mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-28 11:18:45 +07:00
3f523e1240
Since we're doing a static inline dispatch here, we normally branch based on whether or not there's an arch implementation. That would have been fine in general, except the crypto Makefile prior used to turn things off -- despite the Kconfig -- resulting in us needing to also hard code various assembler things into the dispatcher too. The horror! Now that the assembler config options are done by Kconfig, we can get rid of the inconsistency. Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com> Acked-by: Herbert Xu <herbert@gondor.apana.org.au> Acked-by: Ingo Molnar <mingo@kernel.org> Signed-off-by: Masahiro Yamada <masahiroy@kernel.org>
72 lines
2.0 KiB
C
72 lines
2.0 KiB
C
/* SPDX-License-Identifier: GPL-2.0 OR MIT */
|
|
/*
|
|
* Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
|
|
*/
|
|
|
|
#ifndef CURVE25519_H
|
|
#define CURVE25519_H
|
|
|
|
#include <crypto/algapi.h> // For crypto_memneq.
|
|
#include <linux/types.h>
|
|
#include <linux/random.h>
|
|
|
|
enum curve25519_lengths {
|
|
CURVE25519_KEY_SIZE = 32
|
|
};
|
|
|
|
extern const u8 curve25519_null_point[];
|
|
extern const u8 curve25519_base_point[];
|
|
|
|
void curve25519_generic(u8 out[CURVE25519_KEY_SIZE],
|
|
const u8 scalar[CURVE25519_KEY_SIZE],
|
|
const u8 point[CURVE25519_KEY_SIZE]);
|
|
|
|
void curve25519_arch(u8 out[CURVE25519_KEY_SIZE],
|
|
const u8 scalar[CURVE25519_KEY_SIZE],
|
|
const u8 point[CURVE25519_KEY_SIZE]);
|
|
|
|
void curve25519_base_arch(u8 pub[CURVE25519_KEY_SIZE],
|
|
const u8 secret[CURVE25519_KEY_SIZE]);
|
|
|
|
static inline
|
|
bool __must_check curve25519(u8 mypublic[CURVE25519_KEY_SIZE],
|
|
const u8 secret[CURVE25519_KEY_SIZE],
|
|
const u8 basepoint[CURVE25519_KEY_SIZE])
|
|
{
|
|
if (IS_ENABLED(CONFIG_CRYPTO_ARCH_HAVE_LIB_CURVE25519))
|
|
curve25519_arch(mypublic, secret, basepoint);
|
|
else
|
|
curve25519_generic(mypublic, secret, basepoint);
|
|
return crypto_memneq(mypublic, curve25519_null_point,
|
|
CURVE25519_KEY_SIZE);
|
|
}
|
|
|
|
static inline bool
|
|
__must_check curve25519_generate_public(u8 pub[CURVE25519_KEY_SIZE],
|
|
const u8 secret[CURVE25519_KEY_SIZE])
|
|
{
|
|
if (unlikely(!crypto_memneq(secret, curve25519_null_point,
|
|
CURVE25519_KEY_SIZE)))
|
|
return false;
|
|
|
|
if (IS_ENABLED(CONFIG_CRYPTO_ARCH_HAVE_LIB_CURVE25519))
|
|
curve25519_base_arch(pub, secret);
|
|
else
|
|
curve25519_generic(pub, secret, curve25519_base_point);
|
|
return crypto_memneq(pub, curve25519_null_point, CURVE25519_KEY_SIZE);
|
|
}
|
|
|
|
static inline void curve25519_clamp_secret(u8 secret[CURVE25519_KEY_SIZE])
|
|
{
|
|
secret[0] &= 248;
|
|
secret[31] = (secret[31] & 127) | 64;
|
|
}
|
|
|
|
static inline void curve25519_generate_secret(u8 secret[CURVE25519_KEY_SIZE])
|
|
{
|
|
get_random_bytes_wait(secret, CURVE25519_KEY_SIZE);
|
|
curve25519_clamp_secret(secret);
|
|
}
|
|
|
|
#endif /* CURVE25519_H */
|