@@ -428,8 +428,8 @@ static void test_wolfTPM2_EccSignVerifyDig(WOLFTPM2_DEV* dev,
428428 word32 rLen , sLen ;
429429 ecc_key wolfKey ;
430430 int curveSize = TPM2_GetCurveSize (curve );
431+ int tpmDevId = -2 ; /* INVALID_DEVID */
431432#ifdef WOLF_CRYPTO_CB
432- int tpmDevId = INVALID_DEVID ;
433433 TpmCryptoDevCtx tpmCtx ;
434434
435435 XMEMSET (& tpmCtx , 0 , sizeof (tpmCtx ));
@@ -553,9 +553,11 @@ static void test_wolfTPM2_EccSignVerifyDig(WOLFTPM2_DEV* dev,
553553 (flags & FLAGS_USE_CRYPTO_CB ) ? "Crypto CB" : "" ,
554554 rc == 0 ? "Passed" : "Failed" );
555555
556+ #ifdef WOLFTPM_CRYPTOCB
556557 if (flags & FLAGS_USE_CRYPTO_CB ) {
557558 wolfTPM2_ClearCryptoDevCb (dev , tpmDevId );
558559 }
560+ #endif
559561}
560562
561563static void test_wolfTPM2_EccSignVerify_All (WOLFTPM2_DEV * dev ,
@@ -884,7 +886,6 @@ static void test_wolfTPM2_KeyBlob(TPM_ALG_ID alg)
884886}
885887
886888#ifdef WOLFTPM_V185
887- #if !defined(WOLFTPM2_NO_WOLFCRYPT ) && defined(HAVE_DILITHIUM )
888889/* Post-Quantum Cryptography (PQC) Unit Tests - TPM 2.0 v185 */
889890
890891/* Test ML-DSA Sign Sequence (Start, Update, Complete) */
@@ -1010,7 +1011,6 @@ static void test_wolfTPM2_MLDSA_VerifyDigestSignature(WOLFTPM2_DEV* dev,
10101011 printf ("Test TPM Wrapper:\tML-DSA Verify Digest:\t%s\n" ,
10111012 rc == 0 ? "Passed" : "Failed" );
10121013}
1013- #endif /* HAVE_DILITHIUM */
10141014
10151015#if !defined(WOLFTPM2_NO_WOLFCRYPT ) && \
10161016 (defined(WOLFSSL_HAVE_MLKEM ) || defined(WOLFSSL_KYBER512 ) || \
@@ -1114,13 +1114,11 @@ static void test_wolfTPM2_PQC(void)
11141114 int rc ;
11151115 WOLFTPM2_DEV dev ;
11161116 WOLFTPM2_KEY storageKey ;
1117- #if !defined(WOLFTPM2_NO_WOLFCRYPT ) && defined(HAVE_DILITHIUM )
11181117 WOLFTPM2_KEY mldsaKey ;
11191118 byte sig [5000 ];
11201119 int sigSz = (int )sizeof (sig );
11211120 byte digest [32 ];
11221121 int digestSz = 32 ;
1123- #endif
11241122#if !defined(WOLFTPM2_NO_WOLFCRYPT ) && \
11251123 (defined(WOLFSSL_HAVE_MLKEM ) || defined(WOLFSSL_KYBER512 ) || \
11261124 defined(WOLFSSL_KYBER768 ) || defined(WOLFSSL_KYBER1024 ))
@@ -1136,7 +1134,6 @@ static void test_wolfTPM2_PQC(void)
11361134 (byte * )gStorageKeyAuth , sizeof (gStorageKeyAuth )- 1 );
11371135 AssertIntEQ (rc , 0 );
11381136
1139- #if !defined(WOLFTPM2_NO_WOLFCRYPT ) && defined(HAVE_DILITHIUM )
11401137 /* Note: ML-DSA key creation would need proper TPM 2.0 v185 support */
11411138 /* For now, tests will gracefully skip if not supported */
11421139 printf ("Testing ML-DSA functions (will skip if not supported by TPM)...\n" );
@@ -1166,7 +1163,6 @@ static void test_wolfTPM2_PQC(void)
11661163 test_wolfTPM2_MLDSA_VerifyDigestSignature (& dev , & mldsaKey ,
11671164 digest , digestSz , sig , sigSz );
11681165 }
1169- #endif
11701166
11711167#if !defined(WOLFTPM2_NO_WOLFCRYPT ) && \
11721168 (defined(WOLFSSL_HAVE_MLKEM ) || defined(WOLFSSL_KYBER512 ) || \
0 commit comments