CryptoPkg: Add new hash algorithm ParallelHash256HashAll in BaseCryptLib.
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3596 Parallel hash function ParallelHash256HashAll, as defined in NIST's Special Publication 800-185, published December 2016. It utilizes multi-process to calculate the digest. Passed CI test. Onprotocol version code passed test. Cc: Jiewen Yao <jiewen.yao@intel.com> Cc: Jian J Wang <jian.j.wang@intel.com> Cc: Xiaoyu Lu <xiaoyu1.lu@intel.com> Cc: Guomin Jiang <guomin.jiang@intel.com> Cc: Siyuan Fu <siyuan.fu@intel.com> Signed-off-by: Zhihao Li <zhihao.li@intel.com> Reviewed-by: Jiewen Yao <jiewen.yao@intel.com>
This commit is contained in:
@ -2,7 +2,7 @@
|
|||||||
# CI configuration for CryptoPkg
|
# CI configuration for CryptoPkg
|
||||||
#
|
#
|
||||||
# Copyright (c) Microsoft Corporation
|
# Copyright (c) Microsoft Corporation
|
||||||
# Copyright (c) 2020, Intel Corporation. All rights reserved.<BR>
|
# Copyright (c) 2020 - 2022, Intel Corporation. All rights reserved.<BR>
|
||||||
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
##
|
##
|
||||||
{
|
{
|
||||||
@ -34,6 +34,8 @@
|
|||||||
"Library/OpensslLib/rand_pool.c",
|
"Library/OpensslLib/rand_pool.c",
|
||||||
# This has OpenSSL interfaces that aren't UEFI spec compliant
|
# This has OpenSSL interfaces that aren't UEFI spec compliant
|
||||||
"Library/Include/CrtLibSupport.h",
|
"Library/Include/CrtLibSupport.h",
|
||||||
|
# This has OpenSSL interfaces that aren't UEFI spec compliant
|
||||||
|
"Library/BaseCryptLib/Hash/CryptParallelHash.h",
|
||||||
# These directories contain auto-generated OpenSSL content
|
# These directories contain auto-generated OpenSSL content
|
||||||
"Library/OpensslLib",
|
"Library/OpensslLib",
|
||||||
"Library/IntrinsicLib",
|
"Library/IntrinsicLib",
|
||||||
|
@ -3,7 +3,7 @@
|
|||||||
from BaseCryptLib and TlsLib.
|
from BaseCryptLib and TlsLib.
|
||||||
|
|
||||||
Copyright (C) Microsoft Corporation. All rights reserved.
|
Copyright (C) Microsoft Corporation. All rights reserved.
|
||||||
Copyright (c) 2019 - 2020, Intel Corporation. All rights reserved.<BR>
|
Copyright (c) 2019 - 2022, Intel Corporation. All rights reserved.<BR>
|
||||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
|
||||||
**/
|
**/
|
||||||
@ -4470,6 +4470,118 @@ CryptoServiceTlsGetCertRevocationList (
|
|||||||
return CALL_BASECRYPTLIB (TlsGet.Services.CertRevocationList, TlsGetCertRevocationList, (Data, DataSize), EFI_UNSUPPORTED);
|
return CALL_BASECRYPTLIB (TlsGet.Services.CertRevocationList, TlsGetCertRevocationList, (Data, DataSize), EFI_UNSUPPORTED);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
Carries out the RSA-SSA signature generation with EMSA-PSS encoding scheme.
|
||||||
|
|
||||||
|
This function carries out the RSA-SSA signature generation with EMSA-PSS encoding scheme defined in
|
||||||
|
RFC 8017.
|
||||||
|
Mask generation function is the same as the message digest algorithm.
|
||||||
|
If the Signature buffer is too small to hold the contents of signature, FALSE
|
||||||
|
is returned and SigSize is set to the required buffer size to obtain the signature.
|
||||||
|
|
||||||
|
If RsaContext is NULL, then return FALSE.
|
||||||
|
If Message is NULL, then return FALSE.
|
||||||
|
If MsgSize is zero or > INT_MAX, then return FALSE.
|
||||||
|
If DigestLen is NOT 32, 48 or 64, return FALSE.
|
||||||
|
If SaltLen is not equal to DigestLen, then return FALSE.
|
||||||
|
If SigSize is large enough but Signature is NULL, then return FALSE.
|
||||||
|
If this interface is not supported, then return FALSE.
|
||||||
|
|
||||||
|
@param[in] RsaContext Pointer to RSA context for signature generation.
|
||||||
|
@param[in] Message Pointer to octet message to be signed.
|
||||||
|
@param[in] MsgSize Size of the message in bytes.
|
||||||
|
@param[in] DigestLen Length of the digest in bytes to be used for RSA signature operation.
|
||||||
|
@param[in] SaltLen Length of the salt in bytes to be used for PSS encoding.
|
||||||
|
@param[out] Signature Pointer to buffer to receive RSA PSS signature.
|
||||||
|
@param[in, out] SigSize On input, the size of Signature buffer in bytes.
|
||||||
|
On output, the size of data returned in Signature buffer in bytes.
|
||||||
|
|
||||||
|
@retval TRUE Signature successfully generated in RSASSA-PSS.
|
||||||
|
@retval FALSE Signature generation failed.
|
||||||
|
@retval FALSE SigSize is too small.
|
||||||
|
@retval FALSE This interface is not supported.
|
||||||
|
|
||||||
|
**/
|
||||||
|
BOOLEAN
|
||||||
|
EFIAPI
|
||||||
|
CryptoServiceRsaPssSign (
|
||||||
|
IN VOID *RsaContext,
|
||||||
|
IN CONST UINT8 *Message,
|
||||||
|
IN UINTN MsgSize,
|
||||||
|
IN UINT16 DigestLen,
|
||||||
|
IN UINT16 SaltLen,
|
||||||
|
OUT UINT8 *Signature,
|
||||||
|
IN OUT UINTN *SigSize
|
||||||
|
)
|
||||||
|
{
|
||||||
|
return CALL_BASECRYPTLIB (RsaPss.Services.Sign, RsaPssSign, (RsaContext, Message, MsgSize, DigestLen, SaltLen, Signature, SigSize), FALSE);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
Verifies the RSA signature with RSASSA-PSS signature scheme defined in RFC 8017.
|
||||||
|
Implementation determines salt length automatically from the signature encoding.
|
||||||
|
Mask generation function is the same as the message digest algorithm.
|
||||||
|
Salt length should be equal to digest length.
|
||||||
|
|
||||||
|
@param[in] RsaContext Pointer to RSA context for signature verification.
|
||||||
|
@param[in] Message Pointer to octet message to be verified.
|
||||||
|
@param[in] MsgSize Size of the message in bytes.
|
||||||
|
@param[in] Signature Pointer to RSASSA-PSS signature to be verified.
|
||||||
|
@param[in] SigSize Size of signature in bytes.
|
||||||
|
@param[in] DigestLen Length of digest for RSA operation.
|
||||||
|
@param[in] SaltLen Salt length for PSS encoding.
|
||||||
|
|
||||||
|
@retval TRUE Valid signature encoded in RSASSA-PSS.
|
||||||
|
@retval FALSE Invalid signature or invalid RSA context.
|
||||||
|
|
||||||
|
**/
|
||||||
|
BOOLEAN
|
||||||
|
EFIAPI
|
||||||
|
CryptoServiceRsaPssVerify (
|
||||||
|
IN VOID *RsaContext,
|
||||||
|
IN CONST UINT8 *Message,
|
||||||
|
IN UINTN MsgSize,
|
||||||
|
IN CONST UINT8 *Signature,
|
||||||
|
IN UINTN SigSize,
|
||||||
|
IN UINT16 DigestLen,
|
||||||
|
IN UINT16 SaltLen
|
||||||
|
)
|
||||||
|
{
|
||||||
|
return CALL_BASECRYPTLIB (RsaPss.Services.Verify, RsaPssVerify, (RsaContext, Message, MsgSize, Signature, SigSize, DigestLen, SaltLen), FALSE);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
Parallel hash function ParallelHash256, as defined in NIST's Special Publication 800-185,
|
||||||
|
published December 2016.
|
||||||
|
|
||||||
|
@param[in] Input Pointer to the input message (X).
|
||||||
|
@param[in] InputByteLen The number(>0) of input bytes provided for the input data.
|
||||||
|
@param[in] BlockSize The size of each block (B).
|
||||||
|
@param[out] Output Pointer to the output buffer.
|
||||||
|
@param[in] OutputByteLen The desired number of output bytes (L).
|
||||||
|
@param[in] Customization Pointer to the customization string (S).
|
||||||
|
@param[in] CustomByteLen The length of the customization string in bytes.
|
||||||
|
|
||||||
|
@retval TRUE ParallelHash256 digest computation succeeded.
|
||||||
|
@retval FALSE ParallelHash256 digest computation failed.
|
||||||
|
@retval FALSE This interface is not supported.
|
||||||
|
|
||||||
|
**/
|
||||||
|
BOOLEAN
|
||||||
|
EFIAPI
|
||||||
|
CryptoServiceParallelHash256HashAll (
|
||||||
|
IN CONST VOID *Input,
|
||||||
|
IN UINTN InputByteLen,
|
||||||
|
IN UINTN BlockSize,
|
||||||
|
OUT VOID *Output,
|
||||||
|
IN UINTN OutputByteLen,
|
||||||
|
IN CONST VOID *Customization,
|
||||||
|
IN UINTN CustomByteLen
|
||||||
|
)
|
||||||
|
{
|
||||||
|
return CALL_BASECRYPTLIB (ParallelHash.Services.HashAll, ParallelHash256HashAll, (Input, InputByteLen, BlockSize, Output, OutputByteLen, Customization, CustomByteLen), FALSE);
|
||||||
|
}
|
||||||
|
|
||||||
const EDKII_CRYPTO_PROTOCOL mEdkiiCrypto = {
|
const EDKII_CRYPTO_PROTOCOL mEdkiiCrypto = {
|
||||||
/// Version
|
/// Version
|
||||||
CryptoServiceGetCryptoVersion,
|
CryptoServiceGetCryptoVersion,
|
||||||
@ -4670,5 +4782,10 @@ const EDKII_CRYPTO_PROTOCOL mEdkiiCrypto = {
|
|||||||
CryptoServiceTlsGetCaCertificate,
|
CryptoServiceTlsGetCaCertificate,
|
||||||
CryptoServiceTlsGetHostPublicCert,
|
CryptoServiceTlsGetHostPublicCert,
|
||||||
CryptoServiceTlsGetHostPrivateKey,
|
CryptoServiceTlsGetHostPrivateKey,
|
||||||
CryptoServiceTlsGetCertRevocationList
|
CryptoServiceTlsGetCertRevocationList,
|
||||||
|
/// RSA PSS
|
||||||
|
CryptoServiceRsaPssSign,
|
||||||
|
CryptoServiceRsaPssVerify,
|
||||||
|
/// Parallel hash
|
||||||
|
CryptoServiceParallelHash256HashAll
|
||||||
};
|
};
|
||||||
|
@ -4,7 +4,7 @@
|
|||||||
primitives (Hash Serials, HMAC, RSA, Diffie-Hellman, etc) for UEFI security
|
primitives (Hash Serials, HMAC, RSA, Diffie-Hellman, etc) for UEFI security
|
||||||
functionality enabling.
|
functionality enabling.
|
||||||
|
|
||||||
Copyright (c) 2009 - 2020, Intel Corporation. All rights reserved.<BR>
|
Copyright (c) 2009 - 2022, Intel Corporation. All rights reserved.<BR>
|
||||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
|
||||||
**/
|
**/
|
||||||
@ -753,6 +753,35 @@ Sha512HashAll (
|
|||||||
OUT UINT8 *HashValue
|
OUT UINT8 *HashValue
|
||||||
);
|
);
|
||||||
|
|
||||||
|
/**
|
||||||
|
Parallel hash function ParallelHash256, as defined in NIST's Special Publication 800-185,
|
||||||
|
published December 2016.
|
||||||
|
|
||||||
|
@param[in] Input Pointer to the input message (X).
|
||||||
|
@param[in] InputByteLen The number(>0) of input bytes provided for the input data.
|
||||||
|
@param[in] BlockSize The size of each block (B).
|
||||||
|
@param[out] Output Pointer to the output buffer.
|
||||||
|
@param[in] OutputByteLen The desired number of output bytes (L).
|
||||||
|
@param[in] Customization Pointer to the customization string (S).
|
||||||
|
@param[in] CustomByteLen The length of the customization string in bytes.
|
||||||
|
|
||||||
|
@retval TRUE ParallelHash256 digest computation succeeded.
|
||||||
|
@retval FALSE ParallelHash256 digest computation failed.
|
||||||
|
@retval FALSE This interface is not supported.
|
||||||
|
|
||||||
|
**/
|
||||||
|
BOOLEAN
|
||||||
|
EFIAPI
|
||||||
|
ParallelHash256HashAll (
|
||||||
|
IN CONST VOID *Input,
|
||||||
|
IN UINTN InputByteLen,
|
||||||
|
IN UINTN BlockSize,
|
||||||
|
OUT VOID *Output,
|
||||||
|
IN UINTN OutputByteLen,
|
||||||
|
IN CONST VOID *Customization,
|
||||||
|
IN UINTN CustomByteLen
|
||||||
|
);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
Retrieves the size, in bytes, of the context buffer required for SM3 hash operations.
|
Retrieves the size, in bytes, of the context buffer required for SM3 hash operations.
