diff --git a/library/psa_crypto.c b/library/psa_crypto.c index dbff1338b..fdef24051 100644 --- a/library/psa_crypto.c +++ b/library/psa_crypto.c @@ -3719,7 +3719,7 @@ static psa_status_t psa_aead_check_nonce_length( psa_algorithm_t alg, return( PSA_ERROR_INVALID_ARGUMENT ); } -static psa_status_t psa_aead_initial_checks( psa_algorithm_t alg ) { +static psa_status_t psa_aead_check_algorithm( psa_algorithm_t alg ) { if( !PSA_ALG_IS_AEAD( alg ) || PSA_ALG_IS_WILDCARD( alg ) ) return( PSA_ERROR_INVALID_ARGUMENT ); @@ -3743,7 +3743,7 @@ psa_status_t psa_aead_encrypt( mbedtls_svc_key_id_t key, *ciphertext_length = 0; - status = psa_aead_initial_checks( alg ); + status = psa_aead_check_algorithm( alg ); if( status != PSA_SUCCESS ) return( status ); @@ -3794,7 +3794,7 @@ psa_status_t psa_aead_decrypt( mbedtls_svc_key_id_t key, *plaintext_length = 0; - status = psa_aead_initial_checks( alg ); + status = psa_aead_check_algorithm( alg ); if( status != PSA_SUCCESS ) return( status ); @@ -3839,7 +3839,7 @@ static psa_status_t psa_aead_setup( psa_aead_operation_t *operation, psa_key_slot_t *slot = NULL; psa_key_usage_t key_usage = 0; - status = psa_aead_initial_checks( alg ); + status = psa_aead_check_algorithm( alg ); if( status != PSA_SUCCESS ) goto exit;