Page MenuHomePhabricator

OP-TEE SPMC status v3.17
Updated 65 Days AgoPublic

OP-TEE SPMC implementation

Introduction

OP-TEE SPMC implementation

This document describes the OP-TEE SPMC (Secure Partition Manager Core) implementation. This implementation is used to support the Trusted Services PSA Secure Partitions (SPs). The PSA SPs are implemented based on the Arm FF-A specification. The OP-TEE SPMC can be used as a reference S-EL1 implementation and the Trusted Service can be used a reference S-EL0 SP implementations.

FF-A

Arm Firmware Framework for Arm A-profile (FF-A) is a framework designed to standardize the communication between the various software images.
Including the communication between the various software images in the Secure world and Normal world. The current release of the OP-TEE SPMC is based around the FF-A v1.0 spec.

OP-TEE

OP-TEE is an open source Trusted Execution Environment (TEE) implementing the Arm TrustZone technology. More information can be found at readthedocs. OP-TEE can run both as a S-EL1 SP or as the S-EL1 SPMC.
This document describes OP-TEE as a S-EL1 SPMC. The current mainline OP-TEE version can be found here.

Trusted Services

The Trusted Services project provides a framework for developing and deploying device Root of Trust (RoT) services across a range of secure processing environments such as those provided by OP-TEE and Hafnium.
More information about Trusted Services can be found at Trusted-Services.

Current Status

Limited support for OP-TEE SPMC aligning with FF-A 1.0 is available in mainline and OP-TEE v3.17.
Complete support for FF-A 1.0 and TS is planned for upcoming releases. See below for status.

SPMC status

OP-TEE mainline SPMC FF-A status:

DescriptionStatus
SP loadingSupported
SP messagingSupported
SP manifest filesPartially supported [^1]
Memory managementSupported
InterruptsNot supported

[^1]: Only mapping device memory regions is supported.

OP-TEE mainline SPMC FF-A messages status:

NameStatus
FFA_ERRORSupported
FFA_SUCCESSSupported
FFA_INTERRUPTNot supported
FFA_VERSIONSupported
FFA_FEATURESSupported
FFA_RX_RELEASESupported
FFA_RXTX_MAPSupported
FFA_RXTX_UNMAPSupported
FFA_PARTITION_INFO_GETSupported
FFA_ID_GETSupported
FFA_MSG_WAITSupported
FFA_YIELDNot supported
FFA_RUNNot supported
FFA_NORMAL_WORLD_RESUMENot supported
FFA_MSG_SENDNot supported
FFA_MSG_SEND_DIRECT_REQSupported
FFA_MSG_SEND_DIRECT_RESPSupported
FFA_MSG_POLLNot supported
FFA_MEM_DONATENot supported
FFA_MEM_LENDNot supported
FFA_MEM_SHAREPartially supported [^2]
FFA_MEM_RETRIEVE_REQSupported
FFA_MEM_RETRIEVE_RESPSupported
FFA_MEM_RELINQUISHSupported
FFA_MEM_RECLAIMSupported

[^2]: Sharing device memory is not yet supported.

Trusted Services status

Currently not all Trusted Services functionality is supported when using the OP-TEE SPMC v3.17. We are planning to support all functionality over time.

Trusted Services SP support status:

NameStatus
internal-trusted-storageSupported
protected-storageSupported
cryptoSupported
attestationSupported
smm-gatewayNot yet supported [^3]

[^3]: Memory regions in the SP manifest are not mapped.

Build

The build process is based on the OP-TEE build process with some extra steps.

Requirements
  • The Trusted Services project has some extra requirements from OP-TEE. It mainly depends on CMake v3.18.
  • The current system uses the Arm AEMv-A Base Platform FVP to run the test environment. The latest version can be found at developer.arm.com. The default path for the FVP in the build scripts is set to /opt/fvp/latest.
Build steps

Obtain sources using the repo tool:

mkdir optee-ts-workspace
cd optee-ts-workspace
repo init -u https://git.trustedfirmware.org/OP-TEE/manifest.git -m psa-sp-fvp.xml -b topics/spmc_mainline
repo sync -j4 --no-clone-bundle

Download toolchains, build OP-TEE and all other components:

cd build
make toolchains
make
cd ..

Build Trusted Services client apps:

make -C trusted-services/tools/b-test \
    r-component-test-arm-linux \
    r-libts-arm-linux \
    r-psa-api-test-crypto-arm-linux \
    r-psa-api-test-initial_attestation-arm-linux \
    r-psa-api-test-internal_trusted_storage-arm-linux \
    r-psa-api-test-protected_storage-arm-linux \
    r-ts-demo-arm-linux \
    r-ts-service-test-arm-linux

Copy the TS apps to the FVP's shared directory:

cp -r trusted-services/tools/b-test/install/arm-linux shared/

More info about building Trusted Services apps can be found at the Trusted Services build instructions.

Boot the system on the FVP:

make -C build run-only

Two console windows should appear, one for the Secure World and one for the Normal World. When the boot is complete, login as root.

Test

Setup

Set up the FVP environment:

/mnt/load_module.sh
cp /mnt/arm-linux/lib/libts.so* /lib/
Running tests
Run the TS demo
/mnt/arm-linux/bin/ts-demo

Output:

Demonstrates use of trusted services from an application
---------------------------------------------------------
A client requests a set of crypto operations performed by
the Crypto service.  Key storage for persistent keys is
provided by the Secure Storage service via the ITS client.

Generating random bytes length: 1
  Operation successful
  Random bytes:
    59
Generating random bytes length: 7
  Operation successful
  Random bytes:
    4B 40 4B 1B B8 84 B6
Generating random bytes length: 128
  Operation successful
  Random bytes:
    E2 A9 04 C5 F3 BD A3 43
    05 C3 F0 B3 06 B7 22 44
    D0 FF 3C 50 FC 63 3C 99
    46 2B 48 F1 DB 09 88 87
    E2 25 2B 62 94 C8 FE DE
    6B 67 2C AC 95 C1 9A 20
    73 A8 0D 97 AC 5A 4D 75
    75 C1 BB 3B 6F 0A B1 32
    4A 92 F5 A9 59 34 78 B2
    E6 67 CE 0D E1 3E 64 01
    A1 41 D2 99 F7 84 08 1E
    66 45 63 9A 15 D0 DC EF
    F9 08 74 60 5E 85 AB 53
    0E 2D BB 37 55 EF 75 7F
    8F 32 20 BB 2F C4 E8 3E
    33 2E 15 CA CD 0F 20 58
Generating ECC signing key
  Operation successful
Signing message: "The quick brown fox" using key: 256
  Operation successful
  Signature bytes:
    47 0B 7A E4 E3 5B 95 58
    50 8A 57 06 5D 05 41 E9
    33 88 AA 8E 47 17 26 7D
    46 E9 47 C3 AC 2A 65 17
    7C 7C 7E A4 9E DF 8D F6
    6D AE 52 27 B4 7C 00 74
    AF 25 BE 50 11 36 8E 54
    4D E9 0B ED 5B B5 C7 2A
Verify signature using original message: "The quick brown fox"
  Operation successful
Verify signature using modified message: "!he quick brown fox"
  Successfully detected modified message
Signing message: "jumps over the lazy dog" using key: 256
  Operation successful
  Signature bytes:
    91 CA 55 03 2D FC A1 6E
    5D 28 8C 78 2D A8 32 F0
    3A 55 50 A0 8A C0 A9 1C
    B6 7C D1 C5 72 1F DC 27
    A2 4E CD F3 05 64 35 05
    1A 7B 39 67 2D A8 F0 65
    A0 C5 25 91 B1 FB 17 9A
    20 13 52 C4 BB 3B 3E AF
Verify signature using original message: "jumps over the lazy dog"
  Operation successful
Verify signature using modified message: "!umps over the lazy dog"
  Successfully detected modified message
Generating RSA encryption key
  Operation successful
Encrypting message: "Top secret" using RSA key: 257
  Operation successful
  Encrypted message:
    38 73 88 06 90 C3 63 09
    07 A0 F0 7D 3E 3E 15 66
    F7 0D E4 9B 95 A8 4F 42
    55 E7 BD 53 67 D9 AA E1
Decrypting message using RSA key: 257
  Operation successful
  Decrypted message: "Top secret"
Exporting public key: 256
  Operation successful
  Public key bytes:
    04 9E 75 5A BE 04 E0 EE
    F0 93 F3 CF B9 03 19 B9
    FB C3 F6 80 37 14 73 61
    6A 4D C7 66 03 D2 DA A2
    75 1B 7A 78 DB 59 CF DA
    35 BD 6A 0B 8A 07 D0 E2
    83 E7 09 27 76 17 75 15
    89 DE 05 98 FD 5A 69 55
    4F
Destroying signing key: 256
  Operation successful
Destroying encryption key: 257
  Operation successful
Run ts-service-test
/mnt/arm-linux/bin/ts-service-test -v

Output:

