On 29/03/2022 23:49, Kory Hamzeh wrote:
Hi,

I am using the TLS1_PRF KDF method to derive the master secret for TLS 1.0, 
1.1, and 1.2. My code works with TLS 1.2, but for 1.0 and 1.1, the master 
secret is not correct. I have a snippet of the code below. From what I 
understand by reading RFC 2246 and  RFC 5246, the input to the PRF function is 
the same for all three versions of TLS.

In my input test vectors, the digest is SHA-1 for TLS 1.0/1.1 and SHA-256 for 
TLS 1.2. However looking at:

openssl-3.0.0-src/providers/implementations/kdfs/tls1_prf.c

it looks like the method used to determine TLS version type is if the digest is 
SN_md5_sha1. I tried passing “MD5-SHA1” as the digest, and EVP_KDF_dereive() 
returned an error.

You don't mention it in your question, but you code snippet mentions FIPS. Are you attempting to do this with the FIPS provider?

The FIPS provider does not support the "MD5-SHA1" digest. Consequently you cannot support TLSv1.0 or TLSv1.1 with the FIPS provider. Only TLSv1.2.

Matt




What am I missing?

Here os the code snippet:

            label = "master secret";

            kdf = EVP_KDF_fetch(NULL, "TLS1-PRF", NULL);
            kctx = EVP_KDF_CTX_new(kdf);
        
            p = params;
            *p++ = OSSL_PARAM_construct_utf8_string(OSSL_KDF_PARAM_DIGEST,
                                                    (char *)digest,
                                                    strlen(digest));
            *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SECRET,
                                                     preMasterSecret,
                                                     preMasterSecretLen);
            *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SEED,
                                                     label, strlen(label));
            *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SEED,
                                                     clientHelloRand,
                                                     clientHelloRandLen);
            *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SEED,
                                                     serverHelloRand,
                                                     serverHelloRandLen);
                                                
            *p = OSSL_PARAM_construct_end();
            if (EVP_KDF_derive(kctx, masterSecret,
                               masterSecretLen, params) <= 0) {
                fips_fatal("ERROR: EVP_KDF_derive failed\n");
            }


Thanks,
Kory


Reply via email to