diff --git a/.gitignore b/.gitignore index 6d4149397..31e9b4a56 100644 --- a/.gitignore +++ b/.gitignore @@ -354,6 +354,24 @@ IDE/XCODE/Index /IDE/Renesas/e2studio/Projects/test/*.launch /IDE/Renesas/e2studio/Projects/test/*.scfg +/IDE/Renesas/e2studio/RX65N/GR-ROSE/.metadata +/IDE/Renesas/e2studio/RX65N/GR-ROSE/smc/src +/IDE/Renesas/e2studio/RX65N/GR-ROSE/smc/trash +/IDE/Renesas/e2studio/RX65N/GR-ROSE/test/src/smc_gen +/IDE/Renesas/e2studio/RX65N/GR-ROSE/test/generate + +/IDE/Renesas/e2studio/RX65N/RSK/.metadata +/IDE/Renesas/e2studio/RX65N/RSK/smc/src +/IDE/Renesas/e2studio/RX65N/RSK/smc/trash +/IDE/Renesas/e2studio/RX65N/RSK/test/src/smc_gen +/IDE/Renesas/e2studio/RX65N/RSK/test/generate + +/IDE/Renesas/e2studio/RX72N/EnvisionKit/.metadata +/IDE/Renesas/e2studio/RX72N/EnvisionKit/smc/src +/IDE/Renesas/e2studio/RX72N/EnvisionKit/smc/trash +/IDE/Renesas/e2studio/RX72N/EnvisionKit/test/src/smc_gen +/IDE/Renesas/e2studio/RX72N/EnvisionKit/test/generate + # QNX CAAM /IDE/QNX/example-server/server-tls /IDE/QNX/example-client/client-tls diff --git a/IDE/Renesas/e2studio/GR-ROSE/README b/IDE/Renesas/e2studio/GR-ROSE/README deleted file mode 100644 index 7d067731e..000000000 --- a/IDE/Renesas/e2studio/GR-ROSE/README +++ /dev/null @@ -1,149 +0,0 @@ ------------------------------------------------------ -0. 初めに ------------------------------------------------------ - -このドキュメントではE2Studio上でwolfsslを含んだテストアプリケーションを作成する手順を示します。 - -このREADMEが含まれているフォルダには - 1.smc      ---スマートコンフィギュレータ用プロジェクトが格納されているフォルダです - 2.test     ---テストアプリケーション用プロジェクトが格納されているフォルダです - 3.wolfssl  ---テストアプリケーションにリンクされて使用されるwolfsslライブラリ用プロジェクトが格納されているフォルダです - 4.common   ---設定ファイル等が格納されたフォルダです - -フォルダが存在しています。 - -------------------------------------- -1.プロジェクトのインポート -------------------------------------- - -e2studioを起動したら、プロジェクト・エクスプローラー画面を表示させ、"ファイル"メニュー > ”ファイル・システムからプロジェクトを開く...”を選択し、 -プロジェクトインポートダイアログを表示させます。 - -ディレクトリボタンを押して、上記の1~3のフォルダの3プロジェクトをインポートしてください。 - -------------------------------------- -2.smcプロジェクトでソースファイルを生成させる -------------------------------------- - -smcプロジェクトにはsmc.scfgファイルが既に用意してあります。 -このファイルをダブルクリックするとスマートコンフィギュレータパースペクティブが開き、複数のタブを含んだ設定ページが表示されます。 -概要タブに現在選択されているコンポーネントがバージョンとともにリストアップされています。 -これらはテストアプリケーションの実行に必要なものが設定済みとなっています。 -ボード情報、クロック設定などもGR-ROSEに合わせて設定済みです。 - -設定が必要な個所は、 -コンポーネントタブで r_t4_rx コンポーネントの設定を表示させます。ここで、次のプロパティの値 -#IP address for ch0,when DHCP disable. - -として、GR-ROSEに設定するIPv4アドレスを皆さんの環境に合った値に設定してください。 -ここだけが設定が必要な個所です。 - -設定を保存し、画面右上のソースファイル生成ボタンを押してソースファイルを生成させてください。 - -------------------------------------- -3.testプロジェクトに生成させたソースファイルをコピーする -------------------------------------- - -e2studioのプロジェクト・エクスプローラー画面のtestプロジェクトのフォルダを展開すると、 -srcフォルダがあります。このフォルダに、smcプロジェクトフォルダ内のsrc/smc_genをコピーしてください。 - -------------------------------------- -4.testプロジェクトの動作を選択する -------------------------------------- - -テストアプリケーションは、暗号化テスト、ベンチマーク、TLSクライアント、TLSサーバーの -4種類の動作を選択できます。選択は、common/user_settings.hの -定義文を有効化することで行います。 - -------------------------------------- -5.wolfsslプロジェクト、testプロジェクトをビルドする -------------------------------------- - -ビルド前に必ず上記4の設定が終わっていることを確認してください。 -ビルドはwolfssl,testの順に行います。 - -------------------------------------- -6.エミュレータを使ってtestアプリケーションを実行する -------------------------------------- - -エミュレータとターゲットボードとPCをケーブルで接続したら、すでに、test HardwareDebug.launchが用意してありますから -e2studioの”実行” >”デバッグ”を選択してデバッグを開始してください。 - -お手持ちのエミュレータが異なる場合はデバッグ構成を変更して上記ファイルを更新してください。 - - -================================================================================= - ------------------------------------------------------ -0. About this document ------------------------------------------------------ - -This document will show you how to create a test application containing wolfssl on E2Studio. - -The folder that contains this README has: - 1.smc --- the folder where the smart configurator project is stored. - 2.test --- the folder where the test application project is stored - 3. wolfssl --- the folder where the project for the wolfssl library used by the test application is stored. - 4.common --- the folder where the configuration files etc. are stored - - -------------------------------------- -1. Import projects -------------------------------------- - -After starting e2studio, display the project explorer screen, -select "File" menu> "Open project from file system...", -Display the project import dialog. - -Press the directory button and import the 3 projects in the folders 1 to 3 above. - -------------------------------------- -2. Generate source files in smc project -------------------------------------- - -The smc.scfg file is already prepared in the smc project. -Double-clicking on this file will open the Smart Configurator perspective, -displaying a configuration page with multiple tabs. -The components currently selected in the Overview tab are listed along with their version. -These are already set up to run the test application. -Board information and clock settings are already set according to GR-ROSE. - -The points that need to be set are -Display the r_t4_rx component settings in the component tab. Where the value of the following property -#IP address for ch0,when DHCP disable. - -Then, set the IPv4 address set in GR-ROSE to a value that suits your environment. -This is the only place that needs to be set. - -Save the settings and press the source file generation button at the top right of the screen to generate the source file. - -------------------------------------- -3. Copy the source files generated in the test project -------------------------------------- - -When you expand the test project folder on the e2studio Project Explorer screen, -There is a src folder. Copy src/smc_gen in the smc project folder to test/src folder. - -------------------------------------- -4. Select the behavior of the test project -------------------------------------- - -Test applications include encryption test, benchmark, TLS client, TLS server -You can select four types of operation. Select from common/user_settings.h -This is done by activating one of those commented definition statements. - -------------------------------------- -5. Build wolfssl project, test project -------------------------------------- - -Make sure that the above 4 settings are completed before building. -Build in order of wolfssl and test. - -------------------------------------- -6. Run the test application using the emulator -------------------------------------- - -After connecting the emulator, target board and PC with a cable, test HardwareDebug.launch is already prepared. -Select "Run"> "Debug" in e2 studio to start debugging. - -If the emulator you have is different, change the debug configuration and update the above file. diff --git a/IDE/Renesas/e2studio/GR-ROSE/include.am b/IDE/Renesas/e2studio/GR-ROSE/include.am deleted file mode 100644 index c56df0796..000000000 --- a/IDE/Renesas/e2studio/GR-ROSE/include.am +++ /dev/null @@ -1,23 +0,0 @@ -# vim:ft=automake -# included from Top Level Makefile.am -# All paths should be given relative to the root - -EXTRA_DIST+= IDE/Renesas/e2studio/GR-ROSE/README -EXTRA_DIST+= IDE/Renesas/e2studio/GR-ROSE/wolfssl/.cproject -EXTRA_DIST+= IDE/Renesas/e2studio/GR-ROSE/wolfssl/.project -EXTRA_DIST+= IDE/Renesas/e2studio/GR-ROSE/test/.cproject -EXTRA_DIST+= IDE/Renesas/e2studio/GR-ROSE/test/.project -EXTRA_DIST+= IDE/Renesas/e2studio/GR-ROSE/test/test_HardwareDebug.launch -EXTRA_DIST+= IDE/Renesas/e2studio/GR-ROSE/test/src/test_main.c -EXTRA_DIST+= IDE/Renesas/e2studio/GR-ROSE/test/src/key_data.c -EXTRA_DIST+= IDE/Renesas/e2studio/GR-ROSE/test/src/key_data.h -EXTRA_DIST+= IDE/Renesas/e2studio/GR-ROSE/test/src/wolf_client.c -EXTRA_DIST+= IDE/Renesas/e2studio/GR-ROSE/test/src/wolf_server.c -EXTRA_DIST+= IDE/Renesas/e2studio/GR-ROSE/test/src/wolfssl_demo.h -EXTRA_DIST+= IDE/Renesas/e2studio/GR-ROSE/common/wolfssl_dummy.c -EXTRA_DIST+= IDE/Renesas/e2studio/GR-ROSE/common/strings.h -EXTRA_DIST+= IDE/Renesas/e2studio/GR-ROSE/common/unistd.h -EXTRA_DIST+= IDE/Renesas/e2studio/GR-ROSE/common/user_settings.h -EXTRA_DIST+= IDE/Renesas/e2studio/GR-ROSE/smc/.cproject -EXTRA_DIST+= IDE/Renesas/e2studio/GR-ROSE/smc/.project -EXTRA_DIST+= IDE/Renesas/e2studio/GR-ROSE/smc/smc.scfg \ No newline at end of file diff --git a/IDE/Renesas/e2studio/GR-ROSE/smc/smc.scfg b/IDE/Renesas/e2studio/GR-ROSE/smc/smc.scfg deleted file mode 100644 index