aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorPaul Elliott <paul.elliott@arm.com>2021-11-30 16:39:51 +0000
committerPaul Elliott <paul.elliott@arm.com>2021-12-13 11:14:45 +0000
commit270a264b7825008d0de6e344b36b1c345ee2a4ca (patch)
treeeafc36b16a64c4b9eb235108d9bbb4ed8c107f6e
parent73051b4176ff806d6af3077463a5994dfcfb1bab (diff)
downloadmbedtls-270a264b7825008d0de6e344b36b1c345ee2a4ca.zip
mbedtls-270a264b7825008d0de6e344b36b1c345ee2a4ca.tar.gz
mbedtls-270a264b7825008d0de6e344b36b1c345ee2a4ca.tar.bz2
Simplify Input usage macros
Also ensure they are used in test data rather than values Signed-off-by: Paul Elliott <paul.elliott@arm.com>
-rw-r--r--tests/suites/test_suite_pkcs12.data16
-rw-r--r--tests/suites/test_suite_pkcs12.function19
2 files changed, 12 insertions, 23 deletions
diff --git a/tests/suites/test_suite_pkcs12.data b/tests/suites/test_suite_pkcs12.data
index c8bfe46..ec04f4a 100644
--- a/tests/suites/test_suite_pkcs12.data
+++ b/tests/suites/test_suite_pkcs12.data
@@ -1,33 +1,33 @@
PKCS#12 derive key : Zero length password and hash
depends_on:MBEDTLS_MD5_C
-pkcs12_derive_key:MBEDTLS_MD_MD5:48:"":1:"":1:3:0
+pkcs12_derive_key:MBEDTLS_MD_MD5:48:"":USE_GIVEN_INPUT:"":USE_GIVEN_INPUT:3:0
PKCS#12 derive key: NULL password and hash
depends_on:MBEDTLS_MD5_C
-pkcs12_derive_key:MBEDTLS_MD_MD5:48:"":0:"":0:3:0
+pkcs12_derive_key:MBEDTLS_MD_MD5:48:"":USE_NULL_INPUT:"":USE_NULL_INPUT:3:0
PKCS#12 derive key: Zero length password
depends_on:MBEDTLS_MD5_C
-pkcs12_derive_key:MBEDTLS_MD_MD5:48:"":1:"0123456789abcdef":1:3:0
+pkcs12_derive_key:MBEDTLS_MD_MD5:48:"":USE_GIVEN_INPUT:"0123456789abcdef":USE_GIVEN_INPUT:3:0
PKCS#12 derive key: NULL password
depends_on:MBEDTLS_MD5_C
-pkcs12_derive_key:MBEDTLS_MD_MD5:48:"":0:"0123456789abcdef":1:3:0
+pkcs12_derive_key:MBEDTLS_MD_MD5:48:"":USE_NULL_INPUT:"0123456789abcdef":USE_GIVEN_INPUT:3:0
PKCS#12 derive key: Invalid length NULL password
depends_on:MBEDTLS_MD5_C
-pkcs12_derive_key:MBEDTLS_MD_MD5:48:"0123456789abcdef":2:"0123456789abcdef":1:3:MBEDTLS_ERR_PKCS12_BAD_INPUT_DATA
+pkcs12_derive_key:MBEDTLS_MD_MD5:48:"0123456789abcdef":USE_NULL_INPUT:"0123456789abcdef":USE_GIVEN_INPUT:3:MBEDTLS_ERR_PKCS12_BAD_INPUT_DATA
PKCS#12 derive key: Zero length hash
depends_on:MBEDTLS_MD5_C
-pkcs12_derive_key:MBEDTLS_MD_MD5:48:"0123456789abcdef":1:"":1:3:0
+pkcs12_derive_key:MBEDTLS_MD_MD5:48:"0123456789abcdef":USE_GIVEN_INPUT:"":USE_GIVEN_INPUT:3:0
PKCS#12 derive key: NULL hash
depends_on:MBEDTLS_MD5_C
-pkcs12_derive_key:MBEDTLS_MD_MD5:48:"0123456789abcdef":1:"":0:3:0
+pkcs12_derive_key:MBEDTLS_MD_MD5:48:"0123456789abcdef":USE_GIVEN_INPUT:"":USE_NULL_INPUT:3:0
PKCS#12 derive key: Invalid length NULL hash
depends_on:MBEDTLS_MD5_C
-pkcs12_derive_key:MBEDTLS_MD_MD5:48:"0123456789abcdef":1:"0123456789abcdef":2:3:MBEDTLS_ERR_PKCS12_BAD_INPUT_DATA
+pkcs12_derive_key:MBEDTLS_MD_MD5:48:"0123456789abcdef":USE_GIVEN_INPUT:"0123456789abcdef":USE_NULL_INPUT:3:MBEDTLS_ERR_PKCS12_BAD_INPUT_DATA
diff --git a/tests/suites/test_suite_pkcs12.function b/tests/suites/test_suite_pkcs12.function
index 4c3f321..2ed4369 100644
--- a/tests/suites/test_suite_pkcs12.function
+++ b/tests/suites/test_suite_pkcs12.function
@@ -6,7 +6,6 @@ typedef enum
{
USE_NULL_INPUT = 0,
USE_GIVEN_INPUT = 1,
- USE_NULL_INPUT_WITH_SIZE = 2,
} input_usage_method_t;
/* END_HEADER */
@@ -33,24 +32,14 @@ void pkcs12_derive_key( int md_type, int key_size_arg,
size_t key_size = key_size_arg;
if( password_usage == USE_GIVEN_INPUT )
- {
password = password_arg->x;
- password_len = password_arg->len;
- }
- else if( password_usage == USE_NULL_INPUT_WITH_SIZE )
- {
- password_len = password_arg->len;
- }
+
+ password_len = password_arg->len;
if( salt_usage == USE_GIVEN_INPUT )
- {
salt = salt_arg->x;
- salt_len = salt_arg->len;
- }
- else if( salt_usage == USE_NULL_INPUT_WITH_SIZE )
- {
- salt_len = salt_arg->len;
- }
+
+ salt_len = salt_arg->len;
ASSERT_ALLOC( output_data, key_size );