From 08c2d9401170ef47bd0289deb49cea7fbfb2c836 Mon Sep 17 00:00:00 2001 From: Takashi Kojo Date: Wed, 22 Aug 2018 10:46:46 +0900 Subject: [PATCH 001/326] return value check of XFSEEK --- src/ocsp.c | 3 ++- src/sniffer.c | 2 +- src/ssl.c | 36 +++++++++++++++++++++++++----------- tests/api.c | 8 ++++---- wolfcrypt/src/asn.c | 6 ++++-- 5 files changed, 36 insertions(+), 19 deletions(-) diff --git a/src/ocsp.c b/src/ocsp.c index 7863f5672..6326ade08 100644 --- a/src/ocsp.c +++ b/src/ocsp.c @@ -652,7 +652,8 @@ OcspResponse* wolfSSL_d2i_OCSP_RESPONSE_bio(WOLFSSL_BIO* bio, i = XFTELL(bio->file); if (i < 0) return NULL; - XFSEEK(bio->file, 0, SEEK_END); + if(XFSEEK(bio->file, 0, SEEK_END) != 0) + return NULL; l = XFTELL(bio->file); if (l < 0) return NULL; diff --git a/src/sniffer.c b/src/sniffer.c index 2feec52f9..96c633fe5 100644 --- a/src/sniffer.c +++ b/src/sniffer.c @@ -1166,7 +1166,7 @@ static int LoadKeyFile(byte** keyBuf, word32* keyBufSz, file = XFOPEN(keyFile, "rb"); if (file == XBADFILE) return -1; - XFSEEK(file, 0, XSEEK_END); + if(XFSEEK(file, 0, XSEEK_END) != 0) return -1; fileSz = XFTELL(file); XREWIND(file); diff --git a/src/ssl.c b/src/ssl.c index 0aa2dc6f3..cd97cacaa 100644 --- a/src/ssl.c +++ b/src/ssl.c @@ -5693,7 +5693,8 @@ int ProcessFile(WOLFSSL_CTX* ctx, const char* fname, int format, int type, file = XFOPEN(fname, "rb"); if (file == XBADFILE) return WOLFSSL_BAD_FILE; - XFSEEK(file, 0, XSEEK_END); + if (XFSEEK(file, 0, XSEEK_END) != 0) + return WOLFSSL_BAD_FILE; sz = XFTELL(file); XREWIND(file); @@ -5829,7 +5830,8 @@ int wolfSSL_CertManagerVerify(WOLFSSL_CERT_MANAGER* cm, const char* fname, WOLFSSL_ENTER("wolfSSL_CertManagerVerify"); if (file == XBADFILE) return WOLFSSL_BAD_FILE; - XFSEEK(file, 0, XSEEK_END); + if(XFSEEK(file, 0, XSEEK_END) != 0) + return WOLFSSL_BAD_FILE; sz = XFTELL(file); XREWIND(file); @@ -6283,7 +6285,8 @@ static int wolfSSL_SetTmpDH_file_wrapper(WOLFSSL_CTX* ctx, WOLFSSL* ssl, file = XFOPEN(fname, "rb"); if (file == XBADFILE) return WOLFSSL_BAD_FILE; - XFSEEK(file, 0, XSEEK_END); + if(XFSEEK(file, 0, XSEEK_END) != 0) + return WOLFSSL_BAD_FILE;; sz = XFTELL(file); XREWIND(file); @@ -8302,7 +8305,8 @@ int CM_RestoreCertCache(WOLFSSL_CERT_MANAGER* cm, const char* fname) return WOLFSSL_BAD_FILE; } - XFSEEK(file, 0, XSEEK_END); + if(XFSEEK(file, 0, XSEEK_END) != 0) + return WOLFSSL_BAD_FILE; memSz = (int)XFTELL(file); XREWIND(file); @@ -15094,7 +15098,8 @@ WOLFSSL_X509* wolfSSL_X509_d2i_fp(WOLFSSL_X509** x509, XFILE file) byte* fileBuffer = NULL; long sz = 0; - XFSEEK(file, 0, XSEEK_END); + if(XFSEEK(file, 0, XSEEK_END) != 0) + return NULL; sz = XFTELL(file); XREWIND(file); @@ -15145,7 +15150,11 @@ WOLFSSL_X509* wolfSSL_X509_load_certificate_file(const char* fname, int format) if (file == XBADFILE) return NULL; - XFSEEK(file, 0, XSEEK_END); + if(XFSEEK(file, 0, XSEEK_END) != 0){ + XFCLOSE(file); + return NULL; + } + sz = XFTELL(file); XREWIND(file); @@ -17450,7 +17459,8 @@ int wolfSSL_X509_LOOKUP_load_file(WOLFSSL_X509_LOOKUP* lookup, if (fp == NULL) return BAD_FUNC_ARG; - XFSEEK(fp, 0, XSEEK_END); + if(XFSEEK(fp, 0, XSEEK_END) != 0) + return WOLFSSL_BAD_FILE; sz = XFTELL(fp); XREWIND(fp); @@ -18405,7 +18415,8 @@ static void *wolfSSL_d2i_X509_fp_ex(XFILE file, void **x509, int type) { long sz = 0; - XFSEEK(file, 0, XSEEK_END); + if(XFSEEK(file, 0, XSEEK_END) != 0) + return NULL; sz = XFTELL(file); XREWIND(file); @@ -21510,7 +21521,8 @@ int wolfSSL_cmp_peer_cert_to_file(WOLFSSL* ssl, const char *fname) if (file == XBADFILE) return WOLFSSL_BAD_FILE; - XFSEEK(file, 0, XSEEK_END); + if(XFSEEK(file, 0, XSEEK_END) != 0) + return WOLFSSL_BAD_FILE;; sz = XFTELL(file); XREWIND(file); @@ -31133,9 +31145,11 @@ WOLFSSL_DH *wolfSSL_PEM_read_bio_DHparams(WOLFSSL_BIO *bio, WOLFSSL_DH **x, } else if (bio->type == WOLFSSL_BIO_FILE) { /* Read whole file into a new buffer. */ - XFSEEK(bio->file, 0, SEEK_END); + if(XFSEEK(bio->file, 0, SEEK_END) != 0) + goto end; sz = XFTELL(bio->file); - XFSEEK(bio->file, 0, SEEK_SET); + if(XFSEEK(bio->file, 0, SEEK_SET) != 0) + goto end; if (sz <= 0L) goto end; mem = (unsigned char*)XMALLOC(sz, NULL, DYNAMIC_TYPE_PEM); diff --git a/tests/api.c b/tests/api.c index 4fd5c2903..4797051fd 100644 --- a/tests/api.c +++ b/tests/api.c @@ -15974,7 +15974,7 @@ static void test_wolfSSL_PEM_PrivateKey(void) file = XFOPEN(fname, "rb"); AssertTrue((file != XBADFILE)); - XFSEEK(file, 0, XSEEK_END); + AssertTrue(XFSEEK(file, 0, XSEEK_END) == 0); sz = XFTELL(file); XREWIND(file); AssertNotNull(buf = (byte*)XMALLOC(sz, NULL, DYNAMIC_TYPE_FILE)); @@ -16004,7 +16004,7 @@ static void test_wolfSSL_PEM_PrivateKey(void) file = XFOPEN(fname, "rb"); AssertTrue((file != XBADFILE)); - XFSEEK(file, 0, XSEEK_END); + AssertTrue(XFSEEK(file, 0, XSEEK_END) == 0); sz = XFTELL(file); XREWIND(file); AssertNotNull(buf = (byte*)XMALLOC(sz, NULL, DYNAMIC_TYPE_FILE)); @@ -18245,7 +18245,7 @@ static void test_wolfSSL_d2i_PrivateKeys_bio(void) file = XFOPEN(fname, "rb"); AssertTrue((file != XBADFILE)); - XFSEEK(file, 0, XSEEK_END); + AssertTrue(XFSEEK(file, 0, XSEEK_END) == 0); sz = XFTELL(file); XREWIND(file); AssertNotNull(buf = (byte*)XMALLOC(sz, HEAP_HINT, DYNAMIC_TYPE_FILE)); @@ -18273,7 +18273,7 @@ static void test_wolfSSL_d2i_PrivateKeys_bio(void) file = XFOPEN(fname, "rb"); AssertTrue((file != XBADFILE)); - XFSEEK(file, 0, XSEEK_END); + AssertTrue(XFSEEK(file, 0, XSEEK_END) == 0); sz = XFTELL(file); XREWIND(file); AssertNotNull(buf = (byte*)XMALLOC(sz, HEAP_HINT, DYNAMIC_TYPE_FILE)); diff --git a/wolfcrypt/src/asn.c b/wolfcrypt/src/asn.c index 836943638..bd132ae6b 100644 --- a/wolfcrypt/src/asn.c +++ b/wolfcrypt/src/asn.c @@ -8404,7 +8404,8 @@ int wc_PemCertToDer(const char* fileName, unsigned char* derBuf, int derSz) ret = BUFFER_E; } else { - XFSEEK(file, 0, XSEEK_END); + if(XFSEEK(file, 0, XSEEK_END) != 0) + ret = BUFFER_E; sz = XFTELL(file); XREWIND(file); @@ -8477,7 +8478,8 @@ int wc_PemPubKeyToDer(const char* fileName, ret = BUFFER_E; } else { - XFSEEK(file, 0, XSEEK_END); + if(XFSEEK(file, 0, XSEEK_END) != 0) + ret = BUFFER_E; sz = XFTELL(file); XREWIND(file); From 3729b12fae8aea1b5551d64ec79f638f92da9627 Mon Sep 17 00:00:00 2001 From: kaleb-himes Date: Thu, 30 Aug 2018 14:44:49 -0600 Subject: [PATCH 002/326] Address issues when testing with WOLFSSL_OCSP_TEST set --- examples/client/client.c | 8 ++++++++ scripts/ocsp.test | 38 ++++++++++++++++++++++++++++---------- 2 files changed, 36 insertions(+), 10 deletions(-) diff --git a/examples/client/client.c b/examples/client/client.c index 4635e49d6..f8e230c85 100644 --- a/examples/client/client.c +++ b/examples/client/client.c @@ -1297,6 +1297,14 @@ THREAD_RETURN WOLFSSL_THREAD client_test(void* args) break; case 'S' : + if (XSTRNCMP(myoptarg, "check", 5) == 0) { + #ifdef HAVE_SNI + printf("SNI is: ON\n"); + #else + printf("SNI is: OFF\n"); + #endif + XEXIT_T(EXIT_SUCCESS); + } #ifdef HAVE_SNI sniHostName = myoptarg; #endif diff --git a/scripts/ocsp.test b/scripts/ocsp.test index e16aa8f22..f637efffe 100755 --- a/scripts/ocsp.test +++ b/scripts/ocsp.test @@ -1,6 +1,6 @@ #!/bin/sh -# ocsp-stapling.test +# ocsp.test server=www.globalsign.com ca=certs/external/ca-globalsign-root.pem @@ -15,16 +15,30 @@ if [ $? -eq 0 ]; then exit 0 fi -# is our desired server there? -./scripts/ping.test $server 2 -RESULT=$? -if [ $RESULT -eq 0 ]; then - # client test against the server - ./examples/client/client -X -C -h $server -p 443 -A $ca -g -o -N - GL_RESULT=$? - [ $GL_RESULT -ne 0 ] && printf '\n\n%s\n' "Client connection failed" +# Global Sign now requires server name indication extension to work, check +# enabled prior to testing +OUTPUT=$(eval "./examples/client/client -S check") +if [ "$OUTPUT" = "SNI is: ON" ]; then + printf '\n\n%s\n\n' "SNI is on, proceed with globalsign test" + + # is our desired server there? + ./scripts/ping.test $server 2 + RESULT=$? + if [ $RESULT -ne 0 ]; then + GL_UNREACHABLE=1 + fi + + if [ $RESULT -eq 0 ]; then + # client test against the server + ./examples/client/client -X -C -h $server -p 443 -A $ca -g -o -N -v d -S $server + GL_RESULT=$? + [ $GL_RESULT -ne 0 ] && printf '\n\n%s\n' "Client connection failed" + else + GL_RESULT=1 + fi else - GL_RESULT=1 + printf '\n\n%s\n\n' "SNI disabled, skipping globalsign test" + GL_RESULT=0 fi server=www.google.com @@ -48,6 +62,10 @@ if test -n "$WOLFSSL_OCSP_TEST"; then printf '\n\n%s\n' "Both OCSP connection to globalsign and google passed" printf '%s\n' "Test Passed!" exit 0 + elif [ $GL_UNREACHABLE -eq 1 ] && [ $GR_RESULT -eq 0 ]; then + printf '%s\n' "Global Sign is currently unreachable. Logging it but if" + printf '%s\n' "this continues to occur should be investigated" + exit 0 else # Unlike other environment variables the intent of WOLFSSL_OCSP_TEST # is to indicate a requirement for both tests to pass. If variable is From 294a22e9380599780914110dba883595fb873374 Mon Sep 17 00:00:00 2001 From: Takashi Kojo Date: Sat, 8 Sep 2018 06:02:20 +0900 Subject: [PATCH 003/326] flag to pass throug errors for correcting as many error information as possible. --- tests/unit.h | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/tests/unit.h b/tests/unit.h index 7693ea26f..20dc47965 100644 --- a/tests/unit.h +++ b/tests/unit.h @@ -32,11 +32,14 @@ #define XABORT() abort() #endif + +static int unit_PassThrough = 0; + #define Fail(description, result) do { \ printf("\nERROR - %s line %d failed with:", __FILE__, __LINE__); \ printf("\n expected: "); printf description; \ printf("\n result: "); printf result; printf("\n\n"); \ - XABORT(); \ + if(unit_PassThrough == 0)XABORT(); \ } while(0) #define Assert(test, description, result) if (!(test)) Fail(description, result) From e677c32714dceab7ff718e6eb922ca3cc4691b1b Mon Sep 17 00:00:00 2001 From: Takashi Kojo Date: Sat, 8 Sep 2018 07:27:33 +0900 Subject: [PATCH 004/326] test file access functions --- tests/api.c | 50 ++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 50 insertions(+) diff --git a/tests/api.c b/tests/api.c index 4797051fd..7eff9ddd9 100644 --- a/tests/api.c +++ b/tests/api.c @@ -436,6 +436,52 @@ static int test_wolfCrypt_Init(void) } /* END test_wolfCrypt_Init */ +/*----------------------------------------------------------------------------* + | Platform dependent function test + *----------------------------------------------------------------------------*/ + +static int test_fileAccess() +{ + #ifdef WOLFSSL_TEST_PLATFORMDEPEND + + const char *fname[] = { + svrCertFile, svrKeyFile, caCertFile, eccCertFile, eccKeyFile, eccRsaCertFile, + cliCertFile, cliCertDerFile, cliKeyFile, ntruCertFile, ntruKeyFile, dhParamFile, + cliEccKeyFile, cliEccCertFile, caEccCertFile, edCertFile, edKeyFile, + cliEdCertFile, cliEdKeyFile, caEdCertFile, + NULL + }; + + const char derfile[] = "./certs/server-cert.der"; + XFILE f; + size_t sz; + byte *buff; + int i; + + printf(testingFmt, "test_fileAccessr()"); + + AssertTrue(XFOPEN("badfilename", "rb") == XBADFILE); + + for(i=0; fname[i] != NULL ; i++){ + AssertTrue((f = XFOPEN(fname[i], "rb")) != XBADFILE); + XFCLOSE(f); + } + + AssertTrue((f = XFOPEN(derfile, "rb")) != XBADFILE); + AssertTrue(XFSEEK(f, 0, XSEEK_END) == 0); + sz = (size_t) XFTELL(f); + XREWIND(f); + AssertTrue(sz == sizeof_server_cert_der_2048); + AssertTrue((buff = (byte*)XMALLOC(sz, NULL, DYNAMIC_TYPE_FILE)) != NULL) ; + AssertTrue(XFREAD(buff, 1, sz, f) == sz); + XMEMCMP(server_cert_der_2048, buff, sz); + + printf(resultFmt, passed); +#endif + + return WOLFSSL_SUCCESS; +} + /*----------------------------------------------------------------------------* | Method Allocators *----------------------------------------------------------------------------*/ @@ -20321,6 +20367,10 @@ static int test_ForceZero(void) void ApiTest(void) { + + printf("\n-----------------Porting tests------------------\n"); + AssertTrue(test_fileAccess()); + printf(" Begin API Tests\n"); AssertIntEQ(test_wolfSSL_Init(), WOLFSSL_SUCCESS); /* wolfcrypt initialization tests */ From 902008f5ea54ddc75d841a5d9d25f5c07ebc09f2 Mon Sep 17 00:00:00 2001 From: Takashi Kojo Date: Sat, 8 Sep 2018 09:17:52 +0900 Subject: [PATCH 005/326] refer unit_PassThrough flag at least once --- tests/api.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/tests/api.c b/tests/api.c index 7eff9ddd9..df537745f 100644 --- a/tests/api.c +++ b/tests/api.c @@ -442,7 +442,9 @@ static int test_wolfCrypt_Init(void) static int test_fileAccess() { - #ifdef WOLFSSL_TEST_PLATFORMDEPEND + if(unit_PassThrough == 1)XABORT(); /* do nothing. use the flag at least once. */ + + #if defined(WOLFSSL_TEST_PLATFORMDEPEND) && !defined(NO_FILESYSTEM) const char *fname[] = { svrCertFile, svrKeyFile, caCertFile, eccCertFile, eccKeyFile, eccRsaCertFile, From 0d4425260811ae4b3f33d9d598013628f539dbe8 Mon Sep 17 00:00:00 2001 From: Takashi Kojo Date: Sat, 8 Sep 2018 10:19:31 +0900 Subject: [PATCH 006/326] error pass though build flag WOLFSSL_PASSTHRU_ERR --- tests/api.c | 2 -- tests/unit.h | 12 +++++++++--- 2 files changed, 9 insertions(+), 5 deletions(-) diff --git a/tests/api.c b/tests/api.c index df537745f..86240138f 100644 --- a/tests/api.c +++ b/tests/api.c @@ -442,8 +442,6 @@ static int test_wolfCrypt_Init(void) static int test_fileAccess() { - if(unit_PassThrough == 1)XABORT(); /* do nothing. use the flag at least once. */ - #if defined(WOLFSSL_TEST_PLATFORMDEPEND) && !defined(NO_FILESYSTEM) const char *fname[] = { diff --git a/tests/unit.h b/tests/unit.h index 20dc47965..ee13c756f 100644 --- a/tests/unit.h +++ b/tests/unit.h @@ -33,14 +33,20 @@ #endif -static int