fips_prf_openssl.c revision 252726
1119381Sjake/*
2119381Sjake * FIPS 186-2 PRF for libcrypto
3119381Sjake * Copyright (c) 2004-2005, Jouni Malinen <j@w1.fi>
4139749Simp *
5119381Sjake * This software may be distributed under the terms of the BSD license.
6119381Sjake * See README for more details.
7119381Sjake */
8119381Sjake
9119381Sjake#include "includes.h"
10119381Sjake#include <openssl/sha.h>
11119381Sjake
12119381Sjake#include "common.h"
13119381Sjake#include "crypto.h"
14119381Sjake
15119381Sjake
16119381Sjakestatic void sha1_transform(u8 *state, const u8 data[64])
17119381Sjake{
18119381Sjake	SHA_CTX context;
19119381Sjake	os_memset(&context, 0, sizeof(context));
20119381Sjake	os_memcpy(&context.h0, state, 5 * 4);
21119381Sjake	SHA1_Transform(&context, data);
22119381Sjake	os_memcpy(state, &context.h0, 5 * 4);
23119381Sjake}
24119381Sjake
25119381Sjake
26119381Sjakeint fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen)
27119381Sjake{
28119381Sjake	u8 xkey[64];
29119381Sjake	u32 t[5], _t[5];
30119381Sjake	int i, j, m, k;
31119381Sjake	u8 *xpos = x;
32119381Sjake	u32 carry;
33119381Sjake
34119381Sjake	if (seed_len < sizeof(xkey))
35119381Sjake		os_memset(xkey + seed_len, 0, sizeof(xkey) - seed_len);
36119381Sjake	else
37119381Sjake		seed_len = sizeof(xkey);
38119381Sjake
39170840Smarius	/* FIPS 186-2 + change notice 1 */
40170840Smarius
41170840Smarius	os_memcpy(xkey, seed, seed_len);
42170840Smarius	t[0] = 0x67452301;
43170840Smarius	t[1] = 0xEFCDAB89;
44170840Smarius	t[2] = 0x98BADCFE;
45170840Smarius	t[3] = 0x10325476;
46170840Smarius	t[4] = 0xC3D2E1F0;
47170840Smarius
48170840Smarius	m = xlen / 40;
49170840Smarius	for (j = 0; j < m; j++) {
50119381Sjake		/* XSEED_j = 0 */
51119381Sjake		for (i = 0; i < 2; i++) {
52119381Sjake			/* XVAL = (XKEY + XSEED_j) mod 2^b */
53119381Sjake
54119381Sjake			/* w_i = G(t, XVAL) */
55119381Sjake			os_memcpy(_t, t, 20);
56119381Sjake			sha1_transform((u8 *) _t, xkey);
57119381Sjake			_t[0] = host_to_be32(_t[0]);
58119381Sjake			_t[1] = host_to_be32(_t[1]);
59119381Sjake			_t[2] = host_to_be32(_t[2]);
60119381Sjake			_t[3] = host_to_be32(_t[3]);
61119381Sjake			_t[4] = host_to_be32(_t[4]);
62119381Sjake			os_memcpy(xpos, _t, 20);
63119381Sjake
64119381Sjake			/* XKEY = (1 + XKEY + w_i) mod 2^b */
65119381Sjake			carry = 1;
66119381Sjake			for (k = 19; k >= 0; k--) {
67119381Sjake				carry += xkey[k] + xpos[k];
68119381Sjake				xkey[k] = carry & 0xff;
69119381Sjake				carry >>= 8;
70119381Sjake			}
71119381Sjake
72119381Sjake			xpos += 20;
73119381Sjake		}
74119381Sjake		/* x_j = w_0|w_1 */
75119381Sjake	}
76119381Sjake
77119381Sjake	return 0;
78119381Sjake}
79119381Sjake