1214501Srpaulo/* 2214501Srpaulo * SHA1 T-PRF for EAP-FAST 3214501Srpaulo * Copyright (c) 2003-2005, Jouni Malinen <j@w1.fi> 4214501Srpaulo * 5252726Srpaulo * This software may be distributed under the terms of the BSD license. 6252726Srpaulo * See README for more details. 7214501Srpaulo */ 8214501Srpaulo 9214501Srpaulo#include "includes.h" 10214501Srpaulo 11214501Srpaulo#include "common.h" 12214501Srpaulo#include "sha1.h" 13214501Srpaulo#include "crypto.h" 14214501Srpaulo 15214501Srpaulo/** 16214501Srpaulo * sha1_t_prf - EAP-FAST Pseudo-Random Function (T-PRF) 17214501Srpaulo * @key: Key for PRF 18214501Srpaulo * @key_len: Length of the key in bytes 19214501Srpaulo * @label: A unique label for each purpose of the PRF 20214501Srpaulo * @seed: Seed value to bind into the key 21214501Srpaulo * @seed_len: Length of the seed 22214501Srpaulo * @buf: Buffer for the generated pseudo-random key 23214501Srpaulo * @buf_len: Number of bytes of key to generate 24214501Srpaulo * Returns: 0 on success, -1 of failure 25214501Srpaulo * 26214501Srpaulo * This function is used to derive new, cryptographically separate keys from a 27214501Srpaulo * given key for EAP-FAST. T-PRF is defined in RFC 4851, Section 5.5. 28214501Srpaulo */ 29214501Srpauloint sha1_t_prf(const u8 *key, size_t key_len, const char *label, 30214501Srpaulo const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) 31214501Srpaulo{ 32214501Srpaulo unsigned char counter = 0; 33214501Srpaulo size_t pos, plen; 34214501Srpaulo u8 hash[SHA1_MAC_LEN]; 35214501Srpaulo size_t label_len = os_strlen(label); 36214501Srpaulo u8 output_len[2]; 37214501Srpaulo const unsigned char *addr[5]; 38214501Srpaulo size_t len[5]; 39214501Srpaulo 40214501Srpaulo addr[0] = hash; 41214501Srpaulo len[0] = 0; 42214501Srpaulo addr[1] = (unsigned char *) label; 43214501Srpaulo len[1] = label_len + 1; 44214501Srpaulo addr[2] = seed; 45214501Srpaulo len[2] = seed_len; 46214501Srpaulo addr[3] = output_len; 47214501Srpaulo len[3] = 2; 48214501Srpaulo addr[4] = &counter; 49214501Srpaulo len[4] = 1; 50214501Srpaulo 51214501Srpaulo output_len[0] = (buf_len >> 8) & 0xff; 52214501Srpaulo output_len[1] = buf_len & 0xff; 53214501Srpaulo pos = 0; 54214501Srpaulo while (pos < buf_len) { 55214501Srpaulo counter++; 56214501Srpaulo plen = buf_len - pos; 57214501Srpaulo if (hmac_sha1_vector(key, key_len, 5, addr, len, hash)) 58214501Srpaulo return -1; 59214501Srpaulo if (plen >= SHA1_MAC_LEN) { 60214501Srpaulo os_memcpy(&buf[pos], hash, SHA1_MAC_LEN); 61214501Srpaulo pos += SHA1_MAC_LEN; 62214501Srpaulo } else { 63214501Srpaulo os_memcpy(&buf[pos], hash, plen); 64214501Srpaulo break; 65214501Srpaulo } 66214501Srpaulo len[0] = SHA1_MAC_LEN; 67214501Srpaulo } 68214501Srpaulo 69351611Scy forced_memzero(hash, SHA1_MAC_LEN); 70289549Srpaulo 71214501Srpaulo return 0; 72214501Srpaulo} 73