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Defines the PCD_CRYPTO_SERVICE_FAMILY_ENABLE structure associated with
|
Defines the PCD_CRYPTO_SERVICE_FAMILY_ENABLE structure associated with
|
||||||
gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.
|
gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.
|
||||||
|
|
||||||
Copyright (c) 2019 - 2020, Intel Corporation. All rights reserved.<BR>
|
Copyright (c) 2019 - 2022, Intel Corporation. All rights reserved.<BR>
|
||||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
|
||||||
**/
|
**/
|
||||||
@ -288,6 +288,19 @@ typedef struct {
|
|||||||
} Services;
|
} Services;
|
||||||
UINT32 Family;
|
UINT32 Family;
|
||||||
} TlsGet;
|
} TlsGet;
|
||||||
|
union {
|
||||||
|
struct {
|
||||||
|
UINT8 Sign : 1;
|
||||||
|
UINT8 Verify : 1;
|
||||||
|
} Services;
|
||||||
|
UINT32 Family;
|
||||||
|
} RsaPss;
|
||||||
|
union {
|
||||||
|
struct {
|
||||||
|
UINT8 HashAll : 1;
|
||||||
|
} Services;
|
||||||
|
UINT32 Family;
|
||||||
|
} ParallelHash;
|
||||||
} PCD_CRYPTO_SERVICE_FAMILY_ENABLE;
|
} PCD_CRYPTO_SERVICE_FAMILY_ENABLE;
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
@ -6,7 +6,7 @@
|
|||||||
# This external input must be validated carefully to avoid security issues such as
|
# This external input must be validated carefully to avoid security issues such as
|
||||||
# buffer overflow or integer overflow.
|
# buffer overflow or integer overflow.
|
||||||
#
|
#
|
||||||
# Copyright (c) 2009 - 2020, Intel Corporation. All rights reserved.<BR>
|
# Copyright (c) 2009 - 2022, Intel Corporation. All rights reserved.<BR>
|
||||||
# Copyright (c) 2020, Hewlett Packard Enterprise Development LP. All rights reserved.<BR>
|
# Copyright (c) 2020, Hewlett Packard Enterprise Development LP. All rights reserved.<BR>
|
||||||
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
#
|
#
|
||||||
@ -34,6 +34,7 @@
|
|||||||
Hash/CryptSha256.c
|
Hash/CryptSha256.c
|
||||||
Hash/CryptSha512.c
|
Hash/CryptSha512.c
|
||||||
Hash/CryptSm3.c
|
Hash/CryptSm3.c
|
||||||
|
Hash/CryptParallelHashNull.c
|
||||||
Hmac/CryptHmacSha256.c
|
Hmac/CryptHmacSha256.c
|
||||||
Kdf/CryptHkdf.c
|
Kdf/CryptHkdf.c
|
||||||
Cipher/CryptAes.c
|
Cipher/CryptAes.c
|
||||||
|
282
CryptoPkg/Library/BaseCryptLib/Hash/CryptCShake256.c
Normal file
282
CryptoPkg/Library/BaseCryptLib/Hash/CryptCShake256.c
Normal file
@ -0,0 +1,282 @@
|
|||||||
|
/** @file
|
||||||
|
cSHAKE-256 Digest Wrapper Implementations.
|
||||||
|
|
||||||
|
Copyright (c) 2022, Intel Corporation. All rights reserved.<BR>
|
||||||
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
|
||||||
|
**/
|
||||||
|
|
||||||
|
#include "CryptParallelHash.h"
|
||||||
|
|
||||||
|
#define CSHAKE256_SECURITY_STRENGTH 256
|
||||||
|
#define CSHAKE256_RATE_IN_BYTES 136
|
||||||
|
|
||||||
|
CONST CHAR8 mZeroPadding[CSHAKE256_RATE_IN_BYTES] = { 0 };
|
||||||
|
|
||||||
|
/**
|
||||||
|
CShake256 initial function.
|
||||||
|
|
||||||
|
Initializes user-supplied memory pointed by CShake256Context as cSHAKE-256 hash context for
|
||||||
|
subsequent use.
|
||||||
|
|
||||||
|
@param[out] CShake256Context Pointer to cSHAKE-256 context being initialized.
|
||||||
|
@param[in] OutputLen The desired number of output length in bytes.
|
||||||
|
@param[in] Name Pointer to the function name string.
|
||||||
|
@param[in] NameLen The length of the function name in bytes.
|
||||||
|
@param[in] Customization Pointer to the customization string.
|
||||||
|
@param[in] CustomizationLen The length of the customization string in bytes.
|
||||||
|
|
||||||
|
@retval TRUE cSHAKE-256 context initialization succeeded.
|
||||||
|
@retval FALSE cSHAKE-256 context initialization failed.
|
||||||
|
@retval FALSE This interface is not supported.
|
||||||
|
**/
|
||||||
|
BOOLEAN
|
||||||
|
EFIAPI
|
||||||
|
CShake256Init (
|
||||||
|
OUT VOID *CShake256Context,
|
||||||
|
IN UINTN OutputLen,
|
||||||
|
IN CONST VOID *Name,
|
||||||
|
IN UINTN NameLen,
|
||||||
|
IN CONST VOID *Customization,
|
||||||
|
IN UINTN CustomizationLen
|
||||||
|
)
|
||||||
|
{
|
||||||
|
BOOLEAN Status;
|
||||||
|
UINT8 EncBuf[sizeof (UINTN) + 1];
|
||||||
|
UINTN EncLen;
|
||||||
|
UINTN AbsorbLen;
|
||||||
|
UINTN PadLen;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Check input parameters.
|
||||||
|
//
|
||||||
|
if ((CShake256Context == NULL) || (OutputLen == 0) || ((NameLen != 0) && (Name == NULL)) || ((CustomizationLen != 0) && (Customization == NULL))) {
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Initialize KECCAK context with pad value and block size.
|
||||||
|
//
|
||||||
|
if ((NameLen == 0) && (CustomizationLen == 0)) {
|
||||||
|
//
|
||||||
|
// When N and S are both empty strings, cSHAKE(X, L, N, S) is equivalent to
|
||||||
|
// SHAKE as defined in FIPS 202.
|
||||||
|
//
|
||||||
|
Status = (BOOLEAN)KeccakInit (
|
||||||
|
(Keccak1600_Ctx *)CShake256Context,
|
||||||
|
'\x1f',
|
||||||
|
(KECCAK1600_WIDTH - CSHAKE256_SECURITY_STRENGTH * 2) / 8,
|
||||||
|
OutputLen
|
||||||
|
);
|
||||||
|
|
||||||
|
return Status;
|
||||||
|
} else {
|
||||||
|
Status = (BOOLEAN)KeccakInit (
|
||||||
|
(Keccak1600_Ctx *)CShake256Context,
|
||||||
|
'\x04',
|
||||||
|
(KECCAK1600_WIDTH - CSHAKE256_SECURITY_STRENGTH * 2) / 8,
|
||||||
|
OutputLen
|
||||||
|
);
|
||||||
|
if (!Status) {
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
AbsorbLen = 0;
|
||||||
|
//
|
||||||
|
// Absorb Absorb bytepad(.., rate).
|
||||||
|
//
|
||||||
|
EncLen = LeftEncode (EncBuf, CSHAKE256_RATE_IN_BYTES);
|
||||||
|
Status = (BOOLEAN)Sha3Update ((Keccak1600_Ctx *)CShake256Context, EncBuf, EncLen);
|
||||||
|
if (!Status) {
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
AbsorbLen += EncLen;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Absorb encode_string(N).
|
||||||
|
//
|
||||||
|
EncLen = LeftEncode (EncBuf, NameLen * 8);
|
||||||
|
Status = (BOOLEAN)Sha3Update ((Keccak1600_Ctx *)CShake256Context, EncBuf, EncLen);
|
||||||
|
if (!Status) {
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
AbsorbLen += EncLen;
|
||||||
|
Status = (BOOLEAN)Sha3Update ((Keccak1600_Ctx *)CShake256Context, Name, NameLen);
|
||||||
|
if (!Status) {
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
AbsorbLen += NameLen;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Absorb encode_string(S).
|
||||||
|
//
|
||||||
|
EncLen = LeftEncode (EncBuf, CustomizationLen * 8);
|
||||||
|
Status = (BOOLEAN)Sha3Update ((Keccak1600_Ctx *)CShake256Context, EncBuf, EncLen);
|
||||||
|
if (!Status) {
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
AbsorbLen += EncLen;
|
||||||
|
Status = (BOOLEAN)Sha3Update ((Keccak1600_Ctx *)CShake256Context, Customization, CustomizationLen);
|
||||||
|
if (!Status) {
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
AbsorbLen += CustomizationLen;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Absorb zero padding up to rate.
|
||||||
|
//
|
||||||
|
PadLen = CSHAKE256_RATE_IN_BYTES - AbsorbLen % CSHAKE256_RATE_IN_BYTES;
|
||||||
|
Status = (BOOLEAN)Sha3Update ((Keccak1600_Ctx *)CShake256Context, mZeroPadding, PadLen);
|
||||||
|
if (!Status) {
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
return TRUE;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
Digests the input data and updates cSHAKE-256 context.
|
||||||
|
|
||||||
|
This function performs cSHAKE-256 digest on a data buffer of the specified size.
|
||||||
|
It can be called multiple times to compute the digest of long or discontinuous data streams.
|
||||||
|
cSHAKE-256 context should be already correctly initialized by CShake256Init(), and should not be finalized
|
||||||
|
by CShake256Final(). Behavior with invalid context is undefined.
|
||||||
|
|
||||||
|
@param[in, out] CShake256Context Pointer to the cSHAKE-256 context.
|
||||||
|
@param[in] Data Pointer to the buffer containing the data to be hashed.
|
||||||
|
@param[in] DataSize Size of Data buffer in bytes.
|
||||||
|
|
||||||
|
@retval TRUE cSHAKE-256 data digest succeeded.
|
||||||
|
@retval FALSE cSHAKE-256 data digest failed.
|
||||||
|
@retval FALSE This interface is not supported.
