xref: /freebsd-src/crypto/openssl/providers/implementations/kdfs/tls1_prf.c (revision b077aed33b7b6aefca7b17ddb250cf521f938613)
1*b077aed3SPierre Pronchery /*
2*b077aed3SPierre Pronchery  * Copyright 2016-2022 The OpenSSL Project Authors. All Rights Reserved.
3*b077aed3SPierre Pronchery  *
4*b077aed3SPierre Pronchery  * Licensed under the Apache License 2.0 (the "License").  You may not use
5*b077aed3SPierre Pronchery  * this file except in compliance with the License.  You can obtain a copy
6*b077aed3SPierre Pronchery  * in the file LICENSE in the source distribution or at
7*b077aed3SPierre Pronchery  * https://www.openssl.org/source/license.html
8*b077aed3SPierre Pronchery  */
9*b077aed3SPierre Pronchery 
10*b077aed3SPierre Pronchery /*
11*b077aed3SPierre Pronchery  * Refer to "The TLS Protocol Version 1.0" Section 5
12*b077aed3SPierre Pronchery  * (https://tools.ietf.org/html/rfc2246#section-5) and
13*b077aed3SPierre Pronchery  * "The Transport Layer Security (TLS) Protocol Version 1.2" Section 5
14*b077aed3SPierre Pronchery  * (https://tools.ietf.org/html/rfc5246#section-5).
15*b077aed3SPierre Pronchery  *
16*b077aed3SPierre Pronchery  * For TLS v1.0 and TLS v1.1 the TLS PRF algorithm is given by:
17*b077aed3SPierre Pronchery  *
18*b077aed3SPierre Pronchery  *   PRF(secret, label, seed) = P_MD5(S1, label + seed) XOR
19*b077aed3SPierre Pronchery  *                              P_SHA-1(S2, label + seed)
20*b077aed3SPierre Pronchery  *
21*b077aed3SPierre Pronchery  * where P_MD5 and P_SHA-1 are defined by P_<hash>, below, and S1 and S2 are
22*b077aed3SPierre Pronchery  * two halves of the secret (with the possibility of one shared byte, in the
23*b077aed3SPierre Pronchery  * case where the length of the original secret is odd).  S1 is taken from the
24*b077aed3SPierre Pronchery  * first half of the secret, S2 from the second half.
25*b077aed3SPierre Pronchery  *
26*b077aed3SPierre Pronchery  * For TLS v1.2 the TLS PRF algorithm is given by:
27*b077aed3SPierre Pronchery  *
28*b077aed3SPierre Pronchery  *   PRF(secret, label, seed) = P_<hash>(secret, label + seed)
29*b077aed3SPierre Pronchery  *
30*b077aed3SPierre Pronchery  * where hash is SHA-256 for all cipher suites defined in RFC 5246 as well as
31*b077aed3SPierre Pronchery  * those published prior to TLS v1.2 while the TLS v1.2 protocol is in effect,
32*b077aed3SPierre Pronchery  * unless defined otherwise by the cipher suite.
33*b077aed3SPierre Pronchery  *
34*b077aed3SPierre Pronchery  * P_<hash> is an expansion function that uses a single hash function to expand
35*b077aed3SPierre Pronchery  * a secret and seed into an arbitrary quantity of output:
36*b077aed3SPierre Pronchery  *
37*b077aed3SPierre Pronchery  *   P_<hash>(secret, seed) = HMAC_<hash>(secret, A(1) + seed) +
38*b077aed3SPierre Pronchery  *                            HMAC_<hash>(secret, A(2) + seed) +
39*b077aed3SPierre Pronchery  *                            HMAC_<hash>(secret, A(3) + seed) + ...
40*b077aed3SPierre Pronchery  *
41*b077aed3SPierre Pronchery  * where + indicates concatenation.  P_<hash> can be iterated as many times as
42*b077aed3SPierre Pronchery  * is necessary to produce the required quantity of data.
