Ensure non-NULL key buffer when building SSL test transforms
diff --git a/tests/suites/test_suite_ssl.function b/tests/suites/test_suite_ssl.function
index d8f022f..05ecd8a 100644
--- a/tests/suites/test_suite_ssl.function
+++ b/tests/suites/test_suite_ssl.function
@@ -41,8 +41,11 @@
/* Pick keys */
keylen = cipher_info->key_bitlen / 8;
- CHK( ( key0 = mbedtls_calloc( 1, keylen ) ) != NULL );
- CHK( ( key1 = mbedtls_calloc( 1, keylen ) ) != NULL );
+ /* Allocate `keylen + 1` bytes to ensure that we get
+ * a non-NULL pointers from `mbedtls_calloc` even if
+ * `keylen == 0` in the case of the NULL cipher. */
+ CHK( ( key0 = mbedtls_calloc( 1, keylen + 1 ) ) != NULL );
+ CHK( ( key1 = mbedtls_calloc( 1, keylen + 1 ) ) != NULL );
memset( key0, 0x1, keylen );
memset( key1, 0x2, keylen );