algo = self.__fdt_get_string(f'{node}/signature', 'algo')
assert algo == sign_algo + "\n", "Missing expected signature algo!"
- def check_fit_loadables(self, present):
- """Test that loadables contains both kernel and TFA BL31 entries.
+ def check_fit_loadables(self, bl31present, teepresent):
+ """Test that loadables contains both kernel, TFA BL31, TEE entries.
Each configuration must have a loadables property which lists both
- kernel-1 and tfa-bl31-1 strings in the string list.
+ kernel-1, tfa-bl31-1 and tee-1 strings in the string list.
"""
- if present:
+ if bl31present:
assert "/images/tfa-bl31-1" in self.images_nodes
else:
assert "/images/tfa-bl31-1" not in self.images_nodes
+ if teepresent:
+ assert "/images/tee-1" in self.images_nodes
+ else:
+ assert "/images/tee-1" not in self.images_nodes
for node in self.confgs_nodes:
loadables = self.__fdt_get_string(f'{node}', 'loadables')
assert "kernel-1" in loadables
- if present:
+ if bl31present:
assert "tfa-bl31-1" in loadables
else:
assert "tfa-bl31-1" not in loadables
+ if teepresent:
+ assert "tee-1" in loadables
+ else:
+ assert "tee-1" not in loadables
@pytest.mark.buildconfigspec('fit_signature')
@pytest.mark.requiredtool('fdtget')
def test_fit_auto_signed(ubman):
- def generate_and_check_fit_image(cmd, crc=False, simgs=False, scfgs=False, bl31present=False, key_name="", sign_algo="", verifier=""):
+ def generate_and_check_fit_image(cmd, crc=False, simgs=False, scfgs=False, bl31present=False, teepresent=False, key_name="", sign_algo="", verifier=""):
"""Generate fitImage and test for expected entries.
Generate a fitImage and test whether suitable entries are part of
if scfgs:
fit.check_fit_signed_confgs(key_name, sign_algo)
- fit.check_fit_loadables(bl31present)
+ fit.check_fit_loadables(bl31present, teepresent)
"""Test that mkimage generates auto-FIT with signatures/hashes as expected.
dt1_file = f'{tempdir}/dt-1.dtb'
dt2_file = f'{tempdir}/dt-2.dtb'
tfa_file = f'{tempdir}/tfa-bl31.bin'
+ tee_file = f'{tempdir}/tee.bin'
key_name = 'sign-key'
sign_algo = 'sha256,rsa4096'
key_file = f'{tempdir}/{key_name}.key'
with open(tfa_file, 'wb') as fd:
fd.write(os.urandom(256))
+ with open(tee_file, 'wb') as fd:
+ fd.write(os.urandom(256))
+
# Create 4096 RSA key and write to file to be read by mkimage
key = RSA.generate(bits=4096)
verifier = pkcs1_15.new(key)
generate_and_check_fit_image(' -fauto-conf' + b_args + s_args + " " + fit_file,
scfgs=True, bl31present=True,
key_name=key_name, sign_algo=sign_algo)
+
+ # Run the same tests as 1/2/3 above, but this time with TEE
+ # options -z tee.bin -Z 0x56780000 to cover both mkimage with
+ # and without TEE use cases.
+ b_args = " -d" + kernel_file + " -b" + dt1_file + " -b" + dt2_file + " -z" + tee_file + " -Z 0x56780000"
+
+ # 7 - Create auto FIT with images crc32 checksum, and verify it
+ generate_and_check_fit_image(' -fauto' + b_args + " " + fit_file,
+ crc=True, teepresent=True)
+
+ # 8 - Create auto FIT with signed images, and verify it
+ generate_and_check_fit_image(' -fauto' + b_args + s_args + " " + fit_file,
+ simgs=True, teepresent=True,
+ key_name=key_name, sign_algo=sign_algo, verifier=verifier)
+
+ # 9 - Create auto FIT with signed configs and hashed images, and verify it
+ generate_and_check_fit_image(' -fauto-conf' + b_args + s_args + " " + fit_file,
+ scfgs=True, teepresent=True,
+ key_name=key_name, sign_algo=sign_algo)
+
+ # Run the same tests as 1/2/3 above, but this time with both
+ # TFA BL31 and TEE options -y tfa-bl31.bin -Y 0x12340000 and
+ # -z tee.bin -Z 0x56780000 to cover both mkimage with and
+ # without both TFA BL31 and TEE use cases.
