diff --git a/src/ssl.c b/src/ssl.c index 8bc7c98b5..83df642b8 100644 --- a/src/ssl.c +++ b/src/ssl.c @@ -13805,6 +13805,7 @@ int wolfSSL_EVP_MD_type(const WOLFSSL_EVP_MD *md) case EVP_CTRL_SET_KEY_LENGTH: ret = wolfSSL_EVP_CIPHER_CTX_set_key_length(ctx, arg); break; +#ifdef HAVE_AESGCM case EVP_CTRL_GCM_SET_IVLEN: if(arg <= 0 || arg > 16) return WOLFSSL_FAILURE; @@ -13826,6 +13827,7 @@ int wolfSSL_EVP_MD_type(const WOLFSSL_EVP_MD *md) XMEMCPY(ptr, ctx->authTag, arg); ret = WOLFSSL_SUCCESS; break; +#endif /* HAVE_AESGCM */ default: WOLFSSL_MSG("EVP_CIPHER_CTX_ctrl operation not yet handled"); ret = WOLFSSL_FAILURE; diff --git a/wolfcrypt/src/evp.c b/wolfcrypt/src/evp.c index e751196ef..faab043ba 100644 --- a/wolfcrypt/src/evp.c +++ b/wolfcrypt/src/evp.c @@ -356,6 +356,7 @@ static int evpCipherBlock(WOLFSSL_EVP_CIPHER_CTX *ctx, return WOLFSSL_SUCCESS; /* success */ } +#if defined(HAVE_AESGCM) static int wolfSSL_EVP_CipherUpdate_GCM(WOLFSSL_EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, const unsigned char *in, int inl) @@ -366,6 +367,8 @@ static int wolfSSL_EVP_CipherUpdate_GCM(WOLFSSL_EVP_CIPHER_CTX *ctx, *outl = inl; return WOLFSSL_SUCCESS; } +#endif + WOLFSSL_API int wolfSSL_EVP_CipherUpdate(WOLFSSL_EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, const unsigned char *in, int inl) diff --git a/wolfssl/openssl/evp.h b/wolfssl/openssl/evp.h index 62c8d24fa..0b4c5e9c7 100644 --- a/wolfssl/openssl/evp.h +++ b/wolfssl/openssl/evp.h @@ -653,8 +653,6 @@ typedef WOLFSSL_EVP_CIPHER_CTX EVP_CIPHER_CTX; #define EVP_CTRL_GCM_SET_IVLEN EVP_CTRL_AEAD_SET_IVLEN #define EVP_CTRL_GCM_GET_TAG EVP_CTRL_AEAD_GET_TAG #define EVP_CTRL_GCM_SET_TAG EVP_CTRL_AEAD_SET_TAG -#define EVP_CTRL_GCM_SET_IV_FIXED EVP_CTRL_AEAD_SET_IV_FIXED -#define EVP_CTRL_GCM_IV_GEN 0x13 #ifndef EVP_MAX_MD_SIZE #define EVP_MAX_MD_SIZE 64 /* sha512 */