Linux Audio

Check our new training course

Loading...
v6.8
  1// SPDX-License-Identifier: GPL-2.0
  2/*
  3 * Cryptographic API.
  4 *
  5 * s390 implementation of the GHASH algorithm for GCM (Galois/Counter Mode).
  6 *
  7 * Copyright IBM Corp. 2011
  8 * Author(s): Gerald Schaefer <gerald.schaefer@de.ibm.com>
  9 */
 10
 11#include <crypto/internal/hash.h>
 12#include <linux/module.h>
 13#include <linux/cpufeature.h>
 14#include <asm/cpacf.h>
 
 15
 16#define GHASH_BLOCK_SIZE	16
 17#define GHASH_DIGEST_SIZE	16
 18
 19struct ghash_ctx {
 20	u8 key[GHASH_BLOCK_SIZE];
 21};
 22
 23struct ghash_desc_ctx {
 24	u8 icv[GHASH_BLOCK_SIZE];
 25	u8 key[GHASH_BLOCK_SIZE];
 26	u8 buffer[GHASH_BLOCK_SIZE];
 27	u32 bytes;
 28};
 29
 30static int ghash_init(struct shash_desc *desc)
 31{
 32	struct ghash_desc_ctx *dctx = shash_desc_ctx(desc);
 33	struct ghash_ctx *ctx = crypto_shash_ctx(desc->tfm);
 34
 35	memset(dctx, 0, sizeof(*dctx));
 36	memcpy(dctx->key, ctx->key, GHASH_BLOCK_SIZE);
 37
 38	return 0;
 39}
 40
 41static int ghash_setkey(struct crypto_shash *tfm,
 42			const u8 *key, unsigned int keylen)
 43{
 44	struct ghash_ctx *ctx = crypto_shash_ctx(tfm);
 45
 46	if (keylen != GHASH_BLOCK_SIZE)
 
 47		return -EINVAL;
 
 48
 49	memcpy(ctx->key, key, GHASH_BLOCK_SIZE);
 50
 51	return 0;
 52}
 53
 54static int ghash_update(struct shash_desc *desc,
 55			 const u8 *src, unsigned int srclen)
 56{
 57	struct ghash_desc_ctx *dctx = shash_desc_ctx(desc);
 58	unsigned int n;
 59	u8 *buf = dctx->buffer;
 
 60
 61	if (dctx->bytes) {
 62		u8 *pos = buf + (GHASH_BLOCK_SIZE - dctx->bytes);
 63
 64		n = min(srclen, dctx->bytes);
 65		dctx->bytes -= n;
 66		srclen -= n;
 67
 68		memcpy(pos, src, n);
 69		src += n;
 70
 71		if (!dctx->bytes) {
 72			cpacf_kimd(CPACF_KIMD_GHASH, dctx, buf,
 73				   GHASH_BLOCK_SIZE);
 
 
 74		}
 75	}
 76
 77	n = srclen & ~(GHASH_BLOCK_SIZE - 1);
 78	if (n) {
 79		cpacf_kimd(CPACF_KIMD_GHASH, dctx, src, n);
 
 
 80		src += n;
 81		srclen -= n;
 82	}
 83
 84	if (srclen) {
 85		dctx->bytes = GHASH_BLOCK_SIZE - srclen;
 86		memcpy(buf, src, srclen);
 87	}
 88
 89	return 0;
 90}
 91
 92static int ghash_flush(struct ghash_desc_ctx *dctx)
 93{
 94	u8 *buf = dctx->buffer;
 
 95
 96	if (dctx->bytes) {
 97		u8 *pos = buf + (GHASH_BLOCK_SIZE - dctx->bytes);
 98
 99		memset(pos, 0, dctx->bytes);
100		cpacf_kimd(CPACF_KIMD_GHASH, dctx, buf, GHASH_BLOCK_SIZE);
 
 
 
