analyze_outcomes: update cipher/aead data
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
This commit is contained in:
parent
bbc46b4cc2
commit
507e08f9af
1 changed files with 17 additions and 38 deletions
|
@ -219,42 +219,18 @@ KNOWN_TASKS = {
|
||||||
'args': {
|
'args': {
|
||||||
'component_ref': 'test_psa_crypto_config_reference_cipher_aead',
|
'component_ref': 'test_psa_crypto_config_reference_cipher_aead',
|
||||||
'component_driver': 'test_psa_crypto_config_accel_cipher_aead',
|
'component_driver': 'test_psa_crypto_config_accel_cipher_aead',
|
||||||
# Ignore suites that are being accelerated
|
# Modules replaced by drivers.
|
||||||
'ignored_suites': [
|
'ignored_suites': [
|
||||||
'aes.cbc',
|
# low-level (block/stream) cipher modules
|
||||||
'aes.cfb',
|
'aes', 'aria', 'camellia', 'des', 'chacha20',
|
||||||
'aes.ecb',
|
# AEAD modes
|
||||||
'aes.ofb',
|
'ccm', 'chachapoly', 'cmac', 'gcm',
|
||||||
'aes.rest',
|
# The Cipher abstraction layer
|
||||||
'aes.xts',
|
'cipher',
|
||||||
'aria',
|
|
||||||
'camellia',
|
|
||||||
'ccm',
|
|
||||||
'chacha20',
|
|
||||||
'chachapoly',
|
|
||||||
'cipher.aes',
|
|
||||||
'cipher.aria',
|
|
||||||
'cipher.camellia',
|
|
||||||
'cipher.ccm',
|
|
||||||
'cipher.chacha20',
|
|
||||||
'cipher.chachapoly',
|
|
||||||
'cipher.des',
|
|
||||||
'cipher.gcm',
|
|
||||||
'cipher.nist_kw',
|
|
||||||
'cipher.padding',
|
|
||||||
'des',
|
|
||||||
'gcm.aes128_de',
|
|
||||||
'gcm.aes128_en',
|
|
||||||
'gcm.aes192_de',
|
|
||||||
'gcm.aes192_en',
|
|
||||||
'gcm.aes256_de',
|
|
||||||
'gcm.aes256_en',
|
|
||||||
'gcm.camellia',
|
|
||||||
'gcm.misc',
|
|
||||||
'cmac',
|
|
||||||
],
|
],
|
||||||
'ignored_tests': {
|
'ignored_tests': {
|
||||||
# Following tests depends on AES_C/DES_C
|
# PEM decryption is not supported so far.
|
||||||
|
# The rest of PEM (write, unencrypted read) works though.
|
||||||
'test_suite_pem': [
|
'test_suite_pem': [
|
||||||
'PEM read (AES-128-CBC + invalid iv)'
|
'PEM read (AES-128-CBC + invalid iv)'
|
||||||
'PEM read (DES-CBC + invalid iv)',
|
'PEM read (DES-CBC + invalid iv)',
|
||||||
|
@ -266,16 +242,18 @@ KNOWN_TASKS = {
|
||||||
'PEM read (AES-128-CBC + invalid iv)',
|
'PEM read (AES-128-CBC + invalid iv)',
|
||||||
'PEM read (DES-CBC + invalid iv)',
|
'PEM read (DES-CBC + invalid iv)',
|
||||||
],
|
],
|
||||||
# Following tests depends on AES_C/DES_C
|
# Following tests depend on AES_C/DES_C but are not about
|
||||||
|
# them really, just need to know some error code is there.
|
||||||
'test_suite_error': [
|
'test_suite_error': [
|
||||||
'Low and high error',
|
'Low and high error',
|
||||||
'Single low error'
|
'Single low error'
|
||||||
],
|
],
|
||||||
# Following test depends on AES_C
|
# Similar to test_suite_error above.
|
||||||
'test_suite_version': [
|
'test_suite_version': [
|
||||||
'Check for MBEDTLS_AES_C when already present',
|
'Check for MBEDTLS_AES_C when already present',
|
||||||
],
|
],
|
||||||
# Following tests depends on PCKS7
|
# The en/decryption part of PKCS#12 is not supported so far.
|
||||||
|
# The rest of PKCS#12 (key derivation) works though.
|
||||||
'test_suite_pkcs12': [
|
'test_suite_pkcs12': [
|
||||||
'PBE Decrypt, (Invalid padding & PKCS7 padding enabled)',
|
'PBE Decrypt, (Invalid padding & PKCS7 padding enabled)',
|
||||||
'PBE Decrypt, pad = 7 (OK)',
|
'PBE Decrypt, pad = 7 (OK)',
|
||||||
|
@ -285,7 +263,8 @@ KNOWN_TASKS = {
|
||||||
'PBE Encrypt, pad = 8 (Invalid output size)',
|
'PBE Encrypt, pad = 8 (Invalid output size)',
|
||||||
'PBE Encrypt, pad = 8 (OK)',
|
'PBE Encrypt, pad = 8 (OK)',
|
||||||
],
|
],
|
||||||
# Following tests depends on PCKS7
|
# The en/decryption part of PKCS#5 is not supported so far.
|
||||||
|
# The rest of PKCS#5 (PBKDF2) works though.
|
||||||
'test_suite_pkcs5': [
|
'test_suite_pkcs5': [
|
||||||
'PBES2 Decrypt (Invalid output size)',
|
'PBES2 Decrypt (Invalid output size)',
|
||||||
'PBES2 Decrypt (Invalid padding & PKCS7 padding enabled)',
|
'PBES2 Decrypt (Invalid padding & PKCS7 padding enabled)',
|
||||||
|
@ -319,7 +298,7 @@ KNOWN_TASKS = {
|
||||||
'PBES2 Encrypt, pad=8 (Invalid output size)',
|
'PBES2 Encrypt, pad=8 (Invalid output size)',
|
||||||
'PBES2 Encrypt, pad=8 (OK)',
|
'PBES2 Encrypt, pad=8 (OK)',
|
||||||
],
|
],
|
||||||
# Following tests depends on DES
|
# Encrypted keys are not supported so far.
|
||||||
# pylint: disable=line-too-long
|
# pylint: disable=line-too-long
|
||||||
'test_suite_pkparse': [
|
'test_suite_pkparse': [
|
||||||
'Key ASN1 (Encrypted key PKCS12, trailing garbage data)',
|
'Key ASN1 (Encrypted key PKCS12, trailing garbage data)',
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue