diff options
author | Patrick Doyle <wpdster@gmail.com> | 2019-06-14 13:43:38 -0400 |
---|---|---|
committer | Tom Rini <trini@konsulko.com> | 2019-06-21 10:07:11 -0400 |
commit | 19495dd9b6f5f4e893b56b0c73e14b2e671c3780 (patch) | |
tree | d61a57c7b2faaae041ec3396d56bd90eb6be444f | |
parent | 226a35ef0ef310d8fffa3e6283ee3aab9dab26aa (diff) | |
download | u-boot-19495dd9b6f5f4e893b56b0c73e14b2e671c3780.zip u-boot-19495dd9b6f5f4e893b56b0c73e14b2e671c3780.tar.gz u-boot-19495dd9b6f5f4e893b56b0c73e14b2e671c3780.tar.bz2 |
rsa: reject images with unknown padding
Previously we would store NULL in info->padding and jump to an illegal
instruction if an unknown value for "padding" was specified in the
device tree.
Signed-off-by: Patrick Doyle <pdoyle@irobot.com>
-rw-r--r-- | common/image-sig.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/common/image-sig.c b/common/image-sig.c index 4f6b4ec..004fbc5 100644 --- a/common/image-sig.c +++ b/common/image-sig.c @@ -211,7 +211,7 @@ static int fit_image_setup_verify(struct image_sign_info *info, info->required_keynode = required_keynode; printf("%s:%s", algo_name, info->keyname); - if (!info->checksum || !info->crypto) { + if (!info->checksum || !info->crypto || !info->padding) { *err_msgp = "Unknown signature algorithm"; return -1; } |