Index: src/platform/vboot_reference/tests/kernel_image_tests.c |
diff --git a/src/platform/vboot_reference/tests/kernel_image_tests.c b/src/platform/vboot_reference/tests/kernel_image_tests.c |
index 3d37bb7d3a2712101527b7f381707aac30368626..c8f803565a48c0fe7d81fc3e577c0112318b1dd5 100644 |
--- a/src/platform/vboot_reference/tests/kernel_image_tests.c |
+++ b/src/platform/vboot_reference/tests/kernel_image_tests.c |
@@ -56,7 +56,7 @@ void VerifyKernelImageTamperTest(KernelImage* image, |
TEST_EQ(VerifyKernelImage(firmware_key, image, DEV_MODE_DISABLED), |
VERIFY_KERNEL_SIGNATURE_FAILED, |
"KernelImage Tamper Verification (Trusted)"); |
- image->kernel_data[0] = 'F'; |
+ image->kernel_data[0] = 'K'; |
image->kernel_key_signature[0] = 0xFF; |
image->kernel_key_signature[1] = 0x00; |
@@ -110,7 +110,8 @@ int main(int argc, char* argv[]) { |
1, /* Kernel Version */ |
1000, /* Kernel Size */ |
firmware_key_file, |
- kernel_key_file); |
+ kernel_key_file, |
+ 'K'); |
if (!image) { |
error_code = 1; |
goto failure; |