]> git.ipfire.org Git - thirdparty/linux.git/blame - lib/crypto/blake2s.c
mm: remove both instances of __vmalloc_node_flags
[thirdparty/linux.git] / lib / crypto / blake2s.c
CommitLineData
66d7fb94
JD
1// SPDX-License-Identifier: GPL-2.0 OR MIT
2/*
3 * Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
4 *
5 * This is an implementation of the BLAKE2s hash and PRF functions.
6 *
7 * Information: https://blake2.net/
8 *
9 */
10
11#include <crypto/internal/blake2s.h>
12#include <linux/types.h>
13#include <linux/string.h>
14#include <linux/kernel.h>
15#include <linux/module.h>
16#include <linux/init.h>
17#include <linux/bug.h>
18#include <asm/unaligned.h>
19
20bool blake2s_selftest(void);
21
22void blake2s_update(struct blake2s_state *state, const u8 *in, size_t inlen)
23{
24 const size_t fill = BLAKE2S_BLOCK_SIZE - state->buflen;
25
26 if (unlikely(!inlen))
27 return;
28 if (inlen > fill) {
29 memcpy(state->buf + state->buflen, in, fill);
30 if (IS_ENABLED(CONFIG_CRYPTO_ARCH_HAVE_LIB_BLAKE2S))
31 blake2s_compress_arch(state, state->buf, 1,
32 BLAKE2S_BLOCK_SIZE);
33 else
34 blake2s_compress_generic(state, state->buf, 1,
35 BLAKE2S_BLOCK_SIZE);
36 state->buflen = 0;
37 in += fill;
38 inlen -= fill;
39 }
40 if (inlen > BLAKE2S_BLOCK_SIZE) {
41 const size_t nblocks = DIV_ROUND_UP(inlen, BLAKE2S_BLOCK_SIZE);
42 /* Hash one less (full) block than strictly possible */
43 if (IS_ENABLED(CONFIG_CRYPTO_ARCH_HAVE_LIB_BLAKE2S))
44 blake2s_compress_arch(state, in, nblocks - 1,
45 BLAKE2S_BLOCK_SIZE);
46 else
47 blake2s_compress_generic(state, in, nblocks - 1,
48 BLAKE2S_BLOCK_SIZE);
49 in += BLAKE2S_BLOCK_SIZE * (nblocks - 1);
50 inlen -= BLAKE2S_BLOCK_SIZE * (nblocks - 1);
51 }
52 memcpy(state->buf + state->buflen, in, inlen);
53 state->buflen += inlen;
54}
55EXPORT_SYMBOL(blake2s_update);
56
57void blake2s_final(struct blake2s_state *state, u8 *out)
58{
59 WARN_ON(IS_ENABLED(DEBUG) && !out);
60 blake2s_set_lastblock(state);
61 memset(state->buf + state->buflen, 0,
62 BLAKE2S_BLOCK_SIZE - state->buflen); /* Padding */
63 if (IS_ENABLED(CONFIG_CRYPTO_ARCH_HAVE_LIB_BLAKE2S))
64 blake2s_compress_arch(state, state->buf, 1, state->buflen);
65 else
66 blake2s_compress_generic(state, state->buf, 1, state->buflen);
67 cpu_to_le32_array(state->h, ARRAY_SIZE(state->h));
68 memcpy(out, state->h, state->outlen);
69 memzero_explicit(state, sizeof(*state));
70}
71EXPORT_SYMBOL(blake2s_final);
72
73void blake2s256_hmac(u8 *out, const u8 *in, const u8 *key, const size_t inlen,
74 const size_t keylen)
75{
76 struct blake2s_state state;
77 u8 x_key[BLAKE2S_BLOCK_SIZE] __aligned(__alignof__(u32)) = { 0 };
78 u8 i_hash[BLAKE2S_HASH_SIZE] __aligned(__alignof__(u32));
79 int i;
80
81 if (keylen > BLAKE2S_BLOCK_SIZE) {
82 blake2s_init(&state, BLAKE2S_HASH_SIZE);
83 blake2s_update(&state, key, keylen);
84 blake2s_final(&state, x_key);
85 } else
86 memcpy(x_key, key, keylen);
87
88 for (i = 0; i < BLAKE2S_BLOCK_SIZE; ++i)
89 x_key[i] ^= 0x36;
90
91 blake2s_init(&state, BLAKE2S_HASH_SIZE);
92 blake2s_update(&state, x_key, BLAKE2S_BLOCK_SIZE);
93 blake2s_update(&state, in, inlen);
94 blake2s_final(&state, i_hash);
95
96 for (i = 0; i < BLAKE2S_BLOCK_SIZE; ++i)
97 x_key[i] ^= 0x5c ^ 0x36;
98
99 blake2s_init(&state, BLAKE2S_HASH_SIZE);
100 blake2s_update(&state, x_key, BLAKE2S_BLOCK_SIZE);
101 blake2s_update(&state, i_hash, BLAKE2S_HASH_SIZE);
102 blake2s_final(&state, i_hash);
103
104 memcpy(out, i_hash, BLAKE2S_HASH_SIZE);
105 memzero_explicit(x_key, BLAKE2S_BLOCK_SIZE);
106 memzero_explicit(i_hash, BLAKE2S_HASH_SIZE);
107}
108EXPORT_SYMBOL(blake2s256_hmac);
109
110static int __init mod_init(void)
111{
112 if (!IS_ENABLED(CONFIG_CRYPTO_MANAGER_DISABLE_TESTS) &&
113 WARN_ON(!blake2s_selftest()))
114 return -ENODEV;
115 return 0;
116}
117
118static void __exit mod_exit(void)
119{
120}
121
122module_init(mod_init);
123module_exit(mod_exit);
124MODULE_LICENSE("GPL v2");
125MODULE_DESCRIPTION("BLAKE2s hash function");
126MODULE_AUTHOR("Jason A. Donenfeld <Jason@zx2c4.com>");