mirror of
https://github.com/cuberite/polarssl.git
synced 2025-09-29 16:32:32 -04:00
Merge pull request #7841 from valeriosetti/issue7748
driver-only ECC: EPCf.X509 testing
This commit is contained in:
commit
7f773b2138
@ -106,7 +106,7 @@ const mbedtls_x509_crt_profile mbedtls_x509_crt_profile_default =
|
|||||||
MBEDTLS_X509_ID_FLAG(MBEDTLS_MD_SHA384) |
|
MBEDTLS_X509_ID_FLAG(MBEDTLS_MD_SHA384) |
|
||||||
MBEDTLS_X509_ID_FLAG(MBEDTLS_MD_SHA512),
|
MBEDTLS_X509_ID_FLAG(MBEDTLS_MD_SHA512),
|
||||||
0xFFFFFFF, /* Any PK alg */
|
0xFFFFFFF, /* Any PK alg */
|
||||||
#if defined(MBEDTLS_ECP_LIGHT)
|
#if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
|
||||||
/* Curves at or above 128-bit security level. Note that this selection
|
/* Curves at or above 128-bit security level. Note that this selection
|
||||||
* should be aligned with ssl_preset_default_curves in ssl_tls.c. */
|
* should be aligned with ssl_preset_default_curves in ssl_tls.c. */
|
||||||
MBEDTLS_X509_ID_FLAG(MBEDTLS_ECP_DP_SECP256R1) |
|
MBEDTLS_X509_ID_FLAG(MBEDTLS_ECP_DP_SECP256R1) |
|
||||||
@ -116,9 +116,9 @@ const mbedtls_x509_crt_profile mbedtls_x509_crt_profile_default =
|
|||||||
MBEDTLS_X509_ID_FLAG(MBEDTLS_ECP_DP_BP384R1) |
|
MBEDTLS_X509_ID_FLAG(MBEDTLS_ECP_DP_BP384R1) |
|
||||||
MBEDTLS_X509_ID_FLAG(MBEDTLS_ECP_DP_BP512R1) |
|
MBEDTLS_X509_ID_FLAG(MBEDTLS_ECP_DP_BP512R1) |
|
||||||
0,
|
0,
|
||||||
#else /* MBEDTLS_ECP_LIGHT */
|
#else /* MBEDTLS_PK_HAVE_ECC_KEYS */
|
||||||
0,
|
0,
|
||||||
#endif /* MBEDTLS_ECP_LIGHT */
|
#endif /* MBEDTLS_PK_HAVE_ECC_KEYS */
|
||||||
2048,
|
2048,
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -157,13 +157,13 @@ const mbedtls_x509_crt_profile mbedtls_x509_crt_profile_suiteb =
|
|||||||
/* Only ECDSA */
|
/* Only ECDSA */
|
||||||
MBEDTLS_X509_ID_FLAG(MBEDTLS_PK_ECDSA) |
|
MBEDTLS_X509_ID_FLAG(MBEDTLS_PK_ECDSA) |
|
||||||
MBEDTLS_X509_ID_FLAG(MBEDTLS_PK_ECKEY),
|
MBEDTLS_X509_ID_FLAG(MBEDTLS_PK_ECKEY),
|
||||||
#if defined(MBEDTLS_ECP_LIGHT)
|
#if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
|
||||||
/* Only NIST P-256 and P-384 */
|
/* Only NIST P-256 and P-384 */
|
||||||
MBEDTLS_X509_ID_FLAG(MBEDTLS_ECP_DP_SECP256R1) |
|
MBEDTLS_X509_ID_FLAG(MBEDTLS_ECP_DP_SECP256R1) |
|
||||||
MBEDTLS_X509_ID_FLAG(MBEDTLS_ECP_DP_SECP384R1),
|
MBEDTLS_X509_ID_FLAG(MBEDTLS_ECP_DP_SECP384R1),
|
||||||
#else /* MBEDTLS_ECP_LIGHT */
|
#else /* MBEDTLS_PK_HAVE_ECC_KEYS */
|
||||||
0,
|
0,
|
||||||
#endif /* MBEDTLS_ECP_LIGHT */
|
#endif /* MBEDTLS_PK_HAVE_ECC_KEYS */
|
||||||
0,
|
0,
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -233,7 +233,7 @@ static int x509_profile_check_key(const mbedtls_x509_crt_profile *profile,
|
|||||||
}
|
}
|
||||||
#endif /* MBEDTLS_RSA_C */
|
#endif /* MBEDTLS_RSA_C */
|
||||||
|
|
||||||
#if defined(MBEDTLS_ECP_LIGHT)
|
#if defined(MBEDTLS_PK_HAVE_ECC_KEYS)
|
||||||
if (pk_alg == MBEDTLS_PK_ECDSA ||
|
if (pk_alg == MBEDTLS_PK_ECDSA ||
|
||||||
pk_alg == MBEDTLS_PK_ECKEY ||
|
pk_alg == MBEDTLS_PK_ECKEY ||
|
