summaryrefslogtreecommitdiffstats
path: root/crypto/rand
diff options
context:
space:
mode:
authorPauli <pauli@openssl.org>2023-11-01 08:52:00 +1100
committerTomas Mraz <tomas@openssl.org>2023-11-01 12:05:47 +0100
commitdfb26e03c26b9234d04cb9fcaf6391d6bfb44dc4 (patch)
tree881d1254141f8f3e8310684279e0066006df5cac /crypto/rand
parentd05e0e40d712b9246c6e9db5b579fcce69dafa98 (diff)
rand uniform: add comments outlining the algorithm
Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Matthias St. Pierre <Matthias.St.Pierre@ncp-e.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22499)
Diffstat (limited to 'crypto/rand')
-rw-r--r--crypto/rand/rand_uniform.c39
1 files changed, 36 insertions, 3 deletions
diff --git a/crypto/rand/rand_uniform.c b/crypto/rand/rand_uniform.c
index d37e38b9b6..26ce3ee560 100644
--- a/crypto/rand/rand_uniform.c
+++ b/crypto/rand/rand_uniform.c
@@ -12,7 +12,14 @@
/*
* Implementation an optimal random integer in a range function.
- * Refer: https://github.com/apple/swift/pull/39143 for a description
+ *
+ * Essentially it boils down to incrementally generating a fixed point
+ * number on the interval [0, 1) and multiplying this number by the upper
+ * range limit. Once it is certain what the fractional part contributes to
+ * the integral part of the product, the algorithm has produced a definitive
+ * result.
+ *
+ * Refer: https://github.com/apple/swift/pull/39143 for a fuller description
* of the algorithm.
*/
uint32_t ossl_rand_uniform_uint32(OSSL_LIB_CTX *ctx, uint32_t upper, int *err)
@@ -29,17 +36,43 @@ uint32_t ossl_rand_uniform_uint32(OSSL_LIB_CTX *ctx, uint32_t upper, int *err)
}
if (unlikely(upper == 1))
return 0;
+
/* Get 32 bits of entropy */
if (RAND_bytes_ex(ctx, (unsigned char *)&rand, sizeof(rand), 0) <= 0) {
*err = 1;
return 0;
}
+
+ /*
+ * We are generating a fixed point number on the interval [0, 1).
+ * Multiplying this by the range gives us a number on [0, upper).
+ * The high word of the multiplication result represents the integral
+ * part we want. The lower word is the fractional part. We can early exit if
+ * if the fractional part is small enough that no carry from the next lower
+ * word can cause an overflow and carry into the integer part. This
+ * happens when the fractional part is bounded by 2^32 - upper which
+ * can be simplified to just -upper (as an unsigned integer).
+ */
prod = (uint64_t)upper * rand;
i = prod >> 32;
f = prod & 0xffffffff;
if (likely(f <= 1 + ~upper)) /* 1+~upper == -upper but compilers whine */
return i;
+ /*
+ * We're in the position where the carry from the next word *might* cause
+ * a carry to the integral part. The process here is to generate the next
+ * word, multiply it by the range and add that to the current word. If
+ * it overflows, the carry propagates to the integer part (return i+1).
+ * If it can no longer overflow regardless of further lower order bits,
+ * we are done (return i). If there is still a chance of overflow, we
+ * repeat the process with the next lower word.
+ *
+ * Each *bit* of randomness has a probability of one half of terminating
+ * this process, so each each word beyond the first has a probability
+ * of 2^-32 of not terminating the process. That is, we're extremely
+ * likely to stop very rapidly.
+ */
for (j = 0; j < max_followup_iterations; j++) {
if (RAND_bytes_ex(ctx, (unsigned char *)&rand, sizeof(rand), 0) <= 0) {
*err = 1;
@@ -59,8 +92,8 @@ uint32_t ossl_rand_uniform_uint32(OSSL_LIB_CTX *ctx, uint32_t upper, int *err)
}
/*
* If we get here, we've consumed 32 * max_followup_iterations + 32 bits
- * with no firm decision, this gives a bias with probability < 2^(32*n),
- * likely acceptable.
+ * with no firm decision, this gives a bias with probability < 2^-(32*n),
+ * which is likely acceptable.
*/
return i;
}