Revert to original guarding for mbedtls_internal_aes_encrypt/decrypt

Signed-off-by: Thomas Daubney <thomas.daubney@arm.com>
This commit is contained in:
Thomas Daubney 2024-07-30 10:17:01 +01:00
parent 8ac215e482
commit d4c886e57b

View File

@ -841,6 +841,7 @@ int mbedtls_aes_xts_setkey_dec(mbedtls_aes_xts_context *ctx,
AES_RT3(MBEDTLS_BYTE_3(Y0)); \ AES_RT3(MBEDTLS_BYTE_3(Y0)); \
} while (0) } while (0)
#if !defined(MBEDTLS_AES_USE_HARDWARE_ONLY)
/* /*
* AES-ECB block encryption * AES-ECB block encryption
*/ */
@ -964,7 +965,7 @@ static int mbedtls_internal_aes_decrypt(mbedtls_aes_context *ctx,
return 0; return 0;
} }
#endif /* !MBEDTLS_BLOCK_CIPHER_NO_DECRYPT */ #endif /* !MBEDTLS_BLOCK_CIPHER_NO_DECRYPT */
#endif /* !MBEDTLS_AES_USE_HARDWARE_ONLY */
/* /*
* Our intrinsics-based implementation of AESNI requires the round keys to be * Our intrinsics-based implementation of AESNI requires the round keys to be
* aligned on a 16-byte boundary. We take care of this before creating them, * aligned on a 16-byte boundary. We take care of this before creating them,