wolfSSL SSL/TLS library, support up to TLS1.3
Dependents: CyaSSL-Twitter-OAuth4Tw Example-client-tls-cert TwitterReader TweetTest ... more
wolfcrypt/src/sha.c@13:f67a6c6013ca, 2017-08-22 (annotated)
- Committer:
- wolfSSL
- Date:
- Tue Aug 22 10:48:22 2017 +0000
- Revision:
- 13:f67a6c6013ca
wolfSSL3.12.0 with TLS1.3
Who changed what in which revision?
User | Revision | Line number | New contents of line |
---|---|---|---|
wolfSSL | 13:f67a6c6013ca | 1 | /* sha.c |
wolfSSL | 13:f67a6c6013ca | 2 | * |
wolfSSL | 13:f67a6c6013ca | 3 | * Copyright (C) 2006-2016 wolfSSL Inc. |
wolfSSL | 13:f67a6c6013ca | 4 | * |
wolfSSL | 13:f67a6c6013ca | 5 | * This file is part of wolfSSL. |
wolfSSL | 13:f67a6c6013ca | 6 | * |
wolfSSL | 13:f67a6c6013ca | 7 | * wolfSSL is free software; you can redistribute it and/or modify |
wolfSSL | 13:f67a6c6013ca | 8 | * it under the terms of the GNU General Public License as published by |
wolfSSL | 13:f67a6c6013ca | 9 | * the Free Software Foundation; either version 2 of the License, or |
wolfSSL | 13:f67a6c6013ca | 10 | * (at your option) any later version. |
wolfSSL | 13:f67a6c6013ca | 11 | * |
wolfSSL | 13:f67a6c6013ca | 12 | * wolfSSL is distributed in the hope that it will be useful, |
wolfSSL | 13:f67a6c6013ca | 13 | * but WITHOUT ANY WARRANTY; without even the implied warranty of |
wolfSSL | 13:f67a6c6013ca | 14 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
wolfSSL | 13:f67a6c6013ca | 15 | * GNU General Public License for more details. |
wolfSSL | 13:f67a6c6013ca | 16 | * |
wolfSSL | 13:f67a6c6013ca | 17 | * You should have received a copy of the GNU General Public License |
wolfSSL | 13:f67a6c6013ca | 18 | * along with this program; if not, write to the Free Software |
wolfSSL | 13:f67a6c6013ca | 19 | * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA |
wolfSSL | 13:f67a6c6013ca | 20 | */ |
wolfSSL | 13:f67a6c6013ca | 21 | |
wolfSSL | 13:f67a6c6013ca | 22 | |
wolfSSL | 13:f67a6c6013ca | 23 | #ifdef HAVE_CONFIG_H |
wolfSSL | 13:f67a6c6013ca | 24 | #include <config.h> |
wolfSSL | 13:f67a6c6013ca | 25 | #endif |
wolfSSL | 13:f67a6c6013ca | 26 | |
wolfSSL | 13:f67a6c6013ca | 27 | #include <wolfssl/wolfcrypt/settings.h> |
wolfSSL | 13:f67a6c6013ca | 28 | |
wolfSSL | 13:f67a6c6013ca | 29 | #if !defined(NO_SHA) |
wolfSSL | 13:f67a6c6013ca | 30 | |
wolfSSL | 13:f67a6c6013ca | 31 | #include <wolfssl/wolfcrypt/sha.h> |
wolfSSL | 13:f67a6c6013ca | 32 | #include <wolfssl/wolfcrypt/error-crypt.h> |
wolfSSL | 13:f67a6c6013ca | 33 | |
wolfSSL | 13:f67a6c6013ca | 34 | /* fips wrapper calls, user can call direct */ |
wolfSSL | 13:f67a6c6013ca | 35 | #ifdef HAVE_FIPS |
wolfSSL | 13:f67a6c6013ca | 36 | int wc_InitSha(Sha* sha) |
wolfSSL | 13:f67a6c6013ca | 37 | { |
wolfSSL | 13:f67a6c6013ca | 38 | if (sha == NULL) { |
wolfSSL | 13:f67a6c6013ca | 39 | return BAD_FUNC_ARG; |
wolfSSL | 13:f67a6c6013ca | 40 | } |
wolfSSL | 13:f67a6c6013ca | 41 | return InitSha_fips(sha); |
wolfSSL | 13:f67a6c6013ca | 42 | } |
wolfSSL | 13:f67a6c6013ca | 43 | int wc_InitSha_ex(Sha* sha, void* heap, int devId) |
wolfSSL | 13:f67a6c6013ca | 44 | { |
wolfSSL | 13:f67a6c6013ca | 45 | (void)heap; |
wolfSSL | 13:f67a6c6013ca | 46 | (void)devId; |
wolfSSL | 13:f67a6c6013ca | 47 | if (sha == NULL) { |
wolfSSL | 13:f67a6c6013ca | 48 | return BAD_FUNC_ARG; |
wolfSSL | 13:f67a6c6013ca | 49 | } |
wolfSSL | 13:f67a6c6013ca | 50 | return InitSha_fips(sha); |
wolfSSL | 13:f67a6c6013ca | 51 | } |
wolfSSL | 13:f67a6c6013ca | 52 | |
wolfSSL | 13:f67a6c6013ca | 53 | int wc_ShaUpdate(Sha* sha, const byte* data, word32 len) |
wolfSSL | 13:f67a6c6013ca | 54 | { |
wolfSSL | 13:f67a6c6013ca | 55 | if (sha == NULL || (data == NULL && len > 0)) { |
wolfSSL | 13:f67a6c6013ca | 56 | return BAD_FUNC_ARG; |
wolfSSL | 13:f67a6c6013ca | 57 | } |
wolfSSL | 13:f67a6c6013ca | 58 | return ShaUpdate_fips(sha, data, len); |
wolfSSL | 13:f67a6c6013ca | 59 | } |
wolfSSL | 13:f67a6c6013ca | 60 | |
wolfSSL | 13:f67a6c6013ca | 61 | int wc_ShaFinal(Sha* sha, byte* out) |
wolfSSL | 13:f67a6c6013ca | 62 | { |
wolfSSL | 13:f67a6c6013ca | 63 | if (sha == NULL || out == NULL) { |
wolfSSL | 13:f67a6c6013ca | 64 | return BAD_FUNC_ARG; |
wolfSSL | 13:f67a6c6013ca | 65 | } |
wolfSSL | 13:f67a6c6013ca | 66 | return ShaFinal_fips(sha,out); |
wolfSSL | 13:f67a6c6013ca | 67 | } |
wolfSSL | 13:f67a6c6013ca | 68 | void wc_ShaFree(Sha* sha) |
wolfSSL | 13:f67a6c6013ca | 69 | { |
wolfSSL | 13:f67a6c6013ca | 70 | (void)sha; |
wolfSSL | 13:f67a6c6013ca | 71 | /* Not supported in FIPS */ |
wolfSSL | 13:f67a6c6013ca | 72 | } |
