blob: a5340bd62cc1ede85053b0da748213ce4fbccaa4 [file] [log] [blame]
Valerio Setti8d178be2023-10-17 12:23:55 +02001#!/usr/bin/env python3
Gilles Peskine15c2cbf2020-06-25 18:36:28 +02002
3"""Analyze the test outcomes from a full CI run.
4
5This script can also run on outcomes from a partial run, but the results are
6less likely to be useful.
7"""
8
9import argparse
10import sys
11import traceback
Przemek Stekiel85c54ea2022-11-17 11:50:23 +010012import re
Valerio Settia2663322023-03-24 08:20:18 +010013import subprocess
14import os
Gilles Peskine15c2cbf2020-06-25 18:36:28 +020015
Gilles Peskine8d3c70a2020-06-25 18:37:43 +020016import check_test_cases
17
Valerio Settif075e472023-10-17 11:03:16 +020018class Results:
Gilles Peskine15c2cbf2020-06-25 18:36:28 +020019 """Process analysis results."""
20
21 def __init__(self):
22 self.error_count = 0
23 self.warning_count = 0
Valerio Settiaaef0bc2023-10-10 09:42:13 +020024
Valerio Setti2cff8202023-10-18 14:36:47 +020025 def new_section(self, fmt, *args, **kwargs):
26 self._print_line('\n*** ' + fmt + ' ***\n', *args, **kwargs)
27
Valerio Settiaaef0bc2023-10-10 09:42:13 +020028 def info(self, fmt, *args, **kwargs):
Valerio Setti8070dbe2023-10-17 12:29:30 +020029 self._print_line('Info: ' + fmt, *args, **kwargs)
Gilles Peskine15c2cbf2020-06-25 18:36:28 +020030
31 def error(self, fmt, *args, **kwargs):
Gilles Peskine15c2cbf2020-06-25 18:36:28 +020032 self.error_count += 1
Valerio Setti8070dbe2023-10-17 12:29:30 +020033 self._print_line('Error: ' + fmt, *args, **kwargs)
Gilles Peskine15c2cbf2020-06-25 18:36:28 +020034
35 def warning(self, fmt, *args, **kwargs):
Gilles Peskine15c2cbf2020-06-25 18:36:28 +020036 self.warning_count += 1
Valerio Setti8070dbe2023-10-17 12:29:30 +020037 self._print_line('Warning: ' + fmt, *args, **kwargs)
Gilles Peskine15c2cbf2020-06-25 18:36:28 +020038
Valerio Setti3f339892023-10-17 10:42:11 +020039 @staticmethod
Valerio Setti8070dbe2023-10-17 12:29:30 +020040 def _print_line(fmt, *args, **kwargs):
Valerio Setti735794c2023-10-18 08:05:15 +020041 sys.stderr.write((fmt + '\n').format(*args, **kwargs))
Valerio Settiaaef0bc2023-10-10 09:42:13 +020042
Gilles Peskine15c2cbf2020-06-25 18:36:28 +020043class TestCaseOutcomes:
44 """The outcomes of one test case across many configurations."""
45 # pylint: disable=too-few-public-methods
46
47 def __init__(self):
Gilles Peskine3d863f22020-06-26 13:02:30 +020048 # Collect a list of witnesses of the test case succeeding or failing.
49 # Currently we don't do anything with witnesses except count them.
50 # The format of a witness is determined by the read_outcome_file
51 # function; it's the platform and configuration joined by ';'.
Gilles Peskine15c2cbf2020-06-25 18:36:28 +020052 self.successes = []
53 self.failures = []
54
55 def hits(self):
56 """Return the number of times a test case has been run.
57
58 This includes passes and failures, but not skips.
59 """
60 return len(self.successes) + len(self.failures)
61
Valerio Settif075e472023-10-17 11:03:16 +020062def execute_reference_driver_tests(results: Results, ref_component, driver_component, \
Valerio Setti781c2342023-10-17 12:47:35 +020063 outcome_file):
Valerio Setti22992a02023-03-29 11:15:28 +020064 """Run the tests specified in ref_component and driver_component. Results
65 are stored in the output_file and they will be used for the following
Valerio Settia2663322023-03-24 08:20:18 +010066 coverage analysis"""
67 # If the outcome file already exists, we assume that the user wants to
68 # perform the comparison analysis again without repeating the tests.
69 if os.path.exists(outcome_file):
Valerio Setti39d4b9d2023-10-18 14:30:03 +020070 results.info("Outcome file ({}) already exists. Tests will be skipped.", outcome_file)
Valerio Setti781c2342023-10-17 12:47:35 +020071 return
Valerio Settia2663322023-03-24 08:20:18 +010072
73 shell_command = "tests/scripts/all.sh --outcome-file " + outcome_file + \
74 " " + ref_component + " " + driver_component
Valerio Setti39d4b9d2023-10-18 14:30:03 +020075 results.info("Running: {}", shell_command)
Valerio Settia2663322023-03-24 08:20:18 +010076 ret_val = subprocess.run(shell_command.split(), check=False).returncode
77
78 if ret_val != 0:
Valerio Settif075e472023-10-17 11:03:16 +020079 results.error("failed to run reference/driver components")
Valerio Settiaaef0bc2023-10-10 09:42:13 +020080
Tomás Gonzálezb401e112023-08-11 15:22:04 +010081def analyze_coverage(results, outcomes, allow_list, full_coverage):
Gilles Peskine8d3c70a2020-06-25 18:37:43 +020082 """Check that all available test cases are executed at least once."""
Gilles Peskine686c2922022-01-07 15:58:38 +010083 available = check_test_cases.collect_available_test_cases()
Gilles Peskine8d3c70a2020-06-25 18:37:43 +020084 for key in available:
85 hits = outcomes[key].hits() if key in outcomes else 0
Tomás González07bdcc22023-08-11 14:59:03 +010086 if hits == 0 and key not in allow_list:
Tomás Gonzálezb401e112023-08-11 15:22:04 +010087 if full_coverage:
88 results.error('Test case not executed: {}', key)
89 else:
90 results.warning('Test case not executed: {}', key)
Tomás González07bdcc22023-08-11 14:59:03 +010091 elif hits != 0 and key in allow_list:
92 # Test Case should be removed from the allow list.
Tomás González7ebb18f2023-08-22 09:40:23 +010093 if full_coverage:
Tomás Gonzáleza0631442023-08-22 12:17:57 +010094 results.error('Allow listed test case was executed: {}', key)
Tomás González7ebb18f2023-08-22 09:40:23 +010095 else:
96 results.warning('Allow listed test case was executed: {}', key)
Gilles Peskine8d3c70a2020-06-25 18:37:43 +020097
Manuel Pégourié-Gonnard881ce012023-10-18 10:22:07 +020098def name_matches_pattern(name, str_or_re):
99 """Check if name matches a pattern, that may be a string or regex.
100 - If the pattern is a string, name must be equal to match.
101 - If the pattern is a regex, name must fully match.
102 """
103 if isinstance(str_or_re, re.Pattern):
104 if str_or_re.fullmatch(name):
105 return True
106 else:
107 if str_or_re == name:
108 return True
109 return False
110
Valerio Settif075e472023-10-17 11:03:16 +0200111def analyze_driver_vs_reference(results: Results, outcomes,
Valerio Settiaaef0bc2023-10-10 09:42:13 +0200112 component_ref, component_driver,
Manuel Pégourié-Gonnard881ce012023-10-18 10:22:07 +0200113 ignored_suites, ignored_tests=None):
Przemek Stekiel4e955902022-10-21 13:42:08 +0200114 """Check that all tests executed in the reference component are also
115 executed in the corresponding driver component.
