forked from wolfSSL/wolfssl
Rename RNG to WC_RNG for Freescale, add NO_OLD_RNGNAME define to completely remove RNG type usage
This commit is contained in:
@@ -797,7 +797,7 @@ void bench_blake2(void)
|
||||
|
||||
#if !defined(NO_RSA) || !defined(NO_DH) \
|
||||
|| defined(CYASSL_KEYGEN) || defined(HAVE_ECC)
|
||||
static RNG rng;
|
||||
static WC_RNG rng;
|
||||
#endif
|
||||
|
||||
#ifndef NO_RSA
|
||||
|
@@ -2667,7 +2667,7 @@ int random_test(void)
|
||||
|
||||
int random_test(void)
|
||||
{
|
||||
RNG rng;
|
||||
WC_RNG rng;
|
||||
byte block[32];
|
||||
int ret;
|
||||
|
||||
@@ -2693,7 +2693,7 @@ byte GetEntropy(ENTROPY_CMD cmd, byte* out);
|
||||
|
||||
byte GetEntropy(ENTROPY_CMD cmd, byte* out)
|
||||
{
|
||||
static RNG rng;
|
||||
static WC_RNG rng;
|
||||
|
||||
if (cmd == INIT)
|
||||
return (InitRng(&rng) == 0) ? 1 : 0;
|
||||
@@ -2768,7 +2768,7 @@ int rsa_test(void)
|
||||
byte* tmp;
|
||||
size_t bytes;
|
||||
RsaKey key;
|
||||
RNG rng;
|
||||
WC_RNG rng;
|
||||
word32 idx = 0;
|
||||
int ret;
|
||||
byte in[] = "Everyone gets Friday off.";
|
||||
@@ -3652,7 +3652,7 @@ int dh_test(void)
|
||||
byte agree2[256];
|
||||
DhKey key;
|
||||
DhKey key2;
|
||||
RNG rng;
|
||||
WC_RNG rng;
|
||||
|
||||
|
||||
#ifdef USE_CERT_BUFFERS_1024
|
||||
@@ -3725,7 +3725,7 @@ int dsa_test(void)
|
||||
word32 idx = 0;
|
||||
byte tmp[1024];
|
||||
DsaKey key;
|
||||
RNG rng;
|
||||
WC_RNG rng;
|
||||
Sha sha;
|
||||
byte hash[SHA_DIGEST_SIZE];
|
||||
byte signature[40];
|
||||
@@ -4200,7 +4200,7 @@ int hkdf_test(void)
|
||||
|
||||
int ecc_test(void)
|
||||
{
|
||||
RNG rng;
|
||||
WC_RNG rng;
|
||||
byte sharedA[1024];
|
||||
byte sharedB[1024];
|
||||
byte sig[1024];
|
||||
@@ -4300,7 +4300,7 @@ int ecc_test(void)
|
||||
|
||||
int ecc_encrypt_test(void)
|
||||
{
|
||||
RNG rng;
|
||||
WC_RNG rng;
|
||||
int ret;
|
||||
ecc_key userA, userB;
|
||||
byte msg[48];
|
||||
@@ -4669,7 +4669,7 @@ int pkcs7signed_test(void)
|
||||
char data[] = "Hello World";
|
||||
word32 dataSz, outSz, certDerSz, keyDerSz;
|
||||
PKCS7 msg;
|
||||
RNG rng;
|
||||
WC_RNG rng;
|
||||
|
||||
byte transIdOid[] =
|
||||
{ 0x06, 0x0a, 0x60, 0x86, 0x48, 0x01, 0x86, 0xF8, 0x45, 0x01,
|
||||
|
@@ -772,7 +772,7 @@ void bench_blake2(void)
|
||||
|
||||
#if !defined(NO_RSA) || !defined(NO_DH) \
|
||||
|| defined(CYASSL_KEYGEN) || defined(HAVE_ECC)
|
||||
static RNG rng;
|
||||
static WC_RNG rng;
|
||||
#endif
|
||||
|
||||
#ifndef NO_RSA
|
||||
|
@@ -2583,7 +2583,7 @@ int camellia_test(void)
|
||||
|
||||
int random_test(void)
|
||||
{
|
||||
RNG rng;
|
||||
WC_RNG rng;
|
||||
byte block[32];
|
||||
int ret;
|
||||
|
||||
@@ -2607,7 +2607,7 @@ byte GetEntropy(ENTROPY_CMD cmd, byte* out);
|
||||
|
||||
byte GetEntropy(ENTROPY_CMD cmd, byte* out)
|
||||
{
|
||||
static RNG rng;
|
||||
static WC_RNG rng;
|
||||
|
||||
if (cmd == INIT)
|
||||
return (InitRng(&rng) == 0) ? 1 : 0;
|
||||
@@ -2682,7 +2682,7 @@ int rsa_test(void)
|
||||
byte* tmp;
|
||||
size_t bytes;
|
||||
RsaKey key;
|
||||
RNG rng;
|
||||
WC_RNG rng;
|
||||
word32 idx = 0;
|
||||
int ret;
|
||||
byte in[] = "Everyone gets Friday off.";
|
||||
@@ -3558,7 +3558,7 @@ int dh_test(void)
|
||||
byte agree2[256];
|
||||
DhKey key;
|
||||
DhKey key2;
|
||||
RNG rng;
|
||||
WC_RNG rng;
|
||||
|
||||
|
||||
#ifdef USE_CERT_BUFFERS_1024
|
||||
@@ -3631,7 +3631,7 @@ int dsa_test(void)
|
||||
word32 idx = 0;
|
||||
byte tmp[1024];
|
||||
DsaKey key;
|
||||
RNG rng;
|
||||
WC_RNG rng;
|
||||
Sha sha;
|
||||
byte hash[SHA_DIGEST_SIZE];
|
||||
byte signature[40];
|
||||
@@ -4098,7 +4098,7 @@ int hkdf_test(void)
|
||||
|
||||
int ecc_test(void)
|
||||
{
|
||||
RNG rng;
|
||||
WC_RNG rng;
|
||||
byte sharedA[1024];
|
||||
byte sharedB[1024];
|
||||
byte sig[1024];
|
||||
@@ -4198,7 +4198,7 @@ int ecc_test(void)
|
||||
|
||||
int ecc_encrypt_test(void)
|
||||
{
|
||||
RNG rng;
|
||||
WC_RNG rng;
|
||||
int ret;
|
||||
ecc_key userA, userB;
|
||||
byte msg[48];
|
||||
@@ -4563,8 +4563,8 @@ int pkcs7signed_test(void)
|
||||
byte* out;
|
||||
char data[] = "Hello World";
|
||||
word32 dataSz, outSz, certDerSz, keyDerSz;
|
||||
PKCS7 msg;
|
||||
RNG rng;
|
||||
PKCS7 msg;
|
||||
WC_RNG rng;
|
||||
|
||||
byte transIdOid[] =
|
||||
{ 0x06, 0x0a, 0x60, 0x86, 0x48, 0x01, 0x86, 0xF8, 0x45, 0x01,
|
||||
|
@@ -285,13 +285,13 @@ int CRYPT_HUFFMAN_DeCompress(unsigned char* out, unsigned int outSz,
|
||||
/* RNG Initialize, < 0 on error */
|
||||
int CRYPT_RNG_Initialize(CRYPT_RNG_CTX* rng)
|
||||
{
|
||||
typedef char rng_test[sizeof(CRYPT_RNG_CTX) >= sizeof(RNG) ? 1 : -1];
|
||||
typedef char rng_test[sizeof(CRYPT_RNG_CTX) >= sizeof(WC_RNG) ? 1 : -1];
|
||||
(void)sizeof(rng_test);
|
||||
|
||||
if (rng == NULL)
|
||||
return BAD_FUNC_ARG;
|
||||
|
||||
return InitRng((RNG*)rng);
|
||||
return InitRng((WC_RNG*)rng);
|
||||
}
|
||||
|
||||
|
||||
@@ -301,7 +301,7 @@ int CRYPT_RNG_Get(CRYPT_RNG_CTX* rng, unsigned char* b)
|
||||
if (rng == NULL || b == NULL)
|
||||
return BAD_FUNC_ARG;
|
||||
|
||||
return RNG_GenerateByte((RNG*)rng, (byte*)b);
|
||||
return RNG_GenerateByte((WC_RNG*)rng, (byte*)b);
|
||||
}
|
||||
|
||||
|
||||
@@ -312,7 +312,7 @@ int CRYPT_RNG_BlockGenerate(CRYPT_RNG_CTX* rng, unsigned char* b,
|
||||
if (rng == NULL || b == NULL)
|
||||
return BAD_FUNC_ARG;
|
||||
|
||||
return RNG_GenerateBlock((RNG*)rng, b, sz);
|
||||
return RNG_GenerateBlock((WC_RNG*)rng, b, sz);
|
||||
}
|
||||
|
||||
|
||||
@@ -512,7 +512,7 @@ int CRYPT_RSA_PublicEncrypt(CRYPT_RSA_CTX* rsa, unsigned char* out,
|
||||
return BAD_FUNC_ARG;
|
||||
|
||||
return RsaPublicEncrypt(in, inSz, out, outSz, (RsaKey*)rsa->holder,
|
||||
(RNG*)rng);
|
||||
(WC_RNG*)rng);
|
||||
}
|
||||
|
||||
|
||||
@@ -614,7 +614,7 @@ int CRYPT_ECC_DHE_KeyMake(CRYPT_ECC_CTX* ecc, CRYPT_RNG_CTX* rng, int keySz)
|
||||
if (ecc == NULL || rng == NULL)
|
||||
return BAD_FUNC_ARG;
|
||||
|
||||
return wc_ecc_make_key((RNG*)rng, keySz, (ecc_key*)ecc->holder);
|
||||
return wc_ecc_make_key((WC_RNG*)rng, keySz, (ecc_key*)ecc->holder);
|
||||
}
|
||||
|
||||
|
||||
@@ -649,7 +649,7 @@ int CRYPT_ECC_DSA_HashSign(CRYPT_ECC_CTX* ecc, CRYPT_RNG_CTX* rng,
|
||||
in == NULL)
|
||||
return BAD_FUNC_ARG;
|
||||
|
||||
ret = wc_ecc_sign_hash(in, inSz, sig, &inOut, (RNG*)rng,
|
||||
ret = wc_ecc_sign_hash(in, inSz, sig, &inOut, (WC_RNG*)rng,
|
||||
(ecc_key*)ecc->holder);
|
||||
*usedSz = inOut;
|
||||
|
||||
|
@@ -69,7 +69,7 @@ static byte ourData[OUR_DATA_SIZE];
|
||||
static byte* key = NULL;
|
||||
static byte* iv = NULL;
|
||||
static CRYPT_RNG_CTX mcRng;
|
