components/openssl/openssl-1.0.1/engines/t4/eng_t4_sha512.c
changeset 1158 227137d9fbce
parent 603 1b966e9a6b03
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/components/openssl/openssl-1.0.1/engines/t4/eng_t4_sha512.c	Fri Feb 15 07:58:18 2013 -0800
@@ -0,0 +1,325 @@
+/*
+ * This product includes cryptographic software developed by the OpenSSL
+ * Project for use in the OpenSSL Toolkit (http://www.openssl.org/). This
+ * product includes cryptographic software written by Eric Young
+ * ([email protected]).
+ */
+
+/*
+ * ====================================================================
+ * Copyright (c) 1998-2011 The OpenSSL Project.  All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ *
+ * 1. Redistributions of source code must retain the above copyright
+ *    notice, this list of conditions and the following disclaimer.
+ *
+ * 2. Redistributions in binary form must reproduce the above copyright
+ *    notice, this list of conditions and the following disclaimer in
+ *    the documentation and/or other materials provided with the
+ *    distribution.
+ *
+ * 3. All advertising materials mentioning features or use of this
+ *    software must display the following acknowledgment:
+ *    "This product includes software developed by the OpenSSL Project
+ *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
+ *
+ * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
+ *    endorse or promote products derived from this software without
+ *    prior written permission. For written permission, please contact
+ *    [email protected].
+ *
+ * 5. Products derived from this software may not be called "OpenSSL"
+ *    nor may "OpenSSL" appear in their names without prior written
+ *    permission of the OpenSSL Project.
+ *
+ * 6. Redistributions of any form whatsoever must retain the following
+ *    acknowledgment:
+ *    "This product includes software developed by the OpenSSL Project
+ *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
+ * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+ * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
+ * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+ * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
+ * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
+ * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
+ * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
+ * OF THE POSSIBILITY OF SUCH DAMAGE.
+ * ====================================================================
+ */
+
+/*
+ * Copyright (c) 2011, Oracle and/or its affiliates. All rights reserved.
+ */
+
+/*
+ * This engine supports SPARC microprocessors that provide AES and other
+ * cipher and hash instructions, such as the T4 microprocessor.
+ *
+ * This file implements the SHA-512 message digest operations.
+ */
+
+#include <openssl/opensslconf.h>
+
+#if !defined(OPENSSL_NO_HW) && !defined(OPENSSL_NO_HW_MD_T4)
+#if !defined(OPENSSL_NO_SHA) && !defined(OPENSSL_NO_SHA512)
+#include <sys/types.h>
+#include <stdlib.h>
+#include <string.h>
+#include <errno.h>
+#include <openssl/engine.h>
+/*
+ * Solaris sys/sha2.h and OpenSSL openssl/sha.h both define
+ * SHA512_CTX, SHA512_CTX, SHA512, SHA384, and SHA512.
+ * For SHA2, OpenSSL SHA512_CTX has extra num and md_len fields at
+ * the end and Solaris SHA2_CTX has an extra algotype field at the beginning.
+ */
+#include "eng_t4_sha2_asm.h"
+
+#if (defined(sun4v) || defined(__sparcv9) || defined(__sparcv8plus) || \
+	defined(__sparcv8)) && !defined(OPENSSL_NO_ASM)
+#define	COMPILE_HW_T4
+#endif
+
+#ifdef	COMPILE_HW_T4
+
+/* Formal declaration for functions in EVP_MD structure */
+static int t4_digest_init_sha384(EVP_MD_CTX *ctx);
+static int t4_digest_init_sha512(EVP_MD_CTX *ctx);
+static int t4_digest_update_sha512(EVP_MD_CTX *ctx, const void *data,
+    size_t len);
+static int t4_digest_final_sha512(EVP_MD_CTX *ctx, unsigned char *md);
+static int t4_digest_copy_sha512(EVP_MD_CTX *to, const EVP_MD_CTX *from);
+
+
+/*
+ * OpenSSL's libcrypto EVP stuff. This is how this engine gets wired to EVP.
+ * EVP_MD is defined in evp.h.  To maintain binary compatibility the
+ * definition cannot be modified.
+ * Stuff specific to the t4 engine is kept in t4_cipher_ctx_t, which is
+ * pointed to by the last field, app_data.
+ *
+ * Fields: type, pkey_type, md_size, flags,
+ *	init(), update(), final(),
+ *	copy(), cleanup(), sign(), verify(),
+ *	required_pkey_type, block_size, ctx_size, md5_ctrl()
+ */
+
+const EVP_MD t4_sha512 = {
+	NID_sha512, NID_sha512WithRSAEncryption, SHA512_DIGEST_LENGTH,
+	EVP_MD_FLAG_PKEY_METHOD_SIGNATURE | EVP_MD_FLAG_DIGALGID_ABSENT,
+	t4_digest_init_sha512, t4_digest_update_sha512, t4_digest_final_sha512,
+	t4_digest_copy_sha512, NULL,
+	EVP_PKEY_RSA_method, SHA512_CBLOCK,
+	sizeof (T4_SHA512_CTX), NULL
+	};
+/* SHA-384 uses the same context, cblock size, & update function as SHA-512: */
+const EVP_MD t4_sha384 = {
+	NID_sha384, NID_sha384WithRSAEncryption, SHA384_DIGEST_LENGTH,
+	EVP_MD_FLAG_PKEY_METHOD_SIGNATURE | EVP_MD_FLAG_DIGALGID_ABSENT,
+	t4_digest_init_sha384, t4_digest_update_sha512, t4_digest_final_sha512,
+	t4_digest_copy_sha512, NULL,
+	EVP_PKEY_RSA_method, SHA512_CBLOCK,
+	sizeof (T4_SHA512_CTX), NULL
+	};
+
+
+/*
+ * SHA512 functions (part of FIPS 180-2 Secure Hash Standard)
+ */
+
+static int
+t4_digest_init_sha512(EVP_MD_CTX *ctx)
+{
+	T4_SHA512_CTX	*c = (T4_SHA512_CTX *)ctx->md_data;
+
+	c->Nl = c->Nh = c->num = 0;
+	c->h[0] = 0x6a09e667f3bcc908ULL;
+	c->h[1] = 0xbb67ae8584caa73bULL;
+	c->h[2] = 0x3c6ef372fe94f82bULL;
+	c->h[3] = 0xa54ff53a5f1d36f1ULL;
+	c->h[4] = 0x510e527fade682d1ULL;
+	c->h[5] = 0x9b05688c2b3e6c1fULL;
+	c->h[6] = 0x1f83d9abfb41bd6bULL;
+	c->h[7] = 0x5be0cd19137e2179ULL;
+	c->md_len = SHA512_DIGEST_LENGTH;
+
+	return (1);
+}
+
+
+static int
+t4_digest_init_sha384(EVP_MD_CTX *ctx)
+{
+	T4_SHA512_CTX	*c = (T4_SHA512_CTX *)ctx->md_data;
+
+	c->Nl = c->Nh = c->num = 0;
+	c->h[0] = 0xcbbb9d5dc1059ed8ULL;
+	c->h[1] = 0x629a292a367cd507ULL;
+	c->h[2] = 0x9159015a3070dd17ULL;
+	c->h[3] = 0x152fecd8f70e5939ULL;
+	c->h[4] = 0x67332667ffc00b31ULL;
+	c->h[5] = 0x8eb44a8768581511ULL;
+	c->h[6] = 0xdb0c2e0d64f98fa7ULL;
+	c->h[7] = 0x47b5481dbefa4fa4ULL;
+	c->md_len = SHA384_DIGEST_LENGTH;
+
+	return (1);
+}
+
+
+/*
+ * Continue SHA512 or SHA384 digest operation, using the message block to
+ * update context.
+ * Modified from SHA512_Update() in OpenSSL crypto/sha/sha512.c.
