debian/0000755000000000000000000000000012153453130007163 5ustar debian/patches/0000755000000000000000000000000012153452714010621 5ustar debian/patches/add-cppflags-and-ldflags.patch0000644000000000000000000001101612153452714016340 0ustar --- Makefile | 2 ++ firmware/Makefile | 2 +- host/Makefile | 2 +- tests/Makefile | 10 +++++----- utility/Makefile | 6 +++--- 5 files changed, 12 insertions(+), 10 deletions(-) --- vboot-utils.orig/Makefile +++ vboot-utils/Makefile @@ -72,10 +72,12 @@ endif ifeq (${DISABLE_NDEBUG},) CFLAGS += -DNDEBUG endif +CFLAGS += $(CPPFLAGS) + export CC CXX PKG_CONFIG CFLAGS export TOP = $(shell pwd) export FWDIR=$(TOP)/firmware export HOSTDIR=$(TOP)/host --- vboot-utils.orig/firmware/Makefile +++ vboot-utils/firmware/Makefile @@ -118,11 +118,11 @@ STUB_OBJS = $(STUB_SRCS:%.c=${BUILD_ROOT ALL_SRCS = ${LIB_SRCS} ${STUB_SRCS} ifeq ($(FIRMWARE_ARCH),) test : $(STUB_OBJS) $(FWLIB) - $(CC) $(CFLAGS) $(INCLUDES) -o $(BUILD_ROOT)/a.out \ + $(CC) $(CFLAGS) $(LDFLAGS) $(INCLUDES) -o $(BUILD_ROOT)/a.out \ $(TESTDIR)/main.c $(STUB_OBJS) $(LIBS) else test : $(FWLIB) endif --- vboot-utils.orig/host/Makefile +++ vboot-utils/host/Makefile @@ -32,11 +32,11 @@ STUB_SRCS = \ ../firmware/stub/vboot_api_stub.c ALL_SRCS = ${LIB_SRCS} ${STUB_SRCS} test : $(HOSTLIB) - $(CC) $(CFLAGS) $(INCLUDES) -o $(BUILD_ROOT)/a.out $(TESTDIR)/main.c \ + $(CC) $(CFLAGS) $(LDFLAGS) $(INCLUDES) -o $(BUILD_ROOT)/a.out $(TESTDIR)/main.c \ $(HOSTLIB) -lcrypto include ../build.mk $(HOSTLIB) : $(ALL_OBJS) $(FWLIB) --- vboot-utils.orig/tests/Makefile +++ vboot-utils/tests/Makefile @@ -77,45 +77,45 @@ ${TEST_LIB}: ${TEST_LIB_OBJS} ${BUILD_ROOT}/CgptManagerTests.o: CgptManagerTests.cc $(CXX) -DWITH_UTIL_MAIN $(CXXFLAGS) $(INCLUDES) -c $< -o $@ ${BUILD_ROOT}/CgptManagerTests: ${BUILD_ROOT}/CgptManagerTests.o - $(CXX) $(CXXFLAGS) $(INCLUDES) $(LDFLAGS) $^ \ + $(CXX) $(CXXFLAGS) $(LDFLAGS) $(INCLUDES) $(LDFLAGS) $^ \ ${BUILD}/cgpt/libcgpt-cc.a -lgtest -lgflags $(LDLIBS) -o $@ ${BUILD_ROOT}/vboot_audio_for_test.o : $(FWDIR)/lib/vboot_audio.c $(CC) $(CFLAGS) -DCUSTOM_MUSIC $(INCLUDES) \ -MMD -MF $@.d -c -o $@ $< ${BUILD_ROOT}/vboot_audio_tests: vboot_audio_tests.c \ ${BUILD_ROOT}/vboot_audio_for_test.o ${LIBS} - $(CC) $(CFLAGS) $(INCLUDES) $< ${BUILD_ROOT}/vboot_audio_for_test.o \ + $(CC) $(CFLAGS) $(LDFLAGS) $(INCLUDES) $< ${BUILD_ROOT}/vboot_audio_for_test.o \ ${LIBS} -o $@ -lcrypto -lrt ${BUILD_ROOT}/rollback_index_test.o : rollback_index_test.c $(CC) $(CFLAGS) -I/usr/include $(INCLUDES) -MMD -MF $@.d -c -o $@ $< ${BUILD_ROOT}/rollback_index_test: rollback_index_test.c ${HOSTLIB} - $(CC) $(CFLAGS) -I/usr/include $(INCLUDES) $< -o $@ \ + $(CC) $(CFLAGS) $(LDFLAGS) -I/usr/include $(INCLUDES) $< -o $@ \ -ltlcl ${HOSTLIB} -lcrypto -lrt # Compile rollback_index.c for unit test, so it uses the same implementation # as it does in the firmware. ${BUILD_ROOT}/rollback_index_for_test.o : $(FWDIR)/lib/rollback_index.c $(CC) $(CFLAGS) -DROLLBACK_UNITTEST $(INCLUDES) \ -MMD -MF $@.d -c -o $@ $< ${BUILD_ROOT}/rollback_index2_tests: rollback_index2_tests.c \ ${BUILD_ROOT}/rollback_index_for_test.o ${LIBS} - $(CC) $(CFLAGS) $(INCLUDES) $< ${BUILD_ROOT}/rollback_index_for_test.o \ + $(CC) $(CFLAGS) $(LDFLAGS) $(INCLUDES) $< ${BUILD_ROOT}/rollback_index_for_test.o \ ${LIBS} -o $@ -lcrypto -lrt ${BUILD_ROOT}/%.o : %.c $(CC) $(CFLAGS) $(INCLUDES) -MMD -MF $@.d -c -o $@ $< ${BUILD_ROOT}/%: %.c ${LIBS} - $(CC) $(CFLAGS) $(INCLUDES) $< ${LIBS} -o $@ -lcrypto -lrt + $(CC) $(CFLAGS) $(LDFLAGS) $(INCLUDES) $< ${LIBS} -o $@ -lcrypto -lrt # TODO: port these tests to new API, if not already eqivalent # functionality in other tests # # big_firmware_tests --- vboot-utils.orig/utility/Makefile +++ vboot-utils/utility/Makefile @@ -94,24 +94,24 @@ ${BUILD_ROOT}/image_types.o: image_types ${BUILD_ROOT}/eficompress.o: eficompress.c $(CC) $(CFLAGS) -c $< -o $@ ${BUILD_ROOT}/eficompress: eficompress.c - $(CC) $(CFLAGS) -DSTANDALONE $(LDFLAGS) $< -o $@ + $(CC) $(CFLAGS) $(LDFLAGS) -DSTANDALONE $(LDFLAGS) $< -o $@ ${BUILD_ROOT}/efidecompress.o: efidecompress.c $(CC) $(CFLAGS) -c $< -o $@ ${BUILD_ROOT}/efidecompress: efidecompress.c - $(CC) $(CFLAGS) -DSTANDALONE $(LDFLAGS) $< -o $@ + $(CC) $(CFLAGS) $(LDFLAGS) -DSTANDALONE $(LDFLAGS) $< -o $@ ${BUILD_ROOT}/bmpblk_utility: ${BUILD_ROOT}/bmpblk_utility.o \ ${BUILD_ROOT}/bmpblk_util.o \ ${BUILD_ROOT}/image_types.o \ ${BUILD_ROOT}/eficompress.o \ ${BUILD_ROOT}/efidecompress.o - $(CXX) $(CFLAGS) $^ -o $@ -llzma -lyaml + $(CXX) $(CFLAGS) $(LDFLAGS) $^ -o $@ -llzma -lyaml ${BUILD_ROOT}/bmpblk_font: ${BUILD_ROOT}/bmpblk_font.o \ ${BUILD_ROOT}/image_types.o $(CC) $(CFLAGS) $(LDFLAGS) $^ -o $@ debian/patches/remove-Werror.patch0000644000000000000000000000126012153451376014417 0ustar Description: remove -Werror This breaks the build on armhf due to warning about format strings --- vboot-utils-0~20121212.orig/Makefile +++ vboot-utils-0~20121212/Makefile @@ -26,7 +26,7 @@ export MOCK_TPM DEBUG_FLAGS := $(if ${DEBUG},-g -O0,-Os) COMMON_FLAGS := -nostdinc -pipe \ -ffreestanding -fno-builtin -fno-stack-protector \ - -Werror -Wall -Wstrict-prototypes $(DEBUG_FLAGS) + -Wall -Wstrict-prototypes $(DEBUG_FLAGS) ifeq ($(FIRMWARE_ARCH), arm) CC ?= armv7a-cros-linux-gnueabi-gcc @@ -63,7 +63,7 @@ export ARCH=amd64 endif ifeq ($(FIRMWARE_ARCH),) -CFLAGS += -DCHROMEOS_ENVIRONMENT -Wall -Werror +CFLAGS += -DCHROMEOS_ENVIRONMENT -Wall endif ifneq (${DEBUG},) debian/patches/series0000644000000000000000000000017612153447766012055 0ustar build-cgpt-as-shared-binary.patch build-utilities-as-shared-binaries.patch remove-Werror.patch add-cppflags-and-ldflags.patch debian/patches/build-cgpt-as-shared-binary.patch0000644000000000000000000000067412153441070017023 0ustar Subject: build cgpt as shared binary Author: Marcin Juszkiewicz --- cgpt/Makefile | 1 - 1 file changed, 1 deletion(-) --- vboot-utils.orig/cgpt/Makefile +++ vboot-utils/cgpt/Makefile @@ -5,11 +5,10 @@ BUILD_ROOT := ${BUILD}/cgpt INCLUDES = -I$(FWDIR)/lib/cgptlib/include -I$(FWDIR)/include LIBS = ${HOSTLIB} LDLIBS += -luuid -LDFLAGS += -static DESTDIR ?= /usr/bin PROGNAME = ${BUILD_ROOT}/cgpt debian/patches/build-utilities-as-shared-binaries.patch0000644000000000000000000000111212153446335020406 0ustar Subject: build utilities as shared binary Author: Marcin Juszkiewicz --- utility/Makefile | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- vboot-utils.orig/utility/Makefile +++ vboot-utils/utility/Makefile @@ -17,11 +17,11 @@ CRYPTO_LIBS := $(shell $(PKG_CONFIG) --l BUILD_ROOT = ${BUILD}/utility DESTDIR ?