blob: bd37d09b9d3c8cfacbc39f512ed8eb354d3049e0 [file] [log] [blame]
Jan Glauber604973f2008-03-06 19:50:20 +08001/*
2 * Cryptographic API.
3 *
4 * s390 generic implementation of the SHA Secure Hash Algorithms.
5 *
6 * Copyright IBM Corp. 2007
7 * Author(s): Jan Glauber (jang@de.ibm.com)
8 *
9 * This program is free software; you can redistribute it and/or modify it
10 * under the terms of the GNU General Public License as published by the Free
11 * Software Foundation; either version 2 of the License, or (at your option)
12 * any later version.
13 *
14 */
15
Herbert Xu563f3462009-01-18 20:33:33 +110016#include <crypto/internal/hash.h>
Heiko Carstens3a4c5d52011-07-30 09:25:15 +020017#include <linux/module.h>
Jan Glauber604973f2008-03-06 19:50:20 +080018#include "sha.h"
19#include "crypt_s390.h"
20
Herbert Xu563f3462009-01-18 20:33:33 +110021int s390_sha_update(struct shash_desc *desc, const u8 *data, unsigned int len)
Jan Glauber604973f2008-03-06 19:50:20 +080022{
Herbert Xu563f3462009-01-18 20:33:33 +110023 struct s390_sha_ctx *ctx = shash_desc_ctx(desc);
24 unsigned int bsize = crypto_shash_blocksize(desc->tfm);
Jan Glauber604973f2008-03-06 19:50:20 +080025 unsigned int index;
26 int ret;
27
28 /* how much is already in the buffer? */
29 index = ctx->count & (bsize - 1);
30 ctx->count += len;
31
32 if ((index + len) < bsize)
33 goto store;
34
35 /* process one stored block */
36 if (index) {
37 memcpy(ctx->buf + index, data, bsize - index);
38 ret = crypt_s390_kimd(ctx->func, ctx->state, ctx->buf, bsize);
39 BUG_ON(ret != bsize);
40 data += bsize - index;
41 len -= bsize - index;
Herbert Xu9d20b572011-02-07 20:26:06 +110042 index = 0;
Jan Glauber604973f2008-03-06 19:50:20 +080043 }
44
45 /* process as many blocks as possible */
46 if (len >= bsize) {
47 ret = crypt_s390_kimd(ctx->func, ctx->state, data,
48 len & ~(bsize - 1));
49 BUG_ON(ret != (len & ~(bsize - 1)));
50 data += ret;
51 len -= ret;
52 }
53store:
54 if (len)
55 memcpy(ctx->buf + index , data, len);
Herbert Xu563f3462009-01-18 20:33:33 +110056
57 return 0;
Jan Glauber604973f2008-03-06 19:50:20 +080058}
59EXPORT_SYMBOL_GPL(s390_sha_update);
60
Herbert Xu563f3462009-01-18 20:33:33 +110061int s390_sha_final(struct shash_desc *desc, u8 *out)
Jan Glauber604973f2008-03-06 19:50:20 +080062{
Herbert Xu563f3462009-01-18 20:33:33 +110063 struct s390_sha_ctx *ctx = shash_desc_ctx(desc);
64 unsigned int bsize = crypto_shash_blocksize(desc->tfm);
Jan Glauber604973f2008-03-06 19:50:20 +080065 u64 bits;
Jan Glauber291dc7c2008-03-06 19:52:00 +080066 unsigned int index, end, plen;
Jan Glauber604973f2008-03-06 19:50:20 +080067 int ret;
68
Jan Glauber291dc7c2008-03-06 19:52:00 +080069 /* SHA-512 uses 128 bit padding length */
70 plen = (bsize > SHA256_BLOCK_SIZE) ? 16 : 8;
71
Jan Glauber604973f2008-03-06 19:50:20 +080072 /* must perform manual padding */
73 index = ctx->count & (bsize - 1);
Jan Glauber291dc7c2008-03-06 19:52:00 +080074 end = (index < bsize - plen) ? bsize : (2 * bsize);
Jan Glauber604973f2008-03-06 19:50:20 +080075
76 /* start pad with 1 */
77 ctx->buf[index] = 0x80;
78 index++;
79
80 /* pad with zeros */
81 memset(ctx->buf + index, 0x00, end - index - 8);
82
Jan Glauber291dc7c2008-03-06 19:52:00 +080083 /*
Daniel Mack1537a362010-01-29 15:57:49 +080084 * Append message length. Well, SHA-512 wants a 128 bit length value,
Jan Glauber291dc7c2008-03-06 19:52:00 +080085 * nevertheless we use u64, should be enough for now...
86 */
Jan Glauber604973f2008-03-06 19:50:20 +080087 bits = ctx->count * 8;
88 memcpy(ctx->buf + end - 8, &bits, sizeof(bits));
89
90 ret = crypt_s390_kimd(ctx->func, ctx->state, ctx->buf, end);
91 BUG_ON(ret != end);
92
93 /* copy digest to out */
Herbert Xu563f3462009-01-18 20:33:33 +110094 memcpy(out, ctx->state, crypto_shash_digestsize(desc->tfm));
Jan Glauber604973f2008-03-06 19:50:20 +080095 /* wipe context */
96 memset(ctx, 0, sizeof *ctx);
Herbert Xu563f3462009-01-18 20:33:33 +110097
98 return 0;
Jan Glauber604973f2008-03-06 19:50:20 +080099}
100EXPORT_SYMBOL_GPL(s390_sha_final);
101
102MODULE_LICENSE("GPL");
103MODULE_DESCRIPTION("s390 SHA cipher common functions");