OP-TEE SPMC v3.21 test results
OP-TEE SPMC v3.21 test results
Overview
This page is to capture the test results for OP-TEE SPMC v3.21
The tests were ran using the following set of components:
>> Manifest status beb79c2 (HEAD -> default, origin/master, m/master) qemu_v8: Pin optee_rust to the latest version e959680 fvp-ts: Update arm-ffa-user, arm-ffa-tee version a960a67 make_stable.sh: only modify "project" elements Local manifests: .repo/local_manifests/v321.xml <?xml version="1.0" encoding="UTF-8"?> <manifest> <remove-project name="OP-TEE/build.git" path="build" /> <!-- Add build fixed on review. --> <project name="OP-TEE/build.git" path="build" revision="refs/pull/642/head"> <linkfile dest="build/Makefile" src="fvp-psa-sp.mk" /> </project> <extend-project path="trusted-services" name="TS/trusted-services.git" revision="integration" remote="tfo" /> </manifest> The merged manifest is: <?xml version="1.0" encoding="UTF-8"?> <manifest> <remote fetch="https://git.gitlab.arm.com" name="arm-gitlab"/> <remote fetch="https://github.com" name="github"/> <remote fetch="https://github.com" name="github-pfts"/> <remote fetch="https://git.gitlab.arm.com/" name="gitlab-fvtcov"/> <remote fetch="https://gerrit.oss.arm.com" name="oss"/> <remote fetch="https://git.savannah.gnu.org/git" name="savannah"/> <remote fetch="https://sourceware.org" name="sourceware-pfts"/> <remote fetch="https://git.trustedfirmware.org" name="tfo"/> <remote fetch="https://git.trustedfirmware.org" name="tforg-pfts"/> <default remote="github" revision="master"/> <project name="Mbed-TLS/mbedtls.git" path="mbedtls" revision="refs/tags/mbedtls-2.28.1"/> <project groups="local::v321" name="OP-TEE/build.git" path="build" revision="refs/pull/642/head"> <linkfile dest="build/Makefile" src="fvp-psa-sp.mk"/> </project> <project name="OP-TEE/optee_client.git" path="optee_client"/> <project name="OP-TEE/optee_os.git" path="optee_os"/> <project name="OP-TEE/optee_test.git" path="optee_test"/> <project clone-depth="1" name="TF-A/trusted-firmware-a.git" path="trusted-firmware-a" remote="tfo" revision="refs/tags/v2.8"/> <project name="TS/trusted-services.git" path="trusted-services" remote="tfo" revision="integration"/> <project clone-depth="1" name="buildroot/buildroot.git" path="buildroot" revision="refs/tags/2022.11.1"/> <project clone-depth="1" name="grub.git" path="grub" remote="savannah" revision="refs/tags/grub-2.02"/> <project name="linaro-swg/optee_examples.git" path="optee_examples"/> <project clone-depth="1" name="linux-arm/linux-trusted-services.git" path="linux-arm-ffa-user" remote="arm-gitlab" revision="debugfs-v5"/> <project clone-depth="1" name="linux-arm/linux-trusted-services.git" path="linux-arm-ffa-tee" remote="arm-gitlab" revision="tee-v1"/> <project name="tianocore/edk2-platforms.git" path="edk2-platforms" revision="02daa58c21f89628b4d8c76f95f3a554289149bc"/> <project name="tianocore/edk2.git" path="edk2" revision="dd4cae4d82c7477273f3da455084844db5cca0c0"/> <project clone-depth="1" name="torvalds/linux.git" path="linux" revision="refs/tags/v6.1"/> </manifest> >>>Project status project build/ Local and remote SHA is matching. 4f73ead (HEAD, m/master, refs/pull/642/head) fvp: Make RPC protocol UUID feature backwards compatible a1cefcf fvp: Increase the reserved the memory area of SPM test SPs 7ab5886 fvp: Set DTC_CPPFLAGS in TF-A build project buildroot/ Local and remote SHA is matching. d48a8beb (grafted, HEAD, tag: 2022.11.1, tag: m/master) Update for 2022.11.1 project edk2/ Local and remote SHA is matching. dd4cae4d82 (HEAD, m/master) ArmPkg/GenericWatchdogDxe: Split 64bit register write to 2x32bit 1d802e234e BaseTools: Guid.xref doesn't specify the correct GUID value for Driver 83964ebc5e BaseTools/BinToPcd: Encode string returned from ByteArray() project edk2-platforms/ Local and remote SHA is matching. 02daa58c21 (HEAD, m/master) Silicon/SynQuacer: Add status property in PCIe & SDHC DT nodes 9f02ebc19b Silicon/SynQuacer: add optional OP-TEE DT node 9dae9a0c79 Marvell/Library: ComPhyLib: Clean up the library after rework project grub/ Local and remote SHA is matching. e54c99a (grafted, HEAD, tag: grub-2.02, tag: m/master) Increase version to 2.02. project linux/ Local and remote SHA is matching. 830b3c68c (grafted, HEAD, tag: v6.1, tag: m/master) Linux 6.1 project linux-arm-ffa-tee/ >>>>>>>>>>>>>>>>>>>>>>>> Local SHA c6b94955ac492d27764681d26ffd5be98786cdd1 is not matching remote SHA c6b94955ac492d27764681d26ffd5be98786cdd1 3b543b7591505b715f332c972248a3ea41604d83. >>>>>>>>>>>>>>>>>>>>>>>> c6b9495 (grafted, HEAD, m/master, arm-gitlab/tee-v1) Add versioning info to readme project linux-arm-ffa-user/ Local and remote SHA is matching. 18e3be7 (grafted, HEAD, m/master, arm-gitlab/debugfs-v5) Add support for FF-A driver changes in v6.1 project mbedtls/ Local and remote SHA is matching. dd79db100 (HEAD, tag: v2.28.1, tag: mbedtls-2.28.1, tag: m/master) Merge pull request #955 from Mbed-TLS/mbedtls-2.28.1rc0-pr fe9d08fd1 Bump version fa827b4b3 Minor tweaks to Changelog project optee_client/ Local and remote SHA is matching. 8533e0e (HEAD, m/master, github/master) travis: remove the .travis.yml file 0fc6ef7 tee-supplicant: fix leak when load plugin failed dde6306 libteeacl: use realloc() instead of reallocarray() project optee_examples/ Local and remote SHA is matching. a98d01e (HEAD, tag: 3.20.0-rc1, tag: 3.20.0, m/master, github/master) pluging: add missing of dependency syslog on teec 3ca8454 Enable compatibility with TEE Internal Core API v1.1 f301ee9 (tag: 3.19.0-rc1, tag: 3.19.0, tag: 3.18.0-rc1, tag: 3.18.0) plugins: fix formatting string of the syslog() project optee_os/ Local and remote SHA is matching. 32b94ed4 (HEAD, m/master, github/master) drivers: caam: fix MP abstraction layer functions 4a0740da drivers: caam: math: add CFG_NXP_CAAM_MATH_DRV compilation flag 44220a36 libtomcrypt: fix pkcs_1_v1_5_decode() when empty message project optee_test/ Local and remote SHA is matching. 178f3b1 (HEAD, m/master, github/master) xtest: regression_6016: use 3 threads instead of 4 ac0f210 xtest: pkcs11: update SO PIN automatically if needed c6c4219 xtest: pkcs11: fix subcase name mismatch project trusted-firmware-a/ Local and remote SHA is matching. 9881bb9 (grafted, HEAD, tag: v2.8, tag: m/master) Merge "docs(spm): update threat model" into integration project trusted-services/ Local and remote SHA is matching. 420bf2a (HEAD, tfo/integration, m/master) Fix variable attributes in SmmVariableServiceTests 76999fc fix: Remove trailing space from NUMBER_OF_PROCESSORS variable e220413 Remove incremental sp_layout.json build
Details
Config 1: embedded SP (default)
Build command
make
Setup steps after boot
/mnt/host/out/linux-arm-ffa-tee/load_module.sh /mnt/host/out/linux-arm-ffa-user/load_module.sh cp -at /usr /mnt/host/out/ts-install/arm-linux/bin /mnt/host/out/ts-install/arm-linux/lib
Test results
OP-TEE xtest (incl. SPMC tests)
# xtest -t ffa_spmc Run test suite with level=0 TEE test application started over default TEE instance ###################################################### # # ffa_spmc # ###################################################### * ffa_spmc_1001 Test FF-A communication o ffa_spmc_1001.1 SP1 comms check ffa_spmc_1001.1 OK o ffa_spmc_1001.2 Sp2 comms check ffa_spmc_1001.2 OK o ffa_spmc_1001.3 SP to SP messaging check ffa_spmc_1001.3 OK ffa_spmc_1001 OK * ffa_spmc_1002 Test FF-A memory: share memory from Normal World to SP o ffa_spmc_1002.1 Test memory set-up ffa_spmc_1002.1 OK o ffa_spmc_1002.2 Test retrieve memory second time ffa_spmc_1002.2 OK o ffa_spmc_1002.3 Test accessing memory ffa_spmc_1002.3 OK o ffa_spmc_1002.4 Test relinquish memory ffa_spmc_1002.4 OK o ffa_spmc_1002.5 Test incorrect reclaim ffa_spmc_1002.5 OK o ffa_spmc_1002.6 Test relinquish memory second time ffa_spmc_1002.6 OK o ffa_spmc_1002.7 Test correct reclaim ffa_spmc_1002.7 OK o ffa_spmc_1002.8 Test retrieve invalid memory region ffa_spmc_1002.8 OK ffa_spmc_1002 OK * ffa_spmc_1003 Test FF-A memory: SP to SP ffa_spmc_1003 OK * ffa_spmc_1004 Test FF-A memory: Access and flags o ffa_spmc_1004.1 Test sharing with exc access ffa_spmc_1004.1 OK o ffa_spmc_1004.2 Test sharing with incorrect access ffa_spmc_1004.2 OK ffa_spmc_1004 OK +----------------------------------------------------- Result of testsuite ffa_spmc: ffa_spmc_1001 OK ffa_spmc_1002 OK ffa_spmc_1003 OK ffa_spmc_1004 OK +----------------------------------------------------- 39 subtests of which 0 failed 4 test cases of which 0 failed 0 test cases were skipped TEE test application done!
Trusted Services service level test
# ts-service-test -v TEST(PsServiceTests, createAndSetExtended) - 72280 ms TEST(PsServiceTests, createAndSet) - 115622 ms TEST(PsServiceTests, storeNewItem) - 78050 ms TEST(ItsServiceTests, storeNewItem) - 78058 ms TEST(AttestationProvisioningTests, provisionedIak) - 101075 ms TEST(AttestationProvisioningTests, selfGeneratedIak) - 180849 ms TEST(AttestationServiceTests, repeatedOperation) - 21148612 ms TEST(AttestationServiceTests, invalidChallengeLen)[ 178.773456] ------------[ cut here ]------------ [ 178.773599] WARNING: CPU: 1 PID: 198 at mm/page_alloc.c:5534 __alloc_pages+0x684/0xd20 [ 178.773851] Modules linked in: arm_ffa_tee(O) [ 178.774063] CPU: 1 PID: 198 Comm: ts-service-test Tainted: G O 6.1.0 #3 [ 178.774299] Hardware name: FVP Base RevC (DT) [ 178.774410] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 178.774670] pc : __alloc_pages+0x684/0xd20 [ 178.774844] lr : alloc_pages+0xac/0x160 [ 178.775034] sp : ffff80000abd3a90 [ 178.775152] x29: ffff80000abd3a90 x28: 0000000000000015 x27: ffff000803b15880 [ 178.775413] x26: 0000000000000000 x25: 0000000000000005 x24: 0000000000001000 [ 178.775712] x23: ffff000803b15980 x22: 0000000000000015 x21: 0000000000000000 [ 178.775972] x20: 0000000000000015 x19: 0000000000000000 x18: 0000000000000000 [ 178.776263] x17: 0000000000000000 x16: 0000000000000000 x15: 0000fffffac425d8 [ 178.776541] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000 [ 178.776801] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000 [ 178.776999] x8 : ffff000803b15a00 x7 : 0000000000000000 x6 : 0000000000000228 [ 178.777360] x5 : 0000000000000000 x4 : ffff000800bfc9c0 x3 : 0000000000000000 [ 178.777621] x2 : 0000000000000000 x1 : 0000000000000001 x0 : ffff80000a565000 [ 178.777901] Call trace: [ 178.778016] __alloc_pages+0x684/0xd20 [ 178.778147] alloc_pages+0xac/0x160 [ 178.778363] pool_op_alloc+0x54/0x17c [arm_ffa_tee] [ 178.778639] shm_alloc_helper+0x98/0x110 [ 178.778836] tee_shm_alloc_user_buf+0x74/0x11c [ 178.779009] tee_ioctl+0xa70/0xf9c [ 178.779212] __arm64_sys_ioctl+0xa8/0xf0 [ 178.779376] invoke_syscall+0x48/0x114 [ 178.779578] el0_svc_common.constprop.0+0x44/0xfc [ 178.779703] do_el0_svc+0x30/0xd0 [ 178.779964] el0_svc+0x2c/0x84 [ 178.780137] el0t_64_sync_handler+0xbc/0x140 [ 178.780311] el0t_64_sync+0x18c/0x190 [ 178.780500] ---[ end trace 0000000000000000 ]--- ffa_tee_share_mem():212 error: 12 - 22612 ms TEST(AttestationServiceTests, checkTokenSize) - 212404 ms TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 24609 ms TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 28062 ms TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 33242 ms TEST(CryptoMacServicePackedcTests, macAbort) - 19748 ms TEST(CryptoMacServicePackedcTests, signAndVerify) - 130453 ms TEST(CryptoCipherServicePackedcTests, cipherAbort) - 20009 ms TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 89151 ms TEST(CryptoHashServicePackedcTests, hashAbort) - 22025 ms TEST(CryptoHashServicePackedcTests, hashAndVerify) - 38781 ms TEST(CryptoHashServicePackedcTests, calculateHash) - 14134 ms TEST(CryptoServicePackedcTests, generateRandomNumbers) - 43556 ms TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 5028651 ms TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 871075 ms TEST(CryptoServicePackedcTests, signAndVerifyEat) - 1047118 ms TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 1114626 ms TEST(CryptoServicePackedcTests, signAndVerifyHash) - 1115339 ms TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 229428 ms TEST(CryptoServicePackedcTests, exportPublicKey) - 241528 ms TEST(CryptoServicePackedcTests, purgeKey) - 164901 ms TEST(CryptoServicePackedcTests, copyKey) - 621930 ms TEST(CryptoServicePackedcTests, generatePersistentKeys) - 315919 ms TEST(CryptoServicePackedcTests, generateVolatileKeys) - 187055 ms TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 45385 ms TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 4674727 ms TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 883578 ms TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 1107593 ms TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 1111888 ms TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 230639 ms TEST(CryptoServiceProtobufTests, exportPublicKey) - 243159 ms TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 315640 ms TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 186269 ms TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 64664791 ms TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 5438836 ms TEST(DiscoveryServiceTests, checkServiceInfo) - 3876 ms OK (43 tests, 43 ran, 763 checks, 0 ignored, 0 filtered out, 112334897 ms)
PSA Architecture Test Suite
# psa-ps-api-test ***** PSA Architecture Test Suite - Version 1.4 ***** Running.. Storage Suite ****************************************** TEST: 401 | DESCRIPTION: UID not found check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Call get API for UID 6 which is not set [Check 2] Call get_info API for UID 6 which is not set [Check 3] Call remove API for UID 6 which is not set [Check 4] Call get API for UID 6 which is removed [Check 5] Call get_info API for UID 6 which is removed [Check 6] Call remove API for UID 6 which is removed Set storage for UID 6 [Check 7] Call get API for different UID 5 [Check 8] Call get_info API for different UID 5 [Check 9] Call remove API for different UID 5 TEST RESULT: PASSED ****************************************** TEST: 402 | DESCRIPTION: Write once error check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Update the flag of UID 1 with WRITE_ONCE flag [Check 2] Try to remove the UID 1 having WRITE_ONCE flag [Check 3] Create a new UID 2 with WRITE_ONCE flag [Check 4] Try to remove the UID 2 having WRITE_ONCE flag [Check 5] Try to change the length of write_once UID 2 [Check 6] Check UID removal still fails [Check 7] Try to change the WRITE_ONCE flag to None for UID 2 [Check 8] Check UID removal still fails TEST RESULT: PASSED ****************************************** TEST: 403 | DESCRIPTION: Insufficient space check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Overload storage space UID 13 set failed due to insufficient space Remove all registered UIDs [Check 2] Overload storage again to verify all previous UID removed UID 13 set failed due to insufficient space Remove all registered UIDs TEST RESULT: PASSED ****************************************** TEST: 404 | DESCRIPTION: Data Consistency check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2 [Check 2] Call get API with default length - TEST_BUFF_SIZE TEST RESULT: PASSED ****************************************** TEST: 405 | DESCRIPTION: Success scenarios check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Set UID with data length zero and call storage APIs [Check 2] Resetting the length check TEST RESULT: PASSED ****************************************** TEST: 406 | DESCRIPTION: Check for storage create flags | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE [Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY [Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION TEST RESULT: PASSED ****************************************** TEST: 407 | DESCRIPTION: Incorrect Size check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Create a valid Storage - TEST_BUFF_SIZE/2 Increase the length of storage - TEST_BUFF_SIZE [Check 1] Call get API with old length - TEST_BUFF_SIZE/2 [Check 2] Call get API with old length - TEST_BUFF_SIZE/4 Decrease the length of storage - TEST_BUFF_SIZE/4 [Check 3] Call get API with old length - TEST_BUFF_SIZE/2 [Check 4] Call get API with old length - TEST_BUFF_SIZE [Check 5] Call get API with valid length - TEST_BUFF_SIZE/4 TEST RESULT: PASSED ****************************************** TEST: 408 | DESCRIPTION: Invalid offset check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Try to access data with varying valid offset [Check 2] Try to access data with varying invalid offset TEST RESULT: PASSED ****************************************** TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Call set API with NULL pointer and data length 0 [Check 2] Call get API with NULL read buffer and data length 0 [Check 3] Remove the UID [Check 4] Call get_info API to verify UID removed [Check 5] Create UID with zero data_len and valid write buffer [Check 8] Call get API with NULL read buffer and data length 0 [Check 9] Increase the length TEST RESULT: PASSED ****************************************** TEST: 410 | DESCRIPTION: UID value zero check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Creating storage with UID 0 should fail [Check 2] Get_info for UID 0 should fail [Check 3] Removing storage with UID 0 should fail TEST RESULT: PASSED ****************************************** TEST: 411 | DESCRIPTION: Optional APIs: UID not found check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs are not supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 412 | DESCRIPTION: Optional APIs: Invalid arguments and offset invalid | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs are not supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 413 | DESCRIPTION: Set_Extended and Create api : Success | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs are not supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 414 | DESCRIPTION: Optional APIs not supported check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Optional PS APIs are not supported. [Check 1] Call to create API should fail as API not supported Failed at Checkpoint: 1 Actual: 0 Expected: -134 TEST RESULT: FAILED (Error Code=0x1) ****************************************** TEST: 415 | DESCRIPTION: Create API write_once flag value check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs are not supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 416 | DESCRIPTION: Storage assest capacity modification check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs not are supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 417 | DESCRIPTION: Storage assest capacity modification check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs not are supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** ************ Storage Suite Report ********** TOTAL TESTS : 17 TOTAL PASSED : 10 TOTAL SIM ERROR : 0 TOTAL FAILED : 1 TOTAL SKIPPED : 6 ****************************************** Entering standby..
