mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-04-17 20:42:44 +00:00
Rename "input_copy" -> "local_input"
This helps to prevent confusion as it avoids overloading the word "copy" as both an action and an object. Signed-off-by: David Horstmann <david.horstmann@arm.com>
This commit is contained in:
parent
2f307b4216
commit
f1734054fa
@ -8496,30 +8496,30 @@ psa_status_t psa_crypto_copy_output(const uint8_t *output_copy, size_t output_co
|
||||
return PSA_SUCCESS;
|
||||
}
|
||||
|
||||
psa_status_t psa_crypto_input_copy_alloc(const uint8_t *input, size_t input_len,
|
||||
psa_crypto_input_copy_t *input_copy)
|
||||
psa_status_t psa_crypto_local_input_alloc(const uint8_t *input, size_t input_len,
|
||||
psa_crypto_local_input_t *local_input)
|
||||
{
|
||||
psa_status_t status;
|
||||
|
||||
input_copy->buffer = NULL;
|
||||
input_copy->length = 0;
|
||||
local_input->buffer = NULL;
|
||||
local_input->length = 0;
|
||||
|
||||
if (input_len == 0) {
|
||||
return PSA_SUCCESS;
|
||||
}
|
||||
|
||||
input_copy->buffer = mbedtls_calloc(input_len, 1);
|
||||
if (input_copy->buffer == NULL) {
|
||||
local_input->buffer = mbedtls_calloc(input_len, 1);
|
||||
if (local_input->buffer == NULL) {
|
||||
/* Since we dealt with the zero-length case above, we know that
|
||||
* a NULL return value means a failure of allocation. */
|
||||
return PSA_ERROR_INSUFFICIENT_MEMORY;
|
||||
}
|
||||
/* From now on, we must free input_copy->buffer on error. */
|
||||
/* From now on, we must free local_input->buffer on error. */
|
||||
|
||||
input_copy->length = input_len;
|
||||
local_input->length = input_len;
|
||||
|
||||
status = psa_crypto_copy_input(input, input_len,
|
||||
input_copy->buffer, input_copy->length);
|
||||
local_input->buffer, local_input->length);
|
||||
if (status != PSA_SUCCESS) {
|
||||
goto error;
|
||||
}
|
||||
@ -8527,17 +8527,17 @@ psa_status_t psa_crypto_input_copy_alloc(const uint8_t *input, size_t input_len,
|
||||
return PSA_SUCCESS;
|
||||
|
||||
error:
|
||||
mbedtls_free(input_copy->buffer);
|
||||
input_copy->buffer = NULL;
|
||||
input_copy->length = 0;
|
||||
mbedtls_free(local_input->buffer);
|
||||
local_input->buffer = NULL;
|
||||
local_input->length = 0;
|
||||
return status;
|
||||
}
|
||||
|
||||
void psa_crypto_input_copy_free(psa_crypto_input_copy_t *input_copy)
|
||||
void psa_crypto_local_input_free(psa_crypto_local_input_t *local_input)
|
||||
{
|
||||
mbedtls_free(input_copy->buffer);
|
||||
input_copy->buffer = NULL;
|
||||
input_copy->length = 0;
|
||||
mbedtls_free(local_input->buffer);
|
||||
local_input->buffer = NULL;
|
||||
local_input->length = 0;
|
||||
}
|
||||
|
||||
psa_status_t psa_crypto_output_copy_alloc(uint8_t *output, size_t output_len,
|
||||
|
@ -854,34 +854,34 @@ psa_status_t mbedtls_psa_verify_hash_complete(
|
||||
psa_status_t mbedtls_psa_verify_hash_abort(
|
||||
mbedtls_psa_verify_hash_interruptible_operation_t *operation);
|
||||
|
||||
typedef struct psa_crypto_input_copy_s {
|
||||
typedef struct psa_crypto_local_input_s {
|
||||
uint8_t *buffer;
|
||||
size_t length;
|
||||
} psa_crypto_input_copy_t;
|
||||
} psa_crypto_local_input_t;
|
||||
|
||||
#define PSA_CRYPTO_INPUT_COPY_INIT { NULL, 0 }
|
||||
#define PSA_CRYPTO_LOCAL_INPUT_INIT { NULL, 0 }
|
||||
|
||||
/** Allocate a local copy of an input buffer.
|
||||
*
|
||||
* \param[in] input Pointer to input buffer.
|
||||
* \param[in] input_len Length of the input buffer.
|
||||
* \param[out] input_copy Pointer to a psa_crypto_input_copy_t struct to
|
||||
* populate with the input copy.
|
||||
* \param[out] local_input Pointer to a psa_crypto_local_input_t struct to
|
||||
* populate with the local input copy.
|
||||
* \return #PSA_SUCCESS, if the buffer was successfully
|
||||
* copied.
|
||||
* \return #PSA_ERROR_INSUFFICIENT_MEMORY, if a copy of
|
||||
* the buffer cannot be allocated.
|
||||
*/
|
||||
psa_status_t psa_crypto_input_copy_alloc(const uint8_t *input, size_t input_len,
|
||||
psa_crypto_input_copy_t *input_copy);
|
||||
psa_status_t psa_crypto_local_input_alloc(const uint8_t *input, size_t input_len,
|
||||
psa_crypto_local_input_t *local_input);
|
||||
|
||||
/** Free a local copy of an input buffer.
|
||||
*
|
||||
* \param[in] input_copy Pointer to a psa_crypto_input_copy_t struct
|
||||
* \param[in] local_input Pointer to a psa_crypto_local_input_t struct
|
||||
* populated by a previous call to
|
||||
* psa_crypto_input_copy_alloc().
|
||||
* psa_crypto_local_input_alloc().
|
||||
*/
|
||||
void psa_crypto_input_copy_free(psa_crypto_input_copy_t *input_copy);
|
||||
void psa_crypto_local_input_free(psa_crypto_local_input_t *local_input);
|
||||
|
||||
typedef struct psa_crypto_output_copy_s {
|
||||
uint8_t *original;
|
||||
|
@ -28,20 +28,20 @@ copy_output:0:10:PSA_SUCCESS
|
||||
PSA output buffer copy: zero-length both buffers
|
||||
copy_output:0:0:PSA_SUCCESS
|
||||
|
||||
PSA crypto input copy alloc
|
||||
input_copy_alloc:200:PSA_SUCCESS
|
||||
PSA crypto local input alloc
|
||||
local_input_alloc:200:PSA_SUCCESS
|
||||
|
||||
PSA crypto input copy alloc, NULL buffer
|
||||
input_copy_alloc:0:PSA_SUCCESS
|
||||
PSA crypto local input alloc, NULL buffer
|
||||
local_input_alloc:0:PSA_SUCCESS
|
||||
|
||||
PSA crypto input copy free
|
||||
input_copy_free:200
|
||||
PSA crypto local input free
|
||||
local_input_free:200
|
||||
|
||||
PSA crypto input copy free, NULL buffer
|
||||
input_copy_free:0
|
||||
PSA crypto local input free, NULL buffer
|
||||
local_input_free:0
|
||||
|
||||
PSA crypto input copy round-trip
|
||||
input_copy_round_trip
|
||||
PSA crypto local input round-trip
|
||||
local_input_round_trip
|
||||
|
||||
PSA crypto output copy alloc
|
||||
output_copy_alloc:200:PSA_SUCCESS
|
||||
|
@ -79,73 +79,73 @@ exit:
|
||||
/* END_CASE */
|
||||
|
||||
/* BEGIN_CASE */
|
||||
void input_copy_alloc(int input_len, psa_status_t exp_status)
|
||||
void local_input_alloc(int input_len, psa_status_t exp_status)
|
||||
{
|
||||
uint8_t *input = NULL;
|
||||
psa_crypto_input_copy_t input_copy;
|
||||
psa_crypto_local_input_t local_input;
|
||||
psa_status_t status;
|
||||
|
||||
input_copy.buffer = NULL;
|
||||
local_input.buffer = NULL;
|
||||
|
||||
TEST_CALLOC(input, input_len);
|
