test/crypto: remove some PMD specific null tests
This patch removes the OCTEON TX and OCTEON TX2 PMDs specific test cases related to null cipher. Signed-off-by: Ankur Dwivedi <adwivedi@marvell.com> Signed-off-by: Anoob Joseph <anoobj@marvell.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com>
This commit is contained in:
parent
cec2f173a9
commit
9fb409df70
@ -9758,361 +9758,10 @@ test_multi_session_random_usage(void)
|
|||||||
return TEST_SUCCESS;
|
return TEST_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int
|
|
||||||
test_null_cipher_only_operation(void)
|
|
||||||
{
|
|
||||||
struct crypto_testsuite_params *ts_params = &testsuite_params;
|
|
||||||
struct crypto_unittest_params *ut_params = &unittest_params;
|
|
||||||
|
|
||||||
/* Verify the capabilities */
|
|
||||||
struct rte_cryptodev_sym_capability_idx cap_idx;
|
|
||||||
cap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER;
|
|
||||||
cap_idx.algo.cipher = RTE_CRYPTO_CIPHER_NULL;
|
|
||||||
if (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],
|
|
||||||
&cap_idx) == NULL)
|
|
||||||
return -ENOTSUP;
|
|
||||||
|
|
||||||
/* Generate test mbuf data and space for digest */
|
|
||||||
ut_params->ibuf = setup_test_string(ts_params->mbuf_pool,
|
|
||||||
catch_22_quote, QUOTE_512_BYTES, 0);
|
|
||||||
|
|
||||||
/* Setup Cipher Parameters */
|
|
||||||
ut_params->cipher_xform.type = RTE_CRYPTO_SYM_XFORM_CIPHER;
|
|
||||||
ut_params->cipher_xform.next = NULL;
|
|
||||||
|
|
||||||
ut_params->cipher_xform.cipher.algo = RTE_CRYPTO_CIPHER_NULL;
|
|
||||||
ut_params->cipher_xform.cipher.op = RTE_CRYPTO_CIPHER_OP_ENCRYPT;
|
|
||||||
|
|
||||||
ut_params->sess = rte_cryptodev_sym_session_create(
|
|
||||||
ts_params->session_mpool);
|
|
||||||
|
|
||||||
/* Create Crypto session*/
|
|
||||||
rte_cryptodev_sym_session_init(ts_params->valid_devs[0],
|
|
||||||
ut_params->sess,
|
|
||||||
&ut_params->cipher_xform,
|
|
||||||
ts_params->session_priv_mpool);
|
|
||||||
TEST_ASSERT_NOT_NULL(ut_params->sess, "Session creation failed");
|
|
||||||
|
|
||||||
/* Generate Crypto op data structure */
|
|
||||||
ut_params->op = rte_crypto_op_alloc(ts_params->op_mpool,
|
|
||||||
RTE_CRYPTO_OP_TYPE_SYMMETRIC);
|
|
||||||
TEST_ASSERT_NOT_NULL(ut_params->op,
|
|
||||||
"Failed to allocate symmetric crypto operation struct");
|
|
||||||
|
|
||||||
/* Set crypto operation data parameters */
|
|
||||||
rte_crypto_op_attach_sym_session(ut_params->op, ut_params->sess);
|
|
||||||
|
|
||||||
struct rte_crypto_sym_op *sym_op = ut_params->op->sym;
|
|
||||||
|
|
||||||
/* set crypto operation source mbuf */
|
|
||||||
sym_op->m_src = ut_params->ibuf;
|
|
||||||
|
|
||||||
sym_op->cipher.data.offset = 0;
|
|
||||||
sym_op->cipher.data.length = QUOTE_512_BYTES;
|
|
||||||
|
|
||||||
