1
0
mirror of https://github.com/ARMmbed/mbedtls.git synced 2025-05-12 01:42:21 +08:00

fix various issues

- Alignments
- comment words in doxygen paragraph

Signed-off-by: Jerry Yu <jerry.h.yu@arm.com>
This commit is contained in:
Jerry Yu 2022-11-21 13:03:47 +08:00
parent 91b560f38d
commit b094e124f2
2 changed files with 27 additions and 30 deletions

View File

@ -1082,8 +1082,8 @@ static int ssl_tls13_get_cipher_key_info(
} }
#if defined(MBEDTLS_SSL_EARLY_DATA) #if defined(MBEDTLS_SSL_EARLY_DATA)
/* ssl_tls13_generate_early_keys() generates keys necessary for protecting /* ssl_tls13_generate_early_keys() generates keys necessary for protecting the
* the early app data messages described in section 7 RFC 8446. */ early application and handshake messages described in section 7 RFC 8446. */
MBEDTLS_CHECK_RETURN_CRITICAL MBEDTLS_CHECK_RETURN_CRITICAL
static int ssl_tls13_generate_early_keys( mbedtls_ssl_context *ssl, static int ssl_tls13_generate_early_keys( mbedtls_ssl_context *ssl,
mbedtls_ssl_key_set *traffic_keys ) mbedtls_ssl_key_set *traffic_keys )
@ -1130,8 +1130,8 @@ static int ssl_tls13_generate_early_keys( mbedtls_ssl_context *ssl,
return( ret ); return( ret );
} }
ret = mbedtls_ssl_tls13_derive_early_secrets( hash_alg, ret = mbedtls_ssl_tls13_derive_early_secrets(
handshake->tls13_master_secrets.early, hash_alg, handshake->tls13_master_secrets.early,
transcript, transcript_len, tls13_early_secrets ); transcript, transcript_len, tls13_early_secrets );
if( ret != 0 ) if( ret != 0 )
{ {
@ -1142,15 +1142,15 @@ static int ssl_tls13_generate_early_keys( mbedtls_ssl_context *ssl,
MBEDTLS_SSL_DEBUG_BUF( MBEDTLS_SSL_DEBUG_BUF(
4, "Client early traffic secret", 4, "Client early traffic secret",
tls13_early_secrets->client_early_traffic_secret, tls13_early_secrets->client_early_traffic_secret, hash_len );
hash_len );
/* /*
* Export client handshake traffic secret * Export client handshake traffic secret
*/ */
if( ssl->f_export_keys != NULL ) if( ssl->f_export_keys != NULL )
{ {
ssl->f_export_keys( ssl->p_export_keys, ssl->f_export_keys(
ssl->p_export_keys,
MBEDTLS_SSL_KEY_EXPORT_TLS1_3_CLIENT_EARLY_SECRET, MBEDTLS_SSL_KEY_EXPORT_TLS1_3_CLIENT_EARLY_SECRET,
tls13_early_secrets->client_early_traffic_secret, tls13_early_secrets->client_early_traffic_secret,
hash_len, hash_len,
@ -1159,7 +1159,8 @@ static int ssl_tls13_generate_early_keys( mbedtls_ssl_context *ssl,
MBEDTLS_SSL_TLS_PRF_NONE /* TODO: FIX! */ ); MBEDTLS_SSL_TLS_PRF_NONE /* TODO: FIX! */ );
} }
ret = mbedtls_ssl_tls13_make_traffic_keys( hash_alg, ret = mbedtls_ssl_tls13_make_traffic_keys(
hash_alg,
tls13_early_secrets->client_early_traffic_secret, tls13_early_secrets->client_early_traffic_secret,
tls13_early_secrets->client_early_traffic_secret, tls13_early_secrets->client_early_traffic_secret,
hash_len, key_len, iv_len, traffic_keys ); hash_len, key_len, iv_len, traffic_keys );
@ -1283,16 +1284,13 @@ int mbedtls_ssl_tls13_generate_handshake_keys( mbedtls_ssl_context *ssl,
mbedtls_ssl_key_set *traffic_keys ) mbedtls_ssl_key_set *traffic_keys )
{ {
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
mbedtls_md_type_t md_type; mbedtls_md_type_t md_type;
psa_algorithm_t hash_alg; psa_algorithm_t hash_alg;
size_t hash_len; size_t hash_len;
unsigned char transcript[MBEDTLS_TLS1_3_MD_MAX_SIZE]; unsigned char transcript[MBEDTLS_TLS1_3_MD_MAX_SIZE];
size_t transcript_len; size_t transcript_len;
size_t key_len;
size_t key_len, iv_len; size_t iv_len;
mbedtls_ssl_handshake_params *handshake = ssl->handshake; mbedtls_ssl_handshake_params *handshake = ssl->handshake;
const mbedtls_ssl_ciphersuite_t *ciphersuite_info = handshake->ciphersuite_info; const mbedtls_ssl_ciphersuite_t *ciphersuite_info = handshake->ciphersuite_info;
@ -1300,8 +1298,7 @@ int mbedtls_ssl_tls13_generate_handshake_keys( mbedtls_ssl_context *ssl,
MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> mbedtls_ssl_tls13_generate_handshake_keys" ) ); MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> mbedtls_ssl_tls13_generate_handshake_keys" ) );
ret = ssl_tls13_get_cipher_key_info( ciphersuite_info, ret = ssl_tls13_get_cipher_key_info( ciphersuite_info, &key_len, &iv_len );
&key_len, &iv_len );
if( ret != 0 ) if( ret != 0 )
{ {
MBEDTLS_SSL_DEBUG_RET( 1, "ssl_tls13_get_cipher_key_info", ret ); MBEDTLS_SSL_DEBUG_RET( 1, "ssl_tls13_get_cipher_key_info", ret );

View File

@ -671,14 +671,14 @@ int mbedtls_ssl_tls13_calculate_verify_data( mbedtls_ssl_context *ssl,
/** /**
* \brief Compute TLS 1.3 early transform * \brief Compute TLS 1.3 early transform
* *
* \param ssl The SSL context to operate on. The early secret must have been * \param ssl The SSL context to operate on.
* computed.
* *
* \returns \c 0 on success. * \returns \c 0 on success.
* \returns A negative error code on failure. * \returns A negative error code on failure.
* *
* \warning `early_secrets` is not computation. Caller MUST call * \warning `early_secrets` is not computed before this function. Call
* mbedtls_ssl_tls13_key_schedule_stage_early() before this function. * mbedtls_ssl_tls13_key_schedule_stage_early() to generate early
* secrets.
*/ */
MBEDTLS_CHECK_RETURN_CRITICAL MBEDTLS_CHECK_RETURN_CRITICAL
int mbedtls_ssl_tls13_compute_early_transform( mbedtls_ssl_context *ssl ); int mbedtls_ssl_tls13_compute_early_transform( mbedtls_ssl_context *ssl );