forked from wolfSSL/wolfssl
Fix spelling warnings
This commit is contained in:
@ -23,7 +23,7 @@ NOTE: * --enable-heapmath is being deprecated and will be removed by 2024
|
||||
* Added LMS/HSS and XMSS/XMSS^MT wolfcrypt hooks, both normal and verify-only options.
|
||||
* Added support for the AES EAX mode of operation
|
||||
* Port for use with Hitch (https://github.com/varnish/hitch) added
|
||||
* Add XTS API's to handle multiple sectors in new port ot VeraCrypt
|
||||
* Add XTS API's to handle multiple sectors in new port to VeraCrypt
|
||||
|
||||
## Enhancements and Optimizations
|
||||
|
||||
|
@ -27,7 +27,7 @@
|
||||
/* wolfCrypt_Init/wolfCrypt_Cleanup to turn CryptoCell hardware on/off */
|
||||
#include <wolfssl/wolfcrypt/wc_port.h>
|
||||
|
||||
/* SEGGER_RTT_Init, you can potential replace it with other serial terminal */
|
||||
/* SEGGER_RTT_Init, you can potentially replace it with other serial terminal */
|
||||
#include "SEGGER_RTT.h"
|
||||
|
||||
int main(void)
|
||||
|
@ -206,7 +206,7 @@ else()
|
||||
"\"${WOLFSSL_ROOT}/wolfcrypt/src\""
|
||||
"\"${WOLFSSL_ROOT}/wolfcrypt/src/port/Espressif\""
|
||||
"\"${WOLFSSL_ROOT}/wolfcrypt/src/port/atmel\""
|
||||
# TODO: Make this a univeral makefile that detects if bechmark / test needed
|
||||
# TODO: Make this a universal makefile that detects if benchmark / test needed
|
||||
# Sometimes problematic with SM; consider gating detection.
|
||||
#"\"${WOLFSSL_ROOT}/wolfcrypt/benchmark\"" # the benchmark application
|
||||
#"\"${WOLFSSL_ROOT}/wolfcrypt/test\"" # the test application
|
||||
|
@ -206,7 +206,7 @@ else()
|
||||
"\"${WOLFSSL_ROOT}/wolfcrypt/src\""
|
||||
"\"${WOLFSSL_ROOT}/wolfcrypt/src/port/Espressif\""
|
||||
"\"${WOLFSSL_ROOT}/wolfcrypt/src/port/atmel\""
|
||||
# TODO: Make this a univeral makefile that detects if bechmark / test needed
|
||||
# TODO: Make this a universal makefile that detects if benchmark / test needed
|
||||
# Sometimes problematic with SM; consider gating detection.
|
||||
#"\"${WOLFSSL_ROOT}/wolfcrypt/benchmark\"" # the benchmark application
|
||||
#"\"${WOLFSSL_ROOT}/wolfcrypt/test\"" # the test application
|
||||
|
@ -241,6 +241,6 @@ void app_main(void)
|
||||
#else
|
||||
vTaskDelay(60000);
|
||||
#endif
|
||||
} /* done whle */
|
||||
} /* done while */
|
||||
#endif
|
||||
}
|
||||
|
@ -12,7 +12,7 @@ Setup process:
|
||||
- Unzip wolfssl under the same directory
|
||||
|
||||
2. Set up wolfSSL
|
||||
- open wolfssl\IDE\Renesas\cs+\Projec/wolfssl\lib.mtpj with CS+ and build
|
||||
- open wolfssl\IDE\Renesas\cs+\Projects\wolfssl\lib.mtpj with CS+ and build
|
||||
- open t4_demo.mtpj and build. This create demo program library.
|
||||
|
||||
3. Set up AlphaProject
|
||||
|
@ -152,7 +152,7 @@ $./examples/server/server -b -d -i -v 4
|
||||
|
||||
+ For ECDSA sign and verify use,
|
||||
Enable the `USE_CERT_BUFFER_256` macro in `wolfssl_demo.h`
|
||||
Disble the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h`
|
||||
Disable the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h`
|
||||
|
||||
+ launch server with the following option.
|
||||
```
|
||||
@ -214,7 +214,7 @@ $./examples/server/server -b -d -i -v 3
|
||||
|
||||
+ For ECDSA sign and verify use,
|
||||
Enable the `USE_CERT_BUFFER_256` macro in `wolfssl_demo.h`
|
||||
Disble the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h`
|
||||
Disable the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h`
|
||||
|
||||
+ launch server with the following option.
|
||||
```
|
||||
@ -281,7 +281,7 @@ static const byte ucIPAddress[4] = { 192, 168, 11, 241 };
|
||||
|
||||
+ For ECDSA sign and verify use,
|
||||
Enable the `USE_CERT_BUFFER_256` macro in `wolfssl_demo.h`
|
||||
Disble the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h`
|
||||
Disable the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h`
|
||||
|
||||
+ launch server from e2studio
|
||||
|
||||
@ -311,7 +311,7 @@ Cleaning up socket and wolfSSL objects.
|
||||
Waiting connection....
|
||||
```
|
||||
|
||||
You will see the follwoing message on Linux terminal.
|
||||
You will see the following message on Linux terminal.
|
||||
```
|
||||
$ ./examples/client/client -h 192.168.11.241 -p 11111 -v 4
|
||||
SSL version is TLSv1.3
|
||||
@ -333,7 +333,7 @@ Received: hello wolfssl!
|
||||
Cleaning up socket and wolfSSL objects.
|
||||
Waiting connection....
|
||||
```
|
||||
You will see the follwoing message on Linux terminal.
|
||||
You will see the following message on Linux terminal.
