mirror of
https://github.com/Cateners/tiny_computer.git
synced 2026-05-21 08:55:48 +08:00
Update code to v1.0.14 (10)
This commit is contained in:
321
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/README_EN.md
vendored
Normal file
321
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/README_EN.md
vendored
Normal file
@@ -0,0 +1,321 @@
|
||||
wolfSSL sample application project for GR-ROSE evaluation board
|
||||
======
|
||||
|
||||
<br>
|
||||
|
||||
## 1. Overview
|
||||
-----
|
||||
|
||||
We provide a sample program for evaluating wolfSSL targeting the GR-ROSE evaluation board, which has RX65N MCU on it. The sample program runs in a bare metal environment that does not use a real-time OS and uses e2 studio as an IDE. This document describes the procedure from build to execution of the sample program.
|
||||
|
||||
The sample provided is a single application that can evaluate the following three functions:
|
||||
|
||||
- CryptoTest: A program that automatically tests various cryptographic operation functions
|
||||
- Benchmark: A program that measures the execution speed of various cryptographic operations
|
||||
- TlsClient: A program that performs TLS communication with the opposite TLS server application
|
||||
<br><br>
|
||||
|
||||
Since the H/W settings and S/W settings for operating the evaluation board have already been prepared, the minimum settings are required to operate the sample application. In addition, the RootCA certificate and server-side certificate required for TLS communication have already been set for sample use only.
|
||||
|
||||
The following sections will walk you through the steps leading up to running the sample application.
|
||||
<br><br>
|
||||
|
||||
## 2. Target H/W, components and libraries
|
||||
-----
|
||||
|
||||
This sample program uses the following hardware and software libraries. If a new version of the software component is available at the time of use, please update it as appropriate.
|
||||
|
||||
|item|name & version|
|
||||
|:--|:--|
|
||||
|Board|GR-ROSE|
|
||||
|Device|R5F565NEHxFP|
|
||||
|IDE| Renesas e2Studio Version:2022-01 |
|
||||
|Emulator| E1, E2 Emulator Lite |
|
||||
|Toolchain|CCRX v3.04.00|
|
||||
|TSIP| TSIP v1.15|
|
||||
<br>
|
||||
|
||||
The project of this sample program has a configuration file that uses the following FIT components.
|
||||
However, the FIT components themselves are not included in the distribution of this sample application. You need to download it by operating in the IDE. Some FIT components (TSIPs) cannot be downloaded directly from within the IDE and may need to be downloaded separately from the Renesas download site.
|
||||
<br>
|
||||
|
||||
|FIT component|version|name|
|
||||
|:--|:--|:--|
|
||||
|Board Support Packages|6.21|r_bsp|
|
||||
|CMT driver|4.90|r_cmt_rx|
|
||||
|Ethernet Driver|1.21|r_ether_rx|1.21|r_ether_rx|
|
||||
|Generic system timer for RX MCUs|1.01|r_sys_time_rx|
|
||||
|TCP/IP protocol stack[M3S-T4-Tiny] - RX Ethernet Driver Interface|1.09|r_t4_driver_rx|
|
||||
|TCP/IP protocol stack[M3S-T4-Tiny] for Renesas MCUs|2.10|r_t4_rx|
|
||||
|TSIP(Trusted Secure IP) driver|1.15.l|r_tsip_rx|
|
||||
<br>
|
||||
|
||||
Note) As of April 2022, TIPS v1.15 does not seem to be able to be added as a FIT component by adding a component in the Smart Configurator Perspective. Add it manually along the method described later.
|
||||
<br><br>
|
||||
|
||||
## 3. Importing sample application project into e2Studio
|
||||
----
|
||||
|
||||
There is no need to create a new sample program. Since the project file is already prepared, please import the project from the IDE by following the steps below.
|
||||
|
||||
+ e2studio "File" menu> "Open project from file system ..."> "Directory (R) ..." Click the import source button and select the folder from which the project will be imported. Select the folder (Renesas/e2studio/{MCU}/{board-name-folder}) where this README file exists.
|
||||
+ Four projects that can be imported are listed, but check only the three projects "smc", "test" and "wolfssl" and click the "Finish" button.
|
||||
|
||||
You should see the **smc**, **test**, and **wolfssl** 3 projects you imported into the project explorer.
|
||||
<br><br>
|
||||
|
||||
## 4. FIT module download and smart configurator file generation
|
||||
----
|
||||
|
||||
You will need to get the required FIT modules yourself. Follow the steps below to get them.
|
||||
|
||||
1. Open the smc project in Project Explorer and double-click the **smc.scfg** file to open the Smart Configurator Perspective.
|
||||
|
||||
2. Select the "Components" tab on the software component settings pane. Then click the "Add Component" button at the top right of the pane. The software component selection dialog will pop up. Click "Download the latest version of FIT driver and middleware" at the bottom of the dialog to get the modules. You can check the download destination folder by pressing "Basic settings...".
|
||||
|
||||
3. The latest version of the TSIP component may not be automatically obtained due to the delay in Renesas' support by the method in step 2 above. In that case, you can download it manually from the Renesas website. Unzip the downloaded component and store the files contained in the FIT Modules folder in the download destination folder of step 2.
|
||||
|
||||
4. Select the required FIT components shown from the list and press the "Finish" button. Repeat this operation until you have the required FIT components.
|
||||
|
||||
5. Select the Components tab on the Software Component Settings pane and select the r_t4_rx component. In the settings pane on the right, specify the IP address of this board as the value of the "# IP address for ch0, when DHCP disable." Property (e.g. 192.168.1.9).
|
||||
|
||||
6. Press the "Generate Code" button at the top right of the software component settings pane to have the smart configurator generate the source files. A src/smc_gen folder will be created under the smc project to store source files, libraries, etc.
|
||||
|
||||
<br><br>
|
||||
|
||||
## 5. Adding smc_gen files to the test project
|
||||
----
|
||||
|
||||
The test project is a sample application project. When you open the test project in the project explorer, there is a src folder, which contains the source files of the sample application. Add the source files by copying and pasting the smc_gen folder generated in the step5, directly under this src folder.
|
||||
|
||||
Make sure you have a folder hierarchy like this:
|
||||
|
||||
```
|
||||
<board-name-folder>/test/src/smc_gen
|
||||
```
|
||||
<br>
|
||||
|
||||
## 6. Select the behavior of the test application
|
||||
----
|
||||
|
||||
The test project is a single sample application, but you can specify to perform one of the following by switching the settings:
|
||||
|
||||
- CryptoTest: A program that automatically tests various encryption operation functions
|
||||
- Benchmark: A program that measures the execution speed of various cryptographic operations
|
||||
- TlsClient: A program that performs TLS communication with the opposite TLS server application
|
||||
|
||||
Open the <board-name-folder\>/test/src/wolfssl_demo.h file and enable one of the following definitions:
|
||||
|
||||
- #define CRYPT_TEST
|
||||
- #define BENCHMARK
|
||||
- #define TLS_CLIENT
|
||||
|
||||
Then build the test application.
|
||||
<br><br>
|
||||
|
||||
|
||||
## 7. Build and run the test application
|
||||
-----
|
||||
|
||||
Now that the test application is ready to build.
|
||||
|
||||
1. Build the wolfssl project on the project explorer, then the test project.
|
||||
|
||||
2. After a successful build, connect the target board to the emulator and supply external power.
|
||||
|
||||
3. Select "Run" menu> "Debug" to open the debug perspective.
|
||||
|
||||
4. The test application outputs the operating status to the standard output. Keep the "Renesas Debug Virtual Console" open for viewing this standard output.
|
||||
|
||||
5. Press the run button to run the test application.
|
||||
|
||||
6. CryptoTest, Benchmark or TLS_Client After displaying the execution result according to the selected behavior, it enters an infinite loop, so if you think that the output has stopped, stop debugging.
|
||||
<br><br>
|
||||
|
||||
## 8. Running test application as TLS_Client
|
||||
-----
|
||||
<br>
|
||||
|
||||
### 8.1 TLS version supported by the test application
|
||||
|
||||
<br>
|
||||
If you use TSIP v1.15 or later, you can use the TLS1.3 protocol in addition to the existing TLS1.2. The following macro is defined to {board-name-folder}/common/user_settings.h.
|
||||
<br><br>
|
||||
|
||||
```
|
||||
#define WOLFSSL_TLS13
|
||||
```
|
||||
|
||||
This definition sets it to use the TLS 1.3 protocol. If you use TLS1.2, comment out this macro definition and rebuild your test application.
|
||||
|
||||
<br>
|
||||
|
||||
### 8.2 Type of certificates to use
|
||||
|
||||
<br>
|
||||
|
||||
The test and server applications allow you to select the type of certificate (RootCA certificate, server certificate, client certificate) to use for TLS communication. You can select either an RSA certificate whose public key included in the certificate is an RSA public key or an ECDSA certificate containing an ECC public key. By default, the ECDSA certificate is used.
|
||||
<br>
|
||||
|
||||
The following macro is defined to {board-name-folder}/common/user_settings.h by default. If you want to use the RSA certificates, comment out the above definition and rebuild the test application.
|
||||
|
||||
<br>
|
||||
|
||||
```
|
||||
#define USE_ECC_CERT
|
||||
```
|
||||
<br>
|
||||
|
||||
### 8.3 Cipher suites
|
||||
|
||||
<br>
|
||||
|
||||
In the test application, the TLS version and certificate type determine the cipher suites used by the test application. The table below shows the cipher suites that can be used.
|
||||
<br>
|
||||
|
||||
|Tls version |Certificate type|Cipher suites|
|
||||
|:--|:--|:--|
|
||||
|TLS1.3|RSA/ECDSA certificate| |
|
||||
|||TLS_AES_128_GCM_SHA256|
|
||||
|||TLS_AES_128_CCM_SHA256|
|
||||
|TLS1.2|RSA certificate|
|
||||
|||TLS_RSA_WITH_AES_128_CBC_SHA|
|
||||
|||TLS_RSA_WITH_AES_256_CBC_SHA|
|
||||
|||TLS_RSA_WITH_AES_128_CBC_SHA256|
|
||||
|||TLS_RSA_WITH_AES_256_CBC_SHA256|
|
||||
|||TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256|
|
||||
|||TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256|
|
||||
||ECDSA certificate||
|
||||
|||TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256|
|
||||
|||TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256|
|
||||
|
||||
|
||||
<br>
|
||||
|
||||
### 8.4 Build and run a server application
|
||||
|
||||
<br>
|
||||
To operate as TLS_Client, an opposite application for TLS communication is required. A wolfSSL package provides a server sample application that you can use for this purpose. This program is generated by building wolfssl. You can build wolfSSL on Linux (including MacOS and WSL) with gcc installed or build using Visual Studio. The following introduces the build on WSL.
|
||||
<br><br>
|
||||
|
||||
Configuration options need to be changed depending on the certificate type used.
|
||||
|
||||
#### 8.4.1 Configuration when using ECDSA certificates
|
||||
|
||||
<br>
|
||||
|
||||
```
|
||||
$ cd <wolfssl-folder>
|
||||
$ ./autogen.sh
|
||||
$ ./configure --enable-ecc --enable-dsa --enable-aesccm CFLAGS="-DWOLFSSL_STATIC_RSA -DHAVE_AES_CBC -DHAVE_DSA -DHAVE_ALL_CURVES -DHAVE_ECC -DNO_RSA"
|
||||
$ make
|
||||
```
|
||||
Note: Do not forget to specify "-DNO_RSA"
|
||||
|
||||
|
||||
|
||||
<br>
|
||||
|
||||
With the above build, <wolfssl-folder\>/examples/server/server
|
||||
Is generated. This executable acts as a TLS server application. If you execute it with the following options, it will be in the listening state for the connection from TLS_Client.
|
||||
<br><br>
|
||||
|
||||
```
|
||||
$ examples/server/server -b -d -i
|
||||
```
|
||||
<br>
|
||||
|
||||
#### 8.4.2 Configuration when using RSA certificates
|
||||
|
||||
<br>
|
||||
|
||||
```
|
||||
$ cd <wolfssl-folder>
|
||||
$ ./autogen.sh
|
||||
$ ./configure --enable-ecc --enable-dsa --enable-aesccm CFLAGS="-DWOLFSSL_STATIC_RSA -DHAVE_AES_CBC -DHAVE_DSA -DHAVE_ALL_CURVES -DHAVE_ECC"
|
||||
$ make
|
||||
```
|
||||
|
||||
<br>
|
||||
|
||||
#### 8.4.3 Run the server application
|
||||
|
||||
<br>
|
||||
|
||||
With the above build, {wolfssl-folder}/examples/server/server
|
||||
is generated. This executable program acts as a server application. If you execute it with the following options, it will be in the standby state for connection from the test application. Specify "-v4" when using TLS1.3 as the TLS version to be used, and specify "-v3" when using TLS1.2.
|
||||
<br> <br>
|
||||
|
||||
```
|
||||
$ examples / server / server -b -v4 -i
|
||||
```
|
||||
|
||||
<br>
|
||||
For the test application, specify the IP address assigned to the server application.
|
||||
|
||||
Open {board-name-folder}/test/src/wolf_client.c to specify ip address of the server.
|
||||
|
||||
<br>
|
||||
|
||||
```
|
||||
...
|
||||
#define SIMPLE_TLSSEVER_IP 192.168.53.9
|
||||
...
|
||||
```
|
||||
<br>
|
||||
Save the file and rebuild the test application. When you run the test application, it makes a TLS connection with the server application, then exchanges a simple string and displays the following on the standard output. The cipher suites displayed depends on the combination of TLS version and certificate type.
|
||||
<br><br>
|
||||
|
||||
```
|
||||
cipher : ECDHE-RSA-AES128-GCM-SHA256
|
||||
Received: I hear you fa shizzle!
|
||||
|
||||
cipher : ECDHE-RSA-AES128-SHA256
|
||||
Received: I hear you fa shizzle!
|
||||
|
||||
cipher : AES128-SHA256
|
||||
Received: I hear you fa shizzle!
|
||||
|
||||
cipher : AES256-SHA256
|
||||
Received: I hear you fa shizzle!
|
||||
|
||||
cipher : ECDHE-RSA-AES128-SHA256
|
||||
Received: I hear you fa shizzle!
|
||||
|
||||
cipher : ECDHE-RSA-AES128-GCM-SHA256
|
||||
Received: I hear you fa shizzle!
|
||||
```
|
||||
<br>
|
||||
|
||||
|
||||
|
||||
## 9. What you need to do to use the RootCA certificate prepared by the user
|
||||
----
|
||||
|
||||
In this sample program, the RootCA certificate required to operate as TLS_Client and the server certificate used by the sample TLS server application are certificates that can be used only for evaluation.
|
||||
If you want to use it for purposes beyond functional evaluation, you need to prepare the RootCA certificate yourself. with this,
|
||||
1. Provisioning key
|
||||
2. RSA key pair required for RootCA certificate validation
|
||||
3. The signature generated by the RootCA certificate with the private key in 2 above.
|
||||
|
||||
will become necessary. Please refer to the manual provided by Renesas for how to generate them.
|
||||
<br>
|
||||
|
||||
## 10. Limitations
|
||||
----
|
||||
<br>
|
||||
wolfSSL, which supports TSIPv1.15, has the following functional restrictions.
|
||||
<br><br>
|
||||
|
||||
1. Handshake message packets exchanged with the server during the TLS handshake are stored in plaintext in memory. This is used to calculate the hash of handshake messages. The content will be deleted at the end of the session.
|
||||
|
||||
1. TLS1.2 does not support the client authentication function using TSIP.
|
||||
Use wolfSSL_CTX_use_certificate_buffer or wolfSSL_CTX_use_certificate_chain_buffer_format to load the client certificate and wolfSSL_CTX_use_PrivateKey_buffer to load the private key. It is processed by software.
|
||||
|
||||
1. In TLS 1.3, the client authentication function using TSIP is supported only for ECDSA client certificates. In the case of RSA certificates, it will be processed by software.
|
||||
|
||||
1. In TLS1.3, among the server authentication functions using TSIP, "Certificate Verify" message is processed by software.
|
||||
|
||||
1. Session resumption and early data using TSIP are not supported.
|
||||
|
||||
The above limitations 1 through 4 are expected to be improved by TSIP from the next version onwards.
|
||||
318
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/README_JP.md
vendored
Normal file
318
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/README_JP.md
vendored
Normal file
@@ -0,0 +1,318 @@
|
||||
評価ボードGR-ROSE 用 wolfSSLサンプルプロジェクト
|
||||
======
|
||||
|
||||
<br>
|
||||
|
||||
## 1. 概要
|
||||
-----
|
||||
|
||||
Renesas社製MCU RX65Nを搭載した評価ボードGR-ROSEをターゲットとしてwolfSSLを評価するためのサンプルプログラムを提供します。サンプルプログラムはリアルタイムOSを使わないベアメタル環境で動作し、IDEとしてe2 studioを使用するものです。本ドキュメントではサンプルプログラムのビルドから実行までの手順を説明します。
|
||||
|
||||
提供するサンプルプログラムは次の3機能を評価できる単一のアプリケーションです:
|
||||
|
||||
- CryptoTest: 各種暗号化オペレーション機能を自動テストするプログラム
|
||||
- Benchmark: 各種暗号化オペレーションの実行速度を測定するプログラム
|
||||
- TlsClient: 対向するTLSサーバーアプリケーションとTLS通信を行うプログラム
|
||||
|
||||
評価ボードを動作させる為のH/W設定、S/W設定は既に用意していますから、サンプルプロジェクトの動作までは最少の設定で済むようになっています。また、TLS通信において必要となる、RootCA証明書、サーバー側証明書もサンプル使用に限定したものが既に設定済みです。
|
||||
|
||||
以降のセクションはサンプルアプリケーションの実行までのステップを順に説明していきます。
|
||||
<br><br>
|
||||
|
||||
|
||||
## 2. ターゲットとしているH/W、コンポーネント、ライブラリ
|
||||
-----
|
||||
|
||||
このサンプルプログラムでは以下のハードウエアやソソフトウエアライブラリを使用しています。皆さんがご利用時にバージョンの新しいソフトウエアコンポーネントが利用可能であれば適宜更新の上ご利用ください。
|
||||
<br><br>
|
||||
|
||||
|要素|名称/バージョン|
|
||||
|:--|:--|
|
||||
|評価ボード|GR-ROSE|
|
||||
|Device|R5F565NEHxFP|
|
||||
|IDE| Renesas e2Studio Version:2022-01 |
|
||||
|エミュレーター| E1, E2エミュレーターLite |
|
||||
|Toolchain|CCRX v3.04.00|
|
||||
|TSIP| TSIP v1.15|
|
||||
<br>
|
||||
|
||||
本サンプルプログラムのプロジェクトには以下のFITコンポーネントを使用する設定ファイルが用意されています。
|
||||
しかし、FITコンポーネント群そのものは本サンプルアプリケーションの配布物としては含まれていません。皆さん自身でIDE内の操作によってダウンロードしていただく必要があります。一部のFITコンポーネント(TSIP)はIDE内から直接ダウンロードできず、Renesas社のダウンロードサイトから別途ダウンロードが必要なものがあります。
|
||||
<br><br>
|
||||
|
||||
|
||||
|
||||
|FITコンポーネント|バージョン|略称|
|
||||
|:--|:--|:--|
|
||||
|Board Support Packages|6.21|r_bsp|
|
||||
|CMT driver|4.90|r_cmt_rx|
|
||||
|Ethernet Driver|1.21|r_ether_rx|1.21|r_ether_rx|
|
||||
|Generic system timer for RX MCUs|1.01|r_sys_time_rx|
|
||||
|TCP/IP protocol stack[M3S-T4-Tiny] - RX Ethernet Driver Interface|1.09|r_t4_driver_rx|
|
||||
|TCP/IP protocol stack[M3S-T4-Tiny] for Renesas MCUs|2.10|r_t4_rx|
|
||||
|TSIP(Trusted Secure IP) driver|1.15.l|r_tsip_rx|
|
||||
|
||||
(注意)2022年4月現在、TIPSv1.15はFITコンポーネントとしてスマートコンフィギュレータパースペクティブのコンポーネントの追加操作では追加できないようです。後ほど説明する手動での追加方法を使って追加してください。<br>
|
||||
|
||||
|
||||
<br><br>
|
||||
|
||||
## 3. サンプルプログラムプロジェクトのe2Studioへのインポート
|
||||
----
|
||||
|
||||
サンプルプログラムは新規作成する必要はありません。すでにプロジェクトファイルが用意されていますからIDEから以下の手順でプロジェクトをインポートしてください。
|
||||
|
||||
|
||||
+ 1.e2studioの"ファイル"メニュー > "ファイル・システムからプロジェクトを開く..." > "ディレクトリ(R)..."インポート元ボタンを押して、プロジェクトのインポート元となるフォルダーを選択します。本READMEファイルが存在するフォルダ(Renesas/e2studio/{MCU}/{board-name-folder})を選択してください。
|
||||
|
||||
+ インポートできるプロジェクトが4つリストアップされますが、"smc", "test" と"wolfssl"の3プロジェクトにのみチェックを入れて”終了”ボタンを押してください。
|
||||
|
||||
プロジェクト・エクスプローラーにインポートしたsmc,test,wolfsslの3プロジェクトが表示されるはずです。
|
||||
<br><br>
|
||||
|
||||
## 4. FITモジュールの取得とスマートコンフィギュレータによるファイル生成
|
||||
----
|
||||
|
||||
FITモジュールは皆さん自身で取得していただく必要があります。以下の手順で取得してください。
|
||||
<br><br>
|
||||
|
||||
|
||||
1. プロジェクト・エクスプローラー上でsmcプロジェクトを開き**smc.scfg**ファイルをダブルクリックして、スマートコンフィギュレータパースペクティブを開きます。
|
||||
|
||||
2. ソフトウエアコンポーネント設定画面の"コンポーネント"タブを選択 > 画面右上の"コンポーネントの追加" ボタンを押して下さい。ソフトウエアコンポーネントの選択ダイアログが表示されます。ここで、画面下部の"最新版のFITドライバとミドルウエアをダウンロードする"を押して、モジュール群を取得しておいてください。ダウンロード先のフォルダは"基本設定..."を押して確認することができます。
|
||||
|
||||
3. TSIPコンポーネントは上記ステップ2の方法ではRenesas社の対応が遅れていて最新版が自動的には取得できないことがあります。その場合にはRenesas社のサイトから手動でダウンロードできます。ダウンロードしたコンポーネントのを解凍し、FITModulesフォルダに含まれているファイル群をステップ2のダウンロード先フォルダに格納してください。
|
||||
|
||||
4. 先に示したFITコンポーネントを一覧から選択して"終了"ボタンを押します。この操作を必要なFITコンポーネントを得るまで繰り返し行います。
|
||||
|
||||
5. ソフトウエアコンポーネント設定画面のコンポーネントタブを選択し、r_t4_rxコンポーネントを選択します。右の設定ペインに"# IP address for ch0, when DHCP disable."プロパティの値として、このボードのIPアドレスを皆さんの環境に合わせてて指定します(例:
|
||||
192.168.1.9)。
|
||||
|
||||
6. ソフトウエアコンポーネント設定画面の右上の”コードの生成"ボタンを押して、スマートコンフィギュレータにソースファイルを生成させます。smcプロジェクトの下にsrc/smc_genフォルダが生成され、ソースファイル、ライブラリ等が格納されされます。
|
||||
<br><br>
|
||||
|
||||
## 5. testプロジェクトへのsmc_genファイル群の追加
|
||||
----
|
||||
|
||||
testプロジェクトはサンプルアプリケーションのプロジェクトです。プロジェクト・エクスプローラー上でtestプロジェクトを開くとsrcフォルダが存在し、そこにサンプルアプリケーションのソースファイルが格納されています。このsrcフォルダ直下に4-5で生成したsmc_genフォルダごとコピー&ペーストしてソースファイルを追加します。
|
||||
|
||||
test/src/smc_gen
|
||||
|
||||
のようなフォルダ階層になることを確認してください。
|
||||
<br><br>
|
||||
|
||||
## 6. testアプリケーションの動作を選択する
|
||||
----
|
||||
testプロジェクトが唯一のサンプルアプリケーションですが、その動作を設定で切り替えることによって、
|
||||
|
||||
- CryptoTest: 各種暗号化オペレーション機能を自動テストするプログラム
|
||||
- Benchmark: 各種暗号化オペレーションの実行速度を測定するプログラム
|
||||
- TlsClient: 対向するTLSサーバーアプリケーションとTLS通信を行うプログラム
|
||||
|
||||
のいずれかの動作を行うよう指定できます。
|
||||
|
||||
設定はtest/src/wolfssl_demo.h ファイル内の、
|
||||
|
||||
- #define CRYPT_TEST
|
||||
- #define BENCHMARK
|
||||
- #define TLS_CLIENT
|
||||
|
||||
のいずれか一つを有効にしてアプリケーションをビルドすることで行います。
|
||||
<br><br>
|
||||
|
||||
|
||||
## 7. testアプリケーションのビルドと実行
|
||||
-----
|
||||
|
||||
testアプリケーションのビルドの準備が整ったので、ビルドを行います。
|
||||
|
||||
1.プロジェクト・エクスプローラー上のwolfsslプロジェクトをビルドし、次にtestプロジェクトをビルドします。
|
||||
|
||||
2.ビルドが成功したら、ターゲットボードとエミュレーターを接続し、外部電源を入力します。
|
||||
|
||||
3."実行"メニュー > "デバッグ"を選択し、デバッグパースペクティブを開きます。
|
||||
|
||||
4. testアプリケーションは標準出力に動作状況を出力します。この標準出力の表示用に、"Renesas Debug Virtual Console"を開いておきます。
|
||||
|
||||
5.実行ボタンを押してtestアプリケーションを動作させます。
|
||||
|
||||
6.CryptoTest、BenchmarkあるいはTLS_Client選択していた動作に応じた実行結果を表示したあと無限ループに入るので出力が停止したと思われたらデバッグを停止させます。
|
||||
<br><br>
|
||||
|
||||
## 8. TLS_Clientとしてのtestアプリケーションの実行
|
||||
-----
|
||||
<br>
|
||||
|
||||
### 8.1 testアプリケーションのサポートするTLSバージョン
|
||||
<br>
|
||||
TSIPv1.15以降を使用する場合には、これまでのTLS1.2に加えてTLS1.3プロトコルが使用できます。{board-name-folder}/common/user_settings.hに既定で以下のマクロ定義が設定されています。
|
||||
<br><br>
|
||||
|
||||
```
|
||||
#define WOLFSSL_TLS13
|
||||
```
|
||||
この定義によりTLS1.3プロトコルを使用する設定となります。TLS1.2を使用する場合には、このマクロ定義をコメントアウトしてして、testアプリケーションを再ビルドしてください。
|
||||
|
||||
<br>
|
||||
|
||||
### 8.2 使用する証明書のタイプ
|
||||
|
||||
<br>
|
||||
|
||||
testアプリケーションとサーバーアプリケーションではTLS通信時に使用する証明書(RootCA証明書、サーバー証明書、クライアント証明書)のタイプが選択できます。証明書に含まれている公開鍵がRSA公開鍵であるRSA証明書とECC公開鍵を含むECDSA証明書が選択できます。既定ではECDSA証明書を使用するようになっています。
|
||||
|
||||
<br>
|
||||
{board-name-folder}/common/user_settings.h に既定で以下のマクロ定義が設定されています。RSA証明書を使用する場合には上記定義をコメントアウトして、testアプリケーションを再ビルドしてください。
|
||||
<br><br>
|
||||
|
||||
```
|
||||
#define USE_ECC_CERT
|
||||
```
|
||||
|
||||
<br>
|
||||
この定義により、testアプリケーションはサーバーの提示するECC公開鍵を含んだサーバー証明書を検証できるRootCA証明書を使うようになります。また、クライアント認証に用いるクライアント証明書もECDSA証明書が使われます。
|
||||
<br><br>
|
||||
|
||||
|
||||
### 8.3 暗号化スイートの選択
|
||||
|
||||
<br>
|
||||
testアプリケーションでは、TLSバージョンと証明書のタイプにより、testアプリケーションで使用する暗号化スイートを決定します。下表に使用できる暗号化スイートを示します。
|
||||
|
||||
<br>
|
||||
|
||||
|
||||
|バージョン|証明書|暗号化スイート|
|
||||
|:--|:--|:--|
|
||||
|TLS1.3|RSA/ECDSA証明書| |
|
||||
|||TLS_AES_128_GCM_SHA256|
|
||||
|||TLS_AES_128_CCM_SHA256|
|
||||
|TLS1.2|RSA証明書|
|
||||
|||TLS_RSA_WITH_AES_128_CBC_SHA|
|
||||
|||TLS_RSA_WITH_AES_256_CBC_SHA|
|
||||
|||TLS_RSA_WITH_AES_128_CBC_SHA256|
|
||||
|||TLS_RSA_WITH_AES_256_CBC_SHA256|
|
||||
|||TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256|
|
||||
|||TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256|
|
||||
||ECDSA証明書||
|
||||
|||TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256|
|
||||
|||TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256|
|
||||
|
||||
|
||||
<br>
|
||||
|
||||
### 8.4 TLS対向アプリケーションのビルドと実行
|
||||
|
||||
<br>
|
||||
|
||||
testアプリケーションをTLS_Clientとしての動作を行わせる場合には、TLS通信の相手方となる対向アプリケーションが必要となります。wolfSSLパッケージにはこの用途に使用できるTLSserverサンプルアプリケーションが用意されています。このプログラムはwolfsslをビルドすることで生成されます。wolfSSLのビルドにはgccがインストールされているLinux(MacOS, WSLも含む)でのビルドとVisualStudioを使ってのビルドが可能です。以下ではWSL上でのビルドを紹介します。
|
||||
<br><br>
|
||||
|
||||
コンフィギュレーションオプションは使用する証明書タイプによって変更する必要があります。
|
||||
|
||||
<br>
|
||||
|
||||
#### 8.4.1 ECDSA証明書を使用する場合のコンフィギュレーション
|
||||
|
||||
<br>
|
||||
|
||||
```
|
||||
$ cd {wolfssl-folder}
|
||||
$ ./autogen.sh
|
||||
$ ./configure --enable-ecc --enable-dsa --enable-aesccm CFLAGS="-DWOLFSSL_STATIC_RSA -DHAVE_AES_CBC -DHAVE_DSA -DHAVE_ALL_CURVES -DHAVE_ECC -DNO_RSA"
|
||||
$ make
|
||||
```
|
||||
(注意)"-DNO_RSA"の指定をわすれないこと
|
||||
|
||||
<br>
|
||||
|
||||
#### 8.4.2 RSA証明書を使用する場合のコンフィギュレーション
|
||||
|
||||
<br>
|
||||
|
||||
```
|
||||
$ cd {wolfssl-folder}
|
||||
$ ./autogen.sh
|
||||
$ ./configure --enable-ecc --enable-dsa --enable-aesccm CFLAGS="-DWOLFSSL_STATIC_RSA -DHAVE_AES_CBC -DHAVE_DSA -DHAVE_ALL_CURVES -DHAVE_ECC"
|
||||
$ make
|
||||
```
|
||||
|
||||
<br>
|
||||
|
||||
#### 8.4.3 サーバーアプリケーションの実行
|
||||
<br>
|
||||
上記のビルドによって、{wolfssl-folder}/examples/server/server
|
||||
が生成されます。この実行プログラムがサーバーアプリケーションとして機能します。以下のオプションを与えて実行させるとtestアプリケーションからの接続を待ち受け状態になります。 使用するTLSバージョンとして TLS1.3を使用する場合には "-v4"を指定し、TLS1.2を使用する場合には"-v3"を指定してください。
|
||||
<br><br>
|
||||
|
||||
```
|
||||
$ examples/server/server -b -v4 -i
|
||||
```
|
||||
<br>
|
||||
testアプリケーションには、サーバーアプリケーションに割り当てられたIPアドレスを指定します。
|
||||
|
||||
wolf_client.cを開き、#define SIMPLE_TLSSEVER_IPにアドレスを指定します。
|
||||
|
||||
```
|
||||
-- wolf_client.c --
|
||||
|
||||
...
|
||||
#define SIMPLE_TLSSEVER_IP 192.168.53.9
|
||||
...
|
||||
```
|
||||
<br>
|
||||
ファイルをセーブしてtestアプリケーションを再ビルドしてください。testアプリケーションを実行すると、対向アプリケーションとの間でTLS接続が行われ、その後簡単な文字列を交換して標準出力に以下のような表示を行います。表示される暗号化スイートはTLSバージョンと証明書タイプの組み合わせによって異なります。
|
||||
|
||||
<br><br>
|
||||
|
||||
```
|
||||
cipher : ECDHE-RSA-AES128-GCM-SHA256
|
||||
Received: I hear you fa shizzle!
|
||||
|
||||
cipher : ECDHE-RSA-AES128-SHA256
|
||||
Received: I hear you fa shizzle!
|
||||
|
||||
cipher : AES128-SHA256
|
||||
Received: I hear you fa shizzle!
|
||||
|
||||
cipher : AES256-SHA256
|
||||
Received: I hear you fa shizzle!
|
||||
|
||||
cipher : ECDHE-RSA-AES128-SHA256
|
||||
Received: I hear you fa shizzle!
|
||||
|
||||
cipher : ECDHE-RSA-AES128-GCM-SHA256
|
||||
Received: I hear you fa shizzle!
|
||||
```
|
||||
<br>
|
||||
|
||||
|
||||
## 9. ユーザーが用意したRootCA証明書を利用する際に必要なこと
|
||||
-----
|
||||
|
||||
本サンプルプログラムでは、TLS_Clientとして動作する際に必要なRootCA証明書とサンプルTLSサーバーアプリケーションが使用するサーバー証明書などは評価用でのみ利用可能な証明書です。
|
||||
機能評価を超えた目的で利用する場合にはRootCA証明書をユーザー自身で用意する必要があります。それに伴い、
|
||||
1. Provisioning key
|
||||
2. RootCA証明書の検証の為に必要なRSA鍵ペア
|
||||
3. RootCA証明書を上記2の秘密鍵で生成した署名
|
||||
|
||||
が必要になります。それらの生成方法はRenesas社提供のマニュアルを参照してください。
|
||||
|
||||
<br>
|
||||
|
||||
## 10. 制限事項
|
||||
|
||||
TSIPv1.15をサポートしたwolfSSLでは以下の機能制限があります。
|
||||
|
||||
1. TLSハンドシェーク中にサーバーと交換したメッセージパケットが平文でメモリ上に蓄積されています。これはハンドシェークメッセージのハッシュ計算に使用されます。内容はセッション終了時に削除されます。
|
||||
|
||||
1. TLS1.2ではTSIPを使ったクライアント認証機能をサポートしていません。
|
||||
wolfSSL_CTX_use_certificate_buffer あるいはwolfSSL_CTX_use_certificate_chain_buffer_format を使ってクライアント証明書をロードし、wolfSSL_CTX_use_PrivateKey_bufferを使って秘密鍵をロードしてください。ソフトウエアで処理を行います。
|
||||
|
||||
1. TLS1.3ではTSIPを使ったクライアント認証機能はECDSAクライアント証明書の場合にのみサポートされます。RSA証明書の場合はソフトウエアでの処理となります。
|
||||
|
||||
1. TLS1.3ではTSIPを使ったサーバー認証機能のうち、CertificateVerifyメッセージの検証はソフトウエアでの処理となります。
|
||||
|
||||
1. TSIPを使ってのセッション再開およびearly dataはサポートされません。
|
||||
|
||||
上記制限1 ~ 4は次版以降のTSIPによって改善が見込まれています。
|
||||
22
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/common/strings.h
vendored
Normal file
22
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/common/strings.h
vendored
Normal file
@@ -0,0 +1,22 @@
|
||||
/* strings.h
|
||||
*
|
||||
* Copyright (C) 2006-2022 wolfSSL Inc.
|
||||
*
|
||||
* This file is part of wolfSSL.
|
||||
*
|
||||
* wolfSSL is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* wolfSSL is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
*/
|
||||
|
||||
int strncasecmp(const char *s1, const char * s2, unsigned int sz);
|
||||
22
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/common/unistd.h
vendored
Normal file
22
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/common/unistd.h
vendored
Normal file
@@ -0,0 +1,22 @@
|
||||
/* unistd.h
|
||||
*
|
||||
* Copyright (C) 2006-2022 wolfSSL Inc.
|
||||
*
|
||||
* This file is part of wolfSSL.
|
||||
*
|
||||
* wolfSSL is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* wolfSSL is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
*/
|
||||
|
||||
/* DUMMY Header */
|
||||
234
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/common/user_settings.h
vendored
Normal file
234
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/common/user_settings.h
vendored
Normal file
@@ -0,0 +1,234 @@
|
||||
/* user_settings.h
|
||||
*
|
||||
* Copyright (C) 2006-2022 wolfSSL Inc.
|
||||
*
|
||||
* This file is part of wolfSSL.
|
||||
*
|
||||
* wolfSSL is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* wolfSSL is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
*/
|
||||
|
||||
/*-- Renesas MCU type ---------------------------------------------------------
|
||||
*
|
||||
*
|
||||
*----------------------------------------------------------------------------*/
|
||||
#define WOLFSSL_RENESAS_RX65N
|
||||
|
||||
|
||||
|
||||
/*-- Renesas TSIP usage and its version ---------------------------------------
|
||||
*
|
||||
* "WOLFSSL_RENESAS_TSIP" definition makes wolfSSL to use H/W acceleration
|
||||
* for cipher operations.
|
||||
* TSIP definition asks to have its version number.
|
||||
* "WOLFSSL_RENESAS_TSIP_VER" takes following value:
|
||||
* 106: TSIPv1.06
|
||||
* 109: TSIPv1.09
|
||||
* 113: TSIPv1.13
|
||||
* 114: TSIPv1.14
|
||||
* 115: TSIPv1.15
|
||||
*----------------------------------------------------------------------------*/
|
||||
#define WOLFSSL_RENESAS_TSIP
|
||||
#define WOLFSSL_RENESAS_TSIP_VER 115
|
||||
|
||||
|
||||
/*-- TLS version definitions --------------------------------------------------
|
||||
*
|
||||
* wolfSSL supports TLSv1.2 by default. In case you want your system to support
|
||||
* TLSv1.3, uncomment line below.
|
||||
*
|
||||
*----------------------------------------------------------------------------*/
|
||||
#define WOLFSSL_TLS13
|
||||
|
||||
|
||||
/*-- Operating System related definitions --------------------------------------
|
||||
*
|
||||
* In case any real-time OS is used, define its name(e.g. FREERTOS).
|
||||
* Otherwise, define "SINGLE_THREADED". They are exclusive each other.
|
||||
*
|
||||
*----------------------------------------------------------------------------*/
|
||||
#define SINGLE_THREADED
|
||||
/*#define FREERTOS*/
|
||||
|
||||
|
||||
/*-- Cipher related definitions -----------------------------------------------
|
||||
*
|
||||
*
|
||||
*----------------------------------------------------------------------------*/
|
||||
|
||||
#define NO_DEV_RANDOM
|
||||
#define NO_MD4
|
||||
#define WOLFSSL_DH_CONST
|
||||
#define HAVE_TLS_EXTENSIONS
|
||||
|
||||
#define HAVE_AESGCM
|
||||
#define HAVE_AESCCM
|
||||
#define HAVE_AES_CBC
|
||||
#define WOLFSSL_SHA512
|
||||
|
||||
#define HAVE_SUPPORTED_CURVES
|
||||
#define HAVE_ECC
|
||||
#define HAVE_CURVE25519
|
||||
#define CURVE25519_SMALL
|
||||
#define HAVE_ED25519
|
||||
|
||||
#define WOLFSSL_STATIC_RSA
|
||||
|
||||
/* USE_ECC_CERT
|
||||
* This macro is for selecting root CA certificate to load, it is valid only
|
||||
* in example applications. wolfSSL does not refer this macro.
|
||||
* If you want to use cipher suites including ECDSA authentication in
|
||||
* the example applications with TSIP, enable this macro.
|
||||
* In TSIP 1.13 or later version, following cipher suites are
|
||||
* available:
|
||||
* - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
|
||||
* - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SAH256
|
||||
*
|
||||
* Note that, this macro disables cipher suites including RSA
|
||||
* authentication such as:
|
||||
* - TLS_RSA_WITH_AES_128_CBC_SHA
|
||||
* - TLS_RSA_WITH_AES_256_CBC_SHA
|
||||
* - TLS_RSA_WITH_AES_128_CBC_SHA256
|
||||
* - TLS_RSA_WITH_AES_256_CBC_SHA256
|
||||
* - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
|
||||
* - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA256
|
||||
*
|
||||
*/
|
||||
#define USE_ECC_CERT
|
||||
|
||||
/* In this example application, Root CA cert buffer named
|
||||
* "ca_ecc_cert_der_256" is used under the following macro definition
|
||||
* for ECDSA.
|
||||
*/
|
||||
#define USE_CERT_BUFFERS_256
|
||||
|
||||
/* In this example application, Root CA cert buffer named
|
||||
* "ca_cert_der_2048" is used under the following macro definition
|
||||
* for RSA authentication.
|
||||
*/
|
||||
#define USE_CERT_BUFFERS_2048
|
||||
|
||||
/*-- Misc definitions ---------------------------------------------------------
|
||||
*
|
||||
*
|
||||
*----------------------------------------------------------------------------*/
|
||||
#define SIZEOF_LONG_LONG 8
|
||||
|
||||
/*#define WOLFSSL_STATIC_MEMORY*/
|
||||
|
||||
#if defined(WOLFSSL_STATIC_MEMORY)
|
||||
#define USE_FAST_MATH
|
||||
#else
|
||||
#define WOLFSSL_SMALL_STACK
|
||||
#endif /* WOLFSSL_STATIC_MEMORY */
|
||||
|
||||
|
||||
|
||||
/*
|
||||
* -- "NO_ASN_TIME" macro is to avoid certificate expiration validation --
|
||||
*
|
||||
* Note. In your actual products, do not forget to comment-out
|
||||
* "NO_ASN_TIME" macro. And prepare time function to get calender time,
|
||||
* otherwise, certificate expiration validation will not work.
|
||||
*/
|
||||
/*#define NO_ASN_TIME*/
|
||||
|
||||
#define NO_MAIN_DRIVER
|
||||
#define BENCH_EMBEDDED
|
||||
#define NO_WOLFSSL_DIR
|
||||
#define WOLFSSL_NO_CURRDIR
|
||||
#define NO_FILESYSTEM
|
||||
#define WOLFSSL_LOG_PRINTF
|
||||
#define WOLFSSL_HAVE_MIN
|
||||
#define WOLFSSL_HAVE_MAX
|
||||
|
||||
#define NO_WRITEV
|
||||
#define WOLFSSL_USER_IO
|
||||
|
||||
#define WOLFSSL_USER_CURRTIME /* for benchmark */
|
||||
#define TIME_OVERRIDES
|
||||
#define XTIME time
|
||||
#define WOLFSSL_GMTIME
|
||||
#define XGMTIME(c,t) gmtime(c)
|
||||
#define USE_WOLF_SUSECONDS_T
|
||||
#define USE_WOLF_TIMEVAL_T
|
||||
|
||||
|
||||
#define WC_RSA_BLINDING
|
||||
#define TFM_TIMING_RESISTANT
|
||||
#define ECC_TIMING_RESISTANT
|
||||
|
||||
|
||||
/*-- Debugging options ------------------------------------------------------
|
||||
*
|
||||
* "DEBUG_WOLFSSL" definition enables log to output into stdout.
|
||||
* Note: wolfSSL_Debugging_ON() must be called just after wolfSSL_Init().
|
||||
*----------------------------------------------------------------------------*/
|
||||
|
||||
/*#define DEBUG_WOLFSSL*/
|
||||
|
||||
/*-- Definitions for functionality negation -----------------------------------
|
||||
*
|
||||
*
|
||||
*----------------------------------------------------------------------------*/
|
||||
|
||||
/*#define NO_RENESAS_TSIP_CRYPT*/
|
||||
/*#define NO_WOLFSSL_RENESAS_TSIP_TLS_SESSION*/
|
||||
|
||||
#if defined(WOLFCRYPT_ONLY)
|
||||
#undef WOLFSSL_RENESAS_TSIP
|
||||
#endif
|
||||
|
||||
/*-- Consistency checking between definitions ---------------------------------
|
||||
*
|
||||
*
|
||||
*----------------------------------------------------------------------------*/
|
||||
|
||||
/*-- TSIP TLS specific definitions --*/
|
||||
#if defined(WOLFSSL_RENESAS_TSIP)
|
||||
#if !defined(WOLFSSL_RENESAS_TSIP_VER)
|
||||
#error "WOLFSSL_RENESAS_TSIP_VER is required to be defined and have value"
|
||||
#endif
|
||||
#endif
|
||||
|
||||
/*-- Complementary definitions ------------------------------------------------
|
||||
*
|
||||
*
|
||||
*----------------------------------------------------------------------------*/
|
||||
|
||||
#if defined(WOLFSSL_RENESAS_TSIP)
|
||||
|
||||
#if !defined(NO_RENESAS_TSIP_CRYPT)
|
||||
#define WOLFSSL_RENESAS_TSIP_CRYPT
|
||||
#define WOLFSSL_RENESAS_TSIP_TLS
|
||||
#define WOLFSSL_RENESAS_TSIP_TLS_AES_CRYPT
|
||||
#define HAVE_PK_CALLBACKS
|
||||
#define WOLF_CRYPTO_CB
|
||||
#endif
|
||||
|
||||
#else
|
||||
#define OPENSSL_EXTRA
|
||||
#define WOLFSSL_GENSEED_FORTEST /* Warning: define your own seed gen */
|
||||
#endif
|
||||
|
||||
|
||||
/*-- TLS version and required definitions --*/
|
||||
#if defined(WOLFSSL_TLS13)
|
||||
#define HAVE_FFDHE_2048
|
||||
#define HAVE_HKDF
|
||||
#define WC_RSA_PSS
|
||||
#endif
|
||||
|
||||
|
||||
#define XSTRCASECMP(s1,s2) strcmp((s1),(s2))
|
||||
42
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/common/wolfssl_dummy.c
vendored
Normal file
42
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/common/wolfssl_dummy.c
vendored
Normal file
@@ -0,0 +1,42 @@
|
||||
/* wolfssl_dummy.c
|
||||
*
|
||||
* Copyright (C) 2006-2022 wolfSSL Inc.
|
||||
*
|
||||
* This file is part of wolfSSL.
|
||||
*
|
||||
* wolfSSL is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* wolfSSL is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
*/
|
||||
|
||||
#include <wolfssl/wolfcrypt/wc_port.h>
|
||||
|
||||
#define YEAR 2022
|
||||
#define MON 6
|
||||
|
||||
static int tick = 0;
|
||||
|
||||
time_t time(time_t *t)
|
||||
{
|
||||
(void)t;
|
||||
return ((YEAR-1970)*365+30*MON)*24*60*60 + tick++;
|
||||
}
|
||||
|
||||
#include <ctype.h>
|
||||
int strncasecmp(const char *s1, const char * s2, unsigned int sz)
|
||||
{
|
||||
for( ; sz>0; sz--)
|
||||
if(toupper(s1++) != toupper(s2++))
|
||||
return 1;
|
||||
return 0;
|
||||
}
|
||||
26
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/include.am
vendored
Normal file
26
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/include.am
vendored
Normal file
@@ -0,0 +1,26 @@
|
||||
# vim:ft=automake
|
||||
# included from Top Level Makefile.am
|
||||
# All paths should be given relative to the root
|
||||
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/README_EN.md
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/README_JP.md
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/wolfssl/.cproject
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/wolfssl/.project
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/wolfssl/wolfssl.rcpc
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/test/.cproject
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/test/.project
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/test/test_HardwareDebug.launch
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/test/test.rcpc
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/test/src/test_main.c
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/test/src/key_data.c
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/test/src/key_data.h
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/test/src/wolf_client.c
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/test/src/wolf_server.c
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/test/src/wolfssl_demo.h
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/common/wolfssl_dummy.c
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/common/strings.h
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/common/unistd.h
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/common/user_settings.h
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/smc/.cproject
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/smc/.project
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/GR-ROSE/smc/smc.scfg
|
||||
976
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/smc/smc.scfg
vendored
Normal file
976
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/smc/smc.scfg
vendored
Normal file
@@ -0,0 +1,976 @@
|
||||
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
|
||||
<smc>
|
||||
<general version="2.0.0.0">
|
||||
<configuration active="true" id="com.renesas.smc.toolchain.rxc.configuration.release">
|
||||
<property id="com.renesas.smc.service.project.buildArtefactType" values="com.renesas.smc.service.project.buildArtefactType.exe"/>
|
||||
<toolchain id="com.renesas.smc.toolchain.rxc.toolchain.rxc">
|
||||
<option id="com.renesas.smc.toolchain.option.buildArtefactType" key="com.renesas.smc.toolchain.option.buildArtefactType.exe"/>
|
||||
<option id="com.renesas.smc.toolchain.option.rtos" key="com.renesas.smc.toolchain.option.rtos.none"/>
|
||||
</toolchain>
|
||||
</configuration>
|
||||
<platform id="R5F565NEHxFP"/>
|
||||
<option id="board" value="gr-rose (v1.01)"/>
|
||||
</general>
|
||||
<tool id="Clock">
|
||||
<option enabled="true" id="vccinput" selection="textinputitem">
|
||||
<item enabled="true" id="textinputitem" input="3.3" value="3.300"/>
|
||||
</option>
|
||||
<option enabled="true" id="mainclockenable" selection="check">
|
||||
<item enabled="true" id="check"/>
|
||||
<item enabled="true" id="uncheck"/>
|
||||
</option>
|
||||
<option enabled="true" id="mainsourcebox" selection="srcEOI">
|
||||
<item enabled="true" id="srcR"/>
|
||||
<item enabled="true" id="srcEOI"/>
|
||||
</option>
|
||||
<option enabled="true" id="mainfrequency" selection="textinputitem">
|
||||
<item enabled="true" id="textinputitem" input="12" value="12.000000"/>
|
||||
</option>
|
||||
<option enabled="false" id="mainwaittime" selection="textinputitem">
|
||||
<item enabled="true" id="textinputitem" input="9980" value="9980.000000"/>
|
||||
</option>
|
||||
<option enabled="true" id="subclockenable" selection="uncheck">
|
||||
<item enabled="true" id="check"/>
|
||||
<item enabled="true" id="uncheck"/>
|
||||
</option>
|
||||
<option enabled="false" id="subfrequency" selection="textinputitem">
|
||||
<item enabled="true" id="textinputitem" input="" value="32.768"/>
|
||||
</option>
|
||||
<option enabled="false" id="subdrivecap" selection="standardCL">
|
||||
<item enabled="true" id="standardCL"/>
|
||||
<item enabled="true" id="lowCL"/>
|
||||
</option>
|
||||
<option enabled="false" id="subwaittime" selection="textinputitem">
|
||||
<item enabled="true" id="textinputitem" input="2000" value="2000.000000"/>
|
||||
</option>
|
||||
<option enabled="true" id="hococlockenable" selection="uncheck">
|
||||
<item enabled="true" id="check"/>
|
||||
<item enabled="true" id="uncheck"/>
|
||||
</option>
|
||||
<option enabled="false" id="hocooscenable" selection="uncheck">
|
||||
<item enabled="true" id="check"/>
|
||||
<item enabled="true" id="uncheck"/>
|
||||
</option>
|
||||
<option enabled="false" id="hocofrequency" selection="frq16">
|
||||
<item enabled="true" id="frq16"/>
|
||||
<item enabled="true" id="frq18"/>
|
||||
<item enabled="true" id="frq20"/>
|
||||
</option>
|
||||
<option enabled="true" id="lococlockenable" selection="uncheck">
|
||||
<item enabled="true" id="check"/>
|
||||
<item enabled="true" id="uncheck"/>
|
||||
</option>
|
||||
<option enabled="false" id="locofrequency" selection="textinputitem">
|
||||
<item enabled="true" id="textinputitem" input="" value="240"/>
|
||||
</option>
|
||||
<option enabled="true" id="iwdtclockenable" selection="uncheck">
|
||||
<item enabled="true" id="check"/>
|
||||
<item enabled="true" id="uncheck"/>
|
||||
</option>
|
||||
<option enabled="false" id="iwdtfrequency" selection="textinputitem">
|
||||
<item enabled="true" id="textinputitem" input="" value="120"/>
|
||||
</option>
|
||||
<option enabled="true" id="pllswitcher" selection="pllmain">
|
||||
<item enabled="true" id="pllmain" input="" value="12.0"/>
|
||||
<item enabled="false" id="pllhoco" input="" value="16"/>
|
||||
</option>
|
||||
<option enabled="true" id="plldivider" selection="div1-1">
|
||||
<item enabled="true" id="div1-1"/>
|
||||
<item enabled="false" id="div1-2"/>
|
||||
<item enabled="false" id="div1-3"/>
|
||||
</option>
|
||||
<option enabled="true" id="pllmul" selection="mul10-1">
|
||||
<item enabled="true" id="mul10-1"/>
|
||||
<item enabled="true" id="mul10_5-1"/>
|
||||
<item enabled="true" id="mul11-1"/>
|
||||
<item enabled="true" id="mul11_5-1"/>
|
||||
<item enabled="true" id="mul12-1"/>
|
||||
<item enabled="true" id="mul12_5-1"/>
|
||||
<item enabled="true" id="mul13-1"/>
|
||||
<item enabled="true" id="mul13_5-1"/>
|
||||
<item enabled="true" id="mul14-1"/>
|
||||
<item enabled="true" id="mul14_5-1"/>
|
||||
<item enabled="true" id="mul15-1"/>
|
||||
<item enabled="true" id="mul15_5-1"/>
|
||||
<item enabled="true" id="mul16-1"/>
|
||||
<item enabled="true" id="mul16_5-1"/>
|
||||
<item enabled="true" id="mul17-1"/>
|
||||
<item enabled="true" id="mul17_5-1"/>
|
||||
<item enabled="true" id="mul18-1"/>
|
||||
<item enabled="true" id="mul18_5-1"/>
|
||||
<item enabled="true" id="mul19-1"/>
|
||||
<item enabled="true" id="mul19_5-1"/>
|
||||
<item enabled="true" id="mul20-1"/>
|
||||
<item enabled="false" id="mul20_5-1"/>
|
||||
<item enabled="false" id="mul21-1"/>
|
||||
<item enabled="false" id="mul21_5-1"/>
|
||||
<item enabled="false" id="mul22-1"/>
|
||||
<item enabled="false" id="mul22_5-1"/>
|
||||
<item enabled="false" id="mul23-1"/>
|
||||
<item enabled="false" id="mul23_5-1"/>
|
||||
<item enabled="false" id="mul24-1"/>
|
||||
<item enabled="false" id="mul24_5-1"/>
|
||||
<item enabled="false" id="mul25-1"/>
|
||||
<item enabled="false" id="mul25_5-1"/>
|
||||
<item enabled="false" id="mul26-1"/>
|
||||
<item enabled="false" id="mul26_5-1"/>
|
||||
<item enabled="false" id="mul27-1"/>
|
||||
<item enabled="false" id="mul27_5-1"/>
|
||||
<item enabled="false" id="mul28-1"/>
|
||||
<item enabled="false" id="mul28_5-1"/>
|
||||
<item enabled="false" id="mul29-1"/>
|
||||
<item enabled="false" id="mul29_5-1"/>
|
||||
<item enabled="false" id="mul30-1"/>
|
||||
</option>
|
||||
<option enabled="true" id="sckswitcher" selection="pll">
|
||||
<item enabled="true" id="pll" input="" value="1.2E8"/>
|
||||
<item enabled="true" id="main" input="" value="1.2E7"/>
|
||||
<item enabled="false" id="sub" input="" value="32768.0"/>
|
||||
<item enabled="false" id="hoco" input="" value="16000000"/>
|
||||
<item enabled="false" id="loco" input="" value="240000"/>
|
||||
</option>
|
||||
<option enabled="true" id="fclkdivider" selection="comboBox1-4">
|
||||
<item enabled="false" id="comboBox1-1"/>
|
||||
<item enabled="true" id="comboBox1-2"/>
|
||||
<item enabled="true" id="comboBox1-4"/>
|
||||
<item enabled="true" id="comboBox1-8"/>
|
||||
<item enabled="true" id="comboBox1-16"/>
|
||||
<item enabled="true" id="comboBox1-32"/>
|
||||
<item enabled="true" id="comboBox1-64"/>
|
||||
</option>
|
||||
<option enabled="true" id="iclkdivider" selection="comboBox1-1">
|
||||
<item enabled="true" id="comboBox1-1"/>
|
||||
<item enabled="true" id="comboBox1-2"/>
|
||||
<item enabled="true" id="comboBox1-4"/>
|
||||
<item enabled="true" id="comboBox1-8"/>
|
||||
<item enabled="true" id="comboBox1-16"/>
|
||||
<item enabled="true" id="comboBox1-32"/>
|
||||
<item enabled="true" id="comboBox1-64"/>
|
||||
</option>
|
||||
<option enabled="true" id="pclkadivider" selection="comboBox1-2">
|
||||
<item enabled="true" id="comboBox1-1"/>
|
||||
<item enabled="true" id="comboBox1-2"/>
|
||||
<item enabled="true" id="comboBox1-4"/>
|
||||
<item enabled="true" id="comboBox1-8"/>
|
||||
<item enabled="true" id="comboBox1-16"/>
|
||||
<item enabled="true" id="comboBox1-32"/>
|
||||
<item enabled="true" id="comboBox1-64"/>
|
||||
</option>
|
||||
<option enabled="true" id="pclkbdivider" selection="comboBox1-4">
|
||||
<item enabled="false" id="comboBox1-1"/>
|
||||
<item enabled="true" id="comboBox1-2"/>
|
||||
<item enabled="true" id="comboBox1-4"/>
|
||||
<item enabled="true" id="comboBox1-8"/>
|
||||
<item enabled="true" id="comboBox1-16"/>
|
||||
<item enabled="true" id="comboBox1-32"/>
|
||||
<item enabled="true" id="comboBox1-64"/>
|
||||
</option>
|
||||
<option enabled="true" id="pclkcdivider" selection="comboBox1-4">
|
||||
<item enabled="false" id="comboBox1-1"/>
|
||||
<item enabled="false" id="comboBox1-2"/>
|
||||
<item enabled="true" id="comboBox1-4"/>
|
||||
<item enabled="true" id="comboBox1-8"/>
|
||||
<item enabled="true" id="comboBox1-16"/>
|
||||
<item enabled="true" id="comboBox1-32"/>
|
||||
<item enabled="false" id="comboBox1-64"/>
|
||||
</option>
|
||||
<option enabled="true" id="pclkddivider" selection="comboBox1-4">
|
||||
<item enabled="false" id="comboBox1-1"/>
|
||||
<item enabled="false" id="comboBox1-2"/>
|
||||
<item enabled="true" id="comboBox1-4"/>
|
||||
<item enabled="true" id="comboBox1-8"/>
|
||||
<item enabled="true" id="comboBox1-16"/>
|
||||
<item enabled="true" id="comboBox1-32"/>
|
||||
<item enabled="false" id="comboBox1-64"/>
|
||||
</option>
|
||||
<option enabled="true" id="bckdivider" selection="comboBox1-2">
|
||||
<item enabled="true" id="comboBox1-1"/>
|
||||
<item enabled="true" id="comboBox1-2"/>
|
||||
<item enabled="true" id="comboBox1-4"/>
|
||||
<item enabled="true" id="comboBox1-8"/>
|
||||
<item enabled="true" id="comboBox1-16"/>
|
||||
<item enabled="true" id="comboBox1-32"/>
|
||||
<item enabled="true" id="comboBox1-64"/>
|
||||
</option>
|
||||
<option enabled="true" id="bckselectorenable" selection="uncheck">
|
||||
<item enabled="true" id="check"/>
|
||||
<item enabled="true" id="uncheck"/>
|
||||
</option>
|
||||
<option enabled="false" id="bckselector" selection="comboBox1-2">
|
||||
<item enabled="true" id="comboBox1-1"/>
|
||||
<item enabled="true" id="comboBox1-2"/>
|
||||
</option>
|
||||
<option enabled="true" id="uckenable" selection="uncheck">
|
||||
<item enabled="true" id="check"/>
|
||||
<item enabled="true" id="uncheck"/>
|
||||
</option>
|
||||
<option enabled="false" id="uckdivider" selection="comboBox1-5">
|
||||
<item enabled="false" id="comboBox1-2"/>
|
||||
<item enabled="true" id="comboBox1-3"/>
|
||||
<item enabled="true" id="comboBox1-4"/>
|
||||
<item enabled="true" id="comboBox1-5"/>
|
||||
</option>
|
||||
<option enabled="true" id="fclk" selection="textoutputitem">
|
||||
<item enabled="true" id="textoutputitem" input="" value="30.0"/>
|
||||
</option>
|
||||
<option enabled="true" id="iclk" selection="textoutputitem">
|
||||
<item enabled="true" id="textoutputitem" input="" value="120.0"/>
|
||||
</option>
|
||||
<option enabled="true" id="pclka" selection="textoutputitem">
|
||||
<item enabled="true" id="textoutputitem" input="" value="60.0"/>
|
||||
</option>
|
||||
<option enabled="true" id="pclkb" selection="textoutputitem">
|
||||
<item enabled="true" id="textoutputitem" input="" value="30.0"/>
|
||||
</option>
|
||||
<option enabled="true" id="pclkc" selection="textoutputitem">
|
||||
<item enabled="true" id="textoutputitem" input="" value="30.0"/>
|
||||
</option>
|
||||
<option enabled="true" id="pclkd" selection="textoutputitem">
|
||||
<item enabled="true" id="textoutputitem" input="" value="30.0"/>
|
||||
</option>
|
||||
<option enabled="true" id="bck" selection="textoutputitem">
|
||||
<item enabled="true" id="textoutputitem" input="" value="60.0"/>
|
||||
</option>
|
||||
<option enabled="false" id="bckpin" selection="textoutputitem">
|
||||
<item enabled="true" id="textoutputitem" input="" value="30.0"/>
|
||||
</option>
|
||||
<option enabled="false" id="uclk" selection="textoutputitem">
|
||||
<item enabled="false" id="textoutputitem" input="" value="24.0"/>
|
||||
</option>
|
||||
<option enabled="false" id="caclclk" selection="textoutputitem">
|
||||
<item enabled="true" id="textoutputitem" input="" value="240"/>
|
||||
</option>
|
||||
<option enabled="false" id="cachclk" selection="textoutputitem">
|
||||
<item enabled="true" id="textoutputitem" input="" value="16"/>
|
||||
</option>
|
||||
<option enabled="false" id="cacsclk" selection="textoutputitem">
|
||||
<item enabled="true" id="textoutputitem" input="" value="32.768"/>
|
||||
</option>
|
||||
<option enabled="false" id="rtcsclkenable" selection="uncheck">
|
||||
<item enabled="true" id="check"/>
|
||||
<item enabled="true" id="uncheck"/>
|
||||
</option>
|
||||
<option enabled="false" id="rtcsclk" selection="textoutputitem">
|
||||
<item enabled="true" id="textoutputitem" input="" value="32.768"/>
|
||||
</option>
|
||||
<option enabled="false" id="cacilclk" selection="textoutputitem">
|
||||
<item enabled="true" id="textoutputitem" input="" value="120"/>
|
||||
</option>
|
||||
<option enabled="true" id="cacmclk" selection="textoutputitem">
|
||||
<item enabled="true" id="textoutputitem" input="" value="12.0"/>
|
||||
</option>
|
||||
</tool>
|
||||
<tool id="Interrupt">
|
||||
<Item currentVect="16" id="BSC_BUSERR" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="18" id="RAM_RAMERR" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="21" id="FCU_FIFERR" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="23" id="FCU_FRDYI" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="26" id="ICU_SWINT2" priority="1" usedState="Used"/>
|
||||
<Item currentVect="27" id="ICU_SWINT" priority="1" usedState="Used"/>
|
||||
<Item currentVect="28" id="CMT0_CMI0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="29" id="CMT1_CMI1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="30" id="CMTW0_CMWI0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="31" id="CMTW1_CMWI1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="34" id="USB0_D0FIFO0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="35" id="USB0_D1FIFO0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="38" id="RSPI0_SPRI0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="39" id="RSPI0_SPTI0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="40" id="RSPI1_SPRI1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="41" id="RSPI1_SPTI1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="42" id="QSPI_SPRI" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="43" id="QSPI_SPTI" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="44" id="SDHI_SBFAI" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="45" id="MMCIF_MBFAI" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="50" id="RIIC1_RXI1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="51" id="RIIC1_TXI1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="52" id="RIIC0_RXI0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="53" id="RIIC0_TXI0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="54" id="RIIC2_RXI2" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="55" id="RIIC2_TXI2" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="58" id="SCI0_RXI0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="59" id="SCI0_TXI0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="60" id="SCI1_RXI1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="61" id="SCI1_TXI1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="62" id="SCI2_RXI2" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="63" id="SCI2_TXI2" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="64" id="ICU_IRQ0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="65" id="ICU_IRQ1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="66" id="ICU_IRQ2" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="67" id="ICU_IRQ3" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="68" id="ICU_IRQ4" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="69" id="ICU_IRQ5" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="70" id="ICU_IRQ6" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="71" id="ICU_IRQ7" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="72" id="ICU_IRQ8" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="73" id="ICU_IRQ9" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="74" id="ICU_IRQ10" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="75" id="ICU_IRQ11" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="76" id="ICU_IRQ12" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="77" id="ICU_IRQ13" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="78" id="ICU_IRQ14" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="79" id="ICU_IRQ15" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="80" id="SCI3_RXI3" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="81" id="SCI3_TXI3" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="82" id="SCI4_RXI4" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="83" id="SCI4_TXI4" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="84" id="SCI5_RXI5" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="85" id="SCI5_TXI5" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="86" id="SCI6_RXI6" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="87" id="SCI6_TXI6" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="88" id="LVD1_LVD1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="89" id="LVD2_LVD2" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="90" id="USB0_USBR0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="92" id="RTC_ALM" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="93" id="RTC_PRD" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="95" id="IWDT_IWUNI" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="96" id="WDT_WUNI" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="97" id="PDC_PCDFI" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="98" id="SCI7_RXI7" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="99" id="SCI7_TXI7" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="100" id="SCI8_RXI8" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="101" id="SCI8_TXI8" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="102" id="SCI9_RXI9" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="103" id="SCI9_TXI9" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="104" id="SCI10_RXI10" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="105" id="SCI10_TXI10" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="106" groupchild="<br>1-ERS0<br>2-ERS1" id="BE0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="107" groupchild="<br>1-SDIOI" id="BL2" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="108" id="RSPI2_SPRI2" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="109" id="RSPI2_SPTI2" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="110" groupchild="<br>1-TEI0<br>2-ERI0<br>3-TEI1<br>4-ERI1<br>5-TEI2<br>6-ERI2<br>7-TEI3<br>8-ERI3<br>9-TEI4<br>10-ERI4<br>11-TEI5<br>12-ERI5<br>13-TEI6<br>14-ERI6<br>15-TEI7<br>16-ERI7<br>17-TEI12<br>18-ERI12<br>19-SCIX0<br>20-SCIX1<br>21-SCIX2<br>22-SCIX3<br>23-QSPSSLI<br>24-FERRI<br>25-MENDI<br>26-OVFI<br>27-DOPCI<br>28-PCFEI<br>29-PCERI" id="BL0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="111" groupchild="<br>1-CDETI<br>2-CACI<br>3-SDACI<br>4-CDETIO<br>5-ERRIO<br>6-ACCIO<br>7-OEI1<br>8-OEI2<br>9-OEI3<br>10-OEI4<br>11-TEI0<br>12-EEI0<br>13-TEI2<br>14-EEI2<br>15-S12CMPAI<br>16-S12CMPBI<br>17-S12CMPAI1<br>18-S12CMPBI1<br>19-TEI8<br>20-ERI8<br>21-TEI9<br>22-ERI9<br>23-TEI1<br>24-EEI1" id="BL1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="112" groupchild="<br>1-TEI10<br>2-ERI10<br>3-TEI11<br>4-ERI11<br>5-SPII0<br>6-SPEI0<br>7-SPII1<br>8-SPEI1<br>9-SPII2<br>10-SPEI2" id="AL0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="113" groupchild="<br>1-EINT0<br>2-VPOS<br>3-GR1UF<br>4-GR2UF<br>5-DRW_IRQ" id="AL1" priority="2" usedState="Used"/>
|
||||
<Item currentVect="114" id="SCI11_RXI11" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="115" id="SCI11_TXI11" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="116" id="SCI12_RXI12" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="117" id="SCI12_TXI12" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="120" id="DMAC_DMAC0I" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="121" id="DMAC_DMAC1I" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="122" id="DMAC_DMAC2I" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="123" id="DMAC_DMAC3I" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="124" id="DMAC_DMAC74I" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="125" id="OST_OSTDI" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="126" id="EXDMAC_EXDMAC0I" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="127" id="EXDMAC_EXDMAC1I" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="128" defaultVect="128" id="CMT2_CMI2" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="129" defaultVect="129" id="CMT3_CMI3" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="130" defaultVect="130" id="TPU0_TGI0A" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="131" defaultVect="131" id="TPU0_TGI0B" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="132" defaultVect="132" id="TPU0_TGI0C" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="133" defaultVect="133" id="TPU0_TGI0D" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="134" defaultVect="134" id="TPU0_TCI0V" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="135" defaultVect="135" id="TPU1_TGI1B" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="136" defaultVect="136" id="TPU1_TCI1V" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="137" defaultVect="137" id="TPU1_TCI1U" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="138" defaultVect="138" id="TPU2_TGI2A" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="139" defaultVect="139" id="TPU2_TGI2B" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="140" defaultVect="140" id="TPU2_TCI2V" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="141" defaultVect="141" id="TPU2_TCI2U" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="142" defaultVect="142" id="TPU3_TGI3A" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="143" defaultVect="143" id="TPU3_TGI3B" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="144" defaultVect="144" id="TPU1_TGI1A" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="145" defaultVect="145" id="TPU3_TGI3C" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="146" defaultVect="146" id="TMR0_CMIA0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="147" defaultVect="147" id="TMR0_CMIB0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="148" defaultVect="148" id="TMR0_OVI0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="149" defaultVect="149" id="TMR1_CMIA1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="150" defaultVect="150" id="TMR1_CMIB1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="151" defaultVect="151" id="TMR1_OVI1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="152" defaultVect="152" id="TMR2_CMIA2" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="153" defaultVect="153" id="TMR2_CMIB2" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="154" defaultVect="154" id="TMR2_OVI2" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="155" defaultVect="155" id="TMR3_CMIA3" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="156" defaultVect="156" id="TMR3_CMIB3" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="157" defaultVect="157" id="TMR3_OVI3" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="158" defaultVect="158" id="TPU3_TGI3D" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="159" defaultVect="159" id="TPU3_TCI3V" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="160" defaultVect="160" id="TPU4_TGI4A" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="161" defaultVect="161" id="TPU4_TGI4B" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="162" defaultVect="162" id="TPU4_TCI4V" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="163" defaultVect="163" id="TPU4_TCI4U" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="164" defaultVect="164" id="TPU5_TGI5A" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="165" defaultVect="165" id="TPU5_TGI5B" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="166" defaultVect="166" id="TPU5_TCI5V" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="167" defaultVect="167" id="TPU5_TCI5U" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="168" defaultVect="168" id="CMTW0_IC0I0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="169" defaultVect="169" id="CMTW0_IC1I0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="170" defaultVect="170" id="CMTW0_OC0I0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="171" defaultVect="171" id="CMTW0_OC1I0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="172" defaultVect="172" id="CMTW1_IC0I1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="173" defaultVect="173" id="CMTW1_IC1I1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="174" defaultVect="174" id="CMTW1_OC0I1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="175" defaultVect="175" id="CMTW1_OC1I1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="176" defaultVect="176" id="RTC_CUP" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="177" defaultVect="177" id="CAN0_RXF0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="178" defaultVect="178" id="CAN0_TXF0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="179" defaultVect="179" id="CAN0_RXM0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="180" defaultVect="180" id="CAN0_TXM0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="181" defaultVect="181" id="CAN1_RXF1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="182" defaultVect="182" id="CAN1_TXF1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="183" defaultVect="183" id="CAN1_RXM1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="184" defaultVect="184" id="CAN1_TXM1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="185" defaultVect="185" id="USB0_USBI0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="186" defaultVect="186" id="S12AD_S12ADI" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="187" defaultVect="187" id="S12AD_S12GBADI" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="188" defaultVect="188" id="S12AD_S12GCADI" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="189" defaultVect="189" id="S12AD1_S12ADI1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="190" defaultVect="190" id="S12AD1_S12GBADI1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="191" defaultVect="191" id="S12AD1_S12GCADI1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="192" defaultVect="192" id="RNG_RNGEND" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="193" defaultVect="193" id="ELC_ELSR18I" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="194" defaultVect="194" id="ELC_ELSR19I" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="195" defaultVect="195" id="TSIP_PROC_BUSY" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="196" defaultVect="196" id="TSIP_ROMOK" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="197" defaultVect="197" id="TSIP_LONG_PLG" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="198" defaultVect="198" id="TSIP_TEST_BUSY" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="199" defaultVect="199" id="TSIP_WRRDY0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="200" defaultVect="200" id="TSIP_WRRDY1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="201" defaultVect="201" id="TSIP_WRRDY4" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="202" defaultVect="202" id="TSIP_RDRDY0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="203" defaultVect="203" id="TSIP_RDRDY1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="204" defaultVect="204" id="TSIP_INTEGRATE_WRRDY" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="205" defaultVect="205" id="TSIP_INTEGRATE_RDRDY" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="206" id="PERIB_INTB206" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="207" id="PERIB_INTB207" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="208" defaultVect="208" id="MTU1_TGIA1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="209" defaultVect="209" id="MTU0_TGIA0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="210" defaultVect="210" id="MTU0_TGIB0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="211" defaultVect="211" id="MTU0_TGIC0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="212" defaultVect="212" id="MTU0_TGID0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="213" defaultVect="213" id="MTU0_TCIV0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="214" defaultVect="214" id="MTU0_TGIE0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="215" defaultVect="215" id="MTU0_TGIF0" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="216" defaultVect="216" id="MTU1_TGIB1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="217" defaultVect="217" id="MTU1_TCIV1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="218" defaultVect="218" id="MTU1_TCIU1" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="219" defaultVect="219" id="MTU2_TGIA2" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="220" defaultVect="220" id="MTU2_TGIB2" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="221" defaultVect="221" id="MTU2_TCIV2" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="222" defaultVect="222" id="MTU2_TCIU2" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="223" defaultVect="223" id="MTU3_TGIA3" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="224" defaultVect="224" id="MTU3_TGIB3" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="225" defaultVect="225" id="MTU3_TGIC3" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="226" defaultVect="226" id="MTU3_TGID3" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="227" defaultVect="227" id="MTU3_TCIV3" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="228" defaultVect="228" id="MTU4_TGIA4" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="229" defaultVect="229" id="MTU4_TGIB4" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="230" defaultVect="230" id="MTU4_TGIC4" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="231" defaultVect="231" id="MTU4_TGID4" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="232" defaultVect="232" id="MTU4_TCIV4" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="233" defaultVect="233" id="MTU5_TGIU5" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="234" defaultVect="234" id="MTU5_TGIV5" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="235" defaultVect="235" id="MTU5_TGIW5" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="236" defaultVect="236" id="MTU6_TGIA6" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="237" defaultVect="237" id="MTU6_TGIB6" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="238" defaultVect="238" id="MTU6_TGIC6" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="239" defaultVect="239" id="MTU6_TGID6" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="240" defaultVect="240" id="MTU6_TCIV6" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="241" defaultVect="241" id="MTU7_TGIA7" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="242" defaultVect="242" id="MTU7_TGIB7" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="243" defaultVect="243" id="MTU7_TGIC7" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="244" defaultVect="244" id="MTU7_TGID7" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="245" defaultVect="245" id="MTU7_TCIV7" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="246" defaultVect="246" id="MTU8_TGIA8" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="247" defaultVect="247" id="MTU8_TGIB8" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="248" defaultVect="248" id="MTU8_TGIC8" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="249" defaultVect="249" id="MTU8_TGID8" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="250" defaultVect="250" id="MTU8_TCIV8" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="251" defaultVect="251" id="AES_AESRDY" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="252" defaultVect="252" id="AES_AESEND" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="253" id="PERIA_INTA253" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="254" id="PERIA_INTA254" priority="15" usedState="Not Use"/>
|
||||
<Item currentVect="255" id="PERIA_INTA255" priority="15" usedState="Not Use"/>
|
||||
</tool>
|
||||
<tool id="Pins" version="1.0.1.0">
|
||||
<pinItem allocation="11" comments="" direction="None" id="XTAL" isUsedBySoftware="true" locked="false" status="0"/>
|
||||
<pinItem allocation="59" comments="" direction="None" id="RMII0_RXD0" isUsedBySoftware="true" locked="false" status="65280"/>
|
||||
<pinItem allocation="61" comments="" direction="None" id="RMII0_RXD1" isUsedBySoftware="true" locked="false" status="65280"/>
|
||||
<pinItem allocation="54" comments="" direction="None" id="RMII0_TXD1" isUsedBySoftware="true" locked="false" status="65280"/>
|
||||
<pinItem allocation="55" comments="" direction="None" id="RMII0_TXD0" isUsedBySoftware="true" locked="false" status="65280"/>
|
||||
<pinItem allocation="58" comments="" direction="None" id="REF50CK0" isUsedBySoftware="true" locked="false" status="65280"/>
|
||||
<pinItem allocation="66" comments="" direction="None" id="ET0_MDC" isUsedBySoftware="true" locked="false" status="0"/>
|
||||
<pinItem allocation="13" comments="" direction="None" id="EXTAL" isUsedBySoftware="true" locked="false" status="0"/>
|
||||
<pinItem allocation="65" comments="" direction="None" id="ET0_LINKSTA" isUsedBySoftware="true" locked="false" status="0"/>
|
||||
<pinItem allocation="57" comments="" direction="None" id="RMII0_RX_ER" isUsedBySoftware="true" locked="false" status="65280"/>
|
||||
<pinItem allocation="56" comments="" direction="None" id="RMII0_TXD_EN" isUsedBySoftware="true" locked="false" status="65280"/>
|
||||
<pinItem allocation="67" comments="" direction="None" id="ET0_MDIO" isUsedBySoftware="true" locked="false" status="0"/>
|
||||
<pinItem allocation="53" comments="" direction="None" id="RMII0_CRS_DV" isUsedBySoftware="true" locked="false" status="65280"/>
|
||||
<pinnumItem comment="SW2 Reset Switch" id="10"/>
|
||||
<pinnumItem comment="CN10 Serial Servo" id="16"/>
|
||||
<pinnumItem comment="CN10 Serial Servo" id="17"/>
|
||||
<pinnumItem comment="CN10 Serial Servo" id="18"/>
|
||||
<pinnumItem comment="U5 WiFi Module" id="19"/>
|
||||
<pinnumItem comment="N.C." id="4"/>
|
||||
<pinnumItem comment="SW1 Operation Mode Switch" id="7"/>
|
||||
<pinnumItem comment="CN4 PMOD" id="20"/>
|
||||
<pinnumItem comment="U5 WiFi Module" id="21"/>
|
||||
<pinnumItem comment="CN4 PMOD" id="22"/>
|
||||
<pinnumItem comment="U5 WiFi Module" id="23"/>
|
||||
<pinnumItem comment="U5 WiFi Module" id="24"/>
|
||||
<pinnumItem comment="U5 WiFi Module" id="25"/>
|
||||
<pinnumItem comment="CN7 Serial Servo" id="26"/>
|
||||
<pinnumItem comment="CN7 Serial Servo" id="27"/>
|
||||
<pinnumItem comment="CN7 Serial Servo" id="28"/>
|
||||
<pinnumItem comment="U5 WiFi Module" id="29"/>
|
||||
<pinnumItem comment="CN5 USB" id="30"/>
|
||||
<pinnumItem comment="CN8 Serial Servo" id="32"/>
|
||||
<pinnumItem comment="CN8 Serial Servo" id="33"/>
|
||||
<pinnumItem comment="CN8 Serial Servo" id="34"/>
|
||||
<pinnumItem comment="CN5 USB" id="36"/>
|
||||
<pinnumItem comment="CN5 USB" id="37"/>
|
||||
<pinnumItem comment="CN4 PMOD" id="42"/>
|
||||
<pinnumItem comment="CN4 PMOD" id="44"/>
|
||||
<pinnumItem comment="CN11 Serial Servo I/F" id="45"/>
|
||||
<pinnumItem comment="CN11 Serial Servo I/F" id="46"/>
|
||||
<pinnumItem comment="CN11 Serial Servo I/F" id="47"/>
|
||||
<pinnumItem comment="CN9 Serial Servo" id="48"/>
|
||||
<pinnumItem comment="CN9 Serial Servo" id="49"/>
|
||||
<pinnumItem comment="CN9 Serial Servo" id="50"/>
|
||||
<pinnumItem comment="CN6 Ether" id="53"/>
|
||||
<pinnumItem comment="CN6 Ether" id="54"/>
|
||||
<pinnumItem comment="CN6 Ether" id="55"/>
|
||||
<pinnumItem comment="CN6 Ether" id="56"/>
|
||||
<pinnumItem comment="CN6 Ether" id="57"/>
|
||||
<pinnumItem comment="CN6 Ether" id="58"/>
|
||||
<pinnumItem comment="CN6 Ether" id="59"/>
|
||||
<pinnumItem comment="CN6 Ether" id="61"/>
|
||||
<pinnumItem comment="CN6 Ether" id="64"/>
|
||||
<pinnumItem comment="CN6 Ether" id="65"/>
|
||||
<pinnumItem comment="CN6 Ether" id="66"/>
|
||||
<pinnumItem comment="CN6 Ether" id="67"/>
|
||||
<pinnumItem comment="LED2" id="69"/>
|
||||
<pinnumItem comment="LED1" id="70"/>
|
||||
<pinnumItem comment="CN4 PMOD" id="71"/>
|
||||
<pinnumItem comment="CN4 PMOD" id="72"/>
|
||||
<pinnumItem comment="CN4 PMOD" id="73"/>
|
||||
<pinnumItem comment="CN4 PMOD" id="74"/>
|
||||
<pinnumItem comment="CN12C ADC" id="79"/>
|
||||
<pinnumItem comment="CN13 DAC" id="100"/>
|
||||
<pinnumItem comment="CN12C ADC" id="80"/>
|
||||
<pinnumItem comment="CN12C ADC" id="81"/>
|
||||
<pinnumItem comment="CN12C ADC" id="82"/>
|
||||
<pinnumItem comment="CN12C ADC" id="83"/>
|
||||
<pinnumItem comment="CN12C ADC" id="84"/>
|
||||
</tool>
|
||||
<tool id="Summary" version="1.0.0.0">
|
||||
<option id="com.renesas.smc.code.path" value="src\smc_gen"/>
|
||||
<option id="com.renesas.smc.code.type" value="Normal Folder"/>
|
||||
</tool>
|
||||
<tool id="SWComponent" version="1.0.0.0">
|
||||
<configuration id="60957c51-a5e9-46fc-b2c8-a6141e24332c" inuse="true" name="Config_TMR0">
|
||||
<allocatable id="TMR0">
|
||||
<isocket id="CountingClock" selection="Clock.tool_clock_pclkb" value="3.0E7"/>
|
||||
<option enabled="true" id="CountMode" selection="8bitMode">
|
||||
<item id="8bitMode" input="" vlaue="0"/>
|
||||
<item id="16bitMode" input="" vlaue="0"/>
|
||||
</option>
|
||||
<option enabled="true" id="ClockSourceOption" selection="PCLK">
|
||||
<item id="PCLK" input="" vlaue="0"/>
|
||||
<item id="PCLK2" input="" vlaue="0"/>
|
||||
<item id="PCLK8" input="" vlaue="0"/>
|
||||
<item id="PCLK32" input="" vlaue="0"/>
|
||||
<item id="PCLK64" input="" vlaue="0"/>
|
||||
<item id="PCLK1024" input="" vlaue="0"/>
|
||||
<item id="PCLK8192" input="" vlaue="0"/>
|
||||
<item id="ExternalClockRising" input="" vlaue="0"/>
|
||||
<item id="ExternalClockFalling" input="" vlaue="0"/>
|
||||
<item id="ExternalClockBoth" input="" vlaue="0"/>
|
||||
</option>
|
||||
<option enabled="true" id="CounterClearOption" selection="Disabled">
|
||||
<item id="Disabled" input="" vlaue="0"/>
|
||||
<item id="ClearedMatchA" input="" vlaue="0"/>
|
||||
<item id="ClearedMatchB" input="" vlaue="0"/>
|
||||
<item id="ClearedRisingReset" input="" vlaue="0"/>
|
||||
<item id="ClearedResetHigh" input="" vlaue="0"/>
|
||||
</option>
|
||||
<option enabled="true" id="CompareMatchAValue" selection="CompareMatchAValue">
|
||||
<item id="CompareMatchAValue" input="2" vlaue="59"/>
|
||||
</option>
|
||||
<option enabled="true" id="MatchValueOptionA" selection="us">
|
||||
<item id="ms" input="" vlaue="0"/>
|
||||
<item id="us" input="" vlaue="0"/>
|
||||
<item id="ns" input="" vlaue="0"/>
|
||||
<item id="count" input="" vlaue="0"/>
|
||||
</option>
|
||||
<option enabled="true" id="S12ADEnable" selection="Disable">
|
||||
<item id="Disable" input="" vlaue="0"/>
|
||||
<item id="Enable" input="" vlaue="0"/>
|
||||
</option>
|
||||
<option enabled="true" id="CompareMatchBValue" selection="CompareMatchBValue">
|
||||
<item id="CompareMatchBValue" input="2" vlaue="59"/>
|
||||
</option>
|
||||
<option enabled="true" id="TMO0OutputEnable" selection="Disable">
|
||||
<item id="Disable" input="" vlaue="0"/>
|
||||
<item id="Enable" input="" vlaue="0"/>
|
||||
</option>
|
||||
<option enabled="true" id="OutputMatchA" selection="Nochange">
|
||||
<item id="Nochange" input="" vlaue="0"/>
|
||||
<item id="Output0" input="" vlaue="0"/>
|
||||
<item id="Output1" input="" vlaue="0"/>
|
||||
<item id="ToggleOutput" input="" vlaue="0"/>
|
||||
</option>
|
||||
<option enabled="true" id="OutputMatchB" selection="Nochange">
|
||||
<item id="Nochange" input="" vlaue="0"/>
|
||||
<item id="Output0" input="" vlaue="0"/>
|
||||
<item id="Output1" input="" vlaue="0"/>
|
||||
<item id="ToggleOutput" input="" vlaue="0"/>
|
||||
</option>
|
||||
<option enabled="true" id="TCORAEnable" selection="Disable">
|
||||
<item id="Disable" input="" vlaue="0"/>
|
||||
<item id="Enable" input="" vlaue="0"/>
|
||||
</option>
|
||||
<option enabled="true" id="TCORAOption" selection="Level15">
|
||||
<item id="Level0" input="" vlaue="0"/>
|
||||
<item id="Level1" input="" vlaue="0"/>
|
||||
<item id="Level2" input="" vlaue="0"/>
|
||||
<item id="Level3" input="" vlaue="0"/>
|
||||
<item id="Level4" input="" vlaue="0"/>
|
||||
<item id="Level5" input="" vlaue="0"/>
|
||||
<item id="Level6" input="" vlaue="0"/>
|
||||
<item id="Level7" input="" vlaue="0"/>
|
||||
<item id="Level8" input="" vlaue="0"/>
|
||||
<item id="Level9" input="" vlaue="0"/>
|
||||
<item id="Level10" input="" vlaue="0"/>
|
||||
<item id="Level11" input="" vlaue="0"/>
|
||||
<item id="Level12" input="" vlaue="0"/>
|
||||
<item id="Level13" input="" vlaue="0"/>
|
||||
<item id="Level14" input="" vlaue="0"/>
|
||||
<item id="Level15" input="" vlaue="0"/>
|
||||
</option>
|
||||
<option enabled="true" id="TCORBEnable" selection="Disable">
|
||||
<item id="Disable" input="" vlaue="0"/>
|
||||
<item id="Enable" input="" vlaue="0"/>
|
||||
</option>
|
||||
<option enabled="true" id="TCORBOption" selection="Level15">
|
||||
<item id="Level0" input="" vlaue="0"/>
|
||||
<item id="Level1" input="" vlaue="0"/>
|
||||
<item id="Level2" input="" vlaue="0"/>
|
||||
<item id="Level3" input="" vlaue="0"/>
|
||||
<item id="Level4" input="" vlaue="0"/>
|
||||
<item id="Level5" input="" vlaue="0"/>
|
||||
<item id="Level6" input="" vlaue="0"/>
|
||||
<item id="Level7" input="" vlaue="0"/>
|
||||
<item id="Level8" input="" vlaue="0"/>
|
||||
<item id="Level9" input="" vlaue="0"/>
|
||||
<item id="Level10" input="" vlaue="0"/>
|
||||
<item id="Level11" input="" vlaue="0"/>
|
||||
<item id="Level12" input="" vlaue="0"/>
|
||||
<item id="Level13" input="" vlaue="0"/>
|
||||
<item id="Level14" input="" vlaue="0"/>
|
||||
<item id="Level15" input="" vlaue="0"/>
|
||||
</option>
|
||||
<option enabled="true" id="TCNTEnable" selection="Disable">
|
||||
<item id="Disable" input="" vlaue="0"/>
|
||||
<item id="Enable" input="" vlaue="0"/>
|
||||
</option>
|
||||
<option enabled="true" id="TCNTOption" selection="Level15">
|
||||
<item id="Level0" input="" vlaue="0"/>
|
||||
<item id="Level1" input="" vlaue="0"/>
|
||||
<item id="Level2" input="" vlaue="0"/>
|
||||
<item id="Level3" input="" vlaue="0"/>
|
||||
<item id="Level4" input="" vlaue="0"/>
|
||||
<item id="Level5" input="" vlaue="0"/>
|
||||
<item id="Level6" input="" vlaue="0"/>
|
||||
<item id="Level7" input="" vlaue="0"/>
|
||||
<item id="Level8" input="" vlaue="0"/>
|
||||
<item id="Level9" input="" vlaue="0"/>
|
||||
<item id="Level10" input="" vlaue="0"/>
|
||||
<item id="Level11" input="" vlaue="0"/>
|
||||
<item id="Level12" input="" vlaue="0"/>
|
||||
<item id="Level13" input="" vlaue="0"/>
|
||||
<item id="Level14" input="" vlaue="0"/>
|
||||
<item id="Level15" input="" vlaue="0"/>
|
||||
</option>
|
||||
</allocatable>
|
||||
<component description="This software component generates two units (unit 0, unit 1) of an on-chip 8-bit timer (TMR) module that comprise two 8-bit counter channels, totaling four channels." detailDescription="" display="8-Bit Timer" id="com.renesas.smc.tools.swcomponent.codegenerator.tmr" version="1.9.0"/>
|
||||
<allocator channelLevel0="0" channelLevel1="" channelLevel2="" channelLevel3="" channelLevel4="" channelLevel5="" description="8-Bit Timer 0" display="TMR0" id="com.renesas.smc.tools.swcomponent.codegenerator.tmr.rx651.tmr0" type="">
|
||||
<context>
|
||||
<option enabled="true" id="CountMode" selection="8bitMode">
|
||||
<item enabled="true" id="8bitMode"/>
|
||||
<item enabled="true" id="16bitMode"/>
|
||||
</option>
|
||||
</context>
|
||||
</allocator>
|
||||
<source description="Code generator components provide peripheral drivers with customized generated source geared towards small code size" display="Code Generator" id="com.renesas.smc.tools.swcomponent.codegenerator.source"/>
|
||||
</configuration>
|
||||
<configuration inuse="true" name="r_bsp">
|
||||
<component description="Dependencies : None The r_bsp package provides a foundation for code to be built on top of. It provides startup code, iodefines, and MCU information for different boards. There are 2 folders that make up the r_bsp package. The 'mcu' folder contains files that are common to a MCU group. These files provide functionality such as easy register access, CPU functions, and a file named 'mcu_info.h' for each MCU group. The 'mcu_info.h' file has information about the MCU on the board and is configured based on the information given in r_bsp_config.h. The information in 'mcu_info.h' is used to help configure Renesas middleware that uses the r_bsp package. The 'board' folder has a folder with startup code for each supported board. Which MCU and board is chosen is decided by the settings in 'platform.h'. The user can choose which board they are using by uncommenting the include path that applies to their board. For example, if you are using the RSK+RX64M then you would uncomment the #include "./board/generic_rx64m/r_bsp.h" include path. Users are encouraged to add their own boards to the 'board' directory. BSPs are configured by using the r_bsp_config.h file. Each board will have a reference configuration file named r_bsp_config_reference.h. The user should copy this file to their project, rename it to r_bsp_config.h, and use the options inside the file to configure the BSP for their project." detailDescription="Board Support Packages." display="r_bsp" id="r_bsp6.21" version="6.21">
|
||||
<gridItem id="BSP_CFG_USER_STACK_ENABLE" selectedIndex="1"/>
|
||||
<gridItem id="BSP_CFG_USTACK_BYTES" selectedIndex="0x2000"/>
|
||||
<gridItem id="BSP_CFG_ISTACK_BYTES" selectedIndex="0x400"/>
|
||||
<gridItem id="BSP_CFG_HEAP_BYTES" selectedIndex="0xc000"/>
|
||||
<gridItem id="BSP_CFG_IO_LIB_ENABLE" selectedIndex="1"/>
|
||||
<gridItem id="BSP_CFG_USER_CHARGET_ENABLED" selectedIndex="0"/>
|
||||
<gridItem id="BSP_CFG_USER_CHARGET_FUNCTION" selectedIndex="my_sw_charget_function"/>
|
||||
<gridItem id="BSP_CFG_USER_CHARPUT_ENABLED" selectedIndex="0"/>
|
||||
<gridItem id="BSP_CFG_USER_CHARPUT_FUNCTION" selectedIndex="my_sw_charput_function"/>
|
||||
<gridItem id="BSP_CFG_RUN_IN_USER_MODE" selectedIndex="0"/>
|
||||
<gridItem id="BSP_CFG_ID_CODE_LONG_1" selectedIndex="0xFFFFFFFF"/>
|
||||
<gridItem id="BSP_CFG_ID_CODE_LONG_2" selectedIndex="0xFFFFFFFF"/>
|
||||
<gridItem id="BSP_CFG_ID_CODE_LONG_3" selectedIndex="0xFFFFFFFF"/>
|
||||
<gridItem id="BSP_CFG_ID_CODE_LONG_4" selectedIndex="0xFFFFFFFF"/>
|
||||
<gridItem id="BSP_CFG_ROM_CACHE_ENABLE" selectedIndex="0"/>
|
||||
<gridItem id="BSP_CFG_TRUSTED_MODE_FUNCTION" selectedIndex="0xFFFFFFFF"/>
|
||||
<gridItem id="BSP_CFG_FAW_REG_VALUE" selectedIndex="0xFFFFFFFF"/>
|
||||
<gridItem id="BSP_CFG_ROMCODE_REG_VALUE" selectedIndex="0xFFFFFFFF"/>
|
||||
<gridItem id="BSP_CFG_CODE_FLASH_BANK_MODE" selectedIndex="1"/>
|
||||
<gridItem id="BSP_CFG_CODE_FLASH_START_BANK" selectedIndex="0"/>
|
||||
<gridItem id="BSP_CFG_USER_LOCKING_ENABLED" selectedIndex="0"/>
|
||||
<gridItem id="BSP_CFG_USER_LOCKING_TYPE" selectedIndex="bsp_lock_t"/>
|
||||
<gridItem id="BSP_CFG_USER_LOCKING_HW_LOCK_FUNCTION" selectedIndex="my_hw_locking_function"/>
|
||||
<gridItem id="BSP_CFG_USER_LOCKING_HW_UNLOCK_FUNCTION" selectedIndex="my_hw_unlocking_function"/>
|
||||
<gridItem id="BSP_CFG_USER_LOCKING_SW_LOCK_FUNCTION" selectedIndex="my_sw_locking_function"/>
|
||||
<gridItem id="BSP_CFG_USER_LOCKING_SW_UNLOCK_FUNCTION" selectedIndex="my_sw_unlocking_function"/>
|
||||
<gridItem id="BSP_CFG_USER_WARM_START_CALLBACK_PRE_INITC_ENABLED" selectedIndex="0"/>
|
||||
<gridItem id="BSP_CFG_USER_WARM_START_PRE_C_FUNCTION" selectedIndex="my_sw_warmstart_prec_function"/>
|
||||
<gridItem id="BSP_CFG_USER_WARM_START_CALLBACK_POST_INITC_ENABLED" selectedIndex="0"/>
|
||||
<gridItem id="BSP_CFG_USER_WARM_START_POST_C_FUNCTION" selectedIndex="my_sw_warmstart_postc_function"/>
|
||||
<gridItem id="BSP_CFG_PARAM_CHECKING_ENABLE" selectedIndex="1"/>
|
||||
<gridItem id="BSP_CFG_EBMAPCR_1ST_PRIORITY" selectedIndex="0"/>
|
||||
<gridItem id="BSP_CFG_EBMAPCR_2ND_PRIORITY" selectedIndex="3"/>
|
||||
<gridItem id="BSP_CFG_EBMAPCR_3RD_PRIORITY" selectedIndex="1"/>
|
||||
<gridItem id="BSP_CFG_EBMAPCR_4TH_PRIORITY" selectedIndex="2"/>
|
||||
<gridItem id="BSP_CFG_EBMAPCR_5TH_PRIORITY" selectedIndex="4"/>
|
||||
<gridItem id="BSP_CFG_FIT_IPL_MAX" selectedIndex="15"/>
|
||||
<gridItem id="BSP_CFG_SWINT_UNIT1_ENABLE" selectedIndex="1"/>
|
||||
<gridItem id="BSP_CFG_SWINT_UNIT2_ENABLE" selectedIndex="1"/>
|
||||
<gridItem id="BSP_CFG_SWINT_TASK_BUFFER_NUMBER" selectedIndex="8"/>
|
||||
<gridItem id="BSP_CFG_SWINT_IPR_INITIAL_VALUE" selectedIndex="1"/>
|
||||
<gridItem id="BSP_CFG_SCI_UART_TERMINAL_ENABLE" selectedIndex="0"/>
|
||||
<gridItem id="BSP_CFG_SCI_UART_TERMINAL_CHANNEL" selectedIndex="8"/>
|
||||
<gridItem id="BSP_CFG_SCI_UART_TERMINAL_BITRATE" selectedIndex="115200"/>
|
||||
<gridItem id="BSP_CFG_SCI_UART_TERMINAL_INTERRUPT_PRIORITY" selectedIndex="15"/>
|
||||
</component>
|
||||
<source description="Components supporting Firmware Integration Technology" display="Firmware Integration Technology" id="com.renesas.smc.tools.swcomponent.fit.source"/>
|
||||
<source description="Components supporting Firmware Integration Technology" display="Firmware Integration Technology" id="com.renesas.smc.tools.swcomponent.fit.source"/>
|
||||
</configuration>
|
||||
<configuration inuse="true" name="r_cmt_rx">
|
||||
<component description="Dependency : r_bsp version(s) 6.20 This module creates a timer tick using a CMT channel based on a frequency input by the user." detailDescription="CMT driver" display="r_cmt_rx" id="r_cmt_rx4.90" version="4.90">
|
||||
<gridItem id="CMT_RX_CFG_IPR" selectedIndex="5"/>
|
||||
</component>
|
||||
<source description="Components supporting Firmware Integration Technology" display="Firmware Integration Technology" id="com.renesas.smc.tools.swcomponent.fit.source"/>
|
||||
<source description="Components supporting Firmware Integration Technology" display="Firmware Integration Technology" id="com.renesas.smc.tools.swcomponent.fit.source"/>
|
||||
</configuration>
|
||||
<configuration inuse="true" name="r_ether_rx">
|
||||
<component description="Dependency : r_bsp version(s) 5.52 The Ethernet fit module provides a method to send and receive Ethernet / IEEE802.3 frame using Ethernet controller (ETHERC), Ethernet DMA controller (EDMAC)." detailDescription="Ethernet Driver." display="r_ether_rx" id="r_ether_rx1.21" version="1.21">
|
||||
<gridItem id="CLKOUT25M" selectedIndex="0"/>
|
||||
<gridItem id="ET0_TX_CLK" selectedIndex="0"/>
|
||||
<gridItem id="ET0_RX_CLK" selectedIndex="1"/>
|
||||
<gridItem id="ET0_TX_EN" selectedIndex="1"/>
|
||||
<gridItem id="ET0_ETXD3" selectedIndex="0"/>
|
||||
<gridItem id="ET0_ETXD2" selectedIndex="0"/>
|
||||
<gridItem id="ET0_ETXD1" selectedIndex="1"/>
|
||||
<gridItem id="ET0_ETXD0" selectedIndex="1"/>
|
||||
<gridItem id="ET0_TX_ER" selectedIndex="0"/>
|
||||
<gridItem id="ET0_RX_DV" selectedIndex="0"/>
|
||||
<gridItem id="ET0_ERXD3" selectedIndex="0"/>
|
||||
<gridItem id="ET0_ERXD2" selectedIndex="0"/>
|
||||
<gridItem id="ET0_ERXD1" selectedIndex="1"/>
|
||||
<gridItem id="ET0_ERXD0" selectedIndex="1"/>
|
||||
<gridItem id="ET0_RX_ER" selectedIndex="1"/>
|
||||
<gridItem id="ET0_CRS" selectedIndex="1"/>
|
||||
<gridItem id="ET0_COL" selectedIndex="0"/>
|
||||
<gridItem id="ET0_MDC" selectedIndex="1"/>
|
||||
<gridItem id="ET0_MDIO" selectedIndex="1"/>
|
||||
<gridItem id="PMGI0_MDC" selectedIndex="0"/>
|
||||
<gridItem id="PMGI0_MDIO" selectedIndex="0"/>
|
||||
<gridItem id="ET0_LINKSTA" selectedIndex="1"/>
|
||||
<gridItem id="ET0_EXOUT" selectedIndex="0"/>
|
||||
<gridItem id="ET0_WOL" selectedIndex="0"/>
|
||||
<gridItem id="ETHERC0_MII" selectedIndex="1"/>
|
||||
<gridItem id="CLKOUT25M" selectedIndex="0"/>
|
||||
<gridItem id="REF50CK0" selectedIndex="1"/>
|
||||
<gridItem id="RMII0_TXD_EN" selectedIndex="1"/>
|
||||
<gridItem id="RMII0_TXD1" selectedIndex="1"/>
|
||||
<gridItem id="RMII0_TXD0" selectedIndex="1"/>
|
||||
<gridItem id="RMII0_RXD1" selectedIndex="1"/>
|
||||
<gridItem id="RMII0_RXD0" selectedIndex="1"/>
|
||||
<gridItem id="RMII0_RX_ER" selectedIndex="1"/>
|
||||
<gridItem id="RMII0_CRS_DV" selectedIndex="1"/>
|
||||
<gridItem id="ET0_MDC" selectedIndex="1"/>
|
||||
<gridItem id="ET0_MDIO" selectedIndex="1"/>
|
||||
<gridItem id="PMGI0_MDC" selectedIndex="0"/>
|
||||
<gridItem id="PMGI0_MDIO" selectedIndex="0"/>
|
||||
<gridItem id="ET0_LINKSTA" selectedIndex="1"/>
|
||||
<gridItem id="ET0_EXOUT" selectedIndex="0"/>
|
||||
<gridItem id="ET0_WOL" selectedIndex="0"/>
|
||||
<gridItem id="ETHERC0_RMII" selectedIndex="1"/>
|
||||
<gridItem id="CLKOUT25M" selectedIndex="0"/>
|
||||
<gridItem id="ET1_TX_CLK" selectedIndex="0"/>
|
||||
<gridItem id="ET1_RX_CLK" selectedIndex="0"/>
|
||||
<gridItem id="ET1_TX_EN" selectedIndex="0"/>
|
||||
<gridItem id="ET1_ETXD3" selectedIndex="0"/>
|
||||
<gridItem id="ET1_ETXD2" selectedIndex="0"/>
|
||||
<gridItem id="ET1_ETXD1" selectedIndex="0"/>
|
||||
<gridItem id="ET1_ETXD0" selectedIndex="0"/>
|
||||
<gridItem id="ET1_TX_ER" selectedIndex="0"/>
|
||||
<gridItem id="ET1_RX_DV" selectedIndex="0"/>
|
||||
<gridItem id="ET1_ERXD3" selectedIndex="0"/>
|
||||
<gridItem id="ET1_ERXD2" selectedIndex="0"/>
|
||||
<gridItem id="ET1_ERXD1" selectedIndex="0"/>
|
||||
<gridItem id="ET1_ERXD0" selectedIndex="0"/>
|
||||
<gridItem id="ET1_RX_ER" selectedIndex="0"/>
|
||||
<gridItem id="ET1_CRS" selectedIndex="0"/>
|
||||
<gridItem id="ET1_COL" selectedIndex="0"/>
|
||||
<gridItem id="ET1_MDC" selectedIndex="0"/>
|
||||
<gridItem id="ET1_MDIO" selectedIndex="0"/>
|
||||
<gridItem id="PMGI1_MDC" selectedIndex="0"/>
|
||||
<gridItem id="PMGI1_MDIO" selectedIndex="0"/>
|
||||
<gridItem id="ET1_LINKSTA" selectedIndex="0"/>
|
||||
<gridItem id="ET1_EXOUT" selectedIndex="0"/>
|
||||
<gridItem id="ET1_WOL" selectedIndex="0"/>
|
||||
<gridItem id="ETHERC1_MII" selectedIndex="0"/>
|
||||
<gridItem id="CLKOUT25M" selectedIndex="0"/>
|
||||
<gridItem id="REF50CK1" selectedIndex="0"/>
|
||||
<gridItem id="RMII1_TXD_EN" selectedIndex="0"/>
|
||||
<gridItem id="RMII1_TXD1" selectedIndex="0"/>
|
||||
<gridItem id="RMII1_TXD0" selectedIndex="0"/>
|
||||
<gridItem id="RMII1_RXD1" selectedIndex="0"/>
|
||||
<gridItem id="RMII1_RXD0" selectedIndex="0"/>
|
||||
<gridItem id="RMII1_RX_ER" selectedIndex="0"/>
|
||||
<gridItem id="RMII1_CRS_DV" selectedIndex="0"/>
|
||||
<gridItem id="ET1_MDC" selectedIndex="0"/>
|
||||
<gridItem id="ET1_MDIO" selectedIndex="0"/>
|
||||
<gridItem id="PMGI1_MDC" selectedIndex="0"/>
|
||||
<gridItem id="PMGI1_MDIO" selectedIndex="0"/>
|
||||
<gridItem id="ET1_LINKSTA" selectedIndex="0"/>
|
||||
<gridItem id="ET1_EXOUT" selectedIndex="0"/>
|
||||
<gridItem id="ET1_WOL" selectedIndex="0"/>
|
||||
<gridItem id="ETHERC1_RMII" selectedIndex="0"/>
|
||||
<gridItem id="ETHER_CFG_MODE_SEL" selectedIndex="1"/>
|
||||
<gridItem id="ETHER_CFG_CH0_PHY_ADDRESS" selectedIndex="0"/>
|
||||
<gridItem id="ETHER_CFG_CH1_PHY_ADDRESS" selectedIndex="1"/>
|
||||
<gridItem id="ETHER_CFG_EMAC_RX_DESCRIPTORS" selectedIndex="1"/>
|
||||
<gridItem id="ETHER_CFG_EMAC_TX_DESCRIPTORS" selectedIndex="1"/>
|
||||
<gridItem id="ETHER_CFG_BUFSIZE" selectedIndex="1536"/>
|
||||
<gridItem id="ETHER_CFG_AL1_INT_PRIORTY" selectedIndex="1"/>
|
||||
<gridItem id="ETHER_CFG_CH0_PHY_ACCESS" selectedIndex="0"/>
|
||||
<gridItem id="ETHER_CFG_CH1_PHY_ACCESS" selectedIndex="1"/>
|
||||
<gridItem id="ETHER_CFG_PHY_MII_WAIT" selectedIndex="8"/>
|
||||
<gridItem id="ETHER_CFG_PHY_DELAY_RESET" selectedIndex="0x00020000L"/>
|
||||
<gridItem id="ETHER_CFG_LINK_PRESENT" selectedIndex="0"/>
|
||||
<gridItem id="ETHER_CFG_USE_LINKSTA" selectedIndex="1"/>
|
||||
<gridItem id="ETHER_CFG_USE_PHY_KSZ8041NL" selectedIndex="0"/>
|
||||
<gridItem id="ETHER_CFG_NON_BLOCKING" selectedIndex="0"/>
|
||||
<gridItem id="ETHER_CFG_PMGI_CLOCK" selectedIndex="2500000"/>
|
||||
<gridItem id="ETHER_CFG_PMGI_ENABLE_PREAMBLE" selectedIndex="0"/>
|
||||
<gridItem id="ETHER_CFG_PMGI_HOLD_TIME" selectedIndex="0"/>
|
||||
<gridItem id="ETHER_CFG_PMGI_CAPTURE_TIME" selectedIndex="0"/>
|
||||
<gridItem id="ETHER_CFG_PMGI_INT_PRIORTY" selectedIndex="1"/>
|
||||
</component>
|
||||
<source description="Components supporting Firmware Integration Technology" display="Firmware Integration Technology" id="com.renesas.smc.tools.swcomponent.fit.source"/>
|
||||
<source description="Components supporting Firmware Integration Technology" display="Firmware Integration Technology" id="com.renesas.smc.tools.swcomponent.fit.source"/>
|
||||
</configuration>
|
||||
<configuration inuse="true" name="r_sys_time_rx">
|
||||
<component description="Dependency : r_bsp version(s) 5.20 Dependency : r_cmt_rx version(s) 4.00 Generic system timer for RX MCUs using CMT module." detailDescription="Generic system timer for RX MCUs using CMT module." display="r_sys_time_rx" id="r_sys_time_rx1.01" version="1.01"/>
|
||||
<source description="Components supporting Firmware Integration Technology" display="Firmware Integration Technology" id="com.renesas.smc.tools.swcomponent.fit.source"/>
|
||||
<source description="Components supporting Firmware Integration Technology" display="Firmware Integration Technology" id="com.renesas.smc.tools.swcomponent.fit.source"/>
|
||||
</configuration>
|
||||
<configuration inuse="true" name="r_t4_driver_rx">
|
||||
<component description="Dependency : r_bsp version(s) 5.61 Dependency : r_ether_rx version(s) 1.21 Dependency : r_sys_time_rx version(s) 1.01 Dependency : r_t4_rx version(s) 2.10 Convert the TCP/IP(T4) - RX Ethernet Driver Interface." detailDescription="TCP/IP protocol stack [M3S-T4-Tiny] - RX Ethernet Driver Interface" display="r_t4_driver_rx" id="r_t4_driver_rx1.09" version="1.09"/>
|
||||
<source description="Components supporting Firmware Integration Technology" display="Firmware Integration Technology" id="com.renesas.smc.tools.swcomponent.fit.source"/>
|
||||
<source description="Components supporting Firmware Integration Technology" display="Firmware Integration Technology" id="com.renesas.smc.tools.swcomponent.fit.source"/>
|
||||
</configuration>
|
||||
<configuration inuse="true" name="r_t4_rx">
|
||||
<component description="Dependency : r_t4_driver_rx version(s) 1.09 T4 is TCP/IP protocol stack that has small footprint for Renesas MCUs." detailDescription="TCP/IP protocol stack [M3S-T4-Tiny] for Renesas MCUs" display="r_t4_rx" id="r_t4_rx2.10" version="2.10">
|
||||
<gridItem id="T4_CFG_SYSTEM_CHANNEL_NUMBER" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_SYSTEM_DHCP" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_FIXED_IP_ADDRESS_CH0" selectedIndex="192,168,1,33"/>
|
||||
<gridItem id="T4_CFG_FIXED_SABNET_MASK_CH0" selectedIndex="255,255,255,0"/>
|
||||
<gridItem id="T4_CFG_FIXED_GATEWAY_ADDRESS_CH0" selectedIndex="192,168,1,1"/>
|
||||
<gridItem id="T4_CFG_FIXED_IP_ADDRESS_CH1" selectedIndex="192,168,0,10"/>
|
||||
<gridItem id="T4_CFG_FIXED_SABNET_MASK_CH1" selectedIndex="255,255,255,0"/>
|
||||
<gridItem id="T4_CFG_FIXED_GATEWAY_ADDRESS_CH1" selectedIndex="0,0,0,0"/>
|
||||
<gridItem id="T4_CFG_ETHER_CH0_MAC_ADDRESS" selectedIndex="0x74,0x90,0x50,0x00,0x79,0x03"/>
|
||||
<gridItem id="T4_CFG_ETHER_CH1_MAC_ADDRESS" selectedIndex="0x74,0x90,0x50,0x00,0x79,0x10"/>
|
||||
<gridItem id="T4_CFG_SYSTEM_CALLBACK_FUNCTION_USE" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_SYSTEM_CALLBACK_FUNCTION_NAME_TMP" selectedIndex="system_callback"/>
|
||||
<gridItem id="T4_CFG_TCP_REPID1_PORT_NUMBER" selectedIndex="1024"/>
|
||||
<gridItem id="T4_CFG_TCP_REPID2_PORT_NUMBER" selectedIndex="1025"/>
|
||||
<gridItem id="T4_CFG_TCP_REPID3_PORT_NUMBER" selectedIndex="1026"/>
|
||||
<gridItem id="T4_CFG_TCP_REPID4_PORT_NUMBER" selectedIndex="1027"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID1_CHANNEL" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID1_RECEIVE_WINDOW_SIZE" selectedIndex="1460"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID1_CALLBACK_FUNCTION_USE" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID1_CALLBACK_FUNCTION_NAME_TMP" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID1_KEEPALIVE_ENABLE" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID2_CHANNEL" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID2_RECEIVE_WINDOW_SIZE" selectedIndex="1460"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID2_CALLBACK_FUNCTION_USE" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID2_CALLBACK_FUNCTION_NAME_TMP" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID2_KEEPALIVE_ENABLE" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID3_CHANNEL" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID3_RECEIVE_WINDOW_SIZE" selectedIndex="1460"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID3_CALLBACK_FUNCTION_USE" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID3_CALLBACK_FUNCTION_NAME_TMP" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID3_KEEPALIVE_ENABLE" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID4_CHANNEL" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID4_RECEIVE_WINDOW_SIZE" selectedIndex="1460"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID4_CALLBACK_FUNCTION_USE" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID4_CALLBACK_FUNCTION_NAME_TMP" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID4_KEEPALIVE_ENABLE" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID5_CHANNEL" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID5_RECEIVE_WINDOW_SIZE" selectedIndex="1460"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID5_CALLBACK_FUNCTION_USE" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID5_CALLBACK_FUNCTION_NAME_TMP" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID5_KEEPALIVE_ENABLE" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID6_CHANNEL" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID6_RECEIVE_WINDOW_SIZE" selectedIndex="1460"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID6_CALLBACK_FUNCTION_USE" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID6_CALLBACK_FUNCTION_NAME_TMP" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_TCP_CEPID6_KEEPALIVE_ENABLE" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_TCP_MSS" selectedIndex="1460"/>
|
||||
<gridItem id="T4_CFG_TCP_2MSL_TIME" selectedIndex="60"/>
|
||||
<gridItem id="T4_CFG_TCP_MAX_TIMEOUT_PERIOD" selectedIndex="600"/>
|
||||
<gridItem id="T4_CFG_TCP_DIVIDE_SENDING_PACKET" selectedIndex="1"/>
|
||||
<gridItem id="T4_CFG_TCP_KEEPALIVE_START" selectedIndex="7200"/>
|
||||
<gridItem id="T4_CFG_TCP_KEEPALIVE_INTERVAL" selectedIndex="10"/>
|
||||
<gridItem id="T4_CFG_TCP_KEEPALIVE_COUNT" selectedIndex="10"/>
|
||||
<gridItem id="T4_CFG_UDP_CEPID1_CHANNEL" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_UDP_CEPID1_PORT_NUMBER" selectedIndex="1365"/>
|
||||
<gridItem id="T4_CFG_UDP_CEPID1_CALLBACK_FUNCTION_USE" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_UDP_CEPID1_CALLBACK_FUNCTION_NAME_TMP" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_UDP_CEPID2_CHANNEL" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_UDP_CEPID2_PORT_NUMBER" selectedIndex="1366"/>
|
||||
<gridItem id="T4_CFG_UDP_CEPID2_CALLBACK_FUNCTION_USE" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_UDP_CEPID2_CALLBACK_FUNCTION_NAME_TMP" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_UDP_CEPID3_CHANNEL" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_UDP_CEPID3_PORT_NUMBER" selectedIndex="1367"/>
|
||||
<gridItem id="T4_CFG_UDP_CEPID3_CALLBACK_FUNCTION_USE" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_UDP_CEPID3_CALLBACK_FUNCTION_NAME_TMP" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_UDP_CEPID4_CHANNEL" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_UDP_CEPID4_PORT_NUMBER" selectedIndex="1368"/>
|
||||
<gridItem id="T4_CFG_UDP_CEPID4_CALLBACK_FUNCTION_USE" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_UDP_CEPID4_CALLBACK_FUNCTION_NAME_TMP" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_UDP_CEPID5_CHANNEL" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_UDP_CEPID5_PORT_NUMBER" selectedIndex="1369"/>
|
||||
<gridItem id="T4_CFG_UDP_CEPID5_CALLBACK_FUNCTION_USE" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_UDP_CEPID5_CALLBACK_FUNCTION_NAME_TMP" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_UDP_CEPID6_CHANNEL" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_UDP_CEPID6_PORT_NUMBER" selectedIndex="1370"/>
|
||||
<gridItem id="T4_CFG_UDP_CEPID6_CALLBACK_FUNCTION_USE" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_UDP_CEPID6_CALLBACK_FUNCTION_NAME_TMP" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_UDP_MULTICAST_TTL" selectedIndex="1"/>
|
||||
<gridItem id="T4_CFG_UDP_BEHAVIOR_OF_RECEIVED_ZERO_CHECKSUM" selectedIndex="0"/>
|
||||
<gridItem id="T4_CFG_IP_ARP_CACHE_TABLE_COUNT" selectedIndex="3"/>
|
||||
</component>
|
||||
<source description="Components supporting Firmware Integration Technology" display="Firmware Integration Technology" id="com.renesas.smc.tools.swcomponent.fit.source"/>
|
||||
<source description="Components supporting Firmware Integration Technology" display="Firmware Integration Technology" id="com.renesas.smc.tools.swcomponent.fit.source"/>
|
||||
</configuration>
|
||||
<configuration inuse="true" name="r_tsip_rx">
|
||||
<component description="Dependency : r_bsp version(s) 7.00 Support functions: AES, GCM, CCM, CMAC, SHA, MD5, Triple-DES, ARC4, RSA, ECC, Random number generate, Key management, secure boot/secure firmware update. The ".l" in version number means library version." detailDescription="TSIP(Trusted Secure IP) driver." display="r_tsip_rx" id="r_tsip_rx1.15.l" version="1.15.l"/>
|
||||
<source description="Components supporting Firmware Integration Technology" display="Firmware Integration Technology" id="com.renesas.smc.tools.swcomponent.fit.source"/>
|
||||
<source description="Components supporting Firmware Integration Technology" display="Firmware Integration Technology" id="com.renesas.smc.tools.swcomponent.fit.source"/>
|
||||
</configuration>
|
||||
</tool>
|
||||
<tool id="System">
|
||||
<section id="ocd">
|
||||
<option enabled="true" id="debugIF" selection="unused">
|
||||
<item enabled="true" id="unused"/>
|
||||
<item enabled="true" id="fine"/>
|
||||
<item enabled="true" id="jtag"/>
|
||||
</option>
|
||||
</section>
|
||||
</tool>
|
||||
</smc>
|
||||
230
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/test/src/key_data.c
vendored
Normal file
230
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/test/src/key_data.c
vendored
Normal file
@@ -0,0 +1,230 @@
|
||||
/* key_data.c
|
||||
*
|
||||
* Copyright (C) 2006-2022 wolfSSL Inc.
|
||||
*
|
||||
* This file is part of wolfSSL.
