Phriction Trusted Firmware Trusted Services OP-TEE SPMC status OP-TEE SPMC v3.22 test results History Version 1 vs 16
Version 1 vs 16
Version 1 vs 16
Edits
Edits
- Edit by gabor-toth-arm, Version 16
- Jun 26 2023 4:47 AM
- Edit by gabor-toth-arm, Version 1
- Jun 22 2023 10:48 AM
Edit Older Version 1... | Edit Current Version 16... |
Content Changes
Content Changes
=Overview=
This page is to capture the test results for OP-TEE SPMC v3.22
The tests were ran using the following set of components:
```
>>> Manifest status
d064c30 (HEAD -> default, origin/master, m/master) stm32mp1: fetch mbedtls for tf-a authenticated boot
b242f5c stm32mp1: add edk2 and edk2-platforms repos
122fe9a stm32mp1: bump u-boot to 2023.04
Local manifests:
The merged manifest is:
<?xml version="1.0" encoding="UTF-8"?>
<manifest>
<remote fetch="https://git.gitlab.arm.com" name="arm-gitlab"/>
<remote fetch="https://github.com" name="github"/>
<remote fetch="https://git.savannah.gnu.org/git" name="savannah"/>
<remote fetch="https://git.trustedfirmware.org" name="tfo"/>
<default remote="github" revision="master"/>
<project name="Mbed-TLS/mbedtls.git" path="mbedtls" revision="refs/tags/mbedtls-2.28.1"/>
<project name="OP-TEE/build.git" path="build">
<linkfile dest="build/Makefile" src="fvp-psa-sp.mk"/>
</project>
<project name="OP-TEE/optee_client.git" path="optee_client"/>
<project name="OP-TEE/optee_os.git" path="optee_os"/>
<project name="OP-TEE/optee_test.git" path="optee_test"/>
<project clone-depth="1" name="TF-A/trusted-firmware-a.git" path="trusted-firmware-a" remote="tfo" revision="refs/tags/v2.8"/>
<project name="TS/trusted-services.git" path="trusted-services" remote="tfo" revision="integration"/>
<project clone-depth="1" name="buildroot/buildroot.git" path="buildroot" revision="refs/tags/2022.11.1"/>
<project clone-depth="1" name="grub.git" path="grub" remote="savannah" revision="refs/tags/grub-2.02"/>
<project name="linaro-swg/optee_examples.git" path="optee_examples"/>
<project clone-depth="1" name="linux-arm/linux-trusted-services.git" path="linux-arm-ffa-user" remote="arm-gitlab" revision="debugfs-v5"/>
<project clone-depth="1" name="linux-arm/linux-trusted-services.git" path="linux-arm-ffa-tee" remote="arm-gitlab" revision="tee-v1"/>
<project name="tianocore/edk2-platforms.git" path="edk2-platforms" revision="02daa58c21f89628b4d8c76f95f3a554289149bc"/>
<project name="tianocore/edk2.git" path="edk2" revision="dd4cae4d82c7477273f3da455084844db5cca0c0"/>
<project clone-depth="1" name="torvalds/linux.git" path="linux" revision="refs/tags/v6.1"/>
</manifest>
>>>Project status
project build/
Local and remote SHA is matching.
2e792b3 (HEAD, m/master, github/master) fvp, ts: optimize buildroot config
3730e01 fvp, ts: use minimal Linux config
9b54724 Fix build of fTPM by enabling build of 32-bit libraries
project buildroot/
Local and remote SHA is matching.
d48a8beb (grafted, HEAD, tag: 2022.11.1, tag: m/master) Update for 2022.11.1
project edk2/
Local and remote SHA is matching.
dd4cae4d82 (HEAD, m/master) ArmPkg/GenericWatchdogDxe: Split 64bit register write to 2x32bit
1d802e234e BaseTools: Guid.xref doesn't specify the correct GUID value for Driver
83964ebc5e BaseTools/BinToPcd: Encode string returned from ByteArray()
project edk2-platforms/
Local and remote SHA is matching.
02daa58c21 (HEAD, m/master) Silicon/SynQuacer: Add status property in PCIe & SDHC DT nodes
9f02ebc19b Silicon/SynQuacer: add optional OP-TEE DT node
9dae9a0c79 Marvell/Library: ComPhyLib: Clean up the library after rework
project grub/
Local and remote SHA is matching.
e54c99a (grafted, HEAD, tag: grub-2.02, tag: m/master) Increase version to 2.02.
project linux/
Local and remote SHA is matching.
830b3c68c (grafted, HEAD, tag: v6.1, tag: m/master) Linux 6.1
project linux-arm-ffa-tee/
Local and remote SHA is matching.
c6b9495 (grafted, HEAD, m/master, arm-gitlab/tee-v1) Add versioning info to readme
project linux-arm-ffa-user/
Local and remote SHA is matching.
18e3be7 (grafted, HEAD, m/master, arm-gitlab/debugfs-v5) Add support for FF-A driver changes in v6.1
project mbedtls/
Local and remote SHA is matching.
dd79db100 (HEAD, tag: v2.28.1, tag: mbedtls-2.28.1, tag: m/master) Merge pull request #955 from Mbed-TLS/mbedtls-2.28.1rc0-pr
fe9d08fd1 Bump version
fa827b4b3 Minor tweaks to Changelog
project optee_client/
Local and remote SHA is matching.
8533e0e (HEAD, tag: 3.21.0-rc1, tag: 3.21.0, m/master, github/master) travis: remove the .travis.yml file
0fc6ef7 tee-supplicant: fix leak when load plugin failed
dde6306 libteeacl: use realloc() instead of reallocarray()
project optee_examples/
Local and remote SHA is matching.
378dc0d (HEAD, tag: 3.21.0, m/master, github/master) hotp: use sess_ctx instead of global variables
a98d01e (tag: 3.21.0-rc1, tag: 3.20.0-rc1, tag: 3.20.0) pluging: add missing of dependency syslog on teec
3ca8454 Enable compatibility with TEE Internal Core API v1.1
project optee_os/
Local and remote SHA is matching.
280b6a32e (HEAD, m/master, github/master) core: spmc: implement FFA_CONSOLE_LOG
b89b3da24 core: thread: Add support for canary value randomization
fb66b364b mk/aosp_optee.mk: fix build dependency for static libraries
project optee_test/
Local and remote SHA is matching.
232dfd2 (HEAD, m/master, github/master) xtest: remove ffa.h from SPMC test to resolve compiler error
36a136d Android.mk: add subkeys include directory
d168ff4 xtest: fix xtest tool name in usage trace messages
project trusted-firmware-a/
Local and remote SHA is matching.
9881bb9 (grafted, HEAD, tag: v2.8, tag: m/master) Merge "docs(spm): update threat model" into integration
project trusted-services/
Local and remote SHA is matching.
e56c7b1 (HEAD, tfo/integration, m/master) Implement FFA_CONSOLE_LOG interface
0100ddd Add FF-A v1.1 boot protocol
4f9d8e3 Refactor FF-A boot info
```
=Details=
==Config 1: embedded SP==
====Build command====
```
MEASURED_BOOT=y SPMC_TESTS=n TS_SMM_GATEWAY=n TS_UEFI_TESTS=n SP_PACKAGING_METHOD=embedded DEFAULT_SP_CONFIG=default-sp SP_BLOCK_STORAGE_CONFIG=default-sp SP_PSA_ITS_CONFIG=shared-flash-opteesp SP_PSA_PS_CONFIG=shared-flash-opteesp make
```
====Setup steps after boot====
```
/mnt/host/out/linux-arm-ffa-tee/load_module.sh
/mnt/host/out/linux-arm-ffa-user/load_module.sh
cp -at /usr /mnt/host/out/ts-install/arm-linux/bin /mnt/host/out/ts-install/arm-linux/lib
```
====Test results====
**Trusted Services service level test**
```
TEST(FwuServiceTests, checkMetadataAccess) - 1 ms
TEST(FwuServiceTests, checkImgDirAccess) - 0 ms
TEST(PsServiceTests, createAndSetExtended) - 1 ms
TEST(PsServiceTests, createAndSet) - 0 ms
TEST(PsServiceTests, storeNewItem) - 1 ms
TEST(ItsServiceTests, storeNewItem) - 0 ms
TEST(AttestationProvisioningTests, provisionedIak) - 0 ms
TEST(AttestationProvisioningTests, selfGeneratedIak) - 1 ms
- 62 ms
TEST(AttestationServiceTests, invalidChallengeLen) - 0 ms
TEST(AttestationServiceTests, checkTokenSize) - 1 ms
TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 1 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 0 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 0 ms
TEST(CryptoMacServicePackedcTests, macAbort) - 0 ms
TEST(CryptoMacServicePackedcTests, signAndVerify) - 0 ms
TEST(CryptoCipherServicePackedcTests, cipherAbort) - 0 ms
TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 0 ms
TEST(CryptoHashServicePackedcTests, hashAbort) - 0 ms
TEST(CryptoHashServicePackedcTests, hashAndVerify) - 0 ms
TEST(CryptoHashServicePackedcTests, calculateHash) - 0 ms
TEST(CryptoServicePackedcTests, generateRandomNumbers) - 0 ms
TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 5 ms
TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 2 ms
TEST(CryptoServicePackedcTests, signAndVerifyEat) - 3 ms
TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 3 ms
TEST(CryptoServicePackedcTests, signAndVerifyHash) - 3 ms
TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 0 ms
TEST(CryptoServicePackedcTests, exportPublicKey) - 0 ms
TEST(CryptoServicePackedcTests, purgeKey) - 1 ms
TEST(CryptoServicePackedcTests, copyKey) - 1 ms
TEST(CryptoServicePackedcTests, generatePersistentKeys) - 1 ms
TEST(CryptoServicePackedcTests, generateVolatileKeys) - 0 ms
TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 0 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 22 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 1 ms
TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 3 ms
TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 3 ms
TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 1 ms
TEST(CryptoServiceProtobufTests, exportPublicKey) - 0 ms
TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 1 ms
TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 0 ms
TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 94 ms
TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 21 ms
TEST(DiscoveryServiceTests, checkServiceInfo) - 0 ms
TEST(FwuUpdateFmpTests, wholeFmpFlow) - 0 ms
TEST(FwuOversizeImageTests, oversizeInstallMultiLocationEndStaging) - 1 ms
TEST(FwuOversizeImageTests, oversizeInstallEndStaging) - 0 ms
TEST(FwuOversizeImageTests, oversizeInstallCancelStaging) - 0 ms
TEST(FwuOversizeImageTests, maxSizeInstall) - 0 ms
TEST(FwuRollbackTests, bootloaderFallback) - 0 ms
TEST(FwuRollbackTests, selectPreviousAfterActivation) - 0 ms
TEST(FwuRollbackTests, selectPreviousPriorToActivation) - 1 ms
TEST(FwuPowerFailureTests, powerFailureDuringTrial) - 0 ms
TEST(FwuPowerFailureTests, powerFailureDuringStaging) - 1 ms
TEST(FwuUpdateScenarioTests, partialFirmwareUpdateFlow) - 0 ms
TEST(FwuUpdateScenarioTests, wholeFirmwareUpdateFlow) - 1 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInTrial) - 0 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInStaging) - 0 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInRegular) - 0 ms
TEST(FwuImageDirectoryTests, zeroFwLocations) - 0 ms
TEST(FwuImageDirectoryTests, multipleFwLocations) - 0 ms
TEST(FwuImageDirectoryTests, singleFwLocation) - 1 ms
TEST(FwuImageDirectoryTests, streamRecycling) - 0 ms
TEST(FwuImageDirectoryTests, streamedReads) - 0 ms
TEST(BlockStorageServiceTests, blockAccessOperations) - 0 ms
TEST(BlockStorageServiceTests, openClose) - 1 ms
TEST(BlockStorageServiceTests, getPartitionInfo) - 0 ms
TEST(SmmVariableAttackTests, getCheckPropertyWithMaxSizeName) - 2 ms
TEST(SmmVariableAttackTests, getCheckPropertyWithOversizeName) - 0 ms
TEST(SmmVariableAttackTests, setCheckPropertyWithMaxSizeName) - 0 ms
TEST(SmmVariableAttackTests, setCheckPropertyWithOversizeName) - 1 ms
TEST(SmmVariableAttackTests, enumerateWithSizeMaxNameSize) - 0 ms
TEST(SmmVariableAttackTests, enumerateWithOversizeName) - 1 ms
TEST(SmmVariableAttackTests, setAndGetWithSizeMaxNameSize) - 0 ms
TEST(SmmVariableAttackTests, setAndGetWithOversizeName) - 0 ms
TEST(SmmVariableAttackTests, setWithSizeMaxNameSize) - 1 ms
TEST(SmmVariableAttackTests, setWithOversizeName) - 0 ms
TEST(SmmVariableAttackTests, setWithSizeMaxDataSize) - 1 ms
TEST(SmmVariableAttackTests, setWithOversizeData) - 0 ms
TEST(SmmVariableServiceTests, checkMaxVariablePayload) - 0 ms
TEST(SmmVariableServiceTests, setSizeConstraint) - 1 ms
TEST(SmmVariableServiceTests, enumerateStoreContents) - 0 ms
TEST(SmmVariableServiceTests, getVarSizeNv) - 1 ms
TEST(SmmVariableServiceTests, getVarSize) - 0 ms
TEST(SmmVariableServiceTests, setAndGetNv) - 1 ms
TEST(SmmVariableServiceTests, setAndGet) - 0 ms
TEST(TestRunnerServiceTests, runSpecificTest) - 0 ms
TEST(TestRunnerServiceTests, runConfigTests) - 0 ms
TEST(TestRunnerServiceTests, listPlatformTests) - 0 ms
TEST(TestRunnerServiceTests, runAllTests) - 0 ms
TEST(TestRunnerServiceTests, listAllTests) - 0 ms
OK (92 tests, 92 ran, 344867 checks, 0 ignored, 0 filtered out, 249 ms)
```
**PSA Architecture Test Suite**
```
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Crypto Suite
******************************************
TEST: 201 | DESCRIPTION: Testing crypto key management APIs | UT: psa_crypto_init
[Info] Executing tests from non-secure
[Check 1] Test calling crypto functions before psa_crypto_init
[Check 2] Test psa_crypto_init
[Check 3] Test multiple psa_crypto_init
TEST RESULT: PASSED
******************************************
TEST: 202 | DESCRIPTION: Testing crypto key management APIs | UT: psa_import_key
[Info] Executing tests from non-secure
[Check 1] Test psa_import_key 16 bytes AES
[Check 2] Test psa_import_key 24 bytes AES
[Check 3] Test psa_import_key 32 bytes AES
[Check 4] Test psa_import_key 2048 RSA public key
[Check 5] Test psa_import_key with RSA 2048 keypair
[Check 6] Test psa_import_key with DES 8 bytes key
[Check 7] Test psa_import_key with Triple DES 2-Key
[Check 8] Test psa_import_key with Triple DES 3-Key
[Check 9] Test psa_import_key with EC Public key
[Check 10] Test psa_import_key with EC keypair
[Check 11] Test psa_import_key 16 bytes AES with invalid bits
[Check 12] Test psa_import_key with key data greater than the algorithm size
[Check 13] Test psa_import_key with incorrect key data size
[Check 14] Test psa_import_key with invalid key type value
TEST RESULT: PASSED
******************************************
TEST: 203 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_key
[Info] Executing tests from non-secure
[Check 1] Test psa_export_key 16 Byte AES
[Check 2] Test psa_export_key 24 Byte AES
[Check 3] Test psa_export_key 32 Byte AES
[Check 4] Test psa_export_key 2048 RSA public key
[Check 5] Test psa_export_key with RSA 2048 keypair
[Check 6] Test psa_export_key with DES 64 bit key
[Check 7] Test psa_export_key with Triple DES 2-Key
[Check 8] Test psa_export_key with Triple DES 3-Key
[Check 9] Test psa_export_key with EC Public key
[Check 10] Test psa_export_key with EC keypair
[Check 11] Test psa_export_key with key policy verify
[Check 12] Test psa_export_key with less buffer size
TEST RESULT: PASSED
******************************************
TEST: 204 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_public_key
[Info] Executing tests from non-secure
[Check 1] Test psa_export_public_key 16 Byte AES
[Check 2] Test psa_export_public_key 24 Byte AES
[Check 3] Test psa_export_public_key 32 Byte AES
[Check 4] Test psa_export_public_key 2048 RSA public key
[Check 5] Test psa_export_public_key with RSA 2048 keypair
[Check 6] Test psa_export_public_key with DES 64 bit key
[Check 7] Test psa_export_public_key with Triple DES 2-Key
[Check 8] Test psa_export_public_key with Triple DES 3-Key
[Check 9] Test psa_export_public_key with EC Public key
[Check 10] Test psa_export_public_key with EC keypair
[Check 11] Test psa_export_public_key with less buffer size
TEST RESULT: PASSED
******************************************
TEST: 205 | DESCRIPTION: Testing crypto key management APIs | UT: psa_destroy_key
[Info] Executing tests from non-secure
[Check 1] Test psa_destroy_key 16 Byte AES
[Check 2] Test psa_destroy_key 24 Byte AES
[Check 3] Test psa_destroy_key 32 Byte AES
[Check 4] Test psa_destroy_key 2048 RSA public key
[Check 5] Test psa_destroy_key with RSA 2048 keypair
[Check 6] Test psa_destroy_key with DES 64 bit key
[Check 7] Test psa_destroy_key with Triple DES 2-Key
[Check 8] Test psa_destroy_key with Triple DES 3-Key
[Check 9] Test psa_destroy_key with EC Public key
[Check 10] Test psa_destroy_key with EC keypair
TEST RESULT: PASSED
******************************************
TEST: 206 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compute
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_compute with MD5 algorithm
[Check 2] Test psa_hash_compute with RIPEMD160 algorithm
[Check 3] Test psa_hash_compute with SHA1 algorithm
[Check 4] Test psa_hash_compute with SHA224 algorithm
[Check 5] Test psa_hash_compute with SHA256 algorithm
[Check 6] Test psa_hash_compute with SHA384 algorithm
[Check 7] Test psa_hash_compute with SHA512 algorithm
[Check 8] Test psa_hash_compute with small buffer size
[Check 9] Test psa_hash_compute with invalid algorithm
TEST RESULT: PASSED
******************************************
TEST: 207 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compare
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_compare with MD5 algorithm
[Check 2] Test psa_hash_compare with RIPEMD160 algorithm
[Check 3] Test psa_hash_compare with SHA1 algorithm
[Check 4] Test psa_hash_compare with SHA224 algorithm
[Check 5] Test psa_hash_compare with SHA256 algorithm
[Check 6] Test psa_hash_compare with SHA384 algorithm
[Check 7] Test psa_hash_compare with SHA512 algorithm
[Check 8] Test psa_hash_compare with incorrect hash
[Check 9] Test psa_hash_compare with incorrect hash length
[Check 10] Test psa_hash_compare with invalid algorithm
TEST RESULT: PASSED
******************************************
TEST: 208 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_setup - ECDH + HKDF-SHA-256
[Check 2] Test psa_key_derivation_setup - ECDH, unknown KDF
[Check 3] Test psa_key_derivation_setup - bad key derivation algorithm
[Check 4] Test psa_key_derivation_setup - Invalid Algorithm
TEST RESULT: PASSED
******************************************
TEST: 209 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_bytes
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_input_bytes - Step as Info
[Check 2] Test psa_key_derivation_input_bytes - Step as secret
[Check 3] Test psa_key_derivation_input_bytes - Step as salt
[Check 4] Test psa_key_derivation_input_bytes - Step as label
[Check 5] Test psa_key_derivation_input_bytes - Step as seed
[Check 6] Test psa_key_derivation_input_bytes - Invalid step
TEST RESULT: PASSED
******************************************
TEST: 210 | DESCRIPTION: Testing crypto key attributes APIs | UT: psa_key_attributes_set_get
[Info] Executing tests from non-secure
[Check 1] Test psa_key_attributes_set_get key attributes
TEST RESULT: PASSED
******************************************
TEST: 211 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_setup with MD5 algorithm
[Check 2] Test psa_hash_setup with RIPEMD160 algorithm
[Check 3] Test psa_hash_setup with SHA1 algorithm
[Check 4] Test psa_hash_setup with SHA224 algorithm
[Check 5] Test psa_hash_setup with SHA256 algorithm
[Check 6] Test psa_hash_setup with SHA384 algorithm
[Check 7] Test psa_hash_setup with SHA512 algorithm
[Check 8] Test psa_hash_setup with Invalid hash algorithm
[Check 9] Test psa_hash_setup with Invalid algorithm
[Check 10] Test psa_hash_setup with CTR algorithm
TEST RESULT: PASSED
******************************************
TEST: 212 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_update
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_update with MD5 algorithm
[Check 2] Test psa_hash_update with RIPEMD160 algorithm
[Check 3] Test psa_hash_update with SHA1 algorithm
[Check 4] Test psa_hash_update with SHA224 algorithm
[Check 5] Test psa_hash_update with SHA256 algorithm
[Check 6] Test psa_hash_update with SHA384 algorithm
[Check 7] Test psa_hash_update with SHA512 algorithm
[Check 8] Test psa_hash_update without hash setup
[Check 9] Test psa_hash_update with completed opertaion handle
TEST RESULT: PASSED
******************************************
TEST: 213 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_verify with MD5 algorithm
[Check 2] Test psa_hash_verify with RIPEMD160 algorithm
[Check 3] Test psa_hash_verify with SHA1 algorithm
[Check 4] Test psa_hash_verify with SHA224 algorithm
[Check 5] Test psa_hash_verify with SHA256 algorithm
[Check 6] Test psa_hash_verify with SHA384 algorithm
[Check 7] Test psa_hash_verify with SHA512 algorithm
[Check 8] Test psa_hash_verify with incorrect expected hash
[Check 9] Test psa_hash_verify with incorrect hash length
[Check 10] test psa_hash_verify with inactive & invalid operation handle
TEST RESULT: PASSED
******************************************
TEST: 214 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_finish with MD5 algorithm
[Check 2] Test psa_hash_finish with RIPEMD160 algorithm
[Check 3] Test psa_hash_finish with SHA1 algorithm
[Check 4] Test psa_hash_finish with SHA224 algorithm
[Check 5] Test psa_hash_finish with SHA256 algorithm
[Check 6] Test psa_hash_finish with SHA384 algorithm
[Check 7] Test psa_hash_finish with SHA512 algorithm
[Check 8] Test psa_hash_finish with invalid hash buffer size
[Check 9] test psa_hash_finish with inactive operation handle
TEST RESULT: PASSED
******************************************
TEST: 215 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_abort with MD5 algorithm
[Check 2] Test psa_hash_abort with RIPEMD160 algorithm
[Check 3] Test psa_hash_abort with SHA1 algorithm
[Check 4] Test psa_hash_abort with SHA224 algorithm
[Check 5] Test psa_hash_abort with SHA256 algorithm
[Check 6] Test psa_hash_abort with SHA384 algorithm
[Check 7] Test psa_hash_abort with SHA512 algorithm
[Check 8] Test psa_hash_finish after calling psa_hash_abort
TEST RESULT: PASSED
******************************************
TEST: 216 | DESCRIPTION: Testing crypto generator functions APIs | UT: psa_generate_key
[Info] Executing tests from non-secure
[Check 1] Test psa_generate_key 16 Byte AES
[Check 2] Test psa_generate_key 24 Byte AES
[Check 3] Test psa_generate_key 32 Byte AES
[Check 4] Test psa_generate_key with DES 64 bit key
[Check 5] Test psa_generate_key with Triple DES 2-Key
[Check 6] Test psa_generate_key with Triple DES 3-Key
[Check 7] Test psa_generate_key with RSA 2048 Keypair
[Check 8] Test psa_generate_key with ECC KeyPair
[Check 9] Test psa_generate_key with RSA 2048 Public key
[Check 10] Test psa_generate_key with invalid key type
[Check 11] Test psa_generate_key with invalid usage flags
TEST RESULT: PASSED
******************************************
TEST: 217 | DESCRIPTION: Testing crypto generation APIs | UT: psa_generate_random
[Info] Executing tests from non-secure
[Check 1] Test psa_generate_random to get 0 Byte data
[Check 2] Test psa_generate_random to get 16 Byte data
[Check 3] Test psa_generate_random to get 24 Byte data
[Check 4] Test psa_generate_random to get 32 Byte data
[Check 5] Test psa_generate_random to get 64 Byte data
[Check 6] Test psa_generate_random to get 128 Byte data
[Check 7] Test psa_generate_random to get 256 Byte data
[Check 8] Test psa_generate_random to get 512 Byte data
[Check 9] Test psa_generate_random to get 1000 Byte data
TEST RESULT: PASSED
******************************************
TEST: 218 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_key
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_input_key 16 Byte Key
[Check 2] Test psa_key_derivation_input_key with invalid usage
[Check 3] Test psa_key_derivation_input_key with step as label
[Check 4] Test psa_key_derivation_input_key with step as info
[Check 5] Test psa_key_derivation_input_key with step as seed
[Check 6] Test psa_key_derivation_input_key with step as salt
[Check 7] Test psa_key_derivation_input_key with key type as AES(not derive)
[Check 8] Test psa_key_derivation_input_key incorrect key algorithm
[Check 9] Test psa_key_derivation_input_key with key type as 2048 RSA public key
[Check 10] Test psa_key_derivation_input_key with key type as RSA 2048 keypair
[Check 11] Test psa_key_derivation_input_key with zero as step
[Check 12] Test psa_cipher_decrypt_setup - Invalid key handle
[Check 13] Test psa_cipher_decrypt_setup - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 219 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_key_agreement
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_key_agreement - ECDH SECP256R1
[Check 2] Test psa_key_derivation_key_agreement - Invalid step
[Check 3] Test psa_key_derivation_key_agreement - ECDH SECP384R1
[Check 4] Test psa_key_derivation_key_agreement - Invalid usage
[Check 5] Test psa_key_derivation_key_agreement - KDF not a key agreement alg
[Check 6] Test psa_key_derivation_key_agreement - Public key of different curve
[Check 7] Test psa_key_derivation_key_agreement - Pub key instead of Prv key
[Check 8] Test psa_key_derivation_key_agreement - Invalid handle
[Check 9] Test psa_key_derivation_key_agreement - Zero as handle
TEST RESULT: PASSED
******************************************
TEST: 220 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_bytes
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_output_bytes - HKDF
[Check 2] Test psa_key_derivation_output_bytes - optional salt
[Check 3] Test psa_key_derivation_output_bytes - capacity < output_length
[Check 4] Test psa_key_derivation_output_bytes - missing info
[Check 5] Test psa_key_derivation_output_bytes - missing salt/secret/info
[Check 6] Test psa_key_derivation_output_bytes - TLS12_PRF
[Check 7] Test psa_key_derivation_output_bytes - capacity < output_length
[Check 8] Test psa_key_derivation_output_bytes - missing seed/secret/label
TEST RESULT: PASSED
******************************************
TEST: 221 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_key
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_output_key - Key
[Check 2] Test psa_key_derivation_output_key - Info
[Check 3] Test psa_key_derivation_output_key - Salt
[Check 4] Test psa_key_derivation_output_key - Greater Capacity than available
[Check 5] Test psa_key_derivation_output_key - ECC Public key
[Check 6] Test psa_key_derivation_output_key - ECC keypair (wrong key length)
[Check 7] Test psa_key_derivation_output_key - RSA Public Key[Check 8] Test psa_key_derivation_output_key - RSA keypair
[Check 9] Test psa_key_derivation_output_key - Invalid key size
TEST RESULT: PASSED
******************************************
TEST: 222 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_abort
TEST RESULT: PASSED
******************************************
TEST: 223 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_set_get_capacity
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_set_get_capacity - < operation's capacity
[Check 2] Test psa_key_derivation_set_get_capacity - = operation's capacity
[Check 3] Test psa_key_derivation_set_get_capacity - > operation's capacity
[Check 4] Test psa_key_derivation_set_get_capacity - unchanged capacity
TEST RESULT: PASSED
******************************************
TEST: 224 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_encrypt - CCM - AES - 13B nonce & 8B add data
[Check 2] Test psa_aead_encrypt - CCM - AES - 13B nonce & 32B add data
[Check 3] Test psa_aead_encrypt - CCM - AES - 24 bytes Tag length = 4
[Check 4] Test psa_aead_encrypt - CCM - AES - Zero additional data
[Check 5] Test psa_aead_encrypt - CCM - AES - Zero plaintext
[Check 6] Test psa_aead_encrypt - GCM - AES - 12B nonce & 12B add data
[Check 7] Test psa_aead_encrypt - Unsupported algorithm
[Check 8] Test psa_aead_encrypt - Invalid usage flag
[Check 9] Test psa_aead_encrypt - Invalid ciphertext_size
[Check 10] Test psa_aead_encrypt - Invalid nonce
[Check 11] Test psa_aead_encrypt - Invalid tag length 0
TEST RESULT: PASSED
******************************************
TEST: 225 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_decrypt - CCM - AES - 13B nonce & 8B add data
[Check 2] Test psa_aead_decrypt - CCM - AES - 13B nonce & 32B add data
[Check 3] Test psa_aead_decrypt - CCM - AES - 24 bytes Tag length = 4
[Check 4] Test psa_aead_decrypt - CCM - AES - Zero additional data
[Check 5] Test psa_aead_decrypt - CCM - AES - Zero plaintext
[Check 6] Test psa_aead_decrypt - GCM - AES - 12B nonce & 12B add data
[Check 7] Test psa_aead_decrypt - Unsupported algorithm
[Check 8] Test psa_aead_decrypt - Invalid usage flag
[Check 9] Test psa_aead_decrypt - Invalid plaintext_size
[Check 10] Test psa_aead_decrypt - Invalid nonce
[Check 11] Test psa_aead_decrypt - Invalid cihpertext
[Check 12] Test psa_aead_decrypt - Invalid cihpertext_size
[Check 13] Test psa_aead_decrypt - Invalid tag length 0
TEST RESULT: PASSED
******************************************
TEST: 226 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_sign_setup - HMAC - SHA256
[Check 2] Test psa_mac_sign_setup - CMAC - AES
[Check 3] Test psa_mac_sign_setup - Incompatible HMAC for CMAC
[Check 4] Test psa_mac_sign_setup - Invalid usage flag
[Check 5] Test psa_mac_sign_setup - Invalid key type
[Check 6] Test psa_mac_sign_setup - Truncated MAC too large
[Check 7] Test psa_mac_sign_setup - Truncated MAC too small
[Check 8] Test psa_mac_sign_setup - Unknown MAC algorithm
[Check 9] Test psa_mac_sign_setup - Bad algorithm (not a MAC algorithm)
[Check 10] Test psa_mac_sign_setup invalid key handle
[Check 11] Test psa_mac_sign_setup zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 227 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_update
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_update - HMAC - SHA256 - 64 Byte
[Check 2] Test psa_mac_update - CMAC - AES - 16 Byte
[Check 3] Test psa_mac_update - HMAC - SHA512 - 32 Byte
[Check 4] Test psa_mac_update - HMAC - SHA512 - Invalid operation state
TEST RESULT: PASSED
******************************************
TEST: 228 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_sign_finish - HMAC - SHA224
[Check 2] Test psa_mac_sign_finish - HMAC - SHA256
[Check 3] Test psa_mac_sign_finish - HMAC - SHA512
[Check 4] Test psa_mac_sign_finish - HMAC - SHA224 - Truncated 8 Byte
[Check 5] Test psa_mac_sign_finish - HMAC - SHA224 - Small output buffer
[Check 6] Test psa_mac_sign_finish - HMAC - SHA224 - Invalid operation state
[Check 7] Test psa_mac_sign_finish - CMAC - AES
TEST RESULT: PASSED
******************************************
TEST: 229 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify_setup - HMAC - SHA256
[Check 2] Test psa_mac_verify_setup - CMAC - AES
[Check 3] Test psa_mac_verify_setup - Incompatible HMAC for CMAC
[Check 4] Test psa_mac_verify_setup - Invalid usage flag
[Check 5] Test psa_mac_verify_setup - Invalid key type
[Check 6] Test psa_mac_verify_setup - Truncated MAC too large
[Check 7] Test psa_mac_verify_setup - Truncated MAC too small
[Check 8] Test psa_mac_verify_setup - Unknown MAC algorithm
[Check 9] Test psa_mac_verify_setup - Bad algorithm (not a MAC algorithm)
[Check 10] Test psa_mac_verify_setup invalid key handle
[Check 11] Test psa_mac_verify_setup zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 230 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify_finish - HMAC - SHA224
[Check 2] Test psa_mac_verify_finish - HMAC - SHA256
[Check 3] Test psa_mac_verify_finish - HMAC - SHA512
[Check 4] Test psa_mac_verify_finish - HMAC - SHA224 - Truncated 8 Byte
[Check 5] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid mac length
[Check 6] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid expected mac
[Check 7] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid operation state
[Check 8] Test psa_mac_verify_finish - CMAC - AES
TEST RESULT: PASSED
******************************************
TEST: 231 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_abort - HMAC - SHA224
[Check 2] Test psa_mac_abort - HMAC - SHA224 - Truncated 8 Byte
[Check 3] Test psa_mac_abort - HMAC - SHA256
[Check 4] Test psa_mac_abort - HMAC - SHA512
[Check 5] Test psa_mac_abort - CMAC - AES
[Check 6] Test psa_mac_sign_finish after calling psa_mac_abort
TEST RESULT: PASSED
******************************************
TEST: 232 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_encrypt_setup 16 Byte AES
[Check 2] Test psa_cipher_encrypt_setup 24 Byte AES
[Check 3] Test psa_cipher_encrypt_setup 32 Byte AES
[Check 4] Test psa_cipher_encrypt_setup DES 64 bit key
[Check 5] Test psa_cipher_encrypt_setup Triple DES 2-Key
[Check 6] Test psa_cipher_encrypt_setup Triple DES 3-Key
[Check 7] Test psa_cipher_encrypt_setup 16 Byte raw data
[Check 8] Test psa_cipher_encrypt_setup - not a cipher algorithm
[Check 9] Test psa_cipher_encrypt_setup - unknown cipher algorithm
[Check 10] Test psa_cipher_encrypt_setup - incompatible key ARC4
[Check 11] Test psa_cipher_encrypt_setup - incorrect usage
[Check 12] Test psa_cipher_encrypt_setup - RSA public key
[Check 13] Test psa_cipher_encrypt_setup - RSA keypair
[Check 14] Test psa_cipher_encrypt_setup - EC Public key
[Check 15] Test psa_cipher_encrypt_setup - EC keypair
[Check 16] Test psa_cipher_encrypt_setup - Invalid key handle
[Check 17] Test psa_cipher_encrypt_setup - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 233 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_decrypt_setup 16 Byte AES
[Check 2] Test psa_cipher_decrypt_setup 24 Byte AES
[Check 3] Test psa_cipher_decrypt_setup 32 Byte AES
[Check 4] Test psa_cipher_decrypt_setup DES 64 bit key
[Check 5] Test psa_cipher_decrypt_setup Triple DES 2-Key
[Check 6] Test psa_cipher_decrypt_setup Triple DES 3-Key
[Check 7] Test psa_cipher_decrypt_setup 16 Byte raw data
[Check 8] Test psa_cipher_decrypt_setup - not a cipher algorithm
[Check 9] Test psa_cipher_decrypt_setup - unknown cipher algorithm
[Check 10] Test psa_cipher_decrypt_setup - incompatible key ARC4
[Check 11] Test psa_cipher_decrypt_setup - incorrect usage
[Check 12] Test psa_cipher_decrypt_setup - RSA public key
[Check 13] Test psa_cipher_decrypt_setup - RSA keypair
[Check 14] Test psa_cipher_decrypt_setup - EC Public key
[Check 15] Test psa_cipher_decrypt_setup - EC keypair
[Check 16] Test psa_cipher_decrypt_setup - Invalid key handle
[Check 17] Test psa_cipher_decrypt_setup - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 234 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_generate_iv
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_generate_iv 16 Byte AES
[Check 2] Test psa_cipher_generate_iv 24 Byte AES
[Check 3] Test psa_cipher_generate_iv 32 Byte AES
[Check 4] Test psa_cipher_generate_iv DES 64 bit key
[Check 5] Test psa_cipher_generate_iv DES 2-Key
[Check 6] Test psa_cipher_generate_iv DES 3-Key
[Check 7] Test psa_cipher_generate_iv AES - small iv buffer
[Check 8] Test psa_cipher_generate_iv DES - small iv buffer
TEST RESULT: PASSED
******************************************
TEST: 235 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_set_iv
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_set_iv 16 Byte AES
[Check 2] Test psa_cipher_set_iv 24 Byte AES
[Check 3] Test psa_cipher_set_iv 32 Byte AES
[Check 4] Test psa_cipher_set_iv DES 64 bit key
[Check 5] Test psa_cipher_set_iv DES 2-Key
[Check 6] Test psa_cipher_set_iv DES 3-Key
[Check 7] Test psa_cipher_set_iv AES - small iv buffer
[Check 8] Test psa_cipher_set_iv DES - small iv buffer
[Check 9] Test psa_cipher_set_iv AES - large iv buffer
[Check 10] Test psa_cipher_set_iv DES - large iv buffer
TEST RESULT: PASSED
******************************************
TEST: 236 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_update
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING (Short in)
[Check 3] Test psa_cipher_update - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_update - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_update - Encrypt - AES CTR
[Check 6] Test psa_cipher_update - Encrypt - DES CBC (nopad)
[Check 7] Test psa_cipher_update - Encrypt - 2-key 3DE -CBC (nopad)
[Check 8] Test psa_cipher_update - Encrypt - 3-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_update - Encrypt - small output buffer size
[Check 10] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING
[Check 11] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING (Short in)
[Check 12] Test psa_cipher_update - Decrypt - AES CBC_PKCS7
[Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7 (Short input)
[Check 14] Test psa_cipher_update - Decrypt - AES CTR
[Check 15] Test psa_cipher_update - Decrypt - DES CBC (nopad)
[Check 16] Test psa_cipher_update - Decrypt - 2-key 3DE -CBC (nopad)
[Check 17] Test psa_cipher_update - Decrypt - 3-key 3DE -CBC (nopad)
[Check 18] Test psa_cipher_update - Decrypt - small output buffer size
[Check 19] Test psa_cipher_update without cipher setup
TEST RESULT: PASSED
******************************************
TEST: 237 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING (Short in)
[Check 3] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_finish - Encrypt - AES CTR
[Check 6] Test psa_cipher_finish - Encrypt - AES CTR (short input)
[Check 7] Test psa_cipher_finish - Encrypt - DES CBC (nopad)
[Check 8] Test psa_cipher_finish - Encrypt - 2-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_finish - Encrypt - 3-key 3DE -CBC (nopad)
[Check 10] Test psa_cipher_finish - Encrypt - small output buffer size
[Check 11] Test psa_cipher_finish - Decrypt - AES CBC_NO_PADDING
[Check 12] Test psa_cipher_finish - Decrypt - AES CBC_NO_PADDING (Short in)
[Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7
[Check 14] Test psa_cipher_finish - Decrypt - AES CBC_PKCS7 (Short input)
[Check 15] Test psa_cipher_finish - Decrypt - AES CTR
[Check 16] Test psa_cipher_finish - Decrypt - AES CTR (short input)
[Check 17] Test psa_cipher_finish - Decrypt - DES CBC (nopad)
[Check 18] Test psa_cipher_finish - Decrypt - 2-key 3DE -CBC (nopad)
[Check 19] Test psa_cipher_finish - Decrypt - 3-key 3DE -CBC (nopad)
TEST RESULT: PASSED
******************************************
TEST: 238 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_abort - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_abort - Encrypt - AES CBC_PKCS7
[Check 3] Test psa_cipher_abort - Encrypt - AES CTR
[Check 4] Test psa_cipher_abort - Encrypt - DES CBC (nopad)
[Check 5] Test psa_cipher_abort - Encrypt - 2-key 3DE -CBC (nopad)
[Check 6] Test psa_cipher_abort - Encrypt - 3-key 3DE -CBC (nopad)
[Check 7] Test psa_cipher_abort - Decrypt - AES CBC_NO_PADDING
[Check 8] Test psa_cipher_abort - Decrypt - AES CBC_PKCS7
[Check 9] Test psa_cipher_abort - Decrypt - AES CTR
[Check 10] Test psa_cipher_abort - Decrypt - DES CBC (nopad)
[Check 11] Test psa_cipher_abort - Decrypt - 2-key 3DE -CBC (nopad)
[Check 12] Test psa_cipher_abort - Decrypt - 3-key 3DE -CBC (nopad)
[Check 13] Test psa_cipher_update after psa_cipher_abort should fail
TEST RESULT: PASSED
******************************************
TEST: 239 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_asymmetric_encrypt - RSA PKCS1V15
[Check 2] Test psa_asymmetric_encrypt - RSA KEY_PAIR PKCS1V15
[Check 3] Test psa_asymmetric_encrypt - RSA OAEP SHA256
[Check 4] Test psa_asymmetric_encrypt - RSA OAEP SHA256 with label
[Check 5] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256
[Check 6] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256 with label
[Check 7] Test psa_asymmetric_encrypt - Small output buffer
[Check 8] Test psa_asymmetric_encrypt - Invalid algorithm
[Check 9] Test psa_asymmetric_encrypt - Invalid key type
[Check 10] Test psa_asymmetric_encrypt - Invalid usage
[Check 11] Test psa_asymmetric_encrypt - RSA PKCS1V15 - Salt
[Check 12] Test psa_asymmetric_encrypt - ECC public key
[Check 13] Test psa_asymmetric_encrypt - Invalid key handle
[Check 14] Test psa_asymmetric_encrypt - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 240 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_asymmetric_decrypt - RSA KEY_PAIR PKCS1V15
[Check 2] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256
[Check 3] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256 with label
[Check 4] Test psa_asymmetric_decrypt - Invalid key type (RSA public key)
[Check 5] Test psa_asymmetric_decrypt - Small output buffer
[Check 6] Test psa_asymmetric_decrypt - Invalid algorithm
[Check 7] Test psa_asymmetric_decrypt - Invalid key type (AES Key)
[Check 8] Test psa_asymmetric_decrypt - Invalid usage
[Check 9] Test psa_asymmetric_decrypt - RSA PKCS1V15 - Salt
[Check 10] Test psa_asymmetric_decrypt - Invalid key handle
[Check 11] Test psa_asymmetric_decrypt - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 241 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_sign_hash
[Info] Executing tests from non-secure
[Check 1] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 3] Test psa_sign_hash - ECDSA SECP256R1 SHA-256
[Check 4] Test psa_sign_hash - Invalid key type (RSA public key)
[Check 5] Test psa_sign_hash - Small output buffer
[Check 6] Test psa_sign_hash - Invalid algorithm
[Check 7] Test psa_sign_hash - Invalid key type (AES Key)
[Check 8] Test psa_sign_hash - Invalid usage
[Check 9] Test psa_sign_hash - Wrong hash size
[Check 10] Test psa_sign_hash - Invalid key handle
[Check 11] Test psa_sign_hash - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 242 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_verify_hash
[Info] Executing tests from non-secure
[Check 1] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 3] Test psa_verify_hash - ECDSA KEY_PAIR SECP256R1 SHA-256
[Check 4] Test psa_verify_hash - EC public key
[Check 5] Test psa_verify_hash - RSA public key
[Check 6] Test psa_verify_hash - Small output buffer
[Check 7] Test psa_verify_hash - Invalid algorithm
[Check 8] Test psa_verify_hash - Invalid key type (AES Key)
[Check 9] Test psa_verify_hash - Invalid usage
[Check 10] Test psa_verify_hash - Wrong hash size
[Check 11] Test psa_verify_hash - Wrong signature
[Check 12] Test psa_verify_hash - Wrong signature size
[Check 13] Test psa_verify_hash - Invalid key handle
[Check 14] Test psa_verify_hash - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 243 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_raw_key_agreement
[Info] Executing tests from non-secure
[Check 1] Test psa_raw_key_agreement - ECDH SECP256R1
[Check 2] Test psa_raw_key_agreement - Small buffer size
[Check 3] Test psa_raw_key_agreement - ECDH SECP384R1
[Check 4] Test psa_raw_key_agreement - Invalid usage
[Check 5] Test psa_raw_key_agreement - Unknown KDF
[Check 6] Test psa_raw_key_agreement - Not a key agreement alg
[Check 7] Test psa_raw_key_agreement - Public key on different curve
[Check 8] Test psa_raw_key_agreement - Public key instead of private key
[Check 9] Test psa_raw_key_agreement - Invalid key handle
[Check 10] Test psa_raw_key_agreement - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 244 | DESCRIPTION: Testing crypto key management APIs | UT: psa_copy_key
[Info] Executing tests from non-secure
[Check 1] Test psa_copy_key - 2048 RSA public key
[Check 2] Test psa_copy_key - RSA 2048 keypair
[Check 3] Test psa_copy_key - Incompatible target policy(source and target)
[Check 4] Test psa_copy_key - source key with no export usage
[Check 5] Test psa_copy_key - DES 64 bit key
[Check 6] Test psa_copy_key - Triple DES 2-Key
[Check 7] Test psa_copy_key - Triple DES 3-Key
[Check 8] Test psa_copy_key - EC Public key
[Check 9] Test psa_copy_key - EC keypair
TEST RESULT: PASSED
******************************************
TEST: 245 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_clone
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_clone - MD5 algorithm
[Check 2] Test psa_hash_clone - RIPEMD160 algorithm
[Check 3] Test psa_hash_clone - SHA1 algorithm
[Check 4] Test psa_hash_clone - SHA224 algorithm
[Check 5] Test psa_hash_clone - SHA256 algorithm
[Check 6] Test psa_hash_clone - SHA384 algorithm
[Check 7] Test psa_hash_clone - SHA512 algorithm
[Check 8] Test psa_hash_clone - from an inactive source operation
[Check 9] Test psa_hash_clone - on an active target operation
TEST RESULT: PASSED
******************************************
TEST: 246 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_compute
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_compute HMAC SHA 224
[Check 2] Test psa_mac_compute - Incompactible HMAC for CMAC
[Check 3] Test psa_mac_compute - Invalid usage
[Check 4] Test psa_mac_compute - truncated MAC too small
[Check 5] Test psa_mac_compute - truncated MAC too large
[Check 6] Test psa_mac_compute - bad algorithm (unknown MAC algorithm)
[Check 7] Test psa_mac_compute HMAC SHA 256
[Check 8] Test psa_mac_compute HMAC SHA 512
[Check 9] Test psa_mac_compute HMAC SHA 224 (truncated to 8 Byte)
[Check 10] Test psa_mac_compute CMAC AES 128
[Check 11] Test psa_mac_compute small size buffer
[Check 12] Test psa_mac_compute - Invalid key type
TEST RESULT: PASSED
******************************************
TEST: 247 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify HMAC SHA 224
[Check 2] Test psa_mac_verify HMAC SHA 256
[Check 3] Test psa_mac_verify - Incompactible HMAC for CMAC
[Check 4] Test psa_mac_verify - Invalid usage
[Check 5] Test psa_mac_verify - Truncated MAC too large
[Check 6] Test psa_mac_verify - Truncated MAC too small
[Check 7] Test psa_mac_verify - bad algorithm (unknown MAC algorithm)
[Check 8] Test psa_mac_verify HMAC SHA 512
[Check 9] Test psa_mac_verify HMAC SHA 224 (truncated to 8 Byte)
[Check 10] Test psa_mac_verify CMAC AES 128
[Check 11] Test psa_mac_verify - Invalid key type
[Check 12] Test psa_mac_verify small size buffer
[Check 13] Test psa_mac_verify incorrect expected MAC
TEST RESULT: PASSED
******************************************
TEST: 248 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING (Short input)
[Check 3] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_encrypt - Encrypt - AES CTR
[Check 6] Test psa_cipher_encrypt - Encrypt - AES CTR (short input)
[Check 7] Test psa_cipher_encrypt - Encrypt - DES CBC (nopad)
[Check 8] Test psa_cipher_encrypt - Encrypt - 2-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_encrypt - Encrypt - 3-key 3DE -CBC (nopad)
[Check 10] Test psa_cipher_encrypt - small output buffer size
[Check 11] Test psa_cipher_encrypt - Decrypt - AES CBC_NO_PADDING
TEST RESULT: PASSED
******************************************
TEST: 249 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_decrypt - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING
[Check 3] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING (Short input)
[Check 4] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING
[Check 5] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7
[Check 6] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7 (Short input)
[Check 7] Test psa_cipher_decrypt - Decrypt - AES CTR
[Check 8] Test psa_cipher_decrypt - Decrypt - DES CBC (nopad)
[Check 9] Test psa_cipher_decrypt - Decrypt - 2-key 3DE -CBC (nopad)
[Check 10] Test psa_cipher_decrypt - 3-key 3DE -CBC (nopad)
TEST RESULT: PASSED
******************************************
TEST: 250 | DESCRIPTION: Testing crypto key management APIs | UT: psa_sign_message
[Info] Executing tests from non-secure
[Check 1] Test psa_sign_message - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_sign_message - ECDSA SECP256R1 SHA-256
[Check 3] Test psa_sign_message - Invalid key type (RSA public key)
[Check 4] Test psa_sign_message - Small output buffer
[Check 5] Test psa_sign_message - Invalid algorithm
[Check 6] Test psa_sign_message - Invalid key type (AES Key)
[Check 7] Test psa_sign_message - Invalid usage
[Check 8] Test psa_sign_message - Mismatch key type and Algorithm
[Check 9] Test psa_sign_message - Alg mismatch in key and API call
[Check 10] Test psa_sign_message - Invalid key handle
[Check 11] Test psa_sign_message - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 251 | DESCRIPTION: Testing crypto key management APIs | UT: psa_verify_message
[Info] Executing tests from non-secure
[Check 1] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_verify_message - RSA Public Key PKCS1V15 RAW
[Check 3] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 4] Test psa_verify_message - ECDSA KEY_PAIR SECP256R1 SHA-256
[Check 5] Test psa_verify_message - ECDSA Public Key SECP256R1 SHA-256
[Check 6] Test psa_verify_message - Small output buffer
[Check 7] Test psa_verify_message - Invalid algorithm
[Check 8] Test psa_verify_message - Invalid key type (AES Key)
[Check 9] Test psa_verify_message - Invalid usage
[Check 10] Test psa_verify_message - Wrong message size
[Check 11] Test psa_verify_message - Wrong signature
[Check 12] Test psa_verify_message - Wrong signature size
[Check 13] Test psa_verify_message - Invalid key handle
[Check 14] Test psa_verify_message - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 252 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_encrypt_setup - CCM - AES
[Check 2] Test psa_aead_encrypt_setup - CCM - AES - Tag length = 4
[Check 3] Test psa_aead_encrypt_setup - CCM - AES - Mismatched tag length
[Check 4] Test psa_aead_encrypt_setup - CCM - AES - Default Tag length
[Check 5] Test psa_aead_encrypt_setup - GCM - AES
[Check 6] Test psa_aead_encrypt_setup - CCM - DES Invalid key
[Check 7] Test psa_aead_encrypt_setup - Invalid usage flag
TEST RESULT: PASSED
******************************************
TEST: 253 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_decrypt_setup - CCM - AES
[Check 2] Test psa_aead_decrypt_setup - CCM - AES - Tag length = 4
[Check 3] Test psa_aead_decrypt_setup - CCM - AES - Mismatched tag length
[Check 4] Test psa_aead_decrypt_setup - CCM - AES - Default Tag length
[Check 5] Test psa_aead_decrypt_setup - GCM - AES
[Check 6] Test psa_aead_decrypt_setup - CCM - DES Invalid key
[Check 7] Test psa_aead_decrypt_setup - Invalid usage flag
TEST RESULT: PASSED
******************************************
TEST: 254 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_generate_nonce
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_generate_nonce - CCM
[Check 2] Test psa_aead_generate_nonce - CCM - Tag length = 4
[Check 3] Test psa_aead_generate_nonce - CCM - Small buffer size
[Check 4] Test psa_aead_generate_nonce - CCM - Uninitialized operation
[Check 5] Test psa_aead_generate_nonce - CCM - Decrypt operation
[Check 6] Test psa_aead_generate_nonce - GCM
[Check 7] Test psa_aead_generate_nonce - GCM - Decrypt operation
TEST RESULT: PASSED
******************************************
TEST: 255 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_nonce
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_set_nonce - Encrypt - CCM
[Check 2] Test psa_aead_set_nonce - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_set_nonce - Encrypt - CCM - Small nonce size
[Check 4] Test psa_aead_set_nonce - Encrypt - CCM - Large nonce size
[Check 5] Test psa_aead_set_nonce - Encrypt - CCM - Invalid operation state
[Check 6] Test psa_aead_set_nonce - Encrypt - GCM
[Check 7] Test psa_aead_set_nonce - Decrypt - CCM
[Check 8] Test psa_aead_set_nonce - Decrypt - CCM - Tag length = 4
[Check 9] Test psa_aead_set_nonce - Decrypt - CCM - Small nonce size
[Check 10] Test psa_aead_set_nonce - Decrypt - CCM - Large nonce size
[Check 11] Test psa_aead_set_nonce - Decrypt - CCM - Invalid operation state
[Check 12] Test psa_aead_set_nonce - Decrypt - GCM
TEST RESULT: PASSED
******************************************
TEST: 256 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_lengths
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_set_lengths - Encrypt - CCM
[Check 2] Test psa_aead_set_lengths - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_set_lengths - Encrypt - CCM - Zero ad_length
[Check 4] Test psa_aead_set_lengths - Encrypt - CCM - Zero plaintext_length
[Check 5] Test psa_aead_set_lengths - Encrypt - CCM - Invalid operation state
[Check 6] Test psa_aead_set_lengths - Encrypt - GCM
[Check 7] Test psa_aead_set_lengths - Decrypt - CCM
[Check 8] Test psa_aead_set_lengths - Decrypt - CCM - Tag length = 4
[Check 9] Test psa_aead_set_lengths - Decrypt - CCM - Zero ad_length
[Check 10] Test psa_aead_set_lengths - Decrypt - CCM - Zero plaintext_length
[Check 11] Test psa_aead_set_lengths - Decrypt - CCM - Invalid operation state
[Check 12] Test psa_aead_set_lengths - Decrypt - GCM
TEST RESULT: PASSED
******************************************
TEST: 257 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update_ad
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_update_ad - Encrypt - CCM
[Check 2] Test psa_aead_update_ad - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_update_ad - Encrypt - CCM - Zero ad_length
[Check 4] Test psa_aead_update_ad - Encrypt - CCM - Zero plaintext_length
[Check 5] Test psa_aead_update_ad - Encrypt - CCM - Invalid operation state
[Check 6] Test psa_aead_update_ad - Encrypt - CCM - Overflow input length
[Check 7] Test psa_aead_update_ad - Decrypt - CCM
[Check 8] Test psa_aead_update_ad - Decrypt - CCM - Tag length = 4
[Check 9] Test psa_aead_update_ad - Decrypt - CCM - Zero ad_length
[Check 10] Test psa_aead_update_ad - Decrypt - CCM - Zero plaintext_length
[Check 11] Test psa_aead_update_ad - Decrypt - CCM - Invalid operation state
[Check 12] Test psa_aead_update_ad - Decrypt - CCM - Overflow input length
TEST RESULT: PASSED
******************************************
TEST: 258 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_update - Encrypt - CCM
[Check 2] Test psa_aead_update - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_update - Encrypt - CCM - Zero ad_length
[Check 4] Test psa_aead_update - Encrypt - CCM - Zero plaintext_length
[Check 5] Test psa_aead_update - Encrypt - CCM - Small buffer size
[Check 6] Test psa_aead_update - Encrypt - CCM - Less add data than specified
[Check 7] Test psa_aead_update - Encrypt - CCM - Overflow input length
[Check 8] Test psa_aead_update - Encrypt - CCM - Invalid operation state
[Check 9] Test psa_aead_update - Decrypt - CCM
[Check 10] Test psa_aead_update - Decrypt - CCM - Tag length = 4
[Check 11] Test psa_aead_update - Decrypt - CCM - Zero ad_length
[Check 12] Test psa_aead_update - Decrypt - CCM - Zero plaintext_length
[Check 13] Test psa_aead_update - Decrypt - CCM - Small buffer size
[Check 14] Test psa_aead_update - Decrypt - Less add data than specified
[Check 15] Test psa_aead_update - Decrypt - CCM - Overflow input length
[Check 16] Test psa_aead_update - Decrypt - CCM - Invalid operation state
TEST RESULT: PASSED
******************************************
TEST: 259 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_finish - AES-CCM
[Check 2] Test psa_aead_finish - AES-CCM 24 bytes Tag length = 4
[Check 3] Test psa_aead_finish - Small buffer size
[Check 4] Test psa_aead_finish - Input length is less than plaintext length
[Check 5] Test psa_aead_finish - GCM - 16B AES - 12B Nonce & 12B additional data
TEST RESULT: PASSED
******************************************
TEST: 260 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_abort - Encrypt - CCM - AES
[Check 2] Test psa_aead_abort - Encrypt - GCM - AES
[Check 3] Test psa_aead_abort - Decrypt - CCM - AES
[Check 4] Test psa_aead_abort - Decrypt - GCM - AES
[Check 5] Test psa_aead_abort with all initializations
TEST RESULT: PASSED
******************************************
TEST: 261 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_verify - AES-CCM
[Check 2] Test psa_aead_verify - AES-CCM 24 bytes Tag length = 4
[Check 3] Test psa_aead_verify - Small buffer size
[Check 4] Test psa_aead_verify - Input length is less than plaintext length
[Check 5] Test psa_aead_verify - GCM - 16B AES - 12B Nounce & 12B addi data
TEST RESULT: PASSED
******************************************
************ Crypto Suite Report **********
TOTAL TESTS : 61
TOTAL PASSED : 61
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
Entering standby..
```
```
#LD_PRELOAD=/mnt/host/out/ts-install/arm-linux/lib/libts.so /mnt/host/out/ts-install/arm-linux/bin/psa-iat-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Attestation Suite
******************************************
TEST: 601 | DESCRIPTION: Testing attestation initial attestation APIs | UT: psa_initial_attestation
[Info] Executing tests from non-secure
[Check 1] Test psa_initial_attestation_get_token with Challenge 32
[Check 2] Test psa_initial_attestation_get_token with Challenge 48
[Check 3] Test psa_initial_attestation_get_token with Challenge 64
[Check 4] Test psa_initial_attestation_get_token with zero challenge size
[Check 5] Test psa_initial_attestation_get_token with small challenge size
[Check 6] Test psa_initial_attestation_get_token with invalid challenge size
[Check 7] Test psa_initial_attestation_get_token with large challenge size
[Check 8] Test psa_initial_attestation_get_token with zero as token size
[Check 9] Test psa_initial_attestation_get_token with small token size
[Check 10] Test psa_initial_attestation_get_token_size with Challenge 32
[Check 11] Test psa_initial_attestation_get_token_size with Challenge 48
[Check 12] Test psa_initial_attestation_get_token_size with Challenge 64
[Check 13] Test psa_initial_attestation_get_token_size with zero challenge size
[Check 14] Test psa_initial_attestation_get_token_size with small challenge size
[Check 15] Test psa_initial_attestation_get_token_size with invalid challenge size
[Check 16] Test psa_initial_attestation_get_token_size with large challenge size
TEST RESULT: PASSED
******************************************
************ Attestation Suite Report **********
TOTAL TESTS : 1
TOTAL PASSED : 1
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
Entering standby..
