From 6ca4d621b527987cc27d336cc1b696ffa2579ede Mon Sep 17 00:00:00 2001 From: "harshal.patil" Date: Tue, 17 Jun 2025 11:16:44 +0530 Subject: [PATCH] test(crypto): Change partition address and update the test cases - Also format key manager test cases generation script --- .../key_manager/gen_key_manager_test_cases.py | 99 ++++++++++++++----- .../main/key_manager/key_manager_test_cases.h | 52 +++++----- .../main/key_manager/test_key_manager.c | 3 +- 3 files changed, 104 insertions(+), 50 deletions(-) diff --git a/components/hal/test_apps/crypto/main/key_manager/gen_key_manager_test_cases.py b/components/hal/test_apps/crypto/main/key_manager/gen_key_manager_test_cases.py index 053c2e41a2..12161bd699 100644 --- a/components/hal/test_apps/crypto/main/key_manager/gen_key_manager_test_cases.py +++ b/components/hal/test_apps/crypto/main/key_manager/gen_key_manager_test_cases.py @@ -1,4 +1,4 @@ -# SPDX-FileCopyrightText: 2024 Espressif Systems (Shanghai) CO LTD +# SPDX-FileCopyrightText: 2024-2025 Espressif Systems (Shanghai) CO LTD # SPDX-License-Identifier: Unlicense OR CC0-1.0 import os import struct @@ -7,13 +7,14 @@ from typing import Any from cryptography.hazmat.backends import default_backend from cryptography.hazmat.primitives import serialization from cryptography.hazmat.primitives.asymmetric import ec -from cryptography.hazmat.primitives.ciphers import algorithms from cryptography.hazmat.primitives.ciphers import Cipher +from cryptography.hazmat.primitives.ciphers import algorithms from cryptography.hazmat.primitives.ciphers import modes from ecdsa.curves import NIST256p # Constants TEST_COUNT = 5 +STORAGE_PARTITION_OFFSET = 0x160000 # Helper functions @@ -45,7 +46,9 @@ def calculate_aes_cipher(data: bytes, key: bytes) -> Any: return encryptor.update(data) + encryptor.finalize() -def _flash_encryption_operation_aes_xts(input_data: bytes, flash_address: int, key: bytes, do_decrypt: bool = False) -> bytes: +def _flash_encryption_operation_aes_xts( + input_data: bytes, flash_address: int, key: bytes, do_decrypt: bool = False +) -> bytes: backend = default_backend() indata = input_data @@ -54,9 +57,9 @@ def _flash_encryption_operation_aes_xts(input_data: bytes, flash_address: int, k indata = (b'\x00' * pad_left) + indata pad_right = (0x80 - (len(indata) % 0x80)) % 0x80 - indata += (b'\x00' * pad_right) + indata += b'\x00' * pad_right - inblocks = [indata[i:i + 0x80] for i in range(0, len(indata), 0x80)] + inblocks = [indata[i : i + 0x80] for i in range(0, len(indata), 0x80)] output = b'' for inblock in inblocks: @@ -68,17 +71,17 @@ def _flash_encryption_operation_aes_xts(input_data: bytes, flash_address: int, k outblock = encryptor.update(inblock[::-1]) output += outblock[::-1] - return output[pad_left:len(output) - pad_right] + return output[pad_left : len(output) - pad_right] -def generate_xts_test_data(key: bytes, base_flash_address: int = 0x120000) -> list: +def generate_xts_test_data(key: bytes, base_flash_address: int = STORAGE_PARTITION_OFFSET) -> list: xts_test_data = [] plaintext_data = bytes(range(1, 129)) data_size = 16 flash_address = base_flash_address for i in range(TEST_COUNT): data_size = (data_size * 2) % 256 - if (data_size < 16): + if data_size < 16: data_size = 16 input_data = plaintext_data[:data_size] flash_address = base_flash_address + (i * 0x100) @@ -96,7 +99,7 @@ def generate_ecdsa_256_key_and_pub_key(filename: str) -> tuple: pem = private_key.private_bytes( encoding=serialization.Encoding.PEM, format=serialization.PrivateFormat.TraditionalOpenSSL, - encryption_algorithm=serialization.NoEncryption() + encryption_algorithm=serialization.NoEncryption(), ) with open('ecdsa_256_key.pem', 'wb') as pem_file: @@ -134,10 +137,19 @@ def generate_k1_G(key_file_path: str) -> tuple: return k1_G, k1_G -def write_to_c_header(init_key: bytes, k1: bytes, k2_info: bytes, k1_encrypted_32: list, - test_data_xts_aes_128: list, k1_encrypted_64: list, - xts_test_data_xts_aes_256: list, pubx: bytes, - puby: bytes, k1_G_0: bytes, k1_G_1: bytes) -> None: +def write_to_c_header( + init_key: bytes, + k1: bytes, + k2_info: bytes, + k1_encrypted_32: list, + test_data_xts_aes_128: list, + k1_encrypted_64: list, + xts_test_data_xts_aes_256: list, + pubx: bytes, + puby: bytes, + k1_G_0: bytes, + k1_G_1: bytes, +) -> None: with open('key_manager_test_cases.h', 'w', encoding='utf-8') as file: header_content = """#include @@ -176,10 +188,19 @@ test_data_aes_mode_t test_data_xts_aes_128 = { .k1_encrypted = { { %s }, { } }, .plaintext_data = { %s }, .xts_test_data = { -""" % (key_to_c_format(init_key), key_to_c_format(k2_info), key_to_c_format(k1_encrypted_32[0]), key_to_c_format(bytes(range(1, 129)))) +""" % ( + key_to_c_format(init_key), + key_to_c_format(k2_info), + key_to_c_format(k1_encrypted_32[0]), + key_to_c_format(bytes(range(1, 129))), + ) for data_size, flash_address, ciphertext in test_data_xts_aes_128: - header_content += f'\t\t{{.data_size = {data_size}, .data_offset = 0x{flash_address:x}, .ciphertext = {{{key_to_c_format(ciphertext)}}}}},\n' + header_content += ( + f'\t\t{{.data_size = {data_size}, ' + f'.data_offset = 0x{flash_address:x}, ' + f'.ciphertext = {{{key_to_c_format(ciphertext)}}}}},\n' + ) header_content += '\t}\n};\n\n' # For 64-byte k1 key @@ -187,14 +208,22 @@ test_data_aes_mode_t test_data_xts_aes_128 = { header_content += 'test_data_aes_mode_t test_data_xts_aes_256 = {\n' header_content += f'\t.init_key = {{{key_to_c_format(init_key)}}},\n' header_content += f'\t.k2_info = {{{key_to_c_format(k2_info)}}},\n' - header_content += f'\t.k1_encrypted = {{{{{key_to_c_format(k1_encrypted_64[0])}}}, {{{key_to_c_format(k1_encrypted_64[1])}}}}},\n' + header_content += ( + f'\t.k1_encrypted = {{{{{key_to_c_format(k1_encrypted_64[0])}}}, ' + f'{{{key_to_c_format(k1_encrypted_64[1])}}}}},\n' + ) header_content += f'\t.plaintext_data = {{{key_to_c_format(bytes(range(1, 129)))}}},\n' header_content += ' .xts_test_data = {\n' for data_size, flash_address, ciphertext in xts_test_data_xts_aes_256: - header_content += f' {{.data_size = {data_size}, .data_offset = 0x{flash_address:x}, .ciphertext = {{{key_to_c_format(ciphertext)}}}}},\n' - header_content += ' }\n};\n' - header_content += ''' + header_content += ( + f'\t\t{{.data_size = {data_size}, ' + f'.data_offset = 0x{flash_address:x}, ' + f'.ciphertext = {{{key_to_c_format(ciphertext)}}}}},\n' + ) + header_content += '\t}\n};\n\n' + + header_content += """ test_data_aes_mode_t test_data_ecdsa = { .init_key = { %s }, .k2_info = { %s }, @@ -204,8 +233,14 @@ test_data_aes_mode_t test_data_ecdsa = { .puby = { %s } } };\n -''' % (key_to_c_format(init_key), key_to_c_format(k2_info), key_to_c_format(k1_encrypted_32[0]), key_to_c_format(pubx),key_to_c_format(puby)) - header_content += ''' +""" % ( + key_to_c_format(init_key), + key_to_c_format(k2_info), + key_to_c_format(k1_encrypted_32[0]), + key_to_c_format(pubx), + key_to_c_format(puby), + ) + header_content += """ test_data_ecdh0_mode_t test_data_ecdh0 = { .plaintext_data = { %s }, .k1 = { @@ -218,7 +253,13 @@ test_data_ecdh0_mode_t test_data_ecdh0 = { } };\n -''' % (key_to_c_format(bytes(range(1, 129))), key_to_c_format(k1), key_to_c_format(k1), key_to_c_format(k1_G_0), key_to_c_format(k1_G_1)) +""" % ( + key_to_c_format(bytes(range(1, 129))), + key_to_c_format(k1), + key_to_c_format(k1), + key_to_c_format(k1_G_0), + key_to_c_format(k1_G_1), + ) file.write(header_content) @@ -254,4 +295,16 @@ pubx, puby = generate_ecdsa_256_key_and_pub_key('k1.bin') k1_G_0, k1_G_1 = generate_k1_G('k1.bin') -write_to_c_header(init_key, k1_32, k2_info, k1_encrypted_32, test_data_xts_aes_128, k1_encrypted_64, xts_test_data_xts_aes_256, pubx, puby, k1_G_0, k1_G_1) +write_to_c_header( + init_key, + k1_32, + k2_info, + k1_encrypted_32, + test_data_xts_aes_128, + k1_encrypted_64, + xts_test_data_xts_aes_256, + pubx, + puby, + k1_G_0, + k1_G_1, +) diff --git a/components/hal/test_apps/crypto/main/key_manager/key_manager_test_cases.h b/components/hal/test_apps/crypto/main/key_manager/key_manager_test_cases.h index 6a7a2abf7a..2c28441c4f 100644 --- a/components/hal/test_apps/crypto/main/key_manager/key_manager_test_cases.h +++ b/components/hal/test_apps/crypto/main/key_manager/key_manager_test_cases.h @@ -1,5 +1,5 @@ /* - * SPDX-FileCopyrightText: 2024 Espressif Systems (Shanghai) CO LTD + * SPDX-FileCopyrightText: 2025 Espressif Systems (Shanghai) CO LTD * * SPDX-License-Identifier: Unlicense OR CC0-1.0 */ @@ -35,41 +35,41 @@ typedef struct test_data_ecdh0 { // For 32-byte k1 key test_data_aes_mode_t test_data_xts_aes_128 = { - .init_key = { 0x4d, 0x21, 0x64, 0x21, 0x8f, 0xa2, 0xe3, 0xa0, 0xab, 0x74, 0xb5, 0xab, 0x17, 0x9a, 0x5d, 0x08, 0x58, 0xf4, 0x22, 0x03, 0xbd, 0x52, 0xe7, 0x88, 0x3c, 0x22, 0x0f, 0x95, 0x89, 0x70, 0xe1, 0x93 }, - .k2_info = { 0xd8, 0xcd, 0x04, 0x45, 0xb4, 0x45, 0xc4, 0x15, 0xf6, 0x40, 0x1c, 0x7d, 0x90, 0x1b, 0x99, 0xa4, 0x79, 0x6b, 0xfb, 0x5b, 0x2a, 0x40, 0x60, 0xe1, 0xc1, 0xe1, 0x48, 0xcd, 0x46, 0x6b, 0x9b, 0x48, 0xda, 0x7a, 0x70, 0x0a, 0x78, 0x0b, 0x9d, 0xf9, 0x0e, 0xed, 0x91, 0xfc, 0xa5, 0xc2, 0x96, 0x05, 0x91, 0x76, 0xdb, 0x68, 0x84, 0x5d, 0x5e, 0x5b, 0xa6, 0xe9, 0x6b, 0x3b, 0x12, 0x50, 0x05, 0xc3 }, - .k1_encrypted = { { 0xeb, 0x83, 0x24, 0x7d, 0xf8, 0x40, 0xc9, 0x88, 0x5f, 0x5e, 0x58, 0x57, 0x25, 0xa9, 0x23, 0x4a, 0xa4, 0xc4, 0x12, 0x17, 0xf3, 0x9e, 0x1f, 0xa0, 0xa0, 0xfa, 0xd5, 0xbf, 0xb6, 0x6c, 0xb5, 0x48 }, { } }, + .init_key = { 0x3d, 0x61, 0x0f, 0xe7, 0x3b, 0x11, 0xd1, 0xac, 0x90, 0xda, 0xc8, 0xd7, 0x36, 0xa2, 0x3e, 0x5f, 0x50, 0x3d, 0xa3, 0xc4, 0x26, 0x0e, 0x9f, 0xf5, 0xf9, 0x56, 0x5a, 0x7c, 0xb2, 0x2a, 0xed, 0x00 }, + .k2_info = { 0x53, 0x1f, 0x3c, 0x3d, 0xee, 0xb9, 0xdc, 0x22, 0xb9, 0x89, 0x94, 0x60, 0x30, 0x25, 0x02, 0xf0, 0x42, 0x32, 0xfd, 0x80, 0xfe, 0xe9, 0xfc, 0x0c, 0xc8, 0x6d, 0xa6, 0xe0, 0x99, 0x3b, 0x4f, 0xdd, 0x9c, 0x9a, 0x01, 0x99, 0xe3, 0x69, 0x23, 0xb9, 0xf9, 0xe4, 0x19, 0x66, 0x0b, 0xed, 0xf3, 0x71, 0x68, 0x0a, 0x15, 0x19, 0x7c, 0x17, 0x96, 0x9d, 0xbf, 0x0b, 0xcb, 0x75, 0x2d, 0x05, 0xc1, 0xc3 }, + .k1_encrypted = { { 0x3f, 0xe8, 0xd7, 0x74, 0x8d, 0xe4, 0xc2, 0x1c, 0x8f, 0x52, 0x5b, 0x3d, 0xa5, 0x9d, 0x43, 0x09, 0xef, 0x26, 0x76, 0x24, 0xfc, 0x3c, 0xc5, 0x3a, 0x84, 0xa2, 0x4c, 0x71, 0xf8, 0xd6, 0x8d, 0xb5 }, { } }, .plaintext_data = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27, 0x28, 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f, 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 0x38, 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f, 0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f, 0x50, 0x51, 0x52, 