mirror of
https://github.com/Qortal/Brooklyn.git
synced 2025-02-01 07:42:18 +00:00
* NVME, SATA NAND Security added * Qortal Core exception fetcher is now redone. * Update DT overlays for firmware * Fix for bvb clockj settings * Fix for no audio for sissy desktop porn watchers -_- ( thanks crowetic for watching gay porn and reporting me that bug asshat ) * Normalize the fetch() stream while doing a peer to peer handshake for nodes * Fix for RNG token editing error while performing a SHA256 encryption * Now under voltage errors will blink red led constantly for 5 minutes then go solid. * Improve kernel thread scaling for Qortal 2.0 core * HDMI circuit is now enabled at power up instead. * Added KMS * Added line replication instead of interpolation for VC4 GPU resulting in slightly better frame rates * Fix for long and doubles * Backplane clock is now set at standard rate * Capped HVEC clocks * Add support for Creative Cinema webcam for donkers who like sharing dick pics. *looks at crowetic* * More scanline XGA modes for people who have weird ass monitors of all sorts. * TX/RX flow control support is now 100% stable. No lags over 1Gbps ethernet. ( Hello Qortal 3.0 ) * Using flush cache instead of fetch for QC 2.0 resulting in performance gains * VC4 clock is now enforced for desktop oriented images. * Ondemand governor now waits for 2 seconds instead of 0.5ms to scale down to the lowest safest clock freq preventing lags to the core. * Timeout of OC set at 35ms from 90ms resulting in way better clocks and sync for Qortal 2.0 core
67 lines
2.0 KiB
C
67 lines
2.0 KiB
C
/* SPDX-License-Identifier: GPL-2.0-or-later */
|
|
/*
|
|
* Copyright (C) 2019 Samsung Electronics Co., Ltd.
|
|
*/
|
|
|
|
#ifndef __CRYPTO_CTX_H__
|
|
#define __CRYPTO_CTX_H__
|
|
|
|
#include <crypto/hash.h>
|
|
#include <crypto/aead.h>
|
|
|
|
enum {
|
|
CRYPTO_SHASH_HMACMD5 = 0,
|
|
CRYPTO_SHASH_HMACSHA256,
|
|
CRYPTO_SHASH_CMACAES,
|
|
CRYPTO_SHASH_SHA256,
|
|
CRYPTO_SHASH_SHA512,
|
|
CRYPTO_SHASH_MAX,
|
|
};
|
|
|
|
enum {
|
|
CRYPTO_AEAD_AES_GCM = 16,
|
|
CRYPTO_AEAD_AES_CCM,
|
|
CRYPTO_AEAD_MAX,
|
|
};
|
|
|
|
enum {
|
|
CRYPTO_BLK_ECBDES = 32,
|
|
CRYPTO_BLK_MAX,
|
|
};
|
|
|
|
struct ksmbd_crypto_ctx {
|
|
struct list_head list;
|
|
|
|
struct shash_desc *desc[CRYPTO_SHASH_MAX];
|
|
struct crypto_aead *ccmaes[CRYPTO_AEAD_MAX];
|
|
};
|
|
|
|
#define CRYPTO_HMACMD5(c) ((c)->desc[CRYPTO_SHASH_HMACMD5])
|
|
#define CRYPTO_HMACSHA256(c) ((c)->desc[CRYPTO_SHASH_HMACSHA256])
|
|
#define CRYPTO_CMACAES(c) ((c)->desc[CRYPTO_SHASH_CMACAES])
|
|
#define CRYPTO_SHA256(c) ((c)->desc[CRYPTO_SHASH_SHA256])
|
|
#define CRYPTO_SHA512(c) ((c)->desc[CRYPTO_SHASH_SHA512])
|
|
|
|
#define CRYPTO_HMACMD5_TFM(c) ((c)->desc[CRYPTO_SHASH_HMACMD5]->tfm)
|
|
#define CRYPTO_HMACSHA256_TFM(c)\
|
|
((c)->desc[CRYPTO_SHASH_HMACSHA256]->tfm)
|
|
#define CRYPTO_CMACAES_TFM(c) ((c)->desc[CRYPTO_SHASH_CMACAES]->tfm)
|
|
#define CRYPTO_SHA256_TFM(c) ((c)->desc[CRYPTO_SHASH_SHA256]->tfm)
|
|
#define CRYPTO_SHA512_TFM(c) ((c)->desc[CRYPTO_SHASH_SHA512]->tfm)
|
|
|
|
#define CRYPTO_GCM(c) ((c)->ccmaes[CRYPTO_AEAD_AES_GCM])
|
|
#define CRYPTO_CCM(c) ((c)->ccmaes[CRYPTO_AEAD_AES_CCM])
|
|
|
|
void ksmbd_release_crypto_ctx(struct ksmbd_crypto_ctx *ctx);
|
|
struct ksmbd_crypto_ctx *ksmbd_crypto_ctx_find_hmacmd5(void);
|
|
struct ksmbd_crypto_ctx *ksmbd_crypto_ctx_find_hmacsha256(void);
|
|
struct ksmbd_crypto_ctx *ksmbd_crypto_ctx_find_cmacaes(void);
|
|
struct ksmbd_crypto_ctx *ksmbd_crypto_ctx_find_sha512(void);
|
|
struct ksmbd_crypto_ctx *ksmbd_crypto_ctx_find_sha256(void);
|
|
struct ksmbd_crypto_ctx *ksmbd_crypto_ctx_find_gcm(void);
|
|
struct ksmbd_crypto_ctx *ksmbd_crypto_ctx_find_ccm(void);
|
|
void ksmbd_crypto_destroy(void);
|
|
int ksmbd_crypto_create(void);
|
|
|
|
#endif /* __CRYPTO_CTX_H__ */
|