forked from wolfSSL/wolfssl
addressed review comments
This commit is contained in:
@@ -60,7 +60,7 @@ The example project summary is listed below and is relevant for every project.
|
|||||||
2.) Create a `dummy_application` Renesas RZ/N C/C++ FSP Project.
|
2.) Create a `dummy_application` Renesas RZ/N C/C++ FSP Project.
|
||||||
|
|
||||||
+ Click File->New->`RZ/N C/C++ FSP Project`.
|
+ Click File->New->`RZ/N C/C++ FSP Project`.
|
||||||
+ Enter project name `dummu_application`.
|
+ Enter project name `dummy_application`.
|
||||||
+ Select Board: to `RSK+RZN2L (RAM execution without flash memory)`.
|
+ Select Board: to `RSK+RZN2L (RAM execution without flash memory)`.
|
||||||
+ Select Device: to `R9A07G084M04GBG`. Click Next.
|
+ Select Device: to `R9A07G084M04GBG`. Click Next.
|
||||||
+ Check to `Executable`
|
+ Check to `Executable`
|
||||||
@@ -109,8 +109,10 @@ The example project summary is listed below and is relevant for every project.
|
|||||||
|
|
||||||
## Run `test_RZN2L`
|
## Run `test_RZN2L`
|
||||||
|
|
||||||
1). Right click the project and Select menu Debug -> Renesas GDB Hardware debugging
|
1). Right click the project and Select menu `Debug` -> `Renesas GDB Hardware debugging`
|
||||||
|
|
||||||
2). Select J-Link ARM and R9A07G084M04
|
2). Select J-Link ARM and R9A07G084M04
|
||||||
|
|
||||||
3). Break at Entory point. Change `cpsr` register value from 0xXXXXX1yy to 0xXXXXX1da
|
3). Break at Entory point. Change `cpsr` register value from 0xXXXXX1yy to 0xXXXXX1da
|
||||||
|
|
||||||
## Run TLS 1.3 Client
|
## Run TLS 1.3 Client
|
||||||
@@ -149,8 +151,8 @@ $./examples/server/server -b -d -i -v 4
|
|||||||
```
|
```
|
||||||
|
|
||||||
+ For ECDSA sign and verify use,
|
+ For ECDSA sign and verify use,
|
||||||
Enable the `USE_CRT_BUFFER_256` macro in `wolfssl_demo.h`
|
Enable the `USE_CERT_BUFFER_256` macro in `wolfssl_demo.h`
|
||||||
Disble the `USE_CRT_BUFFER_2048` macro in `wolfssl_demo.h`
|
Disble the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h`
|
||||||
|
|
||||||
+ launch server with the following option.
|
+ launch server with the following option.
|
||||||
```
|
```
|
||||||
@@ -211,8 +213,8 @@ $./examples/server/server -b -d -i -v 3
|
|||||||
```
|
```
|
||||||
|
|
||||||
+ For ECDSA sign and verify use,
|
+ For ECDSA sign and verify use,
|
||||||
Enable the `USE_CRT_BUFFER_256` macro in `wolfssl_demo.h`
|
Enable the `USE_CERT_BUFFER_256` macro in `wolfssl_demo.h`
|
||||||
Disble the `USE_CRT_BUFFER_2048` macro in `wolfssl_demo.h`
|
Disble the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h`
|
||||||
|
|
||||||
+ launch server with the following option.
|
+ launch server with the following option.
|
||||||
```
|
```
|
||||||
@@ -278,8 +280,8 @@ static const byte ucIPAddress[4] = { 192, 168, 11, 241 };
|
|||||||
3.) Build test_RZN2L project
|
3.) Build test_RZN2L project
|
||||||
|
|
||||||
+ For ECDSA sign and verify use,
|
+ For ECDSA sign and verify use,
|
||||||
Enable the `USE_CRT_BUFFER_256` macro in `wolfssl_demo.h`
|
Enable the `USE_CERT_BUFFER_256` macro in `wolfssl_demo.h`
|
||||||
Disble the `USE_CRT_BUFFER_2048` macro in `wolfssl_demo.h`
|
Disble the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h`
|
||||||
|
|
||||||
+ launch server from e2studio
|
+ launch server from e2studio
|
||||||
|
|
||||||
@@ -356,8 +358,8 @@ static const byte ucIPAddress[4] = { 192, 168, 11, 241 };
|
|||||||
3.) Build test_RZN2L project
|
3.) Build test_RZN2L project
|
||||||
|
|
||||||
+ For ECDSA sign and verify use,
|
+ For ECDSA sign and verify use,
|
||||||
Enable the `USE_CRT_BUFFER_256` macro in `wolfssl_demo.h`
|
Enable the `USE_CERT_BUFFER_256` macro in `wolfssl_demo.h`
|
||||||
Disble the `USE_CRT_BUFFER_2048` macro in `wolfssl_demo.h`
|
Disble the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h`
|
||||||
|
|
||||||
+ launch server from e2studio
|
+ launch server from e2studio
|
||||||
|
|
||||||
@@ -470,7 +472,7 @@ Test complete
|
|||||||
```
|
```
|
||||||
|
|
||||||
**Note**
|
**Note**
|
||||||
`SHA1/224/256/384/512` and `Randome generation` of RSIP driver are enabled at the sampele output above while running wolfCrypt test.
|
`SHA1/224/256/384/512` and `Random generation` of RSIP driver are enabled at the sampele output above while running wolfCrypt test.
|
||||||
|
|
||||||
## Run Benchmark
|
## Run Benchmark
|
||||||
|
|
||||||
@@ -530,7 +532,7 @@ Benchmark complete
|
|||||||
End wolfCrypt Benchmark
|
End wolfCrypt Benchmark
|
||||||
```
|
```
|
||||||
**Note**
|
**Note**
|
||||||
`SHA1/224/256/384/512` and `Randome generation` of RSIP driver are enabled at the sampele output above.
|
`SHA1/224/256/384/512` and `Random generation` of RSIP driver are enabled at the sampele output above.
|
||||||
## Support
|
## Support
|
||||||
|
|
||||||
For support inquiries and questions, please email support@wolfssl.com. Feel free to reach out to info@wolfssl.jp as well.
|
For support inquiries and questions, please email support@wolfssl.com. Feel free to reach out to info@wolfssl.jp as well.
|
||||||
|
@@ -22,7 +22,7 @@
|
|||||||
#include <wolfssl/wolfcrypt/wc_port.h>
|
#include <wolfssl/wolfcrypt/wc_port.h>
|
||||||
|
|
||||||
#define YEAR 2023
|
#define YEAR 2023
|
||||||
#define MON 5
|
#define MON 9
|
||||||
|
|
||||||
static int tick = 0;
|
static int tick = 0;
|
||||||
|
|
||||||
|
@@ -3482,6 +3482,7 @@ int wc_GenerateSeed(OS_Seed* os, byte* output, word32 sz)
|
|||||||
#define R_RANDOM_GEN(b) R_SCE_RandomNumberGenerate(b)
|
#define R_RANDOM_GEN(b) R_SCE_RandomNumberGenerate(b)
|
||||||
#elif defined(WOLFSSL_RENESAS_RSIP)
|
#elif defined(WOLFSSL_RENESAS_RSIP)
|
||||||
#include "r_rsip.h"
|
#include "r_rsip.h"
|
||||||
|
|
||||||
extern rsip_ctrl_t rsip_ctrl;
|
extern rsip_ctrl_t rsip_ctrl;
|
||||||
#define R_RANDOM_GEN(b) R_RSIP_RandomNumberGenerate(&rsip_ctrl,b)
|
#define R_RANDOM_GEN(b) R_RSIP_RandomNumberGenerate(&rsip_ctrl,b)
|
||||||
#endif
|
#endif
|
||||||
|
@@ -11332,7 +11332,7 @@ WOLFSSL_TEST_SUBROUTINE wc_test_ret_t aes256_test(void)
|
|||||||
#ifdef HAVE_RENESAS_SYNC
|
#ifdef HAVE_RENESAS_SYNC
|
||||||
byte *key =
|
byte *key =
|
||||||
(byte*)guser_PKCbInfo.wrapped_key_aes256;
|
(byte*)guser_PKCbInfo.wrapped_key_aes256;
|
||||||
int kyeSz = (256/8);
|
int keySz = (256/8);
|
||||||
#else
|
#else
|
||||||
WOLFSSL_SMALL_STACK_STATIC byte key[] = {
|
WOLFSSL_SMALL_STACK_STATIC byte key[] = {
|
||||||
0x60,0x3d,0xeb,0x10,0x15,0xca,0x71,0xbe,
|
0x60,0x3d,0xeb,0x10,0x15,0xca,0x71,0xbe,
|
||||||
@@ -11340,7 +11340,7 @@ WOLFSSL_TEST_SUBROUTINE wc_test_ret_t aes256_test(void)
|
|||||||
0x1f,0x35,0x2c,0x07,0x3b,0x61,0x08,0xd7,
|
0x1f,0x35,0x2c,0x07,0x3b,0x61,0x08,0xd7,
|
||||||
0x2d,0x98,0x10,0xa3,0x09,0x14,0xdf,0xf4
|
0x2d,0x98,0x10,0xa3,0x09,0x14,0xdf,0xf4
|
||||||
};
|
};
|
||||||
int kyeSz = (int)sizeof(key);
|
int keySz = (int)sizeof(key);
|
||||||
#endif
|
#endif
|
||||||
WOLFSSL_SMALL_STACK_STATIC byte iv[] = {
|
WOLFSSL_SMALL_STACK_STATIC byte iv[] = {
|
||||||
0x00,0x01,0x02,0x03,0x04,0x05,0x06,0x07,
|
0x00,0x01,0x02,0x03,0x04,0x05,0x06,0x07,
|
||||||
@@ -11365,11 +11365,11 @@ WOLFSSL_TEST_SUBROUTINE wc_test_ret_t aes256_test(void)
|
|||||||
ERROR_OUT(WC_TEST_RET_ENC_EC(ret), out);
|
ERROR_OUT(WC_TEST_RET_ENC_EC(ret), out);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
ret = wc_AesSetKey(enc, key, kyeSz, iv, AES_ENCRYPTION);
|
ret = wc_AesSetKey(enc, key, keySz, iv, AES_ENCRYPTION);
|
||||||
if (ret != 0)
|
if (ret != 0)
|
||||||
ERROR_OUT(WC_TEST_RET_ENC_EC(ret), out);
|
ERROR_OUT(WC_TEST_RET_ENC_EC(ret), out);
|
||||||
#ifdef HAVE_AES_DECRYPT
|
#ifdef HAVE_AES_DECRYPT
|
||||||
ret = wc_AesSetKey(dec, key, kyeSz, iv, AES_DECRYPTION);
|
ret = wc_AesSetKey(dec, key, keySz, iv, AES_DECRYPTION);
|
||||||
if (ret != 0)
|
if (ret != 0)
|
||||||
ERROR_OUT(WC_TEST_RET_ENC_EC(ret), out);
|
ERROR_OUT(WC_TEST_RET_ENC_EC(ret), out);
|
||||||
#endif
|
#endif
|
||||||
|
Reference in New Issue
Block a user