=Overview=
This page is to capture the test results for OP-TEE SPMC v3.22
The tests were ran using the following set of components:
```
>>> Manifest status
d064c30 (HEAD -> default, origin/master, m/master) stm32mp1: fetch mbedtls for tf-a authenticated boot
b242f5c stm32mp1: add edk2 and edk2-platforms repos
122fe9a stm32mp1: bump u-boot to 2023.04
Local manifests:
The merged manifest is:
<?xml version="1.0" encoding="UTF-8"?>
<manifest>
<remote fetch="https://git.gitlab.arm.com" name="arm-gitlab"/>
<remote fetch="https://github.com" name="github"/>
<remote fetch="https://git.savannah.gnu.org/git" name="savannah"/>
<remote fetch="https://git.trustedfirmware.org" name="tfo"/>
<default remote="github" revision="master"/>
<project name="Mbed-TLS/mbedtls.git" path="mbedtls" revision="refs/tags/mbedtls-2.28.1"/>
<project name="OP-TEE/build.git" path="build">
<linkfile dest="build/Makefile" src="fvp-psa-sp.mk"/>
</project>
<project name="OP-TEE/optee_client.git" path="optee_client"/>
<project name="OP-TEE/optee_os.git" path="optee_os"/>
<project name="OP-TEE/optee_test.git" path="optee_test"/>
<project clone-depth="1" name="TF-A/trusted-firmware-a.git" path="trusted-firmware-a" remote="tfo" revision="refs/tags/v2.8"/>
<project name="TS/trusted-services.git" path="trusted-services" remote="tfo" revision="integration"/>
<project clone-depth="1" name="buildroot/buildroot.git" path="buildroot" revision="refs/tags/2022.11.1"/>
<project clone-depth="1" name="grub.git" path="grub" remote="savannah" revision="refs/tags/grub-2.02"/>
<project name="linaro-swg/optee_examples.git" path="optee_examples"/>
<project clone-depth="1" name="linux-arm/linux-trusted-services.git" path="linux-arm-ffa-user" remote="arm-gitlab" revision="debugfs-v5"/>
<project clone-depth="1" name="linux-arm/linux-trusted-services.git" path="linux-arm-ffa-tee" remote="arm-gitlab" revision="tee-v1"/>
<project name="tianocore/edk2-platforms.git" path="edk2-platforms" revision="02daa58c21f89628b4d8c76f95f3a554289149bc"/>
<project name="tianocore/edk2.git" path="edk2" revision="dd4cae4d82c7477273f3da455084844db5cca0c0"/>
<project clone-depth="1" name="torvalds/linux.git" path="linux" revision="refs/tags/v6.1"/>
</manifest>
>>>Project status
project build/
Local and remote SHA is matching.
2e792b3 (HEAD, m/master, github/master) fvp, ts: optimize buildroot config
3730e01 fvp, ts: use minimal Linux config
9b54724 Fix build of fTPM by enabling build of 32-bit libraries
project buildroot/
Local and remote SHA is matching.
d48a8beb (grafted, HEAD, tag: 2022.11.1, tag: m/master) Update for 2022.11.1
project edk2/
Local and remote SHA is matching.
dd4cae4d82 (HEAD, m/master) ArmPkg/GenericWatchdogDxe: Split 64bit register write to 2x32bit
1d802e234e BaseTools: Guid.xref doesn't specify the correct GUID value for Driver
83964ebc5e BaseTools/BinToPcd: Encode string returned from ByteArray()
project edk2-platforms/
Local and remote SHA is matching.
02daa58c21 (HEAD, m/master) Silicon/SynQuacer: Add status property in PCIe & SDHC DT nodes
9f02ebc19b Silicon/SynQuacer: add optional OP-TEE DT node
9dae9a0c79 Marvell/Library: ComPhyLib: Clean up the library after rework
project grub/
Local and remote SHA is matching.
e54c99a (grafted, HEAD, tag: grub-2.02, tag: m/master) Increase version to 2.02.
project linux/
Local and remote SHA is matching.
830b3c68c (grafted, HEAD, tag: v6.1, tag: m/master) Linux 6.1
project linux-arm-ffa-tee/
Local and remote SHA is matching.
c6b9495 (grafted, HEAD, m/master, arm-gitlab/tee-v1) Add versioning info to readme
project linux-arm-ffa-user/
Local and remote SHA is matching.
18e3be7 (grafted, HEAD, m/master, arm-gitlab/debugfs-v5) Add support for FF-A driver changes in v6.1
project mbedtls/
Local and remote SHA is matching.
dd79db100 (HEAD, tag: v2.28.1, tag: mbedtls-2.28.1, tag: m/master) Merge pull request #955 from Mbed-TLS/mbedtls-2.28.1rc0-pr
fe9d08fd1 Bump version
fa827b4b3 Minor tweaks to Changelog
project optee_client/
Local and remote SHA is matching.
8533e0e (HEAD, tag: 3.21.0-rc1, tag: 3.21.0, m/master, github/master) travis: remove the .travis.yml file
0fc6ef7 tee-supplicant: fix leak when load plugin failed
dde6306 libteeacl: use realloc() instead of reallocarray()
project optee_examples/
Local and remote SHA is matching.
378dc0d (HEAD, tag: 3.21.0, m/master, github/master) hotp: use sess_ctx instead of global variables
a98d01e (tag: 3.21.0-rc1, tag: 3.20.0-rc1, tag: 3.20.0) pluging: add missing of dependency syslog on teec
3ca8454 Enable compatibility with TEE Internal Core API v1.1
project optee_os/
Local and remote SHA is matching.
280b6a32e (HEAD, m/master, github/master) core: spmc: implement FFA_CONSOLE_LOG
b89b3da24 core: thread: Add support for canary value randomization
fb66b364b mk/aosp_optee.mk: fix build dependency for static libraries
project optee_test/
Local and remote SHA is matching.
232dfd2 (HEAD, m/master, github/master) xtest: remove ffa.h from SPMC test to resolve compiler error
36a136d Android.mk: add subkeys include directory
d168ff4 xtest: fix xtest tool name in usage trace messages
project trusted-firmware-a/
Local and remote SHA is matching.
9881bb9 (grafted, HEAD, tag: v2.8, tag: m/master) Merge "docs(spm): update threat model" into integration
project trusted-services/
Local and remote SHA is matching.
e56c7b1 (HEAD, tfo/integration, m/master) Implement FFA_CONSOLE_LOG interface
0100ddd Add FF-A v1.1 boot protocol
4f9d8e3 Refactor FF-A boot info
```
=Details=
==Config 1: embedded SP==
====Build command====
```
MEASURED_BOOT=y SPMC_TESTS=n TS_SMM_GATEWAY=n TS_UEFI_TESTS=n SP_PACKAGING_METHOD=embedded DEFAULT_SP_CONFIG=default-sp SP_BLOCK_STORAGE_CONFIG=default-sp SP_PSA_ITS_CONFIG=shared-flash-opteesp SP_PSA_PS_CONFIG=shared-flash-opteesp make
```
====Setup steps after boot====
```
/mnt/host/out/linux-arm-ffa-tee/load_module.sh
/mnt/host/out/linux-arm-ffa-user/load_module.sh
cp -at /usr /mnt/host/out/ts-install/arm-linux/bin /mnt/host/out/ts-install/arm-linux/lib
```
====Test results====
**Trusted Services service level test**
```
TEST(FwuServiceTests, checkMetadataAccess) - 1 ms#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/ts-service-test -v
TEST(FwuServiceTests, checkImgDirMetadataAccess) - 0 ms
TEST(PsServiceTests, createAndSetExtended) - 1 ms
TEST(PsServiceTests, createAndSet) - 0 ms
TEST(PsServiceTests, storeNewItem) - 1 ms
TEST(Its/src/trusted-services/components/service/fwu/test/service/fwu_service_tests.cpp:66: error: Failure in TEST(FwuServiceTests, storeNewItem) - 0 mscheckMetadataAccess)
TEST(AttestationProvisioningTests, provisionedIak) - 0 ms/src/trusted-services/components/service/fwu/test/metadata_fetcher/client/client_metadata_fetcher.cpp:44: error:
TEST(AttestationProvisioningTests, selfGeneratedIak) - 1 ms expected < 0 0x0000000000000000>
but was <-8 0xfffffffffffffff8>
- 62 ms
TEST(AttestationServiceTests, invalidChallengeLen) - 0 ms
TEST(AttestationServiceTests, checkTokenSize) - 1 ms- 6674 ms
TEST(CryptoKeyDerivationFwuServicePackedcceTests, deriveAbort) - 1 mscheckImgDirAccess)
TEST(CryptoKeyDerivationS/src/trusted-services/components/service/fwu/test/service/fwu_servicePackedcce_tests.cpp:61: error: Failure in TEST(FwuServiceTests, hkdfDeriveBytes) - 0 mscheckImgDirAccess)
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 0 ms
TEST(CryptoMacServicePackedcTests, macAbort) - 0 ms expected < 0 0x0000000000000000>
TEST(CryptoMacServicePackedcTests, but was <-8 0xfffffffffffffff8>
signAndVerify) - 0 ms- 2427 ms
TEST(CryptoCipherPsServicePackedcceTests, cipherAbortcreateAndSetExtended) - 73500 ms
TEST(CryptoCipherPsServicePackedcceTests, encryptDecryptRoundtripcreateAndSet) - 0 ms119236 ms
TEST(CryptoHashPsServicePackedcceTests, hashAbortstoreNewItem) - 0 ms77429 ms
TEST(CryptoHashItsServicePackedcceTests, hashAndVerifystoreNewItem) - 0 ms80837 ms
TEST(CryptoHashServicePackedcAttestationProvisioningTests, calculateHashprovisionedIak) - 36000 ms
TEST(CryptoServicePackedcAttestationProvisioningTests, gselfGenerateRandomNumbers) - dIak) - 52060 ms
TEST(CryptoAttestationServicePackedcceTests, asymEncryptDecryptWithSalt) - 5 msrepeatedOperation) - 6644452 ms
TEST(CryptoAttestationServicePackedcceTests, asymEncryptDecrypt) - 2 msinvalidChallengeLen)[ 10.780459] ------------[ cut here ]------------
TEST(CryptoServicePackedcTests, signAndVerifyEat) - 3 ms[ 10.780559] WARNING: CPU: 3 PID: 143 at mm/page_alloc.c:5534 __alloc_pages+0x164/0xab0
TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 3 ms[ 10.780876] Modules linked in: arm_ffa_tee(O)
TEST(CryptoS[ 10.780959] CPU: 3 PID: 143 Comm: ts-servicePackedcTests, signAndVerifyHash) - 3 ms-test Tainted: G O 6.1.0 #1
TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 0 ms[ 10.781259] Hardware name: FVP Base RevC (DT)
TEST(CryptoServicePackedcTests, exportPublicKey) - 0 ms[ 10.781359] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
TEST(CryptoServicePackedcTests, purgeKey) - 1 ms[ 10.781571] pc : __alloc_pages+0x164/0xab0
TEST(CryptoServicePackedcTests, copyKey) - 1 ms[ 10.781659] lr : pool_op_alloc+0x5c/0x180 [arm_ffa_tee]
TEST(CryptoServicePackedcTests, generatePersistentKeys) - 1 ms[ 10.781959] sp : ffffffc0087ebac0
TEST(CryptoServicePackedcTests, generateVolatileKeys) - 0 ms[ 10.782059] x29: ffffffc0087ebac0 x28: ffffffc0087ebd30 x27: ffffff8801e74600
TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 0 ms[ 10.782359] x26: 0000007fe05cb118 x25: 0000000000000005 x24: 0000000000001000
TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 22 ms[ 10.782559] x23: ffffff8801e74180 x22: 0000000000000015 x21: 0000000000000015
TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 1 ms[ 10.782759] x20: 0000000000000000 x19: ffffff8801e74180 x18: 0000000000000000
TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 3 ms[ 10.783059] x17: 0000000000000000 x16: 0000000000000000 x15: 0000007fe05cb118
TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 3 ms[ 10.783306] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 1 ms[ 10.783559] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
TEST(CryptoServiceProtobufTests, exportPublicKey) - 0 ms[ 10.783827] x8 : ffffff8801e74200 x7 : 0000000000000000 x6 : 0000000000000ae4
TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 1 ms[ 10.784059] x5 : ffffff8801e74180 x4 : 0000000000000000 x3 : 0000000000000000
TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 0 ms[ 10.784259] x2 : ffffff88009f3700 x1 : 0000000000000001 x0 : ffffffc008707000
TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 94 ms[ 10.784559] Call trace:
TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 21 ms[ 10.784659] __alloc_pages+0x164/0xab0
TEST(DiscoveryServiceTests, checkServiceInfo) - 0 ms[ 10.784759] pool_op_alloc+0x5c/0x180 [arm_ffa_tee]
TEST(FwuUpdateFmpTests, wholeFmpFlow) - 0 ms[ 10.785059] shm_alloc_helper+0x98/0x110
TEST(FwuOversizeImageTests, oversizeInstallMultiLocationEndStaging) - 1 ms[ 10.785159] tee_shm_alloc_user_buf+0x74/0x11c
TEST(FwuOversizeImageTests, oversizeInstallEndStaging) - 0 ms[ 10.785438] tee_ioctl+0xa70/0xf9c
TEST(FwuOversizeImageTests, oversizeInstallCancelStaging) - 0 ms[ 10.785612] __arm64_sys_ioctl+0x3bc/0xc30
TEST(FwuOversizeImageTests, maxSizeInstall) - 0 ms[ 10.785759] invoke_syscall.constprop.0+0x5c/0x104
TEST(FwuRollbackTests, bootloaderFallback) - 0 ms[ 10.785859] do_el0_svc+0x60/0x18c
TEST(FwuRollbackTests, selectPreviousAfterActivation) - 0 ms[ 10.786059] el0_svc+0x38/0xf0
TEST(FwuRollbackTests, selectPreviousPriorToActivation) - 1 ms[ 10.786259] el0t_64_sync_handler+0xbc/0x140
TEST(FwuPowerFailureTests, powerFailureDuringTrial) - 0 ms[ 10.786359] el0t_64_sync+0x18c/0x190
TEST(FwuPowerFailureTests, powerFailureDuringStaging) - 1 ms[ 10.786559] ---[ end trace 0000000000000000 ]---
TEST(FwuUpdateScenarioTests, partialFirmwareUpdateFlow) - 0 msffa_tee_share_mem():212 error: 12
TEST(FwuUpdateScenarioTests, wholeFirmwareUpdateFlow) - 1 ms- 23142 ms
TEST(FwuInvalidBehaviourAttestationServiceTests, invalidOperationsInTrialcheckTokenSize) - 0 ms66762 ms
TEST(FwuInvalidBehaviourCryptoKeyDerivationServicePackedcTests, invalidOperationsInStagingderiveAbort) - 0 ms24023 ms
