blob: b8ace8a1b8cc621ad3b498ebc30760b87d4faef1 [file] [log] [blame]
/*############################################################################
# Copyright 1999-2018 Intel Corporation
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
############################################################################*/
/*
//
// Purpose:
// Cryptography Primitive.
// PRNG Functions
//
// Contents:
// ippsPRNGen()
// ippsPRNGen_BN()
//
//
*/
#include "owndefs.h"
#include "owncp.h"
#include "pcpbn.h"
#include "pcphash.h"
#include "pcpprng.h"
#include "pcptool.h"
/*
// G() function based on SHA1
//
// Parameters:
// T 160 bit parameter
// pHexStr input hex string
// hexStrLen size of hex string (Ipp8u segnments)
// xBNU 160 bit BNU result
//
// Note 1:
// must to be hexStrLen <= 64 (512 bits)
*/
static
void SHA1_G(Ipp32u* xBNU, const Ipp32u* T, Ipp8u* pHexStr, int hexStrLen)
{
/* select processing function */
cpHashProc updateFunc;
#if (_SHA_NI_ENABLING_==_FEATURE_ON_)
updateFunc = UpdateSHA1ni;
#elif (_SHA_NI_ENABLING_==_FEATURE_TICKTOCK_)
updateFunc = IsFeatureEnabled(SHA_NI_ENABLED)? UpdateSHA1ni : UpdateSHA1;
#else
updateFunc = UpdateSHA1;
#endif
/* pad HexString zeros */
PaddBlock(0, pHexStr+hexStrLen, BITS2WORD8_SIZE(MAX_XKEY_SIZE)-hexStrLen);
/* reset initial HASH value */
xBNU[0] = T[0];
xBNU[1] = T[1];
xBNU[2] = T[2];
xBNU[3] = T[3];
xBNU[4] = T[4];
/* SHA1 */
//UpdateSHA1(xBNU, pHexStr, BITS2WORD8_SIZE(MAX_XKEY_SIZE), SHA1_cnt);
updateFunc(xBNU, pHexStr, BITS2WORD8_SIZE(MAX_XKEY_SIZE), SHA1_cnt);
/* swap back */
SWAP(xBNU[0],xBNU[4]);
SWAP(xBNU[1],xBNU[3]);
}
/*
// Returns bitsize of the bitstring has beed added
*/
int cpPRNGen(Ipp32u* pRand, cpSize nBits, IppsPRNGState* pRnd)
{
BNU_CHUNK_T Xj [BITS_BNU_CHUNK(MAX_XKEY_SIZE)];
BNU_CHUNK_T XVAL[BITS_BNU_CHUNK(MAX_XKEY_SIZE)];
Ipp8u TXVAL[BITS2WORD8_SIZE(MAX_XKEY_SIZE)];
/* XKEY length in BNU_CHUNK_T */
cpSize xKeyLen = BITS_BNU_CHUNK(RAND_SEEDBITS(pRnd));
/* XKEY length in bytes */
cpSize xKeySize= BITS2WORD8_SIZE(RAND_SEEDBITS(pRnd));
/* XKEY word's mask */
BNU_CHUNK_T xKeyMsk = MASK_BNU_CHUNK(RAND_SEEDBITS(pRnd));
/* number of Ipp32u chunks to be generated */
cpSize genlen = BITS2WORD32_SIZE(nBits);
ZEXPAND_BNU(Xj, 0, BITS_BNU_CHUNK(MAX_XKEY_SIZE));
ZEXPAND_BNU(XVAL, 0, BITS_BNU_CHUNK(MAX_XKEY_SIZE));
while(genlen) {
cpSize len;
/* Step 1: XVAL=(Xkey+Xseed) mod 2^b */
BNU_CHUNK_T carry = cpAdd_BNU(XVAL, RAND_XKEY(pRnd), RAND_XAUGMENT(pRnd), xKeyLen);
XVAL[xKeyLen-1] &= xKeyMsk;
