1
10
13
14
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
91
92
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
122
123
124
125
126
127
128
129
...
...
...
#define NX_SECURE_SOURCE_CODE
#include "nx_secure_tls.h"
#if (NX_SECURE_TLS_TLS_1_3_ENABLED)
extern NX_SECURE_TLS_ECC _nx_secure_tls_ecc_info;
#endif
...
...
#if (NX_SECURE_TLS_TLS_1_3_ENABLED)
UINT _nx_secure_tls_1_3_crypto_init(NX_SECURE_TLS_SESSION *tls_session)
{
UINT status = NX_NOT_SUCCESSFUL;
NX_SECURE_TLS_ECDHE_HANDSHAKE_DATA *ecdhe_data;
UINT length;
UINT i;
NX_SECURE_TLS_ECC *ecc_info;
if (tls_session == NX_NULL)
{
return(NX_PTR_ERROR);
}if (tls_session == NX_NULL) { ... }
/* ... */
ecc_info = &(tls_session -> nx_secure_tls_ecc);
for (i = 0; i < ecc_info -> nx_secure_tls_ecc_supported_groups_count; i++)
{
ecdhe_data = &tls_session -> nx_secure_tls_key_material.nx_secure_tls_ecc_key_data[i];
ecdhe_data->nx_secure_tls_ecdhe_named_curve = ecc_info -> nx_secure_tls_ecc_supported_groups[i];
length = sizeof(ecdhe_data->nx_secure_tls_ecdhe_public_key);
status = _nx_secure_tls_ecc_generate_keys(tls_session, ecdhe_data -> nx_secure_tls_ecdhe_named_curve, NX_FALSE,
ecdhe_data->nx_secure_tls_ecdhe_public_key, &length, ecdhe_data);
ecdhe_data->nx_secure_tls_ecdhe_public_key_length = (USHORT)length;
if (status != NX_SUCCESS)
{
return(status);
}if (status != NX_SUCCESS) { ... }
}for (i = 0; i < ecc_info -> nx_secure_tls_ecc_supported_groups_count; i++) { ... }
return(status);
}_nx_secure_tls_1_3_crypto_init (NX_SECURE_TLS_SESSION *tls_session) { ... }
/* ... */
...#endif