TEST(FwuInvalidBehaviourCryptoKeyDerivationServicePackedcTests, invalidOperationsInRegular) - hkdfDeriveBytes) - 27300 ms
TEST(FwuImageDirectoryCryptoKeyDerivationServicePackedcTests, zeroFwLocationshkdfDeriveKey) - 32600 ms
TEST(FwuImageDirectoryCryptoMacServicePackedcTests, multipleFwLocationsmacAbort) - 0 ms20271 ms
TEST(FwuImageDirectoryCryptoMacServicePackedcTests, singleFwLocationsignAndVerify) - 78961 ms
TEST(FwuImageDirectoryCryptoCipherServicePackedcTests, streamRecyclingcipherAbort) - 20300 ms
TEST(FwuImageDirectoryCryptoCipherServicePackedcTests, streamedReadsencryptDecryptRoundtrip) - 0 ms62965 ms
TEST(BlockStorageCryptoHashServicecePackedcTests, blockAccessOperations) - 0 mshashAbort) - 18484 ms
TEST(BlockStorageCryptoHashServicecePackedcTests, openClosehashAndVerify) - 1 ms29900 ms
TEST(BlockStorageCryptoHashServicecePackedcTests, getPartitionInfocalculateHash) - 0 ms13918 ms
TEST(SmmVariableAttackCryptoServicePackedcTests, getCheckPropertyWithMaxSizeNamegenerateRandomNumbers) - 2 ms43551 ms
TEST(SmmVariableAttackCryptoServicePackedcTests, getCheckPropertyasymEncryptDecryptWithOversizeName) - Salt) - 2835610 ms
TEST(SmmVariableAttackCryptoServicePackedcTests, setCheckPropertyWithMaxSizeName) - asymEncryptDecrypt) - 220900 ms
TEST(SmmVariableAttackCryptoServicePackedcTests, setCheckPropertyWithOversizeName) - 1 mssignAndVerifyEat) - 265000 ms
TEST(SmmVariableAttackCryptoServicePackedcTests, enumerateWithSizeMaxNameSize) - 0 mssignAndVerifyMessage) - 324213 ms
TEST(SmmVariableAttackCryptoServicePackedcTests, enumerateWithOversizeName) - 1 mssignAndVerifyHash) - 327834 ms
TEST(SmmVariableAttackCryptoServicePackedcTests, seexportAndGetWithSizeMaxNameSizeImportKeyPair) - 0 ms169327 ms
TEST(SmmVariableAttackCryptoServicePackedcTests, setAndGetWithOversizeNameexportPublicKey) - 0 ms115042 ms
TEST(SmmVariableAttackCryptoServicePackedcTests, setWithSizeMaxNameSize) - purgeKey) - 102661 ms
TEST(SmmVariableAttackCryptoServicePackedcTests, setWithOversizeName) - 0 mscopyKey) - 128324 ms
TEST(SmmVariableAttackCryptoServicePackedcTests, setWithSizeMaxDataSizegeneratePersistentKeys) - 187641 ms
TEST(SmmVariableAttackCryptoServicePackedcTests, setWithOversizeDatagenerateVolatileKeys) - 0 ms57006 ms
TEST(SmmVariableCryptoServiceProtobufTests, checkMaxVariablePayloadgenerateRandomNumbers) - 0 ms44265 ms
TEST(SmmVariableCryptoServiceProtobufTests, setSizeConstrainasymEncryptDecryptWithSalt) - 1 ms3030578 ms
TEST(SmmVariableCryptoServiceProtobufTests, enumerateStoreContentsasymEncryptDecrypt) - 0 ms232579 ms
TEST(SmmVariableCryptoServiceProtobufTests, getVarSizeNvsignAndVerifyMessage) - 1 ms327800 ms
TEST(SmmVariableCryptoServiceProtobufTests, getVarSizesignAndVerifyHash) - 0 ms326324 ms
TEST(SmmVariableCryptoServiceProtobufTests, seexportAndGetNvImportKeyPair) - 1 ms70099 ms
TEST(SmmVariableCryptoServiceProtobufTests, setAndGetexportPublicKey) - 0 ms115628 ms
TEST(TestRunnerServiceCryptoServiceProtobufTests, runSpecificTestgeneratePersistentKeys) - 0 ms189753 ms
TEST(TestRunnerServiceCryptoServiceProtobufTests, runConfigTestgenerateVolatileKeys) - 0 ms57301 ms
TEST(TestRunnerCryptoServiceLimitTests, listPlatformTestsvolatileRsaKeyPairLimit) - 0 ms9734201 ms
TEST(TestRunnerCryptoServiceLimitTests, runAllTestsvolatileEccKeyPairLimit) - 0 ms2203098 ms
TEST(TestRunnerDiscoveryServiceTests, listAllTestscheckServiceInfo) - 3840 ms
OK (92Errors (2 failures, 45 tests, 9245 ran, 344867770 checks, 0 ignored, 0 filtered out, 249 ms28737577 ms)
```
**PSA Architecture Test Suite**
```
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-crypto-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Crypto Suite
******************************************
TEST: 201 | DESCRIPTION: Testing crypto key management APIs | UT: psa_crypto_init
[Info] Executing tests from non-secure
[Check 1] Test calling crypto functions before psa_crypto_init
[Check 2] Test psa_crypto_init
[Check 3] Test multiple psa_crypto_init
TEST RESULT: PASSED
******************************************
TEST: 202 | DESCRIPTION: Testing crypto key management APIs | UT: psa_import_key
[Info] Executing tests from non-secure
[Check 1] Test psa_import_key 16 bytes AES
[Check 2] Test psa_import_key 24 bytes AES
[Check 3] Test psa_import_key 32 bytes AES
[Check 4] Test psa_import_key 2048 RSA public key
[Check 5] Test psa_import_key with RSA 2048 keypair
[Check 6] Test psa_import_key with DES 8 bytes key
[Check 7] Test psa_import_key with Triple DES 2-Key
[Check 8] Test psa_import_key with Triple DES 3-Key
[Check 9] Test psa_import_key with EC Public key
[Check 10] Test psa_import_key with EC keypair
[Check 11] Test psa_import_key 16 bytes AES with invalid bits
[Check 12] Test psa_import_key with key data greater than the algorithm size
[Check 13] Test psa_import_key with incorrect key data size
[Check 14] Test psa_import_key with invalid key type value
TEST RESULT: PASSED
******************************************
TEST: 203 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_key
[Info] Executing tests from non-secure
[Check 1] Test psa_export_key 16 Byte AES
[Check 2] Test psa_export_key 24 Byte AES
[Check 3] Test psa_export_key 32 Byte AES
[Check 4] Test psa_export_key 2048 RSA public key
[Check 5] Test psa_export_key with RSA 2048 keypair
[Check 6] Test psa_export_key with DES 64 bit key
[Check 7] Test psa_export_key with Triple DES 2-Key
[Check 8] Test psa_export_key with Triple DES 3-Key
[Check 9] Test psa_export_key with EC Public key
[Check 10] Test psa_export_key with EC keypair
[Check 11] Test psa_export_key with key policy verify
[Check 12] Test psa_export_key with less buffer size
TEST RESULT: PASSED
******************************************
TEST: 204 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_public_key
[Info] Executing tests from non-secure
[Check 1] Test psa_export_public_key 16 Byte AES
[Check 2] Test psa_export_public_key 24 Byte AES
[Check 3] Test psa_export_public_key 32 Byte AES
[Check 4] Test psa_export_public_key 2048 RSA public key
[Check 5] Test psa_export_public_key with RSA 2048 keypair
[Check 6] Test psa_export_public_key with DES 64 bit key
[Check 7] Test psa_export_public_key with Triple DES 2-Key
[Check 8] Test psa_export_public_key with Triple DES 3-Key
[Check 9] Test psa_export_public_key with EC Public key
[Check 10] Test psa_export_public_key with EC keypair
[Check 11] Test psa_export_public_key with less buffer size
TEST RESULT: PASSED
******************************************
TEST: 205 | DESCRIPTION: Testing crypto key management APIs | UT: psa_destroy_key
[Info] Executing tests from non-secure
[Check 1] Test psa_destroy_key 16 Byte AES
[Check 2] Test psa_destroy_key 24 Byte AES
[Check 3] Test psa_destroy_key 32 Byte AES
[Check 4] Test psa_destroy_key 2048 RSA public key
[Check 5] Test psa_destroy_key with RSA 2048 keypair
[Check 6] Test psa_destroy_key with DES 64 bit key
[Check 7] Test psa_destroy_key with Triple DES 2-Key
[Check 8] Test psa_destroy_key with Triple DES 3-Key
[Check 9] Test psa_destroy_key with EC Public key
[Check 10] Test psa_destroy_key with EC keypair
TEST RESULT: PASSED
******************************************
TEST: 206 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compute
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_compute with MD5 algorithm
[Check 2] Test psa_hash_compute with RIPEMD160 algorithm
[Check 3] Test psa_hash_compute with SHA1 algorithm
[Check 4] Test psa_hash_compute with SHA224 algorithm
[Check 5] Test psa_hash_compute with SHA256 algorithm
[Check 6] Test psa_hash_compute with SHA384 algorithm
[Check 7] Test psa_hash_compute with SHA512 algorithm
[Check 8] Test psa_hash_compute with small buffer size
[Check 9] Test psa_hash_compute with invalid algorithm
TEST RESULT: PASSED
******************************************
TEST: 207 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compare
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_compare with MD5 algorithm
[Check 2] Test psa_hash_compare with RIPEMD160 algorithm
[Check 3] Test psa_hash_compare with SHA1 algorithm
[Check 4] Test psa_hash_compare with SHA224 algorithm
[Check 5] Test psa_hash_compare with SHA256 algorithm
[Check 6] Test psa_hash_compare with SHA384 algorithm
[Check 7] Test psa_hash_compare with SHA512 algorithm
[Check 8] Test psa_hash_compare with incorrect hash
[Check 9] Test psa_hash_compare with incorrect hash length
[Check 10] Test psa_hash_compare with invalid algorithm
TEST RESULT: PASSED
******************************************
TEST: 208 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_setup - ECDH + HKDF-SHA-256
[Check 2] Test psa_key_derivation_setup - ECDH, unknown KDF
[Check 3] Test psa_key_derivation_setup - bad key derivation algorithm
[Check 4] Test psa_key_derivation_setup - Invalid Algorithm
TEST RESULT: PASSED
******************************************
TEST: 209 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_bytes
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_input_bytes - Step as Info
[Check 2] Test psa_key_derivation_input_bytes - Step as secret
[Check 3] Test psa_key_derivation_input_bytes - Step as salt
[Check 4] Test psa_key_derivation_input_bytes - Step as label
[Check 5] Test psa_key_derivation_input_bytes - Step as seed
[Check 6] Test psa_key_derivation_input_bytes - Invalid step
TEST RESULT: PASSED
******************************************
TEST: 210 | DESCRIPTION: Testing crypto key attributes APIs | UT: psa_key_attributes_set_get
[Info] Executing tests from non-secure
[Check 1] Test psa_key_attributes_set_get key attributes
TEST RESULT: PASSED
******************************************
TEST: 211 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_setup with MD5 algorithm
[Check 2] Test psa_hash_setup with RIPEMD160 algorithm
[Check 3] Test psa_hash_setup with SHA1 algorithm
[Check 4] Test psa_hash_setup with SHA224 algorithm
[Check 5] Test psa_hash_setup with SHA256 algorithm
[Check 6] Test psa_hash_setup with SHA384 algorithm
[Check 7] Test psa_hash_setup with SHA512 algorithm
[Check 8] Test psa_hash_setup with Invalid hash algorithm
[Check 9] Test psa_hash_setup with Invalid algorithm
[Check 10] Test psa_hash_setup with CTR algorithm
TEST RESULT: PASSED
******************************************
TEST: 212 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_update
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_update with MD5 algorithm
[Check 2] Test psa_hash_update with RIPEMD160 algorithm
[Check 3] Test psa_hash_update with SHA1 algorithm
[Check 4] Test psa_hash_update with SHA224 algorithm
[Check 5] Test psa_hash_update with SHA256 algorithm
[Check 6] Test psa_hash_update with SHA384 algorithm
[Check 7] Test psa_hash_update with SHA512 algorithm
[Check 8] Test psa_hash_update without hash setup
[Check 9] Test psa_hash_update with completed opertaion handle
TEST RESULT: PASSED
******************************************
TEST: 213 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_verify with MD5 algorithm
[Check 2] Test psa_hash_verify with RIPEMD160 algorithm
[Check 3] Test psa_hash_verify with SHA1 algorithm
[Check 4] Test psa_hash_verify with SHA224 algorithm
[Check 5] Test psa_hash_verify with SHA256 algorithm
[Check 6] Test psa_hash_verify with SHA384 algorithm
[Check 7] Test psa_hash_verify with SHA512 algorithm
[Check 8] Test psa_hash_verify with incorrect expected hash
[Check 9] Test psa_hash_verify with incorrect hash length
[Check 10] test psa_hash_verify with inactive & invalid operation handle
TEST RESULT: PASSED
******************************************
TEST: 214 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_finish with MD5 algorithm
[Check 2] Test psa_hash_finish with RIPEMD160 algorithm
[Check 3] Test psa_hash_finish with SHA1 algorithm
[Check 4] Test psa_hash_finish with SHA224 algorithm
[Check 5] Test psa_hash_finish with SHA256 algorithm
[Check 6] Test psa_hash_finish with SHA384 algorithm
[Check 7] Test psa_hash_finish with SHA512 algorithm
[Check 8] Test psa_hash_finish with invalid hash buffer size
[Check 9] test psa_hash_finish with inactive operation handle
