mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-03-30 16:20:11 +00:00
Add type casts in ssl library
Signed-off-by: Agathiyan Bragadeesh <agathiyan.bragadeesh2@arm.com>
This commit is contained in:
parent
db084d16ea
commit
8b52b88b6d
@ -1931,7 +1931,7 @@ size_t mbedtls_ssl_ciphersuite_get_cipher_key_bitlen(const mbedtls_ssl_ciphersui
|
||||
return key_bits;
|
||||
#else
|
||||
const mbedtls_cipher_info_t * const cipher_info =
|
||||
mbedtls_cipher_info_from_type(info->cipher);
|
||||
mbedtls_cipher_info_from_type((mbedtls_cipher_type_t) info->cipher);
|
||||
|
||||
return mbedtls_cipher_info_get_key_bitlen(cipher_info);
|
||||
#endif /* MBEDTLS_USE_PSA_CRYPTO */
|
||||
|
@ -3602,8 +3602,9 @@ static int ssl_parse_record_header(mbedtls_ssl_context const *ssl,
|
||||
*/
|
||||
rec->ver[0] = buf[rec_hdr_version_offset + 0];
|
||||
rec->ver[1] = buf[rec_hdr_version_offset + 1];
|
||||
tls_version = mbedtls_ssl_read_version(buf + rec_hdr_version_offset,
|
||||
ssl->conf->transport);
|
||||
tls_version = (mbedtls_ssl_protocol_version) mbedtls_ssl_read_version(
|
||||
buf + rec_hdr_version_offset,
|
||||
ssl->conf->transport);
|
||||
|
||||
if (tls_version > ssl->conf->max_tls_version) {
|
||||
MBEDTLS_SSL_DEBUG_MSG(1, ("TLS version mismatch: got %u, expected max %u",
|
||||
@ -5849,15 +5850,19 @@ static void ssl_buffering_free_slot(mbedtls_ssl_context *ssl,
|
||||
void mbedtls_ssl_write_version(unsigned char version[2], int transport,
|
||||
mbedtls_ssl_protocol_version tls_version)
|
||||
{
|
||||
uint16_t tls_version_formatted;
|
||||
#if defined(MBEDTLS_SSL_PROTO_DTLS)
|
||||
if (transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM) {
|
||||
tls_version =
|
||||
tls_version_formatted =
|
||||
~(tls_version - (tls_version == 0x0302 ? 0x0202 : 0x0201));
|
||||
}
|
||||
} else
|
||||
#else
|
||||
((void) transport);
|
||||
#endif
|
||||
MBEDTLS_PUT_UINT16_BE(tls_version, version, 0);
|
||||
{
|
||||
tls_version_formatted = (uint16_t) tls_version;
|
||||
}
|
||||
MBEDTLS_PUT_UINT16_BE(tls_version_formatted, version, 0);
|
||||
}
|
||||
|
||||
uint16_t mbedtls_ssl_read_version(const unsigned char version[2],
|
||||
|
@ -2436,7 +2436,7 @@ mbedtls_ssl_mode_t mbedtls_ssl_get_mode_from_ciphersuite(
|
||||
}
|
||||
#else
|
||||
const mbedtls_cipher_info_t *cipher =
|
||||
mbedtls_cipher_info_from_type(suite->cipher);
|
||||
mbedtls_cipher_info_from_type((mbedtls_cipher_type_t) suite->cipher);
|
||||
if (cipher != NULL) {
|
||||
base_mode =
|
||||
mbedtls_ssl_get_base_mode(
|
||||
@ -3116,12 +3116,12 @@ void mbedtls_ssl_get_dtls_srtp_negotiation_result(const mbedtls_ssl_context *ssl
|
||||
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
|
||||
void mbedtls_ssl_conf_max_version(mbedtls_ssl_config *conf, int major, int minor)
|
||||
{
|
||||
conf->max_tls_version = (major << 8) | minor;
|
||||
