Compare commits
70 Commits
OpenSSL_1_
...
OpenSSL-fi
Author | SHA1 | Date | |
---|---|---|---|
![]() |
4089bd6080 | ||
![]() |
baab0cf780 | ||
![]() |
7e98d95f56 | ||
![]() |
b0ee17ad47 | ||
![]() |
4f6c4c1896 | ||
![]() |
2d183e4c44 | ||
![]() |
7049d13c5f | ||
![]() |
c616200172 | ||
![]() |
7b899c10cd | ||
![]() |
6b2e340bdd | ||
![]() |
1de6a62222 | ||
![]() |
ac381944ac | ||
![]() |
24fadf2a20 | ||
![]() |
409abd2fec | ||
![]() |
421de62232 | ||
![]() |
c567812fa6 | ||
![]() |
49dbcbaa4b | ||
![]() |
df0884ffb7 | ||
![]() |
0e480d5553 | ||
![]() |
7c0d30038f | ||
![]() |
81fc8cd029 | ||
![]() |
1d235039d6 | ||
![]() |
58886fdefc | ||
![]() |
61c3085d47 | ||
![]() |
32b56fe4d2 | ||
![]() |
efd031abca | ||
![]() |
dd4eefdb7b | ||
![]() |
fcd3e8e97b | ||
![]() |
476e7e4972 | ||
![]() |
5e900f3cef | ||
![]() |
75b250a4ed | ||
![]() |
44cb365eaf | ||
![]() |
9bd2dde42f | ||
![]() |
31bf5f13e0 | ||
![]() |
7dcdc0d94d | ||
![]() |
6ecd287acc | ||
![]() |
0e508c12e0 | ||
![]() |
f6385248f6 | ||
![]() |
52876c3100 | ||
![]() |
c08128acc2 | ||
![]() |
901b9b5c36 | ||
![]() |
9eca2399f1 | ||
![]() |
3b4fb53221 | ||
![]() |
7437036cdf | ||
![]() |
ffa76736fa | ||
![]() |
cbed6cfcaa | ||
![]() |
be6dc7e56b | ||
![]() |
bb25a72881 | ||
![]() |
1562ce17cb | ||
![]() |
68b2f55b90 | ||
![]() |
79f2c9d1cd | ||
![]() |
8a794abd9d | ||
![]() |
03eae35352 | ||
![]() |
df64f34e84 | ||
![]() |
21a5cb2696 | ||
![]() |
01fc2c1598 | ||
![]() |
04c8062636 | ||
![]() |
6fcc2bbce8 | ||
![]() |
f2b0cf9178 | ||
![]() |
485ef852ac | ||
![]() |
b7de76b74d | ||
![]() |
8ab0d50c43 | ||
![]() |
cb47a7107f | ||
![]() |
d5939062d7 | ||
![]() |
8b8096d082 | ||
![]() |
9ab6d6813e | ||
![]() |
45e5f551ac | ||
![]() |
51035e733c | ||
![]() |
319c7264b0 | ||
![]() |
0684e77866 |
41
CHANGES
41
CHANGES
@@ -4,6 +4,47 @@
|
||||
|
||||
Changes between 1.0.1 and 1.1.0 [xx XXX xxxx]
|
||||
|
||||
*) Add perl scripts to calculate FIPS signatures for Windows
|
||||
exectuables including WinCE.
|
||||
[Andy Polyakov]
|
||||
|
||||
*) Don't attempt to insert current time into AES/3DES tests, we should
|
||||
be just copying input line across and this breaks some systems lacking
|
||||
ctime.
|
||||
[Steve Henson]
|
||||
|
||||
*) Update Windows build system for FIPS. Don't compile algorithm test
|
||||
utilties by default: the target build_tests is needed for that. Add
|
||||
support for building fips_algvs with the build_algvs target.
|
||||
[Steve Henson]
|
||||
|
||||
*) Add initial cross compilation support for Windows build. The following
|
||||
environment variables should be set:
|
||||
|
||||
FIPS_SHA1_PATH: path to fips_standalone_sha1 exectutable which will
|
||||
be used explicitly and not built.
|
||||
FIPS_SIG: similar to other builds: path to a "get signature" script
|
||||
which is used to obtain the signature of the target instead of
|
||||
executing it on the host.
|
||||
[Steve Henson]
|
||||
|
||||
*) Add flag to EC_KEY to use cofactor ECDH if set.
|
||||
[Steve Henson]
|
||||
|
||||
*) Update fips_test_suite to support multiple command line options. New
|
||||
test to induce all self test errors in sequence and check expected
|
||||
failures.
|
||||
[Steve Henson]
|
||||
|
||||
*) Add FIPS_{rsa,dsa,ecdsa}_{sign,verify} functions which digest and
|
||||
sign or verify all in one operation.
|
||||
[Steve Henson]
|
||||
|
||||
*) Add fips_algvs: a multicall fips utility incorporaing all the algorithm
|
||||
test programs and fips_test_suite. Includes functionality to parse
|
||||
the minimal script output of fipsalgest.pl directly.
|
||||
[Steve Henson]
|
||||
|
||||
*) Add authorisation parameter to FIPS_module_mode_set().
|
||||
[Steve Henson]
|
||||
|
||||
|
11
Configure
11
Configure
@@ -397,6 +397,8 @@ my %table=(
|
||||
"linux-alpha+bwx-gcc","gcc:-O3 -DL_ENDIAN -DTERMIO::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_RISC1 DES_UNROLL:${alpha_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
|
||||
"linux-alpha-ccc","ccc:-fast -readonly_strings -DL_ENDIAN -DTERMIO::-D_REENTRANT:::SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_PTR DES_RISC1 DES_UNROLL:${alpha_asm}",
|
||||
"linux-alpha+bwx-ccc","ccc:-fast -readonly_strings -DL_ENDIAN -DTERMIO::-D_REENTRANT:::SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_PTR DES_RISC1 DES_UNROLL:${alpha_asm}",
|
||||
# eCos ARMv4/5
|
||||
"ecos-armv4", "gcc:-D__ECOS__ -I\$(ECOSCFG)/include -Wall -Wpointer-arith -Wstrict-prototypes -Wundef -Wno-write-strings -mno-thumb-interwork -mcpu=arm926ej-s -g -O2 -fno-exceptions::-D_REENTRANT::-nostartfiles -L\$(ECOSCFG)/lib -Ttarget.ld::".eval{my $asm=$armv4_asm;$asm=~s/armcap.o//;$asm},
|
||||
|
||||
# Android: linux-* but without -DTERMIO and pointers to headers and libs.
|
||||
"android","gcc:-mandroid -I\$(ANDROID_DEV)/include -B\$(ANDROID_DEV)/lib -O3 -fomit-frame-pointer -Wall::-D_REENTRANT::-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
|
||||
@@ -409,6 +411,8 @@ my %table=(
|
||||
"BSD-x86-elf", "gcc:-DL_ENDIAN -DTERMIOS -O3 -fomit-frame-pointer -Wall::${BSDthreads}:::BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:bsd-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
|
||||
"debug-BSD-x86-elf", "gcc:-DL_ENDIAN -DTERMIOS -O3 -Wall -g::${BSDthreads}:::BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:bsd-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
|
||||
"BSD-sparcv8", "gcc:-DB_ENDIAN -DTERMIOS -O3 -mv8 -Wall::${BSDthreads}:::BN_LLONG RC2_CHAR RC4_INDEX DES_INT DES_UNROLL:${sparcv8_asm}:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
|
||||
"BSD-ppc85xx","gcc:-DTERMIOS -O3 -fomit-frame-pointer -msoft-float -Wall::${BSDthreads}:::BN_LLONG RC2_CHAR RC4_INDEX DES_INT DES_UNROLL:${no_asm}:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
|
||||
"debug-BSD-ppc85xx","gcc:-DTERMIOS -O0 -fomit-frame-pointer -msoft-float -Wall -g::${BSDthreads}:::BN_LLONG RC2_CHAR RC4_INDEX DES_INT DES_UNROLL:${no_asm}:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
|
||||
|
||||
"BSD-generic64","gcc:-DTERMIOS -O3 -Wall::${BSDthreads}:::SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${no_asm}:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
|
||||
# -DMD32_REG_T=int doesn't actually belong in sparc64 target, it
|
||||
@@ -578,6 +582,8 @@ my %table=(
|
||||
"debug-darwin-i386-cc","cc:-arch i386 -g3 -DL_ENDIAN::-D_REENTRANT:MACOSX:-Wl,-search_paths_first%:BN_LLONG RC4_INT RC4_CHUNK DES_UNROLL BF_PTR:${x86_asm}:macosx:dlfcn:darwin-shared:-fPIC -fno-common:-arch i386 -dynamiclib:.\$(SHLIB_MAJOR).\$(SHLIB_MINOR).dylib",
|
||||
"darwin64-x86_64-cc","cc:-arch x86_64 -O3 -DL_ENDIAN -Wall::-D_REENTRANT:MACOSX:-Wl,-search_paths_first%:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:macosx:dlfcn:darwin-shared:-fPIC -fno-common:-arch x86_64 -dynamiclib:.\$(SHLIB_MAJOR).\$(SHLIB_MINOR).dylib",
|
||||
"debug-darwin-ppc-cc","cc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DCRYPTO_MDEBUG -DB_ENDIAN -g -Wall -O::-D_REENTRANT:MACOSX::BN_LLONG RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:${ppc32_asm}:osx32:dlfcn:darwin-shared:-fPIC:-dynamiclib:.\$(SHLIB_MAJOR).\$(SHLIB_MINOR).dylib",
|
||||
# iPhoneOS/iOS
|
||||
"iphoneos-cross","llvm-gcc:-O3 -isysroot \$(CROSS_TOP)/SDKs/\$(CROSS_SDK) -fomit-frame-pointer -fno-common::-D_REENTRANT:iOS:-Wl,-search_paths_first%:BN_LLONG RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:${no_asm}:dlfcn:darwin-shared:-fPIC -fno-common:-dynamiclib:.\$(SHLIB_MAJOR).\$(SHLIB_MINOR).dylib",
|
||||
|
||||
##### A/UX
|
||||
"aux3-gcc","gcc:-O2 -DTERMIO::(unknown):AUX:-lbsd:RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:::",
|
||||
@@ -608,12 +614,14 @@ my %table=(
|
||||
"uClinux-dist","$ENV{'CC'}:\$(CFLAGS)::-D_REENTRANT::\$(LDFLAGS) \$(LDLIBS):BN_LLONG:${no_asm}:$ENV{'LIBSSL_dlfcn'}:linux-shared:-fPIC:-shared:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):$ENV{'RANLIB'}::",
|
||||
"uClinux-dist64","$ENV{'CC'}:\$(CFLAGS)::-D_REENTRANT::\$(LDFLAGS) \$(LDLIBS):SIXTY_FOUR_BIT_LONG:${no_asm}:$ENV{'LIBSSL_dlfcn'}:linux-shared:-fPIC:-shared:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):$ENV{'RANLIB'}::",
|
||||
|
||||
"c64xplus","cl6x:-mv6400+ -o2 -ox -ms -pden -DNO_SYS_TYPES_H -DGETPID_IS_MEANINGLESS -DMD32_REG_T=int -DOPENSSL_SMALL_FOOTPRINT:<c6x.h>::DSPBIOS::BN_LLONG:c64xpluscpuid.o:bn-c64xplus.o c64xplus-gf2m.o::aes-c64xplus.o aes_cbc.o aes_ctr.o:::sha1-c64xplus.o sha256-c64xplus.o sha512-c64xplus.o:::::::ghash-c64xplus.o::void:",
|
||||
|
||||
);
|
||||
|
||||
my @MK1MF_Builds=qw(VC-WIN64I VC-WIN64A
|
||||
debug-VC-WIN64I debug-VC-WIN64A
|
||||
VC-NT VC-CE VC-WIN32 debug-VC-WIN32
|
||||
BC-32
|
||||
BC-32 c64xplus
|
||||
netware-clib netware-clib-bsdsock
|
||||
netware-libc netware-libc-bsdsock);
|
||||
|
||||
@@ -906,6 +914,7 @@ EOF
|
||||
}
|
||||
elsif (/^-[^-]/ or /^\+/)
|
||||
{
|
||||
$_ =~ s/%([0-9a-f]{1,2})/chr(hex($1))/gei;
|
||||
$flags.=$_." ";
|
||||
}
|
||||
elsif (/^--prefix=(.*)$/)
|
||||
|
@@ -186,7 +186,7 @@ SHARED_LDFLAGS=
|
||||
GENERAL= Makefile
|
||||
BASENAME= openssl
|
||||
NAME= $(BASENAME)-$(VERSION)
|
||||
TARFILE= openssl-fips-2.0-test.tar
|
||||
TARFILE= openssl-fips-2.0.tar
|
||||
WTARFILE= $(NAME)-win.tar
|
||||
EXHEADER= e_os2.h
|
||||
HEADER= e_os.h
|
||||
@@ -387,6 +387,8 @@ build_apps:
|
||||
@dir=apps; target=all; $(BUILD_ONE_CMD)
|
||||
build_tests:
|
||||
@dir=test; target=fipsexe; $(BUILD_ONE_CMD)
|
||||
build_algvs:
|
||||
@dir=test; target=fipsalgvs; $(BUILD_ONE_CMD)
|
||||
build_tools:
|
||||
@dir=tools; target=all; $(BUILD_ONE_CMD)
|
||||
|
||||
@@ -522,8 +524,8 @@ files:
|
||||
links:
|
||||
@$(PERL) $(TOP)/util/mkdir-p.pl include/openssl
|
||||
@$(PERL) $(TOP)/util/mklink.pl include/openssl $(EXHEADER)
|
||||
@set -e; dir=fips target=links; $(RECURSIVE_BUILD_CMD)
|
||||
@(cd crypto ; SDIRS='$(LINKDIRS)' $(MAKE) -e links)
|
||||
@set -e; dir=fips target=links; $(BUILD_ONE_CMD)
|
||||
@(cd crypto ; TEST='' SDIRS='$(LINKDIRS)' $(MAKE) -e links)
|
||||
|
||||
gentests:
|
||||
@(cd test && echo "generating dummy tests (if needed)..." && \
|
||||
@@ -536,9 +538,7 @@ dclean:
|
||||
test: tests
|
||||
|
||||
tests:
|
||||
@(cd test && echo "testing..." && \
|
||||
$(CLEARENV) && $(MAKE) -e $(BUILDENV) TOP=.. TESTS='$(TESTS)' OPENSSL_DEBUG_MEMORY=on OPENSSL_CONF=../apps/openssl.cnf tests );
|
||||
OPENSSL_CONF=apps/openssl.cnf util/opensslwrap.sh version -a
|
||||
@echo "Not implemented in FIPS build" ; false
|
||||
|
||||
report:
|
||||
@$(PERL) util/selftest.pl
|
||||
|
@@ -1,4 +1,4 @@
|
||||
Preliminary status and build information for FIPS module v2.0
|
||||
Preliminary status and build information for FIPS module v2.0
|
||||
|
||||
NB: if you are cross compiling you now need to use the latest "incore" script
|
||||
this can be found at util/incore in the tarballs.
|
||||
|
33
TABLE
33
TABLE
@@ -3465,6 +3465,39 @@ $ranlib =
|
||||
$arflags =
|
||||
$multilib =
|
||||
|
||||
*** iphoneos-cross
|
||||
$cc = llvm-gcc
|
||||
$cflags = -O3 -isysroot $(CROSS_TOP)/SDKs/$(CROSS_SDK) -fomit-frame-pointer -fno-common
|
||||
$unistd =
|
||||
$thread_cflag = -D_REENTRANT
|
||||
$sys_id = iOS
|
||||
$lflags = -Wl,-search_paths_first%
|
||||
$bn_ops = BN_LLONG RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR
|
||||
$cpuid_obj =
|
||||
$bn_obj =
|
||||
$des_obj =
|
||||
$aes_obj =
|
||||
$bf_obj =
|
||||
$md5_obj =
|
||||
$sha1_obj =
|
||||
$cast_obj =
|
||||
$rc4_obj =
|
||||
$rmd160_obj =
|
||||
$rc5_obj =
|
||||
$wp_obj =
|
||||
$cmll_obj =
|
||||
$modes_obj =
|
||||
$engines_obj =
|
||||
$perlasm_scheme = void
|
||||
$dso_scheme = dlfcn
|
||||
$shared_target= darwin-shared
|
||||
$shared_cflag = -fPIC -fno-common
|
||||
$shared_ldflag = -dynamiclib
|
||||
$shared_extension = .$(SHLIB_MAJOR).$(SHLIB_MINOR).dylib
|
||||
$ranlib =
|
||||
$arflags =
|
||||
$multilib =
|
||||
|
||||
*** irix-cc
|
||||
$cc = cc
|
||||
$cflags = -O2 -use_readonly_const -DTERMIOS -DB_ENDIAN
|
||||
|
7
c6x/do_fips
Normal file
7
c6x/do_fips
Normal file
@@ -0,0 +1,7 @@
|
||||
#!/bin/sh
|
||||
|
||||
perl Configure c64xplus fipscanisteronly no-engine
|
||||
perl util/mkfiles.pl > MINFO
|
||||
perl util/mk1mf.pl auto > c6x/fips.mak
|
||||
make -f c6x/fips.mak
|
||||
make -f c6x/fips_algvs.mak
|
7
c6x/env
Normal file
7
c6x/env
Normal file
@@ -0,0 +1,7 @@
|
||||
# MSYS-style PATH
|
||||
export PATH=/c/CCStudio_v3.3/c6000/cgtools/bin:/c/Program\ Files/ActivePerl58/bin:$PATH
|
||||
|
||||
# Windows-style variables
|
||||
export C6X_C_DIR='C:\CCStudio_v3.3\c6000\cgtools\include;C:\CCStudio_v3.3\c6000\cgtools\lib'
|
||||
|
||||
export PERL5LIB=C:/CCStudio_v3.3/bin/utilities/ccs_scripting
|
32
c6x/fips_standalone_sha1
Normal file
32
c6x/fips_standalone_sha1
Normal file
@@ -0,0 +1,32 @@
|
||||
#!/usr/bin/env perl
|
||||
#
|
||||
$0 =~ m/(.*[\/\\])[^\/\\]+$/; $dir=$1;
|
||||
|
||||
unshift(@INC,$dir);
|
||||
require "hmac_sha1.pl";
|
||||
|
||||
(!@ARV[0] && -f @ARGV[$#ARGV]) || die "usage: $0 [-verify] file";
|
||||
|
||||
$verify=shift if (@ARGV[0] eq "-verify");
|
||||
|
||||
sysopen(FD,@ARGV[0],0) || die "$!";
|
||||
binmode(FD);
|
||||
|
||||
my $ctx = HMAC->Init("etaonrishdlcupfm");
|
||||
|
||||
while (read(FD,$blob,4*1024)) { $ctx->Update($blob); }
|
||||
|
||||
close(FD);
|
||||
|
||||
my $signature = unpack("H*",$ctx->Final());
|
||||
|
||||
print "HMAC-SHA1(@ARGV[0])= $signature\n";
|
||||
|
||||
if ($verify) {
|
||||
open(FD,"<@ARGV[0].sha1") || die "$!";
|
||||
$line = <FD>;
|
||||
close(FD);
|
||||
exit(0) if ($line =~ /HMAC\-SHA1\([^\)]*\)=\s*([0-9a-f]+)/i &&
|
||||
$1 eq $signature);
|
||||
die "signature mismatch";
|
||||
}
|
19
c6x/fipscanister.cmd
Normal file
19
c6x/fipscanister.cmd
Normal file
@@ -0,0 +1,19 @@
|
||||
SECTIONS
|
||||
{
|
||||
.text:
|
||||
{
|
||||
*(.fips_text:start)
|
||||
*(.text)
|
||||
*(.const:aes_asm)
|
||||
*(.const:sha_asm)
|
||||
*(.const:des_sptrans)
|
||||
*(.switch)
|
||||
*(.fips_text:end)
|
||||
}
|
||||
.const:
|
||||
{
|
||||
*(.fips_const:start)
|
||||
*(.const)
|
||||
*(.fips_const:end)
|
||||
}
|
||||
}
|
196
c6x/hmac_sha1.pl
Normal file
196
c6x/hmac_sha1.pl
Normal file
@@ -0,0 +1,196 @@
|
||||
#!/usr/bin/env perl
|
||||
#
|
||||
# Copyright (c) 2011 The OpenSSL Project.
|
||||
#
|
||||
######################################################################
|
||||
#
|
||||
# SHA1 and HMAC in Perl by <appro@openssl.org>.
|
||||
#
|
||||
{ package SHA1;
|
||||
use integer;
|
||||
|
||||
{
|
||||
################################### SHA1 block code generator
|
||||
my @V = ('$A','$B','$C','$D','$E');
|
||||
my $i;
|
||||
|
||||
sub XUpdate {
|
||||
my $ret;
|
||||
$ret="(\$T=\$W[($i-16)%16]^\$W[($i-14)%16]^\$W[($i-8)%16]^\$W[($i-3)%16],\n\t";
|
||||
if ((1<<31)<<1) {
|
||||
$ret.=" \$W[$i%16]=((\$T<<1)|(\$T>>31))&0xffffffff)\n\t ";
|
||||
} else {
|
||||
$ret.=" \$W[$i%16]=(\$T<<1)|((\$T>>31)&1))\n\t ";
|
||||
}
|
||||
}
|
||||
sub tail {
|
||||
my ($a,$b,$c,$d,$e)=@V;
|
||||
my $ret;
|
||||
if ((1<<31)<<1) {
|
||||
$ret.="(($a<<5)|($a>>27));\n\t";
|
||||
$ret.="$b=($b<<30)|($b>>2); $e&=0xffffffff; #$b&=0xffffffff;\n\t";
|
||||
} else {
|
||||
$ret.="(($a<<5)|($a>>27)&0x1f);\n\t";
|
||||
$ret.="$b=($b<<30)|($b>>2)&0x3fffffff;\n\t";
|
||||
}
|
||||
$ret;
|
||||
}
|
||||
sub BODY_00_15 {
|
||||
my ($a,$b,$c,$d,$e)=@V;
|
||||
"$e+=\$W[$i]+0x5a827999+((($c^$d)&$b)^$d)+".tail();
|
||||
}
|
||||
sub BODY_16_19 {
|
||||
my ($a,$b,$c,$d,$e)=@V;
|
||||
"$e+=".XUpdate()."+0x5a827999+((($c^$d)&$b)^$d)+".tail();
|
||||
}
|
||||
sub BODY_20_39 {
|
||||
my ($a,$b,$c,$d,$e)=@V;
|
||||
"$e+=".XUpdate()."+0x6ed9eba1+($b^$c^$d)+".tail();
|
||||
}
|
||||
sub BODY_40_59 {
|
||||
my ($a,$b,$c,$d,$e)=@V;
|
||||
"$e+=".XUpdate()."+0x8f1bbcdc+(($b&$c)|(($b|$c)&$d))+".tail();
|
||||
}
|
||||
sub BODY_60_79 {
|
||||
my ($a,$b,$c,$d,$e)=@V;
|
||||
"$e+=".XUpdate()."+0xca62c1d6+($b^$c^$d)+".tail();
|
||||
}
|
||||
|
||||
my $sha1_impl =
|
||||
'sub block {
|
||||
my $self = @_[0];
|
||||
my @W = unpack("N16",@_[1]);
|
||||
my ($A,$B,$C,$D,$E,$T) = @{$self->{H}};
|
||||
';
|
||||
|
||||
$sha1_impl.='
|
||||
$A &= 0xffffffff;
|
||||
$B &= 0xffffffff;
|
||||
' if ((1<<31)<<1);
|
||||
|
||||
for($i=0;$i<16;$i++){ $sha1_impl.=BODY_00_15(); unshift(@V,pop(@V)); }
|
||||
for(;$i<20;$i++) { $sha1_impl.=BODY_16_19(); unshift(@V,pop(@V)); }
|
||||
for(;$i<40;$i++) { $sha1_impl.=BODY_20_39(); unshift(@V,pop(@V)); }
|
||||
for(;$i<60;$i++) { $sha1_impl.=BODY_40_59(); unshift(@V,pop(@V)); }
|
||||
for(;$i<80;$i++) { $sha1_impl.=BODY_60_79(); unshift(@V,pop(@V)); }
|
||||
|
||||
$sha1_impl.='
|
||||
$self->{H}[0]+=$A; $self->{H}[1]+=$B; $self->{H}[2]+=$C;
|
||||
$self->{H}[3]+=$D; $self->{H}[4]+=$E; }';
|
||||
|
||||
#print $sha1_impl,"\n";
|
||||
eval($sha1_impl); # generate code
|
||||
}
|
||||
|
||||
sub Init {
|
||||
my $class = shift; # multiple instances...
|
||||
my $self = {};
|
||||
|
||||
bless $self,$class;
|
||||
$self->{H} = [0x67452301,0xefcdab89,0x98badcfe,0x10325476,0xc3d2e1f0];
|
||||
$self->{N} = 0;
|
||||
return $self;
|
||||
}
|
||||
|
||||
sub Update {
|
||||
my $self = shift;
|
||||
my $msg;
|
||||
|
||||
foreach $msg (@_) {
|
||||
my $len = length($msg);
|
||||
my $num = length($self->{buf});
|
||||
my $off = 0;
|
||||
|
||||
$self->{N} += $len;
|
||||
|
||||
if (($num+$len)<64)
|
||||
{ $self->{buf} .= $msg; next; }
|
||||
elsif ($num)
|
||||
{ $self->{buf} .= substr($msg,0,($off=64-$num));
|
||||
$self->block($self->{buf});
|
||||
}
|
||||
|
||||
while(($off+64) <= $len)
|
||||
{ $self->block(substr($msg,$off,64));
|
||||
$off += 64;
|
||||
}
|
||||
|
||||
$self->{buf} = substr($msg,$off);
|
||||
}
|
||||
return $self;
|
||||
}
|
||||
|
||||
sub Final {
|
||||
my $self = shift;
|
||||
my $num = length($self->{buf});
|
||||
|
||||
$self->{buf} .= chr(0x80); $num++;
|
||||
if ($num>56)
|
||||
{ $self->{buf} .= chr(0)x(64-$num);
|
||||
$self->block($self->{buf});
|
||||
$self->{buf}=undef;
|
||||
$num=0;
|
||||
}
|
||||
$self->{buf} .= chr(0)x(56-$num);
|
||||
$self->{buf} .= pack("N2",($self->{N}>>29)&0x7,$self->{N}<<3);
|
||||
$self->block($self->{buf});
|
||||
|
||||
return pack("N*",@{$self->{H}});
|
||||
}
|
||||
|
||||
sub Selftest {
|
||||
my $hash;
|
||||
|
||||
$hash=SHA1->Init()->Update('abc')->Final();
|
||||
die "SHA1 test#1" if (unpack("H*",$hash) ne 'a9993e364706816aba3e25717850c26c9cd0d89d');
|
||||
|
||||
$hash=SHA1->Init()->Update('abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq')->Final();
|
||||
die "SHA1 test#2" if (unpack("H*",$hash) ne '84983e441c3bd26ebaae4aa1f95129e5e54670f1');
|
||||
|
||||
#$hash=SHA1->Init()->Update('a'x1000000)->Final();
|
||||
#die "SHA1 test#3" if (unpack("H*",$hash) ne '34aa973cd4c4daa4f61eeb2bdbad27316534016f');
|
||||
}
|
||||
}
|
||||
|
||||
{ package HMAC;
|
||||
|
||||
sub Init {
|
||||
my $class = shift;
|
||||
my $key = shift;
|
||||
my $self = {};
|
||||
|
||||
bless $self,$class;
|
||||
|
||||
if (length($key)>64) {
|
||||
$key = SHA1->Init()->Update($key)->Final();
|
||||
}
|
||||
$key .= chr(0x00)x(64-length($key));
|
||||
|
||||
my @ikey = map($_^=0x36,unpack("C*",$key));
|
||||
($self->{hash} = SHA1->Init())->Update(pack("C*",@ikey));
|
||||
$self->{okey} = pack("C*",map($_^=0x36^0x5c,@ikey));
|
||||
|
||||
return $self;
|
||||
}
|
||||
|
||||
sub Update {
|
||||
my $self = shift;
|
||||
$self->{hash}->Update(@_);
|
||||
return $self;
|
||||
}
|
||||
|
||||
sub Final {
|
||||
my $self = shift;
|
||||
my $ihash = $self->{hash}->Final();
|
||||
return SHA1->Init()->Update($self->{okey},$ihash)->Final();
|
||||
}
|
||||
|
||||
sub Selftest {
|
||||
my $hmac;
|
||||
|
||||
$hmac = HMAC->Init('0123456789:;<=>?@ABC')->Update('Sample #2')->Final();
|
||||
die "HMAC test" if (unpack("H*",$hmac) ne '0922d3405faa3d194f82a45830737d5cc6c75d24');
|
||||
}
|
||||
}
|
||||
|
||||
1;
|
241
c6x/incore6x
Normal file
241
c6x/incore6x
Normal file
@@ -0,0 +1,241 @@
|
||||
#!/usr/bin/env perl
|
||||
#
|
||||
# Copyright (c) 2011 The OpenSSL Project.
|
||||
#
|
||||
# The script embeds fingerprint into TI-COFF executable object.
|
||||
|
||||
$0 =~ m/(.*[\/\\])[^\/\\]+$/; $dir=$1;
|
||||
|
||||
unshift(@INC,$dir);
|
||||
require "hmac_sha1.pl";
|
||||
|
||||
######################################################################
|
||||
#
|
||||
# COFF symbol table parser by <appro@openssl.org>. The table entries
|
||||
# are extended with offset within executable file...
|
||||
#
|
||||
{ package COFF;
|
||||
use FileHandle;
|
||||
|
||||
sub dup { my %copy=map {$_} @_; return \%copy; }
|
||||
|
||||
sub Load {
|
||||
my $class = shift;
|
||||
my $self = {};
|
||||
my $FD = FileHandle->new(); # autoclose
|
||||
|
||||
bless $self,$class;
|
||||
|
||||
sysopen($FD,shift,0) or die "$!";
|
||||
binmode($FD);
|
||||
|
||||
#################################################
|
||||
# read and parse COFF header...
|
||||
#
|
||||
read($FD,my $coff,22) or die "$!";
|
||||
|
||||
my %coff_header;
|
||||
@coff_header{version,nsects,date,syms_off,nsyms,opt,flags,magic}=
|
||||
unpack("v2V3v3",$coff);
|
||||
|
||||
$!=42; # signal fipsld to revert to two-step link
|
||||
die "not TI-COFF file" if ($coff_header{version} != 0xC2);
|
||||
|
||||
my $big_endian = ($coff_header{flags}>>9)&1; # 0 or 1
|
||||
|
||||
my $strings;
|
||||
my $symsize;
|
||||
|
||||
#################################################
|
||||
# load strings table
|
||||
#
|
||||
seek($FD,$coff_header{syms_off}+18*$coff_header{nsyms},0) or die "$!";
|
||||
read($FD,$strings,4) or die "$!";
|
||||
$symsize = unpack("V",$strings);
|
||||
read($FD,$strings,$symsize,4) or die "$!";
|
||||
|
||||
#################################################
|
||||
# read sections
|
||||
#
|
||||
my $i;
|
||||
my @sections;
|
||||
|
||||
# seek to section headers
|
||||
seek($FD,22+@coff_header{opt},0) or die "$!";
|
||||
for ($i=0;$i<$coff_header{nsects};$i++) {
|
||||
my %coff_shdr;
|
||||
my $name;
|
||||
|
||||
read($FD,my $section,48) or die "$!";
|
||||
|
||||
@coff_shdr{sh_name,sh_phaddr,sh_vaddr,
|
||||
sh_size,sh_offset,sh_relocs,sh_reserved,
|
||||
sh_relocoff,sh_lines,sh_flags} =
|
||||
unpack("a8V9",$section);
|
||||
|
||||
$name = $coff_shdr{sh_name};
|
||||
# see if sh_name is a an offset in $strings
|
||||
my ($hi,$lo) = unpack("V2",$name);
|
||||
if ($hi==0 && $lo<$symsize) {
|
||||
$name = substr($strings,$lo,64);
|
||||
}
|
||||
$coff_shdr{sh_name} = (split(chr(0),$name))[0];
|
||||
|
||||
push(@sections,dup(%coff_shdr));
|
||||
}
|
||||
|
||||
#################################################
|
||||
# load symbols table
|
||||
#
|
||||
seek($FD,$coff_header{syms_off},0) or die "$!";
|
||||
for ($i=0;$i<$coff_header{nsyms};$i++) {
|
||||
my %coff_sym;
|
||||
my $name;
|
||||
|
||||
read($FD,my $blob,18) or die "$!";
|
||||
|
||||
@coff_sym{st_name,st_value,st_shndx,reserved,class,aux} =
|
||||
unpack("a8Vv2C2",$blob);
|
||||
|
||||
# skip aux entries
|
||||
if ($coff_sym{aux}) {
|
||||
seek($FD,18*$coff_sym{aux},1) or die "$!";
|
||||
$i+=$coff_sym{aux};
|
||||
}
|
||||
|
||||
$name = $coff_sym{st_name};
|
||||
# see if st_name is a an offset in $strings
|
||||
my ($hi,$lo) = unpack("V2",$name);
|
||||
if ($hi==0 && $lo<$symsize) {
|
||||
$name = substr($strings,$lo,64);
|
||||
}
|
||||
$coff_sym{st_name} = $name = (split(chr(0),$name))[0];
|
||||
|
||||
my $st_secn = $coff_sym{st_shndx}-1;
|
||||
if ($st_secn>=0 && $st_secn<=$#sections
|
||||
&& @sections[$st_secn]->{sh_offset}
|
||||
&& $name =~ m/^_[a-z]+/i) {
|
||||
# synthesize st_offset, ...
|
||||
$coff_sym{st_offset} = $coff_sym{st_value}
|
||||
- @sections[$st_secn]->{sh_vaddr}
|
||||
+ @sections[$st_secn]->{sh_offset};
|
||||
$coff_sym{st_section} = @sections[$st_secn]->{sh_name};
|
||||
# ... and add to lookup table
|
||||
$self->{symbols}{$name} = dup(%coff_sym);
|
||||
}
|
||||
}
|
||||
|
||||
return $self;
|
||||
}
|
||||
|
||||
sub Lookup {
|
||||
my $self = shift;
|
||||
my $name = shift;
|
||||
return $self->{symbols}{"_$name"};
|
||||
}
|
||||
|
||||
sub Traverse {
|
||||
my $self = shift;
|
||||
my $code = shift;
|
||||
|
||||
if (ref($code) eq 'CODE') {
|
||||
for (keys(%{$self->{symbols}})) { &$code($self->{symbols}{$_}); }
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
######################################################################
|
||||
#
|
||||
# main()
|
||||
#
|
||||
my $legacy_mode;
|
||||
|
||||
if ($#ARGV<0 || ($#ARGV>0 && !($legacy_mode=(@ARGV[0] =~ /^\-(dso|exe)$/)))) {
|
||||
print STDERR "usage: $0 [-dso|-exe] ti-coff-binary\n";
|
||||
exit(1);
|
||||
}
|
||||
|
||||
$exe = COFF->Load(@ARGV[$#ARGV]);
|
||||
|
||||
$FIPS_text_start = $exe->Lookup("FIPS_text_start") or die;
|
||||
$FIPS_text_end = $exe->Lookup("FIPS_text_end") or die;
|
||||
$FIPS_rodata_start = $exe->Lookup("FIPS_rodata_start") or die;
|
||||
$FIPS_rodata_end = $exe->Lookup("FIPS_rodata_end") or die;
|
||||
$FIPS_signature = $exe->Lookup("FIPS_signature") or die;
|
||||
|
||||
# new cross-compile support
|
||||
$FIPS_text_startX = $exe->Lookup("FIPS_text_startX");
|
||||
$FIPS_text_endX = $exe->Lookup("FIPS_text_endX");
|
||||
|
||||
if (!$legacy_mode) {
|
||||
if (!$FIPS_text_startX || !$FIPS_text_endX) {
|
||||
print STDERR "@ARGV[$#ARGV] is not cross-compiler aware.\n";
|
||||
exit(42); # signal fipsld to revert to two-step link
|
||||
}
|
||||
|
||||
$FINGERPRINT_ascii_value
|
||||
= $exe->Lookup("FINGERPRINT_ascii_value");
|
||||
}
|
||||
if ($FIPS_text_startX && $FIPS_text_endX) {
|
||||
$FIPS_text_start = $FIPS_text_startX;
|
||||
$FIPS_text_end = $FIPS_text_endX;
|
||||
}
|
||||
|
||||
sysopen(FD,@ARGV[$#ARGV],$legacy_mode?0:2) or die "$!"; # 2 is read/write
|
||||
binmode(FD);
|
||||
|
||||
sub HMAC_Update {
|
||||
my ($hmac,$off,$len) = @_;
|
||||
my $blob;
|
||||
|
||||
seek(FD,$off,0) or die "$!";
|
||||
read(FD,$blob,$len) or die "$!";
|
||||
$$hmac->Update($blob);
|
||||
}
|
||||
|
||||
# fips/fips.c:FIPS_incore_fingerprint's Perl twin
|
||||
#
|
||||
sub FIPS_incore_fingerprint {
|
||||
my $p1 = $FIPS_text_start->{st_offset};
|
||||
my $p2 = $FIPS_text_end->{st_offset};
|
||||
my $p3 = $FIPS_rodata_start->{st_offset};
|
||||
my $p4 = $FIPS_rodata_end->{st_offset};
|
||||
my $sig = $FIPS_signature->{st_offset};
|
||||
my $ctx = HMAC->Init("etaonrishdlcupfm");
|
||||
|
||||
# detect overlapping regions
|
||||
if ($p1<=$p3 && $p2>=$p3) {
|
||||
$p3 = $p1; $p4 = $p2>$p4?$p2:$p4; $p1 = 0; $p2 = 0;
|
||||
} elsif ($p3<=$p1 && $p4>=$p1) {
|
||||
$p3 = $p3; $p4 = $p2>$p4?$p2:$p4; $p1 = 0; $p2 = 0;
|
||||
}
|
||||
|
||||
if ($p1) {
|
||||
HMAC_Update (\$ctx,$p1,$p2-$p1);
|
||||
}
|
||||
|
||||
if ($sig>=$p3 && $sig<$p4) {
|
||||
# "punch" hole
|
||||
HMAC_Update(\$ctx,$p3,$sig-$p3);
|
||||
$p3 = $sig+20;
|
||||
HMAC_Update(\$ctx,$p3,$p4-$p3);
|
||||
} else {
|
||||
HMAC_Update(\$ctx,$p3,$p4-$p3);
|
||||
}
|
||||
|
||||
return $ctx->Final();
|
||||
}
|
||||
|
||||
$fingerprint = FIPS_incore_fingerprint();
|
||||
|
||||
if ($legacy_mode) {
|
||||
print unpack("H*",$fingerprint);
|
||||
} elsif ($FINGERPRINT_ascii_value) {
|
||||
seek(FD,$FINGERPRINT_ascii_value->{st_offset},0) or die "$!";
|
||||
print FD unpack("H*",$fingerprint) or die "$!";
|
||||
} else {
|
||||
seek(FD,$FIPS_signature->{st_offset},0) or die "$!";
|
||||
print FD $fingerprint or die "$!";
|
||||
}
|
||||
|
||||
close (FD);
|
43
c6x/run6x
Normal file
43
c6x/run6x
Normal file
@@ -0,0 +1,43 @@
|
||||
#!/usr/bin/env perl
|
||||
|
||||
$exe = @ARGV[0];
|
||||
$exe .= ".out" if (! -f $exe);
|
||||
die if (! -f $exe);
|
||||
|
||||
use CCS_SCRIPTING_PERL;
|
||||
|
||||
my $studio=new CCS_SCRIPTING_PERL::CCS_Scripting();
|
||||
|
||||
$studio->CCSOpenNamed("*","*",1); # connect to board
|
||||
$studio->TargetReset();
|
||||
|
||||
print "loading $exe\n";
|
||||
$studio->ProgramLoad($exe);
|
||||
|
||||
sub write_string {
|
||||
my ($studio,$addr,$str) = @_;
|
||||
my $len = length($str);
|
||||
my $i;
|
||||
|
||||
for ($i=0; $i<$len; $i++) {
|
||||
$studio->MemoryWrite($CCS_SCRIPTING_PERL::PAGE_DATA,$addr+$i,8,vec($str,$i,8));
|
||||
}
|
||||
$studio->MemoryWrite($CCS_SCRIPTING_PERL::PAGE_DATA,$addr+$i,8,0);
|
||||
|
||||
return $i+1;
|
||||
}
|
||||
|
||||
$addr= $studio->SymbolGetAddress("__c_args");
|
||||
printf "setting up __c_args at 0x%X\n",$addr;#\n";
|
||||
|
||||
$studio->MemoryWrite($CCS_SCRIPTING_PERL::PAGE_DATA,$addr,32,$#ARGV+1);
|
||||
|
||||
for ($i=0,$strings=$addr+($#ARGV+3)*4; $i<=$#ARGV; $i++) {
|
||||
$off = write_string($studio,$strings,@ARGV[$i]);
|
||||
$studio->MemoryWrite($CCS_SCRIPTING_PERL::PAGE_DATA,$addr+4*($i+1),32,$strings);
|
||||
$strings += $off;
|
||||
}
|
||||
$studio->MemoryWrite($SCC_SCRIPTING_PERL::PAGE_DATA,$addr+4*($i+1),32,0);
|
||||
|
||||
print "running...\n";
|
||||
$studio->TargetRun();
|
68
config
68
config
@@ -134,6 +134,10 @@ case "${SYSTEM}:${RELEASE}:${VERSION}:${MACHINE}" in
|
||||
echo "${MACHINE}-dg-dgux"; exit 0
|
||||
;;
|
||||
|
||||
ecos:*)
|
||||
echo "${MACHINE}-whatever-ecos"; exit 0
|
||||
;;
|
||||
|
||||
HI-UX:*)
|
||||
echo "${MACHINE}-hi-hiux"; exit 0
|
||||
;;
|
||||
@@ -219,7 +223,11 @@ case "${SYSTEM}:${RELEASE}:${VERSION}:${MACHINE}" in
|
||||
;;
|
||||
|
||||
NetBSD:*:*:*386*)
|
||||
echo "`(/usr/sbin/sysctl -n hw.model || /sbin/sysctl -n hw.model) | sed 's,.*\(.\)86-class.*,i\186,'`-whatever-netbsd"; exit 0
|
||||
if [ -z ${CROSS_COMPILE} ]; then
|
||||
echo "`(/usr/sbin/sysctl -n hw.model || /sbin/sysctl -n hw.model) | sed 's,.*\(.\)86-class.*,i\186,'`-whatever-netbsd"; exit 0
|
||||
else
|
||||
echo "${MACHINE}-whatever-netbsd"; exit 0
|
||||
fi
|
||||
;;
|
||||
|
||||
NetBSD:*)
|
||||
@@ -538,7 +546,7 @@ case "$GUESSOS" in
|
||||
ppc-apple-rhapsody) OUT="rhapsody-ppc-cc" ;;
|
||||
ppc-apple-darwin*)
|
||||
ISA64=`(sysctl -n hw.optional.64bitops) 2>/dev/null`
|
||||
if [ "$ISA64" = "1" ]; then
|
||||
if [ "$ISA64" = "1" -a -z "$KERNEL_BITS" ]; then
|
||||
echo "WARNING! If you wish to build 64-bit library, then you have to"
|
||||
echo " invoke './Configure darwin64-ppc-cc' *manually*."
|
||||
if [ "$TEST" = "false" -a -t 1 ]; then
|
||||
@@ -546,10 +554,14 @@ case "$GUESSOS" in
|
||||
(trap "stty `stty -g`" 2 0; stty -icanon min 0 time 50; read waste) <&1
|
||||
fi
|
||||
fi
|
||||
OUT="darwin-ppc-cc" ;;
|
||||
if [ "$ISA64" = "1" -a "$KERNEL_BITS" = "64" ]; then
|
||||
OUT="darwin64-ppc-cc"
|
||||
else
|
||||
OUT="darwin-ppc-cc"
|
||||
fi ;;
|
||||
i?86-apple-darwin*)
|
||||
ISA64=`(sysctl -n hw.optional.x86_64) 2>/dev/null`
|
||||
if [ "$ISA64" = "1" ]; then
|
||||
if [ "$ISA64" = "1" -a -z "$KERNEL_BITS" ]; then
|
||||
echo "WARNING! If you wish to build 64-bit library, then you have to"
|
||||
echo " invoke './Configure darwin64-x86_64-cc' *manually*."
|
||||
if [ "$TEST" = "false" -a -t 1 ]; then
|
||||
@@ -557,7 +569,17 @@ case "$GUESSOS" in
|
||||
(trap "stty `stty -g`" 2 0; stty -icanon min 0 time 50; read waste) <&1
|
||||
fi
|
||||
fi
|
||||
OUT="darwin-i386-cc" ;;
|
||||
if [ "$ISA64" = "1" -a "$KERNEL_BITS" = "64" ]; then
|
||||
OUT="darwin64-x86_64-cc"
|
||||
else
|
||||
OUT="darwin-i386-cc"
|
||||
fi ;;
|
||||
armv6+7-*-iphoneos)
|
||||
options="$options -arch%20armv6 -arch%20armv7"
|
||||
OUT="iphoneos-cross" ;;
|
||||
*-*-iphoneos)
|
||||
options="$options -arch%20${MACHINE}"
|
||||
OUT="iphoneos-cross" ;;
|
||||
alpha-*-linux2)
|
||||
ISA=`awk '/cpu model/{print$4;exit(0);}' /proc/cpuinfo`
|
||||
case ${ISA:-generic} in
|
||||
@@ -627,6 +649,7 @@ case "$GUESSOS" in
|
||||
|
||||
options="$options -DB_ENDIAN -mschedule=$CPUSCHEDULE -march=$CPUARCH"
|
||||
OUT="linux-generic32" ;;
|
||||
armv[45]*-*-ecos) OUT="ecos-armv4" ;;
|
||||
armv[1-3]*-*-linux2) OUT="linux-generic32" ;;
|
||||
armv[7-9]*-*-linux2) OUT="linux-armv4"; options="$options -march=armv7-a" ;;
|
||||
arm*-*-linux2) OUT="linux-armv4" ;;
|
||||
@@ -664,7 +687,7 @@ case "$GUESSOS" in
|
||||
sun4[uv]*-*-solaris2)
|
||||
OUT="solaris-sparcv9-$CC"
|
||||
ISA64=`(isalist) 2>/dev/null | grep sparcv9`
|
||||
if [ "$ISA64" != "" ]; then
|
||||
if [ "$ISA64" != "" -a "$KERNEL_BITS" = "" ]; then
|
||||
if [ "$CC" = "cc" -a $CCVER -ge 50 ]; then
|
||||
echo "WARNING! If you wish to build 64-bit library, then you have to"
|
||||
echo " invoke './Configure solaris64-sparcv9-cc' *manually*."
