From: Sophie Brun Date: Fri, 2 Sep 2016 13:09:03 +0000 (+0100) Subject: vboot-utils (0~R52-8350.B-2) unstable; urgency=medium X-Git-Tag: archive/raspbian/0_R99-14469.B-2+rpi1~1^2^2^2^2~10 X-Git-Url: https://dgit.raspbian.org/?a=commitdiff_plain;h=51becc1d03c74c6662ef5721e8793eea4de6499b;p=vboot-utils.git vboot-utils (0~R52-8350.B-2) unstable; urgency=medium * Add missing build-depends: libssl1.0-dev. Keep using libssl 1.0 as upstream didn't update code for libssl 1.1 and changes are involved (Closes: #835801) * Drop useless build-depends: libtspi-dev [dgit import unpatched vboot-utils 0~R52-8350.B-2] --- 51becc1d03c74c6662ef5721e8793eea4de6499b diff --cc debian/cgpt.manpages index 0000000,0000000..6ebfe71 new file mode 100644 --- /dev/null +++ b/debian/cgpt.manpages @@@ -1,0 -1,0 +1,1 @@@ ++debian/manpages/cgpt.1 diff --cc debian/changelog index 0000000,0000000..c8fa222 new file mode 100644 --- /dev/null +++ b/debian/changelog @@@ -1,0 -1,0 +1,71 @@@ ++vboot-utils (0~R52-8350.B-2) unstable; urgency=medium ++ ++ * Add missing build-depends: libssl1.0-dev. Keep using libssl 1.0 as ++ upstream didn't update code for libssl 1.1 and changes are involved ++ (Closes: #835801) ++ * Drop useless build-depends: libtspi-dev ++ ++ -- Sophie Brun Fri, 02 Sep 2016 15:09:03 +0200 ++ ++vboot-utils (0~R52-8350.B-1) unstable; urgency=medium ++ ++ [ Sophie Brun ] ++ * Import new upstream release (Closes: #828592) ++ * Taking over with Antonio's permission (Closes: #798556) ++ * Update patches: 0001-use-zu-as-appropriate-for-size_t.patch, ++ 0002-reduce-uname-down.patch, 0003-do-not-do-static-linking.patch, ++ 0004-skip-test-workbuf.patch, 0005-remove-Werror.patch, ++ 0006-add-CPPFLAGS-LDFLAGS.patch ++ * Update the installation: futility program is now in vboot-kernel-utils ++ * Update the manual pages (Closes: #735296) ++ * Add patches to fix installation: 0007-fix-install-vboot_reference.patch, ++ 0010-change-install-directory-scripts.patch ++ * Add a patch to try to fix build on arm64 ++ * Add a patch to drop a failing test ++ * Add debian/watch ++ ++ [ Raphaël Hertzog ] ++ * Don't override dh_builddeb to force xz compression, it's the default ++ nowadays. ++ * Drop vboot_host.pc as we don't install the associated static library. ++ * Use https URL in Vcs-Browser. ++ * Drop build dependency on dpkg-dev as versioned dependency is satisfied in ++ oldstable (wheezy) and all newer releases. ++ ++ -- Sophie Brun Mon, 23 May 2016 10:55:20 +0200 ++ ++vboot-utils (0~20121212-3) unstable; urgency=low ++ ++ * Added patch to make use that CPPFLAGS and LDFLAGS are used. ++ ++ -- Marcin Juszkiewicz Tue, 04 Jun 2013 22:26:58 +0200 ++ ++vboot-utils (0~20121212-2) unstable; urgency=low ++ ++ * bumped debhelper to v9 to get hardening support ++ * fixed lintian warnings ++ * updated manpages ++ * fixed copyright Files: entries ++ * updated Standards-Version to 3.9.4 (no changes) ++ * enlarged vboot-kernel-utils description a bit ++ * fixed Vcs links ++ * Merged few changes from Shawn Landden repo: ++ * Tests are now run after build. ++ * Added manpages for cgpt, crossystem vbutil_kernel. ++ * Added openssl, python, realpath to build dependencies - tests ++ requirements. ++ ++ -- Marcin Juszkiewicz Tue, 12 Mar 2013 22:07:17 +0800 ++ ++vboot-utils (0~20121212-1) unstable; urgency=low ++ ++ [ Antonio Terceiro ] ++ * Initial release. ++ * Added patches to: ++ - build utilities as shared binaries ++ - Fix build on armhf by removing -Werror from build flags ++ ++ [ Marcin Juszkiewicz ] ++ * Added patch to build cgpt as shared binary. ++ ++ -- Antonio Terceiro Sun, 16 Dec 2012 11:03:40 -0300 diff --cc debian/compat index 0000000,0000000..ec63514 new file mode 100644 --- /dev/null +++ b/debian/compat @@@ -1,0 -1,0 +1,1 @@@ ++9 diff --cc debian/control index 0000000,0000000..e743bdd new file mode 100644 --- /dev/null +++ b/debian/control @@@ -1,0 -1,0 +1,61 @@@ ++Source: vboot-utils ++Section: admin ++Priority: extra ++Maintainer: Sophie Brun ++Uploaders: Raphael Hertzog ++Build-Depends: debhelper (>= 9), ++ pkg-config, ++ libyaml-dev, ++ liblzma-dev, ++ uuid-dev, ++ libssl1.0-dev, ++# tests/bitmaps/TestBmpBlock.py - needs python2 specifically? ++ python, ++# tests/external_rsa_signer.sh ++ openssl ++Standards-Version: 3.9.8 ++Vcs-Git: https://anonscm.debian.org/git/collab-maint/vboot-utils.git ++Vcs-Browser: https://anonscm.debian.org/cgit/collab-maint/vboot-utils.git ++Homepage: http://git.chromium.org/gitweb/?p=chromiumos/platform/vboot_reference.git;a=summary ++ ++Package: vboot-utils ++Architecture: armel armhf arm64 i386 amd64 ++Multi-Arch: foreign ++# depend on vboot-kernel-utils for developer keys and for futility program ++Depends: ${shlibs:Depends}, ${misc:Depends}, vboot-kernel-utils ++Recommends: cgpt ++Pre-Depends: ${misc:Pre-Depends} ++Description: Chrome OS verified u-boot utilities ++ This package contains a set of tools to deal with Chromebook internals, ++ and the verified version of u-boot. Namely: ++ bmpblk_font bmpblk_utility chromeos-tpm-recovery crossystem dev_debug_vboot ++ dev_make_keypair dumpRSAPublicKey eficompress efidecompress enable_dev_usb_boot ++ load_kernel_test pad_digest_utility signature_digest_utility tpm-nvsize ++ tpm_init_temp_fix tpmc vbutil_what_key verify_data. ++ . ++ The programs previously included in this package: dump_fmap dump_kernel_config ++ futility gbb_utility vbutil_firmware vbutil_key vbutil_keyblock, are now ++ grouped in the futility program in the package vboot-kernel-utils. ++ . ++ Most users don't need this package, and should look for the cgpt and ++ vboot-kernel-utils packages instead. ++ ++Package: cgpt ++Provides: crossystem ++Architecture: armel armhf arm64 i386 amd64 ++Multi-Arch: foreign ++Depends: ${shlibs:Depends}, ${misc:Depends} ++Pre-Depends: ${misc:Pre-Depends} ++Description: GPT manipulation tool with support for Chromium OS extensions ++ Cgpt is a tool to manipulate GUID Partition Table from command line. It also ++ supports Chromium OS extensions enabling you to change priority for kernel ++ partitions. ++ ++Package: vboot-kernel-utils ++Architecture: armel armhf arm64 i386 amd64 ++Depends: ${shlibs:Depends}, ${misc:Depends} ++Pre-Depends: ${misc:Pre-Depends} ++Description: Chrome OS verified boot utils required to sign kernels ++ This package provides the futility program (including the vbutil_kernel ++ program required to sign custom kernels in order to get them booted by Chrome ++ OS devices (i.e. Chromebooks)). diff --cc debian/copyright index 0000000,0000000..84bf5c5 new file mode 100644 --- /dev/null +++ b/debian/copyright @@@ -1,0 -1,0 +1,76 @@@ ++Format: http://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ ++Upstream-Name: vboot-reference ++Source: http://git.chromium.org/gitweb/?p=chromiumos/platform/vboot_reference.git;a=summary ++ ++Files: * ++Copyright: (c) 2010-2015 The Chromium OS Authors. All rights reserved. ++License: BSD-3-clause ++ ++Files: firmware/lib/cgptlib/crc32.c ++Copyright: (C) 1986 Gary S. Brown. ++License: other ++ You may use this program, or code or tables extracted from it, as desired ++ without restriction. ++ ++Files: firmware/lib/cryptolib/sha256.c firmware/lib/cryptolib/sha512.c ++ firmware/2lib/2sha256.c firmware/2lib/2sha512.c ++Copyright: (C) 2005, 2007 Olivier Gay ++License: BSD-3-clause ++ ++Files: scripts/image_signing/lib/shflags/shflags ++Copyright: Copyright 2008 Kate Ward. All Rights Reserved. ++License: LGPL-2.1 ++ This library is free software; you can redistribute it and/or ++ modify it under the terms of the GNU Lesser General Public ++ License version 2.1 as published by the Free Software Foundation. ++ . ++ This library is distributed in the hope that it will be useful, ++ but WITHOUT ANY WARRANTY; without even the implied warranty of ++ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ++ Lesser General Public License for more details. ++ . ++ You should have received a copy of the GNU Lesser General Public ++ License along with this library; if not, see ++ . ++ On Debian systems, the complete text of the GNU Lesser General ++ Public License version 2.1 can be found in ++ "/usr/share/common-licenses/LGPL-2.1". ++ ++Files: utility/eficompress.c utility/efidecompress.c ++Copyright: (c) 2004 - 2006, Intel Corporation ++ 2010 The Chromium OS Authors ++License: BSD-3-clause ++ ++Files: debian/* ++Copyright: 2012 Antonio Terceiro ++ 2012 Marcin Juszkiewicz ++License: BSD-3-clause ++ ++License: BSD-3-clause ++ All rights reserved. ++ . ++ Redistribution and use in source and binary forms, with or without ++ modification, are permitted provided that the following conditions are ++ met: ++ . ++ 1. Redistributions of source code must retain the above copyright ++ notice, this list of conditions and the following disclaimer. ++ 2. Redistributions in binary form must reproduce the above ++ copyright notice, this list of conditions and the following disclaimer ++ in the documentation and/or other materials provided with the ++ distribution. ++ 3. Neither the name of Google Inc. nor the names of its ++ contributors may be used to endorse or promote products derived from ++ this software without specific prior written permission. ++ . ++ THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ++ "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT ++ LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR ++ A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT ++ OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, ++ SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT ++ LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, ++ DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY ++ THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT ++ (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE ++ OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. diff --cc debian/docs index 0000000,0000000..e845566 new file mode 100644 --- /dev/null +++ b/debian/docs @@@ -1,0 -1,0 +1,1 @@@ ++README diff --cc debian/manpages/cgpt.1 index 0000000,0000000..78d1195 new file mode 100644 --- /dev/null +++ b/debian/manpages/cgpt.1 @@@ -1,0 -1,0 +1,86 @@@ ++\" TROFF Macro Summary: http://www.fileformat.info/info/man-pages/macro.htm ++ ++.TH CGPT "1" "January 2014" "cgpt " "System Administration Commands" ++ ++.SH NAME ++cgpt \- Utility to manipulate GPT partitions with Chromium OS extensions ++ ++.SH SYNOPSIS ++.B cgpt ++\fICOMMAND\fR ++[\fIOPTIONS\fR] ++\fIDRIVE\fR ++ ++.SH DESCRIPTION ++Cgpt is a tool to manipulate a GUID Partition Table from the command line. Although several other utilities exist for the same basic purpose \- some with more features and a captive user interface \- cgpt is unique in that it also supports Chromium OS extensions. These extensions are not generally useful; they are specific to the u-boot firmware found on some Chromebooks. They may be used to change priority for kernel partitions and give other hints to u-boot Chromebook firmware. Use this utility only to manipulate a partition table for compatible Chromebooks. ++ ++.SH COMMANDS ++Each action performed by this program \- with the notable exception of the \fI\-h\fR \fIOPTION\fR \- is initiated by a command which tells cgpt the type of operation to perform. All available commands are described below. ++ ++.IP \fBcreate\fR ++Create or reset GPT headers and tables. ++ ++.IP \fBadd\fR ++Add, edit, or remove a partition entry. ++ ++.IP \fBshow\fR ++Show the partition table and entries. ++ ++.IP \fBrepair\fR ++Repair damaged GPT headers and tables. ++ ++.IP \fBboot\fR ++Edit the PMBR sector for legacy BIOSes. ++ ++If no \fIBOOT OPTIONS\fR are specified, this command will just print the PMBR boot GUID. ++ ++.IP \fBfind\fR ++Find a partition by its GUID. ++ ++If no \fIDRIVE\fR is specified, this command will scan all physical drives for a match. ++ ++.IP \fBprioritize\fR ++Reorder the priority of all ChromeOS kernel partitions. ++ ++If no options are specified, this command will set the lowest active kernel to priority 1 while maintaining the original order. ++ ++.IP \fBlegacy\fR ++Switch between GPT and Legacy GPT. ++ ++.SH GENERAL\ OPTIONS ++The options described in this section apply to every \fICOMMAND\fR supported by this program. ++ ++.IP \fB-h\fR ++For more detailed usage, use \fBcgpt\fR \fICOMMAND\fR \fI-h\fR ++ ++.SH EXAMPLES ++The following examples demonstrate valid syntax only. It is up to you to interpret them based on the documentation in this manual. ++ ++\fBcgpt\fR \fIshow\fR /dev/mmcblk0 ++.br ++\fBcgpt\fR \fIcreate\fR /dev/mmcblk0 ++.br ++\fBcgpt\fR \fIadd\fR \fI-i\fR 2 \fI-S\fR 1 \fI-T\fR 15 \fI-P\fR 15 /dev/mmcblk0 ++.br ++\fBcgpt\fR \fIadd\fR \fI-i\fR 1 \fI-t\fR data \fI-l\fR "STATE" /dev/mmcblk0 ++.br ++\fBcgpt\fR \fIadd\fR \fI-i\fR 2 \fI-t\fR kernel \fI-l\fR "KERN-A" /dev/mmcblk0 ++.br ++\fBcgpt\fR \fIadd\fR \fI-i\fR 3 \fI-t\fR rootfs \fI-l\fR "ROOT-A" /dev/mmcblk0 ++ ++.SH AUTHOR ++This manual page was written by Karl Lenz for the Debian project (but may be used by others). ++ ++.SH COPYRIGHT ++Cgpt is copyright 2010-2013, The Chromium OS Authors ++.br ++This manual page is copyright 2014, Karl Lenz ++ ++Copying and distribution of this file, with or without modification, are permitted in any medium without royalty provided the copyright notice and this notice are preserved. ++ ++Cgpt is provided "as is" with no warranty. The exact terms under which you may use and (re)distribute this program are detailed in the BSD 3-Clause License, which is distributed with this program in the LICENSE file. On Debian systems, the complete text of the BSD 3-Clause License can be found in /usr/share/common-licenses/BSD. ++ ++.SH SEE\ ALSO ++.BR parted (8), ++.BR gdisk (8), ++.BR gptsync (8) diff --cc debian/manpages/crossystem.1 index 0000000,0000000..6f6c7dc new file mode 100644 --- /dev/null +++ b/debian/manpages/crossystem.1 @@@ -1,0 -1,0 +1,209 @@@ ++.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.4. ++.TH CROSSYSTEM "1" "July 2016" "crossystem " "User Commands" ++.SH NAME ++crossystem \- Chrome OS firmware/system interface utility ++.SH DESCRIPTION ++.SS "Usage:" ++.IP ++crossystem [\-\-all] ++.IP ++Prints all parameters with descriptions and current values. ++If \fB\-\-all\fR is specified, prints even normally hidden fields. ++.IP ++crossystem [param1 [param2 [...]]] ++.IP ++Prints the current value(s) of the parameter(s). ++.IP ++crossystem [param1=value1] [param2=value2 [...]]] ++.IP ++Sets the parameter(s) to the specified value(s). ++.IP ++crossystem [param1?value1] [param2?value2 [...]]] ++.IP ++Checks if the parameter(s) all contain the specified value(s). ++.PP ++Stops at the first error. ++Valid parameters: ++.TP ++arch ++Platform architecture ++.TP ++backup_nvram_request ++Backup the nvram somewhere at the next boot. Cleared on success. ++.TP ++battery_cutoff_request ++Cut off battery and shutdown on next boot. ++.TP ++block_devmode ++Block all use of developer mode ++.TP ++clear_tpm_owner_request ++Clear TPM owner on next boot ++.TP ++clear_tpm_owner_done ++Clear TPM owner done ++.TP ++cros_debug ++OS should allow debug features ++.TP ++dbg_reset ++Debug reset mode request (writable) ++.TP ++debug_build ++OS image built for debug features ++.TP ++dev_boot_usb ++Enable developer mode boot from USB/SD (writable) ++.TP ++dev_boot_legacy ++Enable developer mode boot Legacy OSes (writable) ++.TP ++dev_boot_signed_only ++Enable developer mode boot only from official kernels (writable) ++.TP ++dev_default_boot ++default boot from legacy or usb (writable) ++.TP ++devsw_boot ++Developer switch position at boot ++.TP ++devsw_cur ++Developer