Coverage Report

Created: 2025-07-23 07:16

/src/gnutls/lib/accelerated/x86/hmac-x86-ssse3.c
Line
Count
Source (jump to first uncovered line)
1
/*
2
 * Copyright (C) 2008, 2010-2012 Free Software Foundation, Inc.
3
 *
4
 * Author: Nikos Mavrogiannopoulos
5
 *
6
 * This file is part of GNUTLS.
7
 *
8
 * The GNUTLS library is free software; you can redistribute it and/or
9
 * modify it under the terms of the GNU Lesser General Public License
10
 * as published by the Free Software Foundation; either version 2.1 of
11
 * the License, or (at your option) any later version.
12
 *
13
 * This library is distributed in the hope that it will be useful, but
14
 * WITHOUT ANY WARRANTY; without even the implied warranty of
15
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
16
 * Lesser General Public License for more details.
17
 *
18
 * You should have received a copy of the GNU Lesser General Public License
19
 * along with this program.  If not, see <https://www.gnu.org/licenses/>
20
 *
21
 */
22
23
/* This file provides the backend hash/mac implementation for
24
 * VIA Padlock hardware acceleration.
25
 */
26
27
#include "gnutls_int.h"
28
#include "hash_int.h"
29
#include "errors.h"
30
#include <nettle/sha.h>
31
#include <nettle/hmac.h>
32
#include <nettle/macros.h>
33
#include "aes-x86.h"
34
#include "sha-x86.h"
35
#include "algorithms.h"
36
37
#ifdef HAVE_LIBNETTLE
38
39
typedef void (*update_func)(void *, size_t, const uint8_t *);
40
typedef void (*digest_func)(void *, size_t, uint8_t *);
41
typedef void (*set_key_func)(void *, size_t, const uint8_t *);
42
43
struct x86_hmac_ctx {
44
  union {
45
    struct hmac_sha1_ctx sha1;
46
    struct hmac_sha224_ctx sha224;
47
    struct hmac_sha256_ctx sha256;
48
    struct hmac_sha384_ctx sha384;
49
    struct hmac_sha512_ctx sha512;
50
  } ctx;
51
52
  void *ctx_ptr;
53
  gnutls_mac_algorithm_t algo;
54
  size_t length;
55
  update_func update;
56
  digest_func digest;
57
  set_key_func setkey;
58
};
59
60
static void x86_hmac_sha1_set_key(struct hmac_sha1_ctx *ctx, size_t key_length,
61
          const uint8_t *key)
62
0
{
63
0
  HMAC_SET_KEY(ctx, &x86_sha1, key_length, key);
64
0
}
65
66
static void x86_hmac_sha1_update(struct hmac_sha1_ctx *ctx, size_t length,
67
         const uint8_t *data)
68
0
{
69
0
  x86_sha1_update(&ctx->state, length, data);
70
0
}
71
72
static void x86_hmac_sha1_digest(struct hmac_sha1_ctx *ctx, size_t length,
73
         uint8_t *digest)
74
0
{
75
0
  HMAC_DIGEST(ctx, &x86_sha1, length, digest);
76
0
}
77
78
static void x86_hmac_sha256_set_key(struct hmac_sha256_ctx *ctx,
79
            size_t key_length, const uint8_t *key)
80
0
{
81
0
  HMAC_SET_KEY(ctx, &x86_sha256, key_length, key);
82
0
}
83
84
static void x86_hmac_sha256_update(struct hmac_sha256_ctx *ctx, size_t length,
85
           const uint8_t *data)
86
0
{
87
0
  x86_sha256_update(&ctx->state, length, data);
88
0
}
89
90
static void x86_hmac_sha256_digest(struct hmac_sha256_ctx *ctx, size_t length,
91
           uint8_t *digest)
92
0
{
93
0
  HMAC_DIGEST(ctx, &x86_sha256, length, digest);
94
0
}
95
96
