46a738a4ec
This test verifies that ECDSA_UCLASS is implemented, and that ecdsa_verify() works as expected. The definition of "expected" is "does not find a device, and returns -ENODEV". The lack of a hardware-independent ECDSA implementation prevents us from having one in the sandbox, for now. Signed-off-by: Alexandru Gagniuc <mr.nuke.me@gmail.com> Reviewed-by: Simon Glass <sjg@chromium.org> Reviewed-by: Patrick Delaunay <patrick.delaunay@foss.st.com>
39 lines
1.0 KiB
C
39 lines
1.0 KiB
C
// SPDX-License-Identifier: GPL-2.0-or-later
|
|
|
|
#include <crypto/ecdsa-uclass.h>
|
|
#include <dm.h>
|
|
#include <dm/test.h>
|
|
#include <test/ut.h>
|
|
#include <u-boot/ecdsa.h>
|
|
|
|
/*
|
|
* Basic test of the ECDSA uclass and ecdsa_verify()
|
|
*
|
|
* ECDSA implementations in u-boot are hardware-dependent. Until we have a
|
|
* software implementation that can be compiled into the sandbox, all we can
|
|
* test is the uclass support.
|
|
*
|
|
* The uclass_get() test is redundant since ecdsa_verify() would also fail. We
|
|
* run both functions in order to isolate the cause more clearly. i.e. is
|
|
* ecdsa_verify() failing because the UCLASS is absent/broken?
|
|
*/
|
|
static int dm_test_ecdsa_verify(struct unit_test_state *uts)
|
|
{
|
|
struct uclass *ucp;
|
|
|
|
struct checksum_algo algo = {
|
|
.checksum_len = 256,
|
|
};
|
|
|
|
struct image_sign_info info = {
|
|
.checksum = &algo,
|
|
};
|
|
|
|
ut_assertok(uclass_get(UCLASS_ECDSA, &ucp));
|
|
ut_assertnonnull(ucp);
|
|
ut_asserteq(-ENODEV, ecdsa_verify(&info, NULL, 0, NULL, 0));
|
|
|
|
return 0;
|
|
}
|
|
DM_TEST(dm_test_ecdsa_verify, UT_TESTF_SCAN_PDATA | UT_TESTF_SCAN_FDT);
|