forked from wolfSSL/wolfssl
Merge pull request #4587 from SparkiDev/dis_algs_fix_1
Disable algorithms: fixes
This commit is contained in:
@ -5944,6 +5944,14 @@ if test "$ENABLED_SP_NONBLOCK" = "yes"; then
|
|||||||
AM_CCASFLAGS="$AM_CCASFLAGS -DWOLFSSL_SP_NONBLOCK"
|
AM_CCASFLAGS="$AM_CCASFLAGS -DWOLFSSL_SP_NONBLOCK"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
# Check that we enable SP with RSA, DH or ECC.
|
||||||
|
if test "$ENABLED_SP" = "no"; then
|
||||||
|
# Didn't need SP, don't need SP_MATH.
|
||||||
|
if test "$ENABLED_SP_MATH" = "yes"; then
|
||||||
|
ENABLED_SP_MATH=no
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
if test "$ENABLED_SP_MATH" = "yes"; then
|
if test "$ENABLED_SP_MATH" = "yes"; then
|
||||||
if test "$ENABLED_SP" = "no"; then
|
if test "$ENABLED_SP" = "no"; then
|
||||||
AC_MSG_ERROR([Must have SP enabled: --enable-sp])
|
AC_MSG_ERROR([Must have SP enabled: --enable-sp])
|
||||||
|
10
tests/api.c
10
tests/api.c
@ -20291,7 +20291,7 @@ static int test_wc_DsaSignVerify (void)
|
|||||||
mp_init(&key.q);
|
mp_init(&key.q);
|
||||||
AssertIntEQ(wc_DsaSign(hash, signature, &key, &rng), BAD_FUNC_ARG);
|
AssertIntEQ(wc_DsaSign(hash, signature, &key, &rng), BAD_FUNC_ARG);
|
||||||
|
|
||||||
mp_set_int(&key.q, 1);
|
mp_set(&key.q, 1);
|
||||||
AssertIntEQ(wc_DsaSign(hash, signature, &key, &rng), BAD_FUNC_ARG);
|
AssertIntEQ(wc_DsaSign(hash, signature, &key, &rng), BAD_FUNC_ARG);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
@ -47962,7 +47962,8 @@ static int test_get_digit_count (void)
|
|||||||
static int test_mp_cond_copy (void)
|
static int test_mp_cond_copy (void)
|
||||||
{
|
{
|
||||||
int ret = 0;
|
int ret = 0;
|
||||||
#if defined(WOLFSSL_PUBLIC_MP)
|
#if (defined(HAVE_ECC) || defined(WOLFSSL_MP_COND_COPY)) && \
|
||||||
|
defined(WOLFSSL_PUBLIC_MP)
|
||||||
mp_int a;
|
mp_int a;
|
||||||
mp_int b;
|
mp_int b;
|
||||||
int copy = 0;
|
int copy = 0;
|
||||||
@ -48102,7 +48103,8 @@ static int test_get_digit (void)
|
|||||||
static int test_wc_export_int(void)
|
static int test_wc_export_int(void)
|
||||||
{
|
{
|
||||||
int ret = 0;
|
int ret = 0;
|
||||||
#if defined(WOLFSSL_PUBLIC_MP)
|
#if (defined(HAVE_ECC) || defined(WOLFSSL_EXPORT_INT)) && \
|
||||||
|
defined(WOLFSSL_PUBLIC_MP)
|
||||||
mp_int mp;
|
mp_int mp;
|
||||||
byte buf[32];
|
byte buf[32];
|
||||||
word32 keySz = (word32)sizeof(buf);
|
word32 keySz = (word32)sizeof(buf);
|
||||||
@ -48114,7 +48116,7 @@ static int test_wc_export_int(void)
|
|||||||
ret = -1;
|
ret = -1;
|
||||||
}
|
}
|
||||||
if (ret == 0) {
|
if (ret == 0) {
|
||||||
ret = mp_set_int(&mp, 1234);
|
ret = mp_set(&mp, 1234);
|
||||||
}
|
}
|
||||||
if (ret == 0) {
|
if (ret == 0) {
|
||||||
ret = wc_export_int(NULL, buf, &len, keySz, WC_TYPE_UNSIGNED_BIN);
|
ret = wc_export_int(NULL, buf, &len, keySz, WC_TYPE_UNSIGNED_BIN);
|
||||||
|
@ -4500,7 +4500,7 @@ int mp_sub_d (mp_int * a, mp_digit b, mp_int * c)
|
|||||||
|
|
||||||
#if defined(WOLFSSL_KEY_GEN) || defined(HAVE_COMP_KEY) || defined(HAVE_ECC) || \
