Lines Matching refs:sha_algo

116 def test_vboot(u_boot_console, name, sha_algo, padding, sign_options, required,  argument
153 def run_bootm(sha_algo, test_type, expect_string, boots, fit=None): argument
171 with cons.log.section('Verified boot %s %s' % (sha_algo, test_type)):
183 def sign_fit(sha_algo, options): argument
197 cons.log.action('%s: Sign images' % sha_algo)
200 def sign_fit_dtb(sha_algo, options, dtb): argument
214 cons.log.action('%s: Sign images' % sha_algo)
217 def sign_fit_norequire(sha_algo, options): argument
231 cons.log.action('%s: Sign images' % sha_algo)
276 if sha_algo == "sha384":
290 def test_with_algo(sha_algo, padding, sign_options): argument
310 cons.log.action('%s: Test FIT with signed images' % sha_algo)
311 … make_fit('sign-images-%s%s.its' % (sha_algo, padding), cons, mkimage, dtc_args, datadir, fit)
312 run_bootm(sha_algo, 'unsigned images', ' - OK' if algo_arg else 'dev-', True)
315 sign_fit(sha_algo, sign_options)
316 run_bootm(sha_algo, 'signed images', 'dev+', True)
321 cons.log.action('%s: Test FIT with signed configuration' % sha_algo)
322 … make_fit('sign-configs-%s%s.its' % (sha_algo, padding), cons, mkimage, dtc_args, datadir, fit)
323 … run_bootm(sha_algo, 'unsigned config', '%s+ OK' % ('sha256' if algo_arg else sha_algo), True)
326 sign_fit(sha_algo, sign_options)
327 run_bootm(sha_algo, 'signed config', 'dev+', True)
329 cons.log.action('%s: Check signed config on the host' % sha_algo)
347 run_bootm(sha_algo, 'forged config', 'Bad Data Hash', False, ffit)
357 run_bootm(sha_algo, 'evil fakeroot', 'Bad FIT kernel image format',
369 run_bootm(sha_algo, 'evil kernel@', msg, False, efit)
372 … make_fit('sign-configs-%s%s.its' % (sha_algo, padding), cons, mkimage, dtc_args, datadir, fit)
373 sign_fit(sha_algo, sign_options)
377 run_bootm(sha_algo, 'Signed config with bad hash', 'Bad Data Hash',
379 cons.log.action('%s: Check overflowed FIT header totalsize' % sha_algo)
383 run_bootm(sha_algo, 'signed config', 'dev+', True)
384 cons.log.action('%s: Check default FIT header totalsize' % sha_algo)
396 run_bootm(sha_algo, 'Signed config with bad hash', 'Bad Data Hash',
399 cons.log.action('%s: Check bad config on the host' % sha_algo)
404 def test_required_key(sha_algo, padding, sign_options): argument
422 cons.log.action('%s: Test FIT with configs images' % sha_algo)
426 …make_fit('sign-configs-%s%s-prod.its' % (sha_algo, padding), cons, mkimage, dtc_args, datadir, fit)
427 sign_fit(sha_algo, sign_options)
431 … make_fit('sign-configs-%s%s.its' % (sha_algo, padding), cons, mkimage, dtc_args, datadir, fit)
432 sign_fit_norequire(sha_algo, sign_options)
439 run_bootm(sha_algo, 'required key', '', False)
443 … make_fit('sign-configs-%s%s.its' % (sha_algo, padding), cons, mkimage, dtc_args, datadir, fit)
444 sign_fit(sha_algo, sign_options)
454 run_bootm(sha_algo, 'multi required key', 'dev+', True)
464 run_bootm(sha_algo, 'multi required key', '', False)
466 def test_global_sign(sha_algo, padding, sign_options): argument
487 sign_fit_dtb(sha_algo, '', dtb)
498 run_bootm(sha_algo, 'global image signature',
505 run_bootm(sha_algo, 'global image signature',
509 run_bootm(sha_algo, 'global image signature', 'signature is mandatory', False)
542 test_global_sign(sha_algo, padding, sign_options)
544 test_required_key(sha_algo, padding, sign_options)
546 test_with_algo(sha_algo, padding, sign_options)
580 def test_fdt_add_pubkey(u_boot_console, name, sha_algo, padding, sign_options, algo_arg): argument
583 def sign_fit(sha_algo, options): argument
596 cons.log.action('%s: Sign images' % sha_algo)
599 def test_add_pubkey(sha_algo, padding, sign_options): argument
614 cons.log.action('%s: Test fdt_add_pubkey with signed configuration' % sha_algo)
616 … util.run_and_log(cons, [fdt_add_pubkey, '-a', '%s,%s' % ('sha256' if algo_arg else sha_algo, \
617 'rsa3072' if sha_algo == 'sha384' else 'rsa2048'),
620 … make_fit('sign-configs-%s%s.its' % (sha_algo, padding), cons, mkimage, dtc_args, datadir, fit)
623 sign_fit(sha_algo, sign_options)
643 test_add_pubkey(sha_algo, padding, sign_options)