|
||||
*
|
||||
* wolfSSL is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* wolfSSL is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
*/
|
||||
|
||||
|
||||
#include "key_data.h"
|
||||
|
||||
/*-------------------------------------------------------------------------
|
||||
TSIP v1.09 or later
|
||||
--------------------------------------------------------------------------*/
|
||||
#if defined(WOLFSSL_RENESAS_TSIP_TLS) && (WOLFSSL_RENESAS_TSIP_VER >=109)
|
||||
|
||||
const st_key_block_data_t g_key_block_data =
|
||||
{
|
||||
/* uint8_t encrypted_provisioning_key[R_TSIP_AES_CBC_IV_BYTE_SIZE * 2]; */
|
||||
{
|
||||
0x94, 0x4D, 0x99, 0x53, 0xE9, 0x15, 0xD1, 0xD9, 0x0A, 0x2C, 0x17, 0x48,
|
||||
0x87, 0x2F, 0x22, 0xA8, 0x90, 0xB3, 0xDE, 0x25, 0x17, 0xEA, 0xE6, 0x31,
|
||||
0x28, 0x3F, 0xB9, 0x8F, 0xC6, 0xE3, 0xE4, 0x85
|
||||
},
|
||||
/* uint8_t iv[R_TSIP_AES_CBC_IV_BYTE_SIZE]; */
|
||||
{
|
||||
0xF6, 0xA9, 0x83, 0x5A, 0xA1, 0x65, 0x1D, 0x28, 0xC8, 0x1A, 0xA6, 0x9D,
|
||||
0x34, 0xB2, 0x4D, 0x92
|
||||
},
|
||||
/*
|
||||
* uint8_t
|
||||
* encrypted_user_rsa2048_ne_key[R_TSIP_RSA2048_NE_KEY_BYTE_SIZE + 16];
|
||||
*/
|
||||
{
|
||||
0xD9, 0x9A, 0x75, 0x0E, 0x9D, 0x4F, 0x63, 0xA4, 0x02, 0x96, 0xE1, 0xF1,
|
||||
0x49, 0x44, 0xB5, 0x90, 0x59, 0x24, 0xC4, 0x23, 0xF7, 0xA0, 0x32, 0x65,
|
||||
0x68, 0x7B, 0x70, 0xE7, 0xA5, 0xC8, 0x12, 0xD1, 0xCD, 0x55, 0x36, 0x5F,
|
||||
0xE6, 0xEB, 0xD0, 0xAD, 0x5A, 0x7F, 0x9F, 0x41, 0x79, 0x8B, 0x2F, 0x3B,
|
||||
0x17, 0xC9, 0xEE, 0xA7, 0xCB, 0xB5, 0x40, 0xFA, 0x3B, 0x43, 0x1D, 0xF8,
|
||||
0x34, 0xCC, 0xB1, 0xB4, 0x8E, 0x67, 0xF6, 0xA0, 0x49, 0xAA, 0x76, 0x33,
|
||||
0xA4, 0x56, 0xCD, 0x16, 0xE9, 0x76, 0x16, 0x92, 0xBE, 0x3F, 0x3A, 0x3A,
|
||||
0xD7, 0x7A, 0xCD, 0xC9, 0xE2, 0xA0, 0xC8, 0x16, 0x2A, 0x0D, 0xBD, 0x3C,
|
||||
0xEA, 0xC8, 0x26, 0x82, 0xDA, 0x5D, 0x19, 0x71, 0x7B, 0x90, 0x03, 0xEF,
|
||||
0x1E, 0x24, 0x01, 0x62, 0x15, 0x3D, 0x2B, 0x4C, 0xA7, 0x8F, 0xBC, 0xD3,
|
||||
0xD9, 0xC8, 0x9F, 0xBB, 0x4A, 0x62, 0x57, 0xE8, 0xE2, 0x86, 0x8C, 0x56,
|
||||
0x36, 0x64, 0xE7, 0xB9, 0x47, 0x5C, 0x02, 0xF4, 0x87, 0x50, 0x16, 0x9C,
|
||||
0xFB, 0xF6, 0xE9, 0x73, 0x96, 0x78, 0x94, 0x59, 0x12, 0x28, 0x03, 0x37,
|
||||
0x75, 0x56, 0x00, 0x2F, 0xCE, 0x54, 0x7C, 0x34, 0xFD, 0x0B, 0x10, 0x5B,
|
||||
0x4A, 0xEE, 0x11, 0x1B, 0x39, 0xE9, 0x80, 0x8B, 0x27, 0x2D, 0x29, 0x12,
|
||||
0x68, 0x87, 0xD2, 0xC9, 0x78, 0xED, 0xED, 0xF2, 0xA6, 0x4D, 0x6B, 0x10,
|
||||
0x98, 0x9D, 0x52, 0x1C, 0xCE, 0x69, 0x0D, 0x5C, 0x46, 0xEB, 0x5D, 0x9B,
|
||||
0xC8, 0x6A, 0x8E, 0x1F, 0x56, 0x05, 0xBA, 0xD2, 0x50, 0x9F, 0x92, 0xB7,
|
||||
0xD4, 0x4D, 0xCD, 0x58, 0x5B, 0xA7, 0x87, 0x10, 0x6D, 0xF3, 0xDB, 0xA8,
|
||||
0x1D, 0x23, 0x00, 0xE4, 0x81, 0x69, 0x3E, 0x7D, 0xEA, 0x5B, 0x33, 0xF4,
|
||||
0x73, 0xD8, 0x7C, 0xDD, 0x64, 0x74, 0x40, 0x30, 0x93, 0x8D, 0x2C, 0xA5,
|
||||
0x2C, 0x24, 0x11, 0xB2, 0x26, 0x56, 0xE3, 0x41, 0x72, 0xAE, 0x41, 0x56,
|
||||
0x9C, 0x75, 0x11, 0x8E, 0x53, 0x59, 0x77, 0xBF, 0x48, 0x71, 0x86, 0x7C,
|
||||
0x7C, 0xCE, 0x04, 0xB9, 0x73, 0x62, 0xE6, 0x1D, 0xF8, 0xED, 0x93, 0x87
|
||||
},
|
||||
/* uint8_t encrypted_user_update_key[R_TSIP_AES256_KEY_BYTE_SIZE + 16]; */
|
||||
{
|
||||
0
|
||||
},
|
||||
/* uint8_t
|
||||
* encrypted_user_rsa2048_private_key[R_TSIP_RSA2048_ND_KEY_BYTE_SIZE + 16]
|
||||
*/
|
||||
{
|
||||
0x22, 0xEC, 0xE3, 0x79, 0xD1, 0x0C, 0xB4, 0xED, 0xE0, 0xA9, 0x0F, 0xBD,
|
||||
0xC7, 0x0B, 0xB4, 0x1E, 0x82, 0x27, 0x79, 0x20, 0x6A, 0x15, 0x56, 0xD6,
|
||||
0x0F, 0xFA, 0xE4, 0x61, 0x04, 0xDA, 0x81, 0x33, 0x42, 0xBA, 0x6D, 0xB9,
|
||||
0x34, 0x81, 0xFD, 0x67, 0xDF, 0x1D, 0xCB, 0x52, 0x64, 0x9A, 0x2E, 0x30,
|
||||
0x12, 0x60, 0xCB, 0x48, 0x27, 0xB6, 0x38, 0x0B, 0x54, 0x5A, 0x70, 0xCB,
|
||||
0x6F, 0x05, 0x53, 0x46, 0x8B, 0x08, 0x86, 0x24, 0xCB, 0xA2, 0x36, 0x54,
|
||||
0xCD, 0xC9, 0x61, 0x37, 0x43, 0xCB, 0xCC, 0x7C, 0x6B, 0x20, 0x07, 0xB6,
|
||||
0x01, 0x96, 0x32, 0xF5, 0x30, 0x0E, 0x96, 0x05, 0xC4, 0xF5, 0xF0, 0xB0,
|
||||
0xD3, 0x26, 0xAF, 0x6E, 0x39, 0x01, 0x2D, 0xAC, 0x7E, 0x39, 0xCF, 0x48,
|
||||
0x74, 0x7D, 0x98, 0x00, 0xA6, 0x95, 0xDA, 0x4C, 0xAC, 0x81, 0xC7, 0x9A,
|
||||
0x93, 0x69, 0x23, 0xD4, 0x39, 0xCD, 0xB3, 0x62, 0x4A, 0x4A, 0x26, 0x95,
|
||||
0x51, 0xE1, 0x06, 0x8F, 0xB2, 0x3C, 0x8F, 0xDE, 0xF1, 0xC3, 0x69, 0xFC,
|
||||
0xF5, 0xC3, 0xCE, 0x39, 0x3F, 0x7F, 0x2D, 0xA8, 0x8B, 0xB3, 0x2D, 0xE4,
|
||||
0xB8, 0xA4, 0x19, 0x55, 0x29, 0xEC, 0x9C, 0x6A, 0xD7, 0xD7, 0x45, 0x3E,
|
||||
0x1D, 0x18, 0x52, 0xB5, 0x8A, 0xB1, 0x26, 0x43, 0x8C, 0x7A, 0x65, 0xF1,
|
||||
0x17, 0x5E, 0x75, 0x4A, 0x1A, 0x30, 0xD8, 0xEA, 0xC2, 0x19, 0x3C, 0x1E,
|
||||
0x2E, 0xFB, 0xDB, 0xC9, 0x1F, 0x73, 0xC9, 0x95, 0x53, 0x8C, 0x99, 0x5D,
|
||||
0x3B, 0x59, 0xFE, 0x8B, 0xA1, 0xD2, 0xBB, 0xBC, 0xBC, 0x4B, 0x78, 0x0A,
|
||||
0x6B, 0xD8, 0xBE, 0x85, 0x60, 0x08, 0x1E, 0x2F, 0x38, 0x77, 0xA3, 0xC4,
|
||||
0x46, 0xC1, 0x42, 0x39, 0xA6, 0x59, 0x98, 0x59, 0x21, 0x94, 0x1F, 0xDC,
|
||||
0xB3, 0xAE, 0xA3, 0xB6, 0xCC, 0x35, 0x82, 0x6F, 0x87, 0x58, 0x91, 0x70,
|
||||
0xEC, 0x3F, 0x05, 0x86, 0x3C, 0xD1, 0x83, 0xB0, 0xBA, 0xE8, 0xD7, 0xF6,
|
||||
0xE5, 0x9E, 0x50, 0xA4, 0x04, 0xF3, 0x95, 0x9C, 0x41, 0xAF, 0xEB, 0x9D,
|
||||
0xB6, 0xA2, 0xF7, 0x80, 0x5A, 0xC4, 0x67, 0xD4, 0xFD, 0x0C, 0x2A, 0x7C,
|
||||
0x24, 0x03, 0xE5, 0x7F, 0x08, 0x69, 0x18, 0x4E, 0x33, 0x22, 0x7E, 0x03,
|
||||
0x8E, 0x13, 0xFB, 0xC6, 0x9B, 0xA3, 0x44, 0x5B, 0xEC, 0xF9, 0x5C, 0x93,
|
||||
0x3E, 0x9F, 0xBD, 0x72, 0x50, 0x52, 0xF3, 0xEA, 0x34, 0x2B, 0x8E, 0xEC,
|
||||
0x17, 0x42, 0x1A, 0xDF, 0x57, 0xA2, 0x66, 0xA7, 0x0B, 0x3B, 0xE5, 0xF7,
|
||||
0x64, 0x44, 0xA2, 0xA3, 0x5F, 0xB7, 0x5B, 0xF5, 0x99, 0x8C, 0xA0, 0x64,
|
||||
0x04, 0x46, 0x7C, 0x60, 0x75, 0xE4, 0xD9, 0xD5, 0xED, 0x21, 0x1D, 0x65,
|
||||
0x5D, 0x25, 0x21, 0x90, 0x7D, 0xA4, 0x95, 0x15, 0x54, 0x91, 0xD6, 0xB8,
|
||||
0xF9, 0xB7, 0x30, 0xD9, 0x7D, 0x2C, 0x7E, 0x85, 0x6A, 0xCF, 0x31, 0x1C,
|
||||
0xDC, 0x90, 0xA3, 0x75, 0xA4, 0xE4, 0x89, 0x5F, 0x2B, 0xED, 0x93, 0x4E,
|
||||
0xA8, 0x35, 0xD3, 0x20, 0x36, 0x7A, 0x02, 0x23, 0x70, 0xB7, 0xC2, 0x39,
|
||||
0xA4, 0x69, 0xB2, 0xBF, 0xA4, 0x3A, 0x6D, 0xB7, 0xB1, 0x32, 0x32, 0x9A,
|
||||
0x95, 0xEA, 0x02, 0xD2, 0x35, 0xE7, 0x8C, 0xD8, 0x22, 0xA9, 0xC3, 0x4C,
|
||||
0x68, 0x09, 0xA1, 0x2B, 0xB0, 0xE4, 0x55, 0x72, 0x7E, 0xE6, 0x00, 0xDD,
|
||||
0xC6, 0xD1, 0x83, 0x56, 0x08, 0x35, 0xC7, 0x9A, 0x98, 0x0C, 0x79, 0xBD,
|
||||
0x49, 0xBC, 0x3F, 0x45, 0x4A, 0x38, 0x1B, 0x55, 0x2D, 0x52, 0x57, 0x00,
|
||||
0xFC, 0xDB, 0xE7, 0xA0, 0x53, 0xB4, 0x63, 0xE4, 0x37, 0xEC, 0x9F, 0xF0,
|
||||
0xA4, 0x0F, 0xEF, 0x06, 0xF0, 0xC6, 0x5F, 0x0C, 0x4A, 0xB8, 0xC1, 0x96,
|
||||
0x1D, 0x0D, 0x9A, 0x43, 0x89, 0xA4, 0xF6, 0x55, 0x4A, 0x83, 0x54, 0x3F,
|
||||
0xCC, 0x09, 0x65, 0x34, 0xC0, 0x0F, 0x42, 0xF2, 0xE6, 0xDD, 0x2D, 0x8C,
|
||||
0x93, 0x42, 0x09, 0xF6, 0xE4, 0xDF, 0xB2, 0x64, 0x2A, 0x12, 0x7A, 0x59
|
||||
},
|
||||
/* uint8_t
|
||||
* encrypted_user_ecc256_private_key[R_TSIP_ECC_PRIVATE_KEY_BYTE_SIZE + 16];
|
||||
*/
|
||||
{
|
||||
0x25, 0x7A, 0x0C, 0x8C, 0x9B, 0xF9, 0x3C, 0xF5, 0x49, 0x08, 0x86, 0x92,
|
||||
0x00, 0x7D, 0xAB, 0x21, 0x23, 0x38, 0xF8, 0xEA, 0xB0, 0x95, 0x59, 0x9B,
|
||||
0x04, 0xC8, 0xAA, 0xEA, 0x8C, 0x2D, 0x68, 0xF4, 0xD5, 0xD7, 0xA9, 0x6F,
|
||||
0x2C, 0x8C, 0x13, 0x93, 0xA3, 0x80, 0x11, 0xF9, 0x0F, 0x36, 0x14, 0xA8
|
||||
},
|
||||
};
|
||||
|
||||
/* Public key type of CA root cert: 0: RSA-2048 2: ECDSA-P256*/
|
||||
#if defined(USE_ECC_CERT)
|
||||
const uint32_t encrypted_user_key_type =
|
||||
R_TSIP_TLS_PUBLIC_KEY_TYPE_ECDSA_P256;
|
||||
#else
|
||||
const uint32_t encrypted_user_key_type =
|
||||
R_TSIP_TLS_PUBLIC_KEY_TYPE_RSA2048;
|
||||
#endif
|
||||
|
||||
const unsigned char ca_ecc_cert_der_sig[] =
|
||||
{
|
||||
0x6e, 0x7d, 0x2b, 0xd3, 0x6d, 0x6a, 0x70, 0x31, 0xbf, 0xcd, 0x6f, 0x32,
|
||||
0x74, 0x8b, 0x4d, 0xdf, 0x7c, 0x72, 0xc6, 0x78, 0x61, 0x2b, 0x0f, 0xcc,
|
||||
0xbc, 0xa3, 0x25, 0x54, 0x04, 0xfa, 0x9e, 0xf7, 0x1c, 0xa2, 0xe1, 0x33,
|
||||
0x90, 0x08, 0xcd, 0x3c, 0xc1, 0x03, 0x66, 0xb6, 0x3f, 0xf1, 0xbf, 0xaf,
|
||||
0x0d, 0xb0, 0xeb, 0xe4, 0xc7, 0x54, 0x60, 0x34, 0x3b, 0x62, 0xcf, 0x28,
|
||||
0x95, 0xa2, 0x08, 0x79, 0xc5, 0x51, 0xf3, 0xe1, 0x88, 0x3b, 0xa0, 0x1d,
|
||||
0x1d, 0x42, 0x5a, 0xba, 0x09, 0xe4, 0x64, 0xa1, 0x83, 0xf4, 0x60, 0x44,
|
||||
0x89, 0xd3, 0xdd, 0x6c, 0x71, 0x7b, 0xd1, 0xb0, 0x28, 0x7b, 0x98, 0xe2,
|
||||
0x4b, 0x99, 0x9a, 0x22, 0xd0, 0xeb, 0x1c, 0x5c, 0xbe, 0x49, 0x1a, 0xcf,
|
||||
0xd7, 0x4b, 0x19, 0xe9, 0xdf, 0x82, 0x21, 0xe3, 0x87, 0x7a, 0x25, 0x58,
|
||||
0x8f, 0x29, 0x0e, 0xce, 0xf4, 0x09, 0x0f, 0x2f, 0x04, 0xe9, 0xd2, 0xf9,
|
||||
0xcc, 0xb7, 0x7a, 0x46, 0x5d, 0x98, 0x05, 0x54, 0x89, 0x8e, 0x09, 0x79,
|
||||
0xa8, 0x6f, 0xf6, 0x12, 0xdd, 0x93, 0x38, 0x83, 0x14, 0x3f, 0x42, 0xcf,
|
||||
0x03, 0x9d, 0x84, 0x9d, 0xe9, 0x6e, 0x9f, 0x87, 0x0f, 0xb8, 0x15, 0x9b,
|
||||
0x9b, 0x4c, 0x32, 0x3b, 0x82, 0x7b, 0x3d, 0xd4, 0x85, 0x1e, 0x71, 0x99,
|
||||
0x67, 0x40, 0x59, 0xad, 0x8c, 0x31, 0xd7, 0xa2, 0x81, 0xfd, 0x46, 0x21,
|
||||
0xd7, 0xc8, 0x89, 0x3d, 0x17, 0x3f, 0x5e, 0x82, 0x5e, 0xfa, 0x7b, 0x34,
|
||||
0x7a, 0x1b, 0x85, 0x86, 0xf8, 0x02, 0xf2, 0xf3, 0x01, 0x2c, 0xbd, 0x4a,
|
||||
0x98, 0x0f, 0xe9, 0x4b, 0x1a, 0xa3, 0xee, 0xfc, 0x77, 0xda, 0xcf, 0xee,
|
||||
0x9c, 0xca, 0xf9, 0xbf, 0xaa, 0x5b, 0xbc, 0x01, 0x4b, 0xd4, 0x74, 0x7c,
|
||||
0xee, 0xfb, 0x7c, 0xc4, 0x31, 0xb7, 0x46, 0x9e, 0x94, 0x84, 0xa3, 0x82,
|
||||
0x0c, 0x7b, 0x61, 0x4e
|
||||
};
|
||||
const int sizeof_ca_ecc_cert_sig = sizeof(ca_ecc_cert_der_sig);
|
||||
|
||||
/* ./ca-cert.der.sign, */
|
||||
const unsigned char ca_cert_der_sig[] =
|
||||
{
|
||||
0x0a, 0xc8, 0xbb, 0x7e, 0x5a, 0x72, 0x6a, 0x5b, 0xf0, 0xc6, 0xbf, 0x36,
|
||||
0x8e, 0xe1, 0xcd, 0xbc, 0x08, 0xfd, 0x22, 0x5a, 0x3b, 0x48, 0x33, 0xb9,
|
||||
0x12, 0x55, 0x80, 0x6c, 0x36, 0x14, 0x05, 0x24, 0x63, 0x20, 0x8b, 0x26,
|
||||
0x69, 0xa9, 0xe3, 0x15, 0xb9, 0x00, 0x8d, 0xea, 0x3a, 0xee, 0x2d, 0x41,
|
||||
0xec, 0x43, 0x4a, 0x17, 0x48, 0x26, 0x4a, 0xd6, 0xe4, 0x1b, 0xa5, 0x97,
|
||||
0x2e, 0xf6, 0x41, 0xa7, 0xa2, 0x2b, 0x83, 0x2c, 0xad, 0x6e, 0x4e, 0xfc,
|
||||
0x57, 0xf1, 0x28, 0xf0, 0xa7, 0xf9, 0x5b, 0x48, 0xab, 0xed, 0x63, 0x22,
|
||||
0xed, 0x1e, 0xf1, 0x9d, 0xab, 0xbf, 0x9c, 0x78, 0x04, 0x49, 0xad, 0xf1,
|
||||
0x43, 0x2f, 0x21, 0x9c, 0x90, 0xb8, 0x35, 0x14, 0x68, 0x12, 0x89, 0x00,
|
||||
0x20, 0x5b, 0x83, 0x52, 0xb7, 0xec, 0x26, 0x01, 0x26, 0xe1, 0x0f, 0xf6,
|
||||
0x98, 0xd1, 0xb6, 0x28, 0x84, 0xc8, 0xa5, 0x3e, 0xe9, 0xfb, 0x19, 0x2e,
|
||||
0x8f, 0xd7, 0x66, 0x98, 0xc0, 0x5e, 0x7b, 0xbc, 0x1a, 0xd9, 0x27, 0xb9,
|
||||
0x76, 0xcc, 0x58, 0x48, 0x0c, 0x0c, 0x22, 0x23, 0x19, 0xfd, 0x22, 0xfa,
|
||||
0x47, 0x90, 0x38, 0x62, 0xe0, 0x91, 0x79, 0x35, 0x3d, 0xa2, 0x83, 0x99,
|
||||
0x2b, 0x86, 0x7a, 0x88, 0x9b, 0x07, 0xe7, 0xc5, 0x95, 0x69, 0x9a, 0x2b,
|
||||
0x2e, 0x47, 0xcf, 0xfd, 0x9e, 0x64, 0xb5, 0xca, 0x44, 0x94, 0x95, 0xf3,
|
||||
0x2a, 0x8f, 0x4a, 0xcf, 0x0f, 0xd4, 0x7e, 0x0d, 0x0f, 0x2a, 0x0b, 0xb6,
|
||||
0x89, 0x64, 0xe3, 0x8c, 0x02, 0x3e, 0x76, 0x66, 0x68, 0x19, 0xa9, 0x07,
|
||||
0x5a, 0xc6, 0x33, 0xcd, 0x27, 0xff, 0x07, 0xd4, 0x91, 0x5b, 0x11, 0x3a,
|
||||
0xe3, 0xf5, 0x69, 0x70, 0xa7, 0xfe, 0xf2, 0xf0, 0xbd, 0x11, 0xaf, 0xa7,
|
||||
0x37, 0xda, 0x24, 0x75, 0x3e, 0x1a, 0x39, 0x49, 0xb4, 0x1e, 0x0e, 0xaf,
|
||||
0x5d, 0x1e, 0x94, 0xdf
|
||||
};
|
||||
const int sizeof_ca_cert_sig = sizeof(ca_cert_der_sig);
|
||||
/* ./client-cert.der.sign, */
|
||||
const unsigned char client_cert_der_sign[] =
|
||||
{
|
||||
0x9a, 0x0e, 0xbc, 0x0f, 0x7a, 0xbe, 0xb6, 0x47, 0x79, 0x71, 0xcc, 0x51,
|
||||
0x87, 0xaa, 0x28, 0xbd, 0x9c, 0x04, 0x08, 0x0b, 0xb9, 0x78, 0x84, 0xeb,
|
||||
0x1d, 0xf9, 0x0e, 0x38, 0x23, 0xfe, 0x8f, 0x6e, 0x75, 0x21, 0xcc, 0x39,
|
||||
0x79, 0xf8, 0x9d, 0x80, 0x6b, 0xa9, 0x63, 0x79, 0x13, 0xd8, 0xc9, 0x5d,
|
||||
0xd5, 0x84, 0x17, 0xdc, 0xe4, 0x56, 0xae, 0x55, 0x64, 0x69, 0x8c, 0x95,
|
||||
0xa4, 0x03, 0xc1, 0x4a, 0xe8, 0xb6, 0xd5, 0x1b, 0xfa, 0x26, 0x3f, 0x2c,
|
||||
0xff, 0xfc, 0xea, 0x83, 0xca, 0xf7, 0x4d, 0x9e, 0xf4, 0xbf, 0xca, 0xb6,
|
||||
0x19, 0x46, 0x55, 0x45, 0xf4, 0x7d, 0xcd, 0x4b, 0xbc, 0x3d, 0xb7, 0xff,
|
||||
0x57, 0xbf, 0xe8, 0x0e, 0xbc, 0x16, 0x45, 0xa1, 0xdb, 0xf0, 0xb4, 0x44,
|
||||
0x64, 0x76, 0x0b, 0xe5, 0x86, 0x32, 0xbe, 0xd7, 0xf0, 0x26, 0x6c, 0x48,
|
||||
0xb6, 0x7f, 0x1a, 0x2a, 0xe6, 0x1b, 0xbd, 0x5b, 0x9e, 0xca, 0xd0, 0xf4,
|
||||
0xbb, 0xe4, 0x7f, 0x29, 0x66, 0xf6, 0x31, 0x6d, 0x70, 0x6f, 0xfd, 0x4d,
|
||||
0x7f, 0xc8, 0x7f, 0x9a, 0x5b, 0x1e, 0x37, 0xf7, 0x0c, 0x66, 0xb2, 0x62,
|
||||
0xd8, 0x3e, 0xca, 0x79, 0x6c, 0xec, 0x05, 0x01, 0xda, 0xd9, 0xe2, 0xc3,
|
||||
0xd5, 0x9b, 0xf9, 0x43, 0xa6, 0x14, 0x9a, 0x1f, 0x32, 0xd3, 0x68, 0x63,
|
||||
0x65, 0xb8, 0xb1, 0x63, 0xd5, 0xe2, 0xaa, 0x06, 0x27, 0x62, 0x4a, 0x95,
|
||||
0x48, 0x3f, 0xee, 0xde, 0x3b, 0x89, 0xd4, 0x61, 0x74, 0x39, 0xef, 0xe6,
|
||||
0x6e, 0x16, 0x2d, 0x8b, 0x54, 0x29, 0xe9, 0x71, 0xbc, 0xd4, 0x30, 0x42,
|
||||
0x35, 0x1e, 0x89, 0xfb, 0xf7, 0x4a, 0x47, 0x87, 0x41, 0x66, 0x49, 0xe5,
|
||||
0x8e, 0x16, 0x7f, 0x17, 0x07, 0xd6, 0xff, 0xe1, 0x2a, 0x4d, 0x7c, 0x70,
|
||||
0x0d, 0x72, 0x5d, 0x3d, 0x1f, 0xd8, 0x41, 0x1a, 0x43, 0x00, 0x31, 0x81,
|
||||
0x60, 0xa8, 0x6c, 0xef
|
||||
};
|
||||
const int sizeof_client_cert_der_sign = sizeof(client_cert_der_sign);
|
||||
|
||||
uint32_t s_inst1[R_TSIP_SINST_WORD_SIZE] = { 0 };
|
||||
uint32_t s_inst2[R_TSIP_SINST2_WORD_SIZE]= { 0 };
|
||||
#endif
|
||||
58
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/test/src/key_data.h
vendored
Normal file
58
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/test/src/key_data.h
vendored
Normal file
@@ -0,0 +1,58 @@
|
||||
/* key_data.h
|
||||
*
|
||||
* Copyright (C) 2006-2022 wolfSSL Inc.
|
||||
*
|
||||
* This file is part of wolfSSL.
|
||||
*
|
||||
* wolfSSL is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* wolfSSL is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
*/
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
#ifndef KEY_DATA_H_
|
||||
#define KEY_DATA_H_
|
||||
|
||||
#include <wolfssl/wolfcrypt/settings.h>
|
||||
|
||||
|
||||
#if defined(WOLFSSL_RENESAS_TSIP)
|
||||
|
||||
#include "r_tsip_rx_if.h"
|
||||
|
||||
typedef struct st_key_block_data
|
||||
{
|
||||
uint8_t encrypted_provisioning_key[R_TSIP_AES_CBC_IV_BYTE_SIZE * 2];
|
||||
uint8_t iv[R_TSIP_AES_CBC_IV_BYTE_SIZE];
|
||||
uint8_t encrypted_user_rsa2048_ne_key[R_TSIP_RSA2048_NE_KEY_BYTE_SIZE + 16];
|
||||
uint8_t encrypted_user_update_key[R_TSIP_AES256_KEY_BYTE_SIZE + 16];
|
||||
uint8_t encrypted_user_rsa2048_private_key[R_TSIP_RSA2048_ND_KEY_BYTE_SIZE + 16];
|
||||
uint8_t encrypted_user_ecc256_private_key[R_TSIP_ECC_PRIVATE_KEY_BYTE_SIZE + 16];
|
||||
} st_key_block_data_t;
|
||||
|
||||
|
||||
extern const uint32_t encrypted_user_key_type;
|
||||
extern const st_key_block_data_t g_key_block_data;
|
||||
|
||||
extern const unsigned char ca_cert_der_sig[];
|
||||
extern const unsigned char ca_ecc_cert_der_sig[];
|
||||
extern const unsigned char client_cert_der_sign[];
|
||||
extern const int sizeof_ca_cert_der;
|
||||
|
||||
|
||||
#endif /* WOLFSSL_RENESAS_TSIP */
|
||||
#endif /* KEY_DATA_H_ */
|
||||
|
||||
317
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/test/src/test_main.c
vendored
Normal file
317
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/test/src/test_main.c
vendored
Normal file
@@ -0,0 +1,317 @@
|
||||
/* test_main.c
|
||||
*
|
||||
* Copyright (C) 2006-2022 wolfSSL Inc.
|
||||
*
|
||||
* This file is part of wolfSSL.
|
||||
*
|
||||
* wolfSSL is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* wolfSSL is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
*/
|
||||
|
||||
|
||||
#include "stdio.h"
|
||||
#include "stdint.h"
|
||||
#include <wolfssl/wolfcrypt/settings.h>
|
||||
#include "wolfssl/wolfcrypt/types.h"
|
||||
#include "wolfssl_demo.h"
|
||||
|
||||
void main(void);
|
||||
#ifdef __cplusplus
|
||||
extern "C" {
|
||||
|
||||
}
|
||||
#endif
|
||||
|
||||
|
||||
#if defined(TLS_CLIENT) || defined(TLS_SERVER)
|
||||
#include "r_tsip_rx_if.h"
|
||||
#include "r_t4_itcpip.h"
|
||||
#include "r_sys_time_rx_if.h"
|
||||
#include "Pin.h"
|
||||
|
||||
#define T4_WORK_SIZE (14800)
|
||||
static UW tcpudp_work[(T4_WORK_SIZE / 4) + 1];
|
||||
#endif
|
||||
|
||||
#if defined(WOLFSSL_RENESAS_TSIP_TLS)
|
||||
#include "key_data.h"
|
||||
#include <wolfssl/wolfcrypt/port/Renesas/renesas-tsip-crypt.h>
|
||||
|
||||
extern const st_key_block_data_t g_key_block_data;
|
||||
user_PKCbInfo guser_PKCbInfo;
|
||||
#endif
|
||||
|
||||
#if defined(TLS_CLIENT)
|
||||
#if defined(WOLFSSL_RENESAS_TSIP_TLS) && defined(WOLFSSL_STATIC_MEMORY)
|
||||
#include <wolfssl/wolfcrypt/memory.h>
|
||||
WOLFSSL_HEAP_HINT* heapHint = NULL;
|
||||
|
||||
#define BUFFSIZE_GEN (110 * 1024)
|
||||
unsigned char heapBufGen[BUFFSIZE_GEN];
|
||||
|
||||
#endif /* WOLFSSL_RENESAS_TSIP_TLS && WOLFSSL_STATIC_MEMORY */
|
||||
#endif /* TLS_CLIENT */
|
||||
|
||||
static long tick;
|
||||
static void timeTick(void *pdata)
|
||||
{
|
||||
tick++;
|
||||
}
|
||||
|
||||
typedef struct func_args {
|
||||
int argc;
|
||||
char** argv;
|
||||
int return_code;
|
||||
} func_args;
|
||||
|
||||
|
||||
void wolfcrypt_test(func_args args);
|
||||
int benchmark_test(void *args);
|
||||
|
||||
double current_time(int reset)
|
||||
{
|
||||
if(reset) tick = 0 ;
|
||||
return ((double)tick/FREQ) ;
|
||||
}
|
||||
|
||||
#if defined(TLS_CLIENT) || defined(TLS_SERVER)
|
||||
|
||||
int SetTsiptlsKey()
|
||||
{
|
||||
#if defined(WOLFSSL_RENESAS_TSIP) && (WOLFSSL_RENESAS_TSIP_VER >=109)
|
||||
|
||||
#if defined(TLS_CLIENT)
|
||||
|
||||
#if defined(USE_ECC_CERT)
|
||||
/* Root CA cert has ECC-P256 public key */
|
||||
tsip_inform_cert_sign((const byte *)ca_ecc_cert_der_sig);
|
||||
#else
|
||||
/* Root CA cert has RSA public key */
|
||||
tsip_inform_cert_sign((const byte *)ca_cert_der_sig);
|
||||
#endif
|
||||
|
||||
tsip_inform_user_keys_ex(
|
||||
(byte*)&g_key_block_data.encrypted_provisioning_key,
|
||||
(byte*)&g_key_block_data.iv,
|
||||
(byte*)&g_key_block_data.encrypted_user_rsa2048_ne_key,
|
||||
encrypted_user_key_type);
|
||||
|
||||
|
||||
#elif defined(TLS_SERVER)
|
||||
|
||||
tsip_inform_cert_sign((const byte *)client_cert_der_sign);
|
||||
tsip_inform_user_keys_ex(
|
||||
(byte *)&g_key_block_data.encrypted_provisioning_key,
|
||||
(byte *)&g_key_block_data.iv,
|
||||
(byte *)&g_key_block_data.encrypted_user_rsa2048_ne_key,
|
||||
encrypted_user_key_type);
|
||||
|
||||
#endif
|
||||
|
||||
#elif defined(WOLFSSL_RENESAS_TSIP) && (WOLFSSL_RENESAS_TSIP_VER < 109)
|
||||
|
||||
#if defined(TLS_CLIENT)
|
||||
|
||||
tsip_inform_cert_sign((const byte *)ca_cert_sig);
|
||||
tsip_inform_user_keys((byte*)&g_key_block_data.encrypted_session_key,
|
||||
(byte*)&g_key_block_data.iv,
|
||||
(byte*)&g_key_block_data.encrypted_user_rsa2048_ne_key);
|
||||
|
||||
#elif defined(TLS_SERVER)
|
||||
|
||||
tsip_inform_cert_sign((const byte *)client_cert_der_sign);
|
||||
tsip_inform_user_keys((byte*)&g_key_block_data.encrypted_session_key,
|
||||
(byte*)&g_key_block_data.iv,
|
||||
(byte*)&g_key_block_data.encrypted_user_rsa2048_ne_key);
|
||||
|
||||
#endif
|
||||
|
||||
#endif
|
||||
return 0;
|
||||
}
|
||||
|
||||
int Open_tcp( )
|
||||
{
|
||||
ER ercd;
|
||||
W size;
|
||||
sys_time_err_t sys_ercd;
|
||||
char ver[128];
|
||||
|
||||
/* initialize TSIP since t4 seems to call R_TSIP_RandomNumber */
|
||||
R_TSIP_Open(NULL,NULL);
|
||||
|
||||
/* cast from uint8_t to char* */
|
||||
strcpy(ver, (char*)R_t4_version.library);
|
||||
|
||||
sys_ercd = R_SYS_TIME_Open();
|
||||
if (sys_ercd != SYS_TIME_SUCCESS) {
|
||||
printf("ERROR : R_SYS_TIME_Open() failed\n");
|
||||
return -1;
|
||||
}
|
||||
R_Pins_Create();
|
||||
/* start LAN controller */
|
||||
ercd = lan_open();
|
||||
/* initialize TCP/IP */
|
||||
size = tcpudp_get_ramsize();
|
||||
if (size > (sizeof(tcpudp_work))) {
|
||||
printf("size > (sizeof(tcpudp_work))!\n");
|
||||
return -1;
|
||||
}
|
||||
ercd = tcpudp_open(tcpudp_work);
|
||||
if (ercd != E_OK) {
|
||||
printf("ERROR : tcpudp_open failed\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
void Close_tcp()
|
||||
{
|
||||
/* end TCP/IP */
|
||||
tcpudp_close();
|
||||
lan_close();
|
||||
R_SYS_TIME_Close();
|
||||
R_TSIP_Close();
|
||||
}
|
||||
#endif
|
||||
|
||||
void main(void)
|
||||
{
|
||||
int i = 0;
|
||||
int ret;
|
||||
int doClientCheck = 0;
|
||||
uint32_t channel;
|
||||
|
||||
#if defined(WOLFSSL_RENESAS_TSIP_TLS) && \
|
||||
defined(TLS_CLIENT)
|
||||
#ifdef USE_ECC_CERT
|
||||
const char* cipherlist[] = {
|
||||
#if defined(WOLFSSL_TLS13)
|
||||
"TLS13-AES128-GCM-SHA256",
|
||||
"TLS13-AES128-CCM-SHA256",
|
||||
#endif
|
||||
"ECDHE-ECDSA-AES128-GCM-SHA256",
|
||||
"ECDHE-ECDSA-AES128-SHA256"
|
||||
};
|
||||
int cipherlist_sz;
|
||||
#if defined(WOLFSSL_TLS13)
|
||||
cipherlist_sz = 2;
|
||||
#else
|
||||
cipherlist_sz = 2;
|
||||
#endif
|
||||
|
||||
#else
|
||||
const char* cipherlist[] = {
|
||||
#if defined(WOLFSSL_TLS13)
|
||||
"TLS13-AES128-GCM-SHA256",
|
||||
"TLS13-AES128-CCM-SHA256",
|
||||
#endif
|
||||
"ECDHE-RSA-AES128-GCM-SHA256",
|
||||
"ECDHE-RSA-AES128-SHA256",
|
||||
"AES128-SHA",
|
||||
"AES128-SHA256",
|
||||
"AES256-SHA",
|
||||
"AES256-SHA256"
|
||||
};
|
||||
int cipherlist_sz;
|
||||
#if defined(WOLFSSL_TLS13)
|
||||
cipherlist_sz = 2;
|
||||
#else
|
||||
cipherlist_sz = 6;
|
||||
#endif /* WOLFSSL_TLS13 */
|
||||
|
||||
#endif
|
||||
#endif
|
||||
|
||||
(void)timeTick;
|
||||
(void)i;
|
||||
(void)ret;
|
||||
(void)channel;
|
||||
(void)doClientCheck;
|
||||
|
||||
#if defined(CRYPT_TEST) || defined(BENCHMARK)
|
||||
#if defined(CRYPT_TEST)
|
||||
func_args args = { 0 };
|
||||
|
||||
if ((ret = wolfCrypt_Init()) != 0) {
|
||||
printf("wolfCrypt_Init failed %d\n", ret);
|
||||
}
|
||||
|
||||
printf("Start wolfCrypt Test\n");
|
||||
wolfcrypt_test(args);
|
||||
printf("End wolfCrypt Test\n");
|
||||
|
||||
if ((ret = wolfCrypt_Cleanup()) != 0) {
|
||||
printf("wolfCrypt_Cleanup failed %d\n", ret);
|
||||
}
|
||||
#endif
|
||||
#if defined(BENCHMARK)
|
||||
#include "r_cmt_rx_if.h"
|
||||
|
||||
R_CMT_CreatePeriodic(FREQ, &timeTick, &channel);
|
||||
|
||||
printf("Start wolfCrypt Benchmark\n");
|
||||
benchmark_test(NULL);
|
||||
printf("End wolfCrypt Benchmark\n");
|
||||
#endif
|
||||
#elif defined(TLS_CLIENT)
|
||||
#include "r_cmt_rx_if.h"
|
||||
|
||||
|
||||
#if defined(WOLFSSL_STATIC_MEMORY)
|
||||
if (wc_LoadStaticMemory(&heapHint, heapBufGen, sizeof(heapBufGen),
|
||||
WOLFMEM_GENERAL, 1) !=0) {
|
||||
printf("unable to load static memory.\n");
|
||||
return;
|
||||
}
|
||||
#endif /* WOLFSSL_STATIC_MEMORY */
|
||||
|
||||
Open_tcp();
|
||||
|
||||
#if defined(WOLFSSL_RENESAS_TSIP_TLS)
|
||||
SetTsiptlsKey();
|
||||
#endif
|
||||
|
||||
do {
|
||||
if(cipherlist_sz > 0 ) printf("cipher : %s\n", cipherlist[i]);
|
||||
|
||||
wolfSSL_TLS_client_init(cipherlist[i]);
|
||||
|
||||
wolfSSL_TLS_client();
|
||||
|
||||
i++;
|
||||
} while (i < cipherlist_sz);
|
||||
|
||||
Close_tcp();
|
||||
#elif defined(TLS_SERVER)
|
||||
|
||||
Open_tcp();
|
||||
#if defined(WOLFSSL_RENESAS_TSIP)
|
||||
SetTsiptlsKey();
|
||||
#endif
|
||||
|
||||
wolfSSL_TLS_server_init(doClientCheck);
|
||||
wolfSSL_TLS_server();
|
||||
|
||||
Close_tcp();
|
||||
#endif
|
||||
}
|
||||
|
||||
#ifdef __cplusplus
|
||||
void abort(void)
|
||||
{
|
||||
|
||||
}
|
||||
#endif
|
||||
324
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/test/src/wolf_client.c
vendored
Normal file
324
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/test/src/wolf_client.c
vendored
Normal file
@@ -0,0 +1,324 @@
|
||||
/* wolf_client.c
|
||||
*
|
||||
* Copyright (C) 2006-2022 wolfSSL Inc.
