For tests, rename TEST_BUFFERS_EQUAL() to TEST_MEMORY_COMPARE()

Signed-off-by: Tom Cosgrove <tom.cosgrove@arm.com>
diff --git a/tests/suites/test_suite_psa_crypto.function b/tests/suites/test_suite_psa_crypto.function
index 21b3cf1..a58e48b 100644
--- a/tests/suites/test_suite_psa_crypto.function
+++ b/tests/suites/test_suite_psa_crypto.function
@@ -583,7 +583,7 @@
     }
 
 
-    TEST_BUFFERS_EQUAL(expected_output->x, expected_output->len,
+    TEST_MEMORY_COMPARE(expected_output->x, expected_output->len,
                    output_data, output_length);
 
 
@@ -692,7 +692,7 @@
         PSA_ASSERT(psa_mac_sign_finish(&operation, mac,
                                        PSA_MAC_MAX_SIZE, &mac_len));
 
-        TEST_BUFFERS_EQUAL(expected_output->x, expected_output->len,
+        TEST_MEMORY_COMPARE(expected_output->x, expected_output->len,
                        mac, mac_len);
     }
 
@@ -1574,7 +1574,7 @@
     }
 
     if (canonical_input) {
-        TEST_BUFFERS_EQUAL(data->x, data->len, exported, exported_length);
+        TEST_MEMORY_COMPARE(data->x, data->len, exported, exported_length);
     } else {
         mbedtls_svc_key_id_t key2 = MBEDTLS_SVC_KEY_ID_INIT;
         PSA_ASSERT(psa_import_key(&attributes, exported, exported_length,
@@ -1583,7 +1583,7 @@
                                   reexported,
                                   export_size,
                                   &reexported_length));
-        TEST_BUFFERS_EQUAL(exported, exported_length,
+        TEST_MEMORY_COMPARE(exported, exported_length,
                        reexported, reexported_length);
         PSA_ASSERT(psa_destroy_key(key2));
     }
@@ -1657,7 +1657,7 @@
                   PSA_EXPORT_PUBLIC_KEY_OUTPUT_SIZE(public_type, bits));
         TEST_LE_U(expected_public_key->len,
                   PSA_EXPORT_PUBLIC_KEY_MAX_SIZE);
-        TEST_BUFFERS_EQUAL(expected_public_key->x, expected_public_key->len,
+        TEST_MEMORY_COMPARE(expected_public_key->x, expected_public_key->len,
                        exported, exported_length);
     }
 exit:
@@ -2501,7 +2501,7 @@
         TEST_CALLOC(export_buffer, material->len);
         PSA_ASSERT(psa_export_key(target_key, export_buffer,
                                   material->len, &length));
-        TEST_BUFFERS_EQUAL(material->x, material->len,
+        TEST_MEMORY_COMPARE(material->x, material->len,
                        export_buffer, length);
     }
 
@@ -2760,7 +2760,7 @@
                                 output, PSA_HASH_LENGTH(alg),
                                 &output_length));
     TEST_EQUAL(output_length, PSA_HASH_LENGTH(alg));
-    TEST_BUFFERS_EQUAL(output, output_length,
+    TEST_MEMORY_COMPARE(output, output_length,
                    expected_output->x, expected_output->len);
 
     /* Compute with tight buffer, multi-part */
@@ -2770,7 +2770,7 @@
                                PSA_HASH_LENGTH(alg),
                                &output_length));
     TEST_EQUAL(output_length, PSA_HASH_LENGTH(alg));
-    TEST_BUFFERS_EQUAL(output, output_length,
+    TEST_MEMORY_COMPARE(output, output_length,
                    expected_output->x, expected_output->len);
 
     /* Compute with larger buffer, one-shot */
@@ -2778,7 +2778,7 @@
                                 output, sizeof(output),
                                 &output_length));
     TEST_EQUAL(output_length, PSA_HASH_LENGTH(alg));
-    TEST_BUFFERS_EQUAL(output, output_length,
+    TEST_MEMORY_COMPARE(output, output_length,
                    expected_output->x, expected_output->len);
 