|
||||
@@ -694,13 +717,16 @@ case "$GUESSOS" in
|
||||
fi
|
||||
fi
|
||||
fi
|
||||
if [ "$ISA64" != "" -a "$KERNEL_BITS" = "64" ]; then
|
||||
OUT="solaris64-sparcv9-$CC"
|
||||
fi
|
||||
;;
|
||||
sun4m-*-solaris2) OUT="solaris-sparcv8-$CC" ;;
|
||||
sun4d-*-solaris2) OUT="solaris-sparcv8-$CC" ;;
|
||||
sun4*-*-solaris2) OUT="solaris-sparcv7-$CC" ;;
|
||||
*86*-*-solaris2)
|
||||
ISA64=`(isalist) 2>/dev/null | grep amd64`
|
||||
if [ "$ISA64" != "" ]; then
|
||||
if [ "$ISA64" != "" -a ${KERNEL_BITS:-64} -eq 64 ]; then
|
||||
OUT="solaris64-x86_64-$CC"
|
||||
else
|
||||
OUT="solaris-x86-$CC"
|
||||
@@ -717,17 +743,23 @@ case "$GUESSOS" in
|
||||
sparc64-*-*bsd*) OUT="BSD-sparc64" ;;
|
||||
ia64-*-*bsd*) OUT="BSD-ia64" ;;
|
||||
amd64-*-*bsd*) OUT="BSD-x86_64" ;;
|
||||
*86*-*-*bsd*) # mimic ld behaviour when it's looking for libc...
|
||||
if [ -L /usr/lib/libc.so ]; then # [Free|Net]BSD
|
||||
libc=/usr/lib/libc.so
|
||||
else # OpenBSD
|
||||
# ld searches for highest libc.so.* and so do we
|
||||
libc=`(ls /usr/lib/libc.so.* | tail -1) 2>/dev/null`
|
||||
fi
|
||||
case "`(file -L $libc) 2>/dev/null`" in
|
||||
*ELF*) OUT="BSD-x86-elf" ;;
|
||||
*) OUT="BSD-x86"; options="$options no-sse2" ;;
|
||||
esac ;;
|
||||
*86*-*-*bsd*) if [ -z ${CROSS_COMPILE} ]; then
|
||||
# mimic ld behaviour when it's looking for libc...
|
||||
if [ -L /usr/lib/libc.so ]; then # [Free|Net]BSD
|
||||
libc=/usr/lib/libc.so
|
||||
else # OpenBSD
|
||||
# ld searches for highest libc.so.* and so do we
|
||||
libc=`(ls /usr/lib/libc.so.* | tail -1) 2>/dev/null`
|
||||
fi
|
||||
echo "libc = $libc"
|
||||
case "`(file -L $libc) 2>/dev/null`" in
|
||||
*ELF*) OUT="BSD-x86-elf" ;;
|
||||
*) OUT="BSD-x86"; options="$options no-sse2" ;;
|
||||
esac
|
||||
else
|
||||
OUT="BSD-x86-elf"
|
||||
fi;;
|
||||
ppc85xx-*-*bsd*) OUT="BSD-ppc85xx" ;; # MPC85XX has no hardware FP accelerator
|
||||
*-*-*bsd*) OUT="BSD-generic32" ;;
|
||||
|
||||
*-*-osf) OUT="osf1-alpha-cc" ;;
|
||||
|
1329
crypto/aes/asm/aes-c64xplus.pl
Normal file
1329
crypto/aes/asm/aes-c64xplus.pl
Normal file
File diff suppressed because it is too large
Load Diff
@@ -30,7 +30,7 @@ unsigned int OPENSSL_rdtsc(void)
|
||||
}
|
||||
|
||||
#if defined(__GNUC__) && __GNUC__>=2
|
||||
void OPENSSL_cpuid_setup(void) __attribute__((constructor))
|
||||
void OPENSSL_cpuid_setup(void) __attribute__((constructor));
|
||||
#endif
|
||||
void OPENSSL_cpuid_setup(void)
|
||||
{
|
||||
|
@@ -44,7 +44,7 @@ OPENSSL_atomic_add:
|
||||
bne .Lspin
|
||||
|
||||
ldr r2,[r4]
|
||||
add r2,r5
|
||||
add r2,r2,r5
|
||||
str r2,[r4]
|
||||
str r0,[r6] @ release spinlock
|
||||
ldmia sp!,{r4-r6,lr}
|
||||
@@ -59,26 +59,26 @@ OPENSSL_atomic_add:
|
||||
OPENSSL_cleanse:
|
||||
eor ip,ip,ip
|
||||
cmp r1,#7
|
||||
subhs r1,#4
|
||||
subhs r1,r1,#4
|
||||
bhs .Lot
|
||||
cmp r1,#0
|
||||
beq .Lcleanse_done
|
||||
.Little:
|
||||
strb ip,[r0],#1
|
||||
subs r1,#1
|
||||
subs r1,r1,#1
|
||||
bhi .Little
|
||||
b .Lcleanse_done
|
||||
|
||||
.Lot: tst r0,#3
|
||||
beq .Laligned
|
||||
strb ip,[r0],#1
|
||||
sub r1,#1
|
||||
sub r1,r1,#1
|
||||
b .Lot
|
||||
.Laligned:
|
||||
str ip,[r0],#4
|
||||
subs r1,#4
|
||||
subs r1,r1,#4
|
||||
bhs .Laligned
|
||||
adds r1,#4
|
||||
adds r1,r1,#4
|
||||
bne .Little
|
||||
.Lcleanse_done:
|
||||
tst lr,#1
|
||||
|
@@ -218,38 +218,38 @@ $code.=<<___;
|
||||
mov $b,r3 @ $b=b1
|
||||
ldr r3,[sp,#32] @ load b0
|
||||
mov $mask,#7<<2
|
||||
sub sp,#32 @ allocate tab[8]
|
||||
sub sp,sp,#32 @ allocate tab[8]
|
||||
|
||||
bl mul_1x1_ialu @ a1<61>b1
|
||||
str $lo,[$ret,#8]
|
||||
str $hi,[$ret,#12]
|
||||
|
||||
eor $b,r3 @ flip b0 and b1
|
||||
eor $a,r2 @ flip a0 and a1
|
||||
eor r3,$b
|
||||
eor r2,$a
|
||||
eor $b,r3
|
||||
eor $a,r2
|
||||
eor $b,$b,r3 @ flip b0 and b1
|
||||
eor $a,$a,r2 @ flip a0 and a1
|
||||
eor r3,r3,$b
|
||||
eor r2,r2,$a
|
||||
eor $b,$b,r3
|
||||
eor $a,$a,r2
|
||||
bl mul_1x1_ialu @ a0<61>b0
|
||||
str $lo,[$ret]
|
||||
str $hi,[$ret,#4]
|
||||
|
||||
eor $a,r2
|
||||
eor $b,r3
|
||||
eor $a,$a,r2
|
||||
eor $b,$b,r3
|
||||
bl mul_1x1_ialu @ (a1+a0)<29>(b1+b0)
|
||||
___
|
||||
@r=map("r$_",(6..9));
|
||||
$code.=<<___;
|
||||
ldmia $ret,{@r[0]-@r[3]}
|
||||
eor $lo,$hi
|
||||
eor $hi,@r[1]
|
||||
eor $lo,@r[0]
|
||||
eor $hi,@r[2]
|
||||
eor $lo,@r[3]
|
||||
eor $hi,@r[3]
|
||||
eor $lo,$lo,$hi
|
||||
eor $hi,$hi,@r[1]
|
||||
eor $lo,$lo,@r[0]
|
||||
eor $hi,$hi,@r[2]
|
||||
eor $lo,$lo,@r[3]
|
||||
eor $hi,$hi,@r[3]
|
||||
str $hi,[$ret,#8]
|
||||
eor $lo,$hi
|
||||
add sp,#32 @ destroy tab[8]
|
||||
eor $lo,$lo,$hi
|
||||
add sp,sp,#32 @ destroy tab[8]
|
||||
str $lo,[$ret,#4]
|
||||
|
||||
#if __ARM_ARCH__>=5
|
||||
|
333
crypto/bn/asm/bn-c64xplus.asm
Normal file
333
crypto/bn/asm/bn-c64xplus.asm
Normal file
@@ -0,0 +1,333 @@
|
||||
;;====================================================================
|
||||
;; Written by Andy Polyakov <appro@openssl.org> for the OpenSSL
|
||||
;; project.
|
||||
;;
|
||||
;; Rights for redistribution and usage in source and binary forms are
|
||||
;; granted according to the OpenSSL license. Warranty of any kind is
|
||||
;; disclaimed.
|
||||
;;====================================================================
|
||||
;; Compiler-generated multiply-n-add SPLOOP runs at 12*n cycles, n
|
||||
;; being the number of 32-bit words, addition - 8*n. Corresponding 4x
|
||||
;; unrolled SPLOOP-free loops - at ~8*n and ~5*n. Below assembler
|
||||
;; SPLOOPs spin at ... 2*n cycles [plus epilogue].
|
||||
;;====================================================================
|
||||
.text
|
||||
|
||||
.asg B3,RA
|
||||
.asg A4,ARG0
|
||||
.asg B4,ARG1
|
||||
.asg A6,ARG2
|
||||
.asg B6,ARG3
|
||||
.asg A8,ARG4
|
||||
.asg B8,ARG5
|
||||
.asg A4,RET
|
||||
.asg A15,FP
|
||||
.asg B14,DP
|
||||
.asg B15,SP
|
||||
|
||||
.global _bn_mul_add_words
|
||||
_bn_mul_add_words:
|
||||
.asmfunc
|
||||
MV ARG2,B0
|
||||
[!B0] BNOP RA
|
||||
||[!B0] MVK 0,RET
|
||||
[B0] MVC B0,ILC
|
||||
[B0] ZERO A19 ; high part of accumulator
|
||||
|| [B0] MV ARG0,A2
|
||||
|| [B0] MV ARG3,A3
|
||||
NOP 3
|
||||
|
||||
SPLOOP 2 ; 2*n+10
|
||||
;;====================================================================
|
||||
LDW *ARG1++,B7 ; ap[i]
|
||||
NOP 3
|
||||
LDW *ARG0++,A7 ; rp[i]
|
||||
MPY32U B7,A3,A17:A16
|
||||
NOP 3 ; [2,0] in epilogue
|
||||
ADDU A16,A7,A21:A20
|
||||
ADDU A19,A21:A20,A19:A18
|
||||
|| MV.S A17,A23
|
||||
SPKERNEL 2,1 ; leave slot for "return value"
|
||||
|| STW A18,*A2++ ; rp[i]
|
||||
|| ADD A19,A23,A19
|
||||
;;====================================================================
|
||||
BNOP RA,4
|
||||
MV A19,RET ; return value
|
||||
.endasmfunc
|
||||
|
||||
.global _bn_mul_words
|
||||
_bn_mul_words:
|
||||
.asmfunc
|
||||
MV ARG2,B0
|
||||
[!B0] BNOP RA
|
||||
||[!B0] MVK 0,RET
|
||||
[B0] MVC B0,ILC
|
||||
[B0] ZERO A19 ; high part of accumulator
|
||||
NOP 3
|
||||
|
||||
SPLOOP 2 ; 2*n+10
|
||||
;;====================================================================
|
||||
LDW *ARG1++,A7 ; ap[i]
|
||||
NOP 4
|
||||
MPY32U A7,ARG3,A17:A16
|
||||
NOP 4 ; [2,0] in epiloque
|
||||
ADDU A19,A16,A19:A18
|
||||
|| MV.S A17,A21
|
||||
SPKERNEL 2,1 ; leave slot for "return value"
|
||||
|| STW A18,*ARG0++ ; rp[i]
|
||||
|| ADD.L A19,A21,A19
|
||||
;;====================================================================
|
||||
BNOP RA,4
|
||||
MV A19,RET ; return value
|
||||
.endasmfunc
|
||||
|
||||
.global _bn_sqr_words
|
||||
_bn_sqr_words:
|
||||
.asmfunc
|
||||
MV ARG2,B0
|
||||
[!B0] BNOP RA
|
||||
||[!B0] MVK 0,RET
|
||||
[B0] MVC B0,ILC
|
||||
[B0] MV ARG0,B2
|
||||
|| [B0] ADD 4,ARG0,ARG0
|
||||
NOP 3
|
||||
|
||||
SPLOOP 2 ; 2*n+10
|
||||
;;====================================================================
|
||||
LDW *ARG1++,B7 ; ap[i]
|
||||
NOP 4
|
||||
MPY32U B7,B7,B1:B0
|
||||
NOP 3 ; [2,0] in epilogue
|
||||
STW B0,*B2++(8) ; rp[2*i]
|
||||
MV B1,A1
|
||||
SPKERNEL 2,0 ; fully overlap BNOP RA,5
|
||||
|| STW A1,*ARG0++(8) ; rp[2*i+1]
|
||||
;;====================================================================
|
||||
BNOP RA,5
|
||||
.endasmfunc
|
||||
|
||||
.global _bn_add_words
|
||||
_bn_add_words:
|
||||
.asmfunc
|
||||
MV ARG3,B0
|
||||
[!B0] BNOP RA
|
||||
||[!B0] MVK 0,RET
|
||||
[B0] MVC B0,ILC
|
||||
[B0] ZERO A1 ; carry flag
|
||||
|| [B0] MV ARG0,A3
|
||||
NOP 3
|
||||
|
||||
SPLOOP 2 ; 2*n+6
|
||||
;;====================================================================
|
||||
LDW *ARG2++,A7 ; bp[i]
|
||||
|| LDW *ARG1++,B7 ; ap[i]
|
||||
NOP 4
|
||||
ADDU A7,B7,A9:A8
|
||||
ADDU A1,A9:A8,A1:A0
|
||||
SPKERNEL 0,0 ; fully overlap BNOP RA,5
|
||||
|| STW A0,*A3++ ; write result
|
||||
|| MV A1,RET ; keep carry flag in RET
|
||||
;;====================================================================
|
||||
BNOP RA,5
|
||||
.endasmfunc
|
||||
|
||||
.global _bn_sub_words
|
||||
_bn_sub_words:
|
||||
.asmfunc
|
||||
MV ARG3,B0
|
||||
[!B0] BNOP RA
|
||||
||[!B0] MVK 0,RET
|
||||
[B0] MVC B0,ILC
|
||||
[B0] ZERO A2 ; borrow flag
|
||||
|| [B0] MV ARG0,A3
|
||||
NOP 3
|
||||
|
||||
SPLOOP 2 ; 2*n+6
|
||||
;;====================================================================
|
||||
LDW *ARG2++,A7 ; bp[i]
|
||||
|| LDW *ARG1++,B7 ; ap[i]
|
||||
NOP 4
|
||||
SUBU B7,A7,A1:A0
|
||||
[A2] SUB A1:A0,1,A1:A0
|
||||
SPKERNEL 0,1 ; leave slot for "return borrow flag"
|
||||
|| STW A0,*A3++ ; write result
|
||||
|| AND 1,A1,A2 ; pass on borrow flag
|
||||
;;====================================================================
|
||||
BNOP RA,4
|
||||
AND 1,A1,RET ; return borrow flag
|
||||
.endasmfunc
|
||||
|
||||
.global _bn_div_words
|
||||
.global __divull
|
||||
_bn_div_words:
|
||||
.asmfunc
|
||||
CALLP __divull,A3 ; jump to rts64plus.lib
|
||||
|| MV ARG0,A5
|
||||
|| MV ARG1,ARG0
|
||||
|| MV ARG2,ARG1
|
||||
|| ZERO B5
|
||||
.endasmfunc
|
||||
|
||||
;;====================================================================
|
||||
;; Not really Comba algorithm, just straightforward NxM... Dedicated
|
||||
;; fully unrolled real Comba implementations are asymptotically 2x
|
||||
;; faster, but naturally larger undertaking. Purpose of this exercise
|
||||
;; was rather to learn to master nested SPLOOPs...
|
||||
;;====================================================================
|
||||
.global _bn_sqr_comba8
|
||||
.global _bn_mul_comba8
|
||||
_bn_sqr_comba8:
|
||||
MV ARG1,ARG2
|
||||
_bn_mul_comba8:
|
||||
.asmfunc
|
||||
MVK 8,B0 ; N, RILC
|
||||
|| MVK 8,A0 ; M, outer loop counter
|
||||
|| MV ARG1,A5 ; copy ap
|
||||
|| MV ARG0,B4 ; copy rp
|
||||
|| ZERO B19 ; high part of accumulator
|
||||
MVC B0,RILC
|
||||
|| SUB B0,2,B1 ; N-2, initial ILC
|
||||
|| SUB B0,1,B2 ; const B2=N-1
|
||||
|| LDW *A5++,B6 ; ap[0]
|
||||
|| MV A0,A3 ; const A3=M
|
||||
sploopNxM?: ; for best performance arrange M<=N
|
||||
[A0] SPLOOPD 2 ; 2*n+10
|
||||
|| MVC B1,ILC
|
||||
|| ADDAW B4,B0,B5
|
||||
|| ZERO B7
|
||||
|| LDW *A5++,A9 ; pre-fetch ap[1]
|
||||
|| ZERO A1
|
||||
|| SUB A0,1,A0
|
||||
;;====================================================================
|
||||
;; SPLOOP from bn_mul_add_words, but with flipped A<>B register files.
|
||||
;; This is because of Advisory 15 from TI publication SPRZ247I.
|
||||
LDW *ARG2++,A7 ; bp[i]
|
||||
NOP 3
|
||||
[A1] LDW *B5++,B7 ; rp[i]
|
||||
MPY32U A7,B6,B17:B16
|
||||
NOP 3
|
||||
ADDU B16,B7,B21:B20
|
||||
ADDU B19,B21:B20,B19:B18
|
||||
|| MV.S B17,B23
|
||||
SPKERNEL
|
||||
|| STW B18,*B4++ ; rp[i]
|
||||
|| ADD.S B19,B23,B19
|
||||
;;====================================================================
|
||||
outer?: ; m*2*(n+1)+10
|
||||
SUBAW ARG2,A3,ARG2 ; rewind bp to bp[0]
|
||||
SPMASKR
|
||||
|| CMPGT A0,1,A2 ; done pre-fetching ap[i+1]?
|
||||
MVD A9,B6 ; move through .M unit(*)
|
||||
[A2] LDW *A5++,A9 ; pre-fetch ap[i+1]
|
||||
SUBAW B5,B2,B5 ; rewind rp to rp[1]
|
||||
MVK 1,A1
|
||||
[A0] BNOP.S1 outer?,4
|
||||
|| [A0] SUB.L A0,1,A0
|
||||
STW B19,*B4--[B2] ; rewind rp tp rp[1]
|
||||
|| ZERO.S B19 ; high part of accumulator
|
||||
;; end of outer?
|
||||
BNOP RA,5 ; return
|
||||
.endasmfunc
|
||||
;; (*) It should be noted that B6 is used as input to MPY32U in
|
||||
;; chronologically next cycle in *preceding* SPLOOP iteration.
|
||||
;; Normally such arrangement would require DINT, but at this
|
||||
;; point SPLOOP is draining and interrupts are disabled
|
||||
;; implicitly.
|
||||
|
||||
.global _bn_sqr_comba4
|
||||
.global _bn_mul_comba4
|
||||
_bn_sqr_comba4:
|
||||
MV ARG1,ARG2
|
||||
_bn_mul_comba4:
|
||||
.asmfunc
|
||||
.if 0
|
||||
BNOP sploopNxM?,3
|
||||
;; Above mentioned m*2*(n+1)+10 does not apply in n=m=4 case,
|
||||
;; because of read-after-write penalties, it's rather
|
||||
;; n*2*(n+3)+10, or 66 cycles [plus various overheads]...
|
||||
MVK 4,B0 ; N, RILC
|
||||
|| MVK 4,A0 ; M, outer loop counter
|
||||
|| MV ARG1,A5 ; copy ap
|
||||
|| MV ARG0,B4 ; copy rp
|
||||
|| ZERO B19 ; high part of accumulator
|
||||
MVC B0,RILC
|
||||
|| SUB B0,2,B1 ; first ILC
|
||||
|| SUB B0,1,B2 ; const B2=N-1
|
||||
|| LDW *A5++,B6 ; ap[0]
|
||||
|| MV A0,A3 ; const A3=M
|
||||
.else
|
||||
;; This alternative is exercise in fully unrolled Comba
|
||||
;; algorithm implementation that operates at n*(n+1)+12, or
|
||||
;; as little as 32 cycles...
|
||||
LDW *ARG1[0],B16 ; a[0]
|
||||
|| LDW *ARG2[0],A16 ; b[0]
|
||||
LDW *ARG1[1],B17 ; a[1]
|
||||
|| LDW *ARG2[1],A17 ; b[1]
|
||||
LDW *ARG1[2],B18 ; a[2]
|
||||
|| LDW *ARG2[2],A18 ; b[2]
|
||||
LDW *ARG1[3],B19 ; a[3]
|
||||
|| LDW *ARG2[3],A19 ; b[3]
|
||||
NOP
|
||||
MPY32U A16,B16,A1:A0 ; a[0]*b[0]
|
||||
MPY32U A17,B16,A23:A22 ; a[0]*b[1]
|
||||
MPY32U A16,B17,A25:A24 ; a[1]*b[0]
|
||||
MPY32U A16,B18,A27:A26 ; a[2]*b[0]
|
||||
STW A0,*ARG0[0]
|
||||
|| MPY32U A17,B17,A29:A28 ; a[1]*b[1]
|
||||
MPY32U A18,B16,A31:A30 ; a[0]*b[2]
|
||||
|| ADDU A22,A1,A1:A0
|
||||
MV A23,B0
|
||||
|| MPY32U A19,B16,A21:A20 ; a[3]*b[0]
|
||||
|| ADDU A24,A1:A0,A1:A0
|
||||
ADDU A25,B0,B1:B0
|
||||
|| STW A0,*ARG0[1]
|
||||
|| MPY32U A18,B17,A23:A22 ; a[2]*b[1]
|
||||
|| ADDU A26,A1,A9:A8
|
||||
ADDU A27,B1,B9:B8
|
||||
|| MPY32U A17,B18,A25:A24 ; a[1]*b[2]
|
||||
|| ADDU A28,A9:A8,A9:A8
|
||||
ADDU A29,B9:B8,B9:B8
|
||||
|| MPY32U A16,B19,A27:A26 ; a[0]*b[3]
|
||||
|| ADDU A30,A9:A8,A9:A8
|
||||
ADDU A31,B9:B8,B9:B8
|
||||
|| ADDU B0,A9:A8,A9:A8
|
||||
STW A8,*ARG0[2]
|
||||
|| ADDU A20,A9,A1:A0
|
||||
ADDU A21,B9,B1:B0
|
||||
|| MPY32U A19,B17,A21:A20 ; a[3]*b[1]
|
||||
|| ADDU A22,A1:A0,A1:A0
|
||||
ADDU A23,B1:B0,B1:B0
|
||||
|| MPY32U A18,B18,A23:A22 ; a[2]*b[2]
|
||||
|| ADDU A24,A1:A0,A1:A0
|
||||
ADDU A25,B1:B0,B1:B0
|
||||
|| MPY32U A17,B19,A25:A24 ; a[1]*b[3]
|
||||
|| ADDU A26,A1:A0,A1:A0
|
||||
ADDU A27,B1:B0,B1:B0
|
||||
|| ADDU B8,A1:A0,A1:A0
|
||||
STW A0,*ARG0[3]
|
||||
|| MPY32U A19,B18,A27:A26 ; a[3]*b[2]
|
||||
|| ADDU A20,A1,A9:A8
|
||||
ADDU A21,B1,B9:B8
|
||||
|| MPY32U A18,B19,A29:A28 ; a[2]*b[3]
|
||||
|| ADDU A22,A9:A8,A9:A8
|
||||
ADDU A23,B9:B8,B9:B8
|
||||
|| MPY32U A19,B19,A31:A30 ; a[3]*b[3]
|
||||
|| ADDU A24,A9:A8,A9:A8
|
||||
ADDU A25,B9:B8,B9:B8
|
||||
|| ADDU B0,A9:A8,A9:A8
|
||||
STW A8,*ARG0[4]
|
||||
|| ADDU A26,A9,A1:A0
|
||||
ADDU A27,B9,B1:B0
|
||||
|| ADDU A28,A1:A0,A1:A0
|
||||
ADDU A29,B1:B0,B1:B0
|
||||
|| BNOP RA
|
||||
|| ADDU B8,A1:A0,A1:A0
|
||||
STW A0,*ARG0[5]
|
||||
|| ADDU A30,A1,A9:A8
|
||||
ADD A31,B1,B8
|
||||
ADDU B0,A9:A8,A9:A8 ; removed || to avoid cross-path stall below
|
||||
ADD B8,A9,A9
|
||||
|| STW A8,*ARG0[6]
|
||||
STW A9,*ARG0[7]
|
||||
.endif
|
||||
.endasmfunc
|
146
crypto/bn/asm/c64xplus-gf2m.pl
Normal file
146
crypto/bn/asm/c64xplus-gf2m.pl
Normal file
@@ -0,0 +1,146 @@
|
||||
#!/usr/bin/env perl
|
||||
#
|
||||
# ====================================================================
|
||||
# Written by Andy Polyakov <appro@openssl.org> for the OpenSSL
|
||||
# project. The module is, however, dual licensed under OpenSSL and
|
||||
# CRYPTOGAMS licenses depending on where you obtain it. For further
|
||||
# details see http://www.openssl.org/~appro/cryptogams/.
|
||||
# ====================================================================
|
||||
#
|
||||
# February 2012
|
||||
#
|
||||
# The module implements bn_GF2m_mul_2x2 polynomial multiplication
|
||||
# used in bn_gf2m.c. It's kind of low-hanging mechanical port from
|
||||
# C for the time being... The subroutine runs in 37 cycles, which is
|
||||
# 4.5x faster than compiler-generated code. Though comparison is
|
||||
# totally unfair, because this module utilizes Galois Field Multiply
|
||||
# instruction.
|
||||
|
||||
while (($output=shift) && ($output!~/\w[\w\-]*\.\w+$/)) {}
|
||||
open STDOUT,">$output";
|
||||
|
||||
($rp,$a1,$a0,$b1,$b0)=("A4","B4","A6","B6","A8"); # argument vector
|
||||
|
||||
($Alo,$Alox0,$Alox1,$Alox2,$Alox3)=map("A$_",(16..20));
|
||||
($Ahi,$Ahix0,$Ahix1,$Ahix2,$Ahix3)=map("B$_",(16..20));
|
||||
($B_0,$B_1,$B_2,$B_3)=("B5","A5","A7","B7");
|
||||
($A,$B)=($Alo,$B_1);
|
||||
$xFF="B1";
|
||||
|
||||
sub mul_1x1_upper {
|
||||
my ($A,$B)=@_;
|
||||
$code.=<<___;
|
||||
EXTU $B,8,24,$B_2 ; smash $B to 4 bytes
|
||||
|| AND $B,$xFF,$B_0
|
||||
|| SHRU $B,24,$B_3
|
||||
SHRU $A,16, $Ahi ; smash $A to two halfwords
|
||||
|| EXTU $A,16,16,$Alo
|
||||
|
||||
XORMPY $Alo,$B_2,$Alox2 ; 16x8 bits muliplication
|
||||
|| XORMPY $Ahi,$B_2,$Ahix2
|
||||
|| EXTU $B,16,24,$B_1
|
||||
XORMPY $Alo,$B_0,$Alox0
|
||||
|| XORMPY $Ahi,$B_0,$Ahix0
|
||||
XORMPY $Alo,$B_3,$Alox3
|
||||
|| XORMPY $Ahi,$B_3,$Ahix3
|
||||
XORMPY $Alo,$B_1,$Alox1
|
||||
|| XORMPY $Ahi,$B_1,$Ahix1
|
||||
___
|
||||
}
|
||||
sub mul_1x1_merged {
|
||||
my ($OUTlo,$OUThi,$A,$B)=@_;
|
||||
$code.=<<___;
|
||||
EXTU $B,8,24,$B_2 ; smash $B to 4 bytes
|
||||
|| AND $B,$xFF,$B_0
|
||||
|| SHRU $B,24,$B_3
|
||||
SHRU $A,16, $Ahi ; smash $A to two halfwords
|
||||
|| EXTU $A,16,16,$Alo
|
||||
|
||||
XOR $Ahix0,$Alox2,$Ahix0
|
||||
|| MV $Ahix2,$OUThi
|
||||
|| XORMPY $Alo,$B_2,$Alox2
|
||||
XORMPY $Ahi,$B_2,$Ahix2
|
||||
|| EXTU $B,16,24,$B_1
|
||||
|| XORMPY $Alo,$B_0,A1 ; $Alox0
|
||||
XOR $Ahix1,$Alox3,$Ahix1
|
||||
|| SHL $Ahix0,16,$OUTlo
|
||||
|| SHRU $Ahix0,16,$Ahix0
|
||||
XOR $Alox0,$OUTlo,$OUTlo
|
||||
|| XOR $Ahix0,$OUThi,$OUThi
|
||||
|| XORMPY $Ahi,$B_0,$Ahix0
|
||||
|| XORMPY $Alo,$B_3,$Alox3
|
||||
|| SHL $Alox1,8,$Alox1
|
||||
|| SHL $Ahix3,8,$Ahix3
|
||||
XOR $Alox1,$OUTlo,$OUTlo
|
||||
|| XOR $Ahix3,$OUThi,$OUThi
|
||||
|| XORMPY $Ahi,$B_3,$Ahix3
|
||||
|| SHL $Ahix1,24,$Alox1
|
||||
|| SHRU $Ahix1,8, $Ahix1
|
||||
XOR $Alox1,$OUTlo,$OUTlo
|
||||
|| XOR $Ahix1,$OUThi,$OUThi
|
||||
|| XORMPY $Alo,$B_1,$Alox1
|
||||
|| XORMPY $Ahi,$B_1,$Ahix1
|
||||
|| MV A1,$Alox0
|
||||
___
|
||||
}
|
||||
sub mul_1x1_lower {
|
||||
my ($OUTlo,$OUThi)=@_;
|
||||
$code.=<<___;
|
||||
;NOP
|
||||
XOR $Ahix0,$Alox2,$Ahix0
|
||||
|| MV $Ahix2,$OUThi
|
||||
NOP
|
||||
XOR $Ahix1,$Alox3,$Ahix1
|
||||
|| SHL $Ahix0,16,$OUTlo
|
||||
|| SHRU $Ahix0,16,$Ahix0
|
||||
XOR $Alox0,$OUTlo,$OUTlo
|
||||
|| XOR $Ahix0,$OUThi,$OUThi
|
||||
|| SHL $Alox1,8,$Alox1
|
||||
|| SHL $Ahix3,8,$Ahix3
|
||||
XOR $Alox1,$OUTlo,$OUTlo
|
||||
|| XOR $Ahix3,$OUThi,$OUThi
|
||||
|| SHL $Ahix1,24,$Alox1
|
||||
|| SHRU $Ahix1,8, $Ahix1
|
||||
XOR $Alox1,$OUTlo,$OUTlo
|
||||
|| XOR $Ahix1,$OUThi,$OUThi
|
||||
___
|
||||
}
|
||||
$code.=<<___;
|
||||
.text
|
||||
|
||||
.global _bn_GF2m_mul_2x2
|
||||
_bn_GF2m_mul_2x2:
|
||||
.asmfunc
|
||||
MVK 0xFF,$xFF
|
||||
___
|
||||
&mul_1x1_upper($a0,$b0); # a0<61>b0
|
||||
$code.=<<___;
|
||||
|| MV $b1,$B
|
||||
MV $a1,$A
|
||||
___
|
||||
&mul_1x1_merged("A28","B28",$A,$B); # a0<61>b0/a1<61>b1
|
||||
$code.=<<___;
|
||||
|| XOR $b0,$b1,$B
|
||||
XOR $a0,$a1,$A
|
||||
___
|
||||
&mul_1x1_merged("A31","B31",$A,$B); # a1<61>b1/(a0+a1)<29>(b0+b1)
|
||||
$code.=<<___;
|
||||
XOR A28,A31,A29
|
||||
|| XOR B28,B31,B29 ; a0<61>b0+a1<61>b1
|
||||
___
|
||||
&mul_1x1_lower("A30","B30"); # (a0+a1)<29>(b0+b1)
|
||||
$code.=<<___;
|
||||
|| BNOP B3
|
||||
XOR A29,A30,A30
|
||||
|| XOR B29,B30,B30 ; (a0+a1)<29>(b0+b1)-a0<61>b0-a1<61>b1
|
||||
XOR B28,A30,A30
|
||||
|| STW A28,*${rp}[0]
|
||||
XOR B30,A31,A31
|
||||
|| STW A30,*${rp}[1]
|
||||
STW A31,*${rp}[2]
|
||||
STW B31,*${rp}[3]
|
||||
.endasmfunc
|
||||
___
|
||||
|
||||
print $code;
|
||||
close STDOUT;
|
@@ -267,7 +267,7 @@ ___
|
||||
$code.=<<___;
|
||||
jr $ra
|
||||
move $a0,$v0
|
||||
.end bn_mul_add_words
|
||||
.end bn_mul_add_words_internal
|
||||
|
||||
.align 5
|
||||
.globl bn_mul_words
|
||||
@@ -778,7 +778,7 @@ ___
|
||||
$code.=<<___;
|
||||
jr $ra
|
||||
move $a0,$v0
|
||||
.end bn_sub_words
|
||||
.end bn_sub_words_internal
|
||||
|
||||
.align 5
|
||||
.globl bn_div_3_words
|
||||
|
@@ -952,7 +952,7 @@ $data=<<EOF;
|
||||
addze r11,r0
|
||||
#mul_add_c(a[3],b[2],c3,c1,c2);
|
||||
$LD r6,`3*$BNSZ`(r4)
|
||||
$LD r7,`2*$BNSZ`(r4)
|
||||
$LD r7,`2*$BNSZ`(r5)
|
||||
$UMULL r8,r6,r7
|
||||
$UMULH r9,r6,r7
|
||||
addc r12,r8,r12
|
||||
|
@@ -366,6 +366,10 @@ static void nist_cp_bn(BN_ULONG *buf, BN_ULONG *a, int top)
|
||||
# endif
|
||||
#endif /* BN_BITS2 != 64 */
|
||||
|
||||
#if defined(_TMS320C6X) && defined(NIST_INT64)
|
||||
# undef NIST_INT64 /* compiler bug */
|
||||
# pragma diag_suppress 177
|
||||
#endif
|
||||
|
||||
#define nist_set_192(to, from, a1, a2, a3) \
|
||||
{ \
|
||||
@@ -1047,6 +1051,11 @@ int BN_nist_mod_384(BIGNUM *r, const BIGNUM *a, const BIGNUM *field,
|
||||
return 1;
|
||||
}
|
||||
|
||||
#ifdef _WIN32_WCE
|
||||
/* Workaround for compiler bug under CE */
|
||||
#pragma optimize( "", off )
|
||||
#endif
|
||||
|
||||
#define BN_NIST_521_RSHIFT (521%BN_BITS2)
|
||||
#define BN_NIST_521_LSHIFT (BN_BITS2-BN_NIST_521_RSHIFT)
|
||||
#define BN_NIST_521_TOP_MASK ((BN_ULONG)BN_MASK2>>BN_NIST_521_LSHIFT)
|
||||
@@ -1113,6 +1122,10 @@ int BN_nist_mod_521(BIGNUM *r, const BIGNUM *a, const BIGNUM *field,
|
||||
return 1;
|
||||
}
|
||||
|
||||
#ifdef _WIN32_WCE
|
||||
#pragma optimize( "", on )
|
||||
#endif
|
||||
|
||||
int (*BN_nist_mod_func(const BIGNUM *p))(BIGNUM *r, const BIGNUM *a, const BIGNUM *field, BN_CTX *ctx)
|
||||
{
|
||||
if (BN_ucmp(&_bignum_nist_p_192, p) == 0)
|
||||
|
246
crypto/c64xpluscpuid.pl
Normal file
246
crypto/c64xpluscpuid.pl
Normal file
@@ -0,0 +1,246 @@
|
||||
#!/usr/bin/env perl
|
||||
#
|
||||
|
||||
while (($output=shift) && ($output!~/\w[\w\-]*\.\w+$/)) {}
|
||||
open STDOUT,">$output";
|
||||
|
||||
$code.=<<___;
|
||||
.text
|
||||
|
||||
.asg B3,RA
|
||||
|
||||
.global _OPENSSL_rdtsc
|
||||
_OPENSSL_rdtsc:
|
||||
.asmfunc
|
||||
B RA
|
||||
MVC TSCL,B0
|
||||
MVC TSCH,B1
|
||||
[!B0] MVC B0,TSCL ; start TSC
|
||||
MV B0,A4
|
||||
MV B1,A5
|
||||
.endasmfunc
|
||||
|
||||
.global _OPENSSL_cleanse
|
||||
_OPENSSL_cleanse:
|
||||
.asmfunc
|
||||
ZERO A3:A2
|
||||
|| ZERO B2
|
||||
|| SHRU B4,3,B0 ; is length >= 8
|
||||
|| ADD 1,A4,B6
|
||||
[!B0] BNOP RA
|
||||
|| ZERO A1
|
||||
|| ZERO B1
|
||||
[B0] MVC B0,ILC
|
||||
||[!B0] CMPLT 0,B4,A1
|
||||
||[!B0] CMPLT 1,B4,B1
|
||||
[A1] STB A2,*A4++[2]
|
||||
|| [B1] STB B2,*B6++[2]
|
||||
||[!B0] CMPLT 2,B4,A1
|
||||
||[!B0] CMPLT 3,B4,B1
|
||||
[A1] STB A2,*A4++[2]
|
||||
|| [B1] STB B2,*B6++[2]
|
||||
||[!B0] CMPLT 4,B4,A1
|
||||
||[!B0] CMPLT 5,B4,B1
|
||||
[A1] STB A2,*A4++[2]
|
||||
|| [B1] STB B2,*B6++[2]
|
||||
||[!B0] CMPLT 6,B4,A1
|
||||
[A1] STB A2,*A4++[2]
|
||||
|
||||
SPLOOP 1
|
||||
STNDW A3:A2,*A4++
|
||||
|| SUB B4,8,B4
|
||||
SPKERNEL
|
||||
|
||||
MV B4,B0 ; remaining bytes
|
||||
|| ADD 1,A4,B6
|
||||
|| BNOP RA
|
||||
[B0] CMPLT 0,B0,A1
|
||||
|| [B0] CMPLT 1,B0,B1
|
||||
[A1] STB A2,*A4++[2]
|
||||
|| [B1] STB B2,*B6++[2]
|
||||
|| [B0] CMPLT 2,B0,A1
|
||||
|| [B0] CMPLT 3,B0,B1
|
||||
[A1] STB A2,*A4++[2]
|
||||
|| [B1] STB B2,*B6++[2]
|
||||
|| [B0] CMPLT 4,B0,A1
|
||||
|| [B0] CMPLT 5,B0,B1
|
||||
[A1] STB A2,*A4++[2]
|
||||
|| [B1] STB B2,*B6++[2]
|
||||
|| [B0] CMPLT 6,B0,A1
|
||||
[A1] STB A2,*A4++[2]
|
||||
.endasmfunc
|
||||
|
||||
.global _OPENSSL_atomic_add
|
||||
_OPENSSL_atomic_add:
|
||||
.asmfunc
|
||||
MV A4,B0
|
||||
atomic_add?:
|
||||
LL *B0,B5
|
||||
NOP 4
|
||||
ADD B4,B5,B5
|
||||
SL B5,*B0
|
||||
CMTL *B0,B1
|
||||
NOP 4
|
||||
[!B1] B atomic_add?
|
||||
[B1] BNOP RA,4
|
||||
MV B5,A4
|
||||
.endasmfunc
|
||||
|
||||
.global _OPENSSL_wipe_cpu
|
||||
_OPENSSL_wipe_cpu:
|
||||
.asmfunc
|
||||
ZERO A0
|
||||
|| ZERO B0
|
||||
|| ZERO A1
|
||||
|| ZERO B1
|
||||
ZERO A3:A2
|
||||
|| MVD B0,B2
|
||||
|| ZERO A4
|
||||
|| ZERO B4
|
||||
|| ZERO A5
|
||||
|| ZERO B5
|
||||
|| BNOP RA
|
||||
ZERO A7:A6
|
||||
|| ZERO B7:B6
|
||||
|| ZERO A8
|
||||
|| ZERO B8
|
||||
|| ZERO A9
|
||||
|| ZERO B9
|
||||
ZERO A17:A16
|
||||
|| ZERO B17:B16
|
||||
|| ZERO A18
|
||||
|| ZERO B18
|
||||
|| ZERO A19
|
||||
|| ZERO B19
|
||||
ZERO A21:A20
|
||||
|| ZERO B21:B20
|
||||
|| ZERO A22
|
||||
|| ZERO B22
|
||||
|| ZERO A23
|
||||
|| ZERO B23
|
||||
ZERO A25:A24
|
||||
|| ZERO B25:B24
|
||||
|| ZERO A26
|
||||
|| ZERO B26
|
||||
|| ZERO A27
|
||||
|| ZERO B27
|
||||
ZERO A29:A28
|
||||
|| ZERO B29:B28
|
||||
|| ZERO A30
|
||||
|| ZERO B30
|
||||
|| ZERO A31
|
||||
|| ZERO B31
|
||||
.endasmfunc
|
||||
|
||||
CLFLUSH .macro CONTROL,ADDR,LEN
|
||||
B passthrough?
|
||||
|| STW ADDR,*CONTROL[0]
|
||||
STW LEN,*CONTROL[1]
|
||||
spinlock?:
|
||||
LDW *CONTROL[1],A0
|
||||
NOP 3
|
||||
passthrough?:
|
||||
NOP
|
||||
[A0] BNOP spinlock?,5
|
||||
.endm
|
||||
|
||||
.global _OPENSSL_instrument_bus
|
||||
_OPENSSL_instrument_bus:
|
||||
.asmfunc
|
||||
MV B4,B0 ; reassign sizeof(output)
|
||||
|| MV A4,B4 ; reassign output
|
||||
|| MVK 0x00004030,A3
|
||||
MV B0,A4 ; return value
|
||||
|| MVK 1,A1
|
||||
|| MVKH 0x01840000,A3 ; L1DWIBAR
|
||||
MVC TSCL,B8 ; collect 1st tick
|
||||
|| MVK 0x00004010,A5
|
||||
MV B8,B9 ; lasttick = tick
|
||||
|| MVK 0,B7 ; lastdiff = 0
|
||||
|| MVKH 0x01840000,A5 ; L2WIBAR
|
||||
CLFLUSH A3,B4,A1 ; write-back and invalidate L1D line
|
||||
CLFLUSH A5,B4,A1 ; write-back and invalidate L2 line
|
||||
LL *B4,B5
|
||||
NOP 4
|
||||
ADD B7,B5,B5
|
||||
SL B5,*B4
|
||||
CMTL *B4,B1
|
||||
NOP 4
|
||||
STW B5,*B4
|
||||
bus_loop1?:
|
||||
MVC TSCL,B8
|
||||
|| [B0] SUB B0,1,B0
|
||||
SUB B8,B9,B7 ; lastdiff = tick - lasttick
|
||||
|| MV B8,B9 ; lasttick = tick
|
||||
CLFLUSH A3,B4,A1 ; write-back and invalidate L1D line
|
||||
CLFLUSH A5,B4,A1 ; write-back and invalidate L2 line
|
||||
LL *B4,B5
|
||||
NOP 4
|
||||
ADD B7,B5,B5
|
||||
SL B5,*B4
|
||||
CMTL *B4,B1
|
||||
STW B5,*B4 ; [!B1] is removed to flatten samples
|
||||
|| ADDK 4,B4
|
||||
|| [B0] BNOP bus_loop1?,5
|
||||
|
||||
BNOP RA,5
|
||||
.endasmfunc
|
||||
|
||||
.global _OPENSSL_instrument_bus2
|
||||
_OPENSSL_instrument_bus2:
|
||||
.asmfunc
|
||||
MV A6,B0 ; reassign max
|
||||
|| MV B4,A6 ; reassing sizeof(output)
|
||||
|| MVK 0x00004030,A3
|
||||
MV A4,B4 ; reassign output
|
||||
|| MVK 0,A4 ; return value
|
||||
|| MVK 1,A1
|
||||
|| MVKH 0x01840000,A3 ; L1DWIBAR
|
||||
|
||||
MVC TSCL,B8 ; collect 1st tick
|
||||
|| MVK 0x00004010,A5
|
||||
MV B8,B9 ; lasttick = tick
|
||||
|| MVK 0,B7 ; lastdiff = 0
|
||||
|| MVKH 0x01840000,A5 ; L2WIBAR
|
||||
CLFLUSH A3,B4,A1 ; write-back and invalidate L1D line
|
||||
CLFLUSH A5,B4,A1 ; write-back and invalidate L2 line
|
||||
LL *B4,B5
|
||||
NOP 4
|
||||
ADD B7,B5,B5
|
||||
SL B5,*B4
|
||||
CMTL *B4,B1
|
||||
NOP 4
|
||||
STW B5,*B4
|
||||
|
||||
MVC TSCL,B8 ; collect 1st diff
|
||||
SUB B8,B9,B7 ; lastdiff = tick - lasttick
|
||||
|| MV B8,B9 ; lasttick = tick
|
||||
|| SUB B0,1,B0
|
||||
bus_loop2?:
|
||||
CLFLUSH A3,B4,A1 ; write-back and invalidate L1D line
|
||||
CLFLUSH A5,B4,A1 ; write-back and invalidate L2 line
|
||||
LL *B4,B5
|
||||
NOP 4
|
||||
ADD B7,B5,B5
|
||||
SL B5,*B4
|
||||
CMTL *B4,B1
|
||||
STW B5,*B4 ; [!B1] is removed to flatten samples
|
||||
||[!B0] BNOP bus_loop2_done?,2
|
||||
|| SUB B0,1,B0
|
||||
MVC TSCL,B8
|
||||
SUB B8,B9,B8
|
||||
|| MV B8,B9
|
||||
CMPEQ B8,B7,B2
|
||||
|| MV B8,B7
|
||||
[!B2] ADDAW B4,1,B4
|
||||
||[!B2] ADDK 1,A4
|
||||
CMPEQ A4,A6,A2
|
||||
[!A2] BNOP bus_loop2?,5
|
||||
|
||||
bus_loop2_done?:
|
||||
BNOP RA,5
|
||||
.endasmfunc
|
||||
___
|
||||
|
||||
print $code;
|
||||
close STDOUT;
|
@@ -143,7 +143,8 @@ int CMAC_CTX_copy(CMAC_CTX *out, const CMAC_CTX *in)
|
||||
int CMAC_Init(CMAC_CTX *ctx, const void *key, size_t keylen,
|
||||
const EVP_CIPHER *cipher, ENGINE *impl)
|
||||
{
|
||||
static unsigned char zero_iv[EVP_MAX_BLOCK_LENGTH];
|
||||
__fips_constseg
|
||||
static const unsigned char zero_iv[EVP_MAX_BLOCK_LENGTH] = {0};
|
||||
/* All zeros means restart */
|
||||
if (!key && !cipher && !impl && keylen == 0)
|
||||
{
|
||||
|
@@ -359,7 +359,15 @@ void OPENSSL_showfatal (const char *fmta,...)
