OP-TEE SPMC v3.22 test results
OP-TEE SPMC v3.22 test results
Overview
This page is to capture the test results for OP-TEE SPMC v3.22
The tests were ran using the following set of components:
>>> Manifest status d064c30 (HEAD -> default, origin/master, m/master) stm32mp1: fetch mbedtls for tf-a authenticated boot b242f5c stm32mp1: add edk2 and edk2-platforms repos 122fe9a stm32mp1: bump u-boot to 2023.04 Local manifests: The merged manifest is: <?xml version="1.0" encoding="UTF-8"?> <manifest> <remote fetch="https://git.gitlab.arm.com" name="arm-gitlab"/> <remote fetch="https://github.com" name="github"/> <remote fetch="https://git.savannah.gnu.org/git" name="savannah"/> <remote fetch="https://git.trustedfirmware.org" name="tfo"/> <default remote="github" revision="master"/> <project name="Mbed-TLS/mbedtls.git" path="mbedtls" revision="refs/tags/mbedtls-2.28.1"/> <project name="OP-TEE/build.git" path="build"> <linkfile dest="build/Makefile" src="fvp-psa-sp.mk"/> </project> <project name="OP-TEE/optee_client.git" path="optee_client"/> <project name="OP-TEE/optee_os.git" path="optee_os"/> <project name="OP-TEE/optee_test.git" path="optee_test"/> <project clone-depth="1" name="TF-A/trusted-firmware-a.git" path="trusted-firmware-a" remote="tfo" revision="refs/tags/v2.8"/> <project name="TS/trusted-services.git" path="trusted-services" remote="tfo" revision="integration"/> <project clone-depth="1" name="buildroot/buildroot.git" path="buildroot" revision="refs/tags/2022.11.1"/> <project clone-depth="1" name="grub.git" path="grub" remote="savannah" revision="refs/tags/grub-2.02"/> <project name="linaro-swg/optee_examples.git" path="optee_examples"/> <project clone-depth="1" name="linux-arm/linux-trusted-services.git" path="linux-arm-ffa-user" remote="arm-gitlab" revision="debugfs-v5"/> <project clone-depth="1" name="linux-arm/linux-trusted-services.git" path="linux-arm-ffa-tee" remote="arm-gitlab" revision="tee-v1"/> <project name="tianocore/edk2-platforms.git" path="edk2-platforms" revision="02daa58c21f89628b4d8c76f95f3a554289149bc"/> <project name="tianocore/edk2.git" path="edk2" revision="dd4cae4d82c7477273f3da455084844db5cca0c0"/> <project clone-depth="1" name="torvalds/linux.git" path="linux" revision="refs/tags/v6.1"/> </manifest> >>>Project status project build/ Local and remote SHA is matching. 2e792b3 (HEAD, m/master, github/master) fvp, ts: optimize buildroot config 3730e01 fvp, ts: use minimal Linux config 9b54724 Fix build of fTPM by enabling build of 32-bit libraries project buildroot/ Local and remote SHA is matching. d48a8beb (grafted, HEAD, tag: 2022.11.1, tag: m/master) Update for 2022.11.1 project edk2/ Local and remote SHA is matching. dd4cae4d82 (HEAD, m/master) ArmPkg/GenericWatchdogDxe: Split 64bit register write to 2x32bit 1d802e234e BaseTools: Guid.xref doesn't specify the correct GUID value for Driver 83964ebc5e BaseTools/BinToPcd: Encode string returned from ByteArray() project edk2-platforms/ Local and remote SHA is matching. 02daa58c21 (HEAD, m/master) Silicon/SynQuacer: Add status property in PCIe & SDHC DT nodes 9f02ebc19b Silicon/SynQuacer: add optional OP-TEE DT node 9dae9a0c79 Marvell/Library: ComPhyLib: Clean up the library after rework project grub/ Local and remote SHA is matching. e54c99a (grafted, HEAD, tag: grub-2.02, tag: m/master) Increase version to 2.02. project linux/ Local and remote SHA is matching. 830b3c68c (grafted, HEAD, tag: v6.1, tag: m/master) Linux 6.1 project linux-arm-ffa-tee/ Local and remote SHA is matching. c6b9495 (grafted, HEAD, m/master, arm-gitlab/tee-v1) Add versioning info to readme project linux-arm-ffa-user/ Local and remote SHA is matching. 18e3be7 (grafted, HEAD, m/master, arm-gitlab/debugfs-v5) Add support for FF-A driver changes in v6.1 project mbedtls/ Local and remote SHA is matching. dd79db100 (HEAD, tag: v2.28.1, tag: mbedtls-2.28.1, tag: m/master) Merge pull request #955 from Mbed-TLS/mbedtls-2.28.1rc0-pr fe9d08fd1 Bump version fa827b4b3 Minor tweaks to Changelog project optee_client/ Local and remote SHA is matching. 8533e0e (HEAD, tag: 3.21.0-rc1, tag: 3.21.0, m/master, github/master) travis: remove the .travis.yml file 0fc6ef7 tee-supplicant: fix leak when load plugin failed dde6306 libteeacl: use realloc() instead of reallocarray() project optee_examples/ Local and remote SHA is matching. 378dc0d (HEAD, tag: 3.21.0, m/master, github/master) hotp: use sess_ctx instead of global variables a98d01e (tag: 3.21.0-rc1, tag: 3.20.0-rc1, tag: 3.20.0) pluging: add missing of dependency syslog on teec 3ca8454 Enable compatibility with TEE Internal Core API v1.1 project optee_os/ Local and remote SHA is matching. 280b6a32e (HEAD, m/master, github/master) core: spmc: implement FFA_CONSOLE_LOG b89b3da24 core: thread: Add support for canary value randomization fb66b364b mk/aosp_optee.mk: fix build dependency for static libraries project optee_test/ Local and remote SHA is matching. 232dfd2 (HEAD, m/master, github/master) xtest: remove ffa.h from SPMC test to resolve compiler error 36a136d Android.mk: add subkeys include directory d168ff4 xtest: fix xtest tool name in usage trace messages project trusted-firmware-a/ Local and remote SHA is matching. 9881bb9 (grafted, HEAD, tag: v2.8, tag: m/master) Merge "docs(spm): update threat model" into integration project trusted-services/ Local and remote SHA is matching. e56c7b1 (HEAD, tfo/integration, m/master) Implement FFA_CONSOLE_LOG interface 0100ddd Add FF-A v1.1 boot protocol 4f9d8e3 Refactor FF-A boot info
Details
Config 1: embedded SP
Build command
MEASURED_BOOT=y SPMC_TESTS=n TS_SMM_GATEWAY=n TS_UEFI_TESTS=n SP_PACKAGING_METHOD=embedded DEFAULT_SP_CONFIG=default-sp SP_BLOCK_STORAGE_CONFIG=default-sp SP_PSA_ITS_CONFIG=shared-flash-opteesp SP_PSA_PS_CONFIG=shared-flash-opteesp make
Setup steps after boot
/mnt/host/out/linux-arm-ffa-tee/load_module.sh
Test results
Trusted Services service level test (arm-linux)
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/ts-service-test -v -xgFwuServiceTests TEST(PsServiceTests, createAndSetExtended) - 72279 ms TEST(PsServiceTests, createAndSet) - 119400 ms TEST(PsServiceTests, storeNewItem) - 77105 ms TEST(ItsServiceTests, storeNewItem) - 80862 ms TEST(AttestationProvisioningTests, provisionedIak) - 35705 ms TEST(AttestationProvisioningTests, selfGeneratedIak) - 52115 ms TEST(AttestationServiceTests, repeatedOperation) - 6646269 ms TEST(AttestationServiceTests, invalidChallengeLen)[ 10.672700] ------------[ cut here ]------------ [ 10.672800] WARNING: CPU: 7 PID: 142 at mm/page_alloc.c:5534 __alloc_pages+0x164/0xab0 [ 10.673100] Modules linked in: arm_ffa_tee(O) [ 10.673200] CPU: 7 PID: 142 Comm: ts-service-test Tainted: G O 6.1.0 #1 [ 10.673500] Hardware name: FVP Base RevC (DT) [ 10.673600] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 10.673819] pc : __alloc_pages+0x164/0xab0 [ 10.673900] lr : pool_op_alloc+0x5c/0x180 [arm_ffa_tee] [ 10.674200] sp : ffffffc0087e3ac0 [ 10.674310] x29: ffffffc0087e3ac0 x28: ffffffc0087e3d30 x27: ffffff88017bde80 [ 10.674500] x26: 0000007fefe51a08 x25: 0000000000000005 x24: 0000000000001000 [ 10.674802] x23: ffffff88017bdd80 x22: 0000000000000015 x21: 0000000000000015 [ 10.675000] x20: 0000000000000000 x19: ffffff88017bdd80 x18: 0000000000000000 [ 10.675300] x17: 0000000000000000 x16: 0000000000000000 x15: 0000007fefe51a08 [ 10.675566] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000 [ 10.675800] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000 [ 10.676000] x8 : ffffff88017bde00 x7 : 0000000000000000 x6 : 00000000000009bc [ 10.676300] x5 : ffffff88017bdd80 x4 : 0000000000000000 x3 : 0000000000000000 [ 10.676500] x2 : ffffff880176ac00 x1 : 0000000000000001 x0 : ffffffc008707000 [ 10.676800] Call trace: [ 10.676900] __alloc_pages+0x164/0xab0 [ 10.677000] pool_op_alloc+0x5c/0x180 [arm_ffa_tee] [ 10.677215] shm_alloc_helper+0x98/0x110 [ 10.677400] tee_shm_alloc_user_buf+0x74/0x11c [ 10.677648] tee_ioctl+0xa70/0xf9c [ 10.677800] __arm64_sys_ioctl+0x3bc/0xc30 [ 10.678000] invoke_syscall.constprop.0+0x5c/0x104 [ 10.678100] do_el0_svc+0x60/0x18c [ 10.678300] el0_svc+0x38/0xf0 [ 10.678429] el0t_64_sync_handler+0xbc/0x140 [ 10.678600] el0t_64_sync+0x18c/0x190 [ 10.678816] ---[ end trace 0000000000000000 ]--- ffa_tee_share_mem():212 error: 12 - 23396 ms TEST(AttestationServiceTests, checkTokenSize) - 67413 ms TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 24000 ms TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 27200 ms TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 33177 ms TEST(CryptoMacServicePackedcTests, macAbort) - 20284 ms TEST(CryptoMacServicePackedcTests, signAndVerify) - 78500 ms TEST(CryptoCipherServicePackedcTests, cipherAbort) - 20354 ms TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 62800 ms TEST(CryptoHashServicePackedcTests, hashAbort) - 18558 ms TEST(CryptoHashServicePackedcTests, hashAndVerify) - 30000 ms TEST(CryptoHashServicePackedcTests, calculateHash) - 14000 ms TEST(CryptoServicePackedcTests, generateRandomNumbers) - 45528 ms TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 551499 ms TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 207945 ms TEST(CryptoServicePackedcTests, signAndVerifyEat) - 265937 ms TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 328338 ms TEST(CryptoServicePackedcTests, signAndVerifyHash) - 328800 ms TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 169797 ms TEST(CryptoServicePackedcTests, exportPublicKey) - 115825 ms TEST(CryptoServicePackedcTests, purgeKey) - 103500 ms TEST(CryptoServicePackedcTests, copyKey) - 191200 ms TEST(CryptoServicePackedcTests, generatePersistentKeys) - 190647 ms TEST(CryptoServicePackedcTests, generateVolatileKeys) - 55477 ms TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 46482 ms TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 2386799 ms TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 322940 ms TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 329394 ms TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 328398 ms TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 170400 ms TEST(CryptoServiceProtobufTests, exportPublicKey) - 116162 ms TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 190900 ms TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 58199 ms TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 10759750 ms TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 2204698 ms TEST(DiscoveryServiceTests, checkServiceInfo) - 3900 ms OK (45 tests, 43 ran, 763 checks, 0 ignored, 2 filtered out, 26990292 ms)
PSA Architecture Test Suite (arm-linux)
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-crypto-api-test ***** PSA Architecture Test Suite - Version 1.4 ***** Running.. Crypto Suite ****************************************** TEST: 201 | DESCRIPTION: Testing crypto key management APIs | UT: psa_crypto_init [Info] Executing tests from non-secure [Check 1] Test calling crypto functions before psa_crypto_init [Check 2] Test psa_crypto_init [Check 3] Test multiple psa_crypto_init TEST RESULT: PASSED ****************************************** TEST: 202 | DESCRIPTION: Testing crypto key management APIs | UT: psa_import_key [Info] Executing tests from non-secure [Check 1] Test psa_import_key 16 bytes AES [Check 2] Test psa_import_key 24 bytes AES [Check 3] Test psa_import_key 32 bytes AES [Check 4] Test psa_import_key 2048 RSA public key [Check 5] Test psa_import_key with RSA 2048 keypair [Check 6] Test psa_import_key with DES 8 bytes key [Check 7] Test psa_import_key with Triple DES 2-Key [Check 8] Test psa_import_key with Triple DES 3-Key [Check 9] Test psa_import_key with EC Public key [Check 10] Test psa_import_key with EC keypair [Check 11] Test psa_import_key 16 bytes AES with invalid bits [Check 12] Test psa_import_key with key data greater than the algorithm size [Check 13] Test psa_import_key with incorrect key data size [Check 14] Test psa_import_key with invalid key type value TEST RESULT: PASSED ****************************************** TEST: 203 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_key [Info] Executing tests from non-secure [Check 1] Test psa_export_key 16 Byte AES [Check 2] Test psa_export_key 24 Byte AES [Check 3] Test psa_export_key 32 Byte AES [Check 4] Test psa_export_key 2048 RSA public key [Check 5] Test psa_export_key with RSA 2048 keypair [Check 6] Test psa_export_key with DES 64 bit key [Check 7] Test psa_export_key with Triple DES 2-Key [Check 8] Test psa_export_key with Triple DES 3-Key [Check 9] Test psa_export_key with EC Public key [Check 10] Test psa_export_key with EC keypair [Check 11] Test psa_export_key with key policy verify [Check 12] Test psa_export_key with less buffer size TEST RESULT: PASSED ****************************************** TEST: 204 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_public_key [Info] Executing tests from non-secure [Check 1] Test psa_export_public_key 16 Byte AES [Check 2] Test psa_export_public_key 24 Byte AES [Check 3] Test psa_export_public_key 32 Byte AES [Check 4] Test psa_export_public_key 2048 RSA public key [Check 5] Test psa_export_public_key with RSA 2048 keypair [Check 6] Test psa_export_public_key with DES 64 bit key [Check 7] Test psa_export_public_key with Triple DES 2-Key [Check 8] Test psa_export_public_key with Triple DES 3-Key [Check 9] Test psa_export_public_key with EC Public key [Check 10] Test psa_export_public_key with EC keypair [Check 11] Test psa_export_public_key with less buffer size TEST RESULT: PASSED ****************************************** TEST: 205 | DESCRIPTION: Testing crypto key management APIs | UT: psa_destroy_key [Info] Executing tests from non-secure [Check 1] Test psa_destroy_key 16 Byte AES [Check 2] Test psa_destroy_key 24 Byte AES [Check 3] Test psa_destroy_key 32 Byte AES [Check 4] Test psa_destroy_key 2048 RSA public key [Check 5] Test psa_destroy_key with RSA 2048 keypair [Check 6] Test psa_destroy_key with DES 64 bit key [Check 7] Test psa_destroy_key with Triple DES 2-Key [Check 8] Test psa_destroy_key with Triple DES 3-Key [Check 9] Test psa_destroy_key with EC Public key [Check 10] Test psa_destroy_key with EC keypair TEST RESULT: PASSED ****************************************** TEST: 206 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compute [Info] Executing tests from non-secure [Check 1] Test psa_hash_compute with MD5 algorithm [Check 2] Test psa_hash_compute with RIPEMD160 algorithm [Check 3] Test psa_hash_compute with SHA1 algorithm [Check 4] Test psa_hash_compute with SHA224 algorithm [Check 5] Test psa_hash_compute with SHA256 algorithm [Check 6] Test psa_hash_compute with SHA384 algorithm [Check 7] Test psa_hash_compute with SHA512 algorithm [Check 8] Test psa_hash_compute with small buffer size [Check 9] Test psa_hash_compute with invalid algorithm TEST RESULT: PASSED ****************************************** TEST: 207 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compare [Info] Executing tests from non-secure [Check 1] Test psa_hash_compare with MD5 algorithm [Check 2] Test psa_hash_compare with RIPEMD160 algorithm [Check 3] Test psa_hash_compare with SHA1 algorithm [Check 4] Test psa_hash_compare with SHA224 algorithm [Check 5] Test psa_hash_compare with SHA256 algorithm [Check 6] Test psa_hash_compare with SHA384 algorithm [Check 7] Test psa_hash_compare with SHA512 algorithm [Check 8] Test psa_hash_compare with incorrect hash [Check 9] Test psa_hash_compare with incorrect hash length [Check 10] Test psa_hash_compare with invalid algorithm TEST RESULT: PASSED ****************************************** TEST: 208 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_setup [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_setup - ECDH + HKDF-SHA-256 [Check 2] Test psa_key_derivation_setup - ECDH, unknown KDF [Check 3] Test psa_key_derivation_setup - bad key derivation algorithm [Check 4] Test psa_key_derivation_setup - Invalid Algorithm TEST RESULT: PASSED ****************************************** TEST: 209 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_bytes [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_input_bytes - Step as Info [Check 2] Test psa_key_derivation_input_bytes - Step as secret [Check 3] Test psa_key_derivation_input_bytes - Step as salt [Check 4] Test psa_key_derivation_input_bytes - Step as label [Check 5] Test psa_key_derivation_input_bytes - Step as seed [Check 6] Test psa_key_derivation_input_bytes - Invalid step TEST RESULT: PASSED ****************************************** TEST: 210 | DESCRIPTION: Testing crypto key attributes APIs | UT: psa_key_attributes_set_get [Info] Executing tests from non-secure [Check 1] Test psa_key_attributes_set_get key attributes TEST RESULT: PASSED ****************************************** TEST: 211 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_setup [Info] Executing tests from non-secure [Check 1] Test psa_hash_setup with MD5 algorithm [Check 2] Test psa_hash_setup with RIPEMD160 algorithm [Check 3] Test psa_hash_setup with SHA1 algorithm [Check 4] Test psa_hash_setup with SHA224 algorithm [Check 5] Test psa_hash_setup with SHA256 algorithm [Check 6] Test psa_hash_setup with SHA384 algorithm [Check 7] Test psa_hash_setup with SHA512 algorithm [Check 8] Test psa_hash_setup with Invalid hash algorithm [Check 9] Test psa_hash_setup with Invalid algorithm [Check 10] Test psa_hash_setup with CTR algorithm TEST RESULT: PASSED ****************************************** TEST: 212 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_update [Info] Executing tests from non-secure [Check 1] Test psa_hash_update with MD5 algorithm [Check 2] Test psa_hash_update with RIPEMD160 algorithm [Check 3] Test psa_hash_update with SHA1 algorithm [Check 4] Test psa_hash_update with SHA224 algorithm [Check 5] Test psa_hash_update with SHA256 algorithm [Check 6] Test psa_hash_update with SHA384 algorithm [Check 7] Test psa_hash_update with SHA512 algorithm [Check 8] Test psa_hash_update without hash setup [Check 9] Test psa_hash_update with completed opertaion handle TEST RESULT: PASSED ****************************************** TEST: 213 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_verify [Info] Executing tests from non-secure [Check 1] Test psa_hash_verify with MD5 algorithm [Check 2] Test psa_hash_verify with RIPEMD160 algorithm [Check 3] Test psa_hash_verify with SHA1 algorithm [Check 4] Test psa_hash_verify with SHA224 algorithm [Check 5] Test psa_hash_verify with SHA256 algorithm [Check 6] Test psa_hash_verify with SHA384 algorithm [Check 7] Test psa_hash_verify with SHA512 algorithm [Check 8] Test psa_hash_verify with incorrect expected hash [Check 9] Test psa_hash_verify with incorrect hash length [Check 10] test psa_hash_verify with inactive & invalid operation handle TEST RESULT: PASSED ****************************************** TEST: 214 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_finish [Info] Executing tests from non-secure [Check 1] Test psa_hash_finish with MD5 algorithm [Check 2] Test psa_hash_finish with RIPEMD160 algorithm [Check 3] Test psa_hash_finish with SHA1 algorithm [Check 4] Test psa_hash_finish with SHA224 algorithm [Check 5] Test psa_hash_finish with SHA256 algorithm [Check 6] Test psa_hash_finish with SHA384 algorithm [Check 7] Test psa_hash_finish with SHA512 algorithm [Check 8] Test psa_hash_finish with invalid hash buffer size [Check 9] test psa_hash_finish with inactive operation handle TEST RESULT: PASSED ****************************************** TEST: 215 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_abort [Info] Executing tests from non-secure [Check 1] Test psa_hash_abort with MD5 algorithm [Check 2] Test psa_hash_abort with RIPEMD160 algorithm [Check 3] Test psa_hash_abort with SHA1 algorithm [Check 4] Test psa_hash_abort with SHA224 algorithm [Check 5] Test psa_hash_abort with SHA256 algorithm [Check 6] Test psa_hash_abort with SHA384 algorithm [Check 7] Test psa_hash_abort with SHA512 algorithm [Check 8] Test psa_hash_finish after calling psa_hash_abort TEST RESULT: PASSED ****************************************** TEST: 216 | DESCRIPTION: Testing crypto generator functions APIs | UT: psa_generate_key [Info] Executing tests from non-secure [Check 1] Test psa_generate_key 16 Byte AES [Check 2] Test psa_generate_key 24 Byte AES [Check 3] Test psa_generate_key 32 Byte AES [Check 4] Test psa_generate_key with DES 64 bit key [Check 5] Test psa_generate_key with Triple DES 2-Key [Check 6] Test psa_generate_key with Triple DES 3-Key [Check 7] Test psa_generate_key with RSA 2048 Keypair [Check 8] Test psa_generate_key with ECC KeyPair [Check 9] Test psa_generate_key with RSA 2048 Public key [Check 10] Test psa_generate_key with invalid key type [Check 11] Test psa_generate_key with invalid usage flags TEST RESULT: PASSED ****************************************** TEST: 217 | DESCRIPTION: Testing crypto generation APIs | UT: psa_generate_random [Info] Executing tests from non-secure [Check 1] Test psa_generate_random to get 0 Byte data [Check 2] Test psa_generate_random to get 16 Byte data [Check 3] Test psa_generate_random to get 24 Byte data [Check 4] Test psa_generate_random to get 32 Byte data [Check 5] Test psa_generate_random to get 64 Byte data [Check 6] Test psa_generate_random to get 128 Byte data [Check 7] Test psa_generate_random to get 256 Byte data [Check 8] Test psa_generate_random to get 512 Byte data [Check 9] Test psa_generate_random to get 1000 Byte data TEST RESULT: PASSED ****************************************** TEST: 218 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_key [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_input_key 16 Byte Key [Check 2] Test psa_key_derivation_input_key with invalid usage [Check 3] Test psa_key_derivation_input_key with step as label [Check 4] Test psa_key_derivation_input_key with step as info [Check 5] Test psa_key_derivation_input_key with step as seed [Check 6] Test psa_key_derivation_input_key with step as salt [Check 7] Test psa_key_derivation_input_key with key type as AES(not derive) [Check 8] Test psa_key_derivation_input_key incorrect key algorithm [Check 9] Test psa_key_derivation_input_key with key type as 2048 RSA public key [Check 10] Test psa_key_derivation_input_key with key type as RSA 2048 keypair [Check 11] Test psa_key_derivation_input_key with zero as step [Check 12] Test psa_cipher_decrypt_setup - Invalid key handle [Check 13] Test psa_cipher_decrypt_setup - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 219 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_key_agreement [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_key_agreement - ECDH SECP256R1 [Check 2] Test psa_key_derivation_key_agreement - Invalid step [Check 3] Test psa_key_derivation_key_agreement - ECDH SECP384R1 [Check 4] Test psa_key_derivation_key_agreement - Invalid usage [Check 5] Test psa_key_derivation_key_agreement - KDF not a key agreement alg [Check 6] Test psa_key_derivation_key_agreement - Public key of different curve [Check 7] Test psa_key_derivation_key_agreement - Pub key instead of Prv key [Check 8] Test psa_key_derivation_key_agreement - Invalid handle [Check 9] Test psa_key_derivation_key_agreement - Zero as handle TEST RESULT: PASSED ****************************************** TEST: 220 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_bytes [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_output_bytes - HKDF [Check 2] Test psa_key_derivation_output_bytes - optional salt [Check 3] Test psa_key_derivation_output_bytes - capacity < output_length [Check 4] Test psa_key_derivation_output_bytes - missing info [Check 5] Test psa_key_derivation_output_bytes - missing salt/secret/info [Check 6] Test psa_key_derivation_output_bytes - TLS12_PRF [Check 7] Test psa_key_derivation_output_bytes - capacity < output_length [Check 8] Test psa_key_derivation_output_bytes - missing seed/secret/label TEST RESULT: PASSED ****************************************** TEST: 221 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_key [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_output_key - Key [Check 2] Test psa_key_derivation_output_key - Info [Check 3] Test psa_key_derivation_output_key - Salt [Check 4] Test psa_key_derivation_output_key - Greater Capacity than available [Check 5] Test psa_key_derivation_output_key - ECC Public key [Check 6] Test psa_key_derivation_output_key - ECC keypair (wrong key length) [Check 7] Test psa_key_derivation_output_key - RSA Public Key[Check 8] Test psa_key_derivation_output_key - RSA keypair [Check 9] Test psa_key_derivation_output_key - Invalid key size TEST RESULT: PASSED ****************************************** TEST: 222 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_abort [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_abort TEST RESULT: PASSED ****************************************** TEST: 223 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_set_get_capacity [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_set_get_capacity - < operation's capacity [Check 2] Test psa_key_derivation_set_get_capacity - = operation's capacity [Check 3] Test psa_key_derivation_set_get_capacity - > operation's capacity [Check 4] Test psa_key_derivation_set_get_capacity - unchanged capacity TEST RESULT: PASSED ****************************************** TEST: 224 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt [Info] Executing tests from non-secure [Check 1] Test psa_aead_encrypt - CCM - AES - 13B nonce & 8B add data [Check 2] Test psa_aead_encrypt - CCM - AES - 13B nonce & 32B add data [Check 3] Test psa_aead_encrypt - CCM - AES - 24 bytes Tag length = 4 [Check 4] Test psa_aead_encrypt - CCM - AES - Zero additional data [Check 5] Test psa_aead_encrypt - CCM - AES - Zero plaintext [Check 6] Test psa_aead_encrypt - GCM - AES - 12B nonce & 12B add data [Check 7] Test psa_aead_encrypt - Unsupported algorithm [Check 8] Test psa_aead_encrypt - Invalid usage flag [Check 9] Test psa_aead_encrypt - Invalid ciphertext_size [Check 10] Test psa_aead_encrypt - Invalid nonce [Check 11] Test psa_aead_encrypt - Invalid tag length 0 TEST RESULT: PASSED ****************************************** TEST: 225 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt [Info] Executing tests from non-secure [Check 1] Test psa_aead_decrypt - CCM - AES - 13B nonce & 8B add data [Check 2] Test psa_aead_decrypt - CCM - AES - 13B nonce & 32B add data [Check 3] Test psa_aead_decrypt - CCM - AES - 24 bytes Tag length = 4 [Check 4] Test psa_aead_decrypt - CCM - AES - Zero additional data [Check 5] Test psa_aead_decrypt - CCM - AES - Zero plaintext [Check 6] Test psa_aead_decrypt - GCM - AES - 12B nonce & 12B add data [Check 7] Test psa_aead_decrypt - Unsupported algorithm [Check 8] Test psa_aead_decrypt - Invalid usage flag [Check 9] Test psa_aead_decrypt - Invalid plaintext_size [Check 10] Test psa_aead_decrypt - Invalid nonce [Check 11] Test psa_aead_decrypt - Invalid cihpertext [Check 12] Test psa_aead_decrypt - Invalid cihpertext_size [Check 13] Test psa_aead_decrypt - Invalid tag length 0 TEST RESULT: PASSED ****************************************** TEST: 226 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_setup [Info] Executing tests from non-secure [Check 1] Test psa_mac_sign_setup - HMAC - SHA256 [Check 2] Test psa_mac_sign_setup - CMAC - AES [Check 3] Test psa_mac_sign_setup - Incompatible HMAC for CMAC [Check 4] Test psa_mac_sign_setup - Invalid usage flag [Check 5] Test psa_mac_sign_setup - Invalid key type [Check 6] Test psa_mac_sign_setup - Truncated MAC too large [Check 7] Test psa_mac_sign_setup - Truncated MAC too small [Check 8] Test psa_mac_sign_setup - Unknown MAC algorithm [Check 9] Test psa_mac_sign_setup - Bad algorithm (not a MAC algorithm) [Check 10] Test psa_mac_sign_setup invalid key handle [Check 11] Test psa_mac_sign_setup zero as key handle TEST RESULT: PASSED ****************************************** TEST: 227 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_update [Info] Executing tests from non-secure [Check 1] Test psa_mac_update - HMAC - SHA256 - 64 Byte [Check 2] Test psa_mac_update - CMAC - AES - 16 Byte [Check 3] Test psa_mac_update - HMAC - SHA512 - 32 Byte [Check 4] Test psa_mac_update - HMAC - SHA512 - Invalid operation state TEST RESULT: PASSED ****************************************** TEST: 228 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_finish [Info] Executing tests from non-secure [Check 1] Test psa_mac_sign_finish - HMAC - SHA224 [Check 2] Test psa_mac_sign_finish - HMAC - SHA256 [Check 3] Test psa_mac_sign_finish - HMAC - SHA512 [Check 4] Test psa_mac_sign_finish - HMAC - SHA224 - Truncated 8 Byte [Check 5] Test psa_mac_sign_finish - HMAC - SHA224 - Small output buffer [Check 6] Test psa_mac_sign_finish - HMAC - SHA224 - Invalid operation state [Check 7] Test psa_mac_sign_finish - CMAC - AES TEST RESULT: PASSED ****************************************** TEST: 229 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_setup [Info] Executing tests from non-secure [Check 1] Test psa_mac_verify_setup - HMAC - SHA256 [Check 2] Test psa_mac_verify_setup - CMAC - AES [Check 3] Test psa_mac_verify_setup - Incompatible HMAC for CMAC [Check 4] Test psa_mac_verify_setup - Invalid usage flag [Check 5] Test psa_mac_verify_setup - Invalid key type [Check 6] Test psa_mac_verify_setup - Truncated MAC too large [Check 7] Test psa_mac_verify_setup - Truncated MAC too small [Check 8] Test psa_mac_verify_setup - Unknown MAC algorithm [Check 9] Test psa_mac_verify_setup - Bad algorithm (not a MAC algorithm) [Check 10] Test psa_mac_verify_setup invalid key handle [Check 11] Test psa_mac_verify_setup zero as key handle TEST RESULT: PASSED ****************************************** TEST: 230 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_finish [Info] Executing tests from non-secure [Check 1] Test psa_mac_verify_finish - HMAC - SHA224 [Check 2] Test psa_mac_verify_finish - HMAC - SHA256 [Check 3] Test psa_mac_verify_finish - HMAC - SHA512 [Check 4] Test psa_mac_verify_finish - HMAC - SHA224 - Truncated 8 Byte [Check 5] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid mac length [Check 6] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid expected mac [Check 7] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid operation state [Check 8] Test psa_mac_verify_finish - CMAC - AES TEST RESULT: PASSED ****************************************** TEST: 231 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_abort [Info] Executing tests from non-secure [Check 1] Test psa_mac_abort - HMAC - SHA224 [Check 2] Test psa_mac_abort - HMAC - SHA224 - Truncated 8 Byte [Check 3] Test psa_mac_abort - HMAC - SHA256 [Check 4] Test psa_mac_abort - HMAC - SHA512 [Check 5] Test psa_mac_abort - CMAC - AES [Check 6] Test psa_mac_sign_finish after calling psa_mac_abort TEST RESULT: PASSED ****************************************** TEST: 232 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt_setup [Info] Executing tests from non-secure [Check 1] Test psa_cipher_encrypt_setup 16 Byte AES [Check 2] Test psa_cipher_encrypt_setup 24 Byte AES [Check 3] Test psa_cipher_encrypt_setup 32 Byte AES [Check 4] Test psa_cipher_encrypt_setup DES 64 bit key [Check 5] Test psa_cipher_encrypt_setup Triple DES 2-Key [Check 6] Test psa_cipher_encrypt_setup Triple DES 3-Key [Check 7] Test psa_cipher_encrypt_setup 16 Byte raw data [Check 8] Test psa_cipher_encrypt_setup - not a cipher algorithm [Check 9] Test psa_cipher_encrypt_setup - unknown cipher algorithm [Check 10] Test psa_cipher_encrypt_setup - incompatible key ARC4 [Check 11] Test psa_cipher_encrypt_setup - incorrect usage [Check 12] Test psa_cipher_encrypt_setup - RSA public key [Check 13] Test psa_cipher_encrypt_setup - RSA keypair [Check 14] Test psa_cipher_encrypt_setup - EC Public key [Check 15] Test psa_cipher_encrypt_setup - EC keypair [Check 16] Test psa_cipher_encrypt_setup - Invalid key handle [Check 17] Test psa_cipher_encrypt_setup - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 233 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt_setup [Info] Executing tests from non-secure [Check 1] Test psa_cipher_decrypt_setup 16 Byte AES [Check 2] Test psa_cipher_decrypt_setup 24 Byte AES [Check 3] Test psa_cipher_decrypt_setup 32 Byte AES [Check 4] Test psa_cipher_decrypt_setup DES 64 bit key [Check 5] Test psa_cipher_decrypt_setup Triple DES 2-Key [Check 6] Test psa_cipher_decrypt_setup Triple DES 3-Key [Check 7] Test psa_cipher_decrypt_setup 16 Byte raw data [Check 8] Test psa_cipher_decrypt_setup - not a cipher algorithm [Check 9] Test psa_cipher_decrypt_setup - unknown cipher algorithm [Check 10] Test psa_cipher_decrypt_setup - incompatible key ARC4 [Check 11] Test psa_cipher_decrypt_setup - incorrect usage [Check 12] Test psa_cipher_decrypt_setup - RSA public key [Check 13] Test psa_cipher_decrypt_setup - RSA keypair [Check 14] Test psa_cipher_decrypt_setup - EC Public key [Check 15] Test psa_cipher_decrypt_setup - EC keypair [Check 16] Test psa_cipher_decrypt_setup - Invalid key handle [Check 17] Test psa_cipher_decrypt_setup - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 234 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_generate_iv [Info] Executing tests from non-secure [Check 1] Test psa_cipher_generate_iv 16 Byte AES [Check 2] Test psa_cipher_generate_iv 24 Byte AES [Check 3] Test psa_cipher_generate_iv 32 Byte AES [Check 4] Test psa_cipher_generate_iv DES 64 bit key [Check 5] Test psa_cipher_generate_iv DES 2-Key [Check 6] Test psa_cipher_generate_iv DES 3-Key [Check 7] Test psa_cipher_generate_iv AES - small iv buffer [Check 8] Test psa_cipher_generate_iv DES - small iv buffer TEST RESULT: PASSED ****************************************** TEST: 235 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_set_iv [Info] Executing tests from non-secure [Check 1] Test psa_cipher_set_iv 16 Byte AES [Check 2] Test psa_cipher_set_iv 24 Byte AES [Check 3] Test psa_cipher_set_iv 32 Byte AES [Check 4] Test psa_cipher_set_iv DES 64 bit key [Check 5] Test psa_cipher_set_iv DES 2-Key [Check 6] Test psa_cipher_set_iv DES 3-Key [Check 7] Test psa_cipher_set_iv AES - small iv buffer [Check 8] Test psa_cipher_set_iv DES - small iv buffer [Check 9] Test psa_cipher_set_iv AES - large iv buffer [Check 10] Test psa_cipher_set_iv DES - large iv buffer TEST RESULT: PASSED ****************************************** TEST: 236 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_update [Info] Executing tests from non-secure [Check 1] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING (Short in) [Check 3] Test psa_cipher_update - Encrypt - AES CBC_PKCS7 [Check 4] Test psa_cipher_update - Encrypt - AES CBC_PKCS7 (Short input) [Check 5] Test psa_cipher_update - Encrypt - AES CTR [Check 6] Test psa_cipher_update - Encrypt - DES CBC (nopad) [Check 7] Test psa_cipher_update - Encrypt - 2-key 3DE -CBC (nopad) [Check 8] Test psa_cipher_update - Encrypt - 3-key 3DE -CBC (nopad) [Check 9] Test psa_cipher_update - Encrypt - small output buffer size [Check 10] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING [Check 11] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING (Short in) [Check 12] Test psa_cipher_update - Decrypt - AES CBC_PKCS7 [Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7 (Short input) [Check 14] Test psa_cipher_update - Decrypt - AES CTR [Check 15] Test psa_cipher_update - Decrypt - DES CBC (nopad) [Check 16] Test psa_cipher_update - Decrypt - 2-key 3DE -CBC (nopad) [Check 17] Test psa_cipher_update - Decrypt - 3-key 3DE -CBC (nopad) [Check 18] Test psa_cipher_update - Decrypt - small output buffer size [Check 19] Test psa_cipher_update without cipher setup TEST RESULT: PASSED ****************************************** TEST: 237 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_finish [Info] Executing tests from non-secure [Check 1] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING (Short in) [Check 3] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7 [Check 4] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7 (Short input) [Check 5] Test psa_cipher_finish - Encrypt - AES CTR [Check 6] Test psa_cipher_finish - Encrypt - AES CTR (short input) [Check 7] Test psa_cipher_finish - Encrypt - DES CBC (nopad) [Check 8] Test psa_cipher_finish - Encrypt - 2-key 3DE -CBC (nopad) [Check 9] Test psa_cipher_finish - Encrypt - 3-key 3DE -CBC (nopad) [Check 10] Test psa_cipher_finish - Encrypt - small output buffer size [Check 11] Test psa_cipher_finish - Decrypt - AES CBC_NO_PADDING [Check 12] Test psa_cipher_finish - Decrypt - AES CBC_NO_PADDING (Short in) [Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7 [Check 14] Test psa_cipher_finish - Decrypt - AES CBC_PKCS7 (Short input) [Check 15] Test psa_cipher_finish - Decrypt - AES CTR [Check 16] Test psa_cipher_finish - Decrypt - AES CTR (short input) [Check 17] Test psa_cipher_finish - Decrypt - DES CBC (nopad) [Check 18] Test psa_cipher_finish - Decrypt - 2-key 3DE -CBC (nopad) [Check 19] Test psa_cipher_finish - Decrypt - 3-key 3DE -CBC (nopad) TEST RESULT: PASSED ****************************************** TEST: 238 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_abort [Info] Executing tests from non-secure [Check 1] Test psa_cipher_abort - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_abort - Encrypt - AES CBC_PKCS7 [Check 3] Test psa_cipher_abort - Encrypt - AES CTR [Check 4] Test psa_cipher_abort - Encrypt - DES CBC (nopad) [Check 5] Test psa_cipher_abort - Encrypt - 2-key 3DE -CBC (nopad) [Check 6] Test psa_cipher_abort - Encrypt - 3-key 3DE -CBC (nopad) [Check 7] Test psa_cipher_abort - Decrypt - AES CBC_NO_PADDING [Check 8] Test psa_cipher_abort - Decrypt - AES CBC_PKCS7 [Check 9] Test psa_cipher_abort - Decrypt - AES CTR [Check 10] Test psa_cipher_abort - Decrypt - DES CBC (nopad) [Check 11] Test psa_cipher_abort - Decrypt - 2-key 3DE -CBC (nopad) [Check 12] Test psa_cipher_abort - Decrypt - 3-key 3DE -CBC (nopad) [Check 13] Test psa_cipher_update after psa_cipher_abort should fail TEST RESULT: PASSED ****************************************** TEST: 239 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_encrypt [Info] Executing tests from non-secure [Check 1] Test psa_asymmetric_encrypt - RSA PKCS1V15 [Check 2] Test psa_asymmetric_encrypt - RSA KEY_PAIR PKCS1V15 [Check 3] Test psa_asymmetric_encrypt - RSA OAEP SHA256 [Check 4] Test psa_asymmetric_encrypt - RSA OAEP SHA256 with label [Check 5] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256 [Check 6] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256 with label [Check 7] Test psa_asymmetric_encrypt - Small output buffer [Check 8] Test psa_asymmetric_encrypt - Invalid algorithm [Check 9] Test psa_asymmetric_encrypt - Invalid key type [Check 10] Test psa_asymmetric_encrypt - Invalid usage [Check 11] Test psa_asymmetric_encrypt - RSA PKCS1V15 - Salt [Check 12] Test psa_asymmetric_encrypt - ECC public key [Check 13] Test psa_asymmetric_encrypt - Invalid key handle [Check 14] Test psa_asymmetric_encrypt - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 240 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_decrypt [Info] Executing tests from non-secure [Check 1] Test psa_asymmetric_decrypt - RSA KEY_PAIR PKCS1V15 [Check 2] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256 [Check 3] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256 with label [Check 4] Test psa_asymmetric_decrypt - Invalid key type (RSA public key) [Check 5] Test psa_asymmetric_decrypt - Small output buffer [Check 6] Test psa_asymmetric_decrypt - Invalid algorithm [Check 7] Test psa_asymmetric_decrypt - Invalid key type (AES Key) [Check 8] Test psa_asymmetric_decrypt - Invalid usage [Check 9] Test psa_asymmetric_decrypt - RSA PKCS1V15 - Salt [Check 10] Test psa_asymmetric_decrypt - Invalid key handle [Check 11] Test psa_asymmetric_decrypt - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 241 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_sign_hash [Info] Executing tests from non-secure [Check 1] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 RAW [Check 2] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 SHA-256 [Check 3] Test psa_sign_hash - ECDSA SECP256R1 SHA-256 [Check 4] Test psa_sign_hash - Invalid key type (RSA public key) [Check 5] Test psa_sign_hash - Small output buffer [Check 6] Test psa_sign_hash - Invalid algorithm [Check 7] Test psa_sign_hash - Invalid key type (AES Key) [Check 8] Test psa_sign_hash - Invalid usage [Check 9] Test psa_sign_hash - Wrong hash size [Check 10] Test psa_sign_hash - Invalid key handle [Check 11] Test psa_sign_hash - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 242 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_verify_hash [Info] Executing tests from non-secure [Check 1] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 RAW [Check 2] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 SHA-256 [Check 3] Test psa_verify_hash - ECDSA KEY_PAIR SECP256R1 SHA-256 [Check 4] Test psa_verify_hash - EC public key [Check 5] Test psa_verify_hash - RSA public key [Check 6] Test psa_verify_hash - Small output buffer [Check 7] Test psa_verify_hash - Invalid algorithm [Check 8] Test psa_verify_hash - Invalid key type (AES Key) [Check 9] Test psa_verify_hash - Invalid usage [Check 10] Test psa_verify_hash - Wrong hash size [Check 11] Test psa_verify_hash - Wrong signature [Check 12] Test psa_verify_hash - Wrong signature size [Check 13] Test psa_verify_hash - Invalid key handle [Check 14] Test psa_verify_hash - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 243 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_raw_key_agreement [Info] Executing tests from non-secure [Check 1] Test psa_raw_key_agreement - ECDH SECP256R1 [Check 2] Test psa_raw_key_agreement - Small buffer size [Check 3] Test psa_raw_key_agreement - ECDH SECP384R1 [Check 4] Test psa_raw_key_agreement - Invalid usage [Check 5] Test psa_raw_key_agreement - Unknown KDF [Check 6] Test psa_raw_key_agreement - Not a key agreement alg [Check 7] Test psa_raw_key_agreement - Public key on different curve [Check 8] Test psa_raw_key_agreement - Public key instead of private key [Check 9] Test psa_raw_key_agreement - Invalid key handle [Check 10] Test psa_raw_key_agreement - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 244 | DESCRIPTION: Testing crypto key management APIs | UT: psa_copy_key [Info] Executing tests from non-secure [Check 1] Test psa_copy_key - 2048 RSA public key [Check 2] Test psa_copy_key - RSA 2048 keypair [Check 3] Test psa_copy_key - Incompatible target policy(source and target) [Check 4] Test psa_copy_key - source key with no export usage [Check 5] Test psa_copy_key - DES 64 bit key [Check 6] Test psa_copy_key - Triple DES 2-Key [Check 7] Test psa_copy_key - Triple DES 3-Key [Check 8] Test psa_copy_key - EC Public key [Check 9] Test psa_copy_key - EC keypair TEST RESULT: PASSED ****************************************** TEST: 245 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_clone [Info] Executing tests from non-secure [Check 1] Test psa_hash_clone - MD5 algorithm [Check 2] Test psa_hash_clone - RIPEMD160 algorithm [Check 3] Test psa_hash_clone - SHA1 algorithm [Check 4] Test psa_hash_clone - SHA224 algorithm [Check 5] Test psa_hash_clone - SHA256 algorithm [Check 6] Test psa_hash_clone - SHA384 algorithm [Check 7] Test psa_hash_clone - SHA512 algorithm [Check 8] Test psa_hash_clone - from an inactive source operation [Check 9] Test psa_hash_clone - on an active target operation TEST RESULT: PASSED ****************************************** TEST: 246 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_compute [Info] Executing tests from non-secure [Check 1] Test psa_mac_compute HMAC SHA 224 [Check 2] Test psa_mac_compute - Incompactible HMAC for CMAC [Check 3] Test psa_mac_compute - Invalid usage [Check 4] Test psa_mac_compute - truncated MAC too small [Check 5] Test psa_mac_compute - truncated MAC too large [Check 6] Test psa_mac_compute - bad algorithm (unknown MAC algorithm) [Check 7] Test psa_mac_compute HMAC SHA 256 [Check 8] Test psa_mac_compute HMAC SHA 512 [Check 9] Test psa_mac_compute HMAC SHA 224 (truncated to 8 Byte) [Check 10] Test psa_mac_compute CMAC AES 128 [Check 11] Test psa_mac_compute small size buffer [Check 12] Test psa_mac_compute - Invalid key type TEST RESULT: PASSED ****************************************** TEST: 247 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify [Info] Executing tests from non-secure [Check 1] Test psa_mac_verify HMAC SHA 224 [Check 2] Test psa_mac_verify HMAC SHA 256 [Check 3] Test psa_mac_verify - Incompactible HMAC for CMAC [Check 4] Test psa_mac_verify - Invalid usage [Check 5] Test psa_mac_verify - Truncated MAC too large [Check 6] Test psa_mac_verify - Truncated MAC too small [Check 7] Test psa_mac_verify - bad algorithm (unknown MAC algorithm) [Check 8] Test psa_mac_verify HMAC SHA 512 [Check 9] Test psa_mac_verify HMAC SHA 224 (truncated to 8 Byte) [Check 10] Test psa_mac_verify CMAC AES 128 [Check 11] Test psa_mac_verify - Invalid key type [Check 12] Test psa_mac_verify small size buffer [Check 13] Test psa_mac_verify incorrect expected MAC TEST RESULT: PASSED ****************************************** TEST: 248 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt [Info] Executing tests from non-secure [Check 1] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING (Short input) [Check 3] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7 [Check 4] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7 (Short input) [Check 5] Test psa_cipher_encrypt - Encrypt - AES CTR [Check 6] Test psa_cipher_encrypt - Encrypt - AES CTR (short input) [Check 7] Test psa_cipher_encrypt - Encrypt - DES CBC (nopad) [Check 8] Test psa_cipher_encrypt - Encrypt - 2-key 3DE -CBC (nopad) [Check 9] Test psa_cipher_encrypt - Encrypt - 3-key 3DE -CBC (nopad) [Check 10] Test psa_cipher_encrypt - small output buffer size [Check 11] Test psa_cipher_encrypt - Decrypt - AES CBC_NO_PADDING TEST RESULT: PASSED ****************************************** TEST: 249 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt [Info] Executing tests from non-secure [Check 1] Test psa_cipher_decrypt - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING [Check 3] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING (Short input) [Check 4] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING [Check 5] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7 [Check 6] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7 (Short input) [Check 7] Test psa_cipher_decrypt - Decrypt - AES CTR [Check 8] Test psa_cipher_decrypt - Decrypt - DES CBC (nopad) [Check 9] Test psa_cipher_decrypt - Decrypt - 2-key 3DE -CBC (nopad) [Check 10] Test psa_cipher_decrypt - 3-key 3DE -CBC (nopad) TEST RESULT: PASSED ****************************************** TEST: 250 | DESCRIPTION: Testing crypto key management APIs | UT: psa_sign_message [Info] Executing tests from non-secure [Check 1] Test psa_sign_message - RSA KEY_PAIR PKCS1V15 RAW [Check 2] Test psa_sign_message - ECDSA SECP256R1 SHA-256 [Check 3] Test psa_sign_message - Invalid key type (RSA public key) [Check 4] Test psa_sign_message - Small output buffer [Check 5] Test psa_sign_message - Invalid algorithm [Check 6] Test psa_sign_message - Invalid key type (AES Key) [Check 7] Test psa_sign_message - Invalid usage [Check 8] Test psa_sign_message - Mismatch key type and Algorithm [Check 9] Test psa_sign_message - Alg mismatch in key and API call [Check 10] Test psa_sign_message - Invalid key handle [Check 11] Test psa_sign_message - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 251 | DESCRIPTION: Testing crypto key management APIs | UT: psa_verify_message [Info] Executing tests from non-secure [Check 1] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 RAW [Check 2] Test psa_verify_message - RSA Public Key PKCS1V15 RAW [Check 3] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 SHA-256 [Check 4] Test psa_verify_message - ECDSA KEY_PAIR SECP256R1 SHA-256 [Check 5] Test psa_verify_message - ECDSA Public Key SECP256R1 SHA-256 [Check 6] Test psa_verify_message - Small output buffer [Check 7] Test psa_verify_message - Invalid algorithm [Check 8] Test psa_verify_message - Invalid key type (AES Key) [Check 9] Test psa_verify_message - Invalid usage [Check 10] Test psa_verify_message - Wrong message size [Check 11] Test psa_verify_message - Wrong signature [Check 12] Test psa_verify_message - Wrong signature size [Check 13] Test psa_verify_message - Invalid key handle [Check 14] Test psa_verify_message - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 252 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt_setup [Info] Executing tests from non-secure [Check 1] Test psa_aead_encrypt_setup - CCM - AES [Check 2] Test psa_aead_encrypt_setup - CCM - AES - Tag length = 4 [Check 3] Test psa_aead_encrypt_setup - CCM - AES - Mismatched tag length [Check 4] Test psa_aead_encrypt_setup - CCM - AES - Default Tag length [Check 5] Test psa_aead_encrypt_setup - GCM - AES [Check 6] Test psa_aead_encrypt_setup - CCM - DES Invalid key [Check 7] Test psa_aead_encrypt_setup - Invalid usage flag TEST RESULT: PASSED ****************************************** TEST: 253 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt_setup [Info] Executing tests from non-secure [Check 1] Test psa_aead_decrypt_setup - CCM - AES [Check 2] Test psa_aead_decrypt_setup - CCM - AES - Tag length = 4 [Check 3] Test psa_aead_decrypt_setup - CCM - AES - Mismatched tag length [Check 4] Test psa_aead_decrypt_setup - CCM - AES - Default Tag length [Check 5] Test psa_aead_decrypt_setup - GCM - AES [Check 6] Test psa_aead_decrypt_setup - CCM - DES Invalid key [Check 7] Test psa_aead_decrypt_setup - Invalid usage flag TEST RESULT: PASSED ****************************************** TEST: 254 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_generate_nonce [Info] Executing tests from non-secure [Check 1] Test psa_aead_generate_nonce - CCM [Check 2] Test psa_aead_generate_nonce - CCM - Tag length = 4 [Check 3] Test psa_aead_generate_nonce - CCM - Small buffer size [Check 4] Test psa_aead_generate_nonce - CCM - Uninitialized operation [Check 5] Test psa_aead_generate_nonce - CCM - Decrypt operation [Check 6] Test psa_aead_generate_nonce - GCM [Check 7] Test psa_aead_generate_nonce - GCM - Decrypt operation TEST RESULT: PASSED ****************************************** TEST: 255 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_nonce [Info] Executing tests from non-secure [Check 1] Test psa_aead_set_nonce - Encrypt - CCM [Check 2] Test psa_aead_set_nonce - Encrypt - CCM - Tag length = 4 [Check 3] Test psa_aead_set_nonce - Encrypt - CCM - Small nonce size [Check 4] Test psa_aead_set_nonce - Encrypt - CCM - Large nonce size [Check 5] Test psa_aead_set_nonce - Encrypt - CCM - Invalid operation state [Check 6] Test psa_aead_set_nonce - Encrypt - GCM [Check 7] Test psa_aead_set_nonce - Decrypt - CCM [Check 8] Test psa_aead_set_nonce - Decrypt - CCM - Tag length = 4 [Check 9] Test psa_aead_set_nonce - Decrypt - CCM - Small nonce size [Check 10] Test psa_aead_set_nonce - Decrypt - CCM - Large nonce size [Check 11] Test psa_aead_set_nonce - Decrypt - CCM - Invalid operation state [Check 12] Test psa_aead_set_nonce - Decrypt - GCM TEST RESULT: PASSED ****************************************** TEST: 256 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_lengths [Info] Executing tests from non-secure [Check 1] Test psa_aead_set_lengths - Encrypt - CCM [Check 2] Test psa_aead_set_lengths - Encrypt - CCM - Tag length = 4 [Check 3] Test psa_aead_set_lengths - Encrypt - CCM - Zero ad_length [Check 4] Test psa_aead_set_lengths - Encrypt - CCM - Zero plaintext_length [Check 5] Test psa_aead_set_lengths - Encrypt - CCM - Invalid operation state [Check 6] Test psa_aead_set_lengths - Encrypt - GCM [Check 7] Test psa_aead_set_lengths - Decrypt - CCM [Check 8] Test psa_aead_set_lengths - Decrypt - CCM - Tag length = 4 [Check 9] Test psa_aead_set_lengths - Decrypt - CCM - Zero ad_length [Check 10] Test psa_aead_set_lengths - Decrypt - CCM - Zero plaintext_length [Check 11] Test psa_aead_set_lengths - Decrypt - CCM - Invalid operation state [Check 12] Test psa_aead_set_lengths - Decrypt - GCM TEST RESULT: PASSED ****************************************** TEST: 257 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update_ad [Info] Executing tests from non-secure [Check 1] Test psa_aead_update_ad - Encrypt - CCM [Check 2] Test psa_aead_update_ad - Encrypt - CCM - Tag length = 4 [Check 3] Test psa_aead_update_ad - Encrypt - CCM - Zero ad_length [Check 4] Test psa_aead_update_ad - Encrypt - CCM - Zero plaintext_length [Check 5] Test psa_aead_update_ad - Encrypt - CCM - Invalid operation state [Check 6] Test psa_aead_update_ad - Encrypt - CCM - Overflow input length [Check 7] Test psa_aead_update_ad - Decrypt - CCM [Check 8] Test psa_aead_update_ad - Decrypt - CCM - Tag length = 4 [Check 9] Test psa_aead_update_ad - Decrypt - CCM - Zero ad_length [Check 10] Test psa_aead_update_ad - Decrypt - CCM - Zero plaintext_length [Check 11] Test psa_aead_update_ad - Decrypt - CCM - Invalid operation state [Check 12] Test psa_aead_update_ad - Decrypt - CCM - Overflow input length TEST RESULT: PASSED ****************************************** TEST: 258 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update [Info] Executing tests from non-secure [Check 1] Test psa_aead_update - Encrypt - CCM [Check 2] Test psa_aead_update - Encrypt - CCM - Tag length = 4 [Check 3] Test psa_aead_update - Encrypt - CCM - Zero ad_length [Check 4] Test psa_aead_update - Encrypt - CCM - Zero plaintext_length [Check 5] Test psa_aead_update - Encrypt - CCM - Small buffer size [Check 6] Test psa_aead_update - Encrypt - CCM - Less add data than specified [Check 7] Test psa_aead_update - Encrypt - CCM - Overflow input length [Check 8] Test psa_aead_update - Encrypt - CCM - Invalid operation state [Check 9] Test psa_aead_update - Decrypt - CCM [Check 10] Test psa_aead_update - Decrypt - CCM - Tag length = 4 [Check 11] Test psa_aead_update - Decrypt - CCM - Zero ad_length [Check 12] Test psa_aead_update - Decrypt - CCM - Zero plaintext_length [Check 13] Test psa_aead_update - Decrypt - CCM - Small buffer size [Check 14] Test psa_aead_update - Decrypt - Less add data than specified [Check 15] Test psa_aead_update - Decrypt - CCM - Overflow input length [Check 16] Test psa_aead_update - Decrypt - CCM - Invalid operation state TEST RESULT: PASSED ****************************************** TEST: 259 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_finish [Info] Executing tests from non-secure [Check 1] Test psa_aead_finish - AES-CCM [Check 2] Test psa_aead_finish - AES-CCM 24 bytes Tag length = 4 [Check 3] Test psa_aead_finish - Small buffer size [Check 4] Test psa_aead_finish - Input length is less than plaintext length [Check 5] Test psa_aead_finish - GCM - 16B AES - 12B Nonce & 12B additional data TEST RESULT: PASSED ****************************************** TEST: 260 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_abort [Info] Executing tests from non-secure [Check 1] Test psa_aead_abort - Encrypt - CCM - AES [Check 2] Test psa_aead_abort - Encrypt - GCM - AES [Check 3] Test psa_aead_abort - Decrypt - CCM - AES [Check 4] Test psa_aead_abort - Decrypt - GCM - AES [Check 5] Test psa_aead_abort with all initializations TEST RESULT: PASSED ****************************************** TEST: 261 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_verify [Info] Executing tests from non-secure [Check 1] Test psa_aead_verify - AES-CCM [Check 2] Test psa_aead_verify - AES-CCM 24 bytes Tag length = 4 [Check 3] Test psa_aead_verify - Small buffer size [Check 4] Test psa_aead_verify - Input length is less than plaintext length [Check 5] Test psa_aead_verify - GCM - 16B AES - 12B Nounce & 12B addi data TEST RESULT: PASSED ****************************************** ************ Crypto Suite Report ********** TOTAL TESTS : 61 TOTAL PASSED : 61 TOTAL SIM ERROR : 0 TOTAL FAILED : 0 TOTAL SKIPPED : 0 ****************************************** Entering standby..
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-iat-api-test ***** PSA Architecture Test Suite - Version 1.4 ***** Running.. Attestation Suite ****************************************** TEST: 601 | DESCRIPTION: Testing attestation initial attestation APIs | UT: psa_initial_attestation [Info] Executing tests from non-secure [Check 1] Test psa_initial_attestation_get_token with Challenge 32 [Check 2] Test psa_initial_attestation_get_token with Challenge 48 [Check 3] Test psa_initial_attestation_get_token with Challenge 64 [Check 4] Test psa_initial_attestation_get_token with zero challenge size [Check 5] Test psa_initial_attestation_get_token with small challenge size [Check 6] Test psa_initial_attestation_get_token with invalid challenge size [Check 7] Test psa_initial_attestation_get_token with large challenge size [Check 8] Test psa_initial_attestation_get_token with zero as token size [Check 9] Test psa_initial_attestation_get_token with small token size [Check 10] Test psa_initial_attestation_get_token_size with Challenge 32 [Check 11] Test psa_initial_attestation_get_token_size with Challenge 48 [Check 12] Test psa_initial_attestation_get_token_size with Challenge 64 [Check 13] Test psa_initial_attestation_get_token_size with zero challenge size [Check 14] Test psa_initial_attestation_get_token_size with small challenge size [Check 15] Test psa_initial_attestation_get_token_size with invalid challenge size [Check 16] Test psa_initial_attestation_get_token_size with large challenge size TEST RESULT: PASSED ****************************************** ************ Attestation Suite Report ********** TOTAL TESTS : 1 TOTAL PASSED : 1 TOTAL SIM ERROR : 0 TOTAL FAILED : 0 TOTAL SKIPPED : 0 ****************************************** Entering standby..
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-its-api-test ***** PSA Architecture Test Suite - Version 1.4 ***** Running.. Storage Suite ****************************************** TEST: 401 | DESCRIPTION: UID not found check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Call get API for UID 6 which is not set [Check 2] Call get_info API for UID 6 which is not set [Check 3] Call remove API for UID 6 which is not set [Check 4] Call get API for UID 6 which is removed [Check 5] Call get_info API for UID 6 which is removed [Check 6] Call remove API for UID 6 which is removed Set storage for UID 6 [Check 7] Call get API for different UID 5 [Check 8] Call get_info API for different UID 5 [Check 9] Call remove API for different UID 5 TEST RESULT: PASSED ****************************************** TEST: 402 | DESCRIPTION: Write once error check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Update the flag of UID 1 with WRITE_ONCE flag [Check 2] Try to remove the UID 1 having WRITE_ONCE flag [Check 3] Create a new UID 2 with WRITE_ONCE flag [Check 4] Try to remove the UID 2 having WRITE_ONCE flag [Check 5] Try to change the length of write_once UID 2 [Check 6] Check UID removal still fails [Check 7] Try to change the WRITE_ONCE flag to None for UID 2 [Check 8] Check UID removal still fails TEST RESULT: PASSED ****************************************** TEST: 403 | DESCRIPTION: Insufficient space check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Overload storage space UID 13 set failed due to insufficient space Remove all registered UIDs [Check 2] Overload storage again to verify all previous UID removed UID 13 set failed due to insufficient space Remove all registered UIDs TEST RESULT: PASSED ****************************************** TEST: 404 | DESCRIPTION: Data Consistency check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2 [Check 2] Call get API with default length - TEST_BUFF_SIZE TEST RESULT: PASSED ****************************************** TEST: 405 | DESCRIPTION: Success scenarios check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Set UID with data length zero and call storage APIs [Check 2] Resetting the length check TEST RESULT: PASSED ****************************************** TEST: 406 | DESCRIPTION: Check for storage create flags | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE [Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY [Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION TEST RESULT: PASSED ****************************************** TEST: 407 | DESCRIPTION: Incorrect Size check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests Create a valid Storage - TEST_BUFF_SIZE/2 Increase the length of storage - TEST_BUFF_SIZE [Check 1] Call get API with old length - TEST_BUFF_SIZE/2 [Check 2] Call get API with old length - TEST_BUFF_SIZE/4 Decrease the length of storage - TEST_BUFF_SIZE/4 [Check 3] Call get API with old length - TEST_BUFF_SIZE/2 [Check 4] Call get API with old length - TEST_BUFF_SIZE [Check 5] Call get API with valid length - TEST_BUFF_SIZE/4 TEST RESULT: PASSED ****************************************** TEST: 408 | DESCRIPTION: Invalid offset check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Try to access data with varying valid offset [Check 2] Try to access data with varying invalid offset TEST RESULT: PASSED ****************************************** TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Call set API with NULL pointer and data length 0 [Check 2] Call get API with NULL read buffer and data length 0 [Check 3] Remove the UID [Check 4] Call get_info API to verify UID removed [Check 5] Create UID with zero data_len and valid write buffer [Check 8] Call get API with NULL read buffer and data length 0 [Check 9] Increase the length TEST RESULT: PASSED ****************************************** TEST: 410 | DESCRIPTION: UID value zero check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Creating storage with UID 0 should fail [Check 2] Get_info for UID 0 should fail [Check 3] Removing storage with UID 0 should fail TEST RESULT: PASSED ****************************************** ************ Storage Suite Report ********** TOTAL TESTS : 10 TOTAL PASSED : 10 TOTAL SIM ERROR : 0 TOTAL FAILED : 0 TOTAL SKIPPED : 0 ****************************************** Entering standby..
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-ps-api-test ***** PSA Architecture Test Suite - Version 1.4 ***** Running.. Storage Suite ****************************************** TEST: 401 | DESCRIPTION: UID not found check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Call get API for UID 6 which is not set [Check 2] Call get_info API for UID 6 which is not set [Check 3] Call remove API for UID 6 which is not set [Check 4] Call get API for UID 6 which is removed [Check 5] Call get_info API for UID 6 which is removed [Check 6] Call remove API for UID 6 which is removed Set storage for UID 6 [Check 7] Call get API for different UID 5 [Check 8] Call get_info API for different UID 5 [Check 9] Call remove API for different UID 5 TEST RESULT: PASSED ****************************************** TEST: 402 | DESCRIPTION: Write once error check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Update the flag of UID 1 with WRITE_ONCE flag [Check 2] Try to remove the UID 1 having WRITE_ONCE flag [Check 3] Create a new UID 2 with WRITE_ONCE flag [Check 4] Try to remove the UID 2 having WRITE_ONCE flag [Check 5] Try to change the length of write_once UID 2 [Check 6] Check UID removal still fails [Check 7] Try to change the WRITE_ONCE flag to None for UID 2 [Check 8] Check UID removal still fails TEST RESULT: PASSED ****************************************** TEST: 403 | DESCRIPTION: Insufficient space check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Overload storage space UID 13 set failed due to insufficient space Remove all registered UIDs [Check 2] Overload storage again to verify all previous UID removed UID 13 set failed due to insufficient space Remove all registered UIDs TEST RESULT: PASSED ****************************************** TEST: 404 | DESCRIPTION: Data Consistency check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2 [ 34.396662] random: crng init done [Check 2] Call get API with default length - TEST_BUFF_SIZE TEST RESULT: PASSED ****************************************** TEST: 405 | DESCRIPTION: Success scenarios check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Set UID with data length zero and call storage APIs [Check 2] Resetting the length check TEST RESULT: PASSED ****************************************** TEST: 406 | DESCRIPTION: Check for storage create flags | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE [Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY [Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION TEST RESULT: PASSED ****************************************** TEST: 407 | DESCRIPTION: Incorrect Size check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Create a valid Storage - TEST_BUFF_SIZE/2 Increase the length of storage - TEST_BUFF_SIZE [Check 1] Call get API with old length - TEST_BUFF_SIZE/2 [Check 2] Call get API with old length - TEST_BUFF_SIZE/4 Decrease the length of storage - TEST_BUFF_SIZE/4 [Check 3] Call get API with old length - TEST_BUFF_SIZE/2 [Check 4] Call get API with old length - TEST_BUFF_SIZE [Check 5] Call get API with valid length - TEST_BUFF_SIZE/4 TEST RESULT: PASSED ****************************************** TEST: 408 | DESCRIPTION: Invalid offset check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Try to access data with varying valid offset [Check 2] Try to access data with varying invalid offset TEST RESULT: PASSED ****************************************** TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Call set API with NULL pointer and data length 0 [Check 2] Call get API with NULL read buffer and data length 0 [Check 3] Remove the UID [Check 4] Call get_info API to verify UID removed [Check 5] Create UID with zero data_len and valid write buffer [Check 8] Call get API with NULL read buffer and data length 0 [Check 9] Increase the length TEST RESULT: PASSED ****************************************** TEST: 410 | DESCRIPTION: UID value zero check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Creating storage with UID 0 should fail [Check 2] Get_info for UID 0 should fail [Check 3] Removing storage with UID 0 should fail TEST RESULT: PASSED ****************************************** TEST: 411 | DESCRIPTION: Optional APIs: UID not found check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs are not supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 412 | DESCRIPTION: Optional APIs: Invalid arguments and offset invalid | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs are not supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 413 | DESCRIPTION: Set_Extended and Create api : Success | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs are not supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 414 | DESCRIPTION: Optional APIs not supported check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Optional PS APIs are not supported. [Check 1] Call to create API should fail as API not supported Failed at Checkpoint: 1 Actual: 0 Expected: -134 TEST RESULT: FAILED (Error Code=0x1) ****************************************** TEST: 415 | DESCRIPTION: Create API write_once flag value check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs are not supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 416 | DESCRIPTION: Storage assest capacity modification check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs not are supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 417 | DESCRIPTION: Storage assest capacity modification check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs not are supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** ************ Storage Suite Report ********** TOTAL TESTS : 17 TOTAL PASSED : 10 TOTAL SIM ERROR : 0 TOTAL FAILED : 1 TOTAL SKIPPED : 6 ****************************************** Entering standby..
