| #!/bin/bash |
| # Copyright (c) 2011 The Chromium OS Authors. All rights reserved. |
| # Use of this source code is governed by a BSD-style license that can be |
| # found in the LICENSE file. |
| # |
| # Generate .vbpubk and .vbprivk pairs for use by developer builds. These should |
| # be exactly like the real keys except that the private keys aren't secret. |
| |
| # Load common constants and functions. |
| . "$(dirname "$0")/common.sh" |
| |
| usage() { |
| cat <<EOF |
| Usage: ${PROG} [options] |
| |
| Options: |
| --devkeyblock Also generate developer firmware keyblock and data key |
| --android Also generate android keys |
| --uefi Also generate UEFI keys |
| --8k Use 8k keys instead of 4k (enables options below) |
| --8k-root Use 8k key size for the root key |
| --8k-recovery Use 8k key size for the recovery key |
| --8k-recovery-kernel Use 8k key size for the recovery kernel data |
| --8k-installer-kernel Use 8k key size for the installer kernel data |
| --key-name <name> Name of the keyset (for key.versions) |
| --output <dir> Where to write the keys (default is cwd) |
| EOF |
| |
| if [[ $# -ne 0 ]]; then |
| die "unknown option $*" |
| else |
| exit 0 |
| fi |
| } |
| |
| main() { |
| set -e |
| |
| # Flag to indicate whether we should be generating a developer keyblock flag. |
| local dev_keyblock="false" |
| local android_keys="false" |
| local uefi_keys="false" |
| local root_key_algoid=${ROOT_KEY_ALGOID} |
| local recovery_key_algoid=${RECOVERY_KEY_ALGOID} |
| local recovery_kernel_algoid=${RECOVERY_KERNEL_ALGOID} |
| local minios_kernel_algoid=${MINIOS_KERNEL_ALGOID} |
| local installer_kernel_algoid=${INSTALLER_KERNEL_ALGOID} |
| local keyname |
| local output_dir="${PWD}" setperms="false" |
| |
| while [[ $# -gt 0 ]]; do |
| case $1 in |
| --devkeyblock) |
| echo "Will also generate developer firmware keyblock and data key." |
| dev_keyblock="true" |
| ;; |
| |
| --android) |
| echo "Will also generate Android keys." |
| android_keys="true" |
| ;; |
| |
| --uefi) |
| echo "Will also generate UEFI keys." |
| uefi_keys="true" |
| ;; |
| |
| --8k) |
| root_key_algoid=${RSA8192_SHA512_ALGOID} |
| recovery_key_algoid=${RSA8192_SHA512_ALGOID} |
| recovery_kernel_algoid=${RSA8192_SHA512_ALGOID} |
| installer_kernel_algoid=${RSA8192_SHA512_ALGOID} |
| ;; |
| --8k-root) |
| root_key_algoid=${RSA8192_SHA512_ALGOID} |
| ;; |
| --8k-recovery) |
| recovery_key_algoid=${RSA8192_SHA512_ALGOID} |
| ;; |
| --8k-recovery-kernel) |
| recovery_kernel_algoid=${RSA8192_SHA512_ALGOID} |
| ;; |
| --8k-installer-kernel) |
| installer_kernel_algoid=${RSA8192_SHA512_ALGOID} |
| ;; |
| |
| --4k) |
| root_key_algoid=${RSA4096_SHA512_ALGOID} |
| recovery_key_algoid=${RSA4096_SHA512_ALGOID} |
| recovery_kernel_algoid=${RSA4096_SHA512_ALGOID} |
| installer_kernel_algoid=${RSA4096_SHA512_ALGOID} |
| ;; |
| --4k-root) |
| root_key_algoid=${RSA4096_SHA512_ALGOID} |
| ;; |
| --4k-recovery) |
| recovery_key_algoid=${RSA4096_SHA512_ALGOID} |
| ;; |
| --4k-recovery-kernel) |
| recovery_kernel_algoid=${RSA4096_SHA512_ALGOID} |
| ;; |
| --4k-installer-kernel) |
| installer_kernel_algoid=${RSA4096_SHA512_ALGOID} |
| ;; |
| |
| --key-name) |
| keyname="$2" |
| shift |
| ;; |
| |
| --output) |
| output_dir="$2" |
| setperms="true" |
| if [[ -d "${output_dir}" ]]; then |
| die "output dir (${output_dir}) already exists" |
| fi |
| shift |
| ;; |
| |
| -h|--help) |
| usage |
| ;; |
| *) |
| usage "$1" |
| ;; |
| esac |
| shift |
| done |
| |
| mkdir -p "${output_dir}" |
| cd "${output_dir}" |
| if [[ "${setperms}" == "true" ]]; then |
| chmod 700 . |
| fi |
| |
| if [[ ! -e "${VERSION_FILE}" ]]; then |
