mirror of
https://github.com/u-boot/u-boot.git
synced 2025-05-08 19:11:53 +00:00
avb2.0: add Android Verified Boot 2.0 library
Add libavb lib (3rd party library from AOSP), that implements support of AVB 2.0. This library is used for integrity checking of Android partitions on eMMC. libavb was added as it is and minimal changes were introduced to reduce maintenance cost, because it will be deviated from AOSP upstream in the future. Changes: - license headers changed to conform SPDX-style - avb_crc32.c dropped - updates in avb_sysdeps_posix.c/avb_sysdeps.h For additional details check [1] AVB 2.0 README. [1] https://android.googlesource.com/platform/external/avb/+/master/README.md Signed-off-by: Igor Opaniuk <igor.opaniuk@linaro.org>
This commit is contained in:
parent
378b29cbc6
commit
d8f9d2af96
35 changed files with 6698 additions and 0 deletions
40
lib/libavb/avb_kernel_cmdline_descriptor.c
Normal file
40
lib/libavb/avb_kernel_cmdline_descriptor.c
Normal file
|
@ -0,0 +1,40 @@
|
|||
/*
|
||||
* Copyright (C) 2016 The Android Open Source Project
|
||||
*
|
||||
* SPDX-License-Identifier: MIT
|
||||
*/
|
||||
|
||||
#include "avb_kernel_cmdline_descriptor.h"
|
||||
#include "avb_util.h"
|
||||
|
||||
bool avb_kernel_cmdline_descriptor_validate_and_byteswap(
|
||||
const AvbKernelCmdlineDescriptor* src, AvbKernelCmdlineDescriptor* dest) {
|
||||
uint64_t expected_size;
|
||||
|
||||
avb_memcpy(dest, src, sizeof(AvbKernelCmdlineDescriptor));
|
||||
|
||||
if (!avb_descriptor_validate_and_byteswap((const AvbDescriptor*)src,
|
||||
(AvbDescriptor*)dest))
|
||||
return false;
|
||||
|
||||
if (dest->parent_descriptor.tag != AVB_DESCRIPTOR_TAG_KERNEL_CMDLINE) {
|
||||
avb_error("Invalid tag for kernel cmdline descriptor.\n");
|
||||
return false;
|
||||
}
|
||||
|
||||
dest->flags = avb_be32toh(dest->flags);
|
||||
dest->kernel_cmdline_length = avb_be32toh(dest->kernel_cmdline_length);
|
||||
|
||||
/* Check that kernel_cmdline is fully contained. */
|
||||
expected_size = sizeof(AvbKernelCmdlineDescriptor) - sizeof(AvbDescriptor);
|
||||
if (!avb_safe_add_to(&expected_size, dest->kernel_cmdline_length)) {
|
||||
avb_error("Overflow while adding up sizes.\n");
|
||||
return false;
|
||||
}
|
||||
if (expected_size > dest->parent_descriptor.num_bytes_following) {
|
||||
avb_error("Descriptor payload size overflow.\n");
|
||||
return false;
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue