@@ -5,13 +5,13 @@ static int load_public_key( int grp_id, data_t *point,
5
5
mbedtls_ecp_keypair *ecp )
6
6
{
7
7
int ok = 0;
8
- TEST_ASSERT ( mbedtls_ecp_group_load( &ecp->grp, grp_id ) == 0 );
9
- TEST_ASSERT ( mbedtls_ecp_point_read_binary( &ecp->grp,
10
- &ecp->Q,
11
- point->x,
12
- point->len ) == 0 );
13
- TEST_ASSERT ( mbedtls_ecp_check_pubkey( &ecp->grp,
14
- &ecp->Q ) == 0 );
8
+ TEST_ASSERT_RET ( mbedtls_ecp_group_load( &ecp->grp, grp_id ), 0 );
9
+ TEST_ASSERT_RET ( mbedtls_ecp_point_read_binary( &ecp->grp,
10
+ &ecp->Q,
11
+ point->x,
12
+ point->len ), 0 );
13
+ TEST_ASSERT_RET ( mbedtls_ecp_check_pubkey( &ecp->grp,
14
+ &ecp->Q ), 0 );
15
15
ok = 1;
16
16
exit:
17
17
return( ok );
@@ -22,14 +22,14 @@ static int load_private_key( int grp_id, data_t *private_key,
22
22
rnd_pseudo_info *rnd_info )
23
23
{
24
24
int ok = 0;
25
- TEST_ASSERT ( mbedtls_ecp_read_key( grp_id, ecp,
26
- private_key->x,
27
- private_key->len ) == 0 );
28
- TEST_ASSERT ( mbedtls_ecp_check_privkey( &ecp->grp, &ecp->d ) == 0 );
25
+ TEST_ASSERT_RET ( mbedtls_ecp_read_key( grp_id, ecp,
26
+ private_key->x,
27
+ private_key->len ), 0 );
28
+ TEST_ASSERT_RET ( mbedtls_ecp_check_privkey( &ecp->grp, &ecp->d ), 0 );
29
29
/* Calculate the public key from the private key. */
30
- TEST_ASSERT ( mbedtls_ecp_mul( &ecp->grp, &ecp->Q, &ecp->d,
31
- &ecp->grp.G,
32
- &rnd_pseudo_rand, rnd_info ) == 0 );
30
+ TEST_ASSERT_RET ( mbedtls_ecp_mul( &ecp->grp, &ecp->Q, &ecp->d,
31
+ &ecp->grp.G,
32
+ &rnd_pseudo_rand, rnd_info ), 0 );
33
33
ok = 1;
34
34
exit:
35
35
return( ok );
@@ -372,13 +372,13 @@ void ecdh_restart( int id, char *dA_str, char *dB_str, char *z_str,
372
372
373
373
/* The ECDH context is not guaranteed ot have an mbedtls_ecp_group structure
374
374
* in every configuration, therefore we load it separately. */
375
- TEST_ASSERT ( mbedtls_ecp_group_load( &grp, id ) == 0 );
375
+ TEST_ASSERT_RET ( mbedtls_ecp_group_load( &grp, id ), 0 );
376
376
377
377
/* Otherwise we would have to fix the random buffer,
378
378
* as in ecdh_primitive_testvec. */
379
379
TEST_ASSERT( grp.nbits % 8 == 0 );
380
380
381
- TEST_ASSERT ( mbedtls_ecdh_setup( &srv, id ) == 0 );
381
+ TEST_ASSERT_RET ( mbedtls_ecdh_setup( &srv, id ), 0 );
382
382
383
383
/* set up restart parameters */
384
384
mbedtls_ecp_set_max_ops( max_ops );
@@ -405,7 +405,7 @@ void ecdh_restart( int id, char *dA_str, char *dB_str, char *z_str,
405
405
406
406
/* client read server params */
407
407
vbuf = buf;