Valerio Setti3002c992023-01-18 17:28:36 +0100116 Skip:
117 - full test suites provided in ignored_suites list
118 - only some specific test inside a test suite, for which the corresponding
119 output string is provided
Przemek Stekiel4e955902022-10-21 13:42:08 +0200120 """
Manuel Pégourié-Gonnard371165a2023-10-18 12:44:54 +0200121 seen_reference_passing = False
122 for key in outcomes:
Manuel Pégourié-Gonnard4da369f2023-10-18 09:40:32 +0200123 # key is like "test_suite_foo.bar;Description of test case"
124 (full_test_suite, test_string) = key.split(';')
Valerio Setti00c1ccb2023-02-02 11:33:31 +0100125 test_suite = full_test_suite.split('.')[0] # retrieve main part of test suite name
Manuel Pégourié-Gonnard371165a2023-10-18 12:44:54 +0200126
127 # Immediately skip fully-ignored test suites
Manuel Pégourié-Gonnard7d381f52023-03-17 15:13:08 +0100128 if test_suite in ignored_suites or full_test_suite in ignored_suites:
Valerio Setti00c1ccb2023-02-02 11:33:31 +0100129 continue
Manuel Pégourié-Gonnard371165a2023-10-18 12:44:54 +0200130
131 # For ignored test cases inside test suites, just remember and:
132 # don't issue an error if they're skipped with drivers,
133 # but issue an error if they're not (means we have a bad entry).
134 ignored = False
Manuel Pégourié-Gonnard881ce012023-10-18 10:22:07 +0200135 if full_test_suite in ignored_tests:
136 for str_or_re in ignored_tests[full_test_suite]:
137 if name_matches_pattern(test_string, str_or_re):
Manuel Pégourié-Gonnard371165a2023-10-18 12:44:54 +0200138 ignored = True
Manuel Pégourié-Gonnard4da369f2023-10-18 09:40:32 +0200139
Przemek Stekiel4e955902022-10-21 13:42:08 +0200140 # Search for tests that run in reference component and not in driver component
141 driver_test_passed = False
142 reference_test_passed = False
143 for entry in outcomes[key].successes:
Przemek Stekiel51f30ff2022-11-09 12:07:29 +0100144 if component_driver in entry:
Przemek Stekiel4e955902022-10-21 13:42:08 +0200145 driver_test_passed = True
Przemek Stekiel51f30ff2022-11-09 12:07:29 +0100146 if component_ref in entry:
Przemek Stekiel4e955902022-10-21 13:42:08 +0200147 reference_test_passed = True
Manuel Pégourié-Gonnard371165a2023-10-18 12:44:54 +0200148 seen_reference_passing = True
Manuel Pégourié-Gonnardc6967d22022-12-30 13:40:34 +0100149 if(reference_test_passed and not driver_test_passed):
Manuel Pégourié-Gonnard371165a2023-10-18 12:44:54 +0200150 if not ignored:
151 results.error("PASS -> SKIP/FAIL: {}", key)
152 else:
153 if ignored:
154 results.error("uselessly ignored: {}", key)
155
156 if not seen_reference_passing:
157 results.error("no passing test in reference component: bad outcome file?")
Przemek Stekiel4e955902022-10-21 13:42:08 +0200158
Valerio Setti781c2342023-10-17 12:47:35 +0200159def analyze_outcomes(results: Results, outcomes, args):
Gilles Peskine15c2cbf2020-06-25 18:36:28 +0200160 """Run all analyses on the given outcome collection."""
Valerio Settif075e472023-10-17 11:03:16 +0200161 analyze_coverage(results, outcomes, args['allow_list'],
Tomás Gonzálezb401e112023-08-11 15:22:04 +0100162 args['full_coverage'])
Gilles Peskine15c2cbf2020-06-25 18:36:28 +0200163
164def read_outcome_file(outcome_file):
165 """Parse an outcome file and return an outcome collection.
166
167An outcome collection is a dictionary mapping keys to TestCaseOutcomes objects.
168The keys are the test suite name and the test case description, separated
169by a semicolon.
170"""
171 outcomes = {}
172 with open(outcome_file, 'r', encoding='utf-8') as input_file:
173 for line in input_file:
174 (platform, config, suite, case, result, _cause) = line.split(';')
175 key = ';'.join([suite, case])
176 setup = ';'.join([platform, config])
177 if key not in outcomes:
178 outcomes[key] = TestCaseOutcomes()
179 if result == 'PASS':
180 outcomes[key].successes.append(setup)
181 elif result == 'FAIL':
182 outcomes[key].failures.append(setup)
183 return outcomes
184
Valerio Setti781c2342023-10-17 12:47:35 +0200185def do_analyze_coverage(results: Results, outcome_file, args):
Przemek Stekiel6856f4c2022-11-09 10:50:29 +0100186 """Perform coverage analysis."""
Valerio Setti2cff8202023-10-18 14:36:47 +0200187 results.new_section("Analyze coverage")
Gilles Peskine15c2cbf2020-06-25 18:36:28 +0200188 outcomes = read_outcome_file(outcome_file)
Valerio Setti781c2342023-10-17 12:47:35 +0200189 analyze_outcomes(results, outcomes, args)
Przemek Stekiel4e955902022-10-21 13:42:08 +0200190
Valerio Setti781c2342023-10-17 12:47:35 +0200191def do_analyze_driver_vs_reference(results: Results, outcome_file, args):
Przemek Stekiel4e955902022-10-21 13:42:08 +0200192 """Perform driver vs reference analyze."""
