Skip to content

Commit 9beb52e

Browse files
mswarowskySebastianBoe
authored andcommitted
[nrf noup] tls: Adapt to final PSA PAKE APIs
This is a temporary noup as the mbed TLS PSA core hasn't adapted the final PSA PAKE APIS from the 1.2 spec. Once that is done this can be removed. Check the signature of psa_pake_setup and if psa_pake_get_implicit_key is removed and replaced with psa_pake_get_shared_key Signed-off-by: Markus Swarowsky <markus.swarowsky@nordicsemi.no>
1 parent 9462939 commit 9beb52e

File tree

1 file changed

+17
-11
lines changed

1 file changed

+17
-11
lines changed

library/ssl_tls.c

+17-11
Original file line numberDiff line numberDiff line change
@@ -1946,14 +1946,14 @@ static psa_status_t mbedtls_ssl_set_hs_ecjpake_password_common(
19461946
size_t user_len = 0;
19471947
const uint8_t *peer = NULL;
19481948
size_t peer_len = 0;
1949-
psa_pake_cs_set_algorithm(&cipher_suite, PSA_ALG_JPAKE);
1949+
psa_pake_cs_set_algorithm(&cipher_suite, PSA_ALG_JPAKE(PSA_ALG_SHA_256));
19501950
psa_pake_cs_set_primitive(&cipher_suite,
19511951
PSA_PAKE_PRIMITIVE(PSA_PAKE_PRIMITIVE_TYPE_ECC,
19521952
PSA_ECC_FAMILY_SECP_R1,
19531953
256));
1954-
psa_pake_cs_set_hash(&cipher_suite, PSA_ALG_SHA_256);
1954+
psa_pake_cs_set_key_confirmation(&cipher_suite, PSA_PAKE_UNCONFIRMED_KEY);
19551955

1956-
status = psa_pake_setup(&ssl->handshake->psa_pake_ctx, &cipher_suite);
1956+
status = psa_pake_setup(&ssl->handshake->psa_pake_ctx, pwd ,&cipher_suite);
19571957
if (status != PSA_SUCCESS) {
19581958
return status;
19591959
}
@@ -1980,11 +1980,6 @@ static psa_status_t mbedtls_ssl_set_hs_ecjpake_password_common(
19801980
return status;
19811981
}
19821982

1983-
status = psa_pake_set_password_key(&ssl->handshake->psa_pake_ctx, pwd);
1984-
if (status != PSA_SUCCESS) {
1985-
return status;
1986-
}
1987-
19881983
ssl->handshake->psa_pake_ctx_is_ok = 1;
19891984

19901985
return PSA_SUCCESS;
@@ -2007,7 +2002,7 @@ int mbedtls_ssl_set_hs_ecjpake_password(mbedtls_ssl_context *ssl,
20072002
}
20082003

20092004
psa_set_key_usage_flags(&attributes, PSA_KEY_USAGE_DERIVE);
2010-
psa_set_key_algorithm(&attributes, PSA_ALG_JPAKE);
2005+
psa_set_key_algorithm(&attributes, PSA_ALG_JPAKE(PSA_ALG_SHA_256));
20112006
psa_set_key_type(&attributes, PSA_KEY_TYPE_PASSWORD);
20122007

20132008
status = psa_import_key(&attributes, pw, pw_len,
@@ -6460,13 +6455,24 @@ static int ssl_compute_master(mbedtls_ssl_handshake_params *handshake,
64606455
if (handshake->ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECJPAKE) {
64616456
psa_status_t status;
64626457
psa_algorithm_t alg = PSA_ALG_TLS12_ECJPAKE_TO_PMS;
6458+
psa_key_id_t key;
6459+
psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
64636460
psa_key_derivation_operation_t derivation =
64646461
PSA_KEY_DERIVATION_OPERATION_INIT;
64656462

64666463
MBEDTLS_SSL_DEBUG_MSG(2, ("perform PSA-based PMS KDF for ECJPAKE"));
64676464

64686465
handshake->pmslen = PSA_TLS12_ECJPAKE_TO_PMS_DATA_SIZE;
64696466

6467+
psa_set_key_type(&attributes, PSA_KEY_TYPE_DERIVE);
6468+
psa_set_key_usage_flags(&attributes, PSA_KEY_USAGE_DERIVE);
6469+
psa_set_key_algorithm(&attributes, alg);
6470+
6471+
status = psa_pake_get_shared_key(&handshake->psa_pake_ctx, &attributes, &key);
6472+
if (status != PSA_SUCCESS) {
6473+
return MBEDTLS_ERR_SSL_HW_ACCEL_FAILED;
6474+
}
6475+
64706476
status = psa_key_derivation_setup(&derivation, alg);
64716477
if (status != PSA_SUCCESS) {
64726478
return MBEDTLS_ERR_SSL_HW_ACCEL_FAILED;
@@ -6479,8 +6485,8 @@ static int ssl_compute_master(mbedtls_ssl_handshake_params *handshake,
64796485
return MBEDTLS_ERR_SSL_HW_ACCEL_FAILED;
64806486
}
64816487

6482-
status = psa_pake_get_implicit_key(&handshake->psa_pake_ctx,
6483-
&derivation);
6488+
status = psa_key_derivation_input_key(&derivation, PSA_KEY_DERIVATION_INPUT_SECRET,
6489+
key);
64846490
if (status != PSA_SUCCESS) {
64856491
psa_key_derivation_abort(&derivation);
64866492
return MBEDTLS_ERR_SSL_HW_ACCEL_FAILED;

0 commit comments

Comments
 (0)