Crypto: Remove the handle access control layer
Remove the control of corresponding test case as
MBEDTLS_PSA_CRYPTO_KEY_ID_ENCODES_OWNER is enforced as enabled.
Signed-off-by: Summer Qin <summer.qin@arm.com>
Co-authored-by: David Hu <david.hu@arm.com>
Change-Id: Ie2c047d851b657f59ecb4e8a46b467edebe16e98
diff --git a/test/suites/crypto/CMakeLists.txt b/test/suites/crypto/CMakeLists.txt
index 09a5445..c45f7fb 100644
--- a/test/suites/crypto/CMakeLists.txt
+++ b/test/suites/crypto/CMakeLists.txt
@@ -84,6 +84,5 @@
$<$<BOOL:${TFM_CRYPTO_TEST_ALG_GCM}>:TFM_CRYPTO_TEST_ALG_GCM>
$<$<BOOL:${TFM_CRYPTO_TEST_ALG_SHA_512}>:TFM_CRYPTO_TEST_ALG_SHA_512>
$<$<BOOL:${TFM_CRYPTO_TEST_HKDF}>:TFM_CRYPTO_TEST_HKDF>
- $<$<BOOL:${CRYPTO_KEY_ID_ENCODES_OWNER}>:CRYPTO_KEY_ID_ENCODES_OWNER>
)
endif()
diff --git a/test/suites/crypto/secure/crypto_sec_interface_testsuite.c b/test/suites/crypto/secure/crypto_sec_interface_testsuite.c
index 6430548..845bf9d 100644
--- a/test/suites/crypto/secure/crypto_sec_interface_testsuite.c
+++ b/test/suites/crypto/secure/crypto_sec_interface_testsuite.c
@@ -49,9 +49,7 @@
static void tfm_crypto_test_1032(struct test_result_t *ret);
static void tfm_crypto_test_1033(struct test_result_t *ret);
static void tfm_crypto_test_1034(struct test_result_t *ret);
-#ifdef CRYPTO_KEY_ID_ENCODES_OWNER
static void tfm_crypto_test_1035(struct test_result_t *ret);
-#endif /* CRYPTO_KEY_ID_ENCODES_OWNER */
#ifdef TFM_CRYPTO_TEST_ALG_CCM
static void tfm_crypto_test_1036(struct test_result_t *ret);
#endif /* TFM_CRYPTO_TEST_ALG_CCM */
@@ -122,10 +120,8 @@
"Secure key policy check permissions", {TEST_PASSED} },
{&tfm_crypto_test_1034, "TFM_S_CRYPTO_TEST_1034",
"Secure persistent key interface", {TEST_PASSED} },
-#ifdef CRYPTO_KEY_ID_ENCODES_OWNER
{&tfm_crypto_test_1035, "TFM_S_CRYPTO_TEST_1035",
"Key access control", {TEST_PASSED} },
-#endif /* CRYPTO_KEY_ID_ENCODES_OWNER */
#ifdef TFM_CRYPTO_TEST_ALG_CCM
{&tfm_crypto_test_1036, "TFM_S_CRYPTO_TEST_1036",
"Secure AEAD interface with truncated auth tag (AES-128-CCM-8)",
@@ -287,7 +283,6 @@
psa_persistent_key_test(1, ret);
}
-#ifdef CRYPTO_KEY_ID_ENCODES_OWNER
/**
* \brief Tests key access control based on partition ID
*
@@ -315,7 +310,7 @@
status = tfm_secure_client_2_call_test(
TFM_SECURE_CLIENT_2_ID_CRYPTO_ACCESS_CTRL,
&key_handle, sizeof(key_handle));
- if (status != PSA_ERROR_NOT_PERMITTED) {
+ if (status != PSA_ERROR_INVALID_HANDLE) {
TEST_FAIL("Should not be able to destroy key from another partition");
return;
}
@@ -327,7 +322,6 @@
}
return;
}
-#endif /* CRYPTO_KEY_ID_ENCODES_OWNER */
#ifdef TFM_CRYPTO_TEST_ALG_CCM
static void tfm_crypto_test_1036(struct test_result_t *ret)