initialize length variables and process decrypt only when encrypts passes
diff --git a/tests/suites/test_suite_psa_crypto.function b/tests/suites/test_suite_psa_crypto.function
index b592c6e..93bb9cc 100755
--- a/tests/suites/test_suite_psa_crypto.function
+++ b/tests/suites/test_suite_psa_crypto.function
@@ -589,9 +589,9 @@
size_t input_size;
unsigned char *output_data = NULL;
size_t output_size = 0;
- size_t output_length;
+ size_t output_length = 0;
unsigned char *output_data2 = NULL;
- size_t output_length2;
+ size_t output_length2 = 0;
uint8_t nonce[16];
size_t nonce_length = 16;
size_t tag_length = 16;
@@ -629,19 +629,20 @@
input_data, input_size, output_data,
output_size, &output_length ) == expected_result );
- output_data2 = mbedtls_calloc( 1, output_length );
- TEST_ASSERT( output_data2 != NULL );
-
- TEST_ASSERT( psa_aead_decrypt( slot, alg,
- nonce, nonce_length,
- additional_data, additional_data_length,
- output_data, output_length - tag_length, output_data2,
- output_length, &output_length2 ) == expected_result );
-
if( PSA_SUCCESS == expected_result )
{
+ output_data2 = mbedtls_calloc( 1, output_length );
+ TEST_ASSERT( output_data2 != NULL );
+
+ TEST_ASSERT( psa_aead_decrypt( slot, alg,
+ nonce, nonce_length,
+ additional_data, additional_data_length,
+ output_data, output_length - tag_length, output_data2,
+ output_length, &output_length2 ) == expected_result );
+
+
TEST_ASSERT( memcmp( input_data, output_data2,
- input_size ) == 0 );
+ input_size ) == 0 );
}