summaryrefslogtreecommitdiff
path: root/tests/futility/expect_output/show.tests_futility_data_bios_mario_mp.bin
diff options
context:
space:
mode:
authorJakub Czapiga <jacz@semihalf.com>2022-04-06 13:25:04 +0200
committerChromeos LUCI <chromeos-scoped@luci-project-accounts.iam.gserviceaccount.com>2022-04-27 15:41:17 +0000
commitadadf8e219f4d1cbe6b940100ae0be843f438cef (patch)
tree9cdad1ad2cff5c5eecba373c461e04ab597047fd /tests/futility/expect_output/show.tests_futility_data_bios_mario_mp.bin
parent58bfa1d53c4a1be40680775bd004ddb5b80ad8cb (diff)
downloadvboot-adadf8e219f4d1cbe6b940100ae0be843f438cef.tar.gz
futility/file_type_bios: Remove old FlashMap area names
Old names are not in use for very long time, so remove them. BUG=b:197114807 TEST=cros-workon-volteer start vboot_reference && \ FW_NAME=voxel emerge-volteer vboot_reference coreboot chromeos-bootimage TEST=sudo FEATURES=test emerge vboot_reference BRANCH=none Signed-off-by: Jakub Czapiga <jacz@semihalf.com> Change-Id: I07916b82a721481c982b291e228df0772e0fc2a2 Disallow-Recycled-Builds: test-failures Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/vboot_reference/+/3575323 Auto-Submit: Jakub Czapiga <czapiga@google.com> Commit-Queue: Jakub Czapiga <czapiga@google.com> Reviewed-by: Julius Werner <jwerner@chromium.org> Tested-by: Jakub Czapiga <czapiga@google.com>
Diffstat (limited to 'tests/futility/expect_output/show.tests_futility_data_bios_mario_mp.bin')
-rw-r--r--tests/futility/expect_output/show.tests_futility_data_bios_mario_mp.bin63
1 files changed, 0 insertions, 63 deletions
diff --git a/tests/futility/expect_output/show.tests_futility_data_bios_mario_mp.bin b/tests/futility/expect_output/show.tests_futility_data_bios_mario_mp.bin
deleted file mode 100644
index 60398559..00000000
--- a/tests/futility/expect_output/show.tests_futility_data_bios_mario_mp.bin
+++ /dev/null
@@ -1,63 +0,0 @@
-BIOS: tests/futility/data/bios_mario_mp.bin
-GBB header: GBB Area
- Version: 1.0
- Flags: 0x00000000
- Regions: offset size
- hwid 0x00000080 0x00000100
- bmpvf 0x00001180 0x0003de80
- rootkey 0x00000180 0x00001000
- recovery_key 0x0003f000 0x00001000
- Size: 0x00040000 / 0x00040000
-GBB content:
- HWID: {9D799111-A88A-439E-9E1F-FBBB41B00A9A}
- digest: <none>
- Root Key:
- Vboot API: 1.0
- Algorithm: 11 RSA8192 SHA512
- Key Version: 1
- Key sha1sum: 541f467a7d8747f55ae9087ee4e34155f5ee3cd7
- Recovery Key:
- Vboot API: 1.0
- Algorithm: 11 RSA8192 SHA512
- Key Version: 1
- Key sha1sum: 5d0d163b824cab5ae4f23fb2cc012e2a4124f4fe
-Firmware body: Firmware A Data
- Offset: 0x00040000
- Size: 0x000d0000
-Firmware body: Firmware B Data
- Offset: 0x00120000
- Size: 0x000d0000
-Keyblock: Firmware A Key
- Signature: valid
- Size: 0x8b8
- Flags: 7 !DEV DEV !REC
- Data key algorithm: 8 RSA4096 SHA512
- Data key version: 1
- Data key sha1sum: cd72cfb929765f82baba0a01ed937a73f502f6c5
-Firmware Preamble:
- Size: 2164
- Header version: 2.1
- Firmware version: 1
- Kernel key algorithm: 8 RSA4096 SHA512
- Kernel key version: 1
- Kernel key sha1sum: e39e019cb5df3e874f443721540cb261a88c58ef
- Firmware body size: 851968
- Preamble flags: 0
-Body verification succeeded.
-Keyblock: Firmware B Key
- Signature: valid
- Size: 0x8b8
- Flags: 7 !DEV DEV !REC
- Data key algorithm: 8 RSA4096 SHA512
- Data key version: 1
- Data key sha1sum: cd72cfb929765f82baba0a01ed937a73f502f6c5
-Firmware Preamble:
- Size: 2164
- Header version: 2.1
- Firmware version: 1
- Kernel key algorithm: 8 RSA4096 SHA512
- Kernel key version: 1
- Kernel key sha1sum: e39e019cb5df3e874f443721540cb261a88c58ef
- Firmware body size: 851968
- Preamble flags: 0
-Body verification succeeded.