mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-08-08 17:42:09 +03:00
test: add exception in analyze_outcomes.py and fix test for montgomery curves
The exception in analyze_outcomes.py follows previous commit in which a test in test_suite_pkparse was set with the ECP_C guard for a different parsing of the private key between the legacy and PSA implementations. The wrong guard in test_suite_ecp.function instead was erroneously added in a past commit and it was setting a non-existing symbol of mbedTLS so those tests were basically never executed. Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
This commit is contained in:
@@ -247,7 +247,21 @@ TASKS = {
|
||||
'ECP test vectors secp256r1 rfc 5114',
|
||||
'ECP test vectors secp384r1 rfc 5114',
|
||||
'ECP test vectors secp521r1 rfc 5114',
|
||||
]
|
||||
],
|
||||
'test_suite_pkparse': [
|
||||
# This is a known difference for Montgomery curves: in
|
||||
# reference component private keys are parsed using
|
||||
# mbedtls_mpi_read_binary_le(), while in driver version they
|
||||
# they are imported in PSA and there the parsing is done
|
||||
# through mbedtls_ecp_read_key(). Unfortunately the latter
|
||||
# fixes the errors which are intentionally set on the parsed
|
||||
# key and therefore the following test case is not failing
|
||||
# as expected.
|
||||
# This cause the following test to be guarded by ECP_C and
|
||||
# not being executed on the driver version.
|
||||
('Key ASN1 (OneAsymmetricKey X25519, doesn\'t match masking '
|
||||
'requirements, from RFC8410 Appendix A but made into version 0)'),
|
||||
],
|
||||
}
|
||||
}
|
||||
},
|
||||
|
Reference in New Issue
Block a user