CKM: Remove CBC from integrity tests 74/201974/4
authorKrzysztof Jackiewicz <k.jackiewicz@samsung.com>
Wed, 20 Mar 2019 14:23:46 +0000 (15:23 +0100)
committerKrzysztof Jackiewicz <k.jackiewicz@samsung.com>
Fri, 5 Apr 2019 09:22:21 +0000 (11:22 +0200)
In case of CBC the tests that uses different key to decrypt the data may pass of
fail depending on the padding scheme and input data length. In other words, we
should not expect the CBC to fail if wrong key is used, yet in many cases it
does fail.

Change-Id: Ib213544b6349433c15346eb422cdbeea4f074544

src/ckm/unprivileged/encryption-decryption.cpp

index d115ae8..9b19a0f 100644 (file)
@@ -1117,9 +1117,6 @@ RUNNER_TEST_MULTIPLE(TED_0140_decrypt_no_output_buffer, SyncEnv, AsyncEnv)
 RUNNER_TEST_MULTIPLE(TED_0200_encrypt_decrypt_different_keys, SyncEnv, AsyncEnv)
 {
     testBackend b(PolicyBackend::FORCE_SOFTWARE);
-    testEncryptDecryptDifferentKeys({CKMC_ALGO_AES_CBC, 128}, false);
-    testEncryptDecryptDifferentKeys({CKMC_ALGO_AES_CBC, 192}, false);
-    testEncryptDecryptDifferentKeys({CKMC_ALGO_AES_CBC, 256}, false);
     testEncryptDecryptDifferentKeys({CKMC_ALGO_AES_GCM, 128}, false);
     testEncryptDecryptDifferentKeys({CKMC_ALGO_AES_GCM, 192}, false);
     testEncryptDecryptDifferentKeys({CKMC_ALGO_AES_GCM, 256}, false);