4 * s390 implementation of the SHA256 Secure Hash Algorithm.
7 * Copyright IBM Corp. 2005,2007
8 * Author(s): Jan Glauber (jang@de.ibm.com)
10 * Derived from "crypto/sha256.c"
11 * and "arch/s390/crypto/sha1_s390.c"
13 * This program is free software; you can redistribute it and/or modify it
14 * under the terms of the GNU General Public License as published by the Free
15 * Software Foundation; either version 2 of the License, or (at your option)
19 #include <linux/init.h>
20 #include <linux/module.h>
21 #include <linux/crypto.h>
23 #include "crypt_s390.h"
25 #define SHA256_DIGEST_SIZE 32
26 #define SHA256_BLOCK_SIZE 64
28 struct s390_sha256_ctx
{
31 u8 buf
[2 * SHA256_BLOCK_SIZE
];
34 static void sha256_init(struct crypto_tfm
*tfm
)
36 struct s390_sha256_ctx
*sctx
= crypto_tfm_ctx(tfm
);
38 sctx
->state
[0] = 0x6a09e667;
39 sctx
->state
[1] = 0xbb67ae85;
40 sctx
->state
[2] = 0x3c6ef372;
41 sctx
->state
[3] = 0xa54ff53a;
42 sctx
->state
[4] = 0x510e527f;
43 sctx
->state
[5] = 0x9b05688c;
44 sctx
->state
[6] = 0x1f83d9ab;
45 sctx
->state
[7] = 0x5be0cd19;
49 static void sha256_update(struct crypto_tfm
*tfm
, const u8
*data
,
52 struct s390_sha256_ctx
*sctx
= crypto_tfm_ctx(tfm
);
56 /* how much is already in the buffer? */
57 index
= sctx
->count
/ 8 & 0x3f;
59 /* update message bit length */
60 sctx
->count
+= len
* 8;
62 if ((index
+ len
) < SHA256_BLOCK_SIZE
)
65 /* process one stored block */
67 memcpy(sctx
->buf
+ index
, data
, SHA256_BLOCK_SIZE
- index
);
68 ret
= crypt_s390_kimd(KIMD_SHA_256
, sctx
->state
, sctx
->buf
,
70 BUG_ON(ret
!= SHA256_BLOCK_SIZE
);
71 data
+= SHA256_BLOCK_SIZE
- index
;
72 len
-= SHA256_BLOCK_SIZE
- index
;
75 /* process as many blocks as possible */
76 if (len
>= SHA256_BLOCK_SIZE
) {
77 ret
= crypt_s390_kimd(KIMD_SHA_256
, sctx
->state
, data
,
78 len
& ~(SHA256_BLOCK_SIZE
- 1));
79 BUG_ON(ret
!= (len
& ~(SHA256_BLOCK_SIZE
- 1)));
87 memcpy(sctx
->buf
+ index
, data
, len
);
90 static void pad_message(struct s390_sha256_ctx
* sctx
)
94 index
= sctx
->count
/ 8 & 0x3f;
95 end
= index
< 56 ? SHA256_BLOCK_SIZE
: 2 * SHA256_BLOCK_SIZE
;
97 /* start pad with 1 */
98 sctx
->buf
[index
] = 0x80;
102 memset(sctx
->buf
+ index
, 0x00, end
- index
- 8);
104 /* append message length */
105 memcpy(sctx
->buf
+ end
- 8, &sctx
->count
, sizeof sctx
->count
);
107 sctx
->count
= end
* 8;
110 /* Add padding and return the message digest */
111 static void sha256_final(struct crypto_tfm
*tfm
, u8
*out
)
113 struct s390_sha256_ctx
*sctx
= crypto_tfm_ctx(tfm
);
115 /* must perform manual padding */
118 crypt_s390_kimd(KIMD_SHA_256
, sctx
->state
, sctx
->buf
,
121 /* copy digest to out */
122 memcpy(out
, sctx
->state
, SHA256_DIGEST_SIZE
);
125 memset(sctx
, 0, sizeof *sctx
);
128 static struct crypto_alg alg
= {
129 .cra_name
= "sha256",
130 .cra_driver_name
= "sha256-s390",
131 .cra_priority
= CRYPT_S390_PRIORITY
,
132 .cra_flags
= CRYPTO_ALG_TYPE_DIGEST
,
133 .cra_blocksize
= SHA256_BLOCK_SIZE
,
134 .cra_ctxsize
= sizeof(struct s390_sha256_ctx
),
135 .cra_module
= THIS_MODULE
,
136 .cra_list
= LIST_HEAD_INIT(alg
.cra_list
),
137 .cra_u
= { .digest
= {
138 .dia_digestsize
= SHA256_DIGEST_SIZE
,
139 .dia_init
= sha256_init
,
140 .dia_update
= sha256_update
,
141 .dia_final
= sha256_final
} }
144 static int init(void)
146 if (!crypt_s390_func_available(KIMD_SHA_256
))
149 return crypto_register_alg(&alg
);
152 static void __exit
fini(void)
154 crypto_unregister_alg(&alg
);
160 MODULE_ALIAS("sha256");
162 MODULE_LICENSE("GPL");
163 MODULE_DESCRIPTION("SHA256 Secure Hash Algorithm");