Linux Audio

Check our new training course

Loading...
v6.8
  1// SPDX-License-Identifier: GPL-2.0
  2/*
  3 * Cryptographic API.
  4 *
  5 * s390 implementation of the GHASH algorithm for GCM (Galois/Counter Mode).
  6 *
  7 * Copyright IBM Corp. 2011
  8 * Author(s): Gerald Schaefer <gerald.schaefer@de.ibm.com>
  9 */
 10
 11#include <crypto/internal/hash.h>
 12#include <linux/module.h>
 13#include <linux/cpufeature.h>
 14#include <asm/cpacf.h>
 15
 16#define GHASH_BLOCK_SIZE	16
 17#define GHASH_DIGEST_SIZE	16
 18
 19struct ghash_ctx {
 20	u8 key[GHASH_BLOCK_SIZE];
 
 21};
 22
 23struct ghash_desc_ctx {
 24	u8 icv[GHASH_BLOCK_SIZE];
 25	u8 key[GHASH_BLOCK_SIZE];
 26	u8 buffer[GHASH_BLOCK_SIZE];
 27	u32 bytes;
 28};
 29
 30static int ghash_init(struct shash_desc *desc)
 31{
 32	struct ghash_desc_ctx *dctx = shash_desc_ctx(desc);
 33	struct ghash_ctx *ctx = crypto_shash_ctx(desc->tfm);
 34
 35	memset(dctx, 0, sizeof(*dctx));
 36	memcpy(dctx->key, ctx->key, GHASH_BLOCK_SIZE);
 37
 38	return 0;
 39}
 40
 41static int ghash_setkey(struct crypto_shash *tfm,
 42			const u8 *key, unsigned int keylen)
 43{
 44	struct ghash_ctx *ctx = crypto_shash_ctx(tfm);
 45
 46	if (keylen != GHASH_BLOCK_SIZE)
 
 47		return -EINVAL;
 
 48
 49	memcpy(ctx->key, key, GHASH_BLOCK_SIZE);
 
 50
 51	return 0;
 52}
 53
 54static int ghash_update(struct shash_desc *desc,
 55			 const u8 *src, unsigned int srclen)
 56{
 57	struct ghash_desc_ctx *dctx = shash_desc_ctx(desc);
 
 58	unsigned int n;
 59	u8 *buf = dctx->buffer;
 
 60
 61	if (dctx->bytes) {
 62		u8 *pos = buf + (GHASH_BLOCK_SIZE - dctx->bytes);
 63
 64		n = min(srclen, dctx->bytes);
 65		dctx->bytes -= n;
 66		srclen -= n;
 67
 68		memcpy(pos, src, n);
 69		src += n;
 70
 71		if (!dctx->bytes) {
 72			cpacf_kimd(CPACF_KIMD_GHASH, dctx, buf,
 73				   GHASH_BLOCK_SIZE);
 
 74		}
 75	}
 76
 77	n = srclen & ~(GHASH_BLOCK_SIZE - 1);
 78	if (n) {
 79		cpacf_kimd(CPACF_KIMD_GHASH, dctx, src, n);
 
 80		src += n;
 81		srclen -= n;
 82	}
 83
 84	if (srclen) {
 85		dctx->bytes = GHASH_BLOCK_SIZE - srclen;
 86		memcpy(buf, src, srclen);
 87	}
 88
 89	return 0;
 90}
 91
 92static int ghash_flush(struct ghash_desc_ctx *dctx)
 93{
 94	u8 *buf = dctx->buffer;
 
 95
 96	if (dctx->bytes) {
 97		u8 *pos = buf + (GHASH_BLOCK_SIZE - dctx->bytes);
 98
 99		memset(pos, 0, dctx->bytes);
100		cpacf_kimd(CPACF_KIMD_GHASH, dctx, buf, GHASH_BLOCK_SIZE);
101		dctx->bytes = 0;
 
