All of lore.kernel.org
 help / color / mirror / Atom feed
From: Simon Glass <sjg@chromium.org>
To: u-boot@lists.denx.de
Subject: [PATCH 2/3] cmd: SCP03: enable and provision command
Date: Mon, 8 Feb 2021 10:08:04 -0700	[thread overview]
Message-ID: <CAPnjgZ3oZPUsysNQN5WjVB03tVJ=NCEUie9F9wnSD8f4Rpz=ww@mail.gmail.com> (raw)
In-Reply-To: <20210207181118.GA10270@trex>

Hi Jorge,

On Sun, 7 Feb 2021 at 11:11, Jorge Ramirez-Ortiz, Foundries
<jorge@foundries.io> wrote:
>
> On 07/02/21, Simon Glass wrote:
> > Hi Jorge,
> >
> > On Sat, 6 Feb 2021 at 16:05, Jorge Ramirez-Ortiz <jorge@foundries.io> wrote:
> > >
> > > Enable and provision the SCP03 keys on a TEE controlled secured elemt
> > > from the U-Boot shell.
> > >
> > > Signed-off-by: Jorge Ramirez-Ortiz <jorge@foundries.io>
> > > ---
> > >  cmd/Kconfig  |  9 ++++++++
> > >  cmd/Makefile |  3 +++
> > >  cmd/scp03.c  | 64 ++++++++++++++++++++++++++++++++++++++++++++++++++++
> > >  3 files changed, 76 insertions(+)
> > >  create mode 100644 cmd/scp03.c
> >
> > Can we have a test for this please? See mem_search.c for an example.
>
> you mean other than what I posted already (the sandbox test using the
> TEE emulator)?
>
> I am not really sure what else can it do: this command sends a request
> to a TEE and waits to a response (and both are emulated on the sandbox).

It should just be a few lines of code to test the basics. E.g.:

https://github.com/u-boot/u-boot/blob/3936fd998668846f77468d8f6a662e906920969c/test/cmd/test_echo.c#L42

Regards,
Simon

  reply	other threads:[~2021-02-08 17:08 UTC|newest]

Thread overview: 9+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-02-06 23:05 [PATCH 1/3] common: SCP03 control (enable and provision of keys) Jorge Ramirez-Ortiz
2021-02-06 23:05 ` [PATCH] drivers: tee: sandbox: secure channel protocol control Jorge Ramirez-Ortiz
2021-02-06 23:05 ` [PATCH 2/3] cmd: SCP03: enable and provision command Jorge Ramirez-Ortiz
2021-02-07 14:37   ` Simon Glass
2021-02-07 18:11     ` Jorge
2021-02-08 17:08       ` Simon Glass [this message]
2021-02-08 20:18         ` Jorge
2021-02-06 23:05 ` [PATCH 3/3] drivers: tee: sandbox: secure channel protocol control Jorge Ramirez-Ortiz
2021-02-07 14:37   ` Simon Glass

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to='CAPnjgZ3oZPUsysNQN5WjVB03tVJ=NCEUie9F9wnSD8f4Rpz=ww@mail.gmail.com' \
    --to=sjg@chromium.org \
    --cc=u-boot@lists.denx.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.