]> git.saurik.com Git - apple/xnu.git/blame - libkern/crypto/corecrypto_sha2.c
xnu-7195.101.1.tar.gz
[apple/xnu.git] / libkern / crypto / corecrypto_sha2.c
CommitLineData
316670eb
A
1/*
2 * Copyright (c) 2012 Apple Computer, Inc. All rights reserved.
3 *
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
0a7de745 5 *
316670eb
A
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
0a7de745 14 *
316670eb
A
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
0a7de745 17 *
316670eb
A
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
0a7de745 25 *
316670eb
A
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
27 */
28
29#include <libkern/crypto/crypto_internal.h>
30#include <libkern/crypto/sha2.h>
a39ff7e2 31#include <libkern/libkern.h>
316670eb
A
32#include <kern/debug.h>
33#include <corecrypto/ccdigest.h>
34
39037602
A
35#if defined(CRYPTO_SHA2)
36
0a7de745
A
37void
38SHA256_Init(SHA256_CTX *ctx)
316670eb
A
39{
40 const struct ccdigest_info *di;
0a7de745
A
41 di = g_crypto_funcs->ccsha256_di;
42
43 /* Make sure the context size for the digest info fits in the one we have */
44 if (ccdigest_di_size(di) > sizeof(SHA256_CTX)) {
45 panic("%s: inconsistent size for SHA256 context", __FUNCTION__);
46 }
316670eb 47
316670eb
A
48 g_crypto_funcs->ccdigest_init_fn(di, ctx->ctx);
49}
50
0a7de745
A
51void
52SHA256_Update(SHA256_CTX *ctx, const void *data, size_t len)
316670eb
A
53{
54 const struct ccdigest_info *di;
0a7de745 55 di = g_crypto_funcs->ccsha256_di;
316670eb
A
56
57 g_crypto_funcs->ccdigest_update_fn(di, ctx->ctx, len, data);
58}
59
0a7de745
A
60void
61SHA256_Final(void *digest, SHA256_CTX *ctx)
316670eb
A
62{
63 const struct ccdigest_info *di;
0a7de745 64 di = g_crypto_funcs->ccsha256_di;
316670eb
A
65
66 ccdigest_final(di, ctx->ctx, digest);
67}
68
0a7de745
A
69void
70SHA384_Init(SHA384_CTX *ctx)
316670eb
A
71{
72 const struct ccdigest_info *di;
0a7de745
A
73 di = g_crypto_funcs->ccsha384_di;
74
75 /* Make sure the context size for the digest info fits in the one we have */
76 if (ccdigest_di_size(di) > sizeof(SHA384_CTX)) {
77 panic("%s: inconsistent size for SHA384 context", __FUNCTION__);
78 }
316670eb 79
316670eb
A
80 g_crypto_funcs->ccdigest_init_fn(di, ctx->ctx);
81}
82
0a7de745
A
83void
84SHA384_Update(SHA384_CTX *ctx, const void *data, size_t len)
316670eb
A
85{
86 const struct ccdigest_info *di;
0a7de745 87 di = g_crypto_funcs->ccsha384_di;
316670eb
A
88
89 g_crypto_funcs->ccdigest_update_fn(di, ctx->ctx, len, data);
90}
91
92
0a7de745
A
93void
94SHA384_Final(void *digest, SHA384_CTX *ctx)
316670eb
A
95{
96 const struct ccdigest_info *di;
0a7de745 97 di = g_crypto_funcs->ccsha384_di;
316670eb
A
98
99 ccdigest_final(di, ctx->ctx, digest);
100}
101
0a7de745
A
102void
103SHA512_Init(SHA512_CTX *ctx)
316670eb
A
104{
105 const struct ccdigest_info *di;
0a7de745
A
106 di = g_crypto_funcs->ccsha512_di;
107
108 /* Make sure the context size for the digest info fits in the one we have */
109 if (ccdigest_di_size(di) > sizeof(SHA512_CTX)) {
110 panic("%s: inconsistent size for SHA512 context", __FUNCTION__);
111 }
316670eb 112
316670eb
A
113 g_crypto_funcs->ccdigest_init_fn(di, ctx->ctx);
114}
115
0a7de745
A
116void
117SHA512_Update(SHA512_CTX *ctx, const void *data, size_t len)
316670eb
A
118{
119 const struct ccdigest_info *di;
0a7de745 120 di = g_crypto_funcs->ccsha512_di;
316670eb
A
121
122 g_crypto_funcs->ccdigest_update_fn(di, ctx->ctx, len, data);
123}
124
0a7de745
A
125void
126SHA512_Final(void *digest, SHA512_CTX *ctx)
316670eb
A
127{
128 const struct ccdigest_info *di;
0a7de745 129 di = g_crypto_funcs->ccsha512_di;
316670eb
A
130
131 ccdigest_final(di, ctx->ctx, digest);
132}
39037602
A
133
134#else
135
a39ff7e2
A
136/* As these are part of the KPI, we need to stub them out for any kernel configuration that does not support SHA2. */
137
0a7de745
A
138void UNSUPPORTED_API(SHA256_Init, SHA256_CTX *ctx);
139void UNSUPPORTED_API(SHA384_Init, SHA384_CTX *ctx);
140void UNSUPPORTED_API(SHA512_Init, SHA512_CTX *ctx);
a39ff7e2
A
141void UNSUPPORTED_API(SHA256_Update, SHA256_CTX *ctx, const void *data, size_t len);
142void UNSUPPORTED_API(SHA384_Update, SHA384_CTX *ctx, const void *data, size_t len);
143void UNSUPPORTED_API(SHA512_Update, SHA512_CTX *ctx, const void *data, size_t len);
0a7de745
A
144void UNSUPPORTED_API(SHA256_Final, void *digest, SHA256_CTX *ctx);
145void UNSUPPORTED_API(SHA384_Final, void *digest, SHA384_CTX *ctx);
146void UNSUPPORTED_API(SHA512_Final, void *digest, SHA512_CTX *ctx);
39037602
A
147
148#endif