 - Sign with private key (PKCS #1)
3578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Private key from crypto_private_key_import()
3588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @in: Plaintext buffer
3598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @inlen: Length of plaintext buffer in bytes
3608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @out: Output buffer for encrypted (signed) data
3618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @outlen: Length of output buffer in bytes; set to used length on success
3628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure
3638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
3648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation
3658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
3668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this.
3678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
3688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint __must_check crypto_private_key_sign_pkcs1(struct crypto_private_key *key,
3698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt					       const u8 *in, size_t inlen,
3708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt					       u8 *out, size_t *outlen);
3718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
3728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
3738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_public_key_free - Free public key
3748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Public key
3758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
3768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation
3778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
3788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this.
3798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
3808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid crypto_public_key_free(struct crypto_public_key *key);
3818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
3828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
3838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_private_key_free - Free private key
3848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Private key from crypto_private_key_import()
3858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
3868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation
3878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
3888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this.
3898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
3908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid crypto_private_key_free(struct crypto_private_key *key);
3918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
3928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
3938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_public_key_decrypt_pkcs1 - Decrypt PKCS #1 signature
3948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: Public key
3958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @crypt: Encrypted signature data (using the private key)
3968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @crypt_len: Encrypted signature data length
3978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @plain: Buffer for plaintext (at least crypt_len bytes)
3988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @plain_len: Plaintext length (max buffer size on input, real len on output);
3998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure
4008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
4018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint __must_check crypto_public_key_decrypt_pkcs1(
4028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct crypto_public_key *key, const u8 *crypt, size_t crypt_len,
4038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	u8 *plain, size_t *plain_len);
4048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
4058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
4068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_global_init - Initialize crypto wrapper
4078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
4088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation
4098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
4108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this.
4118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
4128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint __must_check crypto_global_init(void);
4138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
4148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
4158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_global_deinit - Deinitialize crypto wrapper
4168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
4178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation
4188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
4198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this.
4208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
4218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid crypto_global_deinit(void);
4228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
4238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
4248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * crypto_mod_exp - Modular exponentiation of large integers
4258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @base: Base integer (big endian byte array)
4268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @base_len: Length of base integer in bytes
4278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @power: Power integer (big endian byte array)
4288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @power_len: Length of power integer in bytes
4298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @modulus: Modulus integer (big endian byte array)
4308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @modulus_len: Length of modulus integer in bytes
4318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @result: Buffer for the result
4328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @result_len: Result length (max buffer size on input, real len on output)
4338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure
4348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
4358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function calculates result = base ^ power mod modulus. modules_len is
4368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * used as the maximum size of modulus buffer. It is set to the used size on
4378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * success.
4388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
4398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * This function is only used with internal TLSv1 implementation
4408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (CONFIG_TLS=internal). If that is not used, the crypto wrapper does not need
4418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * to implement this.
4428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
4438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint __must_check crypto_mod_exp(const u8 *base, size_t base_len,
4448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				const u8 *power, size_t power_len,
4458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				const u8 *modulus, size_t modulus_len,
4468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				u8 *result, size_t *result_len);
4478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
4488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/**
4498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * rc4_skip - XOR RC4 stream to given data with skip-stream-start
4508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @key: RC4 key
4518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @keylen: RC4 key length
4528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @skip: number of bytes to skip from the beginning of the RC4 stream
4538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @data: data to be XOR'ed with RC4 stream
4548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * @data_len: buf length
4558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Returns: 0 on success, -1 on failure
4568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
4578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Generate RC4 pseudo random stream for the given key, skip beginning of the
4588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * stream, and XOR the end result with the data buffer to perform RC4
4598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * encryption/decryption.
4608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
4618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint rc4_skip(const u8 *key, size_t keylen, size_t skip,
4628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	     u8 *data, size_t data_len);
4638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
4648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CRYPTO_H */
465