     /* Compute with larger buffer, multi-part */
@@ -2787,7 +2787,7 @@
     PSA_ASSERT(psa_hash_finish(&operation, output,
                                sizeof(output), &output_length));
     TEST_EQUAL(output_length, PSA_HASH_LENGTH(alg));
-    TEST_BUFFERS_EQUAL(output, output_length,
+    TEST_MEMORY_COMPARE(output, output_length,
                    expected_output->x, expected_output->len);
 
     /* Compare with correct hash, one-shot */
@@ -3392,7 +3392,7 @@
                                    actual_mac, output_size, &mac_length),
                    expected_status);
         if (expected_status == PSA_SUCCESS) {
-            TEST_BUFFERS_EQUAL(expected_mac->x, expected_mac->len,
+            TEST_MEMORY_COMPARE(expected_mac->x, expected_mac->len,
                            actual_mac, mac_length);
         }
 
@@ -3411,7 +3411,7 @@
         PSA_ASSERT(psa_mac_abort(&operation));
 
         if (expected_status == PSA_SUCCESS) {
-            TEST_BUFFERS_EQUAL(expected_mac->x, expected_mac->len,
+            TEST_MEMORY_COMPARE(expected_mac->x, expected_mac->len,
                            actual_mac, mac_length);
         }
         mbedtls_free(actual_mac);
@@ -3962,7 +3962,7 @@
                                  output_buffer_size - output_length,
                                  &length));
     output_length += length;
-    TEST_BUFFERS_EQUAL(ciphertext->x, ciphertext->len,
+    TEST_MEMORY_COMPARE(ciphertext->x, ciphertext->len,
                    output, output_length);
 
     /* Multipart encryption */
@@ -3980,7 +3980,7 @@
                                  output_buffer_size - output_length,
                                  &length));
     output_length += length;
-    TEST_BUFFERS_EQUAL(plaintext->x, plaintext->len,
+    TEST_MEMORY_COMPARE(plaintext->x, plaintext->len,
                    output, output_length);
 
     /* One-shot encryption */
@@ -3988,7 +3988,7 @@
     PSA_ASSERT(psa_cipher_encrypt(key, alg, plaintext->x, plaintext->len,
                                   output, output_buffer_size,
                                   &output_length));
-    TEST_BUFFERS_EQUAL(ciphertext->x, ciphertext->len,
+    TEST_MEMORY_COMPARE(ciphertext->x, ciphertext->len,
                    output, output_length);
 
     /* One-shot decryption */
@@ -3996,7 +3996,7 @@
     PSA_ASSERT(psa_cipher_decrypt(key, alg, ciphertext->x, ciphertext->len,
                                   output, output_buffer_size,
                                   &output_length));
-    TEST_BUFFERS_EQUAL(plaintext->x, plaintext->len,
+    TEST_MEMORY_COMPARE(plaintext->x, plaintext->len,
                    output, output_length);
 
 exit:
@@ -4116,7 +4116,7 @@
     output2_length += function_output_length;
 
     PSA_ASSERT(psa_cipher_abort(&operation));
-    TEST_BUFFERS_EQUAL(output1 + iv_size, output1_length - iv_size,
+    TEST_MEMORY_COMPARE(output1 + iv_size, output1_length - iv_size,
                    output2, output2_length);
 
 exit:
@@ -4215,7 +4215,7 @@
     if (expected_status == PSA_SUCCESS) {
         PSA_ASSERT(psa_cipher_abort(&operation));
 
-        TEST_BUFFERS_EQUAL(expected_output->x, expected_output->len,
+        TEST_MEMORY_COMPARE(expected_output->x, expected_output->len,
                        output, total_output_length);
     }
 
@@ -4315,7 +4315,7 @@
     if (expected_status == PSA_SUCCESS) {
         PSA_ASSERT(psa_cipher_abort(&operation));
 
-        TEST_BUFFERS_EQUAL(expected_output->x, expected_output->len,
+        TEST_MEMORY_COMPARE(expected_output->x, expected_output->len,
                        output, total_output_length);
     }
 
@@ -4472,7 +4472,7 @@
     TEST_LE_U(output_length,
               PSA_CIPHER_DECRYPT_OUTPUT_MAX_SIZE(input_buffer_size));
 
