diff --git a/subsys/net/lib/websocket/websocket.c b/subsys/net/lib/websocket/websocket.c index 12eddd04f4b..e4e81995090 100644 --- a/subsys/net/lib/websocket/websocket.c +++ b/subsys/net/lib/websocket/websocket.c @@ -39,6 +39,7 @@ LOG_MODULE_REGISTER(net_websocket, CONFIG_NET_WEBSOCKET_LOG_LEVEL); #include "net_private.h" #include "sockets_internal.h" #include "websocket_internal.h" +#include /* If you want to see the data that is being sent or received, * then you can enable debugging and set the following variables to 1. @@ -278,8 +279,10 @@ int websocket_connect(int sock, struct websocket_request *wreq, ctx->http_cb = wreq->http_cb; ctx->is_client = 1; - mbedtls_sha1((const unsigned char *)&rnd_value, sizeof(rnd_value), - sec_accept_key); + // mbedtls_sha1((const unsigned char *)&rnd_value, sizeof(rnd_value), + // sec_accept_key); + psa_hash_compute(PSA_ALG_SHA_1, (const uint8_t *)&rnd_value, sizeof(rnd_value), + sec_accept_key, sizeof(sec_accept_key), &olen); ret = base64_encode(sec_ws_key + sizeof("Sec-Websocket-Key: ") - 1, sizeof(sec_ws_key) - @@ -342,7 +345,9 @@ int websocket_connect(int sock, struct websocket_request *wreq, strncpy(key_accept + key_len, WS_MAGIC, olen); /* This SHA-1 value is then checked when we receive the response */ - mbedtls_sha1(key_accept, olen + key_len, sec_accept_key); + // mbedtls_sha1(key_accept, olen + key_len, sec_accept_key); + psa_hash_compute(PSA_ALG_SHA_1, (const uint8_t *)&key_accept, olen + key_len, + sec_accept_key, sizeof(sec_accept_key), &olen); ret = http_client_req(sock, &req, timeout, ctx); if (ret < 0) {