Orange Pi5 kernel

Deprecated Linux kernel 5.10.110 for OrangePi 5/5B/5+ boards

3 Commits   0 Branches   0 Tags
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   1) /* SPDX-License-Identifier: GPL-2.0-only */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   2) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   3)  * sha512_base.h - core logic for SHA-512 implementations
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   4)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   5)  * Copyright (C) 2015 Linaro Ltd <ard.biesheuvel@linaro.org>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   6)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   7) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   8) #ifndef _CRYPTO_SHA512_BASE_H
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   9) #define _CRYPTO_SHA512_BASE_H
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  10) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  11) #include <crypto/internal/hash.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  12) #include <crypto/sha.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  13) #include <linux/crypto.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  14) #include <linux/module.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  15) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  16) #include <asm/unaligned.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  17) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  18) typedef void (sha512_block_fn)(struct sha512_state *sst, u8 const *src,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  19) 			       int blocks);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  20) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  21) static inline int sha384_base_init(struct shash_desc *desc)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  22) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  23) 	struct sha512_state *sctx = shash_desc_ctx(desc);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  24) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  25) 	sctx->state[0] = SHA384_H0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  26) 	sctx->state[1] = SHA384_H1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  27) 	sctx->state[2] = SHA384_H2;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  28) 	sctx->state[3] = SHA384_H3;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  29) 	sctx->state[4] = SHA384_H4;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  30) 	sctx->state[5] = SHA384_H5;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  31) 	sctx->state[6] = SHA384_H6;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  32) 	sctx->state[7] = SHA384_H7;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  33) 	sctx->count[0] = sctx->count[1] = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  34) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  35) 	return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  36) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  37) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  38) static inline int sha512_base_init(struct shash_desc *desc)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  39) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  40) 	struct sha512_state *sctx = shash_desc_ctx(desc);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  41) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  42) 	sctx->state[0] = SHA512_H0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  43) 	sctx->state[1] = SHA512_H1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  44) 	sctx->state[2] = SHA512_H2;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  45) 	sctx->state[3] = SHA512_H3;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  46) 	sctx->state[4] = SHA512_H4;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  47) 	sctx->state[5] = SHA512_H5;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  48) 	sctx->state[6] = SHA512_H6;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  49) 	sctx->state[7] = SHA512_H7;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  50) 	sctx->count[0] = sctx->count[1] = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  51) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  52) 	return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  53) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  54) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  55) static inline int sha512_base_do_update(struct shash_desc *desc,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  56) 					const u8 *data,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  57) 					unsigned int len,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  58) 					sha512_block_fn *block_fn)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  59) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  60) 	struct sha512_state *sctx = shash_desc_ctx(desc);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  61) 	unsigned int partial = sctx->count[0] % SHA512_BLOCK_SIZE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  62) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  63) 	sctx->count[0] += len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  64) 	if (sctx->count[0] < len)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  65) 		sctx->count[1]++;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  66) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  67) 	if (unlikely((partial + len) >= SHA512_BLOCK_SIZE)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  68) 		int blocks;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  69) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  70) 		if (partial) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  71) 			int p = SHA512_BLOCK_SIZE - partial;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  72) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  73) 			memcpy(sctx->buf + partial, data, p);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  74) 			data += p;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  75) 			len -= p;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  76) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  77) 			block_fn(sctx, sctx->buf, 1);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  78) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  79) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  80) 		blocks = len / SHA512_BLOCK_SIZE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  81) 		len %= SHA512_BLOCK_SIZE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  82) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  83) 		if (blocks) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  84) 			block_fn(sctx, data, blocks);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  85) 			data += blocks * SHA512_BLOCK_SIZE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  86) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  87) 		partial = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  88) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  89) 	if (len)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  90) 		memcpy(sctx->buf + partial, data, len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  91) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  92) 	return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  93) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  94) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  95) static inline int sha512_base_do_finalize(struct shash_desc *desc,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  96) 					  sha512_block_fn *block_fn)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  97) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  98) 	const int bit_offset = SHA512_BLOCK_SIZE - sizeof(__be64[2]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  99) 	struct sha512_state *sctx = shash_desc_ctx(desc);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 100) 	__be64 *bits = (__be64 *)(sctx->buf + bit_offset);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 101) 	unsigned int partial = sctx->count[0] % SHA512_BLOCK_SIZE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 102) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 103) 	sctx->buf[partial++] = 0x80;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 104) 	if (partial > bit_offset) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 105) 		memset(sctx->buf + partial, 0x0, SHA512_BLOCK_SIZE - partial);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 106) 		partial = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 107) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 108) 		block_fn(sctx, sctx->buf, 1);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 109) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 110) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 111) 	memset(sctx->buf + partial, 0x0, bit_offset - partial);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 112) 	bits[0] = cpu_to_be64(sctx->count[1] << 3 | sctx->count[0] >> 61);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 113) 	bits[1] = cpu_to_be64(sctx->count[0] << 3);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 114) 	block_fn(sctx, sctx->buf, 1);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 115) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 116) 	return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 117) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 118) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 119) static inline int sha512_base_finish(struct shash_desc *desc, u8 *out)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 120) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 121) 	unsigned int digest_size = crypto_shash_digestsize(desc->tfm);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 122) 	struct sha512_state *sctx = shash_desc_ctx(desc);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 123) 	__be64 *digest = (__be64 *)out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 124) 	int i;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 125) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 126) 	for (i = 0; digest_size > 0; i++, digest_size -= sizeof(__be64))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 127) 		put_unaligned_be64(sctx->state[i], digest++);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 128) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 129) 	*sctx = (struct sha512_state){};
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 130) 	return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 131) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 132) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 133) #endif /* _CRYPTO_SHA512_BASE_H */