= /usr/bin # Special flags for auto-update toolkits (must be statically linked). -AU_LDFLAGS = $(LDFLAGS) -static +AU_LDFLAGS = $(LDFLAGS) AU_TARGETS = crossystem \ dump_fmap \ gbb_utility TARGET_NAMES = $(AU_TARGETS) \ debian/vboot-kernel-utils.manpages0000644000000000000000000000002712153441070014444 0ustar debian/vbutil_kernel.1 debian/vboot-utils.manpages0000644000000000000000000000002412153441070013163 0ustar debian/crossystem.1 debian/cgpt.install0000644000000000000000000000003012153441070011501 0ustar build/cgpt/cgpt usr/bin debian/changelog0000644000000000000000000000226312153452715011050 0ustar vboot-utils (0~20121212-3) unstable; urgency=low * Added patch to make use that CPPFLAGS and LDFLAGS are used. -- Marcin Juszkiewicz Tue, 04 Jun 2013 22:26:58 +0200 vboot-utils (0~20121212-2) unstable; urgency=low * bumped debhelper to v9 to get hardening support * fixed lintian warnings * updated manpages * fixed copyright Files: entries * updated Standards-Version to 3.9.4 (no changes) * enlarged vboot-kernel-utils description a bit * fixed Vcs links * Merged few changes from Shawn Landden repo: * Tests are now run after build. * Added manpages for cgpt, crossystem vbutil_kernel. * Added openssl, python, realpath to build dependencies - tests requirements. -- Marcin Juszkiewicz Tue, 12 Mar 2013 22:07:17 +0800 vboot-utils (0~20121212-1) unstable; urgency=low [ Antonio Terceiro ] * Initial release. * Added patches to: - build utilities as shared binaries - Fix build on armhf by removing -Werror from build flags [ Marcin Juszkiewicz ] * Added patch to build cgpt as shared binary. -- Antonio Terceiro Sun, 16 Dec 2012 11:03:40 -0300 debian/gbp.conf0000644000000000000000000000003712153441070010602 0ustar [DEFAULT] pristine-tar = True debian/cgpt.manpages0000644000000000000000000000001612153441070011632 0ustar debian/cgpt.1 debian/rules0000755000000000000000000000037512153451464010260 0ustar #!/usr/bin/make -f %: dh $@ VBOOT_UTILS_EXCLUDE = \ -not -name vbutil_kernel override_dh_auto_install: dh_install -pvboot-utils $$(find build/utility -type f -executable -and $(VBOOT_UTILS_EXCLUDE)) usr/bin override_dh_auto_test: make runtests debian/copyright0000644000000000000000000001076412153441070011126 0ustar Format: http://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ Upstream-Name: vboot-reference Source: http://git.chromium.org/gitweb/?p=chromiumos/platform/vboot_reference.git;a=summary Files: * Copyright: (c) 2010-2012 The Chromium OS Authors. All rights reserved. License: Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: . * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of Google Inc. nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. . THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Files: firmware/lib/cgptlib/crc32.c Copyright: (C) 1986 Gary S. Brown. License: You may use this program, or code or tables extracted from it, as desired without restriction. Files: firmware/lib/cryptolib/sha256.c firmware/lib/cryptolib/sha512.c Copyright: (C) 2005, 2007 Olivier Gay License: All rights reserved. . Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of the project nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. . THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Files: scripts/image_signing/lib/shflags/shflags Copyright: Copyright 2008 Kate Ward. All Rights Reserved. License: Released under the LGPL (GNU Lesser General Public License) Comment: On Debian systems, the full test of the LGPL is available at /usr/share/common-licenses/LGPL Files: utility/eficompress.c utility/efidecompress.c Copyright: (c) 2004 - 2006, Intel Corporation License: All rights reserved. This program and the accompanying materials are licensed and made available under the terms and conditions of the BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/licenses/bsd-license.php . THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. Files: debian/* Copyright: 2012 Antonio Terceiro 2012 Marcin Juszkiewicz License: same as upstream The packaging files are distributed under the same terms as the original package is. debian/compat0000644000000000000000000000000212153441070010361 0ustar 9 debian/cgpt.10000644000000000000000000000131612153441070010203 0ustar .