Phriction Trusted Firmware Trusted Services OP-TEE SPMC status OP-TEE SPMC v3.22 test results History Version 3 vs 4
Version 3 vs 4
Version 3 vs 4
Edits
Edits
- Edit by gabor-toth-arm, Version 4
- Jun 22 2023 1:01 PM
- Edit by gabor-toth-arm, Version 3
- Jun 22 2023 1:00 PM
« Previous Change | Next Change » |
Edit Older Version 3... | Edit Older Version 4... |
Content Changes
Content Changes
=Overview=
This page is to capture the test results for OP-TEE SPMC v3.22
The tests were ran using the following set of components:
```lang=html, lines=12
>>> Manifest status
d064c30 (HEAD -> default, origin/master, m/master) stm32mp1: fetch mbedtls for tf-a authenticated boot
b242f5c stm32mp1: add edk2 and edk2-platforms repos
122fe9a stm32mp1: bump u-boot to 2023.04
Local manifests:
The merged manifest is:
<?xml version="1.0" encoding="UTF-8"?>
<manifest>
<remote fetch="https://git.gitlab.arm.com" name="arm-gitlab"/>
<remote fetch="https://github.com" name="github"/>
<remote fetch="https://git.savannah.gnu.org/git" name="savannah"/>
<remote fetch="https://git.trustedfirmware.org" name="tfo"/>
<default remote="github" revision="master"/>
<project name="Mbed-TLS/mbedtls.git" path="mbedtls" revision="refs/tags/mbedtls-2.28.1"/>
<project name="OP-TEE/build.git" path="build">
<linkfile dest="build/Makefile" src="fvp-psa-sp.mk"/>
</project>
<project name="OP-TEE/optee_client.git" path="optee_client"/>
<project name="OP-TEE/optee_os.git" path="optee_os"/>
<project name="OP-TEE/optee_test.git" path="optee_test"/>
<project clone-depth="1" name="TF-A/trusted-firmware-a.git" path="trusted-firmware-a" remote="tfo" revision="refs/tags/v2.8"/>
<project name="TS/trusted-services.git" path="trusted-services" remote="tfo" revision="integration"/>
<project clone-depth="1" name="buildroot/buildroot.git" path="buildroot" revision="refs/tags/2022.11.1"/>
<project clone-depth="1" name="grub.git" path="grub" remote="savannah" revision="refs/tags/grub-2.02"/>
<project name="linaro-swg/optee_examples.git" path="optee_examples"/>
<project clone-depth="1" name="linux-arm/linux-trusted-services.git" path="linux-arm-ffa-user" remote="arm-gitlab" revision="debugfs-v5"/>
<project clone-depth="1" name="linux-arm/linux-trusted-services.git" path="linux-arm-ffa-tee" remote="arm-gitlab" revision="tee-v1"/>
<project name="tianocore/edk2-platforms.git" path="edk2-platforms" revision="02daa58c21f89628b4d8c76f95f3a554289149bc"/>
<project name="tianocore/edk2.git" path="edk2" revision="dd4cae4d82c7477273f3da455084844db5cca0c0"/>
<project clone-depth="1" name="torvalds/linux.git" path="linux" revision="refs/tags/v6.1"/>
</manifest>
>>>Project status
project build/
Local and remote SHA is matching.
2e792b3 (HEAD, m/master, github/master) fvp, ts: optimize buildroot config
3730e01 fvp, ts: use minimal Linux config
9b54724 Fix build of fTPM by enabling build of 32-bit libraries
project buildroot/
Local and remote SHA is matching.
d48a8beb (grafted, HEAD, tag: 2022.11.1, tag: m/master) Update for 2022.11.1
project edk2/
Local and remote SHA is matching.
dd4cae4d82 (HEAD, m/master) ArmPkg/GenericWatchdogDxe: Split 64bit register write to 2x32bit
1d802e234e BaseTools: Guid.xref doesn't specify the correct GUID value for Driver
83964ebc5e BaseTools/BinToPcd: Encode string returned from ByteArray()
project edk2-platforms/
Local and remote SHA is matching.
02daa58c21 (HEAD, m/master) Silicon/SynQuacer: Add status property in PCIe & SDHC DT nodes
9f02ebc19b Silicon/SynQuacer: add optional OP-TEE DT node
9dae9a0c79 Marvell/Library: ComPhyLib: Clean up the library after rework
project grub/
Local and remote SHA is matching.
e54c99a (grafted, HEAD, tag: grub-2.02, tag: m/master) Increase version to 2.02.
project linux/
Local and remote SHA is matching.
830b3c68c (grafted, HEAD, tag: v6.1, tag: m/master) Linux 6.1
project linux-arm-ffa-tee/
Local and remote SHA is matching.
c6b9495 (grafted, HEAD, m/master, arm-gitlab/tee-v1) Add versioning info to readme
project linux-arm-ffa-user/
Local and remote SHA is matching.
18e3be7 (grafted, HEAD, m/master, arm-gitlab/debugfs-v5) Add support for FF-A driver changes in v6.1
project mbedtls/
Local and remote SHA is matching.
dd79db100 (HEAD, tag: v2.28.1, tag: mbedtls-2.28.1, tag: m/master) Merge pull request #955 from Mbed-TLS/mbedtls-2.28.1rc0-pr
fe9d08fd1 Bump version
fa827b4b3 Minor tweaks to Changelog
project optee_client/
Local and remote SHA is matching.
8533e0e (HEAD, tag: 3.21.0-rc1, tag: 3.21.0, m/master, github/master) travis: remove the .travis.yml file
0fc6ef7 tee-supplicant: fix leak when load plugin failed
dde6306 libteeacl: use realloc() instead of reallocarray()
project optee_examples/
Local and remote SHA is matching.
378dc0d (HEAD, tag: 3.21.0, m/master, github/master) hotp: use sess_ctx instead of global variables
a98d01e (tag: 3.21.0-rc1, tag: 3.20.0-rc1, tag: 3.20.0) pluging: add missing of dependency syslog on teec
3ca8454 Enable compatibility with TEE Internal Core API v1.1
project optee_os/
Local and remote SHA is matching.
280b6a32e (HEAD, m/master, github/master) core: spmc: implement FFA_CONSOLE_LOG
b89b3da24 core: thread: Add support for canary value randomization
fb66b364b mk/aosp_optee.mk: fix build dependency for static libraries
project optee_test/
Local and remote SHA is matching.
232dfd2 (HEAD, m/master, github/master) xtest: remove ffa.h from SPMC test to resolve compiler error
36a136d Android.mk: add subkeys include directory
d168ff4 xtest: fix xtest tool name in usage trace messages
project trusted-firmware-a/
Local and remote SHA is matching.
9881bb9 (grafted, HEAD, tag: v2.8, tag: m/master) Merge "docs(spm): update threat model" into integration
project trusted-services/
Local and remote SHA is matching.
e56c7b1 (HEAD, tfo/integration, m/master) Implement FFA_CONSOLE_LOG interface
0100ddd Add FF-A v1.1 boot protocol
4f9d8e3 Refactor FF-A boot info
```
=Details=
==Config 1: embedded SP==
====Build command====
```
MEASURED_BOOT=y SPMC_TESTS=n TS_SMM_GATEWAY=n TS_UEFI_TESTS=n SP_PACKAGING_METHOD=embedded DEFAULT_SP_CONFIG=default-sp SP_BLOCK_STORAGE_CONFIG=default-sp SP_PSA_ITS_CONFIG=shared-flash-opteesp SP_PSA_PS_CONFIG=shared-flash-opteesp make
```
====Setup steps after boot====
```
/mnt/host/out/linux-arm-ffa-tee/load_module.sh
/mnt/host/out/linux-arm-ffa-user/load_module.sh
cp -at /usr /mnt/host/out/ts-install/arm-linux/bin /mnt/host/out/ts-install/arm-linux/lib
```
====Test results====
**Trusted Services service level test**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/ts-service-test -v
TEST(FwuServiceTests, checkMetadataAccess)
/src/trusted-services/components/service/fwu/test/service/fwu_service_tests.cpp:66: error: Failure in TEST(FwuServiceTests, checkMetadataAccess)
/src/trusted-services/components/service/fwu/test/metadata_fetcher/client/client_metadata_fetcher.cpp:44: error:
expected < 0 0x0000000000000000>
but was <-8 0xfffffffffffffff8>
- 6674 ms
TEST(FwuServiceTests, checkImgDirAccess)
/src/trusted-services/components/service/fwu/test/service/fwu_service_tests.cpp:61: error: Failure in TEST(FwuServiceTests, checkImgDirAccess)
expected < 0 0x0000000000000000>
but was <-8 0xfffffffffffffff8>
- 2427 ms
TEST(PsServiceTests, createAndSetExtended) - 73500 ms
TEST(PsServiceTests, createAndSet) - 119236 ms
TEST(PsServiceTests, storeNewItem) - 77429 ms
TEST(ItsServiceTests, storeNewItem) - 80837 ms
TEST(AttestationProvisioningTests, provisionedIak) - 36000 ms
TEST(AttestationProvisioningTests, selfGeneratedIak) - 52060 ms
TEST(AttestationServiceTests, repeatedOperation) - 6644452 ms
TEST(AttestationServiceTests, invalidChallengeLen)[ 10.780459] ------------[ cut here ]------------
[ 10.780559] WARNING: CPU: 3 PID: 143 at mm/page_alloc.c:5534 __alloc_pages+0x164/0xab0
[ 10.780876] Modules linked in: arm_ffa_tee(O)
[ 10.780959] CPU: 3 PID: 143 Comm: ts-service-test Tainted: G O 6.1.0 #1
[ 10.781259] Hardware name: FVP Base RevC (DT)
[ 10.781359] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 10.781571] pc : __alloc_pages+0x164/0xab0
[ 10.781659] lr : pool_op_alloc+0x5c/0x180 [arm_ffa_tee]
[ 10.781959] sp : ffffffc0087ebac0
[ 10.782059] x29: ffffffc0087ebac0 x28: ffffffc0087ebd30 x27: ffffff8801e74600
[ 10.782359] x26: 0000007fe05cb118 x25: 0000000000000005 x24: 0000000000001000
[ 10.782559] x23: ffffff8801e74180 x22: 0000000000000015 x21: 0000000000000015
[ 10.782759] x20: 0000000000000000 x19: ffffff8801e74180 x18: 0000000000000000
[ 10.783059] x17: 0000000000000000 x16: 0000000000000000 x15: 0000007fe05cb118
[ 10.783306] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 10.783559] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 10.783827] x8 : ffffff8801e74200 x7 : 0000000000000000 x6 : 0000000000000ae4
[ 10.784059] x5 : ffffff8801e74180 x4 : 0000000000000000 x3 : 0000000000000000
[ 10.784259] x2 : ffffff88009f3700 x1 : 0000000000000001 x0 : ffffffc008707000
[ 10.784559] Call trace:
[ 10.784659] __alloc_pages+0x164/0xab0
[ 10.784759] pool_op_alloc+0x5c/0x180 [arm_ffa_tee]
[ 10.785059] shm_alloc_helper+0x98/0x110
[ 10.785159] tee_shm_alloc_user_buf+0x74/0x11c
[ 10.785438] tee_ioctl+0xa70/0xf9c
[ 10.785612] __arm64_sys_ioctl+0x3bc/0xc30
[ 10.785759] invoke_syscall.constprop.0+0x5c/0x104
[ 10.785859] do_el0_svc+0x60/0x18c
[ 10.786059] el0_svc+0x38/0xf0
[ 10.786259] el0t_64_sync_handler+0xbc/0x140
[ 10.786359] el0t_64_sync+0x18c/0x190
[ 10.786559] ---[ end trace 0000000000000000 ]---
ffa_tee_share_mem():212 error: 12
- 23142 ms
TEST(AttestationServiceTests, checkTokenSize) - 66762 ms
TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 24023 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 27300 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 32600 ms
TEST(CryptoMacServicePackedcTests, macAbort) - 20271 ms
TEST(CryptoMacServicePackedcTests, signAndVerify) - 78961 ms
TEST(CryptoCipherServicePackedcTests, cipherAbort) - 20300 ms
TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 62965 ms
TEST(CryptoHashServicePackedcTests, hashAbort) - 18484 ms
TEST(CryptoHashServicePackedcTests, hashAndVerify) - 29900 ms
TEST(CryptoHashServicePackedcTests, calculateHash) - 13918 ms
TEST(CryptoServicePackedcTests, generateRandomNumbers) - 43551 ms
TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 2835610 ms
TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 220900 ms
TEST(CryptoServicePackedcTests, signAndVerifyEat) - 265000 ms
TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 324213 ms
TEST(CryptoServicePackedcTests, signAndVerifyHash) - 327834 ms
TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 169327 ms
TEST(CryptoServicePackedcTests, exportPublicKey) - 115042 ms
TEST(CryptoServicePackedcTests, purgeKey) - 102661 ms
TEST(CryptoServicePackedcTests, copyKey) - 128324 ms
TEST(CryptoServicePackedcTests, generatePersistentKeys) - 187641 ms
TEST(CryptoServicePackedcTests, generateVolatileKeys) - 57006 ms
TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 44265 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 3030578 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 232579 ms
TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 327800 ms
TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 326324 ms
TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 170099 ms
TEST(CryptoServiceProtobufTests, exportPublicKey) - 115628 ms
TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 189753 ms
TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 57301 ms
TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 9734201 ms
TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 2203098 ms
TEST(DiscoveryServiceTests, checkServiceInfo) - 3840 ms
Errors (2 failures, 45 tests, 45 ran, 770 checks, 0 ignored, 0 filtered out, 28737577 ms)
```
**PSA Architecture Test Suite**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-crypto-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Crypto Suite
******************************************
TEST: 201 | DESCRIPTION: Testing crypto key management APIs | UT: psa_crypto_init
[Info] Executing tests from non-secure
[Check 1] Test calling crypto functions before psa_crypto_init
[Check 2] Test psa_crypto_init
[Check 3] Test multiple psa_crypto_init
TEST RESULT: PASSED
******************************************
TEST: 202 | DESCRIPTION: Testing crypto key management APIs | UT: psa_import_key
[Info] Executing tests from non-secure
[Check 1] Test psa_import_key 16 bytes AES
[Check 2] Test psa_import_key 24 bytes AES
[Check 3] Test psa_import_key 32 bytes AES
[Check 4] Test psa_import_key 2048 RSA public key
[Check 5] Test psa_import_key with RSA 2048 keypair
[Check 6] Test psa_import_key with DES 8 bytes key
[Check 7] Test psa_import_key with Triple DES 2-Key
[Check 8] Test psa_import_key with Triple DES 3-Key
[Check 9] Test psa_import_key with EC Public key
[Check 10] Test psa_import_key with EC keypair
[Check 11] Test psa_import_key 16 bytes AES with invalid bits
[Check 12] Test psa_import_key with key data greater than the algorithm size
[Check 13] Test psa_import_key with incorrect key data size
[Check 14] Test psa_import_key with invalid key type value
TEST RESULT: PASSED
******************************************
TEST: 203 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_key
[Info] Executing tests from non-secure
[Check 1] Test psa_export_key 16 Byte AES
[Check 2] Test psa_export_key 24 Byte AES
[Check 3] Test psa_export_key 32 Byte AES
[Check 4] Test psa_export_key 2048 RSA public key
[Check 5] Test psa_export_key with RSA 2048 keypair
[Check 6] Test psa_export_key with DES 64 bit key
[Check 7] Test psa_export_key with Triple DES 2-Key
[Check 8] Test psa_export_key with Triple DES 3-Key
[Check 9] Test psa_export_key with EC Public key
[Check 10] Test psa_export_key with EC keypair
[Check 11] Test psa_export_key with key policy verify
[Check 12] Test psa_export_key with less buffer size
TEST RESULT: PASSED
******************************************
TEST: 204 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_public_key
[Info] Executing tests from non-secure
[Check 1] Test psa_export_public_key 16 Byte AES
[Check 2] Test psa_export_public_key 24 Byte AES
[Check 3] Test psa_export_public_key 32 Byte AES
[Check 4] Test psa_export_public_key 2048 RSA public key
[Check 5] Test psa_export_public_key with RSA 2048 keypair
[Check 6] Test psa_export_public_key with DES 64 bit key
[Check 7] Test psa_export_public_key with Triple DES 2-Key
[Check 8] Test psa_export_public_key with Triple DES 3-Key
[Check 9] Test psa_export_public_key with EC Public key
[Check 10] Test psa_export_public_key with EC keypair
[Check 11] Test psa_export_public_key with less buffer size
TEST RESULT: PASSED
******************************************
TEST: 205 | DESCRIPTION: Testing crypto key management APIs | UT: psa_destroy_key
[Info] Executing tests from non-secure
[Check 1] Test psa_destroy_key 16 Byte AES
[Check 2] Test psa_destroy_key 24 Byte AES
[Check 3] Test psa_destroy_key 32 Byte AES
[Check 4] Test psa_destroy_key 2048 RSA public key
[Check 5] Test psa_destroy_key with RSA 2048 keypair
[Check 6] Test psa_destroy_key with DES 64 bit key
[Check 7] Test psa_destroy_key with Triple DES 2-Key
[Check 8] Test psa_destroy_key with Triple DES 3-Key
[Check 9] Test psa_destroy_key with EC Public key
[Check 10] Test psa_destroy_key with EC keypair
TEST RESULT: PASSED
******************************************
TEST: 206 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compute
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_compute with MD5 algorithm
[Check 2] Test psa_hash_compute with RIPEMD160 algorithm
[Check 3] Test psa_hash_compute with SHA1 algorithm
[Check 4] Test psa_hash_compute with SHA224 algorithm
[Check 5] Test psa_hash_compute with SHA256 algorithm
[Check 6] Test psa_hash_compute with SHA384 algorithm
[Check 7] Test psa_hash_compute with SHA512 algorithm
[Check 8] Test psa_hash_compute with small buffer size
[Check 9] Test psa_hash_compute with invalid algorithm
TEST RESULT: PASSED
******************************************
TEST: 207 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compare
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_compare with MD5 algorithm
[Check 2] Test psa_hash_compare with RIPEMD160 algorithm
[Check 3] Test psa_hash_compare with SHA1 algorithm
[Check 4] Test psa_hash_compare with SHA224 algorithm
[Check 5] Test psa_hash_compare with SHA256 algorithm
[Check 6] Test psa_hash_compare with SHA384 algorithm
[Check 7] Test psa_hash_compare with SHA512 algorithm
[Check 8] Test psa_hash_compare with incorrect hash
[Check 9] Test psa_hash_compare with incorrect hash length
[Check 10] Test psa_hash_compare with invalid algorithm
TEST RESULT: PASSED
******************************************
TEST: 208 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_setup - ECDH + HKDF-SHA-256
[Check 2] Test psa_key_derivation_setup - ECDH, unknown KDF
[Check 3] Test psa_key_derivation_setup - bad key derivation algorithm
[Check 4] Test psa_key_derivation_setup - Invalid Algorithm
TEST RESULT: PASSED
******************************************
TEST: 209 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_bytes
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_input_bytes - Step as Info
[Check 2] Test psa_key_derivation_input_bytes - Step as secret
[Check 3] Test psa_key_derivation_input_bytes - Step as salt
[Check 4] Test psa_key_derivation_input_bytes - Step as label
[Check 5] Test psa_key_derivation_input_bytes - Step as seed
[Check 6] Test psa_key_derivation_input_bytes - Invalid step
TEST RESULT: PASSED
******************************************
TEST: 210 | DESCRIPTION: Testing crypto key attributes APIs | UT: psa_key_attributes_set_get
[Info] Executing tests from non-secure
[Check 1] Test psa_key_attributes_set_get key attributes
TEST RESULT: PASSED
******************************************
TEST: 211 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_setup with MD5 algorithm
[Check 2] Test psa_hash_setup with RIPEMD160 algorithm
[Check 3] Test psa_hash_setup with SHA1 algorithm
[Check 4] Test psa_hash_setup with SHA224 algorithm
[Check 5] Test psa_hash_setup with SHA256 algorithm
[Check 6] Test psa_hash_setup with SHA384 algorithm
[Check 7] Test psa_hash_setup with SHA512 algorithm
[Check 8] Test psa_hash_setup with Invalid hash algorithm
[Check 9] Test psa_hash_setup with Invalid algorithm
[Check 10] Test psa_hash_setup with CTR algorithm
TEST RESULT: PASSED
******************************************
TEST: 212 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_update
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_update with MD5 algorithm
[Check 2] Test psa_hash_update with RIPEMD160 algorithm
[Check 3] Test psa_hash_update with SHA1 algorithm
[Check 4] Test psa_hash_update with SHA224 algorithm
[Check 5] Test psa_hash_update with SHA256 algorithm
[Check 6] Test psa_hash_update with SHA384 algorithm
[Check 7] Test psa_hash_update with SHA512 algorithm
[Check 8] Test psa_hash_update without hash setup
[Check 9] Test psa_hash_update with completed opertaion handle
TEST RESULT: PASSED
******************************************
TEST: 213 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_verify with MD5 algorithm
[Check 2] Test psa_hash_verify with RIPEMD160 algorithm
[Check 3] Test psa_hash_verify with SHA1 algorithm
[Check 4] Test psa_hash_verify with SHA224 algorithm
[Check 5] Test psa_hash_verify with SHA256 algorithm
[Check 6] Test psa_hash_verify with SHA384 algorithm
[Check 7] Test psa_hash_verify with SHA512 algorithm
[Check 8] Test psa_hash_verify with incorrect expected hash
[Check 9] Test psa_hash_verify with incorrect hash length
[Check 10] test psa_hash_verify with inactive & invalid operation handle
TEST RESULT: PASSED
******************************************
TEST: 214 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_finish with MD5 algorithm
[Check 2] Test psa_hash_finish with RIPEMD160 algorithm
[Check 3] Test psa_hash_finish with SHA1 algorithm
[Check 4] Test psa_hash_finish with SHA224 algorithm
[Check 5] Test psa_hash_finish with SHA256 algorithm
[Check 6] Test psa_hash_finish with SHA384 algorithm
[Check 7] Test psa_hash_finish with SHA512 algorithm
[Check 8] Test psa_hash_finish with invalid hash buffer size
[Check 9] test psa_hash_finish with inactive operation handle
TEST RESULT: PASSED
******************************************
TEST: 215 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_abort with MD5 algorithm
[Check 2] Test psa_hash_abort with RIPEMD160 algorithm
[Check 3] Test psa_hash_abort with SHA1 algorithm
[Check 4] Test psa_hash_abort with SHA224 algorithm
[Check 5] Test psa_hash_abort with SHA256 algorithm
[Check 6] Test psa_hash_abort with SHA384 algorithm
[Check 7] Test psa_hash_abort with SHA512 algorithm
[Check 8] Test psa_hash_finish after calling psa_hash_abort
TEST RESULT: PASSED
******************************************
TEST: 216 | DESCRIPTION: Testing crypto generator functions APIs | UT: psa_generate_key
[Info] Executing tests from non-secure
[Check 1] Test psa_generate_key 16 Byte AES
[Check 2] Test psa_generate_key 24 Byte AES
[Check 3] Test psa_generate_key 32 Byte AES
[Check 4] Test psa_generate_key with DES 64 bit key
[Check 5] Test psa_generate_key with Triple DES 2-Key
[Check 6] Test psa_generate_key with Triple DES 3-Key
[Check 7] Test psa_generate_key with RSA 2048 Keypair
[Check 8] Test psa_generate_key with ECC KeyPair
[Check 9] Test psa_generate_key with RSA 2048 Public key
[Check 10] Test psa_generate_key with invalid key type
[Check 11] Test psa_generate_key with invalid usage flags
TEST RESULT: PASSED
******************************************
TEST: 217 | DESCRIPTION: Testing crypto generation APIs | UT: psa_generate_random
[Info] Executing tests from non-secure
[Check 1] Test psa_generate_random to get 0 Byte data
[Check 2] Test psa_generate_random to get 16 Byte data
[Check 3] Test psa_generate_random to get 24 Byte data
[Check 4] Test psa_generate_random to get 32 Byte data
[Check 5] Test psa_generate_random to get 64 Byte data
[Check 6] Test psa_generate_random to get 128 Byte data
[Check 7] Test psa_generate_random to get 256 Byte data
[Check 8] Test psa_generate_random to get 512 Byte data
[Check 9] Test psa_generate_random to get 1000 Byte data
TEST RESULT: PASSED
******************************************
TEST: 218 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_key
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_input_key 16 Byte Key
[Check 2] Test psa_key_derivation_input_key with invalid usage
[Check 3] Test psa_key_derivation_input_key with step as label
[Check 4] Test psa_key_derivation_input_key with step as info
[Check 5] Test psa_key_derivation_input_key with step as seed
[Check 6] Test psa_key_derivation_input_key with step as salt
[Check 7] Test psa_key_derivation_input_key with key type as AES(not derive)
[Check 8] Test psa_key_derivation_input_key incorrect key algorithm
[Check 9] Test psa_key_derivation_input_key with key type as 2048 RSA public key
[Check 10] Test psa_key_derivation_input_key with key type as RSA 2048 keypair
[Check 11] Test psa_key_derivation_input_key with zero as step
[Check 12] Test psa_cipher_decrypt_setup - Invalid key handle
[Check 13] Test psa_cipher_decrypt_setup - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 219 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_key_agreement
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_key_agreement - ECDH SECP256R1
[Check 2] Test psa_key_derivation_key_agreement - Invalid step
[Check 3] Test psa_key_derivation_key_agreement - ECDH SECP384R1
[Check 4] Test psa_key_derivation_key_agreement - Invalid usage
[Check 5] Test psa_key_derivation_key_agreement - KDF not a key agreement alg
[Check 6] Test psa_key_derivation_key_agreement - Public key of different curve
[Check 7] Test psa_key_derivation_key_agreement - Pub key instead of Prv key
[Check 8] Test psa_key_derivation_key_agreement - Invalid handle
[Check 9] Test psa_key_derivation_key_agreement - Zero as handle
TEST RESULT: PASSED
******************************************
TEST: 220 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_bytes
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_output_bytes - HKDF
[Check 2] Test psa_key_derivation_output_bytes - optional salt
[Check 3] Test psa_key_derivation_output_bytes - capacity < output_length
[Check 4] Test psa_key_derivation_output_bytes - missing info
[Check 5] Test psa_key_derivation_output_bytes - missing salt/secret/info
[Check 6] Test psa_key_derivation_output_bytes - TLS12_PRF
[Check 7] Test psa_key_derivation_output_bytes - capacity < output_length
[Check 8] Test psa_key_derivation_output_bytes - missing seed/secret/label
TEST RESULT: PASSED
******************************************
TEST: 221 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_key
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_output_key - Key
[Check 2] Test psa_key_derivation_output_key - Info
[Check 3] Test psa_key_derivation_output_key - Salt
[Check 4] Test psa_key_derivation_output_key - Greater Capacity than available
[Check 5] Test psa_key_derivation_output_key - ECC Public key
[Check 6] Test psa_key_derivation_output_key - ECC keypair (wrong key length)
[Check 7] Test psa_key_derivation_output_key - RSA Public Key[Check 8] Test psa_key_derivation_output_key - RSA keypair
[Check 9] Test psa_key_derivation_output_key - Invalid key size
TEST RESULT: PASSED
******************************************
TEST: 222 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_abort
TEST RESULT: PASSED
******************************************
TEST: 223 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_set_get_capacity
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_set_get_capacity - < operation's capacity
[Check 2] Test psa_key_derivation_set_get_capacity - = operation's capacity
[Check 3] Test psa_key_derivation_set_get_capacity - > operation's capacity
[Check 4] Test psa_key_derivation_set_get_capacity - unchanged capacity
TEST RESULT: PASSED
******************************************
TEST: 224 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_encrypt - CCM - AES - 13B nonce & 8B add data
[Check 2] Test psa_aead_encrypt - CCM - AES - 13B nonce & 32B add data
[Check 3] Test psa_aead_encrypt - CCM - AES - 24 bytes Tag length = 4
[Check 4] Test psa_aead_encrypt - CCM - AES - Zero additional data
[Check 5] Test psa_aead_encrypt - CCM - AES - Zero plaintext
[Check 6] Test psa_aead_encrypt - GCM - AES - 12B nonce & 12B add data
[Check 7] Test psa_aead_encrypt - Unsupported algorithm
[Check 8] Test psa_aead_encrypt - Invalid usage flag
[Check 9] Test psa_aead_encrypt - Invalid ciphertext_size
[Check 10] Test psa_aead_encrypt - Invalid nonce
[Check 11] Test psa_aead_encrypt - Invalid tag length 0
TEST RESULT: PASSED
******************************************
TEST: 225 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_decrypt - CCM - AES - 13B nonce & 8B add data
[Check 2] Test psa_aead_decrypt - CCM - AES - 13B nonce & 32B add data
[Check 3] Test psa_aead_decrypt - CCM - AES - 24 bytes Tag length = 4
[Check 4] Test psa_aead_decrypt - CCM - AES - Zero additional data
[Check 5] Test psa_aead_decrypt - CCM - AES - Zero plaintext
[Check 6] Test psa_aead_decrypt - GCM - AES - 12B nonce & 12B add data
[Check 7] Test psa_aead_decrypt - Unsupported algorithm
[Check 8] Test psa_aead_decrypt - Invalid usage flag
[Check 9] Test psa_aead_decrypt - Invalid plaintext_size
[Check 10] Test psa_aead_decrypt - Invalid nonce
[Check 11] Test psa_aead_decrypt - Invalid cihpertext
[Check 12] Test psa_aead_decrypt - Invalid cihpertext_size
[Check 13] Test psa_aead_decrypt - Invalid tag length 0
TEST RESULT: PASSED
******************************************
TEST: 226 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_sign_setup - HMAC - SHA256
[Check 2] Test psa_mac_sign_setup - CMAC - AES
[Check 3] Test psa_mac_sign_setup - Incompatible HMAC for CMAC
[Check 4] Test psa_mac_sign_setup - Invalid usage flag
[Check 5] Test psa_mac_sign_setup - Invalid key type
[Check 6] Test psa_mac_sign_setup - Truncated MAC too large
[Check 7] Test psa_mac_sign_setup - Truncated MAC too small
[Check 8] Test psa_mac_sign_setup - Unknown MAC algorithm
[Check 9] Test psa_mac_sign_setup - Bad algorithm (not a MAC algorithm)
[Check 10] Test psa_mac_sign_setup invalid key handle
[Check 11] Test psa_mac_sign_setup zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 227 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_update
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_update - HMAC - SHA256 - 64 Byte
[Check 2] Test psa_mac_update - CMAC - AES - 16 Byte
[Check 3] Test psa_mac_update - HMAC - SHA512 - 32 Byte
[Check 4] Test psa_mac_update - HMAC - SHA512 - Invalid operation state
TEST RESULT: PASSED
******************************************
TEST: 228 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_sign_finish - HMAC - SHA224
[Check 2] Test psa_mac_sign_finish - HMAC - SHA256
[Check 3] Test psa_mac_sign_finish - HMAC - SHA512
[Check 4] Test psa_mac_sign_finish - HMAC - SHA224 - Truncated 8 Byte
[Check 5] Test psa_mac_sign_finish - HMAC - SHA224 - Small output buffer
[Check 6] Test psa_mac_sign_finish - HMAC - SHA224 - Invalid operation state
[Check 7] Test psa_mac_sign_finish - CMAC - AES
TEST RESULT: PASSED
******************************************
TEST: 229 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify_setup - HMAC - SHA256
[Check 2] Test psa_mac_verify_setup - CMAC - AES
[Check 3] Test psa_mac_verify_setup - Incompatible HMAC for CMAC
[Check 4] Test psa_mac_verify_setup - Invalid usage flag
[Check 5] Test psa_mac_verify_setup - Invalid key type
[Check 6] Test psa_mac_verify_setup - Truncated MAC too large
[Check 7] Test psa_mac_verify_setup - Truncated MAC too small
[Check 8] Test psa_mac_verify_setup - Unknown MAC algorithm
[Check 9] Test psa_mac_verify_setup - Bad algorithm (not a MAC algorithm)
[Check 10] Test psa_mac_verify_setup invalid key handle
[Check 11] Test psa_mac_verify_setup zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 230 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify_finish - HMAC - SHA224
[Check 2] Test psa_mac_verify_finish - HMAC - SHA256
[Check 3] Test psa_mac_verify_finish - HMAC - SHA512
[Check 4] Test psa_mac_verify_finish - HMAC - SHA224 - Truncated 8 Byte
[Check 5] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid mac length
[Check 6] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid expected mac
[Check 7] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid operation state
[Check 8] Test psa_mac_verify_finish - CMAC - AES
TEST RESULT: PASSED
******************************************
TEST: 231 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_abort - HMAC - SHA224
[Check 2] Test psa_mac_abort - HMAC - SHA224 - Truncated 8 Byte
[Check 3] Test psa_mac_abort - HMAC - SHA256
[Check 4] Test psa_mac_abort - HMAC - SHA512
[Check 5] Test psa_mac_abort - CMAC - AES
[Check 6] Test psa_mac_sign_finish after calling psa_mac_abort
TEST RESULT: PASSED
******************************************
TEST: 232 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_encrypt_setup 16 Byte AES
[Check 2] Test psa_cipher_encrypt_setup 24 Byte AES
[Check 3] Test psa_cipher_encrypt_setup 32 Byte AES
[Check 4] Test psa_cipher_encrypt_setup DES 64 bit key
[Check 5] Test psa_cipher_encrypt_setup Triple DES 2-Key
[Check 6] Test psa_cipher_encrypt_setup Triple DES 3-Key
[Check 7] Test psa_cipher_encrypt_setup 16 Byte raw data
[Check 8] Test psa_cipher_encrypt_setup - not a cipher algorithm
[Check 9] Test psa_cipher_encrypt_setup - unknown cipher algorithm
[Check 10] Test psa_cipher_encrypt_setup - incompatible key ARC4
[Check 11] Test psa_cipher_encrypt_setup - incorrect usage
[Check 12] Test psa_cipher_encrypt_setup - RSA public key
[Check 13] Test psa_cipher_encrypt_setup - RSA keypair
[Check 14] Test psa_cipher_encrypt_setup - EC Public key
[Check 15] Test psa_cipher_encrypt_setup - EC keypair
[Check 16] Test psa_cipher_encrypt_setup - Invalid key handle
[Check 17] Test psa_cipher_encrypt_setup - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 233 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_decrypt_setup 16 Byte AES
[Check 2] Test psa_cipher_decrypt_setup 24 Byte AES
[Check 3] Test psa_cipher_decrypt_setup 32 Byte AES
[Check 4] Test psa_cipher_decrypt_setup DES 64 bit key
[Check 5] Test psa_cipher_decrypt_setup Triple DES 2-Key
[Check 6] Test psa_cipher_decrypt_setup Triple DES 3-Key
[Check 7] Test psa_cipher_decrypt_setup 16 Byte raw data
[Check 8] Test psa_cipher_decrypt_setup - not a cipher algorithm
[Check 9] Test psa_cipher_decrypt_setup - unknown cipher algorithm
[Check 10] Test psa_cipher_decrypt_setup - incompatible key ARC4
[Check 11] Test psa_cipher_decrypt_setup - incorrect usage
[Check 12] Test psa_cipher_decrypt_setup - RSA public key
[Check 13] Test psa_cipher_decrypt_setup - RSA keypair
[Check 14] Test psa_cipher_decrypt_setup - EC Public key
[Check 15] Test psa_cipher_decrypt_setup - EC keypair
[Check 16] Test psa_cipher_decrypt_setup - Invalid key handle
