summaryrefslogtreecommitdiffstats
path: root/core/product.mk
diff options
context:
space:
mode:
authorFurquan Shaikh <furquan@google.com>2015-08-07 11:58:05 -0700
committerFurquan Shaikh <furquan@google.com>2015-08-07 12:01:20 -0700
commite8c212235fc4a83a20cb9bd25f17897a75b15440 (patch)
treedd3fb6773857fcda95956257e63d1851f1c8062d /core/product.mk
parent0cd3e17f5bc819a45fd824a00ca44c0ea61c1c12 (diff)
downloadbuild-e8c212235fc4a83a20cb9bd25f17897a75b15440.zip
build-e8c212235fc4a83a20cb9bd25f17897a75b15440.tar.gz
build-e8c212235fc4a83a20cb9bd25f17897a75b15440.tar.bz2
vboot_signer: Add kernel subkey required for signing kernel keyblock
Currently, the keyblock was being generated using data_key.vbprivk. However, we need to use kernel_subkey.vbprivk for kernel keyblock generation. This did not create any issues until now because dev-mode just throws a message saying that keyblock is invalid. But, normal-mode does not boot if keyblock is invalid. Add extra parameter for passing in kernel subkey to vboot_signer script. TEST="make bootimage-nodeps" generates correctly signed boot.img. Verified that the image boots fine in normal mode. Change-Id: I0fc2183b466e34ddf1d98c9532072548504fcec4 Signed-off-by: Furquan Shaikh <furquan@google.com>
Diffstat (limited to 'core/product.mk')
-rw-r--r--core/product.mk1
1 files changed, 1 insertions, 0 deletions
diff --git a/core/product.mk b/core/product.mk
index 4e8bff1..e97cba4 100644
--- a/core/product.mk
+++ b/core/product.mk
@@ -104,6 +104,7 @@ _product_var_list := \
PRODUCT_SYSTEM_PROPERTY_BLACKLIST \
PRODUCT_SYSTEM_SERVER_JARS \
PRODUCT_VBOOT_SIGNING_KEY \
+ PRODUCT_VBOOT_SIGNING_SUBKEY \
PRODUCT_VERITY_SIGNING_KEY \
PRODUCT_SYSTEM_VERITY_PARTITION \
PRODUCT_VENDOR_VERITY_PARTITION \