|
||||
{ va_list ap;
|
||||
|
||||
va_start (ap,fmta);
|
||||
#if defined(OPENSSL_SYS_VXWORKS)
|
||||
{
|
||||
char buf[256];
|
||||
vsnprintf(buf,sizeof(buf),fmta,ap);
|
||||
printf("%s",buf);
|
||||
}
|
||||
#else
|
||||
vfprintf (stderr,fmta,ap);
|
||||
#endif
|
||||
va_end (ap);
|
||||
}
|
||||
int OPENSSL_isservice (void) { return 0; }
|
||||
@@ -374,7 +382,9 @@ void OpenSSLDie(const char *file,int line,const char *assertion)
|
||||
abort();
|
||||
#else
|
||||
/* Win32 abort() customarily shows a dialog, but we just did that... */
|
||||
#ifdef SIGABRT
|
||||
raise(SIGABRT);
|
||||
#endif
|
||||
_exit(3);
|
||||
#endif
|
||||
}
|
||||
|
@@ -56,6 +56,9 @@
|
||||
* [including the GNU Public Licence.]
|
||||
*/
|
||||
|
||||
#ifdef _TMS320C6X
|
||||
# pragma DATA_SECTION(DES_SPtrans,".const:des_sptrans")
|
||||
#endif
|
||||
__fips_constseg
|
||||
OPENSSL_GLOBAL const DES_LONG DES_SPtrans[8][64]={
|
||||
{
|
||||
|
@@ -215,6 +215,11 @@ DSA_SIG * FIPS_dsa_sign_ctx(DSA *dsa, EVP_MD_CTX *ctx);
|
||||
int FIPS_dsa_verify_digest(DSA *dsa,
|
||||
const unsigned char *dig, int dlen, DSA_SIG *s);
|
||||
int FIPS_dsa_verify_ctx(DSA *dsa, EVP_MD_CTX *ctx, DSA_SIG *s);
|
||||
int FIPS_dsa_verify(DSA *dsa, const unsigned char *msg, size_t msglen,
|
||||
const EVP_MD *mhash, DSA_SIG *s);
|
||||
DSA_SIG * FIPS_dsa_sign(DSA *dsa, const unsigned char *msg, size_t msglen,
|
||||
const EVP_MD *mhash);
|
||||
|
||||
#endif
|
||||
|
||||
DSA * DSA_new(void);
|
||||
|
@@ -666,7 +666,13 @@ int dsa_builtin_paramgen2(DSA *ret, size_t L, size_t N,
|
||||
/* "offset = offset + n + 1" */
|
||||
|
||||
/* step 14 */
|
||||
if (counter >= 4096) break;
|
||||
if (counter >= (int)(4 * L)) break;
|
||||
}
|
||||
if (seed_in)
|
||||
{
|
||||
ok = 0;
|
||||
DSAerr(DSA_F_DSA_BUILTIN_PARAMGEN2, DSA_R_INVALID_PARAMETERS);
|
||||
goto err;
|
||||
}
|
||||
}
|
||||
end:
|
||||
|
@@ -556,7 +556,7 @@ int ec_GF2m_simple_is_on_curve(const EC_GROUP *group, const EC_POINT *point, BN_
|
||||
field_sqr = group->meth->field_sqr;
|
||||
|
||||
/* only support affine coordinates */
|
||||
if (!point->Z_is_one) goto err;
|
||||
if (!point->Z_is_one) return -1;
|
||||
|
||||
if (ctx == NULL)
|
||||
{
|
||||
|
@@ -511,10 +511,12 @@ int EC_KEY_set_public_key_affine_coordinates(EC_KEY *key, BIGNUM *x, BIGNUM *y)
|
||||
tx, ty, ctx))
|
||||
goto err;
|
||||
}
|
||||
/* Check if retrieved coordinates match originals: if not values
|
||||
* are out of range.
|
||||
/* Check if retrieved coordinates match originals and are less than
|
||||
* field order: if not values are out of range.
|
||||
*/
|
||||
if (BN_cmp(x, tx) || BN_cmp(y, ty))
|
||||
if (BN_cmp(x, tx) || BN_cmp(y, ty)
|
||||
|| (BN_cmp(x, &key->group->field) >= 0)
|
||||
|| (BN_cmp(y, &key->group->field) >= 0))
|
||||
{
|
||||
ECerr(EC_F_EC_KEY_SET_PUBLIC_KEY_AFFINE_COORDINATES,
|
||||
EC_R_COORDINATES_OUT_OF_RANGE);
|
||||
|
@@ -85,6 +85,8 @@
|
||||
extern "C" {
|
||||
#endif
|
||||
|
||||
#define EC_FLAG_COFACTOR_ECDH 0x1000
|
||||
|
||||
const ECDH_METHOD *ECDH_OpenSSL(void);
|
||||
|
||||
void ECDH_set_default_method(const ECDH_METHOD *);
|
||||
|
@@ -146,6 +146,18 @@ static int ecdh_compute_key(void *out, size_t outlen, const EC_POINT *pub_key,
|
||||
}
|
||||
|
||||
group = EC_KEY_get0_group(ecdh);
|
||||
|
||||
if (EC_KEY_get_flags(ecdh) & EC_FLAG_COFACTOR_ECDH)
|
||||
{
|
||||
if (!EC_GROUP_get_cofactor(group, x, ctx) ||
|
||||
!BN_mul(x, x, priv_key, ctx))
|
||||
{
|
||||
ECDHerr(ECDH_F_ECDH_COMPUTE_KEY, ERR_R_MALLOC_FAILURE);
|
||||
goto err;
|
||||
}
|
||||
priv_key = x;
|
||||
}
|
||||
|
||||
if ((tmp=EC_POINT_new(group)) == NULL)
|
||||
{
|
||||
ECDHerr(ECDH_F_ECDH_COMPUTE_KEY,ERR_R_MALLOC_FAILURE);
|
||||
|
@@ -236,6 +236,11 @@ ECDSA_SIG * FIPS_ecdsa_sign_ctx(EC_KEY *key, EVP_MD_CTX *ctx);
|
||||
int FIPS_ecdsa_verify_digest(EC_KEY *key,
|
||||
const unsigned char *dig, int dlen, ECDSA_SIG *s);
|
||||
int FIPS_ecdsa_verify_ctx(EC_KEY *key, EVP_MD_CTX *ctx, ECDSA_SIG *s);
|
||||
int FIPS_ecdsa_verify(EC_KEY *key, const unsigned char *msg, size_t msglen,
|
||||
const EVP_MD *mhash, ECDSA_SIG *s);
|
||||
ECDSA_SIG * FIPS_ecdsa_sign(EC_KEY *key,
|
||||
const unsigned char *msg, size_t msglen,
|
||||
const EVP_MD *mhash);
|
||||
#endif
|
||||
|
||||
|
||||
|
@@ -89,6 +89,10 @@ typedef struct
|
||||
{
|
||||
AES_KEY ks1, ks2; /* AES key schedules to use */
|
||||
XTS128_CONTEXT xts;
|
||||
void (*stream)(const unsigned char *in,
|
||||
unsigned char *out, size_t length,
|
||||
const AES_KEY *key1, const AES_KEY *key2,
|
||||
const unsigned char iv[16]);
|
||||
} EVP_AES_XTS_CTX;
|
||||
|
||||
typedef struct
|
||||
@@ -123,6 +127,9 @@ void vpaes_cbc_encrypt(const unsigned char *in,
|
||||
unsigned char *ivec, int enc);
|
||||
#endif
|
||||
#ifdef BSAES_ASM
|
||||
void bsaes_cbc_encrypt(const unsigned char *in, unsigned char *out,
|
||||
size_t length, const AES_KEY *key,
|
||||
unsigned char ivec[16], int enc);
|
||||
void bsaes_ctr32_encrypt_blocks(const unsigned char *in, unsigned char *out,
|
||||
size_t len, const AES_KEY *key,
|
||||
const unsigned char ivec[16]);
|
||||
@@ -337,11 +344,13 @@ static int aesni_xts_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
|
||||
{
|
||||
aesni_set_encrypt_key(key, ctx->key_len * 4, &xctx->ks1);
|
||||
xctx->xts.block1 = (block128_f)aesni_encrypt;
|
||||
xctx->stream = aesni_xts_encrypt;
|
||||
}
|
||||
else
|
||||
{
|
||||
aesni_set_decrypt_key(key, ctx->key_len * 4, &xctx->ks1);
|
||||
xctx->xts.block1 = (block128_f)aesni_decrypt;
|
||||
xctx->stream = aesni_xts_decrypt;
|
||||
}
|
||||
|
||||
aesni_set_encrypt_key(key + ctx->key_len/2,
|
||||
@@ -360,32 +369,9 @@ static int aesni_xts_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
|
||||
return 1;
|
||||
}
|
||||
|
||||
#define aesni_xts_cipher aes_xts_cipher
|
||||
static int aesni_xts_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
|
||||
const unsigned char *in, size_t len)
|
||||
{
|
||||
EVP_AES_XTS_CTX *xctx = ctx->cipher_data;
|
||||
if (!xctx->xts.key1 || !xctx->xts.key2)
|
||||
return -1;
|
||||
if (!out || !in)
|
||||
return -1;
|
||||
#ifdef OPENSSL_FIPS
|
||||
/* Requirement of SP800-38E */
|
||||
if (FIPS_module_mode() && !(ctx->flags & EVP_CIPH_FLAG_NON_FIPS_ALLOW) &&
|
||||
(len > (1L<<20)*16))
|
||||
{
|
||||
EVPerr(EVP_F_AESNI_XTS_CIPHER, EVP_R_TOO_LARGE);
|
||||
return -1;
|
||||
}
|
||||
#endif
|
||||
if (ctx->encrypt)
|
||||
aesni_xts_encrypt(in, out, len,
|
||||
xctx->xts.key1, xctx->xts.key2, ctx->iv);
|
||||
else
|
||||
aesni_xts_decrypt(in, out, len,
|
||||
xctx->xts.key1, xctx->xts.key2, ctx->iv);
|
||||
|
||||
return len;
|
||||
}
|
||||
const unsigned char *in, size_t len);
|
||||
|
||||
static int aesni_ccm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
|
||||
const unsigned char *iv, int enc)
|
||||
@@ -503,6 +489,15 @@ static int aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
|
||||
mode = ctx->cipher->flags & EVP_CIPH_MODE;
|
||||
if ((mode == EVP_CIPH_ECB_MODE || mode == EVP_CIPH_CBC_MODE)
|
||||
&& !enc)
|
||||
#ifdef BSAES_CAPABLE
|
||||
if (BSAES_CAPABLE && mode==EVP_CIPH_CBC_MODE)
|
||||
{
|
||||
ret = AES_set_decrypt_key(key,ctx->key_len*8,&dat->ks);
|
||||
dat->block = (block128_f)AES_decrypt;
|
||||
dat->stream.cbc = (cbc128_f)bsaes_cbc_encrypt;
|
||||
}
|
||||
else
|
||||
#endif
|
||||
#ifdef VPAES_CAPABLE
|
||||
if (VPAES_CAPABLE)
|
||||
{
|
||||
@@ -961,8 +956,6 @@ static int aes_gcm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
|
||||
|
||||
if (!gctx->iv_set)
|
||||
return -1;
|
||||
if (!ctx->encrypt && gctx->taglen < 0)
|
||||
return -1;
|
||||
if (in)
|
||||
{
|
||||
if (out == NULL)
|
||||
@@ -1004,6 +997,8 @@ static int aes_gcm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
|
||||
{
|
||||
if (!ctx->encrypt)
|
||||
{
|
||||
if (gctx->taglen < 0)
|
||||
return -1;
|
||||
if (CRYPTO_gcm128_finish(&gctx->gcm,
|
||||
ctx->buf, gctx->taglen) != 0)
|
||||
return -1;
|
||||
@@ -1050,6 +1045,7 @@ static int aes_xts_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
|
||||
|
||||
if (key) do
|
||||
{
|
||||
xctx->stream = NULL;
|
||||
/* key_len is two AES keys */
|
||||
#ifdef VPAES_CAPABLE
|
||||
if (VPAES_CAPABLE)
|
||||
@@ -1105,22 +1101,25 @@ static int aes_xts_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
|
||||
{
|
||||
EVP_AES_XTS_CTX *xctx = ctx->cipher_data;
|
||||
if (!xctx->xts.key1 || !xctx->xts.key2)
|
||||
return -1;
|
||||
return 0;
|
||||
if (!out || !in)
|
||||
return -1;
|
||||
return 0;
|
||||
#ifdef OPENSSL_FIPS
|
||||
/* Requirement of SP800-38E */
|
||||
if (FIPS_module_mode() && !(ctx->flags & EVP_CIPH_FLAG_NON_FIPS_ALLOW) &&
|
||||
(len > (1L<<20)*16))
|
||||
(len > (1UL<<20)*16))
|
||||
{
|
||||
EVPerr(EVP_F_AES_XTS_CIPHER, EVP_R_TOO_LARGE);
|
||||
return -1;
|
||||
return 0;
|
||||
}
|
||||
#endif
|
||||
if (CRYPTO_xts128_encrypt(&xctx->xts, ctx->iv, in, out, len,
|
||||
if (xctx->stream)
|
||||
(*xctx->stream)(in, out, len,
|
||||
xctx->xts.key1, xctx->xts.key2, ctx->iv);
|
||||
else if (CRYPTO_xts128_encrypt(&xctx->xts, ctx->iv, in, out, len,
|
||||
ctx->encrypt))
|
||||
return -1;
|
||||
return len;
|
||||
return 0;
|
||||
return 1;
|
||||
}
|
||||
|
||||
#define aes_xts_cleanup NULL
|
||||
|
@@ -75,7 +75,7 @@ static int cname##_ecb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const uns
|
||||
return 1;\
|
||||
}
|
||||
|
||||
#define EVP_MAXCHUNK ((size_t)1<<(sizeof(long)*8-2))
|
||||
#define EVP_MAXCHUNK ((size_t)1<<(sizeof(int)*8-2))
|
||||
|
||||
#define BLOCK_CIPHER_func_ofb(cname, cprefix, cbits, kstruct, ksched) \
|
||||
static int cname##_ofb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) \
|
||||
|
231
crypto/modes/asm/ghash-c64xplus.pl
Normal file
231
crypto/modes/asm/ghash-c64xplus.pl
Normal file
@@ -0,0 +1,231 @@
|
||||
#!/usr/bin/env perl
|
||||
#
|
||||
# ====================================================================
|
||||
# Written by Andy Polyakov <appro@openssl.org> for the OpenSSL
|
||||
# project. The module is, however, dual licensed under OpenSSL and
|
||||
# CRYPTOGAMS licenses depending on where you obtain it. For further
|
||||
# details see http://www.openssl.org/~appro/cryptogams/.
|
||||
# ====================================================================
|
||||
#
|
||||
# December 2011
|
||||
#
|
||||
# The module implements GCM GHASH function and underlying single
|
||||
# multiplication operation in GF(2^128). Even though subroutines
|
||||
# have _4bit suffix, they are not using any tables, but rely on
|
||||
# hardware Galois Field Multiply support. Streamed GHASH processes
|
||||
# byte in ~7 cycles, which is >6x faster than "4-bit" table-driven
|
||||
# code compiled with TI's cl6x 6.0 with -mv6400+ -o2 flags. We are
|
||||
# comparing apples vs. oranges, but compiler surely could have done
|
||||
# better, because theoretical [though not necessarily achievable]
|
||||
# estimate for "4-bit" table-driven implementation is ~12 cycles.
|
||||
|
||||
while (($output=shift) && ($output!~/\w[\w\-]*\.\w+$/)) {}
|
||||
open STDOUT,">$output";
|
||||
|
||||
($Xip,$Htable,$inp,$len)=("A4","B4","A6","B6"); # arguments
|
||||
|
||||
($Z0,$Z1,$Z2,$Z3, $H0, $H1, $H2, $H3,
|
||||
$H0x,$H1x,$H2x,$H3x)=map("A$_",(16..27));
|
||||
($H01u,$H01y,$H2u,$H3u, $H0y,$H1y,$H2y,$H3y,
|
||||
$H0z,$H1z,$H2z,$H3z)=map("B$_",(16..27));
|
||||
($FF000000,$E10000)=("B30","B31");
|
||||
($xip,$x0,$x1,$xib)=map("B$_",(6..9)); # $xip zaps $len
|
||||
$xia="A9";
|
||||
($rem,$res)=("B4","B5"); # $rem zaps $Htable
|
||||
|
||||
$code.=<<___;
|
||||
.text
|
||||
|
||||
.asg B3,RA
|
||||
|
||||
.if 0
|
||||
.global _gcm_gmult_1bit
|
||||
_gcm_gmult_1bit:
|
||||
ADDAD $Htable,2,$Htable
|
||||
.endif
|
||||
.global _gcm_gmult_4bit
|
||||
_gcm_gmult_4bit:
|
||||
.asmfunc
|
||||
LDDW *${Htable}[-1],$H1:$H0 ; H.lo
|
||||
LDDW *${Htable}[-2],$H3:$H2 ; H.hi
|
||||
|| MV $Xip,${xip} ; reassign Xi
|
||||
|| MVK 15,B1 ; SPLOOPD constant
|
||||
|
||||
MVK 0xE1,$E10000
|
||||
|| LDBU *++${xip}[15],$x1 ; Xi[15]
|
||||
MVK 0xFF,$FF000000
|
||||
|| LDBU *--${xip},$x0 ; Xi[14]
|
||||
SHL $E10000,16,$E10000 ; [pre-shifted] reduction polynomial
|
||||
SHL $FF000000,24,$FF000000 ; upper byte mask
|
||||
|| BNOP ghash_loop?
|
||||
|| MVK 1,B0 ; take a single spin
|
||||
|
||||
PACKH2 $H0,$H1,$xia ; pack H0' and H1's upper bytes
|
||||
AND $H2,$FF000000,$H2u ; H2's upper byte
|
||||
AND $H3,$FF000000,$H3u ; H3's upper byte
|
||||
|| SHRU $H2u,8,$H2u
|
||||
SHRU $H3u,8,$H3u
|
||||
|| ZERO $Z1:$Z0
|
||||
SHRU2 $xia,8,$H01u
|
||||
|| ZERO $Z3:$Z2
|
||||
.endasmfunc
|
||||
|
||||
.global _gcm_ghash_4bit
|
||||
_gcm_ghash_4bit:
|
||||
.asmfunc
|
||||
LDDW *${Htable}[-1],$H1:$H0 ; H.lo
|
||||
|| SHRU $len,4,B0 ; reassign len
|
||||
LDDW *${Htable}[-2],$H3:$H2 ; H.hi
|
||||
|| MV $Xip,${xip} ; reassign Xi
|
||||
|| MVK 15,B1 ; SPLOOPD constant
|
||||
|
||||
MVK 0xE1,$E10000
|
||||
|| [B0] LDNDW *${inp}[1],$H1x:$H0x
|
||||
MVK 0xFF,$FF000000
|
||||
|| [B0] LDNDW *${inp}++[2],$H3x:$H2x
|
||||
SHL $E10000,16,$E10000 ; [pre-shifted] reduction polynomial
|
||||
|| LDDW *${xip}[1],$Z1:$Z0
|
||||
SHL $FF000000,24,$FF000000 ; upper byte mask
|
||||
|| LDDW *${xip}[0],$Z3:$Z2
|
||||
|
||||
PACKH2 $H0,$H1,$xia ; pack H0' and H1's upper bytes
|
||||
AND $H2,$FF000000,$H2u ; H2's upper byte
|
||||
AND $H3,$FF000000,$H3u ; H3's upper byte
|
||||
|| SHRU $H2u,8,$H2u
|
||||
SHRU $H3u,8,$H3u
|
||||
SHRU2 $xia,8,$H01u
|
||||
|
||||
|| [B0] XOR $H0x,$Z0,$Z0 ; Xi^=inp
|
||||
|| [B0] XOR $H1x,$Z1,$Z1
|
||||
.if .LITTLE_ENDIAN
|
||||
[B0] XOR $H2x,$Z2,$Z2
|
||||
|| [B0] XOR $H3x,$Z3,$Z3
|
||||
|| [B0] SHRU $Z1,24,$xia ; Xi[15], avoid cross-path stall
|
||||
STDW $Z1:$Z0,*${xip}[1]
|
||||
|| [B0] SHRU $Z1,16,$x0 ; Xi[14]
|
||||
|| [B0] ZERO $Z1:$Z0
|
||||
.else
|
||||
[B0] XOR $H2x,$Z2,$Z2
|
||||
|| [B0] XOR $H3x,$Z3,$Z3
|
||||
|| [B0] MV $Z0,$xia ; Xi[15], avoid cross-path stall
|
||||
STDW $Z1:$Z0,*${xip}[1]
|
||||
|| [B0] SHRU $Z0,8,$x0 ; Xi[14]
|
||||
|| [B0] ZERO $Z1:$Z0
|
||||
.endif
|
||||
STDW $Z3:$Z2,*${xip}[0]
|
||||
|| [B0] ZERO $Z3:$Z2
|
||||
|| [B0] MV $xia,$x1
|
||||
[B0] ADDK 14,${xip}
|
||||
|
||||
ghash_loop?:
|
||||
SPLOOPD 6 ; 6*16+7
|
||||
|| MVC B1,ILC
|
||||
|| [B0] SUB B0,1,B0
|
||||
|| ZERO A0
|
||||
|| ADD $x1,$x1,$xib ; SHL $x1,1,$xib
|
||||
|| SHL $x1,1,$xia
|
||||
___
|
||||
|
||||
########____________________________
|
||||
# 0 D2. M1 M2 |
|
||||
# 1 M1 |
|
||||
# 2 M1 M2 |
|
||||
# 3 D1. M1 M2 |
|
||||
# 4 S1. L1 |
|
||||
# 5 S2 S1x L1 D2 L2 |____________________________
|
||||
# 6/0 L1 S1 L2 S2x |D2. M1 M2 |
|
||||
# 7/1 L1 S1 D1x S2 M2 | M1 |
|
||||
# 8/2 S1 L1x S2 | M1 M2 |
|
||||
# 9/3 S1 L1x | D1. M1 M2 |
|
||||
# 10/4 D1x | S1. L1 |
|
||||
# 11/5 |S2 S1x L1 D2 L2 |____________
|
||||
# 12/6/0 D1x __| L1 S1 L2 S2x |D2. ....
|
||||
# 7/1 L1 S1 D1x S2 M2 | ....
|
||||
# 8/2 S1 L1x S2 | ....
|
||||
#####... ................|............
|
||||
$code.=<<___;
|
||||
XORMPY $H0,$xia,$H0x ; 0 ; H<>Xi[i]
|
||||
|| XORMPY $H01u,$xib,$H01y
|
||||
|| [A0] LDBU *--${xip},$x0
|
||||
XORMPY $H1,$xia,$H1x ; 1
|
||||
XORMPY $H2,$xia,$H2x ; 2
|
||||
|| XORMPY $H2u,$xib,$H2y
|
||||
XORMPY $H3,$xia,$H3x ; 3
|
||||
|| XORMPY $H3u,$xib,$H3y
|
||||
||[!A0] MVK.D 15,A0 ; *--${xip} counter
|
||||
XOR.L $H0x,$Z0,$Z0 ; 4 ; Z^=H<>Xi[i]
|
||||
|| [A0] SUB.S A0,1,A0
|
||||
XOR.L $H1x,$Z1,$Z1 ; 5
|
||||
|| AND.D $H01y,$FF000000,$H0z
|
||||
|| SWAP2.L $H01y,$H1y ; ; SHL $H01y,16,$H1y
|
||||
|| SHL $x0,1,$xib
|
||||
|| SHL $x0,1,$xia
|
||||
|
||||
XOR.L $H2x,$Z2,$Z2 ; 6/0 ; [0,0] in epilogue
|
||||
|| SHL $Z0,1,$rem ; ; rem=Z<<1
|
||||
|| SHRMB.S $Z1,$Z0,$Z0 ; ; Z>>=8
|
||||
|| AND.L $H1y,$FF000000,$H1z
|
||||
XOR.L $H3x,$Z3,$Z3 ; 7/1
|
||||
|| SHRMB.S $Z2,$Z1,$Z1
|
||||
|| XOR.D $H0z,$Z0,$Z0 ; merge upper byte products
|
||||
|| AND.S $H2y,$FF000000,$H2z
|
||||
|| XORMPY $E10000,$rem,$res ; ; implicit rem&0x1FE
|
||||
XOR.L $H1z,$Z1,$Z1 ; 8/2
|
||||
|| SHRMB.S $Z3,$Z2,$Z2
|
||||
|| AND.S $H3y,$FF000000,$H3z
|
||||
XOR.L $H2z,$Z2,$Z2 ; 9/3
|
||||
|| SHRU $Z3,8,$Z3
|
||||
XOR.D $H3z,$Z3,$Z3 ; 10/4
|
||||
NOP ; 11/5
|
||||
|
||||
SPKERNEL 0,2
|
||||
|| XOR.D $res,$Z3,$Z3 ; 12/6/0; Z^=res
|
||||
|
||||
; input pre-fetch is possible where D1 slot is available...
|
||||
[B0] LDNDW *${inp}[1],$H1x:$H0x ; 8/-
|
||||
[B0] LDNDW *${inp}++[2],$H3x:$H2x ; 9/-
|
||||
NOP ; 10/-
|
||||
.if .LITTLE_ENDIAN
|
||||
SWAP2 $Z0,$Z1 ; 11/-
|
||||
|| SWAP4 $Z1,$Z0
|
||||
SWAP4 $Z1,$Z1 ; 12/-
|
||||
|| SWAP2 $Z0,$Z0
|
||||
SWAP2 $Z2,$Z3
|
||||
|| SWAP4 $Z3,$Z2
|
||||
||[!B0] BNOP RA
|
||||
SWAP4 $Z3,$Z3
|
||||
|| SWAP2 $Z2,$Z2
|
||||
|| [B0] BNOP ghash_loop?
|
||||
[B0] XOR $H0x,$Z0,$Z0 ; Xi^=inp
|
||||
|| [B0] XOR $H1x,$Z1,$Z1
|
||||
[B0] XOR $H2x,$Z2,$Z2
|
||||
|| [B0] XOR $H3x,$Z3,$Z3
|
||||
|| [B0] SHRU $Z1,24,$xia ; Xi[15], avoid cross-path stall
|
||||
STDW $Z1:$Z0,*${xip}[1]
|
||||
|| [B0] SHRU $Z1,16,$x0 ; Xi[14]
|
||||
|| [B0] ZERO $Z1:$Z0
|
||||
.else
|
||||
[!B0] BNOP RA ; 11/-
|
||||
[B0] BNOP ghash_loop? ; 12/-
|
||||
[B0] XOR $H0x,$Z0,$Z0 ; Xi^=inp
|
||||
|| [B0] XOR $H1x,$Z1,$Z1
|
||||
[B0] XOR $H2x,$Z2,$Z2
|
||||
|| [B0] XOR $H3x,$Z3,$Z3
|
||||
|| [B0] MV $Z0,$xia ; Xi[15], avoid cross-path stall
|
||||
STDW $Z1:$Z0,*${xip}[1]
|
||||
|| [B0] SHRU $Z0,8,$x0 ; Xi[14]
|
||||
|| [B0] ZERO $Z1:$Z0
|
||||
.endif
|
||||
STDW $Z3:$Z2,*${xip}[0]
|
||||
|| [B0] ZERO $Z3:$Z2
|
||||
|| [B0] MV $xia,$x1
|
||||
[B0] ADDK 14,${xip}
|
||||
.endasmfunc
|
||||
|
||||
.sect .const
|
||||
.cstring "GHASH for C64x+, CRYPTOGAMS by <appro\@openssl.org>"
|
||||
.align 4
|
||||
___
|
||||
|
||||
print $code;
|
||||
close STDOUT;
|
@@ -674,6 +674,8 @@ void gcm_ghash_4bit_x86(u64 Xi[2],const u128 Htable[16],const u8 *inp,size_t len
|
||||
void gcm_gmult_neon(u64 Xi[2],const u128 Htable[16]);
|
||||
void gcm_ghash_neon(u64 Xi[2],const u128 Htable[16],const u8 *inp,size_t len);
|
||||
# endif
|
||||
# elif defined(_TMS320C6400_PLUS)
|
||||
# define GHASH_ASM_C64Xplus
|
||||
# endif
|
||||
#endif
|
||||
|
||||
@@ -746,6 +748,10 @@ void CRYPTO_gcm128_init(GCM128_CONTEXT *ctx,void *key,block128_f block)
|
||||
ctx->gmult = gcm_gmult_4bit;
|
||||
ctx->ghash = gcm_ghash_4bit;
|
||||
}
|
||||
# elif defined(GHASH_ASM_C64Xplus)
|
||||
/* C64x+ assembler doesn't use tables, skip gcm_init_4bit.
|
||||
* This is likely to trigger "function never referenced"
|
||||
* warning and code being eliminated. */
|
||||
# else
|
||||
gcm_init_4bit(ctx->Htable,ctx->H.u);
|
||||
# endif
|
||||
|
@@ -45,10 +45,8 @@ sub ::generic
|
||||
undef $suffix if ($dst =~ m/^%[xm]/o || $src =~ m/^%[xm]/o);
|
||||
|
||||
if ($#_==0) { &::emit($opcode); }
|
||||
elsif ($opcode =~ m/^j/o && $#_==1) { &::emit($opcode,@arg); }
|
||||
elsif ($opcode eq "call" && $#_==1) { &::emit($opcode,@arg); }
|
||||
elsif ($opcode eq "clflush" && $#_==1){ &::emit($opcode,@arg); }
|
||||
elsif ($opcode =~ m/^set/&& $#_==1) { &::emit($opcode,@arg); }
|
||||
elsif ($#_==1 && $opcode =~ m/^(call|clflush|j|loop|set)/o)
|
||||
{ &::emit($opcode,@arg); }
|
||||
else { &::emit($opcode.$suffix,@arg);}
|
||||
|
||||
1;
|
||||
|
@@ -177,6 +177,7 @@ for($i=0;$i<5;$i++) {
|
||||
$code.=<<___;
|
||||
teq $Xi,sp
|
||||
bne .L_00_15 @ [((11+4)*5+2)*3]
|
||||
sub sp,sp,#25*4
|
||||
___
|
||||
&BODY_00_15(@V); unshift(@V,pop(@V));
|
||||
&BODY_16_19(@V); unshift(@V,pop(@V));
|
||||
@@ -186,7 +187,6 @@ ___
|
||||
$code.=<<___;
|
||||
|
||||
ldr $K,.LK_20_39 @ [+15+16*4]
|
||||
sub sp,sp,#25*4
|
||||
cmn sp,#0 @ [+3], clear carry to denote 20_39
|
||||
.L_20_39_or_60_79:
|
||||
___
|
||||
|
323
crypto/sha/asm/sha1-c64xplus.pl
Normal file
323
crypto/sha/asm/sha1-c64xplus.pl
Normal file
@@ -0,0 +1,323 @@
|
||||
#!/usr/bin/env perl
|
||||
#
|
||||
# ====================================================================
|
||||
# Written by Andy Polyakov <appro@openssl.org> for the OpenSSL
|
||||
# project. The module is, however, dual licensed under OpenSSL and
|
||||
# CRYPTOGAMS licenses depending on where you obtain it. For further
|
||||
# details see http://www.openssl.org/~appro/cryptogams/.
|
||||
# ====================================================================
|
||||
#
|
||||
# SHA1 for C64x+.
|
||||
#
|
||||
# November 2011
|
||||
#
|
||||
# If compared to compiler-generated code with similar characteristics,
|
||||
# i.e. compiled with OPENSSL_SMALL_FOOTPRINT and utilizing SPLOOPs,
|
||||
# this implementation is 25% smaller and >2x faster. In absolute terms
|
||||
# performance is (quite impressive) ~6.5 cycles per processed byte.
|
||||
# Fully unrolled assembler would be ~5x larger and is likely to be
|
||||
# ~15% faster. It would be free from references to intermediate ring
|
||||
# buffer, but put more pressure on L1P [both because the code would be
|
||||
# larger and won't be using SPLOOP buffer]. There are no plans to
|
||||
# realize fully unrolled variant though...
|
||||
#
|
||||
# !!! Note that this module uses AMR, which means that all interrupt
|
||||
# service routines are expected to preserve it and for own well-being
|
||||
# zero it upon entry.
|
||||
|
||||
while (($output=shift) && ($output!~/\w[\w\-]*\.\w+$/)) {}
|
||||
open STDOUT,">$output";
|
||||
|
||||
($CTX,$INP,$NUM) = ("A4","B4","A6"); # arguments
|
||||
|
||||
($A,$B,$C,$D,$E, $Arot,$F,$F0,$T,$K) = map("A$_",(16..20, 21..25));
|
||||
($X0,$X2,$X8,$X13) = ("A26","B26","A27","B27");
|
||||
($TX0,$TX1,$TX2,$TX3) = map("B$_",(28..31));
|
||||
($XPA,$XPB) = ("A5","B5"); # X circular buffer
|
||||
($Actx,$Bctx,$Cctx,$Dctx,$Ectx) = map("A$_",(3,6..9)); # zaps $NUM
|
||||
|
||||
$code=<<___;
|
||||
.text
|
||||
|
||||
.asg B3,RA
|
||||
.asg A15,FP
|
||||
.asg B15,SP
|
||||
|
||||
.if .BIG_ENDIAN
|
||||
.asg MV,SWAP2
|
||||
.asg MV,SWAP4
|
||||
.endif
|
||||
|
||||
.global _sha1_block_data_order
|
||||
_sha1_block_data_order:
|
||||
.asmfunc stack_usage(64)
|
||||
MV $NUM,A0 ; reassign $NUM
|
||||
|| MVK -64,B0
|
||||
[!A0] BNOP RA ; if ($NUM==0) return;
|
||||
|| [A0] STW FP,*SP--[16] ; save frame pointer and alloca(64)
|
||||
|| [A0] MV SP,FP
|
||||
[A0] LDW *${CTX}[0],$A ; load A-E...
|
||||
|| [A0] AND B0,SP,SP ; align stack at 64 bytes
|
||||
[A0] LDW *${CTX}[1],$B
|
||||
|| [A0] SUBAW SP,2,SP ; reserve two words above buffer
|
||||
[A0] LDW *${CTX}[2],$C
|
||||
|| [A0] MVK 0x00404,B0
|
||||
[A0] LDW *${CTX}[3],$D
|
||||
|| [A0] MVKH 0x50000,B0 ; 0x050404, 64 bytes for $XP[AB]
|
||||
[A0] LDW *${CTX}[4],$E
|
||||
|| [A0] MVC B0,AMR ; setup circular addressing
|
||||
LDNW *${INP}++,$TX1 ; pre-fetch input
|
||||
NOP 1
|
||||
|
||||
loop?:
|
||||
MVK 0x00007999,$K
|
||||
|| ADDAW SP,2,$XPA
|
||||
|| SUB A0,1,A0
|
||||
|| MVK 13,B0
|
||||
MVKH 0x5a820000,$K ; K_00_19
|
||||
|| ADDAW SP,2,$XPB
|
||||
|| MV $A,$Actx
|
||||
|| MV $B,$Bctx
|
||||
;;==================================================
|
||||
SPLOOPD 5 ; BODY_00_13
|
||||
|| MV $C,$Cctx
|
||||
|| MV $D,$Dctx
|
||||
|| MV $E,$Ectx
|
||||
|| MVC B0,ILC
|
||||
|
||||
ROTL $A,5,$Arot
|
||||
|| AND $C,$B,$F
|
||||
|| ANDN $D,$B,$F0
|
||||
|| ADD $K,$E,$T ; T=E+K
|
||||
|
||||
XOR $F0,$F,$F ; F_00_19(B,C,D)
|
||||
|| MV $D,$E ; E=D
|
||||
|| MV $C,$D ; D=C
|
||||
|| SWAP2 $TX1,$TX2
|
||||
|| LDNW *${INP}++,$TX1
|
||||
|
||||
ADD $F,$T,$T ; T+=F_00_19(B,C,D)
|
||||
|| ROTL $B,30,$C ; C=ROL(B,30)
|
||||
|| SWAP4 $TX2,$TX3 ; byte swap
|
||||
|
||||
ADD $Arot,$T,$T ; T+=ROL(A,5)
|
||||
|| MV $A,$B ; B=A
|
||||
|
||||
ADD $TX3,$T,$A ; A=T+Xi
|
||||
|| STW $TX3,*${XPB}++
|
||||
SPKERNEL
|
||||
;;==================================================
|
||||
ROTL $A,5,$Arot ; BODY_14
|
||||
|| AND $C,$B,$F
|
||||
|| ANDN $D,$B,$F0
|
||||
|| ADD $K,$E,$T ; T=E+K
|
||||
|
||||
XOR $F0,$F,$F ; F_00_19(B,C,D)
|
||||
|| MV $D,$E ; E=D
|
||||
|| MV $C,$D ; D=C
|
||||
|| SWAP2 $TX1,$TX2
|
||||
|| LDNW *${INP}++,$TX1
|
||||
|
||||
ADD $F,$T,$T ; T+=F_00_19(B,C,D)
|
||||
|| ROTL $B,30,$C ; C=ROL(B,30)
|
||||
|| SWAP4 $TX2,$TX2 ; byte swap
|
||||
|| LDW *${XPA}++,$X0 ; fetches from X ring buffer are
|
||||
|| LDW *${XPB}[4],$X2 ; 2 iterations ahead
|
||||
|
||||
ADD $Arot,$T,$T ; T+=ROL(A,5)
|
||||
|| MV $A,$B ; B=A
|
||||
|| LDW *${XPA}[7],$X8
|
||||
|| MV $TX3,$X13 ; || LDW *${XPB}[15],$X13
|
||||
|| MV $TX2,$TX3
|
||||
|
||||
ADD $TX2,$T,$A ; A=T+Xi
|
||||
|| STW $TX2,*${XPB}++
|
||||
;;==================================================
|
||||
ROTL $A,5,$Arot ; BODY_15
|
||||
|| AND $C,$B,$F
|
||||
|| ANDN $D,$B,$F0
|
||||
|| ADD $K,$E,$T ; T=E+K
|
||||
|
||||
XOR $F0,$F,$F ; F_00_19(B,C,D)
|
||||
|| MV $D,$E ; E=D
|
||||
|| MV $C,$D ; D=C
|
||||
|| SWAP2 $TX1,$TX2
|
||||
|
||||
ADD $F,$T,$T ; T+=F_00_19(B,C,D)
|
||||
|| ROTL $B,30,$C ; C=ROL(B,30)
|
||||
|| SWAP4 $TX2,$TX2 ; byte swap
|
||||
|| XOR $X0,$X2,$TX0 ; Xupdate XORs are 1 iteration ahead
|
||||
|| LDW *${XPA}++,$X0
|
||||
|| LDW *${XPB}[4],$X2
|
||||
|
||||
ADD $Arot,$T,$T ; T+=ROL(A,5)
|
||||
|| MV $A,$B ; B=A
|
||||
|| XOR $X8,$X13,$TX1
|
||||
|| LDW *${XPA}[7],$X8
|
||||
|| MV $TX3,$X13 ; || LDW *${XPB}[15],$X13
|
||||
|| MV $TX2,$TX3
|
||||
|
||||
ADD $TX2,$T,$A ; A=T+Xi
|
||||
|| STW $TX2,*${XPB}++
|
||||
|| XOR $TX0,$TX1,$TX1
|
||||
|| MVK 3,B0
|
||||
;;==================================================
|
||||
SPLOOPD 5 ; BODY_16_19
|
||||
|| MVC B0,ILC
|
||||
|
||||
ROTL $A,5,$Arot
|
||||
|| AND $C,$B,$F
|
||||
|| ANDN $D,$B,$F0
|
||||
|| ADD $K,$E,$T ; T=E+K
|
||||
|| ROTL $TX1,1,$TX2 ; Xupdate output
|
||||
|
||||
XOR $F0,$F,$F ; F_00_19(B,C,D)
|
||||
|| MV $D,$E ; E=D
|
||||
|| MV $C,$D ; D=C
|
||||
|
||||
ADD $F,$T,$T ; T+=F_00_19(B,C,D)
|
||||
|| ROTL $B,30,$C ; C=ROL(B,30)
|
||||
|| XOR $X0,$X2,$TX0
|
||||
|| LDW *${XPA}++,$X0
|
||||
|| LDW *${XPB}[4],$X2
|
||||
|
||||
ADD $Arot,$T,$T ; T+=ROL(A,5)
|
||||
|| MV $A,$B ; B=A
|
||||
|| XOR $X8,$X13,$TX1
|
||||
|| LDW *${XPA}[7],$X8
|
||||
|| MV $TX3,$X13 ; || LDW *${XPB}[15],$X13
|
||||
|| MV $TX2,$TX3
|
||||
|
||||
ADD $TX2,$T,$A ; A=T+Xi
|
||||
|| STW $TX2,*${XPB}++
|
||||
|| XOR $TX0,$TX1,$TX1
|
||||
SPKERNEL
|
||||
|
||||
MVK 0xffffeba1,$K
|
||||
|| MVK 19,B0
|
||||
MVKH 0x6ed90000,$K ; K_20_39
|
||||
___
|
||||
sub BODY_20_39 {
|
||||
$code.=<<___;
|
||||
;;==================================================
|
||||
SPLOOPD 5 ; BODY_20_39
|
||||
|| MVC B0,ILC
|
||||
|
||||
ROTL $A,5,$Arot
|
||||
|| XOR $B,$C,$F
|
||||
|| ADD $K,$E,$T ; T=E+K
|
||||
|| ROTL $TX1,1,$TX2 ; Xupdate output
|
||||
|
||||
XOR $D,$F,$F ; F_20_39(B,C,D)
|
||||
|| MV $D,$E ; E=D
|
||||
|| MV $C,$D ; D=C
|
||||
|
||||
ADD $F,$T,$T ; T+=F_20_39(B,C,D)
|
||||
|| ROTL $B,30,$C ; C=ROL(B,30)
|
||||
|| XOR $X0,$X2,$TX0
|
||||
|| LDW *${XPA}++,$X0
|
||||
|| LDW *${XPB}[4],$X2
|
||||
|
||||
ADD $Arot,$T,$T ; T+=ROL(A,5)
|
||||
|| MV $A,$B ; B=A
|
||||
|| XOR $X8,$X13,$TX1
|
||||
|| LDW *${XPA}[7],$X8
|
||||
|| MV $TX3,$X13 ; || LDW *${XPB}[15],$X13
|
||||
|| MV $TX2,$TX3
|
||||
|
||||
ADD $TX2,$T,$A ; A=T+Xi
|
||||
|| STW $TX2,*${XPB}++ ; last one is redundant
|
||||
|| XOR $TX0,$TX1,$TX1
|
||||
SPKERNEL
|
||||
___
|
||||
$code.=<<___ if (!shift);
|
||||
MVK 0xffffbcdc,$K
|
||||
MVKH 0x8f1b0000,$K ; K_40_59
|
||||
___
|
||||
} &BODY_20_39();
|
||||
$code.=<<___;
|
||||
;;==================================================
|
||||
SPLOOPD 5 ; BODY_40_59
|
||||
|| MVC B0,ILC
|
||||
|| AND $B,$C,$F
|
||||
|| AND $B,$D,$F0
|
||||
|
||||
ROTL $A,5,$Arot
|
||||
|| XOR $F0,$F,$F
|
||||
|| AND $C,$D,$F0
|
||||
|| ADD $K,$E,$T ; T=E+K
|
||||
|| ROTL $TX1,1,$TX2 ; Xupdate output
|
||||
|
||||
XOR $F0,$F,$F ; F_40_59(B,C,D)
|
||||
|| MV $D,$E ; E=D
|
||||
|| MV $C,$D ; D=C
|
||||
|
||||
ADD $F,$T,$T ; T+=F_40_59(B,C,D)
|
||||
|| ROTL $B,30,$C ; C=ROL(B,30)
|
||||
|| XOR $X0,$X2,$TX0
|
||||
|| LDW *${XPA}++,$X0
|
||||
|| LDW *${XPB}[4],$X2
|
||||
|
||||
ADD $Arot,$T,$T ; T+=ROL(A,5)
|
||||
|| MV $A,$B ; B=A
|
||||
|| XOR $X8,$X13,$TX1
|
||||
|| LDW *${XPA}[7],$X8
|
||||
|| MV $TX3,$X13 ; || LDW *${XPB}[15],$X13
|
||||
|| MV $TX2,$TX3
|
||||
|
||||
ADD $TX2,$T,$A ; A=T+Xi
|
||||
|| STW $TX2,*${XPB}++
|
||||
|| XOR $TX0,$TX1,$TX1
|
||||
|| AND $B,$C,$F
|
||||
|| AND $B,$D,$F0
|
||||
SPKERNEL
|
||||
|
||||
MVK 0xffffc1d6,$K
|
||||
|| MVK 18,B0
|
||||
MVKH 0xca620000,$K ; K_60_79
|
||||
___
|
||||
&BODY_20_39(-1); # BODY_60_78
|
||||
$code.=<<___;
|
||||
;;==================================================
|
||||
[A0] B loop?
|
||||
|| ROTL $A,5,$Arot ; BODY_79
|
||||
|| XOR $B,$C,$F
|
||||
|| ROTL $TX1,1,$TX2 ; Xupdate output
|
||||
|
||||
[A0] LDNW *${INP}++,$TX1 ; pre-fetch input
|
||||
|| ADD $K,$E,$T ; T=E+K
|
||||
|| XOR $D,$F,$F ; F_20_39(B,C,D)
|
||||
|
||||
ADD $F,$T,$T ; T+=F_20_39(B,C,D)
|
||||
|| ADD $Ectx,$D,$E ; E=D,E+=Ectx
|
||||
|| ADD $Dctx,$C,$D ; D=C,D+=Dctx
|
||||
|| ROTL $B,30,$C ; C=ROL(B,30)
|
||||
|
||||
ADD $Arot,$T,$T ; T+=ROL(A,5)
|
||||
|| ADD $Bctx,$A,$B ; B=A,B+=Bctx
|
||||
|
||||
ADD $TX2,$T,$A ; A=T+Xi
|
||||
|
||||
ADD $Actx,$A,$A ; A+=Actx
|
||||
|| ADD $Cctx,$C,$C ; C+=Cctx
|
||||
;; end of loop?
|
||||
|
||||
BNOP RA ; return
|
||||
|| MV FP,SP ; restore stack pointer
|
||||
|| LDW *FP[0],FP ; restore frame pointer
|
||||
STW $A,*${CTX}[0] ; emit A-E...
|
||||
|| MVK 0,B0
|
||||
STW $B,*${CTX}[1]
|
||||
|| MVC B0,AMR ; clear AMR
|
||||
STW $C,*${CTX}[2]
|
||||
STW $D,*${CTX}[3]
|
||||
STW $E,*${CTX}[4]
|
||||
.endasmfunc
|
||||
|
||||
.sect .const
|
||||
.cstring "SHA1 block transform for C64x+, CRYPTOGAMS by <appro\@openssl.org>"
|
||||
.align 4
|
||||
___
|
||||
|
||||
print $code;
|
||||
close STDOUT;
|
292
crypto/sha/asm/sha256-c64xplus.pl
Normal file
292
crypto/sha/asm/sha256-c64xplus.pl
Normal file
@@ -0,0 +1,292 @@
|
||||
#!/usr/bin/env perl
|
||||
#
|
||||
# ====================================================================
|
||||
# Written by Andy Polyakov <appro@openssl.org> for the OpenSSL
|
||||
# project. The module is, however, dual licensed under OpenSSL and
|
||||
# CRYPTOGAMS licenses depending on where you obtain it. For further
|
||||
# details see http://www.openssl.org/~appro/cryptogams/.
|
||||
# ====================================================================
|
||||
#
|
||||
# SHA256 for C64x+.
|
||||
#
|
||||
# January 2012
|
||||
#
|
||||
# Performance is just below 10 cycles per processed byte, which is
|
||||
# almost 40% faster than compiler-generated code. Unroll is unlikely
|
||||
# to give more than ~8% improvement...
|
||||
#
|
||||
# !!! Note that this module uses AMR, which means that all interrupt
|
||||
# service routines are expected to preserve it and for own well-being
|
||||
# zero it upon entry.
|
||||
|
||||
while (($output=shift) && ($output!~/\w[\w\-]*\.\w+$/)) {}
|
||||
open STDOUT,">$output";
|
||||
|
||||
($CTXA,$INP,$NUM) = ("A4","B4","A6"); # arguments
|
||||
$K256="A3";
|
||||
|
||||
($A,$Actx,$B,$Bctx,$C,$Cctx,$D,$Dctx,$T2,$S0,$s1,$t0a,$t1a,$t2a,$X9,$X14)
|
||||
=map("A$_",(16..31));
|
||||
($E,$Ectx,$F,$Fctx,$G,$Gctx,$H,$Hctx,$T1,$S1,$s0,$t0e,$t1e,$t2e,$X1,$X15)
|
||||
=map("B$_",(16..31));
|
||||
|
||||
($Xia,$Xib)=("A5","B5"); # circular/ring buffer
|
||||
$CTXB=$t2e;
|
||||
|
||||
($Xn,$X0,$K)=("B7","B8","B9");
|
||||
($Maj,$Ch)=($T2,"B6");
|
||||
|
||||
$code.=<<___;
|
||||
.text
|
||||
|
||||
.asg B3,RA
|
||||
.asg A15,FP
|
||||
.asg B15,SP
|
||||
|
||||
.if .BIG_ENDIAN
|
||||
.asg SWAP2,MV
|
||||
.asg SWAP4,MV
|
||||
.endif
|
||||
|
||||
.global _sha256_block_data_order
|
||||
_sha256_block_data_order:
|
||||
.asmfunc stack_usage(64)
|
||||
MV $NUM,A0 ; reassign $NUM
|
||||
|| MVK -64,B0
|
||||
[!A0] BNOP RA ; if ($NUM==0) return;
|
||||
|| [A0] STW FP,*SP--[16] ; save frame pointer and alloca(64)
|
||||
|| [A0] MV SP,FP
|
||||
[A0] ADDKPC _sha256_block_data_order,B2
|
||||
|| [A0] AND B0,SP,SP ; align stack at 64 bytes
|
||||
[A0] MVK 0x00404,B1
|
||||
|| [A0] MVKL (K256-_sha256_block_data_order),$K256
|
||||
[A0] MVKH 0x50000,B1
|
||||
|| [A0] MVKH (K256-_sha256_block_data_order),$K256
|
||||
[A0] MVC B1,AMR ; setup circular addressing
|
||||
|| [A0] MV SP,$Xia
|
||||
[A0] MV SP,$Xib
|
||||
|| [A0] ADD B2,$K256,$K256
|
||||
|| [A0] MV $CTXA,$CTXB
|
||||
|| [A0] SUBAW SP,2,SP ; reserve two words above buffer
|
||||
LDW *${CTXA}[0],$A ; load ctx
|
||||
|| LDW *${CTXB}[4],$E
|
||||
LDW *${CTXA}[1],$B
|
||||
|| LDW *${CTXB}[5],$F
|
||||
LDW *${CTXA}[2],$C
|
||||
|| LDW *${CTXB}[6],$G
|
||||
LDW *${CTXA}[3],$D
|
||||
|| LDW *${CTXB}[7],$H
|
||||
|
||||
LDNW *$INP++,$Xn ; pre-fetch input
|
||||
LDW *$K256++,$K ; pre-fetch K256[0]
|
||||
MVK 14,B0 ; loop counters
|
||||
MVK 47,B1
|
||||
|| ADDAW $Xia,9,$Xia
|
||||
outerloop?:
|
||||
SUB A0,1,A0
|
||||
|| MV $A,$Actx
|
||||
|| MV $E,$Ectx
|
||||
|| MVD $B,$Bctx
|
||||
|| MVD $F,$Fctx
|
||||
MV $C,$Cctx
|
||||
|| MV $G,$Gctx
|
||||
|| MVD $D,$Dctx
|
||||
|| MVD $H,$Hctx
|
||||
|| SWAP4 $Xn,$X0
|
||||
|
||||
SPLOOPD 8 ; BODY_00_14
|
||||
|| MVC B0,ILC
|
||||
|| SWAP2 $X0,$X0
|
||||
|
||||
LDNW *$INP++,$Xn
|
||||
|| ROTL $A,30,$S0
|
||||
|| OR $A,$B,$Maj
|
||||
|| AND $A,$B,$t2a
|
||||
|| ROTL $E,26,$S1
|
||||
|| AND $F,$E,$Ch
|
||||
|| ANDN $G,$E,$t2e
|
||||
ROTL $A,19,$t0a
|
||||
|| AND $C,$Maj,$Maj
|
||||
|| ROTL $E,21,$t0e
|
||||
|| XOR $t2e,$Ch,$Ch ; Ch(e,f,g) = (e&f)^(~e&g)
|
||||
ROTL $A,10,$t1a
|
||||
|| OR $t2a,$Maj,$Maj ; Maj(a,b,c) = ((a|b)&c)|(a&b)
|
||||
|| ROTL $E,7,$t1e
|
||||
|| ADD $K,$H,$T1 ; T1 = h + K256[i]
|
||||
ADD $X0,$T1,$T1 ; T1 += X[i];
|
||||
|| STW $X0,*$Xib++
|
||||
|| XOR $t0a,$S0,$S0
|
||||
|| XOR $t0e,$S1,$S1
|
||||
XOR $t1a,$S0,$S0 ; Sigma0(a)
|
||||
|| XOR $t1e,$S1,$S1 ; Sigma1(e)
|
||||
|| LDW *$K256++,$K ; pre-fetch K256[i+1]
|
||||
|| ADD $Ch,$T1,$T1 ; T1 += Ch(e,f,g)
|
||||
ADD $S1,$T1,$T1 ; T1 += Sigma1(e)
|
||||
|| ADD $S0,$Maj,$T2 ; T2 = Sigma0(a) + Maj(a,b,c)
|
||||
|| ROTL $G,0,$H ; h = g
|
||||
|| MV $F,$G ; g = f
|
||||
|| MV $X0,$X14
|
||||
|| SWAP4 $Xn,$X0
|
||||
SWAP2 $X0,$X0
|
||||
|| MV $E,$F ; f = e
|
||||
|| ADD $D,$T1,$E ; e = d + T1
|
||||
|| MV $C,$D ; d = c
|
||||
MV $B,$C ; c = b
|
||||
|| MV $A,$B ; b = a
|
||||
|| ADD $T1,$T2,$A ; a = T1 + T2
|
||||
SPKERNEL
|
||||
|
||||
ROTL $A,30,$S0 ; BODY_15
|
||||
|| OR $A,$B,$Maj
|
||||
|| AND $A,$B,$t2a
|
||||
|| ROTL $E,26,$S1
|
||||
|| AND $F,$E,$Ch
|
||||
|| ANDN $G,$E,$t2e
|
||||
|| LDW *${Xib}[1],$Xn ; modulo-scheduled
|
||||
ROTL $A,19,$t0a
|
||||
|| AND $C,$Maj,$Maj
|
||||
|| ROTL $E,21,$t0e
|
||||
|| XOR $t2e,$Ch,$Ch ; Ch(e,f,g) = (e&f)^(~e&g)
|
||||
|| LDW *${Xib}[2],$X1 ; modulo-scheduled
|
||||
ROTL $A,10,$t1a
|
||||
|| OR $t2a,$Maj,$Maj ; Maj(a,b,c) = ((a|b)&c)|(a&b)
|
||||
|| ROTL $E,7,$t1e
|
||||
|| ADD $K,$H,$T1 ; T1 = h + K256[i]
|
||||
ADD $X0,$T1,$T1 ; T1 += X[i];
|
||||
|| STW $X0,*$Xib++
|
||||
|| XOR $t0a,$S0,$S0
|
||||
|| XOR $t0e,$S1,$S1
|
||||
XOR $t1a,$S0,$S0 ; Sigma0(a)
|
||||
|| XOR $t1e,$S1,$S1 ; Sigma1(e)
|
||||
|| LDW *$K256++,$K ; pre-fetch K256[i+1]
|
||||
|| ADD $Ch,$T1,$T1 ; T1 += Ch(e,f,g)
|
||||
ADD $S1,$T1,$T1 ; T1 += Sigma1(e)
|
||||
|| ADD $S0,$Maj,$T2 ; T2 = Sigma0(a) + Maj(a,b,c)
|
||||
|| ROTL $G,0,$H ; h = g
|
||||
|| MV $F,$G ; g = f
|
||||
|| MV $X0,$X15
|
||||
MV $E,$F ; f = e
|
||||
|| ADD $D,$T1,$E ; e = d + T1
|
||||
|| MV $C,$D ; d = c
|
||||
|| MV $Xn,$X0 ; modulo-scheduled
|
||||
|| LDW *$Xia,$X9 ; modulo-scheduled
|
||||
|| ROTL $X1,25,$t0e ; modulo-scheduled
|
||||
|| ROTL $X14,15,$t0a ; modulo-scheduled
|
||||
SHRU $X1,3,$s0 ; modulo-scheduled
|
||||
|| SHRU $X14,10,$s1 ; modulo-scheduled
|
||||
|| ROTL $B,0,$C ; c = b
|
||||
|| MV $A,$B ; b = a
|
||||
|| ADD $T1,$T2,$A ; a = T1 + T2
|
||||
|
||||
SPLOOPD 10 ; BODY_16_63
|
||||
|| MVC B1,ILC
|
||||
|| ROTL $X1,14,$t1e ; modulo-scheduled
|
||||
|| ROTL $X14,13,$t1a ; modulo-scheduled
|
||||
|
||||
XOR $t0e,$s0,$s0
|
||||
|| XOR $t0a,$s1,$s1
|
||||
|| MV $X15,$X14
|
||||
|| MV $X1,$Xn
|
||||
XOR $t1e,$s0,$s0 ; sigma0(X[i+1])
|
||||
|| XOR $t1a,$s1,$s1 ; sigma1(X[i+14])
|
||||
|| LDW *${Xib}[2],$X1 ; module-scheduled
|
||||
ROTL $A,30,$S0
|
||||
|| OR $A,$B,$Maj
|
||||
|| AND $A,$B,$t2a
|
||||
|| ROTL $E,26,$S1
|
||||
|| AND $F,$E,$Ch
|
||||
|| ANDN $G,$E,$t2e
|
||||
|| ADD $X9,$X0,$X0 ; X[i] += X[i+9]
|
||||
ROTL $A,19,$t0a
|
||||
|| AND $C,$Maj,$Maj
|
||||
|| ROTL $E,21,$t0e
|
||||
|| XOR $t2e,$Ch,$Ch ; Ch(e,f,g) = (e&f)^(~e&g)
|
||||
|| ADD $s0,$X0,$X0 ; X[i] += sigma1(X[i+1])
|
||||
ROTL $A,10,$t1a
|
||||
|| OR $t2a,$Maj,$Maj ; Maj(a,b,c) = ((a|b)&c)|(a&b)
|
||||
|| ROTL $E,7,$t1e
|
||||
|| ADD $H,$K,$T1 ; T1 = h + K256[i]
|
||||
|| ADD $s1,$X0,$X0 ; X[i] += sigma1(X[i+14])
|
||||
XOR $t0a,$S0,$S0
|
||||
|| XOR $t0e,$S1,$S1
|
||||
|| ADD $X0,$T1,$T1 ; T1 += X[i]
|
||||
|| STW $X0,*$Xib++
|
||||
XOR $t1a,$S0,$S0 ; Sigma0(a)
|
||||
|| XOR $t1e,$S1,$S1 ; Sigma1(e)
|
||||
|| ADD $Ch,$T1,$T1 ; T1 += Ch(e,f,g)
|
||||
|| MV $X0,$X15
|
||||
|| ROTL $G,0,$H ; h = g
|
||||
|| LDW *$K256++,$K ; pre-fetch K256[i+1]
|
||||
ADD $S1,$T1,$T1 ; T1 += Sigma1(e)
|
||||
|| ADD $S0,$Maj,$T2 ; T2 = Sigma0(a) + Maj(a,b,c)
|
||||
|| MV $F,$G ; g = f
|
||||
|| MV $Xn,$X0 ; modulo-scheduled
|
||||
|| LDW *++$Xia,$X9 ; modulo-scheduled
|
||||
|| ROTL $X1,25,$t0e ; module-scheduled
|
||||
|| ROTL $X14,15,$t0a ; modulo-scheduled
|
||||
ROTL $X1,14,$t1e ; modulo-scheduled
|
||||
|| ROTL $X14,13,$t1a ; modulo-scheduled
|
||||
|| MV $E,$F ; f = e
|
||||
|| ADD $D,$T1,$E ; e = d + T1
|
||||
|| MV $C,$D ; d = c
|
||||
|| MV $B,$C ; c = b
|
||||
MV $A,$B ; b = a
|
||||
|| ADD $T1,$T2,$A ; a = T1 + T2
|
||||
|| SHRU $X1,3,$s0 ; modulo-scheduled
|
||||
|| SHRU $X14,10,$s1 ; modulo-scheduled
|
||||
SPKERNEL
|
||||
|
||||
[A0] B outerloop?
|
||||
|| [A0] LDNW *$INP++,$Xn ; pre-fetch input
|
||||
|| [A0] ADDK -260,$K256 ; rewind K256
|
||||
|| ADD $Actx,$A,$A ; accumulate ctx
|
||||
|| ADD $Ectx,$E,$E
|
||||
|| ADD $Bctx,$B,$B
|
||||
ADD $Fctx,$F,$F
|
||||
|| ADD $Cctx,$C,$C
|
||||
|| ADD $Gctx,$G,$G
|
||||
|| ADD $Dctx,$D,$D
|
||||
|| ADD $Hctx,$H,$H
|
||||
|| [A0] LDW *$K256++,$K ; pre-fetch K256[0]
|
||||
|
||||
[!A0] BNOP RA
|
||||
||[!A0] MV $CTXA,$CTXB
|
||||
[!A0] MV FP,SP ; restore stack pointer
|
||||
||[!A0] LDW *FP[0],FP ; restore frame pointer
|
||||
[!A0] STW $A,*${CTXA}[0] ; save ctx
|
||||
||[!A0] STW $E,*${CTXB}[4]
|
||||
||[!A0] MVK 0,B0
|
||||
[!A0] STW $B,*${CTXA}[1]
|
||||
||[!A0] STW $F,*${CTXB}[5]
|
||||
||[!A0] MVC B0,AMR ; clear AMR
|
||||
STW $C,*${CTXA}[2]
|
||||
|| STW $G,*${CTXB}[6]
|
||||
STW $D,*${CTXA}[3]
|
||||
|| STW $H,*${CTXB}[7]
|
||||
.endasmfunc
|
||||
|
||||
.sect ".const:sha_asm"
|
||||
.align 128
|
||||
K256:
|
||||
.uword 0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5
|
||||
.uword 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5
|
||||
.uword 0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3
|
||||
.uword 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174
|
||||
.uword 0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc
|
||||
.uword 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da
|
||||
.uword 0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7
|
||||
.uword 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967
|
||||
.uword 0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13
|
||||
.uword 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85
|
||||
.uword 0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3
|
||||
.uword 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070
|
||||
.uword 0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5
|
||||
.uword 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3
|
||||
.uword 0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208
|
||||
.uword 0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2
|
||||
.cstring "SHA256 block transform for C64x+, CRYPTOGAMS by <appro\@openssl.org>"
|
||||
.align 4
|
||||
|
||||
___
|
||||
|
||||
print $code;
|
410
crypto/sha/asm/sha512-c64xplus.pl
Normal file
410
crypto/sha/asm/sha512-c64xplus.pl
Normal file
@@ -0,0 +1,410 @@
|
||||
#!/usr/bin/env perl
|
||||
#
|
||||
# ====================================================================
|
||||
# Written by Andy Polyakov <appro@openssl.org> for the OpenSSL
|
||||
# project. The module is, however, dual licensed under OpenSSL and
|
||||
# CRYPTOGAMS licenses depending on where you obtain it. For further
|
||||
# details see http://www.openssl.org/~appro/cryptogams/.
|
||||
# ====================================================================
|
||||
#
|
||||
# SHA512 for C64x+.
|
||||
#
|
||||
# January 2012
|
||||
#
|
||||
# Performance is 19 cycles per processed byte. Compared to block
|
||||
# transform function from sha512.c compiled with cl6x with -mv6400+
|
||||
# -o2 -DOPENSSL_SMALL_FOOTPRINT it's almost 7x faster and 2x smaller.
|
||||
# Loop unroll won't make it, this implementation, any faster, because
|
||||
# it's effectively dominated by SHRU||SHL pairs and you can't schedule
|
||||
# more of them.
|
||||
#
|
||||
# !!! Note that this module uses AMR, which means that all interrupt
|
||||
# service routines are expected to preserve it and for own well-being
|
||||
# zero it upon entry.
|
||||
|
||||
while (($output=shift) && ($output!~/\w[\w\-]*\.\w+$/)) {}
|
||||
open STDOUT,">$output";
|
||||
|
||||
($CTXA,$INP,$NUM) = ("A4","B4","A6"); # arguments
|
||||
$K512="A3";
|
||||
|
||||
($Ahi,$Actxhi,$Bhi,$Bctxhi,$Chi,$Cctxhi,$Dhi,$Dctxhi,
|
||||
$Ehi,$Ectxhi,$Fhi,$Fctxhi,$Ghi,$Gctxhi,$Hhi,$Hctxhi)=map("A$_",(16..31));
|
||||
($Alo,$Actxlo,$Blo,$Bctxlo,$Clo,$Cctxlo,$Dlo,$Dctxlo,
|
||||
$Elo,$Ectxlo,$Flo,$Fctxlo,$Glo,$Gctxlo,$Hlo,$Hctxlo)=map("B$_",(16..31));
|
||||
|
||||
($S1hi,$CHhi,$S0hi,$t0hi)=map("A$_",(10..13));
|
||||
($S1lo,$CHlo,$S0lo,$t0lo)=map("B$_",(10..13));
|
||||
($T1hi, $T2hi)= ("A6","A7");
|
||||
($T1lo,$T1carry,$T2lo,$T2carry)=("B6","B7","B8","B9");
|
||||
($Khi,$Klo)=("A9","A8");
|
||||
($MAJhi,$MAJlo)=($T2hi,$T2lo);
|
||||
($t1hi,$t1lo)=($Khi,"B2");
|
||||
$CTXB=$t1lo;
|
||||
|
||||
($Xihi,$Xilo)=("A5","B5"); # circular/ring buffer
|
||||
|
||||
$code.=<<___;
|
||||
.text
|
||||
|
||||
.asg B3,RA
|
||||
.asg A15,FP
|
||||
.asg B15,SP
|
||||
|
||||
.if .BIG_ENDIAN
|
||||
.asg $Khi,KHI
|
||||
.asg $Klo,KLO
|
||||
.else
|
||||
.asg $Khi,KLO
|
||||
.asg $Klo,KHI
|
||||
.endif
|
||||
|
||||
.global _sha512_block_data_order
|
||||
_sha512_block_data_order:
|
||||
.asmfunc stack_usage(40+128)
|
||||
MV $NUM,A0 ; reassign $NUM
|
||||
|| MVK -128,B0
|
||||
[!A0] BNOP RA ; if ($NUM==0) return;
|
||||
|| [A0] STW FP,*SP--(40) ; save frame pointer
|
||||
|| [A0] MV SP,FP
|
||||
[A0] STDW B13:B12,*SP[4]
|
||||
|| [A0] MVK 0x00404,B1
|
||||
[A0] STDW B11:B10,*SP[3]
|
||||
|| [A0] STDW A13:A12,*FP[-3]
|
||||
|| [A0] MVKH 0x60000,B1
|
||||
[A0] STDW A11:A10,*SP[1]
|
||||
|| [A0] MVC B1,AMR ; setup circular addressing
|
||||
|| [A0] ADD B0,SP,SP ; alloca(128)
|
||||
[A0] AND B0,SP,SP ; align stack at 128 bytes
|
||||
|| [A0] ADDKPC _sha512_block_data_order,B1
|
||||
|| [A0] MVKL (K512-_sha512_block_data_order),$K512
|
||||
[A0] MVKH (K512-_sha512_block_data_order),$K512
|
||||
|| [A0] SUBAW SP,2,SP ; reserve two words above buffer
|
||||
ADDAW SP,3,$Xilo
|
||||
ADDAW SP,2,$Xihi
|
||||
|
||||
|| MV $CTXA,$CTXB
|
||||
LDW *${CTXA}[0^.LITTLE_ENDIAN],$Ahi ; load ctx
|
||||
|| LDW *${CTXB}[1^.LITTLE_ENDIAN],$Alo
|
||||
|| ADD B1,$K512,$K512
|
||||
LDW *${CTXA}[2^.LITTLE_ENDIAN],$Bhi
|
||||
|| LDW *${CTXB}[3^.LITTLE_ENDIAN],$Blo
|
||||
LDW *${CTXA}[4^.LITTLE_ENDIAN],$Chi
|
||||
|| LDW *${CTXB}[5^.LITTLE_ENDIAN],$Clo
|
||||
LDW *${CTXA}[6^.LITTLE_ENDIAN],$Dhi
|
||||
|| LDW *${CTXB}[7^.LITTLE_ENDIAN],$Dlo
|
||||
LDW *${CTXA}[8^.LITTLE_ENDIAN],$Ehi
|
||||
|| LDW *${CTXB}[9^.LITTLE_ENDIAN],$Elo
|
||||
LDW *${CTXA}[10^.LITTLE_ENDIAN],$Fhi
|
||||
|| LDW *${CTXB}[11^.LITTLE_ENDIAN],$Flo
|
||||
LDW *${CTXA}[12^.LITTLE_ENDIAN],$Ghi
|
||||
|| LDW *${CTXB}[13^.LITTLE_ENDIAN],$Glo
|
||||
LDW *${CTXA}[14^.LITTLE_ENDIAN],$Hhi
|
||||
|| LDW *${CTXB}[15^.LITTLE_ENDIAN],$Hlo
|
||||
|
||||
LDNDW *$INP++,B11:B10 ; pre-fetch input
|
||||
LDDW *$K512++,$Khi:$Klo ; pre-fetch K512[0]
|
||||
outerloop?:
|
||||
MVK 15,B0 ; loop counters
|
||||
|| MVK 64,B1
|
||||
|| SUB A0,1,A0
|
||||
MV $Ahi,$Actxhi
|
||||
|| MV $Alo,$Actxlo
|
||||
|| MV $Bhi,$Bctxhi
|
||||
|| MV $Blo,$Bctxlo
|
||||
|| MV $Chi,$Cctxhi
|
||||
|| MV $Clo,$Cctxlo
|
||||
|| MVD $Dhi,$Dctxhi
|
||||
|| MVD $Dlo,$Dctxlo
|
||||
MV $Ehi,$Ectxhi
|
||||
|| MV $Elo,$Ectxlo
|
||||
|| MV $Fhi,$Fctxhi
|
||||
|| MV $Flo,$Fctxlo
|
||||
|| MV $Ghi,$Gctxhi
|
||||
|| MV $Glo,$Gctxlo
|
||||
|| MVD $Hhi,$Hctxhi
|
||||
|| MVD $Hlo,$Hctxlo
|
||||
loop0_15?:
|
||||
.if .BIG_ENDIAN
|
||||
MV B11,$T1hi
|
||||
|| MV B10,$T1lo
|
||||
.else
|
||||
SWAP4 B10,$T1hi
|
||||
|| SWAP4 B11,$T1lo
|
||||
SWAP2 $T1hi,$T1hi
|
||||
|| SWAP2 $T1lo,$T1lo
|
||||
.endif
|
||||
loop16_79?:
|
||||
STW $T1hi,*$Xihi++[2]
|
||||
|| STW $T1lo,*$Xilo++[2] ; X[i] = T1
|
||||
|| ADD $Hhi,$T1hi,$T1hi
|
||||
|| ADDU $Hlo,$T1lo,$T1carry:$T1lo ; T1 += h
|
||||
|| SHRU $Ehi,14,$S1hi
|
||||
|| SHL $Ehi,32-14,$S1lo
|
||||
XOR $Fhi,$Ghi,$CHhi
|
||||
|| XOR $Flo,$Glo,$CHlo
|
||||
|| ADD KHI,$T1hi,$T1hi
|
||||
|| ADDU KLO,$T1carry:$T1lo,$T1carry:$T1lo ; T1 += K512[i]
|
||||
|| SHRU $Elo,14,$t0lo
|
||||
|| SHL $Elo,32-14,$t0hi
|
||||
XOR $t0hi,$S1hi,$S1hi
|
||||
|| XOR $t0lo,$S1lo,$S1lo
|
||||
|| AND $Ehi,$CHhi,$CHhi
|
||||
|| AND $Elo,$CHlo,$CHlo
|
||||
|| ROTL $Ghi,0,$Hhi
|
||||
|| ROTL $Glo,0,$Hlo ; h = g
|
||||
|| SHRU $Ehi,18,$t0hi
|
||||
|| SHL $Ehi,32-18,$t0lo
|
||||
XOR $t0hi,$S1hi,$S1hi
|
||||
|| XOR $t0lo,$S1lo,$S1lo
|
||||
|| XOR $Ghi,$CHhi,$CHhi
|
||||
|| XOR $Glo,$CHlo,$CHlo ; Ch(e,f,g) = ((f^g)&e)^g
|
||||
|| ROTL $Fhi,0,$Ghi
|
||||
|| ROTL $Flo,0,$Glo ; g = f
|
||||
|| SHRU $Elo,18,$t0lo
|
||||
|| SHL $Elo,32-18,$t0hi
|
||||
XOR $t0hi,$S1hi,$S1hi
|
||||
|| XOR $t0lo,$S1lo,$S1lo
|
||||
|| OR $Ahi,$Bhi,$MAJhi
|
||||
|| OR $Alo,$Blo,$MAJlo
|
||||
|| ROTL $Ehi,0,$Fhi
|
||||
|| ROTL $Elo,0,$Flo ; f = e
|
||||
|| SHRU $Ehi,41-32,$t0lo
|
||||
|| SHL $Ehi,64-41,$t0hi
|
||||
XOR $t0hi,$S1hi,$S1hi
|
||||
|| XOR $t0lo,$S1lo,$S1lo
|
||||
|| AND $Chi,$MAJhi,$MAJhi
|
||||
|| AND $Clo,$MAJlo,$MAJlo
|
||||
|| ROTL $Dhi,0,$Ehi
|
||||
|| ROTL $Dlo,0,$Elo ; e = d
|
||||
|| SHRU $Elo,41-32,$t0hi
|
||||
|| SHL $Elo,64-41,$t0lo
|
||||
XOR $t0hi,$S1hi,$S1hi
|
||||
|| XOR $t0lo,$S1lo,$S1lo ; Sigma1(e)
|
||||
|| AND $Ahi,$Bhi,$t1hi
|
||||
|| AND $Alo,$Blo,$t1lo
|
||||
|| ROTL $Chi,0,$Dhi
|
||||
|| ROTL $Clo,0,$Dlo ; d = c
|
||||
|| SHRU $Ahi,28,$S0hi
|
||||
|| SHL $Ahi,32-28,$S0lo
|
||||
OR $t1hi,$MAJhi,$MAJhi
|
||||
|| OR $t1lo,$MAJlo,$MAJlo ; Maj(a,b,c) = ((a|b)&c)|(a&b)
|
||||
|| ADD $CHhi,$T1hi,$T1hi
|
||||
|| ADDU $CHlo,$T1carry:$T1lo,$T1carry:$T1lo ; T1 += Ch(e,f,g)
|
||||
|| ROTL $Bhi,0,$Chi
|
||||
|| ROTL $Blo,0,$Clo ; c = b
|
||||
|| SHRU $Alo,28,$t0lo
|
||||
|| SHL $Alo,32-28,$t0hi
|
||||
XOR $t0hi,$S0hi,$S0hi
|
||||
|| XOR $t0lo,$S0lo,$S0lo
|
||||
|| ADD $S1hi,$T1hi,$T1hi
|
||||
|| ADDU $S1lo,$T1carry:$T1lo,$T1carry:$T1lo ; T1 += Sigma1(e)
|
||||
|| ROTL $Ahi,0,$Bhi
|
||||
|| ROTL $Alo,0,$Blo ; b = a
|
||||
|| SHRU $Ahi,34-32,$t0lo
|
||||
|| SHL $Ahi,64-34,$t0hi
|
||||
XOR $t0hi,$S0hi,$S0hi
|
||||
|| XOR $t0lo,$S0lo,$S0lo
|
||||
|| ADD $MAJhi,$T1hi,$T2hi
|
||||
|| ADDU $MAJlo,$T1carry:$T1lo,$T2carry:$T2lo ; T2 = T1+Maj(a,b,c)
|
||||
|| SHRU $Alo,34-32,$t0hi
|
||||
|| SHL $Alo,64-34,$t0lo
|
||||
XOR $t0hi,$S0hi,$S0hi
|
||||
|| XOR $t0lo,$S0lo,$S0lo
|
||||
|| ADD $Ehi,$T1hi,$T1hi
|
||||
|| ADDU $Elo,$T1carry:$T1lo,$T1carry:$T1lo ; T1 += e
|
||||
|| [B0] BNOP loop0_15?
|
||||
|| SHRU $Ahi,39-32,$t0lo
|
||||
|| SHL $Ahi,64-39,$t0hi
|
||||
XOR $t0hi,$S0hi,$S0hi
|
||||
|| XOR $t0lo,$S0lo,$S0lo
|
||||
|| [B0] LDNDW *$INP++,B11:B10 ; pre-fetch input
|
||||
||[!B1] BNOP break?
|
||||
|| SHRU $Alo,39-32,$t0hi
|
||||
|| SHL $Alo,64-39,$t0lo
|
||||
XOR $t0hi,$S0hi,$S0hi
|
||||
|| XOR $t0lo,$S0lo,$S0lo ; Sigma0(a)
|
||||
|| ADD $T1carry,$T1hi,$Ehi
|
||||
|| MV $T1lo,$Elo ; e = T1
|
||||
||[!B0] LDW *${Xihi}[28],$T1hi
|
||||
||[!B0] LDW *${Xilo}[28],$T1lo ; X[i+14]
|
||||
ADD $S0hi,$T2hi,$T2hi
|
||||
|| ADDU $S0lo,$T2carry:$T2lo,$T2carry:$T2lo ; T2 += Sigma0(a)
|
||||
|| [B1] LDDW *$K512++,$Khi:$Klo ; pre-fetch K512[i]
|
||||
NOP ; avoid cross-path stall
|
||||
ADD $T2carry,$T2hi,$Ahi
|
||||
|| MV $T2lo,$Alo ; a = T2
|
||||
|| [B0] SUB B0,1,B0
|
||||
;;===== branch to loop00_15? is taken here
|
||||
NOP
|
||||
;;===== branch to break? is taken here
|
||||
LDW *${Xihi}[2],$T2hi
|
||||
|| LDW *${Xilo}[2],$T2lo ; X[i+1]
|
||||
|| SHRU $T1hi,19,$S1hi
|
||||
|| SHL $T1hi,32-19,$S1lo
|
||||
SHRU $T1lo,19,$t0lo
|
||||
|| SHL $T1lo,32-19,$t0hi
|
||||
XOR $t0hi,$S1hi,$S1hi
|
||||
|| XOR $t0lo,$S1lo,$S1lo
|
||||
|| SHRU $T1hi,61-32,$t0lo
|
||||
|| SHL $T1hi,64-61,$t0hi
|
||||
XOR $t0hi,$S1hi,$S1hi
|
||||
|| XOR $t0lo,$S1lo,$S1lo
|
||||
|| SHRU $T1lo,61-32,$t0hi
|
||||
|| SHL $T1lo,64-61,$t0lo
|
||||
XOR $t0hi,$S1hi,$S1hi
|
||||
|| XOR $t0lo,$S1lo,$S1lo
|
||||
|| SHRU $T1hi,6,$t0hi
|
||||
|| SHL $T1hi,32-6,$t0lo
|
||||
XOR $t0hi,$S1hi,$S1hi
|
||||
|| XOR $t0lo,$S1lo,$S1lo
|
||||
|| SHRU $T1lo,6,$t0lo
|
||||
|| LDW *${Xihi}[18],$T1hi
|
||||
|| LDW *${Xilo}[18],$T1lo ; X[i+9]
|
||||
XOR $t0lo,$S1lo,$S1lo ; sigma1(Xi[i+14])
|
||||
|
||||
|| LDW *${Xihi}[0],$CHhi
|
||||
|| LDW *${Xilo}[0],$CHlo ; X[i]
|
||||
|| SHRU $T2hi,1,$S0hi
|
||||
|| SHL $T2hi,32-1,$S0lo
|
||||
SHRU $T2lo,1,$t0lo
|
||||
|| SHL $T2lo,32-1,$t0hi
|
||||
XOR $t0hi,$S0hi,$S0hi
|
||||
|| XOR $t0lo,$S0lo,$S0lo
|
||||
|| SHRU $T2hi,8,$t0hi
|
||||
|| SHL $T2hi,32-8,$t0lo
|
||||
XOR $t0hi,$S0hi,$S0hi
|
||||
|| XOR $t0lo,$S0lo,$S0lo
|
||||
|| SHRU $T2lo,8,$t0lo
|
||||
|| SHL $T2lo,32-8,$t0hi
|
||||
XOR $t0hi,$S0hi,$S0hi
|
||||
|| XOR $t0lo,$S0lo,$S0lo
|
||||
|| ADD $S1hi,$T1hi,$T1hi
|
||||
|| ADDU $S1lo,$T1lo,$T1carry:$T1lo ; T1 = X[i+9]+sigma1()
|
||||
|| [B1] BNOP loop16_79?
|
||||
|| SHRU $T2hi,7,$t0hi
|
||||
|| SHL $T2hi,32-7,$t0lo
|
||||
XOR $t0hi,$S0hi,$S0hi
|
||||
|| XOR $t0lo,$S0lo,$S0lo
|
||||
|| ADD $CHhi,$T1hi,$T1hi
|
||||
|| ADDU $CHlo,$T1carry:$T1lo,$T1carry:$T1lo ; T1 += X[i]
|
||||
|| SHRU $T2lo,7,$t0lo
|
||||
XOR $t0lo,$S0lo,$S0lo ; sigma0(Xi[i+1]
|
||||
|
||||
ADD $S0hi,$T1hi,$T1hi
|
||||
|| ADDU $S0lo,$T1carry:$T1lo,$T1carry:$T1lo ; T1 += sigma0()
|
||||
|| [B1] SUB B1,1,B1
|
||||
NOP ; avoid cross-path stall
|
||||
ADD $T1carry,$T1hi,$T1hi
|
||||
;;===== branch to loop16_79? is taken here
|
||||
|
||||
break?:
|
||||
ADD $Ahi,$Actxhi,$Ahi ; accumulate ctx
|
||||
|| ADDU $Alo,$Actxlo,$Actxlo:$Alo
|
||||
|| [A0] LDNDW *$INP++,B11:B10 ; pre-fetch input
|
||||
|| [A0] ADDK -640,$K512 ; rewind pointer to K512
|
||||
ADD $Bhi,$Bctxhi,$Bhi
|
||||
|| ADDU $Blo,$Bctxlo,$Bctxlo:$Blo
|
||||
|| [A0] LDDW *$K512++,$Khi:$Klo ; pre-fetch K512[0]
|
||||
ADD $Chi,$Cctxhi,$Chi
|
||||
|| ADDU $Clo,$Cctxlo,$Cctxlo:$Clo
|
||||
|| ADD $Actxlo,$Ahi,$Ahi
|
||||
||[!A0] MV $CTXA,$CTXB
|
||||
ADD $Dhi,$Dctxhi,$Dhi
|
||||
|| ADDU $Dlo,$Dctxlo,$Dctxlo:$Dlo
|
||||
|| ADD $Bctxlo,$Bhi,$Bhi
|
||||
||[!A0] STW $Ahi,*${CTXA}[0^.LITTLE_ENDIAN] ; save ctx
|
||||
||[!A0] STW $Alo,*${CTXB}[1^.LITTLE_ENDIAN]
|
||||
ADD $Ehi,$Ectxhi,$Ehi
|
||||
|| ADDU $Elo,$Ectxlo,$Ectxlo:$Elo
|
||||
|| ADD $Cctxlo,$Chi,$Chi
|
||||
|| [A0] BNOP outerloop?
|
||||
||[!A0] STW $Bhi,*${CTXA}[2^.LITTLE_ENDIAN]
|
||||
||[!A0] STW $Blo,*${CTXB}[3^.LITTLE_ENDIAN]
|
||||
ADD $Fhi,$Fctxhi,$Fhi
|
||||
|| ADDU $Flo,$Fctxlo,$Fctxlo:$Flo
|
||||
|| ADD $Dctxlo,$Dhi,$Dhi
|
||||
||[!A0] STW $Chi,*${CTXA}[4^.LITTLE_ENDIAN]
|
||||
||[!A0] STW $Clo,*${CTXB}[5^.LITTLE_ENDIAN]
|
||||
ADD $Ghi,$Gctxhi,$Ghi
|
||||
|| ADDU $Glo,$Gctxlo,$Gctxlo:$Glo
|
||||
|| ADD $Ectxlo,$Ehi,$Ehi
|
||||
||[!A0] STW $Dhi,*${CTXA}[6^.LITTLE_ENDIAN]
|
||||
||[!A0] STW $Dlo,*${CTXB}[7^.LITTLE_ENDIAN]
|
||||
ADD $Hhi,$Hctxhi,$Hhi
|
||||
|| ADDU $Hlo,$Hctxlo,$Hctxlo:$Hlo
|
||||
|| ADD $Fctxlo,$Fhi,$Fhi
|
||||
||[!A0] STW $Ehi,*${CTXA}[8^.LITTLE_ENDIAN]
|
||||
||[!A0] STW $Elo,*${CTXB}[9^.LITTLE_ENDIAN]
|
||||
ADD $Gctxlo,$Ghi,$Ghi
|
||||
||[!A0] STW $Fhi,*${CTXA}[10^.LITTLE_ENDIAN]
|
||||
||[!A0] STW $Flo,*${CTXB}[11^.LITTLE_ENDIAN]
|
||||
ADD $Hctxlo,$Hhi,$Hhi
|
||||
||[!A0] STW $Ghi,*${CTXA}[12^.LITTLE_ENDIAN]
|
||||
||[!A0] STW $Glo,*${CTXB}[13^.LITTLE_ENDIAN]
|
||||
;;===== branch to outerloop? is taken here
|
||||
|
||||
STW $Hhi,*${CTXA}[14^.LITTLE_ENDIAN]
|
||||
|| STW $Hlo,*${CTXB}[15^.LITTLE_ENDIAN]
|
||||
|| MVK -40,B0
|
||||
ADD FP,B0,SP ; destroy circular buffer
|
||||
|| LDDW *FP[-4],A11:A10
|
||||
LDDW *SP[2],A13:A12
|
||||
|| LDDW *FP[-2],B11:B10
|
||||
LDDW *SP[4],B13:B12
|
||||
|| BNOP RA
|
||||
LDW *++SP(40),FP ; restore frame pointer
|
||||
MVK 0,B0
|
||||
MVC B0,AMR ; clear AMR
|
||||
NOP 2 ; wait till FP is committed
|
||||
.endasmfunc
|
||||
|
||||
.sect ".const:sha_asm"
|
||||
.align 128
|
||||
K512:
|
||||
.uword 0x428a2f98,0xd728ae22, 0x71374491,0x23ef65cd
|
||||
.uword 0xb5c0fbcf,0xec4d3b2f, 0xe9b5dba5,0x8189dbbc
|
||||
.uword 0x3956c25b,0xf348b538, 0x59f111f1,0xb605d019
|
||||
.uword 0x923f82a4,0xaf194f9b, 0xab1c5ed5,0xda6d8118
|
||||
.uword 0xd807aa98,0xa3030242, 0x12835b01,0x45706fbe
|
||||
.uword 0x243185be,0x4ee4b28c, 0x550c7dc3,0xd5ffb4e2
|
||||
.uword 0x72be5d74,0xf27b896f, 0x80deb1fe,0x3b1696b1
|
||||
.uword 0x9bdc06a7,0x25c71235, 0xc19bf174,0xcf692694
|
||||
.uword 0xe49b69c1,0x9ef14ad2, 0xefbe4786,0x384f25e3
|
||||
.uword 0x0fc19dc6,0x8b8cd5b5, 0x240ca1cc,0x77ac9c65
|
||||
.uword 0x2de92c6f,0x592b0275, 0x4a7484aa,0x6ea6e483
|
||||
.uword 0x5cb0a9dc,0xbd41fbd4, 0x76f988da,0x831153b5
|
||||
.uword 0x983e5152,0xee66dfab, 0xa831c66d,0x2db43210
|
||||
.uword 0xb00327c8,0x98fb213f, 0xbf597fc7,0xbeef0ee4
|
||||
.uword 0xc6e00bf3,0x3da88fc2, 0xd5a79147,0x930aa725
|
||||
.uword 0x06ca6351,0xe003826f, 0x14292967,0x0a0e6e70
|
||||
.uword 0x27b70a85,0x46d22ffc, 0x2e1b2138,0x5c26c926
|
||||
.uword 0x4d2c6dfc,0x5ac42aed, 0x53380d13,0x9d95b3df
|
||||
.uword 0x650a7354,0x8baf63de, 0x766a0abb,0x3c77b2a8
|
||||
.uword 0x81c2c92e,0x47edaee6, 0x92722c85,0x1482353b
|
||||
.uword 0xa2bfe8a1,0x4cf10364, 0xa81a664b,0xbc423001
|
||||
.uword 0xc24b8b70,0xd0f89791, 0xc76c51a3,0x0654be30
|
||||
.uword 0xd192e819,0xd6ef5218, 0xd6990624,0x5565a910
|
||||
.uword 0xf40e3585,0x5771202a, 0x106aa070,0x32bbd1b8
|
||||
.uword 0x19a4c116,0xb8d2d0c8, 0x1e376c08,0x5141ab53
|
||||
.uword 0x2748774c,0xdf8eeb99, 0x34b0bcb5,0xe19b48a8
|
||||
.uword 0x391c0cb3,0xc5c95a63, 0x4ed8aa4a,0xe3418acb
|
||||
.uword 0x5b9cca4f,0x7763e373, 0x682e6ff3,0xd6b2b8a3
|
||||
.uword 0x748f82ee,0x5defb2fc, 0x78a5636f,0x43172f60
|
||||
.uword 0x84c87814,0xa1f0ab72, 0x8cc70208,0x1a6439ec
|
||||
.uword 0x90befffa,0x23631e28, 0xa4506ceb,0xde82bde9
|
||||
.uword 0xbef9a3f7,0xb2c67915, 0xc67178f2,0xe372532b
|
||||
.uword 0xca273ece,0xea26619c, 0xd186b8c7,0x21c0c207
|
||||
.uword 0xeada7dd6,0xcde0eb1e, 0xf57d4f7f,0xee6ed178
|
||||
.uword 0x06f067aa,0x72176fba, 0x0a637dc5,0xa2c898a6
|
||||
.uword 0x113f9804,0xbef90dae, 0x1b710b35,0x131c471b
|
||||
.uword 0x28db77f5,0x23047d84, 0x32caab7b,0x40c72493
|
||||
.uword 0x3c9ebe0a,0x15c9bebc, 0x431d67c4,0x9c100d4c
|
||||
.uword 0x4cc5d4be,0xcb3e42b6, 0x597f299c,0xfc657e2a
|
||||
.uword 0x5fcb6fab,0x3ad6faec, 0x6c44198c,0x4a475817
|
||||
.cstring "SHA512 block transform for C64x+, CRYPTOGAMS by <appro\@openssl.org>"
|
||||
.align 4
|
||||
___
|
||||
|
||||
print $code;
|
||||
close STDOUT;
|
@@ -65,7 +65,7 @@ int OPENSSL_issetugid(void)
|
||||
return issetugid();
|
||||
}
|
||||
|
||||
#elif defined(OPENSSL_SYS_WIN32) || defined(OPENSSL_SYS_VXWORKS) || defined(OPENSSL_SYS_NETWARE)
|
||||
#elif defined(OPENSSL_SYS_WIN32) || defined(OPENSSL_SYS_VXWORKS) || defined(OPENSSL_SYS_NETWARE) || defined(_TMS320C6X)
|
||||
|
||||
int OPENSSL_issetugid(void)
|
||||
{
|
||||
|
@@ -119,10 +119,8 @@ for (@ARGV) { $sse2=1 if (/-DOPENSSL_IA32_SSE2/); }
|
||||
&mov ("esi","edx");
|
||||
&or ("ebp","ecx"); # merge AMD XOP flag
|
||||
|
||||
&bt ("ecx",26); # check XSAVE bit
|
||||
&jnc (&label("done"));
|
||||
&bt ("ecx",27); # check OSXSAVE bit
|
||||
&jnc (&label("clear_xmm"));
|
||||
&jnc (&label("clear_avx"));
|
||||
&xor ("ecx","ecx");
|
||||
&data_byte(0x0f,0x01,0xd0); # xgetbv
|
||||
&and ("eax",6);
|
||||
|
@@ -1,74 +0,0 @@
|
||||
=pod
|
||||
|
||||
=head1 NAME
|
||||
|
||||
SSLeay_version - retrieve version/build information about OpenSSL library
|
||||
|
||||
=head1 SYNOPSIS
|
||||
|
||||
#include <openssl/crypto.h>
|
||||
|
||||
const char *SSLeay_version(int type);
|
||||
|
||||
=head1 DESCRIPTION
|
||||
|
||||
SSLeay_version() returns a pointer to a constant string describing the
|
||||
version of the OpenSSL library or giving information about the library
|
||||
build.
|
||||
|
||||
The following B<type> values are supported:
|
||||
|
||||
=over 4
|
||||
|
||||
=item SSLEAY_VERSION
|
||||
|
||||
The version of the OpenSSL library including the release date.
|
||||
|
||||
=item SSLEAY_CFLAGS
|
||||
|
||||
The compiler flags set for the compilation process in the form
|
||||
"compiler: ..." if available or "compiler: information not available"
|
||||
otherwise.
|
||||
|
||||
=item SSLEAY_BUILT_ON
|
||||
|
||||
The date of the build process in the form "built on: ..." if available
|
||||
or "built on: date not available" otherwise.
|
||||
|
||||
=item SSLEAY_PLATFORM
|
||||
|
||||
The "Configure" target of the library build in the form "platform: ..."
|
||||
if available or "platform: information not available" otherwise.
|
||||
|
||||
=item SSLEAY_DIR
|
||||
|
||||
The "OPENSSLDIR" setting of the library build in the form "OPENSSLDIR: "...""
|
||||
if available or "OPENSSLDIR: N/A" otherwise.
|
||||
|
||||
=back
|
||||
|
||||
=head1 RETURN VALUES
|
||||
|
||||
The following return values can occur:
|
||||
|
||||
=over 4
|
||||
|
||||
=item "not available"
|
||||
|
||||
An invalid value for B<type> was given.
|
||||
|
||||
=item Pointer to constant string
|
||||
|
||||
Textual description.
|
||||
|
||||
=back
|
||||
|
||||
=head1 SEE ALSO
|
||||
|
||||
L<crypto(3)|crypto(3)>
|
||||
|
||||
=head1 HISTORY
|
||||
|
||||
B<SSLEAY_DIR> was added in OpenSSL 0.9.7.
|
||||
|
||||
=cut
|
2
e_os.h
2
e_os.h
@@ -668,7 +668,7 @@ extern char *sys_errlist[]; extern int sys_nerr;
|
||||
#if defined(OPENSSL_SYS_WINDOWS)
|
||||
# define strcasecmp _stricmp
|
||||
# define strncasecmp _strnicmp
|
||||
#elif defined(OPENSSL_SYS_VMS)
|
||||
#elif defined(OPENSSL_SYS_VMS) || defined(OPENSSL_SYS_DSPBIOS)
|
||||
/* VMS below version 7.0 doesn't have strcasecmp() */
|
||||
# include "o_str.h"
|
||||
# define strcasecmp OPENSSL_strcasecmp
|
||||
|
@@ -99,7 +99,7 @@ static int AESTest(EVP_CIPHER_CTX *ctx,
|
||||
{
|
||||
const EVP_CIPHER *cipher = NULL;
|
||||
|
||||
if (strcasecmp(amode, "CBC") == 0)
|
||||
if (fips_strcasecmp(amode, "CBC") == 0)
|
||||
{
|
||||
switch (akeysz)
|
||||
{
|
||||
@@ -117,7 +117,7 @@ static int AESTest(EVP_CIPHER_CTX *ctx,
|
||||
}
|
||||
|
||||
}
|
||||
else if (strcasecmp(amode, "ECB") == 0)
|
||||
else if (fips_strcasecmp(amode, "ECB") == 0)
|
||||
{
|
||||
switch (akeysz)
|
||||
{
|
||||
@@ -134,7 +134,7 @@ static int AESTest(EVP_CIPHER_CTX *ctx,
|
||||
break;
|
||||
}
|
||||
}
|
||||
else if (strcasecmp(amode, "CFB128") == 0)
|
||||
else if (fips_strcasecmp(amode, "CFB128") == 0)
|
||||
{
|
||||
switch (akeysz)
|
||||
{
|
||||
@@ -169,7 +169,7 @@ static int AESTest(EVP_CIPHER_CTX *ctx,
|
||||
break;
|
||||
}
|
||||
}
|
||||
else if(!strcasecmp(amode,"CFB1"))
|
||||
else if(!fips_strcasecmp(amode,"CFB1"))
|
||||
{
|
||||
switch (akeysz)
|
||||
{
|
||||
@@ -186,7 +186,7 @@ static int AESTest(EVP_CIPHER_CTX *ctx,
|
||||
break;
|
||||
}
|
||||
}
|
||||
else if(!strcasecmp(amode,"CFB8"))
|
||||
else if(!fips_strcasecmp(amode,"CFB8"))
|
||||
{
|
||||
switch (akeysz)
|
||||
{
|
||||
@@ -215,7 +215,7 @@ static int AESTest(EVP_CIPHER_CTX *ctx,
|
||||
}
|
||||
if (FIPS_cipherinit(ctx, cipher, aKey, iVec, dir) <= 0)
|
||||
return 0;
|
||||
if(!strcasecmp(amode,"CFB1"))
|
||||
if(!fips_strcasecmp(amode,"CFB1"))
|
||||
M_EVP_CIPHER_CTX_set_flags(ctx, EVP_CIPH_FLAG_LENGTH_BITS);
|
||||
if (dir)
|
||||
FIPS_cipher(ctx, ciphertext, plaintext, len);
|
||||
@@ -535,7 +535,7 @@ static int do_mct(char *amode,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
FIPS_cipher_ctx_cleanup(&ctx);
|
||||
return ret;
|
||||
}
|
||||
|
||||
@@ -554,7 +554,7 @@ static int proc_file(char *rqfile, char *rspfile)
|
||||
FILE *afp = NULL, *rfp = NULL;
|
||||
char ibuf[2048];
|
||||
char tbuf[2048];
|
||||
int ilen, len, ret = 0;
|
||||
int len;
|
||||
char algo[8] = "";
|
||||
char amode[8] = "";
|
||||
char atest[8] = "";
|
||||
@@ -605,7 +605,6 @@ static int proc_file(char *rqfile, char *rspfile)
|
||||
while (!err && (fgets(ibuf, sizeof(ibuf), afp)) != NULL)
|
||||
{
|
||||
tidy_line(tbuf, ibuf);
|
||||
ilen = strlen(ibuf);
|
||||
/* printf("step=%d ibuf=%s",step,ibuf); */
|
||||
switch (step)
|
||||
{
|
||||
@@ -636,10 +635,8 @@ static int proc_file(char *rqfile, char *rspfile)
|
||||
char *xp, *pp = ibuf+2;
|
||||
int n;
|
||||
if (akeysz)
|
||||
{ /* insert current time & date */
|
||||
time_t rtim = time(0);
|
||||
fputs("# ", rfp);
|
||||
copy_line(ctime(&rtim), rfp);
|
||||
{
|
||||
copy_line(ibuf, rfp);
|
||||
}
|
||||
else
|
||||
{
|
||||
@@ -780,11 +777,11 @@ static int proc_file(char *rqfile, char *rspfile)
|
||||
if(do_mct(amode, akeysz, aKey, iVec,
|
||||
dir, (unsigned char*)plaintext, len,
|
||||
rfp) < 0)
|
||||
EXIT(1);
|
||||
err = 1;
|
||||
}
|
||||
else
|
||||
{
|
||||
ret = AESTest(&ctx, amode, akeysz, aKey, iVec,
|
||||
AESTest(&ctx, amode, akeysz, aKey, iVec,
|
||||
dir, /* 0 = decrypt, 1 = encrypt */
|
||||
plaintext, ciphertext, len);
|
||||
OutputValue("CIPHERTEXT",ciphertext,len,rfp,
|
||||
@@ -822,7 +819,7 @@ static int proc_file(char *rqfile, char *rspfile)
|
||||
}
|
||||
else
|
||||
{
|
||||
ret = AESTest(&ctx, amode, akeysz, aKey, iVec,
|
||||
AESTest(&ctx, amode, akeysz, aKey, iVec,
|
||||
dir, /* 0 = decrypt, 1 = encrypt */
|
||||
plaintext, ciphertext, len);
|
||||
OutputValue("PLAINTEXT",(unsigned char *)plaintext,len,rfp,
|
||||
@@ -850,6 +847,7 @@ static int proc_file(char *rqfile, char *rspfile)
|
||||
fclose(rfp);
|
||||
if (afp)
|
||||
fclose(afp);
|
||||
FIPS_cipher_ctx_cleanup(&ctx);
|
||||
return err;
|
||||
}
|
||||
|
||||
@@ -862,23 +860,26 @@ static int proc_file(char *rqfile, char *rspfile)
|
||||
aes_test -d xxxxx.xxx
|
||||
The default is: -d req.txt
|
||||
--------------------------------------------------*/
|
||||
#ifdef FIPS_ALGVS
|
||||
int fips_aesavs_main(int argc, char **argv)
|
||||
#else
|
||||
int main(int argc, char **argv)
|
||||
#endif
|
||||
{
|
||||
char *rqlist = "req.txt", *rspfile = NULL;
|
||||
FILE *fp = NULL;
|
||||
char fn[250] = "", rfn[256] = "";
|
||||
int f_opt = 0, d_opt = 1;
|
||||
int d_opt = 1;
|
||||
fips_algtest_init();
|
||||
|
||||
if (argc > 1)
|
||||
{
|
||||
if (strcasecmp(argv[1], "-d") == 0)
|
||||
if (fips_strcasecmp(argv[1], "-d") == 0)
|
||||
{
|
||||
d_opt = 1;
|
||||
}
|
||||
else if (strcasecmp(argv[1], "-f") == 0)
|
||||
else if (fips_strcasecmp(argv[1], "-f") == 0)
|
||||
{
|
||||
f_opt = 1;
|
||||
d_opt = 0;
|
||||
}
|
||||
else
|
||||
@@ -915,7 +916,7 @@ int main(int argc, char **argv)
|
||||
if (proc_file(rfn, rspfile))
|
||||
{
|
||||
printf(">>> Processing failed for: %s <<<\n", rfn);
|
||||
EXIT(1);
|
||||
return 1;
|
||||
}
|
||||
}
|
||||
fclose(fp);
|
||||
@@ -929,7 +930,6 @@ int main(int argc, char **argv)
|
||||
printf(">>> Processing failed for: %s <<<\n", fn);
|
||||
}
|
||||
}
|
||||
EXIT(0);
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
@@ -75,10 +75,11 @@ int main(int argc, char **argv)
|
||||
|
||||
#include "fips_utl.h"
|
||||
|
||||
static char buf[204800];
|
||||
static char lbuf[204800];
|
||||
|
||||
static void gcmtest(FILE *in, FILE *out, int encrypt)
|
||||
{
|
||||
char buf[2048];
|
||||
char lbuf[2048];
|
||||
char *keyword, *value;
|
||||
int keylen = -1, ivlen = -1, aadlen = -1, taglen = -1, ptlen = -1;
|
||||
int rv;
|
||||
@@ -261,16 +262,14 @@ static void gcmtest(FILE *in, FILE *out, int encrypt)
|
||||
iv = aad = ct = pt = key = tag = NULL;
|
||||
}
|
||||
}
|
||||
FIPS_cipher_ctx_cleanup(&ctx);
|
||||
}
|
||||
|
||||
static void xtstest(FILE *in, FILE *out)
|
||||
{
|
||||
char buf[204800];
|
||||
char lbuf[204800];
|
||||
char *keyword, *value;
|
||||
int inlen = 0;
|
||||
int encrypt = 0;
|
||||
int rv;
|
||||
long l;
|
||||
unsigned char *key = NULL, *iv = NULL;
|
||||
unsigned char *inbuf = NULL, *outbuf = NULL;
|
||||
@@ -326,7 +325,7 @@ static void xtstest(FILE *in, FILE *out)
|
||||
{
|
||||
FIPS_cipherinit(&ctx, xts, key, iv, encrypt);
|
||||
outbuf = OPENSSL_malloc(inlen);
|
||||
rv = FIPS_cipher(&ctx, outbuf, inbuf, inlen);
|
||||
FIPS_cipher(&ctx, outbuf, inbuf, inlen);
|
||||
OutputValue(encrypt ? "CT":"PT", outbuf, inlen, out, 0);
|
||||
OPENSSL_free(inbuf);
|
||||
OPENSSL_free(outbuf);
|
||||
@@ -335,12 +334,11 @@ static void xtstest(FILE *in, FILE *out)
|
||||
iv = key = inbuf = outbuf = NULL;
|
||||
}
|
||||
}
|
||||
FIPS_cipher_ctx_cleanup(&ctx);
|
||||
}
|
||||
|
||||
static void ccmtest(FILE *in, FILE *out)
|
||||
{
|
||||
char buf[200048];
|
||||
char lbuf[200048];
|
||||
char *keyword, *value;
|
||||
long l;
|
||||
unsigned char *Key = NULL, *Nonce = NULL;
|
||||
@@ -428,6 +426,8 @@ static void ccmtest(FILE *in, FILE *out)
|
||||
}
|
||||
else if (!strcmp(keyword,"Adata"))
|
||||
{
|
||||
if (Adata)
|
||||
OPENSSL_free(Adata);
|
||||
Adata = hex2bin_m(value, &l);
|
||||
if (Alen && l != Alen)
|
||||
{
|
||||
@@ -493,10 +493,16 @@ static void ccmtest(FILE *in, FILE *out)
|
||||
OPENSSL_free(Key);
|
||||
if (Nonce)
|
||||
OPENSSL_free(Nonce);
|
||||
if (Adata)
|
||||
OPENSSL_free(Adata);
|
||||
FIPS_cipher_ctx_cleanup(&ctx);
|
||||
}
|
||||
|
||||
int main(int argc,char **argv)
|
||||
#ifdef FIPS_ALGVS
|
||||
int fips_gcmtest_main(int argc, char **argv)
|
||||
#else
|
||||
int main(int argc, char **argv)
|
||||
#endif
|
||||
{
|
||||
int encrypt;
|
||||
int xts = 0, ccm = 0;
|
||||
|
@@ -92,7 +92,11 @@ static int print_cmac_ver(const EVP_CIPHER *cipher, FILE *out,
|
||||
unsigned char *Mac, int Maclen,
|
||||
int Tlen);
|
||||
|
||||
#ifdef FIPS_ALGVS
|
||||
int fips_cmactest_main(int argc, char **argv)
|
||||
#else
|
||||
int main(int argc, char **argv)
|
||||
#endif
|
||||
{
|
||||
FILE *in = NULL, *out = NULL;
|
||||
int mode = 0; /* 0 => Generate, 1 => Verify */
|
||||
|
@@ -102,7 +102,7 @@ static int DESTest(EVP_CIPHER_CTX *ctx,
|
||||
if (akeysz != 192)
|
||||
{
|
||||
printf("Invalid key size: %d\n", akeysz);
|
||||
EXIT(1);
|
||||
return 0;
|
||||
}
|
||||
|
||||
if (fips_strcasecmp(amode, "CBC") == 0)
|
||||
@@ -120,7 +120,7 @@ static int DESTest(EVP_CIPHER_CTX *ctx,
|
||||
else
|
||||
{
|
||||
printf("Unknown mode: %s\n", amode);
|
||||
EXIT(1);
|
||||
return 0;
|
||||
}
|
||||
|
||||
if (FIPS_cipherinit(ctx, cipher, aKey, iVec, dir) <= 0)
|
||||
@@ -155,12 +155,12 @@ static void shiftin(unsigned char *dst,unsigned char *src,int nbits)
|
||||
}
|
||||
|
||||
/*-----------------------------------------------*/
|
||||
char *t_tag[2] = {"PLAINTEXT", "CIPHERTEXT"};
|
||||
char *t_mode[6] = {"CBC","ECB","OFB","CFB1","CFB8","CFB64"};
|
||||
enum Mode {CBC, ECB, OFB, CFB1, CFB8, CFB64};
|
||||
char *tdes_t_tag[2] = {"PLAINTEXT", "CIPHERTEXT"};
|
||||
char *tdes_t_mode[6] = {"CBC","ECB","OFB","CFB1","CFB8","CFB64"};
|
||||
enum tdes_Mode {TCBC, TECB, TOFB, TCFB1, TCFB8, TCFB64};
|
||||
int Sizes[6]={64,64,64,1,8,64};
|
||||
|
||||
static void do_mct(char *amode,
|
||||
static int do_tmct(char *amode,
|
||||
int akeysz, int numkeys, unsigned char *akey,unsigned char *ivec,
|
||||
int dir, unsigned char *text, int len,
|
||||
FILE *rfp)
|
||||
@@ -170,12 +170,12 @@ static void do_mct(char *amode,
|
||||
unsigned char text0[8];
|
||||
|
||||
for (imode=0 ; imode < 6 ; ++imode)
|
||||
if(!strcmp(amode,t_mode[imode]))
|
||||
if(!strcmp(amode,tdes_t_mode[imode]))
|
||||
break;
|
||||
if (imode == 6)
|
||||
{
|
||||
printf("Unrecognized mode: %s\n", amode);
|
||||
EXIT(1);
|
||||
return 0;
|
||||
}
|
||||
for(i=0 ; i < 400 ; ++i)
|
||||
{
|
||||
@@ -196,12 +196,12 @@ static void do_mct(char *amode,
|
||||
OutputValue("",akey+n*8,8,rfp,0);
|
||||
}
|
||||
|
||||
if(imode != ECB)
|
||||
if(imode != TECB)
|
||||
OutputValue("IV",ivec,8,rfp,0);
|
||||
OutputValue(t_tag[dir^1],text,len,rfp,imode == CFB1);
|
||||
OutputValue(tdes_t_tag[dir^1],text,len,rfp,imode == TCFB1);
|
||||
#if 0
|
||||
/* compensate for endianness */
|
||||
if(imode == CFB1)
|
||||
if(imode == TCFB1)
|
||||
text[0]<<=7;
|
||||
#endif
|
||||
memcpy(text0,text,8);
|
||||
@@ -223,18 +223,18 @@ static void do_mct(char *amode,
|
||||
}
|
||||
if(j == 9999)
|
||||
{
|
||||
OutputValue(t_tag[dir],text,len,rfp,imode == CFB1);
|
||||
OutputValue(tdes_t_tag[dir],text,len,rfp,imode == TCFB1);
|
||||
/* memcpy(ivec,text,8); */
|
||||
}
|
||||
/* DebugValue("iv",ctx.iv,8); */
|
||||
/* accumulate material for the next key */
|
||||
shiftin(nk,text,Sizes[imode]);
|
||||
/* DebugValue("nk",nk,24);*/
|
||||
if((dir && (imode == CFB1 || imode == CFB8 || imode == CFB64
|
||||
|| imode == CBC)) || imode == OFB)
|
||||
if((dir && (imode == TCFB1 || imode == TCFB8
|
||||
|| imode == TCFB64 || imode == TCBC)) || imode == TOFB)
|
||||
memcpy(text,old_iv,8);
|
||||
|
||||
if(!dir && (imode == CFB1 || imode == CFB8 || imode == CFB64))
|
||||
if(!dir && (imode == TCFB1 || imode == TCFB8 || imode == TCFB64))
|
||||
{
|
||||
/* the test specifies using the output of the raw DES operation
|
||||
which we don't have, so reconstruct it... */
|
||||
@@ -260,18 +260,20 @@ static void do_mct(char *amode,
|
||||
/* pointless exercise - the final text doesn't depend on the
|
||||
initial text in OFB mode, so who cares what it is? (Who
|
||||
designed these tests?) */
|
||||
if(imode == OFB)
|
||||
if(imode == TOFB)
|
||||
for(n=0 ; n < 8 ; ++n)
|
||||
text[n]=text0[n]^old_iv[n];
|
||||
FIPS_cipher_ctx_cleanup(&ctx);
|
||||
}
|
||||
return 1;
|
||||
}
|
||||
|
||||
static int proc_file(char *rqfile, char *rspfile)
|
||||
static int tproc_file(char *rqfile, char *rspfile)
|
||||
{
|
||||
char afn[256], rfn[256];
|
||||
FILE *afp = NULL, *rfp = NULL;
|
||||
char ibuf[2048], tbuf[2048];
|
||||
int ilen, len, ret = 0;
|
||||
int len;
|
||||
char amode[8] = "";
|
||||
char atest[100] = "";
|
||||
int akeysz=0;
|
||||
@@ -322,7 +324,6 @@ static int proc_file(char *rqfile, char *rspfile)
|
||||
while (!err && (fgets(ibuf, sizeof(ibuf), afp)) != NULL)
|
||||
{
|
||||
tidy_line(tbuf, ibuf);
|
||||
ilen = strlen(ibuf);
|
||||
/* printf("step=%d ibuf=%s",step,ibuf);*/
|
||||
if(step == 3 && !strcmp(amode,"ECB"))
|
||||
{
|
||||
@@ -355,10 +356,8 @@ static int proc_file(char *rqfile, char *rspfile)
|
||||
char *xp, *pp = ibuf+2;
|
||||
int n;
|
||||
if(*amode)
|
||||
{ /* insert current time & date */
|
||||
time_t rtim = time(0);
|
||||
fputs("# ", rfp);
|
||||
copy_line(ctime(&rtim), rfp);
|
||||
{
|
||||
copy_line(ibuf, rfp);
|
||||
}
|
||||
else
|
||||
{
|
||||
@@ -546,12 +545,14 @@ static int proc_file(char *rqfile, char *rspfile)
|
||||
PrintValue("PLAINTEXT", (unsigned char*)plaintext, len);
|
||||
if (strcmp(atest, "Monte") == 0) /* Monte Carlo Test */
|
||||
{
|
||||
do_mct(amode,akeysz,numkeys,aKey,iVec,dir,plaintext,len,rfp);
|
||||
if (!do_tmct(amode,akeysz,numkeys,aKey,iVec,
|
||||
dir,plaintext,len,rfp))
|
||||
return -1;
|
||||
}
|
||||
else
|
||||
{
|
||||
assert(dir == 1);
|
||||
ret = DESTest(&ctx, amode, akeysz, aKey, iVec,
|
||||
DESTest(&ctx, amode, akeysz, aKey, iVec,
|
||||
dir, /* 0 = decrypt, 1 = encrypt */
|
||||
ciphertext, plaintext, len);
|
||||
OutputValue("CIPHERTEXT",ciphertext,len,rfp,
|
||||
@@ -585,13 +586,13 @@ static int proc_file(char *rqfile, char *rspfile)
|
||||
PrintValue("CIPHERTEXT", ciphertext, len);
|
||||
if (strcmp(atest, "Monte") == 0) /* Monte Carlo Test */
|
||||
{
|
||||
do_mct(amode, akeysz, numkeys, aKey, iVec,
|
||||
do_tmct(amode, akeysz, numkeys, aKey, iVec,
|
||||
dir, ciphertext, len, rfp);
|
||||
}
|
||||
else
|
||||
{
|
||||
assert(dir == 0);
|
||||
ret = DESTest(&ctx, amode, akeysz, aKey, iVec,
|
||||
DESTest(&ctx, amode, akeysz, aKey, iVec,
|
||||
dir, /* 0 = decrypt, 1 = encrypt */
|
||||
plaintext, ciphertext, len);
|
||||
OutputValue("PLAINTEXT",(unsigned char *)plaintext,len,rfp,
|
||||
@@ -619,6 +620,7 @@ static int proc_file(char *rqfile, char *rspfile)
|
||||
fclose(rfp);
|
||||
if (afp)
|
||||
fclose(afp);
|
||||
FIPS_cipher_ctx_cleanup(&ctx);
|
||||
return err;
|
||||
}
|
||||
|
||||
@@ -631,12 +633,16 @@ static int proc_file(char *rqfile, char *rspfile)
|
||||
aes_test -d xxxxx.xxx
|
||||
The default is: -d req.txt
|
||||
--------------------------------------------------*/
|
||||
#ifdef FIPS_ALGVS
|
||||
int fips_desmovs_main(int argc, char **argv)
|
||||
#else
|
||||
int main(int argc, char **argv)
|
||||
#endif
|
||||
{
|
||||
char *rqlist = "req.txt", *rspfile = NULL;
|
||||
FILE *fp = NULL;
|
||||
char fn[250] = "", rfn[256] = "";
|
||||
int f_opt = 0, d_opt = 1;
|
||||
int d_opt = 1;
|
||||
|
||||
fips_algtest_init();
|
||||
if (argc > 1)
|
||||
@@ -647,7 +653,6 @@ int main(int argc, char **argv)
|
||||
}
|
||||
else if (fips_strcasecmp(argv[1], "-f") == 0)
|
||||
{
|
||||
f_opt = 1;
|
||||
d_opt = 0;
|
||||
}
|
||||
else
|
||||
@@ -680,10 +685,10 @@ int main(int argc, char **argv)
|
||||
strtok(fn, "\r\n");
|
||||
strcpy(rfn, fn);
|
||||
printf("Processing: %s\n", rfn);
|
||||
if (proc_file(rfn, rspfile))
|
||||
if (tproc_file(rfn, rspfile))
|
||||
{
|
||||
printf(">>> Processing failed for: %s <<<\n", rfn);
|
||||
EXIT(1);
|
||||
return -1;
|
||||
}
|
||||
}
|
||||
fclose(fp);
|
||||
@@ -692,12 +697,11 @@ int main(int argc, char **argv)
|
||||
{
|
||||
if (VERBOSE)
|
||||
printf("Processing: %s\n", fn);
|
||||
if (proc_file(fn, rspfile))
|
||||
if (tproc_file(fn, rspfile))
|
||||
{
|
||||
printf(">>> Processing failed for: %s <<<\n", fn);
|
||||
}
|
||||
}
|
||||
EXIT(0);
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
@@ -145,8 +145,12 @@ static void output_Zhash(FILE *out, int exout,
|
||||
OPENSSL_cleanse(Z, Zlen);
|
||||
OPENSSL_free(Z);
|
||||
}
|
||||
|
||||
int main(int argc,char **argv)
|
||||
|
||||
#ifdef FIPS_ALGVS
|
||||
int fips_dhvs_main(int argc, char **argv)
|
||||
#else
|
||||
int main(int argc, char **argv)
|
||||
#endif
|
||||
{
|
||||
char **args = argv + 1;
|
||||
int argn = argc - 1;
|
||||
@@ -275,10 +279,14 @@ int main(int argc,char **argv)
|
||||
rhash, rhashlen);
|
||||
}
|
||||
}
|
||||
if (in && in != stdin)
|
||||
fclose(in);
|
||||
if (out && out != stdout)
|
||||
fclose(out);
|
||||
return 0;
|
||||
parse_error:
|
||||
fprintf(stderr, "Error Parsing request file\n");
|
||||
exit(1);
|
||||
return 1;
|
||||
}
|
||||
|
||||
#endif
|
||||
|
@@ -114,4 +114,28 @@ int FIPS_dsa_verify_digest(DSA *dsa,
|
||||
return dsa->meth->dsa_do_verify(dig,dlen,s,dsa);
|
||||
}
|
||||
|
||||
int FIPS_dsa_verify(DSA *dsa, const unsigned char *msg, size_t msglen,
|
||||
const EVP_MD *mhash, DSA_SIG *s)
|
||||
{
|
||||
int ret=-1;
|
||||
unsigned char dig[EVP_MAX_MD_SIZE];
|
||||
unsigned int dlen;
|
||||
FIPS_digest(msg, msglen, dig, &dlen, mhash);
|
||||
ret=FIPS_dsa_verify_digest(dsa, dig, dlen, s);
|
||||
OPENSSL_cleanse(dig, dlen);
|
||||
return ret;
|
||||
}
|
||||
|
||||
DSA_SIG * FIPS_dsa_sign(DSA *dsa, const unsigned char *msg, size_t msglen,
|
||||
const EVP_MD *mhash)
|
||||
{
|
||||
DSA_SIG *s;
|
||||
unsigned char dig[EVP_MAX_MD_SIZE];
|
||||
unsigned int dlen;
|
||||
FIPS_digest(msg, msglen, dig, &dlen, mhash);
|
||||
s = FIPS_dsa_sign_digest(dsa, dig, dlen);
|
||||
OPENSSL_cleanse(dig, dlen);
|
||||
return s;
|
||||
}
|
||||
|
||||
#endif
|
||||
|
@@ -62,8 +62,10 @@
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <ctype.h>
|
||||
#ifndef NO_SYS_TYPES_H
|
||||
#include <sys/types.h>
|
||||
#include <sys/stat.h>
|
||||
#endif
|
||||
|
||||
#include "e_os.h"
|
||||
|
||||
@@ -154,9 +156,7 @@ int main(int argc, char **argv)
|
||||
unsigned char buf[256];
|
||||
unsigned long h;
|
||||
BN_GENCB cb;
|
||||
EVP_MD_CTX mctx;
|
||||
BN_GENCB_set(&cb, dsa_cb, stderr);
|
||||
FIPS_md_ctx_init(&mctx);
|
||||
|
||||
fips_algtest_init();
|
||||
|
||||
@@ -210,19 +210,11 @@ int main(int argc, char **argv)
|
||||
}
|
||||
DSA_generate_key(dsa);
|
||||
|
||||
if (!FIPS_digestinit(&mctx, EVP_sha1()))
|
||||
goto end;
|
||||
if (!FIPS_digestupdate(&mctx, str1, 20))
|
||||
goto end;
|
||||
sig = FIPS_dsa_sign_ctx(dsa, &mctx);
|
||||
sig = FIPS_dsa_sign(dsa, str1, 20, EVP_sha1());
|
||||
if (!sig)
|
||||
goto end;
|
||||
|
||||
if (!FIPS_digestinit(&mctx, EVP_sha1()))
|
||||
goto end;
|
||||
if (!FIPS_digestupdate(&mctx, str1, 20))
|
||||
goto end;
|
||||
if (FIPS_dsa_verify_ctx(dsa, &mctx, sig) != 1)
|
||||
if (FIPS_dsa_verify(dsa, str1, 20, EVP_sha1(), sig) != 1)
|
||||
goto end;
|
||||
|
||||
ret = 1;
|
||||
@@ -231,7 +223,6 @@ end:
|
||||
if (sig)
|
||||
FIPS_dsa_sig_free(sig);
|
||||
if (dsa != NULL) FIPS_dsa_free(dsa);
|
||||
FIPS_md_ctx_cleanup(&mctx);
|
||||
#if 0
|
||||
CRYPTO_mem_leaks(bio_err);
|
||||
#endif
|
||||
|
@@ -46,7 +46,8 @@ static int parse_mod(char *line, int *pdsa2, int *pL, int *pN,
|
||||
if (strcmp(keyword, "L"))
|
||||
return 0;
|
||||
*pL = atoi(value);
|
||||
strcpy(line, p + 1);
|
||||
strcpy(lbuf, p + 1);
|
||||
strcpy(line, lbuf);
|
||||
if (pmd)
|
||||
p = strchr(line, ',');
|
||||
else
|
||||
@@ -199,6 +200,7 @@ static void pqg(FILE *in, FILE *out)
|
||||
{
|
||||
fprintf(out, "counter = %d" RESP_EOL RESP_EOL, counter);
|
||||
}
|
||||
FIPS_dsa_free(dsa);
|
||||
}
|
||||
}
|
||||
else if(!strcmp(keyword,"P"))
|
||||
@@ -519,6 +521,8 @@ static void keyver(FILE *in, FILE *out)
|
||||
BN_free(g);
|
||||
if (Y2)
|
||||
BN_free(Y2);
|
||||
if (ctx)
|
||||
BN_CTX_free(ctx);
|
||||
}
|
||||
|
||||
static void keypair(FILE *in, FILE *out)
|
||||
@@ -575,6 +579,8 @@ static void keypair(FILE *in, FILE *out)
|
||||
do_bn_print_name(out, "Y",dsa->pub_key);
|
||||
fputs(RESP_EOL, out);
|
||||
}
|
||||
if (dsa)
|
||||
FIPS_dsa_free(dsa);
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -627,9 +633,7 @@ static void siggen(FILE *in, FILE *out)
|
||||
{
|
||||
unsigned char msg[1024];
|
||||
int n;
|
||||
EVP_MD_CTX mctx;
|
||||
DSA_SIG *sig;
|
||||
FIPS_md_ctx_init(&mctx);
|
||||
|
||||
n=hex2bin(value,msg);
|
||||
|
||||
@@ -637,19 +641,16 @@ static void siggen(FILE *in, FILE *out)
|
||||
exit(1);
|
||||
do_bn_print_name(out, "Y",dsa->pub_key);
|
||||
|
||||
FIPS_digestinit(&mctx, md);
|
||||
FIPS_digestupdate(&mctx, msg, n);
|
||||
sig = FIPS_dsa_sign_ctx(dsa, &mctx);
|
||||
sig = FIPS_dsa_sign(dsa, msg, n, md);
|
||||
|
||||
do_bn_print_name(out, "R",sig->r);
|
||||
do_bn_print_name(out, "S",sig->s);
|
||||
fputs(RESP_EOL, out);
|
||||
FIPS_dsa_sig_free(sig);
|
||||
FIPS_md_ctx_cleanup(&mctx);
|
||||
}
|
||||
}
|
||||
if (dsa)
|
||||
FIPS_dsa_free(dsa);
|
||||
if (dsa)
|
||||
FIPS_dsa_free(dsa);
|
||||
}
|
||||
|
||||
static void sigver(FILE *in, FILE *out)
|
||||
@@ -687,37 +688,48 @@ static void sigver(FILE *in, FILE *out)
|
||||
dsa = FIPS_dsa_new();
|
||||
}
|
||||
else if(!strcmp(keyword,"P"))
|
||||
dsa->p=hex2bn(value);
|
||||
do_hex2bn(&dsa->p, value);
|
||||
else if(!strcmp(keyword,"Q"))
|
||||
dsa->q=hex2bn(value);
|
||||
do_hex2bn(&dsa->q, value);
|
||||
else if(!strcmp(keyword,"G"))
|
||||
dsa->g=hex2bn(value);
|
||||
do_hex2bn(&dsa->g, value);
|
||||
else if(!strcmp(keyword,"Msg"))
|
||||
n=hex2bin(value,msg);
|
||||
else if(!strcmp(keyword,"Y"))
|
||||
dsa->pub_key=hex2bn(value);
|
||||
do_hex2bn(&dsa->pub_key, value);
|
||||
else if(!strcmp(keyword,"R"))
|
||||
sig->r=hex2bn(value);
|
||||
else if(!strcmp(keyword,"S"))
|
||||
{
|
||||
EVP_MD_CTX mctx;
|
||||
int r;
|
||||
FIPS_md_ctx_init(&mctx);
|
||||
sig->s=hex2bn(value);
|
||||
|
||||
FIPS_digestinit(&mctx, md);
|
||||
FIPS_digestupdate(&mctx, msg, n);
|
||||
no_err = 1;
|
||||
r = FIPS_dsa_verify_ctx(dsa, &mctx, sig);
|
||||
r = FIPS_dsa_verify(dsa, msg, n, md, sig);
|
||||
no_err = 0;
|
||||
FIPS_md_ctx_cleanup(&mctx);
|
||||
if (sig->s)
|
||||
{
|
||||
BN_free(sig->s);
|
||||
sig->s = NULL;
|
||||
}
|
||||
if (sig->r)
|
||||
{
|
||||
BN_free(sig->r);
|
||||
sig->r = NULL;
|
||||
}
|
||||
|
||||
fprintf(out, "Result = %c" RESP_EOL RESP_EOL, r == 1 ? 'P' : 'F');
|
||||
}
|
||||
}
|
||||
if (dsa)
|
||||
FIPS_dsa_free(dsa);
|
||||
}
|
||||
|
||||
int main(int argc,char **argv)
|
||||
#ifdef FIPS_ALGVS
|
||||
int fips_dssvs_main(int argc, char **argv)
|
||||
#else
|
||||
int main(int argc, char **argv)
|
||||
#endif
|
||||
{
|
||||
FILE *in, *out;
|
||||
if (argc == 4)
|
||||
|
@@ -166,6 +166,7 @@ int FIPS_selftest_ecdh(void)
|
||||
rv = -1;
|
||||
goto err;
|
||||
}
|
||||
EC_KEY_set_flags(ec1, EC_FLAG_COFACTOR_ECDH);
|
||||
|
||||
if (!EC_KEY_set_public_key_affine_coordinates(ec1, x, y))
|
||||
{
|
||||
@@ -194,6 +195,7 @@ int FIPS_selftest_ecdh(void)
|
||||
rv = -1;
|
||||
goto err;
|
||||
}
|
||||
EC_KEY_set_flags(ec1, EC_FLAG_COFACTOR_ECDH);
|
||||
|
||||
if (!EC_KEY_set_public_key_affine_coordinates(ec2, x, y))
|
||||
{
|
||||
|
@@ -76,7 +76,7 @@ int main(int argc, char **argv)
|
||||
|
||||
#include "fips_utl.h"
|
||||
|
||||
static const EVP_MD *parse_md(char *line)
|
||||
static const EVP_MD *eparse_md(char *line)
|
||||
{
|
||||
char *p;
|
||||
if (line[0] != '[' || line[1] != 'E')
|
||||
@@ -261,6 +261,7 @@ static void ec_output_Zhash(FILE *out, int exout, EC_GROUP *group,
|
||||
unsigned char chash[EVP_MAX_MD_SIZE];
|
||||
int Zlen;
|
||||
ec = EC_KEY_new();
|
||||
EC_KEY_set_flags(ec, EC_FLAG_COFACTOR_ECDH);
|
||||
EC_KEY_set_group(ec, group);
|
||||
peerkey = make_peer(group, cx, cy);
|
||||
if (rhash == NULL)
|
||||
@@ -301,7 +302,11 @@ static void ec_output_Zhash(FILE *out, int exout, EC_GROUP *group,
|
||||
EC_POINT_free(peerkey);
|
||||
}
|
||||
|
||||
int main(int argc,char **argv)
|
||||
#ifdef FIPS_ALGVS
|
||||
int fips_ecdhvs_main(int argc, char **argv)
|
||||
#else
|
||||
int main(int argc, char **argv)
|
||||
#endif
|
||||
{
|
||||
char **args = argv + 1;
|
||||
int argn = argc - 1;
|
||||
@@ -315,6 +320,7 @@ int main(int argc,char **argv)
|
||||
EC_GROUP *group = NULL;
|
||||
char *keyword = NULL, *value = NULL;
|
||||
int do_verify = -1, exout = 0;
|
||||
int rv = 1;
|
||||
|
||||
int curve_nids[5] = {0,0,0,0,0};
|
||||
int param_set = -1;
|
||||
@@ -408,11 +414,16 @@ int main(int argc,char **argv)
|
||||
if (group)
|
||||
EC_GROUP_free(group);
|
||||
group = EC_GROUP_new_by_curve_name(nid);
|
||||
if (!group)
|
||||
{
|
||||
fprintf(stderr, "ERROR: unsupported curve %s\n", buf + 1);
|
||||
return 1;
|
||||
}
|
||||
}
|
||||
|
||||
if (strlen(buf) > 6 && !strncmp(buf, "[E", 2))
|
||||
{
|
||||
md = parse_md(buf);
|
||||
md = eparse_md(buf);
|
||||
if (md == NULL)
|
||||
goto parse_error;
|
||||
continue;
|
||||
@@ -459,10 +470,27 @@ int main(int argc,char **argv)
|
||||
md, rhash, rhashlen);
|
||||
}
|
||||
}
|
||||
return 0;
|
||||
rv = 0;
|
||||
parse_error:
|
||||
fprintf(stderr, "Error Parsing request file\n");
|
||||
exit(1);
|
||||
if (id)
|
||||
BN_free(id);
|
||||
if (ix)
|
||||
BN_free(ix);
|
||||
if (iy)
|
||||
BN_free(iy);
|
||||
if (cx)
|
||||
BN_free(cx);
|
||||
if (cy)
|
||||
BN_free(cy);
|
||||
if (group)
|
||||
EC_GROUP_free(group);
|
||||
if (in && in != stdin)
|
||||
fclose(in);
|
||||
if (out && out != stdout)
|
||||
fclose(out);
|
||||
if (rv)
|
||||
fprintf(stderr, "Error Parsing request file\n");
|
||||
return rv;
|
||||
}
|
||||
|
||||
#endif
|
||||
|
@@ -87,3 +87,28 @@ int FIPS_ecdsa_verify_ctx(EC_KEY *key, EVP_MD_CTX *ctx, ECDSA_SIG *s)
|
||||
return ret;
|
||||
}
|
||||
|
||||
int FIPS_ecdsa_verify(EC_KEY *key, const unsigned char *msg, size_t msglen,
|
||||
const EVP_MD *mhash, ECDSA_SIG *s)
|
||||
{
|
||||
int ret=-1;
|
||||
unsigned char dig[EVP_MAX_MD_SIZE];
|
||||
unsigned int dlen;
|
||||
FIPS_digest(msg, msglen, dig, &dlen, mhash);
|
||||
ret=FIPS_ecdsa_verify_digest(key, dig, dlen, s);
|
||||
OPENSSL_cleanse(dig, dlen);
|
||||
return ret;
|
||||
}
|
||||
|
||||
ECDSA_SIG * FIPS_ecdsa_sign(EC_KEY *key,
|
||||
const unsigned char *msg, size_t msglen,
|
||||
const EVP_MD *mhash)
|
||||
{
|
||||
ECDSA_SIG *s;
|
||||
unsigned char dig[EVP_MAX_MD_SIZE];
|
||||
unsigned int dlen;
|
||||
FIPS_digest(msg, msglen, dig, &dlen, mhash);
|
||||
s = FIPS_ecdsa_sign_digest(key, dig, dlen);
|
||||
OPENSSL_cleanse(dig, dlen);
|
||||
return s;
|
||||
}
|
||||
|
||||
|
@@ -75,7 +75,7 @@ int main(int argc, char **argv)
|
||||
#include <openssl/objects.h>
|
||||
|
||||
|
||||
static int lookup_curve(char *in, char *curve_name, const EVP_MD **pmd)
|
||||
static int elookup_curve(char *in, char *curve_name, const EVP_MD **pmd)
|
||||
{
|
||||
char *cname, *p;
|
||||
/* Copy buffer as we will change it */
|
||||
@@ -200,7 +200,7 @@ static int KeyPair(FILE *in, FILE *out)
|
||||
if (*buf == '[' && buf[2] == '-')
|
||||
{
|
||||
if (buf[2] == '-')
|
||||
curve_nid = lookup_curve(buf, lbuf, NULL);
|
||||
curve_nid = elookup_curve(buf, lbuf, NULL);
|
||||
fputs(buf, out);
|
||||
continue;
|
||||
}
|
||||
@@ -260,7 +260,7 @@ static int PKV(FILE *in, FILE *out)
|
||||
fputs(buf, out);
|
||||
if (*buf == '[' && buf[2] == '-')
|
||||
{
|
||||
curve_nid = lookup_curve(buf, lbuf, NULL);
|
||||
curve_nid = elookup_curve(buf, lbuf, NULL);
|
||||
if (curve_nid == NID_undef)
|
||||
return 0;
|
||||
|
||||
@@ -287,10 +287,13 @@ static int PKV(FILE *in, FILE *out)
|
||||
no_err = 1;
|
||||
rv = EC_KEY_set_public_key_affine_coordinates(key, Qx, Qy);
|
||||
no_err = 0;
|
||||
EC_KEY_free(key);
|
||||
fprintf(out, "Result = %s" RESP_EOL, rv ? "P":"F");
|
||||
}
|
||||
|
||||
}
|
||||
BN_free(Qx);
|
||||
BN_free(Qy);
|
||||
return 1;
|
||||
}
|
||||
|
||||
@@ -305,8 +308,6 @@ static int SigGen(FILE *in, FILE *out)
|
||||
EC_KEY *key = NULL;
|
||||
ECDSA_SIG *sig = NULL;
|
||||
const EVP_MD *digest = NULL;
|
||||
EVP_MD_CTX mctx;
|
||||
EVP_MD_CTX_init(&mctx);
|
||||
Qx = BN_new();
|
||||
Qy = BN_new();
|
||||
while(fgets(buf, sizeof buf, in) != NULL)
|
||||
@@ -314,7 +315,7 @@ static int SigGen(FILE *in, FILE *out)
|
||||
fputs(buf, out);
|
||||
if (*buf == '[')
|
||||
{
|
||||
curve_nid = lookup_curve(buf, lbuf, &digest);
|
||||
curve_nid = elookup_curve(buf, lbuf, &digest);
|
||||
if (curve_nid == NID_undef)
|
||||
return 0;
|
||||
}
|
||||
@@ -342,9 +343,7 @@ static int SigGen(FILE *in, FILE *out)
|
||||
return 0;
|
||||
}
|
||||
|
||||
FIPS_digestinit(&mctx, digest);
|
||||
FIPS_digestupdate(&mctx, msg, mlen);
|
||||
sig = FIPS_ecdsa_sign_ctx(key, &mctx);
|
||||
sig = FIPS_ecdsa_sign(key, msg, mlen, digest);
|
||||
|
||||
if (!sig)
|
||||
{
|
||||
@@ -358,7 +357,7 @@ static int SigGen(FILE *in, FILE *out)
|
||||
do_bn_print_name(out, "S", sig->s);
|
||||
|
||||
EC_KEY_free(key);
|
||||
|
||||
OPENSSL_free(msg);
|
||||
FIPS_ecdsa_sig_free(sig);
|
||||
|
||||
}
|
||||
@@ -366,7 +365,6 @@ static int SigGen(FILE *in, FILE *out)
|
||||
}
|
||||
BN_free(Qx);
|
||||
BN_free(Qy);
|
||||
FIPS_md_ctx_cleanup(&mctx);
|
||||
return 1;
|
||||
}
|
||||
|
||||
@@ -381,8 +379,6 @@ static int SigVer(FILE *in, FILE *out)
|
||||
EC_KEY *key = NULL;
|
||||
ECDSA_SIG sg, *sig = &sg;
|
||||
const EVP_MD *digest = NULL;
|
||||
EVP_MD_CTX mctx;
|
||||
EVP_MD_CTX_init(&mctx);
|
||||
sig->r = NULL;
|
||||
sig->s = NULL;
|
||||
while(fgets(buf, sizeof buf, in) != NULL)
|
||||
@@ -390,7 +386,7 @@ static int SigVer(FILE *in, FILE *out)
|
||||
fputs(buf, out);
|
||||
if (*buf == '[')
|
||||
{
|
||||
curve_nid = lookup_curve(buf, lbuf, &digest);
|
||||
curve_nid = elookup_curve(buf, lbuf, &digest);
|
||||
if (curve_nid == NID_undef)
|
||||
return 0;
|
||||
}
|
||||
@@ -447,20 +443,32 @@ static int SigVer(FILE *in, FILE *out)
|
||||
return 0;
|
||||
}
|
||||
|
||||
FIPS_digestinit(&mctx, digest);
|
||||
FIPS_digestupdate(&mctx, msg, mlen);
|
||||
no_err = 1;
|
||||
rv = FIPS_ecdsa_verify_ctx(key, &mctx, sig);
|
||||
rv = FIPS_ecdsa_verify(key, msg, mlen, digest, sig);
|
||||
EC_KEY_free(key);
|
||||
if (msg)
|
||||
OPENSSL_free(msg);
|
||||
no_err = 0;
|
||||
|
||||
fprintf(out, "Result = %s" RESP_EOL, rv ? "P":"F");
|
||||
}
|
||||
|
||||
}
|
||||
if (sig->r)
|
||||
BN_free(sig->r);
|
||||
if (sig->s)
|
||||
BN_free(sig->s);
|
||||
if (Qx)
|
||||
BN_free(Qx);
|
||||
if (Qy)
|
||||
BN_free(Qy);
|
||||
return 1;
|
||||
}
|
||||
|
||||
#ifdef FIPS_ALGVS
|
||||
int fips_ecdsavs_main(int argc, char **argv)
