mirror of
https://github.com/ARMmbed/mbedtls.git
synced 2025-05-10 00:49:04 +08:00
ssl_tls: remove usage of DHE-PSK
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
This commit is contained in:
parent
64d264d2e6
commit
48659a1f9c
@ -669,10 +669,6 @@ union mbedtls_ssl_premaster_secret {
|
|||||||
#if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)
|
#if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)
|
||||||
unsigned char _pms_psk[4 + 2 * MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 2 */
|
unsigned char _pms_psk[4 + 2 * MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 2 */
|
||||||
#endif
|
#endif
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)
|
|
||||||
unsigned char _pms_dhe_psk[4 + MBEDTLS_MPI_MAX_SIZE
|
|
||||||
+ MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 3 */
|
|
||||||
#endif
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
|
||||||
unsigned char _pms_ecdhe_psk[4 + MBEDTLS_ECP_MAX_BYTES
|
unsigned char _pms_ecdhe_psk[4 + MBEDTLS_ECP_MAX_BYTES
|
||||||
+ MBEDTLS_PSK_MAX_LEN]; /* RFC 5489 2 */
|
+ MBEDTLS_PSK_MAX_LEN]; /* RFC 5489 2 */
|
||||||
|
@ -7025,7 +7025,6 @@ static int ssl_compute_master(mbedtls_ssl_handshake_params *handshake,
|
|||||||
* length of the other key.
|
* length of the other key.
|
||||||
*/
|
*/
|
||||||
case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
|
case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
|
||||||
case MBEDTLS_KEY_EXCHANGE_DHE_PSK:
|
|
||||||
other_secret_len = MBEDTLS_GET_UINT16_BE(handshake->premaster, 0);
|
other_secret_len = MBEDTLS_GET_UINT16_BE(handshake->premaster, 0);
|
||||||
other_secret = handshake->premaster + 2;
|
other_secret = handshake->premaster + 2;
|
||||||
break;
|
break;
|
||||||
@ -7326,15 +7325,10 @@ int mbedtls_ssl_psk_derive_premaster(mbedtls_ssl_context *ssl, mbedtls_key_excha
|
|||||||
/*
|
/*
|
||||||
* This should never happen because the existence of a PSK is always
|
* This should never happen because the existence of a PSK is always
|
||||||
* checked before calling this function.
|
* checked before calling this function.
|
||||||
*
|
|
||||||
* The exception is opaque DHE-PSK. For DHE-PSK fill premaster with
|
|
||||||
* the shared secret without PSK.
|
|
||||||
*/
|
*/
|
||||||
if (key_ex != MBEDTLS_KEY_EXCHANGE_DHE_PSK) {
|
|
||||||
MBEDTLS_SSL_DEBUG_MSG(1, ("should never happen"));
|
MBEDTLS_SSL_DEBUG_MSG(1, ("should never happen"));
|
||||||
return MBEDTLS_ERR_SSL_INTERNAL_ERROR;
|
return MBEDTLS_ERR_SSL_INTERNAL_ERROR;
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* PMS = struct {
|
* PMS = struct {
|
||||||
@ -7360,24 +7354,6 @@ int mbedtls_ssl_psk_derive_premaster(mbedtls_ssl_context *ssl, mbedtls_key_excha
|
|||||||
p += psk_len;
|
p += psk_len;
|
||||||
} else
|
} else
|
||||||
#endif /* MBEDTLS_KEY_EXCHANGE_PSK_ENABLED */
|
#endif /* MBEDTLS_KEY_EXCHANGE_PSK_ENABLED */
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)
|
|
||||||
if (key_ex == MBEDTLS_KEY_EXCHANGE_DHE_PSK) {
|
|
||||||
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
|
||||||
size_t len;
|
|
||||||
|
|
||||||
/* Write length only when we know the actual value */
|
|
||||||
if ((ret = mbedtls_dhm_calc_secret(&ssl->handshake->dhm_ctx,
|
|
||||||
p + 2, (size_t) (end - (p + 2)), &len,
|
|
||||||
ssl->conf->f_rng, ssl->conf->p_rng)) != 0) {
|
|
||||||
MBEDTLS_SSL_DEBUG_RET(1, "mbedtls_dhm_calc_secret", ret);
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
MBEDTLS_PUT_UINT16_BE(len, p, 0);
|
|
||||||
p += 2 + len;
|
|
||||||
|
|
||||||
MBEDTLS_SSL_DEBUG_MPI(3, "DHM: K ", &ssl->handshake->dhm_ctx.K);
|
|
||||||
} else
|
|
||||||
#endif /* MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED */
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
|
||||||
if (key_ex == MBEDTLS_KEY_EXCHANGE_ECDHE_PSK) {
|
if (key_ex == MBEDTLS_KEY_EXCHANGE_ECDHE_PSK) {
|
||||||
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
||||||
@ -9686,7 +9662,6 @@ int mbedtls_ssl_check_cert_usage(const mbedtls_x509_crt *cert,
|
|||||||
/* Don't use default: we want warnings when adding new values */
|
/* Don't use default: we want warnings when adding new values */
|
||||||
case MBEDTLS_KEY_EXCHANGE_NONE:
|
case MBEDTLS_KEY_EXCHANGE_NONE:
|
||||||
case MBEDTLS_KEY_EXCHANGE_PSK:
|
case MBEDTLS_KEY_EXCHANGE_PSK:
|
||||||
case MBEDTLS_KEY_EXCHANGE_DHE_PSK:
|
|
||||||
case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
|
case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
|
||||||
case MBEDTLS_KEY_EXCHANGE_ECJPAKE:
|
case MBEDTLS_KEY_EXCHANGE_ECJPAKE:
|
||||||
usage = 0;
|
usage = 0;
|
||||||
|
@ -1660,8 +1660,7 @@ static int ssl_parse_server_hello(mbedtls_ssl_context *ssl)
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \
|
#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED)
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)
|
|
||||||
MBEDTLS_CHECK_RETURN_CRITICAL
|
MBEDTLS_CHECK_RETURN_CRITICAL
|
||||||
static int ssl_parse_server_dh_params(mbedtls_ssl_context *ssl,
|
static int ssl_parse_server_dh_params(mbedtls_ssl_context *ssl,
|
||||||
unsigned char **p,
|
unsigned char **p,
|
||||||
@ -1699,8 +1698,7 @@ static int ssl_parse_server_dh_params(mbedtls_ssl_context *ssl,
|
|||||||
|
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
#endif /* MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED ||
|
#endif /* MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED */
|
||||||
MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED */
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_USE_PSA_CRYPTO)
|
#if defined(MBEDTLS_USE_PSA_CRYPTO)
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
|
||||||
@ -2171,7 +2169,6 @@ start_processing:
|
|||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
|
#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
|
||||||
if (ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_PSK ||
|
if (ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_PSK ||
|
||||||
ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_DHE_PSK ||
|
|
||||||
ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_PSK) {
|
ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_PSK) {
|
||||||
if (ssl_parse_server_psk_hint(ssl, &p, end) != 0) {
|
if (ssl_parse_server_psk_hint(ssl, &p, end) != 0) {
|
||||||
MBEDTLS_SSL_DEBUG_MSG(1, ("bad server key exchange message"));
|
MBEDTLS_SSL_DEBUG_MSG(1, ("bad server key exchange message"));
|
||||||
@ -2189,10 +2186,8 @@ start_processing:
|
|||||||
; /* nothing more to do */
|
; /* nothing more to do */
|
||||||
} else
|
} else
|
||||||
#endif /* MBEDTLS_KEY_EXCHANGE_PSK_ENABLED */
|
#endif /* MBEDTLS_KEY_EXCHANGE_PSK_ENABLED */
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \
|
#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED)
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)
|
if (ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_DHE_RSA) {
|
||||||
if (ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_DHE_RSA ||
|
|
||||||
ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_DHE_PSK) {
|
|
||||||
if (ssl_parse_server_dh_params(ssl, &p, end) != 0) {
|
if (ssl_parse_server_dh_params(ssl, &p, end) != 0) {
|
||||||
MBEDTLS_SSL_DEBUG_MSG(1, ("bad server key exchange message"));
|
MBEDTLS_SSL_DEBUG_MSG(1, ("bad server key exchange message"));
|
||||||
mbedtls_ssl_send_alert_message(
|
mbedtls_ssl_send_alert_message(
|
||||||
@ -2202,8 +2197,7 @@ start_processing:
|
|||||||
return MBEDTLS_ERR_SSL_ILLEGAL_PARAMETER;
|
return MBEDTLS_ERR_SSL_ILLEGAL_PARAMETER;
|
||||||
}
|
}
|
||||||
} else
|
} else
|
||||||
#endif /* MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED ||
|
#endif /* MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED */
|
||||||
MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED */
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED) || \
|
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED) || \
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)
|
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)
|
||||||
@ -3043,51 +3037,6 @@ ecdh_calc_secret:
|
|||||||
content_len = 0;
|
content_len = 0;
|
||||||
} else
|
} else
|
||||||
#endif
|
#endif
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)
|
|
||||||
if (ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_DHE_PSK) {
|
|
||||||
/*
|
|
||||||
* ClientDiffieHellmanPublic public (DHM send G^X mod P)
|
|
||||||
*/
|
|
||||||
content_len = mbedtls_dhm_get_len(&ssl->handshake->dhm_ctx);
|
|
||||||
|
|
||||||
if (header_len + 2 + content_len >
|
|
||||||
MBEDTLS_SSL_OUT_CONTENT_LEN) {
|
|
||||||
MBEDTLS_SSL_DEBUG_MSG(1,
|
|
||||||
("psk identity or DHM size too long or SSL buffer too short"));
|
|
||||||
return MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL;
|
|
||||||
}
|
|
||||||
|
|
||||||
ssl->out_msg[header_len++] = MBEDTLS_BYTE_1(content_len);
|
|
||||||
ssl->out_msg[header_len++] = MBEDTLS_BYTE_0(content_len);
|
|
||||||
|
|
||||||
ret = mbedtls_dhm_make_public(&ssl->handshake->dhm_ctx,
|
|
||||||
(int) mbedtls_dhm_get_len(&ssl->handshake->dhm_ctx),
|
|
||||||
&ssl->out_msg[header_len], content_len,
|
|
||||||
ssl->conf->f_rng, ssl->conf->p_rng);
|
|
||||||
if (ret != 0) {
|
|
||||||
MBEDTLS_SSL_DEBUG_RET(1, "mbedtls_dhm_make_public", ret);
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_USE_PSA_CRYPTO)
|
|
||||||
unsigned char *pms = ssl->handshake->premaster;
|
|
||||||
unsigned char *pms_end = pms + sizeof(ssl->handshake->premaster);
|
|
||||||
size_t pms_len;
|
|
||||||
|
|
||||||
/* Write length only when we know the actual value */
|
|
||||||
if ((ret = mbedtls_dhm_calc_secret(&ssl->handshake->dhm_ctx,
|
|
||||||
pms + 2, pms_end - (pms + 2), &pms_len,
|
|
||||||
ssl->conf->f_rng, ssl->conf->p_rng)) != 0) {
|
|
||||||
MBEDTLS_SSL_DEBUG_RET(1, "mbedtls_dhm_calc_secret", ret);
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
MBEDTLS_PUT_UINT16_BE(pms_len, pms, 0);
|
|
||||||
pms += 2 + pms_len;
|
|
||||||
|
|
||||||
MBEDTLS_SSL_DEBUG_MPI(3, "DHM: K ", &ssl->handshake->dhm_ctx.K);
|
|
||||||
#endif
|
|
||||||
} else
|
|
||||||
#endif /* MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED */
|
|
||||||
#if !defined(MBEDTLS_USE_PSA_CRYPTO) && \
|
#if !defined(MBEDTLS_USE_PSA_CRYPTO) && \
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
|
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
|
||||||
if (ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_PSK) {
|
if (ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_PSK) {
|
||||||
|
@ -2887,19 +2887,16 @@ static int ssl_prepare_server_key_exchange(mbedtls_ssl_context *ssl,
|
|||||||
#endif /* MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
|
#endif /* MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* For (EC)DHE key exchanges with PSK, parameters are prefixed by support
|
* For ECDHE key exchanges with PSK, parameters are prefixed by support
|
||||||
* identity hint (RFC 4279, Sec. 3). Until someone needs this feature,
|
* identity hint (RFC 4279, Sec. 3). Until someone needs this feature,
|
||||||
* we use empty support identity hints here.
|
* we use empty support identity hints here.
