- 
                Notifications
    
You must be signed in to change notification settings  - Fork 1.4k
 
secure_storage: fix tests #20710
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
secure_storage: fix tests #20710
Conversation
| 
           The following west manifest projects have changed revision in this Pull Request: 
 ✅ All manifest checks OK Note: This message is automatically posted and updated by the Manifest GitHub Action.  | 
    
          CI InformationTo view the history of this post, clich the 'edited' button above Inputs:Sources:sdk-nrf: PR head: 14b68f51d52d41b518da1f7b178065c0a7069e25 more detailssdk-nrf: 
 mbedtls: 
 zephyr: 
 Github labels
 List of changed files detected by CI (52)Outputs:ToolchainVersion: 4ffa2202d5 Test Spec & Results: ✅ Success; ❌ Failure; 🟠 Queued; 🟡 Progress; ◻️ Skipped; 
 | 
    
| 
           You can find the documentation preview for this PR here.  | 
    
aece2e9    to
    85fc86d      
    Compare
  
    There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
works on-device. LGTM
85fc86d    to
    48e20b3      
    Compare
  
    48e20b3    to
    15afba8      
    Compare
  
    | 
           Since quarantine was modified, please make sure you are following the process described in Quarantine Process.  | 
    
15afba8    to
    03acad4      
    Compare
  
    | 
           Rebased and updated the Zephyr/Mbed TLS PRs.  | 
    
8deea05    to
    a0da5f9      
    Compare
  
    | 
           @nrfconnect/ncs-test-leads @nrfconnect/ncs-aegir please review (CI failure unrelated)  | 
    
          
 Indeed, find-my CI failure is from different reason (will be fixed soon)  | 
    
a0da5f9    to
    4545f9b      
    Compare
  
    4545f9b    to
    0a62db2      
    Compare
  
    There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This and dependent PRs LGTM (pending updated shas)
| 
           @nrfconnect/ncs-test-leads please review  | 
    
    
      
        1 similar comment
      
    
  
    | 
           @nrfconnect/ncs-test-leads please review  | 
    
Lower the minimum value allowed from 512 to 256 as the secure_storage tests use 256 and this is still quite a reasonable minimum value to have. Signed-off-by: Tomi Fontanilles <[email protected]>
0a62db2    to
    5d59c98      
    Compare
  
    
          
 | 
    
Pull in changes made in Zephyr to fix secure storage tests. Update the sdk-zephyr revision to the latest main to also pull in a fix to a Zephyr test that would make CI fail. Signed-off-by: Tomi Fontanilles <[email protected]>
Pull in the PR that was originally created to fix the block_cipher configuration in Mbed TLS. The fix ended up being done in sdk-nrf so the Mbed TLS PR turned into a cleanup of some noups we have in there, without intended functional change. Signed-off-by: Tomi Fontanilles <[email protected]>
Remove the quarantine as thoses tests are now fixed. Signed-off-by: Tomi Fontanilles <[email protected]>
psa_aead_encrypt() would fail, returning PSA_ERROR_BUFFER_TOO_SMALL, because ciphertext_length wouldn't be assigned and have a random value. Signed-off-by: Tomi Fontanilles <[email protected]>
Define BUILDING_MBEDTLS_CRYPTO when building source files of the Oberon PSA Crypto core. This is done to be aligned with Mbed TLS in Zephyr. BUILDING_MBEDTLS_CRYPTO is used by the secure storage subsystem to identify that the ITS calls are coming from PSA Crypto. So it needs to be defined in all the PSA Crypto implementations. Signed-off-by: Tomi Fontanilles <[email protected]>
With the latest changes the remaining test scenario that used to not be filtered out is now overflowing. This is not something we want to support anyway so quarantine all secure_storage tests on that board target. Also, replace the other quarantined secure_storage scenarios by the same regexp to make sure to encompass them all. Signed-off-by: Tomi Fontanilles <[email protected]>
Auto-enable PSA_WANT_ALG_ECB_NO_PADDING when MBEDTLS_BUILTIN and CCM or GCM is enabled and !MBEDTLS_FORCE_LEGACY_CIPHER. ECB is needed by the block_cipher module in Mbed TLS when MBEDTLS_BLOCK_CIPHER_SOME_PSA. Because of a noup we have to enable that in our Mbed TLS fork, ECB ends up needing to be enabled when using Mbed TLS' PSA API to encrypt/decrypt data with CCM/GCM because the code goes to block_cipher. Rather than having to enable that dependency everywhere it's needed, auto-enable it in those conditions. Also, move the PSA_WANT_ALG Kconfig options that were separate from the others. Signed-off-by: Tomi Fontanilles <[email protected]>
5d59c98    to
    14b68f5      
    Compare
  
    


No description provided.