blob: 331e5a053f2c6b7ebdb8e8e96c3350478de39591 [file] [log] [blame]
Tuvshinzaya Erdenekhuu79bf51a2022-07-29 15:06:52 +01001PK invalid parameters
2pk_invalid_param:
3
Andrzej Kurekc470b6b2019-01-31 08:20:20 -05004PK valid parameters
5valid_parameters:
6
7PK write valid parameters
8depends_on:MBEDTLS_RSA_C
9valid_parameters_pkwrite:"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"
10
Valerio Settie5370182024-04-17 15:27:44 +020011PK utils: RSA 1024-bit
Valerio Setti09e98722024-04-02 11:33:22 +020012depends_on:MBEDTLS_RSA_C
Valerio Setti1c56ca42024-04-29 17:38:37 +020013pk_utils:MBEDTLS_PK_RSA:1024:1024:(1024 + 7) / 8:"RSA"
Gilles Peskine92fb6042024-02-01 22:33:06 +010014
Valerio Settie5370182024-04-17 15:27:44 +020015# In the following 3 test cases we test a few different sizes that are not a
16# multiple of 8 and for which we have test data.
17PK utils: RSA 1026-bits
Valerio Setti09e98722024-04-02 11:33:22 +020018depends_on:MBEDTLS_RSA_C
Valerio Setti1c56ca42024-04-29 17:38:37 +020019pk_utils:MBEDTLS_PK_RSA:1026:1026:(1026 + 7) / 8:"RSA"
Gilles Peskine92fb6042024-02-01 22:33:06 +010020
Valerio Settie5370182024-04-17 15:27:44 +020021PK utils: RSA 1028-bits
Valerio Setti09e98722024-04-02 11:33:22 +020022depends_on:MBEDTLS_RSA_C
Valerio Setti1c56ca42024-04-29 17:38:37 +020023pk_utils:MBEDTLS_PK_RSA:1028:1028:(1028 + 7) / 8:"RSA"
Gilles Peskine92fb6042024-02-01 22:33:06 +010024
Valerio Settie5370182024-04-17 15:27:44 +020025PK utils: RSA 1030-bits
Valerio Setti09e98722024-04-02 11:33:22 +020026depends_on:MBEDTLS_RSA_C
Valerio Setti1c56ca42024-04-29 17:38:37 +020027pk_utils:MBEDTLS_PK_RSA:1030:1030:(1030 + 7) / 8:"RSA"
Manuel Pégourié-Gonnardb0a467f2013-09-21 12:31:05 +020028
Gilles Peskinee48fe552019-11-05 16:42:13 +010029PK utils: ECKEY SECP192R1
Valerio Settidb6b4db2023-09-01 09:20:51 +020030depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_ECP_HAVE_SECP192R1
Gilles Peskinee48fe552019-11-05 16:42:13 +010031pk_utils:MBEDTLS_PK_ECKEY:MBEDTLS_ECP_DP_SECP192R1:192:24:"EC"
Manuel Pégourié-Gonnardb0a467f2013-09-21 12:31:05 +020032
Gilles Peskinee48fe552019-11-05 16:42:13 +010033PK utils: ECKEY_DH SECP192R1
Valerio Settidb6b4db2023-09-01 09:20:51 +020034depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_ECP_HAVE_SECP192R1
Gilles Peskinee48fe552019-11-05 16:42:13 +010035pk_utils:MBEDTLS_PK_ECKEY_DH:MBEDTLS_ECP_DP_SECP192R1:192:24:"EC_DH"
Manuel Pégourié-Gonnardb0a467f2013-09-21 12:31:05 +020036
Gilles Peskinea719db82019-11-05 16:48:35 +010037PK utils: ECKEY_DH Curve25519
Valerio Settidb6b4db2023-09-01 09:20:51 +020038depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_ECP_HAVE_CURVE25519
Gilles Peskinea719db82019-11-05 16:48:35 +010039pk_utils:MBEDTLS_PK_ECKEY_DH:MBEDTLS_ECP_DP_CURVE25519:255:32:"EC_DH"
40
41PK utils: ECKEY_DH Curve448
Valerio Settidb6b4db2023-09-01 09:20:51 +020042depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_ECP_HAVE_CURVE448
Gilles Peskinea719db82019-11-05 16:48:35 +010043pk_utils:MBEDTLS_PK_ECKEY_DH:MBEDTLS_ECP_DP_CURVE448:448:56:"EC_DH"
44
Gilles Peskinee48fe552019-11-05 16:42:13 +010045PK utils: ECDSA SECP192R1
Valerio Settidb6b4db2023-09-01 09:20:51 +020046depends_on:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_ECP_HAVE_SECP192R1
Gilles Peskinee48fe552019-11-05 16:42:13 +010047pk_utils:MBEDTLS_PK_ECDSA:MBEDTLS_ECP_DP_SECP192R1:192:24:"ECDSA"
Manuel Pégourié-Gonnardb0a467f2013-09-21 12:31:05 +020048
Gilles Peskinea719db82019-11-05 16:48:35 +010049PK utils: ECDSA SECP256R1
Valerio Settidb6b4db2023-09-01 09:20:51 +020050depends_on:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_ECP_HAVE_SECP256R1
Gilles Peskinea719db82019-11-05 16:48:35 +010051pk_utils:MBEDTLS_PK_ECDSA:MBEDTLS_ECP_DP_SECP256R1:256:32:"ECDSA"
52
53PK utils: ECDSA SECP384R1
Valerio Settidb6b4db2023-09-01 09:20:51 +020054depends_on:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_ECP_HAVE_SECP384R1
Gilles Peskinea719db82019-11-05 16:48:35 +010055pk_utils:MBEDTLS_PK_ECDSA:MBEDTLS_ECP_DP_SECP384R1:384:48:"ECDSA"
56
57PK utils: ECDSA SECP521R1
Valerio Settidb6b4db2023-09-01 09:20:51 +020058depends_on:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_ECP_HAVE_SECP521R1
Gilles Peskinea719db82019-11-05 16:48:35 +010059pk_utils:MBEDTLS_PK_ECDSA:MBEDTLS_ECP_DP_SECP521R1:521:66:"ECDSA"
60
Neil Armstrong0cd78dd2022-03-15 14:20:20 +010061PK PSA utilities: ECDSA setup/free, info functions, unsupported operations
Valerio Settidb6b4db2023-09-01 09:20:51 +020062depends_on:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256R1
Neil Armstrong0cd78dd2022-03-15 14:20:20 +010063pk_psa_utils:0
64
65PK PSA utilities: RSA setup/free, info functions, unsupported operations
Valerio Setti09e98722024-04-02 11:33:22 +020066depends_on:MBEDTLS_RSA_C
Neil Armstrong0cd78dd2022-03-15 14:20:20 +010067pk_psa_utils:1
Manuel Pégourié-Gonnard7b5fe042018-10-31 09:57:45 +010068
Neil Armstrongce1d2392022-05-11 14:11:46 +020069PK can do ext: ECDSA(ANY)/NONE, invalid check STREAM_CIPHER
Valerio Settidb6b4db2023-09-01 09:20:51 +020070depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256R1
Neil Armstrong5c5b1162022-05-19 18:07:53 +020071pk_can_do_ext:1:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):PSA_ALG_NONE:256:PSA_ALG_STREAM_CIPHER:PSA_KEY_USAGE_SIGN_HASH:0
Neil Armstrongce1d2392022-05-11 14:11:46 +020072
73PK can do ext: ECDSA(ANY)/NONE, invalid check RSA_PKCS1V15_SIGN(SHA256)
Valerio Settidb6b4db2023-09-01 09:20:51 +020074depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256R1
Neil Armstrong5c5b1162022-05-19 18:07:53 +020075pk_can_do_ext:1:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):PSA_ALG_NONE:256:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:0
Neil Armstrongce1d2392022-05-11 14:11:46 +020076
77PK can do ext: ECDSA(ANY)/NONE, invalid check RSA_PKCS1V15_CRYPT
Valerio Settidb6b4db2023-09-01 09:20:51 +020078depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256R1
Neil Armstrong5c5b1162022-05-19 18:07:53 +020079pk_can_do_ext:1:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):PSA_ALG_NONE:256:PSA_ALG_RSA_PKCS1V15_CRYPT:PSA_KEY_USAGE_SIGN_HASH:0
Neil Armstrongce1d2392022-05-11 14:11:46 +020080
81PK can do ext: ECDSA(ANY)/NONE, invalid check RSA_PSS(SHA256)
Valerio Settidb6b4db2023-09-01 09:20:51 +020082depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256R1
Neil Armstrong5c5b1162022-05-19 18:07:53 +020083pk_can_do_ext:1:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):PSA_ALG_NONE:256:PSA_ALG_RSA_PSS(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:0
Neil Armstrongce1d2392022-05-11 14:11:46 +020084
85PK can do ext: ECDSA(ANY)/NONE, invalid check ECDH
Valerio Settidb6b4db2023-09-01 09:20:51 +020086depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256R1
Neil Armstrong5c5b1162022-05-19 18:07:53 +020087pk_can_do_ext:1:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):PSA_ALG_NONE:256:PSA_ALG_ECDH:PSA_KEY_USAGE_SIGN_HASH:0
Neil Armstrongce1d2392022-05-11 14:11:46 +020088
89PK can do ext: ECDSA(ANY)/NONE, check ECDSA(SHA256)
Valerio Settidb6b4db2023-09-01 09:20:51 +020090depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256R1
Neil Armstrong5c5b1162022-05-19 18:07:53 +020091pk_can_do_ext:1:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):PSA_ALG_NONE:256:PSA_ALG_ECDSA(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:1
Neil Armstrongce1d2392022-05-11 14:11:46 +020092
93PK can do ext: ECDSA(SHA256)/NONE, check ECDSA(SHA256)
Valerio Settidb6b4db2023-09-01 09:20:51 +020094depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256R1
Neil Armstrong5c5b1162022-05-19 18:07:53 +020095pk_can_do_ext:1:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_ECDSA(PSA_ALG_SHA_256):PSA_ALG_NONE:256:PSA_ALG_ECDSA(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:1
Neil Armstrongce1d2392022-05-11 14:11:46 +020096
97PK can do ext: NONE/ECDSA(ANY_HASH), check ECDSA(SHA256)
Valerio Settidb6b4db2023-09-01 09:20:51 +020098depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256R1
Neil Armstrong5c5b1162022-05-19 18:07:53 +020099pk_can_do_ext:1:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_NONE:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):256:PSA_ALG_ECDSA(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:1
Neil Armstrongce1d2392022-05-11 14:11:46 +0200100
101PK can do ext: NONE/ECDSA(SHA256), check ECDSA(SHA256)
Valerio Settidb6b4db2023-09-01 09:20:51 +0200102depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256R1
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200103pk_can_do_ext:1:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_NONE:PSA_ALG_ECDSA(PSA_ALG_SHA_256):256:PSA_ALG_ECDSA(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:1
Neil Armstrongce1d2392022-05-11 14:11:46 +0200104
105PK can do ext: ECDSA(SHA256)/NONE, invalid check ECDSA(ANY)
Valerio Settidb6b4db2023-09-01 09:20:51 +0200106depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256R1
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200107pk_can_do_ext:1:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_ECDSA(PSA_ALG_SHA_256):PSA_ALG_NONE:256:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):PSA_KEY_USAGE_SIGN_HASH:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200108
109PK can do ext: ECDSA(SHA1)/NONE, invalid check ECDSA(SHA256)
Valerio Settidb6b4db2023-09-01 09:20:51 +0200110depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256R1
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200111pk_can_do_ext:1:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_ECDSA(PSA_ALG_SHA_1):PSA_ALG_NONE:256:PSA_ALG_ECDSA(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200112
113PK can do ext: ECDH/NONE, invalid check STREAM_CIPHER
Valerio Settidb6b4db2023-09-01 09:20:51 +0200114depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256R1
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200115pk_can_do_ext:1:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_KEY_USAGE_DERIVE:PSA_ALG_ECDH:PSA_ALG_NONE:256:PSA_ALG_STREAM_CIPHER:PSA_KEY_USAGE_DERIVE:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200116
117PK can do ext: ECDH/NONE, invalid check RSA_PKCS1V15_SIGN(SHA256)
Valerio Settidb6b4db2023-09-01 09:20:51 +0200118depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256R1
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200119pk_can_do_ext:1:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_KEY_USAGE_DERIVE:PSA_ALG_ECDH:PSA_ALG_NONE:256:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_SHA_256):PSA_KEY_USAGE_DERIVE:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200120
121PK can do ext: ECDH/NONE, invalid check RSA_PKCS1V15_CRYPT
Valerio Settidb6b4db2023-09-01 09:20:51 +0200122depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256R1
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200123pk_can_do_ext:1:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_KEY_USAGE_DERIVE:PSA_ALG_ECDH:PSA_ALG_NONE:256:PSA_ALG_RSA_PKCS1V15_CRYPT:PSA_KEY_USAGE_DERIVE:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200124
125PK can do ext: ECDH/NONE, invalid check RSA_PSS(SHA256)
Valerio Settidb6b4db2023-09-01 09:20:51 +0200126depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256R1
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200127pk_can_do_ext:1:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_KEY_USAGE_DERIVE:PSA_ALG_ECDH:PSA_ALG_NONE:256:PSA_ALG_RSA_PSS(PSA_ALG_SHA_256):PSA_KEY_USAGE_DERIVE:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200128
129PK can do ext: ECDH/NONE, invalid check ECDSA(SHA256)
Valerio Settidb6b4db2023-09-01 09:20:51 +0200130depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256R1
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200131pk_can_do_ext:1:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_KEY_USAGE_DERIVE:PSA_ALG_ECDH:PSA_ALG_NONE:256:PSA_ALG_ECDSA(PSA_ALG_SHA_256):PSA_KEY_USAGE_DERIVE:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200132
133PK can do ext: ECDH/NONE, check ECDH
Valerio Settidb6b4db2023-09-01 09:20:51 +0200134depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256R1
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200135pk_can_do_ext:1:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_KEY_USAGE_DERIVE:PSA_ALG_ECDH:PSA_ALG_NONE:256:PSA_ALG_ECDH:PSA_KEY_USAGE_DERIVE:1
Neil Armstrongce1d2392022-05-11 14:11:46 +0200136
Neil Armstrong408f6a62022-05-17 14:23:20 +0200137PK can do ext: ECDH/ECDSA(ANY), check ECDH+SIGN
Valerio Settidb6b4db2023-09-01 09:20:51 +0200138depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256R1
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200139pk_can_do_ext:1:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_KEY_USAGE_DERIVE|PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_ECDH:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):256:PSA_ALG_ECDH:PSA_KEY_USAGE_SIGN_HASH:1
Neil Armstrongce1d2392022-05-11 14:11:46 +0200140
Neil Armstrong408f6a62022-05-17 14:23:20 +0200141PK can do ext: ECDH/ECDSA(ANY), check ECDH+DERIVE
Valerio Settidb6b4db2023-09-01 09:20:51 +0200142depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256R1
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200143pk_can_do_ext:1:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_KEY_USAGE_DERIVE|PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_ECDH:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):256:PSA_ALG_ECDH:PSA_KEY_USAGE_DERIVE:1
Neil Armstrong408f6a62022-05-17 14:23:20 +0200144
145PK can do ext: ECDH/ECDSA(ANY), check ECDH+DERIVE|SIGN
Valerio Settidb6b4db2023-09-01 09:20:51 +0200146depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256R1
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200147pk_can_do_ext:1:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_KEY_USAGE_DERIVE|PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_ECDH:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):256:PSA_ALG_ECDH:PSA_KEY_USAGE_DERIVE|PSA_KEY_USAGE_SIGN_HASH:1
Neil Armstrong408f6a62022-05-17 14:23:20 +0200148
149PK can do ext: ECDH/ECDSA(ANY), check ECDSA(SHA256)+DERIVE|SIGN
Valerio Settidb6b4db2023-09-01 09:20:51 +0200150depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256R1
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200151pk_can_do_ext:1:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_KEY_USAGE_DERIVE|PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_ECDH:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):256:PSA_ALG_ECDSA(PSA_ALG_SHA_256):PSA_KEY_USAGE_DERIVE|PSA_KEY_USAGE_SIGN_HASH:1
Neil Armstrong408f6a62022-05-17 14:23:20 +0200152
Neil Armstrong408f6a62022-05-17 14:23:20 +0200153PK can do ext: ECDH/ECDSA(ANY), check ECDSA(SHA256)+SIGN
Valerio Settidb6b4db2023-09-01 09:20:51 +0200154depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256R1
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200155pk_can_do_ext:1:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_KEY_USAGE_DERIVE|PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_ECDH:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):256:PSA_ALG_ECDSA(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:1
Neil Armstrong408f6a62022-05-17 14:23:20 +0200156
157PK can do ext: ECDH/ECDSA(ANY), check ECDSA(SHA256)+DERIVE
Valerio Settidb6b4db2023-09-01 09:20:51 +0200158depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256R1
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200159pk_can_do_ext:1:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_KEY_USAGE_DERIVE|PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_ECDH:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):256:PSA_ALG_ECDSA(PSA_ALG_SHA_256):PSA_KEY_USAGE_DERIVE:1
Neil Armstrong408f6a62022-05-17 14:23:20 +0200160
161PK can do ext: RSA_PKCS1V15_SIGN(ANY)/NONE, check not allowed COPY usage
Valerio Setti09e98722024-04-02 11:33:22 +0200162depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200163pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_ANY_HASH):PSA_ALG_NONE:1024:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_SHA_256):PSA_KEY_USAGE_COPY:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200164
165PK can do ext: RSA_PKCS1V15_SIGN(ANY)/NONE, invalid check STREAM_CIPHER
Valerio Setti09e98722024-04-02 11:33:22 +0200166depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200167pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_ANY_HASH):PSA_ALG_NONE:1024:PSA_ALG_STREAM_CIPHER:PSA_KEY_USAGE_SIGN_HASH:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200168
169PK can do ext: RSA_PKCS1V15_SIGN(ANY)/NONE, invalid check ECDSA(SHA256)
Valerio Setti09e98722024-04-02 11:33:22 +0200170depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200171pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_ANY_HASH):PSA_ALG_NONE:1024:PSA_ALG_ECDSA(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200172
173PK can do ext: RSA_PKCS1V15_SIGN(ANY)/NONE, invalid check ECDH
Valerio Setti09e98722024-04-02 11:33:22 +0200174depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200175pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_ANY_HASH):PSA_ALG_NONE:1024:PSA_ALG_ECDH:PSA_KEY_USAGE_SIGN_HASH:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200176
177PK can do ext: RSA_PKCS1V15_SIGN(ANY)/NONE, invalid check RSA_PKCS1V15_CRYPT
Valerio Setti09e98722024-04-02 11:33:22 +0200178depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200179pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_ANY_HASH):PSA_ALG_NONE:1024:PSA_ALG_RSA_PKCS1V15_CRYPT:PSA_KEY_USAGE_SIGN_HASH:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200180
181PK can do ext: RSA_PKCS1V15_SIGN(ANY)/NONE, invalid check RSA_PSS(SHA256)
Valerio Setti09e98722024-04-02 11:33:22 +0200182depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200183pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_ANY_HASH):PSA_ALG_NONE:1024:PSA_ALG_RSA_PSS(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200184
185PK can do ext: RSA_PKCS1V15_SIGN(ANY)/NONE, check RSA_PKCS1V15_SIGN(SHA256)
Valerio Setti09e98722024-04-02 11:33:22 +0200186depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200187pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_ANY_HASH):PSA_ALG_NONE:1024:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:1
Neil Armstrong408f6a62022-05-17 14:23:20 +0200188
189PK can do ext: RSA_PKCS1V15_SIGN(ANY)/NONE, check non-present usage
Valerio Setti09e98722024-04-02 11:33:22 +0200190depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200191pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_ANY_HASH):PSA_ALG_NONE:1024:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_SHA_256):PSA_KEY_USAGE_DERIVE:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200192
193PK can do ext: RSA_PKCS1V15_SIGN(SHA256)/NONE, check RSA_PKCS1V15_SIGN(SHA256)
Valerio Setti09e98722024-04-02 11:33:22 +0200194depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200195pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_SHA_256):PSA_ALG_NONE:1024:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:1
Neil Armstrongce1d2392022-05-11 14:11:46 +0200196
197PK can do ext: NONE, RSA_PKCS1V15_SIGN(ANY), check RSA_PKCS1V15_SIGN(SHA256)
Valerio Setti09e98722024-04-02 11:33:22 +0200198depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200199pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_NONE:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_ANY_HASH):1024:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:1
Neil Armstrongce1d2392022-05-11 14:11:46 +0200200
201PK can do ext: NONE, RSA_PKCS1V15_SIGN(SHA256), check RSA_PKCS1V15_SIGN(SHA256)
Valerio Setti09e98722024-04-02 11:33:22 +0200202depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200203pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_NONE:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_SHA_256):1024:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:1
Neil Armstrongce1d2392022-05-11 14:11:46 +0200204
205PK can do ext: RSA_PKCS1V15_SIGN(SHA256)/NONE, invalid check RSA_PKCS1V15_SIGN(ANY)
Valerio Setti09e98722024-04-02 11:33:22 +0200206depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200207pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_SHA_256):PSA_ALG_NONE:1024:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_ANY_HASH):PSA_KEY_USAGE_SIGN_HASH:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200208
209PK can do ext: RSA_PKCS1V15_SIGN(SHA1)/NONE, invalid check RSA_PKCS1V15_SIGN(SHA256)
Valerio Setti09e98722024-04-02 11:33:22 +0200210depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200211pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_SHA_1):PSA_ALG_NONE:1024:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200212
213PK can do ext: RSA_PSS(ANY)/NONE, invalid check STREAM_CIPHER
Valerio Setti09e98722024-04-02 11:33:22 +0200214depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200215pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PSS(PSA_ALG_ANY_HASH):PSA_ALG_NONE:1024:PSA_ALG_STREAM_CIPHER:PSA_KEY_USAGE_SIGN_HASH:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200216
217PK can do ext: RSA_PSS(ANY)/NONE, invalid check ECDSA(SHA256)
Valerio Setti09e98722024-04-02 11:33:22 +0200218depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200219pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PSS(PSA_ALG_ANY_HASH):PSA_ALG_NONE:1024:PSA_ALG_ECDSA(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200220
221PK can do ext: RSA_PSS(ANY)/NONE, invalid check RSA_PKCS1V15_CRYPT
Valerio Setti09e98722024-04-02 11:33:22 +0200222depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200223pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PSS(PSA_ALG_ANY_HASH):PSA_ALG_NONE:1024:PSA_ALG_RSA_PKCS1V15_CRYPT:PSA_KEY_USAGE_SIGN_HASH:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200224
225PK can do ext: RSA_PSS(ANY)/NONE, invalid check RSA_PKCS1V15_SIGN(SHA256)
Valerio Setti09e98722024-04-02 11:33:22 +0200226depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200227pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PSS(PSA_ALG_ANY_HASH):PSA_ALG_NONE:1024:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200228
229PK can do ext: RSA_PSS(ANY)/NONE, check RSA_PSS(SHA256)
Valerio Setti09e98722024-04-02 11:33:22 +0200230depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200231pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PSS(PSA_ALG_ANY_HASH):PSA_ALG_NONE:1024:PSA_ALG_RSA_PSS(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:1
Neil Armstrongce1d2392022-05-11 14:11:46 +0200232
233PK can do ext: RSA_PSS(SHA256)/NONE, check RSA_PSS(SHA256)
Valerio Setti09e98722024-04-02 11:33:22 +0200234depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200235pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PSS(PSA_ALG_SHA_256):PSA_ALG_NONE:1024:PSA_ALG_RSA_PSS(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:1
Neil Armstrongce1d2392022-05-11 14:11:46 +0200236
237PK can do ext: NONE, RSA_PSS(ANY), check RSA_PSS(SHA256)
Valerio Setti09e98722024-04-02 11:33:22 +0200238depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200239pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_NONE:PSA_ALG_RSA_PSS(PSA_ALG_ANY_HASH):1024:PSA_ALG_RSA_PSS(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:1
Neil Armstrongce1d2392022-05-11 14:11:46 +0200240
241PK can do ext: NONE, RSA_PSS(SHA256), check RSA_PSS(SHA256)
