You've already forked slimbootloader
mirror of
https://github.com/Dasharo/slimbootloader.git
synced 2026-03-06 15:26:20 -08:00
Latest ipp-crytpo code is FIPS compliant. Need to add it as a submodule to maintain FIPS compliance. This requires adding each ASM optimized implementation as a separate .inf file and selecting at the platform level. Old IppCryptoLib instance needs to be kept for backwards compatibility. Signed-off-by: Bejean Mosher <bejean.mosher@intel.com>
158 lines
3.9 KiB
C
158 lines
3.9 KiB
C
/** @file
|
|
|
|
Copyright (c) 2019, Intel Corporation. All rights reserved.<BR>
|
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
|
|
|
**/
|
|
|
|
|
|
#include "owndefs.h"
|
|
#include "owncp.h"
|
|
#include "pcphash.h"
|
|
#include "pcptool.h"
|
|
#include "pcphash_rmf.h"
|
|
#include "pcpsha512stuff.h"
|
|
|
|
#include <Library/CryptoLib.h>
|
|
#include <Library/DebugLib.h>
|
|
|
|
/**
|
|
Initializes user context for hash computation. Compaitable with XIP.
|
|
|
|
@retval Pointer to SHA384 hash-method.
|
|
**/
|
|
IPPFUN( const IppsHashMethod*, ippsHashMethod_SHA384Sbl, (void) )
|
|
{
|
|
static IppsHashMethod method = {
|
|
ippHashAlg_SHA384,
|
|
IPP_SHA384_DIGEST_BITSIZE/8,
|
|
MBS_SHA512,
|
|
MLR_SHA512,
|
|
sha512_384_hashInit,
|
|
sha512_hashUpdate,
|
|
sha512_384_hashOctString,
|
|
sha512_msgRep
|
|
};
|
|
return &method;
|
|
}
|
|
|
|
/**
|
|
Computes the SHA-384 message digest of a input data buffer.
|
|
|
|
This function performs the SHA-384 message digest of a given data buffer, and places
|
|
the digest value into the specified memory.
|
|
|
|
@param[in] pMsg Pointer to the buffer containing the data to be hashed.
|
|
@param[in] msgLen Length of Data buffer in bytes.
|
|
@param[out] pMD Pointer to a buffer that receives the SHA-384 digest
|
|
value (48 bytes).
|
|
|
|
@retval A pointer to SHA-384 digest value
|
|
**/
|
|
Ipp8u*
|
|
EFIAPI
|
|
Sha384 (const Ipp8u* pMsg, Ipp32u msgLen, Ipp8u* pMD)
|
|
{
|
|
if (FixedPcdGet8(PcdIppHashLibSupportedMask) & IPP_HASHLIB_SHA2_384) {
|
|
ippsHashMessage_rmf(pMsg, msgLen, pMD, ippsHashMethod_SHA384Sbl ());
|
|
return pMD;
|
|
|
|
} else {
|
|
pMD = NULL;
|
|
return pMD;
|
|
}
|
|
}
|
|
|
|
/**
|
|
Initializes the hash context for SHA384 hashing.
|
|
|
|
@param[in] HashCtx Pointer to the hash context buffer.
|
|
@param[in] HashCtxSize Length of the hash context.
|
|
|
|
@retval RETURN_SUCCESS Success.
|
|
@retval RETURN_BUFFER_TOO_SMALL Hash context buffer size is not large enough.
|
|
@retval RETURN_SECURITY_VIOLATION All other errors.
|
|
**/
|
|
RETURN_STATUS
|
|
EFIAPI
|
|
Sha384Init (
|
|
IN HASH_CTX *HashCtx,
|
|
IN Ipp32u HashCtxSize
|
|
)
|
|
{
|
|
if (FixedPcdGet8(PcdIppHashLibSupportedMask) & IPP_HASHLIB_SHA2_384) {
|
|
if (HashCtxSize < sizeof(IppsHashState_rmf)) {
|
|
return RETURN_BUFFER_TOO_SMALL;
|
|
}
|
|
|
|
if (ippsHashInit_rmf((IppsHashState_rmf*)HashCtx, ippsHashMethod_SHA384Sbl ()) == ippStsNoErr) {
|
|
return RETURN_SUCCESS;
|
|
}
|
|
|
|
return RETURN_SECURITY_VIOLATION;
|
|
|
|
} else {
|
|
return RETURN_UNSUPPORTED;
|
|
}
|
|
}
|
|
|
|
/**
|
|
Consumes the data for SHA384 hashing.
|
|
This method can be called multiple times to hash separate pieces of data.
|
|
|
|
@param[in] HashCtx Pointer to the hash context buffer.
|
|
@param[in] Msg Data to be hashed.
|
|
@param[in] MsgLen Length of data to be hashed.
|
|
|
|
@retval RETURN_SUCCESS Success.
|
|
@retval RETURN_SECURITY_VIOLATION All other errors.
|
|
**/
|
|
RETURN_STATUS
|
|
EFIAPI
|
|
Sha384Update (
|
|
IN HASH_CTX *HashCtx,
|
|
IN CONST Ipp8u *Msg,
|
|
IN Ipp32u MsgLen
|
|
)
|
|
{
|
|
if (FixedPcdGet8(PcdIppHashLibSupportedMask) & IPP_HASHLIB_SHA2_384) {
|
|
if (ippsHashUpdate_rmf(Msg, MsgLen, (IppsHashState_rmf*)HashCtx) == ippStsNoErr) {
|
|
return RETURN_SUCCESS;
|
|
}
|
|
|
|
return RETURN_SECURITY_VIOLATION;
|
|
|
|
} else {
|
|
return RETURN_UNSUPPORTED;
|
|
}
|
|
}
|
|
|
|
|
|
/**
|
|
Finalizes the SHA384 hashing and returns the hash.
|
|
|
|
@param[in] HashCtx Pointer to the hash context buffer.
|
|
@param[out] Hash Sha384 hash of the data.
|
|
|
|
@retval RETURN_SUCCESS Success.
|
|
@retval RETURN_SECURITY_VIOLATION All other errors.
|
|
**/
|
|
RETURN_STATUS
|
|
EFIAPI
|
|
Sha384Final (
|
|
IN HASH_CTX *HashCtx,
|
|
OUT Ipp8u *Hash
|
|
)
|
|
{
|
|
if (FixedPcdGet8(PcdIppHashLibSupportedMask) & IPP_HASHLIB_SHA2_384) {
|
|
if (ippsHashFinal_rmf(Hash, (IppsHashState_rmf*)HashCtx) == ippStsNoErr) {
|
|
return RETURN_SUCCESS;
|
|
}
|
|
|
|
return RETURN_SECURITY_VIOLATION;
|
|
|
|
} else {
|
|
return RETURN_UNSUPPORTED;
|
|
}
|
|
}
|