Skip to content

Commit d7583e8

Browse files
committed
[ot] hw/opentitan: ot_otp: make OTP definitions use an OT_OTP prefix
Should start with OT_OTP, OtOtp, ot_otp to prevent from unexpected conflicts Signed-off-by: Emmanuel Blot <[email protected]>
1 parent b37b660 commit d7583e8

File tree

12 files changed

+347
-315
lines changed

12 files changed

+347
-315
lines changed

hw/opentitan/ot_keymgr.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1196,9 +1196,9 @@ static void ot_keymgr_get_root_key(OtKeyMgrState *s, OtOTPKeyMgrSecret *share0,
11961196
{
11971197
OtOTPIfClass *oc = OT_OTP_IF_GET_CLASS(s->otp_ctrl);
11981198
OtOTPIf *oi = OT_OTP_IF(s->otp_ctrl);
1199-
oc->get_keymgr_secret(oi, OTP_KEYMGR_SECRET_CREATOR_ROOT_KEY_SHARE0,
1199+
oc->get_keymgr_secret(oi, OT_OTP_KEYMGR_SECRET_CREATOR_ROOT_KEY_SHARE0,
12001200
share0);
1201-
oc->get_keymgr_secret(oi, OTP_KEYMGR_SECRET_CREATOR_ROOT_KEY_SHARE1,
1201+
oc->get_keymgr_secret(oi, OT_OTP_KEYMGR_SECRET_CREATOR_ROOT_KEY_SHARE1,
12021202
share1);
12031203

12041204
if (trace_event_get_state(TRACE_OT_KEYMGR_DUMP_CREATOR_ROOT_KEY)) {

hw/opentitan/ot_keymgr_dpe.c

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1029,7 +1029,7 @@ ot_keymgr_dpe_kdf_append_creator_seed(OtKeyMgrDpeState *s, bool *dvalid)
10291029

10301030
OtOTPIfClass *oc = OT_OTP_IF_GET_CLASS(s->otp_ctrl);
10311031
OtOTPIf *oi = OT_OTP_IF(s->otp_ctrl);
1032-
oc->get_keymgr_secret(oi, OTP_KEYMGR_SECRET_CREATOR_SEED, &secret);
1032+
oc->get_keymgr_secret(oi, OT_OTP_KEYMGR_SECRET_CREATOR_SEED, &secret);
10331033

10341034
ot_keymgr_dpe_kdf_push_bytes(s, secret.secret, OT_OTP_KEYMGR_SECRET_SIZE);
10351035
*dvalid &= ot_keymgr_dpe_valid_data_check(secret.secret,
@@ -1109,7 +1109,7 @@ ot_keymgr_dpe_kdf_append_owner_seed(OtKeyMgrDpeState *s, bool *dvalid)
11091109

11101110
OtOTPIfClass *oc = OT_OTP_IF_GET_CLASS(s->otp_ctrl);
11111111
OtOTPIf *oi = OT_OTP_IF(s->otp_ctrl);
1112-
oc->get_keymgr_secret(oi, OTP_KEYMGR_SECRET_OWNER_SEED, &secret);
1112+
oc->get_keymgr_secret(oi, OT_OTP_KEYMGR_SECRET_OWNER_SEED, &secret);
11131113

11141114
ot_keymgr_dpe_kdf_push_bytes(s, secret.secret, OT_OTP_KEYMGR_SECRET_SIZE);
11151115
*dvalid &= ot_keymgr_dpe_valid_data_check(secret.secret,
@@ -1449,9 +1449,9 @@ static void ot_keymgr_dpe_get_root_key(
14491449
{
14501450
OtOTPIfClass *oc = OT_OTP_IF_GET_CLASS(s->otp_ctrl);
14511451
OtOTPIf *oi = OT_OTP_IF(s->otp_ctrl);
1452-
oc->get_keymgr_secret(oi, OTP_KEYMGR_SECRET_CREATOR_ROOT_KEY_SHARE0,
1452+
oc->get_keymgr_secret(oi, OT_OTP_KEYMGR_SECRET_CREATOR_ROOT_KEY_SHARE0,
14531453
share0);
1454-
oc->get_keymgr_secret(oi, OTP_KEYMGR_SECRET_CREATOR_ROOT_KEY_SHARE1,
1454+
oc->get_keymgr_secret(oi, OT_OTP_KEYMGR_SECRET_CREATOR_ROOT_KEY_SHARE1,
14551455
share1);
14561456

