Max Fillinger
d6e0095478
Exporter tests: Don't use unavailbable constant
...
Signed-off-by: Max Fillinger <maximilian.fillinger@foxcrypto.com >
2025-03-28 17:08:12 +01:00
Max Fillinger
8e0b8c9d9f
Exporter tests: Add missing depends-ons
...
Signed-off-by: Max Fillinger <maximilian.fillinger@foxcrypto.com >
2025-03-28 17:08:10 +01:00
Max Fillinger
c6fd1a24d2
Use one maximum key_len for all exported keys
...
Signed-off-by: Max Fillinger <maximilian.fillinger@foxcrypto.com >
2025-03-28 17:06:48 +01:00
Max Fillinger
a9a9e99a6b
Exporter tests: Reduce key size in long key tests
...
Signed-off-by: Max Fillinger <maximilian.fillinger@foxcrypto.com >
2025-03-28 17:06:48 +01:00
Max Fillinger
9dc7b19a6a
Exporter tests: Free endpoints before PSA_DONE()
...
Signed-off-by: Max Fillinger <maximilian.fillinger@foxcrypto.com >
2025-03-28 17:06:48 +01:00
Max Fillinger
364afea9d3
Exporter tests: Fix possible uninitialized variable use
...
Signed-off-by: Max Fillinger <max@max-fillinger.net >
2025-03-28 17:06:48 +01:00
Max Fillinger
ea1e777c01
Coding style cleanup
...
Signed-off-by: Max Fillinger <max@max-fillinger.net >
2025-03-28 17:06:48 +01:00
Max Fillinger
8a2d2adf8c
Exporter tests: Initialize allocated memory
...
Signed-off-by: Max Fillinger <max@max-fillinger.net >
2025-03-28 17:06:48 +01:00
Max Fillinger
8f12e31223
Exportert tests: Free endpoints and options
...
Signed-off-by: Max Fillinger <max@max-fillinger.net >
2025-03-28 17:06:48 +01:00
Max Fillinger
3e1291866d
Fix output size check for key material exporter
...
HKDF-Expand can produce at most 255 * hash_size bytes of key material,
so this limit applies to the TLS 1.3 key material exporter.
Signed-off-by: Max Fillinger <maximilian.fillinger@foxcrypto.com >
2025-03-28 17:06:48 +01:00
Max Fillinger
28916ac8fe
Increase allowed output size of HKDF-Expand-Label
...
Signed-off-by: Max Fillinger <maximilian.fillinger@foxcrypto.com >
2025-03-28 17:06:48 +01:00
Max Fillinger
cf007ca8bb
Add more tests for keying material export
...
Signed-off-by: Max Fillinger <maximilian.fillinger@foxcrypto.com >
2025-03-28 17:06:47 +01:00
Max Fillinger
7b72220d42
Fix coding style
...
Signed-off-by: Max Fillinger <max@max-fillinger.net >
2025-03-28 16:53:58 +01:00
Max Fillinger
c7986427d4
Add test for TLS-Exporter in TLS 1.3
...
Signed-off-by: Max Fillinger <maximilian.fillinger@foxcrypto.com >
2025-03-28 16:53:57 +01:00
Manuel Pégourié-Gonnard
064f68ec85
Merge pull request #10032 from valeriosetti/psasim-doc-update
...
psasim: update README file
2025-03-28 09:11:13 +00:00
Manuel Pégourié-Gonnard
e57ea21a1c
Merge pull request #10042 from bjwtaylor/remove-ssl-conf
...
Remove mbedtls_ssl_conf_rng()
2025-03-27 14:05:42 +00:00
Ronald Cron
4cd8fbbb2d
Use TF_PSA_CRYPTO_ROOT_DIR
...
Signed-off-by: Ronald Cron <ronald.cron@arm.com >
2025-03-26 21:19:28 +01:00
Ronald Cron
aa5c159e36
all.sh: check generated files: Use make_generated_files.py
...
Signed-off-by: Ronald Cron <ronald.cron@arm.com >
2025-03-26 21:19:28 +01:00
Ronald Cron
99226e9b9b
cmake: Generate test_keys.h and test_certs.h in the build tree
...
Signed-off-by: Ronald Cron <ronald.cron@arm.com >
2025-03-26 21:19:28 +01:00
Ronald Cron
81a674eee8
Adapt to generate_config_tests.py changes
...
Adapt builds and check-generated-files.sh to the fact
that generate_config_tests.py does not generate
test_suite_config.psa_boolean.data in Mbed TLS 4.x
context anymore.
Signed-off-by: Ronald Cron <ronald.cron@arm.com >
2025-03-26 21:19:28 +01:00
Ben Taylor
602b2968ca
pre-test version of the mbedtls_ssl_conf_rng removal
...
Signed-off-by: Ben Taylor <ben.taylor@linaro.org >
2025-03-26 13:32:10 +00:00
Ben Taylor
47111a1cb1
initial remove of mbedtls_ssl_conf_rng
...
Signed-off-by: Ben Taylor <ben.taylor@linaro.org >
2025-03-26 13:32:10 +00:00
Valerio Setti
b33e06c56f
tests: psasim: remove references to mbedtls_psa_register_se_key()
...
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no >
2025-03-26 13:32:54 +01:00
Valerio Setti
9f2939c56d
test: components: remove references to MBEDTLS_PSA_CRYPTO_SE_C
...
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no >
2025-03-26 13:32:54 +01:00
Ben Taylor
440cb2aac2
Remove RNG from x509 and PK
...
remove the f_rng and p_rng parameter from x509 and PK.
Signed-off-by: Ben Taylor <ben.taylor@linaro.org >
2025-03-26 08:17:38 +00:00
Gabor Mezei
5ba9b57cbd
Convert test function to a static function
...
The `resize_buffers` function is no more used as a test
function to convert it to a static function.
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2025-03-20 17:55:35 +01:00
Gabor Mezei
1ac784c5a5
Fix test case migration
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2025-03-20 17:55:35 +01:00
Gabor Mezei
9ee58e43e1
Update test dependencies
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2025-03-20 17:55:30 +01:00
Gabor Mezei
47c6277480
Update dependencies
...
Let the TLS context serialiazation tests to run with other than RSA
ciphersuites.
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2025-03-20 17:53:07 +01:00
Gabor Mezei
3ead04a12d
Remove/migrate tests for key exchange based on decryption
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2025-03-20 17:53:07 +01:00
Gabor Mezei
3ee9a8cf49
Remove TLS-RSA related test cases
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2025-03-20 17:53:07 +01:00
Gabor Mezei
e1e27300a2
Remove MBEDTLS_KEY_EXCHANGE_RSA_ENABLED config option
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2025-03-20 17:53:01 +01:00
Gilles Peskine
94b9972124
Merge pull request #10007 from minosgalanakis/task9887_extend_defragmentation_tests
...
Extend ssl-opt testing for TLS HS defragmentation
2025-03-18 13:09:38 +00:00
Minos Galanakis
625c8fd2d9
ssl-opt: Added 4 and 128 bytes tests to HS defragmentation for server initiated reneg
...
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com >
2025-03-18 10:31:37 +00:00
Minos Galanakis
dfc082e16c
ssl-opt: Fixed a minor typo.
...
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com >
2025-03-18 10:25:24 +00:00
Manuel Pégourié-Gonnard
6dcfdf1f48
Adapt dependencies to the new world
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2025-03-14 09:22:09 +01:00
Manuel Pégourié-Gonnard
af4606d743
Re-introduce log asserts on positive cases
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2025-03-14 09:22:09 +01:00
Manuel Pégourié-Gonnard
47d0b796af
Improve a test assertion
...
That way if it ever fails it will print the values.
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2025-03-14 09:22:09 +01:00
Manuel Pégourié-Gonnard
f4a67cf892
Fix a typo
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2025-03-14 09:22:09 +01:00
Manuel Pégourié-Gonnard
e5ddf36a66
Add test cases for EOF in the middle of fragments
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2025-03-14 09:22:09 +01:00
Manuel Pégourié-Gonnard
ed873f9e59
Adjust logic around log pattern
...
This is more flexible: the test data gets to decide whether we want to
assert the presence of a pattern or not.
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2025-03-14 09:22:09 +01:00
Manuel Pégourié-Gonnard
2285d6122d
Add test for length larger than 2^16
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2025-03-14 09:22:09 +01:00
Manuel Pégourié-Gonnard
4f1b38a65e
Adapt "large ClientHello" tests to incremental
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2025-03-14 09:22:09 +01:00
Manuel Pégourié-Gonnard
757040c47f
Cleanly reject non-HS in-between HS fragments
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2025-03-14 09:22:09 +01:00
Manuel Pégourié-Gonnard
1038b22d74
Reduce the level of logging used in tests
...
This should avoid running into a bug with printf format specifiers one
windows.
It's also a logical move for actual tests: I used the highest debug
level for discovery, but we don't need that all the time.
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2025-03-14 09:22:09 +01:00
Manuel Pégourié-Gonnard
55d9124bb0
Move new tests to their own data file
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2025-03-14 09:22:09 +01:00
Manuel Pégourié-Gonnard
299f94a5d2
Fix dependency issues
...
Declare the same dependencies as for the previous TLS 1.3 tests, except
for part that varies with the cipher suite (ie AES-GCM).
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2025-03-14 09:22:09 +01:00
Manuel Pégourié-Gonnard
1bed827d22
New test function for large ClientHello
...
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2025-03-14 09:22:09 +01:00
Manuel Pégourié-Gonnard
6e79ff5bb5
Fix hash dependencies for TLS 1.2 tests
...
We're not sending a signature_algorithm extension, which means SHA-1.
Caught by depends.py hashes
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2025-03-14 09:22:09 +01:00
Manuel Pégourié-Gonnard
e760d7be41
Fix curve dependencies
...
In addition to secp256r1 for the handshake, we need secp384r1 as it's
used by the CA certificate.
Caught by depends.py curves
Also, for the "unknown ciphersuite" 1.2 test, use the same key type and
all the same dependencies as of the "good" test above, to avoid having
to determine a second set of correct dependencies just for this one.
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com >
2025-03-14 09:22:09 +01:00