You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

hash_df.c 4.4KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137
  1. /*
  2. * Copyright (C) 2012 Michael Brown <mbrown@fensystems.co.uk>.
  3. *
  4. * This program is free software; you can redistribute it and/or
  5. * modify it under the terms of the GNU General Public License as
  6. * published by the Free Software Foundation; either version 2 of the
  7. * License, or any later version.
  8. *
  9. * This program is distributed in the hope that it will be useful, but
  10. * WITHOUT ANY WARRANTY; without even the implied warranty of
  11. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  12. * General Public License for more details.
  13. *
  14. * You should have received a copy of the GNU General Public License
  15. * along with this program; if not, write to the Free Software
  16. * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
  17. */
  18. FILE_LICENCE ( GPL2_OR_LATER );
  19. /** @file
  20. *
  21. * Hash-based derivation function (Hash_df)
  22. *
  23. * This algorithm is designed to comply with ANS X9.82 Part 3-2007
  24. * Section 10.5.2. This standard is not freely available, but most of
  25. * the text appears to be shared with NIST SP 800-90, which can be
  26. * downloaded from
  27. *
  28. * http://csrc.nist.gov/publications/nistpubs/800-90/SP800-90revised_March2007.pdf
  29. *
  30. * Where possible, references are given to both documents. In the
  31. * case of any disagreement, ANS X9.82 takes priority over NIST SP
  32. * 800-90. (In particular, note that some algorithms that are
  33. * Approved by NIST SP 800-90 are not Approved by ANS X9.82.)
  34. */
  35. #include <stdint.h>
  36. #include <string.h>
  37. #include <assert.h>
  38. #include <byteswap.h>
  39. #include <ipxe/crypto.h>
  40. #include <ipxe/hash_df.h>
  41. /**
  42. * Distribute entropy throughout a buffer
  43. *
  44. * @v hash Underlying hash algorithm
  45. * @v input Input data
  46. * @v input_len Length of input data, in bytes
  47. * @v output Output buffer
  48. * @v output_len Length of output buffer, in bytes
  49. *
  50. * This is the Hash_df function defined in ANS X9.82 Part 3-2007
  51. * Section 10.5.2 (NIST SP 800-90 Section 10.4.1).
  52. *
  53. * The number of bits requested is implicit in the length of the
  54. * output buffer. Requests must be for an integral number of bytes.
  55. *
  56. * The output buffer is filled incrementally with each iteration of
  57. * the central loop, rather than constructing an overall "temp" and
  58. * then taking the leftmost(no_of_bits_to_return) bits.
  59. *
  60. * There is no way for the Hash_df function to fail. The returned
  61. * status SUCCESS is implicit.
  62. */
  63. void hash_df ( struct digest_algorithm *hash, const void *input,
  64. size_t input_len, void *output, size_t output_len ) {
  65. uint8_t context[hash->ctxsize];
  66. uint8_t digest[hash->digestsize];
  67. size_t frag_len;
  68. struct {
  69. uint8_t pad[3];
  70. uint8_t counter;
  71. uint32_t no_of_bits_to_return;
  72. } __attribute__ (( packed )) prefix;
  73. void *temp;
  74. size_t remaining;
  75. DBGC ( &hash_df, "HASH_DF input:\n" );
  76. DBGC_HDA ( &hash_df, 0, input, input_len );
  77. /* Sanity checks */
  78. assert ( input != NULL );
  79. assert ( output != NULL );
  80. /* 1. temp = the Null string
  81. * 2. len = ceil ( no_of_bits_to_return / outlen )
  82. *
  83. * (Nothing to do. We fill the output buffer incrementally,
  84. * rather than constructing the complete "temp" in-memory.
  85. * "len" is implicit in the number of iterations required to
  86. * fill the output buffer, and so is not calculated
  87. * explicitly.)
  88. */
  89. /* 3. counter = an 8-bit binary value representing the integer "1" */
  90. prefix.counter = 1;
  91. /* 4. For i = 1 to len do */
  92. for ( temp = output, remaining = output_len ; remaining > 0 ; ) {
  93. /* Comment: in step 5.1 (sic), no_of_bits_to_return is
  94. * used as a 32-bit string.
  95. *
  96. * 4.1 temp = temp || Hash ( counter || no_of_bits_to_return
  97. * || input_string )
  98. */
  99. prefix.no_of_bits_to_return = htonl ( output_len * 8 );
  100. digest_init ( hash, context );
  101. digest_update ( hash, context, &prefix.counter,
  102. ( sizeof ( prefix ) -
  103. offsetof ( typeof ( prefix ), counter ) ) );
  104. digest_update ( hash, context, input, input_len );
  105. digest_final ( hash, context, digest );
  106. /* 4.2 counter = counter + 1 */
  107. prefix.counter++;
  108. /* 5. requested_bits = Leftmost ( no_of_bits_to_return )
  109. * of temp
  110. *
  111. * (We fill the output buffer incrementally.)
  112. */
  113. frag_len = sizeof ( digest );
  114. if ( frag_len > remaining )
  115. frag_len = remaining;
  116. memcpy ( temp, digest, frag_len );
  117. temp += frag_len;
  118. remaining -= frag_len;
  119. }
  120. /* 6. Return SUCCESS and requested_bits */
  121. DBGC ( &hash_df, "HASH_DF output:\n" );
  122. DBGC_HDA ( &hash_df, 0, output, output_len );
  123. return;
  124. }