14571457
if (trace_event_get_state(TRACE_OT_KEYMGR_DPE_DUMP_CREATOR_ROOT_KEY)) {

hw/opentitan/ot_lc_ctrl.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1192,9 +1192,9 @@ static uint32_t ot_lc_ctrl_load_lc_info(OtLcCtrlState *s)
11921192
g_assert(tokens);
11931193

11941194
uint32_t valid_bm = tokens->valid_bm;
1195-
for (unsigned otix = 0; otix < OTP_TOKEN_COUNT; otix++) {
1195+
for (unsigned otix = 0; otix < OT_OTP_TOKEN_COUNT; otix++) {
11961196
/* beware: LC controller and OTP controller do not use same indices */
1197-
unsigned ltix = otix + LC_TK_TEST_UNLOCK - OTP_TOKEN_TEST_UNLOCK;
1197+
unsigned ltix = otix + LC_TK_TEST_UNLOCK - OT_OTP_TOKEN_TEST_UNLOCK;
11981198
/* 'valid' is OT terminology, should be considered as 'defined' */
11991199
bool valid = (bool)(valid_bm & (1u << otix));
12001200
if (valid) {

hw/opentitan/ot_otp_dj.c

Lines changed: 29 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,8 @@
3030
* Based on OpenTitan 5fe6fe8605
3131
*/
3232

33+
#define OT_OTP_COMPORTABLE_REGS
34+
3335
#include "qemu/osdep.h"
3436
#include "qemu/log.h"
3537
#include "qom/object.h"
@@ -401,12 +403,18 @@ REG32(LC_STATE, 16344u)
401403
#define SW_CFG_WINDOW_OFFSET 0x4000u
402404
#define SW_CFG_WINDOW_SIZE (NUM_SW_CFG_WINDOW_WORDS * sizeof(uint32_t))
403405

406+
#define R32_OFF(_r_) ((_r_) / sizeof(uint32_t))
407+
404408
#define R_LAST_REG (R_SECRET3_DIGEST_1)
405409
#define REGS_COUNT (R_LAST_REG + 1u)
406410
#define REGS_SIZE (REGS_COUNT * sizeof(uint32_t))
407411
#define REG_NAME(_reg_) \
408412
((((_reg_) <= REGS_COUNT) && REG_NAMES[_reg_]) ? REG_NAMES[_reg_] : "?")
409413

414+
/* note: useless casts are required for GCC linter */
415+
static_assert((unsigned)R_STATUS == (unsigned)R_OTP_FIRST_IMPL_REG,
416+
"Invalid register address");
417+
410418
typedef enum {
411419
OTP_PART_VENDOR_TEST,
412420
OTP_PART_CREATOR_SW_CFG,
@@ -567,11 +575,13 @@ static const char *REG_NAMES[REGS_COUNT] = {
567575
};
568576
#undef REG_NAME_ENTRY
569577

578+
#define OT_OTP_NAME_ENTRY(_st_) [OT_OTP_##_st_] = stringify(OT_OTP_##_st_)
579+
570580
static const char *OTP_TOKEN_NAMES[] = {
571581
/* clang-format off */
572-
OTP_NAME_ENTRY(OTP_TOKEN_TEST_UNLOCK),
573-
OTP_NAME_ENTRY(OTP_TOKEN_TEST_EXIT),
574-
OTP_NAME_ENTRY(OTP_TOKEN_RMA),
582+
OT_OTP_NAME_ENTRY(TOKEN_TEST_UNLOCK),
583+
OT_OTP_NAME_ENTRY(TOKEN_TEST_EXIT),
584+
OT_OTP_NAME_ENTRY(TOKEN_RMA),
575585
/* clang-format on */
576586
};
577587

