Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
73 commits
Select commit Hold shift + click to select a range
d1e5784
psa-arch-tests: Allow overriding of toolchain file
SebastianBoe Aug 31, 2021
077b8e5
zephyr: module: Add module file for psa-arch-tests
joerchan Oct 20, 2021
6cca9a0
Merge tag 'v21.10_API1.3_ADAC_ALPHA-1'
joerchan Nov 30, 2021
186cba2
Merge pull request #1 from joerchan/local-merge-tfm-1.5
microbuilder Dec 17, 2021
fca3b7d
ff: nordic: Move wdt to target specific folder
andvib Oct 13, 2021
5d5171f
ff: nordic: Add WDT driver for nRF91
andvib Oct 13, 2021
7fdc924
nordic: Use hardware WDT for DEV APIs tests
andvib Jan 24, 2022
0aab246
Merge pull request #2 from joerchan/fix-wdt-build-issues
SebastianBoe Jan 31, 2022
38e431a
nordic_nrf: Increase maximum watchdog timeout value
joerchan Apr 4, 2022
4f45df5
Merge pull request #3 from joerchan/tfm-fix-wdt-timeout-zephyr
microbuilder Apr 5, 2022
dbdb70e
Merge commit 'f7e8495'
theotherjimmy May 11, 2022
a81f9da
Merge pull request #4 from theotherjimmy/tfm-1.6
carlescufi May 11, 2022
cce1656
dev-apis: platform: Increase timeout for nRF devs
Vge0rge Jul 12, 2022
f4fc244
Merge pull request #5 from Vge0rge/increase_crypto_timeout
microbuilder Aug 1, 2022
5957945
Merge commit 'cf8bd71'
joerchan Jan 17, 2023
26093a0
Init non-volatile memory before using in an521 dev apis
Summer-ARM Apr 11, 2022
a11c20e
Disable obsolete algorithms
Summer-ARM Jun 10, 2022
24ed42e
Merge pull request #7 from joerchan/tfm-1.7.0-update
microbuilder Jan 25, 2023
71f1b84
issue 339 & 341 related fix
jk-arm Feb 14, 2023
6a17330
dev-apis: platform: Increase timeout for nRF devs
SebastianBoe Jan 6, 2023
9bc2cb3
Revert "dev-apis: platform: Increase timeout for nRF devs"
mswarowsky Dec 7, 2023
60cbf9f
Revert "issue 339 & 341 related fix"
mswarowsky Dec 7, 2023
be96a35
Merge tag v23.06_API1.5_ADAC_EAC for TF-Mv2.0.0
mswarowsky Dec 7, 2023
b48d3f7
Place crypto test 16 at the beginning of the test
Summer-ARM Aug 29, 2023
ce7aa02
Crypto: Add psa crypto config link for crypto tests
Summer-ARM Oct 8, 2023
9bede47
Build: Add manifest tool dependencies
Nov 9, 2023
2657700
Attest: Use designated initializers.
Summer-ARM Nov 9, 2023
2cadb02
Merge pull request #10 from mswarowsky/tfm_20_upmerge
carlescufi Jan 17, 2024
bef346c
dev_apis: make "const" test_data check1
butok May 25, 2023
2d6545c
dev_apis: skip not defined crypto tests
butok Jun 15, 2023
d19cb86
introduced platform init functions to give more flexibility for platf…
jk-arm Jun 22, 2023
1db1469
copyrigh updated
jk-arm Jun 23, 2023
bc9e4ed
copyright updated for #354
jk-arm Jul 7, 2023
19d2b03
dev_apis: crypto: Add const to arrays in test_crypto_common.c
butok Jul 10, 2023
1811e17
cpu arch compilation param accounted for A profile
jk-arm Jul 17, 2023
740ea43
Update README.md
jk-arm Aug 16, 2023
