forked from wolfSSL/wolfssl
Merge pull request #2177 from dgarske/async_rel_v4
wolfSSL Asynchronous release v4 fixes
This commit is contained in:
@ -3859,8 +3859,8 @@ AC_ARG_WITH([intelqa],
|
|||||||
-I$QAT_DIR/quickassist/lookaside/access_layer/src/common/include -I$srcdir/wolfssl -I$srcdir/wolfssl/wolfcrypt/port/intel \
|
-I$QAT_DIR/quickassist/lookaside/access_layer/src/common/include -I$srcdir/wolfssl -I$srcdir/wolfssl/wolfcrypt/port/intel \
|
||||||
-I$QAT_DIR/quickassist/utilities/libusdm_drv"
|
-I$QAT_DIR/quickassist/utilities/libusdm_drv"
|
||||||
|
|
||||||
LDFLAGS="$LDFLAGS -L$QAT_DIR/build -Wl,-Map=output.map"
|
LDFLAGS="$LDFLAGS -L$QAT_DIR/build"
|
||||||
LIBS="$LIBS -lqat_s"
|
LIBS="$LIBS -lqat_s -lusdm_drv_s"
|
||||||
|
|
||||||
AC_LINK_IFELSE([AC_LANG_PROGRAM([[#include "cpa_cy_common.h"]], [[ Cpa16U count = 0; cpaCyGetNumInstances(&count); ]])],
|
AC_LINK_IFELSE([AC_LANG_PROGRAM([[#include "cpa_cy_common.h"]], [[ Cpa16U count = 0; cpaCyGetNumInstances(&count); ]])],
|
||||||
[ intelqa_linked=yes ],[ intelqa_linked=no ])
|
[ intelqa_linked=yes ],[ intelqa_linked=no ])
|
||||||
@ -3884,7 +3884,7 @@ AC_ARG_WITH([intelqa],
|
|||||||
if test "x$BUILD_INTEL_QAT_VERSION" == "x1" ; then
|
if test "x$BUILD_INTEL_QAT_VERSION" == "x1" ; then
|
||||||
LIB_ADD="-ladf_proxy -losal -lrt $LIB_ADD"
|
LIB_ADD="-ladf_proxy -losal -lrt $LIB_ADD"
|
||||||
else
|
else
|
||||||
LIB_ADD="-lusdm_drv_s -losal -lrt $LIB_ADD"
|
LIB_ADD="-losal -lrt $LIB_ADD"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
ENABLED_INTEL_QA=yes
|
ENABLED_INTEL_QA=yes
|
||||||
|
@ -2127,15 +2127,15 @@ int BuildTls13Message(WOLFSSL* ssl, byte* output, int outSz, const byte* input,
|
|||||||
goto exit_buildmsg;
|
goto exit_buildmsg;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/* The real record content type goes at the end of the data. */
|
||||||
|
output[args->idx++] = (byte)type;
|
||||||
|
|
||||||
ssl->options.buildMsgState = BUILD_MSG_ENCRYPT;
|
ssl->options.buildMsgState = BUILD_MSG_ENCRYPT;
|
||||||
}
|
}
|
||||||
FALL_THROUGH;
|
FALL_THROUGH;
|
||||||
|
|
||||||
case BUILD_MSG_ENCRYPT:
|
case BUILD_MSG_ENCRYPT:
|
||||||
{
|
{
|
||||||
/* The real record content type goes at the end of the data. */
|
|
||||||
output[args->idx++] = (byte)type;
|
|
||||||
|
|
||||||
#ifdef ATOMIC_USER
|
#ifdef ATOMIC_USER
|
||||||
if (ssl->ctx->MacEncryptCb) {
|
if (ssl->ctx->MacEncryptCb) {
|
||||||
/* User Record Layer Callback handling */
|
/* User Record Layer Callback handling */
|
||||||
@ -2183,6 +2183,9 @@ exit_buildmsg:
|
|||||||
|
|
||||||
/* Final cleanup */
|
/* Final cleanup */
|
||||||
FreeBuildMsg13Args(ssl, args);
|
FreeBuildMsg13Args(ssl, args);
|
||||||
|
#ifdef WOLFSSL_ASYNC_CRYPT
|
||||||
|
ssl->async.freeArgs = NULL;
|
||||||
|
#endif
|
||||||
|
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
@ -706,7 +706,7 @@ static int wc_Sha3Update(wc_Sha3* sha3, const byte* data, word32 len, byte p)