```
```
#LD_PRELOAD=/mnt/host/out/ts-install/arm-linux/lib/libts.so /mnt/host/out/ts-install/arm-linux/bin/psa-its-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Storage Suite
******************************************
TEST: 401 | DESCRIPTION: UID not found check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call get API for UID 6 which is not set
[Check 2] Call get_info API for UID 6 which is not set
[Check 3] Call remove API for UID 6 which is not set
[Check 4] Call get API for UID 6 which is removed
[Check 5] Call get_info API for UID 6 which is removed
[Check 6] Call remove API for UID 6 which is removed
Set storage for UID 6
[Check 7] Call get API for different UID 5
[Check 8] Call get_info API for different UID 5
[Check 9] Call remove API for different UID 5
TEST RESULT: PASSED
******************************************
TEST: 402 | DESCRIPTION: Write once error check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Update the flag of UID 1 with WRITE_ONCE flag
[Check 2] Try to remove the UID 1 having WRITE_ONCE flag
[Check 3] Create a new UID 2 with WRITE_ONCE flag
[Check 4] Try to remove the UID 2 having WRITE_ONCE flag
[Check 5] Try to change the length of write_once UID 2
[Check 6] Check UID removal still fails
[Check 7] Try to change the WRITE_ONCE flag to None for UID 2
[Check 8] Check UID removal still fails
TEST RESULT: PASSED
******************************************
TEST: 403 | DESCRIPTION: Insufficient space check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Overload storage space
UID 13 set failed due to insufficient space
Remove all registered UIDs
[Check 2] Overload storage again to verify all previous UID removed
UID 13 set failed due to insufficient space
Remove all registered UIDs
TEST RESULT: PASSED
******************************************
TEST: 404 | DESCRIPTION: Data Consistency check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2
[Check 2] Call get API with default length - TEST_BUFF_SIZE
TEST RESULT: PASSED
******************************************
TEST: 405 | DESCRIPTION: Success scenarios check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Set UID with data length zero and call storage APIs
[Check 2] Resetting the length check
TEST RESULT: PASSED
******************************************
TEST: 406 | DESCRIPTION: Check for storage create flags | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE
[Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY
[Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION
TEST RESULT: PASSED
******************************************
TEST: 407 | DESCRIPTION: Incorrect Size check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
Create a valid Storage - TEST_BUFF_SIZE/2
Increase the length of storage - TEST_BUFF_SIZE
[Check 1] Call get API with old length - TEST_BUFF_SIZE/2
[Check 2] Call get API with old length - TEST_BUFF_SIZE/4
Decrease the length of storage - TEST_BUFF_SIZE/4
[Check 3] Call get API with old length - TEST_BUFF_SIZE/2
[Check 4] Call get API with old length - TEST_BUFF_SIZE
[Check 5] Call get API with valid length - TEST_BUFF_SIZE/4
TEST RESULT: PASSED
******************************************
TEST: 408 | DESCRIPTION: Invalid offset check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Try to access data with varying valid offset
[Check 2] Try to access data with varying invalid offset
TEST RESULT: PASSED
******************************************
TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call set API with NULL pointer and data length 0
[Check 2] Call get API with NULL read buffer and data length 0
[Check 3] Remove the UID
[Check 4] Call get_info API to verify UID removed
[Check 5] Create UID with zero data_len and valid write buffer
[Check 8] Call get API with NULL read buffer and data length 0
[Check 9] Increase the length
TEST RESULT: PASSED
******************************************
TEST: 410 | DESCRIPTION: UID value zero check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Creating storage with UID 0 should fail
[Check 2] Get_info for UID 0 should fail
[Check 3] Removing storage with UID 0 should fail
TEST RESULT: PASSED
******************************************
************ Storage Suite Report **********
TOTAL TESTS : 10
TOTAL PASSED : 10
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
Entering standby..
```
```
#LD_PRELOAD=/mnt/host/out/ts-install/arm-linux/lib/libts.so /mnt/host/out/ts-install/arm-linux/bin/psa-ps-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Storage Suite
******************************************
TEST: 401 | DESCRIPTION: UID not found check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call get API for UID 6 which is not set
[Check 2] Call get_info API for UID 6 which is not set
[Check 3] Call remove API for UID 6 which is not set
[Check 4] Call get API for UID 6 which is removed
[Check 5] Call get_info API for UID 6 which is removed
[Check 6] Call remove API for UID 6 which is removed
Set storage for UID 6
[Check 7] Call get API for different UID 5
[Check 8] Call get_info API for different UID 5
[Check 9] Call remove API for different UID 5
TEST RESULT: PASSED
******************************************
TEST: 402 | DESCRIPTION: Write once error check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Update the flag of UID 1 with WRITE_ONCE flag
[Check 2] Try to remove the UID 1 having WRITE_ONCE flag
[Check 3] Create a new UID 2 with WRITE_ONCE flag
[Check 4] Try to remove the UID 2 having WRITE_ONCE flag
[Check 5] Try to change the length of write_once UID 2
[Check 6] Check UID removal still fails
[Check 7] Try to change the WRITE_ONCE flag to None for UID 2
[Check 8] Check UID removal still fails
TEST RESULT: PASSED
******************************************
TEST: 403 | DESCRIPTION: Insufficient space check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Overload storage space
UID 13 set failed due to insufficient space
Remove all registered UIDs
[Check 2] Overload storage again to verify all previous UID removed
UID 13 set failed due to insufficient space
Remove all registered UIDs
TEST RESULT: PASSED
******************************************
TEST: 404 | DESCRIPTION: Data Consistency check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2
[ 31.112642] random: crng init done
[Check 2] Call get API with default length - TEST_BUFF_SIZE
TEST RESULT: PASSED
******************************************
TEST: 405 | DESCRIPTION: Success scenarios check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Set UID with data length zero and call storage APIs
[Check 2] Resetting the length check
TEST RESULT: PASSED
******************************************
TEST: 406 | DESCRIPTION: Check for storage create flags | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE
[Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY
[Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION
TEST RESULT: PASSED
******************************************
TEST: 407 | DESCRIPTION: Incorrect Size check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Create a valid Storage - TEST_BUFF_SIZE/2
Increase the length of storage - TEST_BUFF_SIZE
[Check 1] Call get API with old length - TEST_BUFF_SIZE/2
[Check 2] Call get API with old length - TEST_BUFF_SIZE/4
Decrease the length of storage - TEST_BUFF_SIZE/4
[Check 3] Call get API with old length - TEST_BUFF_SIZE/2
[Check 4] Call get API with old length - TEST_BUFF_SIZE
[Check 5] Call get API with valid length - TEST_BUFF_SIZE/4
TEST RESULT: PASSED
******************************************
TEST: 408 | DESCRIPTION: Invalid offset check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Try to access data with varying valid offset
[Check 2] Try to access data with varying invalid offset
TEST RESULT: PASSED
******************************************
TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call set API with NULL pointer and data length 0
[Check 2] Call get API with NULL read buffer and data length 0
[Check 3] Remove the UID
[Check 4] Call get_info API to verify UID removed
[Check 5] Create UID with zero data_len and valid write buffer
[Check 8] Call get API with NULL read buffer and data length 0
[Check 9] Increase the length
TEST RESULT: PASSED
******************************************
TEST: 410 | DESCRIPTION: UID value zero check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Creating storage with UID 0 should fail
[Check 2] Get_info for UID 0 should fail
[Check 3] Removing storage with UID 0 should fail
TEST RESULT: PASSED
******************************************
TEST: 411 | DESCRIPTION: Optional APIs: UID not found check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 412 | DESCRIPTION: Optional APIs: Invalid arguments and offset invalid | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 413 | DESCRIPTION: Set_Extended and Create api : Success | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 414 | DESCRIPTION: Optional APIs not supported check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Optional PS APIs are not supported.
[Check 1] Call to create API should fail as API not supported
Failed at Checkpoint: 1
Actual: 0
Expected: -134
TEST RESULT: FAILED (Error Code=0x1)
******************************************
TEST: 415 | DESCRIPTION: Create API write_once flag value check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 416 | DESCRIPTION: Storage assest capacity modification check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs not are supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 417 | DESCRIPTION: Storage assest capacity modification check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs not are supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
************ Storage Suite Report **********
TOTAL TESTS : 17
TOTAL PASSED : 10
TOTAL SIM ERROR : 0
TOTAL FAILED : 1
TOTAL SKIPPED : 6
******************************************
Entering standby..
```
**Component test**
```
TEST(BlockVolumeTests, oversizeWrite) - 1 ms
TEST(BlockVolumeTests, multipleImageInstall) - 0 ms
TEST(BlockVolumeTests, seekAccess) - 0 ms
TEST(BlockVolumeTests, readAndWrite) - 0 ms
TEST(BlockVolumeTests, openClose) - 0 ms
IGNORE_TEST(PartitionTableTests, detectCorruptedGptHeader) - 0 ms
TEST(PartitionTableTests, detectCorruptedMbr) - 1 ms
TEST(PartitionTableTests, loadRefPartitionTable) - 0 ms
TEST(GptIteratorTests, iterateOverRefGpt) - 0 ms
TEST(UefiVariableStoreTests, noRemoveCheck) - 0 ms
TEST(UefiVariableStoreTests, readOnlycheck) - 1 ms
TEST(UefiVariableStoreTests, unsupportedAttribute) - 0 ms
TEST(UefiVariableStoreTests, failedNvSet) - 0 ms
TEST(UefiVariableStoreTests, enumerateStoreContents) - 0 ms
TEST(UefiVariableStoreTests, runtimeAccess) - 0 ms
TEST(UefiVariableStoreTests, bootServiceAccess) - 0 ms
TEST(UefiVariableStoreTests, removePersistent) - 0 ms
TEST(UefiVariableStoreTests, removeVolatile) - 0 ms
TEST(UefiVariableStoreTests, getWithSmallBuffer) - 0 ms
TEST(UefiVariableStoreTests, persistentSetGet) - 0 ms
TEST(UefiVariableStoreTests, setGetRoundtrip) - 0 ms
TEST(UefiVariableIndexTests, setCheckConstraintsNonExistingVar) - 0 ms
TEST(UefiVariableIndexTests, setCheckConstraintsExistingVar) - 0 ms
TEST(UefiVariableIndexTests, checkIterator) - 0 ms
TEST(UefiVariableIndexTests, removeVariable) - 0 ms
TEST(UefiVariableIndexTests, dumpBufferTooSmall) - 0 ms
TEST(UefiVariableIndexTests, dumpLoadRoadtrip) - 0 ms
TEST(UefiVariableIndexTests, enumerateStore) - 0 ms
TEST(UefiVariableIndexTests, variableIndexFull) - 0 ms
TEST(UefiVariableIndexTests, addWithOversizedName) - 0 ms
TEST(UefiVariableIndexTests, emptyIndexOperations) - 0 ms
TEST(SfsBlockStoreTests, psCreateAndSetExtended) - 0 ms
TEST(SfsBlockStoreTests, psCreateAndSet) - 0 ms
TEST(SfsBlockStoreTests, itsStorageLimitTest) - 0 ms
TEST(SfsBlockStoreTests, itsStoreNewItem) - 0 ms
TEST(SfsRamTests, psCreateAndSetExtended) - 0 ms
TEST(SfsRamTests, psCreateAndSet) - 0 ms
TEST(SfsRamTests, itsStorageLimitTest) - 0 ms
TEST(SfsRamTests, itsStoreNewItem) - 0 ms
TEST(MockStoreTests, psCreateAndSetExtended) - 0 ms
TEST(MockStoreTests, psCreateAndSet) - 0 ms
TEST(MockStoreTests, itsStorageLimitTest) - 0 ms
TEST(MockStoreTests, itsStoreNewItem) - 0 ms
TEST(SecureStorageProxyTests, psCreateAndSetExtended) - 0 ms
TEST(SecureStorageProxyTests, psCreateAndSet) - 0 ms
TEST(SecureStorageProxyTests, itsStorageLimitTest) - 0 ms
TEST(SecureStorageProxyTests, itsStoreNewItem) - 0 ms
TEST(SecureStorageClientTests, psCreateAndSetExtended) - 0 ms
TEST(SecureStorageClientTests, psCreateAndSet) - 0 ms
TEST(SecureStorageClientTests, itsStorageLimitTest) - 0 ms
TEST(SecureStorageClientTests, itsStoreNewItem) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkKeyUsage) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkKeyLifetime) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkAlg) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkDhGroup) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkEccCurve) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkKeyType) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkKeyUsage) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkKeyLifetime) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkAlg) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkDhGroup) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkEccCurve) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkKeyType) - 0 ms
TEST(CryptoProtocolOpcodeChecks, checkPackedcToProtobuf) - 0 ms
TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 1 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 0 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 0 ms
TEST(CryptoMacServicePackedcTests, macAbort) - 0 ms
TEST(CryptoMacServicePackedcTests, signAndVerify) - 0 ms
TEST(CryptoCipherServicePackedcTests, cipherAbort) - 0 ms
TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 1 ms
TEST(CryptoHashServicePackedcTests, hashAbort) - 0 ms
TEST(CryptoHashServicePackedcTests, hashAndVerify) - 0 ms
TEST(CryptoHashServicePackedcTests, calculateHash) - 0 ms
TEST(CryptoServicePackedcTests, generateRandomNumbers) - 0 ms
TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 18 ms
TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 0 ms
TEST(CryptoServicePackedcTests, signAndVerifyEat) - 3 ms
TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 3 ms
TEST(CryptoServicePackedcTests, signAndVerifyHash) - 3 ms
TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 0 ms
TEST(CryptoServicePackedcTests, exportPublicKey) - 0 ms
TEST(CryptoServicePackedcTests, purgeKey) - 1 ms
- 0 ms
TEST(CryptoServicePackedcTests, generatePersistentKeys) - 1 ms
TEST(CryptoServicePackedcTests, generateVolatileKeys) - 0 ms
TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 0 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 7 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 1 ms
TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 3 ms
TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 2 ms
TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 1 ms
TEST(CryptoServiceProtobufTests, exportPublicKey) - 0 ms
TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 1 ms
TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 0 ms
TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 76 ms
TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 18 ms
TEST(CryptoFaultTests, randomNumbersWithBrokenStorage) - 0 ms
TEST(CryptoFaultTests, persistentKeysWithBrokenStorage) - 1 ms
TEST(CryptoFaultTests, volatileKeyWithBrokenStorage) - 0 ms
TEST(PocCryptoOpTests, checkOpSequence) - 1 ms
TEST(CryptoMsgTests, SignHashOutMsgTest) - 0 ms
TEST(CryptoMsgTests, SignHashInMsgTest) - 0 ms
TEST(CryptoMsgTests, ExportPublicKeyOutMsgTest) - 0 ms
TEST(CryptoMsgTests, ExportPublicKeyInMsgTest) - 0 ms
TEST(CryptoMsgTests, GenerateKeyInMsgTest) - 0 ms
TEST(CryptoContextPoolTests, multipleContexts) - 0 ms
TEST(CryptoContextPoolTests, singleContext) - 0 ms
TEST(CryptoContextPoolTests, checkEmptyPool) - 0 ms
TEST(FwuUpdateFmpTests, wholeFmpFlow) - 0 ms
TEST(FwuOversizeImageTests, oversizeInstallMultiLocationEndStaging) - 1 ms
TEST(FwuOversizeImageTests, oversizeInstallEndStaging) - 0 ms
TEST(FwuOversizeImageTests, oversizeInstallCancelStaging) - 0 ms
TEST(FwuOversizeImageTests, maxSizeInstall) - 0 ms
TEST(FwuRollbackTests, bootloaderFallback) - 0 ms
TEST(FwuRollbackTests, selectPreviousAfterActivation) - 0 ms
TEST(FwuRollbackTests, selectPreviousPriorToActivation) - 1 ms
TEST(FwuPowerFailureTests, powerFailureDuringTrial) - 0 ms
TEST(FwuPowerFailureTests, powerFailureDuringStaging) - 1 ms
TEST(FwuUpdateScenarioTests, partialFirmwareUpdateFlow) - 0 ms
TEST(FwuUpdateScenarioTests, wholeFirmwareUpdateFlow) - 0 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInTrial) - 1 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInStaging) - 0 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInRegular) - 0 ms
TEST(FwuImageDirectoryTests, zeroFwLocations) - 0 ms
TEST(FwuImageDirectoryTests, multipleFwLocations) - 0 ms
TEST(FwuImageDirectoryTests, singleFwLocation) - 0 ms
TEST(FwuImageDirectoryTests, streamRecycling) - 0 ms
TEST(FwuImageDirectoryTests, streamedReads) - 1 ms
TEST(FwuDefaultInstallerFactoryTests, configureInstallersFlow) - 0 ms
TEST(FwuCopyInstallerTests, installAndCopy) - 0 ms
TEST(FwuRawInstallerTests, normalInstallFlow) - 1 ms
TEST(FwuMetadataV2Tests, checkImgBankInfoStructure) - 0 ms
TEST(FwuMetadataV2Tests, checkImgEntryStructure) - 0 ms
TEST(FwuMetadataV2Tests, checkFwStoreDescStructure) - 0 ms
TEST(FwuMetadataV2Tests, checkHeaderStructure) - 0 ms
TEST(FwuMetadataManagerTests, checkAndRepairInaccessibleStorage) - 0 ms
TEST(FwuMetadataManagerTests, checkAndRepairAccessibleStorage) - 1 ms
TEST(PartitionedBlockStoreTests, writeToInvalidBlock) - 0 ms
TEST(PartitionedBlockStoreTests, checkEraseLimits) - 0 ms
TEST(PartitionedBlockStoreTests, writeReadEraseBlock) - 0 ms
TEST(PartitionedBlockStoreTests, openClose) - 0 ms
TEST(PartitionedBlockStoreTests, getPartitionInfo) - 0 ms
TEST(FileBlockStoreTests, initWithExistingDiskImage) - 2 ms
TEST(FileBlockStoreTests, wholeBlockRw) - 0 ms
TEST(RamBlockStoreTests, eraseOperations) - 0 ms
TEST(RamBlockStoreTests, writeToInvalidBlock) - 0 ms
TEST(RamBlockStoreTests, writeBiggerThanBlock) - 0 ms
TEST(RamBlockStoreTests, writeReadEraseBlock) - 0 ms
TEST(RamBlockStoreTests, openClose) - 0 ms
TEST(RamBlockStoreTests, getPartitionInfo) - 0 ms
TEST(AttestationProvisioningTests, provisionedIak) - 0 ms
TEST(AttestationProvisioningTests, selfGeneratedIak) - 1 ms
TEST(AttestationServiceTests, repeatedOperation) - 55 ms
TEST(AttestationServiceTests, invalidChallengeLen) - 0 ms
TEST(AttestationServiceTests, checkTokenSize) - 2 ms
TEST(AttestationReporterTests, createReport) - 1 ms
TEST(TcgEventLogTests, interateBootMeasurements) - 0 ms
TEST(DiscoveryServiceTests, checkServiceInfo) - 0 ms
TEST(ServiceNameTests, readService) - 0 ms
TEST(ServiceNameTests, checkFields) - 0 ms
TEST(ServiceNameTests, checkInvalidServiceNames) - 0 ms
TEST(ServiceNameTests, checkValidServiceNames) - 0 ms
TEST(ServiceFrameworkTests, serviceProviderChain) - 0 ms
TEST(ServiceFrameworkTests, serviceWithOps) - 0 ms
TEST(ServiceFrameworkTests, serviceWithNoOps) - 0 ms
TEST(ffarpc_call_ep, request_deny_64_bit) - 0 ms
TEST(ffarpc_call_ep, request_with_data_after_unshare) - 1 ms
TEST(ffarpc_call_ep, request_with_data_buffer_overflow) - 0 ms
TEST(ffarpc_call_ep, request_with_data) - 0 ms
TEST(ffarpc_call_ep, request_without_data_non_zero_length) - 0 ms
TEST(ffarpc_call_ep, request_without_data) - 0 ms
TEST(ffarpc_call_ep, invalid_mgmt_call) - 0 ms
TEST(ffarpc_call_ep, mem_unshare_null_ep) - 0 ms
TEST(ffarpc_call_ep, mem_share_unshare_relinquish_fail_then_success) - 0 ms
TEST(ffarpc_call_ep, mem_share_unshare_relinquish_fail) - 0 ms
TEST(ffarpc_call_ep, mem_share_unshare) - 0 ms
TEST(ffarpc_call_ep, mem_unshare) - 0 ms
TEST(ffarpc_call_ep, mem_share_null_ep) - 0 ms
TEST(ffarpc_call_ep, mem_share_smaller_page_count_relinquish_fail) - 0 ms
TEST(ffarpc_call_ep, mem_share_smaller_page_count) - 0 ms
TEST(ffarpc_call_ep, mem_share_retrieve_fail) - 0 ms
TEST(ffarpc_call_ep, mem_share_fill_all) - 0 ms
TEST(ffarpc_call_ep, mem_share) - 0 ms
TEST(ffarpc_caller, end) - 0 ms
TEST(ffarpc_caller, end_null_handle) - 0 ms
TEST(ffarpc_caller, end_null_context) - 0 ms
TEST(ffarpc_caller, invoke_without_response) - 0 ms
TEST(ffarpc_caller, invoke_with_response) - 0 ms
TEST(ffarpc_caller, invoke_invalid_resp_len) - 0 ms
TEST(ffarpc_caller, invoke_send_direct_req_fail) - 0 ms
TEST(ffarpc_caller, invoke_resp_long_req) - 0 ms
TEST(ffarpc_caller, invoke_resp_no_begin) - 0 ms
TEST(ffarpc_caller, invoke_resp_len_null) - 0 ms
TEST(ffarpc_caller, invoke_resp_buf_null) - 0 ms
TEST(ffarpc_caller, invoke_opstatus_null) - 0 ms
TEST(ffarpc_caller, invoke_handle_context_diff) - 0 ms
TEST(ffarpc_caller, invoke_null_context) - 0 ms
TEST(ffarpc_caller, begin_without_buffer) - 0 ms
TEST(ffarpc_caller, begin_with_buffer) - 0 ms
TEST(ffarpc_caller, begin_not_opened) - 0 ms
TEST(ffarpc_caller, begin_too_large_req) - 0 ms
TEST(ffarpc_caller, begin_transaction_in_progress) - 0 ms
TEST(ffarpc_caller, begin_null_buffer) - 0 ms
TEST(ffarpc_caller, begin_null_context) - 0 ms
TEST(ffarpc_caller, close_success) - 0 ms
TEST(ffarpc_caller, close_endpoint_and_mem_reclaim_fail) - 0 ms
TEST(ffarpc_caller, close_mem_reclaim_fail) - 0 ms
TEST(ffarpc_caller, close_send_direct_msg_fail) - 0 ms
TEST(ffarpc_caller, close_not_opened) - 0 ms
TEST(ffarpc_caller, open_success) - 0 ms
TEST(ffarpc_caller, open_send_direct_req_rpc_status_fail_reclaim_fail) - 0 ms
TEST(ffarpc_caller, open_send_direct_req_rpc_status_fail) - 0 ms
TEST(ffarpc_caller, open_send_direct_req_fail) - 0 ms
TEST(ffarpc_caller, open_share_fail) - 0 ms
TEST(ffarpc_caller, open_invalid_mem_size) - 0 ms
TEST(ffarpc_caller, open_already_opened) - 0 ms
TEST(ffarpc_caller, discover_more_max_cnt) - 1 ms
TEST(ffarpc_caller, discover_less_max_cnt) - 0 ms
TEST(ffarpc_caller, discover) - 0 ms
TEST(ffarpc_caller, discover_rx_release_fail) - 0 ms
TEST(ffarpc_caller, discover_rx_get_fail) - 0 ms
TEST(ffarpc_caller, discover_partition_info_get_fail) - 0 ms
TEST(ffarpc_caller, discover_invalid_arguments) - 0 ms
TEST(RpcStatusProtocolChecks, checkProtobufRpcStatusCodes) - 0 ms
TEST(ConfigRamstoreTests, checkMultipleConfig) - 0 ms
TEST(ConfigRamstoreTests, checkSingleConfig) - 0 ms
TEST(ConfigRamstoreTests, checkEmptyConfig) - 0 ms
TEST(Crc32Tests, multiPart) - 0 ms
TEST(Crc32Tests, longString) - 0 ms
TEST(Crc32Tests, shortString) - 0 ms
TEST(EndianTests, le64) - 0 ms
TEST(EndianTests, le32) - 0 ms
TEST(EndianTests, le16) - 0 ms
TEST(EndianTests, le8) - 0 ms
TEST(TlvTests, encodeWrongOrder) - 0 ms
TEST(TlvTests, encodeInsufficientSpace) - 0 ms
TEST(TlvTests, encodeRecords) - 0 ms
TEST(TlvTests, decodeBadRecords) - 0 ms
TEST(TlvTests, findAndDecodeMissingOptional) - 0 ms
TEST(TlvTests, findAndDecode) - 0 ms
TEST(TlvTests, decodeGoodRecords) - 0 ms
TEST(UuidTests, roundTrip) - 0 ms
TEST(UuidTests, checkNilUuidOperations) - 0 ms
TEST(UuidTests, checkIsEqualOperation) - 0 ms
TEST(UuidTests, checkOctetsFromCanonical) - 0 ms
TEST(UuidTests, parseValidUuidToGuidOctets) - 0 ms
TEST(UuidTests, parseError) - 0 ms
TEST(UuidTests, parseUuidInUrn) - 0 ms
TEST(UuidTests, parseValidUuidMixedCase) - 0 ms
TEST(UuidTests, parseValidUuidLowerCase) - 0 ms
TEST(TsDemoTests, runTsDemo) - 7 ms
OK (252 tests, 251 ran, 365136 checks, 1 ignored, 0 filtered out, 223 ms)
```
**LibTS test**
```
TEST(CryptoServicePackedcTests, generateRandomNumbers) - 1 ms
TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 5 ms
TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 1 ms
TEST(CryptoServicePackedcTests, signAndVerifyEat) - 3 ms
TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 2 ms
TEST(CryptoServicePackedcTests, signAndVerifyHash) - 3 ms
TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 0 ms
TEST(CryptoServicePackedcTests, exportPublicKey) - 0 ms
TEST(CryptoServicePackedcTests, purgeKey) - 1 ms
TEST(CryptoServicePackedcTests, copyKey) - 1 ms
TEST(CryptoServicePackedcTests, generatePersistentKeys) - 0 ms
TEST(CryptoServicePackedcTests, generateVolatileKeys) - 1 ms
TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 0 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 6 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 1 ms
TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 3 ms
TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 2 ms
TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 0 ms
TEST(CryptoServiceProtobufTests, exportPublicKey) - 1 ms
TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 0 ms
TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 1 ms
- 66 ms
TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 17 ms
TEST(PsServiceTests, createAndSetExtended) - 2 ms
TEST(PsServiceTests, createAndSet) - 0 ms
TEST(PsServiceTests, storeNewItem) - 0 ms
TEST(ItsServiceTests, storeNewItem) - 0 ms
OK (27 tests, 27 ran, 235 checks, 0 ignored, 0 filtered out, 117 ms)
```
**Platform inspect test**
```
attestation_report:
challenge: ba 13 ba ab 68 cd 58 ec 27 35 dc 67 06 81 3f e4 fd 5a 87 58 49 9b 52 2e 5b d4 7b 76 92 1e ce 00
client_id: 0
boot_seed: e1 ae 36 db 01 4a 06 c8 9c e4 19 1b 08 2f af f1 16 ae 4d 36 61 82 82 e5 63 58 66 8d ec f5 e9 5d
security_lifecycle: 0
instance_id: 01 62 4b 81 d4 9a 0d 99 84 83 87 f3 4c 05 43 f5 1f 89 34 73 b6 b9 6a eb 12 ce af cf 25 62 22 f5 e6
implementation_id: 74 72 75 73 74 65 64 66 69 72 6d 77 61 72 65 2e 6f 72 67 2e 74 73 2e 73 74 61 6e 64 61 6c 6f 6e 65
sw_components:
type: BL_2
digest: a8 4f b4 7b 54 d9 4b ab 49 73 63 f7 9b fc 66 cb 85 12 ab 18 6f 24 74 01 5d cf 33 f3 80 9e 9b 20
type: BL_31
digest: 2f d3 43 6c 6f ef 9b 11 c2 16 dd 1f 8b df 9b a5 24 14 a5 c1 97 0c 3a 6c 78 bf ef 64 0f c1 23 e1
type: HW_CONFIG
digest: f3 de 4e 17 a1 a5 a7 fe d9 d9 f4 16 3c 49 36 7e ae f7 2f 2a a8 87 e6 b6 22 89 cd 27 dc 1c 80 25
type: SOC_FW_CONFIG
digest: 4e e4 8e 5a e6 50 ed e0 b5 a3 54 8a 1f d6 0e 8a ea 0e 71 75 0e a4 3f 82 76 ce af cd 7c b0 91 e0
type: BL_32
digest: 62 22 4f 0f b0 5d b4 77 1b 3f a5 2e ab 76 1e 61 17 b8 c6 6e ac 8c c8 4d 2e b0 7d 70 08 60 4b 41
type: BL32_EXTRA1_IMAGE
digest: 39 d2 b8 5d 93 5d f6 d8 f8 ed 0c 1a 3a e3 c8 90 72 19 f4 88 5c 79 15 05 7b f0 76 db c1 4c 5d 77
type: BL_33
digest: b5 d6 08 61 dd fa 6d da a3 f7 a5 de d6 8f 6f 39 25 b1 57 fa 3e db 46 42 58 24 8e 81 1c 45 5d 38
type: NT_FW_CONFIG
digest: 25 10 60 5d d4 bc 9d 82 7a 16 9f 8a cc 47 95 a6 fd ca a0 c1 2b c9 99 8f 51 20 ff c6 ed 74 68 5a
```
**TS Demo test**
**UEFI test**
==Config 2: FIP SP==
====Build command====
```
MEASURED_BOOT=y SPMC_TESTS=n TS_SMM_GATEWAY=n TS_UEFI_TESTS=n SP_PACKAGING_METHOD=fip DEFAULT_SP_CONFIG=default-sp SP_BLOCK_STORAGE_CONFIG=default-sp SP_PSA_ITS_CONFIG=shared-flash-opteesp SP_PSA_PS_CONFIG=shared-flash-opteesp make
```
==Config 3: OP-TEE SPMC tests==
====Build command====
```
MEASURED_BOOT=n SPMC_TESTS=n TS_SMM_GATEWAY=y TS_UEFI_TESTS=y DEFAULT_SP_CONFIG=default-sp SP_PACKAGING_METHOD=fip make
```
==Config 4: SMMGW tests==
====Build command====
```
MEASURED_BOOT=n SPMC_TESTS=y TS_SMM_GATEWAY=n TS_UEFI_TESTS=n SP_PACKAGING_METHOD=embedded DEFAULT_SP_CONFIG=default-opteesp make
```
=Overview=
This page is to capture the test results for OP-TEE SPMC v3.22
The tests were ran using the following set of components:
```lang=html, lines=12
>>> Manifest status
d064c30 (HEAD -> default, origin/master, m/master) stm32mp1: fetch mbedtls for tf-a authenticated boot
b242f5c stm32mp1: add edk2 and edk2-platforms repos
122fe9a stm32mp1: bump u-boot to 2023.04
Local manifests:
The merged manifest is:
<?xml version="1.0" encoding="UTF-8"?>
<manifest>
<remote fetch="https://git.gitlab.arm.com" name="arm-gitlab"/>
<remote fetch="https://github.com" name="github"/>
<remote fetch="https://git.savannah.gnu.org/git" name="savannah"/>
<remote fetch="https://git.trustedfirmware.org" name="tfo"/>
<default remote="github" revision="master"/>
<project name="Mbed-TLS/mbedtls.git" path="mbedtls" revision="refs/tags/mbedtls-2.28.1"/>
<project name="OP-TEE/build.git" path="build">
<linkfile dest="build/Makefile" src="fvp-psa-sp.mk"/>
</project>
<project name="OP-TEE/optee_client.git" path="optee_client"/>
<project name="OP-TEE/optee_os.git" path="optee_os"/>
<project name="OP-TEE/optee_test.git" path="optee_test"/>
<project clone-depth="1" name="TF-A/trusted-firmware-a.git" path="trusted-firmware-a" remote="tfo" revision="refs/tags/v2.8"/>
<project name="TS/trusted-services.git" path="trusted-services" remote="tfo" revision="integration"/>
<project clone-depth="1" name="buildroot/buildroot.git" path="buildroot" revision="refs/tags/2022.11.1"/>
<project clone-depth="1" name="grub.git" path="grub" remote="savannah" revision="refs/tags/grub-2.02"/>
<project name="linaro-swg/optee_examples.git" path="optee_examples"/>
<project clone-depth="1" name="linux-arm/linux-trusted-services.git" path="linux-arm-ffa-user" remote="arm-gitlab" revision="debugfs-v5"/>
<project clone-depth="1" name="linux-arm/linux-trusted-services.git" path="linux-arm-ffa-tee" remote="arm-gitlab" revision="tee-v1"/>
<project name="tianocore/edk2-platforms.git" path="edk2-platforms" revision="02daa58c21f89628b4d8c76f95f3a554289149bc"/>
<project name="tianocore/edk2.git" path="edk2" revision="dd4cae4d82c7477273f3da455084844db5cca0c0"/>
<project clone-depth="1" name="torvalds/linux.git" path="linux" revision="refs/tags/v6.1"/>
</manifest>
>>>Project status
project build/
Local and remote SHA is matching.
2e792b3 (HEAD, m/master, github/master) fvp, ts: optimize buildroot config
3730e01 fvp, ts: use minimal Linux config
9b54724 Fix build of fTPM by enabling build of 32-bit libraries
project buildroot/
Local and remote SHA is matching.
d48a8beb (grafted, HEAD, tag: 2022.11.1, tag: m/master) Update for 2022.11.1
project edk2/
Local and remote SHA is matching.
dd4cae4d82 (HEAD, m/master) ArmPkg/GenericWatchdogDxe: Split 64bit register write to 2x32bit
1d802e234e BaseTools: Guid.xref doesn't specify the correct GUID value for Driver
83964ebc5e BaseTools/BinToPcd: Encode string returned from ByteArray()
project edk2-platforms/
Local and remote SHA is matching.
02daa58c21 (HEAD, m/master) Silicon/SynQuacer: Add status property in PCIe & SDHC DT nodes
9f02ebc19b Silicon/SynQuacer: add optional OP-TEE DT node
9dae9a0c79 Marvell/Library: ComPhyLib: Clean up the library after rework
project grub/
Local and remote SHA is matching.
e54c99a (grafted, HEAD, tag: grub-2.02, tag: m/master) Increase version to 2.02.
project linux/
Local and remote SHA is matching.
830b3c68c (grafted, HEAD, tag: v6.1, tag: m/master) Linux 6.1
project linux-arm-ffa-tee/
Local and remote SHA is matching.
c6b9495 (grafted, HEAD, m/master, arm-gitlab/tee-v1) Add versioning info to readme
project linux-arm-ffa-user/
Local and remote SHA is matching.
18e3be7 (grafted, HEAD, m/master, arm-gitlab/debugfs-v5) Add support for FF-A driver changes in v6.1
project mbedtls/
Local and remote SHA is matching.
dd79db100 (HEAD, tag: v2.28.1, tag: mbedtls-2.28.1, tag: m/master) Merge pull request #955 from Mbed-TLS/mbedtls-2.28.1rc0-pr
fe9d08fd1 Bump version
fa827b4b3 Minor tweaks to Changelog
project optee_client/
Local and remote SHA is matching.
8533e0e (HEAD, tag: 3.21.0-rc1, tag: 3.21.0, m/master, github/master) travis: remove the .travis.yml file
0fc6ef7 tee-supplicant: fix leak when load plugin failed
dde6306 libteeacl: use realloc() instead of reallocarray()
project optee_examples/
Local and remote SHA is matching.
378dc0d (HEAD, tag: 3.21.0, m/master, github/master) hotp: use sess_ctx instead of global variables
a98d01e (tag: 3.21.0-rc1, tag: 3.20.0-rc1, tag: 3.20.0) pluging: add missing of dependency syslog on teec
3ca8454 Enable compatibility with TEE Internal Core API v1.1
project optee_os/
Local and remote SHA is matching.
280b6a32e (HEAD, m/master, github/master) core: spmc: implement FFA_CONSOLE_LOG
b89b3da24 core: thread: Add support for canary value randomization
fb66b364b mk/aosp_optee.mk: fix build dependency for static libraries
project optee_test/
Local and remote SHA is matching.
232dfd2 (HEAD, m/master, github/master) xtest: remove ffa.h from SPMC test to resolve compiler error
36a136d Android.mk: add subkeys include directory
d168ff4 xtest: fix xtest tool name in usage trace messages
project trusted-firmware-a/
Local and remote SHA is matching.
9881bb9 (grafted, HEAD, tag: v2.8, tag: m/master) Merge "docs(spm): update threat model" into integration
project trusted-services/
Local and remote SHA is matching.
e56c7b1 (HEAD, tfo/integration, m/master) Implement FFA_CONSOLE_LOG interface
0100ddd Add FF-A v1.1 boot protocol
4f9d8e3 Refactor FF-A boot info
```
=Details=
==Config 1: embedded SP==
====Build command====
```
MEASURED_BOOT=y SPMC_TESTS=n TS_SMM_GATEWAY=n TS_UEFI_TESTS=n SP_PACKAGING_METHOD=embedded DEFAULT_SP_CONFIG=default-sp SP_BLOCK_STORAGE_CONFIG=default-sp SP_PSA_ITS_CONFIG=shared-flash-opteesp SP_PSA_PS_CONFIG=shared-flash-opteesp make
```
====Setup steps after boot====
```
/mnt/host/out/linux-arm-ffa-tee/load_module.sh
```
====Test results====
**Trusted Services service level test (arm-linux)**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/ts-service-test -v -xgFwuServiceTests
TEST(PsServiceTests, createAndSetExtended) - 72279 ms
TEST(PsServiceTests, createAndSet) - 119400 ms
TEST(PsServiceTests, storeNewItem) - 77105 ms
TEST(ItsServiceTests, storeNewItem) - 80862 ms
TEST(AttestationProvisioningTests, provisionedIak) - 35705 ms
TEST(AttestationProvisioningTests, selfGeneratedIak) - 52115 ms
TEST(AttestationServiceTests, repeatedOperation) - 6646269 ms
TEST(AttestationServiceTests, invalidChallengeLen)[ 10.672700] ------------[ cut here ]------------
[ 10.672800] WARNING: CPU: 7 PID: 142 at mm/page_alloc.c:5534 __alloc_pages+0x164/0xab0
[ 10.673100] Modules linked in: arm_ffa_tee(O)
[ 10.673200] CPU: 7 PID: 142 Comm: ts-service-test Tainted: G O 6.1.0 #1
[ 10.673500] Hardware name: FVP Base RevC (DT)
[ 10.673600] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 10.673819] pc : __alloc_pages+0x164/0xab0
[ 10.673900] lr : pool_op_alloc+0x5c/0x180 [arm_ffa_tee]
[ 10.674200] sp : ffffffc0087e3ac0
[ 10.674310] x29: ffffffc0087e3ac0 x28: ffffffc0087e3d30 x27: ffffff88017bde80
[ 10.674500] x26: 0000007fefe51a08 x25: 0000000000000005 x24: 0000000000001000
[ 10.674802] x23: ffffff88017bdd80 x22: 0000000000000015 x21: 0000000000000015
[ 10.675000] x20: 0000000000000000 x19: ffffff88017bdd80 x18: 0000000000000000
[ 10.675300] x17: 0000000000000000 x16: 0000000000000000 x15: 0000007fefe51a08
[ 10.675566] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 10.675800] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 10.676000] x8 : ffffff88017bde00 x7 : 0000000000000000 x6 : 00000000000009bc
[ 10.676300] x5 : ffffff88017bdd80 x4 : 0000000000000000 x3 : 0000000000000000
[ 10.676500] x2 : ffffff880176ac00 x1 : 0000000000000001 x0 : ffffffc008707000
[ 10.676800] Call trace:
[ 10.676900] __alloc_pages+0x164/0xab0
[ 10.677000] pool_op_alloc+0x5c/0x180 [arm_ffa_tee]
[ 10.677215] shm_alloc_helper+0x98/0x110
[ 10.677400] tee_shm_alloc_user_buf+0x74/0x11c
[ 10.677648] tee_ioctl+0xa70/0xf9c
[ 10.677800] __arm64_sys_ioctl+0x3bc/0xc30
[ 10.678000] invoke_syscall.constprop.0+0x5c/0x104
[ 10.678100] do_el0_svc+0x60/0x18c
[ 10.678300] el0_svc+0x38/0xf0
[ 10.678429] el0t_64_sync_handler+0xbc/0x140
[ 10.678600] el0t_64_sync+0x18c/0x190
[ 10.678816] ---[ end trace 0000000000000000 ]---
ffa_tee_share_mem():212 error: 12
- 23396 ms
TEST(AttestationServiceTests, checkTokenSize) - 67413 ms
TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 24000 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 27200 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 33177 ms
TEST(CryptoMacServicePackedcTests, macAbort) - 20284 ms
TEST(CryptoMacServicePackedcTests, signAndVerify) - 78500 ms
TEST(CryptoCipherServicePackedcTests, cipherAbort) - 20354 ms
TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 62800 ms
TEST(CryptoHashServicePackedcTests, hashAbort) - 18558 ms
TEST(CryptoHashServicePackedcTests, hashAndVerify) - 30000 ms
TEST(CryptoHashServicePackedcTests, calculateHash) - 14000 ms
TEST(CryptoServicePackedcTests, generateRandomNumbers) - 45528 ms
TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 551499 ms
TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 207945 ms
TEST(CryptoServicePackedcTests, signAndVerifyEat) - 265937 ms
TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 328338 ms
TEST(CryptoServicePackedcTests, signAndVerifyHash) - 328800 ms
TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 169797 ms
TEST(CryptoServicePackedcTests, exportPublicKey) - 115825 ms
TEST(CryptoServicePackedcTests, purgeKey) - 103500 ms
TEST(CryptoServicePackedcTests, copyKey) - 191200 ms
TEST(CryptoServicePackedcTests, generatePersistentKeys) - 190647 ms
TEST(CryptoServicePackedcTests, generateVolatileKeys) - 55477 ms
TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 46482 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 2386799 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 322940 ms
TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 329394 ms
TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 328398 ms
TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 170400 ms
TEST(CryptoServiceProtobufTests, exportPublicKey) - 116162 ms
TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 190900 ms
TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 58199 ms
TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 10759750 ms
TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 2204698 ms
TEST(DiscoveryServiceTests, checkServiceInfo) - 3900 ms
OK (45 tests, 43 ran, 763 checks, 0 ignored, 2 filtered out, 26990292 ms)
```
**PSA Architecture Test Suite (arm-linux)**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-crypto-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Crypto Suite
******************************************
TEST: 201 | DESCRIPTION: Testing crypto key management APIs | UT: psa_crypto_init
[Info] Executing tests from non-secure
[Check 1] Test calling crypto functions before psa_crypto_init
[Check 2] Test psa_crypto_init
[Check 3] Test multiple psa_crypto_init
TEST RESULT: PASSED
******************************************
TEST: 202 | DESCRIPTION: Testing crypto key management APIs | UT: psa_import_key
[Info] Executing tests from non-secure
[Check 1] Test psa_import_key 16 bytes AES
[Check 2] Test psa_import_key 24 bytes AES
[Check 3] Test psa_import_key 32 bytes AES
[Check 4] Test psa_import_key 2048 RSA public key
[Check 5] Test psa_import_key with RSA 2048 keypair
[Check 6] Test psa_import_key with DES 8 bytes key
[Check 7] Test psa_import_key with Triple DES 2-Key
[Check 8] Test psa_import_key with Triple DES 3-Key
[Check 9] Test psa_import_key with EC Public key
[Check 10] Test psa_import_key with EC keypair
[Check 11] Test psa_import_key 16 bytes AES with invalid bits
[Check 12] Test psa_import_key with key data greater than the algorithm size
[Check 13] Test psa_import_key with incorrect key data size
[Check 14] Test psa_import_key with invalid key type value
TEST RESULT: PASSED
******************************************
TEST: 203 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_key
[Info] Executing tests from non-secure
[Check 1] Test psa_export_key 16 Byte AES
[Check 2] Test psa_export_key 24 Byte AES
[Check 3] Test psa_export_key 32 Byte AES
[Check 4] Test psa_export_key 2048 RSA public key
[Check 5] Test psa_export_key with RSA 2048 keypair
[Check 6] Test psa_export_key with DES 64 bit key
[Check 7] Test psa_export_key with Triple DES 2-Key
[Check 8] Test psa_export_key with Triple DES 3-Key
[Check 9] Test psa_export_key with EC Public key
[Check 10] Test psa_export_key with EC keypair
[Check 11] Test psa_export_key with key policy verify
[Check 12] Test psa_export_key with less buffer size
TEST RESULT: PASSED
******************************************
TEST: 204 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_public_key
[Info] Executing tests from non-secure
[Check 1] Test psa_export_public_key 16 Byte AES
[Check 2] Test psa_export_public_key 24 Byte AES
[Check 3] Test psa_export_public_key 32 Byte AES
[Check 4] Test psa_export_public_key 2048 RSA public key
[Check 5] Test psa_export_public_key with RSA 2048 keypair
[Check 6] Test psa_export_public_key with DES 64 bit key
[Check 7] Test psa_export_public_key with Triple DES 2-Key
[Check 8] Test psa_export_public_key with Triple DES 3-Key
[Check 9] Test psa_export_public_key with EC Public key
[Check 10] Test psa_export_public_key with EC keypair
[Check 11] Test psa_export_public_key with less buffer size
TEST RESULT: PASSED
******************************************
TEST: 205 | DESCRIPTION: Testing crypto key management APIs | UT: psa_destroy_key
[Info] Executing tests from non-secure
[Check 1] Test psa_destroy_key 16 Byte AES
[Check 2] Test psa_destroy_key 24 Byte AES
[Check 3] Test psa_destroy_key 32 Byte AES
[Check 4] Test psa_destroy_key 2048 RSA public key
[Check 5] Test psa_destroy_key with RSA 2048 keypair
[Check 6] Test psa_destroy_key with DES 64 bit key
[Check 7] Test psa_destroy_key with Triple DES 2-Key
[Check 8] Test psa_destroy_key with Triple DES 3-Key
[Check 9] Test psa_destroy_key with EC Public key
[Check 10] Test psa_destroy_key with EC keypair
TEST RESULT: PASSED
******************************************
TEST: 206 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compute
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_compute with MD5 algorithm
[Check 2] Test psa_hash_compute with RIPEMD160 algorithm
[Check 3] Test psa_hash_compute with SHA1 algorithm
[Check 4] Test psa_hash_compute with SHA224 algorithm
[Check 5] Test psa_hash_compute with SHA256 algorithm
[Check 6] Test psa_hash_compute with SHA384 algorithm
[Check 7] Test psa_hash_compute with SHA512 algorithm
[Check 8] Test psa_hash_compute with small buffer size
[Check 9] Test psa_hash_compute with invalid algorithm
TEST RESULT: PASSED
******************************************
TEST: 207 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compare
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_compare with MD5 algorithm
[Check 2] Test psa_hash_compare with RIPEMD160 algorithm
[Check 3] Test psa_hash_compare with SHA1 algorithm
[Check 4] Test psa_hash_compare with SHA224 algorithm
[Check 5] Test psa_hash_compare with SHA256 algorithm
[Check 6] Test psa_hash_compare with SHA384 algorithm
[Check 7] Test psa_hash_compare with SHA512 algorithm
[Check 8] Test psa_hash_compare with incorrect hash
[Check 9] Test psa_hash_compare with incorrect hash length
[Check 10] Test psa_hash_compare with invalid algorithm
TEST RESULT: PASSED
******************************************
TEST: 208 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_setup - ECDH + HKDF-SHA-256
[Check 2] Test psa_key_derivation_setup - ECDH, unknown KDF
[Check 3] Test psa_key_derivation_setup - bad key derivation algorithm
[Check 4] Test psa_key_derivation_setup - Invalid Algorithm
TEST RESULT: PASSED
******************************************
TEST: 209 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_bytes
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_input_bytes - Step as Info
[Check 2] Test psa_key_derivation_input_bytes - Step as secret
[Check 3] Test psa_key_derivation_input_bytes - Step as salt
[Check 4] Test psa_key_derivation_input_bytes - Step as label
[Check 5] Test psa_key_derivation_input_bytes - Step as seed
[Check 6] Test psa_key_derivation_input_bytes - Invalid step
TEST RESULT: PASSED
******************************************
TEST: 210 | DESCRIPTION: Testing crypto key attributes APIs | UT: psa_key_attributes_set_get
[Info] Executing tests from non-secure
[Check 1] Test psa_key_attributes_set_get key attributes
TEST RESULT: PASSED
******************************************
TEST: 211 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_setup with MD5 algorithm
[Check 2] Test psa_hash_setup with RIPEMD160 algorithm
[Check 3] Test psa_hash_setup with SHA1 algorithm
[Check 4] Test psa_hash_setup with SHA224 algorithm
[Check 5] Test psa_hash_setup with SHA256 algorithm
[Check 6] Test psa_hash_setup with SHA384 algorithm
[Check 7] Test psa_hash_setup with SHA512 algorithm
[Check 8] Test psa_hash_setup with Invalid hash algorithm
[Check 9] Test psa_hash_setup with Invalid algorithm
[Check 10] Test psa_hash_setup with CTR algorithm
TEST RESULT: PASSED
******************************************
TEST: 212 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_update
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_update with MD5 algorithm
[Check 2] Test psa_hash_update with RIPEMD160 algorithm
[Check 3] Test psa_hash_update with SHA1 algorithm
[Check 4] Test psa_hash_update with SHA224 algorithm
[Check 5] Test psa_hash_update with SHA256 algorithm
[Check 6] Test psa_hash_update with SHA384 algorithm
[Check 7] Test psa_hash_update with SHA512 algorithm
[Check 8] Test psa_hash_update without hash setup
[Check 9] Test psa_hash_update with completed opertaion handle
TEST RESULT: PASSED
******************************************
TEST: 213 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_verify with MD5 algorithm
[Check 2] Test psa_hash_verify with RIPEMD160 algorithm
[Check 3] Test psa_hash_verify with SHA1 algorithm
[Check 4] Test psa_hash_verify with SHA224 algorithm
[Check 5] Test psa_hash_verify with SHA256 algorithm
[Check 6] Test psa_hash_verify with SHA384 algorithm
[Check 7] Test psa_hash_verify with SHA512 algorithm
[Check 8] Test psa_hash_verify with incorrect expected hash
[Check 9] Test psa_hash_verify with incorrect hash length
[Check 10] test psa_hash_verify with inactive & invalid operation handle
TEST RESULT: PASSED
******************************************
TEST: 214 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_finish with MD5 algorithm
[Check 2] Test psa_hash_finish with RIPEMD160 algorithm
[Check 3] Test psa_hash_finish with SHA1 algorithm
[Check 4] Test psa_hash_finish with SHA224 algorithm
[Check 5] Test psa_hash_finish with SHA256 algorithm
[Check 6] Test psa_hash_finish with SHA384 algorithm
[Check 7] Test psa_hash_finish with SHA512 algorithm
[Check 8] Test psa_hash_finish with invalid hash buffer size
[Check 9] test psa_hash_finish with inactive operation handle
TEST RESULT: PASSED
******************************************
TEST: 215 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_abort with MD5 algorithm
[Check 2] Test psa_hash_abort with RIPEMD160 algorithm
[Check 3] Test psa_hash_abort with SHA1 algorithm
[Check 4] Test psa_hash_abort with SHA224 algorithm
[Check 5] Test psa_hash_abort with SHA256 algorithm
[Check 6] Test psa_hash_abort with SHA384 algorithm
[Check 7] Test psa_hash_abort with SHA512 algorithm
[Check 8] Test psa_hash_finish after calling psa_hash_abort
TEST RESULT: PASSED
******************************************
TEST: 216 | DESCRIPTION: Testing crypto generator functions APIs | UT: psa_generate_key
[Info] Executing tests from non-secure
[Check 1] Test psa_generate_key 16 Byte AES
[Check 2] Test psa_generate_key 24 Byte AES
[Check 3] Test psa_generate_key 32 Byte AES
[Check 4] Test psa_generate_key with DES 64 bit key
[Check 5] Test psa_generate_key with Triple DES 2-Key
[Check 6] Test psa_generate_key with Triple DES 3-Key
[Check 7] Test psa_generate_key with RSA 2048 Keypair
[Check 8] Test psa_generate_key with ECC KeyPair
[Check 9] Test psa_generate_key with RSA 2048 Public key
[Check 10] Test psa_generate_key with invalid key type
[Check 11] Test psa_generate_key with invalid usage flags
TEST RESULT: PASSED
******************************************
TEST: 217 | DESCRIPTION: Testing crypto generation APIs | UT: psa_generate_random
[Info] Executing tests from non-secure
[Check 1] Test psa_generate_random to get 0 Byte data
[Check 2] Test psa_generate_random to get 16 Byte data
[Check 3] Test psa_generate_random to get 24 Byte data
[Check 4] Test psa_generate_random to get 32 Byte data
[Check 5] Test psa_generate_random to get 64 Byte data
[Check 6] Test psa_generate_random to get 128 Byte data
[Check 7] Test psa_generate_random to get 256 Byte data
[Check 8] Test psa_generate_random to get 512 Byte data
[Check 9] Test psa_generate_random to get 1000 Byte data
TEST RESULT: PASSED
******************************************
TEST: 218 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_key
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_input_key 16 Byte Key
[Check 2] Test psa_key_derivation_input_key with invalid usage
[Check 3] Test psa_key_derivation_input_key with step as label
[Check 4] Test psa_key_derivation_input_key with step as info
[Check 5] Test psa_key_derivation_input_key with step as seed
[Check 6] Test psa_key_derivation_input_key with step as salt
[Check 7] Test psa_key_derivation_input_key with key type as AES(not derive)
[Check 8] Test psa_key_derivation_input_key incorrect key algorithm
[Check 9] Test psa_key_derivation_input_key with key type as 2048 RSA public key
[Check 10] Test psa_key_derivation_input_key with key type as RSA 2048 keypair
[Check 11] Test psa_key_derivation_input_key with zero as step
[Check 12] Test psa_cipher_decrypt_setup - Invalid key handle
[Check 13] Test psa_cipher_decrypt_setup - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 219 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_key_agreement
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_key_agreement - ECDH SECP256R1
[Check 2] Test psa_key_derivation_key_agreement - Invalid step
[Check 3] Test psa_key_derivation_key_agreement - ECDH SECP384R1
[Check 4] Test psa_key_derivation_key_agreement - Invalid usage
[Check 5] Test psa_key_derivation_key_agreement - KDF not a key agreement alg
[Check 6] Test psa_key_derivation_key_agreement - Public key of different curve
[Check 7] Test psa_key_derivation_key_agreement - Pub key instead of Prv key
[Check 8] Test psa_key_derivation_key_agreement - Invalid handle
[Check 9] Test psa_key_derivation_key_agreement - Zero as handle
TEST RESULT: PASSED
******************************************
TEST: 220 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_bytes
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_output_bytes - HKDF
[Check 2] Test psa_key_derivation_output_bytes - optional salt
[Check 3] Test psa_key_derivation_output_bytes - capacity < output_length
[Check 4] Test psa_key_derivation_output_bytes - missing info
[Check 5] Test psa_key_derivation_output_bytes - missing salt/secret/info
[Check 6] Test psa_key_derivation_output_bytes - TLS12_PRF
[Check 7] Test psa_key_derivation_output_bytes - capacity < output_length
[Check 8] Test psa_key_derivation_output_bytes - missing seed/secret/label
TEST RESULT: PASSED
******************************************
TEST: 221 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_key
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_output_key - Key
[Check 2] Test psa_key_derivation_output_key - Info
[Check 3] Test psa_key_derivation_output_key - Salt
[Check 4] Test psa_key_derivation_output_key - Greater Capacity than available
[Check 5] Test psa_key_derivation_output_key - ECC Public key
[Check 6] Test psa_key_derivation_output_key - ECC keypair (wrong key length)
[Check 7] Test psa_key_derivation_output_key - RSA Public Key[Check 8] Test psa_key_derivation_output_key - RSA keypair
[Check 9] Test psa_key_derivation_output_key - Invalid key size
TEST RESULT: PASSED
******************************************
TEST: 222 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_abort
TEST RESULT: PASSED
******************************************
TEST: 223 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_set_get_capacity
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_set_get_capacity - < operation's capacity
[Check 2] Test psa_key_derivation_set_get_capacity - = operation's capacity
[Check 3] Test psa_key_derivation_set_get_capacity - > operation's capacity
[Check 4] Test psa_key_derivation_set_get_capacity - unchanged capacity
TEST RESULT: PASSED
******************************************
TEST: 224 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_encrypt - CCM - AES - 13B nonce & 8B add data
[Check 2] Test psa_aead_encrypt - CCM - AES - 13B nonce & 32B add data
[Check 3] Test psa_aead_encrypt - CCM - AES - 24 bytes Tag length = 4
[Check 4] Test psa_aead_encrypt - CCM - AES - Zero additional data
[Check 5] Test psa_aead_encrypt - CCM - AES - Zero plaintext
[Check 6] Test psa_aead_encrypt - GCM - AES - 12B nonce & 12B add data
[Check 7] Test psa_aead_encrypt - Unsupported algorithm
[Check 8] Test psa_aead_encrypt - Invalid usage flag
[Check 9] Test psa_aead_encrypt - Invalid ciphertext_size
[Check 10] Test psa_aead_encrypt - Invalid nonce
[Check 11] Test psa_aead_encrypt - Invalid tag length 0
TEST RESULT: PASSED
******************************************
TEST: 225 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_decrypt - CCM - AES - 13B nonce & 8B add data
[Check 2] Test psa_aead_decrypt - CCM - AES - 13B nonce & 32B add data
[Check 3] Test psa_aead_decrypt - CCM - AES - 24 bytes Tag length = 4
[Check 4] Test psa_aead_decrypt - CCM - AES - Zero additional data
[Check 5] Test psa_aead_decrypt - CCM - AES - Zero plaintext
[Check 6] Test psa_aead_decrypt - GCM - AES - 12B nonce & 12B add data
[Check 7] Test psa_aead_decrypt - Unsupported algorithm
[Check 8] Test psa_aead_decrypt - Invalid usage flag
[Check 9] Test psa_aead_decrypt - Invalid plaintext_size
[Check 10] Test psa_aead_decrypt - Invalid nonce
[Check 11] Test psa_aead_decrypt - Invalid cihpertext
[Check 12] Test psa_aead_decrypt - Invalid cihpertext_size
[Check 13] Test psa_aead_decrypt - Invalid tag length 0
TEST RESULT: PASSED
******************************************
TEST: 226 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_sign_setup - HMAC - SHA256
[Check 2] Test psa_mac_sign_setup - CMAC - AES
[Check 3] Test psa_mac_sign_setup - Incompatible HMAC for CMAC
[Check 4] Test psa_mac_sign_setup - Invalid usage flag
[Check 5] Test psa_mac_sign_setup - Invalid key type
[Check 6] Test psa_mac_sign_setup - Truncated MAC too large