TEST(PsServiceTests, createAndSetExtended) - 17853 ms
TEST(PsServiceTests, createAndSet) - 20396 ms
TEST(PsServiceTests, storeNewItem) - 18289 ms
TEST(ItsServiceTests, storeNewItem) - 11008 ms
TEST(AttestationProvisioningTests, provisionedIak) - 98333 ms
TEST(AttestationProvisioningTests, selfGeneratedIak) - 184226 ms
TEST(AttestationServiceTests, repeatedOperation) - 22908192 ms
TEST(AttestationServiceTests, invalidChallengeLen) - 10365 ms
TEST(AttestationServiceTests, checkTokenSize) - 233939 ms
TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 21824 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 23731 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 25119 ms
TEST(CryptoMacServicePackedcTests, macAbort) - 19607 ms
TEST(CryptoMacServicePackedcTests, signAndVerify) - 102272 ms
TEST(CryptoCipherServicePackedcTests, cipherAbort) - 19815 ms
TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 67018 ms
TEST(CryptoHashServicePackedcTests, hashAbort) - 23439 ms
TEST(CryptoHashServicePackedcTests, hashAndVerify) - 34506 ms
TEST(CryptoHashServicePackedcTests, calculateHash) - 17466 ms
TEST(CryptoServicePackedcTests, generateRandomNumbers) - 30063 ms
TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 2014249 ms
TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 438315 ms
TEST(CryptoServicePackedcTests, signAndVerifyEat) - 1066351 ms
TEST(CryptoServicePackedcTests, signAndVerifyHash) - 1073917 ms
TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 127557 ms
TEST(CryptoServicePackedcTests, exportPublicKey) - 199140 ms
TEST(CryptoServicePackedcTests, purgeKey) - 119132 ms
TEST(CryptoServicePackedcTests, copyKey) - 225074 ms
TEST(CryptoServicePackedcTests, generatePersistentKeys) - 213158 ms
TEST(CryptoServicePackedcTests, generateVolatileKeys) - 189627 ms
TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 31655 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 3092427 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 279857 ms
TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 1074455 ms
TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 128549 ms
TEST(CryptoServiceProtobufTests, exportPublicKey) - 201531 ms
TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 214115 ms
TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 189163 ms
TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 20743593 ms
TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 5251590 ms
TEST(DiscoveryServiceTests, checkServiceInfo) - 12895 ms

OK (41 tests, 41 ran, 747 checks, 0 ignored, 0 filtered out, 60788071 ms)
Run components test
/mnt/arm-linux/bin/component-test -v

Output:

TEST(UefiVariableStoreTests, noRemoveCheck) - 2866 ms
TEST(UefiVariableStoreTests, readOnlycheck) - 700 ms
TEST(UefiVariableStoreTests, unsupportedAttribute) - 311 ms
TEST(UefiVariableStoreTests, failedNvSet) - 781 ms
TEST(UefiVariableStoreTests, enumerateStoreContents) - 1035 ms
TEST(UefiVariableStoreTests, runtimeAccess) - 674 ms
TEST(UefiVariableStoreTests, bootServiceAccess) - 526 ms
TEST(UefiVariableStoreTests, removePersistent) - 694 ms
TEST(UefiVariableStoreTests, removeVolatile) - 954 ms
TEST(UefiVariableStoreTests, persistentSetGet) - 767 ms
TEST(UefiVariableStoreTests, setGetRoundtrip) - 655 ms
TEST(UefiVariableIndexTests, setCheckConstraintsNonExistingVar) - 486 ms
TEST(UefiVariableIndexTests, setCheckConstraintsExistingVar) - 593 ms
TEST(UefiVariableIndexTests, checkIterator) - 347 ms
TEST(UefiVariableIndexTests, removeVariable) - 481 ms
TEST(UefiVariableIndexTests, dumpBufferTooSmall) - 265 ms
TEST(UefiVariableIndexTests, dumpLoadRoadtrip) - 347 ms
TEST(UefiVariableIndexTests, enumerateStore) - 354 ms
TEST(UefiVariableIndexTests, variableIndexFull) - 347 ms
TEST(UefiVariableIndexTests, addWithOversizedName) - 578 ms
TEST(UefiVariableIndexTests, emptyIndexOperations) - 269 ms
TEST(SfsTests, psCreateAndSetExtended) - 1386 ms
TEST(SfsTests, psCreateAndSet) - 282 ms
TEST(SfsTests, itsStorageLimitTest) - 299 ms
TEST(SfsTests, itsStoreNewItem) - 245 ms
TEST(MockStoreTests, psCreateAndSetExtended) - 186 ms
TEST(MockStoreTests, psCreateAndSet) - 175 ms
TEST(MockStoreTests, itsStorageLimitTest) - 115 ms
TEST(MockStoreTests, itsStoreNewItem) - 174 ms
TEST(SecureStorageProxyTests, psCreateAndSetExtended) - 1011 ms
TEST(SecureStorageProxyTests, psCreateAndSet) - 316 ms
TEST(SecureStorageProxyTests, itsStorageLimitTest) - 261 ms
TEST(SecureStorageProxyTests, itsStoreNewItem) - 349 ms
TEST(SecureStorageClientTests, psCreateAndSetExtended) - 377 ms
TEST(SecureStorageClientTests, psCreateAndSet) - 251 ms
TEST(SecureStorageClientTests, itsStorageLimitTest) - 198 ms
TEST(SecureStorageClientTests, itsStoreNewItem) - 250 ms
TEST(CryptoProtocolPackedcChecks, checkKeyUsage) - 34 ms
TEST(CryptoProtocolPackedcChecks, checkKeyLifetime) - 71 ms
TEST(CryptoProtocolPackedcChecks, checkAlg) - 51 ms
TEST(CryptoProtocolPackedcChecks, checkDhGroup) - 14 ms
TEST(CryptoProtocolPackedcChecks, checkEccCurve) - 72 ms
TEST(CryptoProtocolPackedcChecks, checkKeyType) - 38 ms
TEST(CryptoProtocolProtobufChecks, checkKeyUsage) - 72 ms
TEST(CryptoProtocolProtobufChecks, checkKeyLifetime) - 0 ms
TEST(CryptoProtocolProtobufChecks, checkAlg) - 82 ms
TEST(CryptoProtocolProtobufChecks, checkDhGroup) - 48 ms
TEST(CryptoProtocolProtobufChecks, checkEccCurve) - 48 ms
TEST(CryptoProtocolProtobufChecks, checkKeyType) - 48 ms
TEST(CryptoProtocolOpcodeChecks, checkPackedcToProtobuf) - 36 ms
TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 11024 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 2534 ms
TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 1268 ms
TEST(CryptoMacServicePackedcTests, macAbort) - 1390 ms
TEST(CryptoMacServicePackedcTests, signAndVerify) - 69797 ms
TEST(CryptoCipherServicePackedcTests, cipherAbort) - 1102 ms
TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 36978 ms
TEST(CryptoHashServicePackedcTests, hashAbort) - 5746 ms
TEST(CryptoHashServicePackedcTests, hashAndVerify) - 13235 ms
TEST(CryptoHashServicePackedcTests, calculateHash) - 1110 ms
TEST(CryptoServicePackedcTests, generateRandomNumbers) - 2590 ms
TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 4135314 ms
TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 247677 ms
TEST(CryptoServicePackedcTests, signAndVerifyEat) - 1047035 ms
TEST(CryptoServicePackedcTests, signAndVerifyHash) - 1044391 ms
TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 86605 ms
TEST(CryptoServicePackedcTests, exportPublicKey) - 172286 ms
TEST(CryptoServicePackedcTests, purgeKey) - 86783 ms
TEST(CryptoServicePackedcTests, copyKey) - 197341 ms
TEST(CryptoServicePackedcTests, generatePersistentKeys) - 173570 ms
TEST(CryptoServicePackedcTests, generateVolatileKeys) - 173408 ms
TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 3875 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 1283202 ms
TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 299963 ms
TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 1048599 ms
TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 86889 ms
TEST(CryptoServiceProtobufTests, exportPublicKey) - 173709 ms
TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 173080 ms
TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 172469 ms
TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 20181432 ms
TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 5270201 ms
TEST(CryptoFaultTests, randomNumbersWithBrokenStorage) - 347 ms
TEST(CryptoFaultTests, persistentKeysWithBrokenStorage) - 86284 ms
TEST(CryptoFaultTests, volatileKeyWithBrokenStorage) - 87197 ms
TEST(PocCryptoOpTests, checkOpSequence) - 271709 ms
TEST(CryptoMsgTests, SignHashOutMsgTest) - 266 ms
TEST(CryptoMsgTests, SignHashInMsgTest) - 230 ms
TEST(CryptoMsgTests, ExportPublicKeyOutMsgTest) - 0 ms
TEST(CryptoMsgTests, ExportPublicKeyInMsgTest) - 364 ms
TEST(CryptoMsgTests, GenerateKeyInMsgTest) - 386 ms
TEST(CryptoContextPoolTests, multipleContexts) - 39721 ms
TEST(CryptoContextPoolTests, singleContext) - 47 ms
TEST(CryptoContextPoolTests, checkEmptyPool) - 67 ms
TEST(AttestationProvisioningTests, provisionedIak) - 87586 ms
TEST(AttestationProvisioningTests, selfGeneratedIak) - 258655 ms
TEST(AttestationServiceTests, repeatedOperation) - 19761141 ms
TEST(AttestationServiceTests, invalidChallengeLen) - 156 ms
TEST(AttestationServiceTests, checkTokenSize) - 369737 ms
TEST(AttestationReporterTests, createReport) - 703234 ms
TEST(TcgEventLogTests, interateBootMeasurements) - 140 ms
TEST(DiscoveryServiceTests, checkServiceInfo) - 341 ms
TEST(ServiceNameTests, readService) - 300 ms
TEST(ServiceNameTests, checkFields) - 391 ms
TEST(ServiceNameTests, checkInvalidServiceNames) - 48 ms
TEST(ServiceNameTests, checkValidServiceNames) - 145 ms
TEST(ServiceFrameworkTests, serviceProviderChain) - 100 ms
TEST(ServiceFrameworkTests, serviceWithOps) - 86 ms
TEST(ServiceFrameworkTests, serviceWithNoOps) - 87 ms
TEST(RpcStatusProtocolChecks, checkProtobufRpcStatusCodes) - 73 ms
TEST(ConfigRamstoreTests, checkMultipleConfig) - 0 ms
TEST(ConfigRamstoreTests, checkSingleConfig) - 0 ms
TEST(ConfigRamstoreTests, checkEmptyConfig) - 39 ms
TEST(EndianTests, le64) - 38 ms
TEST(EndianTests, le32) - 38 ms
TEST(EndianTests, le16) - 42 ms
TEST(EndianTests, le8) - 97 ms
TEST(TlvTests, encodeWrongOrder) - 53 ms
TEST(TlvTests, encodeInsufficientSpace) - 81 ms
TEST(TlvTests, encodeRecords) - 50 ms
TEST(TlvTests, decodeBadRecords) - 39 ms
TEST(TlvTests, findAndDecodeMissingOptional) - 19 ms
TEST(TlvTests, findAndDecode) - 33 ms
TEST(TlvTests, decodeGoodRecords) - 72 ms
TEST(UuidTests, parseValidUuidToReversed) - 81 ms
TEST(UuidTests, parseError) - 73 ms
TEST(UuidTests, parseUuidInUrn) - 82 ms
TEST(UuidTests, parseValidUuidMixedCase) - 86 ms
TEST(UuidTests, parseValidUuidLowerCase) - 19 ms
TEST(TsDemoTests, runTsDemo) - 2497184 ms

OK (129 tests, 129 ran, 18207 checks, 0 ignored, 0 filtered out, 60431682 ms)
Run psa-its-api-test
/mnt/arm-linux/bin/psa-its-api-test

Output:

***** PSA Architecture Test Suite - Version 1.4 *****

Running.. Storage Suite
******************************************

TEST: 401 | DESCRIPTION: UID not found check | UT: ITS
[Info] Executing tests from non-secure

[Info] Executing ITS tests
[Check 1] Call get API for UID 6 which is not set
[Check 2] Call get_info API for UID 6 which is not set
[Check 3] Call remove API for UID 6 which is not set
[Check 4] Call get API for UID 6 which is removed
[Check 5] Call get_info API for UID 6 which is removed
[Check 6] Call remove API for UID 6 which is removed
Set storage for UID 6
[Check 7] Call get API for different UID 5
[Check 8] Call get_info API for different UID 5
[Check 9] Call remove API for different UID 5

TEST RESULT: PASSED

******************************************

TEST: 402 | DESCRIPTION: Write once error check | UT: ITS
[Info] Executing tests from non-secure

[Info] Executing ITS tests
[Check 1] Update the flag of UID 1 with WRITE_ONCE flag
[Check 2] Try to remove the UID 1 having WRITE_ONCE flag
[Check 3] Create a new UID 2 with WRITE_ONCE flag
[Check 4] Try to remove the UID 2 having WRITE_ONCE flag
[Check 5] Try to change the length of write_once UID 2
[Check 6] Check UID removal still fails
[Check 7] Try to change the WRITE_ONCE flag to None for UID 2
[Check 8] Check UID removal still fails

TEST RESULT: PASSED

******************************************

TEST: 403 | DESCRIPTION: Insufficient space check | UT: ITS
[Info] Executing tests from non-secure

[Info] Executing ITS tests
[Check 1] Overload storage space
UID 13 set failed due to insufficient space
Remove all registered UIDs
[Check 2] Overload storage again to verify all previous UID removed
UID 13 set failed due to insufficient space
Remove all registered UIDs

TEST RESULT: PASSED

******************************************

TEST: 404 | DESCRIPTION: Data Consistency check | UT: ITS
[Info] Executing tests from non-secure

[Info] Executing ITS tests
[Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2
[Check 2] Call get API with default length - TEST_BUFF_SIZE

TEST RESULT: PASSED

******************************************

TEST: 405 | DESCRIPTION: Success scenarios check | UT: ITS
[Info] Executing tests from non-secure

[Info] Executing ITS tests
[Check 1] Set UID with data length zero and call storage APIs
[Check 2] Resetting the length check

TEST RESULT: PASSED

******************************************

TEST: 406 | DESCRIPTION: Check for storage create flags | UT: ITS
[Info] Executing tests from non-secure

[Info] Executing ITS tests
[Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE
[Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY
[Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION

TEST RESULT: PASSED

******************************************

TEST: 407 | DESCRIPTION: Incorrect Size check | UT: ITS
[Info] Executing tests from non-secure

[Info] Executing ITS tests
Create a valid Storage - TEST_BUFF_SIZE/2
Increase the length of storage - TEST_BUFF_SIZE
[Check 1] Call get API with old length - TEST_BUFF_SIZE/2
[Check 2] Call get API with old length - TEST_BUFF_SIZE/4
Decrease the length of storage - TEST_BUFF_SIZE/4
[Check 3] Call get API with old length - TEST_BUFF_SIZE/2
[Check 4] Call get API with old length - TEST_BUFF_SIZE
[Check 5] Call get API with valid length - TEST_BUFF_SIZE/4

TEST RESULT: PASSED

******************************************

TEST: 408 | DESCRIPTION: Invalid offset check | UT: ITS
[Info] Executing tests from non-secure

[Info] Executing ITS tests
[Check 1] Try to access data with varying valid offset
[Check 2] Try to access data with varying invalid offset

TEST RESULT: PASSED

******************************************

TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: ITS
[Info] Executing tests from non-secure

[Info] Executing ITS tests
[Check 1] Call set API with NULL pointer and data length 0
[Check 2] Call get API with NULL read buffer and data length 0
[Check 3] Remove the UID
[Check 4] Call get_info API to verify UID removed
[Check 5] Create UID with zero data_len and valid write buffer
[Check 8] Call get API with NULL read buffer and data length 0
[Check 9] Increase the length

TEST RESULT: PASSED

******************************************

TEST: 410 | DESCRIPTION: UID value zero check | UT: ITS
[Info] Executing tests from non-secure

[Info] Executing ITS tests
[Check 1] Creating storage with UID 0 should fail
[Check 2] Get_info for UID 0 should fail
[Check 3] Removing storage with UID 0 should fail

TEST RESULT: PASSED

******************************************

************ Storage Suite Report **********
TOTAL TESTS     : 10
TOTAL PASSED    : 10
TOTAL SIM ERROR : 0
TOTAL FAILED    : 0
TOTAL SKIPPED   : 0
******************************************

Entering standby..
Run psa-ps-api-test
/mnt/arm-linux/bin/psa-ps-api-test

Output:

***** PSA Architecture Test Suite - Version 1.4 *****

Running.. Storage Suite
******************************************

TEST: 401 | DESCRIPTION: UID not found check | UT: PS
[Info] Executing tests from non-secure

[Info] Executing PS tests
[Check 1] Call get API for UID 6 which is not set
[Check 2] Call get_info API for UID 6 which is not set
[Check 3] Call remove API for UID 6 which is not set
[Check 4] Call get API for UID 6 which is removed
[Check 5] Call get_info API for UID 6 which is removed
[Check 6] Call remove API for UID 6 which is removed
Set storage for UID 6
[Check 7] Call get API for different UID 5
[Check 8] Call get_info API for different UID 5
[Check 9] Call remove API for different UID 5

TEST RESULT: PASSED

******************************************

TEST: 402 | DESCRIPTION: Write once error check | UT: PS
[Info] Executing tests from non-secure

[Info] Executing PS tests
[Check 1] Update the flag of UID 1 with WRITE_ONCE flag
[Check 2] Try to remove the UID 1 having WRITE_ONCE flag
[Check 3] Create a new UID 2 with WRITE_ONCE flag
[Check 4] Try to remove the UID 2 having WRITE_ONCE flag
[Check 5] Try to change the length of write_once UID 2
[Check 6] Check UID removal still fails
[Check 7] Try to change the WRITE_ONCE flag to None for UID 2
[Check 8] Check UID removal still fails

