summaryrefslogtreecommitdiff
path: root/firmware/lib
diff options
context:
space:
mode:
authorJoel Kitching <kitching@google.com>2019-09-04 14:12:42 +0800
committerCommit Bot <commit-bot@chromium.org>2019-10-23 16:28:16 +0000
commitd3b2117f9abe2f7413f6315867ae3c3dbfaf5db1 (patch)
treed25a53c589d3547d25edfc299d68df55cc472652 /firmware/lib
parent53ce884528f734958d4845f6528809957b09934c (diff)
downloadvboot-d3b2117f9abe2f7413f6315867ae3c3dbfaf5db1.tar.gz
vboot: standardize on "keyblock" as one word
Stardardize on inconsistency between "keyblock" and "key block" both in code, comments, and textual output. BUG=b:124141368, chromium:968464 TEST=make clean && make runtests BRANCH=none Change-Id: Ib8819a2426c1179286663f21f0d254f3de9d94a4 Signed-off-by: Joel Kitching <kitching@google.com> Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/vboot_reference/+/1786385 Tested-by: Joel Kitching <kitching@chromium.org> Reviewed-by: Joel Kitching <kitching@chromium.org> Commit-Queue: Joel Kitching <kitching@chromium.org>
Diffstat (limited to 'firmware/lib')
-rw-r--r--firmware/lib/include/vboot_common.h12
-rw-r--r--firmware/lib/vboot_common.c6
-rw-r--r--firmware/lib/vboot_display.c2
-rw-r--r--firmware/lib/vboot_kernel.c40
4 files changed, 30 insertions, 30 deletions
diff --git a/firmware/lib/include/vboot_common.h b/firmware/lib/include/vboot_common.h
index ac020cc3..46c135cf 100644
--- a/firmware/lib/include/vboot_common.h
+++ b/firmware/lib/include/vboot_common.h
@@ -24,12 +24,12 @@
/* Error Codes for all common functions. */
enum {
VBOOT_SUCCESS = 0,
- /* Key block internal structure is invalid, or not a key block */
- VBOOT_KEY_BLOCK_INVALID,
- /* Key block signature check failed */
- VBOOT_KEY_BLOCK_SIGNATURE,
- /* Key block hash check failed */
- VBOOT_KEY_BLOCK_HASH,
+ /* Keyblock internal structure is invalid, or not a keyblock */
+ VBOOT_KEYBLOCK_INVALID,
+ /* Keyblock signature check failed */
+ VBOOT_KEYBLOCK_SIGNATURE,
+ /* Keyblock hash check failed */
+ VBOOT_KEYBLOCK_HASH,
/* Invalid public key passed to a signature verficiation function. */
VBOOT_PUBLIC_KEY_INVALID,
/* Preamble internal structure is invalid */
diff --git a/firmware/lib/vboot_common.c b/firmware/lib/vboot_common.c
index 75492080..f68b387b 100644
--- a/firmware/lib/vboot_common.c
+++ b/firmware/lib/vboot_common.c
@@ -17,9 +17,9 @@
const char *kVbootErrors[VBOOT_ERROR_MAX] = {
"Success.",
- "Key block invalid.",
- "Key block signature failed.",
- "Key block hash failed.",
+ "Keyblock invalid.",
+ "Keyblock signature failed.",
+ "Keyblock hash failed.",
"Public key invalid.",
"Preamble invalid.",
"Preamble signature check failed.",
diff --git a/firmware/lib/vboot_display.c b/firmware/lib/vboot_display.c
index 13107d37..b9473347 100644
--- a/firmware/lib/vboot_display.c
+++ b/firmware/lib/vboot_display.c
@@ -122,7 +122,7 @@ const char *RecoveryReasonString(uint8_t code)
case VB2_RECOVERY_RO_SHARED_DATA:
return "Shared data error in read-only firmware";
case VB2_RECOVERY_FW_KEYBLOCK:
- return "RW firmware unable to verify key block";
+ return "RW firmware unable to verify keyblock";
case VB2_RECOVERY_FW_KEY_ROLLBACK:
return "RW firmware key version rollback detected";
case VB2_RECOVERY_FW_PREAMBLE:
diff --git a/firmware/lib/vboot_kernel.c b/firmware/lib/vboot_kernel.c
index ce4828fd..1c90f470 100644
--- a/firmware/lib/vboot_kernel.c
+++ b/firmware/lib/vboot_kernel.c
@@ -138,13 +138,13 @@ static vb2_error_t vb2_verify_kernel_vblock(
return VB2_ERROR_VBLOCK_KERNEL_SUBKEY;
}
- /* Verify the key block. */
+ /* Verify the keyblock. */
int keyblock_valid = 1; /* Assume valid */
struct vb2_keyblock *keyblock = get_keyblock(kbuf);
if (VB2_SUCCESS != vb2_verify_keyblock(keyblock, kbuf_size,
&kernel_subkey2, wb)) {
- VB2_DEBUG("Verifying key block signature failed.\n");
- shpart->check_result = VBSD_LKP_CHECK_KEY_BLOCK_SIG;
+ VB2_DEBUG("Verifying keyblock signature failed.\n");
+ shpart->check_result = VBSD_LKP_CHECK_KEYBLOCK_SIG;
keyblock_valid = 0;
/* Check if we must have an officially signed kernel */
@@ -154,27 +154,27 @@ static vb2_error_t vb2_verify_kernel_vblock(
return VB2_ERROR_VBLOCK_SELF_SIGNED;
}
- /* Otherwise, allow the kernel if the key block hash is valid */
+ /* Otherwise, allow the kernel if the keyblock hash is valid */
if (VB2_SUCCESS !=
vb2_verify_keyblock_hash(keyblock, kbuf_size, wb)) {
- VB2_DEBUG("Verifying key block hash failed.\n");
- shpart->check_result = VBSD_LKP_CHECK_KEY_BLOCK_HASH;
+ VB2_DEBUG("Verifying keyblock hash failed.\n");
+ shpart->check_result = VBSD_LKP_CHECK_KEYBLOCK_HASH;
return VB2_ERROR_VBLOCK_KEYBLOCK_HASH;
}
}
- /* Check the key block flags against boot flags. */
+ /* Check the keyblock flags against boot flags. */
if (!(keyblock->keyblock_flags &
((ctx->flags & VB2_CONTEXT_DEVELOPER_MODE) ?