wolfSSL | 13:f67a6c6013ca | 73 | |
wolfSSL | 13:f67a6c6013ca | 74 | #else /* else build without fips */ |
wolfSSL | 13:f67a6c6013ca | 75 | |
wolfSSL | 13:f67a6c6013ca | 76 | |
wolfSSL | 13:f67a6c6013ca | 77 | #if defined(WOLFSSL_TI_HASH) |
wolfSSL | 13:f67a6c6013ca | 78 | /* #include <wolfcrypt/src/port/ti/ti-hash.c> included by wc_port.c */ |
wolfSSL | 13:f67a6c6013ca | 79 | |
wolfSSL | 13:f67a6c6013ca | 80 | #else |
wolfSSL | 13:f67a6c6013ca | 81 | |
wolfSSL | 13:f67a6c6013ca | 82 | #include <wolfssl/wolfcrypt/logging.h> |
wolfSSL | 13:f67a6c6013ca | 83 | #ifdef NO_INLINE |
wolfSSL | 13:f67a6c6013ca | 84 | #include <wolfssl/wolfcrypt/misc.h> |
wolfSSL | 13:f67a6c6013ca | 85 | #else |
wolfSSL | 13:f67a6c6013ca | 86 | #define WOLFSSL_MISC_INCLUDED |
wolfSSL | 13:f67a6c6013ca | 87 | #include <wolfcrypt/src/misc.c> |
wolfSSL | 13:f67a6c6013ca | 88 | #endif |
wolfSSL | 13:f67a6c6013ca | 89 | |
wolfSSL | 13:f67a6c6013ca | 90 | |
wolfSSL | 13:f67a6c6013ca | 91 | /* Hardware Acceleration */ |
wolfSSL | 13:f67a6c6013ca | 92 | #if defined(WOLFSSL_PIC32MZ_HASH) |
wolfSSL | 13:f67a6c6013ca | 93 | #include <wolfssl/wolfcrypt/port/pic32/pic32mz-crypt.h> |
wolfSSL | 13:f67a6c6013ca | 94 | |
wolfSSL | 13:f67a6c6013ca | 95 | #elif defined(STM32F2_HASH) || defined(STM32F4_HASH) |
wolfSSL | 13:f67a6c6013ca | 96 | |
wolfSSL | 13:f67a6c6013ca | 97 | /* |
wolfSSL | 13:f67a6c6013ca | 98 | * STM32F2/F4 hardware SHA1 support through the standard peripheral |
wolfSSL | 13:f67a6c6013ca | 99 | * library. (See note in README). |
wolfSSL | 13:f67a6c6013ca | 100 | */ |
wolfSSL | 13:f67a6c6013ca | 101 | |
wolfSSL | 13:f67a6c6013ca | 102 | static int InitSha(Sha* sha) |
wolfSSL | 13:f67a6c6013ca | 103 | { |
wolfSSL | 13:f67a6c6013ca | 104 | /* STM32 struct notes: |
wolfSSL | 13:f67a6c6013ca | 105 | * sha->buffer = first 4 bytes used to hold partial block if needed |
wolfSSL | 13:f67a6c6013ca | 106 | * sha->buffLen = num bytes currently stored in sha->buffer |
wolfSSL | 13:f67a6c6013ca | 107 | * sha->loLen = num bytes that have been written to STM32 FIFO |
wolfSSL | 13:f67a6c6013ca | 108 | */ |
wolfSSL | 13:f67a6c6013ca | 109 | XMEMSET(sha->buffer, 0, SHA_REG_SIZE); |
wolfSSL | 13:f67a6c6013ca | 110 | sha->buffLen = 0; |
wolfSSL | 13:f67a6c6013ca | 111 | sha->loLen = 0; |
wolfSSL | 13:f67a6c6013ca | 112 | |
wolfSSL | 13:f67a6c6013ca | 113 | /* initialize HASH peripheral */ |
wolfSSL | 13:f67a6c6013ca | 114 | HASH_DeInit(); |
wolfSSL | 13:f67a6c6013ca | 115 | |
wolfSSL | 13:f67a6c6013ca | 116 | /* configure algo used, algo mode, datatype */ |
wolfSSL | 13:f67a6c6013ca | 117 | HASH->CR &= ~ (HASH_CR_ALGO | HASH_CR_DATATYPE | HASH_CR_MODE); |
wolfSSL | 13:f67a6c6013ca | 118 | HASH->CR |= (HASH_AlgoSelection_SHA1 | HASH_AlgoMode_HASH |
wolfSSL | 13:f67a6c6013ca | 119 | | HASH_DataType_8b); |
wolfSSL | 13:f67a6c6013ca | 120 | |
wolfSSL | 13:f67a6c6013ca | 121 | /* reset HASH processor */ |
wolfSSL | 13:f67a6c6013ca | 122 | HASH->CR |= HASH_CR_INIT; |
wolfSSL | 13:f67a6c6013ca | 123 | |
wolfSSL | 13:f67a6c6013ca | 124 | return 0; |
wolfSSL | 13:f67a6c6013ca | 125 | } |
wolfSSL | 13:f67a6c6013ca | 126 | |
wolfSSL | 13:f67a6c6013ca | 127 | int wc_ShaUpdate(Sha* sha, const byte* data, word32 len) |
wolfSSL | 13:f67a6c6013ca | 128 | { |
wolfSSL | 13:f67a6c6013ca | 129 | word32 i = 0; |
wolfSSL | 13:f67a6c6013ca | 130 | word32 fill = 0; |
wolfSSL | 13:f67a6c6013ca | 131 | word32 diff = 0; |
wolfSSL | 13:f67a6c6013ca | 132 | |
wolfSSL | 13:f67a6c6013ca | 133 | /* if saved partial block is available */ |
wolfSSL | 13:f67a6c6013ca | 134 | if (sha->buffLen) { |
wolfSSL | 13:f67a6c6013ca | 135 | fill = 4 - sha->buffLen; |
wolfSSL | 13:f67a6c6013ca | 136 | |
wolfSSL | 13:f67a6c6013ca | 137 | /* if enough data to fill, fill and push to FIFO */ |
wolfSSL | 13:f67a6c6013ca | 138 | if (fill <= len) { |
wolfSSL | 13:f67a6c6013ca | 139 | XMEMCPY((byte*)sha->buffer + sha->buffLen, data, fill); |
wolfSSL | 13:f67a6c6013ca | 140 | HASH_DataIn(*(uint32_t*)sha->buffer); |
wolfSSL | 13:f67a6c6013ca | 141 | |
wolfSSL | 13:f67a6c6013ca | 142 | data += fill; |
wolfSSL | 13:f67a6c6013ca | 143 | len -= fill; |
wolfSSL | 13:f67a6c6013ca | 144 | sha->loLen += 4; |
wolfSSL | 13:f67a6c6013ca | 145 | sha->buffLen = 0; |
wolfSSL | 13:f67a6c6013ca | 146 | } else { |
wolfSSL | 13:f67a6c6013ca | 147 | /* append partial to existing stored block */ |
wolfSSL | 13:f67a6c6013ca | 148 | XMEMCPY((byte*)sha->buffer + sha->buffLen, data, len); |
wolfSSL | 13:f67a6c6013ca | 149 | sha->buffLen += len; |
wolfSSL | 13:f67a6c6013ca | 150 | return 0; |
wolfSSL | 13:f67a6c6013ca | 151 | } |
