/external/vboot_reference/scripts/keygeneration/ |
make_keyblock.sh | 6 # Generates a keyblock containing a public key and signed using the given 16 Emits <out_keyblock>.keyblock containing <in_public_key>.vbpubk signed with 17 <in_signing_key>.vbprivk with the given keyblock <flags>.
|
keyset_version_check.sh | 28 local keyblock="$1" 29 echo "$(vbutil_keyblock --unpack "${keyblock}" | grep 'Data key version' | 65 local got_fkey_keyblock="$(keyblock_version ${KEY_DIR}/firmware.keyblock)" 68 local got_kkey_keyblock="$(keyblock_version ${KEY_DIR}/kernel.keyblock)" 72 check_versions "${got_fkey_keyblock}" "${got_fkey}" "firmware keyblock key" \ 74 check_versions "${got_kkey_keyblock}" "${got_ksubkey}" "kernel keyblock key" \
|
increment_kernel_data_key.sh | 34 Generating new kernel data version, and new kernel keyblock.
|
increment_kernel_subkey.sh | 34 Generating new kernel subkey and new kernel keyblock.
|
common.sh | 42 # Keyblock modes determine which boot modes a signing key is valid for use 91 # Emit a .keyblock containing flags and a public key, signed by a private key 103 echo "creating $base keyblock..." 107 --pack "${base}.keyblock" \ 114 --unpack "${base}.keyblock" \ 151 # for keyblocks: <keyblock_name>.v<datakey version>.v<subkey version>.keyblock 154 if [[ ! -e kernel.keyblock ]]; then 157 mv --no-clobber kernel.{keyblock,"v$2.v$1.keyblock"} 163 # for keyblocks: <keyblock_name>.v<datakey version>.v<subkey version>.keyblock [all...] |
/prebuilts/misc/scripts/vboot_signer/ |
vboot_signer.sh | 21 echo usage: $0 futility input.img key.vbpubk key.vbprivk subkey.vbprivk output.keyblock output.img 40 keyblock=$6 48 ${futility} vbutil_keyblock --pack ${keyblock} --datapubkey ${pubkey} --signprivate ${subkey} --flags 0x7 50 echo ERROR: unable to generate keyblock 54 ${futility} vbutil_kernel --pack ${output} --keyblock ${keyblock} --signprivate ${privkey} --version 1 --vmlinuz ${input} --config ${EMPTY} --arch arm --bootloader ${EMPTY} --flags 0x1
|
/external/vboot_reference/tests/ |
gen_fuzz_test_cases.sh | 30 --pack ${TESTCASE_DIR}/firmware.keyblock \ 37 --pack ${TESTCASE_DIR}/kernel.keyblock \ 45 --keyblock ${TESTCASE_DIR}/firmware.keyblock\ 56 --keyblock ${TESTCASE_DIR}/kernel.keyblock \
|
vb2_firmware_tests.sh | 39 # Keyblock with firmware subkey is signed by root key 40 ${FUTILITY} vbutil_keyblock --pack keyblock.test \ 47 --keyblock keyblock.test \
|
load_kernel_tests.sh | 33 # Keyblock with kernel data key is signed by kernel subkey 35 ${FUTILITY} vbutil_keyblock --pack keyblock.test \ 43 --keyblock "keyblock.test" \
|
gen_preamble_testdata.sh | 68 --keyblock "${DATADIR}/kb_${d}_${r}.keyblock" \ 74 --keyblock "${DATADIR}/kb_${d}_${r}.keyblock" \
|
/external/vboot_reference/tests/futility/ |
test_sign_fw_main.sh | 19 --keyblock ${KEYDIR}/firmware.keyblock \ 34 --keyblock ${KEYDIR}/firmware.keyblock \
|
test_sign_kernel.sh | 31 --keyblock ${DEVKEYS}/recovery_kernel.keyblock \ 48 --keyblock ${DEVKEYS}/recovery_kernel.keyblock \ 74 --keyblock ${DEVKEYS}/kernel.keyblock \ 88 --keyblock ${DEVKEYS}/kernel.keyblock \ 110 --keyblock ${DEVKEYS}/kernel.keyblock \ [all...] |
test_show_kernel.sh | 26 # Keyblock with kernel data key is signed by kernel subkey 28 ${FUTILITY} vbutil_keyblock --pack ${TMP}.keyblock.test \ 36 --keyblock ${TMP}.keyblock.test \
|
test_show_vs_verify.sh | 18 #### keyblock 20 ${FUTILITY} show ${DEVKEYS}/firmware.keyblock 22 if ${FUTILITY} verify ${DEVKEYS}/firmware.keyblock ; then false; fi 24 ${FUTILITY} verify ${DEVKEYS}/firmware.keyblock \
|
test_sign_firmware.sh | 67 #OLD ${KEYDIR}/firmware.keyblock \ 69 #OLD ${KEYDIR}/dev_firmware.keyblock \ 78 -b ${KEYDIR}/firmware.keyblock \ 80 -B ${KEYDIR}/dev_firmware.keyblock \ 149 -b ${KEYDIR}/firmware.keyblock \ 151 -B ${KEYDIR}/dev_firmware.keyblock \ 167 -b ${KEYDIR}/firmware.keyblock \ 169 -B ${KEYDIR}/dev_firmware.keyblock \
|
test_main.sh | 39 ./vbutil_keyblock --unpack ${DEVKEYS}/installer_kernel.keyblock | grep ${SHA} 48 ./buggle vbutil_keyblock --unpack ${DEVKEYS}/installer_kernel.keyblock \
|
/external/vboot_reference/host/lib/ |
extract_vmlinuz.c | 17 VbKeyBlockHeader *keyblock = NULL; local 26 keyblock = (VbKeyBlockHeader *)kpart_data; 27 now += keyblock->key_block_size; 55 // the keyblock and preamble sections. 58 keyblock->key_block_size +
|
/external/vboot_reference/scripts/image_signing/ |
resign_kernel_partition.sh | 40 --keyblock "${KERNEL_KEYBLOCK}" \
|
resign_firmwarefd.sh | 33 echo "No dev firmware keyblock/datakey found. Reusing normal keys." 46 --keyblock $FIRMWARE_KEYBLOCK \
|
resign_image.sh | 47 --keyblock "${KERNEL_KEYBLOCK}" \
|
/external/vboot_reference/futility/ |
cmd_sign.c | 40 VbKeyBlockHeader *keyblock; member in struct:local_data_s 83 /* This wraps/signs a public key, producing a keyblock. */ 144 * If we have a valid keyblock and fw_preamble, then we can use them to 149 fprintf(stderr, "Warning: %s keyblock is invalid. " 221 option.keyblock, option.signprivate, 253 VbKeyBlockHeader *keyblock = NULL; local 262 &keyblock, &preamble, &kblob_size); 297 /* Replace the keyblock if asked */ 298 if (option.keyblock) 299 keyblock = option.keyblock [all...] |
vb1_helper.c | 24 * kernel vblock = keyblock + kernel preamble + padding to 64K (or whatever) 32 /* The keyblock, preamble, and kernel blob are kept in separate places. */ 303 VbKeyBlockHeader *keyblock; local 310 /* Sanity-check the keyblock */ 311 keyblock = (VbKeyBlockHeader *)kpart_data; 312 Debug("Keyblock is 0x%" PRIx64 " bytes\n", keyblock->key_block_size); 313 now += keyblock->key_block_size; 328 g_keyblock = keyblock; 388 *keyblock_ptr = keyblock; [all...] |
/external/autotest/server/site_tests/firmware_UpdateFirmwareDataKeyVersion/files/ |
common.sh | 41 # Keyblock modes determine which boot modes a signing key is valid for use 90 # Emit a .keyblock containing flags and a public key, signed by a private key 102 echo "creating $base keyblock..." 106 --pack "${base}.keyblock" \ 113 --unpack "${base}.keyblock" \ 150 # for keyblocks: <keyblock_name>.v<datakey version>.v<subkey version>.keyblock 153 if [[ ! -e kernel.keyblock ]]; then 156 mv --no-clobber kernel.{keyblock,"v$2.v$1.keyblock"} 162 # for keyblocks: <keyblock_name>.v<datakey version>.v<subkey version>.keyblock [all...] |
/external/autotest/server/site_tests/firmware_UpdateKernelDataKeyVersion/files/ |
common.sh | 41 # Keyblock modes determine which boot modes a signing key is valid for use 90 # Emit a .keyblock containing flags and a public key, signed by a private key 102 echo "creating $base keyblock..." 106 --pack "${base}.keyblock" \ 113 --unpack "${base}.keyblock" \ 150 # for keyblocks: <keyblock_name>.v<datakey version>.v<subkey version>.keyblock 153 if [[ ! -e kernel.keyblock ]]; then 156 mv --no-clobber kernel.{keyblock,"v$2.v$1.keyblock"} 162 # for keyblocks: <keyblock_name>.v<datakey version>.v<subkey version>.keyblock [all...] |
/external/autotest/server/site_tests/firmware_UpdateKernelSubkeyVersion/files/ |
common.sh | 41 # Keyblock modes determine which boot modes a signing key is valid for use 90 # Emit a .keyblock containing flags and a public key, signed by a private key 102 echo "creating $base keyblock..." 106 --pack "${base}.keyblock" \ 113 --unpack "${base}.keyblock" \ 150 # for keyblocks: <keyblock_name>.v<datakey version>.v<subkey version>.keyblock 153 if [[ ! -e kernel.keyblock ]]; then 156 mv --no-clobber kernel.{keyblock,"v$2.v$1.keyblock"} 162 # for keyblocks: <keyblock_name>.v<datakey version>.v<subkey version>.keyblock [all...] |