Remove WolfSSL-FIPS-Ready source code and Demo

The WolfSSL-FIPS-Ready distribution is licensed under the GPLv3 or
a commercial license. Only MIT licensed code is allowed in this
repository. Refer to the FreeRTOS_Plus_WolfSSL_Windows_Simulator Demo
for future WolfSSL integrations.
This commit is contained in:
Paul Bartell 2023-08-28 09:48:34 -07:00 committed by Paul Bartell
parent 79180cde2d
commit 537007d96c
332 changed files with 0 additions and 753627 deletions

View file

@ -1,86 +0,0 @@

Microsoft Visual Studio Solution File, Format Version 12.00
# Visual Studio Version 16
VisualStudioVersion = 16.0.32929.386
MinimumVisualStudioVersion = 10.0.40219.1
Project("{8BC9CEB8-8B4A-11D0-8D11-00A0C91BC942}") = "FreeRTOS_Plus_WolfSSL", "FreeRTOS_Plus_WolfSSL.vcxproj", "{60C50F90-C5B6-46E1-B41B-5C7B7C17BE82}"
EndProject
Project("{8BC9CEB8-8B4A-11D0-8D11-00A0C91BC942}") = "FreeRTOS+TCP", "..\..\VisualStudio_StaticProjects\FreeRTOS+TCP\FreeRTOS+TCP.vcxproj", "{C90E6CC5-818B-4C97-8876-0986D989387C}"
EndProject
Project("{8BC9CEB8-8B4A-11D0-8D11-00A0C91BC942}") = "FreeRTOS-Kernel", "..\..\VisualStudio_StaticProjects\FreeRTOS-Kernel\FreeRTOS-Kernel.vcxproj", "{72C209C4-49A4-4942-A201-44706C9D77EC}"
EndProject
Project("{8BC9CEB8-8B4A-11D0-8D11-00A0C91BC942}") = "Logging", "..\..\VisualStudio_StaticProjects\Logging\Logging.vcxproj", "{BE362AC0-B10B-4276-B84E-6304652BA228}"
EndProject
Project("{2150E333-8FDC-42A3-9474-1A3956D46DE8}") = "Statically Linked Libraries", "Statically Linked Libraries", "{47B3A148-EE71-4F1C-A12A-F9710200C254}"
EndProject
Global
GlobalSection(SolutionConfigurationPlatforms) = preSolution
Debug|Win32 = Debug|Win32
Debug|x64 = Debug|x64
Debug|x86 = Debug|x86
Release|Win32 = Release|Win32
Release|x64 = Release|x64
Release|x86 = Release|x86
EndGlobalSection
GlobalSection(ProjectConfigurationPlatforms) = postSolution
{60C50F90-C5B6-46E1-B41B-5C7B7C17BE82}.Debug|Win32.ActiveCfg = Debug|Win32
{60C50F90-C5B6-46E1-B41B-5C7B7C17BE82}.Debug|Win32.Build.0 = Debug|Win32
{60C50F90-C5B6-46E1-B41B-5C7B7C17BE82}.Debug|x64.ActiveCfg = Debug|x64
{60C50F90-C5B6-46E1-B41B-5C7B7C17BE82}.Debug|x64.Build.0 = Debug|x64
{60C50F90-C5B6-46E1-B41B-5C7B7C17BE82}.Debug|x86.ActiveCfg = Debug|Win32
{60C50F90-C5B6-46E1-B41B-5C7B7C17BE82}.Debug|x86.Build.0 = Debug|Win32
{60C50F90-C5B6-46E1-B41B-5C7B7C17BE82}.Release|Win32.ActiveCfg = Release|Win32
{60C50F90-C5B6-46E1-B41B-5C7B7C17BE82}.Release|Win32.Build.0 = Release|Win32
{60C50F90-C5B6-46E1-B41B-5C7B7C17BE82}.Release|x64.ActiveCfg = Release|x64
{60C50F90-C5B6-46E1-B41B-5C7B7C17BE82}.Release|x64.Build.0 = Release|x64
{60C50F90-C5B6-46E1-B41B-5C7B7C17BE82}.Release|x86.ActiveCfg = Release|Win32
{60C50F90-C5B6-46E1-B41B-5C7B7C17BE82}.Release|x86.Build.0 = Release|Win32
{C90E6CC5-818B-4C97-8876-0986D989387C}.Debug|Win32.ActiveCfg = Debug|Win32
{C90E6CC5-818B-4C97-8876-0986D989387C}.Debug|Win32.Build.0 = Debug|Win32
{C90E6CC5-818B-4C97-8876-0986D989387C}.Debug|x64.ActiveCfg = Debug|x64
{C90E6CC5-818B-4C97-8876-0986D989387C}.Debug|x64.Build.0 = Debug|x64
{C90E6CC5-818B-4C97-8876-0986D989387C}.Debug|x86.ActiveCfg = Debug|Win32
{C90E6CC5-818B-4C97-8876-0986D989387C}.Debug|x86.Build.0 = Debug|Win32
{C90E6CC5-818B-4C97-8876-0986D989387C}.Release|Win32.ActiveCfg = Release|Win32
{C90E6CC5-818B-4C97-8876-0986D989387C}.Release|Win32.Build.0 = Release|Win32
{C90E6CC5-818B-4C97-8876-0986D989387C}.Release|x64.ActiveCfg = Release|x64
{C90E6CC5-818B-4C97-8876-0986D989387C}.Release|x64.Build.0 = Release|x64
{C90E6CC5-818B-4C97-8876-0986D989387C}.Release|x86.ActiveCfg = Release|Win32
{C90E6CC5-818B-4C97-8876-0986D989387C}.Release|x86.Build.0 = Release|Win32
{72C209C4-49A4-4942-A201-44706C9D77EC}.Debug|Win32.ActiveCfg = Debug|Win32
{72C209C4-49A4-4942-A201-44706C9D77EC}.Debug|Win32.Build.0 = Debug|Win32
{72C209C4-49A4-4942-A201-44706C9D77EC}.Debug|x64.ActiveCfg = Debug|x64
{72C209C4-49A4-4942-A201-44706C9D77EC}.Debug|x64.Build.0 = Debug|x64
{72C209C4-49A4-4942-A201-44706C9D77EC}.Debug|x86.ActiveCfg = Debug|Win32
{72C209C4-49A4-4942-A201-44706C9D77EC}.Debug|x86.Build.0 = Debug|Win32
{72C209C4-49A4-4942-A201-44706C9D77EC}.Release|Win32.ActiveCfg = Release|Win32
{72C209C4-49A4-4942-A201-44706C9D77EC}.Release|Win32.Build.0 = Release|Win32
{72C209C4-49A4-4942-A201-44706C9D77EC}.Release|x64.ActiveCfg = Release|x64
{72C209C4-49A4-4942-A201-44706C9D77EC}.Release|x64.Build.0 = Release|x64
{72C209C4-49A4-4942-A201-44706C9D77EC}.Release|x86.ActiveCfg = Release|Win32
{72C209C4-49A4-4942-A201-44706C9D77EC}.Release|x86.Build.0 = Release|Win32
{BE362AC0-B10B-4276-B84E-6304652BA228}.Debug|Win32.ActiveCfg = Debug|Win32
{BE362AC0-B10B-4276-B84E-6304652BA228}.Debug|Win32.Build.0 = Debug|Win32
{BE362AC0-B10B-4276-B84E-6304652BA228}.Debug|x64.ActiveCfg = Debug|x64
{BE362AC0-B10B-4276-B84E-6304652BA228}.Debug|x64.Build.0 = Debug|x64
{BE362AC0-B10B-4276-B84E-6304652BA228}.Debug|x86.ActiveCfg = Debug|Win32
{BE362AC0-B10B-4276-B84E-6304652BA228}.Debug|x86.Build.0 = Debug|Win32
{BE362AC0-B10B-4276-B84E-6304652BA228}.Release|Win32.ActiveCfg = Release|Win32
{BE362AC0-B10B-4276-B84E-6304652BA228}.Release|Win32.Build.0 = Release|Win32
{BE362AC0-B10B-4276-B84E-6304652BA228}.Release|x64.ActiveCfg = Release|x64
{BE362AC0-B10B-4276-B84E-6304652BA228}.Release|x64.Build.0 = Release|x64
{BE362AC0-B10B-4276-B84E-6304652BA228}.Release|x86.ActiveCfg = Release|Win32
{BE362AC0-B10B-4276-B84E-6304652BA228}.Release|x86.Build.0 = Release|Win32
EndGlobalSection
GlobalSection(SolutionProperties) = preSolution
HideSolutionNode = FALSE
EndGlobalSection
GlobalSection(NestedProjects) = preSolution
{C90E6CC5-818B-4C97-8876-0986D989387C} = {47B3A148-EE71-4F1C-A12A-F9710200C254}
{72C209C4-49A4-4942-A201-44706C9D77EC} = {47B3A148-EE71-4F1C-A12A-F9710200C254}
{BE362AC0-B10B-4276-B84E-6304652BA228} = {47B3A148-EE71-4F1C-A12A-F9710200C254}
EndGlobalSection
GlobalSection(ExtensibilityGlobals) = postSolution
SolutionGuid = {A7B4BB00-8925-4FDA-B434-783DE200DAB4}
EndGlobalSection
EndGlobal

