@@ -545,6 +545,7 @@ static int test_invalid_curve_point(void)
545545{
546546 byte badX [WOLFSPDM_ECC_KEY_SIZE ];
547547 byte badY [WOLFSPDM_ECC_KEY_SIZE ];
548+ byte zeros [WOLFSPDM_ECC_KEY_SIZE ];
548549 int rc ;
549550 TEST_CTX_SETUP_V12 ();
550551
@@ -562,13 +563,10 @@ static int test_invalid_curve_point(void)
562563 ASSERT_EQ (rc , WOLFSPDM_E_CRYPTO_FAIL , "Off-curve point must be rejected" );
563564
564565 /* Verify shared secret was zeroed on failure */
565- {
566- byte zeros [WOLFSPDM_ECC_KEY_SIZE ];
567- memset (zeros , 0 , sizeof (zeros ));
568- ASSERT_EQ (memcmp (ctx -> sharedSecret , zeros , sizeof (ctx -> sharedSecret )), 0 ,
569- "sharedSecret must be zeroed on failure" );
570- ASSERT_EQ (ctx -> sharedSecretSz , 0 , "sharedSecretSz must be 0 on failure" );
571- }
566+ memset (zeros , 0 , sizeof (zeros ));
567+ ASSERT_EQ (memcmp (ctx -> sharedSecret , zeros , sizeof (ctx -> sharedSecret )), 0 ,
568+ "sharedSecret must be zeroed on failure" );
569+ ASSERT_EQ (ctx -> sharedSecretSz , 0 , "sharedSecretSz must be 0 on failure" );
572570
573571 TEST_CTX_FREE ();
574572 TEST_PASS ();
@@ -1083,17 +1081,17 @@ static int test_parse_tcg_clear_message(void)
10831081 byte buf [32 ], payload [16 ];
10841082 word32 payloadSz = sizeof (payload );
10851083 WOLFSPDM_TCG_CLEAR_HDR hdr ;
1084+ int built ;
1085+ int parsed ;
10861086 TEST_CTX_SETUP ();
10871087 printf ("test_parse_tcg_clear_message...\n" );
10881088
10891089 /* Build a valid message first */
10901090 ctx -> connectionHandle = 0 ;
10911091 ctx -> fipsIndicator = 0 ;
1092- {
1093- int built = wolfSPDM_BuildTcgClearMessage (ctx , (byte * )"ABCD" , 4 , buf ,
1094- sizeof (buf ));
1095- TEST_ASSERT (built == 20 , "build failed" );
1096- }
1092+ built = wolfSPDM_BuildTcgClearMessage (ctx , (byte * )"ABCD" , 4 , buf ,
1093+ sizeof (buf ));
1094+ TEST_ASSERT (built == 20 , "build failed" );
10971095
10981096 /* NULL args */
10991097 TEST_ASSERT (wolfSPDM_ParseTcgClearMessage (NULL , 20 , payload , & payloadSz ,
@@ -1107,13 +1105,11 @@ static int test_parse_tcg_clear_message(void)
11071105
11081106 /* Valid parse (returns payload size on success) */
11091107 payloadSz = sizeof (payload );
1110- {
1111- int parsed = wolfSPDM_ParseTcgClearMessage (buf , 20 , payload ,
1112- & payloadSz , & hdr );
1113- TEST_ASSERT (parsed >= 0 , "parse failed" );
1114- ASSERT_EQ (payloadSz , 4 , "payload size wrong" );
1115- TEST_ASSERT (memcmp (payload , "ABCD" , 4 ) == 0 , "payload mismatch" );
1116- }
1108+ parsed = wolfSPDM_ParseTcgClearMessage (buf , 20 , payload ,
1109+ & payloadSz , & hdr );
1110+ TEST_ASSERT (parsed >= 0 , "parse failed" );
1111+ ASSERT_EQ (payloadSz , 4 , "payload size wrong" );
1112+ TEST_ASSERT (memcmp (payload , "ABCD" , 4 ) == 0 , "payload mismatch" );
