diff --git a/tests/suites/test_suite_psa_crypto.function b/tests/suites/test_suite_psa_crypto.function index 6c6cd6439f..d13443f5b3 100644 --- a/tests/suites/test_suite_psa_crypto.function +++ b/tests/suites/test_suite_psa_crypto.function @@ -6499,7 +6499,7 @@ void aead_multipart_state_test(int key_type_arg, data_t *key_data, PSA_ERROR_BAD_STATE); psa_aead_abort(&operation); - /* For CCM, finishing after setting length with aead_update/ad must fail. */ + /* For CCM, finishing after setting length without aead_update/ad must fail. */ PSA_ASSERT(psa_aead_encrypt_setup(&operation, key, alg)); PSA_ASSERT(psa_aead_set_nonce(&operation, nonce->x, nonce->len)); @@ -6544,7 +6544,7 @@ void aead_multipart_state_test(int key_type_arg, data_t *key_data, PSA_ERROR_BAD_STATE); psa_aead_abort(&operation); - /* For CCM, verifying after setting length with aead_update/ad must fail. */ + /* For CCM, verifying after setting length without aead_update/ad must fail. */ PSA_ASSERT(psa_aead_decrypt_setup(&operation, key, alg)); PSA_ASSERT(psa_aead_set_nonce(&operation, nonce->x, nonce->len)); @@ -6654,7 +6654,7 @@ void aead_multipart_state_test(int key_type_arg, data_t *key_data, PSA_ERROR_BAD_STATE); psa_aead_abort(&operation); - /* For CCM, finishing after setting length with aead_update/ad must fail. */ + /* For CCM, finishing after setting length without aead_update/ad must fail. */ PSA_ASSERT(psa_aead_encrypt_setup(&operation, key, alg)); PSA_ASSERT(psa_aead_generate_nonce(&operation, nonce_buffer, PSA_AEAD_NONCE_MAX_SIZE, @@ -6703,7 +6703,7 @@ void aead_multipart_state_test(int key_type_arg, data_t *key_data, PSA_ERROR_BAD_STATE); psa_aead_abort(&operation); - /* For CCM, verifying after setting length with aead_update/ad must fail. */ + /* For CCM, verifying after setting length without aead_update/ad must fail. */ PSA_ASSERT(psa_aead_decrypt_setup(&operation, key, alg)); PSA_ASSERT(psa_aead_set_nonce(&operation, nonce->x, nonce->len));