forked from wolfSSL/wolfssl
wc_ udates in src/ directory
This commit is contained in:
@ -5908,23 +5908,23 @@ static INLINE int Decrypt(WOLFSSL* ssl, byte* plain, const byte* input,
|
|||||||
|
|
||||||
#ifdef HAVE_CAMELLIA
|
#ifdef HAVE_CAMELLIA
|
||||||
case wolfssl_camellia:
|
case wolfssl_camellia:
|
||||||
CamelliaCbcDecrypt(ssl->decrypt.cam, plain, input, sz);
|
wc_CamelliaCbcDecrypt(ssl->decrypt.cam, plain, input, sz);
|
||||||
break;
|
break;
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifdef HAVE_HC128
|
#ifdef HAVE_HC128
|
||||||
case wolfssl_hc128:
|
case wolfssl_hc128:
|
||||||
return Hc128_Process(ssl->decrypt.hc128, plain, input, sz);
|
return wc_Hc128_Process(ssl->decrypt.hc128, plain, input, sz);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifdef BUILD_RABBIT
|
#ifdef BUILD_RABBIT
|
||||||
case wolfssl_rabbit:
|
case wolfssl_rabbit:
|
||||||
return RabbitProcess(ssl->decrypt.rabbit, plain, input, sz);
|
return wc_RabbitProcess(ssl->decrypt.rabbit, plain, input, sz);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifdef HAVE_CHACHA
|
#ifdef HAVE_CHACHA
|
||||||
case wolfssl_chacha:
|
case wolfssl_chacha:
|
||||||
return ChachaAEADDecrypt(ssl, plain, input, sz);
|
return wc_ChachaAEADDecrypt(ssl, plain, input, sz);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifdef HAVE_NULL_CIPHER
|
#ifdef HAVE_NULL_CIPHER
|
||||||
@ -10482,21 +10482,21 @@ static void PickHashSigAlgo(WOLFSSL* ssl,
|
|||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
InitDhKey(&key);
|
wc_InitDhKey(&key);
|
||||||
ret = DhSetKey(&key, serverP.buffer, serverP.length,
|
ret = wc_DhSetKey(&key, serverP.buffer, serverP.length,
|
||||||
serverG.buffer, serverG.length);
|
serverG.buffer, serverG.length);
|
||||||
if (ret == 0)
|
if (ret == 0)
|
||||||
/* for DH, encSecret is Yc, agree is pre-master */
|
/* for DH, encSecret is Yc, agree is pre-master */
|
||||||
ret = DhGenerateKeyPair(&key, ssl->rng, priv, &privSz,
|
ret = wc_DhGenerateKeyPair(&key, ssl->rng, priv, &privSz,
|
||||||
encSecret, &encSz);
|
encSecret, &encSz);
|
||||||
if (ret == 0)
|
if (ret == 0)
|
||||||
ret = DhAgree(&key, ssl->arrays->preMasterSecret,
|
ret = wc_DhAgree(&key, ssl->arrays->preMasterSecret,
|
||||||
&ssl->arrays->preMasterSz, priv, privSz,
|
&ssl->arrays->preMasterSz, priv, privSz,
|
||||||
serverPub.buffer, serverPub.length);
|
serverPub.buffer, serverPub.length);
|
||||||
#ifdef WOLFSSL_SMALL_STACK
|
#ifdef WOLFSSL_SMALL_STACK
|
||||||
XFREE(priv, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
XFREE(priv, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||||
#endif
|
#endif
|
||||||
FreeDhKey(&key);
|
wc_FreeDhKey(&key);
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
#endif /* NO_DH */
|
#endif /* NO_DH */
|
||||||
@ -10598,18 +10598,18 @@ static void PickHashSigAlgo(WOLFSSL* ssl,
|
|||||||
es += esSz;
|
es += esSz;
|
||||||
encSz = esSz + OPAQUE16_LEN;
|
encSz = esSz + OPAQUE16_LEN;
