| 1 | /* |
| 2 | * Copyright 2019 The OpenSSL Project Authors. All Rights Reserved. |
| 3 | * |
| 4 | * Licensed under the Apache License 2.0 (the "License"). You may not use |
| 5 | * this file except in compliance with the License. You can obtain a copy |
| 6 | * in the file LICENSE in the source distribution or at |
| 7 | * https://www.openssl.org/source/license.html |
| 8 | */ |
| 9 | |
| 10 | #include <string.h> |
| 11 | #include <openssl/core_names.h> |
| 12 | #include <openssl/crypto.h> |
| 13 | #include <openssl/evp.h> |
| 14 | #include <openssl/params.h> |
| 15 | #include <openssl/err.h> |
| 16 | #include "internal/sha3.h" |
| 17 | #include "prov/digestcommon.h" |
| 18 | #include "prov/implementations.h" |
| 19 | #include "prov/providercommonerr.h" |
| 20 | |
| 21 | /* |
| 22 | * Forward declaration of any unique methods implemented here. This is not strictly |
| 23 | * necessary for the compiler, but provides an assurance that the signatures |
| 24 | * of the functions in the dispatch table are correct. |
| 25 | */ |
| 26 | static OSSL_OP_digest_init_fn keccak_init; |
| 27 | static OSSL_OP_digest_update_fn keccak_update; |
| 28 | static OSSL_OP_digest_final_fn keccak_final; |
| 29 | static OSSL_OP_digest_freectx_fn keccak_freectx; |
| 30 | static OSSL_OP_digest_dupctx_fn keccak_dupctx; |
| 31 | static OSSL_OP_digest_set_ctx_params_fn shake_set_ctx_params; |
| 32 | static OSSL_OP_digest_settable_ctx_params_fn shake_settable_ctx_params; |
| 33 | static sha3_absorb_fn generic_sha3_absorb; |
| 34 | static sha3_final_fn generic_sha3_final; |
| 35 | |
| 36 | #if defined(OPENSSL_CPUID_OBJ) && defined(__s390__) && defined(KECCAK1600_ASM) |
| 37 | /* |
| 38 | * IBM S390X support |
| 39 | */ |
| 40 | # include "s390x_arch.h" |
| 41 | # define S390_SHA3 1 |
| 42 | # define S390_SHA3_CAPABLE(name) \ |
| 43 | ((OPENSSL_s390xcap_P.kimd[0] & S390X_CAPBIT(S390X_##name)) && \ |
| 44 | (OPENSSL_s390xcap_P.klmd[0] & S390X_CAPBIT(S390X_##name))) |
| 45 | |
| 46 | #endif |
| 47 | |
| 48 | static int keccak_init(void *vctx) |
| 49 | { |
| 50 | /* The newctx() handles most of the ctx fixed setup. */ |
| 51 | sha3_reset((KECCAK1600_CTX *)vctx); |
| 52 | return 1; |
| 53 | } |
| 54 | |
| 55 | static int keccak_update(void *vctx, const unsigned char *inp, size_t len) |
| 56 | { |
| 57 | KECCAK1600_CTX *ctx = vctx; |
| 58 | const size_t bsz = ctx->block_size; |
| 59 | size_t num, rem; |
| 60 | |
| 61 | if (len == 0) |
| 62 | return 1; |
| 63 | |
| 64 | /* Is there anything in the buffer already ? */ |
| 65 | if ((num = ctx->bufsz) != 0) { |
| 66 | /* Calculate how much space is left in the buffer */ |
| 67 | rem = bsz - num; |
| 68 | /* If the new input does not fill the buffer then just add it */ |
| 69 | if (len < rem) { |
| 70 | memcpy(ctx->buf + num, inp, len); |
| 71 | ctx->bufsz += len; |
