| OLD | NEW |
| 1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. | 1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. |
| 2 * Use of this source code is governed by a BSD-style license that can be | 2 * Use of this source code is governed by a BSD-style license that can be |
| 3 * found in the LICENSE file. | 3 * found in the LICENSE file. |
| 4 * | 4 * |
| 5 * TEMPORARY stub for calling LoadFirmware() which looks like the old | 5 * TEMPORARY stub for calling LoadFirmware() which looks like the old |
| 6 * VerifyFirmwareDriver_f() call. | 6 * VerifyFirmwareDriver_f() call. |
| 7 * (Firmware portion) | 7 * (Firmware portion) |
| 8 */ | 8 */ |
| 9 | 9 |
| 10 #include "load_firmware_fw.h" | 10 #include "load_firmware_fw.h" |
| (...skipping 74 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 85 /* Set up the params for LoadFirmware() */ | 85 /* Set up the params for LoadFirmware() */ |
| 86 p.caller_internal = &ci; | 86 p.caller_internal = &ci; |
| 87 p.firmware_root_key_blob = root_key_blob; | 87 p.firmware_root_key_blob = root_key_blob; |
| 88 p.verification_block_0 = verification_headerA; | 88 p.verification_block_0 = verification_headerA; |
| 89 p.verification_block_1 = verification_headerB; | 89 p.verification_block_1 = verification_headerB; |
| 90 | 90 |
| 91 /* Allocate a key blob buffer */ | 91 /* Allocate a key blob buffer */ |
| 92 p.kernel_sign_key_blob = Malloc(LOAD_FIRMWARE_KEY_BLOB_REC_SIZE); | 92 p.kernel_sign_key_blob = Malloc(LOAD_FIRMWARE_KEY_BLOB_REC_SIZE); |
| 93 p.kernel_sign_key_size = LOAD_FIRMWARE_KEY_BLOB_REC_SIZE; | 93 p.kernel_sign_key_size = LOAD_FIRMWARE_KEY_BLOB_REC_SIZE; |
| 94 | 94 |
| 95 /* TODO: YOU NEED TO SET THE BOOT FLAGS SOMEHOW */ |
| 96 p.boot_flags = 0; |
| 97 |
| 95 /* Call LoadFirmware() */ | 98 /* Call LoadFirmware() */ |
| 96 rv = LoadFirmware(&p); | 99 rv = LoadFirmware(&p); |
| 97 if (LOAD_FIRMWARE_SUCCESS == rv) { | 100 if (LOAD_FIRMWARE_SUCCESS == rv) { |
| 98 /* TODO: YOU NEED TO KEEP TRACK OF p.kernel_sign_key_blob AND | 101 /* TODO: YOU NEED TO KEEP TRACK OF p.kernel_sign_key_blob AND |
| 99 * p.kernel_sign_key_size SO YOU CAN PASS THEM TO LoadKernel(). */ | 102 * p.kernel_sign_key_size SO YOU CAN PASS THEM TO LoadKernel(). */ |
| 100 | 103 |
| 101 return (0 == p.firmware_index ? BOOT_FIRMWARE_A_CONTINUE : | 104 return (0 == p.firmware_index ? BOOT_FIRMWARE_A_CONTINUE : |
| 102 BOOT_FIRMWARE_B_CONTINUE); | 105 BOOT_FIRMWARE_B_CONTINUE); |
| 103 | 106 |
| 104 } else { | 107 } else { |
| 105 /* Error */ | 108 /* Error */ |
| 106 return BOOT_FIRMWARE_RECOVERY_CONTINUE; | 109 return BOOT_FIRMWARE_RECOVERY_CONTINUE; |
| 107 } | 110 } |
| 108 } | 111 } |
| OLD | NEW |