|
||||||
|
|
||||||
InitDhKey(&key);
|
wc_InitDhKey(&key);
|
||||||
ret = DhSetKey(&key, serverP.buffer, serverP.length,
|
ret = wc_DhSetKey(&key, serverP.buffer, serverP.length,
|
||||||
serverG.buffer, serverG.length);
|
serverG.buffer, serverG.length);
|
||||||
if (ret == 0)
|
if (ret == 0)
|
||||||
/* for DH, encSecret is Yc, agree is pre-master */
|
/* for DH, encSecret is Yc, agree is pre-master */
|
||||||
ret = DhGenerateKeyPair(&key, ssl->rng, priv, &privSz,
|
ret = wc_DhGenerateKeyPair(&key, ssl->rng, priv, &privSz,
|
||||||
es + OPAQUE16_LEN, &pubSz);
|
es + OPAQUE16_LEN, &pubSz);
|
||||||
if (ret == 0)
|
if (ret == 0)
|
||||||
ret = DhAgree(&key, pms + OPAQUE16_LEN,
|
ret = wc_DhAgree(&key, pms + OPAQUE16_LEN,
|
||||||
&ssl->arrays->preMasterSz, priv, privSz,
|
&ssl->arrays->preMasterSz, priv, privSz,
|
||||||
serverPub.buffer, serverPub.length);
|
serverPub.buffer, serverPub.length);
|
||||||
FreeDhKey(&key);
|
wc_FreeDhKey(&key);
|
||||||
#ifdef WOLFSSL_SMALL_STACK
|
#ifdef WOLFSSL_SMALL_STACK
|
||||||
XFREE(priv, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
XFREE(priv, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||||
#endif
|
#endif
|
||||||
@ -11518,18 +11518,18 @@ int DoSessionTicket(WOLFSSL* ssl,
|
|||||||
return MEMORY_E;
|
return MEMORY_E;
|
||||||
}
|
}
|
||||||
|
|
||||||
InitDhKey(&dhKey);
|
wc_InitDhKey(&dhKey);
|
||||||
ret = DhSetKey(&dhKey, ssl->buffers.serverDH_P.buffer,
|
ret = wc_DhSetKey(&dhKey, ssl->buffers.serverDH_P.buffer,
|
||||||
ssl->buffers.serverDH_P.length,
|
ssl->buffers.serverDH_P.length,
|
||||||
ssl->buffers.serverDH_G.buffer,
|
ssl->buffers.serverDH_G.buffer,
|
||||||
ssl->buffers.serverDH_G.length);
|
ssl->buffers.serverDH_G.length);
|
||||||
if (ret == 0)
|
if (ret == 0)
|
||||||
ret = DhGenerateKeyPair(&dhKey, ssl->rng,
|
ret = wc_DhGenerateKeyPair(&dhKey, ssl->rng,
|
||||||
ssl->buffers.serverDH_Priv.buffer,
|
ssl->buffers.serverDH_Priv.buffer,
|
||||||
&ssl->buffers.serverDH_Priv.length,
|
&ssl->buffers.serverDH_Priv.length,
|
||||||
ssl->buffers.serverDH_Pub.buffer,
|
ssl->buffers.serverDH_Pub.buffer,
|
||||||
&ssl->buffers.serverDH_Pub.length);
|
&ssl->buffers.serverDH_Pub.length);
|
||||||
FreeDhKey(&dhKey);
|
wc_FreeDhKey(&dhKey);
|
||||||
if (ret != 0)
|
if (ret != 0)
|
||||||
return ret;
|
return ret;
|
||||||
|
|
||||||
@ -12111,18 +12111,18 @@ int DoSessionTicket(WOLFSSL* ssl,
|
|||||||
return MEMORY_E;
|
return MEMORY_E;
|
||||||
}
|
}
|
||||||
|
|
||||||
InitDhKey(&dhKey);
|
wc_InitDhKey(&dhKey);
|
||||||
ret = DhSetKey(&dhKey, ssl->buffers.serverDH_P.buffer,
|
ret = wc_DhSetKey(&dhKey, ssl->buffers.serverDH_P.buffer,
|
||||||
ssl->buffers.serverDH_P.length,
|
ssl->buffers.serverDH_P.length,
|
||||||
ssl->buffers.serverDH_G.buffer,
|
ssl->buffers.serverDH_G.buffer,
|
||||||
ssl->buffers.serverDH_G.length);
|
ssl->buffers.serverDH_G.length);
|
||||||
if (ret == 0)
|
if (ret == 0)
|
||||||