Component test (linux-pc)
LD_PRELOAD=trusted-services/tools/b-test/install/linux-pc/lib/libts.so o trusted-services/tools/b-test/install/linux-pc/bin/component-test -v TEST(BlockVolumeTests, oversizeWrite) - 1 ms TEST(BlockVolumeTests, multipleImageInstall) - 0 ms TEST(BlockVolumeTests, seekAccess) - 0 ms TEST(BlockVolumeTests, readAndWrite) - 0 ms TEST(BlockVolumeTests, openClose) - 0 ms IGNORE_TEST(PartitionTableTests, detectCorruptedGptHeader) - 0 ms TEST(PartitionTableTests, detectCorruptedMbr) - 2 ms TEST(PartitionTableTests, loadRefPartitionTable) - 1 ms TEST(GptIteratorTests, iterateOverRefGpt) - 0 ms TEST(UefiVariableStoreTests, noRemoveCheck) - 1 ms TEST(UefiVariableStoreTests, readOnlycheck) - 0 ms TEST(UefiVariableStoreTests, unsupportedAttribute) - 0 ms TEST(UefiVariableStoreTests, failedNvSet) - 0 ms TEST(UefiVariableStoreTests, enumerateStoreContents) - 0 ms TEST(UefiVariableStoreTests, runtimeAccess) - 0 ms TEST(UefiVariableStoreTests, bootServiceAccess) - 0 ms TEST(UefiVariableStoreTests, removePersistent) - 0 ms TEST(UefiVariableStoreTests, removeVolatile) - 0 ms TEST(UefiVariableStoreTests, getWithSmallBuffer) - 0 ms TEST(UefiVariableStoreTests, persistentSetGet) - 0 ms TEST(UefiVariableStoreTests, setGetRoundtrip) - 0 ms TEST(UefiVariableIndexTests, setCheckConstraintsNonExistingVar) - 0 ms TEST(UefiVariableIndexTests, setCheckConstraintsExistingVar) - 0 ms TEST(UefiVariableIndexTests, checkIterator) - 0 ms TEST(UefiVariableIndexTests, removeVariable) - 0 ms TEST(UefiVariableIndexTests, dumpBufferTooSmall) - 0 ms TEST(UefiVariableIndexTests, dumpLoadRoadtrip) - 0 ms TEST(UefiVariableIndexTests, enumerateStore) - 0 ms TEST(UefiVariableIndexTests, variableIndexFull) - 0 ms TEST(UefiVariableIndexTests, addWithOversizedName) - 0 ms TEST(UefiVariableIndexTests, emptyIndexOperations) - 0 ms TEST(SfsBlockStoreTests, psCreateAndSetExtended) - 0 ms TEST(SfsBlockStoreTests, psCreateAndSet) - 0 ms TEST(SfsBlockStoreTests, itsStorageLimitTest) - 0 ms TEST(SfsBlockStoreTests, itsStoreNewItem) - 1 ms TEST(SfsRamTests, psCreateAndSetExtended) - 0 ms TEST(SfsRamTests, psCreateAndSet) - 0 ms TEST(SfsRamTests, itsStorageLimitTest) - 0 ms TEST(SfsRamTests, itsStoreNewItem) - 0 ms TEST(MockStoreTests, psCreateAndSetExtended) - 0 ms TEST(MockStoreTests, psCreateAndSet) - 0 ms TEST(MockStoreTests, itsStorageLimitTest) - 0 ms TEST(MockStoreTests, itsStoreNewItem) - 0 ms TEST(SecureStorageProxyTests, psCreateAndSetExtended) - 0 ms TEST(SecureStorageProxyTests, psCreateAndSet) - 0 ms TEST(SecureStorageProxyTests, itsStorageLimitTest) - 0 ms TEST(SecureStorageProxyTests, itsStoreNewItem) - 0 ms TEST(SecureStorageClientTests, psCreateAndSetExtended) - 0 ms TEST(SecureStorageClientTests, psCreateAndSet) - 0 ms TEST(SecureStorageClientTests, itsStorageLimitTest) - 0 ms TEST(SecureStorageClientTests, itsStoreNewItem) - 0 ms TEST(CryptoProtocolPackedcChecks, checkKeyUsage) - 0 ms TEST(CryptoProtocolPackedcChecks, checkKeyLifetime) - 0 ms TEST(CryptoProtocolPackedcChecks, checkAlg) - 0 ms TEST(CryptoProtocolPackedcChecks, checkDhGroup) - 0 ms TEST(CryptoProtocolPackedcChecks, checkEccCurve) - 0 ms TEST(CryptoProtocolPackedcChecks, checkKeyType) - 0 ms TEST(CryptoProtocolProtobufChecks, checkKeyUsage) - 0 ms TEST(CryptoProtocolProtobufChecks, checkKeyLifetime) - 0 ms TEST(CryptoProtocolProtobufChecks, checkAlg) - 0 ms TEST(CryptoProtocolProtobufChecks, checkDhGroup) - 0 ms TEST(CryptoProtocolProtobufChecks, checkEccCurve) - 0 ms TEST(CryptoProtocolProtobufChecks, checkKeyType) - 0 ms TEST(CryptoProtocolOpcodeChecks, checkPackedcToProtobuf) - 0 ms TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 1 ms TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 0 ms TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 0 ms TEST(CryptoMacServicePackedcTests, macAbort) - 0 ms TEST(CryptoMacServicePackedcTests, signAndVerify) - 1 ms TEST(CryptoCipherServicePackedcTests, cipherAbort) - 0 ms TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 0 ms TEST(CryptoHashServicePackedcTests, hashAbort) - 0 ms TEST(CryptoHashServicePackedcTests, hashAndVerify) - 0 ms TEST(CryptoHashServicePackedcTests, calculateHash) - 0 ms TEST(CryptoServicePackedcTests, generateRandomNumbers) - 0 ms TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 11 ms TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 1 ms TEST(CryptoServicePackedcTests, signAndVerifyEat) - 3 ms TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 3 ms TEST(CryptoServicePackedcTests, signAndVerifyHash) - 3 ms TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 1 ms TEST(CryptoServicePackedcTests, exportPublicKey) - 0 ms TEST(CryptoServicePackedcTests, purgeKey) - 0 ms TEST(CryptoServicePackedcTests, copyKey) - 2 ms TEST(CryptoServicePackedcTests, generatePersistentKeys) - 0 ms TEST(CryptoServicePackedcTests, generateVolatileKeys) - 1 ms TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 0 ms - 24 ms TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 1 ms TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 3 ms TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 4 ms TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 0 ms TEST(CryptoServiceProtobufTests, exportPublicKey) - 1 ms TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 0 ms TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 1 ms TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 102 ms TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 21 ms TEST(CryptoFaultTests, randomNumbersWithBrokenStorage) - 0 ms TEST(CryptoFaultTests, persistentKeysWithBrokenStorage) - 1 ms TEST(CryptoFaultTests, volatileKeyWithBrokenStorage) - 0 ms TEST(PocCryptoOpTests, checkOpSequence) - 1 ms TEST(CryptoMsgTests, SignHashOutMsgTest) - 0 ms TEST(CryptoMsgTests, SignHashInMsgTest) - 0 ms TEST(CryptoMsgTests, ExportPublicKeyOutMsgTest) - 0 ms TEST(CryptoMsgTests, ExportPublicKeyInMsgTest) - 0 ms TEST(CryptoMsgTests, GenerateKeyInMsgTest) - 0 ms TEST(CryptoContextPoolTests, multipleContexts) - 0 ms TEST(CryptoContextPoolTests, singleContext) - 0 ms TEST(CryptoContextPoolTests, checkEmptyPool) - 0 ms TEST(FwuUpdateFmpTests, wholeFmpFlow) - 0 ms TEST(FwuOversizeImageTests, oversizeInstallMultiLocationEndStaging) - 0 ms TEST(FwuOversizeImageTests, oversizeInstallEndStaging) - 0 ms TEST(FwuOversizeImageTests, oversizeInstallCancelStaging) - 1 ms TEST(FwuOversizeImageTests, maxSizeInstall) - 0 ms TEST(FwuRollbackTests, bootloaderFallback) - 0 ms TEST(FwuRollbackTests, selectPreviousAfterActivation) - 0 ms TEST(FwuRollbackTests, selectPreviousPriorToActivation) - 0 ms TEST(FwuPowerFailureTests, powerFailureDuringTrial) - 1 ms TEST(FwuPowerFailureTests, powerFailureDuringStaging) - 1 ms TEST(FwuUpdateScenarioTests, partialFirmwareUpdateFlow) - 1 ms TEST(FwuUpdateScenarioTests, wholeFirmwareUpdateFlow) - 0 ms TEST(FwuInvalidBehaviourTests, invalidOperationsInTrial) - 0 ms TEST(FwuInvalidBehaviourTests, invalidOperationsInStaging) - 0 ms TEST(FwuInvalidBehaviourTests, invalidOperationsInRegular) - 1 ms TEST(FwuImageDirectoryTests, zeroFwLocations) - 0 ms TEST(FwuImageDirectoryTests, multipleFwLocations) - 0 ms TEST(FwuImageDirectoryTests, singleFwLocation) - 0 ms TEST(FwuImageDirectoryTests, streamRecycling) - 0 ms TEST(FwuImageDirectoryTests, streamedReads) - 1 ms TEST(FwuDefaultInstallerFactoryTests, configureInstallersFlow) - 0 ms TEST(FwuCopyInstallerTests, installAndCopy) - 0 ms TEST(FwuRawInstallerTests, normalInstallFlow) - 1 ms TEST(FwuMetadataV2Tests, checkImgBankInfoStructure) - 0 ms TEST(FwuMetadataV2Tests, checkImgEntryStructure) - 0 ms TEST(FwuMetadataV2Tests, checkFwStoreDescStructure) - 0 ms TEST(FwuMetadataV2Tests, checkHeaderStructure) - 0 ms TEST(FwuMetadataManagerTests, checkAndRepairInaccessibleStorage) - 0 ms TEST(FwuMetadataManagerTests, checkAndRepairAccessibleStorage) - 1 ms TEST(PartitionedBlockStoreTests, writeToInvalidBlock) - 0 ms TEST(PartitionedBlockStoreTests, checkEraseLimits) - 1 ms TEST(PartitionedBlockStoreTests, writeReadEraseBlock) - 0 ms TEST(PartitionedBlockStoreTests, openClose) - 0 ms TEST(PartitionedBlockStoreTests, getPartitionInfo) - 0 ms TEST(FileBlockStoreTests, initWithExistingDiskImage) - 0 ms TEST(FileBlockStoreTests, wholeBlockRw) - 0 ms TEST(RamBlockStoreTests, eraseOperations) - 0 ms TEST(RamBlockStoreTests, writeToInvalidBlock) - 0 ms TEST(RamBlockStoreTests, writeBiggerThanBlock) - 0 ms TEST(RamBlockStoreTests, writeReadEraseBlock) - 0 ms TEST(RamBlockStoreTests, openClose) - 0 ms TEST(RamBlockStoreTests, getPartitionInfo) - 0 ms TEST(AttestationProvisioningTests, provisionedIak) - 1 ms TEST(AttestationProvisioningTests, selfGeneratedIak) - 0 ms TEST(AttestationServiceTests, repeatedOperation) - 62 ms TEST(AttestationServiceTests, invalidChallengeLen) - 0 ms TEST(AttestationServiceTests, checkTokenSize) - 1 ms TEST(AttestationReporterTests, createReport) - 2 ms TEST(TcgEventLogTests, interateBootMeasurements) - 0 ms TEST(DiscoveryServiceTests, checkServiceInfo) - 0 ms TEST(ServiceNameTests, readService) - 0 ms TEST(ServiceNameTests, checkFields) - 0 ms TEST(ServiceNameTests, checkInvalidServiceNames) - 0 ms TEST(ServiceNameTests, checkValidServiceNames) - 0 ms TEST(ServiceFrameworkTests, serviceProviderChain) - 0 ms TEST(ServiceFrameworkTests, serviceWithOps) - 0 ms TEST(ServiceFrameworkTests, serviceWithNoOps) - 0 ms TEST(ffarpc_call_ep, request_deny_64_bit) - 0 ms TEST(ffarpc_call_ep, request_with_data_after_unshare) - 0 ms TEST(ffarpc_call_ep, request_with_data_buffer_overflow) - 0 ms TEST(ffarpc_call_ep, request_with_data) - 0 ms TEST(ffarpc_call_ep, request_without_data_non_zero_length) - 0 ms TEST(ffarpc_call_ep, request_without_data) - 0 ms TEST(ffarpc_call_ep, invalid_mgmt_call) - 0 ms TEST(ffarpc_call_ep, mem_unshare_null_ep) - 0 ms TEST(ffarpc_call_ep, mem_share_unshare_relinquish_fail_then_success) - 0 ms TEST(ffarpc_call_ep, mem_share_unshare_relinquish_fail) - 0 ms TEST(ffarpc_call_ep, mem_share_unshare) - 0 ms TEST(ffarpc_call_ep, mem_unshare) - 0 ms TEST(ffarpc_call_ep, mem_share_null_ep) - 0 ms TEST(ffarpc_call_ep, mem_share_smaller_page_count_relinquish_fail) - 0 ms TEST(ffarpc_call_ep, mem_share_smaller_page_count) - 0 ms TEST(ffarpc_call_ep, mem_share_retrieve_fail) - 0 ms TEST(ffarpc_call_ep, mem_share_fill_all) - 0 ms TEST(ffarpc_call_ep, mem_share) - 1 ms TEST(ffarpc_caller, end) - 0 ms TEST(ffarpc_caller, end_null_handle) - 0 ms TEST(ffarpc_caller, end_null_context) - 0 ms TEST(ffarpc_caller, invoke_without_response) - 0 ms TEST(ffarpc_caller, invoke_with_response) - 0 ms TEST(ffarpc_caller, invoke_invalid_resp_len) - 0 ms TEST(ffarpc_caller, invoke_send_direct_req_fail) - 0 ms TEST(ffarpc_caller, invoke_resp_long_req) - 0 ms TEST(ffarpc_caller, invoke_resp_no_begin) - 0 ms TEST(ffarpc_caller, invoke_resp_len_null) - 0 ms TEST(ffarpc_caller, invoke_resp_buf_null) - 0 ms TEST(ffarpc_caller, invoke_opstatus_null) - 0 ms TEST(ffarpc_caller, invoke_handle_context_diff) - 0 ms TEST(ffarpc_caller, invoke_null_context) - 0 ms TEST(ffarpc_caller, begin_without_buffer) - 0 ms TEST(ffarpc_caller, begin_with_buffer) - 0 ms TEST(ffarpc_caller, begin_not_opened) - 0 ms TEST(ffarpc_caller, begin_too_large_req) - 0 ms TEST(ffarpc_caller, begin_transaction_in_progress) - 0 ms TEST(ffarpc_caller, begin_null_buffer) - 0 ms TEST(ffarpc_caller, begin_null_context) - 0 ms TEST(ffarpc_caller, close_success) - 0 ms TEST(ffarpc_caller, close_endpoint_and_mem_reclaim_fail) - 0 ms TEST(ffarpc_caller, close_mem_reclaim_fail) - 0 ms TEST(ffarpc_caller, close_send_direct_msg_fail) - 0 ms TEST(ffarpc_caller, close_not_opened) - 0 ms TEST(ffarpc_caller, open_success) - 0 ms TEST(ffarpc_caller, open_send_direct_req_rpc_status_fail_reclaim_fail) - 0 ms TEST(ffarpc_caller, open_send_direct_req_rpc_status_fail) - 0 ms TEST(ffarpc_caller, open_send_direct_req_fail) - 0 ms TEST(ffarpc_caller, open_share_fail) - 0 ms TEST(ffarpc_caller, open_invalid_mem_size) - 0 ms TEST(ffarpc_caller, open_already_opened) - 0 ms TEST(ffarpc_caller, discover_more_max_cnt) - 0 ms TEST(ffarpc_caller, discover_less_max_cnt) - 0 ms TEST(ffarpc_caller, discover) - 0 ms TEST(ffarpc_caller, discover_rx_release_fail) - 0 ms TEST(ffarpc_caller, discover_rx_get_fail) - 0 ms TEST(ffarpc_caller, discover_partition_info_get_fail) - 0 ms TEST(ffarpc_caller, discover_invalid_arguments) - 0 ms TEST(RpcStatusProtocolChecks, checkProtobufRpcStatusCodes) - 0 ms TEST(ConfigRamstoreTests, checkMultipleConfig) - 0 ms TEST(ConfigRamstoreTests, checkSingleConfig) - 0 ms TEST(ConfigRamstoreTests, checkEmptyConfig) - 0 ms TEST(Crc32Tests, multiPart) - 0 ms TEST(Crc32Tests, longString) - 0 ms TEST(Crc32Tests, shortString) - 0 ms TEST(EndianTests, le64) - 0 ms TEST(EndianTests, le32) - 0 ms TEST(EndianTests, le16) - 0 ms TEST(EndianTests, le8) - 0 ms TEST(TlvTests, encodeWrongOrder) - 0 ms TEST(TlvTests, encodeInsufficientSpace) - 0 ms TEST(TlvTests, encodeRecords) - 0 ms TEST(TlvTests, decodeBadRecords) - 0 ms TEST(TlvTests, findAndDecodeMissingOptional) - 0 ms TEST(TlvTests, findAndDecode) - 0 ms TEST(TlvTests, decodeGoodRecords) - 0 ms TEST(UuidTests, roundTrip) - 1 ms TEST(UuidTests, checkNilUuidOperations) - 0 ms TEST(UuidTests, checkIsEqualOperation) - 0 ms TEST(UuidTests, checkOctetsFromCanonical) - 0 ms TEST(UuidTests, parseValidUuidToGuidOctets) - 0 ms TEST(UuidTests, parseError) - 0 ms TEST(UuidTests, parseUuidInUrn) - 0 ms TEST(UuidTests, parseValidUuidMixedCase) - 0 ms TEST(UuidTests, parseValidUuidLowerCase) - 0 ms TEST(TsDemoTests, runTsDemo) - 8 ms OK (252 tests, 251 ran, 365136 checks, 1 ignored, 0 filtered out, 279 ms)
Platform inspect test (arm-linux)
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/platform-inspect attestation_report: challenge: 31 03 a3 a3 e5 e2 d8 1a ea e1 df 26 85 1c c0 2a 4d ac 4a 3e ba 32 15 53 0e f2 e3 fe 91 f6 8b 75 client_id: 0 boot_seed: ec 0b f2 64 34 7a 8c 68 ca ff 5f a4 e2 ff 90 70 25 64 be e1 13 90 58 97 42 b1 ce 4a d2 f8 7b 3a security_lifecycle: 0 instance_id: 01 9c d5 b1 3e 0b 88 a9 12 87 c7 1e 52 0d 58 39 92 a7 69 d9 58 bb 8a db 10 15 f0 77 c0 a1 25 63 32 implementation_id: 74 72 75 73 74 65 64 66 69 72 6d 77 61 72 65 2e 6f 72 67 2e 74 73 2e 61 74 74 65 73 74 61 74 69 6f 6e 5f 73 70 sw_components: type: FW_CONFIG digest: 5e 10 97 50 c0 cb 32 14 e6 e4 09 f7 12 ba 84 d6 d1 d6 e2 d4 45 8c 52 f3 d2 b9 6e ea 82 d4 e5 47 type: TB_FW_CONFIG digest: dc 45 e2 c1 a9 f5 b1 81 9a 10 8e 8e 0f 0a 5e b2 e1 c1 94 00 73 ae 14 83 eb dd e1 f5 fe ac 72 5c type: BL_2 digest: d1 56 89 90 7e d8 98 71 72 47 fb 91 9e c2 0b 7b 5d 89 f4 07 ce 27 8d 37 54 20 d8 aa ea 92 30 ae type: SECURE_RT_EL3 digest: 99 56 5e 18 d3 ea 1b 8f 79 63 c8 66 19 48 a2 50 f8 c3 0c a5 33 99 53 9e 11 c2 cd 5e 11 c5 8c dc type: HW_CONFIG digest: 54 10 fe 53 a5 fe 12 75 dc cc 3a 15 8f d8 34 63 f3 3e 1e 71 7f e3 4c 39 a1 62 4a 90 5c 0a 84 f3 type: SOC_FW_CONFIG digest: 4e e4 8e 5a e6 50 ed e0 b5 a3 54 8a 1f d6 0e 8a ea 0e 71 75 0e a4 3f 82 76 ce af cd 7c b0 91 e0 type: SECURE_RT_EL1_UNKNOWN digest: e9 4a 94 e4 1e 0c 28 97 3a 6b b8 dc 2f 89 fc f9 af e9 d3 67 98 89 2c 4d 0a 6d 3b b5 59 11 c6 73 type: TOS_FW_CONFIG digest: 77 35 1c d8 86 d0 66 15 eb 3a 2d 2d 9c ef b9 49 ba 0a 4a 67 58 ff 06 b7 90 7d c7 06 38 ce c6 0b type: BL_33 digest: a2 6c ec 40 dd dd 31 ce af 90 09 5b 25 c6 e3 83 b3 3e 6f 11 fc 13 4f 8e 83 64 0d 53 b6 34 22 6c type: NT_FW_CONFIG digest: 0c 53 ba 3f c9 43 13 bf 25 59 bc 8c 2e 7e 49 fa 0f 1a 5a 40 96 ed 58 fa 58 31 39 7a de d4 e4 fb type: CRITICAL DATA digest: d3 a9 31 35 10 be c0 88 51 bd 28 4e a9 ff b3 c3 cd 02 11 fc 23 2e 02 07 0e ce a5 ab 1d d9 a1 6a
TS Demo test (arm-linux)
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/ts-demo Demonstrates use of trusted services from an application --------------------------------------------------------- A client requests a set of crypto operations performed by the Crypto service. Key storage for persistent keys is provided by the Secure Storage service via the ITS client. Generating random bytes length: 1 Operation successful Random bytes: 55 Generating random bytes length: 7 Operation successful Random bytes: 2B 35 04 79 3B 50 83 Generating random bytes length: 128 Operation successful Random bytes: 57 31 1C 74 88 69 C4 12 D1 9A 93 83 2D D2 AA 0C EA 03 F5 44 09 6A 92 11 8A 8A 06 57 26 B1 47 74 01 1B 2A 25 8D CF 6C A3 A6 4D 6D A1 8B FC 31 76 57 13 72 96 C4 09 BA 56 88 35 F9 66 58 B0 EE 1E AF E9 90 9D AD BB 62 21 82 37 E1 31 37 43 18 5B 95 2E 42 BB 6B 41 40 66 A5 81 81 32 3F F3 23 8A 5A 88 B2 9D 2C B0 F2 C4 51 26 13 53 FE 8F 68 B0 B0 D1 64 85 3C E9 5A C8 E2 0A 62 80 F1 AB A2 7C Generating ECC signing key Operation successful Signing message: "The quick brown fox" using key: 256 Operation successful Signature bytes: 77 1E 93 3C E1 A2 CD C4 5D 03 15 B8 A9 1A AE 47 37 6A B8 F0 5D 67 22 06 FC 2C B8 20 71 97 7F F8 AE 06 0F 71 34 E3 0B FD CA 24 C2 23 0F 89 67 99 51 B5 FE 25 95 CD 75 ED 1B A2 6E 5A 3A 06 26 3C Verify signature using original message: "The quick brown fox" Operation successful Verify signature using modified message: "!he quick brown fox" Successfully detected modified message Signing message: "jumps over the lazy dog" using key: 256 Operation successful Signature bytes: 91 1A 8E 4B 17 3C 01 FF A2 0A D4 55 39 3E 84 96 92 84 A3 F1 A1 26 5C 40 14 A6 57 50 79 70 41 ED 68 E4 21 61 DD 9F 07 0C DE 9C DC 29 F5 9F 88 DF 36 0D C4 21 54 D3 CD F8 35 C0 7B 16 10 59 26 4A Verify signature using original message: "jumps over the lazy dog" Operation successful Verify signature using modified message: "!umps over the lazy dog" Successfully detected modified message Generating RSA encryption key Operation successful Encrypting message: "Top secret" using RSA key: 257 Operation successful Encrypted message: 6E 9A 04 F4 64 33 0B 6D DE CB C7 21 EF C8 FC A9 95 50 F1 6C 90 64 AA A0 D6 99 BD 90 4C 79 A0 73 Decrypting message using RSA key: 257 Operation successful Decrypted message: "Top secret" Exporting public key: 256 Operation successful Public key bytes: 04 D5 1A 1C 30 72 3C CF 3B E3 0B 47 92 54 2E 6E 61 28 26 A1 FB 00 82 75 AC 44 14 18 B4 87 66 F7 F8 47 0B 25 83 04 4B 9A 6F 08 DF 98 E1 81 77 E7 6B 29 34 60 2A 52 94 96 E8 6E 2E 0E 78 5A EF 81 98 Destroying signing key: 256 Operation successful Destroying encryption key: 257 Operation successful
Config 2: FIP SP
Build command
MEASURED_BOOT=y SPMC_TESTS=n TS_SMM_GATEWAY=n TS_UEFI_TESTS=n SP_PACKAGING_METHOD=fip DEFAULT_SP_CONFIG=default-sp SP_BLOCK_STORAGE_CONFIG=default-sp SP_PSA_ITS_CONFIG=shared-flash-opteesp SP_PSA_PS_CONFIG=shared-flash-opteesp make
Setup steps after boot
/mnt/host/out/linux-arm-ffa-tee/load_module.sh
Test results
Trusted Services service level test (arm-linux)
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/ts-service-test -v -xg FwuServiceTests TEST(PsServiceTests, createAndSetExtended) - 73357 ms TEST(PsServiceTests, createAndSet) - 118755 ms TEST(PsServiceTests, storeNewItem) - 80500 ms TEST(ItsServiceTests, storeNewItem) - 80930 ms TEST(AttestationProvisioningTests, provisionedIak) - 36000 ms TEST(AttestationProvisioningTests, selfGeneratedIak) - 52399 ms TEST(AttestationServiceTests, repeatedOperation) - 6675032 ms TEST(AttestationServiceTests, invalidChallengeLen)[ 10.808920] ------------[ cut here ]------------ [ 10.809020] WARNING: CPU: 7 PID: 143 at mm/page_alloc.c:5534 __alloc_pages+0x164/0xab0 [ 10.809262] Modules linked in: arm_ffa_tee(O) [ 10.809425] CPU: 7 PID: 143 Comm: ts-service-test Tainted: G O 6.1.0 #1 [ 10.809620] Hardware name: FVP Base RevC (DT) [ 10.809764] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 10.809920] pc : __alloc_pages+0x164/0xab0 [ 10.810120] lr : pool_op_alloc+0x5c/0x180 [arm_ffa_tee] [ 10.810320] sp : ffffffc0087ebac0 [ 10.810490] x29: ffffffc0087ebac0 x28: ffffffc0087ebd30 x27: ffffff88009fad80 [ 10.810736] x26: 0000007fc4e54838 x25: 0000000000000005 x24: 0000000000001000 [ 10.810982] x23: ffffff88009fa900 x22: 0000000000000015 x21: 0000000000000015 [ 10.811239] x20: 0000000000000000 x19: ffffff88009fa900 x18: 0000000000000000 [ 10.811420] x17: 0000000000000000 x16: 0000000000000000 x15: 0000007fc4e54838 [ 10.811720] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000 [ 10.811920] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000 [ 10.812220] x8 : ffffff88009fa980 x7 : 0000000000000000 x6 : 00000000000009b8 [ 10.812420] x5 : ffffff88009fa900 x4 : 0000000000000000 x3 : 0000000000000000 [ 10.812720] x2 : ffffff8800fab700 x1 : 0000000000000001 x0 : ffffffc008707000 [ 10.812920] Call trace: [ 10.813020] __alloc_pages+0x164/0xab0 [ 10.813220] pool_op_alloc+0x5c/0x180 [arm_ffa_tee] [ 10.813439] shm_alloc_helper+0x98/0x110 [ 10.813620] tee_shm_alloc_user_buf+0x74/0x11c [ 10.813820] tee_ioctl+0xa70/0xf9c [ 10.813931] __arm64_sys_ioctl+0x3bc/0xc30 [ 10.814120] invoke_syscall.constprop.0+0x5c/0x104 [ 10.814341] do_el0_svc+0x60/0x18c [ 10.814520] el0_svc+0x38/0xf0 [ 10.814620] el0t_64_sync_handler+0xbc/0x140 [ 10.814820] el0t_64_sync+0x18c/0x190 [ 10.814970] ---[ end trace 0000000000000000 ]--- ffa_tee_share_mem():212 error: 12 - 23300 ms TEST(AttestationServiceTests, checkTokenSize) - 67700 ms TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 23948 ms TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 27170 ms TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 33099 ms TEST(CryptoMacServicePackedcTests, macAbort) - 20137 ms TEST(CryptoMacServicePackedcTests, signAndVerify) - 78752 ms TEST(CryptoCipherServicePackedcTests, cipherAbort) - 20223 ms TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 62967 ms TEST(CryptoHashServicePackedcTests, hashAbort) - 18404 ms TEST(CryptoHashServicePackedcTests, hashAndVerify) - 29963 ms TEST(CryptoHashServicePackedcTests, calculateHash) - 13810 ms TEST(CryptoServicePackedcTests, generateRandomNumbers) - 43374 ms TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 2682259 ms TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 262300 ms TEST(CryptoServicePackedcTests, signAndVerifyEat) - 264498 ms TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 327265 ms TEST(CryptoServicePackedcTests, signAndVerifyHash) - 327110 ms TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 169165 ms TEST(CryptoServicePackedcTests, exportPublicKey) - 114734 ms TEST(CryptoServicePackedcTests, purgeKey) - 102856 ms TEST(CryptoServicePackedcTests, copyKey) - 139695 ms TEST(CryptoServicePackedcTests, generatePersistentKeys) - 187446 ms TEST(CryptoServicePackedcTests, generateVolatileKeys) - 57300 ms TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 43334 ms TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 1319121 ms TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 194447 ms TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 329200 ms TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 327500 ms TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 169900 ms TEST(CryptoServiceProtobufTests, exportPublicKey) - 115400 ms TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 190022 ms TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 57400 ms TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 9270152 ms TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 2197058 ms TEST(DiscoveryServiceTests, checkServiceInfo) - 3800 ms OK (45 tests, 43 ran, 763 checks, 0 ignored, 2 filtered out, 26446597 ms)