|
||||||
|
|
||||||
|
**/
|
||||||
|
BOOLEAN
|
||||||
|
EFIAPI
|
||||||
|
CShake256Update (
|
||||||
|
IN OUT VOID *CShake256Context,
|
||||||
|
IN CONST VOID *Data,
|
||||||
|
IN UINTN DataSize
|
||||||
|
)
|
||||||
|
{
|
||||||
|
//
|
||||||
|
// Check input parameters.
|
||||||
|
//
|
||||||
|
if (CShake256Context == NULL) {
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Check invalid parameters, in case that only DataLength was checked in OpenSSL.
|
||||||
|
//
|
||||||
|
if ((Data == NULL) && (DataSize != 0)) {
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
return (BOOLEAN)(Sha3Update ((Keccak1600_Ctx *)CShake256Context, Data, DataSize));
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
Completes computation of the cSHAKE-256 digest value.
|
||||||
|
|
||||||
|
This function completes cSHAKE-256 hash computation and retrieves the digest value into
|
||||||
|
the specified memory. After this function has been called, the cSHAKE-256 context cannot
|
||||||
|
be used again.
|
||||||
|
cSHAKE-256 context should be already correctly initialized by CShake256Init(), and should not be
|
||||||
|
finalized by CShake256Final(). Behavior with invalid cSHAKE-256 context is undefined.
|
||||||
|
|
||||||
|
@param[in, out] CShake256Context Pointer to the cSHAKE-256 context.
|
||||||
|
@param[out] HashValue Pointer to a buffer that receives the cSHAKE-256 digest
|
||||||
|
value.
|
||||||
|
|
||||||
|
@retval TRUE cSHAKE-256 digest computation succeeded.
|
||||||
|
@retval FALSE cSHAKE-256 digest computation failed.
|
||||||
|
@retval FALSE This interface is not supported.
|
||||||
|
|
||||||
|
**/
|
||||||
|
BOOLEAN
|
||||||
|
EFIAPI
|
||||||
|
CShake256Final (
|
||||||
|
IN OUT VOID *CShake256Context,
|
||||||
|
OUT UINT8 *HashValue
|
||||||
|
)
|
||||||
|
{
|
||||||
|
//
|
||||||
|
// Check input parameters.
|
||||||
|
//
|
||||||
|
if ((CShake256Context == NULL) || (HashValue == NULL)) {
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// cSHAKE-256 Hash Finalization.
|
||||||
|
//
|
||||||
|
return (BOOLEAN)(Sha3Final ((Keccak1600_Ctx *)CShake256Context, HashValue));
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
Computes the CSHAKE-256 message digest of a input data buffer.
|
||||||
|
|
||||||
|
This function performs the CSHAKE-256 message digest of a given data buffer, and places
|
||||||
|
the digest value into the specified memory.
|
||||||
|
|
||||||
|
@param[in] Data Pointer to the buffer containing the data to be hashed.
|
||||||
|
@param[in] DataSize Size of Data buffer in bytes.
|
||||||
|
@param[in] OutputLen Size of output in bytes.
|
||||||
|
@param[in] Name Pointer to the function name string.
|
||||||
|
@param[in] NameLen Size of the function name in bytes.
|
||||||
|
@param[in] Customization Pointer to the customization string.
|
||||||
|
@param[in] CustomizationLen Size of the customization string in bytes.
|
||||||
|
@param[out] HashValue Pointer to a buffer that receives the CSHAKE-256 digest
|
||||||
|
value.
|
||||||
|
|
||||||
|
@retval TRUE CSHAKE-256 digest computation succeeded.
|
||||||
|
@retval FALSE CSHAKE-256 digest computation failed.
|
||||||
|
@retval FALSE This interface is not supported.
|
||||||
|
|
||||||
|
**/
|
||||||
|
BOOLEAN
|
||||||
|
EFIAPI
|
||||||
|
CShake256HashAll (
|
||||||
|
IN CONST VOID *Data,
|
||||||
|
IN UINTN DataSize,
|
||||||
|
IN UINTN OutputLen,
|
||||||
|
IN CONST VOID *Name,
|
||||||
|
IN UINTN NameLen,
|
||||||
|
IN CONST VOID *Customization,
|
||||||
|
IN UINTN CustomizationLen,
|
||||||
|
OUT UINT8 *HashValue
|
||||||
|
)
|
||||||
|
{
|
||||||
|
BOOLEAN Status;
|
||||||
|
Keccak1600_Ctx Ctx;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Check input parameters.
|
||||||
|
//
|
||||||
|
if (HashValue == NULL) {
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
if ((Data == NULL) && (DataSize != 0)) {
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
Status = CShake256Init (&Ctx, OutputLen, Name, NameLen, Customization, CustomizationLen);
|
||||||
|
if (!Status) {
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
Status = CShake256Update (&Ctx, Data, DataSize);
|
||||||
|
if (!Status) {
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
return CShake256Final (&Ctx, HashValue);
|
||||||
|
}
|
278
CryptoPkg/Library/BaseCryptLib/Hash/CryptParallelHash.c
Normal file
278
CryptoPkg/Library/BaseCryptLib/Hash/CryptParallelHash.c
Normal file
@ -0,0 +1,278 @@
|
|||||||
|
/** @file
|
||||||
|
ParallelHash Implementation.
|
||||||
|
|
||||||
|
Copyright (c) 2022, Intel Corporation. All rights reserved.<BR>
|
||||||
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
|
||||||
|
**/
|
||||||
|
|
||||||
|
#include "CryptParallelHash.h"
|
||||||
|
#include <Library/MmServicesTableLib.h>
|
||||||
|
#include <Library/SynchronizationLib.h>
|
||||||
|
|
||||||
|
#define PARALLELHASH_CUSTOMIZATION "ParallelHash"
|
||||||
|
|
||||||
|
UINTN mBlockNum;
|
||||||
|
UINTN mBlockSize;
|
||||||
|
UINTN mLastBlockSize;
|
||||||
|
UINT8 *mInput;
|
||||||
|
UINTN mBlockResultSize;
|
||||||
|
UINT8 *mBlockHashResult;
|
||||||
|
BOOLEAN *mBlockIsCompleted;
|
||||||
|
SPIN_LOCK *mSpinLockList;
|
||||||
|
|
||||||
|
/**
|
||||||
|
Complete computation of digest of each block.
|
||||||
|
|
||||||
|
Each AP perform the function called by BSP.
|
||||||
|
|
||||||
|
@param[in] ProcedureArgument Argument of the procedure.
|
||||||
|
**/
|
||||||
|
VOID
|
||||||
|
EFIAPI
|
||||||
|
ParallelHashApExecute (
|
||||||
|
IN VOID *ProcedureArgument
|
||||||
|
)
|
||||||
|
{
|
||||||
|
UINTN Index;
|
||||||
|
BOOLEAN Status;
|
||||||
|
|
||||||
|
for (Index = 0; Index < mBlockNum; Index++) {
|
||||||
|
if (AcquireSpinLockOrFail (&mSpinLockList[Index])) {
|
||||||
|
//
|
||||||
|
// Completed, try next one.
|
||||||
|
//
|
||||||
|
if (mBlockIsCompleted[Index]) {
|
||||||
|
ReleaseSpinLock (&mSpinLockList[Index]);
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Calculate CShake256 for this block.
|
||||||
|
//
|
||||||
|
Status = CShake256HashAll (
|
||||||
|
mInput + Index * mBlockSize,
|
||||||
|
(Index == (mBlockNum - 1)) ? mLastBlockSize : mBlockSize,
|
||||||
|
mBlockResultSize,
|
||||||
|
NULL,
|
||||||
|
0,
|
||||||
|
NULL,
|
||||||
|
0,
|
||||||
|
mBlockHashResult + Index * mBlockResultSize
|
||||||
|
);
|
||||||
|
if (!EFI_ERROR (Status)) {
|
||||||
|
mBlockIsCompleted[Index] = TRUE;
|
||||||
|
}
|
||||||
|
|
||||||
|
ReleaseSpinLock (&mSpinLockList[Index]);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
Dispatch the block task to each AP in SMM mode.
|
||||||
|
|
||||||
|
**/
|
||||||
|
VOID
|
||||||
|
EFIAPI
|
||||||
|
MmDispatchBlockToAP (
|
||||||
|
VOID
|
||||||
|
)
|
||||||
|
{
|
||||||
|
UINTN Index;
|
||||||
|
|
||||||
|
for (Index = 0; Index < gMmst->NumberOfCpus; Index++) {
|
||||||
|
if (Index != gMmst->CurrentlyExecutingCpu) {
|
||||||
|
gMmst->MmStartupThisAp (ParallelHashApExecute, Index, NULL);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
Parallel hash function ParallelHash256, as defined in NIST's Special Publication 800-185,
|
||||||
|
published December 2016.
|
||||||
|
|
||||||
|
@param[in] Input Pointer to the input message (X).
|
||||||
|
@param[in] InputByteLen The number(>0) of input bytes provided for the input data.
|
||||||
|
@param[in] BlockSize The size of each block (B).
|
||||||
|
@param[out] Output Pointer to the output buffer.
|
||||||
|
@param[in] OutputByteLen The desired number of output bytes (L).
|
||||||
|
@param[in] Customization Pointer to the customization string (S).
|
||||||
|
@param[in] CustomByteLen The length of the customization string in bytes.
|
||||||
|
|
||||||
|
@retval TRUE ParallelHash256 digest computation succeeded.
|
||||||
|
@retval FALSE ParallelHash256 digest computation failed.
|
||||||
|
@retval FALSE This interface is not supported.
|
||||||
|
|
||||||
|
**/
|
||||||
|
BOOLEAN
|
||||||
|
EFIAPI
|
||||||
|
ParallelHash256HashAll (
|
||||||
|
IN CONST VOID *Input,
|
||||||
|
IN UINTN InputByteLen,
|
||||||
|
IN UINTN BlockSize,
|
||||||
|
OUT VOID *Output,
|
||||||
|
IN UINTN OutputByteLen,
|
||||||
|
IN CONST VOID *Customization,
|
||||||
|
IN UINTN CustomByteLen
|
||||||
|
)
|
||||||
|
{
|
||||||
|
UINT8 EncBufB[sizeof (UINTN)+1];
|
||||||
|
UINTN EncSizeB;
|
||||||
|
UINT8 EncBufN[sizeof (UINTN)+1];
|
||||||
|
UINTN EncSizeN;
|
||||||
|
UINT8 EncBufL[sizeof (UINTN)+1];
|
||||||
|
UINTN EncSizeL;
|
||||||
|
UINTN Index;
|
||||||
|
UINT8 *CombinedInput;
|
||||||
|
UINTN CombinedInputSize;
|
||||||
|
BOOLEAN AllCompleted;
|
||||||
|
UINTN Offset;
|
||||||
|
BOOLEAN ReturnValue;
|
||||||
|
|
||||||
|
if ((InputByteLen == 0) || (OutputByteLen == 0) || (BlockSize == 0)) {
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
if ((Input == NULL) || (Output == NULL)) {
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
if ((CustomByteLen != 0) && (Customization == NULL)) {
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
mBlockSize = BlockSize;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Calculate block number n.
|
||||||
|
//
|
||||||
|
mBlockNum = InputByteLen % mBlockSize == 0 ? InputByteLen / mBlockSize : InputByteLen / mBlockSize + 1;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Set hash result size of each block in bytes.
|
||||||
|
//
|
||||||
|
mBlockResultSize = OutputByteLen;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Encode B, n, L to string and record size.
|
||||||
|
//
|
||||||
|
EncSizeB = LeftEncode (EncBufB, mBlockSize);
|
||||||
|
EncSizeN = RightEncode (EncBufN, mBlockNum);
|
||||||
|
EncSizeL = RightEncode (EncBufL, OutputByteLen * CHAR_BIT);
|
||||||
|
|
||||||
|
//
|
||||||
|
// Allocate buffer for combined input (newX), Block completed flag and SpinLock.
