Orange Pi5 kernel

Deprecated Linux kernel 5.10.110 for OrangePi 5/5B/5+ boards

3 Commits   0 Branches   0 Tags
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  1) /* SPDX-License-Identifier: GPL-2.0 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  2) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  3)  * Common values for AES algorithms
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  4)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  5) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  6) #ifndef _CRYPTO_AES_H
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  7) #define _CRYPTO_AES_H
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  8) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  9) #include <linux/types.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 10) #include <linux/crypto.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 11) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 12) #define AES_MIN_KEY_SIZE	16
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 13) #define AES_MAX_KEY_SIZE	32
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 14) #define AES_KEYSIZE_128		16
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 15) #define AES_KEYSIZE_192		24
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 16) #define AES_KEYSIZE_256		32
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 17) #define AES_BLOCK_SIZE		16
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 18) #define AES_MAX_KEYLENGTH	(15 * 16)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 19) #define AES_MAX_KEYLENGTH_U32	(AES_MAX_KEYLENGTH / sizeof(u32))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 20) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 21) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 22)  * Please ensure that the first two fields are 16-byte aligned
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 23)  * relative to the start of the structure, i.e., don't move them!
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 24)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 25) struct crypto_aes_ctx {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 26) 	u32 key_enc[AES_MAX_KEYLENGTH_U32];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 27) 	u32 key_dec[AES_MAX_KEYLENGTH_U32];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 28) 	u32 key_length;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 29) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 30) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 31) extern const u32 crypto_ft_tab[4][256] ____cacheline_aligned;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 32) extern const u32 crypto_it_tab[4][256] ____cacheline_aligned;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 33) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 34) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 35)  * validate key length for AES algorithms
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 36)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 37) static inline int aes_check_keylen(unsigned int keylen)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 38) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 39) 	switch (keylen) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 40) 	case AES_KEYSIZE_128:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 41) 	case AES_KEYSIZE_192:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 42) 	case AES_KEYSIZE_256:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 43) 		break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 44) 	default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 45) 		return -EINVAL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 46) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 47) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 48) 	return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 49) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 50) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 51) int crypto_aes_set_key(struct crypto_tfm *tfm, const u8 *in_key,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 52) 		unsigned int key_len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 53) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 54) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 55)  * aes_expandkey - Expands the AES key as described in FIPS-197
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 56)  * @ctx:	The location where the computed key will be stored.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 57)  * @in_key:	The supplied key.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 58)  * @key_len:	The length of the supplied key.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 59)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 60)  * Returns 0 on success. The function fails only if an invalid key size (or
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 61)  * pointer) is supplied.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 62)  * The expanded key size is 240 bytes (max of 14 rounds with a unique 16 bytes
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 63)  * key schedule plus a 16 bytes key which is used before the first round).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 64)  * The decryption key is prepared for the "Equivalent Inverse Cipher" as
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 65)  * described in FIPS-197. The first slot (16 bytes) of each key (enc or dec) is
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 66)  * for the initial combination, the second slot for the first round and so on.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 67)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 68) int aes_expandkey(struct crypto_aes_ctx *ctx, const u8 *in_key,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 69) 		  unsigned int key_len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 70) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 71) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 72)  * aes_encrypt - Encrypt a single AES block
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 73)  * @ctx:	Context struct containing the key schedule
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 74)  * @out:	Buffer to store the ciphertext
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 75)  * @in:		Buffer containing the plaintext
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 76)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 77) void aes_encrypt(const struct crypto_aes_ctx *ctx, u8 *out, const u8 *in);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 78) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 79) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 80)  * aes_decrypt - Decrypt a single AES block
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 81)  * @ctx:	Context struct containing the key schedule
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 82)  * @out:	Buffer to store the plaintext
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 83)  * @in:		Buffer containing the ciphertext
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 84)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 85) void aes_decrypt(const struct crypto_aes_ctx *ctx, u8 *out, const u8 *in);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 86) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 87) extern const u8 crypto_aes_sbox[];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 88) extern const u8 crypto_aes_inv_sbox[];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 89) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 90) #endif