@@ -1946,14 +1946,14 @@ static psa_status_t mbedtls_ssl_set_hs_ecjpake_password_common(
1946
1946
size_t user_len = 0 ;
1947
1947
const uint8_t * peer = NULL ;
1948
1948
size_t peer_len = 0 ;
1949
- psa_pake_cs_set_algorithm (& cipher_suite , PSA_ALG_JPAKE );
1949
+ psa_pake_cs_set_algorithm (& cipher_suite , PSA_ALG_JPAKE ( PSA_ALG_SHA_256 ) );
1950
1950
psa_pake_cs_set_primitive (& cipher_suite ,
1951
1951
PSA_PAKE_PRIMITIVE (PSA_PAKE_PRIMITIVE_TYPE_ECC ,
1952
1952
PSA_ECC_FAMILY_SECP_R1 ,
1953
1953
256 ));
1954
- psa_pake_cs_set_hash (& cipher_suite , PSA_ALG_SHA_256 );
1954
+ psa_pake_cs_set_key_confirmation (& cipher_suite , PSA_PAKE_UNCONFIRMED_KEY );
1955
1955
1956
- status = psa_pake_setup (& ssl -> handshake -> psa_pake_ctx , & cipher_suite );
1956
+ status = psa_pake_setup (& ssl -> handshake -> psa_pake_ctx , pwd , & cipher_suite );
1957
1957
if (status != PSA_SUCCESS ) {
1958
1958
return status ;
1959
1959
}
@@ -1980,11 +1980,6 @@ static psa_status_t mbedtls_ssl_set_hs_ecjpake_password_common(
1980
1980
return status ;
1981
1981
}
1982
1982
1983
- status = psa_pake_set_password_key (& ssl -> handshake -> psa_pake_ctx , pwd );
1984
- if (status != PSA_SUCCESS ) {
1985
- return status ;
1986
- }
1987
-
1988
1983
ssl -> handshake -> psa_pake_ctx_is_ok = 1 ;
1989
1984
1990
1985
return PSA_SUCCESS ;
@@ -2007,7 +2002,7 @@ int mbedtls_ssl_set_hs_ecjpake_password(mbedtls_ssl_context *ssl,
2007
2002
}
2008
2003
2009
2004
psa_set_key_usage_flags (& attributes , PSA_KEY_USAGE_DERIVE );
2010
- psa_set_key_algorithm (& attributes , PSA_ALG_JPAKE );
2005
+ psa_set_key_algorithm (& attributes , PSA_ALG_JPAKE ( PSA_ALG_SHA_256 ) );
2011
2006
psa_set_key_type (& attributes , PSA_KEY_TYPE_PASSWORD );
2012
2007
2013
2008
status = psa_import_key (& attributes , pw , pw_len ,
@@ -6460,13 +6455,24 @@ static int ssl_compute_master(mbedtls_ssl_handshake_params *handshake,
6460
6455
if (handshake -> ciphersuite_info -> key_exchange == MBEDTLS_KEY_EXCHANGE_ECJPAKE ) {
6461
6456
psa_status_t status ;
6462
6457
psa_algorithm_t alg = PSA_ALG_TLS12_ECJPAKE_TO_PMS ;
6458
+ psa_key_id_t key ;
6459
+ psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT ;
6463
6460
psa_key_derivation_operation_t derivation =
6464
6461
PSA_KEY_DERIVATION_OPERATION_INIT ;
6465
6462
6466
6463
MBEDTLS_SSL_DEBUG_MSG (2 , ("perform PSA-based PMS KDF for ECJPAKE" ));
6467
6464
6468
6465
handshake -> pmslen = PSA_TLS12_ECJPAKE_TO_PMS_DATA_SIZE ;
6469
6466
6467
+ psa_set_key_type (& attributes , PSA_KEY_TYPE_DERIVE );
6468
+ psa_set_key_usage_flags (& attributes , PSA_KEY_USAGE_DERIVE );
6469
+ psa_set_key_algorithm (& attributes , alg );
6470
+
6471
+ status = psa_pake_get_shared_key (& handshake -> psa_pake_ctx , & attributes , & key );
6472
+ if (status != PSA_SUCCESS ) {
6473
+ return MBEDTLS_ERR_SSL_HW_ACCEL_FAILED ;
6474
+ }
6475
+
6470
6476
status = psa_key_derivation_setup (& derivation , alg );
6471
6477
if (status != PSA_SUCCESS ) {
6472
6478
return MBEDTLS_ERR_SSL_HW_ACCEL_FAILED ;
@@ -6479,8 +6485,8 @@ static int ssl_compute_master(mbedtls_ssl_handshake_params *handshake,
6479
6485
return MBEDTLS_ERR_SSL_HW_ACCEL_FAILED ;
6480
6486
}
6481
6487
6482
- status = psa_pake_get_implicit_key ( & handshake -> psa_pake_ctx ,
6483
- & derivation );
6488
+ status = psa_key_derivation_input_key ( & derivation , PSA_KEY_DERIVATION_INPUT_SECRET ,
6489
+ key );
6484
6490
if (status != PSA_SUCCESS ) {
6485
6491
psa_key_derivation_abort (& derivation );
6486
6492
return MBEDTLS_ERR_SSL_HW_ACCEL_FAILED ;
0 commit comments