mirror of
https://github.com/espressif/esp-idf.git
synced 2025-08-10 20:54:24 +00:00
ci: Fix ci failures for target esp32c6
This commit is contained in:
@@ -28,9 +28,11 @@ void setUp(void)
|
|||||||
{
|
{
|
||||||
// Execute esp_sha operation to allocate internal SHA semaphore memory
|
// Execute esp_sha operation to allocate internal SHA semaphore memory
|
||||||
// which is considered as leaked otherwise
|
// which is considered as leaked otherwise
|
||||||
|
#if SOC_SHA_SUPPORTED
|
||||||
const uint8_t input_buffer[64] = {0};
|
const uint8_t input_buffer[64] = {0};
|
||||||
uint8_t output_buffer[64];
|
uint8_t output_buffer[64];
|
||||||
esp_sha(SHA_TYPE, input_buffer, sizeof(input_buffer), output_buffer);
|
esp_sha(SHA_TYPE, input_buffer, sizeof(input_buffer), output_buffer);
|
||||||
|
#endif // SOC_SHA_SUPPORTED
|
||||||
test_utils_record_free_mem();
|
test_utils_record_free_mem();
|
||||||
TEST_ESP_OK(test_utils_set_leak_level(0, ESP_LEAK_TYPE_CRITICAL, ESP_COMP_LEAK_GENERAL));
|
TEST_ESP_OK(test_utils_set_leak_level(0, ESP_LEAK_TYPE_CRITICAL, ESP_COMP_LEAK_GENERAL));
|
||||||
TEST_ESP_OK(test_utils_set_leak_level(0, ESP_LEAK_TYPE_WARNING, ESP_COMP_LEAK_GENERAL));
|
TEST_ESP_OK(test_utils_set_leak_level(0, ESP_LEAK_TYPE_WARNING, ESP_COMP_LEAK_GENERAL));
|
||||||
|
@@ -33,6 +33,7 @@ are tested as part of mbedTLS tests. Only esp_sha() is different.
|
|||||||
|
|
||||||
#define TAG "sha_test"
|
#define TAG "sha_test"
|
||||||
|
|
||||||
|
#if SOC_SHA_SUPPORTED
|
||||||
TEST_CASE("Test esp_sha()", "[hw_crypto]")
|
TEST_CASE("Test esp_sha()", "[hw_crypto]")
|
||||||
{
|
{
|
||||||
const size_t BUFFER_SZ = 32 * 1024 + 6; // NB: not an exact multiple of SHA block size
|
const size_t BUFFER_SZ = 32 * 1024 + 6; // NB: not an exact multiple of SHA block size
|
||||||
@@ -136,3 +137,5 @@ TEST_CASE("Test esp_sha() function with long input", "[hw_crypto]")
|
|||||||
TEST_ASSERT_EQUAL_MEMORY_MESSAGE(sha512_espsha, sha512_mbedtls, sizeof(sha512_espsha), "SHA512 results should match");
|
TEST_ASSERT_EQUAL_MEMORY_MESSAGE(sha512_espsha, sha512_mbedtls, sizeof(sha512_espsha), "SHA512 results should match");
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#endif // SOC_SHA_SUPPORTED
|
||||||
|
Reference in New Issue
Block a user