TEST RESULT: PASSED

******************************************

TEST: 403 | DESCRIPTION: Insufficient space check | UT: PS
[Info] Executing tests from non-secure

[Info] Executing PS tests
[Check 1] Overload storage space
UID 11 set failed due to insufficient space
Remove all registered UIDs
[Check 2] Overload storage again to verify all previous UID removed
UID 11 set failed due to insufficient space
Remove all registered UIDs

TEST RESULT: PASSED

******************************************

TEST: 404 | DESCRIPTION: Data Consistency check | UT: PS
[Info] Executing tests from non-secure

[Info] Executing PS tests
[Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2
[Check 2] Call get API with default length - TEST_BUFF_SIZE

TEST RESULT: PASSED

******************************************

TEST: 405 | DESCRIPTION: Success scenarios check | UT: PS
[Info] Executing tests from non-secure

[Info] Executing PS tests
[Check 1] Set UID with data length zero and call storage APIs
[Check 2] Resetting the length check

TEST RESULT: PASSED

******************************************

TEST: 406 | DESCRIPTION: Check for storage create flags | UT: PS
[Info] Executing tests from non-secure

[Info] Executing PS tests
[Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE
[Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY
[Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION

TEST RESULT: PASSED

******************************************

TEST: 407 | DESCRIPTION: Incorrect Size check | UT: PS
[Info] Executing tests from non-secure

[Info] Executing PS tests
Create a valid Storage - TEST_BUFF_SIZE/2
Increase the length of storage - TEST_BUFF_SIZE
[Check 1] Call get API with old length - TEST_BUFF_SIZE/2
[Check 2] Call get API with old length - TEST_BUFF_SIZE/4
Decrease the length of storage - TEST_BUFF_SIZE/4
[Check 3] Call get API with old length - TEST_BUFF_SIZE/2
[Check 4] Call get API with old length - TEST_BUFF_SIZE
[Check 5] Call get API with valid length - TEST_BUFF_SIZE/4

TEST RESULT: PASSED

******************************************

TEST: 408 | DESCRIPTION: Invalid offset check | UT: PS
[Info] Executing tests from non-secure

[Info] Executing PS tests
[Check 1] Try to access data with varying valid offset
[Check 2] Try to access data with varying invalid offset

TEST RESULT: PASSED

******************************************

TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: PS
[Info] Executing tests from non-secure

[Info] Executing PS tests
[Check 1] Call set API with NULL pointer and data length 0
[Check 2] Call get API with NULL read buffer and data length 0
[Check 3] Remove the UID
[Check 4] Call get_info API to verify UID removed
[Check 5] Create UID with zero data_len and valid write buffer
[Check 8] Call get API with NULL read buffer and data length 0
[Check 9] Increase the length

TEST RESULT: PASSED

******************************************

TEST: 410 | DESCRIPTION: UID value zero check | UT: PS
[Info] Executing tests from non-secure

[Info] Executing PS tests
[Check 1] Creating storage with UID 0 should fail
[Check 2] Get_info for UID 0 should fail
[Check 3] Removing storage with UID 0 should fail

TEST RESULT: PASSED

******************************************

TEST: 411 | DESCRIPTION: Optional APIs: UID not found check | UT: PS
[Info] Executing tests from non-secure

[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.

TEST RESULT: SKIPPED (Skip Code=0x2b)

******************************************

TEST: 412 | DESCRIPTION: Optional APIs: Invalid arguments and offset invalid | UT: PS
[Info] Executing tests from non-secure

[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.

TEST RESULT: SKIPPED (Skip Code=0x2b)

******************************************

TEST: 413 | DESCRIPTION: Set_Extended and Create api : Success | UT: PS
[Info] Executing tests from non-secure

[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.

TEST RESULT: SKIPPED (Skip Code=0x2b)

******************************************

TEST: 414 | DESCRIPTION: Optional APIs not supported check | UT: PS
[Info] Executing tests from non-secure

[Info] Executing PS tests
Optional PS APIs are not supported.
[Check 1] Call to create API should fail as API not supported
  Failed at Checkpoint: 1
  Actual: 0
  Expected: -134

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 415 | DESCRIPTION: Create API write_once flag value check | UT: PS
[Info] Executing tests from non-secure

[Info] Executing PS tests
Test Case skipped as Optional PS APIs are not supported.

TEST RESULT: SKIPPED (Skip Code=0x2b)

******************************************

TEST: 416 | DESCRIPTION: Storage assest capacity modification check | UT: PS
[Info] Executing tests from non-secure

[Info] Executing PS tests
Test Case skipped as Optional PS APIs not are supported.

TEST RESULT: SKIPPED (Skip Code=0x2b)

******************************************

TEST: 417 | DESCRIPTION: Storage assest capacity modification check | UT: PS
[Info] Executing tests from non-secure

[Info] Executing PS tests
Test Case skipped as Optional PS APIs not are supported.

TEST RESULT: SKIPPED (Skip Code=0x2b)

******************************************

************ Storage Suite Report **********
TOTAL TESTS     : 17
TOTAL PASSED    : 10
TOTAL SIM ERROR : 0
TOTAL FAILED    : 1
TOTAL SKIPPED   : 6
******************************************

Entering standby..
Run psa-crypto-api-test:
/mnt/arm-linux/bin/psa-crypto-api-test

Output:

***** PSA Architecture Test Suite - Version 1.4 *****

Running.. Crypto Suite
******************************************

TEST: 201 | DESCRIPTION: Testing crypto key management APIs | UT:  psa_crypto_init
[Info] Executing tests from non-secure
[Check 1] Test calling crypto functions before psa_crypto_init
[Check 2] Test psa_crypto_init
[Check 3] Test multiple psa_crypto_init

TEST RESULT: PASSED

******************************************

TEST: 202 | DESCRIPTION: Testing crypto key management APIs | UT: psa_import_key
[Info] Executing tests from non-secure
[Check 1] Test psa_import_key 16 bytes AES
[Check 2] Test psa_import_key 24 bytes AES
[Check 3] Test psa_import_key 32 bytes AES
[Check 4] Test psa_import_key 2048 RSA public key
[Check 5] Test psa_import_key with RSA 2048 keypair
[Check 6] Test psa_import_key with DES 8 bytes key
[Check 7] Test psa_import_key with Triple DES 2-Key
[Check 8] Test psa_import_key with Triple DES 3-Key
[Check 9] Test psa_import_key with EC Public key
[Check 10] Test psa_import_key with EC keypair
[Check 11] Test psa_import_key 16 bytes AES with invalid bits
[Check 12] Test psa_import_key with key data greater than the algorithm size
[Check 13] Test psa_import_key with incorrect key data size
[Check 14] Test psa_import_key with invalid key type value

TEST RESULT: PASSED

******************************************

TEST: 203 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_key
[Info] Executing tests from non-secure
[Check 1] Test psa_export_key 16 Byte AES
[Check 2] Test psa_export_key 24 Byte AES
[Check 3] Test psa_export_key 32 Byte AES
[Check 4] Test psa_export_key 2048 RSA public key
[Check 5] Test psa_export_key with RSA 2048 keypair
[Check 6] Test psa_export_key with DES 64 bit key
[Check 7] Test psa_export_key with Triple DES 2-Key
[Check 8] Test psa_export_key with Triple DES 3-Key
[Check 9] Test psa_export_key with EC Public key
[Check 10] Test psa_export_key with EC keypair
[Check 11] Test psa_export_key with key policy verify
[Check 12] Test psa_export_key with less buffer size

TEST RESULT: PASSED

******************************************

TEST: 204 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_public_key
[Info] Executing tests from non-secure
[Check 1] Test psa_export_public_key 16 Byte AES
[Check 2] Test psa_export_public_key 24 Byte AES
[Check 3] Test psa_export_public_key 32 Byte AES
[Check 4] Test psa_export_public_key 2048 RSA public key
[Check 5] Test psa_export_public_key with RSA 2048 keypair
[Check 6] Test psa_export_public_key with DES 64 bit key
[Check 7] Test psa_export_public_key with Triple DES 2-Key
[Check 8] Test psa_export_public_key with Triple DES 3-Key
[Check 9] Test psa_export_public_key with EC Public key
[Check 10] Test psa_export_public_key with EC keypair
[Check 11] Test psa_export_public_key with less buffer size

TEST RESULT: PASSED

******************************************

TEST: 205 | DESCRIPTION: Testing crypto key management APIs | UT: psa_destroy_key
[Info] Executing tests from non-secure
[Check 1] Test psa_destroy_key 16 Byte AES
[Check 2] Test psa_destroy_key 24 Byte AES
[Check 3] Test psa_destroy_key 32 Byte AES
[Check 4] Test psa_destroy_key 2048 RSA public key
[Check 5] Test psa_destroy_key with RSA 2048 keypair
[Check 6] Test psa_destroy_key with DES 64 bit key
[Check 7] Test psa_destroy_key with Triple DES 2-Key
[Check 8] Test psa_destroy_key with Triple DES 3-Key
[Check 9] Test psa_destroy_key with EC Public key
[Check 10] Test psa_destroy_key with EC keypair