/* Process crypto operation */
|
|
||||||
ut_params->op = process_crypto_request(ts_params->valid_devs[0],
|
|
||||||
ut_params->op);
|
|
||||||
TEST_ASSERT_NOT_NULL(ut_params->op, "no crypto operation returned");
|
|
||||||
|
|
||||||
TEST_ASSERT_EQUAL(ut_params->op->status, RTE_CRYPTO_OP_STATUS_SUCCESS,
|
|
||||||
"crypto operation processing failed");
|
|
||||||
|
|
||||||
/* Validate obuf */
|
|
||||||
TEST_ASSERT_BUFFERS_ARE_EQUAL(
|
|
||||||
rte_pktmbuf_mtod(ut_params->op->sym->m_src, uint8_t *),
|
|
||||||
catch_22_quote,
|
|
||||||
QUOTE_512_BYTES,
|
|
||||||
"Ciphertext data not as expected");
|
|
||||||
|
|
||||||
return TEST_SUCCESS;
|
|
||||||
}
|
|
||||||
uint8_t orig_data[] = {0xab, 0xab, 0xab, 0xab,
|
uint8_t orig_data[] = {0xab, 0xab, 0xab, 0xab,
|
||||||
0xab, 0xab, 0xab, 0xab,
|
0xab, 0xab, 0xab, 0xab,
|
||||||
0xab, 0xab, 0xab, 0xab,
|
0xab, 0xab, 0xab, 0xab,
|
||||||
0xab, 0xab, 0xab, 0xab};
|
0xab, 0xab, 0xab, 0xab};
|
||||||
static int
|
|
||||||
test_null_auth_only_operation(void)
|
|
||||||
{
|
|
||||||
struct crypto_testsuite_params *ts_params = &testsuite_params;
|
|
||||||
struct crypto_unittest_params *ut_params = &unittest_params;
|
|
||||||
uint8_t *digest;
|
|
||||||
|
|
||||||
/* Verify the capabilities */
|
|
||||||
struct rte_cryptodev_sym_capability_idx cap_idx;
|
|
||||||
cap_idx.type = RTE_CRYPTO_SYM_XFORM_AUTH;
|
|
||||||
cap_idx.algo.auth = RTE_CRYPTO_AUTH_NULL;
|
|
||||||
if (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],
|
|
||||||
&cap_idx) == NULL)
|
|
||||||
return -ENOTSUP;
|
|
||||||
|
|
||||||
/* Generate test mbuf data and space for digest */
|
|
||||||
ut_params->ibuf = setup_test_string(ts_params->mbuf_pool,
|
|
||||||
catch_22_quote, QUOTE_512_BYTES, 0);
|
|
||||||
|
|
||||||
/* create a pointer for digest, but don't expect anything to be written
|
|
||||||
* here in a NULL auth algo so no mbuf append done.
|
|
||||||
*/
|
|
||||||
digest = rte_pktmbuf_mtod_offset(ut_params->ibuf, uint8_t *,
|
|
||||||
QUOTE_512_BYTES);
|
|
||||||
/* prefill the memory pointed to by digest */
|
|
||||||
memcpy(digest, orig_data, sizeof(orig_data));
|
|
||||||
|
|
||||||
/* Setup HMAC Parameters */
|
|
||||||
ut_params->auth_xform.type = RTE_CRYPTO_SYM_XFORM_AUTH;
|
|
||||||
ut_params->auth_xform.next = NULL;
|
|
||||||
|
|
||||||
ut_params->auth_xform.auth.algo = RTE_CRYPTO_AUTH_NULL;
|
|
||||||
ut_params->auth_xform.auth.op = RTE_CRYPTO_AUTH_OP_GENERATE;
|
|
||||||
|
|
||||||
ut_params->sess = rte_cryptodev_sym_session_create(
|
|
||||||
ts_params->session_mpool);
|
|
||||||
|
|
||||||
/* Create Crypto session*/
|
|
||||||
rte_cryptodev_sym_session_init(ts_params->valid_devs[0],
|
|
||||||
ut_params->sess, &ut_params->auth_xform,
|
|
||||||
ts_params->session_priv_mpool);
|
|
||||||