| 72 | return 1; |
| 73 | } |
| 74 | /* otherwise fill up the buffer and absorb the buffer */ |
| 75 | memcpy(ctx->buf + num, inp, rem); |
| 76 | /* Update the input pointer */ |
| 77 | inp += rem; |
| 78 | len -= rem; |
| 79 | ctx->meth.absorb(ctx, ctx->buf, bsz); |
| 80 | ctx->bufsz = 0; |
| 81 | } |
| 82 | /* Absorb the input - rem = leftover part of the input < blocksize) */ |
| 83 | rem = ctx->meth.absorb(ctx, inp, len); |
| 84 | /* Copy the leftover bit of the input into the buffer */ |
| 85 | if (rem) { |
| 86 | memcpy(ctx->buf, inp + len - rem, rem); |
| 87 | ctx->bufsz = rem; |
| 88 | } |
| 89 | return 1; |
| 90 | } |
| 91 | |
| 92 | static int keccak_final(void *vctx, unsigned char *out, size_t *outl, |
| 93 | size_t outsz) |
| 94 | { |
| 95 | int ret = 1; |
| 96 | KECCAK1600_CTX *ctx = vctx; |
| 97 | |
| 98 | if (outsz > 0) |
| 99 | ret = ctx->meth.final(out, ctx); |
| 100 | |
| 101 | *outl = ctx->md_size; |
| 102 | return ret; |
| 103 | } |
| 104 | |
| 105 | /*- |
| 106 | * Generic software version of the absorb() and final(). |
| 107 | */ |
| 108 | static size_t generic_sha3_absorb(void *vctx, const void *inp, size_t len) |
| 109 | { |
| 110 | KECCAK1600_CTX *ctx = vctx; |
| 111 | |
| 112 | return SHA3_absorb(ctx->A, inp, len, ctx->block_size); |
| 113 | } |
| 114 | |
| 115 | static int generic_sha3_final(unsigned char *md, void *vctx) |
| 116 | { |
| 117 | return sha3_final(md, (KECCAK1600_CTX *)vctx); |
| 118 | } |
| 119 | |
| 120 | static PROV_SHA3_METHOD sha3_generic_md = |
| 121 | { |
| 122 | generic_sha3_absorb, |
| 123 | generic_sha3_final |
| 124 | }; |
| 125 | |
| 126 | #if defined(S390_SHA3) |
| 127 | |
| 128 | static sha3_absorb_fn s390x_sha3_absorb; |
| 129 | static sha3_final_fn s390x_sha3_final; |
| 130 | static sha3_final_fn s390x_shake_final; |
| 131 | |
| 132 | /*- |
| 133 | * The platform specific parts of the absorb() and final() for S390X. |
| 134 | */ |
| 135 | static size_t s390x_sha3_absorb(void *vctx, const void *inp, size_t len) |
| 136 | { |
| 137 | KECCAK1600_CTX *ctx = vctx; |
| 138 | size_t rem = len % ctx->block_size; |
| 139 | |
| 140 | s390x_kimd(inp, len - rem, ctx->pad, ctx->A); |
| 141 | return rem; |
| 142 | } |
| 143 | |
| 144 | static int s390x_sha3_final(unsigned char *md, void *vctx) |
| 145 | { |
| 146 | KECCAK1600_CTX *ctx = vctx; |
| 147 | |
| 148 | s390x_klmd(ctx->buf, ctx->bufsz, NULL, 0, ctx->pad, ctx->A); |
| 149 | memcpy(md, ctx->A, ctx->md_size); |
| 150 | return 1; |
| 151 | } |
| 152 | |
| 153 | static int s390x_shake_final(unsigned char *md, void *vctx) |
| 154 | { |
| 155 | KECCAK1600_CTX *ctx = vctx; |
| 156 | |
| 157 | s390x_klmd(ctx->buf, ctx->bufsz, md, ctx->md_size, ctx->pad, ctx->A); |
| 158 | return 1; |
| 159 | } |
| 160 | |
| 161 | static PROV_SHA3_METHOD sha3_s390x_md = |
| 162 | { |
| 163 | s390x_sha3_absorb, |