TEST RESULT: PASSED

******************************************

TEST: 206 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compute
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_compute with MD5 algorithm
[Check 2] Test psa_hash_compute with RIPEMD160 algorithm
[Check 3] Test psa_hash_compute with SHA1 algorithm
[Check 4] Test psa_hash_compute with SHA224 algorithm
[Check 5] Test psa_hash_compute with SHA256 algorithm
[Check 6] Test psa_hash_compute with SHA384 algorithm
[Check 7] Test psa_hash_compute with SHA512 algorithm
[Check 8] Test psa_hash_compute with small buffer size
[Check 9] Test psa_hash_compute with invalid algorithm

TEST RESULT: PASSED

******************************************

TEST: 207 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compare
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_compare with MD5 algorithm
[Check 2] Test psa_hash_compare with RIPEMD160 algorithm
[Check 3] Test psa_hash_compare with SHA1 algorithm
[Check 4] Test psa_hash_compare with SHA224 algorithm
[Check 5] Test psa_hash_compare with SHA256 algorithm
[Check 6] Test psa_hash_compare with SHA384 algorithm
[Check 7] Test psa_hash_compare with SHA512 algorithm
[Check 8] Test psa_hash_compare with incorrect hash
[Check 9] Test psa_hash_compare with incorrect hash length
[Check 10] Test psa_hash_compare with invalid algorithm

TEST RESULT: PASSED

******************************************

TEST: 208 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_setup - ECDH + HKDF-SHA-256
[Check 2] Test psa_key_derivation_setup - ECDH, unknown KDF
[Check 3] Test psa_key_derivation_setup - bad key derivation algorithm
[Check 4] Test psa_key_derivation_setup - Invalid Algorithm

TEST RESULT: PASSED

******************************************

TEST: 209 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_bytes
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_input_bytes - Step as Info
[Check 2] Test psa_key_derivation_input_bytes - Step as secret
[Check 3] Test psa_key_derivation_input_bytes - Step as salt
[Check 4] Test psa_key_derivation_input_bytes - Step as label
[Check 5] Test psa_key_derivation_input_bytes - Step as seed
[Check 6] Test psa_key_derivation_input_bytes - Invalid step

TEST RESULT: PASSED

******************************************

TEST: 210 | DESCRIPTION: Testing crypto key attributes APIs | UT: psa_key_attributes_set_get
[Info] Executing tests from non-secure
[Check 1] Test psa_key_attributes_set_get key attributes

TEST RESULT: PASSED

******************************************

TEST: 211 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_setup with MD5 algorithm
  Failed at Checkpoint: 4
  Actual: 0
  Expected: -137

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 212 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_update
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_update with MD5 algorithm
[Check 2] Test psa_hash_update with RIPEMD160 algorithm
[Check 3] Test psa_hash_update with SHA1 algorithm
[Check 4] Test psa_hash_update with SHA224 algorithm
[Check 5] Test psa_hash_update with SHA256 algorithm
[Check 6] Test psa_hash_update with SHA384 algorithm
[Check 7] Test psa_hash_update with SHA512 algorithm
[Check 8] Test psa_hash_update without hash setup
[Check 9] Test psa_hash_update with completed opertaion handle

TEST RESULT: PASSED

******************************************

TEST: 213 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_verify with MD5 algorithm
[Check 2] Test psa_hash_verify with RIPEMD160 algorithm
[Check 3] Test psa_hash_verify with SHA1 algorithm
[Check 4] Test psa_hash_verify with SHA224 algorithm
[Check 5] Test psa_hash_verify with SHA256 algorithm
[Check 6] Test psa_hash_verify with SHA384 algorithm
[Check 7] Test psa_hash_verify with SHA512 algorithm
[Check 8] Test psa_hash_verify with incorrect expected hash
[Check 9] Test psa_hash_verify with incorrect hash length
[Check 10] test psa_hash_verify with inactive & invalid operation handle

TEST RESULT: PASSED

******************************************

TEST: 214 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_finish with MD5 algorithm
[Check 2] Test psa_hash_finish with RIPEMD160 algorithm
[Check 3] Test psa_hash_finish with SHA1 algorithm
[Check 4] Test psa_hash_finish with SHA224 algorithm
[Check 5] Test psa_hash_finish with SHA256 algorithm
[Check 6] Test psa_hash_finish with SHA384 algorithm
[Check 7] Test psa_hash_finish with SHA512 algorithm
[Check 8] Test psa_hash_finish with invalid hash buffer size
[Check 9] test psa_hash_finish with inactive operation handle

TEST RESULT: PASSED

******************************************

TEST: 215 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_abort with MD5 algorithm
[Check 2] Test psa_hash_abort with RIPEMD160 algorithm
[Check 3] Test psa_hash_abort with SHA1 algorithm
[Check 4] Test psa_hash_abort with SHA224 algorithm
[Check 5] Test psa_hash_abort with SHA256 algorithm
[Check 6] Test psa_hash_abort with SHA384 algorithm
[Check 7] Test psa_hash_abort with SHA512 algorithm
[Check 8] Test psa_hash_finish after calling psa_hash_abort

TEST RESULT: PASSED

******************************************

TEST: 216 | DESCRIPTION: Testing crypto generator functions APIs | UT: psa_generate_key
[Info] Executing tests from non-secure
[Check 1] Test psa_generate_key 16 Byte AES
[Check 2] Test psa_generate_key 24 Byte AES
[Check 3] Test psa_generate_key 32 Byte AES
[Check 4] Test psa_generate_key with DES 64 bit key
[Check 5] Test psa_generate_key with Triple DES 2-Key
[Check 6] Test psa_generate_key with Triple DES 3-Key
[Check 7] Test psa_generate_key with RSA 2048 Keypair
[Check 8] Test psa_generate_key with ECC KeyPair
[Check 9] Test psa_generate_key with RSA 2048 Public key
  Failed at Checkpoint: 3
  Actual: -134
  Expected: -135

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 217 | DESCRIPTION: Testing crypto generation APIs | UT: psa_generate_random
[Info] Executing tests from non-secure
[Check 1] Test psa_generate_random to get 0 Byte data
[Check 2] Test psa_generate_random to get 16 Byte data
[Check 3] Test psa_generate_random to get 24 Byte data
[Check 4] Test psa_generate_random to get 32 Byte data
[Check 5] Test psa_generate_random to get 64 Byte data
[Check 6] Test psa_generate_random to get 128 Byte data
[Check 7] Test psa_generate_random to get 256 Byte data
[Check 8] Test psa_generate_random to get 512 Byte data
[Check 9] Test psa_generate_random to get 1000 Byte data

TEST RESULT: PASSED

******************************************

TEST: 218 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_key
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_input_key 16 Byte Key
[Check 2] Test psa_key_derivation_input_key with invalid usage
[Check 3] Test psa_key_derivation_input_key with step as label
[Check 4] Test psa_key_derivation_input_key with step as info
[Check 5] Test psa_key_derivation_input_key with step as seed
[Check 6] Test psa_key_derivation_input_key with step as salt
[Check 7] Test psa_key_derivation_input_key with key type as AES(not derive)
[Check 8] Test psa_key_derivation_input_key incorrect key algorithm
[Check 9] Test psa_key_derivation_input_key with key type as 2048 RSA public key
[Check 10] Test psa_key_derivation_input_key with key type as RSA 2048 keypair
[Check 11] Test psa_key_derivation_input_key with zero as step
[Check 12] Test psa_cipher_decrypt_setup - Invalid key handle
[Check 13] Test psa_cipher_decrypt_setup - Zero as key handle

TEST RESULT: PASSED

******************************************

TEST: 219 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_key_agreement
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_key_agreement - ECDH SECP256R1
[Check 2] Test psa_key_derivation_key_agreement - Invalid step
[Check 3] Test psa_key_derivation_key_agreement - ECDH SECP384R1
[Check 4] Test psa_key_derivation_key_agreement - Invalid usage
[Check 5] Test psa_key_derivation_key_agreement - KDF not a key agreement alg
[Check 6] Test psa_key_derivation_key_agreement - Public key of different curve
[Check 7] Test psa_key_derivation_key_agreement - Pub key instead of Prv key
[Check 8] Test psa_key_derivation_key_agreement - Invalid handle
[Check 9] Test psa_key_derivation_key_agreement - Zero as handle

