mirror of
				https://github.com/cuberite/polarssl.git
				synced 2025-10-30 19:20:40 -04:00 
			
		
		
		
	Make calc_verify() return the length as well
Simplifies ssl_compute_hash(), but unfortunately not so much the other uses.
This commit is contained in:
		
							parent
							
								
									0d56aaac7b
								
							
						
					
					
						commit
						de718b99b5
					
				| @ -458,7 +458,7 @@ struct mbedtls_ssl_handshake_params | |||||||
| #endif /* MBEDTLS_SSL_PROTO_TLS1_2 */ | #endif /* MBEDTLS_SSL_PROTO_TLS1_2 */ | ||||||
| 
 | 
 | ||||||
|     void (*update_checksum)(mbedtls_ssl_context *, const unsigned char *, size_t); |     void (*update_checksum)(mbedtls_ssl_context *, const unsigned char *, size_t); | ||||||
|     void (*calc_verify)(const mbedtls_ssl_context *, unsigned char *); |     void (*calc_verify)(const mbedtls_ssl_context *, unsigned char *, size_t *); | ||||||
|     void (*calc_finished)(mbedtls_ssl_context *, unsigned char *, int); |     void (*calc_finished)(mbedtls_ssl_context *, unsigned char *, int); | ||||||
|     mbedtls_ssl_tls_prf_cb *tls_prf; |     mbedtls_ssl_tls_prf_cb *tls_prf; | ||||||
| 
 | 
 | ||||||
|  | |||||||
| @ -3625,7 +3625,7 @@ static int ssl_write_certificate_verify( mbedtls_ssl_context *ssl ) | |||||||
|     unsigned char hash[48]; |     unsigned char hash[48]; | ||||||
|     unsigned char *hash_start = hash; |     unsigned char *hash_start = hash; | ||||||
|     mbedtls_md_type_t md_alg = MBEDTLS_MD_NONE; |     mbedtls_md_type_t md_alg = MBEDTLS_MD_NONE; | ||||||
|     unsigned int hashlen; |     size_t hashlen; | ||||||
|     void *rs_ctx = NULL; |     void *rs_ctx = NULL; | ||||||
| 
 | 
 | ||||||
|     MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write certificate verify" ) ); |     MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> write certificate verify" ) ); | ||||||
| @ -3674,7 +3674,7 @@ static int ssl_write_certificate_verify( mbedtls_ssl_context *ssl ) | |||||||
| sign: | sign: | ||||||
| #endif | #endif | ||||||
| 
 | 
 | ||||||
|     ssl->handshake->calc_verify( ssl, hash ); |     ssl->handshake->calc_verify( ssl, hash, &hashlen ); | ||||||
| 
 | 
 | ||||||
| #if defined(MBEDTLS_SSL_PROTO_SSL3) || defined(MBEDTLS_SSL_PROTO_TLS1) || \ | #if defined(MBEDTLS_SSL_PROTO_SSL3) || defined(MBEDTLS_SSL_PROTO_TLS1) || \ | ||||||
|     defined(MBEDTLS_SSL_PROTO_TLS1_1) |     defined(MBEDTLS_SSL_PROTO_TLS1_1) | ||||||
| @ -3692,7 +3692,6 @@ sign: | |||||||
|          * sha_hash |          * sha_hash | ||||||
|          *     SHA(handshake_messages); |          *     SHA(handshake_messages); | ||||||
|          */ |          */ | ||||||
|         hashlen = 36; |  | ||||||
|         md_alg = MBEDTLS_MD_NONE; |         md_alg = MBEDTLS_MD_NONE; | ||||||
| 
 | 
 | ||||||
|         /*
 |         /*
 | ||||||
|  | |||||||
| @ -4361,7 +4361,10 @@ static int ssl_parse_certificate_verify( mbedtls_ssl_context *ssl ) | |||||||
|     } |     } | ||||||
| 
 | 
 | ||||||
|     /* Calculate hash and verify signature */ |     /* Calculate hash and verify signature */ | ||||||
|     ssl->handshake->calc_verify( ssl, hash ); |     { | ||||||
|  |         size_t dummy_hlen; | ||||||
|  |         ssl->handshake->calc_verify( ssl, hash, &dummy_hlen ); | ||||||
|  |     } | ||||||
| 
 | 
 | ||||||
|     if( ( ret = mbedtls_pk_verify( peer_pk, |     if( ( ret = mbedtls_pk_verify( peer_pk, | ||||||
