forked from wolfSSL/wolfssl
resolving build issues for FIPSv2 OE2 with --enable-opensslextra
This commit is contained in:
@ -37,7 +37,7 @@
|
|||||||
|
|
||||||
#if !defined(HAVE_PKCS7) && \
|
#if !defined(HAVE_PKCS7) && \
|
||||||
((defined(HAVE_FIPS) && defined(HAVE_FIPS_VERSION) && \
|
((defined(HAVE_FIPS) && defined(HAVE_FIPS_VERSION) && \
|
||||||
(HAVE_FIPS_VERSION >= 2)) || defined(HAVE_SELFTEST))
|
(HAVE_FIPS_VERSION > 2)) || defined(HAVE_SELFTEST))
|
||||||
enum {
|
enum {
|
||||||
/* In the event of fips cert 3389 or CAVP selftest build, these enums are
|
/* In the event of fips cert 3389 or CAVP selftest build, these enums are
|
||||||
* not in aes.h for use with evp so enumerate it here outside the fips
|
* not in aes.h for use with evp so enumerate it here outside the fips
|
||||||
@ -45,6 +45,10 @@ enum {
|
|||||||
GCM_NONCE_MID_SZ = 12, /* The usual default nonce size for AES-GCM. */
|
GCM_NONCE_MID_SZ = 12, /* The usual default nonce size for AES-GCM. */
|
||||||
CCM_NONCE_MIN_SZ = 7,
|
CCM_NONCE_MIN_SZ = 7,
|
||||||
};
|
};
|
||||||
|
#elif !defined(HAVE_PKCS7) && \
|
||||||
|
((defined(HAVE_FIPS) && defined(HAVE_FIPS_VERSION) && \
|
||||||
|
(HAVE_FIPS_VERSION == 2)) || defined(HAVE_SELFTEST))
|
||||||
|
#include <wolfssl/wolfcrypt/aes.h>
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
|
||||||
@ -4331,7 +4335,7 @@ int wolfSSL_EVP_MD_type(const WOLFSSL_EVP_MD *md)
|
|||||||
#endif /* WOLFSSL_AES_256 */
|
#endif /* WOLFSSL_AES_256 */
|
||||||
#endif /* HAVE_AES_CBC */
|
#endif /* HAVE_AES_CBC */
|
||||||
#if (!defined(HAVE_FIPS) && !defined(HAVE_SELFTEST)) || \
|
#if (!defined(HAVE_FIPS) && !defined(HAVE_SELFTEST)) || \
|
||||||
(defined(HAVE_FIPS_VERSION) && (HAVE_FIPS_VERSION >= 2))
|
(defined(HAVE_FIPS_VERSION) && (HAVE_FIPS_VERSION > 2))
|
||||||
#ifdef HAVE_AESGCM
|
#ifdef HAVE_AESGCM
|
||||||
#ifdef WOLFSSL_AES_128
|
#ifdef WOLFSSL_AES_128
|
||||||
if (ctx->cipherType == AES_128_GCM_TYPE ||
|
if (ctx->cipherType == AES_128_GCM_TYPE ||
|
||||||
@ -4406,7 +4410,7 @@ int wolfSSL_EVP_MD_type(const WOLFSSL_EVP_MD *md)
|
|||||||
}
|
}
|
||||||
#endif /* WOLFSSL_AES_256 */
|
#endif /* WOLFSSL_AES_256 */
|
||||||
#endif /* HAVE_AESGCM */
|
#endif /* HAVE_AESGCM */
|
||||||
#endif /*!HAVE_FIPS && !HAVE_SELFTEST ||(HAVE_FIPS_VERSION && HAVE_FIPS_VERSION >= 2)*/
|
#endif /*!HAVE_FIPS && !HAVE_SELFTEST ||(HAVE_FIPS_VERSION && HAVE_FIPS_VERSION > 2)*/
|
||||||
#ifdef WOLFSSL_AES_COUNTER
|
#ifdef WOLFSSL_AES_COUNTER
|
||||||
#ifdef WOLFSSL_AES_128
|
