summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRandall Spangler <rspangler@chromium.org>2011-03-16 09:56:15 -0700
committerRandall Spangler <rspangler@chromium.org>2011-03-16 09:56:15 -0700
commit4c6e6dac28edfdfc724074b929ec95c6e3104d91 (patch)
tree2885e982ee9b1815af92b66bf347a75a0a4d8b0c
parentb6a29ad3395c84a1c5c35a6a54bedbb867d4d4cd (diff)
downloadvboot-4c6e6dac28edfdfc724074b929ec95c6e3104d91.tar.gz
Fix compiler errors on MSVC
Change-Id: I47fd6d0be5542e5f540a34410b3f694ae0f67fd9 R=gauravsh@chromium.org BUG=none TEST=make && make runtests Review URL: http://codereview.chromium.org/6676039
-rw-r--r--firmware/lib/rollback_index.c1
-rw-r--r--firmware/lib/tpm_bootmode.c9
-rw-r--r--firmware/lib/vboot_firmware.c4
3 files changed, 7 insertions, 7 deletions
diff --git a/firmware/lib/rollback_index.c b/firmware/lib/rollback_index.c
index 1d532f88..954dfeaf 100644
--- a/firmware/lib/rollback_index.c
+++ b/firmware/lib/rollback_index.c
@@ -354,7 +354,6 @@ uint32_t RollbackFirmwareLock(void) {
uint32_t RollbackKernelRecovery(int developer_mode) {
uint32_t rvs, rve;
RollbackSpaceFirmware rsf;
- uint8_t out_digest[20]; /* For PCR extend output */
/* In recovery mode we ignore TPM malfunctions or corruptions, and *
* leave the TPM complelely unlocked; we call neither
diff --git a/firmware/lib/tpm_bootmode.c b/firmware/lib/tpm_bootmode.c
index 77731355..13371c40 100644
--- a/firmware/lib/tpm_bootmode.c
+++ b/firmware/lib/tpm_bootmode.c
@@ -28,7 +28,8 @@
* 7 Normal-signed firmware | 1
* (anything else) | 0
*/
-const uint8_t kBootStateSHA1Digests[][20] = {
+
+const char* kBootStateSHA1Digests[] = {
/* SHA1("\x00\x00\x00") */
"\x29\xe2\xdc\xfb\xb1\x6f\x63\xbb\x02\x54\xdf\x75\x85\xa1\x5b\xb6"
"\xfb\x5e\x92\x7d",
@@ -78,11 +79,11 @@ const uint8_t kBootStateSHA1Digests[][20] = {
"\xbf\x35\x31\x78",
};
-#define MAX_BOOT_STATE_INDEX (sizeof(kBootStateSHA1Digests)/sizeof(char[20]))
+#define MAX_BOOT_STATE_INDEX (sizeof(kBootStateSHA1Digests)/sizeof(char*))
/* Used for PCR extend when the passed-in boot state is invalid or
* if there is an internal error. */
-const uint8_t kBootInvalidSHA1Digest[20] = {
+const uint8_t kBootInvalidSHA1Digest[] = {
"\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff"
"\xff\xff\xff\xff"
};
@@ -123,7 +124,7 @@ uint32_t SetTPMBootModeState(int developer_mode, int recovery_mode,
fw_keyblock_flags);
if (digest_index >= 0 && digest_index < MAX_BOOT_STATE_INDEX)
- in_digest = kBootStateSHA1Digests[digest_index];
+ in_digest = (const uint8_t*)kBootStateSHA1Digests[digest_index];
else
in_digest = kBootInvalidSHA1Digest; /* Internal out of bounds error. */
result = TlclExtend(BOOT_MODE_PCR, in_digest, out_digest);
diff --git a/firmware/lib/vboot_firmware.c b/firmware/lib/vboot_firmware.c
index 95db892c..6265acc7 100644
--- a/firmware/lib/vboot_firmware.c
+++ b/firmware/lib/vboot_firmware.c
@@ -54,7 +54,7 @@ int LoadFirmware(LoadFirmwareParams* params) {
uint32_t status;
uint32_t test_err = 0;
int good_index = -1;
- int boot_fw_keyblock_flags = 0;
+ uint64_t boot_fw_keyblock_flags = 0;
int is_dev;
int index;
int i;
@@ -292,7 +292,7 @@ int LoadFirmware(LoadFirmwareParams* params) {
/* At this point, we have a good idea of how we are going to boot. Update the
* TPM with this state information.
*/
- status = SetTPMBootModeState(is_dev, 0, boot_fw_keyblock_flags);
+ status = SetTPMBootModeState(is_dev, 0, (int)boot_fw_keyblock_flags);
if (0 != status) {
VBDEBUG(("Unable to update the TPM with boot mode information.\n"));
if (status == TPM_E_MUST_REBOOT)