[Check 17] Test psa_cipher_decrypt_setup - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 234 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_generate_iv
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_generate_iv 16 Byte AES
[Check 2] Test psa_cipher_generate_iv 24 Byte AES
[Check 3] Test psa_cipher_generate_iv 32 Byte AES
[Check 4] Test psa_cipher_generate_iv DES 64 bit key
[Check 5] Test psa_cipher_generate_iv DES 2-Key
[Check 6] Test psa_cipher_generate_iv DES 3-Key
[Check 7] Test psa_cipher_generate_iv AES - small iv buffer
[Check 8] Test psa_cipher_generate_iv DES - small iv buffer
TEST RESULT: PASSED
******************************************
TEST: 235 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_set_iv
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_set_iv 16 Byte AES
[Check 2] Test psa_cipher_set_iv 24 Byte AES
[Check 3] Test psa_cipher_set_iv 32 Byte AES
[Check 4] Test psa_cipher_set_iv DES 64 bit key
[Check 5] Test psa_cipher_set_iv DES 2-Key
[Check 6] Test psa_cipher_set_iv DES 3-Key
[Check 7] Test psa_cipher_set_iv AES - small iv buffer
[Check 8] Test psa_cipher_set_iv DES - small iv buffer
[Check 9] Test psa_cipher_set_iv AES - large iv buffer
[Check 10] Test psa_cipher_set_iv DES - large iv buffer
TEST RESULT: PASSED
******************************************
TEST: 236 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_update
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING (Short in)
[Check 3] Test psa_cipher_update - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_update - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_update - Encrypt - AES CTR
[Check 6] Test psa_cipher_update - Encrypt - DES CBC (nopad)
[Check 7] Test psa_cipher_update - Encrypt - 2-key 3DE -CBC (nopad)
[Check 8] Test psa_cipher_update - Encrypt - 3-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_update - Encrypt - small output buffer size
[Check 10] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING
[Check 11] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING (Short in)
[Check 12] Test psa_cipher_update - Decrypt - AES CBC_PKCS7
[Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7 (Short input)
[Check 14] Test psa_cipher_update - Decrypt - AES CTR
[Check 15] Test psa_cipher_update - Decrypt - DES CBC (nopad)
[Check 16] Test psa_cipher_update - Decrypt - 2-key 3DE -CBC (nopad)
[Check 17] Test psa_cipher_update - Decrypt - 3-key 3DE -CBC (nopad)
[Check 18] Test psa_cipher_update - Decrypt - small output buffer size
[Check 19] Test psa_cipher_update without cipher setup
TEST RESULT: PASSED
******************************************
TEST: 237 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING (Short in)
[Check 3] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_finish - Encrypt - AES CTR
[Check 6] Test psa_cipher_finish - Encrypt - AES CTR (short input)
[Check 7] Test psa_cipher_finish - Encrypt - DES CBC (nopad)
[Check 8] Test psa_cipher_finish - Encrypt - 2-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_finish - Encrypt - 3-key 3DE -CBC (nopad)
[Check 10] Test psa_cipher_finish - Encrypt - small output buffer size
[Check 11] Test psa_cipher_finish - Decrypt - AES CBC_NO_PADDING
[Check 12] Test psa_cipher_finish - Decrypt - AES CBC_NO_PADDING (Short in)
[Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7
[Check 14] Test psa_cipher_finish - Decrypt - AES CBC_PKCS7 (Short input)
[Check 15] Test psa_cipher_finish - Decrypt - AES CTR
[Check 16] Test psa_cipher_finish - Decrypt - AES CTR (short input)
[Check 17] Test psa_cipher_finish - Decrypt - DES CBC (nopad)
[Check 18] Test psa_cipher_finish - Decrypt - 2-key 3DE -CBC (nopad)
[Check 19] Test psa_cipher_finish - Decrypt - 3-key 3DE -CBC (nopad)
TEST RESULT: PASSED
******************************************
TEST: 238 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_abort - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_abort - Encrypt - AES CBC_PKCS7
[Check 3] Test psa_cipher_abort - Encrypt - AES CTR
[Check 4] Test psa_cipher_abort - Encrypt - DES CBC (nopad)
[Check 5] Test psa_cipher_abort - Encrypt - 2-key 3DE -CBC (nopad)
[Check 6] Test psa_cipher_abort - Encrypt - 3-key 3DE -CBC (nopad)
[Check 7] Test psa_cipher_abort - Decrypt - AES CBC_NO_PADDING
[Check 8] Test psa_cipher_abort - Decrypt - AES CBC_PKCS7
[Check 9] Test psa_cipher_abort - Decrypt - AES CTR
[Check 10] Test psa_cipher_abort - Decrypt - DES CBC (nopad)
[Check 11] Test psa_cipher_abort - Decrypt - 2-key 3DE -CBC (nopad)
[Check 12] Test psa_cipher_abort - Decrypt - 3-key 3DE -CBC (nopad)
[Check 13] Test psa_cipher_update after psa_cipher_abort should fail
TEST RESULT: PASSED
******************************************
TEST: 239 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_asymmetric_encrypt - RSA PKCS1V15
[Check 2] Test psa_asymmetric_encrypt - RSA KEY_PAIR PKCS1V15
[Check 3] Test psa_asymmetric_encrypt - RSA OAEP SHA256
[Check 4] Test psa_asymmetric_encrypt - RSA OAEP SHA256 with label
[Check 5] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256
[Check 6] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256 with label
[Check 7] Test psa_asymmetric_encrypt - Small output buffer
[Check 8] Test psa_asymmetric_encrypt - Invalid algorithm
[Check 9] Test psa_asymmetric_encrypt - Invalid key type
[Check 10] Test psa_asymmetric_encrypt - Invalid usage
[Check 11] Test psa_asymmetric_encrypt - RSA PKCS1V15 - Salt
[Check 12] Test psa_asymmetric_encrypt - ECC public key
[Check 13] Test psa_asymmetric_encrypt - Invalid key handle
[Check 14] Test psa_asymmetric_encrypt - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 240 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_asymmetric_decrypt - RSA KEY_PAIR PKCS1V15
[Check 2] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256
[Check 3] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256 with label
[Check 4] Test psa_asymmetric_decrypt - Invalid key type (RSA public key)
[Check 5] Test psa_asymmetric_decrypt - Small output buffer
[Check 6] Test psa_asymmetric_decrypt - Invalid algorithm
[Check 7] Test psa_asymmetric_decrypt - Invalid key type (AES Key)
[Check 8] Test psa_asymmetric_decrypt - Invalid usage
[Check 9] Test psa_asymmetric_decrypt - RSA PKCS1V15 - Salt
[Check 10] Test psa_asymmetric_decrypt - Invalid key handle
[Check 11] Test psa_asymmetric_decrypt - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 241 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_sign_hash
[Info] Executing tests from non-secure
[Check 1] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 3] Test psa_sign_hash - ECDSA SECP256R1 SHA-256
[Check 4] Test psa_sign_hash - Invalid key type (RSA public key)
[Check 5] Test psa_sign_hash - Small output buffer
[Check 6] Test psa_sign_hash - Invalid algorithm
[Check 7] Test psa_sign_hash - Invalid key type (AES Key)
[Check 8] Test psa_sign_hash - Invalid usage
[Check 9] Test psa_sign_hash - Wrong hash size
[Check 10] Test psa_sign_hash - Invalid key handle
[Check 11] Test psa_sign_hash - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 242 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_verify_hash
[Info] Executing tests from non-secure
[Check 1] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 3] Test psa_verify_hash - ECDSA KEY_PAIR SECP256R1 SHA-256
[Check 4] Test psa_verify_hash - EC public key
[Check 5] Test psa_verify_hash - RSA public key
[Check 6] Test psa_verify_hash - Small output buffer
[Check 7] Test psa_verify_hash - Invalid algorithm
[Check 8] Test psa_verify_hash - Invalid key type (AES Key)
[Check 9] Test psa_verify_hash - Invalid usage
[Check 10] Test psa_verify_hash - Wrong hash size
[Check 11] Test psa_verify_hash - Wrong signature
[Check 12] Test psa_verify_hash - Wrong signature size
[Check 13] Test psa_verify_hash - Invalid key handle
[Check 14] Test psa_verify_hash - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 243 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_raw_key_agreement
[Info] Executing tests from non-secure
[Check 1] Test psa_raw_key_agreement - ECDH SECP256R1
[Check 2] Test psa_raw_key_agreement - Small buffer size
[Check 3] Test psa_raw_key_agreement - ECDH SECP384R1
[Check 4] Test psa_raw_key_agreement - Invalid usage
[Check 5] Test psa_raw_key_agreement - Unknown KDF
[Check 6] Test psa_raw_key_agreement - Not a key agreement alg
[Check 7] Test psa_raw_key_agreement - Public key on different curve
[Check 8] Test psa_raw_key_agreement - Public key instead of private key
[Check 9] Test psa_raw_key_agreement - Invalid key handle
[Check 10] Test psa_raw_key_agreement - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 244 | DESCRIPTION: Testing crypto key management APIs | UT: psa_copy_key
[Info] Executing tests from non-secure
[Check 1] Test psa_copy_key - 2048 RSA public key
[Check 2] Test psa_copy_key - RSA 2048 keypair
[Check 3] Test psa_copy_key - Incompatible target policy(source and target)
[Check 4] Test psa_copy_key - source key with no export usage
[Check 5] Test psa_copy_key - DES 64 bit key
[Check 6] Test psa_copy_key - Triple DES 2-Key
[Check 7] Test psa_copy_key - Triple DES 3-Key
[Check 8] Test psa_copy_key - EC Public key
[Check 9] Test psa_copy_key - EC keypair
TEST RESULT: PASSED
******************************************
TEST: 245 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_clone
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_clone - MD5 algorithm
[Check 2] Test psa_hash_clone - RIPEMD160 algorithm
[Check 3] Test psa_hash_clone - SHA1 algorithm
[Check 4] Test psa_hash_clone - SHA224 algorithm
[Check 5] Test psa_hash_clone - SHA256 algorithm
[Check 6] Test psa_hash_clone - SHA384 algorithm
[Check 7] Test psa_hash_clone - SHA512 algorithm
[Check 8] Test psa_hash_clone - from an inactive source operation
[Check 9] Test psa_hash_clone - on an active target operation
TEST RESULT: PASSED
******************************************
TEST: 246 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_compute
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_compute HMAC SHA 224
[Check 2] Test psa_mac_compute - Incompactible HMAC for CMAC
[Check 3] Test psa_mac_compute - Invalid usage
[Check 4] Test psa_mac_compute - truncated MAC too small
[Check 5] Test psa_mac_compute - truncated MAC too large
[Check 6] Test psa_mac_compute - bad algorithm (unknown MAC algorithm)
[Check 7] Test psa_mac_compute HMAC SHA 256
[Check 8] Test psa_mac_compute HMAC SHA 512
[Check 9] Test psa_mac_compute HMAC SHA 224 (truncated to 8 Byte)
[Check 10] Test psa_mac_compute CMAC AES 128
[Check 11] Test psa_mac_compute small size buffer
[Check 12] Test psa_mac_compute - Invalid key type
TEST RESULT: PASSED
******************************************
TEST: 247 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify HMAC SHA 224
[Check 2] Test psa_mac_verify HMAC SHA 256
[Check 3] Test psa_mac_verify - Incompactible HMAC for CMAC
[Check 4] Test psa_mac_verify - Invalid usage
[Check 5] Test psa_mac_verify - Truncated MAC too large
[Check 6] Test psa_mac_verify - Truncated MAC too small
[Check 7] Test psa_mac_verify - bad algorithm (unknown MAC algorithm)
[Check 8] Test psa_mac_verify HMAC SHA 512
[Check 9] Test psa_mac_verify HMAC SHA 224 (truncated to 8 Byte)
[Check 10] Test psa_mac_verify CMAC AES 128
[Check 11] Test psa_mac_verify - Invalid key type
[Check 12] Test psa_mac_verify small size buffer
[Check 13] Test psa_mac_verify incorrect expected MAC
TEST RESULT: PASSED
******************************************
TEST: 248 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING (Short input)
[Check 3] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_encrypt - Encrypt - AES CTR
[Check 6] Test psa_cipher_encrypt - Encrypt - AES CTR (short input)
[Check 7] Test psa_cipher_encrypt - Encrypt - DES CBC (nopad)
[Check 8] Test psa_cipher_encrypt - Encrypt - 2-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_encrypt - Encrypt - 3-key 3DE -CBC (nopad)
[Check 10] Test psa_cipher_encrypt - small output buffer size
[Check 11] Test psa_cipher_encrypt - Decrypt - AES CBC_NO_PADDING
TEST RESULT: PASSED
******************************************
TEST: 249 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_decrypt - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING
[Check 3] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING (Short input)
[Check 4] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING
[Check 5] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7
[Check 6] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7 (Short input)
[Check 7] Test psa_cipher_decrypt - Decrypt - AES CTR
[Check 8] Test psa_cipher_decrypt - Decrypt - DES CBC (nopad)
[Check 9] Test psa_cipher_decrypt - Decrypt - 2-key 3DE -CBC (nopad)
[Check 10] Test psa_cipher_decrypt - 3-key 3DE -CBC (nopad)
TEST RESULT: PASSED
******************************************
TEST: 250 | DESCRIPTION: Testing crypto key management APIs | UT: psa_sign_message
[Info] Executing tests from non-secure
[Check 1] Test psa_sign_message - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_sign_message - ECDSA SECP256R1 SHA-256
[Check 3] Test psa_sign_message - Invalid key type (RSA public key)
[Check 4] Test psa_sign_message - Small output buffer
[Check 5] Test psa_sign_message - Invalid algorithm
[Check 6] Test psa_sign_message - Invalid key type (AES Key)
[Check 7] Test psa_sign_message - Invalid usage
[Check 8] Test psa_sign_message - Mismatch key type and Algorithm
[Check 9] Test psa_sign_message - Alg mismatch in key and API call
[Check 10] Test psa_sign_message - Invalid key handle
[Check 11] Test psa_sign_message - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 251 | DESCRIPTION: Testing crypto key management APIs | UT: psa_verify_message
[Info] Executing tests from non-secure
[Check 1] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_verify_message - RSA Public Key PKCS1V15 RAW
[Check 3] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 4] Test psa_verify_message - ECDSA KEY_PAIR SECP256R1 SHA-256
[Check 5] Test psa_verify_message - ECDSA Public Key SECP256R1 SHA-256
[Check 6] Test psa_verify_message - Small output buffer
[Check 7] Test psa_verify_message - Invalid algorithm
[Check 8] Test psa_verify_message - Invalid key type (AES Key)
[Check 9] Test psa_verify_message - Invalid usage
[Check 10] Test psa_verify_message - Wrong message size
[Check 11] Test psa_verify_message - Wrong signature
[Check 12] Test psa_verify_message - Wrong signature size
[Check 13] Test psa_verify_message - Invalid key handle
[Check 14] Test psa_verify_message - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 252 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_encrypt_setup - CCM - AES
[Check 2] Test psa_aead_encrypt_setup - CCM - AES - Tag length = 4
[Check 3] Test psa_aead_encrypt_setup - CCM - AES - Mismatched tag length
[Check 4] Test psa_aead_encrypt_setup - CCM - AES - Default Tag length
[Check 5] Test psa_aead_encrypt_setup - GCM - AES
[Check 6] Test psa_aead_encrypt_setup - CCM - DES Invalid key
[Check 7] Test psa_aead_encrypt_setup - Invalid usage flag
TEST RESULT: PASSED
******************************************
TEST: 253 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_decrypt_setup - CCM - AES
[Check 2] Test psa_aead_decrypt_setup - CCM - AES - Tag length = 4
[Check 3] Test psa_aead_decrypt_setup - CCM - AES - Mismatched tag length
[Check 4] Test psa_aead_decrypt_setup - CCM - AES - Default Tag length
[Check 5] Test psa_aead_decrypt_setup - GCM - AES
[Check 6] Test psa_aead_decrypt_setup - CCM - DES Invalid key
[Check 7] Test psa_aead_decrypt_setup - Invalid usage flag
TEST RESULT: PASSED
******************************************
TEST: 254 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_generate_nonce
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_generate_nonce - CCM
[Check 2] Test psa_aead_generate_nonce - CCM - Tag length = 4
[Check 3] Test psa_aead_generate_nonce - CCM - Small buffer size
[Check 4] Test psa_aead_generate_nonce - CCM - Uninitialized operation
[Check 5] Test psa_aead_generate_nonce - CCM - Decrypt operation
[Check 6] Test psa_aead_generate_nonce - GCM
[Check 7] Test psa_aead_generate_nonce - GCM - Decrypt operation
TEST RESULT: PASSED
******************************************
TEST: 255 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_nonce
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_set_nonce - Encrypt - CCM
[Check 2] Test psa_aead_set_nonce - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_set_nonce - Encrypt - CCM - Small nonce size
[Check 4] Test psa_aead_set_nonce - Encrypt - CCM - Large nonce size
[Check 5] Test psa_aead_set_nonce - Encrypt - CCM - Invalid operation state
[Check 6] Test psa_aead_set_nonce - Encrypt - GCM
[Check 7] Test psa_aead_set_nonce - Decrypt - CCM
[Check 8] Test psa_aead_set_nonce - Decrypt - CCM - Tag length = 4
[Check 9] Test psa_aead_set_nonce - Decrypt - CCM - Small nonce size
[Check 10] Test psa_aead_set_nonce - Decrypt - CCM - Large nonce size
[Check 11] Test psa_aead_set_nonce - Decrypt - CCM - Invalid operation state
[Check 12] Test psa_aead_set_nonce - Decrypt - GCM
TEST RESULT: PASSED
******************************************
TEST: 256 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_lengths
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_set_lengths - Encrypt - CCM
[Check 2] Test psa_aead_set_lengths - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_set_lengths - Encrypt - CCM - Zero ad_length
[Check 4] Test psa_aead_set_lengths - Encrypt - CCM - Zero plaintext_length
[Check 5] Test psa_aead_set_lengths - Encrypt - CCM - Invalid operation state
[Check 6] Test psa_aead_set_lengths - Encrypt - GCM
[Check 7] Test psa_aead_set_lengths - Decrypt - CCM
[Check 8] Test psa_aead_set_lengths - Decrypt - CCM - Tag length = 4
[Check 9] Test psa_aead_set_lengths - Decrypt - CCM - Zero ad_length
[Check 10] Test psa_aead_set_lengths - Decrypt - CCM - Zero plaintext_length
[Check 11] Test psa_aead_set_lengths - Decrypt - CCM - Invalid operation state
[Check 12] Test psa_aead_set_lengths - Decrypt - GCM
TEST RESULT: PASSED
******************************************
TEST: 257 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update_ad
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_update_ad - Encrypt - CCM
[Check 2] Test psa_aead_update_ad - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_update_ad - Encrypt - CCM - Zero ad_length
[Check 4] Test psa_aead_update_ad - Encrypt - CCM - Zero plaintext_length
[Check 5] Test psa_aead_update_ad - Encrypt - CCM - Invalid operation state
[Check 6] Test psa_aead_update_ad - Encrypt - CCM - Overflow input length
[Check 7] Test psa_aead_update_ad - Decrypt - CCM
[Check 8] Test psa_aead_update_ad - Decrypt - CCM - Tag length = 4
[Check 9] Test psa_aead_update_ad - Decrypt - CCM - Zero ad_length
[Check 10] Test psa_aead_update_ad - Decrypt - CCM - Zero plaintext_length
[Check 11] Test psa_aead_update_ad - Decrypt - CCM - Invalid operation state
[Check 12] Test psa_aead_update_ad - Decrypt - CCM - Overflow input length
TEST RESULT: PASSED
******************************************
TEST: 258 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_update - Encrypt - CCM
[Check 2] Test psa_aead_update - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_update - Encrypt - CCM - Zero ad_length
[Check 4] Test psa_aead_update - Encrypt - CCM - Zero plaintext_length
[Check 5] Test psa_aead_update - Encrypt - CCM - Small buffer size
[Check 6] Test psa_aead_update - Encrypt - CCM - Less add data than specified
[Check 7] Test psa_aead_update - Encrypt - CCM - Overflow input length
[Check 8] Test psa_aead_update - Encrypt - CCM - Invalid operation state
[Check 9] Test psa_aead_update - Decrypt - CCM
[Check 10] Test psa_aead_update - Decrypt - CCM - Tag length = 4
[Check 11] Test psa_aead_update - Decrypt - CCM - Zero ad_length
[Check 12] Test psa_aead_update - Decrypt - CCM - Zero plaintext_length
[Check 13] Test psa_aead_update - Decrypt - CCM - Small buffer size
[Check 14] Test psa_aead_update - Decrypt - Less add data than specified
[Check 15] Test psa_aead_update - Decrypt - CCM - Overflow input length
[Check 16] Test psa_aead_update - Decrypt - CCM - Invalid operation state
TEST RESULT: PASSED
******************************************
TEST: 259 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_finish - AES-CCM
[Check 2] Test psa_aead_finish - AES-CCM 24 bytes Tag length = 4
[Check 3] Test psa_aead_finish - Small buffer size
[Check 4] Test psa_aead_finish - Input length is less than plaintext length
[Check 5] Test psa_aead_finish - GCM - 16B AES - 12B Nonce & 12B additional data
TEST RESULT: PASSED
******************************************
TEST: 260 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_abort - Encrypt - CCM - AES
[Check 2] Test psa_aead_abort - Encrypt - GCM - AES
[Check 3] Test psa_aead_abort - Decrypt - CCM - AES
[Check 4] Test psa_aead_abort - Decrypt - GCM - AES
[Check 5] Test psa_aead_abort with all initializations
TEST RESULT: PASSED
******************************************
TEST: 261 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_verify - AES-CCM
[Check 2] Test psa_aead_verify - AES-CCM 24 bytes Tag length = 4
[Check 3] Test psa_aead_verify - Small buffer size
[Check 4] Test psa_aead_verify - Input length is less than plaintext length
[Check 5] Test psa_aead_verify - GCM - 16B AES - 12B Nounce & 12B addi data
TEST RESULT: PASSED
******************************************
************ Crypto Suite Report **********
TOTAL TESTS : 61
TOTAL PASSED : 61
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
Entering standby..
```
```
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-iat-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Attestation Suite
******************************************
TEST: 601 | DESCRIPTION: Testing attestation initial attestation APIs | UT: psa_initial_attestation
[Info] Executing tests from non-secure
[Check 1] Test psa_initial_attestation_get_token with Challenge 32
[Check 2] Test psa_initial_attestation_get_token with Challenge 48
[Check 3] Test psa_initial_attestation_get_token with Challenge 64
[Check 4] Test psa_initial_attestation_get_token with zero challenge size
[Check 5] Test psa_initial_attestation_get_token with small challenge size
[Check 6] Test psa_initial_attestation_get_token with invalid challenge size
[Check 7] Test psa_initial_attestation_get_token with large challenge size
[Check 8] Test psa_initial_attestation_get_token with zero as token size
[Check 9] Test psa_initial_attestation_get_token with small token size
[Check 10] Test psa_initial_attestation_get_token_size with Challenge 32
[Check 11] Test psa_initial_attestation_get_token_size with Challenge 48
[Check 12] Test psa_initial_attestation_get_token_size with Challenge 64
[Check 13] Test psa_initial_attestation_get_token_size with zero challenge size
[Check 14] Test psa_initial_attestation_get_token_size with small challenge size
[Check 15] Test psa_initial_attestation_get_token_size with invalid challenge size
[Check 16] Test psa_initial_attestation_get_token_size with large challenge size
TEST RESULT: PASSED
******************************************
************ Attestation Suite Report **********
TOTAL TESTS : 1
TOTAL PASSED : 1
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
Entering standby..
```
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-its-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Storage Suite
******************************************
TEST: 401 | DESCRIPTION: UID not found check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call get API for UID 6 which is not set
[Check 2] Call get_info API for UID 6 which is not set
[Check 3] Call remove API for UID 6 which is not set
[Check 4] Call get API for UID 6 which is removed
[Check 5] Call get_info API for UID 6 which is removed
[Check 6] Call remove API for UID 6 which is removed
Set storage for UID 6
[Check 7] Call get API for different UID 5
[Check 8] Call get_info API for different UID 5
[Check 9] Call remove API for different UID 5
TEST RESULT: PASSED
******************************************
TEST: 402 | DESCRIPTION: Write once error check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Update the flag of UID 1 with WRITE_ONCE flag
[Check 2] Try to remove the UID 1 having WRITE_ONCE flag
[Check 3] Create a new UID 2 with WRITE_ONCE flag
[Check 4] Try to remove the UID 2 having WRITE_ONCE flag
[Check 5] Try to change the length of write_once UID 2
[Check 6] Check UID removal still fails
[Check 7] Try to change the WRITE_ONCE flag to None for UID 2
[Check 8] Check UID removal still fails
TEST RESULT: PASSED
******************************************
TEST: 403 | DESCRIPTION: Insufficient space check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Overload storage space
UID 13 set failed due to insufficient space
Remove all registered UIDs
[Check 2] Overload storage again to verify all previous UID removed
UID 13 set failed due to insufficient space
Remove all registered UIDs
TEST RESULT: PASSED
******************************************
TEST: 404 | DESCRIPTION: Data Consistency check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2
[Check 2] Call get API with default length - TEST_BUFF_SIZE
TEST RESULT: PASSED
******************************************
TEST: 405 | DESCRIPTION: Success scenarios check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Set UID with data length zero and call storage APIs
[Check 2] Resetting the length check
TEST RESULT: PASSED
******************************************
TEST: 406 | DESCRIPTION: Check for storage create flags | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE
[Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY
[Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION
TEST RESULT: PASSED
******************************************
TEST: 407 | DESCRIPTION: Incorrect Size check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
Create a valid Storage - TEST_BUFF_SIZE/2
Increase the length of storage - TEST_BUFF_SIZE
[Check 1] Call get API with old length - TEST_BUFF_SIZE/2
[Check 2] Call get API with old length - TEST_BUFF_SIZE/4
Decrease the length of storage - TEST_BUFF_SIZE/4
[Check 3] Call get API with old length - TEST_BUFF_SIZE/2
[Check 4] Call get API with old length - TEST_BUFF_SIZE
[Check 5] Call get API with valid length - TEST_BUFF_SIZE/4
TEST RESULT: PASSED
******************************************
TEST: 408 | DESCRIPTION: Invalid offset check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Try to access data with varying valid offset
[Check 2] Try to access data with varying invalid offset
TEST RESULT: PASSED
******************************************
TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call set API with NULL pointer and data length 0
[Check 2] Call get API with NULL read buffer and data length 0
[Check 3] Remove the UID
[Check 4] Call get_info API to verify UID removed
[Check 5] Create UID with zero data_len and valid write buffer
[Check 8] Call get API with NULL read buffer and data length 0
[Check 9] Increase the length
TEST RESULT: PASSED
******************************************
TEST: 410 | DESCRIPTION: UID value zero check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Creating storage with UID 0 should fail
[Check 2] Get_info for UID 0 should fail
[Check 3] Removing storage with UID 0 should fail
TEST RESULT: PASSED
******************************************
************ Storage Suite Report **********
TOTAL TESTS : 10
TOTAL PASSED : 10
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
Entering standby..
```
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-ps-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Storage Suite
******************************************
TEST: 401 | DESCRIPTION: UID not found check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call get API for UID 6 which is not set
[Check 2] Call get_info API for UID 6 which is not set
[Check 3] Call remove API for UID 6 which is not set
[Check 4] Call get API for UID 6 which is removed
[Check 5] Call get_info API for UID 6 which is removed
[Check 6] Call remove API for UID 6 which is removed
Set storage for UID 6
[Check 7] Call get API for different UID 5
[Check 8] Call get_info API for different UID 5
[Check 9] Call remove API for different UID 5
TEST RESULT: PASSED
******************************************
TEST: 402 | DESCRIPTION: Write once error check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Update the flag of UID 1 with WRITE_ONCE flag
[Check 2] Try to remove the UID 1 having WRITE_ONCE flag
[Check 3] Create a new UID 2 with WRITE_ONCE flag
[Check 4] Try to remove the UID 2 having WRITE_ONCE flag
[Check 5] Try to change the length of write_once UID 2
[Check 6] Check UID removal still fails
[Check 7] Try to change the WRITE_ONCE flag to None for UID 2
[Check 8] Check UID removal still fails
TEST RESULT: PASSED
******************************************
TEST: 403 | DESCRIPTION: Insufficient space check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Overload storage space
UID 13 set failed due to insufficient space
Remove all registered UIDs
[Check 2] Overload storage again to verify all previous UID removed
UID 13 set failed due to insufficient space
Remove all registered UIDs
TEST RESULT: PASSED
******************************************
TEST: 404 | DESCRIPTION: Data Consistency check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2
[ 34.396662] random: crng init done
[Check 2] Call get API with default length - TEST_BUFF_SIZE
TEST RESULT: PASSED
******************************************
TEST: 405 | DESCRIPTION: Success scenarios check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Set UID with data length zero and call storage APIs
[Check 2] Resetting the length check
TEST RESULT: PASSED
******************************************
TEST: 406 | DESCRIPTION: Check for storage create flags | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE
[Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY
[Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION
TEST RESULT: PASSED
******************************************
TEST: 407 | DESCRIPTION: Incorrect Size check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Create a valid Storage - TEST_BUFF_SIZE/2
Increase the length of storage - TEST_BUFF_SIZE
[Check 1] Call get API with old length - TEST_BUFF_SIZE/2
[Check 2] Call get API with old length - TEST_BUFF_SIZE/4
Decrease the length of storage - TEST_BUFF_SIZE/4
[Check 3] Call get API with old length - TEST_BUFF_SIZE/2
[Check 4] Call get API with old length - TEST_BUFF_SIZE
[Check 5] Call get API with valid length - TEST_BUFF_SIZE/4
TEST RESULT: PASSED
******************************************
TEST: 408 | DESCRIPTION: Invalid offset check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Try to access data with varying valid offset
[Check 2] Try to access data with varying invalid offset
TEST RESULT: PASSED
******************************************
TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call set API with NULL pointer and data length 0
[Check 2] Call get API with NULL read buffer and data length 0
[Check 3] Remove the UID
[Check 4] Call get_info API to verify UID removed
[Check 5] Create UID with zero data_len and valid write buffer
[Check 8] Call get API with NULL read buffer and data length 0
[Check 9] Increase the length
TEST RESULT: PASSED
******************************************
TEST: 410 | DESCRIPTION: UID value zero check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Creating storage with UID 0 should fail
[Check 2] Get_info for UID 0 should fail
[Check 3] Removing storage with UID 0 should fail
TEST RESULT: PASSED
******************************************
TEST: 411 | DESCRIPTION: Optional APIs: UID not found check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 412 | DESCRIPTION: Optional APIs: Invalid arguments and offset invalid | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 413 | DESCRIPTION: Set_Extended and Create api : Success | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 414 | DESCRIPTION: Optional APIs not supported check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Optional PS APIs are not supported.
[Check 1] Call to create API should fail as API not supported
Failed at Checkpoint: 1
Actual: 0
Expected: -134
TEST RESULT: FAILED (Error Code=0x1)
******************************************
TEST: 415 | DESCRIPTION: Create API write_once flag value check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 416 | DESCRIPTION: Storage assest capacity modification check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs not are supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 417 | DESCRIPTION: Storage assest capacity modification check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs not are supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
************ Storage Suite Report **********
TOTAL TESTS : 17
TOTAL PASSED : 10
TOTAL SIM ERROR : 0
TOTAL FAILED : 1
TOTAL SKIPPED : 6
******************************************
Entering standby..