PSA Architecture Test Suite (arm-linux)
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-crypto-api-test ***** PSA Architecture Test Suite - Version 1.4 ***** Running.. Crypto Suite ****************************************** TEST: 201 | DESCRIPTION: Testing crypto key management APIs | UT: psa_crypto_init [Info] Executing tests from non-secure [Check 1] Test calling crypto functions before psa_crypto_init [Check 2] Test psa_crypto_init [Check 3] Test multiple psa_crypto_init TEST RESULT: PASSED ****************************************** TEST: 202 | DESCRIPTION: Testing crypto key management APIs | UT: psa_import_key [Info] Executing tests from non-secure [Check 1] Test psa_import_key 16 bytes AES [Check 2] Test psa_import_key 24 bytes AES [Check 3] Test psa_import_key 32 bytes AES [Check 4] Test psa_import_key 2048 RSA public key [Check 5] Test psa_import_key with RSA 2048 keypair [Check 6] Test psa_import_key with DES 8 bytes key [Check 7] Test psa_import_key with Triple DES 2-Key [Check 8] Test psa_import_key with Triple DES 3-Key [Check 9] Test psa_import_key with EC Public key [Check 10] Test psa_import_key with EC keypair [Check 11] Test psa_import_key 16 bytes AES with invalid bits [Check 12] Test psa_import_key with key data greater than the algorithm size [Check 13] Test psa_import_key with incorrect key data size [Check 14] Test psa_import_key with invalid key type value TEST RESULT: PASSED ****************************************** TEST: 203 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_key [Info] Executing tests from non-secure [Check 1] Test psa_export_key 16 Byte AES [Check 2] Test psa_export_key 24 Byte AES [Check 3] Test psa_export_key 32 Byte AES [Check 4] Test psa_export_key 2048 RSA public key [Check 5] Test psa_export_key with RSA 2048 keypair [Check 6] Test psa_export_key with DES 64 bit key [Check 7] Test psa_export_key with Triple DES 2-Key [Check 8] Test psa_export_key with Triple DES 3-Key [Check 9] Test psa_export_key with EC Public key [Check 10] Test psa_export_key with EC keypair [Check 11] Test psa_export_key with key policy verify [Check 12] Test psa_export_key with less buffer size TEST RESULT: PASSED ****************************************** TEST: 204 | DESCRIPTION: Testing crypto key management APIs | UT: psa_export_public_key [Info] Executing tests from non-secure [Check 1] Test psa_export_public_key 16 Byte AES [Check 2] Test psa_export_public_key 24 Byte AES [Check 3] Test psa_export_public_key 32 Byte AES [Check 4] Test psa_export_public_key 2048 RSA public key [Check 5] Test psa_export_public_key with RSA 2048 keypair [Check 6] Test psa_export_public_key with DES 64 bit key [Check 7] Test psa_export_public_key with Triple DES 2-Key [Check 8] Test psa_export_public_key with Triple DES 3-Key [Check 9] Test psa_export_public_key with EC Public key [Check 10] Test psa_export_public_key with EC keypair [Check 11] Test psa_export_public_key with less buffer size TEST RESULT: PASSED ****************************************** TEST: 205 | DESCRIPTION: Testing crypto key management APIs | UT: psa_destroy_key [Info] Executing tests from non-secure [Check 1] Test psa_destroy_key 16 Byte AES [Check 2] Test psa_destroy_key 24 Byte AES [Check 3] Test psa_destroy_key 32 Byte AES [Check 4] Test psa_destroy_key 2048 RSA public key [Check 5] Test psa_destroy_key with RSA 2048 keypair [Check 6] Test psa_destroy_key with DES 64 bit key [Check 7] Test psa_destroy_key with Triple DES 2-Key [Check 8] Test psa_destroy_key with Triple DES 3-Key [Check 9] Test psa_destroy_key with EC Public key [Check 10] Test psa_destroy_key with EC keypair TEST RESULT: PASSED ****************************************** TEST: 206 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compute [Info] Executing tests from non-secure [Check 1] Test psa_hash_compute with MD5 algorithm [Check 2] Test psa_hash_compute with RIPEMD160 algorithm [Check 3] Test psa_hash_compute with SHA1 algorithm [Check 4] Test psa_hash_compute with SHA224 algorithm [Check 5] Test psa_hash_compute with SHA256 algorithm [Check 6] Test psa_hash_compute with SHA384 algorithm [Check 7] Test psa_hash_compute with SHA512 algorithm [Check 8] Test psa_hash_compute with small buffer size [Check 9] Test psa_hash_compute with invalid algorithm TEST RESULT: PASSED ****************************************** TEST: 207 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_compare [Info] Executing tests from non-secure [Check 1] Test psa_hash_compare with MD5 algorithm [Check 2] Test psa_hash_compare with RIPEMD160 algorithm [Check 3] Test psa_hash_compare with SHA1 algorithm [Check 4] Test psa_hash_compare with SHA224 algorithm [Check 5] Test psa_hash_compare with SHA256 algorithm [Check 6] Test psa_hash_compare with SHA384 algorithm [Check 7] Test psa_hash_compare with SHA512 algorithm [Check 8] Test psa_hash_compare with incorrect hash [Check 9] Test psa_hash_compare with incorrect hash length [Check 10] Test psa_hash_compare with invalid algorithm TEST RESULT: PASSED ****************************************** TEST: 208 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_setup [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_setup - ECDH + HKDF-SHA-256 [Check 2] Test psa_key_derivation_setup - ECDH, unknown KDF [Check 3] Test psa_key_derivation_setup - bad key derivation algorithm [Check 4] Test psa_key_derivation_setup - Invalid Algorithm TEST RESULT: PASSED ****************************************** TEST: 209 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_bytes [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_input_bytes - Step as Info [Check 2] Test psa_key_derivation_input_bytes - Step as secret [Check 3] Test psa_key_derivation_input_bytes - Step as salt [Check 4] Test psa_key_derivation_input_bytes - Step as label [Check 5] Test psa_key_derivation_input_bytes - Step as seed [Check 6] Test psa_key_derivation_input_bytes - Invalid step TEST RESULT: PASSED ****************************************** TEST: 210 | DESCRIPTION: Testing crypto key attributes APIs | UT: psa_key_attributes_set_get [Info] Executing tests from non-secure [Check 1] Test psa_key_attributes_set_get key attributes TEST RESULT: PASSED ****************************************** TEST: 211 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_setup [Info] Executing tests from non-secure [Check 1] Test psa_hash_setup with MD5 algorithm [Check 2] Test psa_hash_setup with RIPEMD160 algorithm [Check 3] Test psa_hash_setup with SHA1 algorithm [Check 4] Test psa_hash_setup with SHA224 algorithm [Check 5] Test psa_hash_setup with SHA256 algorithm [Check 6] Test psa_hash_setup with SHA384 algorithm [Check 7] Test psa_hash_setup with SHA512 algorithm [Check 8] Test psa_hash_setup with Invalid hash algorithm [Check 9] Test psa_hash_setup with Invalid algorithm [Check 10] Test psa_hash_setup with CTR algorithm TEST RESULT: PASSED ****************************************** TEST: 212 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_update [Info] Executing tests from non-secure [Check 1] Test psa_hash_update with MD5 algorithm [Check 2] Test psa_hash_update with RIPEMD160 algorithm [Check 3] Test psa_hash_update with SHA1 algorithm [Check 4] Test psa_hash_update with SHA224 algorithm [Check 5] Test psa_hash_update with SHA256 algorithm [Check 6] Test psa_hash_update with SHA384 algorithm [Check 7] Test psa_hash_update with SHA512 algorithm [Check 8] Test psa_hash_update without hash setup [Check 9] Test psa_hash_update with completed opertaion handle TEST RESULT: PASSED ****************************************** TEST: 213 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_verify [Info] Executing tests from non-secure [Check 1] Test psa_hash_verify with MD5 algorithm [Check 2] Test psa_hash_verify with RIPEMD160 algorithm [Check 3] Test psa_hash_verify with SHA1 algorithm [Check 4] Test psa_hash_verify with SHA224 algorithm [Check 5] Test psa_hash_verify with SHA256 algorithm [Check 6] Test psa_hash_verify with SHA384 algorithm [Check 7] Test psa_hash_verify with SHA512 algorithm [Check 8] Test psa_hash_verify with incorrect expected hash [Check 9] Test psa_hash_verify with incorrect hash length [Check 10] test psa_hash_verify with inactive & invalid operation handle TEST RESULT: PASSED ****************************************** TEST: 214 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_finish [Info] Executing tests from non-secure [Check 1] Test psa_hash_finish with MD5 algorithm [Check 2] Test psa_hash_finish with RIPEMD160 algorithm [Check 3] Test psa_hash_finish with SHA1 algorithm [Check 4] Test psa_hash_finish with SHA224 algorithm [Check 5] Test psa_hash_finish with SHA256 algorithm [Check 6] Test psa_hash_finish with SHA384 algorithm [Check 7] Test psa_hash_finish with SHA512 algorithm [Check 8] Test psa_hash_finish with invalid hash buffer size [Check 9] test psa_hash_finish with inactive operation handle TEST RESULT: PASSED ****************************************** TEST: 215 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_abort [Info] Executing tests from non-secure [Check 1] Test psa_hash_abort with MD5 algorithm [Check 2] Test psa_hash_abort with RIPEMD160 algorithm [Check 3] Test psa_hash_abort with SHA1 algorithm [Check 4] Test psa_hash_abort with SHA224 algorithm [Check 5] Test psa_hash_abort with SHA256 algorithm [Check 6] Test psa_hash_abort with SHA384 algorithm [Check 7] Test psa_hash_abort with SHA512 algorithm [Check 8] Test psa_hash_finish after calling psa_hash_abort TEST RESULT: PASSED ****************************************** TEST: 216 | DESCRIPTION: Testing crypto generator functions APIs | UT: psa_generate_key [Info] Executing tests from non-secure [Check 1] Test psa_generate_key 16 Byte AES [Check 2] Test psa_generate_key 24 Byte AES [Check 3] Test psa_generate_key 32 Byte AES [Check 4] Test psa_generate_key with DES 64 bit key [Check 5] Test psa_generate_key with Triple DES 2-Key [Check 6] Test psa_generate_key with Triple DES 3-Key [Check 7] Test psa_generate_key with RSA 2048 Keypair [Check 8] Test psa_generate_key with ECC KeyPair [Check 9] Test psa_generate_key with RSA 2048 Public key [Check 10] Test psa_generate_key with invalid key type [Check 11] Test psa_generate_key with invalid usage flags TEST RESULT: PASSED ****************************************** TEST: 217 | DESCRIPTION: Testing crypto generation APIs | UT: psa_generate_random [Info] Executing tests from non-secure [Check 1] Test psa_generate_random to get 0 Byte data [Check 2] Test psa_generate_random to get 16 Byte data [Check 3] Test psa_generate_random to get 24 Byte data [Check 4] Test psa_generate_random to get 32 Byte data [Check 5] Test psa_generate_random to get 64 Byte data [Check 6] Test psa_generate_random to get 128 Byte data [Check 7] Test psa_generate_random to get 256 Byte data [Check 8] Test psa_generate_random to get 512 Byte data [Check 9] Test psa_generate_random to get 1000 Byte data TEST RESULT: PASSED ****************************************** TEST: 218 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_input_key [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_input_key 16 Byte Key [Check 2] Test psa_key_derivation_input_key with invalid usage [Check 3] Test psa_key_derivation_input_key with step as label [Check 4] Test psa_key_derivation_input_key with step as info [Check 5] Test psa_key_derivation_input_key with step as seed [Check 6] Test psa_key_derivation_input_key with step as salt [Check 7] Test psa_key_derivation_input_key with key type as AES(not derive) [Check 8] Test psa_key_derivation_input_key incorrect key algorithm [Check 9] Test psa_key_derivation_input_key with key type as 2048 RSA public key [Check 10] Test psa_key_derivation_input_key with key type as RSA 2048 keypair [Check 11] Test psa_key_derivation_input_key with zero as step [Check 12] Test psa_cipher_decrypt_setup - Invalid key handle [Check 13] Test psa_cipher_decrypt_setup - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 219 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_key_agreement [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_key_agreement - ECDH SECP256R1 [Check 2] Test psa_key_derivation_key_agreement - Invalid step [Check 3] Test psa_key_derivation_key_agreement - ECDH SECP384R1 [Check 4] Test psa_key_derivation_key_agreement - Invalid usage [Check 5] Test psa_key_derivation_key_agreement - KDF not a key agreement alg [Check 6] Test psa_key_derivation_key_agreement - Public key of different curve [Check 7] Test psa_key_derivation_key_agreement - Pub key instead of Prv key [Check 8] Test psa_key_derivation_key_agreement - Invalid handle [Check 9] Test psa_key_derivation_key_agreement - Zero as handle TEST RESULT: PASSED ****************************************** TEST: 220 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_bytes [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_output_bytes - HKDF [Check 2] Test psa_key_derivation_output_bytes - optional salt [Check 3] Test psa_key_derivation_output_bytes - capacity < output_length [Check 4] Test psa_key_derivation_output_bytes - missing info [Check 5] Test psa_key_derivation_output_bytes - missing salt/secret/info [Check 6] Test psa_key_derivation_output_bytes - TLS12_PRF [Check 7] Test psa_key_derivation_output_bytes - capacity < output_length [Check 8] Test psa_key_derivation_output_bytes - missing seed/secret/label TEST RESULT: PASSED ****************************************** TEST: 221 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_output_key [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_output_key - Key [Check 2] Test psa_key_derivation_output_key - Info [Check 3] Test psa_key_derivation_output_key - Salt [Check 4] Test psa_key_derivation_output_key - Greater Capacity than available [Check 5] Test psa_key_derivation_output_key - ECC Public key [Check 6] Test psa_key_derivation_output_key - ECC keypair (wrong key length) [Check 7] Test psa_key_derivation_output_key - RSA Public Key[Check 8] Test psa_key_derivation_output_key - RSA keypair [Check 9] Test psa_key_derivation_output_key - Invalid key size TEST RESULT: PASSED ****************************************** TEST: 222 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_abort [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_abort TEST RESULT: PASSED ****************************************** TEST: 223 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_key_derivation_set_get_capacity [Info] Executing tests from non-secure [Check 1] Test psa_key_derivation_set_get_capacity - < operation's capacity [Check 2] Test psa_key_derivation_set_get_capacity - = operation's capacity [Check 3] Test psa_key_derivation_set_get_capacity - > operation's capacity [Check 4] Test psa_key_derivation_set_get_capacity - unchanged capacity TEST RESULT: PASSED ****************************************** TEST: 224 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt [Info] Executing tests from non-secure [Check 1] Test psa_aead_encrypt - CCM - AES - 13B nonce & 8B add data [Check 2] Test psa_aead_encrypt - CCM - AES - 13B nonce & 32B add data [Check 3] Test psa_aead_encrypt - CCM - AES - 24 bytes Tag length = 4 [Check 4] Test psa_aead_encrypt - CCM - AES - Zero additional data [Check 5] Test psa_aead_encrypt - CCM - AES - Zero plaintext [Check 6] Test psa_aead_encrypt - GCM - AES - 12B nonce & 12B add data [Check 7] Test psa_aead_encrypt - Unsupported algorithm [Check 8] Test psa_aead_encrypt - Invalid usage flag [Check 9] Test psa_aead_encrypt - Invalid ciphertext_size [Check 10] Test psa_aead_encrypt - Invalid nonce [Check 11] Test psa_aead_encrypt - Invalid tag length 0 TEST RESULT: PASSED ****************************************** TEST: 225 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt [Info] Executing tests from non-secure [Check 1] Test psa_aead_decrypt - CCM - AES - 13B nonce & 8B add data [Check 2] Test psa_aead_decrypt - CCM - AES - 13B nonce & 32B add data [Check 3] Test psa_aead_decrypt - CCM - AES - 24 bytes Tag length = 4 [Check 4] Test psa_aead_decrypt - CCM - AES - Zero additional data [Check 5] Test psa_aead_decrypt - CCM - AES - Zero plaintext [Check 6] Test psa_aead_decrypt - GCM - AES - 12B nonce & 12B add data [Check 7] Test psa_aead_decrypt - Unsupported algorithm [Check 8] Test psa_aead_decrypt - Invalid usage flag [Check 9] Test psa_aead_decrypt - Invalid plaintext_size [Check 10] Test psa_aead_decrypt - Invalid nonce [Check 11] Test psa_aead_decrypt - Invalid cihpertext [Check 12] Test psa_aead_decrypt - Invalid cihpertext_size [Check 13] Test psa_aead_decrypt - Invalid tag length 0 TEST RESULT: PASSED ****************************************** TEST: 226 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_setup [Info] Executing tests from non-secure [Check 1] Test psa_mac_sign_setup - HMAC - SHA256 [Check 2] Test psa_mac_sign_setup - CMAC - AES [Check 3] Test psa_mac_sign_setup - Incompatible HMAC for CMAC [Check 4] Test psa_mac_sign_setup - Invalid usage flag [Check 5] Test psa_mac_sign_setup - Invalid key type [Check 6] Test psa_mac_sign_setup - Truncated MAC too large [Check 7] Test psa_mac_sign_setup - Truncated MAC too small [Check 8] Test psa_mac_sign_setup - Unknown MAC algorithm [Check 9] Test psa_mac_sign_setup - Bad algorithm (not a MAC algorithm) [Check 10] Test psa_mac_sign_setup invalid key handle [Check 11] Test psa_mac_sign_setup zero as key handle TEST RESULT: PASSED ****************************************** TEST: 227 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_update [Info] Executing tests from non-secure [Check 1] Test psa_mac_update - HMAC - SHA256 - 64 Byte [Check 2] Test psa_mac_update - CMAC - AES - 16 Byte [Check 3] Test psa_mac_update - HMAC - SHA512 - 32 Byte [Check 4] Test psa_mac_update - HMAC - SHA512 - Invalid operation state TEST RESULT: PASSED ****************************************** TEST: 228 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_sign_finish [Info] Executing tests from non-secure [Check 1] Test psa_mac_sign_finish - HMAC - SHA224 [Check 2] Test psa_mac_sign_finish - HMAC - SHA256 [Check 3] Test psa_mac_sign_finish - HMAC - SHA512 [Check 4] Test psa_mac_sign_finish - HMAC - SHA224 - Truncated 8 Byte [Check 5] Test psa_mac_sign_finish - HMAC - SHA224 - Small output buffer [Check 6] Test psa_mac_sign_finish - HMAC - SHA224 - Invalid operation state [Check 7] Test psa_mac_sign_finish - CMAC - AES TEST RESULT: PASSED ****************************************** TEST: 229 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_setup [Info] Executing tests from non-secure [Check 1] Test psa_mac_verify_setup - HMAC - SHA256 [Check 2] Test psa_mac_verify_setup - CMAC - AES [Check 3] Test psa_mac_verify_setup - Incompatible HMAC for CMAC [Check 4] Test psa_mac_verify_setup - Invalid usage flag [Check 5] Test psa_mac_verify_setup - Invalid key type [Check 6] Test psa_mac_verify_setup - Truncated MAC too large [Check 7] Test psa_mac_verify_setup - Truncated MAC too small [Check 8] Test psa_mac_verify_setup - Unknown MAC algorithm [Check 9] Test psa_mac_verify_setup - Bad algorithm (not a MAC algorithm) [Check 10] Test psa_mac_verify_setup invalid key handle [Check 11] Test psa_mac_verify_setup zero as key handle TEST RESULT: PASSED ****************************************** TEST: 230 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify_finish [Info] Executing tests from non-secure [Check 1] Test psa_mac_verify_finish - HMAC - SHA224 [Check 2] Test psa_mac_verify_finish - HMAC - SHA256 [Check 3] Test psa_mac_verify_finish - HMAC - SHA512 [Check 4] Test psa_mac_verify_finish - HMAC - SHA224 - Truncated 8 Byte [Check 5] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid mac length [Check 6] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid expected mac [Check 7] Test psa_mac_verify_finish - HMAC - SHA224 - Invalid operation state [Check 8] Test psa_mac_verify_finish - CMAC - AES TEST RESULT: PASSED ****************************************** TEST: 231 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_abort [Info] Executing tests from non-secure [Check 1] Test psa_mac_abort - HMAC - SHA224 [Check 2] Test psa_mac_abort - HMAC - SHA224 - Truncated 8 Byte [Check 3] Test psa_mac_abort - HMAC - SHA256 [Check 4] Test psa_mac_abort - HMAC - SHA512 [Check 5] Test psa_mac_abort - CMAC - AES [Check 6] Test psa_mac_sign_finish after calling psa_mac_abort TEST RESULT: PASSED ****************************************** TEST: 232 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt_setup [Info] Executing tests from non-secure [Check 1] Test psa_cipher_encrypt_setup 16 Byte AES [Check 2] Test psa_cipher_encrypt_setup 24 Byte AES [Check 3] Test psa_cipher_encrypt_setup 32 Byte AES [Check 4] Test psa_cipher_encrypt_setup DES 64 bit key [Check 5] Test psa_cipher_encrypt_setup Triple DES 2-Key [Check 6] Test psa_cipher_encrypt_setup Triple DES 3-Key [Check 7] Test psa_cipher_encrypt_setup 16 Byte raw data [Check 8] Test psa_cipher_encrypt_setup - not a cipher algorithm [Check 9] Test psa_cipher_encrypt_setup - unknown cipher algorithm [Check 10] Test psa_cipher_encrypt_setup - incompatible key ARC4 [Check 11] Test psa_cipher_encrypt_setup - incorrect usage [Check 12] Test psa_cipher_encrypt_setup - RSA public key [Check 13] Test psa_cipher_encrypt_setup - RSA keypair [Check 14] Test psa_cipher_encrypt_setup - EC Public key [Check 15] Test psa_cipher_encrypt_setup - EC keypair [Check 16] Test psa_cipher_encrypt_setup - Invalid key handle [Check 17] Test psa_cipher_encrypt_setup - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 233 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt_setup [Info] Executing tests from non-secure [Check 1] Test psa_cipher_decrypt_setup 16 Byte AES [Check 2] Test psa_cipher_decrypt_setup 24 Byte AES [Check 3] Test psa_cipher_decrypt_setup 32 Byte AES [Check 4] Test psa_cipher_decrypt_setup DES 64 bit key [Check 5] Test psa_cipher_decrypt_setup Triple DES 2-Key [Check 6] Test psa_cipher_decrypt_setup Triple DES 3-Key [Check 7] Test psa_cipher_decrypt_setup 16 Byte raw data [Check 8] Test psa_cipher_decrypt_setup - not a cipher algorithm [Check 9] Test psa_cipher_decrypt_setup - unknown cipher algorithm [Check 10] Test psa_cipher_decrypt_setup - incompatible key ARC4 [Check 11] Test psa_cipher_decrypt_setup - incorrect usage [Check 12] Test psa_cipher_decrypt_setup - RSA public key [Check 13] Test psa_cipher_decrypt_setup - RSA keypair [Check 14] Test psa_cipher_decrypt_setup - EC Public key [Check 15] Test psa_cipher_decrypt_setup - EC keypair [Check 16] Test psa_cipher_decrypt_setup - Invalid key handle [Check 17] Test psa_cipher_decrypt_setup - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 234 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_generate_iv [Info] Executing tests from non-secure [Check 1] Test psa_cipher_generate_iv 16 Byte AES [Check 2] Test psa_cipher_generate_iv 24 Byte