wolfSSL | 13:f67a6c6013ca | 152 | } |
wolfSSL | 13:f67a6c6013ca | 153 | |
wolfSSL | 13:f67a6c6013ca | 154 | /* write input block in the IN FIFO */ |
wolfSSL | 13:f67a6c6013ca | 155 | for(i = 0; i < len; i += 4) |
wolfSSL | 13:f67a6c6013ca | 156 | { |
wolfSSL | 13:f67a6c6013ca | 157 | diff = len - i; |
wolfSSL | 13:f67a6c6013ca | 158 | if ( diff < 4) { |
wolfSSL | 13:f67a6c6013ca | 159 | /* store incomplete last block, not yet in FIFO */ |
wolfSSL | 13:f67a6c6013ca | 160 | XMEMSET(sha->buffer, 0, SHA_REG_SIZE); |
wolfSSL | 13:f67a6c6013ca | 161 | XMEMCPY((byte*)sha->buffer, data, diff); |
wolfSSL | 13:f67a6c6013ca | 162 | sha->buffLen = diff; |
wolfSSL | 13:f67a6c6013ca | 163 | } else { |
wolfSSL | 13:f67a6c6013ca | 164 | HASH_DataIn(*(uint32_t*)data); |
wolfSSL | 13:f67a6c6013ca | 165 | data+=4; |
wolfSSL | 13:f67a6c6013ca | 166 | } |
wolfSSL | 13:f67a6c6013ca | 167 | } |
wolfSSL | 13:f67a6c6013ca | 168 | |
wolfSSL | 13:f67a6c6013ca | 169 | /* keep track of total data length thus far */ |
wolfSSL | 13:f67a6c6013ca | 170 | sha->loLen += (len - sha->buffLen); |
wolfSSL | 13:f67a6c6013ca | 171 | |
wolfSSL | 13:f67a6c6013ca | 172 | return 0; |
wolfSSL | 13:f67a6c6013ca | 173 | } |
wolfSSL | 13:f67a6c6013ca | 174 | |
wolfSSL | 13:f67a6c6013ca | 175 | int wc_ShaFinal(Sha* sha, byte* hash) |
wolfSSL | 13:f67a6c6013ca | 176 | { |
wolfSSL | 13:f67a6c6013ca | 177 | __IO uint16_t nbvalidbitsdata = 0; |
wolfSSL | 13:f67a6c6013ca | 178 | |
wolfSSL | 13:f67a6c6013ca | 179 | /* finish reading any trailing bytes into FIFO */ |
wolfSSL | 13:f67a6c6013ca | 180 | if (sha->buffLen) { |
wolfSSL | 13:f67a6c6013ca | 181 | HASH_DataIn(*(uint32_t*)sha->buffer); |
wolfSSL | 13:f67a6c6013ca | 182 | sha->loLen += sha->buffLen; |
wolfSSL | 13:f67a6c6013ca | 183 | } |
wolfSSL | 13:f67a6c6013ca | 184 | |
wolfSSL | 13:f67a6c6013ca | 185 | /* calculate number of valid bits in last word of input data */ |
wolfSSL | 13:f67a6c6013ca | 186 | nbvalidbitsdata = 8 * (sha->loLen % SHA_REG_SIZE); |
wolfSSL | 13:f67a6c6013ca | 187 | |
wolfSSL | 13:f67a6c6013ca | 188 | /* configure number of valid bits in last word of the data */ |
wolfSSL | 13:f67a6c6013ca | 189 | HASH_SetLastWordValidBitsNbr(nbvalidbitsdata); |
wolfSSL | 13:f67a6c6013ca | 190 | |
wolfSSL | 13:f67a6c6013ca | 191 | /* start HASH processor */ |
wolfSSL | 13:f67a6c6013ca | 192 | HASH_StartDigest(); |
wolfSSL | 13:f67a6c6013ca | 193 | |
wolfSSL | 13:f67a6c6013ca | 194 | /* wait until Busy flag == RESET */ |
wolfSSL | 13:f67a6c6013ca | 195 | while (HASH_GetFlagStatus(HASH_FLAG_BUSY) != RESET) {} |
wolfSSL | 13:f67a6c6013ca | 196 | |
wolfSSL | 13:f67a6c6013ca | 197 | /* read message digest */ |
wolfSSL | 13:f67a6c6013ca | 198 | sha->digest[0] = HASH->HR[0]; |
wolfSSL | 13:f67a6c6013ca | 199 | sha->digest[1] = HASH->HR[1]; |
wolfSSL | 13:f67a6c6013ca | 200 | sha->digest[2] = HASH->HR[2]; |
wolfSSL | 13:f67a6c6013ca | 201 | sha->digest[3] = HASH->HR[3]; |
wolfSSL | 13:f67a6c6013ca | 202 | sha->digest[4] = HASH->HR[4]; |
wolfSSL | 13:f67a6c6013ca | 203 | |
wolfSSL | 13:f67a6c6013ca | 204 | ByteReverseWords(sha->digest, sha->digest, SHA_DIGEST_SIZE); |
wolfSSL | 13:f67a6c6013ca | 205 | |
wolfSSL | 13:f67a6c6013ca | 206 | XMEMCPY(hash, sha->digest, SHA_DIGEST_SIZE); |
wolfSSL | 13:f67a6c6013ca | 207 | |
wolfSSL | 13:f67a6c6013ca | 208 | return wc_InitSha(sha); /* reset state */ |
wolfSSL | 13:f67a6c6013ca | 209 | } |
wolfSSL | 13:f67a6c6013ca | 210 | |
wolfSSL | 13:f67a6c6013ca | 211 | |
wolfSSL | 13:f67a6c6013ca | 212 | #elif defined(FREESCALE_LTC_SHA) |
wolfSSL | 13:f67a6c6013ca | 213 | |
wolfSSL | 13:f67a6c6013ca | 214 | #include "fsl_ltc.h" |
wolfSSL | 13:f67a6c6013ca | 215 | static int InitSha(Sha* sha) |
wolfSSL | 13:f67a6c6013ca | 216 | { |
wolfSSL | 13:f67a6c6013ca | 217 | LTC_HASH_Init(LTC_BASE, &sha->ctx, kLTC_Sha1, NULL, 0); |
wolfSSL | 13:f67a6c6013ca | 218 | return 0; |
wolfSSL | 13:f67a6c6013ca | 219 | } |
wolfSSL | 13:f67a6c6013ca | 220 | |
wolfSSL | 13:f67a6c6013ca | 221 | int wc_ShaUpdate(Sha* sha, const byte* data, word32 len) |
wolfSSL | 13:f67a6c6013ca | 222 | { |
wolfSSL | 13:f67a6c6013ca | 223 | LTC_HASH_Update(&sha->ctx, data, len); |
wolfSSL | 13:f67a6c6013ca | 224 | return 0; |
wolfSSL | 13:f67a6c6013ca | 225 | } |
wolfSSL | 13:f67a6c6013ca | 226 | |
wolfSSL | 13:f67a6c6013ca | 227 | int wc_ShaFinal(Sha* sha, byte* hash) |
wolfSSL | 13:f67a6c6013ca | 228 | { |
wolfSSL | 13:f67a6c6013ca | 229 | uint32_t hashlen = SHA_DIGEST_SIZE; |
wolfSSL | 13:f67a6c6013ca | 230 | LTC_HASH_Finish(&sha->ctx, hash, &hashlen); |