Valerio Setti2cff8202023-10-18 14:36:47 +0200193 results.new_section("Analyze driver {} vs reference {}",
194 args['component_driver'], args['component_ref'])
Valerio Settib0c618e2023-10-16 14:19:49 +0200195
Valerio Setti781c2342023-10-17 12:47:35 +0200196 execute_reference_driver_tests(results, args['component_ref'], \
197 args['component_driver'], outcome_file)
Valerio Settia2663322023-03-24 08:20:18 +0100198
Valerio Setti3002c992023-01-18 17:28:36 +0100199 ignored_suites = ['test_suite_' + x for x in args['ignored_suites']]
Przemek Stekiel51f30ff2022-11-09 12:07:29 +0100200
Przemek Stekiel4e955902022-10-21 13:42:08 +0200201 outcomes = read_outcome_file(outcome_file)
Valerio Settiaaef0bc2023-10-10 09:42:13 +0200202
Valerio Setti781c2342023-10-17 12:47:35 +0200203 analyze_driver_vs_reference(results, outcomes,
204 args['component_ref'], args['component_driver'],
205 ignored_suites, args['ignored_tests'])
Gilles Peskine15c2cbf2020-06-25 18:36:28 +0200206
Przemek Stekiel6856f4c2022-11-09 10:50:29 +0100207# List of tasks with a function that can handle this task and additional arguments if required
Valerio Settidfd7ca62023-10-09 16:30:11 +0200208KNOWN_TASKS = {
Przemek Stekiel4d13c832022-10-26 16:11:26 +0200209 'analyze_coverage': {
210 'test_function': do_analyze_coverage,
Tomás González07bdcc22023-08-11 14:59:03 +0100211 'args': {
Tomás González358c6c62023-08-14 15:43:46 +0100212 'allow_list': [
Tomás González50223112023-08-22 09:52:06 +0100213 # Algorithm not supported yet
214 'test_suite_psa_crypto_metadata;Asymmetric signature: pure EdDSA',
215 # Algorithm not supported yet
216 'test_suite_psa_crypto_metadata;Cipher: XTS',
Tomás Gonzálezd43cab32023-08-24 09:12:40 +0100217 ],
Tomás Gonzálezb401e112023-08-11 15:22:04 +0100218 'full_coverage': False,
Tomás González07bdcc22023-08-11 14:59:03 +0100219 }
Tomás Gonzálezd43cab32023-08-24 09:12:40 +0100220 },
Valerio Settia2663322023-03-24 08:20:18 +0100221 # There are 2 options to use analyze_driver_vs_reference_xxx locally:
222 # 1. Run tests and then analysis:
223 # - tests/scripts/all.sh --outcome-file "$PWD/out.csv" <component_ref> <component_driver>
224 # - tests/scripts/analyze_outcomes.py out.csv analyze_driver_vs_reference_xxx
225 # 2. Let this script run both automatically:
226 # - tests/scripts/analyze_outcomes.py out.csv analyze_driver_vs_reference_xxx
Przemek Stekiel4d13c832022-10-26 16:11:26 +0200227 'analyze_driver_vs_reference_hash': {
228 'test_function': do_analyze_driver_vs_reference,
229 'args': {
Przemek Stekiel51f30ff2022-11-09 12:07:29 +0100230 'component_ref': 'test_psa_crypto_config_reference_hash_use_psa',
231 'component_driver': 'test_psa_crypto_config_accel_hash_use_psa',
Manuel Pégourié-Gonnard10e39632022-12-29 12:29:09 +0100232 'ignored_suites': [
233 'shax', 'mdx', # the software implementations that are being excluded
Manuel Pégourié-Gonnard7d381f52023-03-17 15:13:08 +0100234 'md.psa', # purposefully depends on whether drivers are present
Gilles Peskine35b49c42023-10-04 12:28:41 +0200235 'psa_crypto_low_hash.generated', # testing the builtins
Valerio Setti3002c992023-01-18 17:28:36 +0100236 ],
237 'ignored_tests': {
238 }
239 }
240 },
Valerio Settib6b301f2023-10-04 12:05:05 +0200241 'analyze_driver_vs_reference_cipher_aead': {
242 'test_function': do_analyze_driver_vs_reference,
243 'args': {
244 'component_ref': 'test_psa_crypto_config_reference_cipher_aead',
245 'component_driver': 'test_psa_crypto_config_accel_cipher_aead',
Valerio Setti507e08f2023-10-26 09:44:06 +0200246 # Modules replaced by drivers.
Valerio Settib6b301f2023-10-04 12:05:05 +0200247 'ignored_suites': [
Valerio Setti507e08f2023-10-26 09:44:06 +0200248 # low-level (block/stream) cipher modules
249 'aes', 'aria', 'camellia', 'des', 'chacha20',
250 # AEAD modes
251 'ccm', 'chachapoly', 'cmac', 'gcm',
252 # The Cipher abstraction layer
253 'cipher',
Valerio Settib6b301f2023-10-04 12:05:05 +0200254 ],
255 'ignored_tests': {
Valerio Setti507e08f2023-10-26 09:44:06 +0200256 # PEM decryption is not supported so far.
257 # The rest of PEM (write, unencrypted read) works though.
Valerio Setti7448cee2023-10-04 15:46:42 +0200258 'test_suite_pem': [
259 'PEM read (AES-128-CBC + invalid iv)'
260 'PEM read (DES-CBC + invalid iv)',
261 'PEM read (DES-EDE3-CBC + invalid iv)',
262 'PEM read (malformed PEM AES-128-CBC)',
263 'PEM read (malformed PEM DES-CBC)',
264 'PEM read (malformed PEM DES-EDE3-CBC)',
265 'PEM read (unknown encryption algorithm)',
266 'PEM read (AES-128-CBC + invalid iv)',
267 'PEM read (DES-CBC + invalid iv)',
268 ],
Valerio Setti507e08f2023-10-26 09:44:06 +0200269 # Following tests depend on AES_C/DES_C but are not about
270 # them really, just need to know some error code is there.
Valerio Setti7448cee2023-10-04 15:46:42 +0200271 'test_suite_error': [
272 'Low and high error',
273 'Single low error'
274 ],
Valerio Setti507e08f2023-10-26 09:44:06 +0200275 # Similar to test_suite_error above.
Valerio Setti7448cee2023-10-04 15:46:42 +0200276 'test_suite_version': [
277 'Check for MBEDTLS_AES_C when already present',
Valerio Setti93941442023-10-13 09:19:52 +0200278 ],
Valerio Setti507e08f2023-10-26 09:44:06 +0200279 # The en/decryption part of PKCS#12 is not supported so far.
280 # The rest of PKCS#12 (key derivation) works though.
Valerio Setti93941442023-10-13 09:19:52 +0200281 'test_suite_pkcs12': [
282 'PBE Decrypt, (Invalid padding & PKCS7 padding enabled)',
283 'PBE Decrypt, pad = 7 (OK)',
284 'PBE Decrypt, pad = 8 (Invalid output size)',
285 'PBE Decrypt, pad = 8 (OK)',
286 'PBE Encrypt, pad = 7 (OK)',
287 'PBE Encrypt, pad = 8 (Invalid output size)',
288 'PBE Encrypt, pad = 8 (OK)',
289 ],
Valerio Setti507e08f2023-10-26 09:44:06 +0200290 # The en/decryption part of PKCS#5 is not supported so far.
291 # The rest of PKCS#5 (PBKDF2) works though.
Valerio Setti93941442023-10-13 09:19:52 +0200292 'test_suite_pkcs5': [
293 'PBES2 Decrypt (Invalid output size)',
294 'PBES2 Decrypt (Invalid padding & PKCS7 padding enabled)',
295 'PBES2 Decrypt (KDF != PBKDF2)',
296 'PBES2 Decrypt (OK)',
297 'PBES2 Decrypt (OK, PBKDF2 params explicit keylen)',
298 'PBES2 Decrypt (OK, PBKDF2 params explicit prf_alg)',
299 'PBES2 Decrypt (bad KDF AlgId: not a sequence)',
300 'PBES2 Decrypt (bad KDF AlgId: overlong)',
301 'PBES2 Decrypt (bad PBKDF2 params explicit keylen: overlong)',
302 'PBES2 Decrypt (bad PBKDF2 params iter: not an int)',
303 'PBES2 Decrypt (bad PBKDF2 params iter: overlong)',
304 'PBES2 Decrypt (bad PBKDF2 params salt: not an octet string)',
305 'PBES2 Decrypt (bad PBKDF2 params salt: overlong)',
306 'PBES2 Decrypt (bad PBKDF2 params: not a sequence)',
307 'PBES2 Decrypt (bad PBKDF2 params: overlong)',
308 'PBES2 Decrypt (bad enc_scheme_alg params: len != iv_len)',
309 'PBES2 Decrypt (bad enc_scheme_alg params: not an octet string)',
310 'PBES2 Decrypt (bad enc_scheme_alg params: overlong)',
311 'PBES2 Decrypt (bad enc_scheme_alg: not a sequence)',
312 'PBES2 Decrypt (bad enc_scheme_alg: overlong)',
313 'PBES2 Decrypt (bad enc_scheme_alg: unknown oid)',
314 'PBES2 Decrypt (bad iter value)',
315 'PBES2 Decrypt (bad params tag)',
316 'PBES2 Decrypt (bad password)',
317 'PBES2 Decrypt (bad, PBKDF2 params explicit prf_alg != HMAC-SHA*)',
318 'PBES2 Decrypt (bad, PBKDF2 params explicit prf_alg not a sequence)',
319 'PBES2 Decrypt (bad, PBKDF2 params explicit prf_alg overlong)',
320 'PBES2 Decrypt (bad, PBKDF2 params extra data)',
321 'PBES2 Encrypt, pad=6 (OK)',
322 'PBES2 Encrypt, pad=8 (Invalid output size)',
323 'PBES2 Encrypt, pad=8 (OK)',
324 ],
Valerio Setti507e08f2023-10-26 09:44:06 +0200325 # Encrypted keys are not supported so far.