AES [Check 3] Test psa_cipher_generate_iv 32 Byte AES [Check 4] Test psa_cipher_generate_iv DES 64 bit key [Check 5] Test psa_cipher_generate_iv DES 2-Key [Check 6] Test psa_cipher_generate_iv DES 3-Key [Check 7] Test psa_cipher_generate_iv AES - small iv buffer [Check 8] Test psa_cipher_generate_iv DES - small iv buffer TEST RESULT: PASSED ****************************************** TEST: 235 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_set_iv [Info] Executing tests from non-secure [Check 1] Test psa_cipher_set_iv 16 Byte AES [Check 2] Test psa_cipher_set_iv 24 Byte AES [Check 3] Test psa_cipher_set_iv 32 Byte AES [Check 4] Test psa_cipher_set_iv DES 64 bit key [Check 5] Test psa_cipher_set_iv DES 2-Key [Check 6] Test psa_cipher_set_iv DES 3-Key [Check 7] Test psa_cipher_set_iv AES - small iv buffer [Check 8] Test psa_cipher_set_iv DES - small iv buffer [Check 9] Test psa_cipher_set_iv AES - large iv buffer [Check 10] Test psa_cipher_set_iv DES - large iv buffer TEST RESULT: PASSED ****************************************** TEST: 236 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_update [Info] Executing tests from non-secure [Check 1] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_update - Encrypt - AES CBC_NO_PADDING (Short in) [Check 3] Test psa_cipher_update - Encrypt - AES CBC_PKCS7 [Check 4] Test psa_cipher_update - Encrypt - AES CBC_PKCS7 (Short input) [Check 5] Test psa_cipher_update - Encrypt - AES CTR [Check 6] Test psa_cipher_update - Encrypt - DES CBC (nopad) [Check 7] Test psa_cipher_update - Encrypt - 2-key 3DE -CBC (nopad) [Check 8] Test psa_cipher_update - Encrypt - 3-key 3DE -CBC (nopad) [Check 9] Test psa_cipher_update - Encrypt - small output buffer size [Check 10] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING [Check 11] Test psa_cipher_update - Decrypt - AES CBC_NO_PADDING (Short in) [Check 12] Test psa_cipher_update - Decrypt - AES CBC_PKCS7 [Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7 (Short input) [Check 14] Test psa_cipher_update - Decrypt - AES CTR [Check 15] Test psa_cipher_update - Decrypt - DES CBC (nopad) [Check 16] Test psa_cipher_update - Decrypt - 2-key 3DE -CBC (nopad) [Check 17] Test psa_cipher_update - Decrypt - 3-key 3DE -CBC (nopad) [Check 18] Test psa_cipher_update - Decrypt - small output buffer size [Check 19] Test psa_cipher_update without cipher setup TEST RESULT: PASSED ****************************************** TEST: 237 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_finish [Info] Executing tests from non-secure [Check 1] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_finish - Encrypt - AES CBC_NO_PADDING (Short in) [Check 3] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7 [Check 4] Test psa_cipher_finish - Encrypt - AES CBC_PKCS7 (Short input) [Check 5] Test psa_cipher_finish - Encrypt - AES CTR [Check 6] Test psa_cipher_finish - Encrypt - AES CTR (short input) [Check 7] Test psa_cipher_finish - Encrypt - DES CBC (nopad) [Check 8] Test psa_cipher_finish - Encrypt - 2-key 3DE -CBC (nopad) [Check 9] Test psa_cipher_finish - Encrypt - 3-key 3DE -CBC (nopad) [Check 10] Test psa_cipher_finish - Encrypt - small output buffer size [Check 11] Test psa_cipher_finish - Decrypt - AES CBC_NO_PADDING [Check 12] Test psa_cipher_finish - Decrypt - AES CBC_NO_PADDING (Short in) [Check 13] Test psa_cipher_update - Decrypt - AES CBC_PKCS7 [Check 14] Test psa_cipher_finish - Decrypt - AES CBC_PKCS7 (Short input) [Check 15] Test psa_cipher_finish - Decrypt - AES CTR [Check 16] Test psa_cipher_finish - Decrypt - AES CTR (short input) [Check 17] Test psa_cipher_finish - Decrypt - DES CBC (nopad) [Check 18] Test psa_cipher_finish - Decrypt - 2-key 3DE -CBC (nopad) [Check 19] Test psa_cipher_finish - Decrypt - 3-key 3DE -CBC (nopad) TEST RESULT: PASSED ****************************************** TEST: 238 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_abort [Info] Executing tests from non-secure [Check 1] Test psa_cipher_abort - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_abort - Encrypt - AES CBC_PKCS7 [Check 3] Test psa_cipher_abort - Encrypt - AES CTR [Check 4] Test psa_cipher_abort - Encrypt - DES CBC (nopad) [Check 5] Test psa_cipher_abort - Encrypt - 2-key 3DE -CBC (nopad) [Check 6] Test psa_cipher_abort - Encrypt - 3-key 3DE -CBC (nopad) [Check 7] Test psa_cipher_abort - Decrypt - AES CBC_NO_PADDING [Check 8] Test psa_cipher_abort - Decrypt - AES CBC_PKCS7 [Check 9] Test psa_cipher_abort - Decrypt - AES CTR [Check 10] Test psa_cipher_abort - Decrypt - DES CBC (nopad) [Check 11] Test psa_cipher_abort - Decrypt - 2-key 3DE -CBC (nopad) [Check 12] Test psa_cipher_abort - Decrypt - 3-key 3DE -CBC (nopad) [Check 13] Test psa_cipher_update after psa_cipher_abort should fail TEST RESULT: PASSED ****************************************** TEST: 239 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_encrypt [Info] Executing tests from non-secure [Check 1] Test psa_asymmetric_encrypt - RSA PKCS1V15 [Check 2] Test psa_asymmetric_encrypt - RSA KEY_PAIR PKCS1V15 [Check 3] Test psa_asymmetric_encrypt - RSA OAEP SHA256 [Check 4] Test psa_asymmetric_encrypt - RSA OAEP SHA256 with label [Check 5] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256 [Check 6] Test psa_asymmetric_encrypt - RSA KEY_PAIR OAEP SHA256 with label [Check 7] Test psa_asymmetric_encrypt - Small output buffer [Check 8] Test psa_asymmetric_encrypt - Invalid algorithm [Check 9] Test psa_asymmetric_encrypt - Invalid key type [Check 10] Test psa_asymmetric_encrypt - Invalid usage [Check 11] Test psa_asymmetric_encrypt - RSA PKCS1V15 - Salt [Check 12] Test psa_asymmetric_encrypt - ECC public key [Check 13] Test psa_asymmetric_encrypt - Invalid key handle [Check 14] Test psa_asymmetric_encrypt - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 240 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_asymmetric_decrypt [Info] Executing tests from non-secure [Check 1] Test psa_asymmetric_decrypt - RSA KEY_PAIR PKCS1V15 [Check 2] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256 [Check 3] Test psa_asymmetric_decrypt - RSA KEY_PAIR OAEP SHA256 with label [Check 4] Test psa_asymmetric_decrypt - Invalid key type (RSA public key) [Check 5] Test psa_asymmetric_decrypt - Small output buffer [Check 6] Test psa_asymmetric_decrypt - Invalid algorithm [Check 7] Test psa_asymmetric_decrypt - Invalid key type (AES Key) [Check 8] Test psa_asymmetric_decrypt - Invalid usage [Check 9] Test psa_asymmetric_decrypt - RSA PKCS1V15 - Salt [Check 10] Test psa_asymmetric_decrypt - Invalid key handle [Check 11] Test psa_asymmetric_decrypt - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 241 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_sign_hash [Info] Executing tests from non-secure [Check 1] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 RAW [Check 2] Test psa_sign_hash - RSA KEY_PAIR PKCS1V15 SHA-256 [Check 3] Test psa_sign_hash - ECDSA SECP256R1 SHA-256 [Check 4] Test psa_sign_hash - Invalid key type (RSA public key) [Check 5] Test psa_sign_hash - Small output buffer [Check 6] Test psa_sign_hash - Invalid algorithm [Check 7] Test psa_sign_hash - Invalid key type (AES Key) [Check 8] Test psa_sign_hash - Invalid usage [Check 9] Test psa_sign_hash - Wrong hash size [Check 10] Test psa_sign_hash - Invalid key handle [Check 11] Test psa_sign_hash - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 242 | DESCRIPTION: Testing crypto asymmetric APIs | UT: psa_verify_hash [Info] Executing tests from non-secure [Check 1] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 RAW [Check 2] Test psa_verify_hash - RSA KEY_PAIR PKCS1V15 SHA-256 [Check 3] Test psa_verify_hash - ECDSA KEY_PAIR SECP256R1 SHA-256 [Check 4] Test psa_verify_hash - EC public key [Check 5] Test psa_verify_hash - RSA public key [Check 6] Test psa_verify_hash - Small output buffer [Check 7] Test psa_verify_hash - Invalid algorithm [Check 8] Test psa_verify_hash - Invalid key type (AES Key) [Check 9] Test psa_verify_hash - Invalid usage [Check 10] Test psa_verify_hash - Wrong hash size [Check 11] Test psa_verify_hash - Wrong signature [Check 12] Test psa_verify_hash - Wrong signature size [Check 13] Test psa_verify_hash - Invalid key handle [Check 14] Test psa_verify_hash - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 243 | DESCRIPTION: Testing crypto key derivation APIs | UT: psa_raw_key_agreement [Info] Executing tests from non-secure [Check 1] Test psa_raw_key_agreement - ECDH SECP256R1 [Check 2] Test psa_raw_key_agreement - Small buffer size [Check 3] Test psa_raw_key_agreement - ECDH SECP384R1 [Check 4] Test psa_raw_key_agreement - Invalid usage [Check 5] Test psa_raw_key_agreement - Unknown KDF [Check 6] Test psa_raw_key_agreement - Not a key agreement alg [Check 7] Test psa_raw_key_agreement - Public key on different curve [Check 8] Test psa_raw_key_agreement - Public key instead of private key [Check 9] Test psa_raw_key_agreement - Invalid key handle [Check 10] Test psa_raw_key_agreement - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 244 | DESCRIPTION: Testing crypto key management APIs | UT: psa_copy_key [Info] Executing tests from non-secure [Check 1] Test psa_copy_key - 2048 RSA public key [Check 2] Test psa_copy_key - RSA 2048 keypair [Check 3] Test psa_copy_key - Incompatible target policy(source and target) [Check 4] Test psa_copy_key - source key with no export usage [Check 5] Test psa_copy_key - DES 64 bit key [Check 6] Test psa_copy_key - Triple DES 2-Key [Check 7] Test psa_copy_key - Triple DES 3-Key [Check 8] Test psa_copy_key - EC Public key [Check 9] Test psa_copy_key - EC keypair TEST RESULT: PASSED ****************************************** TEST: 245 | DESCRIPTION: Testing crypto hash functions APIs | UT: psa_hash_clone [Info] Executing tests from non-secure [Check 1] Test psa_hash_clone - MD5 algorithm [Check 2] Test psa_hash_clone - RIPEMD160 algorithm [Check 3] Test psa_hash_clone - SHA1 algorithm [Check 4] Test psa_hash_clone - SHA224 algorithm [Check 5] Test psa_hash_clone - SHA256 algorithm [Check 6] Test psa_hash_clone - SHA384 algorithm [Check 7] Test psa_hash_clone - SHA512 algorithm [Check 8] Test psa_hash_clone - from an inactive source operation [Check 9] Test psa_hash_clone - on an active target operation TEST RESULT: PASSED ****************************************** TEST: 246 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_compute [Info] Executing tests from non-secure [Check 1] Test psa_mac_compute HMAC SHA 224 [Check 2] Test psa_mac_compute - Incompactible HMAC for CMAC [Check 3] Test psa_mac_compute - Invalid usage [Check 4] Test psa_mac_compute - truncated MAC too small [Check 5] Test psa_mac_compute - truncated MAC too large [Check 6] Test psa_mac_compute - bad algorithm (unknown MAC algorithm) [Check 7] Test psa_mac_compute HMAC SHA 256 [Check 8] Test psa_mac_compute HMAC SHA 512 [Check 9] Test psa_mac_compute HMAC SHA 224 (truncated to 8 Byte) [Check 10] Test psa_mac_compute CMAC AES 128 [Check 11] Test psa_mac_compute small size buffer [Check 12] Test psa_mac_compute - Invalid key type TEST RESULT: PASSED ****************************************** TEST: 247 | DESCRIPTION: Testing crypto MAC APIs | UT: psa_mac_verify [Info] Executing tests from non-secure [Check 1] Test psa_mac_verify HMAC SHA 224 [Check 2] Test psa_mac_verify HMAC SHA 256 [Check 3] Test psa_mac_verify - Incompactible HMAC for CMAC [Check 4] Test psa_mac_verify - Invalid usage [Check 5] Test psa_mac_verify - Truncated MAC too large [Check 6] Test psa_mac_verify - Truncated MAC too small [Check 7] Test psa_mac_verify - bad algorithm (unknown MAC algorithm) [Check 8] Test psa_mac_verify HMAC SHA 512 [Check 9] Test psa_mac_verify HMAC SHA 224 (truncated to 8 Byte) [Check 10] Test psa_mac_verify CMAC AES 128 [Check 11] Test psa_mac_verify - Invalid key type [Check 12] Test psa_mac_verify small size buffer [Check 13] Test psa_mac_verify incorrect expected MAC TEST RESULT: PASSED ****************************************** TEST: 248 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_encrypt [Info] Executing tests from non-secure [Check 1] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_encrypt - Encrypt - AES CBC_NO_PADDING (Short input) [Check 3] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7 [Check 4] Test psa_cipher_encrypt - Encrypt - AES CBC_PKCS7 (Short input) [Check 5] Test psa_cipher_encrypt - Encrypt - AES CTR [Check 6] Test psa_cipher_encrypt - Encrypt - AES CTR (short input) [Check 7] Test psa_cipher_encrypt - Encrypt - DES CBC (nopad) [Check 8] Test psa_cipher_encrypt - Encrypt - 2-key 3DE -CBC (nopad) [Check 9] Test psa_cipher_encrypt - Encrypt - 3-key 3DE -CBC (nopad) [Check 10] Test psa_cipher_encrypt - small output buffer size [Check 11] Test psa_cipher_encrypt - Decrypt - AES CBC_NO_PADDING TEST RESULT: PASSED ****************************************** TEST: 249 | DESCRIPTION: Testing crypto symmetric cipher APIs | UT: psa_cipher_decrypt [Info] Executing tests from non-secure [Check 1] Test psa_cipher_decrypt - Encrypt - AES CBC_NO_PADDING [Check 2] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING [Check 3] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING (Short input) [Check 4] Test psa_cipher_decrypt - Decrypt - AES CBC_NO_PADDING [Check 5] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7 [Check 6] Test psa_cipher_decrypt - Decrypt - AES CBC_PKCS7 (Short input) [Check 7] Test psa_cipher_decrypt - Decrypt - AES CTR [Check 8] Test psa_cipher_decrypt - Decrypt - DES CBC (nopad) [Check 9] Test psa_cipher_decrypt - Decrypt - 2-key 3DE -CBC (nopad) [Check 10] Test psa_cipher_decrypt - 3-key 3DE -CBC (nopad) TEST RESULT: PASSED ****************************************** TEST: 250 | DESCRIPTION: Testing crypto key management APIs | UT: psa_sign_message [Info] Executing tests from non-secure [Check 1] Test psa_sign_message - RSA KEY_PAIR PKCS1V15 RAW [Check 2] Test psa_sign_message - ECDSA SECP256R1 SHA-256 [Check 3] Test psa_sign_message - Invalid key type (RSA public key) [Check 4] Test psa_sign_message - Small output buffer [Check 5] Test psa_sign_message - Invalid algorithm [Check 6] Test psa_sign_message - Invalid key type (AES Key) [Check 7] Test psa_sign_message - Invalid usage [Check 8] Test psa_sign_message - Mismatch key type and Algorithm [Check 9] Test psa_sign_message - Alg mismatch in key and API call [Check 10] Test psa_sign_message - Invalid key handle [Check 11] Test psa_sign_message - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 251 | DESCRIPTION: Testing crypto key management APIs | UT: psa_verify_message [Info] Executing tests from non-secure [Check 1] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 RAW [Check 2] Test psa_verify_message - RSA Public Key PKCS1V15 RAW [Check 3] Test psa_verify_message - RSA KEY_PAIR PKCS1V15 SHA-256 [Check 4] Test psa_verify_message - ECDSA KEY_PAIR SECP256R1 SHA-256 [Check 5] Test psa_verify_message - ECDSA Public Key SECP256R1 SHA-256 [Check 6] Test psa_verify_message - Small output buffer [Check 7] Test psa_verify_message - Invalid algorithm [Check 8] Test psa_verify_message - Invalid key type (AES Key) [Check 9] Test psa_verify_message - Invalid usage [Check 10] Test psa_verify_message - Wrong message size [Check 11] Test psa_verify_message - Wrong signature [Check 12] Test psa_verify_message - Wrong signature size [Check 13] Test psa_verify_message - Invalid key handle [Check 14] Test psa_verify_message - Zero as key handle TEST RESULT: PASSED ****************************************** TEST: 252 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_encrypt_setup [Info] Executing tests from non-secure [Check 1] Test psa_aead_encrypt_setup - CCM - AES [Check 2] Test psa_aead_encrypt_setup - CCM - AES - Tag length = 4 [Check 3] Test psa_aead_encrypt_setup - CCM - AES - Mismatched tag length [Check 4] Test psa_aead_encrypt_setup - CCM - AES - Default Tag length [Check 5] Test psa_aead_encrypt_setup - GCM - AES [Check 6] Test psa_aead_encrypt_setup - CCM - DES Invalid key [Check 7] Test psa_aead_encrypt_setup - Invalid usage flag TEST RESULT: PASSED ****************************************** TEST: 253 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_decrypt_setup [Info] Executing tests from non-secure [Check 1] Test psa_aead_decrypt_setup - CCM - AES [Check 2] Test psa_aead_decrypt_setup - CCM - AES - Tag length = 4 [Check 3] Test psa_aead_decrypt_setup - CCM - AES - Mismatched tag length [Check 4] Test psa_aead_decrypt_setup - CCM - AES - Default Tag length [Check 5] Test psa_aead_decrypt_setup - GCM - AES [Check 6] Test psa_aead_decrypt_setup - CCM - DES Invalid key [Check 7] Test psa_aead_decrypt_setup - Invalid usage flag TEST RESULT: PASSED ****************************************** TEST: 254 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_generate_nonce [Info] Executing tests from non-secure [Check 1] Test psa_aead_generate_nonce - CCM [Check 2] Test psa_aead_generate_nonce - CCM - Tag length = 4 [Check 3] Test psa_aead_generate_nonce - CCM - Small buffer size [Check 4] Test psa_aead_generate_nonce - CCM - Uninitialized operation [Check 5] Test psa_aead_generate_nonce - CCM - Decrypt operation [Check 6] Test psa_aead_generate_nonce - GCM [Check 7] Test psa_aead_generate_nonce - GCM - Decrypt operation TEST RESULT: PASSED ****************************************** TEST: 255 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_nonce [Info] Executing tests from non-secure [Check 1] Test psa_aead_set_nonce - Encrypt - CCM [Check 2] Test psa_aead_set_nonce - Encrypt - CCM - Tag length = 4 [Check 3] Test psa_aead_set_nonce - Encrypt - CCM - Small nonce size [Check 4] Test psa_aead_set_nonce - Encrypt - CCM - Large nonce size [Check 5] Test psa_aead_set_nonce - Encrypt - CCM - Invalid operation state [Check 6] Test psa_aead_set_nonce - Encrypt - GCM [Check 7] Test psa_aead_set_nonce - Decrypt - CCM [Check 8] Test psa_aead_set_nonce - Decrypt - CCM - Tag length = 4 [Check 9] Test psa_aead_set_nonce - Decrypt - CCM - Small nonce size [Check 10] Test psa_aead_set_nonce - Decrypt - CCM - Large nonce size [Check 11] Test psa_aead_set_nonce - Decrypt - CCM - Invalid operation state [Check 12] Test psa_aead_set_nonce - Decrypt - GCM TEST RESULT: PASSED ****************************************** TEST: 256 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_set_lengths [Info] Executing tests from non-secure [Check 1] Test psa_aead_set_lengths - Encrypt - CCM [Check 2] Test psa_aead_set_lengths - Encrypt - CCM - Tag length = 4 [Check 3] Test psa_aead_set_lengths - Encrypt - CCM - Zero ad_length [Check 4] Test psa_aead_set_lengths - Encrypt - CCM - Zero plaintext_length [Check 5] Test psa_aead_set_lengths - Encrypt - CCM - Invalid operation state [Check 6] Test psa_aead_set_lengths - Encrypt - GCM [Check 7] Test psa_aead_set_lengths - Decrypt - CCM [Check 8] Test psa_aead_set_lengths - Decrypt - CCM - Tag length = 4 [Check 9] Test psa_aead_set_lengths - Decrypt - CCM - Zero ad_length [Check 10] Test psa_aead_set_lengths - Decrypt - CCM - Zero plaintext_length [Check 11] Test psa_aead_set_lengths - Decrypt - CCM - Invalid operation state [Check 12] Test psa_aead_set_lengths - Decrypt - GCM TEST RESULT: PASSED ****************************************** TEST: 257 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update_ad [Info] Executing tests from non-secure [Check 1] Test psa_aead_update_ad - Encrypt - CCM [Check 2] Test psa_aead_update_ad - Encrypt - CCM - Tag length = 4 [Check 3] Test psa_aead_update_ad - Encrypt - CCM - Zero ad_length [Check 4] Test psa_aead_update_ad - Encrypt - CCM - Zero plaintext_length [Check 5] Test psa_aead_update_ad - Encrypt - CCM - Invalid operation state [Check 6] Test psa_aead_update_ad - Encrypt - CCM - Overflow input length [Check 7] Test psa_aead_update_ad - Decrypt - CCM [Check 8] Test psa_aead_update_ad - Decrypt - CCM - Tag length = 4 [Check 9] Test psa_aead_update_ad - Decrypt - CCM - Zero ad_length [Check 10] Test psa_aead_update_ad - Decrypt - CCM - Zero plaintext_length [Check 11] Test psa_aead_update_ad - Decrypt - CCM - Invalid operation state [Check 12] Test psa_aead_update_ad - Decrypt - CCM - Overflow input length TEST RESULT: PASSED ****************************************** TEST: 258 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_update [Info] Executing tests from non-secure [Check 1] Test psa_aead_update - Encrypt - CCM [Check 2] Test psa_aead_update - Encrypt - CCM - Tag length = 4 [Check 3] Test psa_aead_update - Encrypt - CCM - Zero ad_length [Check 4] Test psa_aead_update - Encrypt - CCM - Zero plaintext_length [Check 5] Test psa_aead_update - Encrypt - CCM - Small buffer size [Check 6] Test psa_aead_update - Encrypt - CCM - Less add data than specified [Check 7] Test psa_aead_update - Encrypt - CCM - Overflow input length [Check 8] Test psa_aead_update - Encrypt - CCM - Invalid operation state [Check 9] Test psa_aead_update - Decrypt - CCM [Check 10] Test psa_aead_update - Decrypt - CCM - Tag length = 4 [Check 11] Test psa_aead_update - Decrypt - CCM - Zero ad_length [Check 12] Test psa_aead_update - Decrypt - CCM - Zero plaintext_length [Check 13] Test psa_aead_update - Decrypt - CCM - Small buffer size [Check 14] Test psa_aead_update - Decrypt - Less add data than specified [Check 15] Test psa_aead_update - Decrypt - CCM - Overflow input length [Check 16] Test psa_aead_update - Decrypt - CCM - Invalid operation state TEST RESULT: PASSED ****************************************** TEST: 259 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_finish [Info] Executing tests from non-secure [Check 1] Test psa_aead_finish - AES-CCM [Check 2] Test psa_aead_finish - AES-CCM 24 bytes Tag length = 4 [Check 3] Test psa_aead_finish - Small buffer size [Check 4] Test psa_aead_finish - Input length is less than plaintext length [Check 5] Test psa_aead_finish - GCM - 16B AES - 12B Nonce & 12B additional data TEST RESULT: PASSED ****************************************** TEST: 260 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_abort [Info] Executing tests from non-secure [Check 1] Test psa_aead_abort - Encrypt - CCM - AES [Check 2] Test psa_aead_abort - Encrypt - GCM - AES [Check 3] Test psa_aead_abort - Decrypt - CCM - AES [Check 4] Test psa_aead_abort - Decrypt - GCM - AES [Check 5] Test psa_aead_abort with all initializations TEST RESULT: PASSED ****************************************** TEST: 261 | DESCRIPTION: Testing crypto AEAD APIs | UT: psa_aead_verify [Info] Executing tests from non-secure [Check 1] Test psa_aead_verify - AES-CCM [Check 2] Test psa_aead_verify - AES-CCM 24 bytes Tag length = 4 [Check 3] Test psa_aead_verify - Small buffer size [Check 4] Test psa_aead_verify - Input length is less than plaintext length [Check 5] Test psa_aead_verify - GCM - 16B AES - 12B Nounce & 12B addi data TEST RESULT: PASSED ****************************************** ************ Crypto Suite Report ********** TOTAL TESTS : 61 TOTAL PASSED : 61 TOTAL SIM ERROR : 0 TOTAL FAILED : 0 TOTAL SKIPPED : 0 ****************************************** Entering standby..