||||
static RNG defRng;
|
||||
static WC_RNG defRng;
|
||||
|
||||
static int check_md5(void);
|
||||
static int check_sha(void);
|
||||
|
@@ -244,7 +244,7 @@ static int QSH_FreeAll(WOLFSSL* ssl)
|
||||
|
||||
|
||||
#ifdef HAVE_NTRU
|
||||
static RNG* rng;
|
||||
static WC_RNG* rng;
|
||||
static wolfSSL_Mutex* rngMutex;
|
||||
|
||||
static word32 GetEntropy(unsigned char* out, word32 num_bytes)
|
||||
@@ -252,7 +252,7 @@ static word32 GetEntropy(unsigned char* out, word32 num_bytes)
|
||||
int ret = 0;
|
||||
|
||||
if (rng == NULL) {
|
||||
if ((rng = XMALLOC(sizeof(RNG), 0, DYNAMIC_TYPE_TLSX)) == NULL)
|
||||
if ((rng = XMALLOC(sizeof(WC_RNG), 0, DYNAMIC_TYPE_TLSX)) == NULL)
|
||||
return DRBG_OUT_OF_MEMORY;
|
||||
wc_InitRng(rng);
|
||||
}
|
||||
@@ -1765,7 +1765,7 @@ int InitSSL(WOLFSSL* ssl, WOLFSSL_CTX* ctx)
|
||||
#endif /* NO_PSK */
|
||||
|
||||
/* RNG */
|
||||
ssl->rng = (RNG*)XMALLOC(sizeof(RNG), ssl->heap, DYNAMIC_TYPE_RNG);
|
||||
ssl->rng = (WC_RNG*)XMALLOC(sizeof(WC_RNG), ssl->heap, DYNAMIC_TYPE_RNG);
|
||||
if (ssl->rng == NULL) {
|
||||
WOLFSSL_MSG("RNG Memory error");
|
||||
return MEMORY_E;
|
||||
|
124
src/ssl.c
124
src/ssl.c
@@ -10920,7 +10920,7 @@ int wolfSSL_cmp_peer_cert_to_file(WOLFSSL* ssl, const char *fname)
|
||||
#endif
|
||||
|
||||
|
||||
static RNG globalRNG;
|
||||
static WC_RNG globalRNG;
|
||||
static int initGlobalRNG = 0;
|
||||
|
||||
/* SSL_SUCCESS on ok */
|
||||
@@ -10947,19 +10947,19 @@ int wolfSSL_RAND_seed(const void* seed, int len)
|
||||
/* SSL_SUCCESS on ok */
|
||||
int wolfSSL_RAND_bytes(unsigned char* buf, int num)
|
||||
{
|
||||
int ret = 0;
|
||||
int initTmpRng = 0;
|
||||
RNG* rng = NULL;
|
||||
int ret = 0;
|
||||
int initTmpRng = 0;
|
||||
WC_RNG* rng = NULL;
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
RNG* tmpRNG = NULL;
|
||||
WC_RNG* tmpRNG = NULL;
|
||||
#else
|
||||
RNG tmpRNG[1];
|
||||
WC_RNG tmpRNG[1];
|
||||
#endif
|
||||
|
||||
WOLFSSL_ENTER("wolfSSL_RAND_bytes");
|
||||
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
tmpRNG = (RNG*)XMALLOC(sizeof(RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
tmpRNG = (WC_RNG*)XMALLOC(sizeof(WC_RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
if (tmpRNG == NULL)
|
||||
return ret;
|
||||
#endif
|
||||
@@ -11285,12 +11285,12 @@ int wolfSSL_BN_rand(WOLFSSL_BIGNUM* bn, int bits, int top, int bottom)
|
||||
int ret = 0;
|
||||
int len = bits / 8;
|
||||
int initTmpRng = 0;
|
||||
RNG* rng = NULL;
|
||||
WC_RNG* rng = NULL;
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
RNG* tmpRNG = NULL;
|
||||
WC_RNG* tmpRNG = NULL;
|
||||
byte* buff = NULL;
|
||||
#else
|
||||
RNG tmpRNG[1];
|
||||
WC_RNG tmpRNG[1];
|
||||
byte buff[1024];
|
||||
#endif
|
||||
|
||||
@@ -11303,7 +11303,7 @@ int wolfSSL_BN_rand(WOLFSSL_BIGNUM* bn, int bits, int top, int bottom)
|
||||
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
buff = (byte*)XMALLOC(1024, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
tmpRNG = (RNG*) XMALLOC(sizeof(RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
tmpRNG = (WC_RNG*) XMALLOC(sizeof(WC_RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
if (buff == NULL || tmpRNG == NULL) {
|
||||
XFREE(buff, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
XFREE(tmpRNG, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
@@ -11926,23 +11926,23 @@ int wolfSSL_DH_generate_key(WOLFSSL_DH* dh)
|
||||
word32 pubSz = 768;
|
||||
word32 privSz = 768;
|
||||
int initTmpRng = 0;
|
||||
RNG* rng = NULL;
|
||||
WC_RNG* rng = NULL;
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
unsigned char* pub = NULL;
|
||||
unsigned char* priv = NULL;
|
||||
RNG* tmpRNG = NULL;
|
||||
WC_RNG* tmpRNG = NULL;
|
||||
#else
|
||||
unsigned char pub [768];
|
||||
unsigned char priv[768];
|
||||
RNG tmpRNG[1];
|
||||
WC_RNG tmpRNG[1];
|
||||
#endif
|
||||
|
||||
WOLFSSL_MSG("wolfSSL_DH_generate_key");
|
||||
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
tmpRNG = (RNG*)XMALLOC(sizeof(RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
pub = (unsigned char*)XMALLOC(pubSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
priv = (unsigned char*)XMALLOC(privSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
tmpRNG = (WC_RNG*)XMALLOC(sizeof(WC_RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
pub = (unsigned char*)XMALLOC(pubSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
priv = (unsigned char*)XMALLOC(privSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
|
||||
if (tmpRNG == NULL || pub == NULL || priv == NULL) {
|
||||
XFREE(tmpRNG, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
@@ -12530,13 +12530,13 @@ int wolfSSL_RSA_generate_key_ex(WOLFSSL_RSA* rsa, int bits, WOLFSSL_BIGNUM* bn,
|
||||
#ifdef WOLFSSL_KEY_GEN
|
||||
{
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
RNG* rng = NULL;
|
||||
WC_RNG* rng = NULL;
|
||||
#else
|
||||
RNG rng[1];
|
||||
WC_RNG rng[1];
|
||||
#endif
|
||||
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
rng = (RNG*)XMALLOC(sizeof(RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
rng = (WC_RNG*)XMALLOC(sizeof(WC_RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
if (rng == NULL)
|
||||
return SSL_FAILURE;
|
||||
#endif
|
||||
@@ -12651,15 +12651,15 @@ int wolfSSL_DSA_generate_key(WOLFSSL_DSA* dsa)
|
||||
#ifdef WOLFSSL_KEY_GEN
|
||||
{
|
||||
int initTmpRng = 0;
|
||||
RNG *rng = NULL;
|
||||
WC_RNG *rng = NULL;
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
RNG *tmpRNG = NULL;
|
||||
WC_RNG *tmpRNG = NULL;
|
||||
#else
|
||||
RNG tmpRNG[1];
|
||||
WC_RNG tmpRNG[1];
|
||||
#endif
|
||||
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
tmpRNG = (RNG*)XMALLOC(sizeof(RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
tmpRNG = (WC_RNG*)XMALLOC(sizeof(WC_RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
if (tmpRNG == NULL)
|
||||
return SSL_FATAL_ERROR;
|
||||
#endif
|
||||
@@ -12724,15 +12724,15 @@ int wolfSSL_DSA_generate_parameters_ex(WOLFSSL_DSA* dsa, int bits,
|
||||
#ifdef WOLFSSL_KEY_GEN
|
||||
{
|
||||
int initTmpRng = 0;
|
||||
RNG *rng = NULL;
|
||||
WC_RNG *rng = NULL;
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
RNG *tmpRNG = NULL;
|
||||
WC_RNG *tmpRNG = NULL;
|
||||
#else
|
||||
RNG tmpRNG[1];
|
||||
WC_RNG tmpRNG[1];
|
||||
#endif
|
||||
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
tmpRNG = (RNG*)XMALLOC(sizeof(RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
tmpRNG = (WC_RNG*)XMALLOC(sizeof(WC_RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
