116 lines
		
	
	
		
			3.1 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			116 lines
		
	
	
		
			3.1 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /* SPDX-License-Identifier: GPL-2.0 OR MIT */
 | |
| /*
 | |
|  * Helper functions for BLAKE2b implementations.
 | |
|  * Keep this in sync with the corresponding BLAKE2s header.
 | |
|  */
 | |
| 
 | |
| #ifndef _CRYPTO_INTERNAL_BLAKE2B_H
 | |
| #define _CRYPTO_INTERNAL_BLAKE2B_H
 | |
| 
 | |
| #include <crypto/blake2b.h>
 | |
| #include <crypto/internal/hash.h>
 | |
| #include <linux/string.h>
 | |
| 
 | |
| void blake2b_compress_generic(struct blake2b_state *state,
 | |
| 			      const u8 *block, size_t nblocks, u32 inc);
 | |
| 
 | |
| static inline void blake2b_set_lastblock(struct blake2b_state *state)
 | |
| {
 | |
| 	state->f[0] = -1;
 | |
| }
 | |
| 
 | |
| typedef void (*blake2b_compress_t)(struct blake2b_state *state,
 | |
| 				   const u8 *block, size_t nblocks, u32 inc);
 | |
| 
 | |
| static inline void __blake2b_update(struct blake2b_state *state,
 | |
| 				    const u8 *in, size_t inlen,
 | |
| 				    blake2b_compress_t compress)
 | |
| {
 | |
| 	const size_t fill = BLAKE2B_BLOCK_SIZE - state->buflen;
 | |
| 
 | |
| 	if (unlikely(!inlen))
 | |
| 		return;
 | |
| 	if (inlen > fill) {
 | |
| 		memcpy(state->buf + state->buflen, in, fill);
 | |
| 		(*compress)(state, state->buf, 1, BLAKE2B_BLOCK_SIZE);
 | |
| 		state->buflen = 0;
 | |
| 		in += fill;
 | |
| 		inlen -= fill;
 | |
| 	}
 | |
| 	if (inlen > BLAKE2B_BLOCK_SIZE) {
 | |
| 		const size_t nblocks = DIV_ROUND_UP(inlen, BLAKE2B_BLOCK_SIZE);
 | |
| 		/* Hash one less (full) block than strictly possible */
 | |
| 		(*compress)(state, in, nblocks - 1, BLAKE2B_BLOCK_SIZE);
 | |
| 		in += BLAKE2B_BLOCK_SIZE * (nblocks - 1);
 | |
| 		inlen -= BLAKE2B_BLOCK_SIZE * (nblocks - 1);
 | |
| 	}
 | |
| 	memcpy(state->buf + state->buflen, in, inlen);
 | |
| 	state->buflen += inlen;
 | |
| }
 | |
| 
 | |
| static inline void __blake2b_final(struct blake2b_state *state, u8 *out,
 | |
| 				   blake2b_compress_t compress)
 | |
| {
 | |
| 	int i;
 | |
| 
 | |
| 	blake2b_set_lastblock(state);
 | |
| 	memset(state->buf + state->buflen, 0,
 | |
| 	       BLAKE2B_BLOCK_SIZE - state->buflen); /* Padding */
 | |
| 	(*compress)(state, state->buf, 1, state->buflen);
 | |
| 	for (i = 0; i < ARRAY_SIZE(state->h); i++)
 | |
| 		__cpu_to_le64s(&state->h[i]);
 | |
| 	memcpy(out, state->h, state->outlen);
 | |
| }
 | |
| 
 | |
| /* Helper functions for shash implementations of BLAKE2b */
 | |
| 
 | |
| struct blake2b_tfm_ctx {
 | |
| 	u8 key[BLAKE2B_KEY_SIZE];
 | |
| 	unsigned int keylen;
 | |
| };
 | |
| 
 | |
| static inline int crypto_blake2b_setkey(struct crypto_shash *tfm,
 | |
| 					const u8 *key, unsigned int keylen)
 | |
| {
 | |
| 	struct blake2b_tfm_ctx *tctx = crypto_shash_ctx(tfm);
 | |
| 
 | |
| 	if (keylen == 0 || keylen > BLAKE2B_KEY_SIZE)
 | |
| 		return -EINVAL;
 | |
| 
 | |
| 	memcpy(tctx->key, key, keylen);
 | |
| 	tctx->keylen = keylen;
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static inline int crypto_blake2b_init(struct shash_desc *desc)
 | |
| {
 | |
| 	const struct blake2b_tfm_ctx *tctx = crypto_shash_ctx(desc->tfm);
 | |
| 	struct blake2b_state *state = shash_desc_ctx(desc);
 | |
| 	unsigned int outlen = crypto_shash_digestsize(desc->tfm);
 | |
| 
 | |
| 	__blake2b_init(state, outlen, tctx->key, tctx->keylen);
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static inline int crypto_blake2b_update(struct shash_desc *desc,
 | |
| 					const u8 *in, unsigned int inlen,
 | |
| 					blake2b_compress_t compress)
 | |
| {
 | |
| 	struct blake2b_state *state = shash_desc_ctx(desc);
 | |
| 
 | |
| 	__blake2b_update(state, in, inlen, compress);
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static inline int crypto_blake2b_final(struct shash_desc *desc, u8 *out,
 | |
| 				       blake2b_compress_t compress)
 | |
| {
 | |
| 	struct blake2b_state *state = shash_desc_ctx(desc);
 | |
| 
 | |
| 	__blake2b_final(state, out, compress);
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| #endif /* _CRYPTO_INTERNAL_BLAKE2B_H */
 |