# psa-crypto-api-test ***** PSA Architecture Test Suite - Version 1.4 ***** Running.. Crypto Suite ****************************************** TEST: 201 | DESCRIPTION: Testing crypto key management APIs | UT: psa_crypto_init [Info] Executing tests from non-secure [Check 1] Test calling crypto functions before psa_crypto_init [Check 2] Test psa_crypto_init [Check 3] Test multiple psa_crypto_init TEST RESULT: PASSED ****************************************** TEST: 202 | DESCRIPTION: Testing crypto key management APIs | UT: psa_import_key [Info] Executing tests from non-secure [Check 1] Test psa_import_key 16 bytes AES [Check 2] Test psa_import_key 24 bytes AES [Check 3] Test psa_import_key 32 bytes AES [Check 4] Test psa_import_key 2048 RSA public key [Check 5] Test psa_import_key with RSA 2048 keypair [Check 6] Test psa_import_key with DES 8 bytes key [Check 7] Test psa_import_key with Triple DES 2-Key [Check 8] Test psa_import_key with Triple DES 3-Key [Check 9] Test psa_import_key with EC Public key [Check 10] Test psa_import_key with EC keypair [Check 11] Test psa_import_key 16 bytes AES with invalid bits [Check 12] Test psa_import_key with key data greater than the algorithm size [Check 13] Test psa_import_key with incorrect key data size [Check 14] Test psa_import_key with invalid key type value TEST RESULT: PASSED ****************************************** TEST: 203 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_key [Info] Executing tests from non-secure [Check 1] Test psa_export_key 16 Byte AES [Check 2] Test psa_export_key 24 Byte AES [Check 3] Test psa_export_key 32 Byte AES [Check 4] Test psa_export_key 2048 RSA public key [Check 5] Test psa_export_key with RSA 2048 keypair [Check 6] Test psa_export_key with DES 64 bit key [Check 7] Test psa_export_key with Triple DES 2-Key [Check 8] Test psa_export_key with Triple DES 3-Key [Check 9] Test psa_export_key with EC Public key [Check 10] Test psa_export_key with EC keypair [Check 11] Test psa_export_key with key policy verify [Check 12] Test psa_export_key with less buffer size TEST RESULT: PASSED ****************************************** TEST: 204 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_public_key [Info] Executing tests from non-secure [Check 1] Test psa_export_public_key 16 Byte AES [Check 2] Test psa_export_public_key 24 Byte AES [Check 3] Test psa_export_public_key 32 Byte AES [Check 4] Test psa_export_public_key 2048 RSA public key [Check 5] Test psa_export_public_key with RSA 2048 keypair [Check 6] Test psa_export_public_key with DES 64 bit key [Check 7] Test psa_export_public_key with Triple DES 2-Key [Check 8] Test psa_export_public_key with Triple DES 3-Key [Check 9] Test psa_export_public_key with EC Public key [Check 10] Test psa_export_public_key with EC keypair [Check 11] Test psa_export_public_key with less buffer size TEST RESULT: PASSED ****************************************** TEST: 205 | DESCRIPTION: Testing crypto key management APIs | UT: psa_destroy_key [Info] Executing tests from non-secure [Check 1] Test psa_destroy_key 16 Byte AES [Check 2] Test psa_destroy_key 24 Byte AES [Check 3] Test psa_destroy_key 32 Byte AES [Check 4] Test psa_destroy_key 2048 RSA public key [Check 5] Test psa_destroy_key with RSA 2048 keypair [Check 6] Test psa_destroy_key with DES 64 bit key [Check 7] Test psa_destroy_key with Triple DES 2-Key [Check 8] Test psa_destroy_key with Triple DES 3-Key [Check 9] Test psa_destroy_key with EC Public key [Check 10] Test psa_destroy_key with EC keypair TEST RESULT: PASSED ****************************************** TEST: 206 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compute [Info] Executing tests from non-secure [Check 1] Test psa_hash_compute with MD5 algorithm [Check 2] Test psa_hash_compute with RIPEMD160 algorithm [Check 3] Test psa_hash_compute with SHA1 algorithm [Check 4] Test psa_hash_compute with SHA224 algorithm [Check 5] Test psa_hash_compute with SHA256 algorithm [Check 6] Test psa_hash_compute with SHA384 algorithm [Check 7] Test psa_hash_compute with SHA512 algorithm [Check 8] Test psa_hash_compute with small buffer size [Check 9] Test psa_hash_compute with invalid algorithm TEST RESULT: PASSED ****************************************** TEST: 207 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compare [Info] Executing tests from non-secure [Check 1] Test psa_hash_compare with MD5 algorithm [Check 2] Test psa_hash_compare with RIPEMD160 algorithm [Check 3] Test psa_hash_compare with SHA1 algorithm [Check 4] Test psa_hash_compare with SHA224 algorithm [Check 5] Test psa_hash_compare with SHA256 algorithm [Check 6] Test psa_hash_compare with SHA384 algorithm [Check 7] Test psa_hash_compare with SHA512 algorithm [Check 8] Test psa_hash_compare with incorrect hash [Check 9] Test psa_hash_compare with incorrect hash length [Check 10] Test psa_hash_compare with invalid algorithm TEST RESULT: PASSED ****************************************** TEST: 208 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_setup [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_setup - ECDH + HKDF-SHA-256 [Check 2] Test psa_key_derivation_setup - ECDH, unknown KDF [Check 3] Test psa_key_derivation_setup - bad key derivation algorithm [Check 4] Test psa_key_derivation_setup - Invalid Algorithm TEST RESULT: PASSED ****************************************** TEST: 209 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_bytes [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_input_bytes - Step as Info [Check 2] Test psa_key_derivation_input_bytes - Step as secret [Check 3] Test psa_key_derivation_input_bytes - Step as salt [Check 4] Test psa_key_derivation_input_bytes - Step as label [Check 5] Test psa_key_derivation_input_bytes - Step as seed [Check 6] Test psa_key_derivation_input_bytes - Invalid step TEST RESULT: PASSED ****************************************** TEST: 210 | DESCRIPTION: Testing crypto key attributes APIs | UT: psa_key_attributes_set_get [Info] Executing tests from non-secure [Check 1] Test psa_key_attributes_set_get key attributes TEST RESULT: PASSED ****************************************** TEST: 211 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_setup [Info] Executing tests from non-secure [Check 1] Test psa_hash_setup with MD5 algorithm [Check 2] Test psa_hash_setup with RIPEMD160 algorithm [Check 3] Test psa_hash_setup with SHA1 algorithm [Check 4] Test psa_hash_setup with SHA224 algorithm [Check 5] Test psa_hash_setup with SHA256 algorithm [Check 6] Test psa_hash_setup with SHA384 algorithm [Check 7] Test psa_hash_setup with SHA512 algorithm [Check 8] Test psa_hash_setup with Invalid hash algorithm [Check 9] Test psa_hash_setup with Invalid algorithm [Check 10] Test psa_hash_setup with CTR algorithm TEST RESULT: PASSED ****************************************** TEST: 212 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_update [Info] Executing tests from non-secure [Check 1] Test psa_hash_update with MD5 algorithm [Check 2] Test psa_hash_update with RIPEMD160 algorithm [Check 3] Test psa_hash_update with SHA1 algorithm [Check 4] Test psa_hash_update with SHA224 algorithm [Check 5] Test psa_hash_update with SHA256 algorithm [Check 6] Test psa_hash_update with SHA384 algorithm [Check 7] Test psa_hash_update with SHA512 algorithm [Check 8] Test psa_hash_update without hash setup [Check 9] Test psa_hash_update with completed opertaion handle TEST RESULT: PASSED ****************************************** TEST: 213 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_verify [Info] Executing tests from non-secure [Check 1] Test psa_hash_verify with MD5 algorithm [Check 2] Test psa_hash_verify with RIPEMD160 algorithm [Check 3] Test psa_hash_verify with SHA1 algorithm [Check 4] Test psa_hash_verify with SHA224 algorithm [Check 5] Test psa_hash_verify with SHA256 algorithm [Check 6] Test psa_hash_verify with SHA384 algorithm [Check 7] Test psa_hash_verify with SHA512 algorithm [Check 8] Test psa_hash_verify with incorrect expected hash [Check 9] Test psa_hash_verify with incorrect hash length [Check 10] test psa_hash_verify with inactive & invalid operation handle TEST RESULT: PASSED ****************************************** TEST: 214 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_finish [Info] Executing tests from non-secure [Check 1] Test psa_hash_finish with MD5 algorithm [Check 2] Test psa_hash_finish with RIPEMD160 algorithm [Check 3] Test psa_hash_finish with SHA1 algorithm [Check 4] Test psa_hash_finish with SHA224 algorithm [Check 5] Test psa_hash_finish with SHA256 algorithm [Check 6] Test psa_hash_finish with SHA384 algorithm [Check 7] Test psa_hash_finish with SHA512 algorithm [Check 8] Test psa_hash_finish with invalid hash buffer size [Check 9] test psa_hash_finish with inactive operation handle TEST RESULT: PASSED ****************************************** TEST: 215 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_abort [Info] Executing tests from non-secure [Check 1] Test psa_hash_abort with MD5 algorithm [Check 2] Test psa_hash_abort with RIPEMD160 algorithm [Check 3] Test psa_hash_abort with SHA1 algorithm [Check 4] Test psa_hash_abort with SHA224 algorithm [Check 5] Test psa_hash_abort with SHA256 algorithm [Check 6] Test psa_hash_abort with SHA384 algorithm [Check 7] Test psa_hash_abort with SHA512 algorithm [Check 8] Test psa_hash_finish after calling psa_hash_abort TEST RESULT: PASSED ****************************************** TEST: 216 | DESCRIPTION: Testing crypto generator functions APIs | UT: psa_generate_key [Info] Executing tests from non-secure [Check 1] Test psa_generate_key 16 Byte AES [Check 2] Test psa_generate_key 24 Byte AES [Check 3] Test psa_generate_key 32 Byte AES [Check 4] Test psa_generate_key with DES 64 bit key [Check 5] Test psa_generate_key with Triple DES 2-Key [Check 6] Test psa_generate_key with Triple DES 3-Key [Check 7] Test psa_generate_key with RSA 2048 Keypair [ 761.647399] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 761.647599] rcu: 0-...0: (0 ticks this GP) idle=d3fc/1/0x4000000000000000 softirq=1082/1082 fqs=2625 [ 761.647936] (detected by 3, t=5252 jiffies, g=3845, q=7 ncpus=8) [ 761.648099] Task dump for CPU 0: [ 761.648244] task:psa-crypto-api- state:R running task stack:0 pid:206 ppid:188 flags:0x00000002 [ 761.648543] Call trace: [ 761.648630] __switch_to+0xe4/0x160 [ 761.648799] __arm_ffa_fn_smc+0x0/0x20 [ 824.671399] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 824.671499] rcu: 0-...0: (0 ticks this GP) idle=d3fc/1/0x4000000000000000 softirq=1082/1082 fqs=10503 [ 824.671799] (detected by 3, t=21008 jiffies, g=3845, q=8 ncpus=8) [ 824.671999] Task dump for CPU 0: [ 824.672199] task:psa-crypto-api- state:R running task stack:0 pid:206 ppid:188 flags:0x00000002 [ 824.672499] Call trace: [ 824.672599] __switch_to+0xe4/0x160 [ 824.672803] __arm_ffa_fn_smc+0x0/0x20 [Check 8] Test psa_generate_key with ECC KeyPair [Check 9] Test psa_generate_key with RSA 2048 Public key [Check 10] Test psa_generate_key with invalid key type [Check 11] Test psa_generate_key with invalid usage flags TEST RESULT: PASSED ****************************************** TEST: 217 | DESCRIPTION: Testing crypto generation APIs | UT: psa_generate_random [Info] Executing tests from non-secure [Check 1] Test psa_generate_random to get 0 Byte data [Check 2] Test psa_generate_random to get 16 Byte data [Check 3] Test psa_generate_random to get 24 Byte data [Check 4] Test psa_generate_random to get 32 Byte data [Check 5] Test psa_generate_random to get 64 Byte data [Check 6] Test psa_generate_random to get 128 Byte data [Check 7] Test psa_generate_random to get 256 Byte data [Check 8] Test psa_generate_random to get 512 Byte data [Check 9] Test psa_generate_random to get 1000 Byte data TEST RESULT: PASSED ****************************************** TEST: 218 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_key [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_input_key 16 Byte Key [Check 2] Test psa_key_derivation_input_key with invalid usage [Check 3] Test psa_key_derivation_input_key with step as label [Check 4] Test psa_key_derivation_input_key with step as info [Check 5] Test psa_key_derivation_input_key with step as seed [Check 6] Test psa_key_derivation_input_key with step as salt [Check 7] Test psa_key_derivation_input_key with key type as AES(not derive) [Check 8] Test psa_key_derivation_input_key incorrect key algorithm [Check 9] Test psa_key_derivation_input_key with key type as 2048 RSA public key [Check 10] Test psa_key_derivation_input_key with key type as RSA 2048 keypair [Check 11] Test psa_key_derivation_input_key with zero as step [Check 12] Test psa_cipher_decrypt_setup - Invalid key handle [Check 13] Test psa_cipher_decrypt_setup - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 219 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_key_agreement [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_key_agreement - ECDH SECP256R1 [Check 2] Test psa_key_derivation_key_agreement - Invalid step [Check 3] Test psa_key_derivation_key_agreement - ECDH SECP384R1 [Check 4] Test psa_key_derivation_key_agreement - Invalid usage [Check 5] Test psa_key_derivation_key_agreement - KDF not a key agreement alg [Check 6] Test psa_key_derivation_key_agreement - Public key of different curve [Check 7] Test psa_key_derivation_key_agreement - Pub key instead of Prv key [Check 8] Test psa_key_derivation_key_agreement - Invalid handle [Check 9] Test psa_key_derivation_key_agreement - Zero as handle TEST RESULT: PASSED ****************************************** TEST: 220 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_bytes [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_output_bytes - HKDF [Check 2] Test psa_key_derivation_output_bytes - optional salt [Check 3] Test psa_key_derivation_output_bytes - capacity < output_length [Check 4] Test psa_key_derivation_output_bytes - missing info [Check 5] Test psa_key_derivation_output_bytes - missing salt/secret/info [Check 6] Test psa_key_derivation_output_bytes - TLS12_PRF [Check 7] Test psa_key_derivation_output_bytes - capacity < output_length [Check 8] Test psa_key_derivation_output_bytes - missing seed/secret/label TEST RESULT: PASSED ****************************************** TEST: 221 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_key [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_output_key - Key [Check 2] Test psa_key_derivation_output_key - Info [Check 3] Test psa_key_derivation_output_key - Salt [Check 4] Test psa_key_derivation_output_key - Greater Capacity than available [Check 5] Test psa_key_derivation_output_key - ECC Public key [Check 6] Test psa_key_derivation_output_key - ECC keypair (wrong key length) [Check 7] Test psa_key_derivation_output_key - RSA Public Key[Check 8] Test psa_key_derivation_output_key - RSA keypair [Check 9] Test psa_key_derivation_output_key - Invalid key size TEST RESULT: PASSED ****************************************** TEST: 222 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_abort [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_abort TEST RESULT: PASSED ****************************************** TEST: 223 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_set_get_capacity [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_set_get_capacity - < operation's capacity [Check 2] Test psa_key_derivation_set_get_capacity - = operation's capacity [Check 3] Test psa_key_derivation_set_get_capacity - > operation's capacity [Check 4] Test psa_key_derivation_set_get_capacity - unchanged capacity TEST RESULT: PASSED ****************************************** TEST: 224 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt [Info] Executing tests from non-secure [Check 1] Test psa_aead_encrypt - CCM - AES - 13B nonce & 8B add data [Check 2] Test psa_aead_encrypt - CCM - AES - 13B nonce & 32B add data [Check 3] Test psa_aead_encrypt - CCM - AES - 24 bytes Tag length = 4 [Check 4] Test psa_aead_encrypt - CCM - AES - Zero additional data [Check 5] Test psa_aead_encrypt - CCM - AES - Zero plaintext [Check 6] Test psa_aead_encrypt - GCM - AES - 12B nonce & 12B add data [Check 7] Test psa_aead_encrypt - Unsupported algorithm [Check 8] Test psa_aead_encrypt - Invalid usage flag [Check 9] Test psa_aead_encrypt - Invalid ciphertext_size [Check 10] Test psa_aead_encrypt - Invalid nonce [Check 11] Test psa_aead_encrypt - Invalid tag length 0 TEST RESULT: PASSED ****************************************** TEST: 225 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt [Info] Executing tests from non-secure [Check 1] Test psa_aead_decrypt - CCM - AES - 13B nonce & 8B add data [Check 2] Test psa_aead_decrypt - CCM - AES - 13B nonce & 32B add data [Check 3] Test psa_aead_decrypt - CCM - AES - 24 bytes Tag length = 4 [Check 4] Test psa_aead_decrypt - CCM - AES - Zero additional data [Check 5] Test psa_aead_decrypt - CCM - AES - Zero plaintext [Check 6] Test psa_aead_decrypt - GCM - AES - 12B nonce & 12B add data [Check 7] Test psa_aead_decrypt - Unsupported algorithm [Check 8] Test psa_aead_decrypt - Invalid usage flag [Check 9] Test psa_aead_decrypt - Invalid plaintext_size [Check 10] Test psa_aead_decrypt - Invalid nonce [Check 11] Test psa_aead_decrypt - Invalid cihpertext [Check 12] Test psa_aead_decrypt - Invalid cihpertext_size [Check 13] Test psa_aead_decrypt - Invalid tag length 0 TEST RESULT: PASSED ****************************************** TEST: 226 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_setup [Info] Executing tests from non-secure [Check 1] Test psa_mac_sign_setup - HMAC - SHA256 [Check 2] Test psa_mac_sign_setup - CMAC - AES [Check 3] Test psa_mac_sign_setup - Incompatible HMAC for CMAC [Check 4] Test psa_mac_sign_setup - Invalid usage flag [Check 5] Test psa_mac_sign_setup - Invalid key type [Check 6] Test psa_mac_sign_setup - Truncated MAC too large [Check 7] Test psa_mac_sign_setup - Truncated MAC too small [Check 8] Test psa_mac_sign_setup - Unknown MAC algorithm [Check 9] Test psa_mac_sign_setup - Bad algorithm (not a MAC algorithm) [Check 10] Test psa_mac_sign_setup invalid key handle [Check 11] Test psa_mac_sign_setup zero as key handle TEST RESULT: PASSED ****************************************** TEST: 227 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_update [Info] Executing tests from non-secure [Check 1] Test psa_mac_update - HMAC - SHA256 - 64 Byte [Check 2] Test psa_mac_update - CMAC - AES - 16 Byte [Check 3] Test psa_mac_update - HMAC - SHA512 - 32 Byte [Check 4] Test psa_mac_update - HMAC - SHA512 - Invalid operation state TEST RESULT: PASSED ****************************************** TEST: 228 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_finish [Info] Executing tests from non-secure [Check 1] Test psa_mac_sign_finish - HMAC - SHA224 [Check 2] Test psa_mac_sign_finish - HMAC - SHA256 [Check 3] Test psa_mac_sign_finish - HMAC - SHA512 [Check 4] Test psa_mac_sign_finish - HMAC - SHA224 - Truncated 8 Byte [Check 5] Test psa_mac_sign_finish - HMAC - SHA224 - Small output buffer [Check 6] Test psa_mac_sign_finish - HMAC - SHA224 - Invalid operation state [Check 7] Test psa_mac_sign_finish - CMAC - AES TEST RESULT: PASSED ****************************************** TEST: 229 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_setup [Info] Executing tests from non-secure [Check 1] Test psa_mac_verify_setup - HMAC - SHA256 [Check 2] Test psa_mac_verify_setup - CMAC - AES [Check 3] Test psa_mac_verify_setup - Incompatible HMAC for CMAC [Check 4] Test psa_mac_verify_setup - Invalid usage flag [Check 5] Test psa_mac_verify_setup - Invalid key type [Check 6] Test psa_mac_verify_setup - Truncated MAC too large [Check 7] Test psa_mac_verify_setup - Truncated MAC too small [Check 8] Test psa_mac_verify_setup - Unknown MAC algorithm [Check 9] Test psa_mac_verify_setup - Bad algorithm (not a MAC algorithm) [Check 10] Test psa_mac_verify_setup invalid key handle [Check 11] Test psa_mac_verify_setup zero as key handle TEST RESULT: PASSED ****************************************** TEST: 230 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_finish [Info] Executing tests from non-secure [Check 1] Test psa_mac_verify_finish - HMAC - SHA224 [Check 2] Test psa_mac_verify_finish - HMAC - SHA256 [Check 3] Test psa_mac_verify_finish - HMAC - SHA512 [Check 4] Test psa_mac_verify_finish - HMAC - SHA224 - Truncated 8 Byte [Check 5] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid mac length [Check 6] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid expected mac [Check 7] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid operation state [Check 8] Test psa_mac_verify_finish - CMAC - AES TEST RESULT: PASSED ****************************************** TEST: 231 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_abort [Info] Executing tests from non-secure [Check 1] Test psa_mac_abort - HMAC - SHA224 [Check 2] Test psa_mac_abort - HMAC - SHA224 - Truncated 8 Byte [Check 3] Test psa_mac_abort - HMAC - SHA256 [Check 4] Test psa_mac_abort - HMAC - SHA512 [Check 5] Test psa_mac_abort - CMAC - AES [Check 6] Test psa_mac_sign_finish after calling psa_mac_abort TEST RESULT: PASSED ****************************************** TEST: 232 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt_setup [Info] Executing tests from non-secure [Check 1] Test psa_cipher_encrypt_setup 16 Byte AES [Check 2] Test psa_cipher_encrypt_setup 24 Byte AES [Check 3] Test psa_cipher_encrypt_setup 32 Byte AES [Check 4] Test psa_cipher_encrypt_setup DES 64 bit key [Check 5] Test psa_cipher_encrypt_setup Triple DES 2-Key [Check 6] Test psa_cipher_encrypt_setup Triple DES 3-Key [Check 7] Test psa_cipher_encrypt_setup 16 Byte raw data [Check 8] Test psa_cipher_encrypt_setup - not a cipher algorithm [Check 9] Test psa_cipher_encrypt_setup - unknown cipher algorithm [Check 10] Test psa_cipher_encrypt_setup - incompatible key ARC4 [Check 11] Test psa_cipher_encrypt_setup - incorrect usage [Check 12] Test psa_cipher_encrypt_setup - RSA public key [Check 13] Test psa_cipher_encrypt_setup - RSA keypair [Check 14] Test psa_cipher_encrypt_setup - EC Public key [Check 15] Test psa_cipher_encrypt_setup - EC keypair [Check 16] Test psa_cipher_encrypt_setup - Invalid key handle [Check 17] Test psa_cipher_encrypt_setup - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 233 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt_setup [Info] Executing tests from non-secure [Check 1] Test psa_cipher_decrypt_setup 16 Byte AES [Check 2] Test psa_cipher_decrypt_setup 24 Byte AES [Check 3] Test psa_cipher_decrypt_setup 32 Byte AES [Check 4] Test psa_cipher_decrypt_setup DES 64 bit key [Check 5] Test psa_cipher_decrypt_setup Triple DES 2-Key [Check 6] Test psa_cipher_decrypt_setup Triple DES 3-Key [Check 7] Test psa_cipher_decrypt_setup 16 Byte raw data [Check 8] Test psa_cipher_decrypt_setup - not a cipher algorithm [Check 9] Test psa_cipher_decrypt_setup - unknown cipher algorithm [Check 10] Test psa_cipher_decrypt_setup - incompatible key ARC4 [Check 11] Test psa_cipher_decrypt_setup - incorrect usage [Check 12] Test psa_cipher_decrypt_setup - RSA public key [Check 13] Test psa_cipher_decrypt_setup - RSA keypair [Check 14] Test psa_cipher_decrypt_setup - EC Public key [Check 15] Test psa_cipher_decrypt_setup - EC keypair [Check 16] Test psa_cipher_decrypt_setup - Invalid key handle [Check 17] Test psa_cipher_decrypt_setup - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 234 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_generate_iv [Info] Executing tests from non-secure [Check 1] Test psa_cipher_generate_iv 16 Byte AES [Check 2] Test psa_cipher_generate_iv 24 Byte AES [Check 3] Test psa_cipher_generate_iv 32 Byte AES [Check 4] Test psa_cipher_generate_iv DES 64 bit key [Check 5] Test psa_cipher_generate_iv DES 2-Key [Check 6] Test psa_cipher_generate_iv DES 3-Key [Check 7] Test psa_cipher_generate_iv AES - small iv buffer [Check 8] Test psa_cipher_generate_iv DES - small iv buffer TEST RESULT: PASSED ****************************************** TEST: 235 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_set_iv [Info] Executing tests from non-secure [Check 1] Test psa_cipher_set_iv 16 Byte AES [Check 2] Test psa_cipher_set_iv 24 Byte AES [Check 3] Test psa_cipher_set_iv 32 Byte AES [Check 4] Test psa_cipher_set_iv DES 64 bit key [Check 5] Test psa_cipher_set_iv DES 2-Key [Check 6] Test psa_cipher_set_iv DES 3-Key [Check 7] Test psa_cipher_set_iv AES - small iv buffer [Check 8] Test psa_cipher_set_iv DES - small iv buffer [Check 9] Test psa_cipher_set_iv AES - large iv buffer [Check 10] Test psa_cipher_set_iv DES - large iv buffer TEST RESULT: PASSED ****************************************** TEST: 236 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_update [Info] Executing tests from non-secure [Check 1] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING (Short in) [Check 3] Test psa_cipher_update - Encrypt - AES CBC_PKCS7 [Check 4] Test psa_cipher_update - Encrypt - AES CBC_PKCS7 (Short input) [Check 5] Test psa_cipher_update - Encrypt - AES CTR [Check 6] Test psa_cipher_update - Encrypt - DES CBC (nopad) [Check 7] Test psa_cipher_update - Encrypt - 2-key 3DE -CBC (nopad) [Check 8] Test psa_cipher_update - Encrypt - 3-key 3DE -CBC (nopad) [Check 9] Test psa_cipher_update - Encrypt - small output buffer size [Check 10] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING [Check 11] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING (Short in) [Check 12] Test psa_cipher_update - Decrypt - AES CBC_PKCS7 [Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7 (Short input) [Check 14] Test psa_cipher_update - Decrypt - AES CTR [Check 15] Test psa_cipher_update - Decrypt - DES CBC (nopad) [Check 16] Test psa_cipher_update - Decrypt - 2-key 3DE -CBC (nopad) [Check 17] Test psa_cipher_update - Decrypt - 3-key 3DE -CBC (nopad) [Check 18] Test psa_cipher_update - Decrypt - small output buffer size [Check 19] Test psa_cipher_update without cipher setup TEST RESULT: PASSED ****************************************** TEST: 237 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_finish [Info] Executing tests from non-secure [Check 1] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING (Short in) [Check 3] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7 [Check 4] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7 (Short input) [Check 5] Test psa_cipher_finish - Encrypt - AES CTR [Check 6] Test psa_cipher_finish - Encrypt - AES CTR (short input) [Check 7] Test psa_cipher_finish - Encrypt - DES CBC (nopad) [Check 8] Test psa_cipher_finish - Encrypt - 2-key 3DE -CBC (nopad) [Check 9] Test psa_cipher_finish - Encrypt - 3-key 3DE -CBC (nopad) [Check 10] Test psa_cipher_finish - Encrypt - small output buffer size [Check 11] Test psa_cipher_finish - Decrypt - AES CBC_NO_PADDING [Check 12] Test psa_cipher_finish - Decrypt - AES CBC_NO_PADDING (Short in) [Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7 [Check 14] Test psa_cipher_finish - Decrypt - AES CBC_PKCS7 (Short input) [Check 15] Test psa_cipher_finish - Decrypt - AES CTR [Check 16] Test psa_cipher_finish - Decrypt - AES CTR (short input) [Check 17] Test psa_cipher_finish - Decrypt - DES CBC (nopad) [Check 18] Test psa_cipher_finish - Decrypt - 2-key 3DE -CBC (nopad) [Check 19] Test psa_cipher_finish - Decrypt - 3-key 3DE -CBC (nopad) TEST RESULT: PASSED ****************************************** TEST: 238 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_abort [Info] Executing tests from non-secure [Check 1] Test psa_cipher_abort - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_abort - Encrypt - AES CBC_PKCS7 [Check 3] Test psa_cipher_abort - Encrypt - AES CTR [Check 4] Test psa_cipher_abort - Encrypt - DES CBC (nopad) [Check 5] Test psa_cipher_abort - Encrypt - 2-key 3DE -CBC (nopad) [Check 6] Test psa_cipher_abort - Encrypt - 3-key 3DE -CBC (nopad) [Check 7] Test psa_cipher_abort - Decrypt - AES CBC_NO_PADDING [Check 8] Test psa_cipher_abort - Decrypt - AES CBC_PKCS7 [Check 9] Test psa_cipher_abort - Decrypt - AES CTR [Check 10] Test psa_cipher_abort - Decrypt - DES CBC (nopad) [Check 11] Test psa_cipher_abort - Decrypt - 2-key 3DE -CBC (nopad) [Check 12] Test psa_cipher_abort - Decrypt - 3-key 3DE -CBC (nopad) [Check 13] Test psa_cipher_update after psa_cipher_abort should fail TEST RESULT: PASSED ****************************************** TEST: 239 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_encrypt [Info] Executing tests from non-secure [Check 1] Test psa_asymmetric_encrypt - RSA PKCS1V15 [Check 2] Test psa_asymmetric_encrypt - RSA KEY_PAIR PKCS1V15 [Check 3] Test psa_asymmetric_encrypt - RSA OAEP SHA256 [Check 4] Test psa_asymmetric_encrypt - RSA OAEP SHA256 with label [Check 5] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256 [Check 6] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256 with label [Check 7] Test psa_asymmetric_encrypt - Small output buffer [Check 8] Test psa_asymmetric_encrypt - Invalid algorithm [Check 9] Test psa_asymmetric_encrypt - Invalid key type [Check 10] Test psa_asymmetric_encrypt - Invalid usage [Check 11] Test psa_asymmetric_encrypt - RSA PKCS1V15 - Salt [Check 12] Test psa_asymmetric_encrypt - ECC public key [Check 13] Test psa_asymmetric_encrypt - Invalid key handle [Check 14] Test psa_asymmetric_encrypt - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 240 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_decrypt [Info] Executing tests from non-secure [Check 1] Test psa_asymmetric_decrypt - RSA KEY_PAIR PKCS1V15 [Check 2] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256 [Check 3] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256 with label [Check 4] Test psa_asymmetric_decrypt - Invalid key type (RSA public key) [Check 5] Test psa_asymmetric_decrypt - Small output buffer [Check 6] Test psa_asymmetric_decrypt - Invalid algorithm [Check 7] Test psa_asymmetric_decrypt - Invalid key type (AES Key) [Check 8] Test psa_asymmetric_decrypt - Invalid usage [Check 9] Test psa_asymmetric_decrypt - RSA PKCS1V15 - Salt [Check 10] Test psa_asymmetric_decrypt - Invalid key handle [Check 11] Test psa_asymmetric_decrypt - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 241 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_sign_hash [Info] Executing tests from non-secure [Check 1] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 RAW [Check 2] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 SHA-256 [Check 3] Test psa_sign_hash - ECDSA SECP256R1 SHA-256 [Check 4] Test psa_sign_hash - Invalid key type (RSA public key) [Check 5] Test psa_sign_hash - Small output buffer [Check 6] Test psa_sign_hash - Invalid algorithm [Check 7] Test psa_sign_hash - Invalid key type (AES Key) [Check 8] Test psa_sign_hash - Invalid usage [Check 9] Test psa_sign_hash - Wrong hash size [Check 10] Test psa_sign_hash - Invalid key handle [Check 11] Test psa_sign_hash - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 242 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_verify_hash [Info] Executing tests from non-secure [Check 1] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 RAW [Check 2] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 SHA-256 [Check 3] Test psa_verify_hash - ECDSA KEY_PAIR SECP256R1 SHA-256 [Check 4] Test psa_verify_hash - EC public key [Check 5] Test