|
@@ -242,18 +242,19 @@ static int fit_image_process_sig(const char *keydir, void *keydest,
|
|
|
/* Get keyname again, as FDT has changed and invalidated our pointer */
|
|
|
info.keyname = fdt_getprop(fit, noffset, "key-name-hint", NULL);
|
|
|
|
|
|
- if (keydest)
|
|
|
- ret = info.crypto->add_verify_data(&info, keydest);
|
|
|
- else
|
|
|
- return -1;
|
|
|
-
|
|
|
/*
|
|
|
* Write the public key into the supplied FDT file; this might fail
|
|
|
* several times, since we try signing with successively increasing
|
|
|
* size values
|
|
|
*/
|
|
|
- if (keydest && ret)
|
|
|
- return ret;
|
|
|
+ if (keydest) {
|
|
|
+ ret = info.crypto->add_verify_data(&info, keydest);
|
|
|
+ if (ret) {
|
|
|
+ printf("Failed to add verification data for '%s' signature node in '%s' image node\n",
|
|
|
+ node_name, image_name);
|
|
|
+ return ret;
|
|
|
+ }
|
|
|
+ }
|
|
|
|
|
|
return 0;
|
|
|
}
|