11171113
11181114 TEST_CTX_FREE ();
11191115 TEST_PASS ();
@@ -1157,6 +1153,7 @@ static int test_parse_vendor_defined(void)
11571153 char vdCode [9 ];
11581154 word32 payloadSz ;
11591155 int built ;
1156+ int parsed ;
11601157 printf ("test_parse_vendor_defined...\n" );
11611158
11621159 /* Build, then parse back */
@@ -1165,14 +1162,12 @@ static int test_parse_vendor_defined(void)
11651162 TEST_ASSERT (built > 0 , "build failed" );
11661163
11671164 payloadSz = sizeof (payload );
1168- {
1169- int parsed = wolfSPDM_ParseVendorDefined (outBuf , (word32 )built , vdCode ,
1170- payload , & payloadSz );
1171- TEST_ASSERT (parsed >= 0 , "parse failed" );
1172- TEST_ASSERT (memcmp (vdCode , "TPM2_CMD" , 8 ) == 0 , "vdCode mismatch" );
1173- ASSERT_EQ (payloadSz , 5 , "payload size wrong" );
1174- TEST_ASSERT (memcmp (payload , "HELLO" , 5 ) == 0 , "payload mismatch" );
1175- }
1165+ parsed = wolfSPDM_ParseVendorDefined (outBuf , (word32 )built , vdCode ,
1166+ payload , & payloadSz );
1167+ TEST_ASSERT (parsed >= 0 , "parse failed" );
1168+ TEST_ASSERT (memcmp (vdCode , "TPM2_CMD" , 8 ) == 0 , "vdCode mismatch" );
1169+ ASSERT_EQ (payloadSz , 5 , "payload size wrong" );
1170+ TEST_ASSERT (memcmp (payload , "HELLO" , 5 ) == 0 , "payload mismatch" );
11761171
11771172 /* NULL args */
11781173 TEST_ASSERT (wolfSPDM_ParseVendorDefined (NULL , (word32 )built , vdCode ,
@@ -1194,6 +1189,7 @@ static int test_vendor_defined_roundtrip(void)
11941189 char vdCode [9 ];
11951190 word32 payloadSz ;
11961191 int i , built ;
1192+ int parsed ;
11971193 printf ("test_vendor_defined_roundtrip...\n" );
11981194
11991195 for (i = 0 ; i < 5 ; i ++ ) {
@@ -1202,14 +1198,12 @@ static int test_vendor_defined_roundtrip(void)
12021198 testData , 4 , outBuf , sizeof (outBuf ));
12031199 TEST_ASSERT (built > 0 , "build failed" );
12041200 payloadSz = sizeof (payload );
1205- {
1206- int parsed = wolfSPDM_ParseVendorDefined (outBuf , (word32 )built ,
1207- vdCode , payload , & payloadSz );
1208- TEST_ASSERT (parsed >= 0 , "parse failed" );
1209- TEST_ASSERT (memcmp (vdCode , codes [i ], 8 ) == 0 , "vdCode mismatch" );
1210- ASSERT_EQ (payloadSz , 4 , "payload size" );
1211- TEST_ASSERT (memcmp (payload , testData , 4 ) == 0 , "payload mismatch" );
1212- }
1201+ parsed = wolfSPDM_ParseVendorDefined (outBuf , (word32 )built ,
1202+ vdCode , payload , & payloadSz );
1203+ TEST_ASSERT (parsed >= 0 , "parse failed" );
1204+ TEST_ASSERT (memcmp (vdCode , codes [i ], 8 ) == 0 , "vdCode mismatch" );
1205+ ASSERT_EQ (payloadSz , 4 , "payload size" );
1206+ TEST_ASSERT (memcmp (payload , testData , 4 ) == 0 , "payload mismatch" );
12131207 }
12141208
12151209 TEST_PASS ();
0 commit comments