test: include also test_suite_ecp for the coverage analysis
Only some test cases are skipped for which ECP_C is mandatory,
but the other ones are included.
Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
diff --git a/tests/scripts/analyze_outcomes.py b/tests/scripts/analyze_outcomes.py
index 60cf654..1eefe31 100755
--- a/tests/scripts/analyze_outcomes.py
+++ b/tests/scripts/analyze_outcomes.py
@@ -201,7 +201,6 @@
'args': {
'component_ref': 'test_psa_crypto_config_reference_all_ec_algs_use_psa',
'component_driver': 'test_psa_crypto_config_accel_all_ec_algs_use_psa',
- # ignore the suites of the accelerated components
'ignored_suites': [
'ecdsa',
'ecdh',
@@ -211,6 +210,44 @@
'test_suite_random': [
'PSA classic wrapper: ECDSA signature (SECP256R1)',
],
+ # In the accelerated test ECP_C is not set (only ECP_LIGHT is)
+ # so we must ignore disparities in the tests for which ECP_C
+ # is required.
+ 'test_suite_ecp': [
+ 'ECP check public-private #1 (OK)',
+ 'ECP check public-private #2 (group none)',
+ 'ECP check public-private #3 (group mismatch)',
+ 'ECP check public-private #4 (Qx mismatch)',
+ 'ECP check public-private #5 (Qy mismatch)',
+ 'ECP check public-private #6 (wrong Qx)',
+ 'ECP check public-private #7 (wrong Qy)',
+ 'ECP gen keypair [#1]',
+ 'ECP gen keypair [#2]',
+ 'ECP gen keypair [#3]',
+ 'ECP gen keypair wrapper',
+ 'ECP point muladd secp256r1 #1',
+ 'ECP point muladd secp256r1 #2',
+ 'ECP point multiplication Curve25519 (element of order 2: origin) #3',
+ 'ECP point multiplication Curve25519 (element of order 4: 1) #4',
+ 'ECP point multiplication Curve25519 (element of order 8) #5',
+ 'ECP point multiplication Curve25519 (normalized) #1',
+ 'ECP point multiplication Curve25519 (not normalized) #2',
+ 'ECP point multiplication rng fail Curve25519',
+ 'ECP point multiplication rng fail secp256r1',
+ 'ECP test vectors Curve25519',
+ 'ECP test vectors Curve448 (RFC 7748 6.2, after decodeUCoordinate)',
+ 'ECP test vectors brainpoolP256r1 rfc 7027',
+ 'ECP test vectors brainpoolP384r1 rfc 7027',
+ 'ECP test vectors brainpoolP512r1 rfc 7027',
+ 'ECP test vectors secp192k1',
+ 'ECP test vectors secp192r1 rfc 5114',
+ 'ECP test vectors secp224k1',
+ 'ECP test vectors secp224r1 rfc 5114',
+ 'ECP test vectors secp256k1',
+ 'ECP test vectors secp256r1 rfc 5114',
+ 'ECP test vectors secp384r1 rfc 5114',
+ 'ECP test vectors secp521r1 rfc 5114',
+ ]
}
}
},
diff --git a/tests/suites/test_suite_ecp.function b/tests/suites/test_suite_ecp.function
index 4b51a9f..fa35a29 100644
--- a/tests/suites/test_suite_ecp.function
+++ b/tests/suites/test_suite_ecp.function
@@ -70,7 +70,7 @@
/* END_HEADER */
/* BEGIN_DEPENDENCIES
- * depends_on:MBEDTLS_ECP_C
+ * depends_on:MBEDTLS_ECP_LIGHT
* END_DEPENDENCIES
*/
@@ -318,7 +318,7 @@
}
/* END_CASE */
-/* BEGIN_CASE */
+/* BEGIN_CASE depends_on:MBEDTLS_ECP_C */
void ecp_test_vect(int id, char *dA_str, char *xA_str, char *yA_str,
char *dB_str, char *xB_str, char *yB_str,
char *xZ_str, char *yZ_str)
@@ -375,7 +375,7 @@
}
/* END_CASE */
-/* BEGIN_CASE */
+/* BEGIN_CASE depends_on:MBEDTLS_ECP_C */
void ecp_test_vec_x(int id, char *dA_hex, char *xA_hex, char *dB_hex,
char *xB_hex, char *xS_hex)
{
@@ -428,7 +428,7 @@
}
/* END_CASE */
-/* BEGIN_CASE */
+/* BEGIN_CASE depends_on:MBEDTLS_ECP_C */
void ecp_test_mul(int id, data_t *n_hex,
data_t *Px_hex, data_t *Py_hex, data_t *Pz_hex,
data_t *nPx_hex, data_t *nPy_hex, data_t *nPz_hex,
@@ -477,7 +477,7 @@
}
/* END_CASE */
-/* BEGIN_CASE */
+/* BEGIN_CASE depends_on:MBEDTLS_ECP_C */
void ecp_test_mul_rng(int id, data_t *d_hex)
{
mbedtls_ecp_group grp;
@@ -503,7 +503,7 @@
}
/* END_CASE */
-/* BEGIN_CASE depends_on:MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED */
+/* BEGIN_CASE depends_on:MBEDTLS_ECP_SHORT_WEIERSTRASS_ENABLED:MBEDTLS_ECP_C */
void ecp_muladd(int id,
data_t *u1_bin, data_t *P1_bin,
data_t *u2_bin, data_t *P2_bin,
@@ -955,7 +955,7 @@
}
/* END_CASE */
-/* BEGIN_CASE */
+/* BEGIN_CASE depends_on:MBEDTLS_ECP_C */
void mbedtls_ecp_check_pub_priv(int id_pub, char *Qx_pub, char *Qy_pub,
int id, char *d, char *Qx, char *Qy,
int ret)
@@ -987,7 +987,7 @@
}
/* END_CASE */
-/* BEGIN_CASE */
+/* BEGIN_CASE depends_on:MBEDTLS_ECP_C */
void mbedtls_ecp_gen_keypair(int id)
{
mbedtls_ecp_group grp;
@@ -1016,7 +1016,7 @@
}
/* END_CASE */
-/* BEGIN_CASE */
+/* BEGIN_CASE depends_on:MBEDTLS_ECP_C */
void mbedtls_ecp_gen_key(int id)
{
mbedtls_ecp_keypair key;
@@ -1086,7 +1086,7 @@
}
/* END_CASE */
-/* BEGIN_CASE depends_on:MBEDTLS_TEST_HOOKS:MBEDTLS_ECP_MONTGOMERY_ENABLED */
+/* BEGIN_CASE depends_on:MBEDTLS_TEST_HOOKS:MBEDTLS_ECP_MONTGOMERY_ENABLED:MBBEDTLS_ECP_C */
void genkey_mx_known_answer(int bits, data_t *seed, data_t *expected)
{
mbedtls_test_rnd_buf_info rnd_info;