Linux Audio

Check our new training course

Loading...
v5.14.15
 1// SPDX-License-Identifier: GPL-2.0 OR MIT
 2/*
 3 * Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
 4 *
 5 * This is an implementation of the BLAKE2s hash and PRF functions.
 6 *
 7 * Information: https://blake2.net/
 8 *
 9 */
10
11#include <crypto/internal/blake2s.h>
12#include <linux/types.h>
13#include <linux/string.h>
14#include <linux/kernel.h>
15#include <linux/module.h>
16#include <linux/init.h>
17#include <linux/bug.h>
 
18
19#if IS_ENABLED(CONFIG_CRYPTO_ARCH_HAVE_LIB_BLAKE2S)
20#  define blake2s_compress blake2s_compress_arch
21#else
22#  define blake2s_compress blake2s_compress_generic
23#endif
24
25void blake2s_update(struct blake2s_state *state, const u8 *in, size_t inlen)
26{
27	__blake2s_update(state, in, inlen, blake2s_compress);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
28}
29EXPORT_SYMBOL(blake2s_update);
30
31void blake2s_final(struct blake2s_state *state, u8 *out)
32{
33	WARN_ON(IS_ENABLED(DEBUG) && !out);
34	__blake2s_final(state, out, blake2s_compress);
 
 
 
 
 
 
 
 
35	memzero_explicit(state, sizeof(*state));
36}
37EXPORT_SYMBOL(blake2s_final);
38
39void blake2s256_hmac(u8 *out, const u8 *in, const u8 *key, const size_t inlen,
40		     const size_t keylen)
41{
42	struct blake2s_state state;
43	u8 x_key[BLAKE2S_BLOCK_SIZE] __aligned(__alignof__(u32)) = { 0 };
44	u8 i_hash[BLAKE2S_HASH_SIZE] __aligned(__alignof__(u32));
45	int i;
46
47	if (keylen > BLAKE2S_BLOCK_SIZE) {
48		blake2s_init(&state, BLAKE2S_HASH_SIZE);
49		blake2s_update(&state, key, keylen);
50		blake2s_final(&state, x_key);
51	} else
52		memcpy(x_key, key, keylen);
53
54	for (i = 0; i < BLAKE2S_BLOCK_SIZE; ++i)
55		x_key[i] ^= 0x36;
56
57	blake2s_init(&state, BLAKE2S_HASH_SIZE);
58	blake2s_update(&state, x_key, BLAKE2S_BLOCK_SIZE);
59	blake2s_update(&state, in, inlen);
60	blake2s_final(&state, i_hash);
61
62	for (i = 0; i < BLAKE2S_BLOCK_SIZE; ++i)
63		x_key[i] ^= 0x5c ^ 0x36;
64
65	blake2s_init(&state, BLAKE2S_HASH_SIZE);
66	blake2s_update(&state, x_key, BLAKE2S_BLOCK_SIZE);
67	blake2s_update(&state, i_hash, BLAKE2S_HASH_SIZE);
68	blake2s_final(&state, i_hash);
69
70	memcpy(out, i_hash, BLAKE2S_HASH_SIZE);
71	memzero_explicit(x_key, BLAKE2S_BLOCK_SIZE);
72	memzero_explicit(i_hash, BLAKE2S_HASH_SIZE);
73}
74EXPORT_SYMBOL(blake2s256_hmac);
75
76static int __init mod_init(void)
77{
78	if (!IS_ENABLED(CONFIG_CRYPTO_MANAGER_DISABLE_TESTS) &&
79	    WARN_ON(!blake2s_selftest()))
80		return -ENODEV;
81	return 0;
82}
83
84static void __exit mod_exit(void)
85{
86}
87
88module_init(mod_init);
89module_exit(mod_exit);
90MODULE_LICENSE("GPL v2");
91MODULE_DESCRIPTION("BLAKE2s hash function");
92MODULE_AUTHOR("Jason A. Donenfeld <Jason@zx2c4.com>");
v5.9
  1// SPDX-License-Identifier: GPL-2.0 OR MIT
  2/*
  3 * Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
  4 *
  5 * This is an implementation of the BLAKE2s hash and PRF functions.
  6 *
  7 * Information: https://blake2.net/
  8 *
  9 */
 10
 11#include <crypto/internal/blake2s.h>
 12#include <linux/types.h>
 13#include <linux/string.h>
 14#include <linux/kernel.h>
 15#include <linux/module.h>
 16#include <linux/init.h>
 17#include <linux/bug.h>
 18#include <asm/unaligned.h>
 19
 20bool blake2s_selftest(void);
 
 
 
