HomeSort by relevance Sort by last modified time
    Searched refs:keyblock (Results 1 - 25 of 36) sorted by null

1 2

  /external/vboot_reference/scripts/keygeneration/
make_keyblock.sh 6 # Generates a keyblock containing a public key and signed using the given
16 Emits <out_keyblock>.keyblock containing <in_public_key>.vbpubk signed with
17 <in_signing_key>.vbprivk with the given keyblock <flags>.
keyset_version_check.sh 28 local keyblock="$1"
29 echo "$(vbutil_keyblock --unpack "${keyblock}" | grep 'Data key version' |
65 local got_fkey_keyblock="$(keyblock_version ${KEY_DIR}/firmware.keyblock)"
68 local got_kkey_keyblock="$(keyblock_version ${KEY_DIR}/kernel.keyblock)"
72 check_versions "${got_fkey_keyblock}" "${got_fkey}" "firmware keyblock key" \
74 check_versions "${got_kkey_keyblock}" "${got_ksubkey}" "kernel keyblock key" \
increment_kernel_data_key.sh 34 Generating new kernel data version, and new kernel keyblock.
increment_kernel_subkey.sh 34 Generating new kernel subkey and new kernel keyblock.
common.sh 42 # Keyblock modes determine which boot modes a signing key is valid for use
91 # Emit a .keyblock containing flags and a public key, signed by a private key
103 echo "creating $base keyblock..."
107 --pack "${base}.keyblock" \
114 --unpack "${base}.keyblock" \
151 # for keyblocks: <keyblock_name>.v<datakey version>.v<subkey version>.keyblock
154 if [[ ! -e kernel.keyblock ]]; then
157 mv --no-clobber kernel.{keyblock,"v$2.v$1.keyblock"}
163 # for keyblocks: <keyblock_name>.v<datakey version>.v<subkey version>.keyblock
    [all...]
  /prebuilts/misc/scripts/vboot_signer/
vboot_signer.sh 21 echo usage: $0 futility input.img key.vbpubk key.vbprivk subkey.vbprivk output.keyblock output.img
40 keyblock=$6
48 ${futility} vbutil_keyblock --pack ${keyblock} --datapubkey ${pubkey} --signprivate ${subkey} --flags 0x7
50 echo ERROR: unable to generate keyblock
54 ${futility} vbutil_kernel --pack ${output} --keyblock ${keyblock} --signprivate ${privkey} --version 1 --vmlinuz ${input} --config ${EMPTY} --arch arm --bootloader ${EMPTY} --flags 0x1
  /external/vboot_reference/tests/
gen_fuzz_test_cases.sh 30 --pack ${TESTCASE_DIR}/firmware.keyblock \
37 --pack ${TESTCASE_DIR}/kernel.keyblock \
45 --keyblock ${TESTCASE_DIR}/firmware.keyblock\
56 --keyblock ${TESTCASE_DIR}/kernel.keyblock \
vb2_firmware_tests.sh 39 # Keyblock with firmware subkey is signed by root key
40 ${FUTILITY} vbutil_keyblock --pack keyblock.test \
47 --keyblock keyblock.test \
load_kernel_tests.sh 33 # Keyblock with kernel data key is signed by kernel subkey
35 ${FUTILITY} vbutil_keyblock --pack keyblock.test \
43 --keyblock "keyblock.test" \
gen_preamble_testdata.sh 68 --keyblock "${DATADIR}/kb_${d}_${r}.keyblock" \
74 --keyblock "${DATADIR}/kb_${d}_${r}.keyblock" \
  /external/vboot_reference/tests/futility/
test_sign_fw_main.sh 19 --keyblock ${KEYDIR}/firmware.keyblock \
34 --keyblock ${KEYDIR}/firmware.keyblock \
test_sign_kernel.sh 31 --keyblock ${DEVKEYS}/recovery_kernel.keyblock \
48 --keyblock ${DEVKEYS}/recovery_kernel.keyblock \
74 --keyblock ${DEVKEYS}/kernel.keyblock \
88 --keyblock ${DEVKEYS}/kernel.keyblock \
110 --keyblock ${DEVKEYS}/kernel.keyblock \
    [all...]
test_show_kernel.sh 26 # Keyblock with kernel data key is signed by kernel subkey
28 ${FUTILITY} vbutil_keyblock --pack ${TMP}.keyblock.test \
36 --keyblock ${TMP}.keyblock.test \
test_show_vs_verify.sh 18 #### keyblock
20 ${FUTILITY} show ${DEVKEYS}/firmware.keyblock
22 if ${FUTILITY} verify ${DEVKEYS}/firmware.keyblock ; then false; fi
24 ${FUTILITY} verify ${DEVKEYS}/firmware.keyblock \
test_sign_firmware.sh 67 #OLD ${KEYDIR}/firmware.keyblock \
69 #OLD ${KEYDIR}/dev_firmware.keyblock \
78 -b ${KEYDIR}/firmware.keyblock \
80 -B ${KEYDIR}/dev_firmware.keyblock \
149 -b ${KEYDIR}/firmware.keyblock \
151 -B ${KEYDIR}/dev_firmware.keyblock \
167 -b ${KEYDIR}/firmware.keyblock \
169 -B ${KEYDIR}/dev_firmware.keyblock \
test_main.sh 39 ./vbutil_keyblock --unpack ${DEVKEYS}/installer_kernel.keyblock | grep ${SHA}
48 ./buggle vbutil_keyblock --unpack ${DEVKEYS}/installer_kernel.keyblock \
  /external/vboot_reference/host/lib/
extract_vmlinuz.c 17 VbKeyBlockHeader *keyblock = NULL; local
26 keyblock = (VbKeyBlockHeader *)kpart_data;
27 now += keyblock->key_block_size;
55 // the keyblock and preamble sections.
58 keyblock->key_block_size +
  /external/vboot_reference/scripts/image_signing/
resign_kernel_partition.sh 40 --keyblock "${KERNEL_KEYBLOCK}" \
resign_firmwarefd.sh 33 echo "No dev firmware keyblock/datakey found. Reusing normal keys."
46 --keyblock $FIRMWARE_KEYBLOCK \
resign_image.sh 47 --keyblock "${KERNEL_KEYBLOCK}" \
  /external/vboot_reference/futility/
cmd_sign.c 40 VbKeyBlockHeader *keyblock; member in struct:local_data_s
83 /* This wraps/signs a public key, producing a keyblock. */
144 * If we have a valid keyblock and fw_preamble, then we can use them to
149 fprintf(stderr, "Warning: %s keyblock is invalid. "
221 option.keyblock, option.signprivate,
253 VbKeyBlockHeader *keyblock = NULL; local
262 &keyblock, &preamble, &kblob_size);
297 /* Replace the keyblock if asked */
298 if (option.keyblock)
299 keyblock = option.keyblock
    [all...]
vb1_helper.c 24 * kernel vblock = keyblock + kernel preamble + padding to 64K (or whatever)
32 /* The keyblock, preamble, and kernel blob are kept in separate places. */
303 VbKeyBlockHeader *keyblock; local
310 /* Sanity-check the keyblock */
311 keyblock = (VbKeyBlockHeader *)kpart_data;
312 Debug("Keyblock is 0x%" PRIx64 " bytes\n", keyblock->key_block_size);
313 now += keyblock->key_block_size;
328 g_keyblock = keyblock;
388 *keyblock_ptr = keyblock;
    [all...]
  /external/autotest/server/site_tests/firmware_UpdateFirmwareDataKeyVersion/files/
common.sh 41 # Keyblock modes determine which boot modes a signing key is valid for use
90 # Emit a .keyblock containing flags and a public key, signed by a private key
102 echo "creating $base keyblock..."
106 --pack "${base}.keyblock" \
113 --unpack "${base}.keyblock" \
150 # for keyblocks: <keyblock_name>.v<datakey version>.v<subkey version>.keyblock
153 if [[ ! -e kernel.keyblock ]]; then
156 mv --no-clobber kernel.{keyblock,"v$2.v$1.keyblock"}
162 # for keyblocks: <keyblock_name>.v<datakey version>.v<subkey version>.keyblock
    [all...]
  /external/autotest/server/site_tests/firmware_UpdateKernelDataKeyVersion/files/
common.sh 41 # Keyblock modes determine which boot modes a signing key is valid for use
90 # Emit a .keyblock containing flags and a public key, signed by a private key
102 echo "creating $base keyblock..."
106 --pack "${base}.keyblock" \
113 --unpack "${base}.keyblock" \
150 # for keyblocks: <keyblock_name>.v<datakey version>.v<subkey version>.keyblock
153 if [[ ! -e kernel.keyblock ]]; then
156 mv --no-clobber kernel.{keyblock,"v$2.v$1.keyblock"}
162 # for keyblocks: <keyblock_name>.v<datakey version>.v<subkey version>.keyblock
    [all...]
  /external/autotest/server/site_tests/firmware_UpdateKernelSubkeyVersion/files/
common.sh 41 # Keyblock modes determine which boot modes a signing key is valid for use
90 # Emit a .keyblock containing flags and a public key, signed by a private key
102 echo "creating $base keyblock..."
106 --pack "${base}.keyblock" \
113 --unpack "${base}.keyblock" \
150 # for keyblocks: <keyblock_name>.v<datakey version>.v<subkey version>.keyblock
153 if [[ ! -e kernel.keyblock ]]; then
156 mv --no-clobber kernel.{keyblock,"v$2.v$1.keyblock"}
162 # for keyblocks: <keyblock_name>.v<datakey version>.v<subkey version>.keyblock
    [all...]

Completed in 144 milliseconds

1 2