|
||||
*
|
||||
* This file is part of wolfSSL.
|
||||
*
|
||||
* wolfSSL is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* wolfSSL is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
#include "r_t4_itcpip.h"
|
||||
#include "wolfssl/wolfcrypt/settings.h"
|
||||
#include "wolfssl/ssl.h"
|
||||
#include "wolfssl/certs_test.h"
|
||||
#include "key_data.h"
|
||||
#include "wolfssl_demo.h"
|
||||
#if defined(WOLFSSL_RENESAS_TSIP_TLS)
|
||||
#include <wolfssl/wolfcrypt/port/Renesas/renesas-tsip-crypt.h>
|
||||
#endif
|
||||
|
||||
#define SIMPLE_TLSSEVER_IP "192.168.1.12"
|
||||
#define SIMPLE_TLSSERVER_PORT "11111"
|
||||
|
||||
ER t4_tcp_callback(ID cepid, FN fncd , VP p_parblk);
|
||||
|
||||
static WOLFSSL_CTX *client_ctx;
|
||||
|
||||
#if defined(WOLFSSL_RENESAS_TSIP_TLS)
|
||||
uint32_t g_encrypted_root_public_key[140];
|
||||
static TsipUserCtx userContext;
|
||||
#endif
|
||||
|
||||
#if defined(TLS_CLIENT)
|
||||
#if defined(WOLFSSL_RENESAS_TSIP_TLS) && defined(WOLFSSL_STATIC_MEMORY)
|
||||
|
||||
extern WOLFSSL_HEAP_HINT* heapHint;
|
||||
|
||||
#define BUFFSIZE_IO (16 * 1024)
|
||||
unsigned char heapBufIO[BUFFSIZE_IO];
|
||||
|
||||
#endif /* WOLFSSL_RENESAS_TSIP_TLS && WOLFSSL_STATIC_MEMORY */
|
||||
#endif /* TLS_CLIENT */
|
||||
|
||||
static int my_IORecv(WOLFSSL* ssl, char* buff, int sz, void* ctx)
|
||||
{
|
||||
int ret;
|
||||
ID cepid;
|
||||
|
||||
if(ctx != NULL)
|
||||
cepid = *(ID *)ctx;
|
||||
else
|
||||
return WOLFSSL_CBIO_ERR_GENERAL;
|
||||
|
||||
ret = tcp_rcv_dat(cepid, buff, sz, TMO_FEVR);
|
||||
if(ret > 0)
|
||||
return ret;
|
||||
else
|
||||
return WOLFSSL_CBIO_ERR_GENERAL;
|
||||
}
|
||||
|
||||
static int my_IOSend(WOLFSSL* ssl, char* buff, int sz, void* ctx)
|
||||
{
|
||||
int ret;
|
||||
ID cepid;
|
||||
|
||||
if(ctx != NULL)
|
||||
cepid = *(ID *)ctx;
|
||||
else
|
||||
return WOLFSSL_CBIO_ERR_GENERAL;
|
||||
|
||||
ret = tcp_snd_dat(cepid, buff, sz, TMO_FEVR);
|
||||
if(ret == sz)
|
||||
return ret;
|
||||
else
|
||||
return WOLFSSL_CBIO_ERR_GENERAL;
|
||||
}
|
||||
|
||||
static int getIPaddr(char *arg)
|
||||
{
|
||||
int a1, a2, a3, a4;
|
||||
if(sscanf(arg, "%d.%d.%d.%d", &a1, &a2, &a3, &a4) == 4)
|
||||
return (a1 << 24) | (a2 << 16) | (a3 << 8) | a4;
|
||||
else return 0;
|
||||
}
|
||||
|
||||
static int getPort(char *arg)
|
||||
{
|
||||
int port;
|
||||
if(sscanf(arg, "%d", &port) == 1)
|
||||
return port;
|
||||
else return 0;
|
||||
}
|
||||
|
||||
void wolfSSL_TLS_client_init(const char* cipherlist)
|
||||
{
|
||||
|
||||
#ifndef NO_FILESYSTEM
|
||||
#ifdef USE_ECC_CERT
|
||||
char *cert = "./certs/ca-ecc-cert.pem";
|
||||
#else
|
||||
char *cert = "./certs/ca-cert.pem";
|
||||
#endif
|
||||
#else
|
||||
#if defined(USE_ECC_CERT) && defined(USE_CERT_BUFFERS_256)
|
||||
const unsigned char *cert = ca_ecc_cert_der_256;
|
||||
#define SIZEOF_CERT sizeof_ca_ecc_cert_der_256
|
||||
#else
|
||||
const unsigned char *cert = ca_cert_der_2048;
|
||||
#define SIZEOF_CERT sizeof_ca_cert_der_2048
|
||||
#endif
|
||||
#endif
|
||||
|
||||
wolfSSL_Init();
|
||||
#ifdef DEBUG_WOLFSSL
|
||||
wolfSSL_Debugging_ON();
|
||||
#endif
|
||||
|
||||
#if defined(WOLFSSL_STATIC_MEMORY)
|
||||
|
||||
if ((client_ctx = wolfSSL_CTX_new_ex(wolfSSLv23_client_method_ex(heapHint),
|
||||
heapHint)) == NULL) {
|
||||
printf("ERROR: faild to create WOLFSSL_CTX\n");
|
||||
return;
|
||||
}
|
||||
|
||||
if ((wolfSSL_CTX_load_static_memory(&client_ctx, NULL, heapBufIO,
|
||||
sizeof(heapBufIO), WOLFMEM_IO_POOL, 10)) != WOLFSSL_SUCCESS) {
|
||||
printf("ERROR: faild to set static memory for IO\n");
|
||||
return;
|
||||
}
|
||||
|
||||
#else
|
||||
|
||||
/* Create and initialize WOLFSSL_CTX */
|
||||
if ((client_ctx =
|
||||
wolfSSL_CTX_new(wolfSSLv23_client_method_ex((void *)NULL))) == NULL) {
|
||||
printf("ERROR: failed to create WOLFSSL_CTX\n");
|
||||
return;
|
||||
}
|
||||
#endif /* WOLFSSL_STATIC_MEMORY */
|
||||
|
||||
#ifdef WOLFSSL_RENESAS_TSIP_TLS
|
||||
tsip_set_callbacks(client_ctx);
|
||||
#endif
|
||||
|
||||
#if !defined(NO_FILESYSTEM)
|
||||
if (wolfSSL_CTX_load_verify_locations(client_ctx, cert, 0) != SSL_SUCCESS) {
|
||||
printf("ERROR: can't load \"%s\"\n", cert);
|
||||
return;
|
||||
}
|
||||
#else
|
||||
if (wolfSSL_CTX_load_verify_buffer(client_ctx, cert, SIZEOF_CERT,
|
||||
SSL_FILETYPE_ASN1) != SSL_SUCCESS){
|
||||
printf("ERROR: can't load certificate data\n");
|
||||
return;
|
||||
}
|
||||
|
||||
|
||||
/* load client certificate */
|
||||
#ifdef USE_ECC_CERT
|
||||
if (wolfSSL_CTX_use_certificate_chain_buffer_format(client_ctx,
|
||||
cliecc_cert_der_256,
|
||||
sizeof_cliecc_cert_der_256,
|
||||
WOLFSSL_FILETYPE_ASN1) != SSL_SUCCESS) {
|
||||
printf("ERROR: can't load client-certificate\n");
|
||||
return;
|
||||
}
|
||||
|
||||
/* set client private key data */
|
||||
#if defined(WOLFSSL_TLS13) && defined(WOLFSSL_RENESAS_TSIP_TLS) && \
|
||||
(WOLFSSL_RENESAS_TSIP_VER >= 115 )
|
||||
if (tsip_set_clientPrivateKeyEnc(
|
||||
g_key_block_data.encrypted_user_ecc256_private_key,
|
||||
TSIP_ECCP256) != 0) {
|
||||
printf("ERROR: can't load client-private key\n");
|
||||
return;
|
||||
}
|
||||
#endif
|
||||
if (wolfSSL_CTX_use_PrivateKey_buffer(client_ctx,
|
||||
ecc_clikey_der_256,
|
||||
sizeof_ecc_clikey_der_256,
|
||||
SSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
||||
printf("ERROR: can't load private-key data.\n");
|
||||
return;
|
||||
}
|
||||
|
||||
#else
|
||||
if (wolfSSL_CTX_use_certificate_chain_buffer_format(client_ctx,
|
||||
client_cert_der_2048,
|
||||
sizeof_client_cert_der_2048,
|
||||
WOLFSSL_FILETYPE_ASN1) != SSL_SUCCESS) {
|
||||
printf("ERROR: can't load client-certificate\n");
|
||||
return;
|
||||
}
|
||||
|
||||
/* set client private key data */
|
||||
|
||||
if (wolfSSL_CTX_use_PrivateKey_buffer(client_ctx, client_key_der_2048,
|
||||
sizeof_client_key_der_2048, SSL_FILETYPE_ASN1)
|
||||
!= WOLFSSL_SUCCESS) {
|
||||
printf("ERROR: can't load private-key data.\n");
|
||||
return;
|
||||
}
|
||||
|
||||
|
||||
#endif /* USE_ECC_CERT */
|
||||
#endif /* !NO_FILESYSTEM */
|
||||
|
||||
/* Register callbacks */
|
||||
wolfSSL_SetIORecv(client_ctx, my_IORecv);
|
||||
wolfSSL_SetIOSend(client_ctx, my_IOSend);
|
||||
|
||||
/* use specific cipher */
|
||||
if (cipherlist != NULL &&
|
||||
wolfSSL_CTX_set_cipher_list(client_ctx, cipherlist) != WOLFSSL_SUCCESS) {
|
||||
wolfSSL_CTX_free(client_ctx); client_ctx = NULL;
|
||||
printf("client can't set cipher list");
|
||||
return;
|
||||
}
|
||||
|
||||
#if defined(WOLFSSL_TLS13) && (WOLFSSL_RENESAS_TSIP_VER >= 115)
|
||||
if (wolfSSL_CTX_UseSupportedCurve(client_ctx, WOLFSSL_ECC_SECP256R1)
|
||||
!= WOLFSSL_SUCCESS) {
|
||||
wolfSSL_CTX_free(client_ctx); client_ctx = NULL;
|
||||
printf("client can't set use supported curves\n");
|
||||
return;
|
||||
}
|
||||
#endif
|
||||
}
|
||||
|
||||
void wolfSSL_TLS_client( )
|
||||
{
|
||||
ID cepid = 1;
|
||||
ER ercd;
|
||||
int ret;
|
||||
WOLFSSL_CTX *ctx = (WOLFSSL_CTX *)client_ctx;
|
||||
WOLFSSL *ssl = NULL;
|
||||
|
||||
#define BUFF_SIZE 256
|
||||
static const char sendBuff[]= "Hello Server\n" ;
|
||||
|
||||
char rcvBuff[BUFF_SIZE] = {0};
|
||||
|
||||
static T_IPV4EP my_addr = { 0, 0 };
|
||||
|
||||
T_IPV4EP dst_addr;
|
||||
|
||||
if((dst_addr.ipaddr = getIPaddr(SIMPLE_TLSSEVER_IP)) == 0){
|
||||
printf("ERROR: IP address\n");
|
||||
goto out;
|
||||
}
|
||||
if((dst_addr.portno = getPort(SIMPLE_TLSSERVER_PORT)) == 0){
|
||||
printf("ERROR: IP address\n");
|
||||
goto out;
|
||||
}
|
||||
|
||||
if((ercd = tcp_con_cep(cepid, &my_addr, &dst_addr, TMO_FEVR)) != E_OK) {
|
||||
printf("ERROR TCP Connect: %d\n", ercd);
|
||||
goto out;
|
||||
}
|
||||
|
||||
if((ssl = wolfSSL_new(ctx)) == NULL) {
|
||||
printf("ERROR wolfSSL_new: %d\n", wolfSSL_get_error(ssl, 0));
|
||||
goto out;
|
||||
}
|
||||
|
||||
#ifdef WOLFSSL_RENESAS_TSIP_TLS
|
||||
tsip_set_callback_ctx(ssl, &userContext);
|
||||
#endif
|
||||
|
||||
/* set callback context */
|
||||
wolfSSL_SetIOReadCtx(ssl, (void *)&cepid);
|
||||
wolfSSL_SetIOWriteCtx(ssl, (void *)&cepid);
|
||||
|
||||
|
||||
if(wolfSSL_connect(ssl) != SSL_SUCCESS) {
|
||||
printf("ERROR SSL connect: %d\n", wolfSSL_get_error(ssl, 0));
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (wolfSSL_write(ssl, sendBuff, strlen(sendBuff)) != strlen(sendBuff)) {
|
||||
printf("ERROR SSL write: %d\n", wolfSSL_get_error(ssl, 0));
|
||||
goto out;
|
||||
}
|
||||
|
||||
if ((ret=wolfSSL_read(ssl, rcvBuff, BUFF_SIZE)) < 0) {
|
||||
printf("ERROR SSL read: %d\n", wolfSSL_get_error(ssl, 0));
|
||||
goto out;
|
||||
}
|
||||
|
||||
rcvBuff[ret] = '\0' ;
|
||||
printf("Received: %s\n\n", rcvBuff);
|
||||
|
||||
out:
|
||||
|
||||
/* frees all data before client termination */
|
||||
if(ssl) {
|
||||
wolfSSL_shutdown(ssl);
|
||||
wolfSSL_free(ssl);
|
||||
}
|
||||
if(ctx) {
|
||||
wolfSSL_CTX_free(ctx);
|
||||
}
|
||||
|
||||
wolfSSL_Cleanup();
|
||||
|
||||
tcp_sht_cep(cepid);
|
||||
tcp_cls_cep(cepid, TMO_FEVR);
|
||||
|
||||
return;
|
||||
}
|
||||
214
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/test/src/wolf_server.c
vendored
Normal file
214
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/test/src/wolf_server.c
vendored
Normal file
@@ -0,0 +1,214 @@
|
||||
/* wolf_server.c
|
||||
*
|
||||
* Copyright (C) 2006-2022 wolfSSL Inc.
|
||||
*
|
||||
* This file is part of wolfSSL.
|
||||
*
|
||||
* wolfSSL is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* wolfSSL is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
*/
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
#include "r_t4_itcpip.h"
|
||||
|
||||
#include "wolfssl/wolfcrypt/settings.h"
|
||||
#include "wolfssl/ssl.h"
|
||||
#include "wolfssl/certs_test.h"
|
||||
#include "wolfssl_demo.h"
|
||||
|
||||
static WOLFSSL_CTX *server_ctx;
|
||||
static byte doCliCertCheck;
|
||||
|
||||
static int my_IORecv(WOLFSSL* ssl, char* buff, int sz, void* ctx)
|
||||
{
|
||||
int ret;
|
||||
ID cepid;
|
||||
|
||||
if(ctx != NULL)
|
||||
cepid = *(ID *)ctx;
|
||||
else
|
||||
return WOLFSSL_CBIO_ERR_GENERAL;
|
||||
|
||||
ret = tcp_rcv_dat(cepid, buff, sz, TMO_FEVR);
|
||||
if(ret == sz)
|
||||
return ret;
|
||||
else
|
||||
return WOLFSSL_CBIO_ERR_GENERAL;
|
||||
}
|
||||
|
||||
static int my_IOSend(WOLFSSL* ssl, char* buff, int sz, void* ctx)
|
||||
{
|
||||
int ret;
|
||||
ID cepid;
|
||||
|
||||
if(ctx != NULL)
|
||||
cepid = *(ID *)ctx;
|
||||
else
|
||||
return WOLFSSL_CBIO_ERR_GENERAL;
|
||||
|
||||
ret = tcp_snd_dat(cepid, buff, sz, TMO_FEVR);
|
||||
if(ret == sz)
|
||||
return ret;
|
||||
else
|
||||
return WOLFSSL_CBIO_ERR_GENERAL;
|
||||
}
|
||||
|
||||
|
||||
void wolfSSL_TLS_server_init(byte doClientCheck)
|
||||
{
|
||||
|
||||
int ret;
|
||||
|
||||
|
||||
#ifndef NO_FILESYSTEM
|
||||
#ifdef USE_ECC_CERT
|
||||
char *cert = "./certs/server-ecc-cert.pem";
|
||||
char *key = "./certs/server-ecc-key.pem";
|
||||
#else
|
||||
char *cert = "./certs/server-cert.pem";
|
||||
char *key = "./certs/server-key.pem";
|
||||
#endif
|
||||
char *clientCert = "./certs/client-cert.pem";
|
||||
#else
|
||||
#if defined(USE_ECC_CERT) && defined(USE_CERT_BUFFERS_256)
|
||||
const unsigned char *cert = serv_ecc_der_256;
|
||||
#define sizeof_cert sizeof_serv_ecc_der_256
|
||||
const unsigned char *key = NULL;
|
||||
#define sizeof_key NULL
|
||||
const unsigned char *clientCert = NULL;
|
||||
#define sizeof_clicert NULL
|
||||
#else
|
||||
const unsigned char *cert = server_cert_der_2048;
|
||||
#define sizeof_cert sizeof_server_cert_der_2048
|
||||
const unsigned char *key = server_key_der_2048;
|
||||
#define sizeof_key sizeof_server_key_der_2048
|
||||
const unsigned char *clientCert = client_cert_der_2048;
|
||||
#define sizeof_clicert sizeof_client_cert_der_2048
|
||||
#endif
|
||||
#endif
|
||||
|
||||
|
||||
wolfSSL_Init();
|
||||
#ifdef DEBUG_WOLFSSL
|
||||
wolfSSL_Debugging_ON();
|
||||
#endif
|
||||
|
||||
/* Create and initialize WOLFSSL_CTX */
|
||||
if ((server_ctx = wolfSSL_CTX_new(wolfSSLv23_server_method_ex((void *)NULL)))
|
||||
== NULL) {
|
||||
printf("ERROR: failed to create WOLFSSL_CTX\n");
|
||||
return;
|
||||
}
|
||||
|
||||
#if !defined(NO_FILESYSTEM)
|
||||
ret = wolfSSL_CTX_use_certificate_file(server_ctx, cert, 0);
|
||||
#else
|
||||
ret = wolfSSL_CTX_use_certificate_buffer(server_ctx, cert,
|
||||
sizeof_cert, SSL_FILETYPE_ASN1);
|
||||
#endif
|
||||
if (ret != SSL_SUCCESS) {
|
||||
printf("Error %d loading server-cert!\n", ret);
|
||||
return;
|
||||
}
|
||||
|
||||
/* Load server key into WOLFSSL_CTX */
|
||||
#if !defined(NO_FILESYSTEM)
|
||||
ret = wolfSSL_CTX_use_PrivateKey_file(server_ctx, key, 0);
|
||||
#else
|
||||
ret = wolfSSL_CTX_use_PrivateKey_buffer(server_ctx, key, sizeof_key,
|
||||
SSL_FILETYPE_ASN1);
|
||||
#endif
|
||||
if (ret != SSL_SUCCESS) {
|
||||
printf("Error %d loading server-key!\n", ret);
|
||||
return;
|
||||
}
|
||||
#if defined(WOLFSSL_RENESAS_TSIP)
|
||||
doCliCertCheck = 1;
|
||||
#endif
|
||||
if (doCliCertCheck) {
|
||||
wolfSSL_CTX_set_verify(server_ctx, WOLFSSL_VERIFY_PEER |
|
||||
WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT, 0);
|
||||
#if !defined(NO_FILESYSTEM)
|
||||
if (wolfSSL_CTX_load_verify_locations(server_ctx, clientCert, 0)
|
||||
!= WOLFSSL_SUCCESS)
|
||||
#else
|
||||
if (wolfSSL_CTX_load_verify_buffer(server_ctx, clientCert,
|
||||
sizeof_clicert,
|
||||
SSL_FILETYPE_ASN1) != SSL_SUCCESS)
|
||||
#endif
|
||||
printf("can't load ca file, Please run from wolfSSL home dir\n");
|
||||
}
|
||||
|
||||
/* Register callbacks */
|
||||
wolfSSL_SetIORecv(server_ctx, my_IORecv);
|
||||
wolfSSL_SetIOSend(server_ctx, my_IOSend);
|
||||
|
||||
}
|
||||
|
||||
void wolfSSL_TLS_server( )
|
||||
{
|
||||
ID cepid = 1;
|
||||
ID repid = 1;
|
||||
ER ercd;
|
||||
WOLFSSL_CTX *ctx = (WOLFSSL_CTX *)server_ctx;
|
||||
|
||||
WOLFSSL *ssl = NULL;
|
||||
int len;
|
||||
#define BUFF_SIZE 256
|
||||
char buff[BUFF_SIZE];
|
||||
T_IPV4EP dst_addr = {0, 0};
|
||||
|
||||
if((ercd = tcp_acp_cep(cepid, repid, &dst_addr, TMO_FEVR)) != E_OK) {
|
||||
printf("ERROR TCP Accept: %d\n", ercd);
|
||||
goto out;
|
||||
}
|
||||
|
||||
if((ssl = wolfSSL_new(ctx)) == NULL) {
|
||||
printf("ERROR: failed wolfSSL_new\n");
|
||||
goto out;
|
||||
}
|
||||
|
||||
wolfSSL_SetIOReadCtx(ssl, (void *)&cepid);
|
||||
wolfSSL_SetIOWriteCtx(ssl, (void *)&cepid);
|
||||
|
||||
if (wolfSSL_accept(ssl) < 0) {
|
||||
printf("ERROR: SSL Accept(%d)\n", wolfSSL_get_error(ssl, 0));
|
||||
goto out;
|
||||
}
|
||||
|
||||
if ((len = wolfSSL_read(ssl, buff, sizeof(buff) - 1)) < 0) {
|
||||
printf("ERROR: SSL Read(%d)\n", wolfSSL_get_error(ssl, 0));
|
||||
goto out;
|
||||
}
|
||||
|
||||
buff[len] = '\0';
|
||||
printf("Received: %s\n", buff);
|
||||
|
||||
if (wolfSSL_write(ssl, buff, len) != len) {
|
||||
printf("ERROR: SSL Write(%d)\n", wolfSSL_get_error(ssl, 0));
|
||||
}
|
||||
|
||||
out:
|
||||
if (ssl) {
|
||||
wolfSSL_shutdown(ssl);
|
||||
wolfSSL_free(ssl);
|
||||
}
|
||||
if (ctx) {
|
||||
wolfSSL_CTX_free(ctx);
|
||||
};
|
||||
|
||||
wolfSSL_Cleanup();
|
||||
tcp_sht_cep(cepid);
|
||||
tcp_cls_cep(cepid, TMO_FEVR);
|
||||
}
|
||||
48
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/test/src/wolfssl_demo.h
vendored
Normal file
48
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/test/src/wolfssl_demo.h
vendored
Normal file
@@ -0,0 +1,48 @@
|
||||
/* wolfssl_demo.h
|
||||
*
|
||||
* Copyright (C) 2006-2022 wolfSSL Inc.
|
||||
*
|
||||
* This file is part of wolfSSL.
|
||||
*
|
||||
* wolfSSL is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* wolfSSL is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
*/
|
||||
|
||||
#ifndef WOLFSSL_DEMO_H_
|
||||
#define WOLFSSL_DEMO_H_
|
||||
|
||||
#define FREQ 10000 /* Hz */
|
||||
|
||||
/* Enable wolfcrypt test */
|
||||
/* can be enabled with benchmark test */
|
||||
/*#define CRYPT_TEST*/
|
||||
|
||||
/* Enable benchmark */
|
||||
/* can be enabled with cyrpt test */
|
||||
/*#define BENCHMARK*/
|
||||
|
||||
/* Enable TLS client */
|
||||
/* cannot enable with other definition */
|
||||
#define TLS_CLIENT
|
||||
|
||||
/* Enable TLS server */
|
||||
/* cannot enable with other definition */
|
||||
/* #define TLS_SERVER */
|
||||
|
||||
void wolfSSL_TLS_client_init();
|
||||
void wolfSSL_TLS_client();
|
||||
void wolfSSL_TLS_server_init(byte);
|
||||
void wolfSSL_TLS_server();
|
||||
|
||||
#endif /* WOLFSSL_DEMO_H_ */
|
||||
536
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/test/test.rcpc
vendored
Normal file
536
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/test/test.rcpc
vendored
Normal file
@@ -0,0 +1,536 @@
|
||||
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
|
||||
<MicomToolCommonProjectFile Version="1.00">
|
||||
<CreatorType Name="e2studio" Version=""/>
|
||||
<Placeholders>
|
||||
<PlaceholderPrefix>${</PlaceholderPrefix>
|
||||
<PlaceholderPostfix>}</PlaceholderPostfix>
|
||||
</Placeholders>
|
||||
<Project Name="test" Type="Application">
|
||||
<Files>
|
||||
<Category Name="src">
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\benchmark\benchmark.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\benchmark\benchmark.h</Path>
|
||||
<Path>src\key_data.c</Path>
|
||||
<Path>src\key_data.h</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\test\test.c</Path>
|
||||
<Path>src\test_main.c</Path>
|
||||
<Path>src\wolf_client.c</Path>
|
||||
<Path>src\wolf_server.c</Path>
|
||||
<Path>src\wolfssl_demo.h</Path>
|
||||
<Path>..\common\wolfssl_dummy.c</Path>
|
||||
<Category Name="smc_gen">
|
||||
<Category Name="Config_TMR0">
|
||||
<Path>src\smc_gen\Config_TMR0\Config_TMR0.c</Path>
|
||||
<Path>src\smc_gen\Config_TMR0\Config_TMR0.h</Path>
|
||||
<Path>src\smc_gen\Config_TMR0\Config_TMR0_user.c</Path>
|
||||
</Category>
|
||||
<Category Name="general">
|
||||
<Path>src\smc_gen\general\r_cg_hardware_setup.c</Path>
|
||||
<Path>src\smc_gen\general\r_cg_macrodriver.h</Path>
|
||||
<Path>src\smc_gen\general\r_cg_tmr.h</Path>
|
||||
<Path>src\smc_gen\general\r_cg_userdefine.h</Path>
|
||||
<Path>src\smc_gen\general\r_smc_cgc.c</Path>
|
||||
<Path>src\smc_gen\general\r_smc_cgc.h</Path>
|
||||
<Path>src\smc_gen\general\r_smc_cgc_user.c</Path>
|
||||
<Path>src\smc_gen\general\r_smc_entry.h</Path>
|
||||
<Path>src\smc_gen\general\r_smc_interrupt.c</Path>
|
||||
<Path>src\smc_gen\general\r_smc_interrupt.h</Path>
|
||||
</Category>
|
||||
<Category Name="r_bsp">
|
||||
<Path>src\smc_gen\r_bsp\platform.h</Path>
|
||||
<Path>src\smc_gen\r_bsp\readme.txt</Path>
|
||||
<Category Name="board">
|
||||
<Category Name="generic_rx65n">
|
||||
<Path>src\smc_gen\r_bsp\board\generic_rx65n\hwsetup.c</Path>
|
||||
<Path>src\smc_gen\r_bsp\board\generic_rx65n\hwsetup.h</Path>
|
||||
<Path>src\smc_gen\r_bsp\board\generic_rx65n\r_bsp.h</Path>
|
||||
<Path>src\smc_gen\r_bsp\board\generic_rx65n\r_bsp_config_reference.h</Path>
|
||||
<Path>src\smc_gen\r_bsp\board\generic_rx65n\r_bsp_interrupt_config_reference.h</Path>
|
||||
</Category>
|
||||
<Category Name="user">
|
||||
<Path>src\smc_gen\r_bsp\board\user\r_bsp.h</Path>
|
||||
</Category>
|
||||
</Category>
|
||||
<Category Name="doc">
|
||||
<Category Name="en">
|
||||
<Path>src\smc_gen\r_bsp\doc\en\r01an1685ej0621-rx-bsp.pdf</Path>
|
||||
</Category>
|
||||
<Category Name="ja">
|
||||
<Path>src\smc_gen\r_bsp\doc\ja\r01an1685jj0621-rx-bsp.pdf</Path>
|
||||
</Category>
|
||||
</Category>
|
||||
<Category Name="mcu">
|
||||
<Category Name="all">
|
||||
<Path>src\smc_gen\r_bsp\mcu\all\dbsct.c</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\all\fsp_common_api.h</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\all\lowlvl.c</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\all\lowlvl.h</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\all\lowsrc.c</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\all\lowsrc.h</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\all\mcu_locks.c</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\all\r_bsp_common.c</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\all\r_bsp_common.h</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\all\r_bsp_cpu.c</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\all\r_bsp_interrupts.c</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\all\r_bsp_interrupts.h</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\all\r_bsp_locking.c</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\all\r_bsp_mcu_startup.c</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\all\r_bsp_mcu_startup.h</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\all\r_bsp_software_interrupt.c</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\all\r_bsp_software_interrupt.h</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\all\r_fsp_error.h</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\all\r_rtos.h</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\all\r_rx_compiler.h</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\all\r_rx_intrinsic_functions.c</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\all\r_rx_intrinsic_functions.h</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\all\r_typedefs.h</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\all\resetprg.c</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\all\sbrk.c</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\all\sbrk.h</Path>
|
||||
</Category>
|
||||
<Category Name="rx65n">
|
||||
<Path>src\smc_gen\r_bsp\mcu\rx65n\mcu_clocks.c</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\rx65n\mcu_clocks.h</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\rx65n\mcu_info.h</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\rx65n\mcu_init.c</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\rx65n\mcu_init.h</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\rx65n\mcu_interrupts.c</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\rx65n\mcu_interrupts.h</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\rx65n\mcu_locks.h</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\rx65n\mcu_mapped_interrupts.c</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\rx65n\mcu_mapped_interrupts.h</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\rx65n\mcu_mapped_interrupts_private.h</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\rx65n\r_bsp_cpu.h</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\rx65n\r_bsp_locking.h</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\rx65n\vecttbl.c</Path>
|
||||
<Path>src\smc_gen\r_bsp\mcu\rx65n\vecttbl.h</Path>
|
||||
<Category Name="register_access">
|
||||
<Category Name="ccrx">
|
||||
<Path>src\smc_gen\r_bsp\mcu\rx65n\register_access\ccrx\iodefine.h</Path>
|
||||
</Category>
|
||||
</Category>
|
||||
</Category>
|
||||
</Category>
|
||||
</Category>
|
||||
<Category Name="r_cmt_rx">
|
||||
<Path>src\smc_gen\r_cmt_rx\r_cmt_rx_if.h</Path>
|
||||
<Path>src\smc_gen\r_cmt_rx\readme.txt</Path>
|
||||
<Category Name="doc">
|
||||
<Category Name="en">
|
||||
<Path>src\smc_gen\r_cmt_rx\doc\en\r01an1856ej0490-rx-timer.pdf</Path>
|
||||
</Category>
|
||||
<Category Name="ja">
|
||||
<Path>src\smc_gen\r_cmt_rx\doc\ja\r01an1856jj0490-rx-timer.pdf</Path>
|
||||
</Category>
|
||||
</Category>
|
||||
<Category Name="src">
|
||||
<Path>src\smc_gen\r_cmt_rx\src\r_cmt_rx.c</Path>
|
||||
</Category>
|
||||
</Category>
|
||||
<Category Name="r_config">
|
||||
<Path>src\smc_gen\r_config\r_bsp_config.h</Path>
|
||||
<Path>src\smc_gen\r_config\r_bsp_config_readme.txt</Path>
|
||||
<Path>src\smc_gen\r_config\r_bsp_interrupt_config.h</Path>
|
||||
<Path>src\smc_gen\r_config\r_cmt_rx_config.h</Path>
|
||||
<Path>src\smc_gen\r_config\r_ether_rx_config.h</Path>
|
||||
<Path>src\smc_gen\r_config\r_sys_time_rx_config.h</Path>
|
||||
<Path>src\smc_gen\r_config\r_t4_driver_rx_config.h</Path>
|
||||
<Path>src\smc_gen\r_config\r_t4_rx_config.h</Path>
|
||||
<Path>src\smc_gen\r_config\r_tsip_rx_config.h</Path>
|
||||
</Category>
|
||||
<Category Name="r_ether_rx">
|
||||
<Path>src\smc_gen\r_ether_rx\r_ether_rx_if.h</Path>
|
||||
<Path>src\smc_gen\r_ether_rx\readme.txt</Path>
|
||||
<Category Name="doc">
|
||||
<Category Name="en">
|
||||
<Path>src\smc_gen\r_ether_rx\doc\en\r01an2009ej0121-rx-ether.pdf</Path>
|
||||
</Category>
|
||||
<Category Name="ja">
|
||||
<Path>src\smc_gen\r_ether_rx\doc\ja\r01an2009jj0121-rx-ether.pdf</Path>
|
||||
</Category>
|
||||
</Category>
|
||||
<Category Name="ref">
|
||||
<Path>src\smc_gen\r_ether_rx\ref\r_ether_rx_config_reference.h</Path>
|
||||
</Category>
|
||||
<Category Name="src">
|
||||
<Path>src\smc_gen\r_ether_rx\src\r_ether_rx.c</Path>
|
||||
<Path>src\smc_gen\r_ether_rx\src\r_ether_rx_private.h</Path>
|
||||
<Category Name="phy">
|
||||
<Path>src\smc_gen\r_ether_rx\src\phy\phy.c</Path>
|
||||
<Path>src\smc_gen\r_ether_rx\src\phy\phy.h</Path>
|
||||
</Category>
|
||||
<Category Name="targets">
|
||||
<Category Name="rx65n">
|
||||
<Path>src\smc_gen\r_ether_rx\src\targets\rx65n\r_ether_setting_rx65n.c</Path>
|
||||
</Category>
|
||||
</Category>
|
||||
</Category>
|
||||
</Category>
|
||||
<Category Name="r_pincfg">
|
||||
<Path>src\smc_gen\r_pincfg\Pin.c</Path>
|
||||
<Path>src\smc_gen\r_pincfg\Pin.h</Path>
|
||||
<Path>src\smc_gen\r_pincfg\r_ether_rx_pinset.c</Path>
|
||||
<Path>src\smc_gen\r_pincfg\r_ether_rx_pinset.h</Path>
|
||||
<Path>src\smc_gen\r_pincfg\r_pinset.h</Path>
|
||||
</Category>
|
||||
<Category Name="r_sys_time_rx">
|
||||
<Path>src\smc_gen\r_sys_time_rx\r_sys_time_rx_if.h</Path>
|
||||
<Path>src\smc_gen\r_sys_time_rx\readme.txt</Path>
|
||||
<Category Name="doc">
|
||||
<Category Name="en">
|
||||
<Path>src\smc_gen\r_sys_time_rx\doc\en\r20an0431ej0101-rx-middle.pdf</Path>
|
||||
</Category>
|
||||
<Category Name="ja">
|
||||
<Path>src\smc_gen\r_sys_time_rx\doc\ja\r20an0431jj0101-rx-middle.pdf</Path>
|
||||
</Category>
|
||||
</Category>
|
||||
<Category Name="ref">
|
||||
<Path>src\smc_gen\r_sys_time_rx\ref\r_sys_time_rx_config_reference.h</Path>
|
||||
</Category>
|
||||
<Category Name="src">
|
||||
<Path>src\smc_gen\r_sys_time_rx\src\r_sys_time_rx.c</Path>
|
||||
<Path>src\smc_gen\r_sys_time_rx\src\r_sys_time_rx_private.h</Path>
|
||||
</Category>
|
||||
</Category>
|
||||
<Category Name="r_t4_driver_rx">
|
||||
<Path>src\smc_gen\r_t4_driver_rx\readme.txt</Path>
|
||||
<Category Name="doc">
|
||||
<Category Name="en">
|
||||
<Path>src\smc_gen\r_t4_driver_rx\doc\en\r20an0311ej0109-rx-t4.pdf</Path>
|
||||
</Category>
|
||||
<Category Name="ja">
|
||||
<Path>src\smc_gen\r_t4_driver_rx\doc\ja\r20an0311jj0109-rx-t4.pdf</Path>
|
||||
</Category>
|
||||
</Category>
|
||||
<Category Name="ref">
|
||||
<Path>src\smc_gen\r_t4_driver_rx\ref\r_t4_driver_rx_config_reference.h</Path>
|
||||
</Category>
|
||||
<Category Name="src">
|
||||
<Path>src\smc_gen\r_t4_driver_rx\src\ether_callback.c</Path>
|
||||
<Path>src\smc_gen\r_t4_driver_rx\src\t4_driver.c</Path>
|
||||
<Path>src\smc_gen\r_t4_driver_rx\src\timer.c</Path>
|
||||
<Path>src\smc_gen\r_t4_driver_rx\src\timer.h</Path>
|
||||
</Category>
|
||||
</Category>
|
||||
<Category Name="r_t4_rx">
|
||||
<Path>src\smc_gen\r_t4_rx\readme.txt</Path>
|
||||
<Category Name="doc">
|
||||
<Category Name="en">
|
||||
<Path>src\smc_gen\r_t4_rx\doc\en\r20an0051ej0210-rx-t4.pdf</Path>
|
||||
<Path>src\smc_gen\r_t4_rx\doc\en\r20uw0031ej0111-t4tiny.pdf</Path>
|
||||
<Path>src\smc_gen\r_t4_rx\doc\en\r20uw0032ej0109-t4tiny.pdf</Path>
|
||||
</Category>
|
||||
<Category Name="ja">
|
||||
<Path>src\smc_gen\r_t4_rx\doc\ja\r20an0051jj0210-rx-t4.pdf</Path>
|
||||
<Path>src\smc_gen\r_t4_rx\doc\ja\r20uw0031jj0111-t4tiny.pdf</Path>
|
||||
<Path>src\smc_gen\r_t4_rx\doc\ja\r20uw0032jj0109-t4tiny.pdf</Path>
|
||||
</Category>
|
||||
</Category>
|
||||
<Category Name="lib">
|
||||
<Path>src\smc_gen\r_t4_rx\lib\r_mw_version.h</Path>
|
||||
<Path>src\smc_gen\r_t4_rx\lib\r_stdint.h</Path>
|
||||
<Path>src\smc_gen\r_t4_rx\lib\r_t4_itcpip.h</Path>
|
||||
</Category>
|
||||
<Category Name="ref">
|
||||
<Path>src\smc_gen\r_t4_rx\ref\r_t4_rx_config_reference.h</Path>
|
||||
</Category>
|
||||
<Category Name="src">
|
||||
<Path>src\smc_gen\r_t4_rx\src\config_tcpudp.c</Path>
|
||||
</Category>
|
||||
</Category>
|
||||
<Category Name="r_tsip_rx">
|
||||
<Path>src\smc_gen\r_tsip_rx\r_tsip_rx_if.h</Path>
|
||||
<Path>src\smc_gen\r_tsip_rx\readme.txt</Path>
|
||||
<Category Name="doc">
|
||||
<Category Name="en">
|
||||
<Path>src\smc_gen\r_tsip_rx\doc\en\r20an0548ej0115-rx-tsip-security.pdf</Path>
|
||||
</Category>
|
||||
<Category Name="ja">
|
||||
<Path>src\smc_gen\r_tsip_rx\doc\ja\r20an0548jj0115-rx-tsip-security.pdf</Path>
|
||||
</Category>
|
||||
</Category>
|
||||
</Category>
|
||||
</Category>
|
||||
</Category>
|
||||
</Files>
|
||||
<Device Category="com.renesas.cdt.managedbuild.renesas.ccrx.common.option.cpu.rx600" Series="RX">R5F565NEHxFP</Device>
|
||||
<BuildOptions Name="CC-RX" Version="v3.04.00">
|
||||
<BuildMode Active="True" Name="HardwareDebug">
|
||||
<GeneralOptions/>
|
||||
<CompileOptions>
|
||||
<Option>-isa=rxv2</Option>
|
||||
<Option>-fpu</Option>
|
||||
<Option>-include="${ProjDirPath}\..\common"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\..\..\..\..\..\"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_bsp"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_config"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_tsip_rx"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_cmt_rx"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_cmt_rx\src"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_t4_driver_rx"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_t4_driver_rx\src"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_t4_rx"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_t4_rx\lib"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_ether_rx"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_sys_time_rx"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_sys_time_rx\src"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\general"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_pincfg"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\Config_TMR0"</Option>
|
||||
<Option>-define=DEBUG_CONSOLE,WOLFSSL_USER_SETTINGS</Option>
|
||||
<Option>-utf8</Option>
|
||||
<Option>-nomessage</Option>
|
||||
<Option>-debug</Option>
|
||||
<Option>-outcode=utf8</Option>
|
||||
<Option>-optimize=0</Option>
|
||||
<Option>-nologo</Option>
|
||||
<Option>-lang=c99</Option>
|
||||
<Option>-lang=cpp</Option>
|
||||
<Option>-output=obj=${CONFIGDIR}\${FILELEAF}.obj</Option>
|
||||
<Option>-obj_path=${CONFIGDIR}</Option>
|
||||
</CompileOptions>
|
||||
<AssembleOptions>
|
||||
<Option>-isa=rxv2</Option>
|
||||
<Option>-fpu</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\general"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_pincfg"</Option>
|
||||
<Option>-utf8</Option>
|
||||
<Option>-debug</Option>
|
||||
<Option>-nologo</Option>
|
||||
<Option>-output=${CONFIGDIR}</Option>
|
||||
</AssembleOptions>
|
||||
<LinkOptions>
|
||||
<Option>-output="${ProjName}.abs"</Option>
|
||||
<Option>-form=absolute</Option>
|
||||
<Option>-nomessage</Option>
|
||||
<Option>-vect=_undefined_interrupt_source_isr</Option>
|
||||
<Option>-list=${ProjName}.map</Option>
|
||||
<Option>-nooptimize</Option>
|
||||
<Option>-rom=D=R,D_1=R_1,D_2=R_2</Option>
|
||||
<Option>-cpu=RAM=00000000-0003ffff,FIX=00080000-00083fff,FIX=00086000-00087fff,FIX=00088000-0009ffff,FIX=000a0000-000a3fff,RAM=000a4000-000a5fff,FIX=000a6000-000bffff,FIX=000c0000-000dffff,FIX=000e0000-000fffff,ROM=00100000-00107fff,FIX=007fc000-007fcfff,FIX=007fe000-007fffff,RAM=00800000-0085ffff,RAM=fe7f5d00-fe7f5d7f,RAM=fe7f7d70-fe7f7d9f,ROM=ffe00000-ffffffff</Option>
|
||||
<Option>-nologo</Option>
|
||||
<Option>-library="${ProjDirPath}/../${ProjName}/src/smc_gen/r_t4_rx/lib/ccrx/T4_Library_ether_ccrx_rxv1_little_debug.lib"</Option>
|
||||
<Option>-library="${ProjDirPath}/../${ProjName}/src/smc_gen/r_tsip_rx/lib/ccrx/r_tsip_rx65n_little.lib"</Option>
|
||||
<Option>-library="${ProjDirPath}/../wolfssl/Debug/wolfssl.lib"</Option>
|
||||
<Option>-start=SU,SI,B_1,R_1,B_2,R_2,B,R/04,B_ETHERNET_BUFFERS_1,B_RX_DESC_1,B_TX_DESC_1/03C000,C_1,C_2,C,C$*,D*,W*,L,P/0FFE00000,EXCEPTVECT/0FFFFFF80,RESETVECT/0FFFFFFFC</Option>
|
||||
<PreLinker>Auto</PreLinker>
|
||||
</LinkOptions>
|
||||
<LibraryGenerateOptions>
|
||||
<Option>-isa=rxv2</Option>
|
||||
<Option>-fpu</Option>
|
||||
<Option>-lang=c99</Option>
|
||||
<Option>-head=runtime,ctype,stdio,stdlib,string,new</Option>
|
||||
<Option>-output="${ProjName}.lib"</Option>
|
||||
<Option>-nologo</Option>
|
||||
<GenerateMode>BuildOptionChanged</GenerateMode>
|
||||
</LibraryGenerateOptions>
|
||||
<LinkOrder>
|
||||
<Path>HardwareDebug\benchmark.obj</Path>
|
||||
<Path>HardwareDebug\key_data.obj</Path>
|
||||
<Path>HardwareDebug\Config_TMR0.obj</Path>
|
||||
<Path>HardwareDebug\Config_TMR0_user.obj</Path>
|
||||
<Path>HardwareDebug\r_cg_hardware_setup.obj</Path>
|
||||
<Path>HardwareDebug\r_smc_cgc.obj</Path>
|
||||
<Path>HardwareDebug\r_smc_cgc_user.obj</Path>
|
||||
<Path>HardwareDebug\r_smc_interrupt.obj</Path>
|
||||
<Path>HardwareDebug\hwsetup.obj</Path>
|
||||
<Path>HardwareDebug\dbsct.obj</Path>
|
||||
<Path>HardwareDebug\lowlvl.obj</Path>
|
||||
<Path>HardwareDebug\lowsrc.obj</Path>
|
||||
<Path>HardwareDebug\mcu_locks.obj</Path>
|
||||
<Path>HardwareDebug\r_bsp_common.obj</Path>
|
||||
<Path>HardwareDebug\r_bsp_cpu.obj</Path>
|
||||
<Path>HardwareDebug\r_bsp_interrupts.obj</Path>
|
||||
<Path>HardwareDebug\r_bsp_locking.obj</Path>
|
||||
<Path>HardwareDebug\r_bsp_mcu_startup.obj</Path>
|
||||
<Path>HardwareDebug\r_bsp_software_interrupt.obj</Path>
|
||||
<Path>HardwareDebug\r_rx_intrinsic_functions.obj</Path>
|
||||
<Path>HardwareDebug\resetprg.obj</Path>
|
||||
<Path>HardwareDebug\sbrk.obj</Path>
