diff options
Diffstat (limited to 'net/bluetooth/ecc.h')
| -rw-r--r-- | net/bluetooth/ecc.h | 54 |
1 files changed, 54 insertions, 0 deletions
diff --git a/net/bluetooth/ecc.h b/net/bluetooth/ecc.h new file mode 100644 index 000000000000..8d6a2f4d1905 --- /dev/null +++ b/net/bluetooth/ecc.h | |||
| @@ -0,0 +1,54 @@ | |||
| 1 | /* | ||
| 2 | * Copyright (c) 2013, Kenneth MacKay | ||
| 3 | * All rights reserved. | ||
| 4 | * | ||
| 5 | * Redistribution and use in source and binary forms, with or without | ||
| 6 | * modification, are permitted provided that the following conditions are | ||
| 7 | * met: | ||
| 8 | * * Redistributions of source code must retain the above copyright | ||
| 9 | * notice, this list of conditions and the following disclaimer. | ||
| 10 | * * Redistributions in binary form must reproduce the above copyright | ||
| 11 | * notice, this list of conditions and the following disclaimer in the | ||
| 12 | * documentation and/or other materials provided with the distribution. | ||
| 13 | * | ||
| 14 | * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS | ||
| 15 | * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT | ||
| 16 | * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR | ||
| 17 | * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT | ||
| 18 | * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
| 19 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT | ||
| 20 | * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, | ||
| 21 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY | ||
| 22 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT | ||
| 23 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE | ||
| 24 | * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | ||
| 25 | */ | ||
| 26 | |||
| 27 | /* Create a public/private key pair. | ||
| 28 | * Outputs: | ||
| 29 | * public_key - Will be filled in with the public key. | ||
| 30 | * private_key - Will be filled in with the private key. | ||
| 31 | * | ||
| 32 | * Returns true if the key pair was generated successfully, false | ||
| 33 | * if an error occurred. The keys are with the LSB first. | ||
| 34 | */ | ||
| 35 | bool ecc_make_key(u8 public_key[64], u8 private_key[32]); | ||
| 36 | |||
| 37 | /* Compute a shared secret given your secret key and someone else's | ||
| 38 | * public key. | ||
| 39 | * Note: It is recommended that you hash the result of ecdh_shared_secret | ||
| 40 | * before using it for symmetric encryption or HMAC. | ||
| 41 | * | ||
| 42 | * Inputs: | ||
| 43 | * public_key - The public key of the remote party | ||
| 44 | * private_key - Your private key. | ||
| 45 | * | ||
| 46 | * Outputs: | ||
| 47 | * secret - Will be filled in with the shared secret value. | ||
| 48 | * | ||
| 49 | * Returns true if the shared secret was generated successfully, false | ||
| 50 | * if an error occurred. Both input and output parameters are with the | ||
| 51 | * LSB first. | ||
| 52 | */ | ||
| 53 | bool ecdh_shared_secret(const u8 public_key[64], const u8 private_key[32], | ||
| 54 | u8 secret[32]); | ||
