Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit bc74b0c8 authored by Martin Willi's avatar Martin Willi Committed by David S. Miller
Browse files

xfrm: Add SHA384 and SHA512 HMAC authentication algorithms to XFRM



These algorithms use a truncation of 192/256 bits, as specified
in RFC4868.

Signed-off-by: default avatarMartin Willi <martin@strongswan.org>
Acked-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
parent 8f8a088c
Loading
Loading
Loading
Loading
+34 −0
Original line number Diff line number Diff line
@@ -199,6 +199,40 @@ static struct xfrm_algo_desc aalg_list[] = {
		.sadb_alg_maxbits = 256
	}
},
{
	.name = "hmac(sha384)",

	.uinfo = {
		.auth = {
			.icv_truncbits = 192,
			.icv_fullbits = 384,
		}
	},

	.desc = {
		.sadb_alg_id = SADB_X_AALG_SHA2_384HMAC,
		.sadb_alg_ivlen = 0,
		.sadb_alg_minbits = 384,
		.sadb_alg_maxbits = 384
	}
},
{
	.name = "hmac(sha512)",

	.uinfo = {
		.auth = {
			.icv_truncbits = 256,
			.icv_fullbits = 512,
		}
	},

	.desc = {
		.sadb_alg_id = SADB_X_AALG_SHA2_512HMAC,
		.sadb_alg_ivlen = 0,
		.sadb_alg_minbits = 512,
		.sadb_alg_maxbits = 512
	}
},
{
	.name = "hmac(rmd160)",
	.compat = "rmd160",