TEST RESULT: PASSED
******************************************
TEST: 215 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_abort with MD5 algorithm
[Check 2] Test psa_hash_abort with RIPEMD160 algorithm
[Check 3] Test psa_hash_abort with SHA1 algorithm
[Check 4] Test psa_hash_abort with SHA224 algorithm
[Check 5] Test psa_hash_abort with SHA256 algorithm
[Check 6] Test psa_hash_abort with SHA384 algorithm
[Check 7] Test psa_hash_abort with SHA512 algorithm
[Check 8] Test psa_hash_finish after calling psa_hash_abort
TEST RESULT: PASSED
******************************************
TEST: 216 | DESCRIPTION: Testing crypto generator functions APIs | UT: psa_generate_key
[Info] Executing tests from non-secure
[Check 1] Test psa_generate_key 16 Byte AES
[Check 2] Test psa_generate_key 24 Byte AES
[Check 3] Test psa_generate_key 32 Byte AES
[Check 4] Test psa_generate_key with DES 64 bit key
[Check 5] Test psa_generate_key with Triple DES 2-Key
[Check 6] Test psa_generate_key with Triple DES 3-Key
[Check 7] Test psa_generate_key with RSA 2048 Keypair
[Check 8] Test psa_generate_key with ECC KeyPair
[Check 9] Test psa_generate_key with RSA 2048 Public key
[Check 10] Test psa_generate_key with invalid key type
[Check 11] Test psa_generate_key with invalid usage flags
TEST RESULT: PASSED
******************************************
TEST: 217 | DESCRIPTION: Testing crypto generation APIs | UT: psa_generate_random
[Info] Executing tests from non-secure
[Check 1] Test psa_generate_random to get 0 Byte data
[Check 2] Test psa_generate_random to get 16 Byte data
[Check 3] Test psa_generate_random to get 24 Byte data
[Check 4] Test psa_generate_random to get 32 Byte data
[Check 5] Test psa_generate_random to get 64 Byte data
[Check 6] Test psa_generate_random to get 128 Byte data
[Check 7] Test psa_generate_random to get 256 Byte data
[Check 8] Test psa_generate_random to get 512 Byte data
[Check 9] Test psa_generate_random to get 1000 Byte data
TEST RESULT: PASSED
******************************************
TEST: 218 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_key
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_input_key 16 Byte Key
[Check 2] Test psa_key_derivation_input_key with invalid usage
[Check 3] Test psa_key_derivation_input_key with step as label
[Check 4] Test psa_key_derivation_input_key with step as info
[Check 5] Test psa_key_derivation_input_key with step as seed
[Check 6] Test psa_key_derivation_input_key with step as salt
[Check 7] Test psa_key_derivation_input_key with key type as AES(not derive)
[Check 8] Test psa_key_derivation_input_key incorrect key algorithm
[Check 9] Test psa_key_derivation_input_key with key type as 2048 RSA public key
[Check 10] Test psa_key_derivation_input_key with key type as RSA 2048 keypair
[Check 11] Test psa_key_derivation_input_key with zero as step
[Check 12] Test psa_cipher_decrypt_setup - Invalid key handle
[Check 13] Test psa_cipher_decrypt_setup - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 219 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_key_agreement
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_key_agreement - ECDH SECP256R1
[Check 2] Test psa_key_derivation_key_agreement - Invalid step
[Check 3] Test psa_key_derivation_key_agreement - ECDH SECP384R1
[Check 4] Test psa_key_derivation_key_agreement - Invalid usage
[Check 5] Test psa_key_derivation_key_agreement - KDF not a key agreement alg
[Check 6] Test psa_key_derivation_key_agreement - Public key of different curve
[Check 7] Test psa_key_derivation_key_agreement - Pub key instead of Prv key
[Check 8] Test psa_key_derivation_key_agreement - Invalid handle
[Check 9] Test psa_key_derivation_key_agreement - Zero as handle
TEST RESULT: PASSED
******************************************
TEST: 220 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_bytes
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_output_bytes - HKDF
[Check 2] Test psa_key_derivation_output_bytes - optional salt
[Check 3] Test psa_key_derivation_output_bytes - capacity < output_length
[Check 4] Test psa_key_derivation_output_bytes - missing info
[Check 5] Test psa_key_derivation_output_bytes - missing salt/secret/info
[Check 6] Test psa_key_derivation_output_bytes - TLS12_PRF
[Check 7] Test psa_key_derivation_output_bytes - capacity < output_length
[Check 8] Test psa_key_derivation_output_bytes - missing seed/secret/label
TEST RESULT: PASSED
******************************************
TEST: 221 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_key
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_output_key - Key
[Check 2] Test psa_key_derivation_output_key - Info
[Check 3] Test psa_key_derivation_output_key - Salt
[Check 4] Test psa_key_derivation_output_key - Greater Capacity than available
[Check 5] Test psa_key_derivation_output_key - ECC Public key
[Check 6] Test psa_key_derivation_output_key - ECC keypair (wrong key length)
[Check 7] Test psa_key_derivation_output_key - RSA Public Key[Check 8] Test psa_key_derivation_output_key - RSA keypair
[Check 9] Test psa_key_derivation_output_key - Invalid key size
TEST RESULT: PASSED
******************************************
TEST: 222 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_abort
TEST RESULT: PASSED
******************************************
TEST: 223 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_set_get_capacity
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_set_get_capacity - < operation's capacity
[Check 2] Test psa_key_derivation_set_get_capacity - = operation's capacity
[Check 3] Test psa_key_derivation_set_get_capacity - > operation's capacity
[Check 4] Test psa_key_derivation_set_get_capacity - unchanged capacity
TEST RESULT: PASSED
******************************************
TEST: 224 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_encrypt - CCM - AES - 13B nonce & 8B add data
[Check 2] Test psa_aead_encrypt - CCM - AES - 13B nonce & 32B add data
[Check 3] Test psa_aead_encrypt - CCM - AES - 24 bytes Tag length = 4
[Check 4] Test psa_aead_encrypt - CCM - AES - Zero additional data
[Check 5] Test psa_aead_encrypt - CCM - AES - Zero plaintext
[Check 6] Test psa_aead_encrypt - GCM - AES - 12B nonce & 12B add data
[Check 7] Test psa_aead_encrypt - Unsupported algorithm
[Check 8] Test psa_aead_encrypt - Invalid usage flag
[Check 9] Test psa_aead_encrypt - Invalid ciphertext_size
[Check 10] Test psa_aead_encrypt - Invalid nonce
[Check 11] Test psa_aead_encrypt - Invalid tag length 0
TEST RESULT: PASSED
******************************************
TEST: 225 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_decrypt - CCM - AES - 13B nonce & 8B add data
[Check 2] Test psa_aead_decrypt - CCM - AES - 13B nonce & 32B add data
[Check 3] Test psa_aead_decrypt - CCM - AES - 24 bytes Tag length = 4
[Check 4] Test psa_aead_decrypt - CCM - AES - Zero additional data
[Check 5] Test psa_aead_decrypt - CCM - AES - Zero plaintext
[Check 6] Test psa_aead_decrypt - GCM - AES - 12B nonce & 12B add data
[Check 7] Test psa_aead_decrypt - Unsupported algorithm
[Check 8] Test psa_aead_decrypt - Invalid usage flag
[Check 9] Test psa_aead_decrypt - Invalid plaintext_size
[Check 10] Test psa_aead_decrypt - Invalid nonce
[Check 11] Test psa_aead_decrypt - Invalid cihpertext
[Check 12] Test psa_aead_decrypt - Invalid cihpertext_size
[Check 13] Test psa_aead_decrypt - Invalid tag length 0
TEST RESULT: PASSED
******************************************
TEST: 226 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_sign_setup - HMAC - SHA256
[Check 2] Test psa_mac_sign_setup - CMAC - AES
[Check 3] Test psa_mac_sign_setup - Incompatible HMAC for CMAC
[Check 4] Test psa_mac_sign_setup - Invalid usage flag
[Check 5] Test psa_mac_sign_setup - Invalid key type
[Check 6] Test psa_mac_sign_setup - Truncated MAC too large
[Check 7] Test psa_mac_sign_setup - Truncated MAC too small
[Check 8] Test psa_mac_sign_setup - Unknown MAC algorithm
[Check 9] Test psa_mac_sign_setup - Bad algorithm (not a MAC algorithm)
[Check 10] Test psa_mac_sign_setup invalid key handle
[Check 11] Test psa_mac_sign_setup zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 227 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_update
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_update - HMAC - SHA256 - 64 Byte
[Check 2] Test psa_mac_update - CMAC - AES - 16 Byte
[Check 3] Test psa_mac_update - HMAC - SHA512 - 32 Byte
[Check 4] Test psa_mac_update - HMAC - SHA512 - Invalid operation state
TEST RESULT: PASSED
******************************************
TEST: 228 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_sign_finish - HMAC - SHA224
[Check 2] Test psa_mac_sign_finish - HMAC - SHA256
[Check 3] Test psa_mac_sign_finish - HMAC - SHA512
[Check 4] Test psa_mac_sign_finish - HMAC - SHA224 - Truncated 8 Byte
[Check 5] Test psa_mac_sign_finish - HMAC - SHA224 - Small output buffer
[Check 6] Test psa_mac_sign_finish - HMAC - SHA224 - Invalid operation state
[Check 7] Test psa_mac_sign_finish - CMAC - AES
TEST RESULT: PASSED
******************************************
TEST: 229 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify_setup - HMAC - SHA256
[Check 2] Test psa_mac_verify_setup - CMAC - AES
[Check 3] Test psa_mac_verify_setup - Incompatible HMAC for CMAC
[Check 4] Test psa_mac_verify_setup - Invalid usage flag
[Check 5] Test psa_mac_verify_setup - Invalid key type
[Check 6] Test psa_mac_verify_setup - Truncated MAC too large
[Check 7] Test psa_mac_verify_setup - Truncated MAC too small
[Check 8] Test psa_mac_verify_setup - Unknown MAC algorithm
[Check 9] Test psa_mac_verify_setup - Bad algorithm (not a MAC algorithm)
[Check 10] Test psa_mac_verify_setup invalid key handle
[Check 11] Test psa_mac_verify_setup zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 230 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify_finish - HMAC - SHA224
[Check 2] Test psa_mac_verify_finish - HMAC - SHA256
[Check 3] Test psa_mac_verify_finish - HMAC - SHA512
[Check 4] Test psa_mac_verify_finish - HMAC - SHA224 - Truncated 8 Byte
[Check 5] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid mac length
[Check 6] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid expected mac
[Check 7] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid operation state
[Check 8] Test psa_mac_verify_finish - CMAC - AES
TEST RESULT: PASSED
******************************************
TEST: 231 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_abort - HMAC - SHA224
[Check 2] Test psa_mac_abort - HMAC - SHA224 - Truncated 8 Byte
[Check 3] Test psa_mac_abort - HMAC - SHA256
[Check 4] Test psa_mac_abort - HMAC - SHA512
[Check 5] Test psa_mac_abort - CMAC - AES
[Check 6] Test psa_mac_sign_finish after calling psa_mac_abort
TEST RESULT: PASSED
******************************************
TEST: 232 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_encrypt_setup 16 Byte AES
[Check 2] Test psa_cipher_encrypt_setup 24 Byte AES
[Check 3] Test psa_cipher_encrypt_setup 32 Byte AES
[Check 4] Test psa_cipher_encrypt_setup DES 64 bit key
[Check 5] Test psa_cipher_encrypt_setup Triple DES 2-Key
[Check 6] Test psa_cipher_encrypt_setup Triple DES 3-Key
[Check 7] Test psa_cipher_encrypt_setup 16 Byte raw data
[Check 8] Test psa_cipher_encrypt_setup - not a cipher algorithm
[Check 9] Test psa_cipher_encrypt_setup - unknown cipher algorithm
[Check 10] Test psa_cipher_encrypt_setup - incompatible key ARC4
[Check 11] Test psa_cipher_encrypt_setup - incorrect usage
[Check 12] Test psa_cipher_encrypt_setup - RSA public key
[Check 13] Test psa_cipher_encrypt_setup - RSA keypair
[Check 14] Test psa_cipher_encrypt_setup - EC Public key
[Check 15] Test psa_cipher_encrypt_setup - EC keypair
[Check 16] Test psa_cipher_encrypt_setup - Invalid key handle
[Check 17] Test psa_cipher_encrypt_setup - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 233 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_decrypt_setup 16 Byte AES
[Check 2] Test psa_cipher_decrypt_setup 24 Byte AES
[Check 3] Test psa_cipher_decrypt_setup 32 Byte AES