[Check 7] Test psa_mac_sign_setup - Truncated MAC too small
[Check 8] Test psa_mac_sign_setup - Unknown MAC algorithm
[Check 9] Test psa_mac_sign_setup - Bad algorithm (not a MAC algorithm)
[Check 10] Test psa_mac_sign_setup invalid key handle
[Check 11] Test psa_mac_sign_setup zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 227 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_update
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_update - HMAC - SHA256 - 64 Byte
[Check 2] Test psa_mac_update - CMAC - AES - 16 Byte
[Check 3] Test psa_mac_update - HMAC - SHA512 - 32 Byte
[Check 4] Test psa_mac_update - HMAC - SHA512 - Invalid operation state
TEST RESULT: PASSED
******************************************
TEST: 228 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_sign_finish - HMAC - SHA224
[Check 2] Test psa_mac_sign_finish - HMAC - SHA256
[Check 3] Test psa_mac_sign_finish - HMAC - SHA512
[Check 4] Test psa_mac_sign_finish - HMAC - SHA224 - Truncated 8 Byte
[Check 5] Test psa_mac_sign_finish - HMAC - SHA224 - Small output buffer
[Check 6] Test psa_mac_sign_finish - HMAC - SHA224 - Invalid operation state
[Check 7] Test psa_mac_sign_finish - CMAC - AES
TEST RESULT: PASSED
******************************************
TEST: 229 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify_setup - HMAC - SHA256
[Check 2] Test psa_mac_verify_setup - CMAC - AES
[Check 3] Test psa_mac_verify_setup - Incompatible HMAC for CMAC
[Check 4] Test psa_mac_verify_setup - Invalid usage flag
[Check 5] Test psa_mac_verify_setup - Invalid key type
[Check 6] Test psa_mac_verify_setup - Truncated MAC too large
[Check 7] Test psa_mac_verify_setup - Truncated MAC too small
[Check 8] Test psa_mac_verify_setup - Unknown MAC algorithm
[Check 9] Test psa_mac_verify_setup - Bad algorithm (not a MAC algorithm)
[Check 10] Test psa_mac_verify_setup invalid key handle
[Check 11] Test psa_mac_verify_setup zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 230 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify_finish - HMAC - SHA224
[Check 2] Test psa_mac_verify_finish - HMAC - SHA256
[Check 3] Test psa_mac_verify_finish - HMAC - SHA512
[Check 4] Test psa_mac_verify_finish - HMAC - SHA224 - Truncated 8 Byte
[Check 5] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid mac length
[Check 6] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid expected mac
[Check 7] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid operation state
[Check 8] Test psa_mac_verify_finish - CMAC - AES
TEST RESULT: PASSED
******************************************
TEST: 231 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_abort - HMAC - SHA224
[Check 2] Test psa_mac_abort - HMAC - SHA224 - Truncated 8 Byte
[Check 3] Test psa_mac_abort - HMAC - SHA256
[Check 4] Test psa_mac_abort - HMAC - SHA512
[Check 5] Test psa_mac_abort - CMAC - AES
[Check 6] Test psa_mac_sign_finish after calling psa_mac_abort
TEST RESULT: PASSED
******************************************
TEST: 232 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_encrypt_setup 16 Byte AES
[Check 2] Test psa_cipher_encrypt_setup 24 Byte AES
[Check 3] Test psa_cipher_encrypt_setup 32 Byte AES
[Check 4] Test psa_cipher_encrypt_setup DES 64 bit key
[Check 5] Test psa_cipher_encrypt_setup Triple DES 2-Key
[Check 6] Test psa_cipher_encrypt_setup Triple DES 3-Key
[Check 7] Test psa_cipher_encrypt_setup 16 Byte raw data
[Check 8] Test psa_cipher_encrypt_setup - not a cipher algorithm
[Check 9] Test psa_cipher_encrypt_setup - unknown cipher algorithm
[Check 10] Test psa_cipher_encrypt_setup - incompatible key ARC4
[Check 11] Test psa_cipher_encrypt_setup - incorrect usage
[Check 12] Test psa_cipher_encrypt_setup - RSA public key
[Check 13] Test psa_cipher_encrypt_setup - RSA keypair
[Check 14] Test psa_cipher_encrypt_setup - EC Public key
[Check 15] Test psa_cipher_encrypt_setup - EC keypair
[Check 16] Test psa_cipher_encrypt_setup - Invalid key handle
[Check 17] Test psa_cipher_encrypt_setup - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 233 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_decrypt_setup 16 Byte AES
[Check 2] Test psa_cipher_decrypt_setup 24 Byte AES
[Check 3] Test psa_cipher_decrypt_setup 32 Byte AES
[Check 4] Test psa_cipher_decrypt_setup DES 64 bit key
[Check 5] Test psa_cipher_decrypt_setup Triple DES 2-Key
[Check 6] Test psa_cipher_decrypt_setup Triple DES 3-Key
[Check 7] Test psa_cipher_decrypt_setup 16 Byte raw data
[Check 8] Test psa_cipher_decrypt_setup - not a cipher algorithm
[Check 9] Test psa_cipher_decrypt_setup - unknown cipher algorithm
[Check 10] Test psa_cipher_decrypt_setup - incompatible key ARC4
[Check 11] Test psa_cipher_decrypt_setup - incorrect usage
[Check 12] Test psa_cipher_decrypt_setup - RSA public key
[Check 13] Test psa_cipher_decrypt_setup - RSA keypair
[Check 14] Test psa_cipher_decrypt_setup - EC Public key
[Check 15] Test psa_cipher_decrypt_setup - EC keypair
[Check 16] Test psa_cipher_decrypt_setup - Invalid key handle
[Check 17] Test psa_cipher_decrypt_setup - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 234 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_generate_iv
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_generate_iv 16 Byte AES
[Check 2] Test psa_cipher_generate_iv 24 Byte AES
[Check 3] Test psa_cipher_generate_iv 32 Byte AES
[Check 4] Test psa_cipher_generate_iv DES 64 bit key
[Check 5] Test psa_cipher_generate_iv DES 2-Key
[Check 6] Test psa_cipher_generate_iv DES 3-Key
[Check 7] Test psa_cipher_generate_iv AES - small iv buffer
[Check 8] Test psa_cipher_generate_iv DES - small iv buffer
TEST RESULT: PASSED
******************************************
TEST: 235 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_set_iv
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_set_iv 16 Byte AES
[Check 2] Test psa_cipher_set_iv 24 Byte AES
[Check 3] Test psa_cipher_set_iv 32 Byte AES
[Check 4] Test psa_cipher_set_iv DES 64 bit key
[Check 5] Test psa_cipher_set_iv DES 2-Key
[Check 6] Test psa_cipher_set_iv DES 3-Key
[Check 7] Test psa_cipher_set_iv AES - small iv buffer
[Check 8] Test psa_cipher_set_iv DES - small iv buffer
[Check 9] Test psa_cipher_set_iv AES - large iv buffer
[Check 10] Test psa_cipher_set_iv DES - large iv buffer
TEST RESULT: PASSED
******************************************
TEST: 236 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_update
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING (Short in)
[Check 3] Test psa_cipher_update - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_update - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_update - Encrypt - AES CTR
[Check 6] Test psa_cipher_update - Encrypt - DES CBC (nopad)
[Check 7] Test psa_cipher_update - Encrypt - 2-key 3DE -CBC (nopad)
[Check 8] Test psa_cipher_update - Encrypt - 3-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_update - Encrypt - small output buffer size
[Check 10] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING
[Check 11] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING (Short in)
[Check 12] Test psa_cipher_update - Decrypt - AES CBC_PKCS7
[Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7 (Short input)
[Check 14] Test psa_cipher_update - Decrypt - AES CTR
[Check 15] Test psa_cipher_update - Decrypt - DES CBC (nopad)
[Check 16] Test psa_cipher_update - Decrypt - 2-key 3DE -CBC (nopad)
[Check 17] Test psa_cipher_update - Decrypt - 3-key 3DE -CBC (nopad)
[Check 18] Test psa_cipher_update - Decrypt - small output buffer size
[Check 19] Test psa_cipher_update without cipher setup
TEST RESULT: PASSED
******************************************
TEST: 237 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING (Short in)
[Check 3] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_finish - Encrypt - AES CTR
[Check 6] Test psa_cipher_finish - Encrypt - AES CTR (short input)
[Check 7] Test psa_cipher_finish - Encrypt - DES CBC (nopad)
[Check 8] Test psa_cipher_finish - Encrypt - 2-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_finish - Encrypt - 3-key 3DE -CBC (nopad)
[Check 10] Test psa_cipher_finish - Encrypt - small output buffer size
[Check 11] Test psa_cipher_finish - Decrypt - AES CBC_NO_PADDING
[Check 12] Test psa_cipher_finish - Decrypt - AES CBC_NO_PADDING (Short in)
[Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7
[Check 14] Test psa_cipher_finish - Decrypt - AES CBC_PKCS7 (Short input)
[Check 15] Test psa_cipher_finish - Decrypt - AES CTR
[Check 16] Test psa_cipher_finish - Decrypt - AES CTR (short input)
[Check 17] Test psa_cipher_finish - Decrypt - DES CBC (nopad)
[Check 18] Test psa_cipher_finish - Decrypt - 2-key 3DE -CBC (nopad)
[Check 19] Test psa_cipher_finish - Decrypt - 3-key 3DE -CBC (nopad)
TEST RESULT: PASSED
******************************************
TEST: 238 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_abort - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_abort - Encrypt - AES CBC_PKCS7
[Check 3] Test psa_cipher_abort - Encrypt - AES CTR
[Check 4] Test psa_cipher_abort - Encrypt - DES CBC (nopad)
[Check 5] Test psa_cipher_abort - Encrypt - 2-key 3DE -CBC (nopad)
[Check 6] Test psa_cipher_abort - Encrypt - 3-key 3DE -CBC (nopad)
[Check 7] Test psa_cipher_abort - Decrypt - AES CBC_NO_PADDING
[Check 8] Test psa_cipher_abort - Decrypt - AES CBC_PKCS7
[Check 9] Test psa_cipher_abort - Decrypt - AES CTR
[Check 10] Test psa_cipher_abort - Decrypt - DES CBC (nopad)
[Check 11] Test psa_cipher_abort - Decrypt - 2-key 3DE -CBC (nopad)
[Check 12] Test psa_cipher_abort - Decrypt - 3-key 3DE -CBC (nopad)
[Check 13] Test psa_cipher_update after psa_cipher_abort should fail
TEST RESULT: PASSED
******************************************
TEST: 239 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_asymmetric_encrypt - RSA PKCS1V15
[Check 2] Test psa_asymmetric_encrypt - RSA KEY_PAIR PKCS1V15
[Check 3] Test psa_asymmetric_encrypt - RSA OAEP SHA256
[Check 4] Test psa_asymmetric_encrypt - RSA OAEP SHA256 with label
[Check 5] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256
[Check 6] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256 with label
[Check 7] Test psa_asymmetric_encrypt - Small output buffer
[Check 8] Test psa_asymmetric_encrypt - Invalid algorithm
[Check 9] Test psa_asymmetric_encrypt - Invalid key type
[Check 10] Test psa_asymmetric_encrypt - Invalid usage
[Check 11] Test psa_asymmetric_encrypt - RSA PKCS1V15 - Salt
[Check 12] Test psa_asymmetric_encrypt - ECC public key
[Check 13] Test psa_asymmetric_encrypt - Invalid key handle
[Check 14] Test psa_asymmetric_encrypt - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 240 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_asymmetric_decrypt - RSA KEY_PAIR PKCS1V15
[Check 2] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256
[Check 3] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256 with label
[Check 4] Test psa_asymmetric_decrypt - Invalid key type (RSA public key)
[Check 5] Test psa_asymmetric_decrypt - Small output buffer
[Check 6] Test psa_asymmetric_decrypt - Invalid algorithm
[Check 7] Test psa_asymmetric_decrypt - Invalid key type (AES Key)
[Check 8] Test psa_asymmetric_decrypt - Invalid usage
[Check 9] Test psa_asymmetric_decrypt - RSA PKCS1V15 - Salt
[Check 10] Test psa_asymmetric_decrypt - Invalid key handle
[Check 11] Test psa_asymmetric_decrypt - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 241 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_sign_hash
[Info] Executing tests from non-secure
[Check 1] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 3] Test psa_sign_hash - ECDSA SECP256R1 SHA-256
[Check 4] Test psa_sign_hash - Invalid key type (RSA public key)
[Check 5] Test psa_sign_hash - Small output buffer
[Check 6] Test psa_sign_hash - Invalid algorithm
[Check 7] Test psa_sign_hash - Invalid key type (AES Key)
[Check 8] Test psa_sign_hash - Invalid usage
[Check 9] Test psa_sign_hash - Wrong hash size
[Check 10] Test psa_sign_hash - Invalid key handle
[Check 11] Test psa_sign_hash - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 242 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_verify_hash
[Info] Executing tests from non-secure
[Check 1] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 3] Test psa_verify_hash - ECDSA KEY_PAIR SECP256R1 SHA-256
[Check 4] Test psa_verify_hash - EC public key
[Check 5] Test psa_verify_hash - RSA public key
[Check 6] Test psa_verify_hash - Small output buffer
[Check 7] Test psa_verify_hash - Invalid algorithm
[Check 8] Test psa_verify_hash - Invalid key type (AES Key)
[Check 9] Test psa_verify_hash - Invalid usage
[Check 10] Test psa_verify_hash - Wrong hash size
[Check 11] Test psa_verify_hash - Wrong signature
[Check 12] Test psa_verify_hash - Wrong signature size
[Check 13] Test psa_verify_hash - Invalid key handle
[Check 14] Test psa_verify_hash - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 243 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_raw_key_agreement
[Info] Executing tests from non-secure
[Check 1] Test psa_raw_key_agreement - ECDH SECP256R1
[Check 2] Test psa_raw_key_agreement - Small buffer size
[Check 3] Test psa_raw_key_agreement - ECDH SECP384R1
[Check 4] Test psa_raw_key_agreement - Invalid usage
[Check 5] Test psa_raw_key_agreement - Unknown KDF
[Check 6] Test psa_raw_key_agreement - Not a key agreement alg
[Check 7] Test psa_raw_key_agreement - Public key on different curve
[Check 8] Test psa_raw_key_agreement - Public key instead of private key
[Check 9] Test psa_raw_key_agreement - Invalid key handle
[Check 10] Test psa_raw_key_agreement - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 244 | DESCRIPTION: Testing crypto key management APIs | UT: psa_copy_key
[Info] Executing tests from non-secure
[Check 1] Test psa_copy_key - 2048 RSA public key
[Check 2] Test psa_copy_key - RSA 2048 keypair
[Check 3] Test psa_copy_key - Incompatible target policy(source and target)
[Check 4] Test psa_copy_key - source key with no export usage
[Check 5] Test psa_copy_key - DES 64 bit key
[Check 6] Test psa_copy_key - Triple DES 2-Key
[Check 7] Test psa_copy_key - Triple DES 3-Key
[Check 8] Test psa_copy_key - EC Public key
[Check 9] Test psa_copy_key - EC keypair
TEST RESULT: PASSED
******************************************
TEST: 245 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_clone
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_clone - MD5 algorithm
[Check 2] Test psa_hash_clone - RIPEMD160 algorithm
[Check 3] Test psa_hash_clone - SHA1 algorithm
[Check 4] Test psa_hash_clone - SHA224 algorithm
[Check 5] Test psa_hash_clone - SHA256 algorithm
[Check 6] Test psa_hash_clone - SHA384 algorithm
[Check 7] Test psa_hash_clone - SHA512 algorithm
[Check 8] Test psa_hash_clone - from an inactive source operation
[Check 9] Test psa_hash_clone - on an active target operation
TEST RESULT: PASSED
******************************************
TEST: 246 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_compute
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_compute HMAC SHA 224
[Check 2] Test psa_mac_compute - Incompactible HMAC for CMAC
[Check 3] Test psa_mac_compute - Invalid usage
[Check 4] Test psa_mac_compute - truncated MAC too small
[Check 5] Test psa_mac_compute - truncated MAC too large
[Check 6] Test psa_mac_compute - bad algorithm (unknown MAC algorithm)
[Check 7] Test psa_mac_compute HMAC SHA 256
[Check 8] Test psa_mac_compute HMAC SHA 512
[Check 9] Test psa_mac_compute HMAC SHA 224 (truncated to 8 Byte)
[Check 10] Test psa_mac_compute CMAC AES 128
[Check 11] Test psa_mac_compute small size buffer
[Check 12] Test psa_mac_compute - Invalid key type
TEST RESULT: PASSED
******************************************
TEST: 247 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify HMAC SHA 224
[Check 2] Test psa_mac_verify HMAC SHA 256
[Check 3] Test psa_mac_verify - Incompactible HMAC for CMAC
[Check 4] Test psa_mac_verify - Invalid usage
[Check 5] Test psa_mac_verify - Truncated MAC too large
[Check 6] Test psa_mac_verify - Truncated MAC too small
[Check 7] Test psa_mac_verify - bad algorithm (unknown MAC algorithm)
[Check 8] Test psa_mac_verify HMAC SHA 512
[Check 9] Test psa_mac_verify HMAC SHA 224 (truncated to 8 Byte)
[Check 10] Test psa_mac_verify CMAC AES 128
[Check 11] Test psa_mac_verify - Invalid key type
[Check 12] Test psa_mac_verify small size buffer
[Check 13] Test psa_mac_verify incorrect expected MAC
TEST RESULT: PASSED
******************************************
TEST: 248 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING (Short input)
[Check 3] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_encrypt - Encrypt - AES CTR
[Check 6] Test psa_cipher_encrypt - Encrypt - AES CTR (short input)
[Check 7] Test psa_cipher_encrypt - Encrypt - DES CBC (nopad)
[Check 8] Test psa_cipher_encrypt - Encrypt - 2-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_encrypt - Encrypt - 3-key 3DE -CBC (nopad)
[Check 10] Test psa_cipher_encrypt - small output buffer size
[Check 11] Test psa_cipher_encrypt - Decrypt - AES CBC_NO_PADDING
TEST RESULT: PASSED
******************************************
TEST: 249 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_decrypt - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING
[Check 3] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING (Short input)
[Check 4] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING
[Check 5] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7
[Check 6] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7 (Short input)
[Check 7] Test psa_cipher_decrypt - Decrypt - AES CTR
[Check 8] Test psa_cipher_decrypt - Decrypt - DES CBC (nopad)
[Check 9] Test psa_cipher_decrypt - Decrypt - 2-key 3DE -CBC (nopad)
[Check 10] Test psa_cipher_decrypt - 3-key 3DE -CBC (nopad)
TEST RESULT: PASSED
******************************************
TEST: 250 | DESCRIPTION: Testing crypto key management APIs | UT: psa_sign_message
[Info] Executing tests from non-secure
[Check 1] Test psa_sign_message - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_sign_message - ECDSA SECP256R1 SHA-256
[Check 3] Test psa_sign_message - Invalid key type (RSA public key)
[Check 4] Test psa_sign_message - Small output buffer
[Check 5] Test psa_sign_message - Invalid algorithm
[Check 6] Test psa_sign_message - Invalid key type (AES Key)
[Check 7] Test psa_sign_message - Invalid usage
[Check 8] Test psa_sign_message - Mismatch key type and Algorithm
[Check 9] Test psa_sign_message - Alg mismatch in key and API call
[Check 10] Test psa_sign_message - Invalid key handle
[Check 11] Test psa_sign_message - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 251 | DESCRIPTION: Testing crypto key management APIs | UT: psa_verify_message
[Info] Executing tests from non-secure
[Check 1] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_verify_message - RSA Public Key PKCS1V15 RAW
[Check 3] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 4] Test psa_verify_message - ECDSA KEY_PAIR SECP256R1 SHA-256
[Check 5] Test psa_verify_message - ECDSA Public Key SECP256R1 SHA-256
[Check 6] Test psa_verify_message - Small output buffer
[Check 7] Test psa_verify_message - Invalid algorithm
[Check 8] Test psa_verify_message - Invalid key type (AES Key)
[Check 9] Test psa_verify_message - Invalid usage
[Check 10] Test psa_verify_message - Wrong message size
[Check 11] Test psa_verify_message - Wrong signature
[Check 12] Test psa_verify_message - Wrong signature size
[Check 13] Test psa_verify_message - Invalid key handle
[Check 14] Test psa_verify_message - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 252 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_encrypt_setup - CCM - AES
[Check 2] Test psa_aead_encrypt_setup - CCM - AES - Tag length = 4
[Check 3] Test psa_aead_encrypt_setup - CCM - AES - Mismatched tag length
[Check 4] Test psa_aead_encrypt_setup - CCM - AES - Default Tag length
[Check 5] Test psa_aead_encrypt_setup - GCM - AES
[Check 6] Test psa_aead_encrypt_setup - CCM - DES Invalid key
[Check 7] Test psa_aead_encrypt_setup - Invalid usage flag
TEST RESULT: PASSED
******************************************
TEST: 253 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_decrypt_setup - CCM - AES
[Check 2] Test psa_aead_decrypt_setup - CCM - AES - Tag length = 4
[Check 3] Test psa_aead_decrypt_setup - CCM - AES - Mismatched tag length
[Check 4] Test psa_aead_decrypt_setup - CCM - AES - Default Tag length
[Check 5] Test psa_aead_decrypt_setup - GCM - AES
[Check 6] Test psa_aead_decrypt_setup - CCM - DES Invalid key
[Check 7] Test psa_aead_decrypt_setup - Invalid usage flag
TEST RESULT: PASSED
******************************************
TEST: 254 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_generate_nonce
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_generate_nonce - CCM
[Check 2] Test psa_aead_generate_nonce - CCM - Tag length = 4
[Check 3] Test psa_aead_generate_nonce - CCM - Small buffer size
[Check 4] Test psa_aead_generate_nonce - CCM - Uninitialized operation
[Check 5] Test psa_aead_generate_nonce - CCM - Decrypt operation
[Check 6] Test psa_aead_generate_nonce - GCM
[Check 7] Test psa_aead_generate_nonce - GCM - Decrypt operation
TEST RESULT: PASSED
******************************************
TEST: 255 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_nonce
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_set_nonce - Encrypt - CCM
[Check 2] Test psa_aead_set_nonce - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_set_nonce - Encrypt - CCM - Small nonce size
[Check 4] Test psa_aead_set_nonce - Encrypt - CCM - Large nonce size
[Check 5] Test psa_aead_set_nonce - Encrypt - CCM - Invalid operation state
[Check 6] Test psa_aead_set_nonce - Encrypt - GCM
[Check 7] Test psa_aead_set_nonce - Decrypt - CCM
[Check 8] Test psa_aead_set_nonce - Decrypt - CCM - Tag length = 4
[Check 9] Test psa_aead_set_nonce - Decrypt - CCM - Small nonce size
[Check 10] Test psa_aead_set_nonce - Decrypt - CCM - Large nonce size
[Check 11] Test psa_aead_set_nonce - Decrypt - CCM - Invalid operation state
[Check 12] Test psa_aead_set_nonce - Decrypt - GCM
TEST RESULT: PASSED
******************************************
TEST: 256 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_lengths
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_set_lengths - Encrypt - CCM
[Check 2] Test psa_aead_set_lengths - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_set_lengths - Encrypt - CCM - Zero ad_length
[Check 4] Test psa_aead_set_lengths - Encrypt - CCM - Zero plaintext_length
[Check 5] Test psa_aead_set_lengths - Encrypt - CCM - Invalid operation state
[Check 6] Test psa_aead_set_lengths - Encrypt - GCM
[Check 7] Test psa_aead_set_lengths - Decrypt - CCM
[Check 8] Test psa_aead_set_lengths - Decrypt - CCM - Tag length = 4
[Check 9] Test psa_aead_set_lengths - Decrypt - CCM - Zero ad_length
[Check 10] Test psa_aead_set_lengths - Decrypt - CCM - Zero plaintext_length
[Check 11] Test psa_aead_set_lengths - Decrypt - CCM - Invalid operation state
[Check 12] Test psa_aead_set_lengths - Decrypt - GCM
TEST RESULT: PASSED
******************************************
TEST: 257 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update_ad
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_update_ad - Encrypt - CCM
[Check 2] Test psa_aead_update_ad - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_update_ad - Encrypt - CCM - Zero ad_length
[Check 4] Test psa_aead_update_ad - Encrypt - CCM - Zero plaintext_length
[Check 5] Test psa_aead_update_ad - Encrypt - CCM - Invalid operation state
[Check 6] Test psa_aead_update_ad - Encrypt - CCM - Overflow input length
[Check 7] Test psa_aead_update_ad - Decrypt - CCM
[Check 8] Test psa_aead_update_ad - Decrypt - CCM - Tag length = 4
[Check 9] Test psa_aead_update_ad - Decrypt - CCM - Zero ad_length
[Check 10] Test psa_aead_update_ad - Decrypt - CCM - Zero plaintext_length
[Check 11] Test psa_aead_update_ad - Decrypt - CCM - Invalid operation state
[Check 12] Test psa_aead_update_ad - Decrypt - CCM - Overflow input length
TEST RESULT: PASSED
******************************************
TEST: 258 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_update - Encrypt - CCM
[Check 2] Test psa_aead_update - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_update - Encrypt - CCM - Zero ad_length
[Check 4] Test psa_aead_update - Encrypt - CCM - Zero plaintext_length
[Check 5] Test psa_aead_update - Encrypt - CCM - Small buffer size
[Check 6] Test psa_aead_update - Encrypt - CCM - Less add data than specified
[Check 7] Test psa_aead_update - Encrypt - CCM - Overflow input length
[Check 8] Test psa_aead_update - Encrypt - CCM - Invalid operation state
[Check 9] Test psa_aead_update - Decrypt - CCM
[Check 10] Test psa_aead_update - Decrypt - CCM - Tag length = 4
[Check 11] Test psa_aead_update - Decrypt - CCM - Zero ad_length
[Check 12] Test psa_aead_update - Decrypt - CCM - Zero plaintext_length
[Check 13] Test psa_aead_update - Decrypt - CCM - Small buffer size
[Check 14] Test psa_aead_update - Decrypt - Less add data than specified
[Check 15] Test psa_aead_update - Decrypt - CCM - Overflow input length
[Check 16] Test psa_aead_update - Decrypt - CCM - Invalid operation state
TEST RESULT: PASSED
******************************************
TEST: 259 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_finish - AES-CCM
[Check 2] Test psa_aead_finish - AES-CCM 24 bytes Tag length = 4
[Check 3] Test psa_aead_finish - Small buffer size
[Check 4] Test psa_aead_finish - Input length is less than plaintext length
[Check 5] Test psa_aead_finish - GCM - 16B AES - 12B Nonce & 12B additional data
TEST RESULT: PASSED
******************************************
TEST: 260 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_abort - Encrypt - CCM - AES
[Check 2] Test psa_aead_abort - Encrypt - GCM - AES
[Check 3] Test psa_aead_abort - Decrypt - CCM - AES
[Check 4] Test psa_aead_abort - Decrypt - GCM - AES
[Check 5] Test psa_aead_abort with all initializations
TEST RESULT: PASSED
******************************************
TEST: 261 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_verify - AES-CCM
[Check 2] Test psa_aead_verify - AES-CCM 24 bytes Tag length = 4
[Check 3] Test psa_aead_verify - Small buffer size
[Check 4] Test psa_aead_verify - Input length is less than plaintext length
[Check 5] Test psa_aead_verify - GCM - 16B AES - 12B Nounce & 12B addi data
TEST RESULT: PASSED
******************************************
************ Crypto Suite Report **********
TOTAL TESTS : 61
TOTAL PASSED : 61
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
Entering standby..
```
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-iat-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Attestation Suite
******************************************
TEST: 601 | DESCRIPTION: Testing attestation initial attestation APIs | UT: psa_initial_attestation
[Info] Executing tests from non-secure
[Check 1] Test psa_initial_attestation_get_token with Challenge 32
[Check 2] Test psa_initial_attestation_get_token with Challenge 48
[Check 3] Test psa_initial_attestation_get_token with Challenge 64
[Check 4] Test psa_initial_attestation_get_token with zero challenge size
[Check 5] Test psa_initial_attestation_get_token with small challenge size
[Check 6] Test psa_initial_attestation_get_token with invalid challenge size
[Check 7] Test psa_initial_attestation_get_token with large challenge size
[Check 8] Test psa_initial_attestation_get_token with zero as token size
[Check 9] Test psa_initial_attestation_get_token with small token size
[Check 10] Test psa_initial_attestation_get_token_size with Challenge 32
[Check 11] Test psa_initial_attestation_get_token_size with Challenge 48
[Check 12] Test psa_initial_attestation_get_token_size with Challenge 64
[Check 13] Test psa_initial_attestation_get_token_size with zero challenge size
[Check 14] Test psa_initial_attestation_get_token_size with small challenge size
[Check 15] Test psa_initial_attestation_get_token_size with invalid challenge size
[Check 16] Test psa_initial_attestation_get_token_size with large challenge size
TEST RESULT: PASSED
******************************************
************ Attestation Suite Report **********
TOTAL TESTS : 1
TOTAL PASSED : 1
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
Entering standby..
```
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-its-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Storage Suite
******************************************
TEST: 401 | DESCRIPTION: UID not found check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call get API for UID 6 which is not set
[Check 2] Call get_info API for UID 6 which is not set
[Check 3] Call remove API for UID 6 which is not set
[Check 4] Call get API for UID 6 which is removed
[Check 5] Call get_info API for UID 6 which is removed
[Check 6] Call remove API for UID 6 which is removed
Set storage for UID 6
[Check 7] Call get API for different UID 5
[Check 8] Call get_info API for different UID 5
[Check 9] Call remove API for different UID 5
TEST RESULT: PASSED
******************************************
TEST: 402 | DESCRIPTION: Write once error check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Update the flag of UID 1 with WRITE_ONCE flag
[Check 2] Try to remove the UID 1 having WRITE_ONCE flag
[Check 3] Create a new UID 2 with WRITE_ONCE flag
[Check 4] Try to remove the UID 2 having WRITE_ONCE flag
[Check 5] Try to change the length of write_once UID 2
[Check 6] Check UID removal still fails
[Check 7] Try to change the WRITE_ONCE flag to None for UID 2
[Check 8] Check UID removal still fails
TEST RESULT: PASSED
******************************************
TEST: 403 | DESCRIPTION: Insufficient space check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Overload storage space
UID 13 set failed due to insufficient space
Remove all registered UIDs
[Check 2] Overload storage again to verify all previous UID removed
UID 13 set failed due to insufficient space
Remove all registered UIDs
TEST RESULT: PASSED
******************************************
TEST: 404 | DESCRIPTION: Data Consistency check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2
[Check 2] Call get API with default length - TEST_BUFF_SIZE
TEST RESULT: PASSED
******************************************
TEST: 405 | DESCRIPTION: Success scenarios check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Set UID with data length zero and call storage APIs
[Check 2] Resetting the length check
TEST RESULT: PASSED
******************************************
TEST: 406 | DESCRIPTION: Check for storage create flags | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE
[Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY
[Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION
TEST RESULT: PASSED
******************************************
TEST: 407 | DESCRIPTION: Incorrect Size check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
Create a valid Storage - TEST_BUFF_SIZE/2
Increase the length of storage - TEST_BUFF_SIZE
[Check 1] Call get API with old length - TEST_BUFF_SIZE/2
[Check 2] Call get API with old length - TEST_BUFF_SIZE/4
Decrease the length of storage - TEST_BUFF_SIZE/4
[Check 3] Call get API with old length - TEST_BUFF_SIZE/2
[Check 4] Call get API with old length - TEST_BUFF_SIZE
[Check 5] Call get API with valid length - TEST_BUFF_SIZE/4
TEST RESULT: PASSED
******************************************
TEST: 408 | DESCRIPTION: Invalid offset check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Try to access data with varying valid offset
[Check 2] Try to access data with varying invalid offset
TEST RESULT: PASSED
******************************************
TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call set API with NULL pointer and data length 0
[Check 2] Call get API with NULL read buffer and data length 0
[Check 3] Remove the UID
[Check 4] Call get_info API to verify UID removed
[Check 5] Create UID with zero data_len and valid write buffer
[Check 8] Call get API with NULL read buffer and data length 0
[Check 9] Increase the length
TEST RESULT: PASSED
******************************************
TEST: 410 | DESCRIPTION: UID value zero check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Creating storage with UID 0 should fail
[Check 2] Get_info for UID 0 should fail
[Check 3] Removing storage with UID 0 should fail
TEST RESULT: PASSED
******************************************
************ Storage Suite Report **********
TOTAL TESTS : 10
TOTAL PASSED : 10
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
Entering standby..
```
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-ps-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Storage Suite
******************************************
TEST: 401 | DESCRIPTION: UID not found check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call get API for UID 6 which is not set
[Check 2] Call get_info API for UID 6 which is not set
[Check 3] Call remove API for UID 6 which is not set
[Check 4] Call get API for UID 6 which is removed
[Check 5] Call get_info API for UID 6 which is removed
[Check 6] Call remove API for UID 6 which is removed
Set storage for UID 6
[Check 7] Call get API for different UID 5
[Check 8] Call get_info API for different UID 5
[Check 9] Call remove API for different UID 5
TEST RESULT: PASSED
******************************************
TEST: 402 | DESCRIPTION: Write once error check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Update the flag of UID 1 with WRITE_ONCE flag
[Check 2] Try to remove the UID 1 having WRITE_ONCE flag
[Check 3] Create a new UID 2 with WRITE_ONCE flag
[Check 4] Try to remove the UID 2 having WRITE_ONCE flag
[Check 5] Try to change the length of write_once UID 2
[Check 6] Check UID removal still fails
[Check 7] Try to change the WRITE_ONCE flag to None for UID 2
[Check 8] Check UID removal still fails
TEST RESULT: PASSED
******************************************
TEST: 403 | DESCRIPTION: Insufficient space check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Overload storage space
UID 13 set failed due to insufficient space
Remove all registered UIDs
[Check 2] Overload storage again to verify all previous UID removed
UID 13 set failed due to insufficient space
Remove all registered UIDs
TEST RESULT: PASSED
******************************************
TEST: 404 | DESCRIPTION: Data Consistency check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2
[ 34.396662] random: crng init done
[Check 2] Call get API with default length - TEST_BUFF_SIZE
TEST RESULT: PASSED
******************************************
TEST: 405 | DESCRIPTION: Success scenarios check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Set UID with data length zero and call storage APIs
[Check 2] Resetting the length check
TEST RESULT: PASSED
******************************************
TEST: 406 | DESCRIPTION: Check for storage create flags | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE
[Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY
[Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION
TEST RESULT: PASSED
******************************************
TEST: 407 | DESCRIPTION: Incorrect Size check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Create a valid Storage - TEST_BUFF_SIZE/2
Increase the length of storage - TEST_BUFF_SIZE
[Check 1] Call get API with old length - TEST_BUFF_SIZE/2
[Check 2] Call get API with old length - TEST_BUFF_SIZE/4
Decrease the length of storage - TEST_BUFF_SIZE/4
[Check 3] Call get API with old length - TEST_BUFF_SIZE/2
[Check 4] Call get API with old length - TEST_BUFF_SIZE
[Check 5] Call get API with valid length - TEST_BUFF_SIZE/4
TEST RESULT: PASSED
******************************************
TEST: 408 | DESCRIPTION: Invalid offset check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Try to access data with varying valid offset
[Check 2] Try to access data with varying invalid offset
TEST RESULT: PASSED
******************************************
TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call set API with NULL pointer and data length 0
[Check 2] Call get API with NULL read buffer and data length 0
[Check 3] Remove the UID
[Check 4] Call get_info API to verify UID removed
[Check 5] Create UID with zero data_len and valid write buffer
[Check 8] Call get API with NULL read buffer and data length 0
[Check 9] Increase the length
TEST RESULT: PASSED
******************************************
TEST: 410 | DESCRIPTION: UID value zero check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Creating storage with UID 0 should fail
[Check 2] Get_info for UID 0 should fail
[Check 3] Removing storage with UID 0 should fail
TEST RESULT: PASSED
******************************************
TEST: 411 | DESCRIPTION: Optional APIs: UID not found check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 412 | DESCRIPTION: Optional APIs: Invalid arguments and offset invalid | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 413 | DESCRIPTION: Set_Extended and Create api : Success | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 414 | DESCRIPTION: Optional APIs not supported check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Optional PS APIs are not supported.
[Check 1] Call to create API should fail as API not supported
Failed at Checkpoint: 1
Actual: 0
Expected: -134
TEST RESULT: FAILED (Error Code=0x1)
******************************************
TEST: 415 | DESCRIPTION: Create API write_once flag value check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 416 | DESCRIPTION: Storage assest capacity modification check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs not are supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 417 | DESCRIPTION: Storage assest capacity modification check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs not are supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
************ Storage Suite Report **********
TOTAL TESTS : 17
TOTAL PASSED : 10
TOTAL SIM ERROR : 0
TOTAL FAILED : 1
TOTAL SKIPPED : 6
******************************************
Entering standby..
```
**Component test (linux-pc)**
```lines=12
LD_PRELOAD=trusted-services/tools/b-test/install/linux-pc/lib/libts.so
o trusted-services/tools/b-test/install/linux-pc/bin/component-test -v
TEST(BlockVolumeTests, oversizeWrite) - 1 ms
TEST(BlockVolumeTests, multipleImageInstall) - 0 ms
TEST(BlockVolumeTests, seekAccess) - 0 ms
TEST(BlockVolumeTests, readAndWrite) - 0 ms
TEST(BlockVolumeTests, openClose) - 0 ms
IGNORE_TEST(PartitionTableTests, detectCorruptedGptHeader) - 0 ms
TEST(PartitionTableTests, detectCorruptedMbr) - 2 ms
TEST(PartitionTableTests, loadRefPartitionTable) - 1 ms
TEST(GptIteratorTests, iterateOverRefGpt) - 0 ms
TEST(UefiVariableStoreTests, noRemoveCheck) - 1 ms
TEST(UefiVariableStoreTests, readOnlycheck) - 0 ms
TEST(UefiVariableStoreTests, unsupportedAttribute) - 0 ms
TEST(UefiVariableStoreTests, failedNvSet) - 0 ms
TEST(UefiVariableStoreTests, enumerateStoreContents) - 0 ms
TEST(UefiVariableStoreTests, runtimeAccess) - 0 ms
TEST(UefiVariableStoreTests, bootServiceAccess) - 0 ms
TEST(UefiVariableStoreTests, removePersistent) - 0 ms
TEST(UefiVariableStoreTests, removeVolatile) - 0 ms
TEST(UefiVariableStoreTests, getWithSmallBuffer) - 0 ms
TEST(UefiVariableStoreTests, persistentSetGet) - 0 ms
TEST(UefiVariableStoreTests, setGetRoundtrip) - 0 ms
TEST(UefiVariableIndexTests, setCheckConstraintsNonExistingVar) - 0 ms
TEST(UefiVariableIndexTests, setCheckConstraintsExistingVar) - 0 ms
TEST(UefiVariableIndexTests, checkIterator) - 0 ms
TEST(UefiVariableIndexTests, removeVariable) - 0 ms
TEST(UefiVariableIndexTests, dumpBufferTooSmall) - 0 ms
TEST(UefiVariableIndexTests, dumpLoadRoadtrip) - 0 ms
TEST(UefiVariableIndexTests, enumerateStore) - 0 ms
TEST(UefiVariableIndexTests, variableIndexFull) - 0 ms
TEST(UefiVariableIndexTests, addWithOversizedName) - 0 ms
TEST(UefiVariableIndexTests, emptyIndexOperations) - 0 ms
TEST(SfsBlockStoreTests, psCreateAndSetExtended) - 0 ms
TEST(SfsBlockStoreTests, psCreateAndSet) - 0 ms
TEST(SfsBlockStoreTests, itsStorageLimitTest) - 0 ms
TEST(SfsBlockStoreTests, itsStoreNewItem) - 1 ms
TEST(SfsRamTests, psCreateAndSetExtended) - 0 ms
TEST(SfsRamTests, psCreateAndSet) - 0 ms
TEST(SfsRamTests, itsStorageLimitTest) - 0 ms
TEST(SfsRamTests, itsStoreNewItem) - 0 ms
TEST(MockStoreTests, psCreateAndSetExtended) - 0 ms
TEST(MockStoreTests, psCreateAndSet) - 0 ms
TEST(MockStoreTests, itsStorageLimitTest) - 0 ms
TEST(MockStoreTests, itsStoreNewItem) - 0 ms
TEST(SecureStorageProxyTests, psCreateAndSetExtended) - 0 ms
TEST(SecureStorageProxyTests, psCreateAndSet) - 0 ms
TEST(SecureStorageProxyTests, itsStorageLimitTest) - 0 ms
TEST(SecureStorageProxyTests, itsStoreNewItem) - 0 ms
TEST(SecureStorageClientTests, psCreateAndSetExtended) - 0 ms
TEST(SecureStorageClientTests, psCreateAndSet) - 0 ms
TEST(SecureStorageClientTests, itsStorageLimitTest) - 0 ms
TEST(SecureStorageClientTests, itsStoreNewItem) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkKeyUsage) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkKeyLifetime) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkAlg) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkDhGroup) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkEccCurve) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkKeyType) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkKeyUsage) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkKeyLifetime) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkAlg) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkDhGroup) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkEccCurve) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkKeyType) - 0 ms
TEST(CryptoProtocolOpcodeChecks, checkPackedcToProtobuf) - 0 ms
TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 1 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 0 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 0 ms
TEST(CryptoMacServicePackedcTests, macAbort) - 0 ms
TEST(CryptoMacServicePackedcTests, signAndVerify) - 1 ms
TEST(CryptoCipherServicePackedcTests, cipherAbort) - 0 ms
TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 0 ms
TEST(CryptoHashServicePackedcTests, hashAbort) - 0 ms
TEST(CryptoHashServicePackedcTests, hashAndVerify) - 0 ms
TEST(CryptoHashServicePackedcTests, calculateHash) - 0 ms
TEST(CryptoServicePackedcTests, generateRandomNumbers) - 0 ms
TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 11 ms
TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 1 ms
TEST(CryptoServicePackedcTests, signAndVerifyEat) - 3 ms
TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 3 ms
TEST(CryptoServicePackedcTests, signAndVerifyHash) - 3 ms
TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 1 ms
TEST(CryptoServicePackedcTests, exportPublicKey) - 0 ms
TEST(CryptoServicePackedcTests, purgeKey) - 0 ms
TEST(CryptoServicePackedcTests, copyKey) - 2 ms
TEST(CryptoServicePackedcTests, generatePersistentKeys) - 0 ms
TEST(CryptoServicePackedcTests, generateVolatileKeys) - 1 ms
TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 0 ms
- 24 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 1 ms
TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 3 ms
TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 4 ms
TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 0 ms
TEST(CryptoServiceProtobufTests, exportPublicKey) - 1 ms
TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 0 ms
TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 1 ms
TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 102 ms
TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 21 ms
TEST(CryptoFaultTests, randomNumbersWithBrokenStorage) - 0 ms
TEST(CryptoFaultTests, persistentKeysWithBrokenStorage) - 1 ms
TEST(CryptoFaultTests, volatileKeyWithBrokenStorage) - 0 ms
TEST(PocCryptoOpTests, checkOpSequence) - 1 ms
TEST(CryptoMsgTests, SignHashOutMsgTest) - 0 ms
TEST(CryptoMsgTests, SignHashInMsgTest) - 0 ms
TEST(CryptoMsgTests, ExportPublicKeyOutMsgTest) - 0 ms
TEST(CryptoMsgTests, ExportPublicKeyInMsgTest) - 0 ms
TEST(CryptoMsgTests, GenerateKeyInMsgTest) - 0 ms
TEST(CryptoContextPoolTests, multipleContexts) - 0 ms
TEST(CryptoContextPoolTests, singleContext) - 0 ms
TEST(CryptoContextPoolTests, checkEmptyPool) - 0 ms
TEST(FwuUpdateFmpTests, wholeFmpFlow) - 0 ms
TEST(FwuOversizeImageTests, oversizeInstallMultiLocationEndStaging) - 0 ms
TEST(FwuOversizeImageTests, oversizeInstallEndStaging) - 0 ms
TEST(FwuOversizeImageTests, oversizeInstallCancelStaging) - 1 ms
TEST(FwuOversizeImageTests, maxSizeInstall) - 0 ms
TEST(FwuRollbackTests, bootloaderFallback) - 0 ms
TEST(FwuRollbackTests, selectPreviousAfterActivation) - 0 ms
TEST(FwuRollbackTests, selectPreviousPriorToActivation) - 0 ms
TEST(FwuPowerFailureTests, powerFailureDuringTrial) - 1 ms
TEST(FwuPowerFailureTests, powerFailureDuringStaging) - 1 ms
TEST(FwuUpdateScenarioTests, partialFirmwareUpdateFlow) - 1 ms
TEST(FwuUpdateScenarioTests, wholeFirmwareUpdateFlow) - 0 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInTrial) - 0 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInStaging) - 0 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInRegular) - 1 ms
TEST(FwuImageDirectoryTests, zeroFwLocations) - 0 ms
TEST(FwuImageDirectoryTests, multipleFwLocations) - 0 ms
TEST(FwuImageDirectoryTests, singleFwLocation) - 0 ms
TEST(FwuImageDirectoryTests, streamRecycling) - 0 ms
TEST(FwuImageDirectoryTests, streamedReads) - 1 ms
TEST(FwuDefaultInstallerFactoryTests, configureInstallersFlow) - 0 ms
TEST(FwuCopyInstallerTests, installAndCopy) - 0 ms
TEST(FwuRawInstallerTests, normalInstallFlow) - 1 ms
TEST(FwuMetadataV2Tests, checkImgBankInfoStructure) - 0 ms
TEST(FwuMetadataV2Tests, checkImgEntryStructure) - 0 ms
TEST(FwuMetadataV2Tests, checkFwStoreDescStructure) - 0 ms
TEST(FwuMetadataV2Tests, checkHeaderStructure) - 0 ms
TEST(FwuMetadataManagerTests, checkAndRepairInaccessibleStorage) - 0 ms
TEST(FwuMetadataManagerTests, checkAndRepairAccessibleStorage) - 1 ms
TEST(PartitionedBlockStoreTests, writeToInvalidBlock) - 0 ms
TEST(PartitionedBlockStoreTests, checkEraseLimits) - 1 ms
TEST(PartitionedBlockStoreTests, writeReadEraseBlock) - 0 ms
TEST(PartitionedBlockStoreTests, openClose) - 0 ms
TEST(PartitionedBlockStoreTests, getPartitionInfo) - 0 ms
TEST(FileBlockStoreTests, initWithExistingDiskImage) - 0 ms
TEST(FileBlockStoreTests, wholeBlockRw) - 0 ms
TEST(RamBlockStoreTests, eraseOperations) - 0 ms
TEST(RamBlockStoreTests, writeToInvalidBlock) - 0 ms
TEST(RamBlockStoreTests, writeBiggerThanBlock) - 0 ms
TEST(RamBlockStoreTests, writeReadEraseBlock) - 0 ms
TEST(RamBlockStoreTests, openClose) - 0 ms
TEST(RamBlockStoreTests, getPartitionInfo) - 0 ms
TEST(AttestationProvisioningTests, provisionedIak) - 1 ms
TEST(AttestationProvisioningTests, selfGeneratedIak) - 0 ms
TEST(AttestationServiceTests, repeatedOperation) - 62 ms
TEST(AttestationServiceTests, invalidChallengeLen) - 0 ms
TEST(AttestationServiceTests, checkTokenSize) - 1 ms
TEST(AttestationReporterTests, createReport) - 2 ms
TEST(TcgEventLogTests, interateBootMeasurements) - 0 ms
TEST(DiscoveryServiceTests, checkServiceInfo) - 0 ms
TEST(ServiceNameTests, readService) - 0 ms
TEST(ServiceNameTests, checkFields) - 0 ms
TEST(ServiceNameTests, checkInvalidServiceNames) - 0 ms
TEST(ServiceNameTests, checkValidServiceNames) - 0 ms
TEST(ServiceFrameworkTests, serviceProviderChain) - 0 ms
TEST(ServiceFrameworkTests, serviceWithOps) - 0 ms
TEST(ServiceFrameworkTests, serviceWithNoOps) - 0 ms
TEST(ffarpc_call_ep, request_deny_64_bit) - 0 ms
TEST(ffarpc_call_ep, request_with_data_after_unshare) - 0 ms
TEST(ffarpc_call_ep, request_with_data_buffer_overflow) - 0 ms
TEST(ffarpc_call_ep, request_with_data) - 0 ms
TEST(ffarpc_call_ep, request_without_data_non_zero_length) - 0 ms
TEST(ffarpc_call_ep, request_without_data) - 0 ms
TEST(ffarpc_call_ep, invalid_mgmt_call) - 0 ms
TEST(ffarpc_call_ep, mem_unshare_null_ep) - 0 ms
TEST(ffarpc_call_ep, mem_share_unshare_relinquish_fail_then_success) - 0 ms
TEST(ffarpc_call_ep, mem_share_unshare_relinquish_fail) - 0 ms
TEST(ffarpc_call_ep, mem_share_unshare) - 0 ms
TEST(ffarpc_call_ep, mem_unshare) - 0 ms
TEST(ffarpc_call_ep, mem_share_null_ep) - 0 ms
TEST(ffarpc_call_ep, mem_share_smaller_page_count_relinquish_fail) - 0 ms
TEST(ffarpc_call_ep, mem_share_smaller_page_count) - 0 ms
TEST(ffarpc_call_ep, mem_share_retrieve_fail) - 0 ms
TEST(ffarpc_call_ep, mem_share_fill_all) - 0 ms
TEST(ffarpc_call_ep, mem_share) - 1 ms
TEST(ffarpc_caller, end) - 0 ms
TEST(ffarpc_caller, end_null_handle) - 0 ms
TEST(ffarpc_caller, end_null_context) - 0 ms
TEST(ffarpc_caller, invoke_without_response) - 0 ms
TEST(ffarpc_caller, invoke_with_response) - 0 ms
TEST(ffarpc_caller, invoke_invalid_resp_len) - 0 ms
TEST(ffarpc_caller, invoke_send_direct_req_fail) - 0 ms
TEST(ffarpc_caller, invoke_resp_long_req) - 0 ms
TEST(ffarpc_caller, invoke_resp_no_begin) - 0 ms
TEST(ffarpc_caller, invoke_resp_len_null) - 0 ms
TEST(ffarpc_caller, invoke_resp_buf_null) - 0 ms
TEST(ffarpc_caller, invoke_opstatus_null) - 0 ms
TEST(ffarpc_caller, invoke_handle_context_diff) - 0 ms
TEST(ffarpc_caller, invoke_null_context) - 0 ms
TEST(ffarpc_caller, begin_without_buffer) - 0 ms
TEST(ffarpc_caller, begin_with_buffer) - 0 ms
TEST(ffarpc_caller, begin_not_opened) - 0 ms
TEST(ffarpc_caller, begin_too_large_req) - 0 ms
TEST(ffarpc_caller, begin_transaction_in_progress) - 0 ms
TEST(ffarpc_caller, begin_null_buffer) - 0 ms
TEST(ffarpc_caller, begin_null_context) - 0 ms
TEST(ffarpc_caller, close_success) - 0 ms
TEST(ffarpc_caller, close_endpoint_and_mem_reclaim_fail) - 0 ms
TEST(ffarpc_caller, close_mem_reclaim_fail) - 0 ms
TEST(ffarpc_caller, close_send_direct_msg_fail) - 0 ms
TEST(ffarpc_caller, close_not_opened) - 0 ms
TEST(ffarpc_caller, open_success) - 0 ms
TEST(ffarpc_caller, open_send_direct_req_rpc_status_fail_reclaim_fail) - 0 ms
TEST(ffarpc_caller, open_send_direct_req_rpc_status_fail) - 0 ms
TEST(ffarpc_caller, open_send_direct_req_fail) - 0 ms
TEST(ffarpc_caller, open_share_fail) - 0 ms
TEST(ffarpc_caller, open_invalid_mem_size) - 0 ms
TEST(ffarpc_caller, open_already_opened) - 0 ms
TEST(ffarpc_caller, discover_more_max_cnt) - 0 ms
TEST(ffarpc_caller, discover_less_max_cnt) - 0 ms
TEST(ffarpc_caller, discover) - 0 ms
TEST(ffarpc_caller, discover_rx_release_fail) - 0 ms
TEST(ffarpc_caller, discover_rx_get_fail) - 0 ms
TEST(ffarpc_caller, discover_partition_info_get_fail) - 0 ms
TEST(ffarpc_caller, discover_invalid_arguments) - 0 ms
TEST(RpcStatusProtocolChecks, checkProtobufRpcStatusCodes) - 0 ms
TEST(ConfigRamstoreTests, checkMultipleConfig) - 0 ms
TEST(ConfigRamstoreTests, checkSingleConfig) - 0 ms
TEST(ConfigRamstoreTests, checkEmptyConfig) - 0 ms
TEST(Crc32Tests, multiPart) - 0 ms
TEST(Crc32Tests, longString) - 0 ms
TEST(Crc32Tests, shortString) - 0 ms
TEST(EndianTests, le64) - 0 ms
TEST(EndianTests, le32) - 0 ms
TEST(EndianTests, le16) - 0 ms
TEST(EndianTests, le8) - 0 ms
TEST(TlvTests, encodeWrongOrder) - 0 ms
TEST(TlvTests, encodeInsufficientSpace) - 0 ms
TEST(TlvTests, encodeRecords) - 0 ms
TEST(TlvTests, decodeBadRecords) - 0 ms
TEST(TlvTests, findAndDecodeMissingOptional) - 0 ms
TEST(TlvTests, findAndDecode) - 0 ms
TEST(TlvTests, decodeGoodRecords) - 0 ms
TEST(UuidTests, roundTrip) - 1 ms
TEST(UuidTests, checkNilUuidOperations) - 0 ms
TEST(UuidTests, checkIsEqualOperation) - 0 ms
TEST(UuidTests, checkOctetsFromCanonical) - 0 ms
TEST(UuidTests, parseValidUuidToGuidOctets) - 0 ms
TEST(UuidTests, parseError) - 0 ms
TEST(UuidTests, parseUuidInUrn) - 0 ms
TEST(UuidTests, parseValidUuidMixedCase) - 0 ms
TEST(UuidTests, parseValidUuidLowerCase) - 0 ms
TEST(TsDemoTests, runTsDemo) - 8 ms
OK (252 tests, 251 ran, 365136 checks, 1 ignored, 0 filtered out, 279 ms)
```
**Platform inspect test (arm-linux)**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/platform-inspect
attestation_report:
challenge: 31 03 a3 a3 e5 e2 d8 1a ea e1 df 26 85 1c c0 2a 4d ac 4a 3e ba 32 15 53 0e f2 e3 fe 91 f6 8b 75
client_id: 0
boot_seed: ec 0b f2 64 34 7a 8c 68 ca ff 5f a4 e2 ff 90 70 25 64 be e1 13 90 58 97 42 b1 ce 4a d2 f8 7b 3a
security_lifecycle: 0
instance_id: 01 9c d5 b1 3e 0b 88 a9 12 87 c7 1e 52 0d 58 39 92 a7 69 d9 58 bb 8a db 10 15 f0 77 c0 a1 25 63 32
implementation_id: 74 72 75 73 74 65 64 66 69 72 6d 77 61 72 65 2e 6f 72 67 2e 74 73 2e 61 74 74 65 73 74 61 74 69 6f 6e 5f 73 70
sw_components:
type: FW_CONFIG
digest: 5e 10 97 50 c0 cb 32 14 e6 e4 09 f7 12 ba 84 d6 d1 d6 e2 d4 45 8c 52 f3 d2 b9 6e ea 82 d4 e5 47
type: TB_FW_CONFIG
digest: dc 45 e2 c1 a9 f5 b1 81 9a 10 8e 8e 0f 0a 5e b2 e1 c1 94 00 73 ae 14 83 eb dd e1 f5 fe ac 72 5c
type: BL_2
digest: d1 56 89 90 7e d8 98 71 72 47 fb 91 9e c2 0b 7b 5d 89 f4 07 ce 27 8d 37 54 20 d8 aa ea 92 30 ae
type: SECURE_RT_EL3
digest: 99 56 5e 18 d3 ea 1b 8f 79 63 c8 66 19 48 a2 50 f8 c3 0c a5 33 99 53 9e 11 c2 cd 5e 11 c5 8c dc
type: HW_CONFIG
digest: 54 10 fe 53 a5 fe 12 75 dc cc 3a 15 8f d8 34 63 f3 3e 1e 71 7f e3 4c 39 a1 62 4a 90 5c 0a 84 f3
type: SOC_FW_CONFIG
digest: 4e e4 8e 5a e6 50 ed e0 b5 a3 54 8a 1f d6 0e 8a ea 0e 71 75 0e a4 3f 82 76 ce af cd 7c b0 91 e0
type: SECURE_RT_EL1_UNKNOWN
digest: e9 4a 94 e4 1e 0c 28 97 3a 6b b8 dc 2f 89 fc f9 af e9 d3 67 98 89 2c 4d 0a 6d 3b b5 59 11 c6 73
type: TOS_FW_CONFIG
digest: 77 35 1c d8 86 d0 66 15 eb 3a 2d 2d 9c ef b9 49 ba 0a 4a 67 58 ff 06 b7 90 7d c7 06 38 ce c6 0b
type: BL_33
digest: a2 6c ec 40 dd dd 31 ce af 90 09 5b 25 c6 e3 83 b3 3e 6f 11 fc 13 4f 8e 83 64 0d 53 b6 34 22 6c
type: NT_FW_CONFIG
digest: 0c 53 ba 3f c9 43 13 bf 25 59 bc 8c 2e 7e 49 fa 0f 1a 5a 40 96 ed 58 fa 58 31 39 7a de d4 e4 fb
type: CRITICAL DATA
digest: d3 a9 31 35 10 be c0 88 51 bd 28 4e a9 ff b3 c3 cd 02 11 fc 23 2e 02 07 0e ce a5 ab 1d d9 a1 6a
```
**TS Demo test (arm-linux)**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/ts-demo
Demonstrates use of trusted services from an application
---------------------------------------------------------
A client requests a set of crypto operations performed by
the Crypto service. Key storage for persistent keys is
provided by the Secure Storage service via the ITS client.