|
||||||
|
//
|
||||||
|
CombinedInputSize = EncSizeB + EncSizeN + EncSizeL + mBlockNum * mBlockResultSize;
|
||||||
|
CombinedInput = AllocateZeroPool (CombinedInputSize);
|
||||||
|
mBlockIsCompleted = AllocateZeroPool (mBlockNum * sizeof (BOOLEAN));
|
||||||
|
mSpinLockList = AllocatePool (mBlockNum * sizeof (SPIN_LOCK));
|
||||||
|
if ((CombinedInput == NULL) || (mBlockIsCompleted == NULL) || (mSpinLockList == NULL)) {
|
||||||
|
ReturnValue = FALSE;
|
||||||
|
goto Exit;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Fill LeftEncode(B).
|
||||||
|
//
|
||||||
|
CopyMem (CombinedInput, EncBufB, EncSizeB);
|
||||||
|
|
||||||
|
//
|
||||||
|
// Prepare for parallel hash.
|
||||||
|
//
|
||||||
|
mBlockHashResult = CombinedInput + EncSizeB;
|
||||||
|
mInput = (UINT8 *)Input;
|
||||||
|
mLastBlockSize = InputByteLen % mBlockSize == 0 ? mBlockSize : InputByteLen % mBlockSize;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Initialize SpinLock for each result block.
|
||||||
|
//
|
||||||
|
for (Index = 0; Index < mBlockNum; Index++) {
|
||||||
|
InitializeSpinLock (&mSpinLockList[Index]);
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Dispatch blocklist to each AP.
|
||||||
|
//
|
||||||
|
if (gMmst != NULL) {
|
||||||
|
MmDispatchBlockToAP ();
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Wait until all block hash completed.
|
||||||
|
//
|
||||||
|
do {
|
||||||
|
AllCompleted = TRUE;
|
||||||
|
for (Index = 0; Index < mBlockNum; Index++) {
|
||||||
|
if (AcquireSpinLockOrFail (&mSpinLockList[Index])) {
|
||||||
|
if (!mBlockIsCompleted[Index]) {
|
||||||
|
AllCompleted = FALSE;
|
||||||
|
ReturnValue = CShake256HashAll (
|
||||||
|
mInput + Index * mBlockSize,
|
||||||
|
(Index == (mBlockNum - 1)) ? mLastBlockSize : mBlockSize,
|
||||||
|
mBlockResultSize,
|
||||||
|
NULL,
|
||||||
|
0,
|
||||||
|
NULL,
|
||||||
|
0,
|
||||||
|
mBlockHashResult + Index * mBlockResultSize
|
||||||
|
);
|
||||||
|
if (ReturnValue) {
|
||||||
|
mBlockIsCompleted[Index] = TRUE;
|
||||||
|
}
|
||||||
|
|
||||||
|
ReleaseSpinLock (&mSpinLockList[Index]);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
ReleaseSpinLock (&mSpinLockList[Index]);
|
||||||
|
} else {
|
||||||
|
AllCompleted = FALSE;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} while (!AllCompleted);
|
||||||
|
|
||||||
|
//
|
||||||
|
// Fill LeftEncode(n).
|
||||||
|
//
|
||||||
|
Offset = EncSizeB + mBlockNum * mBlockResultSize;
|
||||||
|
CopyMem (CombinedInput + Offset, EncBufN, EncSizeN);
|
||||||
|
|
||||||
|
//
|
||||||
|
// Fill LeftEncode(L).
|
||||||
|
//
|
||||||
|
Offset += EncSizeN;
|
||||||
|
CopyMem (CombinedInput + Offset, EncBufL, EncSizeL);
|
||||||
|
|
||||||
|
ReturnValue = CShake256HashAll (
|
||||||
|
CombinedInput,
|
||||||
|
CombinedInputSize,
|
||||||
|
OutputByteLen,
|
||||||
|
PARALLELHASH_CUSTOMIZATION,
|
||||||
|
AsciiStrLen (PARALLELHASH_CUSTOMIZATION),
|
||||||
|
Customization,
|
||||||
|
CustomByteLen,
|
||||||
|
Output
|
||||||
|
);
|
||||||
|
|
||||||
|
Exit:
|
||||||
|
ZeroMem (CombinedInput, CombinedInputSize);
|
||||||
|
|
||||||
|
if (CombinedInput != NULL) {
|
||||||
|
FreePool (CombinedInput);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (mSpinLockList != NULL) {
|
||||||
|
FreePool ((VOID *)mSpinLockList);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (mBlockIsCompleted != NULL) {
|
||||||
|
FreePool (mBlockIsCompleted);
|
||||||
|
}
|
||||||
|
|
||||||
|
return ReturnValue;
|
||||||
|
}
|
201
CryptoPkg/Library/BaseCryptLib/Hash/CryptParallelHash.h
Normal file
201
CryptoPkg/Library/BaseCryptLib/Hash/CryptParallelHash.h
Normal file
@ -0,0 +1,201 @@
|
|||||||
|
/** @file
|
||||||
|
ParallelHash related function and type declaration.
|
||||||
|
|
||||||
|
Copyright (c) 2022, Intel Corporation. All rights reserved.<BR>
|
||||||
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
|
||||||
|
Copyright 2022 The OpenSSL Project Authors. All Rights Reserved.
|
||||||
|
Licensed under the OpenSSL license (the "License"). You may not use
|
||||||
|
this file except in compliance with the License. You can obtain a copy
|
||||||
|
in the file LICENSE in the source distribution or at
|
||||||
|
https://www.openssl.org/source/license.html
|
||||||
|
|
||||||
|
Copyright 2022 The eXtended Keccak Code Package (XKCP)
|
||||||
|
https://github.com/XKCP/XKCP
|
||||||
|
Keccak, designed by Guido Bertoni, Joan Daemen, Michael Peeters and Gilles Van Assche.
|
||||||
|
Implementation by the designers, hereby denoted as "the implementer".
|
||||||
|
For more information, feedback or questions, please refer to the Keccak Team website:
|
||||||
|
https://keccak.team/
|
||||||
|
To the extent possible under law, the implementer has waived all copyright
|
||||||
|
and related or neighboring rights to the source code in this file.
|
||||||
|
http://creativecommons.org/publicdomain/zero/1.0/
|
||||||
|
**/
|
||||||
|
|
||||||
|
#include "InternalCryptLib.h"
|
||||||
|
|
||||||
|
#define KECCAK1600_WIDTH 1600
|
||||||
|
|
||||||
|
//
|
||||||
|
// This struct referring to m_sha3.c from opessl and modified its type name.
|
||||||
|
//
|
||||||
|
typedef struct {
|
||||||
|
uint64_t A[5][5];
|
||||||
|
size_t block_size; /* cached ctx->digest->block_size */
|
||||||
|
size_t md_size; /* output length, variable in XOF */
|
||||||
|
size_t num; /* used bytes in below buffer */
|
||||||
|
unsigned char buf[KECCAK1600_WIDTH / 8 - 32];
|
||||||
|
unsigned char pad;
|
||||||
|
} Keccak1600_Ctx;
|
||||||
|
|
||||||
|
/**
|
||||||
|
SHA3_absorb can be called multiple times, but at each invocation
|
||||||
|
largest multiple of |r| out of |len| bytes are processed. Then
|
||||||
|
remaining amount of bytes is returned. This is done to spare caller
|
||||||
|
trouble of calculating the largest multiple of |r|. |r| can be viewed
|
||||||
|
as blocksize. It is commonly (1600 - 256*n)/8, e.g. 168, 136, 104,
|
||||||
|
72, but can also be (1600 - 448)/8 = 144. All this means that message
|
||||||
|
padding and intermediate sub-block buffering, byte- or bitwise, is
|
||||||
|
caller's responsibility.
|
||||||
|
**/
|
||||||
|
size_t
|
||||||
|
SHA3_absorb (
|
||||||
|
uint64_t A[5][5],
|
||||||
|
const unsigned char *inp,
|
||||||
|
size_t len,
|
||||||
|
size_t r
|
||||||
|
);
|
||||||
|
|
||||||
|
/**
|
||||||
|
SHA3_squeeze is called once at the end to generate |out| hash value
|
||||||
|
of |len| bytes.
|
||||||
|
**/
|
||||||
|
void
|
||||||
|
SHA3_squeeze (
|
||||||
|
uint64_t A[5][5],
|
||||||
|
unsigned char *out,
|
||||||
|
size_t len,
|
||||||
|
size_t r
|
||||||
|
);
|
||||||
|
|
||||||
|
/**
|
||||||
|
Encode function from XKCP.
|
||||||
|
|
||||||
|
Encodes the input as a byte string in a way that can be unambiguously parsed
|
||||||
|
from the beginning of the string by inserting the length of the byte string
|
||||||
|
before the byte string representation of input.
|
||||||
|
|
||||||
|
@param[out] EncBuf Result of left encode.
|
||||||
|
@param[in] Value Input of left encode.
|
||||||
|
|
||||||
|
@retval EncLen Size of encode result in bytes.
|
||||||
|
**/
|
||||||
|
UINTN
|
||||||
|
EFIAPI
|
||||||
|
LeftEncode (
|
||||||
|
OUT UINT8 *EncBuf,
|
||||||
|
IN UINTN Value
|
||||||
|
);
|
||||||
|
|
||||||
|
/**
|
||||||
|
Encode function from XKCP.
|
||||||
|
|
||||||
|
Encodes the input as a byte string in a way that can be unambiguously parsed
|
||||||
|
from the end of the string by inserting the length of the byte string after
|
||||||
|
the byte string representation of input.
|
||||||
|
|
||||||
|
@param[out] EncBuf Result of right encode.
|
||||||
|
@param[in] Value Input of right encode.
|
||||||
|
|
||||||
|
@retval EncLen Size of encode result in bytes.
|
||||||
|
**/
|
||||||
|
UINTN
|
||||||
|
EFIAPI
|
||||||
|
RightEncode (
|
||||||
|
OUT UINT8 *EncBuf,
|
||||||
|
IN UINTN Value
|
||||||
|
);
|
||||||
|
|
||||||
|
/**
|
||||||
|
Keccak initial fuction.
|
||||||
|
|
||||||
|
Set up state with specified capacity.
|
||||||
|
|
||||||
|
@param[out] Context Pointer to the context being initialized.
|
||||||
|
@param[in] Pad Delimited Suffix.
|
||||||
|
@param[in] BlockSize Size of context block.
|
||||||
|
@param[in] MessageDigestLen Size of message digest in bytes.
|
||||||
|
|
||||||
|
@retval 1 Initialize successfully.
|
||||||
|
@retval 0 Fail to initialize.
|
||||||
|
**/
|
||||||
|
UINT8
|
||||||
|
EFIAPI
|
||||||
|
KeccakInit (
|
||||||
|
OUT Keccak1600_Ctx *Context,
|
||||||
|
IN UINT8 Pad,
|
||||||
|
IN UINTN BlockSize,
|
||||||
|
IN UINTN MessageDigstLen
|
||||||
|
);
|
||||||
|
|
||||||
|
/**
|
||||||
|
Sha3 update fuction.
|
||||||
|
|
||||||
|
This function performs Sha3 digest on a data buffer of the specified size.
|
||||||
|
It can be called multiple times to compute the digest of long or discontinuous data streams.
|
||||||
|
|
||||||
|
@param[in,out] Context Pointer to the Keccak context.
|
||||||
|
@param[in] Data Pointer to the buffer containing the data to be hashed.
|
||||||
|
@param[in] DataSize Size of Data buffer in bytes.
|
||||||
|
|
||||||
|
@retval 1 Update successfully.
