From 098d28276e584f8ee8e2a02fe84c9cb7cfde260d Mon Sep 17 00:00:00 2001 From: Ivan Grokhotkov Date: Wed, 4 Oct 2023 12:50:55 +0200 Subject: [PATCH] change(wpa_supplicant): set leak threshold in test_fast_pbkdf2 --- .../wpa_supplicant/test_apps/main/test_fast_pbkdf2.c | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/components/wpa_supplicant/test_apps/main/test_fast_pbkdf2.c b/components/wpa_supplicant/test_apps/main/test_fast_pbkdf2.c index 9bb0eadb8f..6e94c3e403 100644 --- a/components/wpa_supplicant/test_apps/main/test_fast_pbkdf2.c +++ b/components/wpa_supplicant/test_apps/main/test_fast_pbkdf2.c @@ -9,13 +9,14 @@ #include "utils/common.h" #include "mbedtls/pkcs5.h" #include "crypto/sha1.h" - -#if SOC_WIFI_SUPPORTED +#include "test_wpa_supplicant_common.h" #define PMK_LEN 32 TEST_CASE("Test pbkdf2", "[crypto-pbkdf2]") { + set_leak_threshold(120); + uint8_t PMK[PMK_LEN]; uint8_t ssid_len; uint8_t passphrase_len; @@ -65,5 +66,3 @@ TEST_CASE("Test pbkdf2", "[crypto-pbkdf2]") } TEST_ASSERT(memcmp(PMK, expected_pmk, PMK_LEN) == 0); } - -#endif /* SOC_WIFI_SUPPORTED */