Files
luban-lite-t3e-pro/packages/third-party/mbedtls/ports/src/sha256_alt.c
刘可亮 0a13af6a1d V1.0.5
2024-06-04 19:00:30 +08:00

193 lines
4.5 KiB
C

/*
* FIPS-180-2 compliant SHA-256 implementation
*
* Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
* SPDX-License-Identifier: Apache-2.0
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
* This file is part of mbed TLS (https://tls.mbed.org)
*/
/*
* The SHA-256 Secure Hash Standard was published by NIST in 2002.
*
* http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf
*/
#if !defined(MBEDTLS_CONFIG_FILE)
#include "mbedtls/config.h"
#else
#include MBEDTLS_CONFIG_FILE
#endif
#if defined(MBEDTLS_SHA256_C)
#include "sha256_alt.h"
#include <string.h>
#include <rtthread.h>
#include <rtdevice.h>
#include <stdio.h>
#define DBG_SECTION_NAME "SHA256_ALT"
#define DBG_LEVEL DBG_INFO
#include <rtdbg.h>
#if defined(MBEDTLS_SHA256_ALT)
void mbedtls_sha256_init(mbedtls_sha256_context *ctx)
{
if (ctx)
{
*ctx = rt_hwcrypto_hash_create(rt_hwcrypto_dev_default(), HWCRYPTO_TYPE_SHA2);
LOG_D("sha2 init ctx[%08x]", *ctx);
}
else
{
LOG_E("sha2 init. but ctx is null");
}
}
void mbedtls_sha256_free(mbedtls_sha256_context *ctx)
{
if (ctx)
{
LOG_D("sha2 free ctx[%08x]", *ctx);
rt_hwcrypto_hash_destroy(*ctx);
}
else
{
LOG_E("sha2 free. but ctx is null");
}
}
void mbedtls_sha256_clone(mbedtls_sha256_context *dst,
const mbedtls_sha256_context *src)
{
if (dst && src)
{
LOG_D("sha2 clone des[%08x] src[%08x]", *dst, *src);
rt_hwcrypto_hash_cpy(*dst, *src);
}
else
{
LOG_E("sha2 clone. but dst or src is null");
}
}
/*
* SHA-256 context setup
*/
int mbedtls_sha256_starts_ret(mbedtls_sha256_context *ctx, int is224)
{
if (ctx)
{
LOG_D("sha2-%s starts ctx[%08x]", is224 ? "224" : "256", *ctx);
if (is224)
{
rt_hwcrypto_hash_set_type(*ctx, HWCRYPTO_TYPE_SHA224);
}
else
{
rt_hwcrypto_hash_set_type(*ctx, HWCRYPTO_TYPE_SHA256);
}
rt_hwcrypto_hash_reset(*ctx);
}
else
{
LOG_E("sha2 starts. but ctx is null");
}
return (0);
}
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
void mbedtls_sha256_starts(mbedtls_sha256_context *ctx,
int is224)
{
mbedtls_sha256_starts_ret(ctx, is224);
}
#endif
#if !defined(MBEDTLS_SHA256_PROCESS_ALT)
int mbedtls_internal_sha256_process(mbedtls_sha256_context *ctx,
const unsigned char data[64])
{
return mbedtls_sha256_update_ret(ctx, data, 64);
}
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
void mbedtls_sha256_process(mbedtls_sha256_context *ctx,
const unsigned char data[64])
{
mbedtls_internal_sha256_process(ctx, data);
}
#endif
#endif /* !MBEDTLS_SHA256_PROCESS_ALT */
/*
* SHA-256 process buffer
*/
int mbedtls_sha256_update_ret(mbedtls_sha256_context *ctx, const unsigned char *input,
size_t ilen)
{
if (ctx)
{
LOG_D("sha2 update ctx[%08x] len:%d in:%08x", *ctx, ilen, input);
rt_hwcrypto_hash_update(*ctx, input, ilen);
}
else
{
LOG_E("sha2 update. but ctx is null");
}
return 0;
}
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
void mbedtls_sha256_update(mbedtls_sha256_context *ctx,
const unsigned char *input,
size_t ilen)
{
mbedtls_sha256_update_ret(ctx, input, ilen);
}
#endif
/*
* SHA-256 final digest
*/
int mbedtls_sha256_finish_ret(mbedtls_sha256_context *ctx, unsigned char output[32])
{
if (ctx)
{
LOG_D("sha2 finish ctx[%08x] out:%08x", *ctx, output);
rt_hwcrypto_hash_finish(*ctx, output, 32);
}
else
{
LOG_E("sha2 finish. but ctx is null");
}
return 0;
}
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
void mbedtls_sha256_finish(mbedtls_sha256_context *ctx,
unsigned char output[32])
{
mbedtls_sha256_finish_ret(ctx, output);
}
#endif
#endif /* MBEDTLS_SELF_TEST */
#endif /* MBEDTLS_SHA256_C */