[Check 4] Test psa_cipher_decrypt_setup DES 64 bit key
[Check 5] Test psa_cipher_decrypt_setup Triple DES 2-Key
[Check 6] Test psa_cipher_decrypt_setup Triple DES 3-Key
[Check 7] Test psa_cipher_decrypt_setup 16 Byte raw data
[Check 8] Test psa_cipher_decrypt_setup - not a cipher algorithm
[Check 9] Test psa_cipher_decrypt_setup - unknown cipher algorithm
[Check 10] Test psa_cipher_decrypt_setup - incompatible key ARC4
[Check 11] Test psa_cipher_decrypt_setup - incorrect usage
[Check 12] Test psa_cipher_decrypt_setup - RSA public key
[Check 13] Test psa_cipher_decrypt_setup - RSA keypair
[Check 14] Test psa_cipher_decrypt_setup - EC Public key
[Check 15] Test psa_cipher_decrypt_setup - EC keypair
[Check 16] Test psa_cipher_decrypt_setup - Invalid key handle
[Check 17] Test psa_cipher_decrypt_setup - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 234 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_generate_iv
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_generate_iv 16 Byte AES
[Check 2] Test psa_cipher_generate_iv 24 Byte AES
[Check 3] Test psa_cipher_generate_iv 32 Byte AES
[Check 4] Test psa_cipher_generate_iv DES 64 bit key
[Check 5] Test psa_cipher_generate_iv DES 2-Key
[Check 6] Test psa_cipher_generate_iv DES 3-Key
[Check 7] Test psa_cipher_generate_iv AES - small iv buffer
[Check 8] Test psa_cipher_generate_iv DES - small iv buffer
TEST RESULT: PASSED
******************************************
TEST: 235 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_set_iv
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_set_iv 16 Byte AES
[Check 2] Test psa_cipher_set_iv 24 Byte AES
[Check 3] Test psa_cipher_set_iv 32 Byte AES
[Check 4] Test psa_cipher_set_iv DES 64 bit key
[Check 5] Test psa_cipher_set_iv DES 2-Key
[Check 6] Test psa_cipher_set_iv DES 3-Key
[Check 7] Test psa_cipher_set_iv AES - small iv buffer
[Check 8] Test psa_cipher_set_iv DES - small iv buffer
[Check 9] Test psa_cipher_set_iv AES - large iv buffer
[Check 10] Test psa_cipher_set_iv DES - large iv buffer
TEST RESULT: PASSED
******************************************
TEST: 236 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_update
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING (Short in)
[Check 3] Test psa_cipher_update - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_update - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_update - Encrypt - AES CTR
[Check 6] Test psa_cipher_update - Encrypt - DES CBC (nopad)
[Check 7] Test psa_cipher_update - Encrypt - 2-key 3DE -CBC (nopad)
[Check 8] Test psa_cipher_update - Encrypt - 3-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_update - Encrypt - small output buffer size
[Check 10] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING
[Check 11] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING (Short in)
[Check 12] Test psa_cipher_update - Decrypt - AES CBC_PKCS7
[Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7 (Short input)
[Check 14] Test psa_cipher_update - Decrypt - AES CTR
[Check 15] Test psa_cipher_update - Decrypt - DES CBC (nopad)
[Check 16] Test psa_cipher_update - Decrypt - 2-key 3DE -CBC (nopad)
[Check 17] Test psa_cipher_update - Decrypt - 3-key 3DE -CBC (nopad)
[Check 18] Test psa_cipher_update - Decrypt - small output buffer size
[Check 19] Test psa_cipher_update without cipher setup
TEST RESULT: PASSED
******************************************
TEST: 237 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING (Short in)
[Check 3] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_finish - Encrypt - AES CTR
[Check 6] Test psa_cipher_finish - Encrypt - AES CTR (short input)
[Check 7] Test psa_cipher_finish - Encrypt - DES CBC (nopad)
[Check 8] Test psa_cipher_finish - Encrypt - 2-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_finish - Encrypt - 3-key 3DE -CBC (nopad)
[Check 10] Test psa_cipher_finish - Encrypt - small output buffer size
[Check 11] Test psa_cipher_finish - Decrypt - AES CBC_NO_PADDING
[Check 12] Test psa_cipher_finish - Decrypt - AES CBC_NO_PADDING (Short in)
[Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7
[Check 14] Test psa_cipher_finish - Decrypt - AES CBC_PKCS7 (Short input)
[Check 15] Test psa_cipher_finish - Decrypt - AES CTR
[Check 16] Test psa_cipher_finish - Decrypt - AES CTR (short input)
[Check 17] Test psa_cipher_finish - Decrypt - DES CBC (nopad)
[Check 18] Test psa_cipher_finish - Decrypt - 2-key 3DE -CBC (nopad)
[Check 19] Test psa_cipher_finish - Decrypt - 3-key 3DE -CBC (nopad)
TEST RESULT: PASSED
******************************************
TEST: 238 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_abort - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_abort - Encrypt - AES CBC_PKCS7
[Check 3] Test psa_cipher_abort - Encrypt - AES CTR
[Check 4] Test psa_cipher_abort - Encrypt - DES CBC (nopad)
[Check 5] Test psa_cipher_abort - Encrypt - 2-key 3DE -CBC (nopad)
[Check 6] Test psa_cipher_abort - Encrypt - 3-key 3DE -CBC (nopad)
[Check 7] Test psa_cipher_abort - Decrypt - AES CBC_NO_PADDING
[Check 8] Test psa_cipher_abort - Decrypt - AES CBC_PKCS7
[Check 9] Test psa_cipher_abort - Decrypt - AES CTR
[Check 10] Test psa_cipher_abort - Decrypt - DES CBC (nopad)
[Check 11] Test psa_cipher_abort - Decrypt - 2-key 3DE -CBC (nopad)
[Check 12] Test psa_cipher_abort - Decrypt - 3-key 3DE -CBC (nopad)
[Check 13] Test psa_cipher_update after psa_cipher_abort should fail
TEST RESULT: PASSED
******************************************
TEST: 239 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_asymmetric_encrypt - RSA PKCS1V15
[Check 2] Test psa_asymmetric_encrypt - RSA KEY_PAIR PKCS1V15
[Check 3] Test psa_asymmetric_encrypt - RSA OAEP SHA256
[Check 4] Test psa_asymmetric_encrypt - RSA OAEP SHA256 with label
[Check 5] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256
[Check 6] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256 with label
[Check 7] Test psa_asymmetric_encrypt - Small output buffer
[Check 8] Test psa_asymmetric_encrypt - Invalid algorithm
[Check 9] Test psa_asymmetric_encrypt - Invalid key type
[Check 10] Test psa_asymmetric_encrypt - Invalid usage
[Check 11] Test psa_asymmetric_encrypt - RSA PKCS1V15 - Salt
[Check 12] Test psa_asymmetric_encrypt - ECC public key
[Check 13] Test psa_asymmetric_encrypt - Invalid key handle
[Check 14] Test psa_asymmetric_encrypt - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 240 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_asymmetric_decrypt - RSA KEY_PAIR PKCS1V15
[Check 2] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256
[Check 3] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256 with label
[Check 4] Test psa_asymmetric_decrypt - Invalid key type (RSA public key)
[Check 5] Test psa_asymmetric_decrypt - Small output buffer
[Check 6] Test psa_asymmetric_decrypt - Invalid algorithm
[Check 7] Test psa_asymmetric_decrypt - Invalid key type (AES Key)
[Check 8] Test psa_asymmetric_decrypt - Invalid usage
[Check 9] Test psa_asymmetric_decrypt - RSA PKCS1V15 - Salt
[Check 10] Test psa_asymmetric_decrypt - Invalid key handle
[Check 11] Test psa_asymmetric_decrypt - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 241 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_sign_hash
[Info] Executing tests from non-secure
[Check 1] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 3] Test psa_sign_hash - ECDSA SECP256R1 SHA-256
[Check 4] Test psa_sign_hash - Invalid key type (RSA public key)
[Check 5] Test psa_sign_hash - Small output buffer
[Check 6] Test psa_sign_hash - Invalid algorithm
[Check 7] Test psa_sign_hash - Invalid key type (AES Key)
[Check 8] Test psa_sign_hash - Invalid usage
[Check 9] Test psa_sign_hash - Wrong hash size
[Check 10] Test psa_sign_hash - Invalid key handle
[Check 11] Test psa_sign_hash - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 242 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_verify_hash
[Info] Executing tests from non-secure
[Check 1] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 3] Test psa_verify_hash - ECDSA KEY_PAIR SECP256R1 SHA-256
[Check 4] Test psa_verify_hash - EC public key
[Check 5] Test psa_verify_hash - RSA public key
[Check 6] Test psa_verify_hash - Small output buffer
[Check 7] Test psa_verify_hash - Invalid algorithm
[Check 8] Test psa_verify_hash - Invalid key type (AES Key)
[Check 9] Test psa_verify_hash - Invalid usage
[Check 10] Test psa_verify_hash - Wrong hash size
[Check 11] Test psa_verify_hash - Wrong signature
[Check 12] Test psa_verify_hash - Wrong signature size
[Check 13] Test psa_verify_hash - Invalid key handle
[Check 14] Test psa_verify_hash - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 243 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_raw_key_agreement
[Info] Executing tests from non-secure
[Check 1] Test psa_raw_key_agreement - ECDH SECP256R1
[Check 2] Test psa_raw_key_agreement - Small buffer size
[Check 3] Test psa_raw_key_agreement - ECDH SECP384R1
[Check 4] Test psa_raw_key_agreement - Invalid usage
[Check 5] Test psa_raw_key_agreement - Unknown KDF
[Check 6] Test psa_raw_key_agreement - Not a key agreement alg
[Check 7] Test psa_raw_key_agreement - Public key on different curve
[Check 8] Test psa_raw_key_agreement - Public key instead of private key
[Check 9] Test psa_raw_key_agreement - Invalid key handle
[Check 10] Test psa_raw_key_agreement - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 244 | DESCRIPTION: Testing crypto key management APIs | UT: psa_copy_key
[Info] Executing tests from non-secure
[Check 1] Test psa_copy_key - 2048 RSA public key
[Check 2] Test psa_copy_key - RSA 2048 keypair
[Check 3] Test psa_copy_key - Incompatible target policy(source and target)
[Check 4] Test psa_copy_key - source key with no export usage
[Check 5] Test psa_copy_key - DES 64 bit key
[Check 6] Test psa_copy_key - Triple DES 2-Key
[Check 7] Test psa_copy_key - Triple DES 3-Key
[Check 8] Test psa_copy_key - EC Public key
[Check 9] Test psa_copy_key - EC keypair
TEST RESULT: PASSED
******************************************
TEST: 245 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_clone
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_clone - MD5 algorithm
[Check 2] Test psa_hash_clone - RIPEMD160 algorithm
[Check 3] Test psa_hash_clone - SHA1 algorithm
[Check 4] Test psa_hash_clone - SHA224 algorithm
[Check 5] Test psa_hash_clone - SHA256 algorithm
[Check 6] Test psa_hash_clone - SHA384 algorithm
[Check 7] Test psa_hash_clone - SHA512 algorithm
[Check 8] Test psa_hash_clone - from an inactive source operation
[Check 9] Test psa_hash_clone - on an active target operation
TEST RESULT: PASSED
******************************************
TEST: 246 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_compute
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_compute HMAC SHA 224
[Check 2] Test psa_mac_compute - Incompactible HMAC for CMAC
[Check 3] Test psa_mac_compute - Invalid usage
[Check 4] Test psa_mac_compute - truncated MAC too small
[Check 5] Test psa_mac_compute - truncated MAC too large
[Check 6] Test psa_mac_compute - bad algorithm (unknown MAC algorithm)
[Check 7] Test psa_mac_compute HMAC SHA 256
[Check 8] Test psa_mac_compute HMAC SHA 512
[Check 9] Test psa_mac_compute HMAC SHA 224 (truncated to 8 Byte)
[Check 10] Test psa_mac_compute CMAC AES 128
[Check 11] Test psa_mac_compute small size buffer
[Check 12] Test psa_mac_compute - Invalid key type
TEST RESULT: PASSED
******************************************
TEST: 247 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify HMAC SHA 224
[Check 2] Test psa_mac_verify HMAC SHA 256
[Check 3] Test psa_mac_verify - Incompactible HMAC for CMAC
[Check 4] Test psa_mac_verify - Invalid usage
[Check 5] Test psa_mac_verify - Truncated MAC too large
[Check 6] Test psa_mac_verify - Truncated MAC too small
[Check 7] Test psa_mac_verify - bad algorithm (unknown MAC algorithm)
[Check 8] Test psa_mac_verify HMAC SHA 512
[Check 9] Test psa_mac_verify HMAC SHA 224 (truncated to 8 Byte)
[Check 10] Test psa_mac_verify CMAC AES 128
[Check 11] Test psa_mac_verify - Invalid key type
[Check 12] Test psa_mac_verify small size buffer
