Merge branch 'feat/enable_security_test_cases_for_c5_and_c61' into 'master'

feat: enable security related testcases for c5 and c61

Closes IDF-10043 and IDF-10102

See merge request espressif/esp-idf!34325
This commit is contained in:
Mahavir Jain 2024-10-25 16:56:45 +08:00
commit cace647843
3 changed files with 16 additions and 28 deletions

View File

@ -27,6 +27,7 @@ def test_mbedtls_esp32_compiler_perf_opt(dut: Dut) -> None:
@pytest.mark.esp32s2
@pytest.mark.esp32s3
@pytest.mark.esp32c3
@pytest.mark.esp32c5
@pytest.mark.generic
@pytest.mark.parametrize(
'config',
@ -43,6 +44,7 @@ def test_mbedtls_aes_no_hw(dut: Dut) -> None:
@pytest.mark.esp32s2
@pytest.mark.esp32s3
@pytest.mark.esp32c5
@pytest.mark.esp32c61
@pytest.mark.generic
@pytest.mark.parametrize(
'config',

View File

@ -552,11 +552,9 @@ def test_examples_efuse_with_virt_secure_boot_v2_pre_loaded(dut: Dut) -> None:
@pytest.mark.esp32c3
@pytest.mark.esp32c2
# TODO: [ESP32C5] IDF-10043
# @pytest.mark.esp32c5
# TODO: [ESP32C61] IDF-10102
# @pytest.mark.esp32c61
@pytest.mark.esp32c5
@pytest.mark.esp32c6
@pytest.mark.esp32c61
@pytest.mark.esp32h2
@pytest.mark.esp32p4
@pytest.mark.esp32s2
@ -629,11 +627,9 @@ def test_examples_efuse_with_virt_secure_boot_v2_esp32xx(dut: Dut) -> None:
@pytest.mark.esp32c3
@pytest.mark.esp32c2
# TODO: [ESP32C5] IDF-10043
# @pytest.mark.esp32c5
# TODO: [ESP32C61] IDF-10102
# @pytest.mark.esp32c61
@pytest.mark.esp32c5
@pytest.mark.esp32c6
@pytest.mark.esp32c61
@pytest.mark.esp32h2
@pytest.mark.esp32p4
@pytest.mark.esp32s2

View File

@ -80,10 +80,8 @@ def dut_start_secure_app(dut: Dut) -> None:
# Test secure boot flow.
# Correctly signed bootloader + correctly signed app should work
@pytest.mark.esp32c3
# TODO: [ESP32C5] IDF-10043
# @pytest.mark.esp32c5
# TODO: [ESP32C5] IDF-10102
# @pytest.mark.esp32c61
@pytest.mark.esp32c5
@pytest.mark.esp32c61
@pytest.mark.esp32s3
@pytest.mark.esp32p4
def test_examples_security_secure_boot(dut: Dut) -> None:
@ -96,10 +94,8 @@ def test_examples_security_secure_boot(dut: Dut) -> None:
# Test efuse key index and key block combination.
# Any key index can be written to any key block and should work
@pytest.mark.esp32c3
# TODO: [ESP32C5] IDF-10043
# @pytest.mark.esp32c5
# TODO: [ESP32C5] IDF-10102
# @pytest.mark.esp32c61
@pytest.mark.esp32c5
@pytest.mark.esp32c61
@pytest.mark.esp32s3
@pytest.mark.esp32p4
# Increasing the test timeout to 1200s as the test runs for 18 iterations
@ -122,10 +118,8 @@ def test_examples_security_secure_boot_key_combo(dut: Dut) -> None:
# Test secure boot key revoke.
# If a key is revoked, bootloader signed with that key should fail verification
@pytest.mark.esp32c3
# TODO: [ESP32C5] IDF-10043
# @pytest.mark.esp32c5
# TODO: [ESP32C5] IDF-10102
# @pytest.mark.esp32c61
@pytest.mark.esp32c5
@pytest.mark.esp32c61
@pytest.mark.esp32s3
@pytest.mark.esp32p4
def test_examples_security_secure_boot_key_revoke(dut: Dut) -> None:
@ -145,10 +139,8 @@ def test_examples_security_secure_boot_key_revoke(dut: Dut) -> None:
# Test bootloader signature corruption.
# Corrupt one byte at a time of bootloader signature and test that the verification fails
@pytest.mark.esp32c3
# TODO: [ESP32C5] IDF-10043
# @pytest.mark.esp32c5
# TODO: [ESP32C5] IDF-10102
# @pytest.mark.esp32c61
@pytest.mark.esp32c5
@pytest.mark.esp32c61
@pytest.mark.esp32s3
@pytest.mark.esp32p4
@pytest.mark.timeout(18000)
@ -186,10 +178,8 @@ def test_examples_security_secure_boot_corrupt_bl_sig(dut: Dut) -> None:
# Test app signature corruption.
# Corrupt app signature, one byte at a time, and test that the verification fails
@pytest.mark.esp32c3
# TODO: [ESP32C5] IDF-10043
# @pytest.mark.esp32c5
# TODO: [ESP32C5] IDF-10102
# @pytest.mark.esp32c61
@pytest.mark.esp32c5
@pytest.mark.esp32c61
@pytest.mark.esp32s3
@pytest.mark.esp32p4
@pytest.mark.timeout(18000)