View file

@ -1,301 +0,0 @@
<?xml version="1.0" encoding="utf-8"?>
<Project DefaultTargets="Build" xmlns="http://schemas.microsoft.com/developer/msbuild/2003">
<ItemGroup Label="ProjectConfigurations">
<ProjectConfiguration Include="Debug|Win32">
<Configuration>Debug</Configuration>
<Platform>Win32</Platform>
</ProjectConfiguration>
<ProjectConfiguration Include="Release|Win32">
<Configuration>Release</Configuration>
<Platform>Win32</Platform>
</ProjectConfiguration>
<ProjectConfiguration Include="Debug|x64">
<Configuration>Debug</Configuration>
<Platform>x64</Platform>
</ProjectConfiguration>
<ProjectConfiguration Include="Release|x64">
<Configuration>Release</Configuration>
<Platform>x64</Platform>
</ProjectConfiguration>
</ItemGroup>
<ItemGroup>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\src\crl.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\src\internal.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\src\keys.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\src\ocsp.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\src\sniffer.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\src\ssl.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\src\tls.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\src\tls13.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\src\wolfio.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\aes.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\arc4.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\asm.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\asn.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\async.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\blake2b.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\blake2s.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\camellia.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\chacha.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\chacha20_poly1305.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\cmac.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\coding.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\compress.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\cpuid.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\cryptocb.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\curve25519.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\curve448.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\des3.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\dh.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\dsa.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\ecc.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\ecc_fp.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\ed25519.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\ed448.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\error.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\evp.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fe_448.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fe_low_mem.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fe_operations.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fips.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fips_test.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\ge_448.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\ge_low_mem.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\ge_operations.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\hash.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\hc128.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\hmac.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\idea.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\integer.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\logging.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\md2.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\md4.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\md5.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\memory.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\misc.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\pkcs12.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\pkcs7.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\poly1305.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\pwdbased.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\rabbit.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\random.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\ripemd.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\rsa.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\selftest.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sha.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sha256.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sha3.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sha512.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\signature.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sp_arm32.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sp_arm64.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sp_armthumb.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sp_c32.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sp_c64.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sp_cortexm.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sp_dsp32.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sp_int.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sp_x86_64.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\srp.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\tfm.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\wc_dsp.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\wc_encrypt.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\wc_pkcs11.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\wc_port.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\wolfcrypt_first.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\wolfcrypt_last.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\wolfevent.c" />
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\wolfmath.c" />
<ClCompile Include="main.c" />
<ClCompile Include="SecureTCPClientTask.c" />
<ClCompile Include="SecureTCPServerTask.c" />
</ItemGroup>
<ItemGroup>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\aes_asm.asm" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\aes_asm.S" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\aes_gcm_asm.S" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\chacha_asm.S" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fe_x25519_128.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fe_x25519_asm.S" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mont_small.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_12.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_17.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_20.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_24.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_28.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_3.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_32.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_4.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_48.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_6.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_64.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_7.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_8.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_9.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_small_set.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_12.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_17.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_20.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_24.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_28.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_3.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_32.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_4.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_48.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_6.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_64.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_7.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_8.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_9.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_small_set.i" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\include.am" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\poly1305_asm.S" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sha256_asm.S" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sha512_asm.S" />
