analyze_outcomes: update cipher/aead data

Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
This commit is contained in:
Valerio Setti 2023-10-26 09:44:06 +02:00
parent bbc46b4cc2
commit 507e08f9af

View file

@ -219,42 +219,18 @@ KNOWN_TASKS = {
'args': { 'args': {
'component_ref': 'test_psa_crypto_config_reference_cipher_aead', 'component_ref': 'test_psa_crypto_config_reference_cipher_aead',
'component_driver': 'test_psa_crypto_config_accel_cipher_aead', 'component_driver': 'test_psa_crypto_config_accel_cipher_aead',
# Ignore suites that are being accelerated # Modules replaced by drivers.
'ignored_suites': [ 'ignored_suites': [
'aes.cbc', # low-level (block/stream) cipher modules
'aes.cfb', 'aes', 'aria', 'camellia', 'des', 'chacha20',
'aes.ecb', # AEAD modes
'aes.ofb', 'ccm', 'chachapoly', 'cmac', 'gcm',
'aes.rest', # The Cipher abstraction layer
'aes.xts', 'cipher',
'aria',
'camellia',
'ccm',
'chacha20',
'chachapoly',
'cipher.aes',
'cipher.aria',
'cipher.camellia',
'cipher.ccm',
'cipher.chacha20',
'cipher.chachapoly',
'cipher.des',
'cipher.gcm',
'cipher.nist_kw',
'cipher.padding',
'des',
'gcm.aes128_de',
'gcm.aes128_en',
'gcm.aes192_de',
'gcm.aes192_en',
'gcm.aes256_de',
'gcm.aes256_en',
'gcm.camellia',
'gcm.misc',
'cmac',
], ],
'ignored_tests': { 'ignored_tests': {
# Following tests depends on AES_C/DES_C # PEM decryption is not supported so far.
# The rest of PEM (write, unencrypted read) works though.
'test_suite_pem': [ 'test_suite_pem': [
'PEM read (AES-128-CBC + invalid iv)' 'PEM read (AES-128-CBC + invalid iv)'
'PEM read (DES-CBC + invalid iv)', 'PEM read (DES-CBC + invalid iv)',
@ -266,16 +242,18 @@ KNOWN_TASKS = {
'PEM read (AES-128-CBC + invalid iv)', 'PEM read (AES-128-CBC + invalid iv)',
'PEM read (DES-CBC + invalid iv)', 'PEM read (DES-CBC + invalid iv)',
], ],
# Following tests depends on AES_C/DES_C # Following tests depend on AES_C/DES_C but are not about
# them really, just need to know some error code is there.
'test_suite_error': [ 'test_suite_error': [
'Low and high error', 'Low and high error',
'Single low error' 'Single low error'
], ],
# Following test depends on AES_C # Similar to test_suite_error above.
'test_suite_version': [ 'test_suite_version': [
'Check for MBEDTLS_AES_C when already present', 'Check for MBEDTLS_AES_C when already present',
], ],
# Following tests depends on PCKS7 # The en/decryption part of PKCS#12 is not supported so far.
# The rest of PKCS#12 (key derivation) works though.
'test_suite_pkcs12': [ 'test_suite_pkcs12': [
'PBE Decrypt, (Invalid padding & PKCS7 padding enabled)', 'PBE Decrypt, (Invalid padding & PKCS7 padding enabled)',
'PBE Decrypt, pad = 7 (OK)', 'PBE Decrypt, pad = 7 (OK)',
@ -285,7 +263,8 @@ KNOWN_TASKS = {
'PBE Encrypt, pad = 8 (Invalid output size)', 'PBE Encrypt, pad = 8 (Invalid output size)',
'PBE Encrypt, pad = 8 (OK)', 'PBE Encrypt, pad = 8 (OK)',
], ],
# Following tests depends on PCKS7 # The en/decryption part of PKCS#5 is not supported so far.
# The rest of PKCS#5 (PBKDF2) works though.
'test_suite_pkcs5': [ 'test_suite_pkcs5': [
'PBES2 Decrypt (Invalid output size)', 'PBES2 Decrypt (Invalid output size)',
'PBES2 Decrypt (Invalid padding & PKCS7 padding enabled)', 'PBES2 Decrypt (Invalid padding & PKCS7 padding enabled)',
@ -319,7 +298,7 @@ KNOWN_TASKS = {
'PBES2 Encrypt, pad=8 (Invalid output size)', 'PBES2 Encrypt, pad=8 (Invalid output size)',
'PBES2 Encrypt, pad=8 (OK)', 'PBES2 Encrypt, pad=8 (OK)',
], ],
# Following tests depends on DES # Encrypted keys are not supported so far.
# pylint: disable=line-too-long # pylint: disable=line-too-long
'test_suite_pkparse': [ 'test_suite_pkparse': [
'Key ASN1 (Encrypted key PKCS12, trailing garbage data)', 'Key ASN1 (Encrypted key PKCS12, trailing garbage data)',