408
- TEST_ASSERT ( mbedtls_ecdh_read_params( &cli, &vbuf, buf + len ) == 0 );
408
+ TEST_ASSERT_RET ( mbedtls_ecdh_read_params( &cli, &vbuf, buf + len ), 0 );
409
409
410
410
/* client writes its key share */
411
411
memset( buf, 0x00, sizeof( buf ) );
@@ -422,7 +422,7 @@ void ecdh_restart( int id, char *dA_str, char *dB_str, char *z_str,
422
422
TEST_ASSERT( cnt_restart <= max_restart );
423
423
424
424
/* server reads client key share */
425
- TEST_ASSERT ( mbedtls_ecdh_read_public( &srv, buf, len ) == 0 );
425
+ TEST_ASSERT_RET ( mbedtls_ecdh_read_public( &srv, buf, len ), 0 );
426
426
427
427
/* server computes shared secret */
428
428
memset( buf, 0, sizeof( buf ) );
@@ -479,22 +479,22 @@ void ecdh_exchange_legacy( int id )
479
479
mbedtls_ecdh_init( &cli );
480
480
memset( &rnd_info, 0x00, sizeof( rnd_pseudo_info ) );
481
481
482
- TEST_ASSERT ( mbedtls_ecp_group_load( &srv.grp, id ) == 0 );
482
+ TEST_ASSERT_RET ( mbedtls_ecp_group_load( &srv.grp, id ), 0 );
483
483
484
484
memset( buf, 0x00, sizeof( buf ) ); vbuf = buf;
485
- TEST_ASSERT ( mbedtls_ecdh_make_params( &srv, &len, buf, 1000,
486
- &rnd_pseudo_rand, &rnd_info ) == 0 );
487
- TEST_ASSERT ( mbedtls_ecdh_read_params( &cli, &vbuf, buf + len ) == 0 );
485
+ TEST_ASSERT_RET ( mbedtls_ecdh_make_params( &srv, &len, buf, 1000,
486
+ &rnd_pseudo_rand, &rnd_info ), 0 );
487
+ TEST_ASSERT_RET ( mbedtls_ecdh_read_params( &cli, &vbuf, buf + len ), 0 );
488
488
489
489
memset( buf, 0x00, sizeof( buf ) );
490
- TEST_ASSERT ( mbedtls_ecdh_make_public( &cli, &len, buf, 1000,
491
- &rnd_pseudo_rand, &rnd_info ) == 0 );
492
- TEST_ASSERT ( mbedtls_ecdh_read_public( &srv, buf, len ) == 0 );
493
-
494
- TEST_ASSERT ( mbedtls_ecdh_calc_secret( &srv, &len, buf, 1000,
495
- &rnd_pseudo_rand, &rnd_info ) == 0 );
496
- TEST_ASSERT ( mbedtls_ecdh_calc_secret( &cli, &len, buf, 1000, NULL,
497
- NULL ) == 0 );
490
+ TEST_ASSERT_RET ( mbedtls_ecdh_make_public( &cli, &len, buf, 1000,
491
+ &rnd_pseudo_rand, &rnd_info ), 0 );
492
+ TEST_ASSERT_RET ( mbedtls_ecdh_read_public( &srv, buf, len ), 0 );
493
+
494
+ TEST_ASSERT_RET ( mbedtls_ecdh_calc_secret( &srv, &len, buf, 1000,
495
+ &rnd_pseudo_rand, &rnd_info ), 0 );
496
+ TEST_ASSERT_RET ( mbedtls_ecdh_calc_secret( &cli, &len, buf, 1000, NULL,
497
+ NULL ), 0 );
498
498
TEST_ASSERT( mbedtls_mpi_cmp_mpi( &srv.z, &cli.z ) == 0 );
499
499
500
500
exit:
@@ -530,25 +530,25 @@ void ecdh_exchange_calc_secret( int grp_id,
530
530
/* Import the keys to the ECDH calculation. */
531
531
if( ours_first )
532
532
{
533
- TEST_ASSERT ( mbedtls_ecdh_get_params(
534
- &ecdh, &our_key, MBEDTLS_ECDH_OURS ) == 0 );
535
- TEST_ASSERT ( mbedtls_ecdh_get_params(
536
- &ecdh, &their_key, MBEDTLS_ECDH_THEIRS ) == 0 );
533
+ TEST_ASSERT_RET ( mbedtls_ecdh_get_params(
534
+ &ecdh, &our_key, MBEDTLS_ECDH_OURS ), 0 );
535
+ TEST_ASSERT_RET ( mbedtls_ecdh_get_params(
536
+ &ecdh, &their_key, MBEDTLS_ECDH_THEIRS ), 0 );
537
537
}
538
538
else
539
539
{
540
- TEST_ASSERT ( mbedtls_ecdh_get_params(
541
- &ecdh, &their_key, MBEDTLS_ECDH_THEIRS ) == 0 );
542
- TEST_ASSERT ( mbedtls_ecdh_get_params(
543
- &ecdh, &our_key, MBEDTLS_ECDH_OURS ) == 0 );
540
+ TEST_ASSERT_RET ( mbedtls_ecdh_get_params(
541
+ &ecdh, &their_key, MBEDTLS_ECDH_THEIRS ), 0 );
542
+ TEST_ASSERT_RET ( mbedtls_ecdh_get_params(
543
+ &ecdh, &our_key, MBEDTLS_ECDH_OURS ), 0 );
544
544
}
545
545
546
546
/* Perform the ECDH calculation. */
547
- TEST_ASSERT ( mbedtls_ecdh_calc_secret(
548
- &ecdh,
549
- &shared_secret_length,
550
- shared_secret, sizeof( shared_secret ),
551
- &rnd_pseudo_rand, &rnd_info ) == 0 );
547
+ TEST_ASSERT_RET ( mbedtls_ecdh_calc_secret(
548
+ &ecdh,
549
+ &shared_secret_length,
550
+ shared_secret, sizeof( shared_secret ),
551
+ &rnd_pseudo_rand, &rnd_info ), 0 );
552
552
TEST_ASSERT( shared_secret_length == expected->len );
553
553
TEST_ASSERT( memcmp( expected->x, shared_secret,
554
554
shared_secret_length ) == 0 );
@@ -585,18 +585,18 @@ void ecdh_exchange_get_params_fail( int our_grp_id,
585
585
586
586
if( ours_first )
587
587
{
588
- TEST_ASSERT ( mbedtls_ecdh_get_params(
589
- &ecdh, &our_key, MBEDTLS_ECDH_OURS ) == 0 );
590
- TEST_ASSERT ( mbedtls_ecdh_get_params(
591
- &ecdh, &their_key, MBEDTLS_ECDH_THEIRS ) ==
592
- expected_ret );
588
+ TEST_ASSERT_RET ( mbedtls_ecdh_get_params(
589
+ &ecdh, &our_key, MBEDTLS_ECDH_OURS ), 0 );
590
+ TEST_ASSERT_RET ( mbedtls_ecdh_get_params(
591
+ &ecdh, &their_key, MBEDTLS_ECDH_THEIRS ),
592
+ expected_ret );
593
593
}
594
594
else
595
595
{
596
- TEST_ASSERT ( mbedtls_ecdh_get_params(
597
- &ecdh, &their_key, MBEDTLS_ECDH_THEIRS ) == 0 );
598
- TEST_ASSERT ( mbedtls_ecdh_get_params(
599
- &ecdh, &our_key, MBEDTLS_ECDH_OURS ) ==
596
+ TEST_ASSERT_RET ( mbedtls_ecdh_get_params(
597
+ &ecdh, &their_key, MBEDTLS_ECDH_THEIRS ), 0 );
598
+ TEST_ASSERT_RET ( mbedtls_ecdh_get_params(
599
+ &ecdh, &our_key, MBEDTLS_ECDH_OURS ),
600
600
expected_ret );
601
601
}
602
602
0 commit comments