mirror of
https://github.com/torvalds/linux.git
synced 2026-05-12 16:18:45 +02:00
Move the ChaCha20Poly1305 test from an ad-hoc self-test to a KUnit test. Keep the same test logic for now, just translated to KUnit. Moving to KUnit has multiple benefits, such as: - Consistency with the rest of the lib/crypto/ tests. - Kernel developers familiar with KUnit, which is used kernel-wide, can quickly understand the test and how to enable and run it. - The test will be automatically run by anyone using lib/crypto/.kunitconfig or KUnit's all_tests.config. - Results are reported using the standard KUnit mechanism. - It eliminates one of the few remaining back-references to crypto/ from lib/crypto/, specifically a reference to CONFIG_CRYPTO_SELFTESTS. Acked-by: Ard Biesheuvel <ardb@kernel.org> Link: https://lore.kernel.org/r/20260327224229.137532-1-ebiggers@kernel.org Signed-off-by: Eric Biggers <ebiggers@kernel.org>
50 lines
1.7 KiB
C
50 lines
1.7 KiB
C
/* SPDX-License-Identifier: GPL-2.0 OR MIT */
|
|
/*
|
|
* Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
|
|
*/
|
|
|
|
#ifndef __CHACHA20POLY1305_H
|
|
#define __CHACHA20POLY1305_H
|
|
|
|
#include <linux/types.h>
|
|
#include <linux/scatterlist.h>
|
|
|
|
enum chacha20poly1305_lengths {
|
|
XCHACHA20POLY1305_NONCE_SIZE = 24,
|
|
CHACHA20POLY1305_KEY_SIZE = 32,
|
|
CHACHA20POLY1305_AUTHTAG_SIZE = 16
|
|
};
|
|
|
|
void chacha20poly1305_encrypt(u8 *dst, const u8 *src, const size_t src_len,
|
|
const u8 *ad, const size_t ad_len,
|
|
const u64 nonce,
|
|
const u8 key[at_least CHACHA20POLY1305_KEY_SIZE]);
|
|
|
|
bool __must_check
|
|
chacha20poly1305_decrypt(u8 *dst, const u8 *src, const size_t src_len,
|
|
const u8 *ad, const size_t ad_len, const u64 nonce,
|
|
const u8 key[at_least CHACHA20POLY1305_KEY_SIZE]);
|
|
|
|
void xchacha20poly1305_encrypt(u8 *dst, const u8 *src, const size_t src_len,
|
|
const u8 *ad, const size_t ad_len,
|
|
const u8 nonce[at_least XCHACHA20POLY1305_NONCE_SIZE],
|
|
const u8 key[at_least CHACHA20POLY1305_KEY_SIZE]);
|
|
|
|
bool __must_check xchacha20poly1305_decrypt(
|
|
u8 *dst, const u8 *src, const size_t src_len,
|
|
const u8 *ad, const size_t ad_len,
|
|
const u8 nonce[at_least XCHACHA20POLY1305_NONCE_SIZE],
|
|
const u8 key[at_least CHACHA20POLY1305_KEY_SIZE]);
|
|
|
|
bool chacha20poly1305_encrypt_sg_inplace(struct scatterlist *src, size_t src_len,
|
|
const u8 *ad, const size_t ad_len,
|
|
const u64 nonce,
|
|
const u8 key[at_least CHACHA20POLY1305_KEY_SIZE]);
|
|
|
|
bool chacha20poly1305_decrypt_sg_inplace(struct scatterlist *src, size_t src_len,
|
|
const u8 *ad, const size_t ad_len,
|
|
const u64 nonce,
|
|
const u8 key[at_least CHACHA20POLY1305_KEY_SIZE]);
|
|
|
|
#endif /* __CHACHA20POLY1305_H */
|