mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-04-16 08:42:50 +00:00
add depends on for capacity tests and fix code style
Signed-off-by: Kusumit Ghoderao <Kusumit.Ghoderao@silabs.com>
This commit is contained in:
parent
f4351c1a61
commit
7d4db631cf
@ -6076,7 +6076,7 @@ static psa_status_t psa_key_derivation_set_maximum_capacity(
|
|||||||
#if defined(PSA_WANT_ALG_PBKDF2_AES_CMAC_PRF_128)
|
#if defined(PSA_WANT_ALG_PBKDF2_AES_CMAC_PRF_128)
|
||||||
if (kdf_alg == PSA_ALG_PBKDF2_AES_CMAC_PRF_128) {
|
if (kdf_alg == PSA_ALG_PBKDF2_AES_CMAC_PRF_128) {
|
||||||
#if (SIZE_MAX > UINT32_MAX)
|
#if (SIZE_MAX > UINT32_MAX)
|
||||||
operation->capacity = UINT32_MAX * (size_t)PSA_MAC_LENGTH(
|
operation->capacity = UINT32_MAX * (size_t) PSA_MAC_LENGTH(
|
||||||
PSA_KEY_TYPE_AES,
|
PSA_KEY_TYPE_AES,
|
||||||
128U,
|
128U,
|
||||||
PSA_ALG_CMAC);
|
PSA_ALG_CMAC);
|
||||||
|
@ -6328,28 +6328,24 @@ PSA key derivation: TLS 1.2 ECJPAKE-to-PMS, request too much capacity
|
|||||||
depends_on:PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS
|
depends_on:PSA_WANT_ALG_TLS12_ECJPAKE_TO_PMS
|
||||||
derive_set_capacity:PSA_ALG_TLS12_ECJPAKE_TO_PMS:PSA_HASH_LENGTH(PSA_ALG_SHA_256) + 1:PSA_ERROR_INVALID_ARGUMENT
|
derive_set_capacity:PSA_ALG_TLS12_ECJPAKE_TO_PMS:PSA_HASH_LENGTH(PSA_ALG_SHA_256) + 1:PSA_ERROR_INVALID_ARGUMENT
|
||||||
|
|
||||||
# This test case will work correctly on 64-bit machines
|
#PSA key derivation: PBKDF2-HMAC-SHA256, request too much capacity
|
||||||
PSA key derivation: PBKDF2-HMAC-SHA256, request too much capacity
|
#depends_on:PSA_WANT_ALG_PBKDF2_HMAC:PSA_WANT_ALG_SHA_256:SIZE_MAX>=0xffffffffffffffff
|
||||||
depends_on:PSA_WANT_ALG_PBKDF2_HMAC:PSA_WANT_ALG_SHA_256
|
#derive_set_capacity:PSA_ALG_PBKDF2_HMAC(PSA_ALG_SHA_256):4294967295UL * PSA_HASH_LENGTH(PSA_ALG_SHA_256) + 1:PSA_ERROR_INVALID_ARGUMENT
|
||||||
derive_set_capacity:PSA_ALG_PBKDF2_HMAC(PSA_ALG_SHA_256):4294967295UL * PSA_HASH_LENGTH(PSA_ALG_SHA_256) + 1:PSA_ERROR_INVALID_ARGUMENT
|
|
||||||
|
|
||||||
# This test case will work correctly on 64-bit machines
|
#PSA key derivation: PBKDF2-AES-CMAC-PRF-128, request too much capacity
|
||||||
PSA key derivation: PBKDF2-AES-CMAC-PRF-128, request too much capacity
|
#depends_on:PSA_WANT_ALG_PBKDF2_AES_CMAC_PRF_128:PSA_WANT_ALG_CMAC:PSA_WANT_KEY_TYPE_AES:SIZE_MAX>=0xffffffffffffffff