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sp_x86_64_asm.S" />
<None Include="ca-cert.pem" />
<None Include="server-cert.pem" />
<None Include="server-key.pem" />
</ItemGroup>
<ItemGroup>
<ClInclude Include="user_settings.h" />
</ItemGroup>
<ItemGroup>
<ProjectReference Include="..\..\VisualStudio_StaticProjects\FreeRTOS+TCP\FreeRTOS+TCP.vcxproj">
<Project>{c90e6cc5-818b-4c97-8876-0986d989387c}</Project>
</ProjectReference>
<ProjectReference Include="..\..\VisualStudio_StaticProjects\FreeRTOS-Kernel\FreeRTOS-Kernel.vcxproj">
<Project>{72c209c4-49a4-4942-a201-44706c9d77ec}</Project>
</ProjectReference>
<ProjectReference Include="..\..\VisualStudio_StaticProjects\Logging\Logging.vcxproj">
<Project>{be362ac0-b10b-4276-b84e-6304652ba228}</Project>
</ProjectReference>
</ItemGroup>
<PropertyGroup Label="Globals">
<VCProjectVersion>16.0</VCProjectVersion>
<Keyword>Win32Proj</Keyword>
<ProjectGuid>{60c50f90-c5b6-46e1-b41b-5c7b7c17be82}</ProjectGuid>
<RootNamespace>FreeRTOSPlusWolfSSL</RootNamespace>
<WindowsTargetPlatformVersion>10.0</WindowsTargetPlatformVersion>
</PropertyGroup>
<Import Project="$(VCTargetsPath)\Microsoft.Cpp.Default.props" />
<PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Debug|Win32'" Label="Configuration">
<ConfigurationType>Application</ConfigurationType>
<UseDebugLibraries>true</UseDebugLibraries>
<PlatformToolset>v142</PlatformToolset>
<CharacterSet>Unicode</CharacterSet>
</PropertyGroup>
<PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Release|Win32'" Label="Configuration">
<ConfigurationType>Application</ConfigurationType>
<UseDebugLibraries>false</UseDebugLibraries>
<PlatformToolset>v142</PlatformToolset>
<WholeProgramOptimization>true</WholeProgramOptimization>
<CharacterSet>Unicode</CharacterSet>
</PropertyGroup>
<PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Debug|x64'" Label="Configuration">
<ConfigurationType>Application</ConfigurationType>
<UseDebugLibraries>true</UseDebugLibraries>
<PlatformToolset>v142</PlatformToolset>
<CharacterSet>Unicode</CharacterSet>
</PropertyGroup>
<PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Release|x64'" Label="Configuration">
<ConfigurationType>Application</ConfigurationType>
<UseDebugLibraries>false</UseDebugLibraries>
<PlatformToolset>v142</PlatformToolset>
<WholeProgramOptimization>true</WholeProgramOptimization>
<CharacterSet>Unicode</CharacterSet>
</PropertyGroup>
<Import Project="$(VCTargetsPath)\Microsoft.Cpp.props" />
<ImportGroup Label="ExtensionSettings">
</ImportGroup>
<ImportGroup Label="Shared">
</ImportGroup>
<ImportGroup Label="PropertySheets" Condition="'$(Configuration)|$(Platform)'=='Debug|Win32'">
<Import Project="$(UserRootDir)\Microsoft.Cpp.$(Platform).user.props" Condition="exists('$(UserRootDir)\Microsoft.Cpp.$(Platform).user.props')" Label="LocalAppDataPlatform" />
</ImportGroup>
<ImportGroup Label="PropertySheets" Condition="'$(Configuration)|$(Platform)'=='Release|Win32'">
<Import Project="$(UserRootDir)\Microsoft.Cpp.$(Platform).user.props" Condition="exists('$(UserRootDir)\Microsoft.Cpp.$(Platform).user.props')" Label="LocalAppDataPlatform" />
</ImportGroup>
<ImportGroup Label="PropertySheets" Condition="'$(Configuration)|$(Platform)'=='Debug|x64'">
<Import Project="$(UserRootDir)\Microsoft.Cpp.$(Platform).user.props" Condition="exists('$(UserRootDir)\Microsoft.Cpp.$(Platform).user.props')" Label="LocalAppDataPlatform" />
</ImportGroup>
<ImportGroup Label="PropertySheets" Condition="'$(Configuration)|$(Platform)'=='Release|x64'">
<Import Project="$(UserRootDir)\Microsoft.Cpp.$(Platform).user.props" Condition="exists('$(UserRootDir)\Microsoft.Cpp.$(Platform).user.props')" Label="LocalAppDataPlatform" />
</ImportGroup>
<PropertyGroup Label="UserMacros" />
<PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Debug|Win32'">
<LinkIncremental>true</LinkIncremental>
</PropertyGroup>
<PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Release|Win32'">
<LinkIncremental>false</LinkIncremental>
</PropertyGroup>
<PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Debug|x64'">
<LinkIncremental>true</LinkIncremental>
</PropertyGroup>
<PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Release|x64'">
<LinkIncremental>false</LinkIncremental>
</PropertyGroup>
<ItemDefinitionGroup Condition="'$(Configuration)|$(Platform)'=='Debug|Win32'">
<ClCompile>
<WarningLevel>Level3</WarningLevel>
<SDLCheck>true</SDLCheck>
<PreprocessorDefinitions>WOLFSSL_USER_SETTINGS;_WINSOCK_DEPRECATED_NO_WARNINGS;_CRT_SECURE_NO_WARNINGS;WOLFSSL_IGNORE_FILE_WARN</PreprocessorDefinitions>
<ConformanceMode>true</ConformanceMode>
<AdditionalIncludeDirectories>..\..\ThirdParty\WolfSSL-FIPS-Ready;.;%(AdditionalIncludeDirectories)</AdditionalIncludeDirectories>
</ClCompile>
<Link>
<SubSystem>Console</SubSystem>
<GenerateDebugInformation>true</GenerateDebugInformation>
</Link>
</ItemDefinitionGroup>
<ItemDefinitionGroup Condition="'$(Configuration)|$(Platform)'=='Release|Win32'">
<ClCompile>
<WarningLevel>Level3</WarningLevel>
<FunctionLevelLinking>true</FunctionLevelLinking>
<IntrinsicFunctions>true</IntrinsicFunctions>
<SDLCheck>true</SDLCheck>
<PreprocessorDefinitions>WOLFSSL_USER_SETTINGS;_WINSOCK_DEPRECATED_NO_WARNINGS;_CRT_SECURE_NO_WARNINGS;WOLFSSL_IGNORE_FILE_WARN</PreprocessorDefinitions>
<ConformanceMode>true</ConformanceMode>
<AdditionalIncludeDirectories>..\..\ThirdParty\WolfSSL-FIPS-Ready;.;%(AdditionalIncludeDirectories)</AdditionalIncludeDirectories>
</ClCompile>
<Link>
<SubSystem>Console</SubSystem>
<EnableCOMDATFolding>true</EnableCOMDATFolding>
<OptimizeReferences>true</OptimizeReferences>
<GenerateDebugInformation>true</GenerateDebugInformation>
</Link>
</ItemDefinitionGroup>
<ItemDefinitionGroup Condition="'$(Configuration)|$(Platform)'=='Debug|x64'">
<ClCompile>
<WarningLevel>Level3</WarningLevel>
<SDLCheck>true</SDLCheck>
<PreprocessorDefinitions>WOLFSSL_USER_SETTINGS;_WINSOCK_DEPRECATED_NO_WARNINGS;_CRT_SECURE_NO_WARNINGS;WOLFSSL_IGNORE_FILE_WARN</PreprocessorDefinitions>
<ConformanceMode>true</ConformanceMode>
<AdditionalIncludeDirectories>..\..\ThirdParty\WolfSSL-FIPS-Ready;.;%(AdditionalIncludeDirectories)</AdditionalIncludeDirectories>
</ClCompile>
<Link>
<SubSystem>Console</SubSystem>
<GenerateDebugInformation>true</GenerateDebugInformation>
</Link>
</ItemDefinitionGroup>
<ItemDefinitionGroup Condition="'$(Configuration)|$(Platform)'=='Release|x64'">
<ClCompile>
<WarningLevel>Level3</WarningLevel>
<FunctionLevelLinking>true</FunctionLevelLinking>
<IntrinsicFunctions>true</IntrinsicFunctions>
<SDLCheck>true</SDLCheck>
<PreprocessorDefinitions>WOLFSSL_USER_SETTINGS;_WINSOCK_DEPRECATED_NO_WARNINGS;_CRT_SECURE_NO_WARNINGS;WOLFSSL_IGNORE_FILE_WARN</PreprocessorDefinitions>
<ConformanceMode>true</ConformanceMode>
<AdditionalIncludeDirectories>..\..\ThirdParty\WolfSSL-FIPS-Ready;.;%(AdditionalIncludeDirectories)</AdditionalIncludeDirectories>
</ClCompile>
<Link>
<SubSystem>Console</SubSystem>
<EnableCOMDATFolding>true</EnableCOMDATFolding>
<OptimizeReferences>true</OptimizeReferences>
<GenerateDebugInformation>true</GenerateDebugInformation>
</Link>
</ItemDefinitionGroup>
<Import Project="$(VCTargetsPath)\Microsoft.Cpp.targets" />
<ImportGroup Label="ExtensionTargets">
</ImportGroup>
</Project>