|
||||
```
|
||||
$ ./examples/client/client -h 192.168.11.241 -p 11111 -v 4 -A ./certs/ca-ecc-cert.pem -c ./certs/client-ecc-cert.pem -k ./cert
|
||||
s/ecc-client-key.pem
|
||||
@ -359,7 +359,7 @@ static const byte ucIPAddress[4] = { 192, 168, 11, 241 };
|
||||
|
||||
+ For ECDSA sign and verify use,
|
||||
Enable the `USE_CERT_BUFFER_256` macro in `wolfssl_demo.h`
|
||||
Disble the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h`
|
||||
Disable the `USE_CERT_BUFFER_2048` macro in `wolfssl_demo.h`
|
||||
|
||||
+ launch server from e2studio
|
||||
|
||||
@ -389,7 +389,7 @@ Cleaning up socket and wolfSSL objects.
|
||||
Waiting connection....
|
||||
```
|
||||
|
||||
You will see the follwoing message on Linux terminal.
|
||||
You will see the following message on Linux terminal.
|
||||
```
|
||||
$ ./examples/client/client -h 192.168.11.241 -p 11111 -v 3
|
||||
SSL version is TLSv1.2
|
||||
@ -411,7 +411,7 @@ Received: hello wolfssl!
|
||||
Cleaning up socket and wolfSSL objects.
|
||||
Waiting connection....
|
||||
```
|
||||
You will see the follwoing message on Linux terminal.
|
||||
You will see the following message on Linux terminal.
|
||||
```
|
||||
$ ./examples/client/client -h 192.168.11.241 -p 11111 -v 3 -A ./certs/ca-ecc-cert.pem -c ./certs/client-ecc-cert.pem -k ./certs/ecc-client-key.pem
|
||||
SSL version is TLSv1.2
|
||||
|
@ -131,7 +131,7 @@ void RSIP_KeyGeneration(FSPSM_ST *g)
|
||||
}
|
||||
|
||||
/* only pointer sets to NULL */
|
||||
/* onwer of keys should be freed */
|
||||
/* owner of keys should be freed */
|
||||
void Clr_CallbackCtx(FSPSM_ST *g)
|
||||
{
|
||||
(void) g;
|
||||
|
2
README
2
README
@ -95,7 +95,7 @@ NOTE: * --enable-heapmath is being deprecated and will be removed by 2024
|
||||
* Added LMS/HSS and XMSS/XMSS^MT wolfcrypt hooks, both normal and verify-only options.
|
||||
* Added support for the AES EAX mode of operation
|
||||
* Port for use with Hitch (https://github.com/varnish/hitch) added
|
||||
* Add XTS API's to handle multiple sectors in new port ot VeraCrypt
|
||||
* Add XTS API's to handle multiple sectors in new port to VeraCrypt
|
||||
|
||||
## Enhancements and Optimizations
|
||||
|
||||
|
@ -100,7 +100,7 @@ NOTE: * --enable-heapmath is being deprecated and will be removed by 2024
|
||||
* Added LMS/HSS and XMSS/XMSS^MT wolfcrypt hooks, both normal and verify-only options.
|
||||
* Added support for the AES EAX mode of operation
|
||||
* Port for use with Hitch (https://github.com/varnish/hitch) added
|
||||
* Add XTS API's to handle multiple sectors in new port ot VeraCrypt
|
||||
* Add XTS API's to handle multiple sectors in new port to VeraCrypt
|
||||
|
||||
## Enhancements and Optimizations
|
||||
|
||||
|
@ -1533,7 +1533,7 @@ WOLFSSL_API int wc_AesEaxEncryptFinal(AesEax* eax,
|
||||
\ref wc_AesEaxInit. When done using the \c AesEax context structure, make
|
||||
sure to free it using \ref wc_AesEaxFree.
|
||||
|
||||
\return 0 if data is authenticated succesfully
|
||||
\return 0 if data is authenticated successfully
|
||||
\return AES_EAX_AUTH_E if the authentication tag does not match the
|
||||
supplied authentication code vector \c authIn
|
||||
\return other error code on failure
|
||||
|
@ -27,7 +27,7 @@
|
||||
THREAD_RETURN WOLFSSL_THREAD server_test(void* args);
|
||||
|
||||
/* Echo bytes using buffer of blockSize until [echoData] bytes are complete. */
|
||||
/* If [bechmarkThroughput] set the statistcs will be output at the end */
|
||||
/* If [benchmarkThroughput] set the statistics will be output at the end */
|
||||
int ServerEchoData(WOLFSSL* ssl, int clientfd, int echoData, int blockSize,
|
||||
size_t benchmarkThroughput);
|
||||
|
||||
|
@ -20394,7 +20394,7 @@ int ProcessReplyEx(WOLFSSL* ssl, int allowSocketErr)
|
||||
case getRecordLayerHeader:
|
||||
|
||||
/* DTLSv1.3 record numbers in the header are encrypted, and AAD
|
||||
* uses the unecrypted form. Because of this we need to modify the
|
||||
* uses the unencrypted form. Because of this we need to modify the
|
||||
* header, decrypting the numbers inside
|
||||
* DtlsParseUnifiedRecordLayer(). This violates the const attribute
|
||||
* of the buffer parameter of GetRecordHeader() used here. */
|
||||
|
@ -8432,7 +8432,7 @@ static int LoadSystemCaCertsWindows(WOLFSSL_CTX* ctx, byte* loaded)
|
||||
* directly into wolfSSL "the old way".
