Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

hostap: add crypto module test kconfig option #79079

Merged

Conversation

fengming-ye
Copy link
Contributor

Add crypto module test kconfig option
CONFIG_WIFI_NM_WPA_SUPPLICANT_CRYPTO_TEST,
which is default n and hidden.
It is only available by developer for crypto module test.

460d08c
west.yml: update hostap revision

Update hostap revision to get crypto module test.

@zephyrbot
Copy link
Collaborator

zephyrbot commented Sep 27, 2024

The following west manifest projects have been modified in this Pull Request:

Name Old Revision New Revision Diff
hostap zephyrproject-rtos/hostap@f6792cb zephyrproject-rtos/hostap@d84b1ea (main) zephyrproject-rtos/hostap@f6792cb4..d84b1ea1

Note: This message is automatically posted and updated by the Manifest GitHub Action.

@zephyrbot zephyrbot added manifest manifest-hostap DNM This PR should not be merged (Do Not Merge) labels Sep 27, 2024
@fengming-ye
Copy link
Contributor Author

@krish2718 @jukkar @VivekUppunda FYI
I raise this PR to add crypto module test after PSA init and I think this may help you test when you develop PSA wrapper.
Current version has passed this test module with following log.

[00:00:33.415,391] wpa_supp: crypto module tests
[00:00:33.425,721] wpa_supp: OMAC1-AES-128 test cases passed
[00:00:33.436,085] wpa_supp: AES-128 EAX mode test cases passed
[00:00:33.446,956] wpa_supp: AES ECB mode test cases passed
[00:00:33.455,724] wpa_supp: RFC 3394 - Test vector 4.1
[00:00:33.464,504] wpa_supp: RFC 3394 - Test vector 4.2
[00:00:33.473,173] wpa_supp: RFC 3394 - Test vector 4.3
[00:00:33.481,823] wpa_supp: RFC 3394 - Test vector 4.4
[00:00:33.490,502] wpa_supp: RFC 3394 - Test vector 4.5
[00:00:33.499,222] wpa_supp: RFC 3394 - Test vector 4.6
[00:00:33.508,021] wpa_supp: AES key wrap/unwrap test cases passed
[00:00:33.517,330] wpa_supp: MD5 test case 0
[00:00:33.524,922] wpa_supp: OK
[00:00:33.531,232] wpa_supp: MD5 test case 1
[00:00:33.538,791] wpa_supp: OK
[00:00:33.545,194] wpa_supp: OK
[00:00:33.551,556] wpa_supp: MD5 test case 2
[00:00:33.559,088] wpa_supp: OK
[00:00:33.565,518] wpa_supp: OK
[00:00:33.571,891] wpa_supp: MD5 test case 3
[00:00:33.579,417] wpa_supp: OK
[00:00:33.585,843] wpa_supp: OK
[00:00:33.592,215] wpa_supp: MD5 test case 4
[00:00:33.599,752] wpa_supp: OK
[00:00:33.606,168] wpa_supp: OK
[00:00:33.612,546] wpa_supp: MD5 test case 5
[00:00:33.620,085] wpa_supp: OK
[00:00:33.626,503] wpa_supp: OK
[00:00:33.632,871] wpa_supp: MD5 test case 6
[00:00:33.640,424] wpa_supp: OK
[00:00:33.646,838] wpa_supp: OK
[00:00:33.653,219] wpa_supp: MD5 test cases passed
[00:00:33.661,217] wpa_supp: PRF-SHA1 test cases:
[00:00:33.671,308] wpa_supp: Test case 0 - OK
[00:00:33.680,770] wpa_supp: Test case 1 - OK
[00:00:33.690,416] wpa_supp: Test case 2 - OK
[00:00:33.697,910] wpa_supp: EAP-FAST test cases
[00:00:33.705,699] wpa_supp: - T-PRF (SHA1) test case / master_secret
[00:00:33.717,143] wpa_supp: - PRF (TLS, SHA1/MD5) test case / key_block
[00:00:33.735,720] wpa_supp: - T-PRF (SHA1) test case / IMCK
[00:00:33.746,231] wpa_supp: - T-PRF (SHA1) test case / MSK
[00:00:33.756,936] wpa_supp: - T-PRF (SHA1) test case / EMSK
[00:00:33.767,879] wpa_supp: - Compound MAC test case
[00:00:33.776,590] wpa_supp: PBKDF2-SHA1 Passphrase test cases:
[00:00:34.210,331] wpa_supp: Test case 0 - OK
[00:00:34.622,770] wpa_supp: Test case 1 - OK
[00:00:35.054,856] wpa_supp: Test case 2 - OK
[00:00:35.062,336] wpa_supp: PBKDF2-SHA1 test cases (RFC 6070):
[00:00:35.071,693] wpa_supp: Test case 0 - OK
[00:00:35.079,464] wpa_supp: Test case 1 - OK
[00:00:35.504,382] wpa_supp: Test case 2 - OK
[00:00:35.933,848] wpa_supp: Test case 3 - OK
[00:00:35.941,319] wpa_supp: SHA1 test cases passed
[00:00:35.949,421] wpa_supp: SHA256 test case 1:
[00:00:35.957,586] wpa_supp: OK
[00:00:35.964,124] wpa_supp: OK
[00:00:35.970,436] wpa_supp: SHA256 test case 2:
[00:00:35.978,480] wpa_supp: OK
[00:00:35.985,010] wpa_supp: OK
[00:00:35.991,318] wpa_supp: HMAC-SHA256 test case 1:
[00:00:36.000,108] wpa_supp: OK
[00:00:36.006,872] wpa_supp: OK
[00:00:36.013,637] wpa_supp: OK
[00:00:36.019,958] wpa_supp: HMAC-SHA256 test case 2:
[00:00:36.028,662] wpa_supp: OK
[00:00:36.035,402] wpa_supp: OK
[00:00:36.042,150] wpa_supp: OK
[00:00:36.048,477] wpa_supp: HMAC-SHA256 test case 3:
[00:00:36.057,206] wpa_supp: OK
[00:00:36.063,951] wpa_supp: OK
[00:00:36.070,730] wpa_supp: OK
[00:00:36.077,061] wpa_supp: HMAC-SHA256 test case 4:
[00:00:36.085,783] wpa_supp: OK
[00:00:36.092,533] wpa_supp: OK
[00:00:36.099,275] wpa_supp: OK
[00:00:36.105,595] wpa_supp: HMAC-SHA256 test case 5:
[00:00:36.114,301] wpa_supp: OK
[00:00:36.121,067] wpa_supp: OK
[00:00:36.127,827] wpa_supp: OK
[00:00:36.134,148] wpa_supp: HMAC-SHA256 test case 6:
[00:00:36.142,863] wpa_supp: OK
[00:00:36.149,590] wpa_supp: OK
[00:00:36.156,353] wpa_supp: OK
[00:00:36.162,681] wpa_supp: HMAC-SHA256 test case 7:
[00:00:36.171,373] wpa_supp: OK
[00:00:36.178,126] wpa_supp: OK
[00:00:36.184,875] wpa_supp: OK
[00:00:36.191,191] wpa_supp: HMAC-SHA256 test case 8:
[00:00:36.199,922] wpa_supp: OK
[00:00:36.206,662] wpa_supp: OK
[00:00:36.213,448] wpa_supp: OK
[00:00:36.219,769] wpa_supp: HMAC-SHA256 test case 9:
[00:00:36.228,460] wpa_supp: OK
[00:00:36.235,202] wpa_supp: OK
[00:00:36.241,960] wpa_supp: OK
[00:00:36.248,279] wpa_supp: HMAC-SHA256 test case 10:
[00:00:36.257,082] wpa_supp: OK
[00:00:36.263,828] wpa_supp: OK
[00:00:36.270,589] wpa_supp: OK
[00:00:36.276,912] wpa_supp: HMAC-SHA256 test case 11:
[00:00:36.285,711] wpa_supp: OK
[00:00:36.292,456] wpa_supp: OK
[00:00:36.299,236] wpa_supp: OK
[00:00:36.305,559] wpa_supp: HMAC-SHA256 test case 12:
[00:00:36.314,484] wpa_supp: OK
[00:00:36.321,296] wpa_supp: OK
[00:00:36.328,119] wpa_supp: OK
[00:00:36.334,442] wpa_supp: HMAC-SHA256 test case 13:
[00:00:36.343,293] wpa_supp: OK
[00:00:36.350,088] wpa_supp: OK
[00:00:36.356,901] wpa_supp: OK
[00:00:36.363,226] wpa_supp: HMAC-SHA256 test case 14:
[00:00:36.372,082] wpa_supp: OK
