diff options
author | Randall Spangler <rspangler@chromium.org> | 2014-07-15 16:14:21 -0700 |
---|---|---|
committer | chrome-internal-fetch <chrome-internal-fetch@google.com> | 2014-07-19 03:48:52 +0000 |
commit | e778adae83d2ac4ab94aa10acceab328bbd3ea7b (patch) | |
tree | 003a07e04c7c581e12cce6369c923b495e1ad0c2 /tests/vboot_api_kernel3_tests.c | |
parent | e155044a7bbb9b8c6eb751af051726cfe1b411a4 (diff) | |
download | vboot-stabilize-6082.B.tar.gz |
Change VbExEc functions to take a devidx parameterstabilize-6092.Bstabilize-6082.B
This will be used in subsequent CLs to support PD software sync. For
now, only devidx=0 is used.
This changes the external vboot API, so must be checked in at the same
time as changes to the u-boot and depthcharge implementations. For
now, those implementations should simply check if devidx=0 and fail if
it's not.
BUG=chrome-os-partner:30079
BRANCH=none
TEST=make runtests
CQ-DEPEND=CL:208195,CL:208196
Change-Id: Iad3be9d676ac224c4582669bcd67176b39f75c73
Signed-off-by: Randall Spangler <rspangler@chromium.org>
Reviewed-on: https://chromium-review.googlesource.com/208210
Reviewed-by: Bill Richardson <wfrichar@chromium.org>
Diffstat (limited to 'tests/vboot_api_kernel3_tests.c')
-rw-r--r-- | tests/vboot_api_kernel3_tests.c | 20 |
1 files changed, 10 insertions, 10 deletions
diff --git a/tests/vboot_api_kernel3_tests.c b/tests/vboot_api_kernel3_tests.c index 49bc7aad..32a35eca 100644 --- a/tests/vboot_api_kernel3_tests.c +++ b/tests/vboot_api_kernel3_tests.c @@ -112,42 +112,42 @@ uint32_t VbExIsShutdownRequested(void) return 0; } -int VbExTrustEC(void) +int VbExTrustEC(int devidx) { return trust_ec; } -VbError_t VbExEcRunningRW(int *in_rw) +VbError_t VbExEcRunningRW(int devidx, int *in_rw) { *in_rw = mock_in_rw; return in_rw_retval; } -VbError_t VbExEcProtectRW(void) +VbError_t VbExEcProtectRW(int devidx) { ec_protected = 1; return protect_retval; } -VbError_t VbExEcDisableJump(void) +VbError_t VbExEcDisableJump(int devidx) { return run_retval; } -VbError_t VbExEcJumpToRW(void) +VbError_t VbExEcJumpToRW(int devidx) { ec_run_image = 1; return run_retval; } -VbError_t VbExEcHashRW(const uint8_t **hash, int *hash_size) +VbError_t VbExEcHashRW(int devidx, const uint8_t **hash, int *hash_size) { *hash = mock_ec_hash; *hash_size = mock_ec_hash_size; return mock_ec_hash_size ? VBERROR_SUCCESS : VBERROR_SIMULATED; } -VbError_t VbExEcGetExpectedRW(enum VbSelectFirmware_t select, +VbError_t VbExEcGetExpectedRW(int devidx, enum VbSelectFirmware_t select, const uint8_t **image, int *image_size) { static uint8_t fake_image[64] = {5, 6, 7, 8}; @@ -156,7 +156,7 @@ VbError_t VbExEcGetExpectedRW(enum VbSelectFirmware_t select, return get_expected_retval; } -VbError_t VbExEcGetExpectedRWHash(enum VbSelectFirmware_t select, +VbError_t VbExEcGetExpectedRWHash(int devidx, enum VbSelectFirmware_t select, const uint8_t **hash, int *hash_size) { *hash = want_ec_hash; @@ -174,7 +174,7 @@ uint8_t *internal_SHA256(const uint8_t *data, uint64_t len, uint8_t *digest) return digest; } -VbError_t VbExEcUpdateRW(const uint8_t *image, int image_size) +VbError_t VbExEcUpdateRW(int devidx, const uint8_t *image, int image_size) { ec_updated = 1; return update_retval; @@ -193,7 +193,7 @@ static void test_ssync(VbError_t retval, int recovery_reason, const char *desc) { uint32_t u; - TEST_EQ(VbEcSoftwareSync(&cparams), retval, desc); + TEST_EQ(VbEcSoftwareSync(0, &cparams), retval, desc); VbNvGet(VbApiKernelGetVnc(), VBNV_RECOVERY_REQUEST, &u); TEST_EQ(u, recovery_reason, " recovery reason"); } |