TEST_ASSERT_NOT_NULL(ut_params->sess, "Session creation failed");
|
|
||||||
|
|
||||||
/* Generate Crypto op data structure */
|
|
||||||
ut_params->op = rte_crypto_op_alloc(ts_params->op_mpool,
|
|
||||||
RTE_CRYPTO_OP_TYPE_SYMMETRIC);
|
|
||||||
TEST_ASSERT_NOT_NULL(ut_params->op,
|
|
||||||
"Failed to allocate symmetric crypto operation struct");
|
|
||||||
|
|
||||||
/* Set crypto operation data parameters */
|
|
||||||
rte_crypto_op_attach_sym_session(ut_params->op, ut_params->sess);
|
|
||||||
|
|
||||||
struct rte_crypto_sym_op *sym_op = ut_params->op->sym;
|
|
||||||
|
|
||||||
sym_op->m_src = ut_params->ibuf;
|
|
||||||
|
|
||||||
sym_op->auth.data.offset = 0;
|
|
||||||
sym_op->auth.data.length = QUOTE_512_BYTES;
|
|
||||||
sym_op->auth.digest.data = digest;
|
|
||||||
sym_op->auth.digest.phys_addr = rte_pktmbuf_iova_offset(ut_params->ibuf,
|
|
||||||
QUOTE_512_BYTES);
|
|
||||||
|
|
||||||
/* Process crypto operation */
|
|
||||||
ut_params->op = process_crypto_request(ts_params->valid_devs[0],
|
|
||||||
ut_params->op);
|
|
||||||
TEST_ASSERT_NOT_NULL(ut_params->op, "no crypto operation returned");
|
|
||||||
|
|
||||||
TEST_ASSERT_EQUAL(ut_params->op->status, RTE_CRYPTO_OP_STATUS_SUCCESS,
|
|
||||||
"crypto operation processing failed");
|
|
||||||
/* Make sure memory pointed to by digest hasn't been overwritten */
|
|
||||||
TEST_ASSERT_BUFFERS_ARE_EQUAL(
|
|
||||||
orig_data,
|
|
||||||
digest,
|
|
||||||
sizeof(orig_data),
|
|
||||||
"Memory at digest ptr overwritten unexpectedly");
|
|
||||||
|
|
||||||
return TEST_SUCCESS;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
static int
|
|
||||||
test_null_cipher_auth_operation(void)
|
|
||||||
{
|
|
||||||
struct crypto_testsuite_params *ts_params = &testsuite_params;
|
|
||||||
struct crypto_unittest_params *ut_params = &unittest_params;
|
|
||||||
uint8_t *digest;
|
|
||||||
|
|
||||||
/* Verify the capabilities */
|
|
||||||
struct rte_cryptodev_sym_capability_idx cap_idx;
|
|
||||||
cap_idx.type = RTE_CRYPTO_SYM_XFORM_AUTH;
|
|
||||||
cap_idx.algo.auth = RTE_CRYPTO_AUTH_NULL;
|
|
||||||
if (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],
|
|
||||||
&cap_idx) == NULL)
|
|
||||||
return -ENOTSUP;
|
|
||||||
cap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER;
|
|
||||||
cap_idx.algo.cipher = RTE_CRYPTO_CIPHER_NULL;
|
|
||||||
if (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],
|
|
||||||
&cap_idx) == NULL)
|
|
||||||
return -ENOTSUP;
|
|
||||||
|
|
||||||
/* Generate test mbuf data and space for digest */
|
|
||||||
ut_params->ibuf = setup_test_string(ts_params->mbuf_pool,
|
|
||||||
catch_22_quote, QUOTE_512_BYTES, 0);
|
|
||||||
|
|
||||||
/* create a pointer for digest, but don't expect anything to be written
|
|
||||||
* here in a NULL auth algo so no mbuf append done.