Valerio Setti5cd18f92023-10-13 15:14:07 +0200326 # pylint: disable=line-too-long
Valerio Setti93941442023-10-13 09:19:52 +0200327 'test_suite_pkparse': [
328 'Key ASN1 (Encrypted key PKCS12, trailing garbage data)',
329 'Key ASN1 (Encrypted key PKCS5, trailing garbage data)',
330 'Parse RSA Key #20 (PKCS#8 encrypted SHA1-3DES)',
331 'Parse RSA Key #20.1 (PKCS#8 encrypted SHA1-3DES, wrong PW)',
332 'Parse RSA Key #20.2 (PKCS#8 encrypted SHA1-3DES, no PW)',
333 'Parse RSA Key #21 (PKCS#8 encrypted SHA1-3DES, 2048-bit)',
334 'Parse RSA Key #21.1 (PKCS#8 encrypted SHA1-3DES, 2048-bit, wrong PW)',
335 'Parse RSA Key #21.2 (PKCS#8 encrypted SHA1-3DES, 2048-bit, no PW)',
336 'Parse RSA Key #22 (PKCS#8 encrypted SHA1-3DES, 4096-bit)',
337 'Parse RSA Key #22.1 (PKCS#8 encrypted SHA1-3DES, 4096-bit, wrong PW)',
338 'Parse RSA Key #22.2 (PKCS#8 encrypted SHA1-3DES, 4096-bit, no PW)',
339 'Parse RSA Key #23 (PKCS#8 encrypted SHA1-3DES DER)',
340 'Parse RSA Key #24 (PKCS#8 encrypted SHA1-3DES DER, 2048-bit)',
341 'Parse RSA Key #25 (PKCS#8 encrypted SHA1-3DES DER, 4096-bit)',
342 'Parse RSA Key #26 (PKCS#8 encrypted SHA1-2DES)',
343 'Parse RSA Key #26.1 (PKCS#8 encrypted SHA1-2DES, wrong PW)',
344 'Parse RSA Key #26.2 (PKCS#8 encrypted SHA1-2DES, no PW)',
345 'Parse RSA Key #27 (PKCS#8 encrypted SHA1-2DES, 2048-bit)',
346 'Parse RSA Key #27.1 (PKCS#8 encrypted SHA1-2DES, 2048-bit, wrong PW)',
347 'Parse RSA Key #27.2 (PKCS#8 encrypted SHA1-2DES, 2048-bit no PW)',
348 'Parse RSA Key #28 (PKCS#8 encrypted SHA1-2DES, 4096-bit)',
349 'Parse RSA Key #28.1 (PKCS#8 encrypted SHA1-2DES, 4096-bit, wrong PW)',
350 'Parse RSA Key #28.2 (PKCS#8 encrypted SHA1-2DES, 4096-bit, no PW)',
351 'Parse RSA Key #29 (PKCS#8 encrypted SHA1-2DES DER)',
352 'Parse RSA Key #30 (PKCS#8 encrypted SHA1-2DES DER, 2048-bit)',
353 'Parse RSA Key #31 (PKCS#8 encrypted SHA1-2DES DER, 4096-bit)',
354 'Parse RSA Key #38 (PKCS#8 encrypted v2 PBKDF2 3DES)',
355 'Parse RSA Key #38.1 (PKCS#8 encrypted v2 PBKDF2 3DES, wrong PW)',
356 'Parse RSA Key #38.2 (PKCS#8 encrypted v2 PBKDF2 3DES, no PW)',
357 'Parse RSA Key #39 (PKCS#8 encrypted v2 PBKDF2 3DES, 2048-bit)',
358 'Parse RSA Key #39.1 (PKCS#8 encrypted v2 PBKDF2 3DES, 2048-bit, wrong PW)',
359 'Parse RSA Key #39.2 (PKCS#8 encrypted v2 PBKDF2 3DES, 2048-bit, no PW)',
360 'Parse RSA Key #40 (PKCS#8 encrypted v2 PBKDF2 3DES, 4096-bit)',
361 'Parse RSA Key #40.1 (PKCS#8 encrypted v2 PBKDF2 3DES, 4096-bit, wrong PW)',
362 'Parse RSA Key #40.2 (PKCS#8 encrypted v2 PBKDF2 3DES, 4096-bit, no PW)',
363 'Parse RSA Key #41 (PKCS#8 encrypted v2 PBKDF2 3DES DER)',
364 'Parse RSA Key #41.1 (PKCS#8 encrypted v2 PBKDF2 3DES DER, wrong PW)',
365 'Parse RSA Key #41.2 (PKCS#8 encrypted v2 PBKDF2 3DES DER, no PW)',
366 'Parse RSA Key #42 (PKCS#8 encrypted v2 PBKDF2 3DES DER, 2048-bit)',
367 'Parse RSA Key #42.1 (PKCS#8 encrypted v2 PBKDF2 3DES DER, 2048-bit, wrong PW)',
368 'Parse RSA Key #42.2 (PKCS#8 encrypted v2 PBKDF2 3DES DER, 2048-bit, no PW)',
369 'Parse RSA Key #43 (PKCS#8 encrypted v2 PBKDF2 3DES DER, 4096-bit)',
370 'Parse RSA Key #43.1 (PKCS#8 encrypted v2 PBKDF2 3DES DER, 4096-bit, wrong PW)',
371 'Parse RSA Key #43.2 (PKCS#8 encrypted v2 PBKDF2 3DES DER, 4096-bit, no PW)',
372 'Parse RSA Key #44 (PKCS#8 encrypted v2 PBKDF2 DES)',
373 'Parse RSA Key #44.1 (PKCS#8 encrypted v2 PBKDF2 DES, wrong PW)',
374 'Parse RSA Key #44.2 (PKCS#8 encrypted v2 PBKDF2 DES, no PW)',
375 'Parse RSA Key #45 (PKCS#8 encrypted v2 PBKDF2 DES, 2048-bit)',
376 'Parse RSA Key #45.1 (PKCS#8 encrypted v2 PBKDF2 DES, 2048-bit, wrong PW)',
377 'Parse RSA Key #45.2 (PKCS#8 encrypted v2 PBKDF2 DES, 2048-bit, no PW)',
378 'Parse RSA Key #46 (PKCS#8 encrypted v2 PBKDF2 DES, 4096-bit)',
379 'Parse RSA Key #46.1 (PKCS#8 encrypted v2 PBKDF2 DES, 4096-bit, wrong PW)',
380 'Parse RSA Key #46.2 (PKCS#8 encrypted v2 PBKDF2 DES, 4096-bit, no PW)',
381 'Parse RSA Key #47 (PKCS#8 encrypted v2 PBKDF2 DES DER)',
382 'Parse RSA Key #47.1 (PKCS#8 encrypted v2 PBKDF2 DES DER, wrong PW)',
383 'Parse RSA Key #47.2 (PKCS#8 encrypted v2 PBKDF2 DES DER, no PW)',
384 'Parse RSA Key #48 (PKCS#8 encrypted v2 PBKDF2 DES DER, 2048-bit)',
385 'Parse RSA Key #48.1 (PKCS#8 encrypted v2 PBKDF2 DES DER, 2048-bit, wrong PW)',
386 'Parse RSA Key #48.2 (PKCS#8 encrypted v2 PBKDF2 DES DER, 2048-bit, no PW)',
387 'Parse RSA Key #49 (PKCS#8 encrypted v2 PBKDF2 DES DER, 4096-bit)',
388 'Parse RSA Key #49.1 (PKCS#8 encrypted v2 PBKDF2 DES DER, 4096-bit, wrong PW)',
389 'Parse RSA Key #49.2 (PKCS#8 encrypted v2 PBKDF2 DES DER, 4096-bit, no PW)',
390 'Parse RSA Key #50 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA224)',
391 'Parse RSA Key #50.1 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA224, wrong PW)',
392 'Parse RSA Key #50.2 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA224, no PW)',
393 'Parse RSA Key #51 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA224, 2048-bit)',
394 'Parse RSA Key #51.1 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA224, 2048-bit, wrong PW)',
395 'Parse RSA Key #51.2 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA224, 2048-bit, no PW)',
396 'Parse RSA Key #52 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA224, 4096-bit)',
397 'Parse RSA Key #52.1 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA224, 4096-bit, wrong PW)',
398 'Parse RSA Key #52.2 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA224, 4096-bit, no PW)',
399 'Parse RSA Key #53 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA224 DER)',
400 'Parse RSA Key #53.1 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA224 DER, wrong PW)',
401 'Parse RSA Key #53.2 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA224 DER, no PW)',
402 'Parse RSA Key #54 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA224 DER, 2048-bit)',
403 'Parse RSA Key #54.1 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA224 DER, 2048-bit, wrong PW)',
404 'Parse RSA Key #54.2 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA224 DER, 2048-bit, no PW)',
405 'Parse RSA Key #55 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA224 DER, 4096-bit)',
406 'Parse RSA Key #55.1 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA224 DER, 4096-bit, wrong PW)',
407 'Parse RSA Key #55.2 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA224 DER, 4096-bit, no PW)',
408 'Parse RSA Key #56 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA224)',
409 'Parse RSA Key #56.1 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA224, wrong PW)',
410 'Parse RSA Key #56.2 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA224, no PW)',
411 'Parse RSA Key #57 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA224, 2048-bit)',
412 'Parse RSA Key #57.1 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA224, 2048-bit, wrong PW)',
413 'Parse RSA Key #57.2 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA224, 2048-bit, no PW)',
414 'Parse RSA Key #58 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA224, 4096-bit)',
415 'Parse RSA Key #58.1 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA224, 4096-bit, wrong PW)',
416 'Parse RSA Key #58.2 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA224, 4096-bit, no PW)',
417 'Parse RSA Key #59 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA224 DER)',
418 'Parse RSA Key #59.1 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA224 DER, wrong PW)',
419 'Parse RSA Key #59.2 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA224 DER, no PW)',
