mirror of
https://github.com/ARMmbed/mbedtls.git
synced 2025-06-26 15:07:59 +08:00
Only check for certificates if it is supported
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com>
This commit is contained in:
parent
3ead04a12d
commit
58535da8d0
@ -654,6 +654,7 @@ static int ssl_check_key_curve(mbedtls_pk_context *pk,
|
|||||||
* Try picking a certificate for this ciphersuite,
|
* Try picking a certificate for this ciphersuite,
|
||||||
* return 0 on success and -1 on failure.
|
* return 0 on success and -1 on failure.
|
||||||
*/
|
*/
|
||||||
|
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
||||||
MBEDTLS_CHECK_RETURN_CRITICAL
|
MBEDTLS_CHECK_RETURN_CRITICAL
|
||||||
static int ssl_pick_cert(mbedtls_ssl_context *ssl,
|
static int ssl_pick_cert(mbedtls_ssl_context *ssl,
|
||||||
const mbedtls_ssl_ciphersuite_t *ciphersuite_info)
|
const mbedtls_ssl_ciphersuite_t *ciphersuite_info)
|
||||||
@ -744,6 +745,8 @@ static int ssl_pick_cert(mbedtls_ssl_context *ssl,
|
|||||||
|
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
|
||||||
|
|
||||||
#endif /* MBEDTLS_X509_CRT_PARSE_C */
|
#endif /* MBEDTLS_X509_CRT_PARSE_C */
|
||||||
|
|
||||||
/*
|
/*
|
||||||
@ -806,6 +809,8 @@ static int ssl_ciphersuite_match(mbedtls_ssl_context *ssl, int suite_id,
|
|||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
||||||
|
|
||||||
#if defined(MBEDTLS_X509_CRT_PARSE_C)
|
#if defined(MBEDTLS_X509_CRT_PARSE_C)
|
||||||
/*
|
/*
|
||||||
* Final check: if ciphersuite requires us to have a
|
* Final check: if ciphersuite requires us to have a
|
||||||
@ -821,7 +826,6 @@ static int ssl_ciphersuite_match(mbedtls_ssl_context *ssl, int suite_id,
|
|||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
|
|
||||||
/* If the ciphersuite requires signing, check whether
|
/* If the ciphersuite requires signing, check whether
|
||||||
* a suitable hash algorithm is present. */
|
* a suitable hash algorithm is present. */
|
||||||
sig_type = mbedtls_ssl_get_ciphersuite_sig_alg(suite_info);
|
sig_type = mbedtls_ssl_get_ciphersuite_sig_alg(suite_info);
|
||||||
|
@ -315,6 +315,7 @@ uint16_t ssl_sig_algs_for_test[] = {
|
|||||||
};
|
};
|
||||||
#endif /* MBEDTLS_X509_CRT_PARSE_C */
|
#endif /* MBEDTLS_X509_CRT_PARSE_C */
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED)
|
||||||
#if defined(MBEDTLS_X509_CRT_PARSE_C)
|
#if defined(MBEDTLS_X509_CRT_PARSE_C)
|
||||||
/** Functionally equivalent to mbedtls_x509_crt_verify_info, see that function
|
/** Functionally equivalent to mbedtls_x509_crt_verify_info, see that function
|
||||||
* for more info.
|
* for more info.
|
||||||
@ -352,7 +353,6 @@ static int x509_crt_verify_info(char *buf, size_t size, const char *prefix,
|
|||||||
}
|
}
|
||||||
#endif /* MBEDTLS_X509_CRT_PARSE_C */
|
#endif /* MBEDTLS_X509_CRT_PARSE_C */
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED)
|
|
||||||
static void mbedtls_print_supported_sig_algs(void)
|
static void mbedtls_print_supported_sig_algs(void)
|
||||||
{
|
{
|
||||||
mbedtls_printf("supported signature algorithms:\n");
|
mbedtls_printf("supported signature algorithms:\n");
|
||||||
|
Loading…
x
Reference in New Issue
Block a user