BL1: differentiate between BL1_1 and BL1_2 funcs
To prevent issues when linking
Change-Id: I15697df529ccee9866e4f6163c9b4c836eaf7749
Signed-off-by: Raef Coles <raef.coles@arm.com>
diff --git a/tests_reg/test/bl1/bl1_1/suites/integration/bl1_1_integration_tests.c b/tests_reg/test/bl1/bl1_1/suites/integration/bl1_1_integration_tests.c
index e7c8b27..0612b6a 100644
--- a/tests_reg/test/bl1/bl1_1/suites/integration/bl1_1_integration_tests.c
+++ b/tests_reg/test/bl1/bl1_1/suites/integration/bl1_1_integration_tests.c
@@ -24,7 +24,7 @@
memset(bad_image, 0, BL1_2_CODE_SIZE);
- FIH_CALL(validate_image_at_addr, fih_rc, bad_image);
+ FIH_CALL(bl1_1_validate_image_at_addr, fih_rc, bad_image);
if (fih_eq(fih_rc, FIH_SUCCESS)) {
TEST_FAIL("Bad image was successfully validated");
return;
@@ -48,7 +48,7 @@
bad_image[0] ^= 0xFF;
- FIH_CALL(validate_image_at_addr, fih_rc, bad_image);
+ FIH_CALL(bl1_1_validate_image_at_addr, fih_rc, bad_image);
if (fih_eq(fih_rc, FIH_SUCCESS)) {
TEST_FAIL("Bad image was successfully validated");
return;
@@ -71,7 +71,7 @@
bad_image[BL1_2_CODE_SIZE - 1] ^= 0xFF;
- FIH_CALL(validate_image_at_addr, fih_rc, bad_image);
+ FIH_CALL(bl1_1_validate_image_at_addr, fih_rc, bad_image);
if (fih_eq(fih_rc, FIH_SUCCESS)) {
TEST_FAIL("Bad image was successfully validated");
return;
diff --git a/tests_reg/test/bl1/bl1_2/suites/integration/bl1_2_integration_tests.c b/tests_reg/test/bl1/bl1_2/suites/integration/bl1_2_integration_tests.c
index 4e8ec17..7a6e081 100644
--- a/tests_reg/test/bl1/bl1_2/suites/integration/bl1_2_integration_tests.c
+++ b/tests_reg/test/bl1/bl1_2/suites/integration/bl1_2_integration_tests.c
@@ -24,7 +24,7 @@
FIH_CALL(copy_and_decrypt_image, fih_rc, 0);
if (fih_eq(fih_rc, FIH_SUCCESS)) {
- FIH_CALL(validate_image_at_addr, fih_rc, *image);
+ FIH_CALL(bl1_2_validate_image_at_addr, fih_rc, *image);
if (fih_eq(fih_rc, FIH_SUCCESS)) {
return 0;
}
@@ -32,7 +32,7 @@
FIH_CALL(copy_and_decrypt_image, fih_rc, 1);
if (fih_eq(fih_rc, FIH_SUCCESS)) {
- FIH_CALL(validate_image_at_addr, fih_rc, *image);
+ FIH_CALL(bl1_2_validate_image_at_addr, fih_rc, *image);
if (fih_eq(fih_rc, FIH_SUCCESS)) {
return 0;
}
@@ -53,7 +53,7 @@
memset(image, 0, sizeof(struct bl1_2_image_t));
- FIH_CALL(validate_image_at_addr, fih_rc, image);
+ FIH_CALL(bl1_2_validate_image_at_addr, fih_rc, image);
if (fih_eq(fih_rc, FIH_SUCCESS)) {
TEST_FAIL("Bad image was successfully validated");
return;
@@ -75,7 +75,7 @@
image->protected_values.encrypted_data.data[0] ^= 0xFF;
- FIH_CALL(validate_image_at_addr, fih_rc, image);
+ FIH_CALL(bl1_2_validate_image_at_addr, fih_rc, image);
if (fih_eq(fih_rc, FIH_SUCCESS)) {
TEST_FAIL("Bad image was successfully validated");
return;
@@ -97,7 +97,7 @@
image->protected_values.encrypted_data.data[IMAGE_BL2_CODE_SIZE - 1] ^= 0xFF;
- FIH_CALL(validate_image_at_addr, fih_rc, image);
+ FIH_CALL(bl1_2_validate_image_at_addr, fih_rc, image);
if (fih_eq(fih_rc, FIH_SUCCESS)) {
TEST_FAIL("Bad image was successfully validated");
return;
@@ -120,7 +120,7 @@
image->protected_values.security_counter = 0;
- FIH_CALL(validate_image_at_addr, fih_rc, image);
+ FIH_CALL(bl1_2_validate_image_at_addr, fih_rc, image);
if (fih_eq(fih_rc, FIH_SUCCESS)) {
TEST_FAIL("Bad image was successfully validated");
return;