[00:00:36.378,868] wpa_supp: OK
[00:00:36.385,690] wpa_supp: OK
[00:00:36.392,017] wpa_supp: HMAC-SHA256 test case 15:
[00:00:36.400,874] wpa_supp: OK
[00:00:36.407,704] wpa_supp: OK
[00:00:36.414,561] wpa_supp: OK
[00:00:36.420,900] wpa_supp: Test IEEE 802.11r KDF
[00:00:36.429,421] wpa_supp: SHA256 test cases passed
[00:00:36.437,798] wpa_supp: SHA384 test case 1: OK
[00:00:36.445,999] wpa_supp: SHA384 test case 2: OK
[00:00:36.453,999] wpa_supp: HMAC-SHA384 test case 5:
[00:00:36.462,739] wpa_supp: OK
[00:00:36.469,516] wpa_supp: OK
[00:00:36.476,320] wpa_supp: OK
[00:00:36.482,642] wpa_supp: HMAC-SHA384 test case 6:
[00:00:36.491,361] wpa_supp: OK
[00:00:36.498,117] wpa_supp: OK
[00:00:36.504,902] wpa_supp: OK
[00:00:36.511,229] wpa_supp: HMAC-SHA384 test case 8:
[00:00:36.519,949] wpa_supp: OK
[00:00:36.526,734] wpa_supp: OK
[00:00:36.533,523] wpa_supp: OK
[00:00:36.539,849] wpa_supp: HMAC-SHA384 test case 10:
[00:00:36.548,652] wpa_supp: OK
[00:00:36.555,435] wpa_supp: OK
[00:00:36.562,239] wpa_supp: OK
[00:00:36.568,570] wpa_supp: HMAC-SHA384 test case 13:
[00:00:36.577,484] wpa_supp: OK
[00:00:36.584,352] wpa_supp: OK
[00:00:36.591,206] wpa_supp: OK
[00:00:36.597,530] wpa_supp: HMAC-SHA384 test case 15:
[00:00:36.606,435] wpa_supp: OK
[00:00:36.613,296] wpa_supp: OK
[00:00:36.620,193] wpa_supp: OK
[00:00:36.626,521] wpa_supp: SHA384 test cases passed
[00:00:36.634,785] wpa_supp: Testing EAP-SIM PRF (FIPS 186-2 + change notice 1)
[00:00:36.645,473] wpa_supp: Testing Extract-and-Expand HKDF (RFC 5869)
[00:00:36.655,222] wpa_supp: RFC 5869 - Test Case 1
[00:00:36.664,466] wpa_supp: RFC 5869 - Test Case 2
[00:00:36.673,868] wpa_supp: Extract-and-Expand HKDF test cases passed
[00:00:36.685,373] wpa_supp: ms_funcs test cases passed
[00:00:36.694,641] wifi_supplicant: wpa_supplicant initialized

krish2718
krish2718 previously approved these changes Sep 27, 2024
jukkar
jukkar previously approved these changes Sep 27, 2024
@jukkar
Copy link
Member

jukkar commented Oct 7, 2024

@fengming-ye could you rebase this against latest upstream, github complains about conflicts.

@fengming-ye
Copy link
Contributor Author

@fengming-ye could you rebase this against latest upstream, github complains about conflicts.

rebased

@jukkar
Copy link
Member

jukkar commented Oct 8, 2024

@fengming-ye the hostap PR is now merged, please rebase and update manifest

@zephyrbot zephyrbot removed the DNM This PR should not be merged (Do Not Merge) label Oct 9, 2024
Add crypto module test kconfig option
CONFIG_WIFI_NM_WPA_SUPPLICANT_CRYPTO_TEST,
which is default n and hidden.
It is only available by developer for crypto module test.

Signed-off-by: Fengming Ye <frank.ye@nxp.com>
Update hostap revision to get crypto module test.

Signed-off-by: Fengming Ye <frank.ye@nxp.com>
@jukkar jukkar requested a review from krish2718 October 9, 2024 07:14
@aescolar aescolar merged commit 20e81f7 into zephyrproject-rtos:main Oct 9, 2024
25 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants