| Index: src/platform/vboot_reference/tests/kernel_image_tests.c
|
| diff --git a/src/platform/vboot_reference/tests/kernel_image_tests.c b/src/platform/vboot_reference/tests/kernel_image_tests.c
|
| index 3d37bb7d3a2712101527b7f381707aac30368626..c8f803565a48c0fe7d81fc3e577c0112318b1dd5 100644
|
| --- a/src/platform/vboot_reference/tests/kernel_image_tests.c
|
| +++ b/src/platform/vboot_reference/tests/kernel_image_tests.c
|
| @@ -56,7 +56,7 @@ void VerifyKernelImageTamperTest(KernelImage* image,
|
| TEST_EQ(VerifyKernelImage(firmware_key, image, DEV_MODE_DISABLED),
|
| VERIFY_KERNEL_SIGNATURE_FAILED,
|
| "KernelImage Tamper Verification (Trusted)");
|
| - image->kernel_data[0] = 'F';
|
| + image->kernel_data[0] = 'K';
|
|
|
| image->kernel_key_signature[0] = 0xFF;
|
| image->kernel_key_signature[1] = 0x00;
|
| @@ -110,7 +110,8 @@ int main(int argc, char* argv[]) {
|
| 1, /* Kernel Version */
|
| 1000, /* Kernel Size */
|
| firmware_key_file,
|
| - kernel_key_file);
|
| + kernel_key_file,
|
| + 'K');
|
| if (!image) {
|
| error_code = 1;
|
| goto failure;
|
|
|