TEST RESULT: PASSED

******************************************

TEST: 220 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_bytes
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_output_bytes - HKDF
[Check 2] Test psa_key_derivation_output_bytes - optional salt
[Check 3] Test psa_key_derivation_output_bytes - capacity < output_length
[Check 4] Test psa_key_derivation_output_bytes - missing info
[Check 5] Test psa_key_derivation_output_bytes - missing salt/secret/info
[Check 6] Test psa_key_derivation_output_bytes - TLS12_PRF
[Check 7] Test psa_key_derivation_output_bytes - capacity < output_length
[Check 8] Test psa_key_derivation_output_bytes - missing seed/secret/label

TEST RESULT: PASSED

******************************************

TEST: 221 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_key
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_output_key - Key
[Check 2] Test psa_key_derivation_output_key - Info
[Check 3] Test psa_key_derivation_output_key - Salt
[Check 4] Test psa_key_derivation_output_key - Greater Capacity than available
[Check 5] Test psa_key_derivation_output_key - ECC Public key
[Check 6] Test psa_key_derivation_output_key -  ECC keypair
[Check 7] Test psa_key_derivation_output_key -  RSA Public Key[Check 8] Test psa_key_derivation_output_key -  RSA keypair
[Check 9] Test psa_key_derivation_output_key - Invalid key size

TEST RESULT: PASSED

******************************************

TEST: 222 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_abort

TEST RESULT: PASSED

******************************************

TEST: 223 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_set_get_capacity
[Info] Executing tests from non-secure
[Check 1] Test psa_key_derivation_set_get_capacity - < operation's capacity
[Check 2] Test psa_key_derivation_set_get_capacity - = operation's capacity
[Check 3] Test psa_key_derivation_set_get_capacity - > operation's capacity
[Check 4] Test psa_key_derivation_set_get_capacity - unchanged capacity

TEST RESULT: PASSED

******************************************

TEST: 224 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_encrypt - CCM - AES - 13B nonce & 8B add data
  Failed at Checkpoint: 4
  Actual: -134
  Expected: 0

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 225 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_decrypt - CCM - AES - 13B nonce & 8B add data
  Failed at Checkpoint: 4
  Actual: -134
  Expected: 0

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 226 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_sign_setup - HMAC - SHA256
  Failed at Checkpoint: 4
  Actual: -133
  Expected: 0

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 227 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_update
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_update - HMAC - SHA256 - 64 Byte
  Failed at Checkpoint: 4
  Actual: -133
  Expected: 0

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 228 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_sign_finish  - HMAC - SHA224
  Failed at Checkpoint: 4
  Actual: -133
  Expected: 0

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 229 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify_setup - HMAC - SHA256
  Failed at Checkpoint: 4
  Actual: -133
  Expected: 0

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 230 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify_finish - HMAC - SHA224
  Failed at Checkpoint: 4
  Actual: -133
  Expected: 0

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 231 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_abort - HMAC - SHA224
[Check 2] Test psa_mac_abort - HMAC - SHA224 - Truncated 8 Byte
[Check 3] Test psa_mac_abort - HMAC - SHA256
[Check 4] Test psa_mac_abort - HMAC - SHA512
[Check 5] Test psa_mac_abort - CMAC - AES
[Check 6] Test psa_mac_sign_finish after calling psa_mac_abort

TEST RESULT: PASSED

******************************************

TEST: 232 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_encrypt_setup 16 Byte AES
[Check 2] Test psa_cipher_encrypt_setup 24 Byte AES
[Check 3] Test psa_cipher_encrypt_setup 32 Byte AES
[Check 4] Test psa_cipher_encrypt_setup DES 64 bit key
[Check 5] Test psa_cipher_encrypt_setup Triple DES 2-Key
[Check 6] Test psa_cipher_encrypt_setup Triple DES 3-Key
[Check 7] Test psa_cipher_encrypt_setup 16 Byte raw data
[Check 8] Test psa_cipher_encrypt_setup - not a cipher algorithm
[Check 9] Test psa_cipher_encrypt_setup - unknown cipher algorithm
[Check 10] Test psa_cipher_encrypt_setup - incompatible key ARC4
  Failed at Checkpoint: 3
  Actual: -134
  Expected: 0

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 233 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_decrypt_setup 16 Byte AES
[Check 2] Test psa_cipher_decrypt_setup 24 Byte AES
[Check 3] Test psa_cipher_decrypt_setup 32 Byte AES
[Check 4] Test psa_cipher_decrypt_setup DES 64 bit key
[Check 5] Test psa_cipher_decrypt_setup Triple DES 2-Key
[Check 6] Test psa_cipher_decrypt_setup Triple DES 3-Key
[Check 7] Test psa_cipher_decrypt_setup 16 Byte raw data
[Check 8] Test psa_cipher_decrypt_setup - not a cipher algorithm
[Check 9] Test psa_cipher_decrypt_setup - unknown cipher algorithm
[Check 10] Test psa_cipher_decrypt_setup - incompatible key ARC4
  Failed at Checkpoint: 3
  Actual: -134
  Expected: 0

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 234 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_generate_iv
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_generate_iv 16 Byte AES
[Check 2] Test psa_cipher_generate_iv 24 Byte AES
[Check 3] Test psa_cipher_generate_iv 32 Byte AES
[Check 4] Test psa_cipher_generate_iv DES 64 bit key
[Check 5] Test psa_cipher_generate_iv DES 2-Key
[Check 6] Test psa_cipher_generate_iv DES 3-Key
[Check 7] Test psa_cipher_generate_iv AES - small iv buffer
[Check 8] Test psa_cipher_generate_iv DES - small iv buffer

TEST RESULT: PASSED

******************************************

TEST: 235 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_set_iv
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_set_iv 16 Byte AES
[Check 2] Test psa_cipher_set_iv 24 Byte AES
[Check 3] Test psa_cipher_set_iv 32 Byte AES
[Check 4] Test psa_cipher_set_iv DES 64 bit key
[Check 5] Test psa_cipher_set_iv DES 2-Key
[Check 6] Test psa_cipher_set_iv DES 3-Key
[Check 7] Test psa_cipher_set_iv AES - small iv buffer
[Check 8] Test psa_cipher_set_iv DES - small iv buffer
[Check 9] Test psa_cipher_set_iv AES - large iv buffer
[Check 10] Test psa_cipher_set_iv DES - large iv buffer

TEST RESULT: PASSED

******************************************

TEST: 236 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_update
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING (Short in)
[Check 3] Test psa_cipher_update - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_update - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_update - Encrypt - AES CTR
[Check 6] Test psa_cipher_update - Encrypt - DES CBC (nopad)
[Check 7] Test psa_cipher_update - Encrypt - 2-key 3DE -CBC (nopad)
[Check 8] Test psa_cipher_update - Encrypt - 3-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_update - Encrypt - small output buffer size
[Check 10] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING
[Check 11] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING (Short in)
[Check 12] Test psa_cipher_update - Decrypt - AES CBC_PKCS7
[Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7 (Short input)
[Check 14] Test psa_cipher_update - Decrypt - AES CTR
[Check 15] Test psa_cipher_update - Decrypt - DES CBC (nopad)
[Check 16] Test psa_cipher_update - Decrypt - 2-key 3DE -CBC (nopad)
[Check 17] Test psa_cipher_update - Decrypt - 3-key 3DE -CBC (nopad)
[Check 18] Test psa_cipher_update - Decrypt - small output buffer size
[Check 19] Test psa_cipher_update without cipher setup

TEST RESULT: PASSED

******************************************

TEST: 237 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING (Short in)
[Check 3] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7
[Check 4] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7 (Short input)
[Check 5] Test psa_cipher_finish - Encrypt - AES CTR
[Check 6] Test psa_cipher_finish - Encrypt - AES CTR (short input)
[Check 7] Test psa_cipher_finish - Encrypt - DES CBC (nopad)
[Check 8] Test psa_cipher_finish - Encrypt - 2-key 3DE -CBC (nopad)
[Check 9] Test psa_cipher_finish - Encrypt - 3-key 3DE -CBC (nopad)
[Check 10] Test psa_cipher_finish - Encrypt - small output buffer size
[Check 11] Test psa_cipher_finish - Decrypt - AES CBC_NO_PADDING
[Check 12] Test psa_cipher_finish - Decrypt - AES CBC_NO_PADDING (Short in)
[Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7
[Check 14] Test psa_cipher_finish - Decrypt - AES CBC_PKCS7 (Short input)
[Check 15] Test psa_cipher_finish - Decrypt - AES CTR
[Check 16] Test psa_cipher_finish - Decrypt - AES CTR (short input)
[Check 17] Test psa_cipher_finish - Decrypt - DES CBC (nopad)
[Check 18] Test psa_cipher_finish - Decrypt - 2-key 3DE -CBC (nopad)
[Check 19] Test psa_cipher_finish - Decrypt - 3-key 3DE -CBC (nopad)