3edf2e6
Initial (incomplete) commit
ndevillard Aug 21, 2023
9178ff3
Re-organized some sections
ndevillard Aug 21, 2023
d1a2893
Made a few corrections
ndevillard Aug 21, 2023
f49da15
Added section about PSA Certified API name
ndevillard Aug 22, 2023
a37c06e
Moved everything up 1 header
ndevillard Aug 22, 2023
0c2950c
Corrected typos
ndevillard Aug 22, 2023
e0db4bf
Updated README
ndevillard Aug 22, 2023
d79f15f
Update README.md
jk-arm Aug 23, 2023
b167f3e
Update README.md
jk-arm Aug 23, 2023
6d7bb07
crypto: Avoid static buffer allocation.
butok Aug 24, 2023
7eb8c62
pal: val: Set input parameter as const for nvmem_write()
butok Aug 25, 2023
e6836df
crypto: add ifndef to MIN and MAX macros
butok Sep 1, 2023
0f95e9e
Resolution of Issue #337: Preprocessor macro definitions must avoid the
avinaw01-arm Nov 8, 2023
a345688
Incorporation of Pull request #362: attest: Use PSA_ALG_MD5 by default.
avinaw01-arm Nov 30, 2023
5d361f6
Update FAQ-compliance.md with optional AEAD functions
ndevillard Dec 19, 2023
e71730c
FAQ updation for AEAD
jk-arm Dec 19, 2023
1c8f782
Don't rely on the target config system in the nrf WDT driver
SebastianBoe Jan 17, 2024
44b71df
Add support for the target nrf54l15
SebastianBoe Jan 17, 2024
c67d0fe
Fix base address for the nrf watchdog
SebastianBoe Feb 13, 2024
98ed75f
psa-arch-tests v1.6 release changes.
avinaw01-arm Mar 14, 2024
a871819
Revert "Attest: Use designated initializers."
tomi-font Aug 20, 2025
8d121ff
Revert "Build: Add manifest tool dependencies"
tomi-font Aug 20, 2025
80d8398
Revert "Crypto: Add psa crypto config link for crypto tests"
tomi-font Aug 20, 2025
8953fdd
Revert "Place crypto test 16 at the beginning of the test"
tomi-font Aug 20, 2025
6ac7cc7
Place crypto test 16 at the beginning of the test
Summer-ARM Aug 29, 2023
2eed717
Crypto: Add psa crypto config link for crypto tests
Summer-ARM Oct 8, 2023
69095bd
Build: Add manifest tool dependencies
Nov 9, 2023
a385a05
Add msp4 target config for Corstone 315 and 320
gergelykarm Oct 28, 2024
8bfb7ea
Add rp2350 platform
GaborAbonyi Aug 8, 2024
ccd2d6b
Rename cs3x0 to mps3
gergelykarm Nov 7, 2024
0cbd97d
Attest: Use designated initializers.
Summer-ARM Nov 9, 2023
a010234
Fix buffer overflow in test_c061/63.c
waleed-elmelegy-arm Mar 3, 2025
7e6dae2
Use rsa_128_key_data which has expected format.
oberon-sk Jun 28, 2024
10fd247
Update Musca S1/B1 platform configuration
waleed-elmelegy-arm Mar 26, 2025
87b0868
api-tests/drivers: Add 'volatile' to all cmsdk device registers
keith-packard Jul 28, 2025
aabe52f
[zep fromtree] ST : Add STM32WBA platform to psa-arch-tests.
ahmadstm Dec 3, 2024
0c0e80e
[zep fromtree] ST: Add STM32U5 platform to psa-arch-tests.
ahmadstm May 27, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
4 changes: 3 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@

