mirror of
https://github.com/AsahiLinux/u-boot
synced 2024-12-01 08:59:33 +00:00
binman: ftest: Add test for ti-secure firewall node
Add test for TI firewalling node in ti-secure. Reviewed-by: Simon Glass <sjg@chromium.org> Signed-off-by: Manorit Chawdhry <m-chawdhry@ti.com>
This commit is contained in:
parent
a3e407bef7
commit
ba51299f60
3 changed files with 79 additions and 0 deletions
|
@ -7042,6 +7042,29 @@ fdt fdtmap Extract the devicetree blob from the fdtmap
|
|||
entry_args=entry_args)[0]
|
||||
self.assertGreater(len(data), len(TI_UNSECURE_DATA))
|
||||
|
||||
def testPackTiSecureFirewall(self):
|
||||
"""Test that an image with a TI secured binary can be created"""
|
||||
keyfile = self.TestFile('key.key')
|
||||
entry_args = {
|
||||
'keyfile': keyfile,
|
||||
}
|
||||
data_no_firewall = self._DoReadFileDtb('296_ti_secure.dts',
|
||||
entry_args=entry_args)[0]
|
||||
data_firewall = self._DoReadFileDtb('324_ti_secure_firewall.dts',
|
||||
entry_args=entry_args)[0]
|
||||
self.assertGreater(len(data_firewall),len(data_no_firewall))
|
||||
|
||||
def testPackTiSecureFirewallMissingProperty(self):
|
||||
"""Test that an image with a TI secured binary can be created"""
|
||||
keyfile = self.TestFile('key.key')
|
||||
entry_args = {
|
||||
'keyfile': keyfile,
|
||||
}
|
||||
with self.assertRaises(ValueError) as e:
|
||||
data_firewall = self._DoReadFileDtb('325_ti_secure_firewall_missing_property.dts',
|
||||
entry_args=entry_args)[0]
|
||||
self.assertRegex(str(e.exception), "Node '/binman/ti-secure': Subnode 'firewall-0-2' is missing properties: id,region")
|
||||
|
||||
def testPackTiSecureMissingTool(self):
|
||||
"""Test that an image with a TI secured binary (non-functional) can be created
|
||||
when openssl is missing"""
|
||||
|
|
28
tools/binman/test/324_ti_secure_firewall.dts
Normal file
28
tools/binman/test/324_ti_secure_firewall.dts
Normal file
|
@ -0,0 +1,28 @@
|
|||
// SPDX-License-Identifier: GPL-2.0+
|
||||
|
||||
/dts-v1/;
|
||||
|
||||
/ {
|
||||
#address-cells = <1>;
|
||||
#size-cells = <1>;
|
||||
|
||||
binman {
|
||||
ti-secure {
|
||||
content = <&unsecure_binary>;
|
||||
auth-in-place = <0xa02>;
|
||||
|
||||
firewall-0-2 {
|
||||
id = <0>;
|
||||
region = <2>;
|
||||
control = <0x31a>;
|
||||
permissions = <0xc3ffff>;
|
||||
start_address = <0x0 0x9e800000>;
|
||||
end_address = <0x0 0x9fffffff>;
|
||||
};
|
||||
|
||||
};
|
||||
unsecure_binary: blob-ext {
|
||||
filename = "ti_unsecure.bin";
|
||||
};
|
||||
};
|
||||
};
|
|
@ -0,0 +1,28 @@
|
|||
// SPDX-License-Identifier: GPL-2.0+
|
||||
|
||||
/dts-v1/;
|
||||
|
||||
/ {
|
||||
#address-cells = <1>;
|
||||
#size-cells = <1>;
|
||||
|
||||
binman {
|
||||
ti-secure {
|
||||
content = <&unsecure_binary>;
|
||||
auth-in-place = <0xa02>;
|
||||
|
||||
firewall-0-2 {
|
||||
// id = <0>;
|
||||
// region = <2>;
|
||||
control = <0x31a>;
|
||||
permissions = <0xc3ffff>;
|
||||
start_address = <0x0 0x9e800000>;
|
||||
end_address = <0x0 0x9fffffff>;
|
||||
};
|
||||
|
||||
};
|
||||
unsecure_binary: blob-ext {
|
||||
filename = "ti_unsecure.bin";
|
||||
};
|
||||
};
|
||||
};
|
Loading…
Reference in a new issue