420 'Parse RSA Key #60 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA224 DER, 2048-bit)',
421 'Parse RSA Key #60.1 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA224 DER, 2048-bit, wrong PW)',
422 'Parse RSA Key #60.2 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA224 DER, 2048-bit, no PW)',
423 'Parse RSA Key #61 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA224 DER, 4096-bit)',
424 'Parse RSA Key #61.1 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA224 DER, 4096-bit, wrong PW)',
425 'Parse RSA Key #61.2 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA224 DER, 4096-bit, no PW)',
426 'Parse RSA Key #62 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA256)',
427 'Parse RSA Key #62.1 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA256, wrong PW)',
428 'Parse RSA Key #62.2 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA256, no PW)',
429 'Parse RSA Key #63 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA256, 2048-bit)',
430 'Parse RSA Key #63.1 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA256, 2048-bit, wrong PW)',
431 'Parse RSA Key #63.2 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA256, 2048-bit, no PW)',
432 'Parse RSA Key #64 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA256, 4096-bit)',
433 'Parse RSA Key #64.1 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA256, 4096-bit, wrong PW)',
434 'Parse RSA Key #64.2 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA256, 4096-bit, no PW)',
435 'Parse RSA Key #65 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA256 DER)',
436 'Parse RSA Key #65.1 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA256 DER, wrong PW)',
437 'Parse RSA Key #65.2 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA256 DER, no PW)',
438 'Parse RSA Key #66 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA256 DER, 2048-bit)',
439 'Parse RSA Key #66.1 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA256 DER, 2048-bit, wrong PW)',
440 'Parse RSA Key #66.2 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA256 DER, 2048-bit, no PW)',
441 'Parse RSA Key #67 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA256 DER, 4096-bit)',
442 'Parse RSA Key #68.1 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA256 DER, 4096-bit, wrong PW)',
443 'Parse RSA Key #68.2 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA256 DER, 4096-bit, no PW)',
444 'Parse RSA Key #69 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA256)',
445 'Parse RSA Key #69.1 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA256, wrong PW)',
446 'Parse RSA Key #69.2 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA256, no PW)',
447 'Parse RSA Key #70 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA256, 2048-bit)',
448 'Parse RSA Key #70.1 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA256, 2048-bit, wrong PW)',
449 'Parse RSA Key #70.2 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA256, 2048-bit, no PW)',
450 'Parse RSA Key #71 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA256, 4096-bit)',
451 'Parse RSA Key #71.1 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA256, 4096-bit, wrong PW)',
452 'Parse RSA Key #71.2 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA256, 4096-bit, no PW)',
453 'Parse RSA Key #72 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA256 DER)',
454 'Parse RSA Key #72.1 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA256 DER, wrong PW)',
455 'Parse RSA Key #72.2 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA256 DER, no PW)',
456 'Parse RSA Key #73 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA256 DER, 2048-bit)',
457 'Parse RSA Key #73.1 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA256 DER, 2048-bit, wrong PW)',
458 'Parse RSA Key #73.2 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA256 DER, 2048-bit, no PW)',
459 'Parse RSA Key #74 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA256 DER, 4096-bit)',
460 'Parse RSA Key #74.1 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA256 DER, 4096-bit, wrong PW)',
461 'Parse RSA Key #74.2 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA256 DER, 4096-bit, no PW)',
462 'Parse RSA Key #75 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA384)',
463 'Parse RSA Key #75.1 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA384, wrong PW)',
464 'Parse RSA Key #75.2 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA384, no PW)',
465 'Parse RSA Key #76 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA384, 2048-bit)',
466 'Parse RSA Key #76.1 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA384, 2048-bit, wrong PW)',
467 'Parse RSA Key #76.2 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA384, 2048-bit, no PW)',
468 'Parse RSA Key #77 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA384, 4096-bit)',
469 'Parse RSA Key #77.1 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA384, 4096-bit, wrong PW)',
470 'Parse RSA Key #77.2 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA384, 4096-bit, no PW)',
471 'Parse RSA Key #78 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA384 DER)',
472 'Parse RSA Key #78.1 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA384 DER, wrong PW)',
473 'Parse RSA Key #78.2 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA384 DER, no PW)',
474 'Parse RSA Key #79 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA384 DER, 2048-bit)',
475 'Parse RSA Key #79.1 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA384 DER, 2048-bit, wrong PW)',
476 'Parse RSA Key #79.2 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA384 DER, 2048-bit, no PW)',
477 'Parse RSA Key #80 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA384 DER, 4096-bit)',
478 'Parse RSA Key #80.1 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA384 DER, 4096-bit, wrong PW)',
479 'Parse RSA Key #80.2 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA384 DER, 4096-bit, no PW)',
480 'Parse RSA Key #81 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA384)',
481 'Parse RSA Key #81.1 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA384, wrong PW)',
482 'Parse RSA Key #81.2 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA384, no PW)',
483 'Parse RSA Key #82 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA384, 2048-bit)',
484 'Parse RSA Key #82.1 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA384, 2048-bit, wrong PW)',
485 'Parse RSA Key #82.2 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA384, 2048-bit, no PW)',
486 'Parse RSA Key #83 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA384, 4096-bit)',
487 'Parse RSA Key #83.1 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA384, 4096-bit, wrong PW)',
488 'Parse RSA Key #83.2 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA384, 4096-bit, no PW)',
489 'Parse RSA Key #84 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA384 DER)',
490 'Parse RSA Key #84.1 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA384 DER, wrong PW)',
491 'Parse RSA Key #85.2 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA384 DER, no PW)',
492 'Parse RSA Key #86 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA384 DER, 2048-bit)',
493 'Parse RSA Key #86.1 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA384 DER, 2048-bit, wrong PW)',
