Remove code for MBEDTLS_USE_PSA_CRYPTO disabled in ssl-opt.sh
Now that MBEDTLS_USE_PSA_CRYPTO is always on, remove code that handles the
case when it's disabled.
Also this is a step towards no longer expecting it to be reported by
query_compile_time_config.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
diff --git a/tests/ssl-opt.sh b/tests/ssl-opt.sh
index f8a3500..dc0b324 100755
--- a/tests/ssl-opt.sh
+++ b/tests/ssl-opt.sh
@@ -422,29 +422,16 @@
requires_cipher_enabled() {
KEY_TYPE=$1
MODE=${2:-}
- if is_config_enabled MBEDTLS_USE_PSA_CRYPTO; then
- case "$KEY_TYPE" in
- CHACHA20)
- requires_config_enabled PSA_WANT_ALG_CHACHA20_POLY1305
- requires_config_enabled PSA_WANT_KEY_TYPE_CHACHA20
- ;;
- *)
- requires_config_enabled PSA_WANT_ALG_${MODE}
- requires_config_enabled PSA_WANT_KEY_TYPE_${KEY_TYPE}
- ;;
- esac
- else
- case "$KEY_TYPE" in
- CHACHA20)
- requires_config_enabled MBEDTLS_CHACHA20_C
- requires_config_enabled MBEDTLS_CHACHAPOLY_C
- ;;
- *)
- requires_config_enabled MBEDTLS_${MODE}_C
- requires_config_enabled MBEDTLS_${KEY_TYPE}_C
- ;;
- esac
- fi
+ case "$KEY_TYPE" in
+ CHACHA20)
+ requires_config_enabled PSA_WANT_ALG_CHACHA20_POLY1305
+ requires_config_enabled PSA_WANT_KEY_TYPE_CHACHA20
+ ;;
+ *)
+ requires_config_enabled PSA_WANT_ALG_${MODE}
+ requires_config_enabled PSA_WANT_KEY_TYPE_${KEY_TYPE}
+ ;;
+ esac
}
# Automatically detect required features based on command line parameters.
@@ -665,20 +652,7 @@
check_for_hash_alg()
{
CURR_ALG="INVALID";
- USE_PSA="NO"
- if is_config_enabled "MBEDTLS_USE_PSA_CRYPTO"; then
- USE_PSA="YES";
- fi
- if [ $USE_PSA = "YES" ]; then
- CURR_ALG=PSA_WANT_ALG_${1}
- else
- CURR_ALG=MBEDTLS_${1}_C
- # Remove the second underscore to match MBEDTLS_* naming convention
- # MD5 is an exception to this convention
- if [ "${1}" != "MD5" ]; then
- CURR_ALG=$(echo "$CURR_ALG" | sed 's/_//2')
- fi
- fi
+ CURR_ALG=PSA_WANT_ALG_${1}
case $CONFIGS_ENABLED in
*" $CURR_ALG"[\ =]*)
@@ -728,11 +702,7 @@
requires_pk_alg() {
case $1 in
ECDSA)
- if is_config_enabled MBEDTLS_USE_PSA_CRYPTO; then
- requires_config_enabled PSA_WANT_ALG_ECDSA
- else
- requires_config_enabled MBEDTLS_ECDSA_C
- fi
+ requires_config_enabled PSA_WANT_ALG_ECDSA
;;
*)
echo "Unknown/unimplemented case $1 in requires_pk_alg"
@@ -1362,10 +1332,7 @@
*) echo "Bad parameter 1 to set_maybe_calc_verify: $1"; exit 1;;
esac
esac
- case $CONFIGS_ENABLED in
- *\ MBEDTLS_USE_PSA_CRYPTO\ *) maybe_calc_verify="PSA calc verify";;
- *) maybe_calc_verify="<= calc verify";;
- esac
+ maybe_calc_verify="PSA calc verify"
}
# Compare file content
@@ -1874,7 +1841,6 @@
}
run_test_psa() {
- requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
set_maybe_calc_verify none
run_test "PSA-supported ciphersuite: $1" \
"$P_SRV debug_level=3 force_version=tls12" \
@@ -1893,7 +1859,6 @@
}
run_test_psa_force_curve() {
- requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
set_maybe_calc_verify none
run_test "PSA - ECDH with $1" \
"$P_SRV debug_level=4 force_version=tls12 groups=$1" \