@@ -37,12 +37,13 @@ exit_no_keys() {
3737 log_err " Please generate them first with '${2} create' and then enroll them with '${2} enroll'."
3838 exit 1
3939}
40+ var_invalid_err_exit () {
41+ log_err " '${1} ' is invalid in '${2} '."
42+ exit 1
43+ }
4044var_invalid_warning () {
4145 log_warning " '${1} ' is invalid in '${2} '."
4246}
43- var_invalid_err () {
44- log_err " '${1} ' is invalid in '${2} '."
45- }
4647
4748# Default path for cryptboot.conf
4849CONFIGURATION_FILE=/etc/cryptboot.conf
@@ -165,10 +166,12 @@ EOF
165166 sha1sum -c <<< " ${SHA1SUMS}" ||
166167 {
167168 log_err " Could not verify checksums for MS certs with 'sha1sum'."
169+ exit 1
168170 }
169171 sha256sum -c <<< " ${SHA256SUMS}" ||
170172 {
171173 log_err " Could not verify checksums for MS certs with 'sha256sum'."
174+ exit 1
172175 }
173176 # # Create EFI Signature List for sbvarsign(1), efi-updatevar(1), KeyTool and firmware -> .esl
174177 # # See: https://wiki.archlinux.org/title/Unified_Extensible_Firmware_Interface/Secure_Boot#Creating_keys
@@ -304,10 +307,7 @@ sign)
304307 # Sign valid files included in FILENAME
305308 for file in ${FILENAME} ; do
306309 [[ -f " ${file} " ]] ||
307- {
308- var_invalid_err " ${file} " " ${FILENAME} "
309- exit 1
310- }
310+ var_invalid_err_exit " ${file} " " ${FILENAME} "
311311 # Sign file
312312 sbverify --cert ./db.crt " ${file} " ||
313313 {
@@ -333,10 +333,7 @@ verify)
333333 # Verify valid files included in FILENAME
334334 for file in ${FILENAME} ; do
335335 [[ -f " ${file} " ]] ||
336- {
337- var_invalid_err " ${file} " " ${FILENAME} "
338- exit 1
339- }
336+ var_invalid_err_exit " ${file} " " ${FILENAME} "
340337 # List signatures in FILENAME
341338 echo " List of all signatures in '${file} ':"
342339 sbverify --list " ${file} "
0 commit comments