/* Step 2: xj=G(t, XVAL) mod Q */
cpToOctStr_BNU(TXVAL, xKeySize, XVAL, xKeyLen);
SHA1_G((Ipp32u*)Xj, (Ipp32u*)RAND_T(pRnd), TXVAL, xKeySize);
{
cpSize sizeXj = BITS_BNU_CHUNK(160);
if(0 <= cpCmp_BNU(Xj, BITS_BNU_CHUNK(IPP_SHA1_DIGEST_BITSIZE), RAND_Q(pRnd),BITS_BNU_CHUNK(IPP_SHA1_DIGEST_BITSIZE)) )
sizeXj = cpMod_BNU(Xj, BITS_BNU_CHUNK(IPP_SHA1_DIGEST_BITSIZE), RAND_Q(pRnd), BITS_BNU_CHUNK(IPP_SHA1_DIGEST_BITSIZE));
FIX_BNU(Xj, sizeXj);
ZEXPAND_BNU(Xj, sizeXj, BITS_BNU_CHUNK(MAX_XKEY_SIZE));
}
/* Step 3: Xkey=(1+Xkey+Xj) mod 2^b */
cpInc_BNU(RAND_XKEY(pRnd), RAND_XKEY(pRnd), xKeyLen, 1);
carry = cpAdd_BNU(RAND_XKEY(pRnd), RAND_XKEY(pRnd), Xj, xKeyLen);
RAND_XKEY(pRnd)[xKeyLen-1] &= xKeyMsk;
/* fill out result */
len = genlen<BITS2WORD32_SIZE(IPP_SHA1_DIGEST_BITSIZE)? genlen : BITS2WORD32_SIZE(IPP_SHA1_DIGEST_BITSIZE);
COPY_BNU(pRand, (Ipp32u*)Xj, len);
pRand += len;
genlen -= len;
}
return nBits;
}
/* generates random string of specified bitSize length
returns:
1 random bit string generated
-1 detected internal error (ippStsNoErr != rndFunc())
*/
int cpPRNGenPattern(BNU_CHUNK_T* pRand, int bitSize,
BNU_CHUNK_T botPattern, BNU_CHUNK_T topPattern,
IppBitSupplier rndFunc, void* pRndParam)
{
BNU_CHUNK_T topMask = MASK_BNU_CHUNK(bitSize);
cpSize randLen = BITS_BNU_CHUNK(bitSize);
IppStatus sts = rndFunc((Ipp32u*)pRand, bitSize, pRndParam);
if(ippStsNoErr!=sts) return -1;
pRand[randLen-1] &= topMask;
pRand[0] |= botPattern;
pRand[randLen-1] |= topPattern;
return 1;
}
/* generates random string of specified bitSize length
within specified ragnge lo < r < Hi
returns:
0 random bit string not generated
1 random bit string generated
-1 detected internal error (ippStsNoErr != rndFunc())
*/
int cpPRNGenRange(BNU_CHUNK_T* pRand,
const BNU_CHUNK_T* pLo, cpSize loLen,
const BNU_CHUNK_T* pHi, cpSize hiLen,
IppBitSupplier rndFunc, void* pRndParam)
{
int bitSize = BITSIZE_BNU(pHi,hiLen);
BNU_CHUNK_T topMask = MASK_BNU_CHUNK(bitSize);
#define MAX_COUNT (1000)
int n;
for(n=0; n<MAX_COUNT; n++) {
cpSize randLen;
IppStatus sts = rndFunc((Ipp32u*)pRand, bitSize, pRndParam);
if(ippStsNoErr!=sts) return -1;
pRand[hiLen-1] &= topMask;
randLen = cpFix_BNU(pRand, hiLen);
if((0 < cpCmp_BNU(pRand, randLen, pLo, loLen)) && (0 < cpCmp_BNU(pHi, hiLen, pRand, randLen)))
return 1;
}
#undef MAX_COUNT
return 0; /* no random matched to (Lo,Hi) */
}
/*F*
// Name: ippsPRNGen
//
// Purpose: Generates a pseudorandom bit sequence of the specified nBits length.