\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.40.4. .TH CGPT "1" "February 2013" "cgpt " "User Commands" .SH NAME cgpt \- Utility for ChromeOS-specific GPT partitions .SH SYNOPSIS .B cgpt \fICOMMAND \fR[\fIOPTIONS\fR] \fIDRIVE\fR .SH DESCRIPTION Supported COMMANDs: .TP create Create or reset GPT headers and tables .TP add Add, edit or remove a partition entry .TP show Show partition table and entries .TP repair Repair damaged GPT headers and tables .TP boot Edit the PMBR sector for legacy BIOSes .TP find Locate a partition by its GUID .TP prioritize Reorder the priority of all kernel partitions .TP legacy Switch between GPT and Legacy GPT .PP For more detailed usage, use cgpt COMMAND \fB\-h\fR debian/crossystem.10000644000000000000000000000635112153441070011465 0ustar .\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.42.1. .TH CROSSYSTEM "1" "June 2013" "crossystem " "User Commands" .SH NAME crossystem \- Chrome OS firmware/system interface utility .SH DESCRIPTION .SS "Usage:" .IP crossystem [\-\-all] .IP Prints all parameters with descriptions and current values. If \fB\-\-all\fR is specified, prints even normally hidden fields. .IP crossystem [param1 [param2 [...]]] .IP Prints the current value(s) of the parameter(s). .IP crossystem [param1=value1] [param2=value2 [...]]] .IP Sets the parameter(s) to the specified value(s). .IP crossystem [param1?value1] [param2?value2 [...]]] .IP Checks if the parameter(s) all contain the specified value(s). .PP Stops at the first error. Valid parameters: .TP arch Platform architecture .TP clear_tpm_owner_request Clear TPM owner on next boot .TP clear_tpm_owner_done Clear TPM owner done .TP cros_debug OS should allow debug features .TP dbg_reset Debug reset mode request (writable) .TP ddr_type Type of DDR RAM .TP disable_dev_request Disable virtual dev\-mode on next boot .TP dev_boot_usb Enable developer mode boot from USB/SD (writable) .TP dev_boot_legacy Enable developer mode boot Legacy OSes (writable) .TP dev_boot_signed_only Enable developer mode boot only from official kernels (writable) .TP devsw_boot Developer switch position at boot .TP devsw_cur Developer switch current position .TP ecfw_act Active EC firmware .TP fmap_base Main firmware flashmap physical address .TP fwb_tries Try firmware B count (writable) .TP fwid Active firmware ID .TP fwupdate_tries Times to try OS firmware update (writable, inside kern_nv) .TP hwid Hardware ID .TP kern_nv Non\-volatile field for kernel use .TP kernkey_vfy Type of verification done on kernel key block .TP loc_idx Localization index for firmware screens (writable) .TP mainfw_act Active main firmware .TP mainfw_type Active main firmware type .TP nvram_cleared Have NV settings been lost? Write 0 to clear .TP oprom_needed Should we load the VGA Option ROM at boot? .TP platform_family Platform family type .TP recovery_reason Recovery mode reason for current boot .TP recovery_request Recovery mode request (writable) .TP recoverysw_boot Recovery switch position at boot .TP recoverysw_cur Recovery switch current position .TP recoverysw_ec_boot Recovery switch position at EC boot .TP ro_fwid Read\-only firmware ID .TP savedmem_base RAM debug data area physical address .TP savedmem_size RAM debug data area size in bytes .TP sw_wpsw_boot Firmware write protect software setting enabled at boot .TP tpm_fwver Firmware version stored in TPM .TP tpm_kernver Kernel version stored in TPM .TP tried_fwb Tried firmware B before A this boot .TP vdat_flags Flags from VbSharedData .TP vdat_lfdebug LoadFirmware() debug data (not in print\-all) .TP vdat_lkdebug LoadKernel() debug data (not in print\-all) .TP vdat_timers Timer values from VbSharedData .TP wpsw_boot Firmware write protect hardware switch position at boot .TP wpsw_cur Firmware write protect hardware switch current position .SH "SEE ALSO" The full documentation for .B crossystem is maintained as a Texinfo manual. If the .B info and .B crossystem programs are properly installed at your site, the command .IP .B info crossystem .PP should give you access to the complete manual. debian/control0000644000000000000000000000300212153441070010561 0ustar Source: vboot-utils Section: admin Priority: extra Maintainer: Antonio Terceiro Build-Depends: debhelper (>= 9.0.0), libtspi-dev, liblzma-dev, uuid-dev, libssl-dev, pkg-config, libyaml-dev, openssl, realpath, python Standards-Version: 3.9.4 Vcs-Git: git://anonscm.debian.org/collab-maint/vboot-utils.git Vcs-Browser: http://anonscm.debian.org/gitweb/?p=collab-maint/vboot-utils.git;a=summary Homepage: http://git.chromium.org/gitweb/?p=chromiumos/platform/vboot_reference.git;a=summary Package: vboot-utils Architecture: armel armhf i386 amd64 Depends: ${shlibs:Depends}, ${misc:Depends} Description: Chrome OS verified boot utils This package contains a set of tools to deal with Chromebook internals. Most users don't need this package, and should look for the cgpt and vboot-kernel-utils packages instead. Package: cgpt Architecture: armel armhf i386 amd64 Depends: ${shlibs:Depends}, ${misc:Depends} Description: GPT manipulation tool with support for Chromium OS extensions Cgpt is a tool to manipulate GUID Partition Table from command line. It also supports Chromium OS extensions which allow to change priority for kernel partitions. Package: vboot-kernel-utils Architecture: armel armhf i386 amd64 Depends: ${shlibs:Depends}, ${misc:Depends} Description: Chrome OS verified boot utils required to sign kernels This package provides the vbutil_kernel program required to sign custom kernels in order to get them booted by Chrome OS devices (i.e. Chromebooks). Developer keys are also provided. debian/vboot-kernel-utils.install0000644000000000000000000000011412153441070014314 0ustar build/utility/vbutil_kernel usr/bin tests/devkeys/* usr/share/vboot/devkeys debian/docs0000644000000000000000000000000712153441070010033 0ustar README debian/vbutil_kernel.10000644000000000000000000000772312153441070012123 0ustar .\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.42.1. .TH THIS "1" "June 2013" "This program creates, signs, and verifies the kernel blob" "User Commands" .SH NAME This \- Verified boot kernel utility .SH SYNOPSIS .B vbutil_kernel \fI--pack \fR[\fIPARAMETERS\fR] .SH DESCRIPTION This program creates, signs, and verifies the kernel blob .IP Required parameters: .TP \fB\-\-keyblock\fR Key block in .keyblock format .TP \fB\-\-signprivate\fR Private key to sign kernel data, in .vbprivk format .TP \fB\-\-version\fR Kernel version .TP \fB\-\-vmlinuz\fR Linux kernel bzImage file .TP \fB\-\-bootloader\fR Bootloader stub .TP \fB\-\-config\fR Command line file .TP \fB\-\-arch\fR Cpu architecture (default x86) .IP Optional: .TP \fB\-\-kloadaddr\fR
