components/openssl/openssl-1.0.0/engines/t4/eng_t4_sha512.c
branchs11-update
changeset 2593 b92e6df5eaf0
parent 2592 a7d8d41eeab2
child 2594 27f414f634e9
--- a/components/openssl/openssl-1.0.0/engines/t4/eng_t4_sha512.c	Fri May 03 15:46:38 2013 -0700
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,325 +0,0 @@
-/*
- * This product includes cryptographic software developed by the OpenSSL
- * Project for use in the OpenSSL Toolkit (http://www.openssl.org/). This
- * product includes cryptographic software written by Eric Young
- * ([email protected]).
- */
-
-/*
- * ====================================================================
- * Copyright (c) 1998-2011 The OpenSSL Project.  All rights reserved.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * 1. Redistributions of source code must retain the above copyright
- *    notice, this list of conditions and the following disclaimer.
- *
- * 2. Redistributions in binary form must reproduce the above copyright
- *    notice, this list of conditions and the following disclaimer in
- *    the documentation and/or other materials provided with the
- *    distribution.
- *
- * 3. All advertising materials mentioning features or use of this
- *    software must display the following acknowledgment:
- *    "This product includes software developed by the OpenSSL Project
- *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
- *
- * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
- *    endorse or promote products derived from this software without
- *    prior written permission. For written permission, please contact
- *    [email protected].
- *
- * 5. Products derived from this software may not be called "OpenSSL"
- *    nor may "OpenSSL" appear in their names without prior written
- *    permission of the OpenSSL Project.
- *
- * 6. Redistributions of any form whatsoever must retain the following
- *    acknowledgment:
- *    "This product includes software developed by the OpenSSL Project
- *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
- *
- * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
- * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
- * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
- * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
- * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
- * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
- * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
- * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
- * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
- * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
- * OF THE POSSIBILITY OF SUCH DAMAGE.
- * ====================================================================
- */
-
-/*
- * Copyright (c) 2011, Oracle and/or its affiliates. All rights reserved.
- */
-
-/*
- * This engine supports SPARC microprocessors that provide AES and other
- * cipher and hash instructions, such as the T4 microprocessor.
- *
- * This file implements the SHA-512 message digest operations.
- */
-
-#include <openssl/opensslconf.h>
-
-#if !defined(OPENSSL_NO_HW) && !defined(OPENSSL_NO_HW_MD_T4)
-#if !defined(OPENSSL_NO_SHA) && !defined(OPENSSL_NO_SHA512)
-#include <sys/types.h>
-#include <stdlib.h>
-#include <string.h>
-#include <errno.h>
-#include <openssl/engine.h>
-/*
- * Solaris sys/sha2.h and OpenSSL openssl/sha.h both define
- * SHA512_CTX, SHA512_CTX, SHA512, SHA384, and SHA512.
- * For SHA2, OpenSSL SHA512_CTX has extra num and md_len fields at
- * the end and Solaris SHA2_CTX has an extra algotype field at the beginning.
- */
-#include "eng_t4_sha2_asm.h"
-
-#if (defined(sun4v) || defined(__sparcv9) || defined(__sparcv8plus) || \
-	defined(__sparcv8)) && !defined(OPENSSL_NO_ASM)
-#define	COMPILE_HW_T4
-#endif
-
-#ifdef	COMPILE_HW_T4
-
-/* Formal declaration for functions in EVP_MD structure */
-static int t4_digest_init_sha384(EVP_MD_CTX *ctx);
-static int t4_digest_init_sha512(EVP_MD_CTX *ctx);
-static int t4_digest_update_sha512(EVP_MD_CTX *ctx, const void *data,
-    size_t len);
-static int t4_digest_final_sha512(EVP_MD_CTX *ctx, unsigned char *md);
-static int t4_digest_copy_sha512(EVP_MD_CTX *to, const EVP_MD_CTX *from);
-
-
-/*
- * OpenSSL's libcrypto EVP stuff. This is how this engine gets wired to EVP.
- * EVP_MD is defined in evp.h.  To maintain binary compatibility the
- * definition cannot be modified.
- * Stuff specific to the t4 engine is kept in t4_cipher_ctx_t, which is
- * pointed to by the last field, app_data.