[Check 13] Test psa_mac_verify incorrect expected MAC
TEST RESULT: PASSED
******************************************
TEST: 248 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING (Short input)
[Check 3] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_encrypt - Encrypt - AES CTR
[Check 6] Test psa_cipher_encrypt - Encrypt - AES CTR (short input)
[Check 7] Test psa_cipher_encrypt - Encrypt - DES CBC (nopad)
[Check 8] Test psa_cipher_encrypt - Encrypt - 2-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_encrypt - Encrypt - 3-key 3DE -CBC (nopad)
[Check 10] Test psa_cipher_encrypt - small output buffer size
[Check 11] Test psa_cipher_encrypt - Decrypt - AES CBC_NO_PADDING
TEST RESULT: PASSED
******************************************
TEST: 249 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_decrypt - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING
[Check 3] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING (Short input)
[Check 4] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING
[Check 5] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7
[Check 6] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7 (Short input)
[Check 7] Test psa_cipher_decrypt - Decrypt - AES CTR
[Check 8] Test psa_cipher_decrypt - Decrypt - DES CBC (nopad)
[Check 9] Test psa_cipher_decrypt - Decrypt - 2-key 3DE -CBC (nopad)
[Check 10] Test psa_cipher_decrypt - 3-key 3DE -CBC (nopad)
TEST RESULT: PASSED
******************************************
TEST: 250 | DESCRIPTION: Testing crypto key management APIs | UT: psa_sign_message
[Info] Executing tests from non-secure
[Check 1] Test psa_sign_message - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_sign_message - ECDSA SECP256R1 SHA-256
[Check 3] Test psa_sign_message - Invalid key type (RSA public key)
[Check 4] Test psa_sign_message - Small output buffer
[Check 5] Test psa_sign_message - Invalid algorithm
[Check 6] Test psa_sign_message - Invalid key type (AES Key)
[Check 7] Test psa_sign_message - Invalid usage
[Check 8] Test psa_sign_message - Mismatch key type and Algorithm
[Check 9] Test psa_sign_message - Alg mismatch in key and API call
[Check 10] Test psa_sign_message - Invalid key handle
[Check 11] Test psa_sign_message - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 251 | DESCRIPTION: Testing crypto key management APIs | UT: psa_verify_message
[Info] Executing tests from non-secure
[Check 1] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_verify_message - RSA Public Key PKCS1V15 RAW
[Check 3] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 4] Test psa_verify_message - ECDSA KEY_PAIR SECP256R1 SHA-256
[Check 5] Test psa_verify_message - ECDSA Public Key SECP256R1 SHA-256
[Check 6] Test psa_verify_message - Small output buffer
[Check 7] Test psa_verify_message - Invalid algorithm
[Check 8] Test psa_verify_message - Invalid key type (AES Key)
[Check 9] Test psa_verify_message - Invalid usage
[Check 10] Test psa_verify_message - Wrong message size
[Check 11] Test psa_verify_message - Wrong signature
[Check 12] Test psa_verify_message - Wrong signature size
[Check 13] Test psa_verify_message - Invalid key handle
[Check 14] Test psa_verify_message - Zero as key handle
TEST RESULT: PASSED
******************************************
TEST: 252 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_encrypt_setup - CCM - AES
[Check 2] Test psa_aead_encrypt_setup - CCM - AES - Tag length = 4
[Check 3] Test psa_aead_encrypt_setup - CCM - AES - Mismatched tag length
[Check 4] Test psa_aead_encrypt_setup - CCM - AES - Default Tag length
[Check 5] Test psa_aead_encrypt_setup - GCM - AES
[Check 6] Test psa_aead_encrypt_setup - CCM - DES Invalid key
[Check 7] Test psa_aead_encrypt_setup - Invalid usage flag
TEST RESULT: PASSED
******************************************
TEST: 253 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_decrypt_setup - CCM - AES
[Check 2] Test psa_aead_decrypt_setup - CCM - AES - Tag length = 4
[Check 3] Test psa_aead_decrypt_setup - CCM - AES - Mismatched tag length
[Check 4] Test psa_aead_decrypt_setup - CCM - AES - Default Tag length
[Check 5] Test psa_aead_decrypt_setup - GCM - AES
[Check 6] Test psa_aead_decrypt_setup - CCM - DES Invalid key
[Check 7] Test psa_aead_decrypt_setup - Invalid usage flag
TEST RESULT: PASSED
******************************************
TEST: 254 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_generate_nonce
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_generate_nonce - CCM
[Check 2] Test psa_aead_generate_nonce - CCM - Tag length = 4
[Check 3] Test psa_aead_generate_nonce - CCM - Small buffer size
[Check 4] Test psa_aead_generate_nonce - CCM - Uninitialized operation
[Check 5] Test psa_aead_generate_nonce - CCM - Decrypt operation
[Check 6] Test psa_aead_generate_nonce - GCM
[Check 7] Test psa_aead_generate_nonce - GCM - Decrypt operation
TEST RESULT: PASSED
******************************************
TEST: 255 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_nonce
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_set_nonce - Encrypt - CCM
[Check 2] Test psa_aead_set_nonce - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_set_nonce - Encrypt - CCM - Small nonce size
[Check 4] Test psa_aead_set_nonce - Encrypt - CCM - Large nonce size
[Check 5] Test psa_aead_set_nonce - Encrypt - CCM - Invalid operation state
[Check 6] Test psa_aead_set_nonce - Encrypt - GCM
[Check 7] Test psa_aead_set_nonce - Decrypt - CCM
[Check 8] Test psa_aead_set_nonce - Decrypt - CCM - Tag length = 4
[Check 9] Test psa_aead_set_nonce - Decrypt - CCM - Small nonce size
[Check 10] Test psa_aead_set_nonce - Decrypt - CCM - Large nonce size
[Check 11] Test psa_aead_set_nonce - Decrypt - CCM - Invalid operation state
[Check 12] Test psa_aead_set_nonce - Decrypt - GCM
TEST RESULT: PASSED
******************************************
TEST: 256 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_lengths
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_set_lengths - Encrypt - CCM
[Check 2] Test psa_aead_set_lengths - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_set_lengths - Encrypt - CCM - Zero ad_length
[Check 4] Test psa_aead_set_lengths - Encrypt - CCM - Zero plaintext_length
[Check 5] Test psa_aead_set_lengths - Encrypt - CCM - Invalid operation state
[Check 6] Test psa_aead_set_lengths - Encrypt - GCM
[Check 7] Test psa_aead_set_lengths - Decrypt - CCM
[Check 8] Test psa_aead_set_lengths - Decrypt - CCM - Tag length = 4
[Check 9] Test psa_aead_set_lengths - Decrypt - CCM - Zero ad_length
[Check 10] Test psa_aead_set_lengths - Decrypt - CCM - Zero plaintext_length
[Check 11] Test psa_aead_set_lengths - Decrypt - CCM - Invalid operation state
[Check 12] Test psa_aead_set_lengths - Decrypt - GCM
TEST RESULT: PASSED
******************************************
TEST: 257 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update_ad
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_update_ad - Encrypt - CCM
[Check 2] Test psa_aead_update_ad - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_update_ad - Encrypt - CCM - Zero ad_length
[Check 4] Test psa_aead_update_ad - Encrypt - CCM - Zero plaintext_length
[Check 5] Test psa_aead_update_ad - Encrypt - CCM - Invalid operation state
[Check 6] Test psa_aead_update_ad - Encrypt - CCM - Overflow input length
[Check 7] Test psa_aead_update_ad - Decrypt - CCM
[Check 8] Test psa_aead_update_ad - Decrypt - CCM - Tag length = 4
[Check 9] Test psa_aead_update_ad - Decrypt - CCM - Zero ad_length
[Check 10] Test psa_aead_update_ad - Decrypt - CCM - Zero plaintext_length
[Check 11] Test psa_aead_update_ad - Decrypt - CCM - Invalid operation state
[Check 12] Test psa_aead_update_ad - Decrypt - CCM - Overflow input length
TEST RESULT: PASSED
******************************************
TEST: 258 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_update - Encrypt - CCM
[Check 2] Test psa_aead_update - Encrypt - CCM - Tag length = 4
[Check 3] Test psa_aead_update - Encrypt - CCM - Zero ad_length
[Check 4] Test psa_aead_update - Encrypt - CCM - Zero plaintext_length
[Check 5] Test psa_aead_update - Encrypt - CCM - Small buffer size
[Check 6] Test psa_aead_update - Encrypt - CCM - Less add data than specified
[Check 7] Test psa_aead_update - Encrypt - CCM - Overflow input length
[Check 8] Test psa_aead_update - Encrypt - CCM - Invalid operation state
[Check 9] Test psa_aead_update - Decrypt - CCM
[Check 10] Test psa_aead_update - Decrypt - CCM - Tag length = 4
[Check 11] Test psa_aead_update - Decrypt - CCM - Zero ad_length
[Check 12] Test psa_aead_update - Decrypt - CCM - Zero plaintext_length
[Check 13] Test psa_aead_update - Decrypt - CCM - Small buffer size
[Check 14] Test psa_aead_update - Decrypt - Less add data than specified
[Check 15] Test psa_aead_update - Decrypt - CCM - Overflow input length
[Check 16] Test psa_aead_update - Decrypt - CCM - Invalid operation state
TEST RESULT: PASSED
******************************************
TEST: 259 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_finish - AES-CCM
[Check 2] Test psa_aead_finish - AES-CCM 24 bytes Tag length = 4
[Check 3] Test psa_aead_finish - Small buffer size
[Check 4] Test psa_aead_finish - Input length is less than plaintext length
[Check 5] Test psa_aead_finish - GCM - 16B AES - 12B Nonce & 12B additional data
TEST RESULT: PASSED
******************************************
TEST: 260 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_abort - Encrypt - CCM - AES
[Check 2] Test psa_aead_abort - Encrypt - GCM - AES
[Check 3] Test psa_aead_abort - Decrypt - CCM - AES
[Check 4] Test psa_aead_abort - Decrypt - GCM - AES
[Check 5] Test psa_aead_abort with all initializations
TEST RESULT: PASSED
******************************************
TEST: 261 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_verify - AES-CCM
[Check 2] Test psa_aead_verify - AES-CCM 24 bytes Tag length = 4
[Check 3] Test psa_aead_verify - Small buffer size
[Check 4] Test psa_aead_verify - Input length is less than plaintext length
[Check 5] Test psa_aead_verify - GCM - 16B AES - 12B Nounce & 12B addi data
TEST RESULT: PASSED
******************************************
************ Crypto Suite Report **********
TOTAL TESTS : 61
TOTAL PASSED : 61
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
Entering standby..
```
```
#LD_PRELOAD=/mnt/host/out/ts-install/arm-linuxshared/lib/libts.so /mnt/host/out/ts-install/arm-linuxt/shared/bin/psa-iat-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Attestation Suite
******************************************
TEST: 601 | DESCRIPTION: Testing attestation initial attestation APIs | UT: psa_initial_attestation
[Info] Executing tests from non-secure
[Check 1] Test psa_initial_attestation_get_token with Challenge 32
[Check 2] Test psa_initial_attestation_get_token with Challenge 48
[Check 3] Test psa_initial_attestation_get_token with Challenge 64
[Check 4] Test psa_initial_attestation_get_token with zero challenge size
[Check 5] Test psa_initial_attestation_get_token with small challenge size
[Check 6] Test psa_initial_attestation_get_token with invalid challenge size
[Check 7] Test psa_initial_attestation_get_token with large challenge size
[Check 8] Test psa_initial_attestation_get_token with zero as token size
[Check 9] Test psa_initial_attestation_get_token with small token size
[Check 10] Test psa_initial_attestation_get_token_size with Challenge 32
[Check 11] Test psa_initial_attestation_get_token_size with Challenge 48
[Check 12] Test psa_initial_attestation_get_token_size with Challenge 64
[Check 13] Test psa_initial_attestation_get_token_size with zero challenge size
[Check 14] Test psa_initial_attestation_get_token_size with small challenge size
[Check 15] Test psa_initial_attestation_get_token_size with invalid challenge size
[Check 16] Test psa_initial_attestation_get_token_size with large challenge size
TEST RESULT: PASSED
******************************************
************ Attestation Suite Report **********
TOTAL TESTS : 1
TOTAL PASSED : 1
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
Entering standby..
