@ -25,6 +25,11 @@ class Entry_vblock(Entry):
- kernelkey : Name of the kernel key to use ( inside keydir )
- kernelkey : Name of the kernel key to use ( inside keydir )
- preamble - flags : Value of the vboot preamble flags ( typically 0 )
- preamble - flags : Value of the vboot preamble flags ( typically 0 )
Output files :
- input . < unique_name > - input file passed to futility
- vblock . < unique_name > - output file generated by futility ( which is
used as the entry contents )
Chromium OS signs the read - write firmware and kernel , writing the signature
Chromium OS signs the read - write firmware and kernel , writing the signature
in this block . This allows U - Boot to verify that the next firmware stage
in this block . This allows U - Boot to verify that the next firmware stage
and kernel are genuine .
and kernel are genuine .
@ -53,8 +58,9 @@ class Entry_vblock(Entry):
return False
return False
input_data + = data
input_data + = data
output_fname = tools . GetOutputFilename ( ' vblock. %s ' % self . name )
uniq = self . GetUniqueName ( )
input_fname = tools . GetOutputFilename ( ' input. %s ' % self . name )
output_fname = tools . GetOutputFilename ( ' vblock. %s ' % uniq )
input_fname = tools . GetOutputFilename ( ' input. %s ' % uniq )
tools . WriteFile ( input_fname , input_data )
tools . WriteFile ( input_fname , input_data )
prefix = self . keydir + ' / '
prefix = self . keydir + ' / '
args = [
args = [
@ -69,6 +75,5 @@ class Entry_vblock(Entry):
]
]
#out.Notice("Sign '%s' into %s" % (', '.join(self.value), self.label))
#out.Notice("Sign '%s' into %s" % (', '.join(self.value), self.label))
stdout = tools . Run ( ' futility ' , * args )
stdout = tools . Run ( ' futility ' , * args )
#out.Debug(stdout)
self . SetContents ( tools . ReadFile ( output_fname ) )
self . SetContents ( tools . ReadFile ( output_fname ) )
return True
return True