@@ -198,16 +198,6 @@ def _has_word_re(words: typing.Iterable[str],
198
198
# https://github.com/Mbed-TLS/mbedtls/issues/9592
199
199
re .compile (r'.*ECDSA.*only deterministic supported' ),
200
200
],
201
- 'test_suite_psa_crypto_generate_key.generated' : [
202
- # Ignore mechanisms that are not implemented, except
203
- # for public keys for which we always test that
204
- # psa_generate_key() returns PSA_ERROR_INVALID_ARGUMENT
205
- # regardless of whether the specific key type is supported.
206
- _has_word_re ((mech
207
- for mech in _PSA_MECHANISMS_NOT_IMPLEMENTED
208
- if not mech .startswith ('ECC_PUB' )),
209
- exclude = r'ECC_PUB' ),
210
- ],
211
201
'test_suite_psa_crypto_metadata' : [
212
202
# Algorithms declared but not supported.
213
203
# https://github.com/Mbed-TLS/mbedtls/issues/9579
@@ -221,10 +211,6 @@ def _has_word_re(words: typing.Iterable[str],
221
211
'MAC: CBC_MAC-AES-256' ,
222
212
],
223
213
'test_suite_psa_crypto_not_supported.generated' : [
224
- # It is a bug that not-supported test cases aren't getting
225
- # run for never-implemented key types.
226
- # https://github.com/Mbed-TLS/mbedtls/issues/7915
227
- PSA_MECHANISM_NOT_IMPLEMENTED_SEARCH_RE ,
228
214
# We never test with DH key support disabled but support
229
215
# for a DH group enabled. The dependencies of these test
230
216
# cases don't really make sense.
@@ -263,12 +249,6 @@ def _has_word_re(words: typing.Iterable[str],
263
249
# https://github.com/Mbed-TLS/mbedtls/issues/9592
264
250
'PSA sign DETERMINISTIC_ECDSA(SHA_256): !ECDSA but DETERMINISTIC_ECDSA with ECC_KEY_PAIR(SECP_R1)' , #pylint: disable=line-too-long
265
251
],
266
- 'test_suite_psa_crypto_storage_format.current' : [
267
- PSA_MECHANISM_NOT_IMPLEMENTED_SEARCH_RE ,
268
- ],
269
- 'test_suite_psa_crypto_storage_format.v0' : [
270
- PSA_MECHANISM_NOT_IMPLEMENTED_SEARCH_RE ,
271
- ],
272
252
'tls13-misc' : [
273
253
# Disabled due to OpenSSL bug.
274
254
# https://github.com/openssl/openssl/issues/10714
0 commit comments