~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/arch/sparc/crypto/sha512_glue.c

Version: ~ [ linux-5.3-rc5 ] ~ [ linux-5.2.9 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.67 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.139 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.189 ] ~ [ linux-4.8.17 ] ~ [ linux-4.7.10 ] ~ [ linux-4.6.7 ] ~ [ linux-4.5.7 ] ~ [ linux-4.4.189 ] ~ [ linux-4.3.6 ] ~ [ linux-4.2.8 ] ~ [ linux-4.1.52 ] ~ [ linux-4.0.9 ] ~ [ linux-3.19.8 ] ~ [ linux-3.18.140 ] ~ [ linux-3.17.8 ] ~ [ linux-3.16.72 ] ~ [ linux-3.15.10 ] ~ [ linux-3.14.79 ] ~ [ linux-3.13.11 ] ~ [ linux-3.12.74 ] ~ [ linux-3.11.10 ] ~ [ linux-3.10.108 ] ~ [ linux-3.9.11 ] ~ [ linux-3.8.13 ] ~ [ linux-3.7.10 ] ~ [ linux-3.6.11 ] ~ [ linux-3.5.7 ] ~ [ linux-3.4.113 ] ~ [ linux-3.3.8 ] ~ [ linux-3.2.102 ] ~ [ linux-3.1.10 ] ~ [ linux-3.0.101 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.5 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

