Files
u-boot/lib
Rasmus Villemoes 3f8808ebaa rsa: fix retrieving public exponent on big-endian systems
Commit fdf0819afb (rsa: fix alignment issue when getting public
exponent) changed the logic to avoid doing an 8-byte access to a
possibly-not-8-byte-aligned address.

However, using rsa_convert_big_endian is wrong: That function converts
an array of big-endian (32-bit) words with the most significant word
first (aka a BE byte array) to an array of cpu-endian words with the
least significant word first. While the exponent is indeed _stored_ as
a big-endian 64-bit word (two BE words with MSW first), we want to
extract it as a cpu-endian 64 bit word. On a little-endian host,
swapping the words and byte-swapping each 32-bit word works, because
that's the same as byte-swapping the whole 64 bit word. But on a
big-endian host, the fdt32_to_cpu are no-ops, but
rsa_convert_big_endian() still does the word-swapping, breaking
verified boot.

To fix that, while still ensuring we don't do unaligned accesses, add
a little helper that first memcpy's the bytes to a local fdt64_t, then
applies fdt64_to_cpu(). [The name is chosen based on the
[bl]eXX_to_cpup in linux/byteorder/generic.h].

Fixes: fdf0819afb ("rsa: fix alignment issue when getting public exponent")
Signed-off-by: Rasmus Villemoes <rasmus.villemoes@prevas.dk>
Reviewed-by: Simon Glass <sjg@chromium.org>
2020-10-12 21:30:38 -04:00
..
2020-08-03 22:19:54 -04:00
2020-05-18 21:19:18 -04:00
2020-05-18 21:19:18 -04:00
2019-12-02 18:23:07 -05:00
2019-10-31 07:22:53 -04:00
2020-04-24 10:51:32 -04:00
2020-10-10 16:49:58 -04:00
2012-04-29 14:14:08 +02:00
2019-12-06 16:44:20 -05:00
2020-05-18 21:19:18 -04:00
2020-06-12 13:14:07 -04:00
2020-05-18 21:19:18 -04:00
2020-08-24 14:11:31 -04:00
2020-05-01 11:03:24 -04:00
2020-05-18 21:19:18 -04:00
2020-05-18 18:36:55 -04:00
2019-05-05 08:48:50 -04:00