Julius Werner has uploaded this change for review.

View Change

vboot: Force config file inclusion with CBFS integration

CONFIG_VBOOT_CBFS_INTEGRATION images are signed differently than normal
images. futility needs to be able to tell this difference, and it parses
the `config` file included in CBFS to do this. This change codifies that
dependency in Kconfig so that nobody can accidentally break this by
turning off config file inclusion.

Signed-off-by: Julius Werner <jwerner@chromium.org>
Change-Id: I2b2d245b850bc65abb4e72f20b4e360312c828f7
---
M src/security/vboot/Kconfig
1 file changed, 17 insertions(+), 0 deletions(-)

git pull ssh://review.coreboot.org:29418/coreboot refs/changes/57/70157/1
diff --git a/src/security/vboot/Kconfig b/src/security/vboot/Kconfig
index 93e1845..9025979 100644
--- a/src/security/vboot/Kconfig
+++ b/src/security/vboot/Kconfig
@@ -40,6 +40,7 @@
default n
depends on VBOOT_SLOTS_RW_A
depends on CBFS_VERIFICATION
+ select INCLUDE_CONFIG_FILE # futility needs this to auto-detect signing type
help
Say yes here to enable cryptographic verification of RW slots CBFS
metadata. This will replace body hash verification.

To view, visit change 70157. To unsubscribe, or for help writing mail filters, visit settings.

Gerrit-Project: coreboot
Gerrit-Branch: master
Gerrit-Change-Id: I2b2d245b850bc65abb4e72f20b4e360312c828f7
Gerrit-Change-Number: 70157
Gerrit-PatchSet: 1
Gerrit-Owner: Julius Werner <jwerner@chromium.org>
Gerrit-MessageType: newchange