|
|
||||||
*/
|
|
||||||
digest = rte_pktmbuf_mtod_offset(ut_params->ibuf, uint8_t *,
|
|
||||||
QUOTE_512_BYTES);
|
|
||||||
/* prefill the memory pointed to by digest */
|
|
||||||
memcpy(digest, orig_data, sizeof(orig_data));
|
|
||||||
|
|
||||||
/* Setup Cipher Parameters */
|
|
||||||
ut_params->cipher_xform.type = RTE_CRYPTO_SYM_XFORM_CIPHER;
|
|
||||||
ut_params->cipher_xform.next = &ut_params->auth_xform;
|
|
||||||
|
|
||||||
ut_params->cipher_xform.cipher.algo = RTE_CRYPTO_CIPHER_NULL;
|
|
||||||
ut_params->cipher_xform.cipher.op = RTE_CRYPTO_CIPHER_OP_ENCRYPT;
|
|
||||||
|
|
||||||
/* Setup HMAC Parameters */
|
|
||||||
ut_params->auth_xform.type = RTE_CRYPTO_SYM_XFORM_AUTH;
|
|
||||||
ut_params->auth_xform.next = NULL;
|
|
||||||
|
|
||||||
ut_params->auth_xform.auth.algo = RTE_CRYPTO_AUTH_NULL;
|
|
||||||
ut_params->auth_xform.auth.op = RTE_CRYPTO_AUTH_OP_GENERATE;
|
|
||||||
|
|
||||||
ut_params->sess = rte_cryptodev_sym_session_create(
|
|
||||||
ts_params->session_mpool);
|
|
||||||
|
|
||||||
/* Create Crypto session*/
|
|
||||||
rte_cryptodev_sym_session_init(ts_params->valid_devs[0],
|
|
||||||
ut_params->sess, &ut_params->cipher_xform,
|
|
||||||
ts_params->session_priv_mpool);
|
|
||||||
TEST_ASSERT_NOT_NULL(ut_params->sess, "Session creation failed");
|
|
||||||
|
|
||||||
/* Generate Crypto op data structure */
|
|
||||||
ut_params->op = rte_crypto_op_alloc(ts_params->op_mpool,
|
|
||||||
RTE_CRYPTO_OP_TYPE_SYMMETRIC);
|
|
||||||
TEST_ASSERT_NOT_NULL(ut_params->op,
|
|
||||||
"Failed to allocate symmetric crypto operation struct");
|
|
||||||
|
|
||||||
/* Set crypto operation data parameters */
|
|
||||||
rte_crypto_op_attach_sym_session(ut_params->op, ut_params->sess);
|
|
||||||
|
|
||||||
struct rte_crypto_sym_op *sym_op = ut_params->op->sym;
|
|
||||||
|
|
||||||
sym_op->m_src = ut_params->ibuf;
|
|
||||||
|
|
||||||
sym_op->cipher.data.offset = 0;
|
|
||||||
sym_op->cipher.data.length = QUOTE_512_BYTES;
|
|
||||||
|
|
||||||
sym_op->auth.data.offset = 0;
|
|
||||||
sym_op->auth.data.length = QUOTE_512_BYTES;
|
|
||||||
sym_op->auth.digest.data = digest;
|
|
||||||
sym_op->auth.digest.phys_addr = rte_pktmbuf_iova_offset(ut_params->ibuf,
|
|
||||||
QUOTE_512_BYTES);
|
|
||||||
|
|
||||||
/* Process crypto operation */
|
|
||||||
ut_params->op = process_crypto_request(ts_params->valid_devs[0],
|
|
||||||
ut_params->op);
|
|
||||||
TEST_ASSERT_NOT_NULL(ut_params->op, "no crypto operation returned");
|
|
||||||
|
|
||||||
TEST_ASSERT_EQUAL(ut_params->op->status, RTE_CRYPTO_OP_STATUS_SUCCESS,
|
|
||||||
"crypto operation processing failed");
|
|
||||||
|
|
||||||
/* Validate obuf */
|
|
||||||
TEST_ASSERT_BUFFERS_ARE_EQUAL(
|
|
||||||
rte_pktmbuf_mtod(ut_params->op->sym->m_src, uint8_t *),
|
|
||||||
catch_22_quote,
|
|
||||||
QUOTE_512_BYTES,
|
|
||||||
"Ciphertext data not as expected");
|
|
||||||
/* Make sure memory pointed to by digest hasn't been overwritten */
|
|
||||||
TEST_ASSERT_BUFFERS_ARE_EQUAL(
|
|
||||||
orig_data,
|
|
||||||
digest,
|
|
||||||
sizeof(orig_data),
|
|
||||||
"Memory at digest ptr overwritten unexpectedly");
|
|
||||||
|
|
||||||
return TEST_SUCCESS;
|
|
||||||
}
|
|
||||||
|
|
||||||
static int
|
|
||||||
test_null_auth_cipher_operation(void)
|
|
||||||
{
|
|
||||||
struct crypto_testsuite_params *ts_params = &testsuite_params;
|
|
||||||
struct crypto_unittest_params *ut_params = &unittest_params;
|
|
||||||
uint8_t *digest;
|
|
||||||
|
|
||||||
/* Verify the capabilities */
|
|
||||||
struct rte_cryptodev_sym_capability_idx cap_idx;
|
|
||||||
cap_idx.type = RTE_CRYPTO_SYM_XFORM_AUTH;
|
|
||||||
cap_idx.algo.auth = RTE_CRYPTO_AUTH_NULL;
|
|
||||||
if (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],
|
|
||||||
&cap_idx) == NULL)
|
|
||||||
return -ENOTSUP;
|
|
||||||
cap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER;
|
|
||||||
cap_idx.algo.cipher = RTE_CRYPTO_CIPHER_NULL;
|
|
||||||
if (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],
|
|
||||||
&cap_idx) == NULL)
|
|
||||||
return -ENOTSUP;
|
|
||||||
|
|
||||||
/* Generate test mbuf data */
|
|
||||||
ut_params->ibuf = setup_test_string(ts_params->mbuf_pool,
|
|
||||||
catch_22_quote, QUOTE_512_BYTES, 0);
|
|
||||||
|
|
||||||
/* create a pointer for digest, but don't expect anything to be written
|
|
||||||
* here in a NULL auth algo so no mbuf append done.
|
|
||||||
*/
|
|
||||||
digest = rte_pktmbuf_mtod_offset(ut_params->ibuf, uint8_t *,
|
|
||||||
QUOTE_512_BYTES);
|
|
||||||
/* prefill the memory pointed to by digest */
|
|
||||||
memcpy(digest, orig_data, sizeof(orig_data));
|
|
||||||
|
|
||||||
/* Setup Cipher Parameters */
|
|
||||||
ut_params->cipher_xform.type = RTE_CRYPTO_SYM_XFORM_CIPHER;
|
|
||||||
ut_params->cipher_xform.next = NULL;
|
|
||||||
|
|
||||||
ut_params->cipher_xform.cipher.algo = RTE_CRYPTO_CIPHER_NULL;
|
|
||||||
ut_params->cipher_xform.cipher.op = RTE_CRYPTO_CIPHER_OP_ENCRYPT;
|
|
||||||
|
|
||||||
/* Setup HMAC Parameters */
|
|
||||||
ut_params->auth_xform.type = RTE_CRYPTO_SYM_XFORM_AUTH;
|
|
||||||
ut_params->auth_xform.next = &ut_params->cipher_xform;
|
|
||||||
|
|
||||||
ut_params->auth_xform.auth.algo = RTE_CRYPTO_AUTH_NULL;
|
|
||||||
ut_params->auth_xform.auth.op = RTE_CRYPTO_AUTH_OP_GENERATE;
|
|
||||||
|
|
||||||
ut_params->sess = rte_cryptodev_sym_session_create(
|
|
||||||
ts_params->session_mpool);
|
|
||||||
|
|
||||||
/* Create Crypto session*/
|
|
||||||
rte_cryptodev_sym_session_init(ts_params->valid_devs[0],
|
|
||||||
ut_params->sess, &ut_params->cipher_xform,
|
|
||||||
ts_params->session_priv_mpool);
|
|
||||||
TEST_ASSERT_NOT_NULL(ut_params->sess, "Session creation failed");
|
|
||||||
|
|
||||||
/* Generate Crypto op data structure */
|
|
||||||
ut_params->op = rte_crypto_op_alloc(ts_params->op_mpool,
|
|
||||||
RTE_CRYPTO_OP_TYPE_SYMMETRIC);
|
|
||||||
TEST_ASSERT_NOT_NULL(ut_params->op,
|
|
||||||
"Failed to allocate symmetric crypto operation struct");
|
|
||||||
|
|
||||||
/* Set crypto operation data parameters */
|
|
||||||
rte_crypto_op_attach_sym_session(ut_params->op, ut_params->sess);
|
|
||||||
|
|
||||||
struct rte_crypto_sym_op *sym_op = ut_params->op->sym;
|
|
||||||
|
|
||||||
sym_op->m_src = ut_params->ibuf;
|
|
||||||
|
|
||||||
sym_op->cipher.data.offset = 0;
|
|
||||||
sym_op->cipher.data.length = QUOTE_512_BYTES;
|
|
||||||
|
|
||||||
sym_op->auth.data.offset = 0;
|
|
||||||
sym_op->auth.data.length = QUOTE_512_BYTES;
|
|
||||||
sym_op->auth.digest.data = digest;
|
|
||||||
sym_op->auth.digest.phys_addr = rte_pktmbuf_iova_offset(ut_params->ibuf,
|
|
||||||
QUOTE_512_BYTES);
|
|
||||||
|
|
||||||
/* Process crypto operation */
|
|
||||||
ut_params->op = process_crypto_request(ts_params->valid_devs[0],
|
|
||||||
ut_params->op);
|
|
||||||
TEST_ASSERT_NOT_NULL(ut_params->op, "no crypto operation returned");
|
|
||||||
|
|
||||||
TEST_ASSERT_EQUAL(ut_params->op->status, RTE_CRYPTO_OP_STATUS_SUCCESS,
|
|
||||||
"crypto operation processing failed");
|
|
||||||
