forked from wolfSSL/wolfssl
* Fix to ensure user_settings.h can be included for bio.c and evp.c when IDE or compiler tries to build it directly. Allows for wildcard .c include along with WOLFSSL_IGNORE_FILE_WARN
.
* Fix for building SP cortex M without RSA. * Fix for type-cast warning with STSAFE-A100. * Improved the RNG seed test to prevent type-case warning.
This commit is contained in:
@ -19,6 +19,8 @@
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
*/
|
||||
|
||||
#include <wolfssl/wolfcrypt/settings.h>
|
||||
|
||||
#if !defined(WOLFSSL_BIO_INCLUDED)
|
||||
#ifndef WOLFSSL_IGNORE_FILE_WARN
|
||||
#warning bio.c does not need to be compiled separately from ssl.c
|
||||
|
@ -19,6 +19,8 @@
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
*/
|
||||
|
||||
#include <wolfssl/wolfcrypt/settings.h>
|
||||
|
||||
#if !defined(WOLFSSL_EVP_INCLUDED)
|
||||
#ifndef WOLFSSL_IGNORE_FILE_WARN
|
||||
#warning evp.c does not need to be compiled seperatly from ssl.c
|
||||
|
@ -39,7 +39,7 @@ int SSL_STSAFE_LoadDeviceCertificate(byte** pRawCertificate,
|
||||
|
||||
/* Try reading device certificate from ST-SAFE Zone 0 */
|
||||
err = stsafe_interface_read_device_certificate_raw(
|
||||
pRawCertificate, pRawCertificateLen);
|
||||
pRawCertificate, (uint32_t*)pRawCertificateLen);
|
||||
if (err == 0) {
|
||||
#if 0
|
||||
/* example for loading into WOLFSSL_CTX */
|
||||
@ -154,7 +154,7 @@ int SSL_STSAFE_VerifyPeerCertCb(WOLFSSL* ssl,
|
||||
if (err == 0) {
|
||||
/* Verify signature */
|
||||
err = stsafe_interface_verify(curve_id, (uint8_t*)hash, sigRS,
|
||||
pubKeyX, pubKeyY, result);
|
||||
pubKeyX, pubKeyY, (int32_t*)result);
|
||||
}
|
||||
|
||||
wc_ecc_free(&key);
|
||||
|
@ -39,10 +39,6 @@
|
||||
defined(WOLFSSL_HAVE_SP_ECC)
|
||||
|
||||
#ifdef RSA_LOW_MEM
|
||||
#ifndef SP_RSA_PRIVATE_EXP_D
|
||||
#define SP_RSA_PRIVATE_EXP_D
|
||||
#endif
|
||||
|
||||
#ifndef WOLFSSL_SP_SMALL
|
||||
#define WOLFSSL_SP_SMALL
|
||||
#endif
|
||||
@ -3670,7 +3666,7 @@ static int sp_2048_mod_exp_32(sp_digit* r, sp_digit* a, sp_digit* e,
|
||||
|
||||
#endif /* (WOLFSSL_HAVE_SP_RSA || WOLFSSL_HAVE_SP_DH) && !WOLFSSL_RSA_PUBLIC_ONLY */
|
||||
|
||||
#ifdef WOLFSSL_HAVE_SP_DH
|
||||
#if defined(WOLFSSL_HAVE_SP_RSA) || defined(WOLFSSL_HAVE_SP_DH)
|
||||
/* r = 2^n mod m where n is the number of bits to reduce by.
|
||||
* Given m must be 2048 bits, just need to subtract.
|
||||
*
|
||||
@ -3685,7 +3681,8 @@ static void sp_2048_mont_norm_64(sp_digit* r, sp_digit* m)
|
||||
sp_2048_sub_in_place_64(r, m);
|
||||
}
|
||||
|
||||
#endif /* WOLFSSL_HAVE_SP_DH */
|
||||
#endif /* WOLFSSL_HAVE_SP_RSA || WOLFSSL_HAVE_SP_DH */
|
||||
|
||||
/* Conditionally subtract b from a using the mask m.
|
||||
* m is -1 to subtract and 0 when not copying.
|
||||
*
|
||||
@ -4072,8 +4069,8 @@ static WC_INLINE int sp_2048_mod_64_cond(sp_digit* r, sp_digit* a, sp_digit* m)
|
||||
return sp_2048_div_64_cond(a, m, NULL, r);
|
||||
}
|
||||
|
||||
#if (defined(SP_RSA_PRIVATE_EXP_D) && !defined(WOLFSSL_RSA_PUBLIC_ONLY)) || \
|
||||
defined(WOLFSSL_HAVE_SP_DH)
|
||||
#if (defined(WOLFSSL_HAVE_SP_RSA) && !defined(WOLFSSL_RSA_PUBLIC_ONLY)) || \
|
||||
defined(WOLFSSL_HAVE_SP_DH)
|
||||
#ifdef WOLFSSL_SP_SMALL
|
||||
/* Modular exponentiate a to the e mod m. (r = a^e mod m)
|
||||
*
|
||||
@ -4346,7 +4343,7 @@ static int sp_2048_mod_exp_64(sp_digit* r, sp_digit* a, sp_digit* e,
|
||||
return err;
|
||||
}
|
||||
#endif /* WOLFSSL_SP_SMALL */
|
||||
#endif /* (SP_RSA_PRIVATE_EXP_D && !WOLFSSL_RSA_PUBLIC_ONLY) || WOLFSSL_HAVE_SP_DH */
|
||||
#endif /* (WOLFSSL_HAVE_SP_RSA && !WOLFSSL_RSA_PUBLIC_ONLY) || WOLFSSL_HAVE_SP_DH */
|
||||
|
||||
#ifdef WOLFSSL_HAVE_SP_RSA
|
||||
/* RSA public key operation.