102	}
103
104	return 0;
105}
106
107static int ghash_final(struct shash_desc *desc, u8 *dst)
108{
109	struct ghash_desc_ctx *dctx = shash_desc_ctx(desc);
110	int ret;
 
 
 
111
112	ret = ghash_flush(dctx);
113	if (!ret)
114		memcpy(dst, dctx->icv, GHASH_BLOCK_SIZE);
115	return ret;
116}
117
118static struct shash_alg ghash_alg = {
119	.digestsize	= GHASH_DIGEST_SIZE,
120	.init		= ghash_init,
121	.update		= ghash_update,
122	.final		= ghash_final,
123	.setkey		= ghash_setkey,
124	.descsize	= sizeof(struct ghash_desc_ctx),
125	.base		= {
126		.cra_name		= "ghash",
127		.cra_driver_name	= "ghash-s390",
128		.cra_priority		= 300,
 
129		.cra_blocksize		= GHASH_BLOCK_SIZE,
130		.cra_ctxsize		= sizeof(struct ghash_ctx),
131		.cra_module		= THIS_MODULE,
 
132	},
133};
134
135static int __init ghash_mod_init(void)
136{
137	if (!cpacf_query_func(CPACF_KIMD, CPACF_KIMD_GHASH))
138		return -ENODEV;
 
139
140	return crypto_register_shash(&ghash_alg);
141}
142
143static void __exit ghash_mod_exit(void)
144{
145	crypto_unregister_shash(&ghash_alg);
146}
147
148module_cpu_feature_match(S390_CPU_FEATURE_MSA, ghash_mod_init);
149module_exit(ghash_mod_exit);
150
151MODULE_ALIAS_CRYPTO("ghash");
152
153MODULE_LICENSE("GPL");
154MODULE_DESCRIPTION("GHASH hash function, s390 implementation");
v3.1
 
  1/*
  2 * Cryptographic API.
  3 *
  4 * s390 implementation of the GHASH algorithm for GCM (Galois/Counter Mode).
  5 *
  6 * Copyright IBM Corp. 2011
  7 * Author(s): Gerald Schaefer <gerald.schaefer@de.ibm.com>
  8 */
  9
 10#include <crypto/internal/hash.h>
 11#include <linux/module.h>
 12
 13#include "crypt_s390.h"
 14
 15#define GHASH_BLOCK_SIZE	16
 16#define GHASH_DIGEST_SIZE	16
 17
 18struct ghash_ctx {
 19	u8 icv[16];
 20	u8 key[16];
 21};
 22
 23struct ghash_desc_ctx {
 
 
 24	u8 buffer[GHASH_BLOCK_SIZE];
 25	u32 bytes;
 26};
 27
 28static int ghash_init(struct shash_desc *desc)
 29{
 30	struct ghash_desc_ctx *dctx = shash_desc_ctx(desc);
 
 31
 32	memset(dctx, 0, sizeof(*dctx));
 
 33
 34	return 0;
 35}
 36
 37static int ghash_setkey(struct crypto_shash *tfm,
 38			const u8 *key, unsigned int keylen)
 39{
 40	struct ghash_ctx *ctx = crypto_shash_ctx(tfm);
 41
 42	if (keylen != GHASH_BLOCK_SIZE) {
 43		crypto_shash_set_flags(tfm, CRYPTO_TFM_RES_BAD_KEY_LEN);
 44		return -EINVAL;
 45	}
 46
 47	memcpy(ctx->key, key, GHASH_BLOCK_SIZE);
 48	memset(ctx->icv, 0, GHASH_BLOCK_SIZE);
 49
 50	return 0;
 51}
 52
 53static int ghash_update(struct shash_desc *desc,
 54			 const u8 *src, unsigned int srclen)
 55{
 56	struct ghash_desc_ctx *dctx = shash_desc_ctx(desc);
 57	struct ghash_ctx *ctx = crypto_shash_ctx(desc->tfm);
 58	unsigned int n;
 59	u8 *buf = dctx->buffer;
 60	int ret;
 61
 62	if (dctx->bytes) {
 63		u8 *pos = buf + (GHASH_BLOCK_SIZE - dctx->bytes);
 64
 65		n = min(srclen, dctx->bytes);
 66		dctx->bytes -= n;
 67		srclen -= n;
 68
 69		memcpy(pos, src, n);
 70		src += n;
 71
 72		if (!dctx->bytes) {
 73			ret = crypt_s390_kimd(KIMD_GHASH, ctx, buf,
 74					      GHASH_BLOCK_SIZE);
 75			BUG_ON(ret != GHASH_BLOCK_SIZE);
 76		}
 77	}
 78
 79	n = srclen & ~(GHASH_BLOCK_SIZE - 1);
 80	if (n) {
 81		ret = crypt_s390_kimd(KIMD_GHASH, ctx, src, n);
 82		BUG_ON(ret != n);
 83		src += n;
 84		srclen -= n;
 85	}
 86
 87	if (srclen) {
 88		dctx->bytes = GHASH_BLOCK_SIZE - srclen;
 89		memcpy(buf, src, srclen);
 90	}
 91
 92	return 0;
 93}
 94
 95static void ghash_flush(struct ghash_ctx *ctx, struct ghash_desc_ctx *dctx)
 96{
 97	u8 *buf = dctx->buffer;
 98	int ret;
 99
100	if (dctx->bytes) {
101		u8 *pos = buf + (GHASH_BLOCK_SIZE - dctx->bytes);
102
103		memset(pos, 0, dctx->bytes);
104
105		ret = crypt_s390_kimd(KIMD_GHASH, ctx, buf, GHASH_BLOCK_SIZE);
106		BUG_ON(ret != GHASH_BLOCK_SIZE);
107	}
108
109	dctx->bytes = 0;
110}
111
112static int ghash_final(struct shash_desc *desc, u8 *dst)
113{
114	struct ghash_desc_ctx *dctx = shash_desc_ctx(desc);
115	struct ghash_ctx *ctx = crypto_shash_ctx(desc->tfm);
116
117	ghash_flush(ctx, dctx);
118	memcpy(dst, ctx->icv, GHASH_BLOCK_SIZE);
119
120	return 0;
 
 
 
121}
122
123static struct shash_alg ghash_alg = {
124	.digestsize	= GHASH_DIGEST_SIZE,
125	.init		= ghash_init,
126	.update		= ghash_update,
127	.final		= ghash_final,
128	.setkey		= ghash_setkey,
129	.descsize	= sizeof(struct ghash_desc_ctx),
130	.base		= {
131		.cra_name		= "ghash",
132		.cra_driver_name	= "ghash-s390",
133		.cra_priority		= CRYPT_S390_PRIORITY,
134		.cra_flags		= CRYPTO_ALG_TYPE_SHASH,
135		.cra_blocksize		= GHASH_BLOCK_SIZE,
136		.cra_ctxsize		= sizeof(struct ghash_ctx),
137		.cra_module		= THIS_MODULE,
138		.cra_list		= LIST_HEAD_INIT(ghash_alg.base.cra_list),
139	},
140};
141
142static int __init ghash_mod_init(void)
143{
144	if (!crypt_s390_func_available(KIMD_GHASH,
145				       CRYPT_S390_MSA | CRYPT_S390_MSA4))
146		return -EOPNOTSUPP;
147
148	return crypto_register_shash(&ghash_alg);
149}
150
151static void __exit ghash_mod_exit(void)
152{
153	crypto_unregister_shash(&ghash_alg);
154}
155
156module_init(ghash_mod_init);
157module_exit(ghash_mod_exit);
158
159MODULE_ALIAS("ghash");
160
161MODULE_LICENSE("GPL");
162MODULE_DESCRIPTION("GHASH Message Digest Algorithm, s390 implementation");