43*b077aed3SPierre Pronchery  *
44*b077aed3SPierre Pronchery  * A(i) is defined as:
45*b077aed3SPierre Pronchery  *     A(0) = seed
46*b077aed3SPierre Pronchery  *     A(i) = HMAC_<hash>(secret, A(i-1))
47*b077aed3SPierre Pronchery  */
48*b077aed3SPierre Pronchery #include <stdio.h>
49*b077aed3SPierre Pronchery #include <stdarg.h>
50*b077aed3SPierre Pronchery #include <string.h>
51*b077aed3SPierre Pronchery #include <openssl/evp.h>
52*b077aed3SPierre Pronchery #include <openssl/kdf.h>
53*b077aed3SPierre Pronchery #include <openssl/core_names.h>
54*b077aed3SPierre Pronchery #include <openssl/params.h>
55*b077aed3SPierre Pronchery #include <openssl/proverr.h>
56*b077aed3SPierre Pronchery #include "internal/cryptlib.h"
57*b077aed3SPierre Pronchery #include "internal/numbers.h"
58*b077aed3SPierre Pronchery #include "crypto/evp.h"
59*b077aed3SPierre Pronchery #include "prov/provider_ctx.h"
60*b077aed3SPierre Pronchery #include "prov/providercommon.h"
61*b077aed3SPierre Pronchery #include "prov/implementations.h"
62*b077aed3SPierre Pronchery #include "prov/provider_util.h"
63*b077aed3SPierre Pronchery #include "e_os.h"
64*b077aed3SPierre Pronchery 
65*b077aed3SPierre Pronchery static OSSL_FUNC_kdf_newctx_fn kdf_tls1_prf_new;
66*b077aed3SPierre Pronchery static OSSL_FUNC_kdf_freectx_fn kdf_tls1_prf_free;
67*b077aed3SPierre Pronchery static OSSL_FUNC_kdf_reset_fn kdf_tls1_prf_reset;
68*b077aed3SPierre Pronchery static OSSL_FUNC_kdf_derive_fn kdf_tls1_prf_derive;
69*b077aed3SPierre Pronchery static OSSL_FUNC_kdf_settable_ctx_params_fn kdf_tls1_prf_settable_ctx_params;
70*b077aed3SPierre Pronchery static OSSL_FUNC_kdf_set_ctx_params_fn kdf_tls1_prf_set_ctx_params;
71*b077aed3SPierre Pronchery static OSSL_FUNC_kdf_gettable_ctx_params_fn kdf_tls1_prf_gettable_ctx_params;
72*b077aed3SPierre Pronchery static OSSL_FUNC_kdf_get_ctx_params_fn kdf_tls1_prf_get_ctx_params;
73*b077aed3SPierre Pronchery 
74*b077aed3SPierre Pronchery static int tls1_prf_alg(EVP_MAC_CTX *mdctx, EVP_MAC_CTX *sha1ctx,
75*b077aed3SPierre Pronchery                         const unsigned char *sec, size_t slen,
76*b077aed3SPierre Pronchery                         const unsigned char *seed, size_t seed_len,
77*b077aed3SPierre Pronchery                         unsigned char *out, size_t olen);
78*b077aed3SPierre Pronchery 
79*b077aed3SPierre Pronchery #define TLS1_PRF_MAXBUF 1024
80*b077aed3SPierre Pronchery 
81*b077aed3SPierre Pronchery /* TLS KDF kdf context structure */
82*b077aed3SPierre Pronchery typedef struct {
83*b077aed3SPierre Pronchery     void *provctx;
84*b077aed3SPierre Pronchery 
85*b077aed3SPierre Pronchery     /* MAC context for the main digest */
86*b077aed3SPierre Pronchery     EVP_MAC_CTX *P_hash;
87*b077aed3SPierre Pronchery     /* MAC context for SHA1 for the MD5/SHA-1 combined PRF */
88*b077aed3SPierre Pronchery     EVP_MAC_CTX *P_sha1;
89*b077aed3SPierre Pronchery 
90*b077aed3SPierre Pronchery     /* Secret value to use for PRF */
91*b077aed3SPierre Pronchery     unsigned char *sec;
92*b077aed3SPierre Pronchery     size_t seclen;
93*b077aed3SPierre Pronchery     /* Buffer of concatenated seed data */
94*b077aed3SPierre Pronchery     unsigned char seed[TLS1_PRF_MAXBUF];
95*b077aed3SPierre Pronchery     size_t seedlen;
96*b077aed3SPierre Pronchery } TLS1_PRF;
97*b077aed3SPierre Pronchery 
kdf_tls1_prf_new(void * provctx)98*b077aed3SPierre Pronchery static void *kdf_tls1_prf_new(void *provctx)
