Orange Pi5 kernel

Deprecated Linux kernel 5.10.110 for OrangePi 5/5B/5+ boards

3 Commits   0 Branches   0 Tags
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  1) /* SPDX-License-Identifier: GPL-2.0 OR MIT */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  2) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  3)  * Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  4)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  5) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  6) #ifndef __CHACHA20POLY1305_H
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  7) #define __CHACHA20POLY1305_H
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  8) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  9) #include <linux/types.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 10) #include <linux/scatterlist.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 11) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 12) enum chacha20poly1305_lengths {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 13) 	XCHACHA20POLY1305_NONCE_SIZE = 24,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 14) 	CHACHA20POLY1305_KEY_SIZE = 32,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 15) 	CHACHA20POLY1305_AUTHTAG_SIZE = 16
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 16) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 17) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 18) void chacha20poly1305_encrypt(u8 *dst, const u8 *src, const size_t src_len,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 19) 			      const u8 *ad, const size_t ad_len,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 20) 			      const u64 nonce,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 21) 			      const u8 key[CHACHA20POLY1305_KEY_SIZE]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 22) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 23) bool __must_check
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 24) chacha20poly1305_decrypt(u8 *dst, const u8 *src, const size_t src_len,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 25) 			 const u8 *ad, const size_t ad_len, const u64 nonce,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 26) 			 const u8 key[CHACHA20POLY1305_KEY_SIZE]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 27) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 28) void xchacha20poly1305_encrypt(u8 *dst, const u8 *src, const size_t src_len,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 29) 			       const u8 *ad, const size_t ad_len,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 30) 			       const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE],
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 31) 			       const u8 key[CHACHA20POLY1305_KEY_SIZE]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 32) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 33) bool __must_check xchacha20poly1305_decrypt(
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 34) 	u8 *dst, const u8 *src, const size_t src_len, const u8 *ad,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 35) 	const size_t ad_len, const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE],
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 36) 	const u8 key[CHACHA20POLY1305_KEY_SIZE]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 37) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 38) bool chacha20poly1305_encrypt_sg_inplace(struct scatterlist *src, size_t src_len,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 39) 					 const u8 *ad, const size_t ad_len,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 40) 					 const u64 nonce,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 41) 					 const u8 key[CHACHA20POLY1305_KEY_SIZE]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 42) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 43) bool chacha20poly1305_decrypt_sg_inplace(struct scatterlist *src, size_t src_len,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 44) 					 const u8 *ad, const size_t ad_len,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 45) 					 const u64 nonce,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 46) 					 const u8 key[CHACHA20POLY1305_KEY_SIZE]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 47) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 48) bool chacha20poly1305_selftest(void);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 49) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 50) #endif /* __CHACHA20POLY1305_H */