add IDE/QNX/README.md and add WOLFSSL_QNX_CAAM guard

This commit is contained in:
Jacob Barthelmeh
2021-03-05 14:43:23 +07:00
parent b801a6e809
commit 6d0dbbe1c0
4 changed files with 36 additions and 6 deletions

28
IDE/QNX/README.md Normal file
View File

@ -0,0 +1,28 @@
# QNX CAAM Driver And Examples
This directory contains;
- A Makefile for creating the QNX CAAM driver located at IDE/QNX/CAAM-DRIVER/Makefile
- An example TLS server located at IDE/QNX/example-server/
- An example client located at IDE/QNX/example-client
- An example CMAC use located at IDE/QNX/example-cmac
To build either of these, first build wolfSSL with support for use with QNX CAAM. To do this use the configure option --enable-caam=qnx
```
bash
source ~/qnx700/qnxsdp-env.sh
./configure --host=arm-unknown-nto-qnx7.0.0eabi --enable-caam=qnx
make
```
Once the wolfSSL library has been built cd to IDE/QNX/CAAM-DRIVER and run "make". This will produce the wolfCrypt resource manager. It should be started on the device with root permisions. Once wolfCrypt is running on the device with root permisions then any user with access to open a connection to wolfCrypt can make use of the driver.
### Supported Operations By CAAM Driver
- ECC black key creation
- ECC black key sign / verify / ecdh
- Black blob creation and open
- Red blob creation and open
- Cover keys (turn to black key)
- CMAC with and without black keys
- TRNG used by default to seed Hash DRBG

View File

@ -2,6 +2,7 @@
# included from Top Level Makefile.am
# All paths should be given relative to the root
EXTRA_DIST+= IDE/QNX/README.md
EXTRA_DIST+= IDE/QNX/CAAM-DRIVER/Makefile
EXTRA_DIST+= IDE/QNX/example-server/Makefile
EXTRA_DIST+= IDE/QNX/example-server/server-tls.c

View File

@ -8052,8 +8052,8 @@ int wc_ecc_export_ex(ecc_key* key, byte* qx, word32* qxLen,
/* Hardware cannot export private portion */
return NOT_COMPILED_IN;
#else
#ifdef WOLFSSL_QNX_CAAM
if (encType == WC_TYPE_BLACK_KEY) {
#ifdef WOLFSSL_QNX_CAAM
if (key->blackKey > 0) {
if (*dLen < keySz + WC_CAAM_MAC_SZ) {
*dLen = keySz + WC_CAAM_MAC_SZ;
@ -8069,11 +8069,10 @@ int wc_ecc_export_ex(ecc_key* key, byte* qx, word32* qxLen,
WOLFSSL_MSG("No black key stored in structure");
return BAD_FUNC_ARG;
}
#else
return NOT_COMPILED_IN;
#endif
}
else {
else
#endif
{
err = wc_export_int(&key->k, d, dLen, keySz, encType);
if (err != MP_OKAY)
return err;

View File

@ -64,7 +64,9 @@ WOLFSSL_API int mp_rand(mp_int* a, int digits, WC_RNG* rng);
#define WC_TYPE_HEX_STR 1
#define WC_TYPE_UNSIGNED_BIN 2
#define WC_TYPE_BLACK_KEY 3
#if defined(WOLFSSL_QNX_CAAM)
#define WC_TYPE_BLACK_KEY 3
#endif
WOLFSSL_API int wc_export_int(mp_int* mp, byte* buf, word32* len,
word32 keySz, int encType);