## Introduction

This test suite is one of a set of resources provided by Arm that can help organizations develop products that meet the security requirements of PSA Certified on Arm-based platforms. The PSA Certified scheme provides a framework and methodology that helps silicon manufacturers, system software providers and OEMs to develop more secure products. Arm resources that support PSA Certified range from threat models, standard architectures that simplify development and increase portability, and open-source partnerships that provide ready-to-use software. You can read more about PSA Certified here at [https://www.psacertified.org](www.psacertified.org) and find more Arm resources here at [https://developer.arm.com/platform-security-resources](developer.arm.com/platform-security-resources).
This test suite is one of a set of resources provided by Arm that can help organizations develop products that meet the security requirements of PSA Certified on Arm-based platforms. The PSA Certified scheme provides a framework and methodology that helps silicon manufacturers, system software providers and OEMs to develop more secure products. Arm resources that support PSA Certified range from threat models, standard architectures that simplify development and increase portability, and open-source partnerships that provide ready-to-use software. You can read more about PSA Certified here at [psacertified web](https://www.psacertified.org/) and find more Arm resources here at [arm platform security resources](https://www.arm.com/architecture/security-features).

For more information, visit the [PSA webpage](https://developer.arm.com/products/architecture/platform-security-architecture)

Expand All @@ -15,6 +15,8 @@ API specifications are placed in [PSA API github site](https://github.com/ARM-so
### PSA Certified API Compliance
The [PSA Certified API tests](api-tests/dev_apis) are the basis for validating compliance with PSA Certified APIs. For more information on the certification program, see [psacertified.org](https://www.psacertified.org/functional-api-certification/)

For more information about passing PSA Certified API compliance, what it means, what it requires, and how it relates to the PSA Certified initiative, please read the [Frequently Asked Questions about PSA Certified API compliance](api-tests/docs/FAQ-compliance.md).

## GitHub branch
- For API certification, use the release branch and pick the appropriate release tag.
- To get the latest version of the code with bug fixes and new features, use the master branch.
Expand Down
24 changes: 22 additions & 2 deletions api-tests/CMakeLists.txt
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
#/** @file
# * Copyright (c) 2019-2023, Arm Limited or its affiliates. All rights reserved.
# * Copyright (c) 2019-2024, Arm Limited or its affiliates. All rights reserved.
# * SPDX-License-Identifier : Apache-2.0
# * Copyright 2023 NXP
# *
Expand Down Expand Up @@ -125,6 +125,7 @@ list(APPEND PSA_CPU_ARCH_SUPPORT
armv8m_bl
armv81m_ml
armv7m
armv7a
armv8a
)

Expand Down Expand Up @@ -152,6 +153,9 @@ list(APPEND PSA_SPEC_VERSION
1.0-BETA1
1.0-BETA2
1.0-BETA3
1.0.0
1.0.1
1.1.0
)
elseif("${SUITE}" STREQUAL "INITIAL_ATTESTATION")
list(APPEND PSA_SPEC_VERSION
Expand Down Expand Up @@ -289,6 +293,15 @@ else()
endif()
if(${SPEC_VERSION} STREQUAL "1.0-BETA3")
set(TESTSUITE_DB ${PSA_SUITE_DIR}/1.0-beta3_testsuite.db)
endif()
if(${SPEC_VERSION} STREQUAL "1.0.0")
set(TESTSUITE_DB ${PSA_SUITE_DIR}/1.0.0_testsuite.db)
endif()
if(${SPEC_VERSION} STREQUAL "1.0.1")
set(TESTSUITE_DB ${PSA_SUITE_DIR}/1.0.1_testsuite.db)
endif()
if(${SPEC_VERSION} STREQUAL "1.1.0")
set(TESTSUITE_DB ${PSA_SUITE_DIR}/1.1.0_testsuite.db)
endif()
elseif(${SUITE} STREQUAL "INITIAL_ATTESTATION")
if(${SPEC_VERSION} STREQUAL "1.0-BETA0")
Expand Down Expand Up @@ -622,14 +635,18 @@ add_custom_target(
COMMAND ${CMAKE_COMMAND} --build ${CMAKE_CURRENT_BINARY_DIR}/src/${PSA_TARGET_GENERATE_DATABASE}-build/ -- clean
)

if(NOT DEFINED PSA_TOOLCHAIN_FILE)
set(PSA_TOOLCHAIN_FILE ${PSA_ROOT_DIR}/tools/cmake/compiler/${TOOLCHAIN}.cmake)
endif()