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-iat-api-test ***** PSA Architecture Test Suite - Version 1.4 ***** Running.. Attestation Suite ****************************************** TEST: 601 | DESCRIPTION: Testing attestation initial attestation APIs | UT: psa_initial_attestation [Info] Executing tests from non-secure [Check 1] Test psa_initial_attestation_get_token with Challenge 32 [Check 2] Test psa_initial_attestation_get_token with Challenge 48 [Check 3] Test psa_initial_attestation_get_token with Challenge 64 [Check 4] Test psa_initial_attestation_get_token with zero challenge size [Check 5] Test psa_initial_attestation_get_token with small challenge size [Check 6] Test psa_initial_attestation_get_token with invalid challenge size [Check 7] Test psa_initial_attestation_get_token with large challenge size [Check 8] Test psa_initial_attestation_get_token with zero as token size [Check 9] Test psa_initial_attestation_get_token with small token size [Check 10] Test psa_initial_attestation_get_token_size with Challenge 32 [Check 11] Test psa_initial_attestation_get_token_size with Challenge 48 [Check 12] Test psa_initial_attestation_get_token_size with Challenge 64 [Check 13] Test psa_initial_attestation_get_token_size with zero challenge size [Check 14] Test psa_initial_attestation_get_token_size with small challenge size [Check 15] Test psa_initial_attestation_get_token_size with invalid challenge size [Check 16] Test psa_initial_attestation_get_token_size with large challenge size TEST RESULT: PASSED ****************************************** ************ Attestation Suite Report ********** TOTAL TESTS : 1 TOTAL PASSED : 1 TOTAL SIM ERROR : 0 TOTAL FAILED : 0 TOTAL SKIPPED : 0 ****************************************** Entering standby..
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-its-api-test ***** PSA Architecture Test Suite - Version 1.4 ***** Running.. Storage Suite ****************************************** TEST: 401 | DESCRIPTION: UID not found check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Call get API for UID 6 which is not set [Check 2] Call get_info API for UID 6 which is not set [Check 3] Call remove API for UID 6 which is not set [Check 4] Call get API for UID 6 which is removed [Check 5] Call get_info API for UID 6 which is removed [Check 6] Call remove API for UID 6 which is removed Set storage for UID 6 [Check 7] Call get API for different UID 5 [Check 8] Call get_info API for different UID 5 [Check 9] Call remove API for different UID 5 TEST RESULT: PASSED ****************************************** TEST: 402 | DESCRIPTION: Write once error check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Update the flag of UID 1 with WRITE_ONCE flag [Check 2] Try to remove the UID 1 having WRITE_ONCE flag [Check 3] Create a new UID 2 with WRITE_ONCE flag [Check 4] Try to remove the UID 2 having WRITE_ONCE flag [Check 5] Try to change the length of write_once UID 2 [Check 6] Check UID removal still fails [Check 7] Try to change the WRITE_ONCE flag to None for UID 2 [Check 8] Check UID removal still fails TEST RESULT: PASSED ****************************************** TEST: 403 | DESCRIPTION: Insufficient space check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Overload storage space UID 13 set failed due to insufficient space Remove all registered UIDs [Check 2] Overload storage again to verify all previous UID removed UID 13 set failed due to insufficient space Remove all registered UIDs TEST RESULT: PASSED ****************************************** TEST: 404 | DESCRIPTION: Data Consistency check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2 [Check 2] Call get API with default length - TEST_BUFF_SIZE TEST RESULT: PASSED ****************************************** TEST: 405 | DESCRIPTION: Success scenarios check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Set UID with data length zero and call storage APIs [Check 2] Resetting the length check TEST RESULT: PASSED ****************************************** TEST: 406 | DESCRIPTION: Check for storage create flags | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE [Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY [Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION TEST RESULT: PASSED ****************************************** TEST: 407 | DESCRIPTION: Incorrect Size check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests Create a valid Storage - TEST_BUFF_SIZE/2 Increase the length of storage - TEST_BUFF_SIZE [Check 1] Call get API with old length - TEST_BUFF_SIZE/2 [Check 2] Call get API with old length - TEST_BUFF_SIZE/4 Decrease the length of storage - TEST_BUFF_SIZE/4 [Check 3] Call get API with old length - TEST_BUFF_SIZE/2 [Check 4] Call get API with old length - TEST_BUFF_SIZE [Check 5] Call get API with valid length - TEST_BUFF_SIZE/4 TEST RESULT: PASSED ****************************************** TEST: 408 | DESCRIPTION: Invalid offset check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Try to access data with varying valid offset [Check 2] Try to access data with varying invalid offset TEST RESULT: PASSED ****************************************** TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Call set API with NULL pointer and data length 0 [Check 2] Call get API with NULL read buffer and data length 0 [Check 3] Remove the UID [Check 4] Call get_info API to verify UID removed [Check 5] Create UID with zero data_len and valid write buffer [Check 8] Call get API with NULL read buffer and data length 0 [Check 9] Increase the length TEST RESULT: PASSED ****************************************** TEST: 410 | DESCRIPTION: UID value zero check | UT: ITS [Info] Executing tests from non-secure [Info] Executing ITS tests [Check 1] Creating storage with UID 0 should fail [Check 2] Get_info for UID 0 should fail [Check 3] Removing storage with UID 0 should fail TEST RESULT: PASSED ****************************************** ************ Storage Suite Report ********** TOTAL TESTS : 10 TOTAL PASSED : 10 TOTAL SIM ERROR : 0 TOTAL FAILED : 0 TOTAL SKIPPED : 0 ****************************************** Entering standby..
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/psa-ps-api-test ***** PSA Architecture Test Suite - Version 1.4 ***** Running.. Storage Suite ****************************************** TEST: 401 | DESCRIPTION: UID not found check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Call get API for UID 6 which is not set [Check 2] Call get_info API for UID 6 which is not set [Check 3] Call remove API for UID 6 which is not set [Check 4] Call get API for UID 6 which is removed [Check 5] Call get_info API for UID 6 which is removed [Check 6] Call remove API for UID 6 which is removed Set storage for UID 6 [Check 7] Call get API for different UID 5 [Check 8] Call get_info API for different UID 5 [Check 9] Call remove API for different UID 5 TEST RESULT: PASSED ****************************************** TEST: 402 | DESCRIPTION: Write once error check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Update the flag of UID 1 with WRITE_ONCE flag [Check 2] Try to remove the UID 1 having WRITE_ONCE flag [Check 3] Create a new UID 2 with WRITE_ONCE flag [Check 4] Try to remove the UID 2 having WRITE_ONCE flag [Check 5] Try to change the length of write_once UID 2 [Check 6] Check UID removal still fails [Check 7] Try to change the WRITE_ONCE flag to None for UID 2 [Check 8] Check UID removal still fails TEST RESULT: PASSED ****************************************** TEST: 403 | DESCRIPTION: Insufficient space check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Overload storage space UID 13 set failed due to insufficient space Remove all registered UIDs [Check 2] Overload storage again to verify all previous UID removed UID 13 set failed due to insufficient space Remove all registered UIDs TEST RESULT: PASSED ****************************************** TEST: 404 | DESCRIPTION: Data Consistency check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Call set API with reduced length - TEST_BUFF_SIZE/2 [ 32.304821] random: crng init done [Check 2] Call get API with default length - TEST_BUFF_SIZE TEST RESULT: PASSED ****************************************** TEST: 405 | DESCRIPTION: Success scenarios check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Set UID with data length zero and call storage APIs [Check 2] Resetting the length check TEST RESULT: PASSED ****************************************** TEST: 406 | DESCRIPTION: Check for storage create flags | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Call set API with flag - PSA_STORAGE_FLAG_NONE [Check 2] Call set API with flag - PSA_STORAGE_FLAG_NO_CONFIDENTIALITY [Check 3] Call set API with flag - PSA_STORAGE_FLAG_NO_REPLAY_PROTECTION TEST RESULT: PASSED ****************************************** TEST: 407 | DESCRIPTION: Incorrect Size check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Create a valid Storage - TEST_BUFF_SIZE/2 Increase the length of storage - TEST_BUFF_SIZE [Check 1] Call get API with old length - TEST_BUFF_SIZE/2 [Check 2] Call get API with old length - TEST_BUFF_SIZE/4 Decrease the length of storage - TEST_BUFF_SIZE/4 [Check 3] Call get API with old length - TEST_BUFF_SIZE/2 [Check 4] Call get API with old length - TEST_BUFF_SIZE [Check 5] Call get API with valid length - TEST_BUFF_SIZE/4 TEST RESULT: PASSED ****************************************** TEST: 408 | DESCRIPTION: Invalid offset check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Try to access data with varying valid offset [Check 2] Try to access data with varying invalid offset TEST RESULT: PASSED ****************************************** TEST: 409 | DESCRIPTION: Invalid Arguments check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Call set API with NULL pointer and data length 0 [Check 2] Call get API with NULL read buffer and data length 0 [Check 3] Remove the UID [Check 4] Call get_info API to verify UID removed [Check 5] Create UID with zero data_len and valid write buffer [Check 8] Call get API with NULL read buffer and data length 0 [Check 9] Increase the length TEST RESULT: PASSED ****************************************** TEST: 410 | DESCRIPTION: UID value zero check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests [Check 1] Creating storage with UID 0 should fail [Check 2] Get_info for UID 0 should fail [Check 3] Removing storage with UID 0 should fail TEST RESULT: PASSED ****************************************** TEST: 411 | DESCRIPTION: Optional APIs: UID not found check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs are not supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 412 | DESCRIPTION: Optional APIs: Invalid arguments and offset invalid | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs are not supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 413 | DESCRIPTION: Set_Extended and Create api : Success | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs are not supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 414 | DESCRIPTION: Optional APIs not supported check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Optional PS APIs are not supported. [Check 1] Call to create API should fail as API not supported Failed at Checkpoint: 1 Actual: 0 Expected: -134 TEST RESULT: FAILED (Error Code=0x1) ****************************************** TEST: 415 | DESCRIPTION: Create API write_once flag value check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs are not supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 416 | DESCRIPTION: Storage assest capacity modification check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs not are supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** TEST: 417 | DESCRIPTION: Storage assest capacity modification check | UT: PS [Info] Executing tests from non-secure [Info] Executing PS tests Test Case skipped as Optional PS APIs not are supported. TEST RESULT: SKIPPED (Skip Code=0x2b) ****************************************** ************ Storage Suite Report ********** TOTAL TESTS : 17 TOTAL PASSED : 10 TOTAL SIM ERROR : 0 TOTAL FAILED : 1 TOTAL SKIPPED : 6 ****************************************** Entering standby..
Component test (linux-pc)
# LD_PRELOAD=trusted-services/tools/b-test/install/linux-pc/lib/libts.so o trusted-services/tools/b-test/install/linux-pc/bin/component-test -v TEST(BlockVolumeTests, oversizeWrite) - 0 ms TEST(BlockVolumeTests, multipleImageInstall) - 0 ms TEST(BlockVolumeTests, seekAccess) - 0 ms TEST(BlockVolumeTests, readAndWrite) - 0 ms TEST(BlockVolumeTests, openClose) - 0 ms IGNORE_TEST(PartitionTableTests, detectCorruptedGptHeader) - 0 ms TEST(PartitionTableTests, detectCorruptedMbr) - 2 ms TEST(PartitionTableTests, loadRefPartitionTable) - 1 ms TEST(GptIteratorTests, iterateOverRefGpt) - 0 ms TEST(UefiVariableStoreTests, noRemoveCheck) - 0 ms TEST(UefiVariableStoreTests, readOnlycheck) - 0 ms TEST(UefiVariableStoreTests, unsupportedAttribute) - 0 ms TEST(UefiVariableStoreTests, failedNvSet) - 0 ms TEST(UefiVariableStoreTests, enumerateStoreContents) - 0 ms TEST(UefiVariableStoreTests, runtimeAccess) - 0 ms TEST(UefiVariableStoreTests, bootServiceAccess) - 0 ms TEST(UefiVariableStoreTests, removePersistent) - 0 ms TEST(UefiVariableStoreTests, removeVolatile) - 0 ms TEST(UefiVariableStoreTests, getWithSmallBuffer) - 0 ms TEST(UefiVariableStoreTests, persistentSetGet) - 0 ms TEST(UefiVariableStoreTests, setGetRoundtrip) - 0 ms TEST(UefiVariableIndexTests, setCheckConstraintsNonExistingVar) - 0 ms TEST(UefiVariableIndexTests, setCheckConstraintsExistingVar) - 0 ms TEST(UefiVariableIndexTests, checkIterator) - 0 ms TEST(UefiVariableIndexTests, removeVariable) - 0 ms TEST(UefiVariableIndexTests, dumpBufferTooSmall) - 0 ms TEST(UefiVariableIndexTests, dumpLoadRoadtrip) - 0 ms TEST(UefiVariableIndexTests, enumerateStore) - 0 ms TEST(UefiVariableIndexTests, variableIndexFull) - 0 ms TEST(UefiVariableIndexTests, addWithOversizedName) - 0 ms TEST(UefiVariableIndexTests, emptyIndexOperations) - 0 ms TEST(SfsBlockStoreTests, psCreateAndSetExtended) - 0 ms TEST(SfsBlockStoreTests, psCreateAndSet) - 0 ms TEST(SfsBlockStoreTests, itsStorageLimitTest) - 0 ms TEST(SfsBlockStoreTests, itsStoreNewItem) - 0 ms TEST(SfsRamTests, psCreateAndSetExtended) - 0 ms TEST(SfsRamTests, psCreateAndSet) - 0 ms TEST(SfsRamTests, itsStorageLimitTest) - 0 ms TEST(SfsRamTests, itsStoreNewItem) - 0 ms TEST(MockStoreTests, psCreateAndSetExtended) - 0 ms TEST(MockStoreTests, psCreateAndSet) - 0 ms TEST(MockStoreTests, itsStorageLimitTest) - 0 ms TEST(MockStoreTests, itsStoreNewItem) - 0 ms TEST(SecureStorageProxyTests, psCreateAndSetExtended) - 0 ms TEST(SecureStorageProxyTests, psCreateAndSet) - 0 ms TEST(SecureStorageProxyTests, itsStorageLimitTest) - 0 ms TEST(SecureStorageProxyTests, itsStoreNewItem) - 0 ms TEST(SecureStorageClientTests, psCreateAndSetExtended) - 0 ms TEST(SecureStorageClientTests, psCreateAndSet) - 0 ms TEST(SecureStorageClientTests, itsStorageLimitTest) - 0 ms TEST(SecureStorageClientTests, itsStoreNewItem) - 0 ms TEST(CryptoProtocolPackedcChecks, checkKeyUsage) - 0 ms TEST(CryptoProtocolPackedcChecks, checkKeyLifetime) - 0 ms TEST(CryptoProtocolPackedcChecks, checkAlg) - 0 ms TEST(CryptoProtocolPackedcChecks, checkDhGroup) - 0 ms TEST(CryptoProtocolPackedcChecks, checkEccCurve) - 0 ms TEST(CryptoProtocolPackedcChecks, checkKeyType) - 0 ms TEST(CryptoProtocolProtobufChecks, checkKeyUsage) - 0 ms TEST(CryptoProtocolProtobufChecks, checkKeyLifetime) - 0 ms TEST(CryptoProtocolProtobufChecks, checkAlg) - 0 ms TEST(CryptoProtocolProtobufChecks, checkDhGroup) - 0 ms TEST(CryptoProtocolProtobufChecks, checkEccCurve) - 0 ms TEST(CryptoProtocolProtobufChecks, checkKeyType) - 0 ms TEST(CryptoProtocolOpcodeChecks, checkPackedcToProtobuf) - 0 ms TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 2 ms TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 0 ms TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 0 ms TEST(CryptoMacServicePackedcTests, macAbort) - 0 ms TEST(CryptoMacServicePackedcTests, signAndVerify) - 0 ms TEST(CryptoCipherServicePackedcTests, cipherAbort) - 0 ms TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 0 ms TEST(CryptoHashServicePackedcTests, hashAbort) - 0 ms TEST(CryptoHashServicePackedcTests, hashAndVerify) - 0 ms TEST(CryptoHashServicePackedcTests, calculateHash) - 0 ms TEST(CryptoServicePackedcTests, generateRandomNumbers) - 0 ms TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 8 ms TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 2 ms TEST(CryptoServicePackedcTests, signAndVerifyEat) - 5 ms TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 4 ms TEST(CryptoServicePackedcTests, signAndVerifyHash) - 4 ms TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 0 ms TEST(CryptoServicePackedcTests, exportPublicKey) - 1 ms TEST(CryptoServicePackedcTests, purgeKey) - 0 ms TEST(CryptoServicePackedcTests, copyKey) - 2 ms TEST(CryptoServicePackedcTests, generatePersistentKeys) - 0 ms TEST(CryptoServicePackedcTests, generateVolatileKeys) - 1 ms TEST(CryptoServiceProtobufTests, generateRandomNumbers) - 0 ms - 43 ms TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 2 ms TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 4 ms TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 4 ms TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 0 ms TEST(CryptoServiceProtobufTests, exportPublicKey) - 1 ms TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 1 ms TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 0 ms TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 104 ms TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 22 ms TEST(CryptoFaultTests, randomNumbersWithBrokenStorage) - 0 ms TEST(CryptoFaultTests, persistentKeysWithBrokenStorage) - 0 ms TEST(CryptoFaultTests, volatileKeyWithBrokenStorage) - 0 ms TEST(PocCryptoOpTests, checkOpSequence) - 1 ms TEST(CryptoMsgTests, SignHashOutMsgTest) - 0 ms TEST(CryptoMsgTests, SignHashInMsgTest) - 0 ms TEST(CryptoMsgTests, ExportPublicKeyOutMsgTest) - 0 ms TEST(CryptoMsgTests, ExportPublicKeyInMsgTest) - 0 ms TEST(CryptoMsgTests, GenerateKeyInMsgTest) - 0 ms TEST(CryptoContextPoolTests, multipleContexts) - 1 ms TEST(CryptoContextPoolTests, singleContext) - 0 ms TEST(CryptoContextPoolTests, checkEmptyPool) - 0 ms TEST(FwuUpdateFmpTests, wholeFmpFlow) - 0 ms TEST(FwuOversizeImageTests, oversizeInstallMultiLocationEndStaging) - 1 ms TEST(FwuOversizeImageTests, oversizeInstallEndStaging) - 0 ms TEST(FwuOversizeImageTests, oversizeInstallCancelStaging) - 0 ms TEST(FwuOversizeImageTests, maxSizeInstall) - 0 ms TEST(FwuRollbackTests, bootloaderFallback) - 0 ms TEST(FwuRollbackTests, selectPreviousAfterActivation) - 0 ms TEST(FwuRollbackTests, selectPreviousPriorToActivation) - 1 ms TEST(FwuPowerFailureTests, powerFailureDuringTrial) - 0 ms TEST(FwuPowerFailureTests, powerFailureDuringStaging) - 1 ms TEST(FwuUpdateScenarioTests, partialFirmwareUpdateFlow) - 1 ms TEST(FwuUpdateScenarioTests, wholeFirmwareUpdateFlow) - 0 ms TEST(FwuInvalidBehaviourTests, invalidOperationsInTrial) - 0 ms TEST(FwuInvalidBehaviourTests, invalidOperationsInStaging) - 0 ms TEST(FwuInvalidBehaviourTests, invalidOperationsInRegular) - 0 ms TEST(FwuImageDirectoryTests, zeroFwLocations) - 1 ms TEST(FwuImageDirectoryTests, multipleFwLocations) - 0 ms TEST(FwuImageDirectoryTests, singleFwLocation) - 0 ms TEST(FwuImageDirectoryTests, streamRecycling) - 0 ms TEST(FwuImageDirectoryTests, streamedReads) - 0 ms TEST(FwuDefaultInstallerFactoryTests, configureInstallersFlow) - 0 ms TEST(FwuCopyInstallerTests, installAndCopy) - 