84 lines
		
	
	
		
			2.3 KiB
		
	
	
	
		
			Bash
		
	
	
		
			Executable File
		
	
	
			
		
		
	
	
			84 lines
		
	
	
		
			2.3 KiB
		
	
	
	
		
			Bash
		
	
	
		
			Executable File
		
	
	
#!/bin/bash -e
 | 
						|
# Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
 | 
						|
# Use of this source code is governed by a BSD-style license that can be
 | 
						|
# found in the LICENSE file.
 | 
						|
#
 | 
						|
 | 
						|
# Check args first.
 | 
						|
if [ "$#" -lt "1" ]; then
 | 
						|
  cat <<EOF 1>&2
 | 
						|
 | 
						|
Usage:  ${0##*/} BASENAME [ALG]
 | 
						|
 | 
						|
This creates BASENAME.vbpubk and BASENAME.vbprivk pairs for use in signing
 | 
						|
developer files. This also creates a BASENAME.keyblock file containing the
 | 
						|
BASENAME.vbpubk, which can be used to sign a developer kernel.
 | 
						|
 | 
						|
If specified, ALG is one of:
 | 
						|
 | 
						|
  0    =  RSA1024 with SHA1
 | 
						|
  1    =  RSA1024 with SHA256
 | 
						|
  2    =  RSA1024 with SHA512
 | 
						|
  3    =  RSA2048 with SHA1
 | 
						|
  4    =  RSA2048 with SHA256
 | 
						|
  5    =  RSA2048 with SHA512
 | 
						|
  6    =  RSA4096 with SHA1
 | 
						|
  7    =  RSA4096 with SHA256
 | 
						|
  8    =  RSA4096 with SHA512
 | 
						|
  9    =  RSA8192 with SHA1
 | 
						|
  10   =  RSA8192 with SHA256
 | 
						|
  11   =  RSA8192 with SHA512
 | 
						|
 | 
						|
If ALG is not specified, a default value will be used.
 | 
						|
 | 
						|
EOF
 | 
						|
  exit 1
 | 
						|
fi
 | 
						|
 | 
						|
 | 
						|
# Compute the key length assuming the sizes shown above.
 | 
						|
function alg_to_keylen {
 | 
						|
  echo $(( 1 << (10 + ($1 / 3)) ))
 | 
						|
}
 | 
						|
 | 
						|
# Emit .vbpubk and .vbprivk using given basename and algorithm.
 | 
						|
function make_pair {
 | 
						|
  local base=$1
 | 
						|
  local alg=$2
 | 
						|
  local len=$(alg_to_keylen $alg)
 | 
						|
 | 
						|
  # make the RSA keypair
 | 
						|
  openssl genrsa -F4 -out "${base}_${len}.pem" $len
 | 
						|
  # create a self-signed certificate
 | 
						|
  openssl req -batch -new -x509 -key "${base}_${len}.pem" \
 | 
						|
    -out "${base}_${len}.crt"
 | 
						|
  # generate pre-processed RSA public key
 | 
						|
  dumpRSAPublicKey -cert "${base}_${len}.crt" > "${base}_${len}.keyb"
 | 
						|
 | 
						|
  # wrap the public key
 | 
						|
  futility vbutil_key \
 | 
						|
    --pack "${base}.vbpubk" \
 | 
						|
    --key "${base}_${len}.keyb" \
 | 
						|
    --version 1 \
 | 
						|
    --algorithm $alg
 | 
						|
 | 
						|
  # wrap the private key
 | 
						|
  futility vbutil_key \
 | 
						|
    --pack "${base}.vbprivk" \
 | 
						|
    --key "${base}_${len}.pem" \
 | 
						|
    --algorithm $alg
 | 
						|
 | 
						|
  # remove intermediate files
 | 
						|
  rm -f "${base}_${len}.pem" "${base}_${len}.crt" "${base}_${len}.keyb"
 | 
						|
}
 | 
						|
 | 
						|
# First create the .vbpubk and .vbprivk pair.
 | 
						|
make_pair "$1" "${2:-4}"
 | 
						|
 | 
						|
# Now create a .keyblock to hold our .vbpubk. Since it's for developer use, it
 | 
						|
# won't be signed, just checksummed. Developer kernels can only be run in
 | 
						|
# non-recovery mode with the developer switch enabled, but it won't hurt us to
 | 
						|
# turn on all the flags bits anyway.
 | 
						|
futility vbutil_keyblock --pack "$1.keyblock" \
 | 
						|
  --datapubkey "$1.vbpubk" --flags 15
 |