| .. | .. |
|---|
| 20 | 20 | unsigned int index, n; |
|---|
| 21 | 21 | |
|---|
| 22 | 22 | /* how much is already in the buffer? */ |
|---|
| 23 | | - index = ctx->count & (bsize - 1); |
|---|
| 23 | + index = ctx->count % bsize; |
|---|
| 24 | 24 | ctx->count += len; |
|---|
| 25 | 25 | |
|---|
| 26 | 26 | if ((index + len) < bsize) |
|---|
| .. | .. |
|---|
| 37 | 37 | |
|---|
| 38 | 38 | /* process as many blocks as possible */ |
|---|
| 39 | 39 | if (len >= bsize) { |
|---|
| 40 | | - n = len & ~(bsize - 1); |
|---|
| 40 | + n = (len / bsize) * bsize; |
|---|
| 41 | 41 | cpacf_kimd(ctx->func, ctx->state, data, n); |
|---|
| 42 | 42 | data += n; |
|---|
| 43 | 43 | len -= n; |
|---|
| .. | .. |
|---|
| 50 | 50 | } |
|---|
| 51 | 51 | EXPORT_SYMBOL_GPL(s390_sha_update); |
|---|
| 52 | 52 | |
|---|
| 53 | +static int s390_crypto_shash_parmsize(int func) |
|---|
| 54 | +{ |
|---|
| 55 | + switch (func) { |
|---|
| 56 | + case CPACF_KLMD_SHA_1: |
|---|
| 57 | + return 20; |
|---|
| 58 | + case CPACF_KLMD_SHA_256: |
|---|
| 59 | + return 32; |
|---|
| 60 | + case CPACF_KLMD_SHA_512: |
|---|
| 61 | + return 64; |
|---|
| 62 | + case CPACF_KLMD_SHA3_224: |
|---|
| 63 | + case CPACF_KLMD_SHA3_256: |
|---|
| 64 | + case CPACF_KLMD_SHA3_384: |
|---|
| 65 | + case CPACF_KLMD_SHA3_512: |
|---|
| 66 | + return 200; |
|---|
| 67 | + default: |
|---|
| 68 | + return -EINVAL; |
|---|
| 69 | + } |
|---|
| 70 | +} |
|---|
| 71 | + |
|---|
| 53 | 72 | int s390_sha_final(struct shash_desc *desc, u8 *out) |
|---|
| 54 | 73 | { |
|---|
| 55 | 74 | struct s390_sha_ctx *ctx = shash_desc_ctx(desc); |
|---|
| 56 | 75 | unsigned int bsize = crypto_shash_blocksize(desc->tfm); |
|---|
| 57 | 76 | u64 bits; |
|---|
| 58 | | - unsigned int index, end, plen; |
|---|
| 77 | + unsigned int n; |
|---|
| 78 | + int mbl_offset; |
|---|
| 59 | 79 | |
|---|
| 60 | | - /* SHA-512 uses 128 bit padding length */ |
|---|
| 61 | | - plen = (bsize > SHA256_BLOCK_SIZE) ? 16 : 8; |
|---|
| 62 | | - |
|---|
| 63 | | - /* must perform manual padding */ |
|---|
| 64 | | - index = ctx->count & (bsize - 1); |
|---|
| 65 | | - end = (index < bsize - plen) ? bsize : (2 * bsize); |
|---|
| 66 | | - |
|---|
| 67 | | - /* start pad with 1 */ |
|---|
| 68 | | - ctx->buf[index] = 0x80; |
|---|
| 69 | | - index++; |
|---|
| 70 | | - |
|---|
| 71 | | - /* pad with zeros */ |
|---|
| 72 | | - memset(ctx->buf + index, 0x00, end - index - 8); |
|---|
| 73 | | - |
|---|
| 74 | | - /* |
|---|
| 75 | | - * Append message length. Well, SHA-512 wants a 128 bit length value, |
|---|
| 76 | | - * nevertheless we use u64, should be enough for now... |
|---|
| 77 | | - */ |
|---|
| 80 | + n = ctx->count % bsize; |
|---|
| 78 | 81 | bits = ctx->count * 8; |
|---|
| 79 | | - memcpy(ctx->buf + end - 8, &bits, sizeof(bits)); |
|---|
| 80 | | - cpacf_kimd(ctx->func, ctx->state, ctx->buf, end); |
|---|
| 82 | + mbl_offset = s390_crypto_shash_parmsize(ctx->func); |
|---|
| 83 | + if (mbl_offset < 0) |
|---|
| 84 | + return -EINVAL; |
|---|
| 85 | + |
|---|
| 86 | + mbl_offset = mbl_offset / sizeof(u32); |
|---|
| 87 | + |
|---|
| 88 | + /* set total msg bit length (mbl) in CPACF parmblock */ |
|---|
| 89 | + switch (ctx->func) { |
|---|
| 90 | + case CPACF_KLMD_SHA_1: |
|---|
| 91 | + case CPACF_KLMD_SHA_256: |
|---|
| 92 | + memcpy(ctx->state + mbl_offset, &bits, sizeof(bits)); |
|---|
| 93 | + break; |
|---|
| 94 | + case CPACF_KLMD_SHA_512: |
|---|
| 95 | + /* |
|---|
| 96 | + * the SHA512 parmblock has a 128-bit mbl field, clear |
|---|
| 97 | + * high-order u64 field, copy bits to low-order u64 field |
|---|
| 98 | + */ |
|---|
| 99 | + memset(ctx->state + mbl_offset, 0x00, sizeof(bits)); |
|---|
| 100 | + mbl_offset += sizeof(u64) / sizeof(u32); |
|---|
| 101 | + memcpy(ctx->state + mbl_offset, &bits, sizeof(bits)); |
|---|
| 102 | + break; |
|---|
| 103 | + case CPACF_KLMD_SHA3_224: |
|---|
| 104 | + case CPACF_KLMD_SHA3_256: |
|---|
| 105 | + case CPACF_KLMD_SHA3_384: |
|---|
| 106 | + case CPACF_KLMD_SHA3_512: |
|---|
| 107 | + break; |
|---|
| 108 | + default: |
|---|
| 109 | + return -EINVAL; |
|---|
| 110 | + } |
|---|
| 111 | + |
|---|
| 112 | + cpacf_klmd(ctx->func, ctx->state, ctx->buf, n); |
|---|
| 81 | 113 | |
|---|
| 82 | 114 | /* copy digest to out */ |
|---|
| 83 | 115 | memcpy(out, ctx->state, crypto_shash_digestsize(desc->tfm)); |
|---|