99*b077aed3SPierre Pronchery {
100*b077aed3SPierre Pronchery     TLS1_PRF *ctx;
101*b077aed3SPierre Pronchery 
102*b077aed3SPierre Pronchery     if (!ossl_prov_is_running())
103*b077aed3SPierre Pronchery         return NULL;
104*b077aed3SPierre Pronchery 
105*b077aed3SPierre Pronchery     if ((ctx = OPENSSL_zalloc(sizeof(*ctx))) == NULL) {
106*b077aed3SPierre Pronchery         ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE);
107*b077aed3SPierre Pronchery         return NULL;
108*b077aed3SPierre Pronchery     }
109*b077aed3SPierre Pronchery     ctx->provctx = provctx;
110*b077aed3SPierre Pronchery     return ctx;
111*b077aed3SPierre Pronchery }
112*b077aed3SPierre Pronchery 
kdf_tls1_prf_free(void * vctx)113*b077aed3SPierre Pronchery static void kdf_tls1_prf_free(void *vctx)
114*b077aed3SPierre Pronchery {
115*b077aed3SPierre Pronchery     TLS1_PRF *ctx = (TLS1_PRF *)vctx;
116*b077aed3SPierre Pronchery 
117*b077aed3SPierre Pronchery     if (ctx != NULL) {
118*b077aed3SPierre Pronchery         kdf_tls1_prf_reset(ctx);
119*b077aed3SPierre Pronchery         OPENSSL_free(ctx);
120*b077aed3SPierre Pronchery     }
121*b077aed3SPierre Pronchery }
122*b077aed3SPierre Pronchery 
kdf_tls1_prf_reset(void * vctx)123*b077aed3SPierre Pronchery static void kdf_tls1_prf_reset(void *vctx)
124*b077aed3SPierre Pronchery {
125*b077aed3SPierre Pronchery     TLS1_PRF *ctx = (TLS1_PRF *)vctx;
126*b077aed3SPierre Pronchery     void *provctx = ctx->provctx;
127*b077aed3SPierre Pronchery 
128*b077aed3SPierre Pronchery     EVP_MAC_CTX_free(ctx->P_hash);
129*b077aed3SPierre Pronchery     EVP_MAC_CTX_free(ctx->P_sha1);
130*b077aed3SPierre Pronchery     OPENSSL_clear_free(ctx->sec, ctx->seclen);
131*b077aed3SPierre Pronchery     OPENSSL_cleanse(ctx->seed, ctx->seedlen);
132*b077aed3SPierre Pronchery     memset(ctx, 0, sizeof(*ctx));
133*b077aed3SPierre Pronchery     ctx->provctx = provctx;
134*b077aed3SPierre Pronchery }
135*b077aed3SPierre Pronchery 
kdf_tls1_prf_derive(void * vctx,unsigned char * key,size_t keylen,const OSSL_PARAM params[])136*b077aed3SPierre Pronchery static int kdf_tls1_prf_derive(void *vctx, unsigned char *key, size_t keylen,
137*b077aed3SPierre Pronchery                                const OSSL_PARAM params[])
138*b077aed3SPierre Pronchery {
139*b077aed3SPierre Pronchery     TLS1_PRF *ctx = (TLS1_PRF *)vctx;
140*b077aed3SPierre Pronchery 
141*b077aed3SPierre Pronchery     if (!ossl_prov_is_running() || !kdf_tls1_prf_set_ctx_params(ctx, params))
142*b077aed3SPierre Pronchery         return 0;
143*b077aed3SPierre Pronchery 
144*b077aed3SPierre Pronchery     if (ctx->P_hash == NULL) {
145*b077aed3SPierre Pronchery         ERR_raise(ERR_LIB_PROV, PROV_R_MISSING_MESSAGE_DIGEST);
146*b077aed3SPierre Pronchery         return 0;
147*b077aed3SPierre Pronchery     }
148*b077aed3SPierre Pronchery     if (ctx->sec == NULL) {
149*b077aed3SPierre Pronchery         ERR_raise(ERR_LIB_PROV, PROV_R_MISSING_SECRET);
150*b077aed3SPierre Pronchery         return 0;
151*b077aed3SPierre Pronchery     }
152*b077aed3SPierre Pronchery     if (ctx->seedlen == 0) {
153*b077aed3SPierre Pronchery         ERR_raise(ERR_LIB_PROV, PROV_R_MISSING_SEED);
154*b077aed3SPierre Pronchery         return 0;
155*b077aed3SPierre Pronchery     }
156*b077aed3SPierre Pronchery     if (keylen == 0) {
157*b077aed3SPierre Pronchery         ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH);
