Blame view

crypto/sm3_generic.c 4.11 KB
caab277b1   Thomas Gleixner   treewide: Replace...
1
  // SPDX-License-Identifier: GPL-2.0-only
4f0fc1600   Gilad Ben-Yossef   crypto: sm3 - add...
2
3
4
5
6
7
  /*
   * SM3 secure hash, as specified by OSCCA GM/T 0004-2012 SM3 and
   * described at https://tools.ietf.org/html/draft-shen-sm3-hash-01
   *
   * Copyright (C) 2017 ARM Limited or its affiliates.
   * Written by Gilad Ben-Yossef <gilad@benyossef.com>
4f0fc1600   Gilad Ben-Yossef   crypto: sm3 - add...
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
   */
  
  #include <crypto/internal/hash.h>
  #include <linux/init.h>
  #include <linux/module.h>
  #include <linux/mm.h>
  #include <linux/types.h>
  #include <crypto/sm3.h>
  #include <crypto/sm3_base.h>
  #include <linux/bitops.h>
  #include <asm/byteorder.h>
  #include <asm/unaligned.h>
  
  const u8 sm3_zero_message_hash[SM3_DIGEST_SIZE] = {
  	0x1A, 0xB2, 0x1D, 0x83, 0x55, 0xCF, 0xA1, 0x7F,
  	0x8e, 0x61, 0x19, 0x48, 0x31, 0xE8, 0x1A, 0x8F,
  	0x22, 0xBE, 0xC8, 0xC7, 0x28, 0xFE, 0xFB, 0x74,
  	0x7E, 0xD0, 0x35, 0xEB, 0x50, 0x82, 0xAA, 0x2B
  };
  EXPORT_SYMBOL_GPL(sm3_zero_message_hash);
  
  static inline u32 p0(u32 x)
  {
  	return x ^ rol32(x, 9) ^ rol32(x, 17);
  }
  
  static inline u32 p1(u32 x)
  {
  	return x ^ rol32(x, 15) ^ rol32(x, 23);
  }
  
  static inline u32 ff(unsigned int n, u32 a, u32 b, u32 c)
  {
  	return (n < 16) ? (a ^ b ^ c) : ((a & b) | (a & c) | (b & c));
  }
  
  static inline u32 gg(unsigned int n, u32 e, u32 f, u32 g)
  {
  	return (n < 16) ? (e ^ f ^ g) : ((e & f) | ((~e) & g));
  }
  
  static inline u32 t(unsigned int n)
  {
  	return (n < 16) ? SM3_T1 : SM3_T2;
  }
  
  static void sm3_expand(u32 *t, u32 *w, u32 *wt)
  {
  	int i;
  	unsigned int tmp;
  
  	/* load the input */
  	for (i = 0; i <= 15; i++)
  		w[i] = get_unaligned_be32((__u32 *)t + i);
  
  	for (i = 16; i <= 67; i++) {
  		tmp = w[i - 16] ^ w[i - 9] ^ rol32(w[i - 3], 15);
  		w[i] = p1(tmp) ^ (rol32(w[i - 13], 7)) ^ w[i - 6];
  	}
  
  	for (i = 0; i <= 63; i++)
  		wt[i] = w[i] ^ w[i + 4];
  }
  
  static void sm3_compress(u32 *w, u32 *wt, u32 *m)
  {
  	u32 ss1;
  	u32 ss2;
  	u32 tt1;
  	u32 tt2;
  	u32 a, b, c, d, e, f, g, h;
  	int i;
  
  	a = m[0];
  	b = m[1];
  	c = m[2];
  	d = m[3];
  	e = m[4];
  	f = m[5];
  	g = m[6];
  	h = m[7];
  
  	for (i = 0; i <= 63; i++) {
d45a90cb5   Eric Biggers   crypto: sm3 - fix...
91
  		ss1 = rol32((rol32(a, 12) + e + rol32(t(i), i & 31)), 7);
4f0fc1600   Gilad Ben-Yossef   crypto: sm3 - add...
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
  
  		ss2 = ss1 ^ rol32(a, 12);
  
  		tt1 = ff(i, a, b, c) + d + ss2 + *wt;
  		wt++;
  
  		tt2 = gg(i, e, f, g) + h + ss1 + *w;
  		w++;
  
  		d = c;
  		c = rol32(b, 9);
  		b = a;
  		a = tt1;
  		h = g;
  		g = rol32(f, 19);
  		f = e;
  		e = p0(tt2);
  	}
  
