@@ -83,15 +83,15 @@ void key_type_classification( psa_key_type_t type, unsigned flags )
83
83
TEST_CLASSIFICATION_MACRO( KEY_TYPE_IS_ECC, type, flags );
84
84
85
85
/* Macros with derived semantics */
86
- TEST_ASSERT ( PSA_KEY_TYPE_IS_ASYMMETRIC( type ) ==
87
- ( PSA_KEY_TYPE_IS_PUBLIC_KEY( type ) ||
88
- PSA_KEY_TYPE_IS_KEYPAIR( type ) ) );
89
- TEST_ASSERT ( PSA_KEY_TYPE_IS_ECC_KEYPAIR( type ) ==
90
- ( PSA_KEY_TYPE_IS_ECC( type ) &&
91
- PSA_KEY_TYPE_IS_KEYPAIR( type ) ) );
92
- TEST_ASSERT ( PSA_KEY_TYPE_IS_ECC_PUBLIC_KEY( type ) ==
93
- ( PSA_KEY_TYPE_IS_ECC( type ) &&
94
- PSA_KEY_TYPE_IS_PUBLIC_KEY( type ) ) );
86
+ TEST_EQUAL ( PSA_KEY_TYPE_IS_ASYMMETRIC( type ),
87
+ ( PSA_KEY_TYPE_IS_PUBLIC_KEY( type ) ||
88
+ PSA_KEY_TYPE_IS_KEYPAIR( type ) ) );
89
+ TEST_EQUAL ( PSA_KEY_TYPE_IS_ECC_KEYPAIR( type ),
90
+ ( PSA_KEY_TYPE_IS_ECC( type ) &&
91
+ PSA_KEY_TYPE_IS_KEYPAIR( type ) ) );
92
+ TEST_EQUAL ( PSA_KEY_TYPE_IS_ECC_PUBLIC_KEY( type ),
93
+ ( PSA_KEY_TYPE_IS_ECC( type ) &&
94
+ PSA_KEY_TYPE_IS_PUBLIC_KEY( type ) ) );
95
95
96
96
exit: ;
97
97
}
@@ -113,7 +113,7 @@ void mac_algorithm_core( psa_algorithm_t alg, int classification_flags,
113
113
algorithm_classification( alg, classification_flags );
114
114
115
115
/* Length */
116
- TEST_ASSERT ( length == PSA_MAC_FINAL_SIZE( key_type, key_bits, alg ) );
116
+ TEST_EQUAL ( length, PSA_MAC_FINAL_SIZE( key_type, key_bits, alg ) );
117
117
118
118
exit: ;
119
119
}
@@ -134,7 +134,7 @@ void aead_algorithm_core( psa_algorithm_t alg, int classification_flags,
134
134
algorithm_classification( alg, classification_flags );
135
135
136
136
/* Tag length */
137
- TEST_ASSERT ( tag_length == PSA_AEAD_TAG_LENGTH( alg ) );
137
+ TEST_EQUAL ( tag_length, PSA_AEAD_TAG_LENGTH( alg ) );
138
138
139
139
exit: ;
140
140
}
@@ -174,18 +174,18 @@ void hash_algorithm( int alg_arg, int length_arg )
174
174
algorithm_classification( alg, 0 );
175
175
176
176
/* Dependent algorithms */
177
- TEST_ASSERT ( PSA_ALG_HMAC_GET_HASH( hmac_alg ) == alg );
178
- TEST_ASSERT ( PSA_ALG_SIGN_GET_HASH( rsa_pkcs1v15_sign_alg ) == alg );
179
- TEST_ASSERT ( PSA_ALG_SIGN_GET_HASH( rsa_pss_alg ) == alg );
180
- TEST_ASSERT ( PSA_ALG_SIGN_GET_HASH( dsa_alg ) == alg );
181
- TEST_ASSERT ( PSA_ALG_SIGN_GET_HASH( deterministic_dsa_alg ) == alg );
182
- TEST_ASSERT ( PSA_ALG_SIGN_GET_HASH( ecdsa_alg ) == alg );
183
- TEST_ASSERT ( PSA_ALG_SIGN_GET_HASH( deterministic_ecdsa_alg ) == alg );
184
- TEST_ASSERT ( PSA_ALG_RSA_OAEP_GET_HASH( rsa_oaep_alg ) == alg );
185
- TEST_ASSERT ( PSA_ALG_HKDF_GET_HASH( hkdf_alg ) == alg );
177
+ TEST_EQUAL ( PSA_ALG_HMAC_GET_HASH( hmac_alg ), alg );
178
+ TEST_EQUAL ( PSA_ALG_SIGN_GET_HASH( rsa_pkcs1v15_sign_alg ), alg );
