summaryrefslogtreecommitdiff
path: root/futility/cmd_vbutil_firmware.c
diff options
context:
space:
mode:
Diffstat (limited to 'futility/cmd_vbutil_firmware.c')
-rw-r--r--futility/cmd_vbutil_firmware.c36
1 files changed, 18 insertions, 18 deletions
diff --git a/futility/cmd_vbutil_firmware.c b/futility/cmd_vbutil_firmware.c
index cf901706..edd0f8d5 100644
--- a/futility/cmd_vbutil_firmware.c
+++ b/futility/cmd_vbutil_firmware.c
@@ -97,34 +97,34 @@ static int do_vblock(const char *outfile, const char *keyblock_file,
int retval = 1;
if (!outfile) {
- VbExError("Must specify output filename\n");
+ FATAL("Must specify output filename\n");
goto vblock_cleanup;
}
if (!keyblock_file || !signprivate || !kernelkey_file) {
- VbExError("Must specify all keys\n");
+ FATAL("Must specify all keys\n");
goto vblock_cleanup;
}
if (!fv_file) {
- VbExError("Must specify firmware volume\n");
+ FATAL("Must specify firmware volume\n");
goto vblock_cleanup;
}
/* Read the key block and keys */
keyblock = vb2_read_keyblock(keyblock_file);
if (!keyblock) {
- VbExError("Error reading key block.\n");
+ FATAL("Error reading key block.\n");
goto vblock_cleanup;
}
signing_key = vb2_read_private_key(signprivate);
if (!signing_key) {
- VbExError("Error reading signing key.\n");
+ FATAL("Error reading signing key.\n");
goto vblock_cleanup;
}
kernel_subkey = vb2_read_packed_key(kernelkey_file);
if (!kernel_subkey) {
- VbExError("Error reading kernel subkey.\n");
+ FATAL("Error reading kernel subkey.\n");
goto vblock_cleanup;
}
@@ -133,12 +133,12 @@ static int do_vblock(const char *outfile, const char *keyblock_file,
if (VB2_SUCCESS != vb2_read_file(fv_file, &fv_data, &fv_size))
goto vblock_cleanup;
if (!fv_size) {
- VbExError("Empty firmware volume file\n");
+ FATAL("Empty firmware volume file\n");
goto vblock_cleanup;
}
body_sig = vb2_calculate_signature(fv_data, fv_size, signing_key);
if (!body_sig) {
- VbExError("Error calculating body signature\n");
+ FATAL("Error calculating body signature\n");
goto vblock_cleanup;
}
@@ -146,21 +146,21 @@ static int do_vblock(const char *outfile, const char *keyblock_file,
preamble = vb2_create_fw_preamble(version, kernel_subkey, body_sig,
signing_key, preamble_flags);
if (!preamble) {
- VbExError("Error creating preamble.\n");
+ FATAL("Error creating preamble.\n");
goto vblock_cleanup;
}
/* Write the output file */
FILE *f = fopen(outfile, "wb");
if (!f) {
- VbExError("Can't open output file %s\n", outfile);
+ FATAL("Can't open output file %s\n", outfile);
goto vblock_cleanup;
}
int i = ((1 != fwrite(keyblock, keyblock->keyblock_size, 1, f)) ||
(1 != fwrite(preamble, preamble->preamble_size, 1, f)));
fclose(f);
if (i) {
- VbExError("Can't write output file %s\n", outfile);
+ FATAL("Can't write output file %s\n", outfile);
unlink(outfile);
goto vblock_cleanup;
}
@@ -200,7 +200,7 @@ static int do_verify(const char *infile, const char *signpubkey,
int retval = 1;
if (!infile || !signpubkey || !fv_file) {
- VbExError("Must specify filename, signpubkey, and fv\n");
+ FATAL("Must specify filename, signpubkey, and fv\n");
goto verify_cleanup;
}
@@ -219,14 +219,14 @@ static int do_verify(const char *infile, const char *signpubkey,
/* Read blob */
uint32_t blob_size;
if (VB2_SUCCESS != vb2_read_file(infile, &blob, &blob_size)) {
- VbExError("Error reading input file\n");
+ FATAL("Error reading input file\n");
goto verify_cleanup;
}
/* Read firmware volume */
uint32_t fv_size;
if (VB2_SUCCESS != vb2_read_file(fv_file, &fv_data, &fv_size)) {
- VbExError("Error reading firmware volume\n");
+ FATAL("Error reading firmware volume\n");
goto verify_cleanup;
}
@@ -234,7 +234,7 @@ static int do_verify(const char *infile, const char *signpubkey,
struct vb2_keyblock *keyblock = (struct vb2_keyblock *)blob;
if (VB2_SUCCESS !=
vb2_verify_keyblock(keyblock, blob_size, &sign_key, &wb)) {
- VbExError("Error verifying key block.\n");
+ FATAL("Error verifying key block.\n");
goto verify_cleanup;
}
@@ -263,7 +263,7 @@ static int do_verify(const char *infile, const char *signpubkey,
struct vb2_fw_preamble *pre2 = (struct vb2_fw_preamble *)(blob + now);
if (VB2_SUCCESS !=
vb2_verify_fw_preamble(pre2, blob_size - now, &data_key, &wb)) {
- VbExError("Error2 verifying preamble.\n");
+ FATAL("Error2 verifying preamble.\n");
goto verify_cleanup;
}
now += pre2->preamble_size;
@@ -298,14 +298,14 @@ static int do_verify(const char *infile, const char *signpubkey,
&data_key, &wb)) {
printf("Body verification succeeded.\n");
} else {
- VbExError("Error verifying firmware body.\n");
+ FATAL("Error verifying firmware body.\n");
goto verify_cleanup;
}
if (kernelkey_file &&
VB2_SUCCESS != vb2_write_packed_key(kernelkey_file,
kernel_subkey)) {
- VbExError("Unable to write kernel subkey\n");
+ FATAL("Unable to write kernel subkey\n");
goto verify_cleanup;
}