1*62c56f98SSadaf EbrahimiGenerate random twice with CTR_DRBG 2*62c56f98SSadaf Ebrahimirandom_twice_with_ctr_drbg: 3*62c56f98SSadaf Ebrahimi 4*62c56f98SSadaf EbrahimiGenerate random twice with HMAC_DRBG(SHA-1) 5*62c56f98SSadaf Ebrahimidepends_on:MBEDTLS_MD_CAN_SHA1 6*62c56f98SSadaf Ebrahimirandom_twice_with_hmac_drbg:MBEDTLS_MD_SHA1 7*62c56f98SSadaf Ebrahimi 8*62c56f98SSadaf EbrahimiGenerate random twice with HMAC_DRBG(SHA-256) 9*62c56f98SSadaf Ebrahimidepends_on:MBEDTLS_MD_CAN_SHA256 10*62c56f98SSadaf Ebrahimirandom_twice_with_hmac_drbg:MBEDTLS_MD_SHA256 11*62c56f98SSadaf Ebrahimi 12*62c56f98SSadaf EbrahimiGenerate random twice with HMAC_DRBG(SHA-512) 13*62c56f98SSadaf Ebrahimidepends_on:MBEDTLS_MD_CAN_SHA512 14*62c56f98SSadaf Ebrahimirandom_twice_with_hmac_drbg:MBEDTLS_MD_SHA512 15*62c56f98SSadaf Ebrahimi 16*62c56f98SSadaf EbrahimiGenerate random twice with PSA classic wrapper 17*62c56f98SSadaf Ebrahimirandom_twice_with_psa_from_classic: 18*62c56f98SSadaf Ebrahimi 19*62c56f98SSadaf EbrahimiGenerate random twice with PSA API 20*62c56f98SSadaf Ebrahimirandom_twice_with_psa_from_psa: 21*62c56f98SSadaf Ebrahimi 22*62c56f98SSadaf Ebrahimi# This bad-usage test case currently crashes in the default configuration 23*62c56f98SSadaf Ebrahimi# because CTR_DRBG crashes when given an unseeded context. This is arguably 24*62c56f98SSadaf Ebrahimi# a good thing because it prevents misuse of mbedtls_psa_get_random(). 25*62c56f98SSadaf Ebrahimi#PSA classic wrapper: PSA not active 26*62c56f98SSadaf Ebrahimi#mbedtls_psa_get_random_no_init: 27*62c56f98SSadaf Ebrahimi 28*62c56f98SSadaf EbrahimiPSA classic wrapper: 0 bytes 29*62c56f98SSadaf Ebrahimimbedtls_psa_get_random_length:0 30*62c56f98SSadaf Ebrahimi 31*62c56f98SSadaf EbrahimiPSA classic wrapper: 1 byte 32*62c56f98SSadaf Ebrahimimbedtls_psa_get_random_length:1 33*62c56f98SSadaf Ebrahimi 34*62c56f98SSadaf EbrahimiPSA classic wrapper: 256 bytes 35*62c56f98SSadaf Ebrahimimbedtls_psa_get_random_length:256 36*62c56f98SSadaf Ebrahimi 37*62c56f98SSadaf Ebrahimi# An external RNG is supposed to handle arbitrary request lengths. Test it 38*62c56f98SSadaf Ebrahimi# with something larger than any RNG call made by Mbed TLS itself expects. 39*62c56f98SSadaf Ebrahimi# CTR_DRBG and HMAC_DRBG have their own maximum request lengths which may 40*62c56f98SSadaf Ebrahimi# be lower than the value chosen here and are tested separately. 41*62c56f98SSadaf EbrahimiPSA classic wrapper: external RNG large 42*62c56f98SSadaf Ebrahimidepends_on:MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG 43*62c56f98SSadaf Ebrahimimbedtls_psa_get_random_length:1024 44*62c56f98SSadaf Ebrahimi 45*62c56f98SSadaf EbrahimiPSA classic wrapper: CTR_DRBG max 46*62c56f98SSadaf Ebrahimidepends_on:!MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG:MBEDTLS_CTR_DRBG_C 47*62c56f98SSadaf Ebrahimimbedtls_psa_get_random_length:MBEDTLS_CTR_DRBG_MAX_REQUEST 48*62c56f98SSadaf Ebrahimi 49*62c56f98SSadaf EbrahimiPSA classic wrapper: HMAC_DRBG max 50*62c56f98SSadaf Ebrahimidepends_on:!MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG:!MBEDTLS_CTR_DRBG_C:MBEDTLS_HMAC_DRBG_C 51*62c56f98SSadaf Ebrahimimbedtls_psa_get_random_length:MBEDTLS_HMAC_DRBG_MAX_REQUEST 52*62c56f98SSadaf Ebrahimi 53*62c56f98SSadaf EbrahimiPSA classic wrapper: ECDSA signature (SECP256R1) 54*62c56f98SSadaf Ebrahimidepends_on:MBEDTLS_ECP_DP_SECP256R1_ENABLED 55*62c56f98SSadaf Ebrahimimbedtls_psa_get_random_ecdsa_sign:MBEDTLS_ECP_DP_SECP256R1 56