Valerio Setti09e98722024-04-02 11:33:22 +0200242depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200243pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_NONE:PSA_ALG_RSA_PSS(PSA_ALG_SHA_256):1024:PSA_ALG_RSA_PSS(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:1
Neil Armstrongce1d2392022-05-11 14:11:46 +0200244
245PK can do ext: RSA_PSS(SHA256)/NONE, invalid check RSA_PSS(ANY)
Valerio Setti09e98722024-04-02 11:33:22 +0200246depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200247pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PSS(PSA_ALG_SHA_256):PSA_ALG_NONE:1024:PSA_ALG_RSA_PSS(PSA_ALG_ANY_HASH):PSA_KEY_USAGE_SIGN_HASH:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200248
249PK can do ext: RSA_PSS(SHA1)/NONE, invalid check RSA_PSS(SHA256)
Valerio Setti09e98722024-04-02 11:33:22 +0200250depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200251pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PSS(PSA_ALG_SHA_1):PSA_ALG_NONE:1024:PSA_ALG_RSA_PSS(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200252
253PK can do ext: RSA_PKCS1V15_SIGN_RAW/NONE, check RSA_PKCS1V15_SIGN_RAW
Valerio Setti09e98722024-04-02 11:33:22 +0200254depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200255pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_ALG_NONE:1024:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_KEY_USAGE_SIGN_HASH:1
Neil Armstrongce1d2392022-05-11 14:11:46 +0200256
257PK can do ext: RSA_PKCS1V15_SIGN_RAW/NONE, invalid check RSA_PKCS1V15_SIGN(SHA256)
Valerio Setti09e98722024-04-02 11:33:22 +0200258depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200259pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_ALG_NONE:1024:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200260
261PK can do ext: RSA_PKCS1V15_CRYPT/NONE, invalid check STREAM_CIPHER
Valerio Setti09e98722024-04-02 11:33:22 +0200262depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200263pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_ENCRYPT|PSA_KEY_USAGE_DECRYPT:PSA_ALG_RSA_PKCS1V15_CRYPT:PSA_ALG_NONE:1024:PSA_ALG_STREAM_CIPHER:PSA_KEY_USAGE_ENCRYPT|PSA_KEY_USAGE_DECRYPT:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200264
265PK can do ext: RSA_PKCS1V15_CRYPT/NONE, invalid check ECDSA(SHA256)
Valerio Setti09e98722024-04-02 11:33:22 +0200266depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200267pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_ENCRYPT|PSA_KEY_USAGE_DECRYPT:PSA_ALG_RSA_PKCS1V15_CRYPT:PSA_ALG_NONE:1024:PSA_ALG_ECDSA(PSA_ALG_SHA_256):PSA_KEY_USAGE_ENCRYPT|PSA_KEY_USAGE_DECRYPT:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200268
269PK can do ext: RSA_PKCS1V15_CRYPT/NONE, invalid check ECDH
Valerio Setti09e98722024-04-02 11:33:22 +0200270depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200271pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_ENCRYPT|PSA_KEY_USAGE_DECRYPT:PSA_ALG_RSA_PKCS1V15_CRYPT:PSA_ALG_NONE:1024:PSA_ALG_ECDH:PSA_KEY_USAGE_ENCRYPT|PSA_KEY_USAGE_DECRYPT:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200272
273PK can do ext: RSA_PKCS1V15_CRYPT/NONE, invalid check RSA_PSS(SHA256)
Valerio Setti09e98722024-04-02 11:33:22 +0200274depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200275pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_ENCRYPT|PSA_KEY_USAGE_DECRYPT:PSA_ALG_RSA_PKCS1V15_CRYPT:PSA_ALG_NONE:1024:PSA_ALG_RSA_PSS(PSA_ALG_SHA_256):PSA_KEY_USAGE_ENCRYPT|PSA_KEY_USAGE_DECRYPT:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200276
277PK can do ext: RSA_PKCS1V15_CRYPT/NONE, invalid check RSA_PKCS1V15_SIGN(SHA256)
Valerio Setti09e98722024-04-02 11:33:22 +0200278depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200279pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_ENCRYPT|PSA_KEY_USAGE_DECRYPT:PSA_ALG_RSA_PKCS1V15_CRYPT:PSA_ALG_NONE:1024:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_SHA_256):PSA_KEY_USAGE_ENCRYPT|PSA_KEY_USAGE_DECRYPT:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200280
281PK can do ext: RSA_PKCS1V15_CRYPT/NONE, check RSA_PKCS1V15_CRYPT
Valerio Setti09e98722024-04-02 11:33:22 +0200282depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200283pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_ENCRYPT|PSA_KEY_USAGE_DECRYPT:PSA_ALG_RSA_PKCS1V15_CRYPT:PSA_ALG_NONE:1024:PSA_ALG_RSA_PKCS1V15_CRYPT:PSA_KEY_USAGE_DECRYPT:1
Neil Armstrongce1d2392022-05-11 14:11:46 +0200284
285PK can do ext: RSA_PKCS1V15_CRYPT/RSA_PSS(ANY), check RSA_PKCS1V15_CRYPT
Valerio Setti09e98722024-04-02 11:33:22 +0200286depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200287pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_ENCRYPT|PSA_KEY_USAGE_DECRYPT|PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PKCS1V15_CRYPT:PSA_ALG_RSA_PSS(PSA_ALG_ANY_HASH):1024:PSA_ALG_RSA_PKCS1V15_CRYPT:PSA_KEY_USAGE_DECRYPT:1
Neil Armstrongce1d2392022-05-11 14:11:46 +0200288
289PK can do ext: RSA_PKCS1V15_CRYPT/RSA_PSS(ANY), check RSA_PSS(SHA256)
Valerio Setti09e98722024-04-02 11:33:22 +0200290depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200291pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_ENCRYPT|PSA_KEY_USAGE_DECRYPT|PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PKCS1V15_CRYPT:PSA_ALG_RSA_PSS(PSA_ALG_ANY_HASH):1024:PSA_ALG_RSA_PSS(PSA_ALG_SHA_256):PSA_KEY_USAGE_DECRYPT:1
Neil Armstrong408f6a62022-05-17 14:23:20 +0200292
293PK can do ext: RSA_PKCS1V15_CRYPT/RSA_PSS(ANY), check non allowed ENCRYPT usage
Valerio Setti09e98722024-04-02 11:33:22 +0200294depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200295pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_ENCRYPT|PSA_KEY_USAGE_DECRYPT|PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PKCS1V15_CRYPT:PSA_ALG_RSA_PSS(PSA_ALG_ANY_HASH):1024:PSA_ALG_RSA_PSS(PSA_ALG_SHA_256):PSA_KEY_USAGE_ENCRYPT:0
Neil Armstrongce1d2392022-05-11 14:11:46 +0200296
297PK can do ext: RSA_PKCS1V15_SIGN(ANY)/RSA_PSS(ANY), check RSA_PSS(SHA256)
Valerio Setti09e98722024-04-02 11:33:22 +0200298depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200299pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_ANY_HASH):PSA_ALG_RSA_PSS(PSA_ALG_ANY_HASH):1024:PSA_ALG_RSA_PSS(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:1
Neil Armstrongce1d2392022-05-11 14:11:46 +0200300
301PK can do ext: RSA_PKCS1V15_SIGN(ANY)/RSA_PSS(ANY), check RSA_PKCS1V15_SIGN(SHA256)
Valerio Setti09e98722024-04-02 11:33:22 +0200302depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200303pk_can_do_ext:1:PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_ANY_HASH):PSA_ALG_RSA_PSS(PSA_ALG_ANY_HASH):1024:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:1
Neil Armstrongce1d2392022-05-11 14:11:46 +0200304
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200305PK can do ext: MBEDTLS_PK_ECKEY, check ECDSA(SHA256)
Valerio Settidb6b4db2023-09-01 09:20:51 +0200306depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_ECP_HAVE_SECP256R1
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200307pk_can_do_ext:0:MBEDTLS_PK_ECKEY:0:0:0:MBEDTLS_ECP_DP_SECP256R1:PSA_ALG_ECDSA(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:1
308
309PK can do ext: MBEDTLS_PK_ECKEY, check ECDH
Valerio Settidb6b4db2023-09-01 09:20:51 +0200310depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_ECP_HAVE_SECP256R1
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200311pk_can_do_ext:0:MBEDTLS_PK_ECKEY:0:0:0:MBEDTLS_ECP_DP_SECP256R1:PSA_ALG_ECDH:PSA_KEY_USAGE_DERIVE:1
312
313PK can do ext: MBEDTLS_PK_RSA, check RSA_PKCS1V15_SIGN(SHA256)
Valerio Setti09e98722024-04-02 11:33:22 +0200314depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200315pk_can_do_ext:0:MBEDTLS_PK_RSA:0:0:0:1024:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:1
316
317PK can do ext: MBEDTLS_PK_RSA, check PSA_ALG_RSA_PKCS1V15_CRYPT
Valerio Setti09e98722024-04-02 11:33:22 +0200318depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200319pk_can_do_ext:0:MBEDTLS_PK_RSA:0:0:0:1024:PSA_ALG_RSA_PKCS1V15_CRYPT:PSA_KEY_USAGE_DECRYPT:1
320
321PK can do ext: MBEDTLS_PK_RSA, check invalid PSA_KEY_USAGE_ENCRYPT
Valerio Setti09e98722024-04-02 11:33:22 +0200322depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200323pk_can_do_ext:0:MBEDTLS_PK_RSA:0:0:0:1024:PSA_ALG_RSA_PKCS1V15_CRYPT:PSA_KEY_USAGE_ENCRYPT:0
324
325PK can do ext: MBEDTLS_PK_RSA, check RSA_PSS(SHA256)
Valerio Setti09e98722024-04-02 11:33:22 +0200326depends_on:MBEDTLS_RSA_C
Neil Armstrong5c5b1162022-05-19 18:07:53 +0200327pk_can_do_ext:0:MBEDTLS_PK_RSA:0:0:0:1024:PSA_ALG_RSA_PSS(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:1
Neil Armstrongce1d2392022-05-11 14:11:46 +0200328
Gilles Peskine46ee81d2024-02-13 20:05:29 +0100329RSA verify test vector: PKCS1v1.5 (explicit), SHA1, good
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100330depends_on:MBEDTLS_MD_CAN_SHA1:MBEDTLS_PKCS1_V15
Gilles Peskine46ee81d2024-02-13 20:05:29 +0100331pk_rsa_verify_test_vec:"6a8a1f225703fe39753c1017b43eec9e070a70b1":MBEDTLS_RSA_PKCS_V15:MBEDTLS_MD_SHA1:1024:"e28a13548525e5f36dccb24ecb7cc332cc689dfd64012604c9c7816d72a16c3f5fcdc0e86e7c03280b1c69b586ce0cd8aec722cc73a5d3b730310bf7dfebdc77ce5d94bbc369dc18a2f7b07bd505ab0f82224aef09fdc1e5063234255e0b3c40a52e9e8ae60898eb88a766bdd788fe9493d8fd86bcdd2884d5c06216c65469e5":"3":"5abc01f5de25b70867ff0c24e222c61f53c88daf42586fddcd56f3c4588f074be3c328056c063388688b6385a8167957c6e5355a510e005b8a851d69c96b36ec6036644078210e5d7d326f96365ee0648882921492bc7b753eb9c26cdbab37555f210df2ca6fec1b25b463d38b81c0dcea202022b04af5da58aa03d77be949b7":0
Manuel Pégourié-Gonnardb4fae572014-01-20 11:22:25 +0100332
Gilles Peskine46ee81d2024-02-13 20:05:29 +0100333RSA verify test vector: PKCS1v1.5 (default), SHA1, good
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100334depends_on:MBEDTLS_MD_CAN_SHA1:MBEDTLS_PKCS1_V15
Gilles Peskine46ee81d2024-02-13 20:05:29 +0100335pk_rsa_verify_test_vec:"6a8a1f225703fe39753c1017b43eec9e070a70b1":-1:MBEDTLS_MD_SHA1:1024:"e28a13548525e5f36dccb24ecb7cc332cc689dfd64012604c9c7816d72a16c3f5fcdc0e86e7c03280b1c69b586ce0cd8aec722cc73a5d3b730310bf7dfebdc77ce5d94bbc369dc18a2f7b07bd505ab0f82224aef09fdc1e5063234255e0b3c40a52e9e8ae60898eb88a766bdd788fe9493d8fd86bcdd2884d5c06216c65469e5":"3":"5abc01f5de25b70867ff0c24e222c61f53c88daf42586fddcd56f3c4588f074be3c328056c063388688b6385a8167957c6e5355a510e005b8a851d69c96b36ec6036644078210e5d7d326f96365ee0648882921492bc7b753eb9c26cdbab37555f210df2ca6fec1b25b463d38b81c0dcea202022b04af5da58aa03d77be949b7":0
336
337RSA verify test vector: PKCS1v1.5, SHA1, wrong signature
338depends_on:MBEDTLS_MD_CAN_SHA1:MBEDTLS_PKCS1_V15
339pk_rsa_verify_test_vec:"6a8a1f225703fe39753c1017b43eec9e070a70b1":MBEDTLS_RSA_PKCS_V15:MBEDTLS_MD_SHA1:1024:"e28a13548525e5f36dccb24ecb7cc332cc689dfd64012604c9c7816d72a16c3f5fcdc0e86e7c03280b1c69b586ce0cd8aec722cc73a5d3b730310bf7dfebdc77ce5d94bbc369dc18a2f7b07bd505ab0f82224aef09fdc1e5063234255e0b3c40a52e9e8ae60898eb88a766bdd788fe9493d8fd86bcdd2884d5c06216c65469e5":"3":"5abc01f5de25b70867ff0c24e222c61f53c88daf42586fddcd56f3c4588f074be3c328056c063388688b6385a8167957c6e5355a510e005b8a851d69c96b36ec6036644078210e5d7d326f96365ee0648882921492bc7b753eb9c26cdbab37555f210df2ca6fec1b25b463d38b81c0dcea202022b04af5da58aa03d77be949b8":MBEDTLS_ERR_RSA_VERIFY_FAILED
340
341RSA verify test vector: PSS, SHA1, good
342depends_on:MBEDTLS_MD_CAN_SHA1:MBEDTLS_PKCS1_V21
343pk_rsa_verify_test_vec:"37b66ae0445843353d47ecb0b4fd14c110e62d6a":MBEDTLS_RSA_PKCS_V21:MBEDTLS_MD_SHA1:1024:"a2ba40ee07e3b2bd2f02ce227f36a195024486e49c19cb41bbbdfbba98b22b0e577c2eeaffa20d883a76e65e394c69d4b3c05a1e8fadda27edb2a42bc000fe888b9b32c22d15add0cd76b3e7936e19955b220dd17d4ea904b1ec102b2e4de7751222aa99151024c7cb41cc5ea21d00eeb41f7c800834d2c6e06bce3bce7ea9a5":"010001":"8daa627d3de7595d63056c7ec659e54406f10610128baae821c8b2a0f3936d54dc3bdce46689f6b7951bb18e840542769718d5715d210d85efbb596192032c42be4c29972c856275eb6d5a45f05f51876fc6743deddd28caec9bb30ea99e02c3488269604fe497f74ccd7c7fca1671897123cbd30def5d54a2b5536ad90a747e":0
344
345RSA verify test vector: PSS, SHA1, wrong signature
346depends_on:MBEDTLS_MD_CAN_SHA1:MBEDTLS_PKCS1_V21
347pk_rsa_verify_test_vec:"37b66ae0445843353d47ecb0b4fd14c110e62d6a":MBEDTLS_RSA_PKCS_V21:MBEDTLS_MD_SHA1:1024:"a2ba40ee07e3b2bd2f02ce227f36a195024486e49c19cb41bbbdfbba98b22b0e577c2eeaffa20d883a76e65e394c69d4b3c05a1e8fadda27edb2a42bc000fe888b9b32c22d15add0cd76b3e7936e19955b220dd17d4ea904b1ec102b2e4de7751222aa99151024c7cb41cc5ea21d00eeb41f7c800834d2c6e06bce3bce7ea9a5":"010001":"8daa627d3de7595d63056c7ec659e54406f10610128baae821c8b2a0f3936d54dc3bdce46689f6b7951bb18e840542769718d5715d210d85efbb596192032c42be4c29972c856275eb6d5a45f05f51876fc6743deddd28caec9bb30ea99e02c3488269604fe497f74ccd7c7fca1671897123cbd30def5d54a2b5536ad90a747f":MBEDTLS_ERR_RSA_VERIFY_FAILED
348
349RSA verify test vector: PSS, SHA1, signature is PKCS1v1.5
350depends_on:MBEDTLS_MD_CAN_SHA1:MBEDTLS_PKCS1_V21
351pk_rsa_verify_test_vec:"6a8a1f225703fe39753c1017b43eec9e070a70b1":MBEDTLS_RSA_PKCS_V21:MBEDTLS_MD_SHA1:1024:"e28a13548525e5f36dccb24ecb7cc332cc689dfd64012604c9c7816d72a16c3f5fcdc0e86e7c03280b1c69b586ce0cd8aec722cc73a5d3b730310bf7dfebdc77ce5d94bbc369dc18a2f7b07bd505ab0f82224aef09fdc1e5063234255e0b3c40a52e9e8ae60898eb88a766bdd788fe9493d8fd86bcdd2884d5c06216c65469e5":"3":"5abc01f5de25b70867ff0c24e222c61f53c88daf42586fddcd56f3c4588f074be3c328056c063388688b6385a8167957c6e5355a510e005b8a851d69c96b36ec6036644078210e5d7d326f96365ee0648882921492bc7b753eb9c26cdbab37555f210df2ca6fec1b25b463d38b81c0dcea202022b04af5da58aa03d77be949b7":MBEDTLS_ERR_RSA_VERIFY_FAILED
352
353RSA verify test vector: PKCS1v1.5, SHA1, signature is PSS
354depends_on:MBEDTLS_MD_CAN_SHA1:MBEDTLS_PKCS1_V15
Valerio Setti80bc5d62024-02-19 16:13:47 +0100355pk_rsa_verify_test_vec:"37b66ae0445843353d47ecb0b4fd14c110e62d6a":MBEDTLS_RSA_PKCS_V15:MBEDTLS_MD_SHA1:1024:"a2ba40ee07e3b2bd2f02ce227f36a195024486e49c19cb41bbbdfbba98b22b0e577c2eeaffa20d883a76e65e394c69d4b3c05a1e8fadda27edb2a42bc000fe888b9b32c22d15add0cd76b3e7936e19955b220dd17d4ea904b1ec102b2e4de7751222aa99151024c7cb41cc5ea21d00eeb41f7c800834d2c6e06bce3bce7ea9a5":"010001":"8daa627d3de7595d63056c7ec659e54406f10610128baae821c8b2a0f3936d54dc3bdce46689f6b7951bb18e840542769718d5715d210d85efbb596192032c42be4c29972c856275eb6d5a45f05f51876fc6743deddd28caec9bb30ea99e02c3488269604fe497f74ccd7c7fca1671897123cbd30def5d54a2b5536ad90a747e":MBEDTLS_ERR_RSA_VERIFY_FAILED
Manuel Pégourié-Gonnardb0a467f2013-09-21 12:31:05 +0200356
357ECDSA verify test vector #1 (good)
Valerio Settidb6b4db2023-09-01 09:20:51 +0200358depends_on:MBEDTLS_ECP_HAVE_SECP192R1
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200359pk_ec_test_vec:MBEDTLS_PK_ECDSA:MBEDTLS_ECP_DP_SECP192R1:"046FDD3028FA94A863CD4F78DBFF8B3AA561FC6D9CCBBCA88E0AE6FA437F5415F957542D0717FF8B84562DAE99872EF841":"546869732073686F756C64206265207468652068617368206F662061206D6573736167652E00":"30350218185B2A7FB5CD9C9A8488B119B68B47D6EC833509CE9FA1FF021900FB7D259A744A2348BD45D241A39DC915B81CC2084100FA24":0
Manuel Pégourié-Gonnardb0a467f2013-09-21 12:31:05 +0200360
361ECDSA verify test vector #2 (bad)
Valerio Settidb6b4db2023-09-01 09:20:51 +0200362depends_on:MBEDTLS_ECP_HAVE_SECP192R1
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200363pk_ec_test_vec:MBEDTLS_PK_ECDSA:MBEDTLS_ECP_DP_SECP192R1:"046FDD3028FA94A863CD4F78DBFF8B3AA561FC6D9CCBBCA88E0AE6FA437F5415F957542D0717FF8B84562DAE99872EF841":"546869732073686F756C64206265207468652068617368206F662061206D6573736167652E00":"30350218185B2A7FB5CD9C9A8488B119B68B47D6EC833509CE9FA1FF021900FB7D259A744A2348BD45D241A39DC915B81CC2084100FA25":MBEDTLS_ERR_ECP_VERIFY_FAILED
Manuel Pégourié-Gonnardb0a467f2013-09-21 12:31:05 +0200364
365EC(DSA) verify test vector #1 (good)
Valerio Settidb6b4db2023-09-01 09:20:51 +0200366depends_on:MBEDTLS_ECP_HAVE_SECP192R1
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200367pk_ec_test_vec:MBEDTLS_PK_ECKEY:MBEDTLS_ECP_DP_SECP192R1:"046FDD3028FA94A863CD4F78DBFF8B3AA561FC6D9CCBBCA88E0AE6FA437F5415F957542D0717FF8B84562DAE99872EF841":"546869732073686F756C64206265207468652068617368206F662061206D6573736167652E00":"30350218185B2A7FB5CD9C9A8488B119B68B47D6EC833509CE9FA1FF021900FB7D259A744A2348BD45D241A39DC915B81CC2084100FA24":0
Manuel Pégourié-Gonnardb0a467f2013-09-21 12:31:05 +0200368
369EC(DSA) verify test vector #2 (bad)
Valerio Settidb6b4db2023-09-01 09:20:51 +0200370depends_on:MBEDTLS_ECP_HAVE_SECP192R1
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200371pk_ec_test_vec:MBEDTLS_PK_ECKEY:MBEDTLS_ECP_DP_SECP192R1:"046FDD3028FA94A863CD4F78DBFF8B3AA561FC6D9CCBBCA88E0AE6FA437F5415F957542D0717FF8B84562DAE99872EF841":"546869732073686F756C64206265207468652068617368206F662061206D6573736167652E00":"30350218185B2A7FB5CD9C9A8488B119B68B47D6EC833509CE9FA1FF021900FB7D259A744A2348BD45D241A39DC915B81CC2084100FA25":MBEDTLS_ERR_ECP_VERIFY_FAILED
Manuel Pégourié-Gonnardb0a467f2013-09-21 12:31:05 +0200372
Manuel Pégourié-Gonnard2baae9e2018-11-15 11:44:11 +0100373EC(DSA) verify test vector: good, bitlen(r) = 256
Valerio Settidb6b4db2023-09-01 09:20:51 +0200374depends_on:MBEDTLS_ECP_HAVE_SECP256R1
Manuel Pégourié-Gonnard2baae9e2018-11-15 11:44:11 +0100375pk_ec_test_vec:MBEDTLS_PK_ECKEY:MBEDTLS_ECP_DP_SECP256R1:"0437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edff":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855":"3046022100faecc085c6c5362b91ff1fd6dd77da80bc071bee9ff1ac0ef9509c017f13267c022100a7d0b908c938d3dd6c6a9cdc5b0a4a4ee455c519c1ff6cda959806b7e7461ba0":0
376
377EC(DSA) verify test vector: good, bitlen(r) = 255
Valerio Settidb6b4db2023-09-01 09:20:51 +0200378depends_on:MBEDTLS_ECP_HAVE_SECP256R1
Manuel Pégourié-Gonnard2baae9e2018-11-15 11:44:11 +0100379pk_ec_test_vec:MBEDTLS_PK_ECKEY:MBEDTLS_ECP_DP_SECP256R1:"0437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edff":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855":"30450220639f36215b2ff09bb2beb871e122de74c8d5e29ce8a105aa2b95661f42803e72022100becd8f81b2c186f9d5d2c92378d7b9452ce6de231b0c8d17bac2d8537d2331fd":0
380
381EC(DSA) verify test vector: good, bitlen(r) = 248
Valerio Settidb6b4db2023-09-01 09:20:51 +0200382depends_on:MBEDTLS_ECP_HAVE_SECP256R1
Manuel Pégourié-Gonnard2baae9e2018-11-15 11:44:11 +0100383pk_ec_test_vec:MBEDTLS_PK_ECKEY:MBEDTLS_ECP_DP_SECP256R1:"0437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edff":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855":"30450220009109f967f9082abc9c46e5ea07936529b82023a1a49b872c046f430983db2602210085f0b1960d61f8d75109b5b7ff991d3171320d2ab547104f864048455a965090":0
384
385EC(DSA) verify test vector: good, bitlen(r) = 247
Valerio Settidb6b4db2023-09-01 09:20:51 +0200386depends_on:MBEDTLS_ECP_HAVE_SECP256R1
Manuel Pégourié-Gonnard2baae9e2018-11-15 11:44:11 +0100387pk_ec_test_vec:MBEDTLS_PK_ECKEY:MBEDTLS_ECP_DP_SECP256R1:"0437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edff":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855":"3044021f461786833b50247b07194da6cedbd3caefbcd19c73b6283ccff5097cd0d73b022100d85d20b0b8c3b596eb1cdb0381e681fa0a8bccde4e89c139020af3b0f88e099c":0
388
389EC(DSA) verify test vector: good, bitlen(s) = 256
Valerio Settidb6b4db2023-09-01 09:20:51 +0200390depends_on:MBEDTLS_ECP_HAVE_SECP256R1
Manuel Pégourié-Gonnard2baae9e2018-11-15 11:44:11 +0100391pk_ec_test_vec:MBEDTLS_PK_ECKEY:MBEDTLS_ECP_DP_SECP256R1:"0437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edff":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855":"30450220639f36215b2ff09bb2beb871e122de74c8d5e29ce8a105aa2b95661f42803e72022100becd8f81b2c186f9d5d2c92378d7b9452ce6de231b0c8d17bac2d8537d2331fd":0
392
393EC(DSA) verify test vector: good, bitlen(s) = 255
Valerio Settidb6b4db2023-09-01 09:20:51 +0200394depends_on:MBEDTLS_ECP_HAVE_SECP256R1
Manuel Pégourié-Gonnard2baae9e2018-11-15 11:44:11 +0100395pk_ec_test_vec:MBEDTLS_PK_ECKEY:MBEDTLS_ECP_DP_SECP256R1:"0437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edff":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855":"304402206ae26950c606d08fe5e1682efdccfb3a7213ca46bd523ffd20c4213fe1400d3402207612106ada7055926167650b257da7f4c42c190b8aa9e3b680f8751fe90c63a5":0
396
397EC(DSA) verify test vector: good, bitlen(s) = 248
Valerio Settidb6b4db2023-09-01 09:20:51 +0200398depends_on:MBEDTLS_ECP_HAVE_SECP256R1
Manuel Pégourié-Gonnard2baae9e2018-11-15 11:44:11 +0100399pk_ec_test_vec:MBEDTLS_PK_ECKEY:MBEDTLS_ECP_DP_SECP256R1:"0437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edff":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855":"3045022100fd4d718ab483827492e10b89745fad100d2dd257102b99aff179ee596a569f1f022000a1b777e32a8b4909763b615b805e59194e6196eb05719287a36eb5f17aa485":0
400
401EC(DSA) verify test vector: good, bitlen(s) = 247
Valerio Settidb6b4db2023-09-01 09:20:51 +0200402depends_on:MBEDTLS_ECP_HAVE_SECP256R1
Manuel Pégourié-Gonnard2baae9e2018-11-15 11:44:11 +0100403pk_ec_test_vec:MBEDTLS_PK_ECKEY:MBEDTLS_ECP_DP_SECP256R1:"0437cc56d976091e5a723ec7592dff206eee7cf9069174d0ad14b5f768225962924ee500d82311ffea2fd2345d5d16bd8a88c26b770d55cd8a2a0efa01c8b4edff":"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855":"30430220685a6994daa6a14e4411b5267edc2a00beee907f2dddd956b2a5a1df791c15f8021f675db4538c000c734489ac737fddd5a739c5a23cd6c6eceea70c286ca4fac9":0
404
Gilles Peskinee48fe552019-11-05 16:42:13 +0100405ECDSA sign-verify: SECP192R1
Valerio Settidb6b4db2023-09-01 09:20:51 +0200406depends_on:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP192R1
Gilles Peskine46ee81d2024-02-13 20:05:29 +0100407pk_sign_verify:MBEDTLS_PK_ECDSA:MBEDTLS_ECP_DP_SECP192R1:0:0:0:0
Manuel Pégourié-Gonnardb0a467f2013-09-21 12:31:05 +0200408
Gilles Peskinea719db82019-11-05 16:48:35 +0100409ECDSA sign-verify: SECP256R1
Valerio Settidb6b4db2023-09-01 09:20:51 +0200410depends_on:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256R1
Gilles Peskine46ee81d2024-02-13 20:05:29 +0100411pk_sign_verify:MBEDTLS_PK_ECDSA:MBEDTLS_ECP_DP_SECP256R1:0:0:0:0
Gilles Peskinea719db82019-11-05 16:48:35 +0100412
413ECDSA sign-verify: SECP384R1
Valerio Settidb6b4db2023-09-01 09:20:51 +0200414depends_on:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP384R1
Gilles Peskine46ee81d2024-02-13 20:05:29 +0100415pk_sign_verify:MBEDTLS_PK_ECDSA:MBEDTLS_ECP_DP_SECP384R1:0:0:0:0
Gilles Peskinea719db82019-11-05 16:48:35 +0100416
417ECDSA sign-verify: SECP521R1
Valerio Settidb6b4db2023-09-01 09:20:51 +0200418depends_on:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP521R1
Gilles Peskine46ee81d2024-02-13 20:05:29 +0100419pk_sign_verify:MBEDTLS_PK_ECDSA:MBEDTLS_ECP_DP_SECP521R1:0:0:0:0
Gilles Peskinea719db82019-11-05 16:48:35 +0100420
421ECDSA sign-verify: BP256R1
Valerio Settidb6b4db2023-09-01 09:20:51 +0200422depends_on:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_ECP_HAVE_BP256R1
Gilles Peskine46ee81d2024-02-13 20:05:29 +0100423pk_sign_verify:MBEDTLS_PK_ECDSA:MBEDTLS_ECP_DP_BP256R1:0:0:0:0
Gilles Peskinea719db82019-11-05 16:48:35 +0100424
425ECDSA sign-verify: BP512R1
Valerio Settidb6b4db2023-09-01 09:20:51 +0200426depends_on:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_ECP_HAVE_BP512R1
Gilles Peskine46ee81d2024-02-13 20:05:29 +0100427pk_sign_verify:MBEDTLS_PK_ECDSA:MBEDTLS_ECP_DP_BP512R1:0:0:0:0
Gilles Peskinea719db82019-11-05 16:48:35 +0100428
Gilles Peskinee48fe552019-11-05 16:42:13 +0100429EC(DSA) sign-verify: SECP192R1
Valerio Settidb6b4db2023-09-01 09:20:51 +0200430depends_on:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP192R1
Gilles Peskine46ee81d2024-02-13 20:05:29 +0100431pk_sign_verify:MBEDTLS_PK_ECKEY:MBEDTLS_ECP_DP_SECP192R1:0:0:0:0
Manuel Pégourié-Gonnardb0a467f2013-09-21 12:31:05 +0200432
