forked from wolfSSL/wolfssl
addressed review comments
This commit is contained in:
@@ -60,7 +60,7 @@ The example project summary is listed below and is relevant for every project.
|
||||
2.) Create a `dummy_application` Renesas RZ/N C/C++ FSP Project.
|
||||
|
||||
+ Click File->New->`RZ/N C/C++ FSP Project`.
|
||||
+ Enter project name `dummu_application`.
|
||||
+ Enter project name `dummy_application`.
|
||||
+ Select Board: to `RSK+RZN2L (RAM execution without flash memory)`.
|
||||
+ Select Device: to `R9A07G084M04GBG`. Click Next.
|
||||
+ Check to `Executable`
|
||||
@@ -109,8 +109,10 @@ The example project summary is listed below and is relevant for every project.
|
||||
|
||||
## Run `test_RZN2L`
|
||||
|
||||
1). Right click the project and Select menu Debug -> Renesas GDB Hardware debugging
|
||||
1). Right click the project and Select menu `Debug` -> `Renesas GDB Hardware debugging`
|
||||
|
||||
2). Select J-Link ARM and R9A07G084M04
|
||||
|
||||
3). Break at Entory point. Change `cpsr` register value from 0xXXXXX1yy to 0xXXXXX1da
|
||||
|
||||
## Run TLS 1.3 Client
|
||||
@@ -149,8 +151,8 @@ $./examples/server/server -b -d -i -v 4
|
||||
```
|
||||
|
||||
+ For ECDSA sign and verify use,
|
||||
Enable the `USE_CRT_BUFFER_256` macro in `wolfssl_demo.h`
|
||||
Disble the `USE_CRT_BUFFER_2048` macro in `wolfssl_demo.h`
|
||||
Enable the `USE_CERT_BUFFER_256` macro in `wolfssl_demo.h`
|
||||
Disble the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h`
|
||||
|
||||
+ launch server with the following option.
|
||||
```
|
||||
@@ -211,8 +213,8 @@ $./examples/server/server -b -d -i -v 3
|
||||
```
|
||||
|
||||
+ For ECDSA sign and verify use,
|
||||
Enable the `USE_CRT_BUFFER_256` macro in `wolfssl_demo.h`
|
||||
Disble the `USE_CRT_BUFFER_2048` macro in `wolfssl_demo.h`
|
||||
Enable the `USE_CERT_BUFFER_256` macro in `wolfssl_demo.h`
|
||||
Disble the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h`
|
||||
|
||||
+ launch server with the following option.
|
||||
```
|
||||
@@ -278,8 +280,8 @@ static const byte ucIPAddress[4] = { 192, 168, 11, 241 };
|
||||
3.) Build test_RZN2L project
|
||||
|
||||
+ For ECDSA sign and verify use,
|
||||
Enable the `USE_CRT_BUFFER_256` macro in `wolfssl_demo.h`
|
||||
Disble the `USE_CRT_BUFFER_2048` macro in `wolfssl_demo.h`
|
||||
Enable the `USE_CERT_BUFFER_256` macro in `wolfssl_demo.h`
|
||||
Disble the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h`
|
||||
|
||||
+ launch server from e2studio
|
||||
|
||||
@@ -356,8 +358,8 @@ static const byte ucIPAddress[4] = { 192, 168, 11, 241 };
|
||||
3.) Build test_RZN2L project
|
||||
|
||||
+ For ECDSA sign and verify use,
|
||||
Enable the `USE_CRT_BUFFER_256` macro in `wolfssl_demo.h`
|
||||
Disble the `USE_CRT_BUFFER_2048` macro in `wolfssl_demo.h`
|
||||
Enable the `USE_CERT_BUFFER_256` macro in `wolfssl_demo.h`
|
||||
Disble the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h`
|
||||
|
||||
+ launch server from e2studio
|
||||
|
||||
@@ -470,7 +472,7 @@ Test complete
|
||||
```
|
||||
|
||||
**Note**
|
||||
`SHA1/224/256/384/512` and `Randome generation` of RSIP driver are enabled at the sampele output above while running wolfCrypt test.
|
||||
`SHA1/224/256/384/512` and `Random generation` of RSIP driver are enabled at the sampele output above while running wolfCrypt test.
|
||||
|
||||
## Run Benchmark
|
||||
|
||||
@@ -530,7 +532,7 @@ Benchmark complete
|
||||
End wolfCrypt Benchmark
|
||||
```
|
||||
**Note**
|
||||
`SHA1/224/256/384/512` and `Randome generation` of RSIP driver are enabled at the sampele output above.
