Merge pull request #7317 from mpg/lift-exclusions
Lift exclusions from driver-only hash component
This commit is contained in:
commit
ac6db4d649
10 changed files with 989 additions and 955 deletions
|
@ -2626,15 +2626,6 @@ config_psa_crypto_hash_use_psa () {
|
|||
scripts/config.py unset MBEDTLS_ENTROPY_C
|
||||
scripts/config.py unset MBEDTLS_ENTROPY_NV_SEED # depends on ENTROPY_C
|
||||
scripts/config.py unset MBEDTLS_PLATFORM_NV_SEED_ALT # depends on former
|
||||
# Also unset MD_C and things that depend on it.
|
||||
if [ "$DRIVER_ONLY" -eq 1 ]; then
|
||||
scripts/config.py unset MBEDTLS_MD_C
|
||||
fi
|
||||
scripts/config.py unset MBEDTLS_HKDF_C # has independent PSA implementation
|
||||
scripts/config.py unset MBEDTLS_HMAC_DRBG_C
|
||||
scripts/config.py unset MBEDTLS_PKCS7_C
|
||||
scripts/config.py unset MBEDTLS_ECDSA_DETERMINISTIC
|
||||
scripts/config.py -f include/psa/crypto_config.h unset PSA_WANT_ALG_DETERMINISTIC_ECDSA
|
||||
|
||||
# Dynamic secure element support is a deprecated feature and needs to be disabled here.
|
||||
# This is done to have the same form of psa_key_attributes_s for libdriver and library.
|
||||
|
|
|
@ -236,6 +236,8 @@ void ecdsa_write_read_zero(int id)
|
|||
unsigned char sig[200];
|
||||
size_t sig_len, i;
|
||||
|
||||
MD_PSA_INIT();
|
||||
|
||||
mbedtls_ecdsa_init(&ctx);
|
||||
memset(&rnd_info, 0x00, sizeof(mbedtls_test_rnd_pseudo_info));
|
||||
memset(hash, 0, sizeof(hash));
|
||||
|
@ -286,6 +288,7 @@ void ecdsa_write_read_zero(int id)
|
|||
|
||||
exit:
|
||||
mbedtls_ecdsa_free(&ctx);
|
||||
MD_PSA_DONE();
|
||||
}
|
||||
/* END_CASE */
|
||||
|
||||
|
@ -298,6 +301,8 @@ void ecdsa_write_read_random(int id)
|
|||
unsigned char sig[200];
|
||||
size_t sig_len, i;
|
||||
|
||||
MD_PSA_INIT();
|
||||
|
||||
mbedtls_ecdsa_init(&ctx);
|
||||
memset(&rnd_info, 0x00, sizeof(mbedtls_test_rnd_pseudo_info));
|
||||
memset(hash, 0, sizeof(hash));
|
||||
|
@ -352,6 +357,7 @@ void ecdsa_write_read_random(int id)
|
|||
|
||||
exit:
|
||||
mbedtls_ecdsa_free(&ctx);
|
||||
MD_PSA_DONE();
|
||||
}
|
||||
/* END_CASE */
|
||||
|
||||
|
@ -431,6 +437,8 @@ void ecdsa_write_restart(int id, char *d_str, int md_alg,
|
|||
unsigned char sig[MBEDTLS_ECDSA_MAX_LEN];
|
||||
size_t slen;
|
||||
|
||||
MD_PSA_INIT();
|
||||
|
||||
mbedtls_ecdsa_restart_init(&rs_ctx);
|
||||
mbedtls_ecdsa_init(&ctx);
|
||||
memset(sig, 0, sizeof(sig));
|
||||
|
@ -481,6 +489,7 @@ void ecdsa_write_restart(int id, char *d_str, int md_alg,
|
|||
exit:
|
||||
mbedtls_ecdsa_restart_free(&rs_ctx);
|
||||
mbedtls_ecdsa_free(&ctx);
|
||||
MD_PSA_DONE();
|
||||
}
|
||||
/* END_CASE */
|
||||
|
||||
|
|
|
@ -14,85 +14,85 @@ HKDF expand fails with okm_len / hash_len > 255
|
|||
test_hkdf_expand_ret:32:32:8192:MBEDTLS_ERR_HKDF_BAD_INPUT_DATA
|
||||
|
||||
HKDF RFC5869 Test Vector #1
|
||||
depends_on:MBEDTLS_SHA256_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA256
|
||||
test_hkdf:MBEDTLS_MD_SHA256:"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b":"000102030405060708090a0b0c":"f0f1f2f3f4f5f6f7f8f9":"3cb25f25faacd57a90434f64d0362f2a2d2d0a90cf1a5a4c5db02d56ecc4c5bf34007208d5b887185865"