psa_verify_hash - RSA public key [Check 6] Test psa_verify_hash - Small output buffer [Check 7] Test psa_verify_hash - Invalid algorithm [Check 8] Test psa_verify_hash - Invalid key type (AES Key) [Check 9] Test psa_verify_hash - Invalid usage [Check 10] Test psa_verify_hash - Wrong hash size [Check 11] Test psa_verify_hash - Wrong signature [Check 12] Test psa_verify_hash - Wrong signature size [Check 13] Test psa_verify_hash - Invalid key handle [Check 14] Test psa_verify_hash - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 243 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_raw_key_agreement [Info] Executing tests from non-secure [Check 1] Test psa_raw_key_agreement - ECDH SECP256R1 [Check 2] Test psa_raw_key_agreement - Small buffer size [Check 3] Test psa_raw_key_agreement - ECDH SECP384R1 [Check 4] Test psa_raw_key_agreement - Invalid usage [Check 5] Test psa_raw_key_agreement - Unknown KDF [Check 6] Test psa_raw_key_agreement - Not a key agreement alg [Check 7] Test psa_raw_key_agreement - Public key on different curve [Check 8] Test psa_raw_key_agreement - Public key instead of private key [Check 9] Test psa_raw_key_agreement - Invalid key handle [Check 10] Test psa_raw_key_agreement - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 244 | DESCRIPTION: Testing crypto key management APIs | UT: psa_copy_key [Info] Executing tests from non-secure [Check 1] Test psa_copy_key - 2048 RSA public key [Check 2] Test psa_copy_key - RSA 2048 keypair [Check 3] Test psa_copy_key - Incompatible target policy(source and target) [Check 4] Test psa_copy_key - source key with no export usage [Check 5] Test psa_copy_key - DES 64 bit key [Check 6] Test psa_copy_key - Triple DES 2-Key [Check 7] Test psa_copy_key - Triple DES 3-Key [Check 8] Test psa_copy_key - EC Public key [Check 9] Test psa_copy_key - EC keypair TEST RESULT: PASSED ****************************************** TEST: 245 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_clone [Info] Executing tests from non-secure [Check 1] Test psa_hash_clone - MD5 algorithm [Check 2] Test psa_hash_clone - RIPEMD160 algorithm [Check 3] Test psa_hash_clone - SHA1 algorithm [Check 4] Test psa_hash_clone - SHA224 algorithm [Check 5] Test psa_hash_clone - SHA256 algorithm [Check 6] Test psa_hash_clone - SHA384 algorithm [Check 7] Test psa_hash_clone - SHA512 algorithm [Check 8] Test psa_hash_clone - from an inactive source operation [Check 9] Test psa_hash_clone - on an active target operation TEST RESULT: PASSED ****************************************** TEST: 246 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_compute [Info] Executing tests from non-secure [Check 1] Test psa_mac_compute HMAC SHA 224 [Check 2] Test psa_mac_compute - Incompactible HMAC for CMAC [Check 3] Test psa_mac_compute - Invalid usage [Check 4] Test psa_mac_compute - truncated MAC too small [Check 5] Test psa_mac_compute - truncated MAC too large [Check 6] Test psa_mac_compute - bad algorithm (unknown MAC algorithm) [Check 7] Test psa_mac_compute HMAC SHA 256 [Check 8] Test psa_mac_compute HMAC SHA 512 [Check 9] Test psa_mac_compute HMAC SHA 224 (truncated to 8 Byte) [Check 10] Test psa_mac_compute CMAC AES 128 [Check 11] Test psa_mac_compute small size buffer [Check 12] Test psa_mac_compute - Invalid key type TEST RESULT: PASSED ****************************************** TEST: 247 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify [Info] Executing tests from non-secure [Check 1] Test psa_mac_verify HMAC SHA 224 [Check 2] Test psa_mac_verify HMAC SHA 256 [Check 3] Test psa_mac_verify - Incompactible HMAC for CMAC [Check 4] Test psa_mac_verify - Invalid usage [Check 5] Test psa_mac_verify - Truncated MAC too large [Check 6] Test psa_mac_verify - Truncated MAC too small [Check 7] Test psa_mac_verify - bad algorithm (unknown MAC algorithm) [Check 8] Test psa_mac_verify HMAC SHA 512 [Check 9] Test psa_mac_verify HMAC SHA 224 (truncated to 8 Byte) [Check 10] Test psa_mac_verify CMAC AES 128 [Check 11] Test psa_mac_verify - Invalid key type [Check 12] Test psa_mac_verify small size buffer [Check 13] Test psa_mac_verify incorrect expected MAC TEST RESULT: PASSED ****************************************** TEST: 248 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt [Info] Executing tests from non-secure [Check 1] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING (Short input) [Check 3] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7 [Check 4] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7 (Short input) [Check 5] Test psa_cipher_encrypt - Encrypt - AES CTR [Check 6] Test psa_cipher_encrypt - Encrypt - AES CTR (short input) [Check 7] Test psa_cipher_encrypt - Encrypt - DES CBC (nopad) [Check 8] Test psa_cipher_encrypt - Encrypt - 2-key 3DE -CBC (nopad) [Check 9] Test psa_cipher_encrypt - Encrypt - 3-key 3DE -CBC (nopad) [Check 10] Test psa_cipher_encrypt - small output buffer size [Check 11] Test psa_cipher_encrypt - Decrypt - AES CBC_NO_PADDING TEST RESULT: PASSED ****************************************** TEST: 249 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt [Info] Executing tests from non-secure [Check 1] Test psa_cipher_decrypt - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING [Check 3] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING (Short input) [Check 4] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING [Check 5] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7 [Check 6] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7 (Short input) [Check 7] Test psa_cipher_decrypt - Decrypt - AES CTR [Check 8] Test psa_cipher_decrypt - Decrypt - DES CBC (nopad) [Check 9] Test psa_cipher_decrypt - Decrypt - 2-key 3DE -CBC (nopad) [Check 10] Test psa_cipher_decrypt - 3-key 3DE -CBC (nopad) TEST RESULT: PASSED ****************************************** TEST: 250 | DESCRIPTION: Testing crypto key management APIs | UT: psa_sign_message [Info] Executing tests from non-secure [Check 1] Test psa_sign_message - RSA KEY_PAIR PKCS1V15 RAW [Check 2] Test psa_sign_message - ECDSA SECP256R1 SHA-256 [Check 3] Test psa_sign_message - Invalid key type (RSA public key) [Check 4] Test psa_sign_message - Small output buffer [Check 5] Test psa_sign_message - Invalid algorithm [Check 6] Test psa_sign_message - Invalid key type (AES Key) [Check 7] Test psa_sign_message - Invalid usage [Check 8] Test psa_sign_message - Mismatch key type and Algorithm [Check 9] Test psa_sign_message - Alg mismatch in key and API call [Check 10] Test psa_sign_message - Invalid key handle [Check 11] Test psa_sign_message - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 251 | DESCRIPTION: Testing crypto key management APIs | UT: psa_verify_message [Info] Executing tests from non-secure [Check 1] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 RAW [Check 2] Test psa_verify_message - RSA Public Key PKCS1V15 RAW [Check 3] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 SHA-256 [Check 4] Test psa_verify_message - ECDSA KEY_PAIR SECP256R1 SHA-256 [Check 5] Test psa_verify_message - ECDSA Public Key SECP256R1 SHA-256 [Check 6] Test psa_verify_message - Small output buffer [Check 7] Test psa_verify_message - Invalid algorithm [Check 8] Test psa_verify_message - Invalid key type (AES Key) [Check 9] Test psa_verify_message - Invalid usage [Check 10] Test psa_verify_message - Wrong message size [Check 11] Test psa_verify_message - Wrong signature [Check 12] Test psa_verify_message - Wrong signature size [Check 13] Test psa_verify_message - Invalid key handle [Check 14] Test psa_verify_message - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 252 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt_setup [Info] Executing tests from non-secure [Check 1] Test psa_aead_encrypt_setup - CCM - AES [Check 2] Test psa_aead_encrypt_setup - CCM - AES - Tag length = 4 [Check 3] Test psa_aead_encrypt_setup - CCM - AES - Mismatched tag length [Check 4] Test psa_aead_encrypt_setup - CCM - AES - Default Tag length [Check 5] Test psa_aead_encrypt_setup - GCM - AES [Check 6] Test psa_aead_encrypt_setup - CCM - DES Invalid key [Check 7] Test psa_aead_encrypt_setup - Invalid usage flag TEST RESULT: PASSED ****************************************** TEST: 253 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt_setup [Info] Executing tests from non-secure [Check 1] Test psa_aead_decrypt_setup - CCM - AES [Check 2] Test psa_aead_decrypt_setup - CCM - AES - Tag length = 4 [Check 3] Test psa_aead_decrypt_setup - CCM - AES - Mismatched tag length [Check 4] Test psa_aead_decrypt_setup - CCM - AES - Default Tag length [Check 5] Test psa_aead_decrypt_setup - GCM - AES [Check 6] Test psa_aead_decrypt_setup - CCM - DES Invalid key [Check 7] Test psa_aead_decrypt_setup - Invalid usage flag TEST RESULT: PASSED ****************************************** TEST: 254 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_generate_nonce [Info] Executing tests from non-secure [Check 1] Test psa_aead_generate_nonce - CCM [Check 2] Test psa_aead_generate_nonce - CCM - Tag length = 4 [Check 3] Test psa_aead_generate_nonce - CCM - Small buffer size [Check 4] Test psa_aead_generate_nonce - CCM - Uninitialized operation [Check 5] Test psa_aead_generate_nonce - CCM - Decrypt operation [Check 6] Test psa_aead_generate_nonce - GCM [Check 7] Test psa_aead_generate_nonce - GCM - Decrypt operation TEST RESULT: PASSED ****************************************** TEST: 255 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_nonce [Info] Executing tests from non-secure [Check 1] Test psa_aead_set_nonce - Encrypt - CCM [Check 2] Test psa_aead_set_nonce - Encrypt - CCM - Tag length = 4 [Check 3] Test psa_aead_set_nonce - Encrypt - CCM - Small nonce size [Check 4] Test psa_aead_set_nonce - Encrypt - CCM - Large nonce size [Check 5] Test psa_aead_set_nonce - Encrypt - CCM - Invalid operation state [Check 6] Test psa_aead_set_nonce - Encrypt - GCM [Check 7] Test psa_aead_set_nonce - Decrypt - CCM [Check 8] Test psa_aead_set_nonce - Decrypt - CCM - Tag length = 4 [Check 9] Test psa_aead_set_nonce - Decrypt - CCM - Small nonce size [Check 10] Test psa_aead_set_nonce - Decrypt - CCM - Large nonce size [Check 11] Test psa_aead_set_nonce - Decrypt - CCM - Invalid operation state [Check 12] Test psa_aead_set_nonce - Decrypt - GCM TEST RESULT: PASSED ****************************************** TEST: 256 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_lengths [Info] Executing tests from non-secure [Check 1] Test psa_aead_set_lengths - Encrypt - CCM [Check 2] Test psa_aead_set_lengths - Encrypt - CCM - Tag length = 4 [Check 3] Test psa_aead_set_lengths - Encrypt - CCM - Zero ad_length [Check 4] Test psa_aead_set_lengths - Encrypt - CCM - Zero plaintext_length [Check 5] Test psa_aead_set_lengths - Encrypt - CCM - Invalid operation state [Check 6] Test psa_aead_set_lengths - Encrypt - GCM [Check 7] Test psa_aead_set_lengths - Decrypt - CCM [Check 8] Test psa_aead_set_lengths - Decrypt - CCM - Tag length = 4 [Check 9] Test psa_aead_set_lengths - Decrypt - CCM - Zero ad_length [Check 10] Test psa_aead_set_lengths - Decrypt - CCM - Zero plaintext_length [Check 11] Test psa_aead_set_lengths - Decrypt - CCM - Invalid operation state [Check 12] Test psa_aead_set_lengths - Decrypt - GCM TEST RESULT: PASSED ****************************************** TEST: 257 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update_ad [Info] Executing tests from non-secure [Check 1] Test psa_aead_update_ad - Encrypt - CCM [Check 2] Test psa_aead_update_ad - Encrypt - CCM - Tag length = 4 [Check 3] Test psa_aead_update_ad - Encrypt - CCM - Zero ad_length [Check 4] Test psa_aead_update_ad - Encrypt - CCM - Zero plaintext_length [Check 5] Test psa_aead_update_ad - Encrypt - CCM - Invalid operation state [Check 6] Test psa_aead_update_ad - Encrypt - CCM - Overflow input length [Check 7] Test psa_aead_update_ad - Decrypt - CCM [Check 8] Test psa_aead_update_ad - Decrypt - CCM - Tag length = 4 [Check 9] Test psa_aead_update_ad - Decrypt - CCM - Zero ad_length [Check 10] Test psa_aead_update_ad - Decrypt - CCM - Zero plaintext_length [Check 11] Test psa_aead_update_ad - Decrypt - CCM - Invalid operation state [Check 12] Test psa_aead_update_ad - Decrypt - CCM - Overflow input length TEST RESULT: PASSED ****************************************** TEST: 258 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update [Info] Executing tests from non-secure [Check 1] Test psa_aead_update - Encrypt - CCM [Check 2] Test psa_aead_update - Encrypt - CCM - Tag length = 4 [Check 3] Test psa_aead_update - Encrypt - CCM - Zero ad_length [Check 4] Test psa_aead_update - Encrypt - CCM - Zero plaintext_length [Check 5] Test psa_aead_update - Encrypt - CCM - Small buffer size [Check 6] Test psa_aead_update - Encrypt - CCM - Less add data than specified [Check 7] Test psa_aead_update - Encrypt - CCM - Overflow input length [Check 8] Test psa_aead_update - Encrypt - CCM - Invalid operation state [Check 9] Test psa_aead_update - Decrypt - CCM [Check 10] Test psa_aead_update - Decrypt - CCM - Tag length = 4 [Check 11] Test psa_aead_update - Decrypt - CCM - Zero ad_length [Check 12] Test psa_aead_update - Decrypt - CCM - Zero plaintext_length [Check 13] Test psa_aead_update - Decrypt - CCM - Small buffer size [Check 14] Test psa_aead_update - Decrypt - Less add data than specified [Check 15] Test psa_aead_update - Decrypt - CCM - Overflow input length [Check 16] Test psa_aead_update - Decrypt - CCM - Invalid operation state TEST RESULT: PASSED ****************************************** TEST: 259 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_finish [Info] Executing tests from non-secure [Check 1] Test psa_aead_finish - AES-CCM [Check 2] Test psa_aead_finish - AES-CCM 24 bytes Tag length = 4 [Check 3] Test psa_aead_finish - Small buffer size [Check 4] Test psa_aead_finish - Input length is less than plaintext length [Check 5] Test psa_aead_finish - GCM - 16B AES - 12B Nonce & 12B additional data TEST RESULT: PASSED ****************************************** TEST: 260 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_abort [Info] Executing tests from non-secure [Check 1] Test psa_aead_abort - Encrypt - CCM - AES [Check 2] Test psa_aead_abort - Encrypt - GCM - AES [Check 3] Test psa_aead_abort - Decrypt - CCM - AES [Check 4] Test psa_aead_abort - Decrypt - GCM - AES [Check 5] Test psa_aead_abort with all initializations TEST RESULT: PASSED ****************************************** TEST: 261 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_verify [Info] Executing tests from non-secure [Check 1] Test psa_aead_verify - AES-CCM [Check 2] Test psa_aead_verify - AES-CCM 24 bytes Tag length = 4 [Check 3] Test psa_aead_verify - Small buffer size [Check 4] Test psa_aead_verify - Input length is less than plaintext length [Check 5] Test psa_aead_verify - GCM - 16B AES - 12B Nounce & 12B addi data TEST RESULT: PASSED ****************************************** TEST: 262 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_suspend [Info] Executing tests from non-secure [Check 1] Test psa_hash_suspend - MD5 Failed at Checkpoint: 5 Actual: -134 Expected: 0 TEST RESULT: FAILED (Error Code=0x1) ****************************************** TEST: 263 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_resume [Info] Executing tests from non-secure [Check 1] Test psa_hash_resume - MD5 Failed at Checkpoint: 5 Actual: -134 Expected: 0 TEST RESULT: FAILED (Error Code=0x1) ****************************************** ************ Crypto Suite Report ********** TOTAL TESTS : 63 TOTAL PASSED : 61 TOTAL SIM ERROR : 0 TOTAL FAILED : 2 TOTAL SKIPPED : 0 ****************************************** Entering standby..
# psa-iat-api-test ***** PSA Architecture Test Suite - Version 1.4 ***** Running.. Attestation Suite ****************************************** TEST: 601 | DESCRIPTION: Testing attestation initial attestation APIs | UT: psa_initial_attestation [Info] Executing tests from non-secure [Check 1] Test psa_initial_attestation_get_token with Challenge 32 Failed at Checkpoint: 2 Actual: 42 Expected: 0 TEST RESULT: FAILED (Error Code=0x1) ****************************************** ************ Attestation Suite Report ********** TOTAL TESTS : 1 TOTAL PASSED : 0 TOTAL SIM ERROR : 0 TOTAL FAILED : 1 TOTAL SKIPPED : 0 ****************************************** Entering standby..
Config 2: FIP SP
Build command
SP_PACKAGING_METHOD=fip make
Setup steps after boot
/mnt/host/out/linux-arm-ffa-tee/load_module.sh /mnt/host/out/linux-arm-ffa-user/load_module.sh cp -at /usr /mnt/host/out/ts-install/arm-linux/bin /mnt/host/out/ts-install/arm-linux/lib
Test results
OP-TEE xtest (SPMC test only)
# xtest -t ffa_spmc Run test suite with level=0 TEE test application started over default TEE instance ###################################################### # # ffa_spmc # ###################################################### * ffa_spmc_1001 Test FF-A communication o ffa_spmc_1001.1 SP1 comms check ffa_spmc_1001.1 OK o ffa_spmc_1001.2 Sp2 comms check ffa_spmc_1001.2 OK o ffa_spmc_1001.3 SP to SP messaging check ffa_spmc_1001.3 OK ffa_spmc_1001 OK * ffa_spmc_1002 Test FF-A memory: share memory from Normal World to SP o ffa_spmc_1002.1 Test memory set-up ffa_spmc_1002.1 OK o ffa_spmc_1002.2 Test retrieve memory second time ffa_spmc_1002.2 OK o ffa_spmc_1002.3 Test accessing memory ffa_spmc_1002.3 OK o ffa_spmc_1002.4 Test relinquish memory ffa_spmc_1002.4 OK o ffa_spmc_1002.5 Test incorrect reclaim ffa_spmc_1002.5 OK o ffa_spmc_1002.6 Test relinquish memory second time ffa_spmc_1002.6 OK o ffa_spmc_1002.7 Test correct reclaim ffa_spmc_1002.7 OK o ffa_spmc_1002.8 Test retrieve invalid memory region ffa_spmc_1002.8 OK ffa_spmc_1002 OK * ffa_spmc_1003 Test FF-A memory: SP to SP ffa_spmc_1003 OK * ffa_spmc_1004 Test FF-A memory: Access and flags o ffa_spmc_1004.1 Test sharing with exc access ffa_spmc_1004.1 OK o ffa_spmc_1004.2 Test sharing with incorrect access ffa_spmc_1004.2 OK ffa_spmc_1004 OK +----------------------------------------------------- Result of testsuite ffa_spmc: ffa_spmc_1001 OK ffa_spmc_1002 OK ffa_spmc_1003 OK ffa_spmc_1004 OK +----------------------------------------------------- 39 subtests of which 0 failed 4 test cases of which 0 failed 0 test cases were skipped TEE test application done!
Trusted Services service level test
# ts-service-test -v TEST(PsServiceTests, createAndSetExtended) - 18867 ms TEST(PsServiceTests, createAndSet) - 23584 ms TEST(PsServiceTests, storeNewItem) - 20137 ms TEST(ItsServiceTests, storeNewItem) - 20203 ms TEST(AttestationProvisioningTests, provisionedIak) - 99433 ms TEST(AttestationProvisioningTests, selfGeneratedIak) - 180330 ms TEST(AttestationServiceTests, repeatedOperation) - 21235658 ms TEST(AttestationServiceTests, invalidChallengeLen)[ 120.049877] ------------[ cut here ]------------ [ 120.049986] WARNING: CPU: 5 PID: 202 at mm/page_alloc.c:5534 __alloc_pages+0x684/0xd20 [ 120.050264] Modules linked in: arm_ffa_tee(O) [ 120.050466] CPU: 5 PID: 202 Comm: ts-service-test Tainted: G O 6.1.0 #5 [ 120.050664] Hardware name: FVP Base RevC (DT) [ 120.050764] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 120.051074] pc : __alloc_pages+0x684/0xd20 [ 120.051247] lr : alloc_pages+0xac/0x160 [ 120.051439] sp : ffff80000abc3a90 [ 120.051564] x29: ffff80000abc3a90 x28: 0000000000000015 x27: ffff0008024a5a80 [ 120.051788] x26: 0000000000000000 x25: 0000000000000005 x24: 0000000000001000 [ 120.052115] x23: ffff0008024a5100 x22: 0000000000000015 x21: 0000000000000000 [ 120.052393] x20: 0000000000000015 x19: 0000000000000000 x18: 0000000000000000 [ 120.052664] x17: 0000000000000000 x16: ffff800008463c70 x15: 0000ffffc1f51e08 [ 120.052935] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000 [ 120.053180] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000 [ 120.053464] x8 : ffff0008024a5180 x7 : 0000000000000000 x6 : 0000000000000228 [ 120.053764] x5 : 0000000000000000 x4 : ffff000803159d80 x3 : 0000000000000000 [ 120.054042] x2 : 0000000000000000 x1 : 0000000000000001 x0 : ffff80000a565000 [ 120.054302] Call trace: [ 120.054409] __alloc_pages+0x684/0xd20 [ 120.054573] alloc_pages+0xac/0x160 [ 120.054764] pool_op_alloc+0x54/0x17c [arm_ffa_tee] [ 120.054996] shm_alloc_helper+0x98/0x110 [ 120.055239] tee_shm_alloc_user_buf+0x74/0x11c [ 120.055430] tee_ioctl+0xa70/0xf9c [ 120.055604] __arm64_sys_ioctl+0xa8/0xf0 [ 120.055777] invoke_syscall+0x48/0x114 [ 120.055966] el0_svc_common.constprop.0+0x44/0xfc [ 120.056193] do_el0_svc+0x30/0xd0 [ 120.056385] el0_svc+0x2c/0x84 [ 120.056539] el0t_64_sync_handler+0xbc/0x140 [ 120.056732] el0t_64_sync+0x18c/0x190 [ 120.056905] ---[ end trace 0000000000000000 ]--- ffa_tee_share_mem():212 error: 12 - 24200 ms TEST(AttestationServiceTests, checkTokenSize) - 212653 ms TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 24858 ms TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 28328 ms TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 33614 ms TEST(CryptoMacServicePackedcTests, macAbort) - 19965 ms TEST(CryptoMacServicePackedcTests, signAndVerify) - 131263 ms TEST(CryptoCipherServicePackedcTests, cipherAbort) - 20230 ms TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 89703 ms TEST(CryptoHashServicePackedcTests, hashAbort) - 22072 ms TEST(CryptoHashServicePackedcTests, hashAndVerify) - 39045 ms TEST(CryptoHashServicePackedcTests, calculateHash) - 14242 ms TEST(CryptoServicePackedcTests, generateRandomNumbers) - 43983 ms TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 6111839 ms TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 631675 ms TEST(CryptoServicePackedcTests, signAndVerifyEat) - 1052914 ms TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 1062911 ms TEST(CryptoServicePackedcTests, signAndVerifyHash) - 1054637 ms TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 111747 ms TEST(CryptoServicePackedcTests, exportPublicKey) - 186967 ms TEST(CryptoServicePackedcTests, purgeKey) - 102752 ms TEST(CryptoServicePackedcTests, copyKey) - 694186 ms TEST(CryptoServicePackedcTests, generatePersistentKeys) - 197183 ms TEST(CryptoServicePackedcTests, generateVolatileKeys) - 186259 ms TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 45610 ms TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 10026189 ms TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 673600 ms TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 1057907 ms TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 1055521 ms TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 112483 ms TEST(CryptoServiceProtobufTests, exportPublicKey) - 187738 ms TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 198330 ms TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 187486 ms TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 57637442 ms TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 5458123 ms TEST(DiscoveryServiceTests, checkServiceInfo) - 3875 ms OK (43 tests, 43 ran, 763 checks, 0 ignored, 0 filtered out, 110357532 ms)
PSA Architecture Test Suite
# psa-its-api-test ***** PSA Architecture Test Suite - Version 1.4 ***** Running.. Storage Suite ****************************************** TEST: 401 | DESCRIPTION: UID not found check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Call get API for UID 6 which is not set [Check 2] Call get_info API for UID 6 which is not set [Check 3] Call remove API for UID 6 which is not set [Check 4] Call get API for UID 6 which is removed [Check 5] Call get_info API for UID 6 which is removed [Check 6] Call remove API for UID 6 which is removed Set storage for UID 6 [Check 7] Call get API for different UID 5 [Check 8] Call get_info API for different UID 5 [Check 9] Call remove API for different UID 5 TEST RESULT: PASSED ****************************************** TEST: 402 | DESCRIPTION: Write once error check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Update the flag of UID 1 with WRITE_ONCE flag [Check 2] Try to remove the UID 1 having WRITE_ONCE flag [Check 3] Create a new UID 2 with WRITE_ONCE flag [Check 4] Try to remove the UID 2 having WRITE_ONCE flag [Check 5] Try to change the length of write_once UID 2 [Check 6] Check UID removal still fails [Check 7] Try to change the WRITE_ONCE flag to None for UID 2 [Check 8] Check UID removal still fails TEST RESULT: PASSED ****************************************** TEST: 403 | DESCRIPTION: Insufficient space check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Overload storage space UID 13 set failed due to insufficient space Remove all registered UIDs [Check 2] Overload storage again to verify all previous UID removed UID 13 set failed due to insufficient space Remove all registered UIDs TEST RESULT: PASSED ****************************************** TEST: 404 | DESCRIPTION: Data Consistency check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2 [Check 2] Call get API with default length - TEST_BUFF_SIZE TEST RESULT: PASSED ****************************************** TEST: 405 | DESCRIPTION: Success scenarios check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Set UID with data length zero and call storage APIs [Check 2] Resetting the length check TEST RESULT: PASSED ****************************************** TEST: 406 | DESCRIPTION: Check for storage create flags | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE [Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY [Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION TEST RESULT: PASSED ****************************************** TEST: 407 | DESCRIPTION: Incorrect Size check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests Create a valid Storage - TEST_BUFF_SIZE/2 Increase the length of storage - TEST_BUFF_SIZE [Check 1] Call get API with old length - TEST_BUFF_SIZE/2 [Check 2] Call get API with old length - TEST_BUFF_SIZE/4 Decrease the length of storage - TEST_BUFF_SIZE/4 [Check 3] Call get API with old length - TEST_BUFF_SIZE/2 [Check 4] Call get API with old length - TEST_BUFF_SIZE [Check 5] Call get API with valid length - TEST_BUFF_SIZE/4 TEST RESULT: PASSED ****************************************** TEST: 408 | DESCRIPTION: Invalid offset check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Try to access data with varying valid offset [Check 2] Try to access data with varying invalid offset TEST RESULT: PASSED ****************************************** TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Call set API with NULL pointer and data length 0 [Check 2] Call get API with NULL read buffer and data length 0 [Check 3] Remove the UID [Check 4] Call get_info API to verify UID removed [Check 5] Create UID with zero data_len and valid write buffer [Check 8] Call get API with NULL read buffer and data length 0 [Check 9] Increase the length TEST RESULT: PASSED ****************************************** TEST: 410 | DESCRIPTION: UID value zero check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Creating storage with UID 0 should fail [Check 2] Get_info for UID 0 should fail [Check 3] Removing storage with UID 0 should fail TEST RESULT: PASSED ****************************************** ************ Storage Suite Report ********** TOTAL TESTS : 10 TOTAL PASSED : 10 TOTAL SIM ERROR : 0 TOTAL FAILED : 0 TOTAL SKIPPED : 0 ****************************************** Entering standby..
# psa-ps-api-test ***** PSA Architecture Test Suite - Version 1.4 ***** Running.. Storage Suite ****************************************** TEST: 401 | DESCRIPTION: UID not found check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Call get API for UID 6 which is not set [Check 2] Call get_info API for UID 6 which is not set [Check 3] Call remove API for UID 6 which is not set [Check 4] Call get API for UID 6 which is removed [Check 5] Call get_info API for UID 6 which is removed [Check 6] Call remove API for UID 6 which is removed Set storage for UID 6 [Check 7] Call get API for different UID 5 [Check 8] Call get_info API for different UID 5 [Check 9] Call remove API for different UID 5 TEST RESULT: PASSED ****************************************** TEST: 402 | DESCRIPTION: Write once error check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Update the flag of UID 1 with WRITE_ONCE flag [Check 2] Try to remove the UID 1 having WRITE_ONCE flag [Check 3] Create a new UID 2 with WRITE_ONCE flag [Check 4] Try to remove the UID 2 having WRITE_ONCE flag [Check 5] Try to change the length of write_once UID 2 [Check 6] Check UID removal still fails [Check 7] Try to change the WRITE_ONCE flag to None for UID 2 [Check 8] Check UID removal still fails TEST RESULT: PASSED ****************************************** TEST: 403 | DESCRIPTION: Insufficient space check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Overload storage space UID 13 set failed due to insufficient space Remove all registered UIDs [Check 2] Overload storage again to verify all previous UID removed UID 13 set failed due to insufficient space Remove all registered UIDs TEST RESULT: PASSED ****************************************** TEST: 404 | DESCRIPTION: Data Consistency check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2 [Check 2] Call get API with default length - TEST_BUFF_SIZE TEST RESULT: PASSED ****************************************** TEST: 405 | DESCRIPTION: Success scenarios check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Set UID with data length zero and call storage APIs [Check 2] Resetting the length check TEST RESULT: PASSED ****************************************** TEST: 406 | DESCRIPTION: Check for storage create flags | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE [Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY [Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION TEST RESULT: PASSED ****************************************** TEST: 407 | DESCRIPTION: Incorrect Size check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Create a valid Storage - TEST_BUFF_SIZE/2 Increase the length of storage - TEST_BUFF_SIZE [Check 1] Call get API with old length - TEST_BUFF_SIZE/2 [Check 2] Call get API with old length - TEST_BUFF_SIZE/4 Decrease the length of storage - TEST_BUFF_SIZE/4 [Check 3] Call get API with old length - TEST_BUFF_SIZE/2 [Check 4] Call get API with old length - TEST_BUFF_SIZE [Check 5] Call get API with valid length - TEST_BUFF_SIZE/4 TEST RESULT: PASSED ****************************************** TEST: 408 | DESCRIPTION: Invalid offset check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Try to access data with varying valid offset [Check 2] Try to access data with varying invalid offset TEST RESULT: PASSED ****************************************** TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Call set API with NULL pointer and data length 0 [Check 2] Call get API with NULL read buffer and data length 0 [Check 3] Remove the UID [Check 4] Call get_info API to verify UID removed [Check 5] Create UID with zero data_len and valid write buffer [Check 8] Call get API with NULL read buffer and data length 0 [Check 9] Increase the length TEST RESULT: PASSED ****************************************** TEST: 410 | DESCRIPTION: UID value zero check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Creating storage with UID 0 should fail [Check 2] Get_info for UID 0 should fail [Check 3] Removing storage with UID 0 should fail TEST RESULT: PASSED ****************************************** TEST: 411 | DESCRIPTION: Optional APIs: UID not found check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs are not supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 412 | DESCRIPTION: Optional APIs: Invalid arguments and offset invalid | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs are not supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 413 | DESCRIPTION: Set_Extended and Create api : Success | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs are not supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 414 | DESCRIPTION: Optional APIs not supported check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Optional PS APIs are not supported. [Check 1] Call to create API should fail as API not supported Failed at Checkpoint: 1 Actual: 0 Expected: -134 TEST RESULT: FAILED (Error Code=0x1) ****************************************** TEST: 415 | DESCRIPTION: Create API write_once flag value check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs are not supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 416 | DESCRIPTION: Storage assest capacity modification check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs not are supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 417 | DESCRIPTION: Storage assest capacity modification check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs not are supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** ************ Storage Suite Report ********** TOTAL TESTS : 17 TOTAL PASSED : 10 TOTAL SIM ERROR : 0 TOTAL FAILED : 1 TOTAL SKIPPED : 6 ****************************************** Entering standby..
