Index: utility/include/kernel_utility.h |
diff --git a/utility/include/kernel_utility.h b/utility/include/kernel_utility.h |
deleted file mode 100644 |
index 12ad9b83bc2590212018b764c2a4f7a3da080d2b..0000000000000000000000000000000000000000 |
--- a/utility/include/kernel_utility.h |
+++ /dev/null |
@@ -1,87 +0,0 @@ |
-// Copyright (c) 2010 The Chromium OS Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#ifndef VBOOT_REFERENCE_KERNEL_UTILITY_H_ |
-#define VBOOT_REFERENCE_KERNEL_UTILITY_H_ |
- |
-#include <string> |
- |
-extern "C" { |
-#include "kernel_image.h" |
-} |
- |
-struct RSAPublicKey; |
- |
-namespace vboot_reference { |
- |
-// A class for handling verified boot kernel images. |
-class KernelUtility { |
- public: |
- KernelUtility(); |
- ~KernelUtility(); |
- |
- // Print usage to stderr. |
- void PrintUsage(void); |
- |
- // Parse command line options and populate data members. |
- // Return true on success, false on failure. |
- bool ParseCmdLineOptions(int argc, char* argv[]); |
- |
- // Print description of a verified boot kernel image. |
- void DescribeSignedImage(); |
- |
- // Generate a verified boot image by reading kernel data from in_file_. |
- // Return true on success, false on failure. |
- bool GenerateSignedImage(); |
- |
- // Verify a previously generated signed firmware image using the key read |
- // from [firmware_key_pub_file_]. |
- bool VerifySignedImage(); |
- |
- // Output the verified boot kernel image to out_file_. |
- void OutputSignedImage(); |
- |
- bool is_generate() { return is_generate_; } |
- bool is_verify() { return is_verify_; } |
- bool is_describe() { return is_describe_; } |
- |
- private: |
- |
- // Check if all options were specified and sane. |
- // Return true on success, false on failure. |
- bool CheckOptions(); |
- |
- KernelImage* image_; |
- RSAPublicKey* firmware_key_pub_; // Root key used for verification. |
- std::string firmware_key_file_; // Private key for signing the kernel key. |
- std::string firmware_key_pub_file_; |
- std::string kernel_key_file_; // Private key for signing the kernel. |
- std::string kernel_key_pub_file_; |
- std::string subkey_in_file_; // Existing key signature header. |
- std::string config_file_; // File containing kernel commandline parameters |
- std::string bootloader_file_; // Embedded bootloader code |
- std::string vmlinuz_file_; // Input vmlinuz to be embedded in signed blob. |
- |
- // Fields of a KernelImage. (read from the command line). |
- int header_version_; |
- int firmware_sign_algorithm_; |
- int kernel_sign_algorithm_; |
- int kernel_key_version_; |
- int kernel_version_; |
- int padding_; |
- uint64_t kernel_len_; |
- uint8_t* kernel_config_; |
- |
- std::string in_file_; |
- std::string out_file_; |
- bool is_generate_; // Are we generating a new image? |
- bool is_verify_; // Are we just verifying an already signed image? |
- bool is_describe_; // Should we print out description of the image? |
- bool is_only_vblock_; // Should we just output the verification block? |
- bool is_subkey_out_; // Should we just output the subkey header? |
-}; |
- |
-} // namespace vboot_reference |
- |
-#endif // VBOOT_REFERENCE_FIRMWARE_UTILITY_H_ |