mirror of
https://github.com/kdave/btrfs-progs
synced 2024-12-15 10:55:51 +00:00
c3ee6a8a09
Add the GPL v2 header to files where it was missing and is not from an external source, update to the most recent version with the address. Signed-off-by: David Sterba <dsterba@suse.com>
156 lines
3.1 KiB
C
156 lines
3.1 KiB
C
/*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU General Public
|
|
* License v2 as published by the Free Software Foundation.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public
|
|
* License along with this program; if not, write to the
|
|
* Free Software Foundation, Inc., 59 Temple Place - Suite 330,
|
|
* Boston, MA 021110-1307, USA.
|
|
*/
|
|
|
|
#include "crypto/hash.h"
|
|
#include "crypto/crc32c.h"
|
|
#include "crypto/xxhash.h"
|
|
#include "crypto/sha.h"
|
|
#include "crypto/blake2.h"
|
|
|
|
/*
|
|
* Default builtin implementations
|
|
*/
|
|
int hash_crc32c(const u8* buf, size_t length, u8 *out)
|
|
{
|
|
u32 crc = ~0;
|
|
|
|
crc = crc32c(~0, buf, length);
|
|
put_unaligned_le32(~crc, out);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int hash_xxhash(const u8 *buf, size_t length, u8 *out)
|
|
{
|
|
XXH64_hash_t hash;
|
|
|
|
hash = XXH64(buf, length, 0);
|
|
put_unaligned_le64(hash, out);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Implementations of cryptographic primitives
|
|
*/
|
|
#if CRYPTOPROVIDER_BUILTIN == 1
|
|
|
|
int hash_sha256(const u8 *buf, size_t len, u8 *out)
|
|
{
|
|
SHA256Context context;
|
|
|
|
SHA256Reset(&context);
|
|
SHA256Input(&context, buf, len);
|
|
SHA256Result(&context, out);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int hash_blake2b(const u8 *buf, size_t len, u8 *out)
|
|
{
|
|
blake2b_state S;
|
|
|
|
blake2b_init(&S, CRYPTO_HASH_SIZE_MAX);
|
|
blake2b_update(&S, buf, len);
|
|
blake2b_final(&S, out, CRYPTO_HASH_SIZE_MAX);
|
|
|
|
return 0;
|
|
}
|
|
|
|
#endif
|
|
|
|
#if CRYPTOPROVIDER_LIBGCRYPT == 1
|
|
|
|
#include <gcrypt.h>
|
|
|
|
int hash_sha256(const u8 *buf, size_t len, u8 *out)
|
|
{
|
|
gcry_md_hash_buffer(GCRY_MD_SHA256, out, buf, len);
|
|
return 0;
|
|
}
|
|
|
|
int hash_blake2b(const u8 *buf, size_t len, u8 *out)
|
|
{
|
|
gcry_md_hash_buffer(GCRY_MD_BLAKE2B_256, out, buf, len);
|
|
return 0;
|
|
}
|
|
|
|
#endif
|
|
|
|
#if CRYPTOPROVIDER_LIBSODIUM == 1
|
|
|
|
#include <sodium/crypto_hash_sha256.h>
|
|
#include <sodium/crypto_generichash_blake2b.h>
|
|
|
|
int hash_sha256(const u8 *buf, size_t len, u8 *out)
|
|
{
|
|
return crypto_hash_sha256(out, buf, len);
|
|
}
|
|
|
|
int hash_blake2b(const u8 *buf, size_t len, u8 *out)
|
|
{
|
|
return crypto_generichash_blake2b(out, CRYPTO_HASH_SIZE_MAX, buf, len,
|
|
NULL, 0);
|
|
}
|
|
|
|
#endif
|
|
|
|
#if CRYPTOPROVIDER_LIBKCAPI == 1
|
|
|
|
#include <kcapi.h>
|
|
|
|
int hash_sha256(const u8 *buf, size_t len, u8 *out)
|
|
{
|
|
static struct kcapi_handle *handle = NULL;
|
|
int ret;
|
|
|
|
if (!handle) {
|
|
ret = kcapi_md_init(&handle, "sha256", 0);
|
|
if (ret < 0) {
|
|
fprintf(stderr,
|
|
"HASH: cannot instantiate sha256, error %d\n",
|
|
ret);
|
|
exit(1);
|
|
}
|
|
}
|
|
ret = kcapi_md_digest(handle, buf, len, out, CRYPTO_HASH_SIZE_MAX);
|
|
/* kcapi_md_destroy(handle); */
|
|
|
|
return ret;
|
|
}
|
|
|
|
int hash_blake2b(const u8 *buf, size_t len, u8 *out)
|
|
{
|
|
static struct kcapi_handle *handle = NULL;
|
|
int ret;
|
|
|
|
if (!handle) {
|
|
ret = kcapi_md_init(&handle, "blake2b-256", 0);
|
|
if (ret < 0) {
|
|
fprintf(stderr,
|
|
"HASH: cannot instantiate blake2b-256, error %d\n",
|
|
ret);
|
|
exit(1);
|
|
}
|
|
}
|
|
ret = kcapi_md_digest(handle, buf, len, out, CRYPTO_HASH_SIZE_MAX);
|
|
/* kcapi_md_destroy(handle); */
|
|
|
|
return ret;
|
|
}
|
|
|
|
#endif
|