Skip to content
Merged
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
24 changes: 15 additions & 9 deletions src/internal.c
Original file line number Diff line number Diff line change
Expand Up @@ -5527,12 +5527,14 @@ static int KeyAgreeEcdhMlKem_client(WOLFSSH* ssh, byte hashId,
int ret = WS_SUCCESS;
byte sharedSecretHashSz = 0;
byte *sharedSecretHash = NULL;
MlKemKey kem = {0};
MlKemKey kem;
word32 length_ciphertext = 0;
word32 length_sharedsecret = 0;
word32 length_privatekey = 0;
int mlKemType = WC_ML_KEM_768;
byte kexId = ssh->handshake->kexId;

WMEMSET(&kem, 0, sizeof(kem));
#if !defined(WOLFSSH_NO_NISTP256_MLKEM768_SHA256) || \
!defined(WOLFSSH_NO_NISTP384_MLKEM1024_SHA384)
ecc_key *key_ptr = NULL;
Expand Down Expand Up @@ -5694,7 +5696,7 @@ static int KeyAgreeEcdhMlKem_client(WOLFSSH* ssh, byte hashId,
/* Replace the concatenated shared secrets with the hash. That
* will become the new shared secret. */
if (ret == 0) {
sharedSecretHashSz = wc_HashGetDigestSize(hashId);
sharedSecretHashSz = wc_HashGetDigestSize((enum wc_HashType)hashId);
sharedSecretHash = (byte *)WMALLOC(sharedSecretHashSz,
ssh->ctx->heap,
DYNTYPE_PRIVKEY);
Comment thread
JacobBarthelmeh marked this conversation as resolved.
Outdated
Expand All @@ -5704,8 +5706,8 @@ static int KeyAgreeEcdhMlKem_client(WOLFSSH* ssh, byte hashId,
}

if (ret == 0) {
ret = wc_Hash(hashId, ssh->k, ssh->kSz, sharedSecretHash,
sharedSecretHashSz);
ret = wc_Hash((enum wc_HashType)hashId, ssh->k, ssh->kSz,
sharedSecretHash, sharedSecretHashSz);
}

if (ret == 0) {
Expand Down Expand Up @@ -12144,12 +12146,14 @@ static int KeyAgreeEcdhMlKem_server(WOLFSSH* ssh, byte hashId,
int ret = WS_SUCCESS;
byte sharedSecretHashSz = 0;
byte *sharedSecretHash = NULL;
MlKemKey kem = {0};
MlKemKey kem;
word32 length_publickey = 0;
word32 length_ciphertext = 0;
word32 length_sharedsecret = 0;
int mlKemType = WC_ML_KEM_768;
byte kexId = ssh->handshake->kexId;

WMEMSET(&kem, 0, sizeof(kem));
#if !defined(WOLFSSH_NO_NISTP256_MLKEM768_SHA256) || \
!defined(WOLFSSH_NO_NISTP384_MLKEM1024_SHA384)
ecc_key* pubKey = NULL;
Expand Down Expand Up @@ -12366,16 +12370,16 @@ static int KeyAgreeEcdhMlKem_server(WOLFSSH* ssh, byte hashId,
/* Replace the concatenated shared secrets with the hash. That
* will become the new shared secret.*/
if (ret == 0) {
sharedSecretHashSz = wc_HashGetDigestSize(hashId);
sharedSecretHashSz = wc_HashGetDigestSize((enum wc_HashType)hashId);
sharedSecretHash = (byte *)WMALLOC(sharedSecretHashSz,
ssh->ctx->heap, DYNTYPE_PRIVKEY);
if (sharedSecretHash == NULL) {
Comment thread
JacobBarthelmeh marked this conversation as resolved.
Outdated
ret = WS_MEMORY_E;
}
}
if (ret == 0) {
ret = wc_Hash(hashId, ssh->k, ssh->kSz, sharedSecretHash,
sharedSecretHashSz);
ret = wc_Hash((enum wc_HashType)hashId, ssh->k, ssh->kSz,
sharedSecretHash, sharedSecretHashSz);
}
if (ret == 0) {
XMEMCPY(ssh->k, sharedSecretHash, sharedSecretHashSz);
Expand Down Expand Up @@ -13554,12 +13558,14 @@ int SendKexDhInit(WOLFSSH* ssh)
!defined(WOLFSSH_NO_NISTP384_MLKEM1024_SHA384) || \
!defined(WOLFSSH_NO_CURVE25519_MLKEM768_SHA256)
if (ssh->handshake->useEccMlKem) {
MlKemKey kem = {0};
MlKemKey kem;
word32 length_publickey = 0;
word32 length_privatekey = 0;
int mlKemType = WC_ML_KEM_768;
ret = 0;

WMEMSET(&kem, 0, sizeof(kem));

Comment thread
JacobBarthelmeh marked this conversation as resolved.
Outdated
#ifndef WOLFSSH_NO_NISTP384_MLKEM1024_SHA384
if (ssh->handshake->kexId == ID_NISTP384_MLKEM1024_SHA384) {
mlKemType = WC_ML_KEM_1024;
Expand Down
Loading