1 ms TEST(FwuRawInstallerTests, normalInstallFlow) - 1 ms TEST(FwuMetadataV2Tests, checkImgBankInfoStructure) - 0 ms TEST(FwuMetadataV2Tests, checkImgEntryStructure) - 0 ms TEST(FwuMetadataV2Tests, checkFwStoreDescStructure) - 0 ms TEST(FwuMetadataV2Tests, checkHeaderStructure) - 0 ms TEST(FwuMetadataManagerTests, checkAndRepairInaccessibleStorage) - 0 ms TEST(FwuMetadataManagerTests, checkAndRepairAccessibleStorage) - 1 ms TEST(PartitionedBlockStoreTests, writeToInvalidBlock) - 0 ms TEST(PartitionedBlockStoreTests, checkEraseLimits) - 0 ms TEST(PartitionedBlockStoreTests, writeReadEraseBlock) - 0 ms TEST(PartitionedBlockStoreTests, openClose) - 0 ms TEST(PartitionedBlockStoreTests, getPartitionInfo) - 0 ms TEST(FileBlockStoreTests, initWithExistingDiskImage) - 0 ms TEST(FileBlockStoreTests, wholeBlockRw) - 1 ms TEST(RamBlockStoreTests, eraseOperations) - 0 ms TEST(RamBlockStoreTests, writeToInvalidBlock) - 0 ms TEST(RamBlockStoreTests, writeBiggerThanBlock) - 0 ms TEST(RamBlockStoreTests, writeReadEraseBlock) - 0 ms TEST(RamBlockStoreTests, openClose) - 0 ms TEST(RamBlockStoreTests, getPartitionInfo) - 0 ms TEST(AttestationProvisioningTests, provisionedIak) - 0 ms TEST(AttestationProvisioningTests, selfGeneratedIak) - 1 ms TEST(AttestationServiceTests, repeatedOperation) - 69 ms TEST(AttestationServiceTests, invalidChallengeLen) - 0 ms TEST(AttestationServiceTests, checkTokenSize) - 1 ms TEST(AttestationReporterTests, createReport) - 3 ms TEST(TcgEventLogTests, interateBootMeasurements) - 0 ms TEST(DiscoveryServiceTests, checkServiceInfo) - 0 ms TEST(ServiceNameTests, readService) - 0 ms TEST(ServiceNameTests, checkFields) - 0 ms TEST(ServiceNameTests, checkInvalidServiceNames) - 0 ms TEST(ServiceNameTests, checkValidServiceNames) - 0 ms TEST(ServiceFrameworkTests, serviceProviderChain) - 0 ms TEST(ServiceFrameworkTests, serviceWithOps) - 0 ms TEST(ServiceFrameworkTests, serviceWithNoOps) - 0 ms TEST(ffarpc_call_ep, request_deny_64_bit) - 0 ms TEST(ffarpc_call_ep, request_with_data_after_unshare) - 0 ms TEST(ffarpc_call_ep, request_with_data_buffer_overflow) - 0 ms TEST(ffarpc_call_ep, request_with_data) - 0 ms TEST(ffarpc_call_ep, request_without_data_non_zero_length) - 0 ms TEST(ffarpc_call_ep, request_without_data) - 0 ms TEST(ffarpc_call_ep, invalid_mgmt_call) - 0 ms TEST(ffarpc_call_ep, mem_unshare_null_ep) - 0 ms TEST(ffarpc_call_ep, mem_share_unshare_relinquish_fail_then_success) - 0 ms TEST(ffarpc_call_ep, mem_share_unshare_relinquish_fail) - 0 ms TEST(ffarpc_call_ep, mem_share_unshare) - 0 ms TEST(ffarpc_call_ep, mem_unshare) - 0 ms TEST(ffarpc_call_ep, mem_share_null_ep) - 0 ms TEST(ffarpc_call_ep, mem_share_smaller_page_count_relinquish_fail) - 0 ms TEST(ffarpc_call_ep, mem_share_smaller_page_count) - 0 ms TEST(ffarpc_call_ep, mem_share_retrieve_fail) - 0 ms TEST(ffarpc_call_ep, mem_share_fill_all) - 0 ms TEST(ffarpc_call_ep, mem_share) - 0 ms TEST(ffarpc_caller, end) - 0 ms TEST(ffarpc_caller, end_null_handle) - 0 ms TEST(ffarpc_caller, end_null_context) - 0 ms TEST(ffarpc_caller, invoke_without_response) - 1 ms TEST(ffarpc_caller, invoke_with_response) - 0 ms TEST(ffarpc_caller, invoke_invalid_resp_len) - 0 ms TEST(ffarpc_caller, invoke_send_direct_req_fail) - 0 ms TEST(ffarpc_caller, invoke_resp_long_req) - 0 ms TEST(ffarpc_caller, invoke_resp_no_begin) - 0 ms TEST(ffarpc_caller, invoke_resp_len_null) - 0 ms TEST(ffarpc_caller, invoke_resp_buf_null) - 0 ms TEST(ffarpc_caller, invoke_opstatus_null) - 0 ms TEST(ffarpc_caller, invoke_handle_context_diff) - 0 ms TEST(ffarpc_caller, invoke_null_context) - 0 ms TEST(ffarpc_caller, begin_without_buffer) - 0 ms TEST(ffarpc_caller, begin_with_buffer) - 0 ms TEST(ffarpc_caller, begin_not_opened) - 0 ms TEST(ffarpc_caller, begin_too_large_req) - 0 ms TEST(ffarpc_caller, begin_transaction_in_progress) - 0 ms TEST(ffarpc_caller, begin_null_buffer) - 0 ms TEST(ffarpc_caller, begin_null_context) - 0 ms TEST(ffarpc_caller, close_success) - 0 ms TEST(ffarpc_caller, close_endpoint_and_mem_reclaim_fail) - 0 ms TEST(ffarpc_caller, close_mem_reclaim_fail) - 0 ms TEST(ffarpc_caller, close_send_direct_msg_fail) - 0 ms TEST(ffarpc_caller, close_not_opened) - 0 ms TEST(ffarpc_caller, open_success) - 0 ms TEST(ffarpc_caller, open_send_direct_req_rpc_status_fail_reclaim_fail) - 0 ms TEST(ffarpc_caller, open_send_direct_req_rpc_status_fail) - 0 ms TEST(ffarpc_caller, open_send_direct_req_fail) - 0 ms TEST(ffarpc_caller, open_share_fail) - 0 ms TEST(ffarpc_caller, open_invalid_mem_size) - 0 ms TEST(ffarpc_caller, open_already_opened) - 0 ms TEST(ffarpc_caller, discover_more_max_cnt) - 0 ms TEST(ffarpc_caller, discover_less_max_cnt) - 0 ms TEST(ffarpc_caller, discover) - 0 ms TEST(ffarpc_caller, discover_rx_release_fail) - 0 ms TEST(ffarpc_caller, discover_rx_get_fail) - 0 ms TEST(ffarpc_caller, discover_partition_info_get_fail) - 0 ms TEST(ffarpc_caller, discover_invalid_arguments) - 0 ms TEST(RpcStatusProtocolChecks, checkProtobufRpcStatusCodes) - 0 ms TEST(ConfigRamstoreTests, checkMultipleConfig) - 0 ms TEST(ConfigRamstoreTests, checkSingleConfig) - 0 ms TEST(ConfigRamstoreTests, checkEmptyConfig) - 0 ms TEST(Crc32Tests, multiPart) - 0 ms TEST(Crc32Tests, longString) - 0 ms TEST(Crc32Tests, shortString) - 0 ms TEST(EndianTests, le64) - 0 ms TEST(EndianTests, le32) - 0 ms TEST(EndianTests, le16) - 0 ms TEST(EndianTests, le8) - 0 ms TEST(TlvTests, encodeWrongOrder) - 0 ms TEST(TlvTests, encodeInsufficientSpace) - 0 ms TEST(TlvTests, encodeRecords) - 0 ms TEST(TlvTests, decodeBadRecords) - 0 ms TEST(TlvTests, findAndDecodeMissingOptional) - 0 ms TEST(TlvTests, findAndDecode) - 0 ms TEST(TlvTests, decodeGoodRecords) - 0 ms TEST(UuidTests, roundTrip) - 0 ms TEST(UuidTests, checkNilUuidOperations) - 0 ms TEST(UuidTests, checkIsEqualOperation) - 0 ms TEST(UuidTests, checkOctetsFromCanonical) - 0 ms TEST(UuidTests, parseValidUuidToGuidOctets) - 0 ms TEST(UuidTests, parseError) - 0 ms TEST(UuidTests, parseUuidInUrn) - 0 ms TEST(UuidTests, parseValidUuidMixedCase) - 0 ms TEST(UuidTests, parseValidUuidLowerCase) - 0 ms TEST(TsDemoTests, runTsDemo) - 12 ms OK (252 tests, 251 ran, 365136 checks, 1 ignored, 0 filtered out, 312 ms)
Platform inspect test (arm-linux)
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/platform-inspect attestation_report: challenge: ff c6 73 db 82 96 88 da d9 02 a7 42 90 e4 99 f3 00 b2 d1 4a 86 88 ee 18 74 3e 0f 5f 27 dd cc 41 client_id: 0 boot_seed: a9 91 6f ce 19 d7 3c ec f7 b7 03 74 04 a6 ae b6 48 9d 6d ca 8a fc 86 84 d0 45 17 21 93 22 23 56 security_lifecycle: 0 instance_id: 01 9c d5 b1 3e 0b 88 a9 12 87 c7 1e 52 0d 58 39 92 a7 69 d9 58 bb 8a db 10 15 f0 77 c0 a1 25 63 32 implementation_id: 74 72 75 73 74 65 64 66 69 72 6d 77 61 72 65 2e 6f 72 67 2e 74 73 2e 61 74 74 65 73 74 61 74 69 6f 6e 5f 73 70 sw_components: type: FW_CONFIG digest: 5e 10 97 50 c0 cb 32 14 e6 e4 09 f7 12 ba 84 d6 d1 d6 e2 d4 45 8c 52 f3 d2 b9 6e ea 82 d4 e5 47 type: TB_FW_CONFIG digest: 20 df 7a fd 3c 74 7b 47 b7 22 77 2c 66 f0 ca 61 10 ab 1e 98 b4 f1 ac 1c 54 0f 5b c8 53 b5 92 45 type: BL_2 digest: 84 4b 45 0e df c8 78 63 f8 5f 7f 37 95 b5 73 91 f8 07 b5 3a 01 b4 83 90 72 12 27 40 82 3e 09 9f type: SECURE_RT_EL3 digest: b9 06 f7 d9 31 ac 69 ae 48 fa 16 7a 54 08 b2 7e 58 6a b7 a7 44 f2 0a d2 6f ca 0a 76 eb 8c 84 73 type: HW_CONFIG digest: 54 10 fe 53 a5 fe 12 75 dc cc 3a 15 8f d8 34 63 f3 3e 1e 71 7f e3 4c 39 a1 62 4a 90 5c 0a 84 f3 type: SOC_FW_CONFIG digest: 4e e4 8e 5a e6 50 ed e0 b5 a3 54 8a 1f d6 0e 8a ea 0e 71 75 0e a4 3f 82 76 ce af cd 7c b0 91 e0 type: SECURE_RT_EL1_UNKNOWN digest: fb 4f 96 e3 7b c0 ca 61 a8 60 6d 70 73 92 7a cd b3 07 72 fc 1c 21 f7 6a 5b d6 6c 72 e5 da 5d ae type: TOS_FW_CONFIG digest: ac b0 1f fa 86 25 ca 06 59 60 e1 8d 47 8d 5f 84 45 b2 82 6c 9e b6 c4 17 ff c3 7b e1 b9 c7 f0 06 type: BL_33 digest: 9c 76 10 58 c1 02 db 86 b8 cc 9f 37 72 b8 b0 00 8a 60 cc b5 ee 7b bd 9d 48 1c e0 14 60 d9 ef bb type: NT_FW_CONFIG digest: 0c 53 ba 3f c9 43 13 bf 25 59 bc 8c 2e 7e 49 fa 0f 1a 5a 40 96 ed 58 fa 58 31 39 7a de d4 e4 fb type: SP1 digest: 3f a5 20 ed df 82 81 7b ca b2 1f 48 04 bf 05 8b e2 3b 4e f3 55 33 55 d4 22 69 bb b8 c0 d5 7a 44 type: SP2 digest: 14 5a ff 57 6e 5a 72 3e fc 97 7a 88 3b 90 0f b1 57 5d aa 3c d4 eb 27 d6 11 84 6c 5f 2c b3 17 fd type: SP3 digest: e7 72 fc a5 6b 4d dc db 70 d1 86 7f ca ae f4 20 6a 5d 68 c6 64 7b 9d a9 44 44 28 8b 12 d2 19 87 type: SP4 digest: 02 c2 f8 d4 d4 9a 27 6b 2d 90 ad f4 df ed f1 5a 7a 74 f6 f3 0f 9a f9 e9 68 59 ee cd d6 2e e2 4b type: SP5 digest: 7c a8 ee e7 b1 31 62 f1 7d eb 34 8d c4 a6 5d ff 5d 44 59 88 2c 6d 96 9b d6 c6 8e 9b 9a 79 ea ca type: CRITICAL DATA digest: d3 a9 31 35 10 be c0 88 51 bd 28 4e a9 ff b3 c3 cd 02 11 fc 23 2e 02 07 0e ce a5 ab 1d d9 a1 6a
TS Demo test (arm-linux)
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/ts-demo Demonstrates use of trusted services from an application --------------------------------------------------------- A client requests a set of crypto operations performed by the Crypto service. Key storage for persistent keys is provided by the Secure Storage service via the ITS client. Generating random bytes length: 1 Operation successful Random bytes: D4 Generating random bytes length: 7 Operation successful Random bytes: 83 C7 5C B0 01 2C 36 Generating random bytes length: 128 Operation successful Random bytes: CC F8 93 DB D5 EA EF 96 AE 69 F1 2C 58 97 26 C6 B7 25 8E E4 A6 F2 3B 38 22 9D FD 30 ED B2 46 29 FF 4C A4 04 97 0F A0 8B 74 F0 AC 6F 10 08 62 BE 7E 61 20 B2 60 AA 6C 7E E2 6D A3 51 4B 9A 3A 26 1E 5F 55 48 11 6D 1F D7 DD 07 7C 6A 65 6D 67 C2 12 4F 84 27 67 8C A1 24 AC 61 81 20 37 C0 30 5F 3E 0C 9B 38 B0 91 07 13 9A 2B E3 67 45 37 67 1F 69 EF E2 63 8E B4 F6 FE 41 F0 4F EF 9A A7 23 F2 Generating ECC signing key Operation successful Signing message: "The quick brown fox" using key: 256 Operation successful Signature bytes: 7A F5 F1 EB DC D9 36 2C 6B D3 0F F0 19 7C 9A 56 38 16 E1 D3 F8 F8 B4 7A E9 92 12 F7 44 ED 20 4E F1 05 3F BE 14 7C D1 8D 6E 94 2B 63 57 71 AB 7A 0E E9 A7 1C 1F C4 C8 93 3D E5 74 F3 6F 4F CA A3 Verify signature using original message: "The quick brown fox" Operation successful Verify signature using modified message: "!he quick brown fox" Successfully detected modified message Signing message: "jumps over the lazy dog" using key: 256 Operation successful Signature bytes: 1A 47 A7 A6 B8 4A D2 55 88 94 2B BE AF AB F5 00 69 9F 86 D0 2A 32 20 FB BE 1D 55 2D CB C9 64 EB 60 8C D6 6E 2D C1 AB A4 7F 9C 33 53 2E 6C 2C 53 2F 06 B3 5E 26 3F 0E 1A 1E 53 12 9D A5 B7 CC C0 Verify signature using original message: "jumps over the lazy dog" Operation successful Verify signature using modified message: "!umps over the lazy dog" Successfully detected modified message Generating RSA encryption key Operation successful Encrypting message: "Top secret" using RSA key: 257 Operation successful Encrypted message: 15 C1 72 58 67 B1 4F 3E AF 7D B0 69 1C E5 B3 47 6B 2D 51 04 2A 8D 53 A7 1E B9 94 15 77 9B 8D 61 Decrypting message using RSA key: 257 Operation successful Decrypted message: "Top secret" Exporting public key: 256 Operation successful Public key bytes: 04 8D 7D 0B BA A9 EE C9 59 BA 13 0F 8B E9 94 B9 E8 8B 4D 33 5D 0F 1F 5A 60 F3 B1 0D 09 F2 56 43 6D 7D 05 B5 EE 13 F0 B6 E9 03 6B 1A 40 55 E3 08 70 8F EB AC 5F 2E 9B 26 18 4A C2 9E 73 F7 8A 65 C7 Destroying signing key: 256 Operation successful Destroying encryption key: 257 Operation successful
Config 3: OP-TEE SPMC tests
Build command
MEASURED_BOOT=n SPMC_TESTS=y TS_SMM_GATEWAY=n TS_UEFI_TESTS=n SP_PACKAGING_METHOD=embedded DEFAULT_SP_CONFIG=default-opteesp make
Setup steps after boot
/mnt/host/out/linux-arm-ffa-tee/load_module.sh /mnt/host/out/linux-arm-ffa-user/load_module.sh
Test results
SPMC tests (arm-linux)
#xtest -t ffa_spmc Run test suite with level=0 TEE test application started over default TEE instance ###################################################### # # ffa_spmc # ###################################################### * ffa_spmc_1001 Test FF-A communication o ffa_spmc_1001.1 SP1 comms check ffa_spmc_1001.1 OK o ffa_spmc_1001.2 Sp2 comms check ffa_spmc_1001.2 OK o ffa_spmc_1001.3 SP to SP messaging check ffa_spmc_1001.3 OK ffa_spmc_1001 OK * ffa_spmc_1002 Test FF-A memory: share memory from Normal World to SP o ffa_spmc_1002.1 Test memory set-up ffa_spmc_1002.1 OK o ffa_spmc_1002.2 Test retrieve memory second time ffa_spmc_1002.2 OK o ffa_spmc_1002.3 Test accessing memory ffa_spmc_1002.3 OK o ffa_spmc_1002.4 Test relinquish memory ffa_spmc_1002.4 OK o ffa_spmc_1002.5 Test incorrect reclaim ffa_spmc_1002.5 OK o ffa_spmc_1002.6 Test relinquish memory second time ffa_spmc_1002.6 OK o ffa_spmc_1002.7 Test correct reclaim ffa_spmc_1002.7 OK o ffa_spmc_1002.8 Test retrieve invalid memory region ffa_spmc_1002.8 OK ffa_spmc_1002 OK * ffa_spmc_1003 Test FF-A memory: SP to SP ffa_spmc_1003 OK * ffa_spmc_1004 Test FF-A memory: Access and flags o ffa_spmc_1004.1 Test sharing with exc access ffa_spmc_1004.1 OK o ffa_spmc_1004.2 Test sharing with incorrect access ffa_spmc_1004.2 OK ffa_spmc_1004 OK +----------------------------------------------------- Result of testsuite ffa_spmc: ffa_spmc_1001 OK ffa_spmc_1002 OK ffa_spmc_1003 OK ffa_spmc_1004 OK +----------------------------------------------------- 39 subtests of which 0 failed 4 test cases of which 0 failed 0 test cases were skipped TEE test application done!
Config 4: SMMGW tests
Build command
MEASURED_BOOT=n SPMC_TESTS=n TS_SMM_GATEWAY=y TS_UEFI_TESTS=y DEFAULT_SP_CONFIG=default-sp SP_PACKAGING_METHOD=fip make
Setup steps after boot
/mnt/host/out/linux-arm-ffa-tee/load_module.sh /mnt/host/out/linux-arm-ffa-user/load_module.sh
Test results
Trusted Services service level test (arm-linux)
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/ts-service-test -v -xgFwuServiceTests TEST(PsServiceTests, createAndSetExtended) - 19100 ms TEST(PsServiceTests, createAndSet) - 23732 ms TEST(PsServiceTests, storeNewItem) - 20301 ms TEST(ItsServiceTests, storeNewItem) - 20398 ms TEST(AttestationProvisioningTests, provisionedIak) /src/trusted-services/components/service/attestation/test/service/attestation_provisioning_tests.cpp:107: error: Failure in TEST(AttestationProvisioningTests, provisionedIak) /src/trusted-services/components/service/attestation/test/service/attestation_provisioning_tests.cpp:32: error: CHECK_TRUE(m_attest_service_context) failed - 4367 ms TEST(AttestationProvisioningTests, selfGeneratedIak) /src/trusted-services/components/service/attestation/test/service/attestation_provisioning_tests.cpp:70: error: Failure in TEST(AttestationProvisioningTests, selfGeneratedIak) /src/trusted-services/components/service/attestation/test/service/attestation_provisioning_tests.cpp:32: error: CHECK_TRUE(m_attest_service_context) failed - 2840 ms TEST(AttestationServiceTests, repeatedOperation) /src/trusted-services/components/service/attestation/test/service/attestation_service_tests.cpp:142: error: Failure in TEST(AttestationServiceTests, repeatedOperation) /src/trusted-services/components/service/attestation/test/service/attestation_service_tests.cpp:32: error: CHECK_TRUE(m_attest_service_context) failed - 3156 ms TEST(AttestationServiceTests, invalidChallengeLen) /src/trusted-services/components/service/attestation/test/service/attestation_service_tests.cpp:90: error: Failure in TEST(AttestationServiceTests, invalidChallengeLen) /src/trusted-services/components/service/attestation/test/service/attestation_service_tests.cpp:32: error: CHECK_TRUE(m_attest_service_context) failed - 2700 ms TEST(AttestationServiceTests, checkTokenSize) /src/trusted-services/components/service/attestation/test/service/attestation_service_tests.cpp:60: error: Failure in TEST(AttestationServiceTests, checkTokenSize) /src/trusted-services/components/service/attestation/test/service/attestation_service_tests.cpp:32: error: CHECK_TRUE(m_attest_service_context) failed - 2868 ms TEST(CryptoKeyDerivationServicePackedcTests, deriveAbort) - 23999 ms TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveBytes) - 27100 ms TEST(CryptoKeyDerivationServicePackedcTests, hkdfDeriveKey) - 33218 ms TEST(CryptoMacServicePackedcTests, macAbort) - 20134 ms TEST(CryptoMacServicePackedcTests, signAndVerify) - 78644 ms TEST(CryptoCipherServicePackedcTests, cipherAbort) - 20500 ms TEST(CryptoCipherServicePackedcTests, encryptDecryptRoundtrip) - 62400 ms TEST(CryptoHashServicePackedcTests, hashAbort) - 18648 ms TEST(CryptoHashServicePackedcTests, hashAndVerify) - 30100 ms TEST(CryptoHashServicePackedcTests, calculateHash) - 13700 ms TEST(CryptoServicePackedcTests, generateRandomNumbers) - 43332 ms TEST(CryptoServicePackedcTests, asymEncryptDecryptWithSalt) - 3362700 ms TEST(CryptoServicePackedcTests, asymEncryptDecrypt) - 151500 ms TEST(CryptoServicePackedcTests, signAndVerifyEat) - 265100 ms TEST(CryptoServicePackedcTests, signAndVerifyMessage) - 269600 ms TEST(CryptoServicePackedcTests, signAndVerifyHash) - 269259 ms TEST(CryptoServicePackedcTests, exportAndImportKeyPair) - 47861 ms TEST(CryptoServicePackedcTests, exportPublicKey) - 57517 ms TEST(CryptoServicePackedcTests, purgeKey) - 39394 ms TEST(CryptoServicePackedcTests, copyKey) - 137000 ms TEST(CryptoServicePackedcTests, generatePersistentKeys) - 68100 ms TEST(CryptoServicePackedcTests, generateVolatileKeys) - 57400 ms TEST(CryptoServiceProtobufTests, generateRandomNumbers)[ 9.056856] random: crng init done - 44004 ms TEST(CryptoServiceProtobufTests, asymEncryptDecryptWithSalt) - 1227965 ms TEST(CryptoServiceProtobufTests, asymEncryptDecrypt) - 163563 ms TEST(CryptoServiceProtobufTests, signAndVerifyMessage) - 269643 ms TEST(CryptoServiceProtobufTests, signAndVerifyHash) - 270000 ms TEST(CryptoServiceProtobufTests, exportAndImportKeyPair) - 47842 ms TEST(CryptoServiceProtobufTests, exportPublicKey) - 57876 ms TEST(CryptoServiceProtobufTests, generatePersistentKeys) - 67981 ms TEST(CryptoServiceProtobufTests, generateVolatileKeys) - 57230 ms TEST(CryptoServiceLimitTests, volatileRsaKeyPairLimit) - 10585709 ms TEST(CryptoServiceLimitTests, volatileEccKeyPairLimit) - 2205184 ms TEST(DiscoveryServiceTests, checkServiceInfo) - 3818 ms Errors (5 failures, 45 tests, 43 ran, 339 checks, 0 ignored, 2 filtered out, 20211941 ms)
UEFI tests (arm-linux)
#LD_PRELOAD=/mnt/host/shared/lib/libts.so /mnt/host/shared/bin/uefi-test -v TEST(SmmVariableAttackTests, getCheckPropertyWithMaxSizeName) - 3744 ms TEST(SmmVariableAttackTests, getCheckPropertyWithOversizeName) - 1831 ms TEST(SmmVariableAttackTests, setCheckPropertyWithMaxSizeName) - 2000 ms TEST(SmmVariableAttackTests, setCheckPropertyWithOversizeName) - 1790 ms TEST(SmmVariableAttackTests, enumerateWithSizeMaxNameSize) - 5700 ms TEST(SmmVariableAttackTests, enumerateWithOversizeName) - 1771 ms TEST(SmmVariableAttackTests, setAndGetWithSizeMaxNameSize) - 2917 ms TEST(SmmVariableAttackTests, setAndGetWithOversizeName) - 2800 ms TEST(SmmVariableAttackTests, setWithSizeMaxNameSize) - 1822 ms TEST(SmmVariableAttackTests, setWithOversizeName) - 1894 ms TEST(SmmVariableAttackTests, setWithSizeMaxDataSize) - 1867 ms TEST(SmmVariableAttackTests, setWithOversizeData) - 1800 ms TEST(SmmVariableServiceTests, checkMaxVariablePayload) - 1700 ms TEST(SmmVariableServiceTests, setSizeConstraint) - 4400 ms TEST(SmmVariableServiceTests, enumerateStoreContents) - 23307 ms TEST(SmmVariableServiceTests, getVarSizeNv) - 5557 ms TEST(SmmVariableServiceTests, getVarSize) - 2800 ms TEST(SmmVariableServiceTests, setAndGetNv) - 10157 ms TEST(SmmVariableServiceTests, setAndGet) - 3600 ms OK (19 tests, 19 ran, 141 checks, 0 ignored, 0 filtered out, 87201 ms)
Tags
None
Subscribers
None
- Last Author
- gabor-toth-arm
- Last Edited
- Jun 26 2023, 4:47 AM