1/* 2 * TLS PRF P_SHA256 3 * Copyright (c) 2011, Jouni Malinen <j@w1.fi> 4 * 5 * This software may be distributed under the terms of the BSD license. 6 * See README for more details. 7 */ 8 9#include "includes.h" 10 11#include "common.h" 12#include "sha256.h" 13 14 15/** 16 * tls_prf_sha256 - Pseudo-Random Function for TLS v1.2 (P_SHA256, RFC 5246) 17 * @secret: Key for PRF 18 * @secret_len: Length of the key in bytes 19 * @label: A unique label for each purpose of the PRF 20 * @seed: Seed value to bind into the key 21 * @seed_len: Length of the seed 22 * @out: Buffer for the generated pseudo-random key 23 * @outlen: Number of bytes of key to generate 24 * Returns: 0 on success, -1 on failure. 25 * 26 * This function is used to derive new, cryptographically separate keys from a 27 * given key in TLS. This PRF is defined in RFC 2246, Chapter 5. 28 */ 29void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 31{ 32 size_t clen; 33 u8 A[SHA256_MAC_LEN]; 34 u8 P[SHA256_MAC_LEN]; 35 size_t pos; 36 const unsigned char *addr[3]; 37 size_t len[3]; 38 39 addr[0] = A; 40 len[0] = SHA256_MAC_LEN; 41 addr[1] = (unsigned char *) label; 42 len[1] = os_strlen(label); 43 addr[2] = seed; 44 len[2] = seed_len; 45 46 /* 47 * RFC 5246, Chapter 5 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed) 51 */ 52 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 54 55 pos = 0; 56 while (pos < outlen) { 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); 58 hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A); 59 60 clen = outlen - pos; 61 if (clen > SHA256_MAC_LEN) 62 clen = SHA256_MAC_LEN; 63 os_memcpy(out + pos, P, clen); 64 pos += clen; 65 } 66} 67