# Check for supported toolchain/s
if(${TOOLCHAIN} IN_LIST PSA_TOOLCHAIN_SUPPORT)
if (DEFINED CROSS_COMPILE)
if(NOT (${TOOLCHAIN} IN_LIST CROSS_COMPILE_TOOLCHAIN_SUPPORT))
message(FATAL_ERROR "[PSA] : Error: CROSS_COMPILE not supported for this toolchain, supported toolchain are : ${CROSS_COMPILE_TOOLCHAIN_SUPPORT}")
endif()
endif()
include(${PSA_ROOT_DIR}/tools/cmake/compiler/${TOOLCHAIN}.cmake)
include(${PSA_TOOLCHAIN_FILE})
else()
message(FATAL_ERROR "[PSA] : Error: Unsupported value for -DTOOLCHAIN=${TOOLCHAIN}, supported toolchain are : ${PSA_TOOLCHAIN_SUPPORT}")
endif()
Expand Down Expand Up @@ -673,6 +690,9 @@ add_dependencies(${PSA_TARGET_GENERATE_DATABASE_POST} ${PSA_TARGET_GENERATE_DATA
add_dependencies(${PSA_TARGET_PAL_NSPE_LIB} ${PSA_TARGET_GENERATE_DATABASE_POST})
add_dependencies(${PSA_TARGET_VAL_NSPE_LIB} ${PSA_TARGET_PAL_NSPE_LIB})
add_dependencies(${PSA_TARGET_TEST_COMBINE_LIB} ${PSA_TARGET_VAL_NSPE_LIB})
if(TARGET manifest_tool)
add_dependencies(${PSA_TARGET_TEST_COMBINE_LIB} manifest_tool)
endif()
if(${SUITE} STREQUAL "IPC")
add_dependencies(${PSA_TARGET_DRIVER_PARTITION_LIB} ${PSA_TARGET_TEST_COMBINE_LIB})
add_dependencies(${PSA_TARGET_CLIENT_PARTITION_LIB} ${PSA_TARGET_DRIVER_PARTITION_LIB})
Expand Down
37 changes: 22 additions & 15 deletions api-tests/dev_apis/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,12 +14,12 @@ This test suite is not a substitute for design verification. To review the test
For more information on the architecture test suite framework and methodology to run the tests, refer to the [Validation Methodology](../docs/Arm_PSA_APIs_Arch_Test_Validation_Methodology.pdf) document.

## This release
- Code Quality : REL v1.4
- Code Quality : REL v1.6
- This release contains following API tests: <br />

| Test Category | Specification Version |
|--------------------------|--------------------------------------|
| Crypto | [Crypto API 1.0.1](https://arm-software.github.io/psa-api/crypto/) |
| Crypto | [Crypto API 1.1.0](https://arm-software.github.io/psa-api/crypto/) |
| Storage (PS and ITS) | [Storage API 1.0.0](https://arm-software.github.io/psa-api/storage/) |
| Attestation | [Attestation API 1.0.2](https://arm-software.github.io/psa-api/attestation/) |