a3a47ef41..000000000 --- a/IDE/Renesas/e2studio/GR-ROSE/smc/smc.scfg +++ /dev/null @@ -1,818 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/IDE/Renesas/e2studio/GR-ROSE/test/src/key_data.c b/IDE/Renesas/e2studio/GR-ROSE/test/src/key_data.c deleted file mode 100644 index 4a4fd08a3..000000000 --- a/IDE/Renesas/e2studio/GR-ROSE/test/src/key_data.c +++ /dev/null @@ -1,278 +0,0 @@ -/* key_data.c - * - * Copyright (C) 2006-2021 wolfSSL Inc. - * - * This file is part of wolfSSL. - * - * wolfSSL is free software; you can redistribute it and/or modify - * it under the terms of the GNU General Public License as published by - * the Free Software Foundation; either version 2 of the License, or - * (at your option) any later version. - * - * wolfSSL is distributed in the hope that it will be useful, - * but WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - * GNU General Public License for more details. - * - * You should have received a copy of the GNU General Public License - * along with this program; if not, write to the Free Software - * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA - */ - - - -#include "key_data.h" - -/*------------------------------------------------------------------------- - TSIP v1.09 ---------------------------------------------------------------------------*/ -#if defined(WOLFSSL_RENESAS_TSIP_TLS) && (WOLFSSL_RENESAS_TSIP_VER >=109) - -/* Key type of the encrypted user_public_key 0: RSA-2048 2: ECDSA-P256*/ -const uint32_t encrypted_user_key_type = 0; - -const st_key_block_data_t g_key_block_data = -{ - /* uint8_t encrypted_provisioning_key[R_TSIP_AES_CBC_IV_BYTE_SIZE * 2]; */ - { - 0xE9,0x67,0x79,0xF7,0x38,0x73,0xC8,0x59,0x94,0x62,0x7D,0xB9,0x83,0xDE,0x59,0x4A, - 0x92,0x53,0x6B,0x14,0x1B,0x2A,0x99,0xDF,0x95,0xFD,0x35,0x84,0x93,0xCE, 0xDB,0x10 - }, - /* uint8_t iv[R_TSIP_AES_CBC_IV_BYTE_SIZE]; */ - { - 0xF6, 0xA9, 0x83, 0x5A, 0xA1, 0x65, 0x1D, 0x28, 0xC8, 0x1A, 0xA6, 0x9D, 0x34, 0xB2, 0x4D, 0x92 - }, - /* uint8_t encrypted_user_rsa2048_ne_key[R_TSIP_RSA2048_NE_KEY_BYTE_SIZE + 16]; */ - { - 0x34, 0x59, 0xFF, 0xFE, 0xAA, 0xE9, 0x26, 0x60, 0x8C, 0xB8, 0x76, 0xD2, 0x98, 0x65, 0x72, 0x3B, - 0x19, 0x78, 0xB8, 0x9B, 0x0D, 0xD4, 0xFC, 0x2A, 0xF8, 0x54, 0x3B, 0x75, 0x0E, 0x40, 0x21, 0xF5, - 0xF2, 0x6D, 0x3F, 0x60, 0xD2, 0xDF, 0xE7, 0xDB, 0x67, 0xF1, 0xC7, 0x66, 0x5F, 0x37, 0xAF, 0x9D, - 0x08, 0xE7, 0xFD, 0xEF, 0x63, 0xA9, 0x78, 0x73, 0x1A, 0xE2, 0x47, 0x91, 0xB5, 0xA0, 0xCE, 0xA2, - 0xC7, 0x4F, 0x8A, 0xE5, 0x03, 0x6F, 0xC5, 0xB8, 0xC4, 0x40, 0x12, 0x2D, 0x37, 0x2F, 0xF2, 0xC5, - 0x73, 0x2D, 0xF8, 0xBF, 0x4A, 0xDC, 0xB7, 0x98, 0xDF, 0xE8, 0xED, 0xF8, 0x3B, 0x24, 0x8A, 0x01, - 0xAE, 0x64, 0x89, 0x9C, 0x79, 0x66, 0x99, 0xE4, 0xF8, 0xC1, 0x3E, 0x04, 0x56, 0x1E, 0x6E, 0xBA, - 0x2D, 0xAA, 0xB9, 0xE8, 0xA0, 0xC2, 0x27, 0xCF, 0x7C, 0x0F, 0xAD, 0x0A, 0x22, 0xEE, 0x61, 0xA8, - 0x32, 0xBE, 0xEE, 0xE7, 0x3F, 0x5D, 0xE5, 0xBD, 0x75, 0x6B, 0x35, 0xC1, 0x77, 0xCC, 0x7D, 0x0E, - 0x2E, 0x26, 0x67, 0xC4, 0x0E, 0x84, 0x34, 0xBD, 0x33, 0xB3, 0x0C, 0xD9, 0x07, 0xE5, 0x8E, 0x3E, - 0x7E, 0xCC, 0x56, 0x5D, 0x23, 0x5A, 0x96, 0x83, 0x0C, 0xD9, 0x7F, 0xB0, 0xF7, 0x53, 0xD9, 0x5C, - 0xE2, 0x1B, 0xDA, 0x63, 0x62, 0x19, 0x16, 0x9D, 0x75, 0x7B, 0xBB, 0x7E, 0xC9, 0xB5, 0xAD, 0x7D, - 0xBB, 0x5A, 0xFA, 0xA5, 0x5B, 0x54, 0xA1, 0x93, 0x6D, 0x53, 0x3C, 0x85, 0x69, 0x00, 0x15, 0x40, - 0x0E, 0x54, 0xD2, 0xBA, 0xB5, 0x80, 0x1C, 0x25, 0x85, 0x0E, 0x60, 0x87, 0x2A, 0x1A, 0xE7, 0x60, - 0xCB, 0x6A, 0xF5, 0xAF, 0x84, 0x4B, 0xB7, 0x0D, 0x0C, 0xC0, 0xB5, 0x02, 0xB2, 0x38, 0x9D, 0x7C, - 0xFA, 0x31, 0xF3, 0x50, 0xB3, 0x32, 0x69, 0x3A, 0x3C, 0x7A, 0xA5, 0x67, 0x19, 0x66, 0xD5, 0x62, - 0xA3, 0xF2, 0xF7, 0x77, 0x73, 0xF6, 0xE7, 0x8D, 0x51, 0x0C, 0x19, 0xA3, 0x0F, 0x8C, 0x79, 0xE0, - 0x7C, 0xCF, 0x8A, 0x03, 0x70, 0xC7, 0x25, 0x9D, 0xCE, 0x89, 0x77, 0x8E, 0x4C, 0xE6, 0x97, 0xC8 - }, - /* uint8_t encrypted_user_update_key[R_TSIP_AES256_KEY_BYTE_SIZE + 16]; */ - { - 0x69, 0xDB, 0xC6, 0x86, 0xA5, 0x06, 0x22, 0x59, 0x11, 0x14, 0x73, 0x56, 0x3A, 0x9E, 0x44, 0xC3, - 0x9C, 0xA8, 0x76, 0xC6, 0xF6, 0xE8, 0xD8, 0xE2, 0x17, 0x66, 0x90, 0x65, 0x08, 0xB5, 0x39, 0x7F, - 0xD5, 0xC5, 0x6F, 0xD1, 0xCB, 0xFB, 0xB2, 0x76, 0x33, 0xA1, 0x22, 0x0F, 0xBE, 0x83, 0x91, 0x24 - }, -}; - - -/* ./ca-cert.der.sign, */ -const unsigned char ca_cert_sig[] = -{ - 0x25,0x7B,0x10,0x4D,0xAF,0xB1,0xC1,0x50,0x7B,0x63,0x17,0xA0,0x38,0xA7,0x03,0x44, - 0x7A,0x7E,0x8D,0x3D,0x38,0xEE,0x4B,0xE4,0xB2,0x48,0x76,0x07,0xF8,0x06,0xB1,0x9D, - 0xBB,0xD1,0x46,0xB5,0xF9,0x86,0x08,0x85,0x29,0x6F,0xED,0x26,0x2F,0x91,0x7B,0x2B, - 0x36,0xAC,0x7E,0x56,0x2D,0x2B,0x8E,0x81,0x1B,0x3C,0xFA,0x08,0x80,0x05,0x01,0xC1, - 0xF3,0x71,0xFE,0xE9,0x59,0xA7,0xB6,0x82,0x62,0x04,0xA5,0xE4,0x6E,0xC9,0x32,0xCC, - 0xB1,0x19,0xBC,0xDE,0x6A,0x9B,0xEB,0x60,0x92,0xC5,0x46,0xB7,0xFF,0xF4,0xC1,0x77, - 0x5A,0xF4,0x53,0x41,0x6A,0x44,0x8B,0x46,0x3B,0xBE,0x74,0xBA,0x62,0xAF,0xFF,0xF2, - 0x32,0xCD,0x7A,0x97,0xE1,0xA8,0xBF,0x62,0x76,0xDA,0xBF,0x93,0x8B,0x1E,0x87,0xCC, - 0xEE,0x5D,0xCF,0xE9,0xBE,0xA6,0x25,0x6C,0xC4,0x92,0x2E,0x69,0x29,0x8F,0xCD,0x4C, - 0x07,0x91,0x20,0xD1,0x16,0xF9,0x6A,0x23,0xC8,0x5E,0xD4,0x7C,0x38,0xA2,0x80,0xCB, - 0x59,0x32,0xDD,0x28,0x46,0x6E,0x19,0xE9,0xAD,0x68,0x2B,0x0C,0xA0,0xB5,0x2A,0x8F, - 0x73,0xC2,0xED,0xF2,0x60,0x4F,0xF3,0xCE,0xDC,0x1B,0xA7,0x88,0x66,0x42,0xF0,0xFD, - 0x9D,0x77,0x2C,0x04,0xC2,0x54,0x4C,0x1D,0x58,0x9E,0x6D,0x4E,0x21,0x73,0x7E,0x1A, - 0x2A,0xDC,0x54,0x24,0x66,0x63,0xBA,0xF1,0xF8,0x16,0xE7,0x29,0xB2,0x01,0x98,0xE5, - 0x49,0x6E,0x97,0x86,0x82,0x6C,0xF3,0x3B,0x54,0x57,0x2C,0xD8,0x8F,0xC5,0x70,0x3E, - 0x22,0xD7,0x6D,0x9F,0x27,0xEC,0xD6,0x12,0xE5,0x4F,0x1E,0x05,0x36,0x07,0xBA,0xB2 -}; -const int sizeof_ca_cert_sig = sizeof(ca_cert_sig); - -/* ./client-cert.der.sign, */ -const unsigned char client_cert_der_sign[] = -{ - 0x5D, 0x1F, 0x89, 0x41, 0xEC, 0x47, 0xC8, 0x90, 0x61, 0x79, - 0x8A, 0x16, 0x1F, 0x31, 0x96, 0x67, 0xD9, 0x3C, 0xEC, 0x6B, - 0x58, 0xC6, 0x5A, 0xED, 0x99, 0xB3, 0xEF, 0x27, 0x6F, 0x04, - 0x8C, 0xD9, 0x68, 0xB1, 0xD6, 0x23, 0x15, 0x84, 0x00, 0xE1, - 0x27, 0xD1, 0x1F, 0x68, 0xB7, 0x3F, 0x13, 0x53, 0x8A, 0x95, - 0x5A, 0x20, 0x7C, 0xB2, 0x76, 0x5B, 0xDC, 0xE0, 0xA6, 0x21, - 0x7C, 0x49, 0xCF, 0x93, 0xBA, 0xD5, 0x12, 0x9F, 0xEE, 0x90, - 0x5B, 0x3F, 0xA3, 0x9D, 0x13, 0x72, 0xAC, 0x72, 0x16, 0xFE, - 0x1D, 0xBE, 0xEB, 0x8E, 0xC7, 0xDC, 0xC4, 0xF8, 0x1A, 0xD8, - 0xA0, 0xA4, 0xF6, 0x04, 0x30, 0xF6, 0x7E, 0xB6, 0xC8, 0xE1, - 0xAB, 0x88, 0x37, 0x08, 0x63, 0x72, 0xAA, 0x46, 0xCC, 0xCA, - 0xF0, 0x9E, 0x02, 0x1E, 0x65, 0x67, 0xFF, 0x2C, 0x9D, 0x81, - 0x6C, 0x1E, 0xF1, 0x54, 0x05, 0x68, 0x68, 0x18, 0x72, 0x26, - 0x55, 0xB6, 0x2C, 0x95, 0xC0, 0xC9, 0xB2, 0xA7, 0x0B, 0x60, - 0xD7, 0xEB, 0x1D, 0x08, 0x1A, 0xA2, 0x54, 0x15, 0x89, 0xCB, - 0x83, 0x21, 0x5D, 0x15, 0x9B, 0x38, 0xAC, 0x89, 0x63, 0xD5, - 0x4B, 0xF4, 0x8B, 0x47, 0x93, 0x78, 0x43, 0xCB, 0x9B, 0x71, - 0xBF, 0x94, 0x76, 0xB5, 0xCE, 0x35, 0xA9, 0x1A, 0xD5, 0xA5, - 0xD8, 0x19, 0xA6, 0x04, 0x39, 0xB1, 0x09, 0x8C, 0x65, 0x02, - 0x58, 0x3A, 0x95, 0xEF, 0xA2, 0xC3, 0x85, 0x18, 0x61, 0x23, - 0x2D, 0xC5, 0xCD, 0x62, 0xC1, 0x19, 0x31, 0xE5, 0x36, 0x95, - 0x22, 0xDB, 0x3E, 0x1A, 0x3C, 0xE8, 0xC6, 0x2E, 0xDF, 0xD9, - 0x2F, 0x84, 0xC1, 0xF0, 0x38, 0x2B, 0xE5, 0x73, 0x35, 0x4F, - 0x05, 0xE2, 0xA5, 0x60, 0x79, 0xB0, 0x23, 0xDC, 0x56, 0x4C, - 0xE7, 0xD9, 0x1F, 0xCF, 0x6A, 0xFC, 0x55, 0xEB, 0xAA, 0x48, - 0x3E, 0x95, 0x2A, 0x10, 0x01, 0x05 -}; -const int sizeof_client_cert_der_sign = sizeof(client_cert_der_sign); - -uint32_t s_inst1[R_TSIP_SINST_WORD_SIZE] = { 0 }; -uint32_t s_inst2[R_TSIP_SINST2_WORD_SIZE]= { 0 }; - - -/*------------------------------------------------------------------------- - TSIP v1.06 ---------------------------------------------------------------------------*/ -#elif defined(WOLFSSL_RENESAS_TSIP_TLS) && (WOLFSSL_RENESAS_TSIP_VER >= 106) - -const st_key_block_data_t g_key_block_data = -{ - - /* uint8_t encrypted_session_key[R_TSIP_AES_CBC_IV_BYTE_SIZE * 2]; */ - { - 0xCE, 0xE0, 0xE9, 0x86, 0x62, 0x59, 0xF9, 0x8F, 0x3C, 0xFB, 0x81, 0x39, 0xC2, 0x82, 0xC7, 0xC9, - 0xCD, 0xEA, 0x6B, 0x16, 0x66, 0x77, 0x38, 0xCA, 0xF5, 0x6E, 0x6D, 0x5B, 0xF0, 0x30, 0xA2, 0x94 - }, - /* uint8_t iv[R_TSIP_AES_CBC_IV_BYTE_SIZE]; */ - { - 0xF6, 0xA9, 0x83, 0x5A, 0xA1, 0x65, 0x1D, 0x28, 0xC8, 0x1A, 0xA6, 0x9D, 0x34, 0xB2, 0x4D, 0x92 - }, - /* uint8_t encrypted_user_rsa2048_ne_key[R_TSIP_RSA2048_NE_KEY_BYTE_SIZE + 16]; */ - { - 0xFC, 0xB4, 0x0F, 0x72, 