diff --git a/configure.ac b/configure.ac index 67cdd3b69..df0594bee 100644 --- a/configure.ac +++ b/configure.ac @@ -248,7 +248,13 @@ AS_CASE([$ENABLED_FIPS], HAVE_FIPS_VERSION=2 ENABLED_FIPS="yes" ], - [v5|v5-RC9|v5-REL],[ + [v5|v5-RC10],[ + FIPS_VERSION="v5-RC10" + HAVE_FIPS_VERSION=5 + HAVE_FIPS_VERSION_MINOR=2 + ENABLED_FIPS="yes" + ], + [v5-RC9|v5-REL],[ FIPS_VERSION="v5-RC9" HAVE_FIPS_VERSION=5 HAVE_FIPS_VERSION_MINOR=1 @@ -3444,6 +3450,11 @@ AS_CASE([$FIPS_VERSION], AM_CFLAGS="$AM_CFLAGS -DWOLFSSL_VALIDATE_FFC_IMPORT -DHAVE_FFDHE_Q" AM_CFLAGS="$AM_CFLAGS -DHAVE_FFDHE_3072 -DHAVE_FFDHE_4096 -DHAVE_FFDHE_6144 -DHAVE_FFDHE_8192" DEFAULT_MAX_CLASSIC_ASYM_KEY_BITS=8192 + if test $HAVE_FIPS_VERSION_MINOR -ge 2; then + if test "x$ENABLED_AESOFB" = "xno"; then + ENABLED_AESOFB="yes"; AM_CFLAGS="$AM_CFLAGS -DWOLFSSL_AES_OFB" + fi + fi ], ["v3"],[ # FIPS 140-2 Ready AM_CFLAGS="$AM_CFLAGS -DHAVE_FIPS -DHAVE_FIPS_VERSION=$HAVE_FIPS_VERSION -DHAVE_FIPS_VERSION_MINOR=$HAVE_FIPS_VERSION_MINOR -DWOLFSSL_KEY_GEN -DWOLFSSL_SHA224 -DWOLFSSL_AES_DIRECT -DHAVE_AES_ECB -DHAVE_ECC_CDH -DWC_RSA_NO_PADDING -DWOLFSSL_VALIDATE_FFC_IMPORT -DHAVE_FFDHE_Q -DWOLFSSL_ECDSA_SET_K" diff --git a/wolfssl/wolfcrypt/types.h b/wolfssl/wolfcrypt/types.h index 964aa2c65..957b43cb6 100644 --- a/wolfssl/wolfcrypt/types.h +++ b/wolfssl/wolfcrypt/types.h @@ -1271,7 +1271,7 @@ decouple library dependencies with standard string, memory and so on. #endif - #if FIPS_VERSION_EQ(5,1) + #if FIPS_VERSION_GE(5,1) #define WC_SPKRE_F(x,y) wolfCrypt_SetPrivateKeyReadEnable_fips((x),(y)) #define PRIVATE_KEY_LOCK() WC_SPKRE_F(0,WC_KEYTYPE_ALL) #define PRIVATE_KEY_UNLOCK() WC_SPKRE_F(1,WC_KEYTYPE_ALL)