⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 ipsec_alg_sha2.c

📁 FREESWAN VPN源代码包
💻 C
字号:
/* * ipsec_alg SHA2 hash stubs * * Author: JuanJo Ciarlante <jjo-ipsec@mendoza.gov.ar> *  * $Id: ipsec_alg_sha2.c,v 1.2 2003/02/07 13:14:25 ken Exp $ *  * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the * Free Software Foundation; either version 2 of the License, or (at your * option) any later version.  See <http://www.fsf.org/copyleft/gpl.txt>. *  * This program is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License * for more details. * */#include <linux/config.h>#include <linux/version.h>/*	 *	special case: ipsec core modular with this static algo inside: *	must avoid MODULE magic for this file */#if CONFIG_IPSEC_MODULE && CONFIG_IPSEC_ALG_SHA2#undef MODULE#endif#include <linux/module.h>#include <linux/init.h>#include <linux/kernel.h> /* printk() */#include <linux/errno.h>  /* error codes */#include <linux/types.h>  /* size_t */#include <linux/string.h>/* Check if __exit is defined, if not null it */#ifndef __exit#define __exit#endif/*	Low freeswan header coupling	*/#include "ipsec_alg.h"#include "libsha2/sha2.h"#include "libsha2/hmac_sha2.h"MODULE_AUTHOR("JuanJo Ciarlante <jjo-ipsec@mendoza.gov.ar>");static int debug=0;MODULE_PARM(debug, "i");static int test=0;MODULE_PARM(test, "i");static int excl=0;MODULE_PARM(excl, "i");/* almost constants ...: draft-ietf-ipsec-ciph-aes-cbc-03.txt */#define AH_SHA2_256               5#define AH_SHA2_384               6#define AH_SHA2_512               7static int _sha256_hmac_set_key(struct ipsec_alg_auth *alg, __u8 * key_a, const __u8 * key, int keylen) {	sha256_hmac_context *hctx=(sha256_hmac_context*)(key_a);	sha256_hmac_set_key(hctx, key, keylen);	if (debug > 0)		printk(KERN_DEBUG "klips_debug: _sha256_hmac_set_key(): "				"key_a=%p key=%p keysize=%d\n",				key_a, key, keylen);	return 0;}static int _sha256_hmac_hash(struct ipsec_alg_auth *alg, __u8 * key_a, const __u8 * dat, int len, __u8 * hash, int hashlen) {	sha256_hmac_context *hctx=(sha256_hmac_context*)(key_a);	if (debug > 0)		printk(KERN_DEBUG "klips_debug: _sha256_hmac_hash(): "				"key_a=%p dat=%p len=%d hash=%p hashlen=%d\n",				key_a, dat, len, hash, hashlen);	sha256_hmac_hash(hctx, dat, len, hash, hashlen);	return 0;}static int _sha512_hmac_set_key(struct ipsec_alg_auth *alg, __u8 * key_a, const __u8 * key, int keylen) {	sha512_hmac_context *hctx=(sha512_hmac_context*)(key_a);	sha512_hmac_set_key(hctx, key, keylen);	if (debug > 0)		printk(KERN_DEBUG "klips_debug: _sha512_hmac_set_key(): "				"key_a=%p key=%p keysize=%d\n",				key_a, key, keylen);	return 0;}static int _sha512_hmac_hash(struct ipsec_alg_auth *alg, __u8 * key_a, const __u8 * dat, int len, __u8 * hash, int hashlen) {	