494 'Parse RSA Key #86.2 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA384 DER, 2048-bit, no PW)',
495 'Parse RSA Key #87 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA384 DER, 4096-bit)',
496 'Parse RSA Key #87.1 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA384 DER, 4096-bit, wrong PW)',
497 'Parse RSA Key #87.2 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA384 DER, 4096-bit, no PW)',
498 'Parse RSA Key #88 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA512)',
499 'Parse RSA Key #88.1 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA512, wrong PW)',
500 'Parse RSA Key #88.2 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA512, no PW)',
501 'Parse RSA Key #89 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA512, 2048-bit)',
502 'Parse RSA Key #89.1 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA512, 2048-bit, wrong PW)',
503 'Parse RSA Key #89.2 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA512, 2048-bit, no PW)',
504 'Parse RSA Key #90 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA512, 4096-bit)',
505 'Parse RSA Key #90.1 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA512, 4096-bit, wrong PW)',
506 'Parse RSA Key #90.2 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA512, 4096-bit, no PW)',
507 'Parse RSA Key #91 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA512 DER)',
508 'Parse RSA Key #91.1 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA512 DER, wrong PW)',
509 'Parse RSA Key #91.2 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA512 DER, no PW)',
510 'Parse RSA Key #92 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA512 DER, 2048-bit)',
511 'Parse RSA Key #92.1 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA512 DER, 2048-bit, wrong PW)',
512 'Parse RSA Key #92.2 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA512 DER, 2048-bit, no PW)',
513 'Parse RSA Key #93 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA512 DER, 4096-bit)',
514 'Parse RSA Key #93.1 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA512 DER, 4096-bit, wrong PW)',
515 'Parse RSA Key #93.2 (PKCS#8 encrypted v2 PBKDF2 3DES hmacWithSHA512 DER, 4096-bit, no PW)',
516 'Parse RSA Key #94 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA512)',
517 'Parse RSA Key #94.1 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA512, wrong PW)',
518 'Parse RSA Key #94.2 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA512, no PW)',
519 'Parse RSA Key #95 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA512, 2048-bit)',
520 'Parse RSA Key #95.1 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA512, 2048-bit, wrong PW)',
521 'Parse RSA Key #95.2 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA512, 2048-bit, no PW)',
522 'Parse RSA Key #96 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA512, 4096-bit)',
523 'Parse RSA Key #96.1 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA512, 4096-bit, wrong PW)',
524 'Parse RSA Key #96.2 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA512, 4096-bit, no PW)',
525 'Parse RSA Key #97 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA512 DER)',
526 'Parse RSA Key #97.1 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA512 DER, wrong PW)',
527 'Parse RSA Key #97.2 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA512 DER, no PW)',
528 'Parse RSA Key #98 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA512 DER, 2048-bit)',
529 'Parse RSA Key #98.1 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA512 DER, 2048-bit, wrong PW)',
530 'Parse RSA Key #98.2 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA512 DER, 2048-bit, no PW)',
531 'Parse RSA Key #99 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA512 DER, 4096-bit)',
532 'Parse RSA Key #99.1 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA512 DER, 4096-bit, wrong PW)',
533 'Parse RSA Key #99.2 (PKCS#8 encrypted v2 PBKDF2 DES hmacWithSHA512 DER, 4096-bit, no PW)',
534 ],
Valerio Settib6b301f2023-10-04 12:05:05 +0200535 }
536 }
537 },
Valerio Setti4d25a8d2023-06-14 10:33:10 +0200538 'analyze_driver_vs_reference_ecp_light_only': {
Valerio Setti42d5f192023-03-20 13:54:41 +0100539 'test_function': do_analyze_driver_vs_reference,
540 'args': {
Valerio Setti4d25a8d2023-06-14 10:33:10 +0200541 'component_ref': 'test_psa_crypto_config_reference_ecc_ecp_light_only',
542 'component_driver': 'test_psa_crypto_config_accel_ecc_ecp_light_only',
Valerio Setti42d5f192023-03-20 13:54:41 +0100543 'ignored_suites': [
Manuel Pégourié-Gonnard4fd5a6a2023-10-20 10:21:09 +0200544 # Modules replaced by drivers
545 'ecdsa', 'ecdh', 'ecjpake',
Valerio Setti42d5f192023-03-20 13:54:41 +0100546 ],
547 'ignored_tests': {
Manuel Pégourié-Gonnard4fd5a6a2023-10-20 10:21:09 +0200548 # This test wants a legacy function that takes f_rng, p_rng
549 # arguments, and uses legacy ECDSA for that. The test is
550 # really about the wrapper around the PSA RNG, not ECDSA.
Valerio Setti42d5f192023-03-20 13:54:41 +0100551 'test_suite_random': [
552 'PSA classic wrapper: ECDSA signature (SECP256R1)',
553 ],
Valerio Setti0c477d32023-04-07 15:54:20 +0200554 # In the accelerated test ECP_C is not set (only ECP_LIGHT is)
555 # so we must ignore disparities in the tests for which ECP_C
556 # is required.
557 'test_suite_ecp': [
Manuel Pégourié-Gonnard4fd5a6a2023-10-20 10:21:09 +0200558 re.compile(r'ECP check public-private .*'),
559 re.compile(r'ECP gen keypair .*'),
560 re.compile(r'ECP point muladd .*'),
561 re.compile(r'ECP point multiplication .*'),
562 re.compile(r'ECP test vectors .*'),
Valerio Settie50a75f2023-05-19 17:43:06 +0200563 ],
Manuel Pégourié-Gonnardf07ce3b2023-09-22 11:53:41 +0200564 'test_suite_ssl': [
Manuel Pégourié-Gonnard4fd5a6a2023-10-20 10:21:09 +0200565 # This deprecated function is only present when ECP_C is On.
Manuel Pégourié-Gonnardf07ce3b2023-09-22 11:53:41 +0200566 'Test configuration of groups for DHE through mbedtls_ssl_conf_curves()',
567 ],
Valerio Setti5f540202023-06-30 17:20:49 +0200568 }
Valerio Setti42d5f192023-03-20 13:54:41 +0100569 }
570 },
Valerio Setti4d25a8d2023-06-14 10:33:10 +0200571 'analyze_driver_vs_reference_no_ecp_at_all': {
Valerio Settie618cb02023-04-12 14:59:16 +0200572 'test_function': do_analyze_driver_vs_reference,
573 'args': {
Valerio Setti4d25a8d2023-06-14 10:33:10 +0200574 'component_ref': 'test_psa_crypto_config_reference_ecc_no_ecp_at_all',
575 'component_driver': 'test_psa_crypto_config_accel_ecc_no_ecp_at_all',
Valerio Settie618cb02023-04-12 14:59:16 +0200576 'ignored_suites': [
Manuel Pégourié-Gonnard4fd5a6a2023-10-20 10:21:09 +0200577 # Modules replaced by drivers
578 'ecp', 'ecdsa', 'ecdh', 'ecjpake',
Valerio Settie618cb02023-04-12 14:59:16 +0200579 ],
580 'ignored_tests': {
Manuel Pégourié-Gonnard4fd5a6a2023-10-20 10:21:09 +0200581 # See ecp_light_only
Valerio Settie618cb02023-04-12 14:59:16 +0200582 'test_suite_random': [
583 'PSA classic wrapper: ECDSA signature (SECP256R1)',
584 ],
Valerio Settiaddeee42023-06-14 10:46:55 +0200585 'test_suite_pkparse': [
Valerio Setti5bd25232023-06-19 19:32:14 +0200586 # When PK_PARSE_C and ECP_C are defined then PK_PARSE_EC_COMPRESSED
587 # is automatically enabled in build_info.h (backward compatibility)
588 # even if it is disabled in config_psa_crypto_no_ecp_at_all(). As a
589 # consequence compressed points are supported in the reference
590 # component but not in the accelerated one, so they should be skipped
591 # while checking driver's coverage.
