blob: 9045cd36b4893703008ba1cc2e975330de9cb092 [file] [log] [blame]
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -08001/*
2 * TLS PRF P_SHA256
3 * Copyright (c) 2011, Jouni Malinen <j@w1.fi>
4 *
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08005 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -08007 */
8
9#include "includes.h"
10
11#include "common.h"
12#include "sha256.h"
13
14
15/**
16 * tls_prf_sha256 - Pseudo-Random Function for TLS v1.2 (P_SHA256, RFC 5246)
17 * @secret: Key for PRF
18 * @secret_len: Length of the key in bytes
19 * @label: A unique label for each purpose of the PRF
20 * @seed: Seed value to bind into the key
21 * @seed_len: Length of the seed
22 * @out: Buffer for the generated pseudo-random key
23 * @outlen: Number of bytes of key to generate
24 * Returns: 0 on success, -1 on failure.
25 *
26 * This function is used to derive new, cryptographically separate keys from a
27 * given key in TLS. This PRF is defined in RFC 2246, Chapter 5.
28 */
Hai Shalom878cf7b2019-07-15 14:55:18 -070029int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label,
30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen)
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -080031{
32 size_t clen;
33 u8 A[SHA256_MAC_LEN];
34 u8 P[SHA256_MAC_LEN];
35 size_t pos;
36 const unsigned char *addr[3];
37 size_t len[3];
38
39 addr[0] = A;
40 len[0] = SHA256_MAC_LEN;
41 addr[1] = (unsigned char *) label;
42 len[1] = os_strlen(label);
43 addr[2] = seed;
44 len[2] = seed_len;
45
46 /*
47 * RFC 5246, Chapter 5
48 * A(0) = seed, A(i) = HMAC(secret, A(i-1))
49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + ..
50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed)
51 */
52
Hai Shalom878cf7b2019-07-15 14:55:18 -070053 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0)
54 return -1;
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -080055
56 pos = 0;
57 while (pos < outlen) {
Hai Shalom878cf7b2019-07-15 14:55:18 -070058 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) <
59 0 ||
60 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A) < 0)
61 return -1;
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -080062
63 clen = outlen - pos;
64 if (clen > SHA256_MAC_LEN)
65 clen = SHA256_MAC_LEN;
66 os_memcpy(out + pos, P, clen);
67 pos += clen;
68 }
Hai Shalom878cf7b2019-07-15 14:55:18 -070069
70 return 0;
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -080071}