158*b077aed3SPierre Pronchery         return 0;
159*b077aed3SPierre Pronchery     }
160*b077aed3SPierre Pronchery 
161*b077aed3SPierre Pronchery     return tls1_prf_alg(ctx->P_hash, ctx->P_sha1,
162*b077aed3SPierre Pronchery                         ctx->sec, ctx->seclen,
163*b077aed3SPierre Pronchery                         ctx->seed, ctx->seedlen,
164*b077aed3SPierre Pronchery                         key, keylen);
165*b077aed3SPierre Pronchery }
166*b077aed3SPierre Pronchery 
kdf_tls1_prf_set_ctx_params(void * vctx,const OSSL_PARAM params[])167*b077aed3SPierre Pronchery static int kdf_tls1_prf_set_ctx_params(void *vctx, const OSSL_PARAM params[])
168*b077aed3SPierre Pronchery {
169*b077aed3SPierre Pronchery     const OSSL_PARAM *p;
170*b077aed3SPierre Pronchery     TLS1_PRF *ctx = vctx;
171*b077aed3SPierre Pronchery     OSSL_LIB_CTX *libctx = PROV_LIBCTX_OF(ctx->provctx);
172*b077aed3SPierre Pronchery 
173*b077aed3SPierre Pronchery     if (params == NULL)
174*b077aed3SPierre Pronchery         return 1;
175*b077aed3SPierre Pronchery 
176*b077aed3SPierre Pronchery     if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_DIGEST)) != NULL) {
177*b077aed3SPierre Pronchery         if (OPENSSL_strcasecmp(p->data, SN_md5_sha1) == 0) {
178*b077aed3SPierre Pronchery             if (!ossl_prov_macctx_load_from_params(&ctx->P_hash, params,
179*b077aed3SPierre Pronchery                                                    OSSL_MAC_NAME_HMAC,
180*b077aed3SPierre Pronchery                                                    NULL, SN_md5, libctx)
181*b077aed3SPierre Pronchery                 || !ossl_prov_macctx_load_from_params(&ctx->P_sha1, params,
182*b077aed3SPierre Pronchery                                                       OSSL_MAC_NAME_HMAC,
183*b077aed3SPierre Pronchery                                                       NULL, SN_sha1, libctx))
184*b077aed3SPierre Pronchery                 return 0;
185*b077aed3SPierre Pronchery         } else {
186*b077aed3SPierre Pronchery             EVP_MAC_CTX_free(ctx->P_sha1);
187*b077aed3SPierre Pronchery             if (!ossl_prov_macctx_load_from_params(&ctx->P_hash, params,
188*b077aed3SPierre Pronchery                                                    OSSL_MAC_NAME_HMAC,
189*b077aed3SPierre Pronchery                                                    NULL, NULL, libctx))
190*b077aed3SPierre Pronchery                 return 0;
191*b077aed3SPierre Pronchery         }
192*b077aed3SPierre Pronchery     }
193*b077aed3SPierre Pronchery 
194*b077aed3SPierre Pronchery     if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_SECRET)) != NULL) {
195*b077aed3SPierre Pronchery         OPENSSL_clear_free(ctx->sec, ctx->seclen);
196*b077aed3SPierre Pronchery         ctx->sec = NULL;
197*b077aed3SPierre Pronchery         if (!OSSL_PARAM_get_octet_string(p, (void **)&ctx->sec, 0, &ctx->seclen))
198*b077aed3SPierre Pronchery             return 0;
199*b077aed3SPierre Pronchery     }
200*b077aed3SPierre Pronchery     /* The seed fields concatenate, so process them all */
201*b077aed3SPierre Pronchery     if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_SEED)) != NULL) {
202*b077aed3SPierre Pronchery         for (; p != NULL; p = OSSL_PARAM_locate_const(p + 1,
203*b077aed3SPierre Pronchery                                                       OSSL_KDF_PARAM_SEED)) {
204*b077aed3SPierre Pronchery             const void *q = ctx->seed + ctx->seedlen;
