Fix naming: random bytes are the seed (not salt) in derivation process

Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com>
This commit is contained in:
Przemek Stekiel 2022-04-05 17:15:55 +02:00
parent 1f02703e53
commit ae4ed30435

View File

@ -5056,15 +5056,15 @@ static int ssl_compute_master( mbedtls_ssl_handshake_params *handshake,
* is used. */ * is used. */
char const *lbl = "master secret"; char const *lbl = "master secret";
/* The salt for the KDF used for key expansion. /* The seed for the KDF used for key expansion.
* - If the Extended Master Secret extension is not used, * - If the Extended Master Secret extension is not used,
* this is ClientHello.Random + ServerHello.Random * this is ClientHello.Random + ServerHello.Random
* (see Sect. 8.1 in RFC 5246). * (see Sect. 8.1 in RFC 5246).
* - If the Extended Master Secret extension is used, * - If the Extended Master Secret extension is used,
* this is the transcript of the handshake so far. * this is the transcript of the handshake so far.
* (see Sect. 4 in RFC 7627). */ * (see Sect. 4 in RFC 7627). */
unsigned char const *salt = handshake->randbytes; unsigned char const *seed = handshake->randbytes;
size_t salt_len = 64; size_t seed_len = 64;
#if !defined(MBEDTLS_DEBUG_C) && \ #if !defined(MBEDTLS_DEBUG_C) && \
!defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET) && \ !defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET) && \
@ -5084,11 +5084,11 @@ static int ssl_compute_master( mbedtls_ssl_handshake_params *handshake,
if( handshake->extended_ms == MBEDTLS_SSL_EXTENDED_MS_ENABLED ) if( handshake->extended_ms == MBEDTLS_SSL_EXTENDED_MS_ENABLED )
{ {
lbl = "extended master secret"; lbl = "extended master secret";
salt = session_hash; seed = session_hash;
handshake->calc_verify( ssl, session_hash, &salt_len ); handshake->calc_verify( ssl, session_hash, &seed_len );
MBEDTLS_SSL_DEBUG_BUF( 3, "session hash for extended master secret", MBEDTLS_SSL_DEBUG_BUF( 3, "session hash for extended master secret",
session_hash, salt_len ); session_hash, seed_len );
} }
#endif /* MBEDTLS_SSL_EXTENDED_MS_ENABLED */ #endif /* MBEDTLS_SSL_EXTENDED_MS_ENABLED */
@ -5115,7 +5115,7 @@ static int ssl_compute_master( mbedtls_ssl_handshake_params *handshake,
alg = PSA_ALG_TLS12_PSK_TO_MS(PSA_ALG_SHA_256); alg = PSA_ALG_TLS12_PSK_TO_MS(PSA_ALG_SHA_256);
status = setup_psa_key_derivation( &derivation, psk, alg, status = setup_psa_key_derivation( &derivation, psk, alg,
salt, salt_len, seed, seed_len,
(unsigned char const *) lbl, (unsigned char const *) lbl,
(size_t) strlen( lbl ), (size_t) strlen( lbl ),
master_secret_len ); master_secret_len );
@ -5142,7 +5142,7 @@ static int ssl_compute_master( mbedtls_ssl_handshake_params *handshake,
#endif #endif
{ {
ret = handshake->tls_prf( handshake->premaster, handshake->pmslen, ret = handshake->tls_prf( handshake->premaster, handshake->pmslen,
lbl, salt, salt_len, lbl, seed, seed_len,
master, master,
master_secret_len ); master_secret_len );
if( ret != 0 ) if( ret != 0 )