0x53, 0x54, 0x55, 0x56, 0x57, 0x58, 0x59, 0x5a, 0x5b, 0x5c, 0x5d, 0x5e, 0x5f, 0x60, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, 0x68, 0x69, 0x6a, 0x6b, 0x6c, 0x6d, 0x6e, 0x6f, 0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, 0x78, 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, 0x80 }, .xts_test_data = { - {.data_size = 32, .data_offset = 0x120000, .ciphertext = {0xe7, 0xf3, 0xb4, 0x51, 0xc6, 0x62, 0x8e, 0x25, 0x10, 0x12, 0xc2, 0x09, 0x82, 0x7b, 0x3e, 0x9a, 0x78, 0xe2, 0x00, 0x9a, 0x96, 0x02, 0x50, 0xeb, 0xff, 0xf1, 0xf8, 0x0d, 0xf6, 0xa6, 0xb8, 0xa1}}, - {.data_size = 64, .data_offset = 0x120100, .ciphertext = {0x3b, 0x54, 0xa8, 0x58, 0xe2, 0x63, 0x7a, 0xb0, 0x7c, 0xc7, 0x37, 0xd8, 0x1e, 0x89, 0x1e, 0x25, 0x39, 0x3d, 0x0d, 0x18, 0x14, 0xb3, 0x2e, 0x18, 0x15, 0xf6, 0xbd, 0xf8, 0xb6, 0x5f, 0x6b, 0x89, 0x1a, 0x0a, 0x53, 0x36, 0xf1, 0x5b, 0x1b, 0x18, 0xd3, 0xf4, 0x7b, 0xd5, 0xcd, 0x4f, 0x48, 0x7b, 0x11, 0xcf, 0xad, 0x6b, 0x79, 0x36, 0x1b, 0xda, 0x5a, 0xd3, 0x18, 0x44, 0xa0, 0xf3, 0xf2, 0xad}}, - {.data_size = 128, .data_offset = 0x120200, .ciphertext = {0x6b, 0x42, 0x10, 0x9f, 0x67, 0x72, 0x31, 0xc7, 0x8f, 0x63, 0xde, 0xc1, 0xf9, 0x84, 0x37, 0x74, 0xe5, 0x5a, 0xe4, 0x31, 0x1a, 0x2e, 0x45, 0x6b, 0xb5, 0xd4, 0xd0, 0x41, 0xe1, 0x2c, 0x0a, 0x43, 0xd9, 0x4c, 0xd5, 0x1c, 0x34, 0xc9, 0x29, 0x39, 0xc8, 0x09, 0xc3, 0xcd, 0x99, 0xaf, 0x3a, 0xe6, 0x4d, 0xae, 0xce, 0xfd, 0x0a, 0xd4, 0x8f, 0x81, 0x4c, 0x25, 0xc5, 0x5e, 0x3d, 0x82, 0x3d, 0x58, 0x55, 0xe5, 0xa4, 0xe4, 0x13, 0x2b, 0xa0, 0x04, 0x3a, 0x7a, 0x65, 0xfa, 0x7a, 0xfb, 0x28, 0x36, 0x1e, 0xfa, 0x71, 0x50, 0x80, 0xa5, 0x0c, 0xa6, 0x4e, 0x45, 0xf9, 0xd9, 0x05, 0xc1, 0x63, 0xa1, 0xf2, 0x7f, 0x54, 0x62, 0xf1, 0x5a, 0xe2, 0x5a, 0x5c, 0x06, 0x16, 0x71, 0xa9, 0x5f, 0xab, 0x7d, 0xc9, 0x85, 0x68, 0xc5, 0x3a, 0xfe, 0xc1, 0xe0, 0xc9, 0xc3, 0xd4, 0x33, 0x10, 0x89, 0x5e, 0x43}}, - {.data_size = 16, .data_offset = 0x120300, .ciphertext = {0xbe, 0xd7, 0x01, 0x8a, 0x60, 0xab, 0x0c, 0xb7, 0xb6, 0x14, 0x9e, 0x64, 0xbc, 0xca, 0xda, 0xaa}}, - {.data_size = 32, .data_offset = 0x120400, .ciphertext = {0xda, 0x84, 0x17, 0x3d, 0x4c, 0x85, 0x07, 0xe2, 0x56, 0x98, 0x69, 0x33, 0x1b, 0x9a, 0x01, 0x9e, 0x6c, 0x81, 0xd8, 0x90, 0x9e, 0x59, 0x92, 0x12, 0x6d, 0xba, 0x58, 0x09, 0x90, 0xe6, 0x50, 0x33}}, + {.data_size = 32, .data_offset = 0x160000, .ciphertext = {0x7b, 0xe2, 0xcb, 0x71, 0x0f, 0x86, 0x48, 0xef, 0x79, 0x69, 0x5f, 0x68, 0xa4, 0xf6, 0xec, 0x56, 0xb5, 0xc1, 0x09, 0xaf, 0x3e, 0x33, 0x05, 0x03, 0x16, 0x1b, 0xf2, 0x9f, 0xc2, 0x8d, 0x0c, 0xec}}, + {.data_size = 64, .data_offset = 0x160100, .ciphertext = {0x0d, 0x7d, 0x25, 0xb8, 0x85, 0x55, 0x56, 0xb4, 0xa8, 0x33, 0xf6, 0x9f, 0x0b, 0x00, 0xe7, 0x6d, 0x87, 0x06, 0xfe, 0x48, 0xdb, 0x61, 0x60, 0x59, 0x88, 0x03, 0xc0, 0x0d, 0xe4, 0xa7, 0xdc, 0xcd, 0x37, 0x3e, 0x17, 0x30, 0x04, 0xde, 0x79, 0x74, 0x7a, 0x30, 0x61, 0xf9, 0x64, 0x8b, 0x5d, 0x50, 0x84, 0xfe, 0x09, 0x5b, 0xb8, 0x9e, 0x65, 0xf9, 0x4d, 0xbc, 0x63, 0x3a, 0x4f, 0x97, 0x37, 0x8a}}, + {.data_size = 128, .data_offset = 0x160200, .ciphertext = {0x0d, 0x16, 0x41, 0x83, 0xdf, 0x75, 0x45, 0x2f, 0x4e, 0x34, 0x9f, 0x8a, 0x81, 0x93, 0x98, 0x88, 0xd4, 0xd5, 0x05, 0xec, 0x6c, 0x5f, 0xb0, 0xd7, 0xea, 0xdc, 0x05, 0xf2, 0xf3, 0x27, 0xe7, 0x5f, 0x6d, 0xec, 0x67, 0x17, 0x5c, 0x79, 0x4e, 0xc4, 0x4f, 0x9d, 0xa8, 0x4e, 0x16, 0x06, 0xc6, 0xf5, 0x4d, 0xae, 0xb9, 0xfc, 0x9a, 0x9c, 0x16, 0x0a, 0xf2, 0x49, 0x38, 0xeb, 0x3a, 0x6a, 0x72, 0x53, 0xb6, 0x32, 0x3b, 0xef, 0xd2, 0x18, 0x82, 0x17, 0x67, 0x72, 0xa2, 0xa1, 0xd2, 0x53, 0xf8, 0x84, 0x24, 