Release-testing-3-20
Release-testing-3-20
Overview
This page is to capture the test results for OP-TEE SPMC v3.20
The tests were ran using the following set of components:
>>> Manifest status 8029bb7 (HEAD -> default, tag: 3.20.0, origin/3.20.0, m/3.20.0) OP-TEE 3.20.0 stable b81b354 (origin/master) fvp: Update TF-A version to v2.8 b0c5274 qemu_v8: Update QEMU to v7.2.0 Local manifests: The merged manifest is: <?xml version="1.0" encoding="UTF-8"?> <manifest> <remote fetch="https://git.gitlab.arm.com" name="arm-gitlab"/> <remote fetch="https://github.com" name="github"/> <remote fetch="https://git.savannah.gnu.org/git" name="savannah"/> <remote fetch="https://git.trustedfirmware.org" name="tfo"/> <default remote="github" revision="master"/> <project name="Mbed-TLS/mbedtls.git" path="mbedtls" revision="refs/tags/mbedtls-2.28.1"/> <project clone-depth="1" name="OP-TEE/build.git" path="build" revision="refs/tags/3.20.0"> <linkfile dest="build/Makefile" src="fvp-psa-sp.mk"/> </project> <project clone-depth="1" name="OP-TEE/optee_client.git" path="optee_client" revision="refs/tags/3.20.0"/> <project clone-depth="1" name="OP-TEE/optee_os.git" path="optee_os" revision="refs/tags/3.20.0"/> <project clone-depth="1" name="OP-TEE/optee_test.git" path="optee_test" revision="refs/tags/3.20.0"/> <project clone-depth="1" name="TF-A/trusted-firmware-a.git" path="trusted-firmware-a" remote="tfo" revision="refs/tags/v2.8"/> <project name="TS/trusted-services.git" path="trusted-services" remote="tfo" revision="integration"/> <project clone-depth="1" name="buildroot/buildroot.git" path="buildroot" revision="refs/tags/2021.11"/> <project clone-depth="1" name="grub.git" path="grub" remote="savannah" revision="refs/tags/grub-2.02"/> <project clone-depth="1" name="linaro-swg/optee_examples.git" path="optee_examples" revision="refs/tags/3.20.0"/> <project clone-depth="1" name="linux-arm/linux-trusted-services.git" path="linux-arm-ffa-user" remote="arm-gitlab" revision="refs/tags/v4.0.0"/> <project clone-depth="1" name="linux-arm/linux-trusted-services.git" path="linux-arm-ffa-tee" remote="arm-gitlab" revision="refs/tags/tee-v1"/> <project name="tianocore/edk2-platforms.git" path="edk2-platforms" revision="02daa58c21f89628b4d8c76f95f3a554289149bc"/> <project name="tianocore/edk2.git" path="edk2" revision="dd4cae4d82c7477273f3da455084844db5cca0c0"/> <project clone-depth="1" name="torvalds/linux.git" path="linux" revision="refs/tags/v5.16"/> </manifest> >>>Project status project build/ >>>>>>>>>>>>>>>>>>>>>>>> Local SHA ccac4c3faf064090b50b2b645ffec2940f0855df is not matching remote SHA dddfd73e2f5130fe9121bdb547e8bcde2eb27ca0. >>>>>>>>>>>>>>>>>>>>>>>> ccac4c3 (HEAD) fvp: disable UEFI and SPMC tests by default 9e25704 fvp: Enable measured boot with fip stored SPs a626f0b fvp: Add support for selecting TS SP configurations project buildroot/ Local and remote SHA is matching. e6e1233 (grafted, HEAD, tag: 2021.11, tag: m/3.20.0) Update for 2021.11 project edk2/ Local and remote SHA is matching. dd4cae4d82 (HEAD, m/3.20.0) ArmPkg/GenericWatchdogDxe: Split 64bit register write to 2x32bit 1d802e234e BaseTools: Guid.xref doesn't specify the correct GUID value for Driver 83964ebc5e BaseTools/BinToPcd: Encode string returned from ByteArray() project edk2-platforms/ Local and remote SHA is matching. 02daa58c21 (HEAD, m/3.20.0) Silicon/SynQuacer: Add status property in PCIe & SDHC DT nodes 9f02ebc19b Silicon/SynQuacer: add optional OP-TEE DT node 9dae9a0c79 Marvell/Library: ComPhyLib: Clean up the library after rework project grub/ Local and remote SHA is matching. e54c99a (grafted, HEAD, tag: grub-2.02, tag: m/3.20.0) Increase version to 2.02. project linux/ Local and remote SHA is matching. df0cc57e0 (grafted, HEAD, tag: v5.16, tag: m/3.20.0) Linux 5.16 project linux-arm-ffa-tee/ Local and remote SHA is matching. 3b543b7 (grafted, HEAD, tag: tee-v1, m/3.20.0) Add SE Proxy SP UUID project linux-arm-ffa-user/ Local and remote SHA is matching. 870fca7 (grafted, HEAD, tag: v4.0.0, m/3.20.0) Enable arbitrary size for shared memory regions project mbedtls/ Local and remote SHA is matching. dd79db100 (HEAD, tag: v2.28.1, tag: mbedtls-2.28.1, tag: m/3.20.0) Merge pull request #955 from Mbed-TLS/mbedtls-2.28.1rc0-pr fe9d08fd1 Bump version fa827b4b3 Minor tweaks to Changelog project optee_client/ Local and remote SHA is matching. dd2d39b (grafted, HEAD, tag: 3.20.0, tag: m/3.20.0) libteeacl: Move uuid-dev checking in libteec makefile project optee_examples/ Local and remote SHA is matching. a98d01e (grafted, HEAD, tag: 3.20.0, tag: m/3.20.0) pluging: add missing of dependency syslog on teec project optee_os/ Local and remote SHA is matching. 8e74d47 (grafted, HEAD, tag: 3.20.0, tag: m/3.20.0) Update CHANGELOG for 3.20.0 project optee_test/ Local and remote SHA is matching. 5db8ab4 (grafted, HEAD, tag: 3.20.0, tag: m/3.20.0) pkcs11: fix regression in RSA AES key wrap tests project trusted-firmware-a/ Local and remote SHA is matching. 9881bb9 (grafted, HEAD, tag: v2.8, tag: m/3.20.0) Merge "docs(spm): update threat model" into integration project trusted-services/ Local and remote SHA is matching. 7ddb28a (HEAD -> integration, tfo/integration, m/3.20.0) Fix b-test issues 996df84 Fix: check driver version in MM communicate RPC caller 55d28f5 Fix: Add event log node to attestation/default-sp
Details
Config 1: embedded SP (default)
Build command
make
Setup steps after boot
/mnt/host/out/linux-arm-ffa-tee/load_module.sh /mnt/host/out/linux-arm-ffa-user/load_module.sh cp -at /usr /mnt/host/out/ts-install/arm-linux/bin /mnt/host/out/ts-install/arm-linux/lib
Test results OP-TEE xtest (incl. SPMC tests)
# xtest Run test suite with level=0 TEE test application started over default TEE instance ###################################################### # # regression+ffa_spmc # ###################################################### * regression_1001 Core self tests o regression_1001.1 Core self tests regression_1001.1 OK o regression_1001.2 Core dt_driver self tests regression_1001.2 OK regression_1001 OK * regression_1002 PTA parameters regression_1002 OK * regression_1003 Core internal read/write mutex Number of parallel threads: 6 (2 writers and 4 readers) Max read concurrency: 2 Max read waiters: 2 Mean read concurrency: 1.4 Mean read waiting: 1.0125 regression_1003 OK * regression_1004 Test User Crypt TA o regression_1004.1 AES encrypt regression_1004.1 OK o regression_1004.2 AES decrypt regression_1004.2 OK o regression_1004.3 SHA-256 test, 3 bytes input regression_1004.3 OK o regression_1004.4 AES-256 ECB encrypt (32B, fixed key) regression_1004.4 OK o regression_1004.5 AES-256 ECB decrypt (32B, fixed key) regression_1004.5 OK regression_1004 OK * regression_1005 Many sessions regression_1005 OK * regression_1005 Test FF-A memory: multiple receiver regression_1005 OK * regression_1006 Test Basic OS features regression_1006 OK * regression_1007 Test Panic regression_1007 OK * regression_1008 TEE internal client API <...> <...> regression_6018 OK regression_6019 OK regression_6020 OK regression_8001 OK regression_8002 OK regression_8101 OK regression_8102 OK regression_8103 OK ffa_spmc_1001 OK ffa_spmc_1002 OK ffa_spmc_1003 OK ffa_spmc_1004 OK +----------------------------------------------------- 26454 subtests of which 0 failed 107 test cases of which 0 failed 0 test cases were skipped TEE test application done!
Trusted Services service level test
./ts-service-test -v TEST(PsServiceTests, createAndSetExtended) - 18332 ms TEST(PsServiceTests, createAndSet) - 23171 ms TEST(PsServiceTests, storeNewItem) - 19686 ms TEST(ItsServiceTests, storeNewItem) - 20203 ms TEST(AttestationProvisioningTests, provisionedIak) - 41374 ms TEST(AttestationProvisioningTests, selfGeneratedIak) - 62527 ms TEST(AttestationServiceTests, repeatedOperation) - 7604036 ms TEST(AttestationServiceTests, invalidChallengeLen)[23048.163247] ------------[ cut here ]------------ [23048.163347] WARNING: CPU: 4 PID: 439 at mm/page_alloc.c:5344 __alloc_pages+0x5b4/0xbe0 [23048.163632] Modules linked in: arm_ffa_user(O) arm_ffa_tee(O) [23048.163848] CPU: 4 PID: 439 Comm: ts-service-test Tainted: G O 5.16.0 #3 [23048.164047] Hardware name: FVP Base RevC (DT) [23048.164195] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [23048.164369] pc : __alloc_pages+0x5b4/0xbe0 [23048.164547] lr : alloc_pages+0xb0/0x150 [23048.164716] sp : ffff80001306bad0 [23048.164803] x29: ffff80001306bad0 x28: 0000000000000015 x27: ffff000803a0bc80 [23048.165063] x26: 0000000000000000 x25: 0000000000000000 x24: ffff000802d40c00 [23048.165347] x23: ffff000803a0bb80 x22: 0000000000000015 x21: 0000000000000015 [23048.165584] x20: 0000000000000000 x19: 0000000000000dc0 x18: 0000000000000000 [23048.165847] x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffffff662ce8 [23048.166089] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000 [23048.166347] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000 [23048.166581] x8 : ffff000803a0bc00 x7 : 0000000000000000 x6 : ffff80001306bd80 [23048.166847] x5 : 0000000000000000 x4 : ffff000803439c00 x3 : 0000000000000000 [23048.167059] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000dc0 [23048.167347] Call trace: [23048.167406] __alloc_pages+0x5b4/0xbe0 [23048.167580] alloc_pages+0xb0/0x150 [23048.167753] pool_op_alloc+0x58/0x190 [arm_ffa_tee] [23048.167947] tee_shm_alloc+0xac/0x1c4 [23048.168100] tee_ioctl+0xd10/0x131c [23048.168274] __arm64_sys_ioctl+0xac/0xf0 [23048.168447] invoke_syscall+0x48/0x114 [23048.168547] el0_svc_common.constprop.0+0x44/0xec [23048.168794] do_el0_svc+0x28/0x90 [23048.168968] el0_svc+0x20/0x60 [23048.169055] el0t_64_sync_handler+0x1a8/0x1b0 [23048.169247] el0t_64_sync+0x1a0/0x1a4 [23048.169402] ---[ end trace 411d6c26c91f895d ]--- ffa_tee_share_mem():212 error: 12 - 22964 ms TEST(AttestationServiceTests, checkTokenSize) - 76884 ms TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 23639 ms TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 26530 ms TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 32162 ms TEST(CryptoMacServicePackedcTests, macAbort) - 19698 ms TEST(CryptoMacServicePackedcTests, signAndVerify) - 80431 ms TEST(CryptoCipherServicePackedcTests, cipherAbort) - 19751 ms TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 63620 ms TEST(CryptoHashServicePackedcTests, hashAbort) - 18154 ms TEST(CryptoHashServicePackedcTests, hashAndVerify) - 29409 ms TEST(CryptoHashServicePackedcTests, calculateHash) - 13466 ms TEST(CryptoServicePackedcTests, generateRandomNumbers) - 42184 ms TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 1738560 ms TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 124914 ms TEST(CryptoServicePackedcTests, signAndVerifyEat) - 328001 ms TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 333357 ms TEST(CryptoServicePackedcTests, signAndVerifyHash) - 330747 ms TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 52723 ms TEST(CryptoServicePackedcTests, exportPublicKey) - 67831 ms TEST(CryptoServicePackedcTests, purgeKey) - 44134 ms TEST(CryptoServicePackedcTests, copyKey) - 157330 ms TEST(CryptoServicePackedcTests, generatePersistentKeys) - 78033 ms TEST(CryptoServicePackedcTests, generateVolatileKeys) - 67691 ms TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 43866 ms TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 730159 ms TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 137403 ms TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 332222 ms TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 331768 ms TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 53050 ms TEST(CryptoServiceProtobufTests, exportPublicKey) - 68202 ms TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 79115 ms TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 68081 ms TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit)[23062.825551] random: crng init done - 9014196 ms TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 2203791 ms TEST(DiscoveryServiceTests, checkServiceInfo) - 3834 ms OK (43 tests, 43 ran, 763 checks, 0 ignored, 0 filtered out, 24665618 ms)
PSA Architecture Test Suite
# ./psa-its-api-test ***** PSA Architecture Test Suite - Version 1.4 ***** Running.. Storage Suite ****************************************** TEST: 401 | DESCRIPTION: UID not found check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Call get API for UID 6 which is not set [Check 2] Call get_info API for UID 6 which is not set [Check 3] Call remove API for UID 6 which is not set [Check 4] Call get API for UID 6 which is removed [Check 5] Call get_info API for UID 6 which is removed [Check 6] Call remove API for UID 6 which is removed Set storage for UID 6 [Check 7] Call get API for different UID 5 [Check 8] Call get_info API for different UID 5 [Check 9] Call remove API for different UID 5 TEST RESULT: PASSED ****************************************** TEST: 402 | DESCRIPTION: Write once error check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Update the flag of UID 1 with WRITE_ONCE flag [Check 2] Try to remove the UID 1 having WRITE_ONCE flag [Check 3] Create a new UID 2 with WRITE_ONCE flag [Check 4] Try to remove the UID 2 having WRITE_ONCE flag [Check 5] Try to change the length of write_once UID 2 [Check 6] Check UID removal still fails [Check 7] Try to change the WRITE_ONCE flag to None for UID 2 [Check 8] Check UID removal still fails TEST RESULT: PASSED ****************************************** TEST: 403 | DESCRIPTION: Insufficient space check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Overload storage space UID 13 set failed due to insufficient space Remove all registered UIDs [Check 2] Overload storage again to verify all previous UID removed UID 13 set failed due to insufficient space Remove all registered UIDs TEST RESULT: PASSED ****************************************** TEST: 404 | DESCRIPTION: Data Consistency check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2 [Check 2] Call get API with default length - TEST_BUFF_SIZE TEST RESULT: PASSED ****************************************** TEST: 405 | DESCRIPTION: Success scenarios check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Set UID with data length zero and call storage APIs [Check 2] Resetting the length check TEST RESULT: PASSED ****************************************** TEST: 406 | DESCRIPTION: Check for storage create flags | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE [Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY [Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION TEST RESULT: PASSED ****************************************** TEST: 407 | DESCRIPTION: Incorrect Size check | UT: ITS [Info] Executing tests from non-secure ****************************************** TEST: 407 | DESCRIPTION: Incorrect Size check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests Create a valid Storage - TEST_BUFF_SIZE/2 Increase the length of storage - TEST_BUFF_SIZE [Check 1] Call get API with old length - TEST_BUFF_SIZE/2 [Check 2] Call get API with old length - TEST_BUFF_SIZE/4 Decrease the length of storage - TEST_BUFF_SIZE/4 [Check 3] Call get API with old length - TEST_BUFF_SIZE/2 [Check 4] Call get API with old length - TEST_BUFF_SIZE [Check 5] Call get API with valid length - TEST_BUFF_SIZE/4 TEST RESULT: PASSED ****************************************** TEST: 408 | DESCRIPTION: Invalid offset check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Try to access data with varying valid offset [Check 2] Try to access data with varying invalid offset TEST RESULT: PASSED ****************************************** TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Call set API with NULL pointer and data length 0 [Check 2] Call get API with NULL read buffer and data length 0 [Check 3] Remove the UID [Check 4] Call get_info API to verify UID removed [Check 5] Create UID with zero data_len and valid write buffer [Check 8] Call get API with NULL read