ret = DhGenerateKeyPair(&dhKey, ssl->rng,
|
ret = wc_DhGenerateKeyPair(&dhKey, ssl->rng,
|
||||||
ssl->buffers.serverDH_Priv.buffer,
|
ssl->buffers.serverDH_Priv.buffer,
|
||||||
&ssl->buffers.serverDH_Priv.length,
|
&ssl->buffers.serverDH_Priv.length,
|
||||||
ssl->buffers.serverDH_Pub.buffer,
|
ssl->buffers.serverDH_Pub.buffer,
|
||||||
&ssl->buffers.serverDH_Pub.length);
|
&ssl->buffers.serverDH_Pub.length);
|
||||||
FreeDhKey(&dhKey);
|
wc_FreeDhKey(&dhKey);
|
||||||
|
|
||||||
if (ret != 0) return ret;
|
if (ret != 0) return ret;
|
||||||
|
|
||||||
@ -13623,18 +13623,18 @@ int DoSessionTicket(WOLFSSL* ssl,
|
|||||||
if ((*inOutIdx - begin) + clientPubSz > size)
|
if ((*inOutIdx - begin) + clientPubSz > size)
|
||||||
return BUFFER_ERROR;
|
return BUFFER_ERROR;
|
||||||
|
|
||||||
InitDhKey(&dhKey);
|
wc_InitDhKey(&dhKey);
|
||||||
ret = DhSetKey(&dhKey, ssl->buffers.serverDH_P.buffer,
|
ret = wc_DhSetKey(&dhKey, ssl->buffers.serverDH_P.buffer,
|
||||||
ssl->buffers.serverDH_P.length,
|
ssl->buffers.serverDH_P.length,
|
||||||
ssl->buffers.serverDH_G.buffer,
|
ssl->buffers.serverDH_G.buffer,
|
||||||
ssl->buffers.serverDH_G.length);
|
ssl->buffers.serverDH_G.length);
|
||||||
if (ret == 0)
|
if (ret == 0)
|
||||||
ret = DhAgree(&dhKey, ssl->arrays->preMasterSecret,
|
ret = wc_DhAgree(&dhKey, ssl->arrays->preMasterSecret,
|
||||||
&ssl->arrays->preMasterSz,
|
&ssl->arrays->preMasterSz,
|
||||||
ssl->buffers.serverDH_Priv.buffer,
|
ssl->buffers.serverDH_Priv.buffer,
|
||||||
ssl->buffers.serverDH_Priv.length,
|
ssl->buffers.serverDH_Priv.length,
|
||||||
input + *inOutIdx, clientPubSz);
|
input + *inOutIdx, clientPubSz);
|
||||||
FreeDhKey(&dhKey);
|
wc_FreeDhKey(&dhKey);
|
||||||
|
|
||||||
*inOutIdx += clientPubSz;
|
*inOutIdx += clientPubSz;
|
||||||
|
|
||||||
@ -13678,18 +13678,18 @@ int DoSessionTicket(WOLFSSL* ssl,
|
|||||||
if ((*inOutIdx - begin) + clientSz > size)
|
if ((*inOutIdx - begin) + clientSz > size)
|
||||||
return BUFFER_ERROR;
|
return BUFFER_ERROR;
|
||||||
|
|
||||||
InitDhKey(&dhKey);
|
wc_InitDhKey(&dhKey);
|
||||||
ret = DhSetKey(&dhKey, ssl->buffers.serverDH_P.buffer,
|
ret = wc_DhSetKey(&dhKey, ssl->buffers.serverDH_P.buffer,
|
||||||
ssl->buffers.serverDH_P.length,
|
ssl->buffers.serverDH_P.length,
|
||||||
ssl->buffers.serverDH_G.buffer,
|
ssl->buffers.serverDH_G.buffer,
|
||||||
ssl->buffers.serverDH_G.length);
|
ssl->buffers.serverDH_G.length);
|
||||||
if (ret == 0)
|
if (ret == 0)
|
||||||
ret = DhAgree(&dhKey, pms + OPAQUE16_LEN,
|
ret = wc_DhAgree(&dhKey, pms + OPAQUE16_LEN,
|
||||||
&ssl->arrays->preMasterSz,
|
&ssl->arrays->preMasterSz,
|
||||||
ssl->buffers.serverDH_Priv.buffer,
|
ssl->buffers.serverDH_Priv.buffer,
|
||||||
ssl->buffers.serverDH_Priv.length,
|
ssl->buffers.serverDH_Priv.length,
|
||||||
input + *inOutIdx, clientSz);
|
input + *inOutIdx, clientSz);
|
||||||
FreeDhKey(&dhKey);
|
wc_FreeDhKey(&dhKey);
|
||||||
|
|
||||||
*inOutIdx += clientSz;
|
