Viewing file: esp.h (1.4 KB) -rw-r--r-- Select action/file-type: (+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
#ifndef _NET_ESP_H #define _NET_ESP_H
#include <linux/crypto.h> #include <net/xfrm.h> #include <linux/scatterlist.h>
#define ESP_NUM_FAST_SG 4
struct esp_data { struct scatterlist sgbuf[ESP_NUM_FAST_SG];
/* Confidentiality */ struct { int padlen; /* 0..255 */ /* ivlen is offset from enc_data, where encrypted data start. * It is logically different of crypto_tfm_alg_ivsize(tfm). * We assume that it is either zero (no ivec), or * >= crypto_tfm_alg_ivsize(tfm). */ int ivlen; int ivinitted; u8 *ivec; /* ivec buffer */ struct crypto_blkcipher *tfm; /* crypto handle */ } conf;
/* Integrity. It is active when icv_full_len != 0 */ struct { u8 *work_icv; int icv_full_len; int icv_trunc_len; struct crypto_hash *tfm; } auth; };
extern void *pskb_put(struct sk_buff *skb, struct sk_buff *tail, int len);
static inline int esp_mac_digest(struct esp_data *esp, struct sk_buff *skb, int offset, int len) { struct hash_desc desc; int err;
desc.tfm = esp->auth.tfm; desc.flags = 0;
err = crypto_hash_init(&desc); if (unlikely(err)) return err; err = skb_icv_walk(skb, &desc, offset, len, crypto_hash_update); if (unlikely(err)) return err; return crypto_hash_final(&desc, esp->auth.work_icv); }
struct ip_esp_hdr;
static inline struct ip_esp_hdr *ip_esp_hdr(const struct sk_buff *skb) { return (struct ip_esp_hdr *)skb_transport_header(skb); }
#endif
|