- *
- * Fields: type, pkey_type, md_size, flags,
- *	init(), update(), final(),
- *	copy(), cleanup(), sign(), verify(),
- *	required_pkey_type, block_size, ctx_size, md5_ctrl()
- */
-
-const EVP_MD t4_sha512 = {
-	NID_sha512, NID_sha512WithRSAEncryption, SHA512_DIGEST_LENGTH,
-	EVP_MD_FLAG_PKEY_METHOD_SIGNATURE | EVP_MD_FLAG_DIGALGID_ABSENT,
-	t4_digest_init_sha512, t4_digest_update_sha512, t4_digest_final_sha512,
-	t4_digest_copy_sha512, NULL,
-	EVP_PKEY_RSA_method, SHA512_CBLOCK,
-	sizeof (T4_SHA512_CTX), NULL
-	};
-/* SHA-384 uses the same context, cblock size, & update function as SHA-512: */
-const EVP_MD t4_sha384 = {
-	NID_sha384, NID_sha384WithRSAEncryption, SHA384_DIGEST_LENGTH,
-	EVP_MD_FLAG_PKEY_METHOD_SIGNATURE | EVP_MD_FLAG_DIGALGID_ABSENT,
-	t4_digest_init_sha384, t4_digest_update_sha512, t4_digest_final_sha512,
-	t4_digest_copy_sha512, NULL,
-	EVP_PKEY_RSA_method, SHA512_CBLOCK,
-	sizeof (T4_SHA512_CTX), NULL
-	};
-
-
-/*
- * SHA512 functions (part of FIPS 180-2 Secure Hash Standard)
- */
-
-static int
-t4_digest_init_sha512(EVP_MD_CTX *ctx)
-{
-	T4_SHA512_CTX	*c = (T4_SHA512_CTX *)ctx->md_data;
-
-	c->Nl = c->Nh = c->num = 0;
-	c->h[0] = 0x6a09e667f3bcc908ULL;
-	c->h[1] = 0xbb67ae8584caa73bULL;
-	c->h[2] = 0x3c6ef372fe94f82bULL;
-	c->h[3] = 0xa54ff53a5f1d36f1ULL;
-	c->h[4] = 0x510e527fade682d1ULL;
-	c->h[5] = 0x9b05688c2b3e6c1fULL;
-	c->h[6] = 0x1f83d9abfb41bd6bULL;
-	c->h[7] = 0x5be0cd19137e2179ULL;
-	c->md_len = SHA512_DIGEST_LENGTH;
-
-	return (1);
-}
-
-
-static int
-t4_digest_init_sha384(EVP_MD_CTX *ctx)
-{
-	T4_SHA512_CTX	*c = (T4_SHA512_CTX *)ctx->md_data;
-
-	c->Nl = c->Nh = c->num = 0;
-	c->h[0] = 0xcbbb9d5dc1059ed8ULL;
-	c->h[1] = 0x629a292a367cd507ULL;
-	c->h[2] = 0x9159015a3070dd17ULL;
-	c->h[3] = 0x152fecd8f70e5939ULL;
-	c->h[4] = 0x67332667ffc00b31ULL;
-	c->h[5] = 0x8eb44a8768581511ULL;
-	c->h[6] = 0xdb0c2e0d64f98fa7ULL;
-	c->h[7] = 0x47b5481dbefa4fa4ULL;
-	c->md_len = SHA384_DIGEST_LENGTH;
-
-	return (1);
-}
-
-
-/*
- * Continue SHA512 or SHA384 digest operation, using the message block to
- * update context.
- * Modified from SHA512_Update() in OpenSSL crypto/sha/sha512.c.
