mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-07-30 22:43:08 +03:00
initial remove of mbedtls_ssl_conf_rng
Signed-off-by: Ben Taylor <ben.taylor@linaro.org>
This commit is contained in:
@ -2060,17 +2060,6 @@ void mbedtls_ssl_conf_verify(mbedtls_ssl_config *conf,
|
|||||||
void *p_vrfy);
|
void *p_vrfy);
|
||||||
#endif /* MBEDTLS_X509_CRT_PARSE_C */
|
#endif /* MBEDTLS_X509_CRT_PARSE_C */
|
||||||
|
|
||||||
/**
|
|
||||||
* \brief Set the random number generator callback
|
|
||||||
*
|
|
||||||
* \param conf SSL configuration
|
|
||||||
* \param f_rng RNG function (mandatory)
|
|
||||||
* \param p_rng RNG parameter
|
|
||||||
*/
|
|
||||||
void mbedtls_ssl_conf_rng(mbedtls_ssl_config *conf,
|
|
||||||
int (*f_rng)(void *, unsigned char *, size_t),
|
|
||||||
void *p_rng);
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \brief Set the debug callback
|
* \brief Set the debug callback
|
||||||
*
|
*
|
||||||
|
@ -1526,14 +1526,6 @@ void mbedtls_ssl_conf_verify(mbedtls_ssl_config *conf,
|
|||||||
}
|
}
|
||||||
#endif /* MBEDTLS_X509_CRT_PARSE_C */
|
#endif /* MBEDTLS_X509_CRT_PARSE_C */
|
||||||
|
|
||||||
void mbedtls_ssl_conf_rng(mbedtls_ssl_config *conf,
|
|
||||||
int (*f_rng)(void *, unsigned char *, size_t),
|
|
||||||
void *p_rng)
|
|
||||||
{
|
|
||||||
conf->f_rng = f_rng;
|
|
||||||
conf->p_rng = p_rng;
|
|
||||||
}
|
|
||||||
|
|
||||||
void mbedtls_ssl_conf_dbg(mbedtls_ssl_config *conf,
|
void mbedtls_ssl_conf_dbg(mbedtls_ssl_config *conf,
|
||||||
void (*f_dbg)(void *, int, const char *, int, const char *),
|
void (*f_dbg)(void *, int, const char *, int, const char *),
|
||||||
void *p_dbg)
|
void *p_dbg)
|
||||||
|
@ -142,7 +142,6 @@ int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size)
|
|||||||
// mbedtls_ssl_conf_cert_profile, mbedtls_ssl_conf_sig_hashes
|
// mbedtls_ssl_conf_cert_profile, mbedtls_ssl_conf_sig_hashes
|
||||||
|
|
||||||
srand(1);
|
srand(1);
|
||||||
mbedtls_ssl_conf_rng(&conf, dummy_random, &ctr_drbg);
|
|
||||||
|
|
||||||
if (mbedtls_ssl_setup(&ssl, &conf) != 0) {
|
if (mbedtls_ssl_setup(&ssl, &conf) != 0) {
|
||||||
goto exit;
|
goto exit;
|
||||||
|
@ -85,7 +85,6 @@ int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size)
|
|||||||
mbedtls_ssl_conf_ca_chain(&conf, &cacert, NULL);
|
mbedtls_ssl_conf_ca_chain(&conf, &cacert, NULL);
|
||||||
#endif
|
#endif
|
||||||
mbedtls_ssl_conf_authmode(&conf, MBEDTLS_SSL_VERIFY_NONE);
|
mbedtls_ssl_conf_authmode(&conf, MBEDTLS_SSL_VERIFY_NONE);
|
||||||
mbedtls_ssl_conf_rng(&conf, dummy_random, &ctr_drbg);
|
|
||||||
|
|
||||||
if (mbedtls_ssl_setup(&ssl, &conf) != 0) {
|
if (mbedtls_ssl_setup(&ssl, &conf) != 0) {
|
||||||
goto exit;
|
goto exit;
|
||||||
|
@ -100,7 +100,6 @@ int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size)
|
|||||||
|
|
||||||
|
|
||||||
srand(1);
|
srand(1);
|
||||||
mbedtls_ssl_conf_rng(&conf, dummy_random, &ctr_drbg);
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
|
#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
|
||||||
mbedtls_ssl_conf_ca_chain(&conf, srvcert.next, NULL);
|
mbedtls_ssl_conf_ca_chain(&conf, srvcert.next, NULL);
|
||||||
|
@ -113,7 +113,6 @@ int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size)
|
|||||||
}
|
}
|
||||||
|
|
||||||
srand(1);
|
srand(1);
|
||||||
mbedtls_ssl_conf_rng(&conf, dummy_random, &ctr_drbg);
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
|
#if defined(MBEDTLS_X509_CRT_PARSE_C) && defined(MBEDTLS_PEM_PARSE_C)
|
||||||
mbedtls_ssl_conf_ca_chain(&conf, srvcert.next, NULL);
|
mbedtls_ssl_conf_ca_chain(&conf, srvcert.next, NULL);
|
||||||
|
@ -169,7 +169,6 @@ int main(int argc, char *argv[])
|
|||||||
* Production code should set a proper ca chain and use REQUIRED. */
|
* Production code should set a proper ca chain and use REQUIRED. */
|
||||||
mbedtls_ssl_conf_authmode(&conf, MBEDTLS_SSL_VERIFY_OPTIONAL);
|
mbedtls_ssl_conf_authmode(&conf, MBEDTLS_SSL_VERIFY_OPTIONAL);
|
||||||
mbedtls_ssl_conf_ca_chain(&conf, &cacert, NULL);
|
mbedtls_ssl_conf_ca_chain(&conf, &cacert, NULL);
|
||||||
mbedtls_ssl_conf_rng(&conf, mbedtls_ctr_drbg_random, &ctr_drbg);
|
|
||||||
mbedtls_ssl_conf_dbg(&conf, my_debug, stdout);
|
mbedtls_ssl_conf_dbg(&conf, my_debug, stdout);
|
||||||
mbedtls_ssl_conf_read_timeout(&conf, READ_TIMEOUT_MS);
|
mbedtls_ssl_conf_read_timeout(&conf, READ_TIMEOUT_MS);
|
||||||
|
|
||||||
|
@ -200,7 +200,6 @@ int main(void)
|
|||||||
goto exit;
|
goto exit;
|
||||||
}
|
}
|
||||||
|
|
||||||
mbedtls_ssl_conf_rng(&conf, mbedtls_ctr_drbg_random, &ctr_drbg);
|
|
||||||
mbedtls_ssl_conf_dbg(&conf, my_debug, stdout);
|
mbedtls_ssl_conf_dbg(&conf, my_debug, stdout);
|
||||||
mbedtls_ssl_conf_read_timeout(&conf, READ_TIMEOUT_MS);
|
mbedtls_ssl_conf_read_timeout(&conf, READ_TIMEOUT_MS);
|
||||||
|
|
||||||
|
@ -187,8 +187,6 @@ int main(void)
|
|||||||
goto exit;
|
goto exit;
|
||||||
}
|
}
|
||||||
|
|
||||||
mbedtls_ssl_conf_rng(&conf, mbedtls_ctr_drbg_random, &ctr_drbg);
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
|
#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
|
||||||
mbedtls_ssl_conf_psk(&conf, psk, sizeof(psk),
|
mbedtls_ssl_conf_psk(&conf, psk, sizeof(psk),
|
||||||
(const unsigned char *) psk_id, sizeof(psk_id) - 1);
|
(const unsigned char *) psk_id, sizeof(psk_id) - 1);
|
||||||
|
@ -150,7 +150,6 @@ int main(void)
|
|||||||
* but makes interop easier in this simplified example */
|
* but makes interop easier in this simplified example */
|
||||||
mbedtls_ssl_conf_authmode(&conf, MBEDTLS_SSL_VERIFY_OPTIONAL);
|
mbedtls_ssl_conf_authmode(&conf, MBEDTLS_SSL_VERIFY_OPTIONAL);
|
||||||
mbedtls_ssl_conf_ca_chain(&conf, &cacert, NULL);
|
mbedtls_ssl_conf_ca_chain(&conf, &cacert, NULL);
|
||||||
mbedtls_ssl_conf_rng(&conf, mbedtls_ctr_drbg_random, &ctr_drbg);
|
|
||||||
mbedtls_ssl_conf_dbg(&conf, my_debug, stdout);
|
mbedtls_ssl_conf_dbg(&conf, my_debug, stdout);
|
||||||
|
|
||||||
if ((ret = mbedtls_ssl_setup(&ssl, &conf)) != 0) {
|
if ((ret = mbedtls_ssl_setup(&ssl, &conf)) != 0) {
|
||||||
|
@ -1906,7 +1906,6 @@ usage:
|
|||||||
#endif
|
#endif
|
||||||
#endif /* MBEDTLS_HAVE_TIME */
|
#endif /* MBEDTLS_HAVE_TIME */
|
||||||
}
|
}
|
||||||
mbedtls_ssl_conf_rng(&conf, rng_get, &rng);
|
|
||||||
mbedtls_ssl_conf_dbg(&conf, my_debug, stdout);
|
mbedtls_ssl_conf_dbg(&conf, my_debug, stdout);
|
||||||
|
|
||||||
mbedtls_ssl_conf_read_timeout(&conf, opt.read_timeout);
|
