Hi Chris,
This is a known issue of PSA Arch test. This issue was found out after that TF-M patch was merged.
Please check the fix patch:
https://github.com/ARM-software/psa-arch-tests/pull/279. This patch has been merged by PSA Arch test.
But TF-M hasn’t updated the PSA Arch test commit ID yet.
It requires some effort to re-test platforms and sync-up between PSA Arch test maintainers, to update PSA Arch test version used in TF-M.
So probably the version may be updated during next TF-M release.
Best regards,
Hu Ziji
From: TF-M <tf-m-bounces@lists.trustedfirmware.org>
On Behalf Of David Hu via TF-M
Sent: Thursday, October 14, 2021 9:44 AM
To: Chris.Brand@infineon.com; tf-m@lists.trustedfirmware.org
Cc: nd <nd@arm.com>
Subject: Re: [TF-M] PSA API crypto test breakage
Hi Chris,
Thanks a lot for reporting this failure. I’m looking into it and will update you the result.
Best regards,
Hu Ziji
From: Chris.Brand@infineon.com <Chris.Brand@infineon.com>
Sent: Thursday, October 14, 2021 1:07 AM
To: tf-m@lists.trustedfirmware.org
Cc: David Hu <David.Hu@arm.com>
Subject: PSA API crypto test breakage
Commit 42e77b561fcfe19819ff1e63cb7c0b672ee8ba41 (“Crypto: Remove TF-M Crypto service key handle array”) seems to break PSA Arch Crypto test 218 (on PSoC64, with gcc, at least). After this commit, the test reports
Failed at Checkpoint: 7
Actual: -137
Expected: -136
(so actual is PSA_ERROR_BAD_STATE and expected is PSA_ERROR_INVALID_HANDLE).
That same test passes with the previous commit.
Chris Brand
Cypress Semiconductor (Canada), Inc.
Sr Prin Software Engr
CSCA CSS ICW SW PSW 1
Office: +1 778 234 0515