@@ -24118,7 +24118,7 @@ static wc_test_ret_t rsa_sig_test(RsaKey* key, word32 keyLen, int modLen, WC_RNG
2411824118 if (ret != WC_NO_ERR_TRACE(SIG_TYPE_E))
2411924119 ERROR_OUT(WC_TEST_RET_ENC_EC(ret), exit_rsa_sig);
2412024120#endif
24121- #if defined(WOLF_CRYPTO_CB_ONLY_RSA)
24121+ #if defined(WOLF_CRYPTO_CB_ONLY_RSA) && !defined(WOLFSSL_SWDEV)
2412224122 ret = 0;
2412324123 goto exit_rsa_sig;
2412424124#endif
@@ -24601,7 +24601,7 @@ static wc_test_ret_t rsa_decode_test(RsaKey* keyPub)
2460124601 !defined(WC_NO_RNG)
2460224602/* Need to create known good signatures to test with this. */
2460324603#if !defined(WOLFSSL_RSA_VERIFY_ONLY) && !defined(WOLFSSL_RSA_PUBLIC_ONLY) && \
24604- !defined(WOLF_CRYPTO_CB_ONLY_RSA)
24604+ ( !defined(WOLF_CRYPTO_CB_ONLY_RSA) || defined(WOLFSSL_SWDEV) )
2460524605static wc_test_ret_t rsa_pss_test(WC_RNG* rng, RsaKey* key)
2460624606{
2460724607 byte digest[WC_MAX_DIGEST_SIZE];
@@ -25983,7 +25983,7 @@ static wc_test_ret_t rsa_keygen_test(WC_RNG* rng)
2598325983 int keySz = 2048;
2598425984#endif
2598525985
25986- #ifdef WOLF_CRYPTO_CB_ONLY_RSA
25986+ #if defined( WOLF_CRYPTO_CB_ONLY_RSA) && !defined(WOLFSSL_SWDEV)
2598725987 if (devId == INVALID_DEVID) {
2598825988 /* must call keygen with devId */
2598925989 return 0;
@@ -26086,7 +26086,7 @@ static wc_test_ret_t rsa_keygen_test(WC_RNG* rng)
2608626086#if !defined(WC_NO_RSA_OAEP) && !defined(WC_NO_RNG) && \
2608726087 (!defined(HAVE_FIPS) || \
2608826088 (defined(HAVE_FIPS_VERSION) && (HAVE_FIPS_VERSION >= 2))) \
26089- && !defined(WOLF_CRYPTO_CB_ONLY_RSA)
26089+ && ( !defined(WOLF_CRYPTO_CB_ONLY_RSA) || defined(WOLFSSL_SWDEV) )
2609026090static wc_test_ret_t rsa_oaep_padding_test(RsaKey* key, WC_RNG* rng)
2609126091{
2609226092 wc_test_ret_t ret = 0;
@@ -26623,7 +26623,7 @@ WOLFSSL_TEST_SUBROUTINE wc_test_ret_t rsa_test(void)
2662326623#endif
2662426624
2662526625#if !defined(WOLFSSL_RSA_VERIFY_ONLY) && !defined(WOLFSSL_RSA_PUBLIC_ONLY) && \
26626- !defined(WC_NO_RNG) && !defined(WOLF_CRYPTO_CB_ONLY_RSA)
26626+ !defined(WC_NO_RNG) && ( !defined(WOLF_CRYPTO_CB_ONLY_RSA) || defined(WOLFSSL_SWDEV) )
2662726627 /* Reload the key so the public-encrypt below is the first operation
2662826628 * against it. Exercises backends that distinguish public-only material
2662926629 * from full-keypair bindings: a public-encrypt on a freshly-loaded key
@@ -26751,7 +26751,7 @@ WOLFSSL_TEST_SUBROUTINE wc_test_ret_t rsa_test(void)
2675126751
2675226752#if !defined(WC_NO_RNG) && !defined(WC_NO_RSA_OAEP) && \
2675326753 !defined(WOLFSSL_RSA_VERIFY_ONLY) && defined(WOLFSSL_PUBLIC_MP) && \
26754- !defined(WOLF_CRYPTO_CB_ONLY_RSA)
26754+ ( !defined(WOLF_CRYPTO_CB_ONLY_RSA) || defined(WOLFSSL_SWDEV) )
2675526755 idx = (word32)ret;
2675626756 XMEMSET(plain, 0, plainSz);
2675726757 do {
@@ -26798,7 +26798,7 @@ WOLFSSL_TEST_SUBROUTINE wc_test_ret_t rsa_test(void)
2679826798 #if !defined(WC_NO_RSA_OAEP) && !defined(WC_NO_RNG)
2679926799 #if (!defined(HAVE_FIPS) || \
2680026800 (defined(HAVE_FIPS_VERSION) && (HAVE_FIPS_VERSION >= 2))) \
26801- && !defined(WOLF_CRYPTO_CB_ONLY_RSA)
26801+ && ( !defined(WOLF_CRYPTO_CB_ONLY_RSA) || defined(WOLFSSL_SWDEV) )
2680226802 ret = rsa_oaep_padding_test(key, &rng);
2680326803 if (ret != 0)
2680426804 goto exit_rsa;
@@ -27064,7 +27064,7 @@ WOLFSSL_TEST_SUBROUTINE wc_test_ret_t rsa_test(void)
2706427064 !defined(WC_NO_RNG)
2706527065/* Need to create known good signatures to test with this. */
2706627066#if !defined(WOLFSSL_RSA_VERIFY_ONLY) && !defined(WOLFSSL_RSA_PUBLIC_ONLY) && \
27067- !defined(WOLF_CRYPTO_CB_ONLY_RSA)
27067+ ( !defined(WOLF_CRYPTO_CB_ONLY_RSA) || defined(WOLFSSL_SWDEV) )
2706827068 ret = rsa_pss_test(&rng, key);
2706927069 if (ret != 0)
2707027070 goto exit_rsa;
0 commit comments