Add test for TI firewalling node in ti-secure.

Reviewed-by: Simon Glass <s...@chromium.org>
Signed-off-by: Manorit Chawdhry <m-chawd...@ti.com>
---
 tools/binman/ftest.py                        | 12 ++++++++++++
 tools/binman/test/319_ti_secure_firewall.dts | 28 ++++++++++++++++++++++++++++
 2 files changed, 40 insertions(+)

diff --git a/tools/binman/ftest.py b/tools/binman/ftest.py
index 8e419645a6d5..234bcab552ee 100644
--- a/tools/binman/ftest.py
+++ b/tools/binman/ftest.py
@@ -7030,6 +7030,18 @@ fdt         fdtmap                Extract the devicetree 
blob from the fdtmap
                                    entry_args=entry_args)[0]
         self.assertGreater(len(data), len(TI_UNSECURE_DATA))
 
+    def testPackTiSecureFirewall(self):
+        """Test that an image with a TI secured binary can be created"""
+        keyfile = self.TestFile('key.key')
+        entry_args = {
+            'keyfile': keyfile,
+        }
+        data_no_firewall = self._DoReadFileDtb('296_ti_secure.dts',
+                                   entry_args=entry_args)[0]
+        data_firewall = self._DoReadFileDtb('319_ti_secure_firewall.dts',
+                                   entry_args=entry_args)[0]
+        self.assertGreater(len(data_firewall),len(data_no_firewall))
+
     def testPackTiSecureMissingTool(self):
         """Test that an image with a TI secured binary (non-functional) can be 
created
         when openssl is missing"""
diff --git a/tools/binman/test/319_ti_secure_firewall.dts 
b/tools/binman/test/319_ti_secure_firewall.dts
new file mode 100644
index 000000000000..d9369c3c6a8c
--- /dev/null
+++ b/tools/binman/test/319_ti_secure_firewall.dts
@@ -0,0 +1,28 @@
+// SPDX-License-Identifier: GPL-2.0+
+
+/dts-v1/;
+
+/ {
+       #address-cells = <1>;
+       #size-cells = <1>;
+
+       binman {
+               ti-secure {
+                       content = <&unsecure_binary>;
+                       auth_in_place = <0xa02>;
+
+                       firewall-0-2 {
+                               id = <0>;
+                               region = <2>;
+                               control = <0x31a>;
+                               permissions = <0xc3ffff>;
+                               start_address = <0x0 0x9e800000>;
+                               end_address = <0x0 0x9fffffff>;
+                       };
+
+               };
+               unsecure_binary: blob-ext {
+                       filename = "ti_unsecure.bin";
+               };
+       };
+};

-- 
2.41.0

Reply via email to