1
10
13
14
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
124
125
126
127
128
129
130
131
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
154
155
167
168
169
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
237
238
239
249
250
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
295
296
297
298
299
300
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
340
341
342
347
348
349
359
360
361
362
...
...
...
#define NX_SECURE_SOURCE_CODE
#include "nx_secure_tls.h"
#ifdef NX_SECURE_ENABLE_DTLS
#include "nx_secure_dtls.h"
#endif
static UCHAR _nx_secure_tls_gen_keys_random[NX_SECURE_TLS_RANDOM_SIZE + NX_SECURE_TLS_RANDOM_SIZE];
...
...
UINT _nx_secure_tls_generate_keys(NX_SECURE_TLS_SESSION *tls_session)
{
UCHAR *pre_master_sec;
UINT pre_master_sec_size;
UCHAR *master_sec;
UCHAR *key_block;
UINT key_block_size;
UINT key_size;
UINT hash_size;
UINT iv_size;
UINT status;
const NX_CRYPTO_METHOD *session_cipher_method = NX_NULL;
const NX_CRYPTO_METHOD *session_prf_method = NX_NULL;
const NX_SECURE_TLS_CIPHERSUITE_INFO *ciphersuite;
VOID *handler = NX_NULL;
/* ... */
key_block_size = 0;
key_block = tls_session -> nx_secure_tls_key_material.nx_secure_tls_new_key_material_data;
/* ... */
ciphersuite = tls_session -> nx_secure_tls_session_ciphersuite;
if (ciphersuite == NX_NULL)
{
return(NX_SECURE_TLS_UNKNOWN_CIPHERSUITE);
}if (ciphersuite == NX_NULL) { ... }
session_cipher_method = ciphersuite -> nx_secure_tls_session_cipher;
if (ciphersuite -> nx_secure_tls_public_cipher -> nx_crypto_algorithm == NX_CRYPTO_KEY_EXCHANGE_RSA
#ifdef NX_SECURE_ENABLE_ECC_CIPHERSUITE
|| ciphersuite -> nx_secure_tls_public_cipher -> nx_crypto_algorithm == NX_CRYPTO_KEY_EXCHANGE_ECDHE
|| ciphersuite -> nx_secure_tls_public_cipher -> nx_crypto_algorithm == NX_CRYPTO_KEY_EXCHANGE_ECDH/* ... */
#endif
#ifdef NX_SECURE_ENABLE_PSK_CIPHERSUITES
|| ciphersuite -> nx_secure_tls_public_auth -> nx_crypto_algorithm == NX_CRYPTO_KEY_EXCHANGE_PSK
#endif
#ifdef NX_SECURE_ENABLE_ECJPAKE_CIPHERSUITE
|| ciphersuite -> nx_secure_tls_public_auth -> nx_crypto_algorithm == NX_CRYPTO_KEY_EXCHANGE_ECJPAKE
#endif
)
{
pre_master_sec = tls_session -> nx_secure_tls_key_material.nx_secure_tls_pre_master_secret;
pre_master_sec_size = tls_session -> nx_secure_tls_key_material.nx_secure_tls_pre_master_secret_size;
master_sec = tls_session -> nx_secure_tls_key_material.nx_secure_tls_master_secret;
NX_SECURE_MEMCPY(_nx_secure_tls_gen_keys_random, tls_session -> nx_secure_tls_key_material.nx_secure_tls_client_random,
NX_SECURE_TLS_RANDOM_SIZE);
NX_SECURE_MEMCPY(&_nx_secure_tls_gen_keys_random[NX_SECURE_TLS_RANDOM_SIZE],
tls_session -> nx_secure_tls_key_material.nx_secure_tls_server_random, NX_SECURE_TLS_RANDOM_SIZE);
/* ... */
#if (NX_SECURE_TLS_TLS_1_2_ENABLED)
#ifdef NX_SECURE_ENABLE_DTLS
if (tls_session -> nx_secure_tls_protocol_version == NX_SECURE_TLS_VERSION_TLS_1_2 ||