|
||||||
|
**/
|
||||||
|
UINT8
|
||||||
|
EFIAPI
|
||||||
|
Sha3Update (
|
||||||
|
IN OUT Keccak1600_Ctx *Context,
|
||||||
|
IN const VOID *Data,
|
||||||
|
IN UINTN DataSize
|
||||||
|
);
|
||||||
|
|
||||||
|
/**
|
||||||
|
Completes computation of Sha3 message digest.
|
||||||
|
|
||||||
|
This function completes sha3 hash computation and retrieves the digest value into
|
||||||
|
the specified memory. After this function has been called, the keccak context cannot
|
||||||
|
be used again.
|
||||||
|
|
||||||
|
@param[in, out] Context Pointer to the keccak context.
|
||||||
|
@param[out] MessageDigest Pointer to a buffer that receives the message digest.
|
||||||
|
|
||||||
|
@retval 1 Meaasge digest computation succeeded.
|
||||||
|
**/
|
||||||
|
UINT8
|
||||||
|
EFIAPI
|
||||||
|
Sha3Final (
|
||||||
|
IN OUT Keccak1600_Ctx *Context,
|
||||||
|
OUT UINT8 *MessageDigest
|
||||||
|
);
|
||||||
|
|
||||||
|
/**
|
||||||
|
Computes the CSHAKE-256 message digest of a input data buffer.
|
||||||
|
|
||||||
|
This function performs the CSHAKE-256 message digest of a given data buffer, and places
|
||||||
|
the digest value into the specified memory.
|
||||||
|
|
||||||
|
@param[in] Data Pointer to the buffer containing the data to be hashed.
|
||||||
|
@param[in] DataSize Size of Data buffer in bytes.
|
||||||
|
@param[in] OutputLen Size of output in bytes.
|
||||||
|
@param[in] Name Pointer to the function name string.
|
||||||
|
@param[in] NameLen Size of the function name in bytes.
|
||||||
|
@param[in] Customization Pointer to the customization string.
|
||||||
|
@param[in] CustomizationLen Size of the customization string in bytes.
|
||||||
|
@param[out] HashValue Pointer to a buffer that receives the CSHAKE-256 digest
|
||||||
|
value.
|
||||||
|
|
||||||
|
@retval TRUE CSHAKE-256 digest computation succeeded.
|
||||||
|
@retval FALSE CSHAKE-256 digest computation failed.
|
||||||
|
@retval FALSE This interface is not supported.
|
||||||
|
|
||||||
|
**/
|
||||||
|
BOOLEAN
|
||||||
|
EFIAPI
|
||||||
|
CShake256HashAll (
|
||||||
|
IN CONST VOID *Data,
|
||||||
|
IN UINTN DataSize,
|
||||||
|
IN UINTN OutputLen,
|
||||||
|
IN CONST VOID *Name,
|
||||||
|
IN UINTN NameLen,
|
||||||
|
IN CONST VOID *Customization,
|
||||||
|
IN UINTN CustomizationLen,
|
||||||
|
OUT UINT8 *HashValue
|
||||||
|
);
|
40
CryptoPkg/Library/BaseCryptLib/Hash/CryptParallelHashNull.c
Normal file
40
CryptoPkg/Library/BaseCryptLib/Hash/CryptParallelHashNull.c
Normal file
@ -0,0 +1,40 @@
|
|||||||
|
/** @file
|
||||||
|
ParallelHash Implementation which does not provide real capabilities.
|
||||||
|
|
||||||
|
Copyright (c) 2022, Intel Corporation. All rights reserved.<BR>
|
||||||
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
|
||||||
|
**/
|
||||||
|
|
||||||
|
#include "InternalCryptLib.h"
|
||||||
|
|
||||||
|
/**
|
||||||
|
Parallel hash function ParallelHash256, as defined in NIST's Special Publication 800-185,
|
||||||
|
published December 2016.
|
||||||
|
|
||||||
|
@param[in] Input Pointer to the input message (X).
|
||||||
|
@param[in] InputByteLen The number(>0) of input bytes provided for the input data.
|
||||||
|
@param[in] BlockSize The size of each block (B).
|
||||||
|
@param[out] Output Pointer to the output buffer.
|
||||||
|
@param[in] OutputByteLen The desired number of output bytes (L).
|
||||||
|
@param[in] Customization Pointer to the customization string (S).
|
||||||
|
@param[in] CustomByteLen The length of the customization string in bytes.
|
||||||
|
|
||||||
|
@retval FALSE This interface is not supported.
|
||||||
|
|
||||||
|
**/
|
||||||
|
BOOLEAN
|
||||||
|
EFIAPI
|
||||||
|
ParallelHash256HashAll (
|
||||||
|
IN CONST VOID *Input,
|
||||||
|
IN UINTN InputByteLen,
|
||||||
|
IN UINTN BlockSize,
|
||||||
|
OUT VOID *Output,
|
||||||
|
IN UINTN OutputByteLen,
|
||||||
|
IN CONST VOID *Customization,
|
||||||
|
IN UINTN CustomByteLen
|
||||||
|
)
|
||||||
|
{
|
||||||
|
ASSERT (FALSE);
|
||||||
|
return FALSE;
|
||||||
|
}
|
166
CryptoPkg/Library/BaseCryptLib/Hash/CryptSha3.c
Normal file
166
CryptoPkg/Library/BaseCryptLib/Hash/CryptSha3.c
Normal file
@ -0,0 +1,166 @@
|
|||||||
|
/** @file
|
||||||
|
SHA3 realted functions from OpenSSL.
|
||||||
|
|
||||||
|
Copyright (c) 2022, Intel Corporation. All rights reserved.<BR>
|
||||||
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
|
||||||
|
Copyright 2022 The OpenSSL Project Authors. All Rights Reserved.
|
||||||
|
Licensed under the OpenSSL license (the "License"). You may not use
|
||||||
|
this file except in compliance with the License. You can obtain a copy
|
||||||
|
in the file LICENSE in the source distribution or at
|
||||||
|
https://www.openssl.org/source/license.html
|
||||||
|
**/
|
||||||
|
|
||||||
|
#include "CryptParallelHash.h"
|
||||||
|
|
||||||
|
/**
|
||||||
|
Keccak initial fuction.
|
||||||
|
|
||||||
|
Set up state with specified capacity.
|
||||||
|
|
||||||
|
@param[out] Context Pointer to the context being initialized.
|
||||||
|
@param[in] Pad Delimited Suffix.
|
||||||
|
@param[in] BlockSize Size of context block.
|
||||||
|
@param[in] MessageDigestLen Size of message digest in bytes.
|
||||||
|
|
||||||
|
@retval 1 Initialize successfully.
|
||||||
|
@retval 0 Fail to initialize.
|
||||||
|
**/
|
||||||
|
UINT8
|
||||||
|
EFIAPI
|
||||||
|
KeccakInit (
|
||||||
|
OUT Keccak1600_Ctx *Context,
|
||||||
|
IN UINT8 Pad,
|
||||||
|
IN UINTN BlockSize,
|
||||||
|
IN UINTN MessageDigestLen
|
||||||
|
)
|
||||||
|
{
|
||||||
|
if (BlockSize <= sizeof (Context->buf)) {
|
||||||
|
memset (Context->A, 0, sizeof (Context->A));
|
||||||
|
|
||||||
|
Context->num = 0;
|
||||||
|
Context->block_size = BlockSize;
|
||||||
|
Context->md_size = MessageDigestLen;
|
||||||
|
Context->pad = Pad;
|
||||||
|
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
Sha3 update fuction.
|
||||||
|
|
||||||
|
This function performs Sha3 digest on a data buffer of the specified size.
|
||||||
|
It can be called multiple times to compute the digest of long or discontinuous data streams.
|
||||||
|
|
||||||
|
@param[in,out] Context Pointer to the Keccak context.
|
||||||
|
@param[in] Data Pointer to the buffer containing the data to be hashed.
|
||||||
|
@param[in] DataSize Size of Data buffer in bytes.
|
||||||
|
|
||||||
|
@retval 1 Update successfully.
|
||||||
|
**/
|
||||||
|
UINT8
|
||||||
|
EFIAPI
|
||||||
|
Sha3Update (
|
||||||
|
IN OUT Keccak1600_Ctx *Context,
|
||||||
|
IN const VOID *Data,
|
||||||
|
IN UINTN DataSize
|
||||||
|
)
|
||||||
|
{
|
||||||
|
const UINT8 *DataCopy;
|
||||||
|
UINTN BlockSize;
|
||||||
|
UINTN Num;
|
||||||
|
UINTN Rem;
|
||||||
|
|
||||||
|
DataCopy = Data;
|
||||||
|
BlockSize = (UINT8)(Context->block_size);
|
||||||
|
|
||||||
|
if (DataSize == 0) {
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
if ((Num = Context->num) != 0) {
|
||||||
|
//
|
||||||
|
// process intermediate buffer
|
||||||
|
//
|
||||||
|
Rem = BlockSize - Num;
|
||||||
|
|
||||||
|
if (DataSize < Rem) {
|
||||||
|
memcpy (Context->buf + Num, DataCopy, DataSize);
|
||||||
|
Context->num += DataSize;
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// We have enough data to fill or overflow the intermediate
|
||||||
|
// buffer. So we append |Rem| bytes and process the block,
|
||||||
|
// leaving the rest for later processing.
|
||||||
|
//
|
||||||
|
memcpy (Context->buf + Num, DataCopy, Rem);
|
||||||
|
DataCopy += Rem;
|
||||||
|
DataSize -= Rem;
|
||||||
|
(void)SHA3_absorb (Context->A, Context->buf, BlockSize, BlockSize);
|
||||||
|
Context->num = 0;
|
||||||
|
// Context->buf is processed, Context->num is guaranteed to be zero.
|
||||||
|
}
|
||||||
|
|
||||||
|
if (DataSize >= BlockSize) {
|
||||||
|
Rem = SHA3_absorb (Context->A, DataCopy, DataSize, BlockSize);
|
||||||
|
} else {
|
||||||
|
Rem = DataSize;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (Rem > 0) {
|
||||||
|
memcpy (Context->buf, DataCopy + DataSize - Rem, Rem);
|
||||||
|
Context->num = Rem;
|
||||||
|
}
|
||||||
|
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
Completes computation of Sha3 message digest.
|
||||||
|
|
||||||
|
This function completes sha3 hash computation and retrieves the digest value into
|
||||||
|
the specified memory. After this function has been called, the keccak context cannot
|
||||||
|
be used again.
|
||||||
|
|
||||||
|
@param[in, out] Context Pointer to the keccak context.
|
||||||
|
@param[out] MessageDigest Pointer to a buffer that receives the message digest.
|
||||||
|
|
||||||
|
@retval 1 Meaasge digest computation succeeded.
|
||||||
|
**/
|
||||||
|
UINT8
|
||||||
|
EFIAPI
|
||||||
|
Sha3Final (
|
||||||
|
IN OUT Keccak1600_Ctx *Context,
|
||||||
|
OUT UINT8 *MessageDigest
|
||||||
|
)
|
||||||
|
{
|
||||||
|
UINTN BlockSize;
|
||||||
|
UINTN Num;
|
||||||
|
|
||||||
|
BlockSize = Context->block_size;
|
||||||
|
Num = Context->num;
|
||||||
|
|
||||||
|
if (Context->md_size == 0) {
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Pad the data with 10*1. Note that |Num| can be |BlockSize - 1|
|
||||||
|
// in which case both byte operations below are performed on
|
||||||
|
// same byte.
