From nobody Sat Nov 23 19:43:16 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=gmail.com ARC-Seal: i=1; a=rsa-sha256; t=1731156286; cv=none; d=zohomail.com; s=zohoarc; b=jZPB6QSKFBCsBm0Fcw3X7rqqh9AEokCZqbTLxAD80YkJcnNRNbIZzlhUqHePhaqNS+ojMzY4PaUHsmN/XmNdQM5JLS7K8cQG0sVTQyi2qUPOieqmD08nvd6h0rex56BRHFfAPy/ZJdh56R1DlwmbbiDWhQjfdytCJLbCUTX8IZU= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1731156286; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=os4CGbEz6EmiRCGEOVCchR6kB/bcmjPHJBVNolbybUU=; b=Qa8gLRrRBm3Wa6PF6/hSif6+/xg5Og6MX+UVxA8Xpy9SGdm7HoLXMHUssarhvdU49+NK5XqcPKjDlX7hbewuS82jLT2ITCNWbFSnEKg3oL1ERFumwWhbZdhx8txed9OHYB2NlLUj/jiX8NOUTPYlL1LHDvSgJF9LFD4b1T1nAUU= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1731156286664582.5959962093344; Sat, 9 Nov 2024 04:44:46 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1t9kcA-0008Q7-26; Sat, 09 Nov 2024 07:30:56 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t9kbz-0008Gj-H8 for qemu-devel@nongnu.org; Sat, 09 Nov 2024 07:30:46 -0500 Received: from mail-pf1-x429.google.com ([2607:f8b0:4864:20::429]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1t9kbx-000729-12 for qemu-devel@nongnu.org; Sat, 09 Nov 2024 07:30:43 -0500 Received: by mail-pf1-x429.google.com with SMTP id d2e1a72fcca58-71e5a62031aso2545544b3a.1 for ; Sat, 09 Nov 2024 04:30:40 -0800 (PST) Received: from localhost.localdomain ([103.103.35.149]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7240786281asm5471470b3a.12.2024.11.09.04.30.36 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 09 Nov 2024 04:30:38 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1731155439; x=1731760239; darn=nongnu.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=os4CGbEz6EmiRCGEOVCchR6kB/bcmjPHJBVNolbybUU=; b=S/j4a33IJW8tpQxJ4rDPl1I2Zdwoe92MD9YQKyPH41F5xz22Cj0/pNjIh+9ICOjMaQ idpFySFJZx4ekHF6ZHv0KWtEQdAlCPsIdCqxSolSQnT7oIqA8xiJxQyrVpSvng32EUXq u7T6POktUHU51dIhJZNO/eUpXcWnZvnLWtGisu9J1VpQ9UssJYez2RsfoeXi8OnzO6Pn nKTbqG50bntikp2/9i7z7BsvFOanKvOiOWRAChncrI2zEK6Uc2n5wW1KeT0bKT0pOw+5 TZGgsN9+al5ElFQcn5P+LAhM1zt0LUUiNMxWguI21DEyHo3vpfDS67Cqxe6VIBhXk4tt NETQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1731155439; x=1731760239; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=os4CGbEz6EmiRCGEOVCchR6kB/bcmjPHJBVNolbybUU=; b=Rom1ZFZDEz61RPCCdBdkbRedG0ebfaxphWuytytjNV33y0Xl7hh61BKa84PfpHGxzk 8G3A9bU3WpC1L5FeGIn9T7+vm5+Q8h5/7V90C5p5CvC0c+NmwDKa9yCmb1tstLifX1Qx n56dZ5x/yo5DchT010KoGSPGwI4vMvHCT5lPPCyATG/IVe1X8oJZMNIhU3iDB/YZdYu0 1UjQwtKtlmptkqhJmPQYVum6so4iC9ohS0M4zlN6MD8erATYbJGWAzf0SugqQ4cpIiXS S3u6HwTbIF9Ys1EgVyc7wGMJRL2p9uqDXFQAsRCPaT+l+bOH6DpdKFHWS0uBPZhG5dBY uvnw== X-Gm-Message-State: AOJu0YxhV7Aiibf1K+bWHyhe8+aCvaTdY5DuiSocEphOyOM3SepVRtTe YjS8YHW6mW9xES9+LKLZO7RnhR8y7Tf+of9ESHxR3zCYaoqwgZgmIvXJeg== X-Google-Smtp-Source: AGHT+IGz8u5DShvwoz1DyqsTQrE/0w7Iut6Pp8zP3S3mjCsubNkX6pAo/+Ap0qc2ls3bJY+t7PZzhg== X-Received: by 