TEST RESULT: PASSED

******************************************

TEST: 238 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_abort - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_abort - Encrypt - AES CBC_PKCS7
[Check 3] Test psa_cipher_abort - Encrypt - AES CTR
[Check 4] Test psa_cipher_abort - Encrypt - DES CBC (nopad)
[Check 5] Test psa_cipher_abort - Encrypt - 2-key 3DE -CBC (nopad)
[Check 6] Test psa_cipher_abort - Encrypt - 3-key 3DE -CBC (nopad)
[Check 7] Test psa_cipher_abort - Decrypt - AES CBC_NO_PADDING
[Check 8] Test psa_cipher_abort - Decrypt - AES CBC_PKCS7
[Check 9] Test psa_cipher_abort - Decrypt - AES CTR
[Check 10] Test psa_cipher_abort - Decrypt - DES CBC (nopad)
[Check 11] Test psa_cipher_abort - Decrypt - 2-key 3DE -CBC (nopad)
[Check 12] Test psa_cipher_abort - Decrypt - 3-key 3DE -CBC (nopad)
[Check 13] Test psa_cipher_update after psa_cipher_abort should fail

TEST RESULT: PASSED

******************************************

TEST: 239 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_asymmetric_encrypt - RSA PKCS1V15
[Check 2] Test psa_asymmetric_encrypt - RSA KEY_PAIR PKCS1V15
[Check 3] Test psa_asymmetric_encrypt - RSA OAEP SHA256
[Check 4] Test psa_asymmetric_encrypt - RSA OAEP SHA256 with label
[Check 5] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256
[Check 6] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256 with label
[Check 7] Test psa_asymmetric_encrypt - Small output buffer
[Check 8] Test psa_asymmetric_encrypt - Invalid algorithm
[Check 9] Test psa_asymmetric_encrypt - Invalid key type
[Check 10] Test psa_asymmetric_encrypt - Invalid usage
[Check 11] Test psa_asymmetric_encrypt - RSA PKCS1V15 - Salt
[Check 12] Test psa_asymmetric_encrypt - ECC public key
[Check 13] Test psa_asymmetric_encrypt - Invalid key handle
[Check 14] Test psa_asymmetric_encrypt - Zero as key handle

TEST RESULT: PASSED

******************************************

TEST: 240 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_asymmetric_decrypt - RSA KEY_PAIR PKCS1V15
[Check 2] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256
[Check 3] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256 with label
[Check 4] Test psa_asymmetric_decrypt - Invalid key type (RSA public key)
[Check 5] Test psa_asymmetric_decrypt - Small output buffer
[Check 6] Test psa_asymmetric_decrypt - Invalid algorithm
[Check 7] Test psa_asymmetric_decrypt - Invalid key type (AES Key)
[Check 8] Test psa_asymmetric_decrypt - Invalid usage
[Check 9] Test psa_asymmetric_decrypt - RSA PKCS1V15 - Salt
[Check 10] Test psa_asymmetric_decrypt - Invalid key handle
[Check 11] Test psa_asymmetric_decrypt - Zero as key handle

TEST RESULT: PASSED

******************************************

TEST: 241 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_sign_hash
[Info] Executing tests from non-secure
[Check 1] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 3] Test psa_sign_hash - ECDSA SECP256R1 SHA-256
[Check 4] Test psa_sign_hash - Invalid key type (RSA public key)
[Check 5] Test psa_sign_hash - Small output buffer
[Check 6] Test psa_sign_hash - Invalid algorithm
[Check 7] Test psa_sign_hash - Invalid key type (AES Key)
[Check 8] Test psa_sign_hash - Invalid usage
[Check 9] Test psa_sign_hash - Wrong hash size
[Check 10] Test psa_sign_hash - Invalid key handle
[Check 11] Test psa_sign_hash - Zero as key handle

TEST RESULT: PASSED

******************************************

TEST: 242 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_verify_hash
[Info] Executing tests from non-secure
[Check 1] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 SHA-256
[Check 3] Test psa_verify_hash - ECDSA KEY_PAIR SECP256R1 SHA-256
[Check 4] Test psa_verify_hash - EC public key
[Check 5] Test psa_verify_hash - RSA public key
[Check 6] Test psa_verify_hash - Small output buffer
[Check 7] Test psa_verify_hash - Invalid algorithm
[Check 8] Test psa_verify_hash - Invalid key type (AES Key)
[Check 9] Test psa_verify_hash - Invalid usage
[Check 10] Test psa_verify_hash - Wrong hash size
[Check 11] Test psa_verify_hash - Wrong signature
[Check 12] Test psa_verify_hash - Wrong signature size
[Check 13] Test psa_verify_hash - Invalid key handle
[Check 14] Test psa_verify_hash - Zero as key handle

TEST RESULT: PASSED

******************************************

TEST: 243 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_raw_key_agreement
[Info] Executing tests from non-secure
[Check 1] Test psa_raw_key_agreement - ECDH SECP256R1
[Check 2] Test psa_raw_key_agreement - Small buffer size
[Check 3] Test psa_raw_key_agreement - ECDH SECP384R1
[Check 4] Test psa_raw_key_agreement - Invalid usage
[Check 5] Test psa_raw_key_agreement - Unknown KDF
[Check 6] Test psa_raw_key_agreement - Not a key agreement alg
[Check 7] Test psa_raw_key_agreement - Public key on different curve
[Check 8] Test psa_raw_key_agreement - Public key instead of private key
[Check 9] Test psa_raw_key_agreement - Invalid key handle
[Check 10] Test psa_raw_key_agreement - Zero as key handle

TEST RESULT: PASSED

******************************************

TEST: 244 | DESCRIPTION: Testing crypto key management APIs | UT: psa_copy_key
[Info] Executing tests from non-secure
[Check 1] Test psa_copy_key - 2048 RSA public key
[Check 2] Test psa_copy_key - RSA 2048 keypair
[Check 3] Test psa_copy_key - Incompatible target policy(source and target)
[Check 4] Test psa_copy_key - source key with no export usage
[Check 5] Test psa_copy_key - DES 64 bit key
[Check 6] Test psa_copy_key - Triple DES 2-Key
[Check 7] Test psa_copy_key - Triple DES 3-Key
[Check 8] Test psa_copy_key - EC Public key
[Check 9] Test psa_copy_key - EC keypair

TEST RESULT: PASSED

******************************************

TEST: 245 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_clone
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_clone - MD5 algorithm
[Check 2] Test psa_hash_clone - RIPEMD160 algorithm
[Check 3] Test psa_hash_clone - SHA1 algorithm
[Check 4] Test psa_hash_clone - SHA224 algorithm
[Check 5] Test psa_hash_clone - SHA256 algorithm
[Check 6] Test psa_hash_clone - SHA384 algorithm
[Check 7] Test psa_hash_clone - SHA512 algorithm
[Check 8] Test psa_hash_clone - from an inactive source operation
[Check 9] Test psa_hash_clone - on an active target operation
  Failed at Checkpoint: 5
  Actual: 0
  Expected: -137

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 246 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_compute
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_compute HMAC SHA 224
[Check 2] Test psa_mac_compute - Incompactible HMAC for CMAC
[Check 3] Test psa_mac_compute - Invalid usage
[Check 4] Test psa_mac_compute - truncated MAC too small
[Check 5] Test psa_mac_compute - truncated MAC too large
[Check 6] Test psa_mac_compute - bad algorithm (unknown MAC algorithm)
[Check 7] Test psa_mac_compute HMAC SHA 256
[Check 8] Test psa_mac_compute HMAC SHA 512
[Check 9] Test psa_mac_compute HMAC SHA 224 (truncated to 8 Byte)
[Check 10] Test psa_mac_compute CMAC AES 128
[Check 11] Test psa_mac_compute small size buffer
[Check 12] Test psa_mac_compute - Invalid key type

TEST RESULT: PASSED

******************************************

TEST: 247 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_mac_verify HMAC SHA 224
  Failed at Checkpoint: 4
  Actual: -133
  Expected: 0

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 248 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING
  Failed at Checkpoint: 4
  Actual: -137
  Expected: 0

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 249 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt
[Info] Executing tests from non-secure
[Check 1] Test psa_cipher_decrypt - Encrypt - AES CBC_NO_PADDING
[Check 2] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING
  Failed at Checkpoint: 4
  Actual: -137
  Expected: 0

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 250 | DESCRIPTION: Testing crypto key management APIs | UT: psa_sign_message
[Info] Executing tests from non-secure
[Check 1] Test psa_sign_message - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_sign_message - ECDSA SECP256R1 SHA-256
  Failed at Checkpoint: 4
  Actual: -133
  Expected: 0

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 251 | DESCRIPTION: Testing crypto key management APIs | UT: psa_verify_message
[Info] Executing tests from non-secure
[Check 1] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 RAW
[Check 2] Test psa_verify_message - RSA Public Key PKCS1V15 RAW
[Check 3] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 SHA-256
  Failed at Checkpoint: 4
  Actual: -133
  Expected: -149

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 252 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_encrypt_setup - CCM - AES
  Failed at Checkpoint: 4
  Actual: -132
  Expected: 0

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 253 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt_setup
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_decrypt_setup - CCM - AES
  Failed at Checkpoint: 4
  Actual: -132
  Expected: 0