|
||||
#else
|
||||
int main(int argc, char **argv)
|
||||
#endif
|
||||
{
|
||||
FILE *in = NULL, *out = NULL;
|
||||
const char *cmd = argv[1];
|
||||
|
@@ -81,7 +81,7 @@ static int fips_started = 0;
|
||||
static int fips_is_owning_thread(void);
|
||||
static int fips_set_owning_thread(void);
|
||||
static int fips_clear_owning_thread(void);
|
||||
static unsigned char *fips_signature_witness(void);
|
||||
static const unsigned char *fips_signature_witness(void);
|
||||
|
||||
#define fips_w_lock() CRYPTO_w_lock(CRYPTO_LOCK_FIPS)
|
||||
#define fips_w_unlock() CRYPTO_w_unlock(CRYPTO_LOCK_FIPS)
|
||||
@@ -148,6 +148,9 @@ void fips_set_selftest_fail(void)
|
||||
|
||||
extern const void *FIPS_text_start(), *FIPS_text_end();
|
||||
extern const unsigned char FIPS_rodata_start[], FIPS_rodata_end[];
|
||||
#ifdef _TMS320C6X
|
||||
const
|
||||
#endif
|
||||
unsigned char FIPS_signature [20] = { 0 };
|
||||
__fips_constseg
|
||||
static const char FIPS_hmac_key[]="etaonrishdlcupfm";
|
||||
@@ -413,9 +416,8 @@ int fips_clear_owning_thread(void)
|
||||
return ret;
|
||||
}
|
||||
|
||||
unsigned char *fips_signature_witness(void)
|
||||
const unsigned char *fips_signature_witness(void)
|
||||
{
|
||||
extern unsigned char FIPS_signature[];
|
||||
return FIPS_signature;
|
||||
}
|
||||
|
||||
|
15
fips/fips.h
15
fips/fips.h
@@ -97,9 +97,8 @@ int FIPS_selftest_rsa(void);
|
||||
int FIPS_selftest_dsa(void);
|
||||
int FIPS_selftest_ecdsa(void);
|
||||
int FIPS_selftest_ecdh(void);
|
||||
void FIPS_corrupt_drbg(void);
|
||||
void FIPS_x931_stick(void);
|
||||
void FIPS_drbg_stick(void);
|
||||
void FIPS_x931_stick(int onoff);
|
||||
void FIPS_drbg_stick(int onoff);
|
||||
int FIPS_selftest_x931(void);
|
||||
int FIPS_selftest_hmac(void);
|
||||
int FIPS_selftest_drbg(void);
|
||||
@@ -224,6 +223,16 @@ int FIPS_rsa_verify_digest(struct rsa_st *rsa,
|
||||
const struct env_md_st *mgf1Hash,
|
||||
const unsigned char *sigbuf, unsigned int siglen);
|
||||
|
||||
int FIPS_rsa_sign(struct rsa_st *rsa, const unsigned char *msg, int msglen,
|
||||
const struct env_md_st *mhash, int rsa_pad_mode,
|
||||
int saltlen, const struct env_md_st *mgf1Hash,
|
||||
unsigned char *sigret, unsigned int *siglen);
|
||||
|
||||
int FIPS_rsa_verify(struct rsa_st *rsa, const unsigned char *msg, int msglen,
|
||||
const struct env_md_st *mhash, int rsa_pad_mode,
|
||||
int saltlen, const struct env_md_st *mgf1Hash,
|
||||
const unsigned char *sigbuf, unsigned int siglen);
|
||||
|
||||
#ifdef OPENSSL_FIPSCAPABLE
|
||||
|
||||
int FIPS_digestinit(EVP_MD_CTX *ctx, const EVP_MD *type);
|
||||
|
@@ -32,8 +32,13 @@ const void *FIPS_text_end(void);
|
||||
defined(__i386__)|| defined(__i386))) || \
|
||||
(defined(__vxworks) && (defined(__ppc__) || defined(__ppc) || \
|
||||
defined(__mips__)|| defined(__mips))) || \
|
||||
(defined(__NetBSD__) && (defined(__powerpc__) || defined(__i386))) || \
|
||||
(defined(__linux) && ((defined(__PPC__) && !defined(__PPC64__)) || \
|
||||
defined(__arm__) || defined(__arm))) || \
|
||||
defined(__arm__) || defined(__arm)) || \
|
||||
defined(__mips__)) || \
|
||||
(defined(__APPLE__) /* verified on all MacOS X & iOS flavors */)|| \
|
||||
(defined(_TMS320C6X)) || \
|
||||
(defined(__ECOS__)) || \
|
||||
(defined(_WIN32) && defined(_MSC_VER))
|
||||
# define FIPS_REF_POINT_IS_CROSS_COMPILER_AWARE
|
||||
# endif
|
||||
@@ -69,6 +74,10 @@ const unsigned int FIPS_text_startX[]=
|
||||
# pragma const_seg("fipsro$a")
|
||||
# pragma const_seg()
|
||||
__declspec(allocate("fipsro$a"))
|
||||
# elif defined(_TMS320C6X)
|
||||
# pragma CODE_SECTION(instruction_pointer,".fips_text:start")
|
||||
# pragma CODE_SECTION(FIPS_ref_point,".fips_text:start")
|
||||
# pragma DATA_SECTION(FIPS_rodata_start,".fips_const:start")
|
||||
# endif
|
||||
const unsigned int FIPS_rodata_start[]=
|
||||
{ 0x46495053, 0x5f726f64, 0x6174615f, 0x73746172 };
|
||||
@@ -86,6 +95,10 @@ const unsigned int FIPS_text_endX[]=
|
||||
# pragma const_seg("fipsro$z")
|
||||
# pragma const_seg()
|
||||
__declspec(allocate("fipsro$z"))
|
||||
# elif defined(_TMS320C6X)
|
||||
# pragma CODE_SECTION(instruction_pointer,".fips_text:end")
|
||||
# pragma CODE_SECTION(FIPS_ref_point,".fips_text:end")
|
||||
# pragma DATA_SECTION(FIPS_rodata_end,".fips_const:end")
|
||||
# endif
|
||||
const unsigned int FIPS_rodata_end[]=
|
||||
{ 0x46495053, 0x5f726f64, 0x6174615f, 0x656e645b };
|
||||
|
@@ -67,8 +67,8 @@ int fips_post_failed(int id, int subid, void *ex);
|
||||
int fips_post_corrupt(int id, int subid, void *ex);
|
||||
int fips_post_status(void);
|
||||
|
||||
#define FIPS_MODULE_VERSION_NUMBER 0x20000000L
|
||||
#define FIPS_MODULE_VERSION_TEXT "FIPS 2.0-dev unvalidated test module xx XXX xxxx"
|
||||
#define FIPS_MODULE_VERSION_NUMBER 0x20000009L
|
||||
#define FIPS_MODULE_VERSION_TEXT "FIPS 2.0-rc9 unvalidated test module xx XXX xxxx"
|
||||
|
||||
#ifdef __cplusplus
|
||||
}
|
||||
|
@@ -207,7 +207,6 @@ int fips_pkey_signature_test(int id, EVP_PKEY *pkey,
|
||||
const char *fail_str)
|
||||
{
|
||||
int subid;
|
||||
void *ex = NULL;
|
||||
int ret = 0;
|
||||
unsigned char *sig = NULL;
|
||||
unsigned int siglen;
|
||||
@@ -335,7 +334,7 @@ int fips_pkey_signature_test(int id, EVP_PKEY *pkey,
|
||||
FIPSerr(FIPS_F_FIPS_PKEY_SIGNATURE_TEST,FIPS_R_TEST_FAILURE);
|
||||
if (fail_str)
|
||||
FIPS_add_error_data(2, "Type=", fail_str);
|
||||
fips_post_failed(id, subid, ex);
|
||||
fips_post_failed(id, subid, pkey);
|
||||
return 0;
|
||||
}
|
||||
return fips_post_success(id, subid, pkey);
|
||||
|
@@ -7,7 +7,7 @@
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#if defined(__unix) || defined(__unix__) || defined(__vxworks) || defined(__ANDROID__)
|
||||
#if defined(__unix) || defined(__unix__) || defined(__vxworks) || defined(__ANDROID__) || defined(__APPLE__)
|
||||
#include <unistd.h>
|
||||
#endif
|
||||
|
||||
@@ -53,6 +53,12 @@
|
||||
int lib$initialize();
|
||||
globaldef int (*lib_init_ref)() = lib$initialize;
|
||||
# pragma __standard
|
||||
#elif defined(_TMS320C6X)
|
||||
# if defined(__TI_EABI__)
|
||||
asm("\t.sect \".init_array\"\n\t.align 4\n\t.field FINGERPRINT_premain,32");
|
||||
# else
|
||||
asm("\t.sect \".pinit\"\n\t.align 4\n\t.field _FINGERPRINT_premain,32");
|
||||
# endif
|
||||
#elif 0
|
||||
The rest has to be taken care of through command line:
|
||||
|
||||
|
@@ -1 +1 @@
|
||||
HMAC-SHA1(fips_premain.c)= a401afd9c2b57f0f11d2b34b6d0c9815b1fe6a66
|
||||
HMAC-SHA1(fips_premain.c)= 65b20c3cec235cec85af848e1cd2dfdfa101804a
|
||||
|
@@ -144,11 +144,9 @@ static int FIPS_dsa_test(int bad)
|
||||
DSA *dsa = NULL;
|
||||
unsigned char dgst[] = "etaonrishdlc";
|
||||
int r = 0;
|
||||
EVP_MD_CTX mctx;
|
||||
DSA_SIG *sig = NULL;
|
||||
|
||||
ERR_clear_error();
|
||||
FIPS_md_ctx_init(&mctx);
|
||||
dsa = FIPS_dsa_new();
|
||||
if (!dsa)
|
||||
goto end;
|
||||
@@ -159,23 +157,14 @@ static int FIPS_dsa_test(int bad)
|
||||
if (bad)
|
||||
BN_add_word(dsa->pub_key, 1);
|
||||
|
||||
if (!FIPS_digestinit(&mctx, EVP_sha256()))
|
||||
goto end;
|
||||
if (!FIPS_digestupdate(&mctx, dgst, sizeof(dgst) - 1))
|
||||
goto end;
|
||||
sig = FIPS_dsa_sign_ctx(dsa, &mctx);
|
||||
sig = FIPS_dsa_sign(dsa, dgst, sizeof(dgst) -1, EVP_sha256());
|
||||
if (!sig)
|
||||
goto end;
|
||||
|
||||
if (!FIPS_digestinit(&mctx, EVP_sha256()))
|
||||
goto end;
|
||||
if (!FIPS_digestupdate(&mctx, dgst, sizeof(dgst) - 1))
|
||||
goto end;
|
||||
r = FIPS_dsa_verify_ctx(dsa, &mctx, sig);
|
||||
r = FIPS_dsa_verify(dsa, dgst, sizeof(dgst) -1, EVP_sha256(), sig);
|
||||
end:
|
||||
if (sig)
|
||||
FIPS_dsa_sig_free(sig);
|
||||
FIPS_md_ctx_cleanup(&mctx);
|
||||
if (dsa)
|
||||
FIPS_dsa_free(dsa);
|
||||
if (r != 1)
|
||||
@@ -193,11 +182,9 @@ static int FIPS_rsa_test(int bad)
|
||||
unsigned char buf[256];
|
||||
unsigned int slen;
|
||||
BIGNUM *bn;
|
||||
EVP_MD_CTX mctx;
|
||||
int r = 0;
|
||||
|
||||
ERR_clear_error();
|
||||
FIPS_md_ctx_init(&mctx);
|
||||
key = FIPS_rsa_new();
|
||||
bn = BN_new();
|
||||
if (!key || !bn)
|
||||
@@ -209,20 +196,13 @@ static int FIPS_rsa_test(int bad)
|
||||
if (bad)
|
||||
BN_add_word(key->n, 1);
|
||||
|
||||
if (!FIPS_digestinit(&mctx, EVP_sha256()))
|
||||
goto end;
|
||||
if (!FIPS_digestupdate(&mctx, input_ptext, sizeof(input_ptext) - 1))
|
||||
goto end;
|
||||
if (!FIPS_rsa_sign_ctx(key, &mctx, RSA_PKCS1_PADDING, 0, NULL, buf, &slen))
|
||||
if (!FIPS_rsa_sign(key, input_ptext, sizeof(input_ptext) - 1, EVP_sha256(),
|
||||
RSA_PKCS1_PADDING, 0, NULL, buf, &slen))
|
||||
goto end;
|
||||
|
||||
if (!FIPS_digestinit(&mctx, EVP_sha256()))
|
||||
goto end;
|
||||
if (!FIPS_digestupdate(&mctx, input_ptext, sizeof(input_ptext) - 1))
|
||||
goto end;
|
||||
r = FIPS_rsa_verify_ctx(key, &mctx, RSA_PKCS1_PADDING, 0, NULL, buf, slen);
|
||||
r = FIPS_rsa_verify(key, input_ptext, sizeof(input_ptext) - 1, EVP_sha256(),
|
||||
RSA_PKCS1_PADDING, 0, NULL, buf, slen);
|
||||
end:
|
||||
FIPS_md_ctx_cleanup(&mctx);
|
||||
if (key)
|
||||
FIPS_rsa_free(key);
|
||||
if (r != 1)
|
||||
@@ -651,6 +631,8 @@ static int Zeroize()
|
||||
for(i = 0; i < sizeof(userkey); i++) printf("%02x", userkey[i]);
|
||||
printf("\n");
|
||||
|
||||
FIPS_rsa_free(key);
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
@@ -668,6 +650,13 @@ static size_t drbg_test_cb(DRBG_CTX *ctx, unsigned char **pout,
|
||||
return (min_len + 0xf) & ~0xf;
|
||||
}
|
||||
|
||||
/* Callback which returns 0 to indicate entropy source failure */
|
||||
static size_t drbg_fail_cb(DRBG_CTX *ctx, unsigned char **pout,
|
||||
int entropy, size_t min_len, size_t max_len)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
|
||||
/* DRBG test: just generate lots of data and trigger health checks */
|
||||
|
||||
static int do_drbg_test(int type, int flags)
|
||||
@@ -696,7 +685,7 @@ static int do_drbg_test(int type, int flags)
|
||||
}
|
||||
rv = 1;
|
||||
err:
|
||||
FIPS_drbg_uninstantiate(dctx);
|
||||
FIPS_drbg_free(dctx);
|
||||
return rv;
|
||||
}
|
||||
|
||||
@@ -822,11 +811,14 @@ static int fail_id = -1;
|
||||
static int fail_sub = -1;
|
||||
static int fail_key = -1;
|
||||
|
||||
static int st_err, post_quiet = 0;
|
||||
|
||||
static int post_cb(int op, int id, int subid, void *ex)
|
||||
{
|
||||
const char *idstr, *exstr = "";
|
||||
char asctmp[20];
|
||||
int keytype = -1;
|
||||
int exp_fail = 0;
|
||||
#ifdef FIPS_POST_TIME
|
||||
static struct timespec start, end, tstart, tend;
|
||||
#endif
|
||||
@@ -938,6 +930,11 @@ static int post_cb(int op, int id, int subid, void *ex)
|
||||
|
||||
}
|
||||
|
||||
if (fail_id == id
|
||||
&& (fail_key == -1 || fail_key == keytype)
|
||||
&& (fail_sub == -1 || fail_sub == subid))
|
||||
exp_fail = 1;
|
||||
|
||||
switch(op)
|
||||
{
|
||||
case FIPS_POST_BEGIN:
|
||||
@@ -961,14 +958,22 @@ static int post_cb(int op, int id, int subid, void *ex)
|
||||
break;
|
||||
|
||||
case FIPS_POST_STARTED:
|
||||
printf("\t\t%s %s test started\n", idstr, exstr);
|
||||
if (!post_quiet && !exp_fail)
|
||||
printf("\t\t%s %s test started\n", idstr, exstr);
|
||||
#ifdef FIPS_POST_TIME
|
||||
clock_gettime(CLOCK_REALTIME, &start);
|
||||
#endif
|
||||
break;
|
||||
|
||||
case FIPS_POST_SUCCESS:
|
||||
printf("\t\t%s %s test OK\n", idstr, exstr);
|
||||
if (exp_fail)
|
||||
{
|
||||
printf("\t\t%s %s test OK but should've failed\n",
|
||||
idstr, exstr);
|
||||
st_err++;
|
||||
}
|
||||
else if (!post_quiet)
|
||||
printf("\t\t%s %s test OK\n", idstr, exstr);
|
||||
#ifdef FIPS_POST_TIME
|
||||
clock_gettime(CLOCK_REALTIME, &end);
|
||||
printf("\t\t\tTook %f seconds\n",
|
||||
@@ -978,13 +983,21 @@ static int post_cb(int op, int id, int subid, void *ex)
|
||||
break;
|
||||
|
||||
case FIPS_POST_FAIL:
|
||||
printf("\t\t%s %s test FAILED!!\n", idstr, exstr);
|
||||
if (exp_fail)
|
||||
{
|
||||
printf("\t\t%s %s test failed as expected\n",
|
||||
idstr, exstr);
|
||||
}
|
||||
else
|
||||
{
|
||||
printf("\t\t%s %s test Failed Incorrectly!!\n",
|
||||
idstr, exstr);
|
||||
st_err++;
|
||||
}
|
||||
break;
|
||||
|
||||
case FIPS_POST_CORRUPT:
|
||||
if (fail_id == id
|
||||
&& (fail_key == -1 || fail_key == keytype)
|
||||
&& (fail_sub == -1 || fail_sub == subid))
|
||||
if (exp_fail)
|
||||
{
|
||||
printf("\t\t%s %s test failure induced\n", idstr, exstr);
|
||||
return 0;
|
||||
@@ -995,14 +1008,332 @@ static int post_cb(int op, int id, int subid, void *ex)
|
||||
return 1;
|
||||
}
|
||||
|
||||
int main(int argc,char **argv)
|
||||
/* Test POST induced failures */
|
||||
|
||||
typedef struct
|
||||
{
|
||||
const char *name;
|
||||
int id, subid, keyid;
|
||||
} fail_list;
|
||||
|
||||
static fail_list flist[] =
|
||||
{
|
||||
{"Integrity", FIPS_TEST_INTEGRITY, -1, -1},
|
||||
{"AES", FIPS_TEST_CIPHER, NID_aes_128_ecb, -1},
|
||||
{"DES3", FIPS_TEST_CIPHER, NID_des_ede3_ecb, -1},
|
||||
{"AES-GCM", FIPS_TEST_GCM, -1, -1},
|
||||
{"AES-CCM", FIPS_TEST_CCM, -1, -1},
|
||||
{"AES-XTS", FIPS_TEST_XTS, -1, -1},
|
||||
{"Digest", FIPS_TEST_DIGEST, -1, -1},
|
||||
{"HMAC", FIPS_TEST_HMAC, -1, -1},
|
||||
{"CMAC", FIPS_TEST_CMAC, -1, -1},
|
||||
{"DRBG", FIPS_TEST_DRBG, -1, -1},
|
||||
{"X9.31 PRNG", FIPS_TEST_X931, -1, -1},
|
||||
{"RSA", FIPS_TEST_SIGNATURE, -1, EVP_PKEY_RSA},
|
||||
{"DSA", FIPS_TEST_SIGNATURE, -1, EVP_PKEY_DSA},
|
||||
{"ECDSA", FIPS_TEST_SIGNATURE, -1, EVP_PKEY_EC},
|
||||
{"ECDH", FIPS_TEST_ECDH, -1, -1},
|
||||
{NULL, -1, -1, -1}
|
||||
};
|
||||
|
||||
static int do_fail_all(int fullpost, int fullerr)
|
||||
{
|
||||
fail_list *ftmp;
|
||||
int rv;
|
||||
size_t i;
|
||||
RSA *rsa = NULL;
|
||||
DSA *dsa = NULL;
|
||||
DRBG_CTX *dctx = NULL, *defctx = NULL;
|
||||
EC_KEY *ec = NULL;
|
||||
BIGNUM *bn = NULL;
|
||||
unsigned char out[10];
|
||||
if (!fullpost)
|
||||
post_quiet = 1;
|
||||
if (!fullerr)
|
||||
no_err = 1;
|
||||
FIPS_module_mode_set(0, NULL);
|
||||
for (ftmp = flist; ftmp->name; ftmp++)
|
||||
{
|
||||
printf(" Testing induced failure of %s test\n", ftmp->name);
|
||||
fail_id = ftmp->id;
|
||||
fail_sub = ftmp->subid;
|
||||
fail_key = ftmp->keyid;
|
||||
rv = FIPS_module_mode_set(1, FIPS_AUTH_USER_PASS);
|
||||
if (rv)
|
||||
{
|
||||
printf("\tFIPS mode incorrectly successful!!\n");
|
||||
st_err++;
|
||||
}
|
||||
}
|
||||
printf(" Testing induced failure of RSA keygen test\n");
|
||||
/* NB POST will succeed with a pairwise test failures as
|
||||
* it is not used during POST.
|
||||
*/
|
||||
fail_id = FIPS_TEST_PAIRWISE;
|
||||
fail_key = EVP_PKEY_RSA;
|
||||
/* Now enter FIPS mode successfully */
|
||||
if (!FIPS_module_mode_set(1, FIPS_AUTH_USER_PASS))
|
||||
{
|
||||
printf("\tError entering FIPS mode\n");
|
||||
st_err++;
|
||||
}
|
||||
|
||||
rsa = FIPS_rsa_new();
|
||||
bn = BN_new();
|
||||
if (!rsa || !bn)
|
||||
return 0;
|
||||
BN_set_word(bn, 65537);
|
||||
if (RSA_generate_key_ex(rsa, 2048,bn,NULL))
|
||||
{
|
||||
printf("\tRSA key generated OK incorrectly!!\n");
|
||||
st_err++;
|
||||
}
|
||||
else
|
||||
printf("\tRSA key generation failed as expected.\n");
|
||||
|
||||
/* Leave FIPS mode to clear error */
|
||||
FIPS_module_mode_set(0, NULL);
|
||||
|
||||
printf(" Testing induced failure of DSA keygen test\n");
|
||||
fail_key = EVP_PKEY_DSA;
|
||||
/* Enter FIPS mode successfully */
|
||||
if (!FIPS_module_mode_set(1, FIPS_AUTH_USER_PASS))
|
||||
{
|
||||
printf("\tError entering FIPS mode\n");
|
||||
st_err++;
|
||||
}
|
||||
dsa = FIPS_dsa_new();
|
||||
if (!dsa)
|
||||
return 0;
|
||||
if (!DSA_generate_parameters_ex(dsa, 1024,NULL,0,NULL,NULL,NULL))
|
||||
return 0;
|
||||
if (DSA_generate_key(dsa))
|
||||
{
|
||||
printf("\tDSA key generated OK incorrectly!!\n");
|
||||
st_err++;
|
||||
}
|
||||
else
|
||||
printf("\tDSA key generation failed as expected.\n");
|
||||
|
||||
/* Leave FIPS mode to clear error */
|
||||
FIPS_module_mode_set(0, NULL);
|
||||
/* Enter FIPS mode successfully */
|
||||
if (!FIPS_module_mode_set(1, FIPS_AUTH_USER_PASS))
|
||||
{
|
||||
printf("\tError entering FIPS mode\n");
|
||||
st_err++;
|
||||
}
|
||||
|
||||
printf(" Testing induced failure of ECDSA keygen test\n");
|
||||
fail_key = EVP_PKEY_EC;
|
||||
|
||||
ec = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1);
|
||||
|
||||
if (!ec)
|
||||
return 0;
|
||||
|
||||
if (EC_KEY_generate_key(ec))
|
||||
{
|
||||
printf("\tECDSA key generated OK incorrectly!!\n");
|
||||
st_err++;
|
||||
}
|
||||
else
|
||||
printf("\tECDSA key generation failed as expected.\n");
|
||||
|
||||
FIPS_ec_key_free(ec);
|
||||
ec = NULL;
|
||||
|
||||
fail_id = -1;
|
||||
fail_sub = -1;
|
||||
fail_key = -1;
|
||||
/* Leave FIPS mode to clear error */
|
||||
FIPS_module_mode_set(0, NULL);
|
||||
/* Enter FIPS mode successfully */
|
||||
if (!FIPS_module_mode_set(1, FIPS_AUTH_USER_PASS))
|
||||
{
|
||||
printf("\tError entering FIPS mode\n");
|
||||
st_err++;
|
||||
}
|
||||
/* Induce continuous PRNG failure for DRBG */
|
||||
printf(" Testing induced failure of DRBG CPRNG test\n");
|
||||
FIPS_drbg_stick(1);
|
||||
|
||||
/* Initialise a DRBG context */
|
||||
dctx = FIPS_drbg_new(NID_sha1, 0);
|
||||
if (!dctx)
|
||||
return 0;
|
||||
for (i = 0; i < sizeof(dummy_drbg_entropy); i++)
|
||||
{
|
||||
dummy_drbg_entropy[i] = i & 0xff;
|
||||
}
|
||||
FIPS_drbg_set_callbacks(dctx, drbg_test_cb, 0, 0x10, drbg_test_cb, 0);
|
||||
if (!FIPS_drbg_instantiate(dctx, dummy_drbg_entropy, 10))
|
||||
{
|
||||
printf("\tDRBG instantiate error!!\n");
|
||||
st_err++;
|
||||
}
|
||||
if (FIPS_drbg_generate(dctx, out, sizeof(out), 0, NULL, 0))
|
||||
{
|
||||
printf("\tDRBG continuous PRNG OK incorrectly!!\n");
|
||||
st_err++;
|
||||
}
|
||||
else
|
||||
printf("\tDRBG continuous PRNG failed as expected\n");
|
||||
FIPS_drbg_stick(0);
|
||||
|
||||
/* Leave FIPS mode to clear error */
|
||||
FIPS_module_mode_set(0, NULL);
|
||||
/* Enter FIPS mode successfully */
|
||||
if (!FIPS_module_mode_set(1, FIPS_AUTH_USER_PASS))
|
||||
{
|
||||
printf("\tError entering FIPS mode\n");
|
||||
st_err++;
|
||||
}
|
||||
|
||||
FIPS_drbg_free(dctx);
|
||||
|
||||
/* Induce continuous PRNG failure for DRBG entropy source*/
|
||||
printf(" Testing induced failure of DRBG entropy CPRNG test\n");
|
||||
|
||||
/* Initialise a DRBG context */
|
||||
dctx = FIPS_drbg_new(NID_sha1, 0);
|
||||
if (!dctx)
|
||||
return 0;
|
||||
for (i = 0; i < sizeof(dummy_drbg_entropy); i++)
|
||||
{
|
||||
dummy_drbg_entropy[i] = i & 0xf;
|
||||
}
|
||||
FIPS_drbg_set_callbacks(dctx, drbg_test_cb, 0, 0x10, drbg_test_cb, 0);
|
||||
if (FIPS_drbg_instantiate(dctx, dummy_drbg_entropy, 10))
|
||||
{
|
||||
printf("\tDRBG continuous PRNG entropy OK incorrectly!!\n");
|
||||
st_err++;
|
||||
}
|
||||
else
|
||||
printf("\tDRBG continuous PRNG entropy failed as expected\n");
|
||||
/* Leave FIPS mode to clear error */
|
||||
FIPS_module_mode_set(0, NULL);
|
||||
/* Enter FIPS mode successfully */
|
||||
if (!FIPS_module_mode_set(1, FIPS_AUTH_USER_PASS))
|
||||
{
|
||||
printf("\tError entering FIPS mode\n");
|
||||
st_err++;
|
||||
}
|
||||
FIPS_drbg_free(dctx);
|
||||
|
||||
/* Leave FIPS mode to clear error */
|
||||
FIPS_module_mode_set(0, NULL);
|
||||
/* Enter FIPS mode successfully */
|
||||
if (!FIPS_module_mode_set(1, FIPS_AUTH_USER_PASS))
|
||||
{
|
||||
printf("\tError entering FIPS mode\n");
|
||||
st_err++;
|
||||
}
|
||||
|
||||
printf(" Testing induced failure of X9.31 CPRNG test\n");
|
||||
FIPS_x931_stick(1);
|
||||
if (!FIPS_x931_set_key(dummy_drbg_entropy, 32))
|
||||
{
|
||||
printf("\tError initialiasing X9.31 PRNG\n");
|
||||
st_err++;
|
||||
}
|
||||
if (!FIPS_x931_seed(dummy_drbg_entropy + 32, 16))
|
||||
{
|
||||
printf("\tError seeding X9.31 PRNG\n");
|
||||
st_err++;
|
||||
}
|
||||
if (FIPS_x931_bytes(out, 10) > 0)
|
||||
{
|
||||
printf("\tX9.31 continuous PRNG failure OK incorrectly!!\n");
|
||||
st_err++;
|
||||
}
|
||||
else
|
||||
printf("\tX9.31 continuous PRNG failed as expected\n");
|
||||
FIPS_x931_stick(0);
|
||||
|
||||
/* Leave FIPS mode to clear error */
|
||||
FIPS_module_mode_set(0, NULL);
|
||||
/* Enter FIPS mode successfully */
|
||||
if (!FIPS_module_mode_set(1, FIPS_AUTH_USER_PASS))
|
||||
{
|
||||
printf("\tError entering FIPS mode\n");
|
||||
st_err++;
|
||||
}
|
||||
|
||||
printf(" Testing operation failure with DRBG entropy failure\n");
|
||||
|
||||
/* Generate DSA key for later use */
|
||||
if (DSA_generate_key(dsa))
|
||||
printf("\tDSA key generated OK as expected.\n");
|
||||
else
|
||||
{
|
||||
printf("\tDSA key generation FAILED!!\n");
|
||||
st_err++;
|
||||
}
|
||||
|
||||
/* Initialise default DRBG context */
|
||||
defctx = FIPS_get_default_drbg();
|
||||
if (!defctx)
|
||||
return 0;
|
||||
if (!FIPS_drbg_init(defctx, NID_sha512, 0))
|
||||
return 0;
|
||||
/* Set entropy failure callback */
|
||||
FIPS_drbg_set_callbacks(defctx, drbg_fail_cb, 0, 0x10, drbg_test_cb, 0);
|
||||
if (FIPS_drbg_instantiate(defctx, dummy_drbg_entropy, 10))
|
||||
{
|
||||
printf("\tDRBG entropy fail OK incorrectly!!\n");
|
||||
st_err++;
|
||||
}
|
||||
else
|
||||
printf("\tDRBG entropy fail failed as expected\n");
|
||||
|
||||
if (FIPS_dsa_sign(dsa, dummy_drbg_entropy, 5, EVP_sha256()))
|
||||
{
|
||||
printf("\tDSA signing OK incorrectly!!\n");
|
||||
st_err++;
|
||||
}
|
||||
else
|
||||
printf("\tDSA signing failed as expected\n");
|
||||
|
||||
ec = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1);
|
||||
|
||||
if (!ec)
|
||||
return 0;
|
||||
|
||||
if (EC_KEY_generate_key(ec))
|
||||
{
|
||||
printf("\tECDSA key generated OK incorrectly!!\n");
|
||||
st_err++;
|
||||
}
|
||||
else
|
||||
printf("\tECDSA key generation failed as expected.\n");
|
||||
|
||||
printf(" Induced failure test completed with %d errors\n", st_err);
|
||||
post_quiet = 0;
|
||||
no_err = 0;
|
||||
BN_free(bn);
|
||||
FIPS_rsa_free(rsa);
|
||||
FIPS_dsa_free(dsa);
|
||||
FIPS_ec_key_free(ec);
|
||||
if (st_err)
|
||||
return 0;
|
||||
return 1;
|
||||
}
|
||||
|
||||
#ifdef FIPS_ALGVS
|
||||
int fips_test_suite_main(int argc, char **argv)
|
||||
#else
|
||||
int main(int argc, char **argv)
|
||||
#endif
|
||||
{
|
||||
char **args = argv + 1;
|
||||
int bad_rsa = 0, bad_dsa = 0;
|
||||
int do_rng_stick = 0;
|
||||
int do_drbg_stick = 0;
|
||||
int no_exit = 0;
|
||||
int no_dh = 0;
|
||||
int no_dh = 0, no_drbg = 0;
|
||||
char *pass = FIPS_AUTH_USER_PASS;
|
||||
int fullpost = 0, fullerr = 0;
|
||||
|
||||
FIPS_post_set_callback(post_cb);
|
||||
|
||||
@@ -1010,95 +1341,106 @@ int main(int argc,char **argv)
|
||||
|
||||
printf("\t%s\n\n", FIPS_module_version_text());
|
||||
|
||||
if (argv[1]) {
|
||||
while(*args) {
|
||||
/* Corrupted KAT tests */
|
||||
if (!strcmp(argv[1], "integrity")) {
|
||||
if (!strcmp(*args, "integrity")) {
|
||||
fail_id = FIPS_TEST_INTEGRITY;
|
||||
} else if (!strcmp(argv[1], "aes")) {
|
||||
} else if (!strcmp(*args, "aes")) {
|
||||
fail_id = FIPS_TEST_CIPHER;
|
||||
fail_sub = NID_aes_128_ecb;
|
||||
} else if (!strcmp(argv[1], "aes-ccm")) {
|
||||
} else if (!strcmp(*args, "aes-ccm")) {
|
||||
fail_id = FIPS_TEST_CCM;
|
||||
} else if (!strcmp(argv[1], "aes-gcm")) {
|
||||
} else if (!strcmp(*args, "aes-gcm")) {
|
||||
fail_id = FIPS_TEST_GCM;
|
||||
} else if (!strcmp(argv[1], "aes-xts")) {
|
||||
} else if (!strcmp(*args, "aes-xts")) {
|
||||
fail_id = FIPS_TEST_XTS;
|
||||
} else if (!strcmp(argv[1], "des")) {
|
||||
} else if (!strcmp(*args, "des")) {
|
||||
fail_id = FIPS_TEST_CIPHER;
|
||||
fail_sub = NID_des_ede3_ecb;
|
||||
} else if (!strcmp(argv[1], "dsa")) {
|
||||
} else if (!strcmp(*args, "dsa")) {
|
||||
fail_id = FIPS_TEST_SIGNATURE;
|
||||
fail_key = EVP_PKEY_DSA;
|
||||
} else if (!strcmp(argv[1], "ecdh")) {
|
||||
fail_id = FIPS_TEST_ECDH;
|
||||
} else if (!strcmp(argv[1], "ecdsa")) {
|
||||
} else if (!strcmp(*args, "ecdsa")) {
|
||||
fail_id = FIPS_TEST_SIGNATURE;
|
||||
fail_key = EVP_PKEY_EC;
|
||||
} else if (!strcmp(argv[1], "rsa")) {
|
||||
} else if (!strcmp(*args, "rsa")) {
|
||||
fail_id = FIPS_TEST_SIGNATURE;
|
||||
fail_key = EVP_PKEY_RSA;
|
||||
} else if (!strcmp(argv[1], "rsakey")) {
|
||||
} else if (!strcmp(*args, "rsakey")) {
|
||||
printf("RSA key generation and signature validation with corrupted key...\n");
|
||||
bad_rsa = 1;
|
||||
no_exit = 1;
|
||||
} else if (!strcmp(argv[1], "rsakeygen")) {
|
||||
} else if (!strcmp(*args, "rsakeygen")) {
|
||||
fail_id = FIPS_TEST_PAIRWISE;
|
||||
fail_key = EVP_PKEY_RSA;
|
||||
no_exit = 1;
|
||||
} else if (!strcmp(argv[1], "dsakey")) {
|
||||
} else if (!strcmp(*args, "dsakey")) {
|
||||
printf("DSA key generation and signature validation with corrupted key...\n");
|
||||
bad_dsa = 1;
|
||||
no_exit = 1;
|
||||
} else if (!strcmp(argv[1], "dsakeygen")) {
|
||||
} else if (!strcmp(*args, "dsakeygen")) {
|
||||
fail_id = FIPS_TEST_PAIRWISE;
|
||||
fail_key = EVP_PKEY_DSA;
|
||||
no_exit = 1;
|
||||
} else if (!strcmp(argv[1], "sha1")) {
|
||||
} else if (!strcmp(*args, "sha1")) {
|
||||
fail_id = FIPS_TEST_DIGEST;
|
||||
} else if (!strcmp(argv[1], "hmac")) {
|
||||
} else if (!strcmp(*args, "hmac")) {
|
||||
fail_id = FIPS_TEST_HMAC;
|
||||
} else if (!strcmp(argv[1], "cmac")) {
|
||||
} else if (!strcmp(*args, "cmac")) {
|
||||
fail_id = FIPS_TEST_CMAC;
|
||||
} else if (!strcmp(argv[1], "drbg")) {
|
||||
} else if (!strcmp(*args, "drbg")) {
|
||||
fail_id = FIPS_TEST_DRBG;
|
||||
} else if (!strcmp(argv[1], "rng")) {
|
||||
fail_id = FIPS_TEST_X931;
|
||||
} else if (!strcmp(argv[1], "nodh")) {
|
||||
} else if (!strcmp(*args, "nodrbg")) {
|
||||
no_drbg = 1;
|
||||
no_exit = 1;
|
||||
} else if (!strcmp(*args, "nodh")) {
|
||||
no_dh = 1;
|
||||
no_exit = 1;
|
||||
} else if (!strcmp(argv[1], "post")) {
|
||||
} else if (!strcmp(*args, "post")) {
|
||||
fail_id = -1;
|
||||
} else if (!strcmp(argv[1], "rngstick")) {
|
||||
} else if (!strcmp(*args, "rngstick")) {
|
||||
do_rng_stick = 1;
|
||||
no_exit = 1;
|
||||
printf("RNG test with stuck continuous test...\n");
|
||||
} else if (!strcmp(argv[1], "drbgentstick")) {
|
||||
} else if (!strcmp(*args, "drbgentstick")) {
|
||||
do_entropy_stick();
|
||||
} else if (!strcmp(argv[1], "drbgstick")) {
|
||||
} else if (!strcmp(*args, "drbgstick")) {
|
||||
do_drbg_stick = 1;
|
||||
no_exit = 1;
|
||||
printf("DRBG test with stuck continuous test...\n");
|
||||
} else if (!strcmp(argv[1], "user")) {
|
||||
} else if (!strcmp(*args, "user")) {
|
||||
pass = FIPS_AUTH_USER_PASS;
|
||||
} else if (!strcmp(argv[1], "officer")) {
|
||||
} else if (!strcmp(*args, "officer")) {
|
||||
pass = FIPS_AUTH_OFFICER_PASS;
|
||||
} else if (!strcmp(argv[1], "badpass")) {
|
||||
} else if (!strcmp(*args, "badpass")) {
|
||||
pass = "bad invalid password";
|
||||
} else if (!strcmp(argv[1], "nopass")) {
|
||||
} else if (!strcmp(*args, "nopass")) {
|
||||
pass = "";
|
||||
} else if (!strcmp(*args, "fullpost")) {
|
||||
fullpost = 1;
|
||||
no_exit = 1;
|
||||
} else if (!strcmp(*args, "fullerr")) {
|
||||
fullerr = 1;
|
||||
no_exit = 1;
|
||||
} else {
|
||||
printf("Bad argument \"%s\"\n", argv[1]);
|
||||
exit(1);
|
||||
printf("Bad argument \"%s\"\n", *args);
|
||||
return 1;
|
||||
}
|
||||
if (!no_exit) {
|
||||
args++;
|
||||
}
|
||||
|
||||
if ((argc != 1) && !no_exit) {
|
||||
fips_algtest_init_nofips();
|
||||
if (!FIPS_module_mode_set(1, pass)) {
|
||||
printf("Power-up self test failed\n");
|
||||
exit(1);
|
||||
return 1;
|
||||
}
|
||||
printf("Power-up self test successful\n");
|
||||
exit(0);
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
fips_algtest_init_nofips();
|
||||
@@ -1116,11 +1458,11 @@ int main(int argc,char **argv)
|
||||
ERR_clear_error();
|
||||
test_msg("2. Automatic power-up self test", FIPS_module_mode_set(1, pass));
|
||||
if (!FIPS_module_mode())
|
||||
exit(1);
|
||||
return 1;
|
||||
if (do_drbg_stick)
|
||||
FIPS_drbg_stick();
|
||||
FIPS_drbg_stick(1);
|
||||
if (do_rng_stick)
|
||||
FIPS_x931_stick();
|
||||
FIPS_x931_stick(1);
|
||||
|
||||
/* AES encryption/decryption
|
||||
*/
|
||||
@@ -1216,9 +1558,15 @@ int main(int argc,char **argv)
|
||||
: Fail("failed INCORRECTLY!") );
|
||||
|
||||
printf("12. DRBG generation check...\n");
|
||||
printf("\t%s\n", do_drbg_all() ? "successful as expected"
|
||||
if (no_drbg)
|
||||
printf("\tskipped\n");
|
||||
else
|
||||
printf("\t%s\n", do_drbg_all() ? "successful as expected"
|
||||
: Fail("failed INCORRECTLY!") );
|
||||
|
||||
printf("13. Induced test failure check...\n");
|
||||
printf("\t%s\n", do_fail_all(fullpost, fullerr) ? "successful as expected"
|
||||
: Fail("failed INCORRECTLY!") );
|
||||
printf("\nAll tests completed with %d errors\n", Error);
|
||||
return Error ? 1 : 0;
|
||||
}
|
||||
|
@@ -47,6 +47,9 @@
|
||||
*
|
||||
*/
|
||||
|
||||
#ifndef FIPS_UTL_H
|
||||
#define FIPS_UTL_H
|
||||
|
||||
#define OPENSSL_FIPSAPI
|
||||
|
||||
#include <openssl/fips_rand.h>
|
||||
@@ -487,3 +490,5 @@ int fips_strcasecmp(const char *str1, const char *str2)
|
||||
return fips_strncasecmp(str1, str2, (size_t)-1);
|
||||
}
|
||||
|
||||
|
||||
#endif
|
||||
|
@@ -495,6 +495,7 @@ my $onedir = 0;
|
||||
my $filter = "";
|
||||
my $tvdir;
|
||||
my $tprefix;
|
||||
my $sfprefix = "";
|
||||
my $debug = 0;
|
||||
my $quiet = 0;
|
||||
my $notest = 0;
|
||||
@@ -513,29 +514,29 @@ my $mkcmd = "mkdir";
|
||||
my $cmpall = 0;
|
||||
|
||||
my %fips_enabled = (
|
||||
dsa => 1,
|
||||
dsa2 => 2,
|
||||
"dsa" => 1,
|
||||
"dsa2" => 2,
|
||||
"dsa-pqgver" => 2,
|
||||
ecdsa => 2,
|
||||
rsa => 1,
|
||||
"ecdsa" => 2,
|
||||
"rsa" => 1,
|
||||
"rsa-pss0" => 2,
|
||||
"rsa-pss62" => 1,
|
||||
sha => 1,
|
||||
hmac => 1,
|
||||
cmac => 2,
|
||||
"sha" => 1,
|
||||
"hmac" => 1,
|
||||
"cmac" => 2,
|
||||
"rand-aes" => 1,
|
||||
"rand-des2" => 0,
|
||||
aes => 1,
|
||||
"aes" => 1,
|
||||
"aes-cfb1" => 2,
|
||||
des3 => 1,
|
||||
"des3" => 1,
|
||||
"des3-cfb1" => 2,
|
||||
drbg => 2,
|
||||
"drbg" => 2,
|
||||
"aes-ccm" => 2,
|
||||
"aes-xts" => 2,
|
||||
"aes-gcm" => 2,
|
||||
dh => 0,
|
||||
ecdh => 2,
|
||||
v2 => 1,
|
||||
"dh" => 0,
|
||||
"ecdh" => 2,
|
||||
"v2" => 1,
|
||||
);
|
||||
|
||||
foreach (@ARGV) {
|
||||
@@ -615,6 +616,9 @@ foreach (@ARGV) {
|
||||
elsif (/--script-tprefix=(.*)$/) {
|
||||
$stprefix = $1;
|
||||
}
|
||||
elsif (/--script-fprefix=(.*)$/) {
|
||||
$sfprefix = $1;
|
||||
}
|
||||
elsif (/--mkdir=(.*)$/) {
|
||||
$mkcmd = $1;
|
||||
}
|
||||
@@ -1017,6 +1021,10 @@ END
|
||||
$out =~ s|/req/(\S+)\.req|/$rspdir/$1.rsp|;
|
||||
my $outdir = $out;
|
||||
$outdir =~ s|/[^/]*$||;
|
||||
if ( !-d $outdir && ($outfile eq "" || $minimal_script)) {
|
||||
print STDERR "DEBUG: Creating directory $outdir\n" if $debug;
|
||||
mkdir($outdir) || die "Can't create directory $outdir";
|
||||
}
|
||||
if ($outfile ne "") {
|
||||
if ($win32) {
|
||||
$outdir =~ tr|/|\\|;
|
||||
@@ -1039,12 +1047,9 @@ END
|
||||
}
|
||||
$lastdir = $outdir;
|
||||
}
|
||||
} elsif ( !-d $outdir ) {
|
||||
print STDERR "DEBUG: Creating directory $outdir\n" if $debug;
|
||||
mkdir($outdir) || die "Can't create directory $outdir";
|
||||
}
|
||||
}
|
||||
my $cmd = "$tcmd \"$req\" \"$out\"";
|
||||
my $cmd = "$tcmd \"$sfprefix$req\" \"$sfprefix$out\"";
|
||||
print STDERR "DEBUG: running test $tname\n" if ( $debug && !$verify );
|
||||
if ($outfile ne "") {
|
||||
if ($minimal_script) {
|
||||
|
28
fips/fipsld
28
fips/fipsld
@@ -1,6 +1,6 @@
|
||||
#!/bin/sh -e
|
||||
#
|
||||
# Copyright (c) 2005-2007 The OpenSSL Project.
|
||||
# Copyright (c) 2005-2011 The OpenSSL Project.
|
||||
#
|
||||
# Depending on output file name, the script either embeds fingerprint
|
||||
# into libcrypto.so or static application. "Static" refers to static
|
||||
@@ -127,12 +127,15 @@ lib*|*.dll) # must be linking a shared lib...
