@@ -30,7 +30,7 @@ import (
3030 "math/big"
3131 "os"
3232
33- "github.com/chrisccoulson /go-tpm2"
33+ "github.com/canonical /go-tpm2"
3434 "github.com/snapcore/snapd/osutil"
3535 "github.com/snapcore/snapd/osutil/sys"
3636
@@ -75,7 +75,7 @@ type keyData struct {
7575func readKeyPolicyUpdateData (buf io.Reader ) (* keyPolicyUpdateData , error ) {
7676 var header uint32
7777 var version uint32
78- if err := tpm2 .UnmarshalFromReader (buf , & header , & version ); err != nil {
78+ if _ , err := tpm2 .UnmarshalFromReader (buf , & header , & version ); err != nil {
7979 return nil , xerrors .Errorf ("cannot unmarshal header and version number: %w" , err )
8080 }
8181
@@ -87,7 +87,7 @@ func readKeyPolicyUpdateData(buf io.Reader) (*keyPolicyUpdateData, error) {
8787 }
8888
8989 var d keyPolicyUpdateData
90- if err := tpm2 .UnmarshalFromReader (buf , & d ); err != nil {
90+ if _ , err := tpm2 .UnmarshalFromReader (buf , & d ); err != nil {
9191 return nil , xerrors .Errorf ("cannot unmarshal key data: %w" , err )
9292 }
9393
@@ -96,7 +96,10 @@ func readKeyPolicyUpdateData(buf io.Reader) (*keyPolicyUpdateData, error) {
9696
9797// write serializes keyPolicyUpdateData to the provided io.Writer.
9898func (d * keyPolicyUpdateData ) write (buf io.Writer ) error {
99- return tpm2 .MarshalToWriter (buf , keyPolicyUpdateDataHeader , currentVersion , d )
99+ if _ , err := tpm2 .MarshalToWriter (buf , keyPolicyUpdateDataHeader , currentVersion , d ); err != nil {
100+ return err
101+ }
102+ return nil
100103}
101104
102105type keyFileError struct {
@@ -120,7 +123,7 @@ func isKeyFileError(err error) bool {
120123func readKeyData (buf io.Reader ) (* keyData , error ) {
121124 var header uint32
122125 var version uint32
123- if err := tpm2 .UnmarshalFromReader (buf , & header , & version ); err != nil {
126+ if _ , err := tpm2 .UnmarshalFromReader (buf , & header , & version ); err != nil {
124127 return nil , keyFileError {xerrors .Errorf ("cannot unmarshal header and version number: %w" , err )}
125128 }
126129
@@ -132,7 +135,7 @@ func readKeyData(buf io.Reader) (*keyData, error) {
132135 }
133136
134137 var d keyData
135- if err := tpm2 .UnmarshalFromReader (buf , & d ); err != nil {
138+ if _ , err := tpm2 .UnmarshalFromReader (buf , & d ); err != nil {
136139 return nil , keyFileError {xerrors .Errorf ("cannot unmarshal key data: %w" , err )}
137140 }
138141
@@ -167,7 +170,10 @@ func (d *keyData) load(tpm *tpm2.TPMContext, session tpm2.SessionContext) (tpm2.
167170
168171// write serializes keyData in to the provided io.Writer.
169172func (d * keyData ) write (buf io.Writer ) error {
170- return tpm2 .MarshalToWriter (buf , keyDataHeader , currentVersion , d )
173+ if _ , err := tpm2 .MarshalToWriter (buf , keyDataHeader , currentVersion , d ); err != nil {
174+ return err
175+ }
176+ return nil
171177}
172178
173179// writeToFileAtomic serializes keyData and writes it atomically to the file at the specified path.
@@ -178,7 +184,7 @@ func (d *keyData) writeToFileAtomic(dest string) error {
178184 }
179185 defer f .Cancel ()
180186
181- if err := tpm2 .MarshalToWriter (f , keyDataHeader , currentVersion , d ); err != nil {
187+ if _ , err := tpm2 .MarshalToWriter (f , keyDataHeader , currentVersion , d ); err != nil {
182188 return xerrors .Errorf ("cannot marshal key data to temporary file: %w" , err )
183189 }
184190
@@ -306,7 +312,7 @@ func validateKeyData(tpm *tpm2.TPMContext, data *keyData, policyUpdateData *keyP
306312
307313 // Verify that the private data structure is bound to the key data structure.
308314 h := data .KeyPublic .NameAlg .NewHash ()
309- if err := tpm2 .MarshalToWriter (h , policyUpdateData .CreationData ); err != nil {
315+ if _ , err := tpm2 .MarshalToWriter (h , policyUpdateData .CreationData ); err != nil {
310316 panic (fmt .Sprintf ("cannot marshal creation data: %v" , err ))
311317 }
312318
@@ -319,7 +325,7 @@ func validateKeyData(tpm *tpm2.TPMContext, data *keyData, policyUpdateData *keyP
319325 }
320326
321327 h = crypto .SHA256 .New ()
322- if err := tpm2 .MarshalToWriter (h , & policyUpdateData .Data ); err != nil {
328+ if _ , err := tpm2 .MarshalToWriter (h , & policyUpdateData .Data ); err != nil {
323329 panic (fmt .Sprintf ("cannot marshal dynamic authorization policy update data: %v" , err ))
324330 }
325331
0 commit comments