| Index: src/platform/vboot_reference/tests/test_common.c
|
| diff --git a/src/platform/vboot_reference/tests/test_common.c b/src/platform/vboot_reference/tests/test_common.c
|
| index c1d1108e03d3e39ec632b3ba76e795eda7cc8d3c..929e91f3b2c5372cf831081188a2608816881ba7 100644
|
| --- a/src/platform/vboot_reference/tests/test_common.c
|
| +++ b/src/platform/vboot_reference/tests/test_common.c
|
| @@ -39,7 +39,8 @@ FirmwareImage* GenerateTestFirmwareImage(int algorithm,
|
| int firmware_version,
|
| int firmware_len,
|
| const char* root_key_file,
|
| - const char* firmware_key_file) {
|
| + const char* firmware_key_file,
|
| + uint8_t firmware_data_fill_char) {
|
| FirmwareImage* image = FirmwareImageNew();
|
|
|
| Memcpy(image->magic, FIRMWARE_MAGIC, FIRMWARE_MAGIC_SIZE);
|
| @@ -62,7 +63,7 @@ FirmwareImage* GenerateTestFirmwareImage(int algorithm,
|
| image->preamble_signature = image->firmware_signature = NULL;
|
| Memset(image->preamble, 'P', FIRMWARE_PREAMBLE_SIZE);
|
| image->firmware_data = Malloc(image->firmware_len);
|
| - Memset(image->firmware_data, 'F', image->firmware_len);
|
| + Memset(image->firmware_data, firmware_data_fill_char, image->firmware_len);
|
|
|
| /* Generate and populate signatures. */
|
| if (!AddFirmwareKeySignature(image, root_key_file)) {
|
| @@ -96,7 +97,8 @@ uint8_t* GenerateTestFirmwareBlob(int algorithm,
|
| firmware_version,
|
| firmware_len,
|
| root_key_file,
|
| - firmware_key_file);
|
| + firmware_key_file,
|
| + 'F');
|
| firmware_blob = GetFirmwareBlob(image, &firmware_blob_len);
|
| FirmwareImageFree(image);
|
| return firmware_blob;
|
| @@ -120,7 +122,8 @@ uint8_t* GenerateRollbackTestFirmwareBlob(int firmware_key_version,
|
| firmware_version,
|
| 1, /* Firmware length. */
|
| "testkeys/key_rsa8192.pem",
|
| - "testkeys/key_rsa1024.pem");
|
| + "testkeys/key_rsa1024.pem",
|
| + 'F');
|
| if (!image)
|
| return NULL;
|
| if (is_corrupt) {
|
| @@ -141,7 +144,8 @@ KernelImage* GenerateTestKernelImage(int firmware_sign_algorithm,
|
| int kernel_version,
|
| int kernel_len,
|
| const char* firmware_key_file,
|
| - const char* kernel_key_file) {
|
| + const char* kernel_key_file,
|
| + uint8_t kernel_data_fill_char) {
|
| KernelImage* image = KernelImageNew();
|
|
|
| Memcpy(image->magic, KERNEL_MAGIC, KERNEL_MAGIC_SIZE);
|
| @@ -170,7 +174,7 @@ KernelImage* GenerateTestKernelImage(int firmware_sign_algorithm,
|
| image->options.kernel_entry_addr = 0;
|
| image->kernel_key_signature = image->kernel_signature = NULL;
|
| image->kernel_data = Malloc(kernel_len);
|
| - Memset(image->kernel_data, 'F', kernel_len);
|
| + Memset(image->kernel_data, kernel_data_fill_char, kernel_len);
|
|
|
| /* Generate and populate signatures. */
|
| if (!AddKernelKeySignature(image, firmware_key_file)) {
|
| @@ -207,7 +211,8 @@ uint8_t* GenerateTestKernelBlob(int firmware_sign_algorithm,
|
| kernel_version,
|
| kernel_len,
|
| firmware_key_file,
|
| - kernel_key_file);
|
| + kernel_key_file,
|
| + 'K');
|
|
|
| kernel_blob = GetKernelBlob(image, &kernel_blob_len);
|
| KernelImageFree(image);
|
| @@ -232,7 +237,8 @@ uint8_t* GenerateRollbackTestKernelBlob(int kernel_key_version,
|
| kernel_version,
|
| 1, /* kernel length. */
|
| "testkeys/key_rsa1024.pem",
|
| - "testkeys/key_rsa1024.pem");
|
| + "testkeys/key_rsa1024.pem",
|
| + 'K');
|
| if (!image)
|
| return NULL;
|
| if (is_corrupt) {
|
|
|