tls_session -> nx_secure_tls_protocol_version == NX_SECURE_DTLS_VERSION_1_2)/* ... */
#else
if (tls_session -> nx_secure_tls_protocol_version == NX_SECURE_TLS_VERSION_TLS_1_2)
#endif
{
/* ... */
session_prf_method = ciphersuite -> nx_secure_tls_prf;
...}
/* ... */
#endif
#if (NX_SECURE_TLS_TLS_1_0_ENABLED || NX_SECURE_TLS_TLS_1_1_ENABLED)
#ifdef NX_SECURE_ENABLE_DTLS
if (tls_session -> nx_secure_tls_protocol_version == NX_SECURE_TLS_VERSION_TLS_1_0 ||
tls_session -> nx_secure_tls_protocol_version == NX_SECURE_TLS_VERSION_TLS_1_1 ||
tls_session -> nx_secure_tls_protocol_version == NX_SECURE_DTLS_VERSION_1_0)/* ... */
#else
if (tls_session -> nx_secure_tls_protocol_version == NX_SECURE_TLS_VERSION_TLS_1_0 ||
tls_session -> nx_secure_tls_protocol_version == NX_SECURE_TLS_VERSION_TLS_1_1)/* ... */
#endif
{
session_prf_method = tls_session -> nx_secure_tls_crypto_table -> nx_secure_tls_prf_1_method;
...}/* ... */
#endif
if (session_prf_method == NX_NULL)
{
#ifdef NX_SECURE_KEY_CLEAR
NX_SECURE_MEMSET(_nx_secure_tls_gen_keys_random, 0, sizeof(_nx_secure_tls_gen_keys_random));
#endif
return(NX_SECURE_TLS_PROTOCOL_VERSION_CHANGED);
}if (session_prf_method == NX_NULL) { ... }
if (session_prf_method -> nx_crypto_init != NX_NULL)
{
status = session_prf_method -> nx_crypto_init((NX_CRYPTO_METHOD*)session_prf_method,
pre_master_sec, (NX_CRYPTO_KEY_SIZE)pre_master_sec_size,
&handler,
tls_session -> nx_secure_tls_prf_metadata_area,
tls_session -> nx_secure_tls_prf_metadata_size);
if(status != NX_CRYPTO_SUCCESS)
{
#ifdef NX_SECURE_KEY_CLEAR
NX_SECURE_MEMSET(_nx_secure_tls_gen_keys_random, 0, sizeof(_nx_secure_tls_gen_keys_random));
#endif
return(status);
}if (status != NX_CRYPTO_SUCCESS) { ... }
}if (session_prf_method -> nx_crypto_init != NX_NULL) { ... }
if (session_prf_method -> nx_crypto_operation != NX_NULL)
{
status = session_prf_method -> nx_crypto_operation(NX_CRYPTO_PRF,
handler,
(NX_CRYPTO_METHOD*)session_prf_method,
(UCHAR *)"master secret",
13,
_nx_secure_tls_gen_keys_random,
64,
NX_NULL,
master_sec,
48,
tls_session -> nx_secure_tls_prf_metadata_area,
tls_session -> nx_secure_tls_prf_metadata_size,
NX_NULL,
NX_NULL);
#ifdef NX_SECURE_KEY_CLEAR
NX_SECURE_MEMSET(_nx_secure_tls_gen_keys_random, 0, sizeof(_nx_secure_tls_gen_keys_random));
#endif
if(status != NX_CRYPTO_SUCCESS)
{
return(status);
}if (status != NX_CRYPTO_SUCCESS) { ... }
}if (session_prf_method -> nx_crypto_operation != NX_NULL) { ... }
if (session_prf_method -> nx_crypto_cleanup)
{
status = session_prf_method -> nx_crypto_cleanup(tls_session -> nx_secure_tls_prf_metadata_area);
if(status != NX_CRYPTO_SUCCESS)
{
return(status);
}if (status != NX_CRYPTO_SUCCESS) { ... }
}if (session_prf_method -> nx_crypto_cleanup) { ... }