|
||||
<Path>HardwareDebug\mcu_clocks.obj</Path>
|
||||
<Path>HardwareDebug\mcu_init.obj</Path>
|
||||
<Path>HardwareDebug\mcu_interrupts.obj</Path>
|
||||
<Path>HardwareDebug\mcu_mapped_interrupts.obj</Path>
|
||||
<Path>HardwareDebug\vecttbl.obj</Path>
|
||||
<Path>HardwareDebug\r_cmt_rx.obj</Path>
|
||||
<Path>HardwareDebug\phy.obj</Path>
|
||||
<Path>HardwareDebug\r_ether_rx.obj</Path>
|
||||
<Path>HardwareDebug\r_ether_setting_rx65n.obj</Path>
|
||||
<Path>HardwareDebug\Pin.obj</Path>
|
||||
<Path>HardwareDebug\r_ether_rx_pinset.obj</Path>
|
||||
<Path>HardwareDebug\r_sys_time_rx.obj</Path>
|
||||
<Path>HardwareDebug\ether_callback.obj</Path>
|
||||
<Path>HardwareDebug\t4_driver.obj</Path>
|
||||
<Path>HardwareDebug\timer.obj</Path>
|
||||
<Path>HardwareDebug\config_tcpudp.obj</Path>
|
||||
<Path>HardwareDebug\test.obj</Path>
|
||||
<Path>HardwareDebug\test_main.obj</Path>
|
||||
<Path>HardwareDebug\wolf_client.obj</Path>
|
||||
<Path>HardwareDebug\wolf_server.obj</Path>
|
||||
<Path>HardwareDebug\wolfssl_dummy.obj</Path>
|
||||
<Path>HardwareDebug\test.lib</Path>
|
||||
</LinkOrder>
|
||||
<CommonOptions>
|
||||
<IncludePathForC>"${ProjDirPath}\..\common"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\..\..\..\..\..\"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_bsp"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_config"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_tsip_rx"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_cmt_rx"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_cmt_rx\src"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_t4_driver_rx"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_t4_driver_rx\src"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_t4_rx"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_t4_rx\lib"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_ether_rx"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_sys_time_rx"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_sys_time_rx\src"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\general"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_pincfg"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\Config_TMR0"</IncludePathForC>
|
||||
<IncludePathForAsm>"${ProjDirPath}\..\${ProjName}\src\smc_gen\general"</IncludePathForAsm>
|
||||
<IncludePathForAsm>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_pincfg"</IncludePathForAsm>
|
||||
<MacroForC>DEBUG_CONSOLE</MacroForC>
|
||||
<MacroForC>WOLFSSL_USER_SETTINGS</MacroForC>
|
||||
</CommonOptions>
|
||||
</BuildMode>
|
||||
<BuildMode Active="False" Name="Debug">
|
||||
<GeneralOptions/>
|
||||
<CompileOptions>
|
||||
<Option>-isa=rxv2</Option>
|
||||
<Option>-fpu</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_bsp"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_config"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_tsip_rx"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_tsip_rx\src\targets\rx231"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_tsip_rx\src\targets\rx66t"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_tsip_rx\src\targets\rx65n"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_cmt_rx"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_cmt_rx\src"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_t4_driver_rx"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_t4_driver_rx\src"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_t4_rx"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_t4_rx\lib"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_ether_rx"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_sys_time_rx"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_sys_time_rx\src"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\general"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_pincfg"</Option>
|
||||
<Option>-include="${ProjDirPath}\generate"</Option>
|
||||
<Option>-define=DEBUG_CONSOLE</Option>
|
||||
<Option>-utf8</Option>
|
||||
<Option>-nomessage</Option>
|
||||
<Option>-debug</Option>
|
||||
<Option>-outcode=utf8</Option>
|
||||
<Option>-nologo</Option>
|
||||
<Option>-lang=c99</Option>
|
||||
<Option>-lang=cpp</Option>
|
||||
<Option>-output=obj=${CONFIGDIR}\${FILELEAF}.obj</Option>
|
||||
<Option>-obj_path=${CONFIGDIR}</Option>
|
||||
</CompileOptions>
|
||||
<AssembleOptions>
|
||||
<Option>-isa=rxv2</Option>
|
||||
<Option>-fpu</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\general"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\${ProjName}\src\smc_gen\r_pincfg"</Option>
|
||||
<Option>-utf8</Option>
|
||||
<Option>-debug</Option>
|
||||
<Option>-nologo</Option>
|
||||
<Option>-output=${CONFIGDIR}</Option>
|
||||
</AssembleOptions>
|
||||
<LinkOptions>
|
||||
<Option>-output="${ProjName}.abs"</Option>
|
||||
<Option>-form=absolute</Option>
|
||||
<Option>-nomessage</Option>
|
||||
<Option>-vect=_undefined_interrupt_source_isr</Option>
|
||||
<Option>-list=${ProjName}.map</Option>
|
||||
<Option>-nooptimize</Option>
|
||||
<Option>-rom=D=R,D_1=R_1,D_2=R_2</Option>
|
||||
<Option>-cpu=RAM=00000000-0003ffff,FIX=00080000-00083fff,FIX=00086000-00087fff,FIX=00088000-0009ffff,FIX=000a0000-000a3fff,RAM=000a4000-000a5fff,FIX=000a6000-000bffff,FIX=000c0000-000dffff,FIX=000e0000-000fffff,ROM=00100000-00107fff,FIX=007fc000-007fcfff,FIX=007fe000-007fffff,RAM=00800000-0085ffff,RAM=fe7f5d00-fe7f5d7f,RAM=fe7f7d70-fe7f7d9f,ROM=ffe00000-ffffffff</Option>
|
||||
<Option>-nologo</Option>
|
||||
<Option>-library="${ProjDirPath}/../${ProjName}/src/smc_gen/r_t4_rx/lib/T4_Library_rxv1_ether_little.lib"</Option>
|
||||
<Option>-start=SU,SI,B_1,R_1,B_2,R_2,B,R/04,C_1,C_2,C,C$*,D*,W*,L,P*/0FFE00000,EXCEPTVECT/0FFFFFF80,RESETVECT/0FFFFFFFC,B_ETHERNET_BUFFERS_1,B_RX_DESC_1,B_TX_DESC_1/00010000</Option>
|
||||
<PreLinker>Auto</PreLinker>
|
||||
</LinkOptions>
|
||||
<LibraryGenerateOptions>
|
||||
<Option>-isa=rxv2</Option>
|
||||
<Option>-fpu</Option>
|
||||
<Option>-lang=c99</Option>
|
||||
<Option>-head=runtime,stdio,stdlib,string,new</Option>
|
||||
<Option>-output="${ProjName}.lib"</Option>
|
||||
<Option>-nologo</Option>
|
||||
<GenerateMode>BuildOptionChanged</GenerateMode>
|
||||
</LibraryGenerateOptions>
|
||||
<LinkOrder>
|
||||
<Path>Debug\benchmark.obj</Path>
|
||||
<Path>Debug\key_data.obj</Path>
|
||||
<Path>Debug\Config_TMR0.obj</Path>
|
||||
<Path>Debug\Config_TMR0_user.obj</Path>
|
||||
<Path>Debug\r_cg_hardware_setup.obj</Path>
|
||||
<Path>Debug\r_smc_cgc.obj</Path>
|
||||
<Path>Debug\r_smc_cgc_user.obj</Path>
|
||||
<Path>Debug\r_smc_interrupt.obj</Path>
|
||||
<Path>Debug\hwsetup.obj</Path>
|
||||
<Path>Debug\dbsct.obj</Path>
|
||||
<Path>Debug\lowlvl.obj</Path>
|
||||
<Path>Debug\lowsrc.obj</Path>
|
||||
<Path>Debug\mcu_locks.obj</Path>
|
||||
<Path>Debug\r_bsp_common.obj</Path>
|
||||
<Path>Debug\r_bsp_cpu.obj</Path>
|
||||
<Path>Debug\r_bsp_interrupts.obj</Path>
|
||||
<Path>Debug\r_bsp_locking.obj</Path>
|
||||
<Path>Debug\r_bsp_mcu_startup.obj</Path>
|
||||
<Path>Debug\r_bsp_software_interrupt.obj</Path>
|
||||
<Path>Debug\r_rx_intrinsic_functions.obj</Path>
|
||||
<Path>Debug\resetprg.obj</Path>
|
||||
<Path>Debug\sbrk.obj</Path>
|
||||
<Path>Debug\mcu_clocks.obj</Path>
|
||||
<Path>Debug\mcu_init.obj</Path>
|
||||
<Path>Debug\mcu_interrupts.obj</Path>
|
||||
<Path>Debug\mcu_mapped_interrupts.obj</Path>
|
||||
<Path>Debug\vecttbl.obj</Path>
|
||||
<Path>Debug\r_cmt_rx.obj</Path>
|
||||
<Path>Debug\phy.obj</Path>
|
||||
<Path>Debug\r_ether_rx.obj</Path>
|
||||
<Path>Debug\r_ether_setting_rx65n.obj</Path>
|
||||
<Path>Debug\Pin.obj</Path>
|
||||
<Path>Debug\r_ether_rx_pinset.obj</Path>
|
||||
<Path>Debug\r_sys_time_rx.obj</Path>
|
||||
<Path>Debug\ether_callback.obj</Path>
|
||||
<Path>Debug\t4_driver.obj</Path>
|
||||
<Path>Debug\timer.obj</Path>
|
||||
<Path>Debug\config_tcpudp.obj</Path>
|
||||
<Path>Debug\test.obj</Path>
|
||||
<Path>Debug\test_main.obj</Path>
|
||||
<Path>Debug\wolf_client.obj</Path>
|
||||
<Path>Debug\wolf_server.obj</Path>
|
||||
<Path>Debug\wolfssl_dummy.obj</Path>
|
||||
<Path>Debug\test.lib</Path>
|
||||
</LinkOrder>
|
||||
<CommonOptions>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_bsp"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_config"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_tsip_rx"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_tsip_rx\src\targets\rx231"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_tsip_rx\src\targets\rx66t"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_tsip_rx\src\targets\rx65n"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_cmt_rx"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_cmt_rx\src"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_t4_driver_rx"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_t4_driver_rx\src"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_t4_rx"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_t4_rx\lib"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_ether_rx"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_sys_time_rx"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_sys_time_rx\src"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\general"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_pincfg"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\generate"</IncludePathForC>
|
||||
<IncludePathForAsm>"${ProjDirPath}\..\${ProjName}\src\smc_gen\general"</IncludePathForAsm>
|
||||
<IncludePathForAsm>"${ProjDirPath}\..\${ProjName}\src\smc_gen\r_pincfg"</IncludePathForAsm>
|
||||
<MacroForC>DEBUG_CONSOLE</MacroForC>
|
||||
</CommonOptions>
|
||||
</BuildMode>
|
||||
</BuildOptions>
|
||||
</Project>
|
||||
</MicomToolCommonProjectFile>
|
||||
136
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/test/test_HardwareDebug.launch
vendored
Normal file
136
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/test/test_HardwareDebug.launch
vendored
Normal file
@@ -0,0 +1,136 @@
|
||||
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
|
||||
<launchConfiguration type="com.renesas.cdt.launch.dsf.gdbremote.launchConfigurationType">
|
||||
<stringAttribute key="com.renesas.cdt.core.additionalServerArgs" value=""/>
|
||||
<stringAttribute key="com.renesas.cdt.core.initCommands" value=""/>
|
||||
<stringAttribute key="com.renesas.cdt.core.ipAddress" value="localhost"/>
|
||||
<stringAttribute key="com.renesas.cdt.core.jtagDevice" value="E1 (RX)"/>
|
||||
<stringAttribute key="com.renesas.cdt.core.jtagDeviceId" value="com.renesas.hardwaredebug.rx.e1"/>
|
||||
<listAttribute key="com.renesas.cdt.core.listGDBExe">
|
||||
<listEntry value="rx-elf-gdb -rx-force-v2"/>
|
||||
</listAttribute>
|
||||
<listAttribute key="com.renesas.cdt.core.listGDBLaunchName">
|
||||
<listEntry value="main"/>
|
||||
</listAttribute>
|
||||
<listAttribute key="com.renesas.cdt.core.listGDBPort">
|
||||
<listEntry value="61234"/>
|
||||
</listAttribute>
|
||||
<stringAttribute key="com.renesas.cdt.core.optionInitCommands" value="monitor set_internal_mem_overwrite 0-581 "/>
|
||||
<intAttribute key="com.renesas.cdt.core.portNumber" value="61234"/>
|
||||
<stringAttribute key="com.renesas.cdt.core.runCommands" value=""/>
|
||||
<stringAttribute key="com.renesas.cdt.core.secondGDBExe" value="green_dsp-elf-gdb"/>
|
||||
<booleanAttribute key="com.renesas.cdt.core.secondGDBSupport" value="false"/>
|
||||
<intAttribute key="com.renesas.cdt.core.secondGdbPortNumber" value="61237"/>
|
||||
<stringAttribute key="com.renesas.cdt.core.serverParam" value="-g E1 -t R5F565NE -uClockSrcHoco= 1 -uAllowClockSourceInternal= 1 -uUseFine= 1 -uFineBaudRate= 2.00 -w 1 -z 0 -uRegisterSetting= 0 -uModePin= 0 -uChangeStartupBank= 0 -uStartupBank= 0 -uDebugMode= 0 -uExecuteProgram= 0 -uIdCode= FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF -uresetOnReload= 1 -n 0 -uWorkRamAddress= 1000 -uverifyOnWritingMemory= 0 -uProgReWriteIRom= 0 -uProgReWriteDFlash= 0 -uhookWorkRamAddr= 0x3fdd0 -uhookWorkRamSize= 0x230"/>
|
||||
<booleanAttribute key="com.renesas.cdt.core.startServer" value="true"/>
|
||||
<stringAttribute key="com.renesas.cdt.core.targetDevice" value="R5F565NE"/>
|
||||
<booleanAttribute key="com.renesas.cdt.core.useRemoteTarget" value="true"/>
|
||||
<booleanAttribute key="com.renesas.cdt.core.verboseMode" value="false"/>
|
||||
<stringAttribute key="com.renesas.cdt.debug.ioview.dsf.registerSelection0" value="<?xml version="1.0" encoding="UTF-8" standalone="no"?> <selectedRegisterList ioFilePath="C:\Users\Taka\.eclipse\com.renesas.platform_923020927\DebugComp\RX\IoFiles\RX65N.sfrx"/> "/>
|
||||
<stringAttribute key="com.renesas.cdt.launch.dsf.IO_MAP" value="${support_area_loc}"/>
|
||||
<booleanAttribute key="com.renesas.cdt.launch.dsf.USE_DEFAULT_IO_MAP" value="true"/>
|
||||
<listAttribute key="com.renesas.cdt.launch.dsf.downloadImages">
|
||||
<listEntry value="|true|true|true|0|true|No core"/>
|
||||
</listAttribute>
|
||||
<booleanAttribute key="com.renesas.cdt.launch.dsf.downloadImagesUpgradedV30" value="true"/>
|
||||
<stringAttribute key="com.renesas.cdt.launch.dsf.launchSeqType" value="com.renesas.cdt.launch.dsf.launchSequence.e2GdbServer"/>
|
||||
<stringAttribute key="com.renesas.cdt.launch.dsf.serverPath" value="${renesas.support.targetLoc:rx-debug}\e2-server-gdb"/>
|
||||
<booleanAttribute key="com.renesas.hardwaredebug.e1.allow.change.startup_bank" value="false"/>
|
||||
<booleanAttribute key="com.renesas.hardwaredebug.e1.allow.clock.source.internal" value="true"/>
|
||||
<intAttribute key="com.renesas.hardwaredebug.e1.clock_source" value="1"/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.e1.connection.mode" value="0"/>
|
||||
<booleanAttribute key="com.renesas.hardwaredebug.e1.e1_pwr" value="true"/>
|
||||
<booleanAttribute key="com.renesas.hardwaredebug.e1.enable.hot.plug" value="false"/>
|
||||
<booleanAttribute key="com.renesas.hardwaredebug.e1.execute.program" value="false"/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.e1.external_memory" value=""/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.e1.fine.baud.rate" value="2.00"/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.e1.flash_overwrite_blocks" value="0-581"/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.e1.hook_Stop_func" value="0x0"/>
|
||||
<booleanAttribute key="com.renesas.hardwaredebug.e1.hook_enable_Stop" value="false"/>
|
||||
<booleanAttribute key="com.renesas.hardwaredebug.e1.hook_enable_start" value="false"/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.e1.hook_start_func" value="0x0"/>
|
||||
<intAttribute key="com.renesas.hardwaredebug.e1.hook_work_ram_Addr" value="261584"/>
|
||||
<intAttribute key="com.renesas.hardwaredebug.e1.hook_work_ram_Size" value="560"/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.e1.id_code" value="FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF"/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.e1.inputclock" value="27.0"/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.e1.jtag.clock.freq" value="16.5"/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.e1.jtag.or.fine" value="1"/>
|
||||
<booleanAttribute key="com.renesas.hardwaredebug.e1.le" value="true"/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.e1.mode" value="0"/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.e1.mode_pin" value="0"/>
|
||||
<booleanAttribute key="com.renesas.hardwaredebug.e1.prog_rewrite_dflash" value="false"/>
|
||||
<booleanAttribute key="com.renesas.hardwaredebug.e1.prog_rewrite_irom" value="false"/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.e1.serial_number" value=""/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.e1.startup_bank" value="0"/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.e1.supply.voltage" value="3.3V"/>
|
||||
<intAttribute key="com.renesas.hardwaredebug.e1.timer_clock" value="0"/>
|
||||
<intAttribute key="com.renesas.hardwaredebug.e1.work_ram_start" value="4096"/>
|
||||
<booleanAttribute key="com.renesas.hardwaredebug.ez.allow.clock.source.internal" value="true"/>
|
||||
<intAttribute key="com.renesas.hardwaredebug.ez.clock_source" value="1"/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.ez.connection.mode" value="0"/>
|
||||
<booleanAttribute key="com.renesas.hardwaredebug.ez.enable.hot.plug" value="false"/>
|
||||
<booleanAttribute key="com.renesas.hardwaredebug.ez.execute.program" value="false"/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.ez.external_memory" value=""/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.ez.fine.baud.rate" value="1.00"/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.ez.flash_overwrite_blocks" value="0-31"/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.ez.hook_Stop_func" value="0x0"/>
|
||||
<booleanAttribute key="com.renesas.hardwaredebug.ez.hook_enable_Stop" value="false"/>
|
||||
<booleanAttribute key="com.renesas.hardwaredebug.ez.hook_enable_start" value="false"/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.ez.hook_start_func" value="0x0"/>
|
||||
<intAttribute key="com.renesas.hardwaredebug.ez.hook_work_ram_Addr" value="9680"/>
|
||||
<intAttribute key="com.renesas.hardwaredebug.ez.hook_work_ram_Size" value="560"/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.ez.id_code" value="FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF"/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.ez.inputclock" value="22.0"/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.ez.jtag.clock.freq" value="16.5"/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.ez.jtag.or.fine" value="1"/>
|
||||
<booleanAttribute key="com.renesas.hardwaredebug.ez.le" value="true"/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.ez.mode" value="0"/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.ez.mode_pin" value="0"/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.ez.power.voltage" value="0.0000"/>
|
||||
<booleanAttribute key="com.renesas.hardwaredebug.ez.prog_rewrite_dflash" value="false"/>
|
||||
<booleanAttribute key="com.renesas.hardwaredebug.ez.prog_rewrite_irom" value="false"/>
|
||||
<stringAttribute key="com.renesas.hardwaredebug.ez.serial_number" value=""/>
|
||||
<intAttribute key="com.renesas.hardwaredebug.ez.timer_clock" value="0"/>
|
||||
<intAttribute key="com.renesas.hardwaredebug.ez.work_ram_start" value="4096"/>
|
||||
<booleanAttribute key="com.renesas.hardwaredebug.rx.e1.E1DebugToolSettingsTree.resetAfterReload" value="true"/>
|
||||
<booleanAttribute key="com.renesas.hardwaredebug.rx.ez.EzDebugToolSettingsTree.resetAfterReload" value="true"/>
|
||||
<booleanAttribute key="com.renesas.hardwaredebug.timemeasurement" value="true"/>
|
||||
<intAttribute key="org.eclipse.cdt.debug.gdbjtag.core.delay" value="3"/>
|
||||
<booleanAttribute key="org.eclipse.cdt.debug.gdbjtag.core.doHalt" value="false"/>
|
||||
<booleanAttribute key="org.eclipse.cdt.debug.gdbjtag.core.doReset" value="false"/>
|
||||
<stringAttribute key="org.eclipse.cdt.debug.gdbjtag.core.imageFileName" value="F:\Work\e2studioWorkspaces\RX65N\forTSIP1.06\wolfssl-4.4.0\IDE\Renesas\e2studio\Projects\test\HardwareDebug\test.x"/>
|
||||
<stringAttribute key="org.eclipse.cdt.debug.gdbjtag.core.imageOffset" value="0"/>
|
||||
<stringAttribute key="org.eclipse.cdt.debug.gdbjtag.core.initCommands" value=""/>
|
||||
<booleanAttribute key="org.eclipse.cdt.debug.gdbjtag.core.loadImage" value="true"/>
|
||||
<booleanAttribute key="org.eclipse.cdt.debug.gdbjtag.core.loadSymbols" value="true"/>
|
||||
<stringAttribute key="org.eclipse.cdt.debug.gdbjtag.core.pcRegister" value=""/>
|
||||
<stringAttribute key="org.eclipse.cdt.debug.gdbjtag.core.runCommands" value=""/>
|
||||
<booleanAttribute key="org.eclipse.cdt.debug.gdbjtag.core.setPcRegister" value="false"/>
|
||||
<booleanAttribute key="org.eclipse.cdt.debug.gdbjtag.core.setResume" value="false"/>
|
||||
<booleanAttribute key="org.eclipse.cdt.debug.gdbjtag.core.setStopAt" value="true"/>
|
||||
<stringAttribute key="org.eclipse.cdt.debug.gdbjtag.core.stopAt" value="main"/>
|
||||
<stringAttribute key="org.eclipse.cdt.debug.gdbjtag.core.symbolsFileName" value="F:\Work\e2studioWorkspaces\RX65N\forTSIP1.06\wolfssl-4.4.0\IDE\Renesas\e2studio\Projects\test\HardwareDebug\test.x"/>
|
||||
<stringAttribute key="org.eclipse.cdt.debug.gdbjtag.core.symbolsOffset" value="0"/>
|
||||
<booleanAttribute key="org.eclipse.cdt.debug.gdbjtag.core.useFileForImage" value="false"/>
|
||||
<booleanAttribute key="org.eclipse.cdt.debug.gdbjtag.core.useFileForSymbols" value="false"/>
|
||||
<booleanAttribute key="org.eclipse.cdt.debug.gdbjtag.core.useProjBinaryForImage" value="true"/>
|
||||
<booleanAttribute key="org.eclipse.cdt.debug.gdbjtag.core.useProjBinaryForSymbols" value="true"/>
|
||||
<stringAttribute key="org.eclipse.cdt.dsf.gdb.DEBUG_NAME" value="rx-elf-gdb -rx-force-v2"/>
|
||||
<booleanAttribute key="org.eclipse.cdt.dsf.gdb.NON_STOP" value="true"/>
|
||||
<intAttribute key="org.eclipse.cdt.launch.ATTR_BUILD_BEFORE_LAUNCH_ATTR" value="2"/>
|
||||
<stringAttribute key="org.eclipse.cdt.launch.COREFILE_PATH" value=""/>
|
||||
<stringAttribute key="org.eclipse.cdt.launch.DEBUGGER_START_MODE" value="remote"/>
|
||||
<booleanAttribute key="org.eclipse.cdt.launch.DEBUGGER_STOP_AT_MAIN" value="true"/>
|
||||
<stringAttribute key="org.eclipse.cdt.launch.DEBUGGER_STOP_AT_MAIN_SYMBOL" value="main"/>
|
||||
<stringAttribute key="org.eclipse.cdt.launch.PROGRAM_NAME" value="HardwareDebug/test.x"/>
|
||||
<stringAttribute key="org.eclipse.cdt.launch.PROJECT_ATTR" value="test"/>
|
||||
<booleanAttribute key="org.eclipse.cdt.launch.PROJECT_BUILD_CONFIG_AUTO_ATTR" value="true"/>
|
||||
<stringAttribute key="org.eclipse.cdt.launch.PROJECT_BUILD_CONFIG_ID_ATTR" value="com.renesas.cdt.managedbuild.renesas.ccrx.hardwaredebug.configuration.1378385971"/>
|
||||
<listAttribute key="org.eclipse.debug.core.MAPPED_RESOURCE_PATHS">
|
||||
<listEntry value="/test"/>
|
||||
</listAttribute>
|
||||
<listAttribute key="org.eclipse.debug.core.MAPPED_RESOURCE_TYPES">
|
||||
<listEntry value="4"/>
|
||||
</listAttribute>
|
||||
<stringAttribute key="org.eclipse.dsf.launch.MEMORY_BLOCKS" value="<?xml version="1.0" encoding="UTF-8" standalone="no"?><memoryBlockExpressionList context="reserved-for-future-use"><gdbmemoryBlockExpression address="6520" core_thread_id="1_i1" label="0x1978"><memoryRendering id="org.eclipse.debug.ui.rendering.raw_memory"><renderingInstance containerId="org.eclipse.debug.ui.MemoryView.RenderingViewPane.1" viewId="org.eclipse.debug.ui.MemoryView" viewSecondaryId=""/></memoryRendering></gdbmemoryBlockExpression><gdbmemoryBlockExpression address="6668" core_thread_id="1_i1" label="0x1a0c"><memoryRendering id="org.eclipse.debug.ui.rendering.raw_memory"><renderingInstance containerId="org.eclipse.debug.ui.MemoryView.RenderingViewPane.1" viewId="org.eclipse.debug.ui.MemoryView" viewSecondaryId=""/></memoryRendering></gdbmemoryBlockExpression><gdbmemoryBlockExpression address="6504" core_thread_id="1_i1" label="0x1968"><memoryRendering id="org.eclipse.debug.ui.rendering.raw_memory"><renderingInstance containerId="org.eclipse.debug.ui.MemoryView.RenderingViewPane.1" viewId="org.eclipse.debug.ui.MemoryView" viewSecondaryId=""/></memoryRendering></gdbmemoryBlockExpression></memoryBlockExpressionList>"/>
|
||||
<stringAttribute key="process_factory_id" value="org.eclipse.cdt.dsf.gdb.GdbProcessFactory"/>
|
||||
</launchConfiguration>
|
||||
219
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/wolfssl/wolfssl.rcpc
vendored
Normal file
219
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/GR-ROSE/wolfssl/wolfssl.rcpc
vendored
Normal file
@@ -0,0 +1,219 @@
|
||||
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
|
||||
<MicomToolCommonProjectFile Version="1.00">
|
||||
<CreatorType Name="e2studio" Version=""/>
|
||||
<Placeholders>
|
||||
<PlaceholderPrefix>${</PlaceholderPrefix>
|
||||
<PlaceholderPostfix>}</PlaceholderPostfix>
|
||||
</Placeholders>
|
||||
<Project Name="wolfssl" Type="Library">
|
||||
<Files>
|
||||
<Category Name="src">
|
||||
<Path>..\..\..\..\..\..\src\crl.c</Path>
|
||||
<Path>..\..\..\..\..\..\src\internal.c</Path>
|
||||
<Path>..\..\..\..\..\..\src\keys.c</Path>
|
||||
<Path>..\..\..\..\..\..\src\ocsp.c</Path>
|
||||
<Path>..\..\..\..\..\..\src\sniffer.c</Path>
|
||||
<Path>..\..\..\..\..\..\src\ssl.c</Path>
|
||||
<Path>..\..\..\..\..\..\src\tls.c</Path>
|
||||
<Path>..\..\..\..\..\..\src\tls13.c</Path>
|
||||
<Path>..\..\..\..\..\..\src\wolfio.c</Path>
|
||||
</Category>
|
||||
<Category Name="wolfcrypt">
|
||||
<Category Name="port">
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\port\Renesas\renesas_common.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\port\Renesas\renesas_tsip_aes.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\port\Renesas\renesas_tsip_sha.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\port\Renesas\renesas_tsip_util.c</Path>
|
||||
</Category>
|
||||
<Category Name="src">
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\aes.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\arc4.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\asm.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\asn.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\blake2b.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\camellia.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\chacha.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\chacha20_poly1305.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\cmac.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\coding.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\compress.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\cpuid.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\cryptocb.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\curve25519.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\des3.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\dh.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\dsa.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\ecc.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\ecc_fp.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\ed25519.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\error.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\fe_low_mem.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\fe_operations.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\ge_low_mem.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\ge_operations.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\hash.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\hmac.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\integer.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\kdf.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\logging.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\md2.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\md4.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\md5.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\memory.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\pkcs12.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\pkcs7.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\poly1305.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\pwdbased.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\random.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\ripemd.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\rsa.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\sha.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\sha256.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\sha3.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\sha512.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\signature.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\sp_arm32.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\sp_arm64.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\sp_c32.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\sp_c64.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\sp_int.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\sp_x86_64.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\srp.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\tfm.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\wc_encrypt.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\wc_port.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\wolfevent.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\wolfmath.c</Path>
|
||||
</Category>
|
||||
</Category>
|
||||
</Files>
|
||||
<Device Category="com.renesas.cdt.managedbuild.renesas.ccrx.common.option.cpu.rx600" Series="RX">R5F565NEHxFP</Device>
|
||||
<BuildOptions Name="CC-RX" Version="v3.04.00">
|
||||
<BuildMode Active="True" Name="Debug">
|
||||
<GeneralOptions/>
|
||||
<CompileOptions>
|
||||
<Option>-isa=rxv2</Option>
|
||||
<Option>-fpu</Option>
|
||||
<Option>-include="${ProjDirPath}\..\common"</Option>
|
||||
<Option>-include="${ProjDirPath}\\..\..\..\..\..\..\"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\test\src\smc_gen\"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\test\src\smc_gen\r_bsp"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\test\src\smc_gen\r_config"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\test\src\smc_gen\r_tsip_rx"</Option>
|
||||
<Option>-define=WOLFSSL_USER_SETTINGS</Option>
|
||||
<Option>-utf8</Option>
|
||||
<Option>-nomessage</Option>
|
||||
<Option>-debug</Option>
|
||||
<Option>-outcode=utf8</Option>
|
||||
<Option>-optimize=0</Option>
|
||||
<Option>-nologo</Option>
|
||||
<Option>-lang=c99</Option>
|
||||
<Option>-lang=cpp</Option>
|
||||
<Option>-output=obj=${CONFIGDIR}\${FILELEAF}.obj</Option>
|
||||
<Option>-obj_path=${CONFIGDIR}</Option>
|
||||
</CompileOptions>
|
||||
<AssembleOptions>
|
||||
<Option>-isa=rxv2</Option>
|
||||
<Option>-fpu</Option>
|
||||
<Option>-utf8</Option>
|
||||
<Option>-debug</Option>
|
||||
<Option>-nologo</Option>
|
||||
<Option>-output=${CONFIGDIR}</Option>
|
||||
</AssembleOptions>
|
||||
<LinkOptions>
|
||||
<Option>-output="${ProjName}.lib"</Option>
|
||||
<Option>-form=library=u</Option>
|
||||
<Option>-nomessage</Option>
|
||||
<Option>-list=${ProjName}.lbp</Option>
|
||||
<Option>-nologo</Option>
|
||||
<PreLinker>Auto</PreLinker>
|
||||
</LinkOptions>
|
||||
<LibraryGenerateOptions>
|
||||
<GenerateMode>None</GenerateMode>
|
||||
</LibraryGenerateOptions>
|
||||
<LinkOrder>
|
||||
<Path>Debug\crl.obj</Path>
|
||||
<Path>Debug\internal.obj</Path>
|
||||
<Path>Debug\keys.obj</Path>
|
||||
<Path>Debug\ocsp.obj</Path>
|
||||
<Path>Debug\sniffer.obj</Path>
|
||||
<Path>Debug\ssl.obj</Path>
|
||||
<Path>Debug\tls.obj</Path>
|
||||
<Path>Debug\tls13.obj</Path>
|
||||
<Path>Debug\wolfio.obj</Path>
|
||||
<Path>Debug\renesas_common.obj</Path>
|
||||
<Path>Debug\renesas_tsip_aes.obj</Path>
|
||||
<Path>Debug\renesas_tsip_sha.obj</Path>
|
||||
<Path>Debug\renesas_tsip_util.obj</Path>
|
||||
<Path>Debug\aes.obj</Path>
|
||||
<Path>Debug\arc4.obj</Path>
|
||||
<Path>Debug\asm.obj</Path>
|
||||
<Path>Debug\asn.obj</Path>
|
||||
<Path>Debug\blake2b.obj</Path>
|
||||
<Path>Debug\camellia.obj</Path>
|
||||
<Path>Debug\chacha.obj</Path>
|
||||
<Path>Debug\chacha20_poly1305.obj</Path>
|
||||
<Path>Debug\cmac.obj</Path>
|
||||
<Path>Debug\coding.obj</Path>
|
||||
<Path>Debug\compress.obj</Path>
|
||||
<Path>Debug\cpuid.obj</Path>
|
||||
<Path>Debug\cryptocb.obj</Path>
|
||||
<Path>Debug\curve25519.obj</Path>
|
||||
<Path>Debug\des3.obj</Path>
|
||||
<Path>Debug\dh.obj</Path>
|
||||
<Path>Debug\dsa.obj</Path>
|
||||
<Path>Debug\ecc.obj</Path>
|
||||
<Path>Debug\ecc_fp.obj</Path>
|
||||
<Path>Debug\ed25519.obj</Path>
|
||||
<Path>Debug\error.obj</Path>
|
||||
<Path>Debug\fe_low_mem.obj</Path>
|
||||
<Path>Debug\fe_operations.obj</Path>
|
||||
<Path>Debug\ge_low_mem.obj</Path>
|
||||
<Path>Debug\ge_operations.obj</Path>
|
||||
<Path>Debug\hash.obj</Path>
|
||||
<Path>Debug\hmac.obj</Path>
|
||||
<Path>Debug\integer.obj</Path>
|
||||
<Path>Debug\kdf.obj</Path>
|
||||
<Path>Debug\logging.obj</Path>
|
||||
<Path>Debug\md2.obj</Path>
|
||||
<Path>Debug\md4.obj</Path>
|
||||
<Path>Debug\md5.obj</Path>
|
||||
<Path>Debug\memory.obj</Path>
|
||||
<Path>Debug\pkcs12.obj</Path>
|
||||
<Path>Debug\pkcs7.obj</Path>
|
||||
<Path>Debug\poly1305.obj</Path>
|
||||
<Path>Debug\pwdbased.obj</Path>
|
||||
<Path>Debug\random.obj</Path>
|
||||
<Path>Debug\ripemd.obj</Path>
|
||||
<Path>Debug\rsa.obj</Path>
|
||||
<Path>Debug\sha.obj</Path>
|
||||
<Path>Debug\sha256.obj</Path>
|
||||
<Path>Debug\sha3.obj</Path>
|
||||
<Path>Debug\sha512.obj</Path>
|
||||
<Path>Debug\signature.obj</Path>
|
||||
<Path>Debug\sp_arm32.obj</Path>
|
||||
<Path>Debug\sp_arm64.obj</Path>
|
||||
<Path>Debug\sp_c32.obj</Path>
|
||||
<Path>Debug\sp_c64.obj</Path>
|
||||
<Path>Debug\sp_int.obj</Path>
|
||||
<Path>Debug\sp_x86_64.obj</Path>
|
||||
<Path>Debug\srp.obj</Path>
|
||||
<Path>Debug\tfm.obj</Path>
|
||||
<Path>Debug\wc_encrypt.obj</Path>
|
||||
<Path>Debug\wc_port.obj</Path>
|
||||
<Path>Debug\wolfevent.obj</Path>
|
||||
<Path>Debug\wolfmath.obj</Path>
|
||||
</LinkOrder>
|
||||
<CommonOptions>
|
||||
<IncludePathForC>"${ProjDirPath}\..\common"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\\..\..\..\..\..\..\"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\test\src\smc_gen\"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\test\src\smc_gen\r_bsp"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\test\src\smc_gen\r_config"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\test\src\smc_gen\r_tsip_rx"</IncludePathForC>
|
||||
<MacroForC>WOLFSSL_USER_SETTINGS</MacroForC>
|
||||
</CommonOptions>
|
||||
</BuildMode>
|
||||
</BuildOptions>
|
||||
</Project>
|
||||
</MicomToolCommonProjectFile>
|
||||
Binary file not shown.
Binary file not shown.
9
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/RSK/README_EN.md
vendored
Normal file
9
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/RSK/README_EN.md
vendored
Normal file
@@ -0,0 +1,9 @@
|
||||
wolfSSL sample application project for Renesas RSK+RX65N-2MB evaluation board
|
||||
======
|
||||
|
||||
<br>
|
||||
|
||||
A sample program for evaluating wolfSSL targeting the Renesas RSK+RX65N-2MB evaluation board is provided. For details on the program, refer to the following documents included in the package.
|
||||
|
||||
+ InstructionManualForExample_RSK+RX65N-2MB_JP.pdf (Japanese)
|
||||
+ InstructionManualForExample_RSK+RX65N-2MB_EN.pdf (English)
|
||||
12
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/RSK/README_JP.md
vendored
Normal file
12
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/RSK/README_JP.md
vendored
Normal file
@@ -0,0 +1,12 @@
|
||||
Renesas RSK+RX65N-2MB 評価ボード用 wolfSSLサンプルプロジェクト
|
||||
======
|
||||
|
||||
<br>
|
||||
|
||||
|
||||
Renesas社製 RSK+RX65N-2MB 評価ボードをターゲットとしてwolfSSLを評価するためのサンプルプログラムを提供します。サンプルプログラムに関するマニュアルは同梱の
|
||||
|
||||
+ InstructionManualForExample_RSK+RX65N-2MB_JP.pdf (日本語版)
|
||||
+ InstructionManualForExample_RSK+RX65N-2MB_EN.pdf (英語版)
|
||||
|
||||
を参照ください。
|
||||
17
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/RSK/include.am
vendored
Normal file
17
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/RSK/include.am
vendored
Normal file
@@ -0,0 +1,17 @@
|
||||
# vim:ft=automake
|
||||
# included from Top Level Makefile.am
|
||||
# All paths should be given relative to the root
|
||||
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/RSK/README_EN.md
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/RSK/README_JP.md
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/RSK/InstructionManualForExample_RSK+RX65N-2MB_EN.pdf
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/RSK/InstructionManualForExample_RSK+RX65N-2MB_JP.pdf
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/RSK/resource/section.esi
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/RSK/wolfssl/.cproject
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/RSK/wolfssl/.project
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/RSK/wolfssl/wolfssl.rcpc
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/RSK/wolfssl_demo/key_data.c
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/RSK/wolfssl_demo/key_data.h
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/RSK/wolfssl_demo/wolfssl_demo.c
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/RSK/wolfssl_demo/wolfssl_demo.h
|
||||
EXTRA_DIST+= IDE/Renesas/e2studio/RX65N/RSK/wolfssl_demo/user_settings.h
|
||||
41
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/RSK/resource/section.esi
vendored
Normal file
41
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/RSK/resource/section.esi
vendored
Normal file
@@ -0,0 +1,41 @@
|
||||
<?xml version="1.0" encoding="ASCII"?>
|
||||
<com.renesas.linkersection.model:SectionContainer xmi:version="2.0" xmlns:xmi="http://www.omg.org/XMI" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:com.renesas.linkersection.model="http:///LinkerSection.ecore">
|
||||
<sections name="SU">
|
||||
<sectionAddress xsi:type="com.renesas.linkersection.model:FixedAddress" fixedAddress="4"/>
|
||||
</sections>
|
||||
<sections name="SI"/>
|
||||
<sections name="R_1"/>
|
||||
<sections name="R_2"/>
|
||||
<sections name="R"/>
|
||||
<sections name="RPFRAM2"/>
|
||||
<sections name="C_PKCS11_STORAGE*">
|
||||
<sectionAddress xsi:type="com.renesas.linkersection.model:FixedAddress" fixedAddress="1050624"/>
|
||||
</sections>
|
||||
<sections name="C_SYSTEM_CONFIG*">
|
||||
<sectionAddress xsi:type="com.renesas.linkersection.model:FixedAddress" fixedAddress="1067008"/>
|
||||
</sections>
|
||||
<sections name="B_ETHERNET_BUFFERS_1">
|
||||
<sectionAddress xsi:type="com.renesas.linkersection.model:FixedAddress" fixedAddress="8388608"/>
|
||||
</sections>
|
||||
<sections name="B_RX_DESC_1"/>
|
||||
<sections name="B_TX_DESC_1"/>
|
||||
<sections name="B"/>
|
||||
<sections name="B_1"/>
|
||||
<sections name="B_2"/>
|
||||
<sections name="C_1">
|
||||
<sectionAddress xsi:type="com.renesas.linkersection.model:FixedAddress" fixedAddress="4292870144"/>
|
||||
</sections>
|
||||
<sections name="C_2"/>
|
||||
<sections name="C"/>
|
||||
<sections name="C$*"/>
|
||||
<sections name="D*"/>
|
||||
<sections name="W*"/>
|
||||
<sections name="L"/>
|
||||
<sections name="P*"/>
|
||||
<sections name="EXCEPTVECT">
|
||||
<sectionAddress xsi:type="com.renesas.linkersection.model:FixedAddress" fixedAddress="4294967168"/>
|
||||
</sections>
|
||||
<sections name="RESETVECT">
|
||||
<sectionAddress xsi:type="com.renesas.linkersection.model:FixedAddress" fixedAddress="4294967292"/>
|
||||
</sections>
|
||||
</com.renesas.linkersection.model:SectionContainer>
|
||||
230
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/RSK/wolfssl/wolfssl.rcpc
vendored
Normal file
230
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/RSK/wolfssl/wolfssl.rcpc
vendored
Normal file
@@ -0,0 +1,230 @@
|
||||
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
|
||||
<MicomToolCommonProjectFile Version="1.00">
|
||||
<CreatorType Name="e2studio" Version=""/>
|
||||
<Placeholders>
|
||||
<PlaceholderPrefix>${</PlaceholderPrefix>
|
||||
<PlaceholderPostfix>}</PlaceholderPostfix>
|
||||
</Placeholders>
|
||||
<Project Name="wolfssl" Type="Library">
|
||||
<Files>
|
||||
<Category Name="src">
|
||||
<Path>..\..\..\..\..\..\src\crl.c</Path>
|
||||
<Path>..\..\..\..\..\..\src\internal.c</Path>
|
||||
<Path>..\..\..\..\..\..\src\keys.c</Path>
|
||||
<Path>..\..\..\..\..\..\src\ocsp.c</Path>
|
||||
<Path>..\..\..\..\..\..\src\sniffer.c</Path>
|
||||
<Path>..\..\..\..\..\..\src\ssl.c</Path>
|
||||
<Path>..\..\..\..\..\..\src\tls.c</Path>
|
||||
<Path>..\..\..\..\..\..\src\tls13.c</Path>
|
||||
<Path>..\..\..\..\..\..\src\wolfio.c</Path>
|
||||
</Category>
|
||||
<Category Name="wolfcrypt">
|
||||
<Category Name="port">
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\port\Renesas\renesas_common.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\port\Renesas\renesas_tsip_aes.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\port\Renesas\renesas_tsip_sha.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\port\Renesas\renesas_tsip_util.c</Path>
|
||||
</Category>
|
||||
<Category Name="src">
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\aes.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\arc4.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\asm.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\asn.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\blake2b.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\camellia.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\chacha.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\chacha20_poly1305.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\cmac.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\coding.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\compress.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\cpuid.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\cryptocb.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\curve25519.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\des3.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\dh.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\dsa.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\ecc.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\ecc_fp.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\ed25519.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\error.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\fe_low_mem.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\fe_operations.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\ge_low_mem.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\ge_operations.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\hash.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\hmac.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\integer.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\kdf.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\logging.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\md2.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\md4.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\md5.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\memory.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\pkcs12.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\pkcs7.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\poly1305.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\pwdbased.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\random.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\ripemd.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\rsa.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\sha.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\sha256.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\sha3.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\sha512.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\signature.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\sp_arm32.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\sp_arm64.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\sp_c32.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\sp_c64.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\sp_int.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\sp_x86_64.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\srp.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\tfm.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\wc_encrypt.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\wc_port.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\wolfevent.c</Path>
|
||||
<Path>..\..\..\..\..\..\wolfcrypt\src\wolfmath.c</Path>
|
||||
</Category>
|
||||
</Category>
|
||||
</Files>
|
||||
<Device Category="com.renesas.cdt.managedbuild.renesas.ccrx.common.option.cpu.rx600" Series="RX">R5F565NEDxFC</Device>
|
||||
<BuildOptions Name="CC-RX" Version="v3.04.00">
|
||||
<BuildMode Active="True" Name="Debug">
|
||||
<GeneralOptions/>
|
||||
<CompileOptions>
|
||||
<Option>-isa=rxv2</Option>
|
||||
<Option>-fpu</Option>
|
||||
<Option>-include="${ProjDirPath}\..\..\..\..\..\..\"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\wolfssl_demo"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\..\..\..\..\..\..\demos"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\..\..\..\..\..\..\freertos_kernel\include"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\..\..\..\..\..\..\freertos_kernel\portable\Renesas\RX600v2"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\..\..\..\..\..\..\libraries\freertos_plus\standard\freertos_plus_tcp\include"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\..\..\..\..\..\..\vendors\renesas\amazon_freertos_common"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\..\..\..\..\..\..\vendors\renesas\boards\rx65n-rsk\aws_demos\config_files"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\..\..\..\..\..\..\vendors\renesas\boards\rx65n-rsk\aws_demos\src\smc_gen"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\..\..\..\..\..\..\vendors\renesas\boards\rx65n-rsk\aws_demos\src\smc_gen\r_config"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\..\..\..\..\..\..\vendors\renesas\boards\rx65n-rsk\aws_demos\src\smc_gen\r_bsp"</Option>
|
||||
<Option>-include="${ProjDirPath}\..\..\..\..\..\..\..\vendors\renesas\boards\rx65n-rsk\aws_demos\src\smc_gen\r_tsip_rx"</Option>
|
||||
<Option>-define=WOLFSSL_USER_SETTINGS</Option>
|
||||
<Option>-utf8</Option>
|
||||
<Option>-nomessage</Option>
|
||||
<Option>-debug</Option>
|
||||
<Option>-outcode=utf8</Option>
|
||||
<Option>-nologo</Option>
|
||||
<Option>-lang=c99</Option>
|
||||
<Option>-lang=cpp</Option>
|
||||
<Option>-output=obj=${CONFIGDIR}\${FILELEAF}.obj</Option>
|
||||
<Option>-obj_path=${CONFIGDIR}</Option>
|
||||
</CompileOptions>
|
||||
<AssembleOptions>
|
||||
<Option>-isa=rxv2</Option>
|
||||
<Option>-fpu</Option>
|
||||
<Option>-utf8</Option>
|
||||
<Option>-debug</Option>
|
||||
<Option>-nologo</Option>
|
||||
<Option>-output=${CONFIGDIR}</Option>
|
||||
</AssembleOptions>
|
||||
<LinkOptions>
|
||||
<Option>-output="${ProjName}.lib"</Option>
|
||||
<Option>-form=library=u</Option>
|
||||
<Option>-nomessage</Option>
|
||||
<Option>-list=${ProjName}.lbp</Option>
|
||||
<Option>-nologo</Option>
|
||||
<PreLinker>Auto</PreLinker>
|
||||
</LinkOptions>
|
||||
<LibraryGenerateOptions>
|
||||
<GenerateMode>None</GenerateMode>
|
||||
</LibraryGenerateOptions>
|
||||
<LinkOrder>
|
||||
<Path>Debug\crl.obj</Path>
|
||||
<Path>Debug\internal.obj</Path>
|
||||
<Path>Debug\keys.obj</Path>
|
||||
<Path>Debug\ocsp.obj</Path>
|
||||
<Path>Debug\sniffer.obj</Path>
|
||||
<Path>Debug\ssl.obj</Path>
|
||||
<Path>Debug\tls.obj</Path>
|
||||
<Path>Debug\tls13.obj</Path>
|
||||
<Path>Debug\wolfio.obj</Path>
|
||||
<Path>Debug\renesas_common.obj</Path>
|
||||
<Path>Debug\renesas_tsip_aes.obj</Path>
|
||||
<Path>Debug\renesas_tsip_sha.obj</Path>
|
||||
<Path>Debug\renesas_tsip_util.obj</Path>
|
||||
<Path>Debug\aes.obj</Path>
|
||||
<Path>Debug\arc4.obj</Path>
|
||||
<Path>Debug\asm.obj</Path>
|
||||
<Path>Debug\asn.obj</Path>
|
||||
<Path>Debug\blake2b.obj</Path>
|
||||
<Path>Debug\camellia.obj</Path>
|
||||
<Path>Debug\chacha.obj</Path>
|
||||
<Path>Debug\chacha20_poly1305.obj</Path>
|
||||
<Path>Debug\cmac.obj</Path>
|
||||
<Path>Debug\coding.obj</Path>
|
||||
<Path>Debug\compress.obj</Path>
|
||||
<Path>Debug\cpuid.obj</Path>
|
||||
<Path>Debug\cryptocb.obj</Path>
|
||||
<Path>Debug\curve25519.obj</Path>
|
||||
<Path>Debug\des3.obj</Path>
|
||||
<Path>Debug\dh.obj</Path>
|
||||
<Path>Debug\dsa.obj</Path>
|
||||
<Path>Debug\ecc.obj</Path>
|
||||
<Path>Debug\ecc_fp.obj</Path>
|
||||
<Path>Debug\ed25519.obj</Path>
|
||||
<Path>Debug\error.obj</Path>
|
||||
<Path>Debug\fe_low_mem.obj</Path>
|
||||
<Path>Debug\fe_operations.obj</Path>
|
||||
<Path>Debug\ge_low_mem.obj</Path>
|
||||
<Path>Debug\ge_operations.obj</Path>
|
||||
<Path>Debug\hash.obj</Path>
|
||||
<Path>Debug\hmac.obj</Path>
|
||||
<Path>Debug\integer.obj</Path>
|
||||
<Path>Debug\kdf.obj</Path>
|
||||
<Path>Debug\logging.obj</Path>
|
||||
<Path>Debug\md2.obj</Path>
|
||||
<Path>Debug\md4.obj</Path>
|
||||
<Path>Debug\md5.obj</Path>
|
||||
<Path>Debug\memory.obj</Path>
|
||||
<Path>Debug\pkcs12.obj</Path>
|
||||
<Path>Debug\pkcs7.obj</Path>
|
||||
<Path>Debug\poly1305.obj</Path>
|
||||
<Path>Debug\pwdbased.obj</Path>
|
||||
<Path>Debug\random.obj</Path>
|
||||
<Path>Debug\ripemd.obj</Path>
|
||||
<Path>Debug\rsa.obj</Path>
|
||||
<Path>Debug\sha.obj</Path>
|
||||
<Path>Debug\sha256.obj</Path>
|
||||
<Path>Debug\sha3.obj</Path>
|
||||
<Path>Debug\sha512.obj</Path>
|
||||
<Path>Debug\signature.obj</Path>
|
||||
<Path>Debug\sp_arm32.obj</Path>
|
||||
<Path>Debug\sp_arm64.obj</Path>
|
||||
<Path>Debug\sp_c32.obj</Path>
|
||||
<Path>Debug\sp_c64.obj</Path>
|
||||
<Path>Debug\sp_int.obj</Path>
|
||||
<Path>Debug\sp_x86_64.obj</Path>
|
||||
<Path>Debug\srp.obj</Path>
|
||||
<Path>Debug\tfm.obj</Path>
|
||||
<Path>Debug\wc_encrypt.obj</Path>
|
||||
<Path>Debug\wc_port.obj</Path>
|
||||
<Path>Debug\wolfevent.obj</Path>
|
||||
<Path>Debug\wolfmath.obj</Path>
|
||||
</LinkOrder>
|
||||
<CommonOptions>
|
||||
<IncludePathForC>"${ProjDirPath}\..\..\..\..\..\..\"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\wolfssl_demo"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\..\..\..\..\..\..\demos"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\..\..\..\..\..\..\freertos_kernel\include"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\..\..\..\..\..\..\freertos_kernel\portable\Renesas\RX600v2"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\..\..\..\..\..\..\libraries\freertos_plus\standard\freertos_plus_tcp\include"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\..\..\..\..\..\..\vendors\renesas\amazon_freertos_common"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\..\..\..\..\..\..\vendors\renesas\boards\rx65n-rsk\aws_demos\config_files"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\..\..\..\..\..\..\vendors\renesas\boards\rx65n-rsk\aws_demos\src\smc_gen"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\..\..\..\..\..\..\vendors\renesas\boards\rx65n-rsk\aws_demos\src\smc_gen\r_config"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\..\..\..\..\..\..\vendors\renesas\boards\rx65n-rsk\aws_demos\src\smc_gen\r_bsp"</IncludePathForC>
|
||||
<IncludePathForC>"${ProjDirPath}\..\..\..\..\..\..\..\vendors\renesas\boards\rx65n-rsk\aws_demos\src\smc_gen\r_tsip_rx"</IncludePathForC>
|
||||
<MacroForC>WOLFSSL_USER_SETTINGS</MacroForC>
|
||||
</CommonOptions>
|
||||
</BuildMode>
|
||||
</BuildOptions>
|
||||
</Project>
|
||||
</MicomToolCommonProjectFile>
|
||||
231
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/RSK/wolfssl_demo/key_data.c
vendored
Normal file
231
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/RSK/wolfssl_demo/key_data.c
vendored
Normal file
@@ -0,0 +1,231 @@
|
||||
/* key_data.c
|
||||
*
|
||||
* Copyright (C) 2006-2022 wolfSSL Inc.
|
||||
*
|
||||
* This file is part of wolfSSL.
|
||||
*
|
||||
* wolfSSL is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* wolfSSL is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
*/
|
||||
|
||||
|
||||
#include "key_data.h"
|
||||
|
||||
/*-------------------------------------------------------------------------
|
||||
TSIP v1.09 or later
|
||||
--------------------------------------------------------------------------*/
|
||||
#if defined(WOLFSSL_RENESAS_TSIP_TLS) && (WOLFSSL_RENESAS_TSIP_VER >=109)
|
||||
|
||||
const st_key_block_data_t g_key_block_data =
|
||||
{
|
||||
/* uint8_t encrypted_provisioning_key[R_TSIP_AES_CBC_IV_BYTE_SIZE * 2]; */
|
||||
{
|
||||
0x94, 0x4D, 0x99, 0x53, 0xE9, 0x15, 0xD1, 0xD9, 0x0A, 0x2C, 0x17, 0x48,
|
||||
0x87, 0x2F, 0x22, 0xA8, 0x90, 0xB3, 0xDE, 0x25, 0x17, 0xEA, 0xE6, 0x31,
|
||||
0x28, 0x3F, 0xB9, 0x8F, 0xC6, 0xE3, 0xE4, 0x85
|
||||
},
|
||||
/* uint8_t iv[R_TSIP_AES_CBC_IV_BYTE_SIZE]; */
|
||||
{
|
||||
0xF6, 0xA9, 0x83, 0x5A, 0xA1, 0x65, 0x1D, 0x28, 0xC8, 0x1A, 0xA6, 0x9D,
|
||||
0x34, 0xB2, 0x4D, 0x92
|
||||
},
|
||||
/*
|
||||
* uint8_t
|
||||
* encrypted_user_rsa2048_ne_key[R_TSIP_RSA2048_NE_KEY_BYTE_SIZE + 16];
|
||||
*/
|
||||
{
|
||||
0xD9, 0x9A, 0x75, 0x0E, 0x9D, 0x4F, 0x63, 0xA4, 0x02, 0x96, 0xE1, 0xF1,
|
||||
0x49, 0x44, 0xB5, 0x90, 0x59, 0x24, 0xC4, 0x23, 0xF7, 0xA0, 0x32, 0x65,
|
||||
0x68, 0x7B, 0x70, 0xE7, 0xA5, 0xC8, 0x12, 0xD1, 0xCD, 0x55, 0x36, 0x5F,
|
||||
0xE6, 0xEB, 0xD0, 0xAD, 0x5A, 0x7F, 0x9F, 0x41, 0x79, 0x8B, 0x2F, 0x3B,
|
||||
0x17, 0xC9, 0xEE, 0xA7, 0xCB, 0xB5, 0x40, 0xFA, 0x3B, 0x43, 0x1D, 0xF8,
|
||||
0x34, 0xCC, 0xB1, 0xB4, 0x8E, 0x67, 0xF6, 0xA0, 0x49, 0xAA, 0x76, 0x33,
|
||||
0xA4, 0x56, 0xCD, 0x16, 0xE9, 0x76, 0x16, 0x92, 0xBE, 0x3F, 0x3A, 0x3A,
|
||||
0xD7, 0x7A, 0xCD, 0xC9, 0xE2, 0xA0, 0xC8, 0x16, 0x2A, 0x0D, 0xBD, 0x3C,
|
||||
0xEA, 0xC8, 0x26, 0x82, 0xDA, 0x5D, 0x19, 0x71, 0x7B, 0x90, 0x03, 0xEF,
|
||||
0x1E, 0x24, 0x01, 0x62, 0x15, 0x3D, 0x2B, 0x4C, 0xA7, 0x8F, 0xBC, 0xD3,
|
||||
0xD9, 0xC8, 0x9F, 0xBB, 0x4A, 0x62, 0x57, 0xE8, 0xE2, 0x86, 0x8C, 0x56,
|
||||
0x36, 0x64, 0xE7, 0xB9, 0x47, 0x5C, 0x02, 0xF4, 0x87, 0x50, 0x16, 0x9C,
|
||||
0xFB, 0xF6, 0xE9, 0x73, 0x96, 0x78, 0x94, 0x59, 0x12, 0x28, 0x03, 0x37,
|
||||
0x75, 0x56, 0x00, 0x2F, 0xCE, 0x54, 0x7C, 0x34, 0xFD, 0x0B, 0x10, 0x5B,
|
||||
0x4A, 0xEE, 0x11, 0x1B, 0x39, 0xE9, 0x80, 0x8B, 0x27, 0x2D, 0x29, 0x12,
|
||||
0x68, 0x87, 0xD2, 0xC9, 0x78, 0xED, 0xED, 0xF2, 0xA6, 0x4D, 0x6B, 0x10,
|
||||
0x98, 0x9D, 0x52, 0x1C, 0xCE, 0x69, 0x0D, 0x5C, 0x46, 0xEB, 0x5D, 0x9B,
|
||||
0xC8, 0x6A, 0x8E, 0x1F, 0x56, 0x05, 0xBA, 0xD2, 0x50, 0x9F, 0x92, 0xB7,
|
||||
0xD4, 0x4D, 0xCD, 0x58, 0x5B, 0xA7, 0x87, 0x10, 0x6D, 0xF3, 0xDB, 0xA8,
|
||||
0x1D, 0x23, 0x00, 0xE4, 0x81, 0x69, 0x3E, 0x7D, 0xEA, 0x5B, 0x33, 0xF4,
|
||||
0x73, 0xD8, 0x7C, 0xDD, 0x64, 0x74, 0x40, 0x30, 0x93, 0x8D, 0x2C, 0xA5,
|
||||
0x2C, 0x24, 0x11, 0xB2, 0x26, 0x56, 0xE3, 0x41, 0x72, 0xAE, 0x41, 0x56,
|
||||
0x9C, 0x75, 0x11, 0x8E, 0x53, 0x59, 0x77, 0xBF, 0x48, 0x71, 0x86, 0x7C,
|
||||
0x7C, 0xCE, 0x04, 0xB9, 0x73, 0x62, 0xE6, 0x1D, 0xF8, 0xED, 0x93, 0x87
|
||||
},
|
||||
/* uint8_t encrypted_user_update_key[R_TSIP_AES256_KEY_BYTE_SIZE + 16]; */
|
||||
{
|
||||
0
|
||||
},
|
||||
/* uint8_t
|
||||
* encrypted_user_rsa2048_private_key[R_TSIP_RSA2048_ND_KEY_BYTE_SIZE + 16]
|
||||
*/
|
||||
{
|
||||
0x22, 0xEC, 0xE3, 0x79, 0xD1, 0x0C, 0xB4, 0xED, 0xE0, 0xA9, 0x0F, 0xBD,
|
||||
0xC7, 0x0B, 0xB4, 0x1E, 0x82, 0x27, 0x79, 0x20, 0x6A, 0x15, 0x56, 0xD6,
|
||||
0x0F, 0xFA, 0xE4, 0x61, 0x04, 0xDA, 0x81, 0x33, 0x42, 0xBA, 0x6D, 0xB9,
|
||||
0x34, 0x81, 0xFD, 0x67, 0xDF, 0x1D, 0xCB, 0x52, 0x64, 0x9A, 0x2E, 0x30,
|
||||
0x12, 0x60, 0xCB, 0x48, 0x27, 0xB6, 0x38, 0x0B, 0x54, 0x5A, 0x70, 0xCB,
|
||||
0x6F, 0x05, 0x53, 0x46, 0x8B, 0x08, 0x86, 0x24, 0xCB, 0xA2, 0x36, 0x54,
|
||||
0xCD, 0xC9, 0x61, 0x37, 0x43, 0xCB, 0xCC, 0x7C, 0x6B, 0x20, 0x07, 0xB6,
|
||||
0x01, 0x96, 0x32, 0xF5, 0x30, 0x0E, 0x96, 0x05, 0xC4, 0xF5, 0xF0, 0xB0,
|
||||
0xD3, 0x26, 0xAF, 0x6E, 0x39, 0x01, 0x2D, 0xAC, 0x7E, 0x39, 0xCF, 0x48,
|
||||
0x74, 0x7D, 0x98, 0x00, 0xA6, 0x95, 0xDA, 0x4C, 0xAC, 0x81, 0xC7, 0x9A,
|
||||
0x93, 0x69, 0x23, 0xD4, 0x39, 0xCD, 0xB3, 0x62, 0x4A, 0x4A, 0x26, 0x95,
|
||||
0x51, 0xE1, 0x06, 0x8F, 0xB2, 0x3C, 0x8F, 0xDE, 0xF1, 0xC3, 0x69, 0xFC,
|
||||
0xF5, 0xC3, 0xCE, 0x39, 0x3F, 0x7F, 0x2D, 0xA8, 0x8B, 0xB3, 0x2D, 0xE4,
|
||||
0xB8, 0xA4, 0x19, 0x55, 0x29, 0xEC, 0x9C, 0x6A, 0xD7, 0xD7, 0x45, 0x3E,
|
||||
0x1D, 0x18, 0x52, 0xB5, 0x8A, 0xB1, 0x26, 0x43, 0x8C, 0x7A, 0x65, 0xF1,
|
||||
0x17, 0x5E, 0x75, 0x4A, 0x1A, 0x30, 0xD8, 0xEA, 0xC2, 0x19, 0x3C, 0x1E,
|
||||
0x2E, 0xFB, 0xDB, 0xC9, 0x1F, 0x73, 0xC9, 0x95, 0x53, 0x8C, 0x99, 0x5D,
|
||||
0x3B, 0x59, 0xFE, 0x8B, 0xA1, 0xD2, 0xBB, 0xBC, 0xBC, 0x4B, 0x78, 0x0A,
|
||||
0x6B, 0xD8, 0xBE, 0x85, 0x60, 0x08, 0x1E, 0x2F, 0x38, 0x77, 0xA3, 0xC4,
|
||||
0x46, 0xC1, 0x42, 0x39, 0xA6, 0x59, 0x98, 0x59, 0x21, 0x94, 0x1F, 0xDC,
|
||||
0xB3, 0xAE, 0xA3, 0xB6, 0xCC, 0x35, 0x82, 0x6F, 0x87, 0x58, 0x91, 0x70,
|
||||
0xEC, 0x3F, 0x05, 0x86, 0x3C, 0xD1, 0x83, 0xB0, 0xBA, 0xE8, 0xD7, 0xF6,
|
||||
0xE5, 0x9E, 0x50, 0xA4, 0x04, 0xF3, 0x95, 0x9C, 0x41, 0xAF, 0xEB, 0x9D,
|
||||
0xB6, 0xA2, 0xF7, 0x80, 0x5A, 0xC4, 0x67, 0xD4, 0xFD, 0x0C, 0x2A, 0x7C,
|
||||
0x24, 0x03, 0xE5, 0x7F, 0x08, 0x69, 0x18, 0x4E, 0x33, 0x22, 0x7E, 0x03,
|
||||
0x8E, 0x13, 0xFB, 0xC6, 0x9B, 0xA3, 0x44, 0x5B, 0xEC, 0xF9, 0x5C, 0x93,
|
||||
0x3E, 0x9F, 0xBD, 0x72, 0x50, 0x52, 0xF3, 0xEA, 0x34, 0x2B, 0x8E, 0xEC,
|
||||
0x17, 0x42, 0x1A, 0xDF, 0x57, 0xA2, 0x66, 0xA7, 0x0B, 0x3B, 0xE5, 0xF7,
|
||||
0x64, 0x44, 0xA2, 0xA3, 0x5F, 0xB7, 0x5B, 0xF5, 0x99, 0x8C, 0xA0, 0x64,
|
||||
0x04, 0x46, 0x7C, 0x60, 0x75, 0xE4, 0xD9, 0xD5, 0xED, 0x21, 0x1D, 0x65,
|
||||
0x5D, 0x25, 0x21, 0x90, 0x7D, 0xA4, 0x95, 0x15, 0x54, 0x91, 0xD6, 0xB8,
|
||||
0xF9, 0xB7, 0x30, 0xD9, 0x7D, 0x2C, 0x7E, 0x85, 0x6A, 0xCF, 0x31, 0x1C,
|
||||
0xDC, 0x90, 0xA3, 0x75, 0xA4, 0xE4, 0x89, 0x5F, 0x2B, 0xED, 0x93, 0x4E,
|
||||
0xA8, 0x35, 0xD3, 0x20, 0x36, 0x7A, 0x02, 0x23, 0x70, 0xB7, 0xC2, 0x39,
|
||||
0xA4, 0x69, 0xB2, 0xBF, 0xA4, 0x3A, 0x6D, 0xB7, 0xB1, 0x32, 0x32, 0x9A,
|
||||
0x95, 0xEA, 0x02, 0xD2, 0x35, 0xE7, 0x8C, 0xD8, 0x22, 0xA9, 0xC3, 0x4C,
|
||||
0x68, 0x09, 0xA1, 0x2B, 0xB0, 0xE4, 0x55, 0x72, 0x7E, 0xE6, 0x00, 0xDD,
|
||||
0xC6, 0xD1, 0x83, 0x56, 0x08, 0x35, 0xC7, 0x9A, 0x98, 0x0C, 0x79, 0xBD,
|
||||
0x49, 0xBC, 0x3F, 0x45, 0x4A, 0x38, 0x1B, 0x55, 0x2D, 0x52, 0x57, 0x00,
|
||||
0xFC, 0xDB, 0xE7, 0xA0, 0x53, 0xB4, 0x63, 0xE4, 0x37, 0xEC, 0x9F, 0xF0,
|
||||
0xA4, 0x0F, 0xEF, 0x06, 0xF0, 0xC6, 0x5F, 0x0C, 0x4A, 0xB8, 0xC1, 0x96,
|
||||
0x1D, 0x0D, 0x9A, 0x43, 0x89, 0xA4, 0xF6, 0x55, 0x4A, 0x83, 0x54, 0x3F,
|
||||
0xCC, 0x09, 0x65, 0x34, 0xC0, 0x0F, 0x42, 0xF2, 0xE6, 0xDD, 0x2D, 0x8C,
|
||||
0x93, 0x42, 0x09, 0xF6, 0xE4, 0xDF, 0xB2, 0x64, 0x2A, 0x12, 0x7A, 0x59
|
||||
},
|
||||
/* uint8_t
|
||||
* encrypted_user_ecc256_private_key[R_TSIP_ECC_PRIVATE_KEY_BYTE_SIZE + 16];
|
||||
*/
|
||||
{
|
||||
0x25, 0x7A, 0x0C, 0x8C, 0x9B, 0xF9, 0x3C, 0xF5, 0x49, 0x08, 0x86, 0x92,
|
||||
0x00, 0x7D, 0xAB, 0x21, 0x23, 0x38, 0xF8, 0xEA, 0xB0, 0x95, 0x59, 0x9B,
|
||||
0x04, 0xC8, 0xAA, 0xEA, 0x8C, 0x2D, 0x68, 0xF4, 0xD5, 0xD7, 0xA9, 0x6F,
|
||||
0x2C, 0x8C, 0x13, 0x93, 0xA3, 0x80, 0x11, 0xF9, 0x0F, 0x36, 0x14, 0xA8
|
||||
},
|
||||
|
||||
};
|
||||
|
||||
/* Public key type of CA root cert: 0: RSA-2048 2: ECDSA-P256*/
|
||||
#if defined(USE_ECC_CERT)
|
||||
const uint32_t encrypted_user_key_type =
|
||||
R_TSIP_TLS_PUBLIC_KEY_TYPE_ECDSA_P256;
|
||||
#else
|
||||
const uint32_t encrypted_user_key_type =
|
||||
R_TSIP_TLS_PUBLIC_KEY_TYPE_RSA2048;
|
||||
#endif
|
||||
|
||||
const unsigned char ca_ecc_cert_der_sig[] =
|
||||
{
|
||||
0x6e, 0x7d, 0x2b, 0xd3, 0x6d, 0x6a, 0x70, 0x31, 0xbf, 0xcd, 0x6f, 0x32,
|
||||
0x74, 0x8b, 0x4d, 0xdf, 0x7c, 0x72, 0xc6, 0x78, 0x61, 0x2b, 0x0f, 0xcc,
|
||||
0xbc, 0xa3, 0x25, 0x54, 0x04, 0xfa, 0x9e, 0xf7, 0x1c, 0xa2, 0xe1, 0x33,
|
||||
0x90, 0x08, 0xcd, 0x3c, 0xc1, 0x03, 0x66, 0xb6, 0x3f, 0xf1, 0xbf, 0xaf,
|
||||
0x0d, 0xb0, 0xeb, 0xe4, 0xc7, 0x54, 0x60, 0x34, 0x3b, 0x62, 0xcf, 0x28,
|
||||
0x95, 0xa2, 0x08, 0x79, 0xc5, 0x51, 0xf3, 0xe1, 0x88, 0x3b, 0xa0, 0x1d,
|
||||
0x1d, 0x42, 0x5a, 0xba, 0x09, 0xe4, 0x64, 0xa1, 0x83, 0xf4, 0x60, 0x44,
|
||||
0x89, 0xd3, 0xdd, 0x6c, 0x71, 0x7b, 0xd1, 0xb0, 0x28, 0x7b, 0x98, 0xe2,
|
||||
0x4b, 0x99, 0x9a, 0x22, 0xd0, 0xeb, 0x1c, 0x5c, 0xbe, 0x49, 0x1a, 0xcf,
|
||||
0xd7, 0x4b, 0x19, 0xe9, 0xdf, 0x82, 0x21, 0xe3, 0x87, 0x7a, 0x25, 0x58,
|
||||
0x8f, 0x29, 0x0e, 0xce, 0xf4, 0x09, 0x0f, 0x2f, 0x04, 0xe9, 0xd2, 0xf9,
|
||||
0xcc, 0xb7, 0x7a, 0x46, 0x5d, 0x98, 0x05, 0x54, 0x89, 0x8e, 0x09, 0x79,
|
||||
0xa8, 0x6f, 0xf6, 0x12, 0xdd, 0x93, 0x38, 0x83, 0x14, 0x3f, 0x42, 0xcf,
|
||||
0x03, 0x9d, 0x84, 0x9d, 0xe9, 0x6e, 0x9f, 0x87, 0x0f, 0xb8, 0x15, 0x9b,
|
||||
0x9b, 0x4c, 0x32, 0x3b, 0x82, 0x7b, 0x3d, 0xd4, 0x85, 0x1e, 0x71, 0x99,
|
||||
0x67, 0x40, 0x59, 0xad, 0x8c, 0x31, 0xd7, 0xa2, 0x81, 0xfd, 0x46, 0x21,
|
||||
0xd7, 0xc8, 0x89, 0x3d, 0x17, 0x3f, 0x5e, 0x82, 0x5e, 0xfa, 0x7b, 0x34,
|
||||
0x7a, 0x1b, 0x85, 0x86, 0xf8, 0x02, 0xf2, 0xf3, 0x01, 0x2c, 0xbd, 0x4a,
|
||||
0x98, 0x0f, 0xe9, 0x4b, 0x1a, 0xa3, 0xee, 0xfc, 0x77, 0xda, 0xcf, 0xee,
|
||||
0x9c, 0xca, 0xf9, 0xbf, 0xaa, 0x5b, 0xbc, 0x01, 0x4b, 0xd4, 0x74, 0x7c,
|
||||
0xee, 0xfb, 0x7c, 0xc4, 0x31, 0xb7, 0x46, 0x9e, 0x94, 0x84, 0xa3, 0x82,
|
||||
0x0c, 0x7b, 0x61, 0x4e
|
||||
};
|
||||
const int sizeof_ca_ecc_cert_sig = sizeof(ca_ecc_cert_der_sig);
|
||||
|
||||
/* ./ca-cert.der.sign, */
|
||||
const unsigned char ca_cert_der_sig[] =
|
||||
{
|
||||
0x0a, 0xc8, 0xbb, 0x7e, 0x5a, 0x72, 0x6a, 0x5b, 0xf0, 0xc6, 0xbf, 0x36,
|
||||
0x8e, 0xe1, 0xcd, 0xbc, 0x08, 0xfd, 0x22, 0x5a, 0x3b, 0x48, 0x33, 0xb9,
|
||||
0x12, 0x55, 0x80, 0x6c, 0x36, 0x14, 0x05, 0x24, 0x63, 0x20, 0x8b, 0x26,
|
||||
0x69, 0xa9, 0xe3, 0x15, 0xb9, 0x00, 0x8d, 0xea, 0x3a, 0xee, 0x2d, 0x41,
|
||||
0xec, 0x43, 0x4a, 0x17, 0x48, 0x26, 0x4a, 0xd6, 0xe4, 0x1b, 0xa5, 0x97,
|
||||
0x2e, 0xf6, 0x41, 0xa7, 0xa2, 0x2b, 0x83, 0x2c, 0xad, 0x6e, 0x4e, 0xfc,
|
||||
0x57, 0xf1, 0x28, 0xf0, 0xa7, 0xf9, 0x5b, 0x48, 0xab, 0xed, 0x63, 0x22,
|
||||
0xed, 0x1e, 0xf1, 0x9d, 0xab, 0xbf, 0x9c, 0x78, 0x04, 0x49, 0xad, 0xf1,
|
||||
0x43, 0x2f, 0x21, 0x9c, 0x90, 0xb8, 0x35, 0x14, 0x68, 0x12, 0x89, 0x00,
|
||||
0x20, 0x5b, 0x83, 0x52, 0xb7, 0xec, 0x26, 0x01, 0x26, 0xe1, 0x0f, 0xf6,
|
||||
0x98, 0xd1, 0xb6, 0x28, 0x84, 0xc8, 0xa5, 0x3e, 0xe9, 0xfb, 0x19, 0x2e,
|
||||
0x8f, 0xd7, 0x66, 0x98, 0xc0, 0x5e, 0x7b, 0xbc, 0x1a, 0xd9, 0x27, 0xb9,
|
||||
0x76, 0xcc, 0x58, 0x48, 0x0c, 0x0c, 0x22, 0x23, 0x19, 0xfd, 0x22, 0xfa,
|
||||
0x47, 0x90, 0x38, 0x62, 0xe0, 0x91, 0x79, 0x35, 0x3d, 0xa2, 0x83, 0x99,
|
||||
0x2b, 0x86, 0x7a, 0x88, 0x9b, 0x07, 0xe7, 0xc5, 0x95, 0x69, 0x9a, 0x2b,
|
||||
0x2e, 0x47, 0xcf, 0xfd, 0x9e, 0x64, 0xb5, 0xca, 0x44, 0x94, 0x95, 0xf3,
|
||||
0x2a, 0x8f, 0x4a, 0xcf, 0x0f, 0xd4, 0x7e, 0x0d, 0x0f, 0x2a, 0x0b, 0xb6,
|
||||
0x89, 0x64, 0xe3, 0x8c, 0x02, 0x3e, 0x76, 0x66, 0x68, 0x19, 0xa9, 0x07,
|
||||
0x5a, 0xc6, 0x33, 0xcd, 0x27, 0xff, 0x07, 0xd4, 0x91, 0x5b, 0x11, 0x3a,
|
||||
0xe3, 0xf5, 0x69, 0x70, 0xa7, 0xfe, 0xf2, 0xf0, 0xbd, 0x11, 0xaf, 0xa7,
|
||||
0x37, 0xda, 0x24, 0x75, 0x3e, 0x1a, 0x39, 0x49, 0xb4, 0x1e, 0x0e, 0xaf,
|
||||
0x5d, 0x1e, 0x94, 0xdf
|
||||
};
|
||||
const int sizeof_ca_cert_sig = sizeof(ca_cert_der_sig);
|
||||
/* ./client-cert.der.sign, */
|
||||
const unsigned char client_cert_der_sign[] =
|
||||
{
|
||||
0x5D, 0x1F, 0x89, 0x41, 0xEC, 0x47, 0xC8, 0x90, 0x61, 0x79, 0x8A, 0x16,
|
||||
0x1F, 0x31, 0x96, 0x67, 0xD9, 0x3C, 0xEC, 0x6B, 0x58, 0xC6, 0x5A, 0xED,
|
||||
0x99, 0xB3, 0xEF, 0x27, 0x6F, 0x04, 0x8C, 0xD9, 0x68, 0xB1, 0xD6, 0x23,
|
||||
0x15, 0x84, 0x00, 0xE1, 0x27, 0xD1, 0x1F, 0x68, 0xB7, 0x3F, 0x13, 0x53,
|
||||
0x8A, 0x95, 0x5A, 0x20, 0x7C, 0xB2, 0x76, 0x5B, 0xDC, 0xE0, 0xA6, 0x21,
|
||||
0x7C, 0x49, 0xCF, 0x93, 0xBA, 0xD5, 0x12, 0x9F, 0xEE, 0x90, 0x5B, 0x3F,
|
||||
0xA3, 0x9D, 0x13, 0x72, 0xAC, 0x72, 0x16, 0xFE, 0x1D, 0xBE, 0xEB, 0x8E,
|
||||
0xC7, 0xDC, 0xC4, 0xF8, 0x1A, 0xD8, 0xA0, 0xA4, 0xF6, 0x04, 0x30, 0xF6,
|
||||
0x7E, 0xB6, 0xC8, 0xE1, 0xAB, 0x88, 0x37, 0x08, 0x63, 0x72, 0xAA, 0x46,
|
||||
0xCC, 0xCA, 0xF0, 0x9E, 0x02, 0x1E, 0x65, 0x67, 0xFF, 0x2C, 0x9D, 0x81,
|
||||
0x6C, 0x1E, 0xF1, 0x54, 0x05, 0x68, 0x68, 0x18, 0x72, 0x26, 0x55, 0xB6,
|
||||
0x2C, 0x95, 0xC0, 0xC9, 0xB2, 0xA7, 0x0B, 0x60, 0xD7, 0xEB, 0x1D, 0x08,
|
||||
0x1A, 0xA2, 0x54, 0x15, 0x89, 0xCB, 0x83, 0x21, 0x5D, 0x15, 0x9B, 0x38,
|
||||
0xAC, 0x89, 0x63, 0xD5, 0x4B, 0xF4, 0x8B, 0x47, 0x93, 0x78, 0x43, 0xCB,
|
||||
0x9B, 0x71, 0xBF, 0x94, 0x76, 0xB5, 0xCE, 0x35, 0xA9, 0x1A, 0xD5, 0xA5,
|
||||
0xD8, 0x19, 0xA6, 0x04, 0x39, 0xB1, 0x09, 0x8C, 0x65, 0x02, 0x58, 0x3A,
|
||||
0x95, 0xEF, 0xA2, 0xC3, 0x85, 0x18, 0x61, 0x23, 0x2D, 0xC5, 0xCD, 0x62,
|
||||
0xC1, 0x19, 0x31, 0xE5, 0x36, 0x95, 0x22, 0xDB, 0x3E, 0x1A, 0x3C, 0xE8,
|
||||
0xC6, 0x2E, 0xDF, 0xD9, 0x2F, 0x84, 0xC1, 0xF0, 0x38, 0x2B, 0xE5, 0x73,
|
||||
0x35, 0x4F, 0x05, 0xE2, 0xA5, 0x60, 0x79, 0xB0, 0x23, 0xDC, 0x56, 0x4C,
|
||||
0xE7, 0xD9, 0x1F, 0xCF, 0x6A, 0xFC, 0x55, 0xEB, 0xAA, 0x48, 0x3E, 0x95,
|
||||
0x2A, 0x10, 0x01, 0x05
|
||||
};
|
||||
const int sizeof_client_cert_der_sign = sizeof(client_cert_der_sign);
|
||||
|
||||
uint32_t s_inst1[R_TSIP_SINST_WORD_SIZE] = { 0 };
|
||||
uint32_t s_inst2[R_TSIP_SINST2_WORD_SIZE]= { 0 };
|
||||
#endif
|
||||
58
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/RSK/wolfssl_demo/key_data.h
vendored
Normal file
58
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/RSK/wolfssl_demo/key_data.h
vendored
Normal file
@@ -0,0 +1,58 @@
|
||||
/* key_data.h
|
||||
*
|
||||
* Copyright (C) 2006-2022 wolfSSL Inc.
