/** @file pass_phrase.c * * @brief This file defines passphase hash * * Copyright (C) 2014-2017, Marvell International Ltd. * * This software file (the "File") is distributed by Marvell International * Ltd. under the terms of the GNU General Public License Version 2, June 1991 * (the "License"). You may use, redistribute and/or modify this File in * accordance with the terms and conditions of the License, a copy of which * is available by writing to the Free Software Foundation, Inc., * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA or on the * worldwide web at http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt. * * THE FILE IS DISTRIBUTED AS-IS, WITHOUT WARRANTY OF ANY KIND, AND THE * IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE * ARE EXPRESSLY DISCLAIMED. The License provides additional details about * this warranty disclaimer. */ /****************************************************** Change log: 03/07/2014: Initial version ******************************************************/ #include "wl_macros.h" #include "pass_phrase.h" //#include "keyMgmtSta.h" #include "sha1.h" #include "hostsa_ext_def.h" #include "authenticator.h" static INLINE t_u32 pass_strlen(const char *str) { t_u32 i; for (i = 0; str[i] != 0; i++) { } return i; } /* * F(P, S, c, i) = U1 xor U2 xor ... Uc * U1 = PRF(P, S || Int(i)) * U2 = PRF(P, U1) * Uc = PRF(P, Uc-1) */ void Mrvl_F(void *priv, char *password, unsigned char *ssid, int ssidlength, int iterations, int count, unsigned char *output) { phostsa_private psapriv = (phostsa_private)priv; hostsa_util_fns *util_fns = &psapriv->util_fns; static unsigned char digest[36], digest1[A_SHA_DIGEST_LEN]; int i, j; int len = pass_strlen(password); int tmpLen = ssidlength + 4; unsigned char *pTemp = digest; /* U1 = PRF(P, S || int(i)) */ memcpy(util_fns, digest, ssid, ssidlength); digest[ssidlength] = (unsigned char)((count >> 24) & 0xff); digest[ssidlength + 1] = (unsigned char)((count >> 16) & 0xff); digest[ssidlength + 2] = (unsigned char)((count >> 8) & 0xff); digest[ssidlength + 3] = (unsigned char)(count & 0xff); Mrvl_hmac_sha1((void *)priv, &pTemp, &tmpLen, 1, (unsigned char *)password, len, digest1, A_SHA_DIGEST_LEN); /* output = U1 */ memcpy(util_fns, output, digest1, A_SHA_DIGEST_LEN); pTemp = digest1; for (i = 1; i < iterations; i++) { tmpLen = A_SHA_DIGEST_LEN; /* Un = PRF(P, Un-1) */ Mrvl_hmac_sha1((void *)priv, &pTemp, &tmpLen, 1, (unsigned char *)password, len, digest, A_SHA_DIGEST_LEN); memcpy(util_fns, digest1, digest, A_SHA_DIGEST_LEN); /* output = output xor Un */ for (j = 0; j < A_SHA_DIGEST_LEN; j++) { output[j] ^= digest[j]; } } } /* * password - ascii string up to 63 characters in length * ssid - octet string up to 32 octets * ssidlength - length of ssid in octets * output must be 32 octets in length and outputs 256 bits of key */ int Mrvl_PasswordHash(void *priv, char *password, unsigned char *ssid, int ssidlength, unsigned char *output) { phostsa_private psapriv = (phostsa_private)priv; hostsa_util_fns *util_fns = &psapriv->util_fns; if ((pass_strlen(password) > 63) || (ssidlength > 32)) { return 0; } Mrvl_F((void *)priv, password, ssid, ssidlength, 4096, 2, output); memcpy(util_fns, output + A_SHA_DIGEST_LEN, output, 12); Mrvl_F((void *)priv, password, ssid, ssidlength, 4096, 1, output); return 1; }