|
||||
|
||||
HKDF RFC5869 Test Vector #2
|
||||
depends_on:MBEDTLS_SHA256_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA256
|
||||
test_hkdf:MBEDTLS_MD_SHA256:"000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f":"606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeaf":"b0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9fafbfcfdfeff":"b11e398dc80327a1c8e7f78c596a49344f012eda2d4efad8a050cc4c19afa97c59045a99cac7827271cb41c65e590e09da3275600c2f09b8367793a9aca3db71cc30c58179ec3e87c14c01d5c1f3434f1d87"
|
||||
|
||||
HKDF RFC5869 Test Vector #3
|
||||
depends_on:MBEDTLS_SHA256_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA256
|
||||
test_hkdf:MBEDTLS_MD_SHA256:"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b":"":"":"8da4e775a563c18f715f802a063c5a31b8a11f5c5ee1879ec3454e5f3c738d2d9d201395faa4b61a96c8"
|
||||
|
||||
HKDF RFC5869 Test Vector #4
|
||||
depends_on:MBEDTLS_SHA1_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA1
|
||||
test_hkdf:MBEDTLS_MD_SHA1:"0b0b0b0b0b0b0b0b0b0b0b":"000102030405060708090a0b0c":"f0f1f2f3f4f5f6f7f8f9":"085a01ea1b10f36933068b56efa5ad81a4f14b822f5b091568a9cdd4f155fda2c22e422478d305f3f896"
|
||||
|
||||
HKDF RFC5869 Test Vector #5
|
||||
depends_on:MBEDTLS_SHA1_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA1
|
||||
test_hkdf:MBEDTLS_MD_SHA1:"000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f":"606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeaf":"b0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9fafbfcfdfeff":"0bd770a74d1160f7c9f12cd5912a06ebff6adcae899d92191fe4305673ba2ffe8fa3f1a4e5ad79f3f334b3b202b2173c486ea37ce3d397ed034c7f9dfeb15c5e927336d0441f4c4300e2cff0d0900b52d3b4"
|
||||
|
||||
HKDF RFC5869 Test Vector #6
|
||||
depends_on:MBEDTLS_SHA1_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA1
|
||||
test_hkdf:MBEDTLS_MD_SHA1:"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b":"":"":"0ac1af7002b3d761d1e55298da9d0506b9ae52057220a306e07b6b87e8df21d0ea00033de03984d34918"
|
||||
|
||||
HKDF RFC5869 Test Vector #7
|
||||
depends_on:MBEDTLS_SHA1_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA1
|
||||
test_hkdf:MBEDTLS_MD_SHA1:"0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c":"":"":"2c91117204d745f3500d636a62f64f0ab3bae548aa53d423b0d1f27ebba6f5e5673a081d70cce7acfc48"
|
||||
|
||||
HKDF RFC5869 Test Vector #1 Extract
|
||||
depends_on:MBEDTLS_SHA256_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA256
|
||||
test_hkdf_extract:MBEDTLS_MD_SHA256:"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b":"000102030405060708090a0b0c":"077709362c2e32df0ddc3f0dc47bba6390b6c73bb50f9c3122ec844ad7c2b3e5"
|
||||
|
||||
HKDF RFC5869 Test Vector #2 Extract
|
||||
depends_on:MBEDTLS_SHA256_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA256
|
||||
test_hkdf_extract:MBEDTLS_MD_SHA256:"000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f":"606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeaf":"06a6b88c5853361a06104c9ceb35b45cef760014904671014a193f40c15fc244"
|
||||
|
||||
HKDF RFC5869 Test Vector #3 Extract
|
||||