static void x86_hmac_sha224_set_key(struct hmac_sha224_ctx *ctx,
97
            size_t key_length, const uint8_t *key)
98
0
{
99
0
  HMAC_SET_KEY(ctx, &x86_sha224, key_length, key);
100
0
}
101
102
static void x86_hmac_sha224_digest(struct hmac_sha224_ctx *ctx, size_t length,
103
           uint8_t *digest)
104
0
{
105
0
  HMAC_DIGEST(ctx, &x86_sha224, length, digest);
106
0
}
107
108
static void x86_hmac_sha384_set_key(struct hmac_sha384_ctx *ctx,
109
            size_t key_length, const uint8_t *key)
110
0
{
111
0
  HMAC_SET_KEY(ctx, &x86_sha384, key_length, key);
112
0
}
113
114
static void x86_hmac_sha384_digest(struct hmac_sha384_ctx *ctx, size_t length,
115
           uint8_t *digest)
116
0
{
117
0
  HMAC_DIGEST(ctx, &x86_sha384, length, digest);
118
0
}
119
120
static void x86_hmac_sha512_set_key(struct hmac_sha512_ctx *ctx,
121
            size_t key_length, const uint8_t *key)
122
0
{
123
0
  HMAC_SET_KEY(ctx, &x86_sha512, key_length, key);
124
0
}
125
126
static void x86_hmac_sha512_update(struct hmac_sha512_ctx *ctx, size_t length,
127
           const uint8_t *data)
128
0
{
129
0
  x86_sha512_update(&ctx->state, length, data);
130
0
}
131
132
static void x86_hmac_sha512_digest(struct hmac_sha512_ctx *ctx, size_t length,
133
           uint8_t *digest)
134
0
{
135
0
  HMAC_DIGEST(ctx, &x86_sha512, length, digest);
136
0
}
137
138
static int _hmac_ctx_init(gnutls_mac_algorithm_t algo, struct x86_hmac_ctx *ctx)
139
0
{
140
0
  switch (algo) {
141
0
  case GNUTLS_MAC_SHA1:
142
0
    ctx->update = (update_func)x86_hmac_sha1_update;
143
0
    ctx->digest = (digest_func)x86_hmac_sha1_digest;
144
0
    ctx->setkey = (set_key_func)x86_hmac_sha1_set_key;
145
0
    ctx->ctx_ptr = &ctx->ctx.sha1;
146
0
    ctx->length = SHA1_DIGEST_SIZE;
147
0
    break;
148
0
  case GNUTLS_MAC_SHA224:
149
0
    ctx->update = (update_func)x86_hmac_sha256_update;
150
0
    ctx->digest = (digest_func)x86_hmac_sha224_digest;
151
0
    ctx->setkey = (set_key_func)x86_hmac_sha224_set_key;
152
0
    ctx->ctx_ptr = &ctx->ctx.sha224;
153
0
    ctx->length = SHA224_DIGEST_SIZE;
154
0
    break;
155
0
  case GNUTLS_MAC_SHA256:
156
0
    ctx->update = (update_func)x86_hmac_sha256_update;
157
0
    ctx->digest = (digest_func)x86_hmac_sha256_digest;
158
0
    ctx->setkey = (set_key_func)x86_hmac_sha256_set_key;
159
0
    ctx->ctx_ptr = &ctx->ctx.sha256;
160
0
    ctx->length = SHA256_DIGEST_SIZE;
161
0
    break;
162
0
  case GNUTLS_MAC_SHA384:
163
0
    ctx->update = (update_func)x86_hmac_sha512_update;
164
0
    ctx->digest = (digest_func)x86_hmac_sha384_digest;
165
0
    ctx->setkey = (set_key_func)x86_hmac_sha384_set_key;
166
0
    ctx->ctx_ptr = &ctx->ctx.sha384;
167
0
    ctx->length = SHA384_DIGEST_SIZE;
168
0
    break;
169
0
  case GNUTLS_MAC_SHA512:
170
0
    ctx->update = (update_func)x86_hmac_sha512_update;
171
0
    ctx->digest = (digest_func)x86_hmac_sha512_digest;
172
0
    ctx->setkey = (set_key_func)x86_hmac_sha512_set_key;
173
0
    ctx->ctx_ptr = &ctx->ctx.sha512;
174
0
    ctx->length = SHA512_DIGEST_SIZE;
175
0
    break;
176
0
  default:
177
0
    gnutls_assert();
178
0
    return GNUTLS_E_INVALID_REQUEST;
179
0
  }
180
181
0
  return 0;
182
0
}
183
184
static int wrap_x86_hmac_init(gnutls_mac_algorithm_t algo, void **_ctx)
185
0
{
186
0
  struct x86_hmac_ctx *ctx;
187
0
  int ret;
188
189
0
  ctx = gnutls_calloc(1, sizeof(struct x86_hmac_ctx));
190
0
  if (ctx == NULL) {
191
0
    gnutls_assert();
192
0
    return GNUTLS_E_MEMORY_ERROR;
193
0
  }
194
195
0
  ctx->algo = algo;
196
197
0
  ret = _hmac_ctx_init(algo, ctx);
198
0
  if (ret < 0) {
199
0
    gnutls_free(ctx);
200
0
    return gnutls_assert_val(ret);
201
0
  }
202
203
0
  *_ctx = ctx;
204
205
0
  return 0;
206
0
}
207
208
static void *wrap_x86_hmac_copy(const void *_ctx)
209
0
{
210
0
  struct x86_hmac_ctx *new_ctx;
211
0
  const struct x86_hmac_ctx *ctx = _ctx;
212
0
  ptrdiff_t off = (uint8_t *)ctx->ctx_ptr - (uint8_t *)(&ctx->ctx);
213
214
0
  new_ctx = gnutls_malloc(sizeof(struct x86_hmac_ctx));
215
0
  if (new_ctx == NULL) {
216
0
    gnutls_assert();
217
0
    return NULL;
218
0
  }
219
220
0
  memcpy(new_ctx, ctx, sizeof(*new_ctx));
221
0
  new_ctx->ctx_ptr = (uint8_t *)&new_ctx->ctx + off;
222
223
0
  return new_ctx;
224
0
}
225
226
static int wrap_x86_hmac_setkey(void *_ctx, const void *key, size_t keylen)
227
0
{
228
0
  struct x86_hmac_ctx *ctx = _ctx;
229
230
0
  ctx->setkey(ctx->ctx_ptr, keylen, key);
231
232
0
  return GNUTLS_E_SUCCESS;
233
0
}
234
235
static int wrap_x86_hmac_update(void *_ctx, const void *text, size_t textsize)
236
0
{
237
0
  struct x86_hmac_ctx *ctx = _ctx;
238
239
0
  ctx->update(ctx->ctx_ptr, textsize, text);
240
241
0
  return GNUTLS_E_SUCCESS;
242
0
}
243
244
static int wrap_x86_hmac_output(void *src_ctx, void *digest, size_t digestsize)
245
0
{
246
0
  struct x86_hmac_ctx *ctx;
247
0
  ctx = src_ctx;
248
249
0
  if (digestsize < ctx->length) {
250
0
    gnutls_assert();
251
0
    return GNUTLS_E_SHORT_MEMORY_BUFFER;
252
0
  }
253
254
0
  ctx->digest(ctx->ctx_ptr, digestsize, digest);
255
256
0
  return 0;
257
0
}
258
259
static void wrap_x86_hmac_deinit(void *hd)
260
0
{
261
0
  struct x86_hmac_ctx *ctx = hd;
262
263
0
  zeroize_temp_key(ctx, sizeof(*ctx));
264
0
  gnutls_free(ctx);
265
0
}
266
267
static int wrap_x86_hmac_fast(gnutls_mac_algorithm_t algo, const void *nonce,
268
            size_t nonce_size, const void *key,
269
            size_t key_size, const void *text,
270
            size_t text_size, void *digest)
271
0
{
272
0
  struct x86_hmac_ctx ctx;
273
0
  int ret;
274
275
0
  ret = _hmac_ctx_init(algo, &ctx);
276
0
  if (ret < 0)
277
0
    return gnutls_assert_val(ret);
278
279
0
  ctx.setkey(&ctx, key_size, key);
280
0
  ctx.update(&ctx, text_size, text);
281
0
  ctx.digest(&ctx, ctx.length, digest);
282
283
0
  zeroize_temp_key(&ctx, sizeof(ctx));
284
285
0
  return 0;
286
0
}
287
288
const gnutls_crypto_mac_st _gnutls_hmac_sha_x86_ssse3 = {
289
  .init = wrap_x86_hmac_init,
290
  .setkey = wrap_x86_hmac_setkey,
291
  .setnonce = NULL,
292
  .hash = wrap_x86_hmac_update,
293
  .output = wrap_x86_hmac_output,
294
  .copy = wrap_x86_hmac_copy,
295
  .deinit = wrap_x86_hmac_deinit,
296
  .fast = wrap_x86_hmac_fast,
297
};
298
299
#endif /* HAVE_LIBNETTLE */