File: test_suite_psa_crypto_not_supported.function

package info (click to toggle)
mbedtls 3.6.5-0.1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 51,488 kB
  • sloc: ansic: 164,842; sh: 25,443; python: 15,512; makefile: 3,131; perl: 1,043; tcl: 4
file content (70 lines) | stat: -rw-r--r-- 2,353 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
/* BEGIN_HEADER */

#include "psa/crypto.h"
#include "test/psa_crypto_helpers.h"

#define INVALID_KEY_ID mbedtls_svc_key_id_make(0, 0xfedcba98)

/* END_HEADER */

/* BEGIN_DEPENDENCIES
 * depends_on:MBEDTLS_PSA_CRYPTO_C
 * END_DEPENDENCIES
 */

/* BEGIN_CASE */
void import_not_supported(int key_type, data_t *key_material)
{
    psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
    mbedtls_svc_key_id_t key_id = INVALID_KEY_ID;

    PSA_ASSERT(psa_crypto_init());
    psa_set_key_type(&attributes, key_type);
    psa_status_t actual_status =
        psa_import_key(&attributes, key_material->x, key_material->len, &key_id);

#if defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY)
    if (actual_status == PSA_ERROR_INVALID_ARGUMENT) {
        /* Edge case: when importing an ECC public key with an unspecified
         * bit-size (as we do here), the implementation of psa_import_key()
         * infers the bit-size from the input. If the key type specifies an
         * unknown curve, the validation might reject the data as invalid
         * before it checks that the curve is supported. If so, that's ok.
         * In practice, at the time of writing, this happens with Ed25519,
         * for which a valid but unsupported 32-byte input causes
         * psa_import_key() to fail because it assumes a Weierstrass curve
         * which must have an odd-length encoding.
         *
         * In other cases, we do not expect an INVALID_ARGUMENT error here. */
        TEST_ASSERT(PSA_KEY_TYPE_IS_ECC(key_type));
    } else
#endif /* defined(PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY) */
    {
        TEST_EQUAL(actual_status, PSA_ERROR_NOT_SUPPORTED);
    }
    TEST_ASSERT(mbedtls_svc_key_id_equal(key_id, MBEDTLS_SVC_KEY_ID_INIT));

exit:
    psa_destroy_key(key_id);
    PSA_DONE();
}
/* END_CASE */

/* BEGIN_CASE */
void generate_not_supported(int key_type, int bits)
{
    psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
    mbedtls_svc_key_id_t key_id = INVALID_KEY_ID;

    PSA_ASSERT(psa_crypto_init());
    psa_set_key_type(&attributes, key_type);
    psa_set_key_bits(&attributes, bits);
    TEST_EQUAL(psa_generate_key(&attributes, &key_id),
               PSA_ERROR_NOT_SUPPORTED);
    TEST_ASSERT(mbedtls_svc_key_id_equal(key_id, MBEDTLS_SVC_KEY_ID_INIT));

exit:
    psa_destroy_key(key_id);
    PSA_DONE();
}
/* END_CASE */