@@ -877,7 +877,6 @@ void import( data_t *data, int type, int expected_status_arg )
877
877
psa_status_t expected_status = expected_status_arg;
878
878
psa_status_t status;
879
879
880
- TEST_ASSERT( data != NULL );
881
880
PSA_ASSERT( psa_crypto_init( ) );
882
881
883
882
PSA_ASSERT( psa_allocate_key( type, KEY_BITS_FROM_DATA( type, data ),
@@ -995,7 +994,6 @@ void import_export( data_t *data,
995
994
size_t got_bits;
996
995
psa_key_policy_t policy;
997
996
998
- TEST_ASSERT( data != NULL );
999
997
export_size = (ptrdiff_t) data->len + export_size_delta;
1000
998
ASSERT_ALLOC( exported, export_size );
1001
999
if( ! canonical_input )
@@ -2005,10 +2003,6 @@ void mac_verify( int key_type_arg,
2005
2003
2006
2004
TEST_ASSERT( expected_mac->len <= PSA_MAC_MAX_SIZE );
2007
2005
2008
- TEST_ASSERT( key != NULL );
2009
- TEST_ASSERT( input != NULL );
2010
- TEST_ASSERT( expected_mac != NULL );
2011
-
2012
2006
PSA_ASSERT( psa_crypto_init( ) );
2013
2007
2014
2008
PSA_ASSERT( psa_allocate_key( key_type, PSA_BYTES_TO_BITS( key->len ),
@@ -2090,10 +2084,6 @@ void cipher_encrypt( int alg_arg, int key_type_arg,
2090
2084
psa_cipher_operation_t operation;
2091
2085
psa_key_policy_t policy;
2092
2086
2093
- TEST_ASSERT( key != NULL );
2094
- TEST_ASSERT( input != NULL );
2095
- TEST_ASSERT( expected_output != NULL );
2096
-
2097
2087
iv_size = PSA_BLOCK_CIPHER_BLOCK_SIZE( key_type );
2098
2088
memset( iv, 0x2a, iv_size );
2099
2089
@@ -2162,10 +2152,6 @@ void cipher_encrypt_multipart( int alg_arg, int key_type_arg,
2162
2152
psa_cipher_operation_t operation;
2163
2153
psa_key_policy_t policy;
2164
2154
2165
- TEST_ASSERT( key != NULL );
2166
- TEST_ASSERT( input != NULL );
2167
- TEST_ASSERT( expected_output != NULL );
2168
-
2169
2155
iv_size = PSA_BLOCK_CIPHER_BLOCK_SIZE( key_type );
2170
2156
memset( iv, 0x2a, iv_size );
2171
2157
@@ -2237,10 +2223,6 @@ void cipher_decrypt_multipart( int alg_arg, int key_type_arg,
2237
2223
psa_cipher_operation_t operation;
2238
2224
psa_key_policy_t policy;
2239
2225
2240
- TEST_ASSERT( key != NULL );
2241
- TEST_ASSERT( input != NULL );
2242
- TEST_ASSERT( expected_output != NULL );
2243
-
2244
2226
iv_size = PSA_BLOCK_CIPHER_BLOCK_SIZE( key_type );
2245
2227
memset( iv, 0x2a, iv_size );
2246
2228
@@ -2314,10 +2296,6 @@ void cipher_decrypt( int alg_arg, int key_type_arg,
2314
2296
psa_cipher_operation_t operation;
2315
2297
psa_key_policy_t policy;
2316
2298
2317
- TEST_ASSERT( key != NULL );
2318
- TEST_ASSERT( input != NULL );
2319
- TEST_ASSERT( expected_output != NULL );
2320
-
2321
2299
iv_size = PSA_BLOCK_CIPHER_BLOCK_SIZE( key_type );
2322
2300
memset( iv, 0x2a, iv_size );
2323
2301
@@ -2390,9 +2368,6 @@ void cipher_verify_output( int alg_arg, int key_type_arg,
2390
2368
psa_cipher_operation_t operation2;
2391
2369
psa_key_policy_t policy;
2392
2370
2393
- TEST_ASSERT( key != NULL );
2394
- TEST_ASSERT( input != NULL );
2395
-
2396
2371
PSA_ASSERT( psa_crypto_init( ) );
2397
2372
2398
2373
PSA_ASSERT( psa_allocate_key( key_type, PSA_BYTES_TO_BITS( key->len ),
@@ -2479,9 +2454,6 @@ void cipher_verify_output_multipart( int alg_arg,
2479
2454
psa_cipher_operation_t operation2;
2480
2455
psa_key_policy_t policy;
2481
2456
2482
- TEST_ASSERT( key != NULL );
2483
- TEST_ASSERT( input != NULL );
2484
-
2485
2457
PSA_ASSERT( psa_crypto_init( ) );
2486
2458
2487
2459
PSA_ASSERT( psa_allocate_key( key_type, PSA_BYTES_TO_BITS( key->len ),
@@ -2583,11 +2555,6 @@ void aead_encrypt_decrypt( int key_type_arg, data_t *key_data,
2583
2555
psa_status_t expected_result = expected_result_arg;
2584
2556
psa_key_policy_t policy;
2585
2557
2586
- TEST_ASSERT( key_data != NULL );
2587
- TEST_ASSERT( input_data != NULL );
2588
- TEST_ASSERT( nonce != NULL );
2589
- TEST_ASSERT( additional_data != NULL );
2590
-
2591
2558
output_size = input_data->len + tag_length;