205*b077aed3SPierre Pronchery             size_t sz = 0;
206*b077aed3SPierre Pronchery 
207*b077aed3SPierre Pronchery             if (p->data_size != 0
208*b077aed3SPierre Pronchery                 && p->data != NULL
209*b077aed3SPierre Pronchery                 && !OSSL_PARAM_get_octet_string(p, (void **)&q,
210*b077aed3SPierre Pronchery                                                 TLS1_PRF_MAXBUF - ctx->seedlen,
211*b077aed3SPierre Pronchery                                                 &sz))
212*b077aed3SPierre Pronchery                 return 0;
213*b077aed3SPierre Pronchery             ctx->seedlen += sz;
214*b077aed3SPierre Pronchery         }
215*b077aed3SPierre Pronchery     }
216*b077aed3SPierre Pronchery     return 1;
217*b077aed3SPierre Pronchery }
218*b077aed3SPierre Pronchery 
kdf_tls1_prf_settable_ctx_params(ossl_unused void * ctx,ossl_unused void * provctx)219*b077aed3SPierre Pronchery static const OSSL_PARAM *kdf_tls1_prf_settable_ctx_params(
220*b077aed3SPierre Pronchery         ossl_unused void *ctx, ossl_unused void *provctx)
221*b077aed3SPierre Pronchery {
222*b077aed3SPierre Pronchery     static const OSSL_PARAM known_settable_ctx_params[] = {
223*b077aed3SPierre Pronchery         OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_PROPERTIES, NULL, 0),
224*b077aed3SPierre Pronchery         OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_DIGEST, NULL, 0),
225*b077aed3SPierre Pronchery         OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SECRET, NULL, 0),
226*b077aed3SPierre Pronchery         OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SEED, NULL, 0),
227*b077aed3SPierre Pronchery         OSSL_PARAM_END
228*b077aed3SPierre Pronchery     };
229*b077aed3SPierre Pronchery     return known_settable_ctx_params;
230*b077aed3SPierre Pronchery }
231*b077aed3SPierre Pronchery 
kdf_tls1_prf_get_ctx_params(void * vctx,OSSL_PARAM params[])232*b077aed3SPierre Pronchery static int kdf_tls1_prf_get_ctx_params(void *vctx, OSSL_PARAM params[])
233*b077aed3SPierre Pronchery {
234*b077aed3SPierre Pronchery     OSSL_PARAM *p;
235*b077aed3SPierre Pronchery 
236*b077aed3SPierre Pronchery     if ((p = OSSL_PARAM_locate(params, OSSL_KDF_PARAM_SIZE)) != NULL)
237*b077aed3SPierre Pronchery         return OSSL_PARAM_set_size_t(p, SIZE_MAX);
238*b077aed3SPierre Pronchery     return -2;
239*b077aed3SPierre Pronchery }
240*b077aed3SPierre Pronchery 
kdf_tls1_prf_gettable_ctx_params(ossl_unused void * ctx,ossl_unused void * provctx)241*b077aed3SPierre Pronchery static const OSSL_PARAM *kdf_tls1_prf_gettable_ctx_params(
242*b077aed3SPierre Pronchery         ossl_unused void *ctx, ossl_unused void *provctx)
243*b077aed3SPierre Pronchery {
244*b077aed3SPierre Pronchery     static const OSSL_PARAM known_gettable_ctx_params[] = {
245*b077aed3SPierre Pronchery         OSSL_PARAM_size_t(OSSL_KDF_PARAM_SIZE, NULL),
246*b077aed3SPierre Pronchery         OSSL_PARAM_END
247*b077aed3SPierre Pronchery     };
248*b077aed3SPierre Pronchery     return known_gettable_ctx_params;
249*b077aed3SPierre Pronchery }
250*b077aed3SPierre Pronchery 
251*b077aed3SPierre Pronchery const OSSL_DISPATCH ossl_kdf_tls1_prf_functions[] = {
252*b077aed3SPierre Pronchery     { OSSL_FUNC_KDF_NEWCTX, (void(*)(void))kdf_tls1_prf_new },
253*b077aed3SPierre Pronchery     { OSSL_FUNC_KDF_FREECTX, (void(*)(void))kdf_tls1_prf_free },
