key generation: derivation of a key with PBKDF2 from the RFC1751 output

I am creating a system that at some point requires a 256-bit AES key. I used to feed passphrases through PBKDF2 to derive a key, but then I decided to generate random passwords of 12 selected words from a set of 2048 words that offers me 132 bits of entropy.

Is it safe to pass the coded random word set through PBKDF2 or should it pass the equivalent decoded bits?

In other words, if I have the random bits CCAC 2AED 5910 56BE 4F90 FD44 1C53 4766, can I use RASH BUSH MILK LOOK BAD BRIM AVID GAFF BAIT ROT POD LOVE to get the key?