Ви не можете вибрати більше 25 тем Теми мають розпочинатися з літери або цифри, можуть містити дефіси (-) і не повинні перевищувати 35 символів.

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142
  1. /*
  2. * Copyright (C) 2012 Michael Brown <mbrown@fensystems.co.uk>.
  3. *
  4. * This program is free software; you can redistribute it and/or
  5. * modify it under the terms of the GNU General Public License as
  6. * published by the Free Software Foundation; either version 2 of the
  7. * License, or any later version.
  8. *
  9. * This program is distributed in the hope that it will be useful, but
  10. * WITHOUT ANY WARRANTY; without even the implied warranty of
  11. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  12. * General Public License for more details.
  13. *
  14. * You should have received a copy of the GNU General Public License
  15. * along with this program; if not, write to the Free Software
  16. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
  17. * 02110-1301, USA.
  18. *
  19. * You can also choose to distribute this program under the terms of
  20. * the Unmodified Binary Distribution Licence (as given in the file
  21. * COPYING.UBDL), provided that you have satisfied its requirements.
  22. */
  23. FILE_LICENCE ( GPL2_OR_LATER_OR_UBDL );
  24. /** @file
  25. *
  26. * Hash-based derivation function (Hash_df)
  27. *
  28. * This algorithm is designed to comply with ANS X9.82 Part 3-2007
  29. * Section 10.5.2. This standard is not freely available, but most of
  30. * the text appears to be shared with NIST SP 800-90, which can be
  31. * downloaded from
  32. *
  33. * http://csrc.nist.gov/publications/nistpubs/800-90/SP800-90revised_March2007.pdf
  34. *
  35. * Where possible, references are given to both documents. In the
  36. * case of any disagreement, ANS X9.82 takes priority over NIST SP
  37. * 800-90. (In particular, note that some algorithms that are
  38. * Approved by NIST SP 800-90 are not Approved by ANS X9.82.)
  39. */
  40. #include <stdint.h>
  41. #include <string.h>
  42. #include <assert.h>
  43. #include <byteswap.h>
  44. #include <ipxe/crypto.h>
  45. #include <ipxe/hash_df.h>
  46. /**
  47. * Distribute entropy throughout a buffer
  48. *
  49. * @v hash Underlying hash algorithm
  50. * @v input Input data
  51. * @v input_len Length of input data, in bytes
  52. * @v output Output buffer
  53. * @v output_len Length of output buffer, in bytes
  54. *
  55. * This is the Hash_df function defined in ANS X9.82 Part 3-2007
  56. * Section 10.5.2 (NIST SP 800-90 Section 10.4.1).
  57. *
  58. * The number of bits requested is implicit in the length of the
  59. * output buffer. Requests must be for an integral number of bytes.
  60. *
  61. * The output buffer is filled incrementally with each iteration of
  62. * the central loop, rather than constructing an overall "temp" and
  63. * then taking the leftmost(no_of_bits_to_return) bits.
  64. *
  65. * There is no way for the Hash_df function to fail. The returned
  66. * status SUCCESS is implicit.
  67. */
  68. void hash_df ( struct digest_algorithm *hash, const void *input,
  69. size_t input_len, void *output, size_t output_len ) {
  70. uint8_t context[hash->ctxsize];
  71. uint8_t digest[hash->digestsize];
  72. size_t frag_len;
  73. struct {
  74. uint8_t pad[3];
  75. uint8_t counter;
  76. uint32_t no_of_bits_to_return;
  77. } __attribute__ (( packed )) prefix;
  78. void *temp;
  79. size_t remaining;
  80. DBGC ( &hash_df, "HASH_DF input:\n" );
  81. DBGC_HDA ( &hash_df, 0, input, input_len );
  82. /* Sanity checks */
  83. assert ( input != NULL );
  84. assert ( output != NULL );
  85. /* 1. temp = the Null string
  86. * 2. len = ceil ( no_of_bits_to_return / outlen )
  87. *
  88. * (Nothing to do. We fill the output buffer incrementally,
  89. * rather than constructing the complete "temp" in-memory.
  90. * "len" is implicit in the number of iterations required to
  91. * fill the output buffer, and so is not calculated
  92. * explicitly.)
  93. */
  94. /* 3. counter = an 8-bit binary value representing the integer "1" */
  95. prefix.counter = 1;
  96. /* 4. For i = 1 to len do */
  97. for ( temp = output, remaining = output_len ; remaining > 0 ; ) {
  98. /* Comment: in step 5.1 (sic), no_of_bits_to_return is
  99. * used as a 32-bit string.
  100. *
  101. * 4.1 temp = temp || Hash ( counter || no_of_bits_to_return
  102. * || input_string )
  103. */
  104. prefix.no_of_bits_to_return = htonl ( output_len * 8 );
  105. digest_init ( hash, context );
  106. digest_update ( hash, context, &prefix.counter,
  107. ( sizeof ( prefix ) -
  108. offsetof ( typeof ( prefix ), counter ) ) );
  109. digest_update ( hash, context, input, input_len );
  110. digest_final ( hash, context, digest );
  111. /* 4.2 counter = counter + 1 */
  112. prefix.counter++;
  113. /* 5. requested_bits = Leftmost ( no_of_bits_to_return )
  114. * of temp
  115. *
  116. * (We fill the output buffer incrementally.)
  117. */
  118. frag_len = sizeof ( digest );
  119. if ( frag_len > remaining )
  120. frag_len = remaining;
  121. memcpy ( temp, digest, frag_len );
  122. temp += frag_len;
  123. remaining -= frag_len;
  124. }
  125. /* 6. Return SUCCESS and requested_bits */
  126. DBGC ( &hash_df, "HASH_DF output:\n" );
  127. DBGC_HDA ( &hash_df, 0, output, output_len );
  128. return;
  129. }