|
||||
*
|
||||
* This file is part of wolfSSL.
|
||||
*
|
||||
* wolfSSL is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* wolfSSL is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
*/
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
#ifndef KEY_DATA_H_
|
||||
#define KEY_DATA_H_
|
||||
|
||||
#include <wolfssl/wolfcrypt/settings.h>
|
||||
|
||||
|
||||
#if defined(WOLFSSL_RENESAS_TSIP)
|
||||
|
||||
#include "r_tsip_rx_if.h"
|
||||
|
||||
typedef struct st_key_block_data
|
||||
{
|
||||
uint8_t encrypted_provisioning_key[R_TSIP_AES_CBC_IV_BYTE_SIZE * 2];
|
||||
uint8_t iv[R_TSIP_AES_CBC_IV_BYTE_SIZE];
|
||||
uint8_t encrypted_user_rsa2048_ne_key[R_TSIP_RSA2048_NE_KEY_BYTE_SIZE + 16];
|
||||
uint8_t encrypted_user_update_key[R_TSIP_AES256_KEY_BYTE_SIZE + 16];
|
||||
uint8_t encrypted_user_rsa2048_private_key[R_TSIP_RSA2048_ND_KEY_BYTE_SIZE + 16];
|
||||
uint8_t encrypted_user_ecc256_private_key[R_TSIP_ECC_PRIVATE_KEY_BYTE_SIZE + 16];
|
||||
} st_key_block_data_t;
|
||||
|
||||
|
||||
extern const uint32_t encrypted_user_key_type;
|
||||
extern const st_key_block_data_t g_key_block_data;
|
||||
|
||||
extern const unsigned char ca_cert_der_sig[];
|
||||
extern const unsigned char ca_ecc_cert_der_sig[];
|
||||
extern const unsigned char client_cert_der_sign[];
|
||||
extern const int sizeof_ca_cert_der;
|
||||
|
||||
|
||||
#endif /* WOLFSSL_RENESAS_TSIP */
|
||||
#endif /* KEY_DATA_H_ */
|
||||
|
||||
228
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/RSK/wolfssl_demo/user_settings.h
vendored
Normal file
228
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/RSK/wolfssl_demo/user_settings.h
vendored
Normal file
@@ -0,0 +1,228 @@
|
||||
/* user_settings.h
|
||||
*
|
||||
* Copyright (C) 2006-2022 wolfSSL Inc.
|
||||
*
|
||||
* This file is part of wolfSSL.
|
||||
*
|
||||
* wolfSSL is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* wolfSSL is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
*/
|
||||
|
||||
/*-- Renesas MCU type ---------------------------------------------------------
|
||||
*
|
||||
*
|
||||
*----------------------------------------------------------------------------*/
|
||||
#define WOLFSSL_RENESAS_RX65N
|
||||
|
||||
|
||||
/*-- Renesas TSIP usage and its version ---------------------------------------
|
||||
*
|
||||
* "WOLFSSL_RENESAS_TSIP" definition makes wolfSSL to use H/W acceleration
|
||||
* for cipher operations.
|
||||
* TSIP definition asks to have its version number.
|
||||
* "WOLFSSL_RENESAS_TSIP_VER" takes following value:
|
||||
* 106: TSIPv1.06
|
||||
* 109: TSIPv1.09
|
||||
* 113: TSIPv1.13
|
||||
* 114: TSIPv1.14
|
||||
* 115: TSIPv1.15
|
||||
*----------------------------------------------------------------------------*/
|
||||
#define WOLFSSL_RENESAS_TSIP
|
||||
#define WOLFSSL_RENESAS_TSIP_VER 115
|
||||
|
||||
|
||||
/*-- TLS version definitions --------------------------------------------------
|
||||
*
|
||||
* wolfSSL supports TLSv1.2 by default. In case you want your system to support
|
||||
* TLSv1.3, uncomment line below.
|
||||
*
|
||||
*----------------------------------------------------------------------------*/
|
||||
#define WOLFSSL_TLS13
|
||||
|
||||
|
||||
/*-- Operating System related definitions --------------------------------------
|
||||
*
|
||||
* In case any real-time OS is used, define its name(e.g. FREERTOS).
|
||||
* Otherwise, define "SINGLE_THREADED". They are exclusive each other.
|
||||
*
|
||||
*----------------------------------------------------------------------------*/
|
||||
|
||||
#define FREERTOS
|
||||
#define FREERTOS_TCP
|
||||
|
||||
|
||||
|
||||
|
||||
/*-- Cipher related definitions -----------------------------------------------
|
||||
*
|
||||
*
|
||||
*----------------------------------------------------------------------------*/
|
||||
|
||||
#define NO_DEV_RANDOM
|
||||
#define NO_MD4
|
||||
#define WOLFSSL_DH_CONST
|
||||
#define HAVE_TLS_EXTENSIONS
|
||||
|
||||
#define HAVE_AESGCM
|
||||
#define HAVE_AESCCM
|
||||
#define HAVE_AES_CBC
|
||||
#define WOLFSSL_SHA512
|
||||
|
||||
#define HAVE_SUPPORTED_CURVES
|
||||
#define HAVE_ECC
|
||||
#define HAVE_CURVE25519
|
||||
#define CURVE25519_SMALL
|
||||
|
||||
|
||||
#define WOLFSSL_STATIC_RSA
|
||||
|
||||
/* USE_ECC_CERT
|
||||
* This macro is for selecting root CA certificate to load, it is valid only
|
||||
* in example applications. wolfSSL does not refer this macro.
|
||||
* If you want to use cipher suites including ECDSA authentication in
|
||||
* the example applications with TSIP, enable this macro.
|
||||
* In TSIP 1.13 or later version, following cipher suites are
|
||||
* available:
|
||||
* - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
|
||||
* - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SAH256
|
||||
*
|
||||
* Note that, this macro disables cipher suites including RSA
|
||||
* authentication such as:
|
||||
* - TLS_RSA_WITH_AES_128_CBC_SHA
|
||||
* - TLS_RSA_WITH_AES_256_CBC_SHA
|
||||
* - TLS_RSA_WITH_AES_128_CBC_SHA256
|
||||
* - TLS_RSA_WITH_AES_256_CBC_SHA256
|
||||
* - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
|
||||
* - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA256
|
||||
*
|
||||
*/
|
||||
#define USE_ECC_CERT
|
||||
|
||||
/* In this example application, Root CA cert buffer named
|
||||
* "ca_ecc_cert_der_256" is used under the following macro definition
|
||||
* for ECDSA.
|
||||
*/
|
||||
#define USE_CERT_BUFFERS_256
|
||||
|
||||
/* In this example application, Root CA cert buffer named
|
||||
* "ca_cert_der_2048" is used under the following macro definition
|
||||
* for RSA authentication.
|
||||
*/
|
||||
#define USE_CERT_BUFFERS_2048
|
||||
|
||||
/*-- Misc definitions ---------------------------------------------------------
|
||||
*
|
||||
*
|
||||
*----------------------------------------------------------------------------*/
|
||||
#define SIZEOF_LONG_LONG 8
|
||||
|
||||
|
||||
/*
|
||||
* -- "NO_ASN_TIME" macro is to avoid certificate expiration validation --
|
||||
*
|
||||
* Note. In your actual products, do not forget to comment-out
|
||||
* "NO_ASN_TIME" macro. And prepare time function to get calender time,
|
||||
* otherwise, certificate expiration validation will not work.
|
||||
*/
|
||||
/*#define NO_ASN_TIME*/
|
||||
|
||||
#define NO_MAIN_DRIVER
|
||||
#define BENCH_EMBEDDED
|
||||
#define NO_WOLFSSL_DIR
|
||||
#define WOLFSSL_NO_CURRDIR
|
||||
#define NO_FILESYSTEM
|
||||
#define WOLFSSL_LOG_PRINTF
|
||||
#define WOLFSSL_HAVE_MIN
|
||||
#define WOLFSSL_HAVE_MAX
|
||||
#define WOLFSSL_SMALL_STACK
|
||||
#define NO_WRITEV
|
||||
|
||||
|
||||
#define WOLFSSL_USER_CURRTIME /* for benchmark */
|
||||
#define TIME_OVERRIDES
|
||||
#define XTIME time
|
||||
#define WOLFSSL_GMTIME
|
||||
#define XGMTIME(c,t) gmtime(c)
|
||||
#define USE_WOLF_SUSECONDS_T
|
||||
#define USE_WOLF_TIMEVAL_T
|
||||
|
||||
#define XSTRNCASECMP(s1,s2,n) strncmp(s1,s2,n)
|
||||
|
||||
#define WC_RSA_BLINDING
|
||||
#define TFM_TIMING_RESISTANT
|
||||
#define ECC_TIMING_RESISTANT
|
||||
|
||||
#define USE_FAST_MATH
|
||||
|
||||
/*-- Debugging options ------------------------------------------------------
|
||||
*
|
||||
* "DEBUG_WOLFSSL" definition enables log to output into stdout.
|
||||
* Note: wolfSSL_Debugging_ON() must be called just after wolfSSL_Init().
|
||||
*----------------------------------------------------------------------------*/
|
||||
|
||||
/*#define DEBUG_WOLFSSL*/
|
||||
|
||||
/*-- Definitions for functionality negation -----------------------------------
|
||||
*
|
||||
*
|
||||
*----------------------------------------------------------------------------*/
|
||||
|
||||
/*#define NO_RENESAS_TSIP_CRYPT*/
|
||||
/*#define NO_WOLFSSL_RENESAS_TSIP_TLS_SESSION*/
|
||||
|
||||
#if defined(WOLFCRYPT_ONLY)
|
||||
#undef WOLFSSL_RENESAS_TSIP
|
||||
#endif
|
||||
/*-- Consistency checking between definitions ---------------------------------
|
||||
*
|
||||
*
|
||||
*----------------------------------------------------------------------------*/
|
||||
|
||||
/*-- TSIP TLS specific definitions --*/
|
||||
#if defined(WOLFSSL_RENESAS_TSIP)
|
||||
#if !defined(WOLFSSL_RENESAS_TSIP_VER)
|
||||
#error "WOLFSSL_RENESAS_TSIP_VER is required to be defined and have value"
|
||||
#endif
|
||||
#endif
|
||||
|
||||
/*-- Complementary definitions ------------------------------------------------
|
||||
*
|
||||
*
|
||||
*----------------------------------------------------------------------------*/
|
||||
|
||||
#if defined(WOLFSSL_RENESAS_TSIP)
|
||||
|
||||
#if !defined(NO_RENESAS_TSIP_CRYPT)
|
||||
#define WOLFSSL_RENESAS_TSIP_CRYPT
|
||||
#define WOLFSSL_RENESAS_TSIP_TLS
|
||||
#define WOLFSSL_RENESAS_TSIP_TLS_AES_CRYPT
|
||||
#define HAVE_PK_CALLBACKS
|
||||
#define WOLF_CRYPTO_CB
|
||||
#endif
|
||||
|
||||
#else
|
||||
#define OPENSSL_EXTRA
|
||||
#define WOLFSSL_GENSEED_FORTEST /* Warning: define your own seed gen */
|
||||
#endif
|
||||
|
||||
|
||||
/*-- TLS version and required definitions --*/
|
||||
#if defined(WOLFSSL_TLS13)
|
||||
#define HAVE_FFDHE_2048
|
||||
#define HAVE_HKDF
|
||||
#define WC_RSA_PSS
|
||||
#endif
|
||||
|
||||
/*-- strcasecmp */
|
||||
#define XSTRCASECMP(s1,s2) strcmp((s1),(s2))
|
||||
504
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/RSK/wolfssl_demo/wolfssl_demo.c
vendored
Normal file
504
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/RSK/wolfssl_demo/wolfssl_demo.c
vendored
Normal file
@@ -0,0 +1,504 @@
|
||||
/* wolfssl_demo.c
|
||||
*
|
||||
* Copyright (C) 2006-2022 wolfSSL Inc.
|
||||
*
|
||||
* This file is part of wolfSSL.
|
||||
*
|
||||
* wolfSSL is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* wolfSSL is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
*/
|
||||
|
||||
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
#include <stdlib.h>
|
||||
|
||||
#include "FreeRTOS.h"
|
||||
#include "FreeRTOS_IP.h"
|
||||
#include "FreeRTOS_Sockets.h"
|
||||
#include "platform/iot_network.h"
|
||||
#include "platform.h"
|
||||
|
||||
|
||||
#include <wolfssl/wolfcrypt/settings.h>
|
||||
#include "wolfssl/ssl.h"
|
||||
#include <wolfssl/wolfio.h>
|
||||
#include "wolfssl/certs_test.h"
|
||||
#include "wolfssl/wolfcrypt/types.h"
|
||||
#include "wolfssl_demo.h"
|
||||
#include <wolfcrypt/test/test.h>
|
||||
#include <wolfcrypt/benchmark/benchmark.h>
|
||||
|
||||
#if defined(BENCHMARK)
|
||||
#include "r_cmt_rx_if.h"
|
||||
#endif
|
||||
|
||||
#if defined(TLS_CLIENT)
|
||||
#if defined(WOLFSSL_RENESAS_TSIP_TLS)
|
||||
#include "key_data.h"
|
||||
#include <wolfssl/wolfcrypt/port/Renesas/renesas-tsip-crypt.h>
|
||||
|
||||
extern const st_key_block_data_t g_key_block_data;
|
||||
user_PKCbInfo guser_PKCbInfo;
|
||||
uint32_t g_encrypted_root_public_key[140];
|
||||
static TsipUserCtx userContext;
|
||||
|
||||
#endif /* WOLFSSL_RENESAS_TSIP_TLS */
|
||||
|
||||
static WOLFSSL_CTX* client_ctx;
|
||||
#endif /* TLS_CLIENT */
|
||||
|
||||
#define TLSSERVER_IP "192.168.1.14"
|
||||
#define TLSSERVER_PORT 11111
|
||||
#define YEAR 2022
|
||||
#define MON 3
|
||||
#define FREQ 10000 /* Hz */
|
||||
|
||||
static long tick;
|
||||
static int tmTick;
|
||||
|
||||
/* time
|
||||
* returns seconds from EPOCH
|
||||
*/
|
||||
time_t time(time_t *t)
|
||||
{
|
||||
(void)t;
|
||||
return ((YEAR-1970)*365+30*MON)*24*60*60 + tmTick++;
|
||||
}
|
||||
|
||||
/* timeTick
|
||||
* called periodically by H/W timer to increase tmTick.
|
||||
*/
|
||||
#if defined(BENCHMARK)
|
||||
static void timeTick(void* pdata)
|
||||
{
|
||||
(void)pdata;
|
||||
tick++;
|
||||
}
|
||||
#endif
|
||||
|
||||
double current_time(int reset)
|
||||
{
|
||||
if(reset) tick = 0 ;
|
||||
return ((double)tick/FREQ) ;
|
||||
}
|
||||
|
||||
|
||||
|
||||
/* --------------------------------------------------------*/
|
||||
/* Benchmark_demo */
|
||||
/* --------------------------------------------------------*/
|
||||
#if defined(BENCHMARK)
|
||||
static void Benchmark_demo(void)
|
||||
{
|
||||
uint32_t channel;
|
||||
R_CMT_CreatePeriodic(FREQ, &timeTick, &channel);
|
||||
|
||||
printf("Start wolfCrypt Benchmark\n");
|
||||
benchmark_test(NULL);
|
||||
printf("End wolfCrypt Benchmark\n");
|
||||
}
|
||||
#endif /* BENCHMARK */
|
||||
/* --------------------------------------------------------*/
|
||||
/* CryptTest_demo */
|
||||
/* --------------------------------------------------------*/
|
||||
#if defined(CRYPT_TEST)
|
||||
static void CryptTest_demo(void)
|
||||
{
|
||||
int ret;
|
||||
|
||||
if ((ret = wolfCrypt_Init()) != 0) {
|
||||
printf("wolfCrypt_Init failed %d\n", ret);
|
||||
}
|
||||
|
||||
printf("Start wolfCrypt Test\n");
|
||||
wolfcrypt_test(NULL);
|
||||
printf("End wolfCrypt Test\n");
|
||||
|
||||
if ((ret = wolfCrypt_Cleanup()) != 0) {
|
||||
printf("wolfCrypt_Cleanup failed %d\n", ret);
|
||||
}
|
||||
}
|
||||
#endif /* CRYPT_TEST */
|
||||
/* --------------------------------------------------------*/
|
||||
/* Tls_client_demo */
|
||||
/* --------------------------------------------------------*/
|
||||
#if defined(TLS_CLIENT)
|
||||
static void Tls_client_init(const char* cipherlist)
|
||||
{
|
||||
|
||||
#ifndef NO_FILESYSTEM
|
||||
#ifdef USE_ECC_CERT
|
||||
char *cert = "./certs/ca-ecc-cert.pem";
|
||||
#else
|
||||
char *cert = "./certs/ca-cert.pem";
|
||||
#endif
|
||||
#else
|
||||
#if defined(USE_ECC_CERT) && defined(USE_CERT_BUFFERS_256)
|
||||
const unsigned char *cert = ca_ecc_cert_der_256;
|
||||
#define SIZEOF_CERT sizeof_ca_ecc_cert_der_256
|
||||
#else
|
||||
const unsigned char *cert = ca_cert_der_2048;
|
||||
#define SIZEOF_CERT sizeof_ca_cert_der_2048
|
||||
#endif
|
||||
#endif
|
||||
|
||||
|
||||
client_ctx = NULL;
|
||||
|
||||
wolfSSL_Init();
|
||||
|
||||
#ifdef DEBUG_WOLFSSL
|
||||
wolfSSL_Debugging_ON();
|
||||
#endif
|
||||
|
||||
/* Create and initialize WOLFSSL_CTX */
|
||||
if ((client_ctx =
|
||||
wolfSSL_CTX_new(wolfSSLv23_client_method_ex((void *)NULL))) == NULL) {
|
||||
printf("ERROR: failed to create WOLFSSL_CTX\n");
|
||||
return;
|
||||
}
|
||||
|
||||
#ifdef WOLFSSL_RENESAS_TSIP_TLS
|
||||
tsip_set_callbacks(client_ctx);
|
||||
#endif
|
||||
|
||||
/* load Root CA certificate */
|
||||
#if defined(NO_FILESYSTEM)
|
||||
if (wolfSSL_CTX_load_verify_buffer(client_ctx, cert,
|
||||
SIZEOF_CERT, SSL_FILETYPE_ASN1) != SSL_SUCCESS) {
|
||||
printf("ERROR: can't load certificate data\n");
|
||||
return;
|
||||
}
|
||||
#else
|
||||
if (wolfSSL_CTX_load_verify_locations(client_ctx, cert, 0) != SSL_SUCCESS) {
|
||||
printf("ERROR: can't load \"%s\"\n", cert);
|
||||
return NULL;
|
||||
}
|
||||
#endif
|
||||
|
||||
/* load client certificate */
|
||||
#ifdef USE_ECC_CERT
|
||||
if (wolfSSL_CTX_use_certificate_chain_buffer_format(client_ctx,
|
||||
cliecc_cert_der_256,
|
||||
sizeof_cliecc_cert_der_256,
|
||||
WOLFSSL_FILETYPE_ASN1) != SSL_SUCCESS) {
|
||||
printf("ERROR: can't load client-certificate\n");
|
||||
return;
|
||||
}
|
||||
#else
|
||||
if (wolfSSL_CTX_use_certificate_chain_buffer_format(client_ctx,
|
||||
client_cert_der_2048,
|
||||
sizeof_client_cert_der_2048,
|
||||
WOLFSSL_FILETYPE_ASN1) != SSL_SUCCESS) {
|
||||
printf("ERROR: can't load client-certificate\n");
|
||||
return;
|
||||
}
|
||||
#endif /* USE_ECC_CERT */
|
||||
|
||||
/* load client private key */
|
||||
|
||||
#ifdef USE_ECC_CERT
|
||||
#if defined(WOLFSSL_TLS13) && defined(WOLFSSL_RENESAS_TSIP_TLS) && \
|
||||
(WOLFSSL_RENESAS_TSIP_VER >= 115 )
|
||||
if (tsip_set_clientPrivateKeyEnc(
|
||||
g_key_block_data.encrypted_user_ecc256_private_key,
|
||||
TSIP_ECCP256) != 0) {
|
||||
printf("ERROR: can't load client-private key\n");
|
||||
return;
|
||||
}
|
||||
#endif
|
||||
if (wolfSSL_CTX_use_PrivateKey_buffer(client_ctx,
|
||||
ecc_clikey_der_256,
|
||||
sizeof_ecc_clikey_der_256,
|
||||
SSL_FILETYPE_ASN1) != WOLFSSL_SUCCESS) {
|
||||
printf("ERROR: can't load private-key data.\n");
|
||||
return;
|
||||
}
|
||||
|
||||
#else
|
||||
if (wolfSSL_CTX_use_PrivateKey_buffer(client_ctx,
|
||||
client_key_der_2048,
|
||||
sizeof_client_key_der_2048,
|
||||
SSL_FILETYPE_ASN1)
|
||||
!= WOLFSSL_SUCCESS) {
|
||||
printf("ERROR: can't load private-key data.\n");
|
||||
return;
|
||||
}
|
||||
|
||||
#endif /* USE_ECC_CERT */
|
||||
|
||||
/* use specific cipher */
|
||||
if (cipherlist != NULL &&
|
||||
wolfSSL_CTX_set_cipher_list(client_ctx, cipherlist) !=
|
||||
WOLFSSL_SUCCESS) {
|
||||
wolfSSL_CTX_free(client_ctx); client_ctx = NULL;
|
||||
printf("client can't set cipher list");
|
||||
}
|
||||
|
||||
#if defined(WOLFSSL_TLS13) && defined(WOLFSSL_RENESAS_TSIP_TLS) && \
|
||||
(WOLFSSL_RENESAS_TSIP_VER >= 115)
|
||||
|
||||
if (wolfSSL_CTX_UseSupportedCurve(client_ctx, WOLFSSL_ECC_SECP256R1)
|
||||
!= WOLFSSL_SUCCESS) {
|
||||
wolfSSL_CTX_free(client_ctx); client_ctx = NULL;
|
||||
printf("client can't set use supported curves\n");
|
||||
return;
|
||||
}
|
||||
#endif
|
||||
|
||||
}
|
||||
|
||||
static void Tls_client()
|
||||
{
|
||||
#define BUFF_SIZE 256
|
||||
#define ADDR_SIZE 16
|
||||
int ret;
|
||||
WOLFSSL_CTX* ctx = (WOLFSSL_CTX *)client_ctx;
|
||||
WOLFSSL* ssl;
|
||||
Socket_t socket;
|
||||
socklen_t socksize = sizeof(struct freertos_sockaddr);
|
||||
struct freertos_sockaddr PeerAddr;
|
||||
char addrBuff[ADDR_SIZE] = {0};
|
||||
|
||||
static const char sendBuff[]= "Hello Server\n" ;
|
||||
char rcvBuff[BUFF_SIZE] = {0};
|
||||
|
||||
|
||||
/* create TCP socket */
|
||||
|
||||
socket = FreeRTOS_socket(FREERTOS_AF_INET,
|
||||
FREERTOS_SOCK_STREAM,
|
||||
FREERTOS_IPPROTO_TCP);
|
||||
|
||||
configASSERT(socket != FREERTOS_INVALID_SOCKET);
|
||||
|
||||
FreeRTOS_bind(socket, NULL, socksize);
|
||||
|
||||
/* attempt to connect TLS server */
|
||||
|
||||
PeerAddr.sin_addr = FreeRTOS_inet_addr(TLSSERVER_IP);
|
||||
PeerAddr.sin_port = FreeRTOS_htons(TLSSERVER_PORT);
|
||||
|
||||
ret = FreeRTOS_connect(socket, &PeerAddr, sizeof(PeerAddr));
|
||||
|
||||
if (ret != 0) {
|
||||
printf("ERROR FreeRTOS_connect: %d\n",ret);
|
||||
}
|
||||
|
||||
/* create WOLFSSL object */
|
||||
if (ret == 0) {
|
||||
ssl = wolfSSL_new(ctx);
|
||||
if (ssl == NULL) {
|
||||
printf("ERROR wolfSSL_new: %d\n", wolfSSL_get_error(ssl, 0));
|
||||
ret = -1;
|
||||
}
|
||||
}
|
||||
if (ret == 0) {
|
||||
#ifdef WOLFSSL_RENESAS_TSIP_TLS
|
||||
tsip_set_callback_ctx(ssl, &userContext);
|
||||
#endif
|
||||
}
|
||||
|
||||
if (ret == 0) {
|
||||
/* associate socket with ssl object */
|
||||
if (wolfSSL_set_fd(ssl, (int)socket) != WOLFSSL_SUCCESS) {
|
||||
printf("ERROR wolfSSL_set_fd: %d\n", wolfSSL_get_error(ssl, 0));
|
||||
ret = -1;
|
||||
}
|
||||
}
|
||||
|
||||
if (ret == 0) {
|
||||
if (wolfSSL_connect(ssl) != WOLFSSL_SUCCESS) {
|
||||
printf("ERROR wolfSSL_connect: %d\n", wolfSSL_get_error(ssl, 0));
|
||||
ret = -1;
|
||||
}
|
||||
}
|
||||
|
||||
if (ret == 0) {
|
||||
if (wolfSSL_write(ssl, sendBuff, strlen(sendBuff)) !=
|
||||
strlen(sendBuff)) {
|
||||
printf("ERROR wolfSSL_write: %d\n", wolfSSL_get_error(ssl, 0));
|
||||
ret = -1;
|
||||
}
|
||||
}
|
||||
|
||||
if (ret == 0) {
|
||||
if ((ret=wolfSSL_read(ssl, rcvBuff, BUFF_SIZE -1)) < 0) {
|
||||
printf("ERROR wolfSSL_read: %d\n", wolfSSL_get_error(ssl, 0));
|
||||
ret = -1;
|
||||
}
|
||||
else {
|
||||
rcvBuff[ret] = '\0';
|
||||
printf("Received: %s\n\n", rcvBuff);
|
||||
ret = 0;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
wolfSSL_shutdown(ssl);
|
||||
|
||||
FreeRTOS_shutdown(socket, FREERTOS_SHUT_RDWR);
|
||||
while(FreeRTOS_recv(socket, rcvBuff, BUFF_SIZE -1, 0) >=0) {
|
||||
vTaskDelay(250);
|
||||
}
|
||||
|
||||
FreeRTOS_closesocket(socket);
|
||||
|
||||
|
||||
wolfSSL_free(ssl);
|
||||
wolfSSL_CTX_free(ctx);
|
||||
wolfSSL_Cleanup();
|
||||
|
||||
return;
|
||||
}
|
||||
|
||||
static void Tls_client_demo(void)
|
||||
{
|
||||
|
||||
/* setup ciphersuite list to use for TLS handshake */
|
||||
|
||||
#if defined(WOLFSSL_RENESAS_TSIP_TLS)
|
||||
|
||||
#ifdef USE_ECC_CERT
|
||||
const char* cipherlist[] = {
|
||||
#if defined(WOLFSSL_TLS13)
|
||||
"TLS13-AES128-GCM-SHA256",
|
||||
"TLS13-AES128-CCM-SHA256",
|
||||
#endif
|
||||
"ECDHE-ECDSA-AES128-GCM-SHA256",
|
||||
"ECDHE-ECDSA-AES128-SHA256"
|
||||
};
|
||||
int cipherlist_sz;
|
||||
#if defined(WOLFSSL_TLS13)
|
||||
cipherlist_sz = 2;
|
||||
#else
|
||||
cipherlist_sz = 2;
|
||||
#endif
|
||||
|
||||
#else
|
||||
const char* cipherlist[] = {
|
||||
#if defined(WOLFSSL_TLS13)
|
||||
"TLS13-AES128-GCM-SHA256",
|
||||
"TLS13-AES128-CCM-SHA256",
|
||||
#endif
|
||||
"ECDHE-RSA-AES128-GCM-SHA256",
|
||||
"ECDHE-RSA-AES128-SHA256",
|
||||
"AES128-SHA",
|
||||
"AES128-SHA256",
|
||||
"AES256-SHA",
|
||||
"AES256-SHA256"
|
||||
};
|
||||
int cipherlist_sz;
|
||||
#if defined(WOLFSSL_TLS13)
|
||||
cipherlist_sz = 2;
|
||||
#else
|
||||
cipherlist_sz = 6;
|
||||
#endif
|
||||
|
||||
#endif
|
||||
|
||||
#else
|
||||
const char* cipherlist[] = { NULL };
|
||||
const int cipherlist_sz = 0;
|
||||
|
||||
#endif
|
||||
|
||||
int i = 0;
|
||||
|
||||
printf("/*------------------------------------------------*/\n");
|
||||
printf(" TLS_Client demo\n");
|
||||
printf(" - TLS server address:" TLSSERVER_IP " port: %d\n",
|
||||
TLSSERVER_PORT);
|
||||
|
||||
#if defined(WOLFSSL_RENESAS_TSIP_TLS) && (WOLFSSL_RENESAS_TSIP_VER >=109)
|
||||
printf(" - with TSIP\n");
|
||||
#endif
|
||||
printf("/*------------------------------------------------*/\n");
|
||||
|
||||
/* setup credentials for TLS handshake */
|
||||
#if defined(WOLFSSL_RENESAS_TSIP_TLS) && (WOLFSSL_RENESAS_TSIP_VER >=109)
|
||||
|
||||
#if defined(USE_ECC_CERT)
|
||||
|
||||
/* Root CA cert has ECC-P256 public key */
|
||||
tsip_inform_cert_sign((const byte*)ca_ecc_cert_der_sig);
|
||||
|
||||
#else
|
||||
|
||||
/* Root CA cert has RSA public key */
|
||||
tsip_inform_cert_sign((const byte*)ca_cert_der_sig);
|
||||
|
||||
#endif
|
||||
|
||||
wc_tsip_inform_user_keys_ex(
|
||||
(byte*)&g_key_block_data.encrypted_provisioning_key,
|
||||
(byte*)&g_key_block_data.iv,
|
||||
(byte*)&g_key_block_data.encrypted_user_rsa2048_ne_key,
|
||||
encrypted_user_key_type);
|
||||
|
||||
|
||||
#endif /* WOLFSSL_RENESAS_TSIP_TLS && (WOLFSSL_RENESAS_TSIP_VER >=109) */
|
||||
|
||||
do {
|
||||
if(cipherlist_sz > 0 ) printf("cipher : %s\n", cipherlist[i]);
|
||||
|
||||
Tls_client_init(cipherlist[i]);
|
||||
|
||||
Tls_client();
|
||||
|
||||
i++;
|
||||
} while (i < cipherlist_sz);
|
||||
|
||||
printf("End of TLS_Client demo.\n");
|
||||
}
|
||||
#endif /* TLS_CLIENT */
|
||||
|
||||
/* Demo entry function called by iot_demo_runner
|
||||
* To run this entry function as an aws_iot_demo, define this as
|
||||
* DEMO_entryFUNCTION in aws_demo_config.h.
|
||||
*/
|
||||
void wolfSSL_demo_task(bool awsIotMqttMode,
|
||||
const char* pIdentifier,
|
||||
void* pNetworkServerInfo,
|
||||
void* pNetworkCredentialInfo,
|
||||
const IotNetworkInterface_t* pNetworkInterface)
|
||||
{
|
||||
|
||||
(void)awsIotMqttMode;
|
||||
(void)pIdentifier;
|
||||
(void)pNetworkServerInfo;
|
||||
(void)pNetworkCredentialInfo;
|
||||
(void)pNetworkInterface;
|
||||
|
||||
|
||||
#if defined(CRYPT_TEST)
|
||||
|
||||
CryptTest_demo();
|
||||
|
||||
#elif defined(BENCHMARK)
|
||||
|
||||
Benchmark_demo();
|
||||
|
||||
#elif defined(TLS_CLIENT)
|
||||
|
||||
Tls_client_demo();
|
||||
|
||||
#endif
|
||||
|
||||
while (1) {
|
||||
vTaskDelay(10000);
|
||||
}
|
||||
}
|
||||
|
||||
63
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/RSK/wolfssl_demo/wolfssl_demo.h
vendored
Normal file
63
android/extern/wolfssl/IDE/Renesas/e2studio/RX65N/RSK/wolfssl_demo/wolfssl_demo.h
vendored
Normal file
@@ -0,0 +1,63 @@
|
||||
/* wolfssl_demo.h
|
||||
*
|
||||
* Copyright (C) 2006-2022 wolfSSL Inc.
|
||||
*
|
||||
* This file is part of wolfSSL.
|
||||
*
|
||||
* wolfSSL is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* wolfSSL is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
*/
|
||||
|
||||
#ifndef WOLFSSL_DEMO_H_
|
||||
#define WOLFSSL_DEMO_H_
|
||||
|
||||
|
||||
/**************************************************/
|
||||
/******* DO NOT CHANGE the following order ********/
|
||||
/**************************************************/
|
||||
|
||||
/* Include logging header files and define logging macros in the following order:
|
||||
* 1. Include the header file "logging_levels.h".
|
||||
* 2. Define the LIBRARY_LOG_NAME and LIBRARY_LOG_LEVEL macros depending on
|
||||
* the logging configuration for DEMO.
|
||||
* 3. Include the header file "logging_stack.h", if logging is enabled for DEMO.
|
||||
*/
|
||||
|
||||
#include "logging_levels.h"
|
||||
|
||||
/* Logging configuration for the Demo. */
|
||||
#ifndef LIBRARY_LOG_NAME
|
||||
#define LIBRARY_LOG_NAME "WOLFSSL_Demo"
|
||||
#endif
|
||||
|
||||
#ifndef LIBRARY_LOG_LEVEL
|
||||
#define LIBRARY_LOG_LEVEL LOG_INFO
|
||||
#endif
|
||||
#include "logging_stack.h"
|
||||
|
||||
|
||||
|
||||
|
||||
/* Enable wolfcrypt test demo */
|
||||
/*#define CRYPT_TEST*/
|
||||
|
||||
/* Enable benchmark demo */
|
||||
/*#define BENCHMARK*/
|
||||
|
||||
/* Enable TLS client demo */
|
||||
/* cannot enable with other definition */
|
||||
#define TLS_CLIENT
|
||||
|
||||
|
||||
#endif /* WOLFSSL_DEMO_H_ */
|
||||
Reference in New Issue
Block a user