diff options
author | Andrzej Kurek <andrzej.kurek@arm.com> | 2022-02-03 10:30:30 -0500 |
---|---|---|
committer | Andrzej Kurek <andrzej.kurek@arm.com> | 2022-02-03 10:30:30 -0500 |
commit | 59469d7c64d188a6d7ef1fd10bdd3df45b3562fc (patch) | |
tree | 7b6297c3f2569f780f7ee0e1d578e0a1f546dc1d /tests/src | |
parent | ba4cadef142112f5fcb8d1af940a7874fa909394 (diff) | |
download | mbedtls-59469d7c64d188a6d7ef1fd10bdd3df45b3562fc.zip mbedtls-59469d7c64d188a6d7ef1fd10bdd3df45b3562fc.tar.gz mbedtls-59469d7c64d188a6d7ef1fd10bdd3df45b3562fc.tar.bz2 |
Test driver: keep variable declarations first
Signed-off-by: Andrzej Kurek <andrzej.kurek@arm.com>
Diffstat (limited to 'tests/src')
-rw-r--r-- | tests/src/drivers/test_driver_key_management.c | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/tests/src/drivers/test_driver_key_management.c b/tests/src/drivers/test_driver_key_management.c index e5f1193..974d498 100644 --- a/tests/src/drivers/test_driver_key_management.c +++ b/tests/src/drivers/test_driver_key_management.c @@ -261,14 +261,14 @@ psa_status_t mbedtls_test_transparent_import_key( size_t *key_buffer_length, size_t *bits) { + psa_key_type_t type = psa_get_key_type( attributes ); + ++mbedtls_test_driver_key_management_hooks.hits; mbedtls_test_driver_key_management_hooks.location = PSA_KEY_LOCATION_LOCAL_STORAGE; if( mbedtls_test_driver_key_management_hooks.forced_status != PSA_SUCCESS ) return( mbedtls_test_driver_key_management_hooks.forced_status ); - psa_key_type_t type = psa_get_key_type( attributes ); - if( PSA_KEY_TYPE_IS_ECC( type ) ) { #if defined(MBEDTLS_TEST_LIBTESTDRIVER1) && \ @@ -329,18 +329,18 @@ psa_status_t mbedtls_test_opaque_import_key( size_t *key_buffer_length, size_t *bits) { - ++mbedtls_test_driver_key_management_hooks.hits; - mbedtls_test_driver_key_management_hooks.location = PSA_CRYPTO_TEST_DRIVER_LOCATION; - - if( mbedtls_test_driver_key_management_hooks.forced_status != PSA_SUCCESS ) - return( mbedtls_test_driver_key_management_hooks.forced_status ); - psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; psa_key_type_t type = psa_get_key_type( attributes ); /* This buffer will be used as an intermediate placeholder for * the clear key till we wrap it */ uint8_t *key_buffer_temp; + ++mbedtls_test_driver_key_management_hooks.hits; + mbedtls_test_driver_key_management_hooks.location = PSA_CRYPTO_TEST_DRIVER_LOCATION; + + if( mbedtls_test_driver_key_management_hooks.forced_status != PSA_SUCCESS ) + return( mbedtls_test_driver_key_management_hooks.forced_status ); + key_buffer_temp = mbedtls_calloc( 1, key_buffer_size ); if( key_buffer_temp == NULL ) return( PSA_ERROR_INSUFFICIENT_MEMORY ); |