||||
fill_buffer_pattern(input, input_len);
|
||||
|
||||
status = psa_crypto_input_copy_alloc(input, input_len, &input_copy);
|
||||
status = psa_crypto_local_input_alloc(input, input_len, &local_input);
|
||||
TEST_EQUAL(status, exp_status);
|
||||
|
||||
if (exp_status == PSA_SUCCESS) {
|
||||
if (input_len != 0) {
|
||||
TEST_ASSERT(input_copy.buffer != input);
|
||||
TEST_ASSERT(local_input.buffer != input);
|
||||
}
|
||||
TEST_MEMORY_COMPARE(input, input_len,
|
||||
input_copy.buffer, input_copy.length);
|
||||
local_input.buffer, local_input.length);
|
||||
}
|
||||
|
||||
exit:
|
||||
mbedtls_free(input_copy.buffer);
|
||||
mbedtls_free(local_input.buffer);
|
||||
mbedtls_free(input);
|
||||
}
|
||||
/* END_CASE */
|
||||
|
||||
/* BEGIN_CASE */
|
||||
void input_copy_free(int input_len)
|
||||
void local_input_free(int input_len)
|
||||
{
|
||||
psa_crypto_input_copy_t input_copy;
|
||||
psa_crypto_local_input_t local_input;
|
||||
|
||||
input_copy.buffer = NULL;
|
||||
input_copy.length = input_len;
|
||||
TEST_CALLOC(input_copy.buffer, input_copy.length);
|
||||
local_input.buffer = NULL;
|
||||
local_input.length = input_len;
|
||||
TEST_CALLOC(local_input.buffer, local_input.length);
|
||||
|
||||
psa_crypto_input_copy_free(&input_copy);
|
||||
psa_crypto_local_input_free(&local_input);
|
||||
|
||||
TEST_ASSERT(input_copy.buffer == NULL);
|
||||
TEST_EQUAL(input_copy.length, 0);
|
||||
TEST_ASSERT(local_input.buffer == NULL);
|
||||
TEST_EQUAL(local_input.length, 0);
|
||||
|
||||
exit:
|
||||
mbedtls_free(input_copy.buffer);
|
||||
input_copy.buffer = NULL;
|
||||
input_copy.length = 0;
|
||||
mbedtls_free(local_input.buffer);
|
||||
local_input.buffer = NULL;
|
||||
local_input.length = 0;
|
||||
}
|
||||
/* END_CASE */
|
||||
|
||||
/* BEGIN_CASE */
|
||||
void input_copy_round_trip()
|
||||
void local_input_round_trip()
|
||||
{
|
||||
psa_crypto_input_copy_t input_copy;
|
||||
psa_crypto_local_input_t local_input;
|
||||
uint8_t input[200];
|
||||
psa_status_t status;
|
||||
|
||||
fill_buffer_pattern(input, sizeof(input));
|
||||
|
||||
status = psa_crypto_input_copy_alloc(input, sizeof(input), &input_copy);
|
||||
status = psa_crypto_local_input_alloc(input, sizeof(input), &local_input);
|
||||
TEST_EQUAL(status, PSA_SUCCESS);
|
||||
TEST_MEMORY_COMPARE(input_copy.buffer, input_copy.length,
|
||||
TEST_MEMORY_COMPARE(local_input.buffer, local_input.length,
|
||||
input, sizeof(input));
|
||||
TEST_ASSERT(input_copy.buffer != input);
|
||||
TEST_ASSERT(local_input.buffer != input);
|
||||
|
||||
psa_crypto_input_copy_free(&input_copy);
|
||||
TEST_ASSERT(input_copy.buffer == NULL);
|
||||
TEST_EQUAL(input_copy.length, 0);
|
||||
psa_crypto_local_input_free(&local_input);
|
||||
TEST_ASSERT(local_input.buffer == NULL);
|
||||
TEST_EQUAL(local_input.length, 0);
|
||||
}
|
||||
/* END_CASE */
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user