@@ -753,11 +763,11 @@ static void ot_otp_dj_reg_write(void *opaque, hwaddr addr, uint64_t value,
753763
s->regs[reg] &= val32; /* RW0C */
754764
break;
755765
case R_DIRECT_ACCESS_CMD:
756-
if (FIELD_EX32(val32, DIRECT_ACCESS_CMD, RD)) {
766+
if (FIELD_EX32(val32, OT_OTP_DIRECT_ACCESS_CMD, RD)) {
757767
c->dai_read(s);
758-
} else if (FIELD_EX32(val32, DIRECT_ACCESS_CMD, WR)) {
768+
} else if (FIELD_EX32(val32, OT_OTP_DIRECT_ACCESS_CMD, WR)) {
759769
c->dai_write(s);
760-
} else if (FIELD_EX32(val32, DIRECT_ACCESS_CMD, DIGEST)) {
770+
} else if (FIELD_EX32(val32, OT_OTP_DIRECT_ACCESS_CMD, DIGEST)) {
761771
c->dai_digest(s);
762772
}
763773
/* @todo implement ZEROIZE command */
@@ -771,7 +781,7 @@ static void ot_otp_dj_reg_write(void *opaque, hwaddr addr, uint64_t value,
771781
s->regs[reg] = val32;
772782
break;
773783
case R_VENDOR_TEST_READ_LOCK ... R_ROM_PATCH_READ_LOCK:
774-
val32 &= READ_LOCK_MASK;
784+
val32 &= OT_OTP_READ_LOCK_MASK;
775785
s->regs[reg] &= val32; /* RW0C */
776786
break;
777787
case R_CHECK_TRIGGER_REGWEN:
@@ -966,7 +976,7 @@ static MemTxResult ot_otp_dj_swcfg_read_with_attrs(
966976

967977
if (ot_otp_engine_is_buffered(s, part_ix)) {
968978
trace_ot_otp_access_error_on(s->ot_id, partition, addr, "buffered");
969-
c->set_error(s, part_ix, OTP_ACCESS_ERROR);
979+
c->set_error(s, part_ix, OT_OTP_ACCESS_ERROR);
970980

971981
/* real HW seems to stall the Tile Link bus in this case */
972982
return MEMTX_ACCESS_ERROR;
@@ -978,13 +988,13 @@ static MemTxResult ot_otp_dj_swcfg_read_with_attrs(
978988

979989
if (!is_readable && !(is_digest || is_zer)) {
980990
trace_ot_otp_access_error_on(s->ot_id, partition, addr, "not readable");
981-
c->set_error(s, part_ix, OTP_ACCESS_ERROR);
991+
c->set_error(s, part_ix, OT_OTP_ACCESS_ERROR);
982992

983993
return MEMTX_DECODE_ERROR;
984994
}
985995

986996
uint32_t val32 = s->otp->data[reg];
987-
c->set_error(s, part_ix, OTP_NO_ERROR);
997+
c->set_error(s, part_ix, OT_OTP_NO_ERROR);
988998

989999
uint64_t pc;
9901000

@@ -1039,21 +1049,21 @@ static void ot_otp_dj_get_keymgr_secret(
10391049
size_t offset;
10401050

10411051
switch (type) {
1042-
case OTP_KEYMGR_SECRET_CREATOR_ROOT_KEY_SHARE0:
1052+
case OT_OTP_KEYMGR_SECRET_CREATOR_ROOT_KEY_SHARE0:
10431053
partition = OTP_PART_SECRET2;
10441054
offset =
10451055
A_SECRET2_CREATOR_ROOT_KEY_SHARE0 - s->part_descs[partition].offset;
10461056
break;
1047-
case OTP_KEYMGR_SECRET_CREATOR_ROOT_KEY_SHARE1:
1057+
case OT_OTP_KEYMGR_SECRET_CREATOR_ROOT_KEY_SHARE1:
10481058
partition = OTP_PART_SECRET2;
10491059
offset =
10501060
A_SECRET2_CREATOR_ROOT_KEY_SHARE1 - s->part_descs[partition].offset;
10511061
break;
1052-
case OTP_KEYMGR_SECRET_CREATOR_SEED:
1062+
case OT_OTP_KEYMGR_SECRET_CREATOR_SEED:
10531063
partition = OTP_PART_SECRET2;
10541064
offset = A_SECRET2_CREATOR_SEED - s->part_descs[partition].offset;
10551065
break;
1056-
case OTP_KEYMGR_SECRET_OWNER_SEED:
1066+
case OT_OTP_KEYMGR_SECRET_OWNER_SEED:
10571067
partition = OTP_PART_SECRET3;
10581068
offset = A_SECRET3_OWNER_SEED - s->part_descs[partition].offset;
10591069
break;
@@ -1135,20 +1145,20 @@ static void ot_otp_dj_pwr_load_tokens(OtOTPEngineState *s)
11351145