|
||||||
|
//
|
||||||
|
memset (Context->buf + Num, 0, BlockSize - Num);
|
||||||
|
Context->buf[Num] = Context->pad;
|
||||||
|
Context->buf[BlockSize - 1] |= 0x80;
|
||||||
|
|
||||||
|
(void)SHA3_absorb (Context->A, Context->buf, BlockSize, BlockSize);
|
||||||
|
|
||||||
|
SHA3_squeeze (Context->A, MessageDigest, Context->md_size, BlockSize);
|
||||||
|
|
||||||
|
return 1;
|
||||||
|
}
|
107
CryptoPkg/Library/BaseCryptLib/Hash/CryptXkcp.c
Normal file
107
CryptoPkg/Library/BaseCryptLib/Hash/CryptXkcp.c
Normal file
@ -0,0 +1,107 @@
|
|||||||
|
/** @file
|
||||||
|
Encode realted functions from Xkcp.
|
||||||
|
|
||||||
|
Copyright (c) 2022, Intel Corporation. All rights reserved.<BR>
|
||||||
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
|
||||||
|
Copyright 2022 The eXtended Keccak Code Package (XKCP)
|
||||||
|
https://github.com/XKCP/XKCP
|
||||||
|
Keccak, designed by Guido Bertoni, Joan Daemen, Michael Peeters and Gilles Van Assche.
|
||||||
|
Implementation by the designers, hereby denoted as "the implementer".
|
||||||
|
For more information, feedback or questions, please refer to the Keccak Team website:
|
||||||
|
https://keccak.team/
|
||||||
|
To the extent possible under law, the implementer has waived all copyright
|
||||||
|
and related or neighboring rights to the source code in this file.
|
||||||
|
http://creativecommons.org/publicdomain/zero/1.0/
|
||||||
|
|
||||||
|
**/
|
||||||
|
|
||||||
|
#include "CryptParallelHash.h"
|
||||||
|
|
||||||
|
/**
|
||||||
|
Encode function from XKCP.
|
||||||
|
|
||||||
|
Encodes the input as a byte string in a way that can be unambiguously parsed
|
||||||
|
from the beginning of the string by inserting the length of the byte string
|
||||||
|
before the byte string representation of input.
|
||||||
|
|
||||||
|
@param[out] EncBuf Result of left encode.
|
||||||
|
@param[in] Value Input of left encode.
|
||||||
|
|
||||||
|
@retval EncLen Size of encode result in bytes.
|
||||||
|
**/
|
||||||
|
UINTN
|
||||||
|
EFIAPI
|
||||||
|
LeftEncode (
|
||||||
|
OUT UINT8 *EncBuf,
|
||||||
|
IN UINTN Value
|
||||||
|
)
|
||||||
|
{
|
||||||
|
UINT32 BlockNum;
|
||||||
|
UINT32 EncLen;
|
||||||
|
UINT32 Index;
|
||||||
|
UINTN ValueCopy;
|
||||||
|
|
||||||
|
for ( ValueCopy = Value, BlockNum = 0; ValueCopy && (BlockNum < sizeof (UINTN)); ++BlockNum, ValueCopy >>= 8 ) {
|
||||||
|
//
|
||||||
|
// Empty
|
||||||
|
//
|
||||||
|
}
|
||||||
|
|
||||||
|
if (BlockNum == 0) {
|
||||||
|
BlockNum = 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
for (Index = 1; Index <= BlockNum; ++Index) {
|
||||||
|
EncBuf[Index] = (UINT8)(Value >> (8 * (BlockNum - Index)));
|
||||||
|
}
|
||||||
|
|
||||||
|
EncBuf[0] = (UINT8)BlockNum;
|
||||||
|
EncLen = BlockNum + 1;
|
||||||
|
|
||||||
|
return EncLen;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
Encode function from XKCP.
|
||||||
|
|
||||||
|
Encodes the input as a byte string in a way that can be unambiguously parsed
|
||||||
|
from the end of the string by inserting the length of the byte string after
|
||||||
|
the byte string representation of input.
|
||||||
|
|
||||||
|
@param[out] EncBuf Result of right encode.
|
||||||
|
@param[in] Value Input of right encode.
|
||||||
|
|
||||||
|
@retval EncLen Size of encode result in bytes.
|
||||||
|
**/
|
||||||
|
UINTN
|
||||||
|
EFIAPI
|
||||||
|
RightEncode (
|
||||||
|
OUT UINT8 *EncBuf,
|
||||||
|
IN UINTN Value
|
||||||
|
)
|
||||||
|
{
|
||||||
|
UINT32 BlockNum;
|
||||||
|
UINT32 EncLen;
|
||||||
|
UINT32 Index;
|
||||||
|
UINTN ValueCopy;
|
||||||
|
|
||||||
|
for (ValueCopy = Value, BlockNum = 0; ValueCopy && (BlockNum < sizeof (UINTN)); ++BlockNum, ValueCopy >>= 8) {
|
||||||
|
//
|
||||||
|
// Empty
|
||||||
|
//
|
||||||
|
}
|
||||||
|
|
||||||
|
if (BlockNum == 0) {
|
||||||
|
BlockNum = 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
for (Index = 1; Index <= BlockNum; ++Index) {
|
||||||
|
EncBuf[Index-1] = (UINT8)(Value >> (8 * (BlockNum-Index)));
|
||||||
|
}
|
||||||
|
|
||||||
|
EncBuf[BlockNum] = (UINT8)BlockNum;
|
||||||
|
EncLen = BlockNum + 1;
|
||||||
|
|
||||||
|
return EncLen;
|
||||||
|
}
|
@ -13,7 +13,7 @@
|
|||||||
# PEM handler functions, and pseudorandom number generator functions are not
|
# PEM handler functions, and pseudorandom number generator functions are not
|
||||||
# supported in this instance.
|
# supported in this instance.
|
||||||
#
|
#
|
||||||
# Copyright (c) 2010 - 2020, Intel Corporation. All rights reserved.<BR>
|
# Copyright (c) 2010 - 2022, Intel Corporation. All rights reserved.<BR>
|
||||||
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
#
|
#
|
||||||
##
|
##
|
||||||
@ -40,6 +40,7 @@
|
|||||||
Hash/CryptSha256.c
|
Hash/CryptSha256.c
|
||||||
Hash/CryptSm3.c
|
Hash/CryptSm3.c
|
||||||
Hash/CryptSha512.c
|
Hash/CryptSha512.c
|
||||||
|
Hash/CryptParallelHashNull.c
|
||||||
Hmac/CryptHmacSha256.c
|
Hmac/CryptHmacSha256.c
|
||||||
Kdf/CryptHkdf.c
|
Kdf/CryptHkdf.c
|
||||||
Cipher/CryptAesNull.c
|
Cipher/CryptAesNull.c
|
||||||
|
@ -11,7 +11,7 @@
|
|||||||
# functions, PKCS#7 SignedData sign functions, Diffie-Hellman functions, and
|
# functions, PKCS#7 SignedData sign functions, Diffie-Hellman functions, and
|
||||||
# authenticode signature verification functions are not supported in this instance.
|
# authenticode signature verification functions are not supported in this instance.
|
||||||
#
|
#
|
||||||
# Copyright (c) 2009 - 2021, Intel Corporation. All rights reserved.<BR>
|
# Copyright (c) 2009 - 2022, Intel Corporation. All rights reserved.<BR>
|
||||||
# Copyright (c) 2021, Hewlett Packard Enterprise Development LP. All rights reserved.<BR>
|
# Copyright (c) 2021, Hewlett Packard Enterprise Development LP. All rights reserved.<BR>
|
||||||
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
#
|
#
|
||||||
@ -40,6 +40,7 @@
|
|||||||
Hash/CryptSha256.c
|
Hash/CryptSha256.c
|
||||||
Hash/CryptSm3.c
|
Hash/CryptSm3.c
|
||||||
Hash/CryptSha512.c
|
Hash/CryptSha512.c
|
||||||
|
Hash/CryptParallelHashNull.c
|
||||||
Hmac/CryptHmacSha256.c
|
Hmac/CryptHmacSha256.c
|
||||||
Kdf/CryptHkdf.c
|
Kdf/CryptHkdf.c
|
||||||
Cipher/CryptAes.c
|
Cipher/CryptAes.c
|
||||||
|
@ -10,7 +10,7 @@
|
|||||||
# RSA external functions, PKCS#7 SignedData sign functions, Diffie-Hellman functions, and
|
# RSA external functions, PKCS#7 SignedData sign functions, Diffie-Hellman functions, and
|
||||||
# authenticode signature verification functions are not supported in this instance.
|
# authenticode signature verification functions are not supported in this instance.
|
||||||
#
|
#
|
||||||
# Copyright (c) 2010 - 2021, Intel Corporation. All rights reserved.<BR>
|
# Copyright (c) 2010 - 2022, Intel Corporation. All rights reserved.<BR>
|
||||||
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
#
|
#
|
||||||
##
|
##
|
||||||
@ -38,6 +38,10 @@
|
|||||||
Hash/CryptSha256.c
|
Hash/CryptSha256.c
|
||||||
Hash/CryptSm3.c
|
Hash/CryptSm3.c
|
||||||
Hash/CryptSha512.c
|
Hash/CryptSha512.c
|
||||||
|
Hash/CryptSha3.c
|
||||||
|
Hash/CryptXkcp.c
|
||||||
|
Hash/CryptCShake256.c
|
||||||
|
Hash/CryptParallelHash.c
|
||||||
Hmac/CryptHmacSha256.c
|
Hmac/CryptHmacSha256.c
|
||||||
Kdf/CryptHkdfNull.c
|
Kdf/CryptHkdfNull.c
|
||||||
Cipher/CryptAes.c
|
Cipher/CryptAes.c
|
||||||
@ -85,6 +89,8 @@
|
|||||||
OpensslLib
|
OpensslLib
|
||||||
IntrinsicLib
|
IntrinsicLib
|
||||||
PrintLib
|
PrintLib
|
||||||
|
MmServicesTableLib
|
||||||
|
SynchronizationLib
|
||||||
|
|
||||||
#
|
#
|
||||||
# Remove these [BuildOptions] after this library is cleaned up
|
# Remove these [BuildOptions] after this library is cleaned up
|
||||||
|
@ -6,7 +6,7 @@
|
|||||||
# This external input must be validated carefully to avoid security issues such as
|
# This external input must be validated carefully to avoid security issues such as
|
||||||
# buffer overflow or integer overflow.
|
# buffer overflow or integer overflow.
|
||||||
#
|
#
|
||||||
# Copyright (c) 2009 - 2020, Intel Corporation. All rights reserved.<BR>
|
# Copyright (c) 2009 - 2022, Intel Corporation. All rights reserved.<BR>
|
||||||
# Copyright (c) 2020, Hewlett Packard Enterprise Development LP. All rights reserved.<BR>
|
# Copyright (c) 2020, Hewlett Packard Enterprise Development LP. All rights reserved.<BR>
|
||||||
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
#
|
#
|
||||||
@ -34,6 +34,7 @@
|
|||||||
Hash/CryptSha256Null.c
|
Hash/CryptSha256Null.c
|
||||||
Hash/CryptSha512Null.c
|
Hash/CryptSha512Null.c
|
||||||
Hash/CryptSm3Null.c
|
Hash/CryptSm3Null.c
|
||||||
|
Hash/CryptParallelHashNull.c
|
||||||
Hmac/CryptHmacSha256Null.c
|
Hmac/CryptHmacSha256Null.c
|
||||||
Kdf/CryptHkdfNull.c
|
Kdf/CryptHkdfNull.c
|
||||||
Cipher/CryptAesNull.c
|
Cipher/CryptAesNull.c
|
||||||
|
@ -0,0 +1,40 @@
|
|||||||
|
/** @file
|
||||||
|
ParallelHash Implementation which does not provide real capabilities.
|
||||||
|
|
||||||
|
Copyright (c) 2022, Intel Corporation. All rights reserved.<BR>
|
||||||
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
|
||||||
|
**/
|
||||||
|
|
||||||
|
#include "InternalCryptLib.h"
|
||||||
|
|
||||||
|
/**
|
||||||
|
Parallel hash function ParallelHash256, as defined in NIST's Special Publication 800-185,
|
||||||
|
published December 2016.