179
+ TEST_EQUAL ( PSA_ALG_SIGN_GET_HASH( rsa_pss_alg ), alg );
180
+ TEST_EQUAL ( PSA_ALG_SIGN_GET_HASH( dsa_alg ), alg );
181
+ TEST_EQUAL ( PSA_ALG_SIGN_GET_HASH( deterministic_dsa_alg ), alg );
182
+ TEST_EQUAL ( PSA_ALG_SIGN_GET_HASH( ecdsa_alg ), alg );
183
+ TEST_EQUAL ( PSA_ALG_SIGN_GET_HASH( deterministic_ecdsa_alg ), alg );
184
+ TEST_EQUAL ( PSA_ALG_RSA_OAEP_GET_HASH( rsa_oaep_alg ), alg );
185
+ TEST_EQUAL ( PSA_ALG_HKDF_GET_HASH( hkdf_alg ), alg );
186
186
187
187
/* Hash length */
188
- TEST_ASSERT ( length == PSA_HASH_SIZE( alg ) );
188
+ TEST_EQUAL ( length, PSA_HASH_SIZE( alg ) );
189
189
TEST_ASSERT( length <= PSA_HASH_MAX_SIZE );
190
190
}
191
191
/* END_CASE */
@@ -203,7 +203,7 @@ void mac_algorithm( int alg_arg, int classification_flags,
203
203
204
204
mac_algorithm_core( alg, classification_flags,
205
205
key_type, key_bits, length );
206
- TEST_ASSERT ( PSA_ALG_FULL_LENGTH_MAC( alg ) == alg );
206
+ TEST_EQUAL ( PSA_ALG_FULL_LENGTH_MAC( alg ), alg );
207
207
TEST_ASSERT( length <= PSA_MAC_MAX_SIZE );
208
208
209
209
/* Truncated versions */
@@ -212,16 +212,16 @@ void mac_algorithm( int alg_arg, int classification_flags,
212
212
psa_algorithm_t truncated_alg = PSA_ALG_TRUNCATED_MAC( alg, n );
213
213
mac_algorithm_core( truncated_alg, classification_flags,
214
214
key_type, key_bits, n );
215
- TEST_ASSERT ( PSA_ALG_FULL_LENGTH_MAC( truncated_alg ) == alg );
215
+ TEST_EQUAL ( PSA_ALG_FULL_LENGTH_MAC( truncated_alg ), alg );
216
216
/* Check that calling PSA_ALG_TRUNCATED_MAC twice gives the length
217
217
* of the outer truncation (even if the outer length is smaller than
218
218
* the inner length). */
219
- TEST_ASSERT ( PSA_ALG_TRUNCATED_MAC( truncated_alg, 1 ) ==
220
- PSA_ALG_TRUNCATED_MAC( alg, 1 ) );
221
- TEST_ASSERT ( PSA_ALG_TRUNCATED_MAC( truncated_alg, length - 1 ) ==
222
- PSA_ALG_TRUNCATED_MAC( alg, length - 1) );
223
- TEST_ASSERT ( PSA_ALG_TRUNCATED_MAC( truncated_alg, length ) ==
224
- PSA_ALG_TRUNCATED_MAC( alg, length ) );
219
+ TEST_EQUAL ( PSA_ALG_TRUNCATED_MAC( truncated_alg, 1 ),
220
+ PSA_ALG_TRUNCATED_MAC( alg, 1 ) );
221
+ TEST_EQUAL ( PSA_ALG_TRUNCATED_MAC( truncated_alg, length - 1 ),
222
+ PSA_ALG_TRUNCATED_MAC( alg, length - 1) );
223
+ TEST_EQUAL ( PSA_ALG_TRUNCATED_MAC( truncated_alg, length ),
224
+ PSA_ALG_TRUNCATED_MAC( alg, length ) );
225
225
}
226
226
}
227
227
/* END_CASE */
@@ -238,7 +238,7 @@ void hmac_algorithm( int alg_arg,
238
238
size_t n;
239
239
240
240
TEST_ASSERT( PSA_ALG_IS_HASH( hash_alg ) );
241
- TEST_ASSERT ( PSA_ALG_HMAC( hash_alg ) == alg );
241
+ TEST_EQUAL ( PSA_ALG_HMAC( hash_alg ), alg );
242
242
243
243
TEST_ASSERT( block_size <= PSA_HMAC_MAX_HASH_BLOCK_SIZE );
244
244
@@ -248,7 +248,7 @@ void hmac_algorithm( int alg_arg,
248
248
for( n = 1; n <= length; n++ )
249
249
{
250
250
psa_algorithm_t truncated_alg = PSA_ALG_TRUNCATED_MAC( alg, n );
251
- TEST_ASSERT ( PSA_ALG_HMAC_GET_HASH( truncated_alg ) == hash_alg );
251
+ TEST_EQUAL ( PSA_ALG_HMAC_GET_HASH( truncated_alg ), hash_alg );
252
252
}
253
253
}
254
254
/* END_CASE */
@@ -287,19 +287,19 @@ void aead_algorithm( int alg_arg, int classification_flags,
287
287
{
288
288
psa_algorithm_t truncated_alg = PSA_ALG_AEAD_WITH_TAG_LENGTH( alg, n );
289
289
aead_algorithm_core( truncated_alg, classification_flags, n );
290
- TEST_ASSERT (
291
- PSA_ALG_AEAD_WITH_DEFAULT_TAG_LENGTH( truncated_alg ) == alg );
290
+ TEST_EQUAL (
291
+ PSA_ALG_AEAD_WITH_DEFAULT_TAG_LENGTH( truncated_alg ), alg );
292
292
/* Check that calling PSA_ALG_AEAD_WITH_DEFAULT_TAG_LENGTH twice gives
293
293
* the length of the outer truncation (even if the outer length is
294
294
* smaller than the inner length). */
295
- TEST_ASSERT (
296
- PSA_ALG_AEAD_WITH_TAG_LENGTH( truncated_alg, 1 ) ==
295
+ TEST_EQUAL (
296
+ PSA_ALG_AEAD_WITH_TAG_LENGTH( truncated_alg, 1 ),
297
297
PSA_ALG_AEAD_WITH_TAG_LENGTH( alg, 1 ) );
298
- TEST_ASSERT (
299
- PSA_ALG_AEAD_WITH_TAG_LENGTH( truncated_alg, tag_length - 1 ) ==
298
+ TEST_EQUAL (
299
+ PSA_ALG_AEAD_WITH_TAG_LENGTH( truncated_alg, tag_length - 1 ),
300
300
PSA_ALG_AEAD_WITH_TAG_LENGTH( alg, tag_length - 1) );
301
- TEST_ASSERT (
302
- PSA_ALG_AEAD_WITH_TAG_LENGTH( truncated_alg, tag_length ) ==
301
+ TEST_EQUAL (
302
+ PSA_ALG_AEAD_WITH_TAG_LENGTH( truncated_alg, tag_length ),
303
303
PSA_ALG_AEAD_WITH_TAG_LENGTH( alg, tag_length ) );
304
304
}
305
305
}
@@ -363,8 +363,8 @@ void key_derivation_algorithm( int alg_arg, int classification_flags )
363
363
/* Check combinations with key agreements */
364
364
TEST_ASSERT( PSA_ALG_IS_KEY_AGREEMENT( PSA_ALG_FFDH( alg ) ) );
365
365
TEST_ASSERT( PSA_ALG_IS_KEY_AGREEMENT( PSA_ALG_ECDH( alg ) ) );
366
- TEST_ASSERT ( PSA_ALG_KEY_AGREEMENT_GET_KDF( PSA_ALG_ECDH( alg ) ) == alg );
367
- TEST_ASSERT ( PSA_ALG_KEY_AGREEMENT_GET_KDF( PSA_ALG_FFDH( alg ) ) == alg );
366
+ TEST_EQUAL ( PSA_ALG_KEY_AGREEMENT_GET_KDF( PSA_ALG_ECDH( alg ) ), alg );
367
+ TEST_EQUAL ( PSA_ALG_KEY_AGREEMENT_GET_KDF( PSA_ALG_FFDH( alg ) ), alg );
368
368
}
369
369
/* END_CASE */
370
370
@@ -388,8 +388,8 @@ void key_selection_algorithm( int alg_arg, int classification_flags )
388
388
/* Check combinations with key agreements */
389
389
TEST_ASSERT( PSA_ALG_IS_KEY_AGREEMENT( PSA_ALG_FFDH( alg ) ) );
390
390
TEST_ASSERT( PSA_ALG_IS_KEY_AGREEMENT( PSA_ALG_ECDH( alg ) ) );
391
- TEST_ASSERT ( PSA_ALG_KEY_AGREEMENT_GET_KDF( PSA_ALG_ECDH( alg ) ) == alg );
392