|
||||
@ -9134,7 +9131,8 @@ static int sp_3072_mod_exp_48(sp_digit* r, sp_digit* a, sp_digit* e,
|
||||
|
||||
#endif /* (WOLFSSL_HAVE_SP_RSA || WOLFSSL_HAVE_SP_DH) && !WOLFSSL_RSA_PUBLIC_ONLY */
|
||||
|
||||
#ifdef WOLFSSL_HAVE_SP_DH
|
||||
#if (defined(WOLFSSL_HAVE_SP_RSA) && !defined(WOLFSSL_RSA_PUBLIC_ONLY)) || \
|
||||
defined(WOLFSSL_HAVE_SP_DH)
|
||||
/* r = 2^n mod m where n is the number of bits to reduce by.
|
||||
* Given m must be 3072 bits, just need to subtract.
|
||||
*
|
||||
@ -9149,7 +9147,9 @@ static void sp_3072_mont_norm_96(sp_digit* r, sp_digit* m)
|
||||
sp_3072_sub_in_place_96(r, m);
|
||||
}
|
||||
|
||||
#endif /* WOLFSSL_HAVE_SP_DH */
|
||||
#endif /* (WOLFSSL_HAVE_SP_RSA && !WOLFSSL_RSA_PUBLIC_ONLY) || WOLFSSL_HAVE_SP_DH */
|
||||
|
||||
|
||||
/* Conditionally subtract b from a using the mask m.
|
||||
* m is -1 to subtract and 0 when not copying.
|
||||
*
|
||||
@ -9542,7 +9542,7 @@ static WC_INLINE int sp_3072_mod_96_cond(sp_digit* r, sp_digit* a, sp_digit* m)
|
||||
return sp_3072_div_96_cond(a, m, NULL, r);
|
||||
}
|
||||
|
||||
#if (defined(SP_RSA_PRIVATE_EXP_D) && !defined(WOLFSSL_RSA_PUBLIC_ONLY)) || \
|
||||
#if (defined(WOLFSSL_HAVE_SP_RSA) && !defined(WOLFSSL_RSA_PUBLIC_ONLY)) || \
|
||||
defined(WOLFSSL_HAVE_SP_DH)
|
||||
#ifdef WOLFSSL_SP_SMALL
|
||||
/* Modular exponentiate a to the e mod m. (r = a^e mod m)
|
||||
@ -9816,7 +9816,7 @@ static int sp_3072_mod_exp_96(sp_digit* r, sp_digit* a, sp_digit* e,
|
||||
return err;
|
||||
}
|
||||
#endif /* WOLFSSL_SP_SMALL */
|
||||
#endif /* (SP_RSA_PRIVATE_EXP_D && !WOLFSSL_RSA_PUBLIC_ONLY) || WOLFSSL_HAVE_SP_DH */
|
||||
#endif /* (WOLFSSL_HAVE_SP_RSA && !WOLFSSL_RSA_PUBLIC_ONLY) || WOLFSSL_HAVE_SP_DH */
|
||||
|
||||
#ifdef WOLFSSL_HAVE_SP_RSA
|
||||
/* RSA public key operation.
|
||||
|
@ -23702,7 +23702,8 @@ static int myCryptoDevCb(int devIdArg, wc_CryptoInfo* info, void* ctx)
|
||||
}
|
||||
else if (info->algo_type == WC_ALGO_TYPE_SEED) {
|
||||
#ifndef WC_NO_RNG
|
||||
static byte seed[] = { 0x00, 0x00, 0x00, 0x01 };
|
||||
static byte seed[sizeof(word32)] = { 0x00, 0x00, 0x00, 0x01 };
|
||||
word32* seedWord32 = (word32*)seed;
|
||||
word32 len;
|
||||
|
||||
/* wc_GenerateSeed is a local symbol so we need to fake the entropy. */
|
||||
@ -23713,7 +23714,7 @@ static int myCryptoDevCb(int devIdArg, wc_CryptoInfo* info, void* ctx)
|
||||
XMEMCPY(info->seed.seed, seed, sizeof(seed));
|
||||
info->seed.seed += len;
|
||||
info->seed.sz -= len;
|
||||
(*((word32*)seed))++;
|
||||
(*seedWord32)++;
|
||||
}
|
||||
|
||||
ret = 0;
|
||||
|
Reference in New Issue
Block a user