mbedtls_ssl_conf_read_timeout(&conf, opt.read_timeout);
|
||||||
|
@ -160,7 +160,6 @@ int main(void)
|
|||||||
goto exit;
|
goto exit;
|
||||||
}
|
}
|
||||||
|
|
||||||
mbedtls_ssl_conf_rng(&conf, mbedtls_ctr_drbg_random, &ctr_drbg);
|
|
||||||
mbedtls_ssl_conf_dbg(&conf, my_debug, stdout);
|
mbedtls_ssl_conf_dbg(&conf, my_debug, stdout);
|
||||||
|
|
||||||
mbedtls_ssl_conf_ca_chain(&conf, srvcert.next, NULL);
|
mbedtls_ssl_conf_ca_chain(&conf, srvcert.next, NULL);
|
||||||
|
@ -571,7 +571,6 @@ usage:
|
|||||||
* but makes interop easier in this simplified example */
|
* but makes interop easier in this simplified example */
|
||||||
mbedtls_ssl_conf_authmode(&conf, MBEDTLS_SSL_VERIFY_OPTIONAL);
|
mbedtls_ssl_conf_authmode(&conf, MBEDTLS_SSL_VERIFY_OPTIONAL);
|
||||||
|
|
||||||
mbedtls_ssl_conf_rng(&conf, mbedtls_ctr_drbg_random, &ctr_drbg);
|
|
||||||
mbedtls_ssl_conf_dbg(&conf, my_debug, stdout);
|
mbedtls_ssl_conf_dbg(&conf, my_debug, stdout);
|
||||||
|
|
||||||
if (opt.force_ciphersuite[0] != DFL_FORCE_CIPHER) {
|
if (opt.force_ciphersuite[0] != DFL_FORCE_CIPHER) {
|
||||||
|
@ -401,7 +401,6 @@ int main(void)
|
|||||||
goto exit;
|
goto exit;
|
||||||
}
|
}
|
||||||
|
|
||||||
mbedtls_ssl_conf_rng(&conf, mbedtls_ctr_drbg_random, &ctr_drbg);
|
|
||||||
mbedtls_ssl_conf_dbg(&conf, my_mutexed_debug, stdout);
|
mbedtls_ssl_conf_dbg(&conf, my_mutexed_debug, stdout);
|
||||||
|
|
||||||
/* mbedtls_ssl_cache_get() and mbedtls_ssl_cache_set() are thread-safe if
|
/* mbedtls_ssl_cache_get() and mbedtls_ssl_cache_set() are thread-safe if
|
||||||
|
@ -179,7 +179,6 @@ int main(void)
|
|||||||
goto exit;
|
goto exit;
|
||||||
}
|
}
|
||||||
|
|
||||||
mbedtls_ssl_conf_rng(&conf, mbedtls_ctr_drbg_random, &ctr_drbg);
|
|
||||||
mbedtls_ssl_conf_dbg(&conf, my_debug, stdout);
|
mbedtls_ssl_conf_dbg(&conf, my_debug, stdout);
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_CACHE_C)
|
#if defined(MBEDTLS_SSL_CACHE_C)
|
||||||
|
@ -2925,7 +2925,6 @@ usage:
|
|||||||
#endif
|
#endif
|
||||||
#endif /* MBEDTLS_HAVE_TIME */
|
#endif /* MBEDTLS_HAVE_TIME */
|
||||||
}
|
}
|
||||||
mbedtls_ssl_conf_rng(&conf, rng_get, &rng);
|
|
||||||
mbedtls_ssl_conf_dbg(&conf, my_debug, stdout);
|
mbedtls_ssl_conf_dbg(&conf, my_debug, stdout);
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_CACHE_C)
|
#if defined(MBEDTLS_SSL_CACHE_C)
|
||||||
|
@ -383,7 +383,6 @@ usage:
|
|||||||
mbedtls_ssl_conf_authmode(&conf, MBEDTLS_SSL_VERIFY_NONE);
|
mbedtls_ssl_conf_authmode(&conf, MBEDTLS_SSL_VERIFY_NONE);
|
||||||
}
|
}
|
||||||
|
|
||||||
mbedtls_ssl_conf_rng(&conf, mbedtls_ctr_drbg_random, &ctr_drbg);
|
|
||||||
mbedtls_ssl_conf_dbg(&conf, my_debug, stdout);
|
mbedtls_ssl_conf_dbg(&conf, my_debug, stdout);
|
||||||
|
|
||||||
if ((ret = mbedtls_ssl_setup(&ssl, &conf)) != 0) {
|
if ((ret = mbedtls_ssl_setup(&ssl, &conf)) != 0) {
|
||||||
|
@ -767,7 +767,6 @@ int mbedtls_test_ssl_endpoint_init(
|
|||||||
|
|
||||||
mbedtls_ssl_init(&(ep->ssl));
|
mbedtls_ssl_init(&(ep->ssl));
|
||||||
mbedtls_ssl_config_init(&(ep->conf));
|
mbedtls_ssl_config_init(&(ep->conf));
|
||||||
mbedtls_ssl_conf_rng(&(ep->conf), mbedtls_test_random, NULL);
|