+ */
+static int
+t4_digest_update_sha512(EVP_MD_CTX *ctx, const void *_data, size_t len)
+{
+	T4_SHA512_CTX	*c = (T4_SHA512_CTX *)ctx->md_data;
+	SHA_LONG64	l;
+	unsigned char	*p = c->u.p;
+	const unsigned char *data = (const unsigned char *)_data;
+
+	if (len == 0)
+		return (1);
+
+	l = (c->Nl + (((SHA_LONG64)len) << 3)) & 0xffffffffffffffffULL;
+	if (l < c->Nl)
+		c->Nh++;
+	if (sizeof (len) >= 8) {
+		c->Nh += (((SHA_LONG64)len) >> 61);
+	}
+	c->Nl = l;
+
+	if (c->num != 0) {
+		size_t n = sizeof (c->u) - c->num;
+
+		if (len < n) {
+			memcpy(p + c->num, data, len);
+			c->num += (unsigned int)len;
+			return (1);
+		} else	{
+			memcpy(p + c->num, data, n);
+			c->num = 0;
+			len -= n;
+			data += n;
+			t4_sha512_multiblock(c, p, 1);
+		}
+	}
+
+	if (len >= sizeof (c->u)) {
+		if ((size_t)data % sizeof (c->u.d[0]) != 0) {
+			/* Align unaligned data one block-at-a-time */
+			while (len >= sizeof (c->u)) {
+				memcpy(p, data, sizeof (c->u));
+				t4_sha512_multiblock(c, p, 1);
+				len  -= sizeof (c->u);
+				data += sizeof (c->u);
+			}
+		} else {
+			t4_sha512_multiblock(c, data, len / sizeof (c->u));
+			data += len;
+			len  %= sizeof (c->u);
+			data -= len;
+		}
+	}
+
+	if (len != 0) {
+		memcpy(p, data, len);
+		c->num = (int)len;
+	}
+
+	return (1);
+}
+
+
+/*
+ * End SHA-512 or SHA-384 digest operation, finalizing message digest and
+ * zeroing context.
+ * Modified from SHA512_Final() in OpenSSL crypto/sha/sha512.c.
+ */
+static int
+t4_digest_final_sha512(EVP_MD_CTX *ctx, unsigned char *md)
+{
+	T4_SHA512_CTX	*c = (T4_SHA512_CTX *)ctx->md_data;
+	unsigned char	*p = (unsigned char *)c->u.p;
+	size_t		n = c->num;
+
+	p[n] = 0x80;	/* There always is a room for one */
+	n++;
+	if (n > (sizeof (c->u) - 16)) {
+		memset(p + n, 0, sizeof (c->u) - n);
+		n = 0;
+		t4_sha512_multiblock(c, p, 1);
+	}
+
+	memset(p+n, 0, sizeof (c->u) - 16 - n);
+	c->u.d[SHA_LBLOCK - 2] = c->Nh;
+	c->u.d[SHA_LBLOCK - 1] = c->Nl;
+
+	t4_sha512_multiblock(c, p, 1);
+
+	if (md == 0)
+		return (0);
+
+	switch (c->md_len) {
+		/* Let compiler decide if it's appropriate to unroll... */
+		case SHA384_DIGEST_LENGTH:
+			for (n = 0; n < SHA384_DIGEST_LENGTH / 8; n++) {
+				SHA_LONG64 t = c->h[n];
+
+				*(md++)	= (unsigned char)(t >> 56);
+				*(md++)	= (unsigned char)(t >> 48);
+				*(md++)	= (unsigned char)(t >> 40);
+				*(md++)	= (unsigned char)(t >> 32);
+				*(md++)	= (unsigned char)(t >> 24);
+				*(md++)	= (unsigned char)(t >> 16);
+				*(md++)	= (unsigned char)(t >> 8);
+				*(md++)	= (unsigned char)(t);
+			}
+			break;
+		case SHA512_DIGEST_LENGTH:
+			for (n = 0; n < SHA512_DIGEST_LENGTH / 8; n++) {
+				SHA_LONG64 t = c->h[n];
+
+				*(md++)	= (unsigned char)(t >> 56);
+				*(md++)	= (unsigned char)(t >> 48);
+				*(md++)	= (unsigned char)(t >> 40);
+				*(md++)	= (unsigned char)(t >> 32);
+				*(md++)	= (unsigned char)(t >> 24);
+				*(md++)	= (unsigned char)(t >> 16);
+				*(md++)	= (unsigned char)(t >> 8);
+				*(md++)	= (unsigned char)(t);
+			}
+			break;
+		/* ... as well as make sure md_len is not abused. */
+		default:
+			return (0);
+	}
+
+	return (1);
+}
+
+
+/* Required for Engine API */
+static int
+t4_digest_copy_sha512(EVP_MD_CTX *to, const EVP_MD_CTX *from)
+{
+	if ((to->md_data != NULL) && (from->md_data != NULL)) {
+		(void) memcpy(to->md_data, from->md_data,
+		    sizeof (T4_SHA512_CTX));
+	}
+	return (1);
+}
+
+#endif	/* COMPILE_HW_T4 */
+#endif	/* !OPENSSL_NO_SHA && !OPENSSL_NO_SHA512 */
+#endif	/* !OPENSSL_NO_HW && !OPENSSL_NO_HW_MD_T4 */