- KEY_BLOCK_FLAG_DEVELOPER_1 : KEY_BLOCK_FLAG_DEVELOPER_0))) {
- VB2_DEBUG("Key block developer flag mismatch.\n");
+ KEYBLOCK_FLAG_DEVELOPER_1 : KEYBLOCK_FLAG_DEVELOPER_0))) {
+ VB2_DEBUG("Keyblock developer flag mismatch.\n");
shpart->check_result = VBSD_LKP_CHECK_DEV_MISMATCH;
keyblock_valid = 0;
}
if (!(keyblock->keyblock_flags &
((ctx->flags & VB2_CONTEXT_RECOVERY_MODE) ?
- KEY_BLOCK_FLAG_RECOVERY_1 : KEY_BLOCK_FLAG_RECOVERY_0))) {
- VB2_DEBUG("Key block recovery flag mismatch.\n");
+ KEYBLOCK_FLAG_RECOVERY_1 : KEYBLOCK_FLAG_RECOVERY_0))) {
+ VB2_DEBUG("Keyblock recovery flag mismatch.\n");
shpart->check_result = VBSD_LKP_CHECK_REC_MISMATCH;
keyblock_valid = 0;
}
@@ -200,9 +200,9 @@ static vb2_error_t vb2_verify_kernel_vblock(
}
}
- /* If not in developer mode, key block required to be valid. */
+ /* If not in developer mode, keyblock required to be valid. */
if (kBootDev != boot_mode && !keyblock_valid) {
- VB2_DEBUG("Key block is invalid.\n");
+ VB2_DEBUG("Keyblock is invalid.\n");
return VB2_ERROR_VBLOCK_KEYBLOCK;
}
@@ -235,7 +235,7 @@ static vb2_error_t vb2_verify_kernel_vblock(
}
}
- /* Get key for preamble verification from the key block. */
+ /* Get key for preamble verification from the keyblock. */
struct vb2_public_key data_key;
if (VB2_SUCCESS != vb2_unpack_key(&data_key, &keyblock->data_key)) {
VB2_DEBUG("Unable to unpack kernel data key\n");
@@ -243,7 +243,7 @@ static vb2_error_t vb2_verify_kernel_vblock(
return VB2_ERROR_UNKNOWN;
}
- /* Verify the preamble, which follows the key block */
+ /* Verify the preamble, which follows the keyblock */
struct vb2_kernel_preamble *preamble = get_preamble(kbuf);
if (VB2_SUCCESS !=
vb2_verify_kernel_preamble(preamble,
@@ -256,7 +256,7 @@ static vb2_error_t vb2_verify_kernel_vblock(
}
/*
- * If the key block is valid and we're not in recovery mode, check for
+ * If the keyblock is valid and we're not in recovery mode, check for
* rollback of the kernel version.
*/
uint32_t combined_version = (key_version << 16) |
@@ -278,7 +278,7 @@ static vb2_error_t vb2_verify_kernel_vblock(
VB2_DEBUG("Kernel preamble is good.\n");
shpart->check_result = VBSD_LKP_CHECK_PREAMBLE_VALID;
if (keyblock_valid)
- shpart->flags |= VBSD_LKP_FLAG_KEY_BLOCK_VALID;
+ shpart->flags |= VBSD_LKP_FLAG_KEYBLOCK_VALID;
return VB2_SUCCESS;
}
@@ -394,7 +394,7 @@ static vb2_error_t vb2_load_partition(
((uint64_t)(body_toread + KBUF_SIZE) * 1000 * 1000) /
(read_us * 1024));
- /* Get key for preamble/data verification from the key block. */
+ /* Get key for preamble/data verification from the keyblock. */
struct vb2_public_key data_key;
if (VB2_SUCCESS != vb2_unpack_key(&data_key, &keyblock->data_key)) {
VB2_DEBUG("Unable to unpack kernel data key\n");
@@ -561,14 +561,14 @@ vb2_error_t LoadKernel(struct vb2_context *ctx, LoadKernelParams *params)
}
int keyblock_valid = (shpart->flags &
- VBSD_LKP_FLAG_KEY_BLOCK_VALID);
+ VBSD_LKP_FLAG_KEYBLOCK_VALID);
if (keyblock_valid) {
shared->flags |= VBSD_KERNEL_KEY_VERIFIED;
/* Track lowest version from a valid header. */
if (lowest_version > shpart->combined_version)
lowest_version = shpart->combined_version;
}
- VB2_DEBUG("Key block valid: %d\n", keyblock_valid);
+ VB2_DEBUG("Keyblock valid: %d\n", keyblock_valid);
VB2_DEBUG("Combined version: %u\n", shpart->combined_version);
/*