cipher_wrap: fix guards for some CCM/GCM functions
Legacy CCM and GCM can work even when AES_C is not defined thanks to the block_cipher module, so we can relax guards in cipher_wrap. Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
This commit is contained in:
parent
8c8b4da3a3
commit
c1c6858bfc
1 changed files with 4 additions and 4 deletions
|
@ -566,14 +566,14 @@ static const mbedtls_cipher_info_t aes_256_xts_info = {
|
||||||
#endif /* MBEDTLS_CIPHER_MODE_XTS */
|
#endif /* MBEDTLS_CIPHER_MODE_XTS */
|
||||||
#endif /* MBEDTLS_AES_C */
|
#endif /* MBEDTLS_AES_C */
|
||||||
|
|
||||||
#if defined(MBEDTLS_GCM_C) && defined(MBEDTLS_AES_C)
|
#if defined(MBEDTLS_GCM_C) && defined(MBEDTLS_CCM_GCM_CAN_AES)
|
||||||
static int gcm_aes_setkey_wrap(void *ctx, const unsigned char *key,
|
static int gcm_aes_setkey_wrap(void *ctx, const unsigned char *key,
|
||||||
unsigned int key_bitlen)
|
unsigned int key_bitlen)
|
||||||
{
|
{
|
||||||
return mbedtls_gcm_setkey((mbedtls_gcm_context *) ctx, MBEDTLS_CIPHER_ID_AES,
|
return mbedtls_gcm_setkey((mbedtls_gcm_context *) ctx, MBEDTLS_CIPHER_ID_AES,
|
||||||
key, key_bitlen);
|
key, key_bitlen);
|
||||||
}
|
}
|
||||||
#endif /* MBEDTLS_GCM_C && MBEDTLS_AES_C */
|
#endif /* MBEDTLS_GCM_C && MBEDTLS_CCM_GCM_CAN_AES */
|
||||||
|
|
||||||
#if defined(MBEDTLS_CIPHER_HAVE_GCM_AES_VIA_LEGACY_OR_USE_PSA)
|
#if defined(MBEDTLS_CIPHER_HAVE_GCM_AES_VIA_LEGACY_OR_USE_PSA)
|
||||||
static const mbedtls_cipher_base_t gcm_aes_info = {
|
static const mbedtls_cipher_base_t gcm_aes_info = {
|
||||||
|
@ -650,14 +650,14 @@ static const mbedtls_cipher_info_t aes_256_gcm_info = {
|
||||||
#endif
|
#endif
|
||||||
#endif /* MBEDTLS_CIPHER_HAVE_GCM_AES_VIA_LEGACY_OR_USE_PSA */
|
#endif /* MBEDTLS_CIPHER_HAVE_GCM_AES_VIA_LEGACY_OR_USE_PSA */
|
||||||
|
|
||||||
#if defined(MBEDTLS_CCM_C) && defined(MBEDTLS_AES_C)
|
#if defined(MBEDTLS_CCM_C) && defined(MBEDTLS_CCM_GCM_CAN_AES)
|
||||||
static int ccm_aes_setkey_wrap(void *ctx, const unsigned char *key,
|
static int ccm_aes_setkey_wrap(void *ctx, const unsigned char *key,
|
||||||
unsigned int key_bitlen)
|
unsigned int key_bitlen)
|
||||||
{
|
{
|
||||||
return mbedtls_ccm_setkey((mbedtls_ccm_context *) ctx, MBEDTLS_CIPHER_ID_AES,
|
return mbedtls_ccm_setkey((mbedtls_ccm_context *) ctx, MBEDTLS_CIPHER_ID_AES,
|
||||||
key, key_bitlen);
|
key, key_bitlen);
|
||||||
}
|
}
|
||||||
#endif /* MBEDTLS_CCM_C && MBEDTLS_AES_C */
|
#endif /* MBEDTLS_CCM_C && MBEDTLS_CCM_GCM_CAN_AES */
|
||||||
|
|
||||||
#if defined(MBEDTLS_CIPHER_HAVE_CCM_AES_VIA_LEGACY_OR_USE_PSA)
|
#if defined(MBEDTLS_CIPHER_HAVE_CCM_AES_VIA_LEGACY_OR_USE_PSA)
|
||||||
static const mbedtls_cipher_base_t ccm_aes_info = {
|
static const mbedtls_cipher_base_t ccm_aes_info = {
|
||||||
|
|
Loading…
Reference in a new issue