mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-12-27 06:34:11 +08:00
55 lines
2.3 KiB
C
55 lines
2.3 KiB
C
|
/*
|
||
|
* Copyright (c) 2013, Kenneth MacKay
|
||
|
* All rights reserved.
|
||
|
*
|
||
|
* Redistribution and use in source and binary forms, with or without
|
||
|
* modification, are permitted provided that the following conditions are
|
||
|
* met:
|
||
|
* * Redistributions of source code must retain the above copyright
|
||
|
* notice, this list of conditions and the following disclaimer.
|
||
|
* * Redistributions in binary form must reproduce the above copyright
|
||
|
* notice, this list of conditions and the following disclaimer in the
|
||
|
* documentation and/or other materials provided with the distribution.
|
||
|
*
|
||
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
||
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
||
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
||
|
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
||
|
* HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
||
|
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
||
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
||
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
||
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
||
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||
|
*/
|
||
|
|
||
|
/* Create a public/private key pair.
|
||
|
* Outputs:
|
||
|
* public_key - Will be filled in with the public key.
|
||
|
* private_key - Will be filled in with the private key.
|
||
|
*
|
||
|
* Returns true if the key pair was generated successfully, false
|
||
|
* if an error occurred. The keys are with the LSB first.
|
||
|
*/
|
||
|
bool ecc_make_key(u8 public_key[64], u8 private_key[32]);
|
||
|
|
||
|
/* Compute a shared secret given your secret key and someone else's
|
||
|
* public key.
|
||
|
* Note: It is recommended that you hash the result of ecdh_shared_secret
|
||
|
* before using it for symmetric encryption or HMAC.
|
||
|
*
|
||
|
* Inputs:
|
||
|
* public_key - The public key of the remote party
|
||
|
* private_key - Your private key.
|
||
|
*
|
||
|
* Outputs:
|
||
|
* secret - Will be filled in with the shared secret value.
|
||
|
*
|
||
|
* Returns true if the shared secret was generated successfully, false
|
||
|
* if an error occurred. Both input and output parameters are with the
|
||
|
* LSB first.
|
||
|
*/
|
||
|
bool ecdh_shared_secret(const u8 public_key[64], const u8 private_key[32],
|
||
|
u8 secret[32]);
|