11361146
static_assert(sizeof(OtOTPTokenValue) == 16u, "Invalid token size");
11371147

1138-
for (unsigned tkx = 0; tkx < OTP_TOKEN_COUNT; tkx++) {
1148+
for (unsigned tkx = 0; tkx < OT_OTP_TOKEN_COUNT; tkx++) {
11391149
unsigned partition;
11401150
uint32_t secret_addr;
11411151

11421152
switch (tkx) {
1143-
case OTP_TOKEN_TEST_UNLOCK:
1153+
case OT_OTP_TOKEN_TEST_UNLOCK:
11441154
partition = (unsigned)OTP_PART_SECRET0;
11451155
secret_addr = A_SECRET0_TEST_UNLOCK_TOKEN;
11461156
break;
1147-
case OTP_TOKEN_TEST_EXIT:
1157+
case OT_OTP_TOKEN_TEST_EXIT:
11481158
partition = (unsigned)OTP_PART_SECRET0;
11491159
secret_addr = A_SECRET0_TEST_EXIT_TOKEN;
11501160
break;
1151-
case OTP_TOKEN_RMA:
1161+
case OT_OTP_TOKEN_RMA:
11521162
partition = (unsigned)OTP_PART_SECRET2;
11531163
secret_addr = A_SECRET2_RMA_TOKEN;
11541164
break;
@@ -1299,7 +1309,7 @@ static void ot_otp_dj_class_init(ObjectClass *klass, void *data)
12991309
ic->has_flash_support = false;
13001310
ic->has_zer_support = true;
13011311

1302-
g_assert(OT_OTP_KEY_SEEDS[OTP_KEY_SRAM].size ==
1312+
g_assert(OT_OTP_KEY_SEEDS[OT_OTP_KEY_SRAM].size ==
13031313
SECRET1_SRAM_DATA_KEY_SEED_SIZE);
13041314
}
13051315

hw/opentitan/ot_otp_dj_parts.c

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -359,13 +359,13 @@ static const OtOTPPartDesc OT_OTP_PART_DESCS[] = {
359359

360360
#define OTP_PART_COUNT ARRAY_SIZE(OT_OTP_PART_DESCS)
361361

362-
static const OtOTPKeySeed OT_OTP_KEY_SEEDS[OTP_KEY_COUNT] = {
363-
[OTP_KEY_OTBN] = {
362+
static const OtOTPKeySeed OT_OTP_KEY_SEEDS[OT_OTP_KEY_COUNT] = {
363+
[OT_OTP_KEY_OTBN] = {
364364
.partition = OTP_PART_SECRET1,
365365
.offset = 0,
366366
.size = 16,
367367
},
368-
[OTP_KEY_SRAM] = {
368+
[OT_OTP_KEY_SRAM] = {
369369
.partition = OTP_PART_SECRET1,
370370
.offset = 0,
371371
.size = 16,

hw/opentitan/ot_otp_eg.c

Lines changed: 31 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,8 @@
2828
* THE SOFTWARE.
2929
*/
3030

31+
#define OT_OTP_COMPORTABLE_REGS
32+
3133
#include "qemu/osdep.h"
3234
#include "qemu/log.h"
3335
#include "qom/object.h"
@@ -350,12 +352,18 @@ REG32(LC_STATE, 2008u)
350352
#define SW_CFG_WINDOW_OFFSET 0x800u
351353
#define SW_CFG_WINDOW_SIZE (NUM_SW_CFG_WINDOW_WORDS * sizeof(uint32_t))
352354

355+
#define R32_OFF(_r_) ((_r_) / sizeof(uint32_t))
356+
353357
#define R_LAST_REG (R_SECRET2_DIGEST_1)
354358
#define REGS_COUNT (R_LAST_REG + 1u)
355359
#define REGS_SIZE (REGS_COUNT * sizeof(uint32_t))
356360
#define REG_NAME(_reg_) \
357361
((((_reg_) <= REGS_COUNT) && REG_NAMES[_reg_]) ? REG_NAMES[_reg_] : "?")
358362