|                            md_alg, hash_start, hashlen, |                            md_alg, hash_start, hashlen, | ||||||
|  | |||||||
| @ -855,25 +855,25 @@ static void ssl_update_checksum_md5sha1( mbedtls_ssl_context *, const unsigned c | |||||||
| #endif | #endif | ||||||
| 
 | 
 | ||||||
| #if defined(MBEDTLS_SSL_PROTO_SSL3) | #if defined(MBEDTLS_SSL_PROTO_SSL3) | ||||||
| static void ssl_calc_verify_ssl( const mbedtls_ssl_context *, unsigned char * ); | static void ssl_calc_verify_ssl( const mbedtls_ssl_context *, unsigned char *, size_t * ); | ||||||
| static void ssl_calc_finished_ssl( mbedtls_ssl_context *, unsigned char *, int ); | static void ssl_calc_finished_ssl( mbedtls_ssl_context *, unsigned char *, int ); | ||||||
| #endif | #endif | ||||||
| 
 | 
 | ||||||
| #if defined(MBEDTLS_SSL_PROTO_TLS1) || defined(MBEDTLS_SSL_PROTO_TLS1_1) | #if defined(MBEDTLS_SSL_PROTO_TLS1) || defined(MBEDTLS_SSL_PROTO_TLS1_1) | ||||||
| static void ssl_calc_verify_tls( const mbedtls_ssl_context *, unsigned char * ); | static void ssl_calc_verify_tls( const mbedtls_ssl_context *, unsigned char *, size_t * ); | ||||||
| static void ssl_calc_finished_tls( mbedtls_ssl_context *, unsigned char *, int ); | static void ssl_calc_finished_tls( mbedtls_ssl_context *, unsigned char *, int ); | ||||||
| #endif | #endif | ||||||
| 
 | 
 | ||||||
| #if defined(MBEDTLS_SSL_PROTO_TLS1_2) | #if defined(MBEDTLS_SSL_PROTO_TLS1_2) | ||||||
| #if defined(MBEDTLS_SHA256_C) | #if defined(MBEDTLS_SHA256_C) | ||||||
| static void ssl_update_checksum_sha256( mbedtls_ssl_context *, const unsigned char *, size_t ); | static void ssl_update_checksum_sha256( mbedtls_ssl_context *, const unsigned char *, size_t ); | ||||||
| static void ssl_calc_verify_tls_sha256( const mbedtls_ssl_context *,unsigned char * ); | static void ssl_calc_verify_tls_sha256( const mbedtls_ssl_context *,unsigned char *, size_t * ); | ||||||
| static void ssl_calc_finished_tls_sha256( mbedtls_ssl_context *,unsigned char *, int ); | static void ssl_calc_finished_tls_sha256( mbedtls_ssl_context *,unsigned char *, int ); | ||||||
| #endif | #endif | ||||||
| 
 | 
 | ||||||
| #if defined(MBEDTLS_SHA512_C) | #if defined(MBEDTLS_SHA512_C) | ||||||
| static void ssl_update_checksum_sha384( mbedtls_ssl_context *, const unsigned char *, size_t ); | static void ssl_update_checksum_sha384( mbedtls_ssl_context *, const unsigned char *, size_t ); | ||||||
| static void ssl_calc_verify_tls_sha384( const mbedtls_ssl_context *, unsigned char * ); | static void ssl_calc_verify_tls_sha384( const mbedtls_ssl_context *, unsigned char *, size_t * ); | ||||||
| static void ssl_calc_finished_tls_sha384( mbedtls_ssl_context *, unsigned char *, int ); | static void ssl_calc_finished_tls_sha384( mbedtls_ssl_context *, unsigned char *, int ); | ||||||
| #endif | #endif | ||||||
| #endif /* MBEDTLS_SSL_PROTO_TLS1_2 */ | #endif /* MBEDTLS_SSL_PROTO_TLS1_2 */ | ||||||
| @ -1583,19 +1583,15 @@ static int ssl_set_handshake_prfs( mbedtls_ssl_handshake_params *handshake, | |||||||
|  * Parameters: |  * Parameters: | ||||||
|  * [in/out] handshake |  * [in/out] handshake | ||||||
|  *          [in] resume, premaster, extended_ms, calc_verify, tls_prf |  *          [in] resume, premaster, extended_ms, calc_verify, tls_prf | ||||||
|  *               (PSA-PSK) ciphersuite_info |  *               (PSA-PSK) ciphersuite_info, psk_opaque | ||||||
