Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(65)

Side by Side Diff: scripts/image_signing/sign_official_build.sh

Issue 4527004: sign_official_build install mode should use the installer kernel data key (Closed) Base URL: ssh://git@gitrw.chromium.org:9222/vboot_reference.git@master
Patch Set: Created 10 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « no previous file | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 #!/bin/bash 1 #!/bin/bash
2 2
3 # Copyright (c) 2010 The Chromium OS Authors. All rights reserved. 3 # Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
4 # Use of this source code is governed by a BSD-style license that can be 4 # Use of this source code is governed by a BSD-style license that can be
5 # found in the LICENSE file. 5 # found in the LICENSE file.
6 6
7 # Sign the final build image using the "official" keys. 7 # Sign the final build image using the "official" keys.
8 # 8 #
9 # Prerequisite tools needed in the system path: 9 # Prerequisite tools needed in the system path:
10 # 10 #
(...skipping 372 matching lines...) Expand 10 before | Expand all | Expand 10 after
383 local stateful_dir=$(make_temp_dir) 383 local stateful_dir=$(make_temp_dir)
384 mount_image_partition ${OUTPUT_IMAGE} 1 ${stateful_dir} 384 mount_image_partition ${OUTPUT_IMAGE} 1 ${stateful_dir}
385 sudo cp ${temp_out_vb} ${stateful_dir}/vmlinuz_hd.vblock 385 sudo cp ${temp_out_vb} ${stateful_dir}/vmlinuz_hd.vblock
386 386
387 echo "Signed recovery image output to ${OUTPUT_IMAGE}" 387 echo "Signed recovery image output to ${OUTPUT_IMAGE}"
388 } 388 }
389 389
390 # Generate the factory install image. 390 # Generate the factory install image.
391 sign_for_factory_install() { 391 sign_for_factory_install() {
392 ${SCRIPT_DIR}/resign_image.sh ${INPUT_IMAGE} ${OUTPUT_IMAGE} \ 392 ${SCRIPT_DIR}/resign_image.sh ${INPUT_IMAGE} ${OUTPUT_IMAGE} \
393 ${KEY_DIR}/recovery_kernel_data_key.vbprivk \ 393 ${KEY_DIR}/installer_kernel_data_key.vbprivk \
394 ${KEY_DIR}/installer_kernel.keyblock 394 ${KEY_DIR}/installer_kernel.keyblock
395 echo "Signed factory install image output to ${OUTPUT_IMAGE}" 395 echo "Signed factory install image output to ${OUTPUT_IMAGE}"
396 } 396 }
397 397
398 # Verification 398 # Verification
399 if [ "${TYPE}" == "verify" ]; then 399 if [ "${TYPE}" == "verify" ]; then
400 verify_image 400 verify_image
401 exit 1 401 exit 1
402 fi 402 fi
403 403
(...skipping 27 matching lines...) Expand all
431 4 431 4
432 update_rootfs_hash ${INPUT_IMAGE} \ 432 update_rootfs_hash ${INPUT_IMAGE} \
433 ${KEY_DIR}/recovery_kernel.keyblock \ 433 ${KEY_DIR}/recovery_kernel.keyblock \
434 ${KEY_DIR}/recovery_kernel_data_key.vbprivk \ 434 ${KEY_DIR}/recovery_kernel_data_key.vbprivk \
435 2 435 2
436 sign_for_recovery 436 sign_for_recovery
437 elif [ "${TYPE}" == "install" ]; then 437 elif [ "${TYPE}" == "install" ]; then
438 resign_firmware_payload ${INPUT_IMAGE} 438 resign_firmware_payload ${INPUT_IMAGE}
439 update_rootfs_hash ${INPUT_IMAGE} \ 439 update_rootfs_hash ${INPUT_IMAGE} \
440 ${KEY_DIR}/installer_kernel.keyblock \ 440 ${KEY_DIR}/installer_kernel.keyblock \
441 ${KEY_DIR}/recovery_kernel_data_key.vbprivk \ 441 ${KEY_DIR}/installer_kernel_data_key.vbprivk \
442 2 442 2
443 sign_for_factory_install 443 sign_for_factory_install
444 else 444 else
445 echo "Invalid type ${TYPE}" 445 echo "Invalid type ${TYPE}"
446 exit 1 446 exit 1
447 fi 447 fi
OLDNEW
« no previous file with comments | « no previous file | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698