|
||||
*
|
||||
* As of MacOS 14.0 we are still able to use this method to access system
|
||||
* certificates. Accessiblity of this API is indicated by the presence of the
|
||||
* certificates. Accessibility of this API is indicated by the presence of the
|
||||
* Security/SecTrustSettings.h header. In the likely event that Apple removes
|
||||
* access to this API on Macs, this function should be removed and the
|
||||
* DoAppleNativeCertValidation() routine should be used for all devices.
|
||||
@ -8579,7 +8579,7 @@ int wolfSSL_CTX_load_system_CA_certs(WOLFSSL_CTX* ctx)
|
||||
#if defined(HAVE_SECURITY_SECTRUSTSETTINGS_H) \
|
||||
&& !defined(WOLFSSL_APPLE_NATIVE_CERT_VALIDATION)
|
||||
/* As of MacOS 14.0 we are still able to access system certificates and
|
||||
* load them manually into wolfSSL "the old way". Accessiblity of this API
|
||||
* load them manually into wolfSSL "the old way". Accessibility of this API
|
||||
* is indicated by the presence of the Security/SecTrustSettings.h header */
|
||||
ret = LoadSystemCaCertsMac(ctx, &loaded);
|
||||
#elif defined(WOLFSSL_APPLE_NATIVE_CERT_VALIDATION)
|
||||
|
@ -1616,8 +1616,8 @@ WOLFSSL_HMAC_CTX* wolfSSL_HMAC_CTX_new(void)
|
||||
*
|
||||
* Not an OpenSSL compatibility API.
|
||||
*
|
||||
* @param [in, out] ctx HMAC contect object.
|
||||
* @return 1 inficating success.
|
||||
* @param [in, out] ctx HMAC context object.
|
||||
* @return 1 indicating success.
|
||||
*/
|
||||
int wolfSSL_HMAC_CTX_Init(WOLFSSL_HMAC_CTX* ctx)
|
||||
{
|
||||
|
@ -35690,7 +35690,7 @@ static int test_X509_STORE_untrusted(void)
|
||||
NULL
|
||||
};
|
||||
|
||||
/* Only immediate issuer in untrusted chaing. Fails since can't build chain
|
||||
/* Only immediate issuer in untrusted chain. Fails since can't build chain
|
||||
* to loaded CA. */
|
||||
ExpectIntEQ(test_X509_STORE_untrusted_certs(untrusted1, 0,
|
||||
X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY, 1), TEST_SUCCESS);
|
||||
|
@ -231,7 +231,7 @@ const char * wc_LmsKey_RcToStr(enum wc_LmsRc lmsEc)
|
||||
|
||||
/* Init an LMS key.
|
||||
*
|
||||
* Call this before setting the parms of an LMS key.
|
||||
* Call this before setting the params of an LMS key.
|
||||
*
|
||||
* Returns 0 on success.
|
||||
* */
|
||||
@ -404,7 +404,7 @@ int wc_LmsKey_SetParameters(LmsKey * key, int levels, int height,
|
||||
key->lm_ots_type[i] = ots;
|
||||
}
|
||||
|
||||
/* Move the state to parms set.
|
||||
/* Move the state to params set.
|
||||
* Key is ready for MakeKey or Reload. */
|
||||
key->state = WC_LMS_STATE_PARMSET;
|
||||
|
||||
@ -656,7 +656,7 @@ int wc_LmsKey_MakeKey(LmsKey* key, WC_RNG * rng)
|
||||
return 0;
|
||||
}
|
||||
|
||||
/* Reload a key that has been prepared with the appropriate parms and
|
||||
/* Reload a key that has been prepared with the appropriate params and
|
||||
* data. Use this if you wish to resume signing with an existing key.
|
||||
*
|
||||
* Write/read callbacks, and context data, must be set prior.
|
||||
|
@ -97,7 +97,7 @@ static int sha256_cb(const unsigned char *in, unsigned long long inlen,
|
||||
|
||||
/* Init an XMSS key.
|
||||
*
|
||||
* Call this before setting the parms of an XMSS key.
|
||||
* Call this before setting the params of an XMSS key.
|
||||
*
|
||||
* key [in] The XMSS key to init.
|
||||
* heap [in] Unused.
|
||||
@ -201,7 +201,7 @@ static int wc_XmssKey_SetOid(XmssKey * key, uint32_t oid, int is_xmssmt)
|
||||
|
||||
/* Set the XMSS key parameter string.
|
||||
*
|
||||
* The input string must be one of the supported parm set names in
|
||||
* The input string must be one of the supported param set names in
|
||||
* the "Name" section from the table in wolfssl/wolfcrypt/xmss.h,
|
||||
* e.g. "XMSS-SHA2_10_256" or "XMSSMT-SHA2_20/4_256".
|
||||
*
|
||||
|
@ -818,7 +818,7 @@ int esp_mp_montgomery_init(MATH_INT_T* X, MATH_INT_T* Y, MATH_INT_T* M,
|
||||
return MP_HW_FALLBACK;
|
||||
}
|
||||
if ((X == NULL) || (Y == NULL) || (M == NULL) ) {
|
||||
/* if a bad oprand passed, we cannot use HW */
|
||||
/* if a bad operand passed, we cannot use HW */
|
||||
ESP_LOGE(TAG, "ERROR: Bad montgomery operand, falling back to SW");
|
||||
return MP_HW_FALLBACK;
|
||||
}
|
||||
@ -1437,10 +1437,10 @@ int esp_mp_mulmod(MATH_INT_T* X, MATH_INT_T* Y, MATH_INT_T* M, MATH_INT_T* Z)
|
||||
SET_HW_VALIDATION;
|
||||
reti = mp_mulmod(X2, Y2, M2, Z2);
|
||||
if (reti == 0) {
|
||||
ESP_LOGV(TAG, "wolfSSL mp_mulmod during vaidation success");
|
||||
ESP_LOGV(TAG, "wolfSSL mp_mulmod during validation success");
|
||||
}
|
||||
else {
|
||||
ESP_LOGE(TAG, "wolfSSL mp_mulmod during vaidation failed");
|
||||
ESP_LOGE(TAG, "wolfSSL mp_mulmod during validation failed");
|
||||
}
|
||||
CLR_HW_VALIDATION;
|
||||
}
|
||||
|
@ -1882,7 +1882,7 @@ static int Aes128GcmEncrypt(Aes* aes, byte* out, const byte* in, word32 sz,
|
||||
byte counter[AES_BLOCK_SIZE];
|
||||
byte scratch[AES_BLOCK_SIZE];
|
||||
/* Noticed different optimization levels treated head of array different.
