xref: /freebsd/contrib/wpa/src/crypto/sha256-tlsprf.c (revision c5c3ba6b43cac20dc9432eac15758d41cb2b8b1f)
1f05cddf9SRui Paulo /*
2f05cddf9SRui Paulo  * TLS PRF P_SHA256
3f05cddf9SRui Paulo  * Copyright (c) 2011, Jouni Malinen <j@w1.fi>
4f05cddf9SRui Paulo  *
5f05cddf9SRui Paulo  * This software may be distributed under the terms of the BSD license.
6f05cddf9SRui Paulo  * See README for more details.
7f05cddf9SRui Paulo  */
8f05cddf9SRui Paulo 
9f05cddf9SRui Paulo #include "includes.h"
10f05cddf9SRui Paulo 
11f05cddf9SRui Paulo #include "common.h"
12f05cddf9SRui Paulo #include "sha256.h"
13f05cddf9SRui Paulo 
14f05cddf9SRui Paulo 
15f05cddf9SRui Paulo /**
16f05cddf9SRui Paulo  * tls_prf_sha256 - Pseudo-Random Function for TLS v1.2 (P_SHA256, RFC 5246)
17f05cddf9SRui Paulo  * @secret: Key for PRF
18f05cddf9SRui Paulo  * @secret_len: Length of the key in bytes
19f05cddf9SRui Paulo  * @label: A unique label for each purpose of the PRF
20f05cddf9SRui Paulo  * @seed: Seed value to bind into the key
21f05cddf9SRui Paulo  * @seed_len: Length of the seed
22f05cddf9SRui Paulo  * @out: Buffer for the generated pseudo-random key
23f05cddf9SRui Paulo  * @outlen: Number of bytes of key to generate
24f05cddf9SRui Paulo  * Returns: 0 on success, -1 on failure.
25f05cddf9SRui Paulo  *
26f05cddf9SRui Paulo  * This function is used to derive new, cryptographically separate keys from a
27f05cddf9SRui Paulo  * given key in TLS. This PRF is defined in RFC 2246, Chapter 5.
28f05cddf9SRui Paulo  */
tls_prf_sha256(const u8 * secret,size_t secret_len,const char * label,const u8 * seed,size_t seed_len,u8 * out,size_t outlen)29*206b73d0SCy Schubert int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label,
30f05cddf9SRui Paulo 		   const u8 *seed, size_t seed_len, u8 *out, size_t outlen)
31f05cddf9SRui Paulo {
32f05cddf9SRui Paulo 	size_t clen;
33f05cddf9SRui Paulo 	u8 A[SHA256_MAC_LEN];
34f05cddf9SRui Paulo 	u8 P[SHA256_MAC_LEN];
35f05cddf9SRui Paulo 	size_t pos;
36f05cddf9SRui Paulo 	const unsigned char *addr[3];
37f05cddf9SRui Paulo 	size_t len[3];
38f05cddf9SRui Paulo 
39f05cddf9SRui Paulo 	addr[0] = A;
40f05cddf9SRui Paulo 	len[0] = SHA256_MAC_LEN;
41f05cddf9SRui Paulo 	addr[1] = (unsigned char *) label;
42f05cddf9SRui Paulo 	len[1] = os_strlen(label);
43f05cddf9SRui Paulo 	addr[2] = seed;
44f05cddf9SRui Paulo 	len[2] = seed_len;
45f05cddf9SRui Paulo 
46f05cddf9SRui Paulo 	/*
47f05cddf9SRui Paulo 	 * RFC 5246, Chapter 5
48f05cddf9SRui Paulo 	 * A(0) = seed, A(i) = HMAC(secret, A(i-1))
49f05cddf9SRui Paulo 	 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + ..
50f05cddf9SRui Paulo 	 * PRF(secret, label, seed) = P_SHA256(secret, label + seed)
51f05cddf9SRui Paulo 	 */
52f05cddf9SRui Paulo 
53*206b73d0SCy Schubert 	if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0)
54*206b73d0SCy Schubert 		return -1;
55f05cddf9SRui Paulo 
56f05cddf9SRui Paulo 	pos = 0;
57f05cddf9SRui Paulo 	while (pos < outlen) {
58*206b73d0SCy Schubert 		if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) <
59*206b73d0SCy Schubert 		    0 ||
60*206b73d0SCy Schubert 		    hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A) < 0)
61*206b73d0SCy Schubert 			return -1;
62f05cddf9SRui Paulo 
63f05cddf9SRui Paulo 		clen = outlen - pos;
64f05cddf9SRui Paulo 		if (clen > SHA256_MAC_LEN)
65f05cddf9SRui Paulo 			clen = SHA256_MAC_LEN;
66f05cddf9SRui Paulo 		os_memcpy(out + pos, P, clen);
67f05cddf9SRui Paulo 		pos += clen;
68f05cddf9SRui Paulo 	}
69*206b73d0SCy Schubert 
70*206b73d0SCy Schubert 	return 0;
71f05cddf9SRui Paulo }
72