OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:rootkey
(Results
1 - 12
of
12
) sorted by null
/external/vboot_reference/scripts/image_signing/
sign_firmware.sh
33
local
rootkey
="$4"
42
--
rootkey
="${
rootkey
}" \
71
local
rootkey
94
rootkey
="${key_dir}/root_key.loem${loem_index}.vbpubk"
95
cp "${
rootkey
}" "${loem_output_dir}/
rootkey
.${loemid}"
98
gbb_update "${temp_fw}" "${key_dir}" "${out_firmware}" "${
rootkey
}"
make_dev_firmware.sh
197
# Note resign_firmwarefd.sh needs the original
rootkey
to determine firmware
198
# body size, so we must resign image before changing GBB
rootkey
.
244
--
rootkey
="$root_pubkey" \
make_dev_ssd.sh
334
gbb_utility -g --
rootkey
="$rootkey_file" "$bios_image" >/dev/null 2>&1
338
# The magic 130 is counted by "od dev-
rootkey
" for the lines until the body
341
# TODO(hungte) compare with
rootkey
in $VBOOT_BASE directly.
362
- To change system
rootkey
: disable firmware write protection (a hardware
/external/vboot_reference/tests/
vb2_firmware_tests.sh
27
${FUTILITY} vbutil_key --pack
rootkey
.test \
37
--
rootkey
=
rootkey
.test
vb20_misc_tests.c
29
struct vb2_packed_key
rootkey
;
member in struct:__anon26456
87
sd->gbb_rootkey_offset = vb2_offset_of(&mock_gbb, &mock_gbb.
rootkey
);
91
mock_gbb.
rootkey
.algorithm = 11;
92
mock_gbb.
rootkey
.key_offset =
93
vb2_offset_of(&mock_gbb.
rootkey
,
95
mock_gbb.
rootkey
.key_size = sizeof(mock_gbb.rootkey_data);
vb21_misc_tests.c
31
struct vb2_packed_key
rootkey
;
member in struct:__anon26461
90
sd->gbb_rootkey_offset = vb2_offset_of(&mock_gbb, &mock_gbb.
rootkey
);
94
mock_gbb.
rootkey
.sig_alg = VB2_SIG_RSA8192;
95
mock_gbb.
rootkey
.key_offset =
96
vb2_offset_of(&mock_gbb.
rootkey
,
98
mock_gbb.
rootkey
.key_size = sizeof(mock_gbb.rootkey_data);
/external/vboot_reference/tests/futility/
test_show_vs_verify.sh
33
${FUTILITY} gbb_utility -g -k ${TMP}.
rootkey
${TMP}.gbb
38
${FUTILITY} show ${TMP}.vblock_a --publickey ${TMP}.
rootkey
41
--publickey ${TMP}.
rootkey
\
47
--publickey ${TMP}.
rootkey
; then false ; fi
50
--publickey ${TMP}.
rootkey
\
test_gbb_utility.sh
39
if ${FUTILITY} gbb_utility -s --
rootkey
${TMP}.data1.toolong ${TMP}.blob; then false; fi
48
--
rootkey
${TMP}.data1.short \
53
--
rootkey
${TMP}.read1 \
65
${FUTILITY} gbb_utility -s --
rootkey
${TMP}.data1 ${TMP}.blob
70
${FUTILITY} gbb_utility -g --
rootkey
${TMP}.read1 ${TMP}.blob
105
# (
rootkey
) 0x0090 xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx xx
168
#
rootkey
: offset + size == end of file is okay; beyond is invalid
193
${FUTILITY} gbb_utility -g --
rootkey
${TMP}.read1 ${TMP}.blob.bad
194
if ${FUTILITY} gbb_utility -s --
rootkey
${TMP}.data1 ${TMP}.blob.bad; then false; fi
/external/vboot_reference/utility/
vbutil_what_keys
74
local hwid matchh
rootkey
matchn recoverykey matchr
79
futility gbb_utility --
rootkey
="$TMPFILE" "$file" >/dev/null
80
rootkey
=$(futility vbutil_key --unpack "$TMPFILE" | grep sha1sum | \
82
matchn=$(greppy "$
rootkey
")
90
echo "$space root key: ${
rootkey
} ${matchn}"
dev_debug_vboot
314
log futility gbb_utility -g --
rootkey
rootkey
.vbpubk \
317
log futility vbutil_key --unpack
rootkey
.vbpubk
319
futility vbutil_key --unpack
rootkey
.vbpubk |
327
--signpubkey
rootkey
.vbpubk \
332
--signpubkey
rootkey
.vbpubk \
/external/vboot_reference/futility/
traversal.h
63
struct cb_area_s
rootkey
;
member in struct:futil_traverse_state_s
cmd_show.c
157
printf("
rootkey
0x%08x 0x%08x\n",
176
state->
rootkey
.offset = state->my_area->offset +
178
state->
rootkey
.buf = buf + gbb->rootkey_offset;
179
state->
rootkey
.len = gbb->rootkey_size;
180
state->
rootkey
._flags |= AREA_IS_VALID;
295
if (!sign_key && (state->
rootkey
._flags & AREA_IS_VALID))
296
/* BIOS should have a
rootkey
in the GBB */
297
sign_key = (VbPublicKey *)state->
rootkey
.buf;
302
if (!sign_key && (state->
rootkey
._flags & AREA_IS_VALID))
303
/* BIOS should have a
rootkey
in the GBB *
[
all
...]
Completed in 98 milliseconds