diff options
author | Mark Salyzyn <salyzyn@google.com> | 2014-03-14 22:35:41 +0100 |
---|---|---|
committer | Android Git Automerger <android-git-automerger@android.com> | 2014-03-14 22:35:41 +0100 |
commit | 679baa06b79e0c9100ce05fa0191928fc2a691fb (patch) | |
tree | d09a8d683cf713935e395168e403d1fbd61ea971 /verifier.cpp | |
parent | am 239fb930: am a7266ef0: Merge "separate fbdev-specific code out from minui" (diff) | |
parent | am 026ebe02: Merge "Recovery 64-bit compile issues" (diff) | |
download | android_bootable_recovery-679baa06b79e0c9100ce05fa0191928fc2a691fb.tar android_bootable_recovery-679baa06b79e0c9100ce05fa0191928fc2a691fb.tar.gz android_bootable_recovery-679baa06b79e0c9100ce05fa0191928fc2a691fb.tar.bz2 android_bootable_recovery-679baa06b79e0c9100ce05fa0191928fc2a691fb.tar.lz android_bootable_recovery-679baa06b79e0c9100ce05fa0191928fc2a691fb.tar.xz android_bootable_recovery-679baa06b79e0c9100ce05fa0191928fc2a691fb.tar.zst android_bootable_recovery-679baa06b79e0c9100ce05fa0191928fc2a691fb.zip |
Diffstat (limited to 'verifier.cpp')
-rw-r--r-- | verifier.cpp | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/verifier.cpp b/verifier.cpp index 55d58ee22..eeff95a59 100644 --- a/verifier.cpp +++ b/verifier.cpp @@ -140,7 +140,7 @@ int verify_file(unsigned char* addr, size_t length, size_t comment_size = footer[4] + (footer[5] << 8); size_t signature_start = footer[0] + (footer[1] << 8); - LOGI("comment is %d bytes; signature %d bytes from end\n", + LOGI("comment is %zu bytes; signature %zu bytes from end\n", comment_size, signature_start); if (signature_start <= FOOTER_SIZE) { @@ -252,24 +252,24 @@ int verify_file(unsigned char* addr, size_t length, if (pKeys[i].key_type == Certificate::RSA) { if (sig_der_length < RSANUMBYTES) { // "signature" block isn't big enough to contain an RSA block. - LOGI("signature is too short for RSA key %d\n", i); + LOGI("signature is too short for RSA key %zu\n", i); continue; } if (!RSA_verify(pKeys[i].rsa, sig_der, RSANUMBYTES, hash, pKeys[i].hash_len)) { - LOGI("failed to verify against RSA key %d\n", i); + LOGI("failed to verify against RSA key %zu\n", i); continue; } - LOGI("whole-file signature verified against RSA key %d\n", i); + LOGI("whole-file signature verified against RSA key %zu\n", i); free(sig_der); return VERIFY_SUCCESS; } else if (pKeys[i].key_type == Certificate::EC && pKeys[i].hash_len == SHA256_DIGEST_SIZE) { p256_int r, s; if (!dsa_sig_unpack(sig_der, sig_der_length, &r, &s)) { - LOGI("Not a DSA signature block for EC key %d\n", i); + LOGI("Not a DSA signature block for EC key %zu\n", i); continue; } @@ -277,11 +277,11 @@ int verify_file(unsigned char* addr, size_t length, p256_from_bin(hash, &p256_hash); if (!p256_ecdsa_verify(&(pKeys[i].ec->x), &(pKeys[i].ec->y), &p256_hash, &r, &s)) { - LOGI("failed to verify against EC key %d\n", i); + LOGI("failed to verify against EC key %zu\n", i); continue; } - LOGI("whole-file signature verified against EC key %d\n", i); + LOGI("whole-file signature verified against EC key %zu\n", i); free(sig_der); return VERIFY_SUCCESS; } else { |