```
```
#LD_PRELOAD=/mnt/host/out/ts-install/arm-linuxshared/lib/libts.so /mnt/host/out/ts-install/arm-linuxt/shared/bin/psa-its-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Storage Suite
******************************************
TEST: 401 | DESCRIPTION: UID not found check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call get API for UID 6 which is not set
[Check 2] Call get_info API for UID 6 which is not set
[Check 3] Call remove API for UID 6 which is not set
[Check 4] Call get API for UID 6 which is removed
[Check 5] Call get_info API for UID 6 which is removed
[Check 6] Call remove API for UID 6 which is removed
Set storage for UID 6
[Check 7] Call get API for different UID 5
[Check 8] Call get_info API for different UID 5
[Check 9] Call remove API for different UID 5
TEST RESULT: PASSED
******************************************
TEST: 402 | DESCRIPTION: Write once error check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Update the flag of UID 1 with WRITE_ONCE flag
[Check 2] Try to remove the UID 1 having WRITE_ONCE flag
[Check 3] Create a new UID 2 with WRITE_ONCE flag
[Check 4] Try to remove the UID 2 having WRITE_ONCE flag
[Check 5] Try to change the length of write_once UID 2
[Check 6] Check UID removal still fails
[Check 7] Try to change the WRITE_ONCE flag to None for UID 2
[Check 8] Check UID removal still fails
TEST RESULT: PASSED
******************************************
TEST: 403 | DESCRIPTION: Insufficient space check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Overload storage space
UID 13 set failed due to insufficient space
Remove all registered UIDs
[Check 2] Overload storage again to verify all previous UID removed
UID 13 set failed due to insufficient space
Remove all registered UIDs
TEST RESULT: PASSED
******************************************
TEST: 404 | DESCRIPTION: Data Consistency check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2
[Check 2] Call get API with default length - TEST_BUFF_SIZE
TEST RESULT: PASSED
******************************************
TEST: 405 | DESCRIPTION: Success scenarios check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Set UID with data length zero and call storage APIs
[Check 2] Resetting the length check
TEST RESULT: PASSED
******************************************
TEST: 406 | DESCRIPTION: Check for storage create flags | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE
[Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY
[Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION
TEST RESULT: PASSED
******************************************
TEST: 407 | DESCRIPTION: Incorrect Size check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
Create a valid Storage - TEST_BUFF_SIZE/2
Increase the length of storage - TEST_BUFF_SIZE
[Check 1] Call get API with old length - TEST_BUFF_SIZE/2
[Check 2] Call get API with old length - TEST_BUFF_SIZE/4
Decrease the length of storage - TEST_BUFF_SIZE/4
[Check 3] Call get API with old length - TEST_BUFF_SIZE/2
[Check 4] Call get API with old length - TEST_BUFF_SIZE
[Check 5] Call get API with valid length - TEST_BUFF_SIZE/4
TEST RESULT: PASSED
******************************************
TEST: 408 | DESCRIPTION: Invalid offset check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Try to access data with varying valid offset
[Check 2] Try to access data with varying invalid offset
TEST RESULT: PASSED
******************************************
TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Call set API with NULL pointer and data length 0
[Check 2] Call get API with NULL read buffer and data length 0
[Check 3] Remove the UID
[Check 4] Call get_info API to verify UID removed
[Check 5] Create UID with zero data_len and valid write buffer
[Check 8] Call get API with NULL read buffer and data length 0
[Check 9] Increase the length
TEST RESULT: PASSED
******************************************
TEST: 410 | DESCRIPTION: UID value zero check | UT: ITS
[Info] Executing tests from non-secure
[Info] Executing ITS tests
[Check 1] Creating storage with UID 0 should fail
[Check 2] Get_info for UID 0 should fail
[Check 3] Removing storage with UID 0 should fail
TEST RESULT: PASSED
******************************************
************ Storage Suite Report **********
TOTAL TESTS : 10
TOTAL PASSED : 10
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
Entering standby..
```
```
#LD_PRELOAD=/mnt/host/out/ts-install/arm-linuxshared/lib/libts.so /mnt/host/out/ts-install/arm-linuxt/shared/bin/psa-ps-api-test
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Storage Suite
******************************************
TEST: 401 | DESCRIPTION: UID not found check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call get API for UID 6 which is not set
[Check 2] Call get_info API for UID 6 which is not set
[Check 3] Call remove API for UID 6 which is not set
[Check 4] Call get API for UID 6 which is removed
[Check 5] Call get_info API for UID 6 which is removed
[Check 6] Call remove API for UID 6 which is removed
Set storage for UID 6
[Check 7] Call get API for different UID 5
[Check 8] Call get_info API for different UID 5
[Check 9] Call remove API for different UID 5
TEST RESULT: PASSED
******************************************
TEST: 402 | DESCRIPTION: Write once error check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Update the flag of UID 1 with WRITE_ONCE flag
[Check 2] Try to remove the UID 1 having WRITE_ONCE flag
[Check 3] Create a new UID 2 with WRITE_ONCE flag
[Check 4] Try to remove the UID 2 having WRITE_ONCE flag
[Check 5] Try to change the length of write_once UID 2
[Check 6] Check UID removal still fails
[Check 7] Try to change the WRITE_ONCE flag to None for UID 2
[Check 8] Check UID removal still fails
TEST RESULT: PASSED
******************************************
TEST: 403 | DESCRIPTION: Insufficient space check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Overload storage space
UID 13 set failed due to insufficient space
Remove all registered UIDs
[Check 2] Overload storage again to verify all previous UID removed
UID 13 set failed due to insufficient space
Remove all registered UIDs
TEST RESULT: PASSED
******************************************
TEST: 404 | DESCRIPTION: Data Consistency check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2
[ 31.11264234.396662] random: crng init done
[Check 2] Call get API with default length - TEST_BUFF_SIZE
TEST RESULT: PASSED
******************************************
TEST: 405 | DESCRIPTION: Success scenarios check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Set UID with data length zero and call storage APIs
[Check 2] Resetting the length check
TEST RESULT: PASSED
******************************************
TEST: 406 | DESCRIPTION: Check for storage create flags | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE
[Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY
[Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION
TEST RESULT: PASSED
******************************************
TEST: 407 | DESCRIPTION: Incorrect Size check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Create a valid Storage - TEST_BUFF_SIZE/2
Increase the length of storage - TEST_BUFF_SIZE
[Check 1] Call get API with old length - TEST_BUFF_SIZE/2
[Check 2] Call get API with old length - TEST_BUFF_SIZE/4
Decrease the length of storage - TEST_BUFF_SIZE/4
[Check 3] Call get API with old length - TEST_BUFF_SIZE/2
[Check 4] Call get API with old length - TEST_BUFF_SIZE
[Check 5] Call get API with valid length - TEST_BUFF_SIZE/4
TEST RESULT: PASSED
******************************************
TEST: 408 | DESCRIPTION: Invalid offset check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Try to access data with varying valid offset
[Check 2] Try to access data with varying invalid offset
TEST RESULT: PASSED
******************************************
TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Call set API with NULL pointer and data length 0
[Check 2] Call get API with NULL read buffer and data length 0
[Check 3] Remove the UID
[Check 4] Call get_info API to verify UID removed
[Check 5] Create UID with zero data_len and valid write buffer
[Check 8] Call get API with NULL read buffer and data length 0
[Check 9] Increase the length
TEST RESULT: PASSED
******************************************
TEST: 410 | DESCRIPTION: UID value zero check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
[Check 1] Creating storage with UID 0 should fail
[Check 2] Get_info for UID 0 should fail
[Check 3] Removing storage with UID 0 should fail
TEST RESULT: PASSED
******************************************
TEST: 411 | DESCRIPTION: Optional APIs: UID not found check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 412 | DESCRIPTION: Optional APIs: Invalid arguments and offset invalid | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 413 | DESCRIPTION: Set_Extended and Create api : Success | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 414 | DESCRIPTION: Optional APIs not supported check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Optional PS APIs are not supported.
[Check 1] Call to create API should fail as API not supported
Failed at Checkpoint: 1
Actual: 0
Expected: -134
TEST RESULT: FAILED (Error Code=0x1)
******************************************
TEST: 415 | DESCRIPTION: Create API write_once flag value check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 416 | DESCRIPTION: Storage assest capacity modification check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs not are supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
TEST: 417 | DESCRIPTION: Storage assest capacity modification check | UT: PS
[Info] Executing tests from non-secure
[Info] Executing PS tests
Test Case skipped as Optional PS APIs not are supported.
TEST RESULT: SKIPPED (Skip Code=0x2b)
******************************************
************ Storage Suite Report **********
TOTAL TESTS : 17
TOTAL PASSED : 10
TOTAL SIM ERROR : 0
TOTAL FAILED : 1
TOTAL SKIPPED : 6
******************************************
Entering standby..
```
**Component test**
```
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/component-test -v
TEST(BlockVolumeTests, oversizeWrite) - 33881 ms
TEST(BlockVolumeTests, multipleImageInstall) - 680 ms
TEST(BlockVolumeTests, seekAccess) - 0 ms223 ms
TEST(BlockVolumeTests, readAndWrite) - 0 ms521 ms
TEST(BlockVolumeTests, openClose) - 0 ms108 ms
IGNORE_TEST(PartitionTableTests, detectCorruptedGptHeader) - 0 ms
TEST(PartitionTableTests, detectCorruptedMbr) - 1 ms26523 ms
TEST(PartitionTableTests, loadRefPartitionTable) - 0 ms21382 ms
TEST(GptIteratorTests, iterateOverRefGpt) - 0 ms22587 ms
TEST(UefiVariableStoreTests, noRemoveCheck) - 0 ms2044 ms
TEST(UefiVariableStoreTests, readOnlycheck) - 1 ms585 ms
TEST(UefiVariableStoreTests, unsupportedAttribute) - 0 ms326 ms
TEST(UefiVariableStoreTests, failedNvSet) - 0 ms818 ms
TEST(UefiVariableStoreTests, enumerateStoreContents) - 1020 ms
TEST(UefiVariableStoreTests, runtimeAccess) - 0 ms784 ms
TEST(UefiVariableStoreTests, bootServiceAccess) - 0 ms607 ms
TEST(UefiVariableStoreTests, removePersistent) - 0 ms849 ms
TEST(UefiVariableStoreTests, removeVolatile) - 0 ms694 ms
TEST(UefiVariableStoreTests, getWithSmallBuffer) - 700 ms
TEST(UefiVariableStoreTests, persistentSetGet) - 0 ms1042 ms