Gilles Peskinee48fe552019-11-05 16:42:13 +0100433EC_DH (no) sign-verify: SECP192R1
Valerio Settidb6b4db2023-09-01 09:20:51 +0200434depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_ECP_HAVE_SECP192R1
Gilles Peskine46ee81d2024-02-13 20:05:29 +0100435pk_sign_verify:MBEDTLS_PK_ECKEY_DH:MBEDTLS_ECP_DP_SECP192R1:0:0:MBEDTLS_ERR_PK_TYPE_MISMATCH:MBEDTLS_ERR_PK_TYPE_MISMATCH
Manuel Pégourié-Gonnard75c78822013-10-17 12:46:39 +0200436
Gilles Peskine46ee81d2024-02-13 20:05:29 +0100437RSA sign-verify, PKCS1v1.5, SHA1
Valerio Setti79033852024-04-16 16:00:35 +0200438depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_SHA1
439pk_sign_verify:MBEDTLS_PK_RSA:RSA_KEY_SIZE:MBEDTLS_RSA_PKCS_V15:MBEDTLS_MD_SHA1:0:0
Gilles Peskine46ee81d2024-02-13 20:05:29 +0100440
441RSA sign-verify, PKCS1v2.1, SHA1
Valerio Setti79033852024-04-16 16:00:35 +0200442depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA1
443pk_sign_verify:MBEDTLS_PK_RSA:RSA_KEY_SIZE:MBEDTLS_RSA_PKCS_V21:MBEDTLS_MD_SHA1:0:0
Gilles Peskine46ee81d2024-02-13 20:05:29 +0100444
445RSA sign-verify, PKCS1v1.5, SHA256
Valerio Setti79033852024-04-16 16:00:35 +0200446depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_SHA256
447pk_sign_verify:MBEDTLS_PK_RSA:RSA_KEY_SIZE:MBEDTLS_RSA_PKCS_V15:MBEDTLS_MD_SHA256:0:0
Gilles Peskine46ee81d2024-02-13 20:05:29 +0100448
449RSA sign-verify, PKCS1v2.1, SHA256
Valerio Setti79033852024-04-16 16:00:35 +0200450depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA256
451pk_sign_verify:MBEDTLS_PK_RSA:RSA_KEY_SIZE:MBEDTLS_RSA_PKCS_V21:MBEDTLS_MD_SHA256:0:0
Manuel Pégourié-Gonnard67d45832013-10-17 12:34:16 +0200452
Valerio Settiaeeefef2024-02-22 07:59:37 +0100453RSA encrypt-decrypt test PKCS1 v1.5
Neil Armstronge0df42c2022-02-22 14:26:49 +0100454depends_on:MBEDTLS_PKCS1_V15
Valerio Settiaeeefef2024-02-22 07:59:37 +0100455pk_rsa_encrypt_decrypt_test:"4E636AF98E40F3ADCFCCB698F4E80B9F":2048:MBEDTLS_RSA_PKCS_V15:"e79a373182bfaa722eb035f772ad2a9464bd842de59432c18bbab3a7dfeae318c9b915ee487861ab665a40bd6cda560152578e8579016c929df99fea05b4d64efca1d543850bc8164b40d71ed7f3fa4105df0fb9b9ad2a18ce182c8a4f4f975bea9aa0b9a1438a27a28e97ac8330ef37383414d1bd64607d6979ac050424fd17":"c6749cbb0db8c5a177672d4728a8b22392b2fc4d3b8361d5c0d5055a1b4e46d821f757c24eef2a51c561941b93b3ace7340074c058c9bb48e7e7414f42c41da4cccb5c2ba91deb30c586b7fb18af12a52995592ad139d3be429add6547e044becedaf31fa3b39421e24ee034fbf367d11f6b8f88ee483d163b431e1654ad3e89":"b38ac65c8141f7f5c96e14470e851936a67bf94cc6821a39ac12c05f7c0b06d9e6ddba2224703b02e25f31452f9c4a8417b62675fdc6df46b94813bc7b9769a892c482b830bfe0ad42e46668ace68903617faf6681f4babf1cc8e4b0420d3c7f61dc45434c6b54e2c3ee0fc07908509d79c9826e673bf8363255adb0add2401039a7bcd1b4ecf0fbe6ec8369d2da486eec59559dd1d54c9b24190965eafbdab203b35255765261cd0909acf93c3b8b8428cbb448de4715d1b813d0c94829c229543d391ce0adab5351f97a3810c1f73d7b1458b97daed4209c50e16d064d2d5bfda8c23893d755222793146d0a78c3d64f35549141486c3b0961a7b4c1a2034f":"3":0
456
457RSA encrypt-decrypt test PKCS1 v2.1
458depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA1
459pk_rsa_encrypt_decrypt_test:"4E636AF98E40F3ADCFCCB698F4E80B9F":2048:MBEDTLS_RSA_PKCS_V21:"e79a373182bfaa722eb035f772ad2a9464bd842de59432c18bbab3a7dfeae318c9b915ee487861ab665a40bd6cda560152578e8579016c929df99fea05b4d64efca1d543850bc8164b40d71ed7f3fa4105df0fb9b9ad2a18ce182c8a4f4f975bea9aa0b9a1438a27a28e97ac8330ef37383414d1bd64607d6979ac050424fd17":"c6749cbb0db8c5a177672d4728a8b22392b2fc4d3b8361d5c0d5055a1b4e46d821f757c24eef2a51c561941b93b3ace7340074c058c9bb48e7e7414f42c41da4cccb5c2ba91deb30c586b7fb18af12a52995592ad139d3be429add6547e044becedaf31fa3b39421e24ee034fbf367d11f6b8f88ee483d163b431e1654ad3e89":"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":"3":0
Neil Armstronge0df42c2022-02-22 14:26:49 +0100460
Gilles Peskine46ee81d2024-02-13 20:05:29 +0100461RSA decrypt test vector - PKCS1v1.5
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200462depends_on:MBEDTLS_PKCS1_V15
Valerio Setti80bc5d62024-02-19 16:13:47 +0100463pk_rsa_decrypt_test_vec:"28818cb14236ad18f4527e7f1f7633e96cef021bc3234475d7f61e88702b6335b42a352ed3f3267ac7c3e9ba4af17e45096c63eefd8d9a7cb42dfc52fffb2f5b8afb305b46312c2eb50634123b4437a2287ac57b7509d59a583fb741989a49f32625e9267b4641a6607b7303d35c68489db53c8d387b620d0d46a852e72ea43c":1024:MBEDTLS_RSA_PKCS_V15:MBEDTLS_MD_NONE:"eecfae81b1b9b3c908810b10a1b5600199eb9f44aef4fda493b81a9e3d84f632124ef0236e5d1e3b7e28fae7aa040a2d5b252176459d1f397541ba2a58fb6599":"c97fb1f027f453f6341233eaaad1d9353f6c42d08866b1d05a0f2035028b9d869840b41666b42e92ea0da3b43204b5cfce3352524d0416a5a441e700af461503":"bbf82f090682ce9c2338ac2b9da871f7368d07eed41043a440d6b6f07454f51fb8dfbaaf035c02ab61ea48ceeb6fcd4876ed520d60e1ec4619719d8a5b8b807fafb8e0a3dfc737723ee6b4b7d93a2584ee6a649d060953748834b2454598394ee0aab12d7b61a51f527a9a41f6c1687fe2537298ca2a8f5946f8e5fd091dbdcb":"11":"d436e99569fd32a7c8a05bbc90d32c49":0
Manuel Pégourié-Gonnard67d45832013-10-17 12:34:16 +0200464
Gilles Peskine46ee81d2024-02-13 20:05:29 +0100465RSA decrypt test vector - PKCS1v1.5, corrupted encrypted data
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200466depends_on:MBEDTLS_PKCS1_V15
Valerio Setti80bc5d62024-02-19 16:13:47 +0100467pk_rsa_decrypt_test_vec:"28818cb14236ad18f4527e7f1f7633e96cef021bc3234475d7f61e88702b6335b42a352ed3f3267ac7c3e9ba4af17e45096c63eefd8d9a7cb42dfc52fffb2f5b8afb305b46312c2eb50634123b4437a2287ac57b7509d59a583fb741989a49f32625e9267b4641a6607b7303d35c68489db53c8d387b620d0d46a852e72ea43d":1024:MBEDTLS_RSA_PKCS_V15:MBEDTLS_MD_NONE:"eecfae81b1b9b3c908810b10a1b5600199eb9f44aef4fda493b81a9e3d84f632124ef0236e5d1e3b7e28fae7aa040a2d5b252176459d1f397541ba2a58fb6599":"c97fb1f027f453f6341233eaaad1d9353f6c42d08866b1d05a0f2035028b9d869840b41666b42e92ea0da3b43204b5cfce3352524d0416a5a441e700af461503":"bbf82f090682ce9c2338ac2b9da871f7368d07eed41043a440d6b6f07454f51fb8dfbaaf035c02ab61ea48ceeb6fcd4876ed520d60e1ec4619719d8a5b8b807fafb8e0a3dfc737723ee6b4b7d93a2584ee6a649d060953748834b2454598394ee0aab12d7b61a51f527a9a41f6c1687fe2537298ca2a8f5946f8e5fd091dbdcb":"11":"d436e99569fd32a7c8a05bbc90d32c49":MBEDTLS_ERR_RSA_INVALID_PADDING
Gilles Peskine46ee81d2024-02-13 20:05:29 +0100468
469RSA decrypt test vector - PKCS1v2.1
470depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA1
471pk_rsa_decrypt_test_vec:"1253e04dc0a5397bb44a7ab87e9bf2a039a33d1e996fc82a94ccd30074c95df763722017069e5268da5d1c0b4f872cf653c11df82314a67968dfeae28def04bb6d84b1c31d654a1970e5783bd6eb96a024c2ca2f4a90fe9f2ef5c9c140e5bb48da9536ad8700c84fc9130adea74e558d51a74ddf85d8b50de96838d6063e0955":1024:MBEDTLS_RSA_PKCS_V21:MBEDTLS_MD_SHA1:"eecfae81b1b9b3c908810b10a1b5600199eb9f44aef4fda493b81a9e3d84f632124ef0236e5d1e3b7e28fae7aa040a2d5b252176459d1f397541ba2a58fb6599":"c97fb1f027f453f6341233eaaad1d9353f6c42d08866b1d05a0f2035028b9d869840b41666b42e92ea0da3b43204b5cfce3352524d0416a5a441e700af461503":"bbf82f090682ce9c2338ac2b9da871f7368d07eed41043a440d6b6f07454f51fb8dfbaaf035c02ab61ea48ceeb6fcd4876ed520d60e1ec4619719d8a5b8b807fafb8e0a3dfc737723ee6b4b7d93a2584ee6a649d060953748834b2454598394ee0aab12d7b61a51f527a9a41f6c1687fe2537298ca2a8f5946f8e5fd091dbdcb":"11":"d436e99569fd32a7c8a05bbc90d32c49":0
472
473RSA decrypt test vector - PKCS1v2.1, corrupted encrypted data
474depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA1
475pk_rsa_decrypt_test_vec:"1253e04dc0a5397bb44a7ab87e9bf2a039a33d1e996fc82a94ccd30074c95df763722017069e5268da5d1c0b4f872cf653c11df82314a67968dfeae28def04bb6d84b1c31d654a1970e5783bd6eb96a024c2ca2f4a90fe9f2ef5c9c140e5bb48da9536ad8700c84fc9130adea74e558d51a74ddf85d8b50de96838d6063e0956":1024:MBEDTLS_RSA_PKCS_V21:MBEDTLS_MD_SHA1:"eecfae81b1b9b3c908810b10a1b5600199eb9f44aef4fda493b81a9e3d84f632124ef0236e5d1e3b7e28fae7aa040a2d5b252176459d1f397541ba2a58fb6599":"c97fb1f027f453f6341233eaaad1d9353f6c42d08866b1d05a0f2035028b9d869840b41666b42e92ea0da3b43204b5cfce3352524d0416a5a441e700af461503":"bbf82f090682ce9c2338ac2b9da871f7368d07eed41043a440d6b6f07454f51fb8dfbaaf035c02ab61ea48ceeb6fcd4876ed520d60e1ec4619719d8a5b8b807fafb8e0a3dfc737723ee6b4b7d93a2584ee6a649d060953748834b2454598394ee0aab12d7b61a51f527a9a41f6c1687fe2537298ca2a8f5946f8e5fd091dbdcb":"11":"d436e99569fd32a7c8a05bbc90d32c49":MBEDTLS_ERR_RSA_INVALID_PADDING
476
477RSA decrypt test vector - PKCS1v1.5, but data is PKCS1v2.1 encrypted
478depends_on:MBEDTLS_PKCS1_V15
Valerio Setti80bc5d62024-02-19 16:13:47 +0100479pk_rsa_decrypt_test_vec:"1253e04dc0a5397bb44a7ab87e9bf2a039a33d1e996fc82a94ccd30074c95df763722017069e5268da5d1c0b4f872cf653c11df82314a67968dfeae28def04bb6d84b1c31d654a1970e5783bd6eb96a024c2ca2f4a90fe9f2ef5c9c140e5bb48da9536ad8700c84fc9130adea74e558d51a74ddf85d8b50de96838d6063e0955":1024:MBEDTLS_RSA_PKCS_V15:MBEDTLS_MD_NONE:"eecfae81b1b9b3c908810b10a1b5600199eb9f44aef4fda493b81a9e3d84f632124ef0236e5d1e3b7e28fae7aa040a2d5b252176459d1f397541ba2a58fb6599":"c97fb1f027f453f6341233eaaad1d9353f6c42d08866b1d05a0f2035028b9d869840b41666b42e92ea0da3b43204b5cfce3352524d0416a5a441e700af461503":"bbf82f090682ce9c2338ac2b9da871f7368d07eed41043a440d6b6f07454f51fb8dfbaaf035c02ab61ea48ceeb6fcd4876ed520d60e1ec4619719d8a5b8b807fafb8e0a3dfc737723ee6b4b7d93a2584ee6a649d060953748834b2454598394ee0aab12d7b61a51f527a9a41f6c1687fe2537298ca2a8f5946f8e5fd091dbdcb":"11":"d436e99569fd32a7c8a05bbc90d32c49":MBEDTLS_ERR_RSA_INVALID_PADDING
Gilles Peskine46ee81d2024-02-13 20:05:29 +0100480
481RSA decrypt test vector - PKCS1v2.1, but data is PKCS1v1.5 encrypted
482depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA1
483pk_rsa_decrypt_test_vec:"28818cb14236ad18f4527e7f1f7633e96cef021bc3234475d7f61e88702b6335b42a352ed3f3267ac7c3e9ba4af17e45096c63eefd8d9a7cb42dfc52fffb2f5b8afb305b46312c2eb50634123b4437a2287ac57b7509d59a583fb741989a49f32625e9267b4641a6607b7303d35c68489db53c8d387b620d0d46a852e72ea43c":1024:MBEDTLS_RSA_PKCS_V21:MBEDTLS_MD_SHA1:"eecfae81b1b9b3c908810b10a1b5600199eb9f44aef4fda493b81a9e3d84f632124ef0236e5d1e3b7e28fae7aa040a2d5b252176459d1f397541ba2a58fb6599":"c97fb1f027f453f6341233eaaad1d9353f6c42d08866b1d05a0f2035028b9d869840b41666b42e92ea0da3b43204b5cfce3352524d0416a5a441e700af461503":"bbf82f090682ce9c2338ac2b9da871f7368d07eed41043a440d6b6f07454f51fb8dfbaaf035c02ab61ea48ceeb6fcd4876ed520d60e1ec4619719d8a5b8b807fafb8e0a3dfc737723ee6b4b7d93a2584ee6a649d060953748834b2454598394ee0aab12d7b61a51f527a9a41f6c1687fe2537298ca2a8f5946f8e5fd091dbdcb":"11":"d436e99569fd32a7c8a05bbc90d32c49":MBEDTLS_ERR_RSA_INVALID_PADDING
Manuel Pégourié-Gonnard75c78822013-10-17 12:46:39 +0200484
Valerio Setti1b533ab2024-03-20 15:43:33 +0100485RSA Opaque PCKS1 v1.5 - decrypt test vector #1
Neil Armstrongb32ae722022-04-22 15:02:47 +0200486depends_on:MBEDTLS_PKCS1_V15
Valerio Setti1b533ab2024-03-20 15:43:33 +0100487pk_wrap_rsa_decrypt_test_vec:"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":2048:"e79a373182bfaa722eb035f772ad2a9464bd842de59432c18bbab3a7dfeae318c9b915ee487861ab665a40bd6cda560152578e8579016c929df99fea05b4d64efca1d543850bc8164b40d71ed7f3fa4105df0fb9b9ad2a18ce182c8a4f4f975bea9aa0b9a1438a27a28e97ac8330ef37383414d1bd64607d6979ac050424fd17":"c6749cbb0db8c5a177672d4728a8b22392b2fc4d3b8361d5c0d5055a1b4e46d821f757c24eef2a51c561941b93b3ace7340074c058c9bb48e7e7414f42c41da4cccb5c2ba91deb30c586b7fb18af12a52995592ad139d3be429add6547e044becedaf31fa3b39421e24ee034fbf367d11f6b8f88ee483d163b431e1654ad3e89":"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":"3":MBEDTLS_RSA_PKCS_V15:"4E636AF98E40F3ADCFCCB698F4E80B9F":0
Neil Armstrongb32ae722022-04-22 15:02:47 +0200488
Valerio Setti1b533ab2024-03-20 15:43:33 +0100489RSA Opaque PCKS1 v2.1 - decrypt test vector #1
490depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA1
491pk_wrap_rsa_decrypt_test_vec:"1253e04dc0a5397bb44a7ab87e9bf2a039a33d1e996fc82a94ccd30074c95df763722017069e5268da5d1c0b4f872cf653c11df82314a67968dfeae28def04bb6d84b1c31d654a1970e5783bd6eb96a024c2ca2f4a90fe9f2ef5c9c140e5bb48da9536ad8700c84fc9130adea74e558d51a74ddf85d8b50de96838d6063e0955":1024:"eecfae81b1b9b3c908810b10a1b5600199eb9f44aef4fda493b81a9e3d84f632124ef0236e5d1e3b7e28fae7aa040a2d5b252176459d1f397541ba2a58fb6599":"c97fb1f027f453f6341233eaaad1d9353f6c42d08866b1d05a0f2035028b9d869840b41666b42e92ea0da3b43204b5cfce3352524d0416a5a441e700af461503":"bbf82f090682ce9c2338ac2b9da871f7368d07eed41043a440d6b6f07454f51fb8dfbaaf035c02ab61ea48ceeb6fcd4876ed520d60e1ec4619719d8a5b8b807fafb8e0a3dfc737723ee6b4b7d93a2584ee6a649d060953748834b2454598394ee0aab12d7b61a51f527a9a41f6c1687fe2537298ca2a8f5946f8e5fd091dbdcb":"11":MBEDTLS_RSA_PKCS_V21:"d436e99569fd32a7c8a05bbc90d32c49":0
492
493RSA Opaque PCKS1 v1.5 - decrypt test vector #2
Neil Armstrongb32ae722022-04-22 15:02:47 +0200494depends_on:MBEDTLS_PKCS1_V15
Valerio Setti1b533ab2024-03-20 15:43:33 +0100495pk_wrap_rsa_decrypt_test_vec:"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":2048:"e79a373182bfaa722eb035f772ad2a9464bd842de59432c18bbab3a7dfeae318c9b915ee487861ab665a40bd6cda560152578e8579016c929df99fea05b4d64efca1d543850bc8164b40d71ed7f3fa4105df0fb9b9ad2a18ce182c8a4f4f975bea9aa0b9a1438a27a28e97ac8330ef37383414d1bd64607d6979ac050424fd17":"c6749cbb0db8c5a177672d4728a8b22392b2fc4d3b8361d5c0d5055a1b4e46d821f757c24eef2a51c561941b93b3ace7340074c058c9bb48e7e7414f42c41da4cccb5c2ba91deb30c586b7fb18af12a52995592ad139d3be429add6547e044becedaf31fa3b39421e24ee034fbf367d11f6b8f88ee483d163b431e1654ad3e89":"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":"3":MBEDTLS_RSA_PKCS_V15:"4E636AF98E40F3ADCFCCB698F4E80B9F":MBEDTLS_ERR_RSA_INVALID_PADDING
Neil Armstrongb32ae722022-04-22 15:02:47 +0200496
Manuel Pégourié-Gonnard75c78822013-10-17 12:46:39 +0200497EC nocrypt
Valerio Setti545a0d62023-06-14 14:56:48 +0200498depends_on:MBEDTLS_PK_HAVE_ECC_KEYS
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200499pk_ec_nocrypt:MBEDTLS_PK_ECKEY
Manuel Pégourié-Gonnard75c78822013-10-17 12:46:39 +0200500
501EC-DH nocrypt
Valerio Setti545a0d62023-06-14 14:56:48 +0200502depends_on:MBEDTLS_PK_HAVE_ECC_KEYS
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200503pk_ec_nocrypt:MBEDTLS_PK_ECKEY_DH
Manuel Pégourié-Gonnard75c78822013-10-17 12:46:39 +0200504
505ECDSA nocrypt
Valerio Setti48363742023-01-26 16:53:01 +0100506depends_on:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_PK_CAN_ECDSA_SIGN
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200507pk_ec_nocrypt:MBEDTLS_PK_ECDSA
Manuel Pégourié-Gonnard01488752014-04-03 22:09:18 +0200508
509RSA_ALT consistency
Valerio Setti79033852024-04-16 16:00:35 +0200510depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Manuel Pégourié-Gonnard01488752014-04-03 22:09:18 +0200511pk_rsa_alt:
Manuel Pégourié-Gonnard20422e92014-06-05 13:41:44 +0200512
513Verify ext RSA #1 (PKCS1 v2.1, salt_len = ANY, OK)
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100514depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA256
Werner Lewis3ccc1162022-08-01 15:11:48 +0100515pk_rsa_verify_ext_test_vec:"c0719e9a8d5d838d861dc6f675c899d2b309a3a65bb9fe6b11e5afcbf9a2c0b1":MBEDTLS_MD_SHA256:1024:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":"010001":"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":MBEDTLS_PK_RSASSA_PSS:MBEDTLS_MD_SHA256:MBEDTLS_RSA_SALT_LEN_ANY:128:0
Manuel Pégourié-Gonnard20422e92014-06-05 13:41:44 +0200516
517Verify ext RSA #2 (PKCS1 v2.1, salt_len = ANY, wrong message)
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100518depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA256
Werner Lewis3ccc1162022-08-01 15:11:48 +0100519pk_rsa_verify_ext_test_vec:"ae6e43dd387c25741e42fc3570cdfc52e4f51a2343294f3b677dfe01cd5339f6":MBEDTLS_MD_SHA256:1024:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":"010001":"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":MBEDTLS_PK_RSASSA_PSS:MBEDTLS_MD_SHA256:MBEDTLS_RSA_SALT_LEN_ANY:128:MBEDTLS_ERR_RSA_VERIFY_FAILED
Manuel Pégourié-Gonnard20422e92014-06-05 13:41:44 +0200520
521Verify ext RSA #3 (PKCS1 v2.1, salt_len = 0, OK)
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100522depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA256
Werner Lewis3ccc1162022-08-01 15:11:48 +0100523pk_rsa_verify_ext_test_vec:"c0719e9a8d5d838d861dc6f675c899d2b309a3a65bb9fe6b11e5afcbf9a2c0b1":MBEDTLS_MD_SHA256:1024:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":"010001":"7fc506d26ca3b22922a1ce39faaedd273161b82d9443c56f1a034f131ae4a18cae1474271cb4b66a17d9707ca58b0bdbd3c406b7e65bbcc9bbbce94dc45de807b4989b23b3e4db74ca29298137837eb90cc83d3219249bc7d480fceaf075203a86e54c4ecfa4e312e39f8f69d76534089a36ed9049ca9cfd5ab1db1fa75fe5c8":MBEDTLS_PK_RSASSA_PSS:MBEDTLS_MD_SHA256:0:128:0
Manuel Pégourié-Gonnard20422e92014-06-05 13:41:44 +0200524
525Verify ext RSA #4 (PKCS1 v2.1, salt_len = max, OK)
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100526depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA256
Werner Lewis3ccc1162022-08-01 15:11:48 +0100527pk_rsa_verify_ext_test_vec:"c0719e9a8d5d838d861dc6f675c899d2b309a3a65bb9fe6b11e5afcbf9a2c0b1":MBEDTLS_MD_SHA256:1024:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":"010001":"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":MBEDTLS_PK_RSASSA_PSS:MBEDTLS_MD_SHA256:94:128:0
Manuel Pégourié-Gonnard20422e92014-06-05 13:41:44 +0200528
Manuel Pégourié-Gonnard6ea0a8d2022-12-29 10:07:08 +0100529Verify ext RSA #5a (PKCS1 v2.1, wrong salt_len) !USE_PSA
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100530depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA256:!MBEDTLS_USE_PSA_CRYPTO
Werner Lewis3ccc1162022-08-01 15:11:48 +0100531pk_rsa_verify_ext_test_vec:"c0719e9a8d5d838d861dc6f675c899d2b309a3a65bb9fe6b11e5afcbf9a2c0b1":MBEDTLS_MD_SHA256:1024:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":"010001":"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":MBEDTLS_PK_RSASSA_PSS:MBEDTLS_MD_SHA256:32:128:MBEDTLS_ERR_RSA_INVALID_PADDING
Manuel Pégourié-Gonnard20422e92014-06-05 13:41:44 +0200532
Manuel Pégourié-Gonnard6ea0a8d2022-12-29 10:07:08 +0100533Verify ext RSA #5b (PKCS1 v2.1, wrong salt_len) USE_PSA
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100534depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA256:MBEDTLS_USE_PSA_CRYPTO
Manuel Pégourié-Gonnard6ea0a8d2022-12-29 10:07:08 +0100535pk_rsa_verify_ext_test_vec:"c0719e9a8d5d838d861dc6f675c899d2b309a3a65bb9fe6b11e5afcbf9a2c0b1":MBEDTLS_MD_SHA256:1024:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":"010001":"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":MBEDTLS_PK_RSASSA_PSS:MBEDTLS_MD_SHA256:32:128:0
536
Manuel Pégourié-Gonnard20422e92014-06-05 13:41:44 +0200537Verify ext RSA #6 (PKCS1 v2.1, MGF1 alg != MSG hash alg)
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100538depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA256
Werner Lewis9802d362022-07-07 11:37:24 +0100539pk_rsa_verify_ext_test_vec:"c0719e9a8d5d838d861dc6f675c899d2b309a3a65bb9fe6b11e5afcbf9a2c0b1":MBEDTLS_MD_NONE:1024:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":"010001":"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":MBEDTLS_PK_RSASSA_PSS:MBEDTLS_MD_SHA256:MBEDTLS_RSA_SALT_LEN_ANY:128:0
Manuel Pégourié-Gonnard20422e92014-06-05 13:41:44 +0200540
541Verify ext RSA #7 (PKCS1 v2.1, wrong MGF1 alg != MSG hash alg)
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100542depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA256:MBEDTLS_MD_CAN_SHA1
Werner Lewis9802d362022-07-07 11:37:24 +0100543pk_rsa_verify_ext_test_vec:"c0719e9a8d5d838d861dc6f675c899d2b309a3a65bb9fe6b11e5afcbf9a2c0b1":MBEDTLS_MD_NONE:1024:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":"010001":"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":MBEDTLS_PK_RSASSA_PSS:MBEDTLS_MD_SHA1:MBEDTLS_RSA_SALT_LEN_ANY:128:MBEDTLS_ERR_RSA_INVALID_PADDING
Manuel Pégourié-Gonnard20422e92014-06-05 13:41:44 +0200544
545Verify ext RSA #8 (PKCS1 v2.1, RSASSA-PSS without options)
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100546depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA256
Werner Lewis3ccc1162022-08-01 15:11:48 +0100547pk_rsa_verify_ext_test_vec:"c0719e9a8d5d838d861dc6f675c899d2b309a3a65bb9fe6b11e5afcbf9a2c0b1":MBEDTLS_MD_SHA256:1024:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":"010001":"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":MBEDTLS_PK_RSASSA_PSS:-1:MBEDTLS_RSA_SALT_LEN_ANY:128:MBEDTLS_ERR_PK_BAD_INPUT_DATA
Manuel Pégourié-Gonnard20422e92014-06-05 13:41:44 +0200548
Hanno Beckerc21a8db2017-09-06 12:44:45 +0100549Verify ext RSA #9 (PKCS1 v1.5, RSA with options)
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100550depends_on:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_SHA256
Werner Lewis3ccc1162022-08-01 15:11:48 +0100551pk_rsa_verify_ext_test_vec:"c0719e9a8d5d838d861dc6f675c899d2b309a3a65bb9fe6b11e5afcbf9a2c0b1":MBEDTLS_MD_SHA256:1024:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":"010001":"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":MBEDTLS_PK_RSA:MBEDTLS_MD_SHA256:MBEDTLS_RSA_SALT_LEN_ANY:128:MBEDTLS_ERR_PK_BAD_INPUT_DATA
Manuel Pégourié-Gonnard20422e92014-06-05 13:41:44 +0200552
Hanno Beckerc21a8db2017-09-06 12:44:45 +0100553Verify ext RSA #10 (PKCS1 v1.5, RSA without options)
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100554depends_on:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_SHA256
Werner Lewis3ccc1162022-08-01 15:11:48 +0100555pk_rsa_verify_ext_test_vec:"c0719e9a8d5d838d861dc6f675c899d2b309a3a65bb9fe6b11e5afcbf9a2c0b1":MBEDTLS_MD_SHA256:1024:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":"010001":"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":MBEDTLS_PK_RSA:-1:MBEDTLS_RSA_SALT_LEN_ANY:128:MBEDTLS_ERR_RSA_VERIFY_FAILED
Manuel Pégourié-Gonnard20422e92014-06-05 13:41:44 +0200556
557Verify ext RSA #11 (PKCS1 v2.1, asking for ECDSA)
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100558depends_on:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_MD_CAN_SHA256
Werner Lewis3ccc1162022-08-01 15:11:48 +0100559pk_rsa_verify_ext_test_vec:"c0719e9a8d5d838d861dc6f675c899d2b309a3a65bb9fe6b11e5afcbf9a2c0b1":MBEDTLS_MD_SHA256:1024:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":"010001":"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":MBEDTLS_PK_ECDSA:-1:MBEDTLS_RSA_SALT_LEN_ANY:128:MBEDTLS_ERR_PK_TYPE_MISMATCH
Manuel Pégourié-Gonnard20422e92014-06-05 13:41:44 +0200560
561Verify ext RSA #12 (PKCS1 v1.5, good)
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100562depends_on:MBEDTLS_MD_CAN_SHA1:MBEDTLS_PKCS1_V15
Werner Lewis3ccc1162022-08-01 15:11:48 +0100563pk_rsa_verify_ext_test_vec:"6a8a1f225703fe39753c1017b43eec9e070a70b1":MBEDTLS_MD_SHA1:1024:"e28a13548525e5f36dccb24ecb7cc332cc689dfd64012604c9c7816d72a16c3f5fcdc0e86e7c03280b1c69b586ce0cd8aec722cc73a5d3b730310bf7dfebdc77ce5d94bbc369dc18a2f7b07bd505ab0f82224aef09fdc1e5063234255e0b3c40a52e9e8ae60898eb88a766bdd788fe9493d8fd86bcdd2884d5c06216c65469e5":"3":"5abc01f5de25b70867ff0c24e222c61f53c88daf42586fddcd56f3c4588f074be3c328056c063388688b6385a8167957c6e5355a510e005b8a851d69c96b36ec6036644078210e5d7d326f96365ee0648882921492bc7b753eb9c26cdbab37555f210df2ca6fec1b25b463d38b81c0dcea202022b04af5da58aa03d77be949b7":MBEDTLS_PK_RSA:-1:MBEDTLS_RSA_SALT_LEN_ANY:128:0
Andrzej Kurek8666df62022-02-15 08:23:02 -0500564
565Verify ext RSA #13 (PKCS1 v2.1, salt_len = max, sig_len too long)
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100566depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA256
