summaryrefslogtreecommitdiff
path: root/tests/firmware_image_tests.c
diff options
context:
space:
mode:
authorGaurav Shah <gauravsh@google.com>2010-02-26 15:09:43 -0800
committerGaurav Shah <gauravsh@google.com>2010-02-26 15:09:43 -0800
commit23a2f3a6c5c706fe4a0ca7c1b6f4bb26eb5ef436 (patch)
tree20f49ccaf80c7ed051878082e03cd857337e6a92 /tests/firmware_image_tests.c
parent7d122e2a47145ef535163744daa55cec54e12b16 (diff)
downloadvboot-23a2f3a6c5c706fe4a0ca7c1b6f4bb26eb5ef436.tar.gz
Vboot reference: A basic user-land verified boot firmware signing and verification utility.
This is a first cut at what I envision as a utility we can use to manage our firmware/kernel signing needs. Currently, it implements firmware signing (given a binary image, create a verified boot header) and verification (given a verified boot image, verify it using the given public root key). This CL also fixes the ReadFirmwareImage function from firmware_image to make it more consistent and fixes some bugs. Review URL: http://codereview.chromium.org/652216
Diffstat (limited to 'tests/firmware_image_tests.c')
-rw-r--r--tests/firmware_image_tests.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/tests/firmware_image_tests.c b/tests/firmware_image_tests.c
index 40018d7d..11eb4760 100644
--- a/tests/firmware_image_tests.c
+++ b/tests/firmware_image_tests.c
@@ -154,7 +154,7 @@ int VerifyFirmwareImageTamperTest(FirmwareImage* image,
}
int main(int argc, char* argv[]) {
- int len;
+ uint32_t len;
uint8_t* sign_key_buf = NULL;
uint8_t* root_key_blob = NULL;
uint8_t* firmware_blob = NULL;
@@ -182,7 +182,7 @@ int main(int argc, char* argv[]) {
}
/* Generate and populate signatures. */
- if (!AddKeySignature(image, argv[2])) {
+ if (!AddFirmwareKeySignature(image, argv[2])) {
fprintf(stderr, "Couldn't create key signature.\n");
error_code = 1;
goto failure;