wolfBoot/tools/scripts/x86_fsp/tgl/assemble_image.sh

61 lines
1.7 KiB
Bash
Executable File

#!/bin/bash
WOLFBOOT_DIR=$(pwd)
# 16 MB
BIOS_REGION_SIZE=16777216
BIOS_REGION_PATH=/tmp/bios.bin
SIGN_OPTIONS="--ecc384 --sha256"
SIGN_KEY=$WOLFBOOT_DIR/wolfboot_signing_private_key.der
SIGN_TOOL=./tools/keytools/sign
set -e
make_keys()
{
make keytools
./tools/keytools/keygen --ecc384 -g wolfboot_signing_private_key.der --ecc256 -g tpm_seal_key.key -keystoreDir src/
}
build_and_sign_image()
{
# compute the size differences between $FLASH_DUMP and "$WOLFBOOT_DIR"/wolfboot_stage1.bin and store it in SIZE
FLASH_DUMP_SIZE=$(stat -c%s "$FLASH_DUMP")
WOLFBOOT_SIZE=$(stat -c%s "$BIOS_REGION_PATH")
SIZE=$((FLASH_DUMP_SIZE - WOLFBOOT_SIZE))
cp "$FLASH_DUMP" "$WOLFBOOT_DIR/temp_image.bin"
truncate -s $SIZE "$WOLFBOOT_DIR/temp_image.bin"
cat "$WOLFBOOT_DIR/temp_image.bin" "$BIOS_REGION_PATH" > "$WOLFBOOT_DIR/final_image.bin"
PCR0=$(python ./tools/scripts/x86_fsp/compute_pcr.py "$WOLFBOOT_DIR"/final_image.bin | tail -n 1)
"$WOLFBOOT_DIR"/tools/tpm/policy_sign -ecc256 -key=tpm_seal_key.key -pcr=0 -pcrdigest=$PCR0
IMAGE_FILE="$WOLFBOOT_DIR"/final_image.bin "$WOLFBOOT_DIR"/tools/scripts/x86_fsp/tpm_install_policy.sh policy.bin.sig
}
assemble()
{
cp $WOLFBOOT_DIR/wolfboot_stage1.bin $BIOS_REGION_PATH
build_and_sign_image
}
# Parse command line options
while getopts "ks:n:m:" opt; do
case "$opt" in
k)
make_keys
exit 0
;;
n)
FLASH_DUMP="$OPTARG"
IBG=0
;;
*)
echo "Usage: $0 [-k] [-s FLASH_DUMP]"
echo "-k: make keys"
echo "-n FLASH_DUMP: assemble an image for being used without IBG"
exit 1
;;
esac
done
assemble