Expand All @@ -30,6 +30,8 @@ For more information on the architecture test suite framework and methodology to

| Release version | Release tag | Crypto API | Storage API | Attestation API |
|-----------------|---------------|----------------|-----------------|---------------------|
| REL v1.6 | [v24.03_API1.6_CRYPTO_1.1.0](https://github.com/ARM-software/psa-arch-tests/tree/v24.03_API1.6_CRYPTO_1.1.0/api-tests/dev_apis) | 1.1.0 | 1.0.0 | 1.0.2 |
| REL v1.5 | [v23.06_API1.5_ADAC_EAC](https://github.com/ARM-software/psa-arch-tests/tree/v23.06_API1.5_ADAC_EAC/api-tests/dev_apis) | 1.0.1 | 1.0.0 | 1.0.2 |
| REL v1.4 | [v22.01_API1.4_ADAC_BETA](https://github.com/ARM-software/psa-arch-tests/tree/v22.01_API1.4_ADAC_BETA/api-tests/dev_apis) | 1.0.1 | 1.0.0 | 1.0.2 |
| REL v1.3 | [v21.10_API1.3_ADAC_ALPHA-1](https://github.com/ARM-software/psa-arch-tests/tree/v21.10_API1.3_ADAC_ALPHA-1/api-tests/dev_apis) | 1.0.0 | 1.0.0 | 1.0.2 |
| REL v1.2 | [v21.07_API1.2_ADAC_ALPHA](https://github.com/ARM-software/psa-arch-tests/tree/v21.07_API1.2_ADAC_ALPHA/api-tests/dev_apis) | 1.0.0 | 1.0.0 | 1.0.2 |
Expand All @@ -40,8 +42,13 @@ For more information on the architecture test suite framework and methodology to

## Test scenarios

The mapping of the rules in the specification to the test cases and the steps followed in the tests are mentioned in the [Scenario Document](../docs/) that is present in the **docs/** folder.
The mapping of the rules in the specification to the test cases and the steps followed in the tests are mentioned in the [Scenario Documents](../docs/) that is present in the **docs/** folder.

| Scenario Documents | |
|--------------------------|---------------------------------------------------------|
| Crypto | [psa_crypto_testlist.md](../docs/psa_crypto_testlist.md) |
| Storage (PS and ITS) | [psa_storage_testlist.md](../docs/psa_storage_testlist.md) |
| Attestation | [psa_attestation_testlist.md](../docs/psa_attestation_testlist.md) |

## Getting started

Expand All @@ -65,25 +72,25 @@ To build the test suite for your target platform, execute the following commands
<br />Options information:<br />

