You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[AS_HELP_STRING([--enable-rsa],[Enable RSA (default: enabled). Set to "nonblock" to enable non-blocking RSA via TFM fp_exptmod_nb or SP small mod_exp_nb])],
5400
5409
[ ENABLED_RSA=$enableval ],
5401
5410
[ ENABLED_RSA=yes ]
5402
5411
)
5403
5412
5404
5413
if test "$ENABLED_RSA" = "no"
5405
5414
then
5406
5415
AM_CFLAGS="$AM_CFLAGS -DNO_RSA"
5416
+
elif test "$ENABLED_RSA" = "nonblock"
5417
+
then
5418
+
AM_CFLAGS="$AM_CFLAGS -DWC_RSA_NONBLOCK"
5419
+
ENABLED_RSA=yes
5420
+
ENABLED_CERTS=yes
5421
+
# asynccrypt + asynccrypt-sw are auto-enabled earlier in this file when
5422
+
# --enable-rsa=nonblock is detected, so the TLS layer can pick up the
5423
+
# per-SSL nb context and yield MP_WOULDBLOCK. RSA_LOW_MEM is left as a
5424
+
# user choice - the SP non-block backend's compile-time check in
5425
+
# wolfssl/wolfcrypt/rsa.h enforces it for SP, while the TFM (fastmath)
5426
+
# backend supports the CRT path without it.
5407
5427
else
5408
5428
# turn off RSA if leanpsk or leantls on
5409
5429
if test "$ENABLED_LEANPSK" = "yes" || test "$ENABLED_LEANTLS" = "yes"
0 commit comments