0xFE, 0xB4, 0xB1, 0xF7, 0xDB, 0xA7, 0x49, 0x9E, 0x0F, 0xF6, 0x4B, 0xA7, - 0x08, 0x0D, 0x3A, 0xFD, 0xAB, 0x7D, 0x82, 0xD7, 0x26, 0x36, 0xFC, 0xED, 0x3E, 0x53, 0xBC, 0xA1, - 0x3D, 0x75, 0x03, 0x5B, 0x53, 0x6D, 0x63, 0xBB, 0xB0, 0x9A, 0xD7, 0xEB, 0x7C, 0x99, 0x3B, 0xE4, - 0xB7, 0xA3, 0x83, 0xE7, 0x27, 0xBE, 0x88, 0x06, 0x2B, 0x81, 0x66, 0xF8, 0x94, 0x3E, 0x86, 0x02, - 0x5F, 0x97, 0x05, 0xFD, 0x93, 0x78, 0x06, 0x3A, 0xC6, 0xD0, 0x3A, 0x82, 0x5D, 0x10, 0xC4, 0xE3, - 0x30, 0x68, 0x48, 0x25, 0x31, 0xCD, 0x50, 0xBC, 0x91, 0xAF, 0x00, 0x4B, 0xAA, 0x6E, 0x3F, 0x6E, - 0x7F, 0x6A, 0x43, 0xAB, 0xB7, 0x06, 0x8D, 0x05, 0x1D, 0x26, 0x17, 0xE9, 0xD9, 0x72, 0x35, 0xED, - 0x79, 0x13, 0xEB, 0x57, 0xED, 0x33, 0x3B, 0x9B, 0x75, 0x15, 0xAB, 0x13, 0xEE, 0xDB, 0xCC, 0x9F, - 0x78, 0xF0, 0x51, 0x67, 0x53, 0xC2, 0xC3, 0xEF, 0xB1, 0x16, 0x39, 0xCB, 0x24, 0x5D, 0x11, 0x43, - 0x3F, 0xDC, 0x90, 0xD2, 0xA9, 0x4B, 0x6C, 0x9C, 0xBC, 0x77, 0x7B, 0xA4, 0x02, 0x8A, 0xB3, 0x7A, - 0x99, 0x75, 0x76, 0x86, 0xE2, 0xEA, 0x83, 0x8D, 0x07, 0xB0, 0xF1, 0xF0, 0x6E, 0x21, 0x19, 0x2E, - 0x16, 0x6B, 0xA3, 0x81, 0xB2, 0xE6, 0x29, 0x16, 0xAA, 0xBC, 0x43, 0x73, 0x1C, 0xC4, 0xDB, 0x92, - 0x2A, 0xA9, 0x20, 0x37, 0x64, 0x4C, 0xE1, 0x95, 0x91, 0x8C, 0x1E, 0xCD, 0xA3, 0xFE, 0x8B, 0x23, - 0x89, 0x2B, 0x6D, 0xA8, 0x6D, 0xD1, 0x7C, 0x20, 0xB9, 0x32, 0xA3, 0x0C, 0x8A, 0x5E, 0xE8, 0x7B, - 0xC8, 0x32, 0xA2, 0x81, 0x30, 0x7D, 0x21, 0x56, 0x97, 0x9C, 0x0C, 0x68, 0xAD, 0xFD, 0x6D, 0xFD, - 0xE0, 0x04, 0xE5, 0xB3, 0xC7, 0xED, 0x84, 0xCB, 0xD4, 0xB0, 0x84, 0x09, 0x99, 0xC3, 0xFB, 0x8B, - 0x91, 0x55, 0x2C, 0xCB, 0x48, 0x06, 0xD1, 0x6C, 0xE0, 0x42, 0x13, 0xDF, 0x2B, 0x73, 0x25, 0xB3, - 0x15, 0xC5, 0x8A, 0xDF, 0x01, 0x2B, 0x96, 0x01, 0x95, 0x84, 0xE4, 0x8E, 0xBA, 0x32, 0xCB, 0x77 - }, -}; - -const uint32_t s_flash[] = -{ - 0xa6f0651c, 0xa17c5a15, 0xa23e1bfb, 0xc04e1bb9, - 0x5594fc81, 0x67fad158, 0xfda808ae, 0x7e01cb88, - 0xbf12d558, 0x9ec08adc, 0x21c25af2, 0x60d43062, - 0x82e6b470, 0x178879a6, 0x9ddb263f, 0xddb57b53, - 0x220ea793, 0x24de7b88, 0x9fa846e4, 0xdf9059f9, - 0x7ce55a19, 0x686689e5, 0x9aaef400, 0x88fd178a, - 0xf4e33b46, 0xc9394a88, 0x712823b9, 0xca75513f, - 0x63859e61, 0x45477873, 0x357b5776, 0x83cc1def, - 0x74cb65ab, 0xa919863c, 0x9f75e62e, 0x5fd62143, - 0xdbae440a, 0x34053525, 0x56e221e1, 0x8ffbaeb5, - 0xa75c55f0, 0x34727e44, 0x2c791463, 0x7670923f, - 0xc0287d97, 0x0a09b5c9, 0xfaecf18e, 0x09ceab85, - 0x687ad46f, 0x7e4d8adb, 0x6def5893, 0x6f236da3, - 0xab6e15e1, 0x653f41d0, 0x05652571, 0x9ec8ec15, - 0x2d4acb06, 0x7d5c2c26, 0xf49455cb, 0x9872dc50, - 0xb9fe50a2, 0x34bf45ae, 0x4cf2b6bf, 0xe1c75c7b, - 0x6e23718f, 0x227b0a55, 0x3a5e8b00, 0x83222dba, - 0x4041008f, 0x40fc8d01, 0xcd6c5c64, 0x0b8183b5, - 0x678bf9e7, 0x57844b52, 0xb4c81735, 0x559e77f3, - 0xb2b6800e, 0x715de4e2, 0x7a2720bb, 0x7b434710, - 0xee264103, 0x9db8c751, 0x78291c62, 0x77b883f4, - 0xa27d1216, 0x4e733ba6, 0x8a5f40dc, 0x32d2dd82, - 0x8a5fdc67, 0xd8fb0926, 0x9d5aec51, 0x08bfce4d, - 0x2a54839b, 0xe6601069, 0x564fbdbf, 0x9bb43dc7, - 0x9bb59d3a, 0xc3aaa60c, 0x2f2e75d7, 0x6a953972, - 0x6de4fd23, 0x546c212b, 0xe8aad33f, 0xca416c37, - 0xa74b36f9, 0x520330f0, 0x96145828, 0x09c21110, - 0x0b29365a, 0xfe9a9e60, 0x82b3a215, 0x752daa46, - 0x45bd59d6, 0x145ba47f, 0x75e40f92, 0x2f904860, - 0x609e3b0a, 0x8e6e6aa8, 0xe88ea1c3, 0x22a1db60, - 0x9947e0c7, 0x28416ca7, 0x3cb6abe6, 0x0e367da7, - 0x17b16976, 0x5323ccde, 0xc7337459, 0xf07293ad, -}; - -/* ./ca-cert.der.sign, */ -const unsigned char ca_cert_sig[] = -{ - 0x86, 0xD6, 0xC5, 0xB0, 0xE1, 0x37, 0x4C, 0x21, 0xF7, 0x8D, - 0x7C, 0x36, 0x80, 0xDB, 0x51, 0x58, 0x9D, 0x32, 0x5A, 0x1C, - 0xF3, 0xAC, 0x24, 0x17, 0xD4, 0x61, 0x9F, 0x09, 0x73, 0xA0, - 0x1E, 0x30, 0xE7, 0x6F, 0x00, 0xF8, 0xDB, 0xAA, 0x34, 0x4E, - 0x96, 0xA3, 0x3D, 0xBC, 0xE8, 0xFF, 0xBE, 0x4E, 0x62, 0x70, - 0x7B, 0xC7, 0x65, 0x2E, 0x9D, 0x1C, 0xE1, 0x5A, 0x7C, 0x2B, - 0xCD, 0x57, 0xEA, 0xF4, 0x16, 0xBC, 0x47, 0x26, 0xF5, 0x41, - 0x1F, 0x4E, 0xFD, 0xA5, 0x65, 0xAE, 0x31, 0xEB, 0xDF, 0x10, - 0xAF, 0xCB, 0xCB, 0x27, 0x84, 0xB6, 0x59, 0x3C, 0x6B, 0x9B, - 0x68, 0xAF, 0xEF, 0x35, 0xAF, 0x59, 0x9B, 0x07, 0x69, 0x75, - 0x1A, 0x99, 0x92, 0x0F, 0x0D, 0x02, 0x5A, 0x2C, 0x14, 0xD5, - 0x38, 0x8B, 0xD2, 0xB5, 0x35, 0xC7, 0x2D, 0xEB, 0x97, 0x4C, - 0xC8, 0x53, 0xCF, 0x7C, 0x0C, 0xB3, 0x00, 0x90, 0x99, 0x0B, - 0xB1, 0xBE, 0x8B, 0xEA, 0x96, 0xB4, 0x75, 0x35, 0x9D, 0xA1, - 0x2E, 0xF3, 0xF3, 0xEA, 0xF5, 0x7B, 0x83, 0xEF, 0x03, 0x06, - 0x3C, 0x41, 0x1C, 0x32, 0x84, 0x4A, 0xB8, 0xB0, 0xAE, 0x67, - 0xE9, 0xE4, 0xEE, 0x58, 0x43, 0x0C, 0x0D, 0xAE, 0x6C, 0xB8, - 0x94, 0x7F, 0x80, 0x33, 0xD3, 0xDC, 0x04, 0x02, 0xDC, 0x6F, - 0x17, 0xDC, 0xAE, 0x79, 0xED, 0xE3, 0x99, 0xAA, 0xE8, 0x4E, - 0x6A, 0x43, 0x73, 0xE6, 0xF3, 0xF8, 0x5A, 0x51, 0x55, 0x5E, - 0x55, 0x2D, 0xD6, 0xF7, 0xD5, 0xAB, 0xBE, 0xBD, 0xC8, 0x7D, - 0xB0, 0xA7, 0x9A, 0x46, 0xC0, 0xDC, 0x16, 0x83, 0xE9, 0x2C, - 0x56, 0x6C, 0x45, 0x52, 0x3E, 0x05, 0x4D, 0x5F, 0x11, 0xD0, - 0x93, 0x0F, 0x82, 0x6D, 0x6E, 0xC0, 0x01, 0x38, 0x3B, 0x2F, - 0xD9, 0x80, 0x51, 0x6D, 0xD1, 0x1B, 0x22, 0x72, 0xBB, 0x15, - 0x5D, 0xBC, 0xB8, 0x07, 0xBB, 0x96 -}; -const int sizeof_ca_cert_sig = sizeof(ca_cert_sig); - -/* ./client-cert.der.sign, */ -const unsigned char client_cert_der_sign[] = -{ - 0x5D, 0x1F, 0x89, 0x41, 0xEC, 0x47, 0xC8, 0x90, 0x61, 0x79, - 0x8A, 0x16, 0x1F, 0x31, 0x96, 0x67, 0xD9, 0x3C, 0xEC, 0x6B, - 0x58, 0xC6, 0x5A, 0xED, 0x99, 0xB3, 0xEF, 0x27, 0x6F, 0x04, - 0x8C, 0xD9, 0x68, 0xB1, 0xD6, 0x23, 0x15, 0x84, 0x00, 0xE1, - 0x27, 0xD1, 0x1F, 0x68, 0xB7, 0x3F, 0x13, 0x53, 0x8A, 0x95, - 0x5A, 0x20, 0x7C, 0xB2, 0x76, 0x5B, 0xDC, 0xE0, 0xA6, 0x21, - 0x7C, 0x49, 0xCF, 0x93, 0xBA, 0xD5, 0x12, 0x9F, 0xEE, 0x90, - 0x5B, 0x3F, 0xA3, 0x9D, 0x13, 0x72, 0xAC, 0x72, 0x16, 0xFE, - 0x1D, 0xBE, 0xEB, 0x8E, 0xC7, 0xDC, 0xC4, 0xF8, 0x1A, 0xD8, - 0xA0, 0xA4, 0xF6, 0x04, 0x30, 0xF6, 0x7E, 0xB6, 0xC8, 0xE1, - 0xAB, 0x88, 0x37, 0x08, 0x63, 0x72, 0xAA, 0x46, 0xCC, 0xCA, - 0xF0, 0x9E, 0x02, 0x1E, 0x65, 0x67, 0xFF, 0x2C, 0x9D, 0x81, - 0x6C, 0x1E, 0xF1, 0x54, 0x05, 0x68, 0x68, 0x18, 0x72, 0x26, - 0x55, 0xB6, 0x2C, 0x95, 0xC0, 0xC9, 0xB2, 0xA7, 0x0B, 0x60, - 0xD7, 0xEB, 0x1D, 0x08, 0x1A, 0xA2, 0x54, 0x15, 0x89, 0xCB, - 0x83, 0x21, 0x5D, 0x15, 0x9B, 0x38, 0xAC, 0x89, 0x63, 0xD5, - 0x4B, 0xF4, 0x8B, 0x47, 0x93, 0x78, 0x43, 0xCB, 0x9B, 0x71, - 0xBF, 0x94, 0x76, 0xB5, 0xCE, 0x35, 0xA9, 0x1A, 0xD5, 0xA5, - 0xD8, 0x19, 0xA6, 0x04, 0x39, 0xB1, 0x09, 0x8C, 0x65, 0x02, - 0x58, 0x3A, 0x95, 0xEF, 0xA2, 0xC3, 0x85, 0x18, 0x61, 0x23, - 0x2D, 0xC5, 0xCD, 0x62, 0xC1, 0x19, 0x31, 0xE5, 0x36, 0x95, - 0x22, 0xDB, 0x3E, 0x1A, 0x3C, 0xE8, 0xC6, 0x2E, 0xDF, 0xD9, - 0x2F, 0x84, 0xC1, 0xF0, 0x38, 0x2B, 0xE5, 0x73, 0x35, 0x4F, - 0x05, 0xE2, 0xA5, 0x60, 0x79, 0xB0, 0x23, 0xDC, 0x56, 0x4C, - 0xE7, 0xD9, 0x1F, 0xCF, 0x6A, 0xFC, 0x55, 0xEB, 0xAA, 0x48, - 0x3E, 0x95, 0x2A, 0x10, 0x01, 0x05 -}; -const int sizeof_client_cert_der_sign = sizeof(client_cert_der_sign); - -uint32_t s_inst1[R_TSIP_SINST_WORD_SIZE] = { 0 }; -uint32_t s_inst2[R_TSIP_SINST2_WORD_SIZE]= { 0 }; - - - -#endif \ No newline at end of file diff --git a/IDE/Renesas/e2studio/GR-ROSE/test/test_HardwareDebug.launch b/IDE/Renesas/e2studio/GR-ROSE/test/test_HardwareDebug.launch deleted file mode 100644 index 1aecc2d2e..000000000 --- a/IDE/Renesas/e2studio/GR-ROSE/test/test_HardwareDebug.launch +++ /dev/null @@ -1,136 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/IDE/Renesas/e2studio/RX65N/GR-ROSE/README_EN.md b/IDE/Renesas/e2studio/RX65N/GR-ROSE/README_EN.md new file mode 100644 index 000000000..f3ba54c3f --- /dev/null +++ b/IDE/Renesas/e2studio/RX65N/GR-ROSE/README_EN.md @@ -0,0 +1,243 @@ +wolfSSL sample application project for GR-ROSE evaluation board +====== + +
+ +## 1. Overview +----- + +We provide a sample program for evaluating wolfSSL targeting the GR-ROSE evaluation board, which has RX65N MCU on it. The sample program runs in a bare metal environment that does not use a real-time OS and uses e2 studio as an IDE. This document describes the procedure from build to execution of the sample program. + +The sample provided is a single application that can evaluate the following three functions: + +- CryptoTest: A program that automatically tests various cryptographic operation functions +- Benchmark: A program that measures the execution speed of various cryptographic operations +- TlsClient: A program that performs TLS communication with the opposite TLS server application +

