@@ -534,8 +534,7 @@ int wolfTPM2_Cleanup(WOLFTPM2_DEV* dev)
534534#endif
535535}
536536
537- #ifndef WOLFTPM2_NO_WOLFCRYPT
538- #ifndef NO_RSA
537+ #if !defined(WOLFTPM2_NO_WOLFCRYPT ) && !defined(NO_RSA )
539538/* returns both the plaintext and encrypted salt, based on the salt key bPublic. */
540539int wolfTPM2_RSA_Salt (WOLFTPM2_DEV * dev , WOLFTPM2_KEY * tpmKey ,
541540 TPM2B_DIGEST * salt , TPM2B_ENCRYPTED_SECRET * encSalt , TPMT_PUBLIC * publicArea )
@@ -601,7 +600,7 @@ int wolfTPM2_RSA_Salt(WOLFTPM2_DEV* dev, WOLFTPM2_KEY* tpmKey,
601600
602601 return 0 ;
603602}
604- #endif /* !NO_RSA */
603+ #endif /* !WOLFTPM2_NO_WOLFCRYPT && ! NO_RSA */
605604
606605int wolfTPM2_EncryptSalt (WOLFTPM2_DEV * dev , WOLFTPM2_KEY * tpmKey ,
607606 StartAuthSession_In * in , TPM2B_AUTH * bindAuth , TPM2B_DIGEST * salt )
@@ -613,6 +612,7 @@ int wolfTPM2_EncryptSalt(WOLFTPM2_DEV* dev, WOLFTPM2_KEY* tpmKey,
613612 return TPM_RC_SUCCESS ;
614613 }
615614
615+ #ifndef WOLFTPM2_NO_WOLFCRYPT
616616 /* generate a salt */
617617 salt -> size = TPM2_GetHashDigestSize (in -> authHash );
618618 if (salt -> size <= 0 ) {
@@ -645,12 +645,17 @@ int wolfTPM2_EncryptSalt(WOLFTPM2_DEV* dev, WOLFTPM2_KEY* tpmKey,
645645 rc = NOT_COMPILED_IN ;
646646 break ;
647647 }
648+ #else
649+ (void )dev ;
650+ (void )in ;
651+ (void )salt ;
652+ rc = NOT_COMPILED_IN ;
653+ #endif /* !WOLFTPM2_NO_WOLFCRYPT */
648654
649655 (void )bindAuth ; /* TODO: Add bind support */
650656
651657 return rc ;
652658}
653- #endif /* !WOLFTPM2_NO_WOLFCRYPT */
654659
655660int wolfTPM2_StartSession (WOLFTPM2_DEV * dev , WOLFTPM2_SESSION * session ,
656661 WOLFTPM2_KEY * tpmKey , WOLFTPM2_HANDLE * bind , TPM_SE sesType ,
@@ -693,15 +698,12 @@ int wolfTPM2_StartSession(WOLFTPM2_DEV* dev, WOLFTPM2_SESSION* session,
693698 }
694699
695700 authSesIn .sessionType = sesType ;
696- #ifdef WOLFSSL_AES_CFB
697701 if (encDecAlg == TPM_ALG_CFB ) {
698702 authSesIn .symmetric .algorithm = TPM_ALG_AES ;
699703 authSesIn .symmetric .keyBits .aes = 128 ;
700704 authSesIn .symmetric .mode .aes = TPM_ALG_CFB ;
701705 }
702- else
703- #endif
704- if (encDecAlg == TPM_ALG_XOR ) {
706+ else if (encDecAlg == TPM_ALG_XOR ) {
705707 authSesIn .symmetric .algorithm = TPM_ALG_XOR ;
706708 authSesIn .symmetric .keyBits .xorr = TPM_ALG_SHA256 ;
707709 authSesIn .symmetric .mode .sym = TPM_ALG_NULL ;
@@ -719,16 +721,15 @@ int wolfTPM2_StartSession(WOLFTPM2_DEV* dev, WOLFTPM2_SESSION* session,
719721 return rc ;
720722 }
721723
722- #ifndef WOLFTPM2_NO_WOLFCRYPT
723724 /* Generate and Encrypt salt using "SECRET" */
724725 rc = wolfTPM2_EncryptSalt (dev , tpmKey , & authSesIn , bindAuth , & session -> salt );
725726 if (rc != 0 ) {
726727 #ifdef DEBUG_WOLFTPM
727728 printf ("Building encrypted salt failed %d: %s!\n" , rc ,
728729 wolfTPM2_GetRCString (rc ));
729730 #endif
731+ return rc ;
730732 }
731- #endif
732733
733734 rc = TPM2_StartAuthSession (& authSesIn , & authSesOut );
734735 if (rc != TPM_RC_SUCCESS ) {
0 commit comments