1From a7caa35eff3487c0bd777f7df6f5337219b8d9dd Mon Sep 17 00:00:00 2001
2From: Jens Wiklander <jens.wiklander@linaro.org>
3Date: Tue, 7 Jul 2020 11:17:14 +0200
4Subject: [PATCH 09/11] TEE_Internal_API.xml
5
6Disabling cases:
7- Invoke_CheckMemoryAccessRight_BufferRead_AccessWrite_error (a7-35-f1)
8- Invoke_CheckMemoryAccessRight_BufferWrite_AccessRead_error (a7-98-4b)
9As OP-TEE doesn't check the direction of the passed memrefs
10
11Disabling the case:
12- Invoke_GetCancellationFlag_RequestedCancel (a7-71-11
13Because the adaption layer we've implemented cannot deal with threads in
14a good way.
15
16Disabling the case:
17- Invoke_GetPropertyAsBinaryBlock_withoutEnum_success (a7-26-c1)
18Because it assumes base64 coded binary properties and is also
19in the list of excluded conformance tests.
20
21Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
22---
23 packages/TrustedCoreFw/xmlstable/TEE_Internal_API.xml | 8 ++++++++
24 1 file changed, 8 insertions(+)
25
26diff --git a/packages/TrustedCoreFw/xmlstable/TEE_Internal_API.xml b/packages/TrustedCoreFw/xmlstable/TEE_Internal_API.xml
27index f9824238451a..0e96e3bde8e9 100644
28--- a/packages/TrustedCoreFw/xmlstable/TEE_Internal_API.xml
29+++ b/packages/TrustedCoreFw/xmlstable/TEE_Internal_API.xml
30@@ -523,6 +523,7 @@
31                 </call>
32             </postamble>
33         </scenario>
34+<!-- CheckMemoryAccessRight
35         <scenario name="Invoke_CheckMemoryAccessRight_BufferRead_AccessWrite_error (a7-35-f1)" destructive="no">
36             <req name="CHECK_MEMORY_ACCESS_RIGHTS_ACCESS_DENIED">
37                 <description><![CDATA[The TEE_CheckMemoryAccessRights function causes the Implementation to examine a buffer of memory specified in the parameters buffer and size and to determine whether the current Trusted Application instance has the access rights requested in the arameter accessFlags. If the characteristics of the buffer are compatible with accessFlags, then the function returns TEE_SUCCESS. Otherwise, it returns TEE_ERROR_ACCESS_DENIED.]]></description>
38@@ -697,6 +698,7 @@
39                 </call>
40             </postamble>
41         </scenario>
42+-->
43         <scenario name="Invoke_CheckMemoryAccessRight_BufferShared_AccessAnyOwnerNotSet_error (a7-99-f7)" destructive="no">
44             <req name="CHECK_MEMORY_ACCESS_RIGHTS_ACCESS_DENIED">
45                 <description><![CDATA[The TEE_CheckMemoryAccessRights function causes the Implementation to examine a buffer of memory specified in the parameters buffer and size and to determine whether the current Trusted Application instance has the access rights requested in the arameter accessFlags. If the characteristics of the buffer are compatible with accessFlags, then the function returns TEE_SUCCESS. Otherwise, it returns TEE_ERROR_ACCESS_DENIED.]]></description>
46@@ -1045,6 +1047,7 @@
47                 </call>
48             </postamble>
49         </scenario>
50+<!-- CheckMemoryAccessRight
51         <scenario name="Invoke_CheckMemoryAccessRight_BufferWrite_AccessRead_error (a7-98-4b)" destructive="no">
52             <req name="CHECK_MEMORY_ACCESS_RIGHTS_ACCESS_DENIED">
53                 <description><![CDATA[The TEE_CheckMemoryAccessRights function causes the Implementation to examine a buffer of memory specified in the parameters buffer and size and to determine whether the current Trusted Application instance has the access rights requested in the arameter accessFlags. If the characteristics of the buffer are compatible with accessFlags, then the function returns TEE_SUCCESS. Otherwise, it returns TEE_ERROR_ACCESS_DENIED.]]></description>
54@@ -1219,6 +1222,7 @@
55                 </call>
56             </postamble>
57         </scenario>
58+-->
59         <scenario name="Invoke_CheckMemoryAccessRight_BufferWrite_AccessWrite_success (a7-32-44)" destructive="no">
60             <req name="CHECK_MEMORY_ACCESS_RIGHTS_OK">
61                 <description><![CDATA[The TEE_CheckMemoryAccessRights function causes the Implementation to examine a buffer of memory specified in the parameters buffer and size and to determine whether the current Trusted Application instance has the access rights requested in the arameter accessFlags. If the characteristics of the buffer are compatible with accessFlags, then the function returns TEE_SUCCESS. Otherwise, it returns TEE_ERROR_ACCESS_DENIED.]]></description>
62@@ -2254,6 +2258,7 @@
63                 </call>
64             </postamble>
65         </scenario>
66+<!-- cancellation
67         <scenario name="Invoke_GetCancellationFlag_RequestedCancel (a7-71-11)" destructive="no">
68             <req name="GET_CANCELLATION_FLAG">
69                 <description><![CDATA[The TEE_GetCancellationFlag function determines whether the current task’s Cancellation Flag is set. If cancellations are masked, this function MUST return false. This function cannot panic.]]></description>
70@@ -2524,6 +2529,7 @@
71                 </call>
72             </postamble>
73         </scenario>
74+-->
75         <scenario name="Invoke_GetInstanceData_noPreviousSetInstance_null (a7-7d-9b)" destructive="no">
76             <req name="GET_INSTANCE_DATA_SUCCESS">
77                 <description><![CDATA[The TEE_GetInstanceData function retrieves the instance data pointer set by the Trusted Application using the TEE_GetInstanceData function. Return Value: The value returned is the previously set pointer to the Trusted Application instance data, or NULL if no instance data pointer has yet been set.]]></description>
78@@ -3716,6 +3722,7 @@
79                 </call>
80             </postamble>
81         </scenario>
82+<!--
83         <scenario name="Invoke_GetPropertyAsBinaryBlock_withoutEnum_success (a7-26-c1)" destructive="no">
84             <req name="CLOSE_SESSION_ENTRY_POINT_SUCCESS">
85                 <description><![CDATA[The Trusted Application implementation is responsible for freeing any resources consumed by the session being closed. Note that the Trusted Application cannot refuse to close a session, but can hold the closing until it returns from TA_CloseSessionEntryPoint. This is why this function cannot return a return code.]]></description>
86@@ -3920,6 +3927,7 @@
87                 </call>
88             </postamble>
89         </scenario>
90+-->
91         <scenario name="Invoke_GetPropertyAsBool_withoutEnum_badFormat_error (a7-63-46)" destructive="no">
92             <req name="GET_PROPERTY_AS_BOOL_ERROR_BAD_FORMAT">
93                 <description><![CDATA[If the property value cannot be converted to a boolean]]></description>
94--
952.25.1
96
97