Hi Chris,

 

This is a known issue of PSA Arch test. This issue was found out after that TF-M patch was merged.

Please check the fix patch: https://github.com/ARM-software/psa-arch-tests/pull/279. This patch has been merged by PSA Arch test.

 

But TF-M hasn’t updated the PSA Arch test commit ID yet.

It requires some effort to re-test platforms and sync-up between PSA Arch test maintainers, to update PSA Arch test version used in TF-M.

So probably the version may be updated during next TF-M release.

 

Best regards,

Hu Ziji

 

From: TF-M <tf-m-bounces@lists.trustedfirmware.org> On Behalf Of David Hu via TF-M
Sent: Thursday, October 14, 2021 9:44 AM
To: Chris.Brand@infineon.com; tf-m@lists.trustedfirmware.org
Cc: nd <nd@arm.com>
Subject: Re: [TF-M] PSA API crypto test breakage

 

Hi Chris,

 

Thanks a lot for reporting this failure. I’m looking into it and will update you the result.

 

Best regards,

Hu Ziji

 

From: Chris.Brand@infineon.com <Chris.Brand@infineon.com>
Sent: Thursday, October 14, 2021 1:07 AM
To: tf-m@lists.trustedfirmware.org
Cc: David Hu <David.Hu@arm.com>
Subject: PSA API crypto test breakage

 

Commit 42e77b561fcfe19819ff1e63cb7c0b672ee8ba41 (“Crypto: Remove TF-M Crypto service key handle array”) seems to break PSA Arch Crypto test 218 (on PSoC64, with gcc, at least). After this commit, the test reports

        Failed at Checkpoint: 7

        Actual: -137

        Expected: -136

(so actual is PSA_ERROR_BAD_STATE and expected is PSA_ERROR_INVALID_HANDLE).

 

That same test passes with the previous commit.

 

Chris Brand

 

Cypress Semiconductor (Canada), Inc.

Sr Prin Software Engr

CSCA CSS ICW SW PSW 1

Office: +1 778 234 0515

Chris.Brand@infineon.com