diff --git a/tests/suites/test_suite_pk.function b/tests/suites/test_suite_pk.function index bafd87afc3..a99b6c03bd 100644 --- a/tests/suites/test_suite_pk.function +++ b/tests/suites/test_suite_pk.function @@ -1139,10 +1139,12 @@ void pk_rsa_alt() TEST_ASSERT(strcmp(mbedtls_pk_get_name(&alt), "RSA-alt") == 0); /* Test signature */ +#if SIZE_MAX > UINT_MAX TEST_ASSERT(mbedtls_pk_sign(&alt, MBEDTLS_MD_NONE, hash, SIZE_MAX, sig, sizeof(sig), &sig_len, mbedtls_test_rnd_std_rand, NULL) == MBEDTLS_ERR_PK_BAD_INPUT_DATA); +#endif /* SIZE_MAX > UINT_MAX */ TEST_ASSERT(mbedtls_pk_sign(&alt, MBEDTLS_MD_NONE, hash, sizeof(hash), sig, sizeof(sig), &sig_len, mbedtls_test_rnd_std_rand, NULL) diff --git a/tests/suites/test_suite_psa_crypto.function b/tests/suites/test_suite_psa_crypto.function index 0a7744fd28..55e3106389 100644 --- a/tests/suites/test_suite_psa_crypto.function +++ b/tests/suites/test_suite_psa_crypto.function @@ -5844,6 +5844,7 @@ void aead_multipart_state_test(int key_type_arg, data_t *key_data, psa_aead_abort(&operation); /* Test for generating nonce after calling set lengths with SIZE_MAX ad_data length */ +#if SIZE_MAX > UINT32_MAX PSA_ASSERT(psa_aead_encrypt_setup(&operation, key, alg)); if (operation.alg == PSA_ALG_CCM || operation.alg == PSA_ALG_GCM) { @@ -5863,6 +5864,7 @@ void aead_multipart_state_test(int key_type_arg, data_t *key_data, } psa_aead_abort(&operation); +#endif /* Test for calling set lengths with a UINT32_MAX ad_data length, after generating nonce */