Re: [PATCH 2/3] crypto: Remove sha224 and add md5 hash

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



ACK

Fabio

PS I am slightly overparanoid about alpha sorting.. mind to swap them
around?

On 3/15/2012 4:26 PM, Jan Friesse wrote:
> SHA224 is not supported on RHEL6 and also it's kind of weird. Instead of
> that, md5 can now be configured.
> 
> Signed-off-by: Jan Friesse <jfriesse@xxxxxxxxxx>
> ---
>  exec/coroparse.c    |    2 +-
>  exec/totemconfig.c  |    4 ++--
>  exec/totemcrypto.c  |   12 ++++++------
>  man/corosync.conf.5 |    2 +-
>  4 files changed, 10 insertions(+), 10 deletions(-)
> 
> diff --git a/exec/coroparse.c b/exec/coroparse.c
> index b602872..850b10e 100644
> --- a/exec/coroparse.c
> +++ b/exec/coroparse.c
> @@ -481,7 +481,7 @@ static int main_config_parser_cb(const char *path,
>  			if (strcmp(path, "totem.crypto_hash") == 0) {
>  				if ((strcmp(value, "none") != 0) &&
>  				    (strcmp(value, "sha1") != 0) &&
> -				    (strcmp(value, "sha224") != 0) &&
> +				    (strcmp(value, "md5") != 0) &&
>  				    (strcmp(value, "sha256") != 0) &&
>  				    (strcmp(value, "sha384") != 0) &&
>  				    (strcmp(value, "sha512") != 0)) {
> diff --git a/exec/totemconfig.c b/exec/totemconfig.c
> index 008b891..bb833a0 100644
> --- a/exec/totemconfig.c
> +++ b/exec/totemconfig.c
> @@ -155,8 +155,8 @@ static void totem_get_crypto(struct totem_config *totem_config)
>  		if (strcmp(str, "sha1") == 0) {
>  			tmp_hash = "sha1";
>  		}
> -		if (strcmp(str, "sha224") == 0) {
> -			tmp_hash = "sha224";
> +		if (strcmp(str, "md5") == 0) {
> +			tmp_hash = "md5";
>  		}
>  		if (strcmp(str, "sha256") == 0) {
>  			tmp_hash = "sha256";
> diff --git a/exec/totemcrypto.c b/exec/totemcrypto.c
> index e8717e4..f1e72bc 100644
> --- a/exec/totemcrypto.c
> +++ b/exec/totemcrypto.c
> @@ -110,7 +110,7 @@ size_t cypher_block_len[] = {
>  enum crypto_hash_t {
>  	CRYPTO_HASH_TYPE_NONE	= 0,
>  	CRYPTO_HASH_TYPE_SHA1	= 1,
> -	CRYPTO_HASH_TYPE_SHA224	= 2,
> +	CRYPTO_HASH_TYPE_MD5	= 2,
>  	CRYPTO_HASH_TYPE_SHA256	= 3,
>  	CRYPTO_HASH_TYPE_SHA384	= 4,
>  	CRYPTO_HASH_TYPE_SHA512	= 5
> @@ -119,7 +119,7 @@ enum crypto_hash_t {
>  CK_MECHANISM_TYPE hash_to_nss[] = {
>  	 0,				/* CRYPTO_HASH_TYPE_NONE */
>  	CKM_SHA_1_HMAC,			/* CRYPTO_HASH_TYPE_SHA1 */
> -	CKM_SHA224_HMAC,		/* CRYPTO_HASH_TYPE_SHA224 */
> +	CKM_MD5_HMAC,			/* CRYPTO_HASH_TYPE_MD5 */
>  	CKM_SHA256_HMAC,		/* CRYPTO_HASH_TYPE_SHA256 */
>  	CKM_SHA384_HMAC,		/* CRYPTO_HASH_TYPE_SHA384 */
>  	CKM_SHA512_HMAC			/* CRYPTO_HASH_TYPE_SHA512 */
> @@ -128,7 +128,7 @@ CK_MECHANISM_TYPE hash_to_nss[] = {
>  size_t hash_len[] = {
>  	 0,				/* CRYPTO_HASH_TYPE_NONE */
>  	SHA1_LENGTH,			/* CRYPTO_HASH_TYPE_SHA1 */
> -	SHA224_LENGTH,			/* CRYPTO_HASH_TYPE_SHA224 */
> +	MD5_LENGTH,			/* CRYPTO_HASH_TYPE_MD5 */
>  	SHA256_LENGTH,			/* CRYPTO_HASH_TYPE_SHA256 */
>  	SHA384_LENGTH,			/* CRYPTO_HASH_TYPE_SHA384 */
>  	SHA512_LENGTH			/* CRYPTO_HASH_TYPE_SHA512 */
> @@ -137,7 +137,7 @@ size_t hash_len[] = {
>  size_t hash_block_len[] = {
>  	 0,				/* CRYPTO_HASH_TYPE_NONE */
>  	SHA1_BLOCK_LENGTH,		/* CRYPTO_HASH_TYPE_SHA1 */
> -	SHA224_BLOCK_LENGTH,		/* CRYPTO_HASH_TYPE_SHA224 */
> +	MD5_BLOCK_LENGTH,		/* CRYPTO_HASH_TYPE_MD5 */
>  	SHA256_BLOCK_LENGTH,		/* CRYPTO_HASH_TYPE_SHA256 */
>  	SHA384_BLOCK_LENGTH,		/* CRYPTO_HASH_TYPE_SHA384 */
>  	SHA512_BLOCK_LENGTH		/* CRYPTO_HASH_TYPE_SHA512 */
> @@ -588,8 +588,8 @@ static int string_to_crypto_hash_type(const char* crypto_hash_type)
>  		return CRYPTO_HASH_TYPE_NONE;
>  	} else if (strcmp(crypto_hash_type, "sha1") == 0) {
>  		return CRYPTO_HASH_TYPE_SHA1;
> -	} else if (strcmp(crypto_hash_type, "sha224") == 0) {
> -		return CRYPTO_HASH_TYPE_SHA224;
> +	} else if (strcmp(crypto_hash_type, "md5") == 0) {
> +		return CRYPTO_HASH_TYPE_MD5;
>  	} else if (strcmp(crypto_hash_type, "sha256") == 0) {
>  		return CRYPTO_HASH_TYPE_SHA256;
>  	} else if (strcmp(crypto_hash_type, "sha384") == 0) {
> diff --git a/man/corosync.conf.5 b/man/corosync.conf.5
> index 82efcda..c82f2cd 100644
> --- a/man/corosync.conf.5
> +++ b/man/corosync.conf.5
> @@ -160,7 +160,7 @@ a subset of the cluster (for example during a rolling upgrade).
>  .TP
>  crypto_hash
>  This specifies which HMAC authentication should be used to authenticate all
> -messages. Valid values are none (no authentication), sha1, sha224, sha256,
> +messages. Valid values are none (no authentication), md5, sha1, sha256,
>  sha384 and sha512.
>  
>  The default is sha1.

_______________________________________________
discuss mailing list
discuss@xxxxxxxxxxxx
http://lists.corosync.org/mailman/listinfo/discuss


[Index of Archives]     [Linux Clusters]     [Corosync Project]     [Linux USB Devel]     [Linux Audio Users]     [Photo]     [Yosemite News]    [Yosemite Photos]    [Linux Kernel]     [Linux SCSI]     [X.Org]

  Powered by Linux