depends_on:MBEDTLS_SHA256_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA256
|
||||
test_hkdf_extract:MBEDTLS_MD_SHA256:"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b":"":"19ef24a32c717b167f33a91d6f648bdf96596776afdb6377ac434c1c293ccb04"
|
||||
|
||||
HKDF RFC5869 Test Vector #4 Extract
|
||||
depends_on:MBEDTLS_SHA1_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA1
|
||||
test_hkdf_extract:MBEDTLS_MD_SHA1:"0b0b0b0b0b0b0b0b0b0b0b":"000102030405060708090a0b0c":"9b6c18c432a7bf8f0e71c8eb88f4b30baa2ba243"
|
||||
|
||||
HKDF RFC5869 Test Vector #5 Extract
|
||||
depends_on:MBEDTLS_SHA1_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA1
|
||||
test_hkdf_extract:MBEDTLS_MD_SHA1:"000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f":"606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeaf":"8adae09a2a307059478d309b26c4115a224cfaf6"
|
||||
|
||||
HKDF RFC5869 Test Vector #6 Extract
|
||||
depends_on:MBEDTLS_SHA1_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA1
|
||||
test_hkdf_extract:MBEDTLS_MD_SHA1:"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b":"":"da8c8a73c7fa77288ec6f5e7c297786aa0d32d01"
|
||||
|
||||
HKDF RFC5869 Test Vector #7 Extract
|
||||
depends_on:MBEDTLS_SHA1_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA1
|
||||
test_hkdf_extract:MBEDTLS_MD_SHA1:"0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c":"":"2adccada18779e7c2077ad2eb19d3f3e731385dd"
|
||||
|
||||
HKDF RFC5869 Test Vector #1 Expand
|
||||
depends_on:MBEDTLS_SHA256_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA256
|
||||
test_hkdf_expand:MBEDTLS_MD_SHA256:"f0f1f2f3f4f5f6f7f8f9":"077709362c2e32df0ddc3f0dc47bba6390b6c73bb50f9c3122ec844ad7c2b3e5":"3cb25f25faacd57a90434f64d0362f2a2d2d0a90cf1a5a4c5db02d56ecc4c5bf34007208d5b887185865"
|
||||
|
||||
HKDF RFC5869 Test Vector #2 Expand
|
||||
depends_on:MBEDTLS_SHA256_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA256
|
||||
test_hkdf_expand:MBEDTLS_MD_SHA256:"b0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9fafbfcfdfeff":"06a6b88c5853361a06104c9ceb35b45cef760014904671014a193f40c15fc244":"b11e398dc80327a1c8e7f78c596a49344f012eda2d4efad8a050cc4c19afa97c59045a99cac7827271cb41c65e590e09da3275600c2f09b8367793a9aca3db71cc30c58179ec3e87c14c01d5c1f3434f1d87"
|
||||
|
||||
HKDF RFC5869 Test Vector #3 Expand
|
||||
depends_on:MBEDTLS_SHA256_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA256
|
||||
test_hkdf_expand:MBEDTLS_MD_SHA256:"":"19ef24a32c717b167f33a91d6f648bdf96596776afdb6377ac434c1c293ccb04":"8da4e775a563c18f715f802a063c5a31b8a11f5c5ee1879ec3454e5f3c738d2d9d201395faa4b61a96c8"
|
||||
|
||||
HKDF RFC5869 Test Vector #4 Expand
|
||||
depends_on:MBEDTLS_SHA1_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA1
|
||||
test_hkdf_expand:MBEDTLS_MD_SHA1:"f0f1f2f3f4f5f6f7f8f9":"9b6c18c432a7bf8f0e71c8eb88f4b30baa2ba243":"085a01ea1b10f36933068b56efa5ad81a4f14b822f5b091568a9cdd4f155fda2c22e422478d305f3f896"
|
||||
|
||||
HKDF RFC5869 Test Vector #5 Expand
|
||||
depends_on:MBEDTLS_SHA1_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA1
|
||||