|
||||
* Some cases was stack pointer plus offset others was a regester containing
|
||||
* Some cases was stack pointer plus offset others was a register containing
|
||||
* address. To make uniform for passing in to inline assembly code am using
|
||||
* pointers to the head of each local array.
|
||||
*/
|
||||
@ -3528,7 +3528,7 @@ static int Aes192GcmEncrypt(Aes* aes, byte* out, const byte* in, word32 sz,
|
||||
byte counter[AES_BLOCK_SIZE];
|
||||
byte scratch[AES_BLOCK_SIZE];
|
||||
/* Noticed different optimization levels treated head of array different.
|
||||
* Some cases was stack pointer plus offset others was a regester containing
|
||||
* Some cases was stack pointer plus offset others was a register containing
|
||||
* address. To make uniform for passing in to inline assembly code am using
|
||||
* pointers to the head of each local array.
|
||||
*/
|
||||
@ -5291,7 +5291,7 @@ static int Aes256GcmEncrypt(Aes* aes, byte* out, const byte* in, word32 sz,
|
||||
byte counter[AES_BLOCK_SIZE];
|
||||
byte scratch[AES_BLOCK_SIZE];
|
||||
/* Noticed different optimization levels treated head of array different.
|
||||
* Some cases was stack pointer plus offset others was a regester containing
|
||||
* Some cases was stack pointer plus offset others was a register containing
|
||||
* address. To make uniform for passing in to inline assembly code am using
|
||||
* pointers to the head of each local array.
|
||||
*/
|
||||
|
@ -1228,7 +1228,7 @@ word32 wc_SECO_WrapKey(word32 keyId, byte* in, word32 inSz, byte* iv,
|
||||
}
|
||||
|
||||
|
||||
/* trasnlates the HSM error to wolfSSL error and does debug print out */
|
||||
/* Translates the HSM error to wolfSSL error and does debug print out */
|
||||
int wc_TranslateHSMError(int current, hsm_err_t err)
|
||||
{
|
||||
int ret = -1;
|
||||
|
@ -79129,7 +79129,7 @@ int sp_ecc_verify_256_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
|
||||
#endif /* HAVE_ECC_VERIFY */
|
||||
|
||||
#ifdef HAVE_ECC_CHECK_KEY
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* point EC point.
|
||||
* heap Heap to use if dynamically allocating.
|
||||
@ -79185,7 +79185,7 @@ static int sp_256_ecc_is_point_8(const sp_point_256* point,
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* pX X ordinate of EC point.
|
||||
* pY Y ordinate of EC point.
|
||||
@ -97205,7 +97205,7 @@ int sp_ecc_verify_384_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
|
||||
#endif /* HAVE_ECC_VERIFY */
|
||||
|
||||
#ifdef HAVE_ECC_CHECK_KEY
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* point EC point.
|
||||
* heap Heap to use if dynamically allocating.
|
||||
@ -97261,7 +97261,7 @@ static int sp_384_ecc_is_point_12(const sp_point_384* point,
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* pX X ordinate of EC point.
|
||||
* pY Y ordinate of EC point.
|
||||
@ -126155,7 +126155,7 @@ int sp_ecc_verify_521_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
|
||||
#endif /* HAVE_ECC_VERIFY */
|
||||
|
||||
#ifdef HAVE_ECC_CHECK_KEY
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* point EC point.
|
||||
* heap Heap to use if dynamically allocating.
|
||||
@ -126211,7 +126211,7 @@ static int sp_521_ecc_is_point_17(const sp_point_521* point,
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* pX X ordinate of EC point.
|
||||
* pY Y ordinate of EC point.
|
||||
@ -156590,7 +156590,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n)
|
||||
}
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* point EC point.
|
||||
* heap Heap to use if dynamically allocating.
|
||||
@ -156650,7 +156650,7 @@ static int sp_1024_ecc_is_point_32(const sp_point_1024* point,
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* pX X ordinate of EC point.
|
||||
* pY Y ordinate of EC point.
