ECDH: Fix Everest x25519 make_public
diff --git a/3rdparty/everest/library/x25519.c b/3rdparty/everest/library/x25519.c
index e5ec2e8..edaf5da 100644
--- a/3rdparty/everest/library/x25519.c
+++ b/3rdparty/everest/library/x25519.c
@@ -152,14 +152,14 @@
                         int( *f_rng )(void *, unsigned char *, size_t),
                         void *p_rng )
 {
+    int ret = 0;
     unsigned char base[MBEDTLS_X25519_KEY_SIZE_BYTES] = { 0 };
 
-    /* CMW: Is it okay that f_rng, p_rng are not used? */
-    (( void )f_rng);
-    (( void )p_rng);
-
     if( ctx == NULL )
-        return(MBEDTLS_ERR_ECP_BAD_INPUT_DATA);
+        return( MBEDTLS_ERR_ECP_BAD_INPUT_DATA );
+
+    if( ( ret = f_rng( p_rng, ctx->our_secret, MBEDTLS_X25519_KEY_SIZE_BYTES ) ) != 0 )
+        return ret;
 
     *olen = 33;
     if( blen < *olen )
@@ -173,7 +173,7 @@
     if( memcmp( buf, base, MBEDTLS_X25519_KEY_SIZE_BYTES ) == 0 )
         return MBEDTLS_ERR_ECP_RANDOM_FAILED;
 
-    return(0);
+    return( ret );
 }
 
 int mbedtls_x25519_read_public( mbedtls_x25519_context *ctx,
@@ -184,7 +184,7 @@
     if( (*buf++ != MBEDTLS_X25519_KEY_SIZE_BYTES) )
         return(MBEDTLS_ERR_ECP_BAD_INPUT_DATA);
     memcpy( ctx->peer_point, buf, MBEDTLS_X25519_KEY_SIZE_BYTES );
-    return(0);
+    return( 0 );
 }
 
 
diff --git a/programs/test/benchmark.c b/programs/test/benchmark.c
index 7cdff10..244174d 100644
--- a/programs/test/benchmark.c
+++ b/programs/test/benchmark.c
@@ -1028,16 +1028,9 @@
 
 #if defined(MBEDTLS_ECDH_LEGACY_CONTEXT)
             CHECK_AND_CONTINUE( mbedtls_ecp_group_load(&ecdh_srv.grp, curve_info->grp_id));
-            CHECK_AND_CONTINUE( mbedtls_ecdh_gen_public(&ecdh_srv.grp,
-                                    &ecdh_srv.d,
-                                    &ecdh_srv.Q, myrand, NULL));
 #else
-            if( ecdh_srv.var == MBEDTLS_ECDH_VARIANT_MBEDTLS_2_0 ) {
+            if( ecdh_srv.var == MBEDTLS_ECDH_VARIANT_MBEDTLS_2_0 )
                 CHECK_AND_CONTINUE( mbedtls_ecp_group_load( &ecdh_srv.ctx.mbed_ecdh.grp, curve_info->grp_id ));
-                CHECK_AND_CONTINUE( mbedtls_ecdh_gen_public( &ecdh_srv.ctx.mbed_ecdh.grp,
-                                                &ecdh_srv.ctx.mbed_ecdh.d,
-                                                &ecdh_srv.ctx.mbed_ecdh.Q, myrand, NULL ));
-            }
 #endif
 
             mbedtls_snprintf( title, sizeof( title ), "ECDHE-%s", curve_info->name );