TEST(UefiVariableStoreTests, setGetRoundtrip) - 0 ms647 ms
TEST(UefiVariableIndexTests, setCheckConstraintsNonExistingVar) - 0 ms283 ms
TEST(UefiVariableIndexTests, setCheckConstraintsExistingVar) - 0 ms503 ms
TEST(UefiVariableIndexTests, checkIterator) - 0 ms516 ms
TEST(UefiVariableIndexTests, removeVariable) - 0 ms298 ms
TEST(UefiVariableIndexTests, dumpBufferTooSmall) - 0 ms259 ms
TEST(UefiVariableIndexTests, dumpLoadRoadtrip) - 0 ms521 ms
TEST(UefiVariableIndexTests, enumerateStore) - 0 ms249 ms
TEST(UefiVariableIndexTests, variableIndexFull) - 0 ms252 ms
TEST(UefiVariableIndexTests, addWithOversizedName) - 0 ms562 ms
TEST(UefiVariableIndexTests, emptyIndexOperations) - 260 ms
TEST(SfsBlockStoreTests, psCreateAndSetExtended) - 0 ms2219 ms
TEST(SfsBlockStoreTests, psCreateAndSet) - 2140 ms
TEST(SfsBlockStoreTests, itsStorageLimitTest) - 0 ms1673 ms
TEST(SfsBlockStoreTests, itsStoreNewItem) - 0 ms1581 ms
TEST(SfsRamTests, psCreateAndSetExtended) - 320 ms
TEST(SfsRamTests, psCreateAndSet) - 0 ms365 ms
TEST(SfsRamTests, itsStorageLimitTest) - 250 ms
TEST(SfsRamTests, itsStoreNewItem) - 0 ms227 ms
TEST(MockStoreTests, psCreateAndSetExtended) - 0 ms174 ms
TEST(MockStoreTests, psCreateAndSet) - 0 ms211 ms
TEST(MockStoreTests, itsStorageLimitTest) - 0 ms174 ms
TEST(MockStoreTests, itsStoreNewItem) - 0 ms211 ms
TEST(SecureStorageProxyTests, psCreateAndSetExtended) - 0 ms1335 ms
TEST(SecureStorageProxyTests, psCreateAndSet) - 0 ms347 ms
TEST(SecureStorageProxyTests, itsStorageLimitTest) - 260 ms
TEST(SecureStorageProxyTests, itsStoreNewItem) - 300 ms
TEST(SecureStorageClientTests, psCreateAndSetExtended) - 0 ms378 ms
TEST(SecureStorageClientTests, psCreateAndSet) - 0 ms262 ms
TEST(SecureStorageClientTests, itsStorageLimitTest) - 200 ms
TEST(SecureStorageClientTests, itsStoreNewItem) - 0 ms221 ms
TEST(CryptoProtocolPackedcChecks, checkKeyUsage) - 0 ms49 ms
TEST(CryptoProtocolPackedcChecks, checkKeyLifetime) - 0 ms16 ms
TEST(CryptoProtocolPackedcChecks, checkAlg) - 0 ms31 ms
TEST(CryptoProtocolPackedcChecks, checkDhGroup) - 0 ms37 ms
TEST(CryptoProtocolPackedcChecks, checkEccCurve) - 100 ms
TEST(CryptoProtocolPackedcChecks, checkKeyType) - 0 ms45 ms
TEST(CryptoProtocolProtobufChecks, checkKeyUsage) - 0 ms49 ms
TEST(CryptoProtocolProtobufChecks, checkKeyLifetime) - 20 ms
TEST(CryptoProtocolProtobufChecks, checkAlg) - 0 ms65 ms
TEST(CryptoProtocolProtobufChecks, checkDhGroup) - 0 ms45 ms
TEST(CryptoProtocolProtobufChecks, checkEccCurve) - 0 ms76 ms
TEST(CryptoProtocolProtobufChecks, checkKeyType) - 0 ms
TEST(CryptoProtocolOpcodeChecks, checkPackedcToProtobuf) - 0 ms37 ms
TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 1 ms6595 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 1000 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 0 ms667 ms
TEST(CryptoMacServicePackedcTests, macAbort) - 0 ms824 ms
TEST(CryptoMacServicePackedcTests, signAndVerify) - 23800 ms
TEST(CryptoCipherServicePackedcTests, cipherAbort) - 0 ms668 ms
TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 14015 ms
TEST(CryptoHashServicePackedcTests, hashAbort) - 0 ms1985 ms
TEST(CryptoHashServicePackedcTests, hashAndVerify) - 0 ms3954 ms
TEST(CryptoHashServicePackedcTests, calculateHash) - 0 ms988 ms
TEST(CryptoServicePackedcTests, generateRandomNumbers) - 0 ms1337 ms
TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 18 ms046843 ms
TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 0 ms137365 ms
TEST(CryptoServicePackedcTests, signAndVerifyEat) - 3 ms253256 ms
TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 3 ms252541 ms
TEST(CryptoServicePackedcTests, signAndVerifyHash) - 3 ms250919 ms
TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 21470 ms
TEST(CryptoServicePackedcTests, exportPublicKey) - 0 ms42058 ms
TEST(CryptoServicePackedcTests, purgeKey) - 1 ms21253 ms
TEST(CryptoServicePackedcTests, - 0 mscopyKey) - 136364 ms
TEST(CryptoServicePackedcTests, generatePersistentKeys) - 41861 ms
TEST(CryptoServicePackedcTests, generateVolatileKeys) - 41730 ms
TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 0 ms1798 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 7 ms573779 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 130699 ms
TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 3 ms251300 ms
TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 250868 ms
TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 1 ms21742 ms
TEST(CryptoServiceProtobufTests, exportPublicKey) - 0 ms42198 ms
TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 1 ms42363 ms
TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 0 ms41947 ms
TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 76 ms10388464 ms
TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 2023418 ms
TEST(CryptoFaultTests, randomNumbersWithBrokenStorage) - 0 ms246 ms
TEST(CryptoFaultTests, persistentKeysWithBrokenStorage) - 1 ms20787 ms
TEST(CryptoFaultTests, volatileKeyWithBrokenStorage) - 0 ms21344 ms
TEST(PocCryptoOpTests, checkOpSequence) - 1 ms66220 ms
TEST(CryptoMsgTests, SignHashOutMsgTest) - 0 ms71 ms
TEST(CryptoMsgTests, SignHashInMsgTest) - 0 ms249 ms
TEST(CryptoMsgTests, ExportPublicKeyOutMsgTest) - 0 ms238 ms
TEST(CryptoMsgTests, ExportPublicKeyInMsgTest) - 50 ms
TEST(CryptoMsgTests, GenerateKeyInMsgTest) - 200 ms
TEST(CryptoContextPoolTests, multipleContexts) - 0 ms39459 ms
TEST(CryptoContextPoolTests, singleContext) - 0 ms54 ms
TEST(CryptoContextPoolTests, checkEmptyPool) - 0 ms79 ms
TEST(FwuUpdateFmpTests, wholeFmpFlow) - 0 ms7742 ms
TEST(FwuOversizeImageTests, oversizeInstallMultiLocationEndStaging) - 1 ms48529 ms
TEST(FwuOversizeImageTests, oversizeInstallEndStaging) - 0 ms11633 ms
TEST(FwuOversizeImageTests, oversizeInstallCancelStaging) - 0 ms11628 ms
TEST(FwuOversizeImageTests, maxSizeInstall) - 0 ms17872 ms
TEST(FwuRollbackTests, bootloaderFallback) - 0 ms11191 ms
TEST(FwuRollbackTests, selectPreviousAfterActivation) - 0 ms15366 ms
TEST(FwuRollbackTests, selectPreviousPriorToActivation) - 11142 ms
TEST(FwuPowerFailureTests, powerFailureDuringTrial) - 0 ms71538 ms
TEST(FwuPowerFailureTests, powerFailureDuringStaging) - 55901 ms
TEST(FwuUpdateScenarioTests, partialFirmwareUpdateFlow) - 0 ms45294 ms
TEST(FwuUpdateScenarioTests, wholeFirmwareUpdateFlow) - 0 ms15402 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInTrial) - 1 ms33949 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInStaging) - 16350 ms
TEST(FwuInvalidBehaviourTests, invalidOperationsInRegular) - 0 ms5621 ms
TEST(FwuImageDirectoryTests, zeroFwLocations) - 0 ms523 ms
TEST(FwuImageDirectoryTests, multipleFwLocations) - 15860 ms
TEST(FwuImageDirectoryTests, singleFwLocation) - 0 ms5619 ms
TEST(FwuImageDirectoryTests, streamRecycling) - 0 ms19707 ms
TEST(FwuImageDirectoryTests, streamedReads) - 18270 ms
TEST(FwuDefaultInstallerFactoryTests, configureInstallersFlow) - 0 ms608 ms
TEST(FwuCopyInstallerTests, installAndCopy) - 0 ms45578 ms
TEST(FwuRawInstallerTests, normalInstallFlow) - 1 ms22412 ms
TEST(FwuMetadataV2Tests, checkImgBankInfoStructure) - 0 ms
TEST(FwuMetadataV2Tests, checkImgEntryStructure) - 0 ms37 ms
TEST(FwuMetadataV2Tests, checkFwStoreDescStructure) - 20 ms
TEST(FwuMetadataV2Tests, checkHeaderStructure) - 0 ms11 ms
TEST(FwuMetadataManagerTests, checkAndRepairInaccessibleStorage) - 0 ms20799 ms
TEST(FwuMetadataManagerTests, checkAndRepairAccessibleStorage) - 1 ms56959 ms
TEST(PartitionedBlockStoreTests, writeToInvalidBlock) - 0 ms237 ms
TEST(PartitionedBlockStoreTests, checkEraseLimits) - 0 ms641 ms
TEST(PartitionedBlockStoreTests, writeReadEraseBlock) - 0 ms635 ms
TEST(PartitionedBlockStoreTests, openClose) - 0 ms174 ms
TEST(PartitionedBlockStoreTests, getPartitionInfo) - 0 ms185 ms
TEST(FileBlockStoreTests, initWithExistingDiskImage) - 2 ms1546 ms
TEST(FileBlockStoreTests, wholeBlockRw) - 0 ms3347 ms
TEST(RamBlockStoreTests, eraseOperations) - 0 ms191 ms
TEST(RamBlockStoreTests, writeToInvalidBlock) - 0 ms122 ms
TEST(RamBlockStoreTests, writeBiggerThanBlock) - 0 ms242 ms
TEST(RamBlockStoreTests, writeReadEraseBlock) - 0 ms313 ms
TEST(RamBlockStoreTests, openClose) - 0 ms85 ms
TEST(RamBlockStoreTests, getPartitionInfo) - 0 ms96 ms
TEST(AttestationProvisioningTests, provisionedIak) - 0 ms21012 ms
TEST(AttestationProvisioningTests, selfGeneratedIak) - 1 ms61830 ms
TEST(AttestationServiceTests, repeatedOperation) - 55 ms061352 ms
TEST(AttestationServiceTests, invalidChallengeLen) - 0 ms158 ms
TEST(AttestationServiceTests, checkTokenSize) - 2 ms91593 ms
TEST(AttestationReporterTests, createReport) - 171984 ms
TEST(TcgEventLogTests, interateBootMeasurements) - 0 ms174 ms
TEST(DiscoveryServiceTests, checkServiceInfo) - 0 ms349 ms
TEST(ServiceNameTests, readService) - 0 ms327 ms
TEST(ServiceNameTests, checkFields) - 0 ms275 ms
TEST(ServiceNameTests, checkInvalidServiceNames) - 0 ms37 ms
TEST(ServiceNameTests, checkValidServiceNames) - 0 ms118 ms
TEST(ServiceFrameworkTests, serviceProviderChain) - 0 ms123 ms
TEST(ServiceFrameworkTests, serviceWithOps) - 0 ms13 ms
TEST(ServiceFrameworkTests, serviceWithNoOps) - 0 ms76 ms
TEST(ffarpc_call_ep, request_deny_64_bit) - 0 ms1331 ms
TEST(ffarpc_call_ep, request_with_data_after_unshare) - 1 ms3618 ms
TEST(ffarpc_call_ep, request_with_data_buffer_overflow) - 0 ms1728 ms
TEST(ffarpc_call_ep, request_with_data) - 0 ms2421 ms
TEST(ffarpc_call_ep, request_without_data_non_zero_length) - 0 ms71 ms
TEST(ffarpc_call_ep, request_without_data) - 0 ms675 ms
TEST(ffarpc_call_ep, invalid_mgmt_call) - 0 ms84 ms
TEST(ffarpc_call_ep, mem_unshare_null_ep) - 0 ms102 ms
TEST(ffarpc_call_ep, mem_share_unshare_relinquish_fail_then_success) - 0 ms3123 ms
TEST(ffarpc_call_ep, mem_share_unshare_relinquish_fail) - 0 ms2367 ms
TEST(ffarpc_call_ep, mem_share_unshare) - 0 ms2377 ms
TEST(ffarpc_call_ep, mem_unshare) - 0 ms82 ms
TEST(ffarpc_call_ep, mem_share_null_ep) - 100 ms
TEST(ffarpc_call_ep, mem_share_smaller_page_count_relinquish_fail) - 0 ms2393 ms
TEST(ffarpc_call_ep, mem_share_smaller_page_count) - 0 ms2353 ms
TEST(ffarpc_call_ep, mem_share_retrieve_fail) - 0 ms1719 ms
TEST(ffarpc_call_ep, mem_share_fill_all) - 0 ms26378 ms
TEST(ffarpc_call_ep, mem_share) - 0 ms1675 ms
TEST(ffarpc_caller, end) - 0 ms82 ms
TEST(ffarpc_caller, end_null_handle) - 140 ms
TEST(ffarpc_caller, end_null_context) - 0 ms
TEST(ffarpc_caller, invoke_without_response) - 0 ms605 ms
TEST(ffarpc_caller, invoke_with_response) - 0 ms626 ms
TEST(ffarpc_caller, invoke_invalid_resp_len) - 0 ms642 ms
TEST(ffarpc_caller, invoke_send_direct_req_fail) - 0 ms491 ms
TEST(ffarpc_caller, invoke_resp_long_req) - 0 ms37 ms
TEST(ffarpc_caller, invoke_resp_no_begin) - 0 ms48 ms
TEST(ffarpc_caller, invoke_resp_len_null) - 0 ms86 ms
TEST(ffarpc_caller, invoke_resp_buf_null) - 0 ms46 ms
TEST(ffarpc_caller, invoke_opstatus_null) - 0 ms93 ms
TEST(ffarpc_caller, invoke_handle_context_diff) - 60 ms
TEST(ffarpc_caller, invoke_null_context) - 0 ms
TEST(ffarpc_caller, begin_without_buffer) - 0 ms85 ms
TEST(ffarpc_caller, begin_with_buffer) - 0 ms55 ms
TEST(ffarpc_caller, begin_not_opened) - 0 ms45 ms
TEST(ffarpc_caller, begin_too_large_req) - 0 ms87 ms
TEST(ffarpc_caller, begin_transaction_in_progress) - 100 ms
TEST(ffarpc_caller, begin_null_buffer) - 0 ms134 ms
TEST(ffarpc_caller, begin_null_context) - 0 ms42 ms
TEST(ffarpc_caller, close_success) - 0 ms1094 ms
TEST(ffarpc_caller, close_endpoint_and_mem_reclaim_fail) - 0 ms927 ms
TEST(ffarpc_caller, close_mem_reclaim_fail) - 0 ms948 ms