wolfSSL | 13:f67a6c6013ca | 231 | return wc_InitSha(sha); /* reset state */ |
wolfSSL | 13:f67a6c6013ca | 232 | } |
wolfSSL | 13:f67a6c6013ca | 233 | |
wolfSSL | 13:f67a6c6013ca | 234 | |
wolfSSL | 13:f67a6c6013ca | 235 | #elif defined(FREESCALE_MMCAU_SHA) |
wolfSSL | 13:f67a6c6013ca | 236 | |
wolfSSL | 13:f67a6c6013ca | 237 | #ifdef FREESCALE_MMCAU_CLASSIC_SHA |
wolfSSL | 13:f67a6c6013ca | 238 | #include "cau_api.h" |
wolfSSL | 13:f67a6c6013ca | 239 | #else |
wolfSSL | 13:f67a6c6013ca | 240 | #include "fsl_mmcau.h" |
wolfSSL | 13:f67a6c6013ca | 241 | #endif |
wolfSSL | 13:f67a6c6013ca | 242 | |
wolfSSL | 13:f67a6c6013ca | 243 | #define USE_SHA_SOFTWARE_IMPL /* Only for API's, actual transform is here */ |
wolfSSL | 13:f67a6c6013ca | 244 | #define XTRANSFORM(S,B) Transform((S),(B)) |
wolfSSL | 13:f67a6c6013ca | 245 | |
wolfSSL | 13:f67a6c6013ca | 246 | static int InitSha(Sha* sha) |
wolfSSL | 13:f67a6c6013ca | 247 | { |
wolfSSL | 13:f67a6c6013ca | 248 | int ret = 0; |
wolfSSL | 13:f67a6c6013ca | 249 | ret = wolfSSL_CryptHwMutexLock(); |
wolfSSL | 13:f67a6c6013ca | 250 | if (ret != 0) { |
wolfSSL | 13:f67a6c6013ca | 251 | return ret; |
wolfSSL | 13:f67a6c6013ca | 252 | } |
wolfSSL | 13:f67a6c6013ca | 253 | #ifdef FREESCALE_MMCAU_CLASSIC_SHA |
wolfSSL | 13:f67a6c6013ca | 254 | cau_sha1_initialize_output(sha->digest); |
wolfSSL | 13:f67a6c6013ca | 255 | #else |
wolfSSL | 13:f67a6c6013ca | 256 | MMCAU_SHA1_InitializeOutput((uint32_t*)sha->digest); |
wolfSSL | 13:f67a6c6013ca | 257 | #endif |
wolfSSL | 13:f67a6c6013ca | 258 | wolfSSL_CryptHwMutexUnLock(); |
wolfSSL | 13:f67a6c6013ca | 259 | |
wolfSSL | 13:f67a6c6013ca | 260 | sha->buffLen = 0; |
wolfSSL | 13:f67a6c6013ca | 261 | sha->loLen = 0; |
wolfSSL | 13:f67a6c6013ca | 262 | sha->hiLen = 0; |
wolfSSL | 13:f67a6c6013ca | 263 | |
wolfSSL | 13:f67a6c6013ca | 264 | return ret; |
wolfSSL | 13:f67a6c6013ca | 265 | } |
wolfSSL | 13:f67a6c6013ca | 266 | |
wolfSSL | 13:f67a6c6013ca | 267 | static int Transform(Sha* sha, byte* data) |
wolfSSL | 13:f67a6c6013ca | 268 | { |
wolfSSL | 13:f67a6c6013ca | 269 | int ret = wolfSSL_CryptHwMutexLock(); |
wolfSSL | 13:f67a6c6013ca | 270 | if(ret == 0) { |
wolfSSL | 13:f67a6c6013ca | 271 | #ifdef FREESCALE_MMCAU_CLASSIC_SHA |
wolfSSL | 13:f67a6c6013ca | 272 | cau_sha1_hash_n(data, 1, sha->digest); |
wolfSSL | 13:f67a6c6013ca | 273 | #else |
wolfSSL | 13:f67a6c6013ca | 274 | MMCAU_SHA1_HashN(data, 1, (uint32_t*)sha->digest); |
wolfSSL | 13:f67a6c6013ca | 275 | #endif |
wolfSSL | 13:f67a6c6013ca | 276 | wolfSSL_CryptHwMutexUnLock(); |
wolfSSL | 13:f67a6c6013ca | 277 | } |
wolfSSL | 13:f67a6c6013ca | 278 | return ret; |
wolfSSL | 13:f67a6c6013ca | 279 | } |
wolfSSL | 13:f67a6c6013ca | 280 | |
wolfSSL | 13:f67a6c6013ca | 281 | #else |
wolfSSL | 13:f67a6c6013ca | 282 | |
wolfSSL | 13:f67a6c6013ca | 283 | /* Software implementation */ |
wolfSSL | 13:f67a6c6013ca | 284 | #define USE_SHA_SOFTWARE_IMPL |
wolfSSL | 13:f67a6c6013ca | 285 | |
wolfSSL | 13:f67a6c6013ca | 286 | static int InitSha(Sha* sha) |
wolfSSL | 13:f67a6c6013ca | 287 | { |
wolfSSL | 13:f67a6c6013ca | 288 | int ret = 0; |
wolfSSL | 13:f67a6c6013ca | 289 | |
wolfSSL | 13:f67a6c6013ca | 290 | sha->digest[0] = 0x67452301L; |
wolfSSL | 13:f67a6c6013ca | 291 | sha->digest[1] = 0xEFCDAB89L; |
wolfSSL | 13:f67a6c6013ca | 292 | sha->digest[2] = 0x98BADCFEL; |
wolfSSL | 13:f67a6c6013ca | 293 | sha->digest[3] = 0x10325476L; |
wolfSSL | 13:f67a6c6013ca | 294 | sha->digest[4] = 0xC3D2E1F0L; |
wolfSSL | 13:f67a6c6013ca | 295 | |
wolfSSL | 13:f67a6c6013ca | 296 | sha->buffLen = 0; |
wolfSSL | 13:f67a6c6013ca | 297 | sha->loLen = 0; |
wolfSSL | 13:f67a6c6013ca | 298 | sha->hiLen = 0; |
wolfSSL | 13:f67a6c6013ca | 299 | |
wolfSSL | 13:f67a6c6013ca | 300 | return ret; |
wolfSSL | 13:f67a6c6013ca | 301 | } |
wolfSSL | 13:f67a6c6013ca | 302 | |
wolfSSL | 13:f67a6c6013ca | 303 | #endif /* End Hardware Acceleration */ |
wolfSSL | 13:f67a6c6013ca | 304 | |
wolfSSL | 13:f67a6c6013ca | 305 | |
wolfSSL | 13:f67a6c6013ca | 306 | /* Software implementation */ |
wolfSSL | 13:f67a6c6013ca | 307 | #ifdef USE_SHA_SOFTWARE_IMPL |
wolfSSL | 13:f67a6c6013ca | 308 | |
wolfSSL | 13:f67a6c6013ca | 309 | /* Check if custom Sha transform is used */ |
wolfSSL | 13:f67a6c6013ca | 310 | #ifndef XTRANSFORM |
wolfSSL | 13:f67a6c6013ca | 311 | #define XTRANSFORM(S,B) Transform((S),(B)) |
wolfSSL | 13:f67a6c6013ca | 312 | |
wolfSSL | 13:f67a6c6013ca | 313 | #define blk0(i) (W[i] = sha->buffer[i]) |
wolfSSL | 13:f67a6c6013ca | 314 | #define blk1(i) (W[(i)&15] = \ |