Generating random bytes length: 1
Operation successful
Random bytes:
55
Generating random bytes length: 7
Operation successful
Random bytes:
2B 35 04 79 3B 50 83
Generating random bytes length: 128
Operation successful
Random bytes:
57 31 1C 74 88 69 C4 12
D1 9A 93 83 2D D2 AA 0C
EA 03 F5 44 09 6A 92 11
8A 8A 06 57 26 B1 47 74
01 1B 2A 25 8D CF 6C A3
A6 4D 6D A1 8B FC 31 76
57 13 72 96 C4 09 BA 56
88 35 F9 66 58 B0 EE 1E
AF E9 90 9D AD BB 62 21
82 37 E1 31 37 43 18 5B
95 2E 42 BB 6B 41 40 66
A5 81 81 32 3F F3 23 8A
5A 88 B2 9D 2C B0 F2 C4
51 26 13 53 FE 8F 68 B0
B0 D1 64 85 3C E9 5A C8
E2 0A 62 80 F1 AB A2 7C
Generating ECC signing key
Operation successful
Signing message: "The quick brown fox" using key: 256
Operation successful
Signature bytes:
77 1E 93 3C E1 A2 CD C4
5D 03 15 B8 A9 1A AE 47
37 6A B8 F0 5D 67 22 06
FC 2C B8 20 71 97 7F F8
AE 06 0F 71 34 E3 0B FD
CA 24 C2 23 0F 89 67 99
51 B5 FE 25 95 CD 75 ED
1B A2 6E 5A 3A 06 26 3C
Verify signature using original message: "The quick brown fox"
Operation successful
Verify signature using modified message: "!he quick brown fox"
Successfully detected modified message
Signing message: "jumps over the lazy dog" using key: 256
Operation successful
Signature bytes:
91 1A 8E 4B 17 3C 01 FF
A2 0A D4 55 39 3E 84 96
92 84 A3 F1 A1 26 5C 40
14 A6 57 50 79 70 41 ED
68 E4 21 61 DD 9F 07 0C
DE 9C DC 29 F5 9F 88 DF
36 0D C4 21 54 D3 CD F8
35 C0 7B 16 10 59 26 4A
Verify signature using original message: "jumps over the lazy dog"
Operation successful
Verify signature using modified message: "!umps over the lazy dog"
Successfully detected modified message
Generating RSA encryption key
Operation successful
Encrypting message: "Top secret" using RSA key: 257
Operation successful
Encrypted message:
6E 9A 04 F4 64 33 0B 6D
DE CB C7 21 EF C8 FC A9
95 50 F1 6C 90 64 AA A0
D6 99 BD 90 4C 79 A0 73
Decrypting message using RSA key: 257
Operation successful
Decrypted message: "Top secret"
Exporting public key: 256
Operation successful
Public key bytes:
04 D5 1A 1C 30 72 3C CF
3B E3 0B 47 92 54 2E 6E
61 28 26 A1 FB 00 82 75
AC 44 14 18 B4 87 66 F7
F8 47 0B 25 83 04 4B 9A
6F 08 DF 98 E1 81 77 E7
6B 29 34 60 2A 52 94 96
E8 6E 2E 0E 78 5A EF 81
98
Destroying signing key: 256
Operation successful
Destroying encryption key: 257
Operation successful
```
==Config 2: FIP SP==
====Build command====
```
MEASURED_BOOT=y SPMC_TESTS=n TS_SMM_GATEWAY=n TS_UEFI_TESTS=n SP_PACKAGING_METHOD=fip DEFAULT_SP_CONFIG=default-sp SP_BLOCK_STORAGE_CONFIG=default-sp SP_PSA_ITS_CONFIG=shared-flash-opteesp SP_PSA_PS_CONFIG=shared-flash-opteesp make
```
====Setup steps after boot====
```
/mnt/host/out/linux-arm-ffa-tee/load_module.sh
```
====Test results====
**Trusted Services service level test (arm-linux)**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/ts-service-test -v -xg FwuServiceTests
TEST(PsServiceTests, createAndSetExtended) - 73357 ms
TEST(PsServiceTests, createAndSet) - 118755 ms
TEST(PsServiceTests, storeNewItem) - 80500 ms
TEST(ItsServiceTests, storeNewItem) - 80930 ms
TEST(AttestationProvisioningTests, provisionedIak) - 36000 ms
TEST(AttestationProvisioningTests, selfGeneratedIak) - 52399 ms
TEST(AttestationServiceTests, repeatedOperation) - 6675032 ms
TEST(AttestationServiceTests, invalidChallengeLen)[ 10.808920] ------------[ cut here ]------------
[ 10.809020] WARNING: CPU: 7 PID: 143 at mm/page_alloc.c:5534 __alloc_pages+0x164/0xab0
[ 10.809262] Modules linked in: arm_ffa_tee(O)
[ 10.809425] CPU: 7 PID: 143 Comm: ts-service-test Tainted: G O 6.1.0 #1
[ 10.809620] Hardware name: FVP Base RevC (DT)
[ 10.809764] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 10.809920] pc : __alloc_pages+0x164/0xab0
[ 10.810120] lr : pool_op_alloc+0x5c/0x180 [arm_ffa_tee]
[ 10.810320] sp : ffffffc0087ebac0
[ 10.810490] x29: ffffffc0087ebac0 x28: ffffffc0087ebd30 x27: ffffff88009fad80
[ 10.810736] x26: 0000007fc4e54838 x25: 0000000000000005 x24: 0000000000001000
[ 10.810982] x23: ffffff88009fa900 x22: 0000000000000015 x21: 0000000000000015
[ 10.811239] x20: 0000000000000000 x19: ffffff88009fa900 x18: 0000000000000000
[ 10.811420] x17: 0000000000000000 x16: 0000000000000000 x15: 0000007fc4e54838
[ 10.811720] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 10.811920] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 10.812220] x8 : ffffff88009fa980 x7 : 0000000000000000 x6 : 00000000000009b8
[ 10.812420] x5 : ffffff88009fa900 x4 : 0000000000000000 x3 : 0000000000000000
[ 10.812720] x2 : ffffff8800fab700 x1 : 0000000000000001 x0 : ffffffc008707000
[ 10.812920] Call trace:
[ 10.813020] __alloc_pages+0x164/0xab0
[ 10.813220] pool_op_alloc+0x5c/0x180 [arm_ffa_tee]
[ 10.813439] shm_alloc_helper+0x98/0x110
[ 10.813620] tee_shm_alloc_user_buf+0x74/0x11c
[ 10.813820] tee_ioctl+0xa70/0xf9c
[ 10.813931] __arm64_sys_ioctl+0x3bc/0xc30
[ 10.814120] invoke_syscall.constprop.0+0x5c/0x104
[ 10.814341] do_el0_svc+0x60/0x18c
[ 10.814520] el0_svc+0x38/0xf0
[ 10.814620] el0t_64_sync_handler+0xbc/0x140
[ 10.814820] el0t_64_sync+0x18c/0x190
[ 10.814970] ---[ end trace 0000000000000000 ]---
ffa_tee_share_mem():212 error: 12
- 23300 ms
TEST(AttestationServiceTests, checkTokenSize) - 67700 ms
TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 23948 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 27170 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 33099 ms
TEST(CryptoMacServicePackedcTests, macAbort) - 20137 ms
TEST(CryptoMacServicePackedcTests, signAndVerify) - 78752 ms
TEST(CryptoCipherServicePackedcTests, cipherAbort) - 20223 ms
TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 62967 ms
TEST(CryptoHashServicePackedcTests, hashAbort) - 18404 ms
TEST(CryptoHashServicePackedcTests, hashAndVerify) - 29963 ms
TEST(CryptoHashServicePackedcTests, calculateHash) - 13810 ms
TEST(CryptoServicePackedcTests, generateRandomNumbers) - 43374 ms
TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 2682259 ms
TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 262300 ms
TEST(CryptoServicePackedcTests, signAndVerifyEat) - 264498 ms
TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 327265 ms
TEST(CryptoServicePackedcTests, signAndVerifyHash) - 327110 ms
TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 169165 ms
TEST(CryptoServicePackedcTests, exportPublicKey) - 114734 ms
TEST(CryptoServicePackedcTests, purgeKey) - 102856 ms
TEST(CryptoServicePackedcTests, copyKey) - 139695 ms
TEST(CryptoServicePackedcTests, generatePersistentKeys) - 187446 ms
TEST(CryptoServicePackedcTests, generateVolatileKeys) - 57300 ms
TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 43334 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 1319121 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 194447 ms
TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 329200 ms
TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 327500 ms
TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 169900 ms
TEST(CryptoServiceProtobufTests, exportPublicKey) - 115400 ms
TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 190022 ms
TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 57400 ms
TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 9270152 ms
TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 2197058 ms
TEST(DiscoveryServiceTests, checkServiceInfo) - 3800 ms
OK (45 tests, 43 ran, 763 checks, 0 ignored, 2 filtered out, 26446597 ms)
```
**PSA Architecture Test Suite (arm-linux)**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-crypto-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Crypto Suite
******************************************
TEST: 201 | DESCRIPTION: Testing crypto key management APIs | UT: psa_crypto_init
[Info] Executing tests from non-secure
[Check 1] Test calling crypto functions before psa_crypto_init
[Check 2] Test psa_crypto_init
[Check 3] Test multiple psa_crypto_init
TEST RESULT: PASSED
******************************************
TEST: 202 | DESCRIPTION: Testing crypto key management APIs | UT: psa_import_key
[Info] Executing tests from non-secure
[Check 1] Test psa_import_key 16 bytes AES
[Check 2] Test psa_import_key 24 bytes AES
[Check 3] Test psa_import_key 32 bytes AES
[Check 4] Test psa_import_key 2048 RSA public key
[Check 5] Test psa_import_key with RSA 2048 keypair
[Check 6] Test psa_import_key with DES 8 bytes key
[Check 7] Test psa_import_key with Triple DES 2-Key
[Check 8] Test psa_import_key with Triple DES 3-Key
[Check 9] Test psa_import_key with EC Public key
[Check 10] Test psa_import_key with EC keypair
[Check 11] Test psa_import_key 16 bytes AES with invalid bits
[Check 12] Test psa_import_key with key data greater than the algorithm size
[Check 13] Test psa_import_key with incorrect key data size
[Check 14] Test psa_import_key with invalid key type value
TEST RESULT: PASSED
******************************************
TEST: 203 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_key
[Info] Executing tests from non-secure
[Check 1] Test psa_export_key 16 Byte AES
[Check 2] Test psa_export_key 24 Byte AES
[Check 3] Test psa_export_key 32 Byte AES
[Check 4] Test psa_export_key 2048 RSA public key
[Check 5] Test psa_export_key with RSA 2048 keypair
[Check 6] Test psa_export_key with DES 64 bit key
[Check 7] Test psa_export_key with Triple DES 2-Key
[Check 8] Test psa_export_key with Triple DES 3-Key
[Check 9] Test psa_export_key with EC Public key
[Check 10] Test psa_export_key with EC keypair
[Check 11] Test psa_export_key with key policy verify
[Check 12] Test psa_export_key with less buffer size
TEST RESULT: PASSED
******************************************
TEST: 204 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_public_key
[Info] Executing tests from non-secure
[Check 1] Test psa_export_public_key 16 Byte AES
[Check 2] Test psa_export_public_key 24 Byte AES
[Check 3] Test psa_export_public_key 32 Byte AES
[Check 4] Test psa_export_public_key 2048 RSA public key
[Check 5] Test psa_export_public_key with RSA 2048 keypair
[Check 6] Test psa_export_public_key with DES 64 bit key
[Check 7] Test psa_export_public_key with Triple DES 2-Key
[Check 8] Test psa_export_public_key with Triple DES 3-Key
[Check 9] Test psa_export_public_key with EC Public key
[Check 10] Test psa_export_public_key with EC keypair
[Check 11] Test psa_export_public_key with less buffer size
TEST RESULT: PASSED
******************************************
TEST: 205 | DESCRIPTION: Testing crypto key management APIs | UT: psa_destroy_key
[Info] Executing tests from non-secure
[Check 1] Test psa_destroy_key 16 Byte AES
[Check 2] Test psa_destroy_key 24 Byte AES
[Check 3] Test psa_destroy_key 32 Byte AES
[Check 4] Test psa_destroy_key 2048 RSA public key
[Check 5] Test psa_destroy_key with RSA 2048 keypair
[Check 6] Test psa_destroy_key with DES 64 bit key
[Check 7] Test psa_destroy_key with Triple DES 2-Key
[Check 8] Test psa_destroy_key with Triple DES 3-Key
[Check 9] Test psa_destroy_key with EC Public key
[Check 10] Test psa_destroy_key with EC keypair
TEST RESULT: PASSED
******************************************
TEST: 206 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compute
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_compute with MD5 algorithm
[Check 2] Test psa_hash_compute with RIPEMD160 algorithm
[Check 3] Test psa_hash_compute with SHA1 algorithm
[Check 4] Test psa_hash_compute with SHA224 algorithm
[Check 5] Test psa_hash_compute with SHA256 algorithm
[Check 6] Test psa_hash_compute with SHA384 algorithm
[Check 7] Test psa_hash_compute with SHA512 algorithm
[Check 8] Test psa_hash_compute with small buffer size
[Check 9] Test psa_hash_compute with invalid algorithm
TEST RESULT: PASSED
******************************************
TEST: 207 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compare
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_compare with MD5 algorithm
[Check 2] Test psa_hash_compare with RIPEMD160 algorithm
[Check 3] Test psa_hash_compare with SHA1 algorithm
[Check 4] Test psa_hash_compare with SHA224 algorithm
[Check 5] Test psa_hash_compare with SHA256 algorithm
[Check 6] Test psa_hash_compare with SHA384 algorithm
[Check 7] Test psa_hash_compare with SHA512 algorithm
[Check 8] Test psa_hash_compare with incorrect hash
[Check 9] Test psa_hash_compare with incorrect hash length
[Check 10] Test psa_hash_compare with invalid algorithm
TEST RESULT: PASSED
******************************************
TEST: 208 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_setup - ECDH + HKDF-SHA-256
[Check 2] Test psa_key_derivation_setup - ECDH, unknown KDF
[Check 3] Test psa_key_derivation_setup - bad key derivation algorithm
[Check 4] Test psa_key_derivation_setup - Invalid Algorithm
TEST RESULT: PASSED
******************************************
TEST: 209 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_bytes
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_input_bytes - Step as Info
[Check 2] Test psa_key_derivation_input_bytes - Step as secret
[Check 3] Test psa_key_derivation_input_bytes - Step as salt
[Check 4] Test psa_key_derivation_input_bytes - Step as label
[Check 5] Test psa_key_derivation_input_bytes - Step as seed
[Check 6] Test psa_key_derivation_input_bytes - Invalid step
TEST RESULT: PASSED
******************************************
TEST: 210 | DESCRIPTION: Testing crypto key attributes APIs | UT: psa_key_attributes_set_get
[Info] Executing tests from non-secure
[Check 1] Test psa_key_attributes_set_get key attributes
TEST RESULT: PASSED
******************************************
TEST: 211 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_setup with MD5 algorithm
[Check 2] Test psa_hash_setup with RIPEMD160 algorithm
[Check 3] Test psa_hash_setup with SHA1 algorithm
[Check 4] Test psa_hash_setup with SHA224 algorithm
[Check 5] Test psa_hash_setup with SHA256 algorithm
[Check 6] Test psa_hash_setup with SHA384 algorithm
[Check 7] Test psa_hash_setup with SHA512 algorithm
[Check 8] Test psa_hash_setup with Invalid hash algorithm
[Check 9] Test psa_hash_setup with Invalid algorithm
[Check 10] Test psa_hash_setup with CTR algorithm
TEST RESULT: PASSED
******************************************
TEST: 212 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_update
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_update with MD5 algorithm
[Check 2] Test psa_hash_update with RIPEMD160 algorithm
[Check 3] Test psa_hash_update with SHA1 algorithm
[Check 4] Test psa_hash_update with SHA224 algorithm
[Check 5] Test psa_hash_update with SHA256 algorithm
[Check 6] Test psa_hash_update with SHA384 algorithm
[Check 7] Test psa_hash_update with SHA512 algorithm
[Check 8] Test psa_hash_update without hash setup
[Check 9] Test psa_hash_update with completed opertaion handle
TEST RESULT: PASSED
******************************************
TEST: 213 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_verify with MD5 algorithm
[Check 2] Test psa_hash_verify with RIPEMD160 algorithm
[Check 3] Test psa_hash_verify with SHA1 algorithm
[Check 4] Test psa_hash_verify with SHA224 algorithm
[Check 5] Test psa_hash_verify with SHA256 algorithm
[Check 6] Test psa_hash_verify with SHA384 algorithm
[Check 7] Test psa_hash_verify with SHA512 algorithm
[Check 8] Test psa_hash_verify with incorrect expected hash
[Check 9] Test psa_hash_verify with incorrect hash length
[Check 10] test psa_hash_verify with inactive & invalid operation handle
TEST RESULT: PASSED
******************************************
TEST: 214 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_finish with MD5 algorithm
[Check 2] Test psa_hash_finish with RIPEMD160 algorithm
[Check 3] Test psa_hash_finish with SHA1 algorithm
[Check 4] Test psa_hash_finish with SHA224 algorithm
[Check 5] Test psa_hash_finish with SHA256 algorithm
[Check 6] Test psa_hash_finish with SHA384 algorithm
[Check 7] Test psa_hash_finish with SHA512 algorithm
[Check 8] Test psa_hash_finish with invalid hash buffer size
[Check 9] test psa_hash_finish with inactive operation handle
TEST RESULT: PASSED
******************************************
TEST: 215 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_abort with MD5 algorithm
[Check 2] Test psa_hash_abort with RIPEMD160 algorithm
[Check 3] Test psa_hash_abort with SHA1 algorithm
[Check 4] Test psa_hash_abort with SHA224 algorithm
[Check 5] Test psa_hash_abort with SHA256 algorithm
[Check 6] Test psa_hash_abort with SHA384 algorithm
[Check 7] Test psa_hash_abort with SHA512 algorithm
[Check 8] Test psa_hash_finish after calling psa_hash_abort
TEST RESULT: PASSED
******************************************
TEST: 216 | DESCRIPTION: Testing crypto generator functions APIs | UT: psa_generate_key
[Info] Executing tests from non-secure
[Check 1] Test psa_generate_key 16 Byte AES
[Check 2] Test psa_generate_key 24 Byte AES
[Check 3] Test psa_generate_key 32 Byte AES
[Check 4] Test psa_generate_key with DES 64 bit key
[Check 5] Test psa_generate_key with Triple DES 2-Key
[Check 6] Test psa_generate_key with Triple DES 3-Key
[Check 7] Test psa_generate_key with RSA 2048 Keypair
[Check 8] Test psa_generate_key with ECC KeyPair
[Check 9] Test psa_generate_key with RSA 2048 Public key
[Check 10] Test psa_generate_key with invalid key type
[Check 11] Test psa_generate_key with invalid usage flags
TEST RESULT: PASSED
******************************************
TEST: 217 | DESCRIPTION: Testing crypto generation APIs | UT: psa_generate_random
[Info] Executing tests from non-secure
[Check 1] Test psa_generate_random to get 0 Byte data
[Check 2] Test psa_generate_random to get 16 Byte data
[Check 3] Test psa_generate_random to get 24 Byte data
[Check 4] Test psa_generate_random to get 32 Byte data
[Check 5] Test psa_generate_random to get 64 Byte data
[Check 6] Test psa_generate_random to get 128 Byte data
[Check 7] Test psa_generate_random to get 256 Byte data
[Check 8] Test psa_generate_random to get 512 Byte data
[Check 9] Test psa_generate_random to get 1000 Byte data
TEST RESULT: PASSED
******************************************
TEST: 218 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_key
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_input_key 16 Byte Key
[Check 2] Test psa_key_derivation_input_key with invalid usage
[Check 3] Test psa_key_derivation_input_key with step as label
[Check 4] Test psa_key_derivation_input_key with step as info
[Check 5] Test psa_key_derivation_input_key with step as seed
[Check 6] Test psa_key_derivation_input_key with step as salt
[Check 7] Test psa_key_derivation_input_key with key type as AES(not derive)
[Check 8] Test psa_key_derivation_input_key incorrect key algorithm
[Check 9] Test psa_key_derivation_input_key with key type as 2048 RSA public key
[Check 10] Test psa_key_derivation_input_key with key type as RSA 2048 keypair
[Check 11] Test psa_key_derivation_input_key with zero as step
[Check 12] Test psa_cipher_decrypt_setup - Invalid key handle
[Check 13] Test psa_cipher_decrypt_setup - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 219 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_key_agreement
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_key_agreement - ECDH SECP256R1
[Check 2] Test psa_key_derivation_key_agreement - Invalid step
[Check 3] Test psa_key_derivation_key_agreement - ECDH SECP384R1
[Check 4] Test psa_key_derivation_key_agreement - Invalid usage
[Check 5] Test psa_key_derivation_key_agreement - KDF not a key agreement alg
[Check 6] Test psa_key_derivation_key_agreement - Public key of different curve
[Check 7] Test psa_key_derivation_key_agreement - Pub key instead of Prv key
[Check 8] Test psa_key_derivation_key_agreement - Invalid handle
[Check 9] Test psa_key_derivation_key_agreement - Zero as handle
TEST RESULT: PASSED
******************************************
TEST: 220 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_bytes
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_output_bytes - HKDF
[Check 2] Test psa_key_derivation_output_bytes - optional salt
[Check 3] Test psa_key_derivation_output_bytes - capacity < output_length
[Check 4] Test psa_key_derivation_output_bytes - missing info
[Check 5] Test psa_key_derivation_output_bytes - missing salt/secret/info
[Check 6] Test psa_key_derivation_output_bytes - TLS12_PRF
[Check 7] Test psa_key_derivation_output_bytes - capacity < output_length
[Check 8] Test psa_key_derivation_output_bytes - missing seed/secret/label
TEST RESULT: PASSED
******************************************
TEST: 221 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_key
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_output_key - Key
[Check 2] Test psa_key_derivation_output_key - Info
[Check 3] Test psa_key_derivation_output_key - Salt
[Check 4] Test psa_key_derivation_output_key - Greater Capacity than available
[Check 5] Test psa_key_derivation_output_key - ECC Public key
[Check 6] Test psa_key_derivation_output_key - ECC keypair (wrong key length)
[Check 7] Test psa_key_derivation_output_key - RSA Public Key[Check 8] Test psa_key_derivation_output_key - RSA keypair
[Check 9] Test psa_key_derivation_output_key - Invalid key size
TEST RESULT: PASSED
******************************************
TEST: 222 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_abort
TEST RESULT: PASSED
******************************************
TEST: 223 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_set_get_capacity
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_set_get_capacity - < operation's capacity
[Check 2] Test psa_key_derivation_set_get_capacity - = operation's capacity
[Check 3] Test psa_key_derivation_set_get_capacity - > operation's capacity
[Check 4] Test psa_key_derivation_set_get_capacity - unchanged capacity
TEST RESULT: PASSED
******************************************
TEST: 224 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_encrypt - CCM - AES - 13B nonce & 8B add data
[Check 2] Test psa_aead_encrypt - CCM - AES - 13B nonce & 32B add data
[Check 3] Test psa_aead_encrypt - CCM - AES - 24 bytes Tag length = 4
[Check 4] Test psa_aead_encrypt - CCM - AES - Zero additional data
[Check 5] Test psa_aead_encrypt - CCM - AES - Zero plaintext
[Check 6] Test psa_aead_encrypt - GCM - AES - 12B nonce & 12B add data
[Check 7] Test psa_aead_encrypt - Unsupported algorithm
[Check 8] Test psa_aead_encrypt - Invalid usage flag
[Check 9] Test psa_aead_encrypt - Invalid ciphertext_size
[Check 10] Test psa_aead_encrypt - Invalid nonce
[Check 11] Test psa_aead_encrypt - Invalid tag length 0
TEST RESULT: PASSED
******************************************
TEST: 225 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_decrypt - CCM - AES - 13B nonce & 8B add data
[Check 2] Test psa_aead_decrypt - CCM - AES - 13B nonce & 32B add data
[Check 3] Test psa_aead_decrypt - CCM - AES - 24 bytes Tag length = 4
[Check 4] Test psa_aead_decrypt - CCM - AES - Zero additional data
[Check 5] Test psa_aead_decrypt - CCM - AES - Zero plaintext
[Check 6] Test psa_aead_decrypt - GCM - AES - 12B nonce & 12B add data
[Check 7] Test psa_aead_decrypt - Unsupported algorithm
[Check 8] Test psa_aead_decrypt - Invalid usage flag
[Check 9] Test psa_aead_decrypt - Invalid plaintext_size
[Check 10] Test psa_aead_decrypt - Invalid nonce
[Check 11] Test psa_aead_decrypt - Invalid cihpertext
[Check 12] Test psa_aead_decrypt - Invalid cihpertext_size
[Check 13] Test psa_aead_decrypt - Invalid tag length 0
TEST RESULT: PASSED
******************************************
TEST: 226 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_sign_setup - HMAC - SHA256
[Check 2] Test psa_mac_sign_setup - CMAC - AES
[Check 3] Test psa_mac_sign_setup - Incompatible HMAC for CMAC
[Check 4] Test psa_mac_sign_setup - Invalid usage flag
[Check 5] Test psa_mac_sign_setup - Invalid key type
[Check 6] Test psa_mac_sign_setup - Truncated MAC too large
[Check 7] Test psa_mac_sign_setup - Truncated MAC too small
[Check 8] Test psa_mac_sign_setup - Unknown MAC algorithm
[Check 9] Test psa_mac_sign_setup - Bad algorithm (not a MAC algorithm)
[Check 10] Test psa_mac_sign_setup invalid key handle
[Check 11] Test psa_mac_sign_setup zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 227 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_update
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_update - HMAC - SHA256 - 64 Byte
[Check 2] Test psa_mac_update - CMAC - AES - 16 Byte
[Check 3] Test psa_mac_update - HMAC - SHA512 - 32 Byte
[Check 4] Test psa_mac_update - HMAC - SHA512 - Invalid operation state
TEST RESULT: PASSED
******************************************
TEST: 228 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_sign_finish - HMAC - SHA224
[Check 2] Test psa_mac_sign_finish - HMAC - SHA256
[Check 3] Test psa_mac_sign_finish - HMAC - SHA512
[Check 4] Test psa_mac_sign_finish - HMAC - SHA224 - Truncated 8 Byte
[Check 5] Test psa_mac_sign_finish - HMAC - SHA224 - Small output buffer
[Check 6] Test psa_mac_sign_finish - HMAC - SHA224 - Invalid operation state
[Check 7] Test psa_mac_sign_finish - CMAC - AES
TEST RESULT: PASSED
******************************************
TEST: 229 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify_setup - HMAC - SHA256
[Check 2] Test psa_mac_verify_setup - CMAC - AES
[Check 3] Test psa_mac_verify_setup - Incompatible HMAC for CMAC
[Check 4] Test psa_mac_verify_setup - Invalid usage flag
[Check 5] Test psa_mac_verify_setup - Invalid key type
[Check 6] Test psa_mac_verify_setup - Truncated MAC too large
[Check 7] Test psa_mac_verify_setup - Truncated MAC too small
[Check 8] Test psa_mac_verify_setup - Unknown MAC algorithm
[Check 9] Test psa_mac_verify_setup - Bad algorithm (not a MAC algorithm)
[Check 10] Test psa_mac_verify_setup invalid key handle
[Check 11] Test psa_mac_verify_setup zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 230 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify_finish - HMAC - SHA224
[Check 2] Test psa_mac_verify_finish - HMAC - SHA256
[Check 3] Test psa_mac_verify_finish - HMAC - SHA512
[Check 4] Test psa_mac_verify_finish - HMAC - SHA224 - Truncated 8 Byte
[Check 5] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid mac length
[Check 6] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid expected mac
[Check 7] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid operation state
[Check 8] Test psa_mac_verify_finish - CMAC - AES
TEST RESULT: PASSED
******************************************
TEST: 231 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_abort - HMAC - SHA224
[Check 2] Test psa_mac_abort - HMAC - SHA224 - Truncated 8 Byte
[Check 3] Test psa_mac_abort - HMAC - SHA256
[Check 4] Test psa_mac_abort - HMAC - SHA512
[Check 5] Test psa_mac_abort - CMAC - AES
[Check 6] Test psa_mac_sign_finish after calling psa_mac_abort
TEST RESULT: PASSED
******************************************
TEST: 232 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_encrypt_setup 16 Byte AES
[Check 2] Test psa_cipher_encrypt_setup 24 Byte AES
[Check 3] Test psa_cipher_encrypt_setup 32 Byte AES
[Check 4] Test psa_cipher_encrypt_setup DES 64 bit key
[Check 5] Test psa_cipher_encrypt_setup Triple DES 2-Key
[Check 6] Test psa_cipher_encrypt_setup Triple DES 3-Key
[Check 7] Test psa_cipher_encrypt_setup 16 Byte raw data
[Check 8] Test psa_cipher_encrypt_setup - not a cipher algorithm
[Check 9] Test psa_cipher_encrypt_setup - unknown cipher algorithm
[Check 10] Test psa_cipher_encrypt_setup - incompatible key ARC4
[Check 11] Test psa_cipher_encrypt_setup - incorrect usage
[Check 12] Test psa_cipher_encrypt_setup - RSA public key
[Check 13] Test psa_cipher_encrypt_setup - RSA keypair
[Check 14] Test psa_cipher_encrypt_setup - EC Public key
[Check 15] Test psa_cipher_encrypt_setup - EC keypair
[Check 16] Test psa_cipher_encrypt_setup - Invalid key handle
[Check 17] Test psa_cipher_encrypt_setup - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 233 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_decrypt_setup 16 Byte AES
[Check 2] Test psa_cipher_decrypt_setup 24 Byte AES
[Check 3] Test psa_cipher_decrypt_setup 32 Byte AES
[Check 4] Test psa_cipher_decrypt_setup DES 64 bit key
[Check 5] Test psa_cipher_decrypt_setup Triple DES 2-Key
[Check 6] Test psa_cipher_decrypt_setup Triple DES 3-Key
[Check 7] Test psa_cipher_decrypt_setup 16 Byte raw data
[Check 8] Test psa_cipher_decrypt_setup - not a cipher algorithm
[Check 9] Test psa_cipher_decrypt_setup - unknown cipher algorithm
[Check 10] Test psa_cipher_decrypt_setup - incompatible key ARC4
[Check 11] Test psa_cipher_decrypt_setup - incorrect usage
[Check 12] Test psa_cipher_decrypt_setup - RSA public key
[Check 13] Test psa_cipher_decrypt_setup - RSA keypair
[Check 14] Test psa_cipher_decrypt_setup - EC Public key
[Check 15] Test psa_cipher_decrypt_setup - EC keypair
[Check 16] Test psa_cipher_decrypt_setup - Invalid key handle
[Check 17] Test psa_cipher_decrypt_setup - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 234 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_generate_iv
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_generate_iv 16 Byte AES
[Check 2] Test psa_cipher_generate_iv 24 Byte AES
[Check 3] Test psa_cipher_generate_iv 32 Byte AES
[Check 4] Test psa_cipher_generate_iv DES 64 bit key
[Check 5] Test psa_cipher_generate_iv DES 2-Key
[Check 6] Test psa_cipher_generate_iv DES 3-Key
[Check 7] Test psa_cipher_generate_iv AES - small iv buffer
[Check 8] Test psa_cipher_generate_iv DES - small iv buffer
TEST RESULT: PASSED
******************************************
TEST: 235 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_set_iv
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_set_iv 16 Byte AES
[Check 2] Test psa_cipher_set_iv 24 Byte AES
[Check 3] Test psa_cipher_set_iv 32 Byte AES
[Check 4] Test psa_cipher_set_iv DES 64 bit key
[Check 5] Test psa_cipher_set_iv DES 2-Key
[Check 6] Test psa_cipher_set_iv DES 3-Key
[Check 7] Test psa_cipher_set_iv AES - small iv buffer
[Check 8] Test psa_cipher_set_iv DES - small iv buffer
[Check 9] Test psa_cipher_set_iv AES - large iv buffer
[Check 10] Test psa_cipher_set_iv DES - large iv buffer
TEST RESULT: PASSED
******************************************
TEST: 236 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_update
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING (Short in)
[Check 3] Test psa_cipher_update - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_update - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_update - Encrypt - AES CTR
[Check 6] Test psa_cipher_update - Encrypt - DES CBC (nopad)
[Check 7] Test psa_cipher_update - Encrypt - 2-key 3DE -CBC (nopad)
[Check 8] Test psa_cipher_update - Encrypt - 3-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_update - Encrypt - small output buffer size
[Check 10] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING
[Check 11] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING (Short in)
[Check 12] Test psa_cipher_update - Decrypt - AES CBC_PKCS7
[Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7 (Short input)
[Check 14] Test psa_cipher_update - Decrypt - AES CTR
[Check 15] Test psa_cipher_update - Decrypt - DES CBC (nopad)
[Check 16] Test psa_cipher_update - Decrypt - 2-key 3DE -CBC (nopad)
[Check 17] Test psa_cipher_update - Decrypt - 3-key 3DE -CBC (nopad)
[Check 18] Test psa_cipher_update - Decrypt - small output buffer size
[Check 19] Test psa_cipher_update without cipher setup
TEST RESULT: PASSED
******************************************
TEST: 237 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING (Short in)
[Check 3] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_finish - Encrypt - AES CTR
[Check 6] Test psa_cipher_finish - Encrypt - AES CTR (short input)
[Check 7] Test psa_cipher_finish - Encrypt - DES CBC (nopad)
[Check 8] Test psa_cipher_finish - Encrypt - 2-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_finish - Encrypt - 3-key 3DE -CBC (nopad)
[Check 10] Test psa_cipher_finish - Encrypt - small output buffer size
[Check 11] Test psa_cipher_finish - Decrypt - AES CBC_NO_PADDING
[Check 12] Test psa_cipher_finish - Decrypt - AES CBC_NO_PADDING (Short in)
[Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7
[Check 14] Test psa_cipher_finish - Decrypt - AES CBC_PKCS7 (Short input)
[Check 15] Test psa_cipher_finish - Decrypt - AES CTR
[Check 16] Test psa_cipher_finish - Decrypt - AES CTR (short input)
[Check 17] Test psa_cipher_finish - Decrypt - DES CBC (nopad)
[Check 18] Test psa_cipher_finish - Decrypt - 2-key 3DE -CBC (nopad)
[Check 19] Test psa_cipher_finish - Decrypt - 3-key 3DE -CBC (nopad)
TEST RESULT: PASSED
******************************************
TEST: 238 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_abort - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_abort - Encrypt - AES CBC_PKCS7
[Check 3] Test psa_cipher_abort - Encrypt - AES CTR
[Check 4] Test psa_cipher_abort - Encrypt - DES CBC (nopad)
[Check 5] Test psa_cipher_abort - Encrypt - 2-key 3DE -CBC (nopad)
[Check 6] Test psa_cipher_abort - Encrypt - 3-key 3DE -CBC (nopad)
[Check 7] Test psa_cipher_abort - Decrypt - AES CBC_NO_PADDING
[Check 8] Test psa_cipher_abort - Decrypt - AES CBC_PKCS7
[Check 9] Test psa_cipher_abort - Decrypt - AES CTR
[Check 10] Test psa_cipher_abort - Decrypt - DES CBC (nopad)
[Check 11] Test psa_cipher_abort - Decrypt - 2-key 3DE -CBC (nopad)
[Check 12] Test psa_cipher_abort - Decrypt - 3-key 3DE -CBC (nopad)
[Check 13] Test psa_cipher_update after psa_cipher_abort should fail
TEST RESULT: PASSED
******************************************
TEST: 239 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_asymmetric_encrypt - RSA PKCS1V15
[Check 2] Test psa_asymmetric_encrypt - RSA KEY_PAIR PKCS1V15
[Check 3] Test psa_asymmetric_encrypt - RSA OAEP SHA256
[Check 4] Test psa_asymmetric_encrypt - RSA OAEP SHA256 with label
[Check 5] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256
[Check 6] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256 with label
[Check 7] Test psa_asymmetric_encrypt - Small output buffer
[Check 8] Test psa_asymmetric_encrypt - Invalid algorithm
[Check 9] Test psa_asymmetric_encrypt - Invalid key type
[Check 10] Test psa_asymmetric_encrypt - Invalid usage
[Check 11] Test psa_asymmetric_encrypt - RSA PKCS1V15 - Salt
[Check 12] Test psa_asymmetric_encrypt - ECC public key
[Check 13] Test psa_asymmetric_encrypt - Invalid key handle
[Check 14] Test psa_asymmetric_encrypt - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 240 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_asymmetric_decrypt - RSA KEY_PAIR PKCS1V15
[Check 2] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256
[Check 3] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256 with label
[Check 4] Test psa_asymmetric_decrypt - Invalid key type (RSA public key)
[Check 5] Test psa_asymmetric_decrypt - Small output buffer
[Check 6] Test psa_asymmetric_decrypt - Invalid algorithm
[Check 7] Test psa_asymmetric_decrypt - Invalid key type (AES Key)
[Check 8] Test psa_asymmetric_decrypt - Invalid usage
[Check 9] Test psa_asymmetric_decrypt - RSA PKCS1V15 - Salt
[Check 10] Test psa_asymmetric_decrypt - Invalid key handle
[Check 11] Test psa_asymmetric_decrypt - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 241 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_sign_hash
[Info] Executing tests from non-secure
[Check 1] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 3] Test psa_sign_hash - ECDSA SECP256R1 SHA-256
[Check 4] Test psa_sign_hash - Invalid key type (RSA public key)
[Check 5] Test psa_sign_hash - Small output buffer
[Check 6] Test psa_sign_hash - Invalid algorithm
[Check 7] Test psa_sign_hash - Invalid key type (AES Key)
[Check 8] Test psa_sign_hash - Invalid usage
[Check 9] Test psa_sign_hash - Wrong hash size
[Check 10] Test psa_sign_hash - Invalid key handle
[Check 11] Test psa_sign_hash - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 242 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_verify_hash
[Info] Executing tests from non-secure
[Check 1] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 3] Test psa_verify_hash - ECDSA KEY_PAIR SECP256R1 SHA-256
[Check 4] Test psa_verify_hash - EC public key
[Check 5] Test psa_verify_hash - RSA public key
[Check 6] Test psa_verify_hash - Small output buffer
[Check 7] Test psa_verify_hash - Invalid algorithm
[Check 8] Test psa_verify_hash - Invalid key type (AES Key)
[Check 9] Test psa_verify_hash - Invalid usage
[Check 10] Test psa_verify_hash - Wrong hash size
[Check 11] Test psa_verify_hash - Wrong signature
[Check 12] Test psa_verify_hash - Wrong signature size
[Check 13] Test psa_verify_hash - Invalid key handle
[Check 14] Test psa_verify_hash - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 243 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_raw_key_agreement
[Info] Executing tests from non-secure
[Check 1] Test psa_raw_key_agreement - ECDH SECP256R1
[Check 2] Test psa_raw_key_agreement - Small buffer size
[Check 3] Test psa_raw_key_agreement - ECDH SECP384R1
[Check 4] Test psa_raw_key_agreement - Invalid usage
[Check 5] Test psa_raw_key_agreement - Unknown KDF
[Check 6] Test psa_raw_key_agreement - Not a key agreement alg
[Check 7] Test psa_raw_key_agreement - Public key on different curve
[Check 8] Test psa_raw_key_agreement - Public key instead of private key
[Check 9] Test psa_raw_key_agreement - Invalid key handle
[Check 10] Test psa_raw_key_agreement - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 244 | DESCRIPTION: Testing crypto key management APIs | UT: psa_copy_key
[Info] Executing tests from non-secure
[Check 1] Test psa_copy_key - 2048 RSA public key
[Check 2] Test psa_copy_key - RSA 2048 keypair
[Check 3] Test psa_copy_key - Incompatible target policy(source and target)
[Check 4] Test psa_copy_key - source key with no export usage
[Check 5] Test psa_copy_key - DES 64 bit key
[Check 6] Test psa_copy_key - Triple DES 2-Key
[Check 7] Test psa_copy_key - Triple DES 3-Key
[Check 8] Test psa_copy_key - EC Public key
[Check 9] Test psa_copy_key - EC keypair
TEST RESULT: PASSED
******************************************
TEST: 245 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_clone
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_clone - MD5 algorithm
[Check 2] Test psa_hash_clone - RIPEMD160 algorithm
[Check 3] Test psa_hash_clone - SHA1 algorithm
[Check 4] Test psa_hash_clone - SHA224 algorithm
[Check 5] Test psa_hash_clone - SHA256 algorithm
[Check 6] Test psa_hash_clone - SHA384 algorithm
[Check 7] Test psa_hash_clone - SHA512 algorithm
[Check 8] Test psa_hash_clone - from an inactive source operation
[Check 9] Test psa_hash_clone - on an active target operation
TEST RESULT: PASSED
******************************************
TEST: 246 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_compute
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_compute HMAC SHA 224
[Check 2] Test psa_mac_compute - Incompactible HMAC for CMAC
[Check 3] Test psa_mac_compute - Invalid usage
[Check 4] Test psa_mac_compute - truncated MAC too small
[Check 5] Test psa_mac_compute - truncated MAC too large
[Check 6] Test psa_mac_compute - bad algorithm (unknown MAC algorithm)
[Check 7] Test psa_mac_compute HMAC SHA 256
[Check 8] Test psa_mac_compute HMAC SHA 512
[Check 9] Test psa_mac_compute HMAC SHA 224 (truncated to 8 Byte)
[Check 10] Test psa_mac_compute CMAC AES 128
[Check 11] Test psa_mac_compute small size buffer
[Check 12] Test psa_mac_compute - Invalid key type
TEST RESULT: PASSED
******************************************
TEST: 247 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify HMAC SHA 224
[Check 2] Test psa_mac_verify HMAC SHA 256
[Check 3] Test psa_mac_verify - Incompactible HMAC for CMAC
[Check 4] Test psa_mac_verify - Invalid usage
[Check 5] Test psa_mac_verify - Truncated MAC too large
[Check 6] Test psa_mac_verify - Truncated MAC too small
[Check 7] Test psa_mac_verify - bad algorithm (unknown MAC algorithm)
[Check 8] Test psa_mac_verify HMAC SHA 512
[Check 9] Test psa_mac_verify HMAC SHA 224 (truncated to 8 Byte)
[Check 10] Test psa_mac_verify CMAC AES 128
[Check 11] Test psa_mac_verify - Invalid key type
[Check 12] Test psa_mac_verify small size buffer
[Check 13] Test psa_mac_verify incorrect expected MAC
TEST RESULT: PASSED
******************************************
TEST: 248 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING (Short input)
[Check 3] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_encrypt - Encrypt - AES CTR
[Check 6] Test psa_cipher_encrypt - Encrypt - AES CTR (short input)
[Check 7] Test psa_cipher_encrypt - Encrypt - DES CBC (nopad)
[Check 8] Test psa_cipher_encrypt - Encrypt - 2-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_encrypt - Encrypt - 3-key 3DE -CBC (nopad)
[Check 10] Test psa_cipher_encrypt - small output buffer size
[Check 11] Test psa_cipher_encrypt - Decrypt - AES CBC_NO_PADDING
TEST RESULT: PASSED
******************************************
TEST: 249 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_decrypt - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING
[Check 3] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING (Short input)
[Check 4] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING
[Check 5] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7
[Check 6] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7 (Short input)
[Check 7] Test psa_cipher_decrypt - Decrypt - AES CTR
[Check 8] Test psa_cipher_decrypt - Decrypt - DES CBC (nopad)
[Check 9] Test psa_cipher_decrypt - Decrypt - 2-key 3DE -CBC (nopad)
[Check 10] Test psa_cipher_decrypt - 3-key 3DE -CBC (nopad)
TEST RESULT: PASSED
******************************************
TEST: 250 | DESCRIPTION: Testing crypto key management APIs | UT: psa_sign_message
[Info] Executing tests from non-secure
[Check 1] Test psa_sign_message - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_sign_message - ECDSA SECP256R1 SHA-256
[Check 3] Test psa_sign_message - Invalid key type (RSA public key)
[Check 4] Test psa_sign_message - Small output buffer
[Check 5] Test psa_sign_message - Invalid algorithm
[Check 6] Test psa_sign_message - Invalid key type (AES Key)
[Check 7] Test psa_sign_message - Invalid usage
[Check 8] Test psa_sign_message - Mismatch key type and Algorithm
[Check 9] Test psa_sign_message - Alg mismatch in key and API call
[Check 10] Test psa_sign_message - Invalid key handle
[Check 11] Test psa_sign_message - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 251 | DESCRIPTION: Testing crypto key management APIs | UT: psa_verify_message
[Info] Executing tests from non-secure
[Check 1] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_verify_message - RSA Public Key PKCS1V15 RAW
[Check 3] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 4] Test psa_verify_message - ECDSA KEY_PAIR SECP256R1 SHA-256
[Check 5] Test psa_verify_message - ECDSA Public Key SECP256R1 SHA-256
[Check 6] Test psa_verify_message - Small output buffer
[Check 7] Test psa_verify_message - Invalid algorithm
[Check 8] Test psa_verify_message - Invalid key type (AES Key)
[Check 9] Test psa_verify_message - Invalid usage
[Check 10] Test psa_verify_message - Wrong message size
[Check 11] Test psa_verify_message - Wrong signature
[Check 12] Test psa_verify_message - Wrong signature size
[Check 13] Test psa_verify_message - Invalid key handle
[Check 14] Test psa_verify_message - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 252 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_encrypt_setup - CCM - AES
[Check 2] Test psa_aead_encrypt_setup - CCM - AES - Tag length = 4
[Check 3] Test psa_aead_encrypt_setup - CCM - AES - Mismatched tag length
[Check 4] Test psa_aead_encrypt_setup - CCM - AES - Default Tag length
[Check 5] Test psa_aead_encrypt_setup - GCM - AES
[Check 6] Test psa_aead_encrypt_setup - CCM - DES Invalid key
[Check 7] Test psa_aead_encrypt_setup - Invalid usage flag
TEST RESULT: PASSED
******************************************
TEST: 253 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_decrypt_setup - CCM - AES
[Check 2] Test psa_aead_decrypt_setup - CCM - AES - Tag length = 4
[Check 3] Test psa_aead_decrypt_setup - CCM - AES - Mismatched tag length
[Check 4] Test psa_aead_decrypt_setup - CCM - AES - Default Tag length
[Check 5] Test psa_aead_decrypt_setup - GCM - AES
[Check 6] Test psa_aead_decrypt_setup - CCM - DES Invalid key
[Check 7] Test psa_aead_decrypt_setup - Invalid usage flag
TEST RESULT: PASSED
******************************************
TEST: 254 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_generate_nonce
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_generate_nonce - CCM
[Check 2] Test psa_aead_generate_nonce - CCM - Tag length = 4
[Check 3] Test psa_aead_generate_nonce - CCM - Small buffer size
[Check 4] Test psa_aead_generate_nonce - CCM - Uninitialized operation
[Check 5] Test psa_aead_generate_nonce - CCM - Decrypt operation
[Check 6] Test psa_aead_generate_nonce - GCM
[Check 7] Test psa_aead_generate_nonce - GCM - Decrypt operation
TEST RESULT: PASSED
******************************************
TEST: 255 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_nonce
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_set_nonce - Encrypt - CCM
[Check 2] Test psa_aead_set_nonce - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_set_nonce - Encrypt - CCM - Small nonce size
[Check 4] Test psa_aead_set_nonce - Encrypt - CCM - Large nonce size
[Check 5] Test psa_aead_set_nonce - Encrypt - CCM - Invalid operation state
[Check 6] Test psa_aead_set_nonce - Encrypt - GCM
[Check 7] Test psa_aead_set_nonce - Decrypt - CCM
[Check 8] Test psa_aead_set_nonce - Decrypt - CCM - Tag length = 4
[Check 9] Test psa_aead_set_nonce - Decrypt - CCM - Small nonce size
[Check 10] Test psa_aead_set_nonce - Decrypt - CCM - Large nonce size
[Check 11] Test psa_aead_set_nonce - Decrypt - CCM - Invalid operation state
[Check 12] Test psa_aead_set_nonce - Decrypt - GCM
TEST RESULT: PASSED
******************************************
TEST: 256 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_lengths
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_set_lengths - Encrypt - CCM
[Check 2] Test psa_aead_set_lengths - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_set_lengths - Encrypt - CCM - Zero ad_length
[Check 4] Test psa_aead_set_lengths - Encrypt - CCM - Zero plaintext_length
[Check 5] Test psa_aead_set_lengths - Encrypt - CCM - Invalid operation state
[Check 6] Test psa_aead_set_lengths - Encrypt - GCM
[Check 7] Test psa_aead_set_lengths - Decrypt - CCM
[Check 8] Test psa_aead_set_lengths - Decrypt - CCM - Tag length = 4
[Check 9] Test psa_aead_set_lengths - Decrypt - CCM - Zero ad_length
[Check 10] Test psa_aead_set_lengths - Decrypt - CCM - Zero plaintext_length
[Check 11] Test psa_aead_set_lengths - Decrypt - CCM - Invalid operation state
[Check 12] Test psa_aead_set_lengths - Decrypt - GCM
TEST RESULT: PASSED
******************************************
TEST: 257 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update_ad
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_update_ad - Encrypt - CCM
[Check 2] Test psa_aead_update_ad - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_update_ad - Encrypt - CCM - Zero ad_length
[Check 4] Test psa_aead_update_ad - Encrypt - CCM - Zero plaintext_length
[Check 5] Test psa_aead_update_ad - Encrypt - CCM - Invalid operation state
[Check 6] Test psa_aead_update_ad - Encrypt - CCM - Overflow input length
[Check 7] Test psa_aead_update_ad - Decrypt - CCM
[Check 8] Test psa_aead_update_ad - Decrypt - CCM - Tag length = 4
[Check 9] Test psa_aead_update_ad - Decrypt - CCM - Zero ad_length
[Check 10] Test psa_aead_update_ad - Decrypt - CCM - Zero plaintext_length
[Check 11] Test psa_aead_update_ad - Decrypt - CCM - Invalid operation state
[Check 12] Test psa_aead_update_ad - Decrypt - CCM - Overflow input length
TEST RESULT: PASSED
******************************************
TEST: 258 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_update - Encrypt - CCM
[Check 2] Test psa_aead_update - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_update - Encrypt - CCM - Zero ad_length
[Check 4] Test psa_aead_update - Encrypt - CCM - Zero plaintext_length
[Check 5] Test psa_aead_update - Encrypt - CCM - Small buffer size
[Check 6] Test psa_aead_update - Encrypt - CCM - Less add data than specified
[Check 7] Test psa_aead_update - Encrypt - CCM - Overflow input length
[Check 8] Test psa_aead_update - Encrypt - CCM - Invalid operation state
[Check 9] Test psa_aead_update - Decrypt - CCM
[Check 10] Test psa_aead_update - Decrypt - CCM - Tag length = 4
[Check 11] Test psa_aead_update - Decrypt - CCM - Zero ad_length
[Check 12] Test psa_aead_update - Decrypt - CCM - Zero plaintext_length
[Check 13] Test psa_aead_update - Decrypt - CCM - Small buffer size
[Check 14] Test psa_aead_update - Decrypt - Less add data than specified
[Check 15] Test psa_aead_update - Decrypt - CCM - Overflow input length
[Check 16] Test psa_aead_update - Decrypt - CCM - Invalid operation state
TEST RESULT: PASSED
******************************************
TEST: 259 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_finish - AES-CCM
[Check 2] Test psa_aead_finish - AES-CCM 24 bytes Tag length = 4
[Check 3] Test psa_aead_finish - Small buffer size
[Check 4] Test psa_aead_finish - Input length is less than plaintext length
[Check 5] Test psa_aead_finish - GCM - 16B AES - 12B Nonce & 12B additional data
TEST RESULT: PASSED
******************************************
TEST: 260 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_abort - Encrypt - CCM - AES
[Check 2] Test psa_aead_abort - Encrypt - GCM - AES
[Check 3] Test psa_aead_abort - Decrypt - CCM - AES
[Check 4] Test psa_aead_abort - Decrypt - GCM - AES
[Check 5] Test psa_aead_abort with all initializations
TEST RESULT: PASSED
******************************************
TEST: 261 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_verify - AES-CCM
[Check 2] Test psa_aead_verify - AES-CCM 24 bytes Tag length = 4
[Check 3] Test psa_aead_verify - Small buffer size
[Check 4] Test psa_aead_verify - Input length is less than plaintext length
[Check 5] Test psa_aead_verify - GCM - 16B AES - 12B Nounce & 12B addi data
TEST RESULT: PASSED
******************************************
************ Crypto Suite Report **********
TOTAL TESTS : 61
TOTAL PASSED : 61
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
Entering standby..
```
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-iat-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Attestation Suite
******************************************
TEST: 601 | DESCRIPTION: Testing attestation initial attestation APIs | UT: psa_initial_attestation
[Info] Executing tests from non-secure
[Check 1] Test psa_initial_attestation_get_token with Challenge 32
[Check 2] Test psa_initial_attestation_get_token with Challenge 48
[Check 3] Test psa_initial_attestation_get_token with Challenge 64
[Check 4] Test psa_initial_attestation_get_token with zero challenge size
[Check 5] Test psa_initial_attestation_get_token with small challenge size
[Check 6] Test psa_initial_attestation_get_token with invalid challenge size
[Check 7] Test psa_initial_attestation_get_token with large challenge size
[Check 8] Test psa_initial_attestation_get_token with zero as token size
[Check 9] Test psa_initial_attestation_get_token with small token size
[Check 10] Test psa_initial_attestation_get_token_size with Challenge 32
[Check 11] Test psa_initial_attestation_get_token_size with Challenge 48
[Check 12] Test psa_initial_attestation_get_token_size with Challenge 64
[Check 13] Test psa_initial_attestation_get_token_size with zero challenge size
[Check 14] Test psa_initial_attestation_get_token_size with small challenge size
[Check 15] Test psa_initial_attestation_get_token_size with invalid challenge size
[Check 16] Test psa_initial_attestation_get_token_size with large challenge size
TEST RESULT: PASSED
******************************************
************ Attestation Suite Report **********
TOTAL TESTS : 1
TOTAL PASSED : 1
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
Entering standby..
```
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-its-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Storage Suite
******************************************
TEST: 401 | DESCRIPTION: UID not found check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call get API for UID 6 which is not set
[Check 2] Call get_info API for UID 6 which is not set
[Check 3] Call remove API for UID 6 which is not set
[Check 4] Call get API for UID 6 which is removed
[Check 5] Call get_info API for UID 6 which is removed
[Check 6] Call remove API for UID 6 which is removed
Set storage for UID 6
[Check 7] Call get API for different UID 5
[Check 8] Call get_info API for different UID 5
[Check 9] Call remove API for different UID 5
TEST RESULT: PASSED
******************************************
TEST: 402 | DESCRIPTION: Write once error check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Update the flag of UID 1 with WRITE_ONCE flag
[Check 2] Try to remove the UID 1 having WRITE_ONCE flag
[Check 3] Create a new UID 2 with WRITE_ONCE flag
[Check 4] Try to remove the UID 2 having WRITE_ONCE flag
[Check 5] Try to change the length of write_once UID 2
[Check 6] Check UID removal still fails
[Check 7] Try to change the WRITE_ONCE flag to None for UID 2
[Check 8] Check UID removal still fails
TEST RESULT: PASSED
******************************************
TEST: 403 | DESCRIPTION: Insufficient space check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Overload storage space
UID 13 set failed due to insufficient space
Remove all registered UIDs
[Check 2] Overload storage again to verify all previous UID removed
UID 13 set failed due to insufficient space
Remove all registered UIDs
TEST RESULT: PASSED
******************************************
TEST: 404 | DESCRIPTION: Data Consistency check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2
[Check 2] Call get API with default length - TEST_BUFF_SIZE
TEST RESULT: PASSED
******************************************
TEST: 405 | DESCRIPTION: Success scenarios check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Set UID with data length zero and call storage APIs
[Check 2] Resetting the length check
TEST RESULT: PASSED
******************************************
TEST: 406 | DESCRIPTION: Check for storage create flags | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE
[Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY
[Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION
TEST RESULT: PASSED
******************************************
TEST: 407 | DESCRIPTION: Incorrect Size check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
Create a valid Storage - TEST_BUFF_SIZE/2
Increase the length of storage - TEST_BUFF_SIZE
[Check 1] Call get API with old length - TEST_BUFF_SIZE/2
[Check 2] Call get API with old length - TEST_BUFF_SIZE/4
Decrease the length of storage - TEST_BUFF_SIZE/4
[Check 3] Call get API with old length - TEST_BUFF_SIZE/2
[Check 4] Call get API with old length - TEST_BUFF_SIZE
[Check 5] Call get API with valid length - TEST_BUFF_SIZE/4
TEST RESULT: PASSED
******************************************
TEST: 408 | DESCRIPTION: Invalid offset check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Try to access data with varying valid offset
[Check 2] Try to access data with varying invalid offset
TEST RESULT: PASSED
******************************************
TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call set API with NULL pointer and data length 0
[Check 2] Call get API with NULL read buffer and data length 0
[Check 3] Remove the UID
[Check 4] Call get_info API to verify UID removed
[Check 5] Create UID with zero data_len and valid write buffer
[Check 8] Call get API with NULL read buffer and data length 0
[Check 9] Increase the length
TEST RESULT: PASSED
******************************************
TEST: 410 | DESCRIPTION: UID value zero check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Creating storage with UID 0 should fail
[Check 2] Get_info for UID 0 should fail
[Check 3] Removing storage with UID 0 should fail
TEST RESULT: PASSED
******************************************
************ Storage Suite Report **********
TOTAL TESTS : 10
TOTAL PASSED : 10
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
Entering standby..