- -G"<generator_name>" : "Unix Makefiles" to generate Makefiles for Linux and Cygwin. "MinGW Makefiles" to generate Makefiles for cmd.exe on Windows <br />
- -DTARGET=<platform_name> is the same as the name of the target-specific directory created in the **platform/targets/** directory. The current release has been tested on **tgt_dev_apis_tfm_an521**, **tgt_dev_apis_tfm_musca_b1** and **tgt_dev_apis_tfm_musca_a** platforms. Refer [Test_failure analysis](../docs/test_failure_analysis.md) document to know the reason for any known test fail.<br />
- -DTOOLCHAIN=<tool_chain> Compiler toolchain to be used for test suite compilation. Supported values are GNUARM (GNU Arm Embedded), ARMCLANG (ARM Compiler 6.x) , HOST_GCC and GCC_LINUX . Default is GNUARM.<br />
- -DTARGET=<platform_name> is the same as the name of the target-specific directory created in the **platform/targets/** directory. The current release has been tested on **tgt_dev_apis_tfm_an521** platform. Refer [Test_failure analysis](../docs/test_failure_analysis.md) document to know the reason for any known test fail.<br />
- -DCPU_ARCH=<cpu_architecture_version> is the Arm Architecture version name for which the tests should be compiled. Supported CPU arch are armv8m_ml, armv8m_bl, armv7m and armv8a. Default is empty. This option is unused when TOOLCHAIN type is HOST_GCC.<br />
- -DSUITE=<suite_name> is the test suite name. Supported values are CRYPTO, INITIAL_ATTESTATION, STORAGE(INTERNAL_TRUSTED_STORAGE and PROTECTED_STORAGE), INTERNAL_TRUSTED_STORAGE and PROTECTED_STORAGE .<br />
- -DPSA_INCLUDE_PATHS="<include_path1>;<include_path2>;...;<include_pathn>" is an additional directory to be included into the compiler search path.You must provide API header files implementation to the test suite build system using this option. For example, to compile Crypto tests, the include path must point to the path where **psa/crypto.h** is located in your build system. Bydefault, PSA_INCLUDE_PATHS accepts absolute path. However, relative path can be provided using below format:<br />
```
-DPSA_INCLUDE_PATHS=`readlink -f <relative_include_path>`
```
- -DTOOLCHAIN=<tool_chain> Compiler toolchain to be used for test suite compilation. Supported values are GNUARM (GNU Arm Embedded), ARMCLANG (ARM Compiler 6.x) , HOST_GCC and GCC_LINUX . Default is GNUARM.<br />
- -DVERBOSE=<verbose_level>. Print verbosity level. Default is 3. Supported print levels are 1(INFO & above), 2(DEBUG & above), 3(TEST & above), 4(WARN & ERROR) and 5(ERROR).
- -DBUILD=<BUILD_DIR> : To select the build directory to keep output files. Default is BUILD/ inside current directory.
- -DWATCHDOG_AVAILABLE=<0|1>: Test harness may require to access watchdog timer to recover system hang. 0 means skip watchdog programming in the test suite and 1 means program the watchdog. Default is 1. Note, watchdog must be available for the tests which check the API behaviour on the system reset.
- -DSUITE_TEST_RANGE="<test_start_number>;<test_end_number>" is to select range of tests for build. All tests under -DSUITE are considered by default if not specified.
- -DTFM_PROFILE=<profile_small/profile_medium> is to work with TFM defined Pofile Small/Medium definitions. Supported values are profile_small and profile_medium. Unless specified Default Profile is used.
- -DSPEC_VERSION=<spec_version> is test suite specification version. Which will build for given specified spec_version. Supported values for CRYPTO test suite are 1.0-BETA1, 1.0-BETA2, 1.0-BETA3 , for INITIAL_ATTESATATION test suite are 1.0-BETA0, 1.0.0, 1.0.1, 1.0.2, for STORAGE, INTERNAL_TRUSTED_STORAGE, PROTECTED_STORAGE test suite are 1.0-BETA2, 1.0 . Default is empty. <br/>
- -DTFM_PROFILE=<profile_small/profile_medium> is to work with TFM defined Profile Small/Medium definitions. Supported values are profile_small and profile_medium. Default profile is profile_large.
- -DSPEC_VERSION=<spec_version> is test suite specification version. Which will build for given specified spec_version. Supported values for CRYPTO test suite are 1.0-BETA1, 1.0-BETA2, 1.0-BETA3 , 1.0.0, 1.0.1, 1.1.0, for INITIAL_ATTESATATION test suite are 1.0-BETA0, 1.0.0, 1.0.1, 1.0.2, for STORAGE, INTERNAL_TRUSTED_STORAGE, PROTECTED_STORAGE test suite are 1.0-BETA2, 1.0 . Default is empty. <br />
If -DSPEC_VERSION option is not given it will build for latest version of testsuite.
For every spec version corresponds test list will be in spec_version_testsuite.db file in api-tests/dev_apis/test_suite_name/ folder.
- -DCOMPILER_NAME=<compiler_name> Compiler name to be use for selecting compiler. Supported values are gcc. By defualt it will take gcc if not specified.
- -DCOMPILER_NAME=<compiler_name> Name to be used for selecting a compiler. It defaults to gcc. <br />
Note: -DCOMPILER_NAME only applicable for linux i.e. -DTOOLCHAIN=GCC_LINUX and DTARGET=tgt_dev_apis_linux.
- -DPSA_INCLUDE_PATHS="<include_path1>;<include_path2>;...;<include_pathn>" is an additional directory to be included into the compiler search path.You must provide API header files implementation to the test suite build system using this option. For example, to compile Crypto tests, the include path must point to the path where **psa/crypto.h** is located in your build system. Bydefault, PSA_INCLUDE_PATHS accepts absolute path. However, relative path can be provided using below format:<br />
- -DPSA_TARGET_QCBOR=<path for pre-fetched cbor folder, this is option used where no network connectivity is possible during the build:<br />
```
-DPSA_INCLUDE_PATHS=`readlink -f <relative_include_path>`
```
- -DPSA_TARGET_QCBOR=< path > for pre-fetched cbor folder, this is option used where no network connectivity is possible during the build.<br />
- -DTESTS_COVERAGE=<tests_coverage_value> is used to skip known failure tests by selecting value PASS. Supported values are ALL and PASS. ALL value will include all the tests and PASS value will skip the known failure tests and will include pass tests. Default is ALL.

