summaryrefslogtreecommitdiff
path: root/firmware/lib/include
diff options
context:
space:
mode:
authorRandall Spangler <rspangler@chromium.org>2016-10-14 11:04:27 -0700
committerchrome-bot <chrome-bot@chromium.org>2016-10-29 19:41:08 -0700
commit13b109762a3bfec025a9bfcb3ead927d0291280e (patch)
tree7cc62ff1a42b8979223ab0ee3894cd70bcb71983 /firmware/lib/include
parentf41cd04d9eeefe7b7b98c67484ee96ba4fbf1125 (diff)
downloadvboot-13b109762a3bfec025a9bfcb3ead927d0291280e.tar.gz
vboot: use vb2 verification functions for kernel verification
This removes old vboot1 functions in favor of the new vboot2 functions. BUG=chromium:611535 BRANCH=none TEST=make runtests; emerge-kevin coreboot depthcharge Change-Id: Idc64f7714bbd9d4fa82d14b6b5d73d71c61de854 Signed-off-by: Randall Spangler <rspangler@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/400900 Reviewed-by: Daisuke Nojiri <dnojiri@chromium.org>
Diffstat (limited to 'firmware/lib/include')
-rw-r--r--firmware/lib/include/vboot_common.h42
1 files changed, 0 insertions, 42 deletions
diff --git a/firmware/lib/include/vboot_common.h b/firmware/lib/include/vboot_common.h
index 5b783e27..762448bb 100644
--- a/firmware/lib/include/vboot_common.h
+++ b/firmware/lib/include/vboot_common.h
@@ -90,48 +90,6 @@ void PublicKeyInit(VbPublicKey *key, uint8_t *key_data, uint64_t key_size);
int PublicKeyCopy(VbPublicKey *dest, const VbPublicKey *src);
/**
- * Convert a public key to RsaPublicKey format. The returned key must be freed
- * using RSAPublicKeyFree().
- *
- * Returns NULL if error.
- */
-RSAPublicKey *PublicKeyToRSA(const VbPublicKey *key);
-
-/**
- * Verify [data] matches signature [sig] using [key]. [size] is the size of
- * the data buffer; the amount of data to be validated is contained in
- * sig->data_size.
- */
-int VerifyData(const uint8_t *data, uint64_t size, const VbSignature *sig,
- const RSAPublicKey *key);
-
-/**
- * Verify a secure hash digest from vb2_digest_buffer() or
- * vb2_digest_finalize(), using [key]. Returns 0 on success.
- */
-int VerifyDigest(const uint8_t *digest, const VbSignature *sig,
- const RSAPublicKey *key);
-
-/**
- * Check the sanity of a key block of size [size] bytes, using public key
- * [key]. If hash_only is non-zero, uses only the block checksum to verify the
- * key block. Header fields are also checked for sanity. Does not verify key
- * index or key block flags.
- */
-int KeyBlockVerify(const VbKeyBlockHeader *block, uint64_t size,
- const VbPublicKey *key, int hash_only);
-
-/**
- * Check the sanity of a kernel preamble of size [size] bytes, using public key
- * [key].
- *
- * Returns VBOOT_SUCCESS if successful.
- */
-int VerifyKernelPreamble(const VbKernelPreambleHeader *preamble,
- uint64_t size, const RSAPublicKey *key);
-
-
-/**
* Retrieve the 16-bit vmlinuz header address and size from the kernel preamble
* if there is one. These are only available in Kernel Preamble Header version
* >= 2.1. If given a header 2.0 or lower, will set address and size to 0 (this