From ebe26fd095aae9f80cc91f21c9e2dae0471f47d1 Mon Sep 17 00:00:00 2001 From: Minos Galanakis Date: Mon, 16 Mar 2026 11:52:50 +0000 Subject: [PATCH] test_suite_psa_crypto: Fixed a typo in documentation Signed-off-by: Minos Galanakis --- tests/suites/test_suite_psa_crypto.function | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/tests/suites/test_suite_psa_crypto.function b/tests/suites/test_suite_psa_crypto.function index 6c6cd6439f..d13443f5b3 100644 --- a/tests/suites/test_suite_psa_crypto.function +++ b/tests/suites/test_suite_psa_crypto.function @@ -6499,7 +6499,7 @@ void aead_multipart_state_test(int key_type_arg, data_t *key_data, PSA_ERROR_BAD_STATE); psa_aead_abort(&operation); - /* For CCM, finishing after setting length with aead_update/ad must fail. */ + /* For CCM, finishing after setting length without aead_update/ad must fail. */ PSA_ASSERT(psa_aead_encrypt_setup(&operation, key, alg)); PSA_ASSERT(psa_aead_set_nonce(&operation, nonce->x, nonce->len)); @@ -6544,7 +6544,7 @@ void aead_multipart_state_test(int key_type_arg, data_t *key_data, PSA_ERROR_BAD_STATE); psa_aead_abort(&operation); - /* For CCM, verifying after setting length with aead_update/ad must fail. */ + /* For CCM, verifying after setting length without aead_update/ad must fail. */ PSA_ASSERT(psa_aead_decrypt_setup(&operation, key, alg)); PSA_ASSERT(psa_aead_set_nonce(&operation, nonce->x, nonce->len)); @@ -6654,7 +6654,7 @@ void aead_multipart_state_test(int key_type_arg, data_t *key_data, PSA_ERROR_BAD_STATE); psa_aead_abort(&operation); - /* For CCM, finishing after setting length with aead_update/ad must fail. */ + /* For CCM, finishing after setting length without aead_update/ad must fail. */ PSA_ASSERT(psa_aead_encrypt_setup(&operation, key, alg)); PSA_ASSERT(psa_aead_generate_nonce(&operation, nonce_buffer, PSA_AEAD_NONCE_MAX_SIZE, @@ -6703,7 +6703,7 @@ void aead_multipart_state_test(int key_type_arg, data_t *key_data, PSA_ERROR_BAD_STATE); psa_aead_abort(&operation); - /* For CCM, verifying after setting length with aead_update/ad must fail. */ + /* For CCM, verifying after setting length without aead_update/ad must fail. */ PSA_ASSERT(psa_aead_decrypt_setup(&operation, key, alg)); PSA_ASSERT(psa_aead_set_nonce(&operation, nonce->x, nonce->len));