|
||||
"${PREMAIN_C}" \
|
||||
${_WL_PREMAIN} "$@"
|
||||
|
||||
# generate signature...
|
||||
if [ -z "${FIPS_SIG}" ]; then
|
||||
SIG=`"${PREMAIN_DSO}" "${TARGET}"`
|
||||
else
|
||||
SIG=`"${FIPS_SIG}" -dso "${TARGET}"`
|
||||
if [ "x${FIPS_SIG}" != "x" ]; then
|
||||
# embed signature
|
||||
"${FIPS_SIG}" "${TARGET}"
|
||||
[ $? -ne 42 ] && exit $?
|
||||
fi
|
||||
|
||||
# generate signature...
|
||||
SIG=`"${PREMAIN_DSO}" "${TARGET}"`
|
||||
|
||||
/bin/rm -f "${TARGET}"
|
||||
if [ -z "${SIG}" ]; then
|
||||
echo "unable to collect signature"; exit 1
|
||||
@@ -172,12 +175,15 @@ lib*|*.dll) # must be linking a shared lib...
|
||||
"${PREMAIN_C}" \
|
||||
${_WL_PREMAIN} "$@"
|
||||
|
||||
# generate signature...
|
||||
if [ -z "${FIPS_SIG}" ]; then
|
||||
SIG=`"${TARGET}"`
|
||||
else
|
||||
SIG=`"${FIPS_SIG}" -exe "${TARGET}"`
|
||||
if [ "x${FIPS_SIG}" != "x" ]; then
|
||||
# embed signature
|
||||
"${FIPS_SIG}" "${TARGET}"
|
||||
[ $? -ne 42 ] && exit $?
|
||||
fi
|
||||
|
||||
# generate signature...
|
||||
SIG=`"${TARGET}"`
|
||||
|
||||
/bin/rm -f "${TARGET}"
|
||||
if [ -z "${SIG}" ]; then
|
||||
echo "unable to collect signature"; exit 1
|
||||
|
@@ -589,6 +589,7 @@
|
||||
#define AES_encrypt fips_aes_encrypt
|
||||
#define AES_set_decrypt_key fips_aes_set_decrypt_key
|
||||
#define AES_set_encrypt_key fips_aes_set_encrypt_key
|
||||
#define AES_ctr32_encrypt fips_aes_ctr32_encrypt
|
||||
#define BN_from_montgomery fips_bn_from_montgomery
|
||||
#define BN_num_bits_word FIPS_bn_num_bits_word
|
||||
#define DES_SPtrans fips_des_sptrans
|
||||
|
@@ -85,7 +85,11 @@ static int print_hmac(const EVP_MD *md, FILE *out,
|
||||
unsigned char *Key, int Klen,
|
||||
unsigned char *Msg, int Msglen, int Tlen);
|
||||
|
||||
#ifdef FIPS_ALGVS
|
||||
int fips_hmactest_main(int argc, char **argv)
|
||||
#else
|
||||
int main(int argc, char **argv)
|
||||
#endif
|
||||
{
|
||||
FILE *in = NULL, *out = NULL;
|
||||
|
||||
|
@@ -154,6 +154,8 @@ static size_t fips_get_entropy(DRBG_CTX *dctx, unsigned char **pout,
|
||||
{
|
||||
unsigned char *tout, *p;
|
||||
size_t bl = dctx->entropy_blocklen, rv;
|
||||
if (!dctx->get_entropy)
|
||||
return 0;
|
||||
if (dctx->xflags & DRBG_FLAG_TEST || !bl)
|
||||
return dctx->get_entropy(dctx, pout, entropy, min_len, max_len);
|
||||
rv = dctx->get_entropy(dctx, &tout, entropy + bl,
|
||||
@@ -241,7 +243,7 @@ int FIPS_drbg_instantiate(DRBG_CTX *dctx,
|
||||
goto end;
|
||||
}
|
||||
|
||||
if (dctx->max_nonce > 0)
|
||||
if (dctx->max_nonce > 0 && dctx->get_nonce)
|
||||
{
|
||||
noncelen = dctx->get_nonce(dctx, &nonce,
|
||||
dctx->strength / 2,
|
||||
@@ -544,9 +546,9 @@ void FIPS_drbg_set_reseed_interval(DRBG_CTX *dctx, int interval)
|
||||
|
||||
static int drbg_stick = 0;
|
||||
|
||||
void FIPS_drbg_stick(void)
|
||||
void FIPS_drbg_stick(int onoff)
|
||||
{
|
||||
drbg_stick = 1;
|
||||
drbg_stick = onoff;
|
||||
}
|
||||
|
||||
/* Continuous DRBG utility function */
|
||||
|
@@ -582,7 +582,6 @@ static int fips_drbg_error_check(DRBG_CTX *dctx, DRBG_SELFTEST_DATA *td)
|
||||
}
|
||||
|
||||
dctx->iflags &= ~DRBG_FLAG_NOERR;
|
||||
|
||||
if (!FIPS_drbg_uninstantiate(dctx))
|
||||
{
|
||||
FIPSerr(FIPS_F_FIPS_DRBG_ERROR_CHECK, FIPS_R_UNINSTANTIATE_ERROR);
|
||||
@@ -617,28 +616,20 @@ static int fips_drbg_error_check(DRBG_CTX *dctx, DRBG_SELFTEST_DATA *td)
|
||||
goto err;
|
||||
}
|
||||
|
||||
/* Explicit reseed tests */
|
||||
|
||||
/* Test explicit reseed with too large additional input */
|
||||
if (!do_drbg_init(dctx, td, &t))
|
||||
goto err;
|
||||
|
||||
dctx->iflags |= DRBG_FLAG_NOERR;
|
||||
|
||||
if (FIPS_drbg_reseed(dctx, td->adin, dctx->max_adin + 1) > 0)
|
||||
dctx->iflags &= ~DRBG_FLAG_NOERR;
|
||||
if (!FIPS_drbg_uninstantiate(dctx))
|
||||
{
|
||||
FIPSerr(FIPS_F_FIPS_DRBG_ERROR_CHECK, FIPS_R_ADDITIONAL_INPUT_ERROR_UNDETECTED);
|
||||
FIPSerr(FIPS_F_FIPS_DRBG_ERROR_CHECK, FIPS_R_UNINSTANTIATE_ERROR);
|
||||
goto err;
|
||||
}
|
||||
|
||||
/* Test explicit reseed with entropy source failure */
|
||||
|
||||
/* Check prediction resistance request fails if entropy source
|
||||
* failure.
|
||||
*/
|
||||
|
||||
t.entlen = 0;
|
||||
|
||||
dctx->iflags |= DRBG_FLAG_NOERR;
|
||||
if (FIPS_drbg_generate(dctx, randout, td->katlen, 1,
|
||||
td->adin, td->adinlen))
|
||||
{
|
||||
@@ -680,6 +671,13 @@ static int fips_drbg_error_check(DRBG_CTX *dctx, DRBG_SELFTEST_DATA *td)
|
||||
goto err;
|
||||
}
|
||||
|
||||
dctx->iflags &= ~DRBG_FLAG_NOERR;
|
||||
if (!FIPS_drbg_uninstantiate(dctx))
|
||||
{
|
||||
FIPSerr(FIPS_F_FIPS_DRBG_ERROR_CHECK, FIPS_R_UNINSTANTIATE_ERROR);
|
||||
goto err;
|
||||
}
|
||||
|
||||
/* Explicit reseed tests */
|
||||
|
||||
/* Test explicit reseed with too large additional input */
|
||||
@@ -696,11 +694,6 @@ static int fips_drbg_error_check(DRBG_CTX *dctx, DRBG_SELFTEST_DATA *td)
|
||||
|
||||
/* Test explicit reseed with entropy source failure */
|
||||
|
||||
if (!do_drbg_init(dctx, td, &t))
|
||||
goto err;
|
||||
|
||||
dctx->iflags |= DRBG_FLAG_NOERR;
|
||||
|
||||
t.entlen = 0;
|
||||
|
||||
if (FIPS_drbg_reseed(dctx, td->adin, td->adinlen) > 0)
|
||||
|
@@ -76,7 +76,7 @@ int main(int argc, char **argv)
|
||||
|
||||
#include "fips_utl.h"
|
||||
|
||||
static int parse_md(char *str)
|
||||
static int dparse_md(char *str)
|
||||
{
|
||||
switch(atoi(str + 5))
|
||||
{
|
||||
@@ -115,7 +115,7 @@ static int parse_ec(char *str)
|
||||
curve_nid = NID_secp521r1;
|
||||
else
|
||||
return NID_undef;
|
||||
md_nid = parse_md(md);
|
||||
md_nid = dparse_md(md);
|
||||
if (md_nid == NID_undef)
|
||||
return NID_undef;
|
||||
return (curve_nid << 16) | md_nid;
|
||||
@@ -170,11 +170,13 @@ static size_t test_nonce(DRBG_CTX *dctx, unsigned char **pout,
|
||||
return t->noncelen;
|
||||
}
|
||||
|
||||
|
||||
|
||||
#ifdef FIPS_ALGVS
|
||||
int fips_drbgvs_main(int argc,char **argv)
|
||||
#else
|
||||
int main(int argc,char **argv)
|
||||
#endif
|
||||
{
|
||||
FILE *in, *out;
|
||||
FILE *in = NULL, *out = NULL;
|
||||
DRBG_CTX *dctx = NULL;
|
||||
TEST_ENT t;
|
||||
int r, nid = 0;
|
||||
@@ -240,7 +242,7 @@ int main(int argc,char **argv)
|
||||
}
|
||||
if (strlen(buf) > 4 && !strncmp(buf, "[SHA-", 5))
|
||||
{
|
||||
nid = parse_md(buf);
|
||||
nid = dparse_md(buf);
|
||||
if (nid == NID_undef)
|
||||
exit(1);
|
||||
if (drbg_type == DRBG_HMAC)
|
||||
@@ -404,6 +406,10 @@ int main(int argc,char **argv)
|
||||
}
|
||||
|
||||
}
|
||||
if (in && in != stdin)
|
||||
fclose(in);
|
||||
if (out && out != stdout)
|
||||
fclose(out);
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
@@ -66,7 +66,7 @@
|
||||
#include <openssl/aes.h>
|
||||
#include <openssl/err.h>
|
||||
#include <openssl/fips_rand.h>
|
||||
#if !(defined(OPENSSL_SYS_WIN32) || defined(OPENSSL_SYS_VXWORKS))
|
||||
#if !(defined(OPENSSL_SYS_WIN32) || defined(OPENSSL_SYS_VXWORKS) || defined(OPENSSL_SYSNAME_DSPBIOS))
|
||||
# include <sys/time.h>
|
||||
#endif
|
||||
#if defined(OPENSSL_SYS_VXWORKS)
|
||||
@@ -114,9 +114,9 @@ static FIPS_PRNG_CTX sctx;
|
||||
|
||||
static int fips_prng_fail = 0;
|
||||
|
||||
void FIPS_x931_stick(void)
|
||||
void FIPS_x931_stick(int onoff)
|
||||
{
|
||||
fips_prng_fail = 1;
|
||||
fips_prng_fail = onoff;
|
||||
}
|
||||
|
||||
static void fips_rand_prng_reset(FIPS_PRNG_CTX *ctx)
|
||||
@@ -232,8 +232,13 @@ void FIPS_get_timevec(unsigned char *buf, unsigned long *pctr)
|
||||
{
|
||||
#ifdef OPENSSL_SYS_WIN32
|
||||
FILETIME ft;
|
||||
#ifdef _WIN32_WCE
|
||||
SYSTEMTIME t;
|
||||
#endif
|
||||
#elif defined(OPENSSL_SYS_VXWORKS)
|
||||
struct timespec ts;
|
||||
#elif defined(OPENSSL_SYSNAME_DSPBIOS)
|
||||
unsigned long long TSC, OPENSSL_rdtsc();
|
||||
#else
|
||||
struct timeval tv;
|
||||
#endif
|
||||
@@ -243,7 +248,12 @@ void FIPS_get_timevec(unsigned char *buf, unsigned long *pctr)
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_SYS_WIN32
|
||||
#ifdef _WIN32_WCE
|
||||
GetSystemTime(&t);
|
||||
SystemTimeToFileTime(&t, &ft);
|
||||
#else
|
||||
GetSystemTimeAsFileTime(&ft);
|
||||
#endif
|
||||
buf[0] = (unsigned char) (ft.dwHighDateTime & 0xff);
|
||||
buf[1] = (unsigned char) ((ft.dwHighDateTime >> 8) & 0xff);
|
||||
buf[2] = (unsigned char) ((ft.dwHighDateTime >> 16) & 0xff);
|
||||
@@ -262,6 +272,16 @@ void FIPS_get_timevec(unsigned char *buf, unsigned long *pctr)
|
||||
buf[5] = (unsigned char) ((ts.tv_nsec >> 8) & 0xff);
|
||||
buf[6] = (unsigned char) ((ts.tv_nsec >> 16) & 0xff);
|
||||
buf[7] = (unsigned char) ((ts.tv_nsec >> 24) & 0xff);
|
||||
#elif defined(OPENSSL_SYSNAME_DSPBIOS)
|
||||
TSC = OPENSSL_rdtsc();
|
||||
buf[0] = (unsigned char) (TSC & 0xff);
|
||||
buf[1] = (unsigned char) ((TSC >> 8) & 0xff);
|
||||
buf[2] = (unsigned char) ((TSC >> 16) & 0xff);
|
||||
buf[3] = (unsigned char) ((TSC >> 24) & 0xff);
|
||||
buf[4] = (unsigned char) ((TSC >> 32) & 0xff);
|
||||
buf[5] = (unsigned char) ((TSC >> 40) & 0xff);
|
||||
buf[6] = (unsigned char) ((TSC >> 48) & 0xff);
|
||||
buf[7] = (unsigned char) ((TSC >> 56) & 0xff);
|
||||
#else
|
||||
gettimeofday(&tv,NULL);
|
||||
buf[0] = (unsigned char) (tv.tv_sec & 0xff);
|
||||
|
@@ -129,15 +129,16 @@ static AES_PRNG_TV aes_256_tv =
|
||||
static int do_x931_test(unsigned char *key, int keylen,
|
||||
AES_PRNG_TV *tv)
|
||||
{
|
||||
unsigned char R[16];
|
||||
unsigned char R[16], V[16];
|
||||
int rv = 1;
|
||||
memcpy(V, tv->V, sizeof(V));
|
||||
if (!FIPS_x931_set_key(key, keylen))
|
||||
return 0;
|
||||
if (!fips_post_started(FIPS_TEST_X931, keylen, NULL))
|
||||
return 1;
|
||||
if (!fips_post_corrupt(FIPS_TEST_X931, keylen, NULL))
|
||||
tv->V[0]++;
|
||||
FIPS_x931_seed(tv->V, 16);
|
||||
V[0]++;
|
||||
FIPS_x931_seed(V, 16);
|
||||
FIPS_x931_set_dt(tv->DT);
|
||||
FIPS_x931_bytes(R, 16);
|
||||
if (memcmp(R, tv->R, 16))
|
||||
|
@@ -198,7 +198,11 @@ static void mct(FILE *in, FILE *out)
|
||||
}
|
||||
}
|
||||
|
||||
int main(int argc,char **argv)
|
||||
#ifdef FIPS_ALGVS
|
||||
int fips_rngvs_main(int argc, char **argv)
|
||||
#else
|
||||
int main(int argc, char **argv)
|
||||
#endif
|
||||
{
|
||||
FILE *in, *out;
|
||||
if (argc == 4)
|
||||
|
@@ -442,4 +442,33 @@ err:
|
||||
return(ret);
|
||||
}
|
||||
|
||||
int FIPS_rsa_sign(RSA *rsa, const unsigned char *msg, int msglen,
|
||||
const EVP_MD *mhash, int rsa_pad_mode, int saltlen,
|
||||
const EVP_MD *mgf1Hash,
|
||||
unsigned char *sigret, unsigned int *siglen)
|
||||
{
|
||||
unsigned int md_len, rv;
|
||||
unsigned char md[EVP_MAX_MD_SIZE];
|
||||
FIPS_digest(msg, msglen, md, &md_len, mhash);
|
||||
rv = FIPS_rsa_sign_digest(rsa, md, md_len, mhash, rsa_pad_mode,
|
||||
saltlen, mgf1Hash, sigret, siglen);
|
||||
OPENSSL_cleanse(md, md_len);
|
||||
return rv;
|
||||
}
|
||||
|
||||
|
||||
int FIPS_rsa_verify(RSA *rsa, const unsigned char *msg, int msglen,
|
||||
const EVP_MD *mhash, int rsa_pad_mode, int saltlen,
|
||||
const EVP_MD *mgf1Hash,
|
||||
const unsigned char *sigbuf, unsigned int siglen)
|
||||
{
|
||||
unsigned int md_len, rv;
|
||||
unsigned char md[EVP_MAX_MD_SIZE];
|
||||
FIPS_digest(msg, msglen, md, &md_len, mhash);
|
||||
rv = FIPS_rsa_verify_digest(rsa, md, md_len, mhash, rsa_pad_mode,
|
||||
saltlen, mgf1Hash, sigbuf, siglen);
|
||||
OPENSSL_cleanse(md, md_len);
|
||||
return rv;
|
||||
}
|
||||
|
||||
#endif
|
||||
|
@@ -88,7 +88,11 @@ static int rsa_printkey1(FILE *out, RSA *rsa,
|
||||
static int rsa_printkey2(FILE *out, RSA *rsa,
|
||||
BIGNUM *Xq1, BIGNUM *Xq2, BIGNUM *Xq);
|
||||
|
||||
#ifdef FIPS_ALGVS
|
||||
int fips_rsagtest_main(int argc, char **argv)
|
||||
#else
|
||||
int main(int argc, char **argv)
|
||||
#endif
|
||||
{
|
||||
FILE *in = NULL, *out = NULL;
|
||||
|
||||
|
@@ -85,7 +85,11 @@ static int rsa_stest(FILE *out, FILE *in, int Saltlen);
|
||||
static int rsa_printsig(FILE *out, RSA *rsa, const EVP_MD *dgst,
|
||||
unsigned char *Msg, long Msglen, int Saltlen);
|
||||
|
||||
#ifdef FIPS_ALGVS
|
||||
int fips_rsastest_main(int argc, char **argv)
|
||||
#else
|
||||
int main(int argc, char **argv)
|
||||
#endif
|
||||
{
|
||||
FILE *in = NULL, *out = NULL;
|
||||
|
||||
@@ -321,15 +325,12 @@ static int rsa_printsig(FILE *out, RSA *rsa, const EVP_MD *dgst,
|
||||
unsigned char *sigbuf = NULL;
|
||||
int i, siglen, pad_mode;
|
||||
/* EVP_PKEY structure */
|
||||
EVP_MD_CTX ctx;
|
||||
|
||||
siglen = RSA_size(rsa);
|
||||
sigbuf = OPENSSL_malloc(siglen);
|
||||
if (!sigbuf)
|
||||
goto error;
|
||||
|
||||
FIPS_md_ctx_init(&ctx);
|
||||
|
||||
if (Saltlen >= 0)
|
||||
pad_mode = RSA_PKCS1_PSS_PADDING;
|
||||
else if (Saltlen == -2)
|
||||
@@ -337,16 +338,10 @@ static int rsa_printsig(FILE *out, RSA *rsa, const EVP_MD *dgst,
|
||||
else
|
||||
pad_mode = RSA_PKCS1_PADDING;
|
||||
|
||||
if (!FIPS_digestinit(&ctx, dgst))
|
||||
goto error;
|
||||
if (!FIPS_digestupdate(&ctx, Msg, Msglen))
|
||||
goto error;
|
||||
if (!FIPS_rsa_sign_ctx(rsa, &ctx, pad_mode, Saltlen, NULL,
|
||||
if (!FIPS_rsa_sign(rsa, Msg, Msglen, dgst, pad_mode, Saltlen, NULL,
|
||||
sigbuf, (unsigned int *)&siglen))
|
||||
goto error;
|
||||
|
||||
FIPS_md_ctx_cleanup(&ctx);
|
||||
|
||||
fputs("S = ", out);
|
||||
|
||||
for (i = 0; i < siglen; i++)
|
||||
@@ -358,6 +353,9 @@ static int rsa_printsig(FILE *out, RSA *rsa, const EVP_MD *dgst,
|
||||
|
||||
error:
|
||||
|
||||
if (sigbuf)
|
||||
OPENSSL_free(sigbuf);
|
||||
|
||||
return ret;
|
||||
}
|
||||
#endif
|
||||
|
@@ -82,14 +82,18 @@ int main(int argc, char *argv[])
|
||||
|
||||
#include "fips_utl.h"
|
||||
|
||||
int rsa_test(FILE *out, FILE *in, int saltlen);
|
||||
int rsa_vtest(FILE *out, FILE *in, int saltlen);
|
||||
static int rsa_printver(FILE *out,
|
||||
BIGNUM *n, BIGNUM *e,
|
||||
const EVP_MD *dgst,
|
||||
unsigned char *Msg, long Msglen,
|
||||
unsigned char *S, long Slen, int Saltlen);
|
||||
|
||||
#ifdef FIPS_ALGVS
|
||||
int fips_rsavtest_main(int argc, char **argv)
|
||||
#else
|
||||
int main(int argc, char **argv)
|
||||
#endif
|
||||
{
|
||||
FILE *in = NULL, *out = NULL;
|
||||
|
||||
@@ -138,7 +142,7 @@ int main(int argc, char **argv)
|
||||
goto end;
|
||||
}
|
||||
|
||||
if (!rsa_test(out, in, Saltlen))
|
||||
if (!rsa_vtest(out, in, Saltlen))
|
||||
{
|
||||
fprintf(stderr, "FATAL RSAVTEST file processing error\n");
|
||||
goto end;
|
||||
@@ -159,7 +163,7 @@ int main(int argc, char **argv)
|
||||
|
||||
#define RSA_TEST_MAXLINELEN 10240
|
||||
|
||||
int rsa_test(FILE *out, FILE *in, int Saltlen)
|
||||
int rsa_vtest(FILE *out, FILE *in, int Saltlen)
|
||||
{
|
||||
char *linebuf, *olinebuf, *p, *q;
|
||||
char *keyword, *value;
|
||||
@@ -319,7 +323,6 @@ static int rsa_printver(FILE *out,
|
||||
int ret = 0, r, pad_mode;
|
||||
/* Setup RSA and EVP_PKEY structures */
|
||||
RSA *rsa_pubkey = NULL;
|
||||
EVP_MD_CTX ctx;
|
||||
unsigned char *buf = NULL;
|
||||
rsa_pubkey = FIPS_rsa_new();
|
||||
if (!rsa_pubkey)
|
||||
@@ -329,8 +332,6 @@ static int rsa_printver(FILE *out,
|
||||
if (!rsa_pubkey->n || !rsa_pubkey->e)
|
||||
goto error;
|
||||
|
||||
FIPS_md_ctx_init(&ctx);
|
||||
|
||||
if (Saltlen >= 0)
|
||||
pad_mode = RSA_PKCS1_PSS_PADDING;
|
||||
else if (Saltlen == -2)
|
||||
@@ -338,19 +339,11 @@ static int rsa_printver(FILE *out,
|
||||
else
|
||||
pad_mode = RSA_PKCS1_PADDING;
|
||||
|
||||
if (!FIPS_digestinit(&ctx, dgst))
|
||||
goto error;
|
||||
if (!FIPS_digestupdate(&ctx, Msg, Msglen))
|
||||
goto error;
|
||||
|
||||
no_err = 1;
|
||||
r = FIPS_rsa_verify_ctx(rsa_pubkey, &ctx,
|
||||
r = FIPS_rsa_verify(rsa_pubkey, Msg, Msglen, dgst,
|
||||
pad_mode, Saltlen, NULL, S, Slen);
|
||||
no_err = 0;
|
||||
|
||||
|
||||
FIPS_md_ctx_cleanup(&ctx);
|
||||
|
||||
if (r < 0)
|
||||
goto error;
|
||||
|
||||
|
@@ -86,7 +86,11 @@ static int print_dgst(const EVP_MD *md, FILE *out,
|
||||
static int print_monte(const EVP_MD *md, FILE *out,
|
||||
unsigned char *Seed, int SeedLen);
|
||||
|
||||
#ifdef FIPS_ALGVS
|
||||
int fips_shatest_main(int argc, char **argv)
|
||||
#else
|
||||
int main(int argc, char **argv)
|
||||
#endif
|
||||
{
|
||||
FILE *in = NULL, *out = NULL;
|
||||
|
||||
|
@@ -1,7 +1,10 @@
|
||||
@echo off
|
||||
rem @echo off
|
||||
|
||||
SET ASM=%1
|
||||
SET EXARG=
|
||||
SET MFILE=ntdll.mak
|
||||
|
||||
if NOT X%OSVERSION% == X goto wince
|
||||
|
||||
if NOT X%PROCESSOR_ARCHITECTURE% == X goto defined
|
||||
|
||||
@@ -42,6 +45,14 @@ SET TARGET=VC-WIN64A
|
||||
if x%ASM% == xno-asm goto compile
|
||||
SET ASM=nasm
|
||||
|
||||
goto compile
|
||||
|
||||
:wince
|
||||
|
||||
echo Auto Configuring for WinCE
|
||||
SET TARGET=VC-CE
|
||||
SET MFILE=cedll.mak
|
||||
|
||||
:compile
|
||||
|
||||
if x%ASM% == xno-asm SET EXARG=no-asm
|
||||
@@ -52,13 +63,13 @@ echo on
|
||||
|
||||
perl util\mkfiles.pl >MINFO
|
||||
@if ERRORLEVEL 1 goto error
|
||||
perl util\mk1mf.pl dll %ASM% %TARGET% >ms\ntdll.mak
|
||||
perl util\mk1mf.pl dll %ASM% %TARGET% >ms\%MFILE%
|
||||
@if ERRORLEVEL 1 goto error
|
||||
|
||||
nmake -f ms\ntdll.mak clean
|
||||
nmake -f ms\ntdll.mak
|
||||
nmake -f ms\%MFILE% clean
|
||||
nmake -f ms\%MFILE%
|
||||
@if ERRORLEVEL 1 goto error
|
||||
nmake -f ms\ntdll.mak install
|
||||
nmake -f ms\%MFILE% install
|
||||
@if ERRORLEVEL 1 goto error
|
||||
|
||||
@echo.
|
||||
|
@@ -81,6 +81,7 @@ FIPS_ECDHVS= fips_ecdhvs
|
||||
FIPS_ECDSAVS= fips_ecdsavs
|
||||
FIPS_TEST_SUITE=fips_test_suite
|
||||
FIPS_CMACTEST= fips_cmactest
|
||||
FIPS_ALGVS= fips_algvs
|
||||
|
||||
TESTS= alltests
|
||||
|
||||
@@ -119,7 +120,7 @@ OBJ= $(BNTEST).o $(ECTEST).o $(ECDSATEST).o $(ECDHTEST).o $(IDEATEST).o \
|
||||
$(FIPS_RSASTEST).o $(FIPS_RSAGTEST).o $(FIPS_GCMTEST).o \
|
||||
$(FIPS_DSSVS).o $(FIPS_DSATEST).o $(FIPS_RNGVS).o $(FIPS_DRBGVS).o \
|
||||
$(FIPS_TEST_SUITE).o $(FIPS_DHVS).o $(FIPS_ECDSAVS).o \
|
||||
$(FIPS_ECDHVS).o $(FIPS_CMACTEST).o \
|
||||
$(FIPS_ECDHVS).o $(FIPS_CMACTEST).o $(FIPS_ALGVS).o \
|
||||
$(EVPTEST).o $(IGETEST).o $(JPAKETEST).o
|
||||
SRC= $(BNTEST).c $(ECTEST).c $(ECDSATEST).c $(ECDHTEST).c $(IDEATEST).c \
|
||||
$(MD2TEST).c $(MD4TEST).c $(MD5TEST).c \
|
||||
@@ -133,7 +134,7 @@ SRC= $(BNTEST).c $(ECTEST).c $(ECDSATEST).c $(ECDHTEST).c $(IDEATEST).c \
|
||||
$(FIPS_RSASTEST).c $(FIPS_RSAGTEST).c $(FIPS_GCMTEST).c \
|
||||
$(FIPS_DSSVS).c $(FIPS_DSATEST).c $(FIPS_RNGVS).c $(FIPS_DRBGVS).c \
|
||||
$(FIPS_TEST_SUITE).c $(FIPS_DHVS).c $(FIPS_ECDSAVS).c \
|
||||
$(FIPS_ECDHVS).c $(FIPS_CMACTEST).c \
|
||||
$(FIPS_ECDHVS).c $(FIPS_CMACTEST).c $(FIPS_ALGVS).c \
|
||||
$(EVPTEST).c $(IGETEST).c $(JPAKETEST).c
|
||||
|
||||
EXHEADER=
|
||||
@@ -150,6 +151,8 @@ exe: $(EXE) $(FIPSEXE) dummytest$(EXE_EXT)
|
||||
|
||||
fipsexe: $(FIPSEXE)
|
||||
|
||||
fipsalgvs: $(FIPS_ALGVS)
|
||||
|
||||
files:
|
||||
$(PERL) $(TOP)/util/files.pl Makefile >> $(TOP)/MINFO
|
||||
|
||||
@@ -504,6 +507,9 @@ $(FIPS_TEST_SUITE)$(EXE_EXT): $(FIPS_TEST_SUITE).o $(DLIBCRYPTO)
|
||||
$(FIPS_CMACTEST)$(EXE_EXT): $(FIPS_CMACTEST).o $(DLIBCRYPTO)
|
||||
@target=$(FIPS_CMACTEST); $(FIPS_BUILD_CMD)
|
||||
|
||||
$(FIPS_ALGVS)$(EXE_EXT): $(FIPS_ALGVS).o $(DLIBCRYPTO)
|
||||
@target=$(FIPS_ALGVS); $(FIPS_BUILD_CMD)
|
||||
|
||||
$(RMDTEST)$(EXE_EXT): $(RMDTEST).o $(DLIBCRYPTO)
|
||||
@target=$(RMDTEST); $(BUILD_CMD)
|
||||
|
||||
|
357
test/fips_algvs.c
Normal file
357
test/fips_algvs.c
Normal file
@@ -0,0 +1,357 @@
|
||||
/* test/fips_algvs.c */
|
||||
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
||||
* project 2011
|
||||
*/
|
||||
/* ====================================================================
|
||||
* Copyright (c) 2011 The OpenSSL Project. All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
*
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
*
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in
|
||||
* the documentation and/or other materials provided with the
|
||||
* distribution.
|
||||
*
|
||||
* 3. All advertising materials mentioning features or use of this
|
||||
* software must display the following acknowledgment:
|
||||
* "This product includes software developed by the OpenSSL Project
|
||||
* for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
|
||||
*
|
||||
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
||||
* endorse or promote products derived from this software without
|
||||
* prior written permission. For written permission, please contact
|
||||
* licensing@OpenSSL.org.
|
||||
*
|
||||
* 5. Products derived from this software may not be called "OpenSSL"
|
||||
* nor may "OpenSSL" appear in their names without prior written
|
||||
* permission of the OpenSSL Project.
|
||||
*
|
||||
* 6. Redistributions of any form whatsoever must retain the following
|
||||
* acknowledgment:
|
||||
* "This product includes software developed by the OpenSSL Project
|
||||
* for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
||||
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
||||
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
||||
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
||||
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
* ====================================================================
|
||||
*
|
||||
* This product includes cryptographic software written by Eric Young
|
||||
* (eay@cryptsoft.com). This product includes software written by Tim
|
||||
* Hudson (tjh@cryptsoft.com).
|
||||
*
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <openssl/crypto.h>
|
||||
#include <openssl/opensslconf.h>
|
||||
|
||||
#ifndef OPENSSL_FIPS
|
||||
#include <stdio.h>
|
||||
|
||||
int main(int argc, char **argv)
|
||||
{
|
||||
printf("No FIPS ALGVS support\n");
|
||||
return 0;
|
||||
}
|
||||
#else
|
||||
|
||||
#define FIPS_ALGVS
|
||||
|
||||
extern int fips_aesavs_main(int argc, char **argv);
|
||||
extern int fips_cmactest_main(int argc, char **argv);
|
||||
extern int fips_desmovs_main(int argc, char **argv);
|
||||
extern int fips_dhvs_main(int argc, char **argv);
|
||||
extern int fips_drbgvs_main(int argc,char **argv);
|
||||
extern int fips_dssvs_main(int argc, char **argv);
|
||||
extern int fips_ecdhvs_main(int argc, char **argv);
|
||||
extern int fips_ecdsavs_main(int argc, char **argv);
|
||||
extern int fips_gcmtest_main(int argc, char **argv);
|
||||
extern int fips_hmactest_main(int argc, char **argv);
|
||||
extern int fips_rngvs_main(int argc, char **argv);
|
||||
extern int fips_rsagtest_main(int argc, char **argv);
|
||||
extern int fips_rsastest_main(int argc, char **argv);
|
||||
extern int fips_rsavtest_main(int argc, char **argv);
|
||||
extern int fips_shatest_main(int argc, char **argv);
|
||||
extern int fips_test_suite_main(int argc, char **argv);
|
||||
|
||||
#if !defined(_TMS320C6400_PLUS)
|
||||
#include "fips_aesavs.c"
|
||||
#include "fips_cmactest.c"
|
||||
#include "fips_desmovs.c"
|
||||
#include "fips_dhvs.c"
|
||||
#include "fips_drbgvs.c"
|
||||
#include "fips_dssvs.c"
|
||||
#include "fips_ecdhvs.c"
|
||||
#include "fips_ecdsavs.c"
|
||||
#include "fips_gcmtest.c"
|
||||
#include "fips_hmactest.c"
|
||||
#include "fips_rngvs.c"
|
||||
#include "fips_rsagtest.c"
|
||||
#include "fips_rsastest.c"
|
||||
#include "fips_rsavtest.c"
|
||||
#include "fips_shatest.c"
|
||||
#include "fips_test_suite.c"
|
||||
|
||||
#else
|
||||
#include "aes/fips_aesavs.c"
|
||||
#include "cmac/fips_cmactest.c"
|
||||
#include "des/fips_desmovs.c"
|
||||
#include "dh/fips_dhvs.c"
|
||||
#include "rand/fips_drbgvs.c"
|
||||
#include "dsa/fips_dssvs.c"
|
||||
#include "ecdh/fips_ecdhvs.c"
|
||||
#include "ecdsa/fips_ecdsavs.c"
|
||||
#include "aes/fips_gcmtest.c"
|
||||
#include "hmac/fips_hmactest.c"
|
||||
#include "rand/fips_rngvs.c"
|
||||
#include "rsa/fips_rsagtest.c"
|
||||
#include "rsa/fips_rsastest.c"
|
||||
#include "rsa/fips_rsavtest.c"
|
||||
#include "sha/fips_shatest.c"
|
||||
#include "fips_test_suite.c"
|
||||
|
||||
#pragma DATA_SECTION(aucCmBootDspLoad, "BootDspSection");
|
||||
volatile unsigned char aucCmBootDspLoad[8*1024];
|
||||
#endif
|
||||
|
||||
typedef struct
|
||||
{
|
||||
const char *name;
|
||||
int (*func)(int argc, char **argv);
|
||||
} ALGVS_FUNCTION;
|
||||
|
||||
static ALGVS_FUNCTION algvs[] = {
|
||||
{"fips_aesavs", fips_aesavs_main},
|
||||
{"fips_cmactest", fips_cmactest_main},
|
||||
{"fips_desmovs", fips_desmovs_main},
|
||||
{"fips_dhvs", fips_dhvs_main},
|
||||
{"fips_drbgvs", fips_drbgvs_main},
|
||||
{"fips_dssvs", fips_dssvs_main},
|
||||
{"fips_ecdhvs", fips_ecdhvs_main},
|
||||
{"fips_ecdsavs", fips_ecdsavs_main},
|
||||
{"fips_gcmtest", fips_gcmtest_main},
|
||||
{"fips_hmactest", fips_hmactest_main},
|
||||
{"fips_rngvs", fips_rngvs_main},
|
||||
{"fips_rsagtest", fips_rsagtest_main},
|
||||
{"fips_rsastest", fips_rsastest_main},
|
||||
{"fips_rsavtest", fips_rsavtest_main},
|
||||
{"fips_shatest", fips_shatest_main},
|
||||
{"fips_test_suite", fips_test_suite_main},
|
||||
{NULL, 0}
|
||||
};
|
||||
|
||||
/* Argument parsing taken from apps/apps.c */
|
||||
|
||||
typedef struct args_st
|
||||
{
|
||||
char **data;
|
||||
int count;
|
||||
} ARGS;
|
||||
|
||||
static int chopup_args(ARGS *arg, char *buf, int *argc, char **argv[])
|
||||
{
|
||||
int num,i;
|
||||
char *p;
|
||||
|
||||
*argc=0;
|
||||
*argv=NULL;
|
||||
|
||||
i=0;
|
||||
if (arg->count == 0)
|
||||
{
|
||||
arg->count=20;
|
||||
arg->data=(char **)OPENSSL_malloc(sizeof(char *)*arg->count);
|
||||
}
|
||||
for (i=0; i<arg->count; i++)
|
||||
arg->data[i]=NULL;
|
||||
|
||||
num=0;
|
||||
p=buf;
|
||||
for (;;)
|
||||
{
|
||||
/* first scan over white space */
|
||||
if (!*p) break;
|
||||
while (*p && ((*p == ' ') || (*p == '\t') || (*p == '\n')))
|
||||
p++;
|
||||
if (!*p) break;
|
||||
|
||||
/* The start of something good :-) */
|
||||
if (num >= arg->count)
|
||||
{
|
||||
fprintf(stderr, "Too many arguments!!\n");
|
||||
return 0;
|
||||
}
|
||||
arg->data[num++]=p;
|
||||
|
||||
/* now look for the end of this */
|
||||
if ((*p == '\'') || (*p == '\"')) /* scan for closing quote */
|
||||
{
|
||||
i= *(p++);
|
||||
arg->data[num-1]++; /* jump over quote */
|
||||
while (*p && (*p != i))
|
||||
p++;
|
||||
*p='\0';
|
||||
}
|
||||
else
|
||||
{
|
||||
while (*p && ((*p != ' ') &&
|
||||
(*p != '\t') && (*p != '\n')))
|
||||
p++;
|
||||
|
||||
if (*p == '\0')
|
||||
p--;
|
||||
else
|
||||
*p='\0';
|
||||
}
|
||||
p++;
|
||||
}
|
||||
*argc=num;
|
||||
*argv=arg->data;
|
||||
return(1);
|
||||
}
|
||||
|
||||
static int run_prg(int argc, char **argv)
|
||||
{
|
||||
ALGVS_FUNCTION *t;
|
||||
const char *prg_name;
|
||||
prg_name = strrchr(argv[0], '/');
|
||||
if (prg_name)
|
||||
prg_name++;
|
||||
else
|
||||
prg_name = argv[0];
|
||||
for (t = algvs; t->name; t++)
|
||||
{
|
||||
if (!strcmp(prg_name, t->name))
|
||||
return t->func(argc, argv);
|
||||
}
|
||||
return -100;
|
||||
}
|
||||
|
||||
int main(int argc, char **argv)
|
||||
{
|
||||
static char buf[1024];
|
||||
char **args = argv + 1;
|
||||
const char *sname = "fipstests.sh";
|
||||
ARGS arg;
|
||||
int xargc;
|
||||
char **xargv;
|
||||
int lineno = 0, badarg = 0;
|
||||
int nerr = 0, quiet = 0, verbose = 0;
|
||||
int rv;
|
||||
FILE *in = NULL;
|
||||
#ifdef FIPS_ALGVS_MEMCHECK
|
||||
CRYPTO_malloc_debug_init();
|
||||
OPENSSL_init();
|
||||
CRYPTO_set_mem_debug_options(V_CRYPTO_MDEBUG_ALL);
|
||||
CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON);
|
||||
#endif
|
||||
|
||||
#if defined(_TMS320C6400_PLUS)
|
||||
SysInit();
|
||||
#endif
|
||||
|
||||
if (*args && *args[0] != '-')
|
||||
{
|
||||
rv = run_prg(argc - 1, args);
|
||||
#ifdef FIPS_ALGVS_MEMCHECK
|
||||
CRYPTO_mem_leaks_fp(stderr);
|
||||
#endif
|
||||
return rv;
|
||||
}
|
||||
while (!badarg && *args && *args[0] == '-')
|
||||
{
|
||||
if (!strcmp(*args, "-script"))
|
||||
{
|
||||
if (args[1])
|
||||
{
|
||||
args++;
|
||||
sname = *args;
|
||||
}
|
||||
else
|
||||
badarg = 1;
|
||||
}
|
||||
else if (!strcmp(*args, "-quiet"))
|
||||
quiet = 1;
|
||||
else if (!strcmp(*args, "-verbose"))
|
||||
verbose = 1;
|
||||
else
|
||||
badarg = 1;
|
||||
args++;
|
||||
}
|
||||
|
||||
if (badarg)
|
||||
{
|
||||
fprintf(stderr, "Error processing arguments\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
in = fopen(sname, "r");
|
||||
if (!in)
|
||||
{
|
||||
fprintf(stderr, "Error opening script file \"%s\"\n", sname);
|
||||
return 1;
|
||||
}
|
||||
|
||||
arg.data = NULL;
|
||||
arg.count = 0;
|
||||
|
||||
while (fgets(buf, sizeof(buf), in))
|
||||
{
|
||||
lineno++;
|
||||
if (!chopup_args(&arg, buf, &xargc, &xargv))
|
||||
fprintf(stderr, "Error processing line %d\n", lineno);
|
||||
else
|
||||
{
|
||||
if (!quiet)
|
||||
{
|
||||
int i;
|
||||
int narg = verbose ? xargc : xargc - 2;
|
||||
printf("Running command line:");
|
||||
for (i = 0; i < narg; i++)
|
||||
printf(" %s", xargv[i]);
|
||||
printf("\n");
|
||||
}
|
||||
rv = run_prg(xargc, xargv);
|
||||
if (FIPS_module_mode())
|
||||
FIPS_module_mode_set(0, NULL);
|
||||
if (rv != 0)
|
||||
nerr++;
|
||||
if (rv == -100)
|
||||
fprintf(stderr, "ERROR: Command not found\n");
|
||||
else if (rv != 0)
|
||||
fprintf(stderr, "ERROR: returned %d\n", rv);
|
||||
else if (verbose)
|
||||
printf("\tCommand run successfully\n");
|
||||
}
|
||||
}
|
||||
|
||||
if (!quiet)
|
||||
printf("Completed with %d errors\n", nerr);
|
||||
|
||||
if (arg.data)
|
||||
OPENSSL_free(arg.data);
|
||||
|
||||
fclose(in);
|
||||
#ifdef FIPS_ALGVS_MEMCHECK
|
||||
CRYPTO_mem_leaks_fp(stderr);
|
||||
#endif
|
||||
if (nerr == 0)
|
||||
return 0;
|
||||
return 1;
|
||||
}
|
||||
#endif
|
32
util/fips_standalone_sha1
Normal file
32
util/fips_standalone_sha1
Normal file
@@ -0,0 +1,32 @@
|
||||
#!/usr/bin/env perl
|
||||
#
|
||||
$0 =~ m/(.*[\/\\])[^\/\\]+$/; $dir=$1;
|
||||
|
||||
unshift(@INC,$dir);
|
||||
require "hmac_sha1.pl";
|
||||
|
||||
(!@ARV[0] && -f @ARGV[$#ARGV]) || die "usage: $0 [-verify] file";
|
||||
|
||||
$verify=shift if (@ARGV[0] eq "-verify");
|
||||
|
||||
sysopen(FD,@ARGV[0],0) || die "$!";
|
||||
binmode(FD);
|
||||
|
||||
my $ctx = HMAC->Init("etaonrishdlcupfm");
|
||||
|
||||
while (read(FD,$blob,4*1024)) { $ctx->Update($blob); }
|
||||
|
||||
close(FD);
|
||||
|
||||
my $signature = unpack("H*",$ctx->Final());
|
||||
|
||||
print "HMAC-SHA1(@ARGV[0])= $signature\n";
|
||||
|
||||
if ($verify) {
|
||||
open(FD,"<@ARGV[0].sha1") || die "$!";
|
||||
$line = <FD>;
|
||||
close(FD);
|
||||
exit(0) if ($line =~ /HMAC\-SHA1\([^\)]*\)=\s*([0-9a-f]+)/i &&
|
||||
$1 eq $signature);
|
||||
die "signature mismatch";
|
||||
}
|
@@ -37,32 +37,31 @@ while (<IN>)
|
||||
last if (/assembler/)
