/******************************************************************************* * Copyright 2004-2018 Intel Corporation * All Rights Reserved. * * If this software was obtained under the Intel Simplified Software License, * the following terms apply: * * The source code, information and material ("Material") contained herein is * owned by Intel Corporation or its suppliers or licensors, and title to such * Material remains with Intel Corporation or its suppliers or licensors. The * Material contains proprietary information of Intel or its suppliers and * licensors. The Material is protected by worldwide copyright laws and treaty * provisions. No part of the Material may be used, copied, reproduced, * modified, published, uploaded, posted, transmitted, distributed or disclosed * in any way without Intel's prior express written permission. No license under * any patent, copyright or other intellectual property rights in the Material * is granted to or conferred upon you, either expressly, by implication, * inducement, estoppel or otherwise. Any license under such intellectual * property rights must be express and approved by Intel in writing. * * Unless otherwise agreed by Intel in writing, you may not remove or alter this * notice or any other notice embedded in Materials by Intel or Intel's * suppliers or licensors in any way. * * * If this software was obtained under the Apache License, Version 2.0 (the * "License"), the following terms apply: * * You may not use this file except in compliance with the License. You may * obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 * * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * * See the License for the specific language governing permissions and * limitations under the License. *******************************************************************************/ /* // // Purpose: // Cryptography Primitive. // PRNG Functions // // Contents: // cpPRNGen() // */ #include "owndefs.h" #include "owncp.h" #include "pcpbn.h" #include "pcphash.h" #include "pcpprng.h" #include "pcptool.h" /* // G() function based on SHA1 // // Parameters: // T 160 bit parameter // pHexStr input hex string // hexStrLen size of hex string (Ipp8u segnments) // xBNU 160 bit BNU result // // Note 1: // must to be hexStrLen <= 64 (512 bits) */ static void SHA1_G(Ipp32u* xBNU, const Ipp32u* T, Ipp8u* pHexStr, int hexStrLen) { /* select processing function */ cpHashProc updateFunc; #if (_SHA_NI_ENABLING_==_FEATURE_ON_) updateFunc = UpdateSHA1ni; #elif (_SHA_NI_ENABLING_==_FEATURE_TICKTOCK_) updateFunc = IsFeatureEnabled(ippCPUID_SHA)? UpdateSHA1ni : UpdateSHA1; #else updateFunc = UpdateSHA1; #endif /* pad HexString zeros */ PaddBlock(0, pHexStr+hexStrLen, BITS2WORD8_SIZE(MAX_XKEY_SIZE)-hexStrLen); /* reset initial HASH value */ xBNU[0] = T[0]; xBNU[1] = T[1]; xBNU[2] = T[2]; xBNU[3] = T[3]; xBNU[4] = T[4]; /* SHA1 */ //UpdateSHA1(xBNU, pHexStr, BITS2WORD8_SIZE(MAX_XKEY_SIZE), SHA1_cnt); updateFunc(xBNU, pHexStr, BITS2WORD8_SIZE(MAX_XKEY_SIZE), SHA1_cnt); /* swap back */ SWAP(xBNU[0],xBNU[4]); SWAP(xBNU[1],xBNU[3]); } /*F* // Name: cpPRNGen // // Purpose: Returns bitsize of the bitstring has beed added // // Returns: // bitsize of the bitstring has beed added // // Parameters: // pRand pointer to the buffer // nBits number of bits be requested // pRnd pointer to the context *F*/ int cpPRNGen(Ipp32u* pRand, cpSize nBits, IppsPRNGState* pRnd) { BNU_CHUNK_T Xj [BITS_BNU_CHUNK(MAX_XKEY_SIZE)]; BNU_CHUNK_T XVAL[BITS_BNU_CHUNK(MAX_XKEY_SIZE)]; Ipp8u TXVAL[BITS2WORD8_SIZE(MAX_XKEY_SIZE)]; /* XKEY length in BNU_CHUNK_T */ cpSize xKeyLen = BITS_BNU_CHUNK(RAND_SEEDBITS(pRnd)); /* XKEY length in bytes */ cpSize xKeySize= BITS2WORD8_SIZE(RAND_SEEDBITS(pRnd)); /* XKEY word's mask */ BNU_CHUNK_T xKeyMsk = MASK_BNU_CHUNK(RAND_SEEDBITS(pRnd)); /* number of Ipp32u chunks to be generated */ cpSize genlen = BITS2WORD32_SIZE(nBits); ZEXPAND_BNU(Xj, 0, BITS_BNU_CHUNK(MAX_XKEY_SIZE)); ZEXPAND_BNU(XVAL, 0, BITS_BNU_CHUNK(MAX_XKEY_SIZE)); while(genlen) { cpSize len; /* Step 1: XVAL=(Xkey+Xseed) mod 2^b */ BNU_CHUNK_T carry = cpAdd_BNU(XVAL, RAND_XKEY(pRnd), RAND_XAUGMENT(pRnd), xKeyLen); XVAL[xKeyLen-1] &= xKeyMsk; /* Step 2: xj=G(t, XVAL) mod Q */ cpToOctStr_BNU(TXVAL, xKeySize, XVAL, xKeyLen); SHA1_G((Ipp32u*)Xj, (Ipp32u*)RAND_T(pRnd), TXVAL, xKeySize); { cpSize sizeXj = BITS_BNU_CHUNK(160); if(0 <= cpCmp_BNU(Xj, BITS_BNU_CHUNK(IPP_SHA1_DIGEST_BITSIZE), RAND_Q(pRnd),BITS_BNU_CHUNK(IPP_SHA1_DIGEST_BITSIZE)) ) sizeXj = cpMod_BNU(Xj, BITS_BNU_CHUNK(IPP_SHA1_DIGEST_BITSIZE), RAND_Q(pRnd), BITS_BNU_CHUNK(IPP_SHA1_DIGEST_BITSIZE)); FIX_BNU(Xj, sizeXj); ZEXPAND_BNU(Xj, sizeXj, BITS_BNU_CHUNK(MAX_XKEY_SIZE)); } /* Step 3: Xkey=(1+Xkey+Xj) mod 2^b */ cpInc_BNU(RAND_XKEY(pRnd), RAND_XKEY(pRnd), xKeyLen, 1); carry = cpAdd_BNU(RAND_XKEY(pRnd), RAND_XKEY(pRnd), Xj, xKeyLen); RAND_XKEY(pRnd)[xKeyLen-1] &= xKeyMsk; /* fill out result */ len = genlen