buffer and data length 0 [Check 9] Increase the length TEST RESULT: PASSED ****************************************** TEST: 410 | DESCRIPTION: UID value zero check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Creating storage with UID 0 should fail [Check 2] Get_info for UID 0 should fail [Check 3] Removing storage with UID 0 should fail TEST RESULT: PASSED ****************************************** ************ Storage Suite Report ********** TOTAL TESTS : 10 TOTAL PASSED : 10 TOTAL SIM ERROR : 0 TOTAL FAILED : 0 TOTAL SKIPPED : 0 ******************************************
# ./psa-ps-api-test ***** PSA Architecture Test Suite - Version 1.4 ***** Running.. Storage Suite ****************************************** TEST: 401 | DESCRIPTION: UID not found check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Call get API for UID 6 which is not set [Check 2] Call get_info API for UID 6 which is not set [Check 3] Call remove API for UID 6 which is not set [Check 4] Call get API for UID 6 which is removed [Check 5] Call get_info API for UID 6 which is removed [Check 6] Call remove API for UID 6 which is removed Set storage for UID 6 [Check 7] Call get API for different UID 5 [Check 8] Call get_info API for different UID 5 [Check 9] Call remove API for different UID 5 TEST RESULT: PASSED ****************************************** TEST: 402 | DESCRIPTION: Write once error check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Update the flag of UID 1 with WRITE_ONCE flag [Check 2] Try to remove the UID 1 having WRITE_ONCE flag [Check 3] Create a new UID 2 with WRITE_ONCE flag [Check 4] Try to remove the UID 2 having WRITE_ONCE flag [Check 5] Try to change the length of write_once UID 2 [Check 6] Check UID removal still fails [Check 7] Try to change the WRITE_ONCE flag to None for UID 2 [Check 8] Check UID removal still fails TEST RESULT: PASSED ****************************************** TEST: 403 | DESCRIPTION: Insufficient space check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Overload storage space UID 13 set failed due to insufficient space Remove all registered UIDs [Check 2] Overload storage again to verify all previous UID removed UID 13 set failed due to insufficient space Remove all registered UIDs TEST RESULT: PASSED ****************************************** TEST: 404 | DESCRIPTION: Data Consistency check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2 [Check 2] Call get API with default length - TEST_BUFF_SIZE TEST RESULT: PASSED ****************************************** TEST: 405 | DESCRIPTION: Success scenarios check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Set UID with data length zero and call storage APIs [Check 2] Resetting the length check TEST RESULT: PASSED ****************************************** TEST: 406 | DESCRIPTION: Check for storage create flags | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE [Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY [Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION TEST RESULT: PASSED ****************************************** TEST: 407 | DESCRIPTION: Incorrect Size check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Create a valid Storage - TEST_BUFF_SIZE/2 Increase the length of storage - TEST_BUFF_SIZE [Check 1] Call get API with old length - TEST_BUFF_SIZE/2 [Check 2] Call get API with old length - TEST_BUFF_SIZE/4 Decrease the length of storage - TEST_BUFF_SIZE/4 [Check 3] Call get API with old length - TEST_BUFF_SIZE/2 [Check 4] Call get API with old length - TEST_BUFF_SIZE [Check 5] Call get API with valid length - TEST_BUFF_SIZE/4 TEST RESULT: PASSED ****************************************** TEST: 408 | DESCRIPTION: Invalid offset check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Try to access data with varying valid offset [Check 2] Try to access data with varying invalid offset TEST RESULT: PASSED ****************************************** TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Call set API with NULL pointer and data length 0 [Check 2] Call get API with NULL read buffer and data length 0 [Check 3] Remove the UID [Check 4] Call get_info API to verify UID removed [Check 5] Create UID with zero data_len and valid write buffer [Check 8] Call get API with NULL read buffer and data length 0 [Check 9] Increase the length TEST RESULT: PASSED ****************************************** TEST: 410 | DESCRIPTION: UID value zero check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Creating storage with UID 0 should fail [Check 2] Get_info for UID 0 should fail [Check 3] Removing storage with UID 0 should fail TEST RESULT: PASSED ****************************************** TEST: 411 | DESCRIPTION: Optional APIs: UID not found check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs are not supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 412 | DESCRIPTION: Optional APIs: Invalid arguments and offset invalid | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs are not supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 413 | DESCRIPTION: Set_Extended and Create api : Success | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs are not supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 414 | DESCRIPTION: Optional APIs not supported check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Optional PS APIs are not supported. [Check 1] Call to create API should fail as API not supported Failed at Checkpoint: 1 Actual: 0 Expected: -134 TEST RESULT: FAILED (Error Code=0x1) ****************************************** TEST: 415 | DESCRIPTION: Create API write_once flag value check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs are not supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 416 | DESCRIPTION: Storage assest capacity modification check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs not are supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 417 | DESCRIPTION: Storage assest capacity modification check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs not are supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** ************ Storage Suite Report ********** TOTAL TESTS : 17 TOTAL PASSED : 10 TOTAL SIM ERROR : 0 TOTAL FAILED : 1 TOTAL SKIPPED : 6 ******************************************
# ./psa-crypto-api-test ***** PSA Architecture Test Suite - Version 1.4 ***** Running.. Crypto Suite ****************************************** TEST: 201 | DESCRIPTION: Testing crypto key management APIs | UT: psa_crypto_init [Info] Executing tests from non-secure [Check 1] Test calling crypto functions before psa_crypto_init [Check 2] Test psa_crypto_init [Check 3] Test multiple psa_crypto_init TEST RESULT: PASSED ****************************************** TEST: 202 | DESCRIPTION: Testing crypto key management APIs | UT: psa_import_key [Info] Executing tests from non-secure [Check 1] Test psa_import_key 16 bytes AES [Check 2] Test psa_import_key 24 bytes AES [Check 3] Test psa_import_key 32 bytes AES [Check 4] Test psa_import_key 2048 RSA public key [Check 5] Test psa_import_key with RSA 2048 keypair [Check 6] Test psa_import_key with DES 8 bytes key [Check 7] Test psa_import_key with Triple DES 2-Key [Check 8] Test psa_import_key with Triple DES 3-Key [Check 9] Test psa_import_key with EC Public key [Check 10] Test psa_import_key with EC keypair [Check 11] Test psa_import_key 16 bytes AES with invalid bits [Check 12] Test psa_import_key with key data greater than the algorithm size [Check 13] Test psa_import_key with incorrect key data size [Check 14] Test psa_import_key with invalid key type value TEST RESULT: PASSED ****************************************** TEST: 203 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_key [Info] Executing tests from non-secure [Check 1] Test psa_export_key 16 Byte AES [Check 2] Test psa_export_key 24 Byte AES [Check 3] Test psa_export_key 32 Byte AES [Check 4] Test psa_export_key 2048 RSA public key [Check 5] Test psa_export_key with RSA 2048 keypair [Check 6] Test psa_export_key with DES 64 bit key [Check 7] Test psa_export_key with Triple DES 2-Key [Check 8] Test psa_export_key with Triple DES 3-Key [Check 9] Test psa_export_key with EC Public key [Check 10] Test psa_export_key with EC keypair [Check 11] Test psa_export_key with key policy verify [Check 12] Test psa_export_key with less buffer size TEST RESULT: PASSED ****************************************** TEST: 204 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_public_key [Info] Executing tests from non-secure [Check 1] Test psa_export_public_key 16 Byte AES [Check 2] Test psa_export_public_key 24 Byte AES [Check 3] Test psa_export_public_key 32 Byte AES [Check 4] Test psa_export_public_key 2048 RSA public key [Check 5] Test psa_export_public_key with RSA 2048 keypair [Check 6] Test psa_export_public_key with DES 64 bit key [Check 7] Test psa_export_public_key with Triple DES 2-Key [Check 8] Test psa_export_public_key with Triple DES 3-Key [Check 9] Test psa_export_public_key with EC Public key [Check 10] Test psa_export_public_key with EC keypair [Check 11] Test psa_export_public_key with less buffer size TEST RESULT: PASSED ****************************************** TEST: 205 | DESCRIPTION: Testing crypto key management APIs | UT: psa_destroy_key [Info] Executing tests from non-secure [Check 1] Test psa_destroy_key 16 Byte AES [Check 2] Test psa_destroy_key 24 Byte AES [Check 3] Test psa_destroy_key 32 Byte AES [Check 4] Test psa_destroy_key 2048 RSA public key [Check 5] Test psa_destroy_key with RSA 2048 keypair [Check 6] Test psa_destroy_key with DES 64 bit key [Check 7] Test psa_destroy_key with Triple DES 2-Key [Check 8] Test psa_destroy_key with Triple DES 3-Key [Check 9] Test psa_destroy_key with EC Public key [Check 10] Test psa_destroy_key with EC keypair TEST RESULT: PASSED ****************************************** TEST: 206 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compute [Info] Executing tests from non-secure [Check 1] Test psa_hash_compute with MD5 algorithm [Check 2] Test psa_hash_compute with RIPEMD160 algorithm [Check 3] Test psa_hash_compute with SHA1 algorithm [Check 4] Test psa_hash_compute with SHA224 algorithm [Check 5] Test psa_hash_compute with SHA256 algorithm [Check 6] Test psa_hash_compute with SHA384 algorithm [Check 7] Test psa_hash_compute with SHA512 algorithm [Check 8] Test psa_hash_compute with small buffer size [Check 9] Test psa_hash_compute with invalid algorithm TEST RESULT: PASSED ****************************************** TEST: 207 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compare [Info] Executing tests from non-secure [Check 1] Test psa_hash_compare with MD5 algorithm [Check 2] Test psa_hash_compare with RIPEMD160 algorithm [Check 3] Test psa_hash_compare with SHA1 algorithm [Check 4] Test psa_hash_compare with SHA224 algorithm [Check 5] Test psa_hash_compare with SHA256 algorithm [Check 6] Test psa_hash_compare with SHA384 algorithm [Check 7] Test psa_hash_compare with SHA512 algorithm [Check 8] Test psa_hash_compare with incorrect hash [Check 9] Test psa_hash_compare with incorrect hash length [Check 10] Test psa_hash_compare with invalid algorithm TEST RESULT: PASSED ****************************************** TEST: 208 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_setup [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_setup - ECDH + HKDF-SHA-256 [Check 2] Test psa_key_derivation_setup - ECDH, unknown KDF [Check 3] Test psa_key_derivation_setup - bad key derivation algorithm [Check 4] Test psa_key_derivation_setup - Invalid Algorithm TEST RESULT: PASSED ****************************************** TEST: 209 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_bytes [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_input_bytes - Step as Info [Check 2] Test psa_key_derivation_input_bytes - Step as secret [Check 3] Test psa_key_derivation_input_bytes - Step as salt [Check 4] Test psa_key_derivation_input_bytes - Step as label [Check 5] Test psa_key_derivation_input_bytes - Step as seed [Check 6] Test psa_key_derivation_input_bytes - Invalid step TEST RESULT: PASSED ****************************************** TEST: 210 | DESCRIPTION: Testing crypto key attributes APIs | UT: psa_key_attributes_set_get [Info] Executing tests from non-secure [Check 1] Test psa_key_attributes_set_get key attributes TEST RESULT: PASSED ****************************************** TEST: 211 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_setup [Info] Executing tests from non-secure [Check 1] Test psa_hash_setup with MD5 algorithm [Check 2] Test psa_hash_setup with RIPEMD160 algorithm [Check 3] Test psa_hash_setup with SHA1 algorithm [Check 4] Test psa_hash_setup with SHA224 algorithm [Check 5] Test psa_hash_setup with SHA256 algorithm [Check 6] Test psa_hash_setup with SHA384 algorithm [Check 7] Test psa_hash_setup with SHA512 algorithm [Check 8] Test psa_hash_setup with Invalid hash algorithm [Check 9] Test psa_hash_setup with Invalid algorithm [Check 10] Test psa_hash_setup with CTR algorithm TEST RESULT: PASSED ****************************************** TEST: 212 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_update [Info] Executing tests from non-secure [Check 1] Test psa_hash_update with MD5 algorithm [Check 2] Test psa_hash_update with RIPEMD160 algorithm [Check 3] Test psa_hash_update with SHA1 algorithm [Check 4] Test psa_hash_update with SHA224 algorithm [Check 5] Test psa_hash_update with SHA256 algorithm [Check 6] Test psa_hash_update with SHA384 algorithm [Check 7] Test psa_hash_update with SHA512 algorithm [Check 8] Test psa_hash_update without hash setup [Check 9] Test psa_hash_update with completed opertaion handle TEST RESULT: PASSED ****************************************** TEST: 213 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_verify [Info] Executing tests from non-secure [Check 1] Test psa_hash_verify with MD5 algorithm [Check 2] Test psa_hash_verify with RIPEMD160 algorithm [Check 3] Test psa_hash_verify with SHA1 algorithm [Check 4] Test psa_hash_verify with SHA224 algorithm [Check 5] Test psa_hash_verify with SHA256 algorithm [Check 6] Test psa_hash_verify with SHA384 algorithm [Check 7] Test psa_hash_verify with SHA512 algorithm [Check 8] Test psa_hash_verify with incorrect expected hash [Check 9] Test psa_hash_verify with incorrect hash length [Check 10] test psa_hash_verify with inactive & invalid operation handle TEST RESULT: PASSED ****************************************** TEST: 214 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_finish [Info] Executing tests from non-secure [Check 1] Test psa_hash_finish with MD5 algorithm [Check 2] Test psa_hash_finish with RIPEMD160 algorithm [Check 3] Test psa_hash_finish with SHA1 algorithm [Check 4] Test psa_hash_finish with SHA224 algorithm [Check 5] Test psa_hash_finish with SHA256 algorithm [Check 6] Test psa_hash_finish with SHA384 algorithm [Check 7] Test psa_hash_finish with SHA512 algorithm [Check 8] Test psa_hash_finish with invalid hash buffer size [Check 9] test psa_hash_finish with inactive operation handle TEST RESULT: PASSED ****************************************** TEST: 215 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_abort [Info] Executing tests from non-secure [Check 1] Test psa_hash_abort with MD5 algorithm [Check 2] Test psa_hash_abort with RIPEMD160 algorithm [Check 3] Test psa_hash_abort with SHA1 algorithm [Check 4] Test psa_hash_abort with SHA224 algorithm [Check 5] Test psa_hash_abort with SHA256 algorithm [Check 6] Test psa_hash_abort with SHA384 algorithm [Check 7] Test psa_hash_abort with SHA512 algorithm [Check 8] Test psa_hash_finish after calling psa_hash_abort TEST RESULT: PASSED ****************************************** TEST: 216 | DESCRIPTION: Testing crypto generator functions APIs | UT: psa_generate_key [Info] Executing tests from non-secure [Check 1] Test psa_generate_key 16 Byte AES [Check 2] Test psa_generate_key 