conf->max_tls_version = (mbedtls_ssl_protocol_version) ((major << 8) | minor);
|
||||
}
|
||||
|
||||
void mbedtls_ssl_conf_min_version(mbedtls_ssl_config *conf, int major, int minor)
|
||||
{
|
||||
conf->min_tls_version = (major << 8) | minor;
|
||||
conf->min_tls_version = (mbedtls_ssl_protocol_version) ((major << 8) | minor);
|
||||
}
|
||||
#endif /* MBEDTLS_DEPRECATED_REMOVED */
|
||||
|
||||
@ -3749,7 +3749,7 @@ static int ssl_session_load(mbedtls_ssl_session *session,
|
||||
if (1 > (size_t) (end - p)) {
|
||||
return MBEDTLS_ERR_SSL_BAD_INPUT_DATA;
|
||||
}
|
||||
session->tls_version = 0x0300 | *p++;
|
||||
session->tls_version = (mbedtls_ssl_protocol_version) (0x0300 | *p++);
|
||||
|
||||
/* Dispatch according to TLS version. */
|
||||
remaining_len = (end - p);
|
||||
@ -3852,7 +3852,7 @@ int mbedtls_ssl_handshake_step(mbedtls_ssl_context *ssl)
|
||||
#if defined(MBEDTLS_SSL_CLI_C)
|
||||
if (ssl->conf->endpoint == MBEDTLS_SSL_IS_CLIENT) {
|
||||
MBEDTLS_SSL_DEBUG_MSG(2, ("client state: %s",
|
||||
mbedtls_ssl_states_str(ssl->state)));
|
||||
mbedtls_ssl_states_str((mbedtls_ssl_states) ssl->state)));
|
||||
|
||||
switch (ssl->state) {
|
||||
case MBEDTLS_SSL_HELLO_REQUEST:
|
||||
@ -6534,7 +6534,7 @@ int mbedtls_ssl_derive_keys(mbedtls_ssl_context *ssl)
|
||||
|
||||
/* Set PRF, calc_verify and calc_finished function pointers */
|
||||
ret = ssl_set_handshake_prfs(ssl->handshake,
|
||||
ciphersuite_info->mac);
|
||||
(mbedtls_md_type_t) ciphersuite_info->mac);
|
||||
if (ret != 0) {
|
||||
MBEDTLS_SSL_DEBUG_RET(1, "ssl_set_handshake_prfs", ret);
|
||||
return ret;
|
||||
@ -8210,7 +8210,7 @@ static int ssl_tls12_populate_transform(mbedtls_ssl_transform *transform,
|
||||
goto end;
|
||||
}
|
||||
#else
|
||||
cipher_info = mbedtls_cipher_info_from_type(ciphersuite_info->cipher);
|
||||
cipher_info = mbedtls_cipher_info_from_type((mbedtls_cipher_type_t) ciphersuite_info->cipher);
|
||||
if (cipher_info == NULL) {
|
||||
MBEDTLS_SSL_DEBUG_MSG(1, ("cipher info for %u not found",
|
||||
ciphersuite_info->cipher));
|
||||
@ -8226,7 +8226,7 @@ static int ssl_tls12_populate_transform(mbedtls_ssl_transform *transform,
|
||||
return MBEDTLS_ERR_SSL_BAD_INPUT_DATA;
|
||||
}
|
||||
#else
|
||||
md_info = mbedtls_md_info_from_type(ciphersuite_info->mac);
|
||||
md_info = mbedtls_md_info_from_type((mbedtls_md_type_t) ciphersuite_info->mac);
|
||||
if (md_info == NULL) {
|
||||
MBEDTLS_SSL_DEBUG_MSG(1, ("mbedtls_md info for %u not found",
|
||||
(unsigned) ciphersuite_info->mac));
|
||||
|
@ -1271,7 +1271,8 @@ static int ssl_parse_server_hello(mbedtls_ssl_context *ssl)
|
||||
buf += mbedtls_ssl_hs_hdr_len(ssl);
|
||||
|
||||
MBEDTLS_SSL_DEBUG_BUF(3, "server hello, version", buf, 2);
|
||||
ssl->tls_version = mbedtls_ssl_read_version(buf, ssl->conf->transport);
|
||||
ssl->tls_version = (mbedtls_ssl_protocol_version) mbedtls_ssl_read_version(buf,