|  *          [out] premaster (cleared) |  *          [out] premaster (cleared) | ||||||
|  * [in] minor_ver (to compute hash_len) |  | ||||||
|  * [in] hash_alg (to compute hash_len) |  | ||||||
|  * [out] master |  * [out] master | ||||||
|  * [in] ssl: optionally used for debugging, EMS and PSA-PSK |  * [in] ssl: optionally used for debugging, EMS and PSA-PSK | ||||||
|  *      debug: conf->f_dbg, conf->p_dbg |  *      debug: conf->f_dbg, conf->p_dbg | ||||||
|  *      EMS: passed to calc_verify (debug + (SSL3) session_negotiate) |  *      EMS: passed to calc_verify (debug + (SSL3) session_negotiate) | ||||||
|  *      PSA-PSA: conf |  *      PSA-PSA: minor_ver, conf | ||||||
|  */ |  */ | ||||||
| static int ssl_compute_master( mbedtls_ssl_handshake_params *handshake, | static int ssl_compute_master( mbedtls_ssl_handshake_params *handshake, | ||||||
|                                int minor_ver, |  | ||||||
|                                mbedtls_md_type_t hash_alg, |  | ||||||
|                                unsigned char *master, |                                unsigned char *master, | ||||||
|                                const mbedtls_ssl_context *ssl ) |                                const mbedtls_ssl_context *ssl ) | ||||||
| { | { | ||||||
| @ -1630,12 +1626,6 @@ static int ssl_compute_master( mbedtls_ssl_handshake_params *handshake, | |||||||
|     !(defined(MBEDTLS_USE_PSA_CRYPTO) &&            \ |     !(defined(MBEDTLS_USE_PSA_CRYPTO) &&            \ | ||||||
|       defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)) |       defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)) | ||||||
|     (void) ssl; |     (void) ssl; | ||||||
| #endif |  | ||||||
| #if !defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET) || !defined(MBEDTLS_SSL_PROTO_TLS1_2) |  | ||||||
|     (void) minor_ver; |  | ||||||
| #if defined(MBEDTLS_SHA512_C) |  | ||||||
|     (void) hash_alg; |  | ||||||
| #endif |  | ||||||
| #endif | #endif | ||||||
| 
 | 
 | ||||||
|     if( handshake->resume != 0 ) |     if( handshake->resume != 0 ) | ||||||
| @ -1651,22 +1641,7 @@ static int ssl_compute_master( mbedtls_ssl_handshake_params *handshake, | |||||||
| 
 | 
 | ||||||
|         lbl  = "extended master secret"; |         lbl  = "extended master secret"; | ||||||
|         salt = session_hash; |         salt = session_hash; | ||||||
|         handshake->calc_verify( ssl, session_hash ); |         handshake->calc_verify( ssl, session_hash, &salt_len ); | ||||||
| #if defined(MBEDTLS_SSL_PROTO_TLS1_2) |  | ||||||
|         if( minor_ver == MBEDTLS_SSL_MINOR_VERSION_3 ) |  | ||||||
|         { |  | ||||||
| #if defined(MBEDTLS_SHA512_C) |  | ||||||
|             if( hash_alg == MBEDTLS_MD_SHA384 ) |  | ||||||
|             { |  | ||||||
|                 salt_len = 48; |  | ||||||
|             } |  | ||||||
|             else |  | ||||||
| #endif /* MBEDTLS_SHA512_C */ |  | ||||||
|                 salt_len = 32; |  | ||||||
|         } |  | ||||||
|         else |  | ||||||
| #endif /* MBEDTLS_SSL_PROTO_TLS1_2 */ |  | ||||||
|             salt_len = 36; |  | ||||||
| 
 | 
 | ||||||
|         MBEDTLS_SSL_DEBUG_BUF( 3, "session hash", session_hash, salt_len ); |         MBEDTLS_SSL_DEBUG_BUF( 3, "session hash", session_hash, salt_len ); | ||||||
|     } |     } | ||||||
| @ -1675,7 +1650,7 @@ static int ssl_compute_master( mbedtls_ssl_handshake_params *handshake, | |||||||