Manuel Pégourié-Gonnard4fd5a6a2023-10-20 10:21:09 +0200592 re.compile(r'Parse EC Key .*compressed\)'),
593 re.compile(r'Parse Public EC Key .*compressed\)'),
Valerio Settiaddeee42023-06-14 10:46:55 +0200594 ],
Manuel Pégourié-Gonnard4fd5a6a2023-10-20 10:21:09 +0200595 # See ecp_light_only
Manuel Pégourié-Gonnardf07ce3b2023-09-22 11:53:41 +0200596 'test_suite_ssl': [
597 'Test configuration of groups for DHE through mbedtls_ssl_conf_curves()',
598 ],
Valerio Settie618cb02023-04-12 14:59:16 +0200599 }
600 }
601 },
Valerio Setti307810b2023-08-15 10:12:25 +0200602 'analyze_driver_vs_reference_ecc_no_bignum': {
Manuel Pégourié-Gonnardabd00d02023-06-12 17:51:33 +0200603 'test_function': do_analyze_driver_vs_reference,
604 'args': {
605 'component_ref': 'test_psa_crypto_config_reference_ecc_no_bignum',
606 'component_driver': 'test_psa_crypto_config_accel_ecc_no_bignum',
607 'ignored_suites': [
Manuel Pégourié-Gonnard4fd5a6a2023-10-20 10:21:09 +0200608 # Modules replaced by drivers
609 'ecp', 'ecdsa', 'ecdh', 'ecjpake',
610 'bignum_core', 'bignum_random', 'bignum_mod', 'bignum_mod_raw',
611 'bignum.generated', 'bignum.misc',
Manuel Pégourié-Gonnardabd00d02023-06-12 17:51:33 +0200612 ],
613 'ignored_tests': {
Manuel Pégourié-Gonnard4fd5a6a2023-10-20 10:21:09 +0200614 # See ecp_light_only
Manuel Pégourié-Gonnardabd00d02023-06-12 17:51:33 +0200615 'test_suite_random': [
616 'PSA classic wrapper: ECDSA signature (SECP256R1)',
617 ],
Manuel Pégourié-Gonnard4fd5a6a2023-10-20 10:21:09 +0200618 # See no_ecp_at_all
Manuel Pégourié-Gonnardabd00d02023-06-12 17:51:33 +0200619 'test_suite_pkparse': [
Manuel Pégourié-Gonnard4fd5a6a2023-10-20 10:21:09 +0200620 re.compile(r'Parse EC Key .*compressed\)'),
621 re.compile(r'Parse Public EC Key .*compressed\)'),
Manuel Pégourié-Gonnardabd00d02023-06-12 17:51:33 +0200622 ],
Valerio Setti9b3dbcc2023-07-26 18:00:31 +0200623 'test_suite_asn1parse': [
Valerio Setti9b3dbcc2023-07-26 18:00:31 +0200624 'INTEGER too large for mpi',
625 ],
626 'test_suite_asn1write': [
Manuel Pégourié-Gonnard4fd5a6a2023-10-20 10:21:09 +0200627 re.compile(r'ASN.1 Write mpi.*'),
Valerio Setti9b3dbcc2023-07-26 18:00:31 +0200628 ],
Valerio Settie0be95e2023-08-01 09:07:43 +0200629 'test_suite_debug': [
Manuel Pégourié-Gonnard4fd5a6a2023-10-20 10:21:09 +0200630 re.compile(r'Debug print mbedtls_mpi.*'),
Valerio Settie0be95e2023-08-01 09:07:43 +0200631 ],
Manuel Pégourié-Gonnard4fd5a6a2023-10-20 10:21:09 +0200632 # See ecp_light_only
Manuel Pégourié-Gonnardf07ce3b2023-09-22 11:53:41 +0200633 'test_suite_ssl': [
634 'Test configuration of groups for DHE through mbedtls_ssl_conf_curves()',
635 ],
Manuel Pégourié-Gonnardabd00d02023-06-12 17:51:33 +0200636 }
637 }
638 },
Valerio Setti307810b2023-08-15 10:12:25 +0200639 'analyze_driver_vs_reference_ecc_ffdh_no_bignum': {
640 'test_function': do_analyze_driver_vs_reference,
641 'args': {
642 'component_ref': 'test_psa_crypto_config_reference_ecc_ffdh_no_bignum',
643 'component_driver': 'test_psa_crypto_config_accel_ecc_ffdh_no_bignum',
644 'ignored_suites': [
Manuel Pégourié-Gonnard4fd5a6a2023-10-20 10:21:09 +0200645 # Modules replaced by drivers
646 'ecp', 'ecdsa', 'ecdh', 'ecjpake', 'dhm',
647 'bignum_core', 'bignum_random', 'bignum_mod', 'bignum_mod_raw',
648 'bignum.generated', 'bignum.misc',
Valerio Setti307810b2023-08-15 10:12:25 +0200649 ],
650 'ignored_tests': {
Manuel Pégourié-Gonnard4fd5a6a2023-10-20 10:21:09 +0200651 # See ecp_light_only
Valerio Setti307810b2023-08-15 10:12:25 +0200652 'test_suite_random': [
653 'PSA classic wrapper: ECDSA signature (SECP256R1)',
654 ],
Manuel Pégourié-Gonnard4fd5a6a2023-10-20 10:21:09 +0200655 # See no_ecp_at_all
Valerio Setti307810b2023-08-15 10:12:25 +0200656 'test_suite_pkparse': [
Manuel Pégourié-Gonnard4fd5a6a2023-10-20 10:21:09 +0200657 re.compile(r'Parse EC Key .*compressed\)'),
658 re.compile(r'Parse Public EC Key .*compressed\)'),
Valerio Setti307810b2023-08-15 10:12:25 +0200659 ],
660 'test_suite_asn1parse': [
Valerio Setti307810b2023-08-15 10:12:25 +0200661 'INTEGER too large for mpi',
662 ],
663 'test_suite_asn1write': [
Manuel Pégourié-Gonnard4fd5a6a2023-10-20 10:21:09 +0200664 re.compile(r'ASN.1 Write mpi.*'),
Valerio Setti307810b2023-08-15 10:12:25 +0200665 ],
666 'test_suite_debug': [
Manuel Pégourié-Gonnard4fd5a6a2023-10-20 10:21:09 +0200667 re.compile(r'Debug print mbedtls_mpi.*'),
Valerio Setti307810b2023-08-15 10:12:25 +0200668 ],
Manuel Pégourié-Gonnard4fd5a6a2023-10-20 10:21:09 +0200669 # See ecp_light_only
Manuel Pégourié-Gonnardf07ce3b2023-09-22 11:53:41 +0200670 'test_suite_ssl': [
671 'Test configuration of groups for DHE through mbedtls_ssl_conf_curves()',
672 ],
Valerio Setti307810b2023-08-15 10:12:25 +0200673 }
674 }
675 },
Przemek Stekiel85b64422023-05-26 09:55:23 +0200676 'analyze_driver_vs_reference_ffdh_alg': {
677 'test_function': do_analyze_driver_vs_reference,
678 'args': {
679 'component_ref': 'test_psa_crypto_config_reference_ffdh',
680 'component_driver': 'test_psa_crypto_config_accel_ffdh',
Przemek Stekiel84f4ff12023-07-04 12:35:31 +0200681 'ignored_suites': ['dhm'],