 
 21
 22void blake2s_update(struct blake2s_state *state, const u8 *in, size_t inlen)
 23{
 24	const size_t fill = BLAKE2S_BLOCK_SIZE - state->buflen;
 25
 26	if (unlikely(!inlen))
 27		return;
 28	if (inlen > fill) {
 29		memcpy(state->buf + state->buflen, in, fill);
 30		if (IS_ENABLED(CONFIG_CRYPTO_ARCH_HAVE_LIB_BLAKE2S))
 31			blake2s_compress_arch(state, state->buf, 1,
 32					      BLAKE2S_BLOCK_SIZE);
 33		else
 34			blake2s_compress_generic(state, state->buf, 1,
 35						 BLAKE2S_BLOCK_SIZE);
 36		state->buflen = 0;
 37		in += fill;
 38		inlen -= fill;
 39	}
 40	if (inlen > BLAKE2S_BLOCK_SIZE) {
 41		const size_t nblocks = DIV_ROUND_UP(inlen, BLAKE2S_BLOCK_SIZE);
 42		/* Hash one less (full) block than strictly possible */
 43		if (IS_ENABLED(CONFIG_CRYPTO_ARCH_HAVE_LIB_BLAKE2S))
 44			blake2s_compress_arch(state, in, nblocks - 1,
 45					      BLAKE2S_BLOCK_SIZE);
 46		else
 47			blake2s_compress_generic(state, in, nblocks - 1,
 48						 BLAKE2S_BLOCK_SIZE);
 49		in += BLAKE2S_BLOCK_SIZE * (nblocks - 1);
 50		inlen -= BLAKE2S_BLOCK_SIZE * (nblocks - 1);
 51	}
 52	memcpy(state->buf + state->buflen, in, inlen);
 53	state->buflen += inlen;
 54}
 55EXPORT_SYMBOL(blake2s_update);
 56
 57void blake2s_final(struct blake2s_state *state, u8 *out)
 58{
 59	WARN_ON(IS_ENABLED(DEBUG) && !out);
 60	blake2s_set_lastblock(state);
 61	memset(state->buf + state->buflen, 0,
 62	       BLAKE2S_BLOCK_SIZE - state->buflen); /* Padding */
 63	if (IS_ENABLED(CONFIG_CRYPTO_ARCH_HAVE_LIB_BLAKE2S))
 64		blake2s_compress_arch(state, state->buf, 1, state->buflen);
 65	else
 66		blake2s_compress_generic(state, state->buf, 1, state->buflen);
 67	cpu_to_le32_array(state->h, ARRAY_SIZE(state->h));
 68	memcpy(out, state->h, state->outlen);
 69	memzero_explicit(state, sizeof(*state));
 70}
 71EXPORT_SYMBOL(blake2s_final);
 72
 73void blake2s256_hmac(u8 *out, const u8 *in, const u8 *key, const size_t inlen,
 74		     const size_t keylen)
 75{
 76	struct blake2s_state state;
 77	u8 x_key[BLAKE2S_BLOCK_SIZE] __aligned(__alignof__(u32)) = { 0 };
 78	u8 i_hash[BLAKE2S_HASH_SIZE] __aligned(__alignof__(u32));
 79	int i;
 80
 81	if (keylen > BLAKE2S_BLOCK_SIZE) {
 82		blake2s_init(&state, BLAKE2S_HASH_SIZE);
 83		blake2s_update(&state, key, keylen);
 84		blake2s_final(&state, x_key);
 85	} else
 86		memcpy(x_key, key, keylen);
 87
 88	for (i = 0; i < BLAKE2S_BLOCK_SIZE; ++i)
 89		x_key[i] ^= 0x36;
 90
 91	blake2s_init(&state, BLAKE2S_HASH_SIZE);
 92	blake2s_update(&state, x_key, BLAKE2S_BLOCK_SIZE);
 93	blake2s_update(&state, in, inlen);
 94	blake2s_final(&state, i_hash);
 95
 96	for (i = 0; i < BLAKE2S_BLOCK_SIZE; ++i)
 97		x_key[i] ^= 0x5c ^ 0x36;
 98
 99	blake2s_init(&state, BLAKE2S_HASH_SIZE);
100	blake2s_update(&state, x_key, BLAKE2S_BLOCK_SIZE);
101	blake2s_update(&state, i_hash, BLAKE2S_HASH_SIZE);
102	blake2s_final(&state, i_hash);
103
104	memcpy(out, i_hash, BLAKE2S_HASH_SIZE);
105	memzero_explicit(x_key, BLAKE2S_BLOCK_SIZE);
106	memzero_explicit(i_hash, BLAKE2S_HASH_SIZE);
107}
108EXPORT_SYMBOL(blake2s256_hmac);
109
110static int __init mod_init(void)
111{
112	if (!IS_ENABLED(CONFIG_CRYPTO_MANAGER_DISABLE_TESTS) &&
113	    WARN_ON(!blake2s_selftest()))
114		return -ENODEV;
115	return 0;
116}
117
118static void __exit mod_exit(void)
119{
120}
121
122module_init(mod_init);
123module_exit(mod_exit);
124MODULE_LICENSE("GPL v2");
125MODULE_DESCRIPTION("BLAKE2s hash function");
126MODULE_AUTHOR("Jason A. Donenfeld <Jason@zx2c4.com>");