|
#if defined(WOLFSSL_KEY_GEN) || defined(HAVE_COMP_KEY) || defined(HAVE_ECC) || \
|
||||||
defined(DEBUG_WOLFSSL) || !defined(NO_RSA) || !defined(NO_DSA) || \
|
defined(DEBUG_WOLFSSL) || !defined(NO_RSA) || !defined(NO_DSA) || \
|
||||||
!defined(NO_DH)
|
!defined(NO_DH) || defined(WC_MP_TO_RADIX)
|
||||||
|
|
||||||
static const int lnz[16] = {
|
static const int lnz[16] = {
|
||||||
4, 0, 1, 0, 2, 0, 1, 0, 3, 0, 1, 0, 2, 0, 1, 0
|
4, 0, 1, 0, 2, 0, 1, 0, 3, 0, 1, 0, 2, 0, 1, 0
|
||||||
@ -5208,7 +5208,7 @@ LBL_U:mp_clear (&u);
|
|||||||
|
|
||||||
#if !defined(NO_DSA) || defined(HAVE_ECC) || defined(WOLFSSL_KEY_GEN) || \
|
#if !defined(NO_DSA) || defined(HAVE_ECC) || defined(WOLFSSL_KEY_GEN) || \
|
||||||
defined(HAVE_COMP_KEY) || defined(WOLFSSL_DEBUG_MATH) || \
|
defined(HAVE_COMP_KEY) || defined(WOLFSSL_DEBUG_MATH) || \
|
||||||
defined(DEBUG_WOLFSSL) || defined(OPENSSL_EXTRA)
|
defined(DEBUG_WOLFSSL) || defined(OPENSSL_EXTRA) || defined(WC_MP_TO_RADIX)
|
||||||
|
|
||||||
/* chars used in radix conversions */
|
/* chars used in radix conversions */
|
||||||
const char *mp_s_rmap = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ"
|
const char *mp_s_rmap = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ"
|
||||||
|
@ -2633,7 +2633,7 @@ int sp_cmp_mag(sp_int* a, sp_int* b)
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(WOLFSSL_SP_MATH_ALL) || defined(HAVE_ECC) || !defined(NO_DSA) || \
|
#if defined(WOLFSSL_SP_MATH_ALL) || defined(HAVE_ECC) || !defined(NO_DSA) || \
|
||||||
defined(OPENSSL_EXTRA) || \
|
defined(OPENSSL_EXTRA) || !defined(NO_DH) || \
|
||||||
(!defined(NO_RSA) && !defined(WOLFSSL_RSA_VERIFY_ONLY))
|
(!defined(NO_RSA) && !defined(WOLFSSL_RSA_VERIFY_ONLY))
|
||||||
/* Compare two multi-precision numbers.
|
/* Compare two multi-precision numbers.
|
||||||
*
|
*
|
||||||
@ -2674,7 +2674,8 @@ static int _sp_cmp(sp_int* a, sp_int* b)
|
|||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if !defined(WOLFSSL_RSA_VERIFY_ONLY) || defined(HAVE_ECC)
|
#if (!defined(NO_RSA) && !defined(WOLFSSL_RSA_VERIFY_ONLY)) || \
|
||||||
|
!defined(NO_DSA) || defined(HAVE_ECC) || !defined(NO_DH)
|
||||||
/* Compare two multi-precision numbers.
|
/* Compare two multi-precision numbers.
|
||||||
*
|
*
|
||||||
* Pointers are compared such that NULL is less than not NULL.
|
* Pointers are compared such that NULL is less than not NULL.
|
||||||
|
@ -16681,6 +16681,7 @@ WOLFSSL_TEST_SUBROUTINE int dh_test(void)
|
|||||||
}
|
}
|
||||||
|
|
||||||
#ifdef NO_ASN
|
#ifdef NO_ASN
|
||||||
|
#ifndef WOLFSSL_SP_MATH
|
||||||
ret = wc_DhSetKey(key, dh_p, sizeof(dh_p), dh_g, sizeof(dh_g));
|
ret = wc_DhSetKey(key, dh_p, sizeof(dh_p), dh_g, sizeof(dh_g));
|
||||||
if (ret != 0) {
|
if (ret != 0) {
|
||||||
ERROR_OUT(-8106, done);
|
ERROR_OUT(-8106, done);
|
||||||
@ -16690,6 +16691,19 @@ WOLFSSL_TEST_SUBROUTINE int dh_test(void)
|
|||||||
if (ret != 0) {
|
if (ret != 0) {
|
||||||
ERROR_OUT(-8107, done);
|
ERROR_OUT(-8107, done);
|
||||||
}
|
}
|
||||||
|
#else
|
||||||
|