+ +Since the H/W settings and S/W settings for operating the evaluation board have already been prepared, the minimum settings are required to operate the sample application. In addition, the RootCA certificate and server-side certificate required for TLS communication have already been set for sample use only. + +The following sections will walk you through the steps leading up to running the sample application. +

+ +## 2. Target H/W, components and libraries +----- + +This sample program uses the following hardware and software libraries. If a new version of the software component is available at the time of use, please update it as appropriate. + +|item|name & version| +|:--|:--| +|Board|GR-ROSE| +|Device|R5F565NEHxFP| +|IDE| Renesas e2Studio Version:2021-10 | +|Emulator| E1, E2 Emulator Lite | +|Toolchain|CCRX v3.03.00| +|TSIP| TSIP v1.14| +
+ +The project of this sample program has a configuration file that uses the following FIT components. +However, the FIT components themselves are not included in the distribution of this sample application. You need to download it by operating in the IDE. Some FIT components (TSIPs) cannot be downloaded directly from within the IDE and may need to be downloaded separately from the Renesas download site. +
+ +|FIT component|version|name| +|:--|:--|:--| +|Board Support Packages|6.21|r_bsp| +|CMT driver|4.90|r_cmt_rx| +|Ethernet Driver|1.21|r_ether_rx|1.21|r_ether_rx| +|Generic system timer for RX MCUs|1.01|r_sys_time_rx| +|TCP/IP protocol stack[M3S-T4-Tiny] - RX Ethernet Driver Interface|1.09|r_t4_driver_rx| +|TCP/IP protocol stack[M3S-T4-Tiny] for Renesas MCUs|2.10|r_t4_rx| +|TSIP(Trusted Secure IP) driver|1.14|r_tsip_rx| +
+ +Note) As of December 2021, TIPS v1.14 does not seem to be able to be added as a FIT component by adding a component in the Smart Configurator Perspective. Add it manually along the method described later. +

