diff options
author | Chia-Wei Wang <chiawei_wang@aspeedtech.com> | 2024-10-14 17:56:19 +0800 |
---|---|---|
committer | Tom Rini <trini@konsulko.com> | 2024-10-21 17:52:52 -0600 |
commit | 2e6cf57e8eabfe9c0ca62fbcd7fd2eeaa5ce6695 (patch) | |
tree | 1d473783b0d5efc5521f493e08811bb2d0b9a88d | |
parent | 75068b1a2dbcf475c1043e7aa0f6882554d759bc (diff) |
image-fit-sig: Remove padding check
The padding algorithm is not mandatory for all signing algorithm.
For example, ECDSA does not require a padding method.
For RSA requiring PKCS padding, the belonging info->crypto(), assigned
with rsa_verify_key(), also has the check on the validity of info->padding().
Thus, remove the info->padding check from the upper, general layer.
Signed-off-by: Chia-Wei Wang <chiawei_wang@aspeedtech.com>
Reviewed-by: Simon Glass <sjg@chromium.org>
-rw-r--r-- | boot/image-fit-sig.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/boot/image-fit-sig.c b/boot/image-fit-sig.c index 35873b1fb0e..a121de60ae2 100644 --- a/boot/image-fit-sig.c +++ b/boot/image-fit-sig.c @@ -95,7 +95,7 @@ static int fit_image_setup_verify(struct image_sign_info *info, info->required_keynode = required_keynode; printf("%s:%s", algo_name, info->keyname); - if (!info->checksum || !info->crypto || !info->padding) { + if (!info->checksum || !info->crypto) { *err_msgp = "Unknown signature algorithm"; return -1; } |