mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-04-16 08:42:50 +00:00
Remove psa_crypto_ prefix from test functions
This ensures they have a different name to the functions they test. Signed-off-by: David Horstmann <david.horstmann@arm.com>
This commit is contained in:
parent
8995b50cf4
commit
ac12d2dc69
@ -7408,34 +7408,34 @@ PSA derive persistent key: HKDF SHA-256, exportable
|
|||||||
persistent_key_load_key_from_storage:"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b":PSA_KEY_TYPE_RAW_DATA:1024:PSA_KEY_USAGE_EXPORT:0:DERIVE_KEY
|
persistent_key_load_key_from_storage:"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b":PSA_KEY_TYPE_RAW_DATA:1024:PSA_KEY_USAGE_EXPORT:0:DERIVE_KEY
|
||||||
|
|
||||||
PSA input buffer copy: straightforward copy
|
PSA input buffer copy: straightforward copy
|
||||||
psa_crypto_copy_input:20:20:PSA_SUCCESS
|
copy_input:20:20:PSA_SUCCESS
|
||||||
|
|
||||||
PSA input buffer copy: copy buffer larger than required
|
PSA input buffer copy: copy buffer larger than required
|
||||||
psa_crypto_copy_input:10:20:PSA_SUCCESS
|
copy_input:10:20:PSA_SUCCESS
|
||||||
|
|
||||||
PSA input buffer copy: copy buffer too small
|
PSA input buffer copy: copy buffer too small
|
||||||
psa_crypto_copy_input:20:10:PSA_ERROR_BUFFER_TOO_SMALL
|
copy_input:20:10:PSA_ERROR_BUFFER_TOO_SMALL
|
||||||
|
|
||||||
PSA input buffer copy: zero-length source buffer
|
PSA input buffer copy: zero-length source buffer
|
||||||
psa_crypto_copy_input:0:10:PSA_SUCCESS
|
copy_input:0:10:PSA_SUCCESS
|
||||||
|
|
||||||
PSA input buffer copy: zero-length both buffers
|
PSA input buffer copy: zero-length both buffers
|
||||||
psa_crypto_copy_input:0:0:PSA_SUCCESS
|
copy_input:0:0:PSA_SUCCESS
|
||||||
|
|
||||||
PSA output buffer copy: straightforward copy
|
PSA output buffer copy: straightforward copy
|
||||||
psa_crypto_copy_output:20:20:PSA_SUCCESS
|
copy_output:20:20:PSA_SUCCESS
|
||||||
|
|
||||||
PSA output buffer copy: output buffer larger than required
|
PSA output buffer copy: output buffer larger than required
|
||||||
psa_crypto_copy_output:10:20:PSA_SUCCESS
|
copy_output:10:20:PSA_SUCCESS
|
||||||
|
|
||||||
PSA output buffer copy: output buffer too small
|
PSA output buffer copy: output buffer too small
|
||||||
psa_crypto_copy_output:20:10:PSA_ERROR_BUFFER_TOO_SMALL
|
copy_output:20:10:PSA_ERROR_BUFFER_TOO_SMALL
|
||||||
|
|
||||||
PSA output buffer copy: zero-length source buffer
|
PSA output buffer copy: zero-length source buffer
|
||||||
psa_crypto_copy_output:0:10:PSA_SUCCESS
|
copy_output:0:10:PSA_SUCCESS
|
||||||
|
|
||||||
PSA output buffer copy: zero-length both buffers
|
PSA output buffer copy: zero-length both buffers
|
||||||
psa_crypto_copy_output:0:0:PSA_SUCCESS
|
copy_output:0:0:PSA_SUCCESS
|
||||||
|
|
||||||
PSA buffers alloc and copy
|
PSA buffers alloc and copy
|
||||||
psa_crypto_alloc_and_copy:0:20:0:20:PSA_SUCCESS
|
psa_crypto_alloc_and_copy:0:20:0:20:PSA_SUCCESS
|
||||||
|
@ -10375,7 +10375,7 @@ void ecjpake_size_macros()
|
|||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
/* BEGIN_CASE */
|
/* BEGIN_CASE */
|
||||||
void psa_crypto_copy_input(int src_len, int dst_len, int exp_ret)
|
void copy_input(int src_len, int dst_len, int exp_ret)
|
||||||
{
|
{
|
||||||
uint8_t *src_buffer = NULL;
|
uint8_t *src_buffer = NULL;
|
||||||
uint8_t *dst_buffer = NULL;
|
uint8_t *dst_buffer = NULL;
|
||||||
@ -10405,7 +10405,7 @@ exit:
|
|||||||
/* END_CASE */
|
/* END_CASE */
|
||||||
|
|
||||||
/* BEGIN_CASE */
|
/* BEGIN_CASE */
|
||||||
void psa_crypto_copy_output(int src_len, int dst_len, int exp_ret)
|
void copy_output(int src_len, int dst_len, int exp_ret)
|
||||||
{
|
{
|
||||||
uint8_t *src_buffer = NULL;
|
uint8_t *src_buffer = NULL;
|
||||||
uint8_t *dst_buffer = NULL;
|
uint8_t *dst_buffer = NULL;
|
||||||
|
Loading…
x
Reference in New Issue
Block a user