From d5aa76b161ed67d4cdd77f5243491787697d0042 Mon Sep 17 00:00:00 2001 From: Marco Oliverio Date: Thu, 20 Jan 2022 11:32:22 +0100 Subject: [PATCH] dtsl-srtp: use PRF according to the DTLS version used RFC 5764 sec 4.1.2 --- src/ssl.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/src/ssl.c b/src/ssl.c index 4fc587b2c..9d9a17b3c 100644 --- a/src/ssl.c +++ b/src/ssl.c @@ -1422,10 +1422,11 @@ int wolfSSL_export_dtls_srtp_keying_material(WOLFSSL* ssl, XMEMCPY(seed + RAN_LEN, ssl->arrays->serverRandom, RAN_LEN); PRIVATE_KEY_UNLOCK(); - ret = wc_PRF_TLSv1(out, profile->kdfBits, /* out: generated keys / salt */ + ret = wc_PRF_TLS(out, profile->kdfBits, /* out: generated keys / salt */ ssl->arrays->masterSecret, SECRET_LEN, /* existing master secret */ (const byte*)label, (int)XSTRLEN(label),/* label */ seed, SEED_LEN, /* seed: client/server random */ + IsAtLeastTLSv1_2(ssl), ssl->specs.mac_algorithm, ssl->heap, INVALID_DEVID); if (ret == 0) { *olen = profile->kdfBits;