24 Byte AES [Check 3] Test psa_generate_key 32 Byte AES [Check 4] Test psa_generate_key with DES 64 bit key [Check 5] Test psa_generate_key with Triple DES 2-Key [Check 6] Test psa_generate_key with Triple DES 3-Key [Check 7] Test psa_generate_key with RSA 2048 Keypair [Check 8] Test psa_generate_key with ECC KeyPair [Check 9] Test psa_generate_key with RSA 2048 Public key [Check 10] Test psa_generate_key with invalid key type [Check 11] Test psa_generate_key with invalid usage flags TEST RESULT: PASSED ****************************************** TEST: 217 | DESCRIPTION: Testing crypto generation APIs | UT: psa_generate_random [Info] Executing tests from non-secure [Check 1] Test psa_generate_random to get 0 Byte data [Check 2] Test psa_generate_random to get 16 Byte data [Check 3] Test psa_generate_random to get 24 Byte data [Check 4] Test psa_generate_random to get 32 Byte data [Check 5] Test psa_generate_random to get 64 Byte data [Check 6] Test psa_generate_random to get 128 Byte data [Check 7] Test psa_generate_random to get 256 Byte data [Check 8] Test psa_generate_random to get 512 Byte data [Check 9] Test psa_generate_random to get 1000 Byte data TEST RESULT: PASSED ****************************************** TEST: 218 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_key [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_input_key 16 Byte Key [Check 2] Test psa_key_derivation_input_key with invalid usage [Check 3] Test psa_key_derivation_input_key with step as label [Check 4] Test psa_key_derivation_input_key with step as info [Check 5] Test psa_key_derivation_input_key with step as seed [Check 6] Test psa_key_derivation_input_key with step as salt [Check 7] Test psa_key_derivation_input_key with key type as AES(not derive) [Check 8] Test psa_key_derivation_input_key incorrect key algorithm [Check 9] Test psa_key_derivation_input_key with key type as 2048 RSA public key [Check 10] Test psa_key_derivation_input_key with key type as RSA 2048 keypair [Check 11] Test psa_key_derivation_input_key with zero as step [Check 12] Test psa_cipher_decrypt_setup - Invalid key handle [Check 13] Test psa_cipher_decrypt_setup - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 219 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_key_agreement [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_key_agreement - ECDH SECP256R1 [Check 2] Test psa_key_derivation_key_agreement - Invalid step [Check 3] Test psa_key_derivation_key_agreement - ECDH SECP384R1 [Check 4] Test psa_key_derivation_key_agreement - Invalid usage [Check 5] Test psa_key_derivation_key_agreement - KDF not a key agreement alg [Check 6] Test psa_key_derivation_key_agreement - Public key of different curve [Check 7] Test psa_key_derivation_key_agreement - Pub key instead of Prv key [Check 8] Test psa_key_derivation_key_agreement - Invalid handle [Check 9] Test psa_key_derivation_key_agreement - Zero as handle TEST RESULT: PASSED ****************************************** TEST: 220 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_bytes [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_output_bytes - HKDF [Check 2] Test psa_key_derivation_output_bytes - optional salt [Check 3] Test psa_key_derivation_output_bytes - capacity < output_length [Check 4] Test psa_key_derivation_output_bytes - missing info [Check 5] Test psa_key_derivation_output_bytes - missing salt/secret/info [Check 6] Test psa_key_derivation_output_bytes - TLS12_PRF [Check 7] Test psa_key_derivation_output_bytes - capacity < output_length [Check 8] Test psa_key_derivation_output_bytes - missing seed/secret/label TEST RESULT: PASSED ****************************************** TEST: 221 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_key [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_output_key - Key [Check 2] Test psa_key_derivation_output_key - Info [Check 3] Test psa_key_derivation_output_key - Salt [Check 4] Test psa_key_derivation_output_key - Greater Capacity than available [Check 5] Test psa_key_derivation_output_key - ECC Public key [Check 6] Test psa_key_derivation_output_key - ECC keypair [Check 7] Test psa_key_derivation_output_key - RSA Public Key[Check 8] Test psa_key_derivation_output_key - RSA keypair [Check 9] Test psa_key_derivation_output_key - Invalid key size TEST RESULT: PASSED ****************************************** TEST: 222 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_abort [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_abort TEST RESULT: PASSED ****************************************** TEST: 223 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_set_get_capacity [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_set_get_capacity - < operation's capacity [Check 2] Test psa_key_derivation_set_get_capacity - = operation's capacity [Check 3] Test psa_key_derivation_set_get_capacity - > operation's capacity [Check 4] Test psa_key_derivation_set_get_capacity - unchanged capacity TEST RESULT: PASSED ****************************************** TEST: 224 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt [Info] Executing tests from non-secure [Check 1] Test psa_aead_encrypt - CCM - AES - 13B nonce & 8B add data [Check 2] Test psa_aead_encrypt - CCM - AES - 13B nonce & 32B add data [Check 3] Test psa_aead_encrypt - CCM - AES - 24 bytes Tag length = 4 [Check 4] Test psa_aead_encrypt - CCM - AES - Zero additional data [Check 5] Test psa_aead_encrypt - CCM - AES - Zero plaintext [Check 6] Test psa_aead_encrypt - GCM - AES - 12B nonce & 12B add data [Check 7] Test psa_aead_encrypt - Unsupported algorithm [Check 8] Test psa_aead_encrypt - Invalid usage flag [Check 9] Test psa_aead_encrypt - Invalid ciphertext_size [Check 10] Test psa_aead_encrypt - Invalid nonce [Check 11] Test psa_aead_encrypt - Invalid tag length 0 TEST RESULT: PASSED ****************************************** TEST: 225 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt [Info] Executing tests from non-secure [Check 1] Test psa_aead_decrypt - CCM - AES - 13B nonce & 8B add data [Check 2] Test psa_aead_decrypt - CCM - AES - 13B nonce & 32B add data [Check 3] Test psa_aead_decrypt - CCM - AES - 24 bytes Tag length = 4 [Check 4] Test psa_aead_decrypt - CCM - AES - Zero additional data [Check 5] Test psa_aead_decrypt - CCM - AES - Zero plaintext [Check 6] Test psa_aead_decrypt - GCM - AES - 12B nonce & 12B add data [Check 7] Test psa_aead_decrypt - Unsupported algorithm [Check 8] Test psa_aead_decrypt - Invalid usage flag [Check 9] Test psa_aead_decrypt - Invalid plaintext_size [Check 10] Test psa_aead_decrypt - Invalid nonce [Check 11] Test psa_aead_decrypt - Invalid cihpertext [Check 12] Test psa_aead_decrypt - Invalid cihpertext_size [Check 13] Test psa_aead_decrypt - Invalid tag length 0 TEST RESULT: PASSED ****************************************** TEST: 226 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_setup [Info] Executing tests from non-secure [Check 1] Test psa_mac_sign_setup - HMAC - SHA256 [Check 2] Test psa_mac_sign_setup - CMAC - AES [Check 3] Test psa_mac_sign_setup - Incompatible HMAC for CMAC [Check 4] Test psa_mac_sign_setup - Invalid usage flag [Check 5] Test psa_mac_sign_setup - Invalid key type [Check 6] Test psa_mac_sign_setup - Truncated MAC too large [Check 7] Test psa_mac_sign_setup - Truncated MAC too small [Check 8] Test psa_mac_sign_setup - Unknown MAC algorithm [Check 9] Test psa_mac_sign_setup - Bad algorithm (not a MAC algorithm) [Check 10] Test psa_mac_sign_setup invalid key handle [Check 11] Test psa_mac_sign_setup zero as key handle TEST RESULT: PASSED ****************************************** TEST: 227 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_update [Info] Executing tests from non-secure [Check 1] Test psa_mac_update - HMAC - SHA256 - 64 Byte [Check 2] Test psa_mac_update - CMAC - AES - 16 Byte [Check 3] Test psa_mac_update - HMAC - SHA512 - 32 Byte [Check 4] Test psa_mac_update - HMAC - SHA512 - Invalid operation state TEST RESULT: PASSED ****************************************** TEST: 228 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_finish [Info] Executing tests from non-secure [Check 1] Test psa_mac_sign_finish - HMAC - SHA224 [Check 2] Test psa_mac_sign_finish - HMAC - SHA256 [Check 3] Test psa_mac_sign_finish - HMAC - SHA512 [Check 4] Test psa_mac_sign_finish - HMAC - SHA224 - Truncated 8 Byte [Check 5] Test psa_mac_sign_finish - HMAC - SHA224 - Small output buffer [Check 6] Test psa_mac_sign_finish - HMAC - SHA224 - Invalid operation state [Check 7] Test psa_mac_sign_finish - CMAC - AES TEST RESULT: PASSED ****************************************** TEST: 229 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_setup [Info] Executing tests from non-secure [Check 1] Test psa_mac_verify_setup - HMAC - SHA256 [Check 2] Test psa_mac_verify_setup - CMAC - AES [Check 3] Test psa_mac_verify_setup - Incompatible HMAC for CMAC [Check 4] Test psa_mac_verify_setup - Invalid usage flag [Check 5] Test psa_mac_verify_setup - Invalid key type [Check 6] Test psa_mac_verify_setup - Truncated MAC too large [Check 7] Test psa_mac_verify_setup - Truncated MAC too small [Check 8] Test psa_mac_verify_setup - Unknown MAC algorithm [Check 9] Test psa_mac_verify_setup - Bad algorithm (not a MAC algorithm) [Check 10] Test psa_mac_verify_setup invalid key handle [Check 11] Test psa_mac_verify_setup zero as key handle TEST RESULT: PASSED ****************************************** TEST: 230 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_finish [Info] Executing tests from non-secure [Check 1] Test psa_mac_verify_finish - HMAC - SHA224 [Check 2] Test psa_mac_verify_finish - HMAC - SHA256 [Check 3] Test psa_mac_verify_finish - HMAC - SHA512 [Check 4] Test psa_mac_verify_finish - HMAC - SHA224 - Truncated 8 Byte [Check 5] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid mac length [Check 6] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid expected mac [Check 7] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid operation state [Check 8] Test psa_mac_verify_finish - CMAC - AES TEST RESULT: PASSED ****************************************** TEST: 231 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_abort [Info] Executing tests from non-secure [Check 1] Test psa_mac_abort - HMAC - SHA224 [Check 2] Test psa_mac_abort - HMAC - SHA224 - Truncated 8 Byte [Check 3] Test psa_mac_abort - HMAC - SHA256 [Check 4] Test psa_mac_abort - HMAC - SHA512 [Check 5] Test psa_mac_abort - CMAC - AES [Check 6] Test psa_mac_sign_finish after calling psa_mac_abort TEST RESULT: PASSED ****************************************** TEST: 232 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt_setup [Info] Executing tests from non-secure [Check 1] Test psa_cipher_encrypt_setup 16 Byte AES [Check 2] Test psa_cipher_encrypt_setup 24 Byte AES [Check 3] Test psa_cipher_encrypt_setup 32 Byte AES [Check 4] Test psa_cipher_encrypt_setup DES 64 bit key [Check 5] Test psa_cipher_encrypt_setup Triple DES 2-Key [Check 6] Test psa_cipher_encrypt_setup Triple DES 3-Key [Check 7] Test psa_cipher_encrypt_setup 16 Byte raw data [Check 8] Test psa_cipher_encrypt_setup - not a cipher algorithm [Check 9] Test psa_cipher_encrypt_setup - unknown cipher algorithm [Check 10] Test psa_cipher_encrypt_setup - incompatible key ARC4 [Check 11] Test psa_cipher_encrypt_setup - incorrect usage [Check 12] Test psa_cipher_encrypt_setup - RSA public key [Check 13] Test psa_cipher_encrypt_setup - RSA keypair [Check 14] Test psa_cipher_encrypt_setup - EC Public key [Check 15] Test psa_cipher_encrypt_setup - EC keypair [Check 16] Test psa_cipher_encrypt_setup - Invalid key handle [Check 17] Test psa_cipher_encrypt_setup - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 233 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt_setup [Info] Executing tests from non-secure [Check 1] Test psa_cipher_decrypt_setup 16 Byte AES [Check 2] Test psa_cipher_decrypt_setup 24 Byte AES [Check 3] Test psa_cipher_decrypt_setup 32 Byte AES [Check 4] Test psa_cipher_decrypt_setup DES 64 bit key [Check 5] Test psa_cipher_decrypt_setup Triple DES 2-Key [Check 6] Test psa_cipher_decrypt_setup Triple DES 3-Key [Check 7] Test psa_cipher_decrypt_setup 16 Byte raw data [Check 8] Test psa_cipher_decrypt_setup - not a cipher algorithm [Check 9] Test psa_cipher_decrypt_setup - unknown cipher algorithm [Check 10] Test psa_cipher_decrypt_setup - incompatible key ARC4 [Check 11] Test psa_cipher_decrypt_setup - incorrect usage [Check 12] Test psa_cipher_decrypt_setup - RSA public key [Check 13] Test psa_cipher_decrypt_setup - RSA keypair [Check 14] Test psa_cipher_decrypt_setup - EC Public key [Check 15] Test psa_cipher_decrypt_setup - EC keypair [Check 16] Test psa_cipher_decrypt_setup - Invalid key handle [Check 17] Test psa_cipher_decrypt_setup - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 234 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_generate_iv [Info] Executing tests from non-secure [Check 1] Test psa_cipher_generate_iv 16 Byte AES [Check 2] Test psa_cipher_generate_iv 24 Byte AES [Check 3] Test psa_cipher_generate_iv 32 Byte AES [Check 4] Test psa_cipher_generate_iv DES 64 bit key [Check 5] Test psa_cipher_generate_iv DES 2-Key [Check 6] Test psa_cipher_generate_iv DES 3-Key [Check 7] Test psa_cipher_generate_iv AES - small iv buffer [Check 8] Test psa_cipher_generate_iv DES - small iv buffer TEST RESULT: PASSED ****************************************** TEST: 235 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_set_iv [Info] Executing tests from non-secure [Check 1] Test psa_cipher_set_iv 16 Byte AES [Check 2] Test psa_cipher_set_iv 24 Byte AES [Check 3] Test psa_cipher_set_iv 32 Byte AES [Check 4] Test psa_cipher_set_iv DES 64 bit key [Check 5] Test psa_cipher_set_iv DES 2-Key [Check 6] Test psa_cipher_set_iv DES 3-Key [Check 7] Test psa_cipher_set_iv AES - small iv buffer [Check 8] Test psa_cipher_set_iv DES - small iv buffer [Check 9] Test psa_cipher_set_iv AES - large iv buffer [Check 10] Test psa_cipher_set_iv DES - large iv buffer TEST RESULT: PASSED ****************************************** TEST: 236 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_update [Info] Executing tests from non-secure [Check 1] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING (Short in) [Check 3] Test psa_cipher_update - Encrypt - AES CBC_PKCS7 [Check 4] Test psa_cipher_update - Encrypt - AES CBC_PKCS7 (Short input) [Check 5] Test psa_cipher_update - Encrypt - AES CTR [Check 6] Test psa_cipher_update - Encrypt - DES CBC (nopad) [Check 7] Test psa_cipher_update - Encrypt - 2-key 3DE -CBC (nopad) [Check 8] Test psa_cipher_update - Encrypt - 3-key 3DE -CBC (nopad) [Check 9] Test psa_cipher_update - Encrypt - small output buffer size [Check 10] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING [Check 11] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING (Short in) [Check 12] Test psa_cipher_update - Decrypt - AES CBC_PKCS7 [Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7 (Short input) [Check 14] Test psa_cipher_update - Decrypt - AES CTR [Check 15] Test psa_cipher_update - Decrypt - DES CBC (nopad) [Check 16] Test psa_cipher_update - Decrypt - 2-key 3DE -CBC (nopad) [Check 17] Test psa_cipher_update - Decrypt - 3-key 3DE -CBC (nopad) [Check 18] Test psa_cipher_update - Decrypt - small output buffer size [Check 19] Test psa_cipher_update without cipher setup TEST RESULT: PASSED ****************************************** TEST: 237 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_finish [Info] Executing tests from non-secure [Check 1] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING (Short in) [Check 3] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7 [Check 4] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7 (Short input) [Check 5] Test psa_cipher_finish - Encrypt - AES CTR [Check 6] Test psa_cipher_finish - Encrypt - AES CTR (short input) [Check 7] Test psa_cipher_finish - Encrypt - DES