|
||||||
|
|
||||||
|
@param[in] Input Pointer to the input message (X).
|
||||||
|
@param[in] InputByteLen The number(>0) of input bytes provided for the input data.
|
||||||
|
@param[in] BlockSize The size of each block (B).
|
||||||
|
@param[out] Output Pointer to the output buffer.
|
||||||
|
@param[in] OutputByteLen The desired number of output bytes (L).
|
||||||
|
@param[in] Customization Pointer to the customization string (S).
|
||||||
|
@param[in] CustomByteLen The length of the customization string in bytes.
|
||||||
|
|
||||||
|
@retval FALSE This interface is not supported.
|
||||||
|
|
||||||
|
**/
|
||||||
|
BOOLEAN
|
||||||
|
EFIAPI
|
||||||
|
ParallelHash256HashAll (
|
||||||
|
IN CONST VOID *Input,
|
||||||
|
IN UINTN InputByteLen,
|
||||||
|
IN UINTN BlockSize,
|
||||||
|
OUT VOID *Output,
|
||||||
|
IN UINTN OutputByteLen,
|
||||||
|
IN CONST VOID *Customization,
|
||||||
|
IN UINTN CustomByteLen
|
||||||
|
)
|
||||||
|
{
|
||||||
|
ASSERT (FALSE);
|
||||||
|
return FALSE;
|
||||||
|
}
|
@ -3,7 +3,7 @@
|
|||||||
Protocol/PPI.
|
Protocol/PPI.
|
||||||
|
|
||||||
Copyright (C) Microsoft Corporation. All rights reserved.
|
Copyright (C) Microsoft Corporation. All rights reserved.
|
||||||
Copyright (c) 2019 - 2020, Intel Corporation. All rights reserved.<BR>
|
Copyright (c) 2019 - 2022, Intel Corporation. All rights reserved.<BR>
|
||||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
|
||||||
**/
|
**/
|
||||||
@ -870,6 +870,38 @@ Sha512HashAll (
|
|||||||
CALL_CRYPTO_SERVICE (Sha512HashAll, (Data, DataSize, HashValue), FALSE);
|
CALL_CRYPTO_SERVICE (Sha512HashAll, (Data, DataSize, HashValue), FALSE);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
Parallel hash function ParallelHash256, as defined in NIST's Special Publication 800-185,
|
||||||
|
published December 2016.
|
||||||
|
|
||||||
|
@param[in] Input Pointer to the input message (X).
|
||||||
|
@param[in] InputByteLen The number(>0) of input bytes provided for the input data.
|
||||||
|
@param[in] BlockSize The size of each block (B).
|
||||||
|
@param[out] Output Pointer to the output buffer.
|
||||||
|
@param[in] OutputByteLen The desired number of output bytes (L).
|
||||||
|
@param[in] Customization Pointer to the customization string (S).
|
||||||
|
@param[in] CustomByteLen The length of the customization string in bytes.
|
||||||
|
|
||||||
|
@retval TRUE ParallelHash256 digest computation succeeded.
|
||||||
|
@retval FALSE ParallelHash256 digest computation failed.
|
||||||
|
@retval FALSE This interface is not supported.
|
||||||
|
|
||||||
|
**/
|
||||||
|
BOOLEAN
|
||||||
|
EFIAPI
|
||||||
|
ParallelHash256HashAll (
|
||||||
|
IN CONST VOID *Input,
|
||||||
|
IN UINTN InputByteLen,
|
||||||
|
IN UINTN BlockSize,
|
||||||
|
OUT VOID *Output,
|
||||||
|
IN UINTN OutputByteLen,
|
||||||
|
IN CONST VOID *Customization,
|
||||||
|
IN UINTN CustomByteLen
|
||||||
|
)
|
||||||
|
{
|
||||||
|
CALL_CRYPTO_SERVICE (ParallelHash256HashAll, (Input, InputByteLen, BlockSize, Output, OutputByteLen, Customization, CustomByteLen), FALSE);
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
Retrieves the size, in bytes, of the context buffer required for SM3 hash operations.
|
Retrieves the size, in bytes, of the context buffer required for SM3 hash operations.
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Root include file of C runtime library to support building the third-party
|
Root include file of C runtime library to support building the third-party
|
||||||
cryptographic library.
|
cryptographic library.
|
||||||
|
|
||||||
Copyright (c) 2010 - 2021, Intel Corporation. All rights reserved.<BR>
|
Copyright (c) 2010 - 2022, Intel Corporation. All rights reserved.<BR>
|
||||||
Copyright (c) 2020, Hewlett Packard Enterprise Development LP. All rights reserved.<BR>
|
Copyright (c) 2020, Hewlett Packard Enterprise Development LP. All rights reserved.<BR>
|
||||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
|
||||||
@ -111,6 +111,7 @@ typedef UINT8 u_char;
|
|||||||
typedef UINT32 uid_t;
|
typedef UINT32 uid_t;
|
||||||
typedef UINT32 gid_t;
|
typedef UINT32 gid_t;
|
||||||
typedef CHAR16 wchar_t;
|
typedef CHAR16 wchar_t;
|
||||||
|
typedef UINT64 uint64_t;
|
||||||
|
|
||||||
//
|
//
|
||||||
// File operations are not required for EFI building,
|
// File operations are not required for EFI building,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
This Protocol provides Crypto services to DXE modules
|
This Protocol provides Crypto services to DXE modules
|
||||||
|
|
||||||
Copyright (C) Microsoft Corporation. All rights reserved.
|
Copyright (C) Microsoft Corporation. All rights reserved.
|
||||||
Copyright (c) 2020 - 2021, Intel Corporation. All rights reserved.<BR>
|
Copyright (c) 2020 - 2022, Intel Corporation. All rights reserved.<BR>
|
||||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
|
||||||
**/
|
**/
|
||||||
@ -21,7 +21,7 @@
|
|||||||
/// the EDK II Crypto Protocol is extended, this version define must be
|
/// the EDK II Crypto Protocol is extended, this version define must be
|
||||||
/// increased.
|
/// increased.
|
||||||
///
|
///
|
||||||
#define EDKII_CRYPTO_VERSION 7
|
#define EDKII_CRYPTO_VERSION 8
|
||||||
|
|
||||||
///
|
///
|
||||||
/// EDK II Crypto Protocol forward declaration
|
/// EDK II Crypto Protocol forward declaration
|
||||||
@ -3457,6 +3457,35 @@ BOOLEAN
|
|||||||
IN UINT16 SaltLen
|
IN UINT16 SaltLen
|
||||||
);
|
);
|
||||||
|
|
||||||
|
/**
|
||||||
|
Parallel hash function ParallelHash256, as defined in NIST's Special Publication 800-185,
|
||||||
|
published December 2016.
|
||||||
|
|
||||||
|
@param[in] Input Pointer to the input message (X).
|
||||||
|
@param[in] InputByteLen The number(>0) of input bytes provided for the input data.
|
||||||
|
@param[in] BlockSize The size of each block (B).
|
||||||
|
@param[out] Output Pointer to the output buffer.
|
||||||
|
@param[in] OutputByteLen The desired number of output bytes (L).
|
||||||
|
@param[in] Customization Pointer to the customization string (S).
|
||||||
|
@param[in] CustomByteLen The length of the customization string in bytes.
|
||||||
|
|
||||||
|
@retval TRUE ParallelHash256 digest computation succeeded.
|
||||||
|
@retval FALSE ParallelHash256 digest computation failed.
|
||||||
|
@retval FALSE This interface is not supported.
|
||||||
|
|
||||||
|
**/
|
||||||
|
typedef
|
||||||
|
BOOLEAN
|
||||||
|
(EFIAPI *EDKII_CRYPTO_PARALLEL_HASH_ALL)(
|
||||||
|
IN CONST VOID *Input,
|
||||||
|
IN UINTN InputByteLen,
|
||||||
|
IN UINTN BlockSize,
|
||||||
|
OUT VOID *Output,
|
||||||
|
IN UINTN OutputByteLen,
|
||||||
|
IN CONST VOID *Customization,
|
||||||
|
IN UINTN CustomByteLen
|
||||||
|
);
|
||||||
|
|
||||||
///
|
///
|
||||||
/// EDK II Crypto Protocol
|
/// EDK II Crypto Protocol
|
||||||
///
|
///
|
||||||
@ -3644,6 +3673,8 @@ struct _EDKII_CRYPTO_PROTOCOL {
|
|||||||
/// RSA PSS
|
/// RSA PSS
|
||||||
EDKII_CRYPTO_RSA_PSS_SIGN RsaPssSign;
|
EDKII_CRYPTO_RSA_PSS_SIGN RsaPssSign;
|
||||||
EDKII_CRYPTO_RSA_PSS_VERIFY RsaPssVerify;
|
EDKII_CRYPTO_RSA_PSS_VERIFY RsaPssVerify;
|
||||||
|
/// Parallel hash
|
||||||
|
EDKII_CRYPTO_PARALLEL_HASH_ALL ParallelHash256HashAll;
|
||||||
};
|
};
|
||||||
|
|
||||||
extern GUID gEdkiiCryptoProtocolGuid;
|
extern GUID gEdkiiCryptoProtocolGuid;
|
||||||
|
@ -2,6 +2,7 @@
|
|||||||
# CryptoPkg DSC file used to build host-based unit tests.
|
# CryptoPkg DSC file used to build host-based unit tests.
|
||||||
#
|
#
|
||||||
# Copyright (c) Microsoft Corporation.<BR>
|
# Copyright (c) Microsoft Corporation.<BR>
|
||||||
|
# Copyright (c) 2022, Intel Corporation. All rights reserved.<BR>
|
||||||
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
#
|
#
|
||||||
##
|
##
|
||||||
@ -21,6 +22,9 @@
|
|||||||
[LibraryClasses]
|
[LibraryClasses]
|
||||||
OpensslLib|CryptoPkg/Library/OpensslLib/OpensslLib.inf
|
OpensslLib|CryptoPkg/Library/OpensslLib/OpensslLib.inf
|
||||||
BaseCryptLib|CryptoPkg/Library/BaseCryptLib/UnitTestHostBaseCryptLib.inf
|
BaseCryptLib|CryptoPkg/Library/BaseCryptLib/UnitTestHostBaseCryptLib.inf
|
||||||
|
MmServicesTableLib|MdePkg/Library/MmServicesTableLib/MmServicesTableLib.inf
|
||||||
|
SynchronizationLib|MdePkg/Library/BaseSynchronizationLib/BaseSynchronizationLib.inf
|
||||||
|
TimerLib|MdePkg/Library/BaseTimerLibNullTemplate/BaseTimerLibNullTemplate.inf
|
||||||
|
|
||||||
[LibraryClasses.AARCH64, LibraryClasses.ARM]
|
[LibraryClasses.AARCH64, LibraryClasses.ARM]
|
||||||
RngLib|MdePkg/Library/BaseRngLibNull/BaseRngLibNull.inf
|
RngLib|MdePkg/Library/BaseRngLibNull/BaseRngLibNull.inf
|
||||||
|
145
CryptoPkg/Test/UnitTest/Library/BaseCryptLib/ParallelhashTests.c
Normal file
145
CryptoPkg/Test/UnitTest/Library/BaseCryptLib/ParallelhashTests.c
Normal file
@ -0,0 +1,145 @@
|
|||||||
|
/** @file
|
||||||
|
Application for Parallelhash Function Validation.
|
||||||
|
|
||||||
|
Copyright (c) 2022, Intel Corporation. All rights reserved.<BR>
|
||||||
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
|
|
||||||
|
**/
|
||||||
|
|
||||||
|
#include "TestBaseCryptLib.h"
|
||||||
|
|
||||||
|
//
|
||||||
|
// Parallelhash Test Sample common parameters.