  1 /* Glue code for SHA512 hashing optimized for sparc64 crypto opcodes.
  2  *
  3  * This is based largely upon crypto/sha512_generic.c
  4  *
  5  * Copyright (c) Jean-Luc Cooke <jlcooke@certainkey.com>
  6  * Copyright (c) Andrew McDonald <andrew@mcdonald.org.uk>
  7  * Copyright (c) 2003 Kyle McMartin <kyle@debian.org>
  8  */
  9 
 10 #define pr_fmt(fmt)     KBUILD_MODNAME ": " fmt
 11 
 12 #include <crypto/internal/hash.h>
 13 #include <linux/init.h>
 14 #include <linux/module.h>
 15 #include <linux/mm.h>
 16 #include <linux/cryptohash.h>
 17 #include <linux/types.h>
 18 #include <crypto/sha.h>
 19 
 20 #include <asm/pstate.h>
 21 #include <asm/elf.h>
 22 
 23 #include "opcodes.h"
 24 
 25 asmlinkage void sha512_sparc64_transform(u64 *digest, const char *data,
 26                                          unsigned int rounds);
 27 
 28 static int sha512_sparc64_init(struct shash_desc *desc)
 29 {
 30         struct sha512_state *sctx = shash_desc_ctx(desc);
 31         sctx->state[0] = SHA512_H0;
 32         sctx->state[1] = SHA512_H1;
 33         sctx->state[2] = SHA512_H2;
 34         sctx->state[3] = SHA512_H3;
 35         sctx->state[4] = SHA512_H4;
 36         sctx->state[5] = SHA512_H5;
 37         sctx->state[6] = SHA512_H6;
 38         sctx->state[7] = SHA512_H7;
 39         sctx->count[0] = sctx->count[1] = 0;
 40 
 41         return 0;
 42 }
 43 
 44 static int sha384_sparc64_init(struct shash_desc *desc)
 45 {
 46         struct sha512_state *sctx = shash_desc_ctx(desc);
 47         sctx->state[0] = SHA384_H0;
 48         sctx->state[1] = SHA384_H1;
 49         sctx->state[2] = SHA384_H2;
 50         sctx->state[3] = SHA384_H3;
 51         sctx->state[4] = SHA384_H4;
 52         sctx->state[5] = SHA384_H5;
 53         sctx->state[6] = SHA384_H6;
 54         sctx->state[7] = SHA384_H7;
 55         sctx->count[0] = sctx->count[1] = 0;
 56 
 57         return 0;
 58 }
 59 
 60 static void __sha512_sparc64_update(struct sha512_state *sctx, const u8 *data,
 61                                     unsigned int len, unsigned int partial)
 62 {
 63         unsigned int done = 0;
 64 
 65         if ((sctx->count[0] += len) < len)
 66                 sctx->count[1]++;
 67         if (partial) {
 68                 done = SHA512_BLOCK_SIZE - partial;
 69                 memcpy(sctx->buf + partial, data, done);
 70                 sha512_sparc64_transform(sctx->state, sctx->buf, 1);
 71         }
 72         if (len - done >= SHA512_BLOCK_SIZE) {
 73                 const unsigned int rounds = (len - done) / SHA512_BLOCK_SIZE;
 74 
 75                 sha512_sparc64_transform(sctx->state, data + done, rounds);
 76                 done += rounds * SHA512_BLOCK_SIZE;
 77         }
 78 
 79         memcpy(sctx->buf, data + done, len - done);
 80 }
 81 
 82 static int sha512_sparc64_update(struct shash_desc *desc, const u8 *data,
 83                                  unsigned int len)
 84 {
 85         struct sha512_state *sctx = shash_desc_ctx(desc);
 86         unsigned int partial = sctx->count[0] % SHA512_BLOCK_SIZE;
 87 
 88         /* Handle the fast case right here */
 89         if (partial + len < SHA512_BLOCK_SIZE) {
 90                 if ((sctx->count[0] += len) < len)
 91                         sctx->count[1]++;
 92                 memcpy(sctx->buf + partial, data, len);
 93         } else
 94                 __sha512_sparc64_update(sctx, data, len, partial);
 95 
 96         return 0;
 97 }
 98 
 99 static int sha512_sparc64_final(struct shash_desc *desc, u8 *out)
100 {
101         struct sha512_state *sctx = shash_desc_ctx(desc);
102         unsigned int i, index, padlen;
103         __be64 *dst = (__be64 *)out;
104         __be64 bits[2];
105         static const u8 padding[SHA512_BLOCK_SIZE] = { 0x80, };
106 
107         /* Save number of bits */
108         bits[1] = cpu_to_be64(sctx->count[0] << 3);
109         bits[0] = cpu_to_be64(sctx->count[1] << 3 | sctx->count[0] >> 61);
110 
111         /* Pad out to 112 mod 128 and append length */
112         index = sctx->count[0] % SHA512_BLOCK_SIZE;
113         padlen = (index < 112) ? (112 - index) : ((SHA512_BLOCK_SIZE+112) - index);
114 
115         /* We need to fill a whole block for __sha512_sparc64_update() */
116         if (padlen <= 112) {
117                 if ((sctx->count[0] += padlen) < padlen)
118                         sctx->count[1]++;
119                 memcpy(sctx->buf + index, padding, padlen);
120         } else {
121                 __sha512_sparc64_update(sctx, padding, padlen, index);
122         }
123         __sha512_sparc64_update(sctx, (const u8 *)&bits, sizeof(bits), 112);
124 
125         /* Store state in digest */
126         for (i = 0; i < 8; i++)
127                 dst[i] = cpu_to_be64(sctx->state[i]);
128 
129         /* Wipe context */
130         memset(sctx, 0, sizeof(*sctx));
131 
132         return 0;
133 }
134 
135 static int sha384_sparc64_final(struct shash_desc *desc, u8 *hash)
136 {
137         u8 D[64];
138 
139         sha512_sparc64_final(desc, D);
140 
141         memcpy(hash, D, 48);
142         memzero_explicit(D, 64);
143 
144         return 0;
145 }
146 
147 static struct shash_alg sha512 = {
148         .digestsize     =       SHA512_DIGEST_SIZE,
149         .init           =       sha512_sparc64_init,
150         .update         =       sha512_sparc64_update,
151         .final          =       sha512_sparc64_final,
152         .descsize       =       sizeof(struct sha512_state),
153         .base           =       {
154                 .cra_name       =       "sha512",
155                 .cra_driver_name=       "sha512-sparc64",
156                 .cra_priority   =       SPARC_CR_OPCODE_PRIORITY,
157                 .cra_flags      =       CRYPTO_ALG_TYPE_SHASH,
158                 .cra_blocksize  =       SHA512_BLOCK_SIZE,
159                 .cra_module     =       THIS_MODULE,
160         }
161 };
162 
163 static struct shash_alg sha384 = {
164         .digestsize     =       SHA384_DIGEST_SIZE,
165         .init           =       sha384_sparc64_init,
166         .update         =       sha512_sparc64_update,
167         .final          =       sha384_sparc64_final,
168         .descsize       =       sizeof(struct sha512_state),
169         .base           =       {
170                 .cra_name       =       "sha384",
171                 .cra_driver_name=       "sha384-sparc64",
172                 .cra_priority   =       SPARC_CR_OPCODE_PRIORITY,
173                 .cra_flags      =       CRYPTO_ALG_TYPE_SHASH,
174                 .cra_blocksize  =       SHA384_BLOCK_SIZE,
175                 .cra_module     =       THIS_MODULE,
176         }
177 };
178 
179 static bool __init sparc64_has_sha512_opcode(void)
180 {
181         unsigned long cfr;
182 
183         if (!(sparc64_elf_hwcap & HWCAP_SPARC_CRYPTO))
184                 return false;
185 
186         __asm__ __volatile__("rd %%asr26, %0" : "=r" (cfr));
187         if (!(cfr & CFR_SHA512))
188                 return false;
189 
190         return true;
191 }
192 
193 static int __init sha512_sparc64_mod_init(void)
194 {
195         if (sparc64_has_sha512_opcode()) {
196                 int ret = crypto_register_shash(&sha384);
197                 if (ret < 0)
198                         return ret;
199 
200                 ret = crypto_register_shash(&sha512);
201                 if (ret < 0) {
202                         crypto_unregister_shash(&sha384);
203                         return ret;
204                 }
205 
206                 pr_info("Using sparc64 sha512 opcode optimized SHA-512/SHA-384 implementation\n");
207                 return 0;
208         }
209         pr_info("sparc64 sha512 opcode not available.\n");
210         return -ENODEV;
211 }
212 
213 static void __exit sha512_sparc64_mod_fini(void)
214 {
215         crypto_unregister_shash(&sha384);
216         crypto_unregister_shash(&sha512);
217 }
218 
219 module_init(sha512_sparc64_mod_init);
220 module_exit(sha512_sparc64_mod_fini);
221 
222 MODULE_LICENSE("GPL");
223 MODULE_DESCRIPTION("SHA-384 and SHA-512 Secure Hash Algorithm, sparc64 sha512 opcode accelerated");
224 
225 MODULE_ALIAS_CRYPTO("sha384");
226 MODULE_ALIAS_CRYPTO("sha512");
227 
228 #include "crop_devid.c"
229 

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | Wiki (Japanese) | Wiki (English) | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

osdn.jp