2019-06-03 08:44:50 +03:00
// SPDX-License-Identifier: GPL-2.0-only
2017-08-21 13:51:28 +03:00
/*
* SM3 secure hash , as specified by OSCCA GM / T 0004 - 2012 SM3 and
* described at https : //tools.ietf.org/html/draft-shen-sm3-hash-01
*
* Copyright ( C ) 2017 ARM Limited or its affiliates .
* Written by Gilad Ben - Yossef < gilad @ benyossef . com >
*/
# include <crypto/internal/hash.h>
# include <linux/init.h>
# include <linux/module.h>
# include <linux/mm.h>
# include <linux/types.h>
# include <crypto/sm3.h>
# include <crypto/sm3_base.h>
# include <linux/bitops.h>
# include <asm/byteorder.h>
# include <asm/unaligned.h>
const u8 sm3_zero_message_hash [ SM3_DIGEST_SIZE ] = {
0x1A , 0xB2 , 0x1D , 0x83 , 0x55 , 0xCF , 0xA1 , 0x7F ,
0x8e , 0x61 , 0x19 , 0x48 , 0x31 , 0xE8 , 0x1A , 0x8F ,
0x22 , 0xBE , 0xC8 , 0xC7 , 0x28 , 0xFE , 0xFB , 0x74 ,
0x7E , 0xD0 , 0x35 , 0xEB , 0x50 , 0x82 , 0xAA , 0x2B
} ;
EXPORT_SYMBOL_GPL ( sm3_zero_message_hash ) ;
static inline u32 p0 ( u32 x )
{
return x ^ rol32 ( x , 9 ) ^ rol32 ( x , 17 ) ;
}
static inline u32 p1 ( u32 x )
{
return x ^ rol32 ( x , 15 ) ^ rol32 ( x , 23 ) ;
}
static inline u32 ff ( unsigned int n , u32 a , u32 b , u32 c )
{
return ( n < 16 ) ? ( a ^ b ^ c ) : ( ( a & b ) | ( a & c ) | ( b & c ) ) ;
}
static inline u32 gg ( unsigned int n , u32 e , u32 f , u32 g )
{
return ( n < 16 ) ? ( e ^ f ^ g ) : ( ( e & f ) | ( ( ~ e ) & g ) ) ;
}
static inline u32 t ( unsigned int n )
{
return ( n < 16 ) ? SM3_T1 : SM3_T2 ;
}
static void sm3_expand ( u32 * t , u32 * w , u32 * wt )
{
int i ;
unsigned int tmp ;
/* load the input */
for ( i = 0 ; i < = 15 ; i + + )
w [ i ] = get_unaligned_be32 ( ( __u32 * ) t + i ) ;
for ( i = 16 ; i < = 67 ; i + + ) {
tmp = w [ i - 16 ] ^ w [ i - 9 ] ^ rol32 ( w [ i - 3 ] , 15 ) ;
w [ i ] = p1 ( tmp ) ^ ( rol32 ( w [ i - 13 ] , 7 ) ) ^ w [ i - 6 ] ;
}
for ( i = 0 ; i < = 63 ; i + + )
wt [ i ] = w [ i ] ^ w [ i + 4 ] ;
}
static void sm3_compress ( u32 * w , u32 * wt , u32 * m )
{
u32 ss1 ;
u32 ss2 ;
u32 tt1 ;
u32 tt2 ;
u32 a , b , c , d , e , f , g , h ;
int i ;
a = m [ 0 ] ;
b = m [ 1 ] ;
c = m [ 2 ] ;
d = m [ 3 ] ;
e = m [ 4 ] ;
f = m [ 5 ] ;
g = m [ 6 ] ;
h = m [ 7 ] ;
for ( i = 0 ; i < = 63 ; i + + ) {
2019-01-09 09:12:41 +03:00
ss1 = rol32 ( ( rol32 ( a , 12 ) + e + rol32 ( t ( i ) , i & 31 ) ) , 7 ) ;
2017-08-21 13:51:28 +03:00
ss2 = ss1 ^ rol32 ( a , 12 ) ;