```
**Component test**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/component-test -v
TEST(BlockVolumeTests, oversizeWrite) - 33881 ms
TEST(BlockVolumeTests, multipleImageInstall) - 680 ms
TEST(BlockVolumeTests, seekAccess) - 223 ms
TEST(BlockVolumeTests, readAndWrite) - 521 ms
TEST(BlockVolumeTests, openClose) - 108 ms
IGNORE_TEST(PartitionTableTests, detectCorruptedGptHeader) - 0 ms
TEST(PartitionTableTests, detectCorruptedMbr) - 26523 ms
TEST(PartitionTableTests, loadRefPartitionTable) - 21382 ms
TEST(GptIteratorTests, iterateOverRefGpt) - 22587 ms
TEST(UefiVariableStoreTests, noRemoveCheck) - 2044 ms
TEST(UefiVariableStoreTests, readOnlycheck) - 585 ms
TEST(UefiVariableStoreTests, unsupportedAttribute) - 326 ms
TEST(UefiVariableStoreTests, failedNvSet) - 818 ms
TEST(UefiVariableStoreTests, enumerateStoreContents) - 1020 ms
TEST(UefiVariableStoreTests, runtimeAccess) - 784 ms
TEST(UefiVariableStoreTests, bootServiceAccess) - 607 ms
TEST(UefiVariableStoreTests, removePersistent) - 849 ms
TEST(UefiVariableStoreTests, removeVolatile) - 694 ms
TEST(UefiVariableStoreTests, getWithSmallBuffer) - 700 ms
TEST(UefiVariableStoreTests, persistentSetGet) - 1042 ms
TEST(UefiVariableStoreTests, setGetRoundtrip) - 647 ms
TEST(UefiVariableIndexTests, setCheckConstraintsNonExistingVar) - 283 ms
TEST(UefiVariableIndexTests, setCheckConstraintsExistingVar) - 503 ms
TEST(UefiVariableIndexTests, checkIterator) - 516 ms
TEST(UefiVariableIndexTests, removeVariable) - 298 ms
TEST(UefiVariableIndexTests, dumpBufferTooSmall) - 259 ms
TEST(UefiVariableIndexTests, dumpLoadRoadtrip) - 521 ms
TEST(UefiVariableIndexTests, enumerateStore) - 249 ms
TEST(UefiVariableIndexTests, variableIndexFull) - 252 ms
TEST(UefiVariableIndexTests, addWithOversizedName) - 562 ms
TEST(UefiVariableIndexTests, emptyIndexOperations) - 260 ms
TEST(SfsBlockStoreTests, psCreateAndSetExtended) - 2219 ms
TEST(SfsBlockStoreTests, psCreateAndSet) - 2140 ms
TEST(SfsBlockStoreTests, itsStorageLimitTest) - 1673 ms
TEST(SfsBlockStoreTests, itsStoreNewItem) - 1581 ms
TEST(SfsRamTests, psCreateAndSetExtended) - 320 ms
TEST(SfsRamTests, psCreateAndSet) - 365 ms
TEST(SfsRamTests, itsStorageLimitTest) - 250 ms
TEST(SfsRamTests, itsStoreNewItem) - 227 ms
TEST(MockStoreTests, psCreateAndSetExtended) - 174 ms
TEST(MockStoreTests, psCreateAndSet) - 211 ms
TEST(MockStoreTests, itsStorageLimitTest) - 174 ms
TEST(MockStoreTests, itsStoreNewItem) - 211 ms
TEST(SecureStorageProxyTests, psCreateAndSetExtended) - 1335 ms
TEST(SecureStorageProxyTests, psCreateAndSet) - 347 ms
TEST(SecureStorageProxyTests, itsStorageLimitTest) - 260 ms
TEST(SecureStorageProxyTests, itsStoreNewItem) - 300 ms
TEST(SecureStorageClientTests, psCreateAndSetExtended) - 378 ms
TEST(SecureStorageClientTests, psCreateAndSet) - 262 ms
TEST(SecureStorageClientTests, itsStorageLimitTest) - 200 ms
TEST(SecureStorageClientTests, itsStoreNewItem) - 221 ms
TEST(CryptoProtocolPackedcChecks, checkKeyUsage) - 49 ms
TEST(CryptoProtocolPackedcChecks, checkKeyLifetime) - 16 ms
TEST(CryptoProtocolPackedcChecks, checkAlg) - 31 ms
TEST(CryptoProtocolPackedcChecks, checkDhGroup) - 37 ms
TEST(CryptoProtocolPackedcChecks, checkEccCurve) - 100 ms
TEST(CryptoProtocolPackedcChecks, checkKeyType) - 45 ms
TEST(CryptoProtocolProtobufChecks, checkKeyUsage) - 49 ms
TEST(CryptoProtocolProtobufChecks, checkKeyLifetime) - 20 ms
TEST(CryptoProtocolProtobufChecks, checkAlg) - 65 ms
TEST(CryptoProtocolProtobufChecks, checkDhGroup) - 45 ms
TEST(CryptoProtocolProtobufChecks, checkEccCurve) - 76 ms
TEST(CryptoProtocolProtobufChecks, checkKeyType) - 0 ms
TEST(CryptoProtocolOpcodeChecks, checkPackedcToProtobuf) - 37 ms
TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 6595 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 1000 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 667 ms
TEST(CryptoMacServicePackedcTests, macAbort) - 824 ms
TEST(CryptoMacServicePackedcTests, signAndVerify) - 23800 ms
TEST(CryptoCipherServicePackedcTests, cipherAbort) - 668 ms
TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 14015 ms
TEST(CryptoHashServicePackedcTests, hashAbort) - 1985 ms
TEST(CryptoHashServicePackedcTests, hashAndVerify) - 3954 ms
TEST(CryptoHashServicePackedcTests, calculateHash) - 988 ms
TEST(CryptoServicePackedcTests, generateRandomNumbers) - 1337 ms
TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 1046843 ms
TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 137365 ms
TEST(CryptoServicePackedcTests, signAndVerifyEat) - 253256 ms
TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 252541 ms
TEST(CryptoServicePackedcTests, signAndVerifyHash) - 250919 ms
TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 21470 ms
TEST(CryptoServicePackedcTests, exportPublicKey) - 42058 ms
TEST(CryptoServicePackedcTests, purgeKey) - 21253 ms
TEST(CryptoServicePackedcTests, copyKey) - 136364 ms
TEST(CryptoServicePackedcTests, generatePersistentKeys) - 41861 ms
TEST(CryptoServicePackedcTests, generateVolatileKeys) - 41730 ms
TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 1798 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 573779 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 130699 ms
TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 251300 ms
TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 250868 ms
TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 21742 ms
TEST(CryptoServiceProtobufTests, exportPublicKey) - 42198 ms
TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 42363 ms
TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 41947 ms
TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 10388464 ms
TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 2023418 ms
TEST(CryptoFaultTests, randomNumbersWithBrokenStorage) - 246 ms
TEST(CryptoFaultTests, persistentKeysWithBrokenStorage) - 20787 ms
TEST(CryptoFaultTests, volatileKeyWithBrokenStorage) - 21344 ms
TEST(PocCryptoOpTests, checkOpSequence) - 66220 ms
TEST(CryptoMsgTests, SignHashOutMsgTest) - 71 ms
TEST(CryptoMsgTests, SignHashInMsgTest) - 249 ms
TEST(CryptoMsgTests, ExportPublicKeyOutMsgTest) - 238 ms
TEST(CryptoMsgTests, ExportPublicKeyInMsgTest) - 50 ms
TEST(CryptoMsgTests, GenerateKeyInMsgTest) - 200 ms
TEST(CryptoContextPoolTests, multipleContexts) - 39459 ms
TEST(CryptoContextPoolTests, singleContext) - 54 ms
TEST(CryptoContextPoolTests, checkEmptyPool) - 79 ms
TEST(FwuUpdateFmpTests, wholeFmpFlow) - 7742 ms
TEST(FwuOversizeImageTests, oversizeInstallMultiLocationEndStaging) - 48529 ms
TEST(FwuOversizeImageTests, oversizeInstallEndStaging) - 11633 ms
TEST(FwuOversizeImageTests, oversizeInstallCancelStaging) - 11628 ms
TEST(FwuOversizeImageTests, maxSizeInstall) - 17872 ms
TEST(FwuRollbackTests, bootloaderFallback) - 11191 ms
TEST(FwuRollbackTests, selectPreviousAfterActivation) - 15366 ms
TEST(FwuRollbackTests, selectPreviousPriorToActivation) - 11142 ms
TEST(FwuPowerFailureTests, powerFailureDuringTrial) - 71538 ms
TEST(FwuPowerFailureTests, powerFailureDuringStaging) - 55901 ms
TEST(FwuUpdateScenarioTests, partialFirmwareUpdateFlow) - 45294 ms
TEST(FwuUpdateScenarioTests, wholeFirmwareUpdateFlow) - 15402 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInTrial) - 33949 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInStaging) - 16350 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInRegular) - 5621 ms
TEST(FwuImageDirectoryTests, zeroFwLocations) - 523 ms
TEST(FwuImageDirectoryTests, multipleFwLocations) - 15860 ms
TEST(FwuImageDirectoryTests, singleFwLocation) - 5619 ms
TEST(FwuImageDirectoryTests, streamRecycling) - 19707 ms
TEST(FwuImageDirectoryTests, streamedReads) - 18270 ms
TEST(FwuDefaultInstallerFactoryTests, configureInstallersFlow) - 608 ms
TEST(FwuCopyInstallerTests, installAndCopy) - 45578 ms
TEST(FwuRawInstallerTests, normalInstallFlow) - 22412 ms
TEST(FwuMetadataV2Tests, checkImgBankInfoStructure) - 0 ms
TEST(FwuMetadataV2Tests, checkImgEntryStructure) - 37 ms
TEST(FwuMetadataV2Tests, checkFwStoreDescStructure) - 20 ms
TEST(FwuMetadataV2Tests, checkHeaderStructure) - 11 ms
TEST(FwuMetadataManagerTests, checkAndRepairInaccessibleStorage) - 20799 ms
TEST(FwuMetadataManagerTests, checkAndRepairAccessibleStorage) - 56959 ms
TEST(PartitionedBlockStoreTests, writeToInvalidBlock) - 237 ms
TEST(PartitionedBlockStoreTests, checkEraseLimits) - 641 ms
TEST(PartitionedBlockStoreTests, writeReadEraseBlock) - 635 ms
TEST(PartitionedBlockStoreTests, openClose) - 174 ms
TEST(PartitionedBlockStoreTests, getPartitionInfo) - 185 ms
TEST(FileBlockStoreTests, initWithExistingDiskImage) - 1546 ms
TEST(FileBlockStoreTests, wholeBlockRw) - 3347 ms
TEST(RamBlockStoreTests, eraseOperations) - 191 ms
TEST(RamBlockStoreTests, writeToInvalidBlock) - 122 ms
TEST(RamBlockStoreTests, writeBiggerThanBlock) - 242 ms
TEST(RamBlockStoreTests, writeReadEraseBlock) - 313 ms
TEST(RamBlockStoreTests, openClose) - 85 ms
TEST(RamBlockStoreTests, getPartitionInfo) - 96 ms
TEST(AttestationProvisioningTests, provisionedIak) - 21012 ms
TEST(AttestationProvisioningTests, selfGeneratedIak) - 61830 ms
TEST(AttestationServiceTests, repeatedOperation) - 5061352 ms
TEST(AttestationServiceTests, invalidChallengeLen) - 158 ms
TEST(AttestationServiceTests, checkTokenSize) - 91593 ms
TEST(AttestationReporterTests, createReport) - 171984 ms
TEST(TcgEventLogTests, interateBootMeasurements) - 174 ms
TEST(DiscoveryServiceTests, checkServiceInfo) - 349 ms
TEST(ServiceNameTests, readService) - 327 ms
TEST(ServiceNameTests, checkFields) - 275 ms
TEST(ServiceNameTests, checkInvalidServiceNames) - 37 ms
TEST(ServiceNameTests, checkValidServiceNames) - 118 ms
TEST(ServiceFrameworkTests, serviceProviderChain) - 123 ms
TEST(ServiceFrameworkTests, serviceWithOps) - 13 ms
TEST(ServiceFrameworkTests, serviceWithNoOps) - 76 ms
TEST(ffarpc_call_ep, request_deny_64_bit) - 1331 ms
TEST(ffarpc_call_ep, request_with_data_after_unshare) - 3618 ms
TEST(ffarpc_call_ep, request_with_data_buffer_overflow) - 1728 ms
TEST(ffarpc_call_ep, request_with_data) - 2421 ms
TEST(ffarpc_call_ep, request_without_data_non_zero_length) - 71 ms
TEST(ffarpc_call_ep, request_without_data) - 675 ms
TEST(ffarpc_call_ep, invalid_mgmt_call) - 84 ms
TEST(ffarpc_call_ep, mem_unshare_null_ep) - 102 ms
TEST(ffarpc_call_ep, mem_share_unshare_relinquish_fail_then_success) - 3123 ms
TEST(ffarpc_call_ep, mem_share_unshare_relinquish_fail) - 2367 ms
TEST(ffarpc_call_ep, mem_share_unshare) - 2377 ms
TEST(ffarpc_call_ep, mem_unshare) - 82 ms
TEST(ffarpc_call_ep, mem_share_null_ep) - 100 ms
TEST(ffarpc_call_ep, mem_share_smaller_page_count_relinquish_fail) - 2393 ms
TEST(ffarpc_call_ep, mem_share_smaller_page_count) - 2353 ms
TEST(ffarpc_call_ep, mem_share_retrieve_fail) - 1719 ms
TEST(ffarpc_call_ep, mem_share_fill_all) - 26378 ms
TEST(ffarpc_call_ep, mem_share) - 1675 ms
TEST(ffarpc_caller, end) - 82 ms
TEST(ffarpc_caller, end_null_handle) - 140 ms
TEST(ffarpc_caller, end_null_context) - 0 ms
TEST(ffarpc_caller, invoke_without_response) - 605 ms
TEST(ffarpc_caller, invoke_with_response) - 626 ms
TEST(ffarpc_caller, invoke_invalid_resp_len) - 642 ms
TEST(ffarpc_caller, invoke_send_direct_req_fail) - 491 ms
TEST(ffarpc_caller, invoke_resp_long_req) - 37 ms
TEST(ffarpc_caller, invoke_resp_no_begin) - 48 ms
TEST(ffarpc_caller, invoke_resp_len_null) - 86 ms
TEST(ffarpc_caller, invoke_resp_buf_null) - 46 ms
TEST(ffarpc_caller, invoke_opstatus_null) - 93 ms
TEST(ffarpc_caller, invoke_handle_context_diff) - 60 ms
TEST(ffarpc_caller, invoke_null_context) - 0 ms
TEST(ffarpc_caller, begin_without_buffer) - 85 ms
TEST(ffarpc_caller, begin_with_buffer) - 55 ms
TEST(ffarpc_caller, begin_not_opened) - 45 ms
TEST(ffarpc_caller, begin_too_large_req) - 87 ms
TEST(ffarpc_caller, begin_transaction_in_progress) - 100 ms
TEST(ffarpc_caller, begin_null_buffer) - 134 ms
TEST(ffarpc_caller, begin_null_context) - 42 ms
TEST(ffarpc_caller, close_success) - 1094 ms
TEST(ffarpc_caller, close_endpoint_and_mem_reclaim_fail) - 927 ms
TEST(ffarpc_caller, close_mem_reclaim_fail) - 948 ms
TEST(ffarpc_caller, close_send_direct_msg_fail) - 483 ms
TEST(ffarpc_caller, close_not_opened) - 37 ms
TEST(ffarpc_caller, open_success) - 1851 ms
TEST(ffarpc_caller, open_send_direct_req_rpc_status_fail_reclaim_fail) - 2218 ms
TEST(ffarpc_caller, open_send_direct_req_rpc_status_fail) - 2237 ms
TEST(ffarpc_caller, open_send_direct_req_fail) - 1712 ms
TEST(ffarpc_caller, open_share_fail) - 1315 ms
TEST(ffarpc_caller, open_invalid_mem_size) - 82 ms
TEST(ffarpc_caller, open_already_opened) - 68 ms
TEST(ffarpc_caller, discover_more_max_cnt) - 1184 ms
TEST(ffarpc_caller, discover_less_max_cnt) - 1065 ms
TEST(ffarpc_caller, discover) - 1100 ms
TEST(ffarpc_caller, discover_rx_release_fail) - 1007 ms
TEST(ffarpc_caller, discover_rx_get_fail) - 868 ms
TEST(ffarpc_caller, discover_partition_info_get_fail) - 511 ms
TEST(ffarpc_caller, discover_invalid_arguments) - 97 ms
TEST(RpcStatusProtocolChecks, checkProtobufRpcStatusCodes) - 60 ms
TEST(ConfigRamstoreTests, checkMultipleConfig) - 53 ms
TEST(ConfigRamstoreTests, checkSingleConfig) - 87 ms
TEST(ConfigRamstoreTests, checkEmptyConfig) - 43 ms
TEST(Crc32Tests, multiPart) - 39 ms
TEST(Crc32Tests, longString) - 87 ms
TEST(Crc32Tests, shortString) - 46 ms
TEST(EndianTests, le64) - 86 ms
TEST(EndianTests, le32) - 31 ms
TEST(EndianTests, le16) - 27 ms
TEST(EndianTests, le8) - 100 ms
TEST(TlvTests, encodeWrongOrder) - 79 ms
TEST(TlvTests, encodeInsufficientSpace) - 100 ms
TEST(TlvTests, encodeRecords) - 223 ms
TEST(TlvTests, decodeBadRecords) - 56 ms
TEST(TlvTests, findAndDecodeMissingOptional) - 50 ms
TEST(TlvTests, findAndDecode) - 76 ms
TEST(TlvTests, decodeGoodRecords) - 37 ms
TEST(UuidTests, roundTrip) - 136 ms
TEST(UuidTests, checkNilUuidOperations) - 100 ms
TEST(UuidTests, checkIsEqualOperation) - 124 ms
TEST(UuidTests, checkOctetsFromCanonical) - 86 ms
TEST(UuidTests, parseValidUuidToGuidOctets) - 0 ms
TEST(UuidTests, parseError) - 61 ms
TEST(UuidTests, parseUuidInUrn) - 87 ms
TEST(UuidTests, parseValidUuidMixedCase) - 82 ms
TEST(UuidTests, parseValidUuidLowerCase) - 82 ms
TEST(TsDemoTests, runTsDemo) - 624043 ms
OK (252 tests, 251 ran, 365136 checks, 1 ignored, 0 filtered out, 23127180 ms)
```
**LibTS test (linux-pc only)**
```
trusted-services/tools/b-test/build-libts-linux-pc/libts-test -v
TEST(CryptoServicePackedcTests, generateRandomNumbers) - 2 ms
TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 6 ms
TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 2 ms
TEST(CryptoServicePackedcTests, signAndVerifyEat) - 2 ms
TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 3 ms
TEST(CryptoServicePackedcTests, signAndVerifyHash) - 2 ms
TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 1 ms
TEST(CryptoServicePackedcTests, exportPublicKey) - 0 ms
TEST(CryptoServicePackedcTests, purgeKey) - 0 ms
TEST(CryptoServicePackedcTests, copyKey) - 1 ms
TEST(CryptoServicePackedcTests, generatePersistentKeys) - 1 ms
TEST(CryptoServicePackedcTests, generateVolatileKeys) - 0 ms
TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 0 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 14 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 1 ms
TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 3 ms
TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 2 ms
TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 1 ms
TEST(CryptoServiceProtobufTests, exportPublicKey) - 0 ms
TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 0 ms
TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 1 ms
- 68 ms
TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 17 ms
TEST(PsServiceTests, createAndSetExtended) - 1 ms
TEST(PsServiceTests, createAndSet) - 0 ms
TEST(PsServiceTests, storeNewItem) - 1 ms
TEST(ItsServiceTests, storeNewItem) - 0 ms
```
**Platform inspect test**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/platform-inspect
attestation_report:
challenge: 31 03 a3 a3 e5 e2 d8 1a ea e1 df 26 85 1c c0 2a 4d ac 4a 3e ba 32 15 53 0e f2 e3 fe 91 f6 8b 75
client_id: 0
boot_seed: ec 0b f2 64 34 7a 8c 68 ca ff 5f a4 e2 ff 90 70 25 64 be e1 13 90 58 97 42 b1 ce 4a d2 f8 7b 3a
security_lifecycle: 0
instance_id: 01 9c d5 b1 3e 0b 88 a9 12 87 c7 1e 52 0d 58 39 92 a7 69 d9 58 bb 8a db 10 15 f0 77 c0 a1 25 63 32
implementation_id: 74 72 75 73 74 65 64 66 69 72 6d 77 61 72 65 2e 6f 72 67 2e 74 73 2e 61 74 74 65 73 74 61 74 69 6f 6e 5f 73 70
sw_components:
type: FW_CONFIG
digest: 5e 10 97 50 c0 cb 32 14 e6 e4 09 f7 12 ba 84 d6 d1 d6 e2 d4 45 8c 52 f3 d2 b9 6e ea 82 d4 e5 47
type: TB_FW_CONFIG
digest: dc 45 e2 c1 a9 f5 b1 81 9a 10 8e 8e 0f 0a 5e b2 e1 c1 94 00 73 ae 14 83 eb dd e1 f5 fe ac 72 5c
type: BL_2
digest: d1 56 89 90 7e d8 98 71 72 47 fb 91 9e c2 0b 7b 5d 89 f4 07 ce 27 8d 37 54 20 d8 aa ea 92 30 ae
type: SECURE_RT_EL3
digest: 99 56 5e 18 d3 ea 1b 8f 79 63 c8 66 19 48 a2 50 f8 c3 0c a5 33 99 53 9e 11 c2 cd 5e 11 c5 8c dc
type: HW_CONFIG
digest: 54 10 fe 53 a5 fe 12 75 dc cc 3a 15 8f d8 34 63 f3 3e 1e 71 7f e3 4c 39 a1 62 4a 90 5c 0a 84 f3
type: SOC_FW_CONFIG
digest: 4e e4 8e 5a e6 50 ed e0 b5 a3 54 8a 1f d6 0e 8a ea 0e 71 75 0e a4 3f 82 76 ce af cd 7c b0 91 e0
type: SECURE_RT_EL1_UNKNOWN
digest: e9 4a 94 e4 1e 0c 28 97 3a 6b b8 dc 2f 89 fc f9 af e9 d3 67 98 89 2c 4d 0a 6d 3b b5 59 11 c6 73
type: TOS_FW_CONFIG
digest: 77 35 1c d8 86 d0 66 15 eb 3a 2d 2d 9c ef b9 49 ba 0a 4a 67 58 ff 06 b7 90 7d c7 06 38 ce c6 0b
type: BL_33
digest: a2 6c ec 40 dd dd 31 ce af 90 09 5b 25 c6 e3 83 b3 3e 6f 11 fc 13 4f 8e 83 64 0d 53 b6 34 22 6c
type: NT_FW_CONFIG
digest: 0c 53 ba 3f c9 43 13 bf 25 59 bc 8c 2e 7e 49 fa 0f 1a 5a 40 96 ed 58 fa 58 31 39 7a de d4 e4 fb
type: CRITICAL DATA
digest: d3 a9 31 35 10 be c0 88 51 bd 28 4e a9 ff b3 c3 cd 02 11 fc 23 2e 02 07 0e ce a5 ab 1d d9 a1 6a
```
**TS Demo test**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/ts-demo
Demonstrates use of trusted services from an application
---------------------------------------------------------
A client requests a set of crypto operations performed by
the Crypto service. Key storage for persistent keys is
provided by the Secure Storage service via the ITS client.
Generating random bytes length: 1
Operation successful
Random bytes:
55
Generating random bytes length: 7
Operation successful
Random bytes:
2B 35 04 79 3B 50 83
Generating random bytes length: 128
Operation successful
Random bytes:
57 31 1C 74 88 69 C4 12
D1 9A 93 83 2D D2 AA 0C
EA 03 F5 44 09 6A 92 11
8A 8A 06 57 26 B1 47 74
01 1B 2A 25 8D CF 6C A3
A6 4D 6D A1 8B FC 31 76
57 13 72 96 C4 09 BA 56
88 35 F9 66 58 B0 EE 1E
AF E9 90 9D AD BB 62 21
82 37 E1 31 37 43 18 5B
95 2E 42 BB 6B 41 40 66
A5 81 81 32 3F F3 23 8A
5A 88 B2 9D 2C B0 F2 C4
51 26 13 53 FE 8F 68 B0
B0 D1 64 85 3C E9 5A C8
E2 0A 62 80 F1 AB A2 7C
Generating ECC signing key
Operation successful
Signing message: "The quick brown fox" using key: 256
Operation successful
Signature bytes:
77 1E 93 3C E1 A2 CD C4
5D 03 15 B8 A9 1A AE 47
37 6A B8 F0 5D 67 22 06
FC 2C B8 20 71 97 7F F8
AE 06 0F 71 34 E3 0B FD
CA 24 C2 23 0F 89 67 99
51 B5 FE 25 95 CD 75 ED
1B A2 6E 5A 3A 06 26 3C
Verify signature using original message: "The quick brown fox"
Operation successful
Verify signature using modified message: "!he quick brown fox"
Successfully detected modified message
Signing message: "jumps over the lazy dog" using key: 256
Operation successful
Signature bytes:
91 1A 8E 4B 17 3C 01 FF
A2 0A D4 55 39 3E 84 96
92 84 A3 F1 A1 26 5C 40
14 A6 57 50 79 70 41 ED
68 E4 21 61 DD 9F 07 0C
DE 9C DC 29 F5 9F 88 DF
36 0D C4 21 54 D3 CD F8
35 C0 7B 16 10 59 26 4A
Verify signature using original message: "jumps over the lazy dog"
Operation successful
Verify signature using modified message: "!umps over the lazy dog"
Successfully detected modified message
Generating RSA encryption key
Operation successful
Encrypting message: "Top secret" using RSA key: 257
Operation successful
Encrypted message:
6E 9A 04 F4 64 33 0B 6D
DE CB C7 21 EF C8 FC A9
95 50 F1 6C 90 64 AA A0
D6 99 BD 90 4C 79 A0 73
Decrypting message using RSA key: 257
Operation successful
Decrypted message: "Top secret"
Exporting public key: 256
Operation successful
Public key bytes:
04 D5 1A 1C 30 72 3C CF
3B E3 0B 47 92 54 2E 6E
61 28 26 A1 FB 00 82 75
AC 44 14 18 B4 87 66 F7
F8 47 0B 25 83 04 4B 9A
6F 08 DF 98 E1 81 77 E7
6B 29 34 60 2A 52 94 96
E8 6E 2E 0E 78 5A EF 81
98
Destroying signing key: 256
Operation successful
Destroying encryption key: 257
Operation successful
```
==Config 2: FIP SP==
====Build command====
```
MEASURED_BOOT=y SPMC_TESTS=n TS_SMM_GATEWAY=n TS_UEFI_TESTS=n SP_PACKAGING_METHOD=fip DEFAULT_SP_CONFIG=default-sp SP_BLOCK_STORAGE_CONFIG=default-sp SP_PSA_ITS_CONFIG=shared-flash-opteesp SP_PSA_PS_CONFIG=shared-flash-opteesp make
```
====Setup steps after boot====
```
/mnt/host/out/linux-arm-ffa-tee/load_module.sh
/mnt/host/out/linux-arm-ffa-user/load_module.sh
cp -at /usr /mnt/host/out/ts-install/arm-linux/bin /mnt/host/out/ts-install/arm-linux/lib
```
====Test results====
**Trusted Services service level test**
```
```
**PSA Architecture Test Suite**
```
```
**Component test**
```
```
**LibTS test**
```
```
**Platform inspect test**
```
```
**TS Demo test**
**UEFI test**
==Config 3: OP-TEE SPMC tests==
====Build command====
```
MEASURED_BOOT=n SPMC_TESTS=n TS_SMM_GATEWAY=y TS_UEFI_TESTS=y DEFAULT_SP_CONFIG=default-sp SP_PACKAGING_METHOD=fip make
```
====Setup steps after boot====
```
/mnt/host/out/linux-arm-ffa-tee/load_module.sh
/mnt/host/out/linux-arm-ffa-user/load_module.sh
cp -at /usr /mnt/host/out/ts-install/arm-linux/bin /mnt/host/out/ts-install/arm-linux/lib
```
====Test results====
==Config 4: SMMGW tests==
====Build command====
```
MEASURED_BOOT=n SPMC_TESTS=y TS_SMM_GATEWAY=n TS_UEFI_TESTS=n SP_PACKAGING_METHOD=embedded DEFAULT_SP_CONFIG=default-opteesp make
```
====Setup steps after boot====
```
/mnt/host/out/linux-arm-ffa-tee/load_module.sh
/mnt/host/out/linux-arm-ffa-user/load_module.sh
cp -at /usr /mnt/host/out/ts-install/arm-linux/bin /mnt/host/out/ts-install/arm-linux/lib
```
====Test results====
=Overview=
This page is to capture the test results for OP-TEE SPMC v3.22
The tests were ran using the following set of components:
```lang=html, lines=12
>>> Manifest status
d064c30 (HEAD -> default, origin/master, m/master) stm32mp1: fetch mbedtls for tf-a authenticated boot
b242f5c stm32mp1: add edk2 and edk2-platforms repos
122fe9a stm32mp1: bump u-boot to 2023.04
Local manifests:
The merged manifest is:
<?xml version="1.0" encoding="UTF-8"?>
<manifest>
<remote fetch="https://git.gitlab.arm.com" name="arm-gitlab"/>
<remote fetch="https://github.com" name="github"/>
<remote fetch="https://git.savannah.gnu.org/git" name="savannah"/>
<remote fetch="https://git.trustedfirmware.org" name="tfo"/>
<default remote="github" revision="master"/>
<project name="Mbed-TLS/mbedtls.git" path="mbedtls" revision="refs/tags/mbedtls-2.28.1"/>
<project name="OP-TEE/build.git" path="build">
<linkfile dest="build/Makefile" src="fvp-psa-sp.mk"/>
</project>
<project name="OP-TEE/optee_client.git" path="optee_client"/>
<project name="OP-TEE/optee_os.git" path="optee_os"/>
<project name="OP-TEE/optee_test.git" path="optee_test"/>
<project clone-depth="1" name="TF-A/trusted-firmware-a.git" path="trusted-firmware-a" remote="tfo" revision="refs/tags/v2.8"/>
<project name="TS/trusted-services.git" path="trusted-services" remote="tfo" revision="integration"/>
<project clone-depth="1" name="buildroot/buildroot.git" path="buildroot" revision="refs/tags/2022.11.1"/>
<project clone-depth="1" name="grub.git" path="grub" remote="savannah" revision="refs/tags/grub-2.02"/>
<project name="linaro-swg/optee_examples.git" path="optee_examples"/>
<project clone-depth="1" name="linux-arm/linux-trusted-services.git" path="linux-arm-ffa-user" remote="arm-gitlab" revision="debugfs-v5"/>
<project clone-depth="1" name="linux-arm/linux-trusted-services.git" path="linux-arm-ffa-tee" remote="arm-gitlab" revision="tee-v1"/>
<project name="tianocore/edk2-platforms.git" path="edk2-platforms" revision="02daa58c21f89628b4d8c76f95f3a554289149bc"/>
<project name="tianocore/edk2.git" path="edk2" revision="dd4cae4d82c7477273f3da455084844db5cca0c0"/>
<project clone-depth="1" name="torvalds/linux.git" path="linux" revision="refs/tags/v6.1"/>
</manifest>
>>>Project status
project build/
Local and remote SHA is matching.
2e792b3 (HEAD, m/master, github/master) fvp, ts: optimize buildroot config
3730e01 fvp, ts: use minimal Linux config
9b54724 Fix build of fTPM by enabling build of 32-bit libraries
project buildroot/
Local and remote SHA is matching.
d48a8beb (grafted, HEAD, tag: 2022.11.1, tag: m/master) Update for 2022.11.1
project edk2/
Local and remote SHA is matching.
dd4cae4d82 (HEAD, m/master) ArmPkg/GenericWatchdogDxe: Split 64bit register write to 2x32bit
1d802e234e BaseTools: Guid.xref doesn't specify the correct GUID value for Driver
83964ebc5e BaseTools/BinToPcd: Encode string returned from ByteArray()
project edk2-platforms/
Local and remote SHA is matching.
02daa58c21 (HEAD, m/master) Silicon/SynQuacer: Add status property in PCIe & SDHC DT nodes
9f02ebc19b Silicon/SynQuacer: add optional OP-TEE DT node
9dae9a0c79 Marvell/Library: ComPhyLib: Clean up the library after rework
project grub/
Local and remote SHA is matching.
e54c99a (grafted, HEAD, tag: grub-2.02, tag: m/master) Increase version to 2.02.
project linux/
Local and remote SHA is matching.
830b3c68c (grafted, HEAD, tag: v6.1, tag: m/master) Linux 6.1
project linux-arm-ffa-tee/
Local and remote SHA is matching.
c6b9495 (grafted, HEAD, m/master, arm-gitlab/tee-v1) Add versioning info to readme
project linux-arm-ffa-user/
Local and remote SHA is matching.
18e3be7 (grafted, HEAD, m/master, arm-gitlab/debugfs-v5) Add support for FF-A driver changes in v6.1
project mbedtls/
Local and remote SHA is matching.
dd79db100 (HEAD, tag: v2.28.1, tag: mbedtls-2.28.1, tag: m/master) Merge pull request #955 from Mbed-TLS/mbedtls-2.28.1rc0-pr
fe9d08fd1 Bump version
fa827b4b3 Minor tweaks to Changelog
project optee_client/
Local and remote SHA is matching.
8533e0e (HEAD, tag: 3.21.0-rc1, tag: 3.21.0, m/master, github/master) travis: remove the .travis.yml file
0fc6ef7 tee-supplicant: fix leak when load plugin failed
dde6306 libteeacl: use realloc() instead of reallocarray()
project optee_examples/
Local and remote SHA is matching.
378dc0d (HEAD, tag: 3.21.0, m/master, github/master) hotp: use sess_ctx instead of global variables
a98d01e (tag: 3.21.0-rc1, tag: 3.20.0-rc1, tag: 3.20.0) pluging: add missing of dependency syslog on teec
3ca8454 Enable compatibility with TEE Internal Core API v1.1
project optee_os/
Local and remote SHA is matching.
280b6a32e (HEAD, m/master, github/master) core: spmc: implement FFA_CONSOLE_LOG
b89b3da24 core: thread: Add support for canary value randomization
fb66b364b mk/aosp_optee.mk: fix build dependency for static libraries
project optee_test/
Local and remote SHA is matching.
232dfd2 (HEAD, m/master, github/master) xtest: remove ffa.h from SPMC test to resolve compiler error
36a136d Android.mk: add subkeys include directory
d168ff4 xtest: fix xtest tool name in usage trace messages
project trusted-firmware-a/
Local and remote SHA is matching.
9881bb9 (grafted, HEAD, tag: v2.8, tag: m/master) Merge "docs(spm): update threat model" into integration
project trusted-services/
Local and remote SHA is matching.