2592
2559
ASSERT_ALLOC( output_data, output_size );
2593
2560
@@ -2655,12 +2622,6 @@ void aead_encrypt( int key_type_arg, data_t *key_data,
2655
2622
size_t tag_length = 16;
2656
2623
psa_key_policy_t policy;
2657
2624
2658
- TEST_ASSERT( key_data != NULL );
2659
- TEST_ASSERT( input_data != NULL );
2660
- TEST_ASSERT( additional_data != NULL );
2661
- TEST_ASSERT( nonce != NULL );
2662
- TEST_ASSERT( expected_result != NULL );
2663
-
2664
2625
output_size = input_data->len + tag_length;
2665
2626
ASSERT_ALLOC( output_data, output_size );
2666
2627
@@ -2712,12 +2673,6 @@ void aead_decrypt( int key_type_arg, data_t *key_data,
2712
2673
psa_key_policy_t policy;
2713
2674
psa_status_t expected_result = expected_result_arg;
2714
2675
2715
- TEST_ASSERT( key_data != NULL );
2716
- TEST_ASSERT( input_data != NULL );
2717
- TEST_ASSERT( additional_data != NULL );
2718
- TEST_ASSERT( nonce != NULL );
2719
- TEST_ASSERT( expected_data != NULL );
2720
-
2721
2676
output_size = input_data->len + tag_length;
2722
2677
ASSERT_ALLOC( output_data, output_size );
2723
2678
@@ -2782,10 +2737,6 @@ void sign_deterministic( int key_type_arg, data_t *key_data,
2782
2737
size_t signature_length = 0xdeadbeef;
2783
2738
psa_key_policy_t policy;
2784
2739
2785
- TEST_ASSERT( key_data != NULL );
2786
- TEST_ASSERT( input_data != NULL );
2787
- TEST_ASSERT( output_data != NULL );
2788
-
2789
2740
PSA_ASSERT( psa_crypto_init( ) );
2790
2741
2791
2742
PSA_ASSERT( psa_allocate_key( key_type,
@@ -2841,9 +2792,6 @@ void sign_fail( int key_type_arg, data_t *key_data,
2841
2792
size_t signature_length = 0xdeadbeef;
2842
2793
psa_key_policy_t policy;
2843
2794
2844
- TEST_ASSERT( key_data != NULL );
2845
- TEST_ASSERT( input_data != NULL );
2846
-
2847
2795
ASSERT_ALLOC( signature, signature_size );
2848
2796
2849
2797
PSA_ASSERT( psa_crypto_init( ) );
@@ -2962,10 +2910,6 @@ void asymmetric_verify( int key_type_arg, data_t *key_data,
2962
2910
2963
2911
TEST_ASSERT( signature_data->len <= PSA_ASYMMETRIC_SIGNATURE_MAX_SIZE );
2964
2912
2965
- TEST_ASSERT( key_data != NULL );
2966
- TEST_ASSERT( hash_data != NULL );
2967
- TEST_ASSERT( signature_data != NULL );
2968
-
2969
2913
PSA_ASSERT( psa_crypto_init( ) );
2970
2914
2971
2915
PSA_ASSERT( psa_allocate_key( key_type,
@@ -3002,10 +2946,6 @@ void asymmetric_verify_fail( int key_type_arg, data_t *key_data,
3002
2946
psa_status_t expected_status = expected_status_arg;
3003
2947
psa_key_policy_t policy;
3004
2948
3005
- TEST_ASSERT( key_data != NULL );
3006
- TEST_ASSERT( hash_data != NULL );
3007
- TEST_ASSERT( signature_data != NULL );
3008
-
3009
2949
PSA_ASSERT( psa_crypto_init( ) );
3010
2950
3011
2951
PSA_ASSERT( psa_allocate_key( key_type,
@@ -3124,9 +3064,6 @@ void asymmetric_encrypt_decrypt( int key_type_arg,
3124
3064
size_t output2_length = ~0;
3125
3065
psa_key_policy_t policy;
3126
3066
3127
- TEST_ASSERT( key_data != NULL );
3128
- TEST_ASSERT( input_data != NULL );
3129
-
3130
3067
PSA_ASSERT( psa_crypto_init( ) );
3131
3068
3132
3069
PSA_ASSERT( psa_allocate_key( key_type,
@@ -3195,10 +3132,6 @@ void asymmetric_decrypt( int key_type_arg,
3195
3132
size_t output_length = ~0;
3196
3133
psa_key_policy_t policy;
3197
3134
3198
- TEST_ASSERT( key_data != NULL );
3199
- TEST_ASSERT( input_data != NULL );
3200
- TEST_ASSERT( expected_data != NULL );
3201
-
3202
3135
output_size = key_data->len;
3203
3136
ASSERT_ALLOC( output, output_size );
3204
3137
@@ -3266,9 +3199,6 @@ void asymmetric_decrypt_fail( int key_type_arg,
3266
3199
psa_status_t expected_status = expected_status_arg;
3267
3200
psa_key_policy_t policy;
3268
3201
3269
- TEST_ASSERT( key_data != NULL );
3270
- TEST_ASSERT( input_data != NULL );
3271
-
3272
3202
output_size = key_data->len;
3273
3203
ASSERT_ALLOC( output, output_size );
3274
3204
0 commit comments