*inOutIdx += clientSz;
|
||||||
c16toa((word16)ssl->arrays->preMasterSz, pms);
|
c16toa((word16)ssl->arrays->preMasterSz, pms);
|
||||||
|
24
src/keys.c
24
src/keys.c
@ -1938,24 +1938,24 @@ static int SetKeys(Ciphers* enc, Ciphers* dec, Keys* keys, CipherSpecs* specs,
|
|||||||
return MEMORY_E;
|
return MEMORY_E;
|
||||||
if (side == WOLFSSL_CLIENT_END) {
|
if (side == WOLFSSL_CLIENT_END) {
|
||||||
if (enc) {
|
if (enc) {
|
||||||
hcRet = Hc128_SetKey(enc->hc128, keys->client_write_key,
|
hcRet = wc_Hc128_SetKey(enc->hc128, keys->client_write_key,
|
||||||
keys->client_write_IV);
|
keys->client_write_IV);
|
||||||
if (hcRet != 0) return hcRet;
|
if (hcRet != 0) return hcRet;
|
||||||
}
|
}
|
||||||
if (dec) {
|
if (dec) {
|
||||||
hcRet = Hc128_SetKey(dec->hc128, keys->server_write_key,
|
hcRet = wc_Hc128_SetKey(dec->hc128, keys->server_write_key,
|
||||||
keys->server_write_IV);
|
keys->server_write_IV);
|
||||||
if (hcRet != 0) return hcRet;
|
if (hcRet != 0) return hcRet;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
if (enc) {
|
if (enc) {
|
||||||
hcRet = Hc128_SetKey(enc->hc128, keys->server_write_key,
|
hcRet = wc_Hc128_SetKey(enc->hc128, keys->server_write_key,
|
||||||
keys->server_write_IV);
|
keys->server_write_IV);
|
||||||
if (hcRet != 0) return hcRet;
|
if (hcRet != 0) return hcRet;
|
||||||
}
|
}
|
||||||
if (dec) {
|
if (dec) {
|
||||||
hcRet = Hc128_SetKey(dec->hc128, keys->client_write_key,
|
hcRet = wc_Hc128_SetKey(dec->hc128, keys->client_write_key,
|
||||||
keys->client_write_IV);
|
keys->client_write_IV);
|
||||||
if (hcRet != 0) return hcRet;
|
if (hcRet != 0) return hcRet;
|
||||||
}
|
}
|
||||||
@ -1982,24 +1982,24 @@ static int SetKeys(Ciphers* enc, Ciphers* dec, Keys* keys, CipherSpecs* specs,
|
|||||||
return MEMORY_E;
|
return MEMORY_E;
|
||||||
if (side == WOLFSSL_CLIENT_END) {
|
if (side == WOLFSSL_CLIENT_END) {
|
||||||
if (enc) {
|
if (enc) {
|
||||||
rabRet = RabbitSetKey(enc->rabbit, keys->client_write_key,
|
rabRet = wc_RabbitSetKey(enc->rabbit, keys->client_write_key,
|
||||||
keys->client_write_IV);
|
keys->client_write_IV);
|
||||||
if (rabRet != 0) return rabRet;
|
if (rabRet != 0) return rabRet;
|
||||||
}
|
}
|
||||||
if (dec) {
|
if (dec) {
|
||||||
rabRet = RabbitSetKey(dec->rabbit, keys->server_write_key,
|
rabRet = wc_RabbitSetKey(dec->rabbit, keys->server_write_key,
|
||||||
keys->server_write_IV);
|
keys->server_write_IV);
|
||||||
if (rabRet != 0) return rabRet;
|
if (rabRet != 0) return rabRet;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
if (enc) {
|
if (enc) {
|
||||||
rabRet = RabbitSetKey(enc->rabbit, keys->server_write_key,
|
rabRet = wc_RabbitSetKey(enc->rabbit, keys->server_write_key,
|
||||||
keys->server_write_IV);
|
keys->server_write_IV);
|
||||||
if (rabRet != 0) return rabRet;
|
if (rabRet != 0) return rabRet;
|
||||||
}
|
}
|
||||||
if (dec) {
|
if (dec) {
|
||||||
rabRet = RabbitSetKey(dec->rabbit, keys->client_write_key,