e56c7b1 (HEAD, tfo/integration, m/master) Implement FFA_CONSOLE_LOG interface
0100ddd Add FF-A v1.1 boot protocol
4f9d8e3 Refactor FF-A boot info
```
=Details=
==Config 1: embedded SP==
====Build command====
```
MEASURED_BOOT=y SPMC_TESTS=n TS_SMM_GATEWAY=n TS_UEFI_TESTS=n SP_PACKAGING_METHOD=embedded DEFAULT_SP_CONFIG=default-sp SP_BLOCK_STORAGE_CONFIG=default-sp SP_PSA_ITS_CONFIG=shared-flash-opteesp SP_PSA_PS_CONFIG=shared-flash-opteesp make
```
====Setup steps after boot====
```
/mnt/host/out/linux-arm-ffa-tee/load_module.sh
/mnt/host/out/linux-arm-ffa-user/load_module.sh
```
====Test results====
**Trusted Services service level test**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/ts-service-test -v
TEST(FwuServiceTests, checkMetadataAccess)
/src/trusted-services/components/service/fwu/test/service/fwu_service_tests.cpp:66: error: Failure in TEST(FwuServiceTests, checkMetadataAccess)
/src/trusted-services/components/service/fwu/test/metadata_fetcher/client/client_metadata_fetcher.cpp:44: error:
expected < 0 0x0000000000000000>
but was <-8 0xfffffffffffffff8>
- 6674 ms
TEST(FwuServiceTests, checkImgDirAccess)
/src/trusted-services/components/service/fwu/test/service/fwu_service_tests.cpp:61: error: Failure in TEST(FwuServiceTests, checkImgDirAccess)
expected < 0 0x0000000000000000>
but was <-8 0xfffffffffffffff8>
- 2427 ms
TEST(PsServiceTests, createAndSetExtended) - 73500 ms
TEST(PsServiceTests, createAndSet) - 119236 ms
TEST(PsServiceTests, storeNewItem) - 77429 ms
TEST(ItsServiceTests, storeNewItem) - 80837 ms
TEST(AttestationProvisioningTests, provisionedIak) - 36000 ms
TEST(AttestationProvisioningTests, selfGeneratedIak) - 52060 ms
TEST(AttestationServiceTests, repeatedOperation) - 6644452 ms
TEST(AttestationServiceTests, invalidChallengeLen)[ 10.780459] ------------[ cut here ]------------
[ 10.780559] WARNING: CPU: 3 PID: 143 at mm/page_alloc.c:5534 __alloc_pages+0x164/0xab0
[ 10.780876] Modules linked in: arm_ffa_tee(O)
[ 10.780959] CPU: 3 PID: 143 Comm: ts-service-test Tainted: G O 6.1.0 #1
[ 10.781259] Hardware name: FVP Base RevC (DT)
[ 10.781359] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 10.781571] pc : __alloc_pages+0x164/0xab0
[ 10.781659] lr : pool_op_alloc+0x5c/0x180 [arm_ffa_tee]
[ 10.781959] sp : ffffffc0087ebac0
[ 10.782059] x29: ffffffc0087ebac0 x28: ffffffc0087ebd30 x27: ffffff8801e74600
[ 10.782359] x26: 0000007fe05cb118 x25: 0000000000000005 x24: 0000000000001000
[ 10.782559] x23: ffffff8801e74180 x22: 0000000000000015 x21: 0000000000000015
[ 10.782759] x20: 0000000000000000 x19: ffffff8801e74180 x18: 0000000000000000
[ 10.783059] x17: 0000000000000000 x16: 0000000000000000 x15: 0000007fe05cb118
[ 10.783306] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 10.783559] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 10.783827] x8 : ffffff8801e74200 x7 : 0000000000000000 x6 : 0000000000000ae4
[ 10.784059] x5 : ffffff8801e74180 x4 : 0000000000000000 x3 : 0000000000000000
[ 10.784259] x2 : ffffff88009f3700 x1 : 0000000000000001 x0 : ffffffc008707000
[ 10.784559] Call trace:
[ 10.784659] __alloc_pages+0x164/0xab0
[ 10.784759] pool_op_alloc+0x5c/0x180 [arm_ffa_tee]
[ 10.785059] shm_alloc_helper+0x98/0x110
[ 10.785159] tee_shm_alloc_user_buf+0x74/0x11c
[ 10.785438] tee_ioctl+0xa70/0xf9c
[ 10.785612] __arm64_sys_ioctl+0x3bc/0xc30
[ 10.785759] invoke_syscall.constprop.0+0x5c/0x104
[ 10.785859] do_el0_svc+0x60/0x18c
[ 10.786059] el0_svc+0x38/0xf0
[ 10.786259] el0t_64_sync_handler+0xbc/0x140
[ 10.786359] el0t_64_sync+0x18c/0x190
[ 10.786559] ---[ end trace 0000000000000000 ]---
ffa_tee_share_mem():212 error: 12
- 23142 ms
TEST(AttestationServiceTests, checkTokenSize) - 66762 ms
TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 24023 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 27300 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 32600 ms
TEST(CryptoMacServicePackedcTests, macAbort) - 20271 ms
TEST(CryptoMacServicePackedcTests, signAndVerify) - 78961 ms
TEST(CryptoCipherServicePackedcTests, cipherAbort) - 20300 ms
TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 62965 ms
TEST(CryptoHashServicePackedcTests, hashAbort) - 18484 ms
TEST(CryptoHashServicePackedcTests, hashAndVerify) - 29900 ms
TEST(CryptoHashServicePackedcTests, calculateHash) - 13918 ms
TEST(CryptoServicePackedcTests, generateRandomNumbers) - 43551 ms
TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 2835610 ms
TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 220900 ms
TEST(CryptoServicePackedcTests, signAndVerifyEat) - 265000 ms
TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 324213 ms
TEST(CryptoServicePackedcTests, signAndVerifyHash) - 327834 ms
TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 169327 ms
TEST(CryptoServicePackedcTests, exportPublicKey) - 115042 ms
TEST(CryptoServicePackedcTests, purgeKey) - 102661 ms
TEST(CryptoServicePackedcTests, copyKey) - 128324 ms
TEST(CryptoServicePackedcTests, generatePersistentKeys) - 187641 ms
TEST(CryptoServicePackedcTests, generateVolatileKeys) - 57006 ms
TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 44265 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 3030578 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 232579 ms
TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 327800 ms
TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 326324 ms
TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 170099 ms
TEST(CryptoServiceProtobufTests, exportPublicKey) - 115628 ms
TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 189753 ms
TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 57301 ms
TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 9734201 ms
TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 2203098 ms
TEST(DiscoveryServiceTests, checkServiceInfo) - 3840 ms
Errors (2 failures, 45 tests, 45 ran, 770 checks, 0 ignored, 0 filtered out, 28737577 ms)
```
**PSA Architecture Test Suite**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-crypto-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Crypto Suite
******************************************
TEST: 201 | DESCRIPTION: Testing crypto key management APIs | UT: psa_crypto_init
[Info] Executing tests from non-secure
[Check 1] Test calling crypto functions before psa_crypto_init
[Check 2] Test psa_crypto_init
[Check 3] Test multiple psa_crypto_init
TEST RESULT: PASSED
******************************************
TEST: 202 | DESCRIPTION: Testing crypto key management APIs | UT: psa_import_key
[Info] Executing tests from non-secure
[Check 1] Test psa_import_key 16 bytes AES
[Check 2] Test psa_import_key 24 bytes AES
[Check 3] Test psa_import_key 32 bytes AES
[Check 4] Test psa_import_key 2048 RSA public key
[Check 5] Test psa_import_key with RSA 2048 keypair
[Check 6] Test psa_import_key with DES 8 bytes key
[Check 7] Test psa_import_key with Triple DES 2-Key
[Check 8] Test psa_import_key with Triple DES 3-Key
[Check 9] Test psa_import_key with EC Public key
[Check 10] Test psa_import_key with EC keypair
[Check 11] Test psa_import_key 16 bytes AES with invalid bits
[Check 12] Test psa_import_key with key data greater than the algorithm size
[Check 13] Test psa_import_key with incorrect key data size
[Check 14] Test psa_import_key with invalid key type value
TEST RESULT: PASSED
******************************************
TEST: 203 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_key
[Info] Executing tests from non-secure
[Check 1] Test psa_export_key 16 Byte AES
[Check 2] Test psa_export_key 24 Byte AES
[Check 3] Test psa_export_key 32 Byte AES
[Check 4] Test psa_export_key 2048 RSA public key
[Check 5] Test psa_export_key with RSA 2048 keypair
[Check 6] Test psa_export_key with DES 64 bit key
[Check 7] Test psa_export_key with Triple DES 2-Key
[Check 8] Test psa_export_key with Triple DES 3-Key
[Check 9] Test psa_export_key with EC Public key
[Check 10] Test psa_export_key with EC keypair
[Check 11] Test psa_export_key with key policy verify
[Check 12] Test psa_export_key with less buffer size
TEST RESULT: PASSED
******************************************
TEST: 204 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_public_key
[Info] Executing tests from non-secure
[Check 1] Test psa_export_public_key 16 Byte AES
[Check 2] Test psa_export_public_key 24 Byte AES
[Check 3] Test psa_export_public_key 32 Byte AES
[Check 4] Test psa_export_public_key 2048 RSA public key
[Check 5] Test psa_export_public_key with RSA 2048 keypair
[Check 6] Test psa_export_public_key with DES 64 bit key
[Check 7] Test psa_export_public_key with Triple DES 2-Key
[Check 8] Test psa_export_public_key with Triple DES 3-Key
[Check 9] Test psa_export_public_key with EC Public key
[Check 10] Test psa_export_public_key with EC keypair
[Check 11] Test psa_export_public_key with less buffer size
TEST RESULT: PASSED
******************************************
TEST: 205 | DESCRIPTION: Testing crypto key management APIs | UT: psa_destroy_key
[Info] Executing tests from non-secure
[Check 1] Test psa_destroy_key 16 Byte AES
[Check 2] Test psa_destroy_key 24 Byte AES
[Check 3] Test psa_destroy_key 32 Byte AES
[Check 4] Test psa_destroy_key 2048 RSA public key
[Check 5] Test psa_destroy_key with RSA 2048 keypair
[Check 6] Test psa_destroy_key with DES 64 bit key
[Check 7] Test psa_destroy_key with Triple DES 2-Key
[Check 8] Test psa_destroy_key with Triple DES 3-Key
[Check 9] Test psa_destroy_key with EC Public key
[Check 10] Test psa_destroy_key with EC keypair
TEST RESULT: PASSED
******************************************
TEST: 206 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compute
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_compute with MD5 algorithm
[Check 2] Test psa_hash_compute with RIPEMD160 algorithm
[Check 3] Test psa_hash_compute with SHA1 algorithm
[Check 4] Test psa_hash_compute with SHA224 algorithm
[Check 5] Test psa_hash_compute with SHA256 algorithm
[Check 6] Test psa_hash_compute with SHA384 algorithm
[Check 7] Test psa_hash_compute with SHA512 algorithm
[Check 8] Test psa_hash_compute with small buffer size
[Check 9] Test psa_hash_compute with invalid algorithm
TEST RESULT: PASSED
******************************************
TEST: 207 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compare
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_compare with MD5 algorithm
[Check 2] Test psa_hash_compare with RIPEMD160 algorithm
[Check 3] Test psa_hash_compare with SHA1 algorithm
[Check 4] Test psa_hash_compare with SHA224 algorithm
[Check 5] Test psa_hash_compare with SHA256 algorithm
[Check 6] Test psa_hash_compare with SHA384 algorithm
[Check 7] Test psa_hash_compare with SHA512 algorithm
[Check 8] Test psa_hash_compare with incorrect hash
[Check 9] Test psa_hash_compare with incorrect hash length
[Check 10] Test psa_hash_compare with invalid algorithm
TEST RESULT: PASSED
******************************************
TEST: 208 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_setup - ECDH + HKDF-SHA-256
[Check 2] Test psa_key_derivation_setup - ECDH, unknown KDF
[Check 3] Test psa_key_derivation_setup - bad key derivation algorithm
[Check 4] Test psa_key_derivation_setup - Invalid Algorithm
TEST RESULT: PASSED
******************************************
TEST: 209 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_bytes
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_input_bytes - Step as Info
[Check 2] Test psa_key_derivation_input_bytes - Step as secret
[Check 3] Test psa_key_derivation_input_bytes - Step as salt
[Check 4] Test psa_key_derivation_input_bytes - Step as label
[Check 5] Test psa_key_derivation_input_bytes - Step as seed
[Check 6] Test psa_key_derivation_input_bytes - Invalid step
TEST RESULT: PASSED
******************************************
TEST: 210 | DESCRIPTION: Testing crypto key attributes APIs | UT: psa_key_attributes_set_get
[Info] Executing tests from non-secure
[Check 1] Test psa_key_attributes_set_get key attributes
TEST RESULT: PASSED
******************************************
TEST: 211 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_setup with MD5 algorithm
[Check 2] Test psa_hash_setup with RIPEMD160 algorithm
[Check 3] Test psa_hash_setup with SHA1 algorithm
[Check 4] Test psa_hash_setup with SHA224 algorithm
[Check 5] Test psa_hash_setup with SHA256 algorithm
[Check 6] Test psa_hash_setup with SHA384 algorithm
[Check 7] Test psa_hash_setup with SHA512 algorithm
[Check 8] Test psa_hash_setup with Invalid hash algorithm
[Check 9] Test psa_hash_setup with Invalid algorithm
[Check 10] Test psa_hash_setup with CTR algorithm
TEST RESULT: PASSED
******************************************
TEST: 212 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_update
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_update with MD5 algorithm
[Check 2] Test psa_hash_update with RIPEMD160 algorithm
[Check 3] Test psa_hash_update with SHA1 algorithm
[Check 4] Test psa_hash_update with SHA224 algorithm
[Check 5] Test psa_hash_update with SHA256 algorithm
[Check 6] Test psa_hash_update with SHA384 algorithm
[Check 7] Test psa_hash_update with SHA512 algorithm
[Check 8] Test psa_hash_update without hash setup
[Check 9] Test psa_hash_update with completed opertaion handle
TEST RESULT: PASSED
******************************************
TEST: 213 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_verify with MD5 algorithm
[Check 2] Test psa_hash_verify with RIPEMD160 algorithm
[Check 3] Test psa_hash_verify with SHA1 algorithm
[Check 4] Test psa_hash_verify with SHA224 algorithm
[Check 5] Test psa_hash_verify with SHA256 algorithm
[Check 6] Test psa_hash_verify with SHA384 algorithm
[Check 7] Test psa_hash_verify with SHA512 algorithm
[Check 8] Test psa_hash_verify with incorrect expected hash
[Check 9] Test psa_hash_verify with incorrect hash length
[Check 10] test psa_hash_verify with inactive & invalid operation handle
TEST RESULT: PASSED
******************************************
TEST: 214 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_finish with MD5 algorithm
[Check 2] Test psa_hash_finish with RIPEMD160 algorithm
[Check 3] Test psa_hash_finish with SHA1 algorithm
[Check 4] Test psa_hash_finish with SHA224 algorithm
[Check 5] Test psa_hash_finish with SHA256 algorithm
[Check 6] Test psa_hash_finish with SHA384 algorithm
[Check 7] Test psa_hash_finish with SHA512 algorithm
[Check 8] Test psa_hash_finish with invalid hash buffer size
[Check 9] test psa_hash_finish with inactive operation handle
TEST RESULT: PASSED
******************************************
TEST: 215 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_abort with MD5 algorithm
[Check 2] Test psa_hash_abort with RIPEMD160 algorithm
[Check 3] Test psa_hash_abort with SHA1 algorithm
[Check 4] Test psa_hash_abort with SHA224 algorithm
[Check 5] Test psa_hash_abort with SHA256 algorithm
[Check 6] Test psa_hash_abort with SHA384 algorithm
[Check 7] Test psa_hash_abort with SHA512 algorithm
[Check 8] Test psa_hash_finish after calling psa_hash_abort
TEST RESULT: PASSED
******************************************
TEST: 216 | DESCRIPTION: Testing crypto generator functions APIs | UT: psa_generate_key
[Info] Executing tests from non-secure
[Check 1] Test psa_generate_key 16 Byte AES
[Check 2] Test psa_generate_key 24 Byte AES
[Check 3] Test psa_generate_key 32 Byte AES
[Check 4] Test psa_generate_key with DES 64 bit key
[Check 5] Test psa_generate_key with Triple DES 2-Key
[Check 6] Test psa_generate_key with Triple DES 3-Key
[Check 7] Test psa_generate_key with RSA 2048 Keypair
[Check 8] Test psa_generate_key with ECC KeyPair
[Check 9] Test psa_generate_key with RSA 2048 Public key
[Check 10] Test psa_generate_key with invalid key type
[Check 11] Test psa_generate_key with invalid usage flags
TEST RESULT: PASSED
******************************************
TEST: 217 | DESCRIPTION: Testing crypto generation APIs | UT: psa_generate_random
[Info] Executing tests from non-secure
[Check 1] Test psa_generate_random to get 0 Byte data
[Check 2] Test psa_generate_random to get 16 Byte data
[Check 3] Test psa_generate_random to get 24 Byte data
[Check 4] Test psa_generate_random to get 32 Byte data
[Check 5] Test psa_generate_random to get 64 Byte data
[Check 6] Test psa_generate_random to get 128 Byte data
[Check 7] Test psa_generate_random to get 256 Byte data
[Check 8] Test psa_generate_random to get 512 Byte data
[Check 9] Test psa_generate_random to get 1000 Byte data
TEST RESULT: PASSED
******************************************
TEST: 218 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_key
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_input_key 16 Byte Key
[Check 2] Test psa_key_derivation_input_key with invalid usage
[Check 3] Test psa_key_derivation_input_key with step as label
[Check 4] Test psa_key_derivation_input_key with step as info
[Check 5] Test psa_key_derivation_input_key with step as seed
[Check 6] Test psa_key_derivation_input_key with step as salt
[Check 7] Test psa_key_derivation_input_key with key type as AES(not derive)
[Check 8] Test psa_key_derivation_input_key incorrect key algorithm
[Check 9] Test psa_key_derivation_input_key with key type as 2048 RSA public key
[Check 10] Test psa_key_derivation_input_key with key type as RSA 2048 keypair
[Check 11] Test psa_key_derivation_input_key with zero as step
[Check 12] Test psa_cipher_decrypt_setup - Invalid key handle
[Check 13] Test psa_cipher_decrypt_setup - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 219 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_key_agreement
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_key_agreement - ECDH SECP256R1
[Check 2] Test psa_key_derivation_key_agreement - Invalid step
[Check 3] Test psa_key_derivation_key_agreement - ECDH SECP384R1
[Check 4] Test psa_key_derivation_key_agreement - Invalid usage
[Check 5] Test psa_key_derivation_key_agreement - KDF not a key agreement alg
[Check 6] Test psa_key_derivation_key_agreement - Public key of different curve
[Check 7] Test psa_key_derivation_key_agreement - Pub key instead of Prv key
[Check 8] Test psa_key_derivation_key_agreement - Invalid handle
[Check 9] Test psa_key_derivation_key_agreement - Zero as handle
TEST RESULT: PASSED
******************************************
TEST: 220 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_bytes
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_output_bytes - HKDF
[Check 2] Test psa_key_derivation_output_bytes - optional salt
[Check 3] Test psa_key_derivation_output_bytes - capacity < output_length
[Check 4] Test psa_key_derivation_output_bytes - missing info
[Check 5] Test psa_key_derivation_output_bytes - missing salt/secret/info
[Check 6] Test psa_key_derivation_output_bytes - TLS12_PRF
[Check 7] Test psa_key_derivation_output_bytes - capacity < output_length
[Check 8] Test psa_key_derivation_output_bytes - missing seed/secret/label
TEST RESULT: PASSED
******************************************
TEST: 221 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_key
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_output_key - Key
[Check 2] Test psa_key_derivation_output_key - Info
[Check 3] Test psa_key_derivation_output_key - Salt
[Check 4] Test psa_key_derivation_output_key - Greater Capacity than available
[Check 5] Test psa_key_derivation_output_key - ECC Public key
[Check 6] Test psa_key_derivation_output_key - ECC keypair (wrong key length)
[Check 7] Test psa_key_derivation_output_key - RSA Public Key[Check 8] Test psa_key_derivation_output_key - RSA keypair
[Check 9] Test psa_key_derivation_output_key - Invalid key size
TEST RESULT: PASSED
******************************************
TEST: 222 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_abort
TEST RESULT: PASSED
******************************************
TEST: 223 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_set_get_capacity
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_set_get_capacity - < operation's capacity
[Check 2] Test psa_key_derivation_set_get_capacity - = operation's capacity
[Check 3] Test psa_key_derivation_set_get_capacity - > operation's capacity
[Check 4] Test psa_key_derivation_set_get_capacity - unchanged capacity
TEST RESULT: PASSED
******************************************
TEST: 224 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_encrypt - CCM - AES - 13B nonce & 8B add data
[Check 2] Test psa_aead_encrypt - CCM - AES - 13B nonce & 32B add data
[Check 3] Test psa_aead_encrypt - CCM - AES - 24 bytes Tag length = 4
[Check 4] Test psa_aead_encrypt - CCM - AES - Zero additional data
[Check 5] Test psa_aead_encrypt - CCM - AES - Zero plaintext
[Check 6] Test psa_aead_encrypt - GCM - AES - 12B nonce & 12B add data
[Check 7] Test psa_aead_encrypt - Unsupported algorithm
[Check 8] Test psa_aead_encrypt - Invalid usage flag
[Check 9] Test psa_aead_encrypt - Invalid ciphertext_size
[Check 10] Test psa_aead_encrypt - Invalid nonce
[Check 11] Test psa_aead_encrypt - Invalid tag length 0
TEST RESULT: PASSED
******************************************
TEST: 225 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_decrypt - CCM - AES - 13B nonce & 8B add data
[Check 2] Test psa_aead_decrypt - CCM - AES - 13B nonce & 32B add data
[Check 3] Test psa_aead_decrypt - CCM - AES - 24 bytes Tag length = 4
[Check 4] Test psa_aead_decrypt - CCM - AES - Zero additional data
[Check 5] Test psa_aead_decrypt - CCM - AES - Zero plaintext
[Check 6] Test psa_aead_decrypt - GCM - AES - 12B nonce & 12B add data
[Check 7] Test psa_aead_decrypt - Unsupported algorithm
[Check 8] Test psa_aead_decrypt - Invalid usage flag
[Check 9] Test psa_aead_decrypt - Invalid plaintext_size
[Check 10] Test psa_aead_decrypt - Invalid nonce
[Check 11] Test psa_aead_decrypt - Invalid cihpertext
[Check 12] Test psa_aead_decrypt - Invalid cihpertext_size
[Check 13] Test psa_aead_decrypt - Invalid tag length 0
TEST RESULT: PASSED
******************************************
TEST: 226 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_sign_setup - HMAC - SHA256
[Check 2] Test psa_mac_sign_setup - CMAC - AES
[Check 3] Test psa_mac_sign_setup - Incompatible HMAC for CMAC
[Check 4] Test psa_mac_sign_setup - Invalid usage flag
[Check 5] Test psa_mac_sign_setup - Invalid key type
[Check 6] Test psa_mac_sign_setup - Truncated MAC too large
[Check 7] Test psa_mac_sign_setup - Truncated MAC too small
[Check 8] Test psa_mac_sign_setup - Unknown MAC algorithm
[Check 9] Test psa_mac_sign_setup - Bad algorithm (not a MAC algorithm)
[Check 10] Test psa_mac_sign_setup invalid key handle
[Check 11] Test psa_mac_sign_setup zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 227 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_update
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_update - HMAC - SHA256 - 64 Byte
[Check 2] Test psa_mac_update - CMAC - AES - 16 Byte
[Check 3] Test psa_mac_update - HMAC - SHA512 - 32 Byte
[Check 4] Test psa_mac_update - HMAC - SHA512 - Invalid operation state
TEST RESULT: PASSED
******************************************
TEST: 228 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_sign_finish - HMAC - SHA224
[Check 2] Test psa_mac_sign_finish - HMAC - SHA256
[Check 3] Test psa_mac_sign_finish - HMAC - SHA512
[Check 4] Test psa_mac_sign_finish - HMAC - SHA224 - Truncated 8 Byte
[Check 5] Test psa_mac_sign_finish - HMAC - SHA224 - Small output buffer
[Check 6] Test psa_mac_sign_finish - HMAC - SHA224 - Invalid operation state
[Check 7] Test psa_mac_sign_finish - CMAC - AES
TEST RESULT: PASSED
******************************************
TEST: 229 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify_setup - HMAC - SHA256
[Check 2] Test psa_mac_verify_setup - CMAC - AES
[Check 3] Test psa_mac_verify_setup - Incompatible HMAC for CMAC
[Check 4] Test psa_mac_verify_setup - Invalid usage flag
[Check 5] Test psa_mac_verify_setup - Invalid key type
[Check 6] Test psa_mac_verify_setup - Truncated MAC too large
[Check 7] Test psa_mac_verify_setup - Truncated MAC too small
[Check 8] Test psa_mac_verify_setup - Unknown MAC algorithm
[Check 9] Test psa_mac_verify_setup - Bad algorithm (not a MAC algorithm)
[Check 10] Test psa_mac_verify_setup invalid key handle
[Check 11] Test psa_mac_verify_setup zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 230 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify_finish - HMAC - SHA224
[Check 2] Test psa_mac_verify_finish - HMAC - SHA256
[Check 3] Test psa_mac_verify_finish - HMAC - SHA512
[Check 4] Test psa_mac_verify_finish - HMAC - SHA224 - Truncated 8 Byte
[Check 5] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid mac length
[Check 6] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid expected mac
[Check 7] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid operation state
[Check 8] Test psa_mac_verify_finish - CMAC - AES
TEST RESULT: PASSED
******************************************
TEST: 231 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_abort - HMAC - SHA224
[Check 2] Test psa_mac_abort - HMAC - SHA224 - Truncated 8 Byte
[Check 3] Test psa_mac_abort - HMAC - SHA256
[Check 4] Test psa_mac_abort - HMAC - SHA512
[Check 5] Test psa_mac_abort - CMAC - AES
[Check 6] Test psa_mac_sign_finish after calling psa_mac_abort
TEST RESULT: PASSED
******************************************
TEST: 232 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_encrypt_setup 16 Byte AES
[Check 2] Test psa_cipher_encrypt_setup 24 Byte AES
[Check 3] Test psa_cipher_encrypt_setup 32 Byte AES
[Check 4] Test psa_cipher_encrypt_setup DES 64 bit key
[Check 5] Test psa_cipher_encrypt_setup Triple DES 2-Key
[Check 6] Test psa_cipher_encrypt_setup Triple DES 3-Key
[Check 7] Test psa_cipher_encrypt_setup 16 Byte raw data
[Check 8] Test psa_cipher_encrypt_setup - not a cipher algorithm
[Check 9] Test psa_cipher_encrypt_setup - unknown cipher algorithm
[Check 10] Test psa_cipher_encrypt_setup - incompatible key ARC4
[Check 11] Test psa_cipher_encrypt_setup - incorrect usage
[Check 12] Test psa_cipher_encrypt_setup - RSA public key
[Check 13] Test psa_cipher_encrypt_setup - RSA keypair
[Check 14] Test psa_cipher_encrypt_setup - EC Public key
[Check 15] Test psa_cipher_encrypt_setup - EC keypair
[Check 16] Test psa_cipher_encrypt_setup - Invalid key handle
[Check 17] Test psa_cipher_encrypt_setup - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 233 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_decrypt_setup 16 Byte AES
[Check 2] Test psa_cipher_decrypt_setup 24 Byte AES
[Check 3] Test psa_cipher_decrypt_setup 32 Byte AES
[Check 4] Test psa_cipher_decrypt_setup DES 64 bit key
[Check 5] Test psa_cipher_decrypt_setup Triple DES 2-Key
[Check 6] Test psa_cipher_decrypt_setup Triple DES 3-Key
[Check 7] Test psa_cipher_decrypt_setup 16 Byte raw data
[Check 8] Test psa_cipher_decrypt_setup - not a cipher algorithm
[Check 9] Test psa_cipher_decrypt_setup - unknown cipher algorithm
[Check 10] Test psa_cipher_decrypt_setup - incompatible key ARC4
[Check 11] Test psa_cipher_decrypt_setup - incorrect usage
[Check 12] Test psa_cipher_decrypt_setup - RSA public key
[Check 13] Test psa_cipher_decrypt_setup - RSA keypair
[Check 14] Test psa_cipher_decrypt_setup - EC Public key
[Check 15] Test psa_cipher_decrypt_setup - EC keypair
[Check 16] Test psa_cipher_decrypt_setup - Invalid key handle
[Check 17] Test psa_cipher_decrypt_setup - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 234 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_generate_iv
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_generate_iv 16 Byte AES
[Check 2] Test psa_cipher_generate_iv 24 Byte AES
[Check 3] Test psa_cipher_generate_iv 32 Byte AES
[Check 4] Test psa_cipher_generate_iv DES 64 bit key
[Check 5] Test psa_cipher_generate_iv DES 2-Key
[Check 6] Test psa_cipher_generate_iv DES 3-Key
[Check 7] Test psa_cipher_generate_iv AES - small iv buffer
[Check 8] Test psa_cipher_generate_iv DES - small iv buffer
TEST RESULT: PASSED
******************************************
TEST: 235 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_set_iv
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_set_iv 16 Byte AES
[Check 2] Test psa_cipher_set_iv 24 Byte AES
[Check 3] Test psa_cipher_set_iv 32 Byte AES
[Check 4] Test psa_cipher_set_iv DES 64 bit key
[Check 5] Test psa_cipher_set_iv DES 2-Key
[Check 6] Test psa_cipher_set_iv DES 3-Key
[Check 7] Test psa_cipher_set_iv AES - small iv buffer
[Check 8] Test psa_cipher_set_iv DES - small iv buffer
[Check 9] Test psa_cipher_set_iv AES - large iv buffer
[Check 10] Test psa_cipher_set_iv DES - large iv buffer
TEST RESULT: PASSED
******************************************
TEST: 236 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_update
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING (Short in)
[Check 3] Test psa_cipher_update - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_update - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_update - Encrypt - AES CTR
[Check 6] Test psa_cipher_update - Encrypt - DES CBC (nopad)
[Check 7] Test psa_cipher_update - Encrypt - 2-key 3DE -CBC (nopad)
[Check 8] Test psa_cipher_update - Encrypt - 3-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_update - Encrypt - small output buffer size
[Check 10] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING
[Check 11] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING (Short in)
[Check 12] Test psa_cipher_update - Decrypt - AES CBC_PKCS7
[Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7 (Short input)
[Check 14] Test psa_cipher_update - Decrypt - AES CTR
[Check 15] Test psa_cipher_update - Decrypt - DES CBC (nopad)
[Check 16] Test psa_cipher_update - Decrypt - 2-key 3DE -CBC (nopad)
[Check 17] Test psa_cipher_update - Decrypt - 3-key 3DE -CBC (nopad)
[Check 18] Test psa_cipher_update - Decrypt - small output buffer size
[Check 19] Test psa_cipher_update without cipher setup
TEST RESULT: PASSED
******************************************
TEST: 237 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING (Short in)
[Check 3] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_finish - Encrypt - AES CTR
[Check 6] Test psa_cipher_finish - Encrypt - AES CTR (short input)
[Check 7] Test psa_cipher_finish - Encrypt - DES CBC (nopad)
[Check 8] Test psa_cipher_finish - Encrypt - 2-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_finish - Encrypt - 3-key 3DE -CBC (nopad)
[Check 10] Test psa_cipher_finish - Encrypt - small output buffer size
[Check 11] Test psa_cipher_finish - Decrypt - AES CBC_NO_PADDING
[Check 12] Test psa_cipher_finish - Decrypt - AES CBC_NO_PADDING (Short in)
[Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7
[Check 14] Test psa_cipher_finish - Decrypt - AES CBC_PKCS7 (Short input)
[Check 15] Test psa_cipher_finish - Decrypt - AES CTR
[Check 16] Test psa_cipher_finish - Decrypt - AES CTR (short input)
[Check 17] Test psa_cipher_finish - Decrypt - DES CBC (nopad)
[Check 18] Test psa_cipher_finish - Decrypt - 2-key 3DE -CBC (nopad)
[Check 19] Test psa_cipher_finish - Decrypt - 3-key 3DE -CBC (nopad)
TEST RESULT: PASSED
******************************************
TEST: 238 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_abort - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_abort - Encrypt - AES CBC_PKCS7
[Check 3] Test psa_cipher_abort - Encrypt - AES CTR
[Check 4] Test psa_cipher_abort - Encrypt - DES CBC (nopad)
[Check 5] Test psa_cipher_abort - Encrypt - 2-key 3DE -CBC (nopad)
[Check 6] Test psa_cipher_abort - Encrypt - 3-key 3DE -CBC (nopad)
[Check 7] Test psa_cipher_abort - Decrypt - AES CBC_NO_PADDING
[Check 8] Test psa_cipher_abort - Decrypt - AES CBC_PKCS7
[Check 9] Test psa_cipher_abort - Decrypt - AES CTR
[Check 10] Test psa_cipher_abort - Decrypt - DES CBC (nopad)
[Check 11] Test psa_cipher_abort - Decrypt - 2-key 3DE -CBC (nopad)
[Check 12] Test psa_cipher_abort - Decrypt - 3-key 3DE -CBC (nopad)
[Check 13] Test psa_cipher_update after psa_cipher_abort should fail
TEST RESULT: PASSED
******************************************
TEST: 239 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_asymmetric_encrypt - RSA PKCS1V15
[Check 2] Test psa_asymmetric_encrypt - RSA KEY_PAIR PKCS1V15
[Check 3] Test psa_asymmetric_encrypt - RSA OAEP SHA256
[Check 4] Test psa_asymmetric_encrypt - RSA OAEP SHA256 with label
[Check 5] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256
[Check 6] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256 with label
[Check 7] Test psa_asymmetric_encrypt - Small output buffer
[Check 8] Test psa_asymmetric_encrypt - Invalid algorithm
[Check 9] Test psa_asymmetric_encrypt - Invalid key type
[Check 10] Test psa_asymmetric_encrypt - Invalid usage
[Check 11] Test psa_asymmetric_encrypt - RSA PKCS1V15 - Salt
[Check 12] Test psa_asymmetric_encrypt - ECC public key
[Check 13] Test psa_asymmetric_encrypt - Invalid key handle
[Check 14] Test psa_asymmetric_encrypt - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 240 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_asymmetric_decrypt - RSA KEY_PAIR PKCS1V15
[Check 2] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256
[Check 3] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256 with label
[Check 4] Test psa_asymmetric_decrypt - Invalid key type (RSA public key)
[Check 5] Test psa_asymmetric_decrypt - Small output buffer
[Check 6] Test psa_asymmetric_decrypt - Invalid algorithm
[Check 7] Test psa_asymmetric_decrypt - Invalid key type (AES Key)
[Check 8] Test psa_asymmetric_decrypt - Invalid usage
[Check 9] Test psa_asymmetric_decrypt - RSA PKCS1V15 - Salt
[Check 10] Test psa_asymmetric_decrypt - Invalid key handle
[Check 11] Test psa_asymmetric_decrypt - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 241 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_sign_hash
[Info] Executing tests from non-secure
[Check 1] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 3] Test psa_sign_hash - ECDSA SECP256R1 SHA-256
[Check 4] Test psa_sign_hash - Invalid key type (RSA public key)
[Check 5] Test psa_sign_hash - Small output buffer
[Check 6] Test psa_sign_hash - Invalid algorithm
[Check 7] Test psa_sign_hash - Invalid key type (AES Key)
[Check 8] Test psa_sign_hash - Invalid usage
[Check 9] Test psa_sign_hash - Wrong hash size
[Check 10] Test psa_sign_hash - Invalid key handle
[Check 11] Test psa_sign_hash - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 242 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_verify_hash
[Info] Executing tests from non-secure
[Check 1] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 3] Test psa_verify_hash - ECDSA KEY_PAIR SECP256R1 SHA-256
[Check 4] Test psa_verify_hash - EC public key
[Check 5] Test psa_verify_hash - RSA public key
[Check 6] Test psa_verify_hash - Small output buffer
[Check 7] Test psa_verify_hash - Invalid algorithm
[Check 8] Test psa_verify_hash - Invalid key type (AES Key)
[Check 9] Test psa_verify_hash - Invalid usage
[Check 10] Test psa_verify_hash - Wrong hash size
[Check 11] Test psa_verify_hash - Wrong signature
[Check 12] Test psa_verify_hash - Wrong signature size
[Check 13] Test psa_verify_hash - Invalid key handle
[Check 14] Test psa_verify_hash - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 243 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_raw_key_agreement
[Info] Executing tests from non-secure
[Check 1] Test psa_raw_key_agreement - ECDH SECP256R1
[Check 2] Test psa_raw_key_agreement - Small buffer size
[Check 3] Test psa_raw_key_agreement - ECDH SECP384R1
[Check 4] Test psa_raw_key_agreement - Invalid usage
[Check 5] Test psa_raw_key_agreement - Unknown KDF
[Check 6] Test psa_raw_key_agreement - Not a key agreement alg
[Check 7] Test psa_raw_key_agreement - Public key on different curve
[Check 8] Test psa_raw_key_agreement - Public key instead of private key
[Check 9] Test psa_raw_key_agreement - Invalid key handle
[Check 10] Test psa_raw_key_agreement - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 244 | DESCRIPTION: Testing crypto key management APIs | UT: psa_copy_key
[Info] Executing tests from non-secure
[Check 1] Test psa_copy_key - 2048 RSA public key
[Check 2] Test psa_copy_key - RSA 2048 keypair
[Check 3] Test psa_copy_key - Incompatible target policy(source and target)
[Check 4] Test psa_copy_key - source key with no export usage
[Check 5] Test psa_copy_key - DES 64 bit key
[Check 6] Test psa_copy_key - Triple DES 2-Key
[Check 7] Test psa_copy_key - Triple DES 3-Key
[Check 8] Test psa_copy_key - EC Public key
[Check 9] Test psa_copy_key - EC keypair
TEST RESULT: PASSED
******************************************
TEST: 245 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_clone
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_clone - MD5 algorithm
[Check 2] Test psa_hash_clone - RIPEMD160 algorithm
[Check 3] Test psa_hash_clone - SHA1 algorithm
[Check 4] Test psa_hash_clone - SHA224 algorithm
[Check 5] Test psa_hash_clone - SHA256 algorithm
[Check 6] Test psa_hash_clone - SHA384 algorithm
[Check 7] Test psa_hash_clone - SHA512 algorithm
[Check 8] Test psa_hash_clone - from an inactive source operation
[Check 9] Test psa_hash_clone - on an active target operation
TEST RESULT: PASSED
******************************************
TEST: 246 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_compute
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_compute HMAC SHA 224
[Check 2] Test psa_mac_compute - Incompactible HMAC for CMAC
[Check 3] Test psa_mac_compute - Invalid usage
[Check 4] Test psa_mac_compute - truncated MAC too small
[Check 5] Test psa_mac_compute - truncated MAC too large
[Check 6] Test psa_mac_compute - bad algorithm (unknown MAC algorithm)
[Check 7] Test psa_mac_compute HMAC SHA 256
[Check 8] Test psa_mac_compute HMAC SHA 512
[Check 9] Test psa_mac_compute HMAC SHA 224 (truncated to 8 Byte)
[Check 10] Test psa_mac_compute CMAC AES 128
[Check 11] Test psa_mac_compute small size buffer
[Check 12] Test psa_mac_compute - Invalid key type
TEST RESULT: PASSED
******************************************
TEST: 247 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify HMAC SHA 224
[Check 2] Test psa_mac_verify HMAC SHA 256
[Check 3] Test psa_mac_verify - Incompactible HMAC for CMAC
[Check 4] Test psa_mac_verify - Invalid usage
[Check 5] Test psa_mac_verify - Truncated MAC too large
[Check 6] Test psa_mac_verify - Truncated MAC too small
[Check 7] Test psa_mac_verify - bad algorithm (unknown MAC algorithm)
[Check 8] Test psa_mac_verify HMAC SHA 512
[Check 9] Test psa_mac_verify HMAC SHA 224 (truncated to 8 Byte)
[Check 10] Test psa_mac_verify CMAC AES 128
[Check 11] Test psa_mac_verify - Invalid key type
[Check 12] Test psa_mac_verify small size buffer
[Check 13] Test psa_mac_verify incorrect expected MAC
TEST RESULT: PASSED
******************************************
TEST: 248 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING (Short input)
[Check 3] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_encrypt - Encrypt - AES CTR
[Check 6] Test psa_cipher_encrypt - Encrypt - AES CTR (short input)
[Check 7] Test psa_cipher_encrypt - Encrypt - DES CBC (nopad)
[Check 8] Test psa_cipher_encrypt - Encrypt - 2-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_encrypt - Encrypt - 3-key 3DE -CBC (nopad)
[Check 10] Test psa_cipher_encrypt - small output buffer size
[Check 11] Test psa_cipher_encrypt - Decrypt - AES CBC_NO_PADDING
TEST RESULT: PASSED
******************************************
TEST: 249 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_decrypt - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING
[Check 3] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING (Short input)
[Check 4] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING
[Check 5] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7
[Check 6] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7 (Short input)
[Check 7] Test psa_cipher_decrypt - Decrypt - AES CTR
[Check 8] Test psa_cipher_decrypt - Decrypt - DES CBC (nopad)
[Check 9] Test psa_cipher_decrypt - Decrypt - 2-key 3DE -CBC (nopad)
[Check 10] Test psa_cipher_decrypt - 3-key 3DE -CBC (nopad)
TEST RESULT: PASSED
******************************************
TEST: 250 | DESCRIPTION: Testing crypto key management APIs | UT: psa_sign_message
[Info] Executing tests from non-secure
[Check 1] Test psa_sign_message - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_sign_message - ECDSA SECP256R1 SHA-256
[Check 3] Test psa_sign_message - Invalid key type (RSA public key)
[Check 4] Test psa_sign_message - Small output buffer
[Check 5] Test psa_sign_message - Invalid algorithm
[Check 6] Test psa_sign_message - Invalid key type (AES Key)
[Check 7] Test psa_sign_message - Invalid usage
[Check 8] Test psa_sign_message - Mismatch key type and Algorithm
[Check 9] Test psa_sign_message - Alg mismatch in key and API call
[Check 10] Test psa_sign_message - Invalid key handle
[Check 11] Test psa_sign_message - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 251 | DESCRIPTION: Testing crypto key management APIs | UT: psa_verify_message
[Info] Executing tests from non-secure
[Check 1] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_verify_message - RSA Public Key PKCS1V15 RAW
[Check 3] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 4] Test psa_verify_message - ECDSA KEY_PAIR SECP256R1 SHA-256
[Check 5] Test psa_verify_message - ECDSA Public Key SECP256R1 SHA-256
[Check 6] Test psa_verify_message - Small output buffer
[Check 7] Test psa_verify_message - Invalid algorithm
[Check 8] Test psa_verify_message - Invalid key type (AES Key)
[Check 9] Test psa_verify_message - Invalid usage
[Check 10] Test psa_verify_message - Wrong message size
[Check 11] Test psa_verify_message - Wrong signature
[Check 12] Test psa_verify_message - Wrong signature size
[Check 13] Test psa_verify_message - Invalid key handle
[Check 14] Test psa_verify_message - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 252 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_encrypt_setup - CCM - AES
[Check 2] Test psa_aead_encrypt_setup - CCM - AES - Tag length = 4
[Check 3] Test psa_aead_encrypt_setup - CCM - AES - Mismatched tag length
[Check 4] Test psa_aead_encrypt_setup - CCM - AES - Default Tag length
[Check 5] Test psa_aead_encrypt_setup - GCM - AES
[Check 6] Test psa_aead_encrypt_setup - CCM - DES Invalid key
[Check 7] Test psa_aead_encrypt_setup - Invalid usage flag
TEST RESULT: PASSED
******************************************
TEST: 253 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_decrypt_setup - CCM - AES
[Check 2] Test psa_aead_decrypt_setup - CCM - AES - Tag length = 4
[Check 3] Test psa_aead_decrypt_setup - CCM - AES - Mismatched tag length
[Check 4] Test psa_aead_decrypt_setup - CCM - AES - Default Tag length
[Check 5] Test psa_aead_decrypt_setup - GCM - AES
[Check 6] Test psa_aead_decrypt_setup - CCM - DES Invalid key
[Check 7] Test psa_aead_decrypt_setup - Invalid usage flag
TEST RESULT: PASSED
******************************************
TEST: 254 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_generate_nonce
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_generate_nonce - CCM
[Check 2] Test psa_aead_generate_nonce - CCM - Tag length = 4
[Check 3] Test psa_aead_generate_nonce - CCM - Small buffer size
[Check 4] Test psa_aead_generate_nonce - CCM - Uninitialized operation
[Check 5] Test psa_aead_generate_nonce - CCM - Decrypt operation
[Check 6] Test psa_aead_generate_nonce - GCM
[Check 7] Test psa_aead_generate_nonce - GCM - Decrypt operation
TEST RESULT: PASSED
******************************************
TEST: 255 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_nonce
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_set_nonce - Encrypt - CCM
[Check 2] Test psa_aead_set_nonce - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_set_nonce - Encrypt - CCM - Small nonce size
[Check 4] Test psa_aead_set_nonce - Encrypt - CCM - Large nonce size
[Check 5] Test psa_aead_set_nonce - Encrypt - CCM - Invalid operation state
[Check 6] Test psa_aead_set_nonce - Encrypt - GCM
[Check 7] Test psa_aead_set_nonce - Decrypt - CCM
[Check 8] Test psa_aead_set_nonce - Decrypt - CCM - Tag length = 4
[Check 9] Test psa_aead_set_nonce - Decrypt - CCM - Small nonce size
[Check 10] Test psa_aead_set_nonce - Decrypt - CCM - Large nonce size
[Check 11] Test psa_aead_set_nonce - Decrypt - CCM - Invalid operation state
[Check 12] Test psa_aead_set_nonce - Decrypt - GCM
TEST RESULT: PASSED
******************************************
TEST: 256 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_lengths
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_set_lengths - Encrypt - CCM
[Check 2] Test psa_aead_set_lengths - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_set_lengths - Encrypt - CCM - Zero ad_length
[Check 4] Test psa_aead_set_lengths - Encrypt - CCM - Zero plaintext_length
[Check 5] Test psa_aead_set_lengths - Encrypt - CCM - Invalid operation state
[Check 6] Test psa_aead_set_lengths - Encrypt - GCM
[Check 7] Test psa_aead_set_lengths - Decrypt - CCM
[Check 8] Test psa_aead_set_lengths - Decrypt - CCM - Tag length = 4
[Check 9] Test psa_aead_set_lengths - Decrypt - CCM - Zero ad_length
[Check 10] Test psa_aead_set_lengths - Decrypt - CCM - Zero plaintext_length
[Check 11] Test psa_aead_set_lengths - Decrypt - CCM - Invalid operation state
[Check 12] Test psa_aead_set_lengths - Decrypt - GCM
TEST RESULT: PASSED
******************************************
TEST: 257 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update_ad
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_update_ad - Encrypt - CCM
[Check 2] Test psa_aead_update_ad - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_update_ad - Encrypt - CCM - Zero ad_length
[Check 4] Test psa_aead_update_ad - Encrypt - CCM - Zero plaintext_length
[Check 5] Test psa_aead_update_ad - Encrypt - CCM - Invalid operation state
[Check 6] Test psa_aead_update_ad - Encrypt - CCM - Overflow input length
[Check 7] Test psa_aead_update_ad - Decrypt - CCM
[Check 8] Test psa_aead_update_ad - Decrypt - CCM - Tag length = 4
[Check 9] Test psa_aead_update_ad - Decrypt - CCM - Zero ad_length
[Check 10] Test psa_aead_update_ad - Decrypt - CCM - Zero plaintext_length
[Check 11] Test psa_aead_update_ad - Decrypt - CCM - Invalid operation state
[Check 12] Test psa_aead_update_ad - Decrypt - CCM - Overflow input length
TEST RESULT: PASSED
******************************************
TEST: 258 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_update - Encrypt - CCM
[Check 2] Test psa_aead_update - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_update - Encrypt - CCM - Zero ad_length
[Check 4] Test psa_aead_update - Encrypt - CCM - Zero plaintext_length
[Check 5] Test psa_aead_update - Encrypt - CCM - Small buffer size
[Check 6] Test psa_aead_update - Encrypt - CCM - Less add data than specified
[Check 7] Test psa_aead_update - Encrypt - CCM - Overflow input length
[Check 8] Test psa_aead_update - Encrypt - CCM - Invalid operation state
[Check 9] Test psa_aead_update - Decrypt - CCM
[Check 10] Test psa_aead_update - Decrypt - CCM - Tag length = 4
[Check 11] Test psa_aead_update - Decrypt - CCM - Zero ad_length
[Check 12] Test psa_aead_update - Decrypt - CCM - Zero plaintext_length
[Check 13] Test psa_aead_update - Decrypt - CCM - Small buffer size
[Check 14] Test psa_aead_update - Decrypt - Less add data than specified
[Check 15] Test psa_aead_update - Decrypt - CCM - Overflow input length
[Check 16] Test psa_aead_update - Decrypt - CCM - Invalid operation state
TEST RESULT: PASSED
******************************************
TEST: 259 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_finish - AES-CCM
[Check 2] Test psa_aead_finish - AES-CCM 24 bytes Tag length = 4
[Check 3] Test psa_aead_finish - Small buffer size
[Check 4] Test psa_aead_finish - Input length is less than plaintext length
[Check 5] Test psa_aead_finish - GCM - 16B AES - 12B Nonce & 12B additional data
TEST RESULT: PASSED
******************************************
TEST: 260 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_abort - Encrypt - CCM - AES
[Check 2] Test psa_aead_abort - Encrypt - GCM - AES
[Check 3] Test psa_aead_abort - Decrypt - CCM - AES
[Check 4] Test psa_aead_abort - Decrypt - GCM - AES
[Check 5] Test psa_aead_abort with all initializations
TEST RESULT: PASSED
******************************************
TEST: 261 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_verify - AES-CCM
[Check 2] Test psa_aead_verify - AES-CCM 24 bytes Tag length = 4
[Check 3] Test psa_aead_verify - Small buffer size
[Check 4] Test psa_aead_verify - Input length is less than plaintext length
[Check 5] Test psa_aead_verify - GCM - 16B AES - 12B Nounce & 12B addi data
TEST RESULT: PASSED
******************************************
************ Crypto Suite Report **********
TOTAL TESTS : 61
TOTAL PASSED : 61
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
Entering standby..