View file

@ -1,437 +0,0 @@
<?xml version="1.0" encoding="utf-8"?>
<Project ToolsVersion="4.0" xmlns="http://schemas.microsoft.com/developer/msbuild/2003">
<ItemGroup>
<Filter Include="Source Files">
<UniqueIdentifier>{4FC737F1-C7A5-4376-A066-2A32D752A2FF}</UniqueIdentifier>
<Extensions>cpp;c;cc;cxx;c++;cppm;ixx;def;odl;idl;hpj;bat;asm;asmx</Extensions>
</Filter>
<Filter Include="Header Files">
<UniqueIdentifier>{93995380-89BD-4b04-88EB-625FBE52EBFB}</UniqueIdentifier>
<Extensions>h;hh;hpp;hxx;h++;hm;inl;inc;ipp;xsd</Extensions>
</Filter>
<Filter Include="Resource Files">
<UniqueIdentifier>{67DA6AB6-F800-4c08-8B7A-83BB121AAD01}</UniqueIdentifier>
<Extensions>rc;ico;cur;bmp;dlg;rc2;rct;bin;rgs;gif;jpg;jpeg;jpe;resx;tiff;tif;png;wav;mfcribbon-ms</Extensions>
</Filter>
<Filter Include="wolfSSL">
<UniqueIdentifier>{56c6548d-8e4e-4531-b6d4-9bc1815c433b}</UniqueIdentifier>
</Filter>
<Filter Include="wolfSSL\wolfcrypt">
<UniqueIdentifier>{fc2c3fac-3ef3-4c68-be08-7dbf181b41c2}</UniqueIdentifier>
</Filter>
</ItemGroup>
<ItemGroup>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\aes.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\arc4.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\asm.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\asn.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\async.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\blake2b.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\blake2s.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\camellia.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\chacha.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\chacha20_poly1305.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\cmac.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\coding.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\compress.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\cpuid.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\cryptocb.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\curve448.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\curve25519.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\des3.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\dh.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\dsa.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\ecc.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\ecc_fp.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\ed448.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\ed25519.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\error.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\evp.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fe_448.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fe_low_mem.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fe_operations.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fips.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fips_test.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\ge_448.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\ge_low_mem.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\ge_operations.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\hash.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\hc128.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\hmac.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\idea.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\integer.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\logging.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\md2.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\md4.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\md5.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\memory.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\misc.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\pkcs7.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\pkcs12.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\poly1305.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\pwdbased.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\rabbit.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\random.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\ripemd.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\rsa.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\selftest.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sha.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sha3.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sha256.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sha512.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\signature.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sp_arm32.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sp_arm64.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sp_armthumb.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sp_c32.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sp_c64.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sp_cortexm.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sp_dsp32.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sp_int.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sp_x86_64.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\srp.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\tfm.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\wc_dsp.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\wc_encrypt.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\wc_pkcs11.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\wc_port.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\wolfcrypt_first.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\wolfcrypt_last.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\wolfevent.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\wolfmath.c">
<Filter>wolfSSL\wolfcrypt</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\src\crl.c">
<Filter>wolfSSL</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\src\internal.c">
<Filter>wolfSSL</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\src\keys.c">
<Filter>wolfSSL</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\src\ocsp.c">
<Filter>wolfSSL</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\src\sniffer.c">
<Filter>wolfSSL</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\src\ssl.c">
<Filter>wolfSSL</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\src\tls.c">
<Filter>wolfSSL</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\src\tls13.c">
<Filter>wolfSSL</Filter>
</ClCompile>
<ClCompile Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\src\wolfio.c">
<Filter>wolfSSL</Filter>
</ClCompile>
<ClCompile Include="main.c">
<Filter>Source Files</Filter>
</ClCompile>
<ClCompile Include="SecureTCPClientTask.c">
<Filter>Source Files</Filter>
</ClCompile>
<ClCompile Include="SecureTCPServerTask.c">
<Filter>Source Files</Filter>
</ClCompile>
</ItemGroup>
<ItemGroup>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\aes_asm.asm">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\aes_asm.S">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\aes_gcm_asm.S">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\chacha_asm.S">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fe_x25519_128.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fe_x25519_asm.S">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mont_small.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_3.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_4.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_6.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_7.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_8.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_9.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_12.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_17.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_20.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_24.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_28.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_32.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_48.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_64.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_mul_comba_small_set.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_3.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_4.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_6.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_7.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_8.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_9.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_12.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_17.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_20.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_24.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_28.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_32.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_48.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_64.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\fp_sqr_comba_small_set.i">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\include.am">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\poly1305_asm.S">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sha256_asm.S">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sha512_asm.S">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="..\..\ThirdParty\WolfSSL-FIPS-Ready\wolfcrypt\src\sp_x86_64_asm.S">
<Filter>wolfSSL\wolfcrypt</Filter>
</None>
<None Include="ca-cert.pem">
<Filter>Header Files</Filter>
</None>
<None Include="server-cert.pem">
<Filter>Header Files</Filter>
</None>
<None Include="server-key.pem">
<Filter>Header Files</Filter>
</None>
</ItemGroup>
<ItemGroup>
<ClInclude Include="user_settings.h">
<Filter>Header Files</Filter>
</ClInclude>
</ItemGroup>
</Project>

View file

@ -1,90 +0,0 @@
# wolfSSL FIPS-Ready
# Overview
Federal Information Processing Standards (FIPS) 140-2 specifies the security requirements that will be satisfied by a cryptographic module. It specifies that a cryptographic module should set a cryptographic boundary and mandates certain power-on selftest requirements such as an integrity check and cryptographic known answer tests.
wolfSSL FIPS Ready includes FIPS-enabled cryptography layer code along with the wolfSSL source code. It is not associated with a FIPS certificate, but allows applications to include the same FIPS-specific code (default entry point, power on self test) and best practices used by and required in FIPS-validated modules. If your project may need to get a FIPS certificate in the future, using the wolfSSL FIPS-Ready version now will accelerate future validation times. It makes your project FIPS-Ready and helps ensure best practices.
Next to this folder you will see another demo folder named "FreeRTOS_Plus_WolfSSL_Windows_Simulator". The demo uses regular (non-FIPS-Ready) wolfSSL. If you compare both demos, you will notice that there are no changes to the client code, and will also notice that some additional tests run prior to your main program in this FIPS-Ready demo.
This demo shows that wolfSSL FIPS Ready provides a FIPS compliant cryptographic module with minimal impact on client code.
# What does FIPS 140-2 specify?
FIPS 140-2 enforces cryptographic modules to follow best practices, including:
1. Removal of insecure algorithms (such as MD5 and DES)
2. Include a default entry point
3. Perform a Power On Self Test (POST)
wolfSSL FIPS Ready fulfils these requirements. The third requirement means that the POST should run automatically whenever the application using the FIPS code starts up. For wolfSSL FIPS Ready, the POST consits of two tests:
- In-Core Integrity Check (HMAC-SHA256 over cryptographic algorithm object files)
- Known Answer Tests (KATs)
The in-core integrity check performs an HMAC-SHA256 operation over the object files included in the FIPS-compliant algorithm boundary. The cryptographic boundary is the FIPS-specific code and its related static data in the memory of the program. In the integrity check process, the calculated hash value is compared with the expexted pre-calculated value in the memory. Failure of this check means that compiled boundary code was modified after it was compiled. If either the integrity check or KAT fails, the module enters an error state.
The KAT (Known Answer Tests) run algorithm test cases using pre-computed NIST test vectors, thus verifying that the algorithms are working successfully. The KAT code and test vectors are inside the cryptographic boundary and are also checked as part of the in-core integrity check.
# How to build and run the Demo application
By double-clicking the solution file named "FreeRTOS_Plus_WolfSSL_FIPS_Ready.sln" included in this folder, Visual Studio starts and shows you a project in its solution explorer. It is named "RTOSDemo" and provides a console application program which runs on windows.
All required settings have been set in the user_settings.h header file included in the RTOSDemo/FreeRTOS+/wolfSSL folder in the solution explorer pane. The next step is to build the RTOSDemo application:
1. Build the RTOSDemo project
2. Run the RTOSDemo.exe
You will see a console that pops up, and it shows output like the following:
# Self Test Explanation
```
Starting Power On Self Test
In core integrity check error: hash = C66491A040D5B9686BAA7A75A280290D91B49...
```
Do not worry about this result, an error is expected at this point. Error number "-203" means In-Core-integrity-check failed. The check is identical to the "In Core Integrity Test" listed in the previous section. And the subsequent KAT also failed due to the first error. Once FIPS Ready has failed POST, it enters an error state and never allows subsequent cryptographic operations until the device is restarted and the tests can complete successfully.
The in-core integrity check requires a pre-calculated hash value to be stored in the fips_test.c source file. Remember that you did not yet set this pre-calculated value during the build process. Because the hash does not match the stored value is the reason why this first run will fail.
# Update Pre-calculated hash value
1. Let us go back to the messages in the console shown in the previous section. You may see "hash = C66491A040..." in the message. **The charactor sequence is the value for the pre-calculated hash value.** Please copy this charactor sequece and store it in a temporary location for reference in the next step.
2. Find and open the file named "**fips_test.c**" under the RTOSDemo/FreeRTOS+/wolfSSL/wolfcrypt folder in the Visual Studio solution explorer pane. Or you can reach the file by traversing "../../ThirdParty/WolfSSL-FIPS-Ready/wolfcrypt/src/fips_test.c" starting from the folder where this README is included.
3. In the fips_test.c, find the following statement:
```
static const char verifyCore[] =
"903B291C50C8F0BAB8D2C632853C6D827A9022A4B12260C3A14F4BEBD101228";
```
Replace "903b291C..." with the character sequecece(C66491A040... ) you have stored in your temporary location from above. Save fips_test.c and build the application.
4. Run the application.
This time, you should see:
```
Starting Power On Self Test
Power On Self Test SUCCESS
Waiting for new connection
Connection established
Received by the secure server: Message number 0
Received by the secure server: Message number 1
...
Received by the secure server: Message number 9
Connection closed, back to start
Waiting for new connection
```
This time, the in-core integrity check and KAT finished successfully, and Demo application was allowed to continue and perform its own tasks.
# When is the hash value update needed?
Whenever the FIPS boundary files have had changes made to them, such as options, location in the application, hash value, code, etc. the verifyHash value in fips_test.c will need to be updated. Even you just add or remove your code in your application, it may shift the FIPS boundary code in the memory, thus requiring a new hash value to be computed and updated.

View file

@ -1,5 +0,0 @@
[InternetShortcut]
URL=http://www.freertos.org/FreeRTOS-Plus/WolfSSL/FreeRTOS_WolfSSL_Example.shtml
IDList=
[{000214A0-0000-0000-C000-000000000046}]
Prop3=19,2

View file

@ -1,135 +0,0 @@
/*
* FreeRTOS V202212.00
* Copyright (C) 2020 Amazon.com, Inc. or its affiliates. All Rights Reserved.
*
* Permission is hereby granted, free of charge, to any person obtaining a copy of
* this software and associated documentation files (the "Software"), to deal in
* the Software without restriction, including without limitation the rights to
* use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
* the Software, and to permit persons to whom the Software is furnished to do so,
* subject to the following conditions:
*
* The above copyright notice and this permission notice shall be included in all
* copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
* FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
* COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
* IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
*
* https://www.FreeRTOS.org
* https://github.com/FreeRTOS
*
*/
#pragma comment( lib, "ws2_32.lib" )
/* Win32 includes. */
#include <WinSock2.h>
/* wolfSSL includes. */
#include "wolfssl/ssl.h"
/* Standard includes. */
#include <stdint.h>
#include <stdio.h>
/* FreeRTOS includes. */
#include "FreeRTOS.h"
#include "task.h"
/*-----------------------------------------------------------*/
/* The wolfSSL context for the client. */
static WOLFSSL_CTX* xWolfSSL_ClientContext = NULL;
/*-----------------------------------------------------------*/
/* See the comments at the top of main.c. */
void vSecureTCPClientTask( void *pvParameters )
{
SOCKET xClientSocket;
struct sockaddr_in xConnection;
WOLFSSL* xWolfSSL_Object;
WORD wVersionRequested;
WSADATA xWSAData;
char cString[ 50 ];
BaseType_t lReturned;
uint32_t ulCount = 0UL;
/* Remove compiler warning about unused parameters. */
( void ) pvParameters;
/* Prepare to use WinSock. */
wVersionRequested = MAKEWORD( 2, 2 );
configASSERT( WSAStartup( wVersionRequested, &xWSAData ) == 0 );
/* Set family and port for client socket. */
memset( ( void * ) &xConnection, 0x00, sizeof( struct sockaddr_in ) );
xConnection.sin_family = AF_INET;
xConnection.sin_addr.s_addr = inet_addr("127.0.0.1");
xConnection.sin_port = htons( configTCP_PORT_NUMBER );
/* Attempt to create a context that uses the TLS 1.3 server protocol. */
xWolfSSL_ClientContext = wolfSSL_CTX_new( wolfTLSv1_3_client_method() );
configASSERT( xWolfSSL_ClientContext );
/* Load the CA certificate. */
lReturned = wolfSSL_CTX_load_verify_locations( xWolfSSL_ClientContext, "ca-cert.pem", 0 );
configASSERT( lReturned == SSL_SUCCESS );
for( ;; )
{
/* Create the socket. */
xClientSocket = socket( AF_INET, SOCK_STREAM, 0 );
configASSERT( xClientSocket != INVALID_SOCKET );
/* Connect to the secure server. */
if( connect( xClientSocket, ( SOCKADDR * ) &xConnection, sizeof( xConnection ) ) == 0 )
{
/* The connect was successful. Create a wolfSSL object to associate
with this connection. */
xWolfSSL_Object = wolfSSL_new( xWolfSSL_ClientContext );
if( xWolfSSL_Object != NULL )
{
/* Associate the created wolfSSL object with the connected
socket. */
lReturned = wolfSSL_set_fd( xWolfSSL_Object, xClientSocket );
configASSERT( lReturned == SSL_SUCCESS );
/* The count is used to differentiate between messages sent to
the server, and to break out of the do while loop below. */
ulCount = 0UL;
do
{
/* Create the string that is sent to the secure server. */
sprintf( cString, "Message number %lu\r\n", ulCount );
/* The next line is the secure equivalent of the standard
sockets call:
lReturned = send( xClientSocket, cString, strlen( cString ) + 1, 0 ); */
lReturned = wolfSSL_write( xWolfSSL_Object, cString, strlen( cString ) + 1 );
/* Short delay to prevent the messages streaming up the
console too quickly. */
vTaskDelay( 50 );
ulCount++;
} while( ( lReturned != SOCKET_ERROR ) && ( ulCount < 10UL ) );
}
wolfSSL_free( xWolfSSL_Object );
closesocket( xClientSocket );
/* Delay for a short time before starting over. */
vTaskDelay( 250 );
}
}
}
/*-----------------------------------------------------------*/

