diff options
author | Gilles Peskine <Gilles.Peskine@arm.com> | 2021-02-14 14:08:22 +0100 |
---|---|---|
committer | TRodziewicz <rodziewicz@gmail.com> | 2021-02-25 11:02:16 +0100 |
commit | c231d586c74e064c18a142c793599e5ca4a6e3c2 (patch) | |
tree | 10de43709a0923bbfeddfbdd90996622f9d0c078 /tests/suites/test_suite_psa_crypto_slot_management.function | |
parent | d2b4d9cb3c918dd7a8f648d21c9c452d1859b10b (diff) | |
download | mbedtls-c231d586c74e064c18a142c793599e5ca4a6e3c2.zip mbedtls-c231d586c74e064c18a142c793599e5ca4a6e3c2.tar.gz mbedtls-c231d586c74e064c18a142c793599e5ca4a6e3c2.tar.bz2 |
Destroy recorded persistent keys in PSA_DONE()
This ensures that test cases won't leave persistent files behind even
on failure, provided they use TEST_USES_KEY_ID(). Test cases that
don't use this macro are unaffected.
Tests that use PSA_DONE() midway and expect persistent keys to survive
must use PSA_SESSION_DONE() instead.
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
Signed-off-by: TRodziewicz <rodziewicz@gmail.com>
Diffstat (limited to 'tests/suites/test_suite_psa_crypto_slot_management.function')
-rw-r--r-- | tests/suites/test_suite_psa_crypto_slot_management.function | 14 |
1 files changed, 1 insertions, 13 deletions
diff --git a/tests/suites/test_suite_psa_crypto_slot_management.function b/tests/suites/test_suite_psa_crypto_slot_management.function index 7c55c71..7d3c7a8 100644 --- a/tests/suites/test_suite_psa_crypto_slot_management.function +++ b/tests/suites/test_suite_psa_crypto_slot_management.function @@ -86,8 +86,7 @@ static int invalidate_psa( invalidate_method_t invalidate_method ) case INVALIDATE_BY_DESTROYING_WITH_SHUTDOWN: case INVALIDATE_BY_PURGING_WITH_SHUTDOWN: /* All keys must have been closed. */ - mbedtls_test_psa_purge_key_cache( ); - PSA_DONE( ); + PSA_SESSION_DONE( ); break; case INVALIDATE_BY_SHUTDOWN: /* Some keys may remain behind, and we're testing that this @@ -339,7 +338,6 @@ exit: psa_reset_key_attributes( &read_attributes ); PSA_DONE( ); - mbedtls_test_psa_purge_key_storage( ); mbedtls_free( reexported ); } /* END_CASE */ @@ -413,7 +411,6 @@ exit: psa_reset_key_attributes( &attributes ); PSA_DONE( ); - mbedtls_test_psa_purge_key_storage( ); } /* END_CASE */ @@ -472,9 +469,6 @@ void create_fail( int lifetime_arg, int id_arg, exit: PSA_DONE( ); -#if defined(MBEDTLS_PSA_CRYPTO_STORAGE_C) - mbedtls_test_psa_purge_key_storage( ); -#endif } /* END_CASE */ @@ -610,9 +604,6 @@ exit: PSA_DONE( ); mbedtls_free( export_buffer ); -#if defined(MBEDTLS_PSA_CRYPTO_STORAGE_C) - mbedtls_test_psa_purge_key_storage( ); -#endif } /* END_CASE */ @@ -728,9 +719,6 @@ exit: PSA_DONE( ); mbedtls_free( export_buffer ); -#if defined(MBEDTLS_PSA_CRYPTO_STORAGE_C) - mbedtls_test_psa_purge_key_storage( ); -#endif } /* END_CASE */ |