diff --git a/tests/api.c b/tests/api.c index 19389f6fb..9cebfe6a7 100644 --- a/tests/api.c +++ b/tests/api.c @@ -11341,7 +11341,7 @@ static int test_wc_RsaPublicKeyDecodeRaw (void) /* In FIPS builds, wc_MakeRsaKey() will return an error if it cannot find * a probable prime in 5*(modLen/2) attempts. In non-FIPS builds, it keeps * trying until it gets a probable prime. */ - #ifdef WOLFSSL_FIPS + #ifdef HAVE_FIPS static int MakeRsaKeyRetry(RsaKey* key, int size, long e, WC_RNG* rng) { int ret; @@ -20664,7 +20664,7 @@ static void test_wolfSSL_PKCS8_Compat(void) static void test_wolfSSL_PKCS8_d2i(void) { -#ifndef WOLFSSL_FIPS +#ifndef HAVE_FIPS /* This test ends up using HMAC as a part of PBKDF2, and HMAC * requires a 12 byte password in FIPS mode. This test ends up * trying to use an 8 byte password. */ @@ -20821,7 +20821,7 @@ static void test_wolfSSL_PKCS8_d2i(void) printf(resultFmt, passed); #endif -#endif /* WOLFSSL_FIPS */ +#endif /* HAVE_FIPS */ } static void test_wolfSSL_ERR_put_error(void) diff --git a/wolfcrypt/src/rsa.c b/wolfcrypt/src/rsa.c index ecb8a7294..78b69f6ff 100644 --- a/wolfcrypt/src/rsa.c +++ b/wolfcrypt/src/rsa.c @@ -3654,7 +3654,7 @@ int wc_MakeRsaKey(RsaKey* key, int size, long e, WC_RNG* rng) if (err == MP_OKAY) err = _CheckProbablePrime(&p, NULL, &tmp3, size, &isPrime, rng); -#ifdef WOLFSSL_FIPS +#ifdef HAVE_FIPS i++; #else /* Keep the old retry behavior in non-FIPS build. */ @@ -3689,7 +3689,7 @@ int wc_MakeRsaKey(RsaKey* key, int size, long e, WC_RNG* rng) if (err == MP_OKAY) err = _CheckProbablePrime(&p, &q, &tmp3, size, &isPrime, rng); -#ifdef WOLFSSL_FIPS +#ifdef HAVE_FIPS i++; #else /* Keep the old retry behavior in non-FIPS build. */