ci: Fix ci failures for target esp32c6

This commit is contained in:
Harshit Malpani
2022-12-23 11:00:27 +05:30
parent 5c728e94a7
commit 49ce5ada76
2 changed files with 5 additions and 0 deletions

View File

@@ -28,9 +28,11 @@ void setUp(void)
{ {
// Execute esp_sha operation to allocate internal SHA semaphore memory // Execute esp_sha operation to allocate internal SHA semaphore memory
// which is considered as leaked otherwise // which is considered as leaked otherwise
#if SOC_SHA_SUPPORTED
const uint8_t input_buffer[64] = {0}; const uint8_t input_buffer[64] = {0};
uint8_t output_buffer[64]; uint8_t output_buffer[64];
esp_sha(SHA_TYPE, input_buffer, sizeof(input_buffer), output_buffer); esp_sha(SHA_TYPE, input_buffer, sizeof(input_buffer), output_buffer);
#endif // SOC_SHA_SUPPORTED
test_utils_record_free_mem(); test_utils_record_free_mem();
TEST_ESP_OK(test_utils_set_leak_level(0, ESP_LEAK_TYPE_CRITICAL, ESP_COMP_LEAK_GENERAL)); TEST_ESP_OK(test_utils_set_leak_level(0, ESP_LEAK_TYPE_CRITICAL, ESP_COMP_LEAK_GENERAL));
TEST_ESP_OK(test_utils_set_leak_level(0, ESP_LEAK_TYPE_WARNING, ESP_COMP_LEAK_GENERAL)); TEST_ESP_OK(test_utils_set_leak_level(0, ESP_LEAK_TYPE_WARNING, ESP_COMP_LEAK_GENERAL));

View File

@@ -33,6 +33,7 @@ are tested as part of mbedTLS tests. Only esp_sha() is different.
#define TAG "sha_test" #define TAG "sha_test"
#if SOC_SHA_SUPPORTED
TEST_CASE("Test esp_sha()", "[hw_crypto]") TEST_CASE("Test esp_sha()", "[hw_crypto]")
{ {
const size_t BUFFER_SZ = 32 * 1024 + 6; // NB: not an exact multiple of SHA block size const size_t BUFFER_SZ = 32 * 1024 + 6; // NB: not an exact multiple of SHA block size
@@ -136,3 +137,5 @@ TEST_CASE("Test esp_sha() function with long input", "[hw_crypto]")
TEST_ASSERT_EQUAL_MEMORY_MESSAGE(sha512_espsha, sha512_mbedtls, sizeof(sha512_espsha), "SHA512 results should match"); TEST_ASSERT_EQUAL_MEMORY_MESSAGE(sha512_espsha, sha512_mbedtls, sizeof(sha512_espsha), "SHA512 results should match");
#endif #endif
} }
#endif // SOC_SHA_SUPPORTED