254*b077aed3SPierre Pronchery     { OSSL_FUNC_KDF_RESET, (void(*)(void))kdf_tls1_prf_reset },
255*b077aed3SPierre Pronchery     { OSSL_FUNC_KDF_DERIVE, (void(*)(void))kdf_tls1_prf_derive },
256*b077aed3SPierre Pronchery     { OSSL_FUNC_KDF_SETTABLE_CTX_PARAMS,
257*b077aed3SPierre Pronchery       (void(*)(void))kdf_tls1_prf_settable_ctx_params },
258*b077aed3SPierre Pronchery     { OSSL_FUNC_KDF_SET_CTX_PARAMS,
259*b077aed3SPierre Pronchery       (void(*)(void))kdf_tls1_prf_set_ctx_params },
260*b077aed3SPierre Pronchery     { OSSL_FUNC_KDF_GETTABLE_CTX_PARAMS,
261*b077aed3SPierre Pronchery       (void(*)(void))kdf_tls1_prf_gettable_ctx_params },
262*b077aed3SPierre Pronchery     { OSSL_FUNC_KDF_GET_CTX_PARAMS,
263*b077aed3SPierre Pronchery       (void(*)(void))kdf_tls1_prf_get_ctx_params },
264*b077aed3SPierre Pronchery     { 0, NULL }
265*b077aed3SPierre Pronchery };
266*b077aed3SPierre Pronchery 
267*b077aed3SPierre Pronchery /*
268*b077aed3SPierre Pronchery  * Refer to "The TLS Protocol Version 1.0" Section 5
269*b077aed3SPierre Pronchery  * (https://tools.ietf.org/html/rfc2246#section-5) and
270*b077aed3SPierre Pronchery  * "The Transport Layer Security (TLS) Protocol Version 1.2" Section 5
271*b077aed3SPierre Pronchery  * (https://tools.ietf.org/html/rfc5246#section-5).
272*b077aed3SPierre Pronchery  *
273*b077aed3SPierre Pronchery  * P_<hash> is an expansion function that uses a single hash function to expand
274*b077aed3SPierre Pronchery  * a secret and seed into an arbitrary quantity of output:
275*b077aed3SPierre Pronchery  *
276*b077aed3SPierre Pronchery  *   P_<hash>(secret, seed) = HMAC_<hash>(secret, A(1) + seed) +
277*b077aed3SPierre Pronchery  *                            HMAC_<hash>(secret, A(2) + seed) +
278*b077aed3SPierre Pronchery  *                            HMAC_<hash>(secret, A(3) + seed) + ...
279*b077aed3SPierre Pronchery  *
280*b077aed3SPierre Pronchery  * where + indicates concatenation.  P_<hash> can be iterated as many times as
281*b077aed3SPierre Pronchery  * is necessary to produce the required quantity of data.
282*b077aed3SPierre Pronchery  *
283*b077aed3SPierre Pronchery  * A(i) is defined as:
284*b077aed3SPierre Pronchery  *     A(0) = seed
285*b077aed3SPierre Pronchery  *     A(i) = HMAC_<hash>(secret, A(i-1))
286*b077aed3SPierre Pronchery  */
tls1_prf_P_hash(EVP_MAC_CTX * ctx_init,const unsigned char * sec,size_t sec_len,const unsigned char * seed,size_t seed_len,unsigned char * out,size_t olen)287*b077aed3SPierre Pronchery static int tls1_prf_P_hash(EVP_MAC_CTX *ctx_init,
288*b077aed3SPierre Pronchery                            const unsigned char *sec, size_t sec_len,
289*b077aed3SPierre Pronchery                            const unsigned char *seed, size_t seed_len,
290*b077aed3SPierre Pronchery                            unsigned char *out, size_t olen)
291*b077aed3SPierre Pronchery {
292*b077aed3SPierre Pronchery     size_t chunk;
293*b077aed3SPierre Pronchery     EVP_MAC_CTX *ctx = NULL, *ctx_Ai = NULL;
294*b077aed3SPierre Pronchery     unsigned char Ai[EVP_MAX_MD_SIZE];
295*b077aed3SPierre Pronchery     size_t Ai_len;
296*b077aed3SPierre Pronchery     int ret = 0;
297*b077aed3SPierre Pronchery 
298*b077aed3SPierre Pronchery     if (!EVP_MAC_init(ctx_init, sec, sec_len, NULL))
299*b077aed3SPierre Pronchery         goto err;
300*b077aed3SPierre Pronchery     chunk = EVP_MAC_CTX_get_mac_size(ctx_init);
