eap_psk_common.c 1.5 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768
  1. /*
  2. * EAP server/peer: EAP-PSK shared routines
  3. * Copyright (c) 2004-2006, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "includes.h"
  9. #include "common.h"
  10. #include "crypto/aes_wrap.h"
  11. #include "eap_defs.h"
  12. #include "eap_psk_common.h"
  13. #define aes_block_size 16
  14. int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk)
  15. {
  16. os_memset(ak, 0, aes_block_size);
  17. if (aes_128_encrypt_block(psk, ak, ak))
  18. return -1;
  19. os_memcpy(kdk, ak, aes_block_size);
  20. ak[aes_block_size - 1] ^= 0x01;
  21. kdk[aes_block_size - 1] ^= 0x02;
  22. if (aes_128_encrypt_block(psk, ak, ak) ||
  23. aes_128_encrypt_block(psk, kdk, kdk))
  24. return -1;
  25. return 0;
  26. }
  27. int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk,
  28. u8 *emsk)
  29. {
  30. u8 hash[aes_block_size];
  31. u8 counter = 1;
  32. int i;
  33. if (aes_128_encrypt_block(kdk, rand_p, hash))
  34. return -1;
  35. hash[aes_block_size - 1] ^= counter;
  36. if (aes_128_encrypt_block(kdk, hash, tek))
  37. return -1;
  38. hash[aes_block_size - 1] ^= counter;
  39. counter++;
  40. for (i = 0; i < EAP_MSK_LEN / aes_block_size; i++) {
  41. hash[aes_block_size - 1] ^= counter;
  42. if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
  43. return -1;
  44. hash[aes_block_size - 1] ^= counter;
  45. counter++;
  46. }
  47. for (i = 0; i < EAP_EMSK_LEN / aes_block_size; i++) {
  48. hash[aes_block_size - 1] ^= counter;
  49. if (aes_128_encrypt_block(kdk, hash,
  50. &emsk[i * aes_block_size]))
  51. return -1;
  52. hash[aes_block_size - 1] ^= counter;
  53. counter++;
  54. }
  55. return 0;
  56. }