+ b_args = " -d" + kernel_file + " -b" + dt1_file + " -b" + dt2_file + " -y" + tfa_file + " -Y 0x12340000" + " -z" + tee_file + " -Z 0x56780000"
+
+ # 10 - Create auto FIT with images crc32 checksum, and verify it
+ generate_and_check_fit_image(' -fauto' + b_args + " " + fit_file,
+ crc=True, bl31present=True, teepresent=True)
+
+ # 11 - Create auto FIT with signed images, and verify it
+ generate_and_check_fit_image(' -fauto' + b_args + s_args + " " + fit_file,
+ simgs=True, bl31present=True, teepresent=True,
+ key_name=key_name, sign_algo=sign_algo, verifier=verifier)
+
+ # 12 - Create auto FIT with signed configs and hashed images, and verify it
+ generate_and_check_fit_image(' -fauto-conf' + b_args + s_args + " " + fit_file,
+ scfgs=True, bl31present=True, teepresent=True,
+ key_name=key_name, sign_algo=sign_algo)
total_size += size;
}
+ if (params->fit_tee) {
+ size = imagetool_get_filesize(params, params->fit_tee);
+ if (size < 0)
+ return -1;
+ total_size += size;
+ }
+
for (cont = params->content_head; cont; cont = cont->next) {
size = imagetool_get_filesize(params, cont->fname);
if (size < 0)
fdt_end_node(fdt);
}
+ /* And a TEE file if available */
+ if (params->fit_tee) {
+ fdt_begin_node(fdt, FIT_TEE_PROP "-1");
+
+ fdt_property_string(fdt, FIT_TYPE_PROP, FIT_TEE_PROP);
+ fdt_property_string(fdt, FIT_OS_PROP,
+ genimg_get_os_short_name(params->os));
+ fdt_property_string(fdt, FIT_ARCH_PROP,
+ genimg_get_arch_short_name(params->arch));
+ get_basename(str, sizeof(str), params->fit_tee);
+ fdt_property_string(fdt, FIT_DESC_PROP, str);
+
+ ret = fdt_property_file(params, fdt, FIT_DATA_PROP,
+ params->fit_tee);
+ if (ret)
+ return ret;
+ fdt_property_u32(fdt, FIT_LOAD_PROP, params->fit_tee_addr);
+ fdt_property_u32(fdt, FIT_ENTRY_PROP, params->fit_tee_addr);
+ fit_add_hash_or_sign(params, fdt, true);
+ if (ret)
+ return ret;
+ fdt_end_node(fdt);
+ }
+
fdt_end_node(fdt);
return 0;
fdt_property_string(fdt, typename, str);
if (params->fit_tfa_bl31) {
- snprintf(str, sizeof(str), "%s-1." FIT_TFA_BL31_PROP "-1", typename);
- str[len] = 0;
- len += strlen(FIT_TFA_BL31_PROP "-1") + 1;
+ snprintf(&str[len + 1], sizeof(str) - (len + 1), FIT_TFA_BL31_PROP "-1");
+ len += strlen(&str[len + 1]) + 1;
+ }
+
+ if (params->fit_tee) {
+ snprintf(&str[len + 1], sizeof(str) - (len + 1), FIT_TEE_PROP "-1");
+ len += strlen(&str[len + 1]) + 1;
}
fdt_property(fdt, FIT_LOADABLE_PROP, str, len + 1);
fdt_property_string(fdt, typename, str);
if (params->fit_tfa_bl31) {
- snprintf(str, sizeof(str), "%s-1." FIT_TFA_BL31_PROP "-1", typename);
- str[len] = 0;
- len += strlen(FIT_TFA_BL31_PROP "-1") + 1;
+ snprintf(&str[len + 1], sizeof(str) - (len + 1), FIT_TFA_BL31_PROP "-1");
+ len += strlen(&str[len + 1]) + 1;
+ }
+
+ if (params->fit_tee) {
+ snprintf(&str[len + 1], sizeof(str) - (len + 1), FIT_TEE_PROP "-1");
+ len += strlen(&str[len + 1]) + 1;
}
fdt_property(fdt, FIT_LOADABLE_PROP, str, len + 1);
" -s ==> create an image with no data\n"
" -y ==> append TFA BL31 file to the image\n"
" -Y ==> set TFA BL31 file load and entry point address\n"
+ " -z ==> append raw TEE file to the image\n"
+ " -Z ==> set raw TEE file load and entry point address\n"
" -v ==> verbose\n",
params.cmdname);
fprintf(stderr,
}
static const char optstring[] =
- "a:A:b:B:c:C:d:D:e:Ef:Fg:G:i:k:K:ln:N:o:O:p:qrR:stT:vVxy:Y:";
+ "a:A:b:B:c:C:d:D:e:Ef:Fg:G:i:k:K:ln:N:o:O:p:qrR:stT:vVxy:Y:z:Z:";
static const struct option longopts[] = {
{ "load-address", required_argument, NULL, 'a' },
{ "xip", no_argument, NULL, 'x' },
{ "tfa-bl31-file", no_argument, NULL, 'y' },
{ "tfa-bl31-addr", no_argument, NULL, 'Y' },
+ { "tee-file", no_argument, NULL, 'z' },
+ { "tee-addr", no_argument, NULL, 'Z' },
{ /* sentinel */ },
};
exit(EXIT_FAILURE);
}
break;
+ case 'z':
+ params.fit_tee = optarg;
+ break;
+ case 'Z':
+ params.fit_tee_addr = strtoull(optarg, &ptr, 16);
+ if (*ptr) {
+ fprintf(stderr, "%s: invalid TEE address %s\n",
+ params.cmdname, optarg);
+ exit(EXIT_FAILURE);
+ }
+ break;
default:
usage("Invalid option");
}