diff options
author | Ilias Apalodimas <ilias.apalodimas@linaro.org> | 2024-11-14 16:29:15 +0200 |
---|---|---|
committer | Tom Rini <trini@konsulko.com> | 2024-11-22 14:40:53 -0600 |
commit | 2cde2f4a0073ac1e4a528a1fab40e3d6c1f4bf29 (patch) | |
tree | d38d0af7700519300866dab39b713ebf99e48ad2 | |
parent | 572b5b0d5a04a255dea7b83d4edfdd71b886f229 (diff) |
net: lwip: provide entropy to MBed TLS in one go
We currently provide entropy to mbedTLS using 8b chunks.
Take into account the 'len' parameter passed by MBed TLS to the entropy
gathering function instead. Note that the current code works because len
is always 128 (defined at compile time), therefore mbedtls_hardware_poll()
is called repeatedly and the buffer is filled correctly. But passing 'len'
to dm_rng_read() is both better and simpler.
Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org>
Suggested-by: Simon Glass <sjg@chromium.org>
Signed-off-by: Ilias Apalodimas <ilias.apalodimas@linaro.org>
Reviewed-by: Simon Glass <sjg@chromium.org>
-rw-r--r-- | net/lwip/wget.c | 6 |
1 files changed, 2 insertions, 4 deletions
diff --git a/net/lwip/wget.c b/net/lwip/wget.c index e85d57bc1dd..062aa7c44f0 100644 --- a/net/lwip/wget.c +++ b/net/lwip/wget.c @@ -42,7 +42,6 @@ int mbedtls_hardware_poll(void *data, unsigned char *output, size_t len, size_t *olen) { struct udevice *dev; - u64 rng = 0; int ret; *olen = 0; @@ -52,12 +51,11 @@ int mbedtls_hardware_poll(void *data, unsigned char *output, size_t len, log_err("Failed to get an rng: %d\n", ret); return ret; } - ret = dm_rng_read(dev, &rng, sizeof(rng)); + ret = dm_rng_read(dev, output, len); if (ret) return ret; - memcpy(output, &rng, len); - *olen = sizeof(rng); + *olen = len; return 0; } |