test_suite_random.data 1.9 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455
  1. Generate random twice with CTR_DRBG
  2. random_twice_with_ctr_drbg:
  3. Generate random twice with HMAC_DRBG(SHA-1)
  4. depends_on:MBEDTLS_SHA1_C
  5. random_twice_with_hmac_drbg:MBEDTLS_MD_SHA1
  6. Generate random twice with HMAC_DRBG(SHA-256)
  7. depends_on:MBEDTLS_SHA256_C
  8. random_twice_with_hmac_drbg:MBEDTLS_MD_SHA256
  9. Generate random twice with HMAC_DRBG(SHA-512)
  10. depends_on:MBEDTLS_SHA512_C
  11. random_twice_with_hmac_drbg:MBEDTLS_MD_SHA512
  12. Generate random twice with PSA classic wrapper
  13. random_twice_with_psa_from_classic:
  14. Generate random twice with PSA API
  15. random_twice_with_psa_from_psa:
  16. # This bad-usage test case currently crashes in the default configuration
  17. # because CTR_DRBG crashes when given an unseeded context. This is arguably
  18. # a good thing because it prevents misuse of mbedtls_psa_get_random().
  19. #PSA classic wrapper: PSA not active
  20. #mbedtls_psa_get_random_no_init:
  21. PSA classic wrapper: 0 bytes
  22. mbedtls_psa_get_random_length:0
  23. PSA classic wrapper: 1 byte
  24. mbedtls_psa_get_random_length:1
  25. PSA classic wrapper: 256 bytes
  26. mbedtls_psa_get_random_length:256
  27. # An external RNG is supposed to handle arbitrary request lengths. Test it
  28. # with something larger than any RNG call made by Mbed TLS itself expects.
  29. # CTR_DRBG and HMAC_DRBG have their own maximum request lengths which may
  30. # be lower than the value chosen here and are tested separately.
  31. PSA classic wrapper: external RNG large
  32. depends_on:MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG
  33. mbedtls_psa_get_random_length:1024
  34. PSA classic wrapper: CTR_DRBG max
  35. depends_on:!MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG:MBEDTLS_CTR_DRBG_C
  36. mbedtls_psa_get_random_length:MBEDTLS_CTR_DRBG_MAX_REQUEST
  37. PSA classic wrapper: HMAC_DRBG max
  38. depends_on:!MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG:!MBEDTLS_CTR_DRBG_C:MBEDTLS_HMAC_DRBG_C
  39. mbedtls_psa_get_random_length:MBEDTLS_HMAC_DRBG_MAX_REQUEST
  40. PSA classic wrapper: ECDSA signature (SECP256R1)
  41. depends_on:MBEDTLS_ECP_DP_SECP256R1_ENABLED
  42. mbedtls_psa_get_random_ecdsa_sign:MBEDTLS_ECP_DP_SECP256R1