- */
-static int
-t4_digest_update_sha512(EVP_MD_CTX *ctx, const void *_data, size_t len)
-{
-	T4_SHA512_CTX	*c = (T4_SHA512_CTX *)ctx->md_data;
-	SHA_LONG64	l;
-	unsigned char	*p = c->u.p;
-	const unsigned char *data = (const unsigned char *)_data;
-
-	if (len == 0)
-		return (1);
-
-	l = (c->Nl + (((SHA_LONG64)len) << 3)) & 0xffffffffffffffffULL;
-	if (l < c->Nl)
-		c->Nh++;
-	if (sizeof (len) >= 8) {
-		c->Nh += (((SHA_LONG64)len) >> 61);
-	}
-	c->Nl = l;
-
-	if (c->num != 0) {
-		size_t n = sizeof (c->u) - c->num;
-
-		if (len < n) {
-			memcpy(p + c->num, data, len);
-			c->num += (unsigned int)len;
-			return (1);
-		} else	{
-			memcpy(p + c->num, data, n);
-			c->num = 0;
-			len -= n;
-			data += n;
-			t4_sha512_multiblock(c, p, 1);
-		}
-	}
-
-	if (len >= sizeof (c->u)) {
-		if ((size_t)data % sizeof (c->u.d[0]) != 0) {
-			/* Align unaligned data one block-at-a-time */
-			while (len >= sizeof (c->u)) {
-				memcpy(p, data, sizeof (c->u));
-				t4_sha512_multiblock(c, p, 1);
-				len  -= sizeof (c->u);
-				data += sizeof (c->u);
-			}
-		} else {
-			t4_sha512_multiblock(c, data, len / sizeof (c->u));
-			data += len;
-			len  %= sizeof (c->u);
-			data -= len;
-		}
-	}
-
-	if (len != 0) {
-		memcpy(p, data, len);
-		c->num = (int)len;
-	}
-
-	return (1);
-}
-
-
-/*
- * End SHA-512 or SHA-384 digest operation, finalizing message digest and
- * zeroing context.
- * Modified from SHA512_Final() in OpenSSL crypto/sha/sha512.c.
- */
-static int
-t4_digest_final_sha512(EVP_MD_CTX *ctx, unsigned char *md)
-{
-	T4_SHA512_CTX	*c = (T4_SHA512_CTX *)ctx->md_data;
-	unsigned char	*p = (unsigned char *)c->u.p;
-	size_t		n = c->num;
-
-	p[n] = 0x80;	/* There always is a room for one */
-	n++;
-	if (n > (sizeof (c->u) - 16)) {
-		memset(p + n, 0, sizeof (c->u) - n);
-		n = 0;
-		t4_sha512_multiblock(c, p, 1);
-	}
-
-	memset(p+n, 0, sizeof (c->u) - 16 - n);
-	c->u.d[SHA_LBLOCK - 2] = c->Nh;
-	c->u.d[SHA_LBLOCK - 1] = c->Nl;
-
-	t4_sha512_multiblock(c, p, 1);
-
-	if (md == 0)
-		return (0);
-
-	switch (c->md_len) {
-		/* Let compiler decide if it's appropriate to unroll... */
-		case SHA384_DIGEST_LENGTH:
-			for (n = 0; n < SHA384_DIGEST_LENGTH / 8; n++) {
-				SHA_LONG64 t = c->h[n];
-
-				*(md++)	= (unsigned char)(t >> 56);
-				*(md++)	= (unsigned char)(t >> 48);
-				*(md++)	= (unsigned char)(t >> 40);
-				*(md++)	= (unsigned char)(t >> 32);
-				*(md++)	= (unsigned char)(t >> 24);
-				*(md++)	= (unsigned char)(t >> 16);
-				*(md++)	= (unsigned char)(t >> 8);
-				*(md++)	= (unsigned char)(t);
-			}
-			break;
-		case SHA512_DIGEST_LENGTH:
-			for (n = 0; n < SHA512_DIGEST_LENGTH / 8; n++) {
-				SHA_LONG64 t = c->h[n];
-
-				*(md++)	= (unsigned char)(t >> 56);
-				*(md++)	= (unsigned char)(t >> 48);
-				*(md++)	= (unsigned char)(t >> 40);
-				*(md++)	= (unsigned char)(t >> 32);
-				*(md++)	= (unsigned char)(t >> 24);
-				*(md++)	= (unsigned char)(t >> 16);
-				*(md++)	= (unsigned char)(t >> 8);
-				*(md++)	= (unsigned char)(t);
-			}
-			break;
-		/* ... as well as make sure md_len is not abused. */
-		default:
-			return (0);
-	}
-
-	return (1);
-}
-
-
-/* Required for Engine API */
-static int
-t4_digest_copy_sha512(EVP_MD_CTX *to, const EVP_MD_CTX *from)
-{
-	if ((to->md_data != NULL) && (from->md_data != NULL)) {
-		(void) memcpy(to->md_data, from->md_data,
-		    sizeof (T4_SHA512_CTX));
-	}
-	return (1);
-}
-
-#endif	/* COMPILE_HW_T4 */
-#endif	/* !OPENSSL_NO_SHA && !OPENSSL_NO_SHA512 */
-#endif	/* !OPENSSL_NO_HW && !OPENSSL_NO_HW_MD_T4 */