wolfSSL | 13:f67a6c6013ca | 315 | rotlFixed(W[((i)+13)&15]^W[((i)+8)&15]^W[((i)+2)&15]^W[(i)&15],1)) |
wolfSSL | 13:f67a6c6013ca | 316 | |
wolfSSL | 13:f67a6c6013ca | 317 | #define f1(x,y,z) ((z)^((x) &((y)^(z)))) |
wolfSSL | 13:f67a6c6013ca | 318 | #define f2(x,y,z) ((x)^(y)^(z)) |
wolfSSL | 13:f67a6c6013ca | 319 | #define f3(x,y,z) (((x)&(y))|((z)&((x)|(y)))) |
wolfSSL | 13:f67a6c6013ca | 320 | #define f4(x,y,z) ((x)^(y)^(z)) |
wolfSSL | 13:f67a6c6013ca | 321 | |
wolfSSL | 13:f67a6c6013ca | 322 | /* (R0+R1), R2, R3, R4 are the different operations used in SHA1 */ |
wolfSSL | 13:f67a6c6013ca | 323 | #define R0(v,w,x,y,z,i) (z)+= f1((w),(x),(y)) + blk0((i)) + 0x5A827999+ \ |
wolfSSL | 13:f67a6c6013ca | 324 | rotlFixed((v),5); (w) = rotlFixed((w),30); |
wolfSSL | 13:f67a6c6013ca | 325 | #define R1(v,w,x,y,z,i) (z)+= f1((w),(x),(y)) + blk1((i)) + 0x5A827999+ \ |
wolfSSL | 13:f67a6c6013ca | 326 | rotlFixed((v),5); (w) = rotlFixed((w),30); |
wolfSSL | 13:f67a6c6013ca | 327 | #define R2(v,w,x,y,z,i) (z)+= f2((w),(x),(y)) + blk1((i)) + 0x6ED9EBA1+ \ |
wolfSSL | 13:f67a6c6013ca | 328 | rotlFixed((v),5); (w) = rotlFixed((w),30); |
wolfSSL | 13:f67a6c6013ca | 329 | #define R3(v,w,x,y,z,i) (z)+= f3((w),(x),(y)) + blk1((i)) + 0x8F1BBCDC+ \ |
wolfSSL | 13:f67a6c6013ca | 330 | rotlFixed((v),5); (w) = rotlFixed((w),30); |
wolfSSL | 13:f67a6c6013ca | 331 | #define R4(v,w,x,y,z,i) (z)+= f4((w),(x),(y)) + blk1((i)) + 0xCA62C1D6+ \ |
wolfSSL | 13:f67a6c6013ca | 332 | rotlFixed((v),5); (w) = rotlFixed((w),30); |
wolfSSL | 13:f67a6c6013ca | 333 | |
wolfSSL | 13:f67a6c6013ca | 334 | static void Transform(Sha* sha, byte* data) |
wolfSSL | 13:f67a6c6013ca | 335 | { |
wolfSSL | 13:f67a6c6013ca | 336 | word32 W[SHA_BLOCK_SIZE / sizeof(word32)]; |
wolfSSL | 13:f67a6c6013ca | 337 | |
wolfSSL | 13:f67a6c6013ca | 338 | /* Copy context->state[] to working vars */ |
wolfSSL | 13:f67a6c6013ca | 339 | word32 a = sha->digest[0]; |
wolfSSL | 13:f67a6c6013ca | 340 | word32 b = sha->digest[1]; |
wolfSSL | 13:f67a6c6013ca | 341 | word32 c = sha->digest[2]; |
wolfSSL | 13:f67a6c6013ca | 342 | word32 d = sha->digest[3]; |
wolfSSL | 13:f67a6c6013ca | 343 | word32 e = sha->digest[4]; |
wolfSSL | 13:f67a6c6013ca | 344 | |
wolfSSL | 13:f67a6c6013ca | 345 | #ifdef USE_SLOW_SHA |
wolfSSL | 13:f67a6c6013ca | 346 | word32 t, i; |
wolfSSL | 13:f67a6c6013ca | 347 | |
wolfSSL | 13:f67a6c6013ca | 348 | for (i = 0; i < 16; i++) { |
wolfSSL | 13:f67a6c6013ca | 349 | R0(a, b, c, d, e, i); |
wolfSSL | 13:f67a6c6013ca | 350 | t = e; e = d; d = c; c = b; b = a; a = t; |
wolfSSL | 13:f67a6c6013ca | 351 | } |
wolfSSL | 13:f67a6c6013ca | 352 | |
wolfSSL | 13:f67a6c6013ca | 353 | for (; i < 20; i++) { |
wolfSSL | 13:f67a6c6013ca | 354 | R1(a, b, c, d, e, i); |
wolfSSL | 13:f67a6c6013ca | 355 | t = e; e = d; d = c; c = b; b = a; a = t; |
wolfSSL | 13:f67a6c6013ca | 356 | } |
wolfSSL | 13:f67a6c6013ca | 357 | |
wolfSSL | 13:f67a6c6013ca | 358 | for (; i < 40; i++) { |
wolfSSL | 13:f67a6c6013ca | 359 | R2(a, b, c, d, e, i); |
wolfSSL | 13:f67a6c6013ca | 360 | t = e; e = d; d = c; c = b; b = a; a = t; |
wolfSSL | 13:f67a6c6013ca | 361 | } |
wolfSSL | 13:f67a6c6013ca | 362 | |
wolfSSL | 13:f67a6c6013ca | 363 | for (; i < 60; i++) { |
wolfSSL | 13:f67a6c6013ca | 364 | R3(a, b, c, d, e, i); |
wolfSSL | 13:f67a6c6013ca | 365 | t = e; e = d; d = c; c = b; b = a; a = t; |
wolfSSL | 13:f67a6c6013ca | 366 | } |
wolfSSL | 13:f67a6c6013ca | 367 | |
wolfSSL | 13:f67a6c6013ca | 368 | for (; i < 80; i++) { |
wolfSSL | 13:f67a6c6013ca | 369 | R4(a, b, c, d, e, i); |
wolfSSL | 13:f67a6c6013ca | 370 | t = e; e = d; d = c; c = b; b = a; a = t; |
wolfSSL | 13:f67a6c6013ca | 371 | } |
wolfSSL | 13:f67a6c6013ca | 372 | #else |
wolfSSL | 13:f67a6c6013ca | 373 | /* nearly 1 K bigger in code size but 25% faster */ |
wolfSSL | 13:f67a6c6013ca | 374 | /* 4 rounds of 20 operations each. Loop unrolled. */ |
wolfSSL | 13:f67a6c6013ca | 375 | R0(a,b,c,d,e, 0); R0(e,a,b,c,d, 1); R0(d,e,a,b,c, 2); R0(c,d,e,a,b, 3); |
wolfSSL | 13:f67a6c6013ca | 376 | R0(b,c,d,e,a, 4); R0(a,b,c,d,e, 5); R0(e,a,b,c,d, 6); R0(d,e,a,b,c, 7); |
wolfSSL | 13:f67a6c6013ca | 377 | R0(c,d,e,a,b, 8); R0(b,c,d,e,a, 9); R0(a,b,c,d,e,10); R0(e,a,b,c,d,11); |
wolfSSL | 13:f67a6c6013ca | 378 | R0(d,e,a,b,c,12); R0(c,d,e,a,b,13); R0(b,c,d,e,a,14); R0(a,b,c,d,e,15); |
wolfSSL | 13:f67a6c6013ca | 379 | |
wolfSSL | 13:f67a6c6013ca | 380 | R1(e,a,b,c,d,16); R1(d,e,a,b,c,17); R1(c,d,e,a,b,18); R1(b,c,d,e,a,19); |
wolfSSL | 13:f67a6c6013ca | 381 | |
wolfSSL | 13:f67a6c6013ca | 382 | R2(a,b,c,d,e,20); R2(e,a,b,c,d,21); R2(d,e,a,b,c,22); R2(c,d,e,a,b,23); |
wolfSSL | 13:f67a6c6013ca | 383 | R2(b,c,d,e,a,24); R2(a,b,c,d,e,25); R2(e,a,b,c,d,26); R2(d,e,a,b,c,27); |
wolfSSL | 13:f67a6c6013ca | 384 | R2(c,d,e,a,b,28); R2(b,c,d,e,a,29); R2(a,b,c,d,e,30); R2(e,a,b,c,d,31); |
wolfSSL | 13:f67a6c6013ca | 385 | R2(d,e,a,b,c,32); R2(c,d,e,a,b,33); R2(b,c,d,e,a,34); R2(a,b,c,d,e,35); |
wolfSSL | 13:f67a6c6013ca | 386 | R2(e,a,b,c,d,36); R2(d,e,a,b,c,37); R2(c,d,e,a,b,38); R2(b,c,d,e,a,39); |
wolfSSL | 13:f67a6c6013ca | 387 | |
wolfSSL | 13:f67a6c6013ca | 388 | R3(a,b,c,d,e,40); R3(e,a,b,c,d,41); R3(d,e,a,b,c,42); R3(c,d,e,a,b,43); |
wolfSSL | 13:f67a6c6013ca | 389 | R3(b,c,d,e,a,44); R3(a,b,c,d,e,45); R3(e,a,b,c,d,46); R3(d,e,a,b,c,47); |
wolfSSL | 13:f67a6c6013ca | 390 | R3(c,d,e,a,b,48); R3(b,c,d,e,a,49); R3(a,b,c,d,e,50); R3(e,a,b,c,d,51); |
wolfSSL | 13:f67a6c6013ca | 391 | R3(d,e,a,b,c,52); R3(c,d,e,a,b,53); R3(b,c,d,e,a,54); R3(a,b,c,d,e,55); |
wolfSSL | 13:f67a6c6013ca | 392 | R3(e,a,b,c,d,56); R3(d,e,a,b,c,57); R3(c,d,e,a,b,58); R3(b,c,d,e,a,59); |
wolfSSL | 13:f67a6c6013ca | 393 | |
wolfSSL | 13:f67a6c6013ca | 394 | R4(a,b,c,d,e,60); R4(e,a,b,c,d,61); R4(d,e,a,b,c,62); R4(c,d,e,a,b,63); |
wolfSSL | 13:f67a6c6013ca | 395 | R4(b,c,d,e,a,64); R4(a,b,c,d,e,65); R4(e,a,b,c,d,66); R4(d,e,a,b,c,67); |
wolfSSL | 13:f67a6c6013ca | 396 | R4(c,d,e,a,b,68); R4(b,c,d,e,a,69); R4(a,b,c,d,e,70); R4(e,a,b,c,d,71); |
wolfSSL | 13:f67a6c6013ca | 397 | R4(d,e,a,b,c,72); R4(c,d,e,a,b,73); R4(b,c,d,e,a,74); R4(a,b,c,d,e,75); |
wolfSSL | 13:f67a6c6013ca | 398 | R4(e,a,b,c,d,76); R4(d,e,a,b,c,77); R4(c,d,e,a,b,78); R4(b,c,d,e,a,79); |
wolfSSL | 13:f67a6c6013ca | 399 | #endif |
wolfSSL | 13:f67a6c6013ca | 400 | |
wolfSSL | 13:f67a6c6013ca | 401 | /* Add the working vars back into digest state[] */ |
wolfSSL | 13:f67a6c6013ca | 402 | sha->digest[0] += a; |
wolfSSL | 13:f67a6c6013ca | 403 | sha->digest[1] += b; |
wolfSSL | 13:f67a6c6013ca | 404 | sha->digest[2] += c; |
wolfSSL | 13:f67a6c6013ca | 405 | sha->digest[3] += d; |
wolfSSL | 13:f67a6c6013ca | 406 | sha->digest[4] += e; |
wolfSSL | 13:f67a6c6013ca | 407 | |
wolfSSL | 13:f67a6c6013ca | 408 | (void)data; /* Not used */ |
wolfSSL | 13:f67a6c6013ca | 409 | } |
wolfSSL | 13:f67a6c6013ca | 410 | #endif /* !USE_CUSTOM_SHA_TRANSFORM */ |
wolfSSL | 13:f67a6c6013ca | 411 | |
wolfSSL | 13:f67a6c6013ca | 412 | |
wolfSSL | 13:f67a6c6013ca | 413 | static INLINE void AddLength(Sha* sha, word32 len) |
wolfSSL | 13:f67a6c6013ca | 414 | { |
wolfSSL | 13:f67a6c6013ca | 415 | word32 tmp = sha->loLen; |
wolfSSL | 13:f67a6c6013ca | 416 | if ( (sha->loLen += len) < tmp) |
wolfSSL | 13:f67a6c6013ca | 417 | sha->hiLen++; /* carry low to high */ |
wolfSSL | 13:f67a6c6013ca | 418 | } |
wolfSSL | 13:f67a6c6013ca | 419 | |
wolfSSL | 13:f67a6c6013ca | 420 | int wc_InitSha_ex(Sha* sha, void* heap, int devId) |
wolfSSL | 13:f67a6c6013ca | 421 | { |
wolfSSL | 13:f67a6c6013ca | 422 | int ret = 0; |
wolfSSL | 13:f67a6c6013ca | 423 | |
wolfSSL | 13:f67a6c6013ca | 424 | if (sha == NULL) |
wolfSSL | 13:f67a6c6013ca | 425 | return BAD_FUNC_ARG; |
wolfSSL | 13:f67a6c6013ca | 426 | |
wolfSSL | 13:f67a6c6013ca | 427 | sha->heap = heap; |
wolfSSL | 13:f67a6c6013ca | 428 | |
wolfSSL | 13:f67a6c6013ca | 429 | ret = InitSha(sha); |
wolfSSL | 13:f67a6c6013ca | 430 | if (ret != 0) |
wolfSSL | 13:f67a6c6013ca | 431 | return ret; |
wolfSSL | 13:f67a6c6013ca | 432 | |
wolfSSL | 13:f67a6c6013ca | 433 | #if defined(WOLFSSL_ASYNC_CRYPT) && defined(WC_ASYNC_ENABLE_SHA) |
wolfSSL | 13:f67a6c6013ca | 434 | ret = wolfAsync_DevCtxInit(&sha->asyncDev, WOLFSSL_ASYNC_MARKER_SHA, |
wolfSSL | 13:f67a6c6013ca | 435 | sha->heap, devId); |
wolfSSL | 13:f67a6c6013ca | 436 | #else |
wolfSSL | 13:f67a6c6013ca | 437 | (void)devId; |
wolfSSL | 13:f67a6c6013ca | 438 | #endif /* WOLFSSL_ASYNC_CRYPT */ |
wolfSSL | 13:f67a6c6013ca | 439 | |
wolfSSL | 13:f67a6c6013ca | 440 | return ret; |
wolfSSL | 13:f67a6c6013ca | 441 | } |
wolfSSL | 13:f67a6c6013ca | 442 | |
wolfSSL | 13:f67a6c6013ca | 443 | int wc_ShaUpdate(Sha* sha, const byte* data, word32 len) |
wolfSSL | 13:f67a6c6013ca | 444 | { |
wolfSSL | 13:f67a6c6013ca | 445 | byte* local; |
wolfSSL | 13:f67a6c6013ca | 446 | |
wolfSSL | 13:f67a6c6013ca | 447 | if (sha == NULL ||(data == NULL && len > 0)) { |
wolfSSL | 13:f67a6c6013ca | 448 | return BAD_FUNC_ARG; |
wolfSSL | 13:f67a6c6013ca | 449 | } |
wolfSSL | 13:f67a6c6013ca | 450 | |
wolfSSL | 13:f67a6c6013ca | 451 | /* do block size increments */ |
wolfSSL | 13:f67a6c6013ca | 452 | local = (byte*)sha->buffer; |
wolfSSL | 13:f67a6c6013ca | 453 | |
