mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2025-02-02 20:31:11 +00:00
Enrollment algorithm in policy: test persistent keys
This commit is contained in:
parent
cbce4d8889
commit
6fbfdb9e06
|
@ -8,21 +8,29 @@ Transient slot, check after restart
|
||||||
transient_slot_lifecycle:0:0:PSA_KEY_TYPE_RAW_DATA:"0123456789abcdef0123456789abcdef":CLOSE_BY_SHUTDOWN
|
transient_slot_lifecycle:0:0:PSA_KEY_TYPE_RAW_DATA:"0123456789abcdef0123456789abcdef":CLOSE_BY_SHUTDOWN
|
||||||
|
|
||||||
Persistent slot, check after closing
|
Persistent slot, check after closing
|
||||||
persistent_slot_lifecycle:PSA_KEY_LIFETIME_PERSISTENT:1:0:0:PSA_KEY_TYPE_RAW_DATA:"0123456789abcdef0123456789abcdef":CLOSE_BY_CLOSE
|
persistent_slot_lifecycle:PSA_KEY_LIFETIME_PERSISTENT:1:0:0:0:PSA_KEY_TYPE_RAW_DATA:"0123456789abcdef0123456789abcdef":CLOSE_BY_CLOSE
|
||||||
|
|
||||||
Persistent slot, check after destroying
|
Persistent slot, check after destroying
|
||||||
persistent_slot_lifecycle:PSA_KEY_LIFETIME_PERSISTENT:1:0:0:PSA_KEY_TYPE_RAW_DATA:"0123456789abcdef0123456789abcdef":CLOSE_BY_DESTROY
|
persistent_slot_lifecycle:PSA_KEY_LIFETIME_PERSISTENT:1:0:0:0:PSA_KEY_TYPE_RAW_DATA:"0123456789abcdef0123456789abcdef":CLOSE_BY_DESTROY
|
||||||
|
|
||||||
Persistent slot, check after restart
|
Persistent slot, check after restart
|
||||||
persistent_slot_lifecycle:PSA_KEY_LIFETIME_PERSISTENT:1:0:0:PSA_KEY_TYPE_RAW_DATA:"0123456789abcdef0123456789abcdef":CLOSE_BY_SHUTDOWN
|
persistent_slot_lifecycle:PSA_KEY_LIFETIME_PERSISTENT:1:0:0:0:PSA_KEY_TYPE_RAW_DATA:"0123456789abcdef0123456789abcdef":CLOSE_BY_SHUTDOWN
|
||||||
|
|
||||||
Persistent slot: ECP keypair (ECDSA, exportable); close
|
Persistent slot: ECP keypair (ECDSA, exportable); close
|
||||||
depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
||||||
persistent_slot_lifecycle:PSA_KEY_LIFETIME_PERSISTENT:1:PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_SIGN | PSA_KEY_USAGE_VERIFY:PSA_ALG_ECDSA_ANY:PSA_KEY_TYPE_ECC_KEYPAIR(PSA_ECC_CURVE_SECP256R1):"49c9a8c18c4b885638c431cf1df1c994131609b580d4fd43a0cab17db2f13eee":CLOSE_BY_CLOSE
|
persistent_slot_lifecycle:PSA_KEY_LIFETIME_PERSISTENT:1:PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_SIGN | PSA_KEY_USAGE_VERIFY:PSA_ALG_ECDSA_ANY:0:PSA_KEY_TYPE_ECC_KEYPAIR(PSA_ECC_CURVE_SECP256R1):"49c9a8c18c4b885638c431cf1df1c994131609b580d4fd43a0cab17db2f13eee":CLOSE_BY_CLOSE
|
||||||
|
|
||||||
Persistent slot: ECP keypair (ECDSA, exportable); restart
|
Persistent slot: ECP keypair (ECDSA, exportable); restart
|
||||||
depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
depends_on:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
||||||
persistent_slot_lifecycle:PSA_KEY_LIFETIME_PERSISTENT:1:PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_SIGN | PSA_KEY_USAGE_VERIFY:PSA_ALG_ECDSA_ANY:PSA_KEY_TYPE_ECC_KEYPAIR(PSA_ECC_CURVE_SECP256R1):"49c9a8c18c4b885638c431cf1df1c994131609b580d4fd43a0cab17db2f13eee":CLOSE_BY_SHUTDOWN
|
persistent_slot_lifecycle:PSA_KEY_LIFETIME_PERSISTENT:1:PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_SIGN | PSA_KEY_USAGE_VERIFY:PSA_ALG_ECDSA_ANY:0:PSA_KEY_TYPE_ECC_KEYPAIR(PSA_ECC_CURVE_SECP256R1):"49c9a8c18c4b885638c431cf1df1c994131609b580d4fd43a0cab17db2f13eee":CLOSE_BY_SHUTDOWN
|
||||||
|
|
||||||
|
Persistent slot: ECP keypair (ECDH+ECDSA, exportable); close
|
||||||
|
depends_on:MBEDTLS_ECDH_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
||||||
|
persistent_slot_lifecycle:PSA_KEY_LIFETIME_PERSISTENT:1:PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_SIGN | PSA_KEY_USAGE_VERIFY:PSA_ALG_ECDH(PSA_ALG_HKDF(PSA_ALG_SHA_256)):PSA_ALG_ECDSA_ANY:PSA_KEY_TYPE_ECC_KEYPAIR(PSA_ECC_CURVE_SECP256R1):"49c9a8c18c4b885638c431cf1df1c994131609b580d4fd43a0cab17db2f13eee":CLOSE_BY_CLOSE
