1f05cddf9SRui Paulo /*
2f05cddf9SRui Paulo * TLS PRF P_SHA256
3f05cddf9SRui Paulo * Copyright (c) 2011, Jouni Malinen <j@w1.fi>
4f05cddf9SRui Paulo *
5f05cddf9SRui Paulo * This software may be distributed under the terms of the BSD license.
6f05cddf9SRui Paulo * See README for more details.
7f05cddf9SRui Paulo */
8f05cddf9SRui Paulo
9f05cddf9SRui Paulo #include "includes.h"
10f05cddf9SRui Paulo
11f05cddf9SRui Paulo #include "common.h"
12f05cddf9SRui Paulo #include "sha256.h"
13f05cddf9SRui Paulo
14f05cddf9SRui Paulo
15f05cddf9SRui Paulo /**
16f05cddf9SRui Paulo * tls_prf_sha256 - Pseudo-Random Function for TLS v1.2 (P_SHA256, RFC 5246)
17f05cddf9SRui Paulo * @secret: Key for PRF
18f05cddf9SRui Paulo * @secret_len: Length of the key in bytes
19f05cddf9SRui Paulo * @label: A unique label for each purpose of the PRF
20f05cddf9SRui Paulo * @seed: Seed value to bind into the key
21f05cddf9SRui Paulo * @seed_len: Length of the seed
22f05cddf9SRui Paulo * @out: Buffer for the generated pseudo-random key
23f05cddf9SRui Paulo * @outlen: Number of bytes of key to generate
24f05cddf9SRui Paulo * Returns: 0 on success, -1 on failure.
25f05cddf9SRui Paulo *
26f05cddf9SRui Paulo * This function is used to derive new, cryptographically separate keys from a
27f05cddf9SRui Paulo * given key in TLS. This PRF is defined in RFC 2246, Chapter 5.
28f05cddf9SRui Paulo */
tls_prf_sha256(const u8 * secret,size_t secret_len,const char * label,const u8 * seed,size_t seed_len,u8 * out,size_t outlen)29*206b73d0SCy Schubert int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label,
30f05cddf9SRui Paulo const u8 *seed, size_t seed_len, u8 *out, size_t outlen)
31f05cddf9SRui Paulo {
32f05cddf9SRui Paulo size_t clen;
33f05cddf9SRui Paulo u8 A[SHA256_MAC_LEN];
34f05cddf9SRui Paulo u8 P[SHA256_MAC_LEN];
35f05cddf9SRui Paulo size_t pos;
36f05cddf9SRui Paulo const unsigned char *addr[3];
37f05cddf9SRui Paulo size_t len[3];
38f05cddf9SRui Paulo
39f05cddf9SRui Paulo addr[0] = A;
40f05cddf9SRui Paulo len[0] = SHA256_MAC_LEN;
41f05cddf9SRui Paulo addr[1] = (unsigned char *) label;
42f05cddf9SRui Paulo len[1] = os_strlen(label);
43f05cddf9SRui Paulo addr[2] = seed;
44f05cddf9SRui Paulo len[2] = seed_len;
45f05cddf9SRui Paulo
46f05cddf9SRui Paulo /*
47f05cddf9SRui Paulo * RFC 5246, Chapter 5
48f05cddf9SRui Paulo * A(0) = seed, A(i) = HMAC(secret, A(i-1))
49f05cddf9SRui Paulo * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + ..
50f05cddf9SRui Paulo * PRF(secret, label, seed) = P_SHA256(secret, label + seed)
51f05cddf9SRui Paulo */
52f05cddf9SRui Paulo
53*206b73d0SCy Schubert if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0)
54*206b73d0SCy Schubert return -1;
55f05cddf9SRui Paulo
56f05cddf9SRui Paulo pos = 0;
57f05cddf9SRui Paulo while (pos < outlen) {
58*206b73d0SCy Schubert if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) <
59*206b73d0SCy Schubert 0 ||
60*206b73d0SCy Schubert hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A) < 0)
61*206b73d0SCy Schubert return -1;
62f05cddf9SRui Paulo
63f05cddf9SRui Paulo clen = outlen - pos;
64f05cddf9SRui Paulo if (clen > SHA256_MAC_LEN)
65f05cddf9SRui Paulo clen = SHA256_MAC_LEN;
66f05cddf9SRui Paulo os_memcpy(out + pos, P, clen);
67f05cddf9SRui Paulo pos += clen;
68f05cddf9SRui Paulo }
69*206b73d0SCy Schubert
70*206b73d0SCy Schubert return 0;
71f05cddf9SRui Paulo }
72