  	m[0] = a ^ m[0];
  	m[1] = b ^ m[1];
  	m[2] = c ^ m[2];
  	m[3] = d ^ m[3];
  	m[4] = e ^ m[4];
  	m[5] = f ^ m[5];
  	m[6] = g ^ m[6];
  	m[7] = h ^ m[7];
  
  	a = b = c = d = e = f = g = h = ss1 = ss2 = tt1 = tt2 = 0;
  }
  
  static void sm3_transform(struct sm3_state *sst, u8 const *src)
  {
  	unsigned int w[68];
  	unsigned int wt[64];
  
  	sm3_expand((u32 *)src, w, wt);
  	sm3_compress(w, wt, sst->state);
  
  	memzero_explicit(w, sizeof(w));
  	memzero_explicit(wt, sizeof(wt));
  }
  
  static void sm3_generic_block_fn(struct sm3_state *sst, u8 const *src,
  				    int blocks)
  {
  	while (blocks--) {
  		sm3_transform(sst, src);
  		src += SM3_BLOCK_SIZE;
  	}
  }
  
  int crypto_sm3_update(struct shash_desc *desc, const u8 *data,
  			  unsigned int len)
  {
  	return sm3_base_do_update(desc, data, len, sm3_generic_block_fn);
  }
  EXPORT_SYMBOL(crypto_sm3_update);
f49282870   Tianjia Zhang   crypto: sm3 - exp...
150
  int crypto_sm3_final(struct shash_desc *desc, u8 *out)
4f0fc1600   Gilad Ben-Yossef   crypto: sm3 - add...
151
152
153
154
  {
  	sm3_base_do_finalize(desc, sm3_generic_block_fn);
  	return sm3_base_finish(desc, out);
  }
f49282870   Tianjia Zhang   crypto: sm3 - exp...
155
  EXPORT_SYMBOL(crypto_sm3_final);
4f0fc1600   Gilad Ben-Yossef   crypto: sm3 - add...
156
157
158
159
160
  
  int crypto_sm3_finup(struct shash_desc *desc, const u8 *data,
  			unsigned int len, u8 *hash)
  {
  	sm3_base_do_update(desc, data, len, sm3_generic_block_fn);
f49282870   Tianjia Zhang   crypto: sm3 - exp...
161
  	return crypto_sm3_final(desc, hash);
4f0fc1600   Gilad Ben-Yossef   crypto: sm3 - add...
162
163
164
165
166
167
168
  }
  EXPORT_SYMBOL(crypto_sm3_finup);
  
  static struct shash_alg sm3_alg = {
  	.digestsize	=	SM3_DIGEST_SIZE,
  	.init		=	sm3_base_init,
  	.update		=	crypto_sm3_update,
f49282870   Tianjia Zhang   crypto: sm3 - exp...
169
  	.final		=	crypto_sm3_final,
4f0fc1600   Gilad Ben-Yossef   crypto: sm3 - add...
170
171
172
173
174
  	.finup		=	crypto_sm3_finup,
  	.descsize	=	sizeof(struct sm3_state),
  	.base		=	{
  		.cra_name	 =	"sm3",
  		.cra_driver_name =	"sm3-generic",
4f0fc1600   Gilad Ben-Yossef   crypto: sm3 - add...
175
176
177
178
179
180
181
182
183
184
185
186
187
188
  		.cra_blocksize	 =	SM3_BLOCK_SIZE,
  		.cra_module	 =	THIS_MODULE,
  	}
  };
  
  static int __init sm3_generic_mod_init(void)
  {
  	return crypto_register_shash(&sm3_alg);
  }
  
  static void __exit sm3_generic_mod_fini(void)
  {
  	crypto_unregister_shash(&sm3_alg);
  }
c4741b230   Eric Biggers   crypto: run initc...
189
  subsys_initcall(sm3_generic_mod_init);
4f0fc1600   Gilad Ben-Yossef   crypto: sm3 - add...
190
191
192
193
194
195
196
  module_exit(sm3_generic_mod_fini);
  
  MODULE_LICENSE("GPL v2");
  MODULE_DESCRIPTION("SM3 Secure Hash Algorithm");
  
  MODULE_ALIAS_CRYPTO("sm3");
  MODULE_ALIAS_CRYPTO("sm3-generic");