+ +## 3. Importing sample application project into e2Studio +---- + +There is no need to create a new sample program. Since the project file is already prepared, please import the project from the IDE by following the steps below. + ++ e2studio "File" menu> "Open project from file system ..."> "Directory (R) ..." Click the import source button and select the folder from which the project will be imported. Select the folder (Renesas/e2studio/\/\/)) where this README file exists. ++ Four projects that can be imported are listed, but check only the three projects "smc", "test" and "wolfssl" and click the "Finish" button. + +You should see the **smc**, **test**, and **wolfssl** 3 projects you imported into the project explorer. +

+ +## 4. FIT module download and smart configurator file generation +---- + +You will need to get the required FIT modules yourself. Follow the steps below to get them. + +1. Open the smc project in Project Explorer and double-click the **smc.scfg** file to open the Smart Configurator Perspective. + +2. Select the "Components" tab on the software component settings pane. Then click the "Add Component" button at the top right of the pane. The software component selection dialog will pop up. Click "Download the latest version of FIT driver and middleware" at the bottom of the dialog to get the modules. You can check the dowmload destination folder by pressing "Basic settings...". + +3. The latest version of the TSIP component may not be automatically obtained due to the delay in Renesas' support by the method in step 2 above. In that case, you can download it manually from the Renesas website. Unzip the downloaded component and store the files contained in the FIT Modules folder in the download destination folder of step 2. + +4. Select the required FIT components shown from the list and press the "Finish" button. Repeat this operation until you have the required FIT components. + +5. Select the Components tab on the Software Component Settings pane and select the r_t4_rx component. In the settings pane on the right, specify the IP address of this board as the value of the "# IP address for ch0, when DHCP disable." Property (e.g. 192.168.1.9). + +6. Press the "Generate Code" button at the top right of the software component settings pane to have the smart configurator generate the source files. A src/smc_gen folder will be created under the smc project to store source files, libraries, etc. + +

+ +## 5. Adding smc_gen files to the test project +---- + +The test project is a sample application project. When you open the test project in the project explorer, there is a src folder, which contains the source files of the sample application. Add the source files by copying and pasting the smc_gen folder generated in the step5, directly under this src folder. + +Make sure you have a folder hierarchy like this: + +``` +/test/src/smc_gen +``` +
+ +## 6. Select the behavior of the test application +---- + +The test project is a single sample application, but you can specify to perform one of the following by switching the settings: + +- CryptoTest: A program that automatically tests various encryption operation functions +- Benchmark: A program that measures the execution speed of various cryptographic operations +- TlsClient: A program that performs TLS communication with the opposite TLS server application + +Open the /test/src/wolfssl_demo.h file and enable one of the following definitions: + +- #define CRYPT_TEST +- #define BENCHMARK +- #define TLS_CLIENT + +Then build the test application. +

+ + +## 7. Build and run the test application +----- + +Now that the test application is ready to build. + +1. Build the wolfssl project on the project explorer, then the test project. + +2. After a successful build, connect the target board to the emulator and supply external power. + +3. Select "Run" menu> "Debug" to open the debug perspective. + +4. The test application outputs the operating status to the standard output. Keep the "Renesas Debug Virtual Console" open for viewing this standard output. + +5. Press the run button to run the test application. + +6. CryptoTest, Benchmark or TLS_Client After displaying the execution result according to the selected behavior, it enters an infinite loop, so if you think that the output has stopped, stop debugging. +

+ +## 8. Running test application as TLS_Client +----- +
+### 8.1 Generate a server application + +To operate as TLS_Client, an opposite application for TLS communication is required. A wolfSSL package provides a server sample application that you can use for this purpose. This program is generated by building wolfssl. You can build wolfSSL on Linux (including MacOS and WSL) with gcc installed or build using Visual Studio. The following introduces the build on WSL. +

+ +``` +$ cd +$ ./autogen.sh +$ ./configure CFLAGS="-DWOLFSSL_STATIC_RSA -DHAVEAES_CBC" +$ make +``` + +
+ +With the above build, /examples/server/server +Is generated. This executable acts as a TLS server application. If you execute it with the following options, it will be in the listening state for the connection from TLS_Client. +

+ +``` +$ examples/server/server -b -d -i +``` +
+ +For the test application, specify the IP address assigned to the server application. + +Open wolf_client.c to specify ip address of the server in "#define SIMPLE_TLSSEVER_IP" like as: +
+ +``` +-- /test/src/wolf_client.c -- + +... +#define SIMPLE_TLSSEVER_IP 192.168.53.9 +... +``` +
+Save the file and rebuild the test application. When you run the test application, it makes a TLS connection with the opposite application, then exchanges a simple string and displays the following on the standard output. +

+ +``` +cipher : ECDHE-RSA-AES128-GCM-SHA256 +Received: I hear you fa shizzle! + +cipher : ECDHE-RSA-AES128-SHA256 +Received: I hear you fa shizzle! + +cipher : AES128-SHA256 +Received: I hear you fa shizzle! + +cipher : AES256-SHA256 +Received: I hear you fa shizzle! + +cipher : ECDHE-RSA-AES128-SHA256 +Received: I hear you fa shizzle! + +cipher : ECDHE-RSA-AES128-GCM-SHA256 +Received: I hear you fa shizzle! +``` +
+ +### 8.2 Change server certificate (change authentication method) +
+The above is an execution example when the server certificate presented by the server application contains the RSA public key (RSA authentication). TSIP can also handle cases where the server certificate contains an ECC public key (ECDSA authentication). + +
+If you want to use a cipher suite that includes ECDSA, you will need to change the settings of the test application and rebuild. Open common/ user_settings.h, enable the USE_ECC_CERT definition and rebuild. +

+ +``` +-- /common/user_settings.h -- + +#define USE_ECC_CERT +``` +
+This definition causes the test application to use a RootCA certificate that can validate the server certificate containing the ECC public key presented by the server. + +
+In addition, the opposite server application also needs to specify the server certificate and private key file containing the ECC public key as an option, and then execute it as shown below. +

+ +``` +$ ./examples/server/server -b -d -i -c ./certs/server-ecc.pem -k ./certs/ecc-key.pem +``` +
+The following is displayed as the execution result. +

+ +``` +cipher : ECDHE-ECDSA-AES128-SHA256 +Received: I hear you fa shizzle! + +cipher : ECDHE-ECDSA-AES128-GCM-SHA256 +Received: I hear you fa shizzle! +``` +
+ +## 9. What you need to do to use the RootCA certificate prepared by the user +---- + +In this sample program, the RootCA certificate required to operate as TLS_Client and the server certificate used by the sample TLS server application are certificates that can be used only for evaluation. +If you want to use it for purposes beyond functional evaluation, you need to prepare the RootCA certificate yourself. with this, + 1. Provisioning key + 2. RSA key pair required for RootCA certificate validation + 3. The signature generated by the RootCA certificate with the private key in 2 above. + +will become necessary. Please refer to the manual provided by Renesas for how to generate them. \ No newline at end of file diff --git a/IDE/Renesas/e2studio/RX65N/GR-ROSE/README_JP.md b/IDE/Renesas/e2studio/RX65N/GR-ROSE/README_JP.md new file mode 100644 index 000000000..ef4b0b980 --- /dev/null +++ b/IDE/Renesas/e2studio/RX65N/GR-ROSE/README_JP.md @@ -0,0 +1,249 @@ +評価ボードGR-ROSE 用 wolfSSLサンプルプロジェクト +====== + +
+ +## 1. 概要 +----- + +Renesas社製MCU RX65Nを搭載した評価ボードGR-ROSEをターゲットとしてwolfSSLを評価するためのサンプルプログラムを提供します。サンプルプログラムはリアルタイムOSを使わないベアメタル環境で動作し、IDEとしてe2 studioを使用するものです。本ドキュメントではサンプルプログラムのビルドから実行までの手順を説明します。 + +提供するサンプルプログラムは次の3機能を評価できる単一のアプリケーションです: + +- CryptoTest: 各種暗号化オペレーション機能を自動テストするプログラム +- Benchmark: 各種暗号化オペレーションの実行速度を測定するプログラム +- TlsClient: 対向するTLSサーバーアプリケーションとTLS通信を行うプログラム + +評価ボードを動作させる為のH/W設定、S/W設定は既に用意していますから、サンプルプロジェクトの動作までは最少の設定で済むようになっています。また、TLS通信において必要となる、RootCA証明書、サーバー側証明書もサンプル使用に限定したものが既に設定済みです。 + +以降のセクションはサンプルアプリケーションの実行までのステップを順に説明していきます。 +

+ + +## 2. ターゲットとしているH/W、コンポーネント、ライブラリ +----- + +このサンプルプログラムでは以下のハードウエアやソソフトウエアライブラリを使用しています。皆さんがご利用時にバージョンの新しいソフトウエアコンポーネントが利用可能であれば適宜更新の上ご利用ください。 +

+ +|要素|名称/バージョン| +|:--|:--| +|評価ボード|GR-ROSE| +|Device|R5F565NEHxFP| +|IDE| Renesas e2Studio Version:2021-10 | +|エミュレーター| E1, E2エミュレーターLite | +|Toolchain|CCRX v3.03.00| +|TSIP| TSIP v1.14| +
+ +本サンプルプログラムのプロジェクトには以下のFITコンポーネントを使用する設定ファイルが用意されています。 +しかし、FITコンポーネント群そのものは本サンプルアプリケーションの配布物としては含まれていません。皆さん自身でIDE内の操作によってダウンロードしていただく必要があります。一部のFITコンポーネント(TSIP)はIDE内から直接ダウンロードできず、Renesas社のダウンロードサイトから別途ダウンロードが必要なものがあります。 +

+ + + +|FITコンポーネント|バージョン|略称| +|:--|:--|:--| +|Board Support Packages|6.21|r_bsp| +|CMT driver|4.90|r_cmt_rx| +|Ethernet Driver|1.21|r_ether_rx|1.21|r_ether_rx| +|Generic system timer for RX MCUs|1.01|r_sys_time_rx| +|TCP/IP protocol stack[M3S-T4-Tiny] - RX Ethernet Driver Interface|1.09|r_t4_driver_rx| +|TCP/IP protocol stack[M3S-T4-Tiny] for Renesas MCUs|2.10|r_t4_rx| +|TSIP(Trusted Secure IP) driver|1.14|r_tsip_rx| + +(注意)2021年12月現在、TIPSv1.14はFITコンポーネントとしてスマートコンフィギュレータパースペクティブのコンポーネントの追加操作では追加できないようです。後ほど説明する手動での追加方法を使って追加してください。
+ + +

+ +## 3. サンプルプログラムプロジェクトのe2Studioへのインポート +---- + +サンプルプログラムは新規作成する必要はありません。すでにプロジェクトファイルが用意されていますからIDEから以下の手順でプロジェクトをインポートしてください。 + + ++ 1.e2studioの"ファイル"メニュー > "ファイル・システムからプロジェクトを開く..." > "ディレクトリ(R)..."インポート元ボタンを押して、プロジェクトのインポート元となるフォルダーを選択します。本READMEファイルが存在するフォルダ(Renesas/e2studio/\/\/))を選択してください。 + ++ インポートできるプロジェクトが4つリストアップされますが、"smc", "test" と"wolfssl"の3プロジェクトにのみチェックを入れて”終了”ボタンを押してください。 + +プロジェクト・エクスプローラーにインポートしたsmc,test,wolfsslの3プロジェクトが表示されるはずです。 +

+ +## 4. FITモジュールの取得とスマートコンフィギュレータによるファイル生成 +---- + +FITモジュールは皆さん自身で取得していただく必要があります。以下の手順で取得してください。 +

+ + +1. プロジェクト・エクスプローラー上でsmcプロジェクトを開き**smc.scfg**ファイルをダブルクリックして、スマートコンフィギュレータパースペクティブを開きます。 + +2. ソフトウエアコンポーネント設定画面の"コンポーネント"タブを選択 > 画面右上の"コンポーネントの追加" ボタンを押して下さい。ソフトウエアコンポーネントの選択ダイアログが表示されます。ここで、画面下部の"最新版のFITドライバとミドルウエアをダウンロードする"を押して、モジュール群を取得しておいてください。ダウンロード先のフォルダは"基本設定..."を押して確認することができます。 + +3. TSIPコンポーネントは上記ステップ2の方法ではRenesas社の対応が遅れていて最新版が自動的には取得できないことがあります。その場合にはRenesas社のサイトから手動でダウンロードできます。ダウンロードしたコンポーネントのを解凍し、FITModulesフォルダに含まれているファイル群をステップ2のダウンロード先フォルダに格納してください。 + +4. 先に示したFITコンポーネントを一覧から選択して"終了"ボタンを押します。この操作を必要なFITコンポーネントを得るまで繰り返し行います。 + +5. ソフトウエアコンポーネント設定画面のコンポーネントタブを選択し、r_t4_rxコンポーネントを選択します。右の設定ペインに"# IP address for ch0, when DHCP disable."プロパティの値として、このボードのIPアドレスを皆さんの環境に合わせてて指定します(例: +192.168.1.9)。 + +6. ソフトウエアコンポーネント設定画面の右上の”コードの生成"ボタンを押して、スマートコンフィギュレータにソースファイルを生成させます。smcプロジェクトの下にsrc/smc_genフォルダが生成され、ソースファイル、ライブラリ等が格納されされます。 +

+ +## 5. testプロジェクトへのsmc_genファイル群の追加 +---- + +testプロジェクトはサンプルアプリケーションのプロジェクトです。プロジェクト・エクスプローラー上でtestプロジェクトを開くとsrcフォルダが存在し、そこにサンプルアプリケーションのソースファイルが格納されています。このsrcフォルダ直下に4-5で生成したsmc_genフォルダごとコピー&ペーストしてソースファイルを追加します。 + +test/src/smc_gen + +のようなフォルダ階層になることを確認してください。 +

+ +## 6. testアプリケーションの動作を選択する +---- +testプロジェクトが唯一のサンプルアプリケーションですが、その動作を設定で切り替えることによって、 + +- CryptoTest: 各種暗号化オペレーション機能を自動テストするプログラム +- Benchmark: 各種暗号化オペレーションの実行速度を測定するプログラム +- TlsClient: 対向するTLSサーバーアプリケーションとTLS通信を行うプログラム + +のいずれかの動作を行うよう指定できます。 + +設定はtest/src/wolfssl_demo.h ファイル内の、 + +- #define CRYPT_TEST +- #define BENCHMARK +- #define TLS_CLIENT + +のいずれか一つを有効にしてアプリケーションをビルドすることで行います。 +

+ + +## 7. testアプリケーションのビルドと実行 +----- + +testアプリケーションのビルドの準備が整ったので、ビルドを行います。 + +1.プロジェクト・エクスプローラー上のwolfsslプロジェクトをビルドし、次にtestプロジェクトをビルドします。 + +2.ビルドが成功したら、ターゲットボードとエミュレーターを接続し、外部電源を入力します。 + +3."実行"メニュー > "デバッグ"を選択し、デバッグパースペクティブを開きます。 + +4. testアプリケーションは標準出力に動作状況を出力します。この標準出力の表示用に、"Renesas Debug Virtual Console"を開いておきます。 + +5.実行ボタンを押してtestアプリケーションを動作させます。 + +6.CryptoTest、BenchmarkあるいはTLS_Client選択していた動作に応じた実行結果を表示したあと無限ループに入るので出力が停止したと思われたらデバッグを停止させます。 +

+ +## 8. TLS_Clientとしてのtestアプリケーションの実行 +----- +
+ +### 8.1 TLS対向アプリケーションの生成と実行 +
+ +testアプリケーションをTLS_Clientとしての動作を行わせる場合には、TLS通信の相手方となる対向アプリケーションが必要となります。wolfSSLパッケージにはこの用途に使用できるTLSserverサンプルアプリケーションが用意されています。このプログラムはwolfsslをビルドすることで生成されます。wolfSSLのビルドにはgccがインストールされているLinux(MacOS, WSLも含む)でのビルドとVisualStudioを使ってのビルドが可能です。以下ではWSL上でのビルドを紹介します。 +

+ +``` +$ cd +$ ./autogen.sh +$ ./configure CFLAGS="-DWOLFSSL_STATIC_RSA -DHAVEAES_CBC" +$ make +``` + +
+上記のビルドによって、/examples/server/server +が生成されます。この実行プログラムがサーバーアプリケーションとして機能します。以下のオプションを与えて実行させるとTLS_Clientからの接続を待ち受け状態になります。 +

+ +``` +$ examples/server/server -b -d -i +``` +
+testアプリケーションには、サーバーアプリケーションに割り当てられたIPアドレスを指定します。 + +wolf_client.cを開き、#define SIMPLE_TLSSEVER_IPにアドレスを指定します。 + +``` +-- wolf_client.c -- + +... +#define SIMPLE_TLSSEVER_IP 192.168.53.9 +... +``` +
+ファイルをセーブしてtestアプリケーションを再ビルドしてください。testアプリケーションを実行すると、対向アプリケーションとの間でTLS接続が行われ、その後簡単な文字列を交換して標準出力に以下のような表示を行います。 +

+ +``` +cipher : ECDHE-RSA-AES128-GCM-SHA256 +Received: I hear you fa shizzle! + +cipher : ECDHE-RSA-AES128-SHA256 +Received: I hear you fa shizzle! + +cipher : AES128-SHA256 +Received: I hear you fa shizzle! + +cipher : AES256-SHA256 +Received: I hear you fa shizzle! + +cipher : ECDHE-RSA-AES128-SHA256 +Received: I hear you fa shizzle! + +cipher : ECDHE-RSA-AES128-GCM-SHA256 +Received: I hear you fa shizzle! +``` +
+ +### 8.2 サーバー証明書の変更(認証方式の変更) + +
+上記はサーバーアプリケーションが提示すサーバー証明書にRSA公開鍵が含まれている(RSA認証)場合の実行例です。TSIPにはこのほかにサーバー証明書にECC公開鍵を含む場合(ECDSA認証)も扱えます。 + +
+ECDSAを含む暗号化スイートを使用したい場合には、testアプリケーションの設定を変更して再ビルドが必要となります。\/common/user_settings.h を開き、USE_ECC_CERT定義を有効化して再ビルドしてください。 +

+ +``` +#define USE_ECC_CERT +``` + +
+この定義により、testアプリケーションはサーバーの提示するECC公開鍵を含んだサーバー証明書を検証できるRootCA証明書を使うようになります。 +

+ +さらに対向するサーバーアプリケーションの方でも以下のようにECC公開鍵を含んだサーバー証明書と秘密鍵ファイルをオプションで指定して実行する必要があります。 +

+ +``` +$ ./examples/server/server -b -d -i -c ./certs/server-ecc.pem -k ./certs/ecc-key.pem +``` +
+実行結果として以下が表示されます。 +