|
||||||
**/
|
**/
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED) || \
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
|
if (ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_PSK) {
|
||||||
if (ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_DHE_PSK ||
|
|
||||||
ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_PSK) {
|
|
||||||
ssl->out_msg[ssl->out_msglen++] = 0x00;
|
ssl->out_msg[ssl->out_msglen++] = 0x00;
|
||||||
ssl->out_msg[ssl->out_msglen++] = 0x00;
|
ssl->out_msg[ssl->out_msglen++] = 0x00;
|
||||||
}
|
}
|
||||||
#endif /* MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED ||
|
#endif /* MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED */
|
||||||
MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED */
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* - DHE key exchanges
|
* - DHE key exchanges
|
||||||
@ -3375,8 +3372,7 @@ static int ssl_write_server_hello_done(mbedtls_ssl_context *ssl)
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \
|
#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED)
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)
|
|
||||||
MBEDTLS_CHECK_RETURN_CRITICAL
|
MBEDTLS_CHECK_RETURN_CRITICAL
|
||||||
static int ssl_parse_client_dh_public(mbedtls_ssl_context *ssl, unsigned char **p,
|
static int ssl_parse_client_dh_public(mbedtls_ssl_context *ssl, unsigned char **p,
|
||||||
const unsigned char *end)
|
const unsigned char *end)
|
||||||
@ -3411,8 +3407,7 @@ static int ssl_parse_client_dh_public(mbedtls_ssl_context *ssl, unsigned char **
|
|||||||
|
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
#endif /* MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED ||
|
#endif /* MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED */
|
||||||
MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED */
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED)
|
#if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED)
|
||||||
|
|
||||||
@ -3838,48 +3833,6 @@ static int ssl_parse_client_key_exchange(mbedtls_ssl_context *ssl)
|
|||||||
#endif /* !MBEDTLS_USE_PSA_CRYPTO */
|
#endif /* !MBEDTLS_USE_PSA_CRYPTO */
|
||||||
} else
|
} else
|
||||||
#endif /* MBEDTLS_KEY_EXCHANGE_PSK_ENABLED */
|
#endif /* MBEDTLS_KEY_EXCHANGE_PSK_ENABLED */
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)
|
|
||||||
if (ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_DHE_PSK) {
|
|
||||||
if ((ret = ssl_parse_client_psk_identity(ssl, &p, end)) != 0) {
|
|
||||||
MBEDTLS_SSL_DEBUG_RET(1, ("ssl_parse_client_psk_identity"), ret);
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
if ((ret = ssl_parse_client_dh_public(ssl, &p, end)) != 0) {
|
|
||||||
MBEDTLS_SSL_DEBUG_RET(1, ("ssl_parse_client_dh_public"), ret);
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (p != end) {
|
|
||||||
MBEDTLS_SSL_DEBUG_MSG(1, ("bad client key exchange"));
|
|
||||||
return MBEDTLS_ERR_SSL_DECODE_ERROR;
|
|
||||||
}
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_USE_PSA_CRYPTO)
|
|
||||||
unsigned char *pms = ssl->handshake->premaster;
|
|
||||||
unsigned char *pms_end = pms + sizeof(ssl->handshake->premaster);
|
|
||||||
size_t pms_len;
|
|
||||||
|
|
||||||
/* Write length only when we know the actual value */
|
|
||||||
if ((ret = mbedtls_dhm_calc_secret(&ssl->handshake->dhm_ctx,
|
|
||||||
pms + 2, pms_end - (pms + 2), &pms_len,
|
|
||||||
ssl->conf->f_rng, ssl->conf->p_rng)) != 0) {
|
|
||||||
MBEDTLS_SSL_DEBUG_RET(1, "mbedtls_dhm_calc_secret", ret);
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
MBEDTLS_PUT_UINT16_BE(pms_len, pms, 0);
|
|
||||||
pms += 2 + pms_len;
|
|
||||||
|
|
||||||
MBEDTLS_SSL_DEBUG_MPI(3, "DHM: K ", &ssl->handshake->dhm_ctx.K);
|
|
||||||
#else
|
|
||||||
if ((ret = mbedtls_ssl_psk_derive_premaster(ssl,
|
|
||||||
(mbedtls_key_exchange_type_t) ciphersuite_info->
|
|
||||||
key_exchange)) != 0) {
|
|
||||||
MBEDTLS_SSL_DEBUG_RET(1, "mbedtls_ssl_psk_derive_premaster", ret);
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
#endif /* MBEDTLS_USE_PSA_CRYPTO */
|
|
||||||
} else
|
|
||||||
#endif /* MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED */
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
|
||||||
if (ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_PSK) {
|
if (ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_PSK) {
|
||||||
#if defined(MBEDTLS_USE_PSA_CRYPTO)
|
#if defined(MBEDTLS_USE_PSA_CRYPTO)
|
||||||
|
Loading…
x
Reference in New Issue
Block a user