-    TEST_BUFFERS_EQUAL(expected_output->x, expected_output->len,
+    TEST_MEMORY_COMPARE(expected_output->x, expected_output->len,
                    output, output_length);
 exit:
     mbedtls_free(input);
@@ -4529,7 +4529,7 @@
     TEST_LE_U(output2_length,
               PSA_CIPHER_DECRYPT_OUTPUT_MAX_SIZE(output1_length));
 
-    TEST_BUFFERS_EQUAL(input->x, input->len, output2, output2_length);
+    TEST_MEMORY_COMPARE(input->x, input->len, output2, output2_length);
 
 exit:
     mbedtls_free(output1);
@@ -4669,7 +4669,7 @@
 
     PSA_ASSERT(psa_cipher_abort(&operation2));
 
-    TEST_BUFFERS_EQUAL(input->x, input->len, output2, output2_length);
+    TEST_MEMORY_COMPARE(input->x, input->len, output2, output2_length);
 
 exit:
     psa_cipher_abort(&operation1);
@@ -4764,7 +4764,7 @@
                                     &output_length2),
                    expected_result);
 
-        TEST_BUFFERS_EQUAL(input_data->x, input_data->len,
+        TEST_MEMORY_COMPARE(input_data->x, input_data->len,
                        output_data2, output_length2);
     }
 
@@ -4831,7 +4831,7 @@
     }
 
     PSA_ASSERT(status);
-    TEST_BUFFERS_EQUAL(expected_result->x, expected_result->len,
+    TEST_MEMORY_COMPARE(expected_result->x, expected_result->len,
                    output_data, output_length);
 
 exit:
@@ -4904,7 +4904,7 @@
     TEST_EQUAL(status, expected_result);
 
     if (expected_result == PSA_SUCCESS) {
-        TEST_BUFFERS_EQUAL(expected_data->x, expected_data->len,
+        TEST_MEMORY_COMPARE(expected_data->x, expected_data->len,
                        output_data, output_length);
     }
 
@@ -6491,7 +6491,7 @@
                              signature, signature_size,
                              &signature_length));
     /* Verify that the signature is what is expected. */
-    TEST_BUFFERS_EQUAL(output_data->x, output_data->len,
+    TEST_MEMORY_COMPARE(output_data->x, output_data->len,
                    signature, signature_length);
 
 exit:
@@ -6614,7 +6614,7 @@
     TEST_LE_U(num_completes, max_completes);
 
     /* Verify that the signature is what is expected. */
-    TEST_BUFFERS_EQUAL(output_data->x, output_data->len,
+    TEST_MEMORY_COMPARE(output_data->x, output_data->len,
                    signature, signature_length);
 
     PSA_ASSERT(psa_sign_hash_abort(&operation));
@@ -7912,7 +7912,7 @@
                                 signature, signature_size,
                                 &signature_length));
 
-    TEST_BUFFERS_EQUAL(output_data->x, output_data->len,
+    TEST_MEMORY_COMPARE(output_data->x, output_data->len,
                    signature, signature_length);
 
 exit:
@@ -8250,7 +8250,7 @@
                                       label->x, label->len,
                                       output2, output2_size,
                                       &output2_length));
-    TEST_BUFFERS_EQUAL(input_data->x, input_data->len,
+    TEST_MEMORY_COMPARE(input_data->x, input_data->len,
                    output2, output2_length);
 
 exit:
@@ -8307,7 +8307,7 @@
                                       output,
                                       output_size,
                                       &output_length));
-    TEST_BUFFERS_EQUAL(expected_data->x, expected_data->len,
+    TEST_MEMORY_COMPARE(expected_data->x, expected_data->len,
                    output, output_length);
 
     /* If the label is empty, the test framework puts a non-null pointer
@@ -8323,7 +8323,7 @@
                                           output,
                                           output_size,
                                           &output_length));
-        TEST_BUFFERS_EQUAL(expected_data->x, expected_data->len,
+        TEST_MEMORY_COMPARE(expected_data->x, expected_data->len,
                        output, output_length);
     }
 
@@ -8892,7 +8892,7 @@
             /* Success. Check the read data. */
             PSA_ASSERT(status);
             if (output_sizes[i] != 0) {
-                TEST_BUFFERS_EQUAL(output_buffer, output_sizes[i],
+                TEST_MEMORY_COMPARE(output_buffer, output_sizes[i],
                                expected_outputs[i], output_sizes[i]);
             }
             /* Check the operation status. */
@@ -9015,7 +9015,7 @@
 