Assign kernel body load address .TP \fB\-\-pad\fR Verification padding size in bytes .TP \fB\-\-vblockonly\fR Emit just the verification blob .PP OR .PP Usage: vbutil_kernel \fB\-\-repack\fR [PARAMETERS] .IP Required parameters: .TP \fB\-\-signprivate\fR Private key to sign kernel data, in .vbprivk format .TP \fB\-\-oldblob\fR Previously packed kernel blob (including verfication blob) .IP Optional: .TP \fB\-\-keyblock\fR Key block in .keyblock format .TP \fB\-\-config\fR New command line file .TP \fB\-\-version\fR Kernel version .TP \fB\-\-kloadaddr\fR
Assign kernel body load address .TP \fB\-\-pad\fR Verification blob size in bytes .TP \fB\-\-vblockonly\fR Emit just the verification blob .PP OR .PP Usage: vbutil_kernel \fB\-\-verify\fR [PARAMETERS] .IP Optional: .TP \fB\-\-signpubkey\fR Public key to verify kernel keyblock, in .vbpubk format .TP \fB\-\-verbose\fR Print a more detailed report .TP \fB\-\-keyblock\fR Outputs the verified key block, in .keyblock format .TP \fB\-\-pad\fR Verification padding size in bytes .TP \fB\-\-minversion\fR Minimum combined kernel key version and kernel version .PP Usage: vbutil_kernel \fB\-\-pack\fR [PARAMETERS] .IP Required parameters: .TP \fB\-\-keyblock\fR Key block in .keyblock format .TP \fB\-\-signprivate\fR Private key to sign kernel data, in .vbprivk format .TP \fB\-\-version\fR Kernel version .TP \fB\-\-vmlinuz\fR Linux kernel bzImage file .TP \fB\-\-bootloader\fR Bootloader stub .TP \fB\-\-config\fR Command line file .TP \fB\-\-arch\fR Cpu architecture (default x86) .IP Optional: .TP \fB\-\-kloadaddr\fR
Assign kernel body load address .TP \fB\-\-pad\fR Verification padding size in bytes .TP \fB\-\-vblockonly\fR Emit just the verification blob .PP OR .PP Usage: vbutil_kernel \fB\-\-repack\fR [PARAMETERS] .IP Required parameters: .TP \fB\-\-signprivate\fR Private key to sign kernel data, in .vbprivk format .TP \fB\-\-oldblob\fR Previously packed kernel blob (including verfication blob) .IP Optional: .TP \fB\-\-keyblock\fR Key block in .keyblock format .TP \fB\-\-config\fR New command line file .TP \fB\-\-version\fR Kernel version .TP \fB\-\-kloadaddr\fR
Assign kernel body load address .TP \fB\-\-pad\fR Verification blob size in bytes .TP \fB\-\-vblockonly\fR Emit just the verification blob .PP OR .PP Usage: vbutil_kernel \fB\-\-verify\fR [PARAMETERS] .IP Optional: .TP \fB\-\-signpubkey\fR Public key to verify kernel keyblock, in .vbpubk format .TP \fB\-\-verbose\fR Print a more detailed report .TP \fB\-\-keyblock\fR Outputs the verified key block, in .keyblock format .TP \fB\-\-pad\fR Verification padding size in bytes .TP \fB\-\-minversion\fR Minimum combined kernel key version and kernel version .SH "SEE ALSO" The full documentation for .B This is maintained as a Texinfo manual. If the .B info and .B This programs are properly installed at your site, the command .IP .B info This .PP should give you access to the complete manual. debian/source/0000755000000000000000000000000012153441070010463 5ustar debian/source/format0000644000000000000000000000001412153441070011671 0ustar 3.0 (quilt)