|
||||
|
@ -99,7 +99,7 @@ static void sp_2048_from_bin(sp_digit* r, int size, const byte* a, int n)
|
||||
"subs x6, %[n], 8\n\t"
|
||||
"mov x7, xzr\n\t"
|
||||
"blt 2f\n\t"
|
||||
/* Put in mulitples of 8 bytes. */
|
||||
/* Put in multiples of 8 bytes. */
|
||||
"1:\n\t"
|
||||
"ldr x8, [x4], -8\n\t"
|
||||
"subs x6, x6, 8\n\t"
|
||||
@ -6992,7 +6992,7 @@ static void sp_3072_from_bin(sp_digit* r, int size, const byte* a, int n)
|
||||
"subs x6, %[n], 8\n\t"
|
||||
"mov x7, xzr\n\t"
|
||||
"blt 2f\n\t"
|
||||
/* Put in mulitples of 8 bytes. */
|
||||
/* Put in multiples of 8 bytes. */
|
||||
"1:\n\t"
|
||||
"ldr x8, [x4], -8\n\t"
|
||||
"subs x6, x6, 8\n\t"
|
||||
@ -16595,7 +16595,7 @@ static void sp_4096_from_bin(sp_digit* r, int size, const byte* a, int n)
|
||||
"subs x6, %[n], 8\n\t"
|
||||
"mov x7, xzr\n\t"
|
||||
"blt 2f\n\t"
|
||||
/* Put in mulitples of 8 bytes. */
|
||||
/* Put in multiples of 8 bytes. */
|
||||
"1:\n\t"
|
||||
"ldr x8, [x4], -8\n\t"
|
||||
"subs x6, x6, 8\n\t"
|
||||
@ -39685,7 +39685,7 @@ static void sp_256_from_bin(sp_digit* r, int size, const byte* a, int n)
|
||||
"subs x6, %[n], 8\n\t"
|
||||
"mov x7, xzr\n\t"
|
||||
"blt 2f\n\t"
|
||||
/* Put in mulitples of 8 bytes. */
|
||||
/* Put in multiples of 8 bytes. */
|
||||
"1:\n\t"
|
||||
"ldr x8, [x4], -8\n\t"
|
||||
"subs x6, x6, 8\n\t"
|
||||
@ -42127,7 +42127,7 @@ SP_NOINLINE static void sp_256_mont_add_4(sp_digit* r, const sp_digit* a,
|
||||
(void)m;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* point EC point.
|
||||
* heap Heap to use if dynamically allocating.
|
||||
@ -42183,7 +42183,7 @@ static int sp_256_ecc_is_point_4(const sp_point_256* point,
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* pX X ordinate of EC point.
|
||||
* pY Y ordinate of EC point.
|
||||
@ -66452,7 +66452,7 @@ static void sp_384_from_bin(sp_digit* r, int size, const byte* a, int n)
|
||||
"subs x6, %[n], 8\n\t"
|
||||
"mov x7, xzr\n\t"
|
||||
"blt 2f\n\t"
|
||||
/* Put in mulitples of 8 bytes. */
|
||||
/* Put in multiples of 8 bytes. */
|
||||
"1:\n\t"
|
||||
"ldr x8, [x4], -8\n\t"
|
||||
"subs x6, x6, 8\n\t"
|
||||
@ -68207,7 +68207,7 @@ int sp_ecc_verify_384_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
|
||||
#endif /* HAVE_ECC_VERIFY */
|
||||
|
||||
#ifdef HAVE_ECC_CHECK_KEY
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* point EC point.
|
||||
* heap Heap to use if dynamically allocating.
|
||||
@ -68263,7 +68263,7 @@ static int sp_384_ecc_is_point_6(const sp_point_384* point,
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* pX X ordinate of EC point.
|
||||
* pY Y ordinate of EC point.
|
||||
@ -111616,7 +111616,7 @@ static void sp_521_from_bin(sp_digit* r, int size, const byte* a, int n)
|
||||
"subs x6, %[n], 8\n\t"
|
||||
"mov x7, xzr\n\t"
|
||||
"blt 2f\n\t"
|
||||
/* Put in mulitples of 8 bytes. */
|
||||
/* Put in multiples of 8 bytes. */
|
||||
"1:\n\t"
|
||||
"ldr x8, [x4], -8\n\t"
|
||||
"subs x6, x6, 8\n\t"
|
||||
@ -113151,7 +113151,7 @@ int sp_ecc_verify_521_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
|
||||
#endif /* HAVE_ECC_VERIFY */
|
||||
|
||||
#ifdef HAVE_ECC_CHECK_KEY
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* point EC point.
|
||||
* heap Heap to use if dynamically allocating.
|
||||
@ -113207,7 +113207,7 @@ static int sp_521_ecc_is_point_9(const sp_point_521* point,
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* pX X ordinate of EC point.
|
||||
* pY Y ordinate of EC point.
|
||||
@ -125240,7 +125240,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n)
|
||||
"subs x6, %[n], 8\n\t"
|
||||
"mov x7, xzr\n\t"
|
||||
"blt 2f\n\t"
|
||||
/* Put in mulitples of 8 bytes. */
|
||||
/* Put in multiples of 8 bytes. */
|
||||
"1:\n\t"
|
||||
"ldr x8, [x4], -8\n\t"
|
||||
"subs x6, x6, 8\n\t"
|
||||
@ -125334,7 +125334,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n)
|
||||
);
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* point EC point.
|
||||
* heap Heap to use if dynamically allocating.
|
||||
@ -125394,7 +125394,7 @@ static int sp_1024_ecc_is_point_16(const sp_point_1024* point,
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* pX X ordinate of EC point.
|
||||
* pY Y ordinate of EC point.
|
||||
|
@ -107674,7 +107674,7 @@ int sp_ecc_verify_256_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
|
||||
#endif /* HAVE_ECC_VERIFY */
|
||||
|
||||
#ifdef HAVE_ECC_CHECK_KEY
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* point EC point.
|
||||
* heap Heap to use if dynamically allocating.
|
||||
@ -107730,7 +107730,7 @@ static int sp_256_ecc_is_point_8(const sp_point_256* point,
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* pX X ordinate of EC point.
|
||||
* pY Y ordinate of EC point.
|
||||
@ -118870,7 +118870,7 @@ int sp_ecc_verify_384_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
|
||||
#endif /* HAVE_ECC_VERIFY */
|
||||
|
||||
#ifdef HAVE_ECC_CHECK_KEY
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* point EC point.