363+
/* note: useless casts are required for GCC linter */
364+
static_assert((unsigned)R_STATUS == (unsigned)R_OTP_FIRST_IMPL_REG,
365+
"Invalid register address");
366+
359367
typedef enum {
360368
OTP_PART_VENDOR_TEST,
361369
OTP_PART_CREATOR_SW_CFG,
@@ -466,11 +474,13 @@ static const char *REG_NAMES[REGS_COUNT] = {
466474
};
467475
#undef REG_NAME_ENTRY
468476

477+
#define OT_OTP_NAME_ENTRY(_st_) [OT_OTP_##_st_] = stringify(OT_OTP_##_st_)
478+
469479
static const char *OTP_TOKEN_NAMES[] = {
470480
/* clang-format off */
471-
OTP_NAME_ENTRY(OTP_TOKEN_TEST_UNLOCK),
472-
OTP_NAME_ENTRY(OTP_TOKEN_TEST_EXIT),
473-
OTP_NAME_ENTRY(OTP_TOKEN_RMA),
481+
OT_OTP_NAME_ENTRY(TOKEN_TEST_UNLOCK),
482+
OT_OTP_NAME_ENTRY(TOKEN_TEST_EXIT),
483+
OT_OTP_NAME_ENTRY(TOKEN_RMA),
474484
/* clang-format on */
475485
};
476486

@@ -652,11 +662,11 @@ static void ot_otp_eg_reg_write(void *opaque, hwaddr addr, uint64_t value,
652662
s->regs[reg] &= val32; /* RW0C */
653663
break;
654664
case R_DIRECT_ACCESS_CMD:
655-
if (FIELD_EX32(val32, DIRECT_ACCESS_CMD, RD)) {
665+
if (FIELD_EX32(val32, OT_OTP_DIRECT_ACCESS_CMD, RD)) {
656666
c->dai_read(s);
657-
} else if (FIELD_EX32(val32, DIRECT_ACCESS_CMD, WR)) {
667+
} else if (FIELD_EX32(val32, OT_OTP_DIRECT_ACCESS_CMD, WR)) {
658668
c->dai_write(s);
659-
} else if (FIELD_EX32(val32, DIRECT_ACCESS_CMD, DIGEST)) {
669+
} else if (FIELD_EX32(val32, OT_OTP_DIRECT_ACCESS_CMD, DIGEST)) {
660670
c->dai_digest(s);
661671
}
662672
break;
@@ -669,7 +679,7 @@ static void ot_otp_eg_reg_write(void *opaque, hwaddr addr, uint64_t value,
669679
s->regs[reg] = val32;
670680
break;
671681
case R_VENDOR_TEST_READ_LOCK ... R_ROT_CREATOR_AUTH_STATE_READ_LOCK:
672-
val32 &= READ_LOCK_MASK;
682+
val32 &= OT_OTP_READ_LOCK_MASK;
673683
s->regs[reg] &= val32; /* RW0C */
674684
break;
675685
case R_CHECK_TRIGGER_REGWEN:
@@ -862,7 +872,7 @@ static MemTxResult ot_otp_eg_swcfg_read_with_attrs(
862872

863873
if (ot_otp_engine_is_buffered(s, part_ix)) {
864874
trace_ot_otp_access_error_on(s->ot_id, partition, addr, "buffered");
865-
c->set_error(s, part_ix, OTP_ACCESS_ERROR);
875+
c->set_error(s, part_ix, OT_OTP_ACCESS_ERROR);
866876

867877
/* real HW seems to stall the Tile Link bus in this case */
868878
return MEMTX_ACCESS_ERROR;
@@ -874,13 +884,13 @@ static MemTxResult ot_otp_eg_swcfg_read_with_attrs(
874884

875885
if (!is_readable && !(is_digest || is_zer)) {
876886
trace_ot_otp_access_error_on(s->ot_id, partition, addr, "not readable");
877-
c->set_error(s, part_ix, OTP_ACCESS_ERROR);
887+
c->set_error(s, part_ix, OT_OTP_ACCESS_ERROR);
878888

879889
return MEMTX_DECODE_ERROR;
880890
}
881891

882892
uint32_t val32 = s->otp->data[reg];
883-
c->set_error(s, part_ix, OTP_NO_ERROR);
893+
c->set_error(s, part_ix, OT_OTP_NO_ERROR);
884894

