mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-26 06:45:03 +07:00
69c0e360f9
The CPACF code makes some assumptions about the availablity of hardware support. E.g. if the machine supports KM(AES-256) without chaining it is assumed that KMC(AES-256) with chaining is available as well. For the existing CPUs this is true but the architecturally correct way is to check each CPACF functions on its own. This is what the query function of each instructions is all about. Reviewed-by: Harald Freudenberger <freude@linux.vnet.ibm.com> Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
110 lines
2.8 KiB
C
110 lines
2.8 KiB
C
/*
|
|
* Cryptographic API.
|
|
*
|
|
* s390 implementation of the SHA1 Secure Hash Algorithm.
|
|
*
|
|
* Derived from cryptoapi implementation, adapted for in-place
|
|
* scatterlist interface. Originally based on the public domain
|
|
* implementation written by Steve Reid.
|
|
*
|
|
* s390 Version:
|
|
* Copyright IBM Corp. 2003, 2007
|
|
* Author(s): Thomas Spatzier
|
|
* Jan Glauber (jan.glauber@de.ibm.com)
|
|
*
|
|
* Derived from "crypto/sha1_generic.c"
|
|
* Copyright (c) Alan Smithee.
|
|
* Copyright (c) Andrew McDonald <andrew@mcdonald.org.uk>
|
|
* Copyright (c) Jean-Francois Dive <jef@linuxbe.org>
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
* under the terms of the GNU General Public License as published by the Free
|
|
* Software Foundation; either version 2 of the License, or (at your option)
|
|
* any later version.
|
|
*
|
|
*/
|
|
#include <crypto/internal/hash.h>
|
|
#include <linux/init.h>
|
|
#include <linux/module.h>
|
|
#include <linux/cpufeature.h>
|
|
#include <crypto/sha.h>
|
|
#include <asm/cpacf.h>
|
|
|
|
#include "sha.h"
|
|
|
|
static int sha1_init(struct shash_desc *desc)
|
|
{
|
|
struct s390_sha_ctx *sctx = shash_desc_ctx(desc);
|
|
|
|
sctx->state[0] = SHA1_H0;
|
|
sctx->state[1] = SHA1_H1;
|
|
sctx->state[2] = SHA1_H2;
|
|
sctx->state[3] = SHA1_H3;
|
|
sctx->state[4] = SHA1_H4;
|
|
sctx->count = 0;
|
|
sctx->func = CPACF_KIMD_SHA_1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int sha1_export(struct shash_desc *desc, void *out)
|
|
{
|
|
struct s390_sha_ctx *sctx = shash_desc_ctx(desc);
|
|
struct sha1_state *octx = out;
|
|
|
|
octx->count = sctx->count;
|
|
memcpy(octx->state, sctx->state, sizeof(octx->state));
|
|
memcpy(octx->buffer, sctx->buf, sizeof(octx->buffer));
|
|
return 0;
|
|
}
|
|
|
|
static int sha1_import(struct shash_desc *desc, const void *in)
|
|
{
|
|
struct s390_sha_ctx *sctx = shash_desc_ctx(desc);
|
|
const struct sha1_state *ictx = in;
|
|
|
|
sctx->count = ictx->count;
|
|
memcpy(sctx->state, ictx->state, sizeof(ictx->state));
|
|
memcpy(sctx->buf, ictx->buffer, sizeof(ictx->buffer));
|
|
sctx->func = CPACF_KIMD_SHA_1;
|
|
return 0;
|
|
}
|
|
|
|
static struct shash_alg alg = {
|
|
.digestsize = SHA1_DIGEST_SIZE,
|
|
.init = sha1_init,
|
|
.update = s390_sha_update,
|
|
.final = s390_sha_final,
|
|
.export = sha1_export,
|
|
.import = sha1_import,
|
|
.descsize = sizeof(struct s390_sha_ctx),
|
|
.statesize = sizeof(struct sha1_state),
|
|
.base = {
|
|
.cra_name = "sha1",
|
|
.cra_driver_name= "sha1-s390",
|
|
.cra_priority = 300,
|
|
.cra_flags = CRYPTO_ALG_TYPE_SHASH,
|
|
.cra_blocksize = SHA1_BLOCK_SIZE,
|
|
.cra_module = THIS_MODULE,
|
|
}
|
|
};
|
|
|
|
static int __init sha1_s390_init(void)
|
|
{
|
|
if (!cpacf_query_func(CPACF_KIMD, CPACF_KIMD_SHA_1))
|
|
return -EOPNOTSUPP;
|
|
return crypto_register_shash(&alg);
|
|
}
|
|
|
|
static void __exit sha1_s390_fini(void)
|
|
{
|
|
crypto_unregister_shash(&alg);
|
|
}
|
|
|
|
module_cpu_feature_match(MSA, sha1_s390_init);
|
|
module_exit(sha1_s390_fini);
|
|
|
|
MODULE_ALIAS_CRYPTO("sha1");
|
|
MODULE_LICENSE("GPL");
|
|
MODULE_DESCRIPTION("SHA1 Secure Hash Algorithm");
|