blob: 5a834f6578ab85827c6a1416d788280c72322c47 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * Cryptographic API.
3 *
Jan Glauberc1e26e12006-01-06 00:19:17 -08004 * s390 implementation of the SHA1 Secure Hash Algorithm.
Linus Torvalds1da177e2005-04-16 15:20:36 -07005 *
6 * Derived from cryptoapi implementation, adapted for in-place
7 * scatterlist interface. Originally based on the public domain
8 * implementation written by Steve Reid.
9 *
10 * s390 Version:
Jan Glauber86aa9fc2007-02-05 21:18:14 +010011 * Copyright IBM Corp. 2003,2007
12 * Author(s): Thomas Spatzier
13 * Jan Glauber (jan.glauber@de.ibm.com)
Linus Torvalds1da177e2005-04-16 15:20:36 -070014 *
Sebastian Siewiorad5d2782007-10-08 11:45:10 +080015 * Derived from "crypto/sha1_generic.c"
Linus Torvalds1da177e2005-04-16 15:20:36 -070016 * Copyright (c) Alan Smithee.
17 * Copyright (c) Andrew McDonald <andrew@mcdonald.org.uk>
18 * Copyright (c) Jean-Francois Dive <jef@linuxbe.org>
19 *
20 * This program is free software; you can redistribute it and/or modify it
21 * under the terms of the GNU General Public License as published by the Free
22 * Software Foundation; either version 2 of the License, or (at your option)
23 * any later version.
24 *
25 */
26#include <linux/init.h>
27#include <linux/module.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070028#include <linux/crypto.h>
Jan Glauber5265eeb2007-10-09 22:43:13 +080029#include <crypto/sha.h>
Jan Glauber131a3952007-04-27 16:01:54 +020030
Jan Glauberc1e26e12006-01-06 00:19:17 -080031#include "crypt_s390.h"
Linus Torvalds1da177e2005-04-16 15:20:36 -070032
Jan Glauber131a3952007-04-27 16:01:54 +020033struct s390_sha1_ctx {
34 u64 count; /* message length */
Jan Glauberc1e26e12006-01-06 00:19:17 -080035 u32 state[5];
Jan Glauber131a3952007-04-27 16:01:54 +020036 u8 buf[2 * SHA1_BLOCK_SIZE];
Linus Torvalds1da177e2005-04-16 15:20:36 -070037};
38
Herbert Xu6c2bb982006-05-16 22:09:29 +100039static void sha1_init(struct crypto_tfm *tfm)
Linus Torvalds1da177e2005-04-16 15:20:36 -070040{
Jan Glauber131a3952007-04-27 16:01:54 +020041 struct s390_sha1_ctx *sctx = crypto_tfm_ctx(tfm);
Jan Glauber86aa9fc2007-02-05 21:18:14 +010042
Jan Glauber5265eeb2007-10-09 22:43:13 +080043 sctx->state[0] = SHA1_H0;
44 sctx->state[1] = SHA1_H1;
45 sctx->state[2] = SHA1_H2;
46 sctx->state[3] = SHA1_H3;
47 sctx->state[4] = SHA1_H4;
Jan Glauber131a3952007-04-27 16:01:54 +020048 sctx->count = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -070049}
50
Herbert Xu6c2bb982006-05-16 22:09:29 +100051static void sha1_update(struct crypto_tfm *tfm, const u8 *data,
52 unsigned int len)
Linus Torvalds1da177e2005-04-16 15:20:36 -070053{
Jan Glauber131a3952007-04-27 16:01:54 +020054 struct s390_sha1_ctx *sctx = crypto_tfm_ctx(tfm);
55 unsigned int index;
56 int ret;
Linus Torvalds1da177e2005-04-16 15:20:36 -070057
Jan Glauber131a3952007-04-27 16:01:54 +020058 /* how much is already in the buffer? */
59 index = sctx->count & 0x3f;
Linus Torvalds1da177e2005-04-16 15:20:36 -070060
Jan Glauber131a3952007-04-27 16:01:54 +020061 sctx->count += len;
62
63 if (index + len < SHA1_BLOCK_SIZE)
64 goto store;
65
66 /* process one stored block */
67 if (index) {
68 memcpy(sctx->buf + index, data, SHA1_BLOCK_SIZE - index);
69 ret = crypt_s390_kimd(KIMD_SHA_1, sctx->state, sctx->buf,
70 SHA1_BLOCK_SIZE);
71 BUG_ON(ret != SHA1_BLOCK_SIZE);
72 data += SHA1_BLOCK_SIZE - index;
73 len -= SHA1_BLOCK_SIZE - index;
Linus Torvalds1da177e2005-04-16 15:20:36 -070074 }
75
Jan Glauber131a3952007-04-27 16:01:54 +020076 /* process as many blocks as possible */
77 if (len >= SHA1_BLOCK_SIZE) {
78 ret = crypt_s390_kimd(KIMD_SHA_1, sctx->state, data,
79 len & ~(SHA1_BLOCK_SIZE - 1));
80 BUG_ON(ret != (len & ~(SHA1_BLOCK_SIZE - 1)));
81 data += ret;
82 len -= ret;
Linus Torvalds1da177e2005-04-16 15:20:36 -070083 }
Linus Torvalds1da177e2005-04-16 15:20:36 -070084
Jan Glauber131a3952007-04-27 16:01:54 +020085store:
86 /* anything left? */
87 if (len)
88 memcpy(sctx->buf + index , data, len);
Linus Torvalds1da177e2005-04-16 15:20:36 -070089}
90
91/* Add padding and return the message digest. */
Herbert Xu6c2bb982006-05-16 22:09:29 +100092static void sha1_final(struct crypto_tfm *tfm, u8 *out)
Linus Torvalds1da177e2005-04-16 15:20:36 -070093{
Jan Glauber131a3952007-04-27 16:01:54 +020094 struct s390_sha1_ctx *sctx = crypto_tfm_ctx(tfm);
95 u64 bits;
96 unsigned int index, end;
97 int ret;
Linus Torvalds1da177e2005-04-16 15:20:36 -070098
Jan Glauber86aa9fc2007-02-05 21:18:14 +010099 /* must perform manual padding */
Jan Glauber131a3952007-04-27 16:01:54 +0200100 index = sctx->count & 0x3f;
101 end = (index < 56) ? SHA1_BLOCK_SIZE : (2 * SHA1_BLOCK_SIZE);
102
103 /* start pad with 1 */
104 sctx->buf[index] = 0x80;
105
106 /* pad with zeros */
107 index++;
108 memset(sctx->buf + index, 0x00, end - index - 8);
109
110 /* append message length */
111 bits = sctx->count * 8;
112 memcpy(sctx->buf + end - 8, &bits, sizeof(bits));
113
114 ret = crypt_s390_kimd(KIMD_SHA_1, sctx->state, sctx->buf, end);
115 BUG_ON(ret != end);
116
Jan Glauber86aa9fc2007-02-05 21:18:14 +0100117 /* copy digest to out */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700118 memcpy(out, sctx->state, SHA1_DIGEST_SIZE);
Jan Glauber131a3952007-04-27 16:01:54 +0200119
Jan Glauber86aa9fc2007-02-05 21:18:14 +0100120 /* wipe context */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700121 memset(sctx, 0, sizeof *sctx);
122}
123
124static struct crypto_alg alg = {
125 .cra_name = "sha1",
Jan Glauber86aa9fc2007-02-05 21:18:14 +0100126 .cra_driver_name= "sha1-s390",
Herbert Xu65b75c32006-08-21 21:18:50 +1000127 .cra_priority = CRYPT_S390_PRIORITY,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700128 .cra_flags = CRYPTO_ALG_TYPE_DIGEST,
129 .cra_blocksize = SHA1_BLOCK_SIZE,
Jan Glauber131a3952007-04-27 16:01:54 +0200130 .cra_ctxsize = sizeof(struct s390_sha1_ctx),
Linus Torvalds1da177e2005-04-16 15:20:36 -0700131 .cra_module = THIS_MODULE,
Jan Glauber86aa9fc2007-02-05 21:18:14 +0100132 .cra_list = LIST_HEAD_INIT(alg.cra_list),
Linus Torvalds1da177e2005-04-16 15:20:36 -0700133 .cra_u = { .digest = {
134 .dia_digestsize = SHA1_DIGEST_SIZE,
Jan Glauber86aa9fc2007-02-05 21:18:14 +0100135 .dia_init = sha1_init,
136 .dia_update = sha1_update,
137 .dia_final = sha1_final } }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700138};
139
Jan Glauber86aa9fc2007-02-05 21:18:14 +0100140static int __init init(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700141{
Jan Glauber86aa9fc2007-02-05 21:18:14 +0100142 if (!crypt_s390_func_available(KIMD_SHA_1))
143 return -EOPNOTSUPP;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700144
Jan Glauber86aa9fc2007-02-05 21:18:14 +0100145 return crypto_register_alg(&alg);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700146}
147
Jan Glauber86aa9fc2007-02-05 21:18:14 +0100148static void __exit fini(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700149{
150 crypto_unregister_alg(&alg);
151}
152
153module_init(init);
154module_exit(fini);
155
156MODULE_ALIAS("sha1");
157
158MODULE_LICENSE("GPL");
159MODULE_DESCRIPTION("SHA1 Secure Hash Algorithm");