if (tmpRNG == NULL)
|
||||
return SSL_FATAL_ERROR;
|
||||
#endif
|
||||
@@ -12776,13 +12776,13 @@ int wolfSSL_DSA_generate_parameters_ex(WOLFSSL_DSA* dsa, int bits,
|
||||
int wolfSSL_DSA_do_sign(const unsigned char* d, unsigned char* sigRet,
|
||||
WOLFSSL_DSA* dsa)
|
||||
{
|
||||
int ret = SSL_FATAL_ERROR;
|
||||
int initTmpRng = 0;
|
||||
RNG* rng = NULL;
|
||||
int ret = SSL_FATAL_ERROR;
|
||||
int initTmpRng = 0;
|
||||
WC_RNG* rng = NULL;
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
RNG* tmpRNG = NULL;
|
||||
WC_RNG* tmpRNG = NULL;
|
||||
#else
|
||||
RNG tmpRNG[1];
|
||||
WC_RNG tmpRNG[1];
|
||||
#endif
|
||||
|
||||
WOLFSSL_ENTER("wolfSSL_DSA_do_sign");
|
||||
@@ -12803,7 +12803,7 @@ int wolfSSL_DSA_do_sign(const unsigned char* d, unsigned char* sigRet,
|
||||
}
|
||||
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
tmpRNG = (RNG*)XMALLOC(sizeof(RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
tmpRNG = (WC_RNG*)XMALLOC(sizeof(WC_RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
if (tmpRNG == NULL)
|
||||
return SSL_FATAL_ERROR;
|
||||
#endif
|
||||
@@ -12875,17 +12875,17 @@ int wolfSSL_RSA_sign(int type, const unsigned char* m,
|
||||
unsigned int mLen, unsigned char* sigRet,
|
||||
unsigned int* sigLen, WOLFSSL_RSA* rsa)
|
||||
{
|
||||
word32 outLen;
|
||||
word32 signSz;
|
||||
int initTmpRng = 0;
|
||||
RNG* rng = NULL;
|
||||
int ret = 0;
|
||||
word32 outLen;
|
||||
word32 signSz;
|
||||
int initTmpRng = 0;
|
||||
WC_RNG* rng = NULL;
|
||||
int ret = 0;
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
RNG* tmpRNG = NULL;
|
||||
byte* encodedSig = NULL;
|
||||
WC_RNG* tmpRNG = NULL;
|
||||
byte* encodedSig = NULL;
|
||||
#else
|
||||
RNG tmpRNG[1];
|
||||
byte encodedSig[MAX_ENCODED_SIG_SZ];
|
||||
WC_RNG tmpRNG[1];
|
||||
byte encodedSig[MAX_ENCODED_SIG_SZ];
|
||||
#endif
|
||||
|
||||
WOLFSSL_MSG("wolfSSL_RSA_sign");
|
||||
@@ -12913,7 +12913,7 @@ int wolfSSL_RSA_sign(int type, const unsigned char* m,
|
||||
outLen = (word32)wolfSSL_BN_num_bytes(rsa->n);
|
||||
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
tmpRNG = (RNG*)XMALLOC(sizeof(RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
tmpRNG = (WC_RNG*)XMALLOC(sizeof(WC_RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
if (tmpRNG == NULL)
|
||||
return 0;
|
||||
|
||||
@@ -14024,12 +14024,12 @@ int wolfSSL_EC_KEY_set_group(WOLFSSL_EC_KEY *key, WOLFSSL_EC_GROUP *group)
|
||||
|
||||
int wolfSSL_EC_KEY_generate_key(WOLFSSL_EC_KEY *key)
|
||||
{
|
||||
int initTmpRng = 0;
|
||||
RNG* rng = NULL;
|
||||
int initTmpRng = 0;
|
||||
WC_RNG* rng = NULL;
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
RNG* tmpRNG = NULL;
|
||||
WC_RNG* tmpRNG = NULL;
|
||||
#else
|
||||
RNG tmpRNG[1];
|
||||
WC_RNG tmpRNG[1];
|
||||
#endif
|
||||
|
||||
WOLFSSL_ENTER("wolfSSL_EC_KEY_generate_key");
|
||||
@@ -14041,7 +14041,7 @@ int wolfSSL_EC_KEY_generate_key(WOLFSSL_EC_KEY *key)
|
||||
}
|
||||
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
tmpRNG = (RNG*)XMALLOC(sizeof(RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
tmpRNG = (WC_RNG*)XMALLOC(sizeof(WC_RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
if (tmpRNG == NULL)
|
||||
return 0;
|
||||
#endif
|
||||
@@ -14659,12 +14659,12 @@ WOLFSSL_ECDSA_SIG *wolfSSL_ECDSA_do_sign(const unsigned char *d, int dlen,
|
||||
WOLFSSL_EC_KEY *key)
|
||||
{
|
||||
WOLFSSL_ECDSA_SIG *sig = NULL;
|
||||
int initTmpRng = 0;
|
||||
RNG* rng = NULL;
|
||||
int initTmpRng = 0;
|
||||
WC_RNG* rng = NULL;
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
RNG* tmpRNG = NULL;
|
||||
WC_RNG* tmpRNG = NULL;
|
||||
#else
|
||||
RNG tmpRNG[1];
|
||||
WC_RNG tmpRNG[1];
|
||||
#endif
|
||||
|
||||
WOLFSSL_ENTER("wolfSSL_ECDSA_do_sign");
|
||||
@@ -14686,7 +14686,7 @@ WOLFSSL_ECDSA_SIG *wolfSSL_ECDSA_do_sign(const unsigned char *d, int dlen,
|
||||
}
|
||||
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
tmpRNG = (RNG*)XMALLOC(sizeof(RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
tmpRNG = (WC_RNG*)XMALLOC(sizeof(WC_RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
if (tmpRNG == NULL)
|
||||
return NULL;
|
||||
#endif
|
||||
@@ -16347,11 +16347,11 @@ int wolfSSL_EC25519_generate_key(unsigned char *priv, unsigned int *privSz,
|
||||
#else /* WOLFSSL_KEY_GEN */
|
||||
int ret = SSL_FAILURE;
|
||||
int initTmpRng = 0;
|
||||
RNG *rng = NULL;
|
||||
WC_RNG *rng = NULL;
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
RNG *tmpRNG = NULL;
|
||||
WC_RNG *tmpRNG = NULL;
|
||||
#else
|
||||
RNG tmpRNG[1];
|
||||
WC_RNG tmpRNG[1];
|
||||
#endif
|
||||
|
||||
WOLFSSL_ENTER("wolfSSL_EC25519_generate_key");
|
||||
@@ -16363,7 +16363,7 @@ int wolfSSL_EC25519_generate_key(unsigned char *priv, unsigned int *privSz,
|
||||
}
|
||||
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
tmpRNG = (RNG*)XMALLOC(sizeof(RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
tmpRNG = (WC_RNG*)XMALLOC(sizeof(WC_RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
if (tmpRNG == NULL)
|
||||
return SSL_FAILURE;
|
||||
#endif
|
||||
@@ -16485,11 +16485,11 @@ int wolfSSL_ED25519_generate_key(unsigned char *priv, unsigned int *privSz,
|
||||
#else /* WOLFSSL_KEY_GEN */
|
||||
int ret = SSL_FAILURE;
|
||||
int initTmpRng = 0;
|
||||
RNG *rng = NULL;
|
||||
WC_RNG *rng = NULL;
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
RNG *tmpRNG = NULL;
|
||||
WC_RNG *tmpRNG = NULL;
|
||||
#else
|
||||
RNG tmpRNG[1];
|
||||
WC_RNG tmpRNG[1];
|
||||
#endif
|
||||
|
||||
WOLFSSL_ENTER("wolfSSL_ED25519_generate_key");
|
||||
@@ -16501,7 +16501,7 @@ int wolfSSL_ED25519_generate_key(unsigned char *priv, unsigned int *privSz,
|
||||
}
|
||||
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
tmpRNG = (RNG*)XMALLOC(sizeof(RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
tmpRNG = (WC_RNG*)XMALLOC(sizeof(WC_RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
if (tmpRNG == NULL)
|
||||
return SSL_FATAL_ERROR;
|
||||
#endif
|
||||
|
@@ -2058,7 +2058,7 @@ int TLSX_UseSessionTicket(TLSX** extensions, SessionTicket* ticket)
|
||||
|
||||
|
||||
#ifdef HAVE_QSH
|
||||
static RNG* rng;
|
||||
static WC_RNG* rng;
|
||||
static wolfSSL_Mutex* rngMutex;
|
||||
|
||||
static void TLSX_QSH_FreeAll(QSHScheme* list)
|
||||
@@ -2841,7 +2841,7 @@ static word32 GetEntropy(unsigned char* out, word32 num_bytes)
|
||||
int ret = 0;
|
||||
|
||||
if (rng == NULL) {
|
||||
if ((rng = XMALLOC(sizeof(RNG), 0, DYNAMIC_TYPE_TLSX)) == NULL)
|
||||
if ((rng = XMALLOC(sizeof(WC_RNG), 0, DYNAMIC_TYPE_TLSX)) == NULL)