301*b077aed3SPierre Pronchery     if (chunk == 0)
302*b077aed3SPierre Pronchery         goto err;
303*b077aed3SPierre Pronchery     /* A(0) = seed */
304*b077aed3SPierre Pronchery     ctx_Ai = EVP_MAC_CTX_dup(ctx_init);
305*b077aed3SPierre Pronchery     if (ctx_Ai == NULL)
306*b077aed3SPierre Pronchery         goto err;
307*b077aed3SPierre Pronchery     if (seed != NULL && !EVP_MAC_update(ctx_Ai, seed, seed_len))
308*b077aed3SPierre Pronchery         goto err;
309*b077aed3SPierre Pronchery 
310*b077aed3SPierre Pronchery     for (;;) {
311*b077aed3SPierre Pronchery         /* calc: A(i) = HMAC_<hash>(secret, A(i-1)) */
312*b077aed3SPierre Pronchery         if (!EVP_MAC_final(ctx_Ai, Ai, &Ai_len, sizeof(Ai)))
313*b077aed3SPierre Pronchery             goto err;
314*b077aed3SPierre Pronchery         EVP_MAC_CTX_free(ctx_Ai);
315*b077aed3SPierre Pronchery         ctx_Ai = NULL;
316*b077aed3SPierre Pronchery 
317*b077aed3SPierre Pronchery         /* calc next chunk: HMAC_<hash>(secret, A(i) + seed) */
318*b077aed3SPierre Pronchery         ctx = EVP_MAC_CTX_dup(ctx_init);
319*b077aed3SPierre Pronchery         if (ctx == NULL)
320*b077aed3SPierre Pronchery             goto err;
321*b077aed3SPierre Pronchery         if (!EVP_MAC_update(ctx, Ai, Ai_len))
322*b077aed3SPierre Pronchery             goto err;
323*b077aed3SPierre Pronchery         /* save state for calculating next A(i) value */
324*b077aed3SPierre Pronchery         if (olen > chunk) {
325*b077aed3SPierre Pronchery             ctx_Ai = EVP_MAC_CTX_dup(ctx);
326*b077aed3SPierre Pronchery             if (ctx_Ai == NULL)
327*b077aed3SPierre Pronchery                 goto err;
328*b077aed3SPierre Pronchery         }
329*b077aed3SPierre Pronchery         if (seed != NULL && !EVP_MAC_update(ctx, seed, seed_len))
330*b077aed3SPierre Pronchery             goto err;
331*b077aed3SPierre Pronchery         if (olen <= chunk) {
332*b077aed3SPierre Pronchery             /* last chunk - use Ai as temp bounce buffer */
333*b077aed3SPierre Pronchery             if (!EVP_MAC_final(ctx, Ai, &Ai_len, sizeof(Ai)))
334*b077aed3SPierre Pronchery                 goto err;
335*b077aed3SPierre Pronchery             memcpy(out, Ai, olen);
336*b077aed3SPierre Pronchery             break;
337*b077aed3SPierre Pronchery         }
338*b077aed3SPierre Pronchery         if (!EVP_MAC_final(ctx, out, NULL, olen))
339*b077aed3SPierre Pronchery             goto err;
340*b077aed3SPierre Pronchery         EVP_MAC_CTX_free(ctx);
341*b077aed3SPierre Pronchery         ctx = NULL;
342*b077aed3SPierre Pronchery         out += chunk;
343*b077aed3SPierre Pronchery         olen -= chunk;
344*b077aed3SPierre Pronchery     }
345*b077aed3SPierre Pronchery     ret = 1;
346*b077aed3SPierre Pronchery  err:
347*b077aed3SPierre Pronchery     EVP_MAC_CTX_free(ctx);
348*b077aed3SPierre Pronchery     EVP_MAC_CTX_free(ctx_Ai);
349*b077aed3SPierre Pronchery     OPENSSL_cleanse(Ai, sizeof(Ai));
350*b077aed3SPierre Pronchery     return ret;
351*b077aed3SPierre Pronchery }
352*b077aed3SPierre Pronchery 
353*b077aed3SPierre Pronchery /*
354*b077aed3SPierre Pronchery  * Refer to "The TLS Protocol Version 1.0" Section 5
355*b077aed3SPierre Pronchery  * (https://tools.ietf.org/html/rfc2246#section-5) and
356*b077aed3SPierre Pronchery  * "The Transport Layer Security (TLS) Protocol Version 1.2" Section 5
357*b077aed3SPierre Pronchery  * (https://tools.ietf.org/html/rfc5246#section-5).