+ +``` +cipher : ECDHE-ECDSA-AES128-SHA256 +Received: I hear you fa shizzle! + +cipher : ECDHE-ECDSA-AES128-GCM-SHA256 +Received: I hear you fa shizzle! +``` +
+ +## 9. ユーザーが用意したRootCA証明書を利用する際に必要なこと +----- + +本サンプルプログラムでは、TLS_Clientとして動作する際に必要なRootCA証明書とサンプルTLSサーバーアプリケーションが使用するサーバー証明書などは評価用でのみ利用可能な証明書です。 +機能評価を超えた目的で利用する場合にはRootCA証明書をユーザー自身で用意する必要があります。それに伴い、 + 1. Provisioning key + 2. RootCA証明書の検証の為に必要なRSA鍵ペア + 3. RootCA証明書を上記2の秘密鍵で生成した署名 + +が必要になります。それらの生成方法はRenesas社提供のマニュアルを参照してください。 diff --git a/IDE/Renesas/e2studio/GR-ROSE/common/strings.h b/IDE/Renesas/e2studio/RX65N/GR-ROSE/common/strings.h similarity index 100% rename from IDE/Renesas/e2studio/GR-ROSE/common/strings.h rename to IDE/Renesas/e2studio/RX65N/GR-ROSE/common/strings.h diff --git a/IDE/Renesas/e2studio/GR-ROSE/common/unistd.h b/IDE/Renesas/e2studio/RX65N/GR-ROSE/common/unistd.h similarity index 100% rename from IDE/Renesas/e2studio/GR-ROSE/common/unistd.h rename to IDE/Renesas/e2studio/RX65N/GR-ROSE/common/unistd.h diff --git a/IDE/Renesas/e2studio/RX65N/GR-ROSE/common/user_settings.h b/IDE/Renesas/e2studio/RX65N/GR-ROSE/common/user_settings.h new file mode 100644 index 000000000..509040ec2 --- /dev/null +++ b/IDE/Renesas/e2studio/RX65N/GR-ROSE/common/user_settings.h @@ -0,0 +1,221 @@ +/* user_settings.h + * + * Copyright (C) 2006-2021 wolfSSL Inc. + * + * This file is part of wolfSSL. + * + * wolfSSL is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 2 of the License, or + * (at your option) any later version. + * + * wolfSSL is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA + */ + +/*-- Renesas MCU type --------------------------------------------------------- + * + * + *----------------------------------------------------------------------------*/ +#define WOLFSSL_RENESAS_RX65N + + + +/*-- Renesas TSIP usage and its version --------------------------------------- + * + * "WOLFSSL_RENESAS_TSIP" definition makes wolfSSL to use H/W acceleration + * for cipher operations. + * TSIP definition asks to have its version number. + * "WOLFSSL_RENESAS_TSIP_VER" takes following value: + * 106: TSIPv1.06 + * 109: TSIPv1.09 + * 113: TSIPv1.13 + * 114: TSIPv1.14 + *----------------------------------------------------------------------------*/ + #define WOLFSSL_RENESAS_TSIP + #define WOLFSSL_RENESAS_TSIP_VER 114 + + +/*-- TLS version definitions -------------------------------------------------- + * + * wolfSSL supports TLSv1.2 by default. In case you want your system to support + * TLSv1.3, uncomment line below. + * + *----------------------------------------------------------------------------*/ +/*#define WOLFSSL_TLS13*/ + + +/*-- Operating System related definitions -------------------------------------- + * + * In case any real-time OS is used, define its name(e.g. FREERTOS). + * Otherwise, define "SINGLE_THREADED". They are exclusive each other. + * + *----------------------------------------------------------------------------*/ + #define SINGLE_THREADED +/*#define FREERTOS*/ + + +/*-- Cipher related definitions ----------------------------------------------- + * + * + *----------------------------------------------------------------------------*/ + + #define NO_DEV_RANDOM + + #define WOLFSSL_DH_CONST + #define HAVE_TLS_EXTENSIONS + + #define HAVE_AESGCM + #define HAVE_AES_CBC + #define WOLFSSL_SHA512 + + #define HAVE_SUPPORTED_CURVES + #define HAVE_ECC + #define HAVE_CURVE25519 + #define CURVE25519_SMALL + #define HAVE_ED25519 + + #define WOLFSSL_STATIC_RSA + + /* USE_ECC_CERT + * This macro is for selecting root CA certificate to load, it is valid only + * in example applications. wolfSSL does not refer this macro. + * If you want to use cipher suites including ECDSA authentication in + * the example applications with TSIP, enable this macro. + * In TSIP 1.13 or later version, following cipher suites are + * available: + * - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 + * - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SAH256 + * + * Note that, this macro disables cipher suites including RSA + * authentication such as: + * - TLS_RSA_WITH_AES_128_CBC_SHA + * - TLS_RSA_WITH_AES_256_CBC_SHA + * - TLS_RSA_WITH_AES_128_CBC_SHA256 + * - TLS_RSA_WITH_AES_256_CBC_SHA256 + * - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 + * - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA256 + * + */ + /*#define USE_ECC_CERT*/ + + /* In this example application, Root CA cert buffer named + * "ca_ecc_cert_der_256" is used under the following macro definition + * for ECDSA. + */ + #define USE_CERT_BUFFERS_256 + + /* In this example application, Root CA cert buffer named + * "ca_cert_der_2048" is used under the following macro definition + * for RSA authentication. + */ + #define USE_CERT_BUFFERS_2048 + +/*-- Misc definitions --------------------------------------------------------- + * + * + *----------------------------------------------------------------------------*/ + #define SIZEOF_LONG_LONG 8 + +#if !defined(min) + #define min(data1, data2) _builtin_min(data1, data2) +#endif + + /* + * -- "NO_ASN_TIME" macro is to avoid certificate expiration validation -- + * + * Note. In your actual products, do not forget to comment-out + * "NO_ASN_TIME" macro. And prepare time function to get calender time, + * otherwise, certificate expiration validation will not work. + */ + /*#define NO_ASN_TIME*/ + + #define NO_MAIN_DRIVER + #define BENCH_EMBEDDED + #define NO_WOLFSSL_DIR + #define WOLFSSL_NO_CURRDIR + #define NO_FILESYSTEM + #define WOLFSSL_LOG_PRINTF + #define WOLFSSL_HAVE_MIN + #define WOLFSSL_HAVE_MAX + #define WOLFSSL_SMALL_STACK + #define NO_WRITEV + #define WOLFSSL_USER_IO + + #define WOLFSSL_USER_CURRTIME /* for benchmark */ + #define USER_TIME + #define XTIME time + #define USE_WOLF_SUSECONDS_T + #define USE_WOLF_TIMEVAL_T + + + #define WC_RSA_BLINDING + #define TFM_TIMING_RESISTANT + #define ECC_TIMING_RESISTANT + + +/*-- Debugging options ------------------------------------------------------ + * + * "DEBUG_WOLFSSL" definition enables log to output into stdout. + * Note: wolfSSL_Debugging_ON() must be called just after wolfSSL_Init(). + *----------------------------------------------------------------------------*/ + +/*#define DEBUG_WOLFSSL*/ + +/*-- Definitions for functionality negation ----------------------------------- + * + * + *----------------------------------------------------------------------------*/ + +/*#define NO_RENESAS_TSIP_CRYPT*/ +/*#define NO_WOLFSSL_RENESAS_TSIP_TLS_SESSION*/ + +#if defined(WOLFCRYPT_ONLY) + #undef WOLFSSL_RENESAS_TSIP +#endif + +/*-- Consistency checking between definitions --------------------------------- + * + * + *----------------------------------------------------------------------------*/ + +/*-- TSIP TLS specific definitions --*/ +#if defined(WOLFSSL_RENESAS_TSIP) + #if !defined(WOLFSSL_RENESAS_TSIP_VER) + #error "WOLFSSL_RENESAS_TSIP_VER is required to be defined and have value" + #endif +#endif + +/*-- Complementary definitions ------------------------------------------------ + * + * + *----------------------------------------------------------------------------*/ + +#if defined(WOLFSSL_RENESAS_TSIP) + + #if !defined(NO_RENESAS_TSIP_CRYPT) + #define WOLFSSL_RENESAS_TSIP_CRYPT + #define WOLFSSL_RENESAS_TSIP_TLS + #define WOLFSSL_RENESAS_TSIP_TLS_AES_CRYPT + #define HAVE_PK_CALLBACKS + #define WOLF_CRYPTO_CB + #endif + +#else + #define OPENSSL_EXTRA + #define WOLFSSL_GENSEED_FORTEST /* Warning: define your own seed gen */ +#endif + + +/*-- TLS version and required definitions --*/ +#if defined(WOLFSSL_TLS13) + #define HAVE_FFDHE_2048 + #define HAVE_HKDF + #define WC_RSA_PSS +#endif diff --git a/IDE/Renesas/e2studio/RX72NEnvisionKit/common/wolfssl_dummy.c b/IDE/Renesas/e2studio/RX65N/GR-ROSE/common/wolfssl_dummy.c similarity index 100% rename from IDE/Renesas/e2studio/RX72NEnvisionKit/common/wolfssl_dummy.c rename to IDE/Renesas/e2studio/RX65N/GR-ROSE/common/wolfssl_dummy.c diff --git a/IDE/Renesas/e2studio/RX65N/GR-ROSE/include.am b/IDE/Renesas/e2studio/RX65N/GR-ROSE/include.am new file mode 100644 index 000000000..60df793e5 --- /dev/null +++ b/IDE/Renesas/e2studio/RX65N/GR-ROSE/include.am @@ -0,0 +1,26 @@ +# vim:ft=automake +# included from Top Level Makefile.am +# All paths should be given relative to the root + +EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/README_EN.md +EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/README_JP.md +EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/wolfssl/.cproject +EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/wolfssl/.project +EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/wolfssl/wolfssl.rcpc +EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/test/.cproject +EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/test/.project +EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/test/test_HardwareDebug.launch +EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/test/test.rcpc +EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/test/src/test_main.c +EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/test/src/key_data.c +EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/test/src/key_data.h +EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/test/src/wolf_client.c +EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/test/src/wolf_server.c +EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/test/src/wolfssl_demo.h +EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/common/wolfssl_dummy.c +EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/common/strings.h +EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/common/unistd.h +EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/common/user_settings.h +EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/smc/.cproject +EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/smc/.project +EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/smc/smc.scfg \ No newline at end of file diff --git a/IDE/Renesas/e2studio/GR-ROSE/smc/.cproject b/IDE/Renesas/e2studio/RX65N/GR-ROSE/smc/.cproject similarity index 95% rename from IDE/Renesas/e2studio/GR-ROSE/smc/.cproject rename to IDE/Renesas/e2studio/RX65N/GR-ROSE/smc/.cproject index 0738090c8..399cd9586 100644 --- a/IDE/Renesas/e2studio/GR-ROSE/smc/.cproject +++ b/IDE/Renesas/e2studio/RX65N/GR-ROSE/smc/.cproject @@ -43,20 +43,20 @@