Werner Lewis3ccc1162022-08-01 15:11:48 +0100567pk_rsa_verify_ext_test_vec:"c0719e9a8d5d838d861dc6f675c899d2b309a3a65bb9fe6b11e5afcbf9a2c0b1":MBEDTLS_MD_SHA256:1024:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":"010001":"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":MBEDTLS_PK_RSASSA_PSS:MBEDTLS_MD_SHA256:94:129:MBEDTLS_ERR_PK_SIG_LEN_MISMATCH
Manuel Pégourié-Gonnard20422e92014-06-05 13:41:44 +0200568
Andrzej Kurek32048a62022-02-16 06:14:17 -0500569Verify ext RSA #14 (PKCS1 v2.1, salt_len = ANY, sig_len too long)
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100570depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA256
Werner Lewis3ccc1162022-08-01 15:11:48 +0100571pk_rsa_verify_ext_test_vec:"c0719e9a8d5d838d861dc6f675c899d2b309a3a65bb9fe6b11e5afcbf9a2c0b1":MBEDTLS_MD_SHA256:1024:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":"010001":"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":MBEDTLS_PK_RSASSA_PSS:MBEDTLS_MD_SHA256:MBEDTLS_RSA_SALT_LEN_ANY:129:MBEDTLS_ERR_PK_SIG_LEN_MISMATCH
Andrzej Kurek32048a62022-02-16 06:14:17 -0500572
573Verify ext RSA #15 (PKCS1 v2.1, salt_len = ANY, sig_len too short)
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100574depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA256
Werner Lewis3ccc1162022-08-01 15:11:48 +0100575pk_rsa_verify_ext_test_vec:"c0719e9a8d5d838d861dc6f675c899d2b309a3a65bb9fe6b11e5afcbf9a2c0b1":MBEDTLS_MD_SHA256:1024:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":"010001":"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":MBEDTLS_PK_RSASSA_PSS:MBEDTLS_MD_SHA256:MBEDTLS_RSA_SALT_LEN_ANY:127:MBEDTLS_ERR_RSA_VERIFY_FAILED
Andrzej Kurek32048a62022-02-16 06:14:17 -0500576
577Verify ext RSA #16 (PKCS1 v2.1, salt_len = max, sig_len too short)
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100578depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA256
Werner Lewis3ccc1162022-08-01 15:11:48 +0100579pk_rsa_verify_ext_test_vec:"c0719e9a8d5d838d861dc6f675c899d2b309a3a65bb9fe6b11e5afcbf9a2c0b1":MBEDTLS_MD_SHA256:1024:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":"010001":"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":MBEDTLS_PK_RSASSA_PSS:MBEDTLS_MD_SHA256:94:127:MBEDTLS_ERR_RSA_VERIFY_FAILED
Andrzej Kurek32048a62022-02-16 06:14:17 -0500580
581Verify ext RSA #17 (PKCS1 v2.1, salt_len = ANY, wrong message, sig_len too short)
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100582depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA256
Werner Lewis3ccc1162022-08-01 15:11:48 +0100583pk_rsa_verify_ext_test_vec:"ae6e43dd387c25741e42fc3570cdfc52e4f51a2343294f3b677dfe01cd5339f6":MBEDTLS_MD_SHA256:1024:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":"010001":"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":MBEDTLS_PK_RSASSA_PSS:MBEDTLS_MD_SHA256:MBEDTLS_RSA_SALT_LEN_ANY:127:MBEDTLS_ERR_RSA_VERIFY_FAILED
Andrzej Kurek32048a62022-02-16 06:14:17 -0500584
585Verify ext RSA #18 (PKCS1 v2.1, salt_len = max, wrong message, sig_len too short)
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100586depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA256
Werner Lewis3ccc1162022-08-01 15:11:48 +0100587pk_rsa_verify_ext_test_vec:"ae6e43dd387c25741e42fc3570cdfc52e4f51a2343294f3b677dfe01cd5339f6":MBEDTLS_MD_SHA256:1024:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":"010001":"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":MBEDTLS_PK_RSASSA_PSS:MBEDTLS_MD_SHA256:94:127:MBEDTLS_ERR_RSA_VERIFY_FAILED
Andrzej Kurek32048a62022-02-16 06:14:17 -0500588
589Verify ext RSA #19 (PKCS1 v2.1, salt_len = ANY, wrong message, sig_len too long)
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100590depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA256
Werner Lewis3ccc1162022-08-01 15:11:48 +0100591pk_rsa_verify_ext_test_vec:"ae6e43dd387c25741e42fc3570cdfc52e4f51a2343294f3b677dfe01cd5339f6":MBEDTLS_MD_SHA256:1024:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":"010001":"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":MBEDTLS_PK_RSASSA_PSS:MBEDTLS_MD_SHA256:MBEDTLS_RSA_SALT_LEN_ANY:129:MBEDTLS_ERR_RSA_VERIFY_FAILED
Andrzej Kurek32048a62022-02-16 06:14:17 -0500592
593Verify ext RSA #20 (PKCS1 v2.1, salt_len = max, wrong message, sig_len too long)
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100594depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA256
Werner Lewis3ccc1162022-08-01 15:11:48 +0100595pk_rsa_verify_ext_test_vec:"ae6e43dd387c25741e42fc3570cdfc52e4f51a2343294f3b677dfe01cd5339f6":MBEDTLS_MD_SHA256:1024:"00dd118a9f99bab068ca2aea3b6a6d5997ed4ec954e40deecea07da01eaae80ec2bb1340db8a128e891324a5c5f5fad8f590d7c8cacbc5fe931dafda1223735279461abaa0572b761631b3a8afe7389b088b63993a0a25ee45d21858bab9931aedd4589a631b37fcf714089f856549f359326dd1e0e86dde52ed66b4a90bda4095":"010001":"0d2bdb0456a3d651d5bd48a4204493898f72cf1aaddd71387cc058bc3f4c235ea6be4010fd61b28e1fbb275462b53775c04be9022d38b6a2e0387dddba86a3f8554d2858044a59fddbd594753fc056fe33c8daddb85dc70d164690b1182209ff84824e0be10e35c379f2f378bf176a9f7cb94d95e44d90276a298c8810f741c9":MBEDTLS_PK_RSASSA_PSS:MBEDTLS_MD_SHA256:94:129:MBEDTLS_ERR_RSA_VERIFY_FAILED
Andrzej Kurek32048a62022-02-16 06:14:17 -0500596
Manuel Pégourié-Gonnard70bdadf2014-11-06 16:51:20 +0100597Check pair #1 (EC, OK)
Valerio Settidb6b4db2023-09-01 09:20:51 +0200598depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_PEM_PARSE_C
David Horstmann9c4dd4e2024-06-11 17:44:00 +0100599mbedtls_pk_check_pair:"../framework/data_files/ec_256_pub.pem":"../framework/data_files/ec_256_prv.pem":0
Manuel Pégourié-Gonnard70bdadf2014-11-06 16:51:20 +0100600
601Check pair #2 (EC, bad)
Valerio Settidb6b4db2023-09-01 09:20:51 +0200602depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_PEM_PARSE_C
David Horstmann9c4dd4e2024-06-11 17:44:00 +0100603mbedtls_pk_check_pair:"../framework/data_files/ec_256_pub.pem":"../framework/data_files/server5.key":MBEDTLS_ERR_ECP_BAD_INPUT_DATA
Manuel Pégourié-Gonnard70bdadf2014-11-06 16:51:20 +0100604
605Check pair #3 (RSA, OK)
Gilles Peskine58e5d802022-10-11 20:57:38 +0200606depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_PEM_PARSE_C
David Horstmann9c4dd4e2024-06-11 17:44:00 +0100607mbedtls_pk_check_pair:"../framework/data_files/server1.pubkey":"../framework/data_files/server1.key":0
Manuel Pégourié-Gonnard70bdadf2014-11-06 16:51:20 +0100608
609Check pair #4 (RSA, bad)
Gilles Peskine58e5d802022-10-11 20:57:38 +0200610depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_PEM_PARSE_C
David Horstmann9c4dd4e2024-06-11 17:44:00 +0100611mbedtls_pk_check_pair:"../framework/data_files/server1.pubkey":"../framework/data_files/server2.key":MBEDTLS_ERR_RSA_KEY_CHECK_FAILED
Manuel Pégourié-Gonnard70bdadf2014-11-06 16:51:20 +0100612
613Check pair #5 (RSA vs EC)
Valerio Settidb6b4db2023-09-01 09:20:51 +0200614depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_RSA_C:MBEDTLS_PEM_PARSE_C
David Horstmann9c4dd4e2024-06-11 17:44:00 +0100615mbedtls_pk_check_pair:"../framework/data_files/ec_256_pub.pem":"../framework/data_files/server1.key":MBEDTLS_ERR_PK_TYPE_MISMATCH
Manuel Pégourié-Gonnard70bdadf2014-11-06 16:51:20 +0100616
Andres AG5c79d252017-02-15 10:52:32 +0000617RSA hash_len overflow (size_t vs unsigned int)
618depends_on:MBEDTLS_RSA_C:MBEDTLS_HAVE_INT64
619pk_rsa_overflow:
Manuel Pégourié-Gonnardc4ee9ac2017-05-08 10:09:36 +0200620
Manuel Pégourié-Gonnardb889d3e2017-08-17 10:25:18 +0200621ECDSA restartable sign/verify: ECDSA, max_ops=0 (disabled)
Valerio Settidb6b4db2023-09-01 09:20:51 +0200622depends_on:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_MD_CAN_SHA256
Manuel Pégourié-Gonnard4608c482022-07-18 10:55:56 +0200623pk_sign_verify_restart:MBEDTLS_PK_ECDSA:MBEDTLS_ECP_DP_SECP256R1:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":"60FED4BA255A9D31C961EB74C6356D68C049B8923B61FA6CE669622E60F29FB6":"7903FE1008B8BC99A41AE9E95628BC64F2F1B20C2D7E9F5177A3C294D4462299":MBEDTLS_MD_SHA256:"9f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08":"3045022100f1abb023518351cd71d881567b1ea663ed3efcf6c5132b354f28d3b0b7d383670220019f4113742a2b14bd25926b49c649155f267e60d3814b4c0cc84250e46f0083":0:0:0
Manuel Pégourié-Gonnardc4ee9ac2017-05-08 10:09:36 +0200624
Manuel Pégourié-Gonnardb889d3e2017-08-17 10:25:18 +0200625ECDSA restartable sign/verify: ECKEY, max_ops=0 (disabled)
Valerio Settidb6b4db2023-09-01 09:20:51 +0200626depends_on:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_MD_CAN_SHA256
Manuel Pégourié-Gonnard4608c482022-07-18 10:55:56 +0200627pk_sign_verify_restart:MBEDTLS_PK_ECKEY:MBEDTLS_ECP_DP_SECP256R1:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":"60FED4BA255A9D31C961EB74C6356D68C049B8923B61FA6CE669622E60F29FB6":"7903FE1008B8BC99A41AE9E95628BC64F2F1B20C2D7E9F5177A3C294D4462299":MBEDTLS_MD_SHA256:"9f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08":"3045022100f1abb023518351cd71d881567b1ea663ed3efcf6c5132b354f28d3b0b7d383670220019f4113742a2b14bd25926b49c649155f267e60d3814b4c0cc84250e46f0083":0:0:0
Manuel Pégourié-Gonnard1f596062017-05-09 10:42:40 +0200628
629ECDSA restartable sign/verify: ECDSA, max_ops=1
Valerio Settidb6b4db2023-09-01 09:20:51 +0200630depends_on:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_MD_CAN_SHA256
Manuel Pégourié-Gonnard4608c482022-07-18 10:55:56 +0200631pk_sign_verify_restart:MBEDTLS_PK_ECDSA:MBEDTLS_ECP_DP_SECP256R1:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":"60FED4BA255A9D31C961EB74C6356D68C049B8923B61FA6CE669622E60F29FB6":"7903FE1008B8BC99A41AE9E95628BC64F2F1B20C2D7E9F5177A3C294D4462299":MBEDTLS_MD_SHA256:"9f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08":"3045022100f1abb023518351cd71d881567b1ea663ed3efcf6c5132b354f28d3b0b7d383670220019f4113742a2b14bd25926b49c649155f267e60d3814b4c0cc84250e46f0083":1:1:10000
Manuel Pégourié-Gonnard1f596062017-05-09 10:42:40 +0200632
633ECDSA restartable sign/verify: ECKEY, max_ops=1
Valerio Settidb6b4db2023-09-01 09:20:51 +0200634depends_on:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_MD_CAN_SHA256
Manuel Pégourié-Gonnard4608c482022-07-18 10:55:56 +0200635pk_sign_verify_restart:MBEDTLS_PK_ECKEY:MBEDTLS_ECP_DP_SECP256R1:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":"60FED4BA255A9D31C961EB74C6356D68C049B8923B61FA6CE669622E60F29FB6":"7903FE1008B8BC99A41AE9E95628BC64F2F1B20C2D7E9F5177A3C294D4462299":MBEDTLS_MD_SHA256:"9f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08":"3045022100f1abb023518351cd71d881567b1ea663ed3efcf6c5132b354f28d3b0b7d383670220019f4113742a2b14bd25926b49c649155f267e60d3814b4c0cc84250e46f0083":1:1:10000
Manuel Pégourié-Gonnard1f596062017-05-09 10:42:40 +0200636
637ECDSA restartable sign/verify: ECDSA, max_ops=10000
Valerio Settidb6b4db2023-09-01 09:20:51 +0200638depends_on:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_MD_CAN_SHA256
Manuel Pégourié-Gonnard4608c482022-07-18 10:55:56 +0200639pk_sign_verify_restart:MBEDTLS_PK_ECDSA:MBEDTLS_ECP_DP_SECP256R1:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":"60FED4BA255A9D31C961EB74C6356D68C049B8923B61FA6CE669622E60F29FB6":"7903FE1008B8BC99A41AE9E95628BC64F2F1B20C2D7E9F5177A3C294D4462299":MBEDTLS_MD_SHA256:"9f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08":"3045022100f1abb023518351cd71d881567b1ea663ed3efcf6c5132b354f28d3b0b7d383670220019f4113742a2b14bd25926b49c649155f267e60d3814b4c0cc84250e46f0083":10000:0:0
Manuel Pégourié-Gonnard1f596062017-05-09 10:42:40 +0200640
641ECDSA restartable sign/verify: ECKEY, max_ops=10000
Valerio Settidb6b4db2023-09-01 09:20:51 +0200642depends_on:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_MD_CAN_SHA256
Manuel Pégourié-Gonnard4608c482022-07-18 10:55:56 +0200643pk_sign_verify_restart:MBEDTLS_PK_ECKEY:MBEDTLS_ECP_DP_SECP256R1:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":"60FED4BA255A9D31C961EB74C6356D68C049B8923B61FA6CE669622E60F29FB6":"7903FE1008B8BC99A41AE9E95628BC64F2F1B20C2D7E9F5177A3C294D4462299":MBEDTLS_MD_SHA256:"9f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08":"3045022100f1abb023518351cd71d881567b1ea663ed3efcf6c5132b354f28d3b0b7d383670220019f4113742a2b14bd25926b49c649155f267e60d3814b4c0cc84250e46f0083":10000:0:0
Manuel Pégourié-Gonnard1f596062017-05-09 10:42:40 +0200644
645ECDSA restartable sign/verify: ECDSA, max_ops=250
Valerio Settidb6b4db2023-09-01 09:20:51 +0200646depends_on:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_MD_CAN_SHA256
Manuel Pégourié-Gonnard4608c482022-07-18 10:55:56 +0200647pk_sign_verify_restart:MBEDTLS_PK_ECDSA:MBEDTLS_ECP_DP_SECP256R1:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":"60FED4BA255A9D31C961EB74C6356D68C049B8923B61FA6CE669622E60F29FB6":"7903FE1008B8BC99A41AE9E95628BC64F2F1B20C2D7E9F5177A3C294D4462299":MBEDTLS_MD_SHA256:"9f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08":"3045022100f1abb023518351cd71d881567b1ea663ed3efcf6c5132b354f28d3b0b7d383670220019f4113742a2b14bd25926b49c649155f267e60d3814b4c0cc84250e46f0083":250:2:64
Manuel Pégourié-Gonnard1f596062017-05-09 10:42:40 +0200648
Manuel Pégourié-Gonnardb889d3e2017-08-17 10:25:18 +0200649ECDSA restartable sign/verify: ECKEY, max_ops=250
Valerio Settidb6b4db2023-09-01 09:20:51 +0200650depends_on:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_MD_CAN_SHA256
Manuel Pégourié-Gonnard4608c482022-07-18 10:55:56 +0200651pk_sign_verify_restart:MBEDTLS_PK_ECKEY:MBEDTLS_ECP_DP_SECP256R1:"C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721":"60FED4BA255A9D31C961EB74C6356D68C049B8923B61FA6CE669622E60F29FB6":"7903FE1008B8BC99A41AE9E95628BC64F2F1B20C2D7E9F5177A3C294D4462299":MBEDTLS_MD_SHA256:"9f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08":"3045022100f1abb023518351cd71d881567b1ea663ed3efcf6c5132b354f28d3b0b7d383670220019f4113742a2b14bd25926b49c649155f267e60d3814b4c0cc84250e46f0083":250:2:64
Manuel Pégourié-Gonnard36867712018-10-31 16:22:49 +0100652
Gilles Peskine33b1c692019-12-19 00:09:47 +0100653PSA wrapped sign: SECP256R1
Valerio Settidb6b4db2023-09-01 09:20:51 +0200654depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256R1
Valerio Settiaa9cc492024-03-19 15:43:52 +0100655pk_psa_sign:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):256:0
Gilles Peskine33b1c692019-12-19 00:09:47 +0100656
657PSA wrapped sign: SECP384R1
Valerio Settidb6b4db2023-09-01 09:20:51 +0200658depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP384R1
Valerio Settiaa9cc492024-03-19 15:43:52 +0100659pk_psa_sign:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):384:0
Gilles Peskine33b1c692019-12-19 00:09:47 +0100660
661PSA wrapped sign: SECP521R1
Valerio Settidb6b4db2023-09-01 09:20:51 +0200662depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP521R1
Valerio Settiaa9cc492024-03-19 15:43:52 +0100663pk_psa_sign:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):521:0
Gilles Peskine33b1c692019-12-19 00:09:47 +0100664
665PSA wrapped sign: SECP192K1
Valerio Settidb6b4db2023-09-01 09:20:51 +0200666depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP192K1
Valerio Settiaa9cc492024-03-19 15:43:52 +0100667pk_psa_sign:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_K1):192:0
Gilles Peskine33b1c692019-12-19 00:09:47 +0100668
669## Currently buggy: https://github.com/ARMmbed/mbed-crypto/issues/336
670# PSA wrapped sign: SECP224K1
Valerio Settidb6b4db2023-09-01 09:20:51 +0200671# depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP224K1
Valerio Settiaa9cc492024-03-19 15:43:52 +0100672# pk_psa_sign:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_K1):224:0
Gilles Peskine33b1c692019-12-19 00:09:47 +0100673
674PSA wrapped sign: SECP256K1
Valerio Settidb6b4db2023-09-01 09:20:51 +0200675depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256K1
Valerio Settiaa9cc492024-03-19 15:43:52 +0100676pk_psa_sign:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_K1):256:0
Gilles Peskine33b1c692019-12-19 00:09:47 +0100677
678PSA wrapped sign: BP256R1
Valerio Settidb6b4db2023-09-01 09:20:51 +0200679depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_BP256R1
Valerio Settiaa9cc492024-03-19 15:43:52 +0100680pk_psa_sign:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_BRAINPOOL_P_R1):256:0
Gilles Peskine33b1c692019-12-19 00:09:47 +0100681
682PSA wrapped sign: BP384R1
Valerio Settidb6b4db2023-09-01 09:20:51 +0200683depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_BP384R1
Valerio Settiaa9cc492024-03-19 15:43:52 +0100684pk_psa_sign:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_BRAINPOOL_P_R1):384:0
Gilles Peskine33b1c692019-12-19 00:09:47 +0100685
686PSA wrapped sign: BP512R1
Valerio Settidb6b4db2023-09-01 09:20:51 +0200687depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_BP512R1
Valerio Settiaa9cc492024-03-19 15:43:52 +0100688pk_psa_sign:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_BRAINPOOL_P_R1):512:0
Jerry Yu1f45b672022-03-12 19:24:50 +0800689
Neil Armstrong67fc0362022-03-15 14:48:52 +0100690PSA wrapped sign: RSA PKCS1 v1.5
Valerio Setti09e98722024-04-02 11:33:22 +0200691depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Valerio Settiaa9cc492024-03-19 15:43:52 +0100692pk_psa_sign:PSA_KEY_TYPE_RSA_KEY_PAIR:1024:MBEDTLS_RSA_PKCS_V15
693
694PSA wrapped sign: RSA PKCS1 v2.1
Valerio Setti09e98722024-04-02 11:33:22 +0200695depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V21
Valerio Settiaa9cc492024-03-19 15:43:52 +0100696pk_psa_sign:PSA_KEY_TYPE_RSA_KEY_PAIR:1024:MBEDTLS_RSA_PKCS_V21
Neil Armstrong67fc0362022-03-15 14:48:52 +0100697
Tomi Fontanilles81746622023-07-16 13:06:06 +0300698PK sign ext: RSA2048, PK_RSA, MD_SHA256
Valerio Setti79033852024-04-16 16:00:35 +0200699depends_on:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_SHA256:MBEDTLS_RSA_C
Tomi Fontanilles81746622023-07-16 13:06:06 +0300700pk_sign_ext:MBEDTLS_PK_RSA:2048:MBEDTLS_PK_RSA:MBEDTLS_MD_SHA256
Jerry Yu1f45b672022-03-12 19:24:50 +0800701
Tomi Fontanilles81746622023-07-16 13:06:06 +0300702PK sign ext: RSA2048, PK_RSASSA_PSS, MD_SHA256
Valerio Setti79033852024-04-16 16:00:35 +0200703depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA256:MBEDTLS_RSA_C
Tomi Fontanilles81746622023-07-16 13:06:06 +0300704pk_sign_ext:MBEDTLS_PK_RSA:2048:MBEDTLS_PK_RSASSA_PSS:MBEDTLS_MD_SHA256
Jerry Yue2c88252022-03-22 21:18:52 +0800705
Tomi Fontanilles81746622023-07-16 13:06:06 +0300706PK sign ext: RSA2048, PK_RSA, MD_SHA384
Valerio Setti79033852024-04-16 16:00:35 +0200707depends_on:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_SHA384:MBEDTLS_RSA_C
Tomi Fontanilles81746622023-07-16 13:06:06 +0300708pk_sign_ext:MBEDTLS_PK_RSA:2048:MBEDTLS_PK_RSA:MBEDTLS_MD_SHA384
Jerry Yue2c88252022-03-22 21:18:52 +0800709
Tomi Fontanilles81746622023-07-16 13:06:06 +0300710PK sign ext: RSA2048, PK_RSASSA_PSS, MD_SHA384
Valerio Setti79033852024-04-16 16:00:35 +0200711depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA384:MBEDTLS_RSA_C
Tomi Fontanilles81746622023-07-16 13:06:06 +0300712pk_sign_ext:MBEDTLS_PK_RSA:2048:MBEDTLS_PK_RSASSA_PSS:MBEDTLS_MD_SHA384
Jerry Yue2c88252022-03-22 21:18:52 +0800713
Tomi Fontanilles81746622023-07-16 13:06:06 +0300714PK sign ext: RSA2048, PK_RSA, MD_SHA512
Valerio Setti79033852024-04-16 16:00:35 +0200715depends_on:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_SHA512:MBEDTLS_RSA_C
Tomi Fontanilles81746622023-07-16 13:06:06 +0300716pk_sign_ext:MBEDTLS_PK_RSA:2048:MBEDTLS_PK_RSA:MBEDTLS_MD_SHA512
Jerry Yue2c88252022-03-22 21:18:52 +0800717
Tomi Fontanilles81746622023-07-16 13:06:06 +0300718PK sign ext: RSA2048, PK_RSASSA_PSS, MD_SHA512
Valerio Setti79033852024-04-16 16:00:35 +0200719depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA512:MBEDTLS_RSA_C
Tomi Fontanilles81746622023-07-16 13:06:06 +0300720pk_sign_ext:MBEDTLS_PK_RSA:2048:MBEDTLS_PK_RSASSA_PSS:MBEDTLS_MD_SHA512
Jerry Yue2c88252022-03-22 21:18:52 +0800721
Tomi Fontanilles81746622023-07-16 13:06:06 +0300722PK sign ext: SECP256R1, PK_ECDSA, MD_SHA256
Valerio Settidb6b4db2023-09-01 09:20:51 +0200723depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_MD_CAN_SHA256
Tomi Fontanilles81746622023-07-16 13:06:06 +0300724pk_sign_ext:MBEDTLS_PK_ECDSA:MBEDTLS_ECP_DP_SECP256R1:MBEDTLS_PK_ECDSA:MBEDTLS_MD_SHA256
Jerry Yue2c88252022-03-22 21:18:52 +0800725
Tomi Fontanilles81746622023-07-16 13:06:06 +0300726PK sign ext: SECP384R1, PK_ECDSA, MD_SHA384
Valerio Settidb6b4db2023-09-01 09:20:51 +0200727depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP384R1:MBEDTLS_MD_CAN_SHA384
Tomi Fontanilles81746622023-07-16 13:06:06 +0300728pk_sign_ext:MBEDTLS_PK_ECDSA:MBEDTLS_ECP_DP_SECP384R1:MBEDTLS_PK_ECDSA:MBEDTLS_MD_SHA384
Jerry Yue2c88252022-03-22 21:18:52 +0800729
Tomi Fontanilles81746622023-07-16 13:06:06 +0300730PK sign ext: SECP521R1, PK_ECDSA, MD_SHA512
Valerio Settidb6b4db2023-09-01 09:20:51 +0200731depends_on:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_ECP_HAVE_SECP521R1:MBEDTLS_MD_CAN_SHA512
Tomi Fontanilles81746622023-07-16 13:06:06 +0300732pk_sign_ext:MBEDTLS_PK_ECDSA:MBEDTLS_ECP_DP_SECP521R1:MBEDTLS_PK_ECDSA:MBEDTLS_MD_SHA512
Jerry Yu92339d22022-03-22 13:50:40 +0800733
Tomi Fontanilles81746622023-07-16 13:06:06 +0300734PSA wrapped sign ext: RSA2048, PK_RSA, MD_SHA256
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100735depends_on:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_SHA256:MBEDTLS_RSA_C
Neil Armstrong999930e2022-04-12 15:12:43 +0200736pk_psa_wrap_sign_ext:MBEDTLS_PK_RSA:2048:MBEDTLS_PK_RSA:MBEDTLS_MD_SHA256
737
Tomi Fontanilles81746622023-07-16 13:06:06 +0300738PSA wrapped sign ext: RSA2048, PK_RSASSA_PSS, MD_SHA256
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100739depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA256:MBEDTLS_RSA_C
Neil Armstrong999930e2022-04-12 15:12:43 +0200740pk_psa_wrap_sign_ext:MBEDTLS_PK_RSA:2048:MBEDTLS_PK_RSASSA_PSS:MBEDTLS_MD_SHA256
741
Tomi Fontanilles81746622023-07-16 13:06:06 +0300742PSA wrapped sign ext: RSA2048, PK_RSA, MD_SHA384
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100743depends_on:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_SHA384:MBEDTLS_RSA_C
Neil Armstrong999930e2022-04-12 15:12:43 +0200744pk_psa_wrap_sign_ext:MBEDTLS_PK_RSA:2048:MBEDTLS_PK_RSA:MBEDTLS_MD_SHA384
745
Tomi Fontanilles81746622023-07-16 13:06:06 +0300746PSA wrapped sign ext: RSA2048, PK_RSASSA_PSS, MD_SHA384
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100747depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA384:MBEDTLS_RSA_C
Neil Armstrong999930e2022-04-12 15:12:43 +0200748pk_psa_wrap_sign_ext:MBEDTLS_PK_RSA:2048:MBEDTLS_PK_RSASSA_PSS:MBEDTLS_MD_SHA384
749
Tomi Fontanilles81746622023-07-16 13:06:06 +0300750PSA wrapped sign ext: RSA2048, PK_RSA, MD_SHA512
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100751depends_on:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_SHA512:MBEDTLS_RSA_C
Neil Armstrong999930e2022-04-12 15:12:43 +0200752pk_psa_wrap_sign_ext:MBEDTLS_PK_RSA:2048:MBEDTLS_PK_RSA:MBEDTLS_MD_SHA512
753
Tomi Fontanilles81746622023-07-16 13:06:06 +0300754PSA wrapped sign ext: RSA2048, PK_RSASSA_PSS, MD_SHA512
Manuel Pégourié-Gonnard0b8095d2023-03-17 11:42:03 +0100755depends_on:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA512:MBEDTLS_RSA_C
Neil Armstrong999930e2022-04-12 15:12:43 +0200756pk_psa_wrap_sign_ext:MBEDTLS_PK_RSA:2048:MBEDTLS_PK_RSASSA_PSS:MBEDTLS_MD_SHA512
Gilles Peskine0b172552024-01-18 14:11:26 +0100757
758PSA attributes for pk: NONE (bad)
Gilles Peskine68a287d2024-02-15 13:30:55 +0100759pk_get_psa_attributes_fail:MBEDTLS_PK_NONE:FROM_PUBLIC:PSA_KEY_USAGE_SIGN_MESSAGE:MBEDTLS_ERR_PK_BAD_INPUT_DATA
Gilles Peskine0b172552024-01-18 14:11:26 +0100760
761# There is a (negative) test for pk_type=MBEDTLS_PK_RSA_ALT in pk_rsa_alt().