View file

@ -1,244 +0,0 @@
/*
* FreeRTOS V202212.00
* Copyright (C) 2020 Amazon.com, Inc. or its affiliates. All Rights Reserved.
*
* Permission is hereby granted, free of charge, to any person obtaining a copy of
* this software and associated documentation files (the "Software"), to deal in
* the Software without restriction, including without limitation the rights to
* use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
* the Software, and to permit persons to whom the Software is furnished to do so,
* subject to the following conditions:
*
* The above copyright notice and this permission notice shall be included in all
* copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
* FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
* COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
* IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
*
* https://www.FreeRTOS.org
* https://github.com/FreeRTOS
*
*/
#pragma comment( lib, "ws2_32.lib" )
/* Win32 includes. */
#include <WinSock2.h>
/* wolfSSL includes. */
#include "wolfssl/ssl.h"
/* Standard includes. */
#include <stdint.h>
#include <stdio.h>
/* FreeRTOS includes. */
#include "FreeRTOS.h"
#include "task.h"
/* This application is using the FreeRTOS Windows simulator, which uses the
FreeRTOS scheduler to schedule FreeRTOS task within the Windows environment.
The Windows envrionment must not be allowed to block any Windows threads that
are running FreeRTOS tasks, unless the FreeRTOS task is running at the FreeRTOS
idle priority. For simplicity, this demo uses the Windows TCP/IP stack, the
API for which can cause Windows threads to block. Therefore, any FreeRTOS task
that makes calls to the Windows TCP/IP stack must be assigned the idle prioity.
Note this is only a restriction of the simulated Windows environment - real
FreeRTOS ports do not have this restriction. */
#define sstSECURE_CLIENT_TASK_PRIORITY ( tskIDLE_PRIORITY )
/*-----------------------------------------------------------*/
/*
* Open, configures and binds the server's TCP socket.
*/
static SOCKET prvOpenServerSocket( void );
/*
* Prepare the wolfSSL library for use.
*/
static void prvInitialiseWolfSSL( void );
/*
* The task that implements the client side of the connection.
*/
extern void vSecureTCPClientTask( void *pvParameters );
/*-----------------------------------------------------------*/
/* The wolfSSL context for the server. */
static WOLFSSL_CTX* xWolfSSL_ServerContext = NULL;
/*-----------------------------------------------------------*/
/* See the comments at the top of main.c. */
void vSecureTCPServerTask( void *pvParameters )
{
BaseType_t xReturned;
long lBytes;
uint8_t cReceivedString[ 60 ];
struct sockaddr_in xClient;
int xClientAddressLength = sizeof( struct sockaddr_in );
SOCKET xListeningSocket, xConnectedSocket;
WOLFSSL* xWolfSSL_Object; /* Only one connection is accepted at a time, so only one object is needed at a time. */
/* Just to prevent compiler warnings. */
( void ) pvParameters;
/* Perform the initialisation necessary before wolfSSL can be used. */
prvInitialiseWolfSSL();
configASSERT( xWolfSSL_ServerContext );
/* Attempt to open the socket. */
xListeningSocket = prvOpenServerSocket();
/* Now the server socket has been created and the wolfSSL library has been
initialised, the task that implements the client side can be created. */
xTaskCreate( vSecureTCPClientTask, "Client", configMINIMAL_STACK_SIZE, NULL, sstSECURE_CLIENT_TASK_PRIORITY, NULL );
if( xListeningSocket != INVALID_SOCKET )
{
for( ;; )
{
/* Wait until the client connects. */
printf( "Waiting for new connection\r\n" );
xConnectedSocket = accept( xListeningSocket, ( struct sockaddr * ) &xClient, &xClientAddressLength );
if( xConnectedSocket != INVALID_SOCKET )
{
printf( "Connection established\r\n" );
/* A connection has been accepted by the server. Create a
wolfSSL object for use with the newly connected socket. */
xWolfSSL_Object = NULL;
xWolfSSL_Object = wolfSSL_new( xWolfSSL_ServerContext );
if( xWolfSSL_Object != NULL )
{
/* Associate the created wolfSSL object with the connected
socket. */
xReturned = wolfSSL_set_fd( xWolfSSL_Object, xConnectedSocket );
configASSERT( xReturned == SSL_SUCCESS );
do
{
/* The next line is the secure equivalent to the
standard sockets call:
lBytes = recv( xConnectedSocket, cReceivedString, 50, 0 ); */
lBytes = wolfSSL_read( xWolfSSL_Object, cReceivedString, sizeof( cReceivedString ) );
/* Print the received characters. */
if( lBytes > 0 )
{
printf( "Received by the secure server: %s\r\n", cReceivedString );
}
} while ( lBytes > 0 );
/* The connection was closed, close the socket and free the
wolfSSL object. */
closesocket( xConnectedSocket );
wolfSSL_free( xWolfSSL_Object );
printf( "Connection closed, back to start\r\n\r\n" );
}
}
}
}
else
{
/* The socket could not be opened. */
vTaskDelete( NULL );
}
}
/*-----------------------------------------------------------*/
static SOCKET prvOpenServerSocket( void )
{
WSADATA xWSAData;
WORD wVersionRequested;
struct sockaddr_in xConnection;
SOCKET xSocket = INVALID_SOCKET;
wVersionRequested = MAKEWORD( 2, 2 );
/* Prepare to use WinSock. */
if( WSAStartup( wVersionRequested, &xWSAData ) != 0 )
{
fprintf( stderr, "Could not open Windows connection.\n" );
}
else
{
xSocket = socket( AF_INET, SOCK_STREAM, 0 );
if( xSocket == INVALID_SOCKET)
{
fprintf( stderr, "Could not create socket.\n" );
WSACleanup();
}
else
{
/* Zero out the server structure. */
memset( ( void * ) &xConnection, 0x00, sizeof( struct sockaddr_in ) );
xConnection.sin_family = AF_INET;
xConnection.sin_addr.s_addr = inet_addr("127.0.0.1");
xConnection.sin_port = htons( configTCP_PORT_NUMBER );
/* Bind the address to the socket. */
if( bind( xSocket, ( struct sockaddr * ) &xConnection, sizeof( struct sockaddr_in ) ) == -1 )
{
fprintf( stderr, "Could not socket to port %d.\n", configTCP_PORT_NUMBER );
closesocket( xSocket );
xSocket = INVALID_SOCKET;
WSACleanup();
}
if( listen( xSocket, 20 ) != 0 )
{
closesocket( xSocket );
xSocket = INVALID_SOCKET;
WSACleanup();
}
}
}
return xSocket;
}
/*-----------------------------------------------------------*/
static void prvInitialiseWolfSSL( void )
{
int32_t iReturn;
#ifdef DEBUG_WOLFSSL
{
wolfSSL_Debugging_ON();
}
#endif
/* Initialise wolfSSL. This must be done before any other wolfSSL functions
are called. */
wolfSSL_Init();
/* Attempt to create a context that uses the TLS 1.3 server protocol. */
xWolfSSL_ServerContext = wolfSSL_CTX_new( wolfTLSv1_3_server_method() );
if( xWolfSSL_ServerContext != NULL )
{
/* Load the CA certificate. Real applications should ensure that
wolfSSL_CTX_load_verify_locations() returns SSL_SUCCESS before
proceeding. */
iReturn = wolfSSL_CTX_load_verify_locations( xWolfSSL_ServerContext, "ca-cert.pem", 0 );
configASSERT( iReturn == SSL_SUCCESS );
iReturn = wolfSSL_CTX_use_certificate_file( xWolfSSL_ServerContext, "server-cert.pem", SSL_FILETYPE_PEM );
configASSERT( iReturn == SSL_SUCCESS );
iReturn = wolfSSL_CTX_use_PrivateKey_file( xWolfSSL_ServerContext, "server-key.pem", SSL_FILETYPE_PEM );
configASSERT( iReturn == SSL_SUCCESS );
}
}

View file

@ -1,93 +0,0 @@
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5e:ba:a4:f4:b1:f7:48:25:e3:5f:9b:da:a1:13:ed:d5:2b:03:67:15
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:bf:0c:ca:2d:14:b2:1e:84:42:5b:cd:38:1f:4a:
f2:4d:75:10:f1:b6:35:9f:df:ca:7d:03:98:d3:ac:
de:03:66:ee:2a:f1:d8:b0:7d:6e:07:54:0b:10:98:
21:4d:80:cb:12:20:e7:cc:4f:de:45:7d:c9:72:77:
32:ea:ca:90:bb:69:52:10:03:2f:a8:f3:95:c5:f1:
8b:62:56:1b:ef:67:6f:a4:10:41:95:ad:0a:9b:e3:
a5:c0:b0:d2:70:76:50:30:5b:a8:e8:08:2c:7c:ed:
a7:a2:7a:8d:38:29:1c:ac:c7:ed:f2:7c:95:b0:95:
82:7d:49:5c:38:cd:77:25:ef:bd:80:75:53:94:3c:
3d:ca:63:5b:9f:15:b5:d3:1d:13:2f:19:d1:3c:db:
76:3a:cc:b8:7d:c9:e5:c2:d7:da:40:6f:d8:21:dc:
73:1b:42:2d:53:9c:fe:1a:fc:7d:ab:7a:36:3f:98:
de:84:7c:05:67:ce:6a:14:38:87:a9:f1:8c:b5:68:
cb:68:7f:71:20:2b:f5:a0:63:f5:56:2f:a3:26:d2:
b7:6f:b1:5a:17:d7:38:99:08:fe:93:58:6f:fe:c3:
13:49:08:16:0b:a7:4d:67:00:52:31:67:23:4e:98:
ed:51:45:1d:b9:04:d9:0b:ec:d8:28:b3:4b:bd:ed:
36:79
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Key Identifier:
27:8E:67:11:74:C3:26:1D:3F:ED:33:63:B3:A4:D8:1D:30:E5:E8:D5
X509v3 Authority Key Identifier:
keyid:27:8E:67:11:74:C3:26:1D:3F:ED:33:63:B3:A4:D8:1D:30:E5:E8:D5
DirName:/C=US/ST=Montana/L=Bozeman/O=Sawtooth/OU=Consulting/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:5E:BA:A4:F4:B1:F7:48:25:E3:5F:9B:DA:A1:13:ED:D5:2B:03:67:15
X509v3 Basic Constraints:
CA:TRUE
X509v3 Subject Alternative Name:
DNS:example.com, IP Address:127.0.0.1
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: sha256WithRSAEncryption
b9:ed:94:3e:00:73:2d:a5:d1:04:b3:fb:dc:f0:b7:0d:3d:ad:
96:74:4c:92:67:ad:6d:7c:e2:99:6a:33:ca:b2:0f:04:5a:a5:
67:f8:e3:0b:3d:f5:d0:5b:1e:20:52:12:92:28:ea:31:a3:51:
9e:8b:d2:39:e4:25:ea:61:61:41:16:2d:54:50:d3:fb:d0:34:
00:10:f1:7b:bc:f0:08:a7:f5:27:5e:7e:40:9d:99:b0:d3:31:
11:c3:9d:a9:51:a0:17:cf:83:2c:55:84:e0:d5:92:a0:05:3a:
9f:b8:75:f8:1b:e5:f7:a4:6c:e9:aa:25:8b:19:93:46:1f:3f:
33:af:47:29:cf:7b:8b:59:27:eb:d7:4f:cb:33:19:fa:5f:ee:
d8:13:e9:0c:07:ad:3b:c0:7f:10:d7:e4:ed:e8:db:16:e1:1f:
a4:7f:16:3c:bd:d7:11:f2:d4:3a:a9:9b:95:e1:39:51:99:eb:
5b:65:46:ef:63:84:73:95:23:b8:bf:b5:f6:4d:12:71:f7:ff:
33:aa:4a:8c:65:73:73:89:69:df:a6:dc:a4:91:ff:ae:c7:28:
93:b5:1a:de:a9:8f:2b:30:85:83:8b:99:82:ca:b3:7c:11:10:
88:9d:8e:6c:2c:f3:05:6f:cb:80:85:16:b7:ed:e4:68:fb:b6:
b6:31:8a:7d
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View file