- -DBESPOKE_SUITE_TESTS=<testsuite_db_file> should be placed in target specific directory, if this option is enabled, the mentioned database file will be picked up for compilation. if not default location database file will be used. This option is enabled only for CRYPTO suite at the moment.
Expand Down Expand Up @@ -120,7 +127,7 @@ The following steps describe the execution flow before the test execution: <br /
3. Upon booting firmware and Non-secure OS, the SUT boot software gives control to the test suite entry point **int32_t val_entry(void);** as an Non-secure application entry point returning test status code. <br />
4. The tests are executed sequentially in a loop in the test_dispatcher function. <br />

For details on test suite integration, refer to the **Integrating the test suite with the SUT** section of [Validation Methodology](../docs/Arm_PSA_APIs_Arch_Test_Validation_Methodology.pdf).
For details on test suite integration, refer to the **Integrating the test suite with the SUT** section of [Validation Methodology](../docs/Arm_PSA-M_Functional_API_Test_Suite_Validation_Methodology.pdf).

## Security implication

Expand All @@ -139,4 +146,4 @@ Arm PSA test suite is distributed under Apache v2.0 License.

--------------

*Copyright (c) 2018-2023, Arm Limited and Contributors. All rights reserved.*
*Copyright (c) 2018-2024, Arm Limited and Contributors. All rights reserved.*
92 changes: 92 additions & 0 deletions api-tests/dev_apis/crypto/1.1.0_testsuite.db
Original file line number Diff line number Diff line change
@@ -0,0 +1,92 @@
#/** @file
# * Copyright (c) 2024, Arm Limited or its affiliates. All rights reserved.
# * SPDX-License-Identifier : Apache-2.0
# *
# * Licensed under the Apache License, Version 2.0 (the "License");
# * you may not use this file except in compliance with the License.
# * You may obtain a copy of the License at
# *
# * http://www.apache.org/licenses/LICENSE-2.0
# *
# * Unless required by applicable law or agreed to in writing, software
# * distributed under the License is distributed on an "AS IS" BASIS,
# * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# * See the License for the specific language governing permissions and
# * limitations under the License.
#**/


#List of tests to be compiled and run as part of crypto suite

(START)

test_c001
test_c002
test_c003
test_c004
test_c005
test_c006
test_c007
test_c008
test_c009
test_c010
test_c011
test_c012
test_c013
test_c014
test_c015
test_c016
test_c017
test_c018
test_c019
test_c020
test_c021
test_c022
test_c023
test_c024
test_c025
test_c026
test_c027
test_c028
test_c029
test_c030
test_c031
test_c032
test_c033
test_c034
test_c035
test_c036
test_c037
test_c038
test_c039
test_c040
test_c041
test_c042
test_c043
test_c044
test_c045
test_c046
test_c047
test_c048
test_c049
test_c050
test_c051
test_c052
test_c053
test_c054
test_c055
test_c056
test_c057
test_c058
test_c059
test_c060
test_c061
test_c062
test_c063
test_c064, skip
test_c065, skip
test_c066
test_c067, skip
test_c068, skip

(END)
Loading