Gilles Peskine6ea18362024-01-18 14:16:27 +0100762
Gilles Peskine94e3a872024-01-18 19:23:39 +0100763# Bad usage due to not specifying sign/crypt/derive.
764PSA attributes for pk: RSA usage=0 (bad)
Valerio Setti09e98722024-04-02 11:33:22 +0200765depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskine68a287d2024-02-15 13:30:55 +0100766pk_get_psa_attributes_fail:MBEDTLS_PK_RSA:FROM_PAIR:0:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskine94e3a872024-01-18 19:23:39 +0100767
768# Bad usage due to not specifying sign/crypt/derive.
769PSA attributes for pk: RSA usage=EXPORT (bad)
Valerio Setti09e98722024-04-02 11:33:22 +0200770depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskine68a287d2024-02-15 13:30:55 +0100771pk_get_psa_attributes_fail:MBEDTLS_PK_RSA:FROM_PAIR:PSA_KEY_USAGE_EXPORT:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskine94e3a872024-01-18 19:23:39 +0100772
773# This usage could make sense, but is not currently supported.
774PSA attributes for pk: RSA usage=DECRYPT|EXPORT (bad)
Valerio Setti09e98722024-04-02 11:33:22 +0200775depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskine68a287d2024-02-15 13:30:55 +0100776pk_get_psa_attributes_fail:MBEDTLS_PK_RSA:FROM_PAIR:PSA_KEY_USAGE_DECRYPT | PSA_KEY_USAGE_EXPORT:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskine94e3a872024-01-18 19:23:39 +0100777
Gilles Peskine2e548542024-02-01 20:50:00 +0100778# Bad usage due to specifying more than one of sign/crypt/derive.
Gilles Peskine94e3a872024-01-18 19:23:39 +0100779PSA attributes for pk: RSA usage=DECRYPT|SIGN_MESSAGE (bad)
Valerio Setti09e98722024-04-02 11:33:22 +0200780depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskine68a287d2024-02-15 13:30:55 +0100781pk_get_psa_attributes_fail:MBEDTLS_PK_RSA:FROM_PAIR:PSA_KEY_USAGE_DECRYPT | PSA_KEY_USAGE_SIGN_MESSAGE:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskine94e3a872024-01-18 19:23:39 +0100782
783# This usage could make sense, but is not currently supported.
784PSA attributes for pk: RSA usage=SIGN_MESSAGE|SIGN_HASH (bad)
Valerio Setti09e98722024-04-02 11:33:22 +0200785depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskine68a287d2024-02-15 13:30:55 +0100786pk_get_psa_attributes_fail:MBEDTLS_PK_RSA:FROM_PAIR:PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_SIGN_HASH:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskine94e3a872024-01-18 19:23:39 +0100787
788# This usage could make sense, but is not currently supported.
789PSA attributes for pk: RSA usage=SIGN_MESSAGE|VERIFY_MESSAGE (bad)
Valerio Setti09e98722024-04-02 11:33:22 +0200790depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskine68a287d2024-02-15 13:30:55 +0100791pk_get_psa_attributes_fail:MBEDTLS_PK_RSA:FROM_PAIR:PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_VERIFY_MESSAGE:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskine94e3a872024-01-18 19:23:39 +0100792
Gilles Peskine6ea18362024-01-18 14:16:27 +0100793PSA attributes for pk: RSA v15 pair DECRYPT
Valerio Setti09e98722024-04-02 11:33:22 +0200794depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskine68a287d2024-02-15 13:30:55 +0100795pk_get_psa_attributes:MBEDTLS_PK_RSA:FROM_PAIR:PSA_KEY_USAGE_DECRYPT:1:PSA_ALG_RSA_PKCS1V15_CRYPT
Gilles Peskine6ea18362024-01-18 14:16:27 +0100796
797PSA attributes for pk: RSA v21 SHA-256 pair DECRYPT
Valerio Setti09e98722024-04-02 11:33:22 +0200798depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA256
Gilles Peskine68a287d2024-02-15 13:30:55 +0100799pk_rsa_v21_get_psa_attributes:MBEDTLS_MD_SHA256:FROM_PAIR:PSA_KEY_USAGE_DECRYPT:1:PSA_ALG_RSA_OAEP(PSA_ALG_SHA_256)
Gilles Peskine6ea18362024-01-18 14:16:27 +0100800
801PSA attributes for pk: RSA v21 SHA-512 pair DECRYPT
Valerio Setti09e98722024-04-02 11:33:22 +0200802depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA512
Gilles Peskine68a287d2024-02-15 13:30:55 +0100803pk_rsa_v21_get_psa_attributes:MBEDTLS_MD_SHA512:FROM_PAIR:PSA_KEY_USAGE_DECRYPT:1:PSA_ALG_RSA_OAEP(PSA_ALG_SHA_512)
Gilles Peskine6ea18362024-01-18 14:16:27 +0100804
805PSA attributes for pk: RSA v15 pair->public ENCRYPT
Valerio Setti09e98722024-04-02 11:33:22 +0200806depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskine68a287d2024-02-15 13:30:55 +0100807pk_get_psa_attributes:MBEDTLS_PK_RSA:FROM_PAIR:PSA_KEY_USAGE_ENCRYPT:0:PSA_ALG_RSA_PKCS1V15_CRYPT
Gilles Peskine6ea18362024-01-18 14:16:27 +0100808
809PSA attributes for pk: RSA v21 SHA-256 pair->public ENCRYPT
Valerio Setti09e98722024-04-02 11:33:22 +0200810depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA256
Gilles Peskine68a287d2024-02-15 13:30:55 +0100811pk_rsa_v21_get_psa_attributes:MBEDTLS_MD_SHA256:FROM_PAIR:PSA_KEY_USAGE_ENCRYPT:0:PSA_ALG_RSA_OAEP(PSA_ALG_SHA_256)
Gilles Peskine6ea18362024-01-18 14:16:27 +0100812
813PSA attributes for pk: RSA v21 SHA-512 pair->public ENCRYPT
Valerio Setti09e98722024-04-02 11:33:22 +0200814depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA512
Gilles Peskine68a287d2024-02-15 13:30:55 +0100815pk_rsa_v21_get_psa_attributes:MBEDTLS_MD_SHA512:FROM_PAIR:PSA_KEY_USAGE_ENCRYPT:0:PSA_ALG_RSA_OAEP(PSA_ALG_SHA_512)
Gilles Peskine6ea18362024-01-18 14:16:27 +0100816
817PSA attributes for pk: RSA v15 public ENCRYPT
Valerio Setti09e98722024-04-02 11:33:22 +0200818depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskine68a287d2024-02-15 13:30:55 +0100819pk_get_psa_attributes:MBEDTLS_PK_RSA:FROM_PUBLIC:PSA_KEY_USAGE_ENCRYPT:0:PSA_ALG_RSA_PKCS1V15_CRYPT
Gilles Peskine6ea18362024-01-18 14:16:27 +0100820
821PSA attributes for pk: RSA v21 SHA-256 public ENCRYPT
Valerio Setti09e98722024-04-02 11:33:22 +0200822depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA256
Gilles Peskine68a287d2024-02-15 13:30:55 +0100823pk_rsa_v21_get_psa_attributes:MBEDTLS_MD_SHA256:FROM_PUBLIC:PSA_KEY_USAGE_ENCRYPT:0:PSA_ALG_RSA_OAEP(PSA_ALG_SHA_256)
Gilles Peskine6ea18362024-01-18 14:16:27 +0100824
825PSA attributes for pk: RSA v21 SHA-512 public ENCRYPT
Valerio Setti09e98722024-04-02 11:33:22 +0200826depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA512
Gilles Peskine68a287d2024-02-15 13:30:55 +0100827pk_rsa_v21_get_psa_attributes:MBEDTLS_MD_SHA512:FROM_PUBLIC:PSA_KEY_USAGE_ENCRYPT:0:PSA_ALG_RSA_OAEP(PSA_ALG_SHA_512)
Gilles Peskine6ea18362024-01-18 14:16:27 +0100828
829PSA attributes for pk: RSA v15 public DECRYPT (bad)
Valerio Setti09e98722024-04-02 11:33:22 +0200830depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskine68a287d2024-02-15 13:30:55 +0100831pk_get_psa_attributes_fail:MBEDTLS_PK_RSA:FROM_PUBLIC:PSA_KEY_USAGE_DECRYPT:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskine6ea18362024-01-18 14:16:27 +0100832
833PSA attributes for pk: RSA v15 pair SIGN_MESSAGE
Valerio Setti09e98722024-04-02 11:33:22 +0200834depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskine68a287d2024-02-15 13:30:55 +0100835pk_get_psa_attributes:MBEDTLS_PK_RSA:FROM_PAIR:PSA_KEY_USAGE_SIGN_MESSAGE:1:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_ANY_HASH)
Gilles Peskine6ea18362024-01-18 14:16:27 +0100836
837PSA attributes for pk: RSA v21 SHA-256 pair SIGN_MESSAGE
Valerio Setti09e98722024-04-02 11:33:22 +0200838depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V21
Gilles Peskine68a287d2024-02-15 13:30:55 +0100839pk_rsa_v21_get_psa_attributes:MBEDTLS_MD_NONE:FROM_PAIR:PSA_KEY_USAGE_SIGN_MESSAGE:1:PSA_ALG_RSA_PSS_ANY_SALT(PSA_ALG_ANY_HASH)
Gilles Peskine6ea18362024-01-18 14:16:27 +0100840
841PSA attributes for pk: RSA v15 pair SIGN_HASH
Valerio Setti09e98722024-04-02 11:33:22 +0200842depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskine68a287d2024-02-15 13:30:55 +0100843pk_get_psa_attributes:MBEDTLS_PK_RSA:FROM_PAIR:PSA_KEY_USAGE_SIGN_HASH:1:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_ANY_HASH)
Gilles Peskine6ea18362024-01-18 14:16:27 +0100844
845PSA attributes for pk: RSA v21 SHA-256 pair SIGN_HASH
Valerio Setti09e98722024-04-02 11:33:22 +0200846depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V21
Gilles Peskine68a287d2024-02-15 13:30:55 +0100847pk_rsa_v21_get_psa_attributes:MBEDTLS_MD_NONE:FROM_PAIR:PSA_KEY_USAGE_SIGN_HASH:1:PSA_ALG_RSA_PSS_ANY_SALT(PSA_ALG_ANY_HASH)
Gilles Peskine6ea18362024-01-18 14:16:27 +0100848
849PSA attributes for pk: RSA v15 pair->public VERIFY_MESSAGE
Valerio Setti09e98722024-04-02 11:33:22 +0200850depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskine68a287d2024-02-15 13:30:55 +0100851pk_get_psa_attributes:MBEDTLS_PK_RSA:FROM_PAIR:PSA_KEY_USAGE_VERIFY_MESSAGE:0:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_ANY_HASH)
Gilles Peskine6ea18362024-01-18 14:16:27 +0100852
853PSA attributes for pk: RSA v21 SHA-256 pair->public VERIFY_MESSAGE
Valerio Setti09e98722024-04-02 11:33:22 +0200854depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V21
Gilles Peskine68a287d2024-02-15 13:30:55 +0100855pk_rsa_v21_get_psa_attributes:MBEDTLS_MD_NONE:FROM_PAIR:PSA_KEY_USAGE_VERIFY_MESSAGE:0:PSA_ALG_RSA_PSS_ANY_SALT(PSA_ALG_ANY_HASH)
Gilles Peskine6ea18362024-01-18 14:16:27 +0100856
857PSA attributes for pk: RSA v15 pair->public VERIFY_HASH
Valerio Setti09e98722024-04-02 11:33:22 +0200858depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskine68a287d2024-02-15 13:30:55 +0100859pk_get_psa_attributes:MBEDTLS_PK_RSA:FROM_PAIR:PSA_KEY_USAGE_VERIFY_HASH:0:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_ANY_HASH)
Gilles Peskine6ea18362024-01-18 14:16:27 +0100860
861PSA attributes for pk: RSA v21 SHA-256 pair->public VERIFY_HASH
Valerio Setti09e98722024-04-02 11:33:22 +0200862depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V21
Gilles Peskine68a287d2024-02-15 13:30:55 +0100863pk_rsa_v21_get_psa_attributes:MBEDTLS_MD_NONE:FROM_PAIR:PSA_KEY_USAGE_VERIFY_HASH:0:PSA_ALG_RSA_PSS_ANY_SALT(PSA_ALG_ANY_HASH)
Gilles Peskine6ea18362024-01-18 14:16:27 +0100864
865PSA attributes for pk: RSA v15 public VERIFY_MESSAGE
Valerio Setti09e98722024-04-02 11:33:22 +0200866depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskine68a287d2024-02-15 13:30:55 +0100867pk_get_psa_attributes:MBEDTLS_PK_RSA:FROM_PUBLIC:PSA_KEY_USAGE_VERIFY_MESSAGE:0:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_ANY_HASH)
Gilles Peskine6ea18362024-01-18 14:16:27 +0100868
869PSA attributes for pk: RSA v21 SHA-256 public VERIFY_MESSAGE
Valerio Setti09e98722024-04-02 11:33:22 +0200870depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V21
Gilles Peskine68a287d2024-02-15 13:30:55 +0100871pk_rsa_v21_get_psa_attributes:MBEDTLS_MD_NONE:FROM_PUBLIC:PSA_KEY_USAGE_VERIFY_MESSAGE:0:PSA_ALG_RSA_PSS_ANY_SALT(PSA_ALG_ANY_HASH)
Gilles Peskine6ea18362024-01-18 14:16:27 +0100872
873PSA attributes for pk: RSA v15 public VERIFY_HASH
Valerio Setti09e98722024-04-02 11:33:22 +0200874depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskine68a287d2024-02-15 13:30:55 +0100875pk_get_psa_attributes:MBEDTLS_PK_RSA:FROM_PUBLIC:PSA_KEY_USAGE_VERIFY_HASH:0:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_ANY_HASH)
Gilles Peskine6ea18362024-01-18 14:16:27 +0100876
877PSA attributes for pk: RSA v21 SHA-256 public VERIFY_HASH
Valerio Setti09e98722024-04-02 11:33:22 +0200878depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V21
Gilles Peskine68a287d2024-02-15 13:30:55 +0100879pk_rsa_v21_get_psa_attributes:MBEDTLS_MD_NONE:FROM_PUBLIC:PSA_KEY_USAGE_VERIFY_HASH:0:PSA_ALG_RSA_PSS_ANY_SALT(PSA_ALG_ANY_HASH)
Gilles Peskine6ea18362024-01-18 14:16:27 +0100880
881PSA attributes for pk: RSA v15 public SIGN_MESSAGE (bad)
Valerio Setti09e98722024-04-02 11:33:22 +0200882depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskine68a287d2024-02-15 13:30:55 +0100883pk_get_psa_attributes_fail:MBEDTLS_PK_RSA:FROM_PUBLIC:PSA_KEY_USAGE_SIGN_MESSAGE:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskine6ea18362024-01-18 14:16:27 +0100884
885PSA attributes for pk: RSA v15 public SIGN_HASH (bad)
Valerio Setti09e98722024-04-02 11:33:22 +0200886depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskine68a287d2024-02-15 13:30:55 +0100887pk_get_psa_attributes_fail:MBEDTLS_PK_RSA:FROM_PUBLIC:PSA_KEY_USAGE_SIGN_HASH:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskine6ea18362024-01-18 14:16:27 +0100888
889PSA attributes for pk: RSA v15 pair DERIVE (bad)
Valerio Setti09e98722024-04-02 11:33:22 +0200890depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskine68a287d2024-02-15 13:30:55 +0100891pk_get_psa_attributes_fail:MBEDTLS_PK_RSA:FROM_PAIR:PSA_KEY_USAGE_DERIVE:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskine6ea18362024-01-18 14:16:27 +0100892
893PSA attributes for pk: RSA v15 public DERIVE (bad)
Valerio Setti09e98722024-04-02 11:33:22 +0200894depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15
Gilles Peskine68a287d2024-02-15 13:30:55 +0100895pk_get_psa_attributes_fail:MBEDTLS_PK_RSA:FROM_PUBLIC:PSA_KEY_USAGE_DERIVE:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskineace7c772024-01-18 17:47:54 +0100896
897PSA attributes for pk: ECKEY pair DECRYPT (bad)
Elena Uziunaitedb0ed752024-09-03 14:13:50 +0100898depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT
Gilles Peskine68a287d2024-02-15 13:30:55 +0100899pk_get_psa_attributes_fail:MBEDTLS_PK_ECKEY:FROM_PAIR:PSA_KEY_USAGE_DECRYPT:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskineace7c772024-01-18 17:47:54 +0100900
901PSA attributes for pk: ECKEY_DH pair DECRYPT (bad)
Elena Uziunaitedb0ed752024-09-03 14:13:50 +0100902depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT
Gilles Peskine68a287d2024-02-15 13:30:55 +0100903pk_get_psa_attributes_fail:MBEDTLS_PK_ECKEY_DH:FROM_PAIR:PSA_KEY_USAGE_DECRYPT:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskineace7c772024-01-18 17:47:54 +0100904
905PSA attributes for pk: ECDSA pair DECRYPT (bad)
Elena Uziunaite47a9b3d2024-09-16 14:25:38 +0100906depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:MBEDTLS_PK_CAN_ECDSA_SIGN
Gilles Peskine68a287d2024-02-15 13:30:55 +0100907pk_get_psa_attributes_fail:MBEDTLS_PK_ECDSA:FROM_PAIR:PSA_KEY_USAGE_DECRYPT:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskineace7c772024-01-18 17:47:54 +0100908
909PSA attributes for pk: ECKEY public DECRYPT (bad)
Gilles Peskine735ac3e2024-02-06 11:11:32 +0100910depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE
Gilles Peskine68a287d2024-02-15 13:30:55 +0100911pk_get_psa_attributes_fail:MBEDTLS_PK_ECKEY:FROM_PUBLIC:PSA_KEY_USAGE_DECRYPT:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskineace7c772024-01-18 17:47:54 +0100912
913PSA attributes for pk: ECKEY_DH public DECRYPT (bad)
Gilles Peskine735ac3e2024-02-06 11:11:32 +0100914depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE
Gilles Peskine68a287d2024-02-15 13:30:55 +0100915pk_get_psa_attributes_fail:MBEDTLS_PK_ECKEY_DH:FROM_PUBLIC:PSA_KEY_USAGE_DECRYPT:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskineace7c772024-01-18 17:47:54 +0100916
917PSA attributes for pk: ECDSA public DECRYPT (bad)
Gilles Peskine735ac3e2024-02-06 11:11:32 +0100918depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:MBEDTLS_PK_CAN_ECDSA_SOME
Gilles Peskine68a287d2024-02-15 13:30:55 +0100919pk_get_psa_attributes_fail:MBEDTLS_PK_ECDSA:FROM_PUBLIC:PSA_KEY_USAGE_DECRYPT:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskineace7c772024-01-18 17:47:54 +0100920
921PSA attributes for pk: ECKEY pair ENCRYPT (bad)
Elena Uziunaitedb0ed752024-09-03 14:13:50 +0100922depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT
Gilles Peskine68a287d2024-02-15 13:30:55 +0100923pk_get_psa_attributes_fail:MBEDTLS_PK_ECKEY:FROM_PAIR:PSA_KEY_USAGE_ENCRYPT:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskineace7c772024-01-18 17:47:54 +0100924
925PSA attributes for pk: ECKEY_DH pair ENCRYPT (bad)
Elena Uziunaitedb0ed752024-09-03 14:13:50 +0100926depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT
Gilles Peskine68a287d2024-02-15 13:30:55 +0100927pk_get_psa_attributes_fail:MBEDTLS_PK_ECKEY_DH:FROM_PAIR:PSA_KEY_USAGE_ENCRYPT:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskineace7c772024-01-18 17:47:54 +0100928
929PSA attributes for pk: ECDSA pair ENCRYPT (bad)
Elena Uziunaite47a9b3d2024-09-16 14:25:38 +0100930depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:MBEDTLS_PK_CAN_ECDSA_SIGN
Gilles Peskine68a287d2024-02-15 13:30:55 +0100931pk_get_psa_attributes_fail:MBEDTLS_PK_ECDSA:FROM_PAIR:PSA_KEY_USAGE_ENCRYPT:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskineace7c772024-01-18 17:47:54 +0100932
933PSA attributes for pk: ECKEY public ENCRYPT (bad)
Gilles Peskine735ac3e2024-02-06 11:11:32 +0100934depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE
Gilles Peskine68a287d2024-02-15 13:30:55 +0100935pk_get_psa_attributes_fail:MBEDTLS_PK_ECKEY:FROM_PUBLIC:PSA_KEY_USAGE_ENCRYPT:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskineace7c772024-01-18 17:47:54 +0100936
937PSA attributes for pk: ECKEY_DH public ENCRYPT (bad)
Gilles Peskine735ac3e2024-02-06 11:11:32 +0100938depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE
Gilles Peskine68a287d2024-02-15 13:30:55 +0100939pk_get_psa_attributes_fail:MBEDTLS_PK_ECKEY_DH:FROM_PUBLIC:PSA_KEY_USAGE_ENCRYPT:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskineace7c772024-01-18 17:47:54 +0100940
941PSA attributes for pk: ECDSA public ENCRYPT (bad)
Gilles Peskine735ac3e2024-02-06 11:11:32 +0100942depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:MBEDTLS_PK_CAN_ECDSA_SOME
Gilles Peskine68a287d2024-02-15 13:30:55 +0100943pk_get_psa_attributes_fail:MBEDTLS_PK_ECDSA:FROM_PUBLIC:PSA_KEY_USAGE_ENCRYPT:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskineace7c772024-01-18 17:47:54 +0100944
945PSA attributes for pk: ECKEY pair DERIVE
Elena Uziunaitedb0ed752024-09-03 14:13:50 +0100946depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT
Gilles Peskine68a287d2024-02-15 13:30:55 +0100947pk_get_psa_attributes:MBEDTLS_PK_ECKEY:FROM_PAIR:PSA_KEY_USAGE_DERIVE:1:PSA_ALG_ECDH
Gilles Peskineace7c772024-01-18 17:47:54 +0100948
949PSA attributes for pk: ECKEY_DH pair DERIVE
Elena Uziunaitedb0ed752024-09-03 14:13:50 +0100950depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT
Gilles Peskine68a287d2024-02-15 13:30:55 +0100951pk_get_psa_attributes:MBEDTLS_PK_ECKEY_DH:FROM_PAIR:PSA_KEY_USAGE_DERIVE:1:PSA_ALG_ECDH
Gilles Peskineace7c772024-01-18 17:47:54 +0100952
953PSA attributes for pk: ECDSA pair DERIVE (bad)
Elena Uziunaite47a9b3d2024-09-16 14:25:38 +0100954depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:MBEDTLS_PK_CAN_ECDSA_SIGN
Gilles Peskine68a287d2024-02-15 13:30:55 +0100955pk_get_psa_attributes_fail:MBEDTLS_PK_ECDSA:FROM_PAIR:PSA_KEY_USAGE_DERIVE:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskineace7c772024-01-18 17:47:54 +0100956
957PSA attributes for pk: ECKEY public DERIVE (bad)
Gilles Peskine735ac3e2024-02-06 11:11:32 +0100958depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE
Gilles Peskine68a287d2024-02-15 13:30:55 +0100959pk_get_psa_attributes_fail:MBEDTLS_PK_ECKEY:FROM_PUBLIC:PSA_KEY_USAGE_DERIVE:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskineace7c772024-01-18 17:47:54 +0100960
961PSA attributes for pk: ECKEY_DH public DERIVE (bad)
Gilles Peskine735ac3e2024-02-06 11:11:32 +0100962depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE
Gilles Peskine68a287d2024-02-15 13:30:55 +0100963pk_get_psa_attributes_fail:MBEDTLS_PK_ECKEY_DH:FROM_PUBLIC:PSA_KEY_USAGE_DERIVE:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskineace7c772024-01-18 17:47:54 +0100964
965PSA attributes for pk: ECDSA public DERIVE (bad)
Gilles Peskine735ac3e2024-02-06 11:11:32 +0100966depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:MBEDTLS_PK_CAN_ECDSA_SOME
Gilles Peskine68a287d2024-02-15 13:30:55 +0100967pk_get_psa_attributes_fail:MBEDTLS_PK_ECDSA:FROM_PUBLIC:PSA_KEY_USAGE_DERIVE:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskineace7c772024-01-18 17:47:54 +0100968
969PSA attributes for pk: ECKEY pair SIGN_MESSAGE
Elena Uziunaitedb0ed752024-09-03 14:13:50 +0100970depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT
Gilles Peskine68a287d2024-02-15 13:30:55 +0100971pk_get_psa_attributes:MBEDTLS_PK_ECKEY:FROM_PAIR:PSA_KEY_USAGE_SIGN_MESSAGE:1:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH)
Gilles Peskineace7c772024-01-18 17:47:54 +0100972
973PSA attributes for pk: ECDSA pair SIGN_MESSAGE
Elena Uziunaite47a9b3d2024-09-16 14:25:38 +0100974depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:MBEDTLS_PK_CAN_ECDSA_SIGN
Gilles Peskine68a287d2024-02-15 13:30:55 +0100975pk_get_psa_attributes:MBEDTLS_PK_ECDSA:FROM_PAIR:PSA_KEY_USAGE_SIGN_MESSAGE:1:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH)
Gilles Peskineace7c772024-01-18 17:47:54 +0100976
977PSA attributes for pk: ECKEY pair SIGN_HASH
Elena Uziunaitedb0ed752024-09-03 14:13:50 +0100978depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT
Gilles Peskine68a287d2024-02-15 13:30:55 +0100979pk_get_psa_attributes:MBEDTLS_PK_ECKEY:FROM_PAIR:PSA_KEY_USAGE_SIGN_HASH:1:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH)
Gilles Peskineace7c772024-01-18 17:47:54 +0100980
981PSA attributes for pk: ECDSA pair SIGN_HASH
Elena Uziunaite47a9b3d2024-09-16 14:25:38 +0100982depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:MBEDTLS_PK_CAN_ECDSA_SIGN
Gilles Peskine68a287d2024-02-15 13:30:55 +0100983pk_get_psa_attributes:MBEDTLS_PK_ECDSA:FROM_PAIR:PSA_KEY_USAGE_SIGN_HASH:1:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH)
Gilles Peskineace7c772024-01-18 17:47:54 +0100984
985PSA attributes for pk: ECKEY pair->public VERIFY_MESSAGE
Elena Uziunaitedb0ed752024-09-03 14:13:50 +0100986depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT
Gilles Peskine68a287d2024-02-15 13:30:55 +0100987pk_get_psa_attributes:MBEDTLS_PK_ECKEY:FROM_PAIR:PSA_KEY_USAGE_VERIFY_MESSAGE:0:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH)
Gilles Peskineace7c772024-01-18 17:47:54 +0100988
989PSA attributes for pk: ECDSA pair->public VERIFY_MESSAGE
Elena Uziunaite47a9b3d2024-09-16 14:25:38 +0100990depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:MBEDTLS_PK_CAN_ECDSA_SIGN
Gilles Peskine68a287d2024-02-15 13:30:55 +0100991pk_get_psa_attributes:MBEDTLS_PK_ECDSA:FROM_PAIR:PSA_KEY_USAGE_VERIFY_MESSAGE:0:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH)
Gilles Peskineace7c772024-01-18 17:47:54 +0100992
993PSA attributes for pk: ECKEY pair->public VERIFY_HASH
Elena Uziunaitedb0ed752024-09-03 14:13:50 +0100994depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT
Gilles Peskine68a287d2024-02-15 13:30:55 +0100995pk_get_psa_attributes:MBEDTLS_PK_ECKEY:FROM_PAIR:PSA_KEY_USAGE_VERIFY_HASH:0:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH)
Gilles Peskineace7c772024-01-18 17:47:54 +0100996
997PSA attributes for pk: ECDSA pair->public VERIFY_HASH
Elena Uziunaite47a9b3d2024-09-16 14:25:38 +0100998depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:MBEDTLS_PK_CAN_ECDSA_SIGN
Gilles Peskine68a287d2024-02-15 13:30:55 +0100999pk_get_psa_attributes:MBEDTLS_PK_ECDSA:FROM_PAIR:PSA_KEY_USAGE_VERIFY_HASH:0:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH)
Gilles Peskineace7c772024-01-18 17:47:54 +01001000
1001PSA attributes for pk: ECKEY public VERIFY_MESSAGE
Gilles Peskine735ac3e2024-02-06 11:11:32 +01001002depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE
Gilles Peskine68a287d2024-02-15 13:30:55 +01001003pk_get_psa_attributes:MBEDTLS_PK_ECKEY:FROM_PUBLIC:PSA_KEY_USAGE_VERIFY_MESSAGE:0:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH)
Gilles Peskineace7c772024-01-18 17:47:54 +01001004
1005PSA attributes for pk: ECDSA public VERIFY_MESSAGE
Gilles Peskine735ac3e2024-02-06 11:11:32 +01001006depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:MBEDTLS_PK_CAN_ECDSA_SOME
Gilles Peskine68a287d2024-02-15 13:30:55 +01001007pk_get_psa_attributes:MBEDTLS_PK_ECDSA:FROM_PUBLIC:PSA_KEY_USAGE_VERIFY_MESSAGE:0:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH)
Gilles Peskineace7c772024-01-18 17:47:54 +01001008
1009PSA attributes for pk: ECKEY public VERIFY_HASH
Gilles Peskine735ac3e2024-02-06 11:11:32 +01001010depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE
Gilles Peskine68a287d2024-02-15 13:30:55 +01001011pk_get_psa_attributes:MBEDTLS_PK_ECKEY:FROM_PUBLIC:PSA_KEY_USAGE_VERIFY_HASH:0:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH)
Gilles Peskineace7c772024-01-18 17:47:54 +01001012
1013PSA attributes for pk: ECDSA public VERIFY_HASH
Gilles Peskine735ac3e2024-02-06 11:11:32 +01001014depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:MBEDTLS_PK_CAN_ECDSA_SOME
Gilles Peskine68a287d2024-02-15 13:30:55 +01001015pk_get_psa_attributes:MBEDTLS_PK_ECDSA:FROM_PUBLIC:PSA_KEY_USAGE_VERIFY_HASH:0:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH)
Gilles Peskineace7c772024-01-18 17:47:54 +01001016
1017PSA attributes for pk: ECKEY public SIGN_MESSAGE (bad)
Gilles Peskine735ac3e2024-02-06 11:11:32 +01001018depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE
Gilles Peskine68a287d2024-02-15 13:30:55 +01001019pk_get_psa_attributes_fail:MBEDTLS_PK_ECKEY:FROM_PUBLIC:PSA_KEY_USAGE_SIGN_MESSAGE:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskineace7c772024-01-18 17:47:54 +01001020
1021PSA attributes for pk: ECDSA public SIGN_MESSAGE (bad)
Gilles Peskine735ac3e2024-02-06 11:11:32 +01001022depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:MBEDTLS_PK_CAN_ECDSA_SOME
Gilles Peskine68a287d2024-02-15 13:30:55 +01001023pk_get_psa_attributes_fail:MBEDTLS_PK_ECDSA:FROM_PUBLIC:PSA_KEY_USAGE_SIGN_MESSAGE:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskineace7c772024-01-18 17:47:54 +01001024
1025PSA attributes for pk: ECKEY public SIGN_HASH (bad)
Gilles Peskine735ac3e2024-02-06 11:11:32 +01001026depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE
Gilles Peskine68a287d2024-02-15 13:30:55 +01001027pk_get_psa_attributes_fail:MBEDTLS_PK_ECKEY:FROM_PUBLIC:PSA_KEY_USAGE_SIGN_HASH:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskineace7c772024-01-18 17:47:54 +01001028
1029PSA attributes for pk: ECDSA public SIGN_HASH (bad)
Gilles Peskine735ac3e2024-02-06 11:11:32 +01001030depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:MBEDTLS_PK_CAN_ECDSA_SOME
Gilles Peskine68a287d2024-02-15 13:30:55 +01001031pk_get_psa_attributes_fail:MBEDTLS_PK_ECDSA:FROM_PUBLIC:PSA_KEY_USAGE_SIGN_HASH:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskineace7c772024-01-18 17:47:54 +01001032
1033PSA attributes for pk: ECKEY_DH pair SIGN_MESSAGE (bad)
Elena Uziunaitedb0ed752024-09-03 14:13:50 +01001034depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT
Gilles Peskine68a287d2024-02-15 13:30:55 +01001035pk_get_psa_attributes_fail:MBEDTLS_PK_ECKEY_DH:FROM_PAIR:PSA_KEY_USAGE_SIGN_MESSAGE:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskineace7c772024-01-18 17:47:54 +01001036
1037PSA attributes for pk: ECKEY_DH pair SIGN_HASH (bad)
Elena Uziunaitedb0ed752024-09-03 14:13:50 +01001038depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT
Gilles Peskine68a287d2024-02-15 13:30:55 +01001039pk_get_psa_attributes_fail:MBEDTLS_PK_ECKEY_DH:FROM_PAIR:PSA_KEY_USAGE_SIGN_HASH:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskineace7c772024-01-18 17:47:54 +01001040
1041PSA attributes for pk: ECKEY_DH pair VERIFY_MESSAGE (bad)
Elena Uziunaitedb0ed752024-09-03 14:13:50 +01001042depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT
Gilles Peskine68a287d2024-02-15 13:30:55 +01001043pk_get_psa_attributes_fail:MBEDTLS_PK_ECKEY_DH:FROM_PAIR:PSA_KEY_USAGE_VERIFY_MESSAGE:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskineace7c772024-01-18 17:47:54 +01001044
1045PSA attributes for pk: ECKEY_DH pair VERIFY_HASH (bad)
Elena Uziunaitedb0ed752024-09-03 14:13:50 +01001046depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT
Gilles Peskine68a287d2024-02-15 13:30:55 +01001047pk_get_psa_attributes_fail:MBEDTLS_PK_ECKEY_DH:FROM_PAIR:PSA_KEY_USAGE_VERIFY_HASH:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskineace7c772024-01-18 17:47:54 +01001048
1049PSA attributes for pk: ECKEY_DH public SIGN_MESSAGE (bad)
Gilles Peskine735ac3e2024-02-06 11:11:32 +01001050depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE
Gilles Peskine68a287d2024-02-15 13:30:55 +01001051pk_get_psa_attributes_fail:MBEDTLS_PK_ECKEY_DH:FROM_PUBLIC:PSA_KEY_USAGE_SIGN_MESSAGE:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskineace7c772024-01-18 17:47:54 +01001052
1053PSA attributes for pk: ECKEY_DH public SIGN_HASH (bad)
Gilles Peskine735ac3e2024-02-06 11:11:32 +01001054depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE
Gilles Peskine68a287d2024-02-15 13:30:55 +01001055pk_get_psa_attributes_fail:MBEDTLS_PK_ECKEY_DH:FROM_PUBLIC:PSA_KEY_USAGE_SIGN_HASH:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskineace7c772024-01-18 17:47:54 +01001056
1057PSA attributes for pk: ECKEY_DH public VERIFY_MESSAGE (bad)
Gilles Peskine735ac3e2024-02-06 11:11:32 +01001058depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE
Gilles Peskine68a287d2024-02-15 13:30:55 +01001059pk_get_psa_attributes_fail:MBEDTLS_PK_ECKEY_DH:FROM_PUBLIC:PSA_KEY_USAGE_VERIFY_MESSAGE:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskineace7c772024-01-18 17:47:54 +01001060
1061PSA attributes for pk: ECKEY_DH public VERIFY_HASH (bad)
Gilles Peskine735ac3e2024-02-06 11:11:32 +01001062depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE
Gilles Peskine68a287d2024-02-15 13:30:55 +01001063pk_get_psa_attributes_fail:MBEDTLS_PK_ECKEY_DH:FROM_PUBLIC:PSA_KEY_USAGE_VERIFY_HASH:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskine758d8c72024-01-22 20:53:21 +01001064
Gilles Peskine793920c2024-02-01 21:26:54 +01001065PSA attributes for pk: opaque RSA pair, 0 & SIGN_MESSAGE (bad policy)
Valerio Setti09e98722024-04-02 11:33:22 +02001066depends_on:MBEDTLS_RSA_C
Valerio Setti79033852024-04-16 16:00:35 +02001067pk_get_psa_attributes_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:0:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_KEY_USAGE_SIGN_MESSAGE:MBEDTLS_ERR_PK_TYPE_MISMATCH:1:0
Gilles Peskine758d8c72024-01-22 20:53:21 +01001068
1069PSA attributes for pk: opaque RSA pair, SIGN_MESSAGE & SIGN_MESSAGE
Valerio Setti09e98722024-04-02 11:33:22 +02001070depends_on:MBEDTLS_RSA_C
Valerio Setti79033852024-04-16 16:00:35 +02001071pk_get_psa_attributes_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_KEY_USAGE_SIGN_MESSAGE:0:1:PSA_KEY_USAGE_SIGN_MESSAGE
Gilles Peskine758d8c72024-01-22 20:53:21 +01001072
1073PSA attributes for pk: opaque RSA pair, SIGN|VERIFY & SIGN_MESSAGE
Valerio Setti09e98722024-04-02 11:33:22 +02001074depends_on:MBEDTLS_RSA_C
Valerio Setti79033852024-04-16 16:00:35 +02001075pk_get_psa_attributes_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_VERIFY_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_KEY_USAGE_SIGN_MESSAGE:0:1:PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_VERIFY_MESSAGE
Gilles Peskine758d8c72024-01-22 20:53:21 +01001076
1077PSA attributes for pk: opaque RSA pair, SIGN|DECRYPT & SIGN_MESSAGE
Valerio Setti09e98722024-04-02 11:33:22 +02001078depends_on:MBEDTLS_RSA_C
Valerio Setti79033852024-04-16 16:00:35 +02001079pk_get_psa_attributes_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_DECRYPT:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_KEY_USAGE_SIGN_MESSAGE:0:1:PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_DECRYPT
Gilles Peskine758d8c72024-01-22 20:53:21 +01001080
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001081# For a PK_OPAQUE key with a key pair type output,
1082# mbedtls_pk_import_into_psa() requires the key to be copyable or exportable.
1083# Try all combinations of COPY/not, EXPORT/not.
Gilles Peskine758d8c72024-01-22 20:53:21 +01001084PSA attributes for pk: opaque RSA pair, SIGN|... & SIGN_MESSAGE
Valerio Setti09e98722024-04-02 11:33:22 +02001085depends_on:MBEDTLS_RSA_C
Valerio Setti79033852024-04-16 16:00:35 +02001086pk_get_psa_attributes_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_VERIFY_MESSAGE | PSA_KEY_USAGE_DECRYPT | PSA_KEY_USAGE_ENCRYPT:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_KEY_USAGE_SIGN_MESSAGE:0:1:PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_VERIFY_MESSAGE | PSA_KEY_USAGE_DECRYPT | PSA_KEY_USAGE_ENCRYPT
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001087
1088PSA attributes for pk: opaque RSA pair, SIGN|EXPORT|... & SIGN_MESSAGE
Valerio Setti09e98722024-04-02 11:33:22 +02001089depends_on:MBEDTLS_RSA_C
Valerio Setti79033852024-04-16 16:00:35 +02001090pk_get_psa_attributes_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_VERIFY_MESSAGE | PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_DECRYPT | PSA_KEY_USAGE_ENCRYPT:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_KEY_USAGE_SIGN_MESSAGE:0:1:PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_VERIFY_MESSAGE | PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_DECRYPT | PSA_KEY_USAGE_ENCRYPT
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001091
1092PSA attributes for pk: opaque RSA pair, SIGN|COPY|... & SIGN_MESSAGE
Valerio Setti09e98722024-04-02 11:33:22 +02001093depends_on:MBEDTLS_RSA_C
Valerio Setti79033852024-04-16 16:00:35 +02001094pk_get_psa_attributes_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_VERIFY_MESSAGE | PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_DECRYPT | PSA_KEY_USAGE_ENCRYPT:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_KEY_USAGE_SIGN_MESSAGE:0:1:PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_VERIFY_MESSAGE | PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_DECRYPT | PSA_KEY_USAGE_ENCRYPT
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001095
1096PSA attributes for pk: opaque RSA pair, SIGN|COPY|EXPORT... & SIGN_MESSAGE
Valerio Setti09e98722024-04-02 11:33:22 +02001097depends_on:MBEDTLS_RSA_C
Valerio Setti79033852024-04-16 16:00:35 +02001098pk_get_psa_attributes_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_VERIFY_MESSAGE | PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_DECRYPT | PSA_KEY_USAGE_ENCRYPT:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_KEY_USAGE_SIGN_MESSAGE:0:1:PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_VERIFY_MESSAGE | PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_DECRYPT | PSA_KEY_USAGE_ENCRYPT
Gilles Peskine758d8c72024-01-22 20:53:21 +01001099
Gilles Peskine793920c2024-02-01 21:26:54 +01001100PSA attributes for pk: opaque RSA pair, SIGN_MESSAGE & SIGN_HASH (bad policy)
Valerio Setti09e98722024-04-02 11:33:22 +02001101depends_on:MBEDTLS_RSA_C
Valerio Setti79033852024-04-16 16:00:35 +02001102pk_get_psa_attributes_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_KEY_USAGE_SIGN_HASH:MBEDTLS_ERR_PK_TYPE_MISMATCH:1:0
Gilles Peskine793920c2024-02-01 21:26:54 +01001103
Gilles Peskine758d8c72024-01-22 20:53:21 +01001104# For a PK_OPAQUE key, mbedtls_pk_get_psa_attributes() ignores the input
1105# key's algorithm policy. Just this time, test with a few different algorithms.
Gilles Peskine793920c2024-02-01 21:26:54 +01001106PSA attributes for pk: opaque RSA pair, SIGN_HASH & SIGN_HASH [0]
Valerio Setti09e98722024-04-02 11:33:22 +02001107depends_on:MBEDTLS_RSA_C
Valerio Setti79033852024-04-16 16:00:35 +02001108pk_get_psa_attributes_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_NONE:PSA_KEY_USAGE_SIGN_HASH:0:1:PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE
Gilles Peskine758d8c72024-01-22 20:53:21 +01001109
Gilles Peskine793920c2024-02-01 21:26:54 +01001110PSA attributes for pk: opaque RSA pair, SIGN_HASH & SIGN_HASH [raw]
Valerio Setti09e98722024-04-02 11:33:22 +02001111depends_on:MBEDTLS_RSA_C
Valerio Setti79033852024-04-16 16:00:35 +02001112pk_get_psa_attributes_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_KEY_USAGE_SIGN_HASH:0:1:PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE
Gilles Peskine758d8c72024-01-22 20:53:21 +01001113
Gilles Peskine793920c2024-02-01 21:26:54 +01001114PSA attributes for pk: opaque RSA pair, SIGN_HASH & SIGN_HASH [v15]
Valerio Setti09e98722024-04-02 11:33:22 +02001115depends_on:MBEDTLS_RSA_C
Valerio Setti79033852024-04-16 16:00:35 +02001116pk_get_psa_attributes_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_KEY_USAGE_SIGN_HASH:0:1:PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE
Gilles Peskine758d8c72024-01-22 20:53:21 +01001117
Gilles Peskine793920c2024-02-01 21:26:54 +01001118PSA attributes for pk: opaque RSA pair, SIGN_HASH & SIGN_HASH [PSS]
Valerio Setti09e98722024-04-02 11:33:22 +02001119depends_on:MBEDTLS_RSA_C
Valerio Setti79033852024-04-16 16:00:35 +02001120pk_get_psa_attributes_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_SIGN_HASH:PSA_ALG_RSA_PSS_ANY_SALT(PSA_ALG_SHA_256):PSA_KEY_USAGE_SIGN_HASH:0:1:PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE
Gilles Peskine793920c2024-02-01 21:26:54 +01001121
1122PSA attributes for pk: opaque RSA pair, 0 & DECRYPT (bad policy)
Valerio Setti09e98722024-04-02 11:33:22 +02001123depends_on:MBEDTLS_RSA_C
Valerio Setti79033852024-04-16 16:00:35 +02001124pk_get_psa_attributes_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:0:PSA_ALG_RSA_PKCS1V15_CRYPT:PSA_KEY_USAGE_DECRYPT:MBEDTLS_ERR_PK_TYPE_MISMATCH:1:0
Gilles Peskine758d8c72024-01-22 20:53:21 +01001125
1126PSA attributes for pk: opaque RSA pair, DECRYPT & DECRYPT
Valerio Setti09e98722024-04-02 11:33:22 +02001127depends_on:MBEDTLS_RSA_C
Valerio Setti79033852024-04-16 16:00:35 +02001128pk_get_psa_attributes_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_DECRYPT:PSA_ALG_RSA_PKCS1V15_CRYPT:PSA_KEY_USAGE_DECRYPT:0:1:PSA_KEY_USAGE_DECRYPT
Gilles Peskine758d8c72024-01-22 20:53:21 +01001129
1130PSA attributes for pk: opaque RSA pair, DECRYPT|... & DECRYPT
Valerio Setti09e98722024-04-02 11:33:22 +02001131depends_on:MBEDTLS_RSA_C
Valerio Setti79033852024-04-16 16:00:35 +02001132pk_get_psa_attributes_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_VERIFY_MESSAGE | PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_DECRYPT | PSA_KEY_USAGE_ENCRYPT:PSA_ALG_RSA_PKCS1V15_CRYPT:PSA_KEY_USAGE_DECRYPT:0:1:PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_VERIFY_MESSAGE | PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_DECRYPT | PSA_KEY_USAGE_ENCRYPT
Gilles Peskine758d8c72024-01-22 20:53:21 +01001133
1134PSA attributes for pk: opaque RSA pair, ... & DERIVE (bad)
Valerio Setti09e98722024-04-02 11:33:22 +02001135depends_on:MBEDTLS_RSA_C
Valerio Setti79033852024-04-16 16:00:35 +02001136pk_get_psa_attributes_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_VERIFY_MESSAGE | PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_DECRYPT | PSA_KEY_USAGE_ENCRYPT:PSA_ALG_RSA_PKCS1V15_CRYPT:PSA_KEY_USAGE_DERIVE:MBEDTLS_ERR_PK_TYPE_MISMATCH:1:0
Gilles Peskine758d8c72024-01-22 20:53:21 +01001137
1138PSA attributes for pk: opaque RSA pair, ... & EXPORT (bad)
Valerio Setti09e98722024-04-02 11:33:22 +02001139depends_on:MBEDTLS_RSA_C
Valerio Setti79033852024-04-16 16:00:35 +02001140pk_get_psa_attributes_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_VERIFY_MESSAGE | PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_DECRYPT | PSA_KEY_USAGE_ENCRYPT:PSA_ALG_RSA_PKCS1V15_CRYPT:PSA_KEY_USAGE_EXPORT:MBEDTLS_ERR_PK_TYPE_MISMATCH:1:0
Gilles Peskine758d8c72024-01-22 20:53:21 +01001141
Gilles Peskine793920c2024-02-01 21:26:54 +01001142PSA attributes for pk: opaque RSA pair->public, VERIFY_MESSAGE & VERIFY_MESSAGE
Valerio Setti09e98722024-04-02 11:33:22 +02001143depends_on:MBEDTLS_RSA_C
Valerio Setti79033852024-04-16 16:00:35 +02001144pk_get_psa_attributes_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_VERIFY_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_KEY_USAGE_VERIFY_MESSAGE:0:0:PSA_KEY_USAGE_VERIFY_MESSAGE
Gilles Peskine758d8c72024-01-22 20:53:21 +01001145
Gilles Peskine793920c2024-02-01 21:26:54 +01001146PSA attributes for pk: opaque RSA pair->public, VERIFY_HASH & VERIFY_HASH
Valerio Setti09e98722024-04-02 11:33:22 +02001147depends_on:MBEDTLS_RSA_C
Valerio Setti79033852024-04-16 16:00:35 +02001148pk_get_psa_attributes_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_VERIFY_HASH:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_KEY_USAGE_VERIFY_HASH:0:0:PSA_KEY_USAGE_VERIFY_HASH | PSA_KEY_USAGE_VERIFY_MESSAGE
Gilles Peskine758d8c72024-01-22 20:53:21 +01001149
Gilles Peskine793920c2024-02-01 21:26:54 +01001150PSA attributes for pk: opaque RSA pair->public, ENCRYPT & ENCRYPT
Valerio Setti09e98722024-04-02 11:33:22 +02001151depends_on:MBEDTLS_RSA_C
Valerio Setti79033852024-04-16 16:00:35 +02001152pk_get_psa_attributes_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_ENCRYPT:PSA_ALG_RSA_PKCS1V15_CRYPT:PSA_KEY_USAGE_ENCRYPT:0:0:PSA_KEY_USAGE_ENCRYPT
Gilles Peskine758d8c72024-01-22 20:53:21 +01001153
Gilles Peskine793920c2024-02-01 21:26:54 +01001154PSA attributes for pk: opaque ECC pair, 0 & SIGN_MESSAGE (bad policy)
Valerio Setti09e98722024-04-02 11:33:22 +02001155depends_on:PSA_WANT_ECC_SECP_R1_256:MBEDTLS_PK_HAVE_ECC_KEYS
Gilles Peskine793920c2024-02-01 21:26:54 +01001156pk_get_psa_attributes_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):256:0:PSA_ALG_ECDSA_ANY:PSA_KEY_USAGE_SIGN_MESSAGE:MBEDTLS_ERR_PK_TYPE_MISMATCH:1:0
Gilles Peskine758d8c72024-01-22 20:53:21 +01001157
1158PSA attributes for pk: opaque ECC pair, SIGN_MESSAGE & SIGN_MESSAGE
Valerio Setti09e98722024-04-02 11:33:22 +02001159depends_on:PSA_WANT_ECC_SECP_R1_256:MBEDTLS_PK_HAVE_ECC_KEYS
Gilles Peskine758d8c72024-01-22 20:53:21 +01001160pk_get_psa_attributes_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):256:PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_ECDSA_ANY:PSA_KEY_USAGE_SIGN_MESSAGE:0:1:PSA_KEY_USAGE_SIGN_MESSAGE
1161
1162PSA attributes for pk: opaque ECC pair, SIGN|VERIFY & SIGN_MESSAGE
Valerio Setti09e98722024-04-02 11:33:22 +02001163depends_on:PSA_WANT_ECC_SECP_R1_256:MBEDTLS_PK_HAVE_ECC_KEYS
Gilles Peskine758d8c72024-01-22 20:53:21 +01001164pk_get_psa_attributes_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):256:PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_VERIFY_MESSAGE:PSA_ALG_ECDSA_ANY:PSA_KEY_USAGE_SIGN_MESSAGE:0:1:PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_VERIFY_MESSAGE
1165
1166PSA attributes for pk: opaque ECC pair, SIGN|DECRYPT & SIGN_MESSAGE
Valerio Setti09e98722024-04-02 11:33:22 +02001167depends_on:PSA_WANT_ECC_SECP_R1_256:MBEDTLS_PK_HAVE_ECC_KEYS
Gilles Peskine758d8c72024-01-22 20:53:21 +01001168pk_get_psa_attributes_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):256:PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_DECRYPT:PSA_ALG_ECDSA_ANY:PSA_KEY_USAGE_SIGN_MESSAGE:0:1:PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_DECRYPT
1169
1170PSA attributes for pk: opaque ECC pair, SIGN|... & SIGN_MESSAGE
Valerio Setti09e98722024-04-02 11:33:22 +02001171depends_on:PSA_WANT_ECC_SECP_R1_256:MBEDTLS_PK_HAVE_ECC_KEYS
Gilles Peskine758d8c72024-01-22 20:53:21 +01001172pk_get_psa_attributes_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):256:PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_VERIFY_MESSAGE | PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_DECRYPT | PSA_KEY_USAGE_ENCRYPT:PSA_ALG_ECDSA_ANY:PSA_KEY_USAGE_SIGN_MESSAGE:0:1:PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_VERIFY_MESSAGE | PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_DECRYPT | PSA_KEY_USAGE_ENCRYPT
1173
Gilles Peskine793920c2024-02-01 21:26:54 +01001174PSA attributes for pk: opaque ECC pair, SIGN_HASH & SIGN_HASH
Valerio Setti09e98722024-04-02 11:33:22 +02001175depends_on:PSA_WANT_ECC_SECP_R1_256:MBEDTLS_PK_HAVE_ECC_KEYS
Gilles Peskine591e83d2024-02-01 21:33:44 +01001176pk_get_psa_attributes_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):256:PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_ECDSA_ANY:PSA_KEY_USAGE_SIGN_HASH:0:1:PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE
Gilles Peskine758d8c72024-01-22 20:53:21 +01001177
1178PSA attributes for pk: opaque ECC pair, ... & DERIVE
Valerio Setti09e98722024-04-02 11:33:22 +02001179depends_on:PSA_WANT_ECC_SECP_R1_256:MBEDTLS_PK_HAVE_ECC_KEYS
Gilles Peskine758d8c72024-01-22 20:53:21 +01001180pk_get_psa_attributes_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):256:PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_VERIFY_MESSAGE | PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_DECRYPT | PSA_KEY_USAGE_ENCRYPT | PSA_KEY_USAGE_DERIVE:PSA_ALG_ECDH:PSA_KEY_USAGE_DERIVE:0:1:PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_VERIFY_MESSAGE | PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_DECRYPT | PSA_KEY_USAGE_ENCRYPT | PSA_KEY_USAGE_DERIVE
1181
1182PSA attributes for pk: opaque ECC pair, ... & DECRYPT (bad)
Valerio Setti09e98722024-04-02 11:33:22 +02001183depends_on:PSA_WANT_ECC_SECP_R1_256:MBEDTLS_PK_HAVE_ECC_KEYS
Gilles Peskine758d8c72024-01-22 20:53:21 +01001184pk_get_psa_attributes_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):256:PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_VERIFY_MESSAGE | PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_DECRYPT | PSA_KEY_USAGE_ENCRYPT | PSA_KEY_USAGE_DERIVE:PSA_ALG_ECDH:PSA_KEY_USAGE_DECRYPT:MBEDTLS_ERR_PK_TYPE_MISMATCH:1:0
1185
1186PSA attributes for pk: opaque ECC pair, ... & EXPORT (bad)
Valerio Setti09e98722024-04-02 11:33:22 +02001187depends_on:PSA_WANT_ECC_SECP_R1_256:MBEDTLS_PK_HAVE_ECC_KEYS
Gilles Peskine758d8c72024-01-22 20:53:21 +01001188pk_get_psa_attributes_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):256:PSA_KEY_USAGE_SIGN_MESSAGE | PSA_KEY_USAGE_VERIFY_MESSAGE | PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_DECRYPT | PSA_KEY_USAGE_ENCRYPT:PSA_ALG_ECDH:PSA_KEY_USAGE_EXPORT:MBEDTLS_ERR_PK_TYPE_MISMATCH:1:0
1189
Gilles Peskine793920c2024-02-01 21:26:54 +01001190PSA attributes for pk: opaque ECC pair->public, VERIFY_MESSAGE & VERIFY_MESSAGE
Valerio Setti09e98722024-04-02 11:33:22 +02001191depends_on:PSA_WANT_ECC_SECP_R1_256:MBEDTLS_PK_HAVE_ECC_KEYS
Gilles Peskine793920c2024-02-01 21:26:54 +01001192pk_get_psa_attributes_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):256:PSA_KEY_USAGE_VERIFY_MESSAGE:PSA_ALG_ECDSA_ANY:PSA_KEY_USAGE_VERIFY_MESSAGE:0:0:PSA_KEY_USAGE_VERIFY_MESSAGE
Gilles Peskine758d8c72024-01-22 20:53:21 +01001193
Gilles Peskine793920c2024-02-01 21:26:54 +01001194PSA attributes for pk: opaque ECC pair->public, VERIFY_HASH & VERIFY_HASH
Valerio Setti09e98722024-04-02 11:33:22 +02001195depends_on:PSA_WANT_ECC_SECP_R1_256:MBEDTLS_PK_HAVE_ECC_KEYS
Gilles Peskine591e83d2024-02-01 21:33:44 +01001196pk_get_psa_attributes_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):256:PSA_KEY_USAGE_VERIFY_HASH | PSA_KEY_USAGE_VERIFY_MESSAGE:PSA_ALG_ECDSA_ANY:PSA_KEY_USAGE_VERIFY_HASH:0:0:PSA_KEY_USAGE_VERIFY_HASH | PSA_KEY_USAGE_VERIFY_MESSAGE
Gilles Peskine758d8c72024-01-22 20:53:21 +01001197
Gilles Peskine793920c2024-02-01 21:26:54 +01001198PSA attributes for pk: opaque ECC pair->public, ENCRYPT & ENCRYPT (bad)
Valerio Setti09e98722024-04-02 11:33:22 +02001199depends_on:PSA_WANT_ECC_SECP_R1_256:MBEDTLS_PK_HAVE_ECC_KEYS
Gilles Peskine793920c2024-02-01 21:26:54 +01001200pk_get_psa_attributes_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):256:PSA_KEY_USAGE_ENCRYPT:PSA_ALG_ECDSA_ANY:PSA_KEY_USAGE_ENCRYPT:MBEDTLS_ERR_PK_TYPE_MISMATCH:0:0
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001201
1202PSA import into PSA: RSA pair to ECC (bad)
Valerio Setti09e98722024-04-02 11:33:22 +02001203depends_on:MBEDTLS_RSA_C
Gilles Peskined6fc3502024-02-15 13:53:03 +01001204pk_import_into_psa_fail:MBEDTLS_PK_RSA:FROM_PAIR:PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):0:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001205
1206PSA import into PSA: RSA public to RSA pair (bad)
Valerio Setti09e98722024-04-02 11:33:22 +02001207depends_on:MBEDTLS_RSA_C
Gilles Peskined6fc3502024-02-15 13:53:03 +01001208pk_import_into_psa_fail:MBEDTLS_PK_RSA:FROM_PUBLIC:PSA_KEY_TYPE_RSA_KEY_PAIR:0:MBEDTLS_ERR_RSA_BAD_INPUT_DATA
1209
1210# MBEDTLS_ERR_PK_INVALID_ALG is the error that results from our translation
1211# of PSA errors. In this case MBEDTLS_ERR_PK_TYPE_MISMATCH would probably
1212# be more appropriate. (Applies to all the RSA "different bits" test cases.)