@ -1,95 +0,0 @@
/*
* FreeRTOS V202212.00
* Copyright (C) 2020 Amazon.com, Inc. or its affiliates. All Rights Reserved.
*
* Permission is hereby granted, free of charge, to any person obtaining a copy of
* this software and associated documentation files (the "Software"), to deal in
* the Software without restriction, including without limitation the rights to
* use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
* the Software, and to permit persons to whom the Software is furnished to do so,
* subject to the following conditions:
*
* The above copyright notice and this permission notice shall be included in all
* copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
* FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
* COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
* IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
*
* https://www.FreeRTOS.org
* https://github.com/FreeRTOS
*
*/
/* Standard includes. */
#include <stdio.h>
#include <stdint.h>
/* FreeRTOS includes. */
#include <FreeRTOS.h>
#include "task.h"
/* This application is using the FreeRTOS Windows simulator, which uses the
FreeRTOS scheduler to schedule FreeRTOS task within the Windows environment.
The Windows environment must not be allowed to block any Windows threads that
are running FreeRTOS tasks, unless the FreeRTOS task is running at the FreeRTOS
idle priority. For simplicity, this demo uses the Windows TCP/IP stack, the
API for which can cause Windows threads to block. Therefore, any FreeRTOS task
that makes calls to the Windows TCP/IP stack must be assigned the idle priority.
Note this is only a restriction of the simulated Windows environment - real
FreeRTOS ports do not have this restriction. */
#define mainSECURE_SERVER_TASK_PRIORITY ( tskIDLE_PRIORITY )
/*-----------------------------------------------------------*/
/*
* The task that implements the server side.
*/
extern void vSecureTCPServerTask( void *pvParameters );
/*-----------------------------------------------------------*/
/*
*! It is necessary to update the build hash before running this project for the
*! time. Ensure to read README_wolfSSL_FIPS_ready.md in the directory that contains
*! this Visual Studio project for instructions.
*/
int main( void )
{
const uint32_t ulLongTime_ms = 250UL;
/* Create the TCP server task. This will itself create the client task
once it has completed the wolfSSL initialisation. */
xTaskCreate( vSecureTCPServerTask, "Server", configMINIMAL_STACK_SIZE, NULL, mainSECURE_SERVER_TASK_PRIORITY, NULL );
/* Start the task running. */
vTaskStartScheduler();
/* If all is well, the scheduler will now be running, and the following
line will never be reached. If the following line does execute, then
there was insufficient FreeRTOS heap memory available for the idle and/or
timer tasks to be created. See the memory management section on the
FreeRTOS web site for more details (this is standard text that is not
really applicable to the Win32 simulator port). */
for( ;; )
{
Sleep( ulLongTime_ms );
}
}
/*-----------------------------------------------------------*/
void vApplicationIdleHook( void )
{
const unsigned long ulMSToSleep = 5;
/* This function is called on each cycle of the idle task if
configUSE_IDLE_HOOK is set to 1 in FreeRTOSConfig.h. Sleep to reduce CPU
load. */
Sleep( ulMSToSleep );
}
/*-----------------------------------------------------------*/