tt1 = ff ( i , a , b , c ) + d + ss2 + * wt ;
wt + + ;
tt2 = gg ( i , e , f , g ) + h + ss1 + * w ;
w + + ;
d = c ;
c = rol32 ( b , 9 ) ;
b = a ;
a = tt1 ;
h = g ;
g = rol32 ( f , 19 ) ;
f = e ;
e = p0 ( tt2 ) ;
}
m [ 0 ] = a ^ m [ 0 ] ;
m [ 1 ] = b ^ m [ 1 ] ;
m [ 2 ] = c ^ m [ 2 ] ;
m [ 3 ] = d ^ m [ 3 ] ;
m [ 4 ] = e ^ m [ 4 ] ;
m [ 5 ] = f ^ m [ 5 ] ;
m [ 6 ] = g ^ m [ 6 ] ;
m [ 7 ] = h ^ m [ 7 ] ;
a = b = c = d = e = f = g = h = ss1 = ss2 = tt1 = tt2 = 0 ;
}
static void sm3_transform ( struct sm3_state * sst , u8 const * src )
{
unsigned int w [ 68 ] ;
unsigned int wt [ 64 ] ;
sm3_expand ( ( u32 * ) src , w , wt ) ;
sm3_compress ( w , wt , sst - > state ) ;
memzero_explicit ( w , sizeof ( w ) ) ;
memzero_explicit ( wt , sizeof ( wt ) ) ;
}
static void sm3_generic_block_fn ( struct sm3_state * sst , u8 const * src ,
int blocks )
{
while ( blocks - - ) {
sm3_transform ( sst , src ) ;
src + = SM3_BLOCK_SIZE ;
}
}
int crypto_sm3_update ( struct shash_desc * desc , const u8 * data ,
unsigned int len )
{
return sm3_base_do_update ( desc , data , len , sm3_generic_block_fn ) ;
}
EXPORT_SYMBOL ( crypto_sm3_update ) ;
static int sm3_final ( struct shash_desc * desc , u8 * out )
{
sm3_base_do_finalize ( desc , sm3_generic_block_fn ) ;
return sm3_base_finish ( desc , out ) ;
}
int crypto_sm3_finup ( struct shash_desc * desc , const u8 * data ,
unsigned int len , u8 * hash )
{
sm3_base_do_update ( desc , data , len , sm3_generic_block_fn ) ;
return sm3_final ( desc , hash ) ;
}
EXPORT_SYMBOL ( crypto_sm3_finup ) ;
static struct shash_alg sm3_alg = {
. digestsize = SM3_DIGEST_SIZE ,
. init = sm3_base_init ,
. update = crypto_sm3_update ,
. final = sm3_final ,
. finup = crypto_sm3_finup ,
. descsize = sizeof ( struct sm3_state ) ,
. base = {
. cra_name = " sm3 " ,
. cra_driver_name = " sm3-generic " ,
. cra_blocksize = SM3_BLOCK_SIZE ,
. cra_module = THIS_MODULE ,
}
} ;
static int __init sm3_generic_mod_init ( void )
{
return crypto_register_shash ( & sm3_alg ) ;
}
static void __exit sm3_generic_mod_fini ( void )
{
crypto_unregister_shash ( & sm3_alg ) ;
}
2019-04-12 07:57:42 +03:00
subsys_initcall ( sm3_generic_mod_init ) ;
2017-08-21 13:51:28 +03:00
module_exit ( sm3_generic_mod_fini ) ;
MODULE_LICENSE ( " GPL v2 " ) ;
MODULE_DESCRIPTION ( " SM3 Secure Hash Algorithm " ) ;
MODULE_ALIAS_CRYPTO ( " sm3 " ) ;
MODULE_ALIAS_CRYPTO ( " sm3-generic " ) ;