aboutsummaryrefslogtreecommitdiffstats
path: root/verifier.cpp
diff options
context:
space:
mode:
authorMark Salyzyn <salyzyn@google.com>2014-03-14 21:35:41 +0000
committerAndroid Git Automerger <android-git-automerger@android.com>2014-03-14 21:35:41 +0000
commit679baa06b79e0c9100ce05fa0191928fc2a691fb (patch)
treed09a8d683cf713935e395168e403d1fbd61ea971 /verifier.cpp
parent679be487206a9f987b553fad081efb455bd28fcf (diff)
parent4b6de1ba1ce0fff95c18a8abb7ba6e5762006d49 (diff)
downloadbootable_recovery-679baa06b79e0c9100ce05fa0191928fc2a691fb.zip
bootable_recovery-679baa06b79e0c9100ce05fa0191928fc2a691fb.tar.gz
bootable_recovery-679baa06b79e0c9100ce05fa0191928fc2a691fb.tar.bz2
am 4b6de1ba: am 026ebe02: Merge "Recovery 64-bit compile issues"
* commit '4b6de1ba1ce0fff95c18a8abb7ba6e5762006d49': Recovery 64-bit compile issues
Diffstat (limited to 'verifier.cpp')
-rw-r--r--verifier.cpp14
1 files changed, 7 insertions, 7 deletions
diff --git a/verifier.cpp b/verifier.cpp
index 55d58ee..eeff95a 100644
--- a/verifier.cpp
+++ b/verifier.cpp
@@ -140,7 +140,7 @@ int verify_file(unsigned char* addr, size_t length,
size_t comment_size = footer[4] + (footer[5] << 8);
size_t signature_start = footer[0] + (footer[1] << 8);
- LOGI("comment is %d bytes; signature %d bytes from end\n",
+ LOGI("comment is %zu bytes; signature %zu bytes from end\n",
comment_size, signature_start);
if (signature_start <= FOOTER_SIZE) {
@@ -252,24 +252,24 @@ int verify_file(unsigned char* addr, size_t length,
if (pKeys[i].key_type == Certificate::RSA) {
if (sig_der_length < RSANUMBYTES) {
// "signature" block isn't big enough to contain an RSA block.
- LOGI("signature is too short for RSA key %d\n", i);
+ LOGI("signature is too short for RSA key %zu\n", i);
continue;
}
if (!RSA_verify(pKeys[i].rsa, sig_der, RSANUMBYTES,
hash, pKeys[i].hash_len)) {
- LOGI("failed to verify against RSA key %d\n", i);
+ LOGI("failed to verify against RSA key %zu\n", i);
continue;
}
- LOGI("whole-file signature verified against RSA key %d\n", i);
+ LOGI("whole-file signature verified against RSA key %zu\n", i);
free(sig_der);
return VERIFY_SUCCESS;
} else if (pKeys[i].key_type == Certificate::EC
&& pKeys[i].hash_len == SHA256_DIGEST_SIZE) {
p256_int r, s;
if (!dsa_sig_unpack(sig_der, sig_der_length, &r, &s)) {
- LOGI("Not a DSA signature block for EC key %d\n", i);
+ LOGI("Not a DSA signature block for EC key %zu\n", i);
continue;
}
@@ -277,11 +277,11 @@ int verify_file(unsigned char* addr, size_t length,
p256_from_bin(hash, &p256_hash);
if (!p256_ecdsa_verify(&(pKeys[i].ec->x), &(pKeys[i].ec->y),
&p256_hash, &r, &s)) {
- LOGI("failed to verify against EC key %d\n", i);
+ LOGI("failed to verify against EC key %zu\n", i);
continue;
}
- LOGI("whole-file signature verified against EC key %d\n", i);
+ LOGI("whole-file signature verified against EC key %zu\n", i);
free(sig_der);
return VERIFY_SUCCESS;
} else {