View file

@ -1,185 +0,0 @@
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = wolfSSL, OU = Support, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c0:95:08:e1:57:41:f2:71:6d:b7:d2:45:41:27:
01:65:c6:45:ae:f2:bc:24:30:b8:95:ce:2f:4e:d6:
f6:1c:88:bc:7c:9f:fb:a8:67:7f:fe:5c:9c:51:75:
f7:8a:ca:07:e7:35:2f:8f:e1:bd:7b:c0:2f:7c:ab:
64:a8:17:fc:ca:5d:7b:ba:e0:21:e5:72:2e:6f:2e:
86:d8:95:73:da:ac:1b:53:b9:5f:3f:d7:19:0d:25:
4f:e1:63:63:51:8b:0b:64:3f:ad:43:b8:a5:1c:5c:
34:b3:ae:00:a0:63:c5:f6:7f:0b:59:68:78:73:a6:
8c:18:a9:02:6d:af:c3:19:01:2e:b8:10:e3:c6:cc:
40:b4:69:a3:46:33:69:87:6e:c4:bb:17:a6:f3:e8:
dd:ad:73:bc:7b:2f:21:b5:fd:66:51:0c:bd:54:b3:
e1:6d:5f:1c:bc:23:73:d1:09:03:89:14:d2:10:b9:
64:c3:2a:d0:a1:96:4a:bc:e1:d4:1a:5b:c7:a0:c0:
c1:63:78:0f:44:37:30:32:96:80:32:23:95:a1:77:
ba:13:d2:97:73:e2:5d:25:c9:6a:0d:c3:39:60:a4:
b4:b0:69:42:42:09:e9:d8:08:bc:33:20:b3:58:22:
a7:aa:eb:c4:e1:e6:61:83:c5:d2:96:df:d9:d0:4f:
ad:d7
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Key Identifier:
B3:11:32:C9:92:98:84:E2:C9:F8:D0:3B:6E:03:42:CA:1F:0E:8E:3C
X509v3 Authority Key Identifier:
keyid:27:8E:67:11:74:C3:26:1D:3F:ED:33:63:B3:A4:D8:1D:30:E5:E8:D5
DirName:/C=US/ST=Montana/L=Bozeman/O=Sawtooth/OU=Consulting/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:5E:BA:A4:F4:B1:F7:48:25:E3:5F:9B:DA:A1:13:ED:D5:2B:03:67:15
X509v3 Basic Constraints:
CA:TRUE
X509v3 Subject Alternative Name:
DNS:example.com, IP Address:127.0.0.1
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: sha256WithRSAEncryption
35:91:e6:72:cc:0b:f1:47:8f:3d:e3:5d:52:2f:83:b8:b1:3b:
6d:d6:ac:13:79:74:14:ff:07:8d:ee:74:77:64:ff:b8:83:1d:
81:80:84:bb:38:fa:8f:f3:75:29:23:ce:e5:09:a8:13:85:14:
b6:6a:35:30:2c:1c:c4:0f:23:67:ea:ed:cb:91:c4:05:e3:ec:
6b:be:11:bf:d9:9a:ab:93:17:9f:e4:9a:59:d4:e7:cc:ce:dc:
83:10:f5:cd:de:d7:35:75:4b:aa:7a:7a:ba:02:a0:b0:b5:c1:
8a:6b:b1:72:cf:64:59:4e:d3:a4:a1:6c:64:4b:14:cf:a3:d6:
37:0a:e6:f9:5b:21:be:de:0c:c1:cf:43:e1:18:0b:19:13:6b:
8e:3d:df:0f:a7:43:fb:35:67:4a:50:e8:09:46:34:bd:f4:ab:
1a:8f:bd:4d:1c:6b:20:be:1c:8c:ca:66:98:ba:03:67:f2:1c:
3c:1e:01:f0:4d:c6:85:82:6f:a9:49:f7:1b:7d:6b:db:76:84:
73:bb:16:c5:6e:74:ab:7b:fb:1c:e9:91:bb:29:73:1c:de:27:
b4:67:3b:10:51:f4:17:eb:b8:38:a0:9a:eb:37:5b:76:8f:39:
12:39:35:d1:ca:fe:c0:26:fb:73:50:1e:2d:b9:d2:ba:e5:4c:
35:bd:ed:7b
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5e:ba:a4:f4:b1:f7:48:25:e3:5f:9b:da:a1:13:ed:d5:2b:03:67:15
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Validity
Not Before: Jun 19 13:23:41 2020 GMT
Not After : Mar 16 13:23:41 2023 GMT
Subject: C = US, ST = Montana, L = Bozeman, O = Sawtooth, OU = Consulting, CN = www.wolfssl.com, emailAddress = info@wolfssl.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:bf:0c:ca:2d:14:b2:1e:84:42:5b:cd:38:1f:4a:
f2:4d:75:10:f1:b6:35:9f:df:ca:7d:03:98:d3:ac:
de:03:66:ee:2a:f1:d8:b0:7d:6e:07:54:0b:10:98:
21:4d:80:cb:12:20:e7:cc:4f:de:45:7d:c9:72:77:
32:ea:ca:90:bb:69:52:10:03:2f:a8:f3:95:c5:f1:
8b:62:56:1b:ef:67:6f:a4:10:41:95:ad:0a:9b:e3:
a5:c0:b0:d2:70:76:50:30:5b:a8:e8:08:2c:7c:ed:
a7:a2:7a:8d:38:29:1c:ac:c7:ed:f2:7c:95:b0:95:
82:7d:49:5c:38:cd:77:25:ef:bd:80:75:53:94:3c:
3d:ca:63:5b:9f:15:b5:d3:1d:13:2f:19:d1:3c:db:
76:3a:cc:b8:7d:c9:e5:c2:d7:da:40:6f:d8:21:dc:
73:1b:42:2d:53:9c:fe:1a:fc:7d:ab:7a:36:3f:98:
de:84:7c:05:67:ce:6a:14:38:87:a9:f1:8c:b5:68:
cb:68:7f:71:20:2b:f5:a0:63:f5:56:2f:a3:26:d2:
b7:6f:b1:5a:17:d7:38:99:08:fe:93:58:6f:fe:c3:
13:49:08:16:0b:a7:4d:67:00:52:31:67:23:4e:98:
ed:51:45:1d:b9:04:d9:0b:ec:d8:28:b3:4b:bd:ed:
36:79
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Key Identifier:
27:8E:67:11:74:C3:26:1D:3F:ED:33:63:B3:A4:D8:1D:30:E5:E8:D5
X509v3 Authority Key Identifier:
keyid:27:8E:67:11:74:C3:26:1D:3F:ED:33:63:B3:A4:D8:1D:30:E5:E8:D5
DirName:/C=US/ST=Montana/L=Bozeman/O=Sawtooth/OU=Consulting/CN=www.wolfssl.com/emailAddress=info@wolfssl.com
serial:5E:BA:A4:F4:B1:F7:48:25:E3:5F:9B:DA:A1:13:ED:D5:2B:03:67:15
X509v3 Basic Constraints:
CA:TRUE
X509v3 Subject Alternative Name:
DNS:example.com, IP Address:127.0.0.1
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: sha256WithRSAEncryption
b9:ed:94:3e:00:73:2d:a5:d1:04:b3:fb:dc:f0:b7:0d:3d:ad:
96:74:4c:92:67:ad:6d:7c:e2:99:6a:33:ca:b2:0f:04:5a:a5:
67:f8:e3:0b:3d:f5:d0:5b:1e:20:52:12:92:28:ea:31:a3:51:
9e:8b:d2:39:e4:25:ea:61:61:41:16:2d:54:50:d3:fb:d0:34:
00:10:f1:7b:bc:f0:08:a7:f5:27:5e:7e:40:9d:99:b0:d3:31:
11:c3:9d:a9:51:a0:17:cf:83:2c:55:84:e0:d5:92:a0:05:3a:
9f:b8:75:f8:1b:e5:f7:a4:6c:e9:aa:25:8b:19:93:46:1f:3f:
33:af:47:29:cf:7b:8b:59:27:eb:d7:4f:cb:33:19:fa:5f:ee:
d8:13:e9:0c:07:ad:3b:c0:7f:10:d7:e4:ed:e8:db:16:e1:1f:
a4:7f:16:3c:bd:d7:11:f2:d4:3a:a9:9b:95:e1:39:51:99:eb:
5b:65:46:ef:63:84:73:95:23:b8:bf:b5:f6:4d:12:71:f7:ff:
33:aa:4a:8c:65:73:73:89:69:df:a6:dc:a4:91:ff:ae:c7:28:
93:b5:1a:de:a9:8f:2b:30:85:83:8b:99:82:ca:b3:7c:11:10:
88:9d:8e:6c:2c:f3:05:6f:cb:80:85:16:b7:ed:e4:68:fb:b6:
b6:31:8a:7d
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View file

@ -1,27 +0,0 @@
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----

View file

@ -1,108 +0,0 @@
/*
* FreeRTOS V202212.00
* Copyright (C) 2020 Amazon.com, Inc. or its affiliates. All Rights Reserved.
*
* Permission is hereby granted, free of charge, to any person obtaining a copy of
* this software and associated documentation files (the "Software"), to deal in
* the Software without restriction, including without limitation the rights to
* use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
* the Software, and to permit persons to whom the Software is furnished to do so,
* subject to the following conditions:
*
* The above copyright notice and this permission notice shall be included in all
* copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
* FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
* COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
* IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
*
* https://www.FreeRTOS.org
* https://github.com/FreeRTOS
*
*/
#ifndef USER_SETTINGS_H_
#define USER_SETTINGS_H_
/*-- Cipher related definitions -----------------------------------------------
*
*
*----------------------------------------------------------------------------*/
#define HAVE_FIPS
#define HAVE_FIPS_VERSION 3
#define WOLFSSL_TLS13
#define HAVE_TLS_EXTENSIONS
#define HAVE_SUPPORTED_CURVES
#define HAVE_FFDHE_2048
#ifndef WOLFSSL_OPTIONS_IGNORE_SYS
#undef _POSIX_THREADS
#define _POSIX_THREADS
#endif
#define HAVE_THREAD_LS
#define TFM_TIMING_RESISTANT
#define ECC_TIMING_RESISTANT
#define WC_RSA_BLINDING
#define HAVE_AESGCM
#define WOLFSSL_SHA512
#define WOLFSSL_SHA384
#define HAVE_HKDF
#define NO_DSA
#define HAVE_ECC
#define TFM_ECC256
#define ECC_SHAMIR
#define WC_RSA_PSS
#define WOLFSSL_BASE64_ENCODE
#define NO_RC4
#define NO_HC128
#define NO_RABBIT
#define WOLFSSL_KEY_GEN
#define WOLFSSL_SHA224
#define WOLFSSL_AES_DIRECT
#define HAVE_AES_ECB
#define HAVE_ECC_CDH
#define WC_RSA_NO_PADDING
#define WOLFSSL_VALIDATE_FFC_IMPORT
#define HAVE_FFDHE_Q
#define WOLFSSL_NO_SHAKE256
#define HAVE_AESCCM
#define WOLFSSL_VALIDATE_ECC_IMPORT
#define WOLFSSL_AES_COUNTER
#define WOLFSSL_CMAC
#define WOLFSSL_SHA224
#define WOLFSSL_SHA3
#define WOLFSSL_SHAKE256
#define HAVE_HASHDRBG
#define HAVE_TLS_EXTENSIONS
#define HAVE_SUPPORTED_CURVES
#define HAVE_EXTENDED_MASTER
#define NO_RC4
#define HAVE_ENCRYPT_THEN_MAC
#define NO_PSK
#define NO_MD4
#define NO_PWDBASED
#define USE_FAST_MATH
#define WOLFSSL_X86_64_BUILD
#define WC_NO_ASYNC_THREADING
#define HAVE_DH_DEFAULT_PARAMS
#define HAVE___UINT128_T 1
/*-- Debugging options ------------------------------------------------------
*
* "DEBUG_WOLFSSL" definition enables log to output into stdout.
* Note: wolfSSL_Debugging_ON() must be called just after wolfSSL_Init().
*----------------------------------------------------------------------------*/
/*#define DEBUG_WOLFSSL*/
/* The TCP port used by both the secure client and the secure server. */
#define configTCP_PORT_NUMBER 5001
#endif /* ifndef USER_SETTINGS_H_ */