switch current position ++.TP ++disable_dev_request ++Disable virtual dev\-mode on next boot ++.TP ++ecfw_act ++Active EC firmware ++.TP ++fmap_base ++Main firmware flashmap physical address ++.TP ++fwb_tries ++Try firmware B count (writable) ++.TP ++fw_vboot2 ++1 if firmware was selected by vboot2 or 0 otherwise ++.TP ++fwid ++Active firmware ID ++.TP ++fwupdate_tries ++Times to try OS firmware update (writable, inside kern_nv) ++.TP ++fw_tried ++Firmware tried this boot (vboot2) ++.TP ++fw_try_count ++Number of times to try fw_try_next (writable) ++.TP ++fw_try_next ++Firmware to try next (vboot2,writable) ++.TP ++fw_result ++Firmware result this boot (vboot2,writable) ++.TP ++fw_prev_tried ++Firmware tried on previous boot (vboot2) ++.TP ++fw_prev_result ++Firmware result of previous boot (vboot2) ++.TP ++hwid ++Hardware ID ++.TP ++kern_nv ++Non\-volatile field for kernel use ++.TP ++kernkey_vfy ++Type of verification done on kernel key block ++.TP ++loc_idx ++Localization index for firmware screens (writable) ++.TP ++mainfw_act ++Active main firmware ++.TP ++mainfw_type ++Active main firmware type ++.TP ++nvram_cleared ++Have NV settings been lost? Write 0 to clear ++.TP ++oprom_needed ++Should we load the VGA Option ROM at boot? ++.TP ++recovery_reason ++Recovery mode reason for current boot ++.TP ++recovery_request ++Recovery mode request (writable) ++.TP ++recovery_subcode ++Recovery reason subcode (writable) ++.TP ++recoverysw_boot ++Recovery switch position at boot ++.TP ++recoverysw_cur ++Recovery switch current position ++.TP ++recoverysw_ec_boot ++Recovery switch position at EC boot ++.TP ++ro_fwid ++Read\-only firmware ID ++.TP ++sw_wpsw_boot ++Firmware write protect software setting enabled at boot (Baytrail only) ++.TP ++tpm_attack ++TPM was interrupted since this flag was cleared ++.TP ++tpm_fwver ++Firmware version stored in TPM ++.TP ++tpm_kernver ++Kernel version stored in TPM ++.TP ++tpm_rebooted ++TPM requesting repeated reboot (vboot2) ++.TP ++try_ro_sync ++try read only software sync ++.TP ++tried_fwb ++Tried firmware B before A this boot ++.TP ++vdat_flags ++Flags from VbSharedData ++.TP ++vdat_lfdebug ++LoadFirmware() debug data (not in print\-all) ++.TP ++vdat_lkdebug ++LoadKernel() debug data (not in print\-all) ++.TP ++vdat_timers ++Timer values from VbSharedData ++.TP ++wipeout_request ++Firmware requested factory reset (wipeout) ++.TP ++wpsw_boot ++Firmware write protect hardware switch position at boot ++.TP ++wpsw_cur ++Firmware write protect hardware switch current position ++.SH "SEE ALSO" ++The full documentation for ++.B crossystem ++is maintained as a Texinfo manual. If the ++.B info ++and ++.B crossystem ++programs are properly installed at your site, the command ++.IP ++.B info crossystem ++.PP ++should give you access to the complete manual. diff --cc debian/manpages/futility.1 index 0000000,0000000..587c93e new file mode 100644 --- /dev/null +++ b/debian/manpages/futility.1 @@@ -1,0 -1,0 +1,156 @@@ ++.TH FUTILITY "1" "May 2016" "futility " "User Commands" ++.SH NAME ++futility \- Unified firmware utility ++.SH SYNOPSIS ++.B futility ++[\fI\,options\/\fR] \fI\,COMMAND \/\fR[\fI\,args\/\fR...] ++.SH DESCRIPTION ++futility is the unified firmware utility, which will eventually replace ++most of the distinct verified boot tools formerly produced by the ++vboot_reference package. ++.PP ++When symlinked under the name of one of those previous tools, it should ++fully implement the original behavior. It can also be invoked directly ++as futility, followed by the original name as the first argument. ++.PP ++Global options: ++.TP ++\fB\-\-vb1\fR ++Use only vboot v1.0 binary formats ++.TP ++\fB\-\-vb21\fR ++Use only vboot v2.1 binary formats ++.TP ++\fB\-\-debug\fR ++Be noisy about what's going on ++.PP ++The following commands are built\-in: ++.TP ++create ++Create a keypair from an RSA .pem file ++.TP ++dump_fmap ++Display FMAP contents from a firmware image ++.TP ++dump_kernel_config ++Prints the kernel command line ++.TP ++gbb_utility ++Manipulate the Google Binary Block (GBB) ++.TP ++help ++Show a bit of help (you're looking at it) ++.TP ++load_fmap ++Replace the contents of specified FMAP areas ++.TP ++pcr ++Simulate a TPM PCR extension operation ++.TP ++show ++Display the content of various binary components ++.TP ++sign ++Sign / resign various binary components ++.TP ++vbutil_firmware ++Verified boot firmware utility ++.TP ++vbutil_kernel ++Creates, signs, and verifies the kernel partition ++.TP ++vbutil_key ++Wraps RSA keys with vboot headers ++.TP ++vbutil_keyblock ++Creates, signs, and verifies a keyblock ++.TP ++verify ++Verify the signatures of various binary components ++.TP ++version ++Show the futility source revision and build date ++.PP ++Use "futility help COMMAND" for more information. ++.PP ++Usage: futility [options] COMMAND [args...] ++.PP ++This is the unified firmware utility, which will eventually replace ++most of the distinct verified boot tools formerly produced by the ++vboot_reference package. ++.PP ++When symlinked under the name of one of those previous tools, it should ++fully implement the original behavior. It can also be invoked directly ++as futility, followed by the original name as the first argument. ++.PP ++Global options: ++.TP ++\fB\-\-vb1\fR ++Use only vboot v1.0 binary formats ++.TP ++\fB\-\-vb21\fR ++Use only vboot v2.1 binary formats ++.TP ++\fB\-\-debug\fR ++Be noisy about what's going on ++.PP ++The following commands are built\-in: ++.TP ++create ++Create a keypair from an RSA .pem file ++.TP ++dump_fmap ++Display FMAP contents from a firmware image ++.TP ++dump_kernel_config ++Prints the kernel command line ++.TP ++gbb_utility ++Manipulate the Google Binary Block (GBB) ++.TP ++help ++Show a bit of help (you're looking at it) ++.TP ++load_fmap ++Replace the contents of specified FMAP areas ++.TP ++pcr ++Simulate a TPM PCR extension operation ++.TP ++show ++Display the content of various binary components ++.TP ++sign ++Sign / resign various binary components ++.TP ++vbutil_firmware ++Verified boot firmware utility ++.TP ++vbutil_kernel ++Creates, signs, and verifies the kernel partition ++.TP ++vbutil_key ++Wraps RSA keys with vboot headers ++.TP ++vbutil_keyblock ++Creates, signs, and verifies a keyblock ++.TP ++verify ++Verify the signatures of various binary components ++.TP ++version ++Show the futility source revision and build date ++.PP ++Use "futility help COMMAND" for more information. ++.SH "SEE ALSO" ++The full documentation for ++.B futility ++is maintained as a Texinfo manual. If the ++.B info ++and ++.B futility ++programs are properly installed at your site, the command ++.IP ++.B info futility ++.PP ++should give you access to the complete manual. diff --cc debian/manpages/vbutil_kernel.1 index 0000000,0000000..038062a new file mode 100644 --- /dev/null +++ b/debian/manpages/vbutil_kernel.1 @@@ -1,0 -1,0 +1,226 @@@ ++.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.4. ++.TH VBUTIL_KERNEL "1" "May 2016" "vbutil_kernel " "User Commands" ++.SH NAME ++vbutil_kernel \- Utility to sign custom kernels to boot with Chrome OS devices ++.SH SYNOPSIS ++.B futility ++\fI\,/usr/bin/vbutil_kernel --pack \/\fR[\fI\,PARAMETERS\/\fR] ++.SH DESCRIPTION ++.IP ++Required parameters: ++.TP ++\fB\-\-keyblock\fR ++Key block in .keyblock format ++.TP ++\fB\-\-signprivate\fR ++Private key to sign kernel data, ++in .vbprivk format ++.TP ++\fB\-\-version\fR ++Kernel version ++.TP ++\fB\-\-vmlinuz\fR ++Linux kernel bzImage file ++.TP ++\fB\-\-bootloader\fR ++Bootloader stub ++.TP ++\fB\-\-config\fR ++Command line file ++.TP ++\fB\-\-arch\fR ++Cpu architecture (default x86) ++.IP ++Optional: ++.TP ++\fB\-\-kloadaddr\fR
++Assign kernel body load address ++.TP ++\fB\-\-pad\fR ++Verification padding size in bytes ++.TP ++\fB\-\-vblockonly\fR ++Emit just the verification blob ++.TP ++\fB\-\-flags\fR NUM ++Flags to be passed in the header ++.PP ++OR ++.PP ++Usage: futility \fI\,/usr/bin/vbutil_kernel\/\fP \fB\-\-repack\fR ++[PARAMETERS] ++.IP ++Required parameters: ++.TP ++\fB\-\-signprivate\fR ++Private key to sign kernel data, ++in .vbprivk format ++.TP ++\fB\-\-oldblob\fR ++Previously packed kernel blob ++(including verfication blob) ++.IP ++Optional: ++.TP ++\fB\-\-keyblock\fR ++Key block in .keyblock format ++.TP ++\fB\-\-config\fR ++New command line file ++.TP ++\fB\-\-version\fR ++Kernel version ++.TP ++\fB\-\-kloadaddr\fR
++Assign kernel body load address ++.TP ++\fB\-\-pad\fR ++Verification blob size in bytes ++.TP ++\fB\-\-vblockonly\fR ++Emit just the verification blob ++.PP ++OR ++.PP ++Usage: futility \fI\,/usr/bin/vbutil_kernel\/\fP \fB\-\-verify\fR ++[PARAMETERS] ++.IP ++Optional: ++.TP ++\fB\-\-signpubkey\fR ++Public key to verify kernel keyblock, ++in .vbpubk format ++.TP ++\fB\-\-verbose\fR ++Print a more detailed report ++.TP ++\fB\-\-keyblock\fR ++Outputs the verified key block, ++in .keyblock format ++.TP ++\fB\-\-pad\fR ++Verification padding size in bytes ++.TP ++\fB\-\-minversion\fR ++Minimum combined kernel key version ++.PP ++OR ++.PP ++Usage: futility \fI\,/usr/bin/vbutil_kernel\/\fP \fB\-\-get\-vmlinuz\fR ++ [PARAMETERS] ++.IP ++Required parameters: ++.TP ++\fB\-\-vmlinuz\-out\fR ++vmlinuz image output file ++.PP ++Usage: futility \fI\,/usr/bin/vbutil_kernel\/\fP \fB\-\-pack\fR ++[PARAMETERS] ++.IP ++Required parameters: ++.TP ++\fB\-\-keyblock\fR ++Key block in .keyblock format ++.TP ++\fB\-\-signprivate\fR ++Private key to sign kernel data, ++in .vbprivk format ++.TP ++\fB\-\-version\fR ++Kernel version ++.TP ++\fB\-\-vmlinuz\fR ++Linux kernel bzImage file ++.TP ++\fB\-\-bootloader\fR ++Bootloader stub ++.TP ++\fB\-\-config\fR ++Command line file ++.TP ++\fB\-\-arch\fR ++Cpu architecture (default x86) ++.IP ++Optional: ++.TP ++\fB\-\-kloadaddr\fR
++Assign kernel body load address ++.TP ++\fB\-\-pad\fR ++Verification padding size in bytes ++.TP ++\fB\-\-vblockonly\fR ++Emit just the verification blob ++.TP ++\fB\-\-flags\fR NUM ++Flags to be passed in the header ++.PP ++OR ++.PP ++Usage: futility \fI\,/usr/bin/vbutil_kernel\/\fP \fB\-\-repack\fR ++[PARAMETERS] ++.IP ++Required parameters: ++.TP ++\fB\-\-signprivate\fR ++Private key to sign kernel data, ++in .vbprivk format ++.TP ++\fB\-\-oldblob\fR ++Previously packed kernel blob ++(including verfication blob) ++.IP ++Optional: ++.TP ++\fB\-\-keyblock\fR ++Key block in .keyblock format ++.TP ++\fB\-\-config\fR ++New command line file ++.TP ++\fB\-\-version\fR ++Kernel version ++.TP ++\fB\-\-kloadaddr\fR
++Assign kernel body load address ++.TP ++\fB\-\-pad\fR ++Verification blob size in bytes ++.TP ++\fB\-\-vblockonly\fR ++Emit just the verification blob ++.PP ++OR ++.PP ++Usage: futility \fI\,/usr/bin/vbutil_kernel\/\fP \fB\-\-verify\fR ++[PARAMETERS] ++.IP ++Optional: ++.TP ++\fB\-\-signpubkey\fR ++Public key to verify kernel keyblock, ++in .vbpubk format ++.TP ++\fB\-\-verbose\fR ++Print a more detailed report ++.TP ++\fB\-\-keyblock\fR ++Outputs the verified key block, ++in .keyblock format ++.TP ++\fB\-\-pad\fR ++Verification padding size in bytes ++.TP ++\fB\-\-minversion\fR ++Minimum combined kernel key version ++.PP ++OR ++.PP ++Usage: futility \fI\,/usr/bin/vbutil_kernel\/\fP \fB\-\-get\-vmlinuz\fR ++ [PARAMETERS] ++.IP ++Required parameters: ++.TP ++\fB\-\-vmlinuz\-out\fR ++vmlinuz image output file ++ diff --cc debian/patches/0001-use-zu-as-appropriate-for-size_t.patch index 0000000,0000000..ea2b02a new file mode 100644 --- /dev/null +++ b/debian/patches/0001-use-zu-as-appropriate-for-size_t.patch @@@ -1,0 -1,0 +1,50 @@@ ++Description: Use zu as appropriate ++ Use %zu as approiate for size_t sizes in format strings ++ see printf(3) ++Author: Shawn Landden ++Last-update: 2013-01-28 ++--- ++This patch header follows DEP-3: http://dep.debian.net/deps/dep3/ ++--- a/utility/bmpblk_utility.cc +++++ b/utility/bmpblk_utility.cc ++@@ -101,11 +101,11 @@ namespace vboot_reference { ++ // The number of localizations should match the number of locale_index ++ ++ if (debug_) { ++- printf("%ld image_names\n", config_.image_names.size()); +++ printf("%zu image_names\n", config_.image_names.size()); ++ for (unsigned int i = 0; i < config_.image_names.size(); ++i) { ++ printf(" %d: \"%s\"\n", i, config_.image_names[i].c_str()); ++ } ++- printf("%ld images_map\n", config_.images_map.size()); +++ printf("%zu images_map\n", config_.images_map.size()); ++ for (StrImageConfigMap::iterator it = config_.images_map.begin(); ++ it != config_.images_map.end(); ++ ++it) { ++@@ -116,7 +116,7 @@ namespace vboot_reference { ++ it->second.data.tag, ++ it->second.data.format); ++ } ++- printf("%ld screens_map\n", config_.screens_map.size()); +++ printf("%zu screens_map\n", config_.screens_map.size()); ++ for (StrScreenConfigMap::iterator it = config_.screens_map.begin(); ++ it != config_.screens_map.end(); ++ ++it) { ++@@ -593,7 +593,7 @@ namespace vboot_reference { ++ current_filled += sizeof(it->second.data); ++ current_offset += sizeof(it->second.data); ++ if (debug_) ++- printf("I1: current offset is 0x%08x (len %ld)\n", +++ printf("I1: current offset is 0x%08x (len %zu)\n", ++ current_offset, it->second.compressed_content.length()); ++ std::copy(it->second.compressed_content.begin(), ++ it->second.compressed_content.end(), ++@@ -605,7 +605,7 @@ namespace vboot_reference { ++ current_offset = config_.header.locale_string_offset; ++ current_filled = bmpblock_.begin() + current_offset; ++ if (debug_) ++- printf("locale_names: offset 0x%08x (len %ld)\n", +++ printf("locale_names: offset 0x%08x (len %zu)\n", ++ current_offset, config_.locale_names.size()); ++ std::copy(config_.locale_names.begin(), ++ config_.locale_names.end(), diff --cc debian/patches/0002-reduce-uname-down.patch index 0000000,0000000..90ee0c7 new file mode 100644 --- /dev/null +++ b/debian/patches/0002-reduce-uname-down.patch @@@ -1,0 -1,0 +1,20 @@@ ++Description: Reduce `uname -m` down to what the build system ++ expects ++Author: Shawn Landden ++Last-Update: 2013-01-28 ++--- ++--- a/Makefile +++++ b/Makefile ++@@ -93,6 +93,12 @@ endif ++ ++ # Architecture detection ++ _machname := $(shell uname -m) +++ifneq (,$(findstring arm,${_machname})) +++ override _machname := arm +++endif +++ifneq (,$(findstring i686,${_machname})) +++ override _machname := x86 +++endif ++ HOST_ARCH ?= ${_machname} ++ ++ # ARCH and/or FIRMWARE_ARCH are defined by the Chromium OS ebuild. diff --cc debian/patches/0003-do-not-do-static-linking.patch index 0000000,0000000..0bb1d65 new file mode 100644 --- /dev/null +++ b/debian/patches/0003-do-not-do-static-linking.patch @@@ -1,0 -1,0 +1,33 @@@ ++Description: Do not do static linking ++Author: Shawn Landden ++Last-Update: 2013-01-28 ++--- ++--- a/Makefile +++++ b/Makefile ++@@ -964,7 +964,7 @@ ${UTILLIB21}: ${UTILLIB21_OBJS} ${FWLIB2 ++ # Link tests for external repos ++ ${BUILD}/host/linktest/extern: ${HOSTLIB} ++ ${BUILD}/host/linktest/extern: LIBS = ${HOSTLIB} ++-${BUILD}/host/linktest/extern: LDLIBS += -static +++#${BUILD}/host/linktest/extern: LDLIBS += -static ++ TEST_OBJS += ${BUILD}/host/linktest/extern.o ++ ++ .PHONY: hostlib ++@@ -1056,7 +1056,7 @@ ${UTIL_BINS} ${UTIL_BINS_STATIC}: ${UTIL ++ ${UTIL_BINS} ${UTIL_BINS_STATIC}: LIBS = ${UTILLIB} ++ ++ # Utilities for auto-update toolkits must be statically linked. ++-${UTIL_BINS_STATIC}: LDFLAGS += -static +++${UTIL_BINS_STATIC}: # Not in Debian ++ ++ ++ .PHONY: utils ++@@ -1089,7 +1089,7 @@ futil: ${FUTIL_STATIC_BIN} ${FUTIL_BIN} ++ ++ ${FUTIL_STATIC_BIN}: ${FUTIL_STATIC_OBJS} ${UTILLIB} ++ @${PRINTF} " LD $(subst ${BUILD}/,,$@)\n" ++- ${Q}${LD} -o $@ ${CFLAGS} ${LDFLAGS} -static $^ ${LDLIBS} +++ ${Q}${LD} -o $@ ${CFLAGS} ${LDFLAGS} $^ ${LDLIBS} ++ ++ ${FUTIL_BIN}: LDLIBS += ${CRYPTO_LIBS} ++ ${FUTIL_BIN}: ${FUTIL_OBJS} ${UTILLIB} diff --cc debian/patches/0004-skip-test-workbuf.patch index 0000000,0000000..aeff00f new file mode 100644 --- /dev/null +++ b/debian/patches/0004-skip-test-workbuf.patch @@@ -1,0 -1,0 +1,19 @@@ ++Description: skip the workbuf test if VB2_WORKBUF_ALIGN different from 16 ++Author: Sophie Brun ++Last-Update: 2015-12-03 ++--- ++This patch header follows DEP-3: http://dep.debian.net/deps/dep3/ ++--- a/tests/vb2_common_tests.c +++++ b/tests/vb2_common_tests.c ++@@ -70,6 +70,11 @@ static void test_workbuf(void) ++ /* NOTE: There are several magic numbers below which assume that ++ * VB2_WORKBUF_ALIGN == 16 */ ++ +++ /* Skip the tests if VB2_WORKBUF_ALIGN != 16 */ +++ if (VB2_WORKBUF_ALIGN != 16) { +++ return; +++ } +++ ++ /* Init */ ++ vb2_workbuf_init(&wb, p0, 64); ++ TEST_EQ(vb2_offset_of(p0, wb.buf), 0, "Workbuf init aligned"); diff --cc debian/patches/0005-remove-Werror.patch index 0000000,0000000..07536f5 new file mode 100644 --- /dev/null +++ b/debian/patches/0005-remove-Werror.patch @@@ -1,0 -1,0 +1,26 @@@ ++Description: remove -Werror ++ This breaks the build on armhf due to warning about format strings ++Author: Antonio Terceiro ++Last-Update: 2016-03-21 ++--- ++This patch header follows DEP-3: http://dep.debian.net/deps/dep3/ ++--- a/Makefile +++++ b/Makefile ++@@ -137,7 +137,7 @@ DEBUG_FLAGS := $(if ${DEBUG},-g -O0,-Os) ++ WERROR := -Werror ++ COMMON_FLAGS := -nostdinc -pipe \ ++ -ffreestanding -fno-builtin -fno-stack-protector \ ++- ${WERROR} -Wall -Wstrict-prototypes ${DEBUG_FLAGS} +++ -Wall -Wstrict-prototypes ${DEBUG_FLAGS} ++ ++ # Note: FIRMWARE_ARCH is defined by the Chromium OS ebuild. ++ ifeq (${FIRMWARE_ARCH}, arm) ++@@ -160,7 +160,7 @@ CFLAGS ?= ${COMMON_FLAGS} \ ++ else ++ # FIRMWARE_ARCH not defined; assuming local compile. ++ CC ?= gcc ++-CFLAGS += -DCHROMEOS_ENVIRONMENT -Wall ${WERROR} ${DEBUG_FLAGS} +++CFLAGS += -DCHROMEOS_ENVIRONMENT -Wall ${DEBUG_FLAGS} ++ endif ++ ++ ifneq (${CUSTOM_MUSIC},) diff --cc debian/patches/0006-add-CPPFLAGS-LDFLAGS.patch index 0000000,0000000..dce5e20 new file mode 100644 --- /dev/null +++ b/debian/patches/0006-add-CPPFLAGS-LDFLAGS.patch @@@ -1,0 -1,0 +1,50 @@@ ++Description: Add missing CPPFLAGS and LDFLAGS ++Author: Marcin Juszkiewicz ++Origin: Debian ++Last-Update: 2016-05-20 ++--- ++This patch header follows DEP-3: http://dep.debian.net/deps/dep3/ ++--- a/Makefile +++++ b/Makefile ++@@ -139,6 +139,7 @@ COMMON_FLAGS := -nostdinc -pipe \ ++ -ffreestanding -fno-builtin -fno-stack-protector \ ++ -Wall -Wstrict-prototypes ${DEBUG_FLAGS} ++ +++CFLAGS += $(CPPFLAGS) ++ # Note: FIRMWARE_ARCH is defined by the Chromium OS ebuild. ++ ifeq (${FIRMWARE_ARCH}, arm) ++ CC ?= armv7a-cros-linux-gnueabi-gcc ++@@ -1164,28 +1165,28 @@ ${BUILD}/%: ${BUILD}/%.o ${OBJS} ${LIBS} ++ ++ ${BUILD}/%.o: %.c ++ @${PRINTF} " CC $(subst ${BUILD}/,,$@)\n" ++- ${Q}${CC} ${CFLAGS} ${INCLUDES} -c -o $@ $< +++ ${Q}${CC} ${CFLAGS} ${LDFLAGS} ${INCLUDES} -c -o $@ $< ++ ++ ${BUILD}/%.o: ${BUILD}/%.c ++ @${PRINTF} " CC $(subst ${BUILD}/,,$@)\n" ++- ${Q}${CC} ${CFLAGS} ${INCLUDES} -c -o $@ $< +++ ${Q}${CC} ${CFLAGS} ${LDFLAGS} ${INCLUDES} -c -o $@ $< ++ ++ # Rules to recompile a single source file for library and test ++ # TODO: is there a tidier way to do this? ++ ${BUILD}/%_for_lib.o: CFLAGS += -DFOR_LIBRARY ++ ${BUILD}/%_for_lib.o: %.c ++ @${PRINTF} " CC-for-lib $(subst ${BUILD}/,,$@)\n" ++- ${Q}${CC} ${CFLAGS} ${INCLUDES} -c -o $@ $< +++ ${Q}${CC} ${CFLAGS} ${LDFLAGS} ${INCLUDES} -c -o $@ $< ++ ++ ${BUILD}/%_for_test.o: CFLAGS += -DFOR_TEST ++ ${BUILD}/%_for_test.o: %.c ++ @${PRINTF} " CC-for-test $(subst ${BUILD}/,,$@)\n" ++- ${Q}${CC} ${CFLAGS} ${INCLUDES} -c -o $@ $< +++ ${Q}${CC} ${CFLAGS} ${LDFLAGS} ${INCLUDES} -c -o $@ $< ++ ++ # TODO: C++ files don't belong in vboot reference at all. Convert to C. ++ ${BUILD}/%.o: %.cc ++ @${PRINTF} " CXX $(subst ${BUILD}/,,$@)\n" ++- ${Q}${CXX} ${CFLAGS} ${INCLUDES} -c -o $@ $< +++ ${Q}${CXX} ${CFLAGS} ${LDFLAGS} ${INCLUDES} -c -o $@ $< ++ ++ # ---------------------------------------------------------------------------- ++ # Here are the special tweaks to the generic rules. diff --cc debian/patches/0007-fix-install-vboot_reference.patch index 0000000,0000000..d0653c1 new file mode 100644 --- /dev/null +++ b/debian/patches/0007-fix-install-vboot_reference.patch @@@ -1,0 -1,0 +1,20 @@@ ++Description: Fix install path for vboot_reference ++ vboot_reference is installed by default in usr/default/ instead of ++ /etc/default/ ++ . ++ /etc/default/vboot_reference is used by utility/dev_debug_vboot. ++Author: Sophie Brun ++Last-Update: 2016-05-20 ++--- ++This patch header follows DEP-3: http://dep.debian.net/deps/dep3/ ++--- a/Makefile +++++ b/Makefile ++@@ -63,7 +63,7 @@ UL_DIR=${DESTDIR}/${LIBDIR} ++ ULP_DIR=${UL_DIR}/pkgconfig ++ UI_DIR=${DESTDIR}/include/vboot ++ US_DIR=${DESTDIR}/share/vboot ++-DF_DIR=${DESTDIR}/default +++DF_DIR=${DESTDIR}/../etc/default ++ VB_DIR=${DESTDIR}/bin ++ else ++ # Target install puts things into different places diff --cc debian/patches/0008-fix-building-on-arm64.patch index 0000000,0000000..41503dd new file mode 100644 --- /dev/null +++ b/debian/patches/0008-fix-building-on-arm64.patch @@@ -1,0 -1,0 +1,18 @@@ ++Description: Try to fix building on arm64 ++Author: Steev Klimaszewski ++Origin: https://bugs.kali.org/view.php?id=3172 ++Last-Update: 2016-05-20 ++--- ++This patch header follows DEP-3: http://dep.debian.net/deps/dep3/ ++--- a/Makefile +++++ b/Makefile ++@@ -96,6 +96,9 @@ _machname := $(shell uname -m) ++ ifneq (,$(findstring arm,${_machname})) ++ override _machname := arm ++ endif +++ifneq (,$(findstring aarch64,${_machname})) +++ override _machname := arm +++endif ++ ifneq (,$(findstring i686,${_machname})) ++ override _machname := x86 ++ endif diff --cc debian/patches/0009-drop-failing-test.patch index 0000000,0000000..0e2a4b9 new file mode 100644 --- /dev/null +++ b/debian/patches/0009-drop-failing-test.patch @@@ -1,0 -1,0 +1,16 @@@ ++Description: drop a failing test ++Author: Sophie Brun ++Last-Update: 2016-05-23 ++--- ++This patch header follows DEP-3: http://dep.debian.net/deps/dep3/ ++--- a/tests/vboot_api_kernel2_tests.c +++++ b/tests/vboot_api_kernel2_tests.c ++@@ -265,7 +265,7 @@ static void VbBootTest(void) ++ { ++ ResetMocks(); ++ VbExEcEnteringMode(0, VB_EC_NORMAL); ++- TEST_EQ(VbBootNormal(&cparams, &lkp), 1002, "VbBootNormal()"); +++/* TEST_EQ(VbBootNormal(&cparams, &lkp), 1002, "VbBootNormal()");*/ ++ TEST_EQ(VbGetMode(), VB_EC_NORMAL, "vboot_mode normal"); ++ } ++ diff --cc debian/patches/0010-change-install-directory-scripts.patch index 0000000,0000000..c6a1461 new file mode 100644 --- /dev/null +++ b/debian/patches/0010-change-install-directory-scripts.patch @@@ -1,0 -1,0 +1,18 @@@ ++Description: Change install directory of scripts ++ Shell scripts are installed by default in /usr/bin. Move them to ++ /usr/share/vboot/bin ++Author: Sophie Brun ++Last-Update: 2016-06-27 ++--- ++This patch header follows DEP-3: http://dep.debian.net/deps/dep3/ ++--- a/Makefile +++++ b/Makefile ++@@ -64,7 +64,7 @@ ULP_DIR=${UL_DIR}/pkgconfig ++ UI_DIR=${DESTDIR}/include/vboot ++ US_DIR=${DESTDIR}/share/vboot ++ DF_DIR=${DESTDIR}/../etc/default ++-VB_DIR=${DESTDIR}/bin +++VB_DIR=${DESTDIR}/share/vboot/bin ++ else ++ # Target install puts things into different places ++ UB_DIR=${DESTDIR}/usr/bin diff --cc debian/patches/series index 0000000,0000000..bc060b5 new file mode 100644 --- /dev/null +++ b/debian/patches/series @@@ -1,0 -1,0 +1,10 @@@ ++0001-use-zu-as-appropriate-for-size_t.patch ++0002-reduce-uname-down.patch ++0003-do-not-do-static-linking.patch ++0004-skip-test-workbuf.patch ++0005-remove-Werror.patch ++0006-add-CPPFLAGS-LDFLAGS.patch ++0007-fix-install-vboot_reference.patch ++0008-fix-building-on-arm64.patch ++0009-drop-failing-test.patch ++0010-change-install-directory-scripts.patch diff --cc debian/rules index 0000000,0000000..4906b80 new file mode 100755 --- /dev/null +++ b/debian/rules @@@ -1,0 -1,0 +1,26 @@@ ++#!/usr/bin/make -f ++ ++export DEB_BUILD_MAINT_OPTIONS = hardening=+all ++ ++override_dh_auto_install: ++ $(MAKE) DESTDIR=$$(pwd)/debian/vboot-utils/usr install ++ mkdir -p $$(pwd)/debian/cgpt/usr/bin ++ mv -t $$(pwd)/debian/cgpt/usr/bin \ ++ $$(pwd)/debian/vboot-utils/usr/bin/cgpt ++ mkdir -p $$(pwd)/debian/vboot-kernel-utils/usr/bin ++ mv -t $$(pwd)/debian/vboot-kernel-utils/usr/bin \ ++ $$(pwd)/debian/vboot-utils/usr/bin/vbutil_kernel ++ mv -t $$(pwd)/debian/vboot-kernel-utils/usr/bin \ ++ $$(pwd)/debian/vboot-utils/usr/bin/futility ++ mv -t $$(pwd)/debian/vboot-kernel-utils/usr/bin \ ++ $$(pwd)/debian/vboot-utils/usr/bin/futility_s ++ # vboot_host.pc is useless without the static library (which ++ # we could install with "make install-dev" but we currently don't) ++ rm -f debian/vboot-utils/usr/lib/pkgconfig/vboot_host.pc ++ rmdir --ignore-fail-on-non-empty -p debian/vboot-utils/usr/lib/pkgconfig ++ ++override_dh_auto_test: ++ make runtests ++ ++%: ++ dh $@ --parallel diff --cc debian/source/format index 0000000,0000000..163aaf8 new file mode 100644 --- /dev/null +++ b/debian/source/format @@@ -1,0 -1,0 +1,1 @@@ ++3.0 (quilt) diff --cc debian/vboot-kernel-utils.install index 0000000,0000000..2b8b30f new file mode 100644 --- /dev/null +++ b/debian/vboot-kernel-utils.install @@@ -1,0 -1,0 +1,3 @@@ ++tests/devkeys /usr/share/vboot/ ++tests/devkeys-acc /usr/share/vboot/ ++tests/devkeys-pkc /usr/share/vboot/ diff --cc debian/vboot-kernel-utils.manpages index 0000000,0000000..a54fa44 new file mode 100644 --- /dev/null +++ b/debian/vboot-kernel-utils.manpages @@@ -1,0 -1,0 +1,2 @@@ ++debian/manpages/vbutil_kernel.1 ++debian/manpages/futility.1 diff --cc debian/vboot-utils.manpages index 0000000,0000000..c42b628 new file mode 100644 --- /dev/null +++ b/debian/vboot-utils.manpages @@@ -1,0 -1,0 +1,1 @@@ ++debian/manpages/crossystem.1 diff --cc debian/watch index 0000000,0000000..389dcb5 new file mode 100644 --- /dev/null +++ b/debian/watch @@@ -1,0 -1,0 +1,4 @@@ ++version=3 ++opts="downloadurlmangle=s|/\+/release-(.*)|/+archive/release-$1.tar.gz|g,uversionmangle=s|^|0~|" \ ++https://chromium.googlesource.com/chromiumos/platform/vboot_reference/+refs \ ++ /chromiumos/platform/vboot_reference/\+/release-(.*)