Merge pull request #10023 from itayzafrir/crypto-compliance-tests-fix

Fix crypto compliance tests
pull/9997/head
Martin Kojtal 2019-03-11 09:20:36 +01:00 committed by GitHub
commit 5c79394756
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 36 additions and 0 deletions

View File

@ -90,12 +90,18 @@ int32_t psa_aead_encrypt_test(security_t caller)
TEST_ASSERT_EQUAL(status, PSA_SUCCESS, TEST_CHECKPOINT_NUM(5));
if (is_buffer_empty(check1[i].nonce, check1[i].nonce_length) == TRUE)
{
nonce = NULL;
check1[i].nonce_length = 0;
}
else
nonce = check1[i].nonce;
if (is_buffer_empty(check1[i].additional_data, check1[i].additional_data_length) == TRUE)
{
additional_data = NULL;
check1[i].additional_data_length = 0;
}
else
additional_data = check1[i].additional_data;
@ -152,12 +158,18 @@ int32_t psa_aead_encrypt_negative_test(security_t caller)
check2[i].key_alg);
if (is_buffer_empty(check2[i].nonce, check2[i].nonce_length) == TRUE)
{
nonce = NULL;
check2[i].nonce_length = 0;
}
else
nonce = check2[i].nonce;
if (is_buffer_empty(check2[i].additional_data, check2[i].additional_data_length) == TRUE)
{
additional_data = NULL;
check2[i].additional_data_length = 0;
}
else
additional_data = check2[i].additional_data;

View File

@ -89,12 +89,18 @@ int32_t psa_aead_decrypt_test(security_t caller)
TEST_ASSERT_EQUAL(status, PSA_SUCCESS, TEST_CHECKPOINT_NUM(5));
if (is_buffer_empty(check1[i].nonce, check1[i].nonce_length) == TRUE)
{
nonce = NULL;
check1[i].nonce_length = 0;
}
else
nonce = check1[i].nonce;
if (is_buffer_empty(check1[i].additional_data, check1[i].additional_data_length) == TRUE)
{
additional_data = NULL;
check1[i].additional_data_length = 0;
}
else
additional_data = check1[i].additional_data;
@ -149,12 +155,18 @@ int32_t psa_aead_decrypt_negative_test(security_t caller)
check2[i].key_alg);
if (is_buffer_empty(check2[i].nonce, check2[i].nonce_length) == TRUE)
{
nonce = NULL;
check2[i].nonce_length = 0;
}
else
nonce = check2[i].nonce;
if (is_buffer_empty(check2[i].additional_data, check2[i].additional_data_length) == TRUE)
{
additional_data = NULL;
check2[i].additional_data_length = 0;
}
else
additional_data = check2[i].additional_data;

View File

@ -128,7 +128,10 @@ int32_t psa_asymmetric_encrypt_test(security_t caller)
TEST_ASSERT_EQUAL(status, PSA_SUCCESS, TEST_CHECKPOINT_NUM(5));
if (is_buffer_empty(check1[i].salt, check1[i].salt_length) == TRUE)
{
salt = NULL;
check1[i].salt_length = 0;
}
else
salt = check1[i].salt;
@ -223,7 +226,10 @@ int32_t psa_asymmetric_encrypt_negative_test(security_t caller)
TEST_ASSERT_EQUAL(status, PSA_SUCCESS, TEST_CHECKPOINT_NUM(6));
if (is_buffer_empty(check1[i].salt, check1[i].salt_length) == TRUE)
{
salt = NULL;
check1[i].salt_length = 0;
}
else
salt = check1[i].salt;

View File

@ -128,7 +128,10 @@ int32_t psa_asymmetric_decrypt_test(security_t caller)
TEST_ASSERT_EQUAL(status, PSA_SUCCESS, TEST_CHECKPOINT_NUM(5));
if (is_buffer_empty(check1[i].salt, check1[i].salt_length) == TRUE)
{
salt = NULL;
check1[i].salt_length = 0;
}
else
salt = check1[i].salt;
@ -209,7 +212,10 @@ int32_t psa_asymmetric_decrypt_negative_test(security_t caller)
TEST_ASSERT_EQUAL(status, PSA_SUCCESS, TEST_CHECKPOINT_NUM(6));
if (is_buffer_empty(check1[i].salt, check1[i].salt_length) == TRUE)
{
salt = NULL;
check1[i].salt_length = 0;
}
else
salt = check1[i].salt;