CBC (nopad) Failed at Checkpoint: 11 Actual: 8 Expected: 16 TEST RESULT: FAILED (Error Code=0x1) ****************************************** TEST: 238 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_abort [Info] Executing tests from non-secure [Check 1] Test psa_cipher_abort - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_abort - Encrypt - AES CBC_PKCS7 [Check 3] Test psa_cipher_abort - Encrypt - AES CTR [Check 4] Test psa_cipher_abort - Encrypt - DES CBC (nopad) [Check 5] Test psa_cipher_abort - Encrypt - 2-key 3DE -CBC (nopad) [Check 6] Test psa_cipher_abort - Encrypt - 3-key 3DE -CBC (nopad) [Check 7] Test psa_cipher_abort - Decrypt - AES CBC_NO_PADDING [Check 8] Test psa_cipher_abort - Decrypt - AES CBC_PKCS7 [Check 9] Test psa_cipher_abort - Decrypt - AES CTR [Check 10] Test psa_cipher_abort - Decrypt - DES CBC (nopad) [Check 11] Test psa_cipher_abort - Decrypt - 2-key 3DE -CBC (nopad) [Check 12] Test psa_cipher_abort - Decrypt - 3-key 3DE -CBC (nopad) [Check 13] Test psa_cipher_update after psa_cipher_abort should fail TEST RESULT: PASSED ****************************************** TEST: 239 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_encrypt [Info] Executing tests from non-secure [Check 1] Test psa_asymmetric_encrypt - RSA PKCS1V15 [Check 2] Test psa_asymmetric_encrypt - RSA KEY_PAIR PKCS1V15 [Check 3] Test psa_asymmetric_encrypt - RSA OAEP SHA256 [Check 4] Test psa_asymmetric_encrypt - RSA OAEP SHA256 with label [Check 5] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256 [Check 6] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256 with label [Check 7] Test psa_asymmetric_encrypt - Small output buffer [Check 8] Test psa_asymmetric_encrypt - Invalid algorithm [Check 9] Test psa_asymmetric_encrypt - Invalid key type [Check 10] Test psa_asymmetric_encrypt - Invalid usage [Check 11] Test psa_asymmetric_encrypt - RSA PKCS1V15 - Salt [Check 12] Test psa_asymmetric_encrypt - ECC public key [Check 13] Test psa_asymmetric_encrypt - Invalid key handle [Check 14] Test psa_asymmetric_encrypt - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 240 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_decrypt [Info] Executing tests from non-secure [Check 1] Test psa_asymmetric_decrypt - RSA KEY_PAIR PKCS1V15 [Check 2] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256 [Check 3] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256 with label [Check 4] Test psa_asymmetric_decrypt - Invalid key type (RSA public key) [Check 5] Test psa_asymmetric_decrypt - Small output buffer [Check 6] Test psa_asymmetric_decrypt - Invalid algorithm [Check 7] Test psa_asymmetric_decrypt - Invalid key type (AES Key) [Check 8] Test psa_asymmetric_decrypt - Invalid usage [Check 9] Test psa_asymmetric_decrypt - RSA PKCS1V15 - Salt [Check 10] Test psa_asymmetric_decrypt - Invalid key handle [Check 11] Test psa_asymmetric_decrypt - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 241 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_sign_hash [Info] Executing tests from non-secure [Check 1] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 RAW [Check 2] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 SHA-256 [Check 3] Test psa_sign_hash - ECDSA SECP256R1 SHA-256 [Check 4] Test psa_sign_hash - Invalid key type (RSA public key) [Check 5] Test psa_sign_hash - Small output buffer [Check 6] Test psa_sign_hash - Invalid algorithm [Check 7] Test psa_sign_hash - Invalid key type (AES Key) [Check 8] Test psa_sign_hash - Invalid usage [Check 9] Test psa_sign_hash - Wrong hash size [Check 10] Test psa_sign_hash - Invalid key handle [Check 11] Test psa_sign_hash - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 242 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_verify_hash [Info] Executing tests from non-secure [Check 1] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 RAW [Check 2] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 SHA-256 [Check 3] Test psa_verify_hash - ECDSA KEY_PAIR SECP256R1 SHA-256 [Check 4] Test psa_verify_hash - EC public key [Check 5] Test psa_verify_hash - RSA public key [Check 6] Test psa_verify_hash - Small output buffer [Check 7] Test psa_verify_hash - Invalid algorithm [Check 8] Test psa_verify_hash - Invalid key type (AES Key) [Check 9] Test psa_verify_hash - Invalid usage [Check 10] Test psa_verify_hash - Wrong hash size [Check 11] Test psa_verify_hash - Wrong signature [Check 12] Test psa_verify_hash - Wrong signature size [Check 13] Test psa_verify_hash - Invalid key handle [Check 14] Test psa_verify_hash - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 243 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_raw_key_agreement [Info] Executing tests from non-secure [Check 1] Test psa_raw_key_agreement - ECDH SECP256R1 [Check 2] Test psa_raw_key_agreement - Small buffer size [Check 3] Test psa_raw_key_agreement - ECDH SECP384R1 [Check 4] Test psa_raw_key_agreement - Invalid usage [Check 5] Test psa_raw_key_agreement - Unknown KDF [Check 6] Test psa_raw_key_agreement - Not a key agreement alg [Check 7] Test psa_raw_key_agreement - Public key on different curve [Check 8] Test psa_raw_key_agreement - Public key instead of private key [Check 9] Test psa_raw_key_agreement - Invalid key handle [Check 10] Test psa_raw_key_agreement - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 244 | DESCRIPTION: Testing crypto key management APIs | UT: psa_copy_key [Info] Executing tests from non-secure [Check 1] Test psa_copy_key - 2048 RSA public key [Check 2] Test psa_copy_key - RSA 2048 keypair [Check 3] Test psa_copy_key - Incompatible target policy(source and target) [Check 4] Test psa_copy_key - source key with no export usage [Check 5] Test psa_copy_key - DES 64 bit key [Check 6] Test psa_copy_key - Triple DES 2-Key [Check 7] Test psa_copy_key - Triple DES 3-Key [Check 8] Test psa_copy_key - EC Public key [Check 9] Test psa_copy_key - EC keypair TEST RESULT: PASSED ****************************************** TEST: 245 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_clone [Info] Executing tests from non-secure [Check 1] Test psa_hash_clone - MD5 algorithm [Check 2] Test psa_hash_clone - RIPEMD160 algorithm [Check 3] Test psa_hash_clone - SHA1 algorithm [Check 4] Test psa_hash_clone - SHA224 algorithm [Check 5] Test psa_hash_clone - SHA256 algorithm [Check 6] Test psa_hash_clone - SHA384 algorithm [Check 7] Test psa_hash_clone - SHA512 algorithm [Check 8] Test psa_hash_clone - from an inactive source operation [Check 9] Test psa_hash_clone - on an active target operation TEST RESULT: PASSED ****************************************** TEST: 246 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_compute [Info] Executing tests from non-secure [Check 1] Test psa_mac_compute HMAC SHA 224 [Check 2] Test psa_mac_compute - Incompactible HMAC for CMAC [Check 3] Test psa_mac_compute - Invalid usage [Check 4] Test psa_mac_compute - truncated MAC too small [Check 5] Test psa_mac_compute - truncated MAC too large [Check 6] Test psa_mac_compute - bad algorithm (unknown MAC algorithm) [Check 7] Test psa_mac_compute HMAC SHA 256 [Check 8] Test psa_mac_compute HMAC SHA 512 [Check 9] Test psa_mac_compute HMAC SHA 224 (truncated to 8 Byte) [Check 10] Test psa_mac_compute CMAC AES 128 [Check 11] Test psa_mac_compute small size buffer [Check 12] Test psa_mac_compute - Invalid key type TEST RESULT: PASSED ****************************************** TEST: 247 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify [Info] Executing tests from non-secure [Check 1] Test psa_mac_verify HMAC SHA 224 [Check 2] Test psa_mac_verify HMAC SHA 256 [Check 3] Test psa_mac_verify - Incompactible HMAC for CMAC [Check 4] Test psa_mac_verify - Invalid usage [Check 5] Test psa_mac_verify - Truncated MAC too large [Check 6] Test psa_mac_verify - Truncated MAC too small [Check 7] Test psa_mac_verify - bad algorithm (unknown MAC algorithm) [Check 8] Test psa_mac_verify HMAC SHA 512 [Check 9] Test psa_mac_verify HMAC SHA 224 (truncated to 8 Byte) [Check 10] Test psa_mac_verify CMAC AES 128 [Check 11] Test psa_mac_verify - Invalid key type [Check 12] Test psa_mac_verify small size buffer [Check 13] Test psa_mac_verify incorrect expected MAC TEST RESULT: PASSED ****************************************** TEST: 248 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt [Info] Executing tests from non-secure [Check 1] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING (Short input) [Check 3] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7 [Check 4] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7 (Short input) [Check 5] Test psa_cipher_encrypt - Encrypt - AES CTR [Check 6] Test psa_cipher_encrypt - Encrypt - AES CTR (short input) [Check 7] Test psa_cipher_encrypt - Encrypt - DES CBC (nopad) [Check 8] Test psa_cipher_encrypt - Encrypt - 2-key 3DE -CBC (nopad) [Check 9] Test psa_cipher_encrypt - Encrypt - 3-key 3DE -CBC (nopad) [Check 10] Test psa_cipher_encrypt - small output buffer size [Check 11] Test psa_cipher_encrypt - Decrypt - AES CBC_NO_PADDING TEST RESULT: PASSED ****************************************** TEST: 249 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt [Info] Executing tests from non-secure [Check 1] Test psa_cipher_decrypt - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING [Check 3] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING (Short input) [Check 4] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING [Check 5] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7 [Check 6] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7 (Short input) [Check 7] Test psa_cipher_decrypt - Decrypt - AES CTR [Check 8] Test psa_cipher_decrypt - Decrypt - DES CBC (nopad) [Check 9] Test psa_cipher_decrypt - Decrypt - 2-key 3DE -CBC (nopad) [Check 10] Test psa_cipher_decrypt - 3-key 3DE -CBC (nopad) TEST RESULT: PASSED ****************************************** TEST: 250 | DESCRIPTION: Testing crypto key management APIs | UT: psa_sign_message [Info] Executing tests from non-secure [Check 1] Test psa_sign_message - RSA KEY_PAIR PKCS1V15 RAW [Check 2] Test psa_sign_message - ECDSA SECP256R1 SHA-256 [Check 3] Test psa_sign_message - Invalid key type (RSA public key) [Check 4] Test psa_sign_message - Small output buffer [Check 5] Test psa_sign_message - Invalid algorithm [Check 6] Test psa_sign_message - Invalid key type (AES Key) [Check 7] Test psa_sign_message - Invalid usage [Check 8] Test psa_sign_message - Mismatch key type and Algorithm [Check 9] Test psa_sign_message - Alg mismatch in key and API call [Check 10] Test psa_sign_message - Invalid key handle [Check 11] Test psa_sign_message - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 251 | DESCRIPTION: Testing crypto key management APIs | UT: psa_verify_message [Info] Executing tests from non-secure [Check 1] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 RAW [Check 2] Test psa_verify_message - RSA Public Key PKCS1V15 RAW [Check 3] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 SHA-256 [Check 4] Test psa_verify_message - ECDSA KEY_PAIR SECP256R1 SHA-256 [Check 5] Test psa_verify_message - ECDSA Public Key SECP256R1 SHA-256 [Check 6] Test psa_verify_message - Small output buffer [Check 7] Test psa_verify_message - Invalid algorithm [Check 8] Test psa_verify_message - Invalid key type (AES Key) [Check 9] Test psa_verify_message - Invalid usage [Check 10] Test psa_verify_message - Wrong message size [Check 11] Test psa_verify_message - Wrong signature [Check 12] Test psa_verify_message - Wrong signature size [Check 13] Test psa_verify_message - Invalid key handle [Check 14] Test psa_verify_message - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 252 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt_setup [Info] Executing tests from non-secure [Check 1] Test psa_aead_encrypt_setup - CCM - AES [Check 2] Test psa_aead_encrypt_setup - CCM - AES - Tag length = 4 [Check 3] Test psa_aead_encrypt_setup - CCM - AES - Mismatched tag length [Check 4] Test psa_aead_encrypt_setup - CCM - AES - Default Tag length [Check 5] Test psa_aead_encrypt_setup - GCM - AES [Check 6] Test psa_aead_encrypt_setup - CCM - DES Invalid key [Check 7] Test psa_aead_encrypt_setup - Invalid usage flag TEST RESULT: PASSED ****************************************** TEST: 253 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt_setup [Info] Executing tests from non-secure [Check 1] Test psa_aead_decrypt_setup - CCM - AES [Check 2] Test psa_aead_decrypt_setup - CCM - AES - Tag length = 4 [Check 3] Test psa_aead_decrypt_setup - CCM - AES - Mismatched tag length [Check 4] Test psa_aead_decrypt_setup - CCM - AES - Default Tag length [Check 5] Test psa_aead_decrypt_setup - GCM - AES [Check 6] Test psa_aead_decrypt_setup - CCM - DES Invalid key [Check 7] Test psa_aead_decrypt_setup - Invalid usage flag TEST RESULT: PASSED ****************************************** TEST: 254 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_generate_nonce [Info] Executing tests from non-secure [Check 1] Test psa_aead_generate_nonce - CCM [Check 2] Test psa_aead_generate_nonce - CCM - Tag length = 4 [Check 3] Test psa_aead_generate_nonce - CCM - Small buffer size [Check 4] Test psa_aead_generate_nonce - CCM - Uninitialized operation [Check 5] Test psa_aead_generate_nonce - CCM - Decrypt operation [Check 6] Test psa_aead_generate_nonce - GCM [Check 7] Test psa_aead_generate_nonce - GCM - Decrypt operation TEST RESULT: PASSED ****************************************** TEST: 255 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_nonce [Info] Executing tests from non-secure [Check 1] Test psa_aead_set_nonce - Encrypt - CCM [Check 2] Test psa_aead_set_nonce - Encrypt - CCM - Tag length = 4 [Check 3] Test psa_aead_set_nonce - Encrypt - CCM - Small nonce size [Check 4] Test psa_aead_set_nonce - Encrypt - CCM - Large nonce size [Check 5] Test psa_aead_set_nonce - Encrypt - CCM - Invalid operation state [Check 6] Test psa_aead_set_nonce - Encrypt - GCM [Check 7] Test psa_aead_set_nonce - Decrypt - CCM [Check 8] Test psa_aead_set_nonce - Decrypt - CCM - Tag length = 4 [Check 9] Test psa_aead_set_nonce - Decrypt - CCM - Small nonce size [Check 10] Test psa_aead_set_nonce - Decrypt - CCM - Large nonce size [Check 11] Test psa_aead_set_nonce - Decrypt - CCM - Invalid operation state [Check 12] Test psa_aead_set_nonce - Decrypt - GCM TEST RESULT: PASSED ****************************************** TEST: 256 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_lengths [Info] Executing tests from non-secure [Check 1] Test psa_aead_set_lengths - Encrypt - CCM [Check 2] Test psa_aead_set_lengths - Encrypt - CCM - Tag length = 4 [Check 3] Test psa_aead_set_lengths - Encrypt - CCM - Zero ad_length [Check 4] Test psa_aead_set_lengths - Encrypt - CCM - Zero plaintext_length [Check 5] Test psa_aead_set_lengths - Encrypt - CCM - Invalid operation state [Check 6] Test psa_aead_set_lengths - Encrypt - GCM [Check 7] Test psa_aead_set_lengths - Decrypt - CCM [Check 8] Test psa_aead_set_lengths - Decrypt - CCM - Tag length = 4 [Check 9] Test psa_aead_set_lengths - Decrypt - CCM - Zero ad_length [Check 10] Test psa_aead_set_lengths - Decrypt - CCM - Zero plaintext_length [Check 11] Test psa_aead_set_lengths - Decrypt - CCM - Invalid operation state [Check 12] Test psa_aead_set_lengths - Decrypt - GCM TEST RESULT: PASSED ****************************************** TEST: 257 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update_ad [Info] Executing tests from non-secure [Check 1] Test psa_aead_update_ad - Encrypt - CCM [Check 2] Test psa_aead_update_ad - Encrypt - CCM - Tag length = 4 [Check 3] Test psa_aead_update_ad - Encrypt - CCM - Zero ad_length [Check 4] Test psa_aead_update_ad - Encrypt - CCM - Zero plaintext_length [Check 5] Test psa_aead_update_ad - Encrypt - CCM - Invalid operation state [Check 6] Test psa_aead_update_ad - Encrypt - CCM - Overflow input length [Check 7] Test psa_aead_update_ad - Decrypt - CCM [Check 8] Test psa_aead_update_ad - Decrypt - CCM - Tag length = 4 [Check 9] Test psa_aead_update_ad - Decrypt - CCM - Zero ad_length [Check 10] Test psa_aead_update_ad - Decrypt - CCM - Zero plaintext_length [Check 11] Test psa_aead_update_ad - Decrypt - CCM - Invalid operation state [Check 12] Test psa_aead_update_ad - Decrypt - CCM - Overflow input length TEST RESULT: PASSED ****************************************** TEST: 258 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update [Info] Executing tests from non-secure [Check 1] Test psa_aead_update - Encrypt - CCM [Check 2] Test psa_aead_update - Encrypt - CCM - Tag length = 4 [Check 3] Test psa_aead_update - Encrypt - CCM - Zero ad_length [Check 4] Test psa_aead_update - Encrypt - CCM - Zero plaintext_length [Check 5] Test psa_aead_update - Encrypt - CCM - Small buffer size [Check 6] Test psa_aead_update - Encrypt - CCM - Less add data than specified [Check 7] Test psa_aead_update - Encrypt - CCM - Overflow input length [Check 8] Test psa_aead_update - Encrypt - CCM - Invalid operation state [Check 9] Test psa_aead_update - Decrypt - CCM [Check 10] Test psa_aead_update - Decrypt - CCM - Tag length = 4 [Check 11] Test psa_aead_update - Decrypt - CCM - Zero ad_length [Check 12] Test psa_aead_update - Decrypt - CCM - Zero plaintext_length [Check 13] Test psa_aead_update - Decrypt - CCM - Small buffer size [Check 14] Test psa_aead_update - Decrypt - Less add data than specified [Check 15] Test psa_aead_update - Decrypt - CCM - Overflow input length [Check 16] Test psa_aead_update - Decrypt - CCM - Invalid operation state TEST RESULT: PASSED ****************************************** TEST: 259 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_finish [Info] Executing tests from non-secure [Check 1] Test psa_aead_finish - AES-CCM [Check 2] Test psa_aead_finish - AES-CCM 24 bytes Tag length = 4 [Check 3] Test psa_aead_finish - Small buffer size [Check 4] Test psa_aead_finish - Input length is less than plaintext length [Check 5] Test psa_aead_finish - GCM - 16B AES - 12B Nonce & 12B additional data TEST RESULT: PASSED ****************************************** TEST: 260 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_abort [Info] Executing tests from non-secure [Check 1] Test psa_aead_abort - Encrypt - CCM - AES [Check 2] Test psa_aead_abort - Encrypt - GCM - AES [Check 3] Test psa_aead_abort - Decrypt - CCM - AES [Check 4] Test psa_aead_abort - Decrypt - GCM - AES [Check 5] Test psa_aead_abort with all initializations TEST RESULT: PASSED ****************************************** TEST: 261 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_verify [Info] Executing tests from non-secure [Check 1] Test psa_aead_verify - AES-CCM [Check 2] Test psa_aead_verify - AES-CCM 24 bytes Tag length = 4 [Check 3] Test psa_aead_verify - Small buffer size [Check 4] Test psa_aead_verify - Input length is less than plaintext length [Check 5] Test psa_aead_verify - GCM - 16B AES - 12B Nounce & 12B addi data TEST RESULT: PASSED ****************************************** TEST: 262 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_suspend [Info] Executing tests from non-secure [Check 1] Test psa_hash_suspend - MD5 Failed at Checkpoint: 5 Actual: -134 Expected: 0 TEST RESULT: FAILED (Error Code=0x1) ****************************************** TEST: 263 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_resume [Info] Executing tests from non-secure [Check 1] Test psa_hash_resume - MD5 Failed at Checkpoint: 5 Actual: -134 Expected: 0 TEST RESULT: FAILED (Error Code=0x1) ****************************************** ************ Crypto Suite Report ********** TOTAL TESTS : 63 TOTAL PASSED : 60 TOTAL SIM ERROR : 0 TOTAL FAILED : 3 TOTAL SKIPPED : 0 ******************************************
# ./psa-iat-api-test ***** PSA Architecture Test Suite - Version 1.4 ***** Running.. Attestation Suite ****************************************** TEST: 601 | DESCRIPTION: Testing attestation initial attestation APIs | UT: psa_initial_attestation [Info] Executing tests from non-secure [Check 1] Test psa_initial_attestation_get_token with Challenge 32 Failed at Checkpoint: 2 Actual: 73 Expected: 0 TEST RESULT: FAILED (Error Code=0x1) ****************************************** ************ Attestation Suite Report ********** TOTAL TESTS : 1 TOTAL PASSED : 0 TOTAL SIM ERROR : 0 TOTAL FAILED : 1 TOTAL SKIPPED : 0 ******************************************
Config 2: FIP SP
Build command
SP_PACKAGING_METHOD=fip MEASURED_BOOT=n make
Setup steps after boot
/mnt/host/out/linux-arm-ffa-tee/load_module.sh /mnt/host/out/linux-arm-ffa-user/load_module.sh cp -at /usr /mnt/host/out/ts-install/arm-linux/bin /mnt/host/out/ts-install/arm-linux/lib
Test results
OP-TEE xtest (SPMC test only)
# xtest -t ffa_spmc Run test suite with level=0 TEE test application started over default TEE instance ###################################################### # # ffa_spmc # ###################################################### * ffa_spmc_1001 Test FF-A communication o ffa_spmc_1001.1 SP1 comms check Could not contact xtest_1 sp, skipping SP test Add xtest_1 sp to the image to enable tests ffa_spmc_1001.1 OK ffa_spmc_1001 OK * ffa_spmc_1002 Test FF-A memory: share memory from Normal World to SP Could not contact xtest_1 sp, skipping SP test Add xtest_1 sp to the image to enable tests ffa_spmc_1002 OK * ffa_spmc_1003 Test FF-A memory: SP to SP Could not contact xtest_1 sp, skipping SP test Add xtest_1 sp to the image to enable tests ffa_spmc_1003 OK * ffa_spmc_1004 Test FF-A memory: Access and flags Could not contact xtest_1 sp, skipping SP test Add xtest_1 sp to the image to enable tests ffa_spmc_1004 OK +----------------------------------------------------- Result of testsuite ffa_spmc: ffa_spmc_1001 OK ffa_spmc_1002 OK ffa_spmc_1003 OK ffa_spmc_1004 OK +-----------------------------------------------------
Trusted Services service level test
# ./ts-service-test -v -xgAttestation TEST(PsServiceTests, createAndSetExtended) - 18103 ms TEST(PsServiceTests, createAndSet) - 23144 ms TEST(PsServiceTests, storeNewItem) - 19864 ms TEST(ItsServiceTests, storeNewItem) - 19811 ms TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 23510 ms TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 26572 ms TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 32060 ms TEST(CryptoMacServicePackedcTests, macAbort) - 19704 ms TEST(CryptoMacServicePackedcTests, signAndVerify) - 80129 ms TEST(CryptoCipherServicePackedcTests, cipherAbort) - 19542 ms TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 63142 ms TEST(CryptoHashServicePackedcTests, hashAbort) - 18170 ms TEST(CryptoHashServicePackedcTests, hashAndVerify) - 29192 ms TEST(CryptoHashServicePackedcTests, calculateHash) - 13523 ms TEST(CryptoServicePackedcTests, generateRandomNumbers) - 42276 ms TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 1421338 ms TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 113921 ms TEST(CryptoServicePackedcTests, signAndVerifyEat) - 326067 ms TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 330175 ms TEST(CryptoServicePackedcTests, signAndVerifyHash) - 328694 ms TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 52285 ms TEST(CryptoServicePackedcTests, exportPublicKey) - 67260 ms TEST(CryptoServicePackedcTests, purgeKey) - 43913 ms TEST(CryptoServicePackedcTests, copyKey) - 143175 ms TEST(CryptoServicePackedcTests, generatePersistentKeys) - 77791 ms TEST(CryptoServicePackedcTests, generateVolatileKeys) - 66937 ms TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 43460 ms TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 1295097 ms TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 123941 ms TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 330199 ms TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 331531 ms TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 52580 ms TEST(CryptoServiceProtobufTests, exportPublicKey) - 67684 ms TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 78585 ms TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 67576 ms TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 9674379 ms TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 2196588 ms TEST(DiscoveryServiceTests, checkServiceInfo) - 3883 ms OK (43 tests, 38 ran, 334 checks, 0 ignored, 5 filtered out, 17704434 ms)
PSA Architecture Test Suite
# ./psa-its-api-test ***** PSA Architecture Test Suite - Version 1.4 ***** Running.. Storage Suite ****************************************** TEST: 401 | DESCRIPTION: UID not found check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Call get API for UID 6 which is not set [Check 2] Call get_info API for UID 6 which is not set [Check 3] Call remove API for UID 6 which is not set [Check 4] Call get API for UID 6 which is removed [Check 5] Call get_info API for UID 6 which is removed [Check 6] Call remove API for UID 6 which is removed Set storage for UID 6 [Check 7] Call get API for different UID 5 [Check 8] Call get_info API for different UID 5 [Check 9] Call remove API for different UID 5 TEST RESULT: PASSED ****************************************** TEST: 402 | DESCRIPTION: Write once error check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Update the flag of UID 1 with WRITE_ONCE flag [Check 2] Try to remove the UID 1 having WRITE_ONCE flag [Check 3] Create a new UID 2 with WRITE_ONCE flag [Check 4] Try to remove the UID 2 having WRITE_ONCE flag [Check 5] Try to change the length of write_once UID 2 [Check 6] Check UID removal still fails [Check 7] Try to change the WRITE_ONCE flag to None for UID 2 [Check 8] Check UID removal still fails TEST RESULT: PASSED ****************************************** TEST: 403 | DESCRIPTION: Insufficient space check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Overload storage space UID 13 set failed due to insufficient space Remove all registered UIDs [Check 2] Overload storage again to verify all previous UID removed UID 13 set failed due to insufficient space Remove all registered UIDs TEST RESULT: PASSED ****************************************** TEST: 404 | DESCRIPTION: Data Consistency check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2 [Check 2] Call get API with default length - TEST_BUFF_SIZE TEST RESULT: PASSED ****************************************** TEST: 405 | DESCRIPTION: Success scenarios check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Set UID with data length zero and call storage APIs [Check 2] Resetting the length check TEST RESULT: PASSED ****************************************** TEST: 406 | DESCRIPTION: Check for storage create flags | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE [Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY [Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION TEST RESULT: PASSED ****************************************** TEST: 407 | DESCRIPTION: Incorrect Size check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests Create a valid Storage - TEST_BUFF_SIZE/2 Increase the length of storage - TEST_BUFF_SIZE [Check 1] Call get API with old length - TEST_BUFF_SIZE/2 [Check 2] Call get API with old length - TEST_BUFF_SIZE/4 Decrease the length of storage - TEST_BUFF_SIZE/4 [Check 3] Call get API with old length - TEST_BUFF_SIZE/2 [Check 4] Call get API with old length - TEST_BUFF_SIZE [Check 5] Call get API with valid length - TEST_BUFF_SIZE/4 TEST RESULT: PASSED ****************************************** TEST: 408 | DESCRIPTION: Invalid offset check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Try to access data with varying valid offset [Check 2] Try to access data with varying invalid offset TEST RESULT: PASSED ****************************************** TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Call set API with NULL pointer and data length 0 [Check 2] Call get API with NULL read buffer and data length 0 [Check 3] Remove the UID [Check 4] Call get_info API to verify UID removed [Check 5] Create UID with zero data_len and valid write buffer [Check 8] Call get API with NULL read buffer and data length 0 [Check 9] Increase the length TEST RESULT: PASSED ****************************************** TEST: 410 | DESCRIPTION: UID value zero check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Creating storage with UID 0 should fail [Check 2] Get_info for UID 0 should fail [Check 3] Removing storage with UID 0 should fail TEST RESULT: PASSED ****************************************** ************ Storage Suite Report ********** TOTAL TESTS : 10 TOTAL PASSED : 10 TOTAL SIM ERROR : 0 TOTAL FAILED : 0 TOTAL SKIPPED : 0 ******************************************
# ./psa-ps-api-test ***** PSA Architecture Test Suite - Version 1.4 ***** Running.. Storage Suite ****************************************** TEST: 401 | DESCRIPTION: UID not found check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Call get API for UID 6 which is not set [Check 2] Call get_info API for UID 6 which is not set [Check 3] Call remove API for UID 6 which is not set [Check 4] Call get API for UID 6 which is removed [Check 5] Call get_info API for UID 6 which is removed [Check 6] Call remove API for UID 6 which is removed Set storage for UID 6 [Check 7] Call get API for different UID 5 [Check 8] Call get_info API for different UID 5 [Check 9] Call remove API for different UID 5 TEST RESULT: PASSED ****************************************** TEST: 402 | DESCRIPTION: Write once error check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Update the flag of UID 1 with WRITE_ONCE flag [Check 2] Try to remove the UID 1 having WRITE_ONCE flag [Check 3] Create a new UID 2 with WRITE_ONCE flag [Check 4] Try to remove the UID 2 having WRITE_ONCE flag [Check 5] Try to change the length of write_once UID 2 [Check 6] Check UID removal still fails [Check 7] Try to change the WRITE_ONCE flag to None for UID 2 [Check 8] Check UID removal still fails TEST RESULT: PASSED ****************************************** TEST: 403 | DESCRIPTION: Insufficient space check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Overload storage space UID 13 set failed due to insufficient space Remove all registered UIDs [Check 2] Overload storage again to verify all previous UID removed UID 13 set failed due to insufficient space Remove all registered UIDs TEST RESULT: PASSED ****************************************** TEST: 404 | DESCRIPTION: Data Consistency check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2 [Check 2] Call get API with default length - TEST_BUFF_SIZE TEST RESULT: PASSED ****************************************** TEST: 405 | DESCRIPTION: Success scenarios check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Set UID with data length zero and call storage APIs [Check 2] Resetting the length check TEST RESULT: PASSED ****************************************** TEST: 406 | DESCRIPTION: Check for storage create flags | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE [Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY [Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION TEST RESULT: PASSED ****************************************** TEST: 407 | DESCRIPTION: Incorrect Size check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Create a valid Storage - TEST_BUFF_SIZE/2 Increase the length of storage - TEST_BUFF_SIZE [Check 1] Call get API with old length - TEST_BUFF_SIZE/2 [Check 2] Call get API with old length - TEST_BUFF_SIZE/4 Decrease the length of storage - TEST_BUFF_SIZE/4 [Check 3] Call get API with old length - TEST_BUFF_SIZE/2 [Check 4] Call get API with old length - TEST_BUFF_SIZE [Check 5] Call get API with valid length - TEST_BUFF_SIZE/4 TEST RESULT: PASSED ****************************************** TEST: 408 | DESCRIPTION: Invalid offset check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Try to access data with varying valid offset [Check 2] Try to access data with varying invalid offset