mirror of
https://xff.cz/git/u-boot/
synced 2025-09-01 08:42:12 +02:00
lib: rsa: decouple rsa from FIT image verification
Introduce new configuration, CONFIG_RSA_VERIFY which will decouple building RSA functions from FIT verification and allow for adding a RSA-based signature verification for other file formats, in particular PE file for UEFI secure boot. Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org> Reviewed-by: Simon Glass <sjg@chromium.org>
This commit is contained in:
committed by
Tom Rini
parent
d08b16edf8
commit
b983cc2da0
@@ -1269,7 +1269,7 @@ int fit_image_verify_with_data(const void *fit, int image_noffset,
|
||||
int ret;
|
||||
|
||||
/* Verify all required signatures */
|
||||
if (IMAGE_ENABLE_VERIFY &&
|
||||
if (FIT_IMAGE_ENABLE_VERIFY &&
|
||||
fit_image_verify_required_sigs(fit, image_noffset, data, size,
|
||||
gd_fdt_blob(), &verify_all)) {
|
||||
err_msg = "Unable to verify required signature";
|
||||
@@ -1291,7 +1291,7 @@ int fit_image_verify_with_data(const void *fit, int image_noffset,
|
||||
&err_msg))
|
||||
goto error;
|
||||
puts("+ ");
|
||||
} else if (IMAGE_ENABLE_VERIFY && verify_all &&
|
||||
} else if (FIT_IMAGE_ENABLE_VERIFY && verify_all &&
|
||||
!strncmp(name, FIT_SIG_NODENAME,
|
||||
strlen(FIT_SIG_NODENAME))) {
|
||||
ret = fit_image_check_sig(fit, noffset, data,
|
||||
@@ -1949,7 +1949,7 @@ int fit_image_load(bootm_headers_t *images, ulong addr,
|
||||
if (image_type == IH_TYPE_KERNEL)
|
||||
images->fit_uname_cfg = fit_base_uname_config;
|
||||
|
||||
if (IMAGE_ENABLE_VERIFY && images->verify) {
|
||||
if (FIT_IMAGE_ENABLE_VERIFY && images->verify) {
|
||||
puts(" Verifying Hash Integrity ... ");
|
||||
if (fit_config_verify(fit, cfg_noffset)) {
|
||||
puts("Bad Data Hash\n");
|
||||
|
Reference in New Issue
Block a user