mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-04-15 23:42:41 +00:00
Remove support for RSA-PSK in compat.sh
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
This commit is contained in:
parent
91e7ebebfe
commit
fdf7db019b
@ -369,10 +369,6 @@ add_common_ciphersuites()
|
|||||||
# Based on client's naming convention, all ciphersuite names will be
|
# Based on client's naming convention, all ciphersuite names will be
|
||||||
# translated into another naming format before sent to the client.
|
# translated into another naming format before sent to the client.
|
||||||
#
|
#
|
||||||
# NOTE: for some reason RSA-PSK doesn't work with OpenSSL,
|
|
||||||
# so RSA-PSK ciphersuites need to go in other sections, see
|
|
||||||
# https://github.com/Mbed-TLS/mbedtls/issues/1419
|
|
||||||
#
|
|
||||||
# ChachaPoly suites are here rather than in "common", as they were added in
|
# ChachaPoly suites are here rather than in "common", as they were added in
|
||||||
# GnuTLS in 3.5.0 and the CI only has 3.4.x so far.
|
# GnuTLS in 3.5.0 and the CI only has 3.4.x so far.
|
||||||
add_openssl_ciphersuites()
|
add_openssl_ciphersuites()
|
||||||
@ -624,7 +620,7 @@ setup_arguments()
|
|||||||
M_SERVER_ARGS="server_port=$PORT server_addr=0.0.0.0 force_version=$MODE"
|
M_SERVER_ARGS="server_port=$PORT server_addr=0.0.0.0 force_version=$MODE"
|
||||||
O_SERVER_ARGS="-accept $PORT -cipher ALL,COMPLEMENTOFALL -$O_MODE"
|
O_SERVER_ARGS="-accept $PORT -cipher ALL,COMPLEMENTOFALL -$O_MODE"
|
||||||
G_SERVER_ARGS="-p $PORT --http $G_MODE"
|
G_SERVER_ARGS="-p $PORT --http $G_MODE"
|
||||||
G_SERVER_PRIO="NORMAL:${G_PRIO_CCM}+NULL:+MD5:+PSK:+DHE-PSK:+ECDHE-PSK:+SHA256:+SHA384:+RSA-PSK:-VERS-TLS-ALL:$G_PRIO_MODE"
|
G_SERVER_PRIO="NORMAL:${G_PRIO_CCM}+NULL:+MD5:+PSK:+DHE-PSK:+ECDHE-PSK:+SHA256:+SHA384:-VERS-TLS-ALL:$G_PRIO_MODE"
|
||||||
|
|
||||||
# The default prime for `openssl s_server` depends on the version:
|
# The default prime for `openssl s_server` depends on the version:
|
||||||
# * OpenSSL <= 1.0.2a: 512-bit
|
# * OpenSSL <= 1.0.2a: 512-bit
|
||||||
@ -733,11 +729,9 @@ setup_arguments()
|
|||||||
;;
|
;;
|
||||||
|
|
||||||
"PSK")
|
"PSK")
|
||||||
# give RSA-PSK-capable server a RSA cert
|
M_SERVER_ARGS="$M_SERVER_ARGS psk=6162636465666768696a6b6c6d6e6f70 ca_file=none"
|
||||||
# (should be a separate type, but harder to close with openssl)
|
|
||||||
M_SERVER_ARGS="$M_SERVER_ARGS psk=6162636465666768696a6b6c6d6e6f70 ca_file=none crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key"
|
|
||||||
O_SERVER_ARGS="$O_SERVER_ARGS -psk 6162636465666768696a6b6c6d6e6f70 -nocert"
|
O_SERVER_ARGS="$O_SERVER_ARGS -psk 6162636465666768696a6b6c6d6e6f70 -nocert"
|
||||||
G_SERVER_ARGS="$G_SERVER_ARGS --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --pskpasswd $DATA_FILES_PATH/passwd.psk"
|
G_SERVER_ARGS="$G_SERVER_ARGS --pskpasswd $DATA_FILES_PATH/passwd.psk"
|
||||||
|
|
||||||
M_CLIENT_ARGS="$M_CLIENT_ARGS psk=6162636465666768696a6b6c6d6e6f70 crt_file=none key_file=none"
|
M_CLIENT_ARGS="$M_CLIENT_ARGS psk=6162636465666768696a6b6c6d6e6f70 crt_file=none key_file=none"
|
||||||
O_CLIENT_ARGS="$O_CLIENT_ARGS -psk 6162636465666768696a6b6c6d6e6f70"
|
O_CLIENT_ARGS="$O_CLIENT_ARGS -psk 6162636465666768696a6b6c6d6e6f70"
|
||||||
|
Loading…
x
Reference in New Issue
Block a user