test_hkdf_expand:MBEDTLS_MD_SHA1:"b0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9fafbfcfdfeff":"8adae09a2a307059478d309b26c4115a224cfaf6":"0bd770a74d1160f7c9f12cd5912a06ebff6adcae899d92191fe4305673ba2ffe8fa3f1a4e5ad79f3f334b3b202b2173c486ea37ce3d397ed034c7f9dfeb15c5e927336d0441f4c4300e2cff0d0900b52d3b4"
|
||||
|
||||
HKDF RFC5869 Test Vector #6 Expand
|
||||
depends_on:MBEDTLS_SHA1_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA1
|
||||
test_hkdf_expand:MBEDTLS_MD_SHA1:"":"da8c8a73c7fa77288ec6f5e7c297786aa0d32d01":"0ac1af7002b3d761d1e55298da9d0506b9ae52057220a306e07b6b87e8df21d0ea00033de03984d34918"
|
||||
|
||||
HKDF RFC5869 Test Vector #7 Expand
|
||||
depends_on:MBEDTLS_SHA1_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA1
|
||||
test_hkdf_expand:MBEDTLS_MD_SHA1:"":"2adccada18779e7c2077ad2eb19d3f3e731385dd":"2c91117204d745f3500d636a62f64f0ab3bae548aa53d423b0d1f27ebba6f5e5673a081d70cce7acfc48"
|
||||
|
|
|
@ -15,6 +15,8 @@ void test_hkdf(int md_alg, data_t *ikm, data_t *salt, data_t *info,
|
|||
int ret;
|
||||
unsigned char okm[128] = { '\0' };
|
||||
|
||||
MD_PSA_INIT();
|
||||
|
||||
const mbedtls_md_info_t *md = mbedtls_md_info_from_type(md_alg);
|
||||
TEST_ASSERT(md != NULL);
|
||||
|
||||
|
@ -26,6 +28,9 @@ void test_hkdf(int md_alg, data_t *ikm, data_t *salt, data_t *info,
|
|||
|
||||
ASSERT_COMPARE(okm, expected_okm->len,
|
||||
expected_okm->x, expected_okm->len);
|
||||
|
||||
exit:
|
||||
MD_PSA_DONE();
|
||||
}
|
||||
/* END_CASE */
|
||||
|
||||
|
@ -39,6 +44,8 @@ void test_hkdf_extract(int md_alg,
|
|||
unsigned char *output_prk = NULL;
|
||||
size_t output_prk_len;
|
||||
|
||||
MD_PSA_INIT();
|
||||
|
||||
const mbedtls_md_info_t *md = mbedtls_md_info_from_type(md_alg);
|
||||
TEST_ASSERT(md != NULL);
|
||||
|
||||
|
@ -53,6 +60,7 @@ void test_hkdf_extract(int md_alg,
|
|||
|
||||
exit:
|
||||
mbedtls_free(output_prk);
|
||||
MD_PSA_DONE();
|
||||
}
|
||||
/* END_CASE */
|
||||
|
||||
|
@ -66,6 +74,8 @@ void test_hkdf_expand(int md_alg,
|
|||
int ret;
|
||||
unsigned char *output_okm = NULL;
|
||||
|
||||
MD_PSA_INIT();
|
||||
|
||||
const mbedtls_md_info_t *md = mbedtls_md_info_from_type(md_alg);
|
||||
TEST_ASSERT(md != NULL);
|
||||
|
||||
|
@ -82,6 +92,7 @@ void test_hkdf_expand(int md_alg,
|
|||
|
||||
exit:
|
||||
mbedtls_free(output_okm);
|
||||
MD_PSA_DONE();
|
||||
}
|
||||
/* END_CASE */
|
||||
|
||||
|
|
|
@ -41,6 +41,8 @@ void hmac_drbg_entropy_usage(int md_alg)
|
|||
size_t default_entropy_len;
|
||||
size_t expected_consumed_entropy = 0;
|
||||
|
||||
MD_PSA_INIT();
|
||||
|
||||
mbedtls_hmac_drbg_init(&ctx);
|
||||
memset(buf, 0, sizeof(buf));
|
||||
memset(out, 0, sizeof(out));
|
||||
|
@ -118,6 +120,7 @@ void hmac_drbg_entropy_usage(int md_alg)
|
|||
|
||||
exit:
|
||||
mbedtls_hmac_drbg_free(&ctx);
|
||||
MD_PSA_DONE();
|
||||
}
|
||||
/* END_CASE */
|
||||
|
||||
|
@ -127,6 +130,8 @@ void hmac_drbg_seed_file(int md_alg, char *path, int ret)
|
|||
const mbedtls_md_info_t *md_info;
|
||||
mbedtls_hmac_drbg_context ctx;
|
||||
|
||||
MD_PSA_INIT();
|
||||
|
||||
mbedtls_hmac_drbg_init(&ctx);
|
||||
|
||||
md_info = mbedtls_md_info_from_type(md_alg);
|
||||
|
@ -141,6 +146,7 @@ void hmac_drbg_seed_file(int md_alg, char *path, int ret)
|
|||
|
||||
exit:
|
||||
mbedtls_hmac_drbg_free(&ctx);
|
||||
MD_PSA_DONE();
|
||||
}
|
||||
/* END_CASE */
|
||||
|
||||
|
@ -153,6 +159,8 @@ void hmac_drbg_buf(int md_alg)
|
|||
mbedtls_hmac_drbg_context ctx;
|
||||
size_t i;
|
||||
|
||||
MD_PSA_INIT();
|
||||
|
||||
mbedtls_hmac_drbg_init(&ctx);
|
||||
memset(buf, 0, sizeof(buf));
|
||||
memset(out, 0, sizeof(out));
|
||||
|
@ -171,6 +179,7 @@ void hmac_drbg_buf(int md_alg)
|
|||
|
||||
exit:
|
||||
mbedtls_hmac_drbg_free(&ctx);
|
||||
MD_PSA_DONE();
|
||||
}
|
||||
/* END_CASE */
|
||||
|
||||
|
@ -185,6 +194,8 @@ void hmac_drbg_no_reseed(int md_alg, data_t *entropy,
|
|||
const mbedtls_md_info_t *md_info;
|
||||
mbedtls_hmac_drbg_context ctx;
|
||||
|
||||
MD_PSA_INIT();
|
||||
|
||||
mbedtls_hmac_drbg_init(&ctx);
|
||||
|
||||
p_entropy.p = entropy->x;
|
||||
|
@ -219,6 +230,7 @@ void hmac_drbg_no_reseed(int md_alg, data_t *entropy,
|
|||
|
||||
exit:
|
||||
mbedtls_hmac_drbg_free(&ctx);
|
||||
MD_PSA_DONE();
|
||||
}
|
||||
/* END_CASE */
|
||||
|
||||
|
@ -232,6 +244,8 @@ void hmac_drbg_nopr(int md_alg, data_t *entropy, data_t *custom,
|
|||
const mbedtls_md_info_t *md_info;
|
||||
mbedtls_hmac_drbg_context ctx;
|
||||
|
||||
MD_PSA_INIT();
|
||||
|
||||
mbedtls_hmac_drbg_init(&ctx);
|
||||
|
||||
p_entropy.p = entropy->x;
|
||||
|
@ -252,6 +266,7 @@ void hmac_drbg_nopr(int md_alg, data_t *entropy, data_t *custom,
|
|||
|
||||
exit:
|
||||
mbedtls_hmac_drbg_free(&ctx);
|
||||
MD_PSA_DONE();
|
||||
}
|
||||
/* END_CASE */
|
||||
|
||||
|
@ -264,6 +279,8 @@ void hmac_drbg_pr(int md_alg, data_t *entropy, data_t *custom,
|
|||
const mbedtls_md_info_t *md_info;
|
||||
mbedtls_hmac_drbg_context ctx;
|
||||
|
||||
MD_PSA_INIT();
|
||||
|
||||
mbedtls_hmac_drbg_init(&ctx);
|
||||
|
||||
p_entropy.p = entropy->x;
|
||||
|
@ -284,12 +301,18 @@ void hmac_drbg_pr(int md_alg, data_t *entropy, data_t *custom,
|
|||
|
||||
exit:
|
||||
mbedtls_hmac_drbg_free(&ctx);
|
||||
MD_PSA_DONE();
|
||||
}
|
||||
/* END_CASE */
|
||||
|
||||
/* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */
|
||||
void hmac_drbg_selftest()
|
||||
{
|
||||
MD_PSA_INIT();
|
||||
|
||||
TEST_ASSERT(mbedtls_hmac_drbg_self_test(1) == 0);
|
||||
|
||||
exit:
|
||||
MD_PSA_DONE();
|
||||
}
|
||||
/* END_CASE */
|
||||
|
|
|
@ -1,81 +1,81 @@
|
|||
HMAC_DRBG entropy usage SHA-1
|
||||
depends_on:MBEDTLS_SHA1_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA1
|
||||
hmac_drbg_entropy_usage:MBEDTLS_MD_SHA1
|
||||
|
||||
HMAC_DRBG entropy usage SHA-224
|
||||
depends_on:MBEDTLS_SHA224_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA224
|
||||
hmac_drbg_entropy_usage:MBEDTLS_MD_SHA224
|
||||
|
||||
HMAC_DRBG entropy usage SHA-256
|
||||
depends_on:MBEDTLS_SHA256_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA256
|
||||
hmac_drbg_entropy_usage:MBEDTLS_MD_SHA256
|
||||
|
||||
HMAC_DRBG entropy usage SHA-384
|
||||
depends_on:MBEDTLS_SHA384_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA384
|
||||
hmac_drbg_entropy_usage:MBEDTLS_MD_SHA384
|
||||
|
||||
HMAC_DRBG entropy usage SHA-512
|
||||
