2020-08-13 08:30:59 +00:00
|
|
|
// Copyright 2020 Espressif Systems (Shanghai) PTE LTD
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
// The HAL layer for SHA
|
|
|
|
|
|
|
|
#include "hal/sha_hal.h"
|
|
|
|
#include "hal/sha_types.h"
|
|
|
|
#include "hal/sha_ll.h"
|
|
|
|
#include "soc/soc_caps.h"
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
|
|
|
|
|
|
|
|
#define SHA1_STATE_LEN_WORDS (160 / 32)
|
|
|
|
#define SHA256_STATE_LEN_WORDS (256 / 32)
|
|
|
|
#define SHA512_STATE_LEN_WORDS (512 / 32)
|
|
|
|
|
|
|
|
#if CONFIG_IDF_TARGET_ESP32
|
|
|
|
|
|
|
|
/* Return state size (in words) for a given SHA type */
|
|
|
|
inline static size_t state_length(esp_sha_type type)
|
|
|
|
{
|
|
|
|
switch (type) {
|
|
|
|
case SHA1:
|
|
|
|
return SHA1_STATE_LEN_WORDS;
|
|
|
|
case SHA2_256:
|
|
|
|
return SHA256_STATE_LEN_WORDS;
|
|
|
|
case SHA2_384:
|
|
|
|
case SHA2_512:
|
|
|
|
return SHA512_STATE_LEN_WORDS;
|
|
|
|
default:
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#else
|
|
|
|
/* Return state size (in words) for a given SHA type */
|
|
|
|
inline static size_t state_length(esp_sha_type type)
|
|
|
|
{
|
|
|
|
switch (type) {
|
|
|
|
case SHA1:
|
|
|
|
return SHA1_STATE_LEN_WORDS;
|
|
|
|
case SHA2_224:
|
|
|
|
case SHA2_256:
|
|
|
|
return SHA256_STATE_LEN_WORDS;
|
2020-12-16 09:03:48 +00:00
|
|
|
#if SOC_SHA_SUPPORT_SHA384
|
2020-08-13 08:30:59 +00:00
|
|
|
case SHA2_384:
|
2020-12-16 09:03:48 +00:00
|
|
|
return SHA512_STATE_LEN_WORDS;
|
|
|
|
#endif
|
|
|
|
#if SOC_SHA_SUPPORT_SHA512
|
2020-08-13 08:30:59 +00:00
|
|
|
case SHA2_512:
|
2020-12-16 09:03:48 +00:00
|
|
|
return SHA512_STATE_LEN_WORDS;
|
|
|
|
#endif
|
|
|
|
#if SOC_SHA_SUPPORT_SHA512_T
|
2020-08-13 08:30:59 +00:00
|
|
|
case SHA2_512224:
|
|
|
|
case SHA2_512256:
|
|
|
|
case SHA2_512T:
|
|
|
|
return SHA512_STATE_LEN_WORDS;
|
2020-12-16 09:03:48 +00:00
|
|
|
#endif
|
2020-08-13 08:30:59 +00:00
|
|
|
default:
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
|
|
/* Hash a single block */
|
|
|
|
void sha_hal_hash_block(esp_sha_type sha_type, const void *data_block, size_t block_word_len, bool first_block)
|
|
|
|
{
|
|
|
|
sha_hal_wait_idle();
|
|
|
|
|
|
|
|
sha_ll_fill_text_block(data_block, block_word_len);
|
|
|
|
|
|
|
|
/* Start hashing */
|
|
|
|
if (first_block) {
|
|
|
|
sha_ll_start_block(sha_type);
|
|
|
|
} else {
|
|
|
|
sha_ll_continue_block(sha_type);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#if SOC_SHA_SUPPORT_DMA
|
|
|
|
|
|
|
|
/* Hashes a number of message blocks using DMA */
|
2021-01-14 07:25:06 +00:00
|
|
|
void sha_hal_hash_dma(esp_sha_type sha_type, size_t num_blocks, bool first_block)
|
2020-08-13 08:30:59 +00:00
|
|
|
{
|
|
|
|
sha_hal_wait_idle();
|
|
|
|
|
|
|
|
sha_ll_set_block_num(num_blocks);
|
|
|
|
|
|
|
|
/* Start hashing */
|
|
|
|
if (first_block) {
|
|
|
|
sha_ll_start_dma(sha_type);
|
|
|
|
} else {
|
|
|
|
sha_ll_continue_dma(sha_type);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif //SOC_SHA_SUPPORT_DMA
|
|
|
|
|
|
|
|
void sha_hal_wait_idle()
|
|
|
|
{
|
|
|
|
while (sha_ll_busy()) {
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Reads the current message digest from the SHA engine */
|
|
|
|
void sha_hal_read_digest(esp_sha_type sha_type, void *digest_state)
|
|
|
|
{
|
|
|
|
uint32_t *digest_state_words = (uint32_t *)digest_state;
|
|
|
|
|
|
|
|
sha_ll_load(sha_type);
|
|
|
|
uint32_t word_len = state_length(sha_type);
|
|
|
|
|
|
|
|
sha_hal_wait_idle();
|
|
|
|
sha_ll_read_digest(sha_type, digest_state, word_len);
|
|
|
|
|
|
|
|
/* Fault injection check: verify SHA engine actually ran,
|
|
|
|
state is not all zeroes.
|
|
|
|
*/
|
2020-11-17 04:48:35 +00:00
|
|
|
for (size_t i = 0; i < word_len; i++) {
|
2020-08-13 08:30:59 +00:00
|
|
|
if (digest_state_words[i] != 0) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
abort(); // SHA peripheral returned all zero state, probably due to fault injection
|
|
|
|
}
|
|
|
|
|
|
|
|
#if SOC_SHA_SUPPORT_RESUME
|
|
|
|
/* Writes the message digest to the SHA engine */
|
|
|
|
void sha_hal_write_digest(esp_sha_type sha_type, void *digest_state)
|
|
|
|
{
|
|
|
|
sha_ll_write_digest(sha_type, digest_state, state_length(sha_type));
|
|
|
|
}
|
|
|
|
#endif //SOC_SHA_SUPPORT_RESUME
|
|
|
|
|
|
|
|
#if SOC_SHA_SUPPORT_SHA512_T
|
|
|
|
|
|
|
|
/* Calculates and sets the initial digiest for SHA512_t */
|
|
|
|
void sha_hal_sha512_init_hash(uint32_t t_string, uint8_t t_len)
|
|
|
|
{
|
|
|
|
sha_ll_t_string_set(t_string);
|
|
|
|
sha_ll_t_len_set(t_len);
|
|
|
|
|
|
|
|
sha_ll_start_block(SHA2_512T);
|
|
|
|
|
|
|
|
sha_hal_wait_idle();
|
|
|
|
}
|
2020-11-10 07:40:01 +00:00
|
|
|
#endif //SOC_SHA_SUPPORT_SHA512_T
|