| #if defined(MBEDTLS_USE_PSA_CRYPTO) &&          \ | #if defined(MBEDTLS_USE_PSA_CRYPTO) &&          \ | ||||||
|     defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED) |     defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED) | ||||||
|     if( handshake->ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_PSK && |     if( handshake->ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_PSK && | ||||||
|         minor_ver == MBEDTLS_SSL_MINOR_VERSION_3 && |         ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_3 && | ||||||
|         ssl_use_opaque_psk( ssl ) == 1 ) |         ssl_use_opaque_psk( ssl ) == 1 ) | ||||||
|     { |     { | ||||||
|         /* Perform PSK-to-MS expansion in a single step. */ |         /* Perform PSK-to-MS expansion in a single step. */ | ||||||
| @ -1684,6 +1659,7 @@ static int ssl_compute_master( mbedtls_ssl_handshake_params *handshake, | |||||||
|         psa_key_handle_t psk; |         psa_key_handle_t psk; | ||||||
|         psa_key_derivation_operation_t derivation = |         psa_key_derivation_operation_t derivation = | ||||||
|             PSA_KEY_DERIVATION_OPERATION_INIT; |             PSA_KEY_DERIVATION_OPERATION_INIT; | ||||||
|  |         mbedtls_md_type_t hash_alg = handshake->ciphersuite_info->mac; | ||||||
| 
 | 
 | ||||||
|         MBEDTLS_SSL_DEBUG_MSG( 2, ( "perform PSA-based PSK-to-MS expansion" ) ); |         MBEDTLS_SSL_DEBUG_MSG( 2, ( "perform PSA-based PSK-to-MS expansion" ) ); | ||||||
| 
 | 
 | ||||||
| @ -1760,8 +1736,6 @@ int mbedtls_ssl_derive_keys( mbedtls_ssl_context *ssl ) | |||||||
|     } |     } | ||||||
| 
 | 
 | ||||||
|     ret = ssl_compute_master( ssl->handshake, |     ret = ssl_compute_master( ssl->handshake, | ||||||
|                               ssl->minor_ver, |  | ||||||
|                               ciphersuite_info->mac, |  | ||||||
|                               ssl->session_negotiate->master, |                               ssl->session_negotiate->master, | ||||||
|                               ssl ); |                               ssl ); | ||||||
|     if( ret != 0 ) |     if( ret != 0 ) | ||||||
| @ -1774,7 +1748,9 @@ int mbedtls_ssl_derive_keys( mbedtls_ssl_context *ssl ) | |||||||
| } | } | ||||||
| 
 | 
 | ||||||
| #if defined(MBEDTLS_SSL_PROTO_SSL3) | #if defined(MBEDTLS_SSL_PROTO_SSL3) | ||||||
| void ssl_calc_verify_ssl( const mbedtls_ssl_context *ssl, unsigned char hash[36] ) | void ssl_calc_verify_ssl( const mbedtls_ssl_context *ssl, | ||||||
|  |                           unsigned char hash[36], | ||||||
|  |                           size_t *hlen ) | ||||||
| { | { | ||||||
|     mbedtls_md5_context md5; |     mbedtls_md5_context md5; | ||||||
|     mbedtls_sha1_context sha1; |     mbedtls_sha1_context sha1; | ||||||
| @ -1812,7 +1788,9 @@ void ssl_calc_verify_ssl( const mbedtls_ssl_context *ssl, unsigned char hash[36] | |||||||
|     mbedtls_sha1_update_ret( &sha1, hash + 16, 20 ); |     mbedtls_sha1_update_ret( &sha1, hash + 16, 20 ); | ||||||
|     mbedtls_sha1_finish_ret( &sha1, hash + 16 ); |     mbedtls_sha1_finish_ret( &sha1, hash + 16 ); | ||||||
| 
 | 
 | ||||||
|     MBEDTLS_SSL_DEBUG_BUF( 3, "calculated verify result", hash, 36 ); |     *hlen = 36; | ||||||
|  | 
 | ||||||
|  |     MBEDTLS_SSL_DEBUG_BUF( 3, "calculated verify result", hash, *hlen ); | ||||||
