|
13 | 13 |
|
14 | 14 | #define MAX( x, y ) ( ( x ) > ( y ) ? ( x ) : ( y ) )
|
15 | 15 |
|
16 |
| -#if(UINT32_MAX > SIZE_MAX) |
17 |
| -#define PSA_CRYPTO_TEST_SIZE_T_RANGE( x ) ( ( x ) <= SIZE_MAX ) |
18 |
| -#else |
19 |
| -#define PSA_CRYPTO_TEST_SIZE_T_RANGE( x ) 1 |
20 |
| -#endif |
21 |
| - |
22 | 16 | /** An invalid export length that will never be set by psa_export_key(). */
|
23 | 17 | static const size_t INVALID_EXPORT_LENGTH = ~0U;
|
24 | 18 |
|
@@ -884,7 +878,6 @@ void import( data_t *data, int type, int expected_status_arg )
|
884 | 878 | psa_status_t status;
|
885 | 879 |
|
886 | 880 | TEST_ASSERT( data != NULL );
|
887 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( data->len ) ); |
888 | 881 | PSA_ASSERT( psa_crypto_init( ) );
|
889 | 882 |
|
890 | 883 | PSA_ASSERT( psa_allocate_key( type, KEY_BITS_FROM_DATA( type, data ),
|
@@ -1003,7 +996,6 @@ void import_export( data_t *data,
|
1003 | 996 | psa_key_policy_t policy;
|
1004 | 997 |
|
1005 | 998 | TEST_ASSERT( data != NULL );
|
1006 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( data->len ) ); |
1007 | 999 | export_size = (ptrdiff_t) data->len + export_size_delta;
|
1008 | 1000 | ASSERT_ALLOC( exported, export_size );
|
1009 | 1001 | if( ! canonical_input )
|
@@ -2016,9 +2008,6 @@ void mac_verify( int key_type_arg,
|
2016 | 2008 | TEST_ASSERT( key != NULL );
|
2017 | 2009 | TEST_ASSERT( input != NULL );
|
2018 | 2010 | TEST_ASSERT( expected_mac != NULL );
|
2019 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( key->len ) ); |
2020 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( input->len ) ); |
2021 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( expected_mac->len ) ); |
2022 | 2011 |
|
2023 | 2012 | PSA_ASSERT( psa_crypto_init( ) );
|
2024 | 2013 |
|
@@ -2104,9 +2093,6 @@ void cipher_encrypt( int alg_arg, int key_type_arg,
|
2104 | 2093 | TEST_ASSERT( key != NULL );
|
2105 | 2094 | TEST_ASSERT( input != NULL );
|
2106 | 2095 | TEST_ASSERT( expected_output != NULL );
|
2107 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( key->len ) ); |
2108 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( input->len ) ); |
2109 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( expected_output->len ) ); |
2110 | 2096 |
|
2111 | 2097 | iv_size = PSA_BLOCK_CIPHER_BLOCK_SIZE( key_type );
|
2112 | 2098 | memset( iv, 0x2a, iv_size );
|
@@ -2179,9 +2165,6 @@ void cipher_encrypt_multipart( int alg_arg, int key_type_arg,
|
2179 | 2165 | TEST_ASSERT( key != NULL );
|
2180 | 2166 | TEST_ASSERT( input != NULL );
|
2181 | 2167 | TEST_ASSERT( expected_output != NULL );
|
2182 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( key->len ) ); |
2183 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( input->len ) ); |
2184 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( expected_output->len ) ); |
2185 | 2168 |
|
2186 | 2169 | iv_size = PSA_BLOCK_CIPHER_BLOCK_SIZE( key_type );
|
2187 | 2170 | memset( iv, 0x2a, iv_size );
|
@@ -2257,9 +2240,6 @@ void cipher_decrypt_multipart( int alg_arg, int key_type_arg,
|
2257 | 2240 | TEST_ASSERT( key != NULL );
|
2258 | 2241 | TEST_ASSERT( input != NULL );
|
2259 | 2242 | TEST_ASSERT( expected_output != NULL );
|
2260 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( key->len ) ); |
2261 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( input->len ) ); |
2262 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( expected_output->len ) ); |
2263 | 2243 |
|
2264 | 2244 | iv_size = PSA_BLOCK_CIPHER_BLOCK_SIZE( key_type );
|
2265 | 2245 | memset( iv, 0x2a, iv_size );
|
@@ -2337,9 +2317,6 @@ void cipher_decrypt( int alg_arg, int key_type_arg,
|
2337 | 2317 | TEST_ASSERT( key != NULL );
|
2338 | 2318 | TEST_ASSERT( input != NULL );
|
2339 | 2319 | TEST_ASSERT( expected_output != NULL );
|
2340 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( key->len ) ); |
2341 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( input->len ) ); |
2342 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( expected_output->len ) ); |
2343 | 2320 |
|
2344 | 2321 | iv_size = PSA_BLOCK_CIPHER_BLOCK_SIZE( key_type );
|
2345 | 2322 | memset( iv, 0x2a, iv_size );
|
@@ -2415,8 +2392,6 @@ void cipher_verify_output( int alg_arg, int key_type_arg,
|
2415 | 2392 |
|
2416 | 2393 | TEST_ASSERT( key != NULL );
|
2417 | 2394 | TEST_ASSERT( input != NULL );
|
2418 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( key->len ) ); |
2419 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( input->len ) ); |
2420 | 2395 |
|
2421 | 2396 | PSA_ASSERT( psa_crypto_init( ) );
|
2422 | 2397 |
|
@@ -2506,8 +2481,6 @@ void cipher_verify_output_multipart( int alg_arg,
|
2506 | 2481 |
|
2507 | 2482 | TEST_ASSERT( key != NULL );
|
2508 | 2483 | TEST_ASSERT( input != NULL );
|
2509 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( key->len ) ); |
2510 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( input->len ) ); |
2511 | 2484 |
|
2512 | 2485 | PSA_ASSERT( psa_crypto_init( ) );
|
2513 | 2486 |
|
@@ -2614,10 +2587,6 @@ void aead_encrypt_decrypt( int key_type_arg, data_t *key_data,
|
2614 | 2587 | TEST_ASSERT( input_data != NULL );
|
2615 | 2588 | TEST_ASSERT( nonce != NULL );
|
2616 | 2589 | TEST_ASSERT( additional_data != NULL );
|
2617 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( key_data->len ) ); |
2618 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( input_data->len ) ); |
2619 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( nonce->len ) ); |
2620 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( additional_data->len ) ); |
2621 | 2590 |
|
2622 | 2591 | output_size = input_data->len + tag_length;
|
2623 | 2592 | ASSERT_ALLOC( output_data, output_size );
|
@@ -2691,11 +2660,6 @@ void aead_encrypt( int key_type_arg, data_t *key_data,
|
2691 | 2660 | TEST_ASSERT( additional_data != NULL );
|
2692 | 2661 | TEST_ASSERT( nonce != NULL );
|
2693 | 2662 | TEST_ASSERT( expected_result != NULL );
|
2694 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( key_data->len ) ); |
2695 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( input_data->len ) ); |
2696 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( additional_data->len ) ); |
2697 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( nonce->len ) ); |
2698 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( expected_result->len ) ); |
2699 | 2663 |
|
2700 | 2664 | output_size = input_data->len + tag_length;
|
2701 | 2665 | ASSERT_ALLOC( output_data, output_size );
|
@@ -2753,11 +2717,6 @@ void aead_decrypt( int key_type_arg, data_t *key_data,
|
2753 | 2717 | TEST_ASSERT( additional_data != NULL );
|
2754 | 2718 | TEST_ASSERT( nonce != NULL );
|
2755 | 2719 | TEST_ASSERT( expected_data != NULL );
|
2756 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( key_data->len ) ); |
2757 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( input_data->len ) ); |
2758 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( additional_data->len ) ); |
2759 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( nonce->len ) ); |
2760 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( expected_data->len ) ); |
2761 | 2720 |
|
2762 | 2721 | output_size = input_data->len + tag_length;
|
2763 | 2722 | ASSERT_ALLOC( output_data, output_size );
|
