@@ -4454,18 +4454,20 @@ WOLFTPM_API int wolfTPM2_FirmwareUpgradeHash(WOLFTPM2_DEV* dev,
44544454 uint8_t * manifest , uint32_t manifest_sz ,
44554455 wolfTPM2FwDataCb cb , void * cb_ctx );
44564456
4457- #if !defined( WOLFTPM2_NO_WOLFCRYPT ) && defined( WOLFSSL_SHA384 )
4457+ #ifndef WOLFTPM2_NO_WOLFCRYPT
44584458/*!
44594459 \ingroup wolfTPM2_Wrappers
44604460 \brief Perform TPM firmware upgrade
44614461 \note Upgrades TPM firmware using provided manifest and data callback
4462+ \note Requires WOLFSSL_SHA384; returns NOT_COMPILED_IN otherwise
44624463 \note For ST33KTPM: LMS vs non-LMS format is auto-detected from manifest size:
44634464 - 177 bytes: Non-LMS format (firmware < 512, e.g., 9.257)
44644465 - 2697 bytes: LMS format (firmware >= 512, e.g., 9.512)
44654466
44664467 \return TPM_RC_SUCCESS: successful
44674468 \return TPM_RC_FAILURE: generic failure (check TPM IO and TPM return code)
44684469 \return BAD_FUNC_ARG: check the provided arguments
4470+ \return NOT_COMPILED_IN: wolfSSL not built with WOLFSSL_SHA384
44694471
44704472 \param dev pointer to a TPM2_DEV struct
44714473 \param manifest pointer to firmware manifest data
@@ -4479,7 +4481,7 @@ WOLFTPM_API int wolfTPM2_FirmwareUpgradeHash(WOLFTPM2_DEV* dev,
44794481WOLFTPM_API int wolfTPM2_FirmwareUpgrade (WOLFTPM2_DEV * dev ,
44804482 uint8_t * manifest , uint32_t manifest_sz ,
44814483 wolfTPM2FwDataCb cb , void * cb_ctx );
4482- #endif /* !WOLFTPM2_NO_WOLFCRYPT && WOLFSSL_SHA384 */
4484+ #endif /* !WOLFTPM2_NO_WOLFCRYPT */
44834485
44844486/*!
44854487 \ingroup wolfTPM2_Wrappers
0 commit comments