Gilles Peskine | 077599a | 2021-02-03 18:55:39 +0100 | [diff] [blame] | 1 | Generate random twice with CTR_DRBG |
| 2 | random_twice_with_ctr_drbg: |
| 3 | |
| 4 | Generate random twice with HMAC_DRBG(SHA-1) |
| 5 | depends_on:MBEDTLS_SHA1_C |
| 6 | random_twice_with_hmac_drbg:MBEDTLS_MD_SHA1 |
| 7 | |
| 8 | Generate random twice with HMAC_DRBG(SHA-256) |
| 9 | depends_on:MBEDTLS_SHA256_C |
| 10 | random_twice_with_hmac_drbg:MBEDTLS_MD_SHA256 |
| 11 | |
| 12 | Generate random twice with HMAC_DRBG(SHA-512) |
| 13 | depends_on:MBEDTLS_SHA512_C |
| 14 | random_twice_with_hmac_drbg:MBEDTLS_MD_SHA512 |
| 15 | |
Gilles Peskine | e3ed802 | 2021-02-03 20:04:08 +0100 | [diff] [blame] | 16 | Generate random twice with PSA classic wrapper |
| 17 | random_twice_with_psa_from_classic: |
| 18 | |
Gilles Peskine | 077599a | 2021-02-03 18:55:39 +0100 | [diff] [blame] | 19 | Generate random twice with PSA API |
| 20 | random_twice_with_psa_from_psa: |
Gilles Peskine | e3ed802 | 2021-02-03 20:04:08 +0100 | [diff] [blame] | 21 | |
| 22 | # This bad-usage test case currently crashes in the default configuration |
| 23 | # because CTR_DRBG crashes when given an unseeded context. This is arguably |
| 24 | # a good thing because it prevents misuse of mbedtls_psa_get_random(). |
| 25 | #PSA classic wrapper: PSA not active |
| 26 | #mbedtls_psa_get_random_no_init: |
| 27 | |
| 28 | PSA classic wrapper: 0 bytes |
| 29 | mbedtls_psa_get_random_length:0 |
| 30 | |
| 31 | PSA classic wrapper: 1 byte |
| 32 | mbedtls_psa_get_random_length:1 |
| 33 | |
| 34 | PSA classic wrapper: 256 bytes |
| 35 | mbedtls_psa_get_random_length:256 |
| 36 | |
Gilles Peskine | cd2d648 | 2021-02-16 15:33:56 +0100 | [diff] [blame] | 37 | # An external RNG is supposed to handle arbitrary request lengths. Test it |
| 38 | # with something larger than any RNG call made by Mbed TLS itself expects. |
| 39 | # CTR_DRBG and HMAC_DRBG have their own maximum request lengths which may |
| 40 | # be lower than the value chosen here and are tested separately. |
Gilles Peskine | e3ed802 | 2021-02-03 20:04:08 +0100 | [diff] [blame] | 41 | PSA classic wrapper: external RNG large |
| 42 | depends_on:MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG |
| 43 | mbedtls_psa_get_random_length:1024 |
| 44 | |
| 45 | PSA classic wrapper: CTR_DRBG max |
| 46 | depends_on:!MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG:MBEDTLS_CTR_DRBG_C |
| 47 | mbedtls_psa_get_random_length:MBEDTLS_CTR_DRBG_MAX_REQUEST |
| 48 | |
| 49 | PSA classic wrapper: HMAC_DRBG max |
| 50 | depends_on:!MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG:!MBEDTLS_CTR_DRBG_C:MBEDTLS_HMAC_DRBG_C |
| 51 | mbedtls_psa_get_random_length:MBEDTLS_HMAC_DRBG_MAX_REQUEST |
| 52 | |
| 53 | PSA classic wrapper: ECDSA signature (SECP256R1) |
| 54 | depends_on:MBEDTLS_ECP_DP_SECP256R1_ENABLED |
| 55 | mbedtls_psa_get_random_ecdsa_sign:MBEDTLS_ECP_DP_SECP256R1 |