wolfSSL | 13:f67a6c6013ca | 454 | #if defined(WOLFSSL_ASYNC_CRYPT) && defined(WC_ASYNC_ENABLE_SHA) |
wolfSSL | 13:f67a6c6013ca | 455 | if (sha->asyncDev.marker == WOLFSSL_ASYNC_MARKER_SHA) { |
wolfSSL | 13:f67a6c6013ca | 456 | #if defined(HAVE_INTEL_QA) |
wolfSSL | 13:f67a6c6013ca | 457 | return IntelQaSymSha(&sha->asyncDev, NULL, data, len); |
wolfSSL | 13:f67a6c6013ca | 458 | #endif |
wolfSSL | 13:f67a6c6013ca | 459 | } |
wolfSSL | 13:f67a6c6013ca | 460 | #endif /* WOLFSSL_ASYNC_CRYPT */ |
wolfSSL | 13:f67a6c6013ca | 461 | |
wolfSSL | 13:f67a6c6013ca | 462 | /* check that internal buffLen is valid */ |
wolfSSL | 13:f67a6c6013ca | 463 | if (sha->buffLen >= SHA_BLOCK_SIZE) |
wolfSSL | 13:f67a6c6013ca | 464 | return BUFFER_E; |
wolfSSL | 13:f67a6c6013ca | 465 | |
wolfSSL | 13:f67a6c6013ca | 466 | while (len) { |
wolfSSL | 13:f67a6c6013ca | 467 | word32 add = min(len, SHA_BLOCK_SIZE - sha->buffLen); |
wolfSSL | 13:f67a6c6013ca | 468 | XMEMCPY(&local[sha->buffLen], data, add); |
wolfSSL | 13:f67a6c6013ca | 469 | |
wolfSSL | 13:f67a6c6013ca | 470 | sha->buffLen += add; |
wolfSSL | 13:f67a6c6013ca | 471 | data += add; |
wolfSSL | 13:f67a6c6013ca | 472 | len -= add; |
wolfSSL | 13:f67a6c6013ca | 473 | |
wolfSSL | 13:f67a6c6013ca | 474 | if (sha->buffLen == SHA_BLOCK_SIZE) { |
wolfSSL | 13:f67a6c6013ca | 475 | #if defined(LITTLE_ENDIAN_ORDER) && !defined(FREESCALE_MMCAU_SHA) |
wolfSSL | 13:f67a6c6013ca | 476 | ByteReverseWords(sha->buffer, sha->buffer, SHA_BLOCK_SIZE); |
wolfSSL | 13:f67a6c6013ca | 477 | #endif |
wolfSSL | 13:f67a6c6013ca | 478 | XTRANSFORM(sha, local); |
wolfSSL | 13:f67a6c6013ca | 479 | AddLength(sha, SHA_BLOCK_SIZE); |
wolfSSL | 13:f67a6c6013ca | 480 | sha->buffLen = 0; |
wolfSSL | 13:f67a6c6013ca | 481 | } |
wolfSSL | 13:f67a6c6013ca | 482 | } |
wolfSSL | 13:f67a6c6013ca | 483 | |
wolfSSL | 13:f67a6c6013ca | 484 | return 0; |
wolfSSL | 13:f67a6c6013ca | 485 | } |
wolfSSL | 13:f67a6c6013ca | 486 | |
wolfSSL | 13:f67a6c6013ca | 487 | int wc_ShaFinal(Sha* sha, byte* hash) |
wolfSSL | 13:f67a6c6013ca | 488 | { |
wolfSSL | 13:f67a6c6013ca | 489 | byte* local; |
wolfSSL | 13:f67a6c6013ca | 490 | |
wolfSSL | 13:f67a6c6013ca | 491 | if (sha == NULL || hash == NULL) { |
wolfSSL | 13:f67a6c6013ca | 492 | return BAD_FUNC_ARG; |
wolfSSL | 13:f67a6c6013ca | 493 | } |
wolfSSL | 13:f67a6c6013ca | 494 | |
wolfSSL | 13:f67a6c6013ca | 495 | local = (byte*)sha->buffer; |
wolfSSL | 13:f67a6c6013ca | 496 | |
wolfSSL | 13:f67a6c6013ca | 497 | #if defined(WOLFSSL_ASYNC_CRYPT) && defined(WC_ASYNC_ENABLE_SHA) |
wolfSSL | 13:f67a6c6013ca | 498 | if (sha->asyncDev.marker == WOLFSSL_ASYNC_MARKER_SHA) { |
wolfSSL | 13:f67a6c6013ca | 499 | #if defined(HAVE_INTEL_QA) |
wolfSSL | 13:f67a6c6013ca | 500 | return IntelQaSymSha(&sha->asyncDev, hash, NULL, SHA_DIGEST_SIZE); |
wolfSSL | 13:f67a6c6013ca | 501 | #endif |
wolfSSL | 13:f67a6c6013ca | 502 | } |
wolfSSL | 13:f67a6c6013ca | 503 | #endif /* WOLFSSL_ASYNC_CRYPT */ |
wolfSSL | 13:f67a6c6013ca | 504 | |
wolfSSL | 13:f67a6c6013ca | 505 | AddLength(sha, sha->buffLen); /* before adding pads */ |
wolfSSL | 13:f67a6c6013ca | 506 | |
wolfSSL | 13:f67a6c6013ca | 507 | local[sha->buffLen++] = 0x80; /* add 1 */ |
wolfSSL | 13:f67a6c6013ca | 508 | |
wolfSSL | 13:f67a6c6013ca | 509 | /* pad with zeros */ |
wolfSSL | 13:f67a6c6013ca | 510 | if (sha->buffLen > SHA_PAD_SIZE) { |
wolfSSL | 13:f67a6c6013ca | 511 | XMEMSET(&local[sha->buffLen], 0, SHA_BLOCK_SIZE - sha->buffLen); |
wolfSSL | 13:f67a6c6013ca | 512 | sha->buffLen += SHA_BLOCK_SIZE - sha->buffLen; |
wolfSSL | 13:f67a6c6013ca | 513 | |
wolfSSL | 13:f67a6c6013ca | 514 | #if defined(LITTLE_ENDIAN_ORDER) && !defined(FREESCALE_MMCAU_SHA) |
wolfSSL | 13:f67a6c6013ca | 515 | ByteReverseWords(sha->buffer, sha->buffer, SHA_BLOCK_SIZE); |
wolfSSL | 13:f67a6c6013ca | 516 | #endif |
wolfSSL | 13:f67a6c6013ca | 517 | XTRANSFORM(sha, local); |
wolfSSL | 13:f67a6c6013ca | 518 | sha->buffLen = 0; |
wolfSSL | 13:f67a6c6013ca | 519 | } |
wolfSSL | 13:f67a6c6013ca | 520 | XMEMSET(&local[sha->buffLen], 0, SHA_PAD_SIZE - sha->buffLen); |
wolfSSL | 13:f67a6c6013ca | 521 | |
wolfSSL | 13:f67a6c6013ca | 522 | #if defined(LITTLE_ENDIAN_ORDER) && !defined(FREESCALE_MMCAU_SHA) |
wolfSSL | 13:f67a6c6013ca | 523 | ByteReverseWords(sha->buffer, sha->buffer, SHA_BLOCK_SIZE); |
wolfSSL | 13:f67a6c6013ca | 524 | #endif |
wolfSSL | 13:f67a6c6013ca | 525 | |
wolfSSL | 13:f67a6c6013ca | 526 | /* store lengths */ |
wolfSSL | 13:f67a6c6013ca | 527 | /* put lengths in bits */ |
wolfSSL | 13:f67a6c6013ca | 528 | sha->hiLen = (sha->loLen >> (8*sizeof(sha->loLen) - 3)) + (sha->hiLen << 3); |