|
||||||
|
|
||||||
|
Persistent slot: ECP keypair (ECDH+ECDSA, exportable); restart
|
||||||
|
depends_on:MBEDTLS_ECDH_C:MBEDTLS_SHA256_C:MBEDTLS_ECDSA_C:MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
||||||
|
persistent_slot_lifecycle:PSA_KEY_LIFETIME_PERSISTENT:1:PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_SIGN | PSA_KEY_USAGE_VERIFY:PSA_ALG_ECDH(PSA_ALG_HKDF(PSA_ALG_SHA_256)):PSA_ALG_ECDSA_ANY:PSA_KEY_TYPE_ECC_KEYPAIR(PSA_ECC_CURVE_SECP256R1):"49c9a8c18c4b885638c431cf1df1c994131609b580d4fd43a0cab17db2f13eee":CLOSE_BY_SHUTDOWN
|
||||||
|
|
||||||
Attempt to overwrite: close before
|
Attempt to overwrite: close before
|
||||||
create_existent:PSA_KEY_LIFETIME_PERSISTENT:1:CLOSE_BEFORE
|
create_existent:PSA_KEY_LIFETIME_PERSISTENT:1:CLOSE_BEFORE
|
||||||
|
|
|
@ -114,13 +114,14 @@ exit:
|
||||||
|
|
||||||
/* BEGIN_CASE depends_on:MBEDTLS_PSA_CRYPTO_STORAGE_C */
|
/* BEGIN_CASE depends_on:MBEDTLS_PSA_CRYPTO_STORAGE_C */
|
||||||
void persistent_slot_lifecycle( int lifetime_arg, int id_arg,
|
void persistent_slot_lifecycle( int lifetime_arg, int id_arg,
|
||||||
int usage_arg, int alg_arg,
|
int usage_arg, int alg_arg, int alg2_arg,
|
||||||
int type_arg, data_t *key_data,
|
int type_arg, data_t *key_data,
|
||||||
int close_method_arg )
|
int close_method_arg )
|
||||||
{
|
{
|
||||||
psa_key_lifetime_t lifetime = lifetime_arg;
|
psa_key_lifetime_t lifetime = lifetime_arg;
|
||||||
psa_key_id_t id = id_arg;
|
psa_key_id_t id = id_arg;
|
||||||
psa_algorithm_t alg = alg_arg;
|
psa_algorithm_t alg = alg_arg;
|
||||||
|
psa_algorithm_t alg2 = alg2_arg;
|
||||||
psa_key_usage_t usage_flags = usage_arg;
|
psa_key_usage_t usage_flags = usage_arg;
|
||||||
psa_key_type_t type = type_arg;
|
psa_key_type_t type = type_arg;
|
||||||
size_t bits;
|
size_t bits;
|
||||||
|
@ -141,6 +142,7 @@ void persistent_slot_lifecycle( int lifetime_arg, int id_arg,
|
||||||
PSA_ASSERT( psa_create_key( lifetime, id, &handle ) );
|
PSA_ASSERT( psa_create_key( lifetime, id, &handle ) );
|
||||||
TEST_ASSERT( handle != 0 );
|
TEST_ASSERT( handle != 0 );
|
||||||
psa_key_policy_set_usage( &policy, usage_flags, alg );
|
psa_key_policy_set_usage( &policy, usage_flags, alg );
|
||||||
|
psa_key_policy_set_enrollment_algorithm( &policy, alg2 );
|
||||||
PSA_ASSERT( psa_set_key_policy( handle, &policy ) );
|
PSA_ASSERT( psa_set_key_policy( handle, &policy ) );
|
||||||
PSA_ASSERT( psa_import_key( handle, type, key_data->x, key_data->len ) );
|
PSA_ASSERT( psa_import_key( handle, type, key_data->x, key_data->len ) );
|
||||||
PSA_ASSERT( psa_get_key_information( handle, &read_type, &bits ) );
|
PSA_ASSERT( psa_get_key_information( handle, &read_type, &bits ) );
|
||||||
|
@ -186,6 +188,8 @@ void persistent_slot_lifecycle( int lifetime_arg, int id_arg,
|
||||||
TEST_EQUAL( read_bits, bits );
|
TEST_EQUAL( read_bits, bits );
|
||||||
TEST_EQUAL( psa_key_policy_get_usage( &read_policy ), usage_flags );
|
TEST_EQUAL( psa_key_policy_get_usage( &read_policy ), usage_flags );
|
||||||
TEST_EQUAL( psa_key_policy_get_algorithm( &read_policy ), alg );
|
TEST_EQUAL( psa_key_policy_get_algorithm( &read_policy ), alg );
|
||||||
|
TEST_EQUAL( psa_key_policy_get_enrollment_algorithm( &read_policy ),
|
||||||
|
alg2 );
|
||||||
if( policy.usage & PSA_KEY_USAGE_EXPORT )
|
if( policy.usage & PSA_KEY_USAGE_EXPORT )
|
||||||
{
|
{
|
||||||
ASSERT_ALLOC( reexported, key_data->len );
|
ASSERT_ALLOC( reexported, key_data->len );
|
||||||
|
|
Loading…
Reference in a new issue