| #ifndef _NET_ESP_H |
| #define _NET_ESP_H |
| |
| #include <linux/crypto.h> |
| #include <net/xfrm.h> |
| #include <linux/scatterlist.h> |
| |
| #define ESP_NUM_FAST_SG 4 |
| |
| struct esp_data |
| { |
| struct scatterlist sgbuf[ESP_NUM_FAST_SG]; |
| |
| /* Confidentiality */ |
| struct { |
| int padlen; /* 0..255 */ |
| /* ivlen is offset from enc_data, where encrypted data start. |
| * It is logically different of crypto_tfm_alg_ivsize(tfm). |
| * We assume that it is either zero (no ivec), or |
| * >= crypto_tfm_alg_ivsize(tfm). */ |
| int ivlen; |
| int ivinitted; |
| u8 *ivec; /* ivec buffer */ |
| struct crypto_blkcipher *tfm; /* crypto handle */ |
| } conf; |
| |
| /* Integrity. It is active when icv_full_len != 0 */ |
| struct { |
| u8 *work_icv; |
| int icv_full_len; |
| int icv_trunc_len; |
| struct crypto_hash *tfm; |
| } auth; |
| }; |
| |
| extern void *pskb_put(struct sk_buff *skb, struct sk_buff *tail, int len); |
| |
| static inline int esp_mac_digest(struct esp_data *esp, struct sk_buff *skb, |
| int offset, int len) |
| { |
| struct hash_desc desc; |
| int err; |
| |
| desc.tfm = esp->auth.tfm; |
| desc.flags = 0; |
| |
| err = crypto_hash_init(&desc); |
| if (unlikely(err)) |
| return err; |
| err = skb_icv_walk(skb, &desc, offset, len, crypto_hash_update); |
| if (unlikely(err)) |
| return err; |
| return crypto_hash_final(&desc, esp->auth.work_icv); |
| } |
| |
| struct ip_esp_hdr; |
| |
| static inline struct ip_esp_hdr *ip_esp_hdr(const struct sk_buff *skb) |
| { |
| return (struct ip_esp_hdr *)skb_transport_header(skb); |
| } |
| |
| #endif |