1213PSA import into PSA: RSA pair to different bits (bad)
Valerio Setti09e98722024-04-02 11:33:22 +02001214depends_on:MBEDTLS_RSA_C
Valerio Setti79033852024-04-16 16:00:35 +02001215pk_import_into_psa_fail:MBEDTLS_PK_RSA:FROM_PAIR:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE + 8:MBEDTLS_ERR_PK_INVALID_ALG
Gilles Peskined6fc3502024-02-15 13:53:03 +01001216
1217PSA import into PSA: RSA public to different bits (bad)
Valerio Setti09e98722024-04-02 11:33:22 +02001218depends_on:MBEDTLS_RSA_C
Valerio Setti79033852024-04-16 16:00:35 +02001219pk_import_into_psa_fail:MBEDTLS_PK_RSA:FROM_PUBLIC:PSA_KEY_TYPE_RSA_PUBLIC_KEY:RSA_KEY_SIZE + 8:MBEDTLS_ERR_PK_INVALID_ALG
Gilles Peskined6fc3502024-02-15 13:53:03 +01001220
1221PSA import into PSA: RSA private to public, different bits (bad)
Valerio Setti09e98722024-04-02 11:33:22 +02001222depends_on:MBEDTLS_RSA_C
Valerio Setti79033852024-04-16 16:00:35 +02001223pk_import_into_psa_fail:MBEDTLS_PK_RSA:FROM_PAIR:PSA_KEY_TYPE_RSA_PUBLIC_KEY:RSA_KEY_SIZE + 8:MBEDTLS_ERR_PK_INVALID_ALG
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001224
1225PSA import into PSA: ECKEY pair to RSA (bad)
Elena Uziunaitedb0ed752024-09-03 14:13:50 +01001226depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT
Gilles Peskined6fc3502024-02-15 13:53:03 +01001227pk_import_into_psa_fail:MBEDTLS_PK_ECKEY:FROM_PAIR:PSA_KEY_TYPE_RSA_KEY_PAIR:0:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001228
1229PSA import into PSA: ECKEY_DH pair to RSA (bad)
Elena Uziunaitedb0ed752024-09-03 14:13:50 +01001230depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT
Gilles Peskined6fc3502024-02-15 13:53:03 +01001231pk_import_into_psa_fail:MBEDTLS_PK_ECKEY_DH:FROM_PAIR:PSA_KEY_TYPE_RSA_KEY_PAIR:0:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001232
1233PSA import into PSA: ECDSA pair to RSA (bad)
Elena Uziunaite47a9b3d2024-09-16 14:25:38 +01001234depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:MBEDTLS_PK_CAN_ECDSA_SIGN
Gilles Peskined6fc3502024-02-15 13:53:03 +01001235pk_import_into_psa_fail:MBEDTLS_PK_ECDSA:FROM_PAIR:PSA_KEY_TYPE_RSA_KEY_PAIR:0:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001236
Gilles Peskine10e9c412024-02-09 19:29:08 +01001237PSA import into PSA: ECKEY pair to different curve (bad)
Elena Uziunaitedb0ed752024-09-03 14:13:50 +01001238depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_HAVE_TWO_FAMILIES:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT
Gilles Peskined6fc3502024-02-15 13:53:03 +01001239pk_import_into_psa_fail:MBEDTLS_PK_ECKEY:FROM_PAIR:PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ANOTHER_FAMILY):0:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskine10e9c412024-02-09 19:29:08 +01001240
1241PSA import into PSA: ECKEY_DH pair to different curve (bad)
Elena Uziunaitedb0ed752024-09-03 14:13:50 +01001242depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_HAVE_TWO_FAMILIES:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT
Gilles Peskined6fc3502024-02-15 13:53:03 +01001243pk_import_into_psa_fail:MBEDTLS_PK_ECKEY_DH:FROM_PAIR:PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ANOTHER_FAMILY):0:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskine10e9c412024-02-09 19:29:08 +01001244
1245PSA import into PSA: ECDSA pair to different curve (bad)
Elena Uziunaite47a9b3d2024-09-16 14:25:38 +01001246depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_HAVE_TWO_FAMILIES:MBEDTLS_PK_CAN_ECDSA_SIGN
Gilles Peskined6fc3502024-02-15 13:53:03 +01001247pk_import_into_psa_fail:MBEDTLS_PK_ECDSA:FROM_PAIR:PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ANOTHER_FAMILY):0:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskine10e9c412024-02-09 19:29:08 +01001248
1249PSA import into PSA: ECKEY pair to public, different curve (bad)
Elena Uziunaitedb0ed752024-09-03 14:13:50 +01001250depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_HAVE_TWO_FAMILIES:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT
Gilles Peskined6fc3502024-02-15 13:53:03 +01001251pk_import_into_psa_fail:MBEDTLS_PK_ECKEY:FROM_PAIR:PSA_KEY_TYPE_ECC_PUBLIC_KEY(MBEDTLS_TEST_PSA_ECC_ANOTHER_FAMILY):0:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskine10e9c412024-02-09 19:29:08 +01001252
1253PSA import into PSA: ECKEY_DH pair to public, different curve (bad)
Elena Uziunaitedb0ed752024-09-03 14:13:50 +01001254depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_HAVE_TWO_FAMILIES:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT
Gilles Peskined6fc3502024-02-15 13:53:03 +01001255pk_import_into_psa_fail:MBEDTLS_PK_ECKEY_DH:FROM_PAIR:PSA_KEY_TYPE_ECC_PUBLIC_KEY(MBEDTLS_TEST_PSA_ECC_ANOTHER_FAMILY):0:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskine10e9c412024-02-09 19:29:08 +01001256
1257PSA import into PSA: ECDSA pair to public, different curve (bad)
Elena Uziunaite47a9b3d2024-09-16 14:25:38 +01001258depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_HAVE_TWO_FAMILIES:MBEDTLS_PK_CAN_ECDSA_SIGN
Gilles Peskined6fc3502024-02-15 13:53:03 +01001259pk_import_into_psa_fail:MBEDTLS_PK_ECDSA:FROM_PAIR:PSA_KEY_TYPE_ECC_PUBLIC_KEY(MBEDTLS_TEST_PSA_ECC_ANOTHER_FAMILY):0:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskine10e9c412024-02-09 19:29:08 +01001260
1261PSA import into PSA: ECKEY public to different curve (bad)
1262depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_HAVE_TWO_FAMILIES
Gilles Peskined6fc3502024-02-15 13:53:03 +01001263pk_import_into_psa_fail:MBEDTLS_PK_ECKEY:FROM_PUBLIC:PSA_KEY_TYPE_ECC_PUBLIC_KEY(MBEDTLS_TEST_PSA_ECC_ANOTHER_FAMILY):0:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskine10e9c412024-02-09 19:29:08 +01001264
1265PSA import into PSA: ECKEY_DH public to different curve (bad)
1266depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_HAVE_TWO_FAMILIES
Gilles Peskined6fc3502024-02-15 13:53:03 +01001267pk_import_into_psa_fail:MBEDTLS_PK_ECKEY_DH:FROM_PUBLIC:PSA_KEY_TYPE_ECC_PUBLIC_KEY(MBEDTLS_TEST_PSA_ECC_ANOTHER_FAMILY):0:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskine10e9c412024-02-09 19:29:08 +01001268
1269PSA import into PSA: ECDSA public to different curve (bad)
1270depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_HAVE_TWO_FAMILIES:MBEDTLS_PK_CAN_ECDSA_SOME
Gilles Peskined6fc3502024-02-15 13:53:03 +01001271pk_import_into_psa_fail:MBEDTLS_PK_ECDSA:FROM_PUBLIC:PSA_KEY_TYPE_ECC_PUBLIC_KEY(MBEDTLS_TEST_PSA_ECC_ANOTHER_FAMILY):0:MBEDTLS_ERR_PK_TYPE_MISMATCH
1272
1273PSA import into PSA: ECKEY pair to different bits (bad)
Elena Uziunaitedb0ed752024-09-03 14:13:50 +01001274depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_HAVE_TWO_BITS:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT
Gilles Peskined6fc3502024-02-15 13:53:03 +01001275pk_import_into_psa_fail:MBEDTLS_PK_ECKEY:FROM_PAIR:PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS):MBEDTLS_TEST_PSA_ECC_ANOTHER_CURVE_BITS:MBEDTLS_ERR_PK_TYPE_MISMATCH
1276
1277PSA import into PSA: ECKEY_DH pair to different bits (bad)
Elena Uziunaitedb0ed752024-09-03 14:13:50 +01001278depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_HAVE_TWO_BITS:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT
Gilles Peskined6fc3502024-02-15 13:53:03 +01001279pk_import_into_psa_fail:MBEDTLS_PK_ECKEY_DH:FROM_PAIR:PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS):MBEDTLS_TEST_PSA_ECC_ANOTHER_CURVE_BITS:MBEDTLS_ERR_PK_TYPE_MISMATCH
1280
1281PSA import into PSA: ECDSA pair to different bits (bad)
Elena Uziunaite47a9b3d2024-09-16 14:25:38 +01001282depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_HAVE_TWO_BITS:MBEDTLS_PK_CAN_ECDSA_SIGN
Gilles Peskined6fc3502024-02-15 13:53:03 +01001283pk_import_into_psa_fail:MBEDTLS_PK_ECDSA:FROM_PAIR:PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS):MBEDTLS_TEST_PSA_ECC_ANOTHER_CURVE_BITS:MBEDTLS_ERR_PK_TYPE_MISMATCH
1284
1285PSA import into PSA: ECKEY public to different bits (bad)
1286depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_HAVE_TWO_BITS
1287pk_import_into_psa_fail:MBEDTLS_PK_ECKEY:FROM_PUBLIC:PSA_KEY_TYPE_ECC_PUBLIC_KEY(MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS):MBEDTLS_TEST_PSA_ECC_ANOTHER_CURVE_BITS:MBEDTLS_ERR_PK_TYPE_MISMATCH
1288
1289PSA import into PSA: ECKEY_DH public to different bits (bad)
1290depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_HAVE_TWO_BITS
1291pk_import_into_psa_fail:MBEDTLS_PK_ECKEY_DH:FROM_PUBLIC:PSA_KEY_TYPE_ECC_PUBLIC_KEY(MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS):MBEDTLS_TEST_PSA_ECC_ANOTHER_CURVE_BITS:MBEDTLS_ERR_PK_TYPE_MISMATCH
1292
1293PSA import into PSA: ECDSA public to different bits (bad)
1294depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_HAVE_TWO_BITS:MBEDTLS_PK_CAN_ECDSA_SOME
1295pk_import_into_psa_fail:MBEDTLS_PK_ECDSA:FROM_PUBLIC:PSA_KEY_TYPE_ECC_PUBLIC_KEY(MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS):MBEDTLS_TEST_PSA_ECC_ANOTHER_CURVE_BITS:MBEDTLS_ERR_PK_TYPE_MISMATCH
1296
1297PSA import into PSA: ECKEY private to public, different bits (bad)
Elena Uziunaitedb0ed752024-09-03 14:13:50 +01001298depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_HAVE_TWO_BITS:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT
Gilles Peskined6fc3502024-02-15 13:53:03 +01001299pk_import_into_psa_fail:MBEDTLS_PK_ECKEY:FROM_PAIR:PSA_KEY_TYPE_ECC_PUBLIC_KEY(MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS):MBEDTLS_TEST_PSA_ECC_ANOTHER_CURVE_BITS:MBEDTLS_ERR_PK_TYPE_MISMATCH
1300
1301PSA import into PSA: ECKEY_DH private to public, different bits (bad)
Elena Uziunaitedb0ed752024-09-03 14:13:50 +01001302depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_HAVE_TWO_BITS:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT
Gilles Peskined6fc3502024-02-15 13:53:03 +01001303pk_import_into_psa_fail:MBEDTLS_PK_ECKEY_DH:FROM_PAIR:PSA_KEY_TYPE_ECC_PUBLIC_KEY(MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS):MBEDTLS_TEST_PSA_ECC_ANOTHER_CURVE_BITS:MBEDTLS_ERR_PK_TYPE_MISMATCH
1304
1305PSA import into PSA: ECDSA private to public, different bits (bad)
Elena Uziunaite47a9b3d2024-09-16 14:25:38 +01001306depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_HAVE_TWO_BITS:MBEDTLS_PK_CAN_ECDSA_SIGN
Gilles Peskined6fc3502024-02-15 13:53:03 +01001307pk_import_into_psa_fail:MBEDTLS_PK_ECDSA:FROM_PAIR:PSA_KEY_TYPE_ECC_PUBLIC_KEY(MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS):MBEDTLS_TEST_PSA_ECC_ANOTHER_CURVE_BITS:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskine10e9c412024-02-09 19:29:08 +01001308
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001309PSA import into PSA: ECKEY public to pair (bad)
1310depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE
Gilles Peskined6fc3502024-02-15 13:53:03 +01001311pk_import_into_psa_fail:MBEDTLS_PK_ECKEY:FROM_PUBLIC:PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):0:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001312
1313PSA import into PSA: ECKEY_DH public to pair (bad)
1314depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE
Gilles Peskined6fc3502024-02-15 13:53:03 +01001315pk_import_into_psa_fail:MBEDTLS_PK_ECKEY_DH:FROM_PUBLIC:PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):0:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001316
1317PSA import into PSA: ECDSA public to pair (bad)
1318depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:MBEDTLS_PK_CAN_ECDSA_SOME
Gilles Peskined6fc3502024-02-15 13:53:03 +01001319pk_import_into_psa_fail:MBEDTLS_PK_ECDSA:FROM_PUBLIC:PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):0:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001320
Gilles Peskinea69572b2024-03-12 15:24:34 +01001321PSA import into PSA: transparent -> volatile pair
1322pk_import_into_psa_lifetime:0:0:1:0:0
1323
1324PSA import into PSA: transparent -> persistent pair
1325pk_import_into_psa_lifetime:0:0:1:0:1
1326
1327PSA import into PSA: transparent -> volatile public
1328pk_import_into_psa_lifetime:0:0:1:1:0
1329
1330PSA import into PSA: transparent -> persistent public
1331pk_import_into_psa_lifetime:0:0:1:1:1
1332
1333PSA import into PSA: opaque volatile [export] -> volatile pair
1334depends_on:MBEDTLS_USE_PSA_CRYPTO
1335pk_import_into_psa_lifetime:1:0:1:0:0
1336
1337PSA import into PSA: opaque volatile [export] -> persistent pair
1338depends_on:MBEDTLS_USE_PSA_CRYPTO
1339pk_import_into_psa_lifetime:1:0:1:0:1
1340
1341PSA import into PSA: opaque volatile [export] -> volatile public
1342depends_on:MBEDTLS_USE_PSA_CRYPTO
1343pk_import_into_psa_lifetime:1:0:1:1:0
1344
1345PSA import into PSA: opaque volatile [export] -> persistent public
1346depends_on:MBEDTLS_USE_PSA_CRYPTO
1347pk_import_into_psa_lifetime:1:0:1:1:1
1348
1349PSA import into PSA: opaque volatile [copy] -> volatile pair
1350depends_on:MBEDTLS_USE_PSA_CRYPTO
1351pk_import_into_psa_lifetime:1:0:0:0:0
1352
1353PSA import into PSA: opaque volatile [copy] -> persistent pair
1354depends_on:MBEDTLS_USE_PSA_CRYPTO
1355pk_import_into_psa_lifetime:1:0:0:0:1
1356
1357PSA import into PSA: opaque volatile [copy] -> volatile public
1358depends_on:MBEDTLS_USE_PSA_CRYPTO
1359pk_import_into_psa_lifetime:1:0:0:1:0
1360
1361PSA import into PSA: opaque volatile [copy] -> persistent public
1362depends_on:MBEDTLS_USE_PSA_CRYPTO
1363pk_import_into_psa_lifetime:1:0:0:1:1
1364
1365PSA import into PSA: opaque persistent [export] -> volatile pair
1366depends_on:MBEDTLS_USE_PSA_CRYPTO
1367pk_import_into_psa_lifetime:1:1:1:0:0
1368
1369PSA import into PSA: opaque persistent [export] -> persistent pair
1370depends_on:MBEDTLS_USE_PSA_CRYPTO
1371pk_import_into_psa_lifetime:1:1:1:0:1
1372
1373PSA import into PSA: opaque persistent [export] -> volatile public
1374depends_on:MBEDTLS_USE_PSA_CRYPTO
1375pk_import_into_psa_lifetime:1:1:1:1:0
1376
1377PSA import into PSA: opaque persistent [export] -> persistent public
1378depends_on:MBEDTLS_USE_PSA_CRYPTO
1379pk_import_into_psa_lifetime:1:1:1:1:1
1380
1381PSA import into PSA: opaque persistent [copy] -> volatile pair
1382depends_on:MBEDTLS_USE_PSA_CRYPTO
1383pk_import_into_psa_lifetime:1:1:0:0:0
1384
1385PSA import into PSA: opaque persistent [copy] -> persistent pair
1386depends_on:MBEDTLS_USE_PSA_CRYPTO
1387pk_import_into_psa_lifetime:1:1:0:0:1
1388
1389PSA import into PSA: opaque persistent [copy] -> volatile public
1390depends_on:MBEDTLS_USE_PSA_CRYPTO
1391pk_import_into_psa_lifetime:1:1:0:1:0
1392
1393PSA import into PSA: opaque persistent [copy] -> persistent public
1394depends_on:MBEDTLS_USE_PSA_CRYPTO
1395pk_import_into_psa_lifetime:1:1:0:1:1
1396
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001397PSA import into PSA: opaque RSA, COPY (ok)
Valerio Setti5ec93412024-03-25 13:10:13 +01001398depends_on:PSA_WANT_ALG_RSA_PKCS1V15_SIGN
Valerio Setti79033852024-04-16 16:00:35 +02001399pk_import_into_psa_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:0
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001400
1401PSA import into PSA: opaque RSA, EXPORT (ok)
Valerio Setti5ec93412024-03-25 13:10:13 +01001402depends_on:PSA_WANT_ALG_RSA_PKCS1V15_SIGN
Valerio Setti79033852024-04-16 16:00:35 +02001403pk_import_into_psa_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:0
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001404
1405PSA import into PSA: opaque RSA, no COPY/EXPORT (bad)
Valerio Setti5ec93412024-03-25 13:10:13 +01001406depends_on:PSA_WANT_ALG_RSA_PKCS1V15_SIGN
Valerio Setti79033852024-04-16 16:00:35 +02001407pk_import_into_psa_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001408
1409# Detail that isn't precisely documented: since this copies the key,
1410# the new key has the intersection of the usage flags.
1411PSA import into PSA: opaque RSA, COPY|EXPORT, different usage (restricted)
Valerio Setti5ec93412024-03-25 13:10:13 +01001412depends_on:PSA_WANT_ALG_RSA_PKCS1V15_SIGN
Valerio Setti79033852024-04-16 16:00:35 +02001413pk_import_into_psa_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:0
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001414
1415# Detail that isn't precisely documented: since this copies the key,
1416# the new key has the intersection of the usage flags.
1417PSA import into PSA: opaque RSA, COPY, different usage (restricted)
Valerio Setti5ec93412024-03-25 13:10:13 +01001418depends_on:PSA_WANT_ALG_RSA_PKCS1V15_SIGN
Valerio Setti79033852024-04-16 16:00:35 +02001419pk_import_into_psa_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:0
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001420
1421# Detail that isn't precisely documented: since this exports the key,
1422# the new key has all the requested usage flags.
1423PSA import into PSA: opaque RSA, EXPORT, different usage (ok)
Valerio Setti5ec93412024-03-25 13:10:13 +01001424depends_on:PSA_WANT_ALG_RSA_PKCS1V15_SIGN
Valerio Setti79033852024-04-16 16:00:35 +02001425pk_import_into_psa_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:0
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001426
1427PSA import into PSA: opaque RSA, COPY|EXPORT, different algorithm (ok)
Valerio Setti5ec93412024-03-25 13:10:13 +01001428depends_on:PSA_WANT_ALG_RSA_PKCS1V15_SIGN
Valerio Setti79033852024-04-16 16:00:35 +02001429pk_import_into_psa_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_SHA_256):0
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001430
1431PSA import into PSA: opaque RSA, COPY, different algorithm (bad)
Valerio Setti5ec93412024-03-25 13:10:13 +01001432depends_on:PSA_WANT_ALG_RSA_PKCS1V15_SIGN
Valerio Setti79033852024-04-16 16:00:35 +02001433pk_import_into_psa_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_SHA_256):MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001434
1435PSA import into PSA: opaque RSA, EXPORT, different algorithm (ok)
Valerio Setti5ec93412024-03-25 13:10:13 +01001436depends_on:PSA_WANT_ALG_RSA_PKCS1V15_SIGN
Valerio Setti79033852024-04-16 16:00:35 +02001437pk_import_into_psa_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_SHA_256):0
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001438
1439PSA import into PSA: opaque RSA, implicit bits (ok)
Valerio Setti5ec93412024-03-25 13:10:13 +01001440depends_on:PSA_WANT_ALG_RSA_PKCS1V15_SIGN
Valerio Setti79033852024-04-16 16:00:35 +02001441pk_import_into_psa_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_KEY_TYPE_RSA_KEY_PAIR:0:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:0
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001442
1443PSA import into PSA: opaque RSA, different bits (bad)
Valerio Setti5ec93412024-03-25 13:10:13 +01001444depends_on:PSA_WANT_ALG_RSA_PKCS1V15_SIGN
Valerio Setti79033852024-04-16 16:00:35 +02001445pk_import_into_psa_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE + 8:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001446
1447PSA import into PSA: opaque RSA, different type (bad)
Valerio Setti5ec93412024-03-25 13:10:13 +01001448depends_on:PSA_WANT_ALG_RSA_PKCS1V15_SIGN
Valerio Setti79033852024-04-16 16:00:35 +02001449pk_import_into_psa_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:0:PSA_KEY_TYPE_HMAC:RSA_KEY_SIZE:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:0:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001450
1451PSA import into PSA: opaque RSA to public (ok)
Valerio Setti5ec93412024-03-25 13:10:13 +01001452depends_on:PSA_WANT_ALG_RSA_PKCS1V15_SIGN
Valerio Setti79033852024-04-16 16:00:35 +02001453pk_import_into_psa_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_KEY_TYPE_RSA_PUBLIC_KEY:RSA_KEY_SIZE:PSA_KEY_USAGE_VERIFY_HASH | PSA_KEY_USAGE_VERIFY_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:0
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001454
1455PSA import into PSA: opaque RSA to public, implicit bits (ok)
Valerio Setti5ec93412024-03-25 13:10:13 +01001456depends_on:PSA_WANT_ALG_RSA_PKCS1V15_SIGN
Valerio Setti79033852024-04-16 16:00:35 +02001457pk_import_into_psa_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_KEY_TYPE_RSA_PUBLIC_KEY:0:PSA_KEY_USAGE_VERIFY_HASH | PSA_KEY_USAGE_VERIFY_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:0
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001458
1459# MBEDTLS_ERR_PK_INVALID_ALG is the error that results from our translation
1460# of PSA errors. In this case MBEDTLS_ERR_PK_TYPE_MISMATCH would probably
1461# be more appropriate.
1462PSA import into PSA: opaque RSA to public, different bits (bad)
Valerio Setti5ec93412024-03-25 13:10:13 +01001463depends_on:PSA_WANT_ALG_RSA_PKCS1V15_SIGN
Valerio Setti79033852024-04-16 16:00:35 +02001464pk_import_into_psa_opaque:PSA_KEY_TYPE_RSA_KEY_PAIR:RSA_KEY_SIZE:PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:PSA_KEY_TYPE_RSA_PUBLIC_KEY:RSA_KEY_SIZE + 8:PSA_KEY_USAGE_VERIFY_HASH | PSA_KEY_USAGE_VERIFY_MESSAGE:PSA_ALG_RSA_PKCS1V15_SIGN_RAW:MBEDTLS_ERR_PK_INVALID_ALG
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001465
1466PSA import into PSA: opaque ECC, COPY (ok)
Valerio Setti5ec93412024-03-25 13:10:13 +01001467depends_on:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_ALG_ECDSA
Gilles Peskinecbd2cbb2024-02-15 13:12:44 +01001468pk_import_into_psa_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):0
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001469
1470PSA import into PSA: opaque ECC, EXPORT (ok)
Valerio Setti5ec93412024-03-25 13:10:13 +01001471depends_on:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_ALG_ECDSA
Gilles Peskinecbd2cbb2024-02-15 13:12:44 +01001472pk_import_into_psa_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):0
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001473
1474PSA import into PSA: opaque ECC, no COPY/EXPORT (bad)
Valerio Setti5ec93412024-03-25 13:10:13 +01001475depends_on:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_ALG_ECDSA
Gilles Peskinecbd2cbb2024-02-15 13:12:44 +01001476pk_import_into_psa_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001477
1478# Detail that isn't precisely documented: since this copies the key,
1479# the new key has the intersection of the usage flags.
1480PSA import into PSA: opaque ECC, COPY|EXPORT, different usage (restricted)
Valerio Setti5ec93412024-03-25 13:10:13 +01001481depends_on:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_ALG_ECDSA
Gilles Peskinecbd2cbb2024-02-15 13:12:44 +01001482pk_import_into_psa_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):0
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001483
1484# Detail that isn't precisely documented: since this copies the key,
1485# the new key has the intersection of the usage flags.
1486PSA import into PSA: opaque ECC, COPY, different usage (restricted)
Valerio Setti5ec93412024-03-25 13:10:13 +01001487depends_on:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_ALG_ECDSA
Gilles Peskinecbd2cbb2024-02-15 13:12:44 +01001488pk_import_into_psa_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):0
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001489
1490# Detail that isn't precisely documented: since this exports the key,
1491# the new key has all the requested usage flags.
1492PSA import into PSA: opaque ECC, EXPORT, different usage (ok)
Valerio Setti5ec93412024-03-25 13:10:13 +01001493depends_on:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_ALG_ECDSA
Gilles Peskinecbd2cbb2024-02-15 13:12:44 +01001494pk_import_into_psa_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):0
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001495
1496PSA import into PSA: opaque ECC, COPY|EXPORT, different algorithm (ok)
Valerio Setti5ec93412024-03-25 13:10:13 +01001497depends_on:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_ALG_ECDSA
Gilles Peskinecbd2cbb2024-02-15 13:12:44 +01001498pk_import_into_psa_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_DETERMINISTIC_ECDSA(PSA_ALG_SHA_256):0
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001499
1500PSA import into PSA: opaque ECC, COPY, different algorithm (bad)
Valerio Setti5ec93412024-03-25 13:10:13 +01001501depends_on:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_ALG_ECDSA
Gilles Peskinecbd2cbb2024-02-15 13:12:44 +01001502pk_import_into_psa_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_DETERMINISTIC_ECDSA(PSA_ALG_SHA_256):MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001503
1504PSA import into PSA: opaque ECC, EXPORT, different algorithm (ok)
Valerio Setti5ec93412024-03-25 13:10:13 +01001505depends_on:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_ALG_ECDSA
Gilles Peskinecbd2cbb2024-02-15 13:12:44 +01001506pk_import_into_psa_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_EXPORT | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_DETERMINISTIC_ECDSA(PSA_ALG_SHA_256):0
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001507
1508PSA import into PSA: opaque ECC, implicit bits (ok)
Valerio Setti5ec93412024-03-25 13:10:13 +01001509depends_on:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_ALG_ECDSA
Gilles Peskinecbd2cbb2024-02-15 13:12:44 +01001510pk_import_into_psa_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):0:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):0
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001511
1512PSA import into PSA: opaque ECC, different bits (bad)
Valerio Setti5ec93412024-03-25 13:10:13 +01001513depends_on:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_ALG_ECDSA
Gilles Peskinecbd2cbb2024-02-15 13:12:44 +01001514pk_import_into_psa_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS + 8:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001515
1516PSA import into PSA: opaque ECC, different type (bad)
Valerio Setti5ec93412024-03-25 13:10:13 +01001517depends_on:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_ALG_ECDSA
Gilles Peskinecbd2cbb2024-02-15 13:12:44 +01001518pk_import_into_psa_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:0:PSA_KEY_TYPE_HMAC:MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:0:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001519
Gilles Peskine10e9c412024-02-09 19:29:08 +01001520PSA import into PSA: opaque ECC, different family (bad)
Valerio Setti5ec93412024-03-25 13:10:13 +01001521depends_on:MBEDTLS_TEST_PSA_ECC_HAVE_TWO_FAMILIES:PSA_WANT_ALG_ECDSA
Gilles Peskinecbd2cbb2024-02-15 13:12:44 +01001522pk_import_into_psa_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:0:PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ANOTHER_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:0:MBEDTLS_ERR_PK_TYPE_MISMATCH
Gilles Peskine10e9c412024-02-09 19:29:08 +01001523
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001524PSA import into PSA: opaque ECC to public (ok)
Valerio Setti5ec93412024-03-25 13:10:13 +01001525depends_on:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_ALG_ECDSA
Gilles Peskinecbd2cbb2024-02-15 13:12:44 +01001526pk_import_into_psa_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):PSA_KEY_TYPE_ECC_PUBLIC_KEY(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_VERIFY_HASH | PSA_KEY_USAGE_VERIFY_MESSAGE:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):0
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001527
1528PSA import into PSA: opaque ECC to public, implicit bits (ok)
Valerio Setti5ec93412024-03-25 13:10:13 +01001529depends_on:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_ALG_ECDSA
Gilles Peskinecbd2cbb2024-02-15 13:12:44 +01001530pk_import_into_psa_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):PSA_KEY_TYPE_ECC_PUBLIC_KEY(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):0:PSA_KEY_USAGE_VERIFY_HASH | PSA_KEY_USAGE_VERIFY_MESSAGE:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):0
Gilles Peskinefc3d8662024-02-09 19:26:37 +01001531
1532# MBEDTLS_ERR_PK_INVALID_ALG is the error that results from our translation
1533# of PSA errors. In this case MBEDTLS_ERR_PK_TYPE_MISMATCH would probably
1534# be more appropriate.
1535PSA import into PSA: opaque ECC to public, different bits (bad)
Valerio Setti5ec93412024-03-25 13:10:13 +01001536depends_on:MBEDTLS_TEST_PSA_ECC_AT_LEAST_ONE_CURVE:PSA_WANT_ALG_ECDSA
Gilles Peskinecbd2cbb2024-02-15 13:12:44 +01001537pk_import_into_psa_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):PSA_KEY_TYPE_ECC_PUBLIC_KEY(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS + 8:PSA_KEY_USAGE_VERIFY_HASH | PSA_KEY_USAGE_VERIFY_MESSAGE:PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):MBEDTLS_ERR_PK_INVALID_ALG
Gilles Peskine10e9c412024-02-09 19:29:08 +01001538
1539PSA import into PSA: opaque ECC to public, different family (bad)
Valerio Setti5ec93412024-03-25 13:10:13 +01001540depends_on:MBEDTLS_TEST_PSA_ECC_HAVE_TWO_FAMILIES:PSA_WANT_ALG_ECDSA
Gilles Peskinecbd2cbb2024-02-15 13:12:44 +01001541pk_import_into_psa_opaque:PSA_KEY_TYPE_ECC_KEY_PAIR(MBEDTLS_TEST_PSA_ECC_ONE_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:0:PSA_KEY_TYPE_ECC_PUBLIC_KEY(MBEDTLS_TEST_PSA_ECC_ANOTHER_FAMILY):MBEDTLS_TEST_PSA_ECC_ONE_CURVE_BITS:PSA_KEY_USAGE_COPY | PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_SIGN_MESSAGE:0:MBEDTLS_ERR_PK_TYPE_MISMATCH
Valerio Setti10159852024-02-23 16:54:07 +01001542
Valerio Setti452d2d22024-02-01 11:31:30 +01001543Copy from PSA: use wrong parameters
1544pk_copy_from_psa_fail:
1545
Valerio Setti8b3c6ff2024-03-12 06:05:03 +01001546# The following test is only possible for RSA keys and not for EC ones:
1547# - for the former it is possible to have an accelerated RSA key in PSA while
1548# having RSA_C disabled. Since RSA path is guarded by RSA_C in mbedtls_pk_copy_from_psa(),
1549# any attempt to copy that key will fail.
1550# - for the latter instead the guard is PK_HAVE_ECC_KEYS which is enabled as soon
1551# as there is any curve supported either builtin or in a driver. In a scenario
1552# in which a certain EC key is only available through a driver and not as
1553# builtin mbedtls_pk_copy_from_psa() uses functions that will all succeed
1554# and therefore it will succeed.
Valerio Settif22eff92024-02-23 18:26:07 +01001555Copy from PSA: accelerated key only, not available as built-in
1556pk_copy_from_psa_builtin_fail:
1557
Valerio Setti10159852024-02-23 16:54:07 +01001558Copy from PSA: valid EC (SECP_R1_256 + ECDSA + ANY_HASH)
Valerio Settiab7ddbc2024-02-29 09:30:05 +01001559depends_on:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_MD_ALG_FOR_TEST
Valerio Settid2ccc2f2024-02-23 08:49:45 +01001560pk_copy_from_psa_success:"587CF7C57EB7C6254CBF80CC59846521B4FBCBA8BC4B362A9B043F0DEB49CCA1":PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_ALG_ECDSA(PSA_ALG_ANY_HASH)
Valerio Setti452d2d22024-02-01 11:31:30 +01001561
Valerio Setti10159852024-02-23 16:54:07 +01001562Copy from PSA: valid EC (SECP_R1_256 + ECDSA + SHA_256)
Valerio Setti452d2d22024-02-01 11:31:30 +01001563depends_on:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_MD_CAN_SHA256
Valerio Settid2ccc2f2024-02-23 08:49:45 +01001564pk_copy_from_psa_success:"587CF7C57EB7C6254CBF80CC59846521B4FBCBA8BC4B362A9B043F0DEB49CCA1":PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_ALG_ECDSA(PSA_ALG_SHA_256)
Valerio Setti452d2d22024-02-01 11:31:30 +01001565
Valerio Setti10159852024-02-23 16:54:07 +01001566Copy from PSA: valid EC (SECP_R1_256 + ECDSA + SHA_512)
Valerio Setti452d2d22024-02-01 11:31:30 +01001567depends_on:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_MD_CAN_SHA512
Valerio Settid2ccc2f2024-02-23 08:49:45 +01001568pk_copy_from_psa_success:"587CF7C57EB7C6254CBF80CC59846521B4FBCBA8BC4B362A9B043F0DEB49CCA1":PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_ALG_ECDSA(PSA_ALG_SHA_512)
Valerio Setti452d2d22024-02-01 11:31:30 +01001569
Valerio Setti10159852024-02-23 16:54:07 +01001570Copy from PSA: valid EC (SECP_R1_256 + DET_ECDSA + ANY_HASH)
Valerio Settiab7ddbc2024-02-29 09:30:05 +01001571depends_on:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_ECDSA_DETERMINISTIC:MBEDTLS_MD_ALG_FOR_TEST
Valerio Setti10159852024-02-23 16:54:07 +01001572pk_copy_from_psa_success:"587CF7C57EB7C6254CBF80CC59846521B4FBCBA8BC4B362A9B043F0DEB49CCA1":PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_ALG_DETERMINISTIC_ECDSA(PSA_ALG_ANY_HASH)
1573
1574Copy from PSA: valid EC (SECP_R1_256 + DET_ECDSA + SHA_256)
Valerio Setti42a58a52024-02-27 13:38:57 +01001575depends_on:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_ECDSA_DETERMINISTIC:MBEDTLS_MD_CAN_SHA256
Valerio Setti10159852024-02-23 16:54:07 +01001576pk_copy_from_psa_success:"587CF7C57EB7C6254CBF80CC59846521B4FBCBA8BC4B362A9B043F0DEB49CCA1":PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_ALG_DETERMINISTIC_ECDSA(PSA_ALG_SHA_256)
1577
1578Copy from PSA: valid EC (SECP_R1_256 + DET_ECDSA + SHA_512)
Valerio Setti42a58a52024-02-27 13:38:57 +01001579depends_on:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_ECDSA_DETERMINISTIC:MBEDTLS_MD_CAN_SHA512
Valerio Setti10159852024-02-23 16:54:07 +01001580pk_copy_from_psa_success:"587CF7C57EB7C6254CBF80CC59846521B4FBCBA8BC4B362A9B043F0DEB49CCA1":PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_ALG_DETERMINISTIC_ECDSA(PSA_ALG_SHA_512)
1581
1582Copy from PSA: valid EC (SECP_R1_256 + ECDSA_ANY)
Valerio Settiab7ddbc2024-02-29 09:30:05 +01001583depends_on:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_MD_ALG_FOR_TEST
Valerio Setti10159852024-02-23 16:54:07 +01001584pk_copy_from_psa_success:"587CF7C57EB7C6254CBF80CC59846521B4FBCBA8BC4B362A9B043F0DEB49CCA1":PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_ALG_ECDSA_ANY
1585
1586Copy from PSA: valid EC (SECP_R1_521 + ECDSA + SHA_256)
1587depends_on:MBEDTLS_ECP_HAVE_SECP521R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_MD_CAN_SHA256
1588pk_copy_from_psa_success:"005dbb8e12240a62932b88cdd93c31cdd8873a2c15e40cc3c9f8e695b77fae015a44fe5267ef7868cb28cfb9579282fe060de44fe6de26f74a0d94afdaa870befbc5":PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_ALG_ECDSA(PSA_ALG_SHA_256)
1589
1590Copy from PSA: valid EC (SECP_K1_256 + ECDSA + SHA_256)
1591depends_on:MBEDTLS_ECP_HAVE_SECP256K1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_MD_CAN_SHA256
1592pk_copy_from_psa_success:"7154f04fcc79ac9df1652dcf99031610592b2b27f74f5985690a987357ba0428":PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_K1):PSA_ALG_ECDSA(PSA_ALG_SHA_256)
1593
Valerio Settia657ae32024-02-23 17:55:28 +01001594# The key's algorithm only allows ECDH, but pk_copy_from_psa() ignores this information
1595# when building the PK context.
1596Copy from PSA: valid EC, wrong alg (SECP_R1_256 + ECDH)
1597depends_on:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_MD_CAN_SHA256
1598pk_copy_from_psa_success:"587CF7C57EB7C6254CBF80CC59846521B4FBCBA8BC4B362A9B043F0DEB49CCA1":PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_ALG_ECDH
1599
1600# The key's algorithm is absolutely wrong for an EC key, but pk_copy_from_psa()
1601# ignores this information when building the PK context.
1602Copy from PSA: valid EC, wrong alg (SECP_R1_256 + CMAC)
Valerio Setti42a58a52024-02-27 13:38:57 +01001603depends_on:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_MD_CAN_SHA256
Valerio Settia657ae32024-02-23 17:55:28 +01001604pk_copy_from_psa_success:"587CF7C57EB7C6254CBF80CC59846521B4FBCBA8BC4B362A9B043F0DEB49CCA1":PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1):PSA_ALG_CMAC
1605
Valerio Setti452d2d22024-02-01 11:31:30 +01001606Copy from PSA: valid RSA (PKCS1V15_SIGN + ANY_HASH)
Valerio Settiab7ddbc2024-02-29 09:30:05 +01001607depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_ALG_FOR_TEST
Valerio Settid2ccc2f2024-02-23 08:49:45 +01001608pk_copy_from_psa_success:"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":PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_ANY_HASH)
Valerio Setti452d2d22024-02-01 11:31:30 +01001609
1610Copy from PSA: valid RSA (PKCS1V15_SIGN + SHA_256)
1611depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_SHA256
Valerio Settid2ccc2f2024-02-23 08:49:45 +01001612pk_copy_from_psa_success:"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":PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_SHA_256)
Valerio Setti452d2d22024-02-01 11:31:30 +01001613
1614Copy from PSA: valid RSA (PKCS1V15_SIGN + SHA_512)
1615depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_SHA512
Valerio Settid2ccc2f2024-02-23 08:49:45 +01001616pk_copy_from_psa_success:"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":PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_SHA_512)
Valerio Setti452d2d22024-02-01 11:31:30 +01001617
1618Copy from PSA: valid RSA (PKCS1V15_CRYPT)
Valerio Settiab7ddbc2024-02-29 09:30:05 +01001619depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V15:MBEDTLS_MD_ALG_FOR_TEST
Valerio Settid2ccc2f2024-02-23 08:49:45 +01001620pk_copy_from_psa_success:"308204a40201000282010100ef24d80f6b7a0f62ab2f750a8370c1c39781abe2f7ae5cbc698ebbc51067af68c8b02e5bfafe0b296a2fdca8ee5327bf3370bd26c529d173c4356d8ad51f606ac730e3be509d8535c9c51927222d6c4e770efec4d9b0bd11410e5e2e01e093700d358aab8292297483c65870ea6d4ca9299f4347790f6223480732726a97b34bb4d53cb3f188e3c97115b029fa9a2cce4c6d935977a90737ac8b2a2c5691ad928b22681ca05ee38ddba2278c854f51281c5e4856090aca59bf719a167e63bb932580ae2b599e1a297194696e637a919bc9d2caf214e59d46ed1a12e591b608f2031744111551430d9ac39082957ae1ce03a88068896701e6ce19a83890ff5761020301000102820100706fb53a02c13fcc9749d7d09a9e002c12e6bfc715c6a00961e3defab74cd896fe8c7f2f75e1cda3aa2e58a400718e65822d0671dd0f5d4ffdb7550a8a4b974c7cdccaa72745f864a2ba0daa6d9247b2d89d6f41644c89883c3b2222a5754e3cc7a91dcaa7b84acf6249763998aeccf558016e638352ad44835006f2ee94e691d0070ce561677f2a22a12f357bd762c57f80f1f4921f0f26b3ed758478d11086c182874355ef5039e8d854291b9ce7f8b284ec81f141b7255313507f5ea159d6b1c0ee176e7743d3c65d536e1e4aaf24089c1e00c8021012b8846a4971a0695030504ace362077e8b2fcb4fbdd70bfb734a3fe7d9e1a25bdd0cb0f2fcb56ecc502818100f8fdfbac1c033911b5a184980d081f700f4d450cebf18cbdc68f160a5abd580e6f8f5800fd0b60521dbe2d549e82617afe70d2ad004c2f45405d94e4418e8c2b8da6bcaa407bbfa5477b5a6fceccfcb99f51c6c16bd17202d997bdcaec83b870e3e101acc05e0754020ec207ef5ec9934ac81cd617af72cd94b2bb400eb2078302818100f5dfe74a548c04950178f50130d5aadbe5d1f4b52527c0bfad9aa0d73731fb24219cb5ea5c4b4fa56133d5ea9225fa7d0ccc9bdcc78b77303a2e73c17e9a46b9b09020604496a849f069d0d87713e06a5d374271b2629f5ba220506b606a101828d20da9fcfa3a7e75b135987260be6d37622fc3f4bf4fd2dfd9655da5ff0c4b02818100d4d797c959f0cf59fa1f65ceec64e32ad189c5daf3ddf9e747d28c8eb15e65e5812bd19896b6a0d1d126fe6cf54a92b5a6c71ef04feed001acb1d253044f2c3716d14f396201e6a30c65bfbb0fd65ebaf61bdb80ffff7c2c3f80dcf69813491907531231700770d0392a1066e411ecd201fce9d98149b32355572b85e889faad028181009d898bc165709d52f7b18f91e6bf508d3ab08ed12df04da0c2d40b7039ce4d72b61299c082c8424cdd7dfff71f13346ec12fac42069cc68e6108f86427012485bfaa6904258e3e5fb9a9a305bf2e3e21087eea94bcce51fabd63650397affd85ed49c1358480b3cfe90ad5234b4dcf555d220d26c9ff765ecfcc94152fd1be070281804bf77b4bae8386772de830cc75f2d1d4b8221b3f817208e08c002ac0549902677e4f0e7bce5ba1b3da74fbbe138758e6853b4a5b7bf0672bc1170c64fa502a5e24e3472db433b4e30761eab6ebb9e207235fd88b97b1b30e14f364b628219d6e17056543a4e29a4de1e41ad37927ce23d0442623744bc35a1874296960029044":PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_ALG_RSA_PKCS1V15_CRYPT
Valerio Setti452d2d22024-02-01 11:31:30 +01001621
1622Copy from PSA: valid RSA (OAEP + SHA_256)
1623depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA256
Valerio Settid2ccc2f2024-02-23 08:49:45 +01001624pk_copy_from_psa_success:"308204a40201000282010100ef24d80f6b7a0f62ab2f750a8370c1c39781abe2f7ae5cbc698ebbc51067af68c8b02e5bfafe0b296a2fdca8ee5327bf3370bd26c529d173c4356d8ad51f606ac730e3be509d8535c9c51927222d6c4e770efec4d9b0bd11410e5e2e01e093700d358aab8292297483c65870ea6d4ca9299f4347790f6223480732726a97b34bb4d53cb3f188e3c97115b029fa9a2cce4c6d935977a90737ac8b2a2c5691ad928b22681ca05ee38ddba2278c854f51281c5e4856090aca59bf719a167e63bb932580ae2b599e1a297194696e637a919bc9d2caf214e59d46ed1a12e591b608f2031744111551430d9ac39082957ae1ce03a88068896701e6ce19a83890ff5761020301000102820100706fb53a02c13fcc9749d7d09a9e002c12e6bfc715c6a00961e3defab74cd896fe8c7f2f75e1cda3aa2e58a400718e65822d0671dd0f5d4ffdb7550a8a4b974c7cdccaa72745f864a2ba0daa6d9247b2d89d6f41644c89883c3b2222a5754e3cc7a91dcaa7b84acf6249763998aeccf558016e638352ad44835006f2ee94e691d0070ce561677f2a22a12f357bd762c57f80f1f4921f0f26b3ed758478d11086c182874355ef5039e8d854291b9ce7f8b284ec81f141b7255313507f5ea159d6b1c0ee176e7743d3c65d536e1e4aaf24089c1e00c8021012b8846a4971a0695030504ace362077e8b2fcb4fbdd70bfb734a3fe7d9e1a25bdd0cb0f2fcb56ecc502818100f8fdfbac1c033911b5a184980d081f700f4d450cebf18cbdc68f160a5abd580e6f8f5800fd0b60521dbe2d549e82617afe70d2ad004c2f45405d94e4418e8c2b8da6bcaa407bbfa5477b5a6fceccfcb99f51c6c16bd17202d997bdcaec83b870e3e101acc05e0754020ec207ef5ec9934ac81cd617af72cd94b2bb400eb2078302818100f5dfe74a548c04950178f50130d5aadbe5d1f4b52527c0bfad9aa0d73731fb24219cb5ea5c4b4fa56133d5ea9225fa7d0ccc9bdcc78b77303a2e73c17e9a46b9b09020604496a849f069d0d87713e06a5d374271b2629f5ba220506b606a101828d20da9fcfa3a7e75b135987260be6d37622fc3f4bf4fd2dfd9655da5ff0c4b02818100d4d797c959f0cf59fa1f65ceec64e32ad189c5daf3ddf9e747d28c8eb15e65e5812bd19896b6a0d1d126fe6cf54a92b5a6c71ef04feed001acb1d253044f2c3716d14f396201e6a30c65bfbb0fd65ebaf61bdb80ffff7c2c3f80dcf69813491907531231700770d0392a1066e411ecd201fce9d98149b32355572b85e889faad028181009d898bc165709d52f7b18f91e6bf508d3ab08ed12df04da0c2d40b7039ce4d72b61299c082c8424cdd7dfff71f13346ec12fac42069cc68e6108f86427012485bfaa6904258e3e5fb9a9a305bf2e3e21087eea94bcce51fabd63650397affd85ed49c1358480b3cfe90ad5234b4dcf555d220d26c9ff765ecfcc94152fd1be070281804bf77b4bae8386772de830cc75f2d1d4b8221b3f817208e08c002ac0549902677e4f0e7bce5ba1b3da74fbbe138758e6853b4a5b7bf0672bc1170c64fa502a5e24e3472db433b4e30761eab6ebb9e207235fd88b97b1b30e14f364b628219d6e17056543a4e29a4de1e41ad37927ce23d0442623744bc35a1874296960029044":PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_ALG_RSA_OAEP(PSA_ALG_SHA_256)
Valerio Setti452d2d22024-02-01 11:31:30 +01001625
1626Copy from PSA: valid RSA (OAEP + SHA_512)
1627depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA512
Valerio Settid2ccc2f2024-02-23 08:49:45 +01001628pk_copy_from_psa_success:"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":PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_ALG_RSA_OAEP(PSA_ALG_SHA_512)
Valerio Setti452d2d22024-02-01 11:31:30 +01001629
1630Copy from PSA: valid RSA (PSS_ANY_SALT + ANY_HASH)
Valerio Settiab7ddbc2024-02-29 09:30:05 +01001631depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V21:MBEDTLS_MD_ALG_FOR_TEST
Valerio Settid2ccc2f2024-02-23 08:49:45 +01001632pk_copy_from_psa_success:"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":PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_ALG_RSA_PSS_ANY_SALT(PSA_ALG_ANY_HASH)
Valerio Setti452d2d22024-02-01 11:31:30 +01001633
1634Copy from PSA: valid RSA (PSS_ANY_SALT + SHA_256)
1635depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA256
Valerio Settid2ccc2f2024-02-23 08:49:45 +01001636pk_copy_from_psa_success:"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":PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_ALG_RSA_PSS_ANY_SALT(PSA_ALG_SHA_256)
Valerio Setti452d2d22024-02-01 11:31:30 +01001637
1638Copy from PSA: valid RSA (PSS_ANY_SALT + SHA_512)
1639depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA512
Valerio Settid2ccc2f2024-02-23 08:49:45 +01001640pk_copy_from_psa_success:"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":PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_ALG_RSA_PSS_ANY_SALT(PSA_ALG_SHA_512)
Valerio Setti10159852024-02-23 16:54:07 +01001641
1642Copy from PSA: valid RSA (PSS + ANY_HASH)
Valerio Settiab7ddbc2024-02-29 09:30:05 +01001643depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V21:MBEDTLS_MD_ALG_FOR_TEST
Valerio Setti10159852024-02-23 16:54:07 +01001644pk_copy_from_psa_success:"308204a40201000282010100ef24d80f6b7a0f62ab2f750a8370c1c39781abe2f7ae5cbc698ebbc51067af68c8b02e5bfafe0b296a2fdca8ee5327bf3370bd26c529d173c4356d8ad51f606ac730e3be509d8535c9c51927222d6c4e770efec4d9b0bd11410e5e2e01e093700d358aab8292297483c65870ea6d4ca9299f4347790f6223480732726a97b34bb4d53cb3f188e3c97115b029fa9a2cce4c6d935977a90737ac8b2a2c5691ad928b22681ca05ee38ddba2278c854f51281c5e4856090aca59bf719a167e63bb932580ae2b599e1a297194696e637a919bc9d2caf214e59d46ed1a12e591b608f2031744111551430d9ac39082957ae1ce03a88068896701e6ce19a83890ff5761020301000102820100706fb53a02c13fcc9749d7d09a9e002c12e6bfc715c6a00961e3defab74cd896fe8c7f2f75e1cda3aa2e58a400718e65822d0671dd0f5d4ffdb7550a8a4b974c7cdccaa72745f864a2ba0daa6d9247b2d89d6f41644c89883c3b2222a5754e3cc7a91dcaa7b84acf6249763998aeccf558016e638352ad44835006f2ee94e691d0070ce561677f2a22a12f357bd762c57f80f1f4921f0f26b3ed758478d11086c182874355ef5039e8d854291b9ce7f8b284ec81f141b7255313507f5ea159d6b1c0ee176e7743d3c65d536e1e4aaf24089c1e00c8021012b8846a4971a0695030504ace362077e8b2fcb4fbdd70bfb734a3fe7d9e1a25bdd0cb0f2fcb56ecc502818100f8fdfbac1c033911b5a184980d081f700f4d450cebf18cbdc68f160a5abd580e6f8f5800fd0b60521dbe2d549e82617afe70d2ad004c2f45405d94e4418e8c2b8da6bcaa407bbfa5477b5a6fceccfcb99f51c6c16bd17202d997bdcaec83b870e3e101acc05e0754020ec207ef5ec9934ac81cd617af72cd94b2bb400eb2078302818100f5dfe74a548c04950178f50130d5aadbe5d1f4b52527c0bfad9aa0d73731fb24219cb5ea5c4b4fa56133d5ea9225fa7d0ccc9bdcc78b77303a2e73c17e9a46b9b09020604496a849f069d0d87713e06a5d374271b2629f5ba220506b606a101828d20da9fcfa3a7e75b135987260be6d37622fc3f4bf4fd2dfd9655da5ff0c4b02818100d4d797c959f0cf59fa1f65ceec64e32ad189c5daf3ddf9e747d28c8eb15e65e5812bd19896b6a0d1d126fe6cf54a92b5a6c71ef04feed001acb1d253044f2c3716d14f396201e6a30c65bfbb0fd65ebaf61bdb80ffff7c2c3f80dcf69813491907531231700770d0392a1066e411ecd201fce9d98149b32355572b85e889faad028181009d898bc165709d52f7b18f91e6bf508d3ab08ed12df04da0c2d40b7039ce4d72b61299c082c8424cdd7dfff71f13346ec12fac42069cc68e6108f86427012485bfaa6904258e3e5fb9a9a305bf2e3e21087eea94bcce51fabd63650397affd85ed49c1358480b3cfe90ad5234b4dcf555d220d26c9ff765ecfcc94152fd1be070281804bf77b4bae8386772de830cc75f2d1d4b8221b3f817208e08c002ac0549902677e4f0e7bce5ba1b3da74fbbe138758e6853b4a5b7bf0672bc1170c64fa502a5e24e3472db433b4e30761eab6ebb9e207235fd88b97b1b30e14f364b628219d6e17056543a4e29a4de1e41ad37927ce23d0442623744bc35a1874296960029044":PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_ALG_RSA_PSS(PSA_ALG_ANY_HASH)
1645
1646Copy from PSA: valid RSA (PSS + SHA_256)
1647depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA256
1648pk_copy_from_psa_success:"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":PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_ALG_RSA_PSS(PSA_ALG_SHA_256)
1649
1650Copy from PSA: valid RSA (PSS + SHA_512)
1651depends_on:MBEDTLS_RSA_C:MBEDTLS_PKCS1_V21:MBEDTLS_MD_CAN_SHA512
1652pk_copy_from_psa_success:"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":PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_ALG_RSA_PSS(PSA_ALG_SHA_512)
Valerio Settia657ae32024-02-23 17:55:28 +01001653
Gilles Peskine0dc79a72024-03-11 15:23:12 +01001654Copy from PSA: valid RSA, PSA_ALG_NONE
1655depends_on:MBEDTLS_RSA_C:MBEDTLS_MD_ALG_FOR_TEST
1656pk_copy_from_psa_success:"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":PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_ALG_NONE
1657
1658# Key's algorithm is wrong for an RSA key, but pk_copy_from_psa() accepts
1659# it anyway.
Valerio Settia657ae32024-02-23 17:55:28 +01001660Copy from PSA: valid RSA, wrong alg (CMAC)
Gilles Peskine0dc79a72024-03-11 15:23:12 +01001661depends_on:MBEDTLS_RSA_C:MBEDTLS_MD_ALG_FOR_TEST
Valerio Settia657ae32024-02-23 17:55:28 +01001662pk_copy_from_psa_success:"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":PSA_KEY_TYPE_RSA_KEY_PAIR:PSA_ALG_CMAC
Gilles Peskine17d5b6b2024-03-06 13:40:01 +01001663
1664Copy from PSA: non-exportable -> public, RSA
1665depends_on:MBEDTLS_RSA_C
1666pk_copy_public_from_psa:"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":PSA_KEY_TYPE_RSA_KEY_PAIR
1667
1668Copy from PSA: non-exportable -> public, SECP_R1_256
1669depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_ECP_HAVE_SECP256R1
1670pk_copy_public_from_psa:"587CF7C57EB7C6254CBF80CC59846521B4FBCBA8BC4B362A9B043F0DEB49CCA1":PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_SECP_R1)
1671
1672Copy from PSA: non-exportable -> public, Curve25519
1673depends_on:MBEDTLS_PK_HAVE_ECC_KEYS:MBEDTLS_ECP_HAVE_CURVE25519
1674pk_copy_public_from_psa:"a546e36bf0527c9d3b16154b82465edd62144c0ac1fc5a18506a2244ba449ac4":PSA_KEY_TYPE_ECC_KEY_PAIR(PSA_ECC_FAMILY_MONTGOMERY)