hold task->mempolicy while numa_maps scans.
[GitHub/LineageOS/android_kernel_samsung_universal7580.git] / scripts / sign-file
CommitLineData
e2a666d5 1#!/bin/bash
80d65e58
DH
2#
3# Sign a module file using the given key.
4#
e2a666d5 5# Format: sign-file <key> <x509> <keyid-script> <module>
80d65e58
DH
6#
7
8scripts=`dirname $0`
9
10CONFIG_MODULE_SIG_SHA512=y
11if [ -r .config ]
12then
13 . ./.config
14fi
15
16key="$1"
17x509="$2"
e2a666d5
RR
18keyid_script="$3"
19mod="$4"
80d65e58
DH
20
21if [ ! -r "$key" ]
22then
23 echo "Can't read private key" >&2
24 exit 2
25fi
26
27if [ ! -r "$x509" ]
28then
29 echo "Can't read X.509 certificate" >&2
30 exit 2
31fi
80d65e58
DH
32
33#
34# Signature parameters
35#
36algo=1 # Public-key crypto algorithm: RSA
37hash= # Digest algorithm
38id_type=1 # Identifier type: X.509
39
40#
41# Digest the data
42#
43dgst=
44if [ "$CONFIG_MODULE_SIG_SHA1" = "y" ]
45then
46 prologue="0x30, 0x21, 0x30, 0x09, 0x06, 0x05, 0x2B, 0x0E, 0x03, 0x02, 0x1A, 0x05, 0x00, 0x04, 0x14"
47 dgst=-sha1
48 hash=2
49elif [ "$CONFIG_MODULE_SIG_SHA224" = "y" ]
50then
51 prologue="0x30, 0x2d, 0x30, 0x0d, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x04, 0x05, 0x00, 0x04, 0x1C"
52 dgst=-sha224
53 hash=7
54elif [ "$CONFIG_MODULE_SIG_SHA256" = "y" ]
55then
56 prologue="0x30, 0x31, 0x30, 0x0d, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01, 0x05, 0x00, 0x04, 0x20"
57 dgst=-sha256
58 hash=4
59elif [ "$CONFIG_MODULE_SIG_SHA384" = "y" ]
60then
61 prologue="0x30, 0x41, 0x30, 0x0d, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02, 0x05, 0x00, 0x04, 0x30"
62 dgst=-sha384
63 hash=5
64elif [ "$CONFIG_MODULE_SIG_SHA512" = "y" ]
65then
66 prologue="0x30, 0x51, 0x30, 0x0d, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03, 0x05, 0x00, 0x04, 0x40"
67 dgst=-sha512
68 hash=6
69else
70 echo "$0: Can't determine hash algorithm" >&2
71 exit 2
72fi
73
74(
75perl -e "binmode STDOUT; print pack(\"C*\", $prologue)" || exit $?
e2a666d5
RR
76openssl dgst $dgst -binary $mod || exit $?
77) >$mod.dig || exit $?
80d65e58
DH
78
79#
80# Generate the binary signature, which will be just the integer that comprises
81# the signature with no metadata attached.
82#
e2a666d5 83openssl rsautl -sign -inkey $key -keyform PEM -in $mod.dig -out $mod.sig || exit $?
b05e585d 84siglen=`stat -c %s $mod.sig`
e2a666d5
RR
85
86SIGNER="`perl $keyid_script $x509 signer-name`"
87KEYID="`perl $keyid_script $x509 keyid`"
b05e585d
LT
88keyidlen=$(echo -n "$KEYID" | wc -c)
89signerlen=$(echo -n "$SIGNER" | wc -c)
80d65e58
DH
90
91#
92# Build the signed binary
93#
94(
e2a666d5 95 cat $mod || exit $?
80d65e58 96 echo '~Module signature appended~' || exit $?
e2a666d5
RR
97 echo -n "$SIGNER" || exit $?
98 echo -n "$KEYID" || exit $?
80d65e58
DH
99
100 # Preface each signature integer with a 2-byte BE length
101 perl -e "binmode STDOUT; print pack(\"n\", $siglen)" || exit $?
e2a666d5 102 cat $mod.sig || exit $?
80d65e58
DH
103
104 # Generate the information block
105 perl -e "binmode STDOUT; print pack(\"CCCCCxxxN\", $algo, $hash, $id_type, $signerlen, $keyidlen, $siglen + 2)" || exit $?
e2a666d5 106) >$mod~ || exit $?
80d65e58 107
e2a666d5 108mv $mod~ $mod || exit $?