diff --git a/library/psa_crypto.c b/library/psa_crypto.c index 61f0ad4a41..6b2b500c7a 100644 --- a/library/psa_crypto.c +++ b/library/psa_crypto.c @@ -1308,17 +1308,12 @@ psa_status_t psa_wipe_key_slot( psa_key_slot_t *slot ) * do our best to report an unexpected access counter: if available * call MBEDTLS_PARAM_FAILED that may terminate execution (if called as * part of the execution of a test suite this will stop the test suite - * execution) and if MBEDTLS_PARAM_FAILED does not terminate execution - * ouput an error message on standard error output. + * execution). */ if( slot->access_count != 1 ) { #ifdef MBEDTLS_CHECK_PARAMS MBEDTLS_PARAM_FAILED( slot->access_count == 1 ); -#endif -#ifdef MBEDTLS_PLATFORM_C - mbedtls_fprintf( stderr, - "\nFATAL psa_wipe_key_slot Unexpected access counter value\n."); #endif status = PSA_ERROR_CORRUPTION_DETECTED; } diff --git a/library/psa_crypto_slot_management.c b/library/psa_crypto_slot_management.c index d8a3ca8ec4..5d20532e8b 100644 --- a/library/psa_crypto_slot_management.c +++ b/library/psa_crypto_slot_management.c @@ -317,16 +317,11 @@ psa_status_t psa_decrement_key_slot_access_count( psa_key_slot_t *slot ) * do our best to report if the access counter is equal to zero: if * available call MBEDTLS_PARAM_FAILED that may terminate execution (if * called as part of the execution of a unit test suite this will stop the - * test suite execution) and if MBEDTLS_PARAM_FAILED does not terminate - * execution ouput an error message on standard error output. + * test suite execution). */ #ifdef MBEDTLS_CHECK_PARAMS MBEDTLS_PARAM_FAILED( slot->access_count > 0 ); #endif -#ifdef MBEDTLS_PLATFORM_C - mbedtls_fprintf( stderr, - "\nFATAL psa_decrement_key_slot_access_count Decrementing a zero access counter.\n" ); -#endif return( PSA_ERROR_CORRUPTION_DETECTED ); }