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_ssl_conf_get_user_data_p(&ep->conf) == NULL);
|
TEST_ASSERT(mbedtls_ssl_conf_get_user_data_p(&ep->conf) == NULL);
|
||||||
TEST_EQUAL(mbedtls_ssl_conf_get_user_data_n(&ep->conf), 0);
|
TEST_EQUAL(mbedtls_ssl_conf_get_user_data_n(&ep->conf), 0);
|
||||||
|
@ -156,7 +156,6 @@ void debug_print_msg_threshold(int threshold, int level, char *file,
|
|||||||
MBEDTLS_SSL_TRANSPORT_STREAM,
|
MBEDTLS_SSL_TRANSPORT_STREAM,
|
||||||
MBEDTLS_SSL_PRESET_DEFAULT),
|
MBEDTLS_SSL_PRESET_DEFAULT),
|
||||||
0);
|
0);
|
||||||
mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL);
|
|
||||||
mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer);
|
mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer);
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
|
TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
|
||||||
@ -194,7 +193,6 @@ void mbedtls_debug_print_ret(char *file, int line, char *text, int value,
|
|||||||
MBEDTLS_SSL_TRANSPORT_STREAM,
|
MBEDTLS_SSL_TRANSPORT_STREAM,
|
||||||
MBEDTLS_SSL_PRESET_DEFAULT),
|
MBEDTLS_SSL_PRESET_DEFAULT),
|
||||||
0);
|
0);
|
||||||
mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL);
|
|
||||||
mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer);
|
mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer);
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
|
TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
|
||||||
@ -229,7 +227,6 @@ void mbedtls_debug_print_buf(char *file, int line, char *text,
|
|||||||
MBEDTLS_SSL_TRANSPORT_STREAM,
|
MBEDTLS_SSL_TRANSPORT_STREAM,
|
||||||
MBEDTLS_SSL_PRESET_DEFAULT),
|
MBEDTLS_SSL_PRESET_DEFAULT),
|
||||||
0);
|
0);
|
||||||
mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL);
|
|
||||||
mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer);
|
mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer);
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
|
TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
|
||||||
@ -267,7 +264,6 @@ void mbedtls_debug_print_crt(char *crt_file, char *file, int line,
|
|||||||
MBEDTLS_SSL_TRANSPORT_STREAM,
|
MBEDTLS_SSL_TRANSPORT_STREAM,
|
||||||
MBEDTLS_SSL_PRESET_DEFAULT),
|
MBEDTLS_SSL_PRESET_DEFAULT),
|
||||||
0);
|
0);
|
||||||
mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL);
|
|
||||||
mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer);
|
mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer);
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
|
TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
|
||||||
@ -306,7 +302,6 @@ void mbedtls_debug_print_mpi(char *value, char *file, int line,
|
|||||||
MBEDTLS_SSL_TRANSPORT_STREAM,
|
MBEDTLS_SSL_TRANSPORT_STREAM,
|
||||||
MBEDTLS_SSL_PRESET_DEFAULT),
|
MBEDTLS_SSL_PRESET_DEFAULT),
|
||||||
0);
|
0);
|
||||||
mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL);
|
|
||||||
mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer);
|
mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer);
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
|
TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
|
||||||
|
@ -1219,7 +1219,6 @@ void ssl_dtls_replay(data_t *prevs, data_t *new, int ret)
|
|||||||
MBEDTLS_SSL_IS_CLIENT,
