/external/vboot_reference/tests/futility/ |
test_sign_fw_main.sh | 18 ${FUTILITY} vbutil_firmware --vblock ${TMP}.vblock.old \ 27 ${FUTILITY} vbutil_firmware --verify ${TMP}.vblock.old \ 39 ${TMP}.vblock.new 42 cmp ${TMP}.vblock.old ${TMP}.vblock.new
|
test_sign_kernel.sh | 142 # compare this new vblock with the one from the full pack 160 # compare this new vblock with the one from the full pack 166 # now repack the old way, again emitting just the vblock 178 # compare the full repacked vblock with the new repacked vblock 184 # and verify it using the new vblock (no way to do that with vbutil_kernel) 203 # compare the full repacked vblock with the new repacked vblock 209 # and verify it using the new vblock (no way to do that with vbutil_kernel)
|
test_show_vs_verify.sh | 28 #### firmware vblock
|
/external/vboot_reference/tests/ |
vboot_firmware_tests.c | 24 static VbKeyBlockHeader vblock[2]; variable 53 fparams.verification_block_A = vblock; 55 fparams.verification_block_B = vblock + 1; 58 Memset(vblock, 0, sizeof(vblock)); 62 vblock[i].key_block_flags = 0x0F; 63 vblock[i].data_key.key_version = 2; 65 vblock[i].key_block_size = 66 (uint8_t*)(mpreamble + i) - (uint8_t*)(vblock + i); 117 TEST_NEQ(block==vblock || block==vblock+1, 0, " Verify a valid key block") [all...] |
run_preamble_tests.sh | 43 echo -n "${what} fw_${d}_${r}.vblock with root_${rr}.vbpubk ... " 45 --verify "${V2DIR}/fw_${d}_${r}.vblock" \ 71 echo -n "${what} kern_${d}_${r}.vblock with root_${rr}.vbpubk ... " 73 --verify "${V2DIR}/kern_${d}_${r}.vblock" \ 90 echo -n "verify kern_${d}_${r}.vblock with hash only ... " 92 --verify "${V2DIR}/kern_${d}_${r}.vblock" >/dev/null 2>&1
|
vb2_firmware_tests.sh | 46 --vblock vblock.test \ 56 ${BUILD_RUN}/tests/vb20_verify_fw gbb.test vblock.test body.test
|
gen_fuzz_test_cases.sh | 44 --vblock ${TESTCASE_DIR}/firmware.vblock \ 55 --pack ${TESTCASE_DIR}/kernel.vblock.image \
|
gen_preamble_testdata.sh | 67 vbutil_firmware --vblock "${V2DIR}/fw_${d}_${r}.vblock" \ 73 vbutil_kernel --pack "${V2DIR}/kern_${d}_${r}.vblock" \
|
run_vbutil_kernel_arg_tests.sh | 45 echo -n "pack kern_${k}_${b}.vblock ... " 48 --pack "${TMPDIR}/kern_${k}_${b}.vblock" \ 68 for v in ${TMPDIR}/kern_*.vblock; do 155 # To verify it, we have to replace the vblock from the original image.
|
vb20_verify_fw.c | 136 printf("Usage: %s <gbb> <vblock> <body>\n", progname);
|
/external/vboot_reference/scripts/image_signing/ |
convert_recovery_to_full_ssd.sh | 61 # Overwrite the kernel vblock on the created SSD image. 65 sudo cp ${stateful_dir}/vmlinuz_hd.vblock ${tmp_vblock} 66 echo "Overwriting kernel vblock with SSD kernel vblock"
|
convert_recovery_to_ssd.sh | 69 # Overwrite the vblock. 73 sudo cp ${stateful_dir}/vmlinuz_hd.vblock ${tmp_vblock} 76 echo "Overwriting kernel partition A vblock with SSD vblock"
|
resign_kernel_partition.sh | 7 # Script that just takes in a kernel partition and outputs a new vblock 45 echo "New kernel vblock was output to ${DST_VBLOCK}"
|
unpack_firmwarefd.sh | 18 echo "Outputs firmware.gbb, firmware[A|B].[data|vblock]" 61 echo "Extracting Firmware data and vblock(s)" 64 dd if="${src_fd}" of="firmwareA.vblock" skip="${fwA_vblock_offset}" bs=1 \ 68 dd if="${src_fd}" of="firmwareB.vblock" skip="${fwB_vblock_offset}" bs=1 \
|
resign_image.sh | 52 # Create a copy of the input image and put in the new vblock
|
sign_official_build.sh | 338 # Update the SSD install-able vblock file on stateful partition. 350 echo "Building vmlinuz_hd.vblock from legacy image partition 2." 354 # vblock should always use kernel keyblock. 361 # Copy the installer vblock to the stateful partition. 364 sudo cp ${temp_out_vb} ${stateful_dir}/vmlinuz_hd.vblock
|
/external/vboot_reference/futility/ |
cmd_vbutil_firmware.c | 36 {"vblock", 1, 0, OPT_MODE_VBLOCK}, 51 printf("\nUsage: " MYNAME " %s <--vblock|--verify> <file> [OPTIONS]\n" 53 "For '--vblock <file>', required OPTIONS are:\n" 77 /* Create a firmware .vblock */ 78 static int Vblock(const char *outfile, const char *keyblock_file, 377 return Vblock(filename, key_block_file, signprivate, version,
|
cmd_sign.c | 87 VbKeyBlockHeader *vblock; local 92 vblock = KeyBlockCreate_external( 106 vblock = KeyBlockCreate(data_key, option.signprivate, 111 vblock = KeyBlockCreate(data_key, option.signprivate, 117 vblock, vblock->key_block_size, 125 * corresponding VBLOCK area, we'll have this to verify. 135 * We don't do any signing here. We just check to see if the VBLOCK 380 static int write_new_preamble(struct cb_area_s *vblock, 407 memcpy(vblock->buf, keyblock, more) [all...] |
vb1_helper.c | 24 * kernel vblock = keyblock + kernel preamble + padding to 64K (or whatever) 27 * kernel partition = kernel vblock + kernel blob 296 /* Split a kernel partition into separate vblock and blob parts. */
|
cmd_show.c | 258 * corresponding VBLOCK area, we'll have this to verify. 560 " --pad NUM Kernel vblock padding size\n"
|
/external/vboot_reference/ |
README | 78 futility vbutil_firmware Create a .vblock with signature info for a
|
/external/vboot_reference/firmware/2lib/include/ |
2struct.h | 113 /* Offset of preamble from start of vblock */
|
/external/vboot_reference/firmware/lib20/ |
misc.c | 120 /* Preamble follows the keyblock in the vblock */
|
/external/vboot_reference/firmware/lib21/ |
misc.c | 112 /* Preamble follows the keyblock in the vblock */
|
/frameworks/av/media/libstagefright/codecs/on2/h264dec/source/ |
h264bsd_deblocking.c | 1551 u32 vblock; local 1634 u32 vblock; local [all...] |