diff options
author | Randall Spangler <rspangler@chromium.org> | 2011-07-01 15:35:43 -0700 |
---|---|---|
committer | Randall Spangler <rspangler@chromium.org> | 2011-07-01 15:36:42 -0700 |
commit | cfd841d3c2c8bb91e7024c62d0acc8668c5041b3 (patch) | |
tree | 23707ff082b864894634860d19b85af9cf5fd51f /firmware/lib/cryptolib/sha_utility.c | |
parent | f8c65491595a8e849cf61b600b2371357ec75ff4 (diff) | |
download | vboot-cfd841d3c2c8bb91e7024c62d0acc8668c5041b3.tar.gz |
Revert "Verified boot wrapper - replace utility functions"
This reverts commit 0184886c8cb35e8e01d610622df448a7cb063e06
(This works with uboot-next, but not uboot, which doesn't implement its half of the new wrapper API. So rolling back to leave uboot working.
Change-Id: I1f9e3c63e5bbdb20b9195cd68787bef89f24afee
Reviewed-on: http://gerrit.chromium.org/gerrit/3588
Reviewed-by: Randall Spangler <rspangler@chromium.org>
Tested-by: Randall Spangler <rspangler@chromium.org>
Diffstat (limited to 'firmware/lib/cryptolib/sha_utility.c')
-rw-r--r-- | firmware/lib/cryptolib/sha_utility.c | 26 |
1 files changed, 12 insertions, 14 deletions
diff --git a/firmware/lib/cryptolib/sha_utility.c b/firmware/lib/cryptolib/sha_utility.c index bec7209c..4e266f7c 100644 --- a/firmware/lib/cryptolib/sha_utility.c +++ b/firmware/lib/cryptolib/sha_utility.c @@ -1,4 +1,4 @@ -/* Copyright (c) 2011 The Chromium OS Authors. All rights reserved. +/* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. * Use of this source code is governed by a BSD-style license that can be * found in the LICENSE file. * @@ -7,27 +7,26 @@ #include "cryptolib.h" #include "utility.h" -#include "vboot_api.h" void DigestInit(DigestContext* ctx, int sig_algorithm) { ctx->algorithm = hash_type_map[sig_algorithm]; switch(ctx->algorithm) { case SHA1_DIGEST_ALGORITHM: - ctx->sha1_ctx = (SHA1_CTX*) VbExMalloc(sizeof(SHA1_CTX)); + ctx->sha1_ctx = (SHA1_CTX*) Malloc(sizeof(SHA1_CTX)); SHA1_init(ctx->sha1_ctx); break; case SHA256_DIGEST_ALGORITHM: - ctx->sha256_ctx = (SHA256_CTX*) VbExMalloc(sizeof(SHA256_CTX)); + ctx->sha256_ctx = (SHA256_CTX*) Malloc(sizeof(SHA256_CTX)); SHA256_init(ctx->sha256_ctx); break; case SHA512_DIGEST_ALGORITHM: - ctx->sha512_ctx = (SHA512_CTX*) VbExMalloc(sizeof(SHA512_CTX)); + ctx->sha512_ctx = (SHA512_CTX*) Malloc(sizeof(SHA512_CTX)); SHA512_init(ctx->sha512_ctx); break; }; } -void DigestUpdate(DigestContext* ctx, const uint8_t* data, uint32_t len) { +void DigestUpdate(DigestContext* ctx, const uint8_t* data, uint64_t len) { switch(ctx->algorithm) { case SHA1_DIGEST_ALGORITHM: SHA1_update(ctx->sha1_ctx, data, len); @@ -45,27 +44,26 @@ uint8_t* DigestFinal(DigestContext* ctx) { uint8_t* digest = NULL; switch(ctx->algorithm) { case SHA1_DIGEST_ALGORITHM: - digest = (uint8_t*) VbExMalloc(SHA1_DIGEST_SIZE); + digest = (uint8_t*) Malloc(SHA1_DIGEST_SIZE); Memcpy(digest, SHA1_final(ctx->sha1_ctx), SHA1_DIGEST_SIZE); - VbExFree(ctx->sha1_ctx); + Free(ctx->sha1_ctx); break; case SHA256_DIGEST_ALGORITHM: - digest = (uint8_t*) VbExMalloc(SHA256_DIGEST_SIZE); + digest = (uint8_t*) Malloc(SHA256_DIGEST_SIZE); Memcpy(digest, SHA256_final(ctx->sha256_ctx), SHA256_DIGEST_SIZE); - VbExFree(ctx->sha256_ctx); + Free(ctx->sha256_ctx); break; case SHA512_DIGEST_ALGORITHM: - digest = (uint8_t*) VbExMalloc(SHA512_DIGEST_SIZE); + digest = (uint8_t*) Malloc(SHA512_DIGEST_SIZE); Memcpy(digest, SHA512_final(ctx->sha512_ctx), SHA512_DIGEST_SIZE); - VbExFree(ctx->sha512_ctx); + Free(ctx->sha512_ctx); break; }; return digest; } uint8_t* DigestBuf(const uint8_t* buf, uint64_t len, int sig_algorithm) { - /* Allocate enough space for the largest digest */ - uint8_t* digest = (uint8_t*) VbExMalloc(SHA512_DIGEST_SIZE); + uint8_t* digest = (uint8_t*) Malloc(SHA512_DIGEST_SIZE); /* Use the max. */ /* Define an array mapping [sig_algorithm] to function pointers to the * SHA{1|256|512} functions. */ |