Julius Werner has uploaded this change for review.
vboot: Force config file inclusion with CBFS integration
CONFIG_VBOOT_CBFS_INTEGRATION images are signed differently than normal
images. futility needs to be able to tell this difference, and it parses
the `config` file included in CBFS to do this. This change codifies that
dependency in Kconfig so that nobody can accidentally break this by
turning off config file inclusion.
Signed-off-by: Julius Werner <jwerner@chromium.org>
Change-Id: I2b2d245b850bc65abb4e72f20b4e360312c828f7
---
M src/security/vboot/Kconfig
1 file changed, 17 insertions(+), 0 deletions(-)
git pull ssh://review.coreboot.org:29418/coreboot refs/changes/57/70157/1
diff --git a/src/security/vboot/Kconfig b/src/security/vboot/Kconfig
index 93e1845..9025979 100644
--- a/src/security/vboot/Kconfig
+++ b/src/security/vboot/Kconfig
@@ -40,6 +40,7 @@
default n
depends on VBOOT_SLOTS_RW_A
depends on CBFS_VERIFICATION
+ select INCLUDE_CONFIG_FILE # futility needs this to auto-detect signing type
help
Say yes here to enable cryptographic verification of RW slots CBFS
metadata. This will replace body hash verification.
To view, visit change 70157. To unsubscribe, or for help writing mail filters, visit settings.