summaryrefslogtreecommitdiff
path: root/utility/load_kernel_test.c
diff options
context:
space:
mode:
authorBill Richardson <wfrichar@chromium.org>2010-08-09 17:50:14 -0700
committerBill Richardson <wfrichar@chromium.org>2010-08-09 17:50:14 -0700
commit4f36ef336036e01b0bd2b395dd55e15db0267266 (patch)
tree4b21ee0d91f3858584908a51efce3ff0569225f2 /utility/load_kernel_test.c
parentcbaf69658146279a557283f757f39ab8157f7391 (diff)
downloadvboot-4f36ef336036e01b0bd2b395dd55e15db0267266.tar.gz
Changes to allow user-signed kernels to be generated.
Make vbutil_keyblock handle unsigned blocks. Also enable --unpack option and add tests for it. Modify vbutil_kernel to allow unsigned keyblocks, correct usage message, and fix the --debug option which was somehow disabled. Update load_kernel_test to accept /dev/null for the public key, to test non-signed kernel keyblocks. Review URL: http://codereview.chromium.org/3124004
Diffstat (limited to 'utility/load_kernel_test.c')
-rw-r--r--utility/load_kernel_test.c75
1 files changed, 57 insertions, 18 deletions
diff --git a/utility/load_kernel_test.c b/utility/load_kernel_test.c
index 4ac9330b..9d1f14c3 100644
--- a/utility/load_kernel_test.c
+++ b/utility/load_kernel_test.c
@@ -12,6 +12,7 @@
#include <stdlib.h>
#include <string.h>
#include <sys/types.h>
+#include <unistd.h>
#include "load_kernel_fw.h"
#include "boot_device.h"
@@ -75,29 +76,75 @@ int BootDeviceWriteLBA(uint64_t lba_start, uint64_t lba_count,
int main(int argc, char* argv[]) {
const char* image_name;
- const char* keyfile_name;
- int rv;
+ int rv, c, argsleft;
+ int errorcnt = 0;
+ char *e = 0;
Memset(&lkp, 0, sizeof(LoadKernelParams));
lkp.bytes_per_lba = LBA_BYTES;
+ lkp.boot_flags = BOOT_FLAG_RECOVERY;
- /* Read command line parameters */
- if (3 > argc) {
- fprintf(stderr, "usage: %s <drive_image> <sign_key> [boot flag]\n", argv[0]);
+ /* Parse options */
+ opterr = 0;
+ while ((c=getopt(argc, argv, ":b:")) != -1)
+ {
+ switch (c)
+ {
+ case 'b':
+ lkp.boot_flags = strtoull(optarg, &e, 0);
+ if (!*optarg || (e && *e))
+ {
+ fprintf(stderr, "Invalid argument to -%c: \"%s\"\n", c, optarg);
+ errorcnt++;
+ }
+ break;
+ case '?':
+ fprintf(stderr, "Unrecognized switch: -%c\n", optopt);
+ errorcnt++;
+ break;
+ case ':':
+ fprintf(stderr, "Missing argument to -%c\n", optopt);
+ errorcnt++;
+ break;
+ default:
+ errorcnt++;
+ break;
+ }
+ }
+
+ /* Update argc */
+ argsleft = argc - optind;
+
+ if (errorcnt || !argsleft)
+ {
+ fprintf(stderr, "usage: %s [options] <drive_image> [<sign_key>]\n",
+ argv[0]);
+ fprintf(stderr, "\noptions:\n");
+ fprintf(stderr, " -b NUM boot flag bits (default %" PRIu64 "):\n",
+ BOOT_FLAG_RECOVERY);
+ fprintf(stderr, " %" PRIu64 " = developer mode on\n",
+ BOOT_FLAG_DEVELOPER);
+ fprintf(stderr, " %" PRIu64 " = recovery mode on\n",
+ BOOT_FLAG_RECOVERY);
return 1;
}
- image_name = argv[1];
- keyfile_name = argv[2];
+
+ image_name = argv[optind];
/* Read header signing key blob */
- {
+ if (argsleft > 1) {
uint64_t key_size;
- lkp.header_sign_key_blob = ReadFile(keyfile_name, &key_size);
+ lkp.header_sign_key_blob = ReadFile(argv[optind+1], &key_size);
if (!lkp.header_sign_key_blob) {
- fprintf(stderr, "Unable to read key file %s\n", keyfile_name);
+ fprintf(stderr, "Unable to read key file %s\n", argv[optind+1]);
return 1;
}
}
+ /* Need to skip the address check, since we're putting it somewhere on the
+ * heap instead of its actual target address in the firmware. */
+ lkp.boot_flags |= BOOT_FLAG_SKIP_ADDR_CHECK;
+
+ printf("bootflags = %" PRIu64 "\n", lkp.boot_flags);
/* Get image size */
printf("Reading from image: %s\n", image_name);
@@ -119,14 +166,6 @@ int main(int argc, char* argv[]) {
}
lkp.kernel_buffer_size = KERNEL_BUFFER_SIZE;
- /* Need to skip the address check, since we're putting it somewhere on the
- * heap instead of its actual target address in the firmware. */
- if (argc == 4) {
- lkp.boot_flags = atoi(argv[3]) | BOOT_FLAG_SKIP_ADDR_CHECK;
- } else {
- /* Default to recovery. */
- lkp.boot_flags = BOOT_FLAG_SKIP_ADDR_CHECK | BOOT_FLAG_RECOVERY;
- }
/* Call LoadKernel() */
rv = LoadKernel(&lkp);
printf("LoadKernel() returned %d\n", rv);