Orange Pi5 kernel

Deprecated Linux kernel 5.10.110 for OrangePi 5/5B/5+ boards

3 Commits   0 Branches   0 Tags
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  1) /* SPDX-License-Identifier: GPL-2.0 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  2) #ifndef _CRYPTO_XTS_H
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  3) #define _CRYPTO_XTS_H
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  4) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  5) #include <crypto/b128ops.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  6) #include <crypto/internal/skcipher.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  7) #include <linux/fips.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  8) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  9) #define XTS_BLOCK_SIZE 16
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 10) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 11) static inline int xts_check_key(struct crypto_tfm *tfm,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 12) 				const u8 *key, unsigned int keylen)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 13) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 14) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 15) 	 * key consists of keys of equal size concatenated, therefore
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 16) 	 * the length must be even.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 17) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 18) 	if (keylen % 2)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 19) 		return -EINVAL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 20) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 21) 	/* ensure that the AES and tweak key are not identical */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 22) 	if (fips_enabled && !crypto_memneq(key, key + (keylen / 2), keylen / 2))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 23) 		return -EINVAL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 24) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 25) 	return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 26) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 27) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 28) static inline int xts_verify_key(struct crypto_skcipher *tfm,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 29) 				 const u8 *key, unsigned int keylen)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 30) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 31) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 32) 	 * key consists of keys of equal size concatenated, therefore
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 33) 	 * the length must be even.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 34) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 35) 	if (keylen % 2)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 36) 		return -EINVAL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 37) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 38) 	/* ensure that the AES and tweak key are not identical */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 39) 	if ((fips_enabled || (crypto_skcipher_get_flags(tfm) &
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 40) 			      CRYPTO_TFM_REQ_FORBID_WEAK_KEYS)) &&
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 41) 	    !crypto_memneq(key, key + (keylen / 2), keylen / 2))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 42) 		return -EINVAL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 43) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 44) 	return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 45) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 46) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 47) #endif  /* _CRYPTO_XTS_H */