|
rabRet = wc_RabbitSetKey(dec->rabbit, keys->client_write_key,
|
||||||
keys->client_write_IV);
|
keys->client_write_IV);
|
||||||
if (rabRet != 0) return rabRet;
|
if (rabRet != 0) return rabRet;
|
||||||
}
|
}
|
||||||
@ -2245,24 +2245,24 @@ static int SetKeys(Ciphers* enc, Ciphers* dec, Keys* keys, CipherSpecs* specs,
|
|||||||
|
|
||||||
if (side == WOLFSSL_CLIENT_END) {
|
if (side == WOLFSSL_CLIENT_END) {
|
||||||
if (enc) {
|
if (enc) {
|
||||||
camRet = CamelliaSetKey(enc->cam, keys->client_write_key,
|
camRet = wc_CamelliaSetKey(enc->cam, keys->client_write_key,
|
||||||
specs->key_size, keys->client_write_IV);
|
specs->key_size, keys->client_write_IV);
|
||||||
if (camRet != 0) return camRet;
|
if (camRet != 0) return camRet;
|
||||||
}
|
}
|
||||||
if (dec) {
|
if (dec) {
|
||||||
camRet = CamelliaSetKey(dec->cam, keys->server_write_key,
|
camRet = wc_CamelliaSetKey(dec->cam, keys->server_write_key,
|
||||||
specs->key_size, keys->server_write_IV);
|
specs->key_size, keys->server_write_IV);
|
||||||
if (camRet != 0) return camRet;
|
if (camRet != 0) return camRet;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
if (enc) {
|
if (enc) {
|
||||||
camRet = CamelliaSetKey(enc->cam, keys->server_write_key,
|
camRet = wc_CamelliaSetKey(enc->cam, keys->server_write_key,
|
||||||
specs->key_size, keys->server_write_IV);
|
specs->key_size, keys->server_write_IV);
|
||||||
if (camRet != 0) return camRet;
|
if (camRet != 0) return camRet;
|
||||||
}
|
}
|
||||||
if (dec) {
|
if (dec) {
|
||||||
camRet = CamelliaSetKey(dec->cam, keys->client_write_key,
|
camRet = wc_CamelliaSetKey(dec->cam, keys->client_write_key,
|
||||||
specs->key_size, keys->client_write_IV);
|
specs->key_size, keys->client_write_IV);
|
||||||
if (camRet != 0) return camRet;
|
if (camRet != 0) return camRet;
|
||||||
}
|
}
|
||||||
|
22
src/ssl.c
22
src/ssl.c
@ -3640,7 +3640,7 @@ static int wolfSSL_SetTmpDH_buffer_wrapper(WOLFSSL_CTX* ctx, WOLFSSL* ssl,
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (ret == 0) {
|
if (ret == 0) {
|
||||||
if (DhParamsLoad(der.buffer, der.length, p, &pSz, g, &gSz) < 0)
|
if (wc_DhParamsLoad(der.buffer, der.length, p, &pSz, g, &gSz) < 0)
|
||||||
ret = SSL_BAD_FILETYPE;
|
ret = SSL_BAD_FILETYPE;
|
||||||
else if (ssl)
|
else if (ssl)
|
||||||
ret = wolfSSL_SetTmpDH(ssl, p, pSz, g, gSz);
|
ret = wolfSSL_SetTmpDH(ssl, p, pSz, g, gSz);
|
||||||
@ -7661,7 +7661,7 @@ int wolfSSL_set_compression(WOLFSSL* ssl)
|
|||||||
break;
|
break;
|
||||||
|
|
||||||
case ARC4_TYPE :
|
case ARC4_TYPE :
|
||||||
Arc4Process(&ctx->cipher.arc4, dst, src, len);
|
wc_Arc4Process(&ctx->cipher.arc4, dst, src, len);
|
||||||
break;
|
break;
|
||||||
|
|
||||||
case NULL_CIPHER_TYPE :
|
case NULL_CIPHER_TYPE :
|
||||||
@ -10794,7 +10794,7 @@ WOLFSSL_DH* wolfSSL_DH_new(void)
|
|||||||
}
|
}
|
||||||
|
|
||||||
InitwolfSSL_DH(external);
|
InitwolfSSL_DH(external);
|
||||||
InitDhKey(key);
|