885895
uint64_t pc;
886896

@@ -934,18 +944,18 @@ static void ot_otp_eg_get_keymgr_secret(
934944
size_t offset;
935945

936946
switch (type) {
937-
case OTP_KEYMGR_SECRET_CREATOR_ROOT_KEY_SHARE0:
947+
case OT_OTP_KEYMGR_SECRET_CREATOR_ROOT_KEY_SHARE0:
938948
partition = OTP_PART_SECRET2;
939949
offset =
940950
A_SECRET2_CREATOR_ROOT_KEY_SHARE0 - s->part_descs[partition].offset;
941951
break;
942-
case OTP_KEYMGR_SECRET_CREATOR_ROOT_KEY_SHARE1:
952+
case OT_OTP_KEYMGR_SECRET_CREATOR_ROOT_KEY_SHARE1:
943953
partition = OTP_PART_SECRET2;
944954
offset =
945955
A_SECRET2_CREATOR_ROOT_KEY_SHARE1 - s->part_descs[partition].offset;
946956
break;
947-
case OTP_KEYMGR_SECRET_CREATOR_SEED:
948-
case OTP_KEYMGR_SECRET_OWNER_SEED:
957+
case OT_OTP_KEYMGR_SECRET_CREATOR_SEED:
958+
case OT_OTP_KEYMGR_SECRET_OWNER_SEED:
949959
default:
950960
error_report("%s: %s: invalid OTP keymgr secret type: %d", __func__,
951961
s->ot_id, type);
@@ -1022,20 +1032,20 @@ static void ot_otp_eg_pwr_load_tokens(OtOTPEngineState *s)
10221032

10231033
static_assert(sizeof(OtOTPTokenValue) == 16u, "Invalid token size");
10241034

1025-
for (unsigned tkx = 0; tkx < OTP_TOKEN_COUNT; tkx++) {
1035+
for (unsigned tkx = 0; tkx < OT_OTP_TOKEN_COUNT; tkx++) {
10261036
unsigned partition;
10271037
uint32_t secret_addr;
10281038

10291039
switch (tkx) {
1030-
case OTP_TOKEN_TEST_UNLOCK:
1040+
case OT_OTP_TOKEN_TEST_UNLOCK:
10311041
partition = (unsigned)OTP_PART_SECRET0;
10321042
secret_addr = A_SECRET0_TEST_UNLOCK_TOKEN;
10331043
break;
1034-
case OTP_TOKEN_TEST_EXIT:
1044+
case OT_OTP_TOKEN_TEST_EXIT:
10351045
partition = (unsigned)OTP_PART_SECRET0;
10361046
secret_addr = A_SECRET0_TEST_EXIT_TOKEN;
10371047
break;
1038-
case OTP_TOKEN_RMA:
1048+
case OT_OTP_TOKEN_RMA:
10391049
partition = (unsigned)OTP_PART_SECRET2;
10401050
secret_addr = A_SECRET2_RMA_TOKEN;
10411051
break;
@@ -1181,11 +1191,11 @@ static void ot_otp_eg_class_init(ObjectClass *klass, void *data)
11811191
ic->part_descs[part_ix].zer_offset == UINT16_MAX);
11821192
}
11831193

1184-
g_assert(OT_OTP_KEY_SEEDS[OTP_KEY_FLASH_ADDR].size ==
1194+
g_assert(OT_OTP_KEY_SEEDS[OT_OTP_KEY_FLASH_ADDR].size ==
11851195
SECRET1_FLASH_ADDR_KEY_SEED_SIZE);
1186-
g_assert(OT_OTP_KEY_SEEDS[OTP_KEY_FLASH_DATA].size ==
1196+
g_assert(OT_OTP_KEY_SEEDS[OT_OTP_KEY_FLASH_DATA].size ==
11871197
SECRET1_FLASH_DATA_KEY_SEED_SIZE);
1188-
g_assert(OT_OTP_KEY_SEEDS[OTP_KEY_SRAM].size ==
1198+
g_assert(OT_OTP_KEY_SEEDS[OT_OTP_KEY_SRAM].size ==
11891199
SECRET1_SRAM_DATA_KEY_SEED_SIZE);
11901200
}
11911201

0 commit comments

Comments
 (0)