sha512_hmac_context *hctx=(sha512_hmac_context*)(key_a);	if (debug > 0)		printk(KERN_DEBUG "klips_debug: _sha512_hmac_hash(): "				"key_a=%p dat=%p len=%d hash=%p hashlen=%d\n",				key_a, dat, len, hash, hashlen);	sha512_hmac_hash(hctx, dat, len, hash, hashlen);	return 0;}static struct ipsec_alg_auth ipsec_alg_SHA2_256 = {	ixt_version:	IPSEC_ALG_VERSION,	ixt_module:	THIS_MODULE,	ixt_refcnt:	ATOMIC_INIT(0),	ixt_alg_type:	IPSEC_ALG_TYPE_AUTH,	ixt_alg_id: 	AH_SHA2_256,	ixt_name: 	"sha2_256",	ixt_blocksize:	SHA256_BLOCKSIZE,	ixt_keyminbits:	256,	ixt_keymaxbits:	256,	ixt_a_keylen:	256/8,	ixt_a_ctx_size:	sizeof(sha256_hmac_context),	ixt_a_hmac_set_key:	_sha256_hmac_set_key,	ixt_a_hmac_hash:	_sha256_hmac_hash,};static struct ipsec_alg_auth ipsec_alg_SHA2_512 = {	ixt_version:	IPSEC_ALG_VERSION,	ixt_module:	THIS_MODULE,	ixt_refcnt:	ATOMIC_INIT(0),	ixt_alg_type:	IPSEC_ALG_TYPE_AUTH,	ixt_alg_id: 	AH_SHA2_512,	ixt_name: 	"sha2_512",	ixt_blocksize:	SHA512_BLOCKSIZE,	ixt_keyminbits:	512,	ixt_keymaxbits:	512,	ixt_a_keylen:	512/8,	ixt_a_ctx_size:	sizeof(sha512_hmac_context),	ixt_a_hmac_set_key:	_sha512_hmac_set_key,	ixt_a_hmac_hash:	_sha512_hmac_hash,};	IPSEC_ALG_MODULE_INIT( ipsec_sha2_init ){	int ret, test_ret;	if (excl) ipsec_alg_SHA2_256.ixt_state |= IPSEC_ALG_ST_EXCL;	ret=register_ipsec_alg_auth(&ipsec_alg_SHA2_256);	printk("ipsec_sha2_init(alg_type=%d alg_id=%d name=%s): ret=%d\n", 			ipsec_alg_SHA2_256.ixt_alg_type, 			ipsec_alg_SHA2_256.ixt_alg_id, 			ipsec_alg_SHA2_256.ixt_name, 			ret);	if (ret != 0) 		goto out;	if (ret==0 && test) {		test_ret=ipsec_alg_test(				ipsec_alg_SHA2_256.ixt_alg_type,				ipsec_alg_SHA2_256.ixt_alg_id, 				test);		printk("ipsec_sha2_init(alg_type=%d alg_id=%d): test_ret=%d\n", 				ipsec_alg_SHA2_256.ixt_alg_type, 				ipsec_alg_SHA2_256.ixt_alg_id, 				test_ret);	}	if (excl) ipsec_alg_SHA2_512.ixt_state |= IPSEC_ALG_ST_EXCL;	ret=register_ipsec_alg_auth(&ipsec_alg_SHA2_512);	printk("ipsec_sha2_init(alg_type=%d alg_id=%d name=%s): ret=%d\n", 			ipsec_alg_SHA2_512.ixt_alg_type, 			ipsec_alg_SHA2_512.ixt_alg_id, 			ipsec_alg_SHA2_512.ixt_name, 			ret);	if (ret != 0) 		goto out_256;	if (ret==0 && test) {		test_ret=ipsec_alg_test(				ipsec_alg_SHA2_512.ixt_alg_type,				ipsec_alg_SHA2_512.ixt_alg_id, 				test);		printk("ipsec_sha2_init(alg_type=%d alg_id=%d): test_ret=%d\n", 				ipsec_alg_SHA2_512.ixt_alg_type, 				ipsec_alg_SHA2_512.ixt_alg_id, 				test_ret);	}	goto out;out_256:	unregister_ipsec_alg_auth(&ipsec_alg_SHA2_256);out:	return ret;}IPSEC_ALG_MODULE_EXIT( ipsec_sha2_fini ){	unregister_ipsec_alg_auth(&ipsec_alg_SHA2_512);	unregister_ipsec_alg_auth(&ipsec_alg_SHA2_256);	return;}#ifdef MODULE_LICENSEMODULE_LICENSE("GPL");#endifEXPORT_NO_SYMBOLS;

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -