blob: 686fe7aa192f457b9862c9a76298cea85acc128d [file] [log] [blame]
Greg Kroah-Hartman20a884f2017-11-24 15:00:34 +01001// SPDX-License-Identifier: GPL-2.0+
Jan Glauber604973f2008-03-06 19:50:20 +08002/*
3 * Cryptographic API.
4 *
5 * s390 generic implementation of the SHA Secure Hash Algorithms.
6 *
7 * Copyright IBM Corp. 2007
8 * Author(s): Jan Glauber (jang@de.ibm.com)
Jan Glauber604973f2008-03-06 19:50:20 +08009 */
10
Herbert Xu563f3462009-01-18 20:33:33 +110011#include <crypto/internal/hash.h>
Heiko Carstens3a4c5d52011-07-30 09:25:15 +020012#include <linux/module.h>
Martin Schwidefskyc7d4d252016-03-17 15:22:12 +010013#include <asm/cpacf.h>
Jan Glauber604973f2008-03-06 19:50:20 +080014#include "sha.h"
Jan Glauber604973f2008-03-06 19:50:20 +080015
Herbert Xu563f3462009-01-18 20:33:33 +110016int s390_sha_update(struct shash_desc *desc, const u8 *data, unsigned int len)
Jan Glauber604973f2008-03-06 19:50:20 +080017{
Herbert Xu563f3462009-01-18 20:33:33 +110018 struct s390_sha_ctx *ctx = shash_desc_ctx(desc);
19 unsigned int bsize = crypto_shash_blocksize(desc->tfm);
Martin Schwidefsky0177db02016-08-15 10:41:52 +020020 unsigned int index, n;
Jan Glauber604973f2008-03-06 19:50:20 +080021
22 /* how much is already in the buffer? */
Joerg Schmidbauer3c2eb6b2019-08-14 14:56:54 +020023 index = ctx->count % bsize;
Jan Glauber604973f2008-03-06 19:50:20 +080024 ctx->count += len;
25
26 if ((index + len) < bsize)
27 goto store;
28
29 /* process one stored block */
30 if (index) {
31 memcpy(ctx->buf + index, data, bsize - index);
Martin Schwidefsky0177db02016-08-15 10:41:52 +020032 cpacf_kimd(ctx->func, ctx->state, ctx->buf, bsize);
Jan Glauber604973f2008-03-06 19:50:20 +080033 data += bsize - index;
34 len -= bsize - index;
Herbert Xu9d20b572011-02-07 20:26:06 +110035 index = 0;
Jan Glauber604973f2008-03-06 19:50:20 +080036 }
37
38 /* process as many blocks as possible */
39 if (len >= bsize) {
Joerg Schmidbauer3c2eb6b2019-08-14 14:56:54 +020040 n = (len / bsize) * bsize;
Martin Schwidefsky0177db02016-08-15 10:41:52 +020041 cpacf_kimd(ctx->func, ctx->state, data, n);
42 data += n;
43 len -= n;
Jan Glauber604973f2008-03-06 19:50:20 +080044 }
45store:
46 if (len)
47 memcpy(ctx->buf + index , data, len);
Herbert Xu563f3462009-01-18 20:33:33 +110048
49 return 0;
Jan Glauber604973f2008-03-06 19:50:20 +080050}
51EXPORT_SYMBOL_GPL(s390_sha_update);
52
Joerg Schmidbauer3c2eb6b2019-08-14 14:56:54 +020053static int s390_crypto_shash_parmsize(int func)
54{
55 switch (func) {
56 case CPACF_KLMD_SHA_1:
57 return 20;
58 case CPACF_KLMD_SHA_256:
59 return 32;
60 case CPACF_KLMD_SHA_512:
61 return 64;
62 case CPACF_KLMD_SHA3_224:
63 case CPACF_KLMD_SHA3_256:
64 case CPACF_KLMD_SHA3_384:
65 case CPACF_KLMD_SHA3_512:
66 return 200;
67 default:
68 return -EINVAL;
69 }
70}
71
Herbert Xu563f3462009-01-18 20:33:33 +110072int s390_sha_final(struct shash_desc *desc, u8 *out)
Jan Glauber604973f2008-03-06 19:50:20 +080073{
Herbert Xu563f3462009-01-18 20:33:33 +110074 struct s390_sha_ctx *ctx = shash_desc_ctx(desc);
75 unsigned int bsize = crypto_shash_blocksize(desc->tfm);
Jan Glauber604973f2008-03-06 19:50:20 +080076 u64 bits;
YueHaibing0398d4a2019-11-14 15:30:05 +080077 unsigned int n;
78 int mbl_offset;
Jan Glauber604973f2008-03-06 19:50:20 +080079
Joerg Schmidbauer3c2eb6b2019-08-14 14:56:54 +020080 n = ctx->count % bsize;
Jan Glauber604973f2008-03-06 19:50:20 +080081 bits = ctx->count * 8;
YueHaibing0398d4a2019-11-14 15:30:05 +080082 mbl_offset = s390_crypto_shash_parmsize(ctx->func);
Joerg Schmidbauer3c2eb6b2019-08-14 14:56:54 +020083 if (mbl_offset < 0)
84 return -EINVAL;
85
YueHaibing0398d4a2019-11-14 15:30:05 +080086 mbl_offset = mbl_offset / sizeof(u32);
87
Joerg Schmidbauer3c2eb6b2019-08-14 14:56:54 +020088 /* set total msg bit length (mbl) in CPACF parmblock */
89 switch (ctx->func) {
90 case CPACF_KLMD_SHA_1:
91 case CPACF_KLMD_SHA_256:
92 memcpy(ctx->state + mbl_offset, &bits, sizeof(bits));
93 break;
94 case CPACF_KLMD_SHA_512:
95 /*
96 * the SHA512 parmblock has a 128-bit mbl field, clear
97 * high-order u64 field, copy bits to low-order u64 field
98 */
99 memset(ctx->state + mbl_offset, 0x00, sizeof(bits));
100 mbl_offset += sizeof(u64) / sizeof(u32);
101 memcpy(ctx->state + mbl_offset, &bits, sizeof(bits));
102 break;
103 case CPACF_KLMD_SHA3_224:
104 case CPACF_KLMD_SHA3_256:
105 case CPACF_KLMD_SHA3_384:
106 case CPACF_KLMD_SHA3_512:
107 break;
108 default:
109 return -EINVAL;
110 }
111
112 cpacf_klmd(ctx->func, ctx->state, ctx->buf, n);
Jan Glauber604973f2008-03-06 19:50:20 +0800113
114 /* copy digest to out */
Herbert Xu563f3462009-01-18 20:33:33 +1100115 memcpy(out, ctx->state, crypto_shash_digestsize(desc->tfm));
Jan Glauber604973f2008-03-06 19:50:20 +0800116 /* wipe context */
117 memset(ctx, 0, sizeof *ctx);
Herbert Xu563f3462009-01-18 20:33:33 +1100118
119 return 0;
Jan Glauber604973f2008-03-06 19:50:20 +0800120}
121EXPORT_SYMBOL_GPL(s390_sha_final);
122
123MODULE_LICENSE("GPL");
124MODULE_DESCRIPTION("s390 SHA cipher common functions");