|
26 | 26 | #include <wolfssl/wolfcrypt/settings.h> |
27 | 27 | #include <wolfssl/wolfcrypt/error-crypt.h> |
28 | 28 | #include <wolfssl/wolfcrypt/logging.h> |
| 29 | +#include <wolfssl/wolfcrypt/sha256.h> |
29 | 30 |
|
30 | 31 | #ifdef WOLFSSL_HAVE_XMSS |
31 | 32 | #include <wolfssl/wolfcrypt/ext_xmss.h> |
|
37 | 38 | #include <wolfcrypt/src/misc.c> |
38 | 39 | #endif |
39 | 40 |
|
| 41 | +#include <xmss_callbacks.h> |
| 42 | + |
| 43 | +#ifndef WOLFSSL_XMSS_VERIFY_ONLY |
| 44 | +static THREAD_LS_T WC_RNG * xmssRng = NULL; |
| 45 | + |
| 46 | +/* RNG callback used by xmss. |
| 47 | + * */ |
| 48 | +static int rng_cb(void * output, size_t length) |
| 49 | +{ |
| 50 | + int ret = 0; |
| 51 | + |
| 52 | + if (output == NULL || xmssRng == NULL) { |
| 53 | + return -1; |
| 54 | + } |
| 55 | + |
| 56 | + if (length == 0) { |
| 57 | + return 0; |
| 58 | + } |
| 59 | + |
| 60 | + ret = wc_RNG_GenerateBlock(xmssRng, output, (word32) length); |
| 61 | + |
| 62 | + if (ret) { |
| 63 | + WOLFSSL_MSG("error: xmss rng_cb failed"); |
| 64 | + return -1; |
| 65 | + } |
| 66 | + |
| 67 | + return 0; |
| 68 | +} |
| 69 | +#endif /* ifndef WOLFSSL_XMSS_VERIFY_ONLY */ |
| 70 | + |
| 71 | +/* SHA256 callback used by xmss. |
| 72 | + * */ |
| 73 | +static int sha256_cb(const unsigned char *in, unsigned long long inlen, |
| 74 | + unsigned char *out) |
| 75 | +{ |
| 76 | + wc_Sha256 sha; |
| 77 | + |
| 78 | + if (wc_InitSha256_ex(&sha, NULL, INVALID_DEVID) != 0) { |
| 79 | + WOLFSSL_MSG("SHA256 Init failed"); |
| 80 | + return -1; |
| 81 | + } |
| 82 | + |
| 83 | + if (wc_Sha256Update(&sha, in, (word32) inlen) != 0) { |
| 84 | + WOLFSSL_MSG("SHA256 Update failed"); |
| 85 | + return -1; |
| 86 | + } |
| 87 | + |
| 88 | + if (wc_Sha256Final(&sha, out) != 0) { |
| 89 | + WOLFSSL_MSG("SHA256 Final failed"); |
| 90 | + wc_Sha256Free(&sha); |
| 91 | + return -1; |
| 92 | + } |
| 93 | + wc_Sha256Free(&sha); |
| 94 | + |
| 95 | + return 0; |
| 96 | +} |
| 97 | + |
40 | 98 | /* Init an Xmss key. |
41 | 99 | * |
42 | 100 | * Call this before setting the parms of an Xmss key. |
@@ -119,6 +177,20 @@ static int wc_XmssKey_SetOid(XmssKey * key, uint32_t oid, int is_xmssmt) |
119 | 177 | return -1; |
120 | 178 | } |
121 | 179 |
|
| 180 | + ret = xmss_set_sha_cb(sha256_cb); |
| 181 | + if (ret != 0) { |
| 182 | + WOLFSSL_MSG("error: xmss_set_sha_cb failed"); |
| 183 | + return -1; |
| 184 | + } |
| 185 | + |
| 186 | +#ifndef WOLFSSL_XMSS_VERIFY_ONLY |
| 187 | + ret = xmss_set_rng_cb(rng_cb); |
| 188 | + if (ret != 0) { |
| 189 | + WOLFSSL_MSG("error: xmss_set_rng_cb failed"); |
| 190 | + return -1; |
| 191 | + } |
| 192 | +#endif |
| 193 | + |
122 | 194 | key->oid = oid; |
123 | 195 | key->is_xmssmt = is_xmssmt; |
124 | 196 | key->state = WC_XMSS_STATE_PARMSET; |
@@ -401,13 +473,15 @@ int wc_XmssKey_MakeKey(XmssKey* key, WC_RNG * rng) |
401 | 473 | return ret; |
402 | 474 | } |
403 | 475 |
|
| 476 | + xmssRng = rng; |
| 477 | + |
404 | 478 | /* Finally make the secret public key pair. Immediately write it to NV |
405 | 479 | * storage and then clear from memory. */ |
406 | 480 | if (key->is_xmssmt) { |
407 | | - ret = xmssmt_keypair(key->pk, key->sk, key->oid, rng); |
| 481 | + ret = xmssmt_keypair(key->pk, key->sk, key->oid); |
408 | 482 | } |
409 | 483 | else { |
410 | | - ret = xmss_keypair(key->pk, key->sk, key->oid, rng); |
| 484 | + ret = xmss_keypair(key->pk, key->sk, key->oid); |
411 | 485 | } |
412 | 486 |
|
413 | 487 | if (ret == 0) { |
|
0 commit comments