Przemek Stekiel565353e2023-07-05 11:07:07 +0200682 'ignored_tests': {}
Przemek Stekiel85b64422023-05-26 09:55:23 +0200683 }
684 },
Valerio Settif01d6482023-08-04 13:51:18 +0200685 'analyze_driver_vs_reference_tfm_config': {
686 'test_function': do_analyze_driver_vs_reference,
687 'args': {
688 'component_ref': 'test_tfm_config',
689 'component_driver': 'test_tfm_config_p256m_driver_accel_ec',
Manuel Pégourié-Gonnarde9d97972023-08-08 18:34:47 +0200690 'ignored_suites': [
Manuel Pégourié-Gonnard4fd5a6a2023-10-20 10:21:09 +0200691 # Modules replaced by drivers
692 'ecp', 'ecdsa', 'ecdh', 'ecjpake',
693 'bignum_core', 'bignum_random', 'bignum_mod', 'bignum_mod_raw',
694 'bignum.generated', 'bignum.misc',
Manuel Pégourié-Gonnarde9d97972023-08-08 18:34:47 +0200695 ],
Valerio Settif01d6482023-08-04 13:51:18 +0200696 'ignored_tests': {
Manuel Pégourié-Gonnard4fd5a6a2023-10-20 10:21:09 +0200697 # See ecp_light_only
Manuel Pégourié-Gonnarde9d97972023-08-08 18:34:47 +0200698 'test_suite_random': [
699 'PSA classic wrapper: ECDSA signature (SECP256R1)',
700 ],
Manuel Pégourié-Gonnarde9d97972023-08-08 18:34:47 +0200701 'test_suite_asn1parse': [
Manuel Pégourié-Gonnarde9d97972023-08-08 18:34:47 +0200702 'INTEGER too large for mpi',
703 ],
704 'test_suite_asn1write': [
Manuel Pégourié-Gonnard4fd5a6a2023-10-20 10:21:09 +0200705 re.compile(r'ASN.1 Write mpi.*'),
Manuel Pégourié-Gonnarde9d97972023-08-08 18:34:47 +0200706 ],
Valerio Settif01d6482023-08-04 13:51:18 +0200707 }
708 }
709 }
Przemek Stekiel4d13c832022-10-26 16:11:26 +0200710}
Przemek Stekiel4d13c832022-10-26 16:11:26 +0200711
Gilles Peskine15c2cbf2020-06-25 18:36:28 +0200712def main():
Valerio Settif075e472023-10-17 11:03:16 +0200713 main_results = Results()
Valerio Settiaaef0bc2023-10-10 09:42:13 +0200714
Gilles Peskine15c2cbf2020-06-25 18:36:28 +0200715 try:
716 parser = argparse.ArgumentParser(description=__doc__)
Przemek Stekiel58bbc232022-10-24 08:10:10 +0200717 parser.add_argument('outcomes', metavar='OUTCOMES.CSV',
Gilles Peskine15c2cbf2020-06-25 18:36:28 +0200718 help='Outcome file to analyze')
Valerio Settidfd7ca62023-10-09 16:30:11 +0200719 parser.add_argument('specified_tasks', default='all', nargs='?',
Przemek Stekiel992de3c2022-11-09 13:54:49 +0100720 help='Analysis to be done. By default, run all tasks. '
721 'With one or more TASK, run only those. '
722 'TASK can be the name of a single task or '
Przemek Stekiel85c54ea2022-11-17 11:50:23 +0100723 'comma/space-separated list of tasks. ')
Przemek Stekiel992de3c2022-11-09 13:54:49 +0100724 parser.add_argument('--list', action='store_true',
725 help='List all available tasks and exit.')
Tomás Gonzálezb401e112023-08-11 15:22:04 +0100726 parser.add_argument('--require-full-coverage', action='store_true',
727 dest='full_coverage', help="Require all available "
728 "test cases to be executed and issue an error "
729 "otherwise. This flag is ignored if 'task' is "
730 "neither 'all' nor 'analyze_coverage'")
Gilles Peskine15c2cbf2020-06-25 18:36:28 +0200731 options = parser.parse_args()
Przemek Stekiel4e955902022-10-21 13:42:08 +0200732
Przemek Stekiel992de3c2022-11-09 13:54:49 +0100733 if options.list:
Valerio Settidfd7ca62023-10-09 16:30:11 +0200734 for task in KNOWN_TASKS:
Valerio Setti5329ff02023-10-17 09:44:36 +0200735 print(task)
Przemek Stekiel992de3c2022-11-09 13:54:49 +0100736 sys.exit(0)
737
Valerio Settidfd7ca62023-10-09 16:30:11 +0200738 if options.specified_tasks == 'all':
739 tasks_list = KNOWN_TASKS.keys()
Przemek Stekiel992de3c2022-11-09 13:54:49 +0100740 else:
Valerio Settidfd7ca62023-10-09 16:30:11 +0200741 tasks_list = re.split(r'[, ]+', options.specified_tasks)
Valerio Settidfd7ca62023-10-09 16:30:11 +0200742 for task in tasks_list:
743 if task not in KNOWN_TASKS:
Manuel Pégourié-Gonnard62d61312023-10-20 10:51:57 +0200744 sys.stderr.write('invalid task: {}\n'.format(task))
Valerio Settifb2750e2023-10-17 10:11:45 +0200745 sys.exit(2)
Przemek Stekiel992de3c2022-11-09 13:54:49 +0100746
Valerio Settidfd7ca62023-10-09 16:30:11 +0200747 KNOWN_TASKS['analyze_coverage']['args']['full_coverage'] = options.full_coverage
Tomás Gonzálezb401e112023-08-11 15:22:04 +0100748
Valerio Settifb2750e2023-10-17 10:11:45 +0200749 for task in tasks_list:
750 test_function = KNOWN_TASKS[task]['test_function']
751 test_args = KNOWN_TASKS[task]['args']
Valerio Setti781c2342023-10-17 12:47:35 +0200752 test_function(main_results, options.outcomes, test_args)
Valerio Settidfd7ca62023-10-09 16:30:11 +0200753
Valerio Settif6f64cf2023-10-17 12:28:26 +0200754 main_results.info("Overall results: {} warnings and {} errors",
755 main_results.warning_count, main_results.error_count)
Valerio Settif075e472023-10-17 11:03:16 +0200756
Valerio Setti8d178be2023-10-17 12:23:55 +0200757 sys.exit(0 if (main_results.error_count == 0) else 1)
Valerio Settiaaef0bc2023-10-10 09:42:13 +0200758
Gilles Peskine15c2cbf2020-06-25 18:36:28 +0200759 except Exception: # pylint: disable=broad-except
760 # Print the backtrace and exit explicitly with our chosen status.
761 traceback.print_exc()
762 sys.exit(120)
763
764if __name__ == '__main__':
765 main()