     TEST_EQUAL(status, expected_output_status);
     if (expected_output->len != 0 && expected_output_status == PSA_SUCCESS) {
-        TEST_BUFFERS_EQUAL(output_buffer, expected_output->len, expected_output->x,
+        TEST_MEMORY_COMPARE(output_buffer, expected_output->len, expected_output->x,
                        expected_output->len);
     }
 
@@ -9167,7 +9167,7 @@
     TEST_EQUAL(length, bytes2);
 
     /* Compare the outputs from the two runs. */
-    TEST_BUFFERS_EQUAL(output_buffer, bytes1 + bytes2,
+    TEST_MEMORY_COMPARE(output_buffer, bytes1 + bytes2,
                    export_buffer, capacity);
 
 exit:
@@ -9228,7 +9228,7 @@
     PSA_ASSERT(psa_export_key(derived_key,
                               export_buffer, export_buffer_size,
                               &export_length));
-    TEST_BUFFERS_EQUAL(export_buffer, export_length,
+    TEST_MEMORY_COMPARE(export_buffer, export_length,
                    expected_export->x, expected_export->len);
 
 exit:
@@ -9378,7 +9378,7 @@
                                      peer_key_data->x, peer_key_data->len,
                                      output, expected_output->len,
                                      &output_length));
-    TEST_BUFFERS_EQUAL(output, output_length,
+    TEST_MEMORY_COMPARE(output, output_length,
                    expected_output->x, expected_output->len);
     mbedtls_free(output);
     output = NULL;
@@ -9390,7 +9390,7 @@
                                      peer_key_data->x, peer_key_data->len,
                                      output, expected_output->len + 1,
                                      &output_length));
-    TEST_BUFFERS_EQUAL(output, output_length,
+    TEST_MEMORY_COMPARE(output, output_length,
                    expected_output->x, expected_output->len);
     mbedtls_free(output);
     output = NULL;
@@ -9513,13 +9513,13 @@
     PSA_ASSERT(psa_key_derivation_output_bytes(&operation,
                                                actual_output,
                                                expected_output1->len));
-    TEST_BUFFERS_EQUAL(actual_output, expected_output1->len,
+    TEST_MEMORY_COMPARE(actual_output, expected_output1->len,
                    expected_output1->x, expected_output1->len);
     if (expected_output2->len != 0) {
         PSA_ASSERT(psa_key_derivation_output_bytes(&operation,
                                                    actual_output,
                                                    expected_output2->len));
-        TEST_BUFFERS_EQUAL(actual_output, expected_output2->len,
+        TEST_MEMORY_COMPARE(actual_output, expected_output2->len,
                        expected_output2->x, expected_output2->len);
     }
 
@@ -9688,7 +9688,7 @@
     if (is_default_public_exponent) {
         TEST_EQUAL(e_read_length, 0);
     } else {
-        TEST_BUFFERS_EQUAL(e_read_buffer, e_read_length, e_arg->x, e_arg->len);
+        TEST_MEMORY_COMPARE(e_read_buffer, e_read_length, e_arg->x, e_arg->len);
     }
 
     /* Do something with the key according to its type and permitted usage. */
@@ -9724,7 +9724,7 @@
             TEST_EQUAL(p[1], 0);
             TEST_EQUAL(p[2], 1);
         } else {
-            TEST_BUFFERS_EQUAL(p, len, e_arg->x, e_arg->len);
+            TEST_MEMORY_COMPARE(p, len, e_arg->x, e_arg->len);
         }
     }
 
@@ -9833,7 +9833,7 @@
                                   first_export, export_size,
                                   &first_exported_length));
         if (generation_method == IMPORT_KEY) {
-            TEST_BUFFERS_EQUAL(data->x, data->len,
+            TEST_MEMORY_COMPARE(data->x, data->len,
                            first_export, first_exported_length);
         }
     }
@@ -9860,7 +9860,7 @@
         PSA_ASSERT(psa_export_key(key,
                                   second_export, export_size,
                                   &second_exported_length));
-        TEST_BUFFERS_EQUAL(first_export, first_exported_length,
+        TEST_MEMORY_COMPARE(first_export, first_exported_length,
                        second_export, second_exported_length);
     }