HomeSort by relevance Sort by last modified time
    Searched refs:rootkey (Results 1 - 12 of 12) sorted by null

  /external/vboot_reference/scripts/image_signing/
sign_firmware.sh 33 local rootkey="$4"
42 --rootkey="${rootkey}" \
71 local rootkey
94 rootkey="${key_dir}/root_key.loem${loem_index}.vbpubk"
95 cp "${rootkey}" "${loem_output_dir}/rootkey.${loemid}"
98 gbb_update "${temp_fw}" "${key_dir}" "${out_firmware}" "${rootkey}"
make_dev_firmware.sh 197 # Note resign_firmwarefd.sh needs the original rootkey to determine firmware
198 # body size, so we must resign image before changing GBB rootkey.
244 --rootkey="$root_pubkey" \
make_dev_ssd.sh 334 gbb_utility -g --rootkey="$rootkey_file" "$bios_image" >/dev/null 2>&1
338 # The magic 130 is counted by "od dev-rootkey" for the lines until the body
341 # TODO(hungte) compare with rootkey in $VBOOT_BASE directly.
362 - To change system rootkey: disable firmware write protection (a hardware
  /external/vboot_reference/tests/
vb2_firmware_tests.sh 27 ${FUTILITY} vbutil_key --pack rootkey.test \
37 --rootkey=rootkey.test
vb20_misc_tests.c 29 struct vb2_packed_key rootkey; member in struct:__anon21168
87 sd->gbb_rootkey_offset = vb2_offset_of(&mock_gbb, &mock_gbb.rootkey);
91 mock_gbb.rootkey.algorithm = 11;
92 mock_gbb.rootkey.key_offset =
93 vb2_offset_of(&mock_gbb.rootkey,
95 mock_gbb.rootkey.key_size = sizeof(mock_gbb.rootkey_data);
vb21_misc_tests.c 31 struct vb2_packed_key rootkey; member in struct:__anon21173
90 sd->gbb_rootkey_offset = vb2_offset_of(&mock_gbb, &mock_gbb.rootkey);
94 mock_gbb.rootkey.sig_alg = VB2_SIG_RSA8192;
95 mock_gbb.rootkey.key_offset =
96 vb2_offset_of(&mock_gbb.rootkey,
98 mock_gbb.rootkey.key_size = sizeof(mock_gbb.rootkey_data);
  /external/vboot_reference/tests/futility/
test_show_vs_verify.sh 33 ${FUTILITY} gbb_utility -g -k ${TMP}.rootkey ${TMP}.gbb
38 ${FUTILITY} show ${TMP}.vblock_a --publickey ${TMP}.rootkey
41 --publickey ${TMP}.rootkey \
47 --publickey ${TMP}.rootkey ; then false ; fi
50 --publickey ${TMP}.rootkey \
test_gbb_utility.sh 39 if ${FUTILITY} gbb_utility -s --rootkey ${TMP}.data1.toolong ${TMP}.blob; then false; fi
48 --rootkey ${TMP}.data1.short \
53 --rootkey ${TMP}.read1 \
65 ${FUTILITY} gbb_utility -s --rootkey ${TMP}.data1 ${TMP}.blob
70 ${FUTILITY} gbb_utility -g --rootkey ${TMP}.read1 ${TMP}.blob
105 # (rootkey) 0x0090 xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx
168 # rootkey: offset + size == end of file is okay; beyond is invalid
193 ${FUTILITY} gbb_utility -g --rootkey ${TMP}.read1 ${TMP}.blob.bad
194 if ${FUTILITY} gbb_utility -s --rootkey ${TMP}.data1 ${TMP}.blob.bad; then false; fi
  /external/vboot_reference/utility/
vbutil_what_keys 74 local hwid matchh rootkey matchn recoverykey matchr
79 futility gbb_utility --rootkey="$TMPFILE" "$file" >/dev/null
80 rootkey=$(futility vbutil_key --unpack "$TMPFILE" | grep sha1sum | \
82 matchn=$(greppy "$rootkey")
90 echo "$space root key: ${rootkey} ${matchn}"
dev_debug_vboot 314 log futility gbb_utility -g --rootkey rootkey.vbpubk \
317 log futility vbutil_key --unpack rootkey.vbpubk
319 futility vbutil_key --unpack rootkey.vbpubk |
327 --signpubkey rootkey.vbpubk \
332 --signpubkey rootkey.vbpubk \
  /external/vboot_reference/futility/
traversal.h 63 struct cb_area_s rootkey; member in struct:futil_traverse_state_s
cmd_show.c 157 printf(" rootkey 0x%08x 0x%08x\n",
176 state->rootkey.offset = state->my_area->offset +
178 state->rootkey.buf = buf + gbb->rootkey_offset;
179 state->rootkey.len = gbb->rootkey_size;
180 state->rootkey._flags |= AREA_IS_VALID;
295 if (!sign_key && (state->rootkey._flags & AREA_IS_VALID))
296 /* BIOS should have a rootkey in the GBB */
297 sign_key = (VbPublicKey *)state->rootkey.buf;
302 if (!sign_key && (state->rootkey._flags & AREA_IS_VALID))
303 /* BIOS should have a rootkey in the GBB *
    [all...]

Completed in 1190 milliseconds