unit_PassThrough = 0; - +#ifndef WOLFSSL_PASSTHRU_ERR #define Fail(description, result) do { \ printf("\nERROR - %s line %d failed with:", __FILE__, __LINE__); \ printf("\n expected: "); printf description; \ printf("\n result: "); printf result; printf("\n\n"); \ - if(unit_PassThrough == 0)XABORT(); \ + XABORT(); \ } while(0) +#else +#define Fail(description, result) do { \ + printf("\nERROR - %s line %d failed with:", __FILE__, __LINE__); \ + printf("\n expected: ");printf description; \ + printf("\n result: "); printf result; printf("\n\n"); \ +} while (0) +#endif #define Assert(test, description, result) if (!(test)) Fail(description, result) From a2be7590d15efdec3c0743cefdd0bdc610d549ed Mon Sep 17 00:00:00 2001 From: David Garske Date: Fri, 7 Sep 2018 17:02:34 -0700 Subject: [PATCH 007/326] Fixes for NXP LTC support with K82. Fix for SHA384/512. Fix for AES CBC not storing previous IV. Fix for `wc_AesSetKey` arg check. Fix for AES GCM IV != 12 test. Changed LTC default in settings.h to not enable SHA512 and Ed/Curve25519. Tested using Rowley Crossworks v4.2.0 on a FRDM-K82F. There is an initial stack pointer issue with the arm-startup code here for Rowley still outstanding, but these fixes are valid as-is. --- IDE/ROWLEY-CROSSWORKS-ARM/arm_startup.c | 2 +- IDE/ROWLEY-CROSSWORKS-ARM/benchmark_main.c | 4 ++++ IDE/ROWLEY-CROSSWORKS-ARM/test_main.c | 4 ++++ IDE/ROWLEY-CROSSWORKS-ARM/user_settings.h | 9 ++++++--- IDE/ROWLEY-CROSSWORKS-ARM/wolfssl_ltc.hzp | 6 +++--- wolfcrypt/src/aes.c | 20 +++++++++++++++++++- wolfcrypt/src/memory.c | 4 ++++ wolfcrypt/src/sha512.c | 5 ++--- wolfcrypt/test/test.c | 9 +++++---- wolfssl/wolfcrypt/settings.h | 10 +--------- 10 files changed, 49 insertions(+), 24 deletions(-) diff --git a/IDE/ROWLEY-CROSSWORKS-ARM/arm_startup.c b/IDE/ROWLEY-CROSSWORKS-ARM/arm_startup.c index 0faae8ecd..45c796705 100644 --- a/IDE/ROWLEY-CROSSWORKS-ARM/arm_startup.c +++ b/IDE/ROWLEY-CROSSWORKS-ARM/arm_startup.c @@ -155,7 +155,7 @@ void HardFault_HandlerC( uint32_t *hardfault_args ) printf ("BFAR = %x\n", _BFAR); // Break into the debugger - __asm("BKPT #0\n"); + __asm("BKPT #0\n"); } __attribute__( ( naked ) ) diff --git a/IDE/ROWLEY-CROSSWORKS-ARM/benchmark_main.c b/IDE/ROWLEY-CROSSWORKS-ARM/benchmark_main.c index 25f50ae7e..e205f2cb5 100644 --- a/IDE/ROWLEY-CROSSWORKS-ARM/benchmark_main.c +++ b/IDE/ROWLEY-CROSSWORKS-ARM/benchmark_main.c @@ -25,6 +25,7 @@ #endif #include +#include #include #include @@ -42,6 +43,7 @@ void main(void) { int test_num = 0; + wolfCrypt_Init(); /* required for ksdk_port_init */ do { /* Used for testing, must have a delay so no data is missed while serial is initializing */ @@ -68,6 +70,8 @@ void main(void) printf("\n&&&&&&&&&&&&&& done &&&&&&&&&&&&&\n"); delay_us(1000000); #endif + + wolfCrypt_Cleanup(); } /* diff --git a/IDE/ROWLEY-CROSSWORKS-ARM/test_main.c b/IDE/ROWLEY-CROSSWORKS-ARM/test_main.c index 2b1e76fde..bb483aa01 100644 --- a/IDE/ROWLEY-CROSSWORKS-ARM/test_main.c +++ b/IDE/ROWLEY-CROSSWORKS-ARM/test_main.c @@ -26,6 +26,7 @@ #endif #include +#include #include #include #include "hw.h" @@ -43,6 +44,7 @@ void main(void) { int test_num = 0; + wolfCrypt_Init(); /* required for ksdk_port_init */ do { /* Used for testing, must have a delay so no data is missed while serial is initializing */ @@ -68,6 +70,8 @@ void main(void) printf("\n&&&&&&&&&&&&&& done &&&&&&&&&&&&&\n"); delay_us(1000000); #endif + + wolfCrypt_Cleanup(); } diff --git a/IDE/ROWLEY-CROSSWORKS-ARM/user_settings.h b/IDE/ROWLEY-CROSSWORKS-ARM/user_settings.h index b9f3ae150..63279511e 100644 --- a/IDE/ROWLEY-CROSSWORKS-ARM/user_settings.h +++ b/IDE/ROWLEY-CROSSWORKS-ARM/user_settings.h @@ -19,7 +19,10 @@ extern "C" { #define SINGLE_THREADED #undef WOLFSSL_SMALL_STACK -#define WOLFSSL_SMALL_STACK +//#define WOLFSSL_SMALL_STACK + +#undef WOLFSSL_SMALL_STACK_CACHE +//#define WOLFSSL_SMALL_STACK_CACHE /* ------------------------------------------------------------------------- */ @@ -58,7 +61,7 @@ extern "C" { #define HAVE_ECC224 #undef NO_ECC256 #define HAVE_ECC384 - #ifndef USE_NXP_LTC /* NXP LTC HW supports up to 512 */ + #ifndef USE_NXP_LTC /* NXP LTC HW supports up to 384 */ #define HAVE_ECC521 #endif @@ -221,7 +224,7 @@ extern "C" { #endif #ifdef USE_NXP_LTC #define FREESCALE_USE_LTC - #define LTC_MAX_ECC_BITS (512) + #define LTC_MAX_ECC_BITS (384) #define LTC_MAX_INT_BYTES (256) //#define FREESCALE_LTC_TFM_RSA_4096_ENABLE diff --git a/IDE/ROWLEY-CROSSWORKS-ARM/wolfssl_ltc.hzp b/IDE/ROWLEY-CROSSWORKS-ARM/wolfssl_ltc.hzp index f9be95d06..5a474b301 100644 --- a/IDE/ROWLEY-CROSSWORKS-ARM/wolfssl_ltc.hzp +++ b/IDE/ROWLEY-CROSSWORKS-ARM/wolfssl_ltc.hzp @@ -4,7 +4,7 @@ @@ -338,7 +338,7 @@ arm_simulator_memory_simulation_parameter="MK82FN256xxx15;0x40000;0x0;0x0;0x40000;4" arm_target_loader_applicable_loaders="Flash" arm_target_loader_default_loader="Flash" - c_preprocessor_definitions="WOLFSSL_ROWLEY_ARM;WOLFSSL_USER_SETTINGS" + c_preprocessor_definitions="WOLFSSL_ROWLEY_ARM;WOLFSSL_USER_SETTINGS;USE_NXP_MMCAU;USE_NXP_LTC" c_user_include_directories=".;./drivers;./mmcau_2.0.0;./CMSIS/Include;../;../../;$(TargetsDir);$(TargetsDir)/Kinetis;$(TargetsDir)/Kinetis/CMSIS;$(TargetsDir)/Kinetis/CMSIS/include;$(TargetsDir)/CMSIS_3/CMSIS/include" debug_register_definition_file="$(TargetsDir)/Kinetis/MK82F25615_Peripherals.xml" linker_memory_map_file="$(TargetsDir)/Kinetis/MK82FN256xxx15_MemoryMap.xml" @@ -511,7 +511,7 @@