diff options
author | Mary Ruthven <mruthven@chromium.org> | 2015-12-18 11:16:02 -0800 |
---|---|---|
committer | chrome-bot <chrome-bot@chromium.org> | 2016-01-06 20:43:25 -0800 |
commit | 7e0728dfca6d4f27c07434c9a6af468c966046a4 (patch) | |
tree | 668b9a11eae59472c210836284680188e641349f /tests | |
parent | 785343089c8fa38eacf9a71a33618125bb4174b9 (diff) | |
download | vboot-7e0728dfca6d4f27c07434c9a6af468c966046a4.tar.gz |
vboot: Change VbExEc implementations to support RO update
This change will be used to support EC-RO software sync by allowing for
access to the readonly region of firmware. Currently only the writable
section is accessed by vboot using VB_SELECT_FIRMWARE_A and B.
BUG=chrome-os-partner:48703
BRANCH=none
TEST=built on jerry and check that the RO hash can be read and the image
can be updated.
CQ-DEPEND=CL:319185,CL:320425,CL:320598
Change-Id: Ic3942d86b65da3123798cfd11a78056f5dab6699
Signed-off-by: Mary Ruthven <mruthven@chromium.org>
Reviewed-on: https://chromium-review.googlesource.com/319213
Reviewed-by: Randall Spangler <rspangler@chromium.org>
Diffstat (limited to 'tests')
-rw-r--r-- | tests/vboot_api_kernel3_tests.c | 16 |
1 files changed, 9 insertions, 7 deletions
diff --git a/tests/vboot_api_kernel3_tests.c b/tests/vboot_api_kernel3_tests.c index 32a35eca..a4c5ea77 100644 --- a/tests/vboot_api_kernel3_tests.c +++ b/tests/vboot_api_kernel3_tests.c @@ -123,7 +123,7 @@ VbError_t VbExEcRunningRW(int devidx, int *in_rw) return in_rw_retval; } -VbError_t VbExEcProtectRW(int devidx) +VbError_t VbExEcProtect(int devidx, enum VbSelectFirmware_t select) { ec_protected = 1; return protect_retval; @@ -140,15 +140,16 @@ VbError_t VbExEcJumpToRW(int devidx) return run_retval; } -VbError_t VbExEcHashRW(int devidx, const uint8_t **hash, int *hash_size) +VbError_t VbExEcHashImage(int devidx, enum VbSelectFirmware_t select, + const uint8_t **hash, int *hash_size) { *hash = mock_ec_hash; *hash_size = mock_ec_hash_size; return mock_ec_hash_size ? VBERROR_SUCCESS : VBERROR_SIMULATED; } -VbError_t VbExEcGetExpectedRW(int devidx, enum VbSelectFirmware_t select, - const uint8_t **image, int *image_size) +VbError_t VbExEcGetExpectedImage(int devidx, enum VbSelectFirmware_t select, + const uint8_t **image, int *image_size) { static uint8_t fake_image[64] = {5, 6, 7, 8}; *image = fake_image; @@ -156,8 +157,8 @@ VbError_t VbExEcGetExpectedRW(int devidx, enum VbSelectFirmware_t select, return get_expected_retval; } -VbError_t VbExEcGetExpectedRWHash(int devidx, enum VbSelectFirmware_t select, - const uint8_t **hash, int *hash_size) +VbError_t VbExEcGetExpectedImageHash(int devidx, enum VbSelectFirmware_t select, + const uint8_t **hash, int *hash_size) { *hash = want_ec_hash; *hash_size = want_ec_hash_size; @@ -174,7 +175,8 @@ uint8_t *internal_SHA256(const uint8_t *data, uint64_t len, uint8_t *digest) return digest; } -VbError_t VbExEcUpdateRW(int devidx, const uint8_t *image, int image_size) +VbError_t VbExEcUpdateImage(int devidx, enum VbSelectFirmware_t select, + const uint8_t *image, int image_size) { ec_updated = 1; return update_retval; |