wolfSSL | 13:f67a6c6013ca | 529 | sha->loLen = sha->loLen << 3; |
wolfSSL | 13:f67a6c6013ca | 530 | |
wolfSSL | 13:f67a6c6013ca | 531 | /* ! length ordering dependent on digest endian type ! */ |
wolfSSL | 13:f67a6c6013ca | 532 | XMEMCPY(&local[SHA_PAD_SIZE], &sha->hiLen, sizeof(word32)); |
wolfSSL | 13:f67a6c6013ca | 533 | XMEMCPY(&local[SHA_PAD_SIZE + sizeof(word32)], &sha->loLen, sizeof(word32)); |
wolfSSL | 13:f67a6c6013ca | 534 | |
wolfSSL | 13:f67a6c6013ca | 535 | #if defined(FREESCALE_MMCAU_SHA) |
wolfSSL | 13:f67a6c6013ca | 536 | /* Kinetis requires only these bytes reversed */ |
wolfSSL | 13:f67a6c6013ca | 537 | ByteReverseWords(&sha->buffer[SHA_PAD_SIZE/sizeof(word32)], |
wolfSSL | 13:f67a6c6013ca | 538 | &sha->buffer[SHA_PAD_SIZE/sizeof(word32)], |
wolfSSL | 13:f67a6c6013ca | 539 | 2 * sizeof(word32)); |
wolfSSL | 13:f67a6c6013ca | 540 | #endif |
wolfSSL | 13:f67a6c6013ca | 541 | |
wolfSSL | 13:f67a6c6013ca | 542 | XTRANSFORM(sha, local); |
wolfSSL | 13:f67a6c6013ca | 543 | #ifdef LITTLE_ENDIAN_ORDER |
wolfSSL | 13:f67a6c6013ca | 544 | ByteReverseWords(sha->digest, sha->digest, SHA_DIGEST_SIZE); |
wolfSSL | 13:f67a6c6013ca | 545 | #endif |
wolfSSL | 13:f67a6c6013ca | 546 | XMEMCPY(hash, sha->digest, SHA_DIGEST_SIZE); |
wolfSSL | 13:f67a6c6013ca | 547 | |
wolfSSL | 13:f67a6c6013ca | 548 | return InitSha(sha); /* reset state */ |
wolfSSL | 13:f67a6c6013ca | 549 | } |
wolfSSL | 13:f67a6c6013ca | 550 | |
wolfSSL | 13:f67a6c6013ca | 551 | #endif /* USE_SHA_SOFTWARE_IMPL */ |
wolfSSL | 13:f67a6c6013ca | 552 | |
wolfSSL | 13:f67a6c6013ca | 553 | |
wolfSSL | 13:f67a6c6013ca | 554 | int wc_InitSha(Sha* sha) |
wolfSSL | 13:f67a6c6013ca | 555 | { |
wolfSSL | 13:f67a6c6013ca | 556 | return wc_InitSha_ex(sha, NULL, INVALID_DEVID); |
wolfSSL | 13:f67a6c6013ca | 557 | } |
wolfSSL | 13:f67a6c6013ca | 558 | |
wolfSSL | 13:f67a6c6013ca | 559 | void wc_ShaFree(Sha* sha) |
wolfSSL | 13:f67a6c6013ca | 560 | { |
wolfSSL | 13:f67a6c6013ca | 561 | if (sha == NULL) |
wolfSSL | 13:f67a6c6013ca | 562 | return; |
wolfSSL | 13:f67a6c6013ca | 563 | |
wolfSSL | 13:f67a6c6013ca | 564 | #if defined(WOLFSSL_ASYNC_CRYPT) && defined(WC_ASYNC_ENABLE_SHA) |
wolfSSL | 13:f67a6c6013ca | 565 | wolfAsync_DevCtxFree(&sha->asyncDev, WOLFSSL_ASYNC_MARKER_SHA); |
wolfSSL | 13:f67a6c6013ca | 566 | #endif /* WOLFSSL_ASYNC_CRYPT */ |
wolfSSL | 13:f67a6c6013ca | 567 | } |
wolfSSL | 13:f67a6c6013ca | 568 | |
wolfSSL | 13:f67a6c6013ca | 569 | #endif /* !WOLFSSL_TI_HASH */ |
wolfSSL | 13:f67a6c6013ca | 570 | #endif /* HAVE_FIPS */ |
wolfSSL | 13:f67a6c6013ca | 571 | |
wolfSSL | 13:f67a6c6013ca | 572 | #ifndef WOLFSSL_TI_HASH |
wolfSSL | 13:f67a6c6013ca | 573 | int wc_ShaGetHash(Sha* sha, byte* hash) |
wolfSSL | 13:f67a6c6013ca | 574 | { |
wolfSSL | 13:f67a6c6013ca | 575 | int ret; |
wolfSSL | 13:f67a6c6013ca | 576 | Sha tmpSha; |
wolfSSL | 13:f67a6c6013ca | 577 | |
wolfSSL | 13:f67a6c6013ca | 578 | if (sha == NULL || hash == NULL) |
wolfSSL | 13:f67a6c6013ca | 579 | return BAD_FUNC_ARG; |
wolfSSL | 13:f67a6c6013ca | 580 | |
wolfSSL | 13:f67a6c6013ca | 581 | ret = wc_ShaCopy(sha, &tmpSha); |
wolfSSL | 13:f67a6c6013ca | 582 | if (ret == 0) { |
wolfSSL | 13:f67a6c6013ca | 583 | ret = wc_ShaFinal(&tmpSha, hash); |
wolfSSL | 13:f67a6c6013ca | 584 | } |
wolfSSL | 13:f67a6c6013ca | 585 | return ret; |
wolfSSL | 13:f67a6c6013ca | 586 | } |
wolfSSL | 13:f67a6c6013ca | 587 | |
wolfSSL | 13:f67a6c6013ca | 588 | int wc_ShaCopy(Sha* src, Sha* dst) |
wolfSSL | 13:f67a6c6013ca | 589 | { |
wolfSSL | 13:f67a6c6013ca | 590 | int ret = 0; |
wolfSSL | 13:f67a6c6013ca | 591 | |
wolfSSL | 13:f67a6c6013ca | 592 | if (src == NULL || dst == NULL) |
wolfSSL | 13:f67a6c6013ca | 593 | return BAD_FUNC_ARG; |
wolfSSL | 13:f67a6c6013ca | 594 | |
wolfSSL | 13:f67a6c6013ca | 595 | XMEMCPY(dst, src, sizeof(Sha)); |
wolfSSL | 13:f67a6c6013ca | 596 | |
wolfSSL | 13:f67a6c6013ca | 597 | #ifdef WOLFSSL_ASYNC_CRYPT |
wolfSSL | 13:f67a6c6013ca | 598 | ret = wolfAsync_DevCopy(&src->asyncDev, &dst->asyncDev); |
wolfSSL | 13:f67a6c6013ca | 599 | #endif |
wolfSSL | 13:f67a6c6013ca | 600 | #ifdef WOLFSSL_PIC32MZ_HASH |
wolfSSL | 13:f67a6c6013ca | 601 | ret = wc_Pic32HashCopy(&src->cache, &dst->cache); |
wolfSSL | 13:f67a6c6013ca | 602 | #endif |
wolfSSL | 13:f67a6c6013ca | 603 | |
wolfSSL | 13:f67a6c6013ca | 604 | return ret; |
wolfSSL | 13:f67a6c6013ca | 605 | } |
wolfSSL | 13:f67a6c6013ca | 606 | #endif /* !WOLFSSL_TI_HASH */ |
wolfSSL | 13:f67a6c6013ca | 607 | |
wolfSSL | 13:f67a6c6013ca | 608 | #endif /* !NO_SHA */ |
wolfSSL | 13:f67a6c6013ca | 609 |