#ifdef WOLFSSL_AES_128
|
||||||
if (ctx->cipherType == AES_128_CTR_TYPE ||
|
if (ctx->cipherType == AES_128_CTR_TYPE ||
|
||||||
@ -6311,6 +6315,8 @@ int wolfSSL_EVP_CIPHER_CTX_iv_length(const WOLFSSL_EVP_CIPHER_CTX* ctx)
|
|||||||
WOLFSSL_MSG("AES CBC");
|
WOLFSSL_MSG("AES CBC");
|
||||||
return AES_BLOCK_SIZE;
|
return AES_BLOCK_SIZE;
|
||||||
#endif
|
#endif
|
||||||
|
#if (!defined(HAVE_FIPS) && !defined(HAVE_SELFTEST)) || \
|
||||||
|
(defined(HAVE_FIPS_VERSION) && (HAVE_FIPS_VERSION > 2))
|
||||||
#ifdef HAVE_AESGCM
|
#ifdef HAVE_AESGCM
|
||||||
case AES_128_GCM_TYPE :
|
case AES_128_GCM_TYPE :
|
||||||
case AES_192_GCM_TYPE :
|
case AES_192_GCM_TYPE :
|
||||||
@ -6318,6 +6324,7 @@ int wolfSSL_EVP_CIPHER_CTX_iv_length(const WOLFSSL_EVP_CIPHER_CTX* ctx)
|
|||||||
WOLFSSL_MSG("AES GCM");
|
WOLFSSL_MSG("AES GCM");
|
||||||
return GCM_NONCE_MID_SZ;
|
return GCM_NONCE_MID_SZ;
|
||||||
#endif
|
#endif
|
||||||
|
#endif /* (HAVE_FIPS && !HAVE_SELFTEST) || HAVE_FIPS_VERSION > 2 */
|
||||||
#ifdef WOLFSSL_AES_COUNTER
|
#ifdef WOLFSSL_AES_COUNTER
|
||||||
case AES_128_CTR_TYPE :
|
case AES_128_CTR_TYPE :
|
||||||
case AES_192_CTR_TYPE :
|
case AES_192_CTR_TYPE :
|
||||||
@ -6408,6 +6415,8 @@ int wolfSSL_EVP_CIPHER_iv_length(const WOLFSSL_EVP_CIPHER* cipher)
|
|||||||
return AES_BLOCK_SIZE;
|
return AES_BLOCK_SIZE;
|
||||||
#endif
|
#endif
|
||||||
#endif /* HAVE_AES_CBC */
|
#endif /* HAVE_AES_CBC */
|
||||||
|
#if (!defined(HAVE_FIPS) && !defined(HAVE_SELFTEST)) || \
|
||||||
|
(defined(HAVE_FIPS_VERSION) && (HAVE_FIPS_VERSION > 2))
|
||||||
#ifdef HAVE_AESGCM
|
#ifdef HAVE_AESGCM
|
||||||
#ifdef WOLFSSL_AES_128
|
#ifdef WOLFSSL_AES_128
|
||||||
if (EVP_AES_128_GCM && XSTRNCMP(name, EVP_AES_128_GCM, XSTRLEN(EVP_AES_128_GCM)) == 0)
|
if (EVP_AES_128_GCM && XSTRNCMP(name, EVP_AES_128_GCM, XSTRLEN(EVP_AES_128_GCM)) == 0)
|
||||||
@ -6422,6 +6431,7 @@ int wolfSSL_EVP_CIPHER_iv_length(const WOLFSSL_EVP_CIPHER* cipher)
|
|||||||
return GCM_NONCE_MID_SZ;
|
return GCM_NONCE_MID_SZ;
|
||||||
#endif
|
#endif
|
||||||
#endif /* HAVE_AESGCM */
|
#endif /* HAVE_AESGCM */
|
||||||
|
#endif /* (HAVE_FIPS && !HAVE_SELFTEST) || HAVE_FIPS_VERSION > 2 */
|
||||||
#ifdef WOLFSSL_AES_COUNTER
|
#ifdef WOLFSSL_AES_COUNTER
|
||||||
#ifdef WOLFSSL_AES_128
|
#ifdef WOLFSSL_AES_128
|
||||||
if (EVP_AES_128_CTR && XSTRNCMP(name, EVP_AES_128_CTR, XSTRLEN(EVP_AES_128_CTR)) == 0)
|
if (EVP_AES_128_CTR && XSTRNCMP(name, EVP_AES_128_CTR, XSTRLEN(EVP_AES_128_CTR)) == 0)
|
||||||
|
Reference in New Issue
Block a user