/****************************************************************************
 * include/crypto/chachapoly.h
 * $OpenBSD: chachapoly.h,v 1.4 2020/07/22 13:54:30 tobhe Exp $
 * Copyright (c) 2015 Mike Belopuhov
 *
 * Permission to use, copy, modify, and distribute this software for any
 * purpose with or without fee is hereby granted, provided that the above
 * copyright notice and this permission notice appear in all copies.
 *
 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
 ****************************************************************************/

#ifndef __INCLUDE_CRYPTO_CHACHAPOLY_H
#define __INCLUDE_CRYPTO_CHACHAPOLY_H

#define CHACHA20_KEYSIZE   32
#define CHACHA20_CTR       4
#define CHACHA20_SALT      4
#define CHACHA20_NONCE     8
#define CHACHA20_BLOCK_LEN 64

struct chacha20_ctx
{
  uint8_t block[CHACHA20_BLOCK_LEN];
  uint8_t nonce[CHACHA20_NONCE];
};

int chacha20_setkey(FAR void *, FAR uint8_t *, int);
void chacha20_reinit(caddr_t, FAR uint8_t *);
void chacha20_crypt(caddr_t, FAR uint8_t *);

#define POLY1305_KEYLEN 32
#define POLY1305_TAGLEN 16
#define POLY1305_BLOCK_LEN 16

struct poly1305_ctx
{
  /* r, h, pad, leftover */

  unsigned long state[5 + 5 + 4];
  size_t leftover;
  unsigned char buffer[POLY1305_BLOCK_LEN];
  unsigned char final;
};

typedef struct
{
  uint8_t key[POLY1305_KEYLEN];

  /* counter, salt */

  uint8_t nonce[CHACHA20_NONCE];
  struct chacha20_ctx chacha;
  struct poly1305_ctx poly;
}
CHACHA20_POLY1305_CTX;

void chacha20_poly1305_init(FAR void *);
void chacha20_poly1305_setkey(FAR void *, FAR const uint8_t *, uint16_t);
void chacha20_poly1305_reinit(FAR void *, FAR const uint8_t *, uint16_t);
int chacha20_poly1305_update(FAR void *, FAR const uint8_t *, size_t);
void chacha20_poly1305_final(FAR uint8_t *, FAR void *);

/* WireGuard crypto */

#define CHACHA20POLY1305_KEY_SIZE CHACHA20_KEYSIZE
#define CHACHA20POLY1305_AUTHTAG_SIZE POLY1305_TAGLEN
#define XCHACHA20POLY1305_NONCE_SIZE 24

void chacha20poly1305_encrypt(
  FAR uint8_t *, FAR const uint8_t *, const size_t,
  FAR const uint8_t *, const size_t, const uint64_t,
  FAR const uint8_t *);

int chacha20poly1305_decrypt(
  FAR uint8_t *, FAR const uint8_t *, const size_t,
  FAR const uint8_t *, const size_t, const uint64_t,
  FAR const uint8_t *);

void xchacha20poly1305_encrypt(
  FAR uint8_t *, FAR const uint8_t *, const size_t,
  FAR const uint8_t *, const size_t,
  FAR const uint8_t *,
  FAR const uint8_t *);

int xchacha20poly1305_decrypt(
  FAR uint8_t *, FAR const uint8_t *, const size_t,
  FAR const uint8_t *, const size_t,
  FAR const uint8_t *,
  FAR const uint8_t *);

#endif /* __INCLUDE_CRYPTO_CHACHAPOLY_H */