c787cf73b3
bignum_core.py: Add "BignumCoreShiftL()"
...
This patch introduces automatic test input generation for
`mpi_core_shift_l()` function.
It also adds two utility functions in bignum_common.
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com >
2023-04-26 17:04:20 +01:00
e5dab975c6
ecp_curves: Added unit-tests for secp224k1
...
This patch introduces basic unit-testing for the `ecp_mod_p224k1()`.
The method is exposed through the ecp_invasive interface, and
the standard testing data is being provided by the python framework.
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com >
2023-04-18 14:13:20 +01:00
cec506083b
Fix test case dependency
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2023-04-17 14:56:03 +02:00
bda7f87e2a
Add dependency for P192K1 tests
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2023-04-13 13:11:05 +02:00
b86ead3cb2
Add generated tests for ecp_mod_p192k1
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2023-04-13 12:47:59 +02:00
0a325b6767
ecp.py: Set test-dependencies as attributes.
...
This patch enables declaring dependencie as test-class
members. ECP curve functions have been updated
to use the new capability.
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com >
2023-04-06 16:33:10 +01:00
1358648f77
test_suite_ecp: Introduced ecp_mod_p_generic_raw
...
This patch replaces similiarly structured test functions
for:
* MBEDTLS_ECP_DP_SECP192R1
* MBEDTLS_ECP_DP_SECP224R1
* MBEDTLS_ECP_DP_SECP256R1
* MBEDTLS_ECP_DP_SECP384R1
* MBEDTLS_ECP_DP_BP512R1R1
with a more generic version, which adjusts the parameters, based on the `curve_id` field,
provided by the testing data.
The python test framework has been updated to provide that extra field.
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com >
2023-04-06 16:27:12 +01:00
44c6694be7
Merge pull request #7351 from gabor-mezei-arm/7109_ecp_fast_reduction_testing
...
Test unlikely cases of ECC modular reduction
2023-04-06 15:55:19 +01:00
00bd8925a7
bignum: Removed merge scaffolding.
...
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com >
2023-04-05 16:13:11 +01:00
13c73de6de
Merge pull request #6233 from tom-cosgrove-arm/issue-6226-core-mul
...
Bignum: extract core_mul from the prototype
2023-04-04 13:36:22 +01:00
219f978097
Merge pull request #7059 from ronald-cron-arm/psa-crypto-misc
...
PSA cryptography miscellaneous
2023-04-04 10:54:03 +02:00
b0f013784f
Multplication is simmetric so only generate unique combinations
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2023-04-03 17:26:44 +02:00
87223ab1ce
Add generated test for core_mul
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2023-03-31 16:17:06 +02:00
5ded38e0e1
Fix 0 limb size for value 0
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2023-03-31 16:17:06 +02:00
b8f5ba826b
Merge pull request #6891 from yuhaoth/pr/add-milliseconds-platform-function
...
Add milliseconds platform time function
2023-03-31 11:47:37 +01:00
e6e6b75ad3
psa: Remove MBEDTLS_PSA_CRYPTO_DRIVERS configuration option
...
The support for the PSA crypto driver interface
is not optional anymore as the implementation of
the PSA cryptography interface has been restructured
around the PSA crypto driver interface (see
psa-crypto-implementation-structure.md). There is
thus no purpose for the configuration options
MBEDTLS_PSA_CRYPTO_DRIVERS anymore.
Signed-off-by: Ronald Cron <ronald.cron@arm.com >
2023-03-31 09:07:54 +02:00
d8c0e1aa8d
Fix comments
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2023-03-28 15:34:49 +02:00
c33a36b5df
Typo: reorder testing classes
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2023-03-28 15:32:47 +02:00
a8d0da3880
Add test cases for P256 fast reduction testing
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2023-03-28 15:31:05 +02:00
54ad647e8d
Add test cases for P384 fast reduction testing
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2023-03-28 15:30:32 +02:00
fede276392
Typo: reformat numbers
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2023-03-28 15:29:40 +02:00
a9a68728b3
Add test cases for P521 fast reduction testing
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2023-03-28 15:09:35 +02:00
64a229f6ac
Add test cases for P224 fast reduction testing
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2023-03-28 15:09:35 +02:00
62adc726d0
Add test cases for P192 fast reduction testing
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2023-03-28 15:09:35 +02:00
4af90bbcda
EcpP384R1Raw: Added test case for 2nd round of carry reduction.
