Jan Glauber | 604973f | 2008-03-06 19:50:20 +0800 | [diff] [blame] | 1 | /* |
| 2 | * Cryptographic API. |
| 3 | * |
| 4 | * s390 generic implementation of the SHA Secure Hash Algorithms. |
| 5 | * |
| 6 | * Copyright IBM Corp. 2007 |
| 7 | * Author(s): Jan Glauber (jang@de.ibm.com) |
| 8 | * |
| 9 | * This program is free software; you can redistribute it and/or modify it |
| 10 | * under the terms of the GNU General Public License as published by the Free |
| 11 | * Software Foundation; either version 2 of the License, or (at your option) |
| 12 | * any later version. |
| 13 | * |
| 14 | */ |
| 15 | |
Herbert Xu | 563f346 | 2009-01-18 20:33:33 +1100 | [diff] [blame] | 16 | #include <crypto/internal/hash.h> |
Jan Glauber | 604973f | 2008-03-06 19:50:20 +0800 | [diff] [blame] | 17 | #include "sha.h" |
| 18 | #include "crypt_s390.h" |
| 19 | |
Herbert Xu | 563f346 | 2009-01-18 20:33:33 +1100 | [diff] [blame] | 20 | int s390_sha_update(struct shash_desc *desc, const u8 *data, unsigned int len) |
Jan Glauber | 604973f | 2008-03-06 19:50:20 +0800 | [diff] [blame] | 21 | { |
Herbert Xu | 563f346 | 2009-01-18 20:33:33 +1100 | [diff] [blame] | 22 | struct s390_sha_ctx *ctx = shash_desc_ctx(desc); |
| 23 | unsigned int bsize = crypto_shash_blocksize(desc->tfm); |
Jan Glauber | 604973f | 2008-03-06 19:50:20 +0800 | [diff] [blame] | 24 | unsigned int index; |
| 25 | int ret; |
| 26 | |
| 27 | /* how much is already in the buffer? */ |
| 28 | index = ctx->count & (bsize - 1); |
| 29 | ctx->count += len; |
| 30 | |
| 31 | if ((index + len) < bsize) |
| 32 | goto store; |
| 33 | |
| 34 | /* process one stored block */ |
| 35 | if (index) { |
| 36 | memcpy(ctx->buf + index, data, bsize - index); |
| 37 | ret = crypt_s390_kimd(ctx->func, ctx->state, ctx->buf, bsize); |
| 38 | BUG_ON(ret != bsize); |
| 39 | data += bsize - index; |
| 40 | len -= bsize - index; |
| 41 | } |
| 42 | |
| 43 | /* process as many blocks as possible */ |
| 44 | if (len >= bsize) { |
| 45 | ret = crypt_s390_kimd(ctx->func, ctx->state, data, |
| 46 | len & ~(bsize - 1)); |
| 47 | BUG_ON(ret != (len & ~(bsize - 1))); |
| 48 | data += ret; |
| 49 | len -= ret; |
| 50 | } |
| 51 | store: |
| 52 | if (len) |
| 53 | memcpy(ctx->buf + index , data, len); |
Herbert Xu | 563f346 | 2009-01-18 20:33:33 +1100 | [diff] [blame] | 54 | |
| 55 | return 0; |
Jan Glauber | 604973f | 2008-03-06 19:50:20 +0800 | [diff] [blame] | 56 | } |
| 57 | EXPORT_SYMBOL_GPL(s390_sha_update); |
| 58 | |
Herbert Xu | 563f346 | 2009-01-18 20:33:33 +1100 | [diff] [blame] | 59 | int s390_sha_final(struct shash_desc *desc, u8 *out) |
Jan Glauber | 604973f | 2008-03-06 19:50:20 +0800 | [diff] [blame] | 60 | { |
Herbert Xu | 563f346 | 2009-01-18 20:33:33 +1100 | [diff] [blame] | 61 | struct s390_sha_ctx *ctx = shash_desc_ctx(desc); |
| 62 | unsigned int bsize = crypto_shash_blocksize(desc->tfm); |
Jan Glauber | 604973f | 2008-03-06 19:50:20 +0800 | [diff] [blame] | 63 | u64 bits; |
Jan Glauber | 291dc7c | 2008-03-06 19:52:00 +0800 | [diff] [blame] | 64 | unsigned int index, end, plen; |
Jan Glauber | 604973f | 2008-03-06 19:50:20 +0800 | [diff] [blame] | 65 | int ret; |
| 66 | |
Jan Glauber | 291dc7c | 2008-03-06 19:52:00 +0800 | [diff] [blame] | 67 | /* SHA-512 uses 128 bit padding length */ |
| 68 | plen = (bsize > SHA256_BLOCK_SIZE) ? 16 : 8; |
| 69 | |
Jan Glauber | 604973f | 2008-03-06 19:50:20 +0800 | [diff] [blame] | 70 | /* must perform manual padding */ |
| 71 | index = ctx->count & (bsize - 1); |
Jan Glauber | 291dc7c | 2008-03-06 19:52:00 +0800 | [diff] [blame] | 72 | end = (index < bsize - plen) ? bsize : (2 * bsize); |
Jan Glauber | 604973f | 2008-03-06 19:50:20 +0800 | [diff] [blame] | 73 | |
| 74 | /* start pad with 1 */ |
| 75 | ctx->buf[index] = 0x80; |
| 76 | index++; |
| 77 | |
| 78 | /* pad with zeros */ |
| 79 | memset(ctx->buf + index, 0x00, end - index - 8); |
| 80 | |
Jan Glauber | 291dc7c | 2008-03-06 19:52:00 +0800 | [diff] [blame] | 81 | /* |
| 82 | * Append message length. Well, SHA-512 wants a 128 bit lenght value, |
| 83 | * nevertheless we use u64, should be enough for now... |
| 84 | */ |
Jan Glauber | 604973f | 2008-03-06 19:50:20 +0800 | [diff] [blame] | 85 | bits = ctx->count * 8; |
| 86 | memcpy(ctx->buf + end - 8, &bits, sizeof(bits)); |
| 87 | |
| 88 | ret = crypt_s390_kimd(ctx->func, ctx->state, ctx->buf, end); |
| 89 | BUG_ON(ret != end); |
| 90 | |
| 91 | /* copy digest to out */ |
Herbert Xu | 563f346 | 2009-01-18 20:33:33 +1100 | [diff] [blame] | 92 | memcpy(out, ctx->state, crypto_shash_digestsize(desc->tfm)); |
Jan Glauber | 604973f | 2008-03-06 19:50:20 +0800 | [diff] [blame] | 93 | /* wipe context */ |
| 94 | memset(ctx, 0, sizeof *ctx); |
Herbert Xu | 563f346 | 2009-01-18 20:33:33 +1100 | [diff] [blame] | 95 | |
| 96 | return 0; |
Jan Glauber | 604973f | 2008-03-06 19:50:20 +0800 | [diff] [blame] | 97 | } |
| 98 | EXPORT_SYMBOL_GPL(s390_sha_final); |
| 99 | |
| 100 | MODULE_LICENSE("GPL"); |
| 101 | MODULE_DESCRIPTION("s390 SHA cipher common functions"); |