2008-02-28 02:34:43 +01:00
|
|
|
/*
|
|
|
|
* AES-based functions
|
|
|
|
*
|
|
|
|
* - AES Key Wrap Algorithm (128-bit KEK) (RFC3394)
|
|
|
|
* - One-Key CBC MAC (OMAC1) hash with AES-128
|
|
|
|
* - AES-128 CTR mode encryption
|
|
|
|
* - AES-128 EAX mode encryption/decryption
|
|
|
|
* - AES-128 CBC
|
2012-09-09 11:26:22 +02:00
|
|
|
* - AES-GCM
|
2012-09-09 17:07:19 +02:00
|
|
|
* - AES-CCM
|
2008-02-28 02:34:43 +01:00
|
|
|
*
|
2012-09-08 22:48:08 +02:00
|
|
|
* Copyright (c) 2003-2012, Jouni Malinen <j@w1.fi>
|
2008-02-28 02:34:43 +01:00
|
|
|
*
|
2012-02-11 15:46:35 +01:00
|
|
|
* This software may be distributed under the terms of the BSD license.
|
|
|
|
* See README for more details.
|
2008-02-28 02:34:43 +01:00
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef AES_WRAP_H
|
|
|
|
#define AES_WRAP_H
|
|
|
|
|
|
|
|
int __must_check aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher);
|
|
|
|
int __must_check aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain);
|
|
|
|
int __must_check omac1_aes_128_vector(const u8 *key, size_t num_elem,
|
|
|
|
const u8 *addr[], const size_t *len,
|
|
|
|
u8 *mac);
|
|
|
|
int __must_check omac1_aes_128(const u8 *key, const u8 *data, size_t data_len,
|
|
|
|
u8 *mac);
|
|
|
|
int __must_check aes_128_encrypt_block(const u8 *key, const u8 *in, u8 *out);
|
|
|
|
int __must_check aes_128_ctr_encrypt(const u8 *key, const u8 *nonce,
|
|
|
|
u8 *data, size_t data_len);
|
|
|
|
int __must_check aes_128_eax_encrypt(const u8 *key,
|
|
|
|
const u8 *nonce, size_t nonce_len,
|
|
|
|
const u8 *hdr, size_t hdr_len,
|
|
|
|
u8 *data, size_t data_len, u8 *tag);
|
|
|
|
int __must_check aes_128_eax_decrypt(const u8 *key,
|
|
|
|
const u8 *nonce, size_t nonce_len,
|
|
|
|
const u8 *hdr, size_t hdr_len,
|
|
|
|
u8 *data, size_t data_len, const u8 *tag);
|
|
|
|
int __must_check aes_128_cbc_encrypt(const u8 *key, const u8 *iv, u8 *data,
|
|
|
|
size_t data_len);
|
|
|
|
int __must_check aes_128_cbc_decrypt(const u8 *key, const u8 *iv, u8 *data,
|
|
|
|
size_t data_len);
|
2012-09-09 11:26:22 +02:00
|
|
|
int __must_check aes_gcm_ae(const u8 *key, size_t key_len,
|
|
|
|
const u8 *iv, size_t iv_len,
|
|
|
|
const u8 *plain, size_t plain_len,
|
|
|
|
const u8 *aad, size_t aad_len,
|
|
|
|
u8 *crypt, u8 *tag);
|
|
|
|
int __must_check aes_gcm_ad(const u8 *key, size_t key_len,
|
|
|
|
const u8 *iv, size_t iv_len,
|
|
|
|
const u8 *crypt, size_t crypt_len,
|
|
|
|
const u8 *aad, size_t aad_len, const u8 *tag,
|
|
|
|
u8 *plain);
|
2012-09-09 12:37:50 +02:00
|
|
|
int __must_check aes_gmac(const u8 *key, size_t key_len,
|
|
|
|
const u8 *iv, size_t iv_len,
|
|
|
|
const u8 *aad, size_t aad_len, u8 *tag);
|
2012-09-09 17:07:19 +02:00
|
|
|
int __must_check aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce,
|
|
|
|
size_t M, const u8 *plain, size_t plain_len,
|
|
|
|
const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth);
|
|
|
|
int __must_check aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce,
|
|
|
|
size_t M, const u8 *crypt, size_t crypt_len,
|
|
|
|
const u8 *aad, size_t aad_len, const u8 *auth,
|
|
|
|
u8 *plain);
|
2008-02-28 02:34:43 +01:00
|
|
|
|
|
|
|
#endif /* AES_WRAP_H */
|