...
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com >
2023-03-21 15:46:51 +00:00
37f4cb6d0e
ecp_curves: Minor rework for p384
...
This patch adjusts formatting, documentation and testing.
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com >
2023-03-21 15:46:50 +00:00
f359c91f9b
ecp test generator: Added EcpPp384R1Raw().
...
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com >
2023-03-21 15:45:18 +00:00
0e2b06a1ce
Merge pull request #7083 from KloolK/record-size-limit/parsing
...
Add parsing for Record Size Limit extension in TLS 1.3
2023-03-17 10:18:34 +00:00
c18cd0c8e6
Merge pull request #7230 from gabor-mezei-arm/6850_Secp256r1_fast_reduction
...
Extract Secp256r1 fast reduction from the prototype
2023-03-16 19:43:25 +00:00
151f64283f
Add parsing for Record Size Limit extension in TLS 1.3
...
Fixes #7007
Signed-off-by: Jan Bruckner <jan@janbruckner.de >
2023-03-14 08:41:25 +01:00
bf4016e5d5
Merge pull request #6567 from mprse/ecjpake-driver-dispatch
2023-03-09 19:23:05 +00:00
fffd6d9ded
Fix maximum cannonical value
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2023-03-09 13:43:15 +01:00
e4710ae9ed
Add and fix comments
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2023-03-09 13:43:02 +01:00
eb591ff94d
Add test generation for ecp_mod_p256_raw
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2023-03-08 14:12:20 +01:00
fe780a3c4b
Merge pull request #7184 from gabor-mezei-arm/6349_Secp224r1_fast_reduction
...
Extract Secp224r1 fast reduction from the prototype
2023-03-07 10:57:58 +00:00
a2ef6a8e38
The is_valid() function is needed to not filter out test cases
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2023-03-06 16:57:25 +01:00
61ef3603eb
Correct the maximum canonical value in tests
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2023-03-06 16:32:16 +01:00
d034b3d0d2
Code style: have two empty lines before and after class definitions
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2023-03-06 16:32:15 +01:00
5e33e6f5d4
Remove unnecessary function override
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2023-03-06 16:32:12 +01:00
931fd646ff
Use lower case hex number
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2023-03-01 16:50:00 +01:00
802ff1b116
Merge pull request #7147 from paul-elliott-arm/interruptible_sign_hash_codestyle_drivers
...
Remove driver entry points for psa_{get|set}_max_ops()
2023-03-01 10:46:09 +01:00
98791e7781
Add more test cases for P224 testing
...
Signed-off-by: Gabor Mezei <gabor.mezei@arm.com >
2023-02-27 15:59:34 +01:00
a16ce9f601
Remove driver entry points for {get|set}_max_ops().
...
Move the global variable to the PSA layer, and just set that when calling PSA
level functions.
Move the internal ecp set to before each ecp call.
Signed-off-by: Paul Elliott <paul.elliott@arm.com >
2023-02-24 14:44:18 +00:00
a3b625b0a1
Merge pull request #7098 from gilles-peskine-arm/retval-non-empty
...
Pacify Clang 15 about empty \retval
2023-02-24 09:10:53 +00:00
51a677bb30
Remove support for pake opaque driver
...
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com >
2023-02-22 11:30:32 +01:00
6b64862ef7
Documentation fixes and code adaptation
...
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com >
2023-02-22 11:30:32 +01:00
251e86ae3f
Adapt names to more suitable and fix conditional compilation flags
...
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com >
2023-02-22 11:30:32 +01:00
f62b3bb087
Optimization of pake core functions
...
Adapt pake test (passing NULL buffers is not allowed).
Passing the null buffer to psa_pake_output results in a hard fault.
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com >
2023-02-22 11:30:32 +01:00
9dd2440c95
Change pake input: key_lifetime -> key attributes
...
In the future key attributes will be available for opaque driver via psa_crypto_driver_pake_get_password_key().
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com >
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com >
2023-02-22 11:30:32 +01:00
b09c487546
Combine core pake computation stage(step,sequence,state) into single driver step
...
Signed-off-by: Przemek Stekiel <przemyslaw.stekiel@mobica.com >
2023-02-22 11:30:31 +01:00