[sw/silicon_creator] Rename sigverify_rom_ext_signature_verify()
Signed-off-by: Alphan Ulusoy <alphan@google.com>
diff --git a/sw/device/silicon_creator/mask_rom/mask_rom.c b/sw/device/silicon_creator/mask_rom/mask_rom.c
index 6439128..e41eb43 100644
--- a/sw/device/silicon_creator/mask_rom/mask_rom.c
+++ b/sw/device/silicon_creator/mask_rom/mask_rom.c
@@ -103,9 +103,8 @@
&key) != kErrorOk) {
break;
}
- if (sigverify_rom_ext_signature_verify(
- signed_region.start, signed_region.length, &manifest->signature,
- key) != kErrorOk) {
+ if (sigverify_rsa_verify(signed_region.start, signed_region.length,
+ &manifest->signature, key) != kErrorOk) {
break;
}
diff --git a/sw/device/silicon_creator/mask_rom/sigverify.c b/sw/device/silicon_creator/mask_rom/sigverify.c
index 1a46555..1cc39c5 100644
--- a/sw/device/silicon_creator/mask_rom/sigverify.c
+++ b/sw/device/silicon_creator/mask_rom/sigverify.c
@@ -69,12 +69,13 @@
return kErrorOk;
}
-rom_error_t sigverify_rom_ext_signature_verify(
- const void *signed_region, size_t signed_region_len,
- const sigverify_rsa_buffer_t *signature, const sigverify_rsa_key_t *key) {
+rom_error_t sigverify_rsa_verify(const void *signed_message,
+ size_t signed_message_len,
+ const sigverify_rsa_buffer_t *signature,
+ const sigverify_rsa_key_t *key) {
hmac_digest_t act_digest;
hmac_sha256_init();
- RETURN_IF_ERROR(hmac_sha256_update(signed_region, signed_region_len));
+ RETURN_IF_ERROR(hmac_sha256_update(signed_message, signed_message_len));
RETURN_IF_ERROR(hmac_sha256_final(&act_digest));
// FIXME: Choose between Ibex and OTBN using OTP.
diff --git a/sw/device/silicon_creator/mask_rom/sigverify.h b/sw/device/silicon_creator/mask_rom/sigverify.h
index b91e9a7..f73e7b5 100644
--- a/sw/device/silicon_creator/mask_rom/sigverify.h
+++ b/sw/device/silicon_creator/mask_rom/sigverify.h
@@ -30,17 +30,18 @@
}
/**
- * Verifies the signature of a ROM_EXT manifest.
+ * Verifies an RSASSA-PKCS1-v1_5 signature.
*
- * @param signed_region Pointer to the start of the signed region.
- * @param signed_region_len Length of the signed region in bytes.
- * @param signature An RSA signature.
- * @param key RSA public key to use for verifying the signature.
+ * @param signed_message Message whose signature is to be verified.
+ * @param signed_message_len Length of the signed message in bytes.
+ * @param signature Signature to be verified.
+ * @param key Signer's RSA public key.
* @return Result of the operation.
*/
-rom_error_t sigverify_rom_ext_signature_verify(
- const void *signed_region, size_t signed_region_len,
- const sigverify_rsa_buffer_t *signature, const sigverify_rsa_key_t *key);
+rom_error_t sigverify_rsa_verify(const void *signed_message,
+ size_t signed_message_len,
+ const sigverify_rsa_buffer_t *signature,
+ const sigverify_rsa_key_t *key);
#ifdef __cplusplus
} // extern "C"
diff --git a/sw/device/silicon_creator/mask_rom/sigverify_unittest.cc b/sw/device/silicon_creator/mask_rom/sigverify_unittest.cc
index 0b0f37b..f5d67bf 100644
--- a/sw/device/silicon_creator/mask_rom/sigverify_unittest.cc
+++ b/sw/device/silicon_creator/mask_rom/sigverify_unittest.cc
@@ -101,9 +101,8 @@
.WillOnce(DoAll(SetArgPointee<2>(kEncMsg), Return(kErrorOk)));
// FIXME: Parameterize with key ids.
- EXPECT_EQ(sigverify_rom_ext_signature_verify(
- kSignedRegion.data(), sizeof(kSignedRegion), &kSignature,
- &kSigVerifyRsaKeys[0]),
+ EXPECT_EQ(sigverify_rsa_verify(kSignedRegion.data(), sizeof(kSignedRegion),
+ &kSignature, &kSigVerifyRsaKeys[0]),
kErrorOk);
}
@@ -126,9 +125,8 @@
.WillOnce(DoAll(SetArgPointee<2>(bad_enc_msg), Return(true)));
// FIXME: Parameterize with key ids.
- EXPECT_EQ(sigverify_rom_ext_signature_verify(
- kSignedRegion.data(), sizeof(kSignedRegion), &kSignature,
- &kSigVerifyRsaKeys[0]),
+ EXPECT_EQ(sigverify_rsa_verify(kSignedRegion.data(), sizeof(kSignedRegion),
+ &kSignature, &kSigVerifyRsaKeys[0]),
kErrorSigverifyInvalidArgument);
}
}