|
||||
* heap Heap to use if dynamically allocating.
|
||||
@ -118926,7 +118926,7 @@ static int sp_384_ecc_is_point_12(const sp_point_384* point,
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* pX X ordinate of EC point.
|
||||
* pY Y ordinate of EC point.
|
||||
@ -135812,7 +135812,7 @@ int sp_ecc_verify_521_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
|
||||
#endif /* HAVE_ECC_VERIFY */
|
||||
|
||||
#ifdef HAVE_ECC_CHECK_KEY
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* point EC point.
|
||||
* heap Heap to use if dynamically allocating.
|
||||
@ -135868,7 +135868,7 @@ static int sp_521_ecc_is_point_17(const sp_point_521* point,
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* pX X ordinate of EC point.
|
||||
* pY Y ordinate of EC point.
|
||||
@ -218581,7 +218581,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n)
|
||||
}
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* point EC point.
|
||||
* heap Heap to use if dynamically allocating.
|
||||
@ -218641,7 +218641,7 @@ static int sp_1024_ecc_is_point_32(const sp_point_1024* point,
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* pX X ordinate of EC point.
|
||||
* pY Y ordinate of EC point.
|
||||
|
@ -26541,7 +26541,7 @@ int sp_ecc_verify_256_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
|
||||
#endif /* HAVE_ECC_VERIFY */
|
||||
|
||||
#ifdef HAVE_ECC_CHECK_KEY
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* point EC point.
|
||||
* heap Heap to use if dynamically allocating.
|
||||
@ -26597,7 +26597,7 @@ static int sp_256_ecc_is_point_9(const sp_point_256* point,
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* pX X ordinate of EC point.
|
||||
* pY Y ordinate of EC point.
|
||||
@ -34622,7 +34622,7 @@ int sp_ecc_verify_384_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
|
||||
#endif /* HAVE_ECC_VERIFY */
|
||||
|
||||
#ifdef HAVE_ECC_CHECK_KEY
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* point EC point.
|
||||
* heap Heap to use if dynamically allocating.
|
||||
@ -34678,7 +34678,7 @@ static int sp_384_ecc_is_point_15(const sp_point_384* point,
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* pX X ordinate of EC point.
|
||||
* pY Y ordinate of EC point.
|
||||
@ -42796,7 +42796,7 @@ int sp_ecc_verify_521_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
|
||||
#endif /* HAVE_ECC_VERIFY */
|
||||
|
||||
#ifdef HAVE_ECC_CHECK_KEY
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* point EC point.
|
||||
* heap Heap to use if dynamically allocating.
|
||||
@ -42852,7 +42852,7 @@ static int sp_521_ecc_is_point_21(const sp_point_521* point,
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* pX X ordinate of EC point.
|
||||
* pY Y ordinate of EC point.
|
||||
@ -54685,7 +54685,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n)
|
||||
}
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* point EC point.
|
||||
* heap Heap to use if dynamically allocating.
|
||||
@ -54745,7 +54745,7 @@ static int sp_1024_ecc_is_point_42(const sp_point_1024* point,
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* pX X ordinate of EC point.
|
||||
* pY Y ordinate of EC point.
|
||||
|
@ -27435,7 +27435,7 @@ int sp_ecc_verify_256_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
|
||||
#endif /* HAVE_ECC_VERIFY */
|
||||
|
||||
#ifdef HAVE_ECC_CHECK_KEY
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* point EC point.
|
||||
* heap Heap to use if dynamically allocating.
|
||||
@ -27491,7 +27491,7 @@ static int sp_256_ecc_is_point_5(const sp_point_256* point,
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* pX X ordinate of EC point.
|
||||
* pY Y ordinate of EC point.
|
||||
@ -34903,7 +34903,7 @@ int sp_ecc_verify_384_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
|
||||
#endif /* HAVE_ECC_VERIFY */
|
||||
|
||||
#ifdef HAVE_ECC_CHECK_KEY
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* point EC point.
|
||||
* heap Heap to use if dynamically allocating.
|
||||
@ -34959,7 +34959,7 @@ static int sp_384_ecc_is_point_7(const sp_point_384* point,
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* pX X ordinate of EC point.
|
||||
* pY Y ordinate of EC point.
|
||||
@ -42387,7 +42387,7 @@ int sp_ecc_verify_521_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
|
||||
#endif /* HAVE_ECC_VERIFY */
|
||||
|
||||
#ifdef HAVE_ECC_CHECK_KEY
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* point EC point.
|
||||
* heap Heap to use if dynamically allocating.
|
||||
@ -42443,7 +42443,7 @@ static int sp_521_ecc_is_point_9(const sp_point_521* point,
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* pX X ordinate of EC point.
|
||||
* pY Y ordinate of EC point.
|
||||
@ -53269,7 +53269,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n)
|
||||
}
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* point EC point.
|
||||
* heap Heap to use if dynamically allocating.
|
||||
@ -53329,7 +53329,7 @@ static int sp_1024_ecc_is_point_18(const sp_point_1024* point,
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* pX X ordinate of EC point.
|
||||
* pY Y ordinate of EC point.
|
||||
|
@ -40873,7 +40873,7 @@ int sp_ecc_verify_256_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
|
||||
#endif /* HAVE_ECC_VERIFY */
|
||||
|
||||
#ifdef HAVE_ECC_CHECK_KEY
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* point EC point.
|
||||
* heap Heap to use if dynamically allocating.
|
||||
@ -40929,7 +40929,7 @@ static int sp_256_ecc_is_point_8(const sp_point_256* point,
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* pX X ordinate of EC point.
