| /** @file Mrvl_sha256_crypto.c |
| * |
| * @brief This file defines sha256 crypto |
| * |
| * Copyright (C) 2014, Marvell International Ltd. |
| * |
| * This software file (the "File") is distributed by Marvell International |
| * Ltd. under the terms of the GNU General Public License Version 2, June 1991 |
| * (the "License"). You may use, redistribute and/or modify this File in |
| * accordance with the terms and conditions of the License, a copy of which |
| * is available by writing to the Free Software Foundation, Inc., |
| * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA or on the |
| * worldwide web at http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt. |
| * |
| * THE FILE IS DISTRIBUTED AS-IS, WITHOUT WARRANTY OF ANY KIND, AND THE |
| * IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE |
| * ARE EXPRESSLY DISCLAIMED. The License provides additional details about |
| * this warranty disclaimer. |
| */ |
| |
| /****************************************************** |
| Change log: |
| 03/07/2014: Initial version |
| ******************************************************/ |
| #include <linux/string.h> |
| |
| #include "wltypes.h" |
| #include "wl_macros.h" |
| |
| #include "sha_256.h" |
| #include "mrvl_sha256_crypto.h" |
| |
| #include "hostsa_ext_def.h" |
| #include "authenticator.h" |
| |
| /* Helper function to allocate scratch memory and call sha256_vector() */ |
| void |
| mrvl_sha256_crypto_vector(void *priv, size_t num_elem, |
| UINT8 *addr[], size_t * len, UINT8 *mac) |
| { |
| |
| // BufferDesc_t* pBufDesc = NULL; |
| UINT8 buf[SHA256_MIN_SCRATCH_BUF] = { 0 }; |
| |
| sha256_vector((void *)priv, num_elem, addr, len, mac, (UINT8 *)buf); |
| |
| // bml_FreeBuffer((UINT32)pBufDesc); |
| } |
| |
| void |
| mrvl_sha256_crypto_kdf(void *priv, UINT8 *pKey, |
| UINT8 key_len, |
| char *label, |
| UINT8 label_len, |
| UINT8 *pContext, |
| UINT16 context_len, UINT8 *pOutput, UINT16 output_len) |
| { |
| phostsa_private psapriv = (phostsa_private)priv; |
| hostsa_util_fns *util_fns = &psapriv->util_fns; |
| UINT8 *vectors[4 + 1]; |
| size_t vectLen[NELEMENTS(vectors)]; |
| UINT8 *pResult; |
| UINT8 *pLoopResult; |
| UINT8 iterations; |
| UINT16 i; |
| // BufferDesc_t* pBufDesc = NULL; |
| UINT8 buf[HMAC_SHA256_MIN_SCRATCH_BUF] = { 0 }; |
| |
| pResult = pContext + context_len; |
| |
| /* |
| ** Working memory layout: |
| ** | KDF-Len output --- > |
| ** | |
| ** [KDF Input][HMAC output#1][HMAC output#2][...] |
| ** |
| */ |
| |
| /* Number of SHA256 digests needed to meet the bit length output_len */ |
| iterations = (output_len + 255) / 256; |
| |
| pLoopResult = pResult; |
| |
| for (i = 1; i <= iterations; i++) { |
| /* Skip vectors[0]; Used internally in hmac_sha256_vector |
| function */ |
| vectors[1] = (UINT8 *)&i; |
| vectLen[1] = sizeof(i); |
| |
| vectors[2] = (UINT8 *)label; |
| vectLen[2] = label_len; |
| |
| vectors[3] = pContext; |
| vectLen[3] = context_len; |
| |
| vectors[4] = (UINT8 *)&output_len; |
| vectLen[4] = sizeof(output_len); |
| |
| /* |
| ** |
| ** KDF input = (K, i || label || Context || Length) |
| ** |
| */ |
| hmac_sha256_vector(priv, pKey, key_len, |
| NELEMENTS(vectors), vectors, vectLen, |
| pLoopResult, (UINT8 *)buf); |
| |
| /* Move the hmac output pointer so another digest can be |
| appended ** if more loop iterations are needed to get the |
| output_len key ** bit total */ |
| pLoopResult += SHA256_MAC_LEN; |
| } |
| |
| // bml_FreeBuffer((UINT32)pBufDesc); |
| |
| memcpy(util_fns, pOutput, pResult, output_len / 8); |
| |
| } |