diff options
author | Heiko Stuebner <heiko.stuebner@theobroma-systems.com> | 2020-06-18 16:23:23 +0200 |
---|---|---|
committer | Tom Rini <trini@konsulko.com> | 2020-07-08 17:21:46 -0400 |
commit | 8434b4373058018ee5b79f06f2cafd6b7c0c15e1 (patch) | |
tree | 70a91795d986a7583ec92e833f23dd017b947362 /configs/chromebook_coral_defconfig | |
parent | 447b1d7580868273c426feb0985e966572755bc7 (diff) |
lib: rsa: bring exp_len in line when generating a key_prop
The exponent field of struct key_prop gets allocated an uint64_t,
and the contents are positioned from the back, so an exponent of
"0x01 0x00 0x01" becomes 0x0 0x0 0x0 0x0 0x0 0x1 0x0 0x1"
Right now rsa_gen_key_prop() allocates a uint64_t but sets exp_len
to the size returned from the parser, while on the other hand the
when getting the key from the devicetree exp_len always gets set to
sizeof(uint64_t).
So bring that in line with the established code.
Signed-off-by: Heiko Stuebner <heiko.stuebner@theobroma-systems.com>
Reviewed-by: Simon Glass <sjg@chromium.org>
Diffstat (limited to 'configs/chromebook_coral_defconfig')
0 files changed, 0 insertions, 0 deletions