depends_on:MBEDTLS_SHA512_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA512
|
||||
hmac_drbg_entropy_usage:MBEDTLS_MD_SHA512
|
||||
|
||||
HMAC_DRBG write/update seed file SHA-1 [#1]
|
||||
depends_on:MBEDTLS_SHA1_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA1
|
||||
hmac_drbg_seed_file:MBEDTLS_MD_SHA1:"data_files/hmac_drbg_seed":0
|
||||
|
||||
HMAC_DRBG write/update seed file SHA-1 [#2]
|
||||
depends_on:MBEDTLS_SHA1_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA1
|
||||
hmac_drbg_seed_file:MBEDTLS_MD_SHA1:"no_such_dir/file":MBEDTLS_ERR_HMAC_DRBG_FILE_IO_ERROR
|
||||
|
||||
HMAC_DRBG write/update seed file SHA-224 [#1]
|
||||
depends_on:MBEDTLS_SHA224_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA224
|
||||
hmac_drbg_seed_file:MBEDTLS_MD_SHA224:"data_files/hmac_drbg_seed":0
|
||||
|
||||
HMAC_DRBG write/update seed file SHA-224 [#2]
|
||||
depends_on:MBEDTLS_SHA224_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA224
|
||||
hmac_drbg_seed_file:MBEDTLS_MD_SHA224:"no_such_dir/file":MBEDTLS_ERR_HMAC_DRBG_FILE_IO_ERROR
|
||||
|
||||
HMAC_DRBG write/update seed file SHA-256 [#1]
|
||||
depends_on:MBEDTLS_SHA256_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA256
|
||||
hmac_drbg_seed_file:MBEDTLS_MD_SHA256:"data_files/hmac_drbg_seed":0
|
||||
|
||||
HMAC_DRBG write/update seed file SHA-256 [#2]
|
||||
depends_on:MBEDTLS_SHA256_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA256
|
||||
hmac_drbg_seed_file:MBEDTLS_MD_SHA256:"no_such_dir/file":MBEDTLS_ERR_HMAC_DRBG_FILE_IO_ERROR
|
||||
|
||||
HMAC_DRBG write/update seed file SHA-384 [#1]
|
||||
depends_on:MBEDTLS_SHA384_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA384
|
||||
hmac_drbg_seed_file:MBEDTLS_MD_SHA384:"data_files/hmac_drbg_seed":0
|
||||
|
||||
HMAC_DRBG write/update seed file SHA-384 [#2]
|
||||
depends_on:MBEDTLS_SHA384_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA384
|
||||
hmac_drbg_seed_file:MBEDTLS_MD_SHA384:"no_such_dir/file":MBEDTLS_ERR_HMAC_DRBG_FILE_IO_ERROR
|
||||
|
||||
HMAC_DRBG write/update seed file SHA-512 [#1]
|
||||
depends_on:MBEDTLS_SHA512_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA512
|
||||
hmac_drbg_seed_file:MBEDTLS_MD_SHA512:"data_files/hmac_drbg_seed":0
|
||||
|
||||
HMAC_DRBG write/update seed file SHA-512 [#2]
|
||||
depends_on:MBEDTLS_SHA512_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA512
|
||||
hmac_drbg_seed_file:MBEDTLS_MD_SHA512:"no_such_dir/file":MBEDTLS_ERR_HMAC_DRBG_FILE_IO_ERROR
|
||||
|
||||
HMAC_DRBG from buffer SHA-1
|
||||
depends_on:MBEDTLS_SHA1_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA1
|
||||
hmac_drbg_buf:MBEDTLS_MD_SHA1
|
||||
|
||||
HMAC_DRBG from buffer SHA-224
|
||||
depends_on:MBEDTLS_SHA224_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA224
|
||||
hmac_drbg_buf:MBEDTLS_MD_SHA224
|
||||
|
||||
HMAC_DRBG from buffer SHA-256
|
||||
depends_on:MBEDTLS_SHA256_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA256
|
||||
hmac_drbg_buf:MBEDTLS_MD_SHA256
|
||||
|
||||
HMAC_DRBG from buffer SHA-384
|
||||
depends_on:MBEDTLS_SHA384_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA384
|
||||