|     MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= calc verify" ) ); |     MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= calc verify" ) ); | ||||||
| 
 | 
 | ||||||
|     mbedtls_md5_free(  &md5  ); |     mbedtls_md5_free(  &md5  ); | ||||||
| @ -1823,7 +1801,9 @@ void ssl_calc_verify_ssl( const mbedtls_ssl_context *ssl, unsigned char hash[36] | |||||||
| #endif /* MBEDTLS_SSL_PROTO_SSL3 */ | #endif /* MBEDTLS_SSL_PROTO_SSL3 */ | ||||||
| 
 | 
 | ||||||
| #if defined(MBEDTLS_SSL_PROTO_TLS1) || defined(MBEDTLS_SSL_PROTO_TLS1_1) | #if defined(MBEDTLS_SSL_PROTO_TLS1) || defined(MBEDTLS_SSL_PROTO_TLS1_1) | ||||||
| void ssl_calc_verify_tls( const mbedtls_ssl_context *ssl, unsigned char hash[36] ) | void ssl_calc_verify_tls( const mbedtls_ssl_context *ssl, | ||||||
|  |                           unsigned char hash[36], | ||||||
|  |                           size_t *hlen ) | ||||||
| { | { | ||||||
|     mbedtls_md5_context md5; |     mbedtls_md5_context md5; | ||||||
|     mbedtls_sha1_context sha1; |     mbedtls_sha1_context sha1; | ||||||
| @ -1839,7 +1819,9 @@ void ssl_calc_verify_tls( const mbedtls_ssl_context *ssl, unsigned char hash[36] | |||||||
|     mbedtls_md5_finish_ret( &md5,  hash ); |     mbedtls_md5_finish_ret( &md5,  hash ); | ||||||
|     mbedtls_sha1_finish_ret( &sha1, hash + 16 ); |     mbedtls_sha1_finish_ret( &sha1, hash + 16 ); | ||||||
| 
 | 
 | ||||||
|     MBEDTLS_SSL_DEBUG_BUF( 3, "calculated verify result", hash, 36 ); |     *hlen = 36; | ||||||
|  | 
 | ||||||
|  |     MBEDTLS_SSL_DEBUG_BUF( 3, "calculated verify result", hash, *hlen ); | ||||||
|     MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= calc verify" ) ); |     MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= calc verify" ) ); | ||||||
| 
 | 
 | ||||||
|     mbedtls_md5_free(  &md5  ); |     mbedtls_md5_free(  &md5  ); | ||||||
| @ -1851,7 +1833,9 @@ void ssl_calc_verify_tls( const mbedtls_ssl_context *ssl, unsigned char hash[36] | |||||||
| 
 | 
 | ||||||
| #if defined(MBEDTLS_SSL_PROTO_TLS1_2) | #if defined(MBEDTLS_SSL_PROTO_TLS1_2) | ||||||
| #if defined(MBEDTLS_SHA256_C) | #if defined(MBEDTLS_SHA256_C) | ||||||
| void ssl_calc_verify_tls_sha256( const mbedtls_ssl_context *ssl, unsigned char hash[32] ) | void ssl_calc_verify_tls_sha256( const mbedtls_ssl_context *ssl, | ||||||
|  |                                  unsigned char hash[32], | ||||||
|  |                                  size_t *hlen ) | ||||||
| { | { | ||||||
| #if defined(MBEDTLS_USE_PSA_CRYPTO) | #if defined(MBEDTLS_USE_PSA_CRYPTO) | ||||||
|     size_t hash_size; |     size_t hash_size; | ||||||
| @ -1872,7 +1856,9 @@ void ssl_calc_verify_tls_sha256( const mbedtls_ssl_context *ssl, unsigned char h | |||||||
|         MBEDTLS_SSL_DEBUG_MSG( 2, ( "PSA hash finish failed" ) ); |         MBEDTLS_SSL_DEBUG_MSG( 2, ( "PSA hash finish failed" ) ); | ||||||
|         return; |         return; | ||||||
|     } |     } | ||||||
|     MBEDTLS_SSL_DEBUG_BUF( 3, "PSA calculated verify result", hash, 32 ); | 
 | ||||||
|  |     *hlen = 32; | ||||||
|  |     MBEDTLS_SSL_DEBUG_BUF( 3, "PSA calculated verify result", hash, *hlen ); | ||||||
|     MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= PSA calc verify" ) ); |     MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= PSA calc verify" ) ); | ||||||
| #else | #else | ||||||
|     mbedtls_sha256_context sha256; |     mbedtls_sha256_context sha256; | ||||||
| @ -1884,7 +1870,9 @@ void ssl_calc_verify_tls_sha256( const mbedtls_ssl_context *ssl, unsigned char h | |||||||
|     mbedtls_sha256_clone( &sha256, &ssl->handshake->fin_sha256 ); |     mbedtls_sha256_clone( &sha256, &ssl->handshake->fin_sha256 ); | ||||||
|     mbedtls_sha256_finish_ret( &sha256, hash ); |     mbedtls_sha256_finish_ret( &sha256, hash ); | ||||||
| 
 | 
 | ||||||
|     MBEDTLS_SSL_DEBUG_BUF( 3, "calculated verify result", hash, 32 ); |     *hlen = 32; | ||||||
|  | 
 | ||||||
|  |     MBEDTLS_SSL_DEBUG_BUF( 3, "calculated verify result", hash, *hlen ); | ||||||
|     MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= calc verify" ) ); |     MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= calc verify" ) ); | ||||||
| 
 | 
 | ||||||
|     mbedtls_sha256_free( &sha256 ); |     mbedtls_sha256_free( &sha256 ); | ||||||
| @ -1894,7 +1882,9 @@ void ssl_calc_verify_tls_sha256( const mbedtls_ssl_context *ssl, unsigned char h | |||||||
| #endif /* MBEDTLS_SHA256_C */ | #endif /* MBEDTLS_SHA256_C */ | ||||||
| 
 | 
 | ||||||
| #if defined(MBEDTLS_SHA512_C) | #if defined(MBEDTLS_SHA512_C) | ||||||
| void ssl_calc_verify_tls_sha384( const mbedtls_ssl_context *ssl, unsigned char hash[48] ) | void ssl_calc_verify_tls_sha384( const mbedtls_ssl_context *ssl, | ||||||
|  |                                  unsigned char hash[48], | ||||||
|  |                                  size_t *hlen ) | ||||||
| { | { | ||||||
| #if defined(MBEDTLS_USE_PSA_CRYPTO) | #if defined(MBEDTLS_USE_PSA_CRYPTO) | ||||||
|     size_t hash_size; |     size_t hash_size; | ||||||
| @ -1915,7 +1905,9 @@ void ssl_calc_verify_tls_sha384( const mbedtls_ssl_context *ssl, unsigned char h | |||||||
|         MBEDTLS_SSL_DEBUG_MSG( 2, ( "PSA hash finish failed" ) ); |         MBEDTLS_SSL_DEBUG_MSG( 2, ( "PSA hash finish failed" ) ); | ||||||
|         return; |         return; | ||||||
|     } |     } | ||||||
|     MBEDTLS_SSL_DEBUG_BUF( 3, "PSA calculated verify result", hash, 48 ); | 
 | ||||||
|  |     *hlen = 48; | ||||||
|  |     MBEDTLS_SSL_DEBUG_BUF( 3, "PSA calculated verify result", hash, *hlen ); | ||||||
|     MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= PSA calc verify" ) ); |     MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= PSA calc verify" ) ); | ||||||
| #else | #else | ||||||
|     mbedtls_sha512_context sha512; |     mbedtls_sha512_context sha512; | ||||||
| @ -1927,7 +1919,9 @@ void ssl_calc_verify_tls_sha384( const mbedtls_ssl_context *ssl, unsigned char h | |||||||
|     mbedtls_sha512_clone( &sha512, &ssl->handshake->fin_sha512 ); |     mbedtls_sha512_clone( &sha512, &ssl->handshake->fin_sha512 ); | ||||||
|     mbedtls_sha512_finish_ret( &sha512, hash ); |     mbedtls_sha512_finish_ret( &sha512, hash ); | ||||||
| 
 | 
 | ||||||
|     MBEDTLS_SSL_DEBUG_BUF( 3, "calculated verify result", hash, 48 ); |     *hlen = 48; | ||||||
|  | 
 | ||||||
|  |     MBEDTLS_SSL_DEBUG_BUF( 3, "calculated verify result", hash, *hlen ); | ||||||
|     MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= calc verify" ) ); |     MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= calc verify" ) ); | ||||||
| 
 | 
 | ||||||
|     mbedtls_sha512_free( &sha512 ); |     mbedtls_sha512_free( &sha512 ); | ||||||
|  | |||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user
	 Manuel Pégourié-Gonnard
						Manuel Pégourié-Gonnard