```
```
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-iat-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Attestation Suite
******************************************
TEST: 601 | DESCRIPTION: Testing attestation initial attestation APIs | UT: psa_initial_attestation
[Info] Executing tests from non-secure
[Check 1] Test psa_initial_attestation_get_token with Challenge 32
[Check 2] Test psa_initial_attestation_get_token with Challenge 48
[Check 3] Test psa_initial_attestation_get_token with Challenge 64
[Check 4] Test psa_initial_attestation_get_token with zero challenge size
[Check 5] Test psa_initial_attestation_get_token with small challenge size
[Check 6] Test psa_initial_attestation_get_token with invalid challenge size
[Check 7] Test psa_initial_attestation_get_token with large challenge size
[Check 8] Test psa_initial_attestation_get_token with zero as token size
[Check 9] Test psa_initial_attestation_get_token with small token size
[Check 10] Test psa_initial_attestation_get_token_size with Challenge 32
[Check 11] Test psa_initial_attestation_get_token_size with Challenge 48
[Check 12] Test psa_initial_attestation_get_token_size with Challenge 64
[Check 13] Test psa_initial_attestation_get_token_size with zero challenge size
[Check 14] Test psa_initial_attestation_get_token_size with small challenge size
[Check 15] Test psa_initial_attestation_get_token_size with invalid challenge size
[Check 16] Test psa_initial_attestation_get_token_size with large challenge size
TEST RESULT: PASSED
******************************************
************ Attestation Suite Report **********
TOTAL TESTS : 1
TOTAL PASSED : 1
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
Entering standby..
```
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-its-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Storage Suite
******************************************
TEST: 401 | DESCRIPTION: UID not found check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call get API for UID 6 which is not set
[Check 2] Call get_info API for UID 6 which is not set
[Check 3] Call remove API for UID 6 which is not set
[Check 4] Call get API for UID 6 which is removed
[Check 5] Call get_info API for UID 6 which is removed
[Check 6] Call remove API for UID 6 which is removed
Set storage for UID 6
[Check 7] Call get API for different UID 5
[Check 8] Call get_info API for different UID 5
[Check 9] Call remove API for different UID 5
TEST RESULT: PASSED
******************************************
TEST: 402 | DESCRIPTION: Write once error check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Update the flag of UID 1 with WRITE_ONCE flag
[Check 2] Try to remove the UID 1 having WRITE_ONCE flag
[Check 3] Create a new UID 2 with WRITE_ONCE flag
[Check 4] Try to remove the UID 2 having WRITE_ONCE flag
[Check 5] Try to change the length of write_once UID 2
[Check 6] Check UID removal still fails
[Check 7] Try to change the WRITE_ONCE flag to None for UID 2
[Check 8] Check UID removal still fails
TEST RESULT: PASSED
******************************************
TEST: 403 | DESCRIPTION: Insufficient space check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Overload storage space
UID 13 set failed due to insufficient space
Remove all registered UIDs
[Check 2] Overload storage again to verify all previous UID removed
UID 13 set failed due to insufficient space
Remove all registered UIDs
TEST RESULT: PASSED
******************************************
TEST: 404 | DESCRIPTION: Data Consistency check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2
[Check 2] Call get API with default length - TEST_BUFF_SIZE
TEST RESULT: PASSED
******************************************
TEST: 405 | DESCRIPTION: Success scenarios check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Set UID with data length zero and call storage APIs
[Check 2] Resetting the length check
TEST RESULT: PASSED
******************************************
TEST: 406 | DESCRIPTION: Check for storage create flags | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE
[Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY
[Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION
TEST RESULT: PASSED
******************************************
TEST: 407 | DESCRIPTION: Incorrect Size check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
Create a valid Storage - TEST_BUFF_SIZE/2
Increase the length of storage - TEST_BUFF_SIZE
[Check 1] Call get API with old length - TEST_BUFF_SIZE/2
[Check 2] Call get API with old length - TEST_BUFF_SIZE/4
Decrease the length of storage - TEST_BUFF_SIZE/4
[Check 3] Call get API with old length - TEST_BUFF_SIZE/2
[Check 4] Call get API with old length - TEST_BUFF_SIZE
[Check 5] Call get API with valid length - TEST_BUFF_SIZE/4
TEST RESULT: PASSED
******************************************
TEST: 408 | DESCRIPTION: Invalid offset check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Try to access data with varying valid offset
[Check 2] Try to access data with varying invalid offset
TEST RESULT: PASSED
******************************************
TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call set API with NULL pointer and data length 0
[Check 2] Call get API with NULL read buffer and data length 0
[Check 3] Remove the UID
[Check 4] Call get_info API to verify UID removed
[Check 5] Create UID with zero data_len and valid write buffer
[Check 8] Call get API with NULL read buffer and data length 0
[Check 9] Increase the length
TEST RESULT: PASSED
******************************************
TEST: 410 | DESCRIPTION: UID value zero check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Creating storage with UID 0 should fail
[Check 2] Get_info for UID 0 should fail
[Check 3] Removing storage with UID 0 should fail
TEST RESULT: PASSED
******************************************
************ Storage Suite Report **********
TOTAL TESTS : 10
TOTAL PASSED : 10
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
Entering standby..
```
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-ps-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Storage Suite
******************************************
TEST: 401 | DESCRIPTION: UID not found check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call get API for UID 6 which is not set
[Check 2] Call get_info API for UID 6 which is not set
[Check 3] Call remove API for UID 6 which is not set
[Check 4] Call get API for UID 6 which is removed
[Check 5] Call get_info API for UID 6 which is removed
[Check 6] Call remove API for UID 6 which is removed
Set storage for UID 6
[Check 7] Call get API for different UID 5
[Check 8] Call get_info API for different UID 5
[Check 9] Call remove API for different UID 5
TEST RESULT: PASSED
******************************************
TEST: 402 | DESCRIPTION: Write once error check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Update the flag of UID 1 with WRITE_ONCE flag
[Check 2] Try to remove the UID 1 having WRITE_ONCE flag
[Check 3] Create a new UID 2 with WRITE_ONCE flag
[Check 4] Try to remove the UID 2 having WRITE_ONCE flag
[Check 5] Try to change the length of write_once UID 2
[Check 6] Check UID removal still fails
[Check 7] Try to change the WRITE_ONCE flag to None for UID 2
[Check 8] Check UID removal still fails
TEST RESULT: PASSED
******************************************
TEST: 403 | DESCRIPTION: Insufficient space check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Overload storage space
UID 13 set failed due to insufficient space
Remove all registered UIDs
[Check 2] Overload storage again to verify all previous UID removed
UID 13 set failed due to insufficient space
Remove all registered UIDs
TEST RESULT: PASSED
******************************************
TEST: 404 | DESCRIPTION: Data Consistency check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2
[ 34.396662] random: crng init done
[Check 2] Call get API with default length - TEST_BUFF_SIZE
TEST RESULT: PASSED
******************************************
TEST: 405 | DESCRIPTION: Success scenarios check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Set UID with data length zero and call storage APIs
[Check 2] Resetting the length check
TEST RESULT: PASSED
******************************************
TEST: 406 | DESCRIPTION: Check for storage create flags | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE
[Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY
[Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION
TEST RESULT: PASSED
******************************************
TEST: 407 | DESCRIPTION: Incorrect Size check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Create a valid Storage - TEST_BUFF_SIZE/2
Increase the length of storage - TEST_BUFF_SIZE
[Check 1] Call get API with old length - TEST_BUFF_SIZE/2
[Check 2] Call get API with old length - TEST_BUFF_SIZE/4
Decrease the length of storage - TEST_BUFF_SIZE/4
[Check 3] Call get API with old length - TEST_BUFF_SIZE/2
[Check 4] Call get API with old length - TEST_BUFF_SIZE
[Check 5] Call get API with valid length - TEST_BUFF_SIZE/4
TEST RESULT: PASSED
******************************************
TEST: 408 | DESCRIPTION: Invalid offset check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Try to access data with varying valid offset
[Check 2] Try to access data with varying invalid offset
TEST RESULT: PASSED
******************************************
TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call set API with NULL pointer and data length 0
[Check 2] Call get API with NULL read buffer and data length 0
[Check 3] Remove the UID
[Check 4] Call get_info API to verify UID removed
[Check 5] Create UID with zero data_len and valid write buffer
[Check 8] Call get API with NULL read buffer and data length 0
[Check 9] Increase the length
TEST RESULT: PASSED
******************************************
TEST: 410 | DESCRIPTION: UID value zero check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Creating storage with UID 0 should fail
[Check 2] Get_info for UID 0 should fail
[Check 3] Removing storage with UID 0 should fail
TEST RESULT: PASSED
******************************************
TEST: 411 | DESCRIPTION: Optional APIs: UID not found check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 412 | DESCRIPTION: Optional APIs: Invalid arguments and offset invalid | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 413 | DESCRIPTION: Set_Extended and Create api : Success | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 414 | DESCRIPTION: Optional APIs not supported check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Optional PS APIs are not supported.
[Check 1] Call to create API should fail as API not supported
Failed at Checkpoint: 1
Actual: 0
Expected: -134
TEST RESULT: FAILED (Error Code=0x1)
******************************************
TEST: 415 | DESCRIPTION: Create API write_once flag value check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 416 | DESCRIPTION: Storage assest capacity modification check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs not are supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 417 | DESCRIPTION: Storage assest capacity modification check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs not are supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
************ Storage Suite Report **********
TOTAL TESTS : 17
TOTAL PASSED : 10
TOTAL SIM ERROR : 0
TOTAL FAILED : 1
TOTAL SKIPPED : 6
******************************************
Entering standby..
```
**Component test**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/component-test -v
TEST(BlockVolumeTests, oversizeWrite) - 33881 ms
TEST(BlockVolumeTests, multipleImageInstall) - 680 ms
TEST(BlockVolumeTests, seekAccess) - 223 ms
TEST(BlockVolumeTests, readAndWrite) - 521 ms
TEST(BlockVolumeTests, openClose) - 108 ms
IGNORE_TEST(PartitionTableTests, detectCorruptedGptHeader) - 0 ms
TEST(PartitionTableTests, detectCorruptedMbr) - 26523 ms
TEST(PartitionTableTests, loadRefPartitionTable) - 21382 ms
TEST(GptIteratorTests, iterateOverRefGpt) - 22587 ms
TEST(UefiVariableStoreTests, noRemoveCheck) - 2044 ms
TEST(UefiVariableStoreTests, readOnlycheck) - 585 ms
TEST(UefiVariableStoreTests, unsupportedAttribute) - 326 ms
TEST(UefiVariableStoreTests, failedNvSet) - 818 ms
TEST(UefiVariableStoreTests, enumerateStoreContents) - 1020 ms
TEST(UefiVariableStoreTests, runtimeAccess) - 784 ms
TEST(UefiVariableStoreTests, bootServiceAccess) - 607 ms
TEST(UefiVariableStoreTests, removePersistent) - 849 ms
TEST(UefiVariableStoreTests, removeVolatile) - 694 ms
TEST(UefiVariableStoreTests, getWithSmallBuffer) - 700 ms
TEST(UefiVariableStoreTests, persistentSetGet) - 1042 ms
TEST(UefiVariableStoreTests, setGetRoundtrip) - 647 ms
TEST(UefiVariableIndexTests, setCheckConstraintsNonExistingVar) - 283 ms
TEST(UefiVariableIndexTests, setCheckConstraintsExistingVar) - 503 ms
TEST(UefiVariableIndexTests, checkIterator) - 516 ms
TEST(UefiVariableIndexTests, removeVariable) - 298 ms
TEST(UefiVariableIndexTests, dumpBufferTooSmall) - 259 ms
TEST(UefiVariableIndexTests, dumpLoadRoadtrip) - 521 ms
TEST(UefiVariableIndexTests, enumerateStore) - 249 ms
TEST(UefiVariableIndexTests, variableIndexFull) - 252 ms
TEST(UefiVariableIndexTests, addWithOversizedName) - 562 ms
TEST(UefiVariableIndexTests, emptyIndexOperations) - 260 ms
TEST(SfsBlockStoreTests, psCreateAndSetExtended) - 2219 ms
TEST(SfsBlockStoreTests, psCreateAndSet) - 2140 ms
TEST(SfsBlockStoreTests, itsStorageLimitTest) - 1673 ms
TEST(SfsBlockStoreTests, itsStoreNewItem) - 1581 ms
TEST(SfsRamTests, psCreateAndSetExtended) - 320 ms
TEST(SfsRamTests, psCreateAndSet) - 365 ms
TEST(SfsRamTests, itsStorageLimitTest) - 250 ms
TEST(SfsRamTests, itsStoreNewItem) - 227 ms
TEST(MockStoreTests, psCreateAndSetExtended) - 174 ms
TEST(MockStoreTests, psCreateAndSet) - 211 ms
TEST(MockStoreTests, itsStorageLimitTest) - 174 ms
TEST(MockStoreTests, itsStoreNewItem) - 211 ms
TEST(SecureStorageProxyTests, psCreateAndSetExtended) - 1335 ms
TEST(SecureStorageProxyTests, psCreateAndSet) - 347 ms
TEST(SecureStorageProxyTests, itsStorageLimitTest) - 260 ms
TEST(SecureStorageProxyTests, itsStoreNewItem) - 300 ms
TEST(SecureStorageClientTests, psCreateAndSetExtended) - 378 ms
TEST(SecureStorageClientTests, psCreateAndSet) - 262 ms
TEST(SecureStorageClientTests, itsStorageLimitTest) - 200 ms
TEST(SecureStorageClientTests, itsStoreNewItem) - 221 ms
TEST(CryptoProtocolPackedcChecks, checkKeyUsage) - 49 ms
TEST(CryptoProtocolPackedcChecks, checkKeyLifetime) - 16 ms
TEST(CryptoProtocolPackedcChecks, checkAlg) - 31 ms
TEST(CryptoProtocolPackedcChecks, checkDhGroup) - 37 ms
TEST(CryptoProtocolPackedcChecks, checkEccCurve) - 100 ms
TEST(CryptoProtocolPackedcChecks, checkKeyType) - 45 ms
TEST(CryptoProtocolProtobufChecks, checkKeyUsage) - 49 ms
TEST(CryptoProtocolProtobufChecks, checkKeyLifetime) - 20 ms
TEST(CryptoProtocolProtobufChecks, checkAlg) - 65 ms
TEST(CryptoProtocolProtobufChecks, checkDhGroup) - 45 ms
TEST(CryptoProtocolProtobufChecks, checkEccCurve) - 76 ms
TEST(CryptoProtocolProtobufChecks, checkKeyType) - 0 ms
TEST(CryptoProtocolOpcodeChecks, checkPackedcToProtobuf) - 37 ms
TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 6595 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 1000 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 667 ms
TEST(CryptoMacServicePackedcTests, macAbort) - 824 ms
TEST(CryptoMacServicePackedcTests, signAndVerify) - 23800 ms
TEST(CryptoCipherServicePackedcTests, cipherAbort) - 668 ms
TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 14015 ms
TEST(CryptoHashServicePackedcTests, hashAbort) - 1985 ms
TEST(CryptoHashServicePackedcTests, hashAndVerify) - 3954 ms
TEST(CryptoHashServicePackedcTests, calculateHash) - 988 ms
TEST(CryptoServicePackedcTests, generateRandomNumbers) - 1337 ms
TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 1046843 ms
TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 137365 ms
TEST(CryptoServicePackedcTests, signAndVerifyEat) - 253256 ms
TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 252541 ms
TEST(CryptoServicePackedcTests, signAndVerifyHash) - 250919 ms
TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 21470 ms
TEST(CryptoServicePackedcTests, exportPublicKey) - 42058 ms
TEST(CryptoServicePackedcTests, purgeKey) - 21253 ms
TEST(CryptoServicePackedcTests, copyKey) - 136364 ms
TEST(CryptoServicePackedcTests, generatePersistentKeys) - 41861 ms
TEST(CryptoServicePackedcTests, generateVolatileKeys) - 41730 ms
TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 1798 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 573779 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 130699 ms
TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 251300 ms
TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 250868 ms
TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 21742 ms
TEST(CryptoServiceProtobufTests, exportPublicKey) - 42198 ms
TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 42363 ms
TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 41947 ms
TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 10388464 ms
TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 2023418 ms
TEST(CryptoFaultTests, randomNumbersWithBrokenStorage) - 246 ms
TEST(CryptoFaultTests, persistentKeysWithBrokenStorage) - 20787 ms
TEST(CryptoFaultTests, volatileKeyWithBrokenStorage) - 21344 ms
TEST(PocCryptoOpTests, checkOpSequence) - 66220 ms
TEST(CryptoMsgTests, SignHashOutMsgTest) - 71 ms
TEST(CryptoMsgTests, SignHashInMsgTest) - 249 ms
TEST(CryptoMsgTests, ExportPublicKeyOutMsgTest) - 238 ms
TEST(CryptoMsgTests, ExportPublicKeyInMsgTest) - 50 ms
TEST(CryptoMsgTests, GenerateKeyInMsgTest) - 200 ms
TEST(CryptoContextPoolTests, multipleContexts) - 39459 ms
TEST(CryptoContextPoolTests, singleContext) - 54 ms
TEST(CryptoContextPoolTests, checkEmptyPool) - 79 ms
TEST(FwuUpdateFmpTests, wholeFmpFlow) - 7742 ms
TEST(FwuOversizeImageTests, oversizeInstallMultiLocationEndStaging) - 48529 ms
TEST(FwuOversizeImageTests, oversizeInstallEndStaging) - 11633 ms
TEST(FwuOversizeImageTests, oversizeInstallCancelStaging) - 11628 ms
TEST(FwuOversizeImageTests, maxSizeInstall) - 17872 ms
TEST(FwuRollbackTests, bootloaderFallback) - 11191 ms
TEST(FwuRollbackTests, selectPreviousAfterActivation) - 15366 ms
TEST(FwuRollbackTests, selectPreviousPriorToActivation) - 11142 ms
TEST(FwuPowerFailureTests, powerFailureDuringTrial) - 71538 ms
TEST(FwuPowerFailureTests, powerFailureDuringStaging) - 55901 ms
TEST(FwuUpdateScenarioTests, partialFirmwareUpdateFlow) - 45294 ms
TEST(FwuUpdateScenarioTests, wholeFirmwareUpdateFlow) - 15402 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInTrial) - 33949 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInStaging) - 16350 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInRegular) - 5621 ms
TEST(FwuImageDirectoryTests, zeroFwLocations) - 523 ms
TEST(FwuImageDirectoryTests, multipleFwLocations) - 15860 ms
TEST(FwuImageDirectoryTests, singleFwLocation) - 5619 ms
TEST(FwuImageDirectoryTests, streamRecycling) - 19707 ms
TEST(FwuImageDirectoryTests, streamedReads) - 18270 ms
TEST(FwuDefaultInstallerFactoryTests, configureInstallersFlow) - 608 ms
TEST(FwuCopyInstallerTests, installAndCopy) - 45578 ms
TEST(FwuRawInstallerTests, normalInstallFlow) - 22412 ms
TEST(FwuMetadataV2Tests, checkImgBankInfoStructure) - 0 ms
TEST(FwuMetadataV2Tests, checkImgEntryStructure) - 37 ms
TEST(FwuMetadataV2Tests, checkFwStoreDescStructure) - 20 ms
TEST(FwuMetadataV2Tests, checkHeaderStructure) - 11 ms
TEST(FwuMetadataManagerTests, checkAndRepairInaccessibleStorage) - 20799 ms
TEST(FwuMetadataManagerTests, checkAndRepairAccessibleStorage) - 56959 ms
TEST(PartitionedBlockStoreTests, writeToInvalidBlock) - 237 ms
TEST(PartitionedBlockStoreTests, checkEraseLimits) - 641 ms
TEST(PartitionedBlockStoreTests, writeReadEraseBlock) - 635 ms
TEST(PartitionedBlockStoreTests, openClose) - 174 ms
TEST(PartitionedBlockStoreTests, getPartitionInfo) - 185 ms
TEST(FileBlockStoreTests, initWithExistingDiskImage) - 1546 ms
TEST(FileBlockStoreTests, wholeBlockRw) - 3347 ms
TEST(RamBlockStoreTests, eraseOperations) - 191 ms
TEST(RamBlockStoreTests, writeToInvalidBlock) - 122 ms
TEST(RamBlockStoreTests, writeBiggerThanBlock) - 242 ms
TEST(RamBlockStoreTests, writeReadEraseBlock) - 313 ms
TEST(RamBlockStoreTests, openClose) - 85 ms
TEST(RamBlockStoreTests, getPartitionInfo) - 96 ms
TEST(AttestationProvisioningTests, provisionedIak) - 21012 ms
TEST(AttestationProvisioningTests, selfGeneratedIak) - 61830 ms
TEST(AttestationServiceTests, repeatedOperation) - 5061352 ms
TEST(AttestationServiceTests, invalidChallengeLen) - 158 ms
TEST(AttestationServiceTests, checkTokenSize) - 91593 ms
TEST(AttestationReporterTests, createReport) - 171984 ms
TEST(TcgEventLogTests, interateBootMeasurements) - 174 ms
TEST(DiscoveryServiceTests, checkServiceInfo) - 349 ms
TEST(ServiceNameTests, readService) - 327 ms
TEST(ServiceNameTests, checkFields) - 275 ms
TEST(ServiceNameTests, checkInvalidServiceNames) - 37 ms
TEST(ServiceNameTests, checkValidServiceNames) - 118 ms
TEST(ServiceFrameworkTests, serviceProviderChain) - 123 ms
TEST(ServiceFrameworkTests, serviceWithOps) - 13 ms
TEST(ServiceFrameworkTests, serviceWithNoOps) - 76 ms
TEST(ffarpc_call_ep, request_deny_64_bit) - 1331 ms
TEST(ffarpc_call_ep, request_with_data_after_unshare) - 3618 ms
TEST(ffarpc_call_ep, request_with_data_buffer_overflow) - 1728 ms
TEST(ffarpc_call_ep, request_with_data) - 2421 ms
TEST(ffarpc_call_ep, request_without_data_non_zero_length) - 71 ms
TEST(ffarpc_call_ep, request_without_data) - 675 ms
TEST(ffarpc_call_ep, invalid_mgmt_call) - 84 ms
TEST(ffarpc_call_ep, mem_unshare_null_ep) - 102 ms
TEST(ffarpc_call_ep, mem_share_unshare_relinquish_fail_then_success) - 3123 ms
TEST(ffarpc_call_ep, mem_share_unshare_relinquish_fail) - 2367 ms
TEST(ffarpc_call_ep, mem_share_unshare) - 2377 ms
TEST(ffarpc_call_ep, mem_unshare) - 82 ms
TEST(ffarpc_call_ep, mem_share_null_ep) - 100 ms
TEST(ffarpc_call_ep, mem_share_smaller_page_count_relinquish_fail) - 2393 ms
TEST(ffarpc_call_ep, mem_share_smaller_page_count) - 2353 ms
TEST(ffarpc_call_ep, mem_share_retrieve_fail) - 1719 ms
TEST(ffarpc_call_ep, mem_share_fill_all) - 26378 ms
TEST(ffarpc_call_ep, mem_share) - 1675 ms
TEST(ffarpc_caller, end) - 82 ms
TEST(ffarpc_caller, end_null_handle) - 140 ms
TEST(ffarpc_caller, end_null_context) - 0 ms
TEST(ffarpc_caller, invoke_without_response) - 605 ms
TEST(ffarpc_caller, invoke_with_response) - 626 ms
TEST(ffarpc_caller, invoke_invalid_resp_len) - 642 ms
TEST(ffarpc_caller, invoke_send_direct_req_fail) - 491 ms
TEST(ffarpc_caller, invoke_resp_long_req) - 37 ms
TEST(ffarpc_caller, invoke_resp_no_begin) - 48 ms
TEST(ffarpc_caller, invoke_resp_len_null) - 86 ms
TEST(ffarpc_caller, invoke_resp_buf_null) - 46 ms
TEST(ffarpc_caller, invoke_opstatus_null) - 93 ms
TEST(ffarpc_caller, invoke_handle_context_diff) - 60 ms
TEST(ffarpc_caller, invoke_null_context) - 0 ms
TEST(ffarpc_caller, begin_without_buffer) - 85 ms
TEST(ffarpc_caller, begin_with_buffer) - 55 ms
TEST(ffarpc_caller, begin_not_opened) - 45 ms
TEST(ffarpc_caller, begin_too_large_req) - 87 ms
TEST(ffarpc_caller, begin_transaction_in_progress) - 100 ms
TEST(ffarpc_caller, begin_null_buffer) - 134 ms
TEST(ffarpc_caller, begin_null_context) - 42 ms
TEST(ffarpc_caller, close_success) - 1094 ms
TEST(ffarpc_caller, close_endpoint_and_mem_reclaim_fail) - 927 ms
TEST(ffarpc_caller, close_mem_reclaim_fail) - 948 ms
TEST(ffarpc_caller, close_send_direct_msg_fail) - 483 ms
TEST(ffarpc_caller, close_not_opened) - 37 ms
TEST(ffarpc_caller, open_success) - 1851 ms
TEST(ffarpc_caller, open_send_direct_req_rpc_status_fail_reclaim_fail) - 2218 ms
TEST(ffarpc_caller, open_send_direct_req_rpc_status_fail) - 2237 ms
TEST(ffarpc_caller, open_send_direct_req_fail) - 1712 ms
TEST(ffarpc_caller, open_share_fail) - 1315 ms
TEST(ffarpc_caller, open_invalid_mem_size) - 82 ms
TEST(ffarpc_caller, open_already_opened) - 68 ms
TEST(ffarpc_caller, discover_more_max_cnt) - 1184 ms
TEST(ffarpc_caller, discover_less_max_cnt) - 1065 ms
TEST(ffarpc_caller, discover) - 1100 ms
TEST(ffarpc_caller, discover_rx_release_fail) - 1007 ms
TEST(ffarpc_caller, discover_rx_get_fail) - 868 ms
TEST(ffarpc_caller, discover_partition_info_get_fail) - 511 ms
TEST(ffarpc_caller, discover_invalid_arguments) - 97 ms
TEST(RpcStatusProtocolChecks, checkProtobufRpcStatusCodes) - 60 ms
TEST(ConfigRamstoreTests, checkMultipleConfig) - 53 ms
TEST(ConfigRamstoreTests, checkSingleConfig) - 87 ms
TEST(ConfigRamstoreTests, checkEmptyConfig) - 43 ms
TEST(Crc32Tests, multiPart) - 39 ms
TEST(Crc32Tests, longString) - 87 ms
TEST(Crc32Tests, shortString) - 46 ms
TEST(EndianTests, le64) - 86 ms
TEST(EndianTests, le32) - 31 ms
TEST(EndianTests, le16) - 27 ms
TEST(EndianTests, le8) - 100 ms
TEST(TlvTests, encodeWrongOrder) - 79 ms
TEST(TlvTests, encodeInsufficientSpace) - 100 ms
TEST(TlvTests, encodeRecords) - 223 ms
TEST(TlvTests, decodeBadRecords) - 56 ms
TEST(TlvTests, findAndDecodeMissingOptional) - 50 ms
TEST(TlvTests, findAndDecode) - 76 ms
TEST(TlvTests, decodeGoodRecords) - 37 ms
TEST(UuidTests, roundTrip) - 136 ms
TEST(UuidTests, checkNilUuidOperations) - 100 ms
TEST(UuidTests, checkIsEqualOperation) - 124 ms
TEST(UuidTests, checkOctetsFromCanonical) - 86 ms
TEST(UuidTests, parseValidUuidToGuidOctets) - 0 ms
TEST(UuidTests, parseError) - 61 ms
TEST(UuidTests, parseUuidInUrn) - 87 ms
TEST(UuidTests, parseValidUuidMixedCase) - 82 ms
TEST(UuidTests, parseValidUuidLowerCase) - 82 ms
TEST(TsDemoTests, runTsDemo) - 624043 ms
OK (252 tests, 251 ran, 365136 checks, 1 ignored, 0 filtered out, 23127180 ms)
```
**LibTS test (linux-pc only)**
```
trusted-services/tools/b-test/build-libts-linux-pc/libts-test -v
TEST(CryptoServicePackedcTests, generateRandomNumbers) - 2 ms
TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 6 ms
TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 2 ms
TEST(CryptoServicePackedcTests, signAndVerifyEat) - 2 ms
TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 3 ms
TEST(CryptoServicePackedcTests, signAndVerifyHash) - 2 ms
TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 1 ms
TEST(CryptoServicePackedcTests, exportPublicKey) - 0 ms
TEST(CryptoServicePackedcTests, purgeKey) - 0 ms
TEST(CryptoServicePackedcTests, copyKey) - 1 ms
TEST(CryptoServicePackedcTests, generatePersistentKeys) - 1 ms
TEST(CryptoServicePackedcTests, generateVolatileKeys) - 0 ms
TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 0 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 14 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 1 ms
TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 3 ms
TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 2 ms
TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 1 ms
TEST(CryptoServiceProtobufTests, exportPublicKey) - 0 ms
TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 0 ms
TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 1 ms
- 68 ms
TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 17 ms
TEST(PsServiceTests, createAndSetExtended) - 1 ms
TEST(PsServiceTests, createAndSet) - 0 ms
TEST(PsServiceTests, storeNewItem) - 1 ms
TEST(ItsServiceTests, storeNewItem) - 0 ms
```
**Platform inspect test**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/platform-inspect
attestation_report:
challenge: 31 03 a3 a3 e5 e2 d8 1a ea e1 df 26 85 1c c0 2a 4d ac 4a 3e ba 32 15 53 0e f2 e3 fe 91 f6 8b 75
client_id: 0
boot_seed: ec 0b f2 64 34 7a 8c 68 ca ff 5f a4 e2 ff 90 70 25 64 be e1 13 90 58 97 42 b1 ce 4a d2 f8 7b 3a
security_lifecycle: 0
instance_id: 01 9c d5 b1 3e 0b 88 a9 12 87 c7 1e 52 0d 58 39 92 a7 69 d9 58 bb 8a db 10 15 f0 77 c0 a1 25 63 32
implementation_id: 74 72 75 73 74 65 64 66 69 72 6d 77 61 72 65 2e 6f 72 67 2e 74 73 2e 61 74 74 65 73 74 61 74 69 6f 6e 5f 73 70
sw_components:
type: FW_CONFIG
digest: 5e 10 97 50 c0 cb 32 14 e6 e4 09 f7 12 ba 84 d6 d1 d6 e2 d4 45 8c 52 f3 d2 b9 6e ea 82 d4 e5 47
type: TB_FW_CONFIG
digest: dc 45 e2 c1 a9 f5 b1 81 9a 10 8e 8e 0f 0a 5e b2 e1 c1 94 00 73 ae 14 83 eb dd e1 f5 fe ac 72 5c
type: BL_2
digest: d1 56 89 90 7e d8 98 71 72 47 fb 91 9e c2 0b 7b 5d 89 f4 07 ce 27 8d 37 54 20 d8 aa ea 92 30 ae
type: SECURE_RT_EL3
digest: 99 56 5e 18 d3 ea 1b 8f 79 63 c8 66 19 48 a2 50 f8 c3 0c a5 33 99 53 9e 11 c2 cd 5e 11 c5 8c dc
type: HW_CONFIG
digest: 54 10 fe 53 a5 fe 12 75 dc cc 3a 15 8f d8 34 63 f3 3e 1e 71 7f e3 4c 39 a1 62 4a 90 5c 0a 84 f3
type: SOC_FW_CONFIG
digest: 4e e4 8e 5a e6 50 ed e0 b5 a3 54 8a 1f d6 0e 8a ea 0e 71 75 0e a4 3f 82 76 ce af cd 7c b0 91 e0
type: SECURE_RT_EL1_UNKNOWN
digest: e9 4a 94 e4 1e 0c 28 97 3a 6b b8 dc 2f 89 fc f9 af e9 d3 67 98 89 2c 4d 0a 6d 3b b5 59 11 c6 73
type: TOS_FW_CONFIG
digest: 77 35 1c d8 86 d0 66 15 eb 3a 2d 2d 9c ef b9 49 ba 0a 4a 67 58 ff 06 b7 90 7d c7 06 38 ce c6 0b
type: BL_33
digest: a2 6c ec 40 dd dd 31 ce af 90 09 5b 25 c6 e3 83 b3 3e 6f 11 fc 13 4f 8e 83 64 0d 53 b6 34 22 6c
type: NT_FW_CONFIG
digest: 0c 53 ba 3f c9 43 13 bf 25 59 bc 8c 2e 7e 49 fa 0f 1a 5a 40 96 ed 58 fa 58 31 39 7a de d4 e4 fb
type: CRITICAL DATA
digest: d3 a9 31 35 10 be c0 88 51 bd 28 4e a9 ff b3 c3 cd 02 11 fc 23 2e 02 07 0e ce a5 ab 1d d9 a1 6a
```
**TS Demo test**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/ts-demo
Demonstrates use of trusted services from an application
---------------------------------------------------------
A client requests a set of crypto operations performed by
the Crypto service. Key storage for persistent keys is
provided by the Secure Storage service via the ITS client.