# psa-crypto-api-test ***** PSA Architecture Test Suite - Version 1.4 ***** Running.. Crypto Suite ****************************************** TEST: 201 | DESCRIPTION: Testing crypto key management APIs | UT: psa_crypto_init [Info] Executing tests from non-secure [Check 1] Test calling crypto functions before psa_crypto_init [Check 2] Test psa_crypto_init [Check 3] Test multiple psa_crypto_init TEST RESULT: PASSED ****************************************** TEST: 202 | DESCRIPTION: Testing crypto key management APIs | UT: psa_import_key [Info] Executing tests from non-secure [Check 1] Test psa_import_key 16 bytes AES [Check 2] Test psa_import_key 24 bytes AES [Check 3] Test psa_import_key 32 bytes AES [Check 4] Test psa_import_key 2048 RSA public key [Check 5] Test psa_import_key with RSA 2048 keypair [Check 6] Test psa_import_key with DES 8 bytes key [Check 7] Test psa_import_key with Triple DES 2-Key [Check 8] Test psa_import_key with Triple DES 3-Key [Check 9] Test psa_import_key with EC Public key [Check 10] Test psa_import_key with EC keypair [Check 11] Test psa_import_key 16 bytes AES with invalid bits [Check 12] Test psa_import_key with key data greater than the algorithm size [Check 13] Test psa_import_key with incorrect key data size [Check 14] Test psa_import_key with invalid key type value TEST RESULT: PASSED ****************************************** TEST: 203 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_key [Info] Executing tests from non-secure [Check 1] Test psa_export_key 16 Byte AES [Check 2] Test psa_export_key 24 Byte AES [Check 3] Test psa_export_key 32 Byte AES [Check 4] Test psa_export_key 2048 RSA public key [Check 5] Test psa_export_key with RSA 2048 keypair [Check 6] Test psa_export_key with DES 64 bit key [Check 7] Test psa_export_key with Triple DES 2-Key [Check 8] Test psa_export_key with Triple DES 3-Key [Check 9] Test psa_export_key with EC Public key [Check 10] Test psa_export_key with EC keypair [Check 11] Test psa_export_key with key policy verify [Check 12] Test psa_export_key with less buffer size TEST RESULT: PASSED ****************************************** TEST: 204 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_public_key [Info] Executing tests from non-secure [Check 1] Test psa_export_public_key 16 Byte AES [Check 2] Test psa_export_public_key 24 Byte AES [Check 3] Test psa_export_public_key 32 Byte AES [Check 4] Test psa_export_public_key 2048 RSA public key [Check 5] Test psa_export_public_key with RSA 2048 keypair [Check 6] Test psa_export_public_key with DES 64 bit key [Check 7] Test psa_export_public_key with Triple DES 2-Key [Check 8] Test psa_export_public_key with Triple DES 3-Key [Check 9] Test psa_export_public_key with EC Public key [Check 10] Test psa_export_public_key with EC keypair [Check 11] Test psa_export_public_key with less buffer size TEST RESULT: PASSED ****************************************** TEST: 205 | DESCRIPTION: Testing crypto key management APIs | UT: psa_destroy_key [Info] Executing tests from non-secure [Check 1] Test psa_destroy_key 16 Byte AES [Check 2] Test psa_destroy_key 24 Byte AES [Check 3] Test psa_destroy_key 32 Byte AES [Check 4] Test psa_destroy_key 2048 RSA public key [Check 5] Test psa_destroy_key with RSA 2048 keypair [Check 6] Test psa_destroy_key with DES 64 bit key [Check 7] Test psa_destroy_key with Triple DES 2-Key [Check 8] Test psa_destroy_key with Triple DES 3-Key [Check 9] Test psa_destroy_key with EC Public key [Check 10] Test psa_destroy_key with EC keypair TEST RESULT: PASSED ****************************************** TEST: 206 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compute [Info] Executing tests from non-secure [Check 1] Test psa_hash_compute with MD5 algorithm [Check 2] Test psa_hash_compute with RIPEMD160 algorithm [Check 3] Test psa_hash_compute with SHA1 algorithm [Check 4] Test psa_hash_compute with SHA224 algorithm [Check 5] Test psa_hash_compute with SHA256 algorithm [Check 6] Test psa_hash_compute with SHA384 algorithm [Check 7] Test psa_hash_compute with SHA512 algorithm [Check 8] Test psa_hash_compute with small buffer size [Check 9] Test psa_hash_compute with invalid algorithm TEST RESULT: PASSED ****************************************** TEST: 207 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compare [Info] Executing tests from non-secure [Check 1] Test psa_hash_compare with MD5 algorithm [Check 2] Test psa_hash_compare with RIPEMD160 algorithm [Check 3] Test psa_hash_compare with SHA1 algorithm [Check 4] Test psa_hash_compare with SHA224 algorithm [Check 5] Test psa_hash_compare with SHA256 algorithm [Check 6] Test psa_hash_compare with SHA384 algorithm [Check 7] Test psa_hash_compare with SHA512 algorithm [Check 8] Test psa_hash_compare with incorrect hash [Check 9] Test psa_hash_compare with incorrect hash length [Check 10] Test psa_hash_compare with invalid algorithm TEST RESULT: PASSED ****************************************** TEST: 208 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_setup [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_setup - ECDH + HKDF-SHA-256 [Check 2] Test psa_key_derivation_setup - ECDH, unknown KDF [Check 3] Test psa_key_derivation_setup - bad key derivation algorithm [Check 4] Test psa_key_derivation_setup - Invalid Algorithm TEST RESULT: PASSED ****************************************** TEST: 209 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_bytes [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_input_bytes - Step as Info [Check 2] Test psa_key_derivation_input_bytes - Step as secret [Check 3] Test psa_key_derivation_input_bytes - Step as salt [Check 4] Test psa_key_derivation_input_bytes - Step as label [Check 5] Test psa_key_derivation_input_bytes - Step as seed [Check 6] Test psa_key_derivation_input_bytes - Invalid step TEST RESULT: PASSED ****************************************** TEST: 210 | DESCRIPTION: Testing crypto key attributes APIs | UT: psa_key_attributes_set_get [Info] Executing tests from non-secure [Check 1] Test psa_key_attributes_set_get key attributes TEST RESULT: PASSED ****************************************** TEST: 211 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_setup [Info] Executing tests from non-secure [Check 1] Test psa_hash_setup with MD5 algorithm [Check 2] Test psa_hash_setup with RIPEMD160 algorithm [Check 3] Test psa_hash_setup with SHA1 algorithm [Check 4] Test psa_hash_setup with SHA224 algorithm [Check 5] Test psa_hash_setup with SHA256 algorithm [Check 6] Test psa_hash_setup with SHA384 algorithm [Check 7] Test psa_hash_setup with SHA512 algorithm [Check 8] Test psa_hash_setup with Invalid hash algorithm [Check 9] Test psa_hash_setup with Invalid algorithm [Check 10] Test psa_hash_setup with CTR algorithm TEST RESULT: PASSED ****************************************** TEST: 212 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_update [Info] Executing tests from non-secure [Check 1] Test psa_hash_update with MD5 algorithm [Check 2] Test psa_hash_update with RIPEMD160 algorithm [Check 3] Test psa_hash_update with SHA1 algorithm [Check 4] Test psa_hash_update with SHA224 algorithm [Check 5] Test psa_hash_update with SHA256 algorithm [Check 6] Test psa_hash_update with SHA384 algorithm [Check 7] Test psa_hash_update with SHA512 algorithm [Check 8] Test psa_hash_update without hash setup [Check 9] Test psa_hash_update with completed opertaion handle TEST RESULT: PASSED ****************************************** TEST: 213 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_verify [Info] Executing tests from non-secure [Check 1] Test psa_hash_verify with MD5 algorithm [Check 2] Test psa_hash_verify with RIPEMD160 algorithm [Check 3] Test psa_hash_verify with SHA1 algorithm [Check 4] Test psa_hash_verify with SHA224 algorithm [Check 5] Test psa_hash_verify with SHA256 algorithm [Check 6] Test psa_hash_verify with SHA384 algorithm [Check 7] Test psa_hash_verify with SHA512 algorithm [Check 8] Test psa_hash_verify with incorrect expected hash [Check 9] Test psa_hash_verify with incorrect hash length [Check 10] test psa_hash_verify with inactive & invalid operation handle TEST RESULT: PASSED ****************************************** TEST: 214 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_finish [Info] Executing tests from non-secure [Check 1] Test psa_hash_finish with MD5 algorithm [Check 2] Test psa_hash_finish with RIPEMD160 algorithm [Check 3] Test psa_hash_finish with SHA1 algorithm [Check 4] Test psa_hash_finish with SHA224 algorithm [Check 5] Test psa_hash_finish with SHA256 algorithm [Check 6] Test psa_hash_finish with SHA384 algorithm [Check 7] Test psa_hash_finish with SHA512 algorithm [Check 8] Test psa_hash_finish with invalid hash buffer size [Check 9] test psa_hash_finish with inactive operation handle TEST RESULT: PASSED ****************************************** TEST: 215 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_abort [Info] Executing tests from non-secure [Check 1] Test psa_hash_abort with MD5 algorithm [Check 2] Test psa_hash_abort with RIPEMD160 algorithm [Check 3] Test psa_hash_abort with SHA1 algorithm [Check 4] Test psa_hash_abort with SHA224 algorithm [Check 5] Test psa_hash_abort with SHA256 algorithm [Check 6] Test psa_hash_abort with SHA384 algorithm [Check 7] Test psa_hash_abort with SHA512 algorithm [Check 8] Test psa_hash_finish after calling psa_hash_abort TEST RESULT: PASSED ****************************************** TEST: 216 | DESCRIPTION: Testing crypto generator functions APIs | UT: psa_generate_key [Info] Executing tests from non-secure [Check 1] Test psa_generate_key 16 Byte AES [Check 2] Test psa_generate_key 24 Byte AES [Check 3] Test psa_generate_key 32 Byte AES [Check 4] Test psa_generate_key with DES 64 bit key [Check 5] Test psa_generate_key with Triple DES 2-Key [Check 6] Test psa_generate_key with Triple DES 3-Key [Check 7] Test psa_generate_key with RSA 2048 Keypair [ 787.490673] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 787.490765] rcu: 5-...0: (0 ticks this GP) idle=7564/1/0x4000000000000000 softirq=2241/2241 fqs=2625 [ 787.491064] (detected by 3, t=5252 jiffies, g=3365, q=8 ncpus=8) [ 787.491301] Task dump for CPU 5: [ 787.491464] task:psa-crypto-api- state:R running task stack:0 pid:209 ppid:191 flags:0x00000002 [ 787.491764] Call trace: [ 787.491864] __switch_to+0xe4/0x160 [ 787.492079] 0x0 [Check 8] Test psa_generate_key with ECC KeyPair [Check 9] Test psa_generate_key with RSA 2048 Public key [Check 10] Test psa_generate_key with invalid key type [Check 11] Test psa_generate_key with invalid usage flags TEST RESULT: PASSED ****************************************** TEST: 217 | DESCRIPTION: Testing crypto generation APIs | UT: psa_generate_random [Info] Executing tests from non-secure [Check 1] Test psa_generate_random to get 0 Byte data [Check 2] Test psa_generate_random to get 16 Byte data [Check 3] Test psa_generate_random to get 24 Byte data [Check 4] Test psa_generate_random to get 32 Byte data [Check 5] Test psa_generate_random to get 64 Byte data [Check 6] Test psa_generate_random to get 128 Byte data [Check 7] Test psa_generate_random to get 256 Byte data [Check 8] Test psa_generate_random to get 512 Byte data [Check 9] Test psa_generate_random to get 1000 Byte data TEST RESULT: PASSED ****************************************** TEST: 218 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_key [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_input_key 16 Byte Key [Check 2] Test psa_key_derivation_input_key with invalid usage [Check 3] Test psa_key_derivation_input_key with step as label [Check 4] Test psa_key_derivation_input_key with step as info [Check 5] Test psa_key_derivation_input_key with step as seed [Check 6] Test psa_key_derivation_input_key with step as salt [Check 7] Test psa_key_derivation_input_key with key type as AES(not derive) [Check 8] Test psa_key_derivation_input_key incorrect key algorithm [Check 9] Test psa_key_derivation_input_key with key type as 2048 RSA public key [Check 10] Test psa_key_derivation_input_key with key type as RSA 2048 keypair [Check 11] Test psa_key_derivation_input_key with zero as step [Check 12] Test psa_cipher_decrypt_setup - Invalid key handle [Check 13] Test psa_cipher_decrypt_setup - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 219 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_key_agreement [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_key_agreement - ECDH SECP256R1 [Check 2] Test psa_key_derivation_key_agreement - Invalid step [Check 3] Test psa_key_derivation_key_agreement - ECDH SECP384R1 [Check 4] Test psa_key_derivation_key_agreement - Invalid usage [Check 5] Test psa_key_derivation_key_agreement - KDF not a key agreement alg [Check 6] Test psa_key_derivation_key_agreement - Public key of different curve [Check 7] Test psa_key_derivation_key_agreement - Pub key instead of Prv key [Check 8] Test psa_key_derivation_key_agreement - Invalid handle [Check 9] Test psa_key_derivation_key_agreement - Zero as handle TEST RESULT: PASSED ****************************************** TEST: 220 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_bytes [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_output_bytes - HKDF [Check 2] Test psa_key_derivation_output_bytes - optional salt [Check 3] Test psa_key_derivation_output_bytes - capacity < output_length [Check 4] Test psa_key_derivation_output_bytes - missing info [Check 5] Test psa_key_derivation_output_bytes - missing salt/secret/info [Check 6] Test psa_key_derivation_output_bytes - TLS12_PRF [Check 7] Test psa_key_derivation_output_bytes - capacity < output_length [Check 8] Test psa_key_derivation_output_bytes - missing seed/secret/label TEST RESULT: PASSED ****************************************** TEST: 221 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_key [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_output_key - Key [Check 2] Test psa_key_derivation_output_key - Info [Check 3] Test psa_key_derivation_output_key - Salt [Check 4] Test psa_key_derivation_output_key - Greater Capacity than available [Check 5] Test psa_key_derivation_output_key - ECC Public key [Check 6] Test psa_key_derivation_output_key - ECC keypair (wrong key length) [Check 7] Test psa_key_derivation_output_key - RSA Public Key[Check 8] Test psa_key_derivation_output_key - RSA keypair [Check 9] Test psa_key_derivation_output_key - Invalid key size TEST RESULT: PASSED ****************************************** TEST: 222 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_abort [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_abort TEST RESULT: PASSED ****************************************** TEST: 223 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_set_get_capacity [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_set_get_capacity - < operation's capacity [Check 2] Test psa_key_derivation_set_get_capacity - = operation's capacity [Check 3] Test psa_key_derivation_set_get_capacity - > operation's capacity [Check 4] Test psa_key_derivation_set_get_capacity - unchanged capacity TEST RESULT: PASSED ****************************************** TEST: 224 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt [Info] Executing tests from non-secure [Check 1] Test psa_aead_encrypt - CCM - AES - 13B nonce & 8B add data [Check 2] Test psa_aead_encrypt - CCM - AES - 13B nonce & 32B add data [Check 3] Test psa_aead_encrypt - CCM - AES - 24 bytes Tag length = 4 [Check 4] Test psa_aead_encrypt - CCM - AES - Zero additional data [Check 5] Test psa_aead_encrypt - CCM - AES - Zero plaintext [Check 6] Test psa_aead_encrypt - GCM - AES - 12B nonce & 12B add data [Check 7] Test psa_aead_encrypt - Unsupported algorithm [Check 8] Test psa_aead_encrypt - Invalid usage flag [Check 9] Test psa_aead_encrypt - Invalid ciphertext_size [Check 10] Test psa_aead_encrypt - Invalid nonce [Check 11] Test psa_aead_encrypt - Invalid tag length 0 TEST RESULT: PASSED ****************************************** TEST: 225 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt [Info] Executing tests from non-secure [Check 1] Test psa_aead_decrypt - CCM - AES - 13B nonce & 8B add data [Check 2] Test psa_aead_decrypt - CCM - AES - 13B nonce & 32B add data [Check 3] Test psa_aead_decrypt - CCM - AES - 24 bytes Tag length = 4 [Check 4] Test psa_aead_decrypt - CCM - AES - Zero additional data [Check 5] Test psa_aead_decrypt - CCM - AES - Zero plaintext [Check 6] Test psa_aead_decrypt - GCM - AES - 12B nonce & 12B add data [Check 7] Test psa_aead_decrypt - Unsupported algorithm [Check 8] Test psa_aead_decrypt - Invalid usage flag [Check 9] Test psa_aead_decrypt - Invalid plaintext_size [Check 10] Test psa_aead_decrypt - Invalid nonce [Check 11] Test psa_aead_decrypt - Invalid cihpertext [Check 12] Test psa_aead_decrypt - Invalid cihpertext_size [Check 13] Test psa_aead_decrypt - Invalid tag length 0 TEST RESULT: PASSED ****************************************** TEST: 226 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_setup [Info] Executing tests from non-secure [Check 1] Test psa_mac_sign_setup - HMAC - SHA256 [Check 2] Test psa_mac_sign_setup - CMAC - AES [Check 3] Test psa_mac_sign_setup - Incompatible HMAC for CMAC [Check 4] Test psa_mac_sign_setup - Invalid usage flag [Check 5] Test psa_mac_sign_setup - Invalid key type [Check 6] Test psa_mac_sign_setup - Truncated MAC too large [Check 7] Test psa_mac_sign_setup - Truncated MAC too small [Check 8] Test psa_mac_sign_setup - Unknown MAC algorithm [Check 9] Test psa_mac_sign_setup - Bad algorithm (not a MAC algorithm) [Check 10] Test psa_mac_sign_setup invalid key handle [Check 11] Test psa_mac_sign_setup zero as key handle TEST RESULT: PASSED ****************************************** TEST: 227 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_update [Info] Executing tests from non-secure [Check 1] Test psa_mac_update - HMAC - SHA256 - 64 Byte [Check 2] Test psa_mac_update - CMAC - AES - 16 Byte [Check 3] Test psa_mac_update - HMAC - SHA512 - 32 Byte [Check 4] Test psa_mac_update - HMAC - SHA512 - Invalid operation state TEST RESULT: PASSED ****************************************** TEST: 228 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_finish [Info] Executing tests from non-secure [Check 1] Test psa_mac_sign_finish - HMAC - SHA224 [Check 2] Test psa_mac_sign_finish - HMAC - SHA256 [Check 3] Test psa_mac_sign_finish - HMAC - SHA512 [Check 4] Test psa_mac_sign_finish - HMAC - SHA224 - Truncated 8 Byte [Check 5] Test psa_mac_sign_finish - HMAC - SHA224 - Small output buffer [Check 6] Test psa_mac_sign_finish - HMAC - SHA224 - Invalid operation state [Check 7] Test psa_mac_sign_finish - CMAC - AES TEST RESULT: PASSED ****************************************** TEST: 229 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_setup [Info] Executing tests from non-secure [Check 1] Test psa_mac_verify_setup - HMAC - SHA256 [Check 2] Test psa_mac_verify_setup - CMAC - AES [Check 3] Test psa_mac_verify_setup - Incompatible HMAC for CMAC [Check 4] Test psa_mac_verify_setup - Invalid usage flag [Check 5] Test psa_mac_verify_setup - Invalid key type [Check 6] Test psa_mac_verify_setup - Truncated MAC too large [Check 7] Test psa_mac_verify_setup - Truncated MAC too small [Check 8] Test psa_mac_verify_setup - Unknown MAC algorithm [Check 9] Test psa_mac_verify_setup - Bad algorithm (not a MAC algorithm) [Check 10] Test psa_mac_verify_setup invalid key handle [Check 11] Test psa_mac_verify_setup zero as key handle TEST RESULT: PASSED ****************************************** TEST: 230 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_finish [Info] Executing tests from non-secure [Check 1] Test psa_mac_verify_finish - HMAC - SHA224 [Check 2] Test psa_mac_verify_finish - HMAC - SHA256 [Check 3] Test psa_mac_verify_finish - HMAC - SHA512 [Check 4] Test psa_mac_verify_finish - HMAC - SHA224 - Truncated 8 Byte [Check 5] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid mac length [Check 6] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid expected mac [Check 7] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid operation state [Check 8] Test psa_mac_verify_finish - CMAC - AES TEST RESULT: PASSED ****************************************** TEST: 231 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_abort [Info] Executing tests from non-secure [Check 1] Test psa_mac_abort - HMAC - SHA224 [Check 2] Test psa_mac_abort - HMAC - SHA224 - Truncated 8 Byte [Check 3] Test psa_mac_abort - HMAC - SHA256 [Check 4] Test psa_mac_abort - HMAC - SHA512 [Check 5] Test psa_mac_abort - CMAC - AES [Check 6] Test psa_mac_sign_finish after calling psa_mac_abort TEST RESULT: PASSED ****************************************** TEST: 232 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt_setup [Info] Executing tests from non-secure [Check 1] Test psa_cipher_encrypt_setup 16 Byte AES [Check 2] Test psa_cipher_encrypt_setup 24 Byte AES [Check 3] Test psa_cipher_encrypt_setup 32 Byte AES [Check 4] Test psa_cipher_encrypt_setup DES 64 bit key [Check 5] Test psa_cipher_encrypt_setup Triple DES 2-Key [Check 6] Test psa_cipher_encrypt_setup Triple DES 3-Key [Check 7] Test psa_cipher_encrypt_setup 16 Byte raw data [Check 8] Test psa_cipher_encrypt_setup - not a cipher algorithm [Check 9] Test psa_cipher_encrypt_setup - unknown cipher algorithm [Check 10] Test psa_cipher_encrypt_setup - incompatible key ARC4 [Check 11] Test psa_cipher_encrypt_setup - incorrect usage [Check 12] Test psa_cipher_encrypt_setup - RSA public key [Check 13] Test psa_cipher_encrypt_setup - RSA keypair [Check 14] Test psa_cipher_encrypt_setup - EC Public key [Check 15] Test psa_cipher_encrypt_setup - EC keypair [Check 16] Test psa_cipher_encrypt_setup - Invalid key handle [Check 17] Test psa_cipher_encrypt_setup - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 233 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt_setup [Info] Executing tests from non-secure [Check 1] Test psa_cipher_decrypt_setup 16 Byte AES [Check 2] Test psa_cipher_decrypt_setup 24 Byte AES [Check 3] Test psa_cipher_decrypt_setup 32 Byte AES [Check 4] Test psa_cipher_decrypt_setup DES 64 bit key [Check 5] Test psa_cipher_decrypt_setup Triple DES 2-Key [Check 6] Test psa_cipher_decrypt_setup Triple DES 3-Key [Check 7] Test psa_cipher_decrypt_setup 16 Byte raw data [Check 8] Test psa_cipher_decrypt_setup - not a cipher algorithm [Check 9] Test psa_cipher_decrypt_setup - unknown cipher algorithm [Check 10] Test psa_cipher_decrypt_setup - incompatible key ARC4 [Check 11] Test psa_cipher_decrypt_setup - incorrect usage [Check 12] Test psa_cipher_decrypt_setup - RSA public key [Check 13] Test psa_cipher_decrypt_setup - RSA keypair [Check 14] Test psa_cipher_decrypt_setup - EC Public key [Check 15] Test psa_cipher_decrypt_setup - EC keypair [Check 16] Test psa_cipher_decrypt_setup - Invalid key handle [Check 17] Test psa_cipher_decrypt_setup - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 234 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_generate_iv [Info] Executing tests from non-secure [Check 1] Test psa_cipher_generate_iv 16 Byte AES [Check 2] Test psa_cipher_generate_iv 24 Byte AES [Check 3] Test psa_cipher_generate_iv 32 Byte AES [Check 4] Test psa_cipher_generate_iv DES 64 bit key [Check 5] Test psa_cipher_generate_iv DES 2-Key [Check 6] Test psa_cipher_generate_iv DES 3-Key [Check 7] Test psa_cipher_generate_iv AES - small iv buffer [Check 8] Test psa_cipher_generate_iv DES - small iv buffer TEST RESULT: PASSED ****************************************** TEST: 235 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_set_iv [Info] Executing tests from non-secure [Check 1] Test psa_cipher_set_iv 16 Byte AES [Check 2] Test psa_cipher_set_iv 24 Byte AES [Check 3] Test psa_cipher_set_iv 32 Byte AES [Check 4] Test psa_cipher_set_iv DES 64 bit key [Check 5] Test psa_cipher_set_iv DES 2-Key [Check 6] Test psa_cipher_set_iv DES 3-Key [Check 7] Test psa_cipher_set_iv AES - small iv buffer [Check 8] Test psa_cipher_set_iv DES - small iv buffer [Check 9] Test psa_cipher_set_iv AES - large iv buffer [Check 10] Test psa_cipher_set_iv DES - large iv buffer TEST RESULT: PASSED ****************************************** TEST: 236 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_update [Info] Executing tests from non-secure [Check 1] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING (Short in) [Check 3] Test psa_cipher_update - Encrypt - AES CBC_PKCS7 [Check 4] Test psa_cipher_update - Encrypt - AES CBC_PKCS7 (Short input) [Check 5] Test psa_cipher_update - Encrypt - AES CTR [Check 6] Test psa_cipher_update - Encrypt - DES CBC (nopad) [Check 7] Test psa_cipher_update - Encrypt - 2-key 3DE -CBC (nopad) [Check 8] Test psa_cipher_update - Encrypt - 3-key 3DE -CBC (nopad) [Check 9] Test psa_cipher_update - Encrypt - small output buffer size [Check 10] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING [Check 11] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING (Short in) [Check 12] Test psa_cipher_update - Decrypt - AES CBC_PKCS7 [Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7 (Short input) [Check 14] Test psa_cipher_update - Decrypt - AES CTR [Check 15] Test psa_cipher_update - Decrypt - DES CBC (nopad) [Check 16] Test psa_cipher_update - Decrypt - 2-key 3DE -CBC (nopad) [Check 17] Test psa_cipher_update - Decrypt - 3-key 3DE -CBC (nopad) [Check 18] Test psa_cipher_update - Decrypt - small output buffer size [Check 19] Test psa_cipher_update without cipher setup TEST RESULT: PASSED ****************************************** TEST: 237 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_finish [Info] Executing tests from non-secure [Check 1] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING (Short in) [Check 3] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7 [Check 4] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7 (Short input) [Check 5] Test psa_cipher_finish - Encrypt - AES CTR [Check 6] Test psa_cipher_finish - Encrypt - AES CTR (short input) [Check 7] Test psa_cipher_finish - Encrypt - DES CBC (nopad) [Check 8] Test psa_cipher_finish - Encrypt - 2-key 3DE -CBC (nopad) [Check 9] Test psa_cipher_finish - Encrypt - 3-key 3DE -CBC (nopad) [Check 10] Test psa_cipher_finish - Encrypt - small output buffer size [Check 11] Test psa_cipher_finish - Decrypt - AES CBC_NO_PADDING [Check 12] Test psa_cipher_finish - Decrypt - AES CBC_NO_PADDING (Short in) [Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7 [Check 14] Test psa_cipher_finish - Decrypt - AES CBC_PKCS7 (Short input) [Check 15] Test psa_cipher_finish - Decrypt - AES CTR [Check 16] Test psa_cipher_finish - Decrypt - AES CTR (short input) [Check 17] Test psa_cipher_finish - Decrypt - DES CBC (nopad) [Check 18] Test psa_cipher_finish - Decrypt - 2-key 3DE -CBC (nopad) [Check 19] Test psa_cipher_finish - Decrypt - 3-key 3DE -CBC (nopad) TEST RESULT: PASSED ****************************************** TEST: 238 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_abort [Info] Executing tests from non-secure [Check 1] Test psa_cipher_abort - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_abort - Encrypt - AES CBC_PKCS7 [Check 3] Test psa_cipher_abort - Encrypt - AES CTR [Check 4] Test psa_cipher_abort - Encrypt - DES CBC (nopad) [Check 5] Test psa_cipher_abort - Encrypt - 2-key 3DE -CBC (nopad) [Check 6] Test psa_cipher_abort - Encrypt - 3-key 3DE -CBC (nopad) [Check 7] Test psa_cipher_abort - Decrypt - AES CBC_NO_PADDING [Check 8] Test psa_cipher_abort - Decrypt - AES CBC_PKCS7 [Check 9] Test psa_cipher_abort - Decrypt - AES CTR [Check 10] Test psa_cipher_abort - Decrypt - DES CBC (nopad) [Check 11] Test psa_cipher_abort - Decrypt - 2-key 3DE -CBC (nopad) [Check 12] Test psa_cipher_abort - Decrypt - 3-key 3DE -CBC (nopad) [Check 13] Test psa_cipher_update after psa_cipher_abort should fail TEST RESULT: PASSED ****************************************** TEST: 239 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_encrypt [Info] Executing tests from non-secure [Check 1] Test psa_asymmetric_encrypt - RSA PKCS1V15 [Check 2] Test psa_asymmetric_encrypt - RSA KEY_PAIR PKCS1V15 [Check 3] Test psa_asymmetric_encrypt - RSA OAEP SHA256 [Check 4] Test psa_asymmetric_encrypt - RSA OAEP SHA256 with label [Check 5] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256 [Check 6] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256 with label [Check 7] Test psa_asymmetric_encrypt - Small output buffer [Check 8] Test psa_asymmetric_encrypt - Invalid algorithm [Check 9] Test psa_asymmetric_encrypt - Invalid key type [Check 10] Test psa_asymmetric_encrypt - Invalid usage [Check 11] Test psa_asymmetric_encrypt - RSA PKCS1V15 - Salt [Check 12] Test psa_asymmetric_encrypt - ECC public key [Check 13] Test psa_asymmetric_encrypt - Invalid key handle [Check 14] Test psa_asymmetric_encrypt - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 240 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_decrypt [Info] Executing tests from non-secure [Check 1] Test psa_asymmetric_decrypt - RSA KEY_PAIR PKCS1V15 [Check 2] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256 [Check 3] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256 with label [Check 4] Test psa_asymmetric_decrypt - Invalid key type (RSA public key) [Check 5] Test psa_asymmetric_decrypt - Small output buffer [Check 6] Test psa_asymmetric_decrypt - Invalid algorithm [Check 7] Test psa_asymmetric_decrypt - Invalid key type (AES Key) [Check 8] Test psa_asymmetric_decrypt - Invalid usage [Check 9] Test psa_asymmetric_decrypt - RSA PKCS1V15 - Salt [Check 10] Test psa_asymmetric_decrypt - Invalid key handle [Check 11] Test psa_asymmetric_decrypt - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 241 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_sign_hash [Info] Executing tests from non-secure [Check 1] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 RAW [Check 2] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 SHA-256 [Check 3] Test psa_sign_hash - ECDSA SECP256R1 SHA-256 [Check 4] Test psa_sign_hash - Invalid key type (RSA public key) [Check 5] Test psa_sign_hash - Small output buffer [Check 6] Test psa_sign_hash - Invalid algorithm [Check 7] Test psa_sign_hash - Invalid key type (AES Key) [Check 8] Test psa_sign_hash - Invalid usage [Check 9] Test psa_sign_hash - Wrong hash size [Check 10] Test psa_sign_hash - Invalid key handle [Check 11] Test psa_sign_hash - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 242 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_verify_hash [Info] Executing tests from non-secure [Check 1] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 RAW [Check 2] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 SHA-256 [Check 3] Test psa_verify_hash - ECDSA KEY_PAIR SECP256R1 SHA-256 [Check 4] Test psa_verify_hash - EC public key [Check 5] Test psa_verify_hash - RSA public key [Check 6] Test psa_verify_hash - Small output buffer [Check 7] Test psa_verify_hash - Invalid algorithm [Check 8] Test psa_verify_hash - Invalid key type (AES Key) [Check 9] Test psa_verify_hash - Invalid usage [Check 10] Test psa_verify_hash - Wrong hash size [Check 11] Test psa_verify_hash - Wrong signature [Check 12] Test psa_verify_hash - Wrong signature size [Check 13] Test psa_verify_hash - Invalid key handle [Check 14] Test psa_verify_hash - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 243 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_raw_key_agreement [Info] Executing tests from non-secure [Check 1] Test