|
||||||
|
//
|
||||||
|
GLOBAL_REMOVE_IF_UNREFERENCED CONST UINTN OutputByteLen = 64;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Parallelhash Test Sample #1 from NIST Special Publication 800-185.
|
||||||
|
//
|
||||||
|
GLOBAL_REMOVE_IF_UNREFERENCED CONST UINT8 InputSample1[] = {
|
||||||
|
// input data of sample1.
|
||||||
|
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
|
||||||
|
0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27
|
||||||
|
};
|
||||||
|
GLOBAL_REMOVE_IF_UNREFERENCED UINTN InputSample1ByteLen = 24; // Length of sample1 input data in bytes.
|
||||||
|
GLOBAL_REMOVE_IF_UNREFERENCED CONST VOID *CustomizationSample1 = ""; // Customization string (S) of sample1.
|
||||||
|
GLOBAL_REMOVE_IF_UNREFERENCED UINTN CustomSample1ByteLen = 0; // Customization string length of sample1 in bytes.
|
||||||
|
GLOBAL_REMOVE_IF_UNREFERENCED UINTN BlockSizeSample1 = 8; // Block size of sample1.
|
||||||
|
GLOBAL_REMOVE_IF_UNREFERENCED CONST UINT8 ExpectOutputSample1[] = {
|
||||||
|
// Expected output data of sample1.
|
||||||
|
0xbc, 0x1e, 0xf1, 0x24, 0xda, 0x34, 0x49, 0x5e, 0x94, 0x8e, 0xad, 0x20, 0x7d, 0xd9, 0x84, 0x22,
|
||||||
|
0x35, 0xda, 0x43, 0x2d, 0x2b, 0xbc, 0x54, 0xb4, 0xc1, 0x10, 0xe6, 0x4c, 0x45, 0x11, 0x05, 0x53,
|
||||||
|
0x1b, 0x7f, 0x2a, 0x3e, 0x0c, 0xe0, 0x55, 0xc0, 0x28, 0x05, 0xe7, 0xc2, 0xde, 0x1f, 0xb7, 0x46,
|
||||||
|
0xaf, 0x97, 0xa1, 0xd0, 0x01, 0xf4, 0x3b, 0x82, 0x4e, 0x31, 0xb8, 0x76, 0x12, 0x41, 0x04, 0x29
|
||||||
|
};
|
||||||
|
|
||||||
|
//
|
||||||
|
// Parallelhash Test Sample #2 from NIST Special Publication 800-185.
|
||||||
|
//
|
||||||
|
GLOBAL_REMOVE_IF_UNREFERENCED CONST UINT8 *InputSample2 = InputSample1; // Input of sample2 is same as sample1.
|
||||||
|
GLOBAL_REMOVE_IF_UNREFERENCED UINTN InputSample2ByteLen = 24; // Length of sample2 input data in bytes.
|
||||||
|
GLOBAL_REMOVE_IF_UNREFERENCED CONST VOID *CustomizationSample2 = "Parallel Data"; // Customization string (S) of sample2.
|
||||||
|
GLOBAL_REMOVE_IF_UNREFERENCED UINTN CustomSample2ByteLen = 13; // Customization string length of sample2 in bytes.
|
||||||
|
GLOBAL_REMOVE_IF_UNREFERENCED UINTN BlockSizeSample2 = 8; // Block size of sample2.
|
||||||
|
GLOBAL_REMOVE_IF_UNREFERENCED CONST UINT8 ExpectOutputSample2[] = {
|
||||||
|
// Expected output data of sample2.
|
||||||
|
0xcd, 0xf1, 0x52, 0x89, 0xb5, 0x4f, 0x62, 0x12, 0xb4, 0xbc, 0x27, 0x05, 0x28, 0xb4, 0x95, 0x26,
|
||||||
|
0x00, 0x6d, 0xd9, 0xb5, 0x4e, 0x2b, 0x6a, 0xdd, 0x1e, 0xf6, 0x90, 0x0d, 0xda, 0x39, 0x63, 0xbb,
|
||||||
|
0x33, 0xa7, 0x24, 0x91, 0xf2, 0x36, 0x96, 0x9c, 0xa8, 0xaf, 0xae, 0xa2, 0x9c, 0x68, 0x2d, 0x47,
|
||||||
|
0xa3, 0x93, 0xc0, 0x65, 0xb3, 0x8e, 0x29, 0xfa, 0xe6, 0x51, 0xa2, 0x09, 0x1c, 0x83, 0x31, 0x10
|
||||||
|
};
|
||||||
|
|
||||||
|
//
|
||||||
|
// Parallelhash Test Sample #3 from NIST Special Publication 800-185.
|
||||||
|
//
|
||||||
|
GLOBAL_REMOVE_IF_UNREFERENCED CONST UINT8 InputSample3[] = {
|
||||||
|
// input data of sample3.
|
||||||
|
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x10, 0x11, 0x12, 0x13,
|
||||||
|
0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27,
|
||||||
|
0x28, 0x29, 0x2a, 0x2b, 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 0x38, 0x39, 0x3a, 0x3b,
|
||||||
|
0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, 0x49, 0x4a, 0x4b, 0x50, 0x51, 0x52, 0x53,
|
||||||
|
0x54, 0x55, 0x56, 0x57, 0x58, 0x59, 0x5a, 0x5b
|
||||||
|
};
|
||||||
|
GLOBAL_REMOVE_IF_UNREFERENCED UINTN InputSample3ByteLen = 72; // Length of sample3 input data in bytes.
|
||||||
|
GLOBAL_REMOVE_IF_UNREFERENCED CONST VOID *CustomizationSample3 = "Parallel Data"; // Customization string (S) of sample3.
|
||||||
|
GLOBAL_REMOVE_IF_UNREFERENCED UINTN CustomSample3ByteLen = 13; // Customization string length of sample3 in bytes.
|
||||||
|
GLOBAL_REMOVE_IF_UNREFERENCED UINTN BlockSizeSample3 = 12; // Block size of sample3.
|
||||||
|
GLOBAL_REMOVE_IF_UNREFERENCED CONST UINT8 ExpectOutputSample3[] = {
|
||||||
|
// Expected output data of sample3.
|
||||||
|
0x69, 0xd0, 0xfc, 0xb7, 0x64, 0xea, 0x05, 0x5d, 0xd0, 0x93, 0x34, 0xbc, 0x60, 0x21, 0xcb, 0x7e,
|
||||||
|
0x4b, 0x61, 0x34, 0x8d, 0xff, 0x37, 0x5d, 0xa2, 0x62, 0x67, 0x1c, 0xde, 0xc3, 0xef, 0xfa, 0x8d,
|
||||||
|
0x1b, 0x45, 0x68, 0xa6, 0xcc, 0xe1, 0x6b, 0x1c, 0xad, 0x94, 0x6d, 0xdd, 0xe2, 0x7f, 0x6c, 0xe2,
|
||||||
|
0xb8, 0xde, 0xe4, 0xcd, 0x1b, 0x24, 0x85, 0x1e, 0xbf, 0x00, 0xeb, 0x90, 0xd4, 0x38, 0x13, 0xe9
|
||||||
|
};
|
||||||
|
|
||||||
|
UNIT_TEST_STATUS
|
||||||
|
EFIAPI
|
||||||
|
TestVerifyParallelHash256HashAll (
|
||||||
|
IN UNIT_TEST_CONTEXT Context
|
||||||
|
)
|
||||||
|
{
|
||||||
|
BOOLEAN Status;
|
||||||
|
UINT8 Output[64];
|
||||||
|
|
||||||
|
//
|
||||||
|
// Test #1 using sample1.
|
||||||
|
//
|
||||||
|
Status = ParallelHash256HashAll (
|
||||||
|
InputSample1,
|
||||||
|
InputSample1ByteLen,
|
||||||
|
BlockSizeSample1,
|
||||||
|
Output,
|
||||||
|
OutputByteLen,
|
||||||
|
CustomizationSample1,
|
||||||
|
CustomSample1ByteLen
|
||||||
|
);
|
||||||
|
UT_ASSERT_TRUE (Status);
|
||||||
|
|
||||||
|
// Check the output with the expected output.
|
||||||
|
UT_ASSERT_MEM_EQUAL (Output, ExpectOutputSample1, OutputByteLen);
|
||||||
|
|
||||||
|
//
|
||||||
|
// Test #2 using sample2.
|
||||||
|
//
|
||||||
|
Status = ParallelHash256HashAll (
|
||||||
|
InputSample2,
|
||||||
|
InputSample2ByteLen,
|
||||||
|
BlockSizeSample2,
|
||||||
|
Output,
|
||||||
|
OutputByteLen,
|
||||||
|
CustomizationSample2,
|
||||||
|
CustomSample2ByteLen
|
||||||
|
);
|
||||||
|
UT_ASSERT_TRUE (Status);
|
||||||
|
|
||||||
|
// Check the output with the expected output.
|
||||||
|
UT_ASSERT_MEM_EQUAL (Output, ExpectOutputSample2, OutputByteLen);
|
||||||
|
|
||||||
|
//
|
||||||
|
// Test #3 using sample3.
|
||||||
|
//
|
||||||
|
Status = ParallelHash256HashAll (
|
||||||
|
InputSample3,
|
||||||
|
InputSample3ByteLen,
|
||||||
|
BlockSizeSample3,
|
||||||
|
Output,
|
||||||
|
OutputByteLen,
|
||||||
|
CustomizationSample3,
|
||||||
|
CustomSample3ByteLen
|
||||||
|
);
|
||||||
|
UT_ASSERT_TRUE (Status);
|
||||||
|
|
||||||
|
// Check the output with the expected output.
|
||||||
|
UT_ASSERT_MEM_EQUAL (Output, ExpectOutputSample3, OutputByteLen);
|
||||||
|
|
||||||
|
return EFI_SUCCESS;
|
||||||
|
}
|
||||||
|
|
||||||
|
TEST_DESC mParallelhashTest[] = {
|
||||||
|
//
|
||||||
|
// -----Description------------------------------Class----------------------Function-----------------Pre---Post--Context
|
||||||
|
//
|
||||||
|
{ "TestVerifyParallelHash256HashAll()", "CryptoPkg.BaseCryptLib.ParallelHash256HashAll", TestVerifyParallelHash256HashAll, NULL, NULL, NULL },
|
||||||
|
};
|
||||||
|
|
||||||
|
UINTN mParallelhashTestNum = ARRAY_SIZE (mParallelhashTest);
|
@ -2,6 +2,7 @@
|
|||||||
# Host-based UnitTest for BaseCryptLib
|
# Host-based UnitTest for BaseCryptLib
|
||||||
#
|
#
|
||||||
# Copyright (c) Microsoft Corporation.<BR>
|
# Copyright (c) Microsoft Corporation.<BR>
|
||||||
|
# Copyright (c) 2022, Intel Corporation. All rights reserved.<BR>
|
||||||
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||||
##
|
##
|
||||||
|
|
||||||
@ -35,6 +36,7 @@
|
|||||||
Pkcs7EkuTests.c
|
Pkcs7EkuTests.c
|
||||||
OaepEncryptTests.c
|
OaepEncryptTests.c
|
||||||
RsaPssTests.c
|
RsaPssTests.c
|
||||||
|
ParallelhashTests.c
|
||||||
|
|
||||||
[Packages]
|
[Packages]
|
||||||
MdePkg/MdePkg.dec
|
MdePkg/MdePkg.dec
|
||||||
@ -45,3 +47,5 @@
|
|||||||
DebugLib
|
DebugLib
|
||||||
BaseCryptLib
|
BaseCryptLib
|
||||||
UnitTestLib
|
UnitTestLib
|
||||||
|
MmServicesTableLib
|
||||||
|
SynchronizationLib
|
||||||
|
Reference in New Issue
Block a user