Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1)

Side by Side Diff: tests/devkeys/create_new_keys.sh

Issue 6580035: Add dev firmware key to devkeys. (Closed) Base URL: ssh://git@gitrw.chromium.org:9222/vboot_reference.git@master
Patch Set: post merge Created 9 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « no previous file | tests/devkeys/dev_firmware.keyblock » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 #!/bin/bash 1 #!/bin/bash
2 # Copyright (c) 2010 The Chromium OS Authors. All rights reserved. 2 # Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
3 # Use of this source code is governed by a BSD-style license that can be 3 # Use of this source code is governed by a BSD-style license that can be
4 # found in the LICENSE file. 4 # found in the LICENSE file.
5 # 5 #
6 # Generate .vbpubk and .vbprivk pairs for use by developer builds. These should 6 # Generate .vbpubk and .vbprivk pairs for use by developer builds. These should
7 # be exactly like the real keys except that the private keys aren't secret. 7 # be exactly like the real keys except that the private keys aren't secret.
8 8
9 9
10 # 0 = (RSA1024 SHA1) 10 # 0 = (RSA1024 SHA1)
(...skipping 76 matching lines...) Expand 10 before | Expand all | Expand 10 after
87 vbutil_keyblock \ 87 vbutil_keyblock \
88 --unpack "${base}.keyblock" \ 88 --unpack "${base}.keyblock" \
89 --signpubkey "${signkey}.vbpubk" 89 --signpubkey "${signkey}.vbpubk"
90 } 90 }
91 91
92 92
93 93
94 # Create the normal keypairs 94 # Create the normal keypairs
95 make_pair root_key 11 95 make_pair root_key 11
96 make_pair firmware_data_key 7 96 make_pair firmware_data_key 7
97 make_pair dev_firmware_data_key 7
97 make_pair kernel_subkey 7 98 make_pair kernel_subkey 7
98 make_pair kernel_data_key 4 99 make_pair kernel_data_key 4
99 100
100 # Create the recovery and factory installer keypairs 101 # Create the recovery and factory installer keypairs
101 make_pair recovery_key 11 102 make_pair recovery_key 11
102 make_pair recovery_kernel_data_key 11 103 make_pair recovery_kernel_data_key 11
103 make_pair installer_kernel_data_key 11 104 make_pair installer_kernel_data_key 11
104 105
105 # Create the firmware keyblock for use only in Normal mode. This is redundant, 106 # Create the firmware keyblock for use only in Normal mode. This is redundant,
106 # since it's never even checked during Recovery mode. 107 # since it's never even checked during Recovery mode.
107 make_keyblock firmware 7 firmware_data_key root_key 108 make_keyblock firmware 7 firmware_data_key root_key
108 109
110 # Create the dev firmware keyblock for use only in Developer mode.
111 make_keyblock dev_firmware 6 dev_firmware_data_key root_key
112
109 # Create the recovery kernel keyblock for use only in Recovery mode. 113 # Create the recovery kernel keyblock for use only in Recovery mode.
110 make_keyblock recovery_kernel 11 recovery_kernel_data_key recovery_key 114 make_keyblock recovery_kernel 11 recovery_kernel_data_key recovery_key
111 115
112 # Create the normal kernel keyblock for use only in Normal mode. 116 # Create the normal kernel keyblock for use only in Normal mode.
113 make_keyblock kernel 7 kernel_data_key kernel_subkey 117 make_keyblock kernel 7 kernel_data_key kernel_subkey
114 118
115 # Create the installer keyblock for use in Developer + Recovery mode 119 # Create the installer keyblock for use in Developer + Recovery mode
116 # For use in Factory Install and Developer Mode install shims. 120 # For use in Factory Install and Developer Mode install shims.
117 make_keyblock installer_kernel 10 installer_kernel_data_key recovery_key 121 make_keyblock installer_kernel 10 installer_kernel_data_key recovery_key
118 122
119 # CAUTION: The public parts of most of these blobs must be compiled into the 123 # CAUTION: The public parts of most of these blobs must be compiled into the
120 # firmware, which is built separately (and some of which can't be changed after 124 # firmware, which is built separately (and some of which can't be changed after
121 # manufacturing). If you update these keys, you must coordinate the changes 125 # manufacturing). If you update these keys, you must coordinate the changes
122 # with the BIOS people or you'll be unable to boot the resulting images. 126 # with the BIOS people or you'll be unable to boot the resulting images.
123 127
OLDNEW
« no previous file with comments | « no previous file | tests/devkeys/dev_firmware.keyblock » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698