358*b077aed3SPierre Pronchery  *
359*b077aed3SPierre Pronchery  * For TLS v1.0 and TLS v1.1:
360*b077aed3SPierre Pronchery  *
361*b077aed3SPierre Pronchery  *   PRF(secret, label, seed) = P_MD5(S1, label + seed) XOR
362*b077aed3SPierre Pronchery  *                              P_SHA-1(S2, label + seed)
363*b077aed3SPierre Pronchery  *
364*b077aed3SPierre Pronchery  * S1 is taken from the first half of the secret, S2 from the second half.
365*b077aed3SPierre Pronchery  *
366*b077aed3SPierre Pronchery  *   L_S = length in bytes of secret;
367*b077aed3SPierre Pronchery  *   L_S1 = L_S2 = ceil(L_S / 2);
368*b077aed3SPierre Pronchery  *
369*b077aed3SPierre Pronchery  * For TLS v1.2:
370*b077aed3SPierre Pronchery  *
371*b077aed3SPierre Pronchery  *   PRF(secret, label, seed) = P_<hash>(secret, label + seed)
372*b077aed3SPierre Pronchery  */
tls1_prf_alg(EVP_MAC_CTX * mdctx,EVP_MAC_CTX * sha1ctx,const unsigned char * sec,size_t slen,const unsigned char * seed,size_t seed_len,unsigned char * out,size_t olen)373*b077aed3SPierre Pronchery static int tls1_prf_alg(EVP_MAC_CTX *mdctx, EVP_MAC_CTX *sha1ctx,
374*b077aed3SPierre Pronchery                         const unsigned char *sec, size_t slen,
375*b077aed3SPierre Pronchery                         const unsigned char *seed, size_t seed_len,
376*b077aed3SPierre Pronchery                         unsigned char *out, size_t olen)
377*b077aed3SPierre Pronchery {
378*b077aed3SPierre Pronchery     if (sha1ctx != NULL) {
379*b077aed3SPierre Pronchery         /* TLS v1.0 and TLS v1.1 */
380*b077aed3SPierre Pronchery         size_t i;
381*b077aed3SPierre Pronchery         unsigned char *tmp;
382*b077aed3SPierre Pronchery         /* calc: L_S1 = L_S2 = ceil(L_S / 2) */
383*b077aed3SPierre Pronchery         size_t L_S1 = (slen + 1) / 2;
384*b077aed3SPierre Pronchery         size_t L_S2 = L_S1;
385*b077aed3SPierre Pronchery 
386*b077aed3SPierre Pronchery         if (!tls1_prf_P_hash(mdctx, sec, L_S1,
387*b077aed3SPierre Pronchery                              seed, seed_len, out, olen))
388*b077aed3SPierre Pronchery             return 0;
389*b077aed3SPierre Pronchery 
390*b077aed3SPierre Pronchery         if ((tmp = OPENSSL_malloc(olen)) == NULL) {
391*b077aed3SPierre Pronchery             ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE);
392*b077aed3SPierre Pronchery             return 0;
393*b077aed3SPierre Pronchery         }
394*b077aed3SPierre Pronchery 
395*b077aed3SPierre Pronchery         if (!tls1_prf_P_hash(sha1ctx, sec + slen - L_S2, L_S2,
396*b077aed3SPierre Pronchery                              seed, seed_len, tmp, olen)) {
397*b077aed3SPierre Pronchery             OPENSSL_clear_free(tmp, olen);
398*b077aed3SPierre Pronchery             return 0;
399*b077aed3SPierre Pronchery         }
400*b077aed3SPierre Pronchery         for (i = 0; i < olen; i++)
401*b077aed3SPierre Pronchery             out[i] ^= tmp[i];
402*b077aed3SPierre Pronchery         OPENSSL_clear_free(tmp, olen);
403*b077aed3SPierre Pronchery         return 1;
404*b077aed3SPierre Pronchery     }
405*b077aed3SPierre Pronchery 
406*b077aed3SPierre Pronchery     /* TLS v1.2 */
407*b077aed3SPierre Pronchery     if (!tls1_prf_P_hash(mdctx, sec, slen, seed, seed_len, out, olen))
408*b077aed3SPierre Pronchery         return 0;
409*b077aed3SPierre Pronchery 
410*b077aed3SPierre Pronchery     return 1;
411*b077aed3SPierre Pronchery }
412