Ensure non-NULL key buffer when building SSL test transforms
diff --git a/tests/suites/test_suite_ssl.function b/tests/suites/test_suite_ssl.function
index d8f022f..05ecd8a 100644
--- a/tests/suites/test_suite_ssl.function
+++ b/tests/suites/test_suite_ssl.function
@@ -41,8 +41,11 @@
 
     /* Pick keys */
     keylen = cipher_info->key_bitlen / 8;
-    CHK( ( key0 = mbedtls_calloc( 1, keylen ) ) != NULL );
-    CHK( ( key1 = mbedtls_calloc( 1, keylen ) ) != NULL );
+    /* Allocate `keylen + 1` bytes to ensure that we get
+     * a non-NULL pointers from `mbedtls_calloc` even if
+     * `keylen == 0` in the case of the NULL cipher. */
+    CHK( ( key0 = mbedtls_calloc( 1, keylen + 1 ) ) != NULL );
+    CHK( ( key1 = mbedtls_calloc( 1, keylen + 1 ) ) != NULL );
     memset( key0, 0x1, keylen );
     memset( key1, 0x2, keylen );