@@ -2826,9 +2785,6 @@ void sign_deterministic( int key_type_arg, data_t *key_data,
|
2826 | 2785 | TEST_ASSERT( key_data != NULL );
|
2827 | 2786 | TEST_ASSERT( input_data != NULL );
|
2828 | 2787 | TEST_ASSERT( output_data != NULL );
|
2829 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( key_data->len ) ); |
2830 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( input_data->len ) ); |
2831 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( output_data->len ) ); |
2832 | 2788 |
|
2833 | 2789 | PSA_ASSERT( psa_crypto_init( ) );
|
2834 | 2790 |
|
@@ -2887,8 +2843,6 @@ void sign_fail( int key_type_arg, data_t *key_data,
|
2887 | 2843 |
|
2888 | 2844 | TEST_ASSERT( key_data != NULL );
|
2889 | 2845 | TEST_ASSERT( input_data != NULL );
|
2890 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( key_data->len ) ); |
2891 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( input_data->len ) ); |
2892 | 2846 |
|
2893 | 2847 | ASSERT_ALLOC( signature, signature_size );
|
2894 | 2848 |
|
@@ -3011,9 +2965,6 @@ void asymmetric_verify( int key_type_arg, data_t *key_data,
|
3011 | 2965 | TEST_ASSERT( key_data != NULL );
|
3012 | 2966 | TEST_ASSERT( hash_data != NULL );
|
3013 | 2967 | TEST_ASSERT( signature_data != NULL );
|
3014 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( key_data->len ) ); |
3015 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( hash_data->len ) ); |
3016 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( signature_data->len ) ); |
3017 | 2968 |
|
3018 | 2969 | PSA_ASSERT( psa_crypto_init( ) );
|
3019 | 2970 |
|
@@ -3054,9 +3005,6 @@ void asymmetric_verify_fail( int key_type_arg, data_t *key_data,
|
3054 | 3005 | TEST_ASSERT( key_data != NULL );
|
3055 | 3006 | TEST_ASSERT( hash_data != NULL );
|
3056 | 3007 | TEST_ASSERT( signature_data != NULL );
|
3057 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( key_data->len ) ); |
3058 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( hash_data->len ) ); |
3059 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( signature_data->len ) ); |
3060 | 3008 |
|
3061 | 3009 | PSA_ASSERT( psa_crypto_init( ) );
|
3062 | 3010 |
|
@@ -3178,8 +3126,6 @@ void asymmetric_encrypt_decrypt( int key_type_arg,
|
3178 | 3126 |
|
3179 | 3127 | TEST_ASSERT( key_data != NULL );
|
3180 | 3128 | TEST_ASSERT( input_data != NULL );
|
3181 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( key_data->len ) ); |
3182 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( input_data->len ) ); |
3183 | 3129 |
|
3184 | 3130 | PSA_ASSERT( psa_crypto_init( ) );
|
3185 | 3131 |
|
@@ -3252,9 +3198,6 @@ void asymmetric_decrypt( int key_type_arg,
|
3252 | 3198 | TEST_ASSERT( key_data != NULL );
|
3253 | 3199 | TEST_ASSERT( input_data != NULL );
|
3254 | 3200 | TEST_ASSERT( expected_data != NULL );
|
3255 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( key_data->len ) ); |
3256 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( input_data->len ) ); |
3257 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( expected_data->len ) ); |
3258 | 3201 |
|
3259 | 3202 | output_size = key_data->len;
|
3260 | 3203 | ASSERT_ALLOC( output, output_size );
|
@@ -3325,8 +3268,6 @@ void asymmetric_decrypt_fail( int key_type_arg,
|
3325 | 3268 |
|
3326 | 3269 | TEST_ASSERT( key_data != NULL );
|
3327 | 3270 | TEST_ASSERT( input_data != NULL );
|
3328 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( key_data->len ) ); |
3329 |
| - TEST_ASSERT( PSA_CRYPTO_TEST_SIZE_T_RANGE( input_data->len ) ); |
3330 | 3271 |
|
3331 | 3272 | output_size = key_data->len;
|
3332 | 3273 | ASSERT_ALLOC( output, output_size );
|
|
0 commit comments