//
// Returns: Reason:
// ippStsNullPtrErr NULL == pRnd
// NULL == pBuffer
//
// ippStsContextMatchErr illegal pRnd->idCtx
//
// ippStsLengthErr 1 > nBits
//
// ippStsNoErr no error
//
// Parameters:
// pBuffer pointer to the buffer
// nBits number of bits be requested
// pRndCtx pointer to the context
*F*/
IPPFUN(IppStatus, ippsPRNGen,(Ipp32u* pBuffer, cpSize nBits, void* pRnd))
{
IppsPRNGState* pRndCtx = (IppsPRNGState*)pRnd;
/* test PRNG context */
IPP_BAD_PTR2_RET(pBuffer, pRnd);
pRndCtx = (IppsPRNGState*)( IPP_ALIGNED_PTR(pRndCtx, PRNG_ALIGNMENT) );
IPP_BADARG_RET(!RAND_VALID_ID(pRndCtx), ippStsContextMatchErr);
/* test sizes */
IPP_BADARG_RET(nBits< 1, ippStsLengthErr);
{
cpSize rndSize = BITS2WORD32_SIZE(nBits);
Ipp32u rndMask = MAKEMASK32(nBits);
cpPRNGen(pBuffer, nBits, pRndCtx);
pBuffer[rndSize-1] &= rndMask;
return ippStsNoErr;
}
}
/*F*
// Name: ippsPRNGen_BN
//
// Purpose: Generates a pseudorandom big number of the specified nBits length.
//
// Returns: Reason:
// ippStsNullPtrErr NULL == pRnd
// NULL == pRandBN
//
// ippStsContextMatchErr illegal pRnd->idCtx
// illegal pRandBN->idCtx
//
// ippStsLengthErr 1 > nBits
// nBits > BN_ROOM(pRandBN)
//
// ippStsNoErr no error
//
// Parameters:
// pRandBN pointer to the BN random
// nBits number of bits be requested
// pRndCtx pointer to the context
*F*/
IPPFUN(IppStatus, ippsPRNGen_BN,(IppsBigNumState* pRandBN, int nBits, void* pRnd))
{
IppsPRNGState* pRndCtx;
/* test PRNG context */
IPP_BAD_PTR1_RET(pRnd);
pRndCtx = (IppsPRNGState*)( IPP_ALIGNED_PTR(pRnd, PRNG_ALIGNMENT) );
IPP_BADARG_RET(!RAND_VALID_ID(pRndCtx), ippStsContextMatchErr);
/* test random BN */
IPP_BAD_PTR1_RET(pRandBN);
pRandBN = (IppsBigNumState*)( IPP_ALIGNED_PTR(pRandBN, BN_ALIGNMENT) );
IPP_BADARG_RET(!BN_VALID_ID(pRandBN), ippStsContextMatchErr);
/* test sizes */
IPP_BADARG_RET(nBits< 1, ippStsLengthErr);
IPP_BADARG_RET(nBits> BN_ROOM(pRandBN)*BNU_CHUNK_BITS, ippStsLengthErr);
{
BNU_CHUNK_T* pRand = BN_NUMBER(pRandBN);
cpSize rndSize = BITS_BNU_CHUNK(nBits);
BNU_CHUNK_T rndMask = MASK_BNU_CHUNK(nBits);
cpPRNGen((Ipp32u*)pRand, nBits, pRndCtx);
pRand[rndSize-1] &= rndMask;
FIX_BNU(pRand, rndSize);
BN_SIZE(pRandBN) = rndSize;
BN_SIGN(pRandBN) = ippBigNumPOS;
return ippStsNoErr;
}
}