diff options
author | Gaurav Shah <gauravsh@google.com> | 2010-02-26 15:09:43 -0800 |
---|---|---|
committer | Gaurav Shah <gauravsh@google.com> | 2010-02-26 15:09:43 -0800 |
commit | 23a2f3a6c5c706fe4a0ca7c1b6f4bb26eb5ef436 (patch) | |
tree | 20f49ccaf80c7ed051878082e03cd857337e6a92 /tests/firmware_image_tests.c | |
parent | 7d122e2a47145ef535163744daa55cec54e12b16 (diff) | |
download | vboot-23a2f3a6c5c706fe4a0ca7c1b6f4bb26eb5ef436.tar.gz |
Vboot reference: A basic user-land verified boot firmware signing and verification utility.
This is a first cut at what I envision as a utility we can use to manage our firmware/kernel signing needs. Currently, it implements firmware signing (given a binary image, create a verified boot header) and verification (given a verified boot image, verify it using the given public root key).
This CL also fixes the ReadFirmwareImage function from firmware_image to make it more consistent and fixes some bugs.
Review URL: http://codereview.chromium.org/652216
Diffstat (limited to 'tests/firmware_image_tests.c')
-rw-r--r-- | tests/firmware_image_tests.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/tests/firmware_image_tests.c b/tests/firmware_image_tests.c index 40018d7d..11eb4760 100644 --- a/tests/firmware_image_tests.c +++ b/tests/firmware_image_tests.c @@ -154,7 +154,7 @@ int VerifyFirmwareImageTamperTest(FirmwareImage* image, } int main(int argc, char* argv[]) { - int len; + uint32_t len; uint8_t* sign_key_buf = NULL; uint8_t* root_key_blob = NULL; uint8_t* firmware_blob = NULL; @@ -182,7 +182,7 @@ int main(int argc, char* argv[]) { } /* Generate and populate signatures. */ - if (!AddKeySignature(image, argv[2])) { + if (!AddFirmwareKeySignature(image, argv[2])) { fprintf(stderr, "Couldn't create key signature.\n"); error_code = 1; goto failure; |