 
101		dctx->bytes = 0;
102	}
103
104	return 0;
105}
106
107static int ghash_final(struct shash_desc *desc, u8 *dst)
108{
109	struct ghash_desc_ctx *dctx = shash_desc_ctx(desc);
110	int ret;
111
112	ret = ghash_flush(dctx);
113	if (!ret)
114		memcpy(dst, dctx->icv, GHASH_BLOCK_SIZE);
115	return ret;
116}
117
118static struct shash_alg ghash_alg = {
119	.digestsize	= GHASH_DIGEST_SIZE,
120	.init		= ghash_init,
121	.update		= ghash_update,
122	.final		= ghash_final,
123	.setkey		= ghash_setkey,
124	.descsize	= sizeof(struct ghash_desc_ctx),
125	.base		= {
126		.cra_name		= "ghash",
127		.cra_driver_name	= "ghash-s390",
128		.cra_priority		= 300,
 
129		.cra_blocksize		= GHASH_BLOCK_SIZE,
130		.cra_ctxsize		= sizeof(struct ghash_ctx),
131		.cra_module		= THIS_MODULE,
132	},
133};
134
135static int __init ghash_mod_init(void)
136{
137	if (!cpacf_query_func(CPACF_KIMD, CPACF_KIMD_GHASH))
138		return -ENODEV;
 
139
140	return crypto_register_shash(&ghash_alg);
141}
142
143static void __exit ghash_mod_exit(void)
144{
145	crypto_unregister_shash(&ghash_alg);
146}
147
148module_cpu_feature_match(S390_CPU_FEATURE_MSA, ghash_mod_init);
149module_exit(ghash_mod_exit);
150
151MODULE_ALIAS_CRYPTO("ghash");
152
153MODULE_LICENSE("GPL");
154MODULE_DESCRIPTION("GHASH hash function, s390 implementation");
v4.6
 