- TEST_ASSERT ( PSA_ALG_KEY_AGREEMENT_GET_KDF( PSA_ALG_FFDH( alg ) ) == alg );
391
+ TEST_EQUAL ( PSA_ALG_KEY_AGREEMENT_GET_KDF( PSA_ALG_ECDH( alg ) ), alg );
392
+ TEST_EQUAL ( PSA_ALG_KEY_AGREEMENT_GET_KDF( PSA_ALG_FFDH( alg ) ), alg );
393
393
}
394
394
/* END_CASE */
395
395
@@ -416,7 +416,7 @@ void key_agreement_algorithm( int alg_arg, int classification_flags,
416
416
/* Shared secret derivation properties */
417
417
TEST_ASSERT( PSA_ALG_IS_KEY_DERIVATION( actual_post_alg ) ||
418
418
PSA_ALG_IS_KEY_SELECTION( actual_post_alg ) );
419
- TEST_ASSERT ( actual_post_alg == expected_post_alg );
419
+ TEST_EQUAL ( actual_post_alg, expected_post_alg );
420
420
}
421
421
/* END_CASE */
422
422
@@ -431,22 +431,22 @@ void key_type( int type_arg, int classification_flags )
431
431
if( classification_flags & KEY_TYPE_IS_PUBLIC_KEY )
432
432
{
433
433
psa_key_type_t pair_type = PSA_KEY_TYPE_KEYPAIR_OF_PUBLIC_KEY( type );
434
- TEST_ASSERT ( PSA_KEY_TYPE_PUBLIC_KEY_OF_KEYPAIR( pair_type ) == type );
434
+ TEST_EQUAL ( PSA_KEY_TYPE_PUBLIC_KEY_OF_KEYPAIR( pair_type ), type );
435
435
key_type_classification( pair_type,
436
436
( classification_flags
437
437
& ~KEY_TYPE_IS_PUBLIC_KEY )
438
438
| KEY_TYPE_IS_KEYPAIR );
439
- TEST_ASSERT ( PSA_KEY_TYPE_PUBLIC_KEY_OF_KEYPAIR( type ) == type );
439
+ TEST_EQUAL ( PSA_KEY_TYPE_PUBLIC_KEY_OF_KEYPAIR( type ), type );
440
440
}
441
441
if( classification_flags & KEY_TYPE_IS_KEYPAIR )
442
442
{
443
443
psa_key_type_t public_type = PSA_KEY_TYPE_PUBLIC_KEY_OF_KEYPAIR( type );
444
- TEST_ASSERT ( PSA_KEY_TYPE_KEYPAIR_OF_PUBLIC_KEY( public_type ) == type );
444
+ TEST_EQUAL ( PSA_KEY_TYPE_KEYPAIR_OF_PUBLIC_KEY( public_type ), type );
445
445
key_type_classification( public_type,
446
446
( classification_flags
447
447
& ~KEY_TYPE_IS_KEYPAIR )
448
448
| KEY_TYPE_IS_PUBLIC_KEY );
449
- TEST_ASSERT ( PSA_KEY_TYPE_KEYPAIR_OF_PUBLIC_KEY( type ) == type );
449
+ TEST_EQUAL ( PSA_KEY_TYPE_KEYPAIR_OF_PUBLIC_KEY( type ), type );
450
450
}
451
451
}
452
452
/* END_CASE */
@@ -462,8 +462,8 @@ void ecc_key_types( int curve_arg, int curve_bits_arg )
462
462
test_key_type( public_type, KEY_TYPE_IS_ECC | KEY_TYPE_IS_PUBLIC_KEY );
463
463
test_key_type( pair_type, KEY_TYPE_IS_ECC | KEY_TYPE_IS_KEYPAIR );
464
464
465
- TEST_ASSERT ( PSA_KEY_TYPE_GET_CURVE( public_type ) == curve );
466
- TEST_ASSERT ( PSA_KEY_TYPE_GET_CURVE( pair_type ) == curve );
465
+ TEST_EQUAL ( PSA_KEY_TYPE_GET_CURVE( public_type ), curve );
466
+ TEST_EQUAL ( PSA_KEY_TYPE_GET_CURVE( pair_type ), curve );
467
467
468
468
/* Validate that the bit size is less than the maximum ECC bit size
469
469
* in this implementation. There's no parameter that should be equal
0 commit comments