mirror of
https://github.com/Telecominfraproject/OpenCellular.git
synced 2025-11-24 02:05:01 +00:00
vboot: Add vb2_unpack_key_buffer
Previously, vb2_unpack_key() actually unpacked a key buffer. Callers
that had a vb2_packed_key had to typecast it back to a uint8_t buffer to
unpack it. Rename vb2_unpack_key() to vb2_unpack_key_buffer(), and make
vb2_unpack_key() unpack a vb2_packed_key.
BUG=chromium:611535
BRANCH=none
TEST=make runtests; emerge-kevin coreboot depthcharge;
emerge-samus and boot it
Change-Id: I9ee38a819c59cc58a72ead78cf5ddf3d0f301ae7
Signed-off-by: Randall Spangler <rspangler@chromium.org>
Reviewed-on: https://chromium-review.googlesource.com/400906
Reviewed-by: Daisuke Nojiri <dnojiri@chromium.org>
This commit is contained in:
@@ -1417,10 +1417,9 @@ VbError_t VbVerifyMemoryBootImage(VbCommonParams *cparams,
|
||||
} else {
|
||||
/* Unpack kernel subkey */
|
||||
struct vb2_public_key kernel_subkey2;
|
||||
if (VB2_SUCCESS != vb2_unpack_key(&kernel_subkey2,
|
||||
(const uint8_t *)kernel_subkey,
|
||||
kernel_subkey->key_offset +
|
||||
kernel_subkey->key_size)) {
|
||||
if (VB2_SUCCESS !=
|
||||
vb2_unpack_key(&kernel_subkey2,
|
||||
(struct vb2_packed_key *)kernel_subkey)) {
|
||||
VBDEBUG(("Unable to unpack kernel subkey\n"));
|
||||
goto fail;
|
||||
}
|
||||
@@ -1450,11 +1449,7 @@ VbError_t VbVerifyMemoryBootImage(VbCommonParams *cparams,
|
||||
|
||||
/* Get key for preamble/data verification from the key block. */
|
||||
struct vb2_public_key data_key2;
|
||||
if (VB2_SUCCESS !=
|
||||
vb2_unpack_key(&data_key2,
|
||||
(const uint8_t *)&keyblock2->data_key,
|
||||
keyblock2->data_key.key_offset +
|
||||
keyblock2->data_key.key_size)) {
|
||||
if (VB2_SUCCESS != vb2_unpack_key(&data_key2, &keyblock2->data_key)) {
|
||||
VBDEBUG(("Unable to unpack kernel data key\n"));
|
||||
goto fail;
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user