|
|
||||||
/* Validate obuf */
|
|
||||||
TEST_ASSERT_BUFFERS_ARE_EQUAL(
|
|
||||||
rte_pktmbuf_mtod(ut_params->op->sym->m_src, uint8_t *),
|
|
||||||
catch_22_quote,
|
|
||||||
QUOTE_512_BYTES,
|
|
||||||
"Ciphertext data not as expected");
|
|
||||||
/* Make sure memory pointed to by digest hasn't been overwritten */
|
|
||||||
TEST_ASSERT_BUFFERS_ARE_EQUAL(
|
|
||||||
orig_data,
|
|
||||||
digest,
|
|
||||||
sizeof(orig_data),
|
|
||||||
"Memory at digest ptr overwritten unexpectedly");
|
|
||||||
|
|
||||||
return TEST_SUCCESS;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
static int
|
static int
|
||||||
test_null_invalid_operation(void)
|
test_null_invalid_operation(void)
|
||||||
@ -13144,16 +12793,6 @@ static struct unit_test_suite cryptodev_octeontx_testsuite = {
|
|||||||
TEST_CASE_ST(ut_setup, ut_teardown,
|
TEST_CASE_ST(ut_setup, ut_teardown,
|
||||||
test_kasumi_hash_verify_test_case_5),
|
test_kasumi_hash_verify_test_case_5),
|
||||||
|
|
||||||
/** NULL tests */
|
|
||||||
TEST_CASE_ST(ut_setup, ut_teardown,
|
|
||||||
test_null_cipher_only_operation),
|
|
||||||
TEST_CASE_ST(ut_setup, ut_teardown,
|
|
||||||
test_null_auth_only_operation),
|
|
||||||
TEST_CASE_ST(ut_setup, ut_teardown,
|
|
||||||
test_null_cipher_auth_operation),
|
|
||||||
TEST_CASE_ST(ut_setup, ut_teardown,
|
|
||||||
test_null_auth_cipher_operation),
|
|
||||||
|
|
||||||
/** Negative tests */
|
/** Negative tests */
|
||||||
TEST_CASE_ST(ut_setup, ut_teardown,
|
TEST_CASE_ST(ut_setup, ut_teardown,
|
||||||
authentication_verify_HMAC_SHA1_fail_data_corrupt),
|
authentication_verify_HMAC_SHA1_fail_data_corrupt),
|
||||||
@ -13367,16 +13006,6 @@ static struct unit_test_suite cryptodev_octeontx2_testsuite = {
|
|||||||
TEST_CASE_ST(ut_setup, ut_teardown,
|
TEST_CASE_ST(ut_setup, ut_teardown,
|
||||||
test_kasumi_hash_verify_test_case_5),
|
test_kasumi_hash_verify_test_case_5),
|
||||||
|
|
||||||
/** NULL tests */
|
|
||||||
TEST_CASE_ST(ut_setup, ut_teardown,
|
|
||||||
test_null_cipher_only_operation),
|
|
||||||
TEST_CASE_ST(ut_setup, ut_teardown,
|
|
||||||
test_null_auth_only_operation),
|
|
||||||
TEST_CASE_ST(ut_setup, ut_teardown,
|
|
||||||
test_null_cipher_auth_operation),
|
|
||||||
TEST_CASE_ST(ut_setup, ut_teardown,
|
|
||||||
test_null_auth_cipher_operation),
|
|
||||||
|
|
||||||
/** Negative tests */
|
/** Negative tests */
|
||||||
TEST_CASE_ST(ut_setup, ut_teardown,
|
TEST_CASE_ST(ut_setup, ut_teardown,
|
||||||
authentication_verify_HMAC_SHA1_fail_data_corrupt),
|
authentication_verify_HMAC_SHA1_fail_data_corrupt),
|
||||||
|
Loading…
x
Reference in New Issue
Block a user