| 164 | s390x_sha3_final |
| 165 | }; |
| 166 | |
| 167 | static PROV_SHA3_METHOD shake_s390x_md = |
| 168 | { |
| 169 | s390x_sha3_absorb, |
| 170 | s390x_shake_final |
| 171 | }; |
| 172 | |
| 173 | # define SHA3_SET_MD(uname, typ) \ |
| 174 | if (S390_SHA3_CAPABLE(uname)) { \ |
| 175 | ctx->pad = S390X_##uname; \ |
| 176 | ctx->meth = typ##_s390x_md; \ |
| 177 | } else { \ |
| 178 | ctx->meth = sha3_generic_md; \ |
| 179 | } |
| 180 | #else |
| 181 | # define SHA3_SET_MD(uname, typ) ctx->meth = sha3_generic_md; |
| 182 | #endif /* S390_SHA3 */ |
| 183 | |
| 184 | #define SHA3_newctx(typ, uname, name, bitlen, pad) \ |
| 185 | static OSSL_OP_digest_newctx_fn name##_newctx; \ |
| 186 | static void *name##_newctx(void *provctx) \ |
| 187 | { \ |
| 188 | KECCAK1600_CTX *ctx = OPENSSL_zalloc(sizeof(*ctx)); \ |
| 189 | \ |
| 190 | if (ctx == NULL) \ |
| 191 | return NULL; \ |
| 192 | sha3_init(ctx, pad, bitlen); \ |
| 193 | SHA3_SET_MD(uname, typ) \ |
| 194 | return ctx; \ |
| 195 | } |
| 196 | |
| 197 | #define KMAC_newctx(uname, bitlen, pad) \ |
| 198 | static OSSL_OP_digest_newctx_fn uname##_newctx; \ |
| 199 | static void *uname##_newctx(void *provctx) \ |
| 200 | { \ |
| 201 | KECCAK1600_CTX *ctx = OPENSSL_zalloc(sizeof(*ctx)); \ |
| 202 | \ |
| 203 | if (ctx == NULL) \ |
| 204 | return NULL; \ |
| 205 | keccak_kmac_init(ctx, pad, bitlen); \ |
| 206 | ctx->meth = sha3_generic_md; \ |
| 207 | return ctx; \ |
| 208 | } |
| 209 | |
| 210 | #define PROV_FUNC_SHA3_DIGEST_COMMON(name, bitlen, blksize, dgstsize, flags) \ |
| 211 | PROV_FUNC_DIGEST_GET_PARAM(name, blksize, dgstsize, flags) \ |
| 212 | const OSSL_DISPATCH name##_functions[] = { \ |
| 213 | { OSSL_FUNC_DIGEST_NEWCTX, (void (*)(void))name##_newctx }, \ |
| 214 | { OSSL_FUNC_DIGEST_INIT, (void (*)(void))keccak_init }, \ |
| 215 | { OSSL_FUNC_DIGEST_UPDATE, (void (*)(void))keccak_update }, \ |
| 216 | { OSSL_FUNC_DIGEST_FINAL, (void (*)(void))keccak_final }, \ |
| 217 | { OSSL_FUNC_DIGEST_FREECTX, (void (*)(void))keccak_freectx }, \ |
| 218 | { OSSL_FUNC_DIGEST_DUPCTX, (void (*)(void))keccak_dupctx }, \ |
| 219 | PROV_DISPATCH_FUNC_DIGEST_GET_PARAMS(name) |
| 220 | |
| 221 | #define PROV_FUNC_SHA3_DIGEST(name, bitlen, blksize, dgstsize, flags) \ |
| 222 | PROV_FUNC_SHA3_DIGEST_COMMON(name, bitlen, blksize, dgstsize, flags), \ |
| 223 | PROV_DISPATCH_FUNC_DIGEST_CONSTRUCT_END |
| 224 | |
| 225 | #define PROV_FUNC_SHAKE_DIGEST(name, bitlen, blksize, dgstsize, flags) \ |
| 226 | PROV_FUNC_SHA3_DIGEST_COMMON(name, bitlen, blksize, dgstsize, flags), \ |
| 227 | { OSSL_FUNC_DIGEST_SET_CTX_PARAMS, (void (*)(void))shake_set_ctx_params }, \ |
| 228 | { OSSL_FUNC_DIGEST_SETTABLE_CTX_PARAMS, \ |
| 229 | (void (*)(void))shake_settable_ctx_params }, \ |
| 230 | PROV_DISPATCH_FUNC_DIGEST_CONSTRUCT_END |
| 231 | |
| 232 | static void keccak_freectx(void *vctx) |
