Use plain memset() for public data in ssl_tls.c
- out_ctr is public because it's transmited over the wire in DTLS (and in TLS
it can be inferred by a passive network attacker just by counting records).
- handshake mask is not a secret because it can be inferred by a passive
network attacker just logging record sequence number seen so far.
diff --git a/library/ssl_tls.c b/library/ssl_tls.c
index e9102a7..46ef06b 100644
--- a/library/ssl_tls.c
+++ b/library/ssl_tls.c
@@ -4712,7 +4712,7 @@
mask[last_byte_idx] |= 1 << ( 8 - end_bits );
}
- mbedtls_platform_memset( mask + offset / 8, 0xFF, len / 8 );
+ memset( mask + offset / 8, 0xFF, len / 8 );
}
/*
@@ -7799,7 +7799,7 @@
memcpy( ssl->handshake->alt_out_ctr, ssl->cur_out_ctr, 8 );
/* Set sequence_number to zero */
- mbedtls_platform_memset( ssl->cur_out_ctr + 2, 0, 6 );
+ memset( ssl->cur_out_ctr + 2, 0, 6 );
/* Increment epoch */
for( i = 2; i > 0; i-- )
@@ -8379,7 +8379,7 @@
ssl->split_done = 0;
#endif
- mbedtls_platform_memset( ssl->cur_out_ctr, 0, sizeof( ssl->cur_out_ctr ) );
+ memset( ssl->cur_out_ctr, 0, sizeof( ssl->cur_out_ctr ) );
ssl->transform_in = NULL;
ssl->transform_out = NULL;