xref: /freebsd/contrib/wpa/src/crypto/fips_prf_internal.c (revision a90b9d0159070121c221b966469c3e36d912bf82)
1e28a4053SRui Paulo /*
2e28a4053SRui Paulo  * FIPS 186-2 PRF for internal crypto implementation
3e28a4053SRui Paulo  * Copyright (c) 2006-2007, Jouni Malinen <j@w1.fi>
4e28a4053SRui Paulo  *
5f05cddf9SRui Paulo  * This software may be distributed under the terms of the BSD license.
6f05cddf9SRui Paulo  * See README for more details.
7e28a4053SRui Paulo  */
8e28a4053SRui Paulo 
9e28a4053SRui Paulo #include "includes.h"
10e28a4053SRui Paulo 
11e28a4053SRui Paulo #include "common.h"
12e28a4053SRui Paulo #include "sha1.h"
13e28a4053SRui Paulo #include "sha1_i.h"
14e28a4053SRui Paulo #include "crypto.h"
15e28a4053SRui Paulo 
16e28a4053SRui Paulo 
fips186_2_prf(const u8 * seed,size_t seed_len,u8 * x,size_t xlen)17e28a4053SRui Paulo int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen)
18e28a4053SRui Paulo {
19e28a4053SRui Paulo 	u8 xkey[64];
20*a90b9d01SCy Schubert 	u32 _t[5];
21e28a4053SRui Paulo 	int i, j, m, k;
22e28a4053SRui Paulo 	u8 *xpos = x;
23e28a4053SRui Paulo 	u32 carry;
24*a90b9d01SCy Schubert 	struct SHA1Context ctx;
25e28a4053SRui Paulo 
26f05cddf9SRui Paulo 	if (seed_len < sizeof(xkey))
27f05cddf9SRui Paulo 		os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len);
28f05cddf9SRui Paulo 	else
29e28a4053SRui Paulo 		seed_len = sizeof(xkey);
30e28a4053SRui Paulo 
31e28a4053SRui Paulo 	/* FIPS 186-2 + change notice 1 */
32e28a4053SRui Paulo 
33e28a4053SRui Paulo 	os_memcpy(xkey, seed, seed_len);
34*a90b9d01SCy Schubert 	SHA1Init(&ctx);
35e28a4053SRui Paulo 
36e28a4053SRui Paulo 	m = xlen / 40;
37e28a4053SRui Paulo 	for (j = 0; j < m; j++) {
38e28a4053SRui Paulo 		/* XSEED_j = 0 */
39e28a4053SRui Paulo 		for (i = 0; i < 2; i++) {
40e28a4053SRui Paulo 			/* XVAL = (XKEY + XSEED_j) mod 2^b */
41e28a4053SRui Paulo 
42e28a4053SRui Paulo 			/* w_i = G(t, XVAL) */
43*a90b9d01SCy Schubert 			os_memcpy(_t, ctx.state, 20);
44e28a4053SRui Paulo 			SHA1Transform(_t, xkey);
45e28a4053SRui Paulo 			_t[0] = host_to_be32(_t[0]);
46e28a4053SRui Paulo 			_t[1] = host_to_be32(_t[1]);
47e28a4053SRui Paulo 			_t[2] = host_to_be32(_t[2]);
48e28a4053SRui Paulo 			_t[3] = host_to_be32(_t[3]);
49e28a4053SRui Paulo 			_t[4] = host_to_be32(_t[4]);
50e28a4053SRui Paulo 			os_memcpy(xpos, _t, 20);
51e28a4053SRui Paulo 
52e28a4053SRui Paulo 			/* XKEY = (1 + XKEY + w_i) mod 2^b */
53e28a4053SRui Paulo 			carry = 1;
54e28a4053SRui Paulo 			for (k = 19; k >= 0; k--) {
55e28a4053SRui Paulo 				carry += xkey[k] + xpos[k];
56e28a4053SRui Paulo 				xkey[k] = carry & 0xff;
57e28a4053SRui Paulo 				carry >>= 8;
58e28a4053SRui Paulo 			}
59e28a4053SRui Paulo 
60e28a4053SRui Paulo 			xpos += SHA1_MAC_LEN;
61e28a4053SRui Paulo 		}
62e28a4053SRui Paulo 		/* x_j = w_0|w_1 */
63e28a4053SRui Paulo 	}
64e28a4053SRui Paulo 
65e28a4053SRui Paulo 	return 0;
66e28a4053SRui Paulo }
67