|
||||
* pY Y ordinate of EC point.
|
||||
@ -50738,7 +50738,7 @@ int sp_ecc_verify_384_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
|
||||
#endif /* HAVE_ECC_VERIFY */
|
||||
|
||||
#ifdef HAVE_ECC_CHECK_KEY
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* point EC point.
|
||||
* heap Heap to use if dynamically allocating.
|
||||
@ -50794,7 +50794,7 @@ static int sp_384_ecc_is_point_12(const sp_point_384* point,
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* pX X ordinate of EC point.
|
||||
* pY Y ordinate of EC point.
|
||||
@ -64067,7 +64067,7 @@ int sp_ecc_verify_521_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
|
||||
#endif /* HAVE_ECC_VERIFY */
|
||||
|
||||
#ifdef HAVE_ECC_CHECK_KEY
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* point EC point.
|
||||
* heap Heap to use if dynamically allocating.
|
||||
@ -64123,7 +64123,7 @@ static int sp_521_ecc_is_point_17(const sp_point_521* point,
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* pX X ordinate of EC point.
|
||||
* pY Y ordinate of EC point.
|
||||
@ -80497,7 +80497,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n)
|
||||
}
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* point EC point.
|
||||
* heap Heap to use if dynamically allocating.
|
||||
@ -80557,7 +80557,7 @@ static int sp_1024_ecc_is_point_32(const sp_point_1024* point,
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* pX X ordinate of EC point.
|
||||
* pY Y ordinate of EC point.
|
||||
|
@ -6346,7 +6346,7 @@ static WC_INLINE sp_int_digit sp_div_word(sp_int_digit hi, sp_int_digit lo,
|
||||
if (r > SP_HALF_MAX) {
|
||||
r = SP_HALF_MAX;
|
||||
}
|
||||
/* Shift up result for trial division calucation. */
|
||||
/* Shift up result for trial division calculation. */
|
||||
r <<= SP_HALF_SIZE;
|
||||
/* Calculate trial value. */
|
||||
trial = r * (sp_int_word)d;
|
||||
@ -12416,7 +12416,7 @@ static int _sp_invmod_mont_ct(const sp_int* a, const sp_int* m, sp_int* r,
|
||||
int bit = sp_is_bit_set(e, (unsigned int)i);
|
||||
|
||||
/* 6.2. j += bit
|
||||
* Update count of consequitive 1 bits.
|
||||
* Update count of consecutive 1 bits.
|
||||
*/
|
||||
j += bit;
|
||||
/* 6.3. s += 1
|
||||
@ -13107,7 +13107,7 @@ static int _sp_exptmod_mont_ex(const sp_int* b, const sp_int* e, int bits,
|
||||
DECL_SP_INT_ARRAY(t, m->used * 2 + 1, (1 << 6) + 1);
|
||||
|
||||
/* Window bits based on number of pre-calculations versus number of loop
|
||||
* calculcations.
|
||||
* calculations.
|
||||
* Exponents for RSA and DH will result in 6-bit windows.
|
||||
*/
|
||||
if (bits > 450) {
|
||||
|
@ -26392,7 +26392,7 @@ int sp_ecc_verify_256_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
|
||||
#endif /* HAVE_ECC_VERIFY */
|
||||
|
||||
#ifdef HAVE_ECC_CHECK_KEY
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* point EC point.
|
||||
* heap Heap to use if dynamically allocating.
|
||||
@ -26448,7 +26448,7 @@ static int sp_256_ecc_is_point_4(const sp_point_256* point,
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* pX X ordinate of EC point.
|
||||
* pY Y ordinate of EC point.
|
||||
@ -51339,7 +51339,7 @@ int sp_ecc_verify_384_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
|
||||
#endif /* HAVE_ECC_VERIFY */
|
||||
|
||||
#ifdef HAVE_ECC_CHECK_KEY
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* point EC point.
|
||||
* heap Heap to use if dynamically allocating.
|
||||
@ -51395,7 +51395,7 @@ static int sp_384_ecc_is_point_6(const sp_point_384* point,
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* pX X ordinate of EC point.
|
||||
* pY Y ordinate of EC point.
|
||||
@ -92477,7 +92477,7 @@ int sp_ecc_verify_521_nb(sp_ecc_ctx_t* sp_ctx, const byte* hash,
|
||||
#endif /* HAVE_ECC_VERIFY */
|
||||
|
||||
#ifdef HAVE_ECC_CHECK_KEY
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* point EC point.
|
||||
* heap Heap to use if dynamically allocating.
|
||||
@ -92533,7 +92533,7 @@ static int sp_521_ecc_is_point_9(const sp_point_521* point,
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* pX X ordinate of EC point.
|
||||
* pY Y ordinate of EC point.
|
||||
@ -105408,7 +105408,7 @@ static void sp_1024_from_bin(sp_digit* r, int size, const byte* a, int n)
|
||||
}
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* point EC point.
|
||||
* heap Heap to use if dynamically allocating.
|
||||
@ -105468,7 +105468,7 @@ static int sp_1024_ecc_is_point_16(const sp_point_1024* point,
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Check that the x and y oridinates are a valid point on the curve.
|
||||
/* Check that the x and y ordinates are a valid point on the curve.
|
||||
*
|
||||
* pX X ordinate of EC point.
|
||||
* pY Y ordinate of EC point.
