-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
secure_storage: fix tests #20710
secure_storage: fix tests #20710
Conversation
The following west manifest projects have changed revision in this Pull Request:
✅ All manifest checks OK Note: This message is automatically posted and updated by the Manifest GitHub Action. |
CI InformationTo view the history of this post, clich the 'edited' button above Inputs:Sources:sdk-nrf: PR head: 14b68f51d52d41b518da1f7b178065c0a7069e25 more detailssdk-nrf:
mbedtls:
zephyr:
Github labels
List of changed files detected by CI (52)
Outputs:ToolchainVersion: 4ffa2202d5 Test Spec & Results: ✅ Success; ❌ Failure; 🟠 Queued; 🟡 Progress; ◻️ Skipped;
|
You can find the documentation preview for this PR here. |
aece2e9
to
85fc86d
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
works on-device. LGTM
85fc86d
to
48e20b3
Compare
48e20b3
to
15afba8
Compare
Since quarantine was modified, please make sure you are following the process described in Quarantine Process. |
15afba8
to
03acad4
Compare
Rebased and updated the Zephyr/Mbed TLS PRs. |
8deea05
to
a0da5f9
Compare
@nrfconnect/ncs-test-leads @nrfconnect/ncs-aegir please review (CI failure unrelated) |
Indeed, find-my CI failure is from different reason (will be fixed soon) |
a0da5f9
to
4545f9b
Compare
4545f9b
to
0a62db2
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This and dependent PRs LGTM (pending updated shas)
@nrfconnect/ncs-test-leads please review |
1 similar comment
@nrfconnect/ncs-test-leads please review |
Lower the minimum value allowed from 512 to 256 as the secure_storage tests use 256 and this is still quite a reasonable minimum value to have. Signed-off-by: Tomi Fontanilles <tomi.fontanilles@nordicsemi.no>
0a62db2
to
5d59c98
Compare
|
Pull in changes made in Zephyr to fix secure storage tests. Update the sdk-zephyr revision to the latest main to also pull in a fix to a Zephyr test that would make CI fail. Signed-off-by: Tomi Fontanilles <tomi.fontanilles@nordicsemi.no>
Pull in the PR that was originally created to fix the block_cipher configuration in Mbed TLS. The fix ended up being done in sdk-nrf so the Mbed TLS PR turned into a cleanup of some noups we have in there, without intended functional change. Signed-off-by: Tomi Fontanilles <tomi.fontanilles@nordicsemi.no>
Remove the quarantine as thoses tests are now fixed. Signed-off-by: Tomi Fontanilles <tomi.fontanilles@nordicsemi.no>
psa_aead_encrypt() would fail, returning PSA_ERROR_BUFFER_TOO_SMALL, because ciphertext_length wouldn't be assigned and have a random value. Signed-off-by: Tomi Fontanilles <tomi.fontanilles@nordicsemi.no>
Define BUILDING_MBEDTLS_CRYPTO when building source files of the Oberon PSA Crypto core. This is done to be aligned with Mbed TLS in Zephyr. BUILDING_MBEDTLS_CRYPTO is used by the secure storage subsystem to identify that the ITS calls are coming from PSA Crypto. So it needs to be defined in all the PSA Crypto implementations. Signed-off-by: Tomi Fontanilles <tomi.fontanilles@nordicsemi.no>
With the latest changes the remaining test scenario that used to not be filtered out is now overflowing. This is not something we want to support anyway so quarantine all secure_storage tests on that board target. Also, replace the other quarantined secure_storage scenarios by the same regexp to make sure to encompass them all. Signed-off-by: Tomi Fontanilles <tomi.fontanilles@nordicsemi.no>
Auto-enable PSA_WANT_ALG_ECB_NO_PADDING when MBEDTLS_BUILTIN and CCM or GCM is enabled and !MBEDTLS_FORCE_LEGACY_CIPHER. ECB is needed by the block_cipher module in Mbed TLS when MBEDTLS_BLOCK_CIPHER_SOME_PSA. Because of a noup we have to enable that in our Mbed TLS fork, ECB ends up needing to be enabled when using Mbed TLS' PSA API to encrypt/decrypt data with CCM/GCM because the code goes to block_cipher. Rather than having to enable that dependency everywhere it's needed, auto-enable it in those conditions. Also, move the PSA_WANT_ALG Kconfig options that were separate from the others. Signed-off-by: Tomi Fontanilles <tomi.fontanilles@nordicsemi.no>
5d59c98
to
14b68f5
Compare
No description provided.