xref: /aosp_15_r20/external/mbedtls/tests/suites/test_suite_random.data (revision 62c56f9862f102b96d72393aff6076c951fb8148)
1*62c56f98SSadaf EbrahimiGenerate random twice with CTR_DRBG
2*62c56f98SSadaf Ebrahimirandom_twice_with_ctr_drbg:
3*62c56f98SSadaf Ebrahimi
4*62c56f98SSadaf EbrahimiGenerate random twice with HMAC_DRBG(SHA-1)
5*62c56f98SSadaf Ebrahimidepends_on:MBEDTLS_MD_CAN_SHA1
6*62c56f98SSadaf Ebrahimirandom_twice_with_hmac_drbg:MBEDTLS_MD_SHA1
7*62c56f98SSadaf Ebrahimi
8*62c56f98SSadaf EbrahimiGenerate random twice with HMAC_DRBG(SHA-256)
9*62c56f98SSadaf Ebrahimidepends_on:MBEDTLS_MD_CAN_SHA256
10*62c56f98SSadaf Ebrahimirandom_twice_with_hmac_drbg:MBEDTLS_MD_SHA256
11*62c56f98SSadaf Ebrahimi
12*62c56f98SSadaf EbrahimiGenerate random twice with HMAC_DRBG(SHA-512)
13*62c56f98SSadaf Ebrahimidepends_on:MBEDTLS_MD_CAN_SHA512
14*62c56f98SSadaf Ebrahimirandom_twice_with_hmac_drbg:MBEDTLS_MD_SHA512
15*62c56f98SSadaf Ebrahimi
16*62c56f98SSadaf EbrahimiGenerate random twice with PSA classic wrapper
17*62c56f98SSadaf Ebrahimirandom_twice_with_psa_from_classic:
18*62c56f98SSadaf Ebrahimi
19*62c56f98SSadaf EbrahimiGenerate random twice with PSA API
20*62c56f98SSadaf Ebrahimirandom_twice_with_psa_from_psa:
21*62c56f98SSadaf Ebrahimi
22*62c56f98SSadaf Ebrahimi# This bad-usage test case currently crashes in the default configuration
23*62c56f98SSadaf Ebrahimi# because CTR_DRBG crashes when given an unseeded context. This is arguably
24*62c56f98SSadaf Ebrahimi# a good thing because it prevents misuse of mbedtls_psa_get_random().
25*62c56f98SSadaf Ebrahimi#PSA classic wrapper: PSA not active
26*62c56f98SSadaf Ebrahimi#mbedtls_psa_get_random_no_init:
27*62c56f98SSadaf Ebrahimi
28*62c56f98SSadaf EbrahimiPSA classic wrapper: 0 bytes
29*62c56f98SSadaf Ebrahimimbedtls_psa_get_random_length:0
30*62c56f98SSadaf Ebrahimi
31*62c56f98SSadaf EbrahimiPSA classic wrapper: 1 byte
32*62c56f98SSadaf Ebrahimimbedtls_psa_get_random_length:1
33*62c56f98SSadaf Ebrahimi
34*62c56f98SSadaf EbrahimiPSA classic wrapper: 256 bytes
35*62c56f98SSadaf Ebrahimimbedtls_psa_get_random_length:256
36*62c56f98SSadaf Ebrahimi
37*62c56f98SSadaf Ebrahimi# An external RNG is supposed to handle arbitrary request lengths. Test it
38*62c56f98SSadaf Ebrahimi# with something larger than any RNG call made by Mbed TLS itself expects.
39*62c56f98SSadaf Ebrahimi# CTR_DRBG and HMAC_DRBG have their own maximum request lengths which may
40*62c56f98SSadaf Ebrahimi# be lower than the value chosen here and are tested separately.
41*62c56f98SSadaf EbrahimiPSA classic wrapper: external RNG large
42*62c56f98SSadaf Ebrahimidepends_on:MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG
43*62c56f98SSadaf Ebrahimimbedtls_psa_get_random_length:1024
44*62c56f98SSadaf Ebrahimi
45*62c56f98SSadaf EbrahimiPSA classic wrapper: CTR_DRBG max
46*62c56f98SSadaf Ebrahimidepends_on:!MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG:MBEDTLS_CTR_DRBG_C
47*62c56f98SSadaf Ebrahimimbedtls_psa_get_random_length:MBEDTLS_CTR_DRBG_MAX_REQUEST
48*62c56f98SSadaf Ebrahimi
49*62c56f98SSadaf EbrahimiPSA classic wrapper: HMAC_DRBG max
50*62c56f98SSadaf Ebrahimidepends_on:!MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG:!MBEDTLS_CTR_DRBG_C:MBEDTLS_HMAC_DRBG_C
51*62c56f98SSadaf Ebrahimimbedtls_psa_get_random_length:MBEDTLS_HMAC_DRBG_MAX_REQUEST
52*62c56f98SSadaf Ebrahimi
53*62c56f98SSadaf EbrahimiPSA classic wrapper: ECDSA signature (SECP256R1)
54*62c56f98SSadaf Ebrahimidepends_on:MBEDTLS_ECP_DP_SECP256R1_ENABLED
55*62c56f98SSadaf Ebrahimimbedtls_psa_get_random_ecdsa_sign:MBEDTLS_ECP_DP_SECP256R1
56