Fix issues pointed by CI
Signed-off-by: Przemyslaw Stekiel <przemyslaw.stekiel@mobica.com>
This commit is contained in:
parent
437da19f4f
commit
ba20fc98b8
2 changed files with 8 additions and 3 deletions
|
@ -96,7 +96,7 @@ def hack_dependencies_not_implemented(dependencies: List[str]) -> None:
|
||||||
if _implemented_dependencies is None:
|
if _implemented_dependencies is None:
|
||||||
_implemented_dependencies = \
|
_implemented_dependencies = \
|
||||||
read_implemented_dependencies('include/psa/crypto_config.h')
|
read_implemented_dependencies('include/psa/crypto_config.h')
|
||||||
if not all(dep.lstrip('!') in _implemented_dependencies
|
if not all((dep.lstrip('!') in _implemented_dependencies or 'PSA_WANT' not in dep)
|
||||||
for dep in dependencies):
|
for dep in dependencies):
|
||||||
dependencies.append('DEPENDENCY_NOT_IMPLEMENTED_YET')
|
dependencies.append('DEPENDENCY_NOT_IMPLEMENTED_YET')
|
||||||
|
|
||||||
|
@ -260,8 +260,11 @@ class KeyGenerate:
|
||||||
ECC_KEY_TYPES = ('PSA_KEY_TYPE_ECC_KEY_PAIR',
|
ECC_KEY_TYPES = ('PSA_KEY_TYPE_ECC_KEY_PAIR',
|
||||||
'PSA_KEY_TYPE_ECC_PUBLIC_KEY')
|
'PSA_KEY_TYPE_ECC_PUBLIC_KEY')
|
||||||
|
|
||||||
@staticmethod
|
RSA_KEY_TYPES = ('PSA_KEY_TYPE_RSA_KEY_PAIR',
|
||||||
|
'PSA_KEY_TYPE_RSA_PUBLIC_KEY')
|
||||||
|
|
||||||
def test_cases_for_key_type_key_generation(
|
def test_cases_for_key_type_key_generation(
|
||||||
|
self,
|
||||||
kt: crypto_knowledge.KeyType
|
kt: crypto_knowledge.KeyType
|
||||||
) -> Iterator[test_case.TestCase]:
|
) -> Iterator[test_case.TestCase]:
|
||||||
"""Return test cases exercising key generation.
|
"""Return test cases exercising key generation.
|
||||||
|
@ -280,6 +283,8 @@ class KeyGenerate:
|
||||||
result = 'PSA_ERROR_INVALID_ARGUMENT'
|
result = 'PSA_ERROR_INVALID_ARGUMENT'
|
||||||
else:
|
else:
|
||||||
generate_dependencies = import_dependencies
|
generate_dependencies = import_dependencies
|
||||||
|
if kt.name in self.RSA_KEY_TYPES:
|
||||||
|
generate_dependencies.append("MBEDTLS_GENPRIME")
|
||||||
for bits in kt.sizes_to_test():
|
for bits in kt.sizes_to_test():
|
||||||
yield test_case_for_key_generation(
|
yield test_case_for_key_generation(
|
||||||
kt.expression, bits,
|
kt.expression, bits,
|
||||||
|
|
|
@ -38,7 +38,7 @@ void generate_key( int key_type, int bits, int result)
|
||||||
// Verify attributes of the created key on success
|
// Verify attributes of the created key on success
|
||||||
if (_result == PSA_SUCCESS)
|
if (_result == PSA_SUCCESS)
|
||||||
{
|
{
|
||||||
psa_key_attributes_t key_attributes = {0};
|
psa_key_attributes_t key_attributes = PSA_KEY_ATTRIBUTES_INIT;
|
||||||
PSA_ASSERT( psa_get_key_attributes( key_id, &key_attributes ) );
|
PSA_ASSERT( psa_get_key_attributes( key_id, &key_attributes ) );
|
||||||
TEST_EQUAL( psa_get_key_lifetime( &key_attributes ), 0 );
|
TEST_EQUAL( psa_get_key_lifetime( &key_attributes ), 0 );
|
||||||
TEST_EQUAL( psa_get_key_usage_flags( &key_attributes ), 0 );
|
TEST_EQUAL( psa_get_key_usage_flags( &key_attributes ), 0 );
|
||||||
|
|
Loading…
Reference in a new issue