|
|||||||
/* QAT only supports SHA3_256 */
|
/* QAT only supports SHA3_256 */
|
||||||
if (p == WC_SHA3_256_COUNT) {
|
if (p == WC_SHA3_256_COUNT) {
|
||||||
ret = IntelQaSymSha3(&sha3->asyncDev, NULL, data, len);
|
ret = IntelQaSymSha3(&sha3->asyncDev, NULL, data, len);
|
||||||
if (ret != CRYPTOCB_UNAVAILABLE)
|
if (ret != NOT_COMPILED_IN)
|
||||||
return ret;
|
return ret;
|
||||||
/* fall-through when unavailable */
|
/* fall-through when unavailable */
|
||||||
}
|
}
|
||||||
@ -742,7 +742,7 @@ static int wc_Sha3Final(wc_Sha3* sha3, byte* hash, byte p, byte len)
|
|||||||
/* QAT SHA-3 only supported on v2 (8970 or later cards) */
|
/* QAT SHA-3 only supported on v2 (8970 or later cards) */
|
||||||
if (len == WC_SHA3_256_DIGEST_SIZE) {
|
if (len == WC_SHA3_256_DIGEST_SIZE) {
|
||||||
ret = IntelQaSymSha3(&sha3->asyncDev, hash, NULL, len);
|
ret = IntelQaSymSha3(&sha3->asyncDev, hash, NULL, len);
|
||||||
if (ret != CRYPTOCB_UNAVAILABLE)
|
if (ret != NOT_COMPILED_IN)
|
||||||
return ret;
|
return ret;
|
||||||
/* fall-through when unavailable */
|
/* fall-through when unavailable */
|
||||||
}
|
}
|
||||||
|
@ -7110,7 +7110,7 @@ int aesgcm_test(void)
|
|||||||
result = wc_AesGcmDecrypt(&dec, resultP, resultC, sizeof(c1),
|
result = wc_AesGcmDecrypt(&dec, resultP, resultC, sizeof(c1),
|
||||||
iv1, sizeof(iv1), resultT, sizeof(resultT), a, sizeof(a));
|
iv1, sizeof(iv1), resultT, sizeof(resultT), a, sizeof(a));
|
||||||
#if defined(WOLFSSL_ASYNC_CRYPT)
|
#if defined(WOLFSSL_ASYNC_CRYPT)
|
||||||
result = wc_AsyncWait(result, &enc.asyncDev, WC_ASYNC_FLAG_NONE);
|
result = wc_AsyncWait(result, &dec.asyncDev, WC_ASYNC_FLAG_NONE);
|
||||||
#endif
|
#endif
|
||||||
if (result != 0)
|
if (result != 0)
|
||||||
return -5705;
|
return -5705;
|
||||||
@ -16175,7 +16175,7 @@ static int ecc_test_curve_size(WC_RNG* rng, int keySize, int testVerifyCount,
|
|||||||
wc_ecc_set_flags(&userA, WC_ECC_FLAG_COFACTOR);
|
wc_ecc_set_flags(&userA, WC_ECC_FLAG_COFACTOR);
|
||||||
wc_ecc_set_flags(&userB, WC_ECC_FLAG_COFACTOR);
|
wc_ecc_set_flags(&userB, WC_ECC_FLAG_COFACTOR);
|
||||||
|
|
||||||
x = sizeof(sharedA);
|
x = ECC_SHARED_SIZE;
|
||||||
do {
|
do {
|
||||||
#if defined(WOLFSSL_ASYNC_CRYPT)
|
#if defined(WOLFSSL_ASYNC_CRYPT)
|
||||||
ret = wc_AsyncWait(ret, &userA.asyncDev, WC_ASYNC_FLAG_CALL_AGAIN);
|
ret = wc_AsyncWait(ret, &userA.asyncDev, WC_ASYNC_FLAG_CALL_AGAIN);
|
||||||
@ -16187,7 +16187,7 @@ static int ecc_test_curve_size(WC_RNG* rng, int keySize, int testVerifyCount,
|
|||||||
goto done;
|
goto done;
|
||||||
}
|
}
|
||||||
|
|
||||||
y = sizeof(sharedB);
|
y = ECC_SHARED_SIZE;
|
||||||
do {
|
do {
|
||||||
#if defined(WOLFSSL_ASYNC_CRYPT)
|
#if defined(WOLFSSL_ASYNC_CRYPT)
|
||||||
ret = wc_AsyncWait(ret, &userB.asyncDev, WC_ASYNC_FLAG_CALL_AGAIN);
|
ret = wc_AsyncWait(ret, &userB.asyncDev, WC_ASYNC_FLAG_CALL_AGAIN);
|
||||||
|
Reference in New Issue
Block a user