|
||||
}
|
||||
|
||||
# Store all renames.
|
||||
# Store all renames [noting minimal length].
|
||||
my $minlen=0x10000;
|
||||
while (<IN>)
|
||||
{
|
||||
if (/^#define\s+(\w+)\s+(\w+)\b/)
|
||||
if (/^#define\s+_?(\w+)\s+_?(\w+)\b/)
|
||||
{
|
||||
$edits{$1} = $2;
|
||||
my $len = length($1);
|
||||
$minlen = $len if ($len<$minlen);
|
||||
}
|
||||
}
|
||||
|
||||
my ($from, $to);
|
||||
open(IN,"$target") || die "Can't open $target for reading";
|
||||
|
||||
#rename target temporarily
|
||||
rename($target, "tmptarg.s") || die "Can't rename $target";
|
||||
@code = <IN>; # suck in whole file
|
||||
|
||||
#edit target
|
||||
open(IN,"tmptarg.s") || die "Can't open temporary file";
|
||||
open(OUT, ">$target") || die "Can't open output file $target";
|
||||
close IN;
|
||||
|
||||
while (<IN>)
|
||||
{
|
||||
while (($from, $to) = each %edits)
|
||||
{
|
||||
s/(\b_*)$from(\b)/$1$to$2/g;
|
||||
}
|
||||
print OUT $_;
|
||||
}
|
||||
open(OUT,">$target") || die "Can't open $target for writing";
|
||||
|
||||
foreach $line (@code)
|
||||
{
|
||||
$line =~ s/\b(_?)(\w{$minlen,})\b/$1.($edits{$2} or $2)/geo;
|
||||
print OUT $line;
|
||||
}
|
||||
|
||||
close OUT;
|
||||
|
||||
@@ -73,18 +72,5 @@ if ($runasm)
|
||||
|
||||
my $rv = $?;
|
||||
|
||||
# restore target
|
||||
unlink $target;
|
||||
rename "tmptarg.s", $target;
|
||||
|
||||
die "Error executing assembler!" if $rv != 0;
|
||||
}
|
||||
else
|
||||
{
|
||||
# Don't care about target
|
||||
unlink "tmptarg.s";
|
||||
}
|
||||
|
||||
|
||||
|
||||
|
||||
|
@@ -58,7 +58,7 @@ while (<STDIN>)
|
||||
}
|
||||
else
|
||||
{
|
||||
next unless (/^(fips\/|crypto|util|test|include|ms)/);
|
||||
next unless (/^(fips\/|crypto|util|test|include|ms|c6x)/);
|
||||
}
|
||||
if (/^crypto\/([^\/]+)/)
|
||||
{
|
||||
@@ -76,7 +76,7 @@ while (<STDIN>)
|
||||
}
|
||||
if (/^test\//)
|
||||
{
|
||||
next unless /Makefile/ || /dummytest.c/;
|
||||
next unless /Makefile/ || /dummytest.c/ || /fips_algvs.c/ ;
|
||||
}
|
||||
print "$_\n";
|
||||
}
|
||||
|
@@ -27,6 +27,19 @@ if (exists $ENV{"PREMAIN_DSO_EXE"})
|
||||
$fips_premain_dso = "";
|
||||
}
|
||||
|
||||
my $fips_sig = $ENV{"FIPS_SIG"};
|
||||
if (defined $fips_sig)
|
||||
{
|
||||
if ($fips_premain_dso ne "")
|
||||
{
|
||||
$fips_premain_dso = "$fips_sig -dso";
|
||||
}
|
||||
else
|
||||
{
|
||||
$fips_premain_dso = "$fips_sig -exe";
|
||||
}
|
||||
}
|
||||
|
||||
check_hash($sha1_exe, "fips_premain.c");
|
||||
check_hash($sha1_exe, "fipscanister.lib");
|
||||
|
||||
@@ -57,7 +70,6 @@ print "$fips_cc -DHMAC_SHA1_SIG=\\\"$fips_hash\\\" $fips_cc_args $fips_libdir/fi
|
||||
system "$fips_cc -DHMAC_SHA1_SIG=\\\"$fips_hash\\\" $fips_cc_args $fips_libdir/fips_premain.c";
|
||||
die "Second stage Compile failure" if $? != 0;
|
||||
|
||||
|
||||
print "$fips_link @ARGV\n";
|
||||
system "$fips_link @ARGV";
|
||||
die "Second stage Link failure" if $? != 0;
|
||||
|
196
util/hmac_sha1.pl
Executable file
196
util/hmac_sha1.pl
Executable file
@@ -0,0 +1,196 @@
|
||||
#!/usr/bin/env perl
|
||||
#
|
||||
# Copyright (c) 2011 The OpenSSL Project.
|
||||
#
|
||||
######################################################################
|
||||
#
|
||||
# SHA1 and HMAC in Perl by <appro@openssl.org>.
|
||||
#
|
||||
{ package SHA1;
|
||||
use integer;
|
||||
|
||||
{
|
||||
################################### SHA1 block code generator
|
||||
my @V = ('$A','$B','$C','$D','$E');
|
||||
my $i;
|
||||
|
||||
sub XUpdate {
|
||||
my $ret;
|
||||
$ret="(\$T=\$W[($i-16)%16]^\$W[($i-14)%16]^\$W[($i-8)%16]^\$W[($i-3)%16],\n\t";
|
||||
if ((1<<31)<<1) {
|
||||
$ret.=" \$W[$i%16]=((\$T<<1)|(\$T>>31))&0xffffffff)\n\t ";
|
||||
} else {
|
||||
$ret.=" \$W[$i%16]=(\$T<<1)|((\$T>>31)&1))\n\t ";
|
||||
}
|
||||
}
|
||||
sub tail {
|
||||
my ($a,$b,$c,$d,$e)=@V;
|
||||
my $ret;
|
||||
if ((1<<31)<<1) {
|
||||
$ret.="(($a<<5)|($a>>27));\n\t";
|
||||
$ret.="$b=($b<<30)|($b>>2); $e&=0xffffffff; #$b&=0xffffffff;\n\t";
|
||||
} else {
|
||||
$ret.="(($a<<5)|($a>>27)&0x1f);\n\t";
|
||||
$ret.="$b=($b<<30)|($b>>2)&0x3fffffff;\n\t";
|
||||
}
|
||||
$ret;
|
||||
}
|
||||
sub BODY_00_15 {
|
||||
my ($a,$b,$c,$d,$e)=@V;
|
||||
"$e+=\$W[$i]+0x5a827999+((($c^$d)&$b)^$d)+".tail();
|
||||
}
|
||||
sub BODY_16_19 {
|
||||
my ($a,$b,$c,$d,$e)=@V;
|
||||
"$e+=".XUpdate()."+0x5a827999+((($c^$d)&$b)^$d)+".tail();
|
||||
}
|
||||
sub BODY_20_39 {
|
||||
my ($a,$b,$c,$d,$e)=@V;
|
||||
"$e+=".XUpdate()."+0x6ed9eba1+($b^$c^$d)+".tail();
|
||||
}
|
||||
sub BODY_40_59 {
|
||||
my ($a,$b,$c,$d,$e)=@V;
|
||||
"$e+=".XUpdate()."+0x8f1bbcdc+(($b&$c)|(($b|$c)&$d))+".tail();
|
||||
}
|
||||
sub BODY_60_79 {
|
||||
my ($a,$b,$c,$d,$e)=@V;
|
||||
"$e+=".XUpdate()."+0xca62c1d6+($b^$c^$d)+".tail();
|
||||
}
|
||||
|
||||
my $sha1_impl =
|
||||
'sub block {
|
||||
my $self = @_[0];
|
||||
my @W = unpack("N16",@_[1]);
|
||||
my ($A,$B,$C,$D,$E,$T) = @{$self->{H}};
|
||||
';
|
||||
|
||||
$sha1_impl.='
|
||||
$A &= 0xffffffff;
|
||||
$B &= 0xffffffff;
|
||||
' if ((1<<31)<<1);
|
||||
|
||||
for($i=0;$i<16;$i++){ $sha1_impl.=BODY_00_15(); unshift(@V,pop(@V)); }
|
||||
for(;$i<20;$i++) { $sha1_impl.=BODY_16_19(); unshift(@V,pop(@V)); }
|
||||
for(;$i<40;$i++) { $sha1_impl.=BODY_20_39(); unshift(@V,pop(@V)); }
|
||||
for(;$i<60;$i++) { $sha1_impl.=BODY_40_59(); unshift(@V,pop(@V)); }
|
||||
for(;$i<80;$i++) { $sha1_impl.=BODY_60_79(); unshift(@V,pop(@V)); }
|
||||
|
||||
$sha1_impl.='
|
||||
$self->{H}[0]+=$A; $self->{H}[1]+=$B; $self->{H}[2]+=$C;
|
||||
$self->{H}[3]+=$D; $self->{H}[4]+=$E; }';
|
||||
|
||||
#print $sha1_impl,"\n";
|
||||
eval($sha1_impl); # generate code
|
||||
}
|
||||
|
||||
sub Init {
|
||||
my $class = shift; # multiple instances...
|
||||
my $self = {};
|
||||
|
||||
bless $self,$class;
|
||||
$self->{H} = [0x67452301,0xefcdab89,0x98badcfe,0x10325476,0xc3d2e1f0];
|
||||
$self->{N} = 0;
|
||||
return $self;
|
||||
}
|
||||
|
||||
sub Update {
|
||||
my $self = shift;
|
||||
my $msg;
|
||||
|
||||
foreach $msg (@_) {
|
||||
my $len = length($msg);
|
||||
my $num = length($self->{buf});
|
||||
my $off = 0;
|
||||
|
||||
$self->{N} += $len;
|
||||
|
||||
if (($num+$len)<64)
|
||||
{ $self->{buf} .= $msg; next; }
|
||||
elsif ($num)
|
||||
{ $self->{buf} .= substr($msg,0,($off=64-$num));
|
||||
$self->block($self->{buf});
|
||||
}
|
||||
|
||||
while(($off+64) <= $len)
|
||||
{ $self->block(substr($msg,$off,64));
|
||||
$off += 64;
|
||||
}
|
||||
|
||||
$self->{buf} = substr($msg,$off);
|
||||
}
|
||||
return $self;
|
||||
}
|
||||
|
||||
sub Final {
|
||||
my $self = shift;
|
||||
my $num = length($self->{buf});
|
||||
|
||||
$self->{buf} .= chr(0x80); $num++;
|
||||
if ($num>56)
|
||||
{ $self->{buf} .= chr(0)x(64-$num);
|
||||
$self->block($self->{buf});
|
||||
$self->{buf}=undef;
|
||||
$num=0;
|
||||
}
|
||||
$self->{buf} .= chr(0)x(56-$num);
|
||||
$self->{buf} .= pack("N2",($self->{N}>>29)&0x7,$self->{N}<<3);
|
||||
$self->block($self->{buf});
|
||||
|
||||
return pack("N*",@{$self->{H}});
|
||||
}
|
||||
|
||||
sub Selftest {
|
||||
my $hash;
|
||||
|
||||
$hash=SHA1->Init()->Update('abc')->Final();
|
||||
die "SHA1 test#1" if (unpack("H*",$hash) ne 'a9993e364706816aba3e25717850c26c9cd0d89d');
|
||||
|
||||
$hash=SHA1->Init()->Update('abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq')->Final();
|
||||
die "SHA1 test#2" if (unpack("H*",$hash) ne '84983e441c3bd26ebaae4aa1f95129e5e54670f1');
|
||||
|
||||
#$hash=SHA1->Init()->Update('a'x1000000)->Final();
|
||||
#die "SHA1 test#3" if (unpack("H*",$hash) ne '34aa973cd4c4daa4f61eeb2bdbad27316534016f');
|
||||
}
|
||||
}
|
||||
|
||||
{ package HMAC;
|
||||
|
||||
sub Init {
|
||||
my $class = shift;
|
||||
my $key = shift;
|
||||
my $self = {};
|
||||
|
||||
bless $self,$class;
|
||||
|
||||
if (length($key)>64) {
|
||||
$key = SHA1->Init()->Update($key)->Final();
|
||||
}
|
||||
$key .= chr(0x00)x(64-length($key));
|
||||
|
||||
my @ikey = map($_^=0x36,unpack("C*",$key));
|
||||
($self->{hash} = SHA1->Init())->Update(pack("C*",@ikey));
|
||||
$self->{okey} = pack("C*",map($_^=0x36^0x5c,@ikey));
|
||||
|
||||
return $self;
|
||||
}
|
||||
|
||||
sub Update {
|
||||
my $self = shift;
|
||||
$self->{hash}->Update(@_);
|
||||
return $self;
|
||||
}
|
||||
|
||||
sub Final {
|
||||
my $self = shift;
|
||||
my $ihash = $self->{hash}->Final();
|
||||
return SHA1->Init()->Update($self->{okey},$ihash)->Final();
|
||||
}
|
||||
|
||||
sub Selftest {
|
||||
my $hmac;
|
||||
|
||||
$hmac = HMAC->Init('0123456789:;<=>?@ABC')->Update('Sample #2')->Final();
|
||||
die "HMAC test" if (unpack("H*",$hmac) ne '0922d3405faa3d194f82a45830737d5cc6c75d24');
|
||||
}
|
||||
}
|
||||
|
||||
1;
|
@@ -34,6 +34,7 @@
|
||||
@e_ident{magic,class,data,version,osabi,abiver,pad}=
|
||||
unpack("a4C*",$elf);
|
||||
|
||||
$!=42; # signal fipsld to revert to two-step link
|
||||
die "not ELF file" if ($e_ident{magic} ne chr(0177)."ELF");
|
||||
|
||||
my $elf_bits = $e_ident{class}*32; # 32 or 64
|
||||
@@ -377,7 +378,7 @@ $FIPS_text_endX = $exe->Lookup("FIPS_text_endX");
|
||||
if (!$legacy_mode) {
|
||||
if (!$FIPS_text_startX || !$FIPS_text_endX) {
|
||||
print STDERR "@ARGV[$#ARGV] is not cross-compiler aware.\n";
|
||||
exit(1);
|
||||
exit(42); # signal fipsld to revert to two-step link
|
||||
}
|
||||
|
||||
$FINGERPRINT_ascii_value
|
||||
|
@@ -23,6 +23,7 @@ local $fips_canister_path = "";
|
||||
my $fips_premain_dso_exe_path = "";
|
||||
my $fips_premain_c_path = "";
|
||||
my $fips_sha1_exe_path = "";
|
||||
my $fips_sha1_exe_build = 1;
|
||||
|
||||
local $fipscanisterbuild = 0;
|
||||
|
||||
@@ -248,6 +249,10 @@ elsif (($platform eq "netware-clib") || ($platform eq "netware-libc") ||
|
||||
$BSDSOCK=1 if ($platform eq "netware-libc-bsdsock") || ($platform eq "netware-clib-bsdsock");
|
||||
require 'netware.pl';
|
||||
}
|
||||
elsif ($platform eq "c64xplus")
|
||||
{
|
||||
require "TI_CGTOOLS.pl";
|
||||
}
|
||||
else
|
||||
{
|
||||
require "unix.pl";
|
||||
@@ -500,8 +505,16 @@ if ($fips)
|
||||
{
|
||||
if ($fips_sha1_exe_path eq "")
|
||||
{
|
||||
$fips_sha1_exe_path =
|
||||
"\$(BIN_D)${o}fips_standalone_sha1$exep";
|
||||
$fips_sha1_exe_path = $ENV{"FIPS_SHA1_PATH"};
|
||||
if (defined $fips_sha1_exe_path)
|
||||
{
|
||||
$fips_sha1_exe_build = 0;
|
||||
}
|
||||
else
|
||||
{
|
||||
$fips_sha1_exe_path =
|
||||
"\$(BIN_D)${o}fips_standalone_sha1$exep";
|
||||
}
|
||||
}
|
||||
}
|
||||
else
|
||||
@@ -545,7 +558,7 @@ if ($fips)
|
||||
|
||||
if ($fipscanisteronly)
|
||||
{
|
||||
$build_targets = "\$(O_FIPSCANISTER) \$(T_EXE)";
|
||||
$build_targets = "\$(O_FIPSCANISTER)";
|
||||
$libs_dep = "";
|
||||
}
|
||||
|
||||
@@ -567,9 +580,14 @@ if ($fipscanisteronly)
|
||||
\$(CP) \"fips${o}fips_premain.c.sha1\" \"\$(INSTALLTOP)${o}lib\"
|
||||
\$(CP) \"\$(INCO_D)${o}fips.h\" \"\$(INSTALLTOP)${o}include${o}openssl\"
|
||||
\$(CP) \"\$(INCO_D)${o}fips_rand.h\" \"\$(INSTALLTOP)${o}include${o}openssl\"
|
||||
\$(CP) "\$(BIN_D)${o}fips_standalone_sha1$exep" \"\$(INSTALLTOP)${o}bin\"
|
||||
\$(CP) \"util${o}fipslink.pl\" \"\$(INSTALLTOP)${o}bin\"
|
||||
EOF
|
||||
if ($fips_sha1_exe_build)
|
||||
{
|
||||
$extra_install .= <<"EOF";
|
||||
\$(CP) "\$(BIN_D)${o}fips_standalone_sha1$exep" \"\$(INSTALLTOP)${o}bin\"
|
||||
EOF
|
||||
}
|
||||
}
|
||||
elsif ($shlib)
|
||||
{
|
||||
@@ -716,7 +734,7 @@ LIBS_DEP=$libs_dep
|
||||
EOF
|
||||
|
||||
$rules=<<"EOF";
|
||||
all: banner \$(TMP_D) \$(BIN_D) \$(TEST_D) \$(LIB_D) \$(INCO_D) headers \$(FIPS_SHA1_EXE) $build_targets
|
||||
all: banner \$(TMP_D) \$(BIN_D) \$(TEST_D) \$(LIB_D) \$(INCO_D) headers $build_targets
|
||||
|
||||
banner:
|
||||
$banner
|
||||
@@ -744,7 +762,11 @@ headers: \$(HEADER) \$(EXHEADER)
|
||||
|
||||
lib: \$(LIBS_DEP) \$(E_SHLIB)
|
||||
|
||||
exe: \$(T_EXE) \$(BIN_D)$o\$(E_EXE)$exep
|
||||
exe: \$(BIN_D)$o\$(E_EXE)$exep
|
||||
|
||||
build_tests: \$(T_EXE)
|
||||
|
||||
build_algvs: \$(T_SRC) \$(BIN_D)${o}fips_algvs$exep
|
||||
|
||||
install: all
|
||||
\$(MKDIR) \"\$(INSTALLTOP)\"
|
||||
@@ -846,6 +868,9 @@ if ($fips)
|
||||
$rules.=&cc_compile_target("\$(OBJ_D)${o}\$(E_PREMAIN_DSO)$obj",
|
||||
"fips${o}fips_premain.c",
|
||||
"-DFINGERPRINT_PREMAIN_DSO_LOAD \$(SHLIB_CFLAGS)");
|
||||
$rules.=&cc_compile_target("\$(OBJ_D)${o}fips_algvs$obj",
|
||||
"test${o}fips_algvs.c",
|
||||
"\$(SHLIB_CFLAGS)");
|
||||
}
|
||||
|
||||
foreach (values %lib_nam)
|
||||
@@ -878,6 +903,7 @@ EOF
|
||||
}
|
||||
|
||||
$defs.=&do_defs("T_EXE",$test,"\$(TEST_D)",$exep);
|
||||
$defs.=&do_defs("T_SRC",$test,"\$(TMP_D)",".c");
|
||||
foreach (split(/\s+/,$test))
|
||||
{
|
||||
my $t_libs;
|
||||
@@ -899,8 +925,11 @@ foreach (split(/\s+/,$test))
|
||||
|
||||
$tt="\$(OBJ_D)${o}$t${obj}";
|
||||
$rules.=&do_link_rule("\$(TEST_D)$o$t$exep",$tt,"\$(LIBS_DEP)","$t_libs \$(EX_LIBS)", $ltype);
|
||||
$rules.=&do_copy_rule("\$(TMP_D)",$_,".c");
|
||||
}
|
||||
|
||||
$rules.=&do_link_rule("\$(TEST_D)${o}fips_algvs$exep","\$(OBJ_D)${o}fips_algvs$obj","\$(LIBS_DEP)","\$(O_FIPSCANISTER) \$(EX_LIBS)", 2) if $fips;
|
||||
|
||||
$defs.=&do_defs("E_SHLIB",$engines . $otherlibs,"\$(ENG_D)",$shlibp);
|
||||
|
||||
foreach (split(/\s+/,$engines))
|
||||
@@ -955,20 +984,20 @@ if ($fips)
|
||||
"\$(OBJ_D)${o}fips_start$obj",
|
||||
"\$(FIPSOBJ)",
|
||||
"\$(OBJ_D)${o}fips_end$obj",
|
||||
"\$(FIPS_SHA1_EXE)", "");
|
||||
"");
|
||||
# FIXME
|
||||
$rules.=&do_link_rule("\$(FIPS_SHA1_EXE)",
|
||||
"\$(OBJ_D)${o}fips_standalone_sha1$obj \$(OBJ_D)${o}sha1dgst$obj $sha1_asm_obj",
|
||||
"","\$(EX_LIBS)", 1);
|
||||
"","\$(EX_LIBS)", 1) if $fips_sha1_exe_build;
|
||||
}
|
||||
else
|
||||
{
|
||||
$rules.=&do_link_rule("\$(FIPS_SHA1_EXE)",
|
||||
"\$(OBJ_D)${o}fips_standalone_sha1$obj \$(O_FIPSCANISTER)",
|
||||
"","", 1);
|
||||
"","", 1) if $fips_sha1_exe_build;
|
||||
|
||||
}
|
||||
$rules.=&do_link_rule("\$(PREMAIN_DSO_EXE)","\$(OBJ_D)${o}\$(E_PREMAIN_DSO)$obj \$(CRYPTOOBJ) \$(O_FIPSCANISTER)","","\$(EX_LIBS)", 1);
|
||||
$rules.=&do_link_rule("\$(PREMAIN_DSO_EXE)","\$(OBJ_D)${o}\$(E_PREMAIN_DSO)$obj \$(CRYPTOOBJ) \$(O_FIPSCANISTER)","","\$(EX_LIBS)", 1) unless defined $ENV{"FIPS_SIG"};
|
||||
|
||||
}
|
||||
|
||||
@@ -1192,6 +1221,10 @@ sub do_compile_rule
|
||||
{
|
||||
$ret.=&Sasm_compile_target("$to${o}$n$obj",$s,$n);
|
||||
}
|
||||
elsif (-f ($s="${d}${o}asm${o}${n}.asm"))
|
||||
{
|
||||
$ret.=&cc_compile_target("$to${o}$n$obj","$s",$ex);
|
||||
}
|
||||
else { die "no rule for $_"; }
|
||||
}
|
||||
return($ret);
|
||||
|
@@ -52,6 +52,7 @@ my $to = join('/', @to_path);
|
||||
my $file;
|
||||
$symlink_exists=eval {symlink("",""); 1};
|
||||
if ($^O eq "msys") { $symlink_exists=0 };
|
||||
if ($^O eq "MSWin32") { $symlink_exists=0 };
|
||||
foreach $file (@files) {
|
||||
my $err = "";
|
||||
if ($symlink_exists) {
|
||||
|
169
util/msincore
Executable file
169
util/msincore
Executable file
@@ -0,0 +1,169 @@
|
||||
#!/usr/bin/env perl
|
||||
#
|
||||
# Copyright (c) 2012 The OpenSSL Project.
|
||||
#
|
||||
# The script embeds fingerprint into Microsoft PE-COFF executable object.
|
||||
|
||||
$0 =~ m/(.*[\/\\])[^\/\\]+$/; $dir=$1;
|
||||
|
||||
unshift(@INC,$dir);
|
||||
require "hmac_sha1.pl";
|
||||
|
||||
######################################################################
|
||||
#
|
||||
# PE-COFF segment table parser by <appro@openssl.org>.
|
||||
#
|
||||
{ package PECOFF;
|
||||
use FileHandle;
|
||||
|
||||
sub dup { my %copy=map {$_} @_; return \%copy; }
|
||||
|
||||
sub Load {
|
||||
my $class = shift;
|
||||
my $self = {};
|
||||
my $FD = FileHandle->new(); # autoclose
|
||||
my $file = shift;
|
||||
|
||||
bless $self,$class;
|
||||
|
||||
sysopen($FD,$file,0) or die "$!";
|
||||
binmode($FD);
|
||||
|
||||
#################################################
|
||||
# read IMAGE_DOS_HEADER
|
||||
#
|
||||
read($FD,my $mz,64) or die "$!";
|
||||
my @dos_header=unpack("a2C58V",$mz);
|
||||
|
||||
$!=42; # signal fipsld to revert to two-step link
|
||||
die "$file is not PE-COFF image" if (@dos_header[0] ne "MZ");
|
||||
|
||||
my $e_lfanew=pop(@dos_header);
|
||||
seek($FD,$e_lfanew,0) or die "$!";
|
||||
read($FD,my $magic,4) or die "$!";
|
||||
|
||||
$!=42; # signal fipsld to revert to two-step link
|
||||
die "$file is not PE-COFF image" if (unpack("V",$magic)!=0x4550);
|
||||
|
||||
#################################################
|
||||
# read and parse COFF header...
|
||||
#
|
||||
read($FD,my $coff,20) or die "$!";
|
||||
|
||||
my %coff_header;
|
||||
@coff_header{machine,nsects,date,syms_off,nsyms,opt,flags}=
|
||||
unpack("v2V3v2",$coff);
|
||||
|
||||
my $strings;
|
||||
my $symsize;
|
||||
|
||||
#################################################
|
||||
# load strings table
|
||||
#
|
||||
if ($coff_header{syms_off}) {
|
||||
seek($FD,$coff_header{syms_off}+18*$coff_header{nsyms},0) or die "$!";
|
||||
read($FD,$strings,4) or die "$!";
|
||||
$symsize = unpack("V",$strings);
|
||||
read($FD,$strings,$symsize,4) or die "$!";
|
||||
}
|
||||
|
||||
#################################################
|
||||
# read sections
|
||||
#
|
||||
my $i;
|
||||
|
||||
# seek to section headers
|
||||
seek($FD,$e_lfanew+24+@coff_header{opt},0) or die "$!";
|
||||
|
||||
for ($i=0;$i<$coff_header{nsects};$i++) {
|
||||
my %coff_shdr;
|
||||
my $name;
|
||||
|
||||
read($FD,my $section,40) or die "$!";
|
||||
|
||||
@coff_shdr{sh_name,sh_vsize,sh_vaddr,
|
||||
sh_rawsize,sh_offset,sh_relocs,sh_lines,
|
||||
sh_nrelocls,sh_nlines,sh_flags} =
|
||||
unpack("a8V6v2V",$section);
|
||||
|
||||
$name = $coff_shdr{sh_name};
|
||||
# see if sh_name is an offset in $strings
|
||||
my ($hi,$lo) = unpack("V2",$name);
|
||||
if ($hi==0 && $lo<$symsize) {
|
||||
$name = substr($strings,$lo,64);
|
||||
}
|
||||
$name = (split(chr(0),$name))[0];
|
||||
$coff_shdr{sh_name} = $name;
|
||||
|
||||
$self->{sections}{$name} = dup(%coff_shdr);
|
||||
}
|
||||
|
||||
return $self;
|
||||
}
|
||||
|
||||
sub Lookup {
|
||||
my $self = shift;
|
||||
my $name = shift;
|
||||
return $self->{sections}{$name};
|
||||
}
|
||||
}
|
||||
|
||||
######################################################################
|
||||
#
|
||||
# main()
|
||||
#
|
||||
my $legacy_mode;
|
||||
|
||||
if ($#ARGV<0 || ($#ARGV>0 && !($legacy_mode=(@ARGV[0] =~ /^\-(dso|exe)$/)))) {
|
||||
print STDERR "usage: $0 [-dso|-exe] pe-coff-binary\n";
|
||||
exit(1);
|
||||
}
|
||||
|
||||
$exe = PECOFF->Load(@ARGV[$#ARGV]);
|
||||
|
||||
sysopen(FD,@ARGV[$#ARGV],$legacy_mode?0:2) or die "$!"; # 2 is read/write
|
||||
binmode(FD);
|
||||
|
||||
sub FIPS_incore_fingerprint {
|
||||
my $ctx = HMAC->Init("etaonrishdlcupfm");
|
||||
my ($beg,$end);
|
||||
my $sect;
|
||||
|
||||
$sect = $exe->Lookup("fipstx") or die "no fipstx section";
|
||||
|
||||
seek(FD,$sect->{sh_offset},0) or die "$!";
|
||||
read(FD,$blob,$sect->{sh_vsize}) or die "$!";
|
||||
|
||||
($beg = index($blob,"SPIFxet_ts_tXtra")) >= 0
|
||||
or die "no FIPS_text_startX";
|
||||
($end = rindex($blob,"SPIFxet_ne_t][Xd")) >= 0
|
||||
or die "no FIPS_text_endX";
|
||||
|
||||
$ctx->Update(substr($blob,$beg,$end-$beg));
|
||||
|
||||
$sect = $exe->Lookup("fipsro") or die "no fipsro section";
|
||||
|
||||
seek(FD,$sect->{sh_offset},0) or die "$!";
|
||||
read(FD,$blob,$sect->{sh_vsize}) or die "$!";
|
||||
|
||||
($beg = index($blob,"SPIFdor__atarats",40)) >= 0
|
||||
or die "no FIPS_rodata_start";
|
||||
($end = rindex($blob,"SPIFdor__ata[dne")) >= 0
|
||||
or die "no FIPS_rodata_end";
|
||||
|
||||
$ctx->Update(substr($blob,$beg,$end-$beg));
|
||||
|
||||
return $ctx->Final();
|
||||
}
|
||||
|
||||
$fingerprint = FIPS_incore_fingerprint();
|
||||
|
||||
if ($legacy_mode) {
|
||||
print unpack("H*",$fingerprint);
|
||||
} else {
|
||||
my $sect = $exe->Lookup("fipsro");
|
||||
seek(FD,$sect->{sh_offset},0) or die "$!";
|
||||
print FD unpack("H*",$fingerprint) or die "$!";
|
||||
}
|
||||
|
||||
close (FD);
|
274
util/pl/TI_CGTOOLS.pl
Normal file
274
util/pl/TI_CGTOOLS.pl
Normal file
@@ -0,0 +1,274 @@
|
||||
#!/usr/local/bin/perl
|
||||
#
|
||||
# TI_CGTOOLS.pl, Texas Instruments CGTOOLS under Unix or MSYS.
|
||||
#
|
||||
|
||||
$ssl= "ssl";
|
||||
$crypto="crypto";
|
||||
|
||||
if ($fips && !$shlib)
|
||||
{
|
||||
$crypto="fips";
|
||||
$crypto_compat = "cryptocompat.lib";
|
||||
}
|
||||
else
|
||||
{
|
||||
$crypto="crypto";
|
||||
}
|
||||
|
||||
if ($fipscanisterbuild)
|
||||
{
|
||||
$fips_canister_path = "\$(LIB_D)/fipscanister.obj";
|
||||
}
|
||||
|
||||
$o='/';
|
||||
$cp='cp';
|
||||
$cp2='$(PERL) util/copy.pl -stripcr';
|
||||
$mkdir='$(PERL) util/mkdir-p.pl';
|
||||
$rm='rm -f';
|
||||
|
||||
$zlib_lib="zlib1.lib";
|
||||
|
||||
# Santize -L options for ms link
|
||||
$l_flags =~ s/-L("\[^"]+")/\/libpath:$1/g;
|
||||
$l_flags =~ s/-L(\S+)/\/libpath:$1/g;
|
||||
|
||||
# C compiler stuff
|
||||
$cc='cl6x';
|
||||
$base_cflags= " $mf_cflag";
|
||||
my $f;
|
||||
$opt_cflags='';
|
||||
$dbg_cflags=$f.' -g -DDEBUG -D_DEBUG';
|
||||
$lflags='';
|
||||
|
||||
*::cc_compile_target = sub {
|
||||
my ($target,$source,$ex_flags)=@_;
|
||||
my $ret;
|
||||
|
||||
$ex_flags.=" -DMK1MF_BUILD" if ($source =~/cversion/);
|
||||
$ret ="$target: \$(SRC_D)$o$source\n\t";
|
||||
if ($fipscanisterbuild && $source=~/\.asm$/) {
|
||||
$ret.="\$(PERL) util${o}fipsas.pl . \$< norunasm \$(CFLAG)\n\t";
|
||||
}
|
||||
$ret.="\$(CC) --obj_directory=\$(OBJ_D) $ex_flags -c \$(SRC_D)$o$source\n";
|
||||
$target =~ s/.*${o}([^${o}]+)/$1/;
|
||||
$source =~ s/.*${o}([^${o}\.]+)\..*/$1${obj}/;
|
||||
$ret.="\tmv \$(OBJ_D)${o}$source \$(OBJ_D)${o}$target\n" if ($target ne $source);
|
||||
$ret.="\n";
|
||||
return($ret);
|
||||
};
|
||||
*::perlasm_compile_target = sub {
|
||||
my ($target,$source,$bname)=@_;
|
||||
my $ret;
|
||||
|
||||
$bname =~ s/(.*)\.[^\.]$/$1/;
|
||||
$ret=<<___;
|
||||
\$(TMP_D)$o$bname.asm: $source
|
||||
\$(PERL) $source \$\@
|
||||
___
|
||||
$ret .= "\t\$(PERL) util${o}fipsas.pl . \$@ norunasm \$(CFLAG)\n" if $fipscanisterbuild;
|
||||
|
||||
$ret.=<<___;
|
||||
|
||||
$target: \$(TMP_D)$o$bname.asm
|
||||
\$(ASM) --obj_directory=\$(OBJ_D) \$(TMP_D)$o$bname.asm
|
||||
|
||||
___
|
||||
};
|
||||
|
||||
$mlflags='';
|
||||
|
||||
$out_def ="c6x";
|
||||
$tmp_def ="$out_def/tmp";
|
||||
$inc_def="$out_def/inc";
|
||||
|
||||
if ($debug)
|
||||
{
|
||||
$cflags=$dbg_cflags.$base_cflags;
|
||||
}
|
||||
else
|
||||
{
|
||||
$cflags=$opt_cflags.$base_cflags;
|
||||
}
|
||||
|
||||
$obj='.obj';
|
||||
$asm_suffix='.asm';
|
||||
$ofile="";
|
||||
|
||||
# EXE linking stuff
|
||||
$link='$(CC) -z';
|
||||
$efile="-o ";
|
||||
$exep='.out';
|
||||
$ex_libs='';
|
||||
|
||||
# static library stuff
|
||||
$mklib='ar6x';
|
||||
$ranlib='';
|
||||
$plib="";
|
||||
$libp=".lib";
|
||||
$shlibp=($shlib)?".dll":".lib";
|
||||
$lfile='-o ';
|
||||
|
||||
$shlib_ex_obj="";
|
||||
$asm='$(CC) $(CFLAG) -c';
|
||||
|
||||
$bn_asm_obj='';
|
||||
$bn_asm_src='';
|
||||
$des_enc_obj='';
|
||||
$des_enc_src='';
|
||||
$bf_enc_obj='';
|
||||
$bf_enc_src='';
|
||||
|
||||
if (!$no_asm)
|
||||
{
|
||||
import_asm($mf_bn_asm, "bn", \$bn_asm_obj, \$bn_asm_src);
|
||||
import_asm($mf_aes_asm, "aes", \$aes_asm_obj, \$aes_asm_src);
|
||||
import_asm($mf_des_asm, "des", \$des_enc_obj, \$des_enc_src);
|
||||
import_asm($mf_bf_asm, "bf", \$bf_enc_obj, \$bf_enc_src);
|
||||
import_asm($mf_cast_asm, "cast", \$cast_enc_obj, \$cast_enc_src);
|
||||
import_asm($mf_rc4_asm, "rc4", \$rc4_enc_obj, \$rc4_enc_src);
|
||||
import_asm($mf_rc5_asm, "rc5", \$rc5_enc_obj, \$rc5_enc_src);
|
||||
import_asm($mf_md5_asm, "md5", \$md5_asm_obj, \$md5_asm_src);
|
||||
import_asm($mf_sha_asm, "sha", \$sha1_asm_obj, \$sha1_asm_src);
|
||||
import_asm($mf_rmd_asm, "ripemd", \$rmd160_asm_obj, \$rmd160_asm_src);
|
||||
import_asm($mf_wp_asm, "whrlpool", \$whirlpool_asm_obj, \$whirlpool_asm_src);
|
||||
import_asm($mf_modes_asm, "modes", \$modes_asm_obj, \$modes_asm_src);
|
||||
import_asm($mf_cpuid_asm, "", \$cpuid_asm_obj, \$cpuid_asm_src);
|
||||
$perl_asm = 1;
|
||||
}
|
||||
|
||||
sub do_lib_rule
|
||||
{
|
||||
my($objs,$target,$name,$shlib,$ign,$base_addr) = @_;
|
||||
local($ret);
|
||||
|
||||
$taget =~ s/\//$o/g if $o ne '/';
|
||||
my $base_arg;
|
||||
if ($base_addr ne "")
|
||||
{
|
||||
$base_arg= " /base:$base_addr";
|
||||
}
|
||||
else
|
||||
{
|
||||
$base_arg = "";
|
||||
}
|
||||
if ($name ne "")
|
||||
{
|
||||
$name =~ tr/a-z/A-Z/;
|
||||
$name = "/def:ms/${name}.def";
|
||||
}
|
||||
|
||||
# $target="\$(LIB_D)$o$target";
|
||||
# $ret.="$target: $objs\n";
|
||||
if (!$shlib)
|
||||
{
|
||||
# $ret.="\t\$(RM) \$(O_$Name)\n";
|
||||
$ret.="$target: $objs\n";
|
||||
$ret.="\t\$(MKLIB) $lfile$target $objs\n";
|
||||
}
|
||||
else
|
||||
{
|
||||
local($ex)=($target =~ /O_CRYPTO/)?'':' $(L_CRYPTO)';
|
||||
$ex.=" $zlib_lib" if $zlib_opt == 1 && $target =~ /O_CRYPTO/;
|
||||
|
||||
if ($fips && $target =~ /O_CRYPTO/)
|
||||
{
|
||||
$ret.="$target: $objs \$(PREMAIN_DSO_EXE)";
|
||||
$ret.="\n\tFIPS_LINK=\"\$(LINK)\" \\\n";
|
||||
$ret.="\tFIPS_CC=\$(CC)\\\n";
|
||||
$ret.="\tFIPS_CC_ARGS=/Fo\$(OBJ_D)${o}fips_premain.obj \$(SHLIB_CFLAGS) -c\\\n";
|
||||
$ret.="\tPREMAIN_DSO_EXE=\$(PREMAIN_DSO_EXE)\\\n";
|
||||
$ret.="\tFIPS_SHA1_EXE=\$(FIPS_SHA1_EXE)\\\n";
|
||||
$ret.="\tFIPS_TARGET=$target\\\n";
|
||||
$ret.="\tFIPSLIB_D=\$(FIPSLIB_D)\\\n";
|
||||
$ret.="\t\$(FIPSLINK) \$(MLFLAGS) /map $base_arg $efile$target ";
|
||||
$ret.="$name \$(SHLIB_EX_OBJ) $objs \$(EX_LIBS) ";
|
||||
$ret.="\$(OBJ_D)${o}fips_premain.obj $ex\n";
|
||||
}
|
||||
else
|
||||
{
|
||||
$ret.="$target: $objs";
|
||||
$ret.="\n\t\$(LINK) \$(MLFLAGS) $efile$target $name \$(SHLIB_EX_OBJ) $objs $ex \$(EX_LIBS)\n";
|
||||
}
|
||||
|
||||
$ret.="\tIF EXIST \$@.manifest mt -nologo -manifest \$@.manifest -outputresource:\$@;2\n\n";
|
||||
}
|
||||
$ret.="\n";
|
||||
return($ret);
|
||||
}
|
||||
|
||||
sub do_link_rule
|
||||
{
|
||||
my($target,$files,$dep_libs,$libs,$standalone)=@_;
|
||||
local($ret,$_);
|
||||
$file =~ s/\//$o/g if $o ne '/';
|
||||
$n=&bname($targer);
|
||||
$ret.="$target: $files $dep_libs\n";
|
||||
if ($standalone == 1)
|
||||
{
|
||||
$ret.=" \$(LINK) \$(LFLAGS) $efile$target ";
|
||||
$ret.= "\$(EX_LIBS) " if ($files =~ /O_FIPSCANISTER/ && !$fipscanisterbuild);
|
||||
$ret.="$files $libs\n";
|
||||
}
|
||||
elsif ($standalone == 2)
|
||||
{
|
||||
$ret.="\t\$(LINK) \$(LFLAGS) $efile$target $files \$(O_FIPSCANISTER) $out_def/application.cmd\n";
|
||||
$ret.="\t$out_def/incore6x $target\n\n";
|
||||
}
|
||||
else
|
||||
{
|
||||
$ret.="\t\$(LINK) \$(LFLAGS) $efile$target ";
|
||||
$ret.="\t\$(APP_EX_OBJ) $files $libs\n";
|
||||
}
|
||||
return($ret);
|
||||
}
|
||||
|
||||
sub do_rlink_rule
|
||||
{
|
||||
local($target,$rl_start, $rl_mid, $rl_end,$dep_libs,$libs)=@_;
|
||||
local($ret,$_);
|
||||
my $files = "$rl_start $rl_mid $rl_end";
|
||||
|
||||
$file =~ s/\//$o/g if $o ne '/';
|
||||
$n=&bname($target);
|
||||
$ret.="$target: $files $dep_libs\n";
|
||||
$ret.="\t\$(LINK) -r $lfile$target $files $out_def/fipscanister.cmd\n";
|
||||
$ret.="\t\$(PERL) $out_def${o}fips_standalone_sha1 $target > ${target}.sha1\n";
|
||||
$ret.="\t\$(PERL) util${o}copy.pl -stripcr fips${o}fips_premain.c \$(LIB_D)${o}fips_premain.c\n";
|
||||
$ret.="\t\$(CP) fips${o}fips_premain.c.sha1 \$(LIB_D)${o}fips_premain.c.sha1\n";
|
||||
$ret.="\n";
|
||||
return($ret);
|
||||
}
|
||||
|
||||
sub import_asm
|
||||
{
|
||||
my ($mf_var, $asm_name, $oref, $sref) = @_;
|
||||
my $asm_dir;
|
||||
if ($asm_name eq "")
|
||||
{
|
||||
$asm_dir = "crypto$o";
|
||||
}
|
||||
else
|
||||
{
|
||||
$asm_dir = "crypto$o$asm_name$oasm$o";
|
||||
}
|
||||
|
||||
$$oref = "";
|
||||
$$sref = "";
|
||||
$mf_var =~ s/\.o//g;
|
||||
|
||||
foreach (split(/ /, $mf_var))
|
||||
{
|
||||
$$sref .= $asm_dir . $_ . ".asm ";
|
||||
}
|
||||
foreach (split(/ /, $mf_var))
|
||||
{
|
||||
$$oref .= "\$(TMP_D)\\" . $_ . ".obj ";
|
||||
}
|
||||
$$oref =~ s/ $//;
|
||||
$$sref =~ s/ $//;
|
||||
|
||||
}
|
||||
|
||||
|
||||
1;
|
@@ -123,12 +123,18 @@ elsif ($FLAVOR =~ /CE/)
|
||||
}
|
||||
|
||||
$cc='$(CC)';
|
||||
$base_cflags=' /W3 /WX /GF /Gy /nologo -DUNICODE -D_UNICODE -DOPENSSL_SYSNAME_WINCE -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DDSO_WIN32 -DNO_CHMOD -DOPENSSL_SMALL_FOOTPRINT';
|
||||
$base_cflags=' /W3 /GF /Gy /nologo -DUNICODE -D_UNICODE -DOPENSSL_SYSNAME_WINCE -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DDSO_WIN32 -DNO_CHMOD -DOPENSSL_SMALL_FOOTPRINT';
|
||||
$base_cflags.=" $wcecdefs";
|
||||
$base_cflags.=' -I$(WCECOMPAT)/include' if (defined($ENV{'WCECOMPAT'}));
|
||||
$base_cflags.=' -I$(PORTSDK_LIBPATH)/../../include' if (defined($ENV{'PORTSDK_LIBPATH'}));
|
||||
$opt_cflags=' /MC /O1i'; # optimize for space, but with intrinsics...
|
||||
$dbg_clfags=' /MC /Od -DDEBUG -D_DEBUG';
|
||||
if ($ENV{PLATFORM} =~ /wce7/i) {
|
||||
$opt_cflags=' /MT /O1i'; # optimize for space, but with intrinsics...
|
||||
$dbg_cflags=' /MT /Od -DDEBUG -D_DEBUG';
|
||||
} else {
|
||||
$opt_cflags=' /MC /O1i'; # optimize for space, but with intrinsics...
|
||||
$dbg_cflags=' /MC /Od -DDEBUG -D_DEBUG';
|
||||
}
|
||||
|
||||
$lflags="/nologo /opt:ref $wcelflag";
|
||||
}
|
||||
else # Win32
|
||||
@@ -174,12 +180,12 @@ $rsc="rc";
|
||||
$efile="/out:";
|
||||
$exep='.exe';
|
||||
if ($no_sock) { $ex_libs=''; }
|
||||
elsif ($FLAVOR =~ /CE/) { $ex_libs='winsock.lib'; }
|
||||
elsif ($FLAVOR =~ /CE/) { $ex_libs='ws2.lib'; }
|
||||
else { $ex_libs='ws2_32.lib'; }
|
||||
|
||||
if ($FLAVOR =~ /CE/)
|
||||
{
|
||||
$ex_libs.=' $(WCECOMPAT)/lib/wcecompatex.lib' if (defined($ENV{'WCECOMPAT'}));
|
||||
$ex_libs.=' $(WCECOMPAT)/lib/wcecompatex.lib crypt32.lib coredll.lib corelibc.lib' if (defined($ENV{'WCECOMPAT'}));
|
||||
$ex_libs.=' $(PORTSDK_LIBPATH)/portlib.lib' if (defined($ENV{'PORTSDK_LIBPATH'}));
|
||||
$ex_libs.=' /nodefaultlib:oldnames.lib coredll.lib corelibc.lib' if ($ENV{'TARGETCPU'} eq "X86");
|
||||
}
|
||||
@@ -389,8 +395,9 @@ sub do_rlink_rule
|
||||
|
||||
$file =~ s/\//$o/g if $o ne '/';
|
||||
$n=&bname($targer);
|
||||
$ret.="$target: $files $dep_libs \$(FIPS_SHA1_EXE)\n";
|
||||
$ret.="\t\$(PERL) ms\\segrenam.pl \$\$a $rl_start\n";
|
||||
$ret.="$target: $files $dep_libs";
|
||||
$ret.=" \$(FIPS_SHA1_EXE)" unless defined $ENV{"FIPS_SHA1_PATH"};
|
||||
$ret.="\n\t\$(PERL) ms\\segrenam.pl \$\$a $rl_start\n";
|
||||
$ret.="\t\$(PERL) ms\\segrenam.pl \$\$b $rl_mid\n";
|
||||
$ret.="\t\$(PERL) ms\\segrenam.pl \$\$c $rl_end\n";
|
||||
$ret.="\t\$(MKLIB) $lfile$target @<<\n\t$files\n<<\n";
|
||||
|
@@ -1,7 +1,7 @@
|
||||
#!/bin/sh
|
||||
|
||||
rm -f "$2"
|
||||
if test "$OSTYPE" = msdosdjgpp || test "x$PLATFORM" = xmingw ; then
|
||||
if test "$OSTYPE" = msdosdjgpp || test "x$PLATFORM" = xmingw || test "x$OS" = xWindows_NT ; then
|
||||
cp "$1" "$2"
|
||||
else
|
||||
ln -s "$1" "$2"
|
||||
|
Reference in New Issue
Block a user