ret = wc_DhSetKey(key, dh2048_p, sizeof(dh2048_p), dh2048_g,
|
||||||
|
sizeof(dh2048_g));
|
||||||
|
if (ret != 0) {
|
||||||
|
ERROR_OUT(-8106, done);
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = wc_DhSetKey(key2, dh2048_p, sizeof(dh2048_p), dh2048_g,
|
||||||
|
sizeof(dh2048_g));
|
||||||
|
if (ret != 0) {
|
||||||
|
ERROR_OUT(-8107, done);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
#else
|
#else
|
||||||
ret = wc_DhKeyDecode(tmp, &idx, key, bytes);
|
ret = wc_DhKeyDecode(tmp, &idx, key, bytes);
|
||||||
if (ret != 0) {
|
if (ret != 0) {
|
||||||
|
@ -4640,6 +4640,49 @@ static const unsigned char dh_g[] =
|
|||||||
0x02,
|
0x02,
|
||||||
};
|
};
|
||||||
|
|
||||||
|
/* dh2048 p */
|
||||||
|
static const unsigned char dh2048_p[] =
|
||||||
|
{
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
||||||
|
0xAD, 0xF8, 0x54, 0x58, 0xA2, 0xBB, 0x4A, 0x9A,
|
||||||
|
0xAF, 0xDC, 0x56, 0x20, 0x27, 0x3D, 0x3C, 0xF1,
|
||||||
|
0xD8, 0xB9, 0xC5, 0x83, 0xCE, 0x2D, 0x36, 0x95,
|
||||||
|
0xA9, 0xE1, 0x36, 0x41, 0x14, 0x64, 0x33, 0xFB,
|
||||||
|
0xCC, 0x93, 0x9D, 0xCE, 0x24, 0x9B, 0x3E, 0xF9,
|
||||||
|
0x7D, 0x2F, 0xE3, 0x63, 0x63, 0x0C, 0x75, 0xD8,
|
||||||
|
0xF6, 0x81, 0xB2, 0x02, 0xAE, 0xC4, 0x61, 0x7A,
|
||||||
|
0xD3, 0xDF, 0x1E, 0xD5, 0xD5, 0xFD, 0x65, 0x61,
|
||||||
|
0x24, 0x33, 0xF5, 0x1F, 0x5F, 0x06, 0x6E, 0xD0,
|
||||||
|
0x85, 0x63, 0x65, 0x55, 0x3D, 0xED, 0x1A, 0xF3,
|
||||||
|
0xB5, 0x57, 0x13, 0x5E, 0x7F, 0x57, 0xC9, 0x35,
|
||||||
|
0x98, 0x4F, 0x0C, 0x70, 0xE0, 0xE6, 0x8B, 0x77,
|
||||||
|
0xE2, 0xA6, 0x89, 0xDA, 0xF3, 0xEF, 0xE8, 0x72,
|
||||||
|
0x1D, 0xF1, 0x58, 0xA1, 0x36, 0xAD, 0xE7, 0x35,
|
||||||
|
0x30, 0xAC, 0xCA, 0x4F, 0x48, 0x3A, 0x79, 0x7A,
|
||||||
|
0xBC, 0x0A, 0xB1, 0x82, 0xB3, 0x24, 0xFB, 0x61,
|
||||||
|
0xD1, 0x08, 0xA9, 0x4B, 0xB2, 0xC8, 0xE3, 0xFB,
|
||||||
|
0xB9, 0x6A, 0xDA, 0xB7, 0x60, 0xD7, 0xF4, 0x68,
|
||||||
|
0x1D, 0x4F, 0x42, 0xA3, 0xDE, 0x39, 0x4D, 0xF4,
|
||||||
|
0xAE, 0x56, 0xED, 0xE7, 0x63, 0x72, 0xBB, 0x19,
|
||||||
|
0x0B, 0x07, 0xA7, 0xC8, 0xEE, 0x0A, 0x6D, 0x70,
|
||||||
|
0x9E, 0x02, 0xFC, 0xE1, 0xCD, 0xF7, 0xE2, 0xEC,
|
||||||
|
0xC0, 0x34, 0x04, 0xCD, 0x28, 0x34, 0x2F, 0x61,
|
||||||
|
0x91, 0x72, 0xFE, 0x9C, 0xE9, 0x85, 0x83, 0xFF,
|
||||||
|
0x8E, 0x4F, 0x12, 0x32, 0xEE, 0xF2, 0x81, 0x83,
|
||||||
|
0xC3, 0xFE, 0x3B, 0x1B, 0x4C, 0x6F, 0xAD, 0x73,
|
||||||
|
0x3B, 0xB5, 0xFC, 0xBC, 0x2E, 0xC2, 0x20, 0x05,
|
||||||
|
0xC5, 0x8E, 0xF1, 0x83, 0x7D, 0x16, 0x83, 0xB2,
|
||||||
|
0xC6, 0xF3, 0x4A, 0x26, 0xC1, 0xB2, 0xEF, 0xFA,
|
||||||
|
0x88, 0x6B, 0x42, 0x38, 0x61, 0x28, 0x5C, 0x97,
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF
|
||||||
|
};
|
||||||
|
|
||||||
|
/* dh2048 g */
|
||||||
|
static const unsigned char dh2048_g[] =
|
||||||
|
{
|
||||||
|
0x02,
|
||||||
|
};
|
||||||
|
|
||||||
#if defined(HAVE_ED25519)
|
#if defined(HAVE_ED25519)
|
||||||
|
|
||||||
/* ./certs/ed25519/server-ed25519.der, ED25519 */
|
/* ./certs/ed25519/server-ed25519.der, ED25519 */
|
||||||
|
Reference in New Issue
Block a user