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 254 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_generate_nonce
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_generate_nonce - Encrypt - CCM
  Failed at Checkpoint: 4
  Actual: -132
  Expected: 0

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 255 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_nonce
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_set_nonce - Encrypt - CCM
  Failed at Checkpoint: 4
  Actual: -132
  Expected: 0

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 256 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_lengths
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_set_lengths - Encrypt - CCM
  Failed at Checkpoint: 4
  Actual: -132
  Expected: 0

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 257 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update_ad
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_update_ad - Encrypt - CCM
  Failed at Checkpoint: 4
  Actual: -132
  Expected: 0

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 258 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_update - Encrypt - CCM
  Failed at Checkpoint: 4
  Actual: -132
  Expected: 0

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 259 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_finish
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_finish - AES-CCM
  Failed at Checkpoint: 4
  Actual: -132
  Expected: 0

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 260 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_abort
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_abort - Encrypt - CCM - AES
  Failed at Checkpoint: 4
  Actual: -132
  Expected: 0

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 261 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_verify
[Info] Executing tests from non-secure
[Check 1] Test psa_aead_verify - AES-CCM
  Failed at Checkpoint: 4
  Actual: -132
  Expected: 0

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 262 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_suspend
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_suspend - MD5
  Failed at Checkpoint: 5
  Actual: -134
  Expected: 0

TEST RESULT: FAILED (Error Code=0x1)

******************************************

TEST: 263 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_resume
[Info] Executing tests from non-secure
[Check 1] Test psa_hash_resume - MD5
  Failed at Checkpoint: 5
  Actual: -134
  Expected: 0

TEST RESULT: FAILED (Error Code=0x1)

******************************************

************ Crypto Suite Report **********
TOTAL TESTS     : 63
TOTAL PASSED    : 34
TOTAL SIM ERROR : 0
TOTAL FAILED    : 29
TOTAL SKIPPED   : 0
******************************************

Entering standby..
Run psa-iat-api-test
/mnt/arm-linux/bin/psa-iat-api-test

Output:

***** PSA Architecture Test Suite - Version 1.4 *****

Running.. Attestation Suite
******************************************

TEST: 601 | DESCRIPTION: Testing attestation initial attestation APIs | UT: psa_initial_attestation
[Info] Executing tests from non-secure
[Check 1] Test psa_initial_attestation_get_token with Challenge 32
[Check 2] Test psa_initial_attestation_get_token with Challenge 48
[Check 3] Test psa_initial_attestation_get_token with Challenge 64
[Check 4] Test psa_initial_attestation_get_token with zero challenge size
[Check 5] Test psa_initial_attestation_get_token with small challenge size
[Check 6] Test psa_initial_attestation_get_token with invalid challenge size
[Check 7] Test psa_initial_attestation_get_token with large challenge size
[Check 8] Test psa_initial_attestation_get_token with zero as token size
[Check 9] Test psa_initial_attestation_get_token with small token size
[Check 10] Test psa_initial_attestation_get_token_size with Challenge 32
[Check 11] Test psa_initial_attestation_get_token_size with Challenge 48
[Check 12] Test psa_initial_attestation_get_token_size with Challenge 64
[Check 13] Test psa_initial_attestation_get_token_size with zero challenge size
[Check 14] Test psa_initial_attestation_get_token_size with small challenge size
[Check 15] Test psa_initial_attestation_get_token_size with invalid challenge size
[Check 16] Test psa_initial_attestation_get_token_size with large challenge size

TEST RESULT: PASSED

******************************************

************ Attestation Suite Report **********
TOTAL TESTS     : 1
TOTAL PASSED    : 1
TOTAL SIM ERROR : 0
TOTAL FAILED    : 0
TOTAL SKIPPED   : 0
******************************************

Entering standby..
xtest

OP-TEE's built-in test solution (xtest) can be used to sanity check the system. This does invoke some parts of the SPMC, but none of the Trusted Services components. Expected result is 100% success:

TEE test application started over default TEE instance
######################################################
#
# regression
#
######################################################

* regression_1001 Core self tests
o regression_1001.1 Core self tests
  regression_1001.1 OK
o regression_1001.2 Core dt_driver self tests
  regression_1001.2 OK
  regression_1001 OK

* regression_1002 PTA parameters
  regression_1002 OK

* regression_1003 Core internal read/write mutex
    Number of parallel threads: 6 (2 writers and 4 readers)
    Max read concurrency: 2
    Max read waiters: 2
    Mean read concurrency: 1.4
    Mean read waiting: 1.0125
  regression_1003 OK

<...>
<...>

regression_8001 OK
regression_8002 OK
regression_8101 OK
regression_8102 OK
regression_8103 OK
+-----------------------------------------------------
26258 subtests of which 0 failed
95 test cases of which 0 failed
0 test cases were skipped
TEE test application done!
Last Author
balintdobszay
Last Edited
Apr 22 2022, 2:11 PM

Event Timeline

gyuri-szing created this object.Feb 22 2022, 2:42 PM
gyuri-szing created this object with visibility "Custom Policy".
gyuri-szing changed the edit policy from "Custom Policy" to "Custom Policy".
jellesels-arm changed the title from Op-tee-spmc to OP-TEE-SPMC status.Feb 22 2022, 2:43 PM
jellesels-arm edited the content of this document. (Show Details)Feb 22 2022, 3:00 PM
jellesels-arm edited the content of this document. (Show Details)Feb 22 2022, 3:18 PM
jellesels-arm edited the content of this document. (Show Details)
jellesels-arm edited the content of this document. (Show Details)Feb 22 2022, 3:35 PM
jellesels-arm published a new version of this document.
jellesels-arm edited the content of this document. (Show Details)Feb 25 2022, 4:38 PM
jellesels-arm edited the content of this document. (Show Details)Feb 25 2022, 4:43 PM
jellesels-arm edited the content of this document. (Show Details)Feb 25 2022, 4:52 PM
jellesels-arm edited the content of this document. (Show Details)
jellesels-arm edited the content of this document. (Show Details)Feb 25 2022, 4:55 PM
jellesels-arm edited the content of this document. (Show Details)
jellesels-arm edited the content of this document. (Show Details)Feb 25 2022, 4:57 PM
jellesels-arm edited the content of this document. (Show Details)Feb 25 2022, 5:41 PM
jellesels-arm edited the content of this document. (Show Details)
jellesels-arm edited the content of this document. (Show Details)
jellesels-arm edited the content of this document. (Show Details)Feb 25 2022, 5:45 PM
jellesels-arm edited the content of this document. (Show Details)
jellesels-arm edited the content of this document. (Show Details)Feb 25 2022, 5:47 PM
jellesels-arm edited the content of this document. (Show Details)
jellesels-arm edited the content of this document. (Show Details)
jellesels-arm edited the content of this document. (Show Details)Feb 25 2022, 5:52 PM
jellesels-arm edited the content of this document. (Show Details)
jellesels-arm edited the content of this document. (Show Details)
jellesels-arm edited the content of this document. (Show Details)Feb 25 2022, 5:54 PM
jellesels-arm edited the content of this document. (Show Details)
jellesels-arm edited the content of this document. (Show Details)
jellesels-arm edited the content of this document. (Show Details)Feb 25 2022, 5:57 PM
jellesels-arm edited the content of this document. (Show Details)
jellesels-arm published a new version of this document.
jellesels-arm edited the content of this document. (Show Details)Feb 25 2022, 5:59 PM
jellesels-arm changed the title from OP-TEE-SPMC status to OP-TEE SPMC status-v3.16.Feb 28 2022, 5:20 PM
jellesels-arm edited the content of this document. (Show Details)
jellesels-arm edited the content of this document. (Show Details)Feb 28 2022, 5:24 PM
jellesels-arm changed the visibility from "Custom Policy" to "Public (No Login Required)".
jellesels-arm edited the content of this document. (Show Details)Mar 1 2022, 9:36 AM
jellesels-arm edited the content of this document. (Show Details)
jellesels-arm published a new version of this document.Mar 1 2022, 9:38 AM
jellesels-arm edited the content of this document. (Show Details)Mar 1 2022, 10:27 AM
gyuri-szing changed the edit policy from "Custom Policy" to "Custom Policy".Apr 21 2022, 2:22 PM
balintdobszay changed the title from OP-TEE SPMC status-v3.16 to OP-TEE SPMC status v3.17.Apr 22 2022, 9:54 AM
balintdobszay edited the content of this document. (Show Details)
balintdobszay changed the title from OP-TEE SPMC status-v3.16 to OP-TEE SPMC status v3.17.Apr 22 2022, 1:10 PM
balintdobszay edited the content of this document. (Show Details)
balintdobszay changed the title from OP-TEE SPMC status-v3.16 to OP-TEE SPMC status v3.17.Apr 22 2022, 1:53 PM
balintdobszay edited the content of this document. (Show Details)
balintdobszay published a new version of this document.Apr 22 2022, 1:58 PM
balintdobszay edited the content of this document. (Show Details)Apr 22 2022, 2:11 PM