| 233 | { |
| 234 | KECCAK1600_CTX *ctx = (KECCAK1600_CTX *)vctx; |
| 235 | |
| 236 | OPENSSL_clear_free(ctx, sizeof(*ctx)); |
| 237 | } |
| 238 | |
| 239 | static void *keccak_dupctx(void *ctx) |
| 240 | { |
| 241 | KECCAK1600_CTX *in = (KECCAK1600_CTX *)ctx; |
| 242 | KECCAK1600_CTX *ret = OPENSSL_malloc(sizeof(*ret)); |
| 243 | |
| 244 | if (ret != NULL) |
| 245 | *ret = *in; |
| 246 | return ret; |
| 247 | } |
| 248 | |
| 249 | static const OSSL_PARAM known_shake_settable_ctx_params[] = { |
| 250 | {OSSL_DIGEST_PARAM_SSL3_MS, OSSL_PARAM_OCTET_STRING, NULL, 0, 0}, |
| 251 | OSSL_PARAM_END |
| 252 | }; |
| 253 | static const OSSL_PARAM *shake_settable_ctx_params(void) |
| 254 | { |
| 255 | return known_shake_settable_ctx_params; |
| 256 | } |
| 257 | |
| 258 | static int shake_set_ctx_params(void *vctx, const OSSL_PARAM params[]) |
| 259 | { |
| 260 | const OSSL_PARAM *p; |
| 261 | KECCAK1600_CTX *ctx = (KECCAK1600_CTX *)vctx; |
| 262 | |
| 263 | if (ctx != NULL && params != NULL) { |
| 264 | p = OSSL_PARAM_locate_const(params, OSSL_DIGEST_PARAM_XOFLEN); |
| 265 | if (p != NULL && !OSSL_PARAM_get_size_t(p, &ctx->md_size)) { |
| 266 | ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); |
| 267 | return 0; |
| 268 | } |
| 269 | return 1; |
| 270 | } |
| 271 | return 0; /* Null Parameter */ |
| 272 | } |
| 273 | |
| 274 | #define IMPLEMENT_SHA3_functions(bitlen) \ |
| 275 | SHA3_newctx(sha3, SHA3_##bitlen, sha3_##bitlen, bitlen, '\x06') \ |
| 276 | PROV_FUNC_SHA3_DIGEST(sha3_##bitlen, bitlen, \ |
| 277 | SHA3_BLOCKSIZE(bitlen), SHA3_MDSIZE(bitlen), \ |
| 278 | EVP_MD_FLAG_DIGALGID_ABSENT) |
| 279 | |
| 280 | #define IMPLEMENT_SHAKE_functions(bitlen) \ |
| 281 | SHA3_newctx(shake, SHAKE_##bitlen, shake_##bitlen, bitlen, '\x1f') \ |
| 282 | PROV_FUNC_SHAKE_DIGEST(shake_##bitlen, bitlen, \ |
| 283 | SHA3_BLOCKSIZE(bitlen), SHA3_MDSIZE(bitlen), \ |
| 284 | EVP_MD_FLAG_XOF) |
| 285 | #define IMPLEMENT_KMAC_functions(bitlen) \ |
| 286 | KMAC_newctx(keccak_kmac_##bitlen, bitlen, '\x04') \ |
| 287 | PROV_FUNC_SHAKE_DIGEST(keccak_kmac_##bitlen, bitlen, \ |
| 288 | SHA3_BLOCKSIZE(bitlen), KMAC_MDSIZE(bitlen), \ |
| 289 | EVP_MD_FLAG_XOF) |
| 290 | |
| 291 | /* sha3_224_functions */ |
| 292 | IMPLEMENT_SHA3_functions(224) |
| 293 | /* sha3_256_functions */ |
| 294 | IMPLEMENT_SHA3_functions(256) |
| 295 | /* sha3_384_functions */ |
| 296 | IMPLEMENT_SHA3_functions(384) |
| 297 | /* sha3_512_functions */ |
| 298 | IMPLEMENT_SHA3_functions(512) |
| 299 | /* shake_128_functions */ |
| 300 | IMPLEMENT_SHAKE_functions(128) |
| 301 | /* shake_256_functions */ |
| 302 | IMPLEMENT_SHAKE_functions(256) |
| 303 | /* keccak_kmac_128_functions */ |
| 304 | IMPLEMENT_KMAC_functions(128) |
| 305 | /* keccak_kmac_256_functions */ |
| 306 | IMPLEMENT_KMAC_functions(256) |
| 307 | |