From 25f9d159808d7fe9dd376d5033524c9d68558808 Mon Sep 17 00:00:00 2001 From: David Garske Date: Thu, 20 Aug 2020 14:21:34 -0700 Subject: [PATCH] Fix for benchmark example when using the ECC encrypt (`--enable-eccencrypt`) and timing resistance. New timing resistance RNG requirements for ECC Shared Secret. --- wolfcrypt/benchmark/benchmark.c | 13 +++++++++++++ 1 file changed, 13 insertions(+) diff --git a/wolfcrypt/benchmark/benchmark.c b/wolfcrypt/benchmark/benchmark.c index 1bf54b81e..00d2380ee 100644 --- a/wolfcrypt/benchmark/benchmark.c +++ b/wolfcrypt/benchmark/benchmark.c @@ -5457,6 +5457,19 @@ void bench_eccEncrypt(void) return; } +#if defined(ECC_TIMING_RESISTANT) && (!defined(HAVE_FIPS) || \ + (!defined(HAVE_FIPS_VERSION) || (HAVE_FIPS_VERSION != 2))) && \ + !defined(HAVE_SELFTEST) + ret = wc_ecc_set_rng(&userA, &gRng); + if (ret != 0) { + goto exit; + } + ret = wc_ecc_set_rng(&userB, &gRng); + if (ret != 0) { + goto exit; + } +#endif + ret = wc_ecc_make_key(&gRng, keySize, &userA); #ifdef WOLFSSL_ASYNC_CRYPT ret = wc_AsyncWait(ret, &userA.asyncDev, WC_ASYNC_FLAG_NONE);