```
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-ps-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Storage Suite
******************************************
TEST: 401 | DESCRIPTION: UID not found check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call get API for UID 6 which is not set
[Check 2] Call get_info API for UID 6 which is not set
[Check 3] Call remove API for UID 6 which is not set
[Check 4] Call get API for UID 6 which is removed
[Check 5] Call get_info API for UID 6 which is removed
[Check 6] Call remove API for UID 6 which is removed
Set storage for UID 6
[Check 7] Call get API for different UID 5
[Check 8] Call get_info API for different UID 5
[Check 9] Call remove API for different UID 5
TEST RESULT: PASSED
******************************************
TEST: 402 | DESCRIPTION: Write once error check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Update the flag of UID 1 with WRITE_ONCE flag
[Check 2] Try to remove the UID 1 having WRITE_ONCE flag
[Check 3] Create a new UID 2 with WRITE_ONCE flag
[Check 4] Try to remove the UID 2 having WRITE_ONCE flag
[Check 5] Try to change the length of write_once UID 2
[Check 6] Check UID removal still fails
[Check 7] Try to change the WRITE_ONCE flag to None for UID 2
[Check 8] Check UID removal still fails
TEST RESULT: PASSED
******************************************
TEST: 403 | DESCRIPTION: Insufficient space check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Overload storage space
UID 13 set failed due to insufficient space
Remove all registered UIDs
[Check 2] Overload storage again to verify all previous UID removed
UID 13 set failed due to insufficient space
Remove all registered UIDs
TEST RESULT: PASSED
******************************************
TEST: 404 | DESCRIPTION: Data Consistency check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2
[ 32.304821] random: crng init done
[Check 2] Call get API with default length - TEST_BUFF_SIZE
TEST RESULT: PASSED
******************************************
TEST: 405 | DESCRIPTION: Success scenarios check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Set UID with data length zero and call storage APIs
[Check 2] Resetting the length check
TEST RESULT: PASSED
******************************************
TEST: 406 | DESCRIPTION: Check for storage create flags | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE
[Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY
[Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION
TEST RESULT: PASSED
******************************************
TEST: 407 | DESCRIPTION: Incorrect Size check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Create a valid Storage - TEST_BUFF_SIZE/2
Increase the length of storage - TEST_BUFF_SIZE
[Check 1] Call get API with old length - TEST_BUFF_SIZE/2
[Check 2] Call get API with old length - TEST_BUFF_SIZE/4
Decrease the length of storage - TEST_BUFF_SIZE/4
[Check 3] Call get API with old length - TEST_BUFF_SIZE/2
[Check 4] Call get API with old length - TEST_BUFF_SIZE
[Check 5] Call get API with valid length - TEST_BUFF_SIZE/4
TEST RESULT: PASSED
******************************************
TEST: 408 | DESCRIPTION: Invalid offset check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Try to access data with varying valid offset
[Check 2] Try to access data with varying invalid offset
TEST RESULT: PASSED
******************************************
TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call set API with NULL pointer and data length 0
[Check 2] Call get API with NULL read buffer and data length 0
[Check 3] Remove the UID
[Check 4] Call get_info API to verify UID removed
[Check 5] Create UID with zero data_len and valid write buffer
[Check 8] Call get API with NULL read buffer and data length 0
[Check 9] Increase the length
TEST RESULT: PASSED
******************************************
TEST: 410 | DESCRIPTION: UID value zero check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Creating storage with UID 0 should fail
[Check 2] Get_info for UID 0 should fail
[Check 3] Removing storage with UID 0 should fail
TEST RESULT: PASSED
******************************************
TEST: 411 | DESCRIPTION: Optional APIs: UID not found check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 412 | DESCRIPTION: Optional APIs: Invalid arguments and offset invalid | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 413 | DESCRIPTION: Set_Extended and Create api : Success | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 414 | DESCRIPTION: Optional APIs not supported check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Optional PS APIs are not supported.
[Check 1] Call to create API should fail as API not supported
Failed at Checkpoint: 1
Actual: 0
Expected: -134
TEST RESULT: FAILED (Error Code=0x1)
******************************************
TEST: 415 | DESCRIPTION: Create API write_once flag value check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 416 | DESCRIPTION: Storage assest capacity modification check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs not are supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 417 | DESCRIPTION: Storage assest capacity modification check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs not are supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
************ Storage Suite Report **********
TOTAL TESTS : 17
TOTAL PASSED : 10
TOTAL SIM ERROR : 0
TOTAL FAILED : 1
TOTAL SKIPPED : 6
******************************************
Entering standby..
```
**Component test (linux-pc)**
```lines=12
#
LD_PRELOAD=trusted-services/tools/b-test/install/linux-pc/lib/libts.so
o trusted-services/tools/b-test/install/linux-pc/bin/component-test -v
TEST(BlockVolumeTests, oversizeWrite) - 0 ms
TEST(BlockVolumeTests, multipleImageInstall) - 0 ms
TEST(BlockVolumeTests, seekAccess) - 0 ms
TEST(BlockVolumeTests, readAndWrite) - 0 ms
TEST(BlockVolumeTests, openClose) - 0 ms
IGNORE_TEST(PartitionTableTests, detectCorruptedGptHeader) - 0 ms
TEST(PartitionTableTests, detectCorruptedMbr) - 2 ms
TEST(PartitionTableTests, loadRefPartitionTable) - 1 ms
TEST(GptIteratorTests, iterateOverRefGpt) - 0 ms
TEST(UefiVariableStoreTests, noRemoveCheck) - 0 ms
TEST(UefiVariableStoreTests, readOnlycheck) - 0 ms
TEST(UefiVariableStoreTests, unsupportedAttribute) - 0 ms
TEST(UefiVariableStoreTests, failedNvSet) - 0 ms
TEST(UefiVariableStoreTests, enumerateStoreContents) - 0 ms
TEST(UefiVariableStoreTests, runtimeAccess) - 0 ms
TEST(UefiVariableStoreTests, bootServiceAccess) - 0 ms
TEST(UefiVariableStoreTests, removePersistent) - 0 ms
TEST(UefiVariableStoreTests, removeVolatile) - 0 ms
TEST(UefiVariableStoreTests, getWithSmallBuffer) - 0 ms
TEST(UefiVariableStoreTests, persistentSetGet) - 0 ms
TEST(UefiVariableStoreTests, setGetRoundtrip) - 0 ms
TEST(UefiVariableIndexTests, setCheckConstraintsNonExistingVar) - 0 ms
TEST(UefiVariableIndexTests, setCheckConstraintsExistingVar) - 0 ms
TEST(UefiVariableIndexTests, checkIterator) - 0 ms
TEST(UefiVariableIndexTests, removeVariable) - 0 ms
TEST(UefiVariableIndexTests, dumpBufferTooSmall) - 0 ms
TEST(UefiVariableIndexTests, dumpLoadRoadtrip) - 0 ms
TEST(UefiVariableIndexTests, enumerateStore) - 0 ms
TEST(UefiVariableIndexTests, variableIndexFull) - 0 ms
TEST(UefiVariableIndexTests, addWithOversizedName) - 0 ms
TEST(UefiVariableIndexTests, emptyIndexOperations) - 0 ms
TEST(SfsBlockStoreTests, psCreateAndSetExtended) - 0 ms
TEST(SfsBlockStoreTests, psCreateAndSet) - 0 ms
TEST(SfsBlockStoreTests, itsStorageLimitTest) - 0 ms
TEST(SfsBlockStoreTests, itsStoreNewItem) - 0 ms
TEST(SfsRamTests, psCreateAndSetExtended) - 0 ms
TEST(SfsRamTests, psCreateAndSet) - 0 ms
TEST(SfsRamTests, itsStorageLimitTest) - 0 ms
TEST(SfsRamTests, itsStoreNewItem) - 0 ms
TEST(MockStoreTests, psCreateAndSetExtended) - 0 ms
TEST(MockStoreTests, psCreateAndSet) - 0 ms
TEST(MockStoreTests, itsStorageLimitTest) - 0 ms
TEST(MockStoreTests, itsStoreNewItem) - 0 ms
TEST(SecureStorageProxyTests, psCreateAndSetExtended) - 0 ms
TEST(SecureStorageProxyTests, psCreateAndSet) - 0 ms
TEST(SecureStorageProxyTests, itsStorageLimitTest) - 0 ms
TEST(SecureStorageProxyTests, itsStoreNewItem) - 0 ms
TEST(SecureStorageClientTests, psCreateAndSetExtended) - 0 ms
TEST(SecureStorageClientTests, psCreateAndSet) - 0 ms
TEST(SecureStorageClientTests, itsStorageLimitTest) - 0 ms
TEST(SecureStorageClientTests, itsStoreNewItem) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkKeyUsage) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkKeyLifetime) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkAlg) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkDhGroup) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkEccCurve) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkKeyType) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkKeyUsage) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkKeyLifetime) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkAlg) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkDhGroup) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkEccCurve) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkKeyType) - 0 ms
TEST(CryptoProtocolOpcodeChecks, checkPackedcToProtobuf) - 0 ms
TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 2 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 0 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 0 ms
TEST(CryptoMacServicePackedcTests, macAbort) - 0 ms
TEST(CryptoMacServicePackedcTests, signAndVerify) - 0 ms
TEST(CryptoCipherServicePackedcTests, cipherAbort) - 0 ms
TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 0 ms
TEST(CryptoHashServicePackedcTests, hashAbort) - 0 ms
TEST(CryptoHashServicePackedcTests, hashAndVerify) - 0 ms
TEST(CryptoHashServicePackedcTests, calculateHash) - 0 ms
TEST(CryptoServicePackedcTests, generateRandomNumbers) - 0 ms
TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 8 ms
TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 2 ms
TEST(CryptoServicePackedcTests, signAndVerifyEat) - 5 ms
TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 4 ms
TEST(CryptoServicePackedcTests, signAndVerifyHash) - 4 ms
TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 0 ms
TEST(CryptoServicePackedcTests, exportPublicKey) - 1 ms
TEST(CryptoServicePackedcTests, purgeKey) - 0 ms
TEST(CryptoServicePackedcTests, copyKey) - 2 ms
TEST(CryptoServicePackedcTests, generatePersistentKeys) - 0 ms
TEST(CryptoServicePackedcTests, generateVolatileKeys) - 1 ms
TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 0 ms
- 43 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 2 ms
TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 4 ms
TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 4 ms
TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 0 ms
TEST(CryptoServiceProtobufTests, exportPublicKey) - 1 ms
TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 1 ms
TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 0 ms
TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 104 ms
TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 22 ms
TEST(CryptoFaultTests, randomNumbersWithBrokenStorage) - 0 ms
TEST(CryptoFaultTests, persistentKeysWithBrokenStorage) - 0 ms
TEST(CryptoFaultTests, volatileKeyWithBrokenStorage) - 0 ms
TEST(PocCryptoOpTests, checkOpSequence) - 1 ms
TEST(CryptoMsgTests, SignHashOutMsgTest) - 0 ms
TEST(CryptoMsgTests, SignHashInMsgTest) - 0 ms
TEST(CryptoMsgTests, ExportPublicKeyOutMsgTest) - 0 ms
TEST(CryptoMsgTests, ExportPublicKeyInMsgTest) - 0 ms
TEST(CryptoMsgTests, GenerateKeyInMsgTest) - 0 ms
TEST(CryptoContextPoolTests, multipleContexts) - 1 ms
TEST(CryptoContextPoolTests, singleContext) - 0 ms
TEST(CryptoContextPoolTests, checkEmptyPool) - 0 ms
TEST(FwuUpdateFmpTests, wholeFmpFlow) - 0 ms
TEST(FwuOversizeImageTests, oversizeInstallMultiLocationEndStaging) - 1 ms
TEST(FwuOversizeImageTests, oversizeInstallEndStaging) - 0 ms
TEST(FwuOversizeImageTests, oversizeInstallCancelStaging) - 0 ms
TEST(FwuOversizeImageTests, maxSizeInstall) - 0 ms
TEST(FwuRollbackTests, bootloaderFallback) - 0 ms
TEST(FwuRollbackTests, selectPreviousAfterActivation) - 0 ms
TEST(FwuRollbackTests, selectPreviousPriorToActivation) - 1 ms
TEST(FwuPowerFailureTests, powerFailureDuringTrial) - 0 ms
TEST(FwuPowerFailureTests, powerFailureDuringStaging) - 1 ms
TEST(FwuUpdateScenarioTests, partialFirmwareUpdateFlow) - 1 ms
TEST(FwuUpdateScenarioTests, wholeFirmwareUpdateFlow) - 0 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInTrial) - 0 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInStaging) - 0 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInRegular) - 0 ms
TEST(FwuImageDirectoryTests, zeroFwLocations) - 1 ms
TEST(FwuImageDirectoryTests, multipleFwLocations) - 0 ms
TEST(FwuImageDirectoryTests, singleFwLocation) - 0 ms
TEST(FwuImageDirectoryTests, streamRecycling) - 0 ms
TEST(FwuImageDirectoryTests, streamedReads) - 0 ms
TEST(FwuDefaultInstallerFactoryTests, configureInstallersFlow) - 0 ms
TEST(FwuCopyInstallerTests, installAndCopy) - 1 ms
TEST(FwuRawInstallerTests, normalInstallFlow) - 1 ms
TEST(FwuMetadataV2Tests, checkImgBankInfoStructure) - 0 ms
TEST(FwuMetadataV2Tests, checkImgEntryStructure) - 0 ms
TEST(FwuMetadataV2Tests, checkFwStoreDescStructure) - 0 ms
TEST(FwuMetadataV2Tests, checkHeaderStructure) - 0 ms
TEST(FwuMetadataManagerTests, checkAndRepairInaccessibleStorage) - 0 ms
TEST(FwuMetadataManagerTests, checkAndRepairAccessibleStorage) - 1 ms
TEST(PartitionedBlockStoreTests, writeToInvalidBlock) - 0 ms
TEST(PartitionedBlockStoreTests, checkEraseLimits) - 0 ms
TEST(PartitionedBlockStoreTests, writeReadEraseBlock) - 0 ms
TEST(PartitionedBlockStoreTests, openClose) - 0 ms
TEST(PartitionedBlockStoreTests, getPartitionInfo) - 0 ms
TEST(FileBlockStoreTests, initWithExistingDiskImage) - 0 ms
TEST(FileBlockStoreTests, wholeBlockRw) - 1 ms
TEST(RamBlockStoreTests, eraseOperations) - 0 ms
TEST(RamBlockStoreTests, writeToInvalidBlock) - 0 ms
TEST(RamBlockStoreTests, writeBiggerThanBlock) - 0 ms
TEST(RamBlockStoreTests, writeReadEraseBlock) - 0 ms
TEST(RamBlockStoreTests, openClose) - 0 ms
TEST(RamBlockStoreTests, getPartitionInfo) - 0 ms
TEST(AttestationProvisioningTests, provisionedIak) - 0 ms
TEST(AttestationProvisioningTests, selfGeneratedIak) - 1 ms
TEST(AttestationServiceTests, repeatedOperation) - 69 ms
TEST(AttestationServiceTests, invalidChallengeLen) - 0 ms
TEST(AttestationServiceTests, checkTokenSize) - 1 ms
TEST(AttestationReporterTests, createReport) - 3 ms
TEST(TcgEventLogTests, interateBootMeasurements) - 0 ms
TEST(DiscoveryServiceTests, checkServiceInfo) - 0 ms
TEST(ServiceNameTests, readService) - 0 ms
TEST(ServiceNameTests, checkFields) - 0 ms
TEST(ServiceNameTests, checkInvalidServiceNames) - 0 ms
TEST(ServiceNameTests, checkValidServiceNames) - 0 ms
TEST(ServiceFrameworkTests, serviceProviderChain) - 0 ms
TEST(ServiceFrameworkTests, serviceWithOps) - 0 ms
TEST(ServiceFrameworkTests, serviceWithNoOps) - 0 ms
TEST(ffarpc_call_ep, request_deny_64_bit) - 0 ms
TEST(ffarpc_call_ep, request_with_data_after_unshare) - 0 ms
TEST(ffarpc_call_ep, request_with_data_buffer_overflow) - 0 ms
TEST(ffarpc_call_ep, request_with_data) - 0 ms
TEST(ffarpc_call_ep, request_without_data_non_zero_length) - 0 ms
TEST(ffarpc_call_ep, request_without_data) - 0 ms
TEST(ffarpc_call_ep, invalid_mgmt_call) - 0 ms
TEST(ffarpc_call_ep, mem_unshare_null_ep) - 0 ms
TEST(ffarpc_call_ep, mem_share_unshare_relinquish_fail_then_success) - 0 ms
TEST(ffarpc_call_ep, mem_share_unshare_relinquish_fail) - 0 ms
TEST(ffarpc_call_ep, mem_share_unshare) - 0 ms
TEST(ffarpc_call_ep, mem_unshare) - 0 ms
TEST(ffarpc_call_ep, mem_share_null_ep) - 0 ms
TEST(ffarpc_call_ep, mem_share_smaller_page_count_relinquish_fail) - 0 ms
TEST(ffarpc_call_ep, mem_share_smaller_page_count) - 0 ms
TEST(ffarpc_call_ep, mem_share_retrieve_fail) - 0 ms
TEST(ffarpc_call_ep, mem_share_fill_all) - 0 ms
TEST(ffarpc_call_ep, mem_share) - 0 ms
TEST(ffarpc_caller, end) - 0 ms
TEST(ffarpc_caller, end_null_handle) - 0 ms
TEST(ffarpc_caller, end_null_context) - 0 ms
TEST(ffarpc_caller, invoke_without_response) - 1 ms
TEST(ffarpc_caller, invoke_with_response) - 0 ms
TEST(ffarpc_caller, invoke_invalid_resp_len) - 0 ms
TEST(ffarpc_caller, invoke_send_direct_req_fail) - 0 ms
TEST(ffarpc_caller, invoke_resp_long_req) - 0 ms
TEST(ffarpc_caller, invoke_resp_no_begin) - 0 ms
TEST(ffarpc_caller, invoke_resp_len_null) - 0 ms
TEST(ffarpc_caller, invoke_resp_buf_null) - 0 ms
TEST(ffarpc_caller, invoke_opstatus_null) - 0 ms
TEST(ffarpc_caller, invoke_handle_context_diff) - 0 ms
TEST(ffarpc_caller, invoke_null_context) - 0 ms
TEST(ffarpc_caller, begin_without_buffer) - 0 ms
TEST(ffarpc_caller, begin_with_buffer) - 0 ms
TEST(ffarpc_caller, begin_not_opened) - 0 ms
TEST(ffarpc_caller, begin_too_large_req) - 0 ms
TEST(ffarpc_caller, begin_transaction_in_progress) - 0 ms
TEST(ffarpc_caller, begin_null_buffer) - 0 ms
TEST(ffarpc_caller, begin_null_context) - 0 ms
TEST(ffarpc_caller, close_success) - 0 ms
TEST(ffarpc_caller, close_endpoint_and_mem_reclaim_fail) - 0 ms
TEST(ffarpc_caller, close_mem_reclaim_fail) - 0 ms
TEST(ffarpc_caller, close_send_direct_msg_fail) - 0 ms
TEST(ffarpc_caller, close_not_opened) - 0 ms
TEST(ffarpc_caller, open_success) - 0 ms
TEST(ffarpc_caller, open_send_direct_req_rpc_status_fail_reclaim_fail) - 0 ms
TEST(ffarpc_caller, open_send_direct_req_rpc_status_fail) - 0 ms
TEST(ffarpc_caller, open_send_direct_req_fail) - 0 ms
TEST(ffarpc_caller, open_share_fail) - 0 ms
TEST(ffarpc_caller, open_invalid_mem_size) - 0 ms
TEST(ffarpc_caller, open_already_opened) - 0 ms
TEST(ffarpc_caller, discover_more_max_cnt) - 0 ms
TEST(ffarpc_caller, discover_less_max_cnt) - 0 ms
TEST(ffarpc_caller, discover) - 0 ms
TEST(ffarpc_caller, discover_rx_release_fail) - 0 ms
TEST(ffarpc_caller, discover_rx_get_fail) - 0 ms
TEST(ffarpc_caller, discover_partition_info_get_fail) - 0 ms
TEST(ffarpc_caller, discover_invalid_arguments) - 0 ms
TEST(RpcStatusProtocolChecks, checkProtobufRpcStatusCodes) - 0 ms
TEST(ConfigRamstoreTests, checkMultipleConfig) - 0 ms
TEST(ConfigRamstoreTests, checkSingleConfig) - 0 ms
TEST(ConfigRamstoreTests, checkEmptyConfig) - 0 ms
TEST(Crc32Tests, multiPart) - 0 ms
TEST(Crc32Tests, longString) - 0 ms
TEST(Crc32Tests, shortString) - 0 ms
TEST(EndianTests, le64) - 0 ms
TEST(EndianTests, le32) - 0 ms
TEST(EndianTests, le16) - 0 ms
TEST(EndianTests, le8) - 0 ms
TEST(TlvTests, encodeWrongOrder) - 0 ms
TEST(TlvTests, encodeInsufficientSpace) - 0 ms
TEST(TlvTests, encodeRecords) - 0 ms
TEST(TlvTests, decodeBadRecords) - 0 ms
TEST(TlvTests, findAndDecodeMissingOptional) - 0 ms
TEST(TlvTests, findAndDecode) - 0 ms
TEST(TlvTests, decodeGoodRecords) - 0 ms
TEST(UuidTests, roundTrip) - 0 ms
TEST(UuidTests, checkNilUuidOperations) - 0 ms
TEST(UuidTests, checkIsEqualOperation) - 0 ms
TEST(UuidTests, checkOctetsFromCanonical) - 0 ms
TEST(UuidTests, parseValidUuidToGuidOctets) - 0 ms
TEST(UuidTests, parseError) - 0 ms
TEST(UuidTests, parseUuidInUrn) - 0 ms
TEST(UuidTests, parseValidUuidMixedCase) - 0 ms
TEST(UuidTests, parseValidUuidLowerCase) - 0 ms
TEST(TsDemoTests, runTsDemo) - 12 ms
OK (252 tests, 251 ran, 365136 checks, 1 ignored, 0 filtered out, 312 ms)
```
**Platform inspect test (arm-linux)**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/platform-inspect
attestation_report:
challenge: ff c6 73 db 82 96 88 da d9 02 a7 42 90 e4 99 f3 00 b2 d1 4a 86 88 ee 18 74 3e 0f 5f 27 dd cc 41
client_id: 0
boot_seed: a9 91 6f ce 19 d7 3c ec f7 b7 03 74 04 a6 ae b6 48 9d 6d ca 8a fc 86 84 d0 45 17 21 93 22 23 56
security_lifecycle: 0
instance_id: 01 9c d5 b1 3e 0b 88 a9 12 87 c7 1e 52 0d 58 39 92 a7 69 d9 58 bb 8a db 10 15 f0 77 c0 a1 25 63 32
implementation_id: 74 72 75 73 74 65 64 66 69 72 6d 77 61 72 65 2e 6f 72 67 2e 74 73 2e 61 74 74 65 73 74 61 74 69 6f 6e 5f 73 70
sw_components:
type: FW_CONFIG
digest: 5e 10 97 50 c0 cb 32 14 e6 e4 09 f7 12 ba 84 d6 d1 d6 e2 d4 45 8c 52 f3 d2 b9 6e ea 82 d4 e5 47
type: TB_FW_CONFIG
digest: 20 df 7a fd 3c 74 7b 47 b7 22 77 2c 66 f0 ca 61 10 ab 1e 98 b4 f1 ac 1c 54 0f 5b c8 53 b5 92 45
type: BL_2
digest: 84 4b 45 0e df c8 78 63 f8 5f 7f 37 95 b5 73 91 f8 07 b5 3a 01 b4 83 90 72 12 27 40 82 3e 09 9f
type: SECURE_RT_EL3
digest: b9 06 f7 d9 31 ac 69 ae 48 fa 16 7a 54 08 b2 7e 58 6a b7 a7 44 f2 0a d2 6f ca 0a 76 eb 8c 84 73
type: HW_CONFIG
digest: 54 10 fe 53 a5 fe 12 75 dc cc 3a 15 8f d8 34 63 f3 3e 1e 71 7f e3 4c 39 a1 62 4a 90 5c 0a 84 f3
type: SOC_FW_CONFIG
digest: 4e e4 8e 5a e6 50 ed e0 b5 a3 54 8a 1f d6 0e 8a ea 0e 71 75 0e a4 3f 82 76 ce af cd 7c b0 91 e0
type: SECURE_RT_EL1_UNKNOWN
digest: fb 4f 96 e3 7b c0 ca 61 a8 60 6d 70 73 92 7a cd b3 07 72 fc 1c 21 f7 6a 5b d6 6c 72 e5 da 5d ae
type: TOS_FW_CONFIG
digest: ac b0 1f fa 86 25 ca 06 59 60 e1 8d 47 8d 5f 84 45 b2 82 6c 9e b6 c4 17 ff c3 7b e1 b9 c7 f0 06
type: BL_33
digest: 9c 76 10 58 c1 02 db 86 b8 cc 9f 37 72 b8 b0 00 8a 60 cc b5 ee 7b bd 9d 48 1c e0 14 60 d9 ef bb
type: NT_FW_CONFIG
digest: 0c 53 ba 3f c9 43 13 bf 25 59 bc 8c 2e 7e 49 fa 0f 1a 5a 40 96 ed 58 fa 58 31 39 7a de d4 e4 fb
type: SP1
digest: 3f a5 20 ed df 82 81 7b ca b2 1f 48 04 bf 05 8b e2 3b 4e f3 55 33 55 d4 22 69 bb b8 c0 d5 7a 44
type: SP2
digest: 14 5a ff 57 6e 5a 72 3e fc 97 7a 88 3b 90 0f b1 57 5d aa 3c d4 eb 27 d6 11 84 6c 5f 2c b3 17 fd
type: SP3
digest: e7 72 fc a5 6b 4d dc db 70 d1 86 7f ca ae f4 20 6a 5d 68 c6 64 7b 9d a9 44 44 28 8b 12 d2 19 87
type: SP4
digest: 02 c2 f8 d4 d4 9a 27 6b 2d 90 ad f4 df ed f1 5a 7a 74 f6 f3 0f 9a f9 e9 68 59 ee cd d6 2e e2 4b
type: SP5
digest: 7c a8 ee e7 b1 31 62 f1 7d eb 34 8d c4 a6 5d ff 5d 44 59 88 2c 6d 96 9b d6 c6 8e 9b 9a 79 ea ca
type: CRITICAL DATA
digest: d3 a9 31 35 10 be c0 88 51 bd 28 4e a9 ff b3 c3 cd 02 11 fc 23 2e 02 07 0e ce a5 ab 1d d9 a1 6a
```
**TS Demo test (arm-linux)**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/ts-demo
Demonstrates use of trusted services from an application
---------------------------------------------------------
A client requests a set of crypto operations performed by
the Crypto service. Key storage for persistent keys is
provided by the Secure Storage service via the ITS client.
Generating random bytes length: 1
Operation successful
Random bytes:
D4
Generating random bytes length: 7
Operation successful
Random bytes:
83 C7 5C B0 01 2C 36
Generating random bytes length: 128
Operation successful
Random bytes:
CC F8 93 DB D5 EA EF 96
AE 69 F1 2C 58 97 26 C6
B7 25 8E E4 A6 F2 3B 38
22 9D FD 30 ED B2 46 29
FF 4C A4 04 97 0F A0 8B
74 F0 AC 6F 10 08 62 BE
7E 61 20 B2 60 AA 6C 7E
E2 6D A3 51 4B 9A 3A 26
1E 5F 55 48 11 6D 1F D7
DD 07 7C 6A 65 6D 67 C2
12 4F 84 27 67 8C A1 24
AC 61 81 20 37 C0 30 5F
3E 0C 9B 38 B0 91 07 13
9A 2B E3 67 45 37 67 1F
69 EF E2 63 8E B4 F6 FE
41 F0 4F EF 9A A7 23 F2
Generating ECC signing key
Operation successful
Signing message: "The quick brown fox" using key: 256
Operation successful
Signature bytes:
7A F5 F1 EB DC D9 36 2C
6B D3 0F F0 19 7C 9A 56
38 16 E1 D3 F8 F8 B4 7A
E9 92 12 F7 44 ED 20 4E
F1 05 3F BE 14 7C D1 8D
6E 94 2B 63 57 71 AB 7A
0E E9 A7 1C 1F C4 C8 93
3D E5 74 F3 6F 4F CA A3
Verify signature using original message: "The quick brown fox"
Operation successful
Verify signature using modified message: "!he quick brown fox"
Successfully detected modified message
Signing message: "jumps over the lazy dog" using key: 256
Operation successful
Signature bytes:
1A 47 A7 A6 B8 4A D2 55
88 94 2B BE AF AB F5 00
69 9F 86 D0 2A 32 20 FB
BE 1D 55 2D CB C9 64 EB
60 8C D6 6E 2D C1 AB A4
7F 9C 33 53 2E 6C 2C 53
2F 06 B3 5E 26 3F 0E 1A
1E 53 12 9D A5 B7 CC C0
Verify signature using original message: "jumps over the lazy dog"
Operation successful
Verify signature using modified message: "!umps over the lazy dog"
Successfully detected modified message
Generating RSA encryption key
Operation successful
Encrypting message: "Top secret" using RSA key: 257
Operation successful
Encrypted message:
15 C1 72 58 67 B1 4F 3E
AF 7D B0 69 1C E5 B3 47
6B 2D 51 04 2A 8D 53 A7
1E B9 94 15 77 9B 8D 61
Decrypting message using RSA key: 257
Operation successful
Decrypted message: "Top secret"
Exporting public key: 256
Operation successful
Public key bytes:
04 8D 7D 0B BA A9 EE C9
59 BA 13 0F 8B E9 94 B9
E8 8B 4D 33 5D 0F 1F 5A
60 F3 B1 0D 09 F2 56 43
6D 7D 05 B5 EE 13 F0 B6
E9 03 6B 1A 40 55 E3 08
70 8F EB AC 5F 2E 9B 26
18 4A C2 9E 73 F7 8A 65
C7
Destroying signing key: 256
Operation successful
Destroying encryption key: 257
Operation successful
```
==Config 3: OP-TEE SPMC tests==
====Build command====
```
MEASURED_BOOT=n SPMC_TESTS=y TS_SMM_GATEWAY=n TS_UEFI_TESTS=n SP_PACKAGING_METHOD=embedded DEFAULT_SP_CONFIG=default-opteesp make
```
====Setup steps after boot====
```
/mnt/host/out/linux-arm-ffa-tee/load_module.sh
/mnt/host/out/linux-arm-ffa-user/load_module.sh
```
====Test results====
**SPMC tests (arm-linux)**
```lines=12
#xtest -t ffa_spmc
Run test suite with level=0
TEE test application started over default TEE instance
######################################################
#
# ffa_spmc
#
######################################################
* ffa_spmc_1001 Test FF-A communication
o ffa_spmc_1001.1 SP1 comms check
ffa_spmc_1001.1 OK
o ffa_spmc_1001.2 Sp2 comms check
ffa_spmc_1001.2 OK
o ffa_spmc_1001.3 SP to SP messaging check
ffa_spmc_1001.3 OK
ffa_spmc_1001 OK
* ffa_spmc_1002 Test FF-A memory: share memory from Normal World to SP
o ffa_spmc_1002.1 Test memory set-up
ffa_spmc_1002.1 OK
o ffa_spmc_1002.2 Test retrieve memory second time
ffa_spmc_1002.2 OK
o ffa_spmc_1002.3 Test accessing memory
ffa_spmc_1002.3 OK
o ffa_spmc_1002.4 Test relinquish memory
ffa_spmc_1002.4 OK
o ffa_spmc_1002.5 Test incorrect reclaim
ffa_spmc_1002.5 OK
o ffa_spmc_1002.6 Test relinquish memory second time
ffa_spmc_1002.6 OK
o ffa_spmc_1002.7 Test correct reclaim
ffa_spmc_1002.7 OK
o ffa_spmc_1002.8 Test retrieve invalid memory region
ffa_spmc_1002.8 OK
ffa_spmc_1002 OK
* ffa_spmc_1003 Test FF-A memory: SP to SP
ffa_spmc_1003 OK
* ffa_spmc_1004 Test FF-A memory: Access and flags
o ffa_spmc_1004.1 Test sharing with exc access
ffa_spmc_1004.1 OK
o ffa_spmc_1004.2 Test sharing with incorrect access
ffa_spmc_1004.2 OK
ffa_spmc_1004 OK
+-----------------------------------------------------
Result of testsuite ffa_spmc:
ffa_spmc_1001 OK
ffa_spmc_1002 OK
ffa_spmc_1003 OK
ffa_spmc_1004 OK
+-----------------------------------------------------
39 subtests of which 0 failed
4 test cases of which 0 failed
0 test cases were skipped
TEE test application done!
```
==Config 4: SMMGW tests==
====Build command====
```
MEASURED_BOOT=n SPMC_TESTS=n TS_SMM_GATEWAY=y TS_UEFI_TESTS=y DEFAULT_SP_CONFIG=default-sp SP_PACKAGING_METHOD=fip make
```
====Setup steps after boot====
```
/mnt/host/out/linux-arm-ffa-tee/load_module.sh
/mnt/host/out/linux-arm-ffa-user/load_module.sh
```
====Test results====
**Trusted Services service level test (arm-linux)**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/ts-service-test -v -xgFwuServiceTests
TEST(PsServiceTests, createAndSetExtended) - 19100 ms
TEST(PsServiceTests, createAndSet) - 23732 ms
TEST(PsServiceTests, storeNewItem) - 20301 ms
TEST(ItsServiceTests, storeNewItem) - 20398 ms
TEST(AttestationProvisioningTests, provisionedIak)
/src/trusted-services/components/service/attestation/test/service/attestation_provisioning_tests.cpp:107: error: Failure in TEST(AttestationProvisioningTests, provisionedIak)
/src/trusted-services/components/service/attestation/test/service/attestation_provisioning_tests.cpp:32: error:
CHECK_TRUE(m_attest_service_context) failed
- 4367 ms
TEST(AttestationProvisioningTests, selfGeneratedIak)
/src/trusted-services/components/service/attestation/test/service/attestation_provisioning_tests.cpp:70: error: Failure in TEST(AttestationProvisioningTests, selfGeneratedIak)
/src/trusted-services/components/service/attestation/test/service/attestation_provisioning_tests.cpp:32: error:
CHECK_TRUE(m_attest_service_context) failed
- 2840 ms
TEST(AttestationServiceTests, repeatedOperation)
/src/trusted-services/components/service/attestation/test/service/attestation_service_tests.cpp:142: error: Failure in TEST(AttestationServiceTests, repeatedOperation)
/src/trusted-services/components/service/attestation/test/service/attestation_service_tests.cpp:32: error:
CHECK_TRUE(m_attest_service_context) failed
- 3156 ms
TEST(AttestationServiceTests, invalidChallengeLen)
/src/trusted-services/components/service/attestation/test/service/attestation_service_tests.cpp:90: error: Failure in TEST(AttestationServiceTests, invalidChallengeLen)
/src/trusted-services/components/service/attestation/test/service/attestation_service_tests.cpp:32: error:
CHECK_TRUE(m_attest_service_context) failed
- 2700 ms
TEST(AttestationServiceTests, checkTokenSize)
/src/trusted-services/components/service/attestation/test/service/attestation_service_tests.cpp:60: error: Failure in TEST(AttestationServiceTests, checkTokenSize)
/src/trusted-services/components/service/attestation/test/service/attestation_service_tests.cpp:32: error:
CHECK_TRUE(m_attest_service_context) failed
- 2868 ms
TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 23999 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 27100 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 33218 ms
TEST(CryptoMacServicePackedcTests, macAbort) - 20134 ms
TEST(CryptoMacServicePackedcTests, signAndVerify) - 78644 ms
TEST(CryptoCipherServicePackedcTests, cipherAbort) - 20500 ms
TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 62400 ms
TEST(CryptoHashServicePackedcTests, hashAbort) - 18648 ms
TEST(CryptoHashServicePackedcTests, hashAndVerify) - 30100 ms
TEST(CryptoHashServicePackedcTests, calculateHash) - 13700 ms
TEST(CryptoServicePackedcTests, generateRandomNumbers) - 43332 ms
TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 3362700 ms
TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 151500 ms
TEST(CryptoServicePackedcTests, signAndVerifyEat) - 265100 ms
TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 269600 ms
TEST(CryptoServicePackedcTests, signAndVerifyHash) - 269259 ms
TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 47861 ms
TEST(CryptoServicePackedcTests, exportPublicKey) - 57517 ms
TEST(CryptoServicePackedcTests, purgeKey) - 39394 ms
TEST(CryptoServicePackedcTests, copyKey) - 137000 ms
TEST(CryptoServicePackedcTests, generatePersistentKeys) - 68100 ms
TEST(CryptoServicePackedcTests, generateVolatileKeys) - 57400 ms
TEST(CryptoServiceProtobufTests, generateRandomNumbers)[ 9.056856] random: crng init done
- 44004 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 1227965 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 163563 ms
TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 269643 ms
TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 270000 ms
TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 47842 ms
TEST(CryptoServiceProtobufTests, exportPublicKey) - 57876 ms
TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 67981 ms
TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 57230 ms
TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 10585709 ms
TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 2205184 ms
TEST(DiscoveryServiceTests, checkServiceInfo) - 3818 ms
Errors (5 failures, 45 tests, 43 ran, 339 checks, 0 ignored, 2 filtered out, 20211941 ms)
```
**UEFI tests (arm-linux)**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/uefi-test -v
TEST(SmmVariableAttackTests, getCheckPropertyWithMaxSizeName) - 3744 ms
TEST(SmmVariableAttackTests, getCheckPropertyWithOversizeName) - 1831 ms
TEST(SmmVariableAttackTests, setCheckPropertyWithMaxSizeName) - 2000 ms
TEST(SmmVariableAttackTests, setCheckPropertyWithOversizeName) - 1790 ms
TEST(SmmVariableAttackTests, enumerateWithSizeMaxNameSize) - 5700 ms
TEST(SmmVariableAttackTests, enumerateWithOversizeName) - 1771 ms
TEST(SmmVariableAttackTests, setAndGetWithSizeMaxNameSize) - 2917 ms
TEST(SmmVariableAttackTests, setAndGetWithOversizeName) - 2800 ms
TEST(SmmVariableAttackTests, setWithSizeMaxNameSize) - 1822 ms
TEST(SmmVariableAttackTests, setWithOversizeName) - 1894 ms
TEST(SmmVariableAttackTests, setWithSizeMaxDataSize) - 1867 ms
TEST(SmmVariableAttackTests, setWithOversizeData) - 1800 ms
TEST(SmmVariableServiceTests, checkMaxVariablePayload) - 1700 ms
TEST(SmmVariableServiceTests, setSizeConstraint) - 4400 ms
TEST(SmmVariableServiceTests, enumerateStoreContents) - 23307 ms
TEST(SmmVariableServiceTests, getVarSizeNv) - 5557 ms
TEST(SmmVariableServiceTests, getVarSize) - 2800 ms
TEST(SmmVariableServiceTests, setAndGetNv) - 10157 ms
TEST(SmmVariableServiceTests, setAndGet) - 3600 ms
OK (19 tests, 19 ran, 141 checks, 0 ignored, 0 filtered out, 87201 ms)
```
=Overview=
This page is to capture the test results for OP-TEE SPMC v3.22
The tests were ran using the following set of components:
```lang=html, lines=12
>>> Manifest status
d064c30 (HEAD -> default, origin/master, m/master) stm32mp1: fetch mbedtls for tf-a authenticated boot
b242f5c stm32mp1: add edk2 and edk2-platforms repos
122fe9a stm32mp1: bump u-boot to 2023.04
Local manifests:
The merged manifest is:
<?xml version="1.0" encoding="UTF-8"?>
<manifest>
<remote fetch="https://git.gitlab.arm.com" name="arm-gitlab"/>
<remote fetch="https://github.com" name="github"/>
<remote fetch="https://git.savannah.gnu.org/git" name="savannah"/>
<remote fetch="https://git.trustedfirmware.org" name="tfo"/>
<default remote="github" revision="master"/>
<project name="Mbed-TLS/mbedtls.git" path="mbedtls" revision="refs/tags/mbedtls-2.28.1"/>
<project name="OP-TEE/build.git" path="build">
<linkfile dest="build/Makefile" src="fvp-psa-sp.mk"/>
</project>
<project name="OP-TEE/optee_client.git" path="optee_client"/>
<project name="OP-TEE/optee_os.git" path="optee_os"/>
<project name="OP-TEE/optee_test.git" path="optee_test"/>
<project clone-depth="1" name="TF-A/trusted-firmware-a.git" path="trusted-firmware-a" remote="tfo" revision="refs/tags/v2.8"/>
<project name="TS/trusted-services.git" path="trusted-services" remote="tfo" revision="integration"/>
<project clone-depth="1" name="buildroot/buildroot.git" path="buildroot" revision="refs/tags/2022.11.1"/>
<project clone-depth="1" name="grub.git" path="grub" remote="savannah" revision="refs/tags/grub-2.02"/>
<project name="linaro-swg/optee_examples.git" path="optee_examples"/>
<project clone-depth="1" name="linux-arm/linux-trusted-services.git" path="linux-arm-ffa-user" remote="arm-gitlab" revision="debugfs-v5"/>
<project clone-depth="1" name="linux-arm/linux-trusted-services.git" path="linux-arm-ffa-tee" remote="arm-gitlab" revision="tee-v1"/>
<project name="tianocore/edk2-platforms.git" path="edk2-platforms" revision="02daa58c21f89628b4d8c76f95f3a554289149bc"/>
<project name="tianocore/edk2.git" path="edk2" revision="dd4cae4d82c7477273f3da455084844db5cca0c0"/>
<project clone-depth="1" name="torvalds/linux.git" path="linux" revision="refs/tags/v6.1"/>
</manifest>
>>>Project status
project build/
Local and remote SHA is matching.
2e792b3 (HEAD, m/master, github/master) fvp, ts: optimize buildroot config
3730e01 fvp, ts: use minimal Linux config
9b54724 Fix build of fTPM by enabling build of 32-bit libraries
project buildroot/
Local and remote SHA is matching.
d48a8beb (grafted, HEAD, tag: 2022.11.1, tag: m/master) Update for 2022.11.1
project edk2/
Local and remote SHA is matching.
dd4cae4d82 (HEAD, m/master) ArmPkg/GenericWatchdogDxe: Split 64bit register write to 2x32bit
1d802e234e BaseTools: Guid.xref doesn't specify the correct GUID value for Driver
83964ebc5e BaseTools/BinToPcd: Encode string returned from ByteArray()
project edk2-platforms/
Local and remote SHA is matching.
02daa58c21 (HEAD, m/master) Silicon/SynQuacer: Add status property in PCIe & SDHC DT nodes
9f02ebc19b Silicon/SynQuacer: add optional OP-TEE DT node
9dae9a0c79 Marvell/Library: ComPhyLib: Clean up the library after rework
project grub/
Local and remote SHA is matching.
e54c99a (grafted, HEAD, tag: grub-2.02, tag: m/master) Increase version to 2.02.
project linux/
Local and remote SHA is matching.
830b3c68c (grafted, HEAD, tag: v6.1, tag: m/master) Linux 6.1
project linux-arm-ffa-tee/
Local and remote SHA is matching.
c6b9495 (grafted, HEAD, m/master, arm-gitlab/tee-v1) Add versioning info to readme
project linux-arm-ffa-user/
Local and remote SHA is matching.
18e3be7 (grafted, HEAD, m/master, arm-gitlab/debugfs-v5) Add support for FF-A driver changes in v6.1
project mbedtls/
Local and remote SHA is matching.
dd79db100 (HEAD, tag: v2.28.1, tag: mbedtls-2.28.1, tag: m/master) Merge pull request #955 from Mbed-TLS/mbedtls-2.28.1rc0-pr
fe9d08fd1 Bump version
fa827b4b3 Minor tweaks to Changelog
project optee_client/
Local and remote SHA is matching.
8533e0e (HEAD, tag: 3.21.0-rc1, tag: 3.21.0, m/master, github/master) travis: remove the .travis.yml file
0fc6ef7 tee-supplicant: fix leak when load plugin failed
dde6306 libteeacl: use realloc() instead of reallocarray()
project optee_examples/
Local and remote SHA is matching.
378dc0d (HEAD, tag: 3.21.0, m/master, github/master) hotp: use sess_ctx instead of global variables
a98d01e (tag: 3.21.0-rc1, tag: 3.20.0-rc1, tag: 3.20.0) pluging: add missing of dependency syslog on teec
3ca8454 Enable compatibility with TEE Internal Core API v1.1
project optee_os/
Local and remote SHA is matching.
280b6a32e (HEAD, m/master, github/master) core: spmc: implement FFA_CONSOLE_LOG
b89b3da24 core: thread: Add support for canary value randomization
fb66b364b mk/aosp_optee.mk: fix build dependency for static libraries
project optee_test/
Local and remote SHA is matching.
232dfd2 (HEAD, m/master, github/master) xtest: remove ffa.h from SPMC test to resolve compiler error
36a136d Android.mk: add subkeys include directory
d168ff4 xtest: fix xtest tool name in usage trace messages
project trusted-firmware-a/
Local and remote SHA is matching.
9881bb9 (grafted, HEAD, tag: v2.8, tag: m/master) Merge "docs(spm): update threat model" into integration
project trusted-services/
Local and remote SHA is matching.