Generating random bytes length: 1
Operation successful
Random bytes:
55
Generating random bytes length: 7
Operation successful
Random bytes:
2B 35 04 79 3B 50 83
Generating random bytes length: 128
Operation successful
Random bytes:
57 31 1C 74 88 69 C4 12
D1 9A 93 83 2D D2 AA 0C
EA 03 F5 44 09 6A 92 11
8A 8A 06 57 26 B1 47 74
01 1B 2A 25 8D CF 6C A3
A6 4D 6D A1 8B FC 31 76
57 13 72 96 C4 09 BA 56
88 35 F9 66 58 B0 EE 1E
AF E9 90 9D AD BB 62 21
82 37 E1 31 37 43 18 5B
95 2E 42 BB 6B 41 40 66
A5 81 81 32 3F F3 23 8A
5A 88 B2 9D 2C B0 F2 C4
51 26 13 53 FE 8F 68 B0
B0 D1 64 85 3C E9 5A C8
E2 0A 62 80 F1 AB A2 7C
Generating ECC signing key
Operation successful
Signing message: "The quick brown fox" using key: 256
Operation successful
Signature bytes:
77 1E 93 3C E1 A2 CD C4
5D 03 15 B8 A9 1A AE 47
37 6A B8 F0 5D 67 22 06
FC 2C B8 20 71 97 7F F8
AE 06 0F 71 34 E3 0B FD
CA 24 C2 23 0F 89 67 99
51 B5 FE 25 95 CD 75 ED
1B A2 6E 5A 3A 06 26 3C
Verify signature using original message: "The quick brown fox"
Operation successful
Verify signature using modified message: "!he quick brown fox"
Successfully detected modified message
Signing message: "jumps over the lazy dog" using key: 256
Operation successful
Signature bytes:
91 1A 8E 4B 17 3C 01 FF
A2 0A D4 55 39 3E 84 96
92 84 A3 F1 A1 26 5C 40
14 A6 57 50 79 70 41 ED
68 E4 21 61 DD 9F 07 0C
DE 9C DC 29 F5 9F 88 DF
36 0D C4 21 54 D3 CD F8
35 C0 7B 16 10 59 26 4A
Verify signature using original message: "jumps over the lazy dog"
Operation successful
Verify signature using modified message: "!umps over the lazy dog"
Successfully detected modified message
Generating RSA encryption key
Operation successful
Encrypting message: "Top secret" using RSA key: 257
Operation successful
Encrypted message:
6E 9A 04 F4 64 33 0B 6D
DE CB C7 21 EF C8 FC A9
95 50 F1 6C 90 64 AA A0
D6 99 BD 90 4C 79 A0 73
Decrypting message using RSA key: 257
Operation successful
Decrypted message: "Top secret"
Exporting public key: 256
Operation successful
Public key bytes:
04 D5 1A 1C 30 72 3C CF
3B E3 0B 47 92 54 2E 6E
61 28 26 A1 FB 00 82 75
AC 44 14 18 B4 87 66 F7
F8 47 0B 25 83 04 4B 9A
6F 08 DF 98 E1 81 77 E7
6B 29 34 60 2A 52 94 96
E8 6E 2E 0E 78 5A EF 81
98
Destroying signing key: 256
Operation successful
Destroying encryption key: 257
Operation successful
```
==Config 2: FIP SP==
====Build command====
```
MEASURED_BOOT=y SPMC_TESTS=n TS_SMM_GATEWAY=n TS_UEFI_TESTS=n SP_PACKAGING_METHOD=fip DEFAULT_SP_CONFIG=default-sp SP_BLOCK_STORAGE_CONFIG=default-sp SP_PSA_ITS_CONFIG=shared-flash-opteesp SP_PSA_PS_CONFIG=shared-flash-opteesp make
```
====Setup steps after boot====
```
/mnt/host/out/linux-arm-ffa-tee/load_module.sh
/mnt/host/out/linux-arm-ffa-user/load_module.sh
cp -at /usr /mnt/host/out/ts-install/arm-linux/bin /mnt/host/out/ts-install/arm-linux/lib
```
====Test results====
**Trusted Services service level test**
```
```
**PSA Architecture Test Suite**
```
```
**Component test**
```
```
**LibTS test**
```
```
**Platform inspect test**
```
```
**TS Demo test**
**UEFI test**
==Config 3: OP-TEE SPMC tests==
====Build command====
```
MEASURED_BOOT=n SPMC_TESTS=n TS_SMM_GATEWAY=y TS_UEFI_TESTS=y DEFAULT_SP_CONFIG=default-sp SP_PACKAGING_METHOD=fip make
```
====Setup steps after boot====
```
/mnt/host/out/linux-arm-ffa-tee/load_module.sh
/mnt/host/out/linux-arm-ffa-user/load_module.sh
cp -at /usr /mnt/host/out/ts-install/arm-linux/bin /mnt/host/out/ts-install/arm-linux/lib
```
====Test results====
==Config 4: SMMGW tests==
====Build command====
```
MEASURED_BOOT=n SPMC_TESTS=y TS_SMM_GATEWAY=n TS_UEFI_TESTS=n SP_PACKAGING_METHOD=embedded DEFAULT_SP_CONFIG=default-opteesp make
```
====Setup steps after boot====
```
/mnt/host/out/linux-arm-ffa-tee/load_module.sh
/mnt/host/out/linux-arm-ffa-user/load_module.sh
cp -at /usr /mnt/host/out/ts-install/arm-linux/bin /mnt/host/out/ts-install/arm-linux/lib
```
====Test results====
=Overview=
This page is to capture the test results for OP-TEE SPMC v3.22
The tests were ran using the following set of components:
```lang=html, lines=12
>>> Manifest status
d064c30 (HEAD -> default, origin/master, m/master) stm32mp1: fetch mbedtls for tf-a authenticated boot
b242f5c stm32mp1: add edk2 and edk2-platforms repos
122fe9a stm32mp1: bump u-boot to 2023.04
Local manifests:
The merged manifest is:
<?xml version="1.0" encoding="UTF-8"?>
<manifest>
<remote fetch="https://git.gitlab.arm.com" name="arm-gitlab"/>
<remote fetch="https://github.com" name="github"/>
<remote fetch="https://git.savannah.gnu.org/git" name="savannah"/>
<remote fetch="https://git.trustedfirmware.org" name="tfo"/>
<default remote="github" revision="master"/>
<project name="Mbed-TLS/mbedtls.git" path="mbedtls" revision="refs/tags/mbedtls-2.28.1"/>
<project name="OP-TEE/build.git" path="build">
<linkfile dest="build/Makefile" src="fvp-psa-sp.mk"/>
</project>
<project name="OP-TEE/optee_client.git" path="optee_client"/>
<project name="OP-TEE/optee_os.git" path="optee_os"/>
<project name="OP-TEE/optee_test.git" path="optee_test"/>
<project clone-depth="1" name="TF-A/trusted-firmware-a.git" path="trusted-firmware-a" remote="tfo" revision="refs/tags/v2.8"/>
<project name="TS/trusted-services.git" path="trusted-services" remote="tfo" revision="integration"/>
<project clone-depth="1" name="buildroot/buildroot.git" path="buildroot" revision="refs/tags/2022.11.1"/>
<project clone-depth="1" name="grub.git" path="grub" remote="savannah" revision="refs/tags/grub-2.02"/>
<project name="linaro-swg/optee_examples.git" path="optee_examples"/>
<project clone-depth="1" name="linux-arm/linux-trusted-services.git" path="linux-arm-ffa-user" remote="arm-gitlab" revision="debugfs-v5"/>
<project clone-depth="1" name="linux-arm/linux-trusted-services.git" path="linux-arm-ffa-tee" remote="arm-gitlab" revision="tee-v1"/>
<project name="tianocore/edk2-platforms.git" path="edk2-platforms" revision="02daa58c21f89628b4d8c76f95f3a554289149bc"/>
<project name="tianocore/edk2.git" path="edk2" revision="dd4cae4d82c7477273f3da455084844db5cca0c0"/>
<project clone-depth="1" name="torvalds/linux.git" path="linux" revision="refs/tags/v6.1"/>
</manifest>
>>>Project status
project build/
Local and remote SHA is matching.
2e792b3 (HEAD, m/master, github/master) fvp, ts: optimize buildroot config
3730e01 fvp, ts: use minimal Linux config
9b54724 Fix build of fTPM by enabling build of 32-bit libraries
project buildroot/
Local and remote SHA is matching.
d48a8beb (grafted, HEAD, tag: 2022.11.1, tag: m/master) Update for 2022.11.1
project edk2/
Local and remote SHA is matching.
dd4cae4d82 (HEAD, m/master) ArmPkg/GenericWatchdogDxe: Split 64bit register write to 2x32bit
1d802e234e BaseTools: Guid.xref doesn't specify the correct GUID value for Driver
83964ebc5e BaseTools/BinToPcd: Encode string returned from ByteArray()
project edk2-platforms/
Local and remote SHA is matching.
02daa58c21 (HEAD, m/master) Silicon/SynQuacer: Add status property in PCIe & SDHC DT nodes
9f02ebc19b Silicon/SynQuacer: add optional OP-TEE DT node
9dae9a0c79 Marvell/Library: ComPhyLib: Clean up the library after rework
project grub/
Local and remote SHA is matching.
e54c99a (grafted, HEAD, tag: grub-2.02, tag: m/master) Increase version to 2.02.
project linux/
Local and remote SHA is matching.
830b3c68c (grafted, HEAD, tag: v6.1, tag: m/master) Linux 6.1
project linux-arm-ffa-tee/
Local and remote SHA is matching.
c6b9495 (grafted, HEAD, m/master, arm-gitlab/tee-v1) Add versioning info to readme
project linux-arm-ffa-user/
Local and remote SHA is matching.
18e3be7 (grafted, HEAD, m/master, arm-gitlab/debugfs-v5) Add support for FF-A driver changes in v6.1
project mbedtls/
Local and remote SHA is matching.
dd79db100 (HEAD, tag: v2.28.1, tag: mbedtls-2.28.1, tag: m/master) Merge pull request #955 from Mbed-TLS/mbedtls-2.28.1rc0-pr
fe9d08fd1 Bump version
fa827b4b3 Minor tweaks to Changelog
project optee_client/
Local and remote SHA is matching.
8533e0e (HEAD, tag: 3.21.0-rc1, tag: 3.21.0, m/master, github/master) travis: remove the .travis.yml file
0fc6ef7 tee-supplicant: fix leak when load plugin failed
dde6306 libteeacl: use realloc() instead of reallocarray()
project optee_examples/
Local and remote SHA is matching.
378dc0d (HEAD, tag: 3.21.0, m/master, github/master) hotp: use sess_ctx instead of global variables
a98d01e (tag: 3.21.0-rc1, tag: 3.20.0-rc1, tag: 3.20.0) pluging: add missing of dependency syslog on teec
3ca8454 Enable compatibility with TEE Internal Core API v1.1
project optee_os/
Local and remote SHA is matching.
280b6a32e (HEAD, m/master, github/master) core: spmc: implement FFA_CONSOLE_LOG
b89b3da24 core: thread: Add support for canary value randomization
fb66b364b mk/aosp_optee.mk: fix build dependency for static libraries
project optee_test/
Local and remote SHA is matching.
232dfd2 (HEAD, m/master, github/master) xtest: remove ffa.h from SPMC test to resolve compiler error
36a136d Android.mk: add subkeys include directory
d168ff4 xtest: fix xtest tool name in usage trace messages
project trusted-firmware-a/
Local and remote SHA is matching.
9881bb9 (grafted, HEAD, tag: v2.8, tag: m/master) Merge "docs(spm): update threat model" into integration
project trusted-services/
Local and remote SHA is matching.
e56c7b1 (HEAD, tfo/integration, m/master) Implement FFA_CONSOLE_LOG interface
0100ddd Add FF-A v1.1 boot protocol
4f9d8e3 Refactor FF-A boot info
```
=Details=
==Config 1: embedded SP==
====Build command====
```
MEASURED_BOOT=y SPMC_TESTS=n TS_SMM_GATEWAY=n TS_UEFI_TESTS=n SP_PACKAGING_METHOD=embedded DEFAULT_SP_CONFIG=default-sp SP_BLOCK_STORAGE_CONFIG=default-sp SP_PSA_ITS_CONFIG=shared-flash-opteesp SP_PSA_PS_CONFIG=shared-flash-opteesp make
```
====Setup steps after boot====
```
/mnt/host/out/linux-arm-ffa-tee/load_module.sh
/mnt/host/out/linux-arm-ffa-user/load_module.sh
cp -at /usr /mnt/host/out/ts-install/arm-linux/bin /mnt/host/out/ts-install/arm-linux/lib
```
====Test results====
**Trusted Services service level test**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/ts-service-test -v
TEST(FwuServiceTests, checkMetadataAccess)
/src/trusted-services/components/service/fwu/test/service/fwu_service_tests.cpp:66: error: Failure in TEST(FwuServiceTests, checkMetadataAccess)
/src/trusted-services/components/service/fwu/test/metadata_fetcher/client/client_metadata_fetcher.cpp:44: error:
expected < 0 0x0000000000000000>
but was <-8 0xfffffffffffffff8>
- 6674 ms
TEST(FwuServiceTests, checkImgDirAccess)
/src/trusted-services/components/service/fwu/test/service/fwu_service_tests.cpp:61: error: Failure in TEST(FwuServiceTests, checkImgDirAccess)
expected < 0 0x0000000000000000>
but was <-8 0xfffffffffffffff8>
- 2427 ms
TEST(PsServiceTests, createAndSetExtended) - 73500 ms
TEST(PsServiceTests, createAndSet) - 119236 ms
TEST(PsServiceTests, storeNewItem) - 77429 ms
TEST(ItsServiceTests, storeNewItem) - 80837 ms
TEST(AttestationProvisioningTests, provisionedIak) - 36000 ms
TEST(AttestationProvisioningTests, selfGeneratedIak) - 52060 ms
TEST(AttestationServiceTests, repeatedOperation) - 6644452 ms
TEST(AttestationServiceTests, invalidChallengeLen)[ 10.780459] ------------[ cut here ]------------
[ 10.780559] WARNING: CPU: 3 PID: 143 at mm/page_alloc.c:5534 __alloc_pages+0x164/0xab0
[ 10.780876] Modules linked in: arm_ffa_tee(O)
[ 10.780959] CPU: 3 PID: 143 Comm: ts-service-test Tainted: G O 6.1.0 #1
[ 10.781259] Hardware name: FVP Base RevC (DT)
[ 10.781359] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 10.781571] pc : __alloc_pages+0x164/0xab0
[ 10.781659] lr : pool_op_alloc+0x5c/0x180 [arm_ffa_tee]
[ 10.781959] sp : ffffffc0087ebac0
[ 10.782059] x29: ffffffc0087ebac0 x28: ffffffc0087ebd30 x27: ffffff8801e74600
[ 10.782359] x26: 0000007fe05cb118 x25: 0000000000000005 x24: 0000000000001000
[ 10.782559] x23: ffffff8801e74180 x22: 0000000000000015 x21: 0000000000000015
[ 10.782759] x20: 0000000000000000 x19: ffffff8801e74180 x18: 0000000000000000
[ 10.783059] x17: 0000000000000000 x16: 0000000000000000 x15: 0000007fe05cb118
[ 10.783306] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 10.783559] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 10.783827] x8 : ffffff8801e74200 x7 : 0000000000000000 x6 : 0000000000000ae4
[ 10.784059] x5 : ffffff8801e74180 x4 : 0000000000000000 x3 : 0000000000000000
[ 10.784259] x2 : ffffff88009f3700 x1 : 0000000000000001 x0 : ffffffc008707000
[ 10.784559] Call trace:
[ 10.784659] __alloc_pages+0x164/0xab0
[ 10.784759] pool_op_alloc+0x5c/0x180 [arm_ffa_tee]
[ 10.785059] shm_alloc_helper+0x98/0x110
[ 10.785159] tee_shm_alloc_user_buf+0x74/0x11c
[ 10.785438] tee_ioctl+0xa70/0xf9c
[ 10.785612] __arm64_sys_ioctl+0x3bc/0xc30
[ 10.785759] invoke_syscall.constprop.0+0x5c/0x104
[ 10.785859] do_el0_svc+0x60/0x18c
[ 10.786059] el0_svc+0x38/0xf0
[ 10.786259] el0t_64_sync_handler+0xbc/0x140
[ 10.786359] el0t_64_sync+0x18c/0x190
[ 10.786559] ---[ end trace 0000000000000000 ]---
ffa_tee_share_mem():212 error: 12
- 23142 ms
TEST(AttestationServiceTests, checkTokenSize) - 66762 ms
TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 24023 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 27300 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 32600 ms
TEST(CryptoMacServicePackedcTests, macAbort) - 20271 ms
TEST(CryptoMacServicePackedcTests, signAndVerify) - 78961 ms
TEST(CryptoCipherServicePackedcTests, cipherAbort) - 20300 ms
TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 62965 ms
TEST(CryptoHashServicePackedcTests, hashAbort) - 18484 ms
TEST(CryptoHashServicePackedcTests, hashAndVerify) - 29900 ms
TEST(CryptoHashServicePackedcTests, calculateHash) - 13918 ms
TEST(CryptoServicePackedcTests, generateRandomNumbers) - 43551 ms
TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 2835610 ms
TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 220900 ms
TEST(CryptoServicePackedcTests, signAndVerifyEat) - 265000 ms
TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 324213 ms
TEST(CryptoServicePackedcTests, signAndVerifyHash) - 327834 ms
TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 169327 ms
TEST(CryptoServicePackedcTests, exportPublicKey) - 115042 ms
TEST(CryptoServicePackedcTests, purgeKey) - 102661 ms
TEST(CryptoServicePackedcTests, copyKey) - 128324 ms
TEST(CryptoServicePackedcTests, generatePersistentKeys) - 187641 ms
TEST(CryptoServicePackedcTests, generateVolatileKeys) - 57006 ms
TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 44265 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 3030578 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 232579 ms
TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 327800 ms
TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 326324 ms
TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 170099 ms
TEST(CryptoServiceProtobufTests, exportPublicKey) - 115628 ms
TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 189753 ms
TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 57301 ms
TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 9734201 ms
TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 2203098 ms
TEST(DiscoveryServiceTests, checkServiceInfo) - 3840 ms
Errors (2 failures, 45 tests, 45 ran, 770 checks, 0 ignored, 0 filtered out, 28737577 ms)
```
**PSA Architecture Test Suite**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-crypto-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Crypto Suite
******************************************
TEST: 201 | DESCRIPTION: Testing crypto key management APIs | UT: psa_crypto_init
[Info] Executing tests from non-secure
[Check 1] Test calling crypto functions before psa_crypto_init
[Check 2] Test psa_crypto_init
[Check 3] Test multiple psa_crypto_init
TEST RESULT: PASSED
******************************************
TEST: 202 | DESCRIPTION: Testing crypto key management APIs | UT: psa_import_key
[Info] Executing tests from non-secure
[Check 1] Test psa_import_key 16 bytes AES
[Check 2] Test psa_import_key 24 bytes AES
[Check 3] Test psa_import_key 32 bytes AES
[Check 4] Test psa_import_key 2048 RSA public key
[Check 5] Test psa_import_key with RSA 2048 keypair
[Check 6] Test psa_import_key with DES 8 bytes key
[Check 7] Test psa_import_key with Triple DES 2-Key
[Check 8] Test psa_import_key with Triple DES 3-Key
[Check 9] Test psa_import_key with EC Public key
[Check 10] Test psa_import_key with EC keypair
[Check 11] Test psa_import_key 16 bytes AES with invalid bits
[Check 12] Test psa_import_key with key data greater than the algorithm size
[Check 13] Test psa_import_key with incorrect key data size
[Check 14] Test psa_import_key with invalid key type value
TEST RESULT: PASSED
******************************************
TEST: 203 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_key
[Info] Executing tests from non-secure
[Check 1] Test psa_export_key 16 Byte AES
[Check 2] Test psa_export_key 24 Byte AES
[Check 3] Test psa_export_key 32 Byte AES
[Check 4] Test psa_export_key 2048 RSA public key
[Check 5] Test psa_export_key with RSA 2048 keypair
[Check 6] Test psa_export_key with DES 64 bit key
[Check 7] Test psa_export_key with Triple DES 2-Key
[Check 8] Test psa_export_key with Triple DES 3-Key
[Check 9] Test psa_export_key with EC Public key
[Check 10] Test psa_export_key with EC keypair
[Check 11] Test psa_export_key with key policy verify
[Check 12] Test psa_export_key with less buffer size
TEST RESULT: PASSED
******************************************
TEST: 204 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_public_key
[Info] Executing tests from non-secure
[Check 1] Test psa_export_public_key 16 Byte AES
[Check 2] Test psa_export_public_key 24 Byte AES
[Check 3] Test psa_export_public_key 32 Byte AES
[Check 4] Test psa_export_public_key 2048 RSA public key
[Check 5] Test psa_export_public_key with RSA 2048 keypair
[Check 6] Test psa_export_public_key with DES 64 bit key
[Check 7] Test psa_export_public_key with Triple DES 2-Key
[Check 8] Test psa_export_public_key with Triple DES 3-Key
[Check 9] Test psa_export_public_key with EC Public key
[Check 10] Test psa_export_public_key with EC keypair
[Check 11] Test psa_export_public_key with less buffer size
TEST RESULT: PASSED
******************************************
TEST: 205 | DESCRIPTION: Testing crypto key management APIs | UT: psa_destroy_key
[Info] Executing tests from non-secure
[Check 1] Test psa_destroy_key 16 Byte AES
[Check 2] Test psa_destroy_key 24 Byte AES
[Check 3] Test psa_destroy_key 32 Byte AES
[Check 4] Test psa_destroy_key 2048 RSA public key
[Check 5] Test psa_destroy_key with RSA 2048 keypair
[Check 6] Test psa_destroy_key with DES 64 bit key
[Check 7] Test psa_destroy_key with Triple DES 2-Key
[Check 8] Test psa_destroy_key with Triple DES 3-Key
[Check 9] Test psa_destroy_key with EC Public key
[Check 10] Test psa_destroy_key with EC keypair
TEST RESULT: PASSED
******************************************
TEST: 206 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compute
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_compute with MD5 algorithm
[Check 2] Test psa_hash_compute with RIPEMD160 algorithm
[Check 3] Test psa_hash_compute with SHA1 algorithm
[Check 4] Test psa_hash_compute with SHA224 algorithm
[Check 5] Test psa_hash_compute with SHA256 algorithm
[Check 6] Test psa_hash_compute with SHA384 algorithm
[Check 7] Test psa_hash_compute with SHA512 algorithm
[Check 8] Test psa_hash_compute with small buffer size
[Check 9] Test psa_hash_compute with invalid algorithm
TEST RESULT: PASSED
******************************************
TEST: 207 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compare
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_compare with MD5 algorithm
[Check 2] Test psa_hash_compare with RIPEMD160 algorithm
[Check 3] Test psa_hash_compare with SHA1 algorithm
[Check 4] Test psa_hash_compare with SHA224 algorithm
[Check 5] Test psa_hash_compare with SHA256 algorithm
[Check 6] Test psa_hash_compare with SHA384 algorithm
[Check 7] Test psa_hash_compare with SHA512 algorithm
[Check 8] Test psa_hash_compare with incorrect hash
[Check 9] Test psa_hash_compare with incorrect hash length
[Check 10] Test psa_hash_compare with invalid algorithm
TEST RESULT: PASSED
******************************************
TEST: 208 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_setup - ECDH + HKDF-SHA-256
[Check 2] Test psa_key_derivation_setup - ECDH, unknown KDF
[Check 3] Test psa_key_derivation_setup - bad key derivation algorithm
[Check 4] Test psa_key_derivation_setup - Invalid Algorithm
TEST RESULT: PASSED
******************************************
TEST: 209 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_bytes
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_input_bytes - Step as Info
[Check 2] Test psa_key_derivation_input_bytes - Step as secret
[Check 3] Test psa_key_derivation_input_bytes - Step as salt
[Check 4] Test psa_key_derivation_input_bytes - Step as label
[Check 5] Test psa_key_derivation_input_bytes - Step as seed
[Check 6] Test psa_key_derivation_input_bytes - Invalid step
TEST RESULT: PASSED
******************************************
TEST: 210 | DESCRIPTION: Testing crypto key attributes APIs | UT: psa_key_attributes_set_get
[Info] Executing tests from non-secure
[Check 1] Test psa_key_attributes_set_get key attributes
TEST RESULT: PASSED
******************************************
TEST: 211 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_setup with MD5 algorithm
[Check 2] Test psa_hash_setup with RIPEMD160 algorithm
[Check 3] Test psa_hash_setup with SHA1 algorithm
[Check 4] Test psa_hash_setup with SHA224 algorithm
[Check 5] Test psa_hash_setup with SHA256 algorithm
[Check 6] Test psa_hash_setup with SHA384 algorithm
[Check 7] Test psa_hash_setup with SHA512 algorithm
[Check 8] Test psa_hash_setup with Invalid hash algorithm
[Check 9] Test psa_hash_setup with Invalid algorithm
[Check 10] Test psa_hash_setup with CTR algorithm
TEST RESULT: PASSED
******************************************
TEST: 212 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_update
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_update with MD5 algorithm
[Check 2] Test psa_hash_update with RIPEMD160 algorithm
[Check 3] Test psa_hash_update with SHA1 algorithm
[Check 4] Test psa_hash_update with SHA224 algorithm
[Check 5] Test psa_hash_update with SHA256 algorithm
[Check 6] Test psa_hash_update with SHA384 algorithm
[Check 7] Test psa_hash_update with SHA512 algorithm
[Check 8] Test psa_hash_update without hash setup
[Check 9] Test psa_hash_update with completed opertaion handle
TEST RESULT: PASSED
******************************************
TEST: 213 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_verify with MD5 algorithm
[Check 2] Test psa_hash_verify with RIPEMD160 algorithm
[Check 3] Test psa_hash_verify with SHA1 algorithm
[Check 4] Test psa_hash_verify with SHA224 algorithm
[Check 5] Test psa_hash_verify with SHA256 algorithm
[Check 6] Test psa_hash_verify with SHA384 algorithm
[Check 7] Test psa_hash_verify with SHA512 algorithm
[Check 8] Test psa_hash_verify with incorrect expected hash
[Check 9] Test psa_hash_verify with incorrect hash length
[Check 10] test psa_hash_verify with inactive & invalid operation handle
TEST RESULT: PASSED
******************************************
TEST: 214 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_finish with MD5 algorithm
[Check 2] Test psa_hash_finish with RIPEMD160 algorithm
[Check 3] Test psa_hash_finish with SHA1 algorithm
[Check 4] Test psa_hash_finish with SHA224 algorithm
[Check 5] Test psa_hash_finish with SHA256 algorithm
[Check 6] Test psa_hash_finish with SHA384 algorithm
[Check 7] Test psa_hash_finish with SHA512 algorithm
[Check 8] Test psa_hash_finish with invalid hash buffer size
[Check 9] test psa_hash_finish with inactive operation handle
TEST RESULT: PASSED
******************************************
TEST: 215 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_abort with MD5 algorithm
[Check 2] Test psa_hash_abort with RIPEMD160 algorithm
[Check 3] Test psa_hash_abort with SHA1 algorithm
[Check 4] Test psa_hash_abort with SHA224 algorithm
[Check 5] Test psa_hash_abort with SHA256 algorithm
[Check 6] Test psa_hash_abort with SHA384 algorithm
[Check 7] Test psa_hash_abort with SHA512 algorithm
[Check 8] Test psa_hash_finish after calling psa_hash_abort
TEST RESULT: PASSED
******************************************
TEST: 216 | DESCRIPTION: Testing crypto generator functions APIs | UT: psa_generate_key
[Info] Executing tests from non-secure
[Check 1] Test psa_generate_key 16 Byte AES
[Check 2] Test psa_generate_key 24 Byte AES
[Check 3] Test psa_generate_key 32 Byte AES
[Check 4] Test psa_generate_key with DES 64 bit key
[Check 5] Test psa_generate_key with Triple DES 2-Key
[Check 6] Test psa_generate_key with Triple DES 3-Key
[Check 7] Test psa_generate_key with RSA 2048 Keypair
[Check 8] Test psa_generate_key with ECC KeyPair
[Check 9] Test psa_generate_key with RSA 2048 Public key
[Check 10] Test psa_generate_key with invalid key type
[Check 11] Test psa_generate_key with invalid usage flags
TEST RESULT: PASSED
******************************************
TEST: 217 | DESCRIPTION: Testing crypto generation APIs | UT: psa_generate_random
[Info] Executing tests from non-secure
[Check 1] Test psa_generate_random to get 0 Byte data
[Check 2] Test psa_generate_random to get 16 Byte data
[Check 3] Test psa_generate_random to get 24 Byte data
[Check 4] Test psa_generate_random to get 32 Byte data
[Check 5] Test psa_generate_random to get 64 Byte data
[Check 6] Test psa_generate_random to get 128 Byte data
[Check 7] Test psa_generate_random to get 256 Byte data
[Check 8] Test psa_generate_random to get 512 Byte data
[Check 9] Test psa_generate_random to get 1000 Byte data
TEST RESULT: PASSED
******************************************
TEST: 218 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_key
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_input_key 16 Byte Key
[Check 2] Test psa_key_derivation_input_key with invalid usage
[Check 3] Test psa_key_derivation_input_key with step as label
[Check 4] Test psa_key_derivation_input_key with step as info
[Check 5] Test psa_key_derivation_input_key with step as seed
[Check 6] Test psa_key_derivation_input_key with step as salt
[Check 7] Test psa_key_derivation_input_key with key type as AES(not derive)
[Check 8] Test psa_key_derivation_input_key incorrect key algorithm
[Check 9] Test psa_key_derivation_input_key with key type as 2048 RSA public key
[Check 10] Test psa_key_derivation_input_key with key type as RSA 2048 keypair
[Check 11] Test psa_key_derivation_input_key with zero as step
[Check 12] Test psa_cipher_decrypt_setup - Invalid key handle
[Check 13] Test psa_cipher_decrypt_setup - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 219 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_key_agreement
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_key_agreement - ECDH SECP256R1
[Check 2] Test psa_key_derivation_key_agreement - Invalid step
[Check 3] Test psa_key_derivation_key_agreement - ECDH SECP384R1
[Check 4] Test psa_key_derivation_key_agreement - Invalid usage
[Check 5] Test psa_key_derivation_key_agreement - KDF not a key agreement alg
[Check 6] Test psa_key_derivation_key_agreement - Public key of different curve
[Check 7] Test psa_key_derivation_key_agreement - Pub key instead of Prv key
[Check 8] Test psa_key_derivation_key_agreement - Invalid handle
[Check 9] Test psa_key_derivation_key_agreement - Zero as handle
TEST RESULT: PASSED
******************************************
TEST: 220 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_bytes
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_output_bytes - HKDF
[Check 2] Test psa_key_derivation_output_bytes - optional salt
[Check 3] Test psa_key_derivation_output_bytes - capacity < output_length
[Check 4] Test psa_key_derivation_output_bytes - missing info
[Check 5] Test psa_key_derivation_output_bytes - missing salt/secret/info
[Check 6] Test psa_key_derivation_output_bytes - TLS12_PRF
[Check 7] Test psa_key_derivation_output_bytes - capacity < output_length
[Check 8] Test psa_key_derivation_output_bytes - missing seed/secret/label
TEST RESULT: PASSED
******************************************
TEST: 221 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_key
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_output_key - Key
[Check 2] Test psa_key_derivation_output_key - Info
[Check 3] Test psa_key_derivation_output_key - Salt
[Check 4] Test psa_key_derivation_output_key - Greater Capacity than available
[Check 5] Test psa_key_derivation_output_key - ECC Public key
[Check 6] Test psa_key_derivation_output_key - ECC keypair (wrong key length)
[Check 7] Test psa_key_derivation_output_key - RSA Public Key[Check 8] Test psa_key_derivation_output_key - RSA keypair
[Check 9] Test psa_key_derivation_output_key - Invalid key size
TEST RESULT: PASSED
******************************************
TEST: 222 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_abort
TEST RESULT: PASSED
******************************************
TEST: 223 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_set_get_capacity
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_set_get_capacity - < operation's capacity
[Check 2] Test psa_key_derivation_set_get_capacity - = operation's capacity
[Check 3] Test psa_key_derivation_set_get_capacity - > operation's capacity
[Check 4] Test psa_key_derivation_set_get_capacity - unchanged capacity
TEST RESULT: PASSED
******************************************
TEST: 224 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_encrypt - CCM - AES - 13B nonce & 8B add data
[Check 2] Test psa_aead_encrypt - CCM - AES - 13B nonce & 32B add data
[Check 3] Test psa_aead_encrypt - CCM - AES - 24 bytes Tag length = 4
[Check 4] Test psa_aead_encrypt - CCM - AES - Zero additional data
[Check 5] Test psa_aead_encrypt - CCM - AES - Zero plaintext
[Check 6] Test psa_aead_encrypt - GCM - AES - 12B nonce & 12B add data