||||||
pk_alg == MBEDTLS_PK_ECKEY_DH) {
|
pk_alg == MBEDTLS_PK_ECKEY_DH) {
|
||||||
@ -249,7 +249,7 @@ static int x509_profile_check_key(const mbedtls_x509_crt_profile *profile,
|
|||||||
|
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
#endif /* MBEDTLS_ECP_LIGHT */
|
#endif /* MBEDTLS_PK_HAVE_ECC_KEYS */
|
||||||
|
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
@ -2418,9 +2418,17 @@ component_test_psa_crypto_config_reference_ecc_ecp_light_only () {
|
|||||||
# on the ECP module.
|
# on the ECP module.
|
||||||
config_psa_crypto_no_ecp_at_all () {
|
config_psa_crypto_no_ecp_at_all () {
|
||||||
DRIVER_ONLY="$1"
|
DRIVER_ONLY="$1"
|
||||||
# start with crypto_full config for maximum coverage (also enables USE_PSA),
|
# start with full config for maximum coverage (also enables USE_PSA)
|
||||||
# but excluding X509, TLS and key exchanges
|
helper_libtestdriver1_adjust_config "full"
|
||||||
helper_libtestdriver1_adjust_config "crypto_full"
|
|
||||||
|
# keep excluding TLS and key exchanges (this will be removed in #7749)
|
||||||
|
# Note: key exchanges are not explicitly disabled here because they are
|
||||||
|
# auto-disabled in build_info.h as long as the following symbols
|
||||||
|
# are not enabled.
|
||||||
|
scripts/config.py unset MBEDTLS_SSL_TLS_C
|
||||||
|
scripts/config.py unset MBEDTLS_SSL_PROTO_DTLS
|
||||||
|
scripts/config.py unset MBEDTLS_SSL_PROTO_TLS1_2
|
||||||
|
scripts/config.py unset MBEDTLS_SSL_PROTO_TLS1_3
|
||||||
|
|
||||||
# enable support for drivers and configuring PSA-only algorithms
|
# enable support for drivers and configuring PSA-only algorithms
|
||||||
scripts/config.py set MBEDTLS_PSA_CRYPTO_CONFIG
|
scripts/config.py set MBEDTLS_PSA_CRYPTO_CONFIG
|
||||||
@ -2450,7 +2458,7 @@ config_psa_crypto_no_ecp_at_all () {
|
|||||||
#
|
#
|
||||||
# Keep in sync with component_test_psa_crypto_config_reference_ecc_no_ecp_at_all()
|
# Keep in sync with component_test_psa_crypto_config_reference_ecc_no_ecp_at_all()
|
||||||
component_test_psa_crypto_config_accel_ecc_no_ecp_at_all () {
|
component_test_psa_crypto_config_accel_ecc_no_ecp_at_all () {
|
||||||
msg "build: crypto_full + accelerated EC algs + USE_PSA - ECP"
|
msg "build: full + accelerated EC algs + USE_PSA - TLS - KEY_EXCHANGE - ECP"
|
||||||
|
|
||||||
# Algorithms and key types to accelerate
|
# Algorithms and key types to accelerate
|
||||||
loc_accel_list="ALG_ECDSA ALG_DETERMINISTIC_ECDSA \
|
loc_accel_list="ALG_ECDSA ALG_DETERMINISTIC_ECDSA \
|
||||||
@ -2485,7 +2493,7 @@ component_test_psa_crypto_config_accel_ecc_no_ecp_at_all () {
|
|||||||
# Run the tests
|
# Run the tests
|
||||||
# -------------
|
# -------------
|
||||||
|
|
||||||
msg "test suites: crypto_full + accelerated EC algs + USE_PSA - ECP"
|
msg "test: full + accelerated EC algs + USE_PSA - TLS - KEY_EXCHANGE - ECP"
|
||||||
make test
|
make test
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -2493,13 +2501,13 @@ component_test_psa_crypto_config_accel_ecc_no_ecp_at_all () {
|
|||||||
# in conjunction with component_test_psa_crypto_config_accel_ecc_no_ecp_at_all().
|
# in conjunction with component_test_psa_crypto_config_accel_ecc_no_ecp_at_all().
|
||||||
# Keep in sync with its accelerated counterpart.
|
# Keep in sync with its accelerated counterpart.
|
||||||
component_test_psa_crypto_config_reference_ecc_no_ecp_at_all () {
|
component_test_psa_crypto_config_reference_ecc_no_ecp_at_all () {
|
||||||
msg "build: crypto_full + non accelerated EC algs + USE_PSA"
|
msg "build: full + non accelerated EC algs + USE_PSA - TLS - KEY_EXCHANGE"
|
||||||
|
|
||||||
config_psa_crypto_no_ecp_at_all 0
|
config_psa_crypto_no_ecp_at_all 0
|
||||||
|
|
||||||
make
|
make
|
||||||
|
|
||||||
msg "test suites: crypto_full + non accelerated EC algs + USE_PSA"
|
msg "test: crypto_full + non accelerated EC algs + USE_PSA - TLS - KEY_EXCHANGE"
|
||||||
make test
|
make test
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -996,7 +996,7 @@ depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_MD_CAN_SHA256
|
|||||||
x509_verify:"data_files/server5.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"globalhost":0:0:"":"verify_all"
|
x509_verify:"data_files/server5.crt":"data_files/test-ca2.crt":"data_files/crl-ec-sha256.pem":"globalhost":0:0:"":"verify_all"
|
||||||
|
|
||||||
X509 CRT verification #93 (Suite B invalid, EC cert, RSA CA)
|
X509 CRT verification #93 (Suite B invalid, EC cert, RSA CA)
|
||||||
depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_ECP_LIGHT:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_SHA1
|
depends_on:MBEDTLS_PEM_PARSE_C:MBEDTLS_RSA_C:MBEDTLS_PK_CAN_ECDSA_VERIFY:MBEDTLS_ECP_DP_SECP192R1_ENABLED:MBEDTLS_PKCS1_V15:MBEDTLS_MD_CAN_SHA1
|
||||||
x509_verify:"data_files/server3.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_MD|MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY|MBEDTLS_X509_BADCRL_BAD_MD|MBEDTLS_X509_BADCRL_BAD_PK:"suite_b":"NULL"
|
x509_verify:"data_files/server3.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:MBEDTLS_X509_BADCERT_BAD_MD|MBEDTLS_X509_BADCERT_BAD_PK|MBEDTLS_X509_BADCERT_BAD_KEY|MBEDTLS_X509_BADCRL_BAD_MD|MBEDTLS_X509_BADCRL_BAD_PK:"suite_b":"NULL"
|
||||||
|
|
||||||
X509 CRT verification #94 (Suite B invalid, RSA cert, EC CA)
|
X509 CRT verification #94 (Suite B invalid, RSA cert, EC CA)
|
||||||
|
Loading…
x
Reference in New Issue
Block a user