e56c7b1 (HEAD, tfo/integration, m/master) Implement FFA_CONSOLE_LOG interface
0100ddd Add FF-A v1.1 boot protocol
4f9d8e3 Refactor FF-A boot info
```
=Details=
==Config 1: embedded SP==
====Build command====
```
MEASURED_BOOT=y SPMC_TESTS=n TS_SMM_GATEWAY=n TS_UEFI_TESTS=n SP_PACKAGING_METHOD=embedded DEFAULT_SP_CONFIG=default-sp SP_BLOCK_STORAGE_CONFIG=default-sp SP_PSA_ITS_CONFIG=shared-flash-opteesp SP_PSA_PS_CONFIG=shared-flash-opteesp make
```
====Setup steps after boot====
```
/mnt/host/out/linux-arm-ffa-tee/load_module.sh
/mnt/host/out/linux-arm-ffa-user/load_module.sh
cp -at /usr /mnt/host/out/ts-install/arm-linux/bin /mnt/host/out/ts-install/arm-linux/lib
```
====Test results====
**Trusted Services service level test**
```
TEST(FwuServiceTests, checkMetadataAccess) - 1 ms
TEST(FwuServiceTests, checkImgDirAccess) - 0 ms
TEST(PsServiceTests, createAndSetExtended) - 1 ms
TEST(PsServiceTests, createAndSet) - 0 ms
TEST(PsServiceTests, storeNewItem) - 1 ms
TEST(ItsServiceTests, storeNewItem) - 0 ms
TEST(AttestationProvisioningTests, provisionedIak) - 0 ms
TEST(AttestationProvisioningTests, selfGeneratedIak) - 1 ms
- 62 ms
TEST(AttestationServiceTests, invalidChallengeLen) - 0 ms
TEST(AttestationServiceTests, checkTokenSize) - 1 ms
TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 1 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 0 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 0 ms (arm-linux)**
TEST(CryptoMacServicePackedcTests, macAbort) - 0 ms```lines=12
TEST(CryptoMacServicePackedcTests, signAndVerify) - 0 ms#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/ts-service-test -v -xgFwuServiceTests
TEST(CryptoCipherPsServicePackedcceTests, cipherAbortcreateAndSetExtended) - 0 ms72279 ms
TEST(CryptoCipherPsServicePackedcceTests, encryptDecryptRoundtripcreateAndSet) - 119400 ms
TEST(CryptoHashPsServicePackedcceTests, hashAbortstoreNewItem) - 0 ms77105 ms
TEST(CryptoHashItsServicePackedcceTests, hashAndVerifystoreNewItem) - 0 ms80862 ms
TEST(CryptoHashServicePackedcAttestationProvisioningTests, calculateHashprovisionedIak) - 0 ms35705 ms
TEST(CryptoServicePackedcAttestationProvisioningTests, gselfGenerateRandomNumbers) - 0 msdIak) - 52115 ms
TEST(CryptoAttestationServicePackedcceTests, asymEncryptDecryptWithSalt) - 5 msrepeatedOperation) - 6646269 ms
TEST(CryptoAttestationServicePackedcceTests, asymEncryptDecrypt) - 2 msinvalidChallengeLen)[ 10.672700] ------------[ cut here ]------------
TEST(CryptoServicePackedcTests, signAndVerifyEat) - 3 ms[ 10.672800] WARNING: CPU: 7 PID: 142 at mm/page_alloc.c:5534 __alloc_pages+0x164/0xab0
TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 3 ms[ 10.673100] Modules linked in: arm_ffa_tee(O)
TEST(CryptoS[ 10.673200] CPU: 7 PID: 142 Comm: ts-servicePackedcTests, signAndVerifyHash) - 3 ms-test Tainted: G O 6.1.0 #1
TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 0 ms[ 10.673500] Hardware name: FVP Base RevC (DT)
TEST(CryptoServicePackedcTests, exportPublicKey) - 0 ms[ 10.673600] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
TEST(CryptoServicePackedcTests, purgeKey) - 1 ms[ 10.673819] pc : __alloc_pages+0x164/0xab0
TEST(CryptoServicePackedcTests, copyKey) - 1 ms[ 10.673900] lr : pool_op_alloc+0x5c/0x180 [arm_ffa_tee]
TEST(CryptoServicePackedcTests, generatePersistentKeys) - 1 ms[ 10.674200] sp : ffffffc0087e3ac0
TEST(CryptoServicePackedcTests, generateVolatileKeys) - 0 ms[ 10.674310] x29: ffffffc0087e3ac0 x28: ffffffc0087e3d30 x27: ffffff88017bde80
TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 0 ms[ 10.674500] x26: 0000007fefe51a08 x25: 0000000000000005 x24: 0000000000001000
TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 22 ms[ 10.674802] x23: ffffff88017bdd80 x22: 0000000000000015 x21: 0000000000000015
TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 1 ms[ 10.675000] x20: 0000000000000000 x19: ffffff88017bdd80 x18: 0000000000000000
TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 3 ms[ 10.675300] x17: 0000000000000000 x16: 0000000000000000 x15: 0000007fefe51a08
TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 3 ms[ 10.675566] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 1 ms[ 10.675800] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
TEST(CryptoServiceProtobufTests, exportPublicKey) - 0 ms[ 10.676000] x8 : ffffff88017bde00 x7 : 0000000000000000 x6 : 00000000000009bc
TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 1 ms[ 10.676300] x5 : ffffff88017bdd80 x4 : 0000000000000000 x3 : 0000000000000000
TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 0 ms[ 10.676500] x2 : ffffff880176ac00 x1 : 0000000000000001 x0 : ffffffc008707000
TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 94 ms[ 10.676800] Call trace:
TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 21 ms[ 10.676900] __alloc_pages+0x164/0xab0
TEST(DiscoveryServiceTests, checkServiceInfo) - 0 ms[ 10.677000] pool_op_alloc+0x5c/0x180 [arm_ffa_tee]
TEST(FwuUpdateFmpTests, wholeFmpFlow) - 0 ms[ 10.677215] shm_alloc_helper+0x98/0x110
TEST(FwuOversizeImageTests, oversizeInstallMultiLocationEndStaging) - 1 ms[ 10.677400] tee_shm_alloc_user_buf+0x74/0x11c
TEST(FwuOversizeImageTests, oversizeInstallEndStaging) - 0 ms[ 10.677648] tee_ioctl+0xa70/0xf9c
TEST(FwuOversizeImageTests, oversizeInstallCancelStaging) - 0 ms[ 10.677800] __arm64_sys_ioctl+0x3bc/0xc30
TEST(FwuOversizeImageTests, maxSizeInstall) - 0 ms[ 10.678000] invoke_syscall.constprop.0+0x5c/0x104
TEST(FwuRollbackTests, bootloaderFallback) - 0 ms[ 10.678100] do_el0_svc+0x60/0x18c
TEST(FwuRollbackTests, selectPreviousAfterActivation) - 0 ms[ 10.678300] el0_svc+0x38/0xf0
TEST(FwuRollbackTests, selectPreviousPriorToActivation) - 1 ms[ 10.678429] el0t_64_sync_handler+0xbc/0x140
TEST(FwuPowerFailureTests, powerFailureDuringTrial) - 0 ms[ 10.678600] el0t_64_sync+0x18c/0x190
TEST(FwuPowerFailureTests, powerFailureDuringStaging) - 1 ms[ 10.678816] ---[ end trace 0000000000000000 ]---
TEST(FwuUpdateScenarioTests, partialFirmwareUpdateFlow) - 0 msffa_tee_share_mem():212 error: 12
TEST(FwuUpdateScenarioTests, wholeFirmwareUpdateFlow) - 1 ms- 23396 ms
TEST(FwuInvalidBehaviourAttestationServiceTests, invalidOperationsInTrialcheckTokenSize) - 0 ms67413 ms
TEST(FwuInvalidBehaviourCryptoKeyDerivationServicePackedcTests, invalidOperationsInStaging) - deriveAbort) - 24000 ms
TEST(FwuInvalidBehaviourCryptoKeyDerivationServicePackedcTests, invalidOperationsInRegular) - hkdfDeriveBytes) - 27200 ms
TEST(FwuImageDirectoryCryptoKeyDerivationServicePackedcTests, zeroFwLocationshkdfDeriveKey) - 0 ms33177 ms
TEST(FwuImageDirectoryCryptoMacServicePackedcTests, multipleFwLocationsmacAbort) - 0 ms20284 ms
TEST(FwuImageDirectoryCryptoMacServicePackedcTests, singleFwLocationsignAndVerify) - 1 ms78500 ms
TEST(FwuImageDirectoryCryptoCipherServicePackedcTests, streamRecyclingcipherAbort) - 0 ms20354 ms
TEST(FwuImageDirectoryCryptoCipherServicePackedcTests, streamedReadsencryptDecryptRoundtrip) - 62800 ms
TEST(BlockStorageCryptoHashServicecePackedcTests, blockAccessOperations) - 0 mshashAbort) - 18558 ms
TEST(BlockStorageCryptoHashServicecePackedcTests, openClosehashAndVerify) - 1 ms30000 ms
TEST(BlockStorageCryptoHashServicecePackedcTests, getPartitionInfocalculateHash) - 14000 ms
TEST(SmmVariableAttackCryptoServicePackedcTests, getCheckPropertyWithMaxSizeNamegenerateRandomNumbers) - 2 ms45528 ms
TEST(SmmVariableAttackCryptoServicePackedcTests, getCheckPropertyasymEncryptDecryptWithOversizeName) - 0 msSalt) - 551499 ms
TEST(SmmVariableAttackCryptoServicePackedcTests, setCheckPropertyWithMaxSizeName) - 0 msasymEncryptDecrypt) - 207945 ms
TEST(SmmVariableAttackCryptoServicePackedcTests, setCheckPropertyWithOversizeName) - 1 mssignAndVerifyEat) - 265937 ms
TEST(SmmVariableAttackCryptoServicePackedcTests, enumerateWithSizeMaxNameSize) - 0 mssignAndVerifyMessage) - 328338 ms
TEST(SmmVariableAttackCryptoServicePackedcTests, enumerateWithOversizeName) - 1 mssignAndVerifyHash) - 328800 ms
TEST(SmmVariableAttackCryptoServicePackedcTests, seexportAndGetWithSizeMaxNameSizeImportKeyPair) - 0 ms169797 ms
TEST(SmmVariableAttackCryptoServicePackedcTests, setAndGetWithOversizeName) - 0 msexportPublicKey) - 115825 ms
TEST(SmmVariableAttackCryptoServicePackedcTests, setWithSizeMaxNameSizepurgeKey) - 1 ms03500 ms
TEST(SmmVariableAttackCryptoServicePackedcTests, setWithOversizeName) - copyKey) - 191200 ms
TEST(SmmVariableAttackCryptoServicePackedcTests, setWithSizeMaxDataSizegeneratePersistentKeys) - 1 ms90647 ms
TEST(SmmVariableAttackCryptoServicePackedcTests, setWithOversizeDatagenerateVolatileKeys) - 0 ms55477 ms
TEST(SmmVariableCryptoServiceProtobufTests, checkMaxVariablePayloadgenerateRandomNumbers) - 0 ms46482 ms
TEST(SmmVariableCryptoServiceProtobufTests, setSizeConstrainasymEncryptDecryptWithSalt) - 1 ms2386799 ms
TEST(SmmVariableCryptoServiceProtobufTests, enumerateStoreContentsasymEncryptDecrypt) - 322940 ms
TEST(SmmVariableCryptoServiceProtobufTests, getVarSizeNvsignAndVerifyMessage) - 1 ms329394 ms
TEST(SmmVariableCryptoServiceProtobufTests, getVarSizesignAndVerifyHash) - 0 ms328398 ms
TEST(SmmVariableCryptoServiceProtobufTests, seexportAndGetNvImportKeyPair) - 1 ms70400 ms
TEST(SmmVariableCryptoServiceProtobufTests, setAndGetexportPublicKey) - 0 ms116162 ms
TEST(TestRunnerServiceCryptoServiceProtobufTests, runSpecificTestgeneratePersistentKeys) - 190900 ms
TEST(TestRunnerServiceCryptoServiceProtobufTests, runConfigTestgenerateVolatileKeys) - 0 ms58199 ms
TEST(TestRunnerCryptoServiceLimitTests, listPlatformTestsvolatileRsaKeyPairLimit) - 10759750 ms
TEST(TestRunnerCryptoServiceLimitTests, runAllTestsvolatileEccKeyPairLimit) - 0 ms2204698 ms
TEST(TestRunnerDiscoveryServiceTests, listAllTestscheckServiceInfo) - 3900 ms
OK (9245 tests, 9243 ran, 344867763 checks, 0 ignored, 02 filtered out, 249 ms26990292 ms)
```
**PSA Architecture Test Suite**
``` (arm-linux)**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-crypto-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Crypto Suite
******************************************
TEST: 201 | DESCRIPTION: Testing crypto key management APIs | UT: psa_crypto_init
[Info] Executing tests from non-secure
[Check 1] Test calling crypto functions before psa_crypto_init
[Check 2] Test psa_crypto_init
[Check 3] Test multiple psa_crypto_init
TEST RESULT: PASSED
******************************************
TEST: 202 | DESCRIPTION: Testing crypto key management APIs | UT: psa_import_key
[Info] Executing tests from non-secure
[Check 1] Test psa_import_key 16 bytes AES
[Check 2] Test psa_import_key 24 bytes AES
[Check 3] Test psa_import_key 32 bytes AES
[Check 4] Test psa_import_key 2048 RSA public key
[Check 5] Test psa_import_key with RSA 2048 keypair
[Check 6] Test psa_import_key with DES 8 bytes key
[Check 7] Test psa_import_key with Triple DES 2-Key
[Check 8] Test psa_import_key with Triple DES 3-Key
[Check 9] Test psa_import_key with EC Public key
[Check 10] Test psa_import_key with EC keypair
[Check 11] Test psa_import_key 16 bytes AES with invalid bits
[Check 12] Test psa_import_key with key data greater than the algorithm size
[Check 13] Test psa_import_key with incorrect key data size
[Check 14] Test psa_import_key with invalid key type value
TEST RESULT: PASSED
******************************************
TEST: 203 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_key
[Info] Executing tests from non-secure
[Check 1] Test psa_export_key 16 Byte AES
[Check 2] Test psa_export_key 24 Byte AES
[Check 3] Test psa_export_key 32 Byte AES
[Check 4] Test psa_export_key 2048 RSA public key
[Check 5] Test psa_export_key with RSA 2048 keypair
[Check 6] Test psa_export_key with DES 64 bit key
[Check 7] Test psa_export_key with Triple DES 2-Key
[Check 8] Test psa_export_key with Triple DES 3-Key
[Check 9] Test psa_export_key with EC Public key
[Check 10] Test psa_export_key with EC keypair
[Check 11] Test psa_export_key with key policy verify
[Check 12] Test psa_export_key with less buffer size
TEST RESULT: PASSED
******************************************
TEST: 204 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_public_key
[Info] Executing tests from non-secure
[Check 1] Test psa_export_public_key 16 Byte AES
[Check 2] Test psa_export_public_key 24 Byte AES
[Check 3] Test psa_export_public_key 32 Byte AES
[Check 4] Test psa_export_public_key 2048 RSA public key
[Check 5] Test psa_export_public_key with RSA 2048 keypair
[Check 6] Test psa_export_public_key with DES 64 bit key
[Check 7] Test psa_export_public_key with Triple DES 2-Key
[Check 8] Test psa_export_public_key with Triple DES 3-Key
[Check 9] Test psa_export_public_key with EC Public key
[Check 10] Test psa_export_public_key with EC keypair
[Check 11] Test psa_export_public_key with less buffer size
TEST RESULT: PASSED
******************************************
TEST: 205 | DESCRIPTION: Testing crypto key management APIs | UT: psa_destroy_key
[Info] Executing tests from non-secure
[Check 1] Test psa_destroy_key 16 Byte AES
[Check 2] Test psa_destroy_key 24 Byte AES
[Check 3] Test psa_destroy_key 32 Byte AES
[Check 4] Test psa_destroy_key 2048 RSA public key
[Check 5] Test psa_destroy_key with RSA 2048 keypair
[Check 6] Test psa_destroy_key with DES 64 bit key
[Check 7] Test psa_destroy_key with Triple DES 2-Key
[Check 8] Test psa_destroy_key with Triple DES 3-Key
[Check 9] Test psa_destroy_key with EC Public key
[Check 10] Test psa_destroy_key with EC keypair
TEST RESULT: PASSED
******************************************
TEST: 206 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compute
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_compute with MD5 algorithm
[Check 2] Test psa_hash_compute with RIPEMD160 algorithm
[Check 3] Test psa_hash_compute with SHA1 algorithm
[Check 4] Test psa_hash_compute with SHA224 algorithm
[Check 5] Test psa_hash_compute with SHA256 algorithm
[Check 6] Test psa_hash_compute with SHA384 algorithm
[Check 7] Test psa_hash_compute with SHA512 algorithm
[Check 8] Test psa_hash_compute with small buffer size
[Check 9] Test psa_hash_compute with invalid algorithm
TEST RESULT: PASSED
******************************************
TEST: 207 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compare
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_compare with MD5 algorithm
[Check 2] Test psa_hash_compare with RIPEMD160 algorithm
[Check 3] Test psa_hash_compare with SHA1 algorithm
[Check 4] Test psa_hash_compare with SHA224 algorithm
[Check 5] Test psa_hash_compare with SHA256 algorithm
[Check 6] Test psa_hash_compare with SHA384 algorithm
[Check 7] Test psa_hash_compare with SHA512 algorithm
[Check 8] Test psa_hash_compare with incorrect hash
[Check 9] Test psa_hash_compare with incorrect hash length
[Check 10] Test psa_hash_compare with invalid algorithm
TEST RESULT: PASSED
******************************************
TEST: 208 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_setup - ECDH + HKDF-SHA-256
[Check 2] Test psa_key_derivation_setup - ECDH, unknown KDF
[Check 3] Test psa_key_derivation_setup - bad key derivation algorithm
[Check 4] Test psa_key_derivation_setup - Invalid Algorithm
TEST RESULT: PASSED
******************************************
TEST: 209 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_bytes
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_input_bytes - Step as Info
[Check 2] Test psa_key_derivation_input_bytes - Step as secret
[Check 3] Test psa_key_derivation_input_bytes - Step as salt
[Check 4] Test psa_key_derivation_input_bytes - Step as label
[Check 5] Test psa_key_derivation_input_bytes - Step as seed
[Check 6] Test psa_key_derivation_input_bytes - Invalid step
TEST RESULT: PASSED
******************************************
TEST: 210 | DESCRIPTION: Testing crypto key attributes APIs | UT: psa_key_attributes_set_get
[Info] Executing tests from non-secure
[Check 1] Test psa_key_attributes_set_get key attributes
TEST RESULT: PASSED
******************************************
TEST: 211 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_setup with MD5 algorithm
[Check 2] Test psa_hash_setup with RIPEMD160 algorithm
[Check 3] Test psa_hash_setup with SHA1 algorithm
[Check 4] Test psa_hash_setup with SHA224 algorithm
[Check 5] Test psa_hash_setup with SHA256 algorithm
[Check 6] Test psa_hash_setup with SHA384 algorithm
[Check 7] Test psa_hash_setup with SHA512 algorithm
[Check 8] Test psa_hash_setup with Invalid hash algorithm
[Check 9] Test psa_hash_setup with Invalid algorithm
[Check 10] Test psa_hash_setup with CTR algorithm
TEST RESULT: PASSED
******************************************
TEST: 212 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_update
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_update with MD5 algorithm
[Check 2] Test psa_hash_update with RIPEMD160 algorithm
[Check 3] Test psa_hash_update with SHA1 algorithm
[Check 4] Test psa_hash_update with SHA224 algorithm
[Check 5] Test psa_hash_update with SHA256 algorithm
[Check 6] Test psa_hash_update with SHA384 algorithm
[Check 7] Test psa_hash_update with SHA512 algorithm
[Check 8] Test psa_hash_update without hash setup
[Check 9] Test psa_hash_update with completed opertaion handle
TEST RESULT: PASSED
******************************************
TEST: 213 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_verify with MD5 algorithm
[Check 2] Test psa_hash_verify with RIPEMD160 algorithm
[Check 3] Test psa_hash_verify with SHA1 algorithm
[Check 4] Test psa_hash_verify with SHA224 algorithm
[Check 5] Test psa_hash_verify with SHA256 algorithm
[Check 6] Test psa_hash_verify with SHA384 algorithm
[Check 7] Test psa_hash_verify with SHA512 algorithm
[Check 8] Test psa_hash_verify with incorrect expected hash
[Check 9] Test psa_hash_verify with incorrect hash length
[Check 10] test psa_hash_verify with inactive & invalid operation handle
TEST RESULT: PASSED
******************************************
TEST: 214 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_finish with MD5 algorithm
[Check 2] Test psa_hash_finish with RIPEMD160 algorithm
[Check 3] Test psa_hash_finish with SHA1 algorithm
[Check 4] Test psa_hash_finish with SHA224 algorithm
[Check 5] Test psa_hash_finish with SHA256 algorithm
[Check 6] Test psa_hash_finish with SHA384 algorithm
[Check 7] Test psa_hash_finish with SHA512 algorithm
[Check 8] Test psa_hash_finish with invalid hash buffer size
[Check 9] test psa_hash_finish with inactive operation handle
TEST RESULT: PASSED
******************************************
TEST: 215 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_abort with MD5 algorithm
[Check 2] Test psa_hash_abort with RIPEMD160 algorithm
[Check 3] Test psa_hash_abort with SHA1 algorithm
[Check 4] Test psa_hash_abort with SHA224 algorithm
[Check 5] Test psa_hash_abort with SHA256 algorithm
[Check 6] Test psa_hash_abort with SHA384 algorithm
[Check 7] Test psa_hash_abort with SHA512 algorithm
[Check 8] Test psa_hash_finish after calling psa_hash_abort
TEST RESULT: PASSED
******************************************
TEST: 216 | DESCRIPTION: Testing crypto generator functions APIs | UT: psa_generate_key
[Info] Executing tests from non-secure
[Check 1] Test psa_generate_key 16 Byte AES
[Check 2] Test psa_generate_key 24 Byte AES
[Check 3] Test psa_generate_key 32 Byte AES
[Check 4] Test psa_generate_key with DES 64 bit key
[Check 5] Test psa_generate_key with Triple DES 2-Key
[Check 6] Test psa_generate_key with Triple DES 3-Key
[Check 7] Test psa_generate_key with RSA 2048 Keypair
[Check 8] Test psa_generate_key with ECC KeyPair
[Check 9] Test psa_generate_key with RSA 2048 Public key
[Check 10] Test psa_generate_key with invalid key type
[Check 11] Test psa_generate_key with invalid usage flags
TEST RESULT: PASSED
******************************************
TEST: 217 | DESCRIPTION: Testing crypto generation APIs | UT: psa_generate_random
[Info] Executing tests from non-secure
[Check 1] Test psa_generate_random to get 0 Byte data
[Check 2] Test psa_generate_random to get 16 Byte data
[Check 3] Test psa_generate_random to get 24 Byte data
[Check 4] Test psa_generate_random to get 32 Byte data
[Check 5] Test psa_generate_random to get 64 Byte data
[Check 6] Test psa_generate_random to get 128 Byte data
[Check 7] Test psa_generate_random to get 256 Byte data
[Check 8] Test psa_generate_random to get 512 Byte data
[Check 9] Test psa_generate_random to get 1000 Byte data
TEST RESULT: PASSED
******************************************
TEST: 218 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_key
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_input_key 16 Byte Key
[Check 2] Test psa_key_derivation_input_key with invalid usage
[Check 3] Test psa_key_derivation_input_key with step as label
[Check 4] Test psa_key_derivation_input_key with step as info
[Check 5] Test psa_key_derivation_input_key with step as seed
[Check 6] Test psa_key_derivation_input_key with step as salt
[Check 7] Test psa_key_derivation_input_key with key type as AES(not derive)
[Check 8] Test psa_key_derivation_input_key incorrect key algorithm
[Check 9] Test psa_key_derivation_input_key with key type as 2048 RSA public key
[Check 10] Test psa_key_derivation_input_key with key type as RSA 2048 keypair
[Check 11] Test psa_key_derivation_input_key with zero as step
[Check 12] Test psa_cipher_decrypt_setup - Invalid key handle
[Check 13] Test psa_cipher_decrypt_setup - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 219 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_key_agreement
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_key_agreement - ECDH SECP256R1
[Check 2] Test psa_key_derivation_key_agreement - Invalid step
[Check 3] Test psa_key_derivation_key_agreement - ECDH SECP384R1
[Check 4] Test psa_key_derivation_key_agreement - Invalid usage
[Check 5] Test psa_key_derivation_key_agreement - KDF not a key agreement alg
[Check 6] Test psa_key_derivation_key_agreement - Public key of different curve
[Check 7] Test psa_key_derivation_key_agreement - Pub key instead of Prv key
[Check 8] Test psa_key_derivation_key_agreement - Invalid handle
[Check 9] Test psa_key_derivation_key_agreement - Zero as handle
TEST RESULT: PASSED
******************************************
TEST: 220 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_bytes
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_output_bytes - HKDF
[Check 2] Test psa_key_derivation_output_bytes - optional salt
[Check 3] Test psa_key_derivation_output_bytes - capacity < output_length
[Check 4] Test psa_key_derivation_output_bytes - missing info
[Check 5] Test psa_key_derivation_output_bytes - missing salt/secret/info
[Check 6] Test psa_key_derivation_output_bytes - TLS12_PRF
[Check 7] Test psa_key_derivation_output_bytes - capacity < output_length
[Check 8] Test psa_key_derivation_output_bytes - missing seed/secret/label
TEST RESULT: PASSED
******************************************
TEST: 221 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_key
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_output_key - Key
[Check 2] Test psa_key_derivation_output_key - Info
[Check 3] Test psa_key_derivation_output_key - Salt
[Check 4] Test psa_key_derivation_output_key - Greater Capacity than available
[Check 5] Test psa_key_derivation_output_key - ECC Public key
[Check 6] Test psa_key_derivation_output_key - ECC keypair (wrong key length)
[Check 7] Test psa_key_derivation_output_key - RSA Public Key[Check 8] Test psa_key_derivation_output_key - RSA keypair
[Check 9] Test psa_key_derivation_output_key - Invalid key size
TEST RESULT: PASSED
******************************************
TEST: 222 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_abort
TEST RESULT: PASSED
******************************************
TEST: 223 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_set_get_capacity
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_set_get_capacity - < operation's capacity
[Check 2] Test psa_key_derivation_set_get_capacity - = operation's capacity
[Check 3] Test psa_key_derivation_set_get_capacity - > operation's capacity
[Check 4] Test psa_key_derivation_set_get_capacity - unchanged capacity
TEST RESULT: PASSED
******************************************
TEST: 224 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_encrypt - CCM - AES - 13B nonce & 8B add data
[Check 2] Test psa_aead_encrypt - CCM - AES - 13B nonce & 32B add data
[Check 3] Test psa_aead_encrypt - CCM - AES - 24 bytes Tag length = 4
[Check 4] Test psa_aead_encrypt - CCM - AES - Zero additional data
[Check 5] Test psa_aead_encrypt - CCM - AES - Zero plaintext
[Check 6] Test psa_aead_encrypt - GCM - AES - 12B nonce & 12B add data
[Check 7] Test psa_aead_encrypt - Unsupported algorithm
[Check 8] Test psa_aead_encrypt - Invalid usage flag
[Check 9] Test psa_aead_encrypt - Invalid ciphertext_size
[Check 10] Test psa_aead_encrypt - Invalid nonce
[Check 11] Test psa_aead_encrypt - Invalid tag length 0
TEST RESULT: PASSED
******************************************
TEST: 225 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_decrypt - CCM - AES - 13B nonce & 8B add data
[Check 2] Test psa_aead_decrypt - CCM - AES - 13B nonce & 32B add data
[Check 3] Test psa_aead_decrypt - CCM - AES - 24 bytes Tag length = 4
[Check 4] Test psa_aead_decrypt - CCM - AES - Zero additional data
[Check 5] Test psa_aead_decrypt - CCM - AES - Zero plaintext
[Check 6] Test psa_aead_decrypt - GCM - AES - 12B nonce & 12B add data
[Check 7] Test psa_aead_decrypt - Unsupported algorithm
[Check 8] Test psa_aead_decrypt - Invalid usage flag
[Check 9] Test psa_aead_decrypt - Invalid plaintext_size
[Check 10] Test psa_aead_decrypt - Invalid nonce
[Check 11] Test psa_aead_decrypt - Invalid cihpertext
[Check 12] Test psa_aead_decrypt - Invalid cihpertext_size
[Check 13] Test psa_aead_decrypt - Invalid tag length 0
TEST RESULT: PASSED
******************************************
TEST: 226 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_sign_setup - HMAC - SHA256
[Check 2] Test psa_mac_sign_setup - CMAC - AES
[Check 3] Test psa_mac_sign_setup - Incompatible HMAC for CMAC
[Check 4] Test psa_mac_sign_setup - Invalid usage flag
[Check 5] Test psa_mac_sign_setup - Invalid key type
[Check 6] Test psa_mac_sign_setup - Truncated MAC too large
[Check 7] Test psa_mac_sign_setup - Truncated MAC too small
[Check 8] Test psa_mac_sign_setup - Unknown MAC algorithm
[Check 9] Test psa_mac_sign_setup - Bad algorithm (not a MAC algorithm)
[Check 10] Test psa_mac_sign_setup invalid key handle
[Check 11] Test psa_mac_sign_setup zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 227 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_update
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_update - HMAC - SHA256 - 64 Byte
[Check 2] Test psa_mac_update - CMAC - AES - 16 Byte
[Check 3] Test psa_mac_update - HMAC - SHA512 - 32 Byte
[Check 4] Test psa_mac_update - HMAC - SHA512 - Invalid operation state
TEST RESULT: PASSED
******************************************
TEST: 228 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_sign_finish - HMAC - SHA224
[Check 2] Test psa_mac_sign_finish - HMAC - SHA256
[Check 3] Test psa_mac_sign_finish - HMAC - SHA512
[Check 4] Test psa_mac_sign_finish - HMAC - SHA224 - Truncated 8 Byte
[Check 5] Test psa_mac_sign_finish - HMAC - SHA224 - Small output buffer
[Check 6] Test psa_mac_sign_finish - HMAC - SHA224 - Invalid operation state
[Check 7] Test psa_mac_sign_finish - CMAC - AES
TEST RESULT: PASSED
******************************************
TEST: 229 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify_setup - HMAC - SHA256
[Check 2] Test psa_mac_verify_setup - CMAC - AES
[Check 3] Test psa_mac_verify_setup - Incompatible HMAC for CMAC
[Check 4] Test psa_mac_verify_setup - Invalid usage flag
[Check 5] Test psa_mac_verify_setup - Invalid key type
[Check 6] Test psa_mac_verify_setup - Truncated MAC too large
[Check 7] Test psa_mac_verify_setup - Truncated MAC too small
[Check 8] Test psa_mac_verify_setup - Unknown MAC algorithm
[Check 9] Test psa_mac_verify_setup - Bad algorithm (not a MAC algorithm)
[Check 10] Test psa_mac_verify_setup invalid key handle
[Check 11] Test psa_mac_verify_setup zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 230 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify_finish - HMAC - SHA224
[Check 2] Test psa_mac_verify_finish - HMAC - SHA256
[Check 3] Test psa_mac_verify_finish - HMAC - SHA512
[Check 4] Test psa_mac_verify_finish - HMAC - SHA224 - Truncated 8 Byte
[Check 5] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid mac length
[Check 6] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid expected mac
[Check 7] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid operation state
[Check 8] Test psa_mac_verify_finish - CMAC - AES
TEST RESULT: PASSED
******************************************
TEST: 231 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_abort - HMAC - SHA224
[Check 2] Test psa_mac_abort - HMAC - SHA224 - Truncated 8 Byte
[Check 3] Test psa_mac_abort - HMAC - SHA256
[Check 4] Test psa_mac_abort - HMAC - SHA512
[Check 5] Test psa_mac_abort - CMAC - AES
[Check 6] Test psa_mac_sign_finish after calling psa_mac_abort
TEST RESULT: PASSED
******************************************
TEST: 232 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_encrypt_setup 16 Byte AES
[Check 2] Test psa_cipher_encrypt_setup 24 Byte AES
[Check 3] Test psa_cipher_encrypt_setup 32 Byte AES
[Check 4] Test psa_cipher_encrypt_setup DES 64 bit key
[Check 5] Test psa_cipher_encrypt_setup Triple DES 2-Key
[Check 6] Test psa_cipher_encrypt_setup Triple DES 3-Key
[Check 7] Test psa_cipher_encrypt_setup 16 Byte raw data
[Check 8] Test psa_cipher_encrypt_setup - not a cipher algorithm
[Check 9] Test psa_cipher_encrypt_setup - unknown cipher algorithm
[Check 10] Test psa_cipher_encrypt_setup - incompatible key ARC4
[Check 11] Test psa_cipher_encrypt_setup - incorrect usage
[Check 12] Test psa_cipher_encrypt_setup - RSA public key
[Check 13] Test psa_cipher_encrypt_setup - RSA keypair
[Check 14] Test psa_cipher_encrypt_setup - EC Public key
[Check 15] Test psa_cipher_encrypt_setup - EC keypair
[Check 16] Test psa_cipher_encrypt_setup - Invalid key handle
[Check 17] Test psa_cipher_encrypt_setup - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 233 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_decrypt_setup 16 Byte AES
[Check 2] Test psa_cipher_decrypt_setup 24 Byte AES
[Check 3] Test psa_cipher_decrypt_setup 32 Byte AES
[Check 4] Test psa_cipher_decrypt_setup DES 64 bit key
[Check 5] Test psa_cipher_decrypt_setup Triple DES 2-Key
[Check 6] Test psa_cipher_decrypt_setup Triple DES 3-Key
[Check 7] Test psa_cipher_decrypt_setup 16 Byte raw data
[Check 8] Test psa_cipher_decrypt_setup - not a cipher algorithm
[Check 9] Test psa_cipher_decrypt_setup - unknown cipher algorithm
[Check 10] Test psa_cipher_decrypt_setup - incompatible key ARC4
[Check 11] Test psa_cipher_decrypt_setup - incorrect usage
[Check 12] Test psa_cipher_decrypt_setup - RSA public key
[Check 13] Test psa_cipher_decrypt_setup - RSA keypair
[Check 14] Test psa_cipher_decrypt_setup - EC Public key
[Check 15] Test psa_cipher_decrypt_setup - EC keypair
[Check 16] Test psa_cipher_decrypt_setup - Invalid key handle
[Check 17] Test psa_cipher_decrypt_setup - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 234 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_generate_iv
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_generate_iv 16 Byte AES
[Check 2] Test psa_cipher_generate_iv 24 Byte AES
[Check 3] Test psa_cipher_generate_iv 32 Byte AES
[Check 4] Test psa_cipher_generate_iv DES 64 bit key
[Check 5] Test psa_cipher_generate_iv DES 2-Key
[Check 6] Test psa_cipher_generate_iv DES 3-Key
[Check 7] Test psa_cipher_generate_iv AES - small iv buffer
[Check 8] Test psa_cipher_generate_iv DES - small iv buffer
TEST RESULT: PASSED
******************************************
TEST: 235 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_set_iv
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_set_iv 16 Byte AES
[Check 2] Test psa_cipher_set_iv 24 Byte AES
[Check 3] Test psa_cipher_set_iv 32 Byte AES
[Check 4] Test psa_cipher_set_iv DES 64 bit key
[Check 5] Test psa_cipher_set_iv DES 2-Key
[Check 6] Test psa_cipher_set_iv DES 3-Key
[Check 7] Test psa_cipher_set_iv AES - small iv buffer
[Check 8] Test psa_cipher_set_iv DES - small iv buffer
[Check 9] Test psa_cipher_set_iv AES - large iv buffer
[Check 10] Test psa_cipher_set_iv DES - large iv buffer
TEST RESULT: PASSED
******************************************
TEST: 236 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_update
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING (Short in)
[Check 3] Test psa_cipher_update - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_update - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_update - Encrypt - AES CTR
[Check 6] Test psa_cipher_update - Encrypt - DES CBC (nopad)
[Check 7] Test psa_cipher_update - Encrypt - 2-key 3DE -CBC (nopad)
[Check 8] Test psa_cipher_update - Encrypt - 3-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_update - Encrypt - small output buffer size
[Check 10] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING
[Check 11] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING (Short in)
[Check 12] Test psa_cipher_update - Decrypt - AES CBC_PKCS7
[Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7 (Short input)
[Check 14] Test psa_cipher_update - Decrypt - AES CTR
[Check 15] Test psa_cipher_update - Decrypt - DES CBC (nopad)
[Check 16] Test psa_cipher_update - Decrypt - 2-key 3DE -CBC (nopad)
[Check 17] Test psa_cipher_update - Decrypt - 3-key 3DE -CBC (nopad)
[Check 18] Test psa_cipher_update - Decrypt - small output buffer size
[Check 19] Test psa_cipher_update without cipher setup
TEST RESULT: PASSED
******************************************
TEST: 237 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING (Short in)
[Check 3] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_finish - Encrypt - AES CTR
[Check 6] Test psa_cipher_finish - Encrypt - AES CTR (short input)
[Check 7] Test psa_cipher_finish - Encrypt - DES CBC (nopad)
[Check 8] Test psa_cipher_finish - Encrypt - 2-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_finish - Encrypt - 3-key 3DE -CBC (nopad)
[Check 10] Test psa_cipher_finish - Encrypt - small output buffer size
[Check 11] Test psa_cipher_finish - Decrypt - AES CBC_NO_PADDING
[Check 12] Test psa_cipher_finish - Decrypt - AES CBC_NO_PADDING (Short in)
[Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7
[Check 14] Test psa_cipher_finish - Decrypt - AES CBC_PKCS7 (Short input)
[Check 15] Test psa_cipher_finish - Decrypt - AES CTR
[Check 16] Test psa_cipher_finish - Decrypt - AES CTR (short input)
[Check 17] Test psa_cipher_finish - Decrypt - DES CBC (nopad)
[Check 18] Test psa_cipher_finish - Decrypt - 2-key 3DE -CBC (nopad)
[Check 19] Test psa_cipher_finish - Decrypt - 3-key 3DE -CBC (nopad)
TEST RESULT: PASSED
******************************************
TEST: 238 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_abort - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_abort - Encrypt - AES CBC_PKCS7
[Check 3] Test psa_cipher_abort - Encrypt - AES CTR
[Check 4] Test psa_cipher_abort - Encrypt - DES CBC (nopad)
[Check 5] Test psa_cipher_abort - Encrypt - 2-key 3DE -CBC (nopad)
[Check 6] Test psa_cipher_abort - Encrypt - 3-key 3DE -CBC (nopad)
[Check 7] Test psa_cipher_abort - Decrypt - AES CBC_NO_PADDING
[Check 8] Test psa_cipher_abort - Decrypt - AES CBC_PKCS7
[Check 9] Test psa_cipher_abort - Decrypt - AES CTR
[Check 10] Test psa_cipher_abort - Decrypt - DES CBC (nopad)
[Check 11] Test psa_cipher_abort - Decrypt - 2-key 3DE -CBC (nopad)
[Check 12] Test psa_cipher_abort - Decrypt - 3-key 3DE -CBC (nopad)
[Check 13] Test psa_cipher_update after psa_cipher_abort should fail
TEST RESULT: PASSED
******************************************
TEST: 239 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_asymmetric_encrypt - RSA PKCS1V15
[Check 2] Test psa_asymmetric_encrypt - RSA KEY_PAIR PKCS1V15
[Check 3] Test psa_asymmetric_encrypt - RSA OAEP SHA256
[Check 4] Test psa_asymmetric_encrypt - RSA OAEP SHA256 with label
[Check 5] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256
[Check 6] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256 with label
[Check 7] Test psa_asymmetric_encrypt - Small output buffer
[Check 8] Test psa_asymmetric_encrypt - Invalid algorithm
[Check 9] Test psa_asymmetric_encrypt - Invalid key type
[Check 10] Test psa_asymmetric_encrypt - Invalid usage
[Check 11] Test psa_asymmetric_encrypt - RSA PKCS1V15 - Salt
[Check 12] Test psa_asymmetric_encrypt - ECC public key
[Check 13] Test psa_asymmetric_encrypt - Invalid key handle
[Check 14] Test psa_asymmetric_encrypt - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 240 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_asymmetric_decrypt - RSA KEY_PAIR PKCS1V15
[Check 2] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256
[Check 3] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256 with label
[Check 4] Test psa_asymmetric_decrypt - Invalid key type (RSA public key)
[Check 5] Test psa_asymmetric_decrypt - Small output buffer
[Check 6] Test psa_asymmetric_decrypt - Invalid algorithm
[Check 7] Test psa_asymmetric_decrypt - Invalid key type (AES Key)
[Check 8] Test psa_asymmetric_decrypt - Invalid usage
[Check 9] Test psa_asymmetric_decrypt - RSA PKCS1V15 - Salt
[Check 10] Test psa_asymmetric_decrypt - Invalid key handle
[Check 11] Test psa_asymmetric_decrypt - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 241 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_sign_hash
[Info] Executing tests from non-secure
[Check 1] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 3] Test psa_sign_hash - ECDSA SECP256R1 SHA-256
[Check 4] Test psa_sign_hash - Invalid key type (RSA public key)
[Check 5] Test psa_sign_hash - Small output buffer
[Check 6] Test psa_sign_hash - Invalid algorithm
[Check 7] Test psa_sign_hash - Invalid key type (AES Key)
[Check 8] Test psa_sign_hash - Invalid usage
[Check 9] Test psa_sign_hash - Wrong hash size
[Check 10] Test psa_sign_hash - Invalid key handle
[Check 11] Test psa_sign_hash - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 242 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_verify_hash
[Info] Executing tests from non-secure
[Check 1] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 3] Test psa_verify_hash - ECDSA KEY_PAIR SECP256R1 SHA-256
[Check 4] Test psa_verify_hash - EC public key
[Check 5] Test psa_verify_hash - RSA public key
[Check 6] Test psa_verify_hash - Small output buffer
[Check 7] Test psa_verify_hash - Invalid algorithm
[Check 8] Test psa_verify_hash - Invalid key type (AES Key)
[Check 9] Test psa_verify_hash - Invalid usage
[Check 10] Test psa_verify_hash - Wrong hash size
[Check 11] Test psa_verify_hash - Wrong signature
[Check 12] Test psa_verify_hash - Wrong signature size
[Check 13] Test psa_verify_hash - Invalid key handle
[Check 14] Test psa_verify_hash - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 243 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_raw_key_agreement
[Info] Executing tests from non-secure
[Check 1] Test psa_raw_key_agreement - ECDH SECP256R1
[Check 2] Test psa_raw_key_agreement - Small buffer size
[Check 3] Test psa_raw_key_agreement - ECDH SECP384R1
[Check 4] Test psa_raw_key_agreement - Invalid usage
[Check 5] Test psa_raw_key_agreement - Unknown KDF
[Check 6] Test psa_raw_key_agreement - Not a key agreement alg
[Check 7] Test psa_raw_key_agreement - Public key on different curve
[Check 8] Test psa_raw_key_agreement - Public key instead of private key
[Check 9] Test psa_raw_key_agreement - Invalid key handle
[Check 10] Test psa_raw_key_agreement - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 244 | DESCRIPTION: Testing crypto key management APIs | UT: psa_copy_key
[Info] Executing tests from non-secure
[Check 1] Test psa_copy_key - 2048 RSA public key
[Check 2] Test psa_copy_key - RSA 2048 keypair
[Check 3] Test psa_copy_key - Incompatible target policy(source and target)
[Check 4] Test psa_copy_key - source key with no export usage
[Check 5] Test psa_copy_key - DES 64 bit key
[Check 6] Test psa_copy_key - Triple DES 2-Key
[Check 7] Test psa_copy_key - Triple DES 3-Key
[Check 8] Test psa_copy_key - EC Public key
[Check 9] Test psa_copy_key - EC keypair
TEST RESULT: PASSED
******************************************
TEST: 245 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_clone
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_clone - MD5 algorithm
[Check 2] Test psa_hash_clone - RIPEMD160 algorithm
[Check 3] Test psa_hash_clone - SHA1 algorithm
[Check 4] Test psa_hash_clone - SHA224 algorithm
[Check 5] Test psa_hash_clone - SHA256 algorithm
[Check 6] Test psa_hash_clone - SHA384 algorithm
[Check 7] Test psa_hash_clone - SHA512 algorithm
[Check 8] Test psa_hash_clone - from an inactive source operation
[Check 9] Test psa_hash_clone - on an active target operation
TEST RESULT: PASSED
******************************************
TEST: 246 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_compute
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_compute HMAC SHA 224
[Check 2] Test psa_mac_compute - Incompactible HMAC for CMAC
[Check 3] Test psa_mac_compute - Invalid usage
[Check 4] Test psa_mac_compute - truncated MAC too small
[Check 5] Test psa_mac_compute - truncated MAC too large
[Check 6] Test psa_mac_compute - bad algorithm (unknown MAC algorithm)
[Check 7] Test psa_mac_compute HMAC SHA 256
[Check 8] Test psa_mac_compute HMAC SHA 512
[Check 9] Test psa_mac_compute HMAC SHA 224 (truncated to 8 Byte)
[Check 10] Test psa_mac_compute CMAC AES 128
[Check 11] Test psa_mac_compute small size buffer
[Check 12] Test psa_mac_compute - Invalid key type
TEST RESULT: PASSED
******************************************
TEST: 247 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify HMAC SHA 224
[Check 2] Test psa_mac_verify HMAC SHA 256
[Check 3] Test psa_mac_verify - Incompactible HMAC for CMAC
[Check 4] Test psa_mac_verify - Invalid usage
[Check 5] Test psa_mac_verify - Truncated MAC too large
[Check 6] Test psa_mac_verify - Truncated MAC too small
[Check 7] Test psa_mac_verify - bad algorithm (unknown MAC algorithm)
[Check 8] Test psa_mac_verify HMAC SHA 512
[Check 9] Test psa_mac_verify HMAC SHA 224 (truncated to 8 Byte)
[Check 10] Test psa_mac_verify CMAC AES 128
[Check 11] Test psa_mac_verify - Invalid key type
[Check 12] Test psa_mac_verify small size buffer
[Check 13] Test psa_mac_verify incorrect expected MAC
TEST RESULT: PASSED
******************************************
TEST: 248 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING (Short input)
[Check 3] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_encrypt - Encrypt - AES CTR
[Check 6] Test psa_cipher_encrypt - Encrypt - AES CTR (short input)
[Check 7] Test psa_cipher_encrypt - Encrypt - DES CBC (nopad)
[Check 8] Test psa_cipher_encrypt - Encrypt - 2-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_encrypt - Encrypt - 3-key 3DE -CBC (nopad)
[Check 10] Test psa_cipher_encrypt - small output buffer size
[Check 11] Test psa_cipher_encrypt - Decrypt - AES CBC_NO_PADDING
TEST RESULT: PASSED
******************************************
TEST: 249 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_decrypt - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING
[Check 3] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING (Short input)
[Check 4] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING
[Check 5] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7
[Check 6] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7 (Short input)
[Check 7] Test psa_cipher_decrypt - Decrypt - AES CTR
[Check 8] Test psa_cipher_decrypt - Decrypt - DES CBC (nopad)
[Check 9] Test psa_cipher_decrypt - Decrypt - 2-key 3DE -CBC (nopad)
[Check 10] Test psa_cipher_decrypt - 3-key 3DE -CBC (nopad)
TEST RESULT: PASSED
******************************************
TEST: 250 | DESCRIPTION: Testing crypto key management APIs | UT: psa_sign_message
[Info] Executing tests from non-secure
[Check 1] Test psa_sign_message - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_sign_message - ECDSA SECP256R1 SHA-256
[Check 3] Test psa_sign_message - Invalid key type (RSA public key)
[Check 4] Test psa_sign_message - Small output buffer
[Check 5] Test psa_sign_message - Invalid algorithm
[Check 6] Test psa_sign_message - Invalid key type (AES Key)
[Check 7] Test psa_sign_message - Invalid usage
[Check 8] Test psa_sign_message - Mismatch key type and Algorithm
[Check 9] Test psa_sign_message - Alg mismatch in key and API call
[Check 10] Test psa_sign_message - Invalid key handle
[Check 11] Test psa_sign_message - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 251 | DESCRIPTION: Testing crypto key management APIs | UT: psa_verify_message
[Info] Executing tests from non-secure
[Check 1] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_verify_message - RSA Public Key PKCS1V15 RAW
[Check 3] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 4] Test psa_verify_message - ECDSA KEY_PAIR SECP256R1 SHA-256
[Check 5] Test psa_verify_message - ECDSA Public Key SECP256R1 SHA-256
[Check 6] Test psa_verify_message - Small output buffer
[Check 7] Test psa_verify_message - Invalid algorithm
[Check 8] Test psa_verify_message - Invalid key type (AES Key)
[Check 9] Test psa_verify_message - Invalid usage
[Check 10] Test psa_verify_message - Wrong message size
[Check 11] Test psa_verify_message - Wrong signature
[Check 12] Test psa_verify_message - Wrong signature size
[Check 13] Test psa_verify_message - Invalid key handle
[Check 14] Test psa_verify_message - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 252 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_encrypt_setup - CCM - AES
[Check 2] Test psa_aead_encrypt_setup - CCM - AES - Tag length = 4
[Check 3] Test psa_aead_encrypt_setup - CCM - AES - Mismatched tag length
[Check 4] Test psa_aead_encrypt_setup - CCM - AES - Default Tag length
[Check 5] Test psa_aead_encrypt_setup - GCM - AES
[Check 6] Test psa_aead_encrypt_setup - CCM - DES Invalid key
[Check 7] Test psa_aead_encrypt_setup - Invalid usage flag
TEST RESULT: PASSED
******************************************
TEST: 253 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_decrypt_setup - CCM - AES
[Check 2] Test psa_aead_decrypt_setup - CCM - AES - Tag length = 4
[Check 3] Test psa_aead_decrypt_setup - CCM - AES - Mismatched tag length
[Check 4] Test psa_aead_decrypt_setup - CCM - AES - Default Tag length
[Check 5] Test psa_aead_decrypt_setup - GCM - AES
[Check 6] Test psa_aead_decrypt_setup - CCM - DES Invalid key
[Check 7] Test psa_aead_decrypt_setup - Invalid usage flag
TEST RESULT: PASSED
******************************************
TEST: 254 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_generate_nonce
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_generate_nonce - CCM
[Check 2] Test psa_aead_generate_nonce - CCM - Tag length = 4
[Check 3] Test psa_aead_generate_nonce - CCM - Small buffer size
[Check 4] Test psa_aead_generate_nonce - CCM - Uninitialized operation
[Check 5] Test psa_aead_generate_nonce - CCM - Decrypt operation
[Check 6] Test psa_aead_generate_nonce - GCM
[Check 7] Test psa_aead_generate_nonce - GCM - Decrypt operation
TEST RESULT: PASSED
******************************************
TEST: 255 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_nonce
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_set_nonce - Encrypt - CCM
[Check 2] Test psa_aead_set_nonce - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_set_nonce - Encrypt - CCM - Small nonce size
[Check 4] Test psa_aead_set_nonce - Encrypt - CCM - Large nonce size
[Check 5] Test psa_aead_set_nonce - Encrypt - CCM - Invalid operation state
[Check 6] Test psa_aead_set_nonce - Encrypt - GCM
[Check 7] Test psa_aead_set_nonce - Decrypt - CCM
[Check 8] Test psa_aead_set_nonce - Decrypt - CCM - Tag length = 4
[Check 9] Test psa_aead_set_nonce - Decrypt - CCM - Small nonce size
[Check 10] Test psa_aead_set_nonce - Decrypt - CCM - Large nonce size
[Check 11] Test psa_aead_set_nonce - Decrypt - CCM - Invalid operation state
[Check 12] Test psa_aead_set_nonce - Decrypt - GCM
TEST RESULT: PASSED
******************************************
TEST: 256 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_lengths
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_set_lengths - Encrypt - CCM
[Check 2] Test psa_aead_set_lengths - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_set_lengths - Encrypt - CCM - Zero ad_length
[Check 4] Test psa_aead_set_lengths - Encrypt - CCM - Zero plaintext_length
[Check 5] Test psa_aead_set_lengths - Encrypt - CCM - Invalid operation state
[Check 6] Test psa_aead_set_lengths - Encrypt - GCM
[Check 7] Test psa_aead_set_lengths - Decrypt - CCM
[Check 8] Test psa_aead_set_lengths - Decrypt - CCM - Tag length = 4
[Check 9] Test psa_aead_set_lengths - Decrypt - CCM - Zero ad_length
[Check 10] Test psa_aead_set_lengths - Decrypt - CCM - Zero plaintext_length
[Check 11] Test psa_aead_set_lengths - Decrypt - CCM - Invalid operation state
[Check 12] Test psa_aead_set_lengths - Decrypt - GCM
TEST RESULT: PASSED
******************************************
TEST: 257 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update_ad
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_update_ad - Encrypt - CCM
[Check 2] Test psa_aead_update_ad - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_update_ad - Encrypt - CCM - Zero ad_length
[Check 4] Test psa_aead_update_ad - Encrypt - CCM - Zero plaintext_length
[Check 5] Test psa_aead_update_ad - Encrypt - CCM - Invalid operation state
[Check 6] Test psa_aead_update_ad - Encrypt - CCM - Overflow input length
[Check 7] Test psa_aead_update_ad - Decrypt - CCM
[Check 8] Test psa_aead_update_ad - Decrypt - CCM - Tag length = 4
[Check 9] Test psa_aead_update_ad - Decrypt - CCM - Zero ad_length
[Check 10] Test psa_aead_update_ad - Decrypt - CCM - Zero plaintext_length
[Check 11] Test psa_aead_update_ad - Decrypt - CCM - Invalid operation state
[Check 12] Test psa_aead_update_ad - Decrypt - CCM - Overflow input length
TEST RESULT: PASSED
******************************************
TEST: 258 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_update - Encrypt - CCM
[Check 2] Test psa_aead_update - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_update - Encrypt - CCM - Zero ad_length
[Check 4] Test psa_aead_update - Encrypt - CCM - Zero plaintext_length
[Check 5] Test psa_aead_update - Encrypt - CCM - Small buffer size
[Check 6] Test psa_aead_update - Encrypt - CCM - Less add data than specified
[Check 7] Test psa_aead_update - Encrypt - CCM - Overflow input length
[Check 8] Test psa_aead_update - Encrypt - CCM - Invalid operation state
[Check 9] Test psa_aead_update - Decrypt - CCM
[Check 10] Test psa_aead_update - Decrypt - CCM - Tag length = 4
[Check 11] Test psa_aead_update - Decrypt - CCM - Zero ad_length
[Check 12] Test psa_aead_update - Decrypt - CCM - Zero plaintext_length
[Check 13] Test psa_aead_update - Decrypt - CCM - Small buffer size
[Check 14] Test psa_aead_update - Decrypt - Less add data than specified
[Check 15] Test psa_aead_update - Decrypt - CCM - Overflow input length
[Check 16] Test psa_aead_update - Decrypt - CCM - Invalid operation state
TEST RESULT: PASSED
******************************************
TEST: 259 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_finish - AES-CCM
[Check 2] Test psa_aead_finish - AES-CCM 24 bytes Tag length = 4
[Check 3] Test psa_aead_finish - Small buffer size
[Check 4] Test psa_aead_finish - Input length is less than plaintext length
[Check 5] Test psa_aead_finish - GCM - 16B AES - 12B Nonce & 12B additional data
TEST RESULT: PASSED
******************************************
TEST: 260 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_abort - Encrypt - CCM - AES
[Check 2] Test psa_aead_abort - Encrypt - GCM - AES
[Check 3] Test psa_aead_abort - Decrypt - CCM - AES
[Check 4] Test psa_aead_abort - Decrypt - GCM - AES
[Check 5] Test psa_aead_abort with all initializations
TEST RESULT: PASSED
******************************************
TEST: 261 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_verify - AES-CCM
[Check 2] Test psa_aead_verify - AES-CCM 24 bytes Tag length = 4
[Check 3] Test psa_aead_verify - Small buffer size
[Check 4] Test psa_aead_verify - Input length is less than plaintext length
[Check 5] Test psa_aead_verify - GCM - 16B AES - 12B Nounce & 12B addi data
TEST RESULT: PASSED
******************************************
************ Crypto Suite Report **********
TOTAL TESTS : 61
TOTAL PASSED : 61
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
Entering standby..
```
```
```lines=12
#LD_PRELOAD=/mnt/host/out/ts-install/arm-linuxt/shared/lib/libts.so /mnt/host/out/ts-install/arm-linuxt/shared/bin/psa-iat-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Attestation Suite
******************************************
TEST: 601 | DESCRIPTION: Testing attestation initial attestation APIs | UT: psa_initial_attestation
[Info] Executing tests from non-secure
[Check 1] Test psa_initial_attestation_get_token with Challenge 32
[Check 2] Test psa_initial_attestation_get_token with Challenge 48
[Check 3] Test psa_initial_attestation_get_token with Challenge 64
[Check 4] Test psa_initial_attestation_get_token with zero challenge size
[Check 5] Test psa_initial_attestation_get_token with small challenge size
[Check 6] Test psa_initial_attestation_get_token with invalid challenge size
[Check 7] Test psa_initial_attestation_get_token with large challenge size
[Check 8] Test psa_initial_attestation_get_token with zero as token size
[Check 9] Test psa_initial_attestation_get_token with small token size
[Check 10] Test psa_initial_attestation_get_token_size with Challenge 32
[Check 11] Test psa_initial_attestation_get_token_size with Challenge 48
[Check 12] Test psa_initial_attestation_get_token_size with Challenge 64
[Check 13] Test psa_initial_attestation_get_token_size with zero challenge size
[Check 14] Test psa_initial_attestation_get_token_size with small challenge size
[Check 15] Test psa_initial_attestation_get_token_size with invalid challenge size
[Check 16] Test psa_initial_attestation_get_token_size with large challenge size
TEST RESULT: PASSED
******************************************
************ Attestation Suite Report **********
TOTAL TESTS : 1
TOTAL PASSED : 1
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
Entering standby..
```
```
```lines=12
#LD_PRELOAD=/mnt/host/out/ts-install/arm-linuxt/shared/lib/libts.so /mnt/host/out/ts-install/arm-linuxt/shared/bin/psa-its-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Storage Suite
******************************************
TEST: 401 | DESCRIPTION: UID not found check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call get API for UID 6 which is not set
[Check 2] Call get_info API for UID 6 which is not set
[Check 3] Call remove API for UID 6 which is not set
[Check 4] Call get API for UID 6 which is removed
[Check 5] Call get_info API for UID 6 which is removed
[Check 6] Call remove API for UID 6 which is removed
Set storage for UID 6
[Check 7] Call get API for different UID 5
[Check 8] Call get_info API for different UID 5
[Check 9] Call remove API for different UID 5
TEST RESULT: PASSED
******************************************
TEST: 402 | DESCRIPTION: Write once error check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Update the flag of UID 1 with WRITE_ONCE flag
[Check 2] Try to remove the UID 1 having WRITE_ONCE flag
[Check 3] Create a new UID 2 with WRITE_ONCE flag
[Check 4] Try to remove the UID 2 having WRITE_ONCE flag
[Check 5] Try to change the length of write_once UID 2
[Check 6] Check UID removal still fails
[Check 7] Try to change the WRITE_ONCE flag to None for UID 2
[Check 8] Check UID removal still fails
TEST RESULT: PASSED
******************************************
TEST: 403 | DESCRIPTION: Insufficient space check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Overload storage space
UID 13 set failed due to insufficient space
Remove all registered UIDs
[Check 2] Overload storage again to verify all previous UID removed
UID 13 set failed due to insufficient space
Remove all registered UIDs
TEST RESULT: PASSED
******************************************
TEST: 404 | DESCRIPTION: Data Consistency check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2
[Check 2] Call get API with default length - TEST_BUFF_SIZE
TEST RESULT: PASSED
******************************************
TEST: 405 | DESCRIPTION: Success scenarios check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Set UID with data length zero and call storage APIs
[Check 2] Resetting the length check
TEST RESULT: PASSED
******************************************
TEST: 406 | DESCRIPTION: Check for storage create flags | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE
[Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY
[Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION
TEST RESULT: PASSED
******************************************
TEST: 407 | DESCRIPTION: Incorrect Size check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
Create a valid Storage - TEST_BUFF_SIZE/2
Increase the length of storage - TEST_BUFF_SIZE
[Check 1] Call get API with old length - TEST_BUFF_SIZE/2
[Check 2] Call get API with old length - TEST_BUFF_SIZE/4
Decrease the length of storage - TEST_BUFF_SIZE/4
[Check 3] Call get API with old length - TEST_BUFF_SIZE/2
[Check 4] Call get API with old length - TEST_BUFF_SIZE
[Check 5] Call get API with valid length - TEST_BUFF_SIZE/4
TEST RESULT: PASSED
******************************************
TEST: 408 | DESCRIPTION: Invalid offset check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Try to access data with varying valid offset
[Check 2] Try to access data with varying invalid offset
TEST RESULT: PASSED
******************************************
TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call set API with NULL pointer and data length 0
[Check 2] Call get API with NULL read buffer and data length 0
[Check 3] Remove the UID
[Check 4] Call get_info API to verify UID removed
[Check 5] Create UID with zero data_len and valid write buffer
[Check 8] Call get API with NULL read buffer and data length 0
[Check 9] Increase the length
TEST RESULT: PASSED
******************************************
TEST: 410 | DESCRIPTION: UID value zero check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Creating storage with UID 0 should fail
[Check 2] Get_info for UID 0 should fail
[Check 3] Removing storage with UID 0 should fail
TEST RESULT: PASSED
******************************************
************ Storage Suite Report **********
TOTAL TESTS : 10
TOTAL PASSED : 10
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
Entering standby..
```
```
```lines=12
#LD_PRELOAD=/mnt/host/out/ts-install/arm-linuxt/shared/lib/libts.so /mnt/host/out/ts-install/arm-linuxt/shared/bin/psa-ps-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Storage Suite
******************************************
TEST: 401 | DESCRIPTION: UID not found check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call get API for UID 6 which is not set
[Check 2] Call get_info API for UID 6 which is not set
[Check 3] Call remove API for UID 6 which is not set
[Check 4] Call get API for UID 6 which is removed
[Check 5] Call get_info API for UID 6 which is removed
[Check 6] Call remove API for UID 6 which is removed
Set storage for UID 6
[Check 7] Call get API for different UID 5
[Check 8] Call get_info API for different UID 5
[Check 9] Call remove API for different UID 5
TEST RESULT: PASSED
******************************************
TEST: 402 | DESCRIPTION: Write once error check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Update the flag of UID 1 with WRITE_ONCE flag
[Check 2] Try to remove the UID 1 having WRITE_ONCE flag
[Check 3] Create a new UID 2 with WRITE_ONCE flag
[Check 4] Try to remove the UID 2 having WRITE_ONCE flag
[Check 5] Try to change the length of write_once UID 2
[Check 6] Check UID removal still fails
[Check 7] Try to change the WRITE_ONCE flag to None for UID 2
[Check 8] Check UID removal still fails
TEST RESULT: PASSED
******************************************
TEST: 403 | DESCRIPTION: Insufficient space check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Overload storage space
UID 13 set failed due to insufficient space
Remove all registered UIDs
[Check 2] Overload storage again to verify all previous UID removed
UID 13 set failed due to insufficient space
Remove all registered UIDs
TEST RESULT: PASSED
******************************************
TEST: 404 | DESCRIPTION: Data Consistency check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2
[ 31.11264234.396662] random: crng init done
[Check 2] Call get API with default length - TEST_BUFF_SIZE
TEST RESULT: PASSED
******************************************
TEST: 405 | DESCRIPTION: Success scenarios check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Set UID with data length zero and call storage APIs
[Check 2] Resetting the length check
TEST RESULT: PASSED
******************************************
TEST: 406 | DESCRIPTION: Check for storage create flags | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE
[Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY
[Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION
TEST RESULT: PASSED
******************************************
TEST: 407 | DESCRIPTION: Incorrect Size check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Create a valid Storage - TEST_BUFF_SIZE/2
Increase the length of storage - TEST_BUFF_SIZE
[Check 1] Call get API with old length - TEST_BUFF_SIZE/2
[Check 2] Call get API with old length - TEST_BUFF_SIZE/4
Decrease the length of storage - TEST_BUFF_SIZE/4
[Check 3] Call get API with old length - TEST_BUFF_SIZE/2
[Check 4] Call get API with old length - TEST_BUFF_SIZE
[Check 5] Call get API with valid length - TEST_BUFF_SIZE/4
TEST RESULT: PASSED
******************************************
TEST: 408 | DESCRIPTION: Invalid offset check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Try to access data with varying valid offset
[Check 2] Try to access data with varying invalid offset
TEST RESULT: PASSED
******************************************
TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call set API with NULL pointer and data length 0
[Check 2] Call get API with NULL read buffer and data length 0
[Check 3] Remove the UID
[Check 4] Call get_info API to verify UID removed
[Check 5] Create UID with zero data_len and valid write buffer
[Check 8] Call get API with NULL read buffer and data length 0
[Check 9] Increase the length
TEST RESULT: PASSED
******************************************
TEST: 410 | DESCRIPTION: UID value zero check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Creating storage with UID 0 should fail
[Check 2] Get_info for UID 0 should fail
[Check 3] Removing storage with UID 0 should fail
TEST RESULT: PASSED
******************************************
TEST: 411 | DESCRIPTION: Optional APIs: UID not found check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 412 | DESCRIPTION: Optional APIs: Invalid arguments and offset invalid | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 413 | DESCRIPTION: Set_Extended and Create api : Success | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 414 | DESCRIPTION: Optional APIs not supported check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Optional PS APIs are not supported.
[Check 1] Call to create API should fail as API not supported
Failed at Checkpoint: 1
Actual: 0
Expected: -134
TEST RESULT: FAILED (Error Code=0x1)
******************************************
TEST: 415 | DESCRIPTION: Create API write_once flag value check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 416 | DESCRIPTION: Storage assest capacity modification check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs not are supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 417 | DESCRIPTION: Storage assest capacity modification check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs not are supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
************ Storage Suite Report **********
TOTAL TESTS : 17
TOTAL PASSED : 10
TOTAL SIM ERROR : 0
TOTAL FAILED : 1
TOTAL SKIPPED : 6
******************************************
Entering standby..