|
||||||
depends_on:PSA_WANT_ALG_PBKDF2_AES_CMAC_PRF_128:PSA_WANT_ALG_CMAC:PSA_WANT_KEY_TYPE_AES
|
#derive_set_capacity:PSA_ALG_PBKDF2_AES_CMAC_PRF_128:4294967295UL * PSA_BLOCK_CIPHER_BLOCK_MAX_SIZE + 1:PSA_ERROR_INVALID_ARGUMENT
|
||||||
derive_set_capacity:PSA_ALG_PBKDF2_AES_CMAC_PRF_128:4294967295UL * PSA_BLOCK_CIPHER_BLOCK_MAX_SIZE + 1:PSA_ERROR_INVALID_ARGUMENT
|
|
||||||
|
|
||||||
PSA key derivation: TLS 1.2 PRF, request maximum capacity
|
PSA key derivation: TLS 1.2 PRF, request maximum capacity
|
||||||
depends_on:PSA_WANT_ALG_TLS12_PRF:PSA_WANT_ALG_SHA_256
|
depends_on:PSA_WANT_ALG_TLS12_PRF:PSA_WANT_ALG_SHA_256
|
||||||
derive_set_capacity:PSA_ALG_TLS12_PRF(PSA_ALG_SHA_256):SIZE_MAX:PSA_SUCCESS
|
derive_set_capacity:PSA_ALG_TLS12_PRF(PSA_ALG_SHA_256):SIZE_MAX:PSA_SUCCESS
|
||||||
|
|
||||||
# This test case will work correctly on 64-bit machines
|
|
||||||
PSA key derivation: PBKDF2-HMAC-SHA256, request maximum capacity
|
PSA key derivation: PBKDF2-HMAC-SHA256, request maximum capacity
|
||||||
depends_on:PSA_WANT_ALG_PBKDF2_HMAC:PSA_WANT_ALG_SHA_256
|
depends_on:PSA_WANT_ALG_PBKDF2_HMAC:PSA_WANT_ALG_SHA_256:SIZE_MAX>=0xffffffffffffffff
|
||||||
derive_set_capacity:PSA_ALG_PBKDF2_HMAC(PSA_ALG_SHA_256):4294967295UL * PSA_HASH_LENGTH(PSA_ALG_SHA_256):PSA_SUCCESS
|
derive_set_capacity:PSA_ALG_PBKDF2_HMAC(PSA_ALG_SHA_256):4294967295UL * PSA_HASH_LENGTH(PSA_ALG_SHA_256):PSA_SUCCESS
|
||||||
|
|
||||||
# This test case will work correctly on 64-bit machines
|
|
||||||
PSA key derivation: PBKDF2-AES-CMAC-PRF-128, request maximum capacity
|
PSA key derivation: PBKDF2-AES-CMAC-PRF-128, request maximum capacity
|
||||||
depends_on:PSA_WANT_ALG_PBKDF2_AES_CMAC_PRF_128:PSA_WANT_ALG_CMAC:PSA_WANT_KEY_TYPE_AES
|
depends_on:PSA_WANT_ALG_PBKDF2_AES_CMAC_PRF_128:PSA_WANT_ALG_CMAC:PSA_WANT_KEY_TYPE_AES:SIZE_MAX>=0xffffffffffffffff
|
||||||
derive_set_capacity:PSA_ALG_PBKDF2_AES_CMAC_PRF_128:4294967295UL * PSA_BLOCK_CIPHER_BLOCK_MAX_SIZE:PSA_SUCCESS
|
derive_set_capacity:PSA_ALG_PBKDF2_AES_CMAC_PRF_128:4294967295UL * PSA_BLOCK_CIPHER_BLOCK_MAX_SIZE:PSA_SUCCESS
|
||||||
|
|
||||||
PSA key derivation: over capacity 42: output 42+1
|
PSA key derivation: over capacity 42: output 42+1
|
||||||
|
Loading…
x
Reference in New Issue
Block a user