mirror of
				https://github.com/cuberite/polarssl.git
				synced 2025-11-04 04:32:24 -05:00 
			
		
		
		
	- Updated comments
This commit is contained in:
		
							parent
							
								
									c3f177a77b
								
							
						
					
					
						commit
						bf63b36127
					
				@ -616,8 +616,6 @@ static int ssl_parse_server_key_exchange( ssl_context *ssl )
 | 
				
			|||||||
         *     ServerDHParams params;
 | 
					         *     ServerDHParams params;
 | 
				
			||||||
         * };
 | 
					         * };
 | 
				
			||||||
         */
 | 
					         */
 | 
				
			||||||
        /* TODO TLS1.2 Get Hash algorithm from hash and signature extension! */
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
        switch( hash_id )
 | 
					        switch( hash_id )
 | 
				
			||||||
        {
 | 
					        {
 | 
				
			||||||
#if defined(POLARSSL_MD5_C)
 | 
					#if defined(POLARSSL_MD5_C)
 | 
				
			||||||
@ -928,7 +926,7 @@ static int ssl_write_certificate_verify( ssl_context *ssl )
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
    if( ssl->minor_ver == SSL_MINOR_VERSION_3 )
 | 
					    if( ssl->minor_ver == SSL_MINOR_VERSION_3 )
 | 
				
			||||||
    {
 | 
					    {
 | 
				
			||||||
        // TODO TLS1.2 Base on signature algorithm extension received
 | 
					        // TODO TLS1.2 Base on signature algorithm received in Certificate Request
 | 
				
			||||||
        ssl->out_msg[4] = SSL_HASH_SHA256;
 | 
					        ssl->out_msg[4] = SSL_HASH_SHA256;
 | 
				
			||||||
        ssl->out_msg[5] = SSL_SIG_RSA;
 | 
					        ssl->out_msg[5] = SSL_SIG_RSA;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
				
			|||||||
@ -636,7 +636,9 @@ static int ssl_write_server_key_exchange( ssl_context *ssl )
 | 
				
			|||||||
         *     ServerDHParams params;
 | 
					         *     ServerDHParams params;
 | 
				
			||||||
         * };
 | 
					         * };
 | 
				
			||||||
         */
 | 
					         */
 | 
				
			||||||
        /* TODO TLS1.2 Get Hash algorithm from ciphersuite! */
 | 
					        /* TODO TLS1.2 Get a supported hash algorithm from the
 | 
				
			||||||
 | 
					         * signature_algorithms extension, Otherwise SHA1 + RSA!
 | 
				
			||||||
 | 
					         */
 | 
				
			||||||
     
 | 
					     
 | 
				
			||||||
        sha1_starts( &sha1 );
 | 
					        sha1_starts( &sha1 );
 | 
				
			||||||
        sha1_update( &sha1, ssl->randbytes, 64 );
 | 
					        sha1_update( &sha1, ssl->randbytes, 64 );
 | 
				
			||||||
@ -658,7 +660,7 @@ static int ssl_write_server_key_exchange( ssl_context *ssl )
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
    if( ssl->minor_ver == SSL_MINOR_VERSION_3 )
 | 
					    if( ssl->minor_ver == SSL_MINOR_VERSION_3 )
 | 
				
			||||||
    {
 | 
					    {
 | 
				
			||||||
        // TODO TLS1.2 Base on signature algorithm extension received
 | 
					        // TODO TLS1.2 Base on selection above (SHA1 + RSA is default choice)
 | 
				
			||||||
        ssl->out_msg[4 + n] = SSL_HASH_SHA1;
 | 
					        ssl->out_msg[4 + n] = SSL_HASH_SHA1;
 | 
				
			||||||
        ssl->out_msg[5 + n] = SSL_SIG_RSA;
 | 
					        ssl->out_msg[5 + n] = SSL_SIG_RSA;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
				
			|||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user