```
**Component test (linux-pc)**
```lines=12
LD_PRELOAD=trusted-services/tools/b-test/install/linux-pc/lib/libts.so
o trusted-services/tools/b-test/install/linux-pc/bin/component-test -v
TEST(BlockVolumeTests, oversizeWrite) - 1 ms
TEST(BlockVolumeTests, multipleImageInstall) - 0 ms
TEST(BlockVolumeTests, seekAccess) - 0 ms
TEST(BlockVolumeTests, readAndWrite) - 0 ms
TEST(BlockVolumeTests, openClose) - 0 ms
IGNORE_TEST(PartitionTableTests, detectCorruptedGptHeader) - 0 ms
TEST(PartitionTableTests, detectCorruptedMbr) - 1 ms2 ms
TEST(PartitionTableTests, loadRefPartitionTable) - 0 ms1 ms
TEST(GptIteratorTests, iterateOverRefGpt) - 0 ms
TEST(UefiVariableStoreTests, noRemoveCheck) - 0 ms1 ms
TEST(UefiVariableStoreTests, readOnlycheck) - 1 ms0 ms
TEST(UefiVariableStoreTests, unsupportedAttribute) - 0 ms
TEST(UefiVariableStoreTests, failedNvSet) - 0 ms
TEST(UefiVariableStoreTests, enumerateStoreContents) - 0 ms
TEST(UefiVariableStoreTests, runtimeAccess) - 0 ms
TEST(UefiVariableStoreTests, bootServiceAccess) - 0 ms
TEST(UefiVariableStoreTests, removePersistent) - 0 ms
TEST(UefiVariableStoreTests, removeVolatile) - 0 ms
TEST(UefiVariableStoreTests, getWithSmallBuffer) - 0 ms
TEST(UefiVariableStoreTests, persistentSetGet) - 0 ms
TEST(UefiVariableStoreTests, setGetRoundtrip) - 0 ms
TEST(UefiVariableIndexTests, setCheckConstraintsNonExistingVar) - 0 ms
TEST(UefiVariableIndexTests, setCheckConstraintsExistingVar) - 0 ms
TEST(UefiVariableIndexTests, checkIterator) - 0 ms
TEST(UefiVariableIndexTests, removeVariable) - 0 ms
TEST(UefiVariableIndexTests, dumpBufferTooSmall) - 0 ms
TEST(UefiVariableIndexTests, dumpLoadRoadtrip) - 0 ms
TEST(UefiVariableIndexTests, enumerateStore) - 0 ms
TEST(UefiVariableIndexTests, variableIndexFull) - 0 ms
TEST(UefiVariableIndexTests, addWithOversizedName) - 0 ms
TEST(UefiVariableIndexTests, emptyIndexOperations) - 0 ms
TEST(SfsBlockStoreTests, psCreateAndSetExtended) - 0 ms
TEST(SfsBlockStoreTests, psCreateAndSet) - 0 ms
TEST(SfsBlockStoreTests, itsStorageLimitTest) - 0 ms
TEST(SfsBlockStoreTests, itsStoreNewItem) - 0 ms1 ms
TEST(SfsRamTests, psCreateAndSetExtended) - 0 ms
TEST(SfsRamTests, psCreateAndSet) - 0 ms
TEST(SfsRamTests, itsStorageLimitTest) - 0 ms
TEST(SfsRamTests, itsStoreNewItem) - 0 ms
TEST(MockStoreTests, psCreateAndSetExtended) - 0 ms
TEST(MockStoreTests, psCreateAndSet) - 0 ms
TEST(MockStoreTests, itsStorageLimitTest) - 0 ms
TEST(MockStoreTests, itsStoreNewItem) - 0 ms
TEST(SecureStorageProxyTests, psCreateAndSetExtended) - 0 ms
TEST(SecureStorageProxyTests, psCreateAndSet) - 0 ms
TEST(SecureStorageProxyTests, itsStorageLimitTest) - 0 ms
TEST(SecureStorageProxyTests, itsStoreNewItem) - 0 ms
TEST(SecureStorageClientTests, psCreateAndSetExtended) - 0 ms
TEST(SecureStorageClientTests, psCreateAndSet) - 0 ms
TEST(SecureStorageClientTests, itsStorageLimitTest) - 0 ms
TEST(SecureStorageClientTests, itsStoreNewItem) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkKeyUsage) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkKeyLifetime) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkAlg) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkDhGroup) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkEccCurve) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkKeyType) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkKeyUsage) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkKeyLifetime) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkAlg) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkDhGroup) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkEccCurve) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkKeyType) - 0 ms
TEST(CryptoProtocolOpcodeChecks, checkPackedcToProtobuf) - 0 ms
TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 1 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 0 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 0 ms
TEST(CryptoMacServicePackedcTests, macAbort) - 0 ms
TEST(CryptoMacServicePackedcTests, signAndVerify) - 0 ms1 ms
TEST(CryptoCipherServicePackedcTests, cipherAbort) - 0 ms
TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 1 ms0 ms
TEST(CryptoHashServicePackedcTests, hashAbort) - 0 ms
TEST(CryptoHashServicePackedcTests, hashAndVerify) - 0 ms
TEST(CryptoHashServicePackedcTests, calculateHash) - 0 ms
TEST(CryptoServicePackedcTests, generateRandomNumbers) - 0 ms
TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 18 ms1 ms
TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 0 ms1 ms
TEST(CryptoServicePackedcTests, signAndVerifyEat) - 3 ms
TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 3 ms
TEST(CryptoServicePackedcTests, signAndVerifyHash) - 3 ms
TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 0 ms1 ms
TEST(CryptoServicePackedcTests, exportPublicKey) - 0 ms
TEST(CryptoServicePackedcTests, purgeKey) - 1 ms0 ms
TEST(CryptoServicePackedcTests, - 0 mscopyKey) - 2 ms
TEST(CryptoServicePackedcTests, generatePersistentKeys) - 1 ms0 ms
TEST(CryptoServicePackedcTests, generateVolatileKeys) - 0 ms1 ms
TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 0 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 7 ms- 24 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 1 ms
TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 3 ms
TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 2 ms4 ms
TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 1 ms0 ms
TEST(CryptoServiceProtobufTests, exportPublicKey) - 0 ms1 ms
TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 1 ms0 ms
TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 0 ms1 ms
TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 76 ms102 ms
TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 18 ms21 ms
TEST(CryptoFaultTests, randomNumbersWithBrokenStorage) - 0 ms
TEST(CryptoFaultTests, persistentKeysWithBrokenStorage) - 1 ms
TEST(CryptoFaultTests, volatileKeyWithBrokenStorage) - 0 ms
TEST(PocCryptoOpTests, checkOpSequence) - 1 ms
TEST(CryptoMsgTests, SignHashOutMsgTest) - 0 ms
TEST(CryptoMsgTests, SignHashInMsgTest) - 0 ms
TEST(CryptoMsgTests, ExportPublicKeyOutMsgTest) - 0 ms
TEST(CryptoMsgTests, ExportPublicKeyInMsgTest) - 0 ms
TEST(CryptoMsgTests, GenerateKeyInMsgTest) - 0 ms
TEST(CryptoContextPoolTests, multipleContexts) - 0 ms
TEST(CryptoContextPoolTests, singleContext) - 0 ms
TEST(CryptoContextPoolTests, checkEmptyPool) - 0 ms
TEST(FwuUpdateFmpTests, wholeFmpFlow) - 0 ms
TEST(FwuOversizeImageTests, oversizeInstallMultiLocationEndStaging) - 1 ms0 ms
TEST(FwuOversizeImageTests, oversizeInstallEndStaging) - 0 ms
TEST(FwuOversizeImageTests, oversizeInstallCancelStaging) - 0 ms1 ms
TEST(FwuOversizeImageTests, maxSizeInstall) - 0 ms
TEST(FwuRollbackTests, bootloaderFallback) - 0 ms
TEST(FwuRollbackTests, selectPreviousAfterActivation) - 0 ms
TEST(FwuRollbackTests, selectPreviousPriorToActivation) - 1 ms0 ms
TEST(FwuPowerFailureTests, powerFailureDuringTrial) - 0 ms1 ms
TEST(FwuPowerFailureTests, powerFailureDuringStaging) - 1 ms
TEST(FwuUpdateScenarioTests, partialFirmwareUpdateFlow) - 0 ms1 ms
TEST(FwuUpdateScenarioTests, wholeFirmwareUpdateFlow) - 0 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInTrial) - 1 ms0 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInStaging) - 0 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInRegular) - 0 ms1 ms
TEST(FwuImageDirectoryTests, zeroFwLocations) - 0 ms
TEST(FwuImageDirectoryTests, multipleFwLocations) - 0 ms
TEST(FwuImageDirectoryTests, singleFwLocation) - 0 ms
TEST(FwuImageDirectoryTests, streamRecycling) - 0 ms
TEST(FwuImageDirectoryTests, streamedReads) - 1 ms
TEST(FwuDefaultInstallerFactoryTests, configureInstallersFlow) - 0 ms
TEST(FwuCopyInstallerTests, installAndCopy) - 0 ms
TEST(FwuRawInstallerTests, normalInstallFlow) - 1 ms
TEST(FwuMetadataV2Tests, checkImgBankInfoStructure) - 0 ms
TEST(FwuMetadataV2Tests, checkImgEntryStructure) - 0 ms
TEST(FwuMetadataV2Tests, checkFwStoreDescStructure) - 0 ms
TEST(FwuMetadataV2Tests, checkHeaderStructure) - 0 ms
TEST(FwuMetadataManagerTests, checkAndRepairInaccessibleStorage) - 0 ms
TEST(FwuMetadataManagerTests, checkAndRepairAccessibleStorage) - 1 ms
TEST(PartitionedBlockStoreTests, writeToInvalidBlock) - 0 ms
TEST(PartitionedBlockStoreTests, checkEraseLimits) - 0 ms1 ms
TEST(PartitionedBlockStoreTests, writeReadEraseBlock) - 0 ms
TEST(PartitionedBlockStoreTests, openClose) - 0 ms
TEST(PartitionedBlockStoreTests, getPartitionInfo) - 0 ms
TEST(FileBlockStoreTests, initWithExistingDiskImage) - 2 ms0 ms
TEST(FileBlockStoreTests, wholeBlockRw) - 0 ms
TEST(RamBlockStoreTests, eraseOperations) - 0 ms
TEST(RamBlockStoreTests, writeToInvalidBlock) - 0 ms
TEST(RamBlockStoreTests, writeBiggerThanBlock) - 0 ms
TEST(RamBlockStoreTests, writeReadEraseBlock) - 0 ms
TEST(RamBlockStoreTests, openClose) - 0 ms
TEST(RamBlockStoreTests, getPartitionInfo) - 0 ms
TEST(AttestationProvisioningTests, provisionedIak) - 0 ms1 ms
TEST(AttestationProvisioningTests, selfGeneratedIak) - 1 ms0 ms
TEST(AttestationServiceTests, repeatedOperation) - 55 ms62 ms
TEST(AttestationServiceTests, invalidChallengeLen) - 0 ms
TEST(AttestationServiceTests, checkTokenSize) - 2 ms1 ms
TEST(AttestationReporterTests, createReport) - 1 ms2 ms
TEST(TcgEventLogTests, interateBootMeasurements) - 0 ms
TEST(DiscoveryServiceTests, checkServiceInfo) - 0 ms
TEST(ServiceNameTests, readService) - 0 ms
TEST(ServiceNameTests, checkFields) - 0 ms
TEST(ServiceNameTests, checkInvalidServiceNames) - 0 ms
TEST(ServiceNameTests, checkValidServiceNames) - 0 ms
TEST(ServiceFrameworkTests, serviceProviderChain) - 0 ms
TEST(ServiceFrameworkTests, serviceWithOps) - 0 ms
TEST(ServiceFrameworkTests, serviceWithNoOps) - 0 ms
TEST(ffarpc_call_ep, request_deny_64_bit) - 0 ms
TEST(ffarpc_call_ep, request_with_data_after_unshare) - 1 ms0 ms
TEST(ffarpc_call_ep, request_with_data_buffer_overflow) - 0 ms
TEST(ffarpc_call_ep, request_with_data) - 0 ms
TEST(ffarpc_call_ep, request_without_data_non_zero_length) - 0 ms
TEST(ffarpc_call_ep, request_without_data) - 0 ms
TEST(ffarpc_call_ep, invalid_mgmt_call) - 0 ms
TEST(ffarpc_call_ep, mem_unshare_null_ep) - 0 ms
TEST(ffarpc_call_ep, mem_share_unshare_relinquish_fail_then_success) - 0 ms
TEST(ffarpc_call_ep, mem_share_unshare_relinquish_fail) - 0 ms
TEST(ffarpc_call_ep, mem_share_unshare) - 0 ms
TEST(ffarpc_call_ep, mem_unshare) - 0 ms
TEST(ffarpc_call_ep, mem_share_null_ep) - 0 ms
TEST(ffarpc_call_ep, mem_share_smaller_page_count_relinquish_fail) - 0 ms
TEST(ffarpc_call_ep, mem_share_smaller_page_count) - 0 ms
TEST(ffarpc_call_ep, mem_share_retrieve_fail) - 0 ms
TEST(ffarpc_call_ep, mem_share_fill_all) - 0 ms
TEST(ffarpc_call_ep, mem_share) - 0 ms1 ms
TEST(ffarpc_caller, end) - 0 ms
TEST(ffarpc_caller, end_null_handle) - 0 ms
TEST(ffarpc_caller, end_null_context) - 0 ms
TEST(ffarpc_caller, invoke_without_response) - 0 ms
TEST(ffarpc_caller, invoke_with_response) - 0 ms
TEST(ffarpc_caller, invoke_invalid_resp_len) - 0 ms
TEST(ffarpc_caller, invoke_send_direct_req_fail) - 0 ms
TEST(ffarpc_caller, invoke_resp_long_req) - 0 ms
TEST(ffarpc_caller, invoke_resp_no_begin) - 0 ms
TEST(ffarpc_caller, invoke_resp_len_null) - 0 ms
TEST(ffarpc_caller, invoke_resp_buf_null) - 0 ms
TEST(ffarpc_caller, invoke_opstatus_null) - 0 ms
TEST(ffarpc_caller, invoke_handle_context_diff) - 0 ms
TEST(ffarpc_caller, invoke_null_context) - 0 ms
TEST(ffarpc_caller, begin_without_buffer) - 0 ms
TEST(ffarpc_caller, begin_with_buffer) - 0 ms
TEST(ffarpc_caller, begin_not_opened) - 0 ms
TEST(ffarpc_caller, begin_too_large_req) - 0 ms
TEST(ffarpc_caller, begin_transaction_in_progress) - 0 ms
TEST(ffarpc_caller, begin_null_buffer) - 0 ms
TEST(ffarpc_caller, begin_null_context) - 0 ms
TEST(ffarpc_caller, close_success) - 0 ms
TEST(ffarpc_caller, close_endpoint_and_mem_reclaim_fail) - 0 ms
TEST(ffarpc_caller, close_mem_reclaim_fail) - 0 ms
TEST(ffarpc_caller, close_send_direct_msg_fail) - 0 ms
TEST(ffarpc_caller, close_not_opened) - 0 ms
TEST(ffarpc_caller, open_success) - 0 ms
TEST(ffarpc_caller, open_send_direct_req_rpc_status_fail_reclaim_fail) - 0 ms
TEST(ffarpc_caller, open_send_direct_req_rpc_status_fail) - 0 ms
TEST(ffarpc_caller, open_send_direct_req_fail) - 0 ms
TEST(ffarpc_caller, open_share_fail) - 0 ms
TEST(ffarpc_caller, open_invalid_mem_size) - 0 ms
TEST(ffarpc_caller, open_already_opened) - 0 ms
TEST(ffarpc_caller, discover_more_max_cnt) - 1 ms0 ms
TEST(ffarpc_caller, discover_less_max_cnt) - 0 ms
TEST(ffarpc_caller, discover) - 0 ms
TEST(ffarpc_caller, discover_rx_release_fail) - 0 ms
TEST(ffarpc_caller, discover_rx_get_fail) - 0 ms
TEST(ffarpc_caller, discover_partition_info_get_fail) - 0 ms
TEST(ffarpc_caller, discover_invalid_arguments) - 0 ms
TEST(RpcStatusProtocolChecks, checkProtobufRpcStatusCodes) - 0 ms
TEST(ConfigRamstoreTests, checkMultipleConfig) - 0 ms
TEST(ConfigRamstoreTests, checkSingleConfig) - 0 ms
TEST(ConfigRamstoreTests, checkEmptyConfig) - 0 ms
TEST(Crc32Tests, multiPart) - 0 ms
TEST(Crc32Tests, longString) - 0 ms
TEST(Crc32Tests, shortString) - 0 ms
TEST(EndianTests, le64) - 0 ms
TEST(EndianTests, le32) - 0 ms
TEST(EndianTests, le16) - 0 ms
TEST(EndianTests, le8) - 0 ms
TEST(TlvTests, encodeWrongOrder) - 0 ms
TEST(TlvTests, encodeInsufficientSpace) - 0 ms
TEST(TlvTests, encodeRecords) - 0 ms
TEST(TlvTests, decodeBadRecords) - 0 ms
TEST(TlvTests, findAndDecodeMissingOptional) - 0 ms
TEST(TlvTests, findAndDecode) - 0 ms
TEST(TlvTests, decodeGoodRecords) - 0 ms
TEST(UuidTests, roundTrip) - 0 ms1 ms
TEST(UuidTests, checkNilUuidOperations) - 0 ms
TEST(UuidTests, checkIsEqualOperation) - 0 ms
TEST(UuidTests, checkOctetsFromCanonical) - 0 ms
TEST(UuidTests, parseValidUuidToGuidOctets) - 0 ms
TEST(UuidTests, parseError) - 0 ms
TEST(UuidTests, parseUuidInUrn) - 0 ms
TEST(UuidTests, parseValidUuidMixedCase) - 0 ms
TEST(UuidTests, parseValidUuidLowerCase) - 0 ms
TEST(TsDemoTests, runTsDemo) - 7 ms8 ms
OK (252 tests, 251 ran, 365136 checks, 1 ignored, 0 filtered out, 223 ms279 ms)
```
**LibTS test**
```
TEST(CryptoServicePackedcTests, generateRandomNumbers) - 1 ms
TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 5 ms
TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 1 ms
TEST(CryptoServicePackedcTests, signAndVerifyEat) - 3 ms
TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 2 ms
TEST(CryptoServicePackedcTests, signAndVerifyHash) - 3 ms
TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 0 ms
TEST(CryptoServicePackedcTests, exportPublicKey) - 0 ms
TEST(CryptoServicePackedcTests, purgeKey) - 1 ms
TEST(CryptoServicePackedcTests, copyKey) - 1 ms
TEST(CryptoServicePackedcTests, generatePersistentKeys) - 0 ms
TEST(CryptoServicePackedcTests, generateVolatileKeys) - 1 ms
TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 0 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 6 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 1 ms
TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 3 ms
TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 2 ms
TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 0 ms
TEST(CryptoServiceProtobufTests, exportPublicKey) - 1 ms
TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 0 ms
TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 1 ms
- 66 ms
TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 17 ms
TEST(PsServiceTests, createAndSetExtended) - 2 ms
TEST(PsServiceTests, createAndSet) - 0 ms
TEST(PsServiceTests, storeNewItem) - 0 ms
TEST(ItsServiceTests, storeNewItem) - 0 ms
OK (27 tests, 27 ran, 235 checks, 0 ignored, 0 filtered out, 117 ms)**Platform inspect test (arm-linux)**
```
**Platform inspect test**```lines=12
```#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/platform-inspect
attestation_report:
challenge: ba 13 ba ab 68 cd 58 ec 27 35 dc 67 06 81 3f e4 fd 5a 87 58 49 9b 52 2e 5b d4 7b 76 92 1e ce 0031 03 a3 a3 e5 e2 d8 1a ea e1 df 26 85 1c c0 2a 4d ac 4a 3e ba 32 15 53 0e f2 e3 fe 91 f6 8b 75
client_id: 0
boot_seed: e1 ae 36 db 01 4a 06 c8 9c e4 19 1b 08 2f af f1 16 ae 4d 36 61 82 82 e5 63 58 66 8d ec f5 e9 5dc 0b f2 64 34 7a 8c 68 ca ff 5f a4 e2 ff 90 70 25 64 be e1 13 90 58 97 42 b1 ce 4a d2 f8 7b 3a
security_lifecycle: 0
instance_id: 01 62 4b 81 d4 9a 0d 99 84 83 87 f3 4c 05 43 f5 1f 89 34 73 b6 b9 6a eb 12 ce af cf 25 62 22 f5 e69c d5 b1 3e 0b 88 a9 12 87 c7 1e 52 0d 58 39 92 a7 69 d9 58 bb 8a db 10 15 f0 77 c0 a1 25 63 32
implementation_id: 74 72 75 73 74 65 64 66 69 72 6d 77 61 72 65 2e 6f 72 67 2e 74 73 2e 7361 74 74 61 6e 65 73 74 61 6c74 69 6f 6e 655f 73 70
sw_components:
type: FW_CONFIG
digest: 5e 10 97 50 c0 cb 32 14 e6 e4 09 f7 12 ba 84 d6 d1 d6 e2 d4 45 8c 52 f3 d2 b9 6e ea 82 d4 e5 47
type: TB_FW_CONFIG
digest: dc 45 e2 c1 a9 f5 b1 81 9a 10 8e 8e 0f 0a 5e b2 e1 c1 94 00 73 ae 14 83 eb dd e1 f5 fe ac 72 5c
type: BL_2
digest: a8 4f b4 7b 54 d9 4b ab 49 73 63 f7 9b fc 66 cb 85 12 ab 18 6f 24 74 01 5d cf 33 f3 80 9e 9b 20d1 56 89 90 7e d8 98 71 72 47 fb 91 9e c2 0b 7b 5d 89 f4 07 ce 27 8d 37 54 20 d8 aa ea 92 30 ae
type: BL_31SECURE_RT_EL3
digest: 2f d3 43 6c 6f ef 9b 11 c2 16 dd 1f 8b df 9b a5 24 1499 56 5e 18 d3 ea 1b 8f 79 63 c8 66 19 48 a2 50 f8 c3 0c a5 c1 97 0c 3a 6c 78 bf ef 64 0f c1 23 e133 99 53 9e 11 c2 cd 5e 11 c5 8c dc
type: HW_CONFIG
digest: f3 de 4e 17 a1 a5 a7 fe d9 d9 f4 16 3c 49 36 7e ae f7 2f 2a a8 87 e6 b6 22 89 cd 27 dc 1c 80 2554 10 fe 53 a5 fe 12 75 dc cc 3a 15 8f d8 34 63 f3 3e 1e 71 7f e3 4c 39 a1 62 4a 90 5c 0a 84 f3
type: SOC_FW_CONFIG
digest: 4e e4 8e 5a e6 50 ed e0 b5 a3 54 8a 1f d6 0e 8a ea 0e 71 75 0e a4 3f 82 76 ce af cd 7c b0 91 e0
type: BL_32SECURE_RT_EL1_UNKNOWN
digest: 62 22 4f 0f b0 5d b4 77 1b 3f a5 2e ab 76 1e 61 17 b8 c6 6e ac 8c c8e9 4a 94 e4 1e 0c 28 97 3a 6b b8 dc 2f 89 fc f9 af e9 d3 67 98 89 2c 4d 2e b0 7d 70 08 60 4b 410a 6d 3b b5 59 11 c6 73
type: BL32_EXTRA1_IMAGETOS_FW_CONFIG
digest: 39 d2 b8 5d 93 5d f6 d8 f8 ed 0c 1a 3a e3 c8 90 72 19 f4 88 5c 79 15 05 7b f0 76 db c1 4c 5d 7777 35 1c d8 86 d0 66 15 eb 3a 2d 2d 9c ef b9 49 ba 0a 4a 67 58 ff 06 b7 90 7d c7 06 38 ce c6 0b
type: BL_33
digest: b5 d6 08 61a2 6c ec 40 dd fa 6d da a3 f7 a5 de d6 8f 6f 39 25 b1 57 fa 3e db 46 42 58 24 8e 81 1c 45 5d 38dd 31 ce af 90 09 5b 25 c6 e3 83 b3 3e 6f 11 fc 13 4f 8e 83 64 0d 53 b6 34 22 6c
type: NT_FW_CONFIG
digest: 25 10 60 5d d4 bc 9d 82 7a 16 9f 8a cc 47 95 a6 fd ca a0 c1 2b c9 99 8f 51 20 ff c6 ed 74 68 50c 53 ba 3f c9 43 13 bf 25 59 bc 8c 2e 7e 49 fa 0f 1a 5a 40 96 ed 58 fa 58 31 39 7a de d4 e4 fb
type: CRITICAL DATA
digest: d3 a9 31 35 10 be c0 88 51 bd 28 4e a9 ff b3 c3 cd 02 11 fc 23 2e 02 07 0e ce a5 ab 1d d9 a1 6a
```
**TS Demo test**
**UEFI test**
==Config 2: FIP SP== (arm-linux)**
====Build command====```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/ts-demo
```Demonstrates use of trusted services from an application
MEASURED_BOOT=y SPMC_TESTS=n TS_SMM_GATEWAY=n TS_UEFI_TESTS=n SP_PACKAGING_METHOD=fip DEFAULT_SP_CONFIG=default-sp SP_BLOCK_STORAGE_CONFIG=default-sp SP_PSA_ITS_CONFIG=shared-flash-opteesp SP_PSA_PS_CONFIG=shared-flash-opteesp make---------------------------------------------------------
```
==Config 3: OP-TEE SPMC tests==A client requests a set of crypto operations performed by
====Build command====the Crypto service. Key storage for persistent keys is
provided by the Secure Storage service via the ITS client.
```Generating random bytes length: 1
MEASURED_BOOT=n SPMC_TESTS=n TS_SMM_GATEWAY=y TS_UEFI_TESTS=y DEFAULT_SP_CONFIG=default-sp SP_PACKAGING_METHOD=fip make Operation successful
```
==Config 4: SMMGW tests== Random bytes:
55
====Build command====
```Generating random bytes length: 7
MEASURED_BOOT=n SPMC_TESTS=y TS_SMM_GATEWAY=n TS_UEFI_TESTS=n SP_PACKAGING_METHOD=embedded DEFAULT_SP_CONFIG=default-opteesp make Operation successful
Random bytes:
2B 35 04 79 3B 50 83
Generating random bytes length: 128
Operation successful
Random bytes:
57 31 1C 74 88 69 C4 12
D1 9A 93 83 2D D2 AA 0C
EA 03 F5 44 09 6A 92 11
8A 8A 06 57 26 B1 47 74
01 1B 2A 25 8D CF 6C A3
A6 4D 6D A1 8B FC 31 76
57 13 72 96 C4 09 BA 56
88 35 F9 66 58 B0 EE 1E
AF E9 90 9D AD BB 62 21
82 37 E1 31 37 43 18 5B
95 2E 42 BB 6B 41 40 66
A5 81 81 32 3F F3 23 8A
5A 88 B2 9D 2C B0 F2 C4
51 26 13 53 FE 8F 68 B0
B0 D1 64 85 3C E9 5A C8
E2 0A 62 80 F1 AB A2 7C
Generating ECC signing key
Operation successful
Signing message: "The quick brown fox" using key: 256
Operation successful
Signature bytes:
77 1E 93 3C E1 A2 CD C4
5D 03 15 B8 A9 1A AE 47
37 6A B8 F0 5D 67 22 06
FC 2C B8 20 71 97 7F F8
AE 06 0F 71 34 E3 0B FD
CA 24 C2 23 0F 89 67 99
51 B5 FE 25 95 CD 75 ED
1B A2 6E 5A 3A 06 26 3C
Verify signature using original message: "The quick brown fox"
Operation successful
Verify signature using modified message: "!he quick brown fox"
Successfully detected modified message
Signing message: "jumps over the lazy dog" using key: 256
Operation successful
Signature bytes:
91 1A 8E 4B 17 3C 01 FF
A2 0A D4 55 39 3E 84 96
92 84 A3 F1 A1 26 5C 40
14 A6 57 50 79 70 41 ED
68 E4 21 61 DD 9F 07 0C
DE 9C DC 29 F5 9F 88 DF
36 0D C4 21 54 D3 CD F8
35 C0 7B 16 10 59 26 4A
Verify signature using original message: "jumps over the lazy dog"
Operation successful
Verify signature using modified message: "!umps over the lazy dog"
Successfully detected modified message
Generating RSA encryption key
Operation successful
Encrypting message: "Top secret" using RSA key: 257
Operation successful
Encrypted message:
6E 9A 04 F4 64 33 0B 6D
DE CB C7 21 EF C8 FC A9
95 50 F1 6C 90 64 AA A0
D6 99 BD 90 4C 79 A0 73
Decrypting message using RSA key: 257
Operation successful
Decrypted message: "Top secret"
Exporting public key: 256
Operation successful
Public key bytes:
04 D5 1A 1C 30 72 3C CF
3B E3 0B 47 92 54 2E 6E
61 28 26 A1 FB 00 82 75
AC 44 14 18 B4 87 66 F7
F8 47 0B 25 83 04 4B 9A
6F 08 DF 98 E1 81 77 E7
6B 29 34 60 2A 52 94 96
E8 6E 2E 0E 78 5A EF 81
98
Destroying signing key: 256
Operation successful
Destroying encryption key: 257
Operation successful
```
==Config 2: FIP SP==
====Build command====
```
MEASURED_BOOT=y SPMC_TESTS=n TS_SMM_GATEWAY=n TS_UEFI_TESTS=n SP_PACKAGING_METHOD=fip DEFAULT_SP_CONFIG=default-sp SP_BLOCK_STORAGE_CONFIG=default-sp SP_PSA_ITS_CONFIG=shared-flash-opteesp SP_PSA_PS_CONFIG=shared-flash-opteesp make
```
====Setup steps after boot====
```
/mnt/host/out/linux-arm-ffa-tee/load_module.sh
```
====Test results====
**Trusted Services service level test (arm-linux)**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/ts-service-test -v -xg FwuServiceTests
TEST(PsServiceTests, createAndSetExtended) - 73357 ms
TEST(PsServiceTests, createAndSet) - 118755 ms
TEST(PsServiceTests, storeNewItem) - 80500 ms
TEST(ItsServiceTests, storeNewItem) - 80930 ms
TEST(AttestationProvisioningTests, provisionedIak) - 36000 ms
TEST(AttestationProvisioningTests, selfGeneratedIak) - 52399 ms
TEST(AttestationServiceTests, repeatedOperation) - 6675032 ms
TEST(AttestationServiceTests, invalidChallengeLen)[ 10.808920] ------------[ cut here ]------------
[ 10.809020] WARNING: CPU: 7 PID: 143 at mm/page_alloc.c:5534 __alloc_pages+0x164/0xab0
[ 10.809262] Modules linked in: arm_ffa_tee(O)
[ 10.809425] CPU: 7 PID: 143 Comm: ts-service-test Tainted: G O 6.1.0 #1
[ 10.809620] Hardware name: FVP Base RevC (DT)
[ 10.809764] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 10.809920] pc : __alloc_pages+0x164/0xab0
[ 10.810120] lr : pool_op_alloc+0x5c/0x180 [arm_ffa_tee]
[ 10.810320] sp : ffffffc0087ebac0
[ 10.810490] x29: ffffffc0087ebac0 x28: ffffffc0087ebd30 x27: ffffff88009fad80
[ 10.810736] x26: 0000007fc4e54838 x25: 0000000000000005 x24: 0000000000001000
[ 10.810982] x23: ffffff88009fa900 x22: 0000000000000015 x21: 0000000000000015
[ 10.811239] x20: 0000000000000000 x19: ffffff88009fa900 x18: 0000000000000000
[ 10.811420] x17: 0000000000000000 x16: 0000000000000000 x15: 0000007fc4e54838
[ 10.811720] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 10.811920] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 10.812220] x8 : ffffff88009fa980 x7 : 0000000000000000 x6 : 00000000000009b8
[ 10.812420] x5 : ffffff88009fa900 x4 : 0000000000000000 x3 : 0000000000000000
[ 10.812720] x2 : ffffff8800fab700 x1 : 0000000000000001 x0 : ffffffc008707000
[ 10.812920] Call trace:
[ 10.813020] __alloc_pages+0x164/0xab0
[ 10.813220] pool_op_alloc+0x5c/0x180 [arm_ffa_tee]
[ 10.813439] shm_alloc_helper+0x98/0x110
[ 10.813620] tee_shm_alloc_user_buf+0x74/0x11c
[ 10.813820] tee_ioctl+0xa70/0xf9c
[ 10.813931] __arm64_sys_ioctl+0x3bc/0xc30
[ 10.814120] invoke_syscall.constprop.0+0x5c/0x104
[ 10.814341] do_el0_svc+0x60/0x18c
[ 10.814520] el0_svc+0x38/0xf0
[ 10.814620] el0t_64_sync_handler+0xbc/0x140
[ 10.814820] el0t_64_sync+0x18c/0x190
[ 10.814970] ---[ end trace 0000000000000000 ]---
ffa_tee_share_mem():212 error: 12
- 23300 ms
TEST(AttestationServiceTests, checkTokenSize) - 67700 ms
TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 23948 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 27170 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 33099 ms
TEST(CryptoMacServicePackedcTests, macAbort) - 20137 ms
TEST(CryptoMacServicePackedcTests, signAndVerify) - 78752 ms
TEST(CryptoCipherServicePackedcTests, cipherAbort) - 20223 ms
TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 62967 ms
TEST(CryptoHashServicePackedcTests, hashAbort) - 18404 ms
TEST(CryptoHashServicePackedcTests, hashAndVerify) - 29963 ms
TEST(CryptoHashServicePackedcTests, calculateHash) - 13810 ms
TEST(CryptoServicePackedcTests, generateRandomNumbers) - 43374 ms
TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 2682259 ms
TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 262300 ms
TEST(CryptoServicePackedcTests, signAndVerifyEat) - 264498 ms
TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 327265 ms
TEST(CryptoServicePackedcTests, signAndVerifyHash) - 327110 ms
TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 169165 ms
TEST(CryptoServicePackedcTests, exportPublicKey) - 114734 ms
TEST(CryptoServicePackedcTests, purgeKey) - 102856 ms
TEST(CryptoServicePackedcTests, copyKey) - 139695 ms
TEST(CryptoServicePackedcTests, generatePersistentKeys) - 187446 ms
TEST(CryptoServicePackedcTests, generateVolatileKeys) - 57300 ms
TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 43334 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 1319121 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 194447 ms
TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 329200 ms
TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 327500 ms
TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 169900 ms
TEST(CryptoServiceProtobufTests, exportPublicKey) - 115400 ms
TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 190022 ms
TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 57400 ms
TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 9270152 ms
TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 2197058 ms
TEST(DiscoveryServiceTests, checkServiceInfo) - 3800 ms
OK (45 tests, 43 ran, 763 checks, 0 ignored, 2 filtered out, 26446597 ms)
```
**PSA Architecture Test Suite (arm-linux)**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-crypto-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Crypto Suite
******************************************
TEST: 201 | DESCRIPTION: Testing crypto key management APIs | UT: psa_crypto_init
[Info] Executing tests from non-secure
[Check 1] Test calling crypto functions before psa_crypto_init
[Check 2] Test psa_crypto_init
[Check 3] Test multiple psa_crypto_init
TEST RESULT: PASSED
******************************************
TEST: 202 | DESCRIPTION: Testing crypto key management APIs | UT: psa_import_key
[Info] Executing tests from non-secure
[Check 1] Test psa_import_key 16 bytes AES
[Check 2] Test psa_import_key 24 bytes AES
[Check 3] Test psa_import_key 32 bytes AES
[Check 4] Test psa_import_key 2048 RSA public key
[Check 5] Test psa_import_key with RSA 2048 keypair
[Check 6] Test psa_import_key with DES 8 bytes key
[Check 7] Test psa_import_key with Triple DES 2-Key
[Check 8] Test psa_import_key with Triple DES 3-Key
[Check 9] Test psa_import_key with EC Public key
[Check 10] Test psa_import_key with EC keypair
[Check 11] Test psa_import_key 16 bytes AES with invalid bits
[Check 12] Test psa_import_key with key data greater than the algorithm size
[Check 13] Test psa_import_key with incorrect key data size
[Check 14] Test psa_import_key with invalid key type value
TEST RESULT: PASSED
******************************************
TEST: 203 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_key
[Info] Executing tests from non-secure
[Check 1] Test psa_export_key 16 Byte AES
[Check 2] Test psa_export_key 24 Byte AES
[Check 3] Test psa_export_key 32 Byte AES
[Check 4] Test psa_export_key 2048 RSA public key
[Check 5] Test psa_export_key with RSA 2048 keypair
[Check 6] Test psa_export_key with DES 64 bit key
[Check 7] Test psa_export_key with Triple DES 2-Key
[Check 8] Test psa_export_key with Triple DES 3-Key
[Check 9] Test psa_export_key with EC Public key
[Check 10] Test psa_export_key with EC keypair
[Check 11] Test psa_export_key with key policy verify
[Check 12] Test psa_export_key with less buffer size
TEST RESULT: PASSED
******************************************
TEST: 204 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_public_key
[Info] Executing tests from non-secure
[Check 1] Test psa_export_public_key 16 Byte AES
[Check 2] Test psa_export_public_key 24 Byte AES
[Check 3] Test psa_export_public_key 32 Byte AES
[Check 4] Test psa_export_public_key 2048 RSA public key
[Check 5] Test psa_export_public_key with RSA 2048 keypair
[Check 6] Test psa_export_public_key with DES 64 bit key
[Check 7] Test psa_export_public_key with Triple DES 2-Key
[Check 8] Test psa_export_public_key with Triple DES 3-Key
[Check 9] Test psa_export_public_key with EC Public key
[Check 10] Test psa_export_public_key with EC keypair
[Check 11] Test psa_export_public_key with less buffer size
TEST RESULT: PASSED
******************************************
TEST: 205 | DESCRIPTION: Testing crypto key management APIs | UT: psa_destroy_key
[Info] Executing tests from non-secure
[Check 1] Test psa_destroy_key 16 Byte AES
[Check 2] Test psa_destroy_key 24 Byte AES
[Check 3] Test psa_destroy_key 32 Byte AES
[Check 4] Test psa_destroy_key 2048 RSA public key
[Check 5] Test psa_destroy_key with RSA 2048 keypair
[Check 6] Test psa_destroy_key with DES 64 bit key
[Check 7] Test psa_destroy_key with Triple DES 2-Key
[Check 8] Test psa_destroy_key with Triple DES 3-Key
[Check 9] Test psa_destroy_key with EC Public key
[Check 10] Test psa_destroy_key with EC keypair
TEST RESULT: PASSED
******************************************
TEST: 206 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compute
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_compute with MD5 algorithm
[Check 2] Test psa_hash_compute with RIPEMD160 algorithm
[Check 3] Test psa_hash_compute with SHA1 algorithm
[Check 4] Test psa_hash_compute with SHA224 algorithm
[Check 5] Test psa_hash_compute with SHA256 algorithm
[Check 6] Test psa_hash_compute with SHA384 algorithm
[Check 7] Test psa_hash_compute with SHA512 algorithm
[Check 8] Test psa_hash_compute with small buffer size
[Check 9] Test psa_hash_compute with invalid algorithm
TEST RESULT: PASSED
******************************************
TEST: 207 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compare
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_compare with MD5 algorithm
[Check 2] Test psa_hash_compare with RIPEMD160 algorithm
[Check 3] Test psa_hash_compare with SHA1 algorithm
[Check 4] Test psa_hash_compare with SHA224 algorithm
[Check 5] Test psa_hash_compare with SHA256 algorithm
[Check 6] Test psa_hash_compare with SHA384 algorithm
[Check 7] Test psa_hash_compare with SHA512 algorithm
[Check 8] Test psa_hash_compare with incorrect hash
[Check 9] Test psa_hash_compare with incorrect hash length
[Check 10] Test psa_hash_compare with invalid algorithm
TEST RESULT: PASSED
******************************************
TEST: 208 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_setup - ECDH + HKDF-SHA-256
[Check 2] Test psa_key_derivation_setup - ECDH, unknown KDF
[Check 3] Test psa_key_derivation_setup - bad key derivation algorithm
[Check 4] Test psa_key_derivation_setup - Invalid Algorithm
TEST RESULT: PASSED
******************************************
TEST: 209 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_bytes
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_input_bytes - Step as Info
[Check 2] Test psa_key_derivation_input_bytes - Step as secret
[Check 3] Test psa_key_derivation_input_bytes - Step as salt
[Check 4] Test psa_key_derivation_input_bytes - Step as label
[Check 5] Test psa_key_derivation_input_bytes - Step as seed
[Check 6] Test psa_key_derivation_input_bytes - Invalid step
TEST RESULT: PASSED
******************************************
TEST: 210 | DESCRIPTION: Testing crypto key attributes APIs | UT: psa_key_attributes_set_get
[Info] Executing tests from non-secure
[Check 1] Test psa_key_attributes_set_get key attributes
TEST RESULT: PASSED
******************************************
TEST: 211 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_setup with MD5 algorithm
[Check 2] Test psa_hash_setup with RIPEMD160 algorithm
[Check 3] Test psa_hash_setup with SHA1 algorithm
[Check 4] Test psa_hash_setup with SHA224 algorithm
[Check 5] Test psa_hash_setup with SHA256 algorithm
[Check 6] Test psa_hash_setup with SHA384 algorithm
[Check 7] Test psa_hash_setup with SHA512 algorithm
[Check 8] Test psa_hash_setup with Invalid hash algorithm
[Check 9] Test psa_hash_setup with Invalid algorithm
[Check 10] Test psa_hash_setup with CTR algorithm
TEST RESULT: PASSED
******************************************
TEST: 212 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_update
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_update with MD5 algorithm
[Check 2] Test psa_hash_update with RIPEMD160 algorithm
[Check 3] Test psa_hash_update with SHA1 algorithm
[Check 4] Test psa_hash_update with SHA224 algorithm
[Check 5] Test psa_hash_update with SHA256 algorithm
[Check 6] Test psa_hash_update with SHA384 algorithm
[Check 7] Test psa_hash_update with SHA512 algorithm
[Check 8] Test psa_hash_update without hash setup
[Check 9] Test psa_hash_update with completed opertaion handle
TEST RESULT: PASSED
******************************************
TEST: 213 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_verify with MD5 algorithm
[Check 2] Test psa_hash_verify with RIPEMD160 algorithm
[Check 3] Test psa_hash_verify with SHA1 algorithm
[Check 4] Test psa_hash_verify with SHA224 algorithm
[Check 5] Test psa_hash_verify with SHA256 algorithm
[Check 6] Test psa_hash_verify with SHA384 algorithm
[Check 7] Test psa_hash_verify with SHA512 algorithm
[Check 8] Test psa_hash_verify with incorrect expected hash
[Check 9] Test psa_hash_verify with incorrect hash length
[Check 10] test psa_hash_verify with inactive & invalid operation handle
TEST RESULT: PASSED
******************************************
TEST: 214 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_finish with MD5 algorithm
[Check 2] Test psa_hash_finish with RIPEMD160 algorithm
[Check 3] Test psa_hash_finish with SHA1 algorithm
[Check 4] Test psa_hash_finish with SHA224 algorithm
[Check 5] Test psa_hash_finish with SHA256 algorithm
[Check 6] Test psa_hash_finish with SHA384 algorithm
[Check 7] Test psa_hash_finish with SHA512 algorithm
[Check 8] Test psa_hash_finish with invalid hash buffer size
[Check 9] test psa_hash_finish with inactive operation handle
TEST RESULT: PASSED
******************************************
TEST: 215 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_abort with MD5 algorithm
[Check 2] Test psa_hash_abort with RIPEMD160 algorithm
[Check 3] Test psa_hash_abort with SHA1 algorithm
[Check 4] Test psa_hash_abort with SHA224 algorithm
[Check 5] Test psa_hash_abort with SHA256 algorithm
[Check 6] Test psa_hash_abort with SHA384 algorithm
[Check 7] Test psa_hash_abort with SHA512 algorithm
[Check 8] Test psa_hash_finish after calling psa_hash_abort
TEST RESULT: PASSED
******************************************
TEST: 216 | DESCRIPTION: Testing crypto generator functions APIs | UT: psa_generate_key
[Info] Executing tests from non-secure
[Check 1] Test psa_generate_key 16 Byte AES
[Check 2] Test psa_generate_key 24 Byte AES
[Check 3] Test psa_generate_key 32 Byte AES
[Check 4] Test psa_generate_key with DES 64 bit key
[Check 5] Test psa_generate_key with Triple DES 2-Key
[Check 6] Test psa_generate_key with Triple DES 3-Key
[Check 7] Test psa_generate_key with RSA 2048 Keypair
[Check 8] Test psa_generate_key with ECC KeyPair
[Check 9] Test psa_generate_key with RSA 2048 Public key
[Check 10] Test psa_generate_key with invalid key type
[Check 11] Test psa_generate_key with invalid usage flags
TEST RESULT: PASSED
******************************************
TEST: 217 | DESCRIPTION: Testing crypto generation APIs | UT: psa_generate_random
[Info] Executing tests from non-secure
[Check 1] Test psa_generate_random to get 0 Byte data
[Check 2] Test psa_generate_random to get 16 Byte data
[Check 3] Test psa_generate_random to get 24 Byte data
[Check 4] Test psa_generate_random to get 32 Byte data
[Check 5] Test psa_generate_random to get 64 Byte data
[Check 6] Test psa_generate_random to get 128 Byte data
[Check 7] Test psa_generate_random to get 256 Byte data
[Check 8] Test psa_generate_random to get 512 Byte data
[Check 9] Test psa_generate_random to get 1000 Byte data
TEST RESULT: PASSED
******************************************
TEST: 218 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_key
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_input_key 16 Byte Key
[Check 2] Test psa_key_derivation_input_key with invalid usage
[Check 3] Test psa_key_derivation_input_key with step as label
[Check 4] Test psa_key_derivation_input_key with step as info
[Check 5] Test psa_key_derivation_input_key with step as seed
[Check 6] Test psa_key_derivation_input_key with step as salt
[Check 7] Test psa_key_derivation_input_key with key type as AES(not derive)
[Check 8] Test psa_key_derivation_input_key incorrect key algorithm
[Check 9] Test psa_key_derivation_input_key with key type as 2048 RSA public key
[Check 10] Test psa_key_derivation_input_key with key type as RSA 2048 keypair
[Check 11] Test psa_key_derivation_input_key with zero as step
[Check 12] Test psa_cipher_decrypt_setup - Invalid key handle
[Check 13] Test psa_cipher_decrypt_setup - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 219 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_key_agreement
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_key_agreement - ECDH SECP256R1
[Check 2] Test psa_key_derivation_key_agreement - Invalid step
[Check 3] Test psa_key_derivation_key_agreement - ECDH SECP384R1
[Check 4] Test psa_key_derivation_key_agreement - Invalid usage
[Check 5] Test psa_key_derivation_key_agreement - KDF not a key agreement alg
[Check 6] Test psa_key_derivation_key_agreement - Public key of different curve
[Check 7] Test psa_key_derivation_key_agreement - Pub key instead of Prv key
[Check 8] Test psa_key_derivation_key_agreement - Invalid handle
[Check 9] Test psa_key_derivation_key_agreement - Zero as handle
TEST RESULT: PASSED
******************************************
TEST: 220 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_bytes
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_output_bytes - HKDF
[Check 2] Test psa_key_derivation_output_bytes - optional salt
[Check 3] Test psa_key_derivation_output_bytes - capacity < output_length
[Check 4] Test psa_key_derivation_output_bytes - missing info
[Check 5] Test psa_key_derivation_output_bytes - missing salt/secret/info
[Check 6] Test psa_key_derivation_output_bytes - TLS12_PRF
[Check 7] Test psa_key_derivation_output_bytes - capacity < output_length
[Check 8] Test psa_key_derivation_output_bytes - missing seed/secret/label
TEST RESULT: PASSED
******************************************
TEST: 221 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_key
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_output_key - Key
[Check 2] Test psa_key_derivation_output_key - Info
[Check 3] Test psa_key_derivation_output_key - Salt
[Check 4] Test psa_key_derivation_output_key - Greater Capacity than available
[Check 5] Test psa_key_derivation_output_key - ECC Public key
[Check 6] Test psa_key_derivation_output_key - ECC keypair (wrong key length)
[Check 7] Test psa_key_derivation_output_key - RSA Public Key[Check 8] Test psa_key_derivation_output_key - RSA keypair
[Check 9] Test psa_key_derivation_output_key - Invalid key size
TEST RESULT: PASSED
******************************************
TEST: 222 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_abort
TEST RESULT: PASSED
******************************************
TEST: 223 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_set_get_capacity
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_set_get_capacity - < operation's capacity
[Check 2] Test psa_key_derivation_set_get_capacity - = operation's capacity
[Check 3] Test psa_key_derivation_set_get_capacity - > operation's capacity
[Check 4] Test psa_key_derivation_set_get_capacity - unchanged capacity
TEST RESULT: PASSED
******************************************
TEST: 224 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_encrypt - CCM - AES - 13B nonce & 8B add data
[Check 2] Test psa_aead_encrypt - CCM - AES - 13B nonce & 32B add data
[Check 3] Test psa_aead_encrypt - CCM - AES - 24 bytes Tag length = 4
[Check 4] Test psa_aead_encrypt - CCM - AES - Zero additional data
[Check 5] Test psa_aead_encrypt - CCM - AES - Zero plaintext
[Check 6] Test psa_aead_encrypt - GCM - AES - 12B nonce & 12B add data
[Check 7] Test psa_aead_encrypt - Unsupported algorithm
[Check 8] Test psa_aead_encrypt - Invalid usage flag
[Check 9] Test psa_aead_encrypt - Invalid ciphertext_size
[Check 10] Test psa_aead_encrypt - Invalid nonce
[Check 11] Test psa_aead_encrypt - Invalid tag length 0
TEST RESULT: PASSED
******************************************
TEST: 225 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_decrypt - CCM - AES - 13B nonce & 8B add data
[Check 2] Test psa_aead_decrypt - CCM - AES - 13B nonce & 32B add data
[Check 3] Test psa_aead_decrypt - CCM - AES - 24 bytes Tag length = 4
[Check 4] Test psa_aead_decrypt - CCM - AES - Zero additional data
[Check 5] Test psa_aead_decrypt - CCM - AES - Zero plaintext
[Check 6] Test psa_aead_decrypt - GCM - AES - 12B nonce & 12B add data
[Check 7] Test psa_aead_decrypt - Unsupported algorithm
[Check 8] Test psa_aead_decrypt - Invalid usage flag
[Check 9] Test psa_aead_decrypt - Invalid plaintext_size
[Check 10] Test psa_aead_decrypt - Invalid nonce
[Check 11] Test psa_aead_decrypt - Invalid cihpertext
[Check 12] Test psa_aead_decrypt - Invalid cihpertext_size
[Check 13] Test psa_aead_decrypt - Invalid tag length 0
TEST RESULT: PASSED
******************************************
TEST: 226 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_sign_setup - HMAC - SHA256
[Check 2] Test psa_mac_sign_setup - CMAC - AES
[Check 3] Test psa_mac_sign_setup - Incompatible HMAC for CMAC
[Check 4] Test psa_mac_sign_setup - Invalid usage flag
[Check 5] Test psa_mac_sign_setup - Invalid key type
[Check 6] Test psa_mac_sign_setup - Truncated MAC too large
[Check 7] Test psa_mac_sign_setup - Truncated MAC too small
[Check 8] Test psa_mac_sign_setup - Unknown MAC algorithm
[Check 9] Test psa_mac_sign_setup - Bad algorithm (not a MAC algorithm)
[Check 10] Test psa_mac_sign_setup invalid key handle
[Check 11] Test psa_mac_sign_setup zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 227 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_update
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_update - HMAC - SHA256 - 64 Byte
[Check 2] Test psa_mac_update - CMAC - AES - 16 Byte
[Check 3] Test psa_mac_update - HMAC - SHA512 - 32 Byte
[Check 4] Test psa_mac_update - HMAC - SHA512 - Invalid operation state
TEST RESULT: PASSED
******************************************
TEST: 228 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_sign_finish - HMAC - SHA224
[Check 2] Test psa_mac_sign_finish - HMAC - SHA256
[Check 3] Test psa_mac_sign_finish - HMAC - SHA512
[Check 4] Test psa_mac_sign_finish - HMAC - SHA224 - Truncated 8 Byte
[Check 5] Test psa_mac_sign_finish - HMAC - SHA224 - Small output buffer
[Check 6] Test psa_mac_sign_finish - HMAC - SHA224 - Invalid operation state
[Check 7] Test psa_mac_sign_finish - CMAC - AES
TEST RESULT: PASSED
******************************************
TEST: 229 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify_setup - HMAC - SHA256
[Check 2] Test psa_mac_verify_setup - CMAC - AES
[Check 3] Test psa_mac_verify_setup - Incompatible HMAC for CMAC
[Check 4] Test psa_mac_verify_setup - Invalid usage flag
[Check 5] Test psa_mac_verify_setup - Invalid key type
[Check 6] Test psa_mac_verify_setup - Truncated MAC too large
[Check 7] Test psa_mac_verify_setup - Truncated MAC too small
[Check 8] Test psa_mac_verify_setup - Unknown MAC algorithm
[Check 9] Test psa_mac_verify_setup - Bad algorithm (not a MAC algorithm)
[Check 10] Test psa_mac_verify_setup invalid key handle
[Check 11] Test psa_mac_verify_setup zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 230 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify_finish - HMAC - SHA224
[Check 2] Test psa_mac_verify_finish - HMAC - SHA256
[Check 3] Test psa_mac_verify_finish - HMAC - SHA512
[Check 4] Test psa_mac_verify_finish - HMAC - SHA224 - Truncated 8 Byte
[Check 5] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid mac length
[Check 6] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid expected mac
[Check 7] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid operation state
[Check 8] Test psa_mac_verify_finish - CMAC - AES
TEST RESULT: PASSED
******************************************
TEST: 231 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_abort - HMAC - SHA224
[Check 2] Test psa_mac_abort - HMAC - SHA224 - Truncated 8 Byte
[Check 3] Test psa_mac_abort - HMAC - SHA256
[Check 4] Test psa_mac_abort - HMAC - SHA512
[Check 5] Test psa_mac_abort - CMAC - AES
[Check 6] Test psa_mac_sign_finish after calling psa_mac_abort
TEST RESULT: PASSED
******************************************
TEST: 232 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_encrypt_setup 16 Byte AES
[Check 2] Test psa_cipher_encrypt_setup 24 Byte AES
[Check 3] Test psa_cipher_encrypt_setup 32 Byte AES
[Check 4] Test psa_cipher_encrypt_setup DES 64 bit key
[Check 5] Test psa_cipher_encrypt_setup Triple DES 2-Key
[Check 6] Test psa_cipher_encrypt_setup Triple DES 3-Key
[Check 7] Test psa_cipher_encrypt_setup 16 Byte raw data
[Check 8] Test psa_cipher_encrypt_setup - not a cipher algorithm
[Check 9] Test psa_cipher_encrypt_setup - unknown cipher algorithm
[Check 10] Test psa_cipher_encrypt_setup - incompatible key ARC4
[Check 11] Test psa_cipher_encrypt_setup - incorrect usage
[Check 12] Test psa_cipher_encrypt_setup - RSA public key
[Check 13] Test psa_cipher_encrypt_setup - RSA keypair
[Check 14] Test psa_cipher_encrypt_setup - EC Public key
[Check 15] Test psa_cipher_encrypt_setup - EC keypair
[Check 16] Test psa_cipher_encrypt_setup - Invalid key handle
[Check 17] Test psa_cipher_encrypt_setup - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 233 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_decrypt_setup 16 Byte AES
[Check 2] Test psa_cipher_decrypt_setup 24 Byte AES
[Check 3] Test psa_cipher_decrypt_setup 32 Byte AES
[Check 4] Test psa_cipher_decrypt_setup DES 64 bit key
[Check 5] Test psa_cipher_decrypt_setup Triple DES 2-Key
[Check 6] Test psa_cipher_decrypt_setup Triple DES 3-Key
[Check 7] Test psa_cipher_decrypt_setup 16 Byte raw data
[Check 8] Test psa_cipher_decrypt_setup - not a cipher algorithm
[Check 9] Test psa_cipher_decrypt_setup - unknown cipher algorithm
[Check 10] Test psa_cipher_decrypt_setup - incompatible key ARC4
[Check 11] Test psa_cipher_decrypt_setup - incorrect usage
[Check 12] Test psa_cipher_decrypt_setup - RSA public key
[Check 13] Test psa_cipher_decrypt_setup - RSA keypair
[Check 14] Test psa_cipher_decrypt_setup - EC Public key
[Check 15] Test psa_cipher_decrypt_setup - EC keypair
[Check 16] Test psa_cipher_decrypt_setup - Invalid key handle
[Check 17] Test psa_cipher_decrypt_setup - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 234 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_generate_iv
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_generate_iv 16 Byte AES
[Check 2] Test psa_cipher_generate_iv 24 Byte AES
[Check 3] Test psa_cipher_generate_iv 32 Byte AES
[Check 4] Test psa_cipher_generate_iv DES 64 bit key
[Check 5] Test psa_cipher_generate_iv DES 2-Key
[Check 6] Test psa_cipher_generate_iv DES 3-Key
[Check 7] Test psa_cipher_generate_iv AES - small iv buffer
[Check 8] Test psa_cipher_generate_iv DES - small iv buffer
TEST RESULT: PASSED
******************************************
TEST: 235 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_set_iv
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_set_iv 16 Byte AES
[Check 2] Test psa_cipher_set_iv 24 Byte AES
[Check 3] Test psa_cipher_set_iv 32 Byte AES
[Check 4] Test psa_cipher_set_iv DES 64 bit key
[Check 5] Test psa_cipher_set_iv DES 2-Key
[Check 6] Test psa_cipher_set_iv DES 3-Key
[Check 7] Test psa_cipher_set_iv AES - small iv buffer
[Check 8] Test psa_cipher_set_iv DES - small iv buffer
[Check 9] Test psa_cipher_set_iv AES - large iv buffer
[Check 10] Test psa_cipher_set_iv DES - large iv buffer
TEST RESULT: PASSED
******************************************
TEST: 236 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_update
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING (Short in)
[Check 3] Test psa_cipher_update - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_update - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_update - Encrypt - AES CTR
[Check 6] Test psa_cipher_update - Encrypt - DES CBC (nopad)
[Check 7] Test psa_cipher_update - Encrypt - 2-key 3DE -CBC (nopad)
[Check 8] Test psa_cipher_update - Encrypt - 3-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_update - Encrypt - small output buffer size
[Check 10] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING
[Check 11] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING (Short in)
[Check 12] Test psa_cipher_update - Decrypt - AES CBC_PKCS7
[Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7 (Short input)
[Check 14] Test psa_cipher_update - Decrypt - AES CTR
[Check 15] Test psa_cipher_update - Decrypt - DES CBC (nopad)
[Check 16] Test psa_cipher_update - Decrypt - 2-key 3DE -CBC (nopad)
[Check 17] Test psa_cipher_update - Decrypt - 3-key 3DE -CBC (nopad)
[Check 18] Test psa_cipher_update - Decrypt - small output buffer size
[Check 19] Test psa_cipher_update without cipher setup
TEST RESULT: PASSED
******************************************
TEST: 237 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING (Short in)
[Check 3] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_finish - Encrypt - AES CTR
[Check 6] Test psa_cipher_finish - Encrypt - AES CTR (short input)
[Check 7] Test psa_cipher_finish - Encrypt - DES CBC (nopad)
[Check 8] Test psa_cipher_finish - Encrypt - 2-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_finish - Encrypt - 3-key 3DE -CBC (nopad)
[Check 10] Test psa_cipher_finish - Encrypt - small output buffer size
[Check 11] Test psa_cipher_finish - Decrypt - AES CBC_NO_PADDING
[Check 12] Test psa_cipher_finish - Decrypt - AES CBC_NO_PADDING (Short in)
[Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7
[Check 14] Test psa_cipher_finish - Decrypt - AES CBC_PKCS7 (Short input)
[Check 15] Test psa_cipher_finish - Decrypt - AES CTR
[Check 16] Test psa_cipher_finish - Decrypt - AES CTR (short input)
[Check 17] Test psa_cipher_finish - Decrypt - DES CBC (nopad)
[Check 18] Test psa_cipher_finish - Decrypt - 2-key 3DE -CBC (nopad)
[Check 19] Test psa_cipher_finish - Decrypt - 3-key 3DE -CBC (nopad)
TEST RESULT: PASSED
******************************************
TEST: 238 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_abort - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_abort - Encrypt - AES CBC_PKCS7
[Check 3] Test psa_cipher_abort - Encrypt - AES CTR
[Check 4] Test psa_cipher_abort - Encrypt - DES CBC (nopad)
[Check 5] Test psa_cipher_abort - Encrypt - 2-key 3DE -CBC (nopad)
[Check 6] Test psa_cipher_abort - Encrypt - 3-key 3DE -CBC (nopad)
[Check 7] Test psa_cipher_abort - Decrypt - AES CBC_NO_PADDING
[Check 8] Test psa_cipher_abort - Decrypt - AES CBC_PKCS7
[Check 9] Test psa_cipher_abort - Decrypt - AES CTR
[Check 10] Test psa_cipher_abort - Decrypt - DES CBC (nopad)
[Check 11] Test psa_cipher_abort - Decrypt - 2-key 3DE -CBC (nopad)
[Check 12] Test psa_cipher_abort - Decrypt - 3-key 3DE -CBC (nopad)
[Check 13] Test psa_cipher_update after psa_cipher_abort should fail
TEST RESULT: PASSED
******************************************
TEST: 239 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_asymmetric_encrypt - RSA PKCS1V15
[Check 2] Test psa_asymmetric_encrypt - RSA KEY_PAIR PKCS1V15
[Check 3] Test psa_asymmetric_encrypt - RSA OAEP SHA256
[Check 4] Test psa_asymmetric_encrypt - RSA OAEP SHA256 with label
[Check 5] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256
[Check 6] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256 with label
[Check 7] Test psa_asymmetric_encrypt - Small output buffer
[Check 8] Test psa_asymmetric_encrypt - Invalid algorithm
[Check 9] Test psa_asymmetric_encrypt - Invalid key type
[Check 10] Test psa_asymmetric_encrypt - Invalid usage
[Check 11] Test psa_asymmetric_encrypt - RSA PKCS1V15 - Salt
[Check 12] Test psa_asymmetric_encrypt - ECC public key
[Check 13] Test psa_asymmetric_encrypt - Invalid key handle
[Check 14] Test psa_asymmetric_encrypt - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 240 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_asymmetric_decrypt - RSA KEY_PAIR PKCS1V15
[Check 2] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256
[Check 3] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256 with label
[Check 4] Test psa_asymmetric_decrypt - Invalid key type (RSA public key)
[Check 5] Test psa_asymmetric_decrypt - Small output buffer
[Check 6] Test psa_asymmetric_decrypt - Invalid algorithm
[Check 7] Test psa_asymmetric_decrypt - Invalid key type (AES Key)
[Check 8] Test psa_asymmetric_decrypt - Invalid usage
[Check 9] Test psa_asymmetric_decrypt - RSA PKCS1V15 - Salt
[Check 10] Test psa_asymmetric_decrypt - Invalid key handle
[Check 11] Test psa_asymmetric_decrypt - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 241 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_sign_hash
[Info] Executing tests from non-secure
[Check 1] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 3] Test psa_sign_hash - ECDSA SECP256R1 SHA-256
[Check 4] Test psa_sign_hash - Invalid key type (RSA public key)
[Check 5] Test psa_sign_hash - Small output buffer
[Check 6] Test psa_sign_hash - Invalid algorithm
[Check 7] Test psa_sign_hash - Invalid key type (AES Key)
[Check 8] Test psa_sign_hash - Invalid usage
[Check 9] Test psa_sign_hash - Wrong hash size
[Check 10] Test psa_sign_hash - Invalid key handle
[Check 11] Test psa_sign_hash - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 242 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_verify_hash
[Info] Executing tests from non-secure
[Check 1] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 3] Test psa_verify_hash - ECDSA KEY_PAIR SECP256R1 SHA-256
[Check 4] Test psa_verify_hash - EC public key
[Check 5] Test psa_verify_hash - RSA public key
[Check 6] Test psa_verify_hash - Small output buffer
[Check 7] Test psa_verify_hash - Invalid algorithm
[Check 8] Test psa_verify_hash - Invalid key type (AES Key)
[Check 9] Test psa_verify_hash - Invalid usage
[Check 10] Test psa_verify_hash - Wrong hash size
[Check 11] Test psa_verify_hash - Wrong signature
[Check 12] Test psa_verify_hash - Wrong signature size
[Check 13] Test psa_verify_hash - Invalid key handle
[Check 14] Test psa_verify_hash - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 243 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_raw_key_agreement
[Info] Executing tests from non-secure
[Check 1] Test psa_raw_key_agreement - ECDH SECP256R1
[Check 2] Test psa_raw_key_agreement - Small buffer size
[Check 3] Test psa_raw_key_agreement - ECDH SECP384R1
[Check 4] Test psa_raw_key_agreement - Invalid usage
[Check 5] Test psa_raw_key_agreement - Unknown KDF
[Check 6] Test psa_raw_key_agreement - Not a key agreement alg
[Check 7] Test psa_raw_key_agreement - Public key on different curve
[Check 8] Test psa_raw_key_agreement - Public key instead of private key
[Check 9] Test psa_raw_key_agreement - Invalid key handle
[Check 10] Test psa_raw_key_agreement - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 244 | DESCRIPTION: Testing crypto key management APIs | UT: psa_copy_key
[Info] Executing tests from non-secure
[Check 1] Test psa_copy_key - 2048 RSA public key
[Check 2] Test psa_copy_key - RSA 2048 keypair
[Check 3] Test psa_copy_key - Incompatible target policy(source and target)
[Check 4] Test psa_copy_key - source key with no export usage
[Check 5] Test psa_copy_key - DES 64 bit key
[Check 6] Test psa_copy_key - Triple DES 2-Key
[Check 7] Test psa_copy_key - Triple DES 3-Key
[Check 8] Test psa_copy_key - EC Public key
[Check 9] Test psa_copy_key - EC keypair
TEST RESULT: PASSED
******************************************
TEST: 245 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_clone
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_clone - MD5 algorithm
[Check 2] Test psa_hash_clone - RIPEMD160 algorithm
[Check 3] Test psa_hash_clone - SHA1 algorithm
[Check 4] Test psa_hash_clone - SHA224 algorithm
[Check 5] Test psa_hash_clone - SHA256 algorithm
[Check 6] Test psa_hash_clone - SHA384 algorithm
[Check 7] Test psa_hash_clone - SHA512 algorithm
[Check 8] Test psa_hash_clone - from an inactive source operation
[Check 9] Test psa_hash_clone - on an active target operation
TEST RESULT: PASSED
******************************************
TEST: 246 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_compute
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_compute HMAC SHA 224
[Check 2] Test psa_mac_compute - Incompactible HMAC for CMAC
[Check 3] Test psa_mac_compute - Invalid usage
[Check 4] Test psa_mac_compute - truncated MAC too small
[Check 5] Test psa_mac_compute - truncated MAC too large
[Check 6] Test psa_mac_compute - bad algorithm (unknown MAC algorithm)
[Check 7] Test psa_mac_compute HMAC SHA 256
[Check 8] Test psa_mac_compute HMAC SHA 512
[Check 9] Test psa_mac_compute HMAC SHA 224 (truncated to 8 Byte)
[Check 10] Test psa_mac_compute CMAC AES 128
[Check 11] Test psa_mac_compute small size buffer
[Check 12] Test psa_mac_compute - Invalid key type
TEST RESULT: PASSED
******************************************
TEST: 247 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify HMAC SHA 224
[Check 2] Test psa_mac_verify HMAC SHA 256
[Check 3] Test psa_mac_verify - Incompactible HMAC for CMAC
[Check 4] Test psa_mac_verify - Invalid usage
[Check 5] Test psa_mac_verify - Truncated MAC too large
[Check 6] Test psa_mac_verify - Truncated MAC too small
[Check 7] Test psa_mac_verify - bad algorithm (unknown MAC algorithm)
[Check 8] Test psa_mac_verify HMAC SHA 512
[Check 9] Test psa_mac_verify HMAC SHA 224 (truncated to 8 Byte)
[Check 10] Test psa_mac_verify CMAC AES 128
[Check 11] Test psa_mac_verify - Invalid key type
[Check 12] Test psa_mac_verify small size buffer
[Check 13] Test psa_mac_verify incorrect expected MAC
TEST RESULT: PASSED
******************************************
TEST: 248 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING (Short input)
[Check 3] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_encrypt - Encrypt - AES CTR
[Check 6] Test psa_cipher_encrypt - Encrypt - AES CTR (short input)
[Check 7] Test psa_cipher_encrypt - Encrypt - DES CBC (nopad)
[Check 8] Test psa_cipher_encrypt - Encrypt - 2-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_encrypt - Encrypt - 3-key 3DE -CBC (nopad)
[Check 10] Test psa_cipher_encrypt - small output buffer size
[Check 11] Test psa_cipher_encrypt - Decrypt - AES CBC_NO_PADDING
TEST RESULT: PASSED
******************************************
TEST: 249 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_decrypt - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING
[Check 3] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING (Short input)
[Check 4] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING
[Check 5] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7
[Check 6] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7 (Short input)
[Check 7] Test psa_cipher_decrypt - Decrypt - AES CTR
[Check 8] Test psa_cipher_decrypt - Decrypt - DES CBC (nopad)
[Check 9] Test psa_cipher_decrypt - Decrypt - 2-key 3DE -CBC (nopad)
[Check 10] Test psa_cipher_decrypt - 3-key 3DE -CBC (nopad)
TEST RESULT: PASSED
******************************************
TEST: 250 | DESCRIPTION: Testing crypto key management APIs | UT: psa_sign_message
[Info] Executing tests from non-secure
[Check 1] Test psa_sign_message - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_sign_message - ECDSA SECP256R1 SHA-256
[Check 3] Test psa_sign_message - Invalid key type (RSA public key)
[Check 4] Test psa_sign_message - Small output buffer
[Check 5] Test psa_sign_message - Invalid algorithm
[Check 6] Test psa_sign_message - Invalid key type (AES Key)
[Check 7] Test psa_sign_message - Invalid usage
[Check 8] Test psa_sign_message - Mismatch key type and Algorithm
[Check 9] Test psa_sign_message - Alg mismatch in key and API call
[Check 10] Test psa_sign_message - Invalid key handle
[Check 11] Test psa_sign_message - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 251 | DESCRIPTION: Testing crypto key management APIs | UT: psa_verify_message
[Info] Executing tests from non-secure
[Check 1] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_verify_message - RSA Public Key PKCS1V15 RAW
[Check 3] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 4] Test psa_verify_message - ECDSA KEY_PAIR SECP256R1 SHA-256
[Check 5] Test psa_verify_message - ECDSA Public Key SECP256R1 SHA-256
[Check 6] Test psa_verify_message - Small output buffer
[Check 7] Test psa_verify_message - Invalid algorithm
[Check 8] Test psa_verify_message - Invalid key type (AES Key)
[Check 9] Test psa_verify_message - Invalid usage
[Check 10] Test psa_verify_message - Wrong message size
[Check 11] Test psa_verify_message - Wrong signature
[Check 12] Test psa_verify_message - Wrong signature size
[Check 13] Test psa_verify_message - Invalid key handle
[Check 14] Test psa_verify_message - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 252 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_encrypt_setup - CCM - AES
[Check 2] Test psa_aead_encrypt_setup - CCM - AES - Tag length = 4
[Check 3] Test psa_aead_encrypt_setup - CCM - AES - Mismatched tag length
[Check 4] Test psa_aead_encrypt_setup - CCM - AES - Default Tag length
[Check 5] Test psa_aead_encrypt_setup - GCM - AES
[Check 6] Test psa_aead_encrypt_setup - CCM - DES Invalid key
[Check 7] Test psa_aead_encrypt_setup - Invalid usage flag
TEST RESULT: PASSED
******************************************
TEST: 253 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_decrypt_setup - CCM - AES
[Check 2] Test psa_aead_decrypt_setup - CCM - AES - Tag length = 4
[Check 3] Test psa_aead_decrypt_setup - CCM - AES - Mismatched tag length
[Check 4] Test psa_aead_decrypt_setup - CCM - AES - Default Tag length
[Check 5] Test psa_aead_decrypt_setup - GCM - AES
[Check 6] Test psa_aead_decrypt_setup - CCM - DES Invalid key
[Check 7] Test psa_aead_decrypt_setup - Invalid usage flag
TEST RESULT: PASSED
******************************************
TEST: 254 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_generate_nonce
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_generate_nonce - CCM
[Check 2] Test psa_aead_generate_nonce - CCM - Tag length = 4
[Check 3] Test psa_aead_generate_nonce - CCM - Small buffer size
[Check 4] Test psa_aead_generate_nonce - CCM - Uninitialized operation
[Check 5] Test psa_aead_generate_nonce - CCM - Decrypt operation
[Check 6] Test psa_aead_generate_nonce - GCM
[Check 7] Test psa_aead_generate_nonce - GCM - Decrypt operation
TEST RESULT: PASSED
******************************************
TEST: 255 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_nonce
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_set_nonce - Encrypt - CCM
[Check 2] Test psa_aead_set_nonce - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_set_nonce - Encrypt - CCM - Small nonce size
[Check 4] Test psa_aead_set_nonce - Encrypt - CCM - Large nonce size
[Check 5] Test psa_aead_set_nonce - Encrypt - CCM - Invalid operation state
[Check 6] Test psa_aead_set_nonce - Encrypt - GCM
[Check 7] Test psa_aead_set_nonce - Decrypt - CCM
[Check 8] Test psa_aead_set_nonce - Decrypt - CCM - Tag length = 4
[Check 9] Test psa_aead_set_nonce - Decrypt - CCM - Small nonce size
[Check 10] Test psa_aead_set_nonce - Decrypt - CCM - Large nonce size
[Check 11] Test psa_aead_set_nonce - Decrypt - CCM - Invalid operation state
[Check 12] Test psa_aead_set_nonce - Decrypt - GCM
TEST RESULT: PASSED
******************************************
TEST: 256 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_lengths
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_set_lengths - Encrypt - CCM
[Check 2] Test psa_aead_set_lengths - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_set_lengths - Encrypt - CCM - Zero ad_length
[Check 4] Test psa_aead_set_lengths - Encrypt - CCM - Zero plaintext_length
[Check 5] Test psa_aead_set_lengths - Encrypt - CCM - Invalid operation state
[Check 6] Test psa_aead_set_lengths - Encrypt - GCM
[Check 7] Test psa_aead_set_lengths - Decrypt - CCM
[Check 8] Test psa_aead_set_lengths - Decrypt - CCM - Tag length = 4
[Check 9] Test psa_aead_set_lengths - Decrypt - CCM - Zero ad_length
[Check 10] Test psa_aead_set_lengths - Decrypt - CCM - Zero plaintext_length
[Check 11] Test psa_aead_set_lengths - Decrypt - CCM - Invalid operation state
[Check 12] Test psa_aead_set_lengths - Decrypt - GCM
TEST RESULT: PASSED
******************************************
TEST: 257 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update_ad
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_update_ad - Encrypt - CCM
[Check 2] Test psa_aead_update_ad - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_update_ad - Encrypt - CCM - Zero ad_length
[Check 4] Test psa_aead_update_ad - Encrypt - CCM - Zero plaintext_length
[Check 5] Test psa_aead_update_ad - Encrypt - CCM - Invalid operation state
[Check 6] Test psa_aead_update_ad - Encrypt - CCM - Overflow input length
[Check 7] Test psa_aead_update_ad - Decrypt - CCM
[Check 8] Test psa_aead_update_ad - Decrypt - CCM - Tag length = 4
[Check 9] Test psa_aead_update_ad - Decrypt - CCM - Zero ad_length
[Check 10] Test psa_aead_update_ad - Decrypt - CCM - Zero plaintext_length
[Check 11] Test psa_aead_update_ad - Decrypt - CCM - Invalid operation state
[Check 12] Test psa_aead_update_ad - Decrypt - CCM - Overflow input length
TEST RESULT: PASSED
******************************************
TEST: 258 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_update - Encrypt - CCM
[Check 2] Test psa_aead_update - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_update - Encrypt - CCM - Zero ad_length
[Check 4] Test psa_aead_update - Encrypt - CCM - Zero plaintext_length
[Check 5] Test psa_aead_update - Encrypt - CCM - Small buffer size
[Check 6] Test psa_aead_update - Encrypt - CCM - Less add data than specified
[Check 7] Test psa_aead_update - Encrypt - CCM - Overflow input length
[Check 8] Test psa_aead_update - Encrypt - CCM - Invalid operation state
[Check 9] Test psa_aead_update - Decrypt - CCM
[Check 10] Test psa_aead_update - Decrypt - CCM - Tag length = 4
[Check 11] Test psa_aead_update - Decrypt - CCM - Zero ad_length
[Check 12] Test psa_aead_update - Decrypt - CCM - Zero plaintext_length
[Check 13] Test psa_aead_update - Decrypt - CCM - Small buffer size
[Check 14] Test psa_aead_update - Decrypt - Less add data than specified
[Check 15] Test psa_aead_update - Decrypt - CCM - Overflow input length
[Check 16] Test psa_aead_update - Decrypt - CCM - Invalid operation state
TEST RESULT: PASSED
******************************************
TEST: 259 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_finish - AES-CCM
[Check 2] Test psa_aead_finish - AES-CCM 24 bytes Tag length = 4
[Check 3] Test psa_aead_finish - Small buffer size
[Check 4] Test psa_aead_finish - Input length is less than plaintext length
[Check 5] Test psa_aead_finish - GCM - 16B AES - 12B Nonce & 12B additional data
TEST RESULT: PASSED
******************************************
TEST: 260 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_abort - Encrypt - CCM - AES
[Check 2] Test psa_aead_abort - Encrypt - GCM - AES
[Check 3] Test psa_aead_abort - Decrypt - CCM - AES
[Check 4] Test psa_aead_abort - Decrypt - GCM - AES
[Check 5] Test psa_aead_abort with all initializations
TEST RESULT: PASSED
******************************************
TEST: 261 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_verify - AES-CCM
[Check 2] Test psa_aead_verify - AES-CCM 24 bytes Tag length = 4
[Check 3] Test psa_aead_verify - Small buffer size
[Check 4] Test psa_aead_verify - Input length is less than plaintext length
[Check 5] Test psa_aead_verify - GCM - 16B AES - 12B Nounce & 12B addi data
TEST RESULT: PASSED
******************************************
************ Crypto Suite Report **********
TOTAL TESTS : 61
TOTAL PASSED : 61
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
Entering standby..