hmac_drbg_buf:MBEDTLS_MD_SHA384
|
||||
|
||||
HMAC_DRBG from buffer SHA-512
|
||||
depends_on:MBEDTLS_SHA512_C
|
||||
depends_on:MBEDTLS_MD_CAN_SHA512
|
||||
hmac_drbg_buf:MBEDTLS_MD_SHA512
|
||||
|
||||
HMAC_DRBG self test
|
||||
|
|
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
|
@ -4141,7 +4141,7 @@ depends_on:PSA_WANT_ALG_DETERMINISTIC_ECDSA:PSA_WANT_ALG_SHA_256:PSA_WANT_KEY_TY
|
|||
sign_hash_deterministic:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):"ab45435712649cb30bbddac49197eebf2740ffc7f874d9244c3460f54f322d3a":PSA_ALG_DETERMINISTIC_ECDSA( PSA_ALG_SHA_256 ):"9ac4335b469bbd791439248504dd0d49c71349a295fee5a1c68507f45a9e1c7b":"6a3399f69421ffe1490377adf2ea1f117d81a63cf5bf22e918d51175eb259151ce95d7c26cc04e25503e2f7a1ec3573e3c2412534bb4a19b3a7811742f49f50f"
|
||||
|
||||
PSA sign hash: deterministic ECDSA SECP256R1 SHA-384
|
||||
depends_on:PSA_WANT_ALG_DETERMINISTIC_ECDSA:PSA_WANT_ALG_SHA_384:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR:PSA_WANT_ECC_SECP_R1_256:MBEDTLS_PSA_BUILTIN_ALG_SHA_384
|
||||
depends_on:PSA_WANT_ALG_DETERMINISTIC_ECDSA:PSA_WANT_ALG_SHA_384:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR:PSA_WANT_ECC_SECP_R1_256
|
||||
sign_hash_deterministic:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):"49c9a8c18c4b885638c431cf1df1c994131609b580d4fd43a0cab17db2f13eee":PSA_ALG_DETERMINISTIC_ECDSA( PSA_ALG_SHA_384 ):"59e1748777448c69de6b800d7a33bbfb9ff1b463e44354c3553bcdb9c666fa90125a3c79f90397bdf5f6a13de828684f":"cd40ba1b555ca5994d30ddffc4ad734b1f5c604675b0f249814aa5de3992ef3ddf4d5dc5d2aab1979ce210b560754df671363d99795475882894c048e3b986ca"
|
||||
|
||||
PSA sign hash: deterministic ECDSA SECP384R1 SHA-256
|
||||
|
@ -4157,11 +4157,11 @@ depends_on:PSA_WANT_ALG_DETERMINISTIC_ECDSA:PSA_WANT_ALG_SHA_256:PSA_WANT_KEY_TY
|
|||
sign_hash_interruptible:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):"ab45435712649cb30bbddac49197eebf2740ffc7f874d9244c3460f54f322d3a":PSA_ALG_DETERMINISTIC_ECDSA(PSA_ALG_SHA_256):"9ac4335b469bbd791439248504dd0d49c71349a295fee5a1c68507f45a9e1c7b":"6a3399f69421ffe1490377adf2ea1f117d81a63cf5bf22e918d51175eb259151ce95d7c26cc04e25503e2f7a1ec3573e3c2412534bb4a19b3a7811742f49f50f":0
|
||||
|
||||
PSA sign hash int (ops=inf) det ECDSA SECP256R1 SHA-384
|
||||
depends_on:PSA_WANT_ALG_DETERMINISTIC_ECDSA:PSA_WANT_ALG_SHA_384:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR:PSA_WANT_ECC_SECP_R1_256:MBEDTLS_PSA_BUILTIN_ALG_SHA_384
|
||||
depends_on:PSA_WANT_ALG_DETERMINISTIC_ECDSA:PSA_WANT_ALG_SHA_384:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR:PSA_WANT_ECC_SECP_R1_256
|
||||
sign_hash_interruptible:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):"49c9a8c18c4b885638c431cf1df1c994131609b580d4fd43a0cab17db2f13eee":PSA_ALG_DETERMINISTIC_ECDSA(PSA_ALG_SHA_384):"59e1748777448c69de6b800d7a33bbfb9ff1b463e44354c3553bcdb9c666fa90125a3c79f90397bdf5f6a13de828684f":"cd40ba1b555ca5994d30ddffc4ad734b1f5c604675b0f249814aa5de3992ef3ddf4d5dc5d2aab1979ce210b560754df671363d99795475882894c048e3b986ca":PSA_INTERRUPTIBLE_MAX_OPS_UNLIMITED
|
||||
|
||||
PSA sign hash int (ops=min): det ECDSA SECP256R1 SHA-384
