| OLD | NEW |
| 1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. | 1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. |
| 2 * Use of this source code is governed by a BSD-style license that can be | 2 * Use of this source code is governed by a BSD-style license that can be |
| 3 * found in the LICENSE file. | 3 * found in the LICENSE file. |
| 4 * | 4 * |
| 5 * API definitions for a generating and manipulating verified boot kernel images
. | 5 * API definitions for a generating and manipulating verified boot kernel images
. |
| 6 * (Userland portion.) | 6 * (Userland portion.) |
| 7 */ | 7 */ |
| 8 | 8 |
| 9 #ifndef VBOOT_REFERENCE_KERNEL_IMAGE_H_ | 9 #ifndef VBOOT_REFERENCE_KERNEL_IMAGE_H_ |
| 10 #define VBOOT_REFERENCE_KERNEL_IMAGE_H_ | 10 #define VBOOT_REFERENCE_KERNEL_IMAGE_H_ |
| (...skipping 37 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 48 uint8_t* GetKernelConfigBlob(const KernelImage* image); | 48 uint8_t* GetKernelConfigBlob(const KernelImage* image); |
| 49 | 49 |
| 50 /* Get a verified kernel binary blob from an [image] and fill | 50 /* Get a verified kernel binary blob from an [image] and fill |
| 51 * its length into blob_len. | 51 * its length into blob_len. |
| 52 * | 52 * |
| 53 * Caller owns the returned pointer and must Free() it. | 53 * Caller owns the returned pointer and must Free() it. |
| 54 */ | 54 */ |
| 55 uint8_t* GetKernelBlob(const KernelImage* image, uint64_t* blob_len); | 55 uint8_t* GetKernelBlob(const KernelImage* image, uint64_t* blob_len); |
| 56 | 56 |
| 57 /* Write kernel data from [image] to a file named [input_file]. | 57 /* Write kernel data from [image] to a file named [input_file]. |
| 58 * If [is_only_vblock] is non-zero, only the verification block is output. |
| 58 * | 59 * |
| 59 * Return 1 on success, 0 on error. | 60 * Return 1 on success, 0 on error. |
| 60 */ | 61 */ |
| 61 int WriteKernelImage(const char* input_file, | 62 int WriteKernelImage(const char* input_file, |
| 62 const KernelImage* image); | 63 const KernelImage* image, |
| 64 int is_only_vblock); |
| 63 | 65 |
| 64 /* Pretty print the contents of [image]. Only headers and metadata information | 66 /* Pretty print the contents of [image]. Only headers and metadata information |
| 65 * is printed. | 67 * is printed. |
| 66 */ | 68 */ |
| 67 void PrintKernelImage(const KernelImage* image); | 69 void PrintKernelImage(const KernelImage* image); |
| 68 | 70 |
| 69 /* Performs a chained verify of the kernel [image]. If [dev_mode] is | 71 /* Performs a chained verify of the kernel [image]. If [dev_mode] is |
| 70 * 0 (inactive), then the [firmware_signing_key] is used to verify the signature | 72 * 0 (inactive), then the [firmware_signing_key] is used to verify the signature |
| 71 * of the signing key, else the check is skipped. | 73 * of the signing key, else the check is skipped. |
| 72 * | 74 * |
| (...skipping 18 matching lines...) Expand all Loading... |
| 91 * using the private signing key in file [kernel_sigining_key_file]. | 93 * using the private signing key in file [kernel_sigining_key_file]. |
| 92 * | 94 * |
| 93 * Return 1 on success, 0 on failure. | 95 * Return 1 on success, 0 on failure. |
| 94 */ | 96 */ |
| 95 int AddKernelSignature(KernelImage* image, | 97 int AddKernelSignature(KernelImage* image, |
| 96 const char* kernel_sigining_key_file); | 98 const char* kernel_sigining_key_file); |
| 97 | 99 |
| 98 void PrintKernelEntry(kernel_entry* entry); | 100 void PrintKernelEntry(kernel_entry* entry); |
| 99 | 101 |
| 100 #endif /* VBOOT_REFERENCE_KERNEL_IMAGE_H_ */ | 102 #endif /* VBOOT_REFERENCE_KERNEL_IMAGE_H_ */ |
| OLD | NEW |