2002:a05:6a00:14d3:b0:71d:ee1b:c854 with SMTP id d2e1a72fcca58-724132a134dmr9096125b3a.9.1731155438945; Sat, 09 Nov 2024 04:30:38 -0800 (PST) From: Dorjoy Chowdhury To: qemu-devel@nongnu.org Cc: graf@amazon.com, pbonzini@redhat.com, berrange@redhat.com Subject: [PATCH] eif: Use stateful qcrypto apis Date: Sat, 9 Nov 2024 18:30:39 +0600 Message-Id: <20241109123039.24180-1-dorjoychy111@gmail.com> X-Mailer: git-send-email 2.39.5 MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=2607:f8b0:4864:20::429; envelope-from=dorjoychy111@gmail.com; helo=mail-pf1-x429.google.com X-Spam_score_int: 15 X-Spam_score: 1.5 X-Spam_bar: + X-Spam_report: (1.5 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_SBL_CSS=3.335, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @gmail.com) X-ZM-MESSAGEID: 1731156288680116600 Content-Type: text/plain; charset="utf-8" We were storing the pointers to buffers in a GList due to lack of stateful crypto apis and instead doing the final hash computation at the end after we had all the necessary buffers. Now that we have the stateful qcrypto apis available, we can instead update the hashes inline in the read_eif_* functions which makes the code much simpler. Signed-off-by: Dorjoy Chowdhury --- hw/core/eif.c | 202 ++++++++++++-------------------- hw/i386/nitro_enclave.c | 12 +- include/hw/i386/nitro_enclave.h | 16 +-- 3 files changed, 91 insertions(+), 139 deletions(-) diff --git a/hw/core/eif.c b/hw/core/eif.c index 97b8cd6edc..1cfa53fcaf 100644 --- a/hw/core/eif.c +++ b/hw/core/eif.c @@ -187,10 +187,16 @@ static void safe_unlink(char *f) * Upon success, the caller is reponsible for unlinking and freeing *kerne= l_path */ static bool read_eif_kernel(FILE *f, uint64_t size, char **kernel_path, - uint8_t *kernel, uint32_t *crc, Error **errp) + QCryptoHash *hash0, QCryptoHash *hash1, + uint32_t *crc, Error **errp) { size_t got; FILE *tmp_file =3D NULL; + uint8_t *kernel =3D g_try_malloc(size); + if (!kernel) { + error_setg(errp, "Out of memory reading kernel section"); + goto cleanup; + } =20 *kernel_path =3D NULL; if (!get_tmp_file("eif-kernel-XXXXXX", kernel_path, errp)) { @@ -218,6 +224,11 @@ static bool read_eif_kernel(FILE *f, uint64_t size, ch= ar **kernel_path, } =20 *crc =3D crc32(*crc, kernel, size); + if (qcrypto_hash_update(hash0, (char *)kernel, size, errp) !=3D 0 || + qcrypto_hash_update(hash1, (char *)kernel, size, errp) !=3D 0) { + goto cleanup; + } + g_free(kernel); fclose(tmp_file); =20 return true; @@ -229,10 +240,12 @@ static bool read_eif_kernel(FILE *f, uint64_t size, c= har **kernel_path, g_free(*kernel_path); *kernel_path =3D NULL; =20 + g_free(kernel); return false; } =20 static bool read_eif_cmdline(FILE *f, uint64_t size, char *cmdline, + QCryptoHash *hash0, QCryptoHash *hash1, uint32_t *crc, Error **errp) { size_t got =3D fread(cmdline, 1, size, f); @@ -242,28 +255,47 @@ static bool read_eif_cmdline(FILE *f, uint64_t size, = char *cmdline, } =20 *crc =3D crc32(*crc, (uint8_t *)cmdline, size); + if (qcrypto_hash_update(hash0, cmdline, size, errp) !=3D 0 || + qcrypto_hash_update(hash1, cmdline, size, errp) !=3D 0) { + return false; + } return true; } =20 static bool read_eif_ramdisk(FILE *eif, FILE *initrd, uint64_t size, - uint8_t *ramdisk, uint32_t *crc, Error **errp) + QCryptoHash *hash0, QCryptoHash *h, uint32_t = *crc, + Error **errp) { size_t got; + bool ret =3D false; + uint8_t *ramdisk =3D g_try_malloc(size); + if (!ramdisk) { + error_setg(errp, "Out of memory reading initrd section"); + goto cleanup; + } =20 got =3D fread(ramdisk, 1, size, eif); if ((uint64_t) got !=3D size) { error_setg(errp, "Failed to read EIF ramdisk section data"); - return false; + goto cleanup; } =20 got =3D fwrite(ramdisk, 1, size, initrd); if ((uint64_t) got !=3D size) { error_setg(errp, "Failed to write EIF ramdisk data to temporary fi= le"); - return false; + goto cleanup; } =20 *crc =3D crc32(*crc, ramdisk, size); - return true; + if (qcrypto_hash_update(hash0, (char *)ramdisk, size, errp) !=3D 0 || + qcrypto_hash_update(h, (char *)ramdisk, size, errp) !=3D 0) { + goto cleanup; + } + ret =3D true; + + cleanup: + g_free(ramdisk); + return ret; } =20 static bool get_signature_fingerprint_sha384(FILE *eif, uint64_t size, @@ -391,34 +423,10 @@ static long get_file_size(FILE *f, Error **errp) return size; } =20 -static bool get_SHA384_digest(GList *list, uint8_t *digest, Error **errp) +static bool get_SHA384_hash(QCryptoHash *h, uint8_t *hash, Error **errp) { - size_t digest_len =3D QCRYPTO_HASH_DIGEST_LEN_SHA384; - size_t list_len =3D g_list_length(list); - struct iovec *iovec_list =3D g_new0(struct iovec, list_len); - bool ret =3D true; - GList *l; - int i; - - for (i =3D 0, l =3D list; l !=3D NULL; l =3D l->next, i++) { - iovec_list[i] =3D *(struct iovec *) l->data; - } - - if (qcrypto_hash_bytesv(QCRYPTO_HASH_ALGO_SHA384, iovec_list, list_len, - &digest, &digest_len, errp) < 0) { - ret =3D false; - } - - g_free(iovec_list); - return ret; -} - -static void free_iovec(struct iovec *iov) -{ - if (iov) { - g_free(iov->iov_base); - g_free(iov); - } + size_t hash_len =3D QCRYPTO_HASH_DIGEST_LEN_SHA384; + return qcrypto_hash_finalize_bytes(h, &hash, &hash_len, errp) =3D=3D 0; } =20 /* @@ -427,8 +435,8 @@ static void free_iovec(struct iovec *iov) */ bool read_eif_file(const char *eif_path, const char *machine_initrd, char **kernel_path, char **initrd_path, char **cmdline, - uint8_t *image_sha384, uint8_t *bootstrap_sha384, - uint8_t *app_sha384, uint8_t *fingerprint_sha384, + uint8_t *image_hash, uint8_t *bootstrap_hash, + uint8_t *app_hash, uint8_t *fingerprint_hash, bool *signature_found, Error **errp) { FILE *f =3D NULL; @@ -438,18 +446,29 @@ bool read_eif_file(const char *eif_path, const char *= machine_initrd, uint32_t crc =3D 0; EifHeader eif_header; bool seen_sections[EIF_SECTION_MAX] =3D {false}; - /* kernel + ramdisks + cmdline sha384 hash */ - GList *iov_PCR0 =3D NULL; - /* kernel + boot ramdisk + cmdline sha384 hash */ - GList *iov_PCR1 =3D NULL; - /* application ramdisk(s) hash */ - GList *iov_PCR2 =3D NULL; - uint8_t *ptr =3D NULL; - struct iovec *iov_ptr =3D NULL; + /* kernel + ramdisks + cmdline SHA384 hash */ + g_autoptr(QCryptoHash) hash0 =3D NULL; + /* kernel + boot ramdisk + cmdline SHA384 hash */ + g_autoptr(QCryptoHash) hash1 =3D NULL; + /* application ramdisk(s) SHA384 hash */ + g_autoptr(QCryptoHash) hash2 =3D NULL; =20 *signature_found =3D false; *kernel_path =3D *initrd_path =3D *cmdline =3D NULL; =20 + hash0 =3D qcrypto_hash_new(QCRYPTO_HASH_ALGO_SHA384, errp); + if (!hash0) { + goto cleanup; + } + hash1 =3D qcrypto_hash_new(QCRYPTO_HASH_ALGO_SHA384, errp); + if (!hash1) { + goto cleanup; + } + hash2 =3D qcrypto_hash_new(QCRYPTO_HASH_ALGO_SHA384, errp); + if (!hash2) { + goto cleanup; + } + f =3D fopen(eif_path, "rb"); if (f =3D=3D NULL) { error_setg_errno(errp, errno, "Failed to open %s", eif_path); @@ -513,21 +532,8 @@ bool read_eif_file(const char *eif_path, const char *m= achine_initrd, goto cleanup; } =20 - ptr =3D g_try_malloc(hdr.section_size); - if (!ptr) { - error_setg(errp, "Out of memory reading kernel section"); - goto cleanup; - } - - iov_ptr =3D g_malloc(sizeof(struct iovec)); - iov_ptr->iov_base =3D ptr; - iov_ptr->iov_len =3D hdr.section_size; - - iov_PCR0 =3D g_list_append(iov_PCR0, iov_ptr); - iov_PCR1 =3D g_list_append(iov_PCR1, iov_ptr); - - if (!read_eif_kernel(f, hdr.section_size, kernel_path, ptr, &c= rc, - errp)) { + if (!read_eif_kernel(f, hdr.section_size, kernel_path, hash0, + hash1, &crc, errp)) { goto cleanup; } =20 @@ -535,7 +541,6 @@ bool read_eif_file(const char *eif_path, const char *ma= chine_initrd, case EIF_SECTION_CMDLINE: { uint64_t size; - uint8_t *cmdline_copy; if (seen_sections[EIF_SECTION_CMDLINE]) { error_setg(errp, "Invalid EIF image. More than 1 cmdline " "section"); @@ -547,33 +552,26 @@ bool read_eif_file(const char *eif_path, const char *= machine_initrd, error_setg(errp, "Out of memory reading command line secti= on"); goto cleanup; } - if (!read_eif_cmdline(f, size, *cmdline, &crc, errp)) { + if (!read_eif_cmdline(f, size, *cmdline, hash0, hash1, &crc, + errp)) { goto cleanup; } (*cmdline)[size] =3D '\0'; =20 - /* - * We make a copy of '*cmdline' for putting it in iovecs so th= at - * we can easily free all the iovec entries later as we cannot - * free '*cmdline' which is used by the caller. - */ - cmdline_copy =3D g_memdup2(*cmdline, size); - - iov_ptr =3D g_malloc(sizeof(struct iovec)); - iov_ptr->iov_base =3D cmdline_copy; - iov_ptr->iov_len =3D size; - - iov_PCR0 =3D g_list_append(iov_PCR0, iov_ptr); - iov_PCR1 =3D g_list_append(iov_PCR1, iov_ptr); break; } case EIF_SECTION_RAMDISK: { + QCryptoHash *h =3D hash2; if (!seen_sections[EIF_SECTION_RAMDISK]) { /* * If this is the first time we are seeing a ramdisk