Searched refs:rootkey (Results 1 – 12 of 12) sorted by relevance
33 local rootkey="$4"42 --rootkey="${rootkey}" \71 local rootkey94 rootkey="${key_dir}/root_key.loem${loem_index}.vbpubk"95 cp "${rootkey}" "${loem_output_dir}/rootkey.${loemid}"98 gbb_update "${temp_fw}" "${key_dir}" "${out_firmware}" "${rootkey}"
244 --rootkey="$root_pubkey" \
334 gbb_utility -g --rootkey="$rootkey_file" "$bios_image" >/dev/null 2>&1
33 ${FUTILITY} gbb_utility -g -k ${TMP}.rootkey ${TMP}.gbb38 ${FUTILITY} show ${TMP}.vblock_a --publickey ${TMP}.rootkey41 --publickey ${TMP}.rootkey \47 --publickey ${TMP}.rootkey ; then false ; fi50 --publickey ${TMP}.rootkey \
39 if ${FUTILITY} gbb_utility -s --rootkey ${TMP}.data1.toolong ${TMP}.blob; then false; fi48 --rootkey ${TMP}.data1.short \53 --rootkey ${TMP}.read1 \65 ${FUTILITY} gbb_utility -s --rootkey ${TMP}.data1 ${TMP}.blob70 ${FUTILITY} gbb_utility -g --rootkey ${TMP}.read1 ${TMP}.blob193 ${FUTILITY} gbb_utility -g --rootkey ${TMP}.read1 ${TMP}.blob.bad194 if ${FUTILITY} gbb_utility -s --rootkey ${TMP}.data1 ${TMP}.blob.bad; then false; fi
27 ${FUTILITY} vbutil_key --pack rootkey.test \37 --rootkey=rootkey.test
29 struct vb2_packed_key rootkey; member87 sd->gbb_rootkey_offset = vb2_offset_of(&mock_gbb, &mock_gbb.rootkey); in reset_common_data()91 mock_gbb.rootkey.algorithm = 11; in reset_common_data()92 mock_gbb.rootkey.key_offset = in reset_common_data()93 vb2_offset_of(&mock_gbb.rootkey, in reset_common_data()95 mock_gbb.rootkey.key_size = sizeof(mock_gbb.rootkey_data); in reset_common_data()
31 struct vb2_packed_key rootkey; member90 sd->gbb_rootkey_offset = vb2_offset_of(&mock_gbb, &mock_gbb.rootkey); in reset_common_data()94 mock_gbb.rootkey.sig_alg = VB2_SIG_RSA8192; in reset_common_data()95 mock_gbb.rootkey.key_offset = in reset_common_data()96 vb2_offset_of(&mock_gbb.rootkey, in reset_common_data()98 mock_gbb.rootkey.key_size = sizeof(mock_gbb.rootkey_data); in reset_common_data()
79 futility gbb_utility --rootkey="$TMPFILE" "$file" >/dev/null80 rootkey=$(futility vbutil_key --unpack "$TMPFILE" | grep sha1sum | \82 matchn=$(greppy "$rootkey")90 echo "$space root key: ${rootkey} ${matchn}"
314 log futility gbb_utility -g --rootkey rootkey.vbpubk \317 log futility vbutil_key --unpack rootkey.vbpubk319 futility vbutil_key --unpack rootkey.vbpubk |327 --signpubkey rootkey.vbpubk \332 --signpubkey rootkey.vbpubk \
176 state->rootkey.offset = state->my_area->offset + in futil_cb_show_gbb()178 state->rootkey.buf = buf + gbb->rootkey_offset; in futil_cb_show_gbb()179 state->rootkey.len = gbb->rootkey_size; in futil_cb_show_gbb()180 state->rootkey._flags |= AREA_IS_VALID; in futil_cb_show_gbb()295 if (!sign_key && (state->rootkey._flags & AREA_IS_VALID)) in futil_cb_show_fw_preamble()297 sign_key = (VbPublicKey *)state->rootkey.buf; in futil_cb_show_fw_preamble()302 if (!sign_key && (state->rootkey._flags & AREA_IS_VALID)) in futil_cb_show_fw_preamble()304 sign_key = (VbPublicKey *)state->rootkey.buf; in futil_cb_show_fw_preamble()
63 struct cb_area_s rootkey; member