summaryrefslogtreecommitdiff
path: root/firmware/2lib/2api.c
diff options
context:
space:
mode:
authorKangheui Won <khwon@chromium.org>2020-08-13 15:48:41 +1000
committerCommit Bot <commit-bot@chromium.org>2020-08-26 05:02:06 +0000
commite24a6f60c11ce3d616cb1932da6395a72c5b8bfd (patch)
tree7b5ec1f60bc3932643727eb52b9e6753e0e0d0fa /firmware/2lib/2api.c
parent927a95261259382ef0e167babcd997d3bfb6f1fd (diff)
downloadvboot-e24a6f60c11ce3d616cb1932da6395a72c5b8bfd.tar.gz
vboot2: use hwcrypto for RSA when allowed
Add vb2ex_hwcrypto_rsa_verify support for RSA verification. If firmware implements the function it will used instead of SW implementation in vboot. Also separate hwcrypto stubs to 2stub_hwcrypto.c for depthcharge and coreboot. Depthcharge needs stubs but fails to compile 2stub.c BRANCH=none BUG=b:163710320, b:161205813 TEST=make runtests TEST=check hwcrypto is allowed/disallowed depending on nvmem flag Change-Id: I85573e7cff31f32043db4b0a6b24b642856024e3 Signed-off-by: Kangheui Won <khwon@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/vboot_reference/+/2353775 Reviewed-by: Julius Werner <jwerner@chromium.org>
Diffstat (limited to 'firmware/2lib/2api.c')
-rw-r--r--firmware/2lib/2api.c2
1 files changed, 2 insertions, 0 deletions
diff --git a/firmware/2lib/2api.c b/firmware/2lib/2api.c
index d49b8d31..95dc6c2d 100644
--- a/firmware/2lib/2api.c
+++ b/firmware/2lib/2api.c
@@ -355,6 +355,8 @@ vb2_error_t vb2api_check_hash_get_digest(struct vb2_context *ctx,
vb2_member_of(sd, sd->data_key_offset),
sd->data_key_size));
+ key.allow_hwcrypto = vb2_hwcrypto_rsa_allowed(ctx);
+
/*
* Check digest vs. signature. Note that this destroys the signature.
* That's ok, because we only check each signature once per boot.