1
0
mirror of https://github.com/Mbed-TLS/mbedtls.git synced 2025-07-28 00:21:48 +03:00

Rename psa_status_to_mbedtls->ssl_psa_status_to_mbedtls and add conversion for PSA_ERROR_INVALID_SIGNATURE

Signed-off-by: Przemyslaw Stekiel <przemyslaw.stekiel@mobica.com>
This commit is contained in:
Przemyslaw Stekiel
2022-01-31 09:18:07 +01:00
parent 2cb59df939
commit 89dad93a78
5 changed files with 35 additions and 33 deletions

View File

@ -744,26 +744,26 @@ int mbedtls_ssl_encrypt_buf( mbedtls_ssl_context *ssl,
transform->psa_key_enc, transform->psa_alg );
if( status != PSA_SUCCESS )
return( psa_status_to_mbedtls( status ) );
return( ssl_psa_status_to_mbedtls( status ) );
status = psa_cipher_set_iv( &cipher_op, transform->iv_enc, transform->ivlen );
if( status != PSA_SUCCESS )
return( psa_status_to_mbedtls( status ) );
return( ssl_psa_status_to_mbedtls( status ) );
status = psa_cipher_update( &cipher_op,
data, rec->data_len,
data, rec->data_len, &olen );
if( status != PSA_SUCCESS )
return( psa_status_to_mbedtls( status ) );
return( ssl_psa_status_to_mbedtls( status ) );
status = psa_cipher_finish( &cipher_op,
data + olen, rec->data_len - olen,
&part_len );
if( status != PSA_SUCCESS )
return( psa_status_to_mbedtls( status ) );
return( ssl_psa_status_to_mbedtls( status ) );
olen += part_len;
} else {
@ -872,7 +872,7 @@ int mbedtls_ssl_encrypt_buf( mbedtls_ssl_context *ssl,
&rec->data_len );
if( status != PSA_SUCCESS )
return( psa_status_to_mbedtls( status ) );
return( ssl_psa_status_to_mbedtls( status ) );
#else
if( ( ret = mbedtls_cipher_auth_encrypt_ext( &transform->cipher_ctx_enc,
iv, transform->ivlen,
@ -986,26 +986,26 @@ int mbedtls_ssl_encrypt_buf( mbedtls_ssl_context *ssl,
transform->psa_key_enc, transform->psa_alg );
if( status != PSA_SUCCESS )
return( psa_status_to_mbedtls( status ) );
return( ssl_psa_status_to_mbedtls( status ) );
status = psa_cipher_set_iv( &cipher_op, transform->iv_enc, transform->ivlen );
if( status != PSA_SUCCESS )
return( psa_status_to_mbedtls( status ) );
return( ssl_psa_status_to_mbedtls( status ) );
status = psa_cipher_update( &cipher_op,
data, rec->data_len,
data, rec->data_len, &olen );
if( status != PSA_SUCCESS )
return( psa_status_to_mbedtls( status ) );
return( ssl_psa_status_to_mbedtls( status ) );
status = psa_cipher_finish( &cipher_op,
data + olen, rec->data_len - olen,
&part_len );
if( status != PSA_SUCCESS )
return( psa_status_to_mbedtls( status ) );
return( ssl_psa_status_to_mbedtls( status ) );
olen += part_len;
#else
@ -1177,26 +1177,26 @@ int mbedtls_ssl_decrypt_buf( mbedtls_ssl_context const *ssl,
transform->psa_key_dec, transform->psa_alg );
if( status != PSA_SUCCESS )
return( psa_status_to_mbedtls( status ) );
return( ssl_psa_status_to_mbedtls( status ) );
status = psa_cipher_set_iv( &cipher_op, transform->iv_dec, transform->ivlen );
if( status != PSA_SUCCESS )
return( psa_status_to_mbedtls( status ) );
return( ssl_psa_status_to_mbedtls( status ) );
status = psa_cipher_update( &cipher_op,
data, rec->data_len,
data, rec->data_len, &olen );
if( status != PSA_SUCCESS )
return( psa_status_to_mbedtls( status ) );
return( ssl_psa_status_to_mbedtls( status ) );
status = psa_cipher_finish( &cipher_op,
data + olen, rec->data_len - olen,
&part_len );
if( status != PSA_SUCCESS )
return( psa_status_to_mbedtls( status ) );
return( ssl_psa_status_to_mbedtls( status ) );
olen += part_len;
} else {
@ -1325,7 +1325,7 @@ int mbedtls_ssl_decrypt_buf( mbedtls_ssl_context const *ssl,
&olen );
if( status != PSA_SUCCESS )
return( psa_status_to_mbedtls( status ) );
return( ssl_psa_status_to_mbedtls( status ) );
#else
if( ( ret = mbedtls_cipher_auth_decrypt_ext( &transform->cipher_ctx_dec,
iv, transform->ivlen,
@ -1512,26 +1512,26 @@ int mbedtls_ssl_decrypt_buf( mbedtls_ssl_context const *ssl,
transform->psa_key_dec, transform->psa_alg );
if( status != PSA_SUCCESS )
return( psa_status_to_mbedtls( status ) );
return( ssl_psa_status_to_mbedtls( status ) );
status = psa_cipher_set_iv( &cipher_op, transform->iv_dec, transform->ivlen );
if( status != PSA_SUCCESS )
return( psa_status_to_mbedtls( status ) );
return( ssl_psa_status_to_mbedtls( status ) );
status = psa_cipher_update( &cipher_op,
data, rec->data_len,
data, rec->data_len, &olen );
if( status != PSA_SUCCESS )
return( psa_status_to_mbedtls( status ) );
return( ssl_psa_status_to_mbedtls( status ) );
status = psa_cipher_finish( &cipher_op,
data + olen, rec->data_len - olen,
&part_len );
if( status != PSA_SUCCESS )
return( psa_status_to_mbedtls( status ) );
return( ssl_psa_status_to_mbedtls( status ) );
olen += part_len;
#else