psa_raw_key_agreement - ECDH SECP256R1 [Check 2] Test psa_raw_key_agreement - Small buffer size [Check 3] Test psa_raw_key_agreement - ECDH SECP384R1 [Check 4] Test psa_raw_key_agreement - Invalid usage [Check 5] Test psa_raw_key_agreement - Unknown KDF [Check 6] Test psa_raw_key_agreement - Not a key agreement alg [Check 7] Test psa_raw_key_agreement - Public key on different curve [Check 8] Test psa_raw_key_agreement - Public key instead of private key [Check 9] Test psa_raw_key_agreement - Invalid key handle [Check 10] Test psa_raw_key_agreement - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 244 | DESCRIPTION: Testing crypto key management APIs | UT: psa_copy_key [Info] Executing tests from non-secure [Check 1] Test psa_copy_key - 2048 RSA public key [Check 2] Test psa_copy_key - RSA 2048 keypair [Check 3] Test psa_copy_key - Incompatible target policy(source and target) [Check 4] Test psa_copy_key - source key with no export usage [Check 5] Test psa_copy_key - DES 64 bit key [Check 6] Test psa_copy_key - Triple DES 2-Key [Check 7] Test psa_copy_key - Triple DES 3-Key [Check 8] Test psa_copy_key - EC Public key [Check 9] Test psa_copy_key - EC keypair TEST RESULT: PASSED ****************************************** TEST: 245 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_clone [Info] Executing tests from non-secure [Check 1] Test psa_hash_clone - MD5 algorithm [Check 2] Test psa_hash_clone - RIPEMD160 algorithm [Check 3] Test psa_hash_clone - SHA1 algorithm [Check 4] Test psa_hash_clone - SHA224 algorithm [Check 5] Test psa_hash_clone - SHA256 algorithm [Check 6] Test psa_hash_clone - SHA384 algorithm [Check 7] Test psa_hash_clone - SHA512 algorithm [Check 8] Test psa_hash_clone - from an inactive source operation [Check 9] Test psa_hash_clone - on an active target operation TEST RESULT: PASSED ****************************************** TEST: 246 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_compute [Info] Executing tests from non-secure [Check 1] Test psa_mac_compute HMAC SHA 224 [Check 2] Test psa_mac_compute - Incompactible HMAC for CMAC [Check 3] Test psa_mac_compute - Invalid usage [Check 4] Test psa_mac_compute - truncated MAC too small [Check 5] Test psa_mac_compute - truncated MAC too large [Check 6] Test psa_mac_compute - bad algorithm (unknown MAC algorithm) [Check 7] Test psa_mac_compute HMAC SHA 256 [Check 8] Test psa_mac_compute HMAC SHA 512 [Check 9] Test psa_mac_compute HMAC SHA 224 (truncated to 8 Byte) [Check 10] Test psa_mac_compute CMAC AES 128 [Check 11] Test psa_mac_compute small size buffer [Check 12] Test psa_mac_compute - Invalid key type TEST RESULT: PASSED ****************************************** TEST: 247 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify [Info] Executing tests from non-secure [Check 1] Test psa_mac_verify HMAC SHA 224 [Check 2] Test psa_mac_verify HMAC SHA 256 [Check 3] Test psa_mac_verify - Incompactible HMAC for CMAC [Check 4] Test psa_mac_verify - Invalid usage [Check 5] Test psa_mac_verify - Truncated MAC too large [Check 6] Test psa_mac_verify - Truncated MAC too small [Check 7] Test psa_mac_verify - bad algorithm (unknown MAC algorithm) [Check 8] Test psa_mac_verify HMAC SHA 512 [Check 9] Test psa_mac_verify HMAC SHA 224 (truncated to 8 Byte) [Check 10] Test psa_mac_verify CMAC AES 128 [Check 11] Test psa_mac_verify - Invalid key type [Check 12] Test psa_mac_verify small size buffer [Check 13] Test psa_mac_verify incorrect expected MAC TEST RESULT: PASSED ****************************************** TEST: 248 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt [Info] Executing tests from non-secure [Check 1] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING (Short input) [Check 3] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7 [Check 4] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7 (Short input) [Check 5] Test psa_cipher_encrypt - Encrypt - AES CTR [Check 6] Test psa_cipher_encrypt - Encrypt - AES CTR (short input) [Check 7] Test psa_cipher_encrypt - Encrypt - DES CBC (nopad) [Check 8] Test psa_cipher_encrypt - Encrypt - 2-key 3DE -CBC (nopad) [Check 9] Test psa_cipher_encrypt - Encrypt - 3-key 3DE -CBC (nopad) [Check 10] Test psa_cipher_encrypt - small output buffer size [Check 11] Test psa_cipher_encrypt - Decrypt - AES CBC_NO_PADDING TEST RESULT: PASSED ****************************************** TEST: 249 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt [Info] Executing tests from non-secure [Check 1] Test psa_cipher_decrypt - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING [Check 3] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING (Short input) [Check 4] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING [Check 5] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7 [Check 6] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7 (Short input) [Check 7] Test psa_cipher_decrypt - Decrypt - AES CTR [Check 8] Test psa_cipher_decrypt - Decrypt - DES CBC (nopad) [Check 9] Test psa_cipher_decrypt - Decrypt - 2-key 3DE -CBC (nopad) [Check 10] Test psa_cipher_decrypt - 3-key 3DE -CBC (nopad) TEST RESULT: PASSED ****************************************** TEST: 250 | DESCRIPTION: Testing crypto key management APIs | UT: psa_sign_message [Info] Executing tests from non-secure [Check 1] Test psa_sign_message - RSA KEY_PAIR PKCS1V15 RAW [Check 2] Test psa_sign_message - ECDSA SECP256R1 SHA-256 [Check 3] Test psa_sign_message - Invalid key type (RSA public key) [Check 4] Test psa_sign_message - Small output buffer [Check 5] Test psa_sign_message - Invalid algorithm [Check 6] Test psa_sign_message - Invalid key type (AES Key) [Check 7] Test psa_sign_message - Invalid usage [Check 8] Test psa_sign_message - Mismatch key type and Algorithm [Check 9] Test psa_sign_message - Alg mismatch in key and API call [Check 10] Test psa_sign_message - Invalid key handle [Check 11] Test psa_sign_message - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 251 | DESCRIPTION: Testing crypto key management APIs | UT: psa_verify_message [Info] Executing tests from non-secure [Check 1] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 RAW [Check 2] Test psa_verify_message - RSA Public Key PKCS1V15 RAW [Check 3] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 SHA-256 [Check 4] Test psa_verify_message - ECDSA KEY_PAIR SECP256R1 SHA-256 [Check 5] Test psa_verify_message - ECDSA Public Key SECP256R1 SHA-256 [Check 6] Test psa_verify_message - Small output buffer [Check 7] Test psa_verify_message - Invalid algorithm [Check 8] Test psa_verify_message - Invalid key type (AES Key) [Check 9] Test psa_verify_message - Invalid usage [Check 10] Test psa_verify_message - Wrong message size [Check 11] Test psa_verify_message - Wrong signature [Check 12] Test psa_verify_message - Wrong signature size [Check 13] Test psa_verify_message - Invalid key handle [Check 14] Test psa_verify_message - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 252 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt_setup [Info] Executing tests from non-secure [Check 1] Test psa_aead_encrypt_setup - CCM - AES [Check 2] Test psa_aead_encrypt_setup - CCM - AES - Tag length = 4 [Check 3] Test psa_aead_encrypt_setup - CCM - AES - Mismatched tag length [Check 4] Test psa_aead_encrypt_setup - CCM - AES - Default Tag length [Check 5] Test psa_aead_encrypt_setup - GCM - AES [Check 6] Test psa_aead_encrypt_setup - CCM - DES Invalid key [Check 7] Test psa_aead_encrypt_setup - Invalid usage flag TEST RESULT: PASSED ****************************************** TEST: 253 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt_setup [Info] Executing tests from non-secure [Check 1] Test psa_aead_decrypt_setup - CCM - AES [Check 2] Test psa_aead_decrypt_setup - CCM - AES - Tag length = 4 [Check 3] Test psa_aead_decrypt_setup - CCM - AES - Mismatched tag length [Check 4] Test psa_aead_decrypt_setup - CCM - AES - Default Tag length [Check 5] Test psa_aead_decrypt_setup - GCM - AES [Check 6] Test psa_aead_decrypt_setup - CCM - DES Invalid key [Check 7] Test psa_aead_decrypt_setup - Invalid usage flag TEST RESULT: PASSED ****************************************** TEST: 254 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_generate_nonce [Info] Executing tests from non-secure [Check 1] Test psa_aead_generate_nonce - CCM [Check 2] Test psa_aead_generate_nonce - CCM - Tag length = 4 [Check 3] Test psa_aead_generate_nonce - CCM - Small buffer size [Check 4] Test psa_aead_generate_nonce - CCM - Uninitialized operation [Check 5] Test psa_aead_generate_nonce - CCM - Decrypt operation [Check 6] Test psa_aead_generate_nonce - GCM [Check 7] Test psa_aead_generate_nonce - GCM - Decrypt operation TEST RESULT: PASSED ****************************************** TEST: 255 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_nonce [Info] Executing tests from non-secure [Check 1] Test psa_aead_set_nonce - Encrypt - CCM [Check 2] Test psa_aead_set_nonce - Encrypt - CCM - Tag length = 4 [Check 3] Test psa_aead_set_nonce - Encrypt - CCM - Small nonce size [Check 4] Test psa_aead_set_nonce - Encrypt - CCM - Large nonce size [Check 5] Test psa_aead_set_nonce - Encrypt - CCM - Invalid operation state [Check 6] Test psa_aead_set_nonce - Encrypt - GCM [Check 7] Test psa_aead_set_nonce - Decrypt - CCM [Check 8] Test psa_aead_set_nonce - Decrypt - CCM - Tag length = 4 [Check 9] Test psa_aead_set_nonce - Decrypt - CCM - Small nonce size [Check 10] Test psa_aead_set_nonce - Decrypt - CCM - Large nonce size [Check 11] Test psa_aead_set_nonce - Decrypt - CCM - Invalid operation state [Check 12] Test psa_aead_set_nonce - Decrypt - GCM TEST RESULT: PASSED ****************************************** TEST: 256 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_lengths [Info] Executing tests from non-secure [Check 1] Test psa_aead_set_lengths - Encrypt - CCM [Check 2] Test psa_aead_set_lengths - Encrypt - CCM - Tag length = 4 [Check 3] Test psa_aead_set_lengths - Encrypt - CCM - Zero ad_length [Check 4] Test psa_aead_set_lengths - Encrypt - CCM - Zero plaintext_length [Check 5] Test psa_aead_set_lengths - Encrypt - CCM - Invalid operation state [Check 6] Test psa_aead_set_lengths - Encrypt - GCM [Check 7] Test psa_aead_set_lengths - Decrypt - CCM [Check 8] Test psa_aead_set_lengths - Decrypt - CCM - Tag length = 4 [Check 9] Test psa_aead_set_lengths - Decrypt - CCM - Zero ad_length [Check 10] Test psa_aead_set_lengths - Decrypt - CCM - Zero plaintext_length [Check 11] Test psa_aead_set_lengths - Decrypt - CCM - Invalid operation state [Check 12] Test psa_aead_set_lengths - Decrypt - GCM TEST RESULT: PASSED ****************************************** TEST: 257 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update_ad [Info] Executing tests from non-secure [Check 1] Test psa_aead_update_ad - Encrypt - CCM [Check 2] Test psa_aead_update_ad - Encrypt - CCM - Tag length = 4 [Check 3] Test psa_aead_update_ad - Encrypt - CCM - Zero ad_length [Check 4] Test psa_aead_update_ad - Encrypt - CCM - Zero plaintext_length [Check 5] Test psa_aead_update_ad - Encrypt - CCM - Invalid operation state [Check 6] Test psa_aead_update_ad - Encrypt - CCM - Overflow input length [Check 7] Test psa_aead_update_ad - Decrypt - CCM [Check 8] Test psa_aead_update_ad - Decrypt - CCM - Tag length = 4 [Check 9] Test psa_aead_update_ad - Decrypt - CCM - Zero ad_length [Check 10] Test psa_aead_update_ad - Decrypt - CCM - Zero plaintext_length [Check 11] Test psa_aead_update_ad - Decrypt - CCM - Invalid operation state [Check 12] Test psa_aead_update_ad - Decrypt - CCM - Overflow input length TEST RESULT: PASSED ****************************************** TEST: 258 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update [Info] Executing tests from non-secure [Check 1] Test psa_aead_update - Encrypt - CCM [Check 2] Test psa_aead_update - Encrypt - CCM - Tag length = 4 [Check 3] Test psa_aead_update - Encrypt - CCM - Zero ad_length [Check 4] Test psa_aead_update - Encrypt - CCM - Zero plaintext_length [Check 5] Test psa_aead_update - Encrypt - CCM - Small buffer size [Check 6] Test psa_aead_update - Encrypt - CCM - Less add data than specified [Check 7] Test psa_aead_update - Encrypt - CCM - Overflow input length [Check 8] Test psa_aead_update - Encrypt - CCM - Invalid operation state [Check 9] Test psa_aead_update - Decrypt - CCM [Check 10] Test psa_aead_update - Decrypt - CCM - Tag length = 4 [Check 11] Test psa_aead_update - Decrypt - CCM - Zero ad_length [Check 12] Test psa_aead_update - Decrypt - CCM - Zero plaintext_length [Check 13] Test psa_aead_update - Decrypt - CCM - Small buffer size [Check 14] Test psa_aead_update - Decrypt - Less add data than specified [Check 15] Test psa_aead_update - Decrypt - CCM - Overflow input length [Check 16] Test psa_aead_update - Decrypt - CCM - Invalid operation state TEST RESULT: PASSED ****************************************** TEST: 259 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_finish [Info] Executing tests from non-secure [Check 1] Test psa_aead_finish - AES-CCM [Check 2] Test psa_aead_finish - AES-CCM 24 bytes Tag length = 4 [Check 3] Test psa_aead_finish - Small buffer size [Check 4] Test psa_aead_finish - Input length is less than plaintext length [Check 5] Test psa_aead_finish - GCM - 16B AES - 12B Nonce & 12B additional data TEST RESULT: PASSED ****************************************** TEST: 260 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_abort [Info] Executing tests from non-secure [Check 1] Test psa_aead_abort - Encrypt - CCM - AES [Check 2] Test psa_aead_abort - Encrypt - GCM - AES [Check 3] Test psa_aead_abort - Decrypt - CCM - AES [Check 4] Test psa_aead_abort - Decrypt - GCM - AES [Check 5] Test psa_aead_abort with all initializations TEST RESULT: PASSED ****************************************** TEST: 261 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_verify [Info] Executing tests from non-secure [Check 1] Test psa_aead_verify - AES-CCM [Check 2] Test psa_aead_verify - AES-CCM 24 bytes Tag length = 4 [Check 3] Test psa_aead_verify - Small buffer size [Check 4] Test psa_aead_verify - Input length is less than plaintext length [Check 5] Test psa_aead_verify - GCM - 16B AES - 12B Nounce & 12B addi data TEST RESULT: PASSED ****************************************** TEST: 262 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_suspend [Info] Executing tests from non-secure [Check 1] Test psa_hash_suspend - MD5 Failed at Checkpoint: 5 Actual: -134 Expected: 0 TEST RESULT: FAILED (Error Code=0x1) ****************************************** TEST: 263 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_resume [Info] Executing tests from non-secure [Check 1] Test psa_hash_resume - MD5 Failed at Checkpoint: 5 Actual: -134 Expected: 0 TEST RESULT: FAILED (Error Code=0x1) ****************************************** ************ Crypto Suite Report ********** TOTAL TESTS : 63 TOTAL PASSED : 61 TOTAL SIM ERROR : 0 TOTAL FAILED : 2 TOTAL SKIPPED : 0 ****************************************** Entering standby..
# psa-iat-api-test ***** PSA Architecture Test Suite - Version 1.4 ***** Running.. Attestation Suite ****************************************** TEST: 601 | DESCRIPTION: Testing attestation initial attestation APIs | UT: psa_initial_attestation [Info] Executing tests from non-secure [Check 1] Test psa_initial_attestation_get_token with Challenge 32 Failed at Checkpoint: 2 Actual: 42 Expected: 0 TEST RESULT: FAILED (Error Code=0x1) ****************************************** ************ Attestation Suite Report ********** TOTAL TESTS : 1 TOTAL PASSED : 0 TOTAL SIM ERROR : 0 TOTAL FAILED : 1 TOTAL SKIPPED : 0 ****************************************** Entering standby..
- Last Author
- imre-kis-arm
- Last Edited
- Apr 26 2023, 10:33 AM