diff --git a/tests/suites/test_suite_pkcs5.function b/tests/suites/test_suite_pkcs5.function index 200bdc37f7..fd4fde1170 100644 --- a/tests/suites/test_suite_pkcs5.function +++ b/tests/suites/test_suite_pkcs5.function @@ -39,14 +39,12 @@ void pbes2_encrypt(int params_tag, data_t *params_hex, data_t *pw, size_t my_out_len = 0; #endif MD_PSA_INIT(); - /* Those parameters are only used when MBEDTLS_CIPHER_PADDING_PKCS7 is enabled */ - (void) outsize; params.tag = params_tag; params.p = params_hex->x; params.len = params_hex->len; - ASSERT_ALLOC(my_out, ref_out->len); + ASSERT_ALLOC(my_out, outsize); if (ref_ret != MBEDTLS_ERR_ASN1_BUF_TOO_SMALL) { my_ret = mbedtls_pkcs5_pbes2(¶ms, MBEDTLS_PKCS5_ENCRYPT, @@ -88,14 +86,12 @@ void pbes2_decrypt(int params_tag, data_t *params_hex, data_t *pw, #endif MD_PSA_INIT(); - /* Those parameters are only used when MBEDTLS_CIPHER_PADDING_PKCS7 is enabled */ - (void) outsize; params.tag = params_tag; params.p = params_hex->x; params.len = params_hex->len; - ASSERT_ALLOC(my_out, ref_out->len); + ASSERT_ALLOC(my_out, outsize); if (ref_ret != MBEDTLS_ERR_ASN1_BUF_TOO_SMALL) { my_ret = mbedtls_pkcs5_pbes2(¶ms, MBEDTLS_PKCS5_DECRYPT,