|
||||
return DRBG_OUT_OF_MEMORY;
|
||||
wc_InitRng(rng);
|
||||
}
|
||||
|
@@ -27,7 +27,7 @@
|
||||
/* defn adds */
|
||||
char* wolfSSL_error_string(int err);
|
||||
int wolfSSL_swig_connect(WOLFSSL*, const char* server, int port);
|
||||
RNG* GetRng(void);
|
||||
WC_RNG* GetRng(void);
|
||||
RsaKey* GetRsaPrivateKey(const char* file);
|
||||
void FillSignStr(unsigned char*, const char*, int);
|
||||
%}
|
||||
@@ -44,11 +44,11 @@ int wolfSSL_Init(void);
|
||||
char* wolfSSL_error_string(int);
|
||||
int wolfSSL_swig_connect(WOLFSSL*, const char* server, int port);
|
||||
|
||||
int wc_RsaSSL_Sign(const unsigned char* in, int inLen, unsigned char* out, int outLen, RsaKey* key, RNG* rng);
|
||||
int wc_RsaSSL_Sign(const unsigned char* in, int inLen, unsigned char* out, int outLen, RsaKey* key, WC_RNG* rng);
|
||||
|
||||
int wc_RsaSSL_Verify(const unsigned char* in, int inLen, unsigned char* out, int outLen, RsaKey* key);
|
||||
|
||||
RNG* GetRng(void);
|
||||
WC_RNG* GetRng(void);
|
||||
RsaKey* GetRsaPrivateKey(const char* file);
|
||||
void FillSignStr(unsigned char*, const char*, int);
|
||||
|
||||
|
@@ -182,9 +182,9 @@ char* wolfSSL_error_string(int err)
|
||||
}
|
||||
|
||||
|
||||
RNG* GetRng(void)
|
||||
WC_RNG* GetRng(void)
|
||||
{
|
||||
RNG* rng = (RNG*)malloc(sizeof(RNG));
|
||||
WC_RNG* rng = (WC_RNG*)malloc(sizeof(WC_RNG));
|
||||
|
||||
if (rng)
|
||||
if (wc_InitRng(rng) != 0) {
|
||||
|
@@ -194,7 +194,7 @@ static int OpenNitroxDevice(int dma_mode,int dev_id)
|
||||
#if !defined(NO_RSA) || !defined(NO_DH) \
|
||||
|| defined(WOLFSSL_KEYGEN) || defined(HAVE_ECC)
|
||||
#define HAVE_LOCAL_RNG
|
||||
static RNG rng;
|
||||
static WC_RNG rng;
|
||||
#endif
|
||||
|
||||
/* use kB instead of mB for embedded benchmarking */
|
||||
|
@@ -5761,7 +5761,7 @@ static int SetName(byte* output, CertName* name)
|
||||
|
||||
/* encode info from cert into DER encoded format */
|
||||
static int EncodeCert(Cert* cert, DerCert* der, RsaKey* rsaKey, ecc_key* eccKey,
|
||||
RNG* rng, const byte* ntruKey, word16 ntruSz)
|
||||
WC_RNG* rng, const byte* ntruKey, word16 ntruSz)
|
||||
{
|
||||
int ret;
|
||||
|
||||
@@ -5933,7 +5933,7 @@ static int WriteCertBody(DerCert* der, byte* buffer)
|
||||
|
||||
/* Make RSA signature from buffer (sz), write to sig (sigSz) */
|
||||
static int MakeSignature(const byte* buffer, int sz, byte* sig, int sigSz,
|
||||
RsaKey* rsaKey, ecc_key* eccKey, RNG* rng,
|
||||
RsaKey* rsaKey, ecc_key* eccKey, WC_RNG* rng,
|
||||
int sigAlgoType)
|
||||
{
|
||||
int encSigSz, digestSz, typeH = 0, ret = 0;
|
||||
@@ -6058,7 +6058,7 @@ static int AddSignature(byte* buffer, int bodySz, const byte* sig, int sigSz,
|
||||
|
||||
/* Make an x509 Certificate v3 any key type from cert input, write to buffer */
|
||||
static int MakeAnyCert(Cert* cert, byte* derBuffer, word32 derSz,
|
||||
RsaKey* rsaKey, ecc_key* eccKey, RNG* rng,
|
||||
RsaKey* rsaKey, ecc_key* eccKey, WC_RNG* rng,
|
||||
const byte* ntruKey, word16 ntruSz)
|
||||
{
|
||||
int ret;
|
||||
@@ -6095,7 +6095,7 @@ static int MakeAnyCert(Cert* cert, byte* derBuffer, word32 derSz,
|
||||
|
||||
/* Make an x509 Certificate v3 RSA or ECC from cert input, write to buffer */
|
||||
int wc_MakeCert(Cert* cert, byte* derBuffer, word32 derSz, RsaKey* rsaKey,
|
||||
ecc_key* eccKey, RNG* rng)
|
||||
ecc_key* eccKey, WC_RNG* rng)
|
||||
{
|
||||
return MakeAnyCert(cert, derBuffer, derSz, rsaKey, eccKey, rng, NULL, 0);
|
||||
}
|
||||
@@ -6104,7 +6104,7 @@ int wc_MakeCert(Cert* cert, byte* derBuffer, word32 derSz, RsaKey* rsaKey,
|
||||
#ifdef HAVE_NTRU
|
||||
|
||||
int wc_MakeNtruCert(Cert* cert, byte* derBuffer, word32 derSz,
|
||||
const byte* ntruKey, word16 keySz, RNG* rng)
|
||||
const byte* ntruKey, word16 keySz, WC_RNG* rng)
|
||||
{
|
||||
return MakeAnyCert(cert, derBuffer, derSz, NULL, NULL, rng, ntruKey, keySz);
|
||||
}
|
||||
@@ -6320,7 +6320,7 @@ int wc_MakeCertReq(Cert* cert, byte* derBuffer, word32 derSz,
|
||||
|
||||
|
||||
int wc_SignCert(int requestSz, int sType, byte* buffer, word32 buffSz,
|
||||
RsaKey* rsaKey, ecc_key* eccKey, RNG* rng)
|
||||
RsaKey* rsaKey, ecc_key* eccKey, WC_RNG* rng)
|
||||
{
|
||||
int sigSz;
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
@@ -6357,7 +6357,7 @@ int wc_SignCert(int requestSz, int sType, byte* buffer, word32 buffSz,
|
||||
|
||||
|
||||
int wc_MakeSelfCert(Cert* cert, byte* buffer, word32 buffSz,
|
||||
RsaKey* key, RNG* rng)
|
||||
RsaKey* key, WC_RNG* rng)
|
||||
{
|
||||
int ret = wc_MakeCert(cert, buffer, buffSz, key, NULL, rng);
|
||||
|
||||
@@ -7589,7 +7589,7 @@ int EncodeOcspRequest(OcspRequest* req)
|
||||
|
||||
extSz = 0;
|
||||
if (req->useNonce) {
|
||||
RNG rng;
|
||||
WC_RNG rng;
|
||||
if (wc_InitRng(&rng) != 0) {
|
||||
WOLFSSL_MSG("\tCannot initialize RNG. Skipping the OSCP Nonce.");
|
||||
} else {
|
||||
|
@@ -46,7 +46,7 @@ const curve25519_set_type curve25519_sets[] = {
|
||||
};
|
||||
|
||||
|
||||
int wc_curve25519_make_key(RNG* rng, int keysize, curve25519_key* key)
|
||||
int wc_curve25519_make_key(WC_RNG* rng, int keysize, curve25519_key* key)
|
||||
{
|
||||
unsigned char basepoint[CURVE25519_KEYSIZE] = {9};
|
||||
int ret;
|
||||
|
@@ -83,7 +83,7 @@ static word32 DiscreteLogWorkFactor(word32 n)
|
||||
}
|
||||
|
||||
|
||||
static int GeneratePrivate(DhKey* key, RNG* rng, byte* priv, word32* privSz)
|
||||
static int GeneratePrivate(DhKey* key, WC_RNG* rng, byte* priv, word32* privSz)
|
||||
{
|
||||
int ret;
|
||||
word32 sz = mp_unsigned_bin_size(&key->p);
|
||||
@@ -132,7 +132,7 @@ static int GeneratePublic(DhKey* key, const byte* priv, word32 privSz,
|
||||
}
|
||||
|
||||
|
||||
int wc_DhGenerateKeyPair(DhKey* key, RNG* rng, byte* priv, word32* privSz,
|
||||
int wc_DhGenerateKeyPair(DhKey* key, WC_RNG* rng, byte* priv, word32* privSz,
|
||||
byte* pub, word32* pubSz)
|
||||
{
|
||||
int ret = GeneratePrivate(key, rng, priv, privSz);
|
||||
|
@@ -85,7 +85,7 @@ void wc_FreeDsaKey(DsaKey* key)
|
||||
|
||||
#ifdef WOLFSSL_KEY_GEN
|
||||
|
||||
int wc_MakeDsaKey(RNG *rng, DsaKey *dsa)
|
||||
int wc_MakeDsaKey(WC_RNG *rng, DsaKey *dsa)
|
||||
{
|
||||
unsigned char *buf;
|
||||
int qsize, err;
|
||||
@@ -146,7 +146,7 @@ int wc_MakeDsaKey(RNG *rng, DsaKey *dsa)
|
||||
}
|
||||
|
||||
/* modulus_size in bits */
|
||||
int wc_MakeDsaParameters(RNG *rng, int modulus_size, DsaKey *dsa)
|
||||
int wc_MakeDsaParameters(WC_RNG *rng, int modulus_size, DsaKey *dsa)
|
||||
{
|
||||
mp_int tmp, tmp2;
|
||||
int err, msize, qsize,
|
||||
@@ -341,7 +341,7 @@ int wc_MakeDsaParameters(RNG *rng, int modulus_size, DsaKey *dsa)
|
||||
#endif /* WOLFSSL_KEY_GEN */
|
||||
|
||||
|
||||
int wc_DsaSign(const byte* digest, byte* out, DsaKey* key, RNG* rng)
|
||||
int wc_DsaSign(const byte* digest, byte* out, DsaKey* key, WC_RNG* rng)
|
||||
{
|
||||
mp_int k, kInv, r, s, H;
|
||||
int ret, sz;
|
||||
|
@@ -1652,7 +1652,7 @@ int wc_ecc_point_is_at_infinity(ecc_point* p)
|
||||
}
|
||||
|
||||
|
||||
static int wc_ecc_make_key_ex(RNG* rng, ecc_key* key, const ecc_set_type* dp)
|
||||
static int wc_ecc_make_key_ex(WC_RNG* rng, ecc_key* key, const ecc_set_type* dp)
|
||||
{
|
||||
int err;
|
||||
ecc_point* base;
|
||||
@@ -1775,7 +1775,7 @@ static int wc_ecc_make_key_ex(RNG* rng, ecc_key* key, const ecc_set_type* dp)
|
||||
return MP_OKAY if successful,
|
||||
upon error all allocated memory will be freed
|
||||
*/
|
||||
int wc_ecc_make_key(RNG* rng, int keysize, ecc_key* key)
|
||||
int wc_ecc_make_key(WC_RNG* rng, int keysize, ecc_key* key)
|
||||
{
|
||||
int x, err;
|
||||
|
||||
@@ -1835,7 +1835,7 @@ int wc_ecc_init(ecc_key* key)
|
||||
return MP_OKAY if successful
|
||||
*/
|
||||
int wc_ecc_sign_hash(const byte* in, word32 inlen, byte* out, word32 *outlen,
|
||||
RNG* rng, ecc_key* key)
|
||||
WC_RNG* rng, ecc_key* key)
|
||||
{
|
||||
mp_int r;
|
||||
mp_int s;
|
||||
@@ -1870,7 +1870,7 @@ int wc_ecc_sign_hash(const byte* in, word32 inlen, byte* out, word32 *outlen,
|
||||
s [out] The destination for s component of the signature
|
||||
return MP_OKAY if successful
|
||||
*/
|
||||
int wc_ecc_sign_hash_ex(const byte* in, word32 inlen, RNG* rng,
|
||||
int wc_ecc_sign_hash_ex(const byte* in, word32 inlen, WC_RNG* rng,
|
||||
ecc_key* key, mp_int *r, mp_int *s)
|
||||
{
|
||||
mp_int e;
|
||||
@@ -4834,7 +4834,7 @@ int wc_ecc_ctx_set_peer_salt(ecEncCtx* ctx, const byte* salt)
|
||||
}
|
||||
|
||||
|
||||
static int ecc_ctx_set_salt(ecEncCtx* ctx, int flags, RNG* rng)
|
||||
static int ecc_ctx_set_salt(ecEncCtx* ctx, int flags, WC_RNG* rng)
|
||||
{
|
||||
byte* saltBuffer = NULL;
|
||||
|
||||
@@ -4866,7 +4866,7 @@ static void ecc_ctx_init(ecEncCtx* ctx, int flags)
|
||||
|
||||
|
||||
/* allow ecc context reset so user doesn't have to init/free for resue */
|
||||
int wc_ecc_ctx_reset(ecEncCtx* ctx, RNG* rng)
|
||||
int wc_ecc_ctx_reset(ecEncCtx* ctx, WC_RNG* rng)
|
||||
{
|
||||
if (ctx == NULL || rng == NULL)
|
||||
return BAD_FUNC_ARG;
|
||||
@@ -4877,7 +4877,7 @@ int wc_ecc_ctx_reset(ecEncCtx* ctx, RNG* rng)
|
||||
|
||||
|
||||
/* alloc/init and set defaults, return new Context */
|
||||
ecEncCtx* wc_ecc_ctx_new(int flags, RNG* rng)
|
||||
ecEncCtx* wc_ecc_ctx_new(int flags, WC_RNG* rng)
|
||||
{
|
||||
int ret = 0;
|
||||
ecEncCtx* ctx = (ecEncCtx*)XMALLOC(sizeof(ecEncCtx), 0, DYNAMIC_TYPE_ECC);
|
||||
|
@@ -42,7 +42,7 @@
|
||||
/* generate an ed25519 key pair.
|
||||
* returns 0 on success
|
||||
*/
|
||||
int wc_ed25519_make_key(RNG* rng, int keySz, ed25519_key* key)
|
||||
int wc_ed25519_make_key(WC_RNG* rng, int keySz, ed25519_key* key)
|
||||
{
|
||||
byte az[ED25519_PRV_KEY_SIZE];
|
||||
int ret;
|
||||
|
@@ -4284,7 +4284,7 @@ static int mp_prime_is_divisible (mp_int * a, int *result)
|
||||
|
||||
static const int USE_BBS = 1;
|
||||
|
||||
int mp_rand_prime(mp_int* N, int len, RNG* rng, void* heap)
|
||||
int mp_rand_prime(mp_int* N, int len, WC_RNG* rng, void* heap)
|
||||
{
|
||||
int err, res, type;
|
||||
byte* buf;
|
||||
|
@@ -945,7 +945,7 @@ int wc_PKCS7_VerifySignedData(PKCS7* pkcs7, byte* pkiMsg, word32 pkiMsgSz)
|
||||
/* create ASN.1 fomatted RecipientInfo structure, returns sequence size */
|
||||
WOLFSSL_LOCAL int wc_CreateRecipientInfo(const byte* cert, word32 certSz,
|
||||
int keyEncAlgo, int blockKeySz,
|
||||
RNG* rng, byte* contentKeyPlain,
|
||||
WC_RNG* rng, byte* contentKeyPlain,
|
||||
byte* contentKeyEnc,
|
||||
int* keyEncSz, byte* out, word32 outSz)
|
||||
{
|
||||
@@ -1178,7 +1178,7 @@ int wc_PKCS7_EncodeEnvelopedData(PKCS7* pkcs7, byte* output, word32 outputSz)
|
||||
byte envDataSeq[MAX_SEQ_SZ];
|
||||
byte ver[MAX_VERSION_SZ];
|
||||
|
||||
RNG rng;
|
||||
WC_RNG rng;
|
||||
int contentKeyEncSz, blockKeySz;
|
||||
byte contentKeyPlain[MAX_CONTENT_KEY_LEN];
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
|
@@ -39,33 +39,33 @@ int wc_GenerateSeed(OS_Seed* os, byte* seed, word32 sz)
|
||||
}
|
||||
|
||||
#ifdef HAVE_CAVIUM
|
||||
int wc_InitRngCavium(RNG* rng, int i)
|
||||
int wc_InitRngCavium(WC_RNG* rng, int i)
|
||||
{
|
||||
return InitRngCavium(rng, i);
|
||||
}
|
||||
#endif
|
||||
|
||||
|
||||
int wc_InitRng(RNG* rng)
|
||||
int wc_InitRng(WC_RNG* rng)
|
||||
{
|
||||
return InitRng_fips(rng);
|
||||
}
|
||||
|
||||
|
||||
int wc_RNG_GenerateBlock(RNG* rng, byte* b, word32 sz)
|
||||
int wc_RNG_GenerateBlock(WC_RNG* rng, byte* b, word32 sz)
|
||||
{
|
||||
return RNG_GenerateBlock_fips(rng, b, sz);
|
||||
}
|
||||
|
||||
|
||||
int wc_RNG_GenerateByte(RNG* rng, byte* b)
|
||||
int wc_RNG_GenerateByte(WC_RNG* rng, byte* b)
|
||||
{
|
||||
return RNG_GenerateByte(rng, b);
|
||||
}
|
||||
|
||||
#if defined(HAVE_HASHDRBG) || defined(NO_RC4)
|
||||
|
||||
int wc_FreeRng(RNG* rng)
|
||||
int wc_FreeRng(WC_RNG* rng)
|
||||
{
|
||||
return FreeRng_fips(rng);
|
||||
}
|
||||
@@ -434,7 +434,7 @@ static int Hash_DRBG_Uninstantiate(DRBG* drbg)
|
||||
|
||||
|
||||
/* Get seed and key cipher */
|
||||
int wc_InitRng(RNG* rng)
|
||||
int wc_InitRng(WC_RNG* rng)
|
||||
{
|
||||
int ret = BAD_FUNC_ARG;
|
||||
|
||||
@@ -487,7 +487,7 @@ int wc_InitRng(RNG* rng)
|
||||
|
||||
|
||||
/* place a generated block in output */
|
||||
int wc_RNG_GenerateBlock(RNG* rng, byte* output, word32 sz)
|
||||
int wc_RNG_GenerateBlock(WC_RNG* rng, byte* output, word32 sz)
|
||||
{
|
||||
int ret;
|
||||
|
||||
@@ -536,13 +536,13 @@ int wc_RNG_GenerateBlock(RNG* rng, byte* output, word32 sz)
|
||||
}
|
||||
|
||||
|
||||
int wc_RNG_GenerateByte(RNG* rng, byte* b)
|
||||
int wc_RNG_GenerateByte(WC_RNG* rng, byte* b)
|
||||
{
|
||||
return wc_RNG_GenerateBlock(rng, b, 1);
|
||||
}
|
||||
|
||||
|
||||
int wc_FreeRng(RNG* rng)
|
||||
int wc_FreeRng(WC_RNG* rng)
|
||||
{
|
||||
int ret = BAD_FUNC_ARG;
|
||||
|
||||
@@ -687,7 +687,7 @@ static int wc_RNG_HealthTestLocal(int reseed)
|
||||
#else /* HAVE_HASHDRBG || NO_RC4 */
|
||||
|
||||
/* Get seed and key cipher */
|
||||
int wc_InitRng(RNG* rng)
|
||||
int wc_InitRng(WC_RNG* rng)
|
||||
{
|
||||
int ret;
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
@@ -736,11 +736,11 @@ int wc_InitRng(RNG* rng)
|
||||
}
|
||||
|
||||
#ifdef HAVE_CAVIUM
|
||||
static void CaviumRNG_GenerateBlock(RNG* rng, byte* output, word32 sz);
|
||||
static void CaviumRNG_GenerateBlock(WC_RNG* rng, byte* output, word32 sz);
|
||||
#endif
|
||||
|
||||
/* place a generated block in output */
|
||||
int wc_RNG_GenerateBlock(RNG* rng, byte* output, word32 sz)
|
||||
int wc_RNG_GenerateBlock(WC_RNG* rng, byte* output, word32 sz)
|
||||
{
|
||||
#ifdef HAVE_INTEL_RDGEN
|
||||
if(IS_INTEL_RDRAND)
|
||||
@@ -757,13 +757,13 @@ int wc_RNG_GenerateBlock(RNG* rng, byte* output, word32 sz)
|
||||
}
|
||||
|
||||
|
||||
int wc_RNG_GenerateByte(RNG* rng, byte* b)
|
||||
int wc_RNG_GenerateByte(WC_RNG* rng, byte* b)
|
||||
{
|
||||
return wc_RNG_GenerateBlock(rng, b, 1);
|
||||
}
|
||||
|
||||
|
||||
int wc_FreeRng(RNG* rng)
|
||||
int wc_FreeRng(WC_RNG* rng)
|
||||
{
|
||||
(void)rng;
|
||||
return 0;
|
||||
@@ -776,7 +776,7 @@ int wc_FreeRng(RNG* rng)
|
||||
#include "cavium_common.h"
|
||||
|
||||
/* Initiliaze RNG for use with Nitrox device */
|
||||
int wc_InitRngCavium(RNG* rng, int devId)
|
||||
int wc_InitRngCavium(WC_RNG* rng, int devId)
|
||||
{
|
||||
if (rng == NULL)
|
||||
return -1;
|
||||
@@ -788,7 +788,7 @@ int wc_InitRngCavium(RNG* rng, int devId)
|
||||
}
|
||||
|
||||
|
||||
static void CaviumRNG_GenerateBlock(RNG* rng, byte* output, word32 sz)
|
||||
static void CaviumRNG_GenerateBlock(WC_RNG* rng, byte* output, word32 sz)
|
||||
{
|
||||
wolfssl_word offset = 0;
|
||||
word32 requestId;
|
||||
|
@@ -43,7 +43,7 @@ int wc_FreeRsaKey(RsaKey* key)
|
||||
|
||||
|
||||
int wc_RsaPublicEncrypt(const byte* in, word32 inLen, byte* out,
|
||||
word32 outLen, RsaKey* key, RNG* rng)
|
||||
word32 outLen, RsaKey* key, WC_RNG* rng)
|
||||
{
|
||||
return RsaPublicEncrypt_fips(in, inLen, out, outLen, key, rng);
|
||||
}
|
||||
@@ -64,7 +64,7 @@ int wc_RsaPrivateDecrypt(const byte* in, word32 inLen, byte* out,
|
||||
|
||||
|
||||
int wc_RsaSSL_Sign(const byte* in, word32 inLen, byte* out,
|
||||
word32 outLen, RsaKey* key, RNG* rng)
|
||||
word32 outLen, RsaKey* key, WC_RNG* rng)
|
||||
{
|
||||
return RsaSSL_Sign_fips(in, inLen, out, outLen, key, rng);
|
||||
}
|
||||
@@ -96,7 +96,7 @@ int wc_RsaFlattenPublicKey(RsaKey* key, byte* a, word32* aSz, byte* b,
|
||||
return RsaFlattenPublicKey(key, a, aSz, b, bSz);
|
||||
}
|
||||
#ifdef WOLFSSL_KEY_GEN
|
||||
int wc_MakeRsaKey(RsaKey* key, int size, long e, RNG* rng)
|
||||
int wc_MakeRsaKey(RsaKey* key, int size, long e, WC_RNG* rng)
|
||||
{
|
||||
return MakeRsaKey(key, size, e, rng);
|
||||
}
|
||||
@@ -219,7 +219,7 @@ int wc_FreeRsaKey(RsaKey* key)
|
||||
}
|
||||
|
||||
static int wc_RsaPad(const byte* input, word32 inputLen, byte* pkcsBlock,
|
||||
word32 pkcsBlockLen, byte padValue, RNG* rng)
|
||||
word32 pkcsBlockLen, byte padValue, WC_RNG* rng)
|
||||
{
|
||||
if (inputLen == 0)
|
||||
return 0;
|
||||
@@ -391,7 +391,7 @@ done:
|
||||
|
||||
|
||||
int wc_RsaPublicEncrypt(const byte* in, word32 inLen, byte* out, word32 outLen,
|
||||
RsaKey* key, RNG* rng)
|
||||
RsaKey* key, WC_RNG* rng)
|
||||
{
|
||||
int sz, ret;
|
||||
|
||||
@@ -537,7 +537,7 @@ int wc_RsaSSL_Verify(const byte* in, word32 inLen, byte* out, word32 outLen,
|
||||
|
||||
/* for Rsa Sign */
|
||||
int wc_RsaSSL_Sign(const byte* in, word32 inLen, byte* out, word32 outLen,
|
||||
RsaKey* key, RNG* rng)
|
||||
RsaKey* key, WC_RNG* rng)
|
||||
{
|
||||
int sz, ret;
|
||||
|
||||
@@ -604,7 +604,7 @@ int wc_RsaFlattenPublicKey(RsaKey* key, byte* e, word32* eSz, byte* n,
|
||||
|
||||
#ifdef WOLFSSL_KEY_GEN
|
||||
/* Make an RSA key for size bits, with e specified, 65537 is a good e */
|
||||
int wc_MakeRsaKey(RsaKey* key, int size, long e, RNG* rng)
|
||||
int wc_MakeRsaKey(RsaKey* key, int size, long e, WC_RNG* rng)
|
||||
{
|
||||
mp_int p, q, tmp1, tmp2, tmp3;
|
||||
int err;
|
||||
|
@@ -404,7 +404,7 @@ int wc_SrpSetPrivate(Srp* srp, const byte* private, word32 size)
|
||||
/** Generates random data using wolfcrypt RNG. */
|
||||
static int wc_SrpGenPrivate(Srp* srp, byte* private, word32 size)
|
||||
{
|
||||
RNG rng;
|
||||
WC_RNG rng;
|
||||
int r = wc_InitRng(&rng);
|
||||
|
||||
if (!r) r = wc_RNG_GenerateBlock(&rng, private, size);
|
||||
|
@@ -2412,7 +2412,7 @@ int mp_mod_d(fp_int *a, fp_digit b, fp_digit *c)
|
||||
void fp_gcd(fp_int *a, fp_int *b, fp_int *c);
|
||||
void fp_lcm(fp_int *a, fp_int *b, fp_int *c);
|
||||
int fp_isprime(fp_int *a);
|
||||
int fp_randprime(fp_int* N, int len, RNG* rng, void* heap);
|
||||
int fp_randprime(fp_int* N, int len, WC_RNG* rng, void* heap);
|
||||
|
||||
int mp_gcd(fp_int *a, fp_int *b, fp_int *c)
|
||||
{
|
||||
@@ -2435,7 +2435,7 @@ int mp_prime_is_prime(mp_int* a, int t, int* result)
|
||||
return MP_OKAY;
|
||||
}
|
||||
|
||||
int mp_rand_prime(mp_int* N, int len, RNG* rng, void* heap)
|
||||
int mp_rand_prime(mp_int* N, int len, WC_RNG* rng, void* heap)
|
||||
{
|
||||
int err;
|
||||
|
||||
@@ -2589,7 +2589,7 @@ int fp_isprime(fp_int *a)
|
||||
return FP_YES;
|
||||
}
|
||||
|
||||
int fp_randprime(fp_int* N, int len, RNG* rng, void* heap)
|
||||
int fp_randprime(fp_int* N, int len, WC_RNG* rng, void* heap)
|
||||
{
|
||||
static const int USE_BBS = 1;
|
||||
int err, type;
|
||||
|
@@ -3253,7 +3253,7 @@ int random_test(void)
|
||||
|
||||
int random_test(void)
|
||||
{
|
||||
RNG rng;
|
||||
WC_RNG rng;
|
||||
byte block[32];
|
||||
int ret;
|
||||
|
||||
@@ -3281,7 +3281,7 @@ byte GetEntropy(ENTROPY_CMD cmd, byte* out);
|
||||
|
||||
byte GetEntropy(ENTROPY_CMD cmd, byte* out)
|
||||
{
|
||||
static RNG rng;
|
||||
static WC_RNG rng;
|
||||
|
||||
if (cmd == INIT)
|
||||
return (wc_InitRng(&rng) == 0) ? 1 : 0;
|
||||
@@ -3353,7 +3353,7 @@ int rsa_test(void)
|
||||
byte* tmp;
|
||||
size_t bytes;
|
||||
RsaKey key;
|
||||
RNG rng;
|
||||
WC_RNG rng;
|
||||
word32 idx = 0;
|
||||
int ret;
|
||||
byte in[] = "Everyone gets Friday off.";
|
||||
@@ -4308,7 +4308,7 @@ int dh_test(void)
|
||||
byte agree2[256];
|
||||
DhKey key;
|
||||
DhKey key2;
|
||||
RNG rng;
|
||||
WC_RNG rng;
|
||||
|
||||
#ifdef USE_CERT_BUFFERS_1024
|
||||
XMEMCPY(tmp, dh_key_der_1024, sizeof_dh_key_der_1024);
|
||||
@@ -4397,7 +4397,7 @@ int dsa_test(void)
|
||||
word32 idx = 0;
|
||||
byte tmp[1024];
|
||||
DsaKey key;
|
||||
RNG rng;
|
||||
WC_RNG rng;
|
||||
Sha sha;
|
||||
byte hash[SHA_DIGEST_SIZE];
|
||||
byte signature[40];
|
||||
@@ -5108,7 +5108,7 @@ typedef struct rawEccVector {
|
||||
|
||||
int ecc_test(void)
|
||||
{
|
||||
RNG rng;
|
||||
WC_RNG rng;
|
||||
byte sharedA[1024];
|
||||
byte sharedB[1024];
|
||||
byte sig[1024];
|
||||
@@ -5364,7 +5364,7 @@ int ecc_test(void)
|
||||
|
||||
int ecc_encrypt_test(void)
|
||||
{
|
||||
RNG rng;
|
||||
WC_RNG rng;
|
||||
int ret;
|
||||
ecc_key userA, userB;
|
||||
byte msg[48];
|
||||
@@ -5499,7 +5499,7 @@ int ecc_encrypt_test(void)
|
||||
|
||||
int curve25519_test(void)
|
||||
{
|
||||
RNG rng;
|
||||
WC_RNG rng;
|
||||
byte sharedA[32];
|
||||
byte sharedB[32];
|
||||
byte exportBuf[32];
|
||||
@@ -5662,7 +5662,7 @@ int curve25519_test(void)
|
||||
#ifdef HAVE_ED25519
|
||||
int ed25519_test(void)
|
||||
{
|
||||
RNG rng;
|
||||
WC_RNG rng;
|
||||
byte out[ED25519_SIG_SIZE];
|
||||
byte exportPKey[ED25519_KEY_SIZE];
|
||||
byte exportSKey[ED25519_KEY_SIZE];
|
||||
@@ -6312,8 +6312,8 @@ int pkcs7signed_test(void)
|
||||
byte* out;
|
||||
char data[] = "Hello World";
|
||||
word32 dataSz, outSz, certDerSz, keyDerSz;
|
||||
PKCS7 msg;
|
||||
RNG rng;
|
||||
PKCS7 msg;
|
||||
WC_RNG rng;
|
||||
|
||||
byte transIdOid[] =
|
||||
{ 0x06, 0x0a, 0x60, 0x86, 0x48, 0x01, 0x86, 0xF8, 0x45, 0x01,
|
||||
|
@@ -2221,7 +2221,7 @@ struct WOLFSSL {
|
||||
HS_Hashes* hsHashes;
|
||||
void* IOCB_ReadCtx;
|
||||
void* IOCB_WriteCtx;
|
||||
RNG* rng;
|
||||
WC_RNG* rng;
|
||||
void* verifyCbCtx; /* cert verify callback user ctx*/
|
||||
VerifyCallback verifyCallback; /* cert verification callback */
|
||||
void* heap; /* for user overrides */
|
||||
|
@@ -1606,7 +1606,7 @@ static INLINE void FreeAtomicUser(WOLFSSL* ssl)
|
||||
static INLINE int myEccSign(WOLFSSL* ssl, const byte* in, word32 inSz,
|
||||
byte* out, word32* outSz, const byte* key, word32 keySz, void* ctx)
|
||||
{
|
||||
RNG rng;
|
||||
WC_RNG rng;
|
||||
int ret;
|
||||
word32 idx = 0;
|
||||
ecc_key myKey;
|
||||
@@ -1657,7 +1657,7 @@ static INLINE int myEccVerify(WOLFSSL* ssl, const byte* sig, word32 sigSz,
|
||||
static INLINE int myRsaSign(WOLFSSL* ssl, const byte* in, word32 inSz,
|
||||
byte* out, word32* outSz, const byte* key, word32 keySz, void* ctx)
|
||||
{
|
||||
RNG rng;
|
||||
WC_RNG rng;
|
||||
int ret;
|
||||
word32 idx = 0;
|
||||
RsaKey myKey;
|
||||
@@ -1715,7 +1715,7 @@ static INLINE int myRsaEnc(WOLFSSL* ssl, const byte* in, word32 inSz,
|
||||
int ret;
|
||||
word32 idx = 0;
|
||||
RsaKey myKey;
|
||||
RNG rng;
|
||||
WC_RNG rng;
|
||||
|
||||
(void)ssl;
|
||||
(void)ctx;
|
||||
@@ -1820,8 +1820,8 @@ static INLINE const char* mymktemp(char *tempfn, int len, int num)
|
||||
int x, size;
|
||||
static const char alphanum[] = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ"
|
||||
"abcdefghijklmnopqrstuvwxyz";
|
||||
RNG rng;
|
||||
byte out;
|
||||
WC_RNG rng;
|
||||
byte out;
|
||||
|
||||
if (tempfn == NULL || len < 1 || num < 1 || len <= num) {
|
||||
printf("Bad input\n");
|
||||
@@ -1862,7 +1862,7 @@ static INLINE const char* mymktemp(char *tempfn, int len, int num)
|
||||
} key_ctx;
|
||||
|
||||
static key_ctx myKey_ctx;
|
||||
static RNG rng;
|
||||
static WC_RNG rng;
|
||||
|
||||
static INLINE int TicketInit(void)
|
||||
{
|
||||
|
@@ -149,15 +149,15 @@ typedef struct Cert {
|
||||
*/
|
||||
WOLFSSL_API void wc_InitCert(Cert*);
|
||||
WOLFSSL_API int wc_MakeCert(Cert*, byte* derBuffer, word32 derSz, RsaKey*,
|
||||
ecc_key*, RNG*);
|
||||
ecc_key*, WC_RNG*);
|
||||
#ifdef WOLFSSL_CERT_REQ
|
||||
WOLFSSL_API int wc_MakeCertReq(Cert*, byte* derBuffer, word32 derSz,
|
||||
RsaKey*, ecc_key*);
|
||||
#endif
|
||||
WOLFSSL_API int wc_SignCert(int requestSz, int sigType, byte* derBuffer,
|
||||
word32 derSz, RsaKey*, ecc_key*, RNG*);
|
||||
word32 derSz, RsaKey*, ecc_key*, WC_RNG*);
|
||||
WOLFSSL_API int wc_MakeSelfCert(Cert*, byte* derBuffer, word32 derSz, RsaKey*,
|
||||
RNG*);
|
||||
WC_RNG*);
|
||||
WOLFSSL_API int wc_SetIssuer(Cert*, const char*);
|
||||
WOLFSSL_API int wc_SetSubject(Cert*, const char*);
|
||||
#ifdef WOLFSSL_ALT_NAMES
|
||||
@@ -170,7 +170,8 @@ WOLFSSL_API int wc_SetDatesBuffer(Cert*, const byte*, int);
|
||||
|
||||
#ifdef HAVE_NTRU
|
||||
WOLFSSL_API int wc_MakeNtruCert(Cert*, byte* derBuffer, word32 derSz,
|
||||
const byte* ntruKey, word16 keySz, RNG*);
|
||||
const byte* ntruKey, word16 keySz,
|
||||
WC_RNG*);
|
||||
#endif
|
||||
|
||||
#endif /* WOLFSSL_CERT_GEN */
|
||||
|
@@ -65,7 +65,7 @@ enum {
|
||||
};
|
||||
|
||||
WOLFSSL_API
|
||||
int wc_curve25519_make_key(RNG* rng, int keysize, curve25519_key* key);
|
||||
int wc_curve25519_make_key(WC_RNG* rng, int keysize, curve25519_key* key);
|
||||
|
||||
WOLFSSL_API
|
||||
int wc_curve25519_shared_secret(curve25519_key* private_key,
|
||||
|
@@ -43,7 +43,7 @@ typedef struct DhKey {
|
||||
WOLFSSL_API void wc_InitDhKey(DhKey* key);
|
||||
WOLFSSL_API void wc_FreeDhKey(DhKey* key);
|
||||
|
||||
WOLFSSL_API int wc_DhGenerateKeyPair(DhKey* key, RNG* rng, byte* priv,
|
||||
WOLFSSL_API int wc_DhGenerateKeyPair(DhKey* key, WC_RNG* rng, byte* priv,
|
||||
word32* privSz, byte* pub, word32* pubSz);
|
||||
WOLFSSL_API int wc_DhAgree(DhKey* key, byte* agree, word32* agreeSz,
|
||||
const byte* priv, word32 privSz, const byte* otherPub,
|
||||
|
@@ -57,7 +57,7 @@ typedef struct DsaKey {
|
||||
WOLFSSL_API void wc_InitDsaKey(DsaKey* key);
|
||||
WOLFSSL_API void wc_FreeDsaKey(DsaKey* key);
|
||||
WOLFSSL_API int wc_DsaSign(const byte* digest, byte* out,
|
||||
DsaKey* key, RNG* rng);
|
||||
DsaKey* key, WC_RNG* rng);
|
||||
WOLFSSL_API int wc_DsaVerify(const byte* digest, const byte* sig,
|
||||
DsaKey* key, int* answer);
|
||||
WOLFSSL_API int wc_DsaPublicKeyDecode(const byte* input, word32* inOutIdx,
|
||||
@@ -67,8 +67,8 @@ WOLFSSL_API int wc_DsaPrivateKeyDecode(const byte* input, word32* inOutIdx,
|
||||
WOLFSSL_API int wc_DsaKeyToDer(DsaKey* key, byte* output, word32 inLen);
|
||||
|
||||
#ifdef WOLFSSL_KEY_GEN
|
||||
WOLFSSL_API int wc_MakeDsaKey(RNG *rng, DsaKey *dsa);
|
||||
WOLFSSL_API int wc_MakeDsaParameters(RNG *rng, int modulus_size, DsaKey *dsa);
|
||||
WOLFSSL_API int wc_MakeDsaKey(WC_RNG *rng, DsaKey *dsa);
|
||||
WOLFSSL_API int wc_MakeDsaParameters(WC_RNG *rng, int modulus_size, DsaKey *dsa);
|
||||
#endif
|
||||
|
||||
#ifdef __cplusplus
|
||||
|
@@ -134,7 +134,7 @@ extern const ecc_set_type ecc_sets[];
|
||||
|
||||
|
||||
WOLFSSL_API
|
||||
int wc_ecc_make_key(RNG* rng, int keysize, ecc_key* key);
|
||||
int wc_ecc_make_key(WC_RNG* rng, int keysize, ecc_key* key);
|
||||
WOLFSSL_API
|
||||
int wc_ecc_check_key(ecc_key* key);
|
||||
WOLFSSL_API
|
||||
@@ -145,9 +145,9 @@ int wc_ecc_shared_secret_ssh(ecc_key* private_key, ecc_point* point,
|
||||
