You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[AS_HELP_STRING([--enable-rsa],[Enable RSA (default: enabled). Set to "nonblock" to enable non-blocking RSA via TFM fp_exptmod_nb or SP small mod_exp_nb])],
5529
5538
[ ENABLED_RSA=$enableval ],
5530
5539
[ ENABLED_RSA=yes ]
5531
5540
)
5532
5541
5533
5542
if test "$ENABLED_RSA" = "no"
5534
5543
then
5535
5544
AM_CFLAGS="$AM_CFLAGS -DNO_RSA"
5545
+
elif test "$ENABLED_RSA" = "nonblock"
5546
+
then
5547
+
AM_CFLAGS="$AM_CFLAGS -DWC_RSA_NONBLOCK"
5548
+
ENABLED_RSA=yes
5549
+
ENABLED_CERTS=yes
5550
+
# asynccrypt + asynccrypt-sw are auto-enabled earlier in this file when
5551
+
# --enable-rsa=nonblock is detected, so the TLS layer can pick up the
5552
+
# per-SSL nb context and yield MP_WOULDBLOCK. RSA_LOW_MEM is left as a
5553
+
# user choice - the SP non-block backend's compile-time check in
5554
+
# wolfssl/wolfcrypt/rsa.h enforces it for SP, while the TFM (fastmath)
5555
+
# backend supports the CRT path without it.
5536
5556
else
5537
5557
# turn off RSA if leanpsk or leantls on
5538
5558
if test "$ENABLED_LEANPSK" = "yes" || test "$ENABLED_LEANTLS" = "yes"
0 commit comments