}if (ciphersuite -> nx_secure_tls_public_cipher -> nx_crypto_algorithm == NX_CRYPTO_KEY_EXCHANGE_RSA #ifdef NX_SECURE_ENABLE_ECC_CIPHERSUITE || ciphersuite -> nx_secure_tls_public_cipher -> nx_crypto_algorithm == NX_CRYPTO_KEY_EXCHANGE_ECDHE || ciphersuite -> nx_secure_tls_public_cipher -> nx_crypto_algorithm == NX_CRYPTO_KEY_EXCHANGE_ECDH #endif /* NX_SECURE_ENABLE_ECC_CIPHERSUITE */ #ifdef NX_SECURE_ENABLE_PSK_CIPHERSUITES || ciphersuite -> nx_secure_tls_public_auth -> nx_crypto_algorithm == NX_CRYPTO_KEY_EXCHANGE_PSK #endif #ifdef NX_SECURE_ENABLE_ECJPAKE_CIPHERSUITE || ciphersuite -> nx_secure_tls_public_auth -> nx_crypto_algorithm == NX_CRYPTO_KEY_EXCHANGE_ECJPAKE #endif) { ... }
else
{
return(NX_SECURE_TLS_UNSUPPORTED_CIPHER);
}else { ... }
#ifdef NX_SECURE_KEY_CLEAR
NX_SECURE_MEMSET(pre_master_sec, 0x0, sizeof(tls_session -> nx_secure_tls_key_material.nx_secure_tls_pre_master_secret));
#endif
key_size = session_cipher_method -> nx_crypto_key_size_in_bits >> 3;
hash_size = ciphersuite -> nx_secure_tls_hash_size;
iv_size = session_cipher_method -> nx_crypto_IV_size_in_bits >> 3;
/* ... */
key_block_size = 2 * (key_size + hash_size + iv_size);
/* ... */
/* ... */
NX_SECURE_MEMCPY(_nx_secure_tls_gen_keys_random, tls_session -> nx_secure_tls_key_material.nx_secure_tls_server_random,
NX_SECURE_TLS_RANDOM_SIZE);
NX_SECURE_MEMCPY(&_nx_secure_tls_gen_keys_random[NX_SECURE_TLS_RANDOM_SIZE],
tls_session -> nx_secure_tls_key_material.nx_secure_tls_client_random, NX_SECURE_TLS_RANDOM_SIZE);
/* ... */
if (session_prf_method -> nx_crypto_init != NX_NULL)
{
status = session_prf_method -> nx_crypto_init((NX_CRYPTO_METHOD*)session_prf_method,
master_sec, 48,
&handler,
tls_session -> nx_secure_tls_prf_metadata_area,
tls_session -> nx_secure_tls_prf_metadata_size);
if(status != NX_CRYPTO_SUCCESS)
{
#ifdef NX_SECURE_KEY_CLEAR
NX_SECURE_MEMSET(_nx_secure_tls_gen_keys_random, 0, sizeof(_nx_secure_tls_gen_keys_random));
#endif
return(status);
}if (status != NX_CRYPTO_SUCCESS) { ... }
}if (session_prf_method -> nx_crypto_init != NX_NULL) { ... }
if (session_prf_method -> nx_crypto_operation != NX_NULL)
{
status = session_prf_method -> nx_crypto_operation(NX_CRYPTO_PRF,
handler,
(NX_CRYPTO_METHOD*)session_prf_method,
(UCHAR *)"key expansion",
13,
_nx_secure_tls_gen_keys_random,
64,
NX_NULL,
key_block,
key_block_size,
tls_session -> nx_secure_tls_prf_metadata_area,
tls_session -> nx_secure_tls_prf_metadata_size,
NX_NULL,
NX_NULL);
#ifdef NX_SECURE_KEY_CLEAR
NX_SECURE_MEMSET(_nx_secure_tls_gen_keys_random, 0, sizeof(_nx_secure_tls_gen_keys_random));/* ... */
#endif
if(status != NX_CRYPTO_SUCCESS)
{
return(status);
}if (status != NX_CRYPTO_SUCCESS) { ... }
}if (session_prf_method -> nx_crypto_operation != NX_NULL) { ... }
if (session_prf_method -> nx_crypto_cleanup)
{
status = session_prf_method -> nx_crypto_cleanup(tls_session -> nx_secure_tls_prf_metadata_area);
if(status != NX_CRYPTO_SUCCESS)
{
return(status);
}if (status != NX_CRYPTO_SUCCESS) { ... }
}if (session_prf_method -> nx_crypto_cleanup) { ... }
return(NX_SECURE_TLS_SUCCESS);
}{ ... }