|
||||
depends_on:PSA_WANT_ALG_DETERMINISTIC_ECDSA:PSA_WANT_ALG_SHA_384:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR:PSA_WANT_ECC_SECP_R1_256:MBEDTLS_PSA_BUILTIN_ALG_SHA_384
|
||||
depends_on:PSA_WANT_ALG_DETERMINISTIC_ECDSA:PSA_WANT_ALG_SHA_384:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR:PSA_WANT_ECC_SECP_R1_256
|
||||
sign_hash_interruptible:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):"49c9a8c18c4b885638c431cf1df1c994131609b580d4fd43a0cab17db2f13eee":PSA_ALG_DETERMINISTIC_ECDSA(PSA_ALG_SHA_384):"59e1748777448c69de6b800d7a33bbfb9ff1b463e44354c3553bcdb9c666fa90125a3c79f90397bdf5f6a13de828684f":"cd40ba1b555ca5994d30ddffc4ad734b1f5c604675b0f249814aa5de3992ef3ddf4d5dc5d2aab1979ce210b560754df671363d99795475882894c048e3b986ca":0
|
||||
|
||||
PSA sign hash int (ops=inf): det ECDSA SECP384R1 SHA-256
|
||||
|
@ -4601,7 +4601,7 @@ depends_on:PSA_WANT_ALG_DETERMINISTIC_ECDSA:PSA_WANT_ALG_SHA_256:PSA_WANT_KEY_TY
|
|||
sign_message_deterministic:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):"ab45435712649cb30bbddac49197eebf2740ffc7f874d9244c3460f54f322d3a":PSA_ALG_DETERMINISTIC_ECDSA(PSA_ALG_SHA_256):"616263":"36e5b5a7da1c9c265dc447de3a5a704fcb8c03f7a3749dde48d84c9bf736fc1ed48d8b3660e7d3cbc6b1870730b7ce2a043f69e37ccb340b98d1e65184e03548"
|
||||
|
||||
PSA sign message: deterministic ECDSA SECP256R1 SHA-384
|
||||
depends_on:PSA_WANT_ALG_DETERMINISTIC_ECDSA:PSA_WANT_ALG_SHA_384:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR:PSA_WANT_ECC_SECP_R1_256:MBEDTLS_PSA_BUILTIN_ALG_SHA_384
|
||||
depends_on:PSA_WANT_ALG_DETERMINISTIC_ECDSA:PSA_WANT_ALG_SHA_384:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR:PSA_WANT_ECC_SECP_R1_256
|
||||
sign_message_deterministic:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):"49c9a8c18c4b885638c431cf1df1c994131609b580d4fd43a0cab17db2f13eee":PSA_ALG_DETERMINISTIC_ECDSA(PSA_ALG_SHA_384):"616263":"7ea712a20e3a8cbe0c6e64195362ba7635bbe78af51ddedd7a5fd858395250c592654c35d3b0614ae0e3b329c25cf5b4a5fcb243af3e3ad15c8446fe401be066"
|
||||
|
||||
PSA sign message: deterministic ECDSA SECP384R1 SHA-256
|
||||
|
@ -4721,7 +4721,7 @@ depends_on:PSA_WANT_ALG_ECDSA:PSA_WANT_ALG_SHA_384:PSA_WANT_KEY_TYPE_ECC_KEY_PAI
|
|||
sign_verify_message:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):"ab45435712649cb30bbddac49197eebf2740ffc7f874d9244c3460f54f322d3a":PSA_ALG_ECDSA(PSA_ALG_SHA_384):"616263"
|
||||
|
||||
PSA sign/verify message: deterministic ECDSA SECP256R1 SHA-384
|
||||
depends_on:PSA_WANT_ALG_DETERMINISTIC_ECDSA:PSA_WANT_ALG_SHA_384:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR:PSA_WANT_ECC_SECP_R1_256:MBEDTLS_PSA_BUILTIN_ALG_SHA_384
|
||||
depends_on:PSA_WANT_ALG_DETERMINISTIC_ECDSA:PSA_WANT_ALG_SHA_384:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR:PSA_WANT_ECC_SECP_R1_256
|
||||
sign_verify_message:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):"ab45435712649cb30bbddac49197eebf2740ffc7f874d9244c3460f54f322d3a":PSA_ALG_DETERMINISTIC_ECDSA(PSA_ALG_SHA_384):"616263"
|
||||
|
||||
PSA sign/verify message: randomized ECDSA SECP384R1 SHA-256
|
||||
|
|
Loading…
Reference in a new issue