|
MBEDTLS_SSL_IS_CLIENT,
|
||||||
MBEDTLS_SSL_TRANSPORT_DATAGRAM,
|
MBEDTLS_SSL_TRANSPORT_DATAGRAM,
|
||||||
MBEDTLS_SSL_PRESET_DEFAULT) == 0);
|
MBEDTLS_SSL_PRESET_DEFAULT) == 0);
|
||||||
mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL);
|
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
|
TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
|
||||||
|
|
||||||
@ -3033,7 +3032,6 @@ void conf_version(int endpoint, int transport,
|
|||||||
mbedtls_ssl_conf_transport(&conf, transport);
|
mbedtls_ssl_conf_transport(&conf, transport);
|
||||||
mbedtls_ssl_conf_min_tls_version(&conf, min_tls_version);
|
mbedtls_ssl_conf_min_tls_version(&conf, min_tls_version);
|
||||||
mbedtls_ssl_conf_max_tls_version(&conf, max_tls_version);
|
mbedtls_ssl_conf_max_tls_version(&conf, max_tls_version);
|
||||||
mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL);
|
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == expected_ssl_setup_result);
|
TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == expected_ssl_setup_result);
|
||||||
TEST_EQUAL(mbedtls_ssl_conf_get_endpoint(
|
TEST_EQUAL(mbedtls_ssl_conf_get_endpoint(
|
||||||
@ -3058,7 +3056,6 @@ void conf_group()
|
|||||||
mbedtls_ssl_config conf;
|
mbedtls_ssl_config conf;
|
||||||
mbedtls_ssl_config_init(&conf);
|
mbedtls_ssl_config_init(&conf);
|
||||||
|
|
||||||
mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL);
|
|
||||||
mbedtls_ssl_config_defaults(&conf, MBEDTLS_SSL_IS_CLIENT,
|
mbedtls_ssl_config_defaults(&conf, MBEDTLS_SSL_IS_CLIENT,
|
||||||
MBEDTLS_SSL_TRANSPORT_STREAM,
|
MBEDTLS_SSL_TRANSPORT_STREAM,
|
||||||
MBEDTLS_SSL_PRESET_DEFAULT);
|
MBEDTLS_SSL_PRESET_DEFAULT);
|
||||||
@ -3168,7 +3165,6 @@ void cookie_parsing(data_t *cookie, int exp_ret)
|
|||||||
MBEDTLS_SSL_TRANSPORT_DATAGRAM,
|
MBEDTLS_SSL_TRANSPORT_DATAGRAM,
|
||||||
MBEDTLS_SSL_PRESET_DEFAULT),
|
MBEDTLS_SSL_PRESET_DEFAULT),
|
||||||
0);
|
0);
|
||||||
mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL);
|
|
||||||
|
|
||||||
TEST_EQUAL(mbedtls_ssl_setup(&ssl, &conf), 0);
|
TEST_EQUAL(mbedtls_ssl_setup(&ssl, &conf), 0);
|
||||||
TEST_EQUAL(mbedtls_ssl_check_dtls_clihlo_cookie(&ssl, ssl.cli_id,
|
TEST_EQUAL(mbedtls_ssl_check_dtls_clihlo_cookie(&ssl, ssl.cli_id,
|
||||||
@ -3223,7 +3219,6 @@ void cid_sanity()
|
|||||||
MBEDTLS_SSL_TRANSPORT_STREAM,
|
MBEDTLS_SSL_TRANSPORT_STREAM,
|
||||||
MBEDTLS_SSL_PRESET_DEFAULT)
|
MBEDTLS_SSL_PRESET_DEFAULT)
|
||||||
== 0);
|
== 0);
|
||||||
mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL);
|
|
||||||
|
|
||||||
TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
|
TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
|
||||||
|
|
||||||
@ -3482,7 +3477,6 @@ void ssl_ecjpake_set_password(int use_opaque_arg)
|
|||||||
MBEDTLS_SSL_IS_CLIENT,
|
MBEDTLS_SSL_IS_CLIENT,
|
||||||
MBEDTLS_SSL_TRANSPORT_STREAM,
|
MBEDTLS_SSL_TRANSPORT_STREAM,
|
||||||
MBEDTLS_SSL_PRESET_DEFAULT), 0);
|
MBEDTLS_SSL_PRESET_DEFAULT), 0);
|
||||||
mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL);
|
|
||||||
|
|
||||||
TEST_EQUAL(mbedtls_ssl_setup(&ssl, &conf), 0);
|
TEST_EQUAL(mbedtls_ssl_setup(&ssl, &conf), 0);
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user