summaryrefslogtreecommitdiff
path: root/src/libstrongswan/crypto/signers/signer.c
blob: 747bc5efa8431c73c06f8a1fdf9f8b744e45a62f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
/**
 * @file signer.c
 * 
 * @brief Implementation of generic signer_t constructor.
 * 
 */

/*
 * Copyright (C) 2005-2006 Martin Willi
 * Copyright (C) 2005 Jan Hutter
 * Hochschule fuer Technik Rapperswil
 *
 * This program is free software; you can redistribute it and/or modify it
 * under the terms of the GNU General Public License as published by the
 * Free Software Foundation; either version 2 of the License, or (at your
 * option) any later version.  See <http://www.fsf.org/copyleft/gpl.txt>.
 *
 * This program is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
 * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
 * for more details.
 */

#include "signer.h"

#include <crypto/signers/hmac_signer.h>

ENUM_BEGIN(integrity_algorithm_names, AUTH_UNDEFINED, AUTH_HMAC_SHA1_128,
	"UNDEFINED",
	"AUTH_HMAC_SHA1_128");
ENUM_NEXT(integrity_algorithm_names, AUTH_HMAC_MD5_96, AUTH_AES_XCBC_96, AUTH_HMAC_SHA1_128,
	"HMAC_MD5_96",
	"HMAC_SHA1_96",
	"DES_MAC",
	"KPDK_MD5",
	"AES_XCBC_96");
ENUM_NEXT(integrity_algorithm_names, AUTH_HMAC_SHA2_256_128, AUTH_HMAC_SHA2_512_256, AUTH_AES_XCBC_96,
	"AUTH_HMAC_SHA2_256_128",
	"AUTH_HMAC_SHA2_384_192",
	"AUTH_HMAC_SHA2_512_256");
ENUM_END(integrity_algorithm_names, AUTH_HMAC_SHA2_512_256);

/*
 * Described in header.
 */
signer_t *signer_create(integrity_algorithm_t integrity_algorithm)
{
	switch(integrity_algorithm)
	{
		case AUTH_HMAC_SHA1_96:
			return (signer_t *)hmac_signer_create(HASH_SHA1, 12);
		case AUTH_HMAC_SHA1_128:
			return (signer_t *)hmac_signer_create(HASH_SHA1, 16);
		case AUTH_HMAC_MD5_96:
			return (signer_t *)hmac_signer_create(HASH_MD5, 12);
		case AUTH_HMAC_SHA2_256_128:
			return (signer_t *)hmac_signer_create(HASH_SHA256, 16);
		case AUTH_HMAC_SHA2_384_192:
			return (signer_t *)hmac_signer_create(HASH_SHA384, 24);
		case AUTH_HMAC_SHA2_512_256:
			return (signer_t *)hmac_signer_create(HASH_SHA512, 32);
		default:
			return NULL;
	}
}