mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-11-27 04:14:23 +01:00
Implement PSA-based PSK-to-MS derivation in mbedtls_ssl_derive_keys
This commit is contained in:
parent
35b23c7484
commit
7d0a569d38
@ -607,6 +607,28 @@ static void ssl_calc_finished_tls_sha384( mbedtls_ssl_context *, unsigned char *
|
|||||||
#endif
|
#endif
|
||||||
#endif /* MBEDTLS_SSL_PROTO_TLS1_2 */
|
#endif /* MBEDTLS_SSL_PROTO_TLS1_2 */
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED) && \
|
||||||
|
defined(MBEDTLS_USE_PSA_CRYPTO)
|
||||||
|
static int ssl_use_opaque_psk( mbedtls_ssl_context const *ssl )
|
||||||
|
{
|
||||||
|
if( ssl->conf->f_psk != NULL )
|
||||||
|
{
|
||||||
|
/* If we've used a callback to select the PSK,
|
||||||
|
* the static configuration is irrelevant. */
|
||||||
|
if( ssl->handshake->psk_opaque != 0 )
|
||||||
|
return( 1 );
|
||||||
|
|
||||||
|
return( 0 );
|
||||||
|
}
|
||||||
|
|
||||||
|
if( ssl->conf->psk_opaque != 0 )
|
||||||
|
return( 1 );
|
||||||
|
|
||||||
|
return( 0 );
|
||||||
|
}
|
||||||
|
#endif /* MBEDTLS_USE_PSA_CRYPTO &&
|
||||||
|
MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED */
|
||||||
|
|
||||||
int mbedtls_ssl_derive_keys( mbedtls_ssl_context *ssl )
|
int mbedtls_ssl_derive_keys( mbedtls_ssl_context *ssl )
|
||||||
{
|
{
|
||||||
int ret = 0;
|
int ret = 0;
|
||||||
@ -758,6 +780,54 @@ int mbedtls_ssl_derive_keys( mbedtls_ssl_context *ssl )
|
|||||||
}
|
}
|
||||||
#endif /* MBEDTLS_SSL_EXTENDED_MS_ENABLED */
|
#endif /* MBEDTLS_SSL_EXTENDED_MS_ENABLED */
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_USE_PSA_CRYPTO) && \
|
||||||
|
defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)
|
||||||
|
if( ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_PSK &&
|
||||||
|
ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_3 &&
|
||||||
|
ssl_use_opaque_psk( ssl ) == 1 )
|
||||||
|
{
|
||||||
|
/* Perform PSK-to-MS expansion in a single step. */
|
||||||
|
psa_status_t status;
|
||||||
|
psa_algorithm_t alg;
|
||||||
|
psa_crypto_generator_t generator = PSA_CRYPTO_GENERATOR_INIT;
|
||||||
|
psa_key_slot_t psk;
|
||||||
|
|
||||||
|
MBEDTLS_SSL_DEBUG_MSG( 2, ( "perform PSA-based PSK-to-MS expansion" ) );
|
||||||
|
|
||||||
|
psk = ssl->conf->psk_opaque;
|
||||||
|
if( ssl->handshake->psk_opaque != 0 )
|
||||||
|
psk = ssl->handshake->psk_opaque;
|
||||||
|
|
||||||
|
if( md_type == MBEDTLS_MD_SHA384 )
|
||||||
|
alg = PSA_ALG_TLS12_PSK_TO_MS(PSA_ALG_SHA_384);
|
||||||
|
else
|
||||||
|
alg = PSA_ALG_TLS12_PSK_TO_MS(PSA_ALG_SHA_256);
|
||||||
|
|
||||||
|
status = psa_key_derivation( &generator, psk, alg,
|
||||||
|
salt, salt_len,
|
||||||
|
(unsigned char const *) lbl,
|
||||||
|
(size_t) strlen( lbl ),
|
||||||
|
48 );
|
||||||
|
if( status != PSA_SUCCESS )
|
||||||
|
{
|
||||||
|
psa_generator_abort( &generator );
|
||||||
|
return( MBEDTLS_ERR_SSL_HW_ACCEL_FAILED );
|
||||||
|
}
|
||||||
|
|
||||||
|
status = psa_generator_read( &generator, session->master, 48 );
|
||||||
|
if( status != PSA_SUCCESS )
|
||||||
|
{
|
||||||
|
psa_generator_abort( &generator );
|
||||||
|
return( MBEDTLS_ERR_SSL_HW_ACCEL_FAILED );
|
||||||
|
}
|
||||||
|
|
||||||
|
status = psa_generator_abort( &generator );
|
||||||
|
if( status != PSA_SUCCESS )
|
||||||
|
return( MBEDTLS_ERR_SSL_HW_ACCEL_FAILED );
|
||||||
|
}
|
||||||
|
else
|
||||||
|
#endif
|
||||||
|
{
|
||||||
ret = handshake->tls_prf( handshake->premaster, handshake->pmslen,
|
ret = handshake->tls_prf( handshake->premaster, handshake->pmslen,
|
||||||
lbl, salt, salt_len,
|
lbl, salt, salt_len,
|
||||||
session->master, 48 );
|
session->master, 48 );
|
||||||
@ -774,6 +844,7 @@ int mbedtls_ssl_derive_keys( mbedtls_ssl_context *ssl )
|
|||||||
mbedtls_platform_zeroize( handshake->premaster,
|
mbedtls_platform_zeroize( handshake->premaster,
|
||||||
sizeof(handshake->premaster) );
|
sizeof(handshake->premaster) );
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Swap the client and server random values.
|
* Swap the client and server random values.
|
||||||
|
Loading…
Reference in New Issue
Block a user