Improve mbedtls_pkcs5_pbes2_ext function test data
Signed-off-by: Waleed Elmelegy <waleed.elmelegy@arm.com>
diff --git a/tests/suites/test_suite_pkcs5.function b/tests/suites/test_suite_pkcs5.function
index 47de85e..200bdc3 100644
--- a/tests/suites/test_suite_pkcs5.function
+++ b/tests/suites/test_suite_pkcs5.function
@@ -30,7 +30,7 @@
/* BEGIN_CASE depends_on:MBEDTLS_ASN1_PARSE_C */
void pbes2_encrypt(int params_tag, data_t *params_hex, data_t *pw,
data_t *data, int outsize, int ref_ret,
- data_t *ref_out, int ref_out_len)
+ data_t *ref_out)
{
int my_ret;
mbedtls_asn1_buf params;
@@ -40,7 +40,6 @@
#endif
MD_PSA_INIT();
/* Those parameters are only used when MBEDTLS_CIPHER_PADDING_PKCS7 is enabled */
- (void) ref_out_len;
(void) outsize;
params.tag = params_tag;
@@ -49,9 +48,9 @@
ASSERT_ALLOC(my_out, ref_out->len);
- my_ret = mbedtls_pkcs5_pbes2(¶ms, MBEDTLS_PKCS5_ENCRYPT,
- pw->x, pw->len, data->x, data->len, my_out);
if (ref_ret != MBEDTLS_ERR_ASN1_BUF_TOO_SMALL) {
+ my_ret = mbedtls_pkcs5_pbes2(¶ms, MBEDTLS_PKCS5_ENCRYPT,
+ pw->x, pw->len, data->x, data->len, my_out);
TEST_EQUAL(my_ret, ref_ret);
}
if (ref_ret == 0) {
@@ -66,7 +65,7 @@
TEST_EQUAL(my_ret, ref_ret);
if (ref_ret == 0) {
ASSERT_COMPARE(my_out, my_out_len,
- ref_out->x, ref_out_len);
+ ref_out->x, ref_out->len);
}
#endif
@@ -77,9 +76,9 @@
/* END_CASE */
/* BEGIN_CASE depends_on:MBEDTLS_ASN1_PARSE_C */
-void mbedtls_pkcs5_pbes2(int params_tag, data_t *params_hex, data_t *pw,
- data_t *data, int outsize, int ref_ret,
- data_t *ref_out, int ref_out_len)
+void pbes2_decrypt(int params_tag, data_t *params_hex, data_t *pw,
+ data_t *data, int outsize, int ref_ret,
+ data_t *ref_out)
{
int my_ret;
mbedtls_asn1_buf params;
@@ -90,19 +89,17 @@
MD_PSA_INIT();
/* Those parameters are only used when MBEDTLS_CIPHER_PADDING_PKCS7 is enabled */
- (void) ref_out_len;
(void) outsize;
-
params.tag = params_tag;
params.p = params_hex->x;
params.len = params_hex->len;
ASSERT_ALLOC(my_out, ref_out->len);
- my_ret = mbedtls_pkcs5_pbes2(¶ms, MBEDTLS_PKCS5_DECRYPT,
- pw->x, pw->len, data->x, data->len, my_out);
if (ref_ret != MBEDTLS_ERR_ASN1_BUF_TOO_SMALL) {
+ my_ret = mbedtls_pkcs5_pbes2(¶ms, MBEDTLS_PKCS5_DECRYPT,
+ pw->x, pw->len, data->x, data->len, my_out);
TEST_EQUAL(my_ret, ref_ret);
}
if (ref_ret == 0) {
@@ -116,7 +113,7 @@
TEST_EQUAL(my_ret, ref_ret);
if (ref_ret == 0) {
ASSERT_COMPARE(my_out, my_out_len,
- ref_out->x, ref_out_len);
+ ref_out->x, ref_out->len);
}
#endif