diff --git a/wolfcrypt/test/test.c b/wolfcrypt/test/test.c index 94aec7f0d..42cef6c20 100644 --- a/wolfcrypt/test/test.c +++ b/wolfcrypt/test/test.c @@ -27897,8 +27897,13 @@ WOLFSSL_TEST_SUBROUTINE wc_test_ret_t hkdf_test(void) L = (int)sizeof(okm1); #ifndef NO_SHA +#if !defined(HAVE_FIPS) || FIPS_VERSION_GE(7,0) ret = wc_HKDF_ex(WC_SHA, ikm1, (word32)sizeof(ikm1), NULL, 0, NULL, 0, - okm1, (word32)L, HEAP_HINT, devId); + okm1, (word32)L, HEAP_HINT, devId); +#else + ret = wc_HKDF(WC_SHA, ikm1, (word32)sizeof(ikm1), NULL, 0, NULL, 0, + okm1, (word32)L); +#endif if (ret != 0) return WC_TEST_RET_ENC_EC(ret); @@ -27908,8 +27913,13 @@ WOLFSSL_TEST_SUBROUTINE wc_test_ret_t hkdf_test(void) #ifndef HAVE_FIPS /* fips can't have key size under 14 bytes, salt is key too */ L = (int)sizeof(okm1); - ret = wc_HKDF_ex(WC_SHA, ikm1, 11, salt1, (word32)sizeof(salt1), - info1, (word32)sizeof(info1), okm1, (word32)L, HEAP_HINT, devId); +#if !defined(HAVE_FIPS) || FIPS_VERSION_GE(7,0) + ret = wc_HKDF_ex(WC_SHA, ikm1, 11, salt1, (word32)sizeof(salt1), info1, + (word32)sizeof(info1), okm1, (word32)L, HEAP_HINT, devId); +#else + ret = wc_HKDF(WC_SHA, ikm1, 11, salt1, (word32)sizeof(salt1), info1, + (word32)sizeof(info1), okm1, (word32)L); +#endif if (ret != 0) return WC_TEST_RET_ENC_EC(ret); @@ -27919,8 +27929,13 @@ WOLFSSL_TEST_SUBROUTINE wc_test_ret_t hkdf_test(void) #endif /* !NO_SHA */ #ifndef NO_SHA256 +#if !defined(HAVE_FIPS) || FIPS_VERSION_GE(7,0) ret = wc_HKDF_ex(WC_SHA256, ikm1, (word32)sizeof(ikm1), NULL, 0, NULL, 0, okm1, (word32)L, HEAP_HINT, devId); +#else + ret = wc_HKDF(WC_SHA256, ikm1, (word32)sizeof(ikm1), NULL, 0, NULL, 0, + okm1, (word32)L); +#endif if (ret != 0) return WC_TEST_RET_ENC_EC(ret); @@ -60810,12 +60825,21 @@ static int myCryptoDevCb(int devIdArg, wc_CryptoInfo* info, void* ctx) else if (info->algo_type == WC_ALGO_TYPE_KDF) { if (info->kdf.type == WC_KDF_TYPE_HKDF) { /* Redirect to software implementation for testing */ + +#if !defined(HAVE_FIPS) || FIPS_VERSION_GE(7,0) ret = wc_HKDF_ex(info->kdf.hkdf.hashType, info->kdf.hkdf.inKey, info->kdf.hkdf.inKeySz, info->kdf.hkdf.salt, info->kdf.hkdf.saltSz, info->kdf.hkdf.info, info->kdf.hkdf.infoSz, info->kdf.hkdf.out, info->kdf.hkdf.outSz, NULL, INVALID_DEVID); +#else + ret = wc_HKDF(info->kdf.hkdf.hashType, + info->kdf.hkdf.inKey, info->kdf.hkdf.inKeySz, + info->kdf.hkdf.salt, info->kdf.hkdf.saltSz, + info->kdf.hkdf.info, info->kdf.hkdf.infoSz, + info->kdf.hkdf.out, info->kdf.hkdf.outSz); +#endif } } #endif /* HAVE_HKDF && !NO_HMAC */