TEST(ffarpc_caller, close_send_direct_msg_fail) - 0 ms483 ms
TEST(ffarpc_caller, close_not_opened) - 0 ms37 ms
TEST(ffarpc_caller, open_success) - 0 ms1851 ms
TEST(ffarpc_caller, open_send_direct_req_rpc_status_fail_reclaim_fail) - 0 ms2218 ms
TEST(ffarpc_caller, open_send_direct_req_rpc_status_fail) - 0 ms2237 ms
TEST(ffarpc_caller, open_send_direct_req_fail) - 0 ms1712 ms
TEST(ffarpc_caller, open_share_fail) - 0 ms1315 ms
TEST(ffarpc_caller, open_invalid_mem_size) - 0 ms82 ms
TEST(ffarpc_caller, open_already_opened) - 0 ms68 ms
TEST(ffarpc_caller, discover_more_max_cnt) - 1184 ms
TEST(ffarpc_caller, discover_less_max_cnt) - 0 ms1065 ms
TEST(ffarpc_caller, discover) - 1100 ms
TEST(ffarpc_caller, discover_rx_release_fail) - 0 ms1007 ms
TEST(ffarpc_caller, discover_rx_get_fail) - 0 ms868 ms
TEST(ffarpc_caller, discover_partition_info_get_fail) - 0 ms511 ms
TEST(ffarpc_caller, discover_invalid_arguments) - 0 ms97 ms
TEST(RpcStatusProtocolChecks, checkProtobufRpcStatusCodes) - 60 ms
TEST(ConfigRamstoreTests, checkMultipleConfig) - 0 ms53 ms
TEST(ConfigRamstoreTests, checkSingleConfig) - 0 ms87 ms
TEST(ConfigRamstoreTests, checkEmptyConfig) - 0 ms43 ms
TEST(Crc32Tests, multiPart) - 0 ms39 ms
TEST(Crc32Tests, longString) - 0 ms87 ms
TEST(Crc32Tests, shortString) - 0 ms46 ms
TEST(EndianTests, le64) - 0 ms86 ms
TEST(EndianTests, le32) - 0 ms31 ms
TEST(EndianTests, le16) - 0 ms27 ms
TEST(EndianTests, le8) - 100 ms
TEST(TlvTests, encodeWrongOrder) - 0 ms79 ms
TEST(TlvTests, encodeInsufficientSpace) - 100 ms
TEST(TlvTests, encodeRecords) - 0 ms223 ms
TEST(TlvTests, decodeBadRecords) - 0 ms56 ms
TEST(TlvTests, findAndDecodeMissingOptional) - 50 ms
TEST(TlvTests, findAndDecode) - 0 ms76 ms
TEST(TlvTests, decodeGoodRecords) - 0 ms37 ms
TEST(UuidTests, roundTrip) - 0 ms136 ms
TEST(UuidTests, checkNilUuidOperations) - 100 ms
TEST(UuidTests, checkIsEqualOperation) - 0 ms124 ms
TEST(UuidTests, checkOctetsFromCanonical) - 0 ms86 ms
TEST(UuidTests, parseValidUuidToGuidOctets) - 0 ms
TEST(UuidTests, parseError) - 0 ms61 ms
TEST(UuidTests, parseUuidInUrn) - 0 ms87 ms
TEST(UuidTests, parseValidUuidMixedCase) - 0 ms82 ms
TEST(UuidTests, parseValidUuidLowerCase) - 0 ms82 ms
TEST(TsDemoTests, runTsDemo) - 7 ms624043 ms
OK (252 tests, 251 ran, 365136 checks, 1 ignored, 0 filtered out, 223 ms23127180 ms)
```
**LibTS test**
(linux-pc only)**
```
TEST(CryptoStrusted-servicePackedcTests, generateRandomNumbers) - 1 mss/tools/b-test/build-libts-linux-pc/libts-test -v
TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSaltgenerateRandomNumbers) - 5 ms2 ms
TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 1 ms6 ms
TEST(CryptoServicePackedcTests, signAndVerifyEaasymEncryptDecrypt) - 3 ms2 ms
TEST(CryptoServicePackedcTests, signAndVerifyMessageEat) - 2 ms
TEST(CryptoServicePackedcTests, signAndVerifyHashMessage) - 3 ms
TEST(CryptoServicePackedcTests, signAndVerifyHash) - 2 ms
TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 0 ms1 ms
TEST(CryptoServicePackedcTests, exportPublicKey) - 0 ms
TEST(CryptoServicePackedcTests, purgeKey) - 1 ms0 ms
TEST(CryptoServicePackedcTests, copyKey) - 1 ms
TEST(CryptoServicePackedcTests, generatePersistentKeys) - 0 ms1 ms
TEST(CryptoServicePackedcTests, generateVolatileKeys) - 1 ms0 ms
TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 0 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 6 ms14 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 1 ms
TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 3 ms
TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 2 ms
TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 0 ms1 ms
TEST(CryptoServiceProtobufTests, exportPublicKey) - 1 ms0 ms
TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 0 ms
TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 1 ms
- 66 ms- 68 ms
TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 17 ms
TEST(PsServiceTests, createAndSetExtended) - 2 ms1 ms
TEST(PsServiceTests, createAndSet) - 0 ms
TEST(PsServiceTests, storeNewItem) - 0 ms1 ms
TEST(ItsServiceTests, storeNewItem) - 0 ms
OK (27 tests, 27 ran, 235 checks, 0 ignored, 0 filtered out, 117 ms)
```
**Platform inspect test**
```
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/platform-inspect
attestation_report:
challenge: ba 13 ba ab 68 cd 58 ec 27 35 dc 67 06 81 3f e4 fd 5a 87 58 49 9b 52 2e 5b d4 7b 76 92 1e ce 0031 03 a3 a3 e5 e2 d8 1a ea e1 df 26 85 1c c0 2a 4d ac 4a 3e ba 32 15 53 0e f2 e3 fe 91 f6 8b 75
client_id: 0
boot_seed: e1 ae 36 db 01 4a 06 c8 9c e4 19 1b 08 2f af f1 16 ae 4d 36 61 82 82 e5 63 58 66 8d ec f5 e9 5dc 0b f2 64 34 7a 8c 68 ca ff 5f a4 e2 ff 90 70 25 64 be e1 13 90 58 97 42 b1 ce 4a d2 f8 7b 3a
security_lifecycle: 0
instance_id: 01 62 4b 81 d4 9a 0d 99 84 83 87 f3 4c 05 43 f5 1f 89 34 73 b6 b9 6a eb 12 ce af cf 25 62 22 f5 e69c d5 b1 3e 0b 88 a9 12 87 c7 1e 52 0d 58 39 92 a7 69 d9 58 bb 8a db 10 15 f0 77 c0 a1 25 63 32
implementation_id: 74 72 75 73 74 65 64 66 69 72 6d 77 61 72 65 2e 6f 72 67 2e 74 73 2e 7361 74 74 61 6e 65 73 74 61 6c74 69 6f 6e 655f 73 70
sw_components:
type: FW_CONFIG
digest: 5e 10 97 50 c0 cb 32 14 e6 e4 09 f7 12 ba 84 d6 d1 d6 e2 d4 45 8c 52 f3 d2 b9 6e ea 82 d4 e5 47
type: TB_FW_CONFIG
digest: dc 45 e2 c1 a9 f5 b1 81 9a 10 8e 8e 0f 0a 5e b2 e1 c1 94 00 73 ae 14 83 eb dd e1 f5 fe ac 72 5c
type: BL_2
digest: a8 4f b4 7b 54 d9 4b ab 49 73 63 f7 9b fc 66 cb 85 12 ab 18 6f 24 74 01 5d cf 33 f3 80 9e 9b 20d1 56 89 90 7e d8 98 71 72 47 fb 91 9e c2 0b 7b 5d 89 f4 07 ce 27 8d 37 54 20 d8 aa ea 92 30 ae
type: BL_31SECURE_RT_EL3
digest: 2f d3 43 6c 6f ef 9b 11 c2 16 dd 1f 8b df 9b a5 24 1499 56 5e 18 d3 ea 1b 8f 79 63 c8 66 19 48 a2 50 f8 c3 0c a5 c1 97 0c 3a 6c 78 bf ef 64 0f c1 23 e133 99 53 9e 11 c2 cd 5e 11 c5 8c dc
type: HW_CONFIG
digest: f3 de 4e 17 a1 a5 a7 fe d9 d9 f4 16 3c 49 36 7e ae f7 2f 2a a8 87 e6 b6 22 89 cd 27 dc 1c 80 2554 10 fe 53 a5 fe 12 75 dc cc 3a 15 8f d8 34 63 f3 3e 1e 71 7f e3 4c 39 a1 62 4a 90 5c 0a 84 f3
type: SOC_FW_CONFIG
digest: 4e e4 8e 5a e6 50 ed e0 b5 a3 54 8a 1f d6 0e 8a ea 0e 71 75 0e a4 3f 82 76 ce af cd 7c b0 91 e0
type: BL_32SECURE_RT_EL1_UNKNOWN
digest: 62 22 4f 0f b0 5d b4 77 1b 3f a5 2e ab 76 1e 61 17 b8 c6 6e ac 8c c8e9 4a 94 e4 1e 0c 28 97 3a 6b b8 dc 2f 89 fc f9 af e9 d3 67 98 89 2c 4d 2e b0 7d 70 08 60 4b 410a 6d 3b b5 59 11 c6 73
type: BL32_EXTRA1_IMAGETOS_FW_CONFIG
digest: 39 d2 b8 5d 93 5d f6 d8 f8 ed 0c 1a 3a e3 c8 90 72 19 f4 88 5c 79 15 05 7b f0 76 db c1 4c 5d 7777 35 1c d8 86 d0 66 15 eb 3a 2d 2d 9c ef b9 49 ba 0a 4a 67 58 ff 06 b7 90 7d c7 06 38 ce c6 0b
type: BL_33
digest: b5 d6 08 61a2 6c ec 40 dd fa 6d da a3 f7 a5 de d6 8f 6f 39 25 b1 57 fa 3e db 46 42 58 24 8e 81 1c 45 5d 38dd 31 ce af 90 09 5b 25 c6 e3 83 b3 3e 6f 11 fc 13 4f 8e 83 64 0d 53 b6 34 22 6c
type: NT_FW_CONFIG
digest: 25 10 60 5d d4 bc 9d 82 7a 16 9f 8a cc 47 95 a6 fd ca a0 c1 2b c9 99 8f 51 20 ff c6 ed 74 68 50c 53 ba 3f c9 43 13 bf 25 59 bc 8c 2e 7e 49 fa 0f 1a 5a 40 96 ed 58 fa 58 31 39 7a de d4 e4 fb
type: CRITICAL DATA
digest: d3 a9 31 35 10 be c0 88 51 bd 28 4e a9 ff b3 c3 cd 02 11 fc 23 2e 02 07 0e ce a5 ab 1d d9 a1 6a
```
**TS Demo test**
**UEFI test**```
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/ts-demo
Demonstrates use of trusted services from an application
---------------------------------------------------------
A client requests a set of crypto operations performed by
the Crypto service. Key storage for persistent keys is
provided by the Secure Storage service via the ITS client.
Generating random bytes length: 1
Operation successful
Random bytes:
55
Generating random bytes length: 7
Operation successful
Random bytes:
2B 35 04 79 3B 50 83
Generating random bytes length: 128
Operation successful
Random bytes:
57 31 1C 74 88 69 C4 12
D1 9A 93 83 2D D2 AA 0C
EA 03 F5 44 09 6A 92 11
8A 8A 06 57 26 B1 47 74
01 1B 2A 25 8D CF 6C A3
A6 4D 6D A1 8B FC 31 76
57 13 72 96 C4 09 BA 56
88 35 F9 66 58 B0 EE 1E
AF E9 90 9D AD BB 62 21
82 37 E1 31 37 43 18 5B
95 2E 42 BB 6B 41 40 66
A5 81 81 32 3F F3 23 8A
5A 88 B2 9D 2C B0 F2 C4
51 26 13 53 FE 8F 68 B0
B0 D1 64 85 3C E9 5A C8
E2 0A 62 80 F1 AB A2 7C
Generating ECC signing key
Operation successful
Signing message: "The quick brown fox" using key: 256
Operation successful
Signature bytes:
77 1E 93 3C E1 A2 CD C4
5D 03 15 B8 A9 1A AE 47
37 6A B8 F0 5D 67 22 06
FC 2C B8 20 71 97 7F F8
AE 06 0F 71 34 E3 0B FD
CA 24 C2 23 0F 89 67 99
51 B5 FE 25 95 CD 75 ED
1B A2 6E 5A 3A 06 26 3C
Verify signature using original message: "The quick brown fox"
Operation successful
Verify signature using modified message: "!he quick brown fox"
Successfully detected modified message
Signing message: "jumps over the lazy dog" using key: 256
Operation successful
Signature bytes:
91 1A 8E 4B 17 3C 01 FF
A2 0A D4 55 39 3E 84 96
92 84 A3 F1 A1 26 5C 40
14 A6 57 50 79 70 41 ED
68 E4 21 61 DD 9F 07 0C
DE 9C DC 29 F5 9F 88 DF
36 0D C4 21 54 D3 CD F8
35 C0 7B 16 10 59 26 4A
Verify signature using original message: "jumps over the lazy dog"
Operation successful
Verify signature using modified message: "!umps over the lazy dog"
Successfully detected modified message
Generating RSA encryption key
Operation successful
Encrypting message: "Top secret" using RSA key: 257
Operation successful
Encrypted message:
6E 9A 04 F4 64 33 0B 6D
DE CB C7 21 EF C8 FC A9
95 50 F1 6C 90 64 AA A0
D6 99 BD 90 4C 79 A0 73
Decrypting message using RSA key: 257
Operation successful
Decrypted message: "Top secret"
Exporting public key: 256
Operation successful
Public key bytes:
04 D5 1A 1C 30 72 3C CF
3B E3 0B 47 92 54 2E 6E
61 28 26 A1 FB 00 82 75
AC 44 14 18 B4 87 66 F7
F8 47 0B 25 83 04 4B 9A
6F 08 DF 98 E1 81 77 E7
6B 29 34 60 2A 52 94 96
E8 6E 2E 0E 78 5A EF 81
98
Destroying signing key: 256
Operation successful
Destroying encryption key: 257
Operation successful
```
==Config 2: FIP SP==
====Build command====
```
MEASURED_BOOT=y SPMC_TESTS=n TS_SMM_GATEWAY=n TS_UEFI_TESTS=n SP_PACKAGING_METHOD=fip DEFAULT_SP_CONFIG=default-sp SP_BLOCK_STORAGE_CONFIG=default-sp SP_PSA_ITS_CONFIG=shared-flash-opteesp SP_PSA_PS_CONFIG=shared-flash-opteesp make
```
====Setup steps after boot====
```
/mnt/host/out/linux-arm-ffa-tee/load_module.sh
/mnt/host/out/linux-arm-ffa-user/load_module.sh
cp -at /usr /mnt/host/out/ts-install/arm-linux/bin /mnt/host/out/ts-install/arm-linux/lib
```
====Test results====
**Trusted Services service level test**
```
```
**PSA Architecture Test Suite**
```
```
**Component test**
```
```
**LibTS test**
```
```
**Platform inspect test**
```
```
**TS Demo test**
**UEFI test**
==Config 3: OP-TEE SPMC tests==
====Build command====
```
MEASURED_BOOT=n SPMC_TESTS=n TS_SMM_GATEWAY=y TS_UEFI_TESTS=y DEFAULT_SP_CONFIG=default-sp SP_PACKAGING_METHOD=fip make
```
====Setup steps after boot====
```
/mnt/host/out/linux-arm-ffa-tee/load_module.sh
/mnt/host/out/linux-arm-ffa-user/load_module.sh
cp -at /usr /mnt/host/out/ts-install/arm-linux/bin /mnt/host/out/ts-install/arm-linux/lib
```
====Test results====
==Config 4: SMMGW tests==
====Build command====
```
MEASURED_BOOT=n SPMC_TESTS=y TS_SMM_GATEWAY=n TS_UEFI_TESTS=n SP_PACKAGING_METHOD=embedded DEFAULT_SP_CONFIG=default-opteesp make
```
====Setup steps after boot====
```
/mnt/host/out/linux-arm-ffa-tee/load_module.sh
/mnt/host/out/linux-arm-ffa-user/load_module.sh
cp -at /usr /mnt/host/out/ts-install/arm-linux/bin /mnt/host/out/ts-install/arm-linux/lib
```
====Test results====