forked from wolfSSL/wolfssl
Fix RA6M jankins failure
This commit is contained in:
@ -105,6 +105,9 @@
|
||||
<listOptionValue builtIn="false" value=""${workspace_loc:/wolfSSL_RA6M4/ra/fsp/src/r_sce_protected/crypto_procedures_protected/src/sce9/private/inc}""/>
|
||||
<listOptionValue builtIn="false" value=""${workspace_loc:/wolfSSL_RA6M4/ra/aws/amazon-freertos/libraries/freertos_plus/standard/freertos_plus_tcp/include}""/>
|
||||
<listOptionValue builtIn="false" value=""${workspace_loc:/wolfSSL_RA6M4/ra/fsp/src/rm_freertos_plus_tcp}""/>
|
||||
<listOptionValue builtIn="false" value=""${workspace_loc:/wolfSSL_RA6M4/ra/aws/FreeRTOS/FreeRTOS/Source/include}""/>
|
||||
<listOptionValue builtIn="false" value=""${workspace_loc:/wolfSSL_RA6M4/ra/arm/CMSIS_6/CMSIS/Core/Include}""/>
|
||||
<listOptionValue builtIn="false" value=""${workspace_loc:/wolfSSL_RA6M4/ra/aws/FreeRTOS/FreeRTOS-Plus/Source/FreeRTOS-Plus-TCP/source/include}""/>
|
||||
</option>
|
||||
<option IS_BUILTIN_EMPTY="false" IS_VALUE_EMPTY="false" id="ilg.gnuarmeclipse.managedbuild.cross.option.c.compiler.defs.1484044149" name="Defined symbols (-D)" superClass="ilg.gnuarmeclipse.managedbuild.cross.option.c.compiler.defs" useByScannerDiscovery="true" valueType="definedSymbols">
|
||||
<listOptionValue builtIn="false" value="_RENESAS_RA_"/>
|
||||
|
@ -301,9 +301,9 @@ WOLFSSL_LOCAL int wc_fspsm_AesGcmEncrypt(struct Aes* aes, byte* out,
|
||||
* Aes.ctx.tsip_keyIdx is not used here.
|
||||
*/
|
||||
key_client_aes = (FSPSM_AES_PWKEY)XMALLOC(sizeof(FSPSM_AES_WKEY),
|
||||
aes->heap, DYNAMIC_TYPE_AE);
|
||||
aes->heap, DYNAMIC_TYPE_AES);
|
||||
key_server_aes = (FSPSM_AES_PWKEY)XMALLOC(sizeof(FSPSM_AES_WKEY),
|
||||
aes->heap, DYNAMIC_TYPE_AE);
|
||||
aes->heap, DYNAMIC_TYPE_AES);
|
||||
if (key_client_aes == NULL || key_server_aes == NULL) {
|
||||
XFREE(plainBuf, aes->heap, DYNAMIC_TYPE_AES);
|
||||
XFREE(cipherBuf, aes->heap, DYNAMIC_TYPE_AES);
|
||||
@ -505,9 +505,9 @@ WOLFSSL_LOCAL int wc_fspsm_AesGcmDecrypt(struct Aes* aes, byte* out,
|
||||
* Aes.ctx.tsip_keyIdx is not used here.
|
||||
*/
|
||||
key_client_aes = (FSPSM_AES_PWKEY)XMALLOC(sizeof(FSPSM_AES_WKEY),
|
||||
aes->heap, DYNAMIC_TYPE_AE);
|
||||
aes->heap, DYNAMIC_TYPE_AES);
|
||||
key_server_aes = (FSPSM_AES_PWKEY)XMALLOC(sizeof(FSPSM_AES_WKEY),
|
||||
aes->heap, DYNAMIC_TYPE_AE);
|
||||
aes->heap, DYNAMIC_TYPE_AES);
|
||||
if (key_client_aes == NULL || key_server_aes == NULL) {
|
||||
XFREE(plainBuf, aes->heap, DYNAMIC_TYPE_AES);
|
||||
XFREE(cipherBuf, aes->heap, DYNAMIC_TYPE_AES);
|
||||
|
@ -336,7 +336,7 @@ WOLFSSL_LOCAL int wc_fspsm_EccVerifyTLS(WOLFSSL* ssl, const uint8_t* sig,
|
||||
}
|
||||
|
||||
if ((sigforSCE = (uint8_t*)XMALLOC(HW_SCE_ECDSA_DATA_BYTE_SIZE, NULL,
|
||||
DYNAMIC_TYPE_TEMP)) == NULL) {
|
||||
DYNAMIC_TYPE_TMP_BUFFER)) == NULL) {
|
||||
WOLFSSL_MSG("failed to malloc memory");
|
||||
return MEMORY_E;
|
||||
}
|
||||
@ -371,7 +371,7 @@ WOLFSSL_LOCAL int wc_fspsm_EccVerifyTLS(WOLFSSL* ssl, const uint8_t* sig,
|
||||
|
||||
ret = fspsm_ServerKeyExVerify(2, ssl, sigforSCE, 64, ctx);
|
||||
|
||||
XFREE(sigforSCE, NULL, DYNAMIC_TYPE_TEMP);
|
||||
XFREE(sigforSCE, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
|
||||
if (ret == WOLFSSL_SUCCESS) {
|
||||
*result = 1;
|
||||
@ -749,9 +749,9 @@ WOLFSSL_LOCAL int wc_fspsm_generateSessionKey(WOLFSSL *ssl,
|
||||
}
|
||||
else {
|
||||
key_client_aes = (FSPSM_AES_PWKEY)XMALLOC(sizeof(FSPSM_AES_WKEY),
|
||||
aes->heap, DYNAMIC_TYPE_AE);
|
||||
ssl->heap, DYNAMIC_TYPE_AES);
|
||||
key_server_aes = (FSPSM_AES_PWKEY)XMALLOC(sizeof(FSPSM_AES_WKEY),
|
||||
aes->heap, DYNAMIC_TYPE_AE);
|
||||
ssl->heap, DYNAMIC_TYPE_AES);
|
||||
if (key_client_aes == NULL || key_server_aes == NULL) {
|
||||
return MEMORY_E;
|
||||
}
|
||||
@ -790,7 +790,7 @@ WOLFSSL_LOCAL int wc_fspsm_generateSessionKey(WOLFSSL *ssl,
|
||||
XMEMSET(enc->aes, 0, sizeof(Aes));
|
||||
enc->aes->ctx.wrapped_key = (FSPSM_AES_PWKEY)XMALLOC
|
||||
(sizeof(FSPSM_AES_WKEY),
|
||||
aes->heap, DYNAMIC_TYPE_AE);
|
||||
ssl->heap, DYNAMIC_TYPE_AES);
|
||||
if (enc->aes->ctx.wrapped_key == NULL)
|
||||
return MEMORY_E;
|
||||
}
|
||||
@ -808,7 +808,7 @@ WOLFSSL_LOCAL int wc_fspsm_generateSessionKey(WOLFSSL *ssl,
|
||||
|
||||
dec->aes->ctx.wrapped_key = (FSPSM_AES_PWKEY)XMALLOC
|
||||
(sizeof(FSPSM_AES_WKEY),
|
||||
aes->heap, DYNAMIC_TYPE_AE);
|
||||
ssl->heap, DYNAMIC_TYPE_AES);
|
||||
if (dec->aes->ctx.wrapped_key == NULL)
|
||||
return MEMORY_E;
|
||||
}
|
||||
@ -857,8 +857,8 @@ WOLFSSL_LOCAL int wc_fspsm_generateSessionKey(WOLFSSL *ssl,
|
||||
cbInfo->keyflgs_tls.bits.session_key_set = 1;
|
||||
}
|
||||
|
||||
XFREE(key_client_aes, aes->heap, DYNAMIC_TYPE_AES);
|
||||
XFREE(key_server_aes, aes->heap, DYNAMIC_TYPE_AES);
|
||||
XFREE(key_client_aes, ssl->heap, DYNAMIC_TYPE_AES);
|
||||
XFREE(key_server_aes, ssl->heap, DYNAMIC_TYPE_AES);
|
||||
|
||||
/* unlock hw */
|
||||
wc_fspsm_hw_unlock();
|
||||
@ -1019,7 +1019,7 @@ WOLFSSL_LOCAL int wc_fspsm_tls_CertVerify(
|
||||
SCE_TLS_PUBLIC_KEY_TYPE_ECDSA_P256/*ECDSA*/) {
|
||||
|
||||
if ((sigforSCE = (uint8_t*)XMALLOC(HW_SCE_ECDSA_DATA_BYTE_SIZE, NULL,
|
||||
DYNAMIC_TYPE_TEMP)) == NULL) {
|
||||
DYNAMIC_TYPE_TMP_BUFFER)) == NULL) {
|
||||
WOLFSSL_MSG("failed to malloc memory");
|
||||
return MEMORY_E;
|
||||
}
|
||||
@ -1071,7 +1071,7 @@ WOLFSSL_LOCAL int wc_fspsm_tls_CertVerify(
|
||||
if (ret != FSP_SUCCESS) {
|
||||
WOLFSSL_MSG(" R_XXX_TlsCertificateVerification() failed");
|
||||
}
|
||||
XFREE(sigforSCE, NULL, DYNAMIC_TYPE_TEMP);
|
||||
XFREE(sigforSCE, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
wc_fspsm_hw_unlock();
|
||||
}
|
||||
else {
|
||||
|
Reference in New Issue
Block a user