fips_prf_openssl.c revision 252726
1119381Sjake/* 2119381Sjake * FIPS 186-2 PRF for libcrypto 3119381Sjake * Copyright (c) 2004-2005, Jouni Malinen <j@w1.fi> 4139749Simp * 5119381Sjake * This software may be distributed under the terms of the BSD license. 6119381Sjake * See README for more details. 7119381Sjake */ 8119381Sjake 9119381Sjake#include "includes.h" 10119381Sjake#include <openssl/sha.h> 11119381Sjake 12119381Sjake#include "common.h" 13119381Sjake#include "crypto.h" 14119381Sjake 15119381Sjake 16119381Sjakestatic void sha1_transform(u8 *state, const u8 data[64]) 17119381Sjake{ 18119381Sjake SHA_CTX context; 19119381Sjake os_memset(&context, 0, sizeof(context)); 20119381Sjake os_memcpy(&context.h0, state, 5 * 4); 21119381Sjake SHA1_Transform(&context, data); 22119381Sjake os_memcpy(state, &context.h0, 5 * 4); 23119381Sjake} 24119381Sjake 25119381Sjake 26119381Sjakeint fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) 27119381Sjake{ 28119381Sjake u8 xkey[64]; 29119381Sjake u32 t[5], _t[5]; 30119381Sjake int i, j, m, k; 31119381Sjake u8 *xpos = x; 32119381Sjake u32 carry; 33119381Sjake 34119381Sjake if (seed_len < sizeof(xkey)) 35119381Sjake os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len); 36119381Sjake else 37119381Sjake seed_len = sizeof(xkey); 38119381Sjake 39170840Smarius /* FIPS 186-2 + change notice 1 */ 40170840Smarius 41170840Smarius os_memcpy(xkey, seed, seed_len); 42170840Smarius t[0] = 0x67452301; 43170840Smarius t[1] = 0xEFCDAB89; 44170840Smarius t[2] = 0x98BADCFE; 45170840Smarius t[3] = 0x10325476; 46170840Smarius t[4] = 0xC3D2E1F0; 47170840Smarius 48170840Smarius m = xlen / 40; 49170840Smarius for (j = 0; j < m; j++) { 50119381Sjake /* XSEED_j = 0 */ 51119381Sjake for (i = 0; i < 2; i++) { 52119381Sjake /* XVAL = (XKEY + XSEED_j) mod 2^b */ 53119381Sjake 54119381Sjake /* w_i = G(t, XVAL) */ 55119381Sjake os_memcpy(_t, t, 20); 56119381Sjake sha1_transform((u8 *) _t, xkey); 57119381Sjake _t[0] = host_to_be32(_t[0]); 58119381Sjake _t[1] = host_to_be32(_t[1]); 59119381Sjake _t[2] = host_to_be32(_t[2]); 60119381Sjake _t[3] = host_to_be32(_t[3]); 61119381Sjake _t[4] = host_to_be32(_t[4]); 62119381Sjake os_memcpy(xpos, _t, 20); 63119381Sjake 64119381Sjake /* XKEY = (1 + XKEY + w_i) mod 2^b */ 65119381Sjake carry = 1; 66119381Sjake for (k = 19; k >= 0; k--) { 67119381Sjake carry += xkey[k] + xpos[k]; 68119381Sjake xkey[k] = carry & 0xff; 69119381Sjake carry >>= 8; 70119381Sjake } 71119381Sjake 72119381Sjake xpos += 20; 73119381Sjake } 74119381Sjake /* x_j = w_0|w_1 */ 75119381Sjake } 76119381Sjake 77119381Sjake return 0; 78119381Sjake} 79119381Sjake