mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2026-05-04 10:04:14 +02:00
adjust test case to account for AES-GCM key size support with Xilinx afalg
This commit is contained in:
@@ -16419,7 +16419,7 @@ WOLFSSL_TEST_SUBROUTINE wc_test_ret_t aesgcm_test(void)
|
||||
0xb8, 0x56, 0x8f, 0xc3, 0xd3, 0x76, 0xa6, 0xd9
|
||||
};
|
||||
#endif /* WOLFSSL_AES_192 */
|
||||
#ifdef WOLFSSL_AES_128
|
||||
#if defined(WOLFSSL_AES_128) && !defined(WOLFSSL_AFALG_XILINX_AES)
|
||||
/* The following is an interesting test case from the example
|
||||
* FIPS test vectors for AES-GCM. IVlen = 1 byte
|
||||
* k3 and p3 below, are also part of this. */
|
||||
@@ -16450,7 +16450,7 @@ WOLFSSL_TEST_SUBROUTINE wc_test_ret_t aesgcm_test(void)
|
||||
int ivlen;
|
||||
#endif
|
||||
#endif
|
||||
#ifdef WOLFSSL_AES_128
|
||||
#if defined(WOLFSSL_AES_128) && !defined(WOLFSSL_AFALG_XILINX_AES)
|
||||
#ifdef HAVE_RENESAS_SYNC
|
||||
const byte *k3 =
|
||||
(byte*)guser_PKCbInfo.wrapped_key_aes128;
|
||||
@@ -16548,7 +16548,7 @@ WOLFSSL_TEST_SUBROUTINE wc_test_ret_t aesgcm_test(void)
|
||||
ERROR_OUT(WC_TEST_RET_ENC_EC(ret), out);
|
||||
#endif
|
||||
|
||||
#ifdef WOLFSSL_AES_128
|
||||
#if defined(WOLFSSL_AES_128) && !defined(WOLFSSL_AFALG_XILINX_AES)
|
||||
ret = wc_AesGcmSetKey(enc, k3, (word32)k3Sz);
|
||||
if (ret != 0)
|
||||
ERROR_OUT(WC_TEST_RET_ENC_EC(ret), out);
|
||||
|
||||
Reference in New Issue
Block a user