```
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-iat-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Attestation Suite
******************************************
TEST: 601 | DESCRIPTION: Testing attestation initial attestation APIs | UT: psa_initial_attestation
[Info] Executing tests from non-secure
[Check 1] Test psa_initial_attestation_get_token with Challenge 32
[Check 2] Test psa_initial_attestation_get_token with Challenge 48
[Check 3] Test psa_initial_attestation_get_token with Challenge 64
[Check 4] Test psa_initial_attestation_get_token with zero challenge size
[Check 5] Test psa_initial_attestation_get_token with small challenge size
[Check 6] Test psa_initial_attestation_get_token with invalid challenge size
[Check 7] Test psa_initial_attestation_get_token with large challenge size
[Check 8] Test psa_initial_attestation_get_token with zero as token size
[Check 9] Test psa_initial_attestation_get_token with small token size
[Check 10] Test psa_initial_attestation_get_token_size with Challenge 32
[Check 11] Test psa_initial_attestation_get_token_size with Challenge 48
[Check 12] Test psa_initial_attestation_get_token_size with Challenge 64
[Check 13] Test psa_initial_attestation_get_token_size with zero challenge size
[Check 14] Test psa_initial_attestation_get_token_size with small challenge size
[Check 15] Test psa_initial_attestation_get_token_size with invalid challenge size
[Check 16] Test psa_initial_attestation_get_token_size with large challenge size
TEST RESULT: PASSED
******************************************
************ Attestation Suite Report **********
TOTAL TESTS : 1
TOTAL PASSED : 1
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
Entering standby..
```
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-its-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Storage Suite
******************************************
TEST: 401 | DESCRIPTION: UID not found check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call get API for UID 6 which is not set
[Check 2] Call get_info API for UID 6 which is not set
[Check 3] Call remove API for UID 6 which is not set
[Check 4] Call get API for UID 6 which is removed
[Check 5] Call get_info API for UID 6 which is removed
[Check 6] Call remove API for UID 6 which is removed
Set storage for UID 6
[Check 7] Call get API for different UID 5
[Check 8] Call get_info API for different UID 5
[Check 9] Call remove API for different UID 5
TEST RESULT: PASSED
******************************************
TEST: 402 | DESCRIPTION: Write once error check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Update the flag of UID 1 with WRITE_ONCE flag
[Check 2] Try to remove the UID 1 having WRITE_ONCE flag
[Check 3] Create a new UID 2 with WRITE_ONCE flag
[Check 4] Try to remove the UID 2 having WRITE_ONCE flag
[Check 5] Try to change the length of write_once UID 2
[Check 6] Check UID removal still fails
[Check 7] Try to change the WRITE_ONCE flag to None for UID 2
[Check 8] Check UID removal still fails
TEST RESULT: PASSED
******************************************
TEST: 403 | DESCRIPTION: Insufficient space check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Overload storage space
UID 13 set failed due to insufficient space
Remove all registered UIDs
[Check 2] Overload storage again to verify all previous UID removed
UID 13 set failed due to insufficient space
Remove all registered UIDs
TEST RESULT: PASSED
******************************************
TEST: 404 | DESCRIPTION: Data Consistency check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2
[Check 2] Call get API with default length - TEST_BUFF_SIZE
TEST RESULT: PASSED
******************************************
TEST: 405 | DESCRIPTION: Success scenarios check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Set UID with data length zero and call storage APIs
[Check 2] Resetting the length check
TEST RESULT: PASSED
******************************************
TEST: 406 | DESCRIPTION: Check for storage create flags | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE
[Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY
[Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION
TEST RESULT: PASSED
******************************************
TEST: 407 | DESCRIPTION: Incorrect Size check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
Create a valid Storage - TEST_BUFF_SIZE/2
Increase the length of storage - TEST_BUFF_SIZE
[Check 1] Call get API with old length - TEST_BUFF_SIZE/2
[Check 2] Call get API with old length - TEST_BUFF_SIZE/4
Decrease the length of storage - TEST_BUFF_SIZE/4
[Check 3] Call get API with old length - TEST_BUFF_SIZE/2
[Check 4] Call get API with old length - TEST_BUFF_SIZE
[Check 5] Call get API with valid length - TEST_BUFF_SIZE/4
TEST RESULT: PASSED
******************************************
TEST: 408 | DESCRIPTION: Invalid offset check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Try to access data with varying valid offset
[Check 2] Try to access data with varying invalid offset
TEST RESULT: PASSED
******************************************
TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call set API with NULL pointer and data length 0
[Check 2] Call get API with NULL read buffer and data length 0
[Check 3] Remove the UID
[Check 4] Call get_info API to verify UID removed
[Check 5] Create UID with zero data_len and valid write buffer
[Check 8] Call get API with NULL read buffer and data length 0
[Check 9] Increase the length
TEST RESULT: PASSED
******************************************
TEST: 410 | DESCRIPTION: UID value zero check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Creating storage with UID 0 should fail
[Check 2] Get_info for UID 0 should fail
[Check 3] Removing storage with UID 0 should fail
TEST RESULT: PASSED
******************************************
************ Storage Suite Report **********
TOTAL TESTS : 10
TOTAL PASSED : 10
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
Entering standby..
```
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-ps-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Storage Suite
******************************************
TEST: 401 | DESCRIPTION: UID not found check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call get API for UID 6 which is not set
[Check 2] Call get_info API for UID 6 which is not set
[Check 3] Call remove API for UID 6 which is not set
[Check 4] Call get API for UID 6 which is removed
[Check 5] Call get_info API for UID 6 which is removed
[Check 6] Call remove API for UID 6 which is removed
Set storage for UID 6
[Check 7] Call get API for different UID 5
[Check 8] Call get_info API for different UID 5
[Check 9] Call remove API for different UID 5
TEST RESULT: PASSED
******************************************
TEST: 402 | DESCRIPTION: Write once error check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Update the flag of UID 1 with WRITE_ONCE flag
[Check 2] Try to remove the UID 1 having WRITE_ONCE flag
[Check 3] Create a new UID 2 with WRITE_ONCE flag
[Check 4] Try to remove the UID 2 having WRITE_ONCE flag
[Check 5] Try to change the length of write_once UID 2
[Check 6] Check UID removal still fails
[Check 7] Try to change the WRITE_ONCE flag to None for UID 2
[Check 8] Check UID removal still fails
TEST RESULT: PASSED
******************************************
TEST: 403 | DESCRIPTION: Insufficient space check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Overload storage space
UID 13 set failed due to insufficient space
Remove all registered UIDs
[Check 2] Overload storage again to verify all previous UID removed
UID 13 set failed due to insufficient space
Remove all registered UIDs
TEST RESULT: PASSED
******************************************
TEST: 404 | DESCRIPTION: Data Consistency check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2
[ 32.304821] random: crng init done
[Check 2] Call get API with default length - TEST_BUFF_SIZE
TEST RESULT: PASSED
******************************************
TEST: 405 | DESCRIPTION: Success scenarios check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Set UID with data length zero and call storage APIs
[Check 2] Resetting the length check
TEST RESULT: PASSED
******************************************
TEST: 406 | DESCRIPTION: Check for storage create flags | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE
[Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY
[Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION
TEST RESULT: PASSED
******************************************
TEST: 407 | DESCRIPTION: Incorrect Size check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Create a valid Storage - TEST_BUFF_SIZE/2
Increase the length of storage - TEST_BUFF_SIZE
[Check 1] Call get API with old length - TEST_BUFF_SIZE/2
[Check 2] Call get API with old length - TEST_BUFF_SIZE/4
Decrease the length of storage - TEST_BUFF_SIZE/4
[Check 3] Call get API with old length - TEST_BUFF_SIZE/2
[Check 4] Call get API with old length - TEST_BUFF_SIZE
[Check 5] Call get API with valid length - TEST_BUFF_SIZE/4
TEST RESULT: PASSED
******************************************
TEST: 408 | DESCRIPTION: Invalid offset check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Try to access data with varying valid offset
[Check 2] Try to access data with varying invalid offset
TEST RESULT: PASSED
******************************************
TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call set API with NULL pointer and data length 0
[Check 2] Call get API with NULL read buffer and data length 0
[Check 3] Remove the UID
[Check 4] Call get_info API to verify UID removed
[Check 5] Create UID with zero data_len and valid write buffer
[Check 8] Call get API with NULL read buffer and data length 0
[Check 9] Increase the length
TEST RESULT: PASSED
******************************************
TEST: 410 | DESCRIPTION: UID value zero check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Creating storage with UID 0 should fail
[Check 2] Get_info for UID 0 should fail
[Check 3] Removing storage with UID 0 should fail
TEST RESULT: PASSED
******************************************
TEST: 411 | DESCRIPTION: Optional APIs: UID not found check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 412 | DESCRIPTION: Optional APIs: Invalid arguments and offset invalid | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 413 | DESCRIPTION: Set_Extended and Create api : Success | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 414 | DESCRIPTION: Optional APIs not supported check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Optional PS APIs are not supported.
[Check 1] Call to create API should fail as API not supported
Failed at Checkpoint: 1
Actual: 0
Expected: -134
TEST RESULT: FAILED (Error Code=0x1)
******************************************
TEST: 415 | DESCRIPTION: Create API write_once flag value check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 416 | DESCRIPTION: Storage assest capacity modification check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs not are supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 417 | DESCRIPTION: Storage assest capacity modification check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs not are supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
************ Storage Suite Report **********
TOTAL TESTS : 17
TOTAL PASSED : 10
TOTAL SIM ERROR : 0
TOTAL FAILED : 1
TOTAL SKIPPED : 6
******************************************
Entering standby..
```
**Component test (linux-pc)**
```lines=12
#
LD_PRELOAD=trusted-services/tools/b-test/install/linux-pc/lib/libts.so
o trusted-services/tools/b-test/install/linux-pc/bin/component-test -v
TEST(BlockVolumeTests, oversizeWrite) - 0 ms
TEST(BlockVolumeTests, multipleImageInstall) - 0 ms
TEST(BlockVolumeTests, seekAccess) - 0 ms
TEST(BlockVolumeTests, readAndWrite) - 0 ms
TEST(BlockVolumeTests, openClose) - 0 ms
IGNORE_TEST(PartitionTableTests, detectCorruptedGptHeader) - 0 ms
TEST(PartitionTableTests, detectCorruptedMbr) - 2 ms
TEST(PartitionTableTests, loadRefPartitionTable) - 1 ms
TEST(GptIteratorTests, iterateOverRefGpt) - 0 ms
TEST(UefiVariableStoreTests, noRemoveCheck) - 0 ms
TEST(UefiVariableStoreTests, readOnlycheck) - 0 ms
TEST(UefiVariableStoreTests, unsupportedAttribute) - 0 ms
TEST(UefiVariableStoreTests, failedNvSet) - 0 ms
TEST(UefiVariableStoreTests, enumerateStoreContents) - 0 ms
TEST(UefiVariableStoreTests, runtimeAccess) - 0 ms
TEST(UefiVariableStoreTests, bootServiceAccess) - 0 ms
TEST(UefiVariableStoreTests, removePersistent) - 0 ms
TEST(UefiVariableStoreTests, removeVolatile) - 0 ms
TEST(UefiVariableStoreTests, getWithSmallBuffer) - 0 ms
TEST(UefiVariableStoreTests, persistentSetGet) - 0 ms
TEST(UefiVariableStoreTests, setGetRoundtrip) - 0 ms
TEST(UefiVariableIndexTests, setCheckConstraintsNonExistingVar) - 0 ms
TEST(UefiVariableIndexTests, setCheckConstraintsExistingVar) - 0 ms
TEST(UefiVariableIndexTests, checkIterator) - 0 ms
TEST(UefiVariableIndexTests, removeVariable) - 0 ms
TEST(UefiVariableIndexTests, dumpBufferTooSmall) - 0 ms
TEST(UefiVariableIndexTests, dumpLoadRoadtrip) - 0 ms
TEST(UefiVariableIndexTests, enumerateStore) - 0 ms
TEST(UefiVariableIndexTests, variableIndexFull) - 0 ms
TEST(UefiVariableIndexTests, addWithOversizedName) - 0 ms
TEST(UefiVariableIndexTests, emptyIndexOperations) - 0 ms
TEST(SfsBlockStoreTests, psCreateAndSetExtended) - 0 ms
TEST(SfsBlockStoreTests, psCreateAndSet) - 0 ms
TEST(SfsBlockStoreTests, itsStorageLimitTest) - 0 ms
TEST(SfsBlockStoreTests, itsStoreNewItem) - 0 ms
TEST(SfsRamTests, psCreateAndSetExtended) - 0 ms
TEST(SfsRamTests, psCreateAndSet) - 0 ms
TEST(SfsRamTests, itsStorageLimitTest) - 0 ms
TEST(SfsRamTests, itsStoreNewItem) - 0 ms
TEST(MockStoreTests, psCreateAndSetExtended) - 0 ms
TEST(MockStoreTests, psCreateAndSet) - 0 ms
TEST(MockStoreTests, itsStorageLimitTest) - 0 ms
TEST(MockStoreTests, itsStoreNewItem) - 0 ms
TEST(SecureStorageProxyTests, psCreateAndSetExtended) - 0 ms
TEST(SecureStorageProxyTests, psCreateAndSet) - 0 ms
TEST(SecureStorageProxyTests, itsStorageLimitTest) - 0 ms
TEST(SecureStorageProxyTests, itsStoreNewItem) - 0 ms
TEST(SecureStorageClientTests, psCreateAndSetExtended) - 0 ms
TEST(SecureStorageClientTests, psCreateAndSet) - 0 ms
TEST(SecureStorageClientTests, itsStorageLimitTest) - 0 ms
TEST(SecureStorageClientTests, itsStoreNewItem) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkKeyUsage) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkKeyLifetime) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkAlg) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkDhGroup) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkEccCurve) - 0 ms
TEST(CryptoProtocolPackedcChecks, checkKeyType) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkKeyUsage) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkKeyLifetime) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkAlg) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkDhGroup) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkEccCurve) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkKeyType) - 0 ms
TEST(CryptoProtocolOpcodeChecks, checkPackedcToProtobuf) - 0 ms
TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 2 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 0 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 0 ms
TEST(CryptoMacServicePackedcTests, macAbort) - 0 ms
TEST(CryptoMacServicePackedcTests, signAndVerify) - 0 ms
TEST(CryptoCipherServicePackedcTests, cipherAbort) - 0 ms
TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 0 ms
TEST(CryptoHashServicePackedcTests, hashAbort) - 0 ms
TEST(CryptoHashServicePackedcTests, hashAndVerify) - 0 ms
TEST(CryptoHashServicePackedcTests, calculateHash) - 0 ms
TEST(CryptoServicePackedcTests, generateRandomNumbers) - 0 ms
TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 8 ms
TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 2 ms
TEST(CryptoServicePackedcTests, signAndVerifyEat) - 5 ms
TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 4 ms
TEST(CryptoServicePackedcTests, signAndVerifyHash) - 4 ms
TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 0 ms
TEST(CryptoServicePackedcTests, exportPublicKey) - 1 ms
TEST(CryptoServicePackedcTests, purgeKey) - 0 ms
TEST(CryptoServicePackedcTests, copyKey) - 2 ms
TEST(CryptoServicePackedcTests, generatePersistentKeys) - 0 ms
TEST(CryptoServicePackedcTests, generateVolatileKeys) - 1 ms
TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 0 ms
- 43 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 2 ms
TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 4 ms
TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 4 ms
TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 0 ms
TEST(CryptoServiceProtobufTests, exportPublicKey) - 1 ms
TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 1 ms
TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 0 ms
TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 104 ms
TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 22 ms
TEST(CryptoFaultTests, randomNumbersWithBrokenStorage) - 0 ms
TEST(CryptoFaultTests, persistentKeysWithBrokenStorage) - 0 ms
TEST(CryptoFaultTests, volatileKeyWithBrokenStorage) - 0 ms
TEST(PocCryptoOpTests, checkOpSequence) - 1 ms
TEST(CryptoMsgTests, SignHashOutMsgTest) - 0 ms
TEST(CryptoMsgTests, SignHashInMsgTest) - 0 ms
TEST(CryptoMsgTests, ExportPublicKeyOutMsgTest) - 0 ms
TEST(CryptoMsgTests, ExportPublicKeyInMsgTest) - 0 ms
TEST(CryptoMsgTests, GenerateKeyInMsgTest) - 0 ms
TEST(CryptoContextPoolTests, multipleContexts) - 1 ms
TEST(CryptoContextPoolTests, singleContext) - 0 ms
TEST(CryptoContextPoolTests, checkEmptyPool) - 0 ms
TEST(FwuUpdateFmpTests, wholeFmpFlow) - 0 ms
TEST(FwuOversizeImageTests, oversizeInstallMultiLocationEndStaging) - 1 ms
TEST(FwuOversizeImageTests, oversizeInstallEndStaging) - 0 ms
TEST(FwuOversizeImageTests, oversizeInstallCancelStaging) - 0 ms
TEST(FwuOversizeImageTests, maxSizeInstall) - 0 ms
TEST(FwuRollbackTests, bootloaderFallback) - 0 ms
TEST(FwuRollbackTests, selectPreviousAfterActivation) - 0 ms
TEST(FwuRollbackTests, selectPreviousPriorToActivation) - 1 ms
TEST(FwuPowerFailureTests, powerFailureDuringTrial) - 0 ms
TEST(FwuPowerFailureTests, powerFailureDuringStaging) - 1 ms
TEST(FwuUpdateScenarioTests, partialFirmwareUpdateFlow) - 1 ms
TEST(FwuUpdateScenarioTests, wholeFirmwareUpdateFlow) - 0 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInTrial) - 0 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInStaging) - 0 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInRegular) - 0 ms
TEST(FwuImageDirectoryTests, zeroFwLocations) - 1 ms
TEST(FwuImageDirectoryTests, multipleFwLocations) - 0 ms
TEST(FwuImageDirectoryTests, singleFwLocation) - 0 ms
TEST(FwuImageDirectoryTests, streamRecycling) - 0 ms
TEST(FwuImageDirectoryTests, streamedReads) - 0 ms
TEST(FwuDefaultInstallerFactoryTests, configureInstallersFlow) - 0 ms
TEST(FwuCopyInstallerTests, installAndCopy) - 1 ms
TEST(FwuRawInstallerTests, normalInstallFlow) - 1 ms
TEST(FwuMetadataV2Tests, checkImgBankInfoStructure) - 0 ms
TEST(FwuMetadataV2Tests, checkImgEntryStructure) - 0 ms
TEST(FwuMetadataV2Tests, checkFwStoreDescStructure) - 0 ms
TEST(FwuMetadataV2Tests, checkHeaderStructure) - 0 ms
TEST(FwuMetadataManagerTests, checkAndRepairInaccessibleStorage) - 0 ms
TEST(FwuMetadataManagerTests, checkAndRepairAccessibleStorage) - 1 ms
TEST(PartitionedBlockStoreTests, writeToInvalidBlock) - 0 ms
TEST(PartitionedBlockStoreTests, checkEraseLimits) - 0 ms
TEST(PartitionedBlockStoreTests, writeReadEraseBlock) - 0 ms
TEST(PartitionedBlockStoreTests, openClose) - 0 ms
TEST(PartitionedBlockStoreTests, getPartitionInfo) - 0 ms
TEST(FileBlockStoreTests, initWithExistingDiskImage) - 0 ms
TEST(FileBlockStoreTests, wholeBlockRw) - 1 ms
TEST(RamBlockStoreTests, eraseOperations) - 0 ms
TEST(RamBlockStoreTests, writeToInvalidBlock) - 0 ms
TEST(RamBlockStoreTests, writeBiggerThanBlock) - 0 ms
TEST(RamBlockStoreTests, writeReadEraseBlock) - 0 ms
TEST(RamBlockStoreTests, openClose) - 0 ms
TEST(RamBlockStoreTests, getPartitionInfo) - 0 ms
TEST(AttestationProvisioningTests, provisionedIak) - 0 ms
TEST(AttestationProvisioningTests, selfGeneratedIak) - 1 ms
TEST(AttestationServiceTests, repeatedOperation) - 69 ms
TEST(AttestationServiceTests, invalidChallengeLen) - 0 ms
TEST(AttestationServiceTests, checkTokenSize) - 1 ms
TEST(AttestationReporterTests, createReport) - 3 ms
TEST(TcgEventLogTests, interateBootMeasurements) - 0 ms
TEST(DiscoveryServiceTests, checkServiceInfo) - 0 ms
TEST(ServiceNameTests, readService) - 0 ms
TEST(ServiceNameTests, checkFields) - 0 ms
TEST(ServiceNameTests, checkInvalidServiceNames) - 0 ms
TEST(ServiceNameTests, checkValidServiceNames) - 0 ms
TEST(ServiceFrameworkTests, serviceProviderChain) - 0 ms
TEST(ServiceFrameworkTests, serviceWithOps) - 0 ms
TEST(ServiceFrameworkTests, serviceWithNoOps) - 0 ms
TEST(ffarpc_call_ep, request_deny_64_bit) - 0 ms
TEST(ffarpc_call_ep, request_with_data_after_unshare) - 0 ms
TEST(ffarpc_call_ep, request_with_data_buffer_overflow) - 0 ms
TEST(ffarpc_call_ep, request_with_data) - 0 ms
TEST(ffarpc_call_ep, request_without_data_non_zero_length) - 0 ms
TEST(ffarpc_call_ep, request_without_data) - 0 ms
TEST(ffarpc_call_ep, invalid_mgmt_call) - 0 ms
TEST(ffarpc_call_ep, mem_unshare_null_ep) - 0 ms
TEST(ffarpc_call_ep, mem_share_unshare_relinquish_fail_then_success) - 0 ms
TEST(ffarpc_call_ep, mem_share_unshare_relinquish_fail) - 0 ms
TEST(ffarpc_call_ep, mem_share_unshare) - 0 ms
TEST(ffarpc_call_ep, mem_unshare) - 0 ms
TEST(ffarpc_call_ep, mem_share_null_ep) - 0 ms
TEST(ffarpc_call_ep, mem_share_smaller_page_count_relinquish_fail) - 0 ms
TEST(ffarpc_call_ep, mem_share_smaller_page_count) - 0 ms
TEST(ffarpc_call_ep, mem_share_retrieve_fail) - 0 ms
TEST(ffarpc_call_ep, mem_share_fill_all) - 0 ms
TEST(ffarpc_call_ep, mem_share) - 0 ms
TEST(ffarpc_caller, end) - 0 ms
TEST(ffarpc_caller, end_null_handle) - 0 ms
TEST(ffarpc_caller, end_null_context) - 0 ms
TEST(ffarpc_caller, invoke_without_response) - 1 ms
TEST(ffarpc_caller, invoke_with_response) - 0 ms
TEST(ffarpc_caller, invoke_invalid_resp_len) - 0 ms
TEST(ffarpc_caller, invoke_send_direct_req_fail) - 0 ms
TEST(ffarpc_caller, invoke_resp_long_req) - 0 ms
TEST(ffarpc_caller, invoke_resp_no_begin) - 0 ms
TEST(ffarpc_caller, invoke_resp_len_null) - 0 ms
TEST(ffarpc_caller, invoke_resp_buf_null) - 0 ms
TEST(ffarpc_caller, invoke_opstatus_null) - 0 ms
TEST(ffarpc_caller, invoke_handle_context_diff) - 0 ms
TEST(ffarpc_caller, invoke_null_context) - 0 ms
TEST(ffarpc_caller, begin_without_buffer) - 0 ms
TEST(ffarpc_caller, begin_with_buffer) - 0 ms
TEST(ffarpc_caller, begin_not_opened) - 0 ms
TEST(ffarpc_caller, begin_too_large_req) - 0 ms
TEST(ffarpc_caller, begin_transaction_in_progress) - 0 ms
TEST(ffarpc_caller, begin_null_buffer) - 0 ms
TEST(ffarpc_caller, begin_null_context) - 0 ms
TEST(ffarpc_caller, close_success) - 0 ms
TEST(ffarpc_caller, close_endpoint_and_mem_reclaim_fail) - 0 ms
TEST(ffarpc_caller, close_mem_reclaim_fail) - 0 ms
TEST(ffarpc_caller, close_send_direct_msg_fail) - 0 ms
TEST(ffarpc_caller, close_not_opened) - 0 ms
TEST(ffarpc_caller, open_success) - 0 ms
TEST(ffarpc_caller, open_send_direct_req_rpc_status_fail_reclaim_fail) - 0 ms
TEST(ffarpc_caller, open_send_direct_req_rpc_status_fail) - 0 ms
TEST(ffarpc_caller, open_send_direct_req_fail) - 0 ms
TEST(ffarpc_caller, open_share_fail) - 0 ms
TEST(ffarpc_caller, open_invalid_mem_size) - 0 ms
TEST(ffarpc_caller, open_already_opened) - 0 ms
TEST(ffarpc_caller, discover_more_max_cnt) - 0 ms
TEST(ffarpc_caller, discover_less_max_cnt) - 0 ms
TEST(ffarpc_caller, discover) - 0 ms
TEST(ffarpc_caller, discover_rx_release_fail) - 0 ms
TEST(ffarpc_caller, discover_rx_get_fail) - 0 ms
TEST(ffarpc_caller, discover_partition_info_get_fail) - 0 ms
TEST(ffarpc_caller, discover_invalid_arguments) - 0 ms
TEST(RpcStatusProtocolChecks, checkProtobufRpcStatusCodes) - 0 ms
TEST(ConfigRamstoreTests, checkMultipleConfig) - 0 ms
TEST(ConfigRamstoreTests, checkSingleConfig) - 0 ms
TEST(ConfigRamstoreTests, checkEmptyConfig) - 0 ms
TEST(Crc32Tests, multiPart) - 0 ms
TEST(Crc32Tests, longString) - 0 ms
TEST(Crc32Tests, shortString) - 0 ms
TEST(EndianTests, le64) - 0 ms
TEST(EndianTests, le32) - 0 ms
TEST(EndianTests, le16) - 0 ms
TEST(EndianTests, le8) - 0 ms
TEST(TlvTests, encodeWrongOrder) - 0 ms
TEST(TlvTests, encodeInsufficientSpace) - 0 ms
TEST(TlvTests, encodeRecords) - 0 ms
TEST(TlvTests, decodeBadRecords) - 0 ms
TEST(TlvTests, findAndDecodeMissingOptional) - 0 ms
TEST(TlvTests, findAndDecode) - 0 ms
TEST(TlvTests, decodeGoodRecords) - 0 ms
TEST(UuidTests, roundTrip) - 0 ms
TEST(UuidTests, checkNilUuidOperations) - 0 ms
TEST(UuidTests, checkIsEqualOperation) - 0 ms
TEST(UuidTests, checkOctetsFromCanonical) - 0 ms
TEST(UuidTests, parseValidUuidToGuidOctets) - 0 ms
TEST(UuidTests, parseError) - 0 ms
TEST(UuidTests, parseUuidInUrn) - 0 ms
TEST(UuidTests, parseValidUuidMixedCase) - 0 ms
TEST(UuidTests, parseValidUuidLowerCase) - 0 ms
TEST(TsDemoTests, runTsDemo) - 12 ms
OK (252 tests, 251 ran, 365136 checks, 1 ignored, 0 filtered out, 312 ms)
```
**Platform inspect test (arm-linux)**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/platform-inspect
attestation_report:
challenge: ff c6 73 db 82 96 88 da d9 02 a7 42 90 e4 99 f3 00 b2 d1 4a 86 88 ee 18 74 3e 0f 5f 27 dd cc 41
client_id: 0
boot_seed: a9 91 6f ce 19 d7 3c ec f7 b7 03 74 04 a6 ae b6 48 9d 6d ca 8a fc 86 84 d0 45 17 21 93 22 23 56
security_lifecycle: 0
instance_id: 01 9c d5 b1 3e 0b 88 a9 12 87 c7 1e 52 0d 58 39 92 a7 69 d9 58 bb 8a db 10 15 f0 77 c0 a1 25 63 32
implementation_id: 74 72 75 73 74 65 64 66 69 72 6d 77 61 72 65 2e 6f 72 67 2e 74 73 2e 61 74 74 65 73 74 61 74 69 6f 6e 5f 73 70
sw_components:
type: FW_CONFIG
digest: 5e 10 97 50 c0 cb 32 14 e6 e4 09 f7 12 ba 84 d6 d1 d6 e2 d4 45 8c 52 f3 d2 b9 6e ea 82 d4 e5 47
type: TB_FW_CONFIG
digest: 20 df 7a fd 3c 74 7b 47 b7 22 77 2c 66 f0 ca 61 10 ab 1e 98 b4 f1 ac 1c 54 0f 5b c8 53 b5 92 45
type: BL_2
digest: 84 4b 45 0e df c8 78 63 f8 5f 7f 37 95 b5 73 91 f8 07 b5 3a 01 b4 83 90 72 12 27 40 82 3e 09 9f
type: SECURE_RT_EL3
digest: b9 06 f7 d9 31 ac 69 ae 48 fa 16 7a 54 08 b2 7e 58 6a b7 a7 44 f2 0a d2 6f ca 0a 76 eb 8c 84 73
type: HW_CONFIG
digest: 54 10 fe 53 a5 fe 12 75 dc cc 3a 15 8f d8 34 63 f3 3e 1e 71 7f e3 4c 39 a1 62 4a 90 5c 0a 84 f3
type: SOC_FW_CONFIG
digest: 4e e4 8e 5a e6 50 ed e0 b5 a3 54 8a 1f d6 0e 8a ea 0e 71 75 0e a4 3f 82 76 ce af cd 7c b0 91 e0
type: SECURE_RT_EL1_UNKNOWN
digest: fb 4f 96 e3 7b c0 ca 61 a8 60 6d 70 73 92 7a cd b3 07 72 fc 1c 21 f7 6a 5b d6 6c 72 e5 da 5d ae
type: TOS_FW_CONFIG
digest: ac b0 1f fa 86 25 ca 06 59 60 e1 8d 47 8d 5f 84 45 b2 82 6c 9e b6 c4 17 ff c3 7b e1 b9 c7 f0 06
type: BL_33
digest: 9c 76 10 58 c1 02 db 86 b8 cc 9f 37 72 b8 b0 00 8a 60 cc b5 ee 7b bd 9d 48 1c e0 14 60 d9 ef bb
type: NT_FW_CONFIG
digest: 0c 53 ba 3f c9 43 13 bf 25 59 bc 8c 2e 7e 49 fa 0f 1a 5a 40 96 ed 58 fa 58 31 39 7a de d4 e4 fb
type: SP1
digest: 3f a5 20 ed df 82 81 7b ca b2 1f 48 04 bf 05 8b e2 3b 4e f3 55 33 55 d4 22 69 bb b8 c0 d5 7a 44
type: SP2
digest: 14 5a ff 57 6e 5a 72 3e fc 97 7a 88 3b 90 0f b1 57 5d aa 3c d4 eb 27 d6 11 84 6c 5f 2c b3 17 fd
type: SP3
digest: e7 72 fc a5 6b 4d dc db 70 d1 86 7f ca ae f4 20 6a 5d 68 c6 64 7b 9d a9 44 44 28 8b 12 d2 19 87
type: SP4
digest: 02 c2 f8 d4 d4 9a 27 6b 2d 90 ad f4 df ed f1 5a 7a 74 f6 f3 0f 9a f9 e9 68 59 ee cd d6 2e e2 4b
type: SP5
digest: 7c a8 ee e7 b1 31 62 f1 7d eb 34 8d c4 a6 5d ff 5d 44 59 88 2c 6d 96 9b d6 c6 8e 9b 9a 79 ea ca
type: CRITICAL DATA
digest: d3 a9 31 35 10 be c0 88 51 bd 28 4e a9 ff b3 c3 cd 02 11 fc 23 2e 02 07 0e ce a5 ab 1d d9 a1 6a
```
**TS Demo test (arm-linux)**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/ts-demo
Demonstrates use of trusted services from an application
---------------------------------------------------------
A client requests a set of crypto operations performed by
the Crypto service. Key storage for persistent keys is
provided by the Secure Storage service via the ITS client.
Generating random bytes length: 1
Operation successful
Random bytes:
D4
Generating random bytes length: 7
Operation successful
Random bytes:
83 C7 5C B0 01 2C 36
Generating random bytes length: 128
Operation successful
Random bytes:
CC F8 93 DB D5 EA EF 96
AE 69 F1 2C 58 97 26 C6
B7 25 8E E4 A6 F2 3B 38
22 9D FD 30 ED B2 46 29
FF 4C A4 04 97 0F A0 8B
74 F0 AC 6F 10 08 62 BE
7E 61 20 B2 60 AA 6C 7E
E2 6D A3 51 4B 9A 3A 26
1E 5F 55 48 11 6D 1F D7
DD 07 7C 6A 65 6D 67 C2
12 4F 84 27 67 8C A1 24
AC 61 81 20 37 C0 30 5F
3E 0C 9B 38 B0 91 07 13
9A 2B E3 67 45 37 67 1F
69 EF E2 63 8E B4 F6 FE
41 F0 4F EF 9A A7 23 F2
Generating ECC signing key
Operation successful
Signing message: "The quick brown fox" using key: 256
Operation successful
Signature bytes:
7A F5 F1 EB DC D9 36 2C
6B D3 0F F0 19 7C 9A 56
38 16 E1 D3 F8 F8 B4 7A
E9 92 12 F7 44 ED 20 4E
F1 05 3F BE 14 7C D1 8D
6E 94 2B 63 57 71 AB 7A
0E E9 A7 1C 1F C4 C8 93
3D E5 74 F3 6F 4F CA A3
Verify signature using original message: "The quick brown fox"
Operation successful
Verify signature using modified message: "!he quick brown fox"
Successfully detected modified message
Signing message: "jumps over the lazy dog" using key: 256
Operation successful
Signature bytes:
1A 47 A7 A6 B8 4A D2 55
88 94 2B BE AF AB F5 00
69 9F 86 D0 2A 32 20 FB
BE 1D 55 2D CB C9 64 EB
60 8C D6 6E 2D C1 AB A4
7F 9C 33 53 2E 6C 2C 53
2F 06 B3 5E 26 3F 0E 1A
1E 53 12 9D A5 B7 CC C0
Verify signature using original message: "jumps over the lazy dog"
Operation successful
Verify signature using modified message: "!umps over the lazy dog"
Successfully detected modified message
Generating RSA encryption key
Operation successful
Encrypting message: "Top secret" using RSA key: 257
Operation successful
Encrypted message:
15 C1 72 58 67 B1 4F 3E
AF 7D B0 69 1C E5 B3 47
6B 2D 51 04 2A 8D 53 A7
1E B9 94 15 77 9B 8D 61
Decrypting message using RSA key: 257
Operation successful
Decrypted message: "Top secret"
Exporting public key: 256
Operation successful
Public key bytes:
04 8D 7D 0B BA A9 EE C9
59 BA 13 0F 8B E9 94 B9
E8 8B 4D 33 5D 0F 1F 5A
60 F3 B1 0D 09 F2 56 43
6D 7D 05 B5 EE 13 F0 B6
E9 03 6B 1A 40 55 E3 08
70 8F EB AC 5F 2E 9B 26
18 4A C2 9E 73 F7 8A 65
C7
Destroying signing key: 256
Operation successful
Destroying encryption key: 257
Operation successful
```
==Config 3: OP-TEE SPMC tests==
====Build command====
```
MEASURED_BOOT=n SPMC_TESTS=y TS_SMM_GATEWAY=n TS_UEFI_TESTS=n SP_PACKAGING_METHOD=embedded DEFAULT_SP_CONFIG=default-opteesp make
```
====Setup steps after boot====
```
/mnt/host/out/linux-arm-ffa-tee/load_module.sh
/mnt/host/out/linux-arm-ffa-user/load_module.sh
```
====Test results====
**SPMC tests (arm-linux)**
```lines=12
#xtest -t ffa_spmc
Run test suite with level=0
TEE test application started over default TEE instance
######################################################
#
# ffa_spmc
#
######################################################
* ffa_spmc_1001 Test FF-A communication
o ffa_spmc_1001.1 SP1 comms check
ffa_spmc_1001.1 OK
o ffa_spmc_1001.2 Sp2 comms check
ffa_spmc_1001.2 OK
o ffa_spmc_1001.3 SP to SP messaging check
ffa_spmc_1001.3 OK
ffa_spmc_1001 OK
* ffa_spmc_1002 Test FF-A memory: share memory from Normal World to SP
o ffa_spmc_1002.1 Test memory set-up
ffa_spmc_1002.1 OK
o ffa_spmc_1002.2 Test retrieve memory second time
ffa_spmc_1002.2 OK
o ffa_spmc_1002.3 Test accessing memory
ffa_spmc_1002.3 OK
o ffa_spmc_1002.4 Test relinquish memory
ffa_spmc_1002.4 OK
o ffa_spmc_1002.5 Test incorrect reclaim
ffa_spmc_1002.5 OK
o ffa_spmc_1002.6 Test relinquish memory second time
ffa_spmc_1002.6 OK
o ffa_spmc_1002.7 Test correct reclaim
ffa_spmc_1002.7 OK
o ffa_spmc_1002.8 Test retrieve invalid memory region
ffa_spmc_1002.8 OK
ffa_spmc_1002 OK
* ffa_spmc_1003 Test FF-A memory: SP to SP
ffa_spmc_1003 OK
* ffa_spmc_1004 Test FF-A memory: Access and flags
o ffa_spmc_1004.1 Test sharing with exc access
ffa_spmc_1004.1 OK
o ffa_spmc_1004.2 Test sharing with incorrect access
ffa_spmc_1004.2 OK
ffa_spmc_1004 OK
+-----------------------------------------------------
Result of testsuite ffa_spmc:
ffa_spmc_1001 OK
ffa_spmc_1002 OK
ffa_spmc_1003 OK
ffa_spmc_1004 OK
+-----------------------------------------------------
39 subtests of which 0 failed
4 test cases of which 0 failed
0 test cases were skipped
TEE test application done!
```
==Config 4: SMMGW tests==
====Build command====
```
MEASURED_BOOT=n SPMC_TESTS=n TS_SMM_GATEWAY=y TS_UEFI_TESTS=y DEFAULT_SP_CONFIG=default-sp SP_PACKAGING_METHOD=fip make
```
====Setup steps after boot====
```
/mnt/host/out/linux-arm-ffa-tee/load_module.sh
/mnt/host/out/linux-arm-ffa-user/load_module.sh
```
====Test results====
**Trusted Services service level test (arm-linux)**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/ts-service-test -v -xgFwuServiceTests
TEST(PsServiceTests, createAndSetExtended) - 19100 ms
TEST(PsServiceTests, createAndSet) - 23732 ms
TEST(PsServiceTests, storeNewItem) - 20301 ms
TEST(ItsServiceTests, storeNewItem) - 20398 ms
TEST(AttestationProvisioningTests, provisionedIak)
/src/trusted-services/components/service/attestation/test/service/attestation_provisioning_tests.cpp:107: error: Failure in TEST(AttestationProvisioningTests, provisionedIak)
/src/trusted-services/components/service/attestation/test/service/attestation_provisioning_tests.cpp:32: error:
CHECK_TRUE(m_attest_service_context) failed
- 4367 ms
TEST(AttestationProvisioningTests, selfGeneratedIak)
/src/trusted-services/components/service/attestation/test/service/attestation_provisioning_tests.cpp:70: error: Failure in TEST(AttestationProvisioningTests, selfGeneratedIak)
/src/trusted-services/components/service/attestation/test/service/attestation_provisioning_tests.cpp:32: error:
CHECK_TRUE(m_attest_service_context) failed
- 2840 ms
TEST(AttestationServiceTests, repeatedOperation)
/src/trusted-services/components/service/attestation/test/service/attestation_service_tests.cpp:142: error: Failure in TEST(AttestationServiceTests, repeatedOperation)
/src/trusted-services/components/service/attestation/test/service/attestation_service_tests.cpp:32: error:
CHECK_TRUE(m_attest_service_context) failed
- 3156 ms
TEST(AttestationServiceTests, invalidChallengeLen)
/src/trusted-services/components/service/attestation/test/service/attestation_service_tests.cpp:90: error: Failure in TEST(AttestationServiceTests, invalidChallengeLen)
/src/trusted-services/components/service/attestation/test/service/attestation_service_tests.cpp:32: error:
CHECK_TRUE(m_attest_service_context) failed
- 2700 ms
TEST(AttestationServiceTests, checkTokenSize)
/src/trusted-services/components/service/attestation/test/service/attestation_service_tests.cpp:60: error: Failure in TEST(AttestationServiceTests, checkTokenSize)
/src/trusted-services/components/service/attestation/test/service/attestation_service_tests.cpp:32: error:
CHECK_TRUE(m_attest_service_context) failed
- 2868 ms
TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 23999 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 27100 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 33218 ms
TEST(CryptoMacServicePackedcTests, macAbort) - 20134 ms
TEST(CryptoMacServicePackedcTests, signAndVerify) - 78644 ms
TEST(CryptoCipherServicePackedcTests, cipherAbort) - 20500 ms
TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 62400 ms
TEST(CryptoHashServicePackedcTests, hashAbort) - 18648 ms
TEST(CryptoHashServicePackedcTests, hashAndVerify) - 30100 ms
TEST(CryptoHashServicePackedcTests, calculateHash) - 13700 ms
TEST(CryptoServicePackedcTests, generateRandomNumbers) - 43332 ms
TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 3362700 ms
TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 151500 ms
TEST(CryptoServicePackedcTests, signAndVerifyEat) - 265100 ms
TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 269600 ms
TEST(CryptoServicePackedcTests, signAndVerifyHash) - 269259 ms
TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 47861 ms
TEST(CryptoServicePackedcTests, exportPublicKey) - 57517 ms
TEST(CryptoServicePackedcTests, purgeKey) - 39394 ms
TEST(CryptoServicePackedcTests, copyKey) - 137000 ms
TEST(CryptoServicePackedcTests, generatePersistentKeys) - 68100 ms
TEST(CryptoServicePackedcTests, generateVolatileKeys) - 57400 ms
TEST(CryptoServiceProtobufTests, generateRandomNumbers)[ 9.056856] random: crng init done
- 44004 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 1227965 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 163563 ms
TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 269643 ms
TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 270000 ms
TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 47842 ms
TEST(CryptoServiceProtobufTests, exportPublicKey) - 57876 ms
TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 67981 ms
TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 57230 ms
TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 10585709 ms
TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 2205184 ms
TEST(DiscoveryServiceTests, checkServiceInfo) - 3818 ms
Errors (5 failures, 45 tests, 43 ran, 339 checks, 0 ignored, 2 filtered out, 20211941 ms)
```
**UEFI tests (arm-linux)**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/uefi-test -v
TEST(SmmVariableAttackTests, getCheckPropertyWithMaxSizeName) - 3744 ms
TEST(SmmVariableAttackTests, getCheckPropertyWithOversizeName) - 1831 ms
TEST(SmmVariableAttackTests, setCheckPropertyWithMaxSizeName) - 2000 ms
TEST(SmmVariableAttackTests, setCheckPropertyWithOversizeName) - 1790 ms
TEST(SmmVariableAttackTests, enumerateWithSizeMaxNameSize) - 5700 ms
TEST(SmmVariableAttackTests, enumerateWithOversizeName) - 1771 ms
TEST(SmmVariableAttackTests, setAndGetWithSizeMaxNameSize) - 2917 ms
TEST(SmmVariableAttackTests, setAndGetWithOversizeName) - 2800 ms
TEST(SmmVariableAttackTests, setWithSizeMaxNameSize) - 1822 ms
TEST(SmmVariableAttackTests, setWithOversizeName) - 1894 ms
TEST(SmmVariableAttackTests, setWithSizeMaxDataSize) - 1867 ms
TEST(SmmVariableAttackTests, setWithOversizeData) - 1800 ms
TEST(SmmVariableServiceTests, checkMaxVariablePayload) - 1700 ms
TEST(SmmVariableServiceTests, setSizeConstraint) - 4400 ms
TEST(SmmVariableServiceTests, enumerateStoreContents) - 23307 ms
TEST(SmmVariableServiceTests, getVarSizeNv) - 5557 ms
TEST(SmmVariableServiceTests, getVarSize) - 2800 ms
TEST(SmmVariableServiceTests, setAndGetNv) - 10157 ms
TEST(SmmVariableServiceTests, setAndGet) - 3600 ms
OK (19 tests, 19 ran, 141 checks, 0 ignored, 0 filtered out, 87201 ms)
```