Blame view
crypto/sm3_generic.c
4.11 KB
caab277b1 treewide: Replace... |
1 |
// SPDX-License-Identifier: GPL-2.0-only |
4f0fc1600 crypto: sm3 - add... |
2 3 4 5 6 7 |
/* * SM3 secure hash, as specified by OSCCA GM/T 0004-2012 SM3 and * described at https://tools.ietf.org/html/draft-shen-sm3-hash-01 * * Copyright (C) 2017 ARM Limited or its affiliates. * Written by Gilad Ben-Yossef <gilad@benyossef.com> |
4f0fc1600 crypto: sm3 - add... |
8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 |
*/ #include <crypto/internal/hash.h> #include <linux/init.h> #include <linux/module.h> #include <linux/mm.h> #include <linux/types.h> #include <crypto/sm3.h> #include <crypto/sm3_base.h> #include <linux/bitops.h> #include <asm/byteorder.h> #include <asm/unaligned.h> const u8 sm3_zero_message_hash[SM3_DIGEST_SIZE] = { 0x1A, 0xB2, 0x1D, 0x83, 0x55, 0xCF, 0xA1, 0x7F, 0x8e, 0x61, 0x19, 0x48, 0x31, 0xE8, 0x1A, 0x8F, 0x22, 0xBE, 0xC8, 0xC7, 0x28, 0xFE, 0xFB, 0x74, 0x7E, 0xD0, 0x35, 0xEB, 0x50, 0x82, 0xAA, 0x2B }; EXPORT_SYMBOL_GPL(sm3_zero_message_hash); static inline u32 p0(u32 x) { return x ^ rol32(x, 9) ^ rol32(x, 17); } static inline u32 p1(u32 x) { return x ^ rol32(x, 15) ^ rol32(x, 23); } static inline u32 ff(unsigned int n, u32 a, u32 b, u32 c) { return (n < 16) ? (a ^ b ^ c) : ((a & b) | (a & c) | (b & c)); } static inline u32 gg(unsigned int n, u32 e, u32 f, u32 g) { return (n < 16) ? (e ^ f ^ g) : ((e & f) | ((~e) & g)); } static inline u32 t(unsigned int n) { return (n < 16) ? SM3_T1 : SM3_T2; } static void sm3_expand(u32 *t, u32 *w, u32 *wt) { int i; unsigned int tmp; /* load the input */ for (i = 0; i <= 15; i++) w[i] = get_unaligned_be32((__u32 *)t + i); for (i = 16; i <= 67; i++) { tmp = w[i - 16] ^ w[i - 9] ^ rol32(w[i - 3], 15); w[i] = p1(tmp) ^ (rol32(w[i - 13], 7)) ^ w[i - 6]; } for (i = 0; i <= 63; i++) wt[i] = w[i] ^ w[i + 4]; } static void sm3_compress(u32 *w, u32 *wt, u32 *m) { u32 ss1; u32 ss2; u32 tt1; u32 tt2; u32 a, b, c, d, e, f, g, h; int i; a = m[0]; b = m[1]; c = m[2]; d = m[3]; e = m[4]; f = m[5]; g = m[6]; h = m[7]; for (i = 0; i <= 63; i++) { |
d45a90cb5 crypto: sm3 - fix... |
91 |
ss1 = rol32((rol32(a, 12) + e + rol32(t(i), i & 31)), 7); |
4f0fc1600 crypto: sm3 - add... |
92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 |
ss2 = ss1 ^ rol32(a, 12); tt1 = ff(i, a, b, c) + d + ss2 + *wt; wt++; tt2 = gg(i, e, f, g) + h + ss1 + *w; w++; d = c; c = rol32(b, 9); b = a; a = tt1; h = g; g = rol32(f, 19); f = e; e = p0(tt2); } m[0] = a ^ m[0]; m[1] = b ^ m[1]; m[2] = c ^ m[2]; m[3] = d ^ m[3]; m[4] = e ^ m[4]; m[5] = f ^ m[5]; m[6] = g ^ m[6]; m[7] = h ^ m[7]; a = b = c = d = e = f = g = h = ss1 = ss2 = tt1 = tt2 = 0; } static void sm3_transform(struct sm3_state *sst, u8 const *src) { unsigned int w[68]; unsigned int wt[64]; sm3_expand((u32 *)src, w, wt); sm3_compress(w, wt, sst->state); memzero_explicit(w, sizeof(w)); memzero_explicit(wt, sizeof(wt)); } static void sm3_generic_block_fn(struct sm3_state *sst, u8 const *src, int blocks) { while (blocks--) { sm3_transform(sst, src); src += SM3_BLOCK_SIZE; } } int crypto_sm3_update(struct shash_desc *desc, const u8 *data, unsigned int len) { return sm3_base_do_update(desc, data, len, sm3_generic_block_fn); } EXPORT_SYMBOL(crypto_sm3_update); |
f49282870 crypto: sm3 - exp... |
150 |
int crypto_sm3_final(struct shash_desc *desc, u8 *out) |
4f0fc1600 crypto: sm3 - add... |
151 152 153 154 |
{ sm3_base_do_finalize(desc, sm3_generic_block_fn); return sm3_base_finish(desc, out); } |
f49282870 crypto: sm3 - exp... |
155 |
EXPORT_SYMBOL(crypto_sm3_final); |
4f0fc1600 crypto: sm3 - add... |
156 157 158 159 160 |
int crypto_sm3_finup(struct shash_desc *desc, const u8 *data, unsigned int len, u8 *hash) { sm3_base_do_update(desc, data, len, sm3_generic_block_fn); |
f49282870 crypto: sm3 - exp... |
161 |
return crypto_sm3_final(desc, hash); |
4f0fc1600 crypto: sm3 - add... |
162 163 164 165 166 167 168 |
} EXPORT_SYMBOL(crypto_sm3_finup); static struct shash_alg sm3_alg = { .digestsize = SM3_DIGEST_SIZE, .init = sm3_base_init, .update = crypto_sm3_update, |
f49282870 crypto: sm3 - exp... |
169 |
.final = crypto_sm3_final, |
4f0fc1600 crypto: sm3 - add... |
170 171 172 173 174 |
.finup = crypto_sm3_finup, .descsize = sizeof(struct sm3_state), .base = { .cra_name = "sm3", .cra_driver_name = "sm3-generic", |
4f0fc1600 crypto: sm3 - add... |
175 176 177 178 179 180 181 182 183 184 185 186 187 188 |
.cra_blocksize = SM3_BLOCK_SIZE, .cra_module = THIS_MODULE, } }; static int __init sm3_generic_mod_init(void) { return crypto_register_shash(&sm3_alg); } static void __exit sm3_generic_mod_fini(void) { crypto_unregister_shash(&sm3_alg); } |
c4741b230 crypto: run initc... |
189 |
subsys_initcall(sm3_generic_mod_init); |
4f0fc1600 crypto: sm3 - add... |
190 191 192 193 194 195 196 |
module_exit(sm3_generic_mod_fini); MODULE_LICENSE("GPL v2"); MODULE_DESCRIPTION("SM3 Secure Hash Algorithm"); MODULE_ALIAS_CRYPTO("sm3"); MODULE_ALIAS_CRYPTO("sm3-generic"); |