secti= on, - * we need to create the initrd temporary file. + * we need to: + * 1) hash it into bootstrap (hash1) instead of app (hash2) + * along with image (hash0) + * 2) create the initrd temporary file. */ + h =3D hash1; if (!get_tmp_file("eif-initrd-XXXXXX", initrd_path, errp))= { goto cleanup; } @@ -585,29 +583,7 @@ bool read_eif_file(const char *eif_path, const char *m= achine_initrd, } } =20 - ptr =3D g_try_malloc(hdr.section_size); - if (!ptr) { - error_setg(errp, "Out of memory reading initrd section"); - goto cleanup; - } - - iov_ptr =3D g_malloc(sizeof(struct iovec)); - iov_ptr->iov_base =3D ptr; - iov_ptr->iov_len =3D hdr.section_size; - - iov_PCR0 =3D g_list_append(iov_PCR0, iov_ptr); - /* - * If it's the first ramdisk, we need to hash it into bootstrap - * i.e., iov_PCR1, otherwise we need to hash it into app i.e., - * iov_PCR2. - */ - if (!seen_sections[EIF_SECTION_RAMDISK]) { - iov_PCR1 =3D g_list_append(iov_PCR1, iov_ptr); - } else { - iov_PCR2 =3D g_list_append(iov_PCR2, iov_ptr); - } - - if (!read_eif_ramdisk(f, initrd_path_f, hdr.section_size, ptr, + if (!read_eif_ramdisk(f, initrd_path_f, hdr.section_size, hash= 0, h, &crc, errp)) { goto cleanup; } @@ -617,7 +593,7 @@ bool read_eif_file(const char *eif_path, const char *ma= chine_initrd, case EIF_SECTION_SIGNATURE: *signature_found =3D true; if (!get_signature_fingerprint_sha384(f, hdr.section_size, - fingerprint_sha384, &crc, + fingerprint_hash, &crc, errp)) { goto cleanup; } @@ -688,52 +664,28 @@ bool read_eif_file(const char *eif_path, const char *= machine_initrd, goto cleanup; } =20 - ptr =3D g_try_malloc(machine_initrd_size); - if (!ptr) { - error_setg(errp, "Out of memory reading initrd file"); - goto cleanup; - } - - iov_ptr =3D g_malloc(sizeof(struct iovec)); - iov_ptr->iov_base =3D ptr; - iov_ptr->iov_len =3D machine_initrd_size; - - iov_PCR0 =3D g_list_append(iov_PCR0, iov_ptr); - iov_PCR2 =3D g_list_append(iov_PCR2, iov_ptr); - if (!read_eif_ramdisk(machine_initrd_f, initrd_path_f, - machine_initrd_size, ptr, &crc, errp)) { + machine_initrd_size, hash0, hash2, &crc, err= p)) { goto cleanup; } } =20 - if (!get_SHA384_digest(iov_PCR0, image_sha384, errp)) { + if (!get_SHA384_hash(hash0, image_hash, errp)) { goto cleanup; } - if (!get_SHA384_digest(iov_PCR1, bootstrap_sha384, errp)) { + if (!get_SHA384_hash(hash1, bootstrap_hash, errp)) { goto cleanup; } - if (!get_SHA384_digest(iov_PCR2, app_sha384, errp)) { + if (!get_SHA384_hash(hash2, app_hash, errp)) { goto cleanup; } =20 - /* - * We only need to free iov_PCR0 entries because iov_PCR1 and - * iov_PCR2 iovec entries are subsets of iov_PCR0 iovec entries. - */ - g_list_free_full(iov_PCR0, (GDestroyNotify) free_iovec); - g_list_free(iov_PCR1); - g_list_free(iov_PCR2); fclose(f); fclose(initrd_path_f); safe_fclose(machine_initrd_f); return true; =20 cleanup: - g_list_free_full(iov_PCR0, (GDestroyNotify) free_iovec); - g_list_free(iov_PCR1); - g_list_free(iov_PCR2); - safe_fclose(f); safe_fclose(initrd_path_f); safe_fclose(machine_initrd_f); diff --git a/hw/i386/nitro_enclave.c b/hw/i386/nitro_enclave.c index b6263ae127..acbbc06b71 100644 --- a/hw/i386/nitro_enclave.c +++ b/hw/i386/nitro_enclave.c @@ -117,13 +117,13 @@ static void nitro_enclave_machine_reset(MachineState = *machine, ResetType type) memset(ne_state->vnsm->pcrs, 0, sizeof(ne_state->vnsm->pcrs)); =20 /* PCR0 */ - ne_state->vnsm->extend_pcr(ne_state->vnsm, 0, ne_state->image_sha384, + ne_state->vnsm->extend_pcr(ne_state->vnsm, 0, ne_state->image_hash, QCRYPTO_HASH_DIGEST_LEN_SHA384); /* PCR1 */ - ne_state->vnsm->extend_pcr(ne_state->vnsm, 1, ne_state->bootstrap_sha3= 84, + ne_state->vnsm->extend_pcr(ne_state->vnsm, 1, ne_state->bootstrap_hash, QCRYPTO_HASH_DIGEST_LEN_SHA384); /* PCR2 */ - ne_state->vnsm->extend_pcr(ne_state->vnsm, 2, ne_state->app_sha384, + ne_state->vnsm->extend_pcr(ne_state->vnsm, 2, ne_state->app_hash, QCRYPTO_HASH_DIGEST_LEN_SHA384); /* PCR3 */ if (ne_state->parent_role) { @@ -140,7 +140,7 @@ static void nitro_enclave_machine_reset(MachineState *m= achine, ResetType type) /* PCR8 */ if (ne_state->signature_found) { ne_state->vnsm->extend_pcr(ne_state->vnsm, 8, - ne_state->fingerprint_sha384, + ne_state->fingerprint_hash, QCRYPTO_HASH_DIGEST_LEN_SHA384); } =20 @@ -173,8 +173,8 @@ static void x86_load_eif(X86MachineState *x86ms, FWCfgS= tate *fw_cfg, =20 if (!read_eif_file(machine->kernel_filename, machine->initrd_filename, &eif_kernel, &eif_initrd, &eif_cmdline, - nems->image_sha384, nems->bootstrap_sha384, - nems->app_sha384, nems->fingerprint_sha384, + nems->image_hash, nems->bootstrap_hash, + nems->app_hash, nems->fingerprint_hash, &(nems->signature_found), &err)) { error_report_err(err); exit(1); diff --git a/include/hw/i386/nitro_enclave.h b/include/hw/i386/nitro_enclav= e.h index b65875033c..885163ff64 100644 --- a/include/hw/i386/nitro_enclave.h +++ b/include/hw/i386/nitro_enclave.h @@ -44,14 +44,14 @@ struct NitroEnclaveMachineState { /* Machine state */ VirtIONSM *vnsm; =20 - /* kernel + ramdisks + cmdline sha384 hash */ - uint8_t image_sha384[QCRYPTO_HASH_DIGEST_LEN_SHA384]; - /* kernel + boot ramdisk + cmdline sha384 hash */ - uint8_t bootstrap_sha384[QCRYPTO_HASH_DIGEST_LEN_SHA384]; - /* application ramdisk(s) hash */ - uint8_t app_sha384[QCRYPTO_HASH_DIGEST_LEN_SHA384]; - /* certificate fingerprint hash */ - uint8_t fingerprint_sha384[QCRYPTO_HASH_DIGEST_LEN_SHA384]; + /* kernel + ramdisks + cmdline SHA384 hash */ + uint8_t image_hash[QCRYPTO_HASH_DIGEST_LEN_SHA384]; + /* kernel + boot ramdisk + cmdline SHA384 hash */ + uint8_t bootstrap_hash[QCRYPTO_HASH_DIGEST_LEN_SHA384]; + /* application ramdisk(s) SHA384 hash */ + uint8_t app_hash[QCRYPTO_HASH_DIGEST_LEN_SHA384]; + /* certificate fingerprint SHA384 hash */ + uint8_t fingerprint_hash[QCRYPTO_HASH_DIGEST_LEN_SHA384]; bool signature_found; }; =20 --=20 2.39.5