  1/*
  2 * Cryptographic API.
  3 *
  4 * s390 implementation of the GHASH algorithm for GCM (Galois/Counter Mode).
  5 *
  6 * Copyright IBM Corp. 2011
  7 * Author(s): Gerald Schaefer <gerald.schaefer@de.ibm.com>
  8 */
  9
 10#include <crypto/internal/hash.h>
 11#include <linux/module.h>
 12#include <linux/cpufeature.h>
 13
 14#include "crypt_s390.h"
 15
 16#define GHASH_BLOCK_SIZE	16
 17#define GHASH_DIGEST_SIZE	16
 18
 19struct ghash_ctx {
 20	u8 key[GHASH_BLOCK_SIZE];
 21};
 22
 23struct ghash_desc_ctx {
 24	u8 icv[GHASH_BLOCK_SIZE];
 25	u8 key[GHASH_BLOCK_SIZE];
 26	u8 buffer[GHASH_BLOCK_SIZE];
 27	u32 bytes;
 28};
 29
 30static int ghash_init(struct shash_desc *desc)
 31{
 32	struct ghash_desc_ctx *dctx = shash_desc_ctx(desc);
 33	struct ghash_ctx *ctx = crypto_shash_ctx(desc->tfm);
 34
 35	memset(dctx, 0, sizeof(*dctx));
 36	memcpy(dctx->key, ctx->key, GHASH_BLOCK_SIZE);
 37
 38	return 0;
 39}
 40
 41static int ghash_setkey(struct crypto_shash *tfm,
 42			const u8 *key, unsigned int keylen)
 43{
 44	struct ghash_ctx *ctx = crypto_shash_ctx(tfm);
 45
 46	if (keylen != GHASH_BLOCK_SIZE) {
 47		crypto_shash_set_flags(tfm, CRYPTO_TFM_RES_BAD_KEY_LEN);
 48		return -EINVAL;
 49	}
 50
 51	memcpy(ctx->key, key, GHASH_BLOCK_SIZE);
 52
 53	return 0;
 54}
 55
 56static int ghash_update(struct shash_desc *desc,
 57			 const u8 *src, unsigned int srclen)
 58{
 59	struct ghash_desc_ctx *dctx = shash_desc_ctx(desc);
 60	unsigned int n;
 61	u8 *buf = dctx->buffer;
 62	int ret;
 63
 64	if (dctx->bytes) {
 65		u8 *pos = buf + (GHASH_BLOCK_SIZE - dctx->bytes);
 66
 67		n = min(srclen, dctx->bytes);
 68		dctx->bytes -= n;
 69		srclen -= n;
 70
 71		memcpy(pos, src, n);
 72		src += n;
 73
 74		if (!dctx->bytes) {
 75			ret = crypt_s390_kimd(KIMD_GHASH, dctx, buf,
 76					      GHASH_BLOCK_SIZE);
 77			if (ret != GHASH_BLOCK_SIZE)
 78				return -EIO;
 79		}
 80	}
 81
 82	n = srclen & ~(GHASH_BLOCK_SIZE - 1);
 83	if (n) {
 84		ret = crypt_s390_kimd(KIMD_GHASH, dctx, src, n);
 85		if (ret != n)
 86			return -EIO;
 87		src += n;
 88		srclen -= n;
 89	}
 90
 91	if (srclen) {
 92		dctx->bytes = GHASH_BLOCK_SIZE - srclen;
 93		memcpy(buf, src, srclen);
 94	}
 95
 96	return 0;
 97}
 98
 99static int ghash_flush(struct ghash_desc_ctx *dctx)
100{
101	u8 *buf = dctx->buffer;
102	int ret;
103
104	if (dctx->bytes) {
105		u8 *pos = buf + (GHASH_BLOCK_SIZE - dctx->bytes);
106
107		memset(pos, 0, dctx->bytes);
108
109		ret = crypt_s390_kimd(KIMD_GHASH, dctx, buf, GHASH_BLOCK_SIZE);
110		if (ret != GHASH_BLOCK_SIZE)
111			return -EIO;
112
113		dctx->bytes = 0;
114	}
115
116	return 0;
117}
118
119static int ghash_final(struct shash_desc *desc, u8 *dst)
120{
121	struct ghash_desc_ctx *dctx = shash_desc_ctx(desc);
122	int ret;
123
124	ret = ghash_flush(dctx);
125	if (!ret)
126		memcpy(dst, dctx->icv, GHASH_BLOCK_SIZE);
127	return ret;
128}
129
130static struct shash_alg ghash_alg = {
131	.digestsize	= GHASH_DIGEST_SIZE,
132	.init		= ghash_init,
133	.update		= ghash_update,
134	.final		= ghash_final,
135	.setkey		= ghash_setkey,
136	.descsize	= sizeof(struct ghash_desc_ctx),
137	.base		= {
138		.cra_name		= "ghash",
139		.cra_driver_name	= "ghash-s390",
140		.cra_priority		= CRYPT_S390_PRIORITY,
141		.cra_flags		= CRYPTO_ALG_TYPE_SHASH,
142		.cra_blocksize		= GHASH_BLOCK_SIZE,
143		.cra_ctxsize		= sizeof(struct ghash_ctx),
144		.cra_module		= THIS_MODULE,
145	},
146};
147
148static int __init ghash_mod_init(void)
149{
150	if (!crypt_s390_func_available(KIMD_GHASH,
151				       CRYPT_S390_MSA | CRYPT_S390_MSA4))
152		return -EOPNOTSUPP;
153
154	return crypto_register_shash(&ghash_alg);
155}
156
157static void __exit ghash_mod_exit(void)
158{
159	crypto_unregister_shash(&ghash_alg);
160}
161
162module_cpu_feature_match(MSA, ghash_mod_init);
163module_exit(ghash_mod_exit);
164
165MODULE_ALIAS_CRYPTO("ghash");
166
167MODULE_LICENSE("GPL");
168MODULE_DESCRIPTION("GHASH Message Digest Algorithm, s390 implementation");