cbfs/vboot: Adapt to new vb2_digest API
CL:3825558 changes all vb2_digest and vb2_hash functions to take a new hwcrypto_allowed argument, to potentially let them try to call the vb2ex_hwcrypto API for hash calculation. This change will open hardware crypto acceleration up to all hash calculations in coreboot (most notably CBFS verification). As part of this change, the vb2_digest_buffer() function has been removed, so replace existing instances in coreboot with the newer vb2_hash_calculate() API. Due to the circular dependency of these changes with vboot, this patch also needs to update the vboot submodule: Updating from commit id 18cb85b5: 2load_kernel.c: Expose load kernel as vb2_api to commit id b827ddb9: tests: Ensure auxfw sync runs after EC sync This brings in 15 new commits. Signed-off-by: Julius Werner <jwerner@chromium.org> Change-Id: I287d8dac3c49ad7ea3e18a015874ce8d610ec67e Reviewed-on: https://review.coreboot.org/c/coreboot/+/66561 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Jakub Czapiga <jacz@semihalf.com>
This commit is contained in:
@@ -67,7 +67,7 @@ static void *qualcomm_find_hash(struct buffer *in, size_t bb_offset, struct vb2_
|
||||
}
|
||||
|
||||
/* Pass out the actual hash of the current bootblock segment in |real_hash|. */
|
||||
if (vb2_hash_calculate(buffer_get(&elf) + pelf.phdr[bb_segment].p_offset,
|
||||
if (vb2_hash_calculate(false, buffer_get(&elf) + pelf.phdr[bb_segment].p_offset,
|
||||
pelf.phdr[bb_segment].p_filesz, VB2_HASH_SHA384, real_hash)) {
|
||||
ERROR("fixups: vboot digest error\n");
|
||||
goto destroy_elf;
|
||||
@@ -159,7 +159,7 @@ static void *mediatek_find_hash(struct buffer *bootblock, struct vb2_hash *real_
|
||||
return NULL;
|
||||
}
|
||||
|
||||
if (vb2_hash_calculate(buffer_get(&buffer),
|
||||
if (vb2_hash_calculate(false, buffer_get(&buffer),
|
||||
MEDIATEK_BOOTBLOCK_GFH_SIZE + data_size,
|
||||
VB2_HASH_SHA256, real_hash)) {
|
||||
ERROR("fixups: MediaTek: vboot digest error\n");
|
||||
|
Reference in New Issue
Block a user