| OLD | NEW |
| 1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. | 1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. |
| 2 * Use of this source code is governed by a BSD-style license that can be | 2 * Use of this source code is governed by a BSD-style license that can be |
| 3 * found in the LICENSE file. | 3 * found in the LICENSE file. |
| 4 * | 4 * |
| 5 * Common functions used by tests. | 5 * Common functions used by tests. |
| 6 */ | 6 */ |
| 7 | 7 |
| 8 #include "test_common.h" | 8 #include "test_common.h" |
| 9 | 9 |
| 10 #include <stdio.h> | 10 #include <stdio.h> |
| (...skipping 142 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 153 RSAProcessedKeySize(image->kernel_sign_algorithm)); | 153 RSAProcessedKeySize(image->kernel_sign_algorithm)); |
| 154 | 154 |
| 155 /* Update correct header length. */ | 155 /* Update correct header length. */ |
| 156 image->header_len = GetKernelHeaderLen(image); | 156 image->header_len = GetKernelHeaderLen(image); |
| 157 | 157 |
| 158 /* Calculate SHA-512 digest on header and populate header_checksum. */ | 158 /* Calculate SHA-512 digest on header and populate header_checksum. */ |
| 159 CalculateKernelHeaderChecksum(image, image->header_checksum); | 159 CalculateKernelHeaderChecksum(image, image->header_checksum); |
| 160 | 160 |
| 161 /* Populate kernel options and data with dummy data. */ | 161 /* Populate kernel options and data with dummy data. */ |
| 162 image->kernel_version = kernel_version; | 162 image->kernel_version = kernel_version; |
| 163 image->options.version[0] = 1; | 163 Memset(image->kernel_config, 0, sizeof(image->kernel_config)); |
| 164 image->options.version[1] = 0; | 164 image->kernel_len = kernel_len; |
| 165 Memset(image->options.cmd_line, 0, sizeof(image->options.cmd_line)); | |
| 166 image->options.kernel_len = kernel_len; | |
| 167 image->options.kernel_load_addr = 0; | |
| 168 image->options.kernel_entry_addr = 0; | |
| 169 image->kernel_key_signature = image->kernel_signature = NULL; | 165 image->kernel_key_signature = image->kernel_signature = NULL; |
| 170 image->kernel_data = Malloc(kernel_len); | 166 image->kernel_data = Malloc(kernel_len); |
| 171 Memset(image->kernel_data, kernel_data_fill_char, kernel_len); | 167 Memset(image->kernel_data, kernel_data_fill_char, kernel_len); |
| 172 | 168 |
| 173 /* Generate and populate signatures. */ | 169 /* Generate and populate signatures. */ |
| 174 if (!AddKernelKeySignature(image, firmware_key_file)) { | 170 if (!AddKernelKeySignature(image, firmware_key_file)) { |
| 175 debug("Couldn't create key signature.\n"); | 171 debug("Couldn't create key signature.\n"); |
| 176 KernelImageFree(image); | 172 KernelImageFree(image); |
| 177 return NULL; | 173 return NULL; |
| 178 } | 174 } |
| (...skipping 51 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 230 kernel_key_version, | 226 kernel_key_version, |
| 231 kernel_version, | 227 kernel_version, |
| 232 1, /* kernel length. */ | 228 1, /* kernel length. */ |
| 233 "testkeys/key_rsa1024.pem", | 229 "testkeys/key_rsa1024.pem", |
| 234 "testkeys/key_rsa1024.pem", | 230 "testkeys/key_rsa1024.pem", |
| 235 'K'); | 231 'K'); |
| 236 if (!image) | 232 if (!image) |
| 237 return NULL; | 233 return NULL; |
| 238 if (is_corrupt) { | 234 if (is_corrupt) { |
| 239 /* Invalidate image. */ | 235 /* Invalidate image. */ |
| 240 Memset(image->kernel_data, 'X', image->options.kernel_len); | 236 Memset(image->kernel_data, 'X', image->kernel_len); |
| 241 } | 237 } |
| 242 kernel_blob = GetKernelBlob(image, &len); | 238 kernel_blob = GetKernelBlob(image, &len); |
| 243 KernelImageFree(image); | 239 KernelImageFree(image); |
| 244 return kernel_blob; | 240 return kernel_blob; |
| 245 } | 241 } |
| OLD | NEW |