wc_InitDhKey(key);
|
||||||
external->internal = key;
|
external->internal = key;
|
||||||
|
|
||||||
return external;
|
return external;
|
||||||
@ -10807,7 +10807,7 @@ void wolfSSL_DH_free(WOLFSSL_DH* dh)
|
|||||||
|
|
||||||
if (dh) {
|
if (dh) {
|
||||||
if (dh->internal) {
|
if (dh->internal) {
|
||||||
FreeDhKey((DhKey*)dh->internal);
|
wc_FreeDhKey((DhKey*)dh->internal);
|
||||||
XFREE(dh->internal, NULL, DYNAMIC_TYPE_DH);
|
XFREE(dh->internal, NULL, DYNAMIC_TYPE_DH);
|
||||||
dh->internal = NULL;
|
dh->internal = NULL;
|
||||||
}
|
}
|
||||||
@ -10860,7 +10860,7 @@ static int SetDhInternal(WOLFSSL_DH* dh)
|
|||||||
|
|
||||||
if (pSz <= 0 || gSz <= 0)
|
if (pSz <= 0 || gSz <= 0)
|
||||||
WOLFSSL_MSG("Bad BN2bin set");
|
WOLFSSL_MSG("Bad BN2bin set");
|
||||||
else if (DhSetKey((DhKey*)dh->internal, p, pSz, g, gSz) < 0)
|
else if (wc_DhSetKey((DhKey*)dh->internal, p, pSz, g, gSz) < 0)
|
||||||
WOLFSSL_MSG("Bad DH SetKey");
|
WOLFSSL_MSG("Bad DH SetKey");
|
||||||
else {
|
else {
|
||||||
dh->inSet = 1;
|
dh->inSet = 1;
|
||||||
@ -10936,9 +10936,9 @@ int wolfSSL_DH_generate_key(WOLFSSL_DH* dh)
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (rng) {
|
if (rng) {
|
||||||
if (DhGenerateKeyPair((DhKey*)dh->internal, rng, priv, &privSz,
|
if (wc_DhGenerateKeyPair((DhKey*)dh->internal, rng, priv, &privSz,
|
||||||
pub, &pubSz) < 0)
|
pub, &pubSz) < 0)
|
||||||
WOLFSSL_MSG("Bad DhGenerateKeyPair");
|
WOLFSSL_MSG("Bad wc_DhGenerateKeyPair");
|
||||||
else {
|
else {
|
||||||
if (dh->pub_key)
|
if (dh->pub_key)
|
||||||
wolfSSL_BN_free(dh->pub_key);
|
wolfSSL_BN_free(dh->pub_key);
|
||||||
@ -11021,9 +11021,9 @@ int wolfSSL_DH_compute_key(unsigned char* key, WOLFSSL_BIGNUM* otherPub,
|
|||||||
|
|
||||||
if (privSz <= 0 || pubSz <= 0)
|
if (privSz <= 0 || pubSz <= 0)
|
||||||
WOLFSSL_MSG("Bad BN2bin set");
|
WOLFSSL_MSG("Bad BN2bin set");
|
||||||
else if (DhAgree((DhKey*)dh->internal, key, &keySz, priv, privSz, pub,
|
else if (wc_DhAgree((DhKey*)dh->internal, key, &keySz, priv, privSz, pub,
|
||||||
pubSz) < 0)
|
pubSz) < 0)
|
||||||
WOLFSSL_MSG("DhAgree failed");
|
WOLFSSL_MSG("wc_DhAgree failed");
|
||||||
else
|
else
|
||||||
ret = (int)keySz;
|
ret = (int)keySz;
|
||||||
}
|
}
|
||||||
@ -11373,8 +11373,8 @@ int wolfSSL_RSA_generate_key_ex(WOLFSSL_RSA* rsa, int bits, WOLFSSL_BIGNUM* bn,
|
|||||||
|
|
||||||
if (InitRng(rng) < 0)
|
if (InitRng(rng) < 0)
|
||||||
WOLFSSL_MSG("RNG init failed");
|
WOLFSSL_MSG("RNG init failed");
|
||||||
else if (MakeRsaKey((RsaKey*)rsa->internal, bits, 65537, rng) < 0)
|
else if (wc_MakeRsaKey((RsaKey*)rsa->internal, bits, 65537, rng) < 0)
|
||||||
WOLFSSL_MSG("MakeRsaKey failed");
|
WOLFSSL_MSG("wc_MakeRsaKey failed");
|
||||||
else if (SetRsaExternal(rsa) < 0)
|
else if (SetRsaExternal(rsa) < 0)
|
||||||
WOLFSSL_MSG("SetRsaExternal failed");
|
WOLFSSL_MSG("SetRsaExternal failed");
|
||||||
else {
|
else {
|
||||||
|
Reference in New Issue
Block a user