Orange Pi5 kernel

Deprecated Linux kernel 5.10.110 for OrangePi 5/5B/5+ boards

3 Commits   0 Branches   0 Tags
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  1) /* SPDX-License-Identifier: GPL-2.0 OR MIT */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  2) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  3)  * Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  4)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  5) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  6) #ifndef CURVE25519_H
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  7) #define CURVE25519_H
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  8) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  9) #include <crypto/algapi.h> // For crypto_memneq.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 10) #include <linux/types.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 11) #include <linux/random.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 12) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 13) enum curve25519_lengths {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 14) 	CURVE25519_KEY_SIZE = 32
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 15) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 16) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 17) extern const u8 curve25519_null_point[];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 18) extern const u8 curve25519_base_point[];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 19) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 20) void curve25519_generic(u8 out[CURVE25519_KEY_SIZE],
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 21) 			const u8 scalar[CURVE25519_KEY_SIZE],
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 22) 			const u8 point[CURVE25519_KEY_SIZE]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 23) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 24) void curve25519_arch(u8 out[CURVE25519_KEY_SIZE],
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 25) 		     const u8 scalar[CURVE25519_KEY_SIZE],
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 26) 		     const u8 point[CURVE25519_KEY_SIZE]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 27) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 28) void curve25519_base_arch(u8 pub[CURVE25519_KEY_SIZE],
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 29) 			  const u8 secret[CURVE25519_KEY_SIZE]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 30) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 31) static inline
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 32) bool __must_check curve25519(u8 mypublic[CURVE25519_KEY_SIZE],
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 33) 			     const u8 secret[CURVE25519_KEY_SIZE],
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 34) 			     const u8 basepoint[CURVE25519_KEY_SIZE])
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 35) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 36) 	if (IS_ENABLED(CONFIG_CRYPTO_ARCH_HAVE_LIB_CURVE25519))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 37) 		curve25519_arch(mypublic, secret, basepoint);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 38) 	else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 39) 		curve25519_generic(mypublic, secret, basepoint);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 40) 	return crypto_memneq(mypublic, curve25519_null_point,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 41) 			     CURVE25519_KEY_SIZE);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 42) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 43) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 44) static inline bool
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 45) __must_check curve25519_generate_public(u8 pub[CURVE25519_KEY_SIZE],
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 46) 					const u8 secret[CURVE25519_KEY_SIZE])
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 47) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 48) 	if (unlikely(!crypto_memneq(secret, curve25519_null_point,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 49) 				    CURVE25519_KEY_SIZE)))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 50) 		return false;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 51) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 52) 	if (IS_ENABLED(CONFIG_CRYPTO_ARCH_HAVE_LIB_CURVE25519))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 53) 		curve25519_base_arch(pub, secret);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 54) 	else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 55) 		curve25519_generic(pub, secret, curve25519_base_point);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 56) 	return crypto_memneq(pub, curve25519_null_point, CURVE25519_KEY_SIZE);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 57) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 58) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 59) static inline void curve25519_clamp_secret(u8 secret[CURVE25519_KEY_SIZE])
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 60) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 61) 	secret[0] &= 248;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 62) 	secret[31] = (secret[31] & 127) | 64;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 63) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 64) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 65) static inline void curve25519_generate_secret(u8 secret[CURVE25519_KEY_SIZE])
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 66) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 67) 	get_random_bytes_wait(secret, CURVE25519_KEY_SIZE);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 68) 	curve25519_clamp_secret(secret);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 69) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 70) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 71) #endif /* CURVE25519_H */