@@ -442,7 +442,6 @@ int TPM2_Wrapper_TestArgs(void* userCtx, int argc, char *argv[])
442442 wc_FreeRsaKey (& wolfRsaPrivKey );
443443 rc = wolfTPM2_UnloadHandle (& dev , & rsaKey .handle );
444444 if (rc != 0 ) goto exit ;
445- #endif /* !WOLFTPM2_NO_WOLFCRYPT && !NO_RSA */
446445
447446 /* Load raw RSA private key into TPM */
448447 rc = wolfTPM2_LoadRsaPrivateKey (& dev , & storageKey , & rsaKey ,
@@ -455,12 +454,12 @@ int TPM2_Wrapper_TestArgs(void* userCtx, int argc, char *argv[])
455454 (word32 )rsaKey .handle .hndl );
456455 rc = wolfTPM2_UnloadHandle (& dev , & rsaKey .handle );
457456 if (rc != 0 ) goto exit ;
457+ #endif /* !WOLFTPM2_NO_WOLFCRYPT && !NO_RSA */
458458
459459 /* Close TPM session based on RSA storage key */
460460 wolfTPM2_UnloadHandle (& dev , & tpmSession .handle );
461461 wolfTPM2_SetAuthSession (& dev , 1 , NULL , 0 ); /* clear auth session */
462462
463-
464463 /*------------------------------------------------------------------------*/
465464 /* ECC TESTS */
466465 /*------------------------------------------------------------------------*/
@@ -662,7 +661,6 @@ int TPM2_Wrapper_TestArgs(void* userCtx, int argc, char *argv[])
662661 wc_ecc_free (& wolfEccPrivKey );
663662 rc = wolfTPM2_UnloadHandle (& dev , & eccKey .handle );
664663 if (rc != 0 ) goto exit ;
665- #endif /* !WOLFTPM2_NO_WOLFCRYPT && HAVE_ECC */
666664
667665 /* Load raw ECC private key into TPM */
668666 rc = wolfTPM2_LoadEccPrivateKey (& dev , & storageKey , & eccKey , TPM_ECC_NIST_P256 ,
@@ -675,6 +673,7 @@ int TPM2_Wrapper_TestArgs(void* userCtx, int argc, char *argv[])
675673 (word32 )eccKey .handle .hndl );
676674 rc = wolfTPM2_UnloadHandle (& dev , & eccKey .handle );
677675 if (rc != 0 ) goto exit ;
676+ #endif /* !WOLFTPM2_NO_WOLFCRYPT && HAVE_ECC */
678677
679678#if 0 /* disabled until ECC Encrypted salt is added */
680679 /* Close TPM session based on ECC storage key */
@@ -841,6 +840,7 @@ int TPM2_Wrapper_TestArgs(void* userCtx, int argc, char *argv[])
841840 /*------------------------------------------------------------------------*/
842841 /* ENCRYPT/DECRYPT TESTS */
843842 /*------------------------------------------------------------------------*/
843+ #ifndef WOLFTPM2_NO_WOLFCRYPT
844844 rc = wolfTPM2_LoadSymmetricKey (& dev , & aesKey , TEST_AES_MODE ,
845845 TEST_AES_KEY , (word32 )sizeof (TEST_AES_KEY ));
846846 if (rc != 0 ) goto exit ;
@@ -878,7 +878,9 @@ int TPM2_Wrapper_TestArgs(void* userCtx, int argc, char *argv[])
878878 goto exit ;
879879 }
880880 if (rc != 0 ) goto exit ;
881-
881+ #else
882+ (void )aesIv ;
883+ #endif /* !WOLFTPM2_NO_WOLFCRYPT */
882884
883885 rc = wolfTPM2_GetKeyTemplate_Symmetric (& publicTemplate , 128 , TEST_AES_MODE ,
884886 YES , YES );
0 commit comments