mirror of
https://github.com/espressif/esp-idf.git
synced 2025-08-11 21:10:20 +00:00
wpa_supplicant: Support for mbedtls tls handshake
Add support for mbedtls based tls handshake, this removes dependency from internal implementation of EAP client.
This commit is contained in:
@@ -570,12 +570,12 @@ int tlsv1_server_resumed(struct tlsv1_server *conn)
|
||||
|
||||
|
||||
/**
|
||||
* tlsv1_server_get_keys - Get master key and random data from TLS connection
|
||||
* tlsv1_server_get_random - Get random data from TLS connection
|
||||
* @conn: TLSv1 server connection data from tlsv1_server_init()
|
||||
* @keys: Structure of key/random data (filled on success)
|
||||
* @keys: Structure of random data (filled on success)
|
||||
* Returns: 0 on success, -1 on failure
|
||||
*/
|
||||
int tlsv1_server_get_keys(struct tlsv1_server *conn, struct tls_keys *keys)
|
||||
int tlsv1_server_get_random(struct tlsv1_server *conn, struct tls_random *keys)
|
||||
{
|
||||
os_memset(keys, 0, sizeof(*keys));
|
||||
if (conn->state == CLIENT_HELLO)
|
||||
@@ -587,8 +587,6 @@ int tlsv1_server_get_keys(struct tlsv1_server *conn, struct tls_keys *keys)
|
||||
if (conn->state != SERVER_HELLO) {
|
||||
keys->server_random = conn->server_random;
|
||||
keys->server_random_len = TLS_RANDOM_LEN;
|
||||
keys->master_key = conn->master_secret;
|
||||
keys->master_key_len = TLS_MASTER_SECRET_LEN;
|
||||
}
|
||||
|
||||
return 0;
|
||||
|
Reference in New Issue
Block a user