1 /* $OpenBSD: xform.c,v 1.16 2001/08/28 12:20:43 ben Exp $ */ 2 /*- 3 * The authors of this code are John Ioannidis (ji@tla.org), 4 * Angelos D. Keromytis (kermit@csd.uch.gr), 5 * Niels Provos (provos@physnet.uni-hamburg.de) and 6 * Damien Miller (djm@mindrot.org). 7 * 8 * This code was written by John Ioannidis for BSD/OS in Athens, Greece, 9 * in November 1995. 10 * 11 * Ported to OpenBSD and NetBSD, with additional transforms, in December 1996, 12 * by Angelos D. Keromytis. 13 * 14 * Additional transforms and features in 1997 and 1998 by Angelos D. Keromytis 15 * and Niels Provos. 16 * 17 * Additional features in 1999 by Angelos D. Keromytis. 18 * 19 * AES XTS implementation in 2008 by Damien Miller 20 * 21 * Copyright (C) 1995, 1996, 1997, 1998, 1999 by John Ioannidis, 22 * Angelos D. Keromytis and Niels Provos. 23 * 24 * Copyright (C) 2001, Angelos D. Keromytis. 25 * 26 * Copyright (C) 2008, Damien Miller 27 * Copyright (c) 2014 The FreeBSD Foundation 28 * All rights reserved. 29 * 30 * Portions of this software were developed by John-Mark Gurney 31 * under sponsorship of the FreeBSD Foundation and 32 * Rubicon Communications, LLC (Netgate). 33 * 34 * Permission to use, copy, and modify this software with or without fee 35 * is hereby granted, provided that this entire notice is included in 36 * all copies of any software which is or includes a copy or 37 * modification of this software. 38 * You may use this code under the GNU public license if you so wish. Please 39 * contribute changes back to the authors under this freer than GPL license 40 * so that we may further the use of strong encryption without limitations to 41 * all. 42 * 43 * THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR 44 * IMPLIED WARRANTY. IN PARTICULAR, NONE OF THE AUTHORS MAKES ANY 45 * REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE 46 * MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR 47 * PURPOSE. 48 */ 49 50 #include <sys/cdefs.h> 51 __FBSDID("$FreeBSD$"); 52 53 #include <crypto/sha2/sha224.h> 54 #include <crypto/sha2/sha256.h> 55 #include <crypto/sha2/sha384.h> 56 #include <crypto/sha2/sha512.h> 57 #include <opencrypto/xform_auth.h> 58 59 static int SHA224Update_int(void *, const u_int8_t *, u_int16_t); 60 static int SHA256Update_int(void *, const u_int8_t *, u_int16_t); 61 static int SHA384Update_int(void *, const u_int8_t *, u_int16_t); 62 static int SHA512Update_int(void *, const u_int8_t *, u_int16_t); 63 64 /* Plain hashes */ 65 struct auth_hash auth_hash_sha2_224 = { 66 .type = CRYPTO_SHA2_224, 67 .name = "SHA2-224", 68 .hashsize = SHA2_224_HASH_LEN, 69 .ctxsize = sizeof(SHA224_CTX), 70 .blocksize = SHA2_224_BLOCK_LEN, 71 .Init = (void (*)(void *)) SHA224_Init, 72 .Update = SHA224Update_int, 73 .Final = (void (*)(u_int8_t *, void *)) SHA224_Final, 74 }; 75 76 struct auth_hash auth_hash_sha2_256 = { 77 .type = CRYPTO_SHA2_256, 78 .name = "SHA2-256", 79 .keysize = SHA2_256_BLOCK_LEN, 80 .hashsize = SHA2_256_HASH_LEN, 81 .ctxsize = sizeof(SHA256_CTX), 82 .blocksize = SHA2_256_BLOCK_LEN, 83 .Init = (void (*)(void *)) SHA256_Init, 84 .Update = SHA256Update_int, 85 .Final = (void (*)(u_int8_t *, void *)) SHA256_Final, 86 }; 87 88 struct auth_hash auth_hash_sha2_384 = { 89 .type = CRYPTO_SHA2_384, 90 .name = "SHA2-384", 91 .keysize = SHA2_384_BLOCK_LEN, 92 .hashsize = SHA2_384_HASH_LEN, 93 .ctxsize = sizeof(SHA384_CTX), 94 .blocksize = SHA2_384_BLOCK_LEN, 95 .Init = (void (*)(void *)) SHA384_Init, 96 .Update = SHA384Update_int, 97 .Final = (void (*)(u_int8_t *, void *)) SHA384_Final, 98 }; 99 100 struct auth_hash auth_hash_sha2_512 = { 101 .type = CRYPTO_SHA2_512, 102 .name = "SHA2-512", 103 .keysize = SHA2_512_BLOCK_LEN, 104 .hashsize = SHA2_512_HASH_LEN, 105 .ctxsize = sizeof(SHA512_CTX), 106 .blocksize = SHA2_512_BLOCK_LEN, 107 .Init = (void (*)(void *)) SHA512_Init, 108 .Update = SHA512Update_int, 109 .Final = (void (*)(u_int8_t *, void *)) SHA512_Final, 110 }; 111 112 /* Authentication instances */ 113 struct auth_hash auth_hash_hmac_sha2_224 = { 114 .type = CRYPTO_SHA2_224_HMAC, 115 .name = "HMAC-SHA2-224", 116 .keysize = SHA2_224_BLOCK_LEN, 117 .hashsize = SHA2_224_HASH_LEN, 118 .ctxsize = sizeof(SHA224_CTX), 119 .blocksize = SHA2_224_BLOCK_LEN, 120 .Init = (void (*)(void *)) SHA224_Init, 121 .Update = SHA224Update_int, 122 .Final = (void (*)(u_int8_t *, void *)) SHA224_Final, 123 }; 124 125 struct auth_hash auth_hash_hmac_sha2_256 = { 126 .type = CRYPTO_SHA2_256_HMAC, 127 .name = "HMAC-SHA2-256", 128 .keysize = SHA2_256_BLOCK_LEN, 129 .hashsize = SHA2_256_HASH_LEN, 130 .ctxsize = sizeof(SHA256_CTX), 131 .blocksize = SHA2_256_BLOCK_LEN, 132 .Init = (void (*)(void *)) SHA256_Init, 133 .Update = SHA256Update_int, 134 .Final = (void (*)(u_int8_t *, void *)) SHA256_Final, 135 }; 136 137 struct auth_hash auth_hash_hmac_sha2_384 = { 138 .type = CRYPTO_SHA2_384_HMAC, 139 .name = "HMAC-SHA2-384", 140 .keysize = SHA2_384_BLOCK_LEN, 141 .hashsize = SHA2_384_HASH_LEN, 142 .ctxsize = sizeof(SHA384_CTX), 143 .blocksize = SHA2_384_BLOCK_LEN, 144 .Init = (void (*)(void *)) SHA384_Init, 145 .Update = SHA384Update_int, 146 .Final = (void (*)(u_int8_t *, void *)) SHA384_Final, 147 }; 148 149 struct auth_hash auth_hash_hmac_sha2_512 = { 150 .type = CRYPTO_SHA2_512_HMAC, 151 .name = "HMAC-SHA2-512", 152 .keysize = SHA2_512_BLOCK_LEN, 153 .hashsize = SHA2_512_HASH_LEN, 154 .ctxsize = sizeof(SHA512_CTX), 155 .blocksize = SHA2_512_BLOCK_LEN, 156 .Init = (void (*)(void *)) SHA512_Init, 157 .Update = SHA512Update_int, 158 .Final = (void (*)(u_int8_t *, void *)) SHA512_Final, 159 }; 160 161 /* 162 * And now for auth. 163 */ 164 static int 165 SHA224Update_int(void *ctx, const u_int8_t *buf, u_int16_t len) 166 { 167 SHA224_Update(ctx, buf, len); 168 return 0; 169 } 170 171 static int 172 SHA256Update_int(void *ctx, const u_int8_t *buf, u_int16_t len) 173 { 174 SHA256_Update(ctx, buf, len); 175 return 0; 176 } 177 178 static int 179 SHA384Update_int(void *ctx, const u_int8_t *buf, u_int16_t len) 180 { 181 SHA384_Update(ctx, buf, len); 182 return 0; 183 } 184 185 static int 186 SHA512Update_int(void *ctx, const u_int8_t *buf, u_int16_t len) 187 { 188 SHA512_Update(ctx, buf, len); 189 return 0; 190 } 191