| echo "No version file found. Creating default ${VERSION_FILE}." |
| ( |
| if [[ -n "${keyname}" ]]; then |
| echo "name=${keyname}" |
| fi |
| printf '%s_version=1\n' {firmware,kernel}{_key,} |
| ) > "${VERSION_FILE}" |
| fi |
| |
| local eckey_version fkey_version ksubkey_version kdatakey_version |
| |
| # Get the key versions for normal keypairs |
| eckey_version=$(get_version "ec_key_version") |
| fkey_version=$(get_version "firmware_key_version") |
| # Firmware version is the kernel subkey version. |
| ksubkey_version=$(get_version "firmware_version") |
| # Kernel data key version is the kernel key version. |
| kdatakey_version=$(get_version "kernel_key_version") |
| |
| # Create the normal keypairs |
| make_pair ec_root_key ${EC_ROOT_KEY_ALGOID} |
| make_pair ec_data_key ${EC_DATAKEY_ALGOID} ${eckey_version} |
| make_pair root_key ${root_key_algoid} |
| make_pair firmware_data_key ${FIRMWARE_DATAKEY_ALGOID} ${fkey_version} |
| if [[ "${dev_keyblock}" == "true" ]]; then |
| make_pair dev_firmware_data_key ${DEV_FIRMWARE_DATAKEY_ALGOID} ${fkey_version} |
| fi |
| make_pair kernel_subkey ${KERNEL_SUBKEY_ALGOID} ${ksubkey_version} |
| make_pair kernel_data_key ${KERNEL_DATAKEY_ALGOID} ${kdatakey_version} |
| |
| # Create the recovery and factory installer keypairs |
| make_pair recovery_key ${recovery_key_algoid} |
| make_pair recovery_kernel_data_key ${recovery_kernel_algoid} |
| make_pair minios_kernel_data_key ${minios_kernel_algoid} |
| make_pair installer_kernel_data_key ${installer_kernel_algoid} |
| make_pair arv_root ${ARV_ROOT_ALGOID} |
| make_pair arv_platform ${ARV_PLATFORM_ALGOID} |
| |
| # Create the firmware keyblock for use only in Normal mode. This is redundant, |
| # since it's never even checked during Recovery mode. |
| make_keyblock firmware ${FIRMWARE_KEYBLOCK_MODE} firmware_data_key root_key |
| # Ditto EC keyblock |
| make_keyblock ec ${EC_KEYBLOCK_MODE} ec_data_key ec_root_key |
| |
| if [[ "${dev_keyblock}" == "true" ]]; then |
| # Create the dev firmware keyblock for use only in Developer mode. |
| make_keyblock dev_firmware ${DEV_FIRMWARE_KEYBLOCK_MODE} dev_firmware_data_key root_key |
| fi |
| |
| # Create the recovery kernel keyblock for use only in Recovery mode. |
| make_keyblock recovery_kernel ${RECOVERY_KERNEL_KEYBLOCK_MODE} recovery_kernel_data_key recovery_key |
| |
| # Create the miniOS kernel keyblock for use only in miniOS mode. |
| make_keyblock minios_kernel ${MINIOS_KERNEL_KEYBLOCK_MODE} minios_kernel_data_key recovery_key |
| |
| # Create the normal kernel keyblock for use only in Normal mode. |
| make_keyblock kernel ${KERNEL_KEYBLOCK_MODE} kernel_data_key kernel_subkey |
| |
| # Create the installer keyblock for use in Developer + Recovery mode |
| # For use in Factory Install and Developer Mode install shims. |
| make_keyblock installer_kernel ${INSTALLER_KERNEL_KEYBLOCK_MODE} installer_kernel_data_key recovery_key |
| |
| if [[ "${android_keys}" == "true" ]]; then |
| mkdir android |
| "${SCRIPT_DIR}"/create_new_android_keys.sh android |
| fi |
| |
| if [[ "${uefi_keys}" == "true" ]]; then |
| mkdir -p uefi |
| "${SCRIPT_DIR}"/uefi/create_new_uefi_keys.sh --output uefi |
| fi |
| |
| if [[ "${setperms}" == "true" ]]; then |
| find -type f -exec chmod 400 {} + |
| find -type d -exec chmod 500 {} + |
| fi |
| |
| # CAUTION: The public parts of most of these blobs must be compiled into the |
| # firmware, which is built separately (and some of which can't be changed after |
| # manufacturing). If you update these keys, you must coordinate the changes |
| # with the BIOS people or you'll be unable to boot the resulting images. |
| } |
| main "$@" |