common: image-sig.c: Remove host-specific logic and #ifdefs
Remove any ifdefs in image-sig.c that were previously used to differentiate from the host code. Note that all code dedicated to relocating ->sign() and ->add_verify_data)_ can be safely removed, as signing is not supported target-side. NOTE that although it appears we are removing ecdsa256 support, this is intentional. ecdsa_verify() is a no-op on the target, and is currently only used by host code. Signed-off-by: Alexandru Gagniuc <mr.nuke.me@gmail.com> Reviewed-by: Simon Glass <sjg@chromium.org>
This commit is contained in:
parent
e89660f5ec
commit
cab22c8890
@ -3,18 +3,11 @@
|
||||
* Copyright (c) 2013, Google Inc.
|
||||
*/
|
||||
|
||||
#ifdef USE_HOSTCC
|
||||
#include "mkimage.h"
|
||||
#include <fdt_support.h>
|
||||
#include <time.h>
|
||||
#include <linux/libfdt.h>
|
||||
#else
|
||||
#include <common.h>
|
||||
#include <log.h>
|
||||
#include <malloc.h>
|
||||
#include <asm/global_data.h>
|
||||
DECLARE_GLOBAL_DATA_PTR;
|
||||
#endif /* !USE_HOSTCC*/
|
||||
#include <image.h>
|
||||
#include <u-boot/ecdsa.h>
|
||||
#include <u-boot/rsa.h>
|
||||
@ -28,9 +21,6 @@ struct checksum_algo checksum_algos[] = {
|
||||
.checksum_len = SHA1_SUM_LEN,
|
||||
.der_len = SHA1_DER_LEN,
|
||||
.der_prefix = sha1_der_prefix,
|
||||
#if IMAGE_ENABLE_SIGN
|
||||
.calculate_sign = EVP_sha1,
|
||||
#endif
|
||||
.calculate = hash_calculate,
|
||||
},
|
||||
{
|
||||
@ -38,9 +28,6 @@ struct checksum_algo checksum_algos[] = {
|
||||
.checksum_len = SHA256_SUM_LEN,
|
||||
.der_len = SHA256_DER_LEN,
|
||||
.der_prefix = sha256_der_prefix,
|
||||
#if IMAGE_ENABLE_SIGN
|
||||
.calculate_sign = EVP_sha256,
|
||||
#endif
|
||||
.calculate = hash_calculate,
|
||||
},
|
||||
#ifdef CONFIG_SHA384
|
||||
@ -49,9 +36,6 @@ struct checksum_algo checksum_algos[] = {
|
||||
.checksum_len = SHA384_SUM_LEN,
|
||||
.der_len = SHA384_DER_LEN,
|
||||
.der_prefix = sha384_der_prefix,
|
||||
#if IMAGE_ENABLE_SIGN
|
||||
.calculate_sign = EVP_sha384,
|
||||
#endif
|
||||
.calculate = hash_calculate,
|
||||
},
|
||||
#endif
|
||||
@ -61,9 +45,6 @@ struct checksum_algo checksum_algos[] = {
|
||||
.checksum_len = SHA512_SUM_LEN,
|
||||
.der_len = SHA512_DER_LEN,
|
||||
.der_prefix = sha512_der_prefix,
|
||||
#if IMAGE_ENABLE_SIGN
|
||||
.calculate_sign = EVP_sha512,
|
||||
#endif
|
||||
.calculate = hash_calculate,
|
||||
},
|
||||
#endif
|
||||
@ -74,24 +55,13 @@ struct crypto_algo crypto_algos[] = {
|
||||
{
|
||||
.name = "rsa2048",
|
||||
.key_len = RSA2048_BYTES,
|
||||
.sign = rsa_sign,
|
||||
.add_verify_data = rsa_add_verify_data,
|
||||
.verify = rsa_verify,
|
||||
},
|
||||
{
|
||||
.name = "rsa4096",
|
||||
.key_len = RSA4096_BYTES,
|
||||
.sign = rsa_sign,
|
||||
.add_verify_data = rsa_add_verify_data,
|
||||
.verify = rsa_verify,
|
||||
},
|
||||
{
|
||||
.name = "ecdsa256",
|
||||
.key_len = ECDSA256_BYTES,
|
||||
.sign = ecdsa_sign,
|
||||
.add_verify_data = ecdsa_add_verify_data,
|
||||
.verify = ecdsa_verify,
|
||||
},
|
||||
};
|
||||
|
||||
struct padding_algo padding_algos[] = {
|
||||
@ -112,16 +82,13 @@ struct checksum_algo *image_get_checksum_algo(const char *full_name)
|
||||
int i;
|
||||
const char *name;
|
||||
|
||||
#if !defined(USE_HOSTCC) && defined(CONFIG_NEEDS_MANUAL_RELOC)
|
||||
#if defined(CONFIG_NEEDS_MANUAL_RELOC)
|
||||
static bool done;
|
||||
|
||||
if (!done) {
|
||||
done = true;
|
||||
for (i = 0; i < ARRAY_SIZE(checksum_algos); i++) {
|
||||
checksum_algos[i].name += gd->reloc_off;
|
||||
#if IMAGE_ENABLE_SIGN
|
||||
checksum_algos[i].calculate_sign += gd->reloc_off;
|
||||
#endif
|
||||
checksum_algos[i].calculate += gd->reloc_off;
|
||||
}
|
||||
}
|
||||
@ -143,15 +110,13 @@ struct crypto_algo *image_get_crypto_algo(const char *full_name)
|
||||
int i;
|
||||
const char *name;
|
||||
|
||||
#if !defined(USE_HOSTCC) && defined(CONFIG_NEEDS_MANUAL_RELOC)
|
||||
#if defined(CONFIG_NEEDS_MANUAL_RELOC)
|
||||
static bool done;
|
||||
|
||||
if (!done) {
|
||||
done = true;
|
||||
for (i = 0; i < ARRAY_SIZE(crypto_algos); i++) {
|
||||
crypto_algos[i].name += gd->reloc_off;
|
||||
crypto_algos[i].sign += gd->reloc_off;
|
||||
crypto_algos[i].add_verify_data += gd->reloc_off;
|
||||
crypto_algos[i].verify += gd->reloc_off;
|
||||
}
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user