/* * ipsec_alg SERPENT cipher stubs * * Author: JuanJo Ciarlante * * $Id: ipsec_alg_serpent.c,v 1.2 2004/03/22 21:53:19 as Exp $ * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the * Free Software Foundation; either version 2 of the License, or (at your * option) any later version. See . * * This program is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * for more details. * */ #include #include /* * special case: ipsec core modular with this static algo inside: * must avoid MODULE magic for this file */ #if CONFIG_IPSEC_MODULE && CONFIG_IPSEC_ALG_SERPENT #undef MODULE #endif #include #include #include /* printk() */ #include /* error codes */ #include /* size_t */ #include /* Check if __exit is defined, if not null it */ #ifndef __exit #define __exit #endif /* Low freeswan header coupling */ #include "freeswan/ipsec_alg.h" #include "libserpent/serpent.h" #include "libserpent/serpent_cbc.h" #define ESP_SERPENT 252 /* from ipsec drafts */ /* 128, 192 or 256 */ #define ESP_SERPENT_KEY_SZ_MIN 16 /* 128 bit secret key */ #define ESP_SERPENT_KEY_SZ_MAX 32 /* 256 bit secret key */ #define ESP_SERPENT_CBC_BLK_LEN 16 /* SERPENT-CBC block size */ MODULE_AUTHOR("JuanJo Ciarlante "); static int debug=0; MODULE_PARM(debug, "i"); static int test=0; MODULE_PARM(test, "i"); static int excl=0; MODULE_PARM(excl, "i"); static int keyminbits=0; MODULE_PARM(keyminbits, "i"); static int keymaxbits=0; MODULE_PARM(keymaxbits, "i"); static int _serpent_set_key(struct ipsec_alg_enc *alg, __u8 * key_e, const __u8 * key, size_t keysize) { serpent_context *ctx=(serpent_context *)key_e; if (debug > 0) printk(KERN_DEBUG "klips_debug:_serpent_set_key:" "key_e=%p key=%p keysize=%d\n", key_e, key, keysize); serpent_set_key(ctx, key, keysize); return 0; } static int _serpent_cbc_encrypt(struct ipsec_alg_enc *alg, __u8 * key_e, __u8 * in, int ilen, const __u8 * iv, int encrypt) { serpent_context *ctx=(serpent_context *)key_e; if (debug > 0) printk(KERN_DEBUG "klips_debug:_serpent_cbc_encrypt:" "key_e=%p in=%p ilen=%d iv=%p encrypt=%d\n", key_e, in, ilen, iv, encrypt); serpent_cbc_encrypt(ctx, in, in, ilen, iv, encrypt); return ilen; } static struct ipsec_alg_enc ipsec_alg_SERPENT = { ixt_version: IPSEC_ALG_VERSION, ixt_module: THIS_MODULE, ixt_refcnt: ATOMIC_INIT(0), ixt_alg_type: IPSEC_ALG_TYPE_ENCRYPT, ixt_alg_id: ESP_SERPENT, ixt_name: "serpent", ixt_blocksize: ESP_SERPENT_CBC_BLK_LEN, ixt_keyminbits: ESP_SERPENT_KEY_SZ_MIN * 8, ixt_keymaxbits: ESP_SERPENT_KEY_SZ_MAX * 8, ixt_e_keylen: ESP_SERPENT_KEY_SZ_MAX, ixt_e_ctx_size: sizeof(serpent_context), ixt_e_set_key: _serpent_set_key, ixt_e_cbc_encrypt:_serpent_cbc_encrypt, }; IPSEC_ALG_MODULE_INIT(ipsec_serpent_init) { int ret, test_ret; if (keyminbits) ipsec_alg_SERPENT.ixt_keyminbits=keyminbits; if (keymaxbits) { ipsec_alg_SERPENT.ixt_keymaxbits=keymaxbits; if (keymaxbits*8>ipsec_alg_SERPENT.ixt_keymaxbits) ipsec_alg_SERPENT.ixt_e_keylen=keymaxbits*8; } if (excl) ipsec_alg_SERPENT.ixt_state |= IPSEC_ALG_ST_EXCL; ret=register_ipsec_alg_enc(&ipsec_alg_SERPENT); printk("ipsec_serpent_init(alg_type=%d alg_id=%d name=%s): ret=%d\n", ipsec_alg_SERPENT.ixt_alg_type, ipsec_alg_SERPENT.ixt_alg_id, ipsec_alg_SERPENT.ixt_name, ret); if (ret==0 && test) { test_ret=ipsec_alg_test( ipsec_alg_SERPENT.ixt_alg_type, ipsec_alg_SERPENT.ixt_alg_id, test); printk("ipsec_serpent_init(alg_type=%d alg_id=%d): test_ret=%d\n", ipsec_alg_SERPENT.ixt_alg_type, ipsec_alg_SERPENT.ixt_alg_id, test_ret); } return ret; } IPSEC_ALG_MODULE_EXIT(ipsec_serpent_fini) { unregister_ipsec_alg_enc(&ipsec_alg_SERPENT); return; } #ifdef MODULE_LICENSE MODULE_LICENSE("GPL"); #endif EXPORT_NO_SYMBOLS;