|
||||
|
@ -2042,7 +2042,7 @@ int wc_MakeRsaKey(RsaKey* key, int size, long e, WC_RNG* rng)
|
||||
{
|
||||
IppStatus ret;
|
||||
int scratchSz;
|
||||
int i; /* for trys on calling make key */
|
||||
int i; /* for tries on calling make key */
|
||||
int ctxSz;
|
||||
|
||||
IppsBigNumState* pSrcPublicExp = NULL;
|
||||
@ -2178,7 +2178,7 @@ int wc_MakeRsaKey(RsaKey* key, int size, long e, WC_RNG* rng)
|
||||
goto makeKeyEnd;
|
||||
}
|
||||
|
||||
/* call IPP to generate keys, if inseficent entropy error call again */
|
||||
/* call IPP to generate keys, if insufficient entropy error call again */
|
||||
ret = ippStsInsufficientEntropy;
|
||||
while (ret == ippStsInsufficientEntropy) {
|
||||
ret = ippsRSA_GenerateKeys(pSrcPublicExp, key->n, key->e,
|
||||
|
@ -1764,7 +1764,7 @@ enum Misc {
|
||||
#ifndef ECDHE_SIZE /* allow this to be overridden at compile-time */
|
||||
ECDHE_SIZE = 32, /* ECDHE server size defaults to 256 bit */
|
||||
#endif
|
||||
MAX_EXPORT_ECC_SZ = 256, /* Export ANS X9.62 max future size */
|
||||
MAX_EXPORT_ECC_SZ = 256, /* Export ANSI X9.62 max future size */
|
||||
MAX_CURVE_NAME_SZ = 16, /* Maximum size of curve name string */
|
||||
|
||||
NEW_SA_MAJOR = 8, /* Most significant byte used with new sig algos */
|
||||
@ -3576,7 +3576,7 @@ struct WOLFSSL_CTX {
|
||||
byte sendVerify:2; /* for client side (can not be single bit) */
|
||||
byte haveRSA:1; /* RSA available */
|
||||
byte haveECC:1; /* ECC available */
|
||||
byte haveDH:1; /* server DH parms set by user */
|
||||
byte haveDH:1; /* server DH params set by user */
|
||||
byte haveECDSAsig:1; /* server cert signed w/ ECDSA */
|
||||
byte haveFalconSig:1; /* server cert signed w/ Falcon */
|
||||
byte haveDilithiumSig:1;/* server cert signed w/ Dilithium */
|
||||
@ -4630,7 +4630,7 @@ struct Options {
|
||||
word16 usingCompression:1; /* are we using compression */
|
||||
word16 haveRSA:1; /* RSA available */
|
||||
word16 haveECC:1; /* ECC available */
|
||||
word16 haveDH:1; /* server DH parms set by user */
|
||||
word16 haveDH:1; /* server DH params set by user */
|
||||
word16 haveECDSAsig:1; /* server ECDSA signed cert */
|
||||
word16 haveStaticECC:1; /* static server ECC private key */
|
||||
word16 haveFalconSig:1; /* server Falcon signed cert */
|
||||
|
@ -48,8 +48,8 @@ typedef struct hss_extra_info hss_extra_info;
|
||||
|
||||
struct LmsKey {
|
||||
unsigned levels; /* Number of tree levels. */
|
||||
param_set_t lm_type[MAX_HSS_LEVELS]; /* Height parm per level. */
|
||||
param_set_t lm_ots_type[MAX_HSS_LEVELS]; /* Winternitz parm per level. */
|
||||
param_set_t lm_type[MAX_HSS_LEVELS]; /* Height param per level. */
|
||||
param_set_t lm_ots_type[MAX_HSS_LEVELS]; /* Winternitz param per level. */
|
||||
unsigned char pub[HSS_MAX_PUBLIC_KEY_LEN];
|
||||
#ifndef WOLFSSL_LMS_VERIFY_ONLY
|
||||
hss_working_key * working_key;
|
||||
|
@ -94,8 +94,8 @@ enum wc_LmsParm {
|
||||
/* enum wc_LmsState is to help track the state of an LMS/HSS Key. */
|
||||
enum wc_LmsState {
|
||||
WC_LMS_STATE_FREED, /* Key has been freed from memory. */
|
||||
WC_LMS_STATE_INITED, /* Key has been inited, ready to set parms.*/
|
||||
WC_LMS_STATE_PARMSET, /* Parms are set, ready to MakeKey or Reload. */
|
||||
WC_LMS_STATE_INITED, /* Key has been inited, ready to set params.*/
|
||||
WC_LMS_STATE_PARMSET, /* Params are set, ready to MakeKey or Reload. */
|
||||
WC_LMS_STATE_OK, /* Able to sign signatures and verify. */
|
||||
WC_LMS_STATE_VERIFYONLY, /* A public only LmsKey. */
|
||||
WC_LMS_STATE_BAD, /* Can't guarantee key's state. */
|
||||
|
@ -104,8 +104,8 @@ enum wc_XmssRc {
|
||||
/* enum wc_XmssState is to help track the state of an XMSS Key. */
|
||||
enum wc_XmssState {
|
||||
WC_XMSS_STATE_FREED, /* Key has been freed from memory. */
|
||||
WC_XMSS_STATE_INITED, /* Key has been inited, ready to set parms.*/
|
||||
WC_XMSS_STATE_PARMSET, /* Parms are set, ready to MakeKey or Reload. */
|
||||
WC_XMSS_STATE_INITED, /* Key has been inited, ready to set params.*/
|
||||
WC_XMSS_STATE_PARMSET, /* Params are set, ready to MakeKey or Reload. */
|
||||
WC_XMSS_STATE_OK, /* Able to sign signatures and verify. */
|
||||
WC_XMSS_STATE_VERIFYONLY, /* A public only XmssKey. */
|
||||
WC_XMSS_STATE_BAD, /* Can't guarantee key's state. */
|
||||
|
Reference in New Issue
Block a user