0xda, 0x03, 0xf8, 0x34, 0xd6, 0x19, 0x3e, 0x89, 0xe4, 0x4c, 0x1a, 0x32, 0xfe, 0x99, 0x3c, 0x39, 0xf1, 0x00, 0x87, 0x26, 0x9c, 0xee, 0x36, 0xc1, 0x1b, 0x2e, 0x0e, 0x5e, 0xe7, 0xbe, 0x25, 0xa6, 0x39, 0xda, 0x56, 0xa8, 0x4a, 0x75, 0x88, 0x62, 0xf9, 0x9d, 0x06, 0x8f, 0x15, 0xfb, 0x37}}, + {.data_size = 16, .data_offset = 0x160300, .ciphertext = {0xa9, 0xad, 0x71, 0x0f, 0x78, 0xdc, 0x0a, 0x54, 0xc0, 0xaa, 0xba, 0x0b, 0xc7, 0x27, 0x92, 0xbd}}, + {.data_size = 32, .data_offset = 0x160400, .ciphertext = {0xc9, 0xf0, 0xf9, 0xf1, 0x66, 0x20, 0x13, 0xb3, 0xbf, 0xcc, 0x98, 0x85, 0x30, 0x43, 0x29, 0xd6, 0xa5, 0x16, 0x92, 0xa6, 0xae, 0x2f, 0xd8, 0x55, 0x83, 0x4c, 0xe6, 0xf3, 0x1c, 0xd4, 0xc1, 0x71}}, } }; // For 64-byte k1 key test_data_aes_mode_t test_data_xts_aes_256 = { - .init_key = {0x4d, 0x21, 0x64, 0x21, 0x8f, 0xa2, 0xe3, 0xa0, 0xab, 0x74, 0xb5, 0xab, 0x17, 0x9a, 0x5d, 0x08, 0x58, 0xf4, 0x22, 0x03, 0xbd, 0x52, 0xe7, 0x88, 0x3c, 0x22, 0x0f, 0x95, 0x89, 0x70, 0xe1, 0x93}, - .k2_info = {0xd8, 0xcd, 0x04, 0x45, 0xb4, 0x45, 0xc4, 0x15, 0xf6, 0x40, 0x1c, 0x7d, 0x90, 0x1b, 0x99, 0xa4, 0x79, 0x6b, 0xfb, 0x5b, 0x2a, 0x40, 0x60, 0xe1, 0xc1, 0xe1, 0x48, 0xcd, 0x46, 0x6b, 0x9b, 0x48, 0xda, 0x7a, 0x70, 0x0a, 0x78, 0x0b, 0x9d, 0xf9, 0x0e, 0xed, 0x91, 0xfc, 0xa5, 0xc2, 0x96, 0x05, 0x91, 0x76, 0xdb, 0x68, 0x84, 0x5d, 0x5e, 0x5b, 0xa6, 0xe9, 0x6b, 0x3b, 0x12, 0x50, 0x05, 0xc3}, - .k1_encrypted = {{0xeb, 0x83, 0x24, 0x7d, 0xf8, 0x40, 0xc9, 0x88, 0x5f, 0x5e, 0x58, 0x57, 0x25, 0xa9, 0x23, 0x4a, 0xa4, 0xc4, 0x12, 0x17, 0xf3, 0x9e, 0x1f, 0xa0, 0xa0, 0xfa, 0xd5, 0xbf, 0xb6, 0x6c, 0xb5, 0x48}, {0x65, 0x9e, 0x12, 0x7f, 0xc0, 0x4a, 0xb6, 0x04, 0xa1, 0xd0, 0x38, 0x04, 0x6c, 0x8e, 0x1f, 0xc7, 0x03, 0x24, 0x3e, 0x75, 0x3c, 0x9d, 0x7a, 0xc2, 0xef, 0xd6, 0xf2, 0x60, 0x46, 0xfc, 0x07, 0x3f}}, + .init_key = {0x3d, 0x61, 0x0f, 0xe7, 0x3b, 0x11, 0xd1, 0xac, 0x90, 0xda, 0xc8, 0xd7, 0x36, 0xa2, 0x3e, 0x5f, 0x50, 0x3d, 0xa3, 0xc4, 0x26, 0x0e, 0x9f, 0xf5, 0xf9, 0x56, 0x5a, 0x7c, 0xb2, 0x2a, 0xed, 0x00}, + .k2_info = {0x53, 0x1f, 0x3c, 0x3d, 0xee, 0xb9, 0xdc, 0x22, 0xb9, 0x89, 0x94, 0x60, 0x30, 0x25, 0x02, 0xf0, 0x42, 0x32, 0xfd, 0x80, 0xfe, 0xe9, 0xfc, 0x0c, 0xc8, 0x6d, 0xa6, 0xe0, 0x99, 0x3b, 0x4f, 0xdd, 0x9c, 0x9a, 0x01, 0x99, 0xe3, 0x69, 0x23, 0xb9, 0xf9, 0xe4, 0x19, 0x66, 0x0b, 0xed, 0xf3, 0x71, 0x68, 0x0a, 0x15, 0x19, 0x7c, 0x17, 0x96, 0x9d, 0xbf, 0x0b, 0xcb, 0x75, 0x2d, 0x05, 0xc1, 0xc3}, + .k1_encrypted = {{0x79, 0x5c, 0x35, 0x1d, 0x4f, 0x04, 0x90, 0x88, 0x9a, 0x99, 0xc3, 0x6c, 0x08, 0x21, 0x96, 0x42, 0xd6, 0x8a, 0xd6, 0x96, 0x0f, 0x3b, 0x34, 0xd1, 0x5f, 0x0a, 0xb8, 0xba, 0xf6, 0x1a, 0xb8, 0x5b}, {0x50, 0x9f, 0x98, 0xf3, 0x69, 0x5b, 0x86, 0xd6, 0x25, 0x00, 0x44, 0x9f, 0x14, 0xba, 0xb8, 0xc5, 0x38, 0x79, 0xea, 0x65, 0xcd, 0x1f, 0x5f, 0x40, 0xdf, 0xa1, 0x0b, 0x4c, 0xe6, 0x8f, 0x7e, 0x8c}}, .plaintext_data = {0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27, 0x28, 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f, 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 0x38, 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f, 0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f, 0x50, 0x51, 0x52, 0x53, 0x54, 0x55, 0x56, 0x57, 0x58, 0x59, 0x5a, 0x5b, 0x5c, 0x5d, 0x5e, 0x5f, 0x60, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, 0x68, 0x69, 0x6a, 0x6b, 0x6c, 0x6d, 0x6e, 0x6f, 0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, 0x78, 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, 0x80}, .xts_test_data = { - {.data_size = 32, .data_offset = 0x120000, .ciphertext = {0x9b, 0xd8, 0x2b, 0xc6, 0xae, 0xcc, 0x9d, 0x0c, 0x38, 0x30, 0x85, 0x6a, 0x2b, 0x22, 0x2e, 0x34, 0x9f, 0xa2, 0xcd, 0xe8, 0xec, 0xe3, 0xc4, 0x21, 0xfe, 0xbb, 0x4a, 0x55, 0xf2, 0x4a, 0xe2, 0x14}}, - {.data_size = 64, .data_offset = 0x120100, .ciphertext = {0x1e, 0x36, 0x3f, 0xf6, 0xd6, 0x52, 0x34, 0xce, 0xc3, 0x58, 0x15, 0xa1, 0x15, 0x6f, 0x3d, 0x66, 0xa7, 0x90, 0x14, 0x71, 0xbb, 0x6d, 0x7e, 0x93, 0xf2, 0x4d, 0x5d, 0x74, 0xb2, 0xd7, 0x77, 0x32, 0x2e, 0x31, 0x16, 0x28, 0xd2, 0x10, 0x65, 0x81, 0x49, 0xc0, 0x56, 0xf0, 0x6d, 0x71, 0x5b, 0xc2, 0xf2, 0x01, 0x04, 0xbf, 0x97, 0x77, 0xe6, 0x57, 0xe5, 0xb5, 0xad, 0x73, 0xc0, 0x76, 0x91, 0xb6}}, - {.data_size = 128, .data_offset = 0x120200, .ciphertext = {0xcf, 0x7d, 0xdd, 0x69, 0x69, 0xf4, 0x3b, 0xcd, 0x65, 0x5d, 0xcf, 0xfc, 0xff, 0xd3, 0x45, 0x1c, 0x51, 0xab, 0x2e, 0x26, 0x5c, 0xdc, 0x5b, 0x5a, 0x6e, 0xbb, 0x18, 0x36, 0x55, 0xbe, 0xe7, 0x30, 0x7a, 0x07, 0x48, 0xd8, 0x1a, 0x34, 0xdc, 0xa6, 0x1e, 0xd6, 0x67, 0xa8, 0x90, 0xc3, 0xac, 0x26, 0x7a, 0x52, 0x67, 0x82, 0x71, 0xc9, 0x80, 0x8d, 0xed, 0x20, 0x83, 0x34, 0x10, 0x8e, 0xe5, 0x84, 0x81, 0xa5, 0xe2, 0x42, 0xf0, 0x53, 0xef, 0x93, 0x00, 0xfe, 0xbd, 0x74, 0x14, 0xac, 0x92, 0x37, 0x00, 0x45, 0xd5, 0x71, 0x29, 0xaf, 0x8b, 0x83, 0xe2, 0x20, 0x2e, 0xd0, 0xf6, 0xaa, 0x45, 0x9a, 0x6f, 0x59, 0xb9, 0x8d, 0xef, 0xcd, 0xb6, 0xf6, 0x25, 0x99, 0xd2, 0x32, 0x2e, 0x90, 0x8a, 0x3a, 0x5d, 0xd8, 0x3f, 0xbf, 0x84, 0x80, 0x89, 0xaa, 0x9c, 0xa8, 0x57, 0xc9, 0x1c, 0xc4, 0xaa, 0x64}}, - {.data_size = 16, .data_offset = 0x120300, .ciphertext = {0x1b, 0x7a, 0xf1, 0x35, 0x33, 0x22, 0x64, 0x74, 0x06, 0x6a, 0xc1, 0x0c, 0x39, 0xee, 0x1f, 0x9f}}, - {.data_size = 32, .data_offset = 0x120400, .ciphertext = {0x94, 0xd9, 0x01, 0x0f, 0xec, 0xcc, 0xb5, 0x22, 0x50, 0x8b, 0x8a, 0x3d, 0x01, 0x18, 0x29, 0xda, 0x53, 0x9b, 0xcf, 0x64, 0xac, 0x4f, 0x7b, 0x97, 0xf3, 0xff, 0xfd, 0x33, 0x96, 0x8a, 0xde, 0x27}}, + {.data_size = 32, .data_offset = 0x160000, .ciphertext = {0x78, 0x21, 0xf8, 0x05, 0x4c, 0x9b, 0x48, 0x5f, 0x5d, 0x2e, 0x03, 0x5a, 0xdd, 0x39, 0xa7, 0x99, 0x4c, 0x70, 0xb4, 0x37, 0x87, 0x03, 0xa2, 0xd1, 0x4b, 0x48, 0x19, 0x39, 0xc4, 0x54, 0xec, 0x30}}, + {.data_size = 64, .data_offset = 0x160100, .ciphertext = {0xfa, 0x69, 0x67, 0x90, 0x93, 0x79, 0x24, 0xc3, 0x0c, 0xd9, 0xe6, 0x97, 0x85, 0xc5, 0xc4, 0x0a, 0xa8, 0x50, 0x2b, 0xac, 0x0b, 0xa6, 0x7e, 0x4c, 0x10, 0xff, 0xde, 0x3c, 0xd3, 0x24, 0xbf, 0x8b, 0xe3, 0x2f, 0x92, 0x89, 0x9a, 0xcf, 0x33, 0xb9, 0x7f, 0x69, 0x39, 0x2c, 0x29, 0xcf, 0x7f, 0xfd, 0x0f, 0x8d, 0xff, 0x74, 0x90, 0x1c, 0xec, 0xeb, 0xec, 0xd9, 0x4b, 0xd7, 0xba, 0x1f, 0x23, 0x14}}, + {.data_size = 128, .data_offset = 0x160200, .ciphertext = {0xcc, 0x07, 0xb5, 0x64, 0xfd, 0xf1, 0xe8, 0x28, 0x52, 0x3c, 0x4b, 0x69, 0xe9, 0x59, 0x56, 0x02, 0x3a, 0xc1, 0x52, 0x34, 0xd2, 0x77, 0x14, 0x86, 0xa8, 0x1a, 0x4b, 0x3a, 0x3c, 0xd6, 0xd6, 0xf3, 0x4f, 0x00, 0x69, 0x81, 0x92, 0x38, 0x81, 0x20, 0x7f, 0x37, 0x44, 0xdf, 0x2f, 0x28, 0x33, 0x4e, 0xc6, 0x7f, 0x73, 0x52, 0xb5, 0x57, 0x6d, 0x12, 0xf7, 0xb6, 0x1f, 0xd8, 0x1a, 0xa0, 0x2e, 0xf7, 0x04, 0xa1, 0xd1, 0xee, 0x57, 0x1d, 0x6e, 0xcb, 0x9d, 0xb7, 0x9d, 0xac, 0x72, 0x59, 0x35, 0x0e, 0x4c, 0xb8, 0x16, 0x6e, 0xa9, 0x6e, 0xfd, 0xc8, 0x82, 0xc2, 0xe8, 0x6f, 0x54, 0xef, 0x3e, 0xa8, 0x17, 0xa1, 0x7f, 0x9c, 0x04, 0xdb, 0xd7, 0x3c, 0x40, 0x38, 0xd9, 0x31, 0xa5, 0x49, 0x25, 0x69, 0x3c, 0x8e, 0xaf, 0x2e, 0x02, 0x3b, 0xbe, 0x5c, 0x8a, 0x70, 0x69, 0xe1, 0x19, 0x4c, 0x1c, 0xa9}}, + {.data_size = 16, .data_offset = 0x160300, .ciphertext = {0x67, 0x24, 0x58, 0xaf, 0x4a, 0xdb, 0x6e, 0xc8, 0xcb, 0xe5, 0xa1, 0x63, 0xbd, 0xb0, 0x18, 0x47}}, + {.data_size = 32, .data_offset = 0x160400, .ciphertext = {0x66, 0xc3, 0x02, 0x76, 0xfb, 0xf3, 0x58, 0xff, 0x75, 0xa7, 0x68, 0x32, 0xd0, 0x65, 0x76, 0xfc, 0x9c, 0x15, 0x73, 0x8f, 0x16, 0xa0, 0xa7, 0x3c, 0xf0, 0x84, 0x35, 0x77, 0x97, 0xd5, 0xbb, 0xd2}}, } }; test_data_aes_mode_t test_data_ecdsa = { - .init_key = { 0x4d, 0x21, 0x64, 0x21, 0x8f, 0xa2, 0xe3, 0xa0, 0xab, 0x74, 0xb5, 0xab, 0x17, 0x9a, 0x5d, 0x08, 0x58, 0xf4, 0x22, 0x03, 0xbd, 0x52, 0xe7, 0x88, 0x3c, 0x22, 0x0f, 0x95, 0x89, 0x70, 0xe1, 0x93 }, - .k2_info = { 0xd8, 0xcd, 0x04, 0x45, 0xb4, 0x45, 0xc4, 0x15, 0xf6, 0x40, 0x1c, 0x7d, 0x90, 0x1b, 0x99, 0xa4, 0x79, 0x6b, 0xfb, 0x5b, 0x2a, 0x40, 0x60, 0xe1, 0xc1, 0xe1, 0x48, 0xcd, 0x46, 0x6b, 0x9b, 0x48, 0xda, 0x7a, 0x70, 0x0a, 0x78, 0x0b, 0x9d, 0xf9, 0x0e, 0xed, 0x91, 0xfc, 0xa5, 0xc2, 0x96, 0x05, 0x91, 0x76, 0xdb, 0x68, 0x84, 0x5d, 0x5e, 0x5b, 0xa6, 0xe9, 0x6b, 0x3b, 0x12, 0x50, 0x05, 0xc3 }, - .k1_encrypted = { { 0xeb, 0x83, 0x24, 0x7d, 0xf8, 0x40, 0xc9, 0x88, 0x5f, 0x5e, 0x58, 0x57, 0x25, 0xa9, 0x23, 0x4a, 0xa4, 0xc4, 0x12, 0x17, 0xf3, 0x9e, 0x1f, 0xa0, 0xa0, 0xfa, 0xd5, 0xbf, 0xb6, 0x6c, 0xb5, 0x48 }, { } }, + .init_key = { 0x3d, 0x61, 0x0f, 0xe7, 0x3b, 0x11, 0xd1, 0xac, 0x90, 0xda, 0xc8, 0xd7, 0x36, 0xa2, 0x3e, 0x5f, 0x50, 0x3d, 0xa3, 0xc4, 0x26, 0x0e, 0x9f, 0xf5, 0xf9, 0x56, 0x5a, 0x7c, 0xb2, 0x2a, 0xed, 0x00 }, + .k2_info = { 0x53, 0x1f, 0x3c, 0x3d, 0xee, 0xb9, 0xdc, 0x22, 0xb9, 0x89, 0x94, 0x60, 0x30, 0x25, 0x02, 0xf0, 0x42, 0x32, 0xfd, 0x80, 0xfe, 0xe9, 0xfc, 0x0c, 0xc8, 0x6d, 0xa6, 0xe0, 0x99, 0x3b, 0x4f, 0xdd, 0x9c, 0x9a, 0x01, 0x99, 0xe3, 0x69, 0x23, 0xb9, 0xf9, 0xe4, 0x19, 0x66, 0x0b, 0xed, 0xf3, 0x71, 0x68, 0x0a, 0x15, 0x19, 0x7c, 0x17, 0x96, 0x9d, 0xbf, 0x0b, 0xcb, 0x75, 0x2d, 0x05, 0xc1, 0xc3 }, + .k1_encrypted = { { 0x3f, 0xe8, 0xd7, 0x74, 0x8d, 0xe4, 0xc2, 0x1c, 0x8f, 0x52, 0x5b, 0x3d, 0xa5, 0x9d, 0x43, 0x09, 0xef, 0x26, 0x76, 0x24, 0xfc, 0x3c, 0xc5, 0x3a, 0x84, 0xa2, 0x4c, 0x71, 0xf8, 0xd6, 0x8d, 0xb5 }, { } }, .ecdsa_test_data = { - .pubx = { 0x8f, 0xc2, 0x37, 0x2e, 0x36, 0x77, 0x8f, 0xc7, 0x59, 0x18, 0xec, 0x39, 0x23, 0x16, 0x6b, 0x0b, 0x4f, 0xf8, 0x19, 0xa8, 0x9f, 0xd9, 0xf7, 0x59, 0x4d, 0x8a, 0x2d, 0x16, 0xd5, 0x84, 0xe1, 0x21 }, - .puby = { 0xf1, 0x8b, 0x1e, 0x2d, 0x7e, 0xc4, 0x8b, 0xf8, 0xe3, 0xc9, 0xb1, 0x54, 0xa4, 0x65, 0xed, 0x7d, 0xbc, 0x56, 0x1a, 0x66, 0xcd, 0x43, 0x10, 0x2e, 0x46, 0x2a, 0x3f, 0xfe, 0xdb, 0x9a, 0x28, 0xf9 } + .pubx = { 0x50, 0xbe, 0xd3, 0xae, 0x26, 0x29, 0x43, 0x71, 0xba, 0xd0, 0xda, 0x24, 0xe9, 0x17, 0x5b, 0xd8, 0x0f, 0xe3, 0x77, 0x81, 0x2c, 0x62, 0x98, 0x53, 0x78, 0x3c, 0x9c, 0x14, 0x3a, 0x31, 0xa6, 0xbd }, + .puby = { 0x6c, 0xf7, 0x5d, 0x68, 0xd3, 0xb0, 0x45, 0xc5, 0xdb, 0xdc, 0xf6, 0x9a, 0xf0, 0x3b, 0x0a, 0x47, 0x18, 0xf5, 0x51, 0x92, 0xdb, 0x22, 0x03, 0xc2, 0x10, 0xa8, 0x24, 0x09, 0xff, 0x9d, 0x9c, 0x94 } } }; @@ -77,11 +77,11 @@ test_data_aes_mode_t test_data_ecdsa = { test_data_ecdh0_mode_t test_data_ecdh0 = { .plaintext_data = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27, 0x28, 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f, 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 0x38, 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f, 0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f, 0x50, 0x51, 0x52, 0x53, 0x54, 0x55, 0x56, 0x57, 0x58, 0x59, 0x5a, 0x5b, 0x5c, 0x5d, 0x5e, 0x5f, 0x60, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, 0x68, 0x69, 0x6a, 0x6b, 0x6c, 0x6d, 0x6e, 0x6f, 0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, 0x78, 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, 0x80 }, .k1 = { - { 0x20, 0x1f, 0x1e, 0x1d, 0x1c, 0x1b, 0x1a, 0x19, 0x18, 0x17, 0x16, 0x15, 0x14, 0x13, 0x12, 0x11, 0x10, 0x0f, 0x0e, 0x0d, 0x0c, 0x0b, 0x0a, 0x09, 0x08, 0x07, 0x06, 0x05, 0x04, 0x03, 0x02, 0x01 }, - { 0x20, 0x1f, 0x1e, 0x1d, 0x1c, 0x1b, 0x1a, 0x19, 0x18, 0x17, 0x16, 0x15, 0x14, 0x13, 0x12, 0x11, 0x10, 0x0f, 0x0e, 0x0d, 0x0c, 0x0b, 0x0a, 0x09, 0x08, 0x07, 0x06, 0x05, 0x04, 0x03, 0x02, 0x01 }, + { 0x8e, 0xb5, 0x60, 0xaf, 0x8c, 0x8b, 0xa4, 0x8c, 0x0d, 0x0d, 0x57, 0x74, 0xad, 0xab, 0x7b, 0x5e, 0x72, 0x75, 0x7b, 0x84, 0x4e, 0x83, 0x89, 0x0f, 0x7b, 0xc6, 0xd6, 0x85, 0xed, 0xf3, 0x74, 0xc8 }, + { 0x8e, 0xb5, 0x60, 0xaf, 0x8c, 0x8b, 0xa4, 0x8c, 0x0d, 0x0d, 0x57, 0x74, 0xad, 0xab, 0x7b, 0x5e, 0x72, 0x75, 0x7b, 0x84, 0x4e, 0x83, 0x89, 0x0f, 0x7b, 0xc6, 0xd6, 0x85, 0xed, 0xf3, 0x74, 0xc8 }, }, .k1_G = { - { 0x8f, 0xc2, 0x37, 0x2e, 0x36, 0x77, 0x8f, 0xc7, 0x59, 0x18, 0xec, 0x39, 0x23, 0x16, 0x6b, 0x0b, 0x4f, 0xf8, 0x19, 0xa8, 0x9f, 0xd9, 0xf7, 0x59, 0x4d, 0x8a, 0x2d, 0x16, 0xd5, 0x84, 0xe1, 0x21, 0xf1, 0x8b, 0x1e, 0x2d, 0x7e, 0xc4, 0x8b, 0xf8, 0xe3, 0xc9, 0xb1, 0x54, 0xa4, 0x65, 0xed, 0x7d, 0xbc, 0x56, 0x1a, 0x66, 0xcd, 0x43, 0x10, 0x2e, 0x46, 0x2a, 0x3f, 0xfe, 0xdb, 0x9a, 0x28, 0xf9 }, - { 0x8f, 0xc2, 0x37, 0x2e, 0x36, 0x77, 0x8f, 0xc7, 0x59, 0x18, 0xec, 0x39, 0x23, 0x16, 0x6b, 0x0b, 0x4f, 0xf8, 0x19, 0xa8, 0x9f, 0xd9, 0xf7, 0x59, 0x4d, 0x8a, 0x2d, 0x16, 0xd5, 0x84, 0xe1, 0x21, 0xf1, 0x8b, 0x1e, 0x2d, 0x7e, 0xc4, 0x8b, 0xf8, 0xe3, 0xc9, 0xb1, 0x54, 0xa4, 0x65, 0xed, 0x7d, 0xbc, 0x56, 0x1a, 0x66, 0xcd, 0x43, 0x10, 0x2e, 0x46, 0x2a, 0x3f, 0xfe, 0xdb, 0x9a, 0x28, 0xf9 }, + { 0x50, 0xbe, 0xd3, 0xae, 0x26, 0x29, 0x43, 0x71, 0xba, 0xd0, 0xda, 0x24, 0xe9, 0x17, 0x5b, 0xd8, 0x0f, 0xe3, 0x77, 0x81, 0x2c, 0x62, 0x98, 0x53, 0x78, 0x3c, 0x9c, 0x14, 0x3a, 0x31, 0xa6, 0xbd, 0x6c, 0xf7, 0x5d, 0x68, 0xd3, 0xb0, 0x45, 0xc5, 0xdb, 0xdc, 0xf6, 0x9a, 0xf0, 0x3b, 0x0a, 0x47, 0x18, 0xf5, 0x51, 0x92, 0xdb, 0x22, 0x03, 0xc2, 0x10, 0xa8, 0x24, 0x09, 0xff, 0x9d, 0x9c, 0x94 }, + { 0x50, 0xbe, 0xd3, 0xae, 0x26, 0x29, 0x43, 0x71, 0xba, 0xd0, 0xda, 0x24, 0xe9, 0x17, 0x5b, 0xd8, 0x0f, 0xe3, 0x77, 0x81, 0x2c, 0x62, 0x98, 0x53, 0x78, 0x3c, 0x9c, 0x14, 0x3a, 0x31, 0xa6, 0xbd, 0x6c, 0xf7, 0x5d, 0x68, 0xd3, 0xb0, 0x45, 0xc5, 0xdb, 0xdc, 0xf6, 0x9a, 0xf0, 0x3b, 0x0a, 0x47, 0x18, 0xf5, 0x51, 0x92, 0xdb, 0x22, 0x03, 0xc2, 0x10, 0xa8, 0x24, 0x09, 0xff, 0x9d, 0x9c, 0x94 }, } }; diff --git a/components/hal/test_apps/crypto/main/key_manager/test_key_manager.c b/components/hal/test_apps/crypto/main/key_manager/test_key_manager.c index f0203afa2f..7c2e5a9ddc 100644 --- a/components/hal/test_apps/crypto/main/key_manager/test_key_manager.c +++ b/components/hal/test_apps/crypto/main/key_manager/test_key_manager.c @@ -311,7 +311,7 @@ TEST_GROUP(key_manager); TEST_SETUP(key_manager) { test_utils_record_free_mem(); - TEST_ESP_OK(test_utils_set_leak_level(700, ESP_LEAK_TYPE_CRITICAL, ESP_COMP_LEAK_GENERAL)); + TEST_ESP_OK(test_utils_set_leak_level(800, ESP_LEAK_TYPE_CRITICAL, ESP_COMP_LEAK_GENERAL)); } TEST_TEAR_DOWN(key_manager) @@ -368,6 +368,7 @@ TEST_GROUP_RUNNER(key_manager) RUN_TEST_CASE(key_manager, ecdsa_key_ecdh0_deployment); RUN_TEST_CASE(key_manager, ecdsa_key_random_deployment); #if CONFIG_CRYPTO_TEST_APP_ENABLE_FPGA_TESTS + // This tests expects Flash encryption to be enabled as the test compares the decrypted flash data with the plaintext data RUN_TEST_CASE(key_manager, xts_key_random_deployment); #endif