TEST RESULT: PASSED ****************************************** TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Call set API with NULL pointer and data length 0 [Check 2] Call get API with NULL read buffer and data length 0 [Check 3] Remove the UID [Check 4] Call get_info API to verify UID removed [Check 5] Create UID with zero data_len and valid write buffer [Check 8] Call get API with NULL read buffer and data length 0 [Check 9] Increase the length TEST RESULT: PASSED ****************************************** TEST: 410 | DESCRIPTION: UID value zero check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Creating storage with UID 0 should fail [Check 2] Get_info for UID 0 should fail [Check 3] Removing storage with UID 0 should fail TEST RESULT: PASSED ****************************************** TEST: 411 | DESCRIPTION: Optional APIs: UID not found check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs are not supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 412 | DESCRIPTION: Optional APIs: Invalid arguments and offset invalid | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs are not supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 413 | DESCRIPTION: Set_Extended and Create api : Success | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs are not supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 414 | DESCRIPTION: Optional APIs not supported check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Optional PS APIs are not supported. [Check 1] Call to create API should fail as API not supported Failed at Checkpoint: 1 Actual: 0 Expected: -134 TEST RESULT: FAILED (Error Code=0x1) ****************************************** TEST: 415 | DESCRIPTION: Create API write_once flag value check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs are not supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 416 | DESCRIPTION: Storage assest capacity modification check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs not are supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 417 | DESCRIPTION: Storage assest capacity modification check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs not are supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** ************ Storage Suite Report ********** TOTAL TESTS : 17 TOTAL PASSED : 10 TOTAL SIM ERROR : 0 TOTAL FAILED : 1 TOTAL SKIPPED : 6 ******************************************
# ./psa-crypto-api-test ***** PSA Architecture Test Suite - Version 1.4 ***** Running.. Crypto Suite ****************************************** TEST: 201 | DESCRIPTION: Testing crypto key management APIs | UT: psa_crypto_init [Info] Executing tests from non-secure [Check 1] Test calling crypto functions before psa_crypto_init [Check 2] Test psa_crypto_init [Check 3] Test multiple psa_crypto_init TEST RESULT: PASSED ****************************************** TEST: 202 | DESCRIPTION: Testing crypto key management APIs | UT: psa_import_key [Info] Executing tests from non-secure [Check 1] Test psa_import_key 16 bytes AES [Check 2] Test psa_import_key 24 bytes AES [Check 3] Test psa_import_key 32 bytes AES [Check 4] Test psa_import_key 2048 RSA public key [Check 5] Test psa_import_key with RSA 2048 keypair [Check 6] Test psa_import_key with DES 8 bytes key [Check 7] Test psa_import_key with Triple DES 2-Key [Check 8] Test psa_import_key with Triple DES 3-Key [Check 9] Test psa_import_key with EC Public key [Check 10] Test psa_import_key with EC keypair [Check 11] Test psa_import_key 16 bytes AES with invalid bits [Check 12] Test psa_import_key with key data greater than the algorithm size [Check 13] Test psa_import_key with incorrect key data size [Check 14] Test psa_import_key with invalid key type value TEST RESULT: PASSED ****************************************** TEST: 203 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_key [Info] Executing tests from non-secure [Check 1] Test psa_export_key 16 Byte AES [Check 2] Test psa_export_key 24 Byte AES [Check 3] Test psa_export_key 32 Byte AES [Check 4] Test psa_export_key 2048 RSA public key [Check 5] Test psa_export_key with RSA 2048 keypair [Check 6] Test psa_export_key with DES 64 bit key [Check 7] Test psa_export_key with Triple DES 2-Key [Check 8] Test psa_export_key with Triple DES 3-Key [Check 9] Test psa_export_key with EC Public key [Check 10] Test psa_export_key with EC keypair [Check 11] Test psa_export_key with key policy verify [Check 12] Test psa_export_key with less buffer size TEST RESULT: PASSED ****************************************** TEST: 204 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_public_key [Info] Executing tests from non-secure [Check 1] Test psa_export_public_key 16 Byte AES [Check 2] Test psa_export_public_key 24 Byte AES [Check 3] Test psa_export_public_key 32 Byte AES [Check 4] Test psa_export_public_key 2048 RSA public key [Check 5] Test psa_export_public_key with RSA 2048 keypair [Check 6] Test psa_export_public_key with DES 64 bit key [Check 7] Test psa_export_public_key with Triple DES 2-Key [Check 8] Test psa_export_public_key with Triple DES 3-Key [Check 9] Test psa_export_public_key with EC Public key [Check 10] Test psa_export_public_key with EC keypair [Check 11] Test psa_export_public_key with less buffer size TEST RESULT: PASSED ****************************************** TEST: 205 | DESCRIPTION: Testing crypto key management APIs | UT: psa_destroy_key [Info] Executing tests from non-secure [Check 1] Test psa_destroy_key 16 Byte AES [Check 2] Test psa_destroy_key 24 Byte AES [Check 3] Test psa_destroy_key 32 Byte AES [Check 4] Test psa_destroy_key 2048 RSA public key [Check 5] Test psa_destroy_key with RSA 2048 keypair [Check 6] Test psa_destroy_key with DES 64 bit key [Check 7] Test psa_destroy_key with Triple DES 2-Key [Check 8] Test psa_destroy_key with Triple DES 3-Key [Check 9] Test psa_destroy_key with EC Public key [Check 10] Test psa_destroy_key with EC keypair TEST RESULT: PASSED ****************************************** TEST: 206 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compute [Info] Executing tests from non-secure [Check 1] Test psa_hash_compute with MD5 algorithm [Check 2] Test psa_hash_compute with RIPEMD160 algorithm [Check 3] Test psa_hash_compute with SHA1 algorithm [Check 4] Test psa_hash_compute with SHA224 algorithm [Check 5] Test psa_hash_compute with SHA256 algorithm [Check 6] Test psa_hash_compute with SHA384 algorithm [Check 7] Test psa_hash_compute with SHA512 algorithm [Check 8] Test psa_hash_compute with small buffer size [Check 9] Test psa_hash_compute with invalid algorithm TEST RESULT: PASSED ****************************************** TEST: 207 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compare [Info] Executing tests from non-secure [Check 1] Test psa_hash_compare with MD5 algorithm [Check 2] Test psa_hash_compare with RIPEMD160 algorithm [Check 3] Test psa_hash_compare with SHA1 algorithm [Check 4] Test psa_hash_compare with SHA224 algorithm [Check 5] Test psa_hash_compare with SHA256 algorithm [Check 6] Test psa_hash_compare with SHA384 algorithm [Check 7] Test psa_hash_compare with SHA512 algorithm [Check 8] Test psa_hash_compare with incorrect hash [Check 9] Test psa_hash_compare with incorrect hash length [Check 10] Test psa_hash_compare with invalid algorithm TEST RESULT: PASSED ****************************************** TEST: 208 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_setup [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_setup - ECDH + HKDF-SHA-256 [Check 2] Test psa_key_derivation_setup - ECDH, unknown KDF [Check 3] Test psa_key_derivation_setup - bad key derivation algorithm [Check 4] Test psa_key_derivation_setup - Invalid Algorithm TEST RESULT: PASSED ****************************************** TEST: 209 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_bytes [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_input_bytes - Step as Info [Check 2] Test psa_key_derivation_input_bytes - Step as secret [Check 3] Test psa_key_derivation_input_bytes - Step as salt [Check 4] Test psa_key_derivation_input_bytes - Step as label [Check 5] Test psa_key_derivation_input_bytes - Step as seed [Check 6] Test psa_key_derivation_input_bytes - Invalid step TEST RESULT: PASSED ****************************************** TEST: 210 | DESCRIPTION: Testing crypto key attributes APIs | UT: psa_key_attributes_set_get [Info] Executing tests from non-secure [Check 1] Test psa_key_attributes_set_get key attributes TEST RESULT: PASSED ****************************************** TEST: 211 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_setup [Info] Executing tests from non-secure [Check 1] Test psa_hash_setup with MD5 algorithm [Check 2] Test psa_hash_setup with RIPEMD160 algorithm [Check 3] Test psa_hash_setup with SHA1 algorithm [Check 4] Test psa_hash_setup with SHA224 algorithm [Check 5] Test psa_hash_setup with SHA256 algorithm [Check 6] Test psa_hash_setup with SHA384 algorithm [Check 7] Test psa_hash_setup with SHA512 algorithm [Check 8] Test psa_hash_setup with Invalid hash algorithm [Check 9] Test psa_hash_setup with Invalid algorithm [Check 10] Test psa_hash_setup with CTR algorithm TEST RESULT: PASSED ****************************************** TEST: 212 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_update [Info] Executing tests from non-secure [Check 1] Test psa_hash_update with MD5 algorithm [Check 2] Test psa_hash_update with RIPEMD160 algorithm [Check 3] Test psa_hash_update with SHA1 algorithm [Check 4] Test psa_hash_update with SHA224 algorithm [Check 5] Test psa_hash_update with SHA256 algorithm [Check 6] Test psa_hash_update with SHA384 algorithm [Check 7] Test psa_hash_update with SHA512 algorithm [Check 8] Test psa_hash_update without hash setup [Check 9] Test psa_hash_update with completed opertaion handle TEST RESULT: PASSED ****************************************** TEST: 213 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_verify [Info] Executing tests from non-secure [Check 1] Test psa_hash_verify with MD5 algorithm [Check 2] Test psa_hash_verify with RIPEMD160 algorithm [Check 3] Test psa_hash_verify with SHA1 algorithm [Check 4] Test psa_hash_verify with SHA224 algorithm [Check 5] Test psa_hash_verify with SHA256 algorithm [Check 6] Test psa_hash_verify with SHA384 algorithm [Check 7] Test psa_hash_verify with SHA512 algorithm [Check 8] Test psa_hash_verify with incorrect expected hash [Check 9] Test psa_hash_verify with incorrect hash length [Check 10] test psa_hash_verify with inactive & invalid operation handle TEST RESULT: PASSED ****************************************** TEST: 214 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_finish [Info] Executing tests from non-secure [Check 1] Test psa_hash_finish with MD5 algorithm [Check 2] Test psa_hash_finish with RIPEMD160 algorithm [Check 3] Test psa_hash_finish with SHA1 algorithm [Check 4] Test psa_hash_finish with SHA224 algorithm [Check 5] Test psa_hash_finish with SHA256 algorithm [Check 6] Test psa_hash_finish with SHA384 algorithm [Check 7] Test psa_hash_finish with SHA512 algorithm [Check 8] Test psa_hash_finish with invalid hash buffer size [Check 9] test psa_hash_finish with inactive operation handle TEST RESULT: PASSED ****************************************** TEST: 215 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_abort [Info] Executing tests from non-secure [Check 1] Test psa_hash_abort with MD5 algorithm [Check 2] Test psa_hash_abort with RIPEMD160 algorithm [Check 3] Test psa_hash_abort with SHA1 algorithm [Check 4] Test psa_hash_abort with SHA224 algorithm [Check 5] Test psa_hash_abort with SHA256 algorithm [Check 6] Test psa_hash_abort with SHA384 algorithm [Check 7] Test psa_hash_abort with SHA512 algorithm [Check 8] Test psa_hash_finish after calling psa_hash_abort TEST RESULT: PASSED ****************************************** TEST: 216 | DESCRIPTION: Testing crypto generator functions APIs | UT: psa_generate_key [Info] Executing tests from non-secure [Check 1] Test psa_generate_key 16 Byte AES [Check 2] Test psa_generate_key 24 Byte AES [Check 3] Test psa_generate_key 32 Byte AES [Check 4] Test psa_generate_key with DES 64 bit key [Check 5] Test psa_generate_key with Triple DES 2-Key [Check 6] Test psa_generate_key with Triple DES 3-Key [Check 7] Test psa_generate_key with RSA 2048 Keypair [Check 8] Test psa_generate_key with ECC KeyPair [Check 9] Test psa_generate_key with RSA 2048 Public key [Check 10] Test psa_generate_key with invalid key type [Check 11] Test psa_generate_key with invalid usage flags TEST RESULT: PASSED ****************************************** TEST: 217 | DESCRIPTION: Testing crypto generation APIs | UT: psa_generate_random [Info] Executing tests from non-secure [Check 1] Test psa_generate_random to get 0 Byte data [Check 2] Test psa_generate_random to get 16 Byte data [Check 3] Test psa_generate_random to get 24 Byte data [Check 4] Test psa_generate_random to get 32 Byte data [Check 5] Test psa_generate_random to get 64 Byte data [Check 6] Test psa_generate_random to get 128 Byte data [Check 7] Test psa_generate_random to get 256 Byte data [Check 8] Test psa_generate_random to get 512 Byte data [Check 9] Test psa_generate_random to get 1000 Byte data TEST RESULT: PASSED ****************************************** TEST: 218 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_key [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_input_key 16 Byte Key [Check 2] Test psa_key_derivation_input_key with invalid usage [Check 3] Test psa_key_derivation_input_key with step as label [Check 4] Test psa_key_derivation_input_key with step as info [Check 5] Test psa_key_derivation_input_key with step as seed [Check 6] Test psa_key_derivation_input_key with step as salt [Check 7] Test psa_key_derivation_input_key with key type as AES(not derive) [Check 8] Test psa_key_derivation_input_key incorrect key algorithm [Check 9] Test psa_key_derivation_input_key with key type as 2048 RSA public key [Check 10] Test psa_key_derivation_input_key with key type as RSA 2048 keypair [Check 11] Test psa_key_derivation_input_key with zero as step [Check 12] Test psa_cipher_decrypt_setup - Invalid key handle [Check 13] Test psa_cipher_decrypt_setup - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 219 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_key_agreement [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_key_agreement - ECDH SECP256R1 [Check 2] Test psa_key_derivation_key_agreement - Invalid step [Check 3] Test psa_key_derivation_key_agreement - ECDH SECP384R1 [Check 4] Test psa_key_derivation_key_agreement - Invalid usage [Check 5] Test psa_key_derivation_key_agreement - KDF not a key agreement alg [Check 6] Test psa_key_derivation_key_agreement - Public key of different curve [Check 7] Test psa_key_derivation_key_agreement - Pub key instead of Prv key [Check 8] Test psa_key_derivation_key_agreement - Invalid handle [Check 9] Test psa_key_derivation_key_agreement - Zero as handle TEST RESULT: PASSED ****************************************** TEST: 220 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_bytes [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_output_bytes - HKDF [Check 2] Test psa_key_derivation_output_bytes - optional salt [Check 3] Test psa_key_derivation_output_bytes - capacity < output_length [Check 4] Test psa_key_derivation_output_bytes - missing info [Check 5] Test psa_key_derivation_output_bytes - missing salt/secret/info [Check 6] Test psa_key_derivation_output_bytes - TLS12_PRF [Check 7] Test psa_key_derivation_output_bytes - capacity < output_length [Check 8] Test psa_key_derivation_output_bytes - missing seed/secret/label TEST RESULT: PASSED ****************************************** TEST: 221 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_key [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_output_key - Key [Check 2] Test psa_key_derivation_output_key - Info [Check 3] Test psa_key_derivation_output_key - Salt [Check 4] Test psa_key_derivation_output_key - Greater Capacity than available [Check 5] Test psa_key_derivation_output_key - ECC Public key [Check 6] Test psa_key_derivation_output_key - ECC keypair [Check 7] Test psa_key_derivation_output_key - RSA Public Key[Check 8] Test psa_key_derivation_output_key - RSA keypair [Check 9] Test psa_key_derivation_output_key - Invalid key size TEST RESULT: PASSED ****************************************** TEST: 222 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_abort [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_abort TEST RESULT: PASSED ****************************************** TEST: 223 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_set_get_capacity [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_set_get_capacity - < operation's capacity [Check 2] Test psa_key_derivation_set_get_capacity - = operation's capacity [Check 3] Test psa_key_derivation_set_get_capacity - > operation's capacity [Check 4] Test psa_key_derivation_set_get_capacity - unchanged capacity TEST RESULT: PASSED ****************************************** TEST: 224 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt [Info] Executing tests from non-secure [Check 1] Test psa_aead_encrypt - CCM - AES - 13B nonce & 8B add data [Check 2] Test psa_aead_encrypt - CCM - AES - 13B nonce & 32B add data [Check 3] Test psa_aead_encrypt - CCM - AES - 24 bytes Tag length = 4 [Check 4] Test psa_aead_encrypt - CCM - AES - Zero additional data [Check 5] Test psa_aead_encrypt - CCM - AES - Zero plaintext [Check 6] Test psa_aead_encrypt - GCM - AES - 12B nonce & 12B add data [Check 7] Test psa_aead_encrypt - Unsupported algorithm [Check 8] Test psa_aead_encrypt - Invalid usage flag [Check 9] Test psa_aead_encrypt - Invalid ciphertext_size [Check 10] Test psa_aead_encrypt - Invalid nonce [Check 11] Test psa_aead_encrypt - Invalid tag length 0 TEST RESULT: PASSED ****************************************** TEST: 225 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt [Info] Executing tests from non-secure [Check 1] Test psa_aead_decrypt - CCM - AES - 13B nonce & 8B add data [Check 2] Test psa_aead_decrypt - CCM - AES - 13B nonce & 32B add data [Check 3] Test psa_aead_decrypt - CCM - AES - 24 bytes Tag length = 4 [Check 4] Test psa_aead_decrypt - CCM - AES - Zero additional data [Check 5] Test psa_aead_decrypt - CCM - AES - Zero plaintext [Check 6] Test psa_aead_decrypt - GCM - AES - 12B nonce & 12B add data [Check 7] Test psa_aead_decrypt - Unsupported algorithm [Check 8] Test psa_aead_decrypt - Invalid usage flag [Check 9] Test psa_aead_decrypt - Invalid plaintext_size [Check 10] Test psa_aead_decrypt - Invalid nonce [Check 11] Test psa_aead_decrypt - Invalid cihpertext [Check 12] Test psa_aead_decrypt - Invalid cihpertext_size [Check 13] Test psa_aead_decrypt - Invalid tag length 0 TEST RESULT: PASSED ****************************************** TEST: 226 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_setup [Info] Executing tests from non-secure [Check 1] Test psa_mac_sign_setup - HMAC - SHA256 [Check 2] Test psa_mac_sign_setup - CMAC - AES [Check 3] Test psa_mac_sign_setup - Incompatible HMAC for CMAC [Check 4] Test psa_mac_sign_setup - Invalid usage flag [Check 5] Test psa_mac_sign_setup - Invalid key type [Check 6] Test psa_mac_sign_setup - Truncated MAC too large [Check 7] Test psa_mac_sign_setup - Truncated MAC too small [Check 8] Test psa_mac_sign_setup - Unknown MAC algorithm [Check 9] Test psa_mac_sign_setup - Bad algorithm (not a MAC algorithm) [Check 10] Test psa_mac_sign_setup invalid key handle [Check 11] Test psa_mac_sign_setup zero as key handle TEST RESULT: PASSED ****************************************** TEST: 227 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_update [Info] Executing tests from non-secure [Check 1] Test psa_mac_update - HMAC - SHA256 - 64 Byte [Check 2] Test psa_mac_update - CMAC - AES - 16 Byte [Check 3] Test psa_mac_update - HMAC - SHA512 - 32 Byte [Check 4] Test psa_mac_update - HMAC - SHA512 - Invalid operation state TEST RESULT: PASSED ****************************************** TEST: 228 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_finish [Info] Executing tests from non-secure [Check 1] Test psa_mac_sign_finish - HMAC - SHA224 [Check 2] Test psa_mac_sign_finish - HMAC - SHA256 [Check 3] Test psa_mac_sign_finish - HMAC - SHA512 [Check 4] Test psa_mac_sign_finish - HMAC - SHA224 - Truncated 8 Byte [Check 5] Test psa_mac_sign_finish - HMAC - SHA224 - Small output buffer [Check 6] Test psa_mac_sign_finish - HMAC - SHA224 - Invalid operation state [Check 7] Test psa_mac_sign_finish - CMAC - AES TEST RESULT: PASSED ****************************************** TEST: 229 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_setup [Info] Executing tests from non-secure [Check 1] Test psa_mac_verify_setup - HMAC - SHA256 [Check 2] Test psa_mac_verify_setup - CMAC - AES [Check 3] Test psa_mac_verify_setup - Incompatible HMAC for CMAC [Check 4] Test psa_mac_verify_setup - Invalid usage flag [Check 5] Test psa_mac_verify_setup - Invalid key type [Check 6] Test psa_mac_verify_setup - Truncated MAC too large [Check 7] Test psa_mac_verify_setup - Truncated MAC too small [Check 8] Test psa_mac_verify_setup - Unknown MAC algorithm [Check 9] Test psa_mac_verify_setup - Bad algorithm (not a MAC algorithm) [Check 10] Test psa_mac_verify_setup invalid key handle [Check 11] Test psa_mac_verify_setup zero as key handle TEST RESULT: PASSED ****************************************** TEST: 230 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_finish [Info] Executing tests from non-secure [Check 1] Test psa_mac_verify_finish - HMAC - SHA224 [Check 2] Test psa_mac_verify_finish - HMAC - SHA256 [Check 3] Test psa_mac_verify_finish - HMAC - SHA512 [Check 4] Test psa_mac_verify_finish - HMAC - SHA224 - Truncated 8 Byte [Check 5] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid mac length [Check 6] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid expected mac [Check 7] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid operation state [Check 8] Test psa_mac_verify_finish - CMAC - AES TEST RESULT: PASSED ****************************************** TEST: 231 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_abort [Info] Executing tests from non-secure [Check 1] Test psa_mac_abort - HMAC - SHA224 [Check 2] Test psa_mac_abort - HMAC - SHA224 - Truncated 8 Byte [Check 3] Test psa_mac_abort - HMAC - SHA256 [Check 4] Test psa_mac_abort - HMAC - SHA512 [Check 5] Test psa_mac_abort - CMAC - AES [Check 6] Test psa_mac_sign_finish after calling psa_mac_abort TEST RESULT: PASSED ****************************************** TEST: 232 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt_setup [Info] Executing tests from non-secure [Check 1] Test psa_cipher_encrypt_setup 16 Byte AES [Check 2] Test psa_cipher_encrypt_setup 24 Byte AES [Check 3] Test psa_cipher_encrypt_setup 32 Byte AES [Check 4] Test psa_cipher_encrypt_setup DES 64 bit key [Check 5] Test psa_cipher_encrypt_setup Triple DES 2-Key [Check 6] Test psa_cipher_encrypt_setup Triple DES 3-Key [Check 7] Test psa_cipher_encrypt_setup 16 Byte raw data [Check 8] Test psa_cipher_encrypt_setup - not a cipher algorithm [Check 9] Test psa_cipher_encrypt_setup - unknown cipher algorithm [Check 10] Test psa_cipher_encrypt_setup - incompatible key ARC4 [Check 11] Test psa_cipher_encrypt_setup - incorrect usage [Check 12] Test psa_cipher_encrypt_setup - RSA public key [Check 13] Test psa_cipher_encrypt_setup - RSA keypair [Check 14] Test psa_cipher_encrypt_setup - EC Public key [Check 15] Test psa_cipher_encrypt_setup - EC keypair [Check 16] Test psa_cipher_encrypt_setup - Invalid key handle [Check 17] Test psa_cipher_encrypt_setup - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 233 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt_setup [Info] Executing tests from non-secure [Check 1] Test psa_cipher_decrypt_setup 16 Byte AES [Check 2] Test psa_cipher_decrypt_setup 24 Byte AES [Check 3] Test psa_cipher_decrypt_setup 32 Byte AES [Check 4] Test psa_cipher_decrypt_setup DES 64 bit key [Check 5] Test psa_cipher_decrypt_setup Triple DES 2-Key [Check 6] Test psa_cipher_decrypt_setup Triple DES 3-Key [Check 7] Test psa_cipher_decrypt_setup 16 Byte raw data [Check 8] Test psa_cipher_decrypt_setup - not a cipher algorithm [Check 9] Test psa_cipher_decrypt_setup - unknown cipher algorithm [Check 10] Test psa_cipher_decrypt_setup - incompatible key ARC4 [Check 11] Test psa_cipher_decrypt_setup - incorrect usage [Check 12] Test psa_cipher_decrypt_setup - RSA public key [Check 13] Test psa_cipher_decrypt_setup - RSA keypair [Check 14] Test psa_cipher_decrypt_setup - EC Public key [Check 15] Test psa_cipher_decrypt_setup - EC keypair [Check 16] Test psa_cipher_decrypt_setup - Invalid key handle [Check 17] Test psa_cipher_decrypt_setup - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 234 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_generate_iv [Info] Executing tests from non-secure [Check 1] Test psa_cipher_generate_iv 16 Byte AES [Check 2] Test psa_cipher_generate_iv 24 Byte AES [Check 3] Test psa_cipher_generate_iv 32 Byte AES [Check 4] Test psa_cipher_generate_iv DES 64 bit key [Check 5] Test psa_cipher_generate_iv DES 2-Key [Check 6] Test psa_cipher_generate_iv DES 3-Key [Check 7] Test psa_cipher_generate_iv AES - small iv buffer [Check 8] Test psa_cipher_generate_iv DES - small iv buffer TEST RESULT: PASSED ****************************************** TEST: 235 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_set_iv [Info] Executing tests from non-secure [Check 1] Test psa_cipher_set_iv 16 Byte AES [Check 2] Test psa_cipher_set_iv 24 Byte AES [Check 3] Test psa_cipher_set_iv 32 Byte AES [Check 4] Test psa_cipher_set_iv DES 64 bit key [Check 5] Test psa_cipher_set_iv DES 2-Key [Check 6] Test psa_cipher_set_iv DES 3-Key [Check 7] Test psa_cipher_set_iv AES - small iv buffer [Check 8] Test psa_cipher_set_iv DES - small iv buffer [Check 9] Test psa_cipher_set_iv AES - large iv buffer [Check 10] Test psa_cipher_set_iv DES - large iv buffer TEST RESULT: PASSED ****************************************** TEST: 236 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_update [Info] Executing tests from non-secure [Check 1] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING (Short in) [Check 3] Test psa_cipher_update - Encrypt - AES CBC_PKCS7 [Check 4] Test psa_cipher_update - Encrypt - AES CBC_PKCS7 (Short input) [Check 5] Test psa_cipher_update - Encrypt - AES CTR [Check 6] Test psa_cipher_update - Encrypt - DES CBC (nopad) [Check 7] Test psa_cipher_update - Encrypt - 2-key 3DE -CBC (nopad) [Check 8] Test psa_cipher_update - Encrypt - 3-key 3DE -CBC (nopad) [Check 9] Test psa_cipher_update - Encrypt - small output buffer size [Check 10] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING [Check 11] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING (Short in) [Check 12] Test psa_cipher_update - Decrypt - AES CBC_PKCS7 [Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7 (Short input) [Check 14] Test psa_cipher_update - Decrypt - AES CTR [Check 15] Test psa_cipher_update - Decrypt - DES CBC (nopad) [Check 16] Test psa_cipher_update - Decrypt - 2-key 3DE -CBC (nopad) [Check 17] Test psa_cipher_update - Decrypt - 3-key 3DE -CBC (nopad) [Check 18] Test psa_cipher_update - Decrypt - small output buffer size [Check 19] Test psa_cipher_update without cipher setup TEST RESULT: PASSED ****************************************** TEST: 237 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_finish [Info] Executing tests from non-secure [Check 1] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING (Short in) [Check 3] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7 [Check 4] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7 (Short input) [Check 5] Test psa_cipher_finish - Encrypt - AES CTR [Check 6] Test psa_cipher_finish - Encrypt - AES CTR (short input) [Check 7] Test psa_cipher_finish - Encrypt - DES CBC (nopad) Failed at Checkpoint: 11 Actual: 8 Expected: 16 TEST RESULT: FAILED (Error Code=0x1) ****************************************** TEST: 238 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_abort [Info] Executing tests from non-secure [Check 1] Test psa_cipher_abort - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_abort - Encrypt - AES CBC_PKCS7 [Check 3] Test psa_cipher_abort - Encrypt - AES CTR [Check 4] Test psa_cipher_abort - Encrypt - DES CBC (nopad) [Check 5] Test psa_cipher_abort - Encrypt - 2-key 3DE -CBC (nopad) [Check 6] Test psa_cipher_abort - Encrypt - 3-key 3DE -CBC (nopad) [Check 7] Test psa_cipher_abort - Decrypt - AES CBC_NO_PADDING [Check 8] Test psa_cipher_abort - Decrypt - AES CBC_PKCS7 [Check 9] Test psa_cipher_abort - Decrypt - AES CTR [Check 10] Test psa_cipher_abort - Decrypt - DES CBC (nopad) [Check 11] Test psa_cipher_abort - Decrypt - 2-key 3DE -CBC (nopad) [Check 12] Test psa_cipher_abort - Decrypt - 3-key 3DE -CBC (nopad) [Check 13] Test psa_cipher_update after psa_cipher_abort should fail TEST RESULT: PASSED ****************************************** TEST: 239 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_encrypt [Info] Executing tests from non-secure [Check 1] Test psa_asymmetric_encrypt - RSA PKCS1V15 [Check 2] Test psa_asymmetric_encrypt - RSA KEY_PAIR PKCS1V15 [Check 3] Test psa_asymmetric_encrypt - RSA OAEP SHA256 [Check 4] Test psa_asymmetric_encrypt - RSA OAEP SHA256 with label [Check 5] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256 [Check 6] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256 with label [Check 7] Test psa_asymmetric_encrypt - Small output buffer [Check 8] Test psa_asymmetric_encrypt - Invalid algorithm [Check 9] Test psa_asymmetric_encrypt - Invalid key type [Check 10] Test psa_asymmetric_encrypt - Invalid usage [Check 11] Test psa_asymmetric_encrypt - RSA PKCS1V15 - Salt [Check 12] Test psa_asymmetric_encrypt - ECC public key [Check 13] Test psa_asymmetric_encrypt - Invalid key handle [Check 14] Test psa_asymmetric_encrypt - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 240 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_decrypt [Info] Executing tests from non-secure [Check 1] Test psa_asymmetric_decrypt - RSA KEY_PAIR PKCS1V15 [Check 2] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256 [Check 3] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256 with label [Check 4] Test psa_asymmetric_decrypt - Invalid key type (RSA public key) [Check 5] Test psa_asymmetric_decrypt - Small output buffer [Check 6] Test psa_asymmetric_decrypt - Invalid algorithm [Check 7] Test psa_asymmetric_decrypt - Invalid key type (AES Key) [Check 8] Test psa_asymmetric_decrypt - Invalid usage [Check 9] Test psa_asymmetric_decrypt - RSA PKCS1V15 - Salt [Check 10] Test psa_asymmetric_decrypt - Invalid key handle [Check 11] Test psa_asymmetric_decrypt - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 241 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_sign_hash [Info] Executing tests from non-secure [Check 1] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 RAW [Check 2] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 SHA-256 [Check 3] Test psa_sign_hash - ECDSA SECP256R1 SHA-256 [Check 4] Test psa_sign_hash - Invalid key type (RSA public key) [Check 5] Test psa_sign_hash - Small output buffer [Check 6] Test psa_sign_hash - Invalid algorithm [Check 7] Test psa_sign_hash - Invalid key type (AES Key) [Check 8] Test psa_sign_hash - Invalid usage [Check 9] Test psa_sign_hash - Wrong hash size [Check 10] Test psa_sign_hash - Invalid key handle [Check 11] Test psa_sign_hash - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 242 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_verify_hash [Info] Executing tests from non-secure [Check 1] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 RAW [Check 2] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 SHA-256 [Check 3] Test psa_verify_hash - ECDSA KEY_PAIR SECP256R1 SHA-256 [Check 4] Test psa_verify_hash - EC public key [Check 5] Test psa_verify_hash - RSA public key [Check 6] Test psa_verify_hash - Small output buffer [Check 7] Test psa_verify_hash - Invalid algorithm [Check 8] Test psa_verify_hash - Invalid key type (AES Key) [Check 9] Test psa_verify_hash - Invalid usage [Check 10] Test psa_verify_hash - Wrong hash size [Check 11] Test psa_verify_hash - Wrong signature [Check 12] Test psa_verify_hash - Wrong signature size [Check 13] Test psa_verify_hash - Invalid key handle [Check 14] Test psa_verify_hash - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 243 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_raw_key_agreement [Info] Executing tests from non-secure [Check 1] Test psa_raw_key_agreement - ECDH SECP256R1 [Check 2] Test psa_raw_key_agreement - Small buffer size [Check 3] Test psa_raw_key_agreement - ECDH SECP384R1 [Check 4] Test psa_raw_key_agreement - Invalid usage [Check 5] Test psa_raw_key_agreement - Unknown KDF [Check 6] Test psa_raw_key_agreement - Not a key agreement alg [Check 7] Test psa_raw_key_agreement - Public key on different curve [Check 8] Test psa_raw_key_agreement - Public key instead of private key [Check 9] Test psa_raw_key_agreement - Invalid key handle [Check 10] Test psa_raw_key_agreement - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 244 | DESCRIPTION: Testing crypto key management APIs | UT: psa_copy_key [Info] Executing tests from non-secure [Check 1] Test psa_copy_key - 2048 RSA public key [Check 2] Test psa_copy_key - RSA 2048 keypair [Check 3] Test psa_copy_key - Incompatible target policy(source and target) [Check 4] Test psa_copy_key - source key with no export usage [Check 5] Test psa_copy_key - DES 64 bit key [Check 6] Test psa_copy_key - Triple DES 2-Key [Check 7] Test psa_copy_key - Triple DES 3-Key [Check 8] Test psa_copy_key - EC Public key [Check 9] Test psa_copy_key - EC keypair TEST RESULT: PASSED ****************************************** TEST: 245 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_clone [Info] Executing tests from non-secure [Check 1] Test psa_hash_clone - MD5 algorithm [Check 2] Test psa_hash_clone - RIPEMD160 algorithm [Check 3] Test psa_hash_clone - SHA1 algorithm [Check 4] Test psa_hash_clone - SHA224 algorithm [Check 5] Test psa_hash_clone - SHA256 algorithm [Check 6] Test psa_hash_clone - SHA384 algorithm [Check 7] Test psa_hash_clone - SHA512 algorithm [Check 8] Test psa_hash_clone - from an inactive source operation [Check 9] Test psa_hash_clone - on an active target operation TEST RESULT: PASSED ****************************************** TEST: 246 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_compute [Info] Executing tests from non-secure [Check 1] Test psa_mac_compute HMAC SHA 224 [Check 2] Test psa_mac_compute - Incompactible HMAC for CMAC [Check 3] Test psa_mac_compute - Invalid usage [Check 4] Test psa_mac_compute - truncated MAC too small [Check 5] Test psa_mac_compute - truncated MAC too large [Check 6] Test psa_mac_compute - bad algorithm (unknown MAC algorithm) [Check 7] Test psa_mac_compute HMAC SHA 256 [Check 8] Test psa_mac_compute HMAC SHA 512 [Check 9] Test psa_mac_compute HMAC SHA 224 (truncated to 8 Byte) [Check 10] Test psa_mac_compute CMAC AES 128 [Check 11] Test psa_mac_compute small size buffer [Check 12] Test psa_mac_compute - Invalid key type TEST RESULT: PASSED ****************************************** TEST: 247 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify [Info] Executing tests from non-secure [Check 1] Test psa_mac_verify HMAC SHA 224 [Check 2] Test psa_mac_verify HMAC SHA 256 [Check 3] Test psa_mac_verify - Incompactible HMAC for CMAC [Check 4] Test psa_mac_verify - Invalid usage [Check 5] Test psa_mac_verify - Truncated MAC too large [Check 6] Test psa_mac_verify - Truncated MAC too small [Check 7] Test psa_mac_verify - bad algorithm (unknown MAC algorithm) [Check 8] Test psa_mac_verify HMAC SHA 512 [Check 9] Test psa_mac_verify HMAC SHA 224 (truncated to 8 Byte) [Check 10] Test psa_mac_verify CMAC AES 128 [Check 11] Test psa_mac_verify - Invalid key type [Check 12] Test psa_mac_verify small size buffer [Check 13] Test psa_mac_verify incorrect expected MAC TEST RESULT: PASSED ****************************************** TEST: 248 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt [Info] Executing tests from non-secure [Check 1] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING (Short input) [Check 3] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7 [Check 4] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7 (Short input) [Check 5] Test psa_cipher_encrypt - Encrypt - AES CTR [Check 6] Test psa_cipher_encrypt - Encrypt - AES CTR (short input) [Check 7] Test psa_cipher_encrypt - Encrypt - DES CBC (nopad) [Check 8] Test psa_cipher_encrypt - Encrypt - 2-key 3DE -CBC (nopad) [Check 9] Test psa_cipher_encrypt - Encrypt - 3-key 3DE -CBC (nopad) [Check 10] Test psa_cipher_encrypt - small output buffer size [Check 11] Test psa_cipher_encrypt - Decrypt - AES CBC_NO_PADDING TEST RESULT: PASSED ****************************************** TEST: 249 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt [Info] Executing tests from non-secure [Check 1] Test psa_cipher_decrypt - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING [Check 3] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING (Short input) [Check 4] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING [Check 5] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7 [Check 6] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7 (Short input) [Check 7] Test psa_cipher_decrypt - Decrypt - AES CTR [Check 8] Test psa_cipher_decrypt - Decrypt - DES CBC (nopad) [Check 9] Test psa_cipher_decrypt - Decrypt - 2-key 3DE -CBC (nopad) [Check 10] Test psa_cipher_decrypt - 3-key 3DE -CBC (nopad) TEST RESULT: PASSED ****************************************** TEST: 250 | DESCRIPTION: Testing crypto key management APIs | UT: psa_sign_message [Info] Executing tests from non-secure [Check 1] Test psa_sign_message - RSA KEY_PAIR PKCS1V15 RAW [Check 2] Test psa_sign_message - ECDSA SECP256R1 SHA-256 [Check 3] Test psa_sign_message - Invalid key type (RSA public key) [Check 4] Test psa_sign_message - Small output buffer [Check 5] Test psa_sign_message - Invalid algorithm [Check 6] Test psa_sign_message - Invalid key type (AES Key) [Check 7] Test psa_sign_message - Invalid usage [Check 8] Test psa_sign_message - Mismatch key type and Algorithm [Check 9] Test psa_sign_message - Alg mismatch in key and API call [Check 10] Test psa_sign_message - Invalid key handle [Check 11] Test psa_sign_message - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 251 | DESCRIPTION: Testing crypto key management APIs | UT: psa_verify_message [Info] Executing tests from non-secure [Check 1] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 RAW [Check 2] Test psa_verify_message - RSA Public Key PKCS1V15 RAW [Check 3] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 SHA-256 [Check 4] Test psa_verify_message - ECDSA KEY_PAIR SECP256R1 SHA-256 [Check 5] Test psa_verify_message - ECDSA Public Key SECP256R1 SHA-256 [Check 6] Test psa_verify_message - Small output buffer [Check 7] Test psa_verify_message - Invalid algorithm [Check 8] Test psa_verify_message - Invalid key type (AES Key) [Check 9] Test psa_verify_message - Invalid usage [Check 10] Test psa_verify_message - Wrong message size [Check 11] Test psa_verify_message - Wrong signature [Check 12] Test psa_verify_message - Wrong signature size [Check 13] Test psa_verify_message - Invalid key handle [Check 14] Test psa_verify_message - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 252 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt_setup [Info] Executing tests from non-secure [Check 1] Test psa_aead_encrypt_setup - CCM - AES [Check 2] Test psa_aead_encrypt_setup - CCM - AES - Tag length = 4 [Check 3] Test psa_aead_encrypt_setup - CCM - AES - Mismatched tag length [Check 4] Test psa_aead_encrypt_setup - CCM - AES - Default Tag length [Check 5] Test psa_aead_encrypt_setup - GCM - AES [Check 6] Test psa_aead_encrypt_setup - CCM - DES Invalid key [Check 7] Test psa_aead_encrypt_setup - Invalid usage flag TEST RESULT: PASSED ****************************************** TEST: 253 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt_setup [Info] Executing tests from non-secure [Check 1] Test psa_aead_decrypt_setup - CCM - AES [Check 2] Test psa_aead_decrypt_setup - CCM - AES - Tag length = 4 [Check 3] Test psa_aead_decrypt_setup - CCM - AES - Mismatched tag length [Check 4] Test psa_aead_decrypt_setup - CCM - AES - Default Tag length [Check 5] Test psa_aead_decrypt_setup - GCM - AES [Check 6] Test psa_aead_decrypt_setup - CCM - DES Invalid key [Check 7] Test psa_aead_decrypt_setup - Invalid usage flag TEST RESULT: PASSED ****************************************** TEST: 254 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_generate_nonce [Info] Executing tests from non-secure [Check 1] Test psa_aead_generate_nonce - CCM [Check 2] Test psa_aead_generate_nonce - CCM - Tag length = 4 [Check 3] Test psa_aead_generate_nonce - CCM - Small buffer size [Check 4] Test psa_aead_generate_nonce - CCM - Uninitialized operation [Check 5] Test psa_aead_generate_nonce - CCM - Decrypt operation [Check 6] Test psa_aead_generate_nonce - GCM [Check 7] Test psa_aead_generate_nonce - GCM - Decrypt operation TEST RESULT: PASSED ****************************************** TEST: 255 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_nonce [Info] Executing tests from non-secure [Check 1] Test psa_aead_set_nonce - Encrypt - CCM [Check 2] Test psa_aead_set_nonce - Encrypt - CCM - Tag length = 4 [Check 3] Test psa_aead_set_nonce - Encrypt - CCM - Small nonce size [Check 4] Test psa_aead_set_nonce - Encrypt - CCM - Large nonce size [Check 5] Test psa_aead_set_nonce - Encrypt - CCM - Invalid operation state [Check 6] Test psa_aead_set_nonce - Encrypt - GCM [Check 7] Test psa_aead_set_nonce - Decrypt - CCM [Check 8] Test psa_aead_set_nonce - Decrypt - CCM - Tag length = 4 [Check 9] Test psa_aead_set_nonce - Decrypt - CCM - Small nonce size [Check 10] Test psa_aead_set_nonce - Decrypt - CCM - Large nonce size [Check 11] Test psa_aead_set_nonce - Decrypt - CCM - Invalid operation state [Check 12] Test psa_aead_set_nonce - Decrypt - GCM TEST RESULT: PASSED ****************************************** TEST: 256 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_lengths [Info] Executing tests from non-secure [Check 1] Test psa_aead_set_lengths - Encrypt - CCM [Check 2] Test psa_aead_set_lengths - Encrypt - CCM - Tag length = 4 [Check 3] Test psa_aead_set_lengths - Encrypt - CCM - Zero ad_length [Check 4] Test psa_aead_set_lengths - Encrypt - CCM - Zero plaintext_length [Check 5] Test psa_aead_set_lengths - Encrypt - CCM - Invalid operation state [Check 6] Test psa_aead_set_lengths - Encrypt - GCM [Check 7] Test psa_aead_set_lengths - Decrypt - CCM [Check 8] Test psa_aead_set_lengths - Decrypt - CCM - Tag length = 4 [Check 9] Test psa_aead_set_lengths - Decrypt - CCM - Zero ad_length [Check 10] Test psa_aead_set_lengths - Decrypt - CCM - Zero plaintext_length [Check 11] Test psa_aead_set_lengths - Decrypt - CCM - Invalid operation state [Check 12] Test psa_aead_set_lengths - Decrypt - GCM TEST RESULT: PASSED ****************************************** TEST: 257 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update_ad [Info] Executing tests from non-secure [Check 1] Test psa_aead_update_ad - Encrypt - CCM [Check 2] Test psa_aead_update_ad - Encrypt - CCM - Tag length = 4 [Check 3] Test psa_aead_update_ad - Encrypt - CCM - Zero ad_length [Check 4] Test psa_aead_update_ad - Encrypt - CCM - Zero plaintext_length [Check 5] Test psa_aead_update_ad - Encrypt - CCM - Invalid operation state [Check 6] Test psa_aead_update_ad - Encrypt - CCM - Overflow input length [Check 7] Test psa_aead_update_ad - Decrypt - CCM [Check 8] Test psa_aead_update_ad - Decrypt - CCM - Tag length = 4 [Check 9] Test psa_aead_update_ad - Decrypt - CCM - Zero ad_length [Check 10] Test psa_aead_update_ad - Decrypt - CCM - Zero plaintext_length [Check 11] Test psa_aead_update_ad - Decrypt - CCM - Invalid operation state [Check 12] Test psa_aead_update_ad - Decrypt - CCM - Overflow input length TEST RESULT: PASSED ****************************************** TEST: 258 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update [Info] Executing tests from non-secure [Check 1] Test psa_aead_update - Encrypt - CCM [Check 2] Test psa_aead_update - Encrypt - CCM - Tag length = 4 [Check 3] Test psa_aead_update - Encrypt - CCM - Zero ad_length [Check 4] Test psa_aead_update - Encrypt - CCM - Zero plaintext_length [Check 5] Test psa_aead_update - Encrypt - CCM - Small buffer size [Check 6] Test psa_aead_update - Encrypt - CCM - Less add data than specified [Check 7] Test psa_aead_update - Encrypt - CCM - Overflow input length [Check 8] Test psa_aead_update - Encrypt - CCM - Invalid operation state [Check 9] Test psa_aead_update - Decrypt - CCM [Check 10] Test psa_aead_update - Decrypt - CCM - Tag length = 4 [Check 11] Test psa_aead_update - Decrypt - CCM - Zero ad_length [Check 12] Test psa_aead_update - Decrypt - CCM - Zero plaintext_length [Check 13] Test psa_aead_update - Decrypt - CCM - Small buffer size [Check 14] Test psa_aead_update - Decrypt - Less add data than specified [Check 15] Test psa_aead_update - Decrypt - CCM - Overflow input length [Check 16] Test psa_aead_update - Decrypt - CCM - Invalid operation state TEST RESULT: PASSED ****************************************** TEST: 259 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_finish [Info] Executing tests from non-secure [Check 1] Test psa_aead_finish - AES-CCM [Check 2] Test psa_aead_finish - AES-CCM 24 bytes Tag length = 4 [Check 3] Test psa_aead_finish - Small buffer size [Check 4] Test psa_aead_finish - Input length is less than plaintext length [Check 5] Test psa_aead_finish - GCM - 16B AES - 12B Nonce & 12B additional data TEST RESULT: PASSED ****************************************** TEST: 260 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_abort [Info] Executing tests from non-secure [Check 1] Test psa_aead_abort - Encrypt - CCM - AES [Check 2] Test psa_aead_abort - Encrypt - GCM - AES [Check 3] Test psa_aead_abort - Decrypt - CCM - AES [Check 4] Test psa_aead_abort - Decrypt - GCM - AES [Check 5] Test psa_aead_abort with all initializations TEST RESULT: PASSED ****************************************** TEST: 261 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_verify [Info] Executing tests from non-secure [Check 1] Test psa_aead_verify - AES-CCM [Check 2] Test psa_aead_verify - AES-CCM 24 bytes Tag length = 4 [Check 3] Test psa_aead_verify - Small buffer size [Check 4] Test psa_aead_verify - Input length is less than plaintext length [Check 5] Test psa_aead_verify - GCM - 16B AES - 12B Nounce & 12B addi data TEST RESULT: PASSED ****************************************** TEST: 262 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_suspend [Info] Executing tests from non-secure [Check 1] Test psa_hash_suspend - MD5 Failed at Checkpoint: 5 Actual: -134 Expected: 0 TEST RESULT: FAILED (Error Code=0x1) ****************************************** TEST: 263 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_resume [Info] Executing tests from non-secure [Check 1] Test psa_hash_resume - MD5 Failed at Checkpoint: 5 Actual: -134 Expected: 0 TEST RESULT: FAILED (Error Code=0x1) ****************************************** ************ Crypto Suite Report ********** TOTAL TESTS : 63 TOTAL PASSED : 60 TOTAL SIM ERROR : 0 TOTAL FAILED : 3 TOTAL SKIPPED : 0 ******************************************
Tags
Subscribers
None
- Last Author
- mardyk01
- Last Edited
- Feb 3 2023, 3:15 PM