1

(7 replies, posted in wolfCrypt)

I call wc_InitSha384 before update and final every time I perform a hash.

Yes you are correct sizeof(input); is correct

No hardware acceleration. I'm using wolfssl-5.7.4-gplv3-fips-ready with the fipsv5 user_settings.h

2

(7 replies, posted in wolfCrypt)

Sorry that was just a typo by me. I am actually using sha384 as the variable used in init.

3

(7 replies, posted in wolfCrypt)

I probably don't understand how this works but my code is as follows:

byte input[] = {255};
byte hash[48];
wc_Sha384 sha384;
wc_InitSha384(&sha);
wc_Sha384Update(&sha384, input, sizeof(data));
wc_Sha384Final(&sha384, hash);

and then I'm checking the first 3 indices of hash against some hardcoded values.

4

(7 replies, posted in wolfCrypt)

I'm testing wc_InitSha384, wc_Sha384Update and wc_Sha384Final and I'm finding that my final hashed value is different every time I make a call. I'm hashing a byte array of 255, 255, 255 into a byte array of length 48 and it has different values every time. What gives?

5

(3 replies, posted in wolfCrypt)

I'm currently not using fast math in my user_settings.h. I've also found that defining WOLFSSL_STATIC_MEMORY causes wc_InitRsaKey to hang indefinitely.

Line 4862 in rsa.c seems to be the check that is causing things to fail.

6

(3 replies, posted in wolfCrypt)

What would be causing a MEMORY_E error during the initialization of an RSA key?

My user_settings.h defines related to RSA are:

WC_RSA_BLINDING
WC_RSA_PSS
USE_WOLFSSL_MEMORY
WOLFSSL_HAVE_SP_RSA
WOLFSSL_KEY_GEN
TARGET_EMBEDDED

If it helps I have also tried NO_MALLOC which causes the RSA initialization to hang indefinitely.

This on a Linux machine.

7

(1 replies, posted in wolfCrypt)

In the description of WolfCrypt it is stated that WolfCrypt is MISRA available. Does this mean there are versions that are MISRA compliant or that all versions of WolfCrypt are MISRA compliant? At the same time is WolfSSL MISRA compliant and what edition is it compliant to?

8

(6 replies, posted in wolfSSL)

I've got --enable-cryptonly --disable-opensslextra set and wolfssl/ssl.h on line 2845 is still trying to include stdarg.h. What am I missing?

9

(6 replies, posted in wolfSSL)

Okay I've made a bit of progress, but WolfSSL is still attempting to include stdarg.h when it is not available in ssl.h. Is there a way to disable this?

10

(6 replies, posted in wolfSSL)

If I wanted to manually define INTEGRITY where would that go? I'm new to this so I'm doing a bit of bumbling.

11

(6 replies, posted in wolfSSL)

I'm currently trying to get WolfSSL to build on the Integrity OS and beyond using

NO_FILESYSTEM
USER_TIME
USER_TICKS

I'm not sure what options I need to enable to get it to port over to Integrity?

Any ideas?