|
||||
ssl->conf->transport);
|
||||
ssl->session_negotiate->tls_version = ssl->tls_version;
|
||||
|
||||
if (ssl->tls_version < ssl->conf->min_tls_version ||
|
||||
@ -3141,7 +3142,8 @@ ecdh_calc_secret:
|
||||
|
||||
#if !defined(MBEDTLS_USE_PSA_CRYPTO)
|
||||
if ((ret = mbedtls_ssl_psk_derive_premaster(ssl,
|
||||
ciphersuite_info->key_exchange)) != 0) {
|
||||
(mbedtls_key_exchange_type_t) ciphersuite_info->
|
||||
key_exchange)) != 0) {
|
||||
MBEDTLS_SSL_DEBUG_RET(1,
|
||||
"mbedtls_ssl_psk_derive_premaster", ret);
|
||||
return ret;
|
||||
|
@ -1166,7 +1166,8 @@ read_record_header:
|
||||
*/
|
||||
MBEDTLS_SSL_DEBUG_BUF(3, "client hello, version", buf, 2);
|
||||
|
||||
ssl->tls_version = mbedtls_ssl_read_version(buf, ssl->conf->transport);
|
||||
ssl->tls_version = (mbedtls_ssl_protocol_version) mbedtls_ssl_read_version(buf,
|
||||
ssl->conf->transport);
|
||||
ssl->session_negotiate->tls_version = ssl->tls_version;
|
||||
|
||||
if (ssl->tls_version != MBEDTLS_SSL_VERSION_TLS1_2) {
|
||||
@ -3798,7 +3799,8 @@ static int ssl_parse_client_key_exchange(mbedtls_ssl_context *ssl)
|
||||
|
||||
#if !defined(MBEDTLS_USE_PSA_CRYPTO)
|
||||
if ((ret = mbedtls_ssl_psk_derive_premaster(ssl,
|
||||
ciphersuite_info->key_exchange)) != 0) {
|
||||
(mbedtls_key_exchange_type_t) ciphersuite_info->
|
||||
key_exchange)) != 0) {
|
||||
MBEDTLS_SSL_DEBUG_RET(1, "mbedtls_ssl_psk_derive_premaster", ret);
|
||||
return ret;
|
||||
}
|
||||
@ -3830,7 +3832,8 @@ static int ssl_parse_client_key_exchange(mbedtls_ssl_context *ssl)
|
||||
|
||||
#if !defined(MBEDTLS_USE_PSA_CRYPTO)
|
||||
if ((ret = mbedtls_ssl_psk_derive_premaster(ssl,
|
||||
ciphersuite_info->key_exchange)) != 0) {
|
||||
(mbedtls_key_exchange_type_t) ciphersuite_info->
|
||||
key_exchange)) != 0) {
|
||||
MBEDTLS_SSL_DEBUG_RET(1, "mbedtls_ssl_psk_derive_premaster", ret);
|
||||
return ret;
|
||||
}
|
||||
@ -3871,7 +3874,8 @@ static int ssl_parse_client_key_exchange(mbedtls_ssl_context *ssl)
|
||||
MBEDTLS_SSL_DEBUG_MPI(3, "DHM: K ", &ssl->handshake->dhm_ctx.K);
|
||||
#else
|
||||
if ((ret = mbedtls_ssl_psk_derive_premaster(ssl,
|
||||
ciphersuite_info->key_exchange)) != 0) {
|
||||
(mbedtls_key_exchange_type_t) ciphersuite_info->
|
||||
key_exchange)) != 0) {
|
||||
MBEDTLS_SSL_DEBUG_RET(1, "mbedtls_ssl_psk_derive_premaster", ret);
|
||||
return ret;
|
||||
}
|
||||
@ -3971,7 +3975,8 @@ static int ssl_parse_client_key_exchange(mbedtls_ssl_context *ssl)
|
||||
MBEDTLS_DEBUG_ECDH_QP);
|
||||
|
||||
if ((ret = mbedtls_ssl_psk_derive_premaster(ssl,
|
||||
ciphersuite_info->key_exchange)) != 0) {
|
||||
(mbedtls_key_exchange_type_t) ciphersuite_info->
|
||||
key_exchange)) != 0) {
|
||||
MBEDTLS_SSL_DEBUG_RET(1, "mbedtls_ssl_psk_derive_premaster", ret);
|
||||
return ret;
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user