[Check 7] Test psa_aead_encrypt - Unsupported algorithm
[Check 8] Test psa_aead_encrypt - Invalid usage flag
[Check 9] Test psa_aead_encrypt - Invalid ciphertext_size
[Check 10] Test psa_aead_encrypt - Invalid nonce
[Check 11] Test psa_aead_encrypt - Invalid tag length 0
TEST RESULT: PASSED
******************************************
TEST: 225 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_decrypt - CCM - AES - 13B nonce & 8B add data
[Check 2] Test psa_aead_decrypt - CCM - AES - 13B nonce & 32B add data
[Check 3] Test psa_aead_decrypt - CCM - AES - 24 bytes Tag length = 4
[Check 4] Test psa_aead_decrypt - CCM - AES - Zero additional data
[Check 5] Test psa_aead_decrypt - CCM - AES - Zero plaintext
[Check 6] Test psa_aead_decrypt - GCM - AES - 12B nonce & 12B add data
[Check 7] Test psa_aead_decrypt - Unsupported algorithm
[Check 8] Test psa_aead_decrypt - Invalid usage flag
[Check 9] Test psa_aead_decrypt - Invalid plaintext_size
[Check 10] Test psa_aead_decrypt - Invalid nonce
[Check 11] Test psa_aead_decrypt - Invalid cihpertext
[Check 12] Test psa_aead_decrypt - Invalid cihpertext_size
[Check 13] Test psa_aead_decrypt - Invalid tag length 0
TEST RESULT: PASSED
******************************************
TEST: 226 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_sign_setup - HMAC - SHA256
[Check 2] Test psa_mac_sign_setup - CMAC - AES
[Check 3] Test psa_mac_sign_setup - Incompatible HMAC for CMAC
[Check 4] Test psa_mac_sign_setup - Invalid usage flag
[Check 5] Test psa_mac_sign_setup - Invalid key type
[Check 6] Test psa_mac_sign_setup - Truncated MAC too large
[Check 7] Test psa_mac_sign_setup - Truncated MAC too small
[Check 8] Test psa_mac_sign_setup - Unknown MAC algorithm
[Check 9] Test psa_mac_sign_setup - Bad algorithm (not a MAC algorithm)
[Check 10] Test psa_mac_sign_setup invalid key handle
[Check 11] Test psa_mac_sign_setup zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 227 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_update
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_update - HMAC - SHA256 - 64 Byte
[Check 2] Test psa_mac_update - CMAC - AES - 16 Byte
[Check 3] Test psa_mac_update - HMAC - SHA512 - 32 Byte
[Check 4] Test psa_mac_update - HMAC - SHA512 - Invalid operation state
TEST RESULT: PASSED
******************************************
TEST: 228 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_sign_finish - HMAC - SHA224
[Check 2] Test psa_mac_sign_finish - HMAC - SHA256
[Check 3] Test psa_mac_sign_finish - HMAC - SHA512
[Check 4] Test psa_mac_sign_finish - HMAC - SHA224 - Truncated 8 Byte
[Check 5] Test psa_mac_sign_finish - HMAC - SHA224 - Small output buffer
[Check 6] Test psa_mac_sign_finish - HMAC - SHA224 - Invalid operation state
[Check 7] Test psa_mac_sign_finish - CMAC - AES
TEST RESULT: PASSED
******************************************
TEST: 229 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify_setup - HMAC - SHA256
[Check 2] Test psa_mac_verify_setup - CMAC - AES
[Check 3] Test psa_mac_verify_setup - Incompatible HMAC for CMAC
[Check 4] Test psa_mac_verify_setup - Invalid usage flag
[Check 5] Test psa_mac_verify_setup - Invalid key type
[Check 6] Test psa_mac_verify_setup - Truncated MAC too large
[Check 7] Test psa_mac_verify_setup - Truncated MAC too small
[Check 8] Test psa_mac_verify_setup - Unknown MAC algorithm
[Check 9] Test psa_mac_verify_setup - Bad algorithm (not a MAC algorithm)
[Check 10] Test psa_mac_verify_setup invalid key handle
[Check 11] Test psa_mac_verify_setup zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 230 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify_finish - HMAC - SHA224
[Check 2] Test psa_mac_verify_finish - HMAC - SHA256
[Check 3] Test psa_mac_verify_finish - HMAC - SHA512
[Check 4] Test psa_mac_verify_finish - HMAC - SHA224 - Truncated 8 Byte
[Check 5] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid mac length
[Check 6] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid expected mac
[Check 7] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid operation state
[Check 8] Test psa_mac_verify_finish - CMAC - AES
TEST RESULT: PASSED
******************************************
TEST: 231 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_abort - HMAC - SHA224
[Check 2] Test psa_mac_abort - HMAC - SHA224 - Truncated 8 Byte
[Check 3] Test psa_mac_abort - HMAC - SHA256
[Check 4] Test psa_mac_abort - HMAC - SHA512
[Check 5] Test psa_mac_abort - CMAC - AES
[Check 6] Test psa_mac_sign_finish after calling psa_mac_abort
TEST RESULT: PASSED
******************************************
TEST: 232 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_encrypt_setup 16 Byte AES
[Check 2] Test psa_cipher_encrypt_setup 24 Byte AES
[Check 3] Test psa_cipher_encrypt_setup 32 Byte AES
[Check 4] Test psa_cipher_encrypt_setup DES 64 bit key
[Check 5] Test psa_cipher_encrypt_setup Triple DES 2-Key
[Check 6] Test psa_cipher_encrypt_setup Triple DES 3-Key
[Check 7] Test psa_cipher_encrypt_setup 16 Byte raw data
[Check 8] Test psa_cipher_encrypt_setup - not a cipher algorithm
[Check 9] Test psa_cipher_encrypt_setup - unknown cipher algorithm
[Check 10] Test psa_cipher_encrypt_setup - incompatible key ARC4
[Check 11] Test psa_cipher_encrypt_setup - incorrect usage
[Check 12] Test psa_cipher_encrypt_setup - RSA public key
[Check 13] Test psa_cipher_encrypt_setup - RSA keypair
[Check 14] Test psa_cipher_encrypt_setup - EC Public key
[Check 15] Test psa_cipher_encrypt_setup - EC keypair
[Check 16] Test psa_cipher_encrypt_setup - Invalid key handle
[Check 17] Test psa_cipher_encrypt_setup - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 233 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_decrypt_setup 16 Byte AES
[Check 2] Test psa_cipher_decrypt_setup 24 Byte AES
[Check 3] Test psa_cipher_decrypt_setup 32 Byte AES
[Check 4] Test psa_cipher_decrypt_setup DES 64 bit key
[Check 5] Test psa_cipher_decrypt_setup Triple DES 2-Key
[Check 6] Test psa_cipher_decrypt_setup Triple DES 3-Key
[Check 7] Test psa_cipher_decrypt_setup 16 Byte raw data
[Check 8] Test psa_cipher_decrypt_setup - not a cipher algorithm
[Check 9] Test psa_cipher_decrypt_setup - unknown cipher algorithm
[Check 10] Test psa_cipher_decrypt_setup - incompatible key ARC4
[Check 11] Test psa_cipher_decrypt_setup - incorrect usage
[Check 12] Test psa_cipher_decrypt_setup - RSA public key
[Check 13] Test psa_cipher_decrypt_setup - RSA keypair
[Check 14] Test psa_cipher_decrypt_setup - EC Public key
[Check 15] Test psa_cipher_decrypt_setup - EC keypair
[Check 16] Test psa_cipher_decrypt_setup - Invalid key handle
[Check 17] Test psa_cipher_decrypt_setup - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 234 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_generate_iv
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_generate_iv 16 Byte AES
[Check 2] Test psa_cipher_generate_iv 24 Byte AES
[Check 3] Test psa_cipher_generate_iv 32 Byte AES
[Check 4] Test psa_cipher_generate_iv DES 64 bit key
[Check 5] Test psa_cipher_generate_iv DES 2-Key
[Check 6] Test psa_cipher_generate_iv DES 3-Key
[Check 7] Test psa_cipher_generate_iv AES - small iv buffer
[Check 8] Test psa_cipher_generate_iv DES - small iv buffer
TEST RESULT: PASSED
******************************************
TEST: 235 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_set_iv
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_set_iv 16 Byte AES
[Check 2] Test psa_cipher_set_iv 24 Byte AES
[Check 3] Test psa_cipher_set_iv 32 Byte AES
[Check 4] Test psa_cipher_set_iv DES 64 bit key
[Check 5] Test psa_cipher_set_iv DES 2-Key
[Check 6] Test psa_cipher_set_iv DES 3-Key
[Check 7] Test psa_cipher_set_iv AES - small iv buffer
[Check 8] Test psa_cipher_set_iv DES - small iv buffer
[Check 9] Test psa_cipher_set_iv AES - large iv buffer
[Check 10] Test psa_cipher_set_iv DES - large iv buffer
TEST RESULT: PASSED
******************************************
TEST: 236 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_update
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING (Short in)
[Check 3] Test psa_cipher_update - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_update - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_update - Encrypt - AES CTR
[Check 6] Test psa_cipher_update - Encrypt - DES CBC (nopad)
[Check 7] Test psa_cipher_update - Encrypt - 2-key 3DE -CBC (nopad)
[Check 8] Test psa_cipher_update - Encrypt - 3-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_update - Encrypt - small output buffer size
[Check 10] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING
[Check 11] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING (Short in)
[Check 12] Test psa_cipher_update - Decrypt - AES CBC_PKCS7
[Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7 (Short input)
[Check 14] Test psa_cipher_update - Decrypt - AES CTR
[Check 15] Test psa_cipher_update - Decrypt - DES CBC (nopad)
[Check 16] Test psa_cipher_update - Decrypt - 2-key 3DE -CBC (nopad)
[Check 17] Test psa_cipher_update - Decrypt - 3-key 3DE -CBC (nopad)
[Check 18] Test psa_cipher_update - Decrypt - small output buffer size
[Check 19] Test psa_cipher_update without cipher setup
TEST RESULT: PASSED
******************************************
TEST: 237 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING (Short in)
[Check 3] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_finish - Encrypt - AES CTR
[Check 6] Test psa_cipher_finish - Encrypt - AES CTR (short input)
[Check 7] Test psa_cipher_finish - Encrypt - DES CBC (nopad)
[Check 8] Test psa_cipher_finish - Encrypt - 2-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_finish - Encrypt - 3-key 3DE -CBC (nopad)
[Check 10] Test psa_cipher_finish - Encrypt - small output buffer size
[Check 11] Test psa_cipher_finish - Decrypt - AES CBC_NO_PADDING
[Check 12] Test psa_cipher_finish - Decrypt - AES CBC_NO_PADDING (Short in)
[Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7
[Check 14] Test psa_cipher_finish - Decrypt - AES CBC_PKCS7 (Short input)
[Check 15] Test psa_cipher_finish - Decrypt - AES CTR
[Check 16] Test psa_cipher_finish - Decrypt - AES CTR (short input)
[Check 17] Test psa_cipher_finish - Decrypt - DES CBC (nopad)
[Check 18] Test psa_cipher_finish - Decrypt - 2-key 3DE -CBC (nopad)
[Check 19] Test psa_cipher_finish - Decrypt - 3-key 3DE -CBC (nopad)
TEST RESULT: PASSED
******************************************
TEST: 238 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_abort - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_abort - Encrypt - AES CBC_PKCS7
[Check 3] Test psa_cipher_abort - Encrypt - AES CTR
[Check 4] Test psa_cipher_abort - Encrypt - DES CBC (nopad)
[Check 5] Test psa_cipher_abort - Encrypt - 2-key 3DE -CBC (nopad)
[Check 6] Test psa_cipher_abort - Encrypt - 3-key 3DE -CBC (nopad)
[Check 7] Test psa_cipher_abort - Decrypt - AES CBC_NO_PADDING
[Check 8] Test psa_cipher_abort - Decrypt - AES CBC_PKCS7
[Check 9] Test psa_cipher_abort - Decrypt - AES CTR
[Check 10] Test psa_cipher_abort - Decrypt - DES CBC (nopad)
[Check 11] Test psa_cipher_abort - Decrypt - 2-key 3DE -CBC (nopad)
[Check 12] Test psa_cipher_abort - Decrypt - 3-key 3DE -CBC (nopad)
[Check 13] Test psa_cipher_update after psa_cipher_abort should fail
TEST RESULT: PASSED
******************************************
TEST: 239 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_asymmetric_encrypt - RSA PKCS1V15
[Check 2] Test psa_asymmetric_encrypt - RSA KEY_PAIR PKCS1V15
[Check 3] Test psa_asymmetric_encrypt - RSA OAEP SHA256
[Check 4] Test psa_asymmetric_encrypt - RSA OAEP SHA256 with label
[Check 5] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256
[Check 6] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256 with label
[Check 7] Test psa_asymmetric_encrypt - Small output buffer
[Check 8] Test psa_asymmetric_encrypt - Invalid algorithm
[Check 9] Test psa_asymmetric_encrypt - Invalid key type
[Check 10] Test psa_asymmetric_encrypt - Invalid usage
[Check 11] Test psa_asymmetric_encrypt - RSA PKCS1V15 - Salt
[Check 12] Test psa_asymmetric_encrypt - ECC public key
[Check 13] Test psa_asymmetric_encrypt - Invalid key handle
[Check 14] Test psa_asymmetric_encrypt - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 240 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_asymmetric_decrypt - RSA KEY_PAIR PKCS1V15
[Check 2] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256
[Check 3] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256 with label
[Check 4] Test psa_asymmetric_decrypt - Invalid key type (RSA public key)
[Check 5] Test psa_asymmetric_decrypt - Small output buffer
[Check 6] Test psa_asymmetric_decrypt - Invalid algorithm
[Check 7] Test psa_asymmetric_decrypt - Invalid key type (AES Key)
[Check 8] Test psa_asymmetric_decrypt - Invalid usage
[Check 9] Test psa_asymmetric_decrypt - RSA PKCS1V15 - Salt
[Check 10] Test psa_asymmetric_decrypt - Invalid key handle
[Check 11] Test psa_asymmetric_decrypt - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 241 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_sign_hash
[Info] Executing tests from non-secure
[Check 1] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 3] Test psa_sign_hash - ECDSA SECP256R1 SHA-256
[Check 4] Test psa_sign_hash - Invalid key type (RSA public key)
[Check 5] Test psa_sign_hash - Small output buffer
[Check 6] Test psa_sign_hash - Invalid algorithm
[Check 7] Test psa_sign_hash - Invalid key type (AES Key)
[Check 8] Test psa_sign_hash - Invalid usage
[Check 9] Test psa_sign_hash - Wrong hash size
[Check 10] Test psa_sign_hash - Invalid key handle
[Check 11] Test psa_sign_hash - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 242 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_verify_hash
[Info] Executing tests from non-secure
[Check 1] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 3] Test psa_verify_hash - ECDSA KEY_PAIR SECP256R1 SHA-256
[Check 4] Test psa_verify_hash - EC public key
[Check 5] Test psa_verify_hash - RSA public key
[Check 6] Test psa_verify_hash - Small output buffer
[Check 7] Test psa_verify_hash - Invalid algorithm
[Check 8] Test psa_verify_hash - Invalid key type (AES Key)
[Check 9] Test psa_verify_hash - Invalid usage
[Check 10] Test psa_verify_hash - Wrong hash size
[Check 11] Test psa_verify_hash - Wrong signature
[Check 12] Test psa_verify_hash - Wrong signature size
[Check 13] Test psa_verify_hash - Invalid key handle
[Check 14] Test psa_verify_hash - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 243 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_raw_key_agreement
[Info] Executing tests from non-secure
[Check 1] Test psa_raw_key_agreement - ECDH SECP256R1
[Check 2] Test psa_raw_key_agreement - Small buffer size
[Check 3] Test psa_raw_key_agreement - ECDH SECP384R1
[Check 4] Test psa_raw_key_agreement - Invalid usage
[Check 5] Test psa_raw_key_agreement - Unknown KDF
[Check 6] Test psa_raw_key_agreement - Not a key agreement alg
[Check 7] Test psa_raw_key_agreement - Public key on different curve
[Check 8] Test psa_raw_key_agreement - Public key instead of private key
[Check 9] Test psa_raw_key_agreement - Invalid key handle
[Check 10] Test psa_raw_key_agreement - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 244 | DESCRIPTION: Testing crypto key management APIs | UT: psa_copy_key
[Info] Executing tests from non-secure
[Check 1] Test psa_copy_key - 2048 RSA public key
[Check 2] Test psa_copy_key - RSA 2048 keypair
[Check 3] Test psa_copy_key - Incompatible target policy(source and target)
[Check 4] Test psa_copy_key - source key with no export usage
[Check 5] Test psa_copy_key - DES 64 bit key
[Check 6] Test psa_copy_key - Triple DES 2-Key
[Check 7] Test psa_copy_key - Triple DES 3-Key
[Check 8] Test psa_copy_key - EC Public key
[Check 9] Test psa_copy_key - EC keypair
TEST RESULT: PASSED
******************************************
TEST: 245 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_clone
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_clone - MD5 algorithm
[Check 2] Test psa_hash_clone - RIPEMD160 algorithm
[Check 3] Test psa_hash_clone - SHA1 algorithm
[Check 4] Test psa_hash_clone - SHA224 algorithm
[Check 5] Test psa_hash_clone - SHA256 algorithm
[Check 6] Test psa_hash_clone - SHA384 algorithm
[Check 7] Test psa_hash_clone - SHA512 algorithm
[Check 8] Test psa_hash_clone - from an inactive source operation
[Check 9] Test psa_hash_clone - on an active target operation
TEST RESULT: PASSED
******************************************
TEST: 246 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_compute
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_compute HMAC SHA 224
[Check 2] Test psa_mac_compute - Incompactible HMAC for CMAC
[Check 3] Test psa_mac_compute - Invalid usage
[Check 4] Test psa_mac_compute - truncated MAC too small
[Check 5] Test psa_mac_compute - truncated MAC too large
[Check 6] Test psa_mac_compute - bad algorithm (unknown MAC algorithm)
[Check 7] Test psa_mac_compute HMAC SHA 256
[Check 8] Test psa_mac_compute HMAC SHA 512
[Check 9] Test psa_mac_compute HMAC SHA 224 (truncated to 8 Byte)
[Check 10] Test psa_mac_compute CMAC AES 128
[Check 11] Test psa_mac_compute small size buffer
[Check 12] Test psa_mac_compute - Invalid key type
TEST RESULT: PASSED
******************************************
TEST: 247 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify HMAC SHA 224
[Check 2] Test psa_mac_verify HMAC SHA 256
[Check 3] Test psa_mac_verify - Incompactible HMAC for CMAC
[Check 4] Test psa_mac_verify - Invalid usage
[Check 5] Test psa_mac_verify - Truncated MAC too large
[Check 6] Test psa_mac_verify - Truncated MAC too small
[Check 7] Test psa_mac_verify - bad algorithm (unknown MAC algorithm)
[Check 8] Test psa_mac_verify HMAC SHA 512
[Check 9] Test psa_mac_verify HMAC SHA 224 (truncated to 8 Byte)
[Check 10] Test psa_mac_verify CMAC AES 128
[Check 11] Test psa_mac_verify - Invalid key type
[Check 12] Test psa_mac_verify small size buffer
[Check 13] Test psa_mac_verify incorrect expected MAC
TEST RESULT: PASSED
******************************************
TEST: 248 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING (Short input)
[Check 3] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_encrypt - Encrypt - AES CTR
[Check 6] Test psa_cipher_encrypt - Encrypt - AES CTR (short input)
[Check 7] Test psa_cipher_encrypt - Encrypt - DES CBC (nopad)
[Check 8] Test psa_cipher_encrypt - Encrypt - 2-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_encrypt - Encrypt - 3-key 3DE -CBC (nopad)
[Check 10] Test psa_cipher_encrypt - small output buffer size
[Check 11] Test psa_cipher_encrypt - Decrypt - AES CBC_NO_PADDING
TEST RESULT: PASSED
******************************************
TEST: 249 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_decrypt - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING
[Check 3] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING (Short input)
[Check 4] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING
[Check 5] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7
[Check 6] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7 (Short input)
[Check 7] Test psa_cipher_decrypt - Decrypt - AES CTR
[Check 8] Test psa_cipher_decrypt - Decrypt - DES CBC (nopad)
[Check 9] Test psa_cipher_decrypt - Decrypt - 2-key 3DE -CBC (nopad)
[Check 10] Test psa_cipher_decrypt - 3-key 3DE -CBC (nopad)
TEST RESULT: PASSED
******************************************
TEST: 250 | DESCRIPTION: Testing crypto key management APIs | UT: psa_sign_message
[Info] Executing tests from non-secure
[Check 1] Test psa_sign_message - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_sign_message - ECDSA SECP256R1 SHA-256
[Check 3] Test psa_sign_message - Invalid key type (RSA public key)
[Check 4] Test psa_sign_message - Small output buffer
[Check 5] Test psa_sign_message - Invalid algorithm
[Check 6] Test psa_sign_message - Invalid key type (AES Key)
[Check 7] Test psa_sign_message - Invalid usage
[Check 8] Test psa_sign_message - Mismatch key type and Algorithm
[Check 9] Test psa_sign_message - Alg mismatch in key and API call
[Check 10] Test psa_sign_message - Invalid key handle
[Check 11] Test psa_sign_message - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 251 | DESCRIPTION: Testing crypto key management APIs | UT: psa_verify_message
[Info] Executing tests from non-secure
[Check 1] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_verify_message - RSA Public Key PKCS1V15 RAW
[Check 3] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 4] Test psa_verify_message - ECDSA KEY_PAIR SECP256R1 SHA-256
[Check 5] Test psa_verify_message - ECDSA Public Key SECP256R1 SHA-256
[Check 6] Test psa_verify_message - Small output buffer
[Check 7] Test psa_verify_message - Invalid algorithm
[Check 8] Test psa_verify_message - Invalid key type (AES Key)
[Check 9] Test psa_verify_message - Invalid usage
[Check 10] Test psa_verify_message - Wrong message size
[Check 11] Test psa_verify_message - Wrong signature
[Check 12] Test psa_verify_message - Wrong signature size
[Check 13] Test psa_verify_message - Invalid key handle
[Check 14] Test psa_verify_message - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 252 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_encrypt_setup - CCM - AES
[Check 2] Test psa_aead_encrypt_setup - CCM - AES - Tag length = 4
[Check 3] Test psa_aead_encrypt_setup - CCM - AES - Mismatched tag length
[Check 4] Test psa_aead_encrypt_setup - CCM - AES - Default Tag length
[Check 5] Test psa_aead_encrypt_setup - GCM - AES
[Check 6] Test psa_aead_encrypt_setup - CCM - DES Invalid key
[Check 7] Test psa_aead_encrypt_setup - Invalid usage flag
TEST RESULT: PASSED
******************************************
TEST: 253 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_decrypt_setup - CCM - AES
[Check 2] Test psa_aead_decrypt_setup - CCM - AES - Tag length = 4
[Check 3] Test psa_aead_decrypt_setup - CCM - AES - Mismatched tag length
[Check 4] Test psa_aead_decrypt_setup - CCM - AES - Default Tag length
[Check 5] Test psa_aead_decrypt_setup - GCM - AES
[Check 6] Test psa_aead_decrypt_setup - CCM - DES Invalid key
[Check 7] Test psa_aead_decrypt_setup - Invalid usage flag
TEST RESULT: PASSED
******************************************
TEST: 254 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_generate_nonce
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_generate_nonce - CCM
[Check 2] Test psa_aead_generate_nonce - CCM - Tag length = 4
[Check 3] Test psa_aead_generate_nonce - CCM - Small buffer size
[Check 4] Test psa_aead_generate_nonce - CCM - Uninitialized operation
[Check 5] Test psa_aead_generate_nonce - CCM - Decrypt operation
[Check 6] Test psa_aead_generate_nonce - GCM
[Check 7] Test psa_aead_generate_nonce - GCM - Decrypt operation
TEST RESULT: PASSED
******************************************
TEST: 255 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_nonce
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_set_nonce - Encrypt - CCM
[Check 2] Test psa_aead_set_nonce - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_set_nonce - Encrypt - CCM - Small nonce size
[Check 4] Test psa_aead_set_nonce - Encrypt - CCM - Large nonce size
[Check 5] Test psa_aead_set_nonce - Encrypt - CCM - Invalid operation state
[Check 6] Test psa_aead_set_nonce - Encrypt - GCM
[Check 7] Test psa_aead_set_nonce - Decrypt - CCM
[Check 8] Test psa_aead_set_nonce - Decrypt - CCM - Tag length = 4
[Check 9] Test psa_aead_set_nonce - Decrypt - CCM - Small nonce size
[Check 10] Test psa_aead_set_nonce - Decrypt - CCM - Large nonce size
[Check 11] Test psa_aead_set_nonce - Decrypt - CCM - Invalid operation state
[Check 12] Test psa_aead_set_nonce - Decrypt - GCM
TEST RESULT: PASSED
******************************************
TEST: 256 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_lengths
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_set_lengths - Encrypt - CCM
[Check 2] Test psa_aead_set_lengths - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_set_lengths - Encrypt - CCM - Zero ad_length
[Check 4] Test psa_aead_set_lengths - Encrypt - CCM - Zero plaintext_length
[Check 5] Test psa_aead_set_lengths - Encrypt - CCM - Invalid operation state
[Check 6] Test psa_aead_set_lengths - Encrypt - GCM
[Check 7] Test psa_aead_set_lengths - Decrypt - CCM
[Check 8] Test psa_aead_set_lengths - Decrypt - CCM - Tag length = 4
[Check 9] Test psa_aead_set_lengths - Decrypt - CCM - Zero ad_length
[Check 10] Test psa_aead_set_lengths - Decrypt - CCM - Zero plaintext_length
[Check 11] Test psa_aead_set_lengths - Decrypt - CCM - Invalid operation state
[Check 12] Test psa_aead_set_lengths - Decrypt - GCM
TEST RESULT: PASSED
******************************************
TEST: 257 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update_ad
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_update_ad - Encrypt - CCM
[Check 2] Test psa_aead_update_ad - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_update_ad - Encrypt - CCM - Zero ad_length
[Check 4] Test psa_aead_update_ad - Encrypt - CCM - Zero plaintext_length
[Check 5] Test psa_aead_update_ad - Encrypt - CCM - Invalid operation state
[Check 6] Test psa_aead_update_ad - Encrypt - CCM - Overflow input length
[Check 7] Test psa_aead_update_ad - Decrypt - CCM
[Check 8] Test psa_aead_update_ad - Decrypt - CCM - Tag length = 4
[Check 9] Test psa_aead_update_ad - Decrypt - CCM - Zero ad_length
[Check 10] Test psa_aead_update_ad - Decrypt - CCM - Zero plaintext_length
[Check 11] Test psa_aead_update_ad - Decrypt - CCM - Invalid operation state
[Check 12] Test psa_aead_update_ad - Decrypt - CCM - Overflow input length
TEST RESULT: PASSED
******************************************
TEST: 258 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_update - Encrypt - CCM
[Check 2] Test psa_aead_update - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_update - Encrypt - CCM - Zero ad_length
[Check 4] Test psa_aead_update - Encrypt - CCM - Zero plaintext_length
[Check 5] Test psa_aead_update - Encrypt - CCM - Small buffer size
[Check 6] Test psa_aead_update - Encrypt - CCM - Less add data than specified
[Check 7] Test psa_aead_update - Encrypt - CCM - Overflow input length
[Check 8] Test psa_aead_update - Encrypt - CCM - Invalid operation state
[Check 9] Test psa_aead_update - Decrypt - CCM
[Check 10] Test psa_aead_update - Decrypt - CCM - Tag length = 4
[Check 11] Test psa_aead_update - Decrypt - CCM - Zero ad_length
[Check 12] Test psa_aead_update - Decrypt - CCM - Zero plaintext_length
[Check 13] Test psa_aead_update - Decrypt - CCM - Small buffer size
[Check 14] Test psa_aead_update - Decrypt - Less add data than specified
[Check 15] Test psa_aead_update - Decrypt - CCM - Overflow input length
[Check 16] Test psa_aead_update - Decrypt - CCM - Invalid operation state
TEST RESULT: PASSED
******************************************
TEST: 259 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_finish - AES-CCM
[Check 2] Test psa_aead_finish - AES-CCM 24 bytes Tag length = 4
[Check 3] Test psa_aead_finish - Small buffer size
[Check 4] Test psa_aead_finish - Input length is less than plaintext length
[Check 5] Test psa_aead_finish - GCM - 16B AES - 12B Nonce & 12B additional data
TEST RESULT: PASSED
******************************************
TEST: 260 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_abort - Encrypt - CCM - AES
[Check 2] Test psa_aead_abort - Encrypt - GCM - AES
[Check 3] Test psa_aead_abort - Decrypt - CCM - AES
[Check 4] Test psa_aead_abort - Decrypt - GCM - AES
[Check 5] Test psa_aead_abort with all initializations
TEST RESULT: PASSED
******************************************
TEST: 261 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_verify - AES-CCM
[Check 2] Test psa_aead_verify - AES-CCM 24 bytes Tag length = 4
[Check 3] Test psa_aead_verify - Small buffer size
[Check 4] Test psa_aead_verify - Input length is less than plaintext length
[Check 5] Test psa_aead_verify - GCM - 16B AES - 12B Nounce & 12B addi data
TEST RESULT: PASSED
******************************************
************ Crypto Suite Report **********
TOTAL TESTS : 61
TOTAL PASSED : 61
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
Entering standby..
```
```
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-iat-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Attestation Suite
******************************************
TEST: 601 | DESCRIPTION: Testing attestation initial attestation APIs | UT: psa_initial_attestation
[Info] Executing tests from non-secure
[Check 1] Test psa_initial_attestation_get_token with Challenge 32
[Check 2] Test psa_initial_attestation_get_token with Challenge 48
[Check 3] Test psa_initial_attestation_get_token with Challenge 64
[Check 4] Test psa_initial_attestation_get_token with zero challenge size
[Check 5] Test psa_initial_attestation_get_token with small challenge size
[Check 6] Test psa_initial_attestation_get_token with invalid challenge size
[Check 7] Test psa_initial_attestation_get_token with large challenge size
[Check 8] Test psa_initial_attestation_get_token with zero as token size
[Check 9] Test psa_initial_attestation_get_token with small token size
[Check 10] Test psa_initial_attestation_get_token_size with Challenge 32
[Check 11] Test psa_initial_attestation_get_token_size with Challenge 48
[Check 12] Test psa_initial_attestation_get_token_size with Challenge 64
[Check 13] Test psa_initial_attestation_get_token_size with zero challenge size
[Check 14] Test psa_initial_attestation_get_token_size with small challenge size
[Check 15] Test psa_initial_attestation_get_token_size with invalid challenge size
[Check 16] Test psa_initial_attestation_get_token_size with large challenge size
TEST RESULT: PASSED
******************************************
************ Attestation Suite Report **********
TOTAL TESTS : 1
TOTAL PASSED : 1
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
Entering standby..
```
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-its-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Storage Suite
******************************************
TEST: 401 | DESCRIPTION: UID not found check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call get API for UID 6 which is not set
[Check 2] Call get_info API for UID 6 which is not set
[Check 3] Call remove API for UID 6 which is not set
[Check 4] Call get API for UID 6 which is removed
[Check 5] Call get_info API for UID 6 which is removed
[Check 6] Call remove API for UID 6 which is removed
Set storage for UID 6
[Check 7] Call get API for different UID 5
[Check 8] Call get_info API for different UID 5
[Check 9] Call remove API for different UID 5
TEST RESULT: PASSED
******************************************
TEST: 402 | DESCRIPTION: Write once error check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Update the flag of UID 1 with WRITE_ONCE flag
[Check 2] Try to remove the UID 1 having WRITE_ONCE flag
[Check 3] Create a new UID 2 with WRITE_ONCE flag
[Check 4] Try to remove the UID 2 having WRITE_ONCE flag
[Check 5] Try to change the length of write_once UID 2
[Check 6] Check UID removal still fails
[Check 7] Try to change the WRITE_ONCE flag to None for UID 2
[Check 8] Check UID removal still fails
TEST RESULT: PASSED
******************************************
TEST: 403 | DESCRIPTION: Insufficient space check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Overload storage space
UID 13 set failed due to insufficient space
Remove all registered UIDs
[Check 2] Overload storage again to verify all previous UID removed
UID 13 set failed due to insufficient space
Remove all registered UIDs
TEST RESULT: PASSED
******************************************
TEST: 404 | DESCRIPTION: Data Consistency check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2
[Check 2] Call get API with default length - TEST_BUFF_SIZE
TEST RESULT: PASSED
******************************************
TEST: 405 | DESCRIPTION: Success scenarios check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Set UID with data length zero and call storage APIs
[Check 2] Resetting the length check
TEST RESULT: PASSED
******************************************
TEST: 406 | DESCRIPTION: Check for storage create flags | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE
[Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY
[Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION
TEST RESULT: PASSED
******************************************
TEST: 407 | DESCRIPTION: Incorrect Size check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
Create a valid Storage - TEST_BUFF_SIZE/2
Increase the length of storage - TEST_BUFF_SIZE
[Check 1] Call get API with old length - TEST_BUFF_SIZE/2
[Check 2] Call get API with old length - TEST_BUFF_SIZE/4
Decrease the length of storage - TEST_BUFF_SIZE/4
[Check 3] Call get API with old length - TEST_BUFF_SIZE/2
[Check 4] Call get API with old length - TEST_BUFF_SIZE
[Check 5] Call get API with valid length - TEST_BUFF_SIZE/4
TEST RESULT: PASSED
******************************************
TEST: 408 | DESCRIPTION: Invalid offset check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Try to access data with varying valid offset
[Check 2] Try to access data with varying invalid offset
TEST RESULT: PASSED
******************************************
TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call set API with NULL pointer and data length 0
[Check 2] Call get API with NULL read buffer and data length 0
[Check 3] Remove the UID
[Check 4] Call get_info API to verify UID removed
[Check 5] Create UID with zero data_len and valid write buffer
[Check 8] Call get API with NULL read buffer and data length 0
[Check 9] Increase the length
TEST RESULT: PASSED
******************************************
TEST: 410 | DESCRIPTION: UID value zero check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Creating storage with UID 0 should fail
[Check 2] Get_info for UID 0 should fail
[Check 3] Removing storage with UID 0 should fail
TEST RESULT: PASSED
******************************************
************ Storage Suite Report **********
TOTAL TESTS : 10
TOTAL PASSED : 10
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
Entering standby..
```
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-ps-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Storage Suite
******************************************
TEST: 401 | DESCRIPTION: UID not found check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call get API for UID 6 which is not set
[Check 2] Call get_info API for UID 6 which is not set
[Check 3] Call remove API for UID 6 which is not set
[Check 4] Call get API for UID 6 which is removed
[Check 5] Call get_info API for UID 6 which is removed
[Check 6] Call remove API for UID 6 which is removed
Set storage for UID 6
[Check 7] Call get API for different UID 5
[Check 8] Call get_info API for different UID 5
[Check 9] Call remove API for different UID 5
TEST RESULT: PASSED
******************************************
TEST: 402 | DESCRIPTION: Write once error check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Update the flag of UID 1 with WRITE_ONCE flag
[Check 2] Try to remove the UID 1 having WRITE_ONCE flag
[Check 3] Create a new UID 2 with WRITE_ONCE flag
[Check 4] Try to remove the UID 2 having WRITE_ONCE flag
[Check 5] Try to change the length of write_once UID 2
[Check 6] Check UID removal still fails
[Check 7] Try to change the WRITE_ONCE flag to None for UID 2
[Check 8] Check UID removal still fails
TEST RESULT: PASSED
******************************************
TEST: 403 | DESCRIPTION: Insufficient space check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Overload storage space
UID 13 set failed due to insufficient space
Remove all registered UIDs
[Check 2] Overload storage again to verify all previous UID removed
UID 13 set failed due to insufficient space
Remove all registered UIDs
TEST RESULT: PASSED
******************************************
TEST: 404 | DESCRIPTION: Data Consistency check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2
[ 34.396662] random: crng init done
[Check 2] Call get API with default length - TEST_BUFF_SIZE
TEST RESULT: PASSED
******************************************
TEST: 405 | DESCRIPTION: Success scenarios check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Set UID with data length zero and call storage APIs
[Check 2] Resetting the length check
TEST RESULT: PASSED
******************************************
TEST: 406 | DESCRIPTION: Check for storage create flags | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE
[Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY
[Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION
TEST RESULT: PASSED
******************************************
TEST: 407 | DESCRIPTION: Incorrect Size check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Create a valid Storage - TEST_BUFF_SIZE/2
Increase the length of storage - TEST_BUFF_SIZE
[Check 1] Call get API with old length - TEST_BUFF_SIZE/2
[Check 2] Call get API with old length - TEST_BUFF_SIZE/4
Decrease the length of storage - TEST_BUFF_SIZE/4
[Check 3] Call get API with old length - TEST_BUFF_SIZE/2
[Check 4] Call get API with old length - TEST_BUFF_SIZE
[Check 5] Call get API with valid length - TEST_BUFF_SIZE/4
TEST RESULT: PASSED
******************************************
TEST: 408 | DESCRIPTION: Invalid offset check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Try to access data with varying valid offset
[Check 2] Try to access data with varying invalid offset
TEST RESULT: PASSED
******************************************
TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call set API with NULL pointer and data length 0
[Check 2] Call get API with NULL read buffer and data length 0
[Check 3] Remove the UID
[Check 4] Call get_info API to verify UID removed
[Check 5] Create UID with zero data_len and valid write buffer
[Check 8] Call get API with NULL read buffer and data length 0
[Check 9] Increase the length
TEST RESULT: PASSED
******************************************
TEST: 410 | DESCRIPTION: UID value zero check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Creating storage with UID 0 should fail
[Check 2] Get_info for UID 0 should fail
[Check 3] Removing storage with UID 0 should fail
TEST RESULT: PASSED
******************************************
TEST: 411 | DESCRIPTION: Optional APIs: UID not found check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 412 | DESCRIPTION: Optional APIs: Invalid arguments and offset invalid | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 413 | DESCRIPTION: Set_Extended and Create api : Success | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 414 | DESCRIPTION: Optional APIs not supported check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Optional PS APIs are not supported.
[Check 1] Call to create API should fail as API not supported
Failed at Checkpoint: 1
Actual: 0
Expected: -134
TEST RESULT: FAILED (Error Code=0x1)
******************************************
TEST: 415 | DESCRIPTION: Create API write_once flag value check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 416 | DESCRIPTION: Storage assest capacity modification check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs not are supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 417 | DESCRIPTION: Storage assest capacity modification check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs not are supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
************ Storage Suite Report **********
TOTAL TESTS : 17
TOTAL PASSED : 10
TOTAL SIM ERROR : 0
TOTAL FAILED : 1
TOTAL SKIPPED : 6
******************************************
Entering standby..
```
**Component test**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/component-test -v
TEST(BlockVolumeTests, oversizeWrite) - 33881 ms
TEST(BlockVolumeTests, multipleImageInstall) - 680 ms
TEST(BlockVolumeTests, seekAccess) - 223 ms
TEST(BlockVolumeTests, readAndWrite) - 521 ms
TEST(BlockVolumeTests, openClose) - 108 ms
IGNORE_TEST(PartitionTableTests, detectCorruptedGptHeader) - 0 ms
TEST(PartitionTableTests, detectCorruptedMbr) - 26523 ms
TEST(PartitionTableTests, loadRefPartitionTable) - 21382 ms
TEST(GptIteratorTests, iterateOverRefGpt) - 22587 ms
TEST(UefiVariableStoreTests, noRemoveCheck) - 2044 ms
TEST(UefiVariableStoreTests, readOnlycheck) - 585 ms
TEST(UefiVariableStoreTests, unsupportedAttribute) - 326 ms
TEST(UefiVariableStoreTests, failedNvSet) - 818 ms
TEST(UefiVariableStoreTests, enumerateStoreContents) - 1020 ms
TEST(UefiVariableStoreTests, runtimeAccess) - 784 ms
TEST(UefiVariableStoreTests, bootServiceAccess) - 607 ms
TEST(UefiVariableStoreTests, removePersistent) - 849 ms
TEST(UefiVariableStoreTests, removeVolatile) - 694 ms
TEST(UefiVariableStoreTests, getWithSmallBuffer) - 700 ms
TEST(UefiVariableStoreTests, persistentSetGet) - 1042 ms
TEST(UefiVariableStoreTests, setGetRoundtrip) - 647 ms
TEST(UefiVariableIndexTests, setCheckConstraintsNonExistingVar) - 283 ms
TEST(UefiVariableIndexTests, setCheckConstraintsExistingVar) - 503 ms
TEST(UefiVariableIndexTests, checkIterator) - 516 ms
TEST(UefiVariableIndexTests, removeVariable) - 298 ms
TEST(UefiVariableIndexTests, dumpBufferTooSmall) - 259 ms
TEST(UefiVariableIndexTests, dumpLoadRoadtrip) - 521 ms
TEST(UefiVariableIndexTests, enumerateStore) - 249 ms
TEST(UefiVariableIndexTests, variableIndexFull) - 252 ms
TEST(UefiVariableIndexTests, addWithOversizedName) - 562 ms
TEST(UefiVariableIndexTests, emptyIndexOperations) - 260 ms
TEST(SfsBlockStoreTests, psCreateAndSetExtended) - 2219 ms
TEST(SfsBlockStoreTests, psCreateAndSet) - 2140 ms
TEST(SfsBlockStoreTests, itsStorageLimitTest) - 1673 ms
TEST(SfsBlockStoreTests, itsStoreNewItem) - 1581 ms
TEST(SfsRamTests, psCreateAndSetExtended) - 320 ms
TEST(SfsRamTests, psCreateAndSet) - 365 ms
TEST(SfsRamTests, itsStorageLimitTest) - 250 ms
TEST(SfsRamTests, itsStoreNewItem) - 227 ms
TEST(MockStoreTests, psCreateAndSetExtended) - 174 ms
TEST(MockStoreTests, psCreateAndSet) - 211 ms
TEST(MockStoreTests, itsStorageLimitTest) - 174 ms
TEST(MockStoreTests, itsStoreNewItem) - 211 ms
TEST(SecureStorageProxyTests, psCreateAndSetExtended) - 1335 ms
TEST(SecureStorageProxyTests, psCreateAndSet) - 347 ms
TEST(SecureStorageProxyTests, itsStorageLimitTest) - 260 ms
TEST(SecureStorageProxyTests, itsStoreNewItem) - 300 ms
TEST(SecureStorageClientTests, psCreateAndSetExtended) - 378 ms
TEST(SecureStorageClientTests, psCreateAndSet) - 262 ms
TEST(SecureStorageClientTests, itsStorageLimitTest) - 200 ms
TEST(SecureStorageClientTests, itsStoreNewItem) - 221 ms
TEST(CryptoProtocolPackedcChecks, checkKeyUsage) - 49 ms
TEST(CryptoProtocolPackedcChecks, checkKeyLifetime) - 16 ms
TEST(CryptoProtocolPackedcChecks, checkAlg) - 31 ms
TEST(CryptoProtocolPackedcChecks, checkDhGroup) - 37 ms
TEST(CryptoProtocolPackedcChecks, checkEccCurve) - 100 ms
TEST(CryptoProtocolPackedcChecks, checkKeyType) - 45 ms
TEST(CryptoProtocolProtobufChecks, checkKeyUsage) - 49 ms
TEST(CryptoProtocolProtobufChecks, checkKeyLifetime) - 20 ms
TEST(CryptoProtocolProtobufChecks, checkAlg) - 65 ms
TEST(CryptoProtocolProtobufChecks, checkDhGroup) - 45 ms
TEST(CryptoProtocolProtobufChecks, checkEccCurve) - 76 ms
TEST(CryptoProtocolProtobufChecks, checkKeyType) - 0 ms
TEST(CryptoProtocolOpcodeChecks, checkPackedcToProtobuf) - 37 ms
TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 6595 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 1000 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 667 ms
TEST(CryptoMacServicePackedcTests, macAbort) - 824 ms
TEST(CryptoMacServicePackedcTests, signAndVerify) - 23800 ms
TEST(CryptoCipherServicePackedcTests, cipherAbort) - 668 ms
TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 14015 ms
TEST(CryptoHashServicePackedcTests, hashAbort) - 1985 ms
TEST(CryptoHashServicePackedcTests, hashAndVerify) - 3954 ms
TEST(CryptoHashServicePackedcTests, calculateHash) - 988 ms
TEST(CryptoServicePackedcTests, generateRandomNumbers) - 1337 ms
TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 1046843 ms
TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 137365 ms
TEST(CryptoServicePackedcTests, signAndVerifyEat) - 253256 ms
TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 252541 ms
TEST(CryptoServicePackedcTests, signAndVerifyHash) - 250919 ms
TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 21470 ms
TEST(CryptoServicePackedcTests, exportPublicKey) - 42058 ms
TEST(CryptoServicePackedcTests, purgeKey) - 21253 ms
TEST(CryptoServicePackedcTests, copyKey) - 136364 ms
TEST(CryptoServicePackedcTests, generatePersistentKeys) - 41861 ms
TEST(CryptoServicePackedcTests, generateVolatileKeys) - 41730 ms
TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 1798 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 573779 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 130699 ms
TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 251300 ms
TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 250868 ms
TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 21742 ms
TEST(CryptoServiceProtobufTests, exportPublicKey) - 42198 ms
TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 42363 ms
TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 41947 ms
TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 10388464 ms
TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 2023418 ms
TEST(CryptoFaultTests, randomNumbersWithBrokenStorage) - 246 ms
TEST(CryptoFaultTests, persistentKeysWithBrokenStorage) - 20787 ms
TEST(CryptoFaultTests, volatileKeyWithBrokenStorage) - 21344 ms
TEST(PocCryptoOpTests, checkOpSequence) - 66220 ms
TEST(CryptoMsgTests, SignHashOutMsgTest) - 71 ms
TEST(CryptoMsgTests, SignHashInMsgTest) - 249 ms
TEST(CryptoMsgTests, ExportPublicKeyOutMsgTest) - 238 ms
TEST(CryptoMsgTests, ExportPublicKeyInMsgTest) - 50 ms
TEST(CryptoMsgTests, GenerateKeyInMsgTest) - 200 ms
TEST(CryptoContextPoolTests, multipleContexts) - 39459 ms
TEST(CryptoContextPoolTests, singleContext) - 54 ms
TEST(CryptoContextPoolTests, checkEmptyPool) - 79 ms
TEST(FwuUpdateFmpTests, wholeFmpFlow) - 7742 ms
TEST(FwuOversizeImageTests, oversizeInstallMultiLocationEndStaging) - 48529 ms
TEST(FwuOversizeImageTests, oversizeInstallEndStaging) - 11633 ms
TEST(FwuOversizeImageTests, oversizeInstallCancelStaging) - 11628 ms
TEST(FwuOversizeImageTests, maxSizeInstall) - 17872 ms
TEST(FwuRollbackTests, bootloaderFallback) - 11191 ms
TEST(FwuRollbackTests, selectPreviousAfterActivation) - 15366 ms
TEST(FwuRollbackTests, selectPreviousPriorToActivation) - 11142 ms
TEST(FwuPowerFailureTests, powerFailureDuringTrial) - 71538 ms
TEST(FwuPowerFailureTests, powerFailureDuringStaging) - 55901 ms
TEST(FwuUpdateScenarioTests, partialFirmwareUpdateFlow) - 45294 ms
TEST(FwuUpdateScenarioTests, wholeFirmwareUpdateFlow) - 15402 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInTrial) - 33949 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInStaging) - 16350 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInRegular) - 5621 ms
TEST(FwuImageDirectoryTests, zeroFwLocations) - 523 ms
TEST(FwuImageDirectoryTests, multipleFwLocations) - 15860 ms
TEST(FwuImageDirectoryTests, singleFwLocation) - 5619 ms
TEST(FwuImageDirectoryTests, streamRecycling) - 19707 ms
TEST(FwuImageDirectoryTests, streamedReads) - 18270 ms
TEST(FwuDefaultInstallerFactoryTests, configureInstallersFlow) - 608 ms
TEST(FwuCopyInstallerTests, installAndCopy) - 45578 ms
TEST(FwuRawInstallerTests, normalInstallFlow) - 22412 ms
TEST(FwuMetadataV2Tests, checkImgBankInfoStructure) - 0 ms
TEST(FwuMetadataV2Tests, checkImgEntryStructure) - 37 ms
TEST(FwuMetadataV2Tests, checkFwStoreDescStructure) - 20 ms
TEST(FwuMetadataV2Tests, checkHeaderStructure) - 11 ms
TEST(FwuMetadataManagerTests, checkAndRepairInaccessibleStorage) - 20799 ms
TEST(FwuMetadataManagerTests, checkAndRepairAccessibleStorage) - 56959 ms
TEST(PartitionedBlockStoreTests, writeToInvalidBlock) - 237 ms
TEST(PartitionedBlockStoreTests, checkEraseLimits) - 641 ms
TEST(PartitionedBlockStoreTests, writeReadEraseBlock) - 635 ms
TEST(PartitionedBlockStoreTests, openClose) - 174 ms
TEST(PartitionedBlockStoreTests, getPartitionInfo) - 185 ms
TEST(FileBlockStoreTests, initWithExistingDiskImage) - 1546 ms
TEST(FileBlockStoreTests, wholeBlockRw) - 3347 ms
TEST(RamBlockStoreTests, eraseOperations) - 191 ms
TEST(RamBlockStoreTests, writeToInvalidBlock) - 122 ms
TEST(RamBlockStoreTests, writeBiggerThanBlock) - 242 ms
TEST(RamBlockStoreTests, writeReadEraseBlock) - 313 ms
TEST(RamBlockStoreTests, openClose) - 85 ms
TEST(RamBlockStoreTests, getPartitionInfo) - 96 ms
TEST(AttestationProvisioningTests, provisionedIak) - 21012 ms
TEST(AttestationProvisioningTests, selfGeneratedIak) - 61830 ms
TEST(AttestationServiceTests, repeatedOperation) - 5061352 ms
TEST(AttestationServiceTests, invalidChallengeLen) - 158 ms
TEST(AttestationServiceTests, checkTokenSize) - 91593 ms
TEST(AttestationReporterTests, createReport) - 171984 ms
TEST(TcgEventLogTests, interateBootMeasurements) - 174 ms
TEST(DiscoveryServiceTests, checkServiceInfo) - 349 ms
TEST(ServiceNameTests, readService) - 327 ms
TEST(ServiceNameTests, checkFields) - 275 ms
TEST(ServiceNameTests, checkInvalidServiceNames) - 37 ms
TEST(ServiceNameTests, checkValidServiceNames) - 118 ms
TEST(ServiceFrameworkTests, serviceProviderChain) - 123 ms
TEST(ServiceFrameworkTests, serviceWithOps) - 13 ms
TEST(ServiceFrameworkTests, serviceWithNoOps) - 76 ms
TEST(ffarpc_call_ep, request_deny_64_bit) - 1331 ms
TEST(ffarpc_call_ep, request_with_data_after_unshare) - 3618 ms
TEST(ffarpc_call_ep, request_with_data_buffer_overflow) - 1728 ms
TEST(ffarpc_call_ep, request_with_data) - 2421 ms
TEST(ffarpc_call_ep, request_without_data_non_zero_length) - 71 ms
TEST(ffarpc_call_ep, request_without_data) - 675 ms
TEST(ffarpc_call_ep, invalid_mgmt_call) - 84 ms
TEST(ffarpc_call_ep, mem_unshare_null_ep) - 102 ms
TEST(ffarpc_call_ep, mem_share_unshare_relinquish_fail_then_success) - 3123 ms
TEST(ffarpc_call_ep, mem_share_unshare_relinquish_fail) - 2367 ms
TEST(ffarpc_call_ep, mem_share_unshare) - 2377 ms
TEST(ffarpc_call_ep, mem_unshare) - 82 ms
TEST(ffarpc_call_ep, mem_share_null_ep) - 100 ms
TEST(ffarpc_call_ep, mem_share_smaller_page_count_relinquish_fail) - 2393 ms
TEST(ffarpc_call_ep, mem_share_smaller_page_count) - 2353 ms
TEST(ffarpc_call_ep, mem_share_retrieve_fail) - 1719 ms
TEST(ffarpc_call_ep, mem_share_fill_all) - 26378 ms
TEST(ffarpc_call_ep, mem_share) - 1675 ms
TEST(ffarpc_caller, end) - 82 ms
TEST(ffarpc_caller, end_null_handle) - 140 ms
TEST(ffarpc_caller, end_null_context) - 0 ms
TEST(ffarpc_caller, invoke_without_response) - 605 ms
TEST(ffarpc_caller, invoke_with_response) - 626 ms
TEST(ffarpc_caller, invoke_invalid_resp_len) - 642 ms
TEST(ffarpc_caller, invoke_send_direct_req_fail) - 491 ms
TEST(ffarpc_caller, invoke_resp_long_req) - 37 ms
TEST(ffarpc_caller, invoke_resp_no_begin) - 48 ms
TEST(ffarpc_caller, invoke_resp_len_null) - 86 ms
TEST(ffarpc_caller, invoke_resp_buf_null) - 46 ms
TEST(ffarpc_caller, invoke_opstatus_null) - 93 ms
TEST(ffarpc_caller, invoke_handle_context_diff) - 60 ms
TEST(ffarpc_caller, invoke_null_context) - 0 ms
TEST(ffarpc_caller, begin_without_buffer) - 85 ms
TEST(ffarpc_caller, begin_with_buffer) - 55 ms
TEST(ffarpc_caller, begin_not_opened) - 45 ms
TEST(ffarpc_caller, begin_too_large_req) - 87 ms
TEST(ffarpc_caller, begin_transaction_in_progress) - 100 ms
TEST(ffarpc_caller, begin_null_buffer) - 134 ms
TEST(ffarpc_caller, begin_null_context) - 42 ms
TEST(ffarpc_caller, close_success) - 1094 ms
TEST(ffarpc_caller, close_endpoint_and_mem_reclaim_fail) - 927 ms
TEST(ffarpc_caller, close_mem_reclaim_fail) - 948 ms
TEST(ffarpc_caller, close_send_direct_msg_fail) - 483 ms
TEST(ffarpc_caller, close_not_opened) - 37 ms
TEST(ffarpc_caller, open_success) - 1851 ms
TEST(ffarpc_caller, open_send_direct_req_rpc_status_fail_reclaim_fail) - 2218 ms
TEST(ffarpc_caller, open_send_direct_req_rpc_status_fail) - 2237 ms
TEST(ffarpc_caller, open_send_direct_req_fail) - 1712 ms
TEST(ffarpc_caller, open_share_fail) - 1315 ms
TEST(ffarpc_caller, open_invalid_mem_size) - 82 ms
TEST(ffarpc_caller, open_already_opened) - 68 ms
TEST(ffarpc_caller, discover_more_max_cnt) - 1184 ms
TEST(ffarpc_caller, discover_less_max_cnt) - 1065 ms
TEST(ffarpc_caller, discover) - 1100 ms
TEST(ffarpc_caller, discover_rx_release_fail) - 1007 ms
TEST(ffarpc_caller, discover_rx_get_fail) - 868 ms
TEST(ffarpc_caller, discover_partition_info_get_fail) - 511 ms
TEST(ffarpc_caller, discover_invalid_arguments) - 97 ms
TEST(RpcStatusProtocolChecks, checkProtobufRpcStatusCodes) - 60 ms
TEST(ConfigRamstoreTests, checkMultipleConfig) - 53 ms
TEST(ConfigRamstoreTests, checkSingleConfig) - 87 ms
TEST(ConfigRamstoreTests, checkEmptyConfig) - 43 ms
TEST(Crc32Tests, multiPart) - 39 ms
TEST(Crc32Tests, longString) - 87 ms
TEST(Crc32Tests, shortString) - 46 ms
TEST(EndianTests, le64) - 86 ms
TEST(EndianTests, le32) - 31 ms
TEST(EndianTests, le16) - 27 ms
TEST(EndianTests, le8) - 100 ms
TEST(TlvTests, encodeWrongOrder) - 79 ms
TEST(TlvTests, encodeInsufficientSpace) - 100 ms
TEST(TlvTests, encodeRecords) - 223 ms
TEST(TlvTests, decodeBadRecords) - 56 ms
TEST(TlvTests, findAndDecodeMissingOptional) - 50 ms
TEST(TlvTests, findAndDecode) - 76 ms
TEST(TlvTests, decodeGoodRecords) - 37 ms
TEST(UuidTests, roundTrip) - 136 ms
TEST(UuidTests, checkNilUuidOperations) - 100 ms
TEST(UuidTests, checkIsEqualOperation) - 124 ms
TEST(UuidTests, checkOctetsFromCanonical) - 86 ms
TEST(UuidTests, parseValidUuidToGuidOctets) - 0 ms
TEST(UuidTests, parseError) - 61 ms
TEST(UuidTests, parseUuidInUrn) - 87 ms
TEST(UuidTests, parseValidUuidMixedCase) - 82 ms
TEST(UuidTests, parseValidUuidLowerCase) - 82 ms
TEST(TsDemoTests, runTsDemo) - 624043 ms
OK (252 tests, 251 ran, 365136 checks, 1 ignored, 0 filtered out, 23127180 ms)
```
**LibTS test (linux-pc only)**
```
trusted-services/tools/b-test/build-libts-linux-pc/libts-test -v
TEST(CryptoServicePackedcTests, generateRandomNumbers) - 2 ms
TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 6 ms
TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 2 ms
TEST(CryptoServicePackedcTests, signAndVerifyEat) - 2 ms
TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 3 ms
TEST(CryptoServicePackedcTests, signAndVerifyHash) - 2 ms
TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 1 ms
TEST(CryptoServicePackedcTests, exportPublicKey) - 0 ms
TEST(CryptoServicePackedcTests, purgeKey) - 0 ms
TEST(CryptoServicePackedcTests, copyKey) - 1 ms
TEST(CryptoServicePackedcTests, generatePersistentKeys) - 1 ms
TEST(CryptoServicePackedcTests, generateVolatileKeys) - 0 ms
TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 0 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 14 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 1 ms
TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 3 ms
TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 2 ms
TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 1 ms
TEST(CryptoServiceProtobufTests, exportPublicKey) - 0 ms
TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 0 ms
TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 1 ms
- 68 ms
TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 17 ms
TEST(PsServiceTests, createAndSetExtended) - 1 ms
TEST(PsServiceTests, createAndSet) - 0 ms
TEST(PsServiceTests, storeNewItem) - 1 ms
TEST(ItsServiceTests, storeNewItem) - 0 ms
```
**Platform inspect test**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/platform-inspect
attestation_report:
challenge: 31 03 a3 a3 e5 e2 d8 1a ea e1 df 26 85 1c c0 2a 4d ac 4a 3e ba 32 15 53 0e f2 e3 fe 91 f6 8b 75
client_id: 0
boot_seed: ec 0b f2 64 34 7a 8c 68 ca ff 5f a4 e2 ff 90 70 25 64 be e1 13 90 58 97 42 b1 ce 4a d2 f8 7b 3a
security_lifecycle: 0
instance_id: 01 9c d5 b1 3e 0b 88 a9 12 87 c7 1e 52 0d 58 39 92 a7 69 d9 58 bb 8a db 10 15 f0 77 c0 a1 25 63 32
implementation_id: 74 72 75 73 74 65 64 66 69 72 6d 77 61 72 65 2e 6f 72 67 2e 74 73 2e 61 74 74 65 73 74 61 74 69 6f 6e 5f 73 70
sw_components:
type: FW_CONFIG
digest: 5e 10 97 50 c0 cb 32 14 e6 e4 09 f7 12 ba 84 d6 d1 d6 e2 d4 45 8c 52 f3 d2 b9 6e ea 82 d4 e5 47
type: TB_FW_CONFIG
digest: dc 45 e2 c1 a9 f5 b1 81 9a 10 8e 8e 0f 0a 5e b2 e1 c1 94 00 73 ae 14 83 eb dd e1 f5 fe ac 72 5c
type: BL_2
digest: d1 56 89 90 7e d8 98 71 72 47 fb 91 9e c2 0b 7b 5d 89 f4 07 ce 27 8d 37 54 20 d8 aa ea 92 30 ae
type: SECURE_RT_EL3
digest: 99 56 5e 18 d3 ea 1b 8f 79 63 c8 66 19 48 a2 50 f8 c3 0c a5 33 99 53 9e 11 c2 cd 5e 11 c5 8c dc
type: HW_CONFIG
digest: 54 10 fe 53 a5 fe 12 75 dc cc 3a 15 8f d8 34 63 f3 3e 1e 71 7f e3 4c 39 a1 62 4a 90 5c 0a 84 f3
type: SOC_FW_CONFIG
digest: 4e e4 8e 5a e6 50 ed e0 b5 a3 54 8a 1f d6 0e 8a ea 0e 71 75 0e a4 3f 82 76 ce af cd 7c b0 91 e0
type: SECURE_RT_EL1_UNKNOWN
digest: e9 4a 94 e4 1e 0c 28 97 3a 6b b8 dc 2f 89 fc f9 af e9 d3 67 98 89 2c 4d 0a 6d 3b b5 59 11 c6 73
type: TOS_FW_CONFIG
digest: 77 35 1c d8 86 d0 66 15 eb 3a 2d 2d 9c ef b9 49 ba 0a 4a 67 58 ff 06 b7 90 7d c7 06 38 ce c6 0b
type: BL_33
digest: a2 6c ec 40 dd dd 31 ce af 90 09 5b 25 c6 e3 83 b3 3e 6f 11 fc 13 4f 8e 83 64 0d 53 b6 34 22 6c
type: NT_FW_CONFIG
digest: 0c 53 ba 3f c9 43 13 bf 25 59 bc 8c 2e 7e 49 fa 0f 1a 5a 40 96 ed 58 fa 58 31 39 7a de d4 e4 fb
type: CRITICAL DATA
digest: d3 a9 31 35 10 be c0 88 51 bd 28 4e a9 ff b3 c3 cd 02 11 fc 23 2e 02 07 0e ce a5 ab 1d d9 a1 6a
```
**TS Demo test**
```lines=12
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/ts-demo
Demonstrates use of trusted services from an application
---------------------------------------------------------
A client requests a set of crypto operations performed by
the Crypto service. Key storage for persistent keys is
provided by the Secure Storage service via the ITS client.
Generating random bytes length: 1
Operation successful
Random bytes:
55
Generating random bytes length: 7
Operation successful
Random bytes:
2B 35 04 79 3B 50 83
Generating random bytes length: 128
Operation successful
Random bytes:
57 31 1C 74 88 69 C4 12
D1 9A 93 83 2D D2 AA 0C
EA 03 F5 44 09 6A 92 11
8A 8A 06 57 26 B1 47 74
01 1B 2A 25 8D CF 6C A3
A6 4D 6D A1 8B FC 31 76
57 13 72 96 C4 09 BA 56
88 35 F9 66 58 B0 EE 1E
AF E9 90 9D AD BB 62 21
82 37 E1 31 37 43 18 5B
95 2E 42 BB 6B 41 40 66
A5 81 81 32 3F F3 23 8A
5A 88 B2 9D 2C B0 F2 C4
51 26 13 53 FE 8F 68 B0
B0 D1 64 85 3C E9 5A C8
E2 0A 62 80 F1 AB A2 7C
Generating ECC signing key
Operation successful
Signing message: "The quick brown fox" using key: 256
Operation successful
Signature bytes:
77 1E 93 3C E1 A2 CD C4
5D 03 15 B8 A9 1A AE 47
37 6A B8 F0 5D 67 22 06
FC 2C B8 20 71 97 7F F8
AE 06 0F 71 34 E3 0B FD
CA 24 C2 23 0F 89 67 99
51 B5 FE 25 95 CD 75 ED
1B A2 6E 5A 3A 06 26 3C
Verify signature using original message: "The quick brown fox"
Operation successful
Verify signature using modified message: "!he quick brown fox"
Successfully detected modified message
Signing message: "jumps over the lazy dog" using key: 256
Operation successful
Signature bytes:
91 1A 8E 4B 17 3C 01 FF
A2 0A D4 55 39 3E 84 96
92 84 A3 F1 A1 26 5C 40
14 A6 57 50 79 70 41 ED
68 E4 21 61 DD 9F 07 0C
DE 9C DC 29 F5 9F 88 DF
36 0D C4 21 54 D3 CD F8
35 C0 7B 16 10 59 26 4A
Verify signature using original message: "jumps over the lazy dog"
Operation successful
Verify signature using modified message: "!umps over the lazy dog"
Successfully detected modified message
Generating RSA encryption key
Operation successful
Encrypting message: "Top secret" using RSA key: 257
Operation successful
Encrypted message:
6E 9A 04 F4 64 33 0B 6D
DE CB C7 21 EF C8 FC A9
95 50 F1 6C 90 64 AA A0
D6 99 BD 90 4C 79 A0 73
Decrypting message using RSA key: 257
Operation successful
Decrypted message: "Top secret"
Exporting public key: 256
Operation successful
Public key bytes:
04 D5 1A 1C 30 72 3C CF
3B E3 0B 47 92 54 2E 6E
61 28 26 A1 FB 00 82 75
AC 44 14 18 B4 87 66 F7
F8 47 0B 25 83 04 4B 9A
6F 08 DF 98 E1 81 77 E7
6B 29 34 60 2A 52 94 96
E8 6E 2E 0E 78 5A EF 81
98
Destroying signing key: 256
Operation successful
Destroying encryption key: 257
Operation successful
```
==Config 2: FIP SP==
====Build command====
```
MEASURED_BOOT=y SPMC_TESTS=n TS_SMM_GATEWAY=n TS_UEFI_TESTS=n SP_PACKAGING_METHOD=fip DEFAULT_SP_CONFIG=default-sp SP_BLOCK_STORAGE_CONFIG=default-sp SP_PSA_ITS_CONFIG=shared-flash-opteesp SP_PSA_PS_CONFIG=shared-flash-opteesp make
```
====Setup steps after boot====
```
/mnt/host/out/linux-arm-ffa-tee/load_module.sh
/mnt/host/out/linux-arm-ffa-user/load_module.sh
cp -at /usr /mnt/host/out/ts-install/arm-linux/bin /mnt/host/out/ts-install/arm-linux/lib
```
====Test results====
**Trusted Services service level test**
```
```
**PSA Architecture Test Suite**
```
```
**Component test**
```
```
**LibTS test**
```
```
**Platform inspect test**
```
```
**TS Demo test**
**UEFI test**
==Config 3: OP-TEE SPMC tests==
====Build command====
```
MEASURED_BOOT=n SPMC_TESTS=n TS_SMM_GATEWAY=y TS_UEFI_TESTS=y DEFAULT_SP_CONFIG=default-sp SP_PACKAGING_METHOD=fip make
```
====Setup steps after boot====
```
/mnt/host/out/linux-arm-ffa-tee/load_module.sh
/mnt/host/out/linux-arm-ffa-user/load_module.sh
cp -at /usr /mnt/host/out/ts-install/arm-linux/bin /mnt/host/out/ts-install/arm-linux/lib
```
====Test results====
==Config 4: SMMGW tests==
====Build command====
```
MEASURED_BOOT=n SPMC_TESTS=y TS_SMM_GATEWAY=n TS_UEFI_TESTS=n SP_PACKAGING_METHOD=embedded DEFAULT_SP_CONFIG=default-opteesp make
```
====Setup steps after boot====
```
/mnt/host/out/linux-arm-ffa-tee/load_module.sh
/mnt/host/out/linux-arm-ffa-user/load_module.sh
cp -at /usr /mnt/host/out/ts-install/arm-linux/bin /mnt/host/out/ts-install/arm-linux/lib
```
====Test results====