byte* out, word32 *outlen);
|
||||
WOLFSSL_API
|
||||
int wc_ecc_sign_hash(const byte* in, word32 inlen, byte* out, word32 *outlen,
|
||||
RNG* rng, ecc_key* key);
|
||||
WC_RNG* rng, ecc_key* key);
|
||||
WOLFSSL_API
|
||||
int wc_ecc_sign_hash_ex(const byte* in, word32 inlen, RNG* rng,
|
||||
int wc_ecc_sign_hash_ex(const byte* in, word32 inlen, WC_RNG* rng,
|
||||
ecc_key* key, mp_int *r, mp_int *s);
|
||||
WOLFSSL_API
|
||||
int wc_ecc_verify_hash(const byte* sig, word32 siglen, const byte* hash,
|
||||
@@ -248,11 +248,11 @@ enum ecFlags {
|
||||
typedef struct ecEncCtx ecEncCtx;
|
||||
|
||||
WOLFSSL_API
|
||||
ecEncCtx* wc_ecc_ctx_new(int flags, RNG* rng);
|
||||
ecEncCtx* wc_ecc_ctx_new(int flags, WC_RNG* rng);
|
||||
WOLFSSL_API
|
||||
void wc_ecc_ctx_free(ecEncCtx*);
|
||||
WOLFSSL_API
|
||||
int wc_ecc_ctx_reset(ecEncCtx*, RNG*); /* reset for use again w/o alloc/free */
|
||||
int wc_ecc_ctx_reset(ecEncCtx*, WC_RNG*); /* reset for use again w/o alloc/free */
|
||||
|
||||
WOLFSSL_API
|
||||
const byte* wc_ecc_ctx_get_own_salt(ecEncCtx*);
|
||||
|
@@ -61,7 +61,7 @@ typedef struct {
|
||||
|
||||
|
||||
WOLFSSL_API
|
||||
int wc_ed25519_make_key(RNG* rng, int keysize, ed25519_key* key);
|
||||
int wc_ed25519_make_key(WC_RNG* rng, int keysize, ed25519_key* key);
|
||||
WOLFSSL_API
|
||||
int wc_ed25519_sign_msg(const byte* in, word32 inlen, byte* out,
|
||||
word32 *outlen, ed25519_key* key);
|
||||
|
@@ -315,7 +315,7 @@ int mp_radix_size (mp_int * a, int radix, int *size);
|
||||
int mp_prime_is_prime (mp_int * a, int t, int *result);
|
||||
int mp_gcd (mp_int * a, mp_int * b, mp_int * c);
|
||||
int mp_lcm (mp_int * a, mp_int * b, mp_int * c);
|
||||
int mp_rand_prime(mp_int* N, int len, RNG* rng, void* heap);
|
||||
int mp_rand_prime(mp_int* N, int len, WC_RNG* rng, void* heap);
|
||||
#endif
|
||||
|
||||
int mp_cnt_lsb(mp_int *a);
|
||||
|
@@ -73,7 +73,7 @@ typedef struct PKCS7 {
|
||||
word32 contentSz; /* content size */
|
||||
int contentOID; /* PKCS#7 content type OID sum */
|
||||
|
||||
RNG* rng;
|
||||
WC_RNG* rng;
|
||||
|
||||
int hashOID;
|
||||
int encryptOID; /* key encryption algorithm OID */
|
||||
@@ -100,7 +100,7 @@ WOLFSSL_LOCAL int wc_GetContentType(const byte* input, word32* inOutIdx,
|
||||
word32* oid, word32 maxIdx);
|
||||
WOLFSSL_LOCAL int wc_CreateRecipientInfo(const byte* cert, word32 certSz,
|
||||
int keyEncAlgo, int blockKeySz,
|
||||
RNG* rng, byte* contentKeyPlain,
|
||||
WC_RNG* rng, byte* contentKeyPlain,
|
||||
byte* contentKeyEnc,
|
||||
int* keyEncSz, byte* out, word32 outSz);
|
||||
|
||||
|
@@ -84,11 +84,11 @@ struct DRBG; /* Private DRBG state */
|
||||
|
||||
|
||||
/* Hash-based Deterministic Random Bit Generator */
|
||||
typedef struct RNG {
|
||||
typedef struct WC_RNG {
|
||||
struct DRBG* drbg;
|
||||
OS_Seed seed;
|
||||
byte status;
|
||||
} RNG;
|
||||
} WC_RNG;
|
||||
|
||||
|
||||
#else /* HAVE_HASHDRBG || NO_RC4 */
|
||||
@@ -99,36 +99,42 @@ typedef struct RNG {
|
||||
/* secure Random Number Generator */
|
||||
|
||||
|
||||
typedef struct RNG {
|
||||
typedef struct WC_RNG {
|
||||
OS_Seed seed;
|
||||
Arc4 cipher;
|
||||
#ifdef HAVE_CAVIUM
|
||||
int devId; /* nitrox device id */
|
||||
word32 magic; /* using cavium magic */
|
||||
#endif
|
||||
} RNG;
|
||||
} WC_RNG;
|
||||
|
||||
|
||||
#endif /* HAVE_HASH_DRBG || NO_RC4 */
|
||||
|
||||
#endif /* HAVE_FIPS */
|
||||
|
||||
/* NO_OLD_RNGNAME removes RNG struct name to prevent possible type conflicts,
|
||||
* can't be used with CTaoCrypt FIPS */
|
||||
#if !defined(NO_OLD_RNGNAME) && !defined(HAVE_FIPS)
|
||||
#define RNG WC_RNG
|
||||
#endif
|
||||
|
||||
WOLFSSL_LOCAL
|
||||
int wc_GenerateSeed(OS_Seed* os, byte* seed, word32 sz);
|
||||
|
||||
#if defined(HAVE_HASHDRBG) || defined(NO_RC4)
|
||||
|
||||
#ifdef HAVE_CAVIUM
|
||||
WOLFSSL_API int wc_InitRngCavium(RNG*, int);
|
||||
WOLFSSL_API int wc_InitRngCavium(WC_RNG*, int);
|
||||
#endif
|
||||
|
||||
#endif /* HAVE_HASH_DRBG || NO_RC4 */
|
||||
|
||||
|
||||
WOLFSSL_API int wc_InitRng(RNG*);
|
||||
WOLFSSL_API int wc_RNG_GenerateBlock(RNG*, byte*, word32 sz);
|
||||
WOLFSSL_API int wc_RNG_GenerateByte(RNG*, byte*);
|
||||
WOLFSSL_API int wc_FreeRng(RNG*);
|
||||
WOLFSSL_API int wc_InitRng(WC_RNG*);
|
||||
WOLFSSL_API int wc_RNG_GenerateBlock(WC_RNG*, byte*, word32 sz);
|
||||
WOLFSSL_API int wc_RNG_GenerateByte(WC_RNG*, byte*);
|
||||
WOLFSSL_API int wc_FreeRng(WC_RNG*);
|
||||
|
||||
|
||||
#if defined(HAVE_HASHDRBG) || defined(NO_RC4)
|
||||
|
@@ -77,13 +77,13 @@ WOLFSSL_API int wc_InitRsaKey(RsaKey* key, void*);
|
||||
WOLFSSL_API int wc_FreeRsaKey(RsaKey* key);
|
||||
|
||||
WOLFSSL_API int wc_RsaPublicEncrypt(const byte* in, word32 inLen, byte* out,
|
||||
word32 outLen, RsaKey* key, RNG* rng);
|
||||
word32 outLen, RsaKey* key, WC_RNG* rng);
|
||||
WOLFSSL_API int wc_RsaPrivateDecryptInline(byte* in, word32 inLen, byte** out,
|
||||
RsaKey* key);
|
||||
WOLFSSL_API int wc_RsaPrivateDecrypt(const byte* in, word32 inLen, byte* out,
|
||||
word32 outLen, RsaKey* key);
|
||||
WOLFSSL_API int wc_RsaSSL_Sign(const byte* in, word32 inLen, byte* out,
|
||||
word32 outLen, RsaKey* key, RNG* rng);
|
||||
word32 outLen, RsaKey* key, WC_RNG* rng);
|
||||
WOLFSSL_API int wc_RsaSSL_VerifyInline(byte* in, word32 inLen, byte** out,
|
||||
RsaKey* key);
|
||||
WOLFSSL_API int wc_RsaSSL_Verify(const byte* in, word32 inLen, byte* out,
|
||||
@@ -105,7 +105,7 @@ WOLFSSL_API int wc_RsaFlattenPublicKey(RsaKey*, byte*, word32*, byte*,
|
||||
word32*);
|
||||
|
||||
#ifdef WOLFSSL_KEY_GEN
|
||||
WOLFSSL_API int wc_MakeRsaKey(RsaKey* key, int size, long e, RNG* rng);
|
||||
WOLFSSL_API int wc_MakeRsaKey(RsaKey* key, int size, long e, WC_RNG* rng);
|
||||
#endif
|
||||
|
||||
#ifdef HAVE_CAVIUM
|
||||
|
@@ -118,6 +118,12 @@
|
||||
#endif
|
||||
|
||||
|
||||
/* make sure old RNG name is used with CTaoCrypt FIPS */
|
||||
#ifdef HAVE_FIPS
|
||||
#define WC_RNG RNG
|
||||
#endif
|
||||
|
||||
|
||||
#ifdef IPHONE
|
||||
#define SIZEOF_LONG_LONG 8
|
||||
#endif
|
||||
|
@@ -718,7 +718,7 @@ int mp_radix_size (mp_int * a, int radix, int *size);
|
||||
int mp_gcd(fp_int *a, fp_int *b, fp_int *c);
|
||||
int mp_lcm(fp_int *a, fp_int *b, fp_int *c);
|
||||
int mp_prime_is_prime(mp_int* a, int t, int* result);
|
||||
int mp_rand_prime(mp_int* N, int len, RNG* rng, void* heap);
|
||||
int mp_rand_prime(mp_int* N, int len, WC_RNG* rng, void* heap);
|
||||
int mp_exch(mp_int *a, mp_int *b);
|
||||
#endif /* WOLFSSL_KEY_GEN */
|
||||
|
||||
|
Reference in New Issue
Block a user