summaryrefslogtreecommitdiff
path: root/tests
diff options
context:
space:
mode:
authorMary Ruthven <mruthven@chromium.org>2015-12-18 11:16:02 -0800
committerchrome-bot <chrome-bot@chromium.org>2016-01-06 20:43:25 -0800
commit7e0728dfca6d4f27c07434c9a6af468c966046a4 (patch)
tree668b9a11eae59472c210836284680188e641349f /tests
parent785343089c8fa38eacf9a71a33618125bb4174b9 (diff)
downloadvboot-7e0728dfca6d4f27c07434c9a6af468c966046a4.tar.gz
vboot: Change VbExEc implementations to support RO update
This change will be used to support EC-RO software sync by allowing for access to the readonly region of firmware. Currently only the writable section is accessed by vboot using VB_SELECT_FIRMWARE_A and B. BUG=chrome-os-partner:48703 BRANCH=none TEST=built on jerry and check that the RO hash can be read and the image can be updated. CQ-DEPEND=CL:319185,CL:320425,CL:320598 Change-Id: Ic3942d86b65da3123798cfd11a78056f5dab6699 Signed-off-by: Mary Ruthven <mruthven@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/319213 Reviewed-by: Randall Spangler <rspangler@chromium.org>
Diffstat (limited to 'tests')
-rw-r--r--tests/vboot_api_kernel3_tests.c16
1 files changed, 9 insertions, 7 deletions
diff --git a/tests/vboot_api_kernel3_tests.c b/tests/vboot_api_kernel3_tests.c
index 32a35eca..a4c5ea77 100644
--- a/tests/vboot_api_kernel3_tests.c
+++ b/tests/vboot_api_kernel3_tests.c
@@ -123,7 +123,7 @@ VbError_t VbExEcRunningRW(int devidx, int *in_rw)
return in_rw_retval;
}
-VbError_t VbExEcProtectRW(int devidx)
+VbError_t VbExEcProtect(int devidx, enum VbSelectFirmware_t select)
{
ec_protected = 1;
return protect_retval;
@@ -140,15 +140,16 @@ VbError_t VbExEcJumpToRW(int devidx)
return run_retval;
}
-VbError_t VbExEcHashRW(int devidx, const uint8_t **hash, int *hash_size)
+VbError_t VbExEcHashImage(int devidx, enum VbSelectFirmware_t select,
+ const uint8_t **hash, int *hash_size)
{
*hash = mock_ec_hash;
*hash_size = mock_ec_hash_size;
return mock_ec_hash_size ? VBERROR_SUCCESS : VBERROR_SIMULATED;
}
-VbError_t VbExEcGetExpectedRW(int devidx, enum VbSelectFirmware_t select,
- const uint8_t **image, int *image_size)
+VbError_t VbExEcGetExpectedImage(int devidx, enum VbSelectFirmware_t select,
+ const uint8_t **image, int *image_size)
{
static uint8_t fake_image[64] = {5, 6, 7, 8};
*image = fake_image;
@@ -156,8 +157,8 @@ VbError_t VbExEcGetExpectedRW(int devidx, enum VbSelectFirmware_t select,
return get_expected_retval;
}
-VbError_t VbExEcGetExpectedRWHash(int devidx, enum VbSelectFirmware_t select,
- const uint8_t **hash, int *hash_size)
+VbError_t VbExEcGetExpectedImageHash(int devidx, enum VbSelectFirmware_t select,
+ const uint8_t **hash, int *hash_size)
{
*hash = want_ec_hash;
*hash_size = want_ec_hash_size;
@@ -174,7 +175,8 @@ uint8_t *internal_SHA256(const uint8_t *data, uint64_t len, uint8_t *digest)
return digest;
}
-VbError_t VbExEcUpdateRW(int devidx, const uint8_t *image, int image_size)
+VbError_t VbExEcUpdateImage(int devidx, enum VbSelectFirmware_t select,
+ const uint8_t *image, int image_size)
{
ec_updated = 1;
return update_retval;