|
||||
`SHA1/224/256/384/512` and `Random generation` of RSIP driver are enabled at the sampele output above.
|
||||
## Support
|
||||
|
||||
For support inquiries and questions, please email support@wolfssl.com. Feel free to reach out to info@wolfssl.jp as well.
|
||||
|
@@ -22,7 +22,7 @@
|
||||
#include <wolfssl/wolfcrypt/wc_port.h>
|
||||
|
||||
#define YEAR 2023
|
||||
#define MON 5
|
||||
#define MON 9
|
||||
|
||||
static int tick = 0;
|
||||
|
||||
|
@@ -3477,14 +3477,15 @@ int wc_GenerateSeed(OS_Seed* os, byte* output, word32 sz)
|
||||
#elif defined(WOLFSSL_RENESAS_FSPSM) || \
|
||||
defined(WOLFSSL_RENESAS_FSPSM_CRYPTONLY)
|
||||
|
||||
#if defined(WOLFSSL_RENESAS_SCEPROTECT)
|
||||
#if defined(WOLFSSL_RENESAS_SCEPROTECT)
|
||||
#include "r_sce.h"
|
||||
#define R_RANDOM_GEN(b) R_SCE_RandomNumberGenerate(b)
|
||||
#elif defined(WOLFSSL_RENESAS_RSIP)
|
||||
#elif defined(WOLFSSL_RENESAS_RSIP)
|
||||
#include "r_rsip.h"
|
||||
|
||||
extern rsip_ctrl_t rsip_ctrl;
|
||||
#define R_RANDOM_GEN(b) R_RSIP_RandomNumberGenerate(&rsip_ctrl,b)
|
||||
#endif
|
||||
#endif
|
||||
|
||||
int wc_GenerateSeed(OS_Seed* os, byte* output, word32 sz)
|
||||
{
|
||||
|
@@ -11332,7 +11332,7 @@ WOLFSSL_TEST_SUBROUTINE wc_test_ret_t aes256_test(void)
|
||||
#ifdef HAVE_RENESAS_SYNC
|
||||
byte *key =
|
||||
(byte*)guser_PKCbInfo.wrapped_key_aes256;
|
||||
int kyeSz = (256/8);
|
||||
int keySz = (256/8);
|
||||
#else
|
||||
WOLFSSL_SMALL_STACK_STATIC byte key[] = {
|
||||
0x60,0x3d,0xeb,0x10,0x15,0xca,0x71,0xbe,
|
||||
@@ -11340,7 +11340,7 @@ WOLFSSL_TEST_SUBROUTINE wc_test_ret_t aes256_test(void)
|
||||
0x1f,0x35,0x2c,0x07,0x3b,0x61,0x08,0xd7,
|
||||
0x2d,0x98,0x10,0xa3,0x09,0x14,0xdf,0xf4
|
||||
};
|
||||
int kyeSz = (int)sizeof(key);
|
||||
int keySz = (int)sizeof(key);
|
||||
#endif
|
||||
WOLFSSL_SMALL_STACK_STATIC byte iv[] = {
|
||||
0x00,0x01,0x02,0x03,0x04,0x05,0x06,0x07,
|
||||
@@ -11365,11 +11365,11 @@ WOLFSSL_TEST_SUBROUTINE wc_test_ret_t aes256_test(void)
|
||||
ERROR_OUT(WC_TEST_RET_ENC_EC(ret), out);
|
||||
#endif
|
||||
|
||||
ret = wc_AesSetKey(enc, key, kyeSz, iv, AES_ENCRYPTION);
|
||||
ret = wc_AesSetKey(enc, key, keySz, iv, AES_ENCRYPTION);
|
||||
if (ret != 0)
|
||||
ERROR_OUT(WC_TEST_RET_ENC_EC(ret), out);
|
||||
#ifdef HAVE_AES_DECRYPT
|
||||
ret = wc_AesSetKey(dec, key, kyeSz, iv, AES_DECRYPTION);
